FBI Omaha Counterintelligence Strategic Partnership Program
|
|
|
- Britney Merritt
- 10 years ago
- Views:
Transcription
1 Volume I, Issue #2 September 1, 2010 FBI Omaha Counterintelligence Strategic Partnership Program Federal Bureau of Investigation 4411 S. 121st Court Omaha, Nebraska Executive Management Weysan Dun, Special Agent in Charge James C. Langenberg, Asst. Special Agent in Charge, National Security Program Edward C. Reinhold, Asst. Special Agent in Charge, Criminal Program Travel Security: Protecting Your Organization During Overseas Travel As many readers of this newsletter are aware, one of the greatest challenges posed to information security is protecting sensitive, proprietary, or classified information as we conduct official travel, or business travel, in foreign environs. Executives, engineers, systems administrators, sales people, or others with intimate knowledge of their organizations are frequently the targets of foreign governments or foreign competitors when traveling overseas. Stan Levchenko, a former KGB intelligence officer stated the most effective tool against the KGB in this country is public awareness of its methods of operation. More importantly, public awareness is a significant deterrent to the activities of any intelligence service or corporate espionage effort. To foster the types of awareness business travelers need when traveling overseas, the FBI prepared a booklet to inform American travelers of their vulnerability to foreign intelligence service operations conducted overseas. This issue as well as the next issue of the FBI Omaha CI Strategic Partnership Newsletter will address some of methods used by foreign intelligence to collect information from business travelers, and how companies and individuals can counter these collection efforts. In this issue, we will discuss Executive & Corporate Security Strategies. Questions about the Omaha Field Office Counterintelligence Strategic Partnership Program: Special Agent Carrie A. Sawicki, Strategic Partnership Coordinator (desk) (cell) [email protected]
2 CI Strategic Partnership Newsletter Page 2 EXECUTIVE TRAVEL SECURITY PROGRAM An Executive Travel Security Program should be a formalized process to analyze the travels of an organization s key personnel. The process consists of four stages: assessment; planning; countermeasures; and reporting. Organizations that fail to formalize this process risk their organizations propriety information and technology, as well as their position in overseas negotiations. The four components (stages) of an Executive Travel Security Program are listed below: 1. COUNTRY ASSESSMENT & RISK ANALYSIS: When foreign travel is being contemplated for key individuals in an organization, an assessment should be made of the destination. The assessment should include the purpose (value) of the travel, the current political and safety conditions of the destination country, and the potential risks to the traveler and the organization. Once these variables are identified, a risk analysis should be conducted to mitigate risks and possibly offer alternatives. Alternatives may include canceling the travel, having all parties travel to a third country, have parties travel to the U.S., implement secure technologies to conduct virtual meetings. 2. PRE-TRAVEL PLANNING & CONTINGENCIES: Once travel has been deemed necessary, the next stage should be the evaluation of the travel plans. Exactly where in a country will the executive travel: country; region; city, roadways; airports; hotels; meeting locations. All these locations pose differing security and safety concerns. Planning will involve everything from general security precautions and training, to overseas workers and translators, to social and political unrest issues, to natural disaster and pandemic considerations. Contingency planning should consider procedures to deal with hostage situations, natural disasters, country evacuations, missing traveler, bodyguards, etc. Additionally, a personal risk assessment for all personnel traveling should be conducted on the individual traveler. This personal risk assessment will determine if there are any issues with personal affiliations or ethnicity that may increase risk to a travel destination. 3. TRAVEL PROTECTIVE STRATEGIES: Protective strategies are specific countermeasures executives and organizations implement to protect sensitive and critical information from compromise. These strategies are awareness issues as well as technical measures. 4. POST TRAVEL ASSESSMENT: Once the executive returns from overseas travel, a travel debriefing is conducted to identify potential compromises, or attempts at compromise of critical information. This assessment will also collect information regarding unusual circumstances or noteworthy incidents. These post travel debriefing should be used to further improve and evaluate the Executive Travel Security Program. CRITICAL INFORMATION & TECHNOLOGY It is essential that every organization identify critical information and technologies and inform executives and key personnel what must be protected. Critical information & technologies may include:
3 CI Strategic Partnership Newsletter Page 3 customer data employee data vendor information pricing strategies formulas and processes technical components & plans corporate strategies corporate financial data computer access and design proprietary processes acquisition strategies marketing strategies investment data negotiation strategies passwords (computer, phone, accounts) phone directories other data of concern TRAVEL PROTECTIVE STRATEGIES One of the most serious threats facing the executive traveler is corporate espionage. The perpetrator of this type of espionage can be a competitor, opportunist, or foreign intelligence officer. If your company handles information or technology that may impact national security, the FBI can assist in providing additional protective strategies not included in this booklet. It is important to understand that in many countries, corporations may be partly or wholly owned by the government. These situations are exceptionally risky when the foreign government considers the company or industry important; it can utilize government resources (intelligence services, customs official) to collect competitive intelligence. Following is a list of recommended personal, technical and post travel recommendations and strategies organizations should consider for inclusion in their travel security program and briefings.
