What is comsec/crypto?


Destruction of CRYPTO Destruction of CRYPTO



Yüklə 459 b.
səhifə8/8
tarix05.01.2022
ölçüsü459 b.
#66902
1   2   3   4   5   6   7   8

Destruction of CRYPTO

  • Destruction of CRYPTO

  • Requires 2 persons both being;

  • 1. appropriately cleared,

    • 2. CRYPTO briefed and
    • 3. knowledgeable of destruction procedures
    • 4. fully trained and knowledgeable on Status messages and usage factors
  • One person performs destruction while the other serves as witness

  • Never sign the record without personally sighting the destruction



  • If you have no approved destruction method available to you, return the superceded key material to the COMSEC Custodian within the 12 hour time frame

  • Failure to do the above may result in a violation



Destruction of key tape segments is authorized by use of the NSA approved disintegrator

  • Destruction of key tape segments is authorized by use of the NSA approved disintegrator



Electronic Key

  • Electronic Key

  • Destruction is done by deleting the key or particular key segment on the DTD and Then Annotating it on Electronic Key Disposition Form



Examples of COMSEC/CRYPTO Violations

  • Examples of COMSEC/CRYPTO Violations

  • COMSEC safe left unsecured

  • Removal of future keying material from its protective packaging

  • Disclosing short title, edition and effective dates of CRYPTO by unsecured means

  • Loss of COMSEC equipment/material

  • Falsification of COMSEC records



Reporting Espionage Attempts

  • Reporting Espionage Attempts

  • Foreign Intelligence Services prize the acquisition of CRYPTO/COMSEC information

  • Extreme measures may be taken to coerce or force persons to divulge CRYPTO/COMSEC info

  • Personal and financial relations with representatives of foreign governments or their interests could make you vulnerable and/or targeted



Why is reporting so important?

  • Why is reporting so important?

  • If COMSEC information or techniques are breached at any point, all classified information protected by the system might be compromised

  • If a security breach is not reported, it may never be detected



Consider for a moment how much traffic passes over that circuit in a week, month, year, or its lifetime and the damage that can cause

  • Consider for a moment how much traffic passes over that circuit in a week, month, year, or its lifetime and the damage that can cause

  • If reported, steps can be taken to lessen an adversaries advantage gained through the compromised information

  • If any incident occurs, contact your COMSEC Custodian immediately







Yüklə 459 b.

Dostları ilə paylaş:
1   2   3   4   5   6   7   8




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin