When you signed the sci nds, you gave up protection under the whistleblower protection act.

Course: Sensitive Compartmented Information (SCI) Refresher Lesson 1: Course Introduction Course Information Purpose Provide annual refresher training on how to protect Sensitive Compartmented Information (SCI) and Sensitive Compartmented Information Facilities (SCIFs) Audience Military, civilian, and contractor personnel who work in a Sensitive Compartmented Information Facility (SCIF), including those who are responsible for the security of a SCIF, namely the Special Security Officers (SSOs) and Special Security Representatives (SSRs) Pass/Fail % 75% on final examination Estimated completion time 120 minutes Course Overview Because the United States Government has placed its trust in you, you have been given access to SCI. Whether you ve had access to SCI for a long time or just received it in the past year, you know that when you protect SCI, you are protecting our nation s security along with the war fighters defending the American way of life. In this course, you will review who in the Intelligence Community works with SCI, what intelligence collection methods are used to gather SCI, and what your responsibilities are, as outlined in your SCI Nondisclosure Statement, to protect SCI both inside and outside your Sensitive Compartmented Information Facility (SCIF). In addition, throughout this course you will occasionally see information that is specific to the Special Security Officer (SSO) and Special Security Representative (SSR) roles. All others may bypass this information.

Lesson 1: Course Introduction Course Objectives Here are the overall course objectives: Recognize SCI policy guidance documents Identify the purpose and components of the Sensitive Compartmented Information (SCI) Nondisclosure Statement (NdS) Identify classification markings and dissemination controls for SCI materials Identify the proper methods for handling, discussing, reproducing, transporting, and destroying SCI material Identify the proper procedures for visitors and escorts in a SCIF Identify the types of accredited SCIFs and their purposes Recognize the types of information that must be reported by or about individuals who have SCI access Here are additional lesson objectives for SSOs/SSRs: Identify the process for SCI pre-screening and indoctrination Identify the SCIF accreditation process Identify the components of the Fixed Facility Checklist (FFC) Course Structure This course is organized into the lessons listed here: Course Introduction SCI Fundamentals SCI Control Systems and Markings Protecting SCI SCI Reporting Requirements Course Conclusion Page 2

Course: Sensitive Compartmented Information (SCI) Refresher Lesson 2: SCI Fundamentals Lesson Introduction 1. Opening Our democratic principles require that the American people be informed of the activities of their Government. Also, our nation's progress depends on the free flow of information. Nevertheless, throughout our history, the national interest has required that certain information be maintained in confidence in order to protect our citizens, our democratic institutions, and our participation within the community of nations. Through the use of controlled environments, classification, and compartmentation, we protect our assets and our nation s security from threats such as spies, insiders, terrorists, and foreign intelligence services. Your position exposes you to Sensitive Compartmented Information emanating from the Intelligence Community. SCI involves intelligence sources and methods that are the Intelligence Community s most treasured secrets. Although the protection challenge is significant, it is your life-long security responsibility and legal obligation to protect SCI. 2. Objectives In this lesson, you will review fundamental information about SCI such as the members of the Intelligence Community (IC), SCI policy and guidance documents, and the SCI Nondisclosure Statement. Here are the lesson objectives: Recognize SCI policy and guidance documents Identify the purpose and components of the SCI Nondisclosure Agreement 3. IC Members As you are aware, SCI is generated and regulated by various entities within the U.S. Intelligence Community (IC). The IC is headed by the Director of National Intelligence (DNI) and comprises the Central Intelligence Agency (CIA), which is an independent agency, as well as Departmental Intelligence Elements, which are government agencies, and Department of Defense (DoD) Intelligence Elements, which are the defense agencies and military components.

Lesson 2: SCI Fundamentals The DNI and the Defense Intelligence Agency (DIA) have direct authority over Sensitive Compartmented Information Facilities (SCIFs) in that the DNI establishes the security requirements for SCIFs and the DIA is responsible for the accreditation of DoD SCIFs. Head of IC Director of National Intelligence (DNI) The Director of National Intelligence (DNI) has oversight of the Intelligence Community (IC). The DNI oversees the priorities, targets, operations, and budget execution of the IC. The DNI establishes the security requirements for Sensitive Compartmented Information Facilities (SCIFs). Independent Agency Central Intelligence Agency (CIA) The Central Intelligence Agency (CIA) provides accurate, evidence-based, comprehensive, and timely national intelligence related to national security. The CIA conducts counterintelligence activities, special activities, and other functions related to national intelligence and national security as directed by the President. The CIA collects Human Intelligence (HUMINT) through its clandestine arm, the National Clandestine Service (NCS). The CIA also operates the Open Source Center (OSINT), which collects intelligence from publicly available sources and analyzes it to produce actionable intelligence. Departmental Intelligence Elements Department of Energy (DOE) Drug Enforcement Administration (DEA) Treasury The Department of Energy s Office of Intelligence and Counterintelligence performs analyses of foreign nuclear weapons, nuclear proliferation, and energy security-related intelligence issues in support of U.S. national security policies, programs, and objectives. The Drug Enforcement Administration s Office of National Security Intelligence deals with the nexus between illegal drug production and trafficking and the worldwide terrorism threat. The Treasury Department s Office of Intelligence and Analysis collects and processes information that may affect U.S. fiscal and monetary policy. Page 2

Lesson 2: SCI Fundamentals Departmental Intelligence Elements Department of Homeland Security (DHS) Department of State (DOS) Federal Bureau of Investigation (FBI) U.S. Coast Guard (USCG) The Department of Homeland Security (DHS) was formed in response to the terrorist attack on September 11, 2001. The DHS combined 22 previously existing agencies into one in order to reduce the vulnerability of the U.S. to terrorism and to detect, prevent, and respond to terrorist attacks. The DHS is composed of five directorates. The Intelligence and Analysis Directorate is a member of the IC. Other notable components of DHS involved in the IC include the U.S. Coast Guard, the Secret Service, the Federal Emergency Management Agency (FEMA), Customs Border Patrol, and Immigration and Customs Enforcement. The Department of State s Bureau of Intelligence and Research deals with information affecting U.S. foreign policy. The Federal Bureau of Investigation s (FBI) mission is to protect and defend the U.S. against terrorist and foreign intelligence threats, to uphold and enforce the criminal laws of the U.S., and to provide the leadership and criminal justice services to federal, state, municipal, and international agencies and partners. The National Security Branch is the division of the FBI that focuses on intelligence and is a member of the IC. The United States Coast Guard is a military, multimission, maritime service within the Department of Homeland Security. The Coast Guard is one of the nation's five armed services. With maritime security as its North Star, core roles are protecting the public, the environment, and guarding U.S. economic and security interests. It performs those missions in any maritime region in which those interests may be at risk, including America's ports, coastal waters, offshore regions, inland waterways, and international waters. To assist in accomplishing the many diverse missions of the Coast Guard, senior leadership, and operational commanders rely on the Coast Guard Intelligence and Criminal Investigations Program. The Coast Guard became a member of the Intelligence Community on 28 December 2001. Page 3

Lesson 2: SCI Fundamentals DoD Intelligence Elements Defense Intelligence Agency (DIA) National Geospatial Intelligence Agency (NGA) National Reconnaissance Office (NRO) National Security Agency (NSA) The Defense Intelligence Agency (DIA) coordinates military intelligence. The DIA is the DoD combat support agency and an important member of the U.S. IC. The DIA is a major producer and manager of foreign military intelligence. The DIA provides military intelligence to war fighters, defense policymakers, and force planners in the DoD and IC, in support of U.S. military planning and operations and weapon system acquisition. The DIA is the executive agent for measurements and signatures intelligence (MASINT). The DIA is responsible for the accreditation of DoD Sensitive Compartmented Information Facilities (SCIFs). The National Geospatial Intelligence Agency (NGA) provides timely, relevant, and accurate geospatial intelligence in support of national security objectives. Geospatial intelligence is the exploitation and analysis of imagery and geospatial information to describe, assess, and visually depict physical features and geographically reference activities on earth. The National Reconnaissance Office (NRO) designs, builds, and operates the nation s reconnaissance satellites. NRO products, provided to customers like the CIA and the DoD, can warn of potential trouble spots around the world, help plan military operations, and monitor the environment. The National Security Agency (NSA) is the U.S. cryptologic organization. NSA coordinates, directs, and performs highly specialized activities to protect U.S. information systems and produce foreign intelligence information. NSA is on the frontiers of communications and data processing and is also one of the most important centers of foreign language analysis and research within the government. Page 4

Lesson 2: SCI Fundamentals DoD Intelligence Elements Department of the Navy U.S. Marines Corps Established on March 23, 1882, Naval Intelligence is the oldest continuous serving U.S. intelligence service. It is a global intelligence enterprise of over 20,000 uniformed and civilian personnel. The Naval Intelligence primary production organization, the Office of Naval Intelligence (ONI), located at the National Maritime Intelligence Center (NMIC) in Suitland, MD, is the lead DoD production center for maritime intelligence. ONI supports a variety of missions including U.S. military acquisition and development, counter-terrorism, counter-proliferation, counter-narcotics, customs enforcement and, through partnerships and information sharing agreements with the U.S. Coast Guard and U.S. Northern Command, Homeland Security and Homeland Defense. While ONI is the largest Naval Intelligence organization with the largest concentration of Naval Intelligence civilians, most of Naval Intelligence is comprised of active duty military personnel, serving throughout the world. The Marine Corps Intelligence mission is to provide commanders at every level with seamless, tailored, timely, and mission-essential intelligence and to ensure this intelligence is integrated into the operational planning process. Because Marine forces are employed primarily at the tactical level, Marine Corps intelligence activities are oriented toward tactical support. The service allocates resources and manpower to develop and maintain specific expertise in the areas of human and technical reconnaissance and surveillance, general military/naval intelligence duties, human-source intelligence, counterintelligence, imagery intelligence, signals intelligence, and tactical exploitation of national capabilities. The Marine Corps' Director of Intelligence is the Commandant's principal intelligence staff officer and the functional manager for intelligence, counterintelligence, and cryptologic matters. Page 5

