List of Contents
Procedures For Protecting Information
Protecting Classified Information
Overview
Need-to-Know
Handling Classified Information
Classification Procedures
Marking Classified Information
Mailing & Carrying
Classified Materials
Foreign Government
Classified Information
Security
Violations
Using the SIPRNET
Using the STU-III
Appropriate Use of Computer
Systems
Emergency Authority
Glossary of Definitions
Protecting
Sensitive Unclassified Information
Overview
Need-to-Know
Appropriate Use of Computer
Systems
Freedom of Information Act
Operations Security (OPSEC)
Pre-Publication Review of Web
Site Content
For Official Use Only & Similar
Designations
DoD Technical Data
Privacy Act Information
Export-Controlled Information
Source Selection Data
Sensitive Security
Information
Protected Critical
Infrastructure Information
Unclassified Controlled
Nuclear Information
Proprietary Information
& Trade Secrets
Personal Conduct and Reporting Requirements
What Is Expected of Me?
Introduction
Behaviors of Security Concern
Reporting Personal
Activities
Reporting Foreign
Contacts
Reporting Outside
Activities
Reporting Foreign Intelligence
Activity
Reporting
"Anomalies"
Pre-Publication Review
Reporting Improper,
Unreliable, or Suspicious Behavior
Reporting
Responsibilities
Counterintelligence Indicators
Counterterrorism
Indicators
Security and
Suitability Issues
Preventing
Violence
No Good Excuses for Not
Reporting
People Who Made a Difference
Hotline Numbers
U.S. Government Ethics Standards
Introduction
Gifts from Outside
Sources
Gifts Between Employees
Conflicting Financial
Interests
Frequent Flyer Benefits and
Bumping
Impartiality in Performing
Duties
Misuse of Position
Representation to
Government Agencies
Outside Activities
Financial
Disclosure
Honoraria
Supplementation of
Salary
Seeking Other
Employment
Post-Employment
Advisory Letters,
Memoranda and Formal Opinions
Foreign Threats to Protected Information
Who's Doing What to Whom?
Overview
Economic & Industrial Espionage
Illegal Technology
Transfer
Computer Attacks
National Security Threat List
Militarily Critical Technologies
List
Economic Espionage Act of 1996
One Country's Program to
Obtain U.S. S&T Secrets
How Do
I Know When I'm Being Targeted and Assessed?
Introduction
Road to Recruitment
Who Is Most Likely to Be
Targeted?
Getting Information Out of Honest People
Like Me
Methods of Operation
Unsolicited Direct Requests
Short-Term Foreign Visitors
Long-Term Foreign Visitors
American Travelers Abroad
Collection from Open Sources
Elicitation
False Pretenses
Theft and "Dumpster Diving"
Risks During Foreign Travel
You Are the Target
Country-Specific Threat Updates
Security & Safety
Recommendations
Avoiding/Recognizing
Intelligence Interest
Contact with Foreign
Relatives
Theft While Traveling
Overseas Communications
Bugging Hotel Rooms
Reporting Security
Incidents
What to Do If Arrested
Antiterrorism and Force Protection
Introduction
Traveling Outside the U.S.
Living Outside the U.S.
Defensive Driving Overseas
Package and Letter Bombs
Kidnapping & Hostage Survival
Guidelines
Hijacking Survival Guidelines
DOD Code of Conduct
Computer and Other Technical
Vulnerabilities
Computer Vulnerabilities
Overview
Threats to Computer Systems
Secure Use of Computer Systems
How Hackers Work
Case 1
Case 2
How We Make It Easy for the
Hackers
Weak Passwords
"Social Engineering"
Network Security
Using the Internet Securely
"Cookies"
E-Mail Pitfalls
Viruses and Other "Infections"
Security of Hard Drives
Security of Laptops
Intercepting Your
Communications
Overview &
Countermeasures
Telephones
Fax Machines
Cellular Phones
Cordless Phones
Answering Machines
Voice Mail
Intercoms & Baby Monitors
Bugs and Other Eavesdropping Devices
Overview of the Threat
Eavesdropping Methods
Detecting and Preventing
Eavesdropping
Understanding and Helping
With Personal Problems
Employee Assistance
Alcohol Abuse and Dependence
Compulsive Gambling
Depression
Domestic Abuse
Drug Use
Eating Disorders
Financial Problems
Sexual Addiction
Stress
Suicide Crisis Intervention
True Spy Stories
Learning
from Experience
You Can Make a Difference
American Travelers Abroad
Ames: Too Many Weaknesses
Cavanagh Wanted to Be Wealthy
Charlton:
Disgruntled Engineer
Consulting Led to Espionage
Espionage Killed the Company
Hamilton Tried to Prevent a War
Hacking
Computers from Overseas
Hanssen: Deep Inner Conflicts
Illegal
Export of Poison Gas
Lalas:
Something Wasn't Right
Lipka:
No Statute of Limitations
Notable Industrial Security Cases
Pollard: Grandiose Imagination
Ramsay
Recruited Drug Users
Walker Was "Intrinsically
Evil"
Voice Mail Is Vulnerable
Treason
101
Overview
How Spies Are Caught
The Insider Espionage Threat
One Country's Program to
Obtain U.S. S&T Secrets
The Insider Threat to Information Systems
Exploring the Mind of the Spy
Espionage by the Numbers
|