SCIF vs. SAPF

By: Colene King

 

SCIF and SAPF high security facilities appear identical and are used for the same function: to store, utilize, and discuss sensitive information. Their delineation occurs in their intended user.

 

 

When it comes to the construction of new SCIFs and SAPFs, there are strict guidelines that must be followed. These guidelines are laid out in the ICD 705 Technical Specifications (Tech Spec, for short). The Office of the Director of National Intelligence (ODNI) establishes the guidelines & standards set forth in the ICD 705. ODNI is responsible for the management, processing, and safeguarding of information for the United States.

 

Some of the construction items covered in the ICD 705 include:

  • Physical Security and Hardening
  • Acoustic Controls
  • Visual Controls
  • Alarms and Access Control
  • Electronic and TEMPEST Security

Prior to the roll out of the ICD 705 (2010), SCIFs and SAPFs were built with different standards and processes. When the Tech Spec came out, it created a set of mutually accepted standards to ensure the safeguarding of national security.

 

In 2004, the Department of Defense began using their own set of standards and processes for SAPFs to protect national security. The DoD followed the guidelines of a document titled JAFAN 6/9.

 

The intelligence community, on the other hand, had a different set of standards prior to the ICD 705 being released. Beyond that, each agency within the intelligence community followed their own set of standards when it came to classified information. This made it nearly impossible to repurpose a SCIF to be used by another agency. The facility would need to undergo a significant renovation to become usable by the new agency.

 

When the ICD 705 was created in 2010, each agency in the intelligence community adopted these standards. The adoption of uniform standards within the ICD 705 allowed SCIFs to be easily repurposed between agencies.

 

However, the DoD was a later adopter; it took six years for this organization to implement the Tech Specs. In 2016, the Department of Defense integrated ICD 705 into their own 5205.7 manual. This created more reciprocity between the Department of Defense and the Intelligence Community.

 

SCIFs and SAPFs are now both built to the same standards, however, some procedural standards for facility accreditation don’t align. Each facility appoints an Accrediting Official; this delegate is responsible for accrediting the space and entering the facility’s information into the national repository.

 

Although SCIFs and SAPFs aren’t identical, they are more reciprocal now than they’ve ever been. Whether you are looking for a SCIF or a SAPF, KL Security is here to help you along the way. You can trust us to stay current will any and all construction standards required to safeguard sensitive information.

 

For more information or to request a quote

Call 866-867-0306 or email [email protected]

KL Security Partnering With Adamo For All Your SCIF Needs

By: Colene King


 

It’s always refreshing to find a company that shares the same values as your own: a company that has a customer-focused culture and pays attention to exactly what the customer has in mind. KL Security is excited to announce that we have recently partnered with Adamo, a customer-focused company that is one of the world’s leading experts in advancing the security and the construction of SCIFs.

 

Adamo began in 1962 as a design and build general contractor. By 1982, they began designing and constructing classified spaces. By the 1990s, Adamo was focusing on the high-end security market. Adamo has designed and built more than 600 projects within their 60+ years of operation. Within each project, Adamo consistently strives for excellence and meets accreditation requirements.

 

The term “SCIF” stands for:

Sensitive

Compartmented

Information

Facilities

 

SCIFs are used as a site for sensitive and confidential information to be discussed or shared. They are utilized by government and private entities to protect information. A SCIF could be a secure room or data center that shields against electronic surveillance and prevents data leakage of sensitive information.

 

There are several security concerns that need to be addressed when building a SCIF:

 

– Physical Security and Hardening

– Acoustic Controls

– Visual Controls

– Alarms and Access Controls

– Electronic and TEMPEST Security

 

Each SCIF has to be built to very specific standards. These standards are all laid out in the ICD (Intelligence Community Directive) 705 Tech Spec manual. This manual is managed and maintained by ODNI (Office of the Director of National Intelligence). ODNI is in charge of managing, processing, and safeguarding information for the entire country. The purpose of the 705 policy is to create a set of mutually accepted standards that will safeguard national security information.

 

For a great explanation of the ICD 705 and ODNI, watch Adamo’s video linked below:

 


KL Security is excited to be offering Adamo’s line of Rapid SCIFs. This is a line of predesigned 20-foot ISO shipping containers that are ready to be built to the ICD 705 standards. These Rapid SCIFs allow the customer to skip over the lengthy design process and go straight to the design approval. Rapid SCIFs are the fastest and most cost-efficient option to build a secure space ensured to meet security requirements.


Check out Adamo’s quick video below on why a Rapid SCIF could be your best option:



Below are the 5 Rapid SCIF options KL Security will be offering:

Workstations
Accommodates 1-4 workstations and include a work surface plus two (2) shielded Cat 6 network connections per workstation.
Workstations – Accommodates 1-4 workstations and includes a work surface plus two (2) shielded Cat 6 network connections per workstation.

 

 

High-Density Workstations – Accommodates 5-8 workstations and includes a work surface plus two (2) shielded Cat 6 network connections per workstation.