4 Page 4 CI Strategic Partnership Newsletter PERSONAL PROTECTIVE STRATEGIES Two American female students attended classes in what was then East Germany. On one occasion, they discussed, privately in their apartment, the lighting in their apartment. The next day, a light that had been out for weeks was working. In another incident, their room was burglarized and their passports, credit cards, and other personal, identification taken. Personal Information Protection Do not travel with information that reveals your personal interests, hobbies, affiliations, loyalties. During an official or covert search, this information may be noted and later used for manipulation, especially during negotiations. Sanitize information you carry to eliminate possible negative affiliations. Searches conducted during violent situations such as hostage taking, rebel checkpoints, or a coupe situation may reveal your affiliations to an opposing party or position. (In one terrorist hostage situation, all wallets were searched and military identification was found. The individuals were beaten and one was killed.) Sanitize information you carry to reduce compromise of company systems. Do not carry passwords to company systems, voic , accounts, customers systems. If you must carry this data, carry it on your person at all times. If it leaves your possession have a plan to reissue new passwords. Sanitize information you carry to ensure no critical information (printed materials, disk drives, and electronic data) is in your possession that is not necessary for travel. If critical information is necessary, take measures to ensure the material is on your person at all times, encrypted or otherwise protected. Hotel safes are not adequate to protect against foreign government corporate espionage. Consider any information or electronic component that leaves your possession and visual control for more that two minutes likely compromised (copied, downloaded).
5 CI Strategic Partnership Newsletter Page 5 An American salesman, visiting Moscow, was carrying product samples for the Russians and planned to present a paper at a symposium. The samples and his presentation were stolen from his hotel room. Later, he traveled to a factory in Leningrad where he saw his samples in the possession of a Russian scientist. Targeting Techniques Be aware of ethnic targeting. Individuals of the same ethnicity as the destination country may be targeted based on their cultural or family ties to the country. Be aware of discussions requesting information on your heritage, loyalty, and family. Beware of offers to privately consult (outside of company parameters) while overseas. Doing so may violate U.S. deemed export laws. In addition, it may be an attempt to develop a confidential relationship with you. Exhibitions, conferences, and symposiums are opportunities for individuals to elicit information regarding your personal interests, corporate programs, and technical knowledge. These forums are used to spot and assess individuals of interest. Because of your position or influence within an organization, industry, U.S. government, or the international community, you may be targeted for a perception management campaign where your perceptions and positions are manipulated so you become an unintentional promoter of a foreign interest. These techniques are as simple as developing a close, meaningful friendship with someone (who has an hidden agenda) or being provided an exceptional experience that skews your perception. These campaigns can be long-term, many months or years. You would in effect become an unknowing Agent of Influence for a foreign entity or government. Joint venture and mergers pose a particularly dangerous position for companies especially when a company has to reveal sensitive information during the process. Deals overseas require a significant amount of corporate information to complete and are often carried overseas or sent electronically. This information may be compromised before you even sit down to negotiate.
