Question Distractors References Linked Competency

Size: px
Start display at page:

Download "Question Distractors References Linked Competency"

Transcription

1 ISOC Example Questions 1. Which statement regarding a corporation s common business structure and Facility Security Clearances (FCLs) is TRUE? Select all that apply. a. If a director does not require access to classified information to conduct the organization s business, he is not required to be cleared provided that all the members in a legal quorum of the board of directors or similar executive body are cleared. b. Officers requiring access to classified information when conducting business may be cleared at a lower level, provided their performance will not adversely impact the organization s practices with higherlevel classified contracts. c. Officers who do not occupy positions that would enable them to adversely affect the organization s policies are required to be cleared. d. The chairman of the board and all principal officers must be cleared. M, February 28, ISOC CPT Page 1

2 2. Which statement BEST describes contractor requirements related to Insider Threat programs? a. Contractors must designate an employee who is a United States citizen, a senior official, and who holds a personnel security clearance to establish and execute an Insider Threat program. b. Contractors may not appoint their Facility Security Officer (FSO) as their Insider Threat program lead. c. Contractor FSOs are not integral to successfully implementing an Insider Threat program. M, February 28, 2006, Change 2, Which statement regarding contractors access to classified information is TRUE? a. Cleared contractors can access classified information outside the United States. b. Government Contracting Activity (GCA) consultants are processed for Personnel Security Clearances (PCLs) by Defense Security Service (DSS) in accordance with the NISPOM. c. Contractors may use a clearance for any job requiring a personnel security clearance. d. Contractors can access classified information without a consultant agreement. M, February 28, 2006, Change 2, When is a Board Resolution normally adequate to mitigate the risk of Foreign Ownership, Control or Influence (FOCI)? a. When a foreign interest does not own voting interests to elect or otherwise is not entitled to representation on the company s governing board. b. As long as the foreign owner is identified. c. When the foreign owner maintains representation on the board and is identified in the resolution. d. As long as the foreign owner does not require access to classified information. M, February 28, 2006, Change 2, ISOC CPT Page 2

3 5. What are examples of Foreign Ownership, Control or Influence (FOCI) mitigation Implementation Procedures? a. Electronic Communication Plans, Foreign Affiliate Plan, Technology Share Plan, and Visitation Policies. b. Standard Operating Procedure, Limited Access Plan, and Foreign Shareholder Plan. c. National Interest Determination, Electronic Communication Plans and Technology Control Plans. d. Electronic Communication Plans, Technology Control Plans, Affiliated Operations Plans, Facilities Location Plans, and Visitation Policies. dss.mil/isp/foci/ implementationprocedures.html 6. What must occur annually when entering into and using any method, agreement, or similar arrangement to negate or reduce risk in foreign ownership cases? a. Selection of board members and a Foreign Ownership, Control or Influence (FOCI) review. b. Selection of board members and an implementation and compliance report. c. A FOCI review and an implementation and compliance report. d. Selection of board members, a FOCI review, and an implementation and compliance report. R, Dec. 4, 1985, p What does the Annual Review meeting for contractors operating under a Voting Trust, Proxy Agreement, Special Security Agreement (SSA), or Security Control Agreement (SCA) include? a. Examination of acts of compliance or noncompliance with the approved security arrangement, standard rules, and applicable laws and regulations. b. Examination of whether security controls, practices, or procedures warrant adjustment. c. Examination of problems or impediments associated with the practical application or utility of the security arrangement. d. All of the above 2006 Change 2, 05/18/ ISOC CPT Page 3

4 8. A cyber intrusion that may be considered actual or possible acts of espionage should be reported to whom? a. The Federal Bureau of Investigation (FBI), with a copy to the Cognizant Security Agency (CSA). b. The National Counterintelligence and Security Center, with a copy to the FBI. c. The Department of Defense (DoD) Chief Information Officer (CIO), with a copy to the FBI. d. The Information Security Oversight Office (ISOO) (with a copy to the CSA) Change 2, 05/18/2016 p Contractors are responsible for reporting? a. adverse information concerning any of their cleared employees. b. adverse information concerning any of their un-cleared employees. c. adverse information concerning temporary un-cleared consultants What should be reported to the Federal Bureau of Investigation (FBI) regarding a change in cleared employee status? a. Death b. A change in name c. A change in citizenship d. None of the above 2006 Change 2, ISOC CPT Page 4

5 11. What action should a contractor take if an employee no longer wishes to be processed for a clearance or to continue an existing clearance? a. The contractor shall submit a written report to the Federal Bureau of Investigation (FBI). b. The contractor shall submit a written report to the Cognizant Security Agency (CSA). c. The contractor shall conduct an exit briefing with the employee; and submit a written report to the National Counterintelligence and Security Center (NCSC). d. The contractor shall conduct an exit briefing with the employee; no written report is required Change 2, 05/18/ What is the purpose of DD Form 441, Department of Defense Security Agreement? a. To request a Commercial and Government Entity (CAGE) code for facilities requiring clearance. b. To provide a security agreement between a cleared organization and the U.S. Government. c. To petition for the termination of a granted facility clearance due to security violations. d. To report the foreign involvement of facilities applying for clearance. mil/isp/fac_clear/ fac_clear_check. html 13. Under what circumstance will a facility security clearance survey be discontinued? a. When the cleared defense contractor only requires an upgrade. b. When the contract does not require access to classified information. c. When the contractor has foreign employees. d. When the contractor is a non-u.s. entity. mil/documents/ facilityclearances/ welcome_ packet_2014.pdf ISOC CPT Page 5

6 14. What document ensures that industrial organizations will follow all regulations on the safeguarding of classified information specified by the Department of Defense (DoD) Program? a. SF-312, Classified Information Nondisclosure Agreement b. DD-254, Department of Defense Contract Security Classification Specification c. DD-441, Department of Defense Security Agreement d. SF-86, Questionnaire for National Security Positions R, Dec. 4, 1985, p Which eligibility requirement must a company meet before it can be granted a Facility Security Clearance (FCL)? a. A company must need access to the classified information in connection to a legitimate U.S. government or foreign government requirement. b. The company can be organized and exist under the laws of a foreign country, but reside in the United States. c. The company can be barred from participating in U.S. government contracts. d. The company must meet a Foreign Ownership, Control or Influence (FOCI) agreement without mitigation ISOC CPT Page 6

7 16. A contractor is applying for a TOP SECRET Facility Security Clearance (FCL). What does the contractor need to be eligible? a. All employees at the facility must have SECRET Personnel (Security) Clearances (PCL) or higher. b. All officials at the facility must have TOP SECRET Personnel (Security) Clearances (PCL) or higher. c. The Insider Threat Program Senior Official must have a SECRET Personnel (Security) Clearance (PCL) or higher. d. The senior management official must have a TOP SECRET Personnel (Security) Clearance (PCL) or higher The owner of a contracting company with a Facility Security Clearance (FCL) has died and his daughter inherited ownership of the company. What must be done? a. The company must apply for a new FCL. b. The daughter must apply for a Personnel (Security) Clearance (PCL) of the same level of the FCL or higher. c. The contractors must submit a report to the Cognizant Security Agency (CSA). d. The company must submit a report to the Facility Security Officer (FSO) Which is a change condition that would affect a Facility Clearance (FCL)? a. Any adverse information concerning any cleared employees; even reports based on rumor or innuendo. b. Efforts by any individual, regardless of nationality, to obtain illegal or unauthorized access to classified information or to compromise a cleared employee. c. Significant vulnerabilities identified in security equipment used to protect classified material. d. Any material change concerning the information previously reported by the contractor concerning Foreign Ownership, Control or Influence (FOCI) ISOC CPT Page 7

8 19. What does preinspection research include? a. Identify all security elements that apply. b. Have a basic knowledge of your company s classified programs. c. Know your facility s physical layout. d. All of the above Self-Inspection Handbook for NISP Contractors, May 2016, p Who must be present to witness the examination of the contents/ interior space of equipment that is not authorized to secure classified material? a. A representative for the contractor b. A Cognizant Security Agency (CSA) representative c. An Information System Security Officer (ISSO) d. An Information System Security Manager (ISSM) M, February 28, 2006, Which statement(s) regarding exit briefings is TRUE? a. Exit briefings should not disclose vulnerabilities. b. Exit briefings should provide contractors with identified vulnerabilities. c. Exit briefings do not need to include senior managers. d. Exit briefings are not required. edu/documents/ student-guides/ dss-securityrating-process. pdf, p ISOC CPT Page 8

9 22. If management objects to a spot check of their nonapproved areas or repositories, where on the close-out report should this fact and the purported rationale be indicated? a. Item 18. Approved Storage Facilities b. Item 20. Remarks c. Item 15. Scope of Inspection d. Item 15c. Results of Inspection R, Dec. 4, 1985, p 196 & For which reason can The Defense Information System for Security (DISS) be utilized during a security assessment? a. Reviewing the total number of cleared employees who potentially access North Atlantic Treaty Organization (NATO) information. b. Ensuring records of SF 312, Nondisclosure Agreements are being maintained. c. Ensuring eligible employees are still within the scope of their investigation. d. All of the above. mil/diss/ 24. For how long must the contractor retain a formal report of their security review selfinspection? a. Until the next Cognizant Security Agency (CSA) inspection. b. Until it is certified by the Information Security Oversight Office (ISOO). c. Until any issues found have been fully resolved. d. As long as the contractor maintains the cleared site ISOC CPT Page 9

10 25. Which of the following changes is likely to affect a Facility Security Clearance (FCL)? Select all that apply. a. A change of phone number of a company s cleared location. b. A change of address of a company s cleared location. c. A change of operating name of the company. d. A change to key personnel, a new employee When conducting a security assessment, which of the following contractor personnel should be interviewed? a. Program manager b. Receptionist c. Network/Information technology administrator d. Business development personnel e. All of the above What would the corrective actions be if an employee left a classified document outside of a General Services Administration (GSA)-approved container, but no one entered the room and no compromise occurred? a. A report must be provided to the Cognizant Security Agency (CSA), the item must be secured in the approved container, and the employee must be briefed. b. A report must be provided to the Cognizant Security Agency (CSA), the item must be destroyed, and the employee must be briefed. c. A change condition report must be filed, the item must be secured in the approved container, and the employee must be briefed ISOC CPT Page 10

11 28. Which Governmentsigned document is required for all cleared facilities? a. A properly-executed SF 312 b. A properly-executed DD441 c. A properly-executed EQIP d. A properly-executed SF86 mil/isp/fac_clear/ fac_clear_check. html 29. Under which condition is the Cognizant Security Agency (CSA) responsible for conducting a preliminary inquiry of loss, compromise, or suspected compromise at a contractor facility? a. When the contractor is not able to confirm the accuracy of a reported loss, compromise, or suspected compromise of classified information. b. When the reported loss, compromise, or suspected compromise of classified information occurs in a facility located on a government installation. c. When the Government Contracting Agency (GCA) defers submission of the preliminary inquiry report. d. None, the contractor is responsible for conducting a preliminary inquiry If the Commander of a User Agency determines an on-site contractor s activity requires a Facility Security Clearance (FCL), which entity should be assigned to accompany the installation security inspector during scheduled security inspections? a. The Specialist (ISS) b. The Information Security Systems Manager (ISSM) c. The Administrative Contracting Officer (ACO) d. The Facility Security Officer (FSO) R, Dec. 4, 1985, p 22 ISOC CPT Page 11

12 31. Which statement regarding loss, compromise and suspected compromise is TRUE? a. Contractors have 30 days from receipt of a report of loss, compromise, or suspected compromise to report to the Cognizant Security Agency (CSA). b. Contractors must immediately report loss, compromise, or suspected compromise to the CSA. c. Contractors must immediately report loss, compromise, or suspected compromise to the Federal Bureau of Investigation (FBI). d. Contractors must immediately report loss, compromise, or suspected compromise to the Defense Manpower Data Center (DMDC) If a determination is made that a loss, compromise, or suspected compromise did occur, the Cognizant Security Office (CSO) prepares a final report. Which section of the report contains specific actions taken to preclude a recurrence of similar incidents and the disciplinary action, if any, taken against responsible individuals? a. Conclusions b. Essential facts c. Authority d. Corrective action ISOC CPT Page 12

13 33. How long can the initial period of an Interim Authorization to Operate (IATO) last? a. 30 days b. 60 days c. 90 days d. 180 days Which statement correctly describes the role of a Designated Government Representative (DGR)? a. A DGR is designated by the Facility Security Officer (FSO). b. A DGR must be cleared to the same level as the Facility Security Clearance (FCL). c. A DGR is a cleared person designated by a U.S. or foreign government agency to act on the government s behalf to transfer custody or accept custody for classified material and assume security responsibility. d. Being the DGR is a responsibility of the intelligence program s senior official. edu/multimedia/ shorts/dgr/ common/cw/ data/cdse_dgr_ Short_Student_ Guide.pdf, p What must all contractors do in order to access classified Communications Security (COMSEC) information to utilize for a duty? a. Undergo a briefing before being granted access to the classified COMSEC information. b. Undergo a briefing within 30 days of accessing the classified COMSEC information. c. Undergo a briefing no later than 10 days after being granted access to the classified COMSEC information. d. Undergo a briefing by the Security Management Office (SMO) ISOC CPT Page 13

14 36. How often must a contractor provide all cleared employees with a refresher of security education and training? a. Cleared employees are responsible for maintaining their security education independent of their organization. b. Once every two years. c. Once a year. d. Every six months Change 2, Who is responsible for authenticating, by signature, the DD Form 254 Department of Defense Contract Security Classification Specification for a subcontract? a. The Administrative Contracting Officer (ACO) b. The Procuring Contracting Officer (PCO) c. The Cognizant Security Office (CSO) d. The principal prime contractor R, Dec. 4, 1985, p Which statement describes a contractor s responsibility regarding marking? a. Contractors must report their new marking to subcontractors. b. Contractors have no way of challenging classification from the Government Contracting Activity (GCA). c. Contractors must automatically downgrade information if it is believed to be marked too high. d. Contractors are authorized to challenge classification in writing to the GCA if they believe information is improperly or unnecessarily marked ISOC CPT Page 14

15 39. Which organization develops the approved security container listing? a. Defense Security Service (DSS) b. National Security Agency (NSA) c. General Services Administration (GSA) d. Defense Intelligence Agency (DIA) How often must patrols be conducted in the event security guards are an authorized supplemental protection? a. Every hour for TOP SECRET material b. Every 4 hours for SECRET material c. Every 2 hours for SECRET material d. Every 8 hours for personally identifiable information (PII) e. None of the above edu/documents/ cdse/storage- of-classified- Information- Summary.pdf 41. To conduct a meeting in which classified information is disclosed and government sponsorship is required, what information must the request for authorization include? a. An explanation of the non-government purpose served by disclosing classified information at the meeting. b. The subject of the meeting and scope of classified topics, including the classification level, to be disclosed at the meeting. c. A list of any and all possible attendees, including their names, birthdates, and organizational affiliations, of the proposed meeting. d. A Security Review report of the meeting location ISOC CPT Page 15

16 42. Please determine if the following statement is True or False: If the government agency does not approve the disclosure of information related to a proposed meeting, it has the authority to deny the visit request. a. True b. False In which instance is a Visit Authorization Letter required? a. If the visitor requires access to classified information. b. When a contractor needs to access a military installation. c. When the contractor submits a proposal. d. When the DD 254, Department of Defense Contract Security Classification Specification, is issued. e. When the Cognizant Security Agency (CSA) conducts an assessment Which statement regarding CRYPTOSYSTEMS is TRUE? a. When approved, a CRYPTOSYSTEM may be used by the contractor to transmit classified information no higher than what is approved for the CRYPTOSYSTEM. b. Use of a CRYPTOSYSTEM may not be authorized for encrypting of unclassified national security-related communications. c. Use of a CRYPTOSYSTEM is limited to the contract for which it was originally approved. d. Following the issuance of a CRYPTOSYSTEM, procedures must be established to provide for physically safeguarding communication security (COMSEC) materials and for the secure and efficient operation of the CRYPTOSYSTEM. R, Dec. 4, 1985, p 62 ISOC CPT Page 16

17 45. The protection of unclassified information that may individually or in the aggregate lead to the compromise of classified information and sensitive activities is related to which security practice? a. Communications Security (COMSEC) b. Operations Security (OPSEC) c. Sensitive Compartmented Information (SCI) d. Personally Identifiable Information (PII) e. Emanations Security R, Dec. 4, 1985, p Who may establish Special Access Programs with special access, distribution, or protection requirements beyond those normally provided for access to TOP SECRET, SECRET, or CONFIDENTIAL information? a. The Secretaries of the Military Departments designated by the President of the United States. b. Executive Branch Agency Heads, designated by the President of the United States. c. The Deputy Under Secretary of Defense for Policy (DUSD(P)). d. The Director, Defense Security Service (DSS). R, Dec. 4, 1985, p Which situation describes suspicious cyber activity? a. A cleared contractor downloading and installing a foreign computer application, as assigned by a superior. b. A cleared contractor using an authorized flash drive to transfer classified information. c. A cleared contractor sending personal s to a foreign destination. d. All of the above. Defense Security Service, Counterintelligence Directorate. [Pamphlet]. Counterintelligence awareness: Examples of suspicious activities, behaviors, and contacts ISOC CPT Page 17

18 48. When a need exists for special investigative techniques in a case of loss, compromise, or suspected compromise of classified information, from whom may the Cognizant Security Office (CSO) request professional investigative support? a. Naval Criminal Investigative Service (NCIS) b. United States Air Force Office of Special Investigations (OSI) c. United States Army Intelligence and Security Command (INSCOM) d. All of the above R, Dec. 4, 1985, p What is the purpose of a suspicious contact? a. To obtain illegal or unauthorized access to classified information or to compromise a cleared employee. b. To further professional development. c. To obtain legitimate US contracts. d. To identify personnel not working on a particular contract A contractor has received classified material from foreign interests outside of government channels. To whom should the contractor report? a. Director, Defense Security Service (DSS), ATTN: Director, Field Operations) b. The Government Contracting Activity (GCA) c. The Cognizant Security Agency (CSA) d. The Cognizant Security Office (CSO) ISOC CPT Page 18

19 51. What system(s) did the National System (NISS) replace? Select all that apply. a. National Program (NISP) Central Access Information Security System (NCAISS) b. Facilities Database (ISFD) c. Electronic Facility Clearance System (e-fcl) d. Defense Information System for Security (DISS), (previously JPAS) mil/diss/niss.html 52. What systems did the Defense Information System for Security (DISS) replace? Select all that apply. a. Defense Information System for Security (DISS), (previously JPAS) b. Facilities Database (ISFD) c. Case Adjudication Tracking System (CATS) d. Electronic Questionnaires for Investigations Processing (e-qip) DAA , National Archives and Records Administration, May 4, What is the capability of the National Industrial Security Program (NISP) Contracts Classification System (NCCS)? a. It retrieves real-time statuses of DD Form 254 Department of Defense Contract Security Classification Specification submissions. b. It increases mission efficiency by providing a centralized System Access Request (SAR) process. c. It provides upcoming Security Vulnerability Assessments (SVA) alerts. d. It provides reminders for outstanding submissions to Defense Security Service (DSS). mil/diss/nccs. html ISOC CPT Page 19

20 54. In the National Industrial Security Program (NISP) Contracts Classification System (NCCS), what access is needed to allow users to recommend, reject, hold, or recall certification? a. Originator Access b. Reviewer Access c. Certifying Official Access d. None of the above edu/documents/ cdse/introducing-nccs-presentation.pdf ISOC CPT Page 20

Introduction to Industrial Security, v3

Introduction to Industrial Security, v3 Introduction to Industrial Security, v3 September 2017 Center for Development of Security Excellence Lesson 1: Course Introduction Introduction Introduction Subcontractor CEO: I m really excited -- my

More information

February 11, 2015 Incorporating Change 4, August 23, 2018

February 11, 2015 Incorporating Change 4, August 23, 2018 UNDER SECRETARY OF DEFENSE 5000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-5000 INTELLIGENCE February 11, 2015 Incorporating Change 4, August 23, 2018 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS

More information

Personnel Clearances in the NISP

Personnel Clearances in the NISP Personnel Clearances in the NISP Student Guide August 2016 Center for Development of Security Excellence Lesson 1: Course Introduction Course Introduction Course Information Welcome to the Personnel Clearances

More information

Suggested Contractor File Folder Headings

Suggested Contractor File Folder Headings Suggested Contractor File Folder Headings 1. Facility Clearance 2. Personnel Clearances 3. Recurring Security Education 4. Self-Inspection 5. Security Correspondence 6. Standard Practice Procedures 7.

More information

September 02, 2009 Incorporating Change 3, December 1, 2011

September 02, 2009 Incorporating Change 3, December 1, 2011 UNDER SECRETARY OF DEFENSE 5000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-5000 INTELLIGENCE September 02, 2009 Incorporating Change 3, December 1, 2011 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS

More information

FSO Role in the NISP. Student Guide. Lesson 1: Course Introduction. Course Information. Course Overview

FSO Role in the NISP. Student Guide. Lesson 1: Course Introduction. Course Information. Course Overview FSO Role in the NISP Lesson 1: Course Introduction Course Information Purpose Audience Pass/Fail % Estimated completion time Provide an overview of the Facility Security Officer s (FSO) primary roles in

More information

Industrial Security Program

Industrial Security Program Army Regulation 380 49 Security Industrial Security Program Headquarters Department of the Army Washington, DC 20 March 2013 UNCLASSIFIED SUMMARY of CHANGE AR 380 49 Industrial Security Program This major

More information

Self-Inspection Handbook for NISP Contractors

Self-Inspection Handbook for NISP Contractors Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS The Contractor Security Review Requirement...1 The Contractor Self-Inspection Handbook...1 The Elements of Inspection...1 Inspection Techniques...2

More information

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT)

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT) SAPPC Knowledge Checkup Please note: Cyber items are indicated with a ** at the end of the practice test questions. Question Answer Linked 1. What is the security professionals role in pursuing and meeting

More information

Acquisitions and Contracting Basics in the National Industrial Security Program (NISP)

Acquisitions and Contracting Basics in the National Industrial Security Program (NISP) Acquisitions and Contracting Basics in the National Industrial Security Program (NISP) Lesson 1: Course Introduction Contents Introduction... 2 Opening... 2 Objectives... 2 September 2015 Center for Development

More information

Contract Security Classification Specification. DD-254 Guidance

Contract Security Classification Specification. DD-254 Guidance Contract Security Classification Specification DD-254 Guidance DD 254 Roadmap Justification Step by Step Common DSS findings Why a DD-254? The document provides the basis for a contractor to have a facility

More information

DoD M OPERATING MANUAL. February

DoD M OPERATING MANUAL. February DoD 5220.22-M OPERATING MANUAL February 2006 http://www.ncms-isp.org/nispom_200602_with_isls.pdf NISPOM Hyper-Link and Color-Code Guide All hyper-links that take you to a specific reference have a corresponding

More information

B. ACCESS, STORAGE, CUSTODY, CONTROL AND TRANSMISSION OF CLASSIFIED INFORMATION

B. ACCESS, STORAGE, CUSTODY, CONTROL AND TRANSMISSION OF CLASSIFIED INFORMATION International Programs Security Handbook 11-1 CHAPTER 11 CONTRACTOR OPERATIONS ABROAD A. INTRODUCTION This Chapter sets forth requirements governing contractor operations abroad, including security clearances

More information

The DD254 & You (SBIR)

The DD254 & You (SBIR) The DD254 & You Small Business Innovative Research (SBIR) Joyce K. Foca P-8A MMA Security Manager (301) 757-2961 joyce.foca@navy.mil Remember To do great important tasks, Three things are necessary.. 1.

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5200.39 September 10, 1997 SUBJECT: Security, Intelligence, and Counterintelligence Support to Acquisition Program Protection ASD(C3I) References: (a) DoD Directive

More information

CHAPTER 3. SECURITY TRAINING AND BRIEFINGS Section 1. Security Training and Briefings 3-1-1

CHAPTER 3. SECURITY TRAINING AND BRIEFINGS Section 1. Security Training and Briefings 3-1-1 DoD 5220.22-M National Industrial Security Program Operating Manual (NISPOM) January 1995 Department of Defense - Department of Energy - Nuclear Regulatory Commission - Central Intelligence Agency U.S.

More information

Defense Security Service National Industrial Security Program. Guidelines for Trustees, Proxy Holders and Outside Directors

Defense Security Service National Industrial Security Program. Guidelines for Trustees, Proxy Holders and Outside Directors Defense Security Service National Industrial Security Program Guidelines for Trustees, Proxy Holders and Outside Directors July 2009 Guidelines for Trustees, Proxy Holders, and Outside Directors (TO BE

More information

This publication is available digitally on the AFDPO WWW site at:

This publication is available digitally on the AFDPO WWW site at: BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 31-601 22 NOVEMBER 2000 COMPLIANCE WITH THIS PUBLICATION IS MANDATORY AIR NATIONAL GUARD Supplement 1 15 APRIL 2004 Security INDUSTRIAL

More information

August Initial Security Briefing Job Aid

August Initial Security Briefing Job Aid August 2015 Initial Security Briefing Job Aid A NOTE FOR SECURITY PERSONNEL: This initial briefing contains the basic security information personnel need to know when they first report for duty. This briefing

More information

PREPARATION OF A DD FORM 254 FOR SUBCONTRACTING. Cal Stewart ISP

PREPARATION OF A DD FORM 254 FOR SUBCONTRACTING. Cal Stewart ISP PREPARATION OF A DD FORM 254 FOR SUBCONTRACTING Cal Stewart ISP WHAT IS THE DD FORM 254? Contract document that provides classification guidance to Contractors who perform on U.S. Government classified

More information

National Industrial Security Program Operating Manual (NISPOM)

National Industrial Security Program Operating Manual (NISPOM) National Industrial Security Program Operating Manual (NISPOM) FOREWORD On behalf of the Secretary of Defense as Executive Agent, pursuant to Executive Order 12829, "National Industrial Security Program"

More information

CHAPTER 1 General Provisions and Requirements

CHAPTER 1 General Provisions and Requirements CHAPTER 1 General Provisions and Requirements Section 1. Introduction 1-100. Purpose. This Manual is issued in accordance with the National Industrial Security Program (NISP). It prescribes the requirements,

More information

Personnel Security Update April 2016

Personnel Security Update April 2016 Personnel Security Update April 2016 Presented by: Ryan Dennis Personnel Security Management Office for Industry (PSMO-I) National Industrial Security Program the National Industrial Security Program shall

More information

Department of Defense DIRECTIVE. SUBJECT: Unauthorized Disclosure of Classified Information to the Public

Department of Defense DIRECTIVE. SUBJECT: Unauthorized Disclosure of Classified Information to the Public Department of Defense DIRECTIVE NUMBER 5210.50 July 22, 2005 USD(I) SUBJECT: Unauthorized Disclosure of Classified Information to the Public References: (a) DoD Directive 5210.50, subject as above, February

More information

AskPSMO-I Webinar: SF-312 Non-Disclosure Agreement

AskPSMO-I Webinar: SF-312 Non-Disclosure Agreement April 23, 2013 AskPSMO-I Webinar: SF-312 Non-Disclosure Agreement Guest Presenter Nick Levasseur Host Zaakia Bailey 1 Webinar Format Main Topic SF-312s Current Trends DQI-597 SWFT Vetting Form efp Webinar

More information

Personnel Security Update May 2016

Personnel Security Update May 2016 Personnel Security Update May 2016 Presented by: Mike Ray Personnel Security Management Office for Industry (PSMO-I) National Industrial Security Program the National Industrial Security Program shall

More information

AskPSMO-I: Interim Determination Process

AskPSMO-I: Interim Determination Process AskPSMO-I: Interim Determination Process August 11, 2016 Presented by: Personnel Security Management Office for Industry (PSMO-I) Webinar at a Glance PSMO Updates OPM Timelines DISS Implementation FIS

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5210.48 December 24, 1984 USD(P) SUBJECT: DoD Polygraph Program References: (a) DoD Directive 5210.48, "Polygraph Examinations and Examiners," October 6, 1975 (hereby

More information

A Guide. Preparation. DD Form 254. for the. of a. National Classification Management Society. Defense Security Service

A Guide. Preparation. DD Form 254. for the. of a. National Classification Management Society. Defense Security Service A Guide for the Preparation of a DD Form 254 National Classification Management Society Defense Security Service Special thanks to Paul McCray and Ray Yamaoka, security trainers with Ken Sudol & Associates

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5220.22 March 18, 2011 USD(I) SUBJECT: National Industrial Security Program (NISP) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Reissues DoD Directive

More information

DoD Update Insider Threat and the NISP

DoD Update Insider Threat and the NISP UNCLASSIFIED OFFICE OF THE UNDER SECRETARY OF DEFENSE DoD Update Insider Threat and the NISP Steve Lewis Valerie Heil May 19, 2015 UNCLASSIFIED Continuous Evaluation IMESA Insider Threat NISPOM Change

More information

Job Aid: Understanding Your e-fcl Submission Requirements

Job Aid: Understanding Your e-fcl Submission Requirements Job Aid: Understanding Your e-fcl Submission Requirements Table of Contents Introduction 1 How to Find Your Organization s Business Structure, Key Management Personnel and Tiered Entities 1 Required Documentation

More information

NISPOM Update & Security Basics

NISPOM Update & Security Basics NISPOM Update & Security Basics Government Contractors Forum: Security Clearance and Insider Threat Boot Camp February 9, 2016 Thomas J. Langer Vice President of Security, BAE Systems, Inc. Kevin Bickmore

More information

OVERLOOK SYSTEMS TECHNOLOGIES, INC. Standard Practice Procedure

OVERLOOK SYSTEMS TECHNOLOGIES, INC. Standard Practice Procedure OVERLOOK SYSTEMS TECHNOLOGIES, INC. Standard Practice Procedure for Safeguarding Classified Information 25 March 2013 FOREWORD As stated in the Overlook Security Policy, dated 23 January 2013, Overlook

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 31-601 29 JUNE 2005 AIR COMBAT COMMAND Supplement 1 18 OCTOBER 2005 Certified Current, 6 November 2014 Security INDUSTRIAL SECURITY PROGRAM

More information

Presented by: Personnel Security Management Office for Industry (PSMO-I)

Presented by: Personnel Security Management Office for Industry (PSMO-I) PSMO-I Personnel Security Update September 2016 Presented by: Personnel Security Management Office for Industry (PSMO-I) Functions of the PSMO-I Personnel Clearance Oversight Initiate Investigate Adjudicate

More information

NATIONAL INDUSTRIAL SECURITY PROGRAM OPERATING MANUAL

NATIONAL INDUSTRIAL SECURITY PROGRAM OPERATING MANUAL DoD 5220.22-M NATIONAL INDUSTRIAL SECURITY PROGRAM OPERATING MANUAL February 2006 Incorporating Change 1 March 28, 2013 With inline ISLs: ISLs 2006-01, -02; 2007-01; 2009-01, -02, -03; 2014-01, -02, and

More information

ISL 02L-1 April 22, Industrial Requests Affected by Operation Enduring Freedom

ISL 02L-1 April 22, Industrial Requests Affected by Operation Enduring Freedom DEPARTMENT OF DEFENSE DEFENSE SECURITY SERVICE, INDUSTRIAL SECURITY PROGRAM OFFICE INDUSTRIAL SECURITY LETTER Industrial Security letters will be issued periodically to inform Industry, User Agencies and

More information

DOD DIRECTIVE INTELLIGENCE OVERSIGHT

DOD DIRECTIVE INTELLIGENCE OVERSIGHT DOD DIRECTIVE 5148.13 INTELLIGENCE OVERSIGHT Originating Component: Office of the Deputy Chief Management Officer of the Department of Defense Effective: April 26, 2017 Releasability: Cleared for public

More information

Presented by: Ryan Dennis Personnel Security Management Office for Industry (PSMO-I)

Presented by: Ryan Dennis Personnel Security Management Office for Industry (PSMO-I) PSMO-I Personnel Security Update February 2017 Presented by: Ryan Dennis Personnel Security Management Office for Industry (PSMO-I) Functions of the PSMO-I Personnel Clearance Oversight Initiate Investigate

More information

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information GAO United States General Accounting Office Report to the Committee on Armed Services, U.S. Senate March 2004 INDUSTRIAL SECURITY DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection

More information

Q-53 Security Training: Transmitting and Transporting Classified Information, Part I

Q-53 Security Training: Transmitting and Transporting Classified Information, Part I Q-53 Security Training: Transmitting and Transporting Classified Information, Part I Agenda Classified Information Dissemination Outside of DoD Disclosure Handling Transmission and Transportation Requirements

More information

Department of Health and Human Services (HHS) National Security Information Manual, February 1, 2005

Department of Health and Human Services (HHS) National Security Information Manual, February 1, 2005 Description of document: Requested date: Released date: Posted date: Source of document: Department of Health and Human Services (HHS) National Security Information Manual, February 1, 2005 07-June-2011

More information

Student Guide: North Atlantic Treaty Organization

Student Guide: North Atlantic Treaty Organization Length Two (2) Hours Description This course provides the student with a basic understanding of NATO information security procedures, access requirements, personnel and facility security requirements,

More information

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information Department of Defense INSTRUCTION NUMBER 5200.01 October 9, 2008 SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information References: See Enclosure 1 USD(I) 1. PURPOSE.

More information

DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE

DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE Lockheed Martin Security TABLE OF CONTENTS Congratulations 2 Introduction 3 Reporting Requirements 4 Procedures and Duties 5 Safeguarding 6 Reproduction

More information

Question Distractors References Linked Competency

Question Distractors References Linked Competency APC Example Questions 1. True or False? DoD personnel should immediately report any clandestine relationship that exists or has existed with a foreign entity to their counterintelligence element, supporting

More information

Protection of Classified National Intelligence, Including Sensitive Compartmented Information

Protection of Classified National Intelligence, Including Sensitive Compartmented Information Protection of Classified National Intelligence, Including Sensitive Compartmented Information 703 A. AUTHORITY 1. The National Security Act of 1947, as amended; Executive Order (EO) 12333, as amended;

More information

REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005

REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005 REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005 BACKGROUND AND METHODOLOGY As part of its responsibilities to oversee agency actions to ensure compliance with Executive Order 12958,

More information

Question Distractors References Linked Competency

Question Distractors References Linked Competency SFPC Example Questions Please note: Cyber items are indicated with a ** at the end of the practice test questions. 1. Which of the following is a true statement regarding the special handling requirements

More information

GUIDE SECURITY CLEARANCES & FACILITY CLEARANCES. or Call (202)

GUIDE SECURITY CLEARANCES & FACILITY CLEARANCES.  or Call (202) GUIDE SECURITY CLEARANCES & FACILITY CLEARANCES Washington, DC Office 815 Connecticut Avenue NW Suite 720 Washington, D.C. 20006 To schedule a consultation, call (202) 787-1900 To schedule a consultation,

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE SUBJECT: Defense Security Service (DSS) References: See Enclosure 1 NUMBER 5105.42 August 3, 2010 Incorporating Change 1, March 31, 2011 DA&M 1. PURPOSE. Pursuant to the

More information

DEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities

DEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350 1 000 SECNAVINST 5510.37 DUSN PPOI AUG - 8 2013 SECNAV INSTRUCTION 5510.37 From: Subj: Ref: Encl: Secretary of the

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5205.02E June 20, 2012 Incorporating Change 1, Effective May 11, 2018 USD(I) SUBJECT: DoD Operations Security (OPSEC) Program References: See Enclosure 1 1. PURPOSE.

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER O-5205.13 April 26, 2012 DoD CIO SUBJECT: Defense Industrial Base (DIB) Cyber Security and Information Assurance (CS/IA) Program Security Classification Manual (SCM)

More information

SYNOPSIS of an INDUSTRIAL SECURITY MANUAL

SYNOPSIS of an INDUSTRIAL SECURITY MANUAL GG-1 MULTINATIONAL INDUSTRIAL SECURITY WORKING GROUP MISWG Document Number 24 09 September 2010 SYNOPSIS of an INDUSTRIAL SECURITY MANUAL PART I: PART II: PART III: PART IV: PART V: Foreword Table of Contents

More information

SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT

SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT UNITED STATES MARINE CORPS THE BASIC SCHOOL MARINE CORPS TRAINING COMMAND CAMP BARRETT, VIRGINIA 22134-5019 SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT Warrant Officer Basic Course Introduction

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5210.50 October 27, 2014 Incorporating Change 1, Effective February 16, 2018 USD(I) SUBJECT: Management of Serious Security Incidents Involving Classified Information

More information

BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE HANDBOOK FEBRUARY Security NATIONAL INTEREST DETERMINATION HANDBOOK

BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE HANDBOOK FEBRUARY Security NATIONAL INTEREST DETERMINATION HANDBOOK BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE HANDBOOK 16-1406 13 FEBRUARY 2017 Security NATIONAL INTEREST DETERMINATION HANDBOOK ACCESSIBILITY: Publications and forms are available on the e-publishing

More information

DEPARTMENT OF DEFENSE CONTRACT SECURITY CLASSIFICATION SPECIFICATION

DEPARTMENT OF DEFENSE CONTRACT SECURITY CLASSIFICATION SPECIFICATION 1. CLEARANCE AND SAFEGUARDING DEPARTMENT OF DEFENSE CONTRACT SECURITY CLASSIFICATION SPECIFICATION a. FACILITY CLEARANCE REQUIRED b. LEVEL OF SAFEGUARDING REQUIRED Print TOP SECRET (The requirements of

More information

GAO. United States General Accounting Office Testimony. For Release On Delivery Expected on Wednesday March 21, 1990

GAO. United States General Accounting Office Testimony. For Release On Delivery Expected on Wednesday March 21, 1990 GAO United States General Accounting Office Testimony For Release On Delivery Expected on Wednesday March 21, 1990 DEFENSE INDUSTRIAL SECURITY Special Security 4greements Permit Foreign-owned U.S. Firms

More information

8/15/2013. Security Incidents Involving Special Circumstances. Information Security Webinar. Danny Jennings. DCO Meeting Room Navigation

8/15/2013. Security Incidents Involving Special Circumstances. Information Security Webinar. Danny Jennings. DCO Meeting Room Navigation Incidents Involving Special Circumstances Information Webinar Danny Jennings Physical & General Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military,

More information

Presenting a live 90 minute webinar with interactive Q&A. Td Today s faculty features:

Presenting a live 90 minute webinar with interactive Q&A. Td Today s faculty features: Presenting a live 90 minute webinar with interactive Q&A Foreign Ownership, Control or Influence and Government Contractor Security Clearance Mitigating FOCI and Meeting Requirements for National Interest

More information

United States District Court

United States District Court Case 1:17-mj-00024-BKE Document 5 Filed 06/05/17 Page 1 of 1 A091(Rcv. 11/1 1) Criminal Complaint United States District Court for the Southern District of Georgia United States of America V. REALITY LEIGH

More information

Personnel Security Briefing NAWCAD Industry Day Larry Paxton

Personnel Security Briefing NAWCAD Industry Day Larry Paxton Personnel Security Briefing NAWCAD Industry Day Larry Paxton Personnel Security Management Office for Industry (PSMO-I) October 25, 2017 1 Functions of the PSMO-I PSMO-I Mission Oversee personnel security

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5205.16 September 30, 2014 Incorporating Change 2, August 28, 2017 USD(I) SUBJECT: The DoD Insider Threat Program References: See Enclosure 1 1. PURPOSE. In accordance

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 5205.07, Volume 2 November 24, 2015 Incorporating Change 1, Effective February 12, 2018 USD(I) SUBJECT: Special Access Program (SAP) Security Manual: Personnel Security

More information

Revised Mar Standard Practice Procedures For Security Services. George Mason University 4400 University Drive, MSN 6D4, Fairfax, Virginia 22030

Revised Mar Standard Practice Procedures For Security Services. George Mason University 4400 University Drive, MSN 6D4, Fairfax, Virginia 22030 Standard Practice Procedures For Security Services George Mason University 4400 University Drive, MSN 6D4, Fairfax, Virginia 22030 1 Letter of Promulgation George Mason University (Mason) has entered into

More information

DODEA ADMINISTRATIVE INSTRUCTION , VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM

DODEA ADMINISTRATIVE INSTRUCTION , VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM DODEA ADMINISTRATIVE INSTRUCTION 5210.03, VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM Originating Component: Security Management Division Effective: March 23, 2018 Releasability: Cleared

More information

DEPARTMENT OF DEFENSE DIRECTIVES SYSTEM TRANSMITTAL. July 31, 1997 INSTRUCTIONS FOR RECIPIENTS

DEPARTMENT OF DEFENSE DIRECTIVES SYSTEM TRANSMITTAL. July 31, 1997 INSTRUCTIONS FOR RECIPIENTS DEPARTMENT OF DEFENSE DIRECTIVES SYSTEM TRANSMITTAL KIMBER 5220.22-M, Change 1 July 31, 1997 Special attachments 32 Pages INSTRUCTIONS FOR RECIPIENTS The following page changes to DoD 5220.22-M, National

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 Incorporating Change 1, November 17, 2017 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within

More information

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 Incorporating Change 1, July 27, 2017 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See

More information

(Revised January 15, 2009) DISCLOSURE OF INFORMATION (DEC 1991)

(Revised January 15, 2009) DISCLOSURE OF INFORMATION (DEC 1991) (Revised January 15, 2009) 252.204-7000 Disclosure of Information. As prescribed in 204.404-70(a), use the following clause: DISCLOSURE OF INFORMATION (DEC 1991) (a) The Contractor shall not release to

More information

General Security. Question Answer Policy Resource

General Security. Question Answer Policy Resource General Security Briefly define a Special Access Program. A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.04 April 1, 2016 Incorporating Change 1, Effective April 26, 2018 USD(I) SUBJECT: Counterintelligence (CI) Investigations References: See Enclosure 1 1. PURPOSE.

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.04 February 2, 2009 USD(I) SUBJECT: Counterintelligence (CI) Investigations References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 5205.07, Volume 1 June 18, 2015 Incorporating Change 1, Effective February 12, 2018 USD(I) SUBJECT: DoD Special Access Program (SAP) Security Manual: General Procedures

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5205.08 November 8, 2007 USD(I) SUBJECT: Access to Classified Cryptographic Information References: (a) DoD Directive 5205.8, subject as above, February 20, 1991

More information

Office of the Inspector General Department of Defense

Office of the Inspector General Department of Defense DOD ADJUDICATION OF CONTRACTOR SECURITY CLEARANCES GRANTED BY THE DEFENSE SECURITY SERVICE Report No. D-2001-065 February 28, 2001 Office of the Inspector General Department of Defense Form SF298 Citation

More information

SUBJECT: Directive-Type Memorandum (DTM) Law Enforcement Reporting of Suspicious Activity

SUBJECT: Directive-Type Memorandum (DTM) Law Enforcement Reporting of Suspicious Activity THE UNDER SECRETARY OF DEFENSE 2000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-2000 POLICY October 1, 2010 MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT: Directive-Type Memorandum (DTM) 10-018 Law Enforcement

More information

Student Guide Course: Original Classification

Student Guide Course: Original Classification Course: Original Classification Lesson: Course Introduction Course Information Purpose Audience Pass/Fail % Estimated completion time Define original classification and identify the process for determining

More information

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350-1000 SECNAVINST 5510.36A N09N2 SECNAV INSTRUCTION 5510.36A From: Secretary of the Navy Subj: DEPARTMENT OF THE NAVY

More information

DISS Overview. High level introduction to the Defense Information System for Security set to replace JPAS in 2017.

