in addition to foreign travel requirements those with sci access must
James
Guys, does anyone know the answer?
get in addition to foreign travel requirements those with sci access must from EN Bilgi.
Sensitive Compartmented Information (SCI) Security Refresher Flashcards
Study with Quizlet and memorize flashcards terms like A security violation involves the loss, compromise, or suspected compromise of classified information. Security violations must be reported., You are required to report all foreign travel prior to departure, including day trips to Canada and Mexico., When you signed the SCI NdS, you agreed that anything you gained from unauthorized disclosure of SCI would become the property of the United States Government. and more.
Sensitive Compartmented Information (SCI) Security Refresher
4.2 10 Reviews
A security violation involves the loss, compromise, or suspected compromise of classified information. Security violations must be reported.
Click card to see definition 👆
true
Click again to see term 👆
You are required to report all foreign travel prior to departure, including day trips to Canada and Mexico.
Click card to see definition 👆
false
Click again to see term 👆
1/100 Created by jojo9716
Terms in this set (100)
A security violation involves the loss, compromise, or suspected compromise of classified information. Security violations must be reported.
true
You are required to report all foreign travel prior to departure, including day trips to Canada and Mexico.
false
When you signed the SCI NdS, you agreed that anything you gained from unauthorized disclosure of SCI would become the property of the United States Government.
true
Walls in SCIFs must extend from true floor to true ceiling.
true
An SCI document that contains the dissemination control marking NOFORN indicates this document ___________________________________.
a. Is not releasable to foreign nationals
You must report external activist groups you or your co-workers are affiliated with regardless of their nature.
true
Visitors may enter a SCIF without a visitor certification if they are escorted by indoctrinated personnel.
true
If the ISSO permits it, you may share your password in a SCIF.
false
The access control system for unattended SCIF entry must use ____________________ and _______________________ such as an access card and personal identification number (PIN).
b. Authentication, verification
SCI couriers must be appointed __________, have a signed letter of authorization and know the rules and regulations governing couriers and transporting classified material.
in writing
In a SCIF, SCI must always be stored in a GSA-approved container.
false
After setting the alarm on a SCIF, spinning the lock, and displaying the closed sign, you must complete the _____________________ form
b. SF-701 NOT correct
Which is the primary database used to verify personnel access to SCIFs outside DoD?
b. Joint Personnel Adjudication System (JPAS) NOT CORRECT
If a SCIF has a high security lock, then an access control system is not required.
false
The SCI control system marking should not be listed in the banner line on a classified document.
false
_____________ is technically derived intelligence data other than imagery and signals intelligence that locates, identifies, or describes distinctive characteristics of targets.
f. Measurement and Signature Intelligence (MASINT)
What piece of information is not required to be recorded on the SCIF visitor control log?
f. Visitor's date of birth
The three primary types of SCIFs are referred to as closed storage SCIF, open storage SCIF, and ___________________.
a. Continuous Operation SCIF
You must report any systemic weaknesses and anomalies.
true
When closing a closed storage SCIF you must ensure all classified material has been stored, security containers are closed and locked, locked sign is displayed on security containers, and the SF-701 form is completed.
true
SCI is required to be stored in a GSA-approved container in a Closed Storage SCIF.
true
One company must be responsible for the installation, maintenance, and monitoring of the Intrusion Detection System (IDS) for SCIFs.
true
SCI Material cannot be stored in _________________________________.
b. An open storage SCIF (WRONG)
_____________ uses imagery, imagery intelligence, or geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the earth.
b. Imagery Intelligence (IMINT) (WRONG)
Which of the following is the preferred method for transporting an SCI document from one SCIF to another?
a. Defense Courier Service (DCS)
IS components, media, and/or memory may be brought into a SCIF and removed from a SCIF if it has been properly logged and approved by the __________________________.
c. Special Security Officer (SSO) or Information Systems Security Officer (ISSO)
Which of the following is an escort in a SCIF not required to do?
d. Process the visitor certifications for their visitors
You've noticed that Sydney has been very unhappy and disgruntled at work lately in the SCIF. You are required to report this information about Sydney.
true
How long must SCIF visitor control logs be retained?
