Storage of Monetary Funds: Changes and Updates


The storage requirements of secured monetary funds has been updated and revised in 2018 by the U.S. Department of Defense. These updates and revisions are summarized below and can be found in Department of Defense 7000.14-R Financial Management Regulation Volume 5, Chapter 3. The DoD administrative revisions—hyperlink format and updated policy memo—are not noted below.


In DoD 7000.14-R, a subparagraph has been amended to provide a little more clarification on determining cash requirements than in the previous version. Specifically including “managing foreign government contributions (burdensharing funds)” as a type of disbursement.


In addition to this revision, there have been two additions to DoD 7000.14-R. The first and most significant addition is a section on the establishment of the DoD’s Treasury Account Symbol (TAS) for disbursing officer (DO) cash to a cash/investment account that is outside of the U.S. Treasury. Both the Office of Management and Budget and the Treasury determined that TAS needs to be recorded for non-fiduciary, non-budgetary activities with government/federal sources or funds.


A TAS is created for each DoD component to “document the balance of DO cash held outside the Treasury.” Defense Finance and Accounting Services (DFAS) uses monthly SF 1219 data to report the DO cash to the proper Treasury Account Symbol. Below are the TASs for disbursing officer cash.


  1. 017 X 6950 disbursing officer cash: Department of Navy
  2. 021 X 6951 disbursing officer cash: Department of Army
  3. 057 X 6952 disbursing officer cash: Department of Air Force
  4. 097 X 6953 disbursing officer cash: Defense Agencies
  5. 096 X 6954 disbursing officer cash: Corps. Of Engineers (Civil)

The second addition ties in with the burdensharing revision mentioned above. An example is given at the end of the 7000.14-R for Foreign Currency Cash or Limited Depositary Account (LDA) Balance Requirements. A “Burdensharing Funds (If Applicable)” row has been added to the table.

Monetary Funds Lock and Storage Requirements

The monetary funds lock and storage requirements listed in DoD 7000.14-R remains unchanged from the previous version which are listed below.


  • Funds less than $7,500
    • Lock requirement(s): UL Std 768, Group 1R
    • Storage requirements: Vault (must be fire-resistant for two hours), Burglary resistant safe (if vault isn’t available), Class 5 GSA-approved container
      • Note: If GSA-approved container has been manufactured after 2007, it must have a FF-L-2740 or FF-L-2937 lock
  • Funds greater than $7,500 but less than $50,000
    • Lock requirement(s): UL Std 768, Group 1R
    • Storage requirements: Burglary resistant safe with UL TL-15 rating, Class 5 GSA-approved container
  • Funds greater than $50,000
    •  Lock requirement(s): UL Std 768, Group 1R
    • Storage requirements: Burglary resistant safe with UL TL-30 rating, Vault (must be fire-resistant for two hours)
X-10 Lock for GSA Approved Containers and Safes

Call 866-867-0306 or email [email protected]


Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.

Cannabis Initiatives Win 2020 Election

By Shelley Swearingen | November 5, 2020


On November 3rd, millions of Americans spoke loud and clear: they want legal weed. Five states placed marijuana legalization on their ballots this year, and marijuana won approval in all five state elections.


Montana, Arizona, and New Jersey approved the institution of recreational marijuana markets. Mississippi approved the creation of a medical market, and South Dakota approved the legalization for all various forms of use.


The creation of these new markets means millions of dollars in sales to entrepreneurs as well as a massive influx of tax dollars to local governments. The legalization of cannabis within these states could also have an influence on bordering neighbors.  

Projected Sales

Here’s a breakdown of projected sales per state:


StatePopulationProjected 1st year sales
Arizona7,300,000+ $375,000,000
Mississippi2,900,000+ $240,000,000
Montana1,100,000+ $217,000,000
New Jersey8,900,000+ $375,000,000
South Dakota884,659+ $1,500,000

Polls have shown historically that most Americans are in favor of legalizing marijuana for medicinal use, but the country is torn more evenly on the issue of recreational use. The results of these elections show that the country is viewing marijuana more favorably than previously.

Licensing

In Arizona, existing cannabis operators will automatically receive licensure within the recreational market, and an additional 26 licenses will be issued to social equity applicants.


In Mississippi, there is no ceiling on the number of licenses available to cannabis businesses, and these licenses are required to be issued prior to August 15, 2021. That’s a very quick timeline for the creation of a new market.


Montana will require all license holders to be residents, but like Mississippi, there is no limit to the number of licenses to be issued.


New Jersey currently has a robust medical marketplace, and these operators will probably have the first opportunity to apply or be grandfathered in to the new recreational system.


The licensing guidelines within the proposed legislation in South Dakota are vague and will more than likely cause litigation or require further clarification. One clear rule states that municipalities may not ban medical dispensaries, but may limit the number of operations within its borders.

Cannabis Facility Design & Security

It’s safe to assume these states will look to other states for guidance on the design of new compliance and regulation legislation. KL Security has worked with various cannabis companies nationwide of all sectors: craft growers, secure transporters, large scale grow operators, medicinal pharmacies, recreational dispensaries, etc. We have assisted license applicants in multiple states in their architectural and schematic design concepts and application. Whether you’re in the application process or construction planning phase, we are ready and willing to help make your operation successful by driving revenues while maintaining compliance.

Focus Areas:
  • Security Plans and Intelligent IP Camera Systems
  • Cash Safes and Cash Management
  • Cannabis Vaults & Secure Rooms
  • Transportation cages and security
  • BR Rated Glass Partitions and Display Cases
  • DEA Approved Security Safes

Call 866-867-0306 or email [email protected]

Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.

SOURCES:

SCIF Container Series | Part 9: Acoustic Protection Detail

The acoustic protection guidelines listed below are designed to protect classified conversations from being overheard outside a SCIF and not intended to protect against purposeful technical interception of audio communications. A SCIF structure and its ability to retain sound within the perimeter is rated using the Sound Transmission Class (STC).


Sound group ratings are divided into two groups: Sound Group 3 and Sound Group 4. All SCIF perimeters are designed and constructed with meeting the standards of Sound Group 3 or better in mind. Acoustic protection and perimeter construction specifications for Wall A, B, and C can be found in previous articles. 


Sound Group 3 has a STC 45 or better. In this sound group, loud speech from within the SCIF can be faintly heard but not understood outside the SCIF. To the unaided ear, normal speech is unintelligible. Sound Group 4 has a STC 50 or better. In this group, loud sounds within the SCIF can be heard with the human ear faintly or not at all outside the SCIF.

Acoustic Testing


Audio tests must be conducted to verify all acoustic protection standards are met. With approval by the AO, these tests may be instrumental or non-instrumental and the test method used must be noted in detail in the CSP. All non-instrumental tests must be approved by the AO. Only qualified personnel with training on audio testing techniques will be allowed to conduct instrumental acoustic tests.


With all doors closed, all SCIF perimeter walls and openings (air returns, doors, windows, etc.) must be tested along several points to ensure that either Sound Group 3 or 4 is met. All audio test sources must have a variable sound level output with the output frequency range including normal speech. Test speakers must be placed six feet from the test wall and four feet off the floor. As noted by Sound Group 3 and 4 respectively, audio gain of the test source must produce “loud or very loud speech”.


Instrumental testing can be performed to Noise Isolation Class (NIC) standards. These results must comply with NIC 40 for Sound Group 3 and NIC 45 for Sound Group 4.

Sound Transmission Mitigations

In most cases, SCIF perimeter construction and acoustic protection should provide the necessary protection for Sound Group 3. However, when Sound Group 3 or 4 can’t be met within the normal SCIF construction standards, there are supplemental mitigations used to protect classified discussions from being overheard.


These mitigations can include (but aren’t limited to):

