Commanding Officer, Marine Corps Air Station, Cherry Point Distribution List

Similar documents
Subj: RELEASE OF COMMUNICATIONS SECURITY MATERIAL TO U.S. INDUSTRIAL FIRMS UNDER CONTRACT TO THE DEPARTMENT OF THE NAVY

From: Commanding Officer/Leader, United States Navy Band

COMSEC. Communications Security

Subj: COMMUNICATIONS SECURITY EQUIPMENT MAINTENANCE AND TRAINING

Department of Defense DIRECTIVE

Commanding General, Marine Corps Air Station, Cherry Point Distribution List ADMINISTRATION AND REGULATIONS OF TRANSIENT QUARTERS

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

Department of Defense INSTRUCTION

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION

Commanding Officer, Marine Corps Air Station, Cherry Point Distribution List ADMINISTRATION AND REGULATIONS OF TRANSIENT QUARTERS

Q-53 Security Training: Transmitting and Transporting Classified Information, Part I

Commanding Officer, Marine Corps Air Station, Cherry Point Commanding General, 2d Marine Aircraft Wing Distribution List

February 11, 2015 Incorporating Change 4, August 23, 2018

il~l IL 20 I I11 AD-A February 20, DIRECTIVE Department of Defense

UNITED STATES MARINE CORPS

Commanding General, Marine Corps Air Station, Cherry Point Distribution List. Subj: ABUSE OF MARINE CORPS EXCHANGE (MCX) PRIVILEGES

Defense Security Service DELIVER! A Pamphlet On. How to Transmit and Transport Your Classified Materials. Prepared by

COMMUNICATIONS SECURITY (SC 25C-RC)

COMMUNICATIONS SECURITY MONITORING OF NAVY TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY SYSTEMS

DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 2 NAVY ANNEX WASHINGTON, DC MCO B C4I/CIC 21 Mar 96

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems

The DD254 & You (SBIR)

UNITED STATES MARINE CORPS MARINE CORPS AIR STATION POSTAL SERVICE CENTER BOX 8003 CHERRY POINT, NORTH CAROLINA

Subj: COMMUNICATIONS SECURITY (COMSEC) MONITORING OF NAVY TELECOMMUNICATIONS AND AUTOMATED INFORMATION SYSTEMS (AIS)

Department of Defense DIRECTIVE. SUBJECT: Security Requirements for Automated Information Systems (AISs)

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

UNITED STATES MARINE CORPS MARINE CORPS AIR BASESiEASTERN AREA CHERRY POINT, NORTH CAROLINA ~-... :'. ~. :.

Ekms 3 Electronic Key Management System

Commanding Officer, Marine Corps Air Station, Cherry Point Commanding General, 2d Marine Aircraft Wing Distribution List

NATO SECURITY INDOCTRINATION

Chapter 9 Legal Aspects of Health Information Management

Department of Defense DIRECTIVE

NATO UNCLASSIFIED. 5 December 2006 DOCUMENT C-M(2002)49-COR3 SECURITY WITHIN THE NORTH ATLANTIC TREATY ORGANISATION

UNCLASSIFIED. Directive for Reporting and Evaluating COMSEC Incidents Involving Accountable COMSEC Material ITSD-05

Department of Defense DIRECTIVE

DoD S, March 17, 1988

(1) Definitions (2) Sample Physi cal Security Officer Appointment Letter

OPNAVINST C N4 31 May 2012

Department of Homeland Security Management Directives System MD Number: Issue Date: 06/29/2004 PORTABLE ELECTRONIC DEVICES IN SCI FACILITIES

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)

Commanding Officer, Marine Corps Air Station Cherry Point Distribution List STANDARD OPERATING PROCEDURES FOR HANDLING DISHONORED CHECKS

SECNAVINST A DON CIO 20 December Subj: DEPARTMENT OF THE NAVY INFORMATION ASSURANCE (IA) POLICY

DEFENSE LOGISTICS AGENCY HEADQUARTERS CAMERON STATION ALEXANDRIA, VA 22314

DEPARTMENT OF THE NAVY COMMANDING OFFICER TRAINING SQUADRON EIGHT SIX 390 SAN CARLOS ROAD SUITE G PENSACOLA FLORIDA

UNITED STATES MARINE CORPS MARINE CORPS AIR STATION POSTAL SERVICE CENTER BOX 8003 CHERRY POINT, NORTH CAROLINA

UNCLASSIFIED. Information Technology Security Guidance for Purchasing CSEC-Approved Cryptographic Equipment from the United States Government ITSG-26

Balancing Requirements

A Guide. Preparation. DD Form 254. for the. of a. National Classification Management Society. Defense Security Service

Department of Defense INSTRUCTION. DoD Unclassified Controlled Nuclear Information (UCNI)

Department of Defense DIRECTIVE

SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT

Subj: MINOR PROPERTY PROCEDURES FOR ACCOUNTABILITY OF GOVERNMENT OWNED PROPERTY AND ORGANIZATIONAL ISSUE MATERIAL

PREPARATION OF A DD FORM 254 FOR SUBCONTRACTING. Cal Stewart ISP

UNITED STATES MARINE CORPS 2D MARINE AIRCRAFT WING II MARINE EXPEDITIONARY FORCE POSTAL SERVICE CENTER BOX 8050 CHERRY POINT, NC

TECHNICAL SURVEILLANCE COUNTERMEASURES PROGRAM

Department of Defense DIRECTIVE

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE HEADQUARTERS OPERATING INSTRUCTION APRIL Security

UNITED STATES MARINE CORPS MARINE CORPS BASE QUANTICO, VIRGINIA

BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION DECEMBER Communications and Information REPORTING COMSEC DEVIATIONS

Security of Unclassified Army Property (Sensitive and Nonsensitive)

JAN ceo B 6

Robert J. Hanson Supervisory SECURITY SPECIALIST Command Security Manager Staff CMS Responsible Officer Designated Disclosure Authority Head,

SECNAVINST F DNS Dec 2005

Student Guide: Foreign Liaison, Personnel Exchange, and Cooperative Program Personnel Length Two (2) Hours

Department of Defense INSTRUCTION

UNITED STATES MARINE CORPS MARINE CORPS BASE PSC BOX CAMP LEJEUNE, NORTH CAROLINA

Subj: MANAGEMENT AND CONTROL OF LEATHER FLIGHT JACKETS

DEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities

DEPARTMENT OF THE NAVY COMMANDER NAVY RESERVE FORCE 1915 FORRESTAL DRIVE NORFOLK, VIRGINIA

Department of Defense DIRECTIVE

SERIES 1100 UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE (USD(I)) ASSISTANT SECRETARY OF DEFENSE FOR NETWORKS AND INFORMATION INTEGRATION (ASD(NII))

Department of Defense DIRECTIVE

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

MAGTFTC MCAGCC GUIDANCE FOR DD FORM 67 (FORM PROCESSING ACTION REQUEST )

Department of Defense INSTRUCTION

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

DEPARTMENT OF DEFENSE CONTRACT SECURITY CLASSIFICATION SPECIFICATION

Student Guide: North Atlantic Treaty Organization

Contract Security Classification Specification. DD-254 Guidance

PROCEDURES TO BAR INDIVIDUALS FROM ACCESS TO THE COMBAT CENTER

Subj: DISCLOSURE OF MILITARY INFORMATION TO FOREIGN GOVERNMENTS AND INTERESTS

SECURITY OF CLASSIFIED MATERIALS B STUDENT HANDOUT

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, D,C,

UNITED STATES MARINE CORPS HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC

Office of the Inspector General Department of Defense

UNCLASSIFIED. UNCLASSIFIED Army Page 1 of 12 P-1 Line #51

MCO A C Apr Subj: ASSIGNMENT AND UTILIZATION OF CENTER FOR NAVAL ANALYSES (CNA) FIELD REPRESENTATIVES

Report No. D September 25, Controls Over Information Contained in BlackBerry Devices Used Within DoD

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE

DEPARTMENT OF THE NAVY UNITED STA TES NAVAL ACADEMY 121 BLAKE ROAD ANNAPOLIS, MARYLAND

REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005

Department of Defense INSTRUCTION

OPNAVINST B N6 9 November 1999 OPNAV INSTRUCTION B

Department of Defense DIRECTIVE

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

Department of Defense INSTRUCTION

Department of Defense DIRECTIVE

Transcription:

UNITED STATES MARINE CORPS MARINE CORPS AIR STATION POSTAL SERVICE CENTER BOX 8003 CHERRY POINT, NORTH CAROLINA 28533-0003 ASO 2280.1E TISD 10 May 10 AIR STATION ORDER 2280.1E From: To: Subj: Ref: Commanding Officer, Marine Corps Air Station, Cherry Point Distribution List SECURE TELEPHONE EQUIPMENT/KSV-21 CRYPTOGRAPHIC CARD MANAGEMENT PROCEDURES (a) EKMS-1 (series) 1. Situation. Secure Telephone Equipment (STE) together with associated KSV-21 cryptographic cards are Communications Securi (COMSEC) equipment used to protect U.S. Government transmission classified or sensitive unclassified information related to national security from unauthorized persons. The Electronic Ke Management System (EKMS) has been established to distribute, control, and safeguard COMSEC equipment, and thus is the means protection of vital and sensitive information moving over government communications systems. y of or 2. Cancellation. AirStaO 2280.1D. 3. Mission. To promulgate specific guidance regarding the distribution, control, maintenance and protection of STE termin and their associated KSV-21 cryptographic cards and assign responsibilities for their use, security, and accountability. Is 4. Execution a. Commander's Intent and Concept of Operations (1) Commander's Intent. The protection of vital and sensitive information that moves over government communications systems is crucial to the effective conduct of the government a specifically to the planning and execution of military operatio This Order has been established to provide guidance regarding t secure distribution, control and safeguarding of STE terminals their associated KSV-21 cryptographic cards. d s. e nd DISTRIBUTION STATEMENT A: distribution is unlimited. Approved for public release;

10 May 10 (2) Concept of Operations (a) The STE telephone is a terminal designed to ser e as a standard telephone and as a secure communications terminal for sensitive unclassified and classified information up to and including TOP SECRET/Sensitive Compartmented Information (TS/SC ). New requirements for STE terminals must be submitted to the Telecommunications and Information Systems Directorate, Marine Corps Air Station Cherry Point (MCASCHERPT) (b) Department of Defense (DoD) policy requires STE terminals with associated KSV-21 cards inserted be within reasonable proximity of potential STE users. Reasonable proxim'ty is defined as within the office, area, room, space or other location where the potential user normally works with classifie or sensitive unclassified information and routinely conducts telephone conversations related to that work. At a minimum, sensitive information includes all information which relates to operations, plans, intelligence, system acquisition, logistical support and personnel management. b. Task (1) MCASCHERPT TISD (a) Will appoint an EKMS Manager per guidelines se forth in reference (a). (b) Will appoint an EKMS Primary Alternate Manager and any additional Alternate Managers that may be required. (2) EKMS Manager and Alternate EKMS Managers (a) Receipt and account for STE terminals and KSV-2 cryptographic cards. (b) Control issuance of STE terminals and associate KSV-21 cryptographic cards. (c) Verify security clearance and access for all STE/KSV-21 users. (d) Maintain STE/KSV-21 records and conduct inventories per reference (a). 2

10 May 10 (e) Coordinate the maintenance and repair of STE terminals. (f) Provide training for the proper use, security, care of each terminal to STE/KSV-21 users. nd (g) Maintain physical custody of all KSV-21 Termina Privilege Authority (TPA) cards. (h) Ensure compliance with current directives for storage, use and disposition of KSV-21 cryptographic cards. (3) STE/KSV-21 Users. The STE/KSV-21 user is responsib e for the proper use, care and security of the terminal and the associated KSV-21 cryptographic card as well as the security of the information transmitted via the terminal. The user's responsibilities are summarized as follows: (a) STE/KSV-21 users must ensure that a terminal wi h the KSV-21 cryptographic card inserted is treated as classified material commensurate with the level of classification of the k ys programmed in the card. Local controls must be instituted limiting access to the keyed terminal to those persons who have appropriate security clearance and need to know. (b) KSV-21 cryptographic cards not inserted into th ir associated terminals are unclassified Controlled Cryptographic Items (CCI), requiring protection from unauthorized use with th terminal. Whenever authorized personnel are not present to protect a terminal with its card: 1. The card will be removed from the terminal a d kept under the direct control of the authorized user. 2. Stored in a General Services Administration (GSA) approved container if the KSV-21 is kept in the vicinity f its associated STE terminal. l. If not kept in the vicinity of its associate STE terminal, locked in an appropriate container per paragraph 535n of the reference which states, "Dnkeyed CCl and/or CCl key d with unclassified key marked or designated CRYPTO must be store in a manner that affords protection against pilferage, theft, sabotage, or tampering, and ensures that access and accounting integrity are maintained." 3

10 May 1 (c) A STE/KSV-21 user must ensure prior to making secure call that his immediate physical area is secure, e.g., t at personnel in the immediate area have security clearances and a need to know commensurate with the level of the planned conversation. Personnel in outside offices should be isolated from the sensitive or classified conversations by appropriate physical barriers or supervision of cleared personnel. (d) When operationally required, STE/KSV-21 y permit others to use their terminals; however, the call must be placed by the STE/KSV-21 user. Once the call has been placed a d before turning the hand receiver over to the other party, the STE/KSV-21 user must identify the party on whose behalf the cal is being made, indicating their level of clearance. (e) A STE terminal with its associated KSV-21 cryptographic card removed is unclassified. However, the STE terminal is sensitive, high value equipment requiring strict security controls and accountability. (f) At least annually, STE/KSV-21 users will reasse s their STE/KSV-21 requirements and turn-in any terminals that ar no longer required to the EKMS Manager. c. Coordinating Instructions (1) Accountability. KSV-21 cryptographic cards are serialized and accountable to the Naval Communications Security Material System (NMCS) through the EKMS Manager. The EKMS Mana er will be responsible for ensuring that STE and associated KSV-21 cryptographic cards are utilized, maintained and accounted for er reference (a). (a) STE Terminals. Terminals may not be moved from their initial placement area without approval. Requests for moving STE terminals should be addressed to Director, TISD, MCASCHPT (Attn: EKMS Manager) and forwarded via the appropriate chain of command. (b) KSV-21 Cryptographic Cards. The EKMS Manager a d an Alternate Manager, when directed by NCMS, will inventory all KSV-21 cryptographic cards per reference (a) (2) Emergency Protection Procedures. Emergency protect on procedures dictate actions to be taken during emergencies to 4

prevent the unauthorized use of STE terminals and KSV-21 cryptographic cards. ASO 2280.1E 10 May 1 (a) Local Elements will ensure that emergency actio procedures for STE terminals and associated KSV-21 cryptographi cards are included in local emergency action plans. (b) STE/KSV-21 users will be familiar with the acti ns to be taken during emergencies as directed by local authority. (3) COMSEC Incidents. A COMSEC incident is any occurre ce that has the potential to jeopardize the security of COMSEC material or the secure transmission of classified or sensitive government information. STE/KSV-21 users must immediately repo t all known or suspected COMSEC incidents to the EKMS Manager. T e EKMS Manager will be responsible to ensure accurate and timely submission of COMSEC Incident Reports (CIRs) to the Director NS, in accordance with procedures outlined in Chapter 9 of referenc (a). The following are COMSEC incidents pertaining to the STE/KSV-21: (a) Whenever the user identification or authenticat on information displayed during a secure call is not representativ of the distant terminal. Authentication information includes: 1. Classification level authorized by the key f r the particular terminal. 2. Authorization for access to sensitive compartmented information (SCI) when common to both terminals. 3. Identification of the using organization (e.. ; US Navy, US Marine Corps). i. Foreign access to a keyed terminal, when approved (e.g., CANADA) identifies terminals supporting Canadia operations, (US/CAN) identifies terminals supporting US/CAN operations. (b) Any instance in which the display indicates tha the distant terminal contains compromised key. (c) Known or suspected tampering of a KSV-21 card. 5

