Você está na página 1de 135

DEPARTMENT OF THE NAVY CENTER FOR INFORMATION DOMINANCE CORRY STATION 640 ROBERTS AVENUE PENSACOLA, FLORIDA 32511-5138

IN REPLY REFER TO CIDINST 5510.1 N2:DAJ 06 Apr 2007

CENTER FOR INFORMATION DOMINANCE (CID) CORRY STATION INSTRUCTION 5510.1

Subj: SECURITY MANUAL

Ref: (a) SECNAVINST 5510.36A (DoN Personnel Security Program) (b) SECNAVINST M-5510.36 (DoN Information Security Program) (c) Department of Defense (DoD) Directive 5105.21-M-1 (d) Navy Supplement (NAVSUP) to DoD Directive 5105.21-M-1 (e) Joint DoD ISS/Cryptologic SCI Information Systems Security Manual (f) OPNAVINST 5239.1 (g) CIDINST 5239.1 (Information Systems Security Plan) (h) OPNAVINST C5510.101D (NATO Security Procedures) (i) CIDDCSINST 3440.1 (Disaster Preparedness Plan) (j) Director Central Intelligence Directive (DCID) 6/9 (Physical Security Standards for Sensitive Compartmented Information (SCI) Facilities)

(k) Director Central Intelligence Directive (DCID) 6/4 (Personnel Security Standards and Procedures Governing Eligibility for Access to SCI) (l) CIDINST 5520.1H (Security Access Eligibility Reports)

Encl: (1) Command Security Manual

1. Purpose. To establish uniform policy and maximum effectiveness for the security of classified information and personnel security matters within the Center for Information Dominance domain.

2. Cancellation. CIDINST 5510.1I.

CIDINST 5510.1 06 Apr 2007

3. Scope. This instruction applies to all military and civilian personnel assigned within the CID Corry Station domain and all visitors to CID Corry Station domain classified information facilities.

K. R. HOOLEY

Copy to: (CIDINST 5216.2) List I, B3 List IIA

CIDINST 5510.1 06 Apr 2007

TABLE OF CONTENTS

IDENTIFICATION TITLE PAGE

CHAPTER 1 INTRODUCTION TO THE COMMAND SECURITY MANUAL 1-1

1. Purpose...................................... 1-1 2. Applicability................................ 1-1 3. Relationship to Other Directives............. 1-1

CHAPTER 2 PROGRAM MANAGEMENT 2-1

1. Basic Policy and Authority................... 2-1 2. Commanding Officer........................... 2-1 3. Command Security Manager/Special Security.... 2-2 Officer 4. Security Assistants.......................... 2-2 5. Emergency Plans.............................. 2-3 6. Security Service Agreements.................. 2-4

CHAPTER 3 SECURITY AWARENESS TRAINING AND EDUCATION 3-1 (SATE)

1. Purpose...................................... 3-1 2. Description of SATE Briefings................ 3-1 3. Security Debriefings......................... 3-3

4. SATE Team.................................... 3-3

CHAPTER 4 SECURITY VIOLATIONS AND COMPROMISES 4-1

1. Policy....................................... 4-1 2. Command Responsibilities..................... 4-1 3. Reporting Procedures......................... 4-2 Exhibit 1 SECURITY VIOLATION CHECKLIST 4-A

CHAPTER 5 CLASSIFICATION MANAGEMENT 5-1

1. Policy....................................... 5-1 2. Command Responsibilities..................... 5-1 3. Marking Documents............................ 5-1

i Enclosure (1)

CIDINST 5510.1 06 Apr 2007

CHAPTER 6 ACCOUNTING AND CONTROL OF CLASSIFIED MATERIAL 6-1

1. Policy....................................... 6-1 2. Classified Material Control Points........... 6-1 3. Accountability of SCI Classified Material.... 6-1 4. Accountability of COLLATERAL Classified Material..................................... 6-2 5. Accounting and Control of Magnetic Media..... 6-4 6. Excessive Classified Material Holdings....... 6-6

CHAPTER 7 VISUAL INFORMATION SERVICES 7-1

1. Policy....................................... 7-1 2. Printing and Visual Information Services..... 7-1 3. Audiovisual (AV) Work Requests............... 7-1 4. Procedures for COLLATERAL Classified Services 7-1 5. Procedures for SCI Classified Services....... 7-1 6. Procedures for unclassified Photographic Services..................................... 7-2 7. Procedures for Classified Photographic Services..................................... 7-2

CHAPTER 8 SAFEGUARDING AND STORAGE OF CLASSIFIED MATERIAL 8-1

1. Policy....................................... 8-1 2. Cipher Locks................................. 8-1

3. Security Container Records and Forms......... 8-2 4. Safe Replacement Scheme...................... 8-3 5. Rotation of Recall Personnel................. 8-3 6. Changing Security Container Combinations..... 8-3 7. Emergency Situation Procedures............... 8-4 8. Transfer of Security Containers.............. 8-5

EXHIBIT 2 MATERIAL INSPECTION CERTIFICATION MEMO 8-A

CHAPTER 9 TRANSMISSION AND TRANSPORTATION OF CLASSIFIED 9-1 MATERIAL

1. Policy....................................... 9-1 2. Mailing Classified Material.................. 9-1 3. Hand-Carrying Classified Material............ 9-1

ii Enclosure (1)

CIDINST 5510.1 06 Apr 2007

EXHIBIT 3 REQUIREMENT FOR COURIER IN TRAVEL STATUS 9-A EXHIBIT 4 COURIER BRIEFING 9-B EXHIBIT 5 DESIGNATED COURIER BRIEFING ACKNOWLEDGEMENT 9-C EXHIBIT 6 COURIER DESIGNATION LETTER 9-D

CHAPTER 10 DESTRUCTION OF CLASSIFIED MATERIAL 10-1

1. Policy....................................... 10-1 2. Methods of Destruction....................... 10-1 3. Procedures................................... 10-1 4. Duties and Responsibilities.................. 10-2

CHAPTER 11 ACCESS CONTROL TO CLASSIFIED TRAINING COMPOUNDS 11-1

1. Policy....................................... 11-1 2. Access Eligibility........................... 11-2 3. Need to Know................................. 11-3 4. Escorts...................................... 11-3 5. Two Person Rule (TPR)........................ 11-4 6. Description of Security ID Badges............ 11-5 7. Reciprocal Badge Agreement with NIOC Pensacola.................................... 11-5 8. General Regulations for Protecting Security ID Badges.................................... 11-6 9. Visitor and Conference Attendee Access....... 11-6 10. Contractor Access............................ 11-7

11. Security Badges Found Adrift................. 11-8 12. Lost and Misplaced Badges.................... 11-8 13. Procedures for Damaged Security Badges....... 11-8 14. Procedures for Accessing and Security SCIFS.. 11-8

EXHIBIT 7 ESCORT INDOCTRINATION SHEET 11-A

CHAPTER 12 PROHIBITED MATERIAL IN CLASSIFIED COMPOUNDS 12-1

1. Policy....................................... 12-1 2. Disposition of Confiscated Items............. 12-2 3. Non-Training Items........................... 12-3 CHAPTER 13 PERSONNEL SECURITY CLEARANCES 13-1

1. Policy....................................... 13-1 2. Eligibility and Access Procedures............ 13-2 3. Continuous Evaluation of Eligibility......... 13-2

iii Enclosure (1)

CIDINST 5510.1 06 Apr 2007

4. Termination of access to classified Material. 13-2 5. Revocation of Security Clearance............. 13-3

iv Enclosure (1)

CIDINST 5510.1 06 Apr 2007

CHAPTER 1 INTRODUCTION TO THE COMMAND SECURITY MANUAL

1. Purpose. This manual contains security policy and procedures for the protection, use, and dissemination of classified information. It supplements the Department of Defense (DoD), Director, Central Intelligence Directives (DCID), and Department of the Navy (DoN) regulations listed as references.

2. Applicability. This manual establishes coordinated policies for the security of classified information and personnel security matters as applied to Sensitive Compartmented Information (SCI) and Non-SCI (COLLATERAL) security programs. All military, civilian, and contractor personnel assigned within the CID Corry Station domain are responsible for compliance with this manual.

3. Relationship to Other Directives. Throughout this manual reference is made to various DoD/DoN directives that should be read for further guidance. Security policies and procedures represent MINIMUM SECURITY STANDARDS, which may be subject to more stringent requirements as conditions warrant. CID Corry Station domain elements outside Corry Station may develop supplemental instructions to address unique local circumstances or procedures, but may not establish lesser standards without prior approval from CID Corry Station Commanding Officer.

1-1 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

CHAPTER 2 PROGRAM MANAGEMENT

1. Basic Policy and Authority

a. In compliance with provisions of Executive Orders, public laws, National Security Council, DoD, and other security directives, the Secretary of the Navy (SECNAV) is responsible for establishing and maintaining an Information Security Program and a Personnel Security Program. References (a) and (b) provide guidelines for the Navy security programs related to classified COLLATERAL information.

b. SECDEF has designated the Director, Defense Intelligence Agency (DIR/DIA) as senior authority within the DoD for providing overall DoD policy for the security, use, and dissemination of SCI. Reference (c) contains the guidelines for DoD SCI Information and Personnel Security Programs.

(1) The Director of Naval Intelligence (DNI) is the Senior Official of the Intelligence Community (SOIC) for the Navy and has ultimate responsibility for promulgating the policies and procedures for SCI within the DoN.

(2) The DNI has delegated management oversight for the DoN SCI Security Program to the Office of Naval Intelligence (ONI) and has designated the Security Directorate ONI-5/CSM/SSO Navy as the Cognizant Security Authority (CSA) to exercise Navy SCI policy and procedures. Reference (d) is issued by ONI-5 provides Navy-unique program guidance.

(3) Commander, Naval Network Warfare Command (NNWC) is designated as the Senior Cryptologic Element (SCE) and oversees the day-to-day management of those portions of the DoN SCI security program relating to cryptologic operations and personnel. The National Security Agency (NSA) serves as the CSA for facilities engaged in Cryptologic operations and/or related activities. CID Corry Station domain Sensitive Compartmented Information Facilities (SCIF) are accredited by NSA and follow

NSA guidelines. The CID Corry Station SSO coordinates closely with NNWC SSO on matters relating to SCI information and personnel security.

2. Commanding Officer. The Commanding Officer has overall responsibility for the effective implementation and management of

2-1 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

the DoN Information and Personnel Security programs. In addition, as the Senior Cryptologic Officer (SCO), he also has overall managerial responsibility for the security, control and administration of the DoN SCI Program. The Commanding Officer is the Designated Approving Authority (DAA) for non-cryptologic systems and NSA is the DAA for National cryptologic systems. NNWC is designated as the Office of Primary Responsibility (OPR) for Navy cryptologic systems.

3. Command Security Manager/Special Security Officer (CSM/SSO). As the name implies, the CSM/SSO wears two hats. As CSM, the incumbent serves as principal advisor to the CID Corry Station Commanding Officer for all matters relating to the DoN COLLATERAL Information and Personnel Security Programs in support of SECNAV policy. As the SSO, he is responsible to the Commanding Officer for all SCI related matters in support of DNI and NNWC policy. The CSM/SSO exercises direct supervision, oversight, and coordination to ensure both the COLLATERAL and SCI security programs are managed effectively.