Lesson 2: SCI Fundamentals DoD Intelligence Elements Department of the Air Force Department of the Army Air Force Intelligence plays a critical role in the defense of our nation, providing aerial reconnaissance and surveillance in every conflict and contingency operation since its establishment as a separate service in 1947. The establishment of the Air Force also coincided with the development of specialized aircraft for intelligence gathering. The Air Force continues to operate the 'U-2,' and has added unmanned aerial vehicles like the 'Global Hawk' and 'Predator' as intelligence platforms. Additionally, the Air Force is key to the development and use of intelligence gathered from space platforms. Air Force Intelligence Surveillance and Reconnaissance (ISR) played key roles during the Cold War in dispelling the bomber gap, the missile gap, and verifying both the presence and withdrawal of nuclear-capable missiles from Cuba in 1962. Air Force ISR professionals work at every level of command and across the entire national intelligence community, continuously preparing for and conducting operations from fullscale conflict to peacekeeping, counterdrug, counterterrorism, and humanitarian and disaster relief. In 2006, the Air Force designated the first Headquarters USAF Intelligence Director (HQ USAF/A2) as a three-star general officer position and full Deputy Chief of Staff, Intelligence. The U.S. Army Intelligence department (G2) is responsible for policy formulation, planning, programming, budgeting, management, staff supervision, evaluation, and oversight for intelligence activities for the Department of the Army. The G2 is responsible for the overall coordination of the five major military intelligence (MI) disciplines within the Army: Imagery Intelligence, Signals Intelligence, Human Intelligence, Measurement and Signature Intelligence, and Counterintelligence and Security Countermeasures. Page 6

Lesson 2: SCI Fundamentals Intelligence Community Review Activity Who provides governance for SCIFs? For each question, select the best answer. Then check your answers in the Answer Key at the end of this. 1) Who provides construction and security requirements for SCIFs? Director of National Intelligence (DNI) Central Intelligence Agency (CIA) Defense Intelligence Agency (DIA) Department of Defense (DoD) 2) Who provides accreditation for DoD SCIFs? Director of National Intelligence (DNI) Central Intelligence Agency (CIA) Defense Intelligence Agency (DIA) Page 7

Lesson 2: SCI Fundamentals SCI Policy and Guidance Documents 1. Guidance Overview Let s look at a brief overview of the policies that guide your actions in protecting Sensitive Compartmented Information. In 1981, the President issued Executive Order 12333, United States Intelligence Activities, which established the role of Senior Officials of the Intelligence Community (SOICs) and designated the DNI as the head of the IC for intelligence matters related to national security. In 2008, the President issued Executive Order 13470, further amendment to Executive Order 12333, which changed the SOIC role to Head of an Intelligence Community Element, or HICE. Subsequently, the DNI issued several Intelligence Community Directives (ICDs) and Intelligence Community Policy Guidance documents (ICPGs) which provide security policy for the protection of national intelligence as well as the personnel security requirements for access to SCI and SCIFs and physical and technical security requirements for SCIFs. To see the ICDs or ICPGs, you may visit http://www.dni.gov/electronic_reading_room.htm. In addition, the DoD issued guidance that prescribes security policy and procedures for the protection, use, and dissemination of SCI within DoD SCIFs. The Department of the Army issued a regulation that implements DoD security policies and delegates approval authority for the establishment of SCIFs. 2. Job Aid Originator Key Guidance Documentation Description Executive Branch Executive Order (EO) 12333 United States Intelligence Activities 4 Dec 1981 (as amended by Executive Orders 13284 (2003), 13355 (2004) and 13470 (2008) This order established the Senior Officials of the Intelligence Community (SOICs), now referred to as Head of an Intelligence Community Element (HICE) per E.O. 13470, as the authority within their military departments or agencies to protect intelligence and intelligence sources and methods and designated the Director of National Intelligence (DNI) as the head of the Intelligence Community for intelligence matters related to national security. Page 8

Lesson 2: SCI Fundamentals Originator Key Guidance Documentation Description Intelligence Community (IC) ICD 700 Protection of National Intelligence 21 Sep 2007 ICD 704 Personnel Security (previously DCID 6/4) 1 October 2008 ICPG 704.1 Personnel Security Investigative Standards and Procedures Governing Eligibility for Access to Sensitive Compartmented Information and Other Controlled Access Program Information 2 October 2008 ICPG 704.2 Personnel Security Adjudicative Guidelines for Determining Eligibility for Access to Sensitive Compartmented Information and Other Controlled Access Program Information 2 October 2008 This guidance established the DNI security policy to protect national intelligence, and DNI s responsibilities for oversight and direction of IC security programs and activities. It also described the roles and responsibilities of the Senior Officials of the Intelligence Community (SOICs), now referred to as Head of an Intelligence Community Element (HICE) per E.O. 13470. This guidance established the DNI personnel security policy governing eligibility for access to SCI and information protected within other Controlled Access Programs. This guidance established the investigative standards used to conduct National Agency Check with Law and Credit (NACLC), Single Scope Background Investigations (SSBI), and periodic reinvestigations (PR) for access to SCI and information protected within other Controlled Access Programs. This guidance established the adjudicative guidelines used in determining one s eligibility for access to SCI and information protected within other Controlled Access Programs. Page 9

Lesson 2: SCI Fundamentals Originator Key Guidance Documentation Description ICPG 704.3 Denial or Revocation of Access to Sensitive Compartmented Information, Other Controlled Access Program Information, and Appeals Processes This guidance established the process one may go through to appeal the denial or revocation of access to SCI and information protected within other Controlled Access Programs. Intelligence Community (IC) 2 October 2008 ICPG 704.4 Reciprocity of Personnel Security Clearance and Access Determinations 2 October 2008 ICPG 704.5 Intelligence Community Personnel Security Database Scattered Castles 2 October 2008 This guidance established that heads of IC elements must accept investigations, security clearances and access determinations made by other IC elements within the past seven years as the basis for initial or continuing access to SCI or information protected within other Controlled Access Programs. This guidance mandated the recognition and use of the Scattered Castles (SC) database, or successor database, as the IC s authoritative personnel security repository for verifying personnel security access approvals regarding SCI and other Controlled Access Programs, visit certifications, and documented exceptions to personnel security standards. Page 10

Lesson 2: SCI Fundamentals Originator Key Guidance Documentation Description ICD 705 Sensitive Compartmented Information Facilities 26 May 2010 ICD 705-1 Physical and Technical Security Standards for Sensitive Compartmented Facilities 17 Sep 2010 This Directive establishes that all Intelligence Community (IC) Sensitive Compartmented Information Facilities (SCIF) shall comply with uniform IC physical and technical security requirements (hereafter "uniform security requirements"). This Directive is designed to ensure reciprocal use of SCIFs in the IC. This Directive applies to all facilities accredited by IC elements where SCI is processed, stored, used, or discussed. This Intelligence Community Standard sets forth the physical and technical security standards that apply to all Sensitive Compartmented Information Facilities (SCIF), including existing and new construction, and renovation of SCIFs for reciprocal use by all IC elements and to enable information sharing to the greatest extent possible. This standard facilitates the protection of SCI, including protection against compromising emanations, inadvertent observation or overhearing, disclosure by unauthorized persons, forced entry, and the detection of surreptitious and covert entry. The Assistant Deputy Director of National Intelligence for Security (ADDNI/SEC) shall consult with IC elements, develop and establish technical specifications to implement SCIF standards that include descriptions of best practices, and review and update the IC Tech Spec on an ongoing basis. Page 11

Lesson 2: SCI Fundamentals Originator Key Guidance Documentation Description Department of Defense (DoD) ICS 705-2 Standards for the Accreditation and Reciprocal Use of Sensitive Compartmented Information Facilities 17 Sep 2010 IC Tech Spec for ICD/ICS 705 Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities 5 May 2011 DoDI 5200.01 Incorporating Change 1 DoD Information Security Program and Protection of Sensitive Compartmented Information 9 Oct 2008 Incorporating Change 1, June 13, 2011 This Intelligence Community Standard sets forth the criteria that apply to the accreditation of Sensitive Compartmented Information Facilities (SCIF) to enable reciprocal use by Intelligence Community (IC) elements and to facilitate information sharing to the greatest extent possible. Sets forth the physical and technical security specifications and best practices for meeting standards of ICS 705-1. This document is the implementing specification for ICD 705 and ICS 705-2 and supersedes DCID 6/9. This instruction updated policy and assigned responsibilities to DIA to inspect and accredit DoD SCIFs for the handling, processing, storage, and discussion of SCI. Page 12

Lesson 2: SCI Fundamentals Originator Key Guidance Documentation Description DoDM 5105.21, Volume 1 Sensitive Compartmented Information (SCI) Administrative Security Manual: Administration of Information and Information Systems Security 19 October 2012 DoD Manual 5105.21, Volume 2 Sensitive Compartmented Information (SCI) Administrative Security Manual: Administration of Physical Security, Visitor Control, and Technical Security 19 October 2012 DoD Manual 5105.21, Volume 3 Sensitive Compartmented Information (SCI) Administrative Security Manual: Administration of Personnel Security, Industrial Security, and Special Activities This Manual is composed of several volumes, each containing its own purpose, and reissues DoD Manual 5105.21- M-1. The purpose of the overall Manual, in accordance with the authority in DoD Directive 5143.01, is to implement policy established in DoD Instruction 5200.01, and Director of Central Intelligence Directive 6/1 for the execution and administration of the DoD SCI program. It assigns responsibilities and prescribes procedures for the implementation of Director of Central Intelligence and Director of National Intelligence (DNI) policies for SCI. 19 October 2012 Department of the Army AR 380-28 Department of the Army SCI Security System 1 Nov 1991 This regulation implements DoD security policies and delegates approval authority for the establishment of SCIFs (Concept Approval) to the Senior Commander or SIO at the Army Command (ACOM), Army Service Component (ASCC), and Direct Reporting Unit (DRU) level. Page 13

Lesson 2: SCI Fundamentals Originator Key Guidance Documentation Description AR 10-87 Army Commands, Army Service Component Command and Direct Reporting Units 4 Sep 2007 This regulation prescribes the missions, functions, and command and staff relationships with higher, collateral headquarters, theater-level support commands, and agencies in the Department of the Army (DA) for Army Commands (ACOMs), Army Service Component (ASCCs), and Direct Reporting Units (DRUs). SCI Nondisclosure Statement 1. Purpose As you will recall, in order to work in a SCIF and have access to SCI, you went through a pre-screening process with an SSO or SSR. Once approved for SCI access, you went through an indoctrination process with the SSO or SSR during which you were required to sign an SCI Nondisclosure Statement (NdS). The SCI NdS is a contract between you and the U.S. Government in which you made a lifelong commitment to protect U.S. Government classified intelligence information. In just a moment, we ll review the NdS that you signed in more detail. SSOs and SSRs should take a moment to review the steps of the pre-screening and indoctrination processes below. Page 14

