if you want to remove an article from website contact us from top.

    in addition to foreign travel requirements those with sci access must

    James

    Guys, does anyone know the answer?

    get in addition to foreign travel requirements those with sci access must from EN Bilgi.

    Sensitive Compartmented Information (SCI) Security Refresher Flashcards

    Study with Quizlet and memorize flashcards terms like A security violation involves the loss, compromise, or suspected compromise of classified information. Security violations must be reported., You are required to report all foreign travel prior to departure, including day trips to Canada and Mexico., When you signed the SCI NdS, you agreed that anything you gained from unauthorized disclosure of SCI would become the property of the United States Government. and more.

    Sensitive Compartmented Information (SCI) Security Refresher

    4.2 10 Reviews

    A security violation involves the loss, compromise, or suspected compromise of classified information. Security violations must be reported.

    Click card to see definition 👆

    true

    Click again to see term 👆

    You are required to report all foreign travel prior to departure, including day trips to Canada and Mexico.

    Click card to see definition 👆

    false

    Click again to see term 👆

    1/100 Created by jojo9716

    Terms in this set (100)

    A security violation involves the loss, compromise, or suspected compromise of classified information. Security violations must be reported.

    true

    You are required to report all foreign travel prior to departure, including day trips to Canada and Mexico.

    false

    When you signed the SCI NdS, you agreed that anything you gained from unauthorized disclosure of SCI would become the property of the United States Government.

    true

    Walls in SCIFs must extend from true floor to true ceiling.

    true

    An SCI document that contains the dissemination control marking NOFORN indicates this document ___________________________________.

    a. Is not releasable to foreign nationals

    You must report external activist groups you or your co-workers are affiliated with regardless of their nature.

    true

    Visitors may enter a SCIF without a visitor certification if they are escorted by indoctrinated personnel.

    true

    If the ISSO permits it, you may share your password in a SCIF.

    false

    The access control system for unattended SCIF entry must use ____________________ and _______________________ such as an access card and personal identification number (PIN).

    b. Authentication, verification

    SCI couriers must be appointed __________, have a signed letter of authorization and know the rules and regulations governing couriers and transporting classified material.

    in writing

    In a SCIF, SCI must always be stored in a GSA-approved container.

    false

    After setting the alarm on a SCIF, spinning the lock, and displaying the closed sign, you must complete the _____________________ form

    b. SF-701 NOT correct

    Which is the primary database used to verify personnel access to SCIFs outside DoD?

    b. Joint Personnel Adjudication System (JPAS) NOT CORRECT

    If a SCIF has a high security lock, then an access control system is not required.

    false

    The SCI control system marking should not be listed in the banner line on a classified document.

    false

    _____________ is technically derived intelligence data other than imagery and signals intelligence that locates, identifies, or describes distinctive characteristics of targets.

    f. Measurement and Signature Intelligence (MASINT)

    What piece of information is not required to be recorded on the SCIF visitor control log?

    f. Visitor's date of birth

    The three primary types of SCIFs are referred to as closed storage SCIF, open storage SCIF, and ___________________.

    a. Continuous Operation SCIF

    You must report any systemic weaknesses and anomalies.

    true

    When closing a closed storage SCIF you must ensure all classified material has been stored, security containers are closed and locked, locked sign is displayed on security containers, and the SF-701 form is completed.

    true

    SCI is required to be stored in a GSA-approved container in a Closed Storage SCIF.

    true

    One company must be responsible for the installation, maintenance, and monitoring of the Intrusion Detection System (IDS) for SCIFs.

    true

    SCI Material cannot be stored in _________________________________.

    b. An open storage SCIF (WRONG)

    _____________ uses imagery, imagery intelligence, or geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the earth.

    b. Imagery Intelligence (IMINT) (WRONG)

    Which of the following is the preferred method for transporting an SCI document from one SCIF to another?

    a. Defense Courier Service (DCS)

    IS components, media, and/or memory may be brought into a SCIF and removed from a SCIF if it has been properly logged and approved by the __________________________.

    c. Special Security Officer (SSO) or Information Systems Security Officer (ISSO)

    Which of the following is an escort in a SCIF not required to do?

    d. Process the visitor certifications for their visitors

    You've noticed that Sydney has been very unhappy and disgruntled at work lately in the SCIF. You are required to report this information about Sydney.

    true

    How long must SCIF visitor control logs be retained?