4. Security Assistants. Due to the scope and complexity of CID Corry Station security programs, specifically designated security assistants are assigned in support of the CSM/SSO. The CSM/SSO provides assistants with the proper guidance, coordination, and oversight necessary to properly perform their duties. The following is a list of security assistants and a brief description of their duties.

a. Top Secret Control Officer (TSCO). The TSCO is responsible for the control, storage, and dissemination of all COLLATERAL Top Secret material. Due to the limited amount of this material, the CSM/SSO serves as TSCO for the CID Corry Station and Corry Station Learning Site.

b. Information Systems Security Manager (ISSM).

(1) The Command ISSM is directly responsible for maintaining the security accreditation of Automated Information Systems (AIS). The ISSM must work closely with the CSM/SSO with regard to AIS procedures on COLLATERAL and SCI Local Area Networks (LAN). The Command ISSM is supported by designated, COLLATERAL-duty, Information Systems Security Officers (ISSO)

throughout the CID Corry Station domain.

2-2 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

(2) The AIS security staff, in turn, works to coordinate the accreditation process and provide direction and guidance in AIS matters. Guidelines concerning AIS systems are provided in references (e) through (g).

c. NATO Control Officer. The NATO Control Officer is designated in writing by the CSM/SSO. He is responsible for ensuring all NATO material is properly safeguarded and personnel requiring access are properly briefed and debriefed in accordance with reference (h).

d. Security Awareness Training Education (SATE) Representatives. CID Corry Station, the Pensacola Learning Site, and its imbedded Training Support Division have designated SATE representatives who assist the CSM/SSO with education and awareness training for personnel under their cognizance. More detailed information on this responsibility is contained in Chapter 3 of this instruction.

e. Base Security (DoD Guard Force). The DoD Guard Force is funded by NETC and supervised by the Regional Security Officer at NAS Pensacola. However, the CSM/SSO maintains close coordination with the Corry Station Guard Force Supervisor to ensure security of the classified compounds. Items of mutual concern include access control to the classified compounds, perimeter fence and building alarm systems, prohibited material control, and ingress/egress procedures for restricted areas.

5. Emergency Plans. A hostile action plan and emergency destruction plan are not required of CONUS commands; however, an emergency plan is necessary to protect classified material in case of natural disasters such as hurricanes, tornadoes, or fires. The command emergency plan for protection of classified material is contained in reference (i). ANNEX K to the plan identifies actions to be taken to protect classified information. When the plan is set in motion, the primary method to protect classified material is to ensure all such material is secured in approved security containers/vaults within the classified compounds. Timely planning and effective application of the emergency plan will reduce circumstances that could jeopardize the safety of command personnel. Any reports of possible compromise occurring during the course of a natural disaster, resulting from inadvertent disclosure or loss, will be submitted to the Command Security Manager for appropriate action in

accordance with Chapter 4 of this instruction.

2-3 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

6. Security Service Agreements. Several command Memorandums of Understanding (MOU) and Inter-Service Support Agreements (ISSA) include security service support for various tenant activities. The CID Corry Station Resource Management Directorate (N8) is responsible for maintaining MOUs and ISSAs, and for coordinating the inclusion of Information and Personnel Security issues with the CSM/SSO and parties concerned.

2-4 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

CHAPTER 3 SECURITY AWARENESS TRAINING EDUCATION (SATE)

1. Purpose

a. The purpose of the DoN SATE program is to ensure that personnel with access to classified information are instructed in Personnel and Information Security policies and procedures on a recurring basis, and that they remain aware of the need to protect classified material.

b. The goals of the SATE program are to:

(1) Impress upon all command personnel the fundamental habits of security.

(2) Emphasize that proper discretion must be automatically exercised in the discharge of their duties.

(3) Make the security of classified information a natural element of every task performed.

2. Description of SATE Briefings

a. Orientation Briefings will be presented by the CSM/SSO to all incoming staff and student personnel shortly after reporting on board as part of the Command Indoctrination Program.

(1) Staff members receive information and policy guidance regarding:

(a) Local command security procedures pertaining to access to classified compounds, visitor control, and prohibited items. (b) Supervisory and individual responsibilities pertaining to overall effort of safeguarding classified information.

(c) Reporting suspected and known security violations/practices dangerous to security.

(d) Reporting information that could be considered prejudicial to protecting and safeguarding classified information.

3-1 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

(2) Incoming students receive a security briefing provided by the CSM/SSO concentrating on:

(a) Basic security policy and each individual s responsibility to ensure that classified information is protected from unauthorized disclosure at all times.

(b) The Single Scope Background Investigation (SSBI) personnel security system, including a review of common derogatory issues that could be disqualifying

(c) The ongoing requirement to report any personal information that could have a bearing on the clearance eligibility.

b. On-the-job Training. Presented by Directorates, Division and Branch Officers/supervisors to newly reporting personnel to ensure they become totally familiar with detailed security requirements and procedures used within their work centers.

c. Refresher Briefings.

(1) Annual security refresher training is conducted by the CSM/SSO in accordance with reference (a) to enhance security awareness and promote a positive attitude toward maintaining a strong security posture through identifying and correcting potential security weaknesses.

(2) Refresher training must be an everyday, ongoing process. A huge classified schoolhouse arena encompassing hundreds of staff and over a thousand students handling highly classified material, dictates that each security system be monitored on a daily basis. Designated representatives conduct SATE training within each division and monthly internal security inspection reports are submitted to the CSM/SSO via Division Officers for review and any necessary corrective action. See paragraph 3-4 for details regarding internal security inspections.

(3) Other refresher briefings are presented by the CSM/SSO or SATE representatives as conditions warrant.

3-2 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

d. Counter-intelligence Briefings. CSM/SSO will arrange with the local NCIS office to provide biennial counter-intelligence briefings to all military and civilian employees. These briefings explain intelligence gathering methods practiced by foreign intelligence agencies and are designed to help command members recognize and defend against possible espionage and subversive attempts.

e. Special Briefings. (1) Foreign Travel: All command members with SCI access, who plan unofficial foreign travel, will report anticipated travel to the CSM/SSO. The CSM/SSO will provide a defensive travel and risk of capture briefing prior to travel and retain a record of the briefing in the member s SSO file. In an effort to ensure members notify the SSO in advance of foreign travel, all leave chits for travel outside the continental United States and its Territories must be chopped through the SSO prior to approval.

(2) Precautionary: Provided to a person whenever there are indications the person's behavior or performance may affect continued eligibility for access to classified information.

3. Security Debriefings

a. All command members with access to classified information must be debriefed by the CSM/SSO prior to termination of active military service or civilian employment or when their security clearance is suspended or revoked.

b. Additionally, personnel may have their access to classified information temporarily withdrawn by the CSM/SSO due to change in duty assignment, extended hospitalization, emergency leave which may result in PCS transfer, pending NJP or legal action, or for other reasons as determined by SSO Navy or COMNAVSECGRU.

c. Conditions and procedures for debriefing personnel with

access to classified information are contained in chapter 13 of this instruction and are also discussed in detail in references (a) and (c).

4. SATE Team. The SATE Team meets periodically as scheduled by CSM/SSO. The purpose of the SATE Team is to seek out and

3-3 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

recommend new methods, ideas, and programs to ensure all hands maintain a positive attitude towards safeguarding classified material. SATE Committee Team functions include:

a. Conducting internal security reviews of cognizant spaces concentrating on the areas listed below. Reports of these inspections will be forwarded to the CSM/SSO via the cognizant Division Officer each month to provide status of division security posture, identify potential security weaknesses, and recommend resolutions.

(1) Proper security markings and forms on AIS equipment, copy/fax machines, security containers and office doors.

(2) Proper end-of-workday securing procedures for security containers and offices.

(3) Proper classified material storage and handling procedures.

(4) Proper classified material destruction procedures.

(5) Any other items of security concern such as effective use of sound cover systems, escort problems, etc.

b. Briefing incoming divisional staff and student members regarding local and job-related security procedures, and emphasizing the importance of identifying and eliminating practices dangerous to security.

c. Assisting CSM/SSO in the conduct of security refresher training.

d. Displaying security posters and other information to enhance security awareness.

3-4 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

CHAPTER 4 SECURITY VIOLATIONS AND COMPROMISES

1. Policy. Basic DoD/DoN policy/guidance pertaining to the investigation and reporting of COLLATERAL and SCI security violations are contained in Chapter 12 of reference (b) and in Chapter 4 of reference (c) respectively.

2. Command Responsibilities

a. Ensure a Preliminary Inquiry (PI) is conducted immediately upon discovery that classified information has been lost or compromised.

b. Determine whether or not a compromise occurred as a result of the violation and submit reports to proper authority as required.

c. Identify any existing command weakness which could have caused the security violation.

d. Ensure proper disciplinary action is taken against individuals responsible for committing security violations.

3. Reporting Procedures

a. Any person who becomes aware of any loss, compromise, or possible compromise of classified information, material, or equipment, should immediately notify one of the following command officials:

-Instructor

-Supervisor -CSM/SSO -Officer of the Day (OOD) -Command Duty Officer (CDO) -Executive Officer/ Commanding Officer.

If circumstances of the discovery make notifying CID Corry Station impractical, the nearest Naval Criminal Investigative Service (NCIS) office, FBI, or any readily available military command should be contacted as soon as conditions permit. THE OVERRIDING PRIORITY OF THE PERSON COGNIZANT OF A SITUATION IS TO REGAIN CUSTODY OF THE CLASSIFIED INFORMATION, IF POSSIBLE, AND GIVE IT PROPER PROTECTION FROM UNAUTHORIZED VIEWERS.

4-1 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

b. AIS SYSTEMS. Any suspicion of violations or security deficiencies in AIS systems should be reported immediately to the command ISSM in addition to command officials listed above. A preliminary inquiry will be conducted into the circumstances of the violation and, if appropriate, a violation report will be submitted to proper authority.

c. Upon notification of either a suspected or confirmed security violation, the first action under all situations is to notify command officials. The CSM/SSO will advise the local Naval Criminal Investigative Service (NCIS) and determine if they will conduct an investigation.

d. The Executive Officer will ensure a Preliminary Inquiry Officer (PIO) is designated, in writing, immediately and any Preliminary Inquiry Reports (PIR) are completed in an accurate and timely manner. Designated PIO should check with the CSM/SSO for additional guidance prior to beginning the investigation. If NCIS requests command action be held in abeyance, the assigned Preliminary Inquiry Officer (PIO) must delay conducting the PI pending completion of the NCIS investigation.

e. The PIO shall submit the PIR to the Commanding Officer via the cognizant Division Officer/Department Head and the CSM/SSO. The PIR should reach the CSM/SSO within 72 hours after discovery of the violation. CSM/SSO will make recommendations for any further action and forward the report to the Commanding Officer/Executive Officer.

f. Information required in the PIR is discussed in references (b) and (c). Exhibit 1 is a "Security Violation Checklist" designed to aid investigating officials in collecting information on security violations.

