Topic Covered
- Controlled Articles
- Definition
- Problem Context
- Regulatory Frameworks
- Detecting Controlled Articles
Controlled Articles Policy
Portable electronic devices (PED), both Government and personally owned, capable of recording information or transmitting data (e.g., audio, video, radio frequency, infrared, and/or data link electronic equipment) are not permitted in Limited Areas (LAs), Protected Areas (PAs), and Material Access Areas (MAAs), without prior approval documented in the approved Security Plan (SP).
- Wireless headsets and keyboards
- Smartwatches, Smart TVs
- Two-way radios
- Some medical devices
- Anything with Wi-Fi and Bluetooth
Mobile Devices Definition and Policy
Mobile Devices include any portable computing device that has a small, easily carried form factor; possesses onboard sensors that allow the device to capture audio or video information; does not utilize a desktop operating system safeguarded by an NNSA Cyber Security Program; is designed to operate wirelessly; possesses local, non-removable data storage; and is powered-on for extended periods of time with a self-contained power source.
“Authorized individuals are permitted to bring their mobile devices (e.g., smart phones/tablets) into areas up to and including Limited Areas with Bluetooth and WiFi disabled, but must not introduce said devices into any location designated/marked as Secure Space. Mobile devices in a Limited Area must not be left unattended outside of approved storage.“
Introduction & Policy Foundation
- Controlled Articles: devices capable of recording or transmitting (audio, video, data)
- Not allowed in limited areas, protected areas, material access areas, or any vault-type rooms
- Policy foundation: DOE/NNSA requirements (e.g. DOE-STD-1210-2012)
The Hidden Layer: Wireless Devices You Can’t See
- Recording-capable devices: Cameras, microphones, smart TVs, wearable tech
- Transmitting-capable devices: Wi-Fi, Bluetooth, RF transmitters, two-way radios
- Simple Devices vs. Complex Devices:
- Calculators vs. Smart Watches
- Key Fobs vs. Bluetooth Cards
- RF detection fills the gap left by physical inspection
Speakers
Ron Ross, Ph.D.
Ron Ross is a former Fellow at the National Institute of Standards and Technology (NIST) and one of the nation’s leading voices in cybersecurity and risk management.
Brett Walkenhorst, Ph.D., CTO
Full Transcript
Coming soon.