• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/28

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

28 Cards in this Set

  • Front
  • Back

State the function of the SSO.

Commands in the DON accredited for and authorized to receive, process and store SCI will designate a Special Security Officer (SSO). The SSO is the principal advisor on the SCI security program in the command and is responsible to the commanding officer for the management and administration of the program. The SSO will be afforded direct access to the commanding officer to ensure effective management of the command's SCI security program. The SSO will be responsible for the operation of the Sensitive Compartmented Information Facility (SCIF) and the security control and use of the SCIF. All SCI matters shall be referred to the SSO.
Discuss the Top Secret classification level.
Top Secret is the classification level applied to information whose unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security.
Discuss the Secret classification level.
Secret is the classification level applied to information whose unauthorized disclosure could reasonably be expected to cause serious damage to the national security.

Discuss the Confidential classification level.

Confidential is the classification level applied to information whose unauthorized disclosure could reasonably be expected to cause damage to the national security.

Tentative classification should include:
1. Individuals, not having original classificatin authority, who create information shall mark the information accordingly.
2. The OCA shall make the classification determination within 30 days.
3. Afte the OCA's determination, the "TENTATIVE" marking shall be removed and the information shall be remarked to reflect the OCA's decision.
What is Controlled Unclassified Information (CUI)?
CUI is defined and governed by laws, international agreements, EO's and regulations that address the identification, marking, protection, handling, transmission, transportation, and destruction.
What is SCI?
Sensitive Compartmented Information (SCI) – Classified information concerning or derived from intelligence sources or methods, or analytical processes, that is required to be handled within formal access control systems established by the DCI.
What is SAP?
Special Access Program (SAP) - Any DoD program or activity (as authorized in E.O. 12958, as Amended) employing enhanced security measures (e.g., safeguarding or personnel adjudication requirements) exceeding those normally required for classified information at the same classification level which is established, approved, and managed as a DoD SAP.

What is SPECAT?

Special Category (SPECAT) is a designation applied to classified messages identified with specific projects requiring special handling procedures supplemental to those required by the security classification; the special handling procedures ensure that the message will be handled and viewed by properly cleared and authorized personnel only.

Explain the purpose of your Command Emergency Action/Destruction Plan.
a. Conditions that warrant implementation
b. Authority to impose, modify or cancel
c. Authority to order emergency destruction onboard a deployed unit
d. Primary and alternate means of completion
e. Procedures to be followed upon implementation, from first order to destroy through completion and
follow-up documentation and reporting
f. Priority for destruction of classified materials
g. Responsibility for ensuring a correct inventory of destroyed materials is maintained and recorded
h. Methods of destruction
i. Classified waste
Define and discuss access.
The ability and opportunity to obtain knowledge of classified information. An individual, in fact, may have access to classified information by being in a place where such information is kept, if the security measures that are in force do not prevent the individual from gaining knowledge of such information.
Define and discuss clearance.
A formal determination that a person meets the personnel security eligibility standards and is thus afforded access to classified information. There are three types of clearances: Confidential, Secret, and Top Secret. A Top Secret clearance implies an individual has been determined by an authorized adjudicative authority to be eligible for access to Top Secret, and has access to the same; a Secret clearance implies an individual has been determined to be eligible for
Secret, and has access to the same; and a Confidential clearance implies and individuals has been determined to be eligible for access to Confidential, and has access to the same.
What is clearance eligibility?
A formal determination by an approved adjudicative authority that a person meets the EO 12968 personnel security eligibility standards for access to classified information. There are three levels of clearance eligibility: Confidential, Secret, and Top Secret. Eligibility is established at the highest levels supportable by the prerequisite personnel security investigation.
Define and discuss compromise.
A security violation that has resulted in confirmed or suspected exposure of classified information or material to an unauthorized person. A compromise is considered confirmed when conclusive evidence exists that classified material was compromised. A compromise is considered suspected when some evidence exists that classified material has been subjected to compromise.
Define and discuss marking.
The physical act of indicating on classified material the assigned classification, changes in classification, downgrading and declassification instructions, and any limitations on the use of the classified information.
What is meant by the term need-to-know?
A determination made by an authorized holder of classified information that a prospective recipient requires access to specific classified information in order to perform or assist in the performance of a
lawful and authorized government function essential to the fulfillment of an official US Government program. Knowledge, possession of, or access to, classified information will not be afforded to any individual solely by virtue of the individual's office, rank, position, or security clearance eligibility.
Define and discuss transmission security.
Transmission Security (TRANSEC): Component of communications security that results from the application of measures designed to protect transmissions from interception and exploitation by means other than cryptanalysis.
Define and discuss TPI.
Two-Person Integrity (TPI): A system of handling and storing designed to prevent single-person access to certain COMSEC keying material.

