Showing posts with label security a certification. Show all posts
Showing posts with label security a certification. Show all posts

Friday, March 23, 2012

FSO Training-Get Some

Facility Security Officers (FSOs) wear many hats. Depending on the size of company and mission, they can be completely dedicated to security or serve as FSOs as one of many additional duties. Regardless of where their responsibilities lie, all FSOs should be very aware of NISPOM requirements.

When it comes to training, FSOs should be able to effectively train cleared employees of these NISPOM and Contract Security Classification Specification (DD Form 254) requirements.

Training requirements vary not only based on mission, but also depend on whether or not the facility is cleared as possessing or non-possessing. A possessing facility is authorized to store and work classified information in the cleared facility. A non-possessing facility cannot.

Objectives of the FSO Program Management Course are to prepare the FSO to implement and direct a NISPOM based security program in their cleared contractor facility. DSS offers online courses to both possessing and non-possessing facility FSOs. The training includes, but is not limited to the following topics:

Protecting classified material – The FSO learns how to protect classified information in a cleared contractor facility. This includes receipt, accountability, storage, dissemination and destruction of classified material.

Personnel security clearances – The FSO gains an understanding of the personnel security clearance request procedure, briefing techniques and maintenance of personnel clearances.

Facility clearance –The FSO learns how FCLs are established. They are also taught which records and activities are required to maintain the FCL.

Exports compliance and international operations – International business opportunities abound in a global economy. FSOs receive instruction on how to prevent unauthorized disclosure of critical technology, controlled export and military classified information. Companies can thrive in such an environment provided they can advise or execute Departments of State and Commerce licenses and agreements as required.

FSO duties – The FSO should understand not only the job description, but how to communicate with management and fellow employees. Responsibilities include accountability while implementing and directing a security program to protect classified material and NISPOM requirements.

Contract security classification specification (DD Form 254) – This is the vital piece of the classified contract. The FSO cannot execute or allow access to a classified contract unless they possess the customer issued DD Form 254. The FSO also understands how the DD Form 254 is constructed and how to provide input to better meet security requirements.

Security classification guides – As the DD Form 254 provides authorization to execute a classified contract, the SCG provides the “how to” instruction. All employees performing classified work consult the guide to understand what is classified and how to provide the required protection.

Security administration and records keeping –The FSO is expected to provide original documentation on Foreign Ownership Control or Influence, facility clearances, SF 312, training completion and classified inventory and disposition. Additionally, some records are not authorized for retention such as the completed Security Clearance application or SF 86 (as of 2006 they are destroyed once investigation is complete). Defense Security Service reviews required documentation during the annual security inspection.

Find out more at http://www.redbikepublishing.com/

Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM

Saturday, February 11, 2012

Copying Classified Documents

Classified information should only be reproduced in response to a contractual requirement such as in the performance of a deliverable. Reproduction should not be made as a matter of convenience as it puts classified information at unnecessary risk and it requires dedicated resources. The FSO can enforce resource discipline with:

1.  Creating processes and procedures identifying reproduction only as necessary and using only approved equipment

2. Ensuring only trained and authorized personnel are able to reproduce classified information.

3. Identifying office equipment, copy machines, scanners and other reproduction equipment for classified information reproduction. All other enterprise equipment should be off limits to classified reproduction.
This can be accomplished through signs identifying authorized equipment as “Approved for Classified Production at the _______ level”. Other equipment would be identified as “Not authorized for the reproduction of classified information”.

4. Considering the type of equipment the company purchases, leases or rents. When service contracts expire, repairs are needed, equipment is to be replaced or other transactions replacing or removing the equipment occur, the hard drive or memory should be destroyed or wiped in an approved manner to remove all stored classified information. DSS can help determine this approved method and guidance is available in Chapter 8 of the NISPOM.

Copying classified information is serious business. The FSO has a big role and should make the determination of how many and who to authorize. Decisions can be based on contractual needs, workload or other valid reason. However, procedures should be established that identify authorized persons and train them how and when to copy classified information and how to protect it. Procedures should include detecting and deterring unauthorized reproduction of classified information, documenting copies according to the IMS procedures, marking, storing and disseminating the classified information.


