Posts

Showing posts from March, 2011

Five Good Points to Consider In the Reproduction of Classified Information

Five Good Points to Consider In the Reproduction of Classified Information 1. Start at the beginning; establish controls to limit access to classified information. An Information management system, access control system or other means of controlling who accesses classified information, when they access it and what they do with it is the right place to start. 2. Establish policy controlling use of classified reproduction equipment. Copy machines, scanners and other reproduction equipment should be identified and designated for classified information reproduction. Additionally, all other enterprise equipment should be off limits to classified reproduction. 3. Control the use of unclassified reproduction equipment. This will help prevent security violations where authorized employees access classified information and copy it using public copiers, load them to unauthorized disks, fax them using unauthorized machines all in an effort to remove it from the company undetected. 4....

How Cleared Contractors Appoint Facility Security Officers

Image
  Excerpt From Our Newest Book  Becoming a cleared defense contractor demands more than just a defense contractor getting a security clearance. It's more to do with, what to do once the clearance is awarded; specifically, protecting classified information. This protection involves physical, classified processing, and information security. It's more than just buying safes, installing access controls and getting employees security clearances. Primarily, the cleared contractor must appoint a Facility Security Officer (FSO) responsible for implementing a program to protect classified information. To better answer frequently asked questions, I've written several times on the topic of selecting the right Facility Security Officer (FSO) qualifications. According to the National Industrial Security Program Operating Manual (NISPOM), the FSO must be a US Citizen and be cleared to the level of the facility (security) clearance (FCL); period. This provides a lot of room ...

DoD Security Clearance and Contracts Guidebook — Red Bike Publishing

Image
DoD Security Clearance and Contracts Guidebook — Red Bike Publishing Our Newest Book DoD Security Clearance and Contracts Guidebook - What DoD Contractors Need to Know about Their Need to Know Coming April-Pre-Order your copy now This new book will demystify the security clearance process and help cleared contractors develop security programs to win and keep classified contracts. It is a good companion for all seasoned and novice defense contractors, Facility Security Officers (FSO) and the college student. Defense contractors can confidently pursue classified contracts with: •Step by step guide demonstrating how to meet requirements for security clearances •Senior leader responsibilities in security cleared facilities •Classified contracts administrative responsibilities •Method for reducing costs associated with protecting classified information and NISPOM requirements •Description of exceptional (FSO) qualities Cleared contractors can protect program information th...

Dice Holdings, Inc. - Press Release

Image
Learn about Security Clearances Those holding security clearances aren't as affected by the economy. Cleared defense contractors seem to be isolated against job related uncertainties experienced by otheres in the private sectors. This report issued by Dice Holdings, Inc. expresses the benefits of working with a security clearance. Dice Holdings, Inc. - Press Release  ISP Certification  Also, if you have a clearance, consider the job security offered by certification. Security specialists can further protect themselves with ISP Certification.

Join our Team

Now you can receive 10% payment by referring customers to Red Bike Publishing. Join our affiliates program and receive 10% of any product sold through the Red Bike Publishing online bookstore. Our products sell from $7.00 to $99.00. That means an earning potential of up to $9.00 for each item sold through our store. Why not enhance your website by offering quality security and compliance books through Red Bike Publishing. How?  1. Simply visit http://www.redbikepublishing.com/affiliates/ 2. Scroll to the bottom of the page and click the link in the yellow box that says “Click here to join Red bike Publishing's’ affiliate program” 3. Login or Register 4. Under “Manage Your Affiliate Account” click “Get Affiliate Code” 5. Select “Red Bike Publishing” as the merchant 6. Click the button “Get Affiliate Code” 7. Copy the link provided in the yellow box. 8. Add the link to your website. That's it...we hope to see you on our team.

How Defense Contractors Request Security Clearances

Image
How Personnel Security Clearances are Granted From: "Insider's Guide to Security Clearances " The Defense Industrial Security Clearance Office (DISCO) processes security clearances for organizations falling under the NISP. According to Executive Order 12968—Access to Classified Information, employees should not be granted access to classified information unless they possess a security clearance, have a need to know the classified information involved, received an initial security briefing and have signed a nondisclosure agreement. The Facility Security Officer (FSO) is a position that the defense contractor must appoint during the FCL approval process. The FSO implements a security program to protect classified in information. They also request investigations for employees who require a security clearance. What this means is, all cleared contractors must appoint an FSO. It could be the business owner in a small organization or an employee with an additional duty....

Security Clearance Opportunities for Defense Contractors and Cleared Employees

Image
The NISPOM  the Cleared Contractor's  Guide to Security Programs Potential for Security Clearance Required Jobs There are more than 12,000 cleared Department of Defense contractor facilities. Considering that organizations can have anywhere from one to thousands of cleared employees, the amount of employees performing classified work is in the hundreds of thousands. Positions requiring security clearances include scientists working on projects to janitorial services and repair providers. Some clearances are based on actually performing classified work or just being cleared to access an area to perform repairs or cleaning services. Even though a job may require a security clearance, an employee does not need a security clearance to apply for the job. The potential employee must only be eligible for the security clearance. Many frequently asked questions in the defense contractor field are from those who want to know how to get a security clearance so that they can app...

Cleared Contractor Reporting Requirements

Image
From "Insider's Guide to Security Clearances" Reporting Security Violations Providing required reports to the authorized persons or agency contributes to reducing the impact of the potential security violation, compromise or suspected compromise. Cleared employees should understand to whom and what to report. The sooner the report is issued and the more details given, the more can be done to prevent or mitigate damage to national security. Cleared employees should be trained to report events affecting the facility security clearance or personnel security clearances. These events include threats to the security of classified information or the fact that classified information has been lost or compromised. All cleared employees should be trained how to submit reportable information internally to the FSO. Additionally, FSOs have reporting channels through DSS and the Federal Bureau of Investigation (FBI). The quicker information gets to the proper reporting authority...

Technology Protection and Foreign Travel

Image
Red Bike Publishing's NISPOM Anytime an employee travels abroad, they should expect to be liberated from their computer at the host country's customs. They should also expect to have the hard drive duplicated, files read and etc. These are the contingencies for which astute technology control officers, export compliance officers and security specialists plan. Sensitive, and protected technology should not be contained within computer and related media without proper permissions. Foreign governments want US Technology and aggressively seek it and defense contractors should make the information very difficult to get. However, they may spend too many resources on actions that don't address the real threat. For example physical security efforts may focus on fortifying businesses with barriers, alarms, access control, cameras and etc. Risk assessments indicate that technology is leaked through careless or malicious employee behavior or actions taken due to poorly understoo...

How Defense Contractors Protect Technology - Applying NISPOM and ITAR

Image
Red Bike Publishing's ITAR Defense Contractors providing defense items or services have the tremendous responsibility of keeping the technology out of the wrong hands. As identified in the ITAR, unauthorized release of technical information can affect the US military's fighting capability. Licenses and agreements provide a checks and balances between the US Government and the US Company desiring to export the technology. The company identifies the technology and application and submits export requests to the State Department. The State Department reviews the application and further researches military application and how the export could affect national defense. Without such checks and balances, other countries could gain a technological advantage. Consider the GPS and night vision technology. No other nation has the abilities as the US does to operate at all times and in all weather. The US military's technological lead creates the ability to determine, where, when an...