List of Contents

Procedures For Protecting Information

Protecting Classified Information
  Overview
 
Need-to-Know
  Handling Classified Information
  Classification Guidelines & Distribution Controls
  Marking Classified Information
  Mailing & Carrying Classified Materials
  Foreign Government Classified Information
  Security Violations

  Using the STU-III

 
Appropriate Use of Computer Systems
  Glossary of Definitions
Protecting Sensitive Unclassified Information
  Overview
  Need-to-Know
  Appropriate Use of Computer Systems
  Freedom of Information Act
  Operations Security (OPSEC)
  Pre-Publication Review of Web Site Content
  For Official Use Only & Similar Designations
  DoD Technical Data
  Privacy Act Information
  Export-Controlled Information
  Source Selection Data
  Proprietary Information & Trade Secrets
  Unclassified Controlled Nuclear Information

Personal Conduct and Reporting Requirements

Standards of Personal Conduct
  What Is Expected of Me?
  Examples of Behavior of Security Concern
  Adjudicative Guidelines
Self-Reporting on Your Personal Activities
  General Requirements
  Foreign Contacts
  Outside Activities
  Pre-Publication Review
  Reporting Foreign Intelligence Activity 
 
Reporting "Anomalies"
Reporting Improper, Unreliable, or Suspicious Behavior
  Reporting Responsibilities
  Counterintelligence Indicators
  Security and Suitability Issues
  Preventing Violence
  No Good Excuses for Not Reporting

  People Who Made a Difference
  Hotline Numbers
U.S. Government Ethics Standards
  Introduction
  Gifts from Outside Sources
  Gifts Between Employees
  Conflicting Financial Interests
  Frequent Flyer Benefits and Bumping
  Impartiality in Performing Duties
  Misuse of Position
  Representation to Government Agencies
  Outside Activities
  Financial Disclosure
  Honoraria
  Supplementation of Salary
  Seeking Other Employment
  Post-Employment
  Advisory Letters, Memoranda and Formal Opinions

Foreign Threats to Protected Information

Who's Doing What to Whom?
  Overview
  Economic Collection & Industrial Espionage
  Illegal Technology Transfer
  Computer Crime

  National Security Threat List
  Militarily Critical Technologies List
  Economic Espionage Act of 1996
How Do I Know When I'm Being Targeted and Assessed?
  Introduction
  Road to Recruitment
  Who Is Most Likely to Be Targeted?
Getting Information Out of Honest People Like Me
  Methods of Operation
  Elicitation
  False Pretenses
  Unsolicited Requests
  Short-Term Foreign Visitors
  Long-Term Foreign Visitors
  Joint Ventures/Foreign Acquisitions
  Collection from Open Sources
  Theft and "Dumpster Diving"
Risks During Foreign Travel
  You Are the Target
  Country-Specific Threat Updates
  Security & Safety Recommendations
  Avoiding/Recognizing Intelligence Interest
  Contact with Foreign Relatives
  Theft While Traveling
  Overseas Communications
  Bugging Hotel Rooms
  Reporting Security Incidents
  What to Do If Arrested
Antiterrorism and Force Protection
  Introduction
  Traveling Outside the U.S.
  Living Outside the U.S.
  Defensive Driving Overseas
  Package and Letter Bombs
  Kidnapping & Hostage Survival Guidelines
  Hijacking Survival Guidelines
  DOD Code of Conduct

Computer and Other Technical Vulnerabilities

Computer Vulnerabilities
  Overview
  Threats to Computer Systems
  How Hackers Work
  Case 1
  Case 2
  How We Make It Easy for the Hackers
  Weak Passwords
  "Social Engineering"
  Insecure Modems
  Using the Internet Securely
  "Cookies"
  E-Mail Pitfalls
  Viruses and Other "Infections"
  Security of Hard Drives
  Security of Laptops
Intercepting Your Communications
  Overview & Countermeasures
  Telephones
  Fax Machines
  Cellular Phones
  Cordless Phones
  Answering Machines
  Voice Mail
  Intercoms & Baby Monitors
Bugs and Other Eavesdropping Devices
  Overview of the Threat 
  Eavesdropping Methods
  Detecting and Preventing Eavesdropping

Understanding and Helping
With Personal Problems

Employee Assistance
  Alcohol Abuse and Dependence
  Compulsive Gambling
  Depression

  Domestic Abuse
  Drug Use
  Eating Disorders
  Financial Problems
  Sexual Addiction
  Stress
  Suicide Crisis Intervention


True Spy Stories

Learning from Experience
You Can Make a Difference
American Travelers Abroad
Ames: Too Many Weaknesses

Cavanagh Wanted to Be Wealthy
Charlton: Disgruntled Engineer
Consulting Led to Espionage
Espionage Killed the Company
Hamilton Tried to Prevent a War
Hacking Computers from Overseas
Illegal Export of Poison Gas
Lalas: Something Wasn't Right
Lipka: No Statute of Limitations
Notable Industrial Security Cases
Pollard: Grandiose Imagination
Ramsay Recruited Drug Users
Walker Was "Intrinsically Evil"
Voice Mail Is Vulnerable

Treason 101

Overview
How Spies Are Caught
The Insider Espionage Threat
The Insider Threat to Information Systems
Exploring the Mind of the Spy
Espionage by the Numbers

HOME

INFORMATIONCONDUCT | THREATS | TECH VULNERABILITYASSISTANCE
SPY STORIES | TREASON 101

United States Department of Agriculture | Departmental Management | PDSD Homepage

United States Department of Agriculture
Personnel and Document Security Division
1400 Independence Ave. SW, Washington, D.C. 20250-9305
Telephone: (202) 720-PDSD (7373), Fax: (202) 720-7708
Send us your comments:
pdsd@usda.gov

USDA Privacy Policy | Accessibility Statement