Communication Security (COMSEC) - NCMS

advertisement
Section Eight:
Communication Security (COMSEC)
Note: All classified markings contained within this presentation are for training purposes only.
Communications Security (COMSEC)
Overview
•
Communications Security (COMSEC)
– A series of countermeasures used to prevent unauthorized attempts to
access U.S. technology and national security information by securing
voice and data communication and ensuring its authentication
•
COMSEC Equipment
– NSA-approved encryption devices are used to protect classified
information that traverses a network or area of lesser control (i.e. over
the internet or in between two secure rooms)
– The lead time for acquiring COMSEC equipment typically ranges from
30 to 60 days
– It is important to incorporate this lead time in the project planning
phase
•
Common types of NSA-approved encryptors include:
–
–
–
–
–
General Dynamics Encryptors
L-3 Communications
Safe Net (Mykotronx)
Sypris
ViaSat
Communications Security (COMSEC)
Access Requirements
•
Due to the unique sensitivity of COMSEC material, special
eligibility requirements must be met
– Non-U.S. citizens, including resident aliens, are not eligible for
access
•
An appropriate U.S. Department of Defense (DoD) final
security clearance is required for access to COMSEC
information, cryptographic material and operational keys
for other encryption devices
– Access by an individual with an interim Top Secret clearance is
permissible, but only at the Secret level
•
A cryptographic access briefing is required prior to accessing
– Top Secret and Secret keying material and authenticators that
are designated CRYPTO
– Classified cryptographic media that represent, describe or
implement classified cryptographic logic
Communications Security (COMSEC)
Access Requirements
•
Prior to disclosure of COMSEC information, personnel must
understand the sensitivity of the COMSEC system and their personal
responsibility to support it
–
This is accomplished through access briefings and periodic updates
•
Personnel are not authorized to disclose to anyone not approved for
COMSEC/ CRYPTO access the fact that any feature of design or
construction of equipment has a cryptographic application
•
Extreme care must be exercised in the receipt and disposition of
COMSEC and cryptographic information
–
•
Only appropriately briefed and authorized personnel are permitted access
Classified COMSEC information will be marked, stored, controlled
and, when authorized, destroyed, shipped or transmitted outside
{Company} facilities in accordance with instructions issued by the
NSA Central Office of Record
Communications Security (COMSEC)
Transmitting and Receiving
•
Secure Telephone Units
– The Secure Telephone Equipment provides a means by which
classified telephone conversations, up to TOP SECRET, when
authorized, can take place
– Assistance is available for the acquisition, installation, and
programming of these units by contacting the Security Department
•
Secure Facsimiles
– Secure facsimile equipment is available to transmit and receive
classified information
– Information sent should be limited to the Top Secret Collateral
level
•
Hand-carrying COMSEC material outside the {Company} for
valid contract-related activities requires
– The user must have prior COMSEC Administrator authorization
– A courier authorization
Communications Security (COMSEC)
Information Control
•
All NATO transactions must be reported to the NATO
Control Officer
– Control includes retrieval, safeguarding, controlling,
accounting for, and properly disposing of NATO material
•
All TOP SECRET transactions must be reported to the TOP
SECRET Control Officer (TSCO) or alternate
– Control includes logging, transferring material, and
accounting for reproductions made within the {Company}
– Request for assistance should be made at least three days
prior to the actual transaction
Communications Security (COMSEC)
Reporting
•
All persons who deal in any way with COMSEC material are
responsible for immediately reporting any of the following to
the Security Department
– The compromise, possible compromise, loss (known or suspected),
unauthorized access or other violation of the security regulations
– The unauthorized destruction of classified or accountable COMSEC
information
– Any damage to classified or accountable COMSEC information that
raises the possibility of sabotage
– The emergency disposition of classified COMSEC information
– A CRYPTO Card left unattended in the STE terminal
Download