Update) All Areas Questions with i,- i,- i,- i,- i,-
Verified Answers |100% Correct. i,- i,- i,-
The three categories of Special Access Programs
i,- i,- i,- i,- i,- i,- i,- i,-acquisition, i,-
intelligence, and operations & support i,- i,- i,- i,-
Types of threats to classified information
i,- i,- Insider Threat, i,- i,- i,- i,- i,- i,- i,-
Foreign Intelligence Entities (FIE), criminal activities, cyber threats,
i,- i,- i,- i,- i,- i,- i,- i,-
business competitors i,-
The concept of an insider threat
i,- i,- i,- i,- i,- i,- i,- An employee who mayi,- i,- i,- i,-
represent a threat to i,- i,- i,-
national security. These threats encompass potential espionage,
i,- i,- i,- i,- i,- i,- i,-
violent acts against the Government or the nation, and
i,- i,- i,- i,- i,- i,- i,- i,- i,-
unauthorized disclosure of classified information i,- i,- i,- i,-
The purpose of the Foreign Visitor Program
i,- To track and
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
approve access by a foreign entity to information that is
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
classified; and to approve access by a foreign entity to
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
information that is unclassified, related to a U.S. Government
i,- i,- i,- i,- i,- i,- i,- i,- i,-
contract, or plant visits covered by ITAR.
i,- i,- i,- i,- i,- i,-
,Special Access Program i,- i,- i,- i,- A program established for a specific
i,- i,- i,- i,- i,- i,-
class of i,-
classified information that imposes safeguarding and access
i,- i,- i,- i,- i,- i,- i,-
requirements that exceed those normally required for information i,- i,- i,- i,- i,- i,- i,- i,-
at the same classification level.
i,- i,- i,- i,-
Enhanced security requirements for protecting Special Access
i,- i,- i,- i,- i,- i,- i,-
Program (SAP) information Within Personnel Security:
i,- i,- i,- i,- i,- i,-
• Access Rosters;
i,- i,-
• Billet Structures (if required);
i,- i,- i,- i,-
• Indoctrination Agreement;
i,- i,-
• Clearance based on appropriate investigation completed within
i,- i,- i,- i,- i,- i,- i,- i,-
last 5/6 i,-
years;
• Individual must materially contribute to program and have need
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
to know (NTK);
i,- i,-
• SAP personnel subject to random counterintelligence scope
i,- i,- i,- i,- i,- i,- i,- i,-
polygraph;
• Polygraph examination, if approved by the DepSecDef, may be
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
used as a i,- i,-
mandatory access determination; i,- i,-
• Tier review process;
i,- i,- i,-
,• Personnel must have Secret or TS clearance;
i,- i,- i,- i,- i,- i,- i,-
• SF-86 must be current within one year;
i,- i,- i,- i,- i,- i,- i,-
• Limited Access;
i,- i,-
• Waivers required for foreign cohabitants, spouses, and
i,- i,- i,- i,- i,- i,- i,- i,-
immediate family i,-
members.
Within Industrial Security:
i,- i,- i,-
The SecDef or DepSecDef can approve carve-out provision to
i,- i,- i,- i,- i,- i,- i,- i,- i,-
relieve Defense i,-
Security Service of industrial security oversight responsibilities.
i,- i,- i,- i,- i,- i,-
Within Physical Security:
i,- i,-
• Access Control;
i,- i,-
• Maintain SAP Facility;
i,- i,- i,-
• Access Roster;
i,- i,-
• All SAPs must have unclassified nickname/ Codeword (optional).
i,- i,- i,- i,- i,- i,- i,- i,-
Within Information Security:
i,- i,-
• The use of HVSACO;
i,- i,- i,- i,-
• Transmission requirements (order of precedence).
i,- i,- i,- i,- i,-
Responsibilities of the Government SAP Security i,- i,- i,- i,- i,- i,-
Officer/Contractor Program i,-
Security Officer (GSSO/ i,- i,-
, CPSO) • Possess personnel clearance and Program access at
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
least equal to highest level of Program classified information
i,- i,- i,- i,- i,- i,- i,- i,- i,-
involved.
• Provide security administration and management for
i,- i,- i,- i,- i,- i,- i,-
organization.
• Ensure personnel processed for access to SAP meet prerequisite
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
personnel clearance and/or investigative requirements specified.
i,- i,- i,- i,- i,-
• Ensure adequate secure storage and work spaces.
i,- i,- i,- i,- i,- i,- i,-
• Ensure strict adherence to the provisions of NISPOM, its
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
supplement, and the Overprint. i,- i,- i,-
• When required, establish and oversee classified material control
i,- i,- i,- i,- i,- i,- i,- i,- i,-
program for each SAP. i,- i,- i,-
• When required, conduct an annual inventory of accountable
i,- i,- i,- i,- i,- i,- i,- i,-
classified material. i,-
• When required, establish SAPF.
i,- i,- i,- i,-
• Establish and oversee visitor control program.
i,- i,- i,- i,- i,- i,-
• Monitor reproduction/duplication/destruction capability of SAP
i,- i,- i,- i,- i,- i,-
information
• Ensure adherence to special communications capabilities within
i,- i,- i,- i,- i,- i,- i,- i,-
SAPF.
• Provide for initial Program indoctrination of employees after
i,- i,- i,- i,- i,- i,- i,- i,- i,-
access is approved; rebrief and debrief personnel
i,- i,- i,- i,- i,- i,- i,-
• Establish and oversee specialized procedures for transmission of
i,- i,- i,- i,- i,- i,- i,- i,-