 

 

Server Room – Built to hold up to four server racks (24”x36”), plus one (1) IT workstation with receptacle and 1 shielded Cat 6 network connection.
Conference Room – Serves as a meeting or briefing room to hold up to 8 people (no workstations). One dry-erase display wall included. Furnishings can be included for additional fee.
Storage Containers – Serves as a secure storage room. Includes 6 electrical receptacles.

Each of these 20-foot ISO shipping containers is built to ICD 705 standards.

 

Included in each Rapid SCIF:

– Intrusion Detection System

– Access Control System

– Video Surveillance (CCTV)

– Cooling System

– Unlimited Accreditation Consulting Support



To request full details for each Rapid SCIF, click the button below.



When beginning the design process for a SCIF, there are several requirements, regulations, and government directives that must be met. Upon recognizing the need for a SCIF, knowing where to begin and how to begin can seem daunting. Adamo’s construction experience and KL Security’s client service together pair to successfully guide the project every step of the way.


Our partners are the core of our mutual success. Our foundation is built on strong relationships with our partners, leading by example, listening to the needs of clients, and getting the job done right every time.


ICD 705 Tech Specs:

https://www.dni.gov/files/Governance/IC-Tech-Specs-for-Const-and-Mgmt-of-SCIFs-v15.pdf


SCIF Container Series | Part 9: Acoustic Protection Detail

The acoustic protection guidelines listed below are designed to protect classified conversations from being overheard outside a SCIF and not intended to protect against purposeful technical interception of audio communications. A SCIF structure and its ability to retain sound within the perimeter is rated using the Sound Transmission Class (STC).


Sound group ratings are divided into two groups: Sound Group 3 and Sound Group 4. All SCIF perimeters are designed and constructed with meeting the standards of Sound Group 3 or better in mind. Acoustic protection and perimeter construction specifications for Wall A, B, and C can be found in previous articles. 


Sound Group 3 has a STC 45 or better. In this sound group, loud speech from within the SCIF can be faintly heard but not understood outside the SCIF. To the unaided ear, normal speech is unintelligible. Sound Group 4 has a STC 50 or better. In this group, loud sounds within the SCIF can be heard with the human ear faintly or not at all outside the SCIF.

Acoustic Testing


Audio tests must be conducted to verify all acoustic protection standards are met. With approval by the AO, these tests may be instrumental or non-instrumental and the test method used must be noted in detail in the CSP. All non-instrumental tests must be approved by the AO. Only qualified personnel with training on audio testing techniques will be allowed to conduct instrumental acoustic tests.


With all doors closed, all SCIF perimeter walls and openings (air returns, doors, windows, etc.) must be tested along several points to ensure that either Sound Group 3 or 4 is met. All audio test sources must have a variable sound level output with the output frequency range including normal speech. Test speakers must be placed six feet from the test wall and four feet off the floor. As noted by Sound Group 3 and 4 respectively, audio gain of the test source must produce “loud or very loud speech”.


Instrumental testing can be performed to Noise Isolation Class (NIC) standards. These results must comply with NIC 40 for Sound Group 3 and NIC 45 for Sound Group 4.

Sound Transmission Mitigations

In most cases, SCIF perimeter construction and acoustic protection should provide the necessary protection for Sound Group 3. However, when Sound Group 3 or 4 can’t be met within the normal SCIF construction standards, there are supplemental mitigations used to protect classified discussions from being overheard.


These mitigations can include (but aren’t limited to):

  1. Structure enhancements can be used to increase the resistance of the perimeter to vibration at audio frequencies.
  2. SCIF design can include a perimeter location or stand-off distance. This prevents non-SCI-indoctrinated person(s) from traversing beyond the point where SCI discussions can be intercepted.
  3. In conjunction with an amplifier and speakers or transducers, sound masking devices can be used to generate and distribute vibrations/noise.
  4. Speakers and transducers must produce sound at a higher level than the voice conversations within the SCIF.
  5. Speakers and transducers must be placed close to or mounted on any paths that allow audio to leave the area including doors, windows, walls, vents, etc.
  6. Wires and transducers must be, to the greatest extent possible, located within the perimeter of the SCIF.
  7. During TSCM evaluations, the sound masking system will be subject to inspection.
  8. A speaker may be installed outside the SCIF if the AO determines the risk to be low and meets the following conditions:
    1. Cable exiting the SCIF must be encased within rigid conduit.
    2. Sound masking system must be subject to review during TSCM evaluations.
  9. For common walls, speakers/transducers must be placed in a location so the sound optimizes the acoustical protection.
  10. For all doors and windows, speakers/transducers must be placed close to the aperture of the window/door. The sound must be projected in a direction facing away from conversations.
  11. Once the speakers/transducers are in an optimal location, the system volume must be set and fixed. Volume level is determined and adjusted by listening to conversations outside the area to be protected. The speaker volume will then be adjusted until conversations are unintelligible from outside the SCIF.
  12. Sound-source generators must be located within the SCIF.
    1. AM/FM receiver cannot be present on sound-source generators.
    2. If the sound-source generator has the capability to record sound, that function must be disabled.
    3. The following are examples of government-owned/sponsored sound-source generators:
      1. Audio amplifier w/ standalone computer (no network connection)
      2. Audio amplifier w/ a cassette tape player, CD player, or digital audio player, or w/ digital audio tape (DAT) playback unit
      3. Integrated amplifier and playback unit incorporating any of the above music sources
      4. A noise generator or shift noise source generator using either white or pink noise

Does your facility require a SCIF? KL Security offers SCIF Container Solutions with panelized modular systems for scalable modular, portable, & mobile requirements.  We assist in the acquisition of modular facilities for DoD & Government Access Control and ICD705 SCIFs or SAPF facilities. We also assist with special access control planning and commercial business security.


