Procedures for Protecting Information Protecting Classified Information Overview Need-to-Know Classification Procedures Marking Classified Information Handling Classified Information Mailing & Carrying Classified Materials Foreign Government Classified Information Security Violations Secure Use of Office Network Using the SIPRNet State, Local, Tribal & Public Sector Emergency Authority Protecting Controlled Unclassified Information Changes Are in Process CUI in Defense Industry For Official Use Only & Similar Designations Personally Identifying Information Export-Controlled Information Proprietary Information and Trade Secrets DoD Technical Data Source Selection Data Unclassified Controlled Nuclear Information Sensitive Security Information Protected Critical Infrastructure Information Operations Security (OPSEC) Freedom of Information Act Security Criteria for Website Content Personal Conduct and Reporting Requirements Reporting Improper, Unreliable, or Suspicious Behavior Reporting Responsibilities Reporting Espionage Indicators Reporting Computer Violations Reporting "Anomalies" Security and Suitability Issues Preventing Violence No Good Excuses for Not Reporting You Can Make a Difference Hotline Numbers Self-Reporting Your Activities Introduction Self-Reporting - General Reporting Foreign Contacts Reporting Outside Activities Pre-Publication Review U.S. Government Ethics Standards Introduction Gifts from Outside Sources Gifts Between Employees Conflicting Financial Interests Frequent Flyer Benefits and Bumping Impartiality in Performing Duties Misuse of Position Representation to Government Agencies Outside Activities Financial Disclosure Honoraria Supplementation of Salary Seeking Other Employment Post-Employment Advisory Letters, Memoranda and Formal Opinions Foreign Threats to Protected Information Who's Doing What to Whom? Overview The Insider Espionage Threat Economic & Industrial Espionage Illegal Technology Transfer Cyber Espionage One Country's Program to Obtain U.S. S&T Secrets Militarily Critical Technologies List Economic Espionage Act of 1996 How Do I Know When I'm Being Targeted and Assessed Introduction Road to Recruitment Who Is Most Likely to Be Targeted? Getting Information Out of Honest People Like Me Methods of Operation Unsolicited Direct Requests Short-Term Foreign Visitors Long-Term Foreign Visitors Front Companies False Pretenses Elicitation Collection from Open Sources Theft and "Dumpster Diving" American Travelers Abroad Risks During Foreign Travel You Are the Target Country-Specific Threat Updates Security & Safety Recommendations Avoiding/Recognizing Intelligence Interest Contact with Foreign Relatives Theft While Traveling Overseas Communications Bugging Hotel Rooms Reporting Security Incidents What to Do If Arrested Antiterrorism and Force Protection Introduction Traveling Outside the United States Living Outside the United States Defensive Driving Overseas Package and Letter Bombs Kidnapping & Hostage Survival Guidelines Hijacking Survival Guidelines Captured Military Personnel Guidelines Computer and Other Technical Vulnerabilities Computer Vulnerabilities Overview Secure Use of Office Network Secure Use of Personal Computer Secure Use of Portable Devices User Authentication and Passwords Email Pitfalls Malware and Email Scams Social Networking and Peer-to-Peer Social Engineering Social Engineering Case 1 Social Engineering Case 2 Insider Threat to IT Security Protecting Laptops and Other Portable Devices Disposal of Digital Storage Devices Intercepting Your Communications Overview Standard Telephones Mobile Phones Cordless Phones Voice Mail Fax Machines Other Common Wireless Devices Bugs and Other Eavesdropping Devices Overview of the Threat Eavesdropping Methods Detecting and Preventing Eavesdropping Emissions Security (TEMPEST) Understanding and Helping With Personal Problems Employee Assistance Alcohol Abuse and Dependence Compulsive Gambling Depression Domestic Abuse Drug Use Eating Disorders Financial Problems Sexual Addiction Coping with Stress Suicide Crisis Intervention Espionage 101 Short Course in Counterintelligence Overview How Spies Are Caught Reportable Espionage Indicators Cyber Espionage Opportunities and Motivation for Espionage Are Increasing Behavior Patterns Associated with Espionage One Country's Program to Obtain S&T Secrets Hot Line Numbers True Spy Stories Learning from Experience People Who Made a Difference American Travelers Abroad Ames: Too Many Weaknesses Espionage Killed the Company Hamilton Tried to Prevent a War Hanssen: Deep Inner Conflicts Lalas: Something Wasn't Right Lipka: No Statute of Limitations Montes Was Unrepentant Morison: Consulting Led to Espionage Myers: How Could This Happen Pollard: Grandiose Imagination Ramsay Recruited Drug Users Walker Was "Intrinsically Evil" Terrorism 101 Introduction to Terrorism The Militant Jihadist Terrorist Threat Homegrown Jihadi Terrorists The Radicalization Process Avoid the Muslim Stereotypes Other Violent Extremist Movements Reporting Terrorist Indicators Lessons from Ali Mohamed Case Lessons from Other Cases Hotline Numbers