Lesson 2: SCI Fundamentals NOTE: The information in the box below is provided for the benefit of SSOs and SSRs. For additional information on investigations and adjudications, refer to the Personnel Security web-based training course offered by the DSS Center for Development of Security Excellence. Pre-Screening Process Guidelines for conducting personal screening interviews: Prepare for interview by reviewing individual s records and investigative forms. Understand that questions you ask must be relevant to security determination. Advise individual o About the purpose of the interview o That you are not affiliated with any investigative or law enforcement agency o That he/she is not suspected of any wrongdoing o That interview is voluntary Have individual sign the SCI Pre-Screening Interview acknowledgement. Provide individual Privacy Act Advisement. Ask Pre-Screening Interview questions. Offer individual opportunity to provide additional information. In personnel security files, keep justifications for SCI access and approvals or disapprovals for two years after accountability ceases; does not apply to contractors. Page 15

Lesson 2: SCI Fundamentals NOTE: The information in the box below is provided for the benefit of SSOs and SSRs. Indoctrination is the instructions an individual receives prior to receiving access to an SCI system or program. The instructions convey the unique nature, unusual sensitivity, and special security safeguards and practices for SCI handling, particularly the necessity to protect sensitive sources and methods. Indoctrination Process Guidelines for conducting indoctrinations: Provide individual Pre-Nondisclosure Execution briefing on protecting SCI. Have individual read E.O. 13526 and the SCI Nondisclosure Statement (NdS), DD Form 1847-1. Provide individual opportunity to express any reservations concerning the execution of the SCI NdS. If no reservations, have individual complete the SCI NdS and sign it in front of a witness, who also signs it. The SCI NdS must be accepted for the Government by a military member, Government civilian personnel, and by contractors, consultants, or non-government personnel. Classify the SCI NdS, as required. Provide copy of the SCI NdS to individual, if requested. Populate the NdS date in JPAS on the date it was signed by the individual. The Investigative Records Repository, IAMG-CICIRRH, 4552 Pike Road, Fort Meade, MD 20755 is responsible for retaining in a retrievable manner the original NdS for at least 70 years or until death of the individual. Indoctrinate individual on SCI access; show approved Indoctrination videos for the appropriate SCI compartments. Have individual sign an Indoctrination Memorandum, DD Form 1847. Note: Once a HICE has determined that an individual is ICD 704 eligible without waiver and is currently briefed into at least one SCI program, the individual may be approved for additional accesses by any Senior Intelligence Officer (SIO) without further security adjudication. 2. Details Now let s review the details of the SCI NdS that you signed. Sensitive Compartmented Information Nondisclosure Statement Purpose: Lifelong commitment from you to protect U.S.G. classified intelligence information. Paragraph 1 Accepting agreement to protect SCI You accepted the agreement to protect SCI and understand that a special confidence and trust was placed in you by the U.S. Government. Page 16

Lesson 2: SCI Fundamentals Sensitive Compartmented Information Nondisclosure Statement Paragraph 2 Acknowledging SCI Indoctrination You acknowledged that you received a security indoctrination concerning the nature and protection of SCI, including the procedures to be followed regarding disclosure of SCI information. Paragraph 3 Avoiding unauthorized disclosures You acknowledged that you were advised that mishandling SCI could cause irreparable harm to the United States and you are obligated not to disclose SCI to anyone who is not authorized to receive it. Paragraph 4 Public release requirements You agreed to submit for security review to the department or agency that last authorized your SCI access any information you prepare for public disclosure that contains or might contain or relate to SCI. Paragraph 5 30-day Government response You acknowledged that you must allow the department or agency to have up to 30 days to approve or deny your request for public disclosure. Paragraph 6 Consequences of breach of agreement You acknowledged that any breach of this Statement might result in the termination of your SCI access and your employment as well as prosecution of you under the U.S. criminal laws. Paragraph 7 Government action for breach of agreement You acknowledged that the U.S. Government might seek any remedy available to enforce this agreement including bringing action against you in which you would be responsible for court costs and attorneys fees if you lost such action. Page 17

Lesson 2: SCI Fundamentals Sensitive Compartmented Information Nondisclosure Statement Paragraph 8 SCI is USG property You acknowledged that SCI is and always will be the property of the U.S. Government. Paragraph 9 Agreement is forever You acknowledged that this agreement will last forever, unless you are released in writing by an authorized representative of the department or agency that last granted you with access to SCI. Paragraph 10 Severable provisions in agreement You acknowledged that there are severable provisions in this agreement but that if a court should find any provision of this agreement to be unenforceable, all other provisions of this agreement will remain in full force. Paragraph 11 Whistleblower protection You acknowledged that there are laws and statutes that protect you such as the Whistleblowers Protection Act that do not conflict with this agreement. Paragraph 12 Laws protecting national security information You acknowledged that you read this agreement, that your questions were answered, and that the laws and statutes referenced in paragraph 12 were made available to you to read, if you wished to read them. Paragraph 13 Fate of ill gotten gains You agreed that anything you gained from unauthorized disclosure of SCI would become the property of the United States Government. Paragraph 14 Agreement in conformance with U.S. Law You acknowledged that this agreement is in conformance with U.S. laws. Page 18

Lesson 2: SCI Fundamentals Sensitive Compartmented Information Nondisclosure Statement Paragraph 15 Signing agreement without mental reservation You acknowledged that you made this agreement without any mental reservation or purpose of evasion. The SCI NdS that you signed is retained in your personnel security file along with several other documents. SSOs and SSRs should take a moment to review what must be retained for an individual who has had or has access to SCI. NOTE: The information in the box below is provided for the benefit of SSOs and SSRs. Personnel Security Files SSOs are required to maintain certain information in personnel security files for each SCIindoctrinated person. Valid ICD 704 authority SCI indoctrination information SCI debrief DD Form 1847-1 Other security personnel action or defensive security briefings and memoranda Reports: derogatory information/changes in personal status Reports: personal screening interview/foreign travel and contacts Justifications for SCI access: approvals/ disapprovals All but the last item shown here are to be maintained during the individual s assignment and for a minimum of 180 days after accountability of the individual ceases. Justifications for SCI access and approvals or disapprovals must be maintained in the personnel security files for two years after an individual s accountability ceases. However, this requirement does not apply to contractors. 3. Termination of SCI Access An individual will be denied further access to SCI when the need-to-know for SCI access has ceased, an individual s access to SCI is terminated for cause, or an individual retires or separates from the Federal Government. The responsibility for terminating access to SCI rests with the HICE or designee who granted the access. The SSO is responsible for accomplishing and reporting the debrief action and canceling all current visitor certifications pertaining to the debriefed individual. SSOs and SSRs should take a moment to review the steps they must perform. A Head of an Intelligence Community element (HICE) is the head of an agency, organization, bureau, office, intelligence element, or activity within the IC, as defined in Section 3 of the National Security Act of 1947, as amended, and Executive Order 12333, as amended by 13470 signed 30 Jul 2008. Page 19

Lesson 2: SCI Fundamentals NOTE: The information in the box below is provided for the benefit of SSOs and SSRs. Debriefing Process Guidelines for debriefing Have the individual read the appropriate sections of Titles 18 and 50 of the United States Code (USC). Provide the individual a statement emphasizing the requirement for continued security for SCI. Have the individual provide an acknowledgement that he/she will report without delay to the FBI, or the department or agency, any attempt by an unauthorized person to solicit national security information. Remind the individual about the risks associated with foreign travel as defined in DCID 1/20 and the department or agency reporting requirements. Have the individual sign the Debriefing Memorandum. Page 20

Lesson 2: SCI Fundamentals SCI Nondisclosure Statement Review Activity 1 Which of the following statements are true about the SCI NdS and having access to SCI? Select True or False for each statement. Then check your answers in the Answer Key at the end of this. True False You are required to submit for security review to the department or agency that last authorized your SCI access any information you prepare for public disclosure that contains or might contain or relate to SCI. If a court should find any provision of the SCI NdS to be unenforceable, then all other provisions of the agreement will be unenforceable. The SCI agreement will last forever, unless you are released in writing by an authorized representative of the department or agency that last granted you with access to SCI. SCI Nondisclosure Statement Review Activity 2 Which of these statements are true about the SCI NdS and having access to SCI? Select True or False for each statement. Then check your answers in the Answer Key at the end of this. True False When you are authorized access to SCI, the U.S. Government places a special confidence and trust in you. Any breach of the SCI NdS could result in the termination of your SCI access and your employment as well as prosecution of you under the U.S. criminal laws. Page 21

Lesson 2: SCI Fundamentals Answer Key Intelligence Community Review Activity Who provides governance for SCIFs? For each question, select the best answer. 1) Who provides construction and security requirements for SCIFs? Director of National Intelligence (DNI) Central Intelligence Agency (CIA) Defense Intelligence Agency (DIA) Department of Defense (DoD) 2) Who provides accreditation for DoD SCIFs? Director of National Intelligence (DNI) Central Intelligence Agency (CIA) Defense Intelligence Agency (DIA) SCI Nondisclosure Statement Review Activity 1 Which of the following statements are true about the SCI NdS and having access to SCI? Select True or False for each statement. True False You are required to submit for security review to the department or agency that last authorized your SCI access any information you prepare for public disclosure that contains or might contain or relate to SCI. If a court should find any provision of the SCI NdS to be unenforceable, then all other provisions of the agreement will be unenforceable. The SCI agreement will last forever, unless you are released in writing by an authorized representative of the department or agency that last granted you with access to SCI. Page 22

Lesson 2: SCI Fundamentals SCI Nondisclosure Statement Review Activity 2 Which of the following statements are true about the SCI NdS and having access to SCI? Select True or False for each statement. True False When you are authorized access to SCI, the U.S. Government places a special confidence and trust in you. Any breach of the SCI NdS could result in the termination of your SCI access and your employment as well as prosecution of you under the U.S. criminal laws. Page 23