  1. Structure enhancements can be used to increase the resistance of the perimeter to vibration at audio frequencies.
  2. SCIF design can include a perimeter location or stand-off distance. This prevents non-SCI-indoctrinated person(s) from traversing beyond the point where SCI discussions can be intercepted.
  3. In conjunction with an amplifier and speakers or transducers, sound masking devices can be used to generate and distribute vibrations/noise.
  4. Speakers and transducers must produce sound at a higher level than the voice conversations within the SCIF.
  5. Speakers and transducers must be placed close to or mounted on any paths that allow audio to leave the area including doors, windows, walls, vents, etc.
  6. Wires and transducers must be, to the greatest extent possible, located within the perimeter of the SCIF.
  7. During TSCM evaluations, the sound masking system will be subject to inspection.
  8. A speaker may be installed outside the SCIF if the AO determines the risk to be low and meets the following conditions:
    1. Cable exiting the SCIF must be encased within rigid conduit.
    2. Sound masking system must be subject to review during TSCM evaluations.
  9. For common walls, speakers/transducers must be placed in a location so the sound optimizes the acoustical protection.
  10. For all doors and windows, speakers/transducers must be placed close to the aperture of the window/door. The sound must be projected in a direction facing away from conversations.
  11. Once the speakers/transducers are in an optimal location, the system volume must be set and fixed. Volume level is determined and adjusted by listening to conversations outside the area to be protected. The speaker volume will then be adjusted until conversations are unintelligible from outside the SCIF.
  12. Sound-source generators must be located within the SCIF.
    1. AM/FM receiver cannot be present on sound-source generators.
    2. If the sound-source generator has the capability to record sound, that function must be disabled.
    3. The following are examples of government-owned/sponsored sound-source generators:
      1. Audio amplifier w/ standalone computer (no network connection)
      2. Audio amplifier w/ a cassette tape player, CD player, or digital audio player, or w/ digital audio tape (DAT) playback unit
      3. Integrated amplifier and playback unit incorporating any of the above music sources
      4. A noise generator or shift noise source generator using either white or pink noise

Does your facility require a SCIF? KL Security offers SCIF Container Solutions with panelized modular systems for scalable modular, portable, & mobile requirements.  We assist in the acquisition of modular facilities for DoD & Government Access Control and ICD705 SCIFs or SAPF facilities. We also assist with special access control planning and commercial business security.


Call 866-867-0306 or email [email protected] to see how the experts at KL Security can assist your facility in security needs.

Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities
SCIF Container Series | Part 1: Site Evaluation
SCIF Container Series | Part 2: Design Planning Checklist
SCIF Container Series | Part 3: Perimeter Wall Construction – Wall A
SCIF Container Series | Part 4: Perimeter Wall Specifications – Wall B
SCIF Container Series | Part 5: Perimeter Wall Specifications – Wall C
SCIF Container Series | Part 6: Vents and Ducts
SCIF Container Series | Part 7: Modular SCIFs
SCIF Container Series | Part 8.1: Intrusion Detection Systems
SCIF Container Series | Part 8.2: Intrusion Detection Systems

Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.

SCIF Container Series | Part 8.2: Intrusion Detection Systems

Integrated IDS and Remote Terminal Access


The United States government local area network (LAN) or wide area network (WAN) requires the AO’s CIO to be consulted before connecting an IDS. The IDS hosting system must be issued an Authority to Operate (ATO) by the agency’s CIO, following the FISMA Risk Management Framework that is outlined in NIST SP 800-53.


For IDS that have been already integrated into a networked system (LAN or WAN) the following requirements must be met:

  • System software must be installed on a host device that is logically and physically restricted to corporate/government elements cleared to the SCI level.
    • Host devices must be located in a Physically Protected Space. Protected space is defined as a locked room with walls, floor, and ceiling that form a solid physical boundary to which only SCI-cleared personnel have access to.
    • SCI-cleared personnel must escort any uncleared or personnel with less than SCI-clearance that require access to this space.
    • Door will use Commercial Grade 1 hardware fitted with high security key cylinder(s) in compliance with UL 437.
    • Room must be protected by UL Extent 3 burglar alarm system and access control (unless manned 24 hours).
  • All transmissions of system information over the LAN/WAN must be encrypted using National institute of Standards and Technology (NIST) FIPS 140-2, VPN, or closed and sealed conveyance. FIPS-197 (AES) can be used with AO approval.
  • All host system components and equipment must be isolated in a way that includes (but aren’t limited to):
    • Firewalls
    • Virtual Private Networks (VPNs)
    • Virtual Routing Tables
    • Other Application Level security mechanisms or similar enhancements that allow secure and private data transfers only between the PCU, host computer, remote terminal and monitoring station
  • Any components of the IDS are remotely programmable, continuous network monitoring is needed. Network monitoring includes auditing and reporting of all network intrusion detection and prevention systems.
  • A secondary communication path may be used to augment an existing data communication link to reduce search of data communication failures of less than five minute duration.
    • Supervision for a secondary communication path must be equivalent to that of a primary communication path
    • Secondary communication path can be wireless only if approved by the AO after consulting with the CTTA and/or the appropriate technical authority
  • A unique user ID and password is required for each individual granted access to system host computing devices or remote terminal. Passwords must be a minimum of 12 characters consisting of alpha, numeric, and special characters. The password must be changed every six months or utilize US Government Personal Identity Verification (PIV) Card or Common Access Card (CAC) with two factor certificate authentication.
  • Persons with IDS admin access must immediately notify the AO or designee of any unauthorized modifications.

