FINAL COLT 69.Pub

Total Page:16

File Type:pdf, Size:1020Kb

FINAL COLT 69.Pub CSLA’s COMSEC Logistics & Technical Newsletter GIPC 2010 KG Rules Destruction Accountability of Classified COMSEC Equipment Listing Multiple Discrepancies for ONE Short Title on an Incident Report INE Corner Going Secure using the KSV-21 Key Order Requests for KSV-21 ISSUE #69 2010 MARCH Preparation of COMSEC Incident Reports COMSEC Incident Report Corrective Actions Submitting Incident Reports COMSEC NICP Relocation from Ft. Huachuca, AZ to Aberdeen Proving Ground, MD KSD-64s Destruction and Disposition Fortezza Plus Crypto Card Family End of Life CIR DIRECTORY FROM THE EDITOR Communications Security Logistics Activity [CSLA] Fort Huachuca, Arizona CECOM Bottom Line: One Vision, One Mission — The WARFIGHTER "This document contains information exempt from mandatory disclosure under the FOIA. Exemption 3 applies. The information contained herein that is marked U//FOUO is for the exclusive use of the DoD, other U.S. government, and U.S. contract employees with a need-to-know. Such information is specifically prohibited from posting on unrestricted bulletin boards or other unlimited access applications, and to email aliases." FOR OFFICIAL USE ONLY reservations. Also, be sure to request the govern- Global INFOSEC Partnership ment rate when making reservations at hotels that Conference (GIPC) 2010 (U) have no room blocks. The FY10 lodging per diem rate for Fort Huachuca and Sierra Vista is $83. By Alicia DeCarlo, AMSEL-LCA-MFS DSN: 879-7583/CML: (520)538-7583 The following is a list of lodging establishments, email: [email protected] phone numbers, room rates and available GIPC- blocked rooms: (U) There has been a change to the previously re- leased Global INFOSEC Partnership Conference ARMY LODGING (GIPC) 2010 information in COLT #68 dated Novem- (520) 533-2222/533-2107 ber 2009. Due to a change in Army Materiel Com- $53 PLUS TAX mand (AMC) conference policy, the 19th annual 40 RMS BLOCKED UNDER THE NAME ‘GIPC’ GIPC and technology expo will now be hosted by BEST WESTERN MISSION INN SIERRA VISTA the Southern Arizona Chapter of the Armed Forces (520) 458-8500 Communications and Electronics Association $83 PLUS TAX (AFCEA) at Fort Huachuca, AZ from 4-6 May 2010. 20 RMS BLOCKED UNDER THE NAME ‘GIPC’ GIPC 2010 (U) The theme for GIPC 2010 is “COMSEC: A KEY BEST WESTERN QUAIL HOLLOW INN ELEMENT IN PROTECTING THE GLOBAL NETWORK BENSON, AZ ENTERPRISE CONSTRUCT.” (APPROXIMATELY 30 MINUTES FROM SIERRA (U) Lieutenant General (LTG) Dennis L. Via, VISTA/FT HUACHUCA) Joint Chiefs of Staff, J6, is scheduled as GIPC’s (520) 586-3646 featured Keynote Speaker. $83 PLUS TAX 10 RMS BLOCKED UNDER THE NAME ‘GIPC’ (U) Lectures, workshops, and displays are sched- uled to be co-located at Fort Huachuca’s Greely Hall CANDLEWOOD SUITES (Bldg #61801), Carter Street Training Facility (Bldg (800) 970-4654/(520) 439-8200 #74912), and at Fitch Auditorium (Alvarado Hall, $83 PLUS TAX Bldg #62711). 40 RMS BLOCKED UNDER THE NAME ‘GIPC’ (U) Because of GIPC’s popularity and space con- FAIRFIELD INN & SUITES BY MARRIOTT straints, the number of registered attendees must be (520) 439-5900 limited to 325. It is recommended that all travel and $83 PLUS TAX lodging arrangements be made early, and registra- 10 RMS BLOCKED UNDER THE NAME ‘GIPC’ tion completed as soon as website registration is GATEWAY STUDIO SUITES available. (877) 443-6200/(520) 458-5555 (U) As a courtesy, CSLA will provide a link to the $83 PLUS TAX GIPC host website when it becomes operational. 10 RMS BLOCKED UNDER THE NAME ‘GIPC’ The host website is scheduled to become available GARDEN PLACE SUITES in March 2010. The site will house all conference (520) 439-3300 information, workshop scheduling, and attendee and $83 PLUS TAX exhibitor registration/ payment for GIPC 2010. 