Presentation is loading. Please wait.

Presentation is loading. Please wait.

COMSEC (Communications Security)

Similar presentations


Presentation on theme: "COMSEC (Communications Security)"— Presentation transcript:

1 COMSEC (Communications Security)

2 Overview The types of COMSEC information you may access
The handling of COMSEC items and keying material The directives and rules which prescribe those safeguards The penalties you will incur for willful disclosure of COMSEC information to unauthorized persons EKMS/KMI Transition

3 COMSEC Definition COMSEC is the general term used for all steps taken to protect information of value when it is being communicated This includes measures which are taken: To prevent unauthorized persons from gaining access to telecommunications that are related to national security To ensure the authenticity of such telecommunications

4 Elements of COMSEC

5 Transmission Security
Transmission Security or TRANSEC is the component of COMSEC which is designed to protect transmissions from unauthorized intercepts, traffic analysis, imitative deception and disruption.

6 Types of Transmissions
Radio: The most widely used form of electronic transmission. No matter the type of end equipment in use, in most cases at some time between transmittal and receipt, radio signals are used for delivery. Because radio signals are sent out through the open air, they are one of the least secure forms of transmission. Telephone: One of the most widely used, and most convenient forms of communication. Not only are telephone lines used for voice communications, but data is also transferred over these lines. Telephone lines are easily tapped, making the phone a very unsecure form of communication.

7 Types of Transmissions
Cell Phones: Very popular and widely used today. However, they are even less secure than regular phones because their transmissions can be picked up just like radio signals. This has become one of the most widely used forms of communications, and one of the greatest risks to the security of classified and sensitive information. They can be easily intercepted or can be found stored on servers and copied. U.S. Postal & Courier Services: This is when data or materials are transferred through registered mail or hand delivered by bonded couriers. In most cases this is a very secure means of communication, but is not useful when time constraints exist.

8 Types of Transmissions
Face to Face: This is when two or more parties meet and talk with each other. Hand Delivery: This is when data in written or hardcopy form is hand carried from point of transmission to point of receipt. NOTE: The security of face to face and hand delivery transmissions is totally dependent on the parties communicating.

9 Cryptographic Security
Cryptographic Security or Cryptosecurity is the component of COMSEC which results from the use of technically sound cryptosystems, and from their proper use.

10 Cryptographic Security
Cryptographic Security includes correctly applying encryption equipment to protect voice and data communications. When properly applied, encryption can secure all electronic transmission.

11 Cryptographic Security
Includes the development of Key Management Plans and Procedures that provide instructions for the operation and protection of the Cryptographic devices and their key material. Includes all measures taken to ensure only authorized personnel install, operate and perform maintenance on cryptographic devices.

12 Physical Security Physical security is the component of COMSEC that results from all physical measures to safeguard cryptographic materials, information, documents and equipment from access by unauthorized persons.

13 Physical Security Includes Storage Facilities And Security Containers

14 Physical Security Storage of Classified Materials:
The preferable storage requirement for items classified as Top Secret, Secret and Confidential is a vault. When necessary, such items can be stored in a GSA approved security container. Storage of FOUO and SBU: These items may be stored using the same methods as classified materials. When other methods are not available, a filing cabinet equipped with a locking bar and GSA changeable combination lock is the most preferable. However, in most cases it is acceptable to use any lockable container or room, but you should check with your COMSEC Custodian.

15 Badges, Guards and Alarm Systems
Physical Security It includes applying methods to ensure only authorized persons have access to classified, sensitive and COMSEC materials and information. These methods include but are not limited to: Badges, Guards and Alarm Systems It includes the proper handling and accounting for all classified, sensitive or COMSEC information/materials on a continuous basis. Inventories of these materials must be taken semi-annually as required by NSA.

16 Physical Security Whenever classified, sensitive or COMSEC materials are removed from storage, the person removing these materials or information must maintain constant control or surveillance over them. No matter how important a task may be, if it involves classified, sensitive or COMSEC materials or information: You may NEVER take it home or away from its secure area to be completed.

