Sensitive Security Information, Certified® (SSI) Body of Knowledge: 1st Edition (Paperback) book cover

Sensitive Security Information, Certified® (SSI) Body of Knowledge

1st Edition

By American Board for Certification in Homeland Security

CRC Press

328 pages | 6 B/W Illus.

Purchasing Options:$ = USD
Paperback: 9781498752114
pub: 2016-02-24
SAVE ~$17.19
Hardback: 9781138472488
pub: 2018-06-08
SAVE ~$39.00
eBook (VitalSource) : 9780429255298
pub: 2018-06-08
from $117.00

FREE Standard Shipping!


Sensitive security information (SSI) is a category of sensitive but unclassified information under the United States government's information sharing and control rules. SSI plays a crucial role in all types of security. It is information obtained in the conduct of security activities which, if publicly disclosed, would constitute an unwarranted invasion of privacy, reveal trade secrets, share privileged or confidential information, harm transportation security, or allow hostile elements to avoid security controls.

Divided into seven sections, the Sensitive Security Information Certified® (SSI) Body of Knowledge provides a comprehensive source that helps you prepare for certification in SSI protection. It reviews and discusses relevant topics in

  • The history and definition of SSI
  • Espionage, security breaches, and detection
  • Personal information security
  • Corporate security
  • Government security
  • Legislation and regulations
  • Identity theft

Within the sections, the book covers a wide range of subjects related to aiding protection of SSI, including

  • Good information practices
  • The psychology of spies
  • Methods to detect potential betrayal
  • Methods for handling sensitive information
  • Establishing security plans for sensitive information
  • Monitoring techniques such as the use of closed-circuit video cameras

In a world of ever-changing technology with massive amounts of information available to the public in a matter of seconds, government, businesses, and individuals must take extra precautions in securing their SSI. This book equips you with the essential knowledge to become certified in SSI protection, and will serve as a valuable reference afterward in remaining an effective security professional charged with protecting SSI.

Table of Contents


The History of SSI

The Context of Sensitive Security Information (SSI)

Defining SSI

Securing SSI


Terms and Definitions

Government Information

Public Information

Personal Information

Sensitive but Unclassified (SBU) Information


The Importance of SSI

Dangers to Sensitive Information

Thwarting Economic Espionage

Sensitive Information and Where It Exists

Identifying Computer Vulnerabilities

Domestic Economic Espionage


The History of the SSI Classification System

1951: Executive Order 10290

1953: EO 10501

1966: Freedom of Information Act

1974: The Privacy Act

1977: Presidential Directive (PD/NSC-24)

1985: National Security Decision Directive

1987: Computer Security Act

1992: "CIA Openness"

1995: EO 12958

2002: The Card Memorandum

2003: EO 13292

2005: SBU Information Memorandum



The History of Spies and Espionage

Espionage in Ancient Times

Espionage: Ninth Century AD–Eighteenth Century AD

Pre-20th-Century Events

The Revolutionary War

The 1800s: New Inventions

Civil War Spying

Early 20th Century

World War I: A Proving Ground for Espionage

Spies Helped Allies Win World War II

The Cold War

September 11, 2001, and Its Aftermath

Recent History—More Lapses in Security


Espionage and Psychology

Janet Mielke Schwartz, PhD, DABFE, DACFM, DABPS, FACE, CHS III

Development of the Office of Strategic Services

Mission and Purpose of the OSS

The Making of a World War II Spy

Exploring the Mind of a Spy

Categories of Spies

Indicators of a Growing Problem

Concluding Remarks


Spies and Espionage

Profile of a Spy

A Double Life

Types of Spies

Social Engineering and Countermeasures

Social Engineering



Deception Detection

Establish a Baseline

Common Suspicious Behaviors

Macro and Micro Expressions

Eye-Accessing Cues

Truth Detection Equipment

Your Intuition

Handwriting Analysis


Home Computer Security

E-mail Issues

Website / E-commerce Issues

Social Networking and Cyberstalking

Other Issues


Security while Traveling

Travel Preparations

Importance of Identification

Travel Precautions

Precautions while Staying in a Foreign Country


Securing Business SSI

Corporate Spying

No Business Is Safe

International Organization for Standardization Guidelines

Choosing a Security Company

Responding to a Security Breach

Preventing Physical Theft

Security Breach Notification Laws

Your Opportunity to Comment

ANSI Standards

The ANSI INCITS 359-2004

ANSI INCITS 359-2004 Organization

ANSI INCITS 359-2004 as the RBAC Standard


Corporate National Institute of Standards and Technology (NIST)

