At a minimum _________ should include special and general guard orders, access and material control, protective barriers, lighting systems, locks, and Intrusion Detection Systems (IDS). E.O. Answer. Sign up for our email newsletter to receive regular updates on all things security. . A classifier determines that a report containing certain chemical formulas associated with bio-chemical defense could cause exceptionally grave damage to the national security of the United States if revealed. Chemical, biological, radiological, nuclear and high yield explosive representative, Information operations representative, Operations security officer, Law enforcement, Counterintelligence, Antiterrorism Officer. f(z)=1/z^2+1. What are the options an OCA has when determining declassification? The End Date of your trip can not occur before the Start Date. Now that you have some background on Closed Areas and what they're used for, let's dive into the best practices when developing one according to NISPOM standards. ONLY a GSA-approved security container is authorized to store classified information. A classifier uses information in a Top Secret document to generate a new document for use in the DoD. The emanations are unintentional, but they allow the possibility of the information being intercepted and exploited. True or False. Restricted area signs posted around the perimeter of nuclear weapon storage facilities states that if anyone attempts to enter the area without permission of the Installation Commander _____________________. This category only includes cookies that ensures basic functionalities and security features of the website. SCIFs (Sensitive Compartmented Information Facilities) generally fail when they lack policy compliant construction expertise, which seems to be in short supply in this Industry. \text{Inspection of finished goods}&\text{\hspace{8pt}390}&\text{\hspace{10pt}19}\\ Another document you are working with contains this banner marking: Who provides construction and security requirements for SCIFs? 3. Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities SCIF Container Series | Part 1: Site Evaluation SCIF Container Series | Part 2: Design Planning Checklist When the facility is occupied, it must be protected by an access control system (ACS), which requires two-factor authentication, such as a card and PIN. a. GENERAL SERVICES ADMINISTRATION
Select the best answer. Some construction elements typically found in SCIF construction include: Access control measures such as: true or false. ___________ is defined as an INITIAL determination that information requires, in the interest of national security, protection against unauthorized disclosure. an OCA that has been granted Secret classification authority may classify information only at the__________. (9) Maintains a list of items prohibited in GSA-controlled SCIFs, in accordance with ICD 705. Experience relating to the accreditation of customer SCIFs and collateral facilities. It can be a secure room, building or data center that guards against electronic surveillance and suppresses data leakage of sensitive security and military information. (TRUE OR FALSE). Any incidents involving improper escorting during a visitors entrance into the SCIF must be immediately reported to the SSM. True or False. But, by itself, the facility is not RF secure. Developed by TinyFrog. 6. You must use form SF-700, Security Container Information, to track all information listed here except___________________. AA&E must be categorized, stored, and protected by security risk categories. who provides accreditation for dod scifs. For storage of classified you may use which GSA-approved containers? Who provides construction and security requirements for SCIFs? Electromechanical combination locks are used for securing classified information. SCIFs, AA&E storage facilities, and nuclear storage facilities are examples of restricted areas. This website uses cookies to improve your experience. (TRUE OR FALSE), Jersey barriers may be placed around buildings to prevent vehicles from getting too close to the buildings. (TRUE OR FALSE), Provisions for one entity, such as a DoD activity or local law enforcement, fire, and medical services, to provide security assistance to another entity IS__________________, MOA/MOU (MEMORANDUM OF UNDERSTANDING (AGREEMENT). True or False. ActivityInspectionofincomingrawmaterialsInspectionoffinishedgoodsNumberofdefectiveunitsdiscoveredin-houseNumberofdefectiveunitsdiscoveredbycustomersLostprofitsduetodissatisfiedcustomersPredictedReductioninActivityUnits3903901,20032575PredeterminedOverheadAllocationRateperUnit$44195072102. It goes without saying that information like that needs to be protected. What policy partnerships has DoD developed to standardize cybersecurity and protect the unique requirements of DoD missions and warfighters? The perimeter of the facility must meet a rating of STC (Sound Transmission Class) 45 at a minimum, or STC 50 if youll be using amplified sound, such as video teleconferencing, speaker phone or a PA system. Department personnel must notify the requesting bureau BSO or the facility SSR prior to any routine maintenance work. Verify the individual's clearance eligibility. Because classified information will be discussed in the space, ICD 705 requires multiple acoustic protections so that nothing sensitive is heard outside the SCIF. as well as provide knowledgeable security oversight during the lifecycle of the project. 12958, as amended (2003) George W. Bush E.O. Once you have successfully moved past sponsorship and youre on the path to finding a contractor to build your facility, its extremely helpful and important to understand the ICD 705 construction standards. a type of targeted phishing that appears to be from a specific organization, such as your employer or bank is called________________? Our Team continuous, standby, emergency, and movable, The basic manual access control system is simply________. The people who are in possession of, or who are otherwise charged with safeguarding classified information. ________ occurs when there is a knowing, willful, or negligent action that could reasonably be expected to result in an unauthorized disclosure of classified information; action to classify or continue the classification of information contrary to the requirements of E. O. ____________ is the six step process an OCA applies in making classification determinations. Name the 5 risk management process. directives@gsa.gov, An official website of the U.S. General Services Administration. _____________________
