Feb 20 - Security Education Training and Awareness
Feb 20 - Security Education Training and Awareness
Lance C. Guedry
Antiterrorism / Physical Security Specialist
Benjamin L. Delatte
Personnel Security Specialist
UNCLASSIFIED
SECURITY EDUCATION, TRAINING AND AWARENESS
2
TRAINING (SETA)
What is SETA Training
• SETA is an education and awareness program that provides the USACE workforce
with the knowledge and practices necessary to effectively protect themselves, our
information and assets.
• The SETA program falls under the G2/National Security Programs managed by
Security Offices throughout the Corps.
• SETA training is mandated in Army Regulation 380-5, The Army Information Security
Program, and is usually accomplished through multiple online and in-person
trainings throughout any given year.
• It applies to personnel WITH and WITHOUT clearances, and includes daily security
practices that, when properly executed by the workforce, increase our protective
posture and enables us to securely complete our missions.
UNCLASSIFIED
3
Foreign Travel
UNCLASSIFIED
4
The Personnel Security Program: This program provides security policies and
procedures; establishes standards, criteria, and guidelines for personnel security
determinations and overall program management responsibilities.
Position Designations
Special-sensitive: Access to Sensitive Compartmented Information (SCI)/Top
Secret (TS) or Special Access Program (SAP). Potential for inestimable damage to
National Security.
Critical-sensitive: Access to Top Secret (TS). Potential for exceptionally grave
damage to National Security.
Noncritical-Sensitive: Access to Secret or Confidential. Potential for significant or
serious damage to National Security.
Non-sensitive: No Clearance or other sensitive
UNCLASSIFIED
5
UNCLASSIFIED
6
Self Reporting
Reporting does not automatically result in revocation of eligibility, so don’t be afraid to report!
UNCLASSIFIED
7
INFORMATION SECURITY
LEVELS OF CLASSIFIED INFORMATION
Information Security: a system of policies, procedures, and requirements established to protect
classified and controlled unclassified information (CUI) that, if subjected to unauthorized
disclosure, could reasonably be expected to cause damage to National Security.
Top Secret: Could cause exceptionally grave damage to national security (SF703)
INFORMATION SECURITY
ORIGINAL CLASSIFICATION
ORIGINAL CLASSIFICATION: The initial decision that an item of information could reasonably be
expected to cause identifiable or describable damage to the national security if subjected to
unauthorized disclosure and requires protection in the interest of national security.
• Information may be originally classified only by the Secretary of Defense, the Secretaries of the Military
Departments, and other officials to whom they delegate this authority in writing.
• Delegation of OCA shall be limited to the minimum number of officials required for effective operation
of the Department of Defense.
• The authority shall be delegated to, and retained by, only those officials who have a demonstrable and
continuing need to exercise it.
UNCLASSIFIED
9
INFORMATION SECURITY
DERIVATIVE CLASSIFICATION
UNCLASSIFIED
10
Classification
Markings
are for Training
Purposes Only
UNCLASSIFIED
11
INFORMATION SECURITY
PROCESSING CLASSIFIED INFORMATION
Rules for Processing Information: Use systems accredited or authorized to process information
at the appropriate level.
Do Not
• Install Software without approval
• Use another person’s username and password
• Allow an unauthorized person to use your computer
• Circumvent or defeat security systems
• Permit unauthorized access to any sensitive computer network
• Modify or alter operating system configuration
• Write down your password
UNCLASSIFIED
12
INFORMATION SECURITY
CONTROLLED UNCLASSIFIED INFORMATION (CUI)
UNCLASSIFIED
13
• Cover sheet required; opaque envelope • Address packages that contain CUI only to a
• Mark highest classification level SPECIFIC RECIPIENT
• Wrap and tape envelope • DO NOT put CUI Markings on the outside of an
• Address properly envelope or package for mailing/shipping.
• Complete a document receipt • Use in-transit automated tracking and
• Mitigate tampering accountability tools where possible.
