1
2
3
4
5
100
Define the following classification categories, how they differ and the color codes used to identify each one?
Top secret- exceptionally grave damage (yellow) SECRET- Serious damage (red) Confidential (damage) (blue) Unclassified (Open source)
100
Identify who has overall authority of, and controls access to a SCIF
The SSO (Tyrone Hanes)
100
Responsibilities of the TSCO?
Top Secret Control Officer (TSCO) maintains a system of accountability with activities that have anything to do with Top Secret Information
100
Order that material is destroyed during the EAP
SCI-TS-COMSEC Secret Confidential Unclassified
100
COMSEC (communications security)
Protective measures taken to deny unauthorized persons information derived from telecommunications of the U.S. Government concerning national security, and to ensure the authenticity of such telecommunications. [NOTE: COMSEC includes crypto-security, emission security, transmission security, and physical security of COMSEC material and COMSEC information.
200

Explain what is meant by need to know

if an individual requires access to specific information

200
Identify the use of the following forms (SF700,SF701,SF702,SF703,SF153,SF312)
SF700- Security Container Information-location, container number,lock number SF701- Activity security Checklist SF702- Security Container Check Sheet (Names and times for opening and closing) SF703- TS cover sheet SF153-COMSEC Material report SF312-Classified Info non-disclosure agreement
200
FPCON Normal, Alpha, Bravo,Charlie,Delta
Normal (no current terrorist activity) Alpha (small and general terrorist activity thats unpredictable (Bravo: somewhat predictable terrorist threat (Charlie: terrorist activity is imminent (Delta: terrorist attack is taking place
200
Define SCI
Sensitive Compartmented Information: Classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director or Central Intelligence
200
INFOSEC
(Information Security): The system of policies, procedures, and requirements established under the authority of E.O. 12958, as Amended, to protect information that, if subjected to unauthorized disclosure, could reasonably be expected to cause damage to the national security.
300

State the type of investigations and how often it is updated for access to the following classification levels?

TOP SECRET-Requires Tier 5ope Background Investigation Periodic Reinvestigation (SSBI-PR) updated everyt 5 years. SECRET: Requires a National Agency Check with Local Agency Check and Credit checks (NACLC updated every 10 years) Confidential: Requires NACLC updated every 15 years SCI Requires a prenomination interview update

300
When should safe combos be changed?
initial use, change in statue of authorized users, compromised or suspected compromise, or when left open
300
Explain what a RAM is?
Involves set of measures extracted from higher FPCONs or specific measures prescribed by the Installation Commander to be employed in addition to the basic FPCON measures already in place (random antiterrorism Measures)
300
Items Prohibited from SCIF:
weapons,flammable liquids, drugs, etc
300
COMPUSEC
COMPUSEC (Computer Security): Measures and controls that ensure confidentiality, integrity, and availability of the information processed and stored by a computer. What is
400
Identify what a SAER is and its purpose?
(Security Access Eligibility Report) Incidents and charges that have adverse impact on continued SCI eligibility. Used when trying to get an SCI clearance but have to explain something in detail (Negative marks on a credit report
400
What is an FDO?
Foreign Disclosure Officer, Approves the disclosure of classified and controlled unclassified military information to foreign governments and international organizations representatives.
400
Emergency Action Plan (EAP)
to have a plan to safeguard or destroy classified material in the event of an emergency or hostile actions
400
Discuss the need for access lists, required documentation logs and two person integrity?
Access lists: posted outside the space to make sure you have the appropriate clearance and allowed in space Documentation Logs: Ensure accountability of COMSEC Material,visitors, and SOP TPI: to prevent single person access to COMSEC information
400
CSM (Command Security Manager)
manage destruction of classified material and deal with security violations (Robert Purdy)
500
Identify the events that should be reported to the SSO?
violation of security regulations, unlawful acts, unexplained affluence or excessive indebteness, blackmail attempt
500
Purpose of Defense Courier Service?
transportation of classified material - no security markings on outside wrapping - nickname/special project marking on outer wrapping - hand carry only in continental US when other methods are impractical
500
Emergency Destruction Plan
destroy everything and order is given by the CO or destruction Officer
500
procedures for sanitizing an area
risk assessment, suitable covers and disguising COMINT
500
JPAS and DONCAF
JPAS (Joint Personnel Adjudication System): Verifies clearance and SCI access DONCAF (Department of the Navy Central Adjudification Facility: determines who is eligible to hold a security clearance and access to SCI