(d) Loss of a TPA card that has not yet been associated with a STE. ASO 2280.1E 10 May 10 (e) Loss of a TPA card may impact local information security because a TPA card can be used to change the security settings of all the STEs under its control. (f) Loss of a fill card. (g) Loss of a card when the card can be identified with a particular secure voice or data terminal and it was not disassociated from its terminal. (h) Loss of a user card with its associated STE or with its associated carry card. (4) Practices Dangerous to Security (PDSs). PDSs, whil not reportable to NSA, are practices which have the potential t jeopardize the security of COMSEC material if allowed to perpetuate. The following are non-reportable PDSs pertaining t the STE/KSV-21: (a) Discovery of a tampered or unauthorized modification/repair of a STE. The STE is not a COMSEC device a d this is not considered a COMSEC incident. However, the integri y of the STE must be verified prior to installation for operation I use. Users must contact their EKMS Manager for specific guidan e. The EKMS Manager will contact the STE program office at NSA for further assistance upon discovery of unauthorized repair or modification of a STE. (b) Loss of a user card or carry card that has been associated with the STE is not a COMSEC incident. However, use s are required to notify the EKMS Manager when a user card or car y card is lost so that its association with the STE can be remove at the earliest opportunity to prevent unauthorized access to t e STE. (5) STE Rekey. Rekey calls can be made at any time. However, rekey must be performed at least annually prior to the STE/KSV-21 key's expiration. The EKMS Central Facility will rna e the new STE/KSV-21 key available on the rekey server, usually within 60 days of the end of the annual cryptoperiod. Rekey is automatically performed by simply making a call to the rekey server while the KSV-21 cryptocard is inserted into the STE. 0 ce 6

10 May 1 the rekey call is complete, the STE/KSV-21 user must verify tha the key expiration date has been extended. The following are procedures for viewing the STE/KSV-21 key expiration date and performing rekey: (a) Viewing the STE/KSV-21 key expiration date: Management". Management". 1. Press "Menu", terminal displays "Terminal 2. Press "Scroll", terminal displays "Crypto Ca d 3. Press "Select", terminal displays "Card Management Privileges." Functions". Key Data". 4. Press "User", terminal displays "Rekey 5. Press "Scroll", terminal displays "View Card Data - 6. Press "Select", terminal displays "SDNS Key ID: XXXXXXX". 7. Press "Scroll" three times, terminal display STE/KSV-21 key expiration date. (b) Performing a STE Rekey: Management". Management". 1. Press "Menu", terminal displays "Terminal 2. Press "Scroll", terminal displays "Crypto Ca d 3. Press "Select", terminal displays "Card Management Privileges". Functions". 4. Press "User", terminal displays "Rekey 5. Press "Select", terminal displays "Update Re ey Phone Number/Perform Rekey". 7

10 May 1... Press "Rekey", terminal displays "Perform Re ey STU-III: NONE -- SDNS: OK". 7. Press "SDNS", terminal displays "SDNS Rekey Mode -- Select Type". 8. Press "SCIP", terminal displays "SDNS Rekey Mode SCIP -- Dial: 9918006333971." 9. Press "Go". The rekey server will be dialed. Note: If the rekey server is busy or if you are disconnected, repeat steps (b)! through ~.!Q. The terminal displays "Going Secure To:" followed by "SECRET Rekey in Progress, Please Stand By". When he rekey call is complete, the terminal will display "SDNS Rekey Complete". Press "Continue". 11. If performing annual rekey, follow steps (a 1 through 2 to verify that the key expiration date has been extended. (6) Troubles and Repairs. (a) Troubles or repairs involving processing of telephone calls on equipment will be handled by calling the Joi t Help Desk at extension 114 for assistance. (b) Difficulty with using a STE/KSV-21 in the secur mode should be addressed directly to the EKMS Manager for determination of further required action. (c) If any terminal requires removal for repair, further action will be coordinated with the EKMS Manager. The terminal removed for repair will be reinstalled upon completion of repairs. A standard telephone will be installed, when requeste from the Station Telephone Department, while the terminal is in the repair cycle. A replacement STE terminal may be installed, if available. 5. Administration and Logistics. The Commanding General, 2d W and tenant organization Commanding Officers concur with the contents of this Order insofar as it pertains to members of the r command. 8

.Tji. HAY 201 6. Command and Signal a. Command. This Order is applicable to the Marines, Sailors, and Civilian employees aboard MCASCHERPT. The EKMS Manager and EKMS Alternate Managers are located in the TISD, building 4397. b. Signal. This Order is effective the date signed. ROBERT D. CLINTON Executive Officer DISTRIBUTION: A 9