6 Page 6 CI Strategic Partnership Newsletter An American in China was given a letter by a man he had never met. He tried to return the letter but the man ran away. That evening Chinese security officers visited the American, admonished him for taking the letter, and required him to sign a statement concerning the event. A female military officer visiting Leningrad as a member of a tour group was told by a Russian, who spoke perfect English, where she could buy black market items in the hotel. Although she did not visit the room, she mentioned other Americans, both military and civilian, did. On three separate occasions, a businessman, staying in China, was offered complimentary massages by attractive Chinese women who knocked at his hotel room door. Compromising Situations You may unwittingly become embroiled in a compromising situation. These situations can be planned, or an incident of opportunity for a foreign entity. The foreign entity or government may offer to intervene on your behalf and there will be an understanding (sometimes unstated) of your indebtedness. Many countries have serious counterfeiting problems. It s recommended you utilize respected banks and hotels for exchanges. Obtain small bills. Using large bills may cause you to receive counterfeit bills in change. Taxis and restaurants are known to engage in this scam. Possession of counterfeit bills may cause you to be the subject of an investigation or detention. Avoid street gatherings and protests. Sometimes police arrest individuals in roundups. Avoid religious settings and gatherings (in countries where tensions exist). Avoid political gatherings and public support of political parties. Avoid parts of a town where you could be targeted for scams. Scams may include false accusations. Avoid traveling alone or allowing members of your group to travel alone. Alone, a person may be more vulnerable to agree to a deal to escape a compromising situation. Avoid the Honey-Pot, which is an enticing romantic or sexual offer that is difficult to refuse. The offer will most likely occur in a social encounter not an obvious sex for money situation. At some point,
7 CI Strategic Partnership Newsletter Page 7 the situation becomes compromised when the person turns out to be underage, claims rape, or a spouse appears. Always check your bags. Items could be placed in them at anytime that could lead to your arrest. Items include drugs, large sums of money, political material, government information, pornography, artifacts. Do not take photographs of military installations, checkpoints, government facilities, and police and military operations. Photographing such items may be illegal and lead to your arrest. Do not carry or produce any anti-government material (buttons, posters, slogans, pictures). An American government contractor staying in a Beijing, China hotel mentioned, privately in his room, that a light was not working in his closet. The next day the light bulb was replaced. The American also observed an elderly couple in the room nextdoor. The couple stayed in the short-term, expensive hotel room for his entire stay (several weeks) rarely leaving the premises. An American business executive traveling to China to attend a conference returned to his hotel one evening. He was approached by a Chinese female who asked him the time and tried to engage in conversation. Her nervousness alerted the man who ended the encounter. As he walked down the hallway on his floor, two males exited what appeared to be the businessman s room. They hurried down the hall, past the man, carrying a bag and keeping their heads down. In his room, the man observed his laptop case was hastily shoved back under his bed with the power cord protruding. The laptop would not turn on and the company s computer department later determined the computer had been physically and technically compromised. TECHNICAL STRATEGIES Sanitize laptop computers to remove any critical company information. Disable dial-in or web access programs that link to company networks. If a connection is necessary, consider appropriate protections such as encrypted connections. If critical electronic information is necessary during a trip, consider a removable hard drive or an encrypted thumb drive to keep on your person at all times. s, non-essential reports, password files, internet histories, internet cookies, and system access instructions should all be removed from computers.
8 Page 8 CI Strategic Partnership Newsletter Company laptops can be cloned prior to travel. Upon return, the laptop and clone are compared to see if any additional programs or data were installed. This technique is used to detect malware. If your computer is out of visual range for more than two-three minutes, consider the system compromised. The system may have malicious software, spy software, or a listening devise implanted. Avoid using non-company computers to log into company network or website. Always consider any information conveyed through a non-company computer compromised by the foreign entity or government even if encrypted. Encryption and strong passwords are no defense against screen capture programs and key loggers. Clean out your voice mail prior to travel. Avoid sensitive messages being left in your voic during your travel. When you access your messages, the pass code may be compromised and others may retrieve those same messages. Your information management team may be able to monitor your access to see if additional attempts are recorded. Always change your voice mail pass code upon return from overseas travel. Sanitize cell phones and PDAs. These devices may contain , voice mails, personal and company photographs, documents, and system passwords. Sanitize company camera and disks to ensure there are no photographs revealing business strategies or technologies. An example is a photograph of new a product line, manufacturing system, or company of interest in a pending merger or acquisition. Electronic eavesdropping has been reported on overseas airlines seats, hotel rooms, taxicabs and meeting rooms. Discussing business and negotiation strategies with coworkers is very difficult overseas and should be handled carefully and thoughtfully, or avoided. Raising the television volume in a hotel is not an effective strategy to neutralize electronic eavesdropping. If travelers must log into systems and voic , have traveler note access times and duration for comparison to company logs. (Discussed further in Post Travel action below.) Be aware that some countries have import restrictions on laptops. Check before you leave to avoid delays and possible confiscation. Also some countries do not allow encryption of telecommunications traffic within their borders because they want to be able to monitor communications. So plan any communications with your home office accordingly.