. 1 year after the last entry
Sensitive Compartmented Information (SCI) is ______________________.
c. Classified national intelligence information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems
You are not required to report adverse information about others who also have SCI access. You are only required to report adverse information about yourself.
false
The ___________________________ processes SCIF visitor certifications.
b. Special Security Officer (SSO) or Special Security Representative (SSR)
12 FAM 710 SECURITY POLICY FOR SENSITIVE COMPARTMENTED INFORMATION
UNCLASSIFIED (U) 12 FAM 700
SECURITY POLICY FOR SENSITIVE COMPARTMENTED INFORMATION (SCI) WITHIN DEPARTMENT OF STATE FACILITIES
12 FAM 710
SECURITY POLICY FOR SENSITIVE COMPARTMENTED INFORMATION
(CT:DS-314; 12-17-2018)
(Office of Origin: DS/SI/IS)
12 FAM 711 GENERAL
12 FAM 711.1 Authorities
(CT:DS-258; 06-13-2016)
(1) National Security Act of 1947, as amended
(2) Intelligence Reform and Terrorism Prevention Act (IRTPA) of 2004
(3) Executive Order 12333, as amended
(4) Executive Order 13526
(5) Executive Order 12968
(6) Public Law 100-204, as amended
(7) The Foreign Service Act of 1980
(8) The Omnibus Diplomatic Security and Anti-terrorism Act of 1986 (22 U.S.C. 4801 et seq.)
(9) Intelligence Community Directives (ICD) and related Standards and Policy Guidance
(10) Bureau of Intelligence and Research (INR)/Diplomatic Security (DS) Memorandum of Agreement (MOA) Security Responsibility for the Protection of Certain Intelligence-Related Matters, April 18, 2016
12 FAM 711.2 Purpose
(CT:DS-258; 06-13-2016)
a. This subchapter implements security policies established to protect national intelligence worldwide, as defined in section 1012 of IRTPA, designated by the Director of National Intelligence (DNI) as Sensitive Compartmented Information (SCI), and intelligence sources and methods. It describes the:
(1) Roles, responsibilities, and authorities of the Assistant Secretary for INR as the Department Intelligence Community (IC) element head as defined by the National Security Act of 1947, as amended, and E.O. 12333, as amended;
(2) Authorities of other agency IC element heads for their facilities within Department buildings worldwide; and
(3) Responsibilities of all Department employees and contractors indoctrinated into SCI access.
b. This subchapter further implements Department worldwide security policies for National Intelligence as required by E.O. 13526, E.O. 12968, ICDs, Intelligence Community Standards, Intelligence Community Policy Guidance (ICPG), and other documents cited herein for guidance on specific security functions. Users are referred to applicable DNI control system manuals or directives for guidance on appropriate classification levels and compartmented information.
12 FAM 711.3 Applicability
(CT:DS-258; 06-13-2016)
The policies in this subchapter must be applied by all bureaus, posts, and personnel under the authority of the Secretary and chief of mission (COM) for receiving, transmitting, handling, storing, processing, discussing or otherwise using SCI.
12 FAM 712 RESPONSIBILITIES
12 FAM 712.1 Intelligence Community (IC) Element Head
(CT:DS-258; 06-13-2016)
a. INR is the Department’s IC element head. An IC element head may delegate responsibility for the implementation of policies and procedures defined in DNI ICDs and related guidance for the protection of SCI to a Cognizant Security Authority (CSA).