TPI storage: TPI storage requires using two approved combination locks (each with a different combination) with no one person authorized access to both combinations.
Define and discuss TPC.
Two-Person Control (TPC): Continuous surveillance and control of positive control material and devices at all times by a minimum of two authorized persons, each capable of detecting incorrect or unauthorized procedures with respect to the task being performed, and each familiar with established security and safety requirements.
What is downgrading?
The determination by an approved authority that information classified at a specific level requires a lower degree of protection, therefore, reducing the classification to a lower level.
What is COMSEC?
The protective measures taken to deny unauthorized persons information derived from telecommunications of the U.S. Government related to national security and
to ensure the authenticity of such communications.
What four things does COMSEC include?
(1) Cryptosecurity, which results from providing technically sound cryptosystems and their proper use;
(2) Physical security, which results from physical measures taken to safeguard COMSEC material;
(3) Transmission security, which results from measures designed to protect transmissions from interception and exploitation by means other than cryptanalysis; and
(4) Emission security, which results from measures taken to deny unauthorized persons information of
value which might be derived from the interception and analysis of compromising emanations from crypto equipment and telecommunication systems.
What is INFOSEC?
The system of policies, procedures, and requirements established under the authority of E.O. 12958, as Amended, to protect information that, if subjected to unauthorized disclosure, could reasonably be expected to cause damage to the national security.
What is your reporting responsibility when made aware of a classified information compromise?
An individual who becomes aware that classified information is lost or compromised shall immediately notify their security manager or commanding officer of the incident, as well as their supervisory chain of command. If the reporting individual believes the security manager or commanding officer may be involved in the incident, they must notify the next higher echelon of command or supervision. If circumstances of discovery make such notification impractical, the reporting individual shall notify the commanding officer or security manager at the most readily available command or contact the local NCIS office.
What is the purpose of a firewall?
A packet filter firewall is a routing device that provides access control for system addresses and communication sessions via a rule-set. The packet filter operates at layer 3 and filters on source and destination addresses, and communication session parameters such as source and destination ports. Allowing only approved IP addresses through the perimeter router will control access to required ports and services.
State the purpose of the Intelligence Oversight program.
To implement policies, procedures, and governing regulations regarding the conduct of intelligence activities, and a system of program reviews, inspections, and reporting requirements of those activities.
What are questionable activities that may violate Federal law, and Executive Order, a Presidential Directive, DON policies, or instruction?
(1) Tasking intelligence personnel to conduct intelligence activities that are not part of the organization’s approved mission, even if they have the technical capability to do so.
(2) Providing intelligence services and/or products without proper authorization.
(3) Failing to file proper use statement for imagery collection associated with U.S. persons.
(4) Collecting information on U.S. persons, even through open source, when it is not part of the unit’s mission.
Define special activities.
Activities conducted in support of national foreign
policy objectives abroad which are planned and executed so the role of the U.S. Government is not
apparent or acknowledged publicly, and functions in support of such activities, but which are not intended to influence U.S. political processes, public opinion, policies, or media and do not include diplomatic activities or the collection and production of intelligence or related support functions.