4-2 Enclosure(1)

CIDINST 5510.1 06 Apr 2007

EXHIBIT 1 SECURITY VIOLATION CHECKLIST

Classification of this form: ___________________________________________________ Determined upon content of data; unclassified when blank Text Box: SECURITY VIOLATION CHECKLIST Describe the incident. Include DATE: _______________, TIME: ____________________, PLACE: _____________________________________________________, And CIRCUMSTANCES: ________________________________________ ______________________________________________________________. Identify person(s) involved. Include NAME: _______________________________________________, RANK: _________________. SSN: _____________________________, and their degree of ACCESS: ____________________________________. Identify material involved. Include SPECIFICS (originator: __________________________________, control number: ________________, msg DTG: ____________________, subj: _________________________________________________. and/or REFERENCES: _______________________________________________ _____________________________________________________________. Note: If TK/BRAVO, so state. Secure material. Was material recovered/secured? YES / NO If yes, Date/Time: __________________________________________________. Include investigative action taken. Date JAGMAN initiated: _____________________________, Status: ______________________________________________. Date NCIS notified: ________________________,

Status: ______________________________________________. Note: If NONE, so state. Include compromise evaluation. Select one of the following: compromise CERTAIN, compromise PROBABLE, Compromise POSSIBLE, Compromise IMPROBABLE, or NO COMPROMISE . Was disclosure? INADVERTENT / WILLFUL Cause of incident? PROCEDURAL / ISOLATED Was inadvertent disclosure oath given? YES / NO Include damage assessment. Include possible damage to National Security and possible adverse effects upon relations with foreign governments. Other information. Include any other information which will assist evaluation of the incident. Include statement of remedial action taken. Include action(s) taken to prevent or reduce recurrence. Note: This is required to close out the incident. 4-A Enclosure (1)

CIDINST 5510.1 06 Apr 2007

CHAPTER 5 CLASSIFICATION MANAGEMENT

1. Policy. It is DoD policy to make available to the public as much information concerning its activities as possible, consistent with the need to protect national security. Therefore, information will be classified ONLY to the level necessary to protect the national security. Chapter 4 of reference (b) provides detailed information regarding COLLATERAL classification policies. Classification policy and guidance for SCI is available in Chapter 3 of reference (c).

2. Command Responsibilities. Each classifier is accountable for the propriety of the classification they assign, whether it is an original or derivative classification. In doing so, officials within CID Corry Station, with command signature authority, must ensure classification markings are accurate before signing classified documents or approving dissemination of classified material. This command does not have originating classification authority.

a. Due to the primary training mission of this command, and the fact that curriculum and instructional materials (including related administrative support procedures/functions) are derived from current source documents and material, 99.9 percent of all locally prepared classified documents will be derivatively classified.

b. Individuals assigning the derivative classification must respect original classification decisions made by the Originating Classification Authority (OCA), verify the current level of classification insofar as possible, and carry forward on newly created documents any previously assigned dates or events for declassification.

3. Marking Documents. Both COLLATERAL and SCI material must be properly marked. Basic markings required for classified material are contained in Chapter 6 of reference (b) for COLLATERAL, and in Chapter 3 of reference (c) for SCI. Both directives cover all aspects of properly marking publications, correspondence, electronically transmitted messages, material for transparencies, slides, recordings and AIS magnetic media. Specific guidance on document, page, and portion classification

5-1 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

markings are also provided on the CAPCO NSANET Website (ww04.cms.ic.gov/capco/). Any questions concerning the proper marking of classified information and material should be referred to the CSM/SSO.

5-2 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

CHAPTER 6 ACCOUNTING AND CONTROL OF CLASSIFIED MATERIAL

1. Policy. References (b) and (c) provide guidance pertaining to the accounting and control of classified material. Since classified holdings at this command include both SCI and COLLATERAL, there are two separate systems used to account for and control classified holdings.

2. Classified Material Control Points. The Classified Mail Room (CMR) is the only authorized command control point for the receipt and transmittal of classified material via any authorized means.

a. The CMR is responsible for the initial opening, processing, and internal distribution of all classified material received for the CID Corry Station and the Pensacola Learning Site. The CMR logs incoming classified material into the command register and distributes it, under receipt, to designated recipients.

b. The CMR is also responsible for the forwarding of all classified material sent from CID Corry Station and the Pensacola Learning Site via the Defense Courier Service (DCS), U.S. Postal Service, and official courier. The CMR will ensure all materials are properly marked, wrapped and addressed for the appropriate shipping method and will also maintain records of

transmittal, track receipt status, and initiate tracer action when required.

c. Classified COLLATERAL mail addressed to on-base Army, Air Force, USMC, and to NAVSECGRUACT Pensacola, is distributed directly by the Command Mail Room to these facilities. d. Locally produced classified material is not processed through the CMR, but it must be accounted for and controlled in the same manner as classified material received from external sources as discussed in paragraphs 3 and 4 below.

3. Accountability of SCI Classified Material. DNI has eliminated the requirement for chain of custody receipts and periodic inventory and accountability of SCI as a routine security protection measure. All SCI (TS/S/C) documents received at this command are non-accountable, however authorized holders/users are still responsible for proper safeguarding of material and proper destruction of outdated or unwanted material. 6-1 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

a. Though annual inventories of SCI documents are no longer conducted, Directorates, Division and Branch Officers should review their classified material at least every six months to ensure proper protection measures are being used, unneeded documents are destroyed, and classified holdings are kept to a minimum.

b. Reproduced and locally originated SCI documents do not require any record of accountability as long as they remain in a SCIF. However, they do require proper markings, protection from unauthorized disclosure, and proper destruction. To the maximum extent possible, the classified reproduction facility in Bldg 512 should be used for all classified reproduction. In addition, Directorates, Division and Branch Officers shall ensure that reproduction is kept to the absolute minimum and that copy limitations and prohibitions imposed by originators are complied with. They should also ensure that copy machines under their cognizance are specifically designated, and appropriately marked, for the level of classification that can be reproduced, and that procedures are in place to protect copy machines from unauthorized use and unauthorized disclosure of classified information.

c. Working Papers: No logs/records of accountability are maintained for SCI-level working papers; however, they must be properly marked, safeguarded, and disposed of when no longer required. Material may be considered working papers for up to

180 days. After that period, they must either be converted to an official document or properly destroyed.

4. Accountability of COLLATERAL Classified Material

a. Classified COLLATERAL material may be received in one of the following ways:

(1) Through the Command Mail Room via U. S. Postal Services (USPS), including USPS Express Mail.

(2) Through the Naval Supply System.

(3) Via the DCS (for TS COLLATERAL and CMS material).

(4) From a specifically designated courier

6-2 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

b. Top Secret COLLATERAL material requires a chain of custody receipts and annual inventory accountability. All Top Secret COLLATERAL material will be delivered to the TSCO upon receipt. The TSCO will maintain required control and inventory documentation and sub-custody the material to the authorized holder.

c. Secret and Confidential COLLATERAL material held and used within command classified compounds will be safeguarded the same as SCI material. Classified Tactical Publications and Naval Warfare Publications will be handled in accordance with NWP 1-01 guidelines.

d. NATO classified material will be handled in accordance with reference (f). Any receipt of, or requirements for, NATO material should be coordinated through the Command NATO Control Officer.

e. The Command Mail Room receives incoming COLLATERAL Secret and Confidential material via Registered Mail, First Class mail and Express Mail, and distributes it to the CMR where mail is processed and distributed to various designated recipients.

f. When classified mail is received through the Naval Supply System, the Procurement/Inventory Division (N82) will advise the CMR. Since N82 does not have a classified material

storage facility, the material must brought to CMR for processing and distribution prior to close of business that day.

g. Incoming COLLATERAL Top Secret and CMS is received via the DCS system. Every two weeks, air shipments originate from DCS Courier Station Jacksonville and arrive at NAS Pensacola (Sherman Field). An official Command SCI courier is dispatched to meet incoming flights at Sherman Field and transport material back to the CMR.

h. When a specifically designated courier is transporting classified material for delivery to CID Corry Station, the material should be delivered to the CMR for receipt acknowledgement and further dissemination.

i. Message traffic copied/printed off the LAN or received in disk or hard copy format from the communications center does not require a chain of receipts for distribution; nor are

6-3 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

messages subject to inventory and completion of destruction reports. Nevertheless, messages must always be properly marked, protected from unauthorized disclosure, and disposed of properly.

5. Accounting and Control of Magnetic Media

a. Magnetic media is not Human Readable-Interpretive (HRI) and has unique retentive capabilities; therefore, it must be properly handled. All classified removable magnetic media will be labeled and controlled according to its classification. Additionally, all unclassified media used in classified compounds will be labeled as UNCLASSIFIED to ensure the integrity of the classified and unclassified LANs.

b. Control Procedures. Unauthorized magnetic media cannot be brought into classified compounds. To ensure only authorized magnetic media is used in computers, and to ensure proper control is maintained, the following procedures apply:

(1) Accountability for classified magnetic media is the same as for other classified material discussed above.

(2) The CMR, through coordination with the Command ISSM, will distribute incoming classified magnetic media to Departmental ISSOs. Before use, all incoming media, regardless of source, must be verified to ensure it is free of viruses, that

it does not violate copyright laws, does not contain prohibited data or software, and is properly labeled with classification markings prior to issuance to users. Media contained in manufacturer's shrink-wrap need not be labeled; however, once a package is opened, all media must be labeled with the appropriate classification.

(3) Individual users receiving magnetic media from any source will immediately notify their ISSO who will perform the above verification procedures.

c. Storage. All removable and non-removable classified magnetic media in restricted areas outside the SCIFs must be secured in approved security containers or strong rooms when not in use. Removable classified magnetic media in SCIFs must also be stored in approved security containers or vaults when not in use. There is no requirement to secure classified non-removable magnetic media in SCIFs, however classified computers should be

6-4 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

set with password protected screensavers to prevent unauthorized access during normal working hours and properly secured at the end of the work day.

d. Labeling/Marking: All magnetic media and devices, with the exception of CDs, must have one of the following Standard Form (SF) 700 Series classification labels affixed:

-SF 700, TOP SECRET -SF 707, SECRET -SF 708, CONFIDENTIAL -SF 710, UNCLASSIFIED -SF 712, CLASSIFIED SCI

(1) Labels must be affixed to media clearly visible and positioned in a manner, which will not adversely affect operation of the equipment using the media.

(2) Classification markings should be printed on CDs with an indelible marking pen. The appropriate SF 700 series form should be attached to the CD jewel case.

(3) Removable media must be labeled to reflect the classification of its contents; or, when "writing to" removable media, the label must reflect the highest classification the AIS is authorized to process. If a disk is "write-protected" and

there are reasonable assurances the write-protect mechanism is operative, reading from a disk will not affect its classification.

(4) When internal hard drives are removed from AIS, they will be labeled to reflect the highest classification the host AIS was authorized to process. This would include such opportunities presenting themselves during installation or maintenance.

e. Destruction. The retentive capabilities of floppy disks dictate they never be declassified or downgraded to a lower classification. Classified floppy disks are considered a consumable item and will be properly destroyed when no longer needed per the provisions of references (d) and (e).

6-5 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

f. Transferring Files.

(1) Due to the nature of AIS operating systems, there are inherent dangers when transferring files from classified AIS to unclassified media. This procedure should only be used as a last resort and be done with the assistance of a designated ISSO. Specific procedures for safely performing such operations are documented in reference (g).

(2) Transferring files from unclassified AIS to a classified media is permitted. However, to prevent the unclassified media from becoming classified due to insertion into classified AIS, the media should be write protected at

all times while within the classified AIS.

6. Excessive Classified Material Holdings. Regular, timely disposal of unnecessary classified material can assist in reducing. security costs, preparing for emergency situations, and protecting classified holdings. All command elements with classified material holdings will arrange for periodic review of material, AT LEAST SEMI-ANNUALLY, to ensure unneeded classified material is destroyed.

6-6 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

CHAPTER 7 VISUAL INFORMATION SERVICES

1. Policy. Special care must be exercised with regard to visual information services within classified areas. Personnel involved must be appropriately cleared and classified working materials must be properly safeguarded at all times.

2. Printing and Visual Information Services. Visual Information Services for this command are provided by the Visual Information Center (VIC) located at NETPDTC, Saufley Field. The center offers photographic, graphic arts, video production, training aids fabrication, and audio-visual equipment repair. The VIC has personnel with Secret COLLATERAL clearance and can provide products classified to that level.

3. Audiovisual (AV) Work Requests. Work requests must be submitted on an OPNAV Form 5290/1. The work requests should not contain any classified information. Requirements for classified tasks should be discussed directly with a cleared employee at the VIC.

4. Procedures for COLLATERAL Classified Services

a. Prior to any classified discussion with VIC personnel, their clearance must be verified by the CSM/SSO. If they will visit CID Corry Station domain classified compounds in

conjunction with their duties, they must be escorted at all times.

b. Any transfer of classified material between CID Corry Station and VIC personnel should be coordinated through the CMR, as discussed in Chapter 6, to ensure proper procedures are followed.

c. Since the VIC does not have a classified storage capability, classified material will be not normally be retained by VIC personnel. Upon completion of a classified task, all related materials will be returned to CID Corry Station for storage or destruction.

5. Procedures for SCI Classified Services. All SCI printing and visual information services will be coordinated with the CID Corry Station Knowledge Management Directorate (N6) and the CSM/SSO.

7-1 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

6. Procedures for Unclassified Photographic Services

a. Photographs will not normally be permitted in the classified compounds. As discussed in Chapter 11, events to be attended by uncleared personnel or involving photographs, should be conducted outside the classified compounds.

b. Exterior photographs of buildings and grounds inside the fences of the classified compounds are unclassified.

c. Cognizant division officers who request unclassified photography in classified spaces shall ensure all areas where photos are to be taken are properly sanitized. In these cases, the requestor will be responsible for reviewing completed photographs to ensure they do not contain any classified information prior to distributing or publishing them. If any photographs are deemed to contain classified information, the CSM/SSO should be notified immediately.

7. Procedures for Classified Photographic Services. No classified photographs will be taken without prior approval from the CSM/SSO. Any requirement for classified photographs will be coordinated with CID Corry Station Training Directorate (N7), who will advise the CSM/SSO. All classified photographs will be reviewed by N7 prior to any distribution to ensure they are properly classified and marked.

7-2 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

CHAPTER 8 SAFEGUARDING AND STORAGE OF CLASSIFIED MATERIAL

1. Policy. CID Corry Station SCIFs are accredited for Closed Storage . That means that all classified material must be properly secured in GSA Approved security containers (Safes) or an approved vault when not in use. All personnel handling classified material shall ensure it is afforded proper storage. When removed from storage, the material must remain under the personal observation of a cleared person or be covered with Standard Forms 703, 704, or 705. Classified AIS media must also have the appropriate classification/handling labels affixed and be properly stored when not in use as discussed in Chapter 6.

a. Procurement/Maintenance of Containers. New security containers will not be procured until a physical security survey of existing equipment is completed and a review of classified records on hand has been made for possible destruction/reduction of holdings to make needed security storage space available. Only containers that have been approved by the Federal Government (National Supply Schedule of the General Services Administration (GSA)) as "security filing equipment" will be procured. The Maintenance Branch (Code D46) shall ensure all containers receive preventive maintenance inspections at least annually and, that a Maintenance Record for Security Containers/Vault Doors (Optional Form 89 (9-98) is maintained for, and filed, in each security container.

b. Recording Combinations. The only permissible record of a safe combination is the one inserted into the Security Container Information envelope (SF-700). Directorates, Division and Branch Officers will ensure that a combination is on file for each safe under their cognizance. Recording safe combinations on calendar pads, various documents affixed to a wall, anywhere on or within desk and office furnishings, on pieces of paper stowed in purses/wallets, or in data banks of certain state-of-the-art wrist watches and other forms of AIS devices or systems, is STRICTLY PROHIBITED.

2. Cipher Locks. Cipher locks are Access Control

devices

and may not be used to secure classified information. Cipher locks have been installed on some inner doors as an upgrade to the key/lock system and are used to control ingress and egress to rooms during the normal workday. Combinations to cipher

8-1 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

locks will be controlled by the owner of the space protected. The appropriate Building Master-at-Arms (BMAA) must hold the combination to all internal cipher locks to permit access in case of emergency.

3. Security Container Records and Forms. The cognizant Directorate or Division shall maintain the forms listed below:

a. Security Container Information Envelope (Standard Form 700). Every safe and vault should have a copy of this form posted on the inside. For safes, it should be on the drawer to which the combination lock is attached; For vaults, it should be posted on the inside of the vault door. This form identifies the person(s) to contact if the safe or vault is found open. Additionally, the second part of the form contains a combination record and envelope. The current combination will be recorded on the form, sealed in the envelope, and maintained by the cognizant Directorate or Division Officer. The classification of the sealed combination envelope is the same as the highest classification of the material stored in the safe and must be protected accordingly.

b. Security Container Check Sheet (Standard Form 702). Every safe will have this form posted in plain view on the outside of all safes and vault doors. This form should be used daily to document when the safe was unlocked, locked, and

checked. The

checked by

blocks should be completed every day,

even though the safe may not have been opened.

c. Activity Security Check List (Standard Form SF-701). This form will be posted on the outside access doors to offices, classrooms, storage rooms, and any other space, which should be locked at the end of each workday. The form should indicate the specific actions to be taken each day prior to securing the room. The last person to leave the space at the end of each workday should complete this form.

d. Magnetic OPEN/CLOSED" signs shall be used on all security containers and vault doors. The above security forms are available through SERVMART. Directorates and Divisions are responsible for including funds in their annual budget for the purchase of required security forms.

8-2 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

4. Safe Placement Scheme. Code D46 shall maintain a master database (inventory) of all CID Corry Station safes. Database information will include, at a minimum, the cognizant Directorate/Division, container/vault/strong room number, the building/room number where the safe is located, and the person responsible for the safe.

a. When a safe is moved to a different location, turned in, or a new one received, the cognizant Director or Division Officer shall advise Code D46 of the change so they can update the database.

b. Code D46 shall ensure that a semi-annual inventory of security containers is conducted during the months of December and June of each year. SATE representatives will assist with these semi-annual inventories and provide required information to D46.

5. Rotation of Recall Personnel. When an individual appearing on the recall section (Block #10) of the SF-700 Form transfers, or is reassigned out of the work center, the cognizant Director or Division Officer shall ensure that a new form is completed, a copy affixed to the inside of the safe drawer, and the sealed envelope placed on filed. Directors and Division officers should designate a central check-out point to ensure this action is completed at the time an individual leaves.

6. Changing Security Container Combinations. The requirements to change combinations are event driven. At a minimum, they should be changed if the combination has been compromised, or if someone with access no longer requires it and there are no other means of preventing access to the container. Therefore, it is not normally necessary to change safe combinations every time someone transfers since access is controlled at the compound entrance. The combination should be changed if someone is reassigned to a new work center within the command and no longer requires access at the previous work center. There is also no requirement to change combinations after a specific elapsed time. The primary concern is the protection of classified material from unauthorized personnel and combinations should be changed as required to ensure that protection.

a. Combination locks are intricate mechanisms. Security container custodians shall ensure only qualified persons change

8-3 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

a combination. Preventive and corrective maintenance will only be conducted by a qualified locksmith. These services can be obtained by contacting the Maintenance Branch (D46) or the Supply Branch (D43), if contractor services are required.

b. Safe combinations that will remain in use must never be shown to a locksmith. The locksmith may offer OJT and oversee practice runs" in setting combinations; however, they may not oversee the setting of actual combination to be used. A new combination must be set if the combination was given to the locksmith to assist with corrective maintenance.

c. Directorates and Divisions are responsible for funding any required repairs.

7. Emergency Situation Procedures

a. Lockouts. The cognizant Director or Division Officer shall be advised immediately of any situation involving a lockout or malfunction of a security container/vault combination lock and take all necessary actions to correct the situation. Only professional locksmiths are authorized to forcibly open security containers. Directorates and Divisions are responsible for funding any required repair services, replacement parts, and any new security containers required due to lockouts.

b. Security Containers Discovered Unlocked or Unsecured.

(1) The individual discovering an unsecured security container after normal working hours, shall immediately notify the CDO and provide the name(s) of those individuals listed on the SF-700 attached to the inside of the safe drawer.

(2) The CDO will direct the individual discovering the unsecured safe to stand by the container until the assigned custodian arrives. If there is no SF-700 in the safe or the individuals listed cannot be contacted the CDO should call the appropriate person listed on the Security Recall Bill held at the Quarterdeck.

(3) The CDO shall direct the individual recalled to report to the scene, hold an inventory of the safe's contents, determine if anything is missing, and secure the container.

(4) The CDO will make an official log entry and ensure

8-4 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

the CSM/SSO, Department Head, and cognizant Division Officer are notified promptly at the beginning of the following work day.

c. Emergency Issuance of Security Container Combinations.

(1) In the event of an after hours emergency, containers/vaults may be opened in the absence of regularly assigned custodians. The CDO will contact the cognizant Director or Division Officer who will arrange for an authorized individual to come to work and open the container. A security recall bill is available on the Quarterdeck with names/phone numbers of persons responsible for each SCIF area.

(2) CDO's, OOD's, and Quarterdeck duty personnel who do not have access to classified information at the level required are not authorized to enter classified spaces or view classified material.

8. Transfer of Security Containers. When a container is transferred from one command element to another, or put out of service, the following procedures pertain:

a. The losing custodian shall thoroughly inspect the entire container (behind drawers, etc.) to ensure the container does not contain classified material and place the inspection memorandum (Exhibit 2) on the outside of the safe.

b. The losing custodian shall change the combination to

50-25-50, annotate the new combo on the inspection memo, and notify the cognizant division officer who will ensure that the envelope on file containing the old combination is properly destroyed.

c. The gaining custodian shall comply with paragraph 3 when putting the new security container in to service.

d. Safes in good working order that are not currently in use should be emptied, inspected and certified to contain no classified information using Exhibit 2, have the combination set to 50-25-50, and be identified as spare inventory listing. on the safe

e. Safes that are inoperable and cannot be restored to GSA standards should be emptied, inspected and certified to contain

8-5 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

no classified information using Exhibit 2, left open, and processed for disposal. These safes should be identified as excess on the safe inventory listing until they are removed

from the classified compounds.

8-6 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

EXHIBIT 2

ATTACH THIS MEMO TO THE ITEM IN QUESTION

Date _______________

To: Whom It May Concern

Subj: INSPECTION TO ENSURE REMOVAL OF CLASSIFIED MATERIAL

1. The following item was inspected by me this date and is certified to contain no classified material. ______________________________________________________________ ______________________________________________________________ (Description, to include Ser #, Minor Property #, or other identifying # s) _________________________________ _________ ____________ (Printed Name, Rate, and SSN) Division) (Phone #)

______________________________ (Signature)

8-A Enclosure (1)

CIDINST 5510.1 06 Apr 2007

CHAPTER 9 TRANSMISSION AND TRANSPORTATION OF CLASSIFIED MATERIAL

1. Policy. Basic guidelines and policy governing the transmission of both COLLATERAL and SCI classified material is contained in references (b) and (c) respectively. The term, "transmission," as it relates to classified material, refers to any movement/transportation of classified material from one place to another. Whether transported to off-base commands and activities, or just transported to and from various on-base command elements, the movement of classified material must be accomplished in strict compliance with the governing directives cited above and local procedures contained in this chapter.

2. Mailing Classified Material

a. All classified material to be mailed from this command will be prepared for transmission by the CMR located in Bldg 3748 per OPNAV and DoD instructions pertaining to wrapping, addressing, and shipping classified material.

b. Individuals reporting to the CMR with material to be mailed must provide a Letter of Transmittal (LOT) to the outgoing mail clerk that identifies the specific material shipped and the correct address. The Director, Division or Branch Officer authorizing the shipment must sign the LOT. It

is the individual s responsibility to ensure the material is properly classified and marked prior to bringing it to the CMR.

3. Hand-carrying Classified Material. Individuals handcarrying classified material must take every precaution to prevent the unauthorized or inadvertent disclosure of that material whether walking material from point to point within the confines of this command, or acting as official off-base couriers.

a. Hand-carrying Classified Material Within the Command. On-base couriers will take reasonable precautions to prevent inadvertent disclosure of the classified information during movement from building to building. Material should be placed in a folder marked with the appropriate classified cover sheet; the folder should then be carried in a briefcase or pouch during transit. Students are not authorized to act as couriers, on or off base, unless specifically authorized by the CSM/SSO.

9-1 Enclosure(1)

CIDINST 5510.1 06 Apr 2007

(1) Command Courier Badges for on-base transport of classified material. CID Corry Station Directorate/Division are issued courier badges from CSM/SSO under sub-custody. These courier badges are authorized for ON-BASE courier trips only. Assigned couriers must log-out and sign for their badges from a designated division issuing control point and present their courier badge to classified compound gate guards at time of ingress/egress. The badge must match the color (Blue and Grey) of the courier's Security ID access control badge. Courier ID badges bear the word "COURIER" on the front side. Staff personnel assigned to the SSO Office will have SSO on their BLUE picture badge. These personnel are authorized on-base courier privileges using their BLUE SSO badge.

(a) Courier Card Issuing Points. Division officers shall establish courier badge issuing points and designate individuals responsible for issuing and controlling badges. Courier badges shall be strictly controlled by use of a checkin/check-out log and issued only upon the actual requirement of a courier trip. At the conclusion of each on-base courier trip -- and always by the end of a workday -- couriers must surrender their badge to the directorate/division control point to be secured. DoD guards shall be notified in advance of any after hour s courier requirement with specifics as to points of ingress and egress.

(b) Courier Container Contents. DoD gate guards do not inspect containers carried by individuals bearing courier badges. However, items carried by the courier not in the courier container are subject to search. Couriers must refrain from placing other than classified material in their containers.

(c) Magnetic Media. Classified magnetic media will be transported in the same manner as other classified material. Unclassified magnetic media shall be transported in/out of the classified compounds only by personnel with ISSO or SSO on their permanent security badges.

b. Hand-carrying classified material in an off-base travel status. Because of the security risk, hand carrying classified material while in a travel status will be authorized only when mission essential. Authorization would not normally be granted unless the material is required at the traveler's destination, is not available at the command to be visited, and could not be

9-2 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

transmitted by other authorized means due to time or other constraints. The former "two-person" rule has been cancelled. One person can now act as an off-base SCI courier. However, the circumstances of the trip must always be assessed by determining the volume of material, mode and area of travel, sensitivity of material, etc. A final determination should then be made whether or not to assign a second courier. Always check with the CSM/SSO if in doubt. NOTE: Hand carrying classified material on commercial aircraft requires specific authorization from the CSM/SSO. See paragraph 4c. below.

(1) Directors and Division Officers shall notify the CSM/SSO of an off-base courier requirement by submitting a requirement memo (Exhibit 3). Division Officers will route this requirement memo through the Learning Site Officer-inCharge.

(2) CSM/SSO will provide a briefing (Exhibit 4) to the designated courier and execute a DESIGNATED COURIER BRIEFING ACKNOWLEDGEMENT memo (Exhibit 5). Courier acknowledgement statements will be retained by the CSM/SSO and remain valid for as long as the individual is authorized use of a courier card or letter.

(3) For personnel whose job requires frequent courier duties, the CSM/SSO will prepare and issue a COURIER AUTHORIZATION CARD (DD 2501) for the designated courier, under

signed receipt. Couriers may retain their courier card only for the duration of the transport and must surrender it to the CSM/SSO or a divisional issue/control point after each trip. Courier cards are good for up to three years, or they expire upon reassignment or transfer of the individual, whichever occurs first. Directorate/Divisional issue/control point monitors must ensure courier card expiration dates are current and arrange with CSM/SSO for replacements in a timely manner.

(4) For other personnel, CSM/SSO will prepare a courier designation letter (Exhibit 6) for each specific courier requirement.

c. Transportation of classified material onboard a commercial passenger aircraft. Due to the possibility of hijacking, classified material will be transported aboard commercial passenger aircraft only as a last resort when other

9-3 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

methods will not permit the transmittal of the material in time to meet operational objectives or contract requirements.

(1) The Commanding Officer can authorize the trip as long as the destination is within CONUS and on a U.S. commercial carrier. Travelers shall coordinate courier trips on commercial aircraft with the CSM/SSO.

(2) Even if the individual holds a DoD Courier Card, a specific letter of authorization (Exhibit 6) issued by the CSM/SSO is required when carrying any classified material on board commercial aircraft.

9-4 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

EXHIBIT 3

_________________ (Date) MEMORANDUM

From: ____________________(DIRECTORATE/DIVISION/BRANCH)

To: Command Security Manager (Code N2)

Subj: REQUIREMENT FOR COURIER IN TRAVEL STATUS

Ref: (a) CIDINST 5510.1, Chapter 9 1. Per reference (a), request authorization for following courier requirement: a. Purpose and Destination: ______________________________________________________________ ______________________________________________________________ ______________________________________________________________ b. Any known intermediate stops: ______________________________________________________________ ______________________________________________________________ c. Brief description of material and classification level: ______________________________________________________________ ______________________________________________________________ ______________________________________________________________ d. Inclusive dates of courier trip: (NOTE: If trips are

recurring due to an ongoing command mission requirement, so state). ________________________________________________________________ ________________________________________________________________ e. Courier Identification: NAME RANK/RATE SSN COURIER CARD NO. (Issued by CSM/SSO) _________________ _________ ______________ ___________________ _________________ _________ ______________ ___________________ _________________ _________ ______________ ___________________ _________________ _________ ______________ ___________________

__________________________________ (Signature)

9-A Enclosure (1)

CIDINST 5510.1 06 Apr 2007

EXHIBIT 4

COURIER BRIEFING PROTECTION DURING HANDCARRYING CLASSIFIED MATERIAL IN A TRAVEL STATUS ****************************************************************

1. The classified material must be in your physical possession at all times, unless proper storage at a United States Government activity or appropriately cleared contractor facility (continental U.S. ONLY) is available.

a. Hand-carrying classified material on trips that involve an overnight stopover is not permitted without advance arrangements for proper overnight storage in a Government activity or a cleared contractor facility.

b. When you surrender any package containing classified material for temporary storage (e.g. overnight or during meals) you must obtain a receipt signed by an authorized representative of the contractor facility or Government installation accepting responsibility for safeguarding the package.

2. You may not read, study, display, or use classified material in any manner on a public conveyance or in a public place.

3. When the classified material is carried in a private, public

or Government conveyance, you will not store it in any detachable storage compartment such as an automobile luggage rack, aircraft travel pod or drop tank. You may not leave classified material unattended under any circumstance.

4. A list of all classified material carried or escorted by your will be maintained by your command. Upon your return, you must account for all classified material.

5. Whenever possible, you should return the classified material to your command by one of the other approved (non-courier) methods of transmission.

9-B Enclosure (1)

CIDINST 5510.1 06 Apr 2007

EXHIBIT 5

______________ Date)

MEMORANDUM

From: ________________________________________ (NAME/RANK/RATE of designated courier)

To: Command Security Manager (Code N2)

Subj: DESIGNATED COURIER BRIEFING ACKNOWLEDGEMENT

Ref: (a) CIDINST 5510.1, Chapter 9

1. Per reference (a), I have been designated a courier during the period _______________ to _______________. Prior to my departure to ___________________________________ I received a briefing from the Command Security Manager setting forth my specific courier duties and responsibilities.

2. I hereby acknowledge I fully understand the provisions and content of this briefing and will fulfill my courier duties accordingly.

_____________________________ (Signature)

9-C Enclosure (1)

CIDINST 5510.1 06 Apr 2007

EXHIBIT 6

5511 N2/Ser XXXX Date

To: WHOM IT MAY CONCERN

Subj: ONE-TIME COURIER LETTER AUTHORIZATION FOR COMMERCIAL AIR TRAVEL

1. This letter certifies that the person whose name appears below and whose identity may be verified by the credentials described is:

a. A member of the U.S. Navy, Department of Defense, United States of America.

b. An official courier or escort for the Center for Information Dominance Corry Station. c. Required to hand-carry the parcel as described from the Center for Information Dominance Corry Station, Pensacola, FL 32511-5138.

2. Name, Grade and Service of courier: John R. Doe, CTR1, USN.

3. Identification: Armed Forces Identification Card Number

123-45-6789

4. Destination to include transfer points and date(s): (i.e. Pensacola, FL via Houston, TX to Tucson, AZ., 2 Dec 2006).

5. Description of parcel: One sealed envelope addressed to: (i.e. CDR 111th Military Intelligence Brigade, Freedman Hall, Fort Huachuca, AZ 85612-5000 from Commanding officer, Center for Information Dominance Corry Station, 640 Roberts Ave., Pensacola, FL 325121-5138, in a locked briefcase).

6. Effective Period of Time: (i.e. 2 Dec 2006).

7. It is requested that the designated courier not be impeded in assigned duties nor any attempt be made to view the material being carried. Confirmation of Authority may be made by calling the Center for Information Dominance Corry Station, Special

9-D Enclosure (1)

CIDINST 5510.1 06 Apr 2007

Security Officer at (850) 452-6463 during the hours of 0700 to 1700, Monday through Friday or (850) 452-6512 during non-duty hours.

//s//

9-D Enclosure (1)

CIDINST 5510.1 06 Apr 2007

CHAPTER 10 DESTRUCTION OF CLASSIFIED MATERIAL

1. Policy. Classified material must be disposed of by approved methods, following proper procedures, to ensure the material is destroyed beyond recognition or reconstruction. Personnel conducting classified material destruction must have the level of clearance commensurate with the material being destroyed. Classified material will be destroyed as soon as it is no longer required. Early disposal of unnecessary classified material can assist in reducing security costs and better protect classified material.

2. Methods of Destruction

a. NSA approved Cross-Cut Shredders are located throughout the command SCIFs. These shredders are approved for destruction of all classified paper material, with the exception of CMS, and should be used for routine destruction on a daily basis.

b. NSA approved bulk Disintegrator. The disintegrator is located in Bldg 3742 on the northwest side of Bldg 514. It is used for bulk destruction of large volumes of material, or in case of emergency. Management of the disintegrator is assigned to the CMR (N2). Material to be destroyed in the disintegrator must be properly prepared and stored in burn bags marked per paragraph 3. below.

c. Classified material that cannot be shredded or disintegrated, such as microfilm, microfiche, floppy disks,

magnetic tape, film, slides, etc., is sent via DCS to NSA for destruction. To eliminate confusion and prevent damage to the disintegrator, this material should be placed in cardboard boxes or burn bags that are clearly marked "BURN ONLY" and taken to the CMR for further shipment to NSA.

3. Procedures

a. Classified material will be destroyed only by personnel cleared for access to the material being destroyed.

b. Classified material awaiting destruction will be afforded adequate protection. All burn bags and boxes will be safeguarded at the level of the highest classification they contain until they are completely destroyed.

10-1 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

c. Burn Bags should only be used for overnight storage of material when the material cannot be destroyed at the end of the day as discussed in paragraph 2 a. above. When material is to be stored in burn bags, the following applies:

(1) Each burn-bag must be secured with staples and marked as follows:

(a) Name of originating directorate/division/branch.

(b) Building and Room number.

(c) Printed name, telephone extension of person sealing the bag, and the date bag is sealed.

(2) Burn bags must be stored in a GSA-approved storage container or vault.

(3) Books or bulky items will not be placed in burn bags intact. Pages must be detached and separated and all staples or other metal fasteners must be removed.

(4) Waste materials such as cans, bottles, cigarette packs, paper towels, tissue, newspaper, magazines, metal, plastic, or wood products MUST NOT be placed in burn bags.

(5) Bags containing prohibited material or paper products not properly prepared for destruction will be returned to the responsible division.

4. Duties and Responsibilities

a. CID Corry Station personnel are responsible for performing daily routine destruction of their classified waste using the NSA-approved crosscut shredders provided in the SCIFs.

b. Management of the disintegrator is assigned to the CMR (N23). Except for emergencies, destruction will be scheduled between 0730 and 1530 on normal workdays. Requirements for use of the disintegrator should be identified to N23 by the appropriate Directorate/Division Officer.

c. CMR (N23) and Witnessing Officer(s). Destruction of classified material must be conducted by N23.

10-2 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

The department/division that requires the use of the disintegrator will provide a witnessing officer to assist N23 throughout the destruction process. All destruction witnessing officers will familiarize themselves with Chapter 17 of reference (b), Chapter 3 of reference (c), and with the "DISINTEGRATOR OPERATING PROCEDURES" promulgated by N23. Witnessing Officers must be qualified in all aspects and remain in the disintegrator compound while equipment is operating.

(1) N23 will pick up the key to Gate #8 from the DoD Guard at Post II for access to the disintegrator. He will then receive, count and log the number of bags for destruction.

(2) The actual destruction must be conducted by N23 and the witnessing officer. They will sign the record of destruction and the CMR will retain for a period of two years.

(3) N23 is responsible for ensuring all destructionrelated documents are properly completed and that the disintegrator is thoroughly cleaned and inspected for classified residue upon completion of destruction.

10-3 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

CHAPTER 11 ACCESS CONTROL TO CLASSIFIED TRAINING COMPOUNDS

1. Policy. CID Corry Station and its Learning Site Pensacola occupy Bldg 3781, 512, 513, 514, 1099, 3744, and 3748. Per references (c) and (j), specific physical security measures are required to protect the type and sensitivity of classified material contained in these buildings. Buildings designated as Sensitive Compartmented Information Facilities (SCIF) are accredited for handling and processing classified material in accordance with their associated accreditation letters. All other classroom and administration spaces within the classified compounds are accredited for the handling and discussion of material up to the SECRET COLLATERAL level. Any classified material stored in these spaces must be held in GSA approved security containers. Access into all classified buildings is restricted to authorized personnel only.

a. Only Command personnel and CID Corry Station contract personnel with permanent picture badges are authorized to access and secure classified buildings in accordance with paragraph 13 below. Any requirements for other personnel to access and secure buildings must be coordinated with the CSM/SSO in advance.

b. Command personnel will conduct normal official business with uncleared visitors outside the confines of CID Corry Station classified compounds.

c. Meetings requiring attendance by personnel not appropriately cleared will be held outside classified compounds.

d. Reenlistments, promotion/graduation ceremonies, etc., will not be held within the classified compounds.

e. NCIS/DSS interviews, selection boards, etc., will be conducted outside the classified compounds if all personnel concerned are not appropriately cleared.

f. Uncleared family members will not be allowed in the classified compounds.

(1) Based on the nature of this command s mission and infrastructure, it is impossible to prevent all uncleared

11-1 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

visitor access to the compounds. However, these visits should be for official business only, and escort procedures will be followed at all times. The authority to authorize uncleared personnel access to classified compounds for unofficial business is limited to the following personnel ONLY and may not be delegated:

- Commanding Officer - Officer-in-Charge - Command Duty Officer - N2/N21 (SSO/ASSO) - D3/D3A (visits to training facilities) - N01/N6/N7 (visits to Bldg 3781) - D4/D46/D46D (visits concerning maintenance/AIS support) - SSO office will coordinate visits by personnel for SSO related issues. In the absence of the personnel designated above, N2/N21 may authorize visitor(s) access to any compound when deemed necessary and/or appropriate.

(2) Emergency personnel (fire, medical, police, etc.) will be granted immediate access to any building when responding to an emergency. Sufficient escorts will be assigned if feasible, but not at the expense of expedient response to the emergency. Only those personnel required for the specific emergency should be granted access (i.e. entry by uncleared police not normally required for response to fire alarms and medical emergencies). The Corry Station DoD Guard Force

Supervisor will determine which emergency personnel should be granted access for these emergencies.

(3) Navy Exchange vendors do not require advance notice, but must be escorted at all times.

(4) Personnel designated for PROXIMITY ACCESS

(WHITE

picture badge) do not require escort, but they should not be exposed to any classified material. Access to the classified compounds for PROXIMITY ACCESS personnel is permitted only in the performance of their official duties.

2. Access Eligibility. The CSM/SSO is responsible for determining a person's eligibility for access to classified information and for the issuance, accountability, and disposition of Security ID badges. CSM/SSO will publish guidance as required to ensure DoD guards and individuals concerned comply with the provisions of this chapter and ensure the integrity of the badge system. 11-2 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

a. Once an individual is determined eligible for access to classified information, that person may be indoctrinated, granted access and issued a Security ID Badge that identifies the individual s level of security clearance.

b. Individuals who enter or depart one of the classified compounds must display their Security ID Badge to the DoD guard on duty as proof of identification and access authorization.

c. The DoD guard may deny access if the badge is expired, disfigured, or does not belong to the individual in possession. These cases should be reported in an Incident Report and forwarded to the CSM/SSO.

3. Need-To-Know. The cognizant Director/Division Officer controls access to classified material by ensuring access is granted to an individual based on a strict need-to-know basis, and never as a matter of convenience. The fact that an individual possesses the appropriate type of badge does not automatically grant them access to ALL classified information of a particular classification level.

4. Escorts. Only personnel with CID Corry Station permanent picture Security ID Badges may escort uncleared personnel. Any requirement for other personnel to escort uncleared visitors must be coordinated in advance with the CSM/SSO.

a. The number of escorts required for a specific group of visitors depends on the circumstances. A single escort may be sufficient to control a large group of visitors that will remain

together during the visit. In contrast, several escorts may be required for a small group that will have to disperse once inside to complete their duties. The deciding factor is that the escort must be able to maintain sight of all visitors at all times.

b. Prior to assuming escort duty, the individual must understand the visitors requirements and decide if more escorts may be required.

c. The escort must also receive indoctrination by the BMAA and review the "ESCORT INDOCTRINATION SHEET" (Exhibit 7). All A school students are given an escort indoctrination and sign an acknowledgement statement when they receive their security badges, but they should be reminded about the procedures each time they are assigned as escorts.

11-3 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

5. Two-Person Rule (TPR)

a. The Director of Central Intelligence has eliminated the TPR requirement for personnel working in SCIFs after hours; however, several conditions remain in effect as follows:

(1) Individuals not assigned to CID Corry Station must make prior arrangements for after-hours entry with the appropriate directorate or divisional sponsor.

(2) Individuals entering or remaining in any of the SCIFs after normal building working hours must report to the DoD Guard and fill out the "After-Hours Access Log."

b. The Two-Person Rule remains in effect for the "Two-person Integrity" (TPI) of CMS material/equipment.

6. Description of Security ID Badges

a. Security ID access badges in use at this command are identified by the following general characteristics:

(1) All types of badges are rigid plastic with a badge clip affixed.

(2) A command logo in the upper left corner and unique serial number in the upper right corner on the front of the

badge.

(3) Permanent-type (retention) security ID access badges display a photo of the authorized holder on the front side with the holder s name printed beneath. Badges issued on a temporary basis are discussed in paragraph 7 b. (5) below.

(4) Student and Contractor personnel will be identified as such on their security ID badge. All others will be considered CID Corry Station Staff personnel.

b. The following is a description/purpose of individual types of security clearance ID badges issued:

(1) BLUE, with a photo of holder: issued to military and civilian command members (staff and student), select frequent visitors, and resident contractors, who are authorized access to Top Secret/Sensitive Compartmented Information(TS/SCI).

11-4 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

Contractors and students will be identified as such on the front of their badge.

(2) GRAY, with photo of holder: issued to military and civilian command members (staff and student), select frequent visitors, and resident contractors, whose access is limited to SECRET COLLATERAL information. Contractors and students will be identified as such on the front of their badge.

(3) RED: issued to UNCLEARED visitors who have a requirement to enter a classified compound to perform and authorized function. Uncleared visitors must be escorted at all times by an appropriately cleared BLUE or GRAY badge escort.

(4) WHITE, with photo of the holder: issued to the Fire Marshall and other select personnel who are authorized proximity access. Proximity access means the badge holder is authorized access to compounds without escort, but should not be granted access to classified information.

(5) The following sub-categories and variations of security ID badges are in use:

(a) The word, "TEMP" appearing in place of holder's photo: issued to BLUE and GRAY badge holders as authorized by the SSO ONLY. These are issued only to staff personnel who forget their permanent picture badge. Student personnel will

normally be required to return to their quarters and retrieve their security badge for entry.

(b) The word, "VISITOR" appearing in place of the holder's photo on BLUE or Gray badge: Issued to appropriately cleared military or government civilian personnel with approved visit requests. These badges are valid only for the period indicated on the badge.

(c) The word, "CONTRACTOR" appearing in place of the holder's photo on BLUE or GRAY badge: Issued to appropriately cleared contractor personnel who have approved visit requests.

7. Reciprocal Badge Agreement with NIOC Pensacola

a. CID Corry Station and NIOC Pensacola have a Memorandum of Agreement to accept each other s security ID badges as authorization for access to their classified spaces. The following conditions apply: 11-5 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

(1) Reciprocity only applies to staff members with permanent BLUE security ID badges.

(2) Visiting members must have a specific point of contact and purpose for the visit.

(3) Personnel meeting the above criteria will be granted unescorted access to the classified compounds at NIOCP and CID Corry Station using their permanent security ID badge. Visitor badges will not be required.

8. General Regulations for Protecting Security ID Badges

a. Security ID badges are to be used only to verify authorization for access to CID Corry Station classified compounds. They should not be used for any other identification purposes nor publicly displayed outside the confines of the classified compounds.

b. Under no circumstances will a badge-holder loan their badge to another individual. This act is considered a security violation and violators will be subject to disciplinary action.

c. Badges are the property of the U.S. Government. Willful destruction or defacing a badge is a violation of Section 499, Title 18, United States Code. Additionally, badge holders shall not alter the appearance of their badge in any manner. Affixing

seals, labels, tape or other markings/items to the badge is prohibited. Damaged, defaced, or altered security badges will be confiscated and returned to the SSO office.

d. When entering/exiting classified compounds, holders will approach the DoD guard displaying their badge in the vicinity of their face for easy recognition. While inside the classified compounds, badges will be clipped to the collar, pocket of outer garment, or suspended on a chain where they can be clearly seen.

e. Badges should be properly secured when not in the personal possession of the badge holder. Badges found not properly secured will be confiscated and returned to the SSO.

9. Visitor and Conference Attendee Access. The sponsoring director or division will advise CSM/SSO of any scheduled conferences and provide a list of expected attendees. Once security clearances are verified by the SSO office, appropriate

11-6 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

badges will be prepared and made available at the guard shack of the compound holding the conference unless other arrangements are made.

a. Permanently Certified Visitors: Various DoD organizations and government contractors have a requirement to send representatives to this command on a routine basis. The CSM/SSO from parent military commands and contractor facilities certify clearance access eligibility for their representatives for a period not to exceed one year.

b. The CSM/SSO office will prepare permanent picture badges for frequent visitors. These visitors may retain their security badges upon departure or leave them with the SSO for issue on their next visit.

c. Other less frequent visitors will be issued a temporary Visitor Badge upon arrival. Visitors with temporary Visitor Badges will retain them for the duration of the visit indicated on the badge and surrender them to the DoD guard when departing the classified compound for the last time.

10. Contractor Access. Directorates, Officers-in-Charge, Division Officers are responsible for the coordination of all contractor activities and contractor visits to their respective departments. Contractor personnel may not view material bearing the caveat "NO CONTRACT."

a. Resident contractor supporting CID Corry Station

programs are granted the level of access commensurate with their contract agreement and are given appropriate permanent picture badges. These personnel are indoctrinated on local security procedures when they receive their badge.

b. All other contractors shall be advised of the following restrictions:

(1) Not permitted at-large access to department areas/ spaces, or to department personnel.

(2) Will be provided access to classified information pertaining to contract project only.

(3) May not remove any classified material from the compound without specific authorization to do so.

11-7 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

(4) May not introduce cameras, film, magnetic media, computers, radio receivers, transmitting devices, or other items not associated directly with assigned tasks/terms of the contract.

11. Security Badges Found Adrift

a. Badges found will be turned in to DoD Guard at Compound 1 with a verbal report of the discovery incident (when/where/how discovered, etc.). The guard will generate an Incident Report and forward it, along with the badge, to the SSO.

12. Lost and Misplaced Badges. Each incident must be reported to the CSM/SSO office. The individual will be required to present a special request chit to the CSM/SSO explaining the circumstances and approved by their chain of command. Chits for staff members may be approved by their Directorate or Division Officer. Chits for students must be approved by D3/D3A. CSM/SSO will review the case, file a copy in the SSO file, and issue a replacement badge.

13. Procedures for Damaged Security Badges. The badge holder shall contact the CSM/SSO office and arrange for replacement. This applies whether the holder voluntarily requests replacement or is directed to do so by one of the DoD guards. If, in the DoD guard s opinion, the damage is serious enough to prevent adequate recognition or proper wear, the badge will be confiscated, and a new badge will be required prior to entry.

14. Procedures for Accessing and Securing SCIFs

a. Accessing the buildings. The first authorized person arriving at each building will be responsible for opening the building and deactivating the associated alarm system.

(1) Procedures for buildings 512, 513, 1099, 3744 and 3748: Advise the Security Guard at the appropriate Compound Gate that you want to access the building. Sign out the building alarm access key from the guard and open the main access door (X-07/09 combination lock), and switch the exterior magnetic door sign from locked to open. Once inside, insert

the alarm key in the access panel, turn it from secure to access, and remove the key. Return the key to the Security Guard and verify the zone has been placed in the access mode.

11-8 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

(2) Procedures for building 514: Advise the Security Guard at Compound 2 that you want to access the building. The guard will switch the appropriate zone alarms to the access mode. Open the main access door (X-09 combination lock) and switch the exterior magnetic door sign from locked to open.

(3) Procedures for building 3781: Building 3781 has three security areas. Area 1 encompasses all of Bldg 3781 except the two mechanical rooms (Rms 110 & 111). Area 2 is for Mechanical Rm 110 and Area 3 is for Mechanical Rm 111. The following procedures should be followed when accessing these three areas.

(a) MAIN ENTRANCE (Area 1) Access: Unlock the main access door (X-09 combination lock), log the building open on the SF-702, and switch the external magnetic door sign from locked to open. Open the door by entering the current

combination into the cipher lock next to the door. Once inside, enter your security access code into the alarm system keypad. If the correct code is entered within 30 seconds after opening the building, alarms will be switched to the access mode and no security alarms will be generated. After you have entered your security access code, call NAS Security (452-2453/3453) to advise that you have opened the building. If the correct security access code is not entered within 30 seconds after opening the building, the system will alarm internally and send an alarm indication to NAS Pensacola Security. Response will be in accordance with paragraph (d) below. You can silence the alarms by entering your security access code; NAS security should be called immediately to report the situation. Mechanical Rooms #110 and #111 (Areas 2 and 3) Access: Select the appropriate Area on the alarm panel and enter your security access code to disarm the alarm system. Once the alarm system is disabled, entrance to the mechanical room may be granted without escort. Once access is no longer required, secure the area and reactivate the alarms by entering the appropriate security access code on the alarm control panel.

(b) Securing the buildings. The last person to leave the building each day is responsible for properly securing the

building and placing the security alarms in the secure building has procedures and a checklist to assist with all rooms have been properly secured at the end of the Complete the appropriate building checklist and follow procedures below.

mode. Each ensuring day. the

11-9 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

(1) Procedures for buildings 512, 513, 1099, 3744 and 3748: Advise the Security Guard at the appropriate compound gate that you want to secure the building. Sign out the building access security alarm key from the guard. Insert the key into the access panel, turn it from access to secure, and remove the key. Lock the main access door (X-07/09 combination lock) and ensure the door will not open. Switch the external magnetic door sign from open to locked. Return the key to the

Security Guard and verify that all building alarms have been placed in the secure mode.

(2) Procedures for building 514: Lock the main access door (X-09 combination lock), ensure the door will not open, and switch the external magnetic door sign from open to locked. Advise the Security Guard at Compound 2 that you have secured the building and they will switch the zone alarms from access to secure.

(3) Procedures for building 3781: Note. Prior to securing the Main Entrance (Area 1), ensure that Areas 2 and 3 alarms are activated. If not, see procedures for accessing Areas 1 and 2 above. Call NAS Security (2-2453/3453) and advise them that you will be securing the building. Arm the alarms in accordance with system operating procedures. From this point, you have 30 seconds to secure the door before an alarm will be triggered. Lock the main access door (X-09 combination lock) and ensure the door will not open. Log the building closed on the SF-702 form and switch the external magnetic door sign from open to locked.

(c) Security Checks. After the alarms have been set, NAS Security Force will commence security checks in the following areas:

-Fences/gates surrounding Compounds 1, 2, and 3

-Area surrounding Bldg 3781 -Four external exit doors to building 3781 -PDS cable lockbox on Bldg 3781 external west wall.

These security checks must be conducted at least once each 8-hour shift. The Corry Station Guard Force Rover will make these checks and annotate the results in the logbook. If any door is found opened or unlocked, one of the SCI cleared guards will access the building. Uncleared Security Force personnel will NOT enter the space until a fully cleared individual is present.

11-10 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

(d) Alarm Response Procedures. The Intrusion Detection System (IDS) alarms are monitored at the following locations:

Bldgs 513, 3748 Compound 1 Gate Bldgs 512, 514, 3744, 1099 Compound 2 Gate Bldg 3781 NAS Security

Security force must respond to all valid alarms within 15 minutes. Response force for all building alarms, except Bldg 3781, will be initiated by DoD security guards in the appropriate compound guard building. NAS Security personnel will initiate response force for building 3781 alarms. In response to any alarms, security force personnel will be dispatched to investigate. An SCI cleared security guard should be contacted for assistance. Uncleared NAS Security Force personnel will remain at the unlocked door, but will NOT enter the space until a fully cleared individual is present. SCI cleared personnel may depart the area only after satisfactorily completing an internal security check, upon successfully resetting and activating the security alarm panel, and after the NAS Security Dispatcher verifies the alarm is reset. When the space is deemed clear, the authorized person will attempt to reset the alarm. If alarms cannot be reset, additional security measures such as posting guards or more frequent security checks should be implemented until the alarms are cleared and working properly. Problems of this nature should be brought to the immediate attention of CID Corry Station SSO, (452-6463) and the Guard Force Supervisor (452-6130).

(e) Incident Reports. Following any discrepancies noted during security checks or alarm activations described in paragraphs (c) and (d) above, an Incident Report will be

generated by an appropriate CID Corry Station assigned Security Guard using the approved incident report form. All incident reports will be forwarded to the SSO for further action.

(f) CDO Notification. If it becomes necessary to recall any CID Corry Station staff personnel to further investigate or take action on any noted security discrepancies or alarm activations, the CID Corry Station CDO should be contacted immediately (452-6512). They will refer to a recall list of personnel responsible for each building and contact the appropriate person. If there are further problems or indications that classified information has been compromised, the Security Manager/SSO should be contacted by the CDO. 11-11 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

EXHIBIT 7

ESCORT INDOCTRINATION SHEET ----------------------------------------------------------------

1. The importance of your assignment as an ESCORT cannot be overemphasized! Your job, however mundane it may seem at times, is to keep a CONSTANT watch on the uncleared individuals assigned to you while they remain inside a compound where classified information is stored.

2. The protection of classified information from unauthorized disclosure is TOP PRIORITY at CID Corry Station! When you assume the duties and responsibilities of an escort for uncleared personnel, you become a member of the "Command Physical Security Team" and are charged with doing everything within your power to ensure classified information/material IS NOT SUBJECTED TO UNAUTHORIZED DISCLOSURE (which is a security violation) TO UNCLEARED INDIVIDUALS UNDER YOUR ESCORT. You will be held accountable for your actions and for those of whom you are escorting.

3. Your duties and responsibilities as an escort are listed in paragraph 4 below; however, this list is not all-inclusive. In other words, if you have doubts in any given situation not covered below, do not hesitate to use common sense and request assistance from a nearby staff member, or contact your supervisor, if deemed necessary. CHECK IT OUT!! Always remember this; there is absolutely no such thing as a "dumb question" when it comes to the security and protection of classified information.

4. Duties and Responsibilities. Listed below are the types of permanent security access ID badges used by cleared staff and student members of this command, along with identification of applicable compounds/buildings they have access to:

-BADGE REQUIREMENT/ -CLEARANCE ACCESS LEVEL COMPOUND/BUILDING -BLUE/(TS/SCI) COMPOUND 1: BLDG 513, 3748 -COMPOUND 2: BLDG 512, 3744, 514 -COMPOUND 3: BLDG 1099 -MAST HALL: BLDG 3781 -GRAY/(SECRET COLLATERAL) COMPOUND 3: BLDG 516, 1099

11-A Enclosure (1)

CIDINST 5510.1 06 Apr 2007

a. RED badges are required for all uncleared visitors being escorted. A number of these are available for issue from the Compound Gate Guard. If more are required, the CSM/SSO should be notified. Ensure each visitor is entered into the "Visitor Logbook" and issue a Red visitor badge to each individual you are escorting.

b. As you enter the building, turn on the RED WARNING LIGHT SWITCH (located just inside the entrance door). This activates flashing red lights in passageway overhead; warning occupants that uncleared personnel are in the building.

c. Prior to entering a room, ALWAYS announce your presence by sounding off "UNCLEARED PERSONNEL." DO NOT attempt to enter the room before you receive permission to do so from proper authority, i.e., occupants, instructors, or office personnel.

d. MAINTAIN "LINE OF SIGHT" CONTACT AT ALL TIMES! An absolute MUST for every person you are escorting. The only exception to this rule is when a person desires to use the head. In this instance, you may wait outside the door in the passageway if the head facility has only one entrance/exit door.