Call 866-867-0306 or email [email protected] to see how the experts at KL Security can assist your facility in security needs.

Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities
SCIF Container Series | Part 1: Site Evaluation
SCIF Container Series | Part 2: Design Planning Checklist
SCIF Container Series | Part 3: Perimeter Wall Construction – Wall A
SCIF Container Series | Part 4: Perimeter Wall Specifications – Wall B
SCIF Container Series | Part 5: Perimeter Wall Specifications – Wall C
SCIF Container Series | Part 6: Vents and Ducts
SCIF Container Series | Part 7: Modular SCIFs
SCIF Container Series | Part 8.1: Intrusion Detection Systems
SCIF Container Series | Part 8.2: Intrusion Detection Systems

Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.

SCIF Container Series | Part 8.2: Intrusion Detection Systems

Integrated IDS and Remote Terminal Access


The United States government local area network (LAN) or wide area network (WAN) requires the AO’s CIO to be consulted before connecting an IDS. The IDS hosting system must be issued an Authority to Operate (ATO) by the agency’s CIO, following the FISMA Risk Management Framework that is outlined in NIST SP 800-53.


For IDS that have been already integrated into a networked system (LAN or WAN) the following requirements must be met:

  • System software must be installed on a host device that is logically and physically restricted to corporate/government elements cleared to the SCI level.
    • Host devices must be located in a Physically Protected Space. Protected space is defined as a locked room with walls, floor, and ceiling that form a solid physical boundary to which only SCI-cleared personnel have access to.
    • SCI-cleared personnel must escort any uncleared or personnel with less than SCI-clearance that require access to this space.
    • Door will use Commercial Grade 1 hardware fitted with high security key cylinder(s) in compliance with UL 437.
    • Room must be protected by UL Extent 3 burglar alarm system and access control (unless manned 24 hours).
  • All transmissions of system information over the LAN/WAN must be encrypted using National institute of Standards and Technology (NIST) FIPS 140-2, VPN, or closed and sealed conveyance. FIPS-197 (AES) can be used with AO approval.
  • All host system components and equipment must be isolated in a way that includes (but aren’t limited to):
    • Firewalls
    • Virtual Private Networks (VPNs)
    • Virtual Routing Tables
    • Other Application Level security mechanisms or similar enhancements that allow secure and private data transfers only between the PCU, host computer, remote terminal and monitoring station
  • Any components of the IDS are remotely programmable, continuous network monitoring is needed. Network monitoring includes auditing and reporting of all network intrusion detection and prevention systems.
  • A secondary communication path may be used to augment an existing data communication link to reduce search of data communication failures of less than five minute duration.
    • Supervision for a secondary communication path must be equivalent to that of a primary communication path
    • Secondary communication path can be wireless only if approved by the AO after consulting with the CTTA and/or the appropriate technical authority
  • A unique user ID and password is required for each individual granted access to system host computing devices or remote terminal. Passwords must be a minimum of 12 characters consisting of alpha, numeric, and special characters. The password must be changed every six months or utilize US Government Personal Identity Verification (PIV) Card or Common Access Card (CAC) with two factor certificate authentication.
  • Persons with IDS admin access must immediately notify the AO or designee of any unauthorized modifications.

Remote System terminals:


Remote system terminals must utilize AO approved role-based user permissions (e.g. Super User, SO, Guard). All USG installations must prohibit non SCI cleared personnel from modifying the IDS or ACS. Remote system terminals require an independent user ID and password in addition to the host login requirements. Host systems must log and monitor failed login attempts. All remote sessions must be documented and accessible to the AO upon request.


All host systems and PCUs must be patched and maintained to implement current firmware and security updates. USG systems must be in compliance with Information Assurance Vulnerability Alert (IAVA) guidance.


Requirements for IDS Systems Software Passwords:

  • Passwords must be a minimum of 12 characters consisting of alpha, numeric, and special characters
  • The password must be changed every six months or utilize US Government Personal Identity Verification (PIV) Card or Common Access Card (CAC) with two-factor certificate authentication

IDS Modes of Operation

The IDS must operate in two modes: armed or disarmed. With this system there must not be any remote capability for changing the two modes by a non-SCI cleared personnel. Changing the arming or disarming status must be limited to just SCI-indoctrinated persons.


When the system is in disarmed mode, normal entry into the SCIF, following all security procedures, will not cause an alarm to sound. A record must always be maintained of who is responsible for disarming the IDS. However, tamper circuits and emergency exit door circuits must remain in armed mode. The PCU must have the ability to allow certain alarm points to remain armed while other points are in disarmed status.


The IDS is placed into armed mode when the last person leaves the SCIF. A record must also be kept identifying the person who armed the system. When in armed mode, any unauthorized entry into the SCIF will cause an alarm to be immediately transmitted to the monitoring station.


