Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search
 
  

EMISSION CONTROL (EMCON)

EMCON is used to prevent an enemy from detecting, identifying, and locating friendly forces. It is also used to minimize electromagnetic interference among friendly systems. EMCON is normally imposed by a commander to control all electromagnetic radiations. Once EMCON is imposed, general or specific restrictions may be added to the EMCON order, depending on the operational, intelligence, or technical factors for the area affected.

For radiomen, EMCON usually means either full radio silence or HF EMCON. The most secure communications methods during EMCON reduce, but do not eliminate, the possibility of identification. It is assumed that any electromagnetic radiation will be immediately detected, and the position of the transmitting ship will be fixed by an enemy. You will find detailed information on the implementation of EMCON and its degree of adjustment in Electronic

Warfare Coordination, NWP 3-51.1 (formerly NWP 10-1-40).

SECURITY AREAS

Different spaces aboard ship and different areas within a shore activity usually have varying degrees of security importance. The degree of security of each area depends upon its purpose and the nature of the work, information, equipment, or materials concerned. Access to security areas must be controlled in a manner consistent with the security level.

SANITIZING SITE AND EQUIPMENT

Sanitizing an area or equipment is done to make it acceptable for access by personnel who are not cleared. This is used to prevent unauthorized persons from gaining access that would allow them to identify the purpose or nature of your work, information, equipment and materials concerned.

To meet this situation, each command should apply differing protective measures commensurate with the degree of security importance. Persons who have not been cleared for access to the information contained within the area, with appropriate approval, may be admitted into an area, but they must be controlled by an escort at all times. Follow guidelines set forth in the Security Manual and local standard operating procedures.

A few of the basic requirements are listed below.

Remove, turn over, or place in drawers any classified material that may be out on desks.

Replace any keying material in the safe and lock.

Cover any status boards showing conditions of equipment, frequencies, systems, and so forth.

Cover all frequencies dialed into equipment.

Cover monitors or turn off monitor screens if possible.

Do not conduct any work-related discussions.

At no time will the escort leave someone unattended. The watch section or day working staff maybe required to support the escort in cases where work is being conducted by numerous uncleared personnel in more than one area.

RESTRICTED AREAS

Designating security spaces as restricted areas provides an effective and efficient means for a command to restrict access and control movement. In restricted areas, only those personnel whose duties actually require access and who have been granted appropriate security clearance are allowed freedom of movement within the area.

Persons who have not been cleared for access to the information contained within the area may, with appropriate approval, be admitted into the area. While in these spaces, however, uncleared persons must be escorted, or other security procedures implemented to prevent any unauthorized disclosure of classified information.

All designated restricted areas must have warning signs posted at all entrances and exits. These areas must have clearly defined perimeters and, if appropriate, Restricted Area warning signs posted on fences and barriers.

Access to Spaces

The commanding officer or the officer in charge over security spaces is responsible for controlling access to these areas. Procedures should limit access to security spaces only to those persons who have a need to know. No one has a right to have access to classified information or spaces based solely on clearance, rank, or position.

Each command establishes a pass or badge identification system to restrict access and to help control movement. Control of movement within the area is normally accomplished by requiring the display or presentation of the pass or badge for that particular area.

Access List

Admission of visitors to communications spaces is a topic of major concern to radiomen since access to communications spaces under operating conditions usually permits viewing of classified traffic and equipment. A security badge does not automatically mean that visitors have a "need to know" or that they should be granted access. Admission to communications spaces is granted only to personnel whose names, rates/ranks, and clearance level appear on the official access list.

Access lists, which must be signed and approved by the commanding officer, should be posted at each entrance to a communications space. Admission of persons other than those on the access list is subject to the specific approval of the commanding officer or his or her designated representative.

Personnel not on the access list nor specifically granted permission by the commanding officer for entry must be escorted or supervised at all times while in communications spaces.

Communications Center Visitors Log

A communications center visitors log (or register) is used to record the arrival and departure of authorized personnel whose names do not appear on the access list. Fleet Communications (U), NTP 4, recommends the following column headings for visitors logs:

Date;

Visitor's printed name;

Organization the visitor is representing;

Purpose of visit;

Visitor's signature;

Officer authorizing access to restricted area(s);

Escort's name;

Time in; and

Time out.

Access to Classified NATO Messages

Only those personnel who hold a security clearance equal to or greater than the clearance required for U.S. material may have access to NATO messages. NATO messages and documents belong to NATO and must not be passed outside the NATO organization. NATO Security Procedures (U), OPNAVINST C5510.101, is the authority for the proper handling, storage, accounting, classification, and clearances of NATO material.

The final responsibility for determining whether a person is granted access to a security area rests upon the individual who has the authorized possession, knowledge, or control of the information involved and not upon the prospective recipient. No number of written rules or governing statutes can replace individual initiative and common sense. As we mentioned earlier, no one has a right to access based solely upon security clearance, rank, or position.







Western Governors University
 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business