Top Banner
Topic 6 Security Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and OPSEC. 6.3 DESCRIBE COMSEC equipment, material and administrative procedures. 6.4 DEFINE Physical, Transmission and Emission security. 6.5 DESCRIBE the OPSEC process. 6.6 DISCUSS Classification Guidance. 6.7 DEFINE Original Classification Authority. 6.8 DESCRIBE the limitations on classification and classification markings. 6.9 DESCRIBE the duties and responsibilities of SSO Navy 6.10 IDENTIFY terminology associated with the Special Security Officer duties and responsibilities 6.11 DESCRIBE the purpose of Joint Personnel Accountability System (JPAS)
34

Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Dec 18, 2015

Download

Documents

Camron Flynn
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Topic 6 SecurityTopic 6 SecurityEnabling Objectives

6.1 DISCUSS the origin of Communication Security and Operational Security.

6.2 DEFINE COMSEC, DoD COMSEC Policy, and OPSEC.

6.3 DESCRIBE COMSEC equipment, material and administrative procedures.

6.4 DEFINE Physical, Transmission and Emission security.

6.5 DESCRIBE the OPSEC process.

6.6 DISCUSS Classification Guidance.

6.7 DEFINE Original Classification Authority.

6.8 DESCRIBE the limitations on classification and classification markings.

6.9 DESCRIBE the duties and responsibilities of SSO Navy

6.10 IDENTIFY terminology associated with the Special Security Officer duties and responsibilities

6.11 DESCRIBE the purpose of Joint Personnel Accountability System (JPAS)

Page 2: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

What is COMSEC?What is COMSEC?

Page 3: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Communications Security (COMSEC) The protection resulting from all measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications, or to mislead unauthorized persons in their interpretation of the result of such possession and study. COMSEC includes:

-Crypto security - technically sound cryptosystems and their proper use

-Emission security (EMSEC) - intercept and analysis of compromising emanations

-Physical security - all physical measures necessary to safeguard classified equipment, material, and documents

-Traffic-flow security - conceal the presence and properties of valid messages on a network

-Transmission security (TRANSEC) - protect transmissions from interception and exploitation by means other than cryptoanalysis (e.g. frequency hopping and spread spectrum).

Communications Security (COMSEC) The protection resulting from all measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications, or to mislead unauthorized persons in their interpretation of the result of such possession and study. COMSEC includes:

-Crypto security - technically sound cryptosystems and their proper use

-Emission security (EMSEC) - intercept and analysis of compromising emanations

-Physical security - all physical measures necessary to safeguard classified equipment, material, and documents

-Traffic-flow security - conceal the presence and properties of valid messages on a network

-Transmission security (TRANSEC) - protect transmissions from interception and exploitation by means other than cryptoanalysis (e.g. frequency hopping and spread spectrum).

Page 4: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

COMSEC Equipment

KIV-7

KG-84A

KG-194KG-175

KG-40

Page 5: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Vintage COMSEC Equipment

German Lorenz cipher machine used during WWII for the

encryption of high-level general staff messages.

German Lorenz cipher machine used during WWII for the

encryption of high-level general staff messages.

The Enigma machine implemented

a complex electro-mechanical

polyalphabetic cipher to protect sensitive

communications.

The Enigma machine implemented

a complex electro-mechanical

polyalphabetic cipher to protect sensitive

communications.

Page 6: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Parts of COMSEC Material

• Classifications– Top Secret (TS)

– Secret (S)

– Confidential (C)

– Unclassified (U)

• Short Title– Ex. USKAC D 166 MOD 1 BC 18

Page 7: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Administrative Procedures

• Custody

• Page Check Requirements

• Watch-to-Watch inventory

Page 8: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.
Page 9: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Physical Security

• Need to Know

• CO promulgated access list

• Visitor’s Register (aka Visitor’s Log)

Page 10: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

COMSEC Insecurities

• Practices Dangerous to Security (PDS)

– Reportable

– Non-Reportable

Page 11: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

• Imitative Communications Deception

– ACP 122

• EEFI

• GINGERBREAD

• BEADWINDOW

Transmission Security

Page 12: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Emission Security

• Emission Control– EMCON Bill

Page 13: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

DoD COMSEC PolicyDoD COMSEC Policy

• Xmission of DoD information shall be protected through COMSEC measures

• COMSEC materials developed, acquired, operated, maintained and disposed of

through approved methods

• Ensure operational availability of commonly used COMSEC equipment during

crisis or contingencies

• COMSEC equipment shall be compatible with DoD approved key management

systems

• Account for controlled and classified cryptographic items

• COMSEC users and technicians properly trained

Note: Policy documents can be found on NIPRNET at http://www.cnss.gov;

SIPRNET at http://www.iad.nsa.smil.mil/resources/library/cnss_section/index.cfm

• Xmission of DoD information shall be protected through COMSEC measures

• COMSEC materials developed, acquired, operated, maintained and disposed of

through approved methods

• Ensure operational availability of commonly used COMSEC equipment during

crisis or contingencies

• COMSEC equipment shall be compatible with DoD approved key management

systems

• Account for controlled and classified cryptographic items

• COMSEC users and technicians properly trained

Note: Policy documents can be found on NIPRNET at http://www.cnss.gov;

SIPRNET at http://www.iad.nsa.smil.mil/resources/library/cnss_section/index.cfm

Page 14: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

"Even minutiae should have a place in our collection, for things of a seemingly trifling nature, when enjoined with others of a more serious cast, may lead to valuable conclusion." -George Washington, known OPSEC practitioner

"Even minutiae should have a place in our collection, for things of a seemingly trifling nature, when enjoined with others of a more serious cast, may lead to valuable conclusion." -George Washington, known OPSEC practitioner

Origin of OPSECOrigin of OPSEC

Page 15: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

A key action during the OPSEC process is to analyze potential vulnerabilities to forces.

It requires identifying any OPSEC indicators that could reveal critical information about

the operation, such as, increased troop movement.

A key action during the OPSEC process is to analyze potential vulnerabilities to forces.

It requires identifying any OPSEC indicators that could reveal critical information about

the operation, such as, increased troop movement.

Page 16: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.
Page 17: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

“Little minds try to defend everything at once, but sensible people look at the main point only; they parry the worst

blows and stand a little hurt if thereby they avoid a greater one. If you try to hold everything, you hold nothing”

Frederick the Great

Instructions to his generals, 1747

“Little minds try to defend everything at once, but sensible people look at the main point only; they parry the worst

blows and stand a little hurt if thereby they avoid a greater one. If you try to hold everything, you hold nothing”

Frederick the Great

Instructions to his generals, 1747

Page 18: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.
Page 19: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Original Classification AuthorityOriginal Classification Authority

• Designated by SECNAV or delegated authority

• SECNAV personally designates TOP SECRET OCAs

• SECNAV authorizes the CNO to designate SECRET OCAs

• OCA is not transferable

• OCA designated by virtue of their position

• Properly trained

• Duration of classification limited to 25 years

• Designated by SECNAV or delegated authority

• SECNAV personally designates TOP SECRET OCAs

• SECNAV authorizes the CNO to designate SECRET OCAs

• OCA is not transferable

• OCA designated by virtue of their position

• Properly trained

• Duration of classification limited to 25 years

Page 20: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Limitations on ClassificationLimitations on Classification

Classifiers shall not use classification to:

• Conceal violations of law, inefficiency or administrative error

• Prevent embarrassment to a person, organization or agency

• Restrain competition

• Prevent or delay the release of information that does not

require protection

• Classify, or use as a basis for classification, references to

classified documents, when the reference citation does not disclose

classified information

Classifiers shall not use classification to:

• Conceal violations of law, inefficiency or administrative error

• Prevent embarrassment to a person, organization or agency

• Restrain competition

• Prevent or delay the release of information that does not

require protection

• Classify, or use as a basis for classification, references to

classified documents, when the reference citation does not disclose

classified information

Page 21: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

This page is UNCLASSIFIED but marked SECRET for training purposes onlyThis page is UNCLASSIFIED but marked SECRET for training purposes only

Page 22: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Electronic Media MarkingsElectronic Media Markings

Page 23: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Duties and Responsibilities

• Secretary of the Navy

• Director of Naval Intelligence (CNO(N2))

•The Director, Security and Corporate Services (ONI-05 ) •SSO NAVY

Page 24: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Duties and Responsibilities

• Command Special Security Officer (SSO)

– SSO will be afforded direct access to the commanding officer

– Appointed in writing– U.S. citizen and either

a commissioned officer or a civilian employee GS-9 or above

Page 25: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Terminology

• Personnel Security Investigation

• National Agency Check

• National Agency Check with Local Agency and Credit Checks

• Single Scope Background Investigation

• Reinvestigation

• SSBI-PR

• Entrance National Agency Check

Page 26: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Terminology (cont)

• Electronic Questionnaires for Investigations Processing

• Electronic Personnel Security Questionnaire• Standard Form (SF) 86, Questionnaire for

National Security Positions• Department of the Navy Central Adjudication

Facility• Defense Security Service• Original Classification Authority

Page 27: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Joint PersonnelAccountability System

• The Joint Personnel Adjudication System (JPAS) is a DoD system that uses NIPRNET to connect all DoD security personnel around the world with their Central Adjudication Facility (CAF).

• The JPAS web site runs on a secured port with secured socket layer (SSL) 128-bit encryption.

Page 28: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Joint PersonnelAccountability System (cont)

• JAMS & JCAVS = JPAS– The Joint Adjudication Management System

(JAMS) provides the CAFs a single, integrated information system to assist the adjudication process through "virtual consolidation" and vastly improve dissemination of timely and accurate personnel security information to the warfighters and planners. It is a system designed for the adjudicative community by adjudicators.

Page 29: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Joint PersonnelAccountability System (cont)

• The Joint Clearance and Access Verification System (JCAVS) provides DoD security personnel the ability to instantaneously update other JCAVS users with pertinent personnel security clearance and access information in order to ensure the reciprocal acceptance of clearances throughout DoD.

• It is a system designed for security managers and security officers as representatives of that community.

Page 30: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Joint PersonnelAccountability System (cont)

User can view anyone’s

summary with SSN,

including one’s own

User can view anyone’s

summary with SSN,

including one’s own

Page 31: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Joint PersonnelAccountability System (cont)

Page 32: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

(AF only)

Joint Personnel Accountability System (cont)

Page 33: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

References

a) SECNAV M-5510.30, Department of the Navy (DON) Personal Security Program (PSP) Manual (June 2006)

b) SECNAV M-5510.36 Department of the Navy Information Security Program (June 2006)

Page 34: Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.

Foreign Security Markings Information Sheet

Pages 6-35 thru 6-37