10 RMS BLOCKED UNDER THE NAME ‘GIPC’ Please continue to check the CSLA website for the host link with your CAC associated to an AKO HAMPTON INN account at: https://www.csla.army.mil/ or http:// (520) 439-5400 csla.army.mil/ for public access. $83 PLUS TAX 20 RMS BLOCKED UNDER THE NAME ‘GIPC’ (U) Arrangements have been made with local hotels to hold GIPC-blocked rooms until mid April; HOLIDAY INN EXPRESS SIERRA VISTA however, some may release the block as early as (888) 465-4329/(520) 439-8800 mid-March. Hotel rates may vary from the list below. $83 PLUS TAX Be sure to refer to the room block by name and con- 40 RMS BLOCKED UNDER THE NAME ‘GIPC’ firm the room rate when contacting the hotel for (Continued on page 3) 2 FOR OFFICIAL USE ONLY (Continued from page 2) HOLIDAY INN EXPRESS TOMBSTONE (U) For administrative questions regarding GIPC (APPROXIMATELY 30 MINUTES FROM SIERRA 2010, feel free to contact the CSLA POCs: VISTA/FT HUACHUCA) Ms. Alicia DeCarlo, (520) 457-9507 DSN 879-7583/CML (520) 538-7583 $83 PLUS TAX 10 RMS BLOCKED UNDER THE NAME ‘GIPC’ Ms. Karen Molet, DSN 821-1853/CML (520) 533-1853 QUALITY INN AND CONFERENCE CENTER (800) 458-0982/(520) 458-7900 Ms. Ronda Harmon, DSN 879-6469/CML (520) 538-6469 $83 PLUS TAX 80 RMS BLOCKED UNDER THE NAME ‘GIPC’ [email protected] SIERRA SUITES (520) 459-4221 $83 PLUS TAX 50 RMS BLOCKED UNDER THE NAME ‘GIPC’ SUBURBAN EXTENDED STAY (520) 458-0540 $83 PLUS TAX 40 RMS BLOCKED UNDER THE NAME ‘GIPC’ SUN CANYON INN (800) 822-6966/(520) 459-0610 $83 PLUS TAX 25 RMS BLOCKED UNDER THE NAME ‘GIPC’ WINDEMERE HOTEL AND CONFERENCE CENTER KG-Rules Destruction (U) (800) 825-4656/(520) 459-5900 By Claire Clark, AMSEL-LCA-KEY $83 PLUS TAX DSN: 879-6532/CML: (520) 538-6532 40 RMS BLOCKED UNDER THE NAME ‘GIPC’ email: [email protected]/mil -------------------------------------------------------------- (U) CSLA Tier 1 has recently noticed some Other area hotels with no room blocks: COMSEC accounts are holding both Edition I (9) AMERICA’S BEST VALUE INN and Edition J (10) of the KG-Rules, USKAD (888) 315-2378/(520) 459-5380 BU71260 880091. Edition I is superseded there- fore the only edition a COMSEC Account may cur- BELLA VISTA rently hold is Edition J. If your COMSEC Account (520) 458-6737 contains Edition I, you are required to destroy it. BUDGET INN / SIERRA VISTA EXTENDED STAY (U) Keep in mind, no matter what supersession (520) 458-6711 date appears on an old edition of KG-Rules, as soon as a new edition is received, COMSEC Ac- COMFORT INN count Managers are required to destroy the old (800) 221-2222/(520) 459-0515 edition. HOLIDAY INN EXPRESS BENSON, AZ (U) If you do not have Edition J, you may request KG-RULES (APPROXIMATELY 30 MINUTES FROM SIERRA it electronically by contacting the Army Electronic VISTA/FT HUACHUCA) Key Management System (EKMS) Help Desk at: (520) 586-8800 DSN: 879-9900/CML: (520) 538-9900, or toll free 1-877-896-8094. TOWNEPLACE SUITES BY MARRIOTT (520) 515-9900 3 FOR OFFICIAL USE ONLY Listing Multiple Discrepancies Accountability of Classified for ONE Short Title on an COMSEC Equipment (U) Incident Report (U) By Mr. Pete Michaud, AMSEL-LCA-CPT By: Brenda Stacy, AMSEL-LCA-COR DSN: 879-6431/CML: (520) 538-6431 DSN: 879-7068/CML: (520) 538-7068 email: [email protected] email: [email protected] (U) Attention COMSEC Account Managers (CAMs) - (U) Today there are approximately 1,200 classified When listing multiple discrepancies per short title on COMSEC items of equipment incorrectly accounted an Incident Report, annotating each discrepancy for in the Property Book Unit Supply Enhanced separately with the short title is not necessary. The (PBUSE) Automated System. COMSEC equipment COMSEC Incident Monitoring Activity (CIMA) re- items identified with a Controlled Inventory Item quests that CAMs record each short title only Code (CIIC) of "D", "E" or "F", are classified as once, and consolidate and summarize all discrep- CONFIDENTIAL, SECRET, AND TOP SECRET; ancies in the description. therefore they MUST be accounted for exclusively within the COMSEC Material Control System For example: (CMCS), and ONLY by a duly appointed COMSEC INCORRECT: Account Manager. This is outlined in AR 710-2, USAED 123 5A8240 ED: A paragraph 1.18.d (1). Property Book Accounts are INCIDENT DESCRIPTION: Missing witness sig- required to maintain property records for such classi- nature. fied COMSEC items authorized under TAADS, but USAED 123 5A8240 ED: A those records are only allowed to reflect Authoriza- INCIDENT DESCRIPTION: Incomplete date. tion Data and Identification Data as described in USAED 123 5A8240 ED: A paragraph 2-5k AR 710-2. See also DA Pamphlet INCIDENT DESCRIPTION: Wrong date on EKM 710-2-1, paragraph 4-7b. Property transactions, on Worksheet. hand balances, serial number data, and location in- USAED 123 5A8240 ED: A formation for classified COMSEC equipment must INCIDENT DESCRIPTION: EKM Worksheet not be posted to PBUSE accounting records. This lined thru with no supporting MFR. is a security violation. Property Book Officers AKAD 1223 888888 ED: 000001 ACCOUNTABILITY (PBOs) should transfer all classified COMSEC INCIDENT DESCRIPTION: Missing witness equipment currently accounted for on property book signature. AKAD 1223 888888 ED: 000001 accounts to the local designated supporting COMSEC account using a DA Form 3161 Lateral INCIDENT DESCRIPTION: Incomplete date Transfer Voucher Document. The COMSEC AKAD 1223 888888 ED: 000001 Account Manager will use this Transfer Document to INCIDENT DESCRIPTION: Wrong date on EKM support the preparation of a COMSEC Material Pos- Worksheet. session Report and establish CMCS Accountability. AKAD 1223 888888 ED: 000001 PBOs can then utilize the Asset Description Update INCIDENT DESCRIPTION: EKM Worksheet lined (ADU) to drop those classified COMSEC items from thru with no supporting MFR. the property book.
Recommended publications
  • TB 380-41 Final!
    klg DISTRIBUTION RESTRICTION STATEMENT The technical or operational information in this manual is required solely for official use; therefore, distribution is authorized to U.S. Government agencies only. This determination was made on 1 January 1993. For further information, see page i of this document. WARNING: Military or civilian personnel who misuse or disclose to unauthorized persons information marked For Official Use Only (FOUO) may be subject to administrative sanctions brought under UCMJ Article 92, or in accor- dance with AR 690-700, Chapter 751, Table 1-1. Elec- tronic copies made of any publication herein must (1) bear the Four Official Use Only marking, and (2) include this WARNING in its entirety. Protective marking is in accordance with paragraph 3-200, Exemption 3a, AR 25-55. Destroy by any method that will prevent disclosure of contents or reconstruction of the document. Headquarters, Department of the Army Date of this Publication is 1 August 2003. Current as of 1 July 2003. This bulletin supersedes TB 380-41, October 1994 and rescinds the use of DA Forms 2008 and 2009. FOR OFFICIAL USE ONLY TB 380-41 DISTRIBUTION RESTRICTION STATEMENT OUTSIDE THE U.S. GOVERNMENT RELEASE: Requests from outside the U.S. Government for release of this publication under the Foreign Military Sales Program must be made to Commander, U.S. Army Security Assistance Center, ATTN: AMSAC-MI/I, 5002 Eisenhower Ave., Alexandria, VA 22333-0001. Request from outside the U.S. Government for release of this publication under the Freedom of Information Act must be made to the Director, Communications-Electronics Command (CECOM), Communications Security Logistics Activity (CSLA) at ATTN: SELCL-ID-P3, U.S.
    [Show full text]
  • Ky-57 Vinson
    KY-57 VINSON Homepage Crypto KY-57 (VINSON) Index Voice encryption unit Enigma The KY-57 was a wide-band voice encryption unit that was developed in the USA during the 1970s as a replacement of the NESTOR cryptographic products, such as the KY-38. It was suitable for use with a Hagelin wide range of military radios and telehone lines. As part of the VINSON family of devices, it was the main Fialka crypto 'workhorse' of the US Army during the 1980s. Even today, many radios and voice encryption devices are still backwards compatible with the KY-57, that is also known as the TSEC/KY-57. The Siemens airborne version of the KY-57 is called the KY-58. Philips The KY-57 uses the NSA-developed Type-1 KY-57 voice encryption unit Nema SAVILLE cryptographic algorithm. When used in combination with a radio transceiver, such as the Racal SINCGARS non-ICOM RT-1439/VRC, the KY-57 STK allows signal fades or losses for up to 12 seconds without losing synchronization. Transvertex The KY-57 was eventually superceeded by the KY- Gretag 99 that offered newer - more advanced - Telsy cryptographic algorithms, but that was still backwards compatible with the KY-57. Later Tadiran SINCGARS ICOM radios, such as the RT-1523, had built-in KY-57 (VINSON) compatibility. USA USSR Both voice and data can be encrypted with the KY-57. Voice data is digitized using Continuous Variable Slope Delta modulation (CVSD), similar to other voice crypto systems of the same era, such as the UK Philips Spendex-10 , the Spendex 50 and the Telsy TS-500.
    [Show full text]
  • KY-58 (Vinson)
    KY-58 (Vinson) The KY-57/58 is a member of the VINSON family. The VINSON family consists of wideband secure voice (WBSV) units developed by the National Security Agency to provide line of sight half-duplex voice and data encryption at 16 Kbps. The KY-57/58 provides security for AM/FM, VHF, UHF, half-duplex PTT combat net radios and tactical wireline systems when used with the HYX-57. Also used by non-tactical users for high-level communications in the local wideband telephone networks and wideband satellite terminals. The KY-57 is the manpack/vehicular model and the KY-58 is the airborne/shipborne version. The KY-57/58 is certified to pass data up to TOP SECRET and accepts key from the family of Common Fill Devices and also incorporates remote keying. KY-57/58 production was completed in 1993. No further production is planned. KY-58 photo by Tim Tyler Tim Tyler comments."The photo above depicts the KY-58 unit inside a USCG HH-65C 'Dolphin' helicopter taken in September 2008. It is currently configured just for use on their 225-400MHz aircraft band radio. Supposedly, they're in the process of upgrading the HH-65 helos into an MH-65 (Special Ops capable) configuration which will have APCO P-25 compliant radios (with AES crypto, for talking to other DHS agencies) as well as ANDVT / KY-100 type crypto for communicating with the military-side of USCG ops". The photo above depicts a KY-58 RCU installation in an A-10 attack aircraft.
    [Show full text]
  • A History of U.S. Communications Security (U)
    A HISTORY OF U.S. COMMUNICATIONS SECURITY (U) THE DAVID G. BOAK LECTURES VOLUME II NATIONAL SECURITY AGENCY FORT GEORGE G. MEADE, MARYLAND 20755 The information contained in this publication will not be disclosed to foreign nationals or their representatives without express approval of the DIRECTOR, NATIONAL SECURITY AGENCY. Approval shall refer specifically to this publication or to specific information contained herein. JULY 1981 CLASSIFIED BY NSA/CSSM 123-2 REVIEW ON 1 JULY 2001 NOT RELEASABLE TO FOREI6N NATIONALS SECRET HA~mLE YIA COMINT CIIA~HJELS O~JLY ORIGINAL (Reverse Blank) ---------- • UNCLASSIFIED • TABLE OF CONTENTS SUBJECT PAGE NO INTRODUCTION _______ - ____ - __ -- ___ -- __ -- ___ -- __ -- ___ -- __ -- __ --- __ - - _ _ _ _ _ _ _ _ _ _ _ _ iii • POSTSCRIPT ON SURPRISE _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ I OPSEC--------------------------------------------------------------------------- 3 ORGANIZATIONAL DYNAMICS ___ -------- --- ___ ---- _______________ ---- _ --- _ ----- _ 7 THREAT IN ASCENDANCY _________________________________ - ___ - - _ -- - _ _ _ _ _ _ _ _ _ _ _ _ 9 • LPI _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ I I SARK-SOME CAUTIONARY HISTORY __ --- _____________ ---- ________ --- ____ ----- _ _ 13 THE CRYPTO-IGNITION KEY __________ --- __ -- _________ - ---- ___ -- ___ - ____ - __ -- _ _ _ 15 • PCSM _ _ _ _ _ _ _ _ _ _ _ _ _ _
    [Show full text]
  • Link 16 Secure Voice J-Voice for the Entire Operations Team
    Product brief: Link 16 secure voice J-Voice for the entire operations team Since its early beginnings in the Vietnam War, Link 16 (L16) has been consistently improved and has subsequently developed into the primary military tactical data link for NATO and selected friendly nations. Commanders are able to employ L16 to exchange vast amounts of mission data between likewise equipped units in real time without fear of cyber attack or being subject to electronic counter measures. One key element of L16 capability is its ability to host secure voice channels – often referred to a J-Voice (Joint Tactical Information Distribution System – JTIDS) – and this is an area where Frequentis can add value. By using the field-proven and certified ground/air and ground/ground secure communications system iSecCOM, Frequentis provides the customer with unparalleled J-Voice connectivity to every iSecCOM position. Key features Link 16 secure voice iSecCOM enables Link 16 secure voice to be available at each operator position. Routed from the workstation via the Link 16 MIDS (multifunctional information distribution system) terminals, both channels A and B, (16kbps & 2.4kbps) are supported. Simplified communications and full control iSecCOM provides full-spectrum communication services, including all radio and telephony services, combined with selected data and Link 16 secure voice full radio remote control services. at a glance Designed by the operators and for the operators • Link 16 Secure Voice connectivity to combat aircraft Frequentis leverages decades of experience working • Embedded electronic-counter-counter- with operators to define the most user-friendly measures in every operator position HMI based on its field-proven, military-grade IT solutions used by multiple forces around the globe.
    [Show full text]
  • Model 90Si Secure Fax Gateway User's Guide
    Model 90si Secure Fax Gateway User's Guide GateWay Fax Systems, Inc. Secure Fax Products Virginia, USA Tel: 804-796-1900 Toll-Free: 877-951-9800 Fax: 804-796-1116 E-Mail: [email protected] Web: www.gwfs.com Help Line: 877-951-9814 Revision 4.7 3/27/2013 GateWay Fax Systems, inc. Model 90si Secure Fax Gateway User's Guide 90si Quick Reference Guide Your 90si comes from the factory set for the Secure Only mode, whereby the commercial (COTS) fax connects to the 90si’s FAX jack (the other two phone jacks remain empty) and the 90si’s RS-232 Data cable connects to the Secure Data port of your crypto device. In this configuration the COTS fax can only be used for classified transac- tions with the crypto in Secure Data Mode. Connecting the COTS fax, 90si and Crypto This diagram shows the default (and recommended) factory configuration for the 90si. Shown are the rear panel of the 90si, Secure Telephone, Commercial-Off-The-Shelf (COTS) fax and the outside telepone line connection. Although there are other 90si configurations, this one will work right out of the box. See Section 2.3, Choose a Configuration, for others. 90si Secure Fax Gateway Rear Panel FAX Commercial-Off-The-Shelf Fax Machine 5VDC Power LINE (Set to Auto-Answer on 1 Ring) Supply "Red" Data Port "Secure" Secure Telephone PSTN Phone Line / Crypto (Set to Async 9.6kbps) Telephone Wall Jack Transmitting a Secure Fax Step Procedure 1. Place a call on your secure telephone / crypto. 2. Place it in secure data mode and set the handset on the table 3.
    [Show full text]
  • L3harris Falcon Iii® An/Prc-117G(V)1(C)
    L3HARRIS FALCON III® AN/PRC-117G(V)1(C) Multiband Networking Manpack Radio The L3Harris AN/PRC-117G delivers breakthrough wideband ADVANCED MULTIBAND data speed and legacy narrowband performance. Equipped with NETWORK PERFORMANCE MUOS-ready hardware, this manpack is 30% smaller and 35% lighter than any other currently in field. The AN/PRC-117G is also the industry’s first and only tactical radio with NINE Suite B encryption, KEY BENEFITS allowing sovereign nations to securely interoperate with the U.S., > Expands mission effectiveness NATO and regional tactical partners. This eliminates the time and with wideband, SATCOM and expense of maintenance, training and logistical support for two legacy narrowband separate radio systems. > 30% smaller and 35% lighter than any similar manpack When paired with L3Harris RF-7800B currently in field Broadband Global Area Network > MUOS-ready hardware terminals, the manpack delivers automatic SATCOM BLOS range > Industry’s only radio with NINE extension along with Internet and Suite B encryption remote private network access. > SATURN waveform protects The Multiband Networking Manpack communications against enemy features the Second Generation interference Software defined, with a JTEL-certified Anti-Jam UHF Radio for NATO (SATURN) > Future-proof with SCA v2.2.2 Software Communications Architecture waveform, which is the most up-to-date compliance (no waivers) (SCA), the fully JTRS-compliant Multiband ground-to-air technology for avoiding > L3Harris Sierra II encryption Networking Manpack supports in-field enemy interference. Voice and data are for secure voice and data up to upgrades as new capabilities emerge. secure up to TOP SECRET through the TOP SECRET The AN/PRC-117G is MUOS-ready, Sierra™II encryption module, which extending critical communications also supports all JTRS COMSEC and > Embedded SAASM GPS receiver Beyond-Line-Of-Sight (BLOS) with TRANSEC requirements.
    [Show full text]
  • Case 2:17-Cv-00140-DLR Document 20 Filed 05/22/17 Page 1 of 160
    Case 2:17-cv-00140-DLR Document 20 Filed 05/22/17 Page 1 of 160 1 WO 1 2 2 3 3 4 4 5 5 6 IN THE UNITED STATES DISTRICT COURT 6 7 FOR THE DISTRICT OF ARIZONA 7 8 8 9 United States of America, No. CV-17-00140-PHX-DLR 9 10 Plaintiff, (Related Case No. CV-17-08007-PCT-DLR) 10 11 v. ORDER 11 12 Cyprus Amax Minerals Company; and 12 13 Western Nuclear, Inc., 13 14 Defendants. 14 15 15 16 The United States, on behalf of the Environmental Protection Agency, filed an 16 17 unopposed motion to enter the parties’ proposed consent decree. (Docs. 18, 18-6.) The 17 18 Navajo Nation filed a similar motion in its related suit against Defendants. (Doc. 23, No. 18 19 CV-17-08007-PCT-DLR.) The Court granted the motions, finding the consent decree to 19 20 be fair, reasonable, and consistent with the objectives of CERCLA. 20 21 IT IS ORDERED that the consent decree is hereby entered: 21 22 22 23 CONSENT DECREE 23 24 24 25 25 26 26 27 27 28 28 Case 2:17-cv-00140-DLR Document 20 Filed 05/22/17 Page 2 of 160 1 TABLE OF CONTENTS 2 I. BACKGROUND ............................................................................................................ 1 II. JURISDICTION ............................................................................................................. 3 3 III. PARTIES BOUND ......................................................................................................... 4 4 IV. DEFINITIONS ............................................................................................................... 4 V. GENERAL PROVISIONS ..........................................................................................
    [Show full text]
  • Lbl:E~Ijul!JC11!JI] JUN-AUG 1985
    TOP SECRET llJ~UVCDllJ£Dl1 ~C5CBC!JWVU~ aJl]C5UJCB~ crcmi1U l!ll511JU1l!ll5 l!l~ 0015~CDl5 f OO~W~Ck(i)GJ(D lBl:E~IJUl!JC11!JI] JUN-AUG 1985 ~> : ~ . 86- 36 NSA 1 S INITIATIVE ON SECURE VOICE (U)........... ••••••••••• 1 TELEPHONE SECURITY, 1918 (U) ••••••••.· .••.•••••.•.••••.•••• \ \ •..•"-:- .. ~ •.••.•••.. 4 BULLETIN BOARD (U) •••.•••••..•.•••••.••••••••••••.••..•••• ~\., -...• . ••••• ">. ......... 4 SHOPWORK (IV) (U) ............................. ·1 ).\ . · .... >.. ... · · · .5 AN APPLICATION OF PINSETTER (U)............ • • . ·I •••• 7 VALEDICTORY OF A TRAFFIC ANALYST (U) .•..••...••• Joseph Starr .. -. .....•..•.•• • 9 BACK UP YOUR DATA FILES (U) ..................... Norman P. Smith.\ .......... 10 ESCHEW OBFUSCATORY SCRIVENERY, PLEASE (U)....... ••••••••• 11 NSA-CROSTIC NO. 62 (U) ••••••••••••••.•••..•..••. D.H.W •.•.•••••.••••.•.•...• 12 'fHIS 80€l:JMl3Pi'i' €0:l"i'fAH'JS 60BFJWORB MATERIAE. OCID: 4019704 , P.L. 86- 36 Published by Pl . Techniques and Standards ·11 EDITORIAL VOL. XII , Nos. 6-8 ..... June-August 198S..<3f'/ /.}:l_i#nalysts in NSA have an opportunity to share their views and --,-------- --------- -----,..'-'"·/ ;/!fcJxperiences with others by writing for one of the several PUBLISHER . ._I____ .....;_.. / ..;j.;i! 'f. J:i eriodicals published in the Agency ·... ·.. :/j?/f BOARD OF EDITORS '" ·· 'i One of them is CRYPTOLOG. It is specifically intended for . , informal exchanges among analysts on subjects of interest to Editor .. .. .. .. ... .. l.._ ______,,k9f5 :3~f10~) · them. The editorial blue pencil is lightly applied, and only in the interest of clarity cz_ it's up to you to sustain the readers' (%j ~5ifr7> interest and toputyour idea~ across persuasively. Collection p.;..;..;..;..;..;..;.i....... I ___"' . Computer-Security . r t96~i$i4J) Comp~ter Systems ... Li. lr-------1(~~3t.'f 1Q3) For assistance, advice, or JUSt plain aid and comfort, you may Cryptanalysis ..
    [Show full text]
  • Safeguarding and Controlling Communications Security Material
    Headquarters Army in Europe United States Army, Europe, and Seventh Army United States Army Installation Management Agency Regulation 380-40* Europe Region Office Heidelberg, Germany 10 July 2003 Security Safeguarding and Controlling Communications Security Material *This regulation supersedes AE Regulation 380-40, 2 May 2003. For the CG, USAREUR/7A: MICHAEL L. DODSON Lieutenant General, USA Deputy Commanding General/ Chief of Staff Official: GARY C. MILLER Regional Chief Information Officer - Europe Summary. This regulation establishes policy and prescribes procedures for safeguarding, controlling, and disposing of communications security (COMSEC) material in the European region. Summary of Change. This revision provides updated procedures for controlling secure cellphones in private quarters (para 13c). Applicability. This regulation applies to organizations supported by USAREUR that handle COMSEC material. The policy and procedures in this regulation apply down to company level. Supplementation. Commanders will not supplement this regulation without USAREUR G2 (AEAGB-SAD-S) approval. Forms. This regulation prescribes AE Form 380-40A, AE Form 380-40B, AE Form 380-40C, AE Form 380-40D, and AE Form 380-40E. AE and higher-level forms are available through the Army in Europe Publishing System (AEPUBS). Records Management. Records created as a result of processes prescribed by this regulation must be identified, maintained, and disposed of according to AR 25-400-2. File numbers and descriptions are available on the Army Records Information Management System website at https://www.arims.army.mil. Suggested Improvements. The proponent of this regulation is the USAREUR G2 (AEAGB-SAD-S, DSN 370-7214). Users may suggest improvements to this regulation by sending DA Form 2028 to the USAREUR G2 (AEAGB-SAD-S), Unit 29351, APO AE 09014-9351.
    [Show full text]
  • 12.1 Information Resources and Technology Management
    INFORMATION RESOURCES MANAGEMENT 12.1 Information Resources and Technology Management A. Proponent: Assistant Director for Information Technology Division (ITD) and Chief Information Officer (CIO). Telephone: 202-307-9677. B. Purpose: To establish United States Marshals Service (USMS) policy governing the planning, management, operation, and use of information technology (IT) and information resources (IR). This policy applies to all persons who use USMS IT resources, including but not limited to employees, contractors, task force officers, and interns. This policy applies to classified and unclassified computer and telecommunications systems, technology, peripheral devices, and resources that are acquired for use by, owned, operated, or managed by USMS offices and users. C. Authority: References to selected laws and regulations applicable to this policy directive are in Appendix 1, Authority. D. Policy: ITD is responsible for the promulgation of policy, procedures, management and oversight, and provision of support services for all IR management and IT systems in the USMS. The Tactical Operations Division (TOD) is responsible for the management and provision of support services for secure telecommunications equipment and services. 1. The Assistant Director for ITD, also known as the CIO, is responsible for: a. Advising and assisting the Director, Deputy Director (DD), Associate Directors (AD), Assistant Directors (A/AD), United States Marshals (USM), and other senior USMS staff in order to ensure that the USMS plans, acquires, manages, and uses IT and IR in a manner that enhances mission accomplishment; improves work processes and paperwork reduction; provides sufficient protection for the privacy of personal information; promotes citizen-centered electronic government; and is consistent with all applicable federal laws and policy directives; b.
    [Show full text]
  • FM 11-32 Combat Net Radio Operations
    FM 11-32 Table of Contents FM 11-32 Field Manual Headquarters No 11-32 Department of the Army Washington, DC, 15 October 1990 FM 11-32 COMBAT NET RADIO OPERATIONS Editor's Note: Distribution Restriction changed to "Approved for public release; distribution is unlimited" per HQ TRADOC (ATCD-K) Memorandum, 18 Jul 1991, Doctrinal Publications with Incorrect Distribution Restrictions, and HQ TRADOC Foreign Disclosure Office e-mail, 10 Jan 2001, Documents Approved for Public Release. Table of Contents Preface Chapter 1 - Combat Net Radio (CNR) Deployment http://www.globalsecurity.org/military/library/policy/army/fm/11-32/index.html (1 of 4)24/12/2004 1:18:53 PM FM 11-32 Table of Contents 1-1. New Equipment 1-2. The CNR Network 1-3. Doctrinal Networks 1-4. Corps and Division Chapter 2 - Special Applications for CNR Deployment 2-1. Special Forces, Ranger, and Long-Range Surveillance Units (LRSUs) 2-2. Joint/Combined Operations Chapter 3 - SINCGARS 3-1. System Description 3-2. Components 3-3. Ancillary Equipment Chapter 4 - FH Networks 4-1. FH Variables 4-2. Unit Standing Operating Procedure (SOP) Considerations Chapter 5 - SINCGARS Planning 5-1. Network Requirements 5-2. Data Nets 5-3. Secure Devices 5-4. VHF-FM Retransmission Stations http://www.globalsecurity.org/military/library/policy/army/fm/11-32/index.html (2 of 4)24/12/2004 1:18:53 PM FM 11-32 Table of Contents 5-5. NRI Systems Chapter 6 - IHFR 6-1. System Description 6-2. Components 6-3. System Configurations 6-4. Ancillary and Secure Equipment Chapter 7 - CNR Frequency Management 7-1.
    [Show full text]