Employees' Guide to Security Responsibilities

  Click here for the
  Security Quiz


Return to RSP Home Page

About this Briefing

For Protecting Information
Personal Conduct and
Reporting Requirements
Foreign Threats
To Protected Information
Computer and Other
Technical Vulnerabilities
Understanding and Helping
With Personal Problems
Spy Stories
Treason 101
Complete List of Contents

List of Contents

Procedures For Protecting Information

Protecting Classified Information
  Handling Classified Information
  Classification Guidelines & Distribution Controls
  Marking Classified Information
  Mailing & Carrying Classified Materials
  Foreign Government Classified Information
  Security Violations

  Using the STU-III

Appropriate Use of Computer Systems
  Glossary of Definitions
Protecting Sensitive Unclassified Information
  Appropriate Use of Computer Systems
  Freedom of Information Act
  Operations Security (OPSEC)
  Pre-Publication Review of Web Site Content
  For Official Use Only & Similar Designations
  DoD Technical Data
  Privacy Act Information
  Export-Controlled Information
  Source Selection Data
  Proprietary Information & Trade Secrets
  Unclassified Controlled Nuclear Information

Personal Conduct and Reporting Requirements

Standards of Personal Conduct
  What Is Expected of Me?
  Examples of Behavior of Security Concern
  Adjudicative Guidelines
Self-Reporting on Your Personal Activities
  General Requirements
  Foreign Contacts
  Outside Activities
  Pre-Publication Review
  Reporting Foreign Intelligence Activity 
Reporting "Anomalies"
Reporting Improper, Unreliable, or Suspicious Behavior
  Reporting Responsibilities
  Counterintelligence Indicators
  Security and Suitability Issues
  Preventing Violence
  No Good Excuses for Not Reporting

  People Who Made a Difference
  Hotline Numbers
U.S. Government Ethics Standards
  Gifts from Outside Sources
  Gifts Between Employees
  Conflicting Financial Interests
  Frequent Flyer Benefits and Bumping
  Impartiality in Performing Duties
  Misuse of Position
  Representation to Government Agencies
  Outside Activities
  Financial Disclosure
  Supplementation of Salary
  Seeking Other Employment
  Advisory Letters, Memoranda and Formal Opinions

Foreign Threats to Protected Information

Who's Doing What to Whom?
  Economic Collection & Industrial Espionage
  Illegal Technology Transfer
  Computer Crime

  National Security Threat List
  Militarily Critical Technologies List
  Economic Espionage Act of 1996
How Do I Know When I'm Being Targeted and Assessed?
  Road to Recruitment
  Who Is Most Likely to Be Targeted?
Getting Information Out of Honest People Like Me
  Methods of Operation
  False Pretenses
  Unsolicited Requests
  Short-Term Foreign Visitors
  Long-Term Foreign Visitors
  Joint Ventures/Foreign Acquisitions
  Collection from Open Sources
  Theft and "Dumpster Diving"
Risks During Foreign Travel
  You Are the Target
  Country-Specific Threat Updates
  Security & Safety Recommendations
  Avoiding/Recognizing Intelligence Interest
  Contact with Foreign Relatives
  Theft While Traveling
  Overseas Communications
  Bugging Hotel Rooms
  Reporting Security Incidents
  What to Do If Arrested
Antiterrorism and Force Protection
  Traveling Outside the U.S.
  Living Outside the U.S.
  Defensive Driving Overseas
  Package and Letter Bombs
  Kidnapping & Hostage Survival Guidelines
  Hijacking Survival Guidelines
  DOD Code of Conduct

Computer and Other Technical Vulnerabilities

Computer Vulnerabilities
  Threats to Computer Systems
  How Hackers Work
  Case 1
  Case 2
  How We Make It Easy for the Hackers
  Weak Passwords
  "Social Engineering"
  Insecure Modems
  Using the Internet Securely
  E-Mail Pitfalls
  Viruses and Other "Infections"
  Security of Hard Drives
  Security of Laptops
Intercepting Your Communications
  Overview & Countermeasures
  Fax Machines
  Cellular Phones
  Cordless Phones
  Answering Machines
  Voice Mail
  Intercoms & Baby Monitors
Bugs and Other Eavesdropping Devices
  Overview of the Threat 
  Eavesdropping Methods
  Detecting and Preventing Eavesdropping

Understanding and Helping
With Personal Problems

Employee Assistance
  Alcohol Abuse and Dependence
  Compulsive Gambling

  Domestic Abuse
  Drug Use
  Eating Disorders
  Financial Problems
  Sexual Addiction
  Suicide Crisis Intervention

True Spy Stories

Learning from Experience
You Can Make a Difference
American Travelers Abroad
Ames: Too Many Weaknesses

Cavanagh Wanted to Be Wealthy
Charlton: Disgruntled Engineer
Consulting Led to Espionage
Espionage Killed the Company
Hamilton Tried to Prevent a War
Hacking Computers from Overseas
Illegal Export of Poison Gas
Lalas: Something Wasn't Right
Lipka: No Statute of Limitations
Notable Industrial Security Cases
Pollard: Grandiose Imagination
Ramsay Recruited Drug Users
Walker Was "Intrinsically Evil"
Voice Mail Is Vulnerable

Treason 101

How Spies Are Caught
The Insider Espionage Threat
The Insider Threat to Information Systems
Exploring the Mind of the Spy
Espionage by the Numbers


Return to RSP Home Page