SPēD SFPC: All Areas – Flashcards
Unlock all answers in this set
Unlock answersquestion
Principle incident/ events required to be reported to DoD counterintelligence (CI) organizations
answer
espionage, sabotage, terrorism, cyber
question
Indicators of insider threats
answer
1. Failure to report overseas travel or contact with foreign nationals 2. Seeking to gain higher clearance or expand access outside the job scope 3. Engaging in classified conversations without a need to know 4. Working hours inconsistent with job assignment or insistence on working in private 5. Exploitable behavior traits 6. Repeated security violations 7. Attempting to enter areas not granted access to 8. Unexplainable affluence/living above one's means 9. Anomalies (adversary taking actions which indicate they are knowledgeable to information) 10. Illegal downloads of information/files
question
Elements that should be considered in identifying Critical Program Information
answer
Elements which if compromised could: 1. cause significant degradation in mission effectiveness, 2. shorten the expected combat-effective life of the system 3. reduce technological advantage 4. significantly alter program direction; or 5. enable an adversary to defeat, counter, copy, or reverseengineer the technology or capability.
question
asset, threat, vulnerability, risk, countermeasures
answer
Elements that a security professional should consider when assessing and managing risks to DoD assets
question
The three categories of Special Access Programs
answer
acquisition, intelligence, and operations and support
question
Three different types of threats to classified information
answer
Insider Threat, Foreign Intelligence Entities (FIE) and Cybersecurity Threat
question
The concept of an insider threat
answer
An employee who may represent a threat to national security. These threats encompass potential espionage, violent acts against the Government or the nation, and unauthorized disclosure of classified information, including the vast amounts of classified data available on interconnected United States Government computer networks and systems.
question
The purpose of the Foreign Visitor Program
answer
To track and approve access by a foreign entity to information that is classified; and to approve access by a foreign entity to information that is unclassified, related to a U.S. Government contract, or plant visits covered by ITAR.
question
Special Access Program
answer
A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level.
question
Enhanced security requirements for protecting Special Access Program (SAP) information
answer
Within Personnel Security: • Access Rosters; • Billet Structures (if required); • Indoctrination Agreement; • Clearance based on an appropriate investigation completed within the last 5 years; • Individual must materially contribute to the program in addition to having the need to know; • All individuals with access to SAP are subject to a random counterintelligence scope polygraph examination; • Polygraph examination, if approved by the DepSecDef, may be used as a mandatory access determination; • Tier review process; • Personnel must have a Secret or Top Secret clearance; • SF-86 must be current within one year; • Limited Access; • Waivers required for foreign cohabitants, spouses, and immediate family members. Within Industrial Security: The SecDef or DepSecDef can approve a carve-out provision to relieve Defense Security Service of industrial security oversight responsibilities. Within Physical Security: • Access Control; • Maintain a SAP Facility; • Access Roster; • All SAPs must have an unclassified nickname/ Codeword (optional). Within Information Security: • The use of HVSACO; • Transmission requirements (order of precedence).
question
Responsibilities of the Government SAP Security Officer/Contractor Program Security Officer (GSSO/ CPSO)
answer
From Revision 1 Department of Defense Overprint to the National Industrial Security Program Operating Manual Supplement - 1 April 2004: • Possess a personnel clearance and Program access at least equal to the highest level of Program classified information involved. • Provide security administration and management for his/her organization. • Ensure personnel processed for access to a SAP meet the prerequisite personnel clearance and/or investigative requirements specified. • Ensure adequate secure storage and work spaces. • Ensure strict adherence to the provisions of the NISPOM, its supplement, and the Overprint. • When required, establish and oversee a classified material control program for each SAP. • When required, conduct an annual inventory of accountable classified material. • When required, establish a SAPF. • Establish and oversee a visitor control program. • Monitor reproduction and/or duplication and destruction capability of SAP information • Ensure adherence to special communications capabilities within the SAPF. • Provide for initial Program indoctrination of employees after their access is approved; rebrief and debrief personnel as required. • Establish and oversee specialized procedures for the transmission of SAP material to and from Program elements • When required, ensure contractual specific security requirements such as TEMPEST Automated Information System (AIS), and Operations Security (OPSEC) are accomplished. • Establish security training and briefings specifically tailored to the unique requirements of the SAP.
