background preloader

Security References

Facebook Twitter

Emergency and Disaster Information Service. Federal Govt. The Official Home of the Department of Defense. INSA Publications. Download Directory Strategic Cyber Intelligence March 2014 The Intelligence and National Security Alliance (INSA) Cyber Intelligence Task Force defined the strategic, operational, and tactical levels of Cyber Intelligence in its white paper The Operational Levels of Cyber Intelligence. While much attention has been directed towards the tactical, on-the-network cyber domain, this paper contends that not enough resources have been devoted to strategic cyber intelligence.

Click here to download the white paper. Leveraging Emerging Technologies in the Security Clearance Process March 2014 Recent compromises of U.S. government national security information highlight the need to focus on the periodic reinvestigation (PR) process and make fundamental improvements. Click here to download this white paper. A Preliminary Examination of Insider Threat programs in the U.S. September 2013 Operational Levels of Cyber Intelligence April 2013 IC ITE – Doing in Common What is Commonly Done February 2013 May 2011. CI CENTRE.

Intelligence Organizations

Companies. NIST Issues Risk Assessments Guidance - GovInfoSecurity. SP 800-30 Provides a Step-By-Step Approach The National Institute of Standards and Technology has issued what could be characterized as the bible of risk assessment. Special Publication 800-30 Revision 1, Guide for Conducting Risk Assessments, provides direction for conducting risk assessments and amplifies the guidance found in SP 800-39: Managing Information Security Risk. Though SP 800-30 was written for federal information systems and organizations, its lessons can be applied to other organizations in and out of government. Ron Ross, NIST fellow and one of the authors of the new guidance, says risk assessments are essential tools for managers.

"With the increasing breadth and depth of cyberattacks on federal information systems and the U.S. critical infrastructure, risk assessments provide important information to guide and inform the selection of appropriate defensive measures so organizations can respond effectively to cyber-related risks," he says. Continuous Monitoring. Regulations.gov. Sf86. 521091p. United States Department of Defense (defense.gov) Ig-security3. Defense Security Service (DSS) NISP Library. Nispom2006-5220. PerSecExpress - Personnel Security Screening/Clearance Application. PerSec Express is the first commercial off-the-shelf software designed to meet the needs of government organizations that complete personnel security screening. It allows flexible, scalable installation to meet the needs of any size of government institution. It is effective whether the institution has a single office or has dispersed operations around the globe.

Why PerSec Express? Most institutions require candidates seeking security screening to manually complete forms. These are forwarded to security personnel who extract information for checks, etc. With PerSec Express, all these administrative steps are reduced. How does PerSec Express Work? The candidate seeking a security clearance completes all input on the system screens. A verification capability is built into the system. The system also has a second level monitor / control capability.

The information submitted is captured on a secure server. Where can you get PerSec Express? Near Shore Consulting20 Quartz Cres. A Brief History of the U.S. Personnel Security Program. The roots of the U.S. Personnel Security Program can be traced back to the Civil Service Act of 1883 that required applicants for federal employment to possess the requisite character, reputation, trustworthiness, and fitness for employment. In 1912 the LaFollette Act established protection for federal employees from being fired from their jobs for arbitrary reasons and imposed a standard of “just cause” that would promote the “efficiency of the service,” a concept later applied to security clearance determinations.

The Hatch Act of 1939 added a prohibition against anyone employed by the government from being a member of any organization that advocates overthrowing the U.S. Government. Executive Order 8781 (1941) required fingerprinting of all federal employee and directed the FBI to establish a system to check criminal records. In 1942 War Service Regulation II denied federal employment to anyone whose loyalty was in “reasonable doubt.” William H. Security clearance. A security clearance is a status granted to individuals allowing them access to classified information (state or organizational secrets) or to restricted areas, after completion of a thorough background check.

The term "security clearance" is also sometimes used in private organizations that have a formal process to vet employees for access to sensitive information. A clearance by itself is normally not sufficient to gain access; the organization must also determine that the cleared individual needs to know specific information. No one is supposed to be granted automatic access to classified information solely because of rank, position, or a security clearance. Canada[edit] Background[edit] Checks include basic demographic and criminal record checks for all levels, and, depending on an individual appointment's requirements, credit checks, loyalty, and field checks might be conducted by the RCMP and/or CSIS.

Hierarchy[edit] Four levels of personnel screening exist:[3] Security screening[edit] Security Clearance Frequently Asked Questions (FAQ) JASON (advisory group) JASON is an independent group of scientists which advises the United States government on matters of science and technology. The group was first created as a way to get a younger generation of scientists—that is, not the older Los Alamos and MIT Radiation Laboratory alumni—involved in advising the government. It was established in 1960 and has somewhere between 30 and 60 members. For administrative purposes, JASON's activities are run through the MITRE Corporation, a non-profit corporation in McLean, Virginia, which contracts with the Defense Department. JASON typically performs most of its work during an annual summer study.

The name "JASON" is sometimes explained as an acronym, standing either for "July August September October November", the months in which the group would typically meet; or, tongue in cheek, for "Junior Achiever, Somewhat Older Now". In 2002, DARPA decided to cut its ties with JASON. JASON studies include: Security Executive Council - Risk Management Strategies, Research, Advisory Services. Jse_10_1_puthoff - CIA Initiated Remote Viewing.