    . 1 year after the last entry

    Sensitive Compartmented Information (SCI) is ______________________.

    c. Classified national intelligence information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems

    You are not required to report adverse information about others who also have SCI access. You are only required to report adverse information about yourself.

    false

    The ___________________________ processes SCIF visitor certifications.

    b. Special Security Officer (SSO) or Special Security Representative (SSR)

    Source : quizlet.com

    12 FAM 710 SECURITY POLICY FOR SENSITIVE COMPARTMENTED INFORMATION

    UNCLASSIFIED (U) 12 FAM 700

    SECURITY POLICY FOR SENSITIVE COMPARTMENTED INFORMATION (SCI) WITHIN DEPARTMENT OF STATE FACILITIES

    12 FAM 710

    SECURITY POLICY FOR SENSITIVE COMPARTMENTED INFORMATION

    (CT:DS-314;   12-17-2018)

    (Office of Origin:  DS/SI/IS)

    12 FAM 711  GENERAL

    12 FAM 711.1  Authorities

    (CT:DS-258;   06-13-2016)

    (1)  National Security Act of 1947, as amended

    (2)  Intelligence Reform and Terrorism Prevention Act (IRTPA) of 2004

    (3)  Executive Order 12333, as amended

    (4)  Executive Order 13526

    (5)  Executive Order 12968

    (6)  Public Law 100-204, as amended

    (7)  The Foreign Service Act of 1980

    (8)  The Omnibus Diplomatic Security and Anti-terrorism Act of 1986 (22 U.S.C. 4801 et seq.)

    (9)  Intelligence Community Directives (ICD) and related Standards and Policy Guidance

    (10) Bureau of Intelligence and Research (INR)/Diplomatic Security (DS) Memorandum of Agreement (MOA) Security Responsibility for the Protection of Certain Intelligence-Related Matters, April 18, 2016

    12 FAM 711.2  Purpose

    (CT:DS-258;   06-13-2016)

    a. This subchapter implements security policies established to protect national intelligence worldwide, as defined in section 1012 of IRTPA, designated by the Director of National Intelligence (DNI) as Sensitive Compartmented Information (SCI), and intelligence sources and methods.  It describes the:

    (1)  Roles, responsibilities, and authorities of the Assistant Secretary for INR as the Department Intelligence Community (IC) element head as defined by the National Security Act of 1947, as amended, and E.O. 12333, as amended;

    (2)  Authorities of other agency IC element heads for their facilities within Department buildings worldwide; and

    (3)  Responsibilities of all Department employees and contractors indoctrinated into SCI access.

    b. This subchapter further implements Department worldwide security policies for National Intelligence as required by E.O. 13526, E.O. 12968, ICDs, Intelligence Community Standards, Intelligence Community Policy Guidance (ICPG), and other documents cited herein for guidance on specific security functions.  Users are referred to applicable DNI control system manuals or directives for guidance on appropriate classification levels and compartmented information.

    12 FAM 711.3  Applicability

    (CT:DS-258;   06-13-2016)

    The policies in this subchapter must be applied by all bureaus, posts, and personnel under the authority of the Secretary and chief of mission (COM) for receiving, transmitting, handling, storing, processing, discussing or otherwise using SCI.

    12 FAM 712  RESPONSIBILITIES

    12 FAM 712.1  Intelligence Community (IC) Element Head

    (CT:DS-258;   06-13-2016)

    a. INR is the Department’s IC element head.  An IC element head may delegate responsibility for the implementation of policies and procedures defined in DNI ICDs and related guidance for the protection of SCI to a Cognizant Security Authority (CSA).

    b. DS, as delegated by INR, per the INR/DS MOA of April 18, 2016 must:

    (1)  Protect SCI from unauthorized disclosure consistent with DNI guidance;

    (2)  Implement uniform security policies and procedures in accordance with DNI directives and related guidance to ensure the proper protection, handling, storage, dissemination, and destruction of SCI;

    (3)  Ensure reciprocity with other U.S. Government agencies of personnel security access determinations or system or facility accreditations when there are no waivers, conditions, or deviations to DNI standards.  Ensure other U.S. Government agencies receiving access determinations or accreditations from the Department are informed of all waivers;

    (4)  Ensure risk management is employed in implementing SCI protection measures to minimize the potential for compromise while maximizing the sharing of information between U.S. Government agencies;

    (5)  Ensure access to SCI is predicated on:

    (a)  A favorable determination of eligibility for access made by an IC element head or their designee;

    (b)  A signed DNI-approved non-disclosure agreement (NDA); and

    (c)  The need for access to national intelligence to perform or assist in a lawful and authorized governmental function.