17 Physical Security Includes the proper disposal of classified and sensitive materials and information no longer needed. Some approved methods of destruction are: Burning Disintegration Chopping High Security Crosscut Shredding Classified Trash Receptacle Most of you will not be performing the destruction of the materials. Most of you will either shred or burn your COMSEC items that need to be destroyed.

18 Physical Security The destruction of COMSEC materials is even more strict than those of other classified materials. For this reason, there are even fewer personnel authorized to perform this destruction. For more information contact your COMSEC Custodian.

19 Emissions Security Emissions Security is the component of COMSEC which results from all measures taken to prevent compromising emanations from cryptographic equipment or telecommunications systems.

20 Emissions Security TEMPEST Rated
All electronic equipment produces and radiates RF signals. TEMPEST Rated How do we control these radiated RF signals from being intercepted by unauthorized parties? We use TEMPEST rated equipment We use Red/Black separation We shield and filter our facilities and sensitive areas

21 Three Types of Access COMSEC Access CCI Access Cryptographic Access

22 COMSEC Access Access to classified COMSEC information may be afforded U.S. citizens who: Have been granted a final security clearance by the U.S. Government. Have a need-to-know. Personnel who have been granted an interim TOP SECRET clearance may be granted access to COMSEC material, but only at the SECRET level and below. An interim SECRET clearance is not valid for access to any classified COMSEC information.

23 CCI Access Know and Obey the Rules Governing Use of the
Access to Controlled Cryptographic Items (CCIs) will be limited to U.S. citizens who have a need-to-know. When CCI equipment is keyed, individuals loading the key or otherwise operating the equipment must possess a security clearance at least equal to the classification level of any key contained within. A security clearance is not required for visual access, if properly escorted. Know and Obey the Rules Governing Use of the vIPER, Omni or STE

24 Cryptographic Access Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Jimmy Access to classified Cryptographic information may be afforded U.S. citizens who: Possesses a security clearance appropriate to the level of classification of the cryptographic information to be accessed. Have a need-to-know. Receives a security briefing appropriate to the cryptographic information to be accessed.

25 COMSEC Briefings Initial Briefing. U.S. Government entities and contractors will ensure that all individuals having a need for access to the types of COMSEC information will receive the COMSEC briefing. COMSEC briefings shall be administered by the COMSEC Custodian or Alternate COMSEC Custodian of U.S. Government entities and contractor facilities. For contractor facilities, when the FSO is the COMSEC Custodian or Alternate COMSEC Custodian or is assigned duties that require access, the FSO must be briefed by a U.S. Government representative. Periodic COMSEC re-briefings and debriefings are not required. Briefings are maintained for a minimum of five years upon clearance or employment termination.

26 Cryptographic Briefings
Individuals who have a continuing need for access to TOP SECRET and SECRET key and authenticators that are designated CRYPTO, and to classified cryptographic media, will receive the cryptographic access briefing. The cryptographic access briefing shall be administered by the COMSEC Custodian or Alternate COMSEC Custodian of U.S. Government entities and contractor facilities. For contractor facilities, when the FSO is the COMSEC Custodian or Alternate COMSEC Custodian or is assigned duties that require access, the FSO must be briefed by a U.S. Government representative. Cryptographic debriefings are required Briefings are maintained for a minimum of five years upon debriefing, clearance or employment termination.

27 TPI Requirement Access to Top Secret cryptographic keying material can be conducted only under the Two Person Integrity (TPI) requirement. The TPI requirement is mandated until the keying material has been converted or has been properly stored or destroyed, in accordance with approved procedures.

28 COMSEC/Crypto Access Verification
COMSEC access and/or Cryptographic access may be verified by contacting your respective COMSEC Custodian, FSO, or the ISSO assigned to the lab in which you are working.

29 Security Oversight Security oversight for the operation of most COMSEC accounts is shared between the National Security Agency (NSA) and the Defense Security Service (DSS).