UNCLASSIFIED
15
• U.S. Postal Service certified mail, parcel post, or fourth class mail
• Approved secure communications systems (Encrypted e-mail with appropriate markings)
• Facsimile if appropriate protection is available at receiving location (FOUO/PII Cover Letters)
UNCLASSIFIED
16
UNCLASSIFIED
17
INFORMATION SECURITY
UNCLASSIFIED
18
Infraction
• No loss or compromise of information.
Violation
• Loss – material cannot be accounted for or physically located.
• Compromise– material disclosed to an unauthorized person.
• Negligent Discharge of Classified Information (NDCI) - occurs when data is placed on
an IT system with insufficient controls at the required classification level.
UNCLASSIFIED
19
Sanctions include:
UNCLASSIFIED
20
INDUSTRIAL SECURITY
Check with your security office for information on verifying contractor employee clearance
eligibility and need to know.
UNCLASSIFIED
21
Insider Threat: A person with placement and access who intentionally causes loss or
degradation of resources or capabilities or compromises the ability of an organization
to accomplish its mission through espionage, providing support to international
terrorism, or the unauthorized release or disclosure of information about the plans
and intentions of U.S. military forces.
INSIDER
Intentional Unintentional
THREAT
UNCLASSIFIED
23
PHYSICAL SECURITY
Physical Security: Active and passive measures to prevent unauthorized access to personnel,
equipment, installations, and information, in order to safeguard them against espionage,
sabotage, terrorism, damage, and criminal activity.
Controlled Areas
• PS Countermeasures apply to all controlled areas.
• All USACE Administrative Office areas are “Controlled Areas”.
• District policy may exclude some areas such as visitor centers or field offices.
UNCLASSIFIED
24
PHYSICAL SECURITY
Escort Requirements
• Ensure access to controlled areas by non-cleared personnel is minimal.
• Only DoD civilians, cleared contractors and military personnel are authorized to escort non-
cleared personnel.
• Ensure visit requests are submitted to the Security Office for uncleared visitors, especially
when visiting restricted areas.
• Ensure all visitors sign the Visitor Log upon entry.
• Escorts must remain with escorted personnel at all times.
• Check with your local security office for specific escort procedures.
UNCLASSIFIED
25
OPSEC: Is the Army’s process for identifying and mitigating risk to our operations by looking at
those operations through the eyes of our adversaries’ intel gathering ability. OPSEC
considerations must be factored into production, use, storage and destruction of our protected
information; Controlled Unclassified Information (CUI) and For Official Use Only (FOUO).
UNCLASSIFIED
26
UNCLASSIFIED
27
USACE
CIL
MVD
CIL
UNCLASSIFIED
29
UNCLASSIFIED
30
OPERATIONS SECURITY
SOCIAL NETWORKING SITES
• Social networking sites (SNSs), like Facebook® and Twitter®, are great ways to connect with
people, share information, and market products and services. However, these sites can also
provide adversaries, such as terrorists, spies and criminals, with the critical information they
need to disrupt your mission and harm you, your co-workers, or even your family members.
• The more information adversaries can obtain, the more opportunities they have to cause
damage at your expense. Practicing good operations security (OPSEC) will minimize the risks
that come from participating in SNSs, and help you to recognize and protect your critical
information..
UNCLASSIFIED
31
Never login from risky locations: Public SNSs generally do NOT have Don’t trust add-ons: Plugins, games, and applications are often
secure login available (HTTPS with the lock icon). If you login from a written by other users, not the SNSs themselves. The authors can
hotel, cyber-café, or airport hotspot, particularly ones in foreign easily gain access to your data once you install them.
countries, your name and password can be captured at any time.
Don’t post critical information: If you don’t want it public, don’t
Keep your password secure: Use different, strong passwords for each post it. Search engines and functions make it easy for adversaries to
online account. Never give your password away. find what they’re interested in. Once information is on the Internet,
it is there forever.