Remote System terminals:


Remote system terminals must utilize AO approved role-based user permissions (e.g. Super User, SO, Guard). All USG installations must prohibit non SCI cleared personnel from modifying the IDS or ACS. Remote system terminals require an independent user ID and password in addition to the host login requirements. Host systems must log and monitor failed login attempts. All remote sessions must be documented and accessible to the AO upon request.


All host systems and PCUs must be patched and maintained to implement current firmware and security updates. USG systems must be in compliance with Information Assurance Vulnerability Alert (IAVA) guidance.


Requirements for IDS Systems Software Passwords:

  • Passwords must be a minimum of 12 characters consisting of alpha, numeric, and special characters
  • The password must be changed every six months or utilize US Government Personal Identity Verification (PIV) Card or Common Access Card (CAC) with two-factor certificate authentication

IDS Modes of Operation

The IDS must operate in two modes: armed or disarmed. With this system there must not be any remote capability for changing the two modes by a non-SCI cleared personnel. Changing the arming or disarming status must be limited to just SCI-indoctrinated persons.


When the system is in disarmed mode, normal entry into the SCIF, following all security procedures, will not cause an alarm to sound. A record must always be maintained of who is responsible for disarming the IDS. However, tamper circuits and emergency exit door circuits must remain in armed mode. The PCU must have the ability to allow certain alarm points to remain armed while other points are in disarmed status.


The IDS is placed into armed mode when the last person leaves the SCIF. A record must also be kept identifying the person who armed the system. When in armed mode, any unauthorized entry into the SCIF will cause an alarm to be immediately transmitted to the monitoring station.


Each failure of arming or disarming the system must be reported to the SCIF Security Manager. Records of these events will be kept for two years.

Maintenance Requirements and Zone Shunting/Masking Modes

If maintenance is performed on the system, the monitoring station must be notified and a log must be kept. All maintenance periods must be archived in the system. System maintenance can only be done by an SCI cleared IDS administrator of SCIF Security Officer (SO). When a point is shunted or masked for reasons other than system maintenance, it must be displayed as such at the monitoring station throughout the period the condition exists.


Any sensor that has been shunted must be reactivated upon the next change in status from armed to disarmed. A PIN is required, for maintenance purposes, to be established and controlled by the SCI cleared IDS administrator or SCIF SO. All procedures must be documented in the SCIF SOP. PEDs (portable electronic devices) are only allowed attachment to the system equipment for the purpose of system maintenance, repair and reporting. The PED attachment can either be temporary or permanent depending on system needs. The stand-alone PED must meet the following requirements:

  • Must be kept under control of SCI-cleared personnel
  • PED, when not in use, must be maintained in a Physically Protected Space
  • Mass storage devices containing SCIF alarm equipment details, configurations, or event data will be protected at an AO-approved appropriate level.

Capability for remote diagnostics, maintenance, or programming of IDE must be accomplished only by SCI-cleared personnel and must be logged/recorded. In the event of a power failure, the system will automatically transfer emergency electrical power sources without causing alarm activation. 24 hours of uninterrupted backup power is required and must be provided by batteries, an UPS (uninterruptible power supply), generators, or any combination. An audible or visual indicator at the PCU shall provide an indication of the primary or backup power source in use. Equipment at the monitoring station will visibly and audibly indicate a failure in a power source or a change in power source. As directed by the AO, the individual system that failed will be indicated at the PCU or monitoring station.

Monitoring Stations

In accordance with UL 2050, monitoring stations must be government-managed or one of the following:

  • AO-operated monitoring station
  • Government contractor monitoring station
  • National industrial monitoring station
  • Cleared commercial central station

All monitoring station employees must be eligible to hold a U.S. SECRET clearance. Operators must be trained in system theory and operation in order to effectively interpret certain system incidents and take appropriate actions.

