topic 6 security enabling objectives 6.1 discuss the origin of communication security and...
TRANSCRIPT
![Page 1: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/1.jpg)
Topic 6 SecurityTopic 6 SecurityEnabling Objectives
6.1 DISCUSS the origin of Communication Security and Operational Security.
6.2 DEFINE COMSEC, DoD COMSEC Policy, and OPSEC.
6.3 DESCRIBE COMSEC equipment, material and administrative procedures.
6.4 DEFINE Physical, Transmission and Emission security.
6.5 DESCRIBE the OPSEC process.
6.6 DISCUSS Classification Guidance.
6.7 DEFINE Original Classification Authority.
6.8 DESCRIBE the limitations on classification and classification markings.
6.9 DESCRIBE the duties and responsibilities of SSO Navy
6.10 IDENTIFY terminology associated with the Special Security Officer duties and responsibilities
6.11 DESCRIBE the purpose of Joint Personnel Accountability System (JPAS)
![Page 2: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/2.jpg)
What is COMSEC?What is COMSEC?
![Page 3: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/3.jpg)
Communications Security (COMSEC) The protection resulting from all measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications, or to mislead unauthorized persons in their interpretation of the result of such possession and study. COMSEC includes:
-Crypto security - technically sound cryptosystems and their proper use
-Emission security (EMSEC) - intercept and analysis of compromising emanations
-Physical security - all physical measures necessary to safeguard classified equipment, material, and documents
-Traffic-flow security - conceal the presence and properties of valid messages on a network
-Transmission security (TRANSEC) - protect transmissions from interception and exploitation by means other than cryptoanalysis (e.g. frequency hopping and spread spectrum).
Communications Security (COMSEC) The protection resulting from all measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications, or to mislead unauthorized persons in their interpretation of the result of such possession and study. COMSEC includes:
-Crypto security - technically sound cryptosystems and their proper use
-Emission security (EMSEC) - intercept and analysis of compromising emanations
-Physical security - all physical measures necessary to safeguard classified equipment, material, and documents
-Traffic-flow security - conceal the presence and properties of valid messages on a network
-Transmission security (TRANSEC) - protect transmissions from interception and exploitation by means other than cryptoanalysis (e.g. frequency hopping and spread spectrum).
![Page 4: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/4.jpg)
COMSEC Equipment
KIV-7
KG-84A
KG-194KG-175
KG-40
![Page 5: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/5.jpg)
Vintage COMSEC Equipment
German Lorenz cipher machine used during WWII for the
encryption of high-level general staff messages.
German Lorenz cipher machine used during WWII for the
encryption of high-level general staff messages.
The Enigma machine implemented
a complex electro-mechanical
polyalphabetic cipher to protect sensitive
communications.
The Enigma machine implemented
a complex electro-mechanical
polyalphabetic cipher to protect sensitive
communications.
![Page 6: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/6.jpg)
Parts of COMSEC Material
• Classifications– Top Secret (TS)
– Secret (S)
– Confidential (C)
– Unclassified (U)
• Short Title– Ex. USKAC D 166 MOD 1 BC 18
![Page 7: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/7.jpg)
Administrative Procedures
• Custody
• Page Check Requirements
• Watch-to-Watch inventory
![Page 8: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/8.jpg)
![Page 9: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/9.jpg)
Physical Security
• Need to Know
• CO promulgated access list
• Visitor’s Register (aka Visitor’s Log)
![Page 10: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/10.jpg)
COMSEC Insecurities
• Practices Dangerous to Security (PDS)
– Reportable
– Non-Reportable
![Page 11: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/11.jpg)
• Imitative Communications Deception
– ACP 122
• EEFI
• GINGERBREAD
• BEADWINDOW
Transmission Security
![Page 12: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/12.jpg)
Emission Security
• Emission Control– EMCON Bill
![Page 13: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/13.jpg)
DoD COMSEC PolicyDoD COMSEC Policy
• Xmission of DoD information shall be protected through COMSEC measures
• COMSEC materials developed, acquired, operated, maintained and disposed of
through approved methods
• Ensure operational availability of commonly used COMSEC equipment during
crisis or contingencies
• COMSEC equipment shall be compatible with DoD approved key management
systems
• Account for controlled and classified cryptographic items
• COMSEC users and technicians properly trained
Note: Policy documents can be found on NIPRNET at http://www.cnss.gov;
SIPRNET at http://www.iad.nsa.smil.mil/resources/library/cnss_section/index.cfm
• Xmission of DoD information shall be protected through COMSEC measures
• COMSEC materials developed, acquired, operated, maintained and disposed of
through approved methods
• Ensure operational availability of commonly used COMSEC equipment during
crisis or contingencies
• COMSEC equipment shall be compatible with DoD approved key management
systems
• Account for controlled and classified cryptographic items
• COMSEC users and technicians properly trained
Note: Policy documents can be found on NIPRNET at http://www.cnss.gov;
SIPRNET at http://www.iad.nsa.smil.mil/resources/library/cnss_section/index.cfm
![Page 14: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/14.jpg)
"Even minutiae should have a place in our collection, for things of a seemingly trifling nature, when enjoined with others of a more serious cast, may lead to valuable conclusion." -George Washington, known OPSEC practitioner
"Even minutiae should have a place in our collection, for things of a seemingly trifling nature, when enjoined with others of a more serious cast, may lead to valuable conclusion." -George Washington, known OPSEC practitioner
Origin of OPSECOrigin of OPSEC
![Page 15: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/15.jpg)
A key action during the OPSEC process is to analyze potential vulnerabilities to forces.
It requires identifying any OPSEC indicators that could reveal critical information about
the operation, such as, increased troop movement.
A key action during the OPSEC process is to analyze potential vulnerabilities to forces.
It requires identifying any OPSEC indicators that could reveal critical information about
the operation, such as, increased troop movement.
![Page 16: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/16.jpg)
![Page 17: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/17.jpg)
“Little minds try to defend everything at once, but sensible people look at the main point only; they parry the worst
blows and stand a little hurt if thereby they avoid a greater one. If you try to hold everything, you hold nothing”
Frederick the Great
Instructions to his generals, 1747
“Little minds try to defend everything at once, but sensible people look at the main point only; they parry the worst
blows and stand a little hurt if thereby they avoid a greater one. If you try to hold everything, you hold nothing”
Frederick the Great
Instructions to his generals, 1747
![Page 18: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/18.jpg)
![Page 19: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/19.jpg)
Original Classification AuthorityOriginal Classification Authority
• Designated by SECNAV or delegated authority
• SECNAV personally designates TOP SECRET OCAs
• SECNAV authorizes the CNO to designate SECRET OCAs
• OCA is not transferable
• OCA designated by virtue of their position
• Properly trained
• Duration of classification limited to 25 years
• Designated by SECNAV or delegated authority
• SECNAV personally designates TOP SECRET OCAs
• SECNAV authorizes the CNO to designate SECRET OCAs
• OCA is not transferable
• OCA designated by virtue of their position
• Properly trained
• Duration of classification limited to 25 years
![Page 20: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/20.jpg)
Limitations on ClassificationLimitations on Classification
Classifiers shall not use classification to:
• Conceal violations of law, inefficiency or administrative error
• Prevent embarrassment to a person, organization or agency
• Restrain competition
• Prevent or delay the release of information that does not
require protection
• Classify, or use as a basis for classification, references to
classified documents, when the reference citation does not disclose
classified information
Classifiers shall not use classification to:
• Conceal violations of law, inefficiency or administrative error
• Prevent embarrassment to a person, organization or agency
• Restrain competition
• Prevent or delay the release of information that does not
require protection
• Classify, or use as a basis for classification, references to
classified documents, when the reference citation does not disclose
classified information
![Page 21: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/21.jpg)
This page is UNCLASSIFIED but marked SECRET for training purposes onlyThis page is UNCLASSIFIED but marked SECRET for training purposes only
![Page 22: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/22.jpg)
Electronic Media MarkingsElectronic Media Markings
![Page 23: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/23.jpg)
Duties and Responsibilities
• Secretary of the Navy
• Director of Naval Intelligence (CNO(N2))
•The Director, Security and Corporate Services (ONI-05 ) •SSO NAVY
![Page 24: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/24.jpg)
Duties and Responsibilities
• Command Special Security Officer (SSO)
– SSO will be afforded direct access to the commanding officer
– Appointed in writing– U.S. citizen and either
a commissioned officer or a civilian employee GS-9 or above
![Page 25: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/25.jpg)
Terminology
• Personnel Security Investigation
• National Agency Check
• National Agency Check with Local Agency and Credit Checks
• Single Scope Background Investigation
• Reinvestigation
• SSBI-PR
• Entrance National Agency Check
![Page 26: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/26.jpg)
Terminology (cont)
• Electronic Questionnaires for Investigations Processing
• Electronic Personnel Security Questionnaire• Standard Form (SF) 86, Questionnaire for
National Security Positions• Department of the Navy Central Adjudication
Facility• Defense Security Service• Original Classification Authority
![Page 27: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/27.jpg)
Joint PersonnelAccountability System
• The Joint Personnel Adjudication System (JPAS) is a DoD system that uses NIPRNET to connect all DoD security personnel around the world with their Central Adjudication Facility (CAF).
• The JPAS web site runs on a secured port with secured socket layer (SSL) 128-bit encryption.
![Page 28: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/28.jpg)
Joint PersonnelAccountability System (cont)
• JAMS & JCAVS = JPAS– The Joint Adjudication Management System
(JAMS) provides the CAFs a single, integrated information system to assist the adjudication process through "virtual consolidation" and vastly improve dissemination of timely and accurate personnel security information to the warfighters and planners. It is a system designed for the adjudicative community by adjudicators.
![Page 29: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/29.jpg)
Joint PersonnelAccountability System (cont)
• The Joint Clearance and Access Verification System (JCAVS) provides DoD security personnel the ability to instantaneously update other JCAVS users with pertinent personnel security clearance and access information in order to ensure the reciprocal acceptance of clearances throughout DoD.
• It is a system designed for security managers and security officers as representatives of that community.
![Page 30: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/30.jpg)
Joint PersonnelAccountability System (cont)
User can view anyone’s
summary with SSN,
including one’s own
User can view anyone’s
summary with SSN,
including one’s own
![Page 31: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/31.jpg)
Joint PersonnelAccountability System (cont)
![Page 32: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/32.jpg)
(AF only)
Joint Personnel Accountability System (cont)
![Page 33: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/33.jpg)
References
a) SECNAV M-5510.30, Department of the Navy (DON) Personal Security Program (PSP) Manual (June 2006)
b) SECNAV M-5510.36 Department of the Navy Information Security Program (June 2006)
![Page 34: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and](https://reader036.vdocument.in/reader036/viewer/2022062515/56649d145503460f949e85d2/html5/thumbnails/34.jpg)
Foreign Security Markings Information Sheet
Pages 6-35 thru 6-37