Protecting Classified Information
Overview Need-to-Know Classification Procedures Marking Classified Information Handling Classified Information Mailing & Carrying Classified Materials Foreign Government Classified Information Security Violations Secure Use of Office Network Using the SIPRNet State, Local, Tribal & Public Sector Emergency Authority
Protecting Controlled Unclassified Information
Changes Are in Process CUI in Defense Industry For Official Use Only & Similar Designations Personally Identifying Information Export-Controlled Information Proprietary Information and Trade Secrets DoD Technical Data Source Selection Data Unclassified Controlled Nuclear Information Sensitive Security Information Protected Critical Infrastructure Information Operations Security (OPSEC) Freedom of Information Act Security Criteria for Website Content
Personal Conduct and Reporting Requirements Reporting Improper, Unreliable, or Suspicious Behavior Reporting Responsibilities Reporting Espionage Indicators Reporting Computer Violations Reporting "Anomalies" Security and Suitability Issues Preventing Violence No Good Excuses for Not Reporting You Can Make a Difference Hotline Numbers Self-Reporting Your Activities Introduction Self-Reporting - General Reporting Foreign Contacts Reporting Outside Activities Pre-Publication Review U.S. Government Ethics Standards Introduction Gifts from Outside Sources Gifts Between Employees Conflicting Financial Interests Frequent Flyer Benefits and Bumping Impartiality in Performing Duties Misuse of Position Representation to Government Agencies Outside Activities Financial Disclosure Honoraria Supplementation of Salary Seeking Other Employment Post-Employment Advisory Letters, Memoranda and Formal Opinions Foreign Threats to Protected Information Who's Doing What to Whom? Overview The Insider Espionage Threat Economic & Industrial Espionage Illegal Technology Transfer Cyber Espionage One Country's Program to Obtain U.S. S&T Secrets Militarily Critical Technologies List Economic Espionage Act of 1996 How Do I Know When I'm Being Targeted and Assessed Introduction Road to Recruitment Who Is Most Likely to Be Targeted? Getting Information Out of Honest People Like Me Methods of Operation Unsolicited Direct Requests Short-Term Foreign Visitors Long-Term Foreign Visitors Front Companies False Pretenses Elicitation Collection from Open Sources Theft and "Dumpster Diving" American Travelers Abroad Risks During Foreign Travel You Are the Target Country-Specific Threat Updates Security & Safety Recommendations Avoiding/Recognizing Intelligence Interest Contact with Foreign Relatives Theft While Traveling Overseas Communications Bugging Hotel Rooms Reporting Security Incidents What to Do If Arrested Antiterrorism and Force Protection Introduction Traveling Outside the United States Living Outside the United States Defensive Driving Overseas Package and Letter Bombs Kidnapping & Hostage Survival Guidelines Hijacking Survival Guidelines Captured Military Personnel Guidelines Computer and Other Technical Vulnerabilities Computer Vulnerabilities Overview Secure Use of Office Network Secure Use of Personal Computer Secure Use of Portable Devices User Authentication and Passwords Email Pitfalls Malware and Email Scams Social Networking and Peer-to-Peer Social Engineering Social Engineering Case 1 Social Engineering Case 2 Insider Threat to IT Security Protecting Laptops and Other Portable Devices Disposal of Digital Storage Devices Intercepting Your Communications Overview Standard Telephones Mobile Phones Cordless Phones Voice Mail Fax Machines Other Common Wireless Devices Bugs and Other Eavesdropping Devices Overview of the Threat Eavesdropping Methods Detecting and Preventing Eavesdropping Emissions Security (TEMPEST) Understanding and