Mark the highest level of classification at the top and bottom, date the notes, and annotate them as working papers. 3. She hires a surveyor to stand in the aisles of randomly selected grocery stores which sell the company's product to survey buyers of frozen food products. What do all SCIFs require as part of the SCIF construction process? What do the classes of GSA-approved containers represent? How many minutes does it take to drive 23 miles? Head of IC . c. You must report any part-time employment (WRONG). The access control system for unattended SCIF entry must use ____________________ and _______________________ such as an access card and personal identification number (PIN). Storage containers are used to protect classified material, whereas storage facilities are not. What is true about storage of Secret information? Figure5: Example of a filter detail for electrical, lighting, and building management systems per NSA94-106, Figure 6: Example of a plumbing penetration for a sprinkler system per NSA94-106. How is a TEMPEST countermeasures review (TCR) requested and who requests it? a. [Also see 19 ways to build physical security into a data center] "The concept behind SCIFs was to create a secure area that had appropriate protections in place to ensure to the greatest extent . A security violation involves the loss, compromise, or suspected compromise of classified information. You are not required to report adverse information about others who also have SCI access. Further, the material specified in ICD/ICS705 is not capable of achieving the NSA94106 performance objectives as noted by the rFOIL product performance data. Component-level procedures. What is the standard combination lock combination? You placed a For Sale ad in the local newspaper in an attempt to sell your old car. PDF Annex a - Sensitive Compartmented Information Facilities Requirements A classifier uses information in a Top Secret document to generate a new document for use in the DoD. 2.1 SCI Facilities (SCIFs) 2.2 Physical Security Preconstruction Review and Approval 2.3 Accreditation 2.4 Co-Utilization 2.5 Personnel Controls 2.6 Control of Combinations 2.7 Entry/Exit Inspections 2.8 Control of Electronic Devices and Other Items 3. n recent years, weve noticed a growing confusion in the industry over sensitive compartmented information facilities (SCIF) design and performance requirements. Storage containers and facilities are not only important to our national security, but also to the safety of the general public. Table 1 summarizes these key differences between ICD/ICS705 and NSA94106. Relationships between mission/business process On the other hand, you can simply leave the clock to work internally as a 24-hour clock but change the display string of the clock display to show 4:23 or 4:23pm when the internal value is 16:23. Sensitive Compartmented Information (SCI) Security Refresher, JKO U.S. Before you decide to transmit or transport classified materials, you must consider? c. Code of Federal Regulations Title 32, Part 2001 Classified National Security Information, June 25, 2010. d. Intelligence Community Directive (ICD) 700, Protection of National Intelligence, June 7, 2012. e. ICD 701, Unauthorized Disclosure of Classified Information, December 22, 2017. f. ICD 704, Personnel Security Standards and Procedures Governing Eligibility for Access to Sensitive Compartmented Information and Other Controlled Access Program Information, October 1, 2008, as amended on June 20, 2018. g. ICD 705, Sensitive Compartmented Information Facilities, May 26, 2010. SCIF Perimeter Doors shall be equipped with _______ to prevent unauthorized entry? SPeD - Storage Containers & Facilities Flashcards | Quizlet When the document has been sealed within a properly marked inner envelope you must: Insert the envelope into the outer envelope. Inform agency officials of decision. As part of a school research project, university students developed a technology that might one day be applicable in defending the U.S. against biological weapons, but it is not clearly related to national security. Further, the Certified TEMPEST, While it is not uncommon for NSA94106 to be. Compartmented Information Faci lities (SCIFs) in that the DNI establishes the security requirements for SCIFs and the DIA is responsible for the accreditation of DoD SCIFs. 10290 (1951) who signed the order? Equipment used to destroy SCI paper materials must be listed in the ___________________________________________________________. 2. T/F, Class V and Class VI are the only models of GSA-approved storage containers that are currently being manufactured for the storage of classified information. ICD/ICS705 identifies that the barrier be installed between two layers of drywall for the walls with the shielding material being turned at the floor and ceiling and extending several inches away from the wall. You can get an exception from USD (P). PDF SCI100 Student Guide 2. the recipient has the appropriate level clearance b. TRUE OR FALSE. Which access control methods may be authorized for small SCIFs and/or when there is a single monitored entrance? 