Modify your search profile: Do a search for yourself and if too much
data comes up, go to your settings and restrict your search profile. Review your friends’ profiles: The photos or information they post
about you may be a problem.
Don’t depend on the SNS for confidentiality: Even SNSs that aren’t
open and public by design can become so due to hacking, security Control “friend” access: Verify a “friend” request by phone or other
errors, poor data management practices, and data brokering. In some means before allowing access. Group “friends” (e.g., real life, co-
cases, the site terms of service explicitly claim ownership of all your workers, strangers, etc.) and control access permissions based on
posted content. the groups.
UNCLASSIFIED
32
UNCLASSIFIED
33
ANTITERRORISM
FORCE PROTECTION CONDITIONS (FPCONS)
The DoD FPCON System describes the progressive level of protective measures that are implemented by all the
DoD Components in anticipation of or in response to a terrorist threat or attack. This system is the principal
means through which commanders apply an operational decision on how to best guard against the terrorist
threat and reduce the risks of terrorist attacks and other security threats to DoD personnel, units and activities.
FPCON NORMAL: Applies at all times as a general threat of terrorist attacks, hostile acts, or other security threats
always exists in the world.
FPCON ALPHA: Applies to a non-specific threat of a terrorist attack or hostile act directed against DOD elements
and personnel.
FPCON BRAVO: Applies when an increased or more predictable threat of a terrorist attack or hostile act exists
and is directed against DOD elements and personnel.
FPCON CHARLIE: Applies when a terrorist or hostile act incident occurs within the commander’s area of interest,
or intelligence is received indicating a hostile act or some form of terrorist action or targeting against DOD
elements, personnel, or facilities is likely.
FPCON DELTA: Applies when a terrorist attack or hostile act has occurred or is anticipated against specific
installations or operating areas.
UNCLASSIFIED
ANTITERRORISM 34
TARP: Is a program that allows personnel to report any incident of known or suspected
espionage, international terrorism, sabotage, subversion, theft or diversion or military
technology, information systems, intrusions, and unauthorized disclosure of classified
information (Confidential, SECRET, TOP SECRET). This Program is geared more towards the
Insider Threat.
UNCLASSIFIED
35
ANTITERRORISM
UNCLASSIFIED
36
Copy and place the below link in your internet browser to view the Department of Homeland
Security Active Shooter Video (Run, Hide, Fight) and complete active shooter training.
https://www.bing.com/videos/search?q=https%3a%2f
%2fwww.youtube.com%2fwatch%3fv
%3d5VcSwejU2D0%26feature
%3dyoutu.be&&view=detail&mid=20D7A79E108D495537
D320D7A79E108D495537D3&&FORM=VRDGAR&ru=
%2Fvideos%2Fsearch%3Fq%3Dhttps%253A%252F
%252Fwww.youtube.com%252Fwatch%253Fv
%253D5VcSwejU2D0%2526feature%253Dyoutu.be
%26go%3DSearch%26qs%3Dds%26form%3DQBVDMH
UNCLASSIFIED
37
• Official Foreign Travel by MVD Employees is a CCIR and requires the below actions led by your
Security Officer.
• Obtain defensive foreign travel security briefing prior to travel or at least once a year.
• Obtain country specific briefing from the Counterintelligence Officer (if required).
• Current Antiterrorism/Force Protection Level 1 training.
• Contact nearest U.S. Consulate, Defense Attaché, Embassy Regional Security Officer, or Post
Duty Officer if detained or subjected to harassment or provocation.
• Be debriefed on return by a Counterintelligence Officer (if required).
UNCLASSIFIED
38
A Foreign Travel Brief is Required for all personnel with a security clearance prior to departing
on Unofficial Foreign Travel - See your Security Officer.
• It is recommended that USACE employees traveling for leisure or unofficially contact their
local security officer for a foreign travel brief.
• Foreign Travel Briefs may be given to spouses and other family members traveling with our
employees.
UNCLASSIFIED
39
ANY QUESTIONS?
UNCLASSIFIED