9 CI Strategic Partnership Newsletter Page 9 While a student in Moscow, an American had an affair with a Russian. Eight years later, the American who has become a government employee, received a letter from the Russian, in flawless English, offering to renew their "special relation. POST TRAVEL Upon return from overseas travel change passwords and access codes on company network, , phone mail, and personal information accounts. Your organization s Information Security Officer should review with you your system access during your travel. Access that was not accounted for should be investigated and a damage assessment conducted. The organization s Security Officer should conduct a Post Travel Debrief with traveler. Be sure to report any unusual circumstances or noteworthy incidents to your Security Officer and/or the FBI upon your return. Your Security Officer ensures that other travelers from your organization are aware of the general security precautions, as well additional threats you report. Notifying the FBI will help to ensure the FBI travel briefs and the official U.S. Department of State Travel Advisories take into consideration any unusual circumstances or noteworthy incidents you encountered during your travel. If a suspicious contact or social encounter is identified, an additional future debriefing should be planned to identify/assess post travel contacts. If a compromise is suspected or confirmed, a damage assessment should be conducted that details the extent of damage and vulnerabilities. Countermeasures must be implemented to reduce the risk of a similar compromise in the future.
10 Page 10 CI Strategic Partnership Newsletter
COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA
COUNTERINTELLIGENCE VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA 09/1 8/2009 version UNCLASSIFIED//FOR OFFICIAL USE ONLY Cl VULNERABILITY ASSESSMENT FOR CORPORATE AMERICA DEFINING COUNTERINTELLIGENCE
Mangesh Sawant. Information Security Risks for Business Professionals Traveling to China
Mangesh Sawant Information Security Risks for Business Professionals Traveling to China Introduction The growth of a globe trotting mobile workforce equipped with laptops and other devices is bringing
FBI CHALLENGES IN A CYBER-BASED WORLD
FBI CHALLENGES IN A CYBER-BASED WORLD Federal Bureau of Investigation Assistant General Counsel Robert Bergida 202-651-3209 Overview Cyber Threats FBI Mission FBI Response Terrorism remains the FBI s top
CASE STUDY OF INDUSTRIAL ESPIONAGE THROUGH SOCIAL ENGINEERING
CASE STUDY OF INDUSTRIAL ESPIONAGE THROUGH SOCIAL ENGINEERING Ira S. Winkler National Computer Security Association 10 South Courthouse Avenue Carlisle, Pennsylvania 17013 [email protected] (717) 258-1816
Free For All Marketing Inc. Workplace Safety Program
Free For All Marketing Inc. October 2012 Free For All Marketing has developed a which focuses on measures and procedures to control the risk of workplace violence, including domestic violence, which may
12 FAM 260 COUNTERINTELLIGENCE
12 FAM 260 COUNTERINTELLIGENCE 12 FAM 261 GENERAL (CT:DS-191; 03-29-2013) (Office of Origin: DS/DO/ICI) 12 FAM 261.1 Program Implementation a. The Department s counterintelligence (CI) program is defensive
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
Vulnerabilities in the U.S. Passport System Can Be Exploited by Criminals and Terrorists
Statement of Michael Johnson Former Special Agent in Charge, Miami Field Office, Diplomatic Security Service United States Department of State Before the U.S. Senate Homeland Security and Governmental
Overseas business travel. Health, safety and security insights to help business travellers
Health, safety and security insights to help business travellers Health, safety and security insights to help business travellers Introduction Business professionals face a wide range of potential risks
Honolulu Police Department Legislative Disciplinary Report Reporting Year: 2015
14-023 Was verbally abusive to a member of the public and exercised police authority while on restriction. Failed to respond to an administrative investigation. Harassment 14-024 During a verbal argument
National Cyber Security Month 2015: Daily Security Awareness Tips
National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