question
The four Cognizant Security Agencies (CSAs)
answer
Department of Defense (DoD), Director of National Intelligence (DNI), Department of Energy (DoE), and the Nuclear Regulatory Commission (NRC).
question
Cognizant Security Agencies (CSA)s' role in the National Industrial Security Program (NISP).
answer
Establish an industrial security program to safeguard classified information under its jurisdiction.
question
Critical Program Information in DoD
answer
1. U.S. capability elements that contribute to the warfighter's advantage throughout the life cycle, which if compromised or subject to unauthorized disclosure, decrease the advantage. 2. Elements or components of a Research, Development, and Acquisition (RDA) program that, if compromised, could cause significant degradation in mission effectiveness; shorten the expected combat-effective life of the system; reduce technological advantage; significantly alter program direction; or enable an adversary to defeat, counter, copy, or reverse engineer the technology or capability. Includes information about applications, capabilities, processes and end-items. Includes elements or components critical to a military system or network mission effectiveness. Includes technology that would reduce the U.S. technological advantage if it came under foreign control.
question
Primary authorities governing foreign disclosure of classified military information
answer
1. Arms Export Control Act 2. National Security Decision Memorandum 119 3. National Disclosure Policy-1 4. International Traffic in Arms Regulation (ITAR) 5. E.O.s 12829, 13526 6. Bilateral Security Agreements 7. DoD 5220.22-M, "NISPOM,"
question
The purpose of the DD Form 254
answer
Convey security requirements, classification guidance and provide handling procedures for classified material received and/or generated on a classified contract.
question
Factors for determining whether U.S. companies are under Foreign Ownership, Control or Influence (FOCI)
answer
1. Record of economic and government espionage against the U.S. targets 2. Record of enforcement/engagement in unauthorized technology transfer 3. Type and sensitivity of the information that shall be accessed 4. The source, nature and extent of FOCI 5. Record of compliance with pertinent U.S. laws, regulations and contracts 6. Nature of bilateral & multilateral security & information exchange agreements 7. Ownership or control, in whole or part, by a foreign government
question
The purpose and the function of the Militarily Critical Technologies List (MCTL).
answer
1. Serves as a technical reference for the development and implementation of DoD technology, security policies on international transfers of defense-related goods, services, and technologies as administered by the Director, Defense Technology Security Administration (DTSA). 2. Formulation of export control proposals and export license review
question
Security Infraction
answer
This event cannot reasonably be expected to and does not result in the loss, compromise, or suspected compromise of classified information
question
DoD Manual 5200.01, Volumes 1-4
answer
The manual that governs the DoD Information Security Program
question
E.O. 13526
answer
The executive order that governs the DoD Information Security Program
question
32 CFR Parts 2001 & 2003, "Classified National Security Information; Final Rule"
answer
The Information Security Oversight Office (ISOO) document that governs the DoD Information Security Program
question
Security Violation
answer
An event that results in or could be expected to result in the loss or compromise of classified information
question
Unauthorized Disclosure
answer
Communication or physical transfer of classified or controlled unclassified information to an unauthorized recipient
question
SSBI
answer
Initial investigation for military, contractors, and civilians: · Special-Sensitive positions · Critical-Sensitive positions1 · LAA · Top Secret clearance eligibility · IT-I duties
question
ANACI
answer
Initial investigation for civilians: · Noncritical-Sensitive positions2 · Confidential and Secret clearance eligibility · IT-II duties
question
NACLC
answer
Initial National Agency Check with Law and Credit for military and contractors: · Secret or Confidential clearance eligibility · All military accessions and appointments · IT-II duties · IT-III duties (military only)
question
NACI
answer
National Agency Check with Inquiries for civilians and contractors: · Non-Sensitive positions · Low Risk · HSPD-12 Credentialing
question
NAC
answer
The fingerprint check portion of a PSI
question
The purpose of due process in Personnel Security Program (PSP)
answer
Ensures fairness by providing the subject the opportunity to appeal an unfavorable adjudicative determination
question
The key procedures for initiating Personnel Security Investigations (PSIs)
answer
1. Validate the need for an investigation 2. Initiate e-QIP 3. Review Personnel Security Questionnaire (PSQ) for completeness 4. Submit electronically to OPM
question
DoD position sensitivity types and their investigative requirements.
answer
1. Critical Sensitive 2. Non-Critical Sensitive 3. Non-Sensitive
question
Investigative requirement for a Critical- Sensitive position
answer
SSBI, SSBI-PR, or PPR
question
Investigative requirement for a Non-Critical Sensitive position
answer
ANACI or NACLC
question
Investigative requirement for a Non-Sensitive position
answer
NACI
question
Revocation
answer
The term when current security clearance eligibility determination is rescinded
question
Denial
answer
The term when an initial request for security clearance eligibility is not granted
question
SOR
answer
Statement of Reasons
question
What is the purpose of the Statement of Reasons (SOR)?
answer
The purpose of the SOR is to provide a comprehensive and detailed written explanation of why a preliminary unfavorable adjudicative determination was made.
question
The 13 Adjudicative Guidelines
answer
1. Allegiance to the United States 2. Foreign Influence 3. Foreign Preference 4. Sexual Behavior 5. Personal Conduct 6. Financial Considerations 7. Alcohol Consumption 8. Drug Involvement 9. Psychological Conditions 10. Criminal Conduct 11. Handling Protected Information 12. Outside Activities 13. Use of Information Technology Systems
question
Three different types of approved classified material storage areas.
answer
1. GSA-approved storage containers 2. Vaults (including modular vaults) 3. Open storage area (secure rooms, to include SCIFs and bulk storage areas)
question
Construction requirements for vault doors
answer
1. Constructed of metal 2. Hung on non-removable hinge pins or with interlocking leaves. 3. Equipped with a GSA-approved combination lock. 4. Emergency egress hardware (deadbolt or metal bar extending across width of door).
question
The purpose of intrusion detection systems
answer
To detect unauthorized penetration into a secured area
question
The purpose of perimeter barriers
answer
To define the physical limits of an installation, activity, or area, restrict, channel, impede access, or shield activities within the installation from immediate and direct observation
question
The purpose of an Antiterrorism Program
answer
Protect DoD personnel, their families, installations, facilities, information, and other material resources from terrorist acts
question
Force Protection Condition levels
answer
Normal, Alpha, Bravo, Charlie, Delta
question
The concept of security-in-depth
answer
Layered and complementary security controls sufficient to deter, detect, and document unauthorized entry and movement within an installation or facility.
question
e-QIP
answer
The system Mr. Smith needs to access when he needs to update his personal information on his Personnel Security Questionnaire for his re-investigation
question
Personnel Security Investigation
answer
The first phase of the security clearance process
question
JCAVS
answer
A security manager uses this system to communicate with the DoD CAF
question
JAMS
answer
This sub-system (used by adjudicators) and JCAVS make up the JPAS system
question
JPAS
answer
A DoD system of record for personnel security clearance information
question
Scattered Castles
answer
Intelligence Community (IC) Personnel Security Database that verifies personnel security access and visit certifications.
question
Personnel Security Investigation (PSI)
answer
The DoD uses this as the standard for the uniform collection of relevant and important background information about an individual.
question
Access
answer
PSIs are used to determine the eligibility of an individual for ___________ to classified information.
question
Acceptance
answer
PSIs are used to determine the eligibility of an individual for ___________ or retention to the armed forces.
question
Assignment
answer
PSIs are used to determine the eligibility of an individual for ___________ or retention to sensitive duties.
question
False
answer
True or False: The DoD CAF is the only authority who can grant an interim clearance.
question
DoD CAF responsibilities
answer
1. Making adjudicative decisions 2. The DoD CAF is a repository for investigative records 3. Initiating special investigations 4. The DoD CAF adjudicate by applying the whole person concept
question
Designation of Sensitive Duties
answer
Duties that have a great impact on National Security
question
Continuous Evaluation
answer
This is used to monitor employees for new information or changes that could affect their status.
question
Reinvestigation
answer
This is part of the Continuous Evaluation Program (CEP). It is done at certain intervals based on duties or access.
question
True
answer
True or False: Special access requirements are designed to provide an additional layer of security to some of our nation's most valuable assets.
question
False. Threats and vulnerabilities are related but distinct. Threats to national security exploit vulnerabilities.
answer
True or False: There is no difference between a threat and a vulnerability.
question
E.O. 12968
answer
The Executive Order (E.O.) that establishes a uniform Personnel Security Program
question
DoD 5200.2-R
answer
Implements and maintains the DoD personnel security policies and procedures
question
USD(I) Memorandum, August 30, 2006
answer
Defines the Adjudicative Guidelines
question
DCII
answer
This is a system of records of fraud investigations
question
SII
answer
This is a system of records of PSIs conducted by OPM
question
Scope
answer
This refers to when adjudicators must ensure that an investigation meets the minimum timeframe and element requirements before reviewing the investigation.
question
Administrative Judge
answer
During due process, military and civilian personnel may request an in-person appearance before this individual.
question
DOHA
answer
Administers due process for contractor personnel.
question
PSAB/Appeal Board
answer
This board makes the final appeal determination for all personnel
question
Termination Briefing
answer
This briefing is given when an individual's employment is terminated, clearance eligibility is withdrawn, or if the individual will be absent from duty for 60 days or more. It is also given to those who have been inadvertently exposed to classified information.
question
Foreign Travel Briefing
answer
This briefing that applies to cleared personnel who plan to travel in or through foreign countries, or attend meetings attended by representatives of other countries.
question
Refresher Briefing
answer
This briefing is presented annually to personnel who have access to classified information or assignment to sensitive duties.
question
What SAPs aim to achieve
answer
1. Protect technological breakthroughs 2. Cover exploitation of adversary vulnerabilities 3. Protect sensitive operational plans 4. Reduce intelligence on U.S. capabilities
question
Protection Level
answer
This communicates how the SAP is acknowledged and protected.
question
Acknowledged
answer
This protection level describes a SAP whose existence may be openly recognized. Its purpose may be identified. However, the details of the program (including its technologies, materials, and techniques) are classified as dictated by their vulnerability to exploitation and the risk of compromise. The funding is generally unclassified.
question
Unacknowledged
answer
This protection level describes a SAP whose existence and purpose are protected. The details, technologies, materials, and techniques are classified as dictated by their vulnerability to exploitation and the risk of compromise. The program funding is often classified, unacknowledged, or not directly linked to the program.
question
SAP Lifecycle
answer
1. Establishment (is extra protection warranted?) 2. Management and Administration (continued need? processed followed?) 3. Apportionment (proper measures in place? approval received) 4. Disestablishment (program no longer needed?)
question
Component-level SAP Central Offices
answer
Exist for each military component, the Joint Chiefs of Staff, Defense Advanced Research Projects Agency (DARPA), and Missile Defense Agency (MDA)
question
Special Access Program Oversight Committee (SAPOC)
answer
The final SAP approving body chaired by the Deputy Secretary of Defense
question
Senior Review Group (SRG)
answer
This group ensures there are no duplicative efforts across SAPs
question
DoD Special Access Central Office (SAPCO)
answer
DoD SAP legislative liaison that notifies Congress of SAP approval
question
Authorization, Appropriations, and Intelligence Congressional
answer
Congressional committees granted SAP access
question
OSD-level SAP Central Offices
answer
Exercise oversight authority for the specific SAP category under their purview.
question
PIE-FAO
answer
People, information, equipment, facilities, activities, and operations
question
Antiterrorism Officer
answer
This person is responsible for the installation's antiterrorism program
question
CI Support
answer
Responsible for providing valuable information on the capabilities, intentions, and threats of adversaries
question
OPSEC Officer
answer
This person analyzes threats to assets and their vulnerabilities
question
Security Officer
answer
This person is charged with management, implementation, and direction of all physical security programs
question
Law Enforcement
answer
Must be integrated into our intelligence gathering process so that they can be part of coordinating emergency responses and criminal incidents on a Federal installation
question
Criticality
answer
Determination based on an asset's importance to national security and effect of loss
question
Area Security
answer
Security is geared towards protecting an entire area of the installation or facility
question
Threat
answer
The intention and the capability of an adversary to undertake detrimental actions
question
Point Security
answer
Security focused on the resource itself
question
Effective Protective Barriers
answer
1. Steel barriers 2. Chain link fence 3. Barbed wire
question
Purpose of protective barriers
answer
1. Establishing boundaries 2. Protecting the facility 3. Stopping observation
question
Controlling access
answer
The establishment of a restricted area improves security by ______________ and providing additional layers of security.
question
True
answer
True or False: Site lighting is used to enable guard force personnel to observe activities inside or outside the installation
question
False
answer
True or False: Standby lighting is used when regular lighting is not available
question
Two-way radio
answer
Using these assists in security; however, there must always be back-up communication systems in addition to these
question
Intrusion Detection Systems
answer
This device sends a signal through wires when it has been triggered
question
Closed Circuit Televisions (CCTV)
answer
This system has a camera that captures a visual image, converts the image to a video signal, and transmits the image to a remote location
question
Automated access control systems
answer
This system allows one to be identified by their eye, handprint, or fingerprint
question
Common Access Card (CAC)
answer
This enables individuals to be able to authenticate themselves on security websites and securely log into computer systems
question
Mechanical combination lock
answer
Older style of lock; may be used for classified storage in certain cases
question
Combination padlock
answer
Lock that complies with UL Standard 768-Group 1
question
Electromechanical combination lock
answer
Lock that complies with FF-L-2740 series lock specification
question
Low security padlock
answer
Lock that has limited resistance to forced entry
question
SCIF
answer
A facility used by the intelligence community
question
GSA
answer
The governing authority to approve security containers
question
Secure rooms
answer
Areas designed and authorized for the open storage of classified information. These facilities are usually build to commercial construction standards and do not afford the extra security inherent with a vault.
question
Vaults
answer
Constructed to meet strict forcible entry standards, including reinforced concrete on all walls, ceiling, and floor, plus a hardened steel door
question
High terrorist threat level
answer
The terrorist threat level indicating anti-U.S. terrorists are operationally active and use large casualty-producing attacks as their preferred method of operation. There is a substantial DoD presence, and the operating environment favors the terrorist.
question
Low terrorist threat level
answer
The terrorist threat level indicating no terrorist group is detected or the terrorist group in non-threatening
question
Significant terrorist threat level
answer
The terrorist threat level indicating anti-U.S. terrorists are present and attack personnel as their preferred method of operation, or a group uses large casualty-producing attacks as their preferred method but has limited operational activity. The operating environment is neutral.
question
Moderate terrorist threat level
answer
The terrorist threat level indicating terrorists are present but there are no indications of anti-U.S. activity. The operating environment favors the host nation or the U.S.
question
Physical security plan
answer
At a minimum, these should include special and general guard orders, access and material control, protective barrier lighting systems, locks, and Intrusion Detection Systems (IDS)
question
Industrial
answer
Much of U.S. classified information originates within this environment
question
Defense Security Service
answer
Security compliance is overseen by this organization if a contractor works at his/her own facility
question
Installation
answer
A contractor must adhere to the security rules of the __________ commander when working at a government installation
question
NISP
answer
The program that covers protection of classified information by government contractors
question
FSO responsibilities
answer
1. Ensure compliance with the NISP 2. Follow NISPOM guidelines 3. Provide training for cleared individuals
question
Chapter 8 of the NISPOM
answer
If you are a government contractor working on a contractor-owned system at a contractor facility, you must follow the security provisions of this reference
question
True
answer
True or False: A SAP can retain security cognizance if necessary.
question
Contracting Officer
answer
A government employee with the authority to enter into, administer, and/or terminate contracts and make related determinations and findings
question
COTR
answer
This government employee is a subject matter expert who has regular contact with the contractor
question
Statement of Work (SOW)
answer
The document that outlines in detail what will be required to complete a contract
question
DD Form 441
answer
The document that establishes the government's authority to review the contractor's security program to ensure compliance
question
DD Form 254
answer
The form a contractor could use to determine if classified storage is required, and at what level
question
Same
answer
A cleared individual can only have access at the _______ level as the facility clearance
question
JPAS
answer
For the purpose of a visit to another cleared facility, a clearance can be verified by looking in ________
question
Eligibility
answer
The issuance of ________ is the responsibility of the DoD CAF
question
Secret
answer
Unauthorized disclosure of this information could reasonably be expected to cause serious damage to our national security.
question
Top Secret
answer
Unauthorized disclosure of this information could reasonably be expected to cause exceptionally grave damage to our national security.
question
Confidential
answer
Unauthorized disclosure of this information could reasonably be expected to cause damage to our national security.
question
Derivative Classification
answer
This is defined as the incorporating, paraphrasing, restating, or generating in new form any information that is already classified.
question
Original Classification
answer
This is defined as an initial determination that information requires, in the interest of national security, protection against unauthorized disclosure.
question
Compilation
answer
This is defined as unclassified information or classified information (at a lower level) that when the information is combined or associated reveals additional factors that qualifies for classification.