For more details, see Chapter 7 of DoD Security Clearances and Contracts Guidebook

Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM

Wednesday, January 18, 2012

Three Requirements FSOs Should Include in Cleared Contractor Initial Security Training and Annual Refresher Training

Training is increasingly important as those working in the National Industrial Security Program (NISP) employ security measures at cleared contractor facilities under the National Industrial Security Program Operating Manual (NISPOM). Challenges emerge as new technology provides increasing levels of difficulty while protecting classified information.

The facility security officer (FSO) should foster an environment where training is encouraged and expected. Developing such relationships with cleared employees create an environment of cooperation. This environment facilitates the recruitment of all employees to protect national security. Those working in the enterprise can be the eyes, ears and muscle, acting as force multipliers, and extending the effectiveness of the security department.

FSOs should conduct initial and refresher training and file reports as required by the NISPOM. Instead of conducting NISPOM training with compliance as the end goal, the training can be performed as an effective relationship building opportunity. This education increases a cleared employee’s knowledge of responsibility to:
  • ·         protect classified material
  • ·         detect attempts at espionage and other security violations
  • ·         report incidents, violations and status changes affecting personnel and facility clearances

 Training programs should address three issues: 
  1.             Effective Performance – The NISPOM requires cleared employees to attend initial and refresher  training. The FSO should explain NISPOM requirements as they apply to the cleared facility’s storage and clearance levels and mission.
  2.             Adverse Information – Cleared employees should be able to report credible anything that affects the ability of themselves, other cleared employees and the facility’s ability to protect classified information. Traditionally, those who have stolen information from their organizations have demonstrated patterns and behavior that should have raised suspicion with co-workers much earlier. Too much time at the copier, working late when unnecessary, sudden unexplained wealth and other indicators have been reported to investigators after the fact. Timely reporting is a vital link between security and employees in the protection of classified information. Adverse information should be reported immediately. Reluctance to report information on themselves could stem from FSOs not adequately communicated the objective of reporting.
  3.       Security Violations – Security violations occur when classified information is not protected. When violations do occur they must be reported to the FSO immediately. Relationships can develop while conducting training and other interaction opportunities could lead to more willingness to report minor incidents and major violations. Investigations and interviews should be conducted to find root causes and determine whether or not a loss, compromise or suspected compromise has occurred. The results are either handled in-house or sent to DSS depending on the findings.


Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM

Friday, January 13, 2012

Test your Knowledge with FSO Problems From Chapter 6 DoD Security Clearance and Contracts Guidebook

Test your Knowledge with Problems From Chapter 6 DoD Security Clearance and Contracts Guidebook
1. As a document custodian, your responsibilities include receiving and inspecting documents for proper classification markings. You receive a properly wrapped classified document from a Government agency with the following characteristics:   
     • Contains UNCLASSIFIED, CONFIDENTIAL and SECRET information
     • Created on June 21, 2007
     • Reason for Classification is 1.4 (a)
     • Contains 400 pages
     • Classified by: Jon Wain, RBP, 1022 DDMA
     • Classification guidance is found in the Gravy Security Classification Guide

1a. Based on the above description, what are the major areas you would expect to see classification markings?

1b. Write out the “By:” line describing who classified the material, reason for classification and the declassify on date.

1c. Which classification marking would you expect to find on the overall marking?

2. Your security team is conducting an annual inventory of your company’s classified holdings. In the course of the inventory, they come across a 30 page document entitled Weather Capabilities (U). The document is slightly worn but otherwise in good condition. Your team notifies you that a page is loose and that the document needs to be repaired. They also ask your opinion on some findings concerning internal illustrations;
none of the graphs, pictures or containers contains classification markings. Additional information for the document follows:
     • Created in 1986
     • Contains the following marking on the first page:
     • Classified by: RBP, 1022 DMDA
     • Reason for classification: Military capabilities
     • Declassify on: OADR
     • Contains overall classification of CONFIDENTIAL.

2a. What would you direct your team to do concerning the portion markings?

3. An engineer is about to print a report based on classified information. This report is a summary of information found in two different documents. As you prepare to help her correctly mark the derivative document you take into consideration the two source documents that she has provided. The source documents are the same as example questions 1 and 2.

3a. The derived document contains information classified SECRET, how would the “Classified by:” line be filled out?

3b. What should be put on the “Reason for classification:” line?

3c. What would be the duration of classification?

4. You are making the rounds of your security team’s area and overhear a heated discussion between your team members and a technical writer. In order to diffuse the situation, you politely interrupt the conversation and ask the technical writer if you can be of any help. He informs you that “your” security specialist
has rejected acceptance of the document based on classification marking errors. He states that it is a good product and no one would notice the mistake anyway. What would you say to him?

5. A program manager knocks on your door and asks if you have a moment for something important. He asks you to take a walk with him to a secure area where he shows you a piece of hardware. The object is small enough to fit in your hand. You notice a commercial CONFIDENTIAL label; the kind that a manufacturer might install at the factory. The manager lets you know that he has been informed that the object is not classified at all, but that the manufacturer installed the labels as classified material would be added at a later date. The program manager would like to bring the item to an unclassified meeting seeing that “it’s not classified anyway.” You notice that the object is well worn and does not look new at all.

5a. Where can you go to discover whether or not the item is classified?

5b. Are there any other sources?

5c. After speaking with the right people and consulting the authoritative documents, you are now more confused than ever. You decide to challenge the classification to seek the clarification you need to properly protect the item. Describe the process you would employ.


Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM

Tuesday, January 10, 2012

FSOs Can Use Defense Security Services Annual Review as Metrics

Annual DSS Reviews as Metrics
Inspections are typically conducted every 12 months for possessing and 18 months for non possessing facilities, but circumstances can require more or less frequent visits. DSS inspects the facility’s security
program for the primary purposes of ensuring their programs provide the proper protection of classified information they are charged with protecting. Additionally, the inspection programs are designed to
improve the effectiveness of the contractor’s security program. At the conclusion of the inspections, the contractor is given a rating ranging from unsatisfactory to superior:

     • Unsatisfactory-indicates that the contractor has lost or is in the process of losing their ability to protect classified material.
     • Marginal-indicates that a contractor is not meeting the requirements of NISPOM and has a substandard security program.
     • Satisfactory-the most common rating indicates that the company is generally in compliance with the NISPOM
     • Commendable-indicates that a cleared contractors runs a successful security program and enjoys the support of management.
     • Superior-is awarded for consistently high security posture and minimum amount of findings or security issues.

Prior to each inspection, the FSO and cleared contractor leadership should present DSS with a state of security briefing to introduce and go over the company security policy. Similarly, the DSS special agent may
provide an out-briefing detailing the results of the inspection. This outbriefing and soon to follow  documentation of the inspection provides further data toward building an excellent security program.

Pay attention to the results and apply them to make your security program to protect classified information even more effective.

For more detailed information, see DoD Security Clearances and Contracts Guidebook.


Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM

Thursday, January 5, 2012

3 Ways FSOs Create an Effective Security Culture

How do effective FSOs and security managers develop a culture of compliance with regulations and security programs? Quoting regulations only exasperates cleared employees and the very act does little
to foster a climate of cooperation. However, developing relationships based on a good understanding of business, the company mission and influence goes a long way toward implement the successful security
program.

1. FSO influences corporate culture-Security of classified information should be part of the organization's DNA. Instead of stove piping security functions, they should tie into the corporate mission. Though each office has a different product, funding or budget item, each fulfills their obligation in a chain of responsibilities necessary to get the product to market. When a business unit breaks down or fails to fulfill its mission,
other business units are affected.

2. FSO performs a vital mission of protecting classified information. Failure to safeguard classified material
could result in a defense contractor losing the facility clearance and ultimately cost current and future contracts. Security as an afterthought or viewed as a “necessary evil” has contributed to a loss in influence and commitment. Though the NISPOM applies to classified projects, FSOs would be mistaken to assume that only cleared persons and cleared programs
are worthy of their attention.

3. FSO trains and treats ALL employees as security “force multipliers”. With security ingrained in the performance and actions of employees, the organization has a united front and all employees exist to protect classified information. For example, even employees without security clearances can help protect classified information by learning to recognize classification markings reporting suspicious behavior or contacts.

The corporate culture of successful organizations is published organization wide and employees are well versed. Each employee should understand how they fit into the company mission and the importance
of their contribution toward the enterprise’s success.

For more detailed information, be sure to get DoD Security Clearance and Contracts Guidebook

Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM
How do effective FSOs and security managers develop a culture of compliance with regulations and security programs? Quoting regulations only exasperates cleared employees and the very act does little
to foster a climate of cooperation. However, developing relationships based on a good understanding of business, the company mission and influence goes a long way toward implement the successful security
program.

1. FSO influences corporate culture-Security of classified information should be part of the organization's DNA. Instead of stove piping security functions, they should tie into the corporate mission. Though each office has a different product, funding or budget item, each fulfills their obligation in a chain of responsibilities necessary to get the product to market. When a business unit breaks down or fails to fulfill its mission,
other business units are affected.

2. FSO performs a vital mission of protecting classified information. Failure to safeguard classified material
could result in a defense contractor losing the facility clearance and ultimately cost current and future contracts. Security as an afterthought or viewed as a “necessary evil” has
contributed to a loss in influence and commitment. Though the NISPOM applies to classified projects, FSOs would be mistaken to assume that only cleared persons and cleared programs
are worthy of their attention.

3. FSO trains and treats ALL employees as security “force multipliers”. With security ingrained in the performance and actions of employees, the organization has a united front and all employees exist to protect classified information. For example, even uncleared employees can help protect classified information by learning to recognize classification markings reporting suspicious behavior or contacts.


The corporate culture of successful organizations is published organization wide and employees are well versed. Each employee should understand how they fit into the company mission and the importance
of their contribution toward the enterprise’s success.



Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM

Friday, December 23, 2011

4 Practice Questions to Prepare You for Industrial Security Professional ISP Certification

Thinking about getting security certification? Consider ISP Certification

The following questions are from ISP Certification-The Industrial Security Professional Exam Study Manual

107. What method of justification should a contractor submit to attend a classified meeting?
a. List the classified contract involved
b. Cite the clearance level
c. Give company CAGE code
d. Submit job position
e. List qualifications

108. Contractors may keep classified information generated under IR&D provided:
a. Their contract is still active
b. The originating program manager is still employed
c. The FSO catalogs the information
d. Adequate storage capability exists
e. The contractor maintains facilities on Government property

109. Executive Order 12829 requires heads of agencies to enter into agreement with:
a. FSO
b. Foreign Governments
c. Secretary of Defense
d. Department of Labor
e. Department of Energy

110. How do you mark unclassified material to simulate SECRET?
a. EXERCISE…EXERCISE…EXERCISE
b. SECRET TRAINING
c. SECRET FOR TRAINING ONLY
d. SECRET FOR TRAINING, OTHERWISE UNCLASSIFIED
e. SECRET






Answers-Don't Scroll Down until you're ready





107. What method of justification should a contractor submit to attend a classified meeting?
a. List the classified contract involved (NISPOM 6-203)
b. Cite the clearance level
c. Give company CAGE code
d. Submit job position
e. List qualifications

108. Contractors may keep classified information generated under IR&D provided:
a. Their contract is still active
b. The originating program manager is still employed
c. The FSO catalogs the information
d. Adequate storage capability exists (NISPOM 11-304)
e. The contractor maintains facilities on Government property

109. Executive Order 12829 requires heads of agencies to enter into agreement with:
a. FSO
b. Foreign Governments
c. Secretary of Defense (NISPOM 1-103a)
d. Department of Labor
e. Department of Energy

110. How do you mark unclassified material to simulate SECRET?
a. EXERCISE…EXERCISE…EXERCISE
b. SECRET TRAINING
c. SECRET FOR TRAINING ONLY
d. SECRET FOR TRAINING, OTHERWISE UNCLASSIFIED (NISPOM 4-215)
e. SECRET



The above questions are from ISP Certification-The Industrial Security Professional Exam Study Manual

Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM