SCI100 Guide
SCI100 Guide
SCI100 Guide
Course Information
Estimated
completion 120 minutes
time
Course Overview
Because the United States Government has placed its trust in you, you have been given
access to SCI. Whether you’ve had access to SCI for a long time or just received it in the
past year, you know that when you protect SCI, you are protecting our nation’s security
along with the war fighters defending the American way of life.
In this course, you will review who in the Intelligence Community works with SCI, what
intelligence collection methods are used to gather SCI, and what your responsibilities
are, as outlined in your SCI Nondisclosure Statement, to protect SCI both inside and
outside your Sensitive Compartmented Information Facility (SCIF). In addition,
throughout this course you will occasionally see information that is specific to the Special
Security Officer (SSO) and Special Security Representative (SSR) roles. All others may
bypass this information.
Sensitive Compartmented Information (SCI) Refresher
Lesson 1: Course Introduction Student Guide
Course Objectives
Course Structure
Page 2
Student Guide
Lesson Introduction
1. Opening
Our democratic principles require that the American people be informed of the activities
of their Government. Also, our nation's progress depends on the free flow of information.
Nevertheless, throughout our history, the national interest has required that certain
information be maintained in confidence in order to protect our citizens, our democratic
institutions, and our participation within the community of nations. Through the use of
controlled environments, classification, and compartmentation, we protect our assets
and our nation’s security from threats such as spies, insiders, terrorists, and foreign
intelligence services. Your position exposes you to Sensitive Compartmented
Information emanating from the Intelligence Community. SCI involves intelligence
sources and methods that are the Intelligence Community’s most treasured secrets.
Although the protection challenge is significant, it is your life-long security responsibility
and legal obligation to protect SCI.
2. Objectives
In this lesson, you will review fundamental information about SCI such as the members
of the Intelligence Community (IC), SCI policy and guidance documents, and the SCI
Nondisclosure Statement.
3. IC Members
As you are aware, SCI is generated and regulated by various entities within the U.S.
Intelligence Community (IC). The IC is headed by the Director of National Intelligence
(DNI) and comprises the Central Intelligence Agency (CIA), which is an independent
agency, as well as Departmental Intelligence Elements, which are government agencies,
and Department of Defense (DoD) Intelligence Elements, which are the defense
agencies and military components.
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
The DNI and the Defense Intelligence Agency (DIA) have direct authority over Sensitive
Compartmented Information Facilities (SCIFs) in that the DNI establishes the security
requirements for SCIFs and the DIA is responsible for the accreditation of DoD SCIFs.
Head of IC
Director of National Intelligence (DNI) The Director of National Intelligence (DNI) has
oversight of the Intelligence Community (IC). The DNI
oversees the priorities, targets, operations, and
budget execution of the IC. The DNI establishes the
security requirements for Sensitive Compartmented
Information Facilities (SCIFs).
Independent Agency
Central Intelligence Agency (CIA) The Central Intelligence Agency (CIA) provides
accurate, evidence-based, comprehensive, and timely
national intelligence related to national security. The
CIA conducts counterintelligence activities, special
activities, and other functions related to national
intelligence and national security as directed by the
President. The CIA collects Human Intelligence
(HUMINT) through its clandestine arm, the National
Clandestine Service (NCS). The CIA also operates
the Open Source Center (OSINT), which collects
intelligence from publicly available sources and
analyzes it to produce actionable intelligence.
Page 2
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
Federal Bureau of Investigation (FBI) The Federal Bureau of Investigation’s (FBI) mission is
to protect and defend the U.S. against terrorist and
foreign intelligence threats, to uphold and enforce the
criminal laws of the U.S., and to provide the
leadership and criminal justice services to federal,
state, municipal, and international agencies and
partners. The National Security Branch is the division
of the FBI that focuses on intelligence and is a
member of the IC.
U.S. Coast Guard (USCG) The United States Coast Guard is a military, multi-
mission, maritime service within the Department of
Homeland Security. The Coast Guard is one of the
nation's five armed services. With maritime security as
its North Star, core roles are protecting the public, the
environment, and guarding U.S. economic and
security interests. It performs those missions in any
maritime region in which those interests may be at
risk, including America's ports, coastal waters,
offshore regions, inland waterways, and international
waters. To assist in accomplishing the many diverse
missions of the Coast Guard, senior leadership, and
operational commanders rely on the Coast Guard
Intelligence and Criminal Investigations Program. The
Coast Guard became a member of the Intelligence
Community on 28 December 2001.
Page 3
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
Defense Intelligence Agency (DIA) The Defense Intelligence Agency (DIA) coordinates
military intelligence. The DIA is the DoD combat
support agency and an important member of the U.S.
IC. The DIA is a major producer and manager of
foreign military intelligence. The DIA provides military
intelligence to war fighters, defense policymakers, and
force planners in the DoD and IC, in support of U.S.
military planning and operations and weapon system
acquisition. The DIA is the executive agent for
measurements and signatures intelligence (MASINT).
The DIA is responsible for the accreditation of DoD
Sensitive Compartmented Information Facilities
(SCIFs).
National Security Agency (NSA) The National Security Agency (NSA) is the U.S.
cryptologic organization. NSA coordinates, directs,
and performs highly specialized activities to protect
U.S. information systems and produce foreign
intelligence information. NSA is on the frontiers of
communications and data processing and is also one
of the most important centers of foreign language
analysis and research within the government.
Page 4
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
Page 5
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
Department of the Air Force Air Force Intelligence plays a critical role in the
defense of our nation, providing aerial reconnaissance
and surveillance in every conflict and contingency
operation since its establishment as a separate
service in 1947. The establishment of the Air Force
also coincided with the development of specialized
aircraft for intelligence gathering. The Air Force
continues to operate the 'U-2,' and has added
unmanned aerial vehicles like the 'Global Hawk' and
'Predator' as intelligence platforms. Additionally, the
Air Force is key to the development and use of
intelligence gathered from space platforms. Air Force
Intelligence Surveillance and Reconnaissance (ISR)
played key roles during the Cold War in dispelling the
bomber gap, the missile gap, and verifying both the
presence and withdrawal of nuclear-capable missiles
from Cuba in 1962. Air Force ISR professionals work
at every level of command and across the entire
national intelligence community, continuously
preparing for and conducting operations from full-
scale conflict to peacekeeping, counterdrug,
counterterrorism, and humanitarian and disaster relief.
In 2006, the Air Force designated the first
Headquarters USAF Intelligence Director (HQ
USAF/A2) as a three-star general officer position and
full Deputy Chief of Staff, Intelligence.
Page 6
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
Who provides governance for SCIFs? For each question, select the best answer. Then
check your answers in the Answer Key at the end of this Student Guide.
Page 7
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
1. Guidance Overview
Let’s look at a brief overview of the policies that guide your actions in protecting
Sensitive Compartmented Information. In 1981, the President issued Executive Order
12333, United States Intelligence Activities, which established the role of Senior Officials
of the Intelligence Community (SOICs) and designated the DNI as the head of the IC for
intelligence matters related to national security. In 2008, the President issued Executive
Order 13470, further amendment to Executive Order 12333, which changed the SOIC
role to Head of an Intelligence Community Element, or HICE. Subsequently, the DNI
issued several Intelligence Community Directives (ICDs) and Intelligence Community
Policy Guidance documents (ICPGs) which provide security policy for the protection of
national intelligence as well as the personnel security requirements for access to SCI
and SCIFs and physical and technical security requirements for SCIFs. To see the ICDs
or ICPGs, you may visit http://www.dni.gov/electronic_reading_room.htm. In addition, the
DoD issued guidance that prescribes security policy and procedures for the protection,
use, and dissemination of SCI within DoD SCIFs. The Department of the Army issued a
regulation that implements DoD security policies and delegates approval authority for the
establishment of SCIFs.
2. Job Aid
Executive Branch Executive Order (EO) 12333 This order established the
Senior Officials of the
United States Intelligence
Intelligence Community (SOICs),
Activities
now referred to as Head of an
4 Dec 1981 (as amended by Intelligence Community Element
Executive Orders 13284 (2003), (HICE) per E.O. 13470, as the
13355 (2004) and 13470 (2008) authority within their military
departments or agencies to
protect intelligence and
intelligence sources and
methods and designated the
Director of National Intelligence
(DNI) as the head of the
Intelligence Community for
intelligence matters related to
national security.
Page 8
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
Page 9
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
Page 10
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
Page 11
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
Page 12
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
Page 13
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
1. Purpose
As you will recall, in order to work in a SCIF and have access to SCI, you went through a
pre-screening process with an SSO or SSR. Once approved for SCI access, you went
through an indoctrination process with the SSO or SSR during which you were required
to sign an SCI Nondisclosure Statement (NdS). The SCI NdS is a contract between you
and the U.S. Government in which you made a lifelong commitment to protect U.S.
Government classified intelligence information. In just a moment, we’ll review the NdS
that you signed in more detail. SSOs and SSRs should take a moment to review the
steps of the pre-screening and indoctrination processes below.
Page 14
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
NOTE: The information in the box below is provided for the benefit of SSOs and SSRs. For additional
information on investigations and adjudications, refer to the Personnel Security web-based training course
offered by the DSS Center for Development of Security Excellence.
Pre-Screening Process
Page 15
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
NOTE: The information in the box below is provided for the benefit of SSOs and SSRs. Indoctrination is the
instructions an individual receives prior to receiving access to an SCI system or program. The instructions
convey the unique nature, unusual sensitivity, and special security safeguards and practices for SCI
handling, particularly the necessity to protect sensitive sources and methods.
Indoctrination Process
2. Details
Now let’s review the details of the SCI NdS that you signed.
Page 16
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
Paragraph 7 Government action for breach of You acknowledged that the U.S.
agreement Government might seek any
remedy available to enforce this
agreement including bringing
action against you in which you
would be responsible for court
costs and attorneys’ fees if you
lost such action.
Page 17
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
Paragraph 12 Laws protecting national security You acknowledged that you read
information this agreement, that your
questions were answered, and
that the laws and statutes
referenced in paragraph 12 were
made available to you to read, if
you wished to read them.
Paragraph 13 Fate of ill gotten gains You agreed that anything you
gained from unauthorized
disclosure of SCI would become
the property of the United States
Government.
Paragraph 14 Agreement in conformance with U.S. Law You acknowledged that this
agreement is in conformance
with U.S. laws.
Page 18
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
The SCI NdS that you signed is retained in your personnel security file along with
several other documents. SSOs and SSRs should take a moment to review what must
be retained for an individual who has had or has access to SCI.
NOTE: The information in the box below is provided for the benefit of SSOs and SSRs.
SSOs are required to maintain certain information in personnel security files for each SCI-
indoctrinated person.
• Valid ICD 704 authority
• SCI indoctrination information
• SCI debrief
• DD Form 1847-1
• Other security personnel action or defensive security briefings and memoranda
• Reports: derogatory information/changes in personal status
• Reports: personal screening interview/foreign travel and contacts
• Justifications for SCI access: approvals/ disapprovals
All but the last item shown here are to be maintained during the individual’s assignment and for
a minimum of 180 days after accountability of the individual ceases. Justifications for SCI
access and approvals or disapprovals must be maintained in the personnel security files for
two years after an individual’s accountability ceases. However, this requirement does not apply
to contractors.
An individual will be denied further access to SCI when the need-to-know for SCI access
has ceased, an individual’s access to SCI is terminated for cause, or an individual retires
or separates from the Federal Government. The responsibility for terminating access to
SCI rests with the HICE or designee who granted the access. The SSO is responsible
for accomplishing and reporting the debrief action and canceling all current visitor
certifications pertaining to the debriefed individual. SSOs and SSRs should take a
moment to review the steps they must perform.
Page 19
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
NOTE: The information in the box below is provided for the benefit of SSOs and SSRs.
Debriefing Process
Page 20
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
Which of the following statements are true about the SCI NdS and having access to
SCI? Select True or False for each statement. Then check your answers in the Answer
Key at the end of this Student Guide.
True False
The SCI agreement will last forever, unless you are released
in writing by an authorized representative of the department or
agency that last granted you with access to SCI.
Which of these statements are true about the SCI NdS and having access to SCI?
Select True or False for each statement. Then check your answers in the Answer Key at
the end of this Student Guide.
True False
Page 21
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
Answer Key
Who provides governance for SCIFs? For each question, select the best answer.
Which of the following statements are true about the SCI NdS and having access to
SCI? Select True or False for each statement.
True False
The SCI agreement will last forever, unless you are released
in writing by an authorized representative of the department or
agency that last granted you with access to SCI.
Page 22
Sensitive Compartmented Information (SCI) Refresher
Lesson 2: SCI Fundamentals Student Guide
Which of the following statements are true about the SCI NdS and having access to
SCI? Select True or False for each statement.
True False
Page 23
Student Guide
Lesson Introduction
1. Objectives
Classification Management
1. Overview
Executive Order (E.O.) 13526 outlines eight categories of information that require
classified protection. Classified national intelligence information concerning or derived
from intelligence sources, methods, or analytical processes, which is required to be
handled within formal access control systems, is the information we call SCI.
As you know, there are six basic intelligence sources or collection disciplines that gather
intelligence using human sources such as diplomats or military attaches; through public
sources such as the press and media; via verbal and nonverbal signals from land, sea,
and satellite; using geographical references through imagery, mapping, satellites, and
Sensitive Compartmented Information (SCI) Refresher
Lesson 3: SCI Control Systems and Markings Student Guide
• Press/media • Conferences
• Internet • Commercial databases
• Speeches • Videos
• Articles • Graphics
• Libraries • Drawings
• Symposiums
Page 2
Sensitive Compartmented Information (SCI) Refresher
Lesson 3: SCI Control Systems and Markings Student Guide
• Nuclear • Acoustics
• Optical • Seismic
• Radio frequency • Material
1. Overview
SCI control systems are additional measures used to protect intelligence sources and
methods or analytical procedures that are beyond those used to protect non-SCI
classified information.
2. Types
Take a moment to review the types of SCI control systems. The current SCI control
systems are HCS, TALENT KEYHOLE and SI. In addition, there are three legacy SCI
control systems you may still encounter. These are BYEMAN, HUMINT, and COMINT.
For recent changes to SCI control systems, reference the Joint Worldwide Intelligence
Communications System (JWICS).
Page 3
Sensitive Compartmented Information (SCI) Refresher
Lesson 3: SCI Control Systems and Markings Student Guide
TALENT KEYHOLE (TK) TALENT KEYHOLE (TK) was established by the Director of
Central Intelligence (DCI) for products from satellite
reconnaissance in 1960. TK protects the most sensitive details of
satellite collection capabilities and derived information which is
imagery intelligence. The Director of National Intelligence (DNI)
has administrative oversight of the TK control system.
Information within the TK compartment is managed by the
originating agency. Possible originating agencies are NSA, NRO,
NGA, CIA, and DIA.
BYEMAN (BYE) The BYEMAN control system was retired on 20 May 2005. The
word BYEMAN and the trigraph BYE are unclassified. All
previous data protected in the BYE control system, except BYE
Special Handling, will be protected in the TALENT KEYHOLE
(TK) control system. BYE Special Handling is now protected in
compartments in the new NRO control system, RESERVE.
HUMINT HUMINT was registered as the marking title for the HUMINT SCI
control system. Since then, there has been confusion between
collateral HUMINT and HUMINT in the SCI category. So
HUMINT was retired as an SCI category. When creating new
documents, if HUMINT is present in the SCI category, change it
to HCS.
Page 4
Sensitive Compartmented Information (SCI) Refresher
Lesson 3: SCI Control Systems and Markings Student Guide
1. Overview
Take a moment to review the hierarchy of classification markings found in the banner
line on the top and bottom of a classified document.
Dissemination Controls
Now take a look at this example of classification markings in the appropriate format.
These markings show that the classified document is TOP SECRET, is part of the
TALENT KEYHOLE SCI control system, is part of the REDHAT Special Access
Program, contains Atomic Energy information, is furnished to the United States by Great
Britain, is releasable only to the United States and Great Britain, and has a non-
Intelligence Community marking of Special Category.
U.S. Classification U.S. Classification markings are used on U.S. classified materials
that represent the amount of damage that could be caused to
U.S. national security if disclosed to an unauthorized person.
U.S. Classification Markings are:
• TOP SECRET
• SECRET
• CONFIDENTIAL
• UNCLASSIFIED
Page 5
Sensitive Compartmented Information (SCI) Refresher
Lesson 3: SCI Control Systems and Markings Student Guide
SCI Control System SCI Control System markings indicate to which SCI Control
System the information belongs.
Special Access Program Special Access Program markings denote classified information
that requires extraordinary protection as allowed by E.O. 13526,
as amended.
Page 6
Sensitive Compartmented Information (SCI) Refresher
Lesson 3: SCI Control Systems and Markings Student Guide
As you know, there are several SCI control system markings that correspond to the SCI
control systems you just reviewed. Some SCI control system markings are currently in
use and some are legacy SCI control system markings that you may still see on older
SCI documents.
HCS HCS is the SCI control system marking that corresponds to the HCS SCI
control system which is designed to protect human intelligence.