question
Original Classification Authority
answer
The term used to identify individuals specifically authorized in writing to make initial classification decisions.
question
Security Classification Guides (SCG)
answer
This contains classification levels, special requirements and duration instructions for programs, projects, plans, etc.
question
Original Classification Process
answer
The six step process an OCA applies in making classification determinations
question
Declassification
answer
The authorized change in the status of information goes from classified information to unclassified information
question
Automatic declassification
answer
The declassification system where Permanently Valuable Historical records are declassified when they are 25 years old
question
Systematic declassification review
answer
The declassification system where information exempted from automatic declassification is reviewed for possible declassification
question
Mandatory Declassification Review (MDR)
answer
The declassification system where the public can ask for classified information be review for declassification and public release
question
Scheduled Declassification
answer
The declassification system where an OCA, at the time the information is originally classified, sets a date or event for declassification
question
Custodians
answer
People who are in possession of, or who are otherwise charged with safeguarding classified information
question
Options an OCA has when determining declassification
answer
Specific Date, Specific Event, or by the 50X1-HUM Exemption
question
The 25-year rule
answer
The process where records automatically become declassified after 25 years
question
Restricted Data and Formerly Restricted Data
answer
This type of information does not provide declassification instructions
question
Practices to follow when handling classified information
answer
1. Properly destroy preliminary drafts, worksheets, and other material after they have served their purpose 2. Use approved secure communications circuits for telephone conversations to discuss classified information 3. Follow proper procedures when copying classified information 4. Use security forms such as SF 701 and SF 702
question
SF 702
answer
Security Container Check Sheet, which is used to record the opening and closing of your security container
question
SF 701
answer
The Activity Security Checklist intended to verify that you did not accidentally leave classified materials unsecured, as well as, to ensure the area is safe and secure. The blank spaces can be utilized for additional warranted security and safety items, such as a block to remind personnel to complete tasks, such as turning off coffee pots.
question
Actual compromise
answer
An unauthorized disclosure of classified information
question
Neither confirm nor deny
answer
If classified information appears in the public media, DoD personnel must be careful not to make any statement of comment that would confirm the accuracy or verify the classified status of the information
question
Potential Compromise
answer
The possibility of compromise could exist but it is not known with certainty
question
DISA, Joint Interoperability Test Command (JITC)
answer
This organization maintains a register of certified security digital facsimiles
question
COMSEC
answer
The protection resulting from the measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications and to ensure the authenticity of such communications.
question
Insert the envelope into the outer envelope
answer
When the document has been sealed within a properly marked inner envelope you must...
question
DCS
answer
Defense Courier Service
question
Secret information
answer
This kind of information can be sent via USPS express only when it is the most effective means considering security, time, cost, and accountability.
question
Top Secret information
answer
This kind of information can never be sent via USPS
question
Methods to send hard copy Confidential information
answer
DCS, First Class mail, registered mail, and certified mail
question
True
answer
True or False: Hand carrying classified information should only be done as a last resort
question
False
answer
True or False: Anyone can determine the need for hand carrying classified information
question
True
answer
True or False: When someone is carrying classified information, written authorization is always required
question
DD Form 2501
answer
Courier Authorization Card
question
Microfiche destruction
answer
Burned or shredded to be destroyed. It can also be destroyed with chemicals that destroy the imprints.
question
Typewriter ribbon destruction
answer
Ribbons must be burned or shredded
question
Floppy disk destruction
answer
Must be burned, overwritten, or demagnetized
question
Document destruction
answer
Must be burned, shredded, or chemically decomposed of
question
Videotape destruction
answer
Must be burned, shredded, or demagnetized
question
Initial Orientation Briefing
answer
The initial briefing given to all personnel on the DoD Information Security Program
question
Homeland Security Presidential Directive 12 (HSPD-12)
answer
On August 27, 2004, President Bush signed this directive; Policy for a Common Identification Standard for Federal Employees and contractors. This requires government-wide development and implementation of a standard for secure and reliable forms of identification for Federal employees and contractors.
question
DoD 5200.08-R
answer
Physical Security Program regulation
question
DoD Instruction 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
answer
This document authorizes commanders to issue regulations for the protection or security of property and places under their command. This document also establishes guidelines to build consistent minimum standards for protecting DoD installations and resources.