List of Contents

Procedures for Protecting Information

Protecting Classified Information

  Overview
  Need-to-Know
  Classification Procedures
  Marking Classified Information
  Handling Classified Information
  Mailing & Carrying Classified Materials
  Foreign Government Classified Information
  Security Violations
  Secure Use of Office Network
  Using the SIPRNet
  State, Local, Tribal & Public Sector
  Emergency Authority

Protecting Controlled Unclassified Information

  Changes Are in Process
  CUI in Defense Industry
  For Official Use Only & Similar Designations
  Personally Identifying Information
  Export-Controlled Information
  Proprietary Information and Trade Secrets
  DoD Technical Data
  Source Selection Data
  Unclassified Controlled Nuclear Information
  Sensitive Security Information
  Protected Critical Infrastructure Information
  Operations Security (OPSEC)
  Freedom of Information Act
  Security Criteria for Website Content

Personal Conduct and Reporting Requirements

Reporting Improper, Unreliable, or Suspicious Behavior

  Reporting Responsibilities
  Reporting Espionage Indicators
  Reporting Computer Violations
  Reporting "Anomalies"
  Security and Suitability Issues
  Preventing Violence
  No Good Excuses for Not Reporting
  You Can Make a Difference
  Hotline Numbers

Self-Reporting Your Activities

  Introduction
  Self-Reporting - General
  Reporting Foreign Contacts
  Reporting Outside Activities
  Pre-Publication Review

U.S. Government Ethics Standards

  Introduction
  Gifts from Outside Sources
  Gifts Between Employees
  Conflicting Financial Interests
  Frequent Flyer Benefits and Bumping
  Impartiality in Performing Duties
  Misuse of Position
  Representation to Government Agencies
  Outside Activities
  Financial Disclosure
  Honoraria
  Supplementation of Salary
  Seeking Other Employment
  Post-Employment
  Advisory Letters, Memoranda and Formal Opinions

Foreign Threats to Protected Information

Who's Doing What to Whom?

  Overview
  The Insider Espionage Threat
  Economic & Industrial Espionage
  Illegal Technology Transfer
  Cyber Espionage
  One Country's Program to Obtain U.S. S&T Secrets
  Militarily Critical Technologies List
  Economic Espionage Act of 1996

How Do I Know When I'm Being Targeted and Assessed

  Introduction
  Road to Recruitment
  Who Is Most Likely to Be Targeted?

Getting Information Out of Honest People Like Me

  Methods of Operation
  Unsolicited Direct Requests
  Short-Term Foreign Visitors
  Long-Term Foreign Visitors
  Front Companies
  False Pretenses
  Elicitation
  Collection from Open Sources
  Theft and "Dumpster Diving"
  American Travelers Abroad

Risks During Foreign Travel

  You Are the Target
  Country-Specific Threat Updates
  Security & Safety Recommendations
  Avoiding/Recognizing Intelligence Interest
  Contact with Foreign Relatives
  Theft While Traveling
  Overseas Communications
  Bugging Hotel Rooms
  Reporting Security Incidents
  What to Do If Arrested

Antiterrorism and Force Protection

  Introduction
  Traveling Outside the United States
  Living Outside the United States
  Defensive Driving Overseas
  Package and Letter Bombs
  Kidnapping & Hostage Survival Guidelines
  Hijacking Survival Guidelines
  Captured Military Personnel Guidelines

Computer and Other Technical Vulnerabilities

Computer Vulnerabilities

  Overview
  Secure Use of Office Network
  Secure Use of Personal Computer
  Secure Use of Portable Devices
  User Authentication and Passwords
  Email Pitfalls
  Malware and Email Scams
  Social Networking and Peer-to-Peer
  Social Engineering
    Social Engineering Case 1
    Social Engineering Case 2
  Insider Threat to IT Security
  Protecting Laptops and Other Portable Devices
  Disposal of Digital Storage Devices

Intercepting Your Communications

  Overview
  Standard Telephones
  Mobile Phones
  Cordless Phones
  Voice Mail
  Fax Machines
  Other Common Wireless Devices

Bugs and Other Eavesdropping Devices

  Overview of the Threat
  Eavesdropping Methods
  Detecting and Preventing Eavesdropping
  Emissions Security (TEMPEST)

Understanding and Helping
With Personal Problems

Employee Assistance

  Alcohol Abuse and Dependence
  Compulsive Gambling
  Depression
  Domestic Abuse
  Drug Use  
  Eating Disorders
  Financial Problems
  Sexual Addiction
  Coping with Stress
  Suicide Crisis Intervention

Espionage 101

Short Course in Counterintelligence

  Overview
  How Spies Are Caught
  Reportable Espionage Indicators
  Cyber Espionage
  Opportunities and Motivation for Espionage Are Increasing
  Behavior Patterns Associated with Espionage
  One Country's Program to Obtain S&T Secrets
  Hot Line Numbers

True Spy Stories

  Learning from Experience
  People Who Made a Difference
  American Travelers Abroad
  Ames: Too Many Weaknesses
  Espionage Killed the Company
  Hamilton Tried to Prevent a War
  Hanssen: Deep Inner Conflicts
  Lalas: Something Wasn't Right
  Lipka: No Statute of Limitations
  Montes Was Unrepentant
  Morison: Consulting Led to Espionage
  Myers: How Could This Happen
  Pollard: Grandiose Imagination
  Ramsay Recruited Drug Users
  Walker Was "Intrinsically Evil"

Terrorism 101

  Introduction to Terrorism
  The Militant Jihadist Terrorist Threat
  Homegrown Jihadi Terrorists
  The Radicalization Process
  Avoid the Muslim Stereotypes
  Other Violent Extremist Movements
  Reporting Terrorist Indicators
  Lessons from Ali Mohamed Case
  Lessons from Other Cases
  Hotline Numbers

HOME
IINFORMATIONCONDUCT | THREATS | TECH VULNERABILITYASSISTANCE
ESPIONAGE 101  | TERRORISM 101