30 Role of NSA The NSA: Functions as the Central Office of Record (COR) and receives all transaction reports (receipt, generation, destruction, and inter-facility transfers) from the COMSEC Custodian. Serves as the U. S. Government’s central library for all publications related to COMSEC. Dispatches NSA auditors to the COMSEC Account approximately every 5 years to conduct assessments.

31 Role of DSS The DSS: Oversees implementation of the NISPOM, through periodic audits and inspections. Coordinates with NSA regarding COMSEC issues between the COMSEC Custodian and foreign governments.

32 COMSEC Accounts A COMSEC account is required when a contract has a DD254 with the 11.h. box checked. 11.h. Request a COMSEC Account

33 COMSEC Accounts To open a new COMSEC account with NSA, you must complete the COMSEC Account Application Form L It can be obtained by going to the NSA Key Support Central Facility website at: If you have any questions, contact NSA Registration at NSA sends an appointment letter within 7 to 14 days. You will then submit a signature card to NSA. All new COMSEC Custodians and Alternates must take the COMSEC Custodian Training Course (IAEC-2112) within six months after being appointed. More information can also be found regarding the course on the Key Support Central Facility website. COMSEC and Cryptographic briefings must be completed, as required. To apply for access to the NSA Key Support Central Facility website go to: and click to join.

34 COMSEC ITEMS Classified and unclassified keying material, both hard copy and digital formats. Classified and unclassified encryption equipment embedded with cryptographic firmware. Classified and unclassified material, data, hardware, and software under development – which embodies, implements, or describes cryptographic logic. Classified and unclassified documents relating to the maintenance and operation of COMSEC equipment. In most cases, one of the following labels will be displayed on the outside of such items: “Controlled Cryptographic Item, CCI, /TSEC, or CRYPTO”.

35 COMSEC ITEMS STE III phone – secure point-to-point voice/data communications up to Top Secret vIPER secure phone – secure point-to-point voice/data communications up to Top Secret Talon card - encrypts traffic sent through it (an in-line Network Encryptor) primarily with a laptop Omni encryptor - secure point-to-point voice/data communications up to Top Secret

36 COMSEC ITEMS KG-175D Encryptor – provides network communications security on Internet Protocol (IP) and Asynchronous Transfer Mode (ATM) networks RASKL- used to store electronic keys then load into crypto equipment Data Transfer Device (DTD) - used to store electronic keys then load into crypto equipment Simple Key Loader - used to store electronic keys then load into crypto equipment

37 Procurement of COMSEC Equipment
The procurement of CCI should always be coordinated through GFE, FMS, or Company Owned channels. The following conditions apply to ALL CCI: CCI must be used ONLY for the purpose for which it was obtained. If unclassified and “unkeyed,” CCI must be protected and stored as “high value property,” physically accessible only to COMSEC briefed personnel, and secured within a locked cabinet or area. If classified or “keyed,” CCI must be protected at its assigned security classification level and/or at the classification level of its key and secured within an approved security container or closed area when unattended.

38 Keying Material The procurement of keying material should always be coordinated through the COMSEC Custodian. The following handling conditions apply to ALL keying material: Keying material can be used only for the purpose for which it was obtained. All keying material has a “controlling authority,” which authorizes distribution, usage on specific CCI, and the duration of usage (effective period/crypto period). Obey the rules. If unclassified, keying material must be protected, accessible only to COMSEC-briefed personnel, and secured within an approved security container or closed area.

39 Keying Material If classified, keying material must be protected at its assigned security classification level, accessible to only properly cleared and briefed personnel, and secured within an approved security container or closed area. Top Secret keying material marked “CRYPTO” must be accessed and stored only under TPI controls. When issued to a Hand Receipt Holder, specific instructions will be provided by the COMSEC Custodian regarding usage of the keying material, its effective crypto period, its suppression rate, and the time superseded segments must be destroyed.

