Sensitive Compartmented Information Overview
99 Questions
100 Views

Sensitive Compartmented Information Overview

Created by
@ImprovingSocialRealism4496

Questions and Answers

A security violation involves the loss, compromise, or suspected compromise of classified information. Security violations must be reported.

True

You are required to report all foreign travel prior to departure, including day trips to Canada and Mexico.

False

When you signed the SCI NdS, you agreed that anything you gained from unauthorized disclosure of SCI would become the property of the United States Government.

True

Walls in SCIFs must extend from true floor to true ceiling.

<p>True</p> Signup and view all the answers

An SCI document that contains the dissemination control marking NOFORN indicates this document ___________________________________.

<p>Is not releasable to foreign nationals</p> Signup and view all the answers

You must report external activist groups you or your co-workers are affiliated with regardless of their nature.

<p>True</p> Signup and view all the answers

Visitors may enter a SCIF without a visitor certification if they are escorted by indoctrinated personnel.

<p>True</p> Signup and view all the answers

If the ISSO permits it, you may share your password in a SCIF.

<p>False</p> Signup and view all the answers

The access control system for unattended SCIF entry must use ____________________ and _______________________ such as an access card and personal identification number (PIN).

<p>Authentication, verification</p> Signup and view all the answers

SCI couriers must be appointed __________, have a signed letter of authorization and know the rules and regulations governing couriers and transporting classified material.

<p>in writing</p> Signup and view all the answers

In a SCIF, SCI must always be stored in a GSA-approved container.

<p>False</p> Signup and view all the answers

After setting the alarm on a SCIF, spinning the lock, and displaying the closed sign, you must complete the _____________________ form.

<p>SF-701</p> Signup and view all the answers

Which is the primary database used to verify personnel access to SCIFs outside DoD?

<p>Joint Personnel Adjudication System (JPAS)</p> Signup and view all the answers

If a SCIF has a high security lock, then an access control system is not required.

<p>False</p> Signup and view all the answers

The SCI control system marking should not be listed in the banner line on a classified document.

<p>False</p> Signup and view all the answers

_____________ is technically derived intelligence data other than imagery and signals intelligence that locates, identifies, or describes distinctive characteristics of targets.

<p>Measurement and Signature Intelligence (MASINT)</p> Signup and view all the answers

What piece of information is not required to be recorded on the SCIF visitor control log?

<p>Visitor's date of birth</p> Signup and view all the answers

The three primary types of SCIFs are referred to as closed storage SCIF, open storage SCIF, and ___________________.

<p>Continuous Operation SCIF</p> Signup and view all the answers

You must report any systemic weaknesses and anomalies.

<p>True</p> Signup and view all the answers

When closing a closed storage SCIF you must ensure all classified material has been stored, security containers are closed and locked, locked sign is displayed on security containers, and the SF-701 form is completed.

<p>True</p> Signup and view all the answers

SCI is required to be stored in a GSA-approved container in a Closed Storage SCIF.

<p>True</p> Signup and view all the answers

One company must be responsible for the installation, maintenance, and monitoring of the Intrusion Detection System (IDS) for SCIFs.

<p>True</p> Signup and view all the answers

SCI Material cannot be stored in _________________________________.

<p>An open storage SCIF</p> Signup and view all the answers

_____________ uses imagery, imagery intelligence, or geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the earth.

<p>Imagery Intelligence (IMINT)</p> Signup and view all the answers

Which of the following is the preferred method for transporting an SCI document from one SCIF to another?

<p>Defense Courier Service (DCS)</p> Signup and view all the answers

IS components, media, and/or memory may be brought into a SCIF and removed from a SCIF if it has been properly logged and approved by the __________________________.

<p>Special Security Officer (SSO) or Information Systems Security Officer (ISSO)</p> Signup and view all the answers

Which of the following is an escort in a SCIF not required to do?

<p>Process the visitor certifications for their visitors</p> Signup and view all the answers

You've noticed that Sydney has been very unhappy and disgruntled at work lately in the SCIF. You are required to report this information about Sydney.

<p>True</p> Signup and view all the answers

How long must SCIF visitor control logs be retained?

<p>1 year after the last entry</p> Signup and view all the answers

Sensitive Compartmented Information (SCI) is ______________________.

<p>Classified national intelligence information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems</p> Signup and view all the answers

You are not required to report adverse information about others who also have SCI access. You are only required to report adverse information about yourself.

<p>False</p> Signup and view all the answers

The ___________________________ processes SCIF visitor certifications.

<p>Special Security Officer (SSO) or Special Security Representative (SSR)</p> Signup and view all the answers

_____________ includes representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media which is derived from visual photography, radar sensors, and electro-optics.

<p>Imagery Intelligence (IMINT)</p> Signup and view all the answers

SCI material is not required to be stored in a GSA-approved container in an open storage SCIF.

<p>True</p> Signup and view all the answers

Which SCI control system is designed to protect imagery intelligence?

<p>TALENT KEYHOLE (TK)</p> Signup and view all the answers

When you signed the _______________, you acknowledged that you were advised that mishandling SCI could cause irreparable harm to the United States and you are obligated not to disclose SCI to anyone who is not authorized to receive it.

<p>SCI NdS</p> Signup and view all the answers

Current SCI control systems are HCS, SI, and ________________.

<p>TALENT KEYHOLE</p> Signup and view all the answers

A French citizen you met at a party has taken a strong interest in finding out more about your employment. Because you do not return his phone calls, however, this is not considered a foreign contact that must be reported.

<p>False</p> Signup and view all the answers

Who provides construction and security requirements for SCIFs?

<p>Defense Intelligence Agency (DIA)</p> Signup and view all the answers

Who is responsible for terminating SCI access?

<p>Special Security Officer (SSO), or designee</p> Signup and view all the answers

_____________ is the collection of intelligence through public sources.

<p>Open Source Intelligence (OSINT)</p> Signup and view all the answers

Who heads the Intelligence Community (IC)?

<p>Director of National Intelligence</p> Signup and view all the answers

You must consult your SCIF's ____________ to learn what you are or are not permitted to tell your family members about your work location and mission.

<p>ISSO</p> Signup and view all the answers

SCI control systems are additional measures used to protect intelligence sources and methods or analytical procedures that are beyond those used to protect non-SCI classified information.

<p>True</p> Signup and view all the answers

When you sign the SCI Nondisclosure Statement (NdS), you are _________________________.

<p>False</p> Signup and view all the answers

You should never connect classified and unclassified systems together.

<p>True</p> Signup and view all the answers

Equipment used to destroy SCI paper materials must be listed in the ___________________________________________________________.

<p>False</p> Signup and view all the answers

You are required to remove your name badge as soon as you leave your SCIF so as not to call attention to yourself.

<p>True</p> Signup and view all the answers

When you signed the SCI NdS, you acknowledged that this agreement will last until you retire or separate from the Federal Government, unless you are released in writing by an authorized representative of the department or agency that last granted you with access to SCI.

<p>False</p> Signup and view all the answers

Walls within a SCIF require acoustical protection measures and sound masking systems to protect SCI.

<p>True</p> Signup and view all the answers

SCIF windows must be secured at ground level and up to _____________ above ground level.

<p>18 feet</p> Signup and view all the answers

You are permitted to discuss SCI outside your SCIF as long as it is with one of your SCIF co-workers.

<p>False</p> Signup and view all the answers

For access to SCIFs during business hours, cipher locks may be used for high security areas and compartments.

<p>True</p> Signup and view all the answers

SCI is required to be stored in a GSA-approved container in a Closed Storage SCIF.

<p>True</p> Signup and view all the answers

SCI Material cannot be stored in _________________________________.

<p>An open storage SCIF</p> Signup and view all the answers

SCI material must be _____________________ prior to giving the package to the courier.

<p>double wrapped</p> Signup and view all the answers

Which of the following is true about escorts in SCIFs?

<p>Only personnel assigned to the SCIF are authorized to escort non-indoctrinated or contractor personnel within the government area.</p> Signup and view all the answers

In a SCIF, reproduction equipment must display a sign indicating the highest level of classification allowed to be reproduced on that equipment.

<p>True</p> Signup and view all the answers

You placed a For Sale ad in the local newspaper in an attempt to sell your old car. Because this involves contact with the media, you are required to report it.

<p>False</p> Signup and view all the answers

Equipment leaving latent images on itself or on other material or that has the capability to connect to remote diagnostic centers, such as by telephone line, is prohibited for classified reproduction.