Each failure of arming or disarming the system must be reported to the SCIF Security Manager. Records of these events will be kept for two years.

Maintenance Requirements and Zone Shunting/Masking Modes

If maintenance is performed on the system, the monitoring station must be notified and a log must be kept. All maintenance periods must be archived in the system. System maintenance can only be done by an SCI cleared IDS administrator of SCIF Security Officer (SO). When a point is shunted or masked for reasons other than system maintenance, it must be displayed as such at the monitoring station throughout the period the condition exists.


Any sensor that has been shunted must be reactivated upon the next change in status from armed to disarmed. A PIN is required, for maintenance purposes, to be established and controlled by the SCI cleared IDS administrator or SCIF SO. All procedures must be documented in the SCIF SOP. PEDs (portable electronic devices) are only allowed attachment to the system equipment for the purpose of system maintenance, repair and reporting. The PED attachment can either be temporary or permanent depending on system needs. The stand-alone PED must meet the following requirements:

  • Must be kept under control of SCI-cleared personnel
  • PED, when not in use, must be maintained in a Physically Protected Space
  • Mass storage devices containing SCIF alarm equipment details, configurations, or event data will be protected at an AO-approved appropriate level.

Capability for remote diagnostics, maintenance, or programming of IDE must be accomplished only by SCI-cleared personnel and must be logged/recorded. In the event of a power failure, the system will automatically transfer emergency electrical power sources without causing alarm activation. 24 hours of uninterrupted backup power is required and must be provided by batteries, an UPS (uninterruptible power supply), generators, or any combination. An audible or visual indicator at the PCU shall provide an indication of the primary or backup power source in use. Equipment at the monitoring station will visibly and audibly indicate a failure in a power source or a change in power source. As directed by the AO, the individual system that failed will be indicated at the PCU or monitoring station.

Monitoring Stations

In accordance with UL 2050, monitoring stations must be government-managed or one of the following:

  • AO-operated monitoring station
  • Government contractor monitoring station
  • National industrial monitoring station
  • Cleared commercial central station

All monitoring station employees must be eligible to hold a U.S. SECRET clearance. Operators must be trained in system theory and operation in order to effectively interpret certain system incidents and take appropriate actions.

Operations and Maintenance of IDS


Alarm Response


All alarm activations must be considered an unauthorized entry until it’s resolved. Response force will take appropriate steps to protect the SCIF, as permitted by a written support agreement, until SCI-indoctrinated individual(s) arrive to take control of the situation. The SCI-indoctrinated individual(s) must arrive in 60 minutes (in accordance with UL 2050) or a response time approved by the AO.


The individual(s), upon arrival, will conduct an internal inspection of the SCIF, attempt to determine the cause of the alarm activation, and reset the IDS prior to the departure of the response force.


System Maintenance


All maintenance and repair personnel that aren’t TOP SECRET-cleared and indoctrinated for SCIF access must be escorted during system repairs/maintenance. Repairs must be initiated by a service tech within four hours of the receipt of a request for service or trouble signal. Until repairs are completed or AO-approved alternate documented procedures are started, the SCIF will be continuously manned on a 24-hour basis by SCI-indoctrinated personnel.


Emergency-power battery maintenance should follow the manufacturer’s periodic maintenance schedule and procedures. Battery maintenance will be documented in the system’s maintenance logs and kept for two years. If a generator is used to provide emergency power, it must also be tested per the manufacturers recommended testing procedures. If the communications path is through a network, the network’s power source must also be tested.


Network Maintenance


The system administrators must maintain configuration control, make sure the latest operating security patches have been applied, and configure the system to provide a high level of security. Inside the United States, all network maintenance personnel within the SCIF shall be a U.S. person and be escorted by cleared SCIF individuals. Outside the U.S., network maintenance personnel must be U.S. TOP SECRET-cleared or U.S. SECRET-cleared and be escorted by SCIF personnel.


Installation and Testing of the IDS


All IDS installation and testing within the U.S must be performed by U.S. companies using U.S. citizens. Outside the U.S., installation and testing must be performed by personnel who are U.S. TOP-SECRET-cleared or U.S. SECRET-cleared and escorted by SCIF personnel. All IDS system components and elements must be installed in accordance with the IDS requirements listed in Part I and Part II, UL 2050, and the manufacturer’s instructions and standards.


Prior to operational use, acceptance testing must be conducted on all systems to provide assurance that they meet all requirements prior to SCIF accreditation. Semi-annual IDS testing must be conducted to ensure continued system performance. All records of testing and test performance must be maintained in accordance with documentation requirements.


All motion detection sensors must be tested to ensure proper activation of the sensor at a minimum of four steps (“trial”) at a rate of one step per second (30 inches ± 3 inches or 760 mm ± 80 mm per second). This test must be conducted by taking a four-step trial, stopping for three to five seconds and then taking another four-step trial. These trials must be repeated throughout the SCIF and from different directions. An alarm must activate at least three out of every four consecutive trials made by moving through the SCIF.


All HSS devices must also be tested to ensure that an alarm signal activates before the non-hinged side of the door opens beyond the thickness of the door. For example, a 1 ¾ inch thick door will activate an alarm signal before the door opens 1 ¾ inches. Each IDS equipment cover will be individually removed or opened to ensure there’s an alarm activation at the PCU or monitoring station in both secure and access modes. Tamper detection devices only need to be tested when installed. However, the AO may require more frequent testing of tamper circuits if needed. 


Does your facility require a SCIF? KL Security offers SCIF Container Solutions with panelized modular systems for scalable modular, portable, & mobile requirements.  We assist in the acquisition of modular facilities for DoD & Government Access Control and ICD705 SCIFs or SAPF facilities. We also assist with special access control planning and commercial business security.


Call 866-867-0306 or email [email protected] to see how the experts at KL Security can assist your facility in security needs.

Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities
SCIF Container Series | Part 1: Site Evaluation
SCIF Container Series | Part 2: Design Planning Checklist
SCIF Container Series | Part 3: Perimeter Wall Construction – Wall A
SCIF Container Series | Part 4: Perimeter Wall Specifications – Wall B
SCIF Container Series | Part 5: Perimeter Wall Specifications – Wall C
SCIF Container Series | Part 6: Vents and Ducts
SCIF Container Series | Part 7: Modular SCIFs
SCIF Container Series | Part 8.1: Intrusion Detection Systems


Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.

SCIF Container Series | Part 8.1: Intrusion Detection Systems


SCIFs, when not occupied, must be protected by Intrusion Detection Systems (IDS). This includes walls that are not at the SCI level. The AO will ultimately determine what security programs will be needed to protect these areas of a SCIF from unauthorized entry and movement. Doors that don’t have access control systems and/or not under visual surveillance must be monitored by the IDS. In the event of a power failure or other event that makes the IDS inoperable, SCI-indoctrinated personnel must occupy areas of the SCIF until the IDS system resumes normal operation. The SCIF emergency plan will address IDS failures.


All system plans must be approved by the AO. As a part of the SCIF accreditation package, a final system acceptance testing will be conducted.

IDS System Requirements


All IDS installation of monitoring stations and related components must comply with:

  • Underwriters Laboratories (UL) Standard for National Industrial Security Systems for the Protection of Classified Materials, UL 2050
    • Installation must comply with Extent 3 installation noted in UL 2050. This includes systems developed and used by the USG. These systems don’t need UL certification but should comply with Extent 3 installation.

Areas, as mentioned above, that do not need protection at the SCI level will be protected by IDS that includes UL 639 listed motion sensors and UL 634 listed High Security Switches (HSS) that meet UL Level II requirements and/or other AO-approved sensors. New SCIF accreditations must use UL Level II HSS. Until IDS modifications and upgrades are made, existing UL Level I HSS are authorized.


All cabling that extends beyond the SCIF perimeter must use Encrypted Line Security or be installed in a closed sealed metal conveyance (pipe, tube, or something constructed of Electrical Metallic Tubing (EMT), pipe conduit or rigid sheet metal ducting). All joints and connections on the closed metal conveyance must be permanently sealed around all surfaced by welding, epoxy, fusion, etc. Set screws cannot be used to seal the surface. This seal will provide a continuous bond between all components of the conveyance. If a service or pull box must be used, it must be approved with GSA approved combination padlock or an AO approved key lock.


SCIFs that share a common perimeter or have an established Co-Use Agreement (CUA) and support the same IC Element, may have the PCU (Premise Control Unit) programmed into multiple units or partitions. This allows each SCIF to function as individual control units for the IDS installed in several different areas or rooms that are independent of one another. Compliance conditions apply to the PCU, IDS, and partitions of the PCU equally. However, the PCU must be independent of IDS safeguarding non-UL 2050 certified areas.


For a monitoring station that is in charge of more than one IDS, there must be both audible and visible annunciation for each IDS. Fire, smoke, radon, water, and other systems must be independent of the IDS. If IDS incorporates an access control system (ACS), the ACS notifications must be subordinate in priority to IDS alarms. Without the application of specific countermeasures and the approval of the AO, systems cannot include audio or video monitoring. If monitoring systems contain auto-reset features, those features must be disabled.


All system key items and passwords must be protected and restricted to U.S. SCI-indoctrinated personnel. Alarm activations must be displayed locally until cleared by an authorized SCI-cleared individual. Determined by the AO, all IDS technical drawings, installation instructions, specifications, etc. will be restricted and documented in the CSP.

IDS False Alarms


An IDS false alarm is defined as any alarm signal transmitted in the absence of a confirmed intrusion that is caused by changes in the environment, equipment malfunction, or electrical disturbances. If false alarms exceed this requirement, a technical evaluation of the system must be conducted to determine the cause. Once evaluation is complete and the system is repaired or resolved, it must be documented. False alarms cannot exceed one alarm per 30-day period per IDS partition.