Helping With Personal Problems Employee Assistance Alcohol Abuse and Dependence Compulsive Gambling Depression Domestic Abuse Drug Use Eating Disorders Financial Problems Sexual Addiction Coping with Stress Suicide Crisis Intervention Espionage 101 Short Course in Counterintelligence Overview How Spies Are Caught Reportable Espionage Indicators Cyber Espionage Opportunities and Motivation for Espionage Are Increasing Behavior Patterns Associated with Espionage One Country's Program to Obtain S&T Secrets Hot Line Numbers True Spy Stories Learning from Experience People Who Made a Difference American Travelers Abroad Ames: Too Many Weaknesses Espionage Killed the Company Hamilton Tried to Prevent a War Hanssen: Deep Inner Conflicts Lalas: Something Wasn't Right Lipka: No Statute of Limitations Montes Was Unrepentant Morison: Consulting Led to Espionage Myers: How Could This Happen Pollard: Grandiose Imagination Ramsay Recruited Drug Users Walker Was "Intrinsically Evil" Terrorism 101 Introduction to Terrorism The Militant Jihadist Terrorist Threat Homegrown Jihadi Terrorists The Radicalization Process Avoid the Muslim Stereotypes Other Violent Extremist Movements Reporting Terrorist Indicators Lessons from Ali Mohamed Case Lessons from Other Cases Hotline Numbers
Reporting Improper, Unreliable, or Suspicious Behavior
Reporting Responsibilities Reporting Espionage Indicators Reporting Computer Violations Reporting "Anomalies" Security and Suitability Issues Preventing Violence No Good Excuses for Not Reporting You Can Make a Difference Hotline Numbers
Self-Reporting Your Activities
Introduction Self-Reporting - General Reporting Foreign Contacts Reporting Outside Activities Pre-Publication Review
U.S. Government Ethics Standards
Introduction Gifts from Outside Sources Gifts Between Employees Conflicting Financial Interests Frequent Flyer Benefits and Bumping Impartiality in Performing Duties Misuse of Position Representation to Government Agencies Outside Activities Financial Disclosure Honoraria Supplementation of Salary Seeking Other Employment Post-Employment Advisory Letters, Memoranda and Formal Opinions
Foreign Threats to Protected Information Who's Doing What to Whom? Overview The Insider Espionage Threat Economic & Industrial Espionage Illegal Technology Transfer Cyber Espionage One Country's Program to Obtain U.S. S&T Secrets Militarily Critical Technologies List Economic Espionage Act of 1996 How Do I Know When I'm Being Targeted and Assessed Introduction Road to Recruitment Who Is Most Likely to Be Targeted? Getting Information Out of Honest People Like Me Methods of Operation Unsolicited Direct Requests Short-Term Foreign Visitors Long-Term Foreign Visitors Front Companies False Pretenses Elicitation Collection from Open Sources Theft and "Dumpster Diving" American Travelers Abroad Risks During Foreign Travel You Are the Target Country-Specific Threat Updates Security & Safety Recommendations Avoiding/Recognizing Intelligence Interest Contact with Foreign Relatives Theft While Traveling Overseas Communications Bugging Hotel Rooms Reporting Security Incidents What to Do If Arrested Antiterrorism and Force Protection Introduction Traveling Outside the United States Living Outside the United States Defensive Driving Overseas Package and Letter Bombs Kidnapping & Hostage Survival Guidelines Hijacking Survival Guidelines Captured Military Personnel Guidelines Computer and Other Technical Vulnerabilities Computer Vulnerabilities Overview Secure Use of Office Network Secure Use of Personal Computer Secure Use of Portable Devices User Authentication and Passwords Email Pitfalls Malware and Email Scams Social Networking and Peer-to-Peer Social Engineering Social Engineering Case 1 Social Engineering Case 2 Insider Threat to IT Security Protecting Laptops and Other Portable Devices Disposal of Digital Storage Devices Intercepting Your Communications Overview Standard Telephones Mobile Phones Cordless Phones Voice Mail Fax Machines Other Common Wireless Devices Bugs and Other Eavesdropping Devices Overview of the Threat Eavesdropping Methods Detecting and Preventing Eavesdropping Emissions Security (TEMPEST) Understanding and Helping With Personal Problems Employee Assistance Alcohol Abuse and Dependence Compulsive Gambling Depression Domestic Abuse Drug Use Eating Disorders Financial Problems Sexual Addiction Coping with Stress Suicide Crisis Intervention Espionage 101
Who's Doing What to Whom?
