You are on page 1of 4

January 2013 Vol.

1 Issue 1

Message from the Installation Security Office

Greetings, Please enjoy our first Security newsletter. The Installation Security Office will work hard towards providing Unit Security Managers across Fort Irwin with useful tools and information to improve their organizations Security Programs, and we hope the newsletter helps attain that goal. This edition has lots of great and useful information. If you have any suggestions to improve or add to upcoming newsletters please let me know.

Newsletter Contents
Installation Security 1 Managers Message Security and Intelligence 2 Security Education Training and Awareness 3 Industrial Security 4

Kenneth Henry
Installation Security Manager

Garrison Mission Statement

Vision: A community of choice within the Army, known as a Soldier and Family quality living environment. Mission: Ensure a sustainable community with a quality of life thats appropriate for an all volunteer force while continuously improving the garrison organization to ensure it is prepared to meet the challenges of an ever changing environment.

NTC, Fort Irwin Bldg 237 C Ave Fort Irwin, CA 92310 E: P: 760-380-3324 F: 760-380-6647

Security and Intelligence Branch Overview and Staff

January 2013

PERSONNEL SECURITY BRANCH Provide oversight for the Personnel Security standards used in determining a person is suitability under national security criteria for appointment or retention in the federal government. Implement policies and procedures to determine eligibility for access to classified information and assignment to sensitive/non-sensitive positions in accordance with regulatory guidance. Process applications for security clearances to meet investigative and adjudicative standards necessary for deployment and federal employment. Provide individual counseling to assist with adverse action taken as the result of personnel security determinations and unfavorable personnel security determinations defined by regulatory guidance. This includes security services to assist with due process procedures for appealing adverse administrative actions rendered by Department of Defense adjudicative agencies.

Vol. 1 Issue 1

Installation Security Office Location: Bldg 237, Room 125 Office Hours Monday-Friday 0730-1600 Information Security and Industrial Security Office Location: Bldg 237, Room 130 Office Hours Monday-Friday 0730-1600

Security and Information Branch The Security and Intelligence Branch includes Information Security (INFOSEC), Industrial Security (IS), Security Education Training and Awareness (SETA), and Personnel Security (PERSEC). We also support Foreign Representative Visitor Requests, the Installation Operations Center, and the Force Protection program. Under the Army INFOSEC Program, the security office provides Staff Assistance Visits (SAVs), courtesy inspections, and other INFOSEC mechanisms to Garrison and supported tenant organizations. We are here to help any organization on the Installation improve its INFOSEC program.

Personnel Security Location: Bldg 237, Room 125 Office Hours Monday-Friday 0730-1600

Instill in personnel a desire and a commitment to be proactive in the execution of their security duties.

Security Education Training and Awareness (SETA)

Information Security
Reminder: Information Security (INFOSEC) is covered under AR 380-5, and is everyones responsibility. This program is primarily designed to implement controls and measures for protecting and safeguarding classified information from unauthorized disclosure. Army personnel are required to receive an initial INFOSEC briefing upon arrival to a new organization, and annually for refresher training. Contact the INFOSEC Program Manager regarding security concerns in your organization. Understanding your responsibilities in preventing and responding to security incidents or compromises (including classified spillages). According to AR 380-5, Paragraph 10-1a, the compromise or loss of classified information can cause damage to our national security. If classified material is lost, it cannot be determined if the information has been compromised. When loss or compromise of classified information happens, immediate action is required to minimize any damage and eliminate any conditions that might cause further compromises. Each incident in which classified information or material may have been lost or compromised must be the subject of a preliminary inquiry as described in AR 380-5, Chapter 10. The purposes of this preliminary inquiry will be to: Determine whether classified information was compromised and, if so, whether there is damage to the national security. For more information on preliminary inquiries and other responsibilities when responding to actual or potential security incidents, check out Chapter 10 in AR 380-5, or contact the Installation Security Manager.
January 2013 Vol. 1 Issue 1 1

SETA: Security Education Training

and Awareness It is the SETA goal to enhance the security posture of the U.S. Army by promoting and communicating security awareness across broad security disciplines to all designated security personnel. The Army G-2 is emphasizing the SETA website ( seta/default.aspx) as a communication tool to stay current on all SETA/SPeD news and future effort. The SETA website was created with the intentions of providing security professionals access to SETA information from the comforts of their own home. Website contains security program elements, training opportunities, security events, and a security toolbox.
The soldier, above all other people, prays for peace, for he must suffer and bear the deepest wounds and scars of war.

