Threat Awareness
Defense Security Brief
Security Classification
Reporting Requirements
Security Procedures & Duties
100

Any person with authorized access to any government or contract resource to include personnel, facilities, information, equipment, networks, or systems.  This can include employees, former employees, consultants, and anyone with access.

What is an Insider?

100

The gathering of information by Intelligence Agents and Officers.

What is ˜the Foreign Intelligence Threat?

100

Classification levels that are applied to information that, if subject to unauthorized disclosure, could reasonably be expected to cause damage, serious damage, or exceptionally grave damage to national security.

What are Confidential, Secret, and Top Secret?

100

Alcohol related issues, computer/AIS systems misuse, criminal conduct, drug use, financial concerns, foreign contacts, foreign travel, improper security practices.




What are General Reporting Requirements?

100

The authorized person must have been granted a Personnel Security Clearance (PCL) at the required level and have a need-to-know the classified information in the performance of official duties.

What are the key requirements for a classified visit in the NISP?

200

Uses access to wittingly or unwittingly
do harm to the security of the
United States. This includes
damage to the United States
through espionage, terrorism,
unauthorized disclosure of
national security information,
or the loss or degradation
of government, company,
contract or program information,
resources, or capabilities.

What is an Insider Threat?

200

Requests for Information, Academic Solicitation, Suspicious Network Activity, Targeting at conferences, conventions, and trade shows, Solicitation and Marketing/Seeking Employment, Foreign Visits ,Elicitation and Recruitment.

What are Foreign Intelligence Collections methods?

200

1. An initial determination made only by U.S. Government officials.

2. The responsibility of contractors or Government employees who incorporate, restate, or generate in new form, information which is already classified by the U.S. Government

What are:

1. Original Classification

2. Derivative Classification?

200

•Information that negatively reflects the integrity or character of a cleared employee.
•Information that suggests one’s ability to safeguard classified information may be impaired.
•Information that indicates one’s access to classified information clearly may not be in the best interest of national security.

What is Adverse Information?

200

A security incident that is not reasonably expected to result in an unauthorized disclosure of classified information.

What is a Security Infraction?

300

• Depression
• Stress in personal life
• Exploitable behavior traits:
– Use of alcohol or drugs
– Gambling
• Financial trouble
• Prior disciplinary issues

What are Insider Threat Behavioral Indicators?

300

A person who secretly collects and reports information on the activities, movements, and plans of an enemy or competitor.

What is a Spy?

300

Access to the information must be necessary for one to conduct one's official duties.

What is Need to Know?

300

Efforts by any individual, regardless of nationality, to obtain illegal or unauthorized access to classified information or to compromise a cleared employee.

What are Suspicious Contacts?

300

A failure to properly safeguard classified material that results in the actual or probable compromise of the material.

What is a Security Violation?

400

• Repeated security violations and a general
disregard for security rules
• Failure to report overseas travel or contact
with foreign nationals when required to do so
• Seeking to gain higher clearance or
expand access outside the job scope
without bona fide need for the access
• Engaging in classified conversations without
a need to know
• Attempting to enter areas not granted
access to
• Working hours inconsistent with job
assignment or unusual insistence on
working in private
• Accessing information not needed for job

What are Potential Espionage Indicators (PEI)?

400

Foreign Contacts (unreported or attempts to conceal), Foreign Preference or Allegiance, Suspicious Foreign Travel (FTVL), Security Violations, Financial Concerns, Negative Polygraph, Employment Behaviors, Exploitable Personal Conduct

What are Potential Espionage Indicators (PEI)?

400

It details how information will be classified and marked on an acquisition program. It’s the written record of an original classification decision or series of decisions regarding a system, plan, program, or project.

What is the Security Classification Guide (SCG)?

400

Your pathway to reporting Fraud, Waste, & Abuse.

What is the DoD Hotline?

400

Ensure all information systems are shut-down, or password protected and locked; ensure all classified material is properly stored and protected; ensure all storage containers and closed areas are properly secured and alarmed.

What is the End-of-day Security Check procedure?

500

• Keeping classified materials in an
unauthorized location (e.g., at home)
• Attempting to access classified
information without authorization
• Obtaining access to sensitive
information inconsistent with present
duty requirements
• Questionable downloads
• Unauthorized use of removable
media
• Using an unclassified medium to
transmit classified materials
• Discussing classified materials on
a non-secure telephone or in non-secure
emails or text messages
• Removing the classification markings
from documents
• Unnecessary copying of classified
material
• Expressing loyalty to another country
• Concealing reportable foreign travel
or contact

What are Reportable Behaviors?

500

All forms and types of financial, business, scientific, technical, economic or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically or in writing, which the owner has taken reasonable measures to protect; and has an independent economic value; forms and types of financial, business, scientific, technical, economic or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically or in writing, which the owner has taken reasonable measures to protect; and has an independent economic value.

What are Trade Secrets (proprietary information)?

500

This is sensitive information throughout the Executive branch that requires safeguarding and/or
dissemination controls pursuant to and
consistent with law, regulations, and
Government-wide policies, excluding
information that is classified under Executive
Order.

What is Controlled Unclassified Information (CUI)?

500

When determining a candidate’s eligibility for access to classified information, determination should be based on these guidelines and the corresponding disqualifying and mitigating conditions.

What are the 13 Adjudicative Guidelines?


**DAILY DOUBLE**

500

Corrective actions for Security Violations occurring as a result of an employee's action or lack of action.  The procedure which depends upon severity and mitigating factors may include counseling, remedial action, personnel file memorandum, or termination.

What is a graduated scale of disciplinary action?