Case Study: Cyber Stalking and Spyware in Divorce Cases
Case Study: Cyber Stalking and Spyware in Divorce Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge computer
Foreign Collection Methods: Indicators and Countermeasures
DSS Foreign Collection Methods: and IDENTIFY Requests for Information Academic Solicitation Suspicious Network Activity Targeting at Trade Shows Solicitation and Marketing /Seeking Employment Foreign Visits
Security Policy and Procedures
The British Section SHAPE International School Aims Security Policy and Procedures The aim of this policy is to ensure that the school can operate on a day-to-day basis in an environment that is safe and
Aide-Mémoire Suspicious Objects and Bombs
Aide-Mémoire Suspicious Objects and Bombs Terrorists, criminals and dissatisfied individuals continue to make use of improvised explosive device (homemade bombs). These incidents involving shocking acts
Contact Reporting Guidelines The Australian Government Contact Reporting Scheme
Contact Reporting Guidelines The Australian Government Contact Reporting Scheme Version 1.0 Approved September 2010 Contents Introduction... 1 The role of ASIO... 1 Australian Government Contact Reporting
ESTABLISHING A COMPUTER INCIDENT RESPONSE PLAN
82-02-70 DATA SECURITY MANAGEMENT ESTABLISHING A COMPUTER INCIDENT RESPONSE PLAN David Adler and Kenneth L. Grossman INSIDE The Constituency; The Computer Incident Response Team (CIRT); Incident Reporting
Campus and Workplace Violence Prevention
Campus and Workplace Violence 1 Prevention SECTION I Policy SUNYIT is committed to providing a safe learning and work environment for the college community. The College will respond promptly to threats,
82-10-43 Social Engineering and Reverse Social Engineering Ira S. Winkler Payoff
82-10-43 Social Engineering and Reverse Social Engineering Ira S. Winkler Payoff Social engineering is the term that hackers use to describe attempts to obtain information about computer systems through
Chippewa County Courthouse Security Emergency Procedures. Dial 9 9 1 1 FIRE POLICE AMBULANCE
Chippewa County Courthouse Security Emergency Procedures Dial 9 9 1 1 FIRE POLICE AMBULANCE Table of Contents Introduction... 2 Explosion... 3 Civil Disorder/Threat to Personal Safety... 4 Chemical Spill...
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5240.06 May 17, 2011 Incorporating Change 1, May 30, 2013 USD(I) SUBJECT: Counterintelligence Awareness and Reporting (CIAR) References: See Enclosure 1 1. PURPOSE.
E3211. DOT Hazmat Security Awareness. Leader s Guide
E3211 DOT Hazmat Security Awareness Leader s Guide This easy-to-use Leader s Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the
Consultant Annual DoD Security Refresher
Consultant Annual DoD Security Refresher 1 About This Course This course should be taken by Consultants Only in this PDF format All others should take this course online LMPeople > LMCareers > Learning
Customer Guide to the DATAONE Datacenter
Customer Guide to the DATAONE Datacenter User guide for Private Suite or Colocation Customer Version 1.0 July 2012 CONTENTS 1 Welcome... 3 2 Getting started... 4 2.1 CONTACTING US... 4 2.2 OBTAINING SECURITY
Counterintelligence Awareness Glossary
Counterintelligence Awareness Glossary Access: The ability and opportunity to obtain knowledge of classified information. Anomaly: Activity r knowledge, outside the norm, that suggests a foreign entity
+GAMES. Information Security Advisor. Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains
Information Security Advisor December 2015 Be a Human Firewall! The Human Firewall' s Top Concerns in the Cyber, People & Physical Domains +GAMES Spot the insider & Human firewall Filtering EXerCISE Good
KEY STEPS FOLLOWING A DATA BREACH
KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,
WORKPLACE VIOLENCE POLICY
WORKPLACE VIOLENCE POLICY SUNY Canton is committed to providing a safe work environment for all employees that is free from intimidation, threats, and violent acts. The college will respond promptly to
Keynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
Driving License. National Insurance Number
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
IT Security Handbook. Incident Response and Management: Targeted Collection of Electronic Data