G G is an SCI control system marking that corresponds to the GAMMA SCI sub-
control system.
BYE BYE is the SCI control system marking that corresponds to the BYEMAN SCI
control system. The BYEMAN control system was retired on 20 May 2005. The
word BYEMAN and the trigraph BYE are unclassified. All previous data
protected in the BYE control system, except BYE Special Handling, will be
protected in the TALENT KEYHOLE (TK) control system. BYE Special
Handling is now protected in compartments in the new NRO control system,
RESERVE.
HUMINT HUMINT was registered as the marking title for the HUMINT SCI control
system. Since then, there has been confusion between collateral HUMINT and
HUMINT in the SCI category. So HUMINT was retired as an SCI category.
When creating new documents, if HUMINT is present in the SCI category,
change it to HCS.
Page 7
Sensitive Compartmented Information (SCI) Refresher
Lesson 3: SCI Control Systems and Markings Student Guide
COMINT The COMINT title for the Special Intelligence (SI) control system is no longer
valid. All references to the Special Intelligence control system shall be made
using the SI marking. IC elements have up to one year from the publication
date of the CAPCO Register, v4.2 to incorporate this change in automated
systems.
In addition to SCI control system markings, there are several dissemination control
markings created for use on SCI material.
Page 8
Sensitive Compartmented Information (SCI) Refresher
Lesson 3: SCI Control Systems and Markings Student Guide
You’ve received a document today that is TOP SECRET, is part of the COMINT control
system, and may not be shared with other countries. From the word bank below, select
the appropriate classification markings to show how this document would be marked
when you received it. Then check your answers in the Answer Key at the end of this
Student Guide.
// //
Page 9
Sensitive Compartmented Information (SCI) Refresher
Lesson 3: SCI Control Systems and Markings Student Guide
This table provides a list of guidance sources for marking classified documents.
Page 10
Sensitive Compartmented Information (SCI) Refresher
Lesson 3: SCI Control Systems and Markings Student Guide
This is a summary of the SCI management tools that will help you in your day-to-day work with SCI. Take a moment to review this
table.
JWICS Joint Worldwide For access to JWICS, contact your JWICS is a 24 hour a day network designed to meet the
Intelligence Information Management Office requirements for secure (TS/SCI) multi-media intelligence
Communications (IMO). communications worldwide.
System
JPAS Joint Personnel https://jpasapp.dmdc.osd.mil/JPAS/JP The centralized DoD database of standardized personnel
Adjudication System ASDisclosure security processes; it virtually consolidates the DoD Central
Adjudication Facilities by offering real time information
concerning clearances, access, and investigative statuses to
authorized DoD security personnel and other interfacing
organizations (e.g., Defense Security Service, Defense
Manpower Data Center, Defense Civilian Personnel
Management System, Office of Personnel Management, and
the Air Force Personnel Center).
SC Scattered Castles Access from JWICS under the Joint The IC security clearance repository and the Director of
Dissemination System webpage: National Intelligence’s authoritative source for clearance and
access information for all IC, military services, DoD civilians,
https://clearances.cia.ic.gov
and contractor personnel. DoD information is furnished by
JPAS.
For use by SSO/SSR.
Page 11
Sensitive Compartmented Information (SCI) Refresher
Lesson 3: SCI Control Systems and Markings Student Guide
CAB Compartmented Access from JWICS: A book listing the message addresses and DCS addressees
Address Book of all organizations authorized to receive SCI materials.
/ismapp3.dia.ic.gov:444/pls/jds/jds_se
c.validate_USER?=USERID=GUEST For use by SSO/SSR.
&SUBMIT=SUBMIT
DCS Defense Courier Access from JWICS under the Joint The Defense Courier Service (DCS) is responsible for the
Service Dissemination System webpage (must secure and expeditious worldwide movement of highly
be registered to access this site) classified, time-sensitive national security materials integral to
the national command authorities' C3I systems in a selectively
https://lsotools.wpafb.af.mil/dc-
manned, joint DoD Command. The DCS directly supports the
atcmd/index.cfm
President, Unified and Specified CINCs, joint military
operations, the Joint Chiefs of Staff, NSA, CIA, U.S. allies,
Department of State, and other federal agencies.
DCAMS Defense Courier For more information on DCAMS and The DCS computer system supporting administrative and
Automated its usage go to: operational functions of the worldwide DCS system.
Management System
http://www.dcs.ftmeade.army.mil
or contact 301.677.3786.
FSD Full Service Directory For more information on The Full All of the Intelligence Community shall support and share one
Service Directory go to: secure, logical IC common Full Service Directory to identify
and locate individuals, organizations, and services, including
https://fsdiis2.fsdreg.army.ic.gov
associated descriptive information over TS SCI networks.
Page 12
Sensitive Compartmented Information (SCI) Refresher
Lesson 3: SCI Control Systems and Markings Student Guide
Answer Key
You’ve received a document today that is TOP SECRET, is part of the COMINT control
system, and may not be shared with other countries. From the word bank below, select
the appropriate classification markings to show how this document would be marked
when you received it.
Page 13
Student Guide
Lesson Introduction
1. Objectives
As you know, there are several types of Sensitive Compartmented Information Facilities
(SCIF) and mandated procedures for protecting SCI both inside and outside SCIFs as
well as specific physical security measures to safeguard SCIFs. In this lesson, you will
review the types of SCIFs and the requirements for properly protecting SCI material in
your day-to-day work as well as what physical security measures are implemented to
secure the SCIFs in which you work.
1. Types of SCIFs
As you’ll recall, there are three primary types of SCIFs: closed storage SCIF, open
storage SCIF, and Continuous Operation SCIF. All three types of SCIFs are used to
handle, process, discuss, and store SCI.