Douglas MacArthur

What is the Industrial Security Program?

The Department of Defense states that Industrial Security is the portion of in-formation security concerned with the protection of classified information in the custody of U.S. industry. The purpose of the Industrial Security Program is to safeguard classified information that may be or has been released to cur-rent, prospective or former contractors. To promote our national interests, the U.S. Government issues contracts, li-censes, and grants to nongovernment organizations to include Universities, consultants and contractors. National security also requires that the industrial security program promote economic and technological interests of the U.S. The U.S. industry develops and produces the majority of our nation's defense technology much of which is classified and as a result, plays a significant role in creating and protecting the information that is vital to our nation's security. The National Industrial Security Pro-gram (NISP) was established by Executive Order 12829, as amended, to ensure that cleared U.S. defense contractors safeguard the classified information in their possession. The National Security Council sets policy for the NISP, while the Director of the Information Security Oversight Office (ISOO) is the authority for implementation. Under the ISOO, the Secretary of Defense is the Executive Agent, but the NISP recognizes four different Cognizant Security Agencies, all of which have equal authority; the Department of Defense, the Department of Energy, the Central Intelligence Agency, and the Nuclear Regulatory Commission. Pursuant to the NISP is the establishment of the National Industrial Security Pro-gram Policy Advisory Committee (NISPPAC). The NISPPAC is chaired by the Information Security Oversight Office (ISOO) and has representation from DoD, non-DoD Agencies and 7 appointed members of Industry that collectively represent all of industry. The NISPPAC is responsible for recommending changes in industrial security policy through modifications to the NISP, its implementing directives, and DoD 5220.22-R, Industrial Security Regulation. The NISPPAC also advises ISOO on all matters concerning the policies of the NISP, including recommended changes to those policies, and serves as a forum to discuss policy issues in dispute. Currently, there are approximately 13,000 contractor facilities that are cleared for access to classified information. The Defense Security Service (DSS) estimates that around 11 million classified documents are in the hands of U.S. industry. At this time, there is no DoD database which provides the exact number of classified contracts the Army currently holds; however, a recent HQDA, G-2 data call was forwarded to the Army Commands, Direct Reporting Units and Army Service Component Commands in support of the Army Security Manpower Model to gather the total number of classified con-tracts. To have access to U.S. classified information and participate in the NISP, a con-tractor must have a legitimate requirement, must demonstrate the ability to protect the classified information to the appropriate level, and must execute a Defense Security Agreement, DD Form 441, which is a legally binding document between the government and contractor. This Agreement sets forth the responsibilities of both parties and obligates the contractor to abide by the security requirements of DoD 5220.22-M, National Industrial Security Program Operating Manual (NISPOM). The Security Agreement (DD Form 441), executed between the government and all cleared facilities under the NISP, obligates the Government to provide the contractor appropriate classification guidance for the protection of the classified information, furnished to or generated by the con-tractor, in the performance of a classified contract. The Government fulfills this obligation by incorporating a Security Requirements Clause and a DD Form 254 for each classified contract. The clause identifies the contract as a classified contract and the DD Form 254 provides classification guidance. The DD Form 254 is a contractual specification. It is as important as any other specification in a contract. It is the vehicle that provides the contractor with the security classification guidance necessary for the classified information to be received and generated under the contract. It was developed as a contractual document to capture all of the security requirements for a classified contract and legally bind the contractor to adhering to them in the execution of the contract. The Federal Acquisition Regulation (FAR) requires that a DD Form 254 be integrated in each classified con-tract. The DD Form 254 provides the contractor (or a subcontractor) security requirements and the classification guidance that is necessary to execute a classified contract. Ultimately, the purpose of the Indus-trial Security Program is to safe-guard classified information in the custody of contractors. The security of the U.S. depends in part on the proper handling and storage of classified information re-leased to industry.

Kenneth L. Henry Personnel Security

Installation Security Office

DPTMS / PERSEC Bldg 237 C Ave Fort Irwin, CA 92310