Goals for Security Education
The principal goal of this program is to make security education
information more readily available in more convenient form. Employees can use this Guide to
quickly look up whatever security information they need or want, whenever
they need or want it, in the privacy of their own office. Security professionals can use the
Guide as an aid in preparing briefings or as a source of articles for
newsletters.
The advantage of the Guide, as compared with a conventional briefing, is
that it makes more comprehensive information available at the employees'
fingertips on demand. However,
information is useful only if the employees actually look at it and use it. This places an obligation upon us, as
security educators, to: 1) Make the Guide so useful, interesting, and easy to
use that employees will want to use it; and 2) Promote the Guide so that
employees will know where to find it and remember to use it.
The Guide supplements, but does not replace, the customary face-to-face
briefings. Both approaches are
needed for an effective security education program. The advantage of the face-to-face
briefing is that it offers an opportunity for personal contact and discussion. Also, one can document that an
employee has been exposed to a briefing and can, therefore, be held
accountable for compliance.
Security education programs for trusted employees generally cover three
main subject areas:
- Understanding of and
compliance with security rules and regulations.
- Understanding the
magnitude and complexity of the foreign threats that make these rules
and regulations necessary.
- Understanding the
nature of the insider threat and how to mitigate it.
This Guide places greater emphasis on insider threat issues and technical
vulnerabilities than many other security education programs. Insider betrayal and technical
penetration are generally believed to be the two principal sources of
compromise of protected information.
As used here, technical vulnerability includes the interception of
telecommunications, penetration and hacking of automated information systems,
and electronic eavesdropping.
All these threats have one thing in common. They can be countered or mitigated by
well-trained and motivated personnel who know how to protect sensitive
information and take appropriate precautions when they find themselves in a
higher-threat situation.
Goals for each of the three general subject areas are identified below,
along with links to the elements of this guide that contribute to each goal.
Understanding and Compliance
With Security Rules and Regulations
Improve compliance with the rules and regulations for protection
of classified or sensitive-but-unclassified information.
Improve understanding of and compliance with requirements for
personnel to report certain aspects of their own activities.
Understanding Threats
To Protected Information
Increase understanding of how intelligence collectors work.
- Topics under the
general heading of Getting
Information Out of Honest People Like Me discuss the whole gamut of
approaches for obtaining information by means other than recruitment of
agents. These topics help
employees recognize situations that create vulnerabilities and provide
information on countermeasures that individuals and organizations can
and should take.
Increase understanding of where the threat is coming from.
- The diversity of the
threat is summarized in the introduction to Who's Doing What to Whom. The Guide does not discuss
specific countries conducting intelligence operations against the United States,
as this is not considered appropriate for broad, unclassified
distribution.
Increase understanding of types of information that foreign
collectors are seeking.
Motivate employees to maintain better communications security,
computer security, and security from eavesdropping.
- Computer and Other Technical
Vulnerabilities has modules covering communications intercept,
computer security, and bugs and mikes. Providing a basic, non-technical
understanding of how these technical operations work makes it easier for
people to imagine how vulnerable they really are.
Mitigating the Insider Threat
Deal more effectively with the personal problems that sometimes
lead to wrongdoing.
- When destructive
behavior occurs in the workplace, investigators commonly find a
situation in which a troubled employee felt boxed in. The employee acted out of a sense
of desperation or a feeling that there was no other way out. Understanding and
Helping with Personal Problems provides information on common
personal problems and encourages the use of available counseling
programs. Timely counseling
can help prevent personal problems from becoming security problems.
Discourage betrayal by deglamorizing espionage and emphasizing the
likelihood of getting caught and punished.
- How Spies Are Caught
is intended to catch the attention of anyone who might be contemplating
espionage.
- The Spy Stories are
intended to convey useful lessons.
For example, the Lipka
case is about a man who was arrested 22 years after he stopped
spying for the Soviets. It
points out that there is no statute of limitations on espionage, which
is an important message.
Help detect wrongdoing by encouraging employee reporting and by
providing specific direction on what employees are expected to report.
Promote a better understanding of the factors that lead to insider
betrayal.
|