Monday, February 27, 2012

8 Benefits of Studying for ISP Certification

Leaders at all levels can promote a better security environment and professionalism. Whether full time employees devoted to protecting national security or a VP of contracting, leaders set goals for their employees. Part of those goals should help help understand how to create incredible security programs. Focusing on training, interaction with other cleared employees, self-improvement and institutional education should be part of professional development.

Those who write security evaluations for direct reports create goals to challenge them to become better at their jobs, more impactful in their careers and hopefully, groomed to become leaders themselves. Challenging employees and team members to achieve personal and professional goals breeds success.

The ISP Certification is one goal FSO's could take as a goal as well as encourage other employees to achieve for several reasons.

1. The employee gains from such education and a prestigious career milestone.
2. The defense contractor benefits from what the security employee learns and applies on the job.
3. When employees study for the ISP Certification, they learn: how to read and apply the NISPOM, the importance of forming professional relationships with cleared employees, how the cleared contractor and the DSS representatives interact, and much more.
4.  Organizations improve as employee become more impacting in their career.
5. Studying for certification builds teams. The path to the ISP Certification goals should not be taken alone. When employees are challenged with the goal, the leader provides resources for education and allows opportunities for NISPOM training and study as found on the DSS, professional organization or vendor websites. Studies on NISPOM topics are available on the internet as well as on site. If your team is large enough, consider helping them start a study group.
6. Focused and purposeful study facilitates cross training in large security staffs. Security employees who work personnel security issues could work with document control and etc.
7. Annual security self inspections improve as those studying for certification learn by performance.
8. Certification study can form basis for internal skill certification or competency metrics. This helps integrate new employees into their jobs and train an employee on performing individual tasks. The employee works under a mentor who verifies and documents the training.

ISP Certification training encourages cleared contractor facility security employees to study and put into practice knowledge on document control, manage personnel security, provide classified contract support and etc. If such a program exists in your organization, consider using it for further cross training employees who concentrate only on one task. This will help them become more experienced and more prepared for the exam.



Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM

Tuesday, February 21, 2012

Acronyms FSOs and Security Specialists Should be Familiar With

Acronyms
BL Bill of Lading
CAGE Commercial and Government Entity
CIA Central Intelligence Agency
CM Configuration Management
COMSEC Communications Security
CSA Cognizant Security Agency
CSO Cognizant Security Office
DAA Designated Accrediting/Approving Authority
DGR Designated Government Representative
DNI Director of National Intelligence
DoD Department of Defense
DoE Department of Energy
DSS Defense Security Service
EAA Export Administration Act
FBI Federal Bureau of Investigation
FCL Facility (Security) Clearance
FGI Foreign Government Information
FOCI Foreign Ownership, Control or Influence
FSO Facility Security Officer
GCA Government Contracting Activity
GSA General Services Administration
IS Information System
ISOO Information Security Oversight Office
ISSM Information System Security Manager
ISSO Information System Security Officer
ITAR International Traffic in Arms Regulations
LAA Limited Access Authorization
MFO Multiple Facility Organization
NACLC National Agency Check with Local Agency Check and Credit Check
NISP National Industrial Security Program
NISPOM National Industrial Security Program Operating Manual
NSA National Security Agency
OADR OriginatingAgency’s Determination Required
PCL Personnel (Security) Clearance
RFP Request for Proposal
RFQ Request for Quotation
SCI SensitiveCompartmented Information
SCIF Sensitive Compartmented Information Facility
SSBI Single Scope Background Investigation
SSP Systems Security Plan
TCO Technology Control Officer
TCP Technology Control Plan
TP Transportation Plan


Find out more of these acronyms and what they mean in DoD Security Clearances and Contracts Guidebook

Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM

Thursday, February 16, 2012

Marking Classified Information-Summary

Cleared employees who perform on classified contracts should be able to recognize what is classified and know how to protect the classified material based on the markings provided. Classified information comes in many forms. Classified objects and products are marked on the top, bottom, sides, front and back. If the item is bulky, odd shaped or otherwise a size and configuration that makes mandatory marking difficult, the markings should be placed as clearly as possible to convey the proper classification level. Multiple page classified documents have many places reserved for classification markings.

Additionally, the source of classification, reason for classification, and duration are applied to classified items. Derived classifications will have a statement indicating from where the classified information came. While working with classified items, cleared employees are responsible for challenging any classified information that has been incorrectly or unnecessarily classified, should be downgraded or upgraded to another classification level or that security classification guidance
is incorrect or not sufficient


For more detailed information of marking classified information, see Chapter 6 of DoD Security Clearances and Contracts Guidebook

Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM

Saturday, February 11, 2012

Copying Classified Documents

Classified information should only be reproduced in response to a contractual requirement such as in the performance of a deliverable. Reproduction should not be made as a matter of convenience as it puts classified information at unnecessary risk and it requires dedicated resources. The FSO can enforce resource discipline with:

1.  Creating processes and procedures identifying reproduction only as necessary and using only approved equipment

2. Ensuring only trained and authorized personnel are able to reproduce classified information.

3. Identifying office equipment, copy machines, scanners and other reproduction equipment for classified information reproduction. All other enterprise equipment should be off limits to classified reproduction.
This can be accomplished through signs identifying authorized equipment as “Approved for Classified Production at the _______ level”. Other equipment would be identified as “Not authorized for the reproduction of classified information”.

4. Considering the type of equipment the company purchases, leases or rents. When service contracts expire, repairs are needed, equipment is to be replaced or other transactions replacing or removing the equipment occur, the hard drive or memory should be destroyed or wiped in an approved manner to remove all stored classified information. DSS can help determine this approved method and guidance is available in Chapter 8 of the NISPOM.

Copying classified information is serious business. The FSO has a big role and should make the determination of how many and who to authorize. Decisions can be based on contractual needs, workload or other valid reason. However, procedures should be established that identify authorized persons and train them how and when to copy classified information and how to protect it. Procedures should include detecting and deterring unauthorized reproduction of classified information, documenting copies according to the IMS procedures, marking, storing and disseminating the classified information.


For more details, see Chapter 7 of DoD Security Clearances and Contracts Guidebook

Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM