12.1 Information Resources and Technology Management
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
TB 380-41 Final!
klg DISTRIBUTION RESTRICTION STATEMENT The technical or operational information in this manual is required solely for official use; therefore, distribution is authorized to U.S. Government agencies only. This determination was made on 1 January 1993. For further information, see page i of this document. WARNING: Military or civilian personnel who misuse or disclose to unauthorized persons information marked For Official Use Only (FOUO) may be subject to administrative sanctions brought under UCMJ Article 92, or in accor- dance with AR 690-700, Chapter 751, Table 1-1. Elec- tronic copies made of any publication herein must (1) bear the Four Official Use Only marking, and (2) include this WARNING in its entirety. Protective marking is in accordance with paragraph 3-200, Exemption 3a, AR 25-55. Destroy by any method that will prevent disclosure of contents or reconstruction of the document. Headquarters, Department of the Army Date of this Publication is 1 August 2003. Current as of 1 July 2003. This bulletin supersedes TB 380-41, October 1994 and rescinds the use of DA Forms 2008 and 2009. FOR OFFICIAL USE ONLY TB 380-41 DISTRIBUTION RESTRICTION STATEMENT OUTSIDE THE U.S. GOVERNMENT RELEASE: Requests from outside the U.S. Government for release of this publication under the Foreign Military Sales Program must be made to Commander, U.S. Army Security Assistance Center, ATTN: AMSAC-MI/I, 5002 Eisenhower Ave., Alexandria, VA 22333-0001. Request from outside the U.S. Government for release of this publication under the Freedom of Information Act must be made to the Director, Communications-Electronics Command (CECOM), Communications Security Logistics Activity (CSLA) at ATTN: SELCL-ID-P3, U.S. -
Model 90Si Secure Fax Gateway User's Guide
Model 90si Secure Fax Gateway User's Guide GateWay Fax Systems, Inc. Secure Fax Products Virginia, USA Tel: 804-796-1900 Toll-Free: 877-951-9800 Fax: 804-796-1116 E-Mail: [email protected] Web: www.gwfs.com Help Line: 877-951-9814 Revision 4.7 3/27/2013 GateWay Fax Systems, inc. Model 90si Secure Fax Gateway User's Guide 90si Quick Reference Guide Your 90si comes from the factory set for the Secure Only mode, whereby the commercial (COTS) fax connects to the 90si’s FAX jack (the other two phone jacks remain empty) and the 90si’s RS-232 Data cable connects to the Secure Data port of your crypto device. In this configuration the COTS fax can only be used for classified transac- tions with the crypto in Secure Data Mode. Connecting the COTS fax, 90si and Crypto This diagram shows the default (and recommended) factory configuration for the 90si. Shown are the rear panel of the 90si, Secure Telephone, Commercial-Off-The-Shelf (COTS) fax and the outside telepone line connection. Although there are other 90si configurations, this one will work right out of the box. See Section 2.3, Choose a Configuration, for others. 90si Secure Fax Gateway Rear Panel FAX Commercial-Off-The-Shelf Fax Machine 5VDC Power LINE (Set to Auto-Answer on 1 Ring) Supply "Red" Data Port "Secure" Secure Telephone PSTN Phone Line / Crypto (Set to Async 9.6kbps) Telephone Wall Jack Transmitting a Secure Fax Step Procedure 1. Place a call on your secure telephone / crypto. 2. Place it in secure data mode and set the handset on the table 3. -
Safeguarding and Controlling Communications Security Material
Headquarters Army in Europe United States Army, Europe, and Seventh Army United States Army Installation Management Agency Regulation 380-40* Europe Region Office Heidelberg, Germany 10 July 2003 Security Safeguarding and Controlling Communications Security Material *This regulation supersedes AE Regulation 380-40, 2 May 2003. For the CG, USAREUR/7A: MICHAEL L. DODSON Lieutenant General, USA Deputy Commanding General/ Chief of Staff Official: GARY C. MILLER Regional Chief Information Officer - Europe Summary. This regulation establishes policy and prescribes procedures for safeguarding, controlling, and disposing of communications security (COMSEC) material in the European region. Summary of Change. This revision provides updated procedures for controlling secure cellphones in private quarters (para 13c). Applicability. This regulation applies to organizations supported by USAREUR that handle COMSEC material. The policy and procedures in this regulation apply down to company level. Supplementation. Commanders will not supplement this regulation without USAREUR G2 (AEAGB-SAD-S) approval. Forms. This regulation prescribes AE Form 380-40A, AE Form 380-40B, AE Form 380-40C, AE Form 380-40D, and AE Form 380-40E. AE and higher-level forms are available through the Army in Europe Publishing System (AEPUBS). Records Management. Records created as a result of processes prescribed by this regulation must be identified, maintained, and disposed of according to AR 25-400-2. File numbers and descriptions are available on the Army Records Information Management System website at https://www.arims.army.mil. Suggested Improvements. The proponent of this regulation is the USAREUR G2 (AEAGB-SAD-S, DSN 370-7214). Users may suggest improvements to this regulation by sending DA Form 2028 to the USAREUR G2 (AEAGB-SAD-S), Unit 29351, APO AE 09014-9351. -
FINAL COLT 69.Pub
CSLA’s COMSEC Logistics & Technical Newsletter GIPC 2010 KG Rules Destruction Accountability of Classified COMSEC Equipment Listing Multiple Discrepancies for ONE Short Title on an Incident Report INE Corner Going Secure using the KSV-21 Key Order Requests for KSV-21 ISSUE #69 2010 MARCH Preparation of COMSEC Incident Reports COMSEC Incident Report Corrective Actions Submitting Incident Reports COMSEC NICP Relocation from Ft. Huachuca, AZ to Aberdeen Proving Ground, MD KSD-64s Destruction and Disposition Fortezza Plus Crypto Card Family End of Life CIR DIRECTORY FROM THE EDITOR Communications Security Logistics Activity [CSLA] Fort Huachuca, Arizona CECOM Bottom Line: One Vision, One Mission — The WARFIGHTER "This document contains information exempt from mandatory disclosure under the FOIA. Exemption 3 applies. The information contained herein that is marked U//FOUO is for the exclusive use of the DoD, other U.S. government, and U.S. contract employees with a need-to-know. Such information is specifically prohibited from posting on unrestricted bulletin boards or other unlimited access applications, and to email aliases." FOR OFFICIAL USE ONLY reservations. Also, be sure to request the govern- Global INFOSEC Partnership ment rate when making reservations at hotels that Conference (GIPC) 2010 (U) have no room blocks. The FY10 lodging per diem rate for Fort Huachuca and Sierra Vista is $83. By Alicia DeCarlo, AMSEL-LCA-MFS DSN: 879-7583/CML: (520)538-7583 The following is a list of lodging establishments, email: [email protected] phone numbers, room rates and available GIPC- blocked rooms: (U) There has been a change to the previously re- leased Global INFOSEC Partnership Conference ARMY LODGING (GIPC) 2010 information in COLT #68 dated Novem- (520) 533-2222/533-2107 ber 2009. -
Technical Security Program
U.S. Department of Energy ORDER Washington, D.C. DOE O 470.6 Approved: 9-2-2015 Chg 1 (MinChg): 1-11-2017 SUBJECT TECHNICAL SECURITY PROGRAM : 1. PURPOSE. This Order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. The scope of the DOE TSP is the following elements: a. Technical Surveillance Countermeasures (TSCM) - designed to detect, deter, isolate, and nullify technical surveillance penetrations and technical security hazards. b. TEMPEST - designed to prevent the unauthorized intercept of compromising emanations that may be present in information processing communication equipment, systems, and components. c. Protected Distribution Systems (PDS) - designed to protect unencrypted classified signal/data lines that exit secure areas and traverse through areas of lesser security. d. Wireless Security (WISEC) - designed to test/evaluate the impact of mobile and fixed wireless communication devices used in or near classified and sensitive unclassified activity areas for the purpose of determining risks and countermeasures. e. Communications Security (COMSEC) - designed to protect and control the means and materials used to provide encrypted communications. 2. CANCELLATIONS. a. DOE M 470.4-4A Chg. 1, Information Security Manual, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret). b. DOE M 205.1-3, Telecommunications Security Manual (Official Use Only) and Part II (Secret), dated 4-17-2006 to include classified annexes. -
Technical Security Program
U.S. Department of Energy ORDER Washington, D.C. DOE O 470.6 Approved: 09-02-2015 SUBJECT: TECHNICAL SECURITY PROGRAM 1. PURPOSE. a. This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. b. The DOE TSP includes the following elements: (1) Technical Surveillance Countermeasures (TSCM) designed to detect, deter, isolate, and nullify technical surveillance penetrations and technical security hazards. (2) TEMPEST designed to prevent the unauthorized intercept of compromising emanations that may be present in information processing communication equipment, systems, and components. (3) Protected Distribution Systems (PDS) designed to protect unencrypted classified signal/data lines that exit secure areas and traverse through areas of lesser security. [see Attachment 2, paragraph j.(87)] (4) Wireless Security (WISEC) designed to test/evaluate the impact of mobile and fixed wireless communication devices used in or near classified and sensitive unclassified activity areas for the purpose of determining risks and countermeasures. [see Attachment 2, paragraph j.(10)] (5) Communications Security (COMSEC) designed to protect and control the means and materials used to provide encrypted communications. 2. CANCELLATIONS. a. DOE M 470.4-4A Chg. 1, Information Security Manual, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret). b. DOE M 205.1-3, Telecommunications Security Manual (Official Use Only) and Part II (Secret), dated 4-17-2006.