(1) If a work crew must split up, you must find another escort (telephone your supervisor's office or ask a passerby to contact your supervisor's office for assistance). The crew must stay together until another escort arrives on the scene.

(2) It is considered a security violation if an uncleared person takes off and gets out of your line-of-sight. If this should occur, immediately report the incident to your supervisor, or to the CSM/SSO office (telephone, 2-6119 or 26480) and wait for instructions.

e. If uncleared individuals must work in OVERHEAD SPACES, take the following action:

(1) Before allowing workers access to overhead spaces, notify all occupants of surrounding rooms of same.

(2) Remember, you must maintain line-of-sight contact, which means you either have to go up into the overhead spaces with the workers or observe them from your position on the ladder.

11-A Enclosure (1)

CIDINST 5510.1 06 Apr 2007

f. The reading of books, magazines, or other items is strictly prohibited while escorting.

g. If a civilian worker/contractor-type person you are escorting directs any comments you feel are against Navy policy concerning race, sex, or harassment of any type, do not hesitate to inform your direct supervisor who will initiate appropriate corrective action.

h. In the event you are relieved as an escort, provide a detailed passdown briefing to your relief. Ensure your relief knows exactly who and how many uncleared individuals you are escorting and responsible for. Ensure the name and badge number of the new escort is provided to the Compound Gate Guard.

i. After checking individuals out at the post gatehouse, check the Visitor Logbook for any other escorted personnel remaining in the building. If no uncleared persons remain, secure the red flashing warning light when you re-enter the building.

j. On occasion, it is necessary for workmen with trucks and equipment to enter a compound through one of the external access gates. Prior approval must be obtained from the CSM/SSO. The BMAA must obtain the exterior gate key from the post guard on duty and unlock the external gate. As the escort, you must check all items carried by individuals entering and departing the compound and ensure each person entering the compound has been signed in at the post gatehouse and issued a RED visitor's badge.

________________________________________________________________

STATEMENT OF ACKNOWLEDGEMENT:

1. I have read the "Escort Indoctrination Sheet" and understand my duties and responsibilities when acting as an escort for uncleared personnel.

_________________________________________________ ___________ (Last Name, First, MI) (Signature) (Date)

11-A Enclosure (1)

CIDINST 5510.1 06 Apr 2007

CHAPTER 12 PROHIBITED MATERIAL IN CLASSIFIED COMPOUNDS

1. Policy. To enhance the security posture at this command, to preclude the unauthorized transmission of classified material, and to promote the safety of command members, certain personal items/material and electronic equipment may not be brought into, or taken out of, the classified compounds without proper authority. Any command-approved exceptions must be submitted by the CSM/SSO to the DOD Guard Lieutenant, who will subsequently advise the appropriate guard posts. Prohibited items are as follows:

a. Cameras, film, or other photographic equipment.

(1) A command-designated photographer will be allowed in a classified compound with photo equipment for official unclassified photographs. However, if the photographer is not cleared for access, the cognizant schoolhouse branch officer shall make arrangements for proper escort, guard notification, sanitation of spaces, etc.

(2) Certain staff members, specifically identified by the word CAMERA on their security badge, are authorized to

carry a camera in/out of the classified compounds and take unclassified photographs. The cameras authorized for this purpose are identified on an authorization list held by the compound Gate Guards.

(3) No classified photographs will be permitted without prior approval from the CSM/SSO.

a. Tape players, tape recorders, and tape cassettes.

b. CDs, DVDs, Game Disks, etc.

c. Radio transmitters.

(4) Two-way radios may be used by maintenance and BMAA personnel to coordinate alarm system maintenance and other evolutions when required.

(5) Standard radio receivers, with no recording features, are permitted in SCIF's. These should only be brought in for individual long-term use vice day-to-day entry/exit.

12-1 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

Items are subject to inspection by DoD guards and may be denied entry if their capability cannot be clearly determined . e. Cell phones, Beepers, Pagers, and Blackberry type devices.

(1) The CDO and emergency personnel are authorized to enter the classified compounds with these items when in the performance of official duties.

(2) In addition, the duty personnel listed below are authorized entry into the classified compounds with specific receive-only Pagers. Pagers authorized are identified on a

list held by the Compound Gate Guards. - Sexual Assault Victim Intervention (SAVI) - ISSM designated help-desk personnel

f. Television sets, VCRs, DVD recorders.

g. Computers, and any type of magnetic media (thumb Drive, floppy disks, disk packs and cartridges, tapes, reel-to-reel and tape cassettes, video and cartridge tapes, CD-ROMS including music disks).

(1) Laptop computers required for official use may be brought into the compounds when specifically authorized by the ISSM. The ISSM will be responsible for notifying the CID Corry Station DoD Guard Force Supervisor by e-mail or by including users and computers in the laptop authorization list.

h. Handheld calculators and PDA s with data ports .

i. "Sealed" mail (except when carried by authorized courier)

j. Firearms, ammunition, pepper spray, mace, or any item that can be construed to be a weapon.

k. Pyrotechnic (fireworks) devices or similar materials.

l. Flammable or volatile substances.

m. Incendiary devices.

2. Disposition of Confiscated Items

12-2 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

a. Contraband and prohibited items that are confiscated at compound gatehouses will be turned over to the CSM/SSO, with an associated incident report, for follow-up action/disposition.

b. Magnetic Media: Confiscated magnetic media and an associated incident report will also be turned over to the CSM/SSO. Confiscated magnetic media will then be turned over to the Command ISSM for further technical review and disposition.

3. Non-Training Items. Each day, DoD guards conduct a random search of items "carried" in and out of classified compounds. To reduce delays in pedestrian traffic flow, the following conditions and limitations apply:

a. Students: (1) Student personnel may not carry non-training or non-organizational related items in or out the classified compounds. Non-training items include:

(a) Gym clothes

(b) NEX/Commissary shopping bags

(c) Back-pack and tote-bags

(d) Seabag

(2) Students who are required to live off-base and have no car may obtain permission from their branch officer to bring gym gear in and out of classified compounds. Upon approval, the branch officer will issue the student an approved special request chit to show DoD guards on the way in and out.

(3) Students are not authorized to remove ANY training items or material from the classified compounds.

b. Staff: Staff personnel shall carry the minimum material required to perform their duties. Items of a purely personal nature are always subject to DoD guard inspection.

12-3 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

CHAPTER 13 PERSONNEL SECURITY CLEARANCES

1. Policy. The security standards applied to determine eligibility for access to classified information are designed to ensure a candidate s loyalty, reliability and trustworthiness. Personnel security clearance programs/policies are directed by references (a), (c), and (k).

2. Eligibility and Access Procedures. The CSM/SSO is responsible for obtaining verification of security clearance and access eligibility from DON CAF for all staff and student personnel. This involves initiating requests for requisite security investigations, tracking the status, requesting access authorization, and indoctrinating and granting access to qualified personnel. Access to classified information may be granted in one of the following ways.

a. Interim clearance and access may be granted when the request for the required investigation has been submitted and the individual has no issues associated with their case. Interim Clearances are effective for up to 180 days. If final access eligibility notification has not been received from DON CAF within the six-month time frame, the individual's access may be extended for another 180 days. The Commanding Officer is authorized to grant INTERIM COLLATERAL (Confidential, Secret, and Top Secret) clearance for staff and students. He has delegated this authority to the CSM/SSO. INTERIM clearance and access to SCI information can only be granted by DON CAF, who

will advise the CSM/SSO by making appropriate entries in the Joint Personnel Adjudication System (JPAS).

b. FINAL clearance and access is also granted only by DON CAF. The CSM/SSO will be notified by DoN CAF, via a JPAS notification, when personnel have received their FINAL clearance.

c. Most staff personnel and

School students have been

granted eligibility and access to classified information at their former command. These personnel are normally transferred in status to CID Corry Station, with message notification to the CSM/SSO. They can be granted access locally, based on this certification from their last command, as long as the requisite investigation is current.

13-1 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

3. Continuous Evaluation of Eligibility

a. An individual's eligibility for access to classified information will be evaluated continuously. Any significant information that could place in question an individual's loyalty, reliability, or trustworthiness, and any other significant personnel security factors must be reported to the CSM/SSO for follow-on investigation and reporting.

b. Appendix G of reference (a) contains

Adjudication

Guidelines and discusses the various categories of disqualifying and mitigating factors associated with clearance eligibility determinations.

c. Supervisors, co-workers, and Command members working in security, legal, and medical, must be quick to report unfavorable information. Individuals with personal problems (i.e., financial, medical or emotional difficulties) should be identified at an early stage and be guided to programs designed to counsel and assist them.

d. The CSM/SSO will advise DON CAF via a Security Access Eligibility Report (SAER) when issues surface relative to an individual s security clearance. Reference (l) provides guidance on SAER procedures.

4. Termination of Access to Classified Information. The Commanding Officer and Officer-in-Charge of the CID Learning Site Pensacola have the authority to deny or suspend access to classified information when an individual s behavior/conduct

suggests they may be unable or unwilling to protect classified information. DON CAF may also direct the revocation of security clearance and access based on information provided through security investigations, SAERs, or other official means. When unfavorable information is discovered, the Commanding Officer or Officer-in-Charge may choose to grant continued access, suspend the individual s access or have them debriefed for cause.

a. Suspension of Access. The Commanding Officer or Officer-in-Charge may suspend a person s access for up to 90 days. In these cases, access may be reinstated by the Commanding Officer or Officer-in-Charge any time within the 90-day period. If access is not reinstated within the 90-day period, the suspension becomes permanent and access can only be granted upon approval from DoN CAF.

13-2 Enclosure (1)

CIDINST 5510.1 06 Apr 2007

b. Debrief for Cause. The Commanding Officer or Officerin-Charge may have a person debriefed for cause when there is an obvious breech of standards or a threat to security. In these cases, access can only be reinstated with DoN CAF approval.

5. Revocation of Security Clearance. When DoN CAF determines that the individual no longer meets eligibility standards for a clearance, they will issue a Letter of Intent (LOI) to the individual via the Commanding Officer or Officer-in-Charge.

a. The CSM/SSO will serve as liaison between DoN CAF and the individual and will also assist the individual in obtaining applicable references and investigative files, and in preparing his/her rebuttal. The individual s rebuttal and proposed command endorsement with eligibility recommendation is then submitted to the Commanding Officer or Officer-in-Charge for submission to the DoN CAF.

b. After reviewing the rebuttal, DoN CAF will either reinstate the clearance, with or without conditions, or issue a Letter of Notification of Revocation (LON) to the individual. The individual has the option to appeal the LON by submitting a letter to the CNO, Personnel Security Appeals Board (PSAB), or requesting a personal appearance before an Administrative Judge (AJ) of the Defense Office of Hearings and Appeals (DOHA). In the latter option, the AJ will submit a report to the PSAB who will render a final decision.

c. The appeal to PSAB is the final step for COLLATERAL (Top Secret, Secret, Confidential) appeals. Individuals who are appealing SCI revocation are afforded a final opportunity for a

review of the records by the Director of Naval Intelligence (DNI).

13-3 Enclosure (1)

Você também pode gostar