106: Security Flashcards
106.1
Discuss the purpose of personnel security
make a reasonable determination that individuals with privileged access to classified information will remain loyal, reliable, and trustworthy
106.2
Define, tell how they differ, and identify color codes of:
a. TOP SECRET
b. SECRET
c. CONFIDENTIAL
d. UNCASSIFIED
TOP SECRET - orange; exceptionally grave damage to national security
SECRET - red; serious damage to national security
CONFIDENTIAL - blue; damage to national security
UNCLASSIFIED - green; available to the general public
106.3
Explain what is meant by ‘need to know’
you may have clearance, but knowing the information isnt necessary to carry out tasks
106.4a
State the type of investigation and how often it is updated for Top Secret access
Single Scope Background Investigation; every 5 years
106.4b
State the type of investigation and how often it is updated for Secret access
Access National Agency Check and Credit; every 10 years
106.4c
State the type of investigation and how often it is updated for Confidential access
ANACI; every 15 years
106.4d
State the type of investigation and how often it is updated for SCI access
prenomination interview; SSBI; every 5 years
106.5
Identify what a SAER is and its purpose
Security Access Eligibility Report
used to identify any change in clearance eligibility
106.6
Identify the events that should be reported to the SSO
financial issues
legal issues
unauthorized absence
mental illness
marriage to a foreign national
anything that could question your character, integrity, physical and mental health needs to be reported
106.7
Identify who has overall authority of, and controls access to, a SCIF
Special Security Officer (SSO)
106.8a
Identify the use of an SF700
Security Container Information
106.8b
Identify the use of an SF701
Activity Security Checklist
106.8c
Identify the use of an SF702
Security Container Check Sheet
106.8d
Identify the use of an SF703
Top Secret Cover Sheet (Orange)
106.8e
Identify the use of an SF153
COMSEC Material Report
106.8f
Identify the use of an SF312
Classified Information NDA
106.9
State when safe combinations should be changed
when a combination lock is first installed or used
when a combination is believed to be compromised
after safe maintenance
when considered necessary by the CSA
106.10
State the responsibilities of the DDA
Designated Disclosure Authority
control disclosures of CMI (Classified Military Information) and CUI to foreign/international organizations
106.11
State the purpose of the DCS
Defense Courier Service
used for transportation of sensitive classified materials including SCI; operated by USTRANSCOM
106.12a
Describe the procedures for preparing hard copy classified material for transportation via DCS
Defense Courier System - below 300lbs; properly addressed (no APO/FPO or street addresses); no postage and fees paid indicators; no outer special, security, or classification markings unless previously approved by DCS
106.12b
Describe the procedures for preparing hard copy classified material for transportation via Handcarry
use a classified material covering when within the command; double wrap when outside the command; locked briefcase is ok except on commercial aircraft
106.13
State the responsibilities of the TSCO
Top Secret Control Officer
muster be at least an officer, Chief or GS-7; can be the Security Manager; maintain accountability and annual inventory of all Top Secret material
106.14
State the THREATCON recognition and Force Protection levels and discuss what each represents
THREATCON:
Normal - no known threat
Alpha - General threat of possible terrorist activity
Bravo - increased and more predictable threat of terrorist action
Charlie - imminent threat action or an incident has occurred
Delta - terrorist attack has occurred
FPCON:
Normal - no current terrorist activity
Alpha - small/general unpredictable terrorist activity
Bravo - somewhat predictable terrorist threat
Charlie - incident has occurred and activity is imminent
Delta - terrorist attack tsking place or just occurred
106.15a
Define RAM
Random Antiterrorism Measures; implemented without a set pattern
106.15b
Define PSP
Personnel Security Program; used to authorize initial and continued access to classified information and/or assignment to sensitive duties
106.15c
Define ATFP
Anti-Terrorism Force Protection; actions taken to prevent or mitigate hostile actions against DoD personnel, resources, facilities, and critical information
106.16
Explain and state the purpose of an EAP
Emergency Action Plan
plan to ensure personnel safety and security of cryptologic material in the event of an emergency
106.17
Explain and state the purpose of Emergency Destruction Procedures