40 Keying Material If keying material is classified, the key’s effective date and crypto period are classified at the Confidential level and (along with the key’s nomenclature and edition identifier) should never be mentioned outside secure channels. It is permissible to mention the key’s nomenclature or the key’s edition – but never together (which would be classified). For instance, in the unclassified example – “USKAT 1539, Edition G, is effective 1 June 1998” – it would be permissible to say, “We’re currently on Edition G,” or “We’re currently using USKAT 1539.” But it would not be permissible to say, “We’re currently using Edition G, USKAT 1539.” The effective date and/or crypto period of unclassified keying material is For Official Use Only (FOUO), which must not be disclosed in the public domain.

41 Keying Material Keying material must be destroyed and/or equipment be zeroized when its crypto period has expired and/or when the key has been superseded. Keying material designated CRYPTO, which has been issued for use, must be destroyed within 12 hours following the expiration of individual key segments and/or supersession. If special circumstances prevent compliance with the 12-hour standard (e.g., facility unmanned over weekend or holiday period), the chief of the U.S. Government entity or FSO (if applicable) may authorize an extension to a maximum of 72 hours. Destruction of physical key requires the identities and keys of the person conducting the destruction and the person who actually witnesses the destruction.

42 Two Types of Accounts Traditional Account - established to support a program that is required to hold and/or produce classified COMSEC material accountable within the CMCS. Seed Key-Only COMSEC Account (SOCA) - established to support a program that holds Controlled Cryptographic Item(s) and the associated Seed Key. The COMSEC Custodian is responsible and accountable for all COMSEC material charged to the COMSEC Account.

43 COMSEC Accounting The COMSEC Distributed INFOSEC Accounting System (DIAS) automates the accounting and tracking procedures for handling all items (classified and unclassified) controlled under the COMSEC Material Control System (CMCS). DIAS is a user-friendly application that allows users to store and transfer accounting information electronically between COMSEC accounts and the Central Office of Record (COR).

44 COMSEC Accounting Accounting reports are prepared on an SF-153. These reports are prepared electronically using either the NSA Distributed INFOSEC Accounting System (DIAS) or another NSA COR (I5131) approved automated system. All transactions (e.g., receipt, transfer, destruction, etc.) for COMSEC items are controlled through the DIAS or other NSA COR approved automated system. Items which must be transferred outside the COMSEC Custodian’s immediate control (whether inside or outside the facility) must be transferred via an SF 153 (COMSEC Material Report).

45 Transferring COMSEC Items
Depending on the classification level, COMSEC items under cognizance of the CMCS can be forwarded via U.S. Postal Services, a bonded trucking/transportation company, Defense Courier Service (DCS), or overnight air service. COMSEC items can be received as Government Furnished Equipment (GFE), Company Owned Equipment, or property furnished under Foreign Military Sales (FMS). Regardless of how received (and for what purpose), the following condition must be adhered to, under the NSA/CSS Policy Manual No. 3-16: Packages addressed to the “COMSEC Account (or COMSEC Custodian)” must be delivered to COMSEC personnel unopened.

46 Hand Receipts The person who receives COMSEC items from the COMSEC Custodian is called a “Hand Receipt Holder,” because the SF 153 (used for local transfers) is called a “hand receipt”. The Hand Receipt Holder is responsible for the control, safeguarding, storage, and usage of the items issued to him/her. Other personnel who use the COMSEC items must be aware of the required controls, briefed to the appropriate level of classification, and under continuous operational control of the Hand Receipt Holder.

47 Hand Receipts The Hand Receipt Holder cannot reissue COMSEC items to another individual outside his/her span of control. If items need to be reissued, they must be returned first to the COMSEC Custodian for reissuance. The Hand Receipt Holder is relieved from responsibility only when the items have been returned to the COMSEC Custodian.

