Security at CACI

What You Need to Know

SCENE 1 - EXT. OFFICE BUILDING

The CAMERA pulls back to reveal JIMMY, middle-age, conservatively dressed in a dark suit.

JIMMY approaches with a friendly smile and begins to speak directly into CAMERA.

jimmy 1 of 3

Choosing the right company isn’t easy. You’re looking for a global leader with a reputation for world-class products and service, and a history of superior performance.

But most of all, if you're like me, you're looking for someone you can take advantage of...You see, I'm a crook.

SCENE 2 – EXT. SIDE DOOR OUTSIDE OF OFFICE BUILDING

Several EMPLOYEES head toward the door of the building. All of them are wearing ID badges. Among them is JIMMY, not wearing an ID badge, who flashes a conspiratorial grin.

A YOUNG WOMAN, mid-30’s, is the first to get to the door. She unlocks it with a card key and holds it open helpfully for the others. The other people, including JIMMY, follow in.

jimmy

(politely to woman)

Thank you. Thank you very much.

Young woman

You’re very welcome.

SCENE 3 - OFFICE HALLWAY

JIMMY walks down the hallway speaking in a low voice.

jimmy

Most big companies are ripe for the picking. The goal is to serve customers, and people here want to be helpful. Sometimes they’re a little too helpful for their own good.

Sure, it’s not Tiffany’s. But this company has something just as good as gold: Information. Confidential information. Trade secrets, financial data, new product development plans. Not to mention sensitive information about customers, employees, hey, even about you.

I know people who pay big bucks to get their hands on that kind of information. And stealing it is low risk and nobody gets hurt, at least not much.

But some companies, like yours, don’t see it that way. If any of their sensitive information fell into the wrong hands, it could be very embarrassing for them. They could be sued, lose their customers, have their reputation destroyed. My heart really goes out to them. But, hey, what are they going to do?

Security is YOUR Responsibility

SCENE 4 – SPOKESPERSON

spokesperson

Preserving security is vital to your company’s success. As you’re about to see, every employee has an important role to play in keeping the company safe and secure.

Your perimeter security is your first line of defense. Most criminals are opportunists who will take advantage of a situation if given the chance.

By letting strangers in, you may be giving criminals the opportunity they are looking for.

Be aware of who you allow into your space. Direct strangers to the reception area. If a stranger looks out of place or suspicious, ask if you can assist them. Stay with them until their legitimate business purpose has been established.

And it may sound simple, but don’t leave valuables like your purse or wallet lying around. It only takes a thief a few seconds.

SCENE 5A

CUT BACK TO JIMMY, still in the office, walking down the hallway, pushing something out of frame.

jimmy

Why stop with purses and wallets? This place is loaded with fabulous merchandise.

(lapsing into a department store announcer voice)

Attention shoppers, there’s a blue light special on the second floor.

WIDER SHOT of JIMMY. We now see he is pushing a mail cart as he strolls down the corridor.

We see him pick up a proposal off a nearby desk.

jimmy

What have we here? A marketing plan for next year. This ought to make some interesting reading. Sales and marketing data. Product launch information. This is some fascinating stuff.

He picks up a document lying on a desk.

jimmy

And what’s this? Looks like plans to develop a new product.

(reading)

I bet the competition would like to get an early peek. What do you think?

JIMMY picks up a labeled CD-ROM.

jimmy

And that old standby. Removable media. Makes a great stocking stuffers.

He reads the CD-ROM.

jimmy

Hmm. Customer List. Now, if I can’t find a way to make money on this, well then shame on me.

SCENE 5B

JIMMY, still pushing the shopping cart (now full of data and equipment, etc.) comes to a stop in front of the exit.

jimmy

(giving a testimonial)

I gotta tell you, this place has great information and great prices. I recommend them to my friends.

SCENE 6 – SPOKESPERSON

Shots of people working at desks, retrieving faxes, locking documents and storage media in a desk, etc.

SPOKESPERSON

We tend to view our workspace as our home away from home. But where confidential information is involved, that’s a mistake.

Sensitive documents – correspondence, faxes, proposals, and customer and employee data-- should be kept out of open view when not being used. Work areas should be cleared of confidential information each evening. Confidential proprietary documents should be stored under lock and key. This is especially true for sensitive information stored on removable media.

SCENE 7 – JOHN’S OFFICE

The office is empty, and an unattended laptop sits on the desk. JIMMY peeks into the office, and seeing it empty, strides in.

He walks over to the desk and flips through an engagement calendar that’s sitting there.

jimmy

Hmm, looks like John here is getting ready for a big conference. I should make a note to stop by his house while he’s out of town.

He eyes the laptop.

jimmy

Hmm, what’s this? A cable. Not a bad security device, but it would be a lot more effective is someone bothered to use it.

JIMMY takes the laptop and proceeds out of the office.

SCENE 8 - SUE’S CUBICLE

JOHN, arriving at work, walks into his office, but a moment later walks out again. He approaches the desk where his assistant, SUE, is working.

john

Sue, did you see my laptop?

sue

No.

JOHN

I left it in my office last night.

SUE

I haven’t seen it.

john

The PowerPoint for my whole presentation is on there.

sue

Are you sure you didn’t take it home?

john

Yes, I’m absolutely sure. I left it in my office.

SUE

Oh, my gosh. I sent you an e-mail yesterday with the names of everyone coming to the conference.

john

Yes, but you still have that don’t you?

sue

Yes, but John – it has their credit card numbers for the hotel rooms. That’s 200 credit card numbers.

John looks even more panicked now.

john

It’ll turn up. I mean, it has to.

SCENE 9 – HALLWAY

CUT TO JIMMY who is eavesdropping.

jimmy

Yeah, it’ll turn up all right. But you might be surprised where.

JIMMY opens an EXIT door and hands off the laptop to his CRONY who hands JIMMY a wad of money.

SCENE 10 SPOKESPERSON

As the Spokesperson speaks, we cut away to shots of people locking laptops in desk drawers, traveling with laptops, etc.

spokesperson

One of the frequent computer crimes facing our business is laptop theft. Laptop computers are easily concealed, and because of their high resale value, a thriving market in stolen laptops has developed.

Never leave your laptop in your office overnight without first securing it with a cabling device or locking it in your desk. And when you travel, carry your laptop with you rather than checking it with your baggage.

Also, be sure to protect other portable devices that contain sensitive information like your cell phone, your PDA or BlackBerry.

Keep in mind that the expense of losing of a laptop isn’t just the replacement cost of the machine. The toll in productivity and lost confidential information could be much greater. A single theft could have multi-million dollar consequences.

SCENE 11 OFFICE HALLWAY/CUBICLE 1

CUT BACK TO JIMMY still on the prowl.

jimmy

That’s a lot of bucks, just from one measly laptop. But the information gets even better if I break into your network. I have some hacker friends who specialize in that sort of thing. You’ve probably heard about some of their tricks, like spreading computer viruses on the Internet. Those guys can be so destructive, crashing corporate systems just for fun.

Me, I prefer infiltrating systems for profit. If I can get into your system, I’ll have access to a whole lot of goodies. And it doesn’t take a genius to get in, especially when you’ve practically given me a written invitation.

JIMMY comes to a computer terminal.

jimmy

Of course, I’ll need a password. But that shouldn’t be too hard to get.

SCENE 12 OFFICE CUBICLE 1

JIMMY takes a seat at the computer.

jimmy

You see, people these days have too many things to remember. Phone numbers, credit card numbers, PIN numbers. They don’t have enough human memory left for constantly changing passwords. So they do what most people do. They write it down in a place where they think it’s hidden...

JIMMY lifts up the keyboard to reveal a yellow post-it with the user’s password written on it.

jimmy

Hey, what do you expect? They’re only human.

SCENE 13 SPOKESPERSON

SPOKESPERSON

Passwords are designed to prevent unauthorized users from gaining access to your network. You should never leave passwords anywhere on, or near, your computer. Passwords should be memorized.

You should have a “strong” password, containing both alpha and numeric characters. Passwords should be at least eight characters in length. Choose a password that’s easy to remember but hard to guess. And change your password at least every ninety days.

SCENE 14 OFFICE CUBICLE 1

JIMMY is sitting at the same computer, still logged on to the system. He taps on the keyboard a few moments and then looks up at us.

jimmy

Hmm. This guy’s certainly got some interesting e-mail. In fact, I’d say he’s got a pretty crude sense of humor. I don’t think anyone will be offended if I share some of these ethnic jokes with the rest of the company. After all, they say laughter is the best medicine.

Jimmy taps on the keyboard again, forwarding the e-mail.

SCENE 15 SPOKESPERSON

As the SPOKESPERSON speaks, we see shots of e-mail being sent, web sites, etc.

SPOKESPERSON

E-mail and the Internet are valuable business tools but they do carry certain risks. All e-mail must conform to company policy, and should never be used to send material that may be offensive or damaging to our reputation. Chain letters, hoaxes, and other spam should not be sent from company computers.

