106.1 Discuss the purpose of personnel security [ref. a, chapter 1-1]
106.2 Define the following classification categories, how they differ, and the color codes
used to identify each one [ref. a, chapter 1-1]
a. TOP SECRET - Orange. Exceptionally grave damage to the national security.
b. SECRET- Red. Serious damage to the national security.
c. CONFIDENTIAL - Blue. Damage to the national security.
d. UNCLASSIFIED - Green. Publications and documents available to the general public.
106.3 Explain what is meant by ‘need to know’ [ref. a, appendix 9-2]
106.4 State the type of investigation and how often it is updated for access to the following classification levels [ref. a, chapter 6-4]
a. Top Secret - SSBI - 5 years
b. Secret - NACLC/ANACI - 10 years
c. Confidential - NACLC/ANACI - 15 years
d. SCI - SSBI - 5 years
106.5 Identify what a SAER is and its purpose [ref. b]
106.6 Identify the events that should be reported to the SSO [ref. b]
106.7 Identify who has overall authority of, and controls access to, a SCIF [ref. a, chapter 2-9]
106.8 Identify the use of the following forms: [ref. c] SF-700; 701; 702; 703; 153; 312
a. SF700 – Security Container Information
b. SF701 – Activity Security Checklist
c. SF702 – Security Container Check Sheet
d. SF703 – Top Secret Cover Sheet (Orange)
e. SF153 – Comsec Material Report
f. SF312 – Classified Information Nondisclosure Agreement
106.9 State when safe combinations should be changed. [ref. a, chapter 10-12]
106.10 What is a DDA and state their responsibilities. [ref. o]
106.11 State the purpose of the DCS. [ref. d, chapter 1.1.3.1]
106.12 Describe the procedures for preparing hard copy classified material for transportation:
a. 1. DCS Defense Courier Service
No item entering the DCS shall weigh over 300 pounds. Items shall be addressed with the standardized DCS two-line address; the Army/Air Post Office, the Fleet Post Office, and the street addresses shall not be used. Envelopes, labels, or tags with visible “postage and fees paid” indications shall not be used. Security classification markings, special security caveats, and other extraneous markings must not appear on the outer wrapper. Nickname and/or special project markings previously approved by the DCS must be placed on the outer wrapper.
b. 2. Hand carry [ref. e, chapter 9]
Use a classified material cover sheet, file folder, or other covering to prevent inadvertent disclosure when hand carrying classified information within the command. Double-wrap the classified information when hand carrying outside the command. A locked briefcase may serve as the outer cover, except when hand carrying aboard commercial aircraft.
106.13 State the responsibilities of the TSCO. [ref. e, chapter 2-3]
106.14 State the THREATCON recognition and Force Protection levels and discuss what each represents. [ref. f]
a. THREATCON NORMAL – No known threat indicated.
b. THREATCON ALPHA - General threat of possible terrorist activity against installations and personnel.
c. THREATCON Bravo – Increased and more predictable threat of terrorist action.
d. THREATCON Charlie – An incident has occurred or a terrorist action is imminent.
e. THREATCON Delta – Terrorist attack has occurred.
a. FPCON Normal - No current terrorist activity.
b. FPCON Alpha - Small and general terrorist activity that is not predictable.
c. FPCON Bravo - Somewhat predictable terrorist threat.
d. FPCON Charlie – An incident has occurred terrorist activity is imminent.
e. FPCON Delta - Terrorist attack is taking place or has just occurred.
106.15 Explain the following terms. RAM; PSP; ATFP
a. RAM -Random Antiterrorism Measures. To maximize the effectiveness and deterrence value, RAM should be implemented without a set pattern, either in terms of the measure selected, time, place, or other variables.
b. PSP -Personnel Security Program: Used to authorize initial and continued access to classified information and/or initial and continued assignment to sensitive duties.
c. ATFP -Anti-Terrorism Force Protection: Actions taken to prevent or mitigate hostile actions against Department of Defense personnel (to include family members), resources, facilities and critical information.
106.16 Explain and state the purpose of an EAP. [ref. g, appendix l]
106.17 Explain and state the purpose of Emergency Destruction Procedures.
106.18 State who can give the order to initiate Emergency Destruction.
106.19 Explain how, and in what order, material is destroyed during Emergency Destruction
106.20 Define SCI. [ref. a, Appendix a]
106.21 List the items prohibited in a SCIF and the security risks associated with them. [ref. h]
106.22 Define the difference between a security violation and a practice dangerous to security. [ref. b]
106.23 Explain the security requirements for the following: SCIF; T-SCIF
106.24 Explain vault recertification and recurring inspections. [ref. b]