Overview The Insider Espionage Threat Economic & Industrial Espionage Illegal Technology Transfer Cyber Espionage One Country's Program to Obtain U.S. S&T Secrets Militarily Critical Technologies List Economic Espionage Act of 1996
How Do I Know When I'm Being Targeted and Assessed
Introduction Road to Recruitment Who Is Most Likely to Be Targeted?
Getting Information Out of Honest People Like Me
Methods of Operation Unsolicited Direct Requests Short-Term Foreign Visitors Long-Term Foreign Visitors Front Companies False Pretenses Elicitation Collection from Open Sources Theft and "Dumpster Diving" American Travelers Abroad
Risks During Foreign Travel
You Are the Target Country-Specific Threat Updates Security & Safety Recommendations Avoiding/Recognizing Intelligence Interest Contact with Foreign Relatives Theft While Traveling Overseas Communications Bugging Hotel Rooms Reporting Security Incidents What to Do If Arrested
Antiterrorism and Force Protection
Introduction Traveling Outside the United States Living Outside the United States Defensive Driving Overseas Package and Letter Bombs Kidnapping & Hostage Survival Guidelines Hijacking Survival Guidelines Captured Military Personnel Guidelines
Computer and Other Technical Vulnerabilities
Computer Vulnerabilities
Overview Secure Use of Office Network Secure Use of Personal Computer Secure Use of Portable Devices User Authentication and Passwords Email Pitfalls Malware and Email Scams Social Networking and Peer-to-Peer Social Engineering Social Engineering Case 1 Social Engineering Case 2 Insider Threat to IT Security Protecting Laptops and Other Portable Devices Disposal of Digital Storage Devices
Intercepting Your Communications
Overview Standard Telephones Mobile Phones Cordless Phones Voice Mail Fax Machines Other Common Wireless Devices
Bugs and Other Eavesdropping Devices
Overview of the Threat Eavesdropping Methods Detecting and Preventing Eavesdropping Emissions Security (TEMPEST)
Understanding and Helping With Personal Problems
Employee Assistance
Alcohol Abuse and Dependence Compulsive Gambling Depression Domestic Abuse Drug Use Eating Disorders Financial Problems Sexual Addiction Coping with Stress Suicide Crisis Intervention
Short Course in Counterintelligence
Overview How Spies Are Caught Reportable Espionage Indicators Cyber Espionage Opportunities and Motivation for Espionage Are Increasing Behavior Patterns Associated with Espionage One Country's Program to Obtain S&T Secrets Hot Line Numbers
True Spy Stories
Learning from Experience People Who Made a Difference American Travelers Abroad Ames: Too Many Weaknesses Espionage Killed the Company Hamilton Tried to Prevent a War Hanssen: Deep Inner Conflicts Lalas: Something Wasn't Right Lipka: No Statute of Limitations Montes Was Unrepentant Morison: Consulting Led to Espionage Myers: How Could This Happen Pollard: Grandiose Imagination Ramsay Recruited Drug Users Walker Was "Intrinsically Evil"
Terrorism 101
Introduction to Terrorism The Militant Jihadist Terrorist Threat Homegrown Jihadi Terrorists The Radicalization Process Avoid the Muslim Stereotypes Other Violent Extremist Movements Reporting Terrorist Indicators Lessons from Ali Mohamed Case Lessons from Other Cases Hotline Numbers
HOME IINFORMATION | CONDUCT | THREATS | TECH VULNERABILITY | ASSISTANCE ESPIONAGE 101 | TERRORISM 101