48 Special Handling COMSEC documents can be ordered through the COMSEC Custodian from NSA. Depending on the type of document received, disbursement may be through the COMSEC Custodian or through document control personnel. In any event, the following special handling conditions apply to ALL COMSEC documents: If not controlled through the COMSEC Custodian, the document may be reproduced – unless there is a notice on the document to restrict reproduction. If controlled through the COMSEC Custodian, a TOTAL reproduction of the document is not allowed without authorization from the NSA or the originating office. Extractions and partial reproductions are allowed so long as the information which is extracted or reproduced is identified as COMSEC information, identified via the same means as the source document.

49 Storage/Destruction/Transfer
Unclassified COMSEC documents must be protected from unauthorized personnel; i.e., secured in a locked file cabinet with access provided only to COMSEC-briefed personnel. Classified COMSEC documents must be protected at the assigned security classification level; i.e., stored in an approved container or closed area with access provided only to appropriately cleared and briefed personnel. Destruction and transfer of COMSEC documents must be coordinated through the entity that disbursed the documents.

50 COMSEC Shipments All shipments of COMSEC items controlled through the CMCS must be coordinated through the COMSEC Custodian. The shipment of those not controlled through CMCS must be coordinated through document control. The method of shipment must be approved by the COMSEC Custodian or document control before any shipping documentation is prepared. The functional organization responsible for the use or delivery of the item must obtain authorization for the shipment (e.g., approval from the Contracting Office, Government Property, Contracts, etc.) and must prepare any shipment document required within the company. The COMSEC Custodian and document control will prepare external receipt documentation, which is required separately from any other company or government documentation that may accompany the shipment. Overnight Delivery Way Out

51 Facilities Operations
All facilities and operations must be approved by the COMSEC Custodian prior to storage and/or use of COMSEC materials which are controlled under CMCS. Additional approvals may be required if the facilities and/or operations will involve classified information. Each combination to a security container or closed area which stores any classified COMSEC material must be changed upon initial use and upon departure/termination of anyone who possesses the combination. If the combination permits access to a container or area which is used to store classified COMSEC material controlled under the CMCS, it must be changed at least once every two years.

52 Combination Changes Combination changes for security containers which contain COMSEC material controlled under the CMCS must be coordinated through the COMSEC Custodian. Security containers which contain classified COMSEC material controlled under the CMCS must have – posted inside the container – a listing of all cleared and briefed personnel who have access to the combination (names, home addresses, and home telephone numbers). All closed security areas dedicated to COMSEC operations – where open storage of classified COMSEC materials is required and/or operational classified crypto equipment is keyed and unattended – must have an access list, authenticated by the COMSEC Custodian, displayed inside, near the entrance to the area.

53 Visitors A visitor register must be maintained for all persons other than those listed for access to the closed area. The register must identify all visitors entering and leaving the area. All classified COMSEC material must be concealed from view to prevent unauthorized access by the visitor, and the visitor must be escorted by an authorized, properly cleared and briefed person at all times while in the area.

54 Inspections/Audits/Inventories
The COMSEC Custodian and personnel to whom COMSEC material is issued are subject to the following: Semi-annual Inventory – a 100% inventory of all COMSEC items controlled under the CMCS, conducted by the COMSEC Custodian every six months, and also whenever the COMSEC Custodian is changed. NSA Audit – conducted by an auditor from the NSA approximately every 5 years. DSS Inspection – conducted by a representative from the DSS “annually”. Policy-Mandated Audit – conducted by the COMSEC Custodian whenever a national policy pertaining to a special COMSEC system mandates that an audit be conducted.

55 Inspections/Audits/Inventories
The COMSEC Custodian will coordinate all inspections, audits, and inventories in advance, whenever possible. No entity should be allowed to access any COMSEC material during inspections, audits, and/or inventories, without the coordination and approval of the COMSEC Custodian.

56 Emergency Guidelines In cases of natural disaster – such as earthquake, fire, tornado, or the like – what action should on-scene personnel take if personal safety and time permit? They should: Notify the Fire Department and/or other appropriate emergency personnel. As necessary, evacuate all personnel not required to secure the material. Remove or clear all classified cryptographic keys from any COMSEC equipment. Secure all material, starting with classified. Inform the COMSEC Custodian and on-site security of what has happened.

57 Emergency Guidelines As necessary, emergency personnel must be permitted access into the area, in performance of their duties. After the emergency, determine if any COMSEC material has been lost, destroyed, or accessed by unauthorized personnel. Also, conduct a damage assessment to determine if the area can still provide adequate safeguarding Are security containers functional? Damaged? Are alarm systems damaged? Can the area be secured? When appropriate determinations have been reached, report the results immediately to the COMSEC Custodian and on-site security.

58 Practices to Avoid This should never happen!!!
Using equipment and key on the wrong contract, for the wrong purpose, and/or in an unauthorized manner “But this is the way we do it in the Navy.” Loaning equipment outside the control of the Hand Receipt User “I knew it would be returned and not lost!” Pulling “future” key segments out of their protective packaging and using them prior to authorized, effective dates “We were having problems with today’s key segments, so we pulled the others to see if we would have problems with them.”

59 Practices to Avoid Not destroying superseded keying material in a timely manner “I didn’t think it was important since it had already been used.” Modifying someone else’s entry on a Disposition Record “I know he did it, but he isn’t here to correct it himself.” Receiving and distributing COMSEC material outside the COMSEC channels, even though the packaging containing the material clearly indicates that the material is to be delivered to the COMSEC Custodian by name “I saw that, but – you’ve got to understand! – it was a shortage item which we had to process.”

60 Disclosure of Information
Disclosure of information, quite simply is when information passes from one party to another. When dealing with classified, sensitive or COMSEC information, it is the responsibility of the party possessing the information to ensure it is not disclosed to parties who do not have a need for or a right to the information.

61 Authorized Disclosure
Disclosure of classified, sensitive or COMSEC information is authorized only when the party receiving the information has the proper clearance or background check, can be properly identified and has a need to know. Need to Know does not mean because a person holds a high management position that they automatically need access to the information.

62 Unauthorized Disclosure
Unauthorized disclosure of classified, sensitive or COMSEC information is when the party receiving the information does not have the proper clearance or in most cases a need to know. In most cases, unauthorized disclosures are unintentional and due to poor planning or a failure to think by the possessing party.

63 Unaware of Surroundings
One of the leading causes of unintentional disclosures is simply people not being aware of their surroundings. Discussing classified, sensitive or COMSEC information when you are unsure or unaware of your surroundings can quickly lead to this information being disclosed to the wrong people.

64 Awe of Position We all want to please our management, and work very hard each day to do so. We must remember, just because they are our supervisors, we can’t always give them the information they request. If a higher-up requests anything that is classified, sensitive or COMSEC in nature, we must make sure they meet all the requirements for access to this information just like everyone else.

65 Trapped by Time Whenever we feel rushed, or have a deadline that we can’t see ourselves making, we tend to cut corners. When we are in this type of situation and working with classified, sensitive or COMSEC information, the corners we cut could very likely lead to an unintentional disclosure. We must remember when working with classified, sensitive or COMSEC information, the job must be done by the book, no matter how long it takes.

66 Emotional Hazard Emotions play a very big part in our lives, and affect each of us on a daily basis. When we let emotions cloud our thinking, the classified, sensitive or COMSEC information we are working with is at risk of an unintentional disclosure. Note: Emotions are one of the most difficult of all the unintentional disclosure risks to control.

67 Security Incidents Security Incidents are events or incidents that may jeopardize the security of any of the COMSEC Elements, classified or sensitive information or materials.

68 Security Incidents Personnel Physical Cryptographic
Security incidents can be broken into three categories that are: Personnel Physical Cryptographic

69 Personnel Security Incidents
Personnel security incidents are events or incidents that involve acts of espionage and sabotage, or the willful or unwillful disclosure of information to hostile or foreign agents by personnel having authorized access to the information.