Course: Sensitive Compartmented Information (SCI) Refresher Lesson 3: SCI Control Systems and Markings Lesson Introduction 1. Objectives As you know, additional protection is provided to Sensitive Compartmented Information (SCI) through classification management and marking, above and beyond what is provided to classified information. In this lesson, you will review what classification management is and how intelligence is collected and then protected with SCI control systems and markings. This lesson also provides an overview of the SCI management tools you may use in your daily work with SCI. Here is the lesson objective: Identify classification markings and dissemination controls for SCI materials Classification Management 1. Overview We use classification management to determine the nature of information and assign proper classification markings, SCI control system markings, dissemination controls, and declassification instructions. 2. What Information is Protected as Classified Executive Order (E.O.) 13526 outlines eight categories of information that require classified protection. Classified national intelligence information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems, is the information we call SCI. 3. How Intelligence Information is Collected As you know, there are six basic intelligence sources or collection disciplines that gather intelligence using human sources such as diplomats or military attaches; through public sources such as the press and media; via verbal and nonverbal signals from land, sea, and satellite; using geographical references through imagery, mapping, satellites, and

Lesson 3: SCI Control Systems and Markings aircraft; by locating, identifying, and describing distinctive characteristics of targets; and from visual photography, radar sensors, or electro-optics. a. Human Intelligence (HUMINT) HUMINT, or Human Intelligence, is the collection of intelligence using human sources such as diplomats, military attachés, and even spies. This was the primary source before technical revolution. Methods include collection of photography, documents, and other material, debriefing of foreign nationals and U.S. citizens who travel abroad, and official contact with foreign governments. The CIA, DoD, Department of State, and FBI use HUMINT. b. Open-Source Intelligence (OSINT) OSINT, or Open-Source Intelligence, is the collection of intelligence through public sources. OSINT is broadly distributed throughout the IC. Major collectors of OSINT include DNI s Open Source Center (OSC) and the National Air and Space Intelligence Center. OSINT sources include: Press/media Conferences Internet Commercial databases Speeches Videos Articles Graphics Libraries Drawings Symposiums c. Signals Intelligence (SIGINT) SIGINT, or Signals Intelligence, is the collection of verbal and nonverbal signals from land, sea, and satellite. These signals are protected within the Communications Intelligence (COMINT) SCI control system. Categories of SIGINT include Communications Intelligence (COMINT), Electronic Intelligence (ELINT), and Foreign Instrumentation Signals (FISINT). National Security Agency (NSA) is responsible for the collecting, processing, and reporting of SIGINT. d. Geospatial Intelligence (GEOINT) GEOINT, or Geospatial Intelligence, uses imagery, imagery intelligence, or geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the earth. GEOINT enhances the situational awareness of policy makers, military planners, and military operators. Page 2

Lesson 3: SCI Control Systems and Markings National Geospatial Intelligence Agency (NGA) is responsible for the collecting, processing, and reporting of GEOINT. e. Measurement and Signature Intelligence (MASINT) MASINT, or Measurement and Signature Intelligence, is technically derived intelligence data other than imagery and signals intelligence. Data results in intelligence that locates, identifies, or describes distinctive characteristics of targets. Examples of MASINT are distinctive radar signatures of specific aircraft systems and chemical composition of air and water samples. The Defense Intelligence Agency (DIA) is responsible for the collecting, processing, and reporting of MASINT. MASINT includes the following sciences: Nuclear Acoustics Optical Seismic Radio frequency Material f. Imagery Intelligence (IMINT) IMINT, or Imagery Intelligence, includes representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media. IMINT is derived from visual photography, radar sensors, and electrooptics. The National Geospatial Intelligence Agency (NGA) is responsible for the collecting, processing, exploitation, dissemination, archiving, and retrieval of IMINT. SCI Control Systems 1. Overview SCI control systems are additional measures used to protect intelligence sources and methods or analytical procedures that are beyond those used to protect non-sci classified information. 2. Types Take a moment to review the types of SCI control systems. The current SCI control systems are HCS, TALENT KEYHOLE and SI. In addition, there are three legacy SCI control systems you may still encounter. These are BYEMAN, HUMINT, and COMINT. For recent changes to SCI control systems, reference the Joint Worldwide Intelligence Communications System (JWICS). Page 3

Lesson 3: SCI Control Systems and Markings Current SCI Control Systems HCS (HCS) HCS is designed to protect human intelligence. TALENT KEYHOLE (TK) SI TALENT KEYHOLE (TK) was established by the Director of Central Intelligence (DCI) for products from satellite reconnaissance in 1960. TK protects the most sensitive details of satellite collection capabilities and derived information which is imagery intelligence. The Director of National Intelligence (DNI) has administrative oversight of the TK control system. Information within the TK compartment is managed by the originating agency. Possible originating agencies are NSA, NRO, NGA, CIA, and DIA. SI is designed to protect signals intelligence including communications and electronics intelligence. It was formerly named for the first product it afforded protection, which was COMINT (Communications Intelligence). Now it is called the Special Intelligence (SI) Control System. SI information is only available to holders of SI access approval and is managed by the Director of the National Security Agency (D/NSA). Legacy SCI Control Systems BYEMAN (BYE) HUMINT COMINT The BYEMAN control system was retired on 20 May 2005. The word BYEMAN and the trigraph BYE are unclassified. All previous data protected in the BYE control system, except BYE Special Handling, will be protected in the TALENT KEYHOLE (TK) control system. BYE Special Handling is now protected in compartments in the new NRO control system, RESERVE. HUMINT was registered as the marking title for the HUMINT SCI control system. Since then, there has been confusion between collateral HUMINT and HUMINT in the SCI category. So HUMINT was retired as an SCI category. When creating new documents, if HUMINT is present in the SCI category, change it to HCS. COMINT is a legacy control system marking that was designed to protect signals intelligence including communications and electronics intelligence. It was named for the first product it afforded protection, which was COMINT (Communications Intelligence). Now it is called the Special Intelligence (SI) Control System. Page 4