two types: precautionary and complete
policy and procedures for destroying COMSEC material during emergency conditions; considers potential effects on national security
106.18
State who can give the order to initiate Emergency Destruction
the CO
106.19
Explain how, and in what order, material is destroyed during Emergency Destruction
burning; shredding; pulping; mutilation; decomposition; pulverizing
priority in order from highest to lowest classification
106.20
Define SCI
Sensitive Compartmented Information
information/material that requires special controls for restricted handling within formal access controls
106.21
List the items prohibited in a SCIF and the security risks associated with them
no device that photographs, transmits receives, records, or stores data and IT software without prior approval
106.22
Define the difference between a security violation and a practice dangerous to security
violation - actual compromise that requires investigation
PDS - failure to comply with regulations causing potential compromise
106.23a
Explain the security requirements for a SCIF
Category 1 (exterior wall is in an uncontrolled area)
Category 2 (exterior wall is in a controlled area)
106.23b
Explain the security requirements for a TSCIF
appearance and construction standards or standard shipping container with lights, AC outlets, data ports, and an HVAC system with only power, phone/data, and outside air inputs
106.24
Explain vault recertification and recurring inspections
inspected and recertified by GSA trained personnel before used to protect classified information; must receive the “GSA Approved Recertified Security Container” sticker
106.25
Discuss the need for access lists, required documentation logs, and two-person integrity
access lists specify who/what is allowed access; documentation logs include visitor logs, event logs, and deck logs within a space; TPI is required to prevent loss or compromise of classified material
106.26
Explain the DoD escort policy
visitors of a secure space must be escorted at all times; escort must be command personnel (not visitors who are cleared for access) and must remain in view of visitor;
106.27
Discuss the procedures for sanitizing an area
removal of:
data from media
classified labels & markings
activity logs
so personnel without a need to know cannot access the material
106.28a
Give the definition and purpose of COMSEC
Communications Security: deny unauthorized access to US Gov telecommunications concerning national security
106.28b
Give the definition and purpose of INFOSEC
Information Security: protection of information and information systems from modification and unauthorized access
106.28c
Give the definition and purpose of COMPUSEC
Computer Security: controls to ensure CIA of information stored and processed on a computer
106.29
State the purpose of the ICD system
Intelligence Community Directive
established by DNI as the means to communicate with the Intelligence Community
106.30
Identify SSO Navy
Special Security Officer
implements and oversees the SCI security program
106.31
List the duties and responsibilities of the SSO
supervise and administer SCI security
maintain SCI documents (regulations, manuals, etc) for proper turnover
official channel for SCI visitor access
manages SCI security actions and procedures
assists in processing SCI position and eligibility requests
conducts SCI briefs, indocs, and debriefs
investigates SCI infractions, makes recommendations, and prepares reports
conducts continued SCI security training and awareness
106.32
Identify who can be a CSM
Command Security Manager
GS-11 or Officer appointed by the CO with a favorable SSBI iwthin the last 5 years
106.33
State the duties and responsibilities of a CSM
storage and destruction of all classified information & establishing the Emergency Action Plan
106.34
Explain and state the purpose of JPAS
Joint Personnel Adjudication System - virtual consolidation of the DoD Central Adjudication Facility (CAFs)
has been replaced with Defense Information Security System (DISS)
106.35
Explain and state the responsibilities of DoDCAF
Department of Defense Central Adjudication Facility
apply national adjudication guidelines to information from background investigations conducted by the Office of Personnel Management (OPM)
106.36
Discuss how long a Commanding Officer can administratively suspend access before DoDCAF revokes a clearance
1 year in 90 day increments
106.37
Discuss the security rules and procedures for magnetic and electronic media
marked with the highest level of classification stored on the device and any special control notices that apply; for CD-ROMS, label may be affixed to the sleeve or storage container