b. DS, as delegated by INR, per the INR/DS MOA of April 18, 2016 must:
(1) Protect SCI from unauthorized disclosure consistent with DNI guidance;
(2) Implement uniform security policies and procedures in accordance with DNI directives and related guidance to ensure the proper protection, handling, storage, dissemination, and destruction of SCI;
(3) Ensure reciprocity with other U.S. Government agencies of personnel security access determinations or system or facility accreditations when there are no waivers, conditions, or deviations to DNI standards. Ensure other U.S. Government agencies receiving access determinations or accreditations from the Department are informed of all waivers;
(4) Ensure risk management is employed in implementing SCI protection measures to minimize the potential for compromise while maximizing the sharing of information between U.S. Government agencies;
(5) Ensure access to SCI is predicated on:
(a) A favorable determination of eligibility for access made by an IC element head or their designee;
(b) A signed DNI-approved non-disclosure agreement (NDA); and
(c) The need for access to national intelligence to perform or assist in a lawful and authorized governmental function.
(6) Ensure security and counterintelligence elements work together collaboratively for the protection of SCI;
(7) Ensure all personnel are vetted, trained, and advised of their legal obligations, the ramifications of their security responsibilities, and provided a secure work environment;
(8) Implement aggressive security and counterintelligence initiatives to support identification, apprehension, and as appropriate, prosecution of insiders who endanger national security concerns; and
(9) Establish formal continuing security awareness training and education programs to ensure comprehension of and compliance with DNI guidance. Individuals must be indoctrinated into their security responsibilities, and upon debrief, their life-long legal responsibilities to protect SCI.
c. The Office of Information Security (DS/SI/IS) performs duties as the Department's CSA for the protection of Classified National Intelligence, Including Sensitive Compartmented Information, in accordance with ICD 703, and as directed by INR [1 FAM 262.7-1] with the exception of the following authorities:
Sensitive Compartmented Information (SCI) Program
Sensitive Compartmented Information (SCI) is information about certain intelligence sources and methods and can include information pertaining to sensitive collection systems, analytical processing, and targeting, or which is derived from it.
Breadcrumb
Home Osy Information Security
Was this page helpful?
Was this page helpful? Sensitive Compartmented Information (SCI) Program
Sensitive Compartmented Information (SCI) is information about certain intelligence sources and methods and can include information pertaining to sensitive collection systems, analytical processing, and targeting, or which is derived from it. Access to SCI is only granted to individuals who have a need-to-know, have been granted a Top Secret clearance by Personnel Security (PerSec), and are approved by the Department of Commerce’s Intelligence Community granting agency, and only upon completion of a separate Nondisclosure Agreement, the IC Form 4414.
Information that has been determined to be SCI may only be stored and used in a Sensitive Compartmented Information Facility (SCIF). SCIFs have specific construction requirements, and their subsequent accreditation is separate from those for Controlled Areas and is coordinated by the Department’s Special Security Officer (SSO).
InfoSec Program personnel process incoming and outgoing Visit Access Requests (VAR) for individuals with SCI who will be attending meetings or other events at that level. Within the Department of Commerce’s Herbert C. Hoover Building (HCHB), VARs for Secret and Top Secret requests are handled by the Security Servicing Center and outside of the building, by an operating unit’s Client Security Services Division (CSSD) field office.
Special Security Officer
The Department of Commerce Special Security Officer (SSO) is responsible for management of the Department's Sensitive Compartmented Information (SCI) programs. SCI and/or Special Access Program (SAP) mission requirements shall be coordinated with the SSO by the operating unit identifying the access need.
Appointed Special Security Representatives (SSR) are delegated Sensitive Compartmented Information Facility (SCIF) management responsibilities, and coordinate directly with the SSO on matters related to SCIF administration, operations and compliance as appropriate.
Questions regarding the SSO functions, the SCI program or determining SCI access requirements may be sent to: [email protected]
Due to the sensitive nature of the program, e-mails will only be responded to which originate from addresses which end in .gov or .mil. Additionally, please do not include Personally Identifiable Information (PII) about yourself or others in messages to this mailbox.
Access to SCI
For more information on access to SCI, please visit the Personnel Security page, Access to Sensitive Compartmented Information (SCI).
Resources
Intelligence Community Directives (ICD)
Designation of Departmental Special Security Officer memorandum dated April 4, 2019
Guys, does anyone know the answer?