106 Flashcards
(38 cards)
106.1 Discuss the purpose of personnel security
To authorize initial and continued access to classified information and/or initial and continued assignment to sensitive duties to those persons whose loyalty, reliability and trustworthiness are such that entrusting them with classified information or assigning them to sensitive duties is clearly consistent with the interests of national security
106.2 Define the following classification categories, how they differ, and the color codes used to identify each one
TOP SECRET - cause exceptionally grave damage to the national security. Color Code is Orange
SECRET - cause serious damage to the national security. Color Code is Red
CONFIDENTIAL - cause damage to the national security. Color Code is Blue
UNCLASSIFIED - cause little to no damage to the national security. Color Code is Green
106.3 Explain what is meant by ‘need to know’
You have a need to use the information in completion of your duties
106.4 State the type of investigation and how often it is updated for access to the following classification levels
Top Secret - Favorably completed SSBI, SSBI-PR or PPR. The SSBI must be updated every five years by a PR
Secret - Favorably completed SSBI, SSBI-PR or PPR.
Confidential - Favorably completed NACLC or ANACI.
SCI - Favorably adjudicated SSBI. A SSBI-PR is required to be submitted every five years
106.5 Identify what a SAER is and its purpose
Security Access Eligibility Report: Used to identify an incident or any change in eligibility if an employee is still eligible for the security clearance
106.6 Identify the events that should be reported to the SSO
- Involvement in activities or sympathetic association with persons which/who unlawfully practice or advocate the overflow or alteration of the United States Government by unconstitutional means
- Foreign influence concerns/close personal association with foreign nationals, Foreign citizenships, or foreign monetary interests
- Sexual behavior that is criminal or reflects a lack of judgment or discretion
- Unwillingness to comply with rules and regulations or to cooperate with security processing
- Change of Marital Status or Marriage/Cohabitation with a foreign national
106.7 Identify who has overall authority of, and controls access to, a SCIF
The Special Security Officer (SSO) will be responsible for the operation of the Sensitive Compartmented Information Facility (SCIF) and the security control and use of the SCIF
106.8 Identify the use of the following forms
SF 700 SF 701 SF 702 SF 703 SF 153 SF 312
SF 700: Security Container Information; this form contains vital information about the security container in which it is located
SF 701: Activity Security Checklist; this form is a checklist that is filled out at the end of each day to insure that classified materials are secured properly
SF 702: Security Container Check Sheet; this form provides a record of the names and times that persons have opened, closed and checked a particular container that holds classified information
SF 703: Top Secret Cover Sheet (Orange); this form is used as a cover sheet for Top Secret documents
SF 153: COMSEC Material Report; according to GSA, it is no longer in available for order through their archives
SF 312: Classified Information Nondisclosure Agreement; this form provides is a contractual agreement between the U.S. Government and a cleared employee that must be executed as a condition of access to classified information
106.9 State when safe combinations should be changed
- When first placed in use
- When an individual knowing the combination no longer requires access unless other sufficient controls exist to prevent access to the lock
- When subjected to compromise
- When taken out of service. Built-in combination locks will then be reset to the standard combination 50-25-50; combination padlocks will be reset to the standard combination 10-20-30
106.10 State the responsibilities of the DDA
The Designated Disclosure Authority has the authority and responsibility to control disclosures of Classified Military Information and Controlled Unclassified Information to foreign governments and international organizations and their representatives or persons sponsored by them
106.11 State the purpose of the DCS
The DCS establishes, staffs, operates, and maintains an international network of couriers and courier stations for the expeditious, cost effective, and secure transmission of qualified classified documents and material
106.12 Describe the procedures for preparing hard copy classified material for transportation via
DCS
Handcarry
DCS:
- No item entering the DCS shall weigh over 300 pounds, or exceed dimensions 45 1/2” X 26” X 22”
- Items shall be addressed with the standardized DCS two-line address; the Army/Air Post Office, the Fleet Post Office, and the street addresses shall not be used
- Envelopes, labels, or tags with visible “postage and fees paid” indicia shall not be used
- Security classification markings, special security caveats, and other Extraneous markings must not appear on the outer wrapper
- Nickname and/or special project markings previously approved by the DCS must be placed on the outer wrapper
- Detailed information on wrappings, marking, and preparing material for movement is available from the servicing DCS station
- Packaging Material: Generally, all packaging materials are permissible if they afford contents with concealment and protection, preclude physical and/or visual access, are sturdy, and pose no hazard to handlers
Handcarry:
- Classified information shall be packaged so that classified text is not in direct contact with the inner envelope or container
- Enclose classified information transported outside the command in two opaque, sealed covers durable enough to conceal and protect it from inadvertent exposure or tampering
- If the classified information is an internal component of a package able item of equipment, the outside shell or body may be considered as the inner cover
- If the classified information is an inaccessible internal component of a bulky item of equipment, outside or body of the item may be considered a sufficient cover provided observation does not reveal classified information
- If the classified information is an item of equipment that is not reasonably package able and the shell or body is classified, it shall be concealed with an opaque covering that conceals all classified features
- Specialized shipping containers, including closed cargo transporters, may be considered the outer wrapping or cover when used
106.13 State the responsibilities of the TSCO
- Maintain a system of accountability (e.g., registry) to record the receipt, reproduction, transfer, transmission, downgrading, declassification and destruction of command Top Secret information, less SCI and other special types of classified information
- Ensure that inventories of Top Secret information are conducted at least once annually, or more frequently when circumstances warrant
106.14 State the THREATCON recognition and Force Protection levels and discuss what each represents
FPCON NORMAL describes a situation or no current terrorist activity
FPCON ALPHA describes a situation where there is a small and general terrorist activity that is not predictable
FPCON BRAVO describes a situation with somewhat predictable terrorist threat
FPCON CHARLIE describes a situation when an instance occurs or when intelligence reports that there is terrorist activity imminent
FPCON DELTA describes a situation when a terrorist attack is taking place or has just occurred
106.15 Define the following terms
RAM
PSP
ATFP
RAM - Random Antiterrorism Measures
PSP - Personnel Security Program (PSP) is to authorize initial and continued access to classified information and/or initial and continued assignment to sensitive duties to those persons whose loyalty, reliability and trustworthiness are such that entrusting them with classified information or assigning them to sensitive duties is clearly consistent with the interests of national security
ATFP - Anti-terrorism and force protection is a security program designed to protect military personnel, civilian employees, family members, facilities, and equipment in all locations and situations
106.16 Explain and state the purpose of an EAP
Emergency Action Plan (EAP) is utilized when anticipating natural disasters. Maintain an up-to-date, written Emergency Action Plan for the protection of COMSEC material appropriate for natural disasters likely to occur in their region
106.17 Explain and state the purpose of Emergency Destruction Procedures
Emergency Destruction Procedures (EDP) are utilized when anticipating a hostile action. Planning for hostile actions must concentrate on procedures to safely evacuate or securely destroy the COMSEC material, to include providing for the proper type and a sufficient number of destruction devices to carry out emergency destruction
106.18 State who can give the order to initiate Emergency Destruction
The Commanding Officer/OIC or official responsible for safeguarding COMSEC material
106.19 Explain how, and in what order, material is destroyed during Emergency Destruction
Priority One: All cryptographic equipment and documents
Priority Two: All operational SCI code word material which might divulge targets and successes, documents dealing with U.S. SCI activities and documents concerning compartmented projects and other sensitive intelligence materials and TOP SECRET collateral
Priority Three: Less sensitive administrative SCI material and collateral classified material not included above
106.20 Define SCI
Sensitive Compartmented Information: Classified information concerning or derived from intelligence sources, methods, or analytical processes which is required to be handled within formal access
106.21 List the items prohibited in a SCIF and the security risks associated with them
No devices that transmits, receives, records or stores data is authorized into a SCIF without prior approval
No photography in or around a SCIF is allowed without CO approval
The ISSM must approve ALL IT software prior to its use in a SCIF
106.22 Define the difference between a security violation and a practice dangerous to security
A security violation is when actual compromise or loss of material has occurred. Whereas a practice dangerous to security is someone who does not follow proper security procedures
106.23 Explain the security requirements for the following
Inside US SCIF
Outside US SCIF
TSCIF
Inside U.S
- Must meet the specifications for Permanent Dry Wall Construction
- Must be alarmed
- SCI must be stored in GSA approved security containers
- There must be a response force capable of responding to an alarm within 15 minutes after annunciation and a reserve response force available to assist the responding force
- The CSA may require any SCIF perimeter walls accessible from exterior building ground level to meet the equivalent protection afforded by construction requirement
Outside U.S.
1. Must meet the construction specifications for SCIFs
- The SCIF must be alarmed.
- All SCI controlled material will be stored in GSA-approved containers having a rating for both forced and surreptitious entry equal to or exceeding that afforded by Class 5 containers.
- There must be a response force capable of responding to an alarm within 10 minutes and a reserve response force available to assist the responding force.
T-SCIF:
1. Ground-based T-SCIFs may be established in hardened structures (e.g., buildings, bunkers) or semi-permanent structures (e.g., truck-mounted or towed military shelters, prefabricated buildings, tents).
- Permanent-type hardened structures shall be used to the greatest extent possible
When possible, T-SCIFs shall be established within the perimeters of U.S.-controlled areas or compounds. - If a U.S.-controlled area or compound is not available, the T-SCIF shall be located within an area that affords the greatest degree of protection against surreptitious or forced entry
- When a T-SCIF is in operation, the perimeter of its immediate area shall be observed and protected by U.S. guards with U.S. SECRET clearances. Guards shall be equipped with emergency communication devices and, if necessary, with weapons
- During non-operational hours, the T-SCIF shall be provided security protection in accordance with AO guidelines
- The T-SCIF shall have only one entrance which shall be controlled during hours of operation by an SCI indoctrinated person using an access roster
106.24 Explain vault recertification and recurring inspections
The container or vault door must be inspected and recertified by a person specifically trained and authorized by the GSA before it can be used to protect classified material
Upon completion a label will be applied and the container/vault door is then considered authorized for storage/protection of classified material
If the container fails inspection, it must be repaired in accordance with Federal Standard 809 before the recertification label can be applied