Posts

Showing posts from May, 2008

They're searching our computers at the borders!!

Image
Does that headline get your attention? Computer World has published an article in their online magazine about random computer searches conducted at our borders. Lawyers have taken the fight that this violates peoples rights and circuit courts are holding that border agencies do have the right to search the laptops of any travelers crossing the boarder. Does this really raise an alarm within the security community, or is the article based on fears of privacy invasions? I’ll leave the last part of question for the courts, and gladly use the article as a good training resource for security managers and executives. The first implication is that this activity should not be surprising. Anytime an employee travels abroad, they SHOULD expect to be liberated from your computer at the host country’s customs. They should also expect to have the hard drive duplicated, files read and etc. These are the contingencies for which astute security specialists plan. As with all bad news (hopefully this is...

Pentagon or FSO...Who is ultimately responsible?

Image
Leaks in high-tech fighter? Makes for a great headline and one in which grabs the attention of any professional safeguarding sensitive and classified information. This article appeared in many newspapers across the country but originated with the Washington Post. The article makes many pointed remarks toward government agencies, including the Department of Defense as not providing the proper oversight. Reading the article I realize that there is just not enough information to draw a conclusion of who dropped the ball at the government level. Many of you in the field probably realize some of the obvious questions that need to be answered before we can assign blame to Defense Security Services or the various agencies. However, one thing is clear; even with all of the policies in place; something broke down. Many government regulations give specific instructions for safeguarding classified material. The International Traffic In Arms Regulation (ITAR) instructs how to properly release tec...

Managing Classified Contracts

Since allowing industry to use classified information on the performance of contracts, the Department of Defense regulates a contractor's ability to work with classified material. They have published a policy appropriately titled: The National Industrial Security Program Operating Manual. This page turner is sponsored by the Presidential Executive Order (E0)12829 for the protection of information under E.O. 12958. Having poured over both publications and the updates, I can confidently assure you that they take this business very seriously. When specific work calls out performance on these efforts, provisions of the applicable DD 254 and Security Classification Guide (SCG) shall govern. Both documents spell out what specific work a contractor can and cannot perform and what exactly is classified. Both of these documents not only should be available prior to execution but read and understood by all performing employees. Classified information is marked with a classification designati...

Executive Order

Image
Why should government employees and military personnel earn a security certification? There are several reasons to achieve certification. One of which allows security managers to take advantage of opportunities offered in the recent Presidential Executive Order: National Security Professional Development. The Executive order states: "In order to enhance the national security of the United States...it is the policy of the United States to promote the education, training, and experience of current and future professionals in national security positions (security professionals)..." The National Strategy identified in the Executive Order provides a plan to give security professionals access to education, training to increase their professional experience in efforts to increase their skill level and ability to protect our nation's secrets. The ISP Certification is sponsored by NCMS (Society for Industrial Security) a professional organization specializing in protecting classif...

Exports Compliance

Recently, Latifi, and executive and owner of Axion Corp has been vendicated of Export Violation charges filed by the U.S. Government. Though not as sinister and espionage riddled as other recent news events, it demonstrates the grave attention the State Department gives to contractor activities. Not only must DoD contractor companies mind the store concerning classified projects, but they must be prepared to live above reproach while dealing with foreign entities. In this case, the leader of Axion had no mal intent but though acquitted, lost his clients and company. A little education for those who desire to pursue contracts with foreign persons; the U.S. Government encourages companies to pursue business with foreign enterprises. However, there are rules in effect that govern such exporting. Exporting is defined as the business of: • Sending or taking hardware out of the U.S. or transferring to a foreign person in the U.S. • Disclosing (oral, email, written, video, or other visual di...

How Security Classification is Assigned

Original Classification Authority- For over 18 years John A. Walker, Jr. had sold secrets during and after his career in the Navy. Though entrusted with a security clearance and a “need-to know”, he did not demonstrate the trustworthiness of which his thorough background investigation deemed him worthy. When the opportunity revealed itself, he took advantage of his position and responsibilities to smuggle classified information to his Russian connections. During the investigation into his arrest, authorities discovered a complex spy ring consisting of family members and other recruited operatives. Walker had earned the trust and cooperation of his family to commit one of the most notorious of all espionage cases. As a result of his crimes, he received two life terms plus 10 year, his son received 25 years and the damage to the U.S. national security was tremendous. According to the NY Times, “It has been estimated by some intelligence experts that Mr. Walker provided enough code-data i...

Security Education

Security education is vital to a security manager’s growth. With the motto “Solutions Begin Here”, ASIS has produced a class security training act in Las Vegas. As security professionals, it’s important to get all the education necessary to perform as top players in our profession. Because of your responsibilities in physical security, IT, or loss prevention, excellent training is vital. There were over 24,000 people and 4,000 venders present. The convention offered several hundred classes throughout the week. Even in the midst of traditional security training I was pleased to see instruction on safeguarding classified information. I also appreciated seeing the Defense Security Services (DSS) conducting seminars. Additional classed including an introduction to DoD security and fundamentals of classification proved that even mainstream public companies were becoming aware of the growing trend in this arena. Though there were opportunities to train in one of hundreds of classes, the over...