<p>True</p> Signup and view all the answers

____________ is the collection of intelligence through public sources.

<p>Human Intelligence (HUMINT)</p> Signup and view all the answers

Visitors who are not certified may access classified information as long as their affiliation or position warrants it.

<p>False</p> Signup and view all the answers

Copies of classified documents are not subject to the same control, accountability, and destruction procedures as the original document.

<p>False</p> Signup and view all the answers

You are required to have a pre-publication review of any material you create based on your access to classified information before it enters _______________.

<p>The public domain</p> Signup and view all the answers

The SCIF Fixed Facility Checklist is used to obtain SCIF accreditation.

<p>True</p> Signup and view all the answers

_____________ is technically derived intelligence data other than imagery and signals intelligence that locates, identifies, or describes distinctive characteristics of targets.

<p>Measurement and Signature Intelligence (MASINT)</p> Signup and view all the answers

When you signed the SCI NdS, you gave up protection under the Whistleblower Protection Act.

<p>False</p> Signup and view all the answers

You should never connect classified and unclassified systems together.

<p>True</p> Signup and view all the answers

We use classification management to determine the nature of information and assign proper classification markings, SCI control system markings, dissemination controls, and declassification instructions.

<p>True</p> Signup and view all the answers

Security violations are required to be reported, but infractions are not required to be reported.

<p>False</p> Signup and view all the answers

Christopher works in a SCIF and is having an Internet relationship in a chat room (outside of work hours) with a woman who is not a U.S. citizen. Christopher is required to report this relationship.

<p>True</p> Signup and view all the answers

What piece of information is not required to be recorded on the SCIF visitor control log?

<p>visitor's birth date</p> Signup and view all the answers

_____________ is the collection of intelligence using human sources such as diplomats, military attaches, and spies.

<p>Open Source Intelligence (OSINT)</p> Signup and view all the answers

_____________ is the collection of verbal and nonverbal signals from land, sea, and satellite. These signals are protected within the Communications Intelligence, (COMINT) SCI control system.

<p>Geospatial Intelligence (GEOINT)</p> Signup and view all the answers

Equipment used to destroy SCI paper materials must be listed in the ___________________________________________________________.

<p>NSA Evaluated Products List of High Security Crosscut Paper Shredders</p> Signup and view all the answers

Destruction of SCI must be conducted by SCI indoctrinated personnel.

<p>True</p> Signup and view all the answers

Which SCI control system is designed to protect signals intelligence including communications intelligence and electronic intelligence?

<p>False</p> Signup and view all the answers

You must report any systemic weaknesses and anomalies.

<p>True</p> Signup and view all the answers

Which of the following statements is correct?

<p>You must report any part-time employment.</p> Signup and view all the answers

The DNI issued several _________________ and ________________ which provide security policy for the protection of national intelligence as well as the personnel security requirements for access to SCI, and physical and technical security requirements for SCIFs.

<p>Intelligence Community Directives, Intelligence Community Policy Guidance documents</p> Signup and view all the answers

Jill works in a SCIF. Jill is party to a malpractice lawsuit. Jill is required to report this legal involvement.

<p>True</p> Signup and view all the answers

Spills are deliberate unauthorized disclosures of classified information to the media whereas leaks are accidental or intentional unauthorized disclosures of classified information across computer systems.

<p>False</p> Signup and view all the answers

When you signed the SCI NdS, you acknowledged that any breach of this agreement could result in the termination of your SCI access and your employment as well as prosecution of you under U.S. criminal laws.

<p>True</p> Signup and view all the answers

Which of the following is not a requirement of a secure telephone system in a SCIF?

<p>Detects attempted or actual unauthorized human entry into a SCIF</p> Signup and view all the answers

____________________ is required to access certain areas of a SCIF and classified information.

<p>Need-to-know</p> Signup and view all the answers

Who provides accreditation for DoD SCIFs?

<p>Defense Intelligence Agency (DIA)</p> Signup and view all the answers

Visitors who have a visitor certification do not require an escort.

<p>False</p> Signup and view all the answers

John has access to SCI and is currently legally separated from his wife. John is required to report this incident.

<p>True</p> Signup and view all the answers

SCI is one of eight categories of information that require classified protection as outlined in Executive Order 13526.

<p>True</p> Signup and view all the answers

If a SCIF has a high security lock, then an access control system is not required.

