CRYPTO Users Briefing.

Slides:



Advertisements
Similar presentations
Using Matrices in Real Life
Advertisements

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 14-1 Chapter Fourteen Auditing Financing Process: Prepaid Expenses.
Chapter 1 The Study of Body Function Image PowerPoint
1 Writing Assessment The Scope of the Law T.C.A states: Any person found not to have followed security guidelines… placed on immediate.
1 Balloting/Handling Negative Votes September 11, 2006 ASTM Training Session Bob Morgan Brynn Iwanowski.
1 Balloting/Handling Negative Votes September 22 nd and 24 th, 2009 ASTM Virtual Training Session Christine DeJong Joe Koury.
RECORD KEEPING Cooperative Development of Operational
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
HIV Drug Resistance Training
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
1 CREATING AN ADMINISTRATIVE DRAW REQUEST (OCC) Complete a Checklist for Administrative Draw Requests (Form 16.08). Draw Requests amount must agree with.
Threshold System Presented by Jan Stanley, State Title I Director Office of Assessment and Accountability Fall Title I Directors Conference October 23-25,
1 RWM SBA (Grades 3-9) Science SBA (Grades 4 8, & 10) Test Administrator Duties and Responsibilities.
2 HOME DELIVERED MEALS Waiver Workshop Presented by: Regional and Local Services (RLS) Access and Intake /Area Agency on Aging (A&I/AAA) May 27-28, 2009.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Accounting and Financial Reporting
1 Term 2, 2004, Lecture 9, Distributed DatabasesMarian Ursu, Department of Computing, Goldsmiths College Distributed databases 3.
So far Binary numbers Logic gates Digital circuits process data using gates – Half and full adder Data storage – Electronic memory – Magnetic memory –
Rowland Unified School District (Slides from ETS) CAHSEE Test Site Coordinator Information.
Solve Multi-step Equations
© SafeNet Confidential and Proprietary Administering SafeNet StorageSecure Smart Card Module 3: Lesson 5 SafeNet StorageSecure Storage Security Course.
Configuration management
EMS Checklist (ISO model)
Storing Data Chapter 4.
MAKERERE UNIVERSITY DIRECTORATE OF INTERNAL AUDIT ACCOUNTABILITY SYSTEMS AND PROCESSES RIDAR HOTEL SEETA 16 TH – 18 TH JUNE 2011 Presented by SAMUEL NATWALUMA.
Effectively applying ISO9001:2000 clauses 6 and 7.
The Office Procedures and Technology
1 Test Coordinator Training Spring 2014 Test Security.
Test Monitor Training Administering Minnesota Assessments.
Page 1 of 30 To the Create Assignment Request Online Training Course An assignment request is created by an assignor to initiate the electronic assignment.
Hazardous Waste Section
1 Monthly Rules Education Session January 2012 Transfer Eligibility.
The Revenue Cycle: Sales to Cash Collections
VOORBLAD.
2009 Data Protection Seminar
High School Diplomas and the Ability-to-Benefit Alternative Carney McCullough U.S. Department of Education 1.
©2007 First Wave Consulting, LLC A better way to do business. Period This is definitely NOT your father’s standard operating procedure.
© 2012 National Heart Foundation of Australia. Slide 2.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
APNIC Executive Council (EC) Election 1. Overview About 2011 EC Election Voting entitlement Online voting On-site voting Proxy appointment Counting procedure.
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
Visual 3.1 Delegation of Authority & Management by Objectives Unit 3: Delegation of Authority & Management by Objectives.
H to shape fully developed personality to shape fully developed personality for successful application in life for successful.
Januar MDMDFSSMDMDFSSS
Week 1.
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
PSSA Preparation.
Immunobiology: The Immune System in Health & Disease Sixth Edition
Chapter 11 Describing Process Specifications and Structured Decisions
A lesson approach © 2011 The McGraw-Hill Companies, Inc. All rights reserved. a lesson approach Microsoft® PowerPoint 2010 © 2011 The McGraw-Hill Companies,
Financial Merchandise Management
1 Office of New Teacher Induction Introducing NTIMS New Teacher Induction Mentoring System A Tool for Documenting School Based Mentoring Mentors’ Guide.
MIS (Management Information System)
Security Solutions Group
HOW TO PREPARE FOR A NATIONAL SECURITY INFORMATION INSPECTION 1 SECRET Updated 09/27/11 Security is Everyone's Responsibility – See Something, Say Something!
UNCLASSIFIED1 COMSEC BRIEFING Having been selected to perform duties which will require access to classified COMSEC information, it is essential you be.
Unclassified Controlled Cryptographic Item Access Briefing
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
Key Management Lifecycle. Cryptographic key management encompasses the entire lifecycle of cryptographic keys and other keying material. Basic key management.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Responsibilities and Procedures When Handling COMSEC Material
Managing a Security Container
Presentation transcript:

CRYPTO Users Briefing

OVERVIEW What is COMSEC/CRYPTO? Devices/CRYPTO Access Safeguarding Reproduction Destruction Reporting Requirements

WHAT IS COMSEC? COMSEC (Communications Security) – Broad term used to describe the measures and controls taken to deny unauthorized persons information derived from telecommunications and ensure the authenticity of such telecommunications.

WHAT IS CRYPTO? CRYPTO – Marking or designator identifying all COMSEC key material used to secure or authenticate classified telecommunications Key Material – Sequence of random binary digits used to set up, and periodically change, operations performed by crypto equipment to encrypt, decrypt, and authenticate electronic telecommunications (When written in all capital letters, CRYPTO has the meaning defined above. When written in lower case letters it’s an abbreviation for cryptographic)

What is COMSEC? Handled in 2 separate channels: 1. COMSEC channel – is used to distribute items that are accountable by the COMSEC Custodian to the National Security Agency (NSA) 2. Administrative channels – are used to distribute other COMSEC information and material not accountable by the COMSEC Custodian but rather through the site’s Document Control system When in doubt, contact the COMSEC Custodian

WHAT IS COMSEC? For purposes of this briefing, we’re concerned with the 1st channel: items that are accountable by the COMSEC Custodian to the NSA These items can be further categorized into: Controlled Cryptographic Items (CCI) Classified devices Cryptographic key material (CRYPTO)

DEVICES CONTROLLED CRYPTOGRAPHIC ITEM Unclassified cryptographic device Protected as high value property Accountable to NSA Examples: STE Data Transfer Device (DTD) KIV 7

DEVICES CCI STE Secure point-to point voice/data communications up to Top Secret Unclassified without the Crypto Ignition Key (CIK) or it is zeroized

DEVICES CCI Data Transfer Device (DTD) Used to store electronic keys then load into crypto equipment Unclassified without key material or CIK

DEVICES CCI KIV 7 Provides secure Line of Site Communications Unclassified without classified keying material loaded into device

CRYPTO Cryptographic key material (CRYPTO) Unclassified to Top Secret Requires higher degree of protection than other classified Comes in various forms; key tape within plastic canister, floppy disk, electronic, algorithms on paper, PROMS

CRYPTO Key Tape Issued by canister Contains multiple segments Each canister unique

ACCESS The following minimum conditions must be met prior to granting access to CRYPTO: Final Secret clearance or interim Top Secret Need-to-Know determination Receive Cryptographic Access Briefing from COMSEC Custodian, Alternate, or their written designated representative and input into EPSS

ACCESS As a condition of access you must acknowledge: - that you may be subject to a non-lifestyle, counterintelligence scope polygraph exam only encompassing questions concerning espionage, sabotage, or unauthorized disclosure of classified information -this examination will be administered in accordance with DoD Directive 5210.48 and applicable laws

SAFEGUARDING CRYPTO Storage All CRYPTO must be stored in a GSA approved safe that is either; 1. inside a Closed Area and 2. Under IDS control or covered by guard patrols every 4 hours Do not use lockbar containers for storing CRYPTO

SAFEGUARDING Keyed CCI & Classified Hardware Storage Requirements: If being used, must be located in a Closed Area If not being used, must be stored in a GSA safe Storage of unkeyed CCI May be stored like a high value item (e.g. within locked cabinet or storage room) but regularly sighted. For STE, see COMSEC Custodian for briefing

SAFEGUARDING Do NOT: store COMSEC safe combinations electronically (not even on a classified computing system) place CRYPTO on any computer system (not even if the system is approved for it) until you’ve received written permission from the COMSEC Custodian move any COMSEC equipment or CRYPTO (not even temporarily) to another location without the COMSEC Custodian’s prior written permission

SAFEGUARDING Hand Receipt Items Items Hand Receipted to you by the COMSEC Custodian become your personal responsibility and may never be transferred by you to another person or organization To initiate transfer for any of your items, you must contact the COMSEC Custodian Another properly cleared and briefed person may use your items but this does not relieve you of its responsibility

SAFEGUARDING Key Disposition Record Completed by users as they load key material to ensure a continuous chain of accountability (Records are classified at least CONFIDENTIAL for CONFIDENTAL key and above. Unclassified key disposition Records are marked Unclassified/FOUO) The following are the only disposition records you might have to use: Electronic Key Disposition Record or Key Tape Disposition Record Electronic Key loader Disposition Forms The COMSEC custodian will provide you with the required disposition form and instructions.

REPRODUCTION Reproduction of CRYPTO NOT Authorized unless: COMSEC Custodian receives written approval from key material Controlling Authority and COMSEC Custodian provides you written permission Permission does have to formal and in writing from the controlling authority.

DESTRUCTION Destruction of CRYPTO Requires 2 persons both being; 1. appropriately cleared, 2. CRYPTO briefed and 3. knowledgeable of destruction procedures 4. fully trained and knowledgeable on Status messages and usage factors One person performs destruction while the other serves as witness Never sign the record without personally sighting the destruction

DESTRUCTION If you have no approved destruction method available to you, return the superceded key material to the COMSEC Custodian within the 12 hour time frame Failure to do the above may result in a violation

DESTRUCTION Destruction of key tape segments is authorized by use of the NSA approved disintegrator

DESTRUCTION Electronic Key Destruction is done by deleting the key or particular key segment on the DTD and Then Annotating it on Electronic Key Disposition Form

REPORTING REQUIREMENT Examples of COMSEC/CRYPTO Violations COMSEC safe left unsecured Removal of future keying material from its protective packaging Disclosing short title, edition and effective dates of CRYPTO by unsecured means Loss of COMSEC equipment/material Falsification of COMSEC records

REPORTING REQUIREMENT Reporting Espionage Attempts Foreign Intelligence Services prize the acquisition of CRYPTO/COMSEC information Extreme measures may be taken to coerce or force persons to divulge CRYPTO/COMSEC info Personal and financial relations with representatives of foreign governments or their interests could make you vulnerable and/or targeted

REPORTING REQUIREMENT Why is reporting so important? If COMSEC information or techniques are breached at any point, all classified information protected by the system might be compromised If a security breach is not reported, it may never be detected

REPORTING REQUIREMENT Consider for a moment how much traffic passes over that circuit in a week, month, year, or its lifetime and the damage that can cause If reported, steps can be taken to lessen an adversaries advantage gained through the compromised information If any incident occurs, contact your COMSEC Custodian immediately

CONTACTS

QUESTIONS?