2026
Construction Site Security (CSS) Main components: - Answers 1) Personnel: SSM, SSC (Site Security
Coordinator), CST, CAG (Cleared Armed Guard), CE (Cleared Escorts)
2) Physical: Fences/lock barriers, CCTV/IDS, Access Control Facility (ACE), SSA (Secure Storage Area)
3) Other: Vetting, documenting activities, badges/biometrics, material procurement requirements,
material inspection
Why you need a CST: - Answers 1) Great Moscow Seal
2) USSR Embassies
3) DoS listening devices
Why are requirements for each project unique? - Answers 1) Location (Hawaii is different than Idaho)
2) Existing/non-existing SID
3) Size of facility
4) Complexity
5) End user
6) Type (Close/open storage)
7) Type of end user
SID - Answers Layers of security designed to enhance probability of detection prior to penetration
CSTs do what: - Answers 1) Surveillance of site/personnel
2) Document construction for SSM
3) Inspect work in progress
4) Inspect material for accreditation and clearances
5) Penetrations, TEMPEST considerations
6) Construction following CSP
CST knowledge: - Answers 1) Construction: Concrete, structural, carpentary, electrical, plumbing,
HVAC, finish work etc.
2) Security
Ideal is well rounded
! CST - Answers 1) Knowledge and experience
2) Dependability
3) A
4)
! Definition of CST - Answers To deter and detect clandestine (covert) technological surveillance
penetration attempts and ensure the security of our facilities while under construction
ICD-705 - Answers 3 pages.
Requires all SCIFs comply with physical and technical security requirements.
Replaced DCID 6/9
Applies to IC but not all SCIFs as DNI oversees SCI
ICD-705-1 - Answers Physical and Technical Standards
Protect against compromising emanations, inadvertent seeing/observing disclosure, forced entry,
superstitious placement
Threat assessment - Answers Determine threats, vulnerabilities, and security enhancements to
protect information to appropriate risk
*Location of fabrication does not exclude facility from security standards and review or approval by
AO
* Include in CSP - Answers OPSEC and INFOSEC begin when SCIF project begins
, Use SETL and NSA/IA list and balance vulnerability and probability
Consequence analysis as matter of cost
2 types of SID - Answers 1) Construction
2) Final SID, which is listed in FFC
Types of SID - Answers 1) Dedicated response force
2) Controlled building with access controls
3) Controlled office areas that surround facility
4) Fenced compound
3 Types of Compartmented Areas: - Answers I - view/process CI
II - discussions can take place
III - view, process, copy, print, account
AO roles and responsibilities: - Answers Security oversight of all SCIF and accreditations.
Pre-construction FFC - Answers Planning for early construction, helps develop CSP and used in
combination with threat assessment
FFC checklist: - Answers Applies to permanent "Fixed" facilities
AO roles and responsibilities: - Answers XXX
Will review design and construction details and potentially fly-out to inspect facility
SSM Roles and responsibilities: - Answers Ensure security compliance and develop CSP along with
SSO and AO, provides information on security requirements, potentially writes requirements, single
POC on security, reports to SSO, responsible for security of site, enforces ICD-705, access control and
manages CST(s), periodic inspections
CTTA - Answers Reviews designs and recommends countermeasures
All security site controls shall be documented in CSP: - Answers 1) Identity verification
2) Random searches at entry/exit points
3) Signs at entry points listing items (PEDs, electronic etc.)
4) Physical security barriers
5) Vehicle inspections
! Release version of CSP - Answers Needs to be in all paperwork so contractors know how to make
bids accurate
Should include countries person are authorized to work from
When does the CSP need to be developed and approved by: - Answers 30% design review (DoDM
5105.21)
Who is the only person that can change a CSP once approved? - Answers AO
CSP does and doesn't do what: - Answers Does: provide measures to secure construction (including
documents)
Does not: Provide details on project construction
Additional reason to have CST - Answers 1) Look for personnel compromised by foreign intel services
3 Wall types - Answers A - Standard
B - "Enhanced" - only difference is #9 10 gauge steel on wall
c - "Enhanced" - uses plywood in place of steel and moves one layer of drywall to outside wall
Why are walls painted floor to ceiling: - Answers Helps identify surreptitious (kept secret)
penetrations
True floor to ceiling is required becuase: - Answers It covers the requirement to have acoustic and
physical entries
*Slab is typically floor and ceiling can be pandeck
Where can you find best practices for emmenations? - Answers Best practices for architectural radio
frequency guide
Why screws penetrating foil is acceptable: - Answers Screws can use acoustic sealing and are their
own grounding
Each screw is like a tiny antenna but it's a cost vs. vulnerability assessment
Doors: - Answers Primary: Visitor control and access control