    (6)  Ensure security and counterintelligence elements work together collaboratively for the protection of SCI;

    (7)  Ensure all personnel are vetted, trained, and advised of their legal obligations, the ramifications of their security responsibilities, and provided a secure work environment;

    (8)  Implement aggressive security and counterintelligence initiatives to support identification, apprehension, and as appropriate, prosecution of insiders who endanger national security concerns; and

    (9)  Establish formal continuing security awareness training and education programs to ensure comprehension of and compliance with DNI guidance.  Individuals must be indoctrinated into their security responsibilities, and upon debrief, their life-long legal responsibilities to protect SCI.

    c.  The Office of Information Security (DS/SI/IS) performs duties as the Department's CSA for the protection of Classified National Intelligence, Including Sensitive Compartmented Information, in accordance with ICD 703, and as directed by INR [1 FAM 262.7-1] with the exception of the following authorities:

    Source : fam.state.gov

    Sensitive Compartmented Information (SCI) Program

    Sensitive Compartmented Information (SCI) is information about certain intelligence sources and methods and can include information pertaining to sensitive collection systems, analytical processing, and targeting, or which is derived from it.

    Breadcrumb

    Home Osy Information Security

    Was this page helpful?

    Was this page helpful? Sensitive Compartmented Information (SCI) Program

    Sensitive Compartmented Information (SCI) is information about certain intelligence sources and methods and can include information pertaining to sensitive collection systems, analytical processing, and targeting, or which is derived from it. Access to SCI is only granted to individuals who have a need-to-know, have been granted a Top Secret clearance by Personnel Security (PerSec), and are approved by the Department of Commerce’s Intelligence Community granting agency, and only upon completion of a separate Nondisclosure Agreement, the IC Form 4414.

    Information that has been determined to be SCI may only be stored and used in a Sensitive Compartmented Information Facility (SCIF). SCIFs have specific construction requirements, and their subsequent accreditation is separate from those for Controlled Areas and is coordinated by the Department’s Special Security Officer (SSO).

    InfoSec Program personnel process incoming and outgoing Visit Access Requests (VAR) for individuals with SCI who will be attending meetings or other events at that level. Within the Department of Commerce’s Herbert C. Hoover Building (HCHB), VARs for Secret and Top Secret requests are handled by the Security Servicing Center and outside of the building, by an operating unit’s Client Security Services Division (CSSD) field office.

    Special Security Officer

    The Department of Commerce Special Security Officer (SSO) is responsible for management of the Department's Sensitive Compartmented Information (SCI) programs. SCI and/or Special Access Program (SAP) mission requirements shall be coordinated with the SSO by the operating unit identifying the access need.

    Appointed Special Security Representatives (SSR) are delegated Sensitive Compartmented Information Facility (SCIF) management responsibilities, and coordinate directly with the SSO on matters related to SCIF administration, operations and compliance as appropriate.

    Questions regarding the SSO functions, the SCI program or determining SCI access requirements may be sent to: [email protected]

    Due to the sensitive nature of the program, e-mails will only be responded to which originate from addresses which end in .gov or .mil. Additionally, please do not include Personally Identifiable Information (PII) about yourself or others in messages to this mailbox.

    Access to SCI

    For more information on access to SCI, please visit the Personnel Security page, Access to Sensitive Compartmented Information (SCI).

    Resources

    Intelligence Community Directives (ICD)

    Designation of Departmental Special Security Officer memorandum dated April 4, 2019

    Source : www.commerce.gov

    Do you want to see answer or more ?
    James 5 month ago
    4

    Guys, does anyone know the answer?

    Click For Answer