Unclassified Controlled Cryptographic Item Access Briefing

Slides:



Advertisements
Similar presentations
McMaster Universitys Moveable Assets Policy Property Protection.
Advertisements

Health & Safety Life Book AM ST p. 1 v.01 - Nov. 03, 2011 Isolation Lockout; protect employees during e.g. maintenance and jam clearing! Machine.
Petty Cash/Change Fund Policy & Procedures. Agenda Purpose and Definitions Establishing and Changing Funds Safeguarding Funds Using and Replenishing Funds.
Site Security Presentation
Classified Contract Close-out By Jane Dinkel Security Manager LMMFC.
CRYPTO Users Briefing.
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
“VITAL” Wright Express (WEX) Card Usage Procedure
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
LOCKOUT TAGOUT Introduction Each year nearly 150 people die because there was a failure to control energy.
Larry Wagner Sr. Director of Engineering
Security Solutions Group
De-energization and Lockout
USCG Enforcement for the Implementation of TWIC
Cleveland School District Gerald Finley, Property Manager Friday, July 27, 2012.
Property Management Overview
COMSEC ACCOUNTS Presented by: Steven R. Meaux COMSEC Custodian Raytheon Company, Garland TX April 2006.
UNCLASSIFIED1 COMSEC BRIEFING Having been selected to perform duties which will require access to classified COMSEC information, it is essential you be.
COMSEC (Communications Security)
Protecting Evidence Fire Cause Determination. Fire departments should investigate all fires to determine the cause of the fire. The cause of a fire is.
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.
2.3.6 Student Book © 2004 Propane Education & Research CouncilPage Performing a Walk-Around Inspection of the Transport After Loading Performing.
NVIC VESSEL SECURITY PLAN OUTLINE
Emergency Action Plans/Fire Prevention Plans
Banking Safely. PIN and Password Selection and Protection Select unique digits (number and letter combinations DO NOT SELECT your birthdate, telephone.
Federal Property Special Interest Group Case Study, 2012.
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Security Policies University of Sunderland CSEM02 Harry R. Erwin, PhD.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Section Two: Classified Safeguarding and Handling Note: All classified markings contained within this presentation are for training purposes only.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
Using NIMA Limited Distribution Data & Products Many of NIMA’s data and products are Unclassified Limited Distribution (LIMDIS). These materials are used.
Responsibilities and Procedures When Handling COMSEC Material
1 PETTY CASH July 16, Petty Cash Purpose: use for small and emergency purchases, not on-going expenses. Should NOT be used as a substitute for.
Overview of Key Security Concepts and Vocabulary This Document was Funded by the National Science Foundation Federal Cyber Service Scholarship For Service.
Children’s Hospital Requirements for Remote Access.
1 United States Army Logistics Integration Agency Automatic Identification Technology Radio Frequency Technology Overview Overview Briefing 24 April 2001.
Indoctrination Briefing 1SG Patrick Cullen KANSAS ARMY NATIONAL GUARD.
IT IS ALL YOURS.... COMMANDER!
TAKE CARE OF YOUR CHQUE BOOK ETC. TAKE CARE  Please care of your cheques, passbook, Cards, PINs and other security informations to prevent fraud and.
LOCKOOUT/TAGOUT b THE ULTIMATE GOAL IS: To implement policies and procedures to prevent, as necessary, the release of hazardous energy from power sources--or.
Lockout/tagout (LOTO) is a technique used to prevent energy from being released during the servicing of equipment. This is accomplished by placing locks.
Sensitive But Unclassified (SBU) Information
INTERTANKO ISTEC #23 Meeting Rome September 2003.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
RYERSON UNIVERSITY 1 5. SECURITY. RYERSON UNIVERSITY 2 Biological Safety Training – Certificate Holder and User Training BIOLOGICAL SAFETY 5.Security.
Providing access to your data: Handling sensitive data Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International.
SAFEGUARDING CLASSIFIED INFORMATION.
13 Search and Rescue.
Training for School Test Coordinators (STC) Spring 2016 Tia Burnett, Supervisor of Testing February 8, 2016.
Financial Management Office Presented by Wendall Ho Cash and Check Handling Self-Assessment.
HIPAA Privacy What Every Staff Member Needs to Know.
Information Security and Privacy By: Mike Battestilli.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Managing a Security Container
AIRCRAFT MAINTENANCE TOWING OF AIRCRAFT.
Energy Control Procedures (Lockout/Tagout)
Domain 2 – Asset Security
Office of the President of the Philippines Memorandum Circular No. 78
Safety and Security of Radiation Sources
Personal Protective Equipment
COMSEC & OPSEC LtCol Ed Wolff CAP/DOKS August 2018 Anaheim, CA
SAFE WORK INSTRUCTIONS
Civil Air Patrol Advanced Communications User Training
SAFE WORK INSTRUCTIONS
Energy Control Procedures (Lockout/Tagout)
Presentation transcript:

Unclassified Controlled Cryptographic Item Access Briefing

OVERVIEW What is COMSEC? What is a Controlled Cryptographic Item (CCI)? Examples of CCI Access Safeguarding Reporting Requirements Contacts

WHAT IS COMSEC? COMSEC (Communications Security) – Broad term used to describe the measures and controls taken to deny unauthorized persons information derived from various communication sources and ensure the authenticity of such communications.

WHAT IS COMSEC? These items can be further categorized into: Cryptographic key material (CRYPTO) Controlled Cryptographic Items (CCI) Classified devices For purposes of this briefing, we’re concerned with Unclassified CCI only

DEVICES CONTROLLED CRYPTOGRAPHIC ITEM Unclassified cryptographic device Protected as high value property Accountable to the National Security Agency Identified by nomenclature: NSA issued short title Examples of short titles: RT 1836 RT 1478 RT 1912 AN ARC 231 V C KSV 21 CCI can always be identified by the “Controlled Cryptographic Item CCI” marking on the item’s faceplate

KSV 21 card for STE Secure Telephone Equipment (STE) KSV 21 card is CCI Secure Telephone Equipment (STE) Secure point-to point voice/data communications up to Top Secret Unclassified with out the KSV 21 card Only the KSV 21 card is accountable

RT 1478 D C Controlled Cryptographic Item (CCI) Unclassified without key material loaded

RT 1836 C Controlled Cryptographic Item (CCI) Unclassified without key material loaded

ACCESS The following minimum conditions must be met prior to granting access to Unclassified CCI: Need-to-Know determination United States Citizenship Receive Unclassified CCI Access Briefing from COMSEC Custodian, Alternate, or their written designated representative

SAFEGUARDING Unclassified CCI If not being used or attended by a briefed individual, must be secured behind a locked door, storage room, etc. and sighted regularly If installed on an aircraft, authorization to leave unattended depends on the physical security controls in place to prevent removal of the installed equipment from the aircraft

SAFEGUARDING Do NOT: Give out CCI to anyone without verifying CCI access briefing Move CCI to another location without coordinating hand receipt movement with the COMSEC Custodian

SAFEGUARDING Hand Receipt Items Items Hand Receipted to you by the COMSEC Custodian become your personal responsibility and may never be transferred by you to another person or organization To formally transfer CCI, you must contact the COMSEC Custodian for hand receipting Another properly cleared and briefed person may use your items but this does not relieve you of its responsibility

REPORTING REQUIREMENT Report any suspected tampering or misuse of CCI to the COMSEC Custodian immediately Why is it so important to protect CCI? The War Fighter will eventually communicate classified information with these devices Attempts to reverse engineer the CCI Ultimately accountable to the National Security Agency

CONTACTS

QUESTIONS?