In closed storage SCIFs and Continuous Operation SCIFs, SCI must be stored in GSA-
approved security containers. In open storage SCIFs, SCI may be stored in the SCIF,
but GSA-approved security containers are not required. Because SCI may be stored in
these types of SCIFs, they must be constructed in accordance with IC Tech Spec – for
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
ICD/ICS 705, which replaced DCID 6/9. Closed storage SCIFs require a 15 minute alarm
response time while Open Storage and Continuous Operation SCIFs require a 5 minute
alarm response time. Continuous Operation SCIFs are staffed and operated 24 hours
per day 7 days per week.
SCIFs are primarily located in buildings, but can also be located in other areas.
SCIFs can be located aboard military surface and sub-surface vessels, or aboard
military aircraft, or they can be Ground-based Temporary SCIFs (T-SCIFs), or
Secure Working Area SCIFs. A SCIF aboard a surface or sub-surface vessel
may be used in a single deployment of 12 months or less and must be
continuously manned. An Aircraft SCIF may be used on the verbal order of a
General or Flag Officer. A Ground-based T-SCIF may be established in
hardened structures such as buildings or bunkers or in semi-permanent
structures such as trucks, trailers, towed military shelters, prefabricated buildings,
and tents. Ground-based T-SCIFs are generally used for contingency operations,
emergency operations, and tactical military operations. A Secure Working Area
SCIF may only be used to handle, process, and discuss SCI temporarily and may
not be used to store SCI.
Review the physical security measures used inside a SCIF as well as those used to
secure a SCIF.
a. Windows
b. Walls
Walls in SCIFs must extend from true floor to true ceiling and require acoustical
protection measures and sound masking systems to protect SCI. Perimeter walls
and internal compartment walls in a SCIF must meet specific sound attenuation
standards (45 Sound Transmission Class, or STC). Large conference rooms that
use Video Teleconferencing (VTC) must meet an even higher standard (50 STC).
SCIFs in uncontrolled buildings require TEMPEST controls, which are technical
countermeasures to contain compromising emanations inside the SCIF.
Page 2
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
SCIFs require an Intrusion Detection System (IDS) that will detect attempted or
actual unauthorized human entry into a SCIF. SCIF Intrusion Detection Systems
must meet the requirements of IC Tech Spec for ICD/ICS 705 and UL 2050. As
outlined in UL 2050, one company must be responsible for the installation,
maintenance, and monitoring of the IDS.
d. Telephone
The SCIF Fixed Facility Checklist (FFC) is located in IC Tech Spec for ICD/ICS
705 and is the checklist used to obtain accreditation for SCIFs. SSOs and SSRs
must be familiar with the components of the FFC, which includes sections that
cover general information about the SCIF; peripheral security, which means
security for the building in which the SCIF is located; SCIF security; doors; details
about the SCIF IDS; the SCIF’s telecommunications systems and equipment; the
SCIF’s acoustical protection; the SCIF’s classified destruction methods; and the
information security, TEMPEST, and technical security information for the SCIF.
TEMPEST is an unclassified short name referring to the investigation, studies,
and control of compromising emanations.
Review the physical security measures used outside a SCIF that are used to secure
access to the SCIF.
a. Doors
SCIFs require a solid entry door with a high security lock, such as a Kaba Mas
CDX-07, CDX-08, or CDX-09 lock or a Sargent and Greenleaf, or S&G, 2890
PDL lock, and an access control system. SCIF emergency exit doors are the
biggest vulnerability in forced entry and must be equipped with a deadbolt into a
metal frame or strike plate and panic hardware with an audible alarm.
b. Access Control
For unattended SCIF entry, the access control system must use authentication
and verification, such as an access card and personal identification number
Page 3
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
(PIN). For access to SCIFs during business hours, use cipher locks for high
security areas and compartments. However, SCIFs should never be left
unattended and protected only by access control.
1. Getting Started
Try the Protecting SCI activity. This activity will give you a chance to review the types of
things that have implications for protecting SCI. Here's how it works. You'll review
access procedures for a SCIF at the visitor entrance to a SCIF. Next you’ll review
procedures for working in a SCIF as well as procedures for properly closing a SCIF. In
addition, you will review the procedures you must follow to protect SCI outside of a
SCIF. The items in each setting might have consequences for how you handle and
protect SCI. For each item, you’ll be presented with useful information about that item or
you will be asked a question about that item and will receive feedback to your answer.
Review the policies that relate to protecting SCI at the visitor’s desk in a SCIF. Susan
Jones and Ken Johnson are here to visit the SCIF today.
Are Susan Jones and Ken Johnson required to record their citizenship on the
visitor control log?
Yes
No
See the next page for the correct answer and an explanation.
Page 4
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
Visitor Control Log Feedback: Yes, Susan and Ken are required to record their
citizenship. All visitors to SCIFs must record the following information on the
visitor control log:
• Visitor’s name and organization
• Visitor’s citizenship
• Purpose of the visit
• Point of contact in the SCIF
• Date and time of visit
Remember: Visitor control logs for SCIFs must be retained for one year after the
last entry.
b. Visitor One
Susan Jones has not obtained a visitor certification. Should she be allowed to
enter this SCIF?
Yes
No
See the next page for the correct answer and an explanation.
Page 5
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
Visitor One Feedback: Yes, Susan may enter the SCIF without a visitor
certification as long as she is escorted by authorized DoD civilian or military
personnel assigned to the SCIF. Escorts must also be indoctrinated with their
escort responsibilities. However, since she is not certified, Susan will not be
allowed access to classified information, regardless of her affiliation or position.
c. Visitor Two
Ken Johnson has a visitor certification. Does he require an escort to enter this
SCIF?
Yes
No
Ken Johnson has a TOP SECRET/SCI clearance. What else must he have in
order to enter certain areas of the SCIF?
High level position
Seniority
Need-to-know
See the next page for the correct answer and an explanation.
