january security newsletter
TRANSCRIPT
-
7/30/2019 January Security Newsletter
1/4
Newsletter Contents
Installation Security 1
Managers Message
Security and Intelligence 2
Security Education Training and Awareness 3
Message from theInstallation Security Office
Greetings,Please enjoy our first Security newsletter.
The Installation Security Office will workhard towards providing Unit SecurityManagers across Fort Irwin with usefultools and information to improve theirorganizations Security Programs, and wehope the newsletter helps attain that goal.This edition has lots of great and usefulinformation. If you have any suggestionsto improve or add to upcomingnewsletters please let me know.
Kenneth HenryInstallation Security Manager
Garrison Mission StatementVision: A community of choice within the Army,
known as a Soldier and Family quality living
environment.
Mission: Ensure a sustainable community with a
quality of life thats appropriate for an all volunteer
orce while continuously improving the garrison
organization to ensure it is prepared to meet the
challenges of an ever changing environment.
NTC, Fort IrwinBldg 237 C AveFort Irwin, CA 92310www.irwin.army.milE: [email protected]: 760-380-3324F: 760-380-6647
January 2013
Vol. 1 Issue 1
-
7/30/2019 January Security Newsletter
2/4
Security and Intelligence Branch Overview and Staff
January 2013Vol. 1 Issue 1PERSONNEL SECURITY BRANCH
Provide oversight for the PersonnelSecurity standards used in determining
a person is suitability under nationalsecurity criteria for appointment or
retention in the federal government.Implement policies and procedures todetermine eligibility for access to
classified information and assignmentto sensitive/non-sensitive positions in
accordance with regulatory guidance.Process applications for security
clearances to meet investigative and
adjudicative standards necessary fordeployment and federal employment.Provide individual counseling to assist
with adverse action taken as the resultof personnel security determinations
and unfavorable personnel securitydeterminations defined by regulatory
guidance. This includes securityservices to assist with due process
procedures for appealing adverse
administrative actions rendered by
Department of Defense adjudicativeagencies.
Security and Information Branch
The Security and Intelligence Branchincludes Information Security (INFOSEC),Industrial Security (IS), Security EducationTraining and Awareness (SETA), andPersonnel Security (PERSEC). We also
support Foreign Representative VisitorRequests, the Installation OperationsCenter, and the Force Protection program.Under the Army INFOSEC Program, thesecurity office provides Staff AssistanceVisits (SAVs), courtesy inspections, andother INFOSEC mechanisms to Garrisonand supported tenant organizations. Weare here to help any organization on theInstallation improve its INFOSEC program.
Installation Security Office
Location: Bldg 237, Room 125
Office HoursMonday-Friday0730-1600
Information Security and IndustrialSecurity Office
Location: Bldg 237, Room 130
Office HoursMonday-Friday0730-1600
Personnel Security Location: Bldg 237,
Room 125
Office Hours
Monday-Friday
0730-1600
Instill in personnel a desire and a
commitment to be proactive in the
execution of their security duties.
-
7/30/2019 January Security Newsletter
3/4
Information Security
Reminder: Information Security (INFOSEC)is covered under AR 380-5, and is everyonesresponsibility. This program is primarilydesigned to implement controls andmeasures for protecting and safeguardingclassified information from unauthorizeddisclosure. Army personnel are required toreceive an initial INFOSEC briefing uponarrival to a new organization, and annually forrefresher training. Contact the INFOSECProgram Manager regarding security
concerns in your organization.
Understanding your responsibilities inpreventing and responding to securityincidents or compromises (including
classified spillages).
According to AR 380-5, Paragraph 10-1a, thecompromise or loss of classified informationcan cause damage to our national security. If
classified material is lost, it cannot bedetermined if the information has beencompromised. When loss or compromise ofclassified information happens, immediateaction is required to minimize any damageand eliminate any conditions that might causefurther compromises. Each incident in whichclassified information or material may havebeen lost or compromised must be thesubject of a preliminary inquiry as describedin AR 380-5, Chapter 10. The purposes of
this preliminary inquiry will be to:
Determine whether classified information wascompromised and, if so, whether there isdamage to the national security. For moreinformation on preliminary inquiries and otherresponsibilities when responding to actual orpotential security incidents, check outChapter 10 in AR 380-5, or contact theInstallation Security Manager.
SETA: Security Education Trainingand Awareness
It is the SETA goal to enhance the security
posture of the U.S. Army by promoting
and communicating security awareness
across broad security disciplines to all
designated security personnel. The ArmyG-2 is emphasizing the SETA website
(http://www.dami.army.pentagon.mil/site/
seta/default.aspx) as a communication tool
to stay current on all SETA/SPeD news
and future effort. The SETA website was
created with the intentions of providing
security professionals access to SETAinformation from the comforts of their
own home. Website contains securityprogram elements, training opportunities,
security events, and a security toolbox.
The soldier, above all other people, prays forpeace, for he must suffer and bear the deepest
wounds and scars of war.
Douglas MacArthur
Security Education Training and Awareness (SETA)
January 201Vol. 1 Issue 1
http://thinkexist.com/quotation/the_soldier-above_all_other_people-prays_for/147488.htmlhttp://thinkexist.com/quotation/the_soldier-above_all_other_people-prays_for/147488.htmlhttp://thinkexist.com/quotation/the_soldier-above_all_other_people-prays_for/147488.htmlhttp://thinkexist.com/quotation/the_soldier-above_all_other_people-prays_for/147488.htmlhttp://thinkexist.com/quotation/the_soldier-above_all_other_people-prays_for/147488.htmlhttp://thinkexist.com/quotation/the_soldier-above_all_other_people-prays_for/147488.htmlhttp://thinkexist.com/quotation/the_soldier-above_all_other_people-prays_for/147488.html -
7/30/2019 January Security Newsletter
4/4
The Department of Defense states that Industrial Security is the portion of in-formation security concerned with the protection of classified
information in the custody of U.S. industry. The purpose of the Industrial Security Program is to safeguard classified information that may
be or has been released to cur-rent, prospective or former contractors.
To promote our national interests, the U.S. Government issues contracts, li-censes, and grants to nongovernment organizations to include
Universities, consultants and contractors. National security also requires that the industrial security program promote economic and
technological interests of the U.S. The U.S. industry develops and produces the majority of our nation's defense technologymuch of whichis classifiedand as a result, plays a significant role in creating and protecting the information that is vital to our nation's security.
The National Industrial Security Pro-gram (NISP) was established by Executive Order 12829, as amended, to ensure that cleared U.S.
defense contractors safeguard the classified information in their possession. The National Security Council sets policy for the NISP, while
the Director of the Information Security Oversight Office (ISOO) is the authority for implementation. Under the ISOO, the Secretary of
Defense is the Executive Agent, but the NISP recognizes four different Cognizant Security Agencies, all of which have equal a uthority; the
Department of Defense, the Department of Energy, the Central Intelligence Agency, and the Nuclear Regulatory Commission.
Pursuant to the NISP is the establishment of the National Industrial Security Pro-gram Policy Advisory Committee (NISPPAC). The
NISPPAC is chaired by the Information Security Oversight Office (ISOO) and has representation from DoD, non-DoD Agencies and 7
appointed members of Industry that collectively represent all of industry. The NISPPAC is responsible for recommending changes in
industrial security policy through modifications to the NISP, its implementing directives, and DoD 5220.22-R, Industrial Security
Regulation. The NISPPAC also advises ISOO on all matters concerning the policies of the NISP, including recommended changes to those
policies, and serves as a forum to discuss policy issues in dispute.
Currently, there are approximately 13,000 contractor facilities that are cleared for access to classified information. The Defense Security
Service (DSS) estimates that around 11 million classified documents are in the hands of U.S. industry. At this time, there is no DoD database
which provides the exact number of classified contracts the Army currently holds; however, a recent HQDA, G-2 data call was forwarded t
the Army Commands, Direct Reporting Units and Army Service Component Commands in support of the Army Security Manpower Mode
to gather the total number of classified con-tracts.
To have access to U.S. classified information and participate in the NISP, a con-tractor must have a legitimate requirement, must
demonstrate the ability to protect the classified information to the appropriate level, and must execute a Defense Security Agreement, DD
Form 441, which is a legally binding document between the government and contractor. This Agreement sets forth the responsibilities of
both parties and obligates the contractor to abide by the security requirements of DoD 5220.22-M, National
Industrial Security Program Operating Manual (NISPOM).
The Security Agreement (DD Form 441), executed between the government and all cleared facilities under the NISP, obligates the
Government to provide the contractor appropriate classification guidance for the protection of the classified information, furnished to or
generated by the con-tractor, in the performance of a classified contract. The Government fulfills this obligation by incorporating a
Security Requirements Clause and a DD Form 254 for each classified contract. The clause identifies the contract as a cla ssified
contract and the DD Form 254 provides classification guidance.
The DD Form 254 is a contractual specification. It is as important as any other specification in a contract. It is the vehicle that provides the
contractor with the security classification guidance necessary for the classified information to be received and generated under the contract
It was developed as a contractual document to capture all of the security requirements for a classified contract and legally bind the con-
tractor to adhering to them in the execution of the contract.
The Federal Acquisition Regulation (FAR) requires that a DD Form 254 be integrated in each classified con-tract. The DD Form 254
provides the contractor (or a subcontractor) security requirements and the classification guidance that is necessary to execute a classified
contract.
Ultimately, the purpose of the Indus-trial Security Program is to safe-guard classified information in the custody of contractors.
The security of the U.S. depends in part on the proper handling and storage of classified information re-leased to industry.
What is the Industrial Securit Pro ram?
DPTMS / PERSEC
Bldg 237 C Ave
Fort Irwin, CA 92310
Kenneth L. Henry
Personnel Security
Installation Security Office