System Components


Sensors

  • All system sensors must be located within the SCIF
    • Exception: The AO can approve external sensors on the SCIF perimeter so long as they are installed in a closed sealed metal conveyance (pipe, tube, or something constructed of Electrical Metallic Tubing (EMT), pipe conduit or rigid sheet metal ducting). All joints and connections on the closed metal conveyance must be permanently sealed around all surfaced by welding, epoxy, fusion, etc. Set screws cannot be used to seal the surface. If a service or pull box must be used, it must be approved with GSA approved combination padlock or an AO approved key lock.
  • SCIF perimeter doors must be protected by an HSS and a motion detection sensor
  • Emergency exit doors will be alarmed and monitored 24 hours per day
  • When primary entrance door has a delay to allow changing the system mode of access, this delay must not exceed 30 seconds
  • Dual technology sensors are authorized when each technology transmits alarm conditions that are independent of the other technology.
  • Areas not protected at the SCI level will have a sufficient number of motion detection sensors or be approved by the AO. Sensors will consist of UL 639 listed motion sensors and UL 634 listed HSS that meet UL Level II requirements and/or other AO-approved equivalent sensors.
    • Note: For facilities outside the U.S. and in Category I and II countries, motion detection sensors above false ceilings or below false floors may be required by the AO.
  • Failed sensors will cause immediate and continuous alarm activation until this failure is investigated and corrected following procedures documented in the SCIF SOP/Emergency Action Plan.

Premise Control Units (PCUs)


Premise control Units (PCUs) must be located within a SCIF and access modes can only be started by SCIF personnel only. The access/secure switch will be restricted by a device or procedure that confirms authorized use. Within the SCIF, the cabling between sensors and the PCU must be dedicated to the system and comply with both national and local electrical codes and Committee for National Security Systems (CNSS) standards. However if the wiring can’t be contained within the SCIF, the wiring must meet the requirements in the External Transmissions Line Security section below.


At the PCU and/or monitoring station, alarm status must be continuously displayed with an alphanumeric display. Every effort must be made to install the alarm-monitoring panel in a location that prevents observation by unauthorized personnel. The PCU/monitoring station must identify and display all activated sensors. A change in power status (AC or backup) will also be indicated locally and at the monitoring station/PCU. All auto-alarm reset features of the IDS must be disabled.


Alarm notifications must be immediate and continuous for the following situations:

  • Intrusion Detection
  • Failed Sensor
  • Tamper Detection
  • Maintenance Mode
  • IDS Sensor Points masked or shunted during maintenance mode

In the events noted above, only SCI-indoctrinated personnel can reset the PCU and only after inspection and determination for the cause of the alarm. IDS transmission lines going from the SCIF to the monitoring station must meet the National Institute of Standards and Technology, Federal Information Processing Standards (FIPS) for certified encrypted lines. The FIPS standards employed must be noted in the UL 2050/CRZH Certificate or other certificate. PCUs that are certified under UL 1610 have to meet FIPS 197 or FIPS 140-2 encryption certification and method.


For PCUs certified under UL1076, only FIPS 140-2 will be the accepted encryption certification and method. The AO can approve alternative methods but must be noted in the IDS Certificate. IDS Admin that are SCI cleared must maintain and change all default profiles, PINs, or passcodes to a unique PIN/passcode.


More IDS specifications will be explored in the next installment: Part 8.2.


Does your facility require a SCIF? KL Security offers SCIF Container Solutions with panelized modular systems for scalable modular, portable, & mobile requirements.  We assist in the acquisition of modular facilities for DoD & Government Access Control and ICD705 SCIFs or SAPF facilities. We also assist with special access control planning and commercial business security.


Call 866-867-0306 or email [email protected] to see how the experts at KL Security can assist your facility in security needs.

Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities
SCIF Container Series | Part 1: Site Evaluation
SCIF Container Series | Part 2: Design Planning Checklist
SCIF Container Series | Part 3: Perimeter Wall Construction – Wall A
SCIF Container Series | Part 4: Perimeter Wall Specifications – Wall B
SCIF Container Series | Part 5: Perimeter Wall Specifications – Wall C
SCIF Container Series | Part 6: Vents and Ducts
SCIF Container Series | Part 7: Modular SCIFs

Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.


SCIF Container Series | Part 7: Modular SCIFs


Modular SCIFs include ground-based temporary SCIFs (T-SCIFs) and include those on mobile platforms such as trucks and trailers/containers, and SCIFs aboard aircrafts and on surface/subsurface vessels. Modular SCIFs are the most durable and cost effective SCIF in both design and manufacturing. These versatile SCIFs require less construction time than a regular SCIF and can be permanent or relocatable depending on your needs.


Modular SCIFs are constructed off-site and arrive at their destination wired and ready for use. Container SCIFs can be entirely customizable from height to interior details to meet your specialized needs. There’s no limit on size! The interior customization can include pre-wired workstations, conference areas, and secure server rooms.


T-SCIFs, depending on its design, can also be adjusted for future expansion to increase the longevity of your SCIF. For construction, modular SCIFs must adhere to the Fixed Facility checklist outlined in ICD 705. This includes acoustic, visual, and concealed entry protection. Cables and wires, as with all SCIFs, must be protected. Ground-based structures must be secured with GSA-approved locking devices and tamper-evident seals.


Depending on your needs, TEMPEST countermeasures, Intrusion Detection System (IDS), and Access Control System (ACS) are optional features that can be included in T-SCIFs. It is ultimately up to the CTTA to decide if TEMPEST countermeasures are needed with your T-SCIF. The AO and CTTA will collaborate to provide red/black separation and protected distribution guidance for field installation in accordance with NSTISSAM TEMPEST 2/95 and 2/95A, and CNSSI 7003.

Storage and Site Security


Like other SCIFs, T-SCIFs have specific requirements for overall security and storage of materials. Aircrafts and surface/subsurface vessels require more security measures than ground-based T-SCIFs. Secure materials used inside a container SCIF must be limited to what is needed for operation. These materials must be stored in GSA-approved containers. The AO may approve exceptions to the storage of secure material in GSA-approved containers for a period of time.


When this secure material is no longer needed, it must be destroyed by a means approved by the AO. Once a T-SCIF is no longer in use, a SCI security official will inspect the facility to ensure all secure material has been removed.


It’s the AO’s responsibility to evaluate and assess operational risks associated with the location of the T-SCIF, specifically if it’s located in an area that is not U.S.-controlled. The AO will determine what area offers the greatest degree of protection against forced entry.


The T-SCIF will have only one entrance that will be controlled and monitored during the T-SCIF’s hours of operation by SCI-indoctrinated persons via access roster. When in operation, the perimeter will be guarded by guards with a U.S. SECRET clearance. Hardened T-SCIFs with no open storage of secure material can be monitored by a U.S. SECRET-cleared individual.


Does your facility require a SCIF? KL Security offers SCIF Container Solutions with panelized modular systems for scalable modular, portable, & mobile requirements.  We assist in the acquisition of modular facilities for DoD & Government Access Control and ICD705 SCIFs or SAPF facilities. We also assist with special access control planning and commercial business security.

Call 866-867-0306 or email [email protected] to see how the experts at KL Security can assist your facility in security needs.

Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities
SCIF Container Series | Part 1: Site Evaluation
SCIF Container Series | Part 2: Design Planning Checklist
SCIF Container Series | Part 3: Perimeter Wall Construction – Wall A
SCIF Container Series | Part 4: Perimeter Wall Specifications – Wall B
SCIF Container Series | Part 5: Perimeter Wall Specifications – Wall C
SCIF Container Series | Part 6: Vents and Ducts


Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.

SCIF Container Series | Part 6: Vents and Ducts

Vents and ducts construction for a fixed facility SCIF have a short list of specifications that must be adhered to during construction.

All vents and ducts have to be protected to meet the acoustic and security requirements of the SCIF. The walls that surround the duct penetrations have to be finished to eliminate any opening between the duct(s) and the wall(s).


If vent or duct openings penetrate the SCIF perimeter walls and exceed 96 square inches, the vents/ducts must be protected with permanently attached bars or grills. Listed below are the detailed requirements for bars and grills.


  • Bars or grills are not required if one dimension of penetration measures less than six inches
  • If metal sound baffles or wave forms are permanently installed and set no farther apart than six inches in one dimension, then bars or grills are not required

If bars are used:


  • Bars must be a minimum of ½ inch diameter steel, welded vertically and horizontally six inches o.c.
    • Deviation of ½ inch in vertical and/or horizontal spacing is permissible

If grills are used, they must be made of:


  • ¾ inch-mesh, #9 (10 gauge), case-hardened, expanded metal; OR
  • Expanded metal diamond mesh, 1 ½ inch #10 (1 ⅜ inch by 3 inch openings, 0.093 inch thickness, with at least 80% open design) tamperproof; OR
  • Welded wire fabric (WWF) 4×4 W2.9xW2.9 (6 gauge smooth steel wire welded vertically and horizontally 4 inches o.c.)

If bars, grills, or metal baffles/waveforms are required for your SCIF, an access port will have to be installed inside the secure SCIF perimeter. This access port will allow visual inspection of all the bars, grills, or metal baffles/waveforms for signs of security risks.


If the area outside the SCIF is controlled (SECRET or equivalent space), the access port can be installed outside the perimeter. However, the port must be secured with an AO-approved high-security lock and must be noted in the FFC. 


Does your facility require a SCIF? KL Security offers SCIF Container Solutions with panelized modular systems for scalable modular, portable, & mobile requirements.  We assist in the acquisition of modular facilities for DoD & Government Access Control and ICD705 SCIFs or SAPF facilities. We also assist with special access control planning and commercial business security.


Call 866-867-0306 or email [email protected] to see how the experts at KL Security can assist your facility in security needs.

Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities
SCIF Container Series | Part 1: Site Evaluation
SCIF Container Series | Part 2: Design Planning Checklist
SCIF Container Series | Part 3: Perimeter Wall Construction – Wall A
SCIF Container Series | Part 4: Perimeter Wall Specifications – Wall B
SCIF Container Series | Part 5: Perimeter Wall Specifications – Wall C

Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.

SCIF Container Series | Part 5: Perimeter Wall Specifications – Wall C

Wall C is suggested to be used for Plywood. The list below and accompanying diagram list all construction specifications for Wall C.
  • Three layers of Gypsum Wall Board (GWB) ⅝ inch-thick
    • Two layers on the uncontrolled side
      • Sound group 4
    • One layer over min. ½” plywood on the controlled side
      • CTTA recommended countermeasures: (foil backed GWB or a layer of approved Ultra Radiant R-Foil) must be put up for RF shielding. In accordance with IAW, the foil will be located between the layer of plywood and GWB
  • ½” Plywood attached 8’ vertical by 4’ horizontal to 16 gauge studs using glue and #10 steel tapping screws at 12 o.c.
  • Gypsum Wall Board must be mounted to the Plywood with screws and avoiding contact with studs to ease any acoustic flanking path
  • 16 gauge continuous track (top and bottom) with anchors at 32” on center max.)
    • Bed will be in a continuous bead of acoustical sealant
  • Fire safe non-shrink grout, or acoustic sealant in all voids above/below track on both sides of the wall
  • Entire wall shall be finished and painted from true floor to ceiling


Does your facility require a SCIF? KL Security offers SCIF Container Solutions with panelized modular systems for scalable modular, portable, & mobile requirements.  We assist in the acquisition of modular facilities for DoD & Government Access Control and ICD705 SCIFs or SAPF facilities. We also assist with special access control planning and commercial business security.


Call 866-867-0306 or email [email protected] to see how the experts at KL Security can assist your facility in security needs.


Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities
SCIF Container Series | Part 1: Site Evaluation
SCIF Container Series | Part 2: Design Planning Checklist
SCIF Container Series | Part 3: Perimeter Wall Construction – Wall A
SCIF Container Series | Part 4: Perimeter Wall Specifications – Wall B

Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.

SCIF Container Series | Part 4: Perimeter Wall Specifications – Wall B

Wall B is suggested to be used for a Fixed Facility SCIF that is Open Storage without SID. The list below and accompanying diagram list all construction specifications for Wall B.
  • Three layers of Gypsum Wall Board (GWB) ⅝ inch-thick
    • One layer on the uncontrolled side
    • Two layers on the controlled side
    • Acoustic protection: Sound Class 3
  • Wallboard must be attached to 3 ⅝ inch-wide 16 gauge metals studs or wooden 2×4 studs placed no less than 16” on center
  • 16 gauge continuous track (top and bottom) with anchors at 32” on center maximum in continuous bead of acoustical sealant
For Expanded Metal:
  • Three-quarter inch mesh, #9 (10 gauge) expanded metal must be affixed to the interview side of all SCIF perimeter wall studs
  • Expanded metal must be spot-welded to the studs every six inches along each vertical stud at the ceiling and floor
  • Hardened screws with one inch washers or hardened clips should be used in lieu of welding to fasten metal to the studs
    • Screws must be applied every six inches along each vertical stud at the ceiling and floor
  • Fastening method must be noted in the FFC
  • Entire wall must be finished and painted from floor to ceiling

 

Does your facility require a SCIF? KL Security offers SCIF Container Solutions with panelized modular systems for scalable modular, portable, & mobile requirements.  We assist in the acquisition of modular facilities for DoD & Government Access Control and ICD705 SCIFs or SAPF facilities. We also assist with special access control planning and commercial business security.


Call 866-867-0306 or email [email protected] to see how the experts at KL Security can assist your facility in security needs.


Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities
SCIF Container Series | Part 1: Site Evaluation
SCIF Container Series | Part 2: Design Planning Checklist
SCIF Container Series | Part 3: Perimeter Wall Construction – Wall A

Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.

SCIF Container Series | Part 3: Perimeter Wall Construction – Wall A

Wall A is suggested to be used for these Fixed Facility SCIFs: Closed Storage, Secure Working Area (SWA), Continuous Operation, or Open Storage with SID. The list below and accompanying diagram list all construction specifications for Wall A.
  • Three layers of Gypsum Wall Board (GWB) ⅝ inch-thick
    • One layer on the uncontrolled side
    • Two layers on the controlled side
    • Acoustic protection: Sound Class 3
  • Wallboard must be attached to 3 ⅝ inch-wide 16 gauge metals studs or wooden 2×4 studs placed no less than 16” on center
  • 16 gauge continuous track (top and bottom) with anchors at 32” on center maximum in continuous bead of acoustical sealant
  • Interior two layers of wallboard must be mounted so seams do not align
  • Acoustic fill 3 ½” (89 mm) sound attenuation material, fastened to prevent sliding down and leaving void at the top
  • Top and bottom of each wall must be sealed with acoustic sealant where it meets the slab
  • Fire safe non-shrink grout or acoustic sealant in all voids above/below track both sides of partition
  • Entire wall must be finished and painted from floor to ceiling
  • Any electrical or communications outlets required on the perimeter wall must be surface mounted


Does your facility require a SCIF? KL Security offers SCIF Container Solutions with panelized modular systems for scalable modular, portable, & mobile requirements.  We assist in the acquisition of modular facilities for DoD & Government Access Control and ICD705 SCIFs or SAPF facilities. We also assist with special access control planning and commercial business security.


Call 866-867-0306 or email [email protected] to see how the experts at KL Security can assist your facility in security needs.

Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities
SCIF Container Series | Part 1: Site Evaluation
SCIF Container Series | Part 2: Design Planning Checklist

Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.