Custom Search
|
|
CHAPTER 5 GENERAL SECURITY LEARNING OBJECTIVES Upon completing this chapter, you should be able to do the following: Identify the procedures for verifying the identification and clearance of recipients. Identify the procedures for TEMPEST requirements. Identify methods of controlling access to security areas, including designation of restricted areas, requirements relating to lock combinations, and procedures for sanitizing sites and equipment. Identify the procedures and regulations for marking material and conducting inventories of classified material (Secret and below). Identify the procedures used for clearing media and hardware of classified material (Secret and below). Identify the regulations and procedures for declassification or destruction of classified hardware and the destruction of classified material (Secret and below). Identify the regulations and procedures covering the receipt, inspection, handling, destruction, and verification of classified material (SPECAT or Top Secret and above). Your duties as a Radioman will require that you handle considerable amounts of classified information and equipment. You should be able to recognize classified matter and know what to do-or not do-with it. Security is as basic a part of your assignment as operating telecommunications equipment. Safeguarding classified information is an integral part of your everyday duties. The security of the United States in general, and of naval operation in particular, depends upon the safeguarding of classified information. As a Radioman, you will learn information of vital importance to both the military and the nation. At times, vast amounts of classified message information will pass through your hands. You must be security conscious to the point that you automatically exercise proper discretion in the discharge of your duties. In this way, security of classified information becomes a natural element of every task and not an additionally imposed burden. RECIPIENT'S IDENTIFICATION AND CLEARANCE Identification may be provided with the member military identification card, command identification cards or badges. Normally, local standard operating procedures cover the individual command's requirements. Guidelines for identification and access are contained in the Department of the Navy Information and Personnel Security Program Regulation, OPNAVINST 5510.1, hereinafter called the Security Manual. Military identification cards are required to be carried by all active duty military. They aid only in recognizing the individual, not access or clearance. A command identification card/badge assists in identifying the level of security clearance of the holder or where the holder is authorized to enter. These cards/badges are only an aid and may not be used as the basis for granting access to information or areas. A personnel security clearance will be issued to an individual by the Department of the Navy Central Adjudication Facility (DONCAF), or other designated clearance authority with favorable completion of required paperwork in accordance with the Security Manual. A copy of OPNAV 5510/413 (Clearance Report) will be filed in the member's permanent service record and in the security officer's files. CONTROL OF COMPROMISING EMANATIONS (TEMPEST) Compromising emanations (CE), referred to as "TEMPEST," are unintentional data-related or intelligence-bearing signals. If these signals are intercepted and analyzed, they could disclose the information transmitted, received, handled, or otherwise processed by electrical information-processing equipment or systems. Any electrical information-processing device, whether an ordinary electric typewriter or a large complex data processor, may emit compromising emanations. TEMPEST VULNERABILITY ASSESSMENT (TVA) The vulnerability of a ship, aircraft, shore station, transportable equipment, or a contractor facility is determined by a TEMPEST Vulnerability Assessment. This assessment includes each of the following factors, which, together, create vulnerability: Susceptibility- The probability that TEMPEST signals exist and are open to exploitation. Environment- The primary environmental considerations are the geographical location of a ship, aircraft, shore station, or contractor facility; physically and electrically controlled spaces; adherence to approved installation criteria; and the use of TEMPEST-approved equipment or systems. Threat- The capability and motivation of an enemy to exploit the TEMPEST signal. The interaction of all of these factors determines the vulnerability. From this assessment and considering the category, classification, or sensitivity of the information involved, a determination will be made. An Instrumented TEMPEST Survey (ITS) will be scheduled, or the requestor will be placed in the "acceptable risk" category. Tempest Vulnerability Assessment Request (TVAR) A TVAR must be submitted prior to processing classified data. This request should be sent to the Naval Criminal Investigative Service, Washington D.C., with a copy to CO, NAVELEXSECCEN and other commands as appropriate. The list of required information is available in Navy Implementation of National Policy on Control of Compromising Emanations (U), OPNAVINST C5510.93. Some ships are identified by CNO as high TEMPEST risk platforms. Those which are likely to be the target of hostile TEMPEST collection efforts will be scheduled for an Instrumented TEMPEST Survey (ITS). No TVAR is required from any ship. |
|