70 Physical Security Incidents
Physical security incidents occur when the control over classified, sensitive, and/or COMSEC equipment, materials or information is lost.

71 Cryptographic Security Incidents
Cryptographic security incidents are willful or unwillful actions or inactions that place any element of a Cryptosystem in jeopardy of compromise.

72 Security Incidents Also includes: Reporting the incident.
Correcting the problem. Investigating the cause. Performing preventive measures.

73 Incident Reporting All incidents involving COMSEC material and/or violations of COMSEC security requirements must be reported immediately to the COMSEC Custodian. The COMSEC Custodian will conduct an internal inquiry into the incident/violation. Depending on the type and severity of the incident/violation, a preliminary report may be required by the NSA within 24 hours and – if keying material is involved – also to the Controlling Authority. A final report is required within 72 hours. Personnel associated with the incident/violation are subject to disciplinary action by the company and/or the U.S. Government, based on the findings of the investigation.

74 Reporting the Incident
Any event or incident that jeopardizes any of the COMSEC Elements, classified or sensitive information or materials must be reported immediately.

75 Reporting the Incident
We must be careful when reporting an incident, because, on most occasions, the initial report will be made over some type of unsecure means of communications. Don’t Report in This Manner I left the safe open and now I can’t find the Crypto Keys! Do Report in this Manner I have an issue, could you come see me!

76 Importance of Reporting Violations?
Particularly important to the protection of COMSEC equipment and material is an understanding of all security regulations and the timely reporting of any compromise or security problem involving these items. If a COMSEC system was compromised and not reported, the continued use of that system could result in a loss of all information on that system. If a compromise was reported, steps should be made to change the system or replace the keying material to reduce the damage. It is each individual’s responsibility to protect the COMSEC equipment and material to which they have access and report any violations.

77 Correcting the Problem
The first priority is to correct the problem. Two solutions are: Securing an unsecure area or container. Taking the affected equipment or system out of service.

78 Incident Investigation
The COMSEC Custodian will perform an investigation into the cause of the incident. All involved persons are expected to cooperate fully with the investigation.

79 Incident Investigation
The investigation determines the severity of the incident. There four levels of severity: Compromise Not Ruled Out COMPROMISE Compromise Improbable Dangerous Practice COMPROMISE CANNOT BE RULED OUT NO COMPROMISE

80 Preventive Measures Changing Procedures Personnel Changes
Preventive Measures are anything performed to prevent a recurrence of the same type of incident: Changing Procedures Personnel Changes Arrest and Conviction

81 U.S. Laws and Acts Apply to COMSEC
All individuals are subject to the following U.S. laws, which cover the improper transfer of national defense and/or economic property, data, and information: U. S. Title 18 U. S. Title 50 Economic Espionage Act of 1996 Individuals found guilty of violating applicable laws may incur severe fines, imprisonment, or both.

82 EKMS/KMI Transition The Key Management Infrastructure (KMI) is the National Security Agency (NSA) infrastructure project to meet the Department of Defense (DoD) Global Information Grid Information Assurance (GIG-IA) strategy. NSA is replacing current Electronic Key Management System (EKMS) with Key Management Infrastructure (KMI). KMI requires SIPRnet for connectivity to NSA. On December 31, 2017, NSA will terminate operational support for use of the EKMS Local Management Device (LMD)/Key Processor (KP), including support for key ordering, retrieval, distribution, and local generation. Operational LMD/KPs must be replaced by a Key Management Infrastructure (KMI) Management Client (MGC) in order to sustain the key provisioning services.

83 EKMS/KMI Transition Large companies may request SIPRnet to distribute key within their company. Small companies will have KMI options available to choose from to handle their key requirements. KMI release schedule is January 2013 through December 31, 2017. After December 31, 2017, NSA will not provide any other Key Material distribution support other than KMI.

84 Questions?


Download ppt "COMSEC (Communications Security)"

Similar presentations


Ads by Google