The company provides employees access to the Internet for business purposes. Be aware that when you are on the Internet, you are leaving a trail that identifies you as a company employee. When using the Internet, never retrieve information that may be considered offensive and avoid sites where such information is known to be published.

You should also be on the alert for a new kind of high-tech computer scam, known as “phishing.” Phishing uses spam or pop-up messages to deceive you into disclosing sensitive information, such as your credit card number, bank account or Social Security number. A phishing message will direct you to a Web site that looks just like a legitimate organization’s site to trick you into divulging information.

To avoid getting “hooked” by a phishing scam,

· Never reply to emails or pop-up messages that ask for personal or financial information. Legitimate companies do not ask for this information via email.

· If you’re concerned about your account, contact the organization in the email using a telephone number you know to be genuine.

· And be cautious about opening any attachment or downloading any files, regardless of who sent them.

SCENE 16 OFFICE CUBICLE 2

CUT BACK TO JIMMY. He sits down in front of another computer. He searches through various items on the desk.

jimmy

I cannot find this guy’s password anywhere. But, where there’s a will, there’s a way.

He picks up the phone and dials a secretary down the hall.

SCENE 17 OFFICE SECRETARY DESK

SCENE 18 OFFICE CUBICLE 2

CUT TO SECRETARY at her desk.

secretary

Good morning, Mike Sanders’ office.

jimmy

Hi, is Mike in?

secretary

He’s away right now. Can I help you with something?

jimmy

Well, this is Jack Rodgers from I/T. Will he be back later today?

secretary

I’m sorry. He’s traveling. He won’t be back until next week.

jimmy

Is there some way I can reach him? It’s really very important.

secretary

He’s on a plane right now. Can I help you with something?

jimmy

Well, we’ve been having some problems with the main server, and Mike requested a password reset. Is there any chance you know what his old password is?

secretary

Wait a minute. Who is this?

jimmy

Jack Rodgers. From I/T. And I’m going to need his I.D. too.

Secretary

Hold on, please.

The SECRETARY rummages through her desk and pulls out a post-it, clearly marked with MIKE’S passwords.

secretary

I found it. Mike’s ID is MSANDERS, and the password is yellow, Y-E-L-L-O-W.

JIMMY writes this down.

jimmy

Thank you so very much. You are too kind.

SCENE 19 SPOKESPERSON

SPOKESPERSON

In your business, it’s important to respond quickly and professionally to requests for information. But there are times to exercise caution.

Under no circumstance should you ever lend your ID or give out your password to anyone.

When speaking on the phone, be careful about requests for personal information such as home addresses, phone numbers, travel plans, and requests for information about employees. If in doubt, ask for the caller’s number and offer to call back once you’ve verified their right to the information.

You should also be especially careful to protect confidential personal information, such as your birth date or social security number. A criminal with this information can make you the victim of “identity theft.”

SCENE 20 OFFICE CUBICLE 2

BACK TO JIMMY at the computer as before.

jimmy

Well, what do you know? Our friend Mike must be a pretty important guy here. He’s got salary figures for everyone in the office. Of course, that’s not the kind of information I can sell to anyone, but I’m sure some of his colleagues would find it illuminating. Let me just print this out...

JIMMY sends the document to print.

SCENE 21 HALLWAY

JIMMY posts a document on the bulletin board. It reads “EMPLOYEE COMPENSATION - CONFIDENTIAL.”

Just as JIMMY finishes posting, a WOMAN walks down the hall. At first Jimmy is concerned he’s about to be caught red-handed.

woman

Hey. What are you doing here?

jimmy

I was just...

woman

You’re missing Dave’s birthday party.

jimmy

Well, uh. I’m just a visitor here today.

woman

That’s okay. Everyone’s invited.

jimmy

Everyone?

SCENE 22 CONFERENCE ROOM

CUT TO CONFERENCE ROOM where party-goers are assembled. They are singing “Happy Birthday.”

SCENE 23 OFFICE HALLWAY

CUT TO JIMMY in the office, swiping wallets, purses, CD-ROMs, etc. as he sings “Happy Birthday to Me.”

JIMMY enters the conference room and takes a piece of cake which someone offers him.

jimmy

(taking a bite of cake)

This job is a piece of cake.

SCENE 24 – OFFICE BUILDING PLAZA

TED, an employee, 40s, enters the plaza. As he walks toward the building, his cell phone RINGS.