<p>False</p> Signup and view all the answers

Walls in SCIFs must extend from true floor to true ceiling.

<p>True</p> Signup and view all the answers

SI is the SCI control system marking abbreviation for which SCI control system?

<p>TALENT KEYHOLE</p> Signup and view all the answers

The biggest vulnerability in SCIF forced entry is the ____________________.

<p>Emergency exit doors</p> Signup and view all the answers

You signed an SCI Nondisclosure Statement during the __________________ process.

<p>Debriefing</p> Signup and view all the answers

You are required to report suspicious co-worker activities.

<p>True</p> Signup and view all the answers

All Sensitive Compartmented Information Facilities (SCIFs) can be used to store Sensitive Compartmented Information (SCI).

<p>False</p> Signup and view all the answers

Which SCI control system is designed to protect human intelligence?

<p>TALENT KEYHOLE (TK)</p> Signup and view all the answers

Walls within a SCIF require acoustical protection measures and sound masking systems to protect SCI.

<p>True</p> Signup and view all the answers

Jim works in a SCIF. Jim got drunk and passed out in a bar over the weekend. Jim is required to report this incident.

<p>True</p> Signup and view all the answers

Study Notes

Sensitive Compartmented Information (SCI) Overview

  • Security violations involve loss or compromise of classified information and must be reported.
  • Foreign travel must be reported prior to departure, including trips to Canada and Mexico.
  • Unauthorized disclosure of SCI becomes the property of the U.S. Government upon signing the SCI Nondisclosure Statement (NdS).
  • Access control systems for unattended SCIF (Sensitive Compartmented Information Facility) entry require authentication and verification methods.

SCIF Operations

  • SCIF walls must extend from the floor to the ceiling to ensure security.
  • The access control system must be in place even if the SCIF has a high-security lock.
  • SCI material may only be stored in GSA-approved containers in closed storage SCIFs, not in open storage SCIFs.
  • All SCI must be stored securely and must be transported carefully; it must be double-wrapped prior to courier delivery.

Visitor and Personnel Requirements

  • Visitors without certification must be escorted by indoctrinated personnel at all times.
  • Reports of suspicious activities or systemic weaknesses must be made immediately.
  • Legal involvement, such as lawsuits or foreign contacts, must be reported by those with SCI access.
  • SCIF visitor control logs must be retained for at least one year after the last entry.

Intelligence and Security Measures

  • Measurement and Signature Intelligence (MASINT) is non-imagery derived intelligence identifying characteristics of targets.
  • Open Source Intelligence (OSINT) refers to the collection of intelligence through public sources.
  • The Director of National Intelligence (DNI) heads the Intelligence Community, which oversees various security directives.
  • Security violations are required to be reported, and infractions must also be monitored.

Equipment and Destruction Protocols

  • Equipment for destroying SCI paper must be listed in the NSA Evaluated Products List.
  • The highest level of classification allowed for reproduction must be indicated on reproduction equipment.
  • Only SCI-indoctrinated personnel may destroy SCI materials.

General Security Practices

  • Discussing SCI outside the SCIF is prohibited, even with co-workers.
  • It is illegal to connect classified and unclassified systems together to prevent data leaks.
  • Personnel may retain their SCI access as long as they comply with confidentiality agreements and do not disclose classified information without authorization.

Reporting Obligations and Policies

  • Employees must report any changes in status, including part-time employment and personal legal issues.
  • SCIF construction and security requirements are regulated by the Defense Intelligence Agency.
  • The SCI control systems (HCS, SI, TK) protect varying classifications of intelligence, ensuring sensitive information remains secure.

Compliance and Accreditations

  • The SCIF Fixed Facility Checklist is crucial for obtaining SCIF accreditation.
  • All security protocols must be strictly followed to prevent unauthorized access and information compromise.
  • Adherence to all established security directives is essential for maintaining classification integrity and national security.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

This quiz tests your knowledge on Sensitive Compartmented Information (SCI), including security protocols, SCIF operations, and visitor requirements. Understand the importance of safeguarding classified information and compliance with regulations related to SCI. Evaluate your grasp on access controls and the safe handling of sensitive data.

More Quizzes Like This

ICD 704 Flashcards
7 questions

ICD 704 Flashcards

StylishPeach4517 avatar
StylishPeach4517
Sensitive and Critical Periods
9 questions
Use Quizgecko on...
Browser
Browser