1 / 34

Topic 6 Security Enabling Objectives

Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and OPSEC. 6.3 DESCRIBE COMSEC equipment, material and administrative procedures.

nolen
Download Presentation

Topic 6 Security Enabling Objectives

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and OPSEC. 6.3 DESCRIBE COMSEC equipment, material and administrative procedures. 6.4 DEFINE Physical, Transmission and Emission security. 6.5 DESCRIBE the OPSEC process. 6.6 DISCUSS Classification Guidance. 6.7 DEFINE Original Classification Authority. 6.8 DESCRIBE the limitations on classification and classification markings. 6.9 DESCRIBE the duties and responsibilities of SSO Navy 6.10 IDENTIFY terminology associated with the Special Security Officer duties and responsibilities 6.11 DESCRIBE the purpose of Joint Personnel Accountability System (JPAS)

  2. What is COMSEC?

  3. Communications Security (COMSEC) The protection resulting from all measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications, or to mislead unauthorized persons in their interpretation of the result of such possession and study. COMSEC includes: -Crypto security - technically sound cryptosystems and their proper use -Emission security (EMSEC) - intercept and analysis of compromising emanations -Physical security - all physical measures necessary to safeguard classified equipment, material, and documents -Traffic-flow security - conceal the presence and properties of valid messages on a network -Transmission security (TRANSEC) - protect transmissions from interception and exploitation by means other than cryptoanalysis (e.g. frequency hopping and spread spectrum).

  4. COMSEC Equipment KIV-7 KG-84A KG-40 KG-175 KG-194

  5. Vintage COMSEC Equipment German Lorenz cipher machine used during WWII for the encryption of high-level general staff messages. The Enigma machine implemented a complex electro-mechanical polyalphabetic cipher to protect sensitive communications.

  6. Parts of COMSEC Material • Classifications • Top Secret (TS) • Secret (S) • Confidential (C) • Unclassified (U) • Short Title • Ex. USKAC D 166 MOD 1 BC 18

  7. Administrative Procedures • Custody • Page Check Requirements • Watch-to-Watch inventory

  8. Physical Security • Need to Know • CO promulgated access list • Visitor’s Register (aka Visitor’s Log)

  9. COMSEC Insecurities • Practices Dangerous to Security (PDS) • Reportable • Non-Reportable

  10. Transmission Security • Imitative Communications Deception • ACP 122 • EEFI • GINGERBREAD • BEADWINDOW

  11. Emission Security • Emission Control • EMCON Bill

  12. DoD COMSEC Policy • Xmission of DoD information shall be protected through COMSEC measures • COMSEC materials developed, acquired, operated, maintained and disposed of • through approved methods • Ensure operational availability of commonly used COMSEC equipment during • crisis or contingencies • COMSEC equipment shall be compatible with DoD approved key management • systems • Account for controlled and classified cryptographic items • COMSEC users and technicians properly trained • Note: Policy documents can be found on NIPRNET at http://www.cnss.gov; • SIPRNET at http://www.iad.nsa.smil.mil/resources/library/cnss_section/index.cfm

  13. Origin of OPSEC "Even minutiae should have a place in our collection, for things of a seemingly trifling nature, when enjoined with others of a more serious cast, may lead to valuable conclusion." -George Washington, known OPSEC practitioner

  14. A key action during the OPSEC process is to analyze potential vulnerabilities to forces. It requires identifying any OPSEC indicators that could reveal critical information about the operation, such as, increased troop movement.

  15. “Little minds try to defend everything at once, but sensible people look at the main point only; they parry the worst blows and stand a little hurt if thereby they avoid a greater one. If you try to hold everything, you hold nothing” Frederick the Great Instructions to his generals, 1747

  16. Original Classification Authority • Designated by SECNAV or delegated authority • SECNAV personally designates TOP SECRET OCAs • SECNAV authorizes the CNO to designate SECRET OCAs • OCA is not transferable • OCA designated by virtue of their position • Properly trained • Duration of classification limited to 25 years

  17. Limitations on Classification • Classifiers shall not use classification to: • Conceal violations of law, inefficiency or administrative error • Prevent embarrassment to a person, organization or agency • Restrain competition • Prevent or delay the release of information that does not • require protection • Classify, or use as a basis for classification, references to • classified documents, when the reference citation does not disclose • classified information

  18. This page is UNCLASSIFIED but marked SECRET for training purposes only

  19. Electronic Media Markings

  20. Duties and Responsibilities • Secretary of the Navy • Director of Naval Intelligence (CNO(N2)) • The Director, Security and Corporate Services (ONI-05 ) • SSO NAVY

  21. Duties and Responsibilities • Command Special Security Officer (SSO) • SSO will be afforded direct access to the commanding officer • Appointed in writing • U.S. citizen and either a commissioned officer or a civilian employee GS-9 or above

  22. Terminology • Personnel Security Investigation • National Agency Check • National Agency Check with Local Agency and Credit Checks • Single Scope Background Investigation • Reinvestigation • SSBI-PR • Entrance National Agency Check

  23. Terminology (cont) • Electronic Questionnaires for Investigations Processing • Electronic Personnel Security Questionnaire • Standard Form (SF) 86, Questionnaire for National Security Positions • Department of the Navy Central Adjudication Facility • Defense Security Service • Original Classification Authority

  24. Joint PersonnelAccountability System • The Joint Personnel Adjudication System (JPAS) is a DoD system that uses NIPRNET to connect all DoD security personnel around the world with their Central Adjudication Facility (CAF). • The JPAS web site runs on a secured port with secured socket layer (SSL) 128-bit encryption.

  25. Joint PersonnelAccountability System (cont) • JAMS & JCAVS = JPAS • The Joint Adjudication Management System (JAMS) provides the CAFs a single, integrated information system to assist the adjudication process through "virtual consolidation" and vastly improve dissemination of timely and accurate personnel security information to the warfighters and planners. It is a system designed for the adjudicative community by adjudicators.

  26. Joint PersonnelAccountability System (cont) • The Joint Clearance and Access Verification System (JCAVS) provides DoD security personnel the ability to instantaneously update other JCAVS users with pertinent personnel security clearance and access information in order to ensure the reciprocal acceptance of clearances throughout DoD. • It is a system designed for security managers and security officers as representatives of that community.

  27. Joint PersonnelAccountability System (cont) User can view anyone’s summary with SSN, including one’s own

  28. Joint PersonnelAccountability System (cont)

  29. Joint Personnel Accountability System (cont) (AF only)

  30. References • SECNAV M-5510.30, Department of the Navy (DON) Personal Security Program (PSP) Manual (June 2006) • SECNAV M-5510.36 Department of the Navy Information Security Program (June 2006)

  31. Foreign Security Markings Information Sheet Pages 6-35 thru 6-37

More Related