IC Tech Spec for ICD/ICS

IC Tech Spec for ICD/ICS

UNCLASSIFIED TECHNICAL SPECIFICATIONS FOR CONSTRUCTION AND MANAGEMENT OF SENSITIVE COMPARTMENTED INFORMATION FACILITIES VERSION 1.2 IC Tech Spec‐for ICD/ICS 705 An Intelligence Community Technical Specification Prepared by the Office of the National Counterintelligence Executive April 23, 2012 UNCLASSIFIED UNCLASSIFIED Table of Contents Chapter 1. Introduction ................................................................................................................. 1 A. Purpose ................................................................................................................................ 1 B. Applicability ....................................................................................................................... 1 Chapter 2. Risk Management ........................................................................................................ 2 A. Analytical Risk Management Process ................................................................................ 2 B. Security in Depth (SID) ...................................................................................................... 3 C. Compartmented Area (CA) ................................................................................................. 4 Chapter 3. Fixed Facility SCIF Construction ................................................................................ 6 A. Personnel ............................................................................................................................. 6 B. Construction Security.......................................................................................................... 7 C. Perimeter Wall Construction Criteria ................................................................................. 8 D. Floor and Ceiling Construction Criteria ........................................................................... 11 E. SCIF Door Criteria ............................................................................................................ 11 F. SCIF Window Criteria ...................................................................................................... 12 G. SCIF Perimeter Penetrations Criteria ................................................................................ 13 H. Alarm Response Time Criteria for SCIFs within the U.S. ............................................... 14 I. Secure Working Areas (SWA).......................................................................................... 14 J. Temporary Secure Working Area (TSWA) ...................................................................... 14 Chapter 4. SCIFs Outside the U.S. and NOT Under Chief of Mission (COM) Authority ......... 20 A. General .............................................................................................................................. 20 B. Establishing Construction Criteria Using Threat Ratings ................................................. 20 C. Personnel ........................................................................................................................... 23 D. Construction Security Requirements ................................................................................ 24 E. Procurement of Construction Materials ............................................................................ 27 F. Secure Transportation for Construction Material ............................................................. 30 G. Secure Storage of Construction Material .......................................................................... 31 H. Technical Security ............................................................................................................ 31 I. Interim Accreditations ...................................................................................................... 31 i UNCLASSIFIED UNCLASSIFIED Chapter 5. SCIFs Outside the U.S. and Under Chief of Mission Authority ............................... 32 A. Applicability ..................................................................................................................... 32 B. General Guidelines............................................................................................................ 32 C. Threat Categories .............................................................................................................. 33 D. Construction Requirements ............................................................................................... 34 E. Personnel ........................................................................................................................... 35 F. Construction Security Requirements ................................................................................ 37 G. Procurement of Construction Materials ............................................................................ 39 H. Secure Transportation for Construction Material ............................................................. 41 I. Secure Storage of Construction Material .......................................................................... 42 J. Technical Security ............................................................................................................ 42 K. Interim Accreditations ...................................................................................................... 42 Chapter 6. Temporary, Airborne, and Shipboard SCIFs ............................................................. 43 A. Applicability ..................................................................................................................... 43 B. Ground-Based T-SCIFs .................................................................................................... 43 C. Permanent and Tactical SCIFS Aboard Aircraft .............................................................. 45 D. Permanent and Tactical SCIFs on Surface or Subsurface Vessels ................................... 47 Chapter 7. Intrusion Detection Systems (IDS) ............................................................................ 53 A. Specifications and Implementation Requirements ............................................................ 53 B. IDS Modes of Operation ................................................................................................... 57 C. Operations and Maintenance of IDS ................................................................................. 59 D. Installation and Testing of IDS ......................................................................................... 60 Chapter 8. Access Control Systems (ACS) ................................................................................. 62 A. SCIF Access Control......................................................................................................... 62 B. ACS Administration.......................................................................................................... 63 C. ACS Physical Protection ................................................................................................... 63 D. ACS Recordkeeping.......................................................................................................... 63 E. Using Closed Circuit Television (CCTV) to Supplement ACS........................................ 64 F. Non-Automated Access Control ....................................................................................... 64 ii UNCLASSIFIED UNCLASSIFIED Chapter 9. Acoustic Protection ................................................................................................... 65 A. Overview ........................................................................................................................... 65 B. Sound Group Ratings ........................................................................................................ 65 C. Acoustic Testing ............................................................................................................... 65 D. Construction Guidance for Acoustic Protection ............................................................... 66 E. Sound Transmission Mitigations ...................................................................................... 66 Chapter 10. Portable Electronic Devices (PEDs) .......................................................................... 68 A. Approved Use of PEDs in a SCIF..................................................................................... 68 B. Prohibitions ....................................................................................................................... 69 C. PED Risk Levels ............................................................................................................... 69 D. Risk Mitigation ................................................................................................................. 70 Chapter 11. Telecommunications Systems ................................................................................... 73 A. Applicability ..................................................................................................................... 73 B. Unclassified Telephone Systems ...................................................................................... 73 C. Unclassified Information Systems .................................................................................... 74 D. Using Closed Circuit Television (CCTV) to Monitor the SCIF Entry Point(s) ..............

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    163 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us