Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
Objective 5a. Identify relationship of basic facts and state general principles about requirements for Communication Security (COMSEC) materials.
Everyone is responsible for ensuring the security of military communication. Knowing your role is vital to mission success.
An occurrence involving failure to follow established COMSEC instructions, procedures or standards.
The individual within an office or area responsible for COMSEC material.
The individual responsible for managing the COMSEC resources of a COMSEC account
The part of COMSEC that results from using all physical measures necessary to safeguard COMSEC material from access by unauthorized persons
All COMSEC material must be handled in accordance with specific guidelines.
The principle of safeguarding and accounting for all COMSEC material must be strictly adhered to in order to ensure COMSEC material does not fall into the wrong hands.
The SF 153 is used for the transfer, inventory, destruction, or hand-receipt for COMSEC material.
is used to inventory the contents of your security container.
The SF 702 is used to annotate the opening and closing of the secure storage container.
Secret Cover Sheet (Red)
Overnight Registered mail ONLY. It would cause serious damage to national security if it ever was intercepted.
Confidential Cover Sheet (Blue)
Confidential material is subject to the same mailing procedures as Secret material, with the following exception: confidential material may be sent by U.S. Certified mail rather than by U.S. Registered mail. Under all circumstances, the outer envelope should be marked "Do Not Forward. Return to Sender."
Top Secret Cover Sheet (Orange)
Never Mailed! Would cause exceptionally grave danger to
national security if it was ever intercepted.
There are several methods the Air Force authorizes to officially destroy classified material.
Most of the material you will use is in the form of paper products and will be destroyed by burning, pulping, or using a crosscut shredder.
COMSEC must be destroyed within 12 hours after the expiration date listed on the classified document.
A minimum of two individuals are required to destroy COMSEC material:
1. Destruction official
2. Witness
NOTE: The SF 153 & AFCOMSEC Form 16 will be updated and signed upon completion of destruction of the material.
Cryptology, as is explained in the provided video, is used in many applications both civilian and military. Of course, the processes and equipment may differ, but the concepts and reasons are the same.
Encryption is: an algorithmic schemes that encode plain text into a non-readable form also known as cipher text.
Decryption is: the authorized use of cryptographic systems to return encrypted information to its original, readable form.
There are two main types of encryption: symmetric and asymmetric
Voice encryption telephone devices are designed to operate reliably as both ordinary telephones and secure telephones over the public telephone network. i.e. STE
- Data Encryption Standard (DES)
- Triple DES (3DES)
- Advanced Encryption Standard (AES)
Just like other forms of technology, data encryption has evolved to meet the needs of today's digital environment. To the right are a few of the data encryption types used by the USAF.
• Based on secret-key cryptography
• publicly known cryptographic algorithm that converts plaintext into cipher text
• 64 bit key length (56 bit key length + 8 bit parity check)
• Countermeasure for DES shortfalls
• Three-fold compound operation for encryption/decryption
• 192 bit key length (168 bit key length + 24 bit parity check)
• Countermeasure for DES shortfalls
• Three-fold compound operation for encryption/decryption • 192 bit key length (168 bit key length + 24 bit parity check)
What makes one algorithm better than another?
•The algorithm’s key length
•More possible keys, the harder it is to break
•Means more secure
where the encryption takes place
- Voice encryption takes place before it leaves the device or source
- Data encryption takes place in a device separate from the source
The following website is FULL of all things crypto equipment. You can see the varying types of crypto fill devices, key transfer devices, and so much more:
https://cryptomuseum.com/crypto/fill.htm
What is it?
-Leading Commercial/Military IP encryption device
-Certified by the National Security Agency (NSA) managed TYPE 1 encryption device
- “TACLANE” is a class of encryption device
-KG175d TACLANE Micro is the most current, fielded version
Characteristics
- Compact, lightweight, mobile
- Several cost effective features
-No moving fans, built similar to a heat sink -Upgradeable for IPv6
- Both fiber and copper transmission line interfaces
The TACLANE has many features. As a CST you may work with a TACLANE, and having a basic understanding of its features will be beneficial.
-Panel Ports
-Controls
-Indicators
Currently, the USAF utilizes the micro form factor of the TACLANE. To the right are features you will need to know as a CST.
*Could this be the future of the USAF TACLANE? Is this incremental or disruptive technology?Watch the video...
-STE is designed to use Integrated Services Digital Network (ISDN) telephone lines which offer higher speeds of up to 128k bits per second and are digital.
-The STE sets look like ordinary high-end office desk telephones and can place unsecured calls to anywhere on the public switched telephone network (PSTN).
-The STE cryptographic engine is on a removable Fortezza PC Card that is provided separately.