Operations and Maintenance of IDS


Alarm Response


All alarm activations must be considered an unauthorized entry until it’s resolved. Response force will take appropriate steps to protect the SCIF, as permitted by a written support agreement, until SCI-indoctrinated individual(s) arrive to take control of the situation. The SCI-indoctrinated individual(s) must arrive in 60 minutes (in accordance with UL 2050) or a response time approved by the AO.


The individual(s), upon arrival, will conduct an internal inspection of the SCIF, attempt to determine the cause of the alarm activation, and reset the IDS prior to the departure of the response force.


System Maintenance


All maintenance and repair personnel that aren’t TOP SECRET-cleared and indoctrinated for SCIF access must be escorted during system repairs/maintenance. Repairs must be initiated by a service tech within four hours of the receipt of a request for service or trouble signal. Until repairs are completed or AO-approved alternate documented procedures are started, the SCIF will be continuously manned on a 24-hour basis by SCI-indoctrinated personnel.


Emergency-power battery maintenance should follow the manufacturer’s periodic maintenance schedule and procedures. Battery maintenance will be documented in the system’s maintenance logs and kept for two years. If a generator is used to provide emergency power, it must also be tested per the manufacturers recommended testing procedures. If the communications path is through a network, the network’s power source must also be tested.


Network Maintenance


The system administrators must maintain configuration control, make sure the latest operating security patches have been applied, and configure the system to provide a high level of security. Inside the United States, all network maintenance personnel within the SCIF shall be a U.S. person and be escorted by cleared SCIF individuals. Outside the U.S., network maintenance personnel must be U.S. TOP SECRET-cleared or U.S. SECRET-cleared and be escorted by SCIF personnel.


Installation and Testing of the IDS


All IDS installation and testing within the U.S must be performed by U.S. companies using U.S. citizens. Outside the U.S., installation and testing must be performed by personnel who are U.S. TOP-SECRET-cleared or U.S. SECRET-cleared and escorted by SCIF personnel. All IDS system components and elements must be installed in accordance with the IDS requirements listed in Part I and Part II, UL 2050, and the manufacturer’s instructions and standards.


Prior to operational use, acceptance testing must be conducted on all systems to provide assurance that they meet all requirements prior to SCIF accreditation. Semi-annual IDS testing must be conducted to ensure continued system performance. All records of testing and test performance must be maintained in accordance with documentation requirements.


All motion detection sensors must be tested to ensure proper activation of the sensor at a minimum of four steps (“trial”) at a rate of one step per second (30 inches ± 3 inches or 760 mm ± 80 mm per second). This test must be conducted by taking a four-step trial, stopping for three to five seconds and then taking another four-step trial. These trials must be repeated throughout the SCIF and from different directions. An alarm must activate at least three out of every four consecutive trials made by moving through the SCIF.


All HSS devices must also be tested to ensure that an alarm signal activates before the non-hinged side of the door opens beyond the thickness of the door. For example, a 1 ¾ inch thick door will activate an alarm signal before the door opens 1 ¾ inches. Each IDS equipment cover will be individually removed or opened to ensure there’s an alarm activation at the PCU or monitoring station in both secure and access modes. Tamper detection devices only need to be tested when installed. However, the AO may require more frequent testing of tamper circuits if needed. 


Does your facility require a SCIF? KL Security offers SCIF Container Solutions with panelized modular systems for scalable modular, portable, & mobile requirements.  We assist in the acquisition of modular facilities for DoD & Government Access Control and ICD705 SCIFs or SAPF facilities. We also assist with special access control planning and commercial business security.


Call 866-867-0306 or email [email protected] to see how the experts at KL Security can assist your facility in security needs.

Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities
SCIF Container Series | Part 1: Site Evaluation
SCIF Container Series | Part 2: Design Planning Checklist
SCIF Container Series | Part 3: Perimeter Wall Construction – Wall A
SCIF Container Series | Part 4: Perimeter Wall Specifications – Wall B
SCIF Container Series | Part 5: Perimeter Wall Specifications – Wall C
SCIF Container Series | Part 6: Vents and Ducts
SCIF Container Series | Part 7: Modular SCIFs
SCIF Container Series | Part 8.1: Intrusion Detection Systems


Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.