Page 6
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
Visitor Two Feedback: Yes, Ken must be escorted. Escorts are required for all
visitors. Only personnel who are assigned to a SCIF can enter without an escort.
Ken must also have need-to-know. Access to certain areas and to classified
information is limited based on need-to-know required for official business.
d. Escort
Danielle Stilz works in this SCIF and she has come out to meet Ken and Susan.
Can Danielle be an escort for either visitor in the SCIF?
Yes
No
See the next page for the correct answer and an explanation.
Page 7
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
Escort Feedback: Yes, Danielle can be their escort. All personnel assigned to
the SCIF are authorized to escort non-indoctrinated or contractor personnel
within the government area. However, prior to assuming escort duties, they must
be briefed on their escort responsibilities.
e. Visitor Certifications
As you know, each SCIF must have written procedures, established by the
SCIF’s SSO, for identifying and controlling visitors. Who processed Ken
Johnson’s visitor certification?
SCIF SSO or SSR
Person manning the SCIF visitor desk
Cognizant Security Authority (CSA)
See the next page for the correct answer and an explanation.
Page 8
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
Visitor Certifications Feedback: The SSO or SSR process all SCIF visitor
certifications.
Which is the primary database used for personnel access to SCIFs outside DoD?
Joint Personnel Adjudication System (JPAS)
Scattered Castles
Defense Special Security System (DSSS)
See the next page for the correct answer and an explanation.
Page 9
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
Review the items that have implications for protecting SCI inside the SCIF.
a. Storage Containers
As you know, SCI must be stored within an accredited SCIF. Is SCI always
required to be stored in a GSA-approved storage container?
Yes
No
See the next page for the correct answer and an explanation.
Page 10
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
Storage Containers Feedback: No, not always. SCI is not required to be stored
in a GSA-approved storage container in an Open Storage SCIF, but is required
to be stored in a GSA-approved container in a Closed Storage SCIF.
b. Transporting SCI
Tom Jameson has an SCI document he needs to share with Janie Calico, who
works in another SCIF. What would be the preferred method for Tom to use to
get the document to Janie?
Defense Courier Service (DCS)
Secure email or other secure electronic means
SCI-indoctrinated personnel
See the next page for the correct answer and an explanation.
Page 11
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
Transporting SCI Feedback: If at all possible, Tom should send the document
to Janie via secure email or secure electronic means. However, when it’s not
possible to transport SCI electronically, other authorized methods for transporting
SCI may be used. These methods include hand-carrying by SCI-indoctrinated
personnel in a manner that ensures proper protection, certified or designated
couriers who possess a letter, memorandum, separate badge, or other written
device such as DD Form 2501, Courier Authorization, attesting to their specific
designation as an SCI Courier, diplomatic pouch, or the Defense Courier Service
(DCS).
c. Packaging SCI
Remember: SCI material must be double wrapped prior to giving the package to
the courier. SCI couriers must be appointed in writing and must have a signed
original letter of authorization by the appropriate approving authority when
travelling aboard U.S. commercial aircraft. SCI couriers must be familiar with all
rules and regulations governing couriers and transporting information, including
hand-carrying aboard military, U.S. Government chartered, or commercial
aircraft. Specific instructions may be found in DoDM 5105.21, Volumes 1–3,
Department of Defense Sensitive Compartmented Information Administrative
Security Manual.
Tom Jameson brought a Government issued laptop from another agency into his
SCIF this morning. Who was required to scan and approve the laptop?
CSA or ISSO
ISSO or SSO
SSR or SSO
See the next page for the correct answer and an explanation.
Page 12
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
See the next page for the correct answer and an explanation.
Page 13
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
f. Borrowing passwords
Danielle cannot remember the new password she created for her access to the
unclassified system in her SCIF. She is in a hurry, so she just asked Tom to
borrow his password temporarily. Should Tom allow Danielle to borrow his
password?
Yes
No
See the next page for the correct answer and an explanation.
Page 14
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
Borrowing Passwords Feedback: No, Tom should not allow Danielle to borrow
his password. You must never share or compromise your passwords no matter
what classification the system is. Also, remember you must create smart
passwords following your organization’s guidance and memorize them rather
than write them down.
Review the items that have implications for protecting SCI inside the copy area in a
SCIF.
See the next page for the correct answer and an explanation.
Page 15
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
SCI Destruction Methods Feedback: No, there are other methods for
destroying SCI. Other Director of National Intelligence (DNI) approved methods
for destroying SCI include burning, pulping, pulverizing, melting, and chemical
decomposition. Note that residue from destroyed SCI must not be left in clear
plastic bags for uncleared personnel to see.
As you may recall, crosscut shredders, pulpers, and other destruction equipment
used to destroy SCI paper materials must be on the NSA Evaluated Products List
of High Security Crosscut Paper Shredders, and must be the same type used for
the terminal destruction of COMSEC paper products. Note that SCI in computer
or automated systems or other magnetic media must be destroyed by sanitizing
using approved degaussing equipment and then pulverized using an approved
disintegrator.
c. Reproduction of SCI
Remember:
• Reproduction equipment must display the highest level of classification
allowed to be reproduced on that equipment.
• Copiers may not be used for reproducing SCI if they leave latent images
on themselves or other material or if they connect to remote diagnostic
centers, such as by telephone line.
• Copies of classified documents are subject to the same control,
accountability, and destruction procedures as the original document.
Page 16
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
Kelly Turner is about to close her SCIF for the day. Review the items that have
implications for properly closing a SCIF.
Before Kelly sets the alarm, she must verify that all computer systems are logged
off and that she is the last one there. Kelly’s SCIF is a closed storage SCIF, so
she must ensure that no classified material is left out. Kelly must also verify that
all security containers are closed and locked and that the lock sign is displayed
on each security container and the SF-701 form has been completed.
After Kelly sets the alarm and leaves the SCIF, she must spin the lock on the
door, display the Locked sign, and complete the SF-702 form.
Tom and Tracy Jameson are married, and both are civilians who both work for a major
defense contractor. Tom works in a SCIF. Tom and Tracy are arriving home from work
and stop to speak to their neighbor, Eric Goodfellow, who is a military officer. Review the
items that can have implications for protecting SCI outside of your SCIF.
a. Identification
See the next page for the correct answer and an explanation.
Page 17
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
Identification Feedback: Tom Jameson should not be wearing his name badge
because he is outside of his SCIF. When outside of your SCIF, you must not call
attention to yourself. You must remove your name badge as soon as you leave
your SCIF.
Who must Tom consult to find out what he can tell Tracy about his work location
and mission?
ISSO
SSO
SSR
See the next page for the correct answer and an explanation.
Page 18
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
Talking about your work with family Feedback: Tom must consult his SCIF’s
Special Security Officer (SSO) to learn what he is and is not permitted to tell his
wife, Tracy, about his location and mission.
Since Eric is a neighbor and he is a military officer, is it OK for Tom to talk about
his work with Eric?
Yes
No
See the next page for the correct answer and an explanation.
Page 19
Sensitive Compartmented Information (SCI) Refresher
Lesson 4: Protecting SCI Student Guide
Talking about your work with other cleared personnel Feedback: No, Tom
should not discuss his work with Eric. As you know, you must not discuss SCI
outside of your SCIF with anyone.
Remember: Being aware of your surroundings both inside and outside the SCIF
and knowing the policies and procedures you need to apply will help you and
your organization properly protect SCI.
Page 20
Student Guide
Lesson Introduction
1. Objectives
As you know, you have access to SCI because the United States Government has put
its trust in you. This relationship obligates you to report certain events and incidents to
your security office, which range from specific information about your personal life to
security incidents that have caused the loss or compromise of classified information. In
this lesson, you will review the types of information that you, as an individual with access
to SCI, are required to report.
1. Getting Started
Try the SCI Reporting Requirements activity. This activity will give you a chance to
review the kinds of things that must be reported by or about those who have access to
SCI. Here's how it works. You'll hear the stories of employees who have access to SCI,
which obligates them to certain reporting requirements, and you will be asked to
determine whether the information you learned about that person is required to be
reported or not. For each question, you’ll be presented with feedback to your answer.
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
2. Conference Room
a. Shannon O’Connor
Shannon O’Connor recently got married but she did not take her new husband’s
last name. Is Shannon required to report her marriage?
Yes
No
See the next page for the correct answer and an explanation.
Page 2
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
b. Mark Conley
Mark Conley has been visiting the casinos on a regular basis and has incurred
over $100,000 in debt due to gambling. Is Mark required to report his gambling
problem?
Yes
No
See the next page for the correct answer and an explanation.
Page 3
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
Feedback: Yes, Mark is required to report his gambling problem. Everyone with
SCI access must report personal problems such as drug and alcohol misuse or
abuse and financial problems.
c. Gene Sanders
On Friday evening, Gene Sanders went out drinking with his buddies. On his way
home, he was arrested for DUI. This is the first time this has ever happened to
him. Is Gene required to report his arrest?
Yes
No
See the next page for the correct answer and an explanation.
Page 4
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
Feedback: Yes, Gene is required to report his arrest for DUI. In fact, personnel
with SCI access are required to report all legal involvements such as litigation,
arrests, and court summons.
d. Robin Queen
Robin Queen knows that Jack Bell, her co-worker and friend, has not been
paying child support and has to attend a court hearing next week. Jack says this
is a personal issue and that it is not his employer’s business, even though he has
SCI access. Should Robin report the fact that Jack has been summoned to court
for not paying child support since she knows that he won’t report it?
Yes
No
See the next page for the correct answer and an explanation.
Page 5
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
Feedback: Yes. Although Jack should be the one to report this information,
Robin is obligated to report it since she knows that Jack will not. Everyone with
SCI access is required to report adverse information about others who also have
SCI access.
e. Jason Wu
A reporter from the local newspaper contacted Jason Wu about the controlled
access program, Bluebell. Jason told the reporter he’s never heard of Bluebell
and did not provide any other information. Since Jason didn’t share any
information about Bluebell with the reporter, is he required to report this phone
contact?
Yes
No
See the next page for the correct answer and an explanation.
Page 6
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
Feedback: Yes, Jason is required to report this contact with the reporter. All
personnel with access to SCI are required to report any contact with the media.
In addition, they are required to report any improper solicitations for information.
Note that this call from the local newspaper reporter could also be considered an
improper solicitation for information because the information is classified.
f. Helen Brown
Helen Brown enjoys meeting her girlfriends for drinks and appetizers most Friday
evenings before attending a movie with them. Is Helen required to report her
alcohol consumption?
Yes
No
See the next page for the correct answer and an explanation.
Page 7
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
Feedback: No, Helen is not required to report her occasional and moderate
alcohol consumption. Personnel with access to SCI are required to report their
alcohol consumption, or the alcohol consumption of their co-workers who have
SCI access, only if that alcohol consumption is a problem.
a. Paul Coble
Paul Coble left an SCI document in a folder in his desk drawer when he left work
yesterday. He forgot to put it back in its security container before he left work.
After discussing this incident with his supervisor, they determined the information
was most likely not compromised. Does this incident require reporting?
Yes
No
See the next page for the correct answer and an explanation.
Page 8
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
Feedback: Yes, this incident must be reported. When rules have not been
followed, resulting in a possible compromise of classified information, a report
must be made. These types of security incidents are called infractions.
b. Janice Bowers
Janice Bowers has recently noticed that one of her co-workers in the SCIF has
become disgruntled and very unhappy. Should Janice report her co-worker’s
disgruntled behavior?
