|
Destruction of CRYPTO Destruction of CRYPTO
|
səhifə | 8/8 | tarix | 05.01.2022 | ölçüsü | 459 b. | | #66902 |
| Destruction of CRYPTO Requires 2 persons both being; 1. appropriately cleared, - 2. CRYPTO briefed and
- 3. knowledgeable of destruction procedures
- 4. fully trained and knowledgeable on Status messages and usage factors
One person performs destruction while the other serves as witness
If you have no approved destruction method available to you, return the superceded key material to the COMSEC Custodian within the 12 hour time frame Failure to do the above may result in a violation
Destruction of key tape segments is authorized by use of the NSA approved disintegrator
Electronic Key Electronic Key Destruction is done by deleting the key or particular key segment on the DTD and Then Annotating it on Electronic Key Disposition Form
Examples of COMSEC/CRYPTO Violations Examples of COMSEC/CRYPTO Violations COMSEC safe left unsecured Removal of future keying material from its protective packaging Loss of COMSEC equipment/material Falsification of COMSEC records
Reporting Espionage Attempts Reporting Espionage Attempts Foreign Intelligence Services prize the acquisition of CRYPTO/COMSEC information Extreme measures may be taken to coerce or force persons to divulge CRYPTO/COMSEC info Personal and financial relations with representatives of foreign governments or their interests could make you vulnerable and/or targeted
Why is reporting so important? Why is reporting so important? If COMSEC information or techniques are breached at any point, all classified information protected by the system might be compromised
If a security breach is not reported, it may never be detected
Consider for a moment how much traffic passes over that circuit in a week, month, year, or its lifetime and the damage that can cause Consider for a moment how much traffic passes over that circuit in a week, month, year, or its lifetime and the damage that can cause If reported, steps can be taken to lessen an adversaries advantage gained through the compromised information If any incident occurs, contact your COMSEC Custodian immediately
Dostları ilə paylaş: |
|
|