106.1 Discuss the purpose of personnel security
To authorize initial and continued access to classified information and/or initial and continued assignment to sensitive duties to those persons whose loyalty, reliability and trustworthiness are such that entrusting them with classified information or assigning them to sensitive duties is clearly consistent with the interests of national security
106.2 Define the following classification categories, how they differ, and the color codes used to identify each one
TOP SECRET - cause exceptionally grave damage to the national security. Color Code is Orange
SECRET - cause serious damage to the national security. Color Code is Red
CONFIDENTIAL - cause damage to the national security. Color Code is Blue
UNCLASSIFIED - cause little to no damage to the national security. Color Code is Green
106.3 Explain what is meant by ‘need to know’
You have a need to use the information in completion of your duties
106.4 State the type of investigation and how often it is updated for access to the following classification levels
Top Secret - Favorably completed SSBI, SSBI-PR or PPR. The SSBI must be updated every five years by a PR
Secret - Favorably completed SSBI, SSBI-PR or PPR.
Confidential - Favorably completed NACLC or ANACI.
SCI - Favorably adjudicated SSBI. A SSBI-PR is required to be submitted every five years
106.5 Identify what a SAER is and its purpose
Security Access Eligibility Report: Used to identify an incident or any change in eligibility if an employee is still eligible for the security clearance
106.6 Identify the events that should be reported to the SSO
106.7 Identify who has overall authority of, and controls access to, a SCIF
The Special Security Officer (SSO) will be responsible for the operation of the Sensitive Compartmented Information Facility (SCIF) and the security control and use of the SCIF
106.8 Identify the use of the following forms
SF 700 SF 701 SF 702 SF 703 SF 153 SF 312
SF 700: Security Container Information; this form contains vital information about the security container in which it is located
SF 701: Activity Security Checklist; this form is a checklist that is filled out at the end of each day to insure that classified materials are secured properly
SF 702: Security Container Check Sheet; this form provides a record of the names and times that persons have opened, closed and checked a particular container that holds classified information
SF 703: Top Secret Cover Sheet (Orange); this form is used as a cover sheet for Top Secret documents
SF 153: COMSEC Material Report; according to GSA, it is no longer in available for order through their archives
SF 312: Classified Information Nondisclosure Agreement; this form provides is a contractual agreement between the U.S. Government and a cleared employee that must be executed as a condition of access to classified information
106.9 State when safe combinations should be changed
106.10 State the responsibilities of the DDA
The Designated Disclosure Authority has the authority and responsibility to control disclosures of Classified Military Information and Controlled Unclassified Information to foreign governments and international organizations and their representatives or persons sponsored by them
106.11 State the purpose of the DCS
The DCS establishes, staffs, operates, and maintains an international network of couriers and courier stations for the expeditious, cost effective, and secure transmission of qualified classified documents and material
106.12 Describe the procedures for preparing hard copy classified material for transportation via
DCS
Handcarry
DCS:
Handcarry:
106.13 State the responsibilities of the TSCO
106.14 State the THREATCON recognition and Force Protection levels and discuss what each represents
FPCON NORMAL describes a situation or no current terrorist activity
FPCON ALPHA describes a situation where there is a small and general terrorist activity that is not predictable
FPCON BRAVO describes a situation with somewhat predictable terrorist threat
FPCON CHARLIE describes a situation when an instance occurs or when intelligence reports that there is terrorist activity imminent
FPCON DELTA describes a situation when a terrorist attack is taking place or has just occurred
106.15 Define the following terms
RAM
PSP
ATFP
RAM - Random Antiterrorism Measures
PSP - Personnel Security Program (PSP) is to authorize initial and continued access to classified information and/or initial and continued assignment to sensitive duties to those persons whose loyalty, reliability and trustworthiness are such that entrusting them with classified information or assigning them to sensitive duties is clearly consistent with the interests of national security
ATFP - Anti-terrorism and force protection is a security program designed to protect military personnel, civilian employees, family members, facilities, and equipment in all locations and situations
106.16 Explain and state the purpose of an EAP
Emergency Action Plan (EAP) is utilized when anticipating natural disasters. Maintain an up-to-date, written Emergency Action Plan for the protection of COMSEC material appropriate for natural disasters likely to occur in their region
106.17 Explain and state the purpose of Emergency Destruction Procedures
Emergency Destruction Procedures (EDP) are utilized when anticipating a hostile action. Planning for hostile actions must concentrate on procedures to safely evacuate or securely destroy the COMSEC material, to include providing for the proper type and a sufficient number of destruction devices to carry out emergency destruction
106.18 State who can give the order to initiate Emergency Destruction
The Commanding Officer/OIC or official responsible for safeguarding COMSEC material
106.19 Explain how, and in what order, material is destroyed during Emergency Destruction
Priority One: All cryptographic equipment and documents
Priority Two: All operational SCI code word material which might divulge targets and successes, documents dealing with U.S. SCI activities and documents concerning compartmented projects and other sensitive intelligence materials and TOP SECRET collateral
Priority Three: Less sensitive administrative SCI material and collateral classified material not included above
106.20 Define SCI
Sensitive Compartmented Information: Classified information concerning or derived from intelligence sources, methods, or analytical processes which is required to be handled within formal access
106.21 List the items prohibited in a SCIF and the security risks associated with them
No devices that transmits, receives, records or stores data is authorized into a SCIF without prior approval
No photography in or around a SCIF is allowed without CO approval
The ISSM must approve ALL IT software prior to its use in a SCIF
106.22 Define the difference between a security violation and a practice dangerous to security
A security violation is when actual compromise or loss of material has occurred. Whereas a practice dangerous to security is someone who does not follow proper security procedures
106.23 Explain the security requirements for the following
Inside US SCIF
Outside US SCIF
TSCIF
Inside U.S
Outside U.S.
1. Must meet the construction specifications for SCIFs
T-SCIF:
1. Ground-based T-SCIFs may be established in hardened structures (e.g., buildings, bunkers) or semi-permanent structures (e.g., truck-mounted or towed military shelters, prefabricated buildings, tents).
106.24 Explain vault recertification and recurring inspections
The container or vault door must be inspected and recertified by a person specifically trained and authorized by the GSA before it can be used to protect classified material
Upon completion a label will be applied and the container/vault door is then considered authorized for storage/protection of classified material
If the container fails inspection, it must be repaired in accordance with Federal Standard 809 before the recertification label can be applied