Test your Knowledge with Problems From Chapter 6 DoD Security Clearance and Contracts Guidebook
1. As a document custodian, your responsibilities include receiving and inspecting documents for proper classification markings. You receive a properly wrapped classified document from a Government agency with the following characteristics: • Contains UNCLASSIFIED, CONFIDENTIAL and SECRET information
• Created on June 21, 2007
• Reason for Classification is 1.4 (a)
• Contains 400 pages
• Classified by: Jon Wain, RBP, 1022 DDMA
• Classification guidance is found in the Gravy Security Classification Guide
1a. Based on the above description, what are the major areas you would expect to see classification markings?
1b. Write out the “By:” line describing who classified the material, reason for classification and the declassify on date.
1c. Which classification marking would you expect to find on the overall marking?
2. Your security team is conducting an annual inventory of your company’s classified holdings. In the course of the inventory, they come across a 30 page document entitled Weather Capabilities (U). The document is slightly worn but otherwise in good condition. Your team notifies you that a page is loose and that the document needs to be repaired. They also ask your opinion on some findings concerning internal illustrations;
none of the graphs, pictures or containers contains classification markings. Additional information for the document follows:
• Created in 1986
• Contains the following marking on the first page:
• Classified by: RBP, 1022 DMDA
• Reason for classification: Military capabilities
• Declassify on: OADR
• Contains overall classification of CONFIDENTIAL.
2a. What would you direct your team to do concerning the portion markings?
3. An engineer is about to print a report based on classified information. This report is a summary of information found in two different documents. As you prepare to help her correctly mark the derivative document you take into consideration the two source documents that she has provided. The source documents are the same as example questions 1 and 2.
3a. The derived document contains information classified SECRET, how would the “Classified by:” line be filled out?
3b. What should be put on the “Reason for classification:” line?
3c. What would be the duration of classification?
4. You are making the rounds of your security team’s area and overhear a heated discussion between your team members and a technical writer. In order to diffuse the situation, you politely interrupt the conversation and ask the technical writer if you can be of any help. He informs you that “your” security specialist
has rejected acceptance of the document based on classification marking errors. He states that it is a good product and no one would notice the mistake anyway. What would you say to him?
5. A program manager knocks on your door and asks if you have a moment for something important. He asks you to take a walk with him to a secure area where he shows you a piece of hardware. The object is small enough to fit in your hand. You notice a commercial CONFIDENTIAL label; the kind that a manufacturer might install at the factory. The manager lets you know that he has been informed that the object is not classified at all, but that the manufacturer installed the labels as classified material would be added at a later date. The program manager would like to bring the item to an unclassified meeting seeing that “it’s not classified anyway.” You notice that the object is well worn and does not look new at all.
5a. Where can you go to discover whether or not the item is classified?
5b. Are there any other sources?
5c. After speaking with the right people and consulting the authoritative documents, you are now more confused than ever. You decide to challenge the classification to seek the clarification you need to properly protect the item. Describe the process you would employ.
Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM
No comments:
Post a Comment