{"id":601,"date":"2020-09-03T05:31:00","date_gmt":"2020-09-03T05:31:00","guid":{"rendered":"http:\/\/www.klsecurity.com\/blog\/?p=601"},"modified":"2020-08-26T16:01:25","modified_gmt":"2020-08-26T16:01:25","slug":"scif-container-series-part-4-perimeter-wall-specifications-wall-b","status":"publish","type":"post","link":"https:\/\/www.klsecurity.com\/blog\/scif-container-series-part-4-perimeter-wall-specifications-wall-b\/","title":{"rendered":"SCIF Container Series | Part 4: Perimeter Wall Specifications &#8211; Wall B"},"content":{"rendered":"\n<h5>Wall B is suggested to be used for a Fixed Facility SCIF that is Open Storage without SID. The list below and accompanying diagram list all construction specifications for Wall B.<\/h5>\n\n\n\n<ul><li>Three layers of Gypsum Wall Board (GWB) \u215d inch-thick<ul><li>One layer on the uncontrolled side<\/li><\/ul><ul><li>Two layers on the controlled side<\/li><\/ul><ul><li>Acoustic protection: Sound Class 3<\/li><\/ul><\/li><li>Wallboard must be attached to 3 \u215d inch-wide 16 gauge metals studs or wooden 2&#215;4 studs placed no less than 16\u201d on center<\/li><li>16 gauge continuous track (top and bottom) with anchors at 32\u201d on center maximum in continuous bead of acoustical sealant<\/li><\/ul>\n\n\n\n<h5>For Expanded Metal:<\/h5>\n\n\n\n<ul><li>Three-quarter inch mesh, #9 (10 gauge) expanded metal must be affixed to the interview side of all SCIF perimeter wall studs<\/li><li>Expanded metal must be spot-welded to the studs every six inches along each vertical stud at the ceiling and floor<\/li><li>Hardened screws with one inch washers or hardened clips should be used in lieu of welding to fasten metal to the studs<ul><li>Screws must be applied every six inches along each vertical stud at the ceiling and floor<\/li><\/ul><\/li><li>Fastening method must be noted in the FFC<\/li><li>Entire wall must be finished and painted from floor to ceiling<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"768\" src=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/K.L.SecurityWallB-1024x768.png\" alt=\"\" class=\"wp-image-626\" srcset=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/K.L.SecurityWallB-1024x768.png 1024w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/K.L.SecurityWallB-300x225.png 300w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/K.L.SecurityWallB-768x576.png 768w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/K.L.SecurityWallB-1536x1152.png 1536w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/K.L.SecurityWallB-1200x900.png 1200w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2020\/08\/K.L.SecurityWallB.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n<p>\u00a0<\/p>\n<p>Does your facility require a <a href=\"https:\/\/www.klsecurity.com\/index.php\/products\/safes\/gsa-approved-safes.html?applications=40\" target=\"_blank\" rel=\"noreferrer noopener\">SCIF<\/a>? KL Security offers SCIF Container Solutions with panelized modular systems for scalable modular, portable, &amp; mobile requirements. \u00a0We assist in the acquisition of modular facilities for DoD &amp; Government Access Control and ICD705 SCIFs or SAPF facilities. We also assist with special access <a href=\"https:\/\/www.klsecurity.com\/index.php\/consulting\" target=\"_blank\" rel=\"noreferrer noopener\">control planning and commercial business security<\/a>.<\/p>\n\n\n<br><p>Call 866-867-0306 or email <a href=\"mailto:contact@klsecurity.com\">contact@klsecurity.com<\/a> to see how the experts at KL Security can assist your facility in security needs.<\/p><br>\n\n\n\n<h6><a rel=\"noreferrer noopener\" href=\"https:\/\/www.dni.gov\/files\/NCSC\/documents\/Regulations\/Technical-Specifications-SCIF-Construction.pdf\" target=\"_blank\">Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities<\/a><\/h6>\n\n\n\n<h5><a rel=\"noreferrer noopener\" href=\"https:\/\/www.klsecurity.com\/blog\/scif-container-series-part-1-site-evaluation\/\" target=\"_blank\">SCIF Container Series | Part 1: Site Evaluation<\/a><\/h5>\n\n\n\n<h5><a rel=\"noreferrer noopener\" href=\"https:\/\/www.klsecurity.com\/blog\/scif-container-series-part-2-design-planning-checklist\/\" target=\"_blank\">SCIF Container Series | Part 2: Design Planning Checklist<\/a><\/h5>\n\n\n\n<h5><a href=\"https:\/\/www.klsecurity.com\/blog\/scif-container-series-part-3-perimeter-wall-construction-wall-a\/\" target=\"_blank\" rel=\"noreferrer noopener\">SCIF Container Series | Part 3: Perimeter Wall Construction &#8211; Wall A<\/a><\/h5>\n\n\n\n<p>Information has been gathered from sources deemed reliable but not guaranteed and is subject to change without notice. The information contained in this site is provided for informational purposes only.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wall B is suggested to be used for a Fixed Facility SCIF that is Open Storage without SID. The list below and accompanying diagram list all construction specifications for Wall B. Three layers of Gypsum Wall Board (GWB) \u215d inch-thick One layer on the uncontrolled side Two layers on the controlled side Acoustic protection: Sound &hellip; <a href=\"https:\/\/www.klsecurity.com\/blog\/scif-container-series-part-4-perimeter-wall-specifications-wall-b\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">SCIF Container Series | Part 4: Perimeter Wall Specifications &#8211; Wall B<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":596,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[242],"tags":[246,243,248,247,244,142,245],"_links":{"self":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/601"}],"collection":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/comments?post=601"}],"version-history":[{"count":8,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/601\/revisions"}],"predecessor-version":[{"id":652,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/601\/revisions\/652"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/media\/596"}],"wp:attachment":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/media?parent=601"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/categories?post=601"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/tags?post=601"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}