Information Security Program Classified information may be protected at one of three classification levels: Top Secret, Secret, or Confidential. Industrial What is NOT a configuration of a GSA-approved container? As discussed above, referencing both Classification challenges Code of Federal Regulations Title 32, Part 2001 Classified National Security Information, June 25, 2010. 3. 1.Properly destroy preliminary drafts, worksheets, and other material after they have served their purpose Classified Information - Information that an original classification authority determines the unauthorized disclosure of which reasonably could be expected to result in damage to the national security, which includes defense against transnational terrorism, and the original classification authority is able to identify or describe the damage. COR or desgineed of USG organization who has the contract, All materials will be identified for emergency destruction or removal by ________. In a different SCIF of equal or higher accreditation. Supporting Information Systems Storage Containers and Facilities Storage Con, Physical Security Planning and Implementation, Fundamentals of Engineering Economic Analysis, David Besanko, Mark Shanley, Scott Schaefer, Introduction to Thermodynamics and Heat Transfer, Chiasms, Provenance and Structure in Mark. IMPACT to national security Jim works in a SCIF. The test certification label is located on the ___________ portion of the cabinet. Study with Quizlet and memorize flashcards containing terms like Acoustical protection measures are NOT designed to protect inadvertant overhearing of SCI against?, Which Sound Transmission Groups are considered adequate for SCIF acoustical security protection?, What standard established Sound Groups 1-4? It is designed to facilitate the handling of sensitive compartmented information (SCI), which involves intelligence sources and processes. Visitors who have a visitor certification do not require an escort. 4. document.getElementById( "ak_js_1" ).setAttribute( "value", ( new Date() ).getTime() ); In Compliance is a leading source of news, information, education, and inspiration for electrical and electronics engineering professionals. 2. the recipient has the appropriate level clearance In AA&E storage facilities, deficiencies that can be reasonably corrected within _________________ do not require a waiver. Why should you consolidate AA&E storage facilities? It is a room constructed to U.S. government standards to prevent outside surveillance and the interception of highly sensitive information. Physical security standards for the construction and protection of SCIFs are prescribed in Intelligence Community Directive (ICD) 705 (Reference (f)), Intelligence Community Standard (ICS) 705-1 (Reference (g)), and ICS 705-2 (Reference (h)). TRUE OR FALSE. 1.2.3 Proper security planning for a SCIF is intended to deny foreign Which of the following is the preferred method for transporting an SCI document from one SCIF to another? A SCIF has to be built to very specific standards, laid out in the ICD 705 Tech Spec. 705, Sensitive Compartmented Information Facilities, May 26, 2010. 2. 2. 2. Current SCI control systems are HCS, SI, and ________________. PIT and Services. True or False. 2.1 SCI Facilities (SCIFs) 2.2 Physical Security Preconstruction Review and Approval 2.3 Accreditation 2.4 Co-Utilization 2.5 Personnel Controls 2.6 Control of Combinations 2.7 Entry/Exit Inspections 2.8 Control of Electronic Devices and Other Items 3. Because you do not return his phone calls, however, this is not considered a foreign contact that must be reported. This can become confusing if both standards are referenced as part of a project. Security violations are required to be reported, but infractions are not required to be reported. Top Secret information can be sent via USPS when: Secret information can be sent via USPS express main when: Only when it is the most effective means considering security, time, cost, and accountability. ICD/ICS705 is intended to provide a level of security and often takes advantage of distances from the SCIF to the perimeter of a facility. Communications Follow proper procedures when copying classified information shielding effectiveness or some other (often arbitrary) level of RF shielding effectiveness. A high-tech scam that uses e-mail to deceive you into disclosing personal information is called ____________________? Implement both versions. ICD/ICS705 simply calls for a RF shielding barrier on the wall. PHYSICAL SECURITY CONSTRUCTION POLICY FOR SCIFs 3.1 Construction Policy for SCI Facilities 6. What is NOT a function of derivative classification? 8381 (1940) Franklin Roosevelt E.O. Have a host/escort official who does the following: Meets the visitor at the SCIF entrance and provides escort duties. PHYSICAL SECURITY CONSTRUCTION POLICY FOR SCIFs 3.1 Construction Policy for SCI Facilities 3.2 Temporary Secure Working Area (TSWA). Rates for foreign countries are set by the State Department. 2013-07-13 11:01:20. ICD/ICS705 is intended to provide a level of security and often takes advantage of distances from the SCIF to the perimeter of a facility. See answer (1) Best Answer. ISOO, 32 CFR Parts 2001 and 2003, Classified National Security Information; Final Rule. Rates for Alaska, Hawaii, U.S. 6. If the ISSO permits it, you may share your password in a SCIF. John has access to SCI and is currently legally separated from his wife. In a SCIF, SCI must always be stored in a GSA-approved container. T/F, Secure rooms and vaults may both be authorized for the open storage of classified information. Original classification is an initial government determination by an authorized classifier that information requires protection because unauthorized disclosure of the information could reasonably be expected to cause damage to the national security. What process did this individual just complete? ICD/ICS705 and NSA94106 as part of a project can create much confusion in terms of project requirements. Exemptions from automatic declassification (e) Completes and submits all System Access Requests and Public Key Infrastructure for classified accounts to the Defense Information Security Agency. Compare the advantages of using cash with those of using checks. Original classification authority is not granted to particular individuals in the government. b) Central Intelligence Agency (CIA) b. You are only required to report adverse information about yourself. Who provides construction and security requirements for SCIFs? TEMPEST vulnerabilities and/or countermeasures associated with a SCIF ID or a manner that does not divulge SCIF physical location is classifed at what level? _____________ is the collection of intelligence using human sources such as diplomats, military attaches, and spies. Which policy document provides a high-level framework for DoD implementation of national policy on classified national security information? A review of the product data provided by the manufacturer demonstrates that the product can be used for ICD/ICS705 but is not intended for use in NSA94106 applications. When used for the storage of COMSEC material, GSA-approved containers must also meet the security requirements established by whom? 1) Who provides construction and security requirements for SCIFs? Primarily government and government-related contractors that require high security have the need for SCIFs. TEMPEST countermeasures review (TCR) performed by a CTTA. Gray You must use form SF-702, Security Container Check Sheet, to track What is Emergency Destruction Priority TWO? A complete list of every source document used. Share sensitive information only on official, secure websites. Which policy document provides guidance to all government agencies on classification, downgrading, declassification, and safeguarding of classified national security information? In AA&E storage facilities, why must drainage structures be secured if they cross the fence line and meet certain size requirements? Only GSA employees who are SCI briefed are authorized unescorted access to GSA-controlled SCIFs, and must: (1) Comply with the provisions of this Order and the individual SCIF Standard Operating Procedures, as appropriate, and the provisions of the approved SCIF Emergency Action Plan; But, by itself, the facility is not RF secure. SCIFs shall be designated as a _______ IAW DOD 5200.08? DD Form 254 (Department of Defense Contract Security c. Detects attempted or actual unauthorized human entry into a SCIF. Unauthorized disclosure of ________ information could reasonably be expected to cause serious damage to our national security. What factors do organizations need to take into account when implementing a holistic approach to organizational risk management? 0000001219 00000 n
Beyond the limited shielded barrier presented in ICD/ICS705, the technical specification identifies the use of 1800 Ultra Radiant Barrier for SCIFs manufactured by rFOIL [4]. T/F, Vaults are more secure than modular vaults. This includes cryptosecurity, transmission security, emission security, and physical security of communication security materials and information. Sensitive Compartmented Information (SCI) - All information and materials bearing special community controls indicating restricted handling within present and future community intelligence collection programs and their end products for which community systems of compartmentation have been or will be formally established. Security Classification Guide (SCG) Despite this, many projects identify requirements for these RF components when utilizing ICD/ICS705, construction methods while referencing the NSA 94106. Further, the material specified in ICD/ICS705 is not capable of achieving the NSA94106 performance objectives as noted by the rFOIL product performance data. Part 1 of this article is intended to bring some clarity to various documents and performance requirements from a radiofrequency (RF) shielding perspective to aid in the design and construction of these facilities. These signals are protected within the Communications Intelligence, (COMINT) SCI control system. c. You must report any part-time employment (WRONG). 2. ___________ is defined as an INITIAL determination that information requires, in the interest of national security, protection against unauthorized disclosure. 0000001438 00000 n
Which of the following statements is true about locks and keys for security containers? Jill works in a SCIF. Which agency is responsible for approving security containers for the storage of classified material? _____________ includes representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media which is derived from visual photography, radar sensors, and electro-optics. who provides construction and security requirements for scifs. a. Defense Intelligence Agency (DIA) WRONG. One general principle is the more sensitive the material to be stored, or the greater the threat to it, the stricter your storage and protection methods must be. Storage containers and facilities are an important part of ensuring DoD assets are protected from loss or compromise. a) Director of National Intelligence (DNI) b) Central Intelligence Agency (CIA) c) Defense Intelligence Agency (DIA) d) General Services Administration (GSA) e) Department of Defense (DoD) a) Director of National Intelligence (DNI) Who provides accreditation for SCIFs?