Lesson 3: SCI Control Systems and Markings Anatomy of a Classified Document 1. Overview Take a moment to review the hierarchy of classification markings found in the banner line on the top and bottom of a classified document. U.S. Classification Non-U.S. Classification Joint Classification SCI Control System Special Access Program Foreign Government Information Markings Dissemination Controls Non-Intelligence Community Markings Also, review how these markings are formatted on a classified document. CLASSIFICATION // SCI // SAP // FGI // Dissemination // Non-IC Now take a look at this example of classification markings in the appropriate format. TOP SECRET // TK // SAR-REDHAT //RD-CNWDI// FGI GBR // REL TO USA // SPECAT // These markings show that the classified document is TOP SECRET, is part of the TALENT KEYHOLE SCI control system, is part of the REDHAT Special Access Program, contains Atomic Energy information, is furnished to the United States by Great Britain, is releasable only to the United States and Great Britain, and has a non- Intelligence Community marking of Special Category. SCI Classification Markings U.S. Classification U.S. Classification markings are used on U.S. classified materials that represent the amount of damage that could be caused to U.S. national security if disclosed to an unauthorized person. U.S. Classification Markings are: TOP SECRET SECRET CONFIDENTIAL UNCLASSIFIED Page 5

Lesson 3: SCI Control Systems and Markings SCI Classification Markings Non-U.S. Classification Non-U.S. Classification markings are used on documents consisting entirely of foreign information provided by other countries and international organizations. These markings must be preceded by the foreign country trigraph or foreign organization tetragraph. Non-U.S. Classification Markings are: TOP SECRET SECRET CONFIDENTIAL RESTRICTED UNCLASSIFIED Example of foreign country non-u.s. classification marking: //DEU CONFIDENTIAL Example of foreign organization non-u.s. classification marking: //NATO SECRET Joint Classification Joint Classification markings are used on information that is jointly owned and/or produced by more than one country and/or international organization. Example of Joint Classification marking: //JOINT SECRET CAN GBR USA SCI Control System Special Access Program Foreign Government Information Markings Dissemination Controls Non-Intelligence Community Markings AEA SCI Control System markings indicate to which SCI Control System the information belongs. Special Access Program markings denote classified information that requires extraordinary protection as allowed by E.O. 13526, as amended. Foreign Government Information markings are used to indicate that foreign government information is included in U.S. produced documents. Use the foreign country trigraph after FGI. Dissemination controls are used to indicate to whom information may be released. Non-Intelligence Community markings are used by entities outside of the IC. Atomic Energy Act (AEA) information markings are used in US products to denote the presence of classified Restricted Data, Formerly Restricted Data, and/or Transclassified Foreign Nuclear Information (TFNI). Must have RD Warning and CNWDI Statement when used. Page 6

Lesson 3: SCI Control Systems and Markings 2. SCI Control System Markings As you know, there are several SCI control system markings that correspond to the SCI control systems you just reviewed. Some SCI control system markings are currently in use and some are legacy SCI control system markings that you may still see on older SCI documents. SCI Control System Marking (Current) HCS SI G TK HCS is the SCI control system marking that corresponds to the HCS SCI control system which is designed to protect human intelligence. SI is designed to protect signals intelligence including communications and electronics intelligence. It was formerly named for the first product it afforded protection, which was COMINT (Communications Intelligence). Now it is called the Special Intelligence (SI) Control System. SI information is only available to holders of SI access approval and is managed by the Director of the National Security Agency (D/NSA). G is an SCI control system marking that corresponds to the GAMMA SCI subcontrol system. TK is the SCI control system marking that corresponds to the TALENT KEYHOLE SCI control system. TALENT KEYHOLE was established by the Director of Central Intelligence (DCI) for products from satellite reconnaissance in 1960. TK protects the most sensitive details of satellite collection capabilities and derived information. The Director of National Intelligence (DNI) has administrative oversight of the TK control system. Information within the TK compartment is managed by the originating agency. Possible originating agencies are NSA, NRO, NGA, CIA, and DIA. SCI Control System Marking (Legacy) BYE HUMINT BYE is the SCI control system marking that corresponds to the BYEMAN SCI control system. The BYEMAN control system was retired on 20 May 2005. The word BYEMAN and the trigraph BYE are unclassified. All previous data protected in the BYE control system, except BYE Special Handling, will be protected in the TALENT KEYHOLE (TK) control system. BYE Special Handling is now protected in compartments in the new NRO control system, RESERVE. HUMINT was registered as the marking title for the HUMINT SCI control system. Since then, there has been confusion between collateral HUMINT and HUMINT in the SCI category. So HUMINT was retired as an SCI category. When creating new documents, if HUMINT is present in the SCI category, change it to HCS. Page 7