Classification | Declassification | Safeguarding & Identifying Threats | Reporting CI & Threat Info | Project Specific Requirements |
---|---|---|---|---|
What is Confidential Classification
Release of this level of classified information could result in damage to national security.
|
What is a Downgrading
This is the process in which information is moved to a lower classification when the information no longer requires protection in the interest of national security.
|
Who are Custodians
People who are in possesion of, or who are otherwise charged with safeguarding classified information.
|
Who is Dawn Hagen
This is the person you would report any NON-IMMINENT threats to.
|
What is Locking Your Computer
This security measure should be used anytime you leave your computer.
|
What is Secret Classification
Release of this level of classified information could result in serious damage to national security.
|
What is Declassification
This occurs when a document no longers needs classified protection.
|
What is your head, your hands, and an approved container
These are the only three authorized places you can store classified information.
|
What is the Defense Hotline
You would contact this agency for any threats to national security.
|
What is CAC Card
This security card is used to access many of the tools needed to do your job.
|
What is Top Secret Classification
Release of this level of classified information could result in EXCEPTIONALLY GRAVE DAMAGE to national security.
|
What is Mandatory Declassification Review (MDR)
This process to declassify information is used when somoene from the public submits paperwork requesting the declassification and made available to the public.
|
What is Actual Compromise
This type of compromise occurs when we know for sure that an unauthorized individual had/has access to classified information
|
What is Espionage
The act of obtaining, delivering, transmitting, or communicating, or receiving information about the national defense with an intent to injure the US.
|
What is Secret Classification
This is the classification of our project.
|
What is Original and Derivative Classifiers
These 2 types of people are the only ones with the ability to classify information.
|
What is 25 years
It takes this many years for the Automatic Declassification System to declassify information.
|
What is Counter Intelligence (CI)
The process of indentifying, understanding, prioritizing, and counteracting foreign intelligence threats the United States faces.
|
What is Terrorism
The calculated use of unlawful violence or the threat of unlawful violence to install fear.
|
What is USB
You should never have anything other than your mouse, keyboard, or CAC reader plugged into this port.
|
What is Compilation
This process occures when combining two or more pieces of unclassified information, once combined could warrant protection as classified information.
|
What is Scheduled Declassification
This type of declassification occurs when the instructions assigned by the OCA are followed to declassify it.
|
What is Human Intelligence, Signals Intelligence, Imagery Intelligence, Open Source Intelligence, Measures and Signatures Intelligence
These are 5 information collection methodologies used by possible threats
|
What is a Individual Culpability Report
This report is used when a individual is responsible for a security violation.
|
What is Passwords
These should only be written down if they are locked in your file cabinet.
|