Menu:

Updates:

30 Aug 2016:

Security Tab updated

Women owned Small Business (WOSB)

CA Supplier Clearinghouse (WBE)

Former SBA 8(A)Certified Participant

Small Disadvantaged Business (SDB)

Links:

 

Security

DenMar, as a Government service contractor, has an obligation to all of our customers and the nation as a whole to be ever vigilant with any information or data that we come in contact with on our Government service contracts.  We must be ever aware that we may be contacted via a number of different ways…e-mail, letters, telephone calls, faxes, social media, casual conversations during or after work, etc.   We must also be alert and always cognizant of what is going on around us to ensure we safeguard our actions and words as well as actions of fellow co-workers and others we may come in contact with.

Insider Threats

Overview:It is a sad reality, but the United States has been betrayed by people holding positions of trust.  Arguably, “insiders” have caused more damage than trained, foreign professional intelligence officers working on behalf of their respective governments.  Not every suspicious circumstance or behavior represents a spy in our midst, but every situation needs to be examined to determine whether our nation’s secrets are at risks.


DSS Definition:  Insider threats are acts of commission or omission by an insider who intentionally or unintentionally compromises or potentially compromises DoD’s ability to accomplish its mission.  These acts include, but are not limited to, espionage, unauthorized disclosure of information, and any other activity resulting in the loss or degradation of departmental resources or capabilities.

How do you recognize an Insider Threat?

Potential Espionage Indicators:

  • Failure to report overseas travel or contact with foreign nationals
  • Seeking to gain higher clearance or expand access outside the job scope
  • Engaging in classified conversations without a need to know
  • Working hours inconsistent with job assignment or insistence on working in private
  • Exploitable behavior traits
  • Repeated security violations
  • Attempting to enter areas not granted access to

Commonalities of those who have committed espionage since 1950:

  • More than 1/3 of those who committed espionage had no security clearance
  • Twice as many “insider’ volunteered as were recruited
  • 1/3 of those who committed espionage were nationalized U. S.
  • More recent spies acted alone
  • Nearly 85% passed information before being caught
  • Out of the 11 most recent cases, 90% used computers while conducting espionage and 2/3 used the internet to initiate contact

Why is the Insider Threat significant?
An insider can have a negative impact on national security and industry resulting in:

  • Loss or compromise of classified, export-controlled, or proprietary information
  • Weapons systems cloned, destroyed, or countered
  • Loss of technological superiority
  • Economic loss
  • Loss of Life

Reportable Behaviors
Information Collection:

  • Keeping classified materials in an unauthorized location
  • Attempting to access sensitive information without authorization
  • Obtaining access to sensitive information inconsistent with present duty requirements

Information Transmittal:

  • Using an unclassified medium to transmit classified materials
  • Discussing classified materials on a non-secure telephone
  • Removing classification markings from documents

Additional Suspicious Behaviors:

  • Repeated or un-required work outside of normal duty hours
  • Sudden reversal of financial situation or a sudden repayment of large debts or loans
  • Attempting to conceal foreign travel

How can YOU help?

YOU and your colleagues are the first line of defense against espionage.  Help protect our national security by reporting any suspicious behavior that may be related to a potential compromise of classified information.


Be aware of the actions of those around you and report suspicious behaviors.

Foreign Travel

Foreign travel increases the risk of foreign intelligence targeting. You can be the target of a foreign intelligence or security services at any time and any place; however, the possibility of becoming the target of foreign intelligence activities is greater when you travel overseas.

Collection techniques include:

  • Bugged hotel rooms or airline cabins
  • Intercepts of fax and e-mail transmissions
  • Recording of telephone calls/conversations
  • Unauthorized access and downloading, including outright theft of hardware and software
  • Installation of malicious software
  • Intrusions into or searches of hotel rooms, briefcases, luggage, etc.
  • Recruitment or substitution of flight attendants

Some common sense security countermeasures should include:

  • Do not publicize travel plans and limit sharing of information to people who need to know
  • Conduct pre-travel security briefings
  • Maintain control of sensitive information, media and equipment.  Do not pack these types of articles in checked baggage
  • Keep hotel room doors locked. Note how the room looks when you leave
  • Limit sensitive discussion. Public areas are rarely suitable for discussion of sensitive information.
  • Do not use computer or fax equipment at foreign hotels or business centers for sensitive matters
  • Ignore or deflect intrusive or suspect inquiries or conversations about professional or personal matters
  • Keep unwanted sensitive materials until it can be disposed of securely

BOTTOM LINE:  BE ASSERTIVE.  BE ALERT.  BE AWARE OF ACTIONS OF THOSE AROUND YOU.  REPORT SUSPICIOUS ACTIVITY TO THE FSO!

COMPANY FACILITY SECURITY OFFICER (FSO)

Dennis R. Holland, (580) 355-8900 [office] or (580) 678-0062 [cell]