3. TEMPEST vulnerabilities and recommended countermeasures are classified at what MINIMUM level when associated with a SCIFs physical location? T/F. Information Technology An SCI document that contains the dissemination control marking NOFORN indicates this document ___________________________________. John Kennedy E.O. __________ _________________includes any program which is deliberately created to cause an unexpected and unwanted event on an information system. See answer (1) Best Answer. * Contractors may not, SPD - SFPC - General (Special Access Program), DOD 5105.21 SCIF SECURITY MANUAL; ENCLOSURE 2, ACE Chpt. File series exemptions 1.Properly destroy preliminary drafts, worksheets, and other material after they have served their purpose Sensitive Compartmented Information (SCI) - All information and materials bearing special community controls indicating restricted handling within present and future community intelligence collection programs and their end products for which community systems of compartmentation have been or will be formally established. Jim works in a SCIF. What element/organization provides SCI indoctrination breifing videos? Forces Driver's Training Program for Europe, USSOUTHCOM Emergency Response and Active Shooter Preparedness . Which of the following items may be stored with classified information? True or False. To prevent anyone from crawling into the area. The list of prohibited items will be maintained in a Standard Operating Procedure for each GSA-controlled SCIF. If you need to know the manufacture date of a GSA-approved container, on which label would you find that information? Question text Speaking ecologically, what is conservation? What manual provides guidance for transmitting and transporting classified material within DoD? IS components, media, and/or memory may be brought into a SCIF and removed from a SCIF if it has been properly logged and approved by the __________________________. a type of targeted phishing that appears to be from a specific organization, such as your employer or bank is called________________? Communications Security (COMSEC) - Measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications, or to mislead unauthorized persons in their interpretation of the results of such possession and study. IMPACT to national security Cyber intrusions into classified systems fall under the reporting requirement of ________________and must be reported to the FBI, with a copy to DSS. Beyond the limited shielded barrier presented in ICD/ICS705, the technical specification identifies the use of 1800 Ultra Radiant Barrier for SCIFs manufactured by rFOIL [4]. IsI's team of Security and Construction experts can provide a turn-key solution for customized Sensitive Compartmented Information Facilities (SCIF's), Closed Areas, high security rooms, and server rooms. True or False. TEMPEST vulnerabilities and/or countermeasures associated with a SCIF ID or a manner that does not divulge SCIF physical location is classifed at what level? designJoel Kelloggradio frequencyRFrf shieldingSCIF. If the ISSO permits it, you may share your password in a SCIF. When a military installation or Government - related facility(whether or not specifically named) is located partially within more than one city or county boundary, the applicable per diem rate for the entire installation or facility is the higher of the rates which apply to the cities and / or counties, even though part(s) of such activities may be located outside the defined per diem locality. Which statement best describes net national advantage? The following access control procedures must be followed. Mechanical True or False. 2. A lock ( When you signed the SCI NdS, you agreed that anything you gained from unauthorized disclosure of SCI would become the property of the United States Government. 1,2,4,7,111, 2, 4, 7, 111,2,4,7,11, Executive Order 13526 establishes uniform information security requirements for the Executive Branch and the DoD community. Who must validate the EAP for contractor SCIFs? Who must approve SCIF access control methods? Original classification is an initial government determination by an authorized classifier that information requires protection because unauthorized disclosure of the information could reasonably be expected to cause damage to the national security. ___________ is defined as unclassified information or classified information (at a lower level) that when the information is combined or associated reveals additional factors that qualifies for classification. 4. One possibility is to just store hour values from 1 to 12. Copies of classified documents are not subject to the same control, accountability, and destruction procedures as the original document. PDF Department of Defense MANUAL Verify the individual's clearance eligibility true or false. You must use form SF-700, Security Container Information, to track all information listed here except___________________. Jill is party to a malpractice lawsuit. Harry Truman E.O. What is the maximum length of time a courier card may be issued? 1 Who provides construction and security requirements for SCIFs Security Classification Guides, Making an initial determination that information requires protection against unauthorized disclosure in the interest of national security. In AA&E storage facilities, deficiencies that can be reasonably corrected within _________________ do not require a waiver. 1.Strategic Goals and Objectives Personal Recognition. The U.S. President's agenda for attending the human rights conference is classified Confidential. The DNI issued several _________________ and ________________ which provide security policy for the protection of national intelligence as well as the personnel security requirements for access to SCI, and physical and technical security requirements for SCIFs. A SCIF has to be built to very specific standards, laid out in the ICD 705 Tech Spec. If the GSA-approved label comes off the front of your filing cabinet, you can still use it to store classified information as long as you have the label reattached in a timely manner. SCIF Construction Guide - Adamo Security As shown in Figure4, these shielding systems are often comprised of modular construction capable of providing 100dB of attenuation up to 10GHz and meeting the low frequency electric and magnetic shielding performance at frequencies as low as 1kHz. Which of the following labels must be clearly displayed on the face of the container in order for it to be used to store classified information? In a SCIF, reproduction equipment must display a sign indicating the highest level of classification allowed to be reproduced on that equipment. 0000001438 00000 n What is the cast of surname sable in maharashtra? Joint Personnel Adjudication System (JPAS) NOT CORRECT. For containers manufactured beginning April 2007, which label is attached to the top inside of the control drawer and states that any modification of the container that is not in accordance with Federal Standard 809 will invalidate the GSA approval of the container? Walls in SCIFs must extend from true floor to true ceiling. The SCI accreditation checklist for ships may be obtained from the Director, Office of Naval Intelligence, 4301 Suitland Road, Washington, D.C. 20395. This test would provide an indication of the materials performance under ideal circumstances but would not provide a clear indication of how performance would be impacted by various installation methods. Gray You must use form SF-702, Security Container Check Sheet, to track You must consult your SCIF's ____________to learn what you are or are not permitted to tell your family members about your work location and mission. Only DoD officials with original classification authority. Special Security Officer (SSO), or designee WRONG _____________ is the collection of intelligence through public sources. The product data as depicted in Figure 3 indicate the shielding material is not capable of providing 100 dB at frequencies greater than 1.5 GHz. Wiki User. An Accrediting Officer (AO) and Site Security Manager (SSM) will evaluate the risk and vulnerability of a SCIF to determine the physical and technical measures that must be deployed for each SCIF application. (d) Maintain records to include incoming access logs, Standard Form (SF)- 700, SF-701, and SF-702. IC Technical Specifications for Construction and Management Of 0000001529 00000 n What is the basic formula for granting access to classified information for individuals? True or False. Ensures all classified operations (including discussions) cease whenever an uncleared visitor is in the SCIF. Determine the individual's need-to-know Two fences are used on the perimeter and after a vehicle passes through the first gate, they must be authorized before passing through the second gate. Classified information may be protected at one of three classification levels: Top Secret, Secret, or Confidential. For example, RF filters could attenuate unwanted conducted emissions, but will provide little improvement in overall shielding attenuation. When the U.S. State Department learns that a leader of an adversary country has decided to attend, concerns arise that the risk of harm to U.S. national security will be greater if details about the President's trip fall into the wrong hands. Do you have pictures of Gracie Thompson from the movie Gracie's choice? True or False. The structure of ICD/ICS705 renders these components unnecessary as they provide limited value from a RF shielding effectiveness perspective without a six-sided shielding system. What practices should be followed when handling classified information in the workplace? 6. Jill is required to report this legal involvement. established. does not require the same level of RF treatment of doors, electrical systems, and mechanical penetrations as would be required under NSA94106. 0000003595 00000 n Walls within a SCIF require acoustical protection measures and sound masking systems to protect SCI. Any incidents involving improper escorting during a visitors entrance into the SCIF must be immediately reported to the SSM. Before considering original classification, an OCA must determine what? Unclassified and Confidential information are not processed or analyzed in SCIFs. ________ an unauthorized disclosure of classified information, ________ the possibility of compromise could exist but it is not known with certainty, ________ if classified information appears in the public media, DoD personnel must be careful not to make any statement or comment that would confirm the accuracy or verify the classified status of the information. 