Yes
No
See the next page for the correct answer and an explanation.
Page 9
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
Feedback: Yes, Janice must report her co-worker’s behavior. All personnel with
access to SCI must report disgruntled employees in the SCIF.
c. Kevin Connolly
Kevin Connolly works for a defense contractor and has been asked to give a
presentation at a symposium next month regarding his area of expertise, which is
of a classified nature. Is Kevin required to have his presentation reviewed prior to
the symposium?
Yes
No
See the next page for the correct answer and an explanation.
Page 10
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
Feedback: Yes, Kevin must have a pre-publication review of his material. All
personnel with access to SCI are required to have a pre-publication review of any
material they create before it enters the public domain. This includes works of
fiction, speeches, articles, white papers, advertisements, web pages, web sites,
blogs, chat rooms, and video teleconferences.
a. Bob Moore
Today when Bob Moore started to leave his building for lunch, he overheard his
co-worker in the stairwell discussing on a cell phone the controlled access
program they have been working on together. Should Bob report his co-worker?
Yes
No
See the next page for the correct answer and an explanation.
Page 11
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
Feedback: Yes, Bob must report this incident since the co-worker’s conversation
is an unauthorized disclosure. It does not matter who the co-worker was talking
to. SCI is not to be discussed outside of the SCIF to anyone. All personnel who
have access to SCI must report unauthorized disclosures to their immediate
supervisor and their security office only. Unauthorized disclosures include leaks,
which are deliberate disclosures of classified information to the media, and spills,
which are accidental or intentional disclosures of classified information across
computer systems.
b. Rosa Gonzalez
This morning, Rosa Gonzalez noticed that Mr. Johnson arrived at the SCIF an
hour earlier than usual today. Should Rosa report this information about Mr.
Johnson?
Yes
No
See the next page for the correct answer and an explanation.
Page 12
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
Feedback: No, Rosa should not report Mr. Johnson for arriving to work an hour
early. It’s possible that Mr. Johnson just came in early to work on something for
which he has an urgent deadline. Or perhaps he must leave the SCIF early today
for a doctor’s appointment. However, if this type of behavior continues without an
explanation, then it might make sense for Rosa to report it. In general, though,
suspicious co-worker activities must be reported by all personnel with access to
SCI.
c. Richard Phillips
Richard Phillips is making copies of SCI documents with the intention of putting
them in his briefcase so he can work on them at home. If anyone sees Richard
remove these copies of SCI documents from the SCIF, are they required to
report it?
Yes
No
See the next page for the correct answer and an explanation.
Page 13
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
d. Sandy Tully
Sandy Tully recently joined an anti-military activist group called No War for US. Is
Sandy required to report her affiliation with this group?
Yes
No
See the next page for the correct answer and an explanation.
Page 14
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
Feedback: Yes, Sandy is required to report her affiliation with this group. You
must report any external activist groups that you or anyone you work with belong
to.
5. Foreign Interactions
a. Howard Brewer
See the next page for the correct answer and an explanation.
Page 15
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
Feedback: No, Howard is not required to report his trip to Hawaii because it is
within the U.S. However, Howard Brewer and all personnel who have SCI access
are required to report all foreign travel prior to departure. The only exception to
this rule is that day trips to Canada and Mexico may be reported upon return. In
addition, all unusual incidents on any trip must be reported and some foreign
trips may require a pre-travel briefing.
b. Trish Rivers
Trish Rivers recently she began dating a French businessman who lives near
her. This man has French citizenship and is not a U.S. citizen. Is Trish required
to report this relationship?
Yes
No
See the next page for the correct answer and an explanation.
Page 16
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
Feedback: Yes, Trish is required to report that she is dating this man from
France because he is a French citizen and not a U.S. citizen. All personnel who
have SCI access are required to report close continuing relationships, whether
they are personal or business, with a citizen, resident, or representative of a
foreign country. This rule also includes foreign contacts via the Internet such as
email and chat rooms.
c. Chris Cohen
Chris Cohen travelled to Canada on a business trip for his job with a defense
contractor. While he was in Canada, Chris attended a gala at the U.S. Embassy
in Canada and mingled with several Canadian citizens. Is Chris required to report
these foreign contacts?
Yes
No
See the next page for the correct answer and an explanation.
Page 17
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
Feedback: No, Chris does not have to report these casual foreign contacts from
the gala. Chris Cohen and all personnel who have access to SCI are only
required to report casual foreign contacts if the foreign contact displays a strong
interest in the person’s employment, is not satisfied with answers provided to
their questions, or if the foreign contact requests or attempts to have follow up
contact.
d. Lillian Cho
Lillian Cho works for a defense contractor full-time but recently took a part-time
position working on the weekends for a furniture store that is a Swiss-based
company. Is Lillian required to report her part-time employment?
Yes
No
See the next page for the correct answer and an explanation.
Page 18
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
Feedback: Yes, Lillian is required to report her part-time job because it is for a
foreign-based company. All personnel with SCI access must report any foreign-
based outside employment.
e. Shawna Smith
See the next page for the correct answer and an explanation.
Page 19
Sensitive Compartmented Information (SCI) Refresher
Lesson 5: SCI Reporting Requirements Student Guide
Feedback: Yes, the fact that Shawna forgot to bring her courier card must be
reported. You must report any systemic weaknesses and anomalies.
Page 20
Student Guide
Course Summary
In this course, you reviewed your obligations to protect SCI as outlined in the SCI
Nondisclosure Statement you signed. You also reviewed the ways you must protect SCI
both inside your SCIF and outside your SCIF.
Lesson Review
Course Objectives
Conclusion
To receive credit for this course, you must take the Sensitive Compartmented
Information examination. Please use the STEPP system from the Center for
Development of Security Excellence to register for the online exam.
Page 2