The Importance of Using National Institute of Standards and Technology (NIST)

Due Care and Due Diligence

Processes and Methodologies

Advantages of Using NIST

Conducting Risk Assessments


Information Storage and Transmission

Cybersecurity Challenges

Protecting Your Most Sensitive Information


Cyber Checklists

Data Storage Tips


The Intelligence Process

Intelligence and Counterintelligence

Military Intelligence


The Law and Homeland Security


Executive Summary

History of Electronic Surveillance and FISA Court

Political Fallout of Electronic Surveillance

Impact of Electronic Surveillance


The Department of Homeland Security (DHS) Structure

Department Subcomponents and Agencies

Department Components


Government Laws

Economic Espionage Act of 1996


Government and HIPAA

SSI-Related Laws and Terminology

Access to Information

Privacy of Electronic Data and Computers


Privacy Laws

Trade Secrets

National Industrial Security Program (NISP)

NISP Overview

Classified Information

Components of the NISP (DOD)

The FSO and the Industrial Security Representative (IS REP)

Structure of DSS: Industrial Security

Sensitive but Unclassified (SBU) Information Control Procedures

Policies to Control SBU Information

Policies to Protect Specific Types of Sensitive Information Involving Scientific and Technical Applications

SSI Controls: Transportation

Identifying and Handling SSI

Controls on Environmental Impact Information

Controls on Unclassified Biological Research Information

Issues Dealing with Geospatial Information

The DHS’s SBU Directives

Operation Security: A Law Enforcement Concern

The Role of Operational Security

Information Sources for Criminals

Preventing Breach of Security

Developing a Security Plan

Camera Surveillance

Dennis Treece

Setting up Camera Surveillance

Issues to Consider

Eavesdropping Threats and IP Phone Systems

Eavesdropping Threats

IP Phone Systems

Facility Security

Homeland Security Presidential Directive 12

Who Manages the PIV Program?

What Do You Need to Implement PIV-I?

What Do You Need to Prepare for PIV-II?

Integration with Existing Infrastructure


Fair and Accurate Credit Transactions Act


What Is FACTA?

What Agencies Promulgated the Red Flags Rule?

FACTA Guidance

Penalties for Non-Compliance to Red Flags

Benefits of Complying to Red Flags

Identity Theft Red Flags under FACTA

Red Flags

Identity Theft Defined

Types of Identity Theft

Development and Implementation of a Red Flags Prevention Program

Written Program

Administering the Program

Maintaining an Identity Theft Red Flags Program


About the Author

The Center for National Threat Assessment (CNTA) is an intellectual property management group that is responsible for overseeing the certification process of professionals in homeland security, forensics, psychotherapy and integrative medicine. CNTA manages the American Board for Certification in Homeland Security, the American College of Forensic Examiners Institute, the American Psychotherapy Association, and the American Association of Integrative Medicine. Leading professionals from the four associations provide CNTA with a pool of intellectual capital and enhance the field of their respective profession by writing and publishing important articles in four monthly peer-reviewed journals: Inside Homeland Security, The Forensic Examiner, the Annals of American Psychotherapy, and The American Association of Integrative Medicine Journal. The CNTA is responsible for the maintenance and development of over 32 certifications in homeland security, forensics, psychotherapy, and integrative medicine. The CNTA strives for all of its exams and certification processes to be psychometrically valid and meet the American National Standards Institute’s 17024 international standards for personnel certification.

About the Series

Center for National Threat Assessment

Learn more…

Subject Categories

BISAC Subject Codes/Headings:
COMPUTERS / Security / General
POLITICAL SCIENCE / Political Freedom & Security / International Security
POLITICAL SCIENCE / Political Freedom & Security / Terrorism