10501 (1953) what president sign the order? Further, the Certified TEMPEST[3] Technical Authority (CTTA) will evaluate for TEMPEST requirements and provide direction on RF shielding requirements based upon risk of RF interference to the SCIF. (2) Is accountable for safeguarding all equipment and systems, and the secure handling of all documents that are printed and stored in GSA-controlled SCIFs. ___________ is the term used to identify individuals specifically authorized in writing to make initial classification decisions. determines the method for sending it. Original Classification Authorities (OCAs). But the installation of the shielding barrier between two layers of drywall results in the shielding being perforated by the drywall screws utilized to install the second layer of drywall. Secure Facilities: Lessons from the SCIFs | CSO Online true or false. DD Form 254, DoD Contract Security Classification Specification. Top Secret information can only be stored in a GSA-approved security container, secure room, or vault. Exemptions from automatic declassification 5. What is the maximum alarm response time for CONUS SCIFs accredited for open storage? SCIF and Radio Frequency Secured Facility Design SCIFs shall be designated as a _______ IAW DOD 5200.08? The use, discussions, and storage of classified information and material may only be handled by an individual with an appropriate security clearance, a need to know the information, and within a GSA-controlled SCIF. ____________________is required to access certain areas of a SCIF and classified information. You are required to remove your name badge as soon as you leave your SCIF so as not to call attention to yourself. 1.2.3 Proper security planning for a SCIF is intended to deny foreign The declassification system where information exempted from automatic declassification is reviewed for possible declassification. This is evident by the construction methodology and materials identified in ICD/ICS705. 4. Additionally, ICD/ICS705 Which SCI control system is designed to protect human intelligence? Despite this, many projects identify requirements for these RF components when utilizing ICD/ICS705 construction methods while referencing the NSA 94106 shielding effectiveness or some other (often arbitrary) level of RF shielding effectiveness. 39 . PIT and Services. Unauthorized disclosure of ________ information could reasonably be expected to cause serious damage to our national security. SCIFs & Secure Facilities - Adamo Security Rates for Alaska, Hawaii, U.S. Traveler reimbursement is based on the location of the work activities and not the accommodations, unless lodging is not available at the work activity, then the agency may authorize the rate where lodging is obtained. Name the markings appear on a derivatively classified document? Courier Authorization Card, what is its number? 3. e) Department of Defense (DoD), a) Director of National Intelligence (DNI), Who provides accreditation for SCIFs? Intrusion detection systems (IDS), or alarms, and guards. . Joel Kellogg is the Director of Business Development for Healthcare, Industry, and Government at ETS-Lindgren and has more than 20 years of design, production, and management experience. Sensitive Compartmented Information Facilities. The individuals who need to be notified if the duration of classification has been changed? T/F, Secure rooms and vaults may both be authorized for the open storage of classified information. ____________ contain classification levels, special requirements and duration instructions for programs, projects, plans, etc. b) Change combinations when anyone with knowledge of the combination no longer requires access and when the container or lock has been subject to possible compromise. All equipment and components that process enctrupted NSI and non-SCI are considered BLACK. SCIFs stands for _________________________. A classifier determines that a report containing certain chemical formulas associated with bio-chemical defense could cause exceptionally grave damage to the national security of the United States if revealed. SCI couriers must be appointed __________, have a signed letter of authorization and know the rules and regulations governing couriers and transporting classified material. Presidential & Congressional Commissions, Boards or Small Agencies, Diversity, Equity, Inclusion and Accessibility, Sensitive Compartmented Information Facility Use (SCIF) Policy. Electromechanical Original classification authority is not granted to particular individuals in the government. This Order does not apply to other agencies that have agreements with GSA to use a GSA-controlled SCIF unless specifically provided for in such agreements. For a shielding system to comply with NSA94106, all aspects of the shielding must be identified and coordinated with the design team, the general contractor, and mechanical, electrical, and plumbing (MEP) subcontractors to ensure that all building systems and penetrations are properly addressed. Visit Access Request - An authorization letter/request that must be submitted to the Personnel Security Office to verify an individuals clearance level and/or if they are briefed into SCI before classified information can be shared with them. Your email address will not be published. How does acting in good faith relate to consumer responsibilities? As previously discussed, the requirements for each specification are quite different and should not be used interchangeably or in conjunction with each other. You are permitted to discuss SCI outside your SCIF as long as it is with one of your SCIF co-workers. To ensure that users of classified information treat it consistently. The biggest vulnerability in SCIF forced entry is the ____________________. HW[o~}o,!9AgQ1_&W6Hfru]wx}usJgZ-TwWXC>Pb]0_(w~']vku rf_i]eV{ziUneaH1N2a"Sl|'PJ%Jo-5mOU9hQGk;V7[uqk:F[Z=e*O.eP~ "bpLbu0z m96zPeI}B,-P@vt?