IT Security Handbook Incident Response and Management: Targeted Collection of Electronic Data ITS HBK 2810.09 03 Effective Date: 20110824 Expiration Date: 20130824 Responsible Office: OCIO/ Deputy CIO
Physical Protection Policy Sample (Required Written Policy)
Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the
Ixion Group Policy & Procedure. Remote Working
Ixion Group Policy & Procedure Remote Working Policy Statement The Ixion Group (Ixion) provide laptops and other mobile technology to employees who have a business requirement to work away from Ixion premises
East Haven Police Department
East Haven Police Department Type of Directive: Policies & Procedures No. 410.2 Subject/Title: Issue Date: Preliminary Criminal Investigations July 29, 2014 Effective Date: References/Attachments: N/A
BSHSI Security Awareness Training
BSHSI Security Awareness Training Originally developed by the Greater New York Hospital Association Edited by the BSHSI Education Team Modified by HSO Security 7/1/2008 1 What is Security? A requirement
Public Opinion on Selected National Security Issues: 1994-2000
Management Report 01-4 October 2001 Public Opinion on Selected National Security Issues: 1994-2000 Suzanne Wood Defense Personnel Security Research Center Released by James A. Riedel Director Defense Personnel
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL
INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information
COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
Age-Restricted. Products Guidance
Age-Restricted Products Guidance 2 Contents 3 Warning Notices 6 How can I prevent underage sales? 7 Challenge 21 8 Training 9 Till Prompts 10 Proof of Age 11 Refusal Logs 12 CCTV 13 What could go wrong?
Personal Information Protection Act Information Sheet 11
Notification of a Security Breach Personal Information Protection Act Information Sheet 11 Introduction Personal information is used by organizations for a variety of purposes: retail and grocery stores
Security Awareness Quiz Questions
Category Question Awareness Quiz Questions Answer 1. Why is backing up data files important? Backups ensure that the information you need is there when you need it If the information is damaged it can
Western Kentucky University, The Center. The Michael Minger Act Report for 2015 Activity Reported for Calendar Year 2014
Western Kentucky University, The Center The Michael Minger Act Report for 2015 Activity Reported for Calendar Year 2014 Section 1: Campus Security Authority List campus security authority personnel (definition
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
Guidelines for Setting up Security Measures to Stop Domestic Violence in the Workplace
Guidelines for Setting up Security Measures to Stop Domestic Violence in the Workplace As of June 15, 2010, all employers in Ontario are responsible for protecting workers when domestic violence follows
Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ 05842 Unit 3 Cyber security. Date Morning/Afternoon Time Allowed: 1 hour
SAMPLE ASSESSMENT MATERIAL Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ 05842 Unit 3 Cyber security Date Morning/Afternoon Time Allowed: 1 hour You must have: The Insert (clean copy case study)
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Self-Help Guide for a Prosecutorial Discretion Request
Self-Help Guide for a Prosecutorial Discretion Request In June 2011, Immigration and Customs Enforcement ( ICE ) announced it would not use its resources to deport people it considers low priority and
I. WHAT IF THE POLICE, FBI OR DHS AGENTS CONTACT ME?
The Immigration and Naturalization Service (INS) is now part of the Department of Homeland Security (DHS) and has been renamed and reorganized into: 1. The Bureau of Citizenship and Immigration Services
Cybersecurity and Travel to China or to the Russian Federation
Cybersecurity and Travel to China or to the Russian Federation Recent press coverage in the N.Y. Times (see "Traveling Light in a Time of Digital Thievery" in the reference list at the end of this document)
Employee Preparedness Handbook
Employee Preparedness Handbook This Emergency Preparedness Handbook will provide you with important information about properly preparing yourself for emergency situations, and with tips to follow when