(4) Immediately report an actual or potential security violation/incident to the SSM appointed to support the GSA-controlled SCIF where the security violation/incident occurred (i.e., regional or Central Office location). \textbf{}&\textbf{Predicted}&\textbf{Predetermined}\\ To maintain certification, vault doors and frames must remain what color? A facility or space designated to meet NSA 94106 is RF secure as it requires a six-sided shielding system, RF doors, penetrations . ___________applies when a general global threat of possible terrorist activity exists and warrants a routine security posture. La Mesa, Cund. The provisions of this Order shall not be construed to interfere with, or impede, the legal authorities or independence of the GSA Office of Inspector General or the Civilian Board of Contract Appeals. Short for Sensitive Compartmented Information Facility, a SCIF is a specially constructed building, or specially constructed rooms within a larger facility that are designed to allow the handling of sensitive information, hardware, and other materials without exposure to the outside world. True or False. What type of security classification guidance is a memorandum, plan, message document, letter, or order that contains classification guidance? DD Form 254, DoD Contract Security Classification Specification. Which of these should be covered with a protective film to make them less dangerous in an attack? Most common and informal oversight tool; immediate action taken to correct deficiencies. When the SCIF is unoccupied, it must be protected by an intrusion detection system (IDS), which has to meet the UL-2050 specification for protecting national security information. 2. Storage Containers and Facilities Storage Con, Physical Security Planning and Implementation, Fundamentals of Engineering Economic Analysis, David Besanko, Mark Shanley, Scott Schaefer, Introduction to Thermodynamics and Heat Transfer, Estrada Contemporary Catholicism Midterm Stud. ________ occurs as the knowing, willful, or negligent action that contradicts E. O. This position will also provide personnel security support as needed for customers in the Huntsville, AL vicinity. The factory setting for a built-in container lock is 50-25-50. Unauthorized disclosure of ________ information could reasonably be expected to cause serious damage to our national security. \textbf{\hspace{80pt}Activity}&\textbf{Activity Units}&\textbf{Rate per Unit}\\ SCI Briefed - The initial instructions concerning the unique nature of SCI, its unusual sensitivity, and the special security regulations and practices for its handling which are given to each individual who has been approved for access prior to his/her exposure. What kind of fencing can be used as a temporary perimeter to establish psychological barriers and to channel pedestrian and vehicle movement. who provides construction and security requirements for scifs. construction, security, administration, and maintenance of SCIFs. Using the information presented in the chapter, answer the following questions. Courier Authorization Card, what is its number? Site lighting is used to enable guard force personnel to observe activities inside or outside the installation? This list of authorities is not all inclusive but represents the primary reference documents: a. To reduce overall storage and protection costs. TRUE OR FALSE. What process did this individual just complete? The purpose of this Order is to establish policies for accessing, safeguarding, and storing classified information and material, including documents printed and stored within a U.S. General Services Administration (GSA)-controlled SCIF. What is the basic formula for granting access to classified information for individuals? ( TRUE OR FALSE ), Certain types of lighting can incapacitate an intruder. whether decisions have already been made about classification of the information. PHYSICAL SECURITY-- (SPED), Physical Security, SPeD - Physical Security Planning and Impleme, Numberofdefectiveunitsdiscoveredin-house, Numberofdefectiveunitsdiscoveredbycustomers, Lostprofitsduetodissatisfiedcustomers, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Operations Management: Sustainability and Supply Chain Management, Information Technology Project Management: Providing Measurable Organizational Value. mechanical, electronic, or electromechanical devices. Assess threats (type and degree of threat) If you need to know the manufacture date of a GSA-approved container, on which label would you find that information? A GSA-approved security container for storing classified in ____________________ is typically a portable field safe. Our security specialists provide industry expertise and strategic knowledge to plan, design, and certify security requirements for your organization or home. Home Fullwide; Home Boxed; Features. Which of the following individuals should be included in a Threat Working Group? Commanders must comply with and integrate DoD physical security and installation access control policies into their FPCON plans. SCIFs that have been de-accredited but controlled at the SECRET level (IAW 32 Code of Federal Regulations (CFR) parts 2001 and 2004) for less than one year may be re-accredited. (TERRORIST, FENCE, OPEN UNATTENDED INSTALLATION GATE, ARMS AND AMMUNITION, LOSS OF LIFE). Which of the following items may be stored with classified information? Have a host/escort official who does the following: Meets the visitor at the SCIF entrance and provides escort duties. ICD/ICS705 is intended to provide a level of security and often takes advantage of distances from the SCIF to the perimeter of a facility. Communications Security (COMSEC) - Measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications, or to mislead unauthorized persons in their interpretation of the results of such possession and study.