>7(13-g|rnap,Q Sensitivity of material, threat to material, type of material, and geographic location must all be taken into consideration when selecting a storage container or facility. INFORMATION SECURITY (SPED) Flashcards | Quizlet 0000001061 00000 n . E.O. An OCA might upgrade the President's agenda. Wiki User 2013-07-30 07:09:41 Study now See answer (1) Best Answer Copy Director of National Intelligence (DNI) Wiki User . Defense Intelligence Agency (DIA) WRONG Who is responsible for terminating SCI access? What policy partnerships has DoD developed to standardize cybersecurity and protect the unique requirements of DoD missions and warfighters? Purpose. Despite this, many projects identify requirements for these RF components when utilizing ICD/ICS705, construction methods while referencing the NSA 94106. Policy. PDF Physical Security Standards for Sensitive Compartmented Information 2. Derived From. _____________ uses imagery, imagery intelligence, or geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the earth. must specify the position title for which the authority is requested and a brief mission specific justification for the request. ", Per diem localities with county definitions shall include"all locations within, or entirely surrounded by, the corporate limits of the key city as well as the boundaries of the listed counties, including independent entities located within the boundaries of the key city and the listed counties (unless otherwise listed separately).". You signed an SCI Nondisclosure Statement during the __________________ process. Why should you consolidate AA&E storage facilities? What should SCIF doors be equipped with in the event of a malfunction or loss of power to an automated access control device? SCIF Pre-Construction Checklist This checklist is intended to provide the CSA/AO with the information required to determine the minimum security requirements for final SCIF accreditation and to assist the project personnel with planning and designing the SCIF appropriately and cost efficiently. Which Sound Transmission Class (STC) is when very loud sounds at full volume can be heard only faintly or not at all? whether decisions have already been made about classification of the information. If so, find the domain of the function. What is NOT a function of derivative classification? Appendix B: Terms and Definitions. You are required to report all foreign travel prior to departure, including day trips to Canada and Mexico. True or False. (a) Operates and maintains all Classified Communications Security (COMSEC) equipment, classified and unclassified computer systems, and intrusion detection systems; (b) Manages access to the alarm system, and removal of such access; (c) Maintains appropriate accreditation of all equipment and systems and completion and maintenance of user agreement documentation; (d) Performs inspections as required; and. What is Systematic Declassification Review? Study now. What is NOT a configuration of a GSA-approved container? classified source documents, construction recommendations will not achieve the RF performance required under NSA94106, which include attenuation levels as high as 100dB at 10GHz. Classified By Executive Order (EO) 13526 (Replacing EO 12958), Classified National Security Information, December 29, 2009, as amended. Save my name, email, and website in this browser for the next time I comment. DoDM 5200.01, Volumes 1-4, DoD Information Security Program. SI is the SCI control system marking abbreviation for which SCI control system? a) safeguard keys, locks, and combinations at the same level of the classified information being stored shielding effectiveness or some other (often arbitrary) level of RF shielding effectiveness. These components may provide some value but, in terms of improving the RF shielding effectiveness, that value is often limited. (1) Leads the SCI Security Program direction, management, and oversight consistent with the policies and procedures of the Office of the Director of National Intelligence to protect classified information, intelligence, and intelligence sources and methods. ICD/ICS705 is intended to provide a level of security and often takes advantage of distances from the SCIF to the perimeter of a facility. 3.3 The Contractor must provide an Integrated Logistic Support Plan (ILSP), outlining all sustainment requirements from acquisition to disposal. Which of the following statements is true about locks and keys for security containers? ICD/ICS705 only identifies an RF barrier when required and does not identify requirements for other RF shielded components including doors, filters, and penetrations such as waveguide air vents. You are taking notes during a classified meeting. What is Emergency Destruction Priority TWO? True or False. After setting the alarm on a SCIF, spinning the lock, and displaying the closed sign, you must complete the _____________________ form. ICD/ICS705 does not identify specific performance requirements while NSA94106 specifies performance requirements from 1kHz to 10GHz. SCIFs, AA&E Storage, and Nuclear facilities are considered______________. Protecting DoD assets, such as classified material, arms, ammunition, and explosives (AA&E) and nuclear weapons, is imperative for our national security. The people who are in possession of, or who are otherwise charged with safeguarding classified information. AA&E must be categorized, stored, and protected by security risk categories. Note: If the visitor is an SCI briefed non-GSA employee, the visitor must be under constant, visual surveillance by the host/escort for the duration of the visit. Who are all known holders of the information? True or False. Open Source Intelligence (OSINT) When you signed the _______________, you acknowledged that you were advised that mishandling SCI could cause irreparable harm to the United States and you are obligated not to disclose SCI to anyone who is not authorized to receive it.