Q. Officer, I am placing a copy of your department report face down in front of you.
GateWay Community College Phoenix, AZ Q/A Dictation (20 word Count) Q. Officer, I am placing a copy of your department report face down in front of you. Please feel free to use that document at any time
2012 NORTON CYBERCRIME REPORT
2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,
OPSEC and Safe Social Networking
OPSEC and Safe Social Networking Agenda Introduction Did you know? Social media access What not to post Privacy settings Geotagging Social Media OPSEC for units Social media concerns for Families and Family
2. Begin gathering necessary documents for student (refer to Record Acknowledgement Form)
Dear Colleague, This notice is to share some recent changes we ve made with our Student Onboarding Process. Effective October 1, 2014, our onboarding process is migrating from Public Safety to our Human
Protecting. Personal Information A Business Guide. Division of Finance and Corporate Securities
Protecting Personal Information A Business Guide Division of Finance and Corporate Securities Oregon Identity Theft Protection Act Collecting, keeping, and sharing personal data is essential to all types
Identity Theft Prevention Program Compliance Model
September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All
83-20-10 Secure Data Center Operations Gilbert Held Payoff
83-20-10 Secure Data Center Operations Gilbert Held Payoff The data center stores information necessary for the effective and efficient operation of the entire organization. Loss of this data, conveyance
Overseas business travel. Health, safety and security insights to help business travelers
Health, safety and security insights to help business travelers Health, safety and security insights to help business travelers Introduction Business professionals face a wide range of potential risks
PBX Fraud Information
PBX Fraud Information Increasingly, hackers are gaining access to corporate phone and/or voice mail systems. These individuals place long distance and international calls through major telecom networks
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
Frequently Asked Questions. OPM Data Breach. Department of the Navy
Frequently Asked Questions OPM Data Breach Department of the Navy 17 June 2015 (New Information Included) Table of Contents Summary... 2 Notification Update New... 2 General Information... 4 What s Next...
IS-906: Awareness. Visual 1 IS-906: Workplace Security Awareness
IS-906: Workplace Security Awareness Visual 1 Course Administration Sign-in sheet Course evaluation forms Site logistics Emergency procedures Breaks Restrooms Cell phones/blackberrys Visual 2 Course Objectives
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
Smart cyber security for smart cities
Competence Series Smart cyber security for smart cities 1 IT Security made in Europe Cities are becoming smarter Population growth, urbanisation trends and climate change are driving a process of continuous
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
Security Systems Surveillance Policy
Security Systems Surveillance Policy Version: 1.0 Last Amendment: Approved by: Executive Policy owner/sponsor: Director, Operations and CFO Policy Contact Officer: Manager, Facilities & Security Policy
SAINT LOUIS UNIVERSITY STUDY ABROAD PARTICIPATION AGREEMENT AND ASSUMPTION OF RISK AND RELEASE OF CLAIMS
SAINT LOUIS UNIVERSITY STUDY ABROAD PARTICIPATION AGREEMENT AND ASSUMPTION OF RISK AND RELEASE OF CLAIMS I, ( ), the undersigned student, wish to participate in a study abroad Program offered by Saint
HIPAA 101: Privacy and Security Basics
HIPAA 101: Privacy and Security Basics Purpose This document provides important information about Kaiser Permanente policies and state and federal laws for protecting the privacy and security of individually
Insider Threats in the Real World Eavesdropping and Unauthorized Access
Insider Threats in the Real World Eavesdropping and Unauthorized Access A Visual Data Security Whitepaper Prepared by: OptioLabs Camden Yards 323 West Camden Street, Suite 801 Baltimore, Maryland 21201
DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008
DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 This model has been designed to help water and wastewater utilities comply with the Federal Trade Commission s (FTC)
Minerals Technologies Inc. Summary of Policies on Business Conduct
Minerals Technologies Inc. Summary of Policies on Business Conduct Lawful and Ethical Behavior is Required at All Times This Summary of Policies on Business Conduct (this "Summary") provides an overview
Corporate Spying An Overview
Corporate Spying An Overview With the boom in informational and technological advancements in recent years, there comes the good and the bad the bad being more susceptibility to the theft of confidential
Merchant Business Solutions. Protecting business against credit card fraud.
Merchant Business Solutions. Protecting business against credit card fraud. Version 4.0 May 2011 Contents Protect your business 3 Authorisation 4 Chargebacks 5 Verification of Purchaser 6 Types of goods
CAMPUS SECURITY INFORMATION ANNUAL CAMPUS SECURITY REPORT-TULSA
CAMPUS SECURITY INFORMATION ANNUAL CAMPUS SECURITY REPORT-TULSA The following statistics are provided as part of the requirement under the Student Right- To Know and Campus Security Act, Public Law 101-542,
WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM
BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade
