Posts

Showing posts from June, 2008

A New Level of Classification?

A buzz is sweeping the security community since May as folks are notified of the new CUI program. The President has published a Memorandum with the subject, Designation and sharing of Controlled Unclassified Information. This memorandum implements a program designed to encourage the speedy sharing of information to those authorized and to better protect the information, privacy and legal rights of Americans. The Controlled Unclassified Information program is designed to promote proper safeguarding and dissemination of unclassified information. Many readers may be familiar with the program CUI has replaced. Sensitive But Unclassified (SBU) information had enjoyed protection to a certain level but was not conducive to the necessary information sharing. Controlled Unclassified Information (CUI) provides procedures for a more appropriate Information Sharing Environment. Controlled Unclassified Information is a designation of unclassified information that does not meet the r...

The Contract Security Classification Specification

Image
As we have addressed over the course of this blog space, industrial security specialists and FSO’s play a vital role in protecting our Nation’s secrets. Aside from guidance in the NISPOM, there is another critical piece of information necessary to practicing good classification management; enter the DD Form 254. The Contract Security Classification Specification (DD Form 254) is a basic agreement between the Contractor/Subcontractor and the User Agency. It conveys the security classification specifications and guidelines for classification, regrading, and downgrading of documents used in the performance of a classified contract. This agreement authorizes access to classified information in performance of a contract. The DD Form 254 will be provided to both the supplier and cognizant security offices when work is subcontracted to a supplier/vendor requiring access to or generation of classified material. So why is this important to you? First of all it provides author...

Elicitation, One Fine Example

The Washington Post ran an article called, Man, 84, Is Charged With Spying for Israel in 1980s . Ben-Ami Kadish had worked for the Army as an engineer. For some years in the 1980’s until 1985, he passed documents to his contact, named as Yosef Yagur. Yosef was an experienced agent who had also handled Pollard, another spy convicted and sentenced to life in prison. Elicitation is a recruiting method using subtleness to gain information. It is not an overt or threatening type of interrogation, but one of building relationships and creating consent for further communication and finally dedication or commitment to providing information. In the case of Kadish, his handler paved the way by asking Kadish to provide documents to help Israel maintain her security. Kadish never accepted payment other than small gifts. Thiers was a relationship of socializing. According to the article, Kadish removed documents from his office and provided them to his handler. You may recall a more recent ...

Reinvigorating the Network

Even after reading Dig Your Well Before You’re Thirsty by Harvey Mackay; Brag!: The Art of Tooting Your Own Horn Without Blowing It! by Peggy Klaus, nothing less than experience can prepare the professional for the necessity of good old fashion networking. This is especially true if security is a new career field, or you are continuing your career in a new company or location. A career in security is rewarding and challenging. The work is important and people genuinely appreciate our service. The security profession requires a high degree of interaction as our paths cross in training or through contractual execution. However, we are somewhat guarded discussing our business with new or otherwise unknown persons. Security professionals require time to develop trusting working relationships. It’s the nature of the business. Try conducting business over the phone with someone you don’t know. Chances are you had to be cautious and it took a few more interactions before finally recognized n...

Hire and build the perfect security team

The best case scenario, your company is growing and you find yourself reassessing your security team needs. In the worse case, you find yourself severely lacking the personnel required to effectively perform security functions. In either case, it is up to you to hire the perfect employee. Find the perfect employee? Though a daunting task, it is important that you hire and build a team of excellent security managers. Never, ever settle for a warm body just to get the job done. Many of you know from experience the issues of hiring the wrong candidate bring about. There are a few good observations about potential candidates that can further them into the hiring process. These include: What does the company value and what do you value as a security manager? We will also cover where to find potential candidates, the interview process and building the team. First and foremost, all qualified applicants must reflect the company culture. What kind of employee does the company value? Y...

Travel should include a "plan b"

An article in the Post Tribune , Diverted United passengers stuck at Gary airport six hours , demonstrates the uncertainty of weather, airline schedules and logistics for passengers travelling within the united states. This is not the first report of unscheduled layovers or flight delays and some reports indicate that passengers could face many more. With this in mind, security managers and company employees who travel should be aware of implications and have back up plans. These back up plans are especially vital when traveling with sensitive and classified materials. When employees travel with classified material, they have a responsibility to account for it 100% of the time. This is a difficult under trying circumstances filled with stress and disappointments. Passengers can experience long lines through TSA checkpoints, cramped cabins and times when maintaining visibility over carryon items is extremely difficult. When at all possible, classified items should be stored in an a...

Are you ready for the challenge?

According to the headline from Defense News, U.S. Defense Tech Security Called 'Swiss Cheese', the defense industry is in for increased challenges with international operations. Obviously this should alert FSO’s and security specialists to a whole new world of subcontracting or outsourcing defense work to foreign countries. This story has been going on for a while now as major news sources report the “benefits” of a weaker U.S. dollar. These benefits include, the ability of foreign countries to do business with U.S. Industry. Foreign countries now have more money to pay for our products and services. This is very attractive and appealing to U.S. companies needing the cash. This can be good news if the business is conducted properly. Well prepared industrial security professionals know how to address these challenges and lead their companies to compliance success. What can security do? First of all, stay abreast of company activities and develop relationships with contracts, pur...