DISS Overview. High level introduction to the Defense Information System for Security set to replace JPAS in 2017. Hosted on Jan. 24, 2017 AskPSMO-I Webinars DISS Overview High level introduction to the Defense Information System for Security set to replace JPAS in 2017. Facilitator: Zaakia Bailey Guest Speaker(s):

More information

Department of the Navy. Information Security Program

Department of the Navy. Information Security Program THE SECRETARY OF THE NAVY SECNAV M-5510.36 Department of the Navy Information Security Program Published By Chief of Naval Operations (N09N) Special Assistant for Naval Investigative Matters and Security

More information

SECURITY OF CLASSIFIED MATERIALS B STUDENT HANDOUT

SECURITY OF CLASSIFIED MATERIALS B STUDENT HANDOUT UNITED STATES MARINE CORPS THE BASIC SCHOOL MARINE CORPS TRAINING COMMAND CAMP BARRETT, VIRGINIA 22134-5019 SECURITY OF CLASSIFIED MATERIALS B141176 STUDENT HANDOUT Basic Officer Course Introduction Importance

More information

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems United States Government Accountability Office Report to Congressional Committees June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems GAO-15-544

More information

Orthopedic Specialty Clinic, Ltd. Updated 05/2014

Orthopedic Specialty Clinic, Ltd. Updated 05/2014 Orthopedic Specialty Clinic, Ltd. Updated 05/2014 THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.

More information

CHAPTER 7 VISITS AND PERSONNEL EXCHANGES A. INTRODUCTION B. POLICY. International Programs Security Handbook 7-1

CHAPTER 7 VISITS AND PERSONNEL EXCHANGES A. INTRODUCTION B. POLICY. International Programs Security Handbook 7-1 International Programs Security Handbook 7-1 CHAPTER 7 VISITS AND PERSONNEL EXCHANGES A. INTRODUCTION 1. The U.S. Government and most foreign governments have established specific requirements and procedures

More information

SUMMARY FOR CONFORMING CHANGE #1 TO DoDM , National Industrial Security Program Operating Manual (NISPOM)

SUMMARY FOR CONFORMING CHANGE #1 TO DoDM , National Industrial Security Program Operating Manual (NISPOM) Cover Page annotated as Incorporating Change 1, noting date of the change Table of Contents has been updated throughout document to reflect current page alignment (Page 2-12) References have been updated

More information

Greg Pannoni April 2016

Greg Pannoni April 2016 Greg Pannoni April 2016 National Industrial Security Program (NISP) single, integrated, cohesive industrial security program Goal: eliminate redundant, overlapping, or unnecessary requirements that impeded

More information

Department of Homeland Security Management Directives System MD Number: Issue Date: 06/29/2004 PORTABLE ELECTRONIC DEVICES IN SCI FACILITIES

Department of Homeland Security Management Directives System MD Number: Issue Date: 06/29/2004 PORTABLE ELECTRONIC DEVICES IN SCI FACILITIES Department of Homeland Security Management Directives System MD Number: 11021 Issue Date: 06/29/2004 PORTABLE ELECTRONIC DEVICES IN SCI FACILITIES I. Purpose This Directive establishes policy and procedures

More information

Question Distractors References Linked Competency

Question Distractors References Linked Competency SAPPC Example Questions Please note: Cyber items are indicated with a ** at the end of the practice test questions. 1. The ability for your Information Technology (IT) personnel to rapidly broadcast any

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.16 August 27, 2012 USD(I) SUBJECT: Counterintelligence Functional Services (CIFS) References: See Enclosure 1 1. PURPOSE. In accordance with the authority

More information

BY ORDER OF THE COMMANDER AIR FORCE INSTRUCTION EGLIN AIR FORCE BASE EGLIN AIR FORCE BASE Supplement

BY ORDER OF THE COMMANDER AIR FORCE INSTRUCTION EGLIN AIR FORCE BASE EGLIN AIR FORCE BASE Supplement BY ORDER OF THE COMMANDER AIR FORCE INSTRUCTION 31-501 EGLIN AIR FORCE BASE EGLIN AIR FORCE BASE Supplement 1 October 2009 Certified Current 01 June 2016 Security PERSONNEL SECURITY PROGRAM MANAGEMENT

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 65-302 23 AUGUST 2018 Financial Management EXTERNAL AUDIT SERVICES COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY: Publications

More information

Originating Component: Office of the General Counsel of the Department of Defense. Effective: February 27, Releasability:

Originating Component: Office of the General Counsel of the Department of Defense. Effective: February 27, Releasability: DOD DIRECTIVE 5000.62 REVIEW OF MERGERS, ACQUISITIONS, JOINT VENTURES, INVESTMENTS, AND STRATEGIC ALLIANCES OF MAJOR DEFENSE SUPPLIERS ON NATIONAL SECURITY AND PUBLIC INTEREST Originating Component: Office

More information

Export-Controlled Technology at Contractor, University, and Federally Funded Research and Development Center Facilities (D )

Export-Controlled Technology at Contractor, University, and Federally Funded Research and Development Center Facilities (D ) March 25, 2004 Export Controls Export-Controlled Technology at Contractor, University, and Federally Funded Research and Development Center Facilities (D-2004-061) Department of Defense Office of the Inspector

More information

Department of Defense Suitability and Fitness Guide

Department of Defense Suitability and Fitness Guide Department of Defense Suitability and Fitness Guide Procedures and Guidance for Civilian Employment Suitability and Fitness Determinations within the Department of Defense Last Updated: 28-July-2016 Version

More information

Department of Defense DIRECTIVE. Inspector General of the Department of Defense (IG DoD)

Department of Defense DIRECTIVE. Inspector General of the Department of Defense (IG DoD) Department of Defense DIRECTIVE NUMBER 5106.01 April 20, 2012 DA&M SUBJECT: Inspector General of the Department of Defense (IG DoD) References: See Enclosure 1 1. PURPOSE. This Directive reissues DoD Directive

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5240.02 March 17, 2015 USD(I) SUBJECT: Counterintelligence (CI) References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) O-5240.02

More information