Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Unit 5

COMSEC

Objective 5a. Identify relationship of basic facts and state general principles about requirements for Communication Security (COMSEC) materials.

Comsec

COMSEC-The discipline under Information Assurance (IA) that results from measures and controls taken to deny unauthorized persons information derived from telecommunications and to ensure the authenticity of such telecommunications.

COMSEC

COMSEC TERMS

Everyone is responsible for ensuring the security of military communication. Knowing your role is vital to mission success.

COMSEC Terms

An occurrence involving failure to follow established COMSEC instructions, procedures or standards.

COMSEC Deviation

The individual within an office or area responsible for COMSEC material.

COMSEC Responsible Officer (CRO)

The individual responsible for managing the COMSEC resources of a COMSEC account

COMSEC Manager

The part of COMSEC that results from using all physical measures necessary to safeguard COMSEC material from access by unauthorized persons

Physical Security

Physical Security is part of COMSEC

All COMSEC material must be handled in accordance with specific guidelines.

The principle of safeguarding and accounting for all COMSEC material must be strictly adhered to in order to ensure COMSEC material does not fall into the wrong hands.

Safeguarding our information

SF 153

The SF 153 is used for the transfer, inventory, destruction, or hand-receipt for COMSEC material.

Standard Form 153

AFCOMSEC Form 16

is used to inventory the contents of your security container.

AFCOMSEC Form 16

SF 702

The SF 702 is used to annotate the opening and closing of the secure storage container.

Standard Form 702

SF 704

Secret Cover Sheet (Red)

Standard Form 704

Overnight Registered mail ONLY. It would cause serious damage to national security if it ever was intercepted.

SF 705

Confidential Cover Sheet (Blue)

Standard Form 705

Confidential material is subject to the same mailing procedures as Secret material, with the following exception: confidential material may be sent by U.S. Certified mail rather than by U.S. Registered mail. Under all circumstances, the outer envelope should be marked "Do Not Forward. Return to Sender."

AF Form 144

Top Secret Cover Sheet (Orange)

Air Force Form 144

Never Mailed! Would cause exceptionally grave danger to

national security if it was ever intercepted.

Destruction

There are several methods the Air Force authorizes to officially destroy classified material.

Most of the material you will use is in the form of paper products and will be destroyed by burning, pulping, or using a crosscut shredder.

Destruction of COMSEC

What must be done...

COMSEC must be destroyed within 12 hours after the expiration date listed on the classified document.

A minimum of two individuals are required to destroy COMSEC material:

1. Destruction official

2. Witness

NOTE: The SF 153 & AFCOMSEC Form 16 will be updated and signed upon completion of destruction of the material.

Cryptology

Cryptology, as is explained in the provided video, is used in many applications both civilian and military. Of course, the processes and equipment may differ, but the concepts and reasons are the same.

Crypto

Encryption/Decryption

Encryption is: an algorithmic schemes that encode plain text into a non-readable form also known as cipher text.

Decryption is: the authorized use of cryptographic systems to return encrypted information to its original, readable form.

Encryption/Decryption

Encryption Types

There are two main types of encryption: symmetric and asymmetric

Encryption types

Voice Encryption

Voice encryption telephone devices are designed to operate reliably as both ordinary telephones and secure telephones over the public telephone network. i.e. STE

Voice Encryption

Data Encryption

- Data Encryption Standard (DES)

- Triple DES (3DES)

- Advanced Encryption Standard (AES)

Data Encryption

Data Encryption Types

Just like other forms of technology, data encryption has evolved to meet the needs of today's digital environment. To the right are a few of the data encryption types used by the USAF.

Data Encryption

DES

• Based on secret-key cryptography

• publicly known cryptographic algorithm that converts plaintext into cipher text

• 64 bit key length (56 bit key length + 8 bit parity check)

DES

3DES

• Countermeasure for DES shortfalls

• Three-fold compound operation for encryption/decryption

• 192 bit key length (168 bit key length + 24 bit parity check)

Triple Des (3DES)

AES

Advanced Encryption Standard

• Countermeasure for DES shortfalls

• Three-fold compound operation for encryption/decryption • 192 bit key length (168 bit key length + 24 bit parity check)

What makes one algorithm better than another?

•The algorithm’s key length

•More possible keys, the harder it is to break

•Means more secure

The Answer:

where the encryption takes place

- Voice encryption takes place before it leaves the device or source

- Data encryption takes place in a device separate from the source

*Now, what is the difference between voice and data encryption?

Check it out:

The following website is FULL of all things crypto equipment. You can see the varying types of crypto fill devices, key transfer devices, and so much more:

https://cryptomuseum.com/crypto/fill.htm

Crypto Equipment

KG-175D TACLANE (Micro)

TACLANE

What is it? 

-Leading Commercial/Military IP encryption device 

-Certified by the National Security Agency (NSA) managed TYPE 1 encryption device

- “TACLANE” is a class of encryption device 

-KG175d TACLANE Micro is the most current, fielded version

 Characteristics 

- Compact, lightweight, mobile 

- Several cost effective features 

-No moving fans, built similar to a heat sink  -Upgradeable for IPv6

- Both fiber and copper transmission line interfaces

Features you need to know about:

Features

The TACLANE has many features. As a CST you may work with a TACLANE, and having a basic understanding of its features will be beneficial.

-Panel Ports

-Controls

-Indicators

TACLANE KG-175D (Micro)

Currently, the USAF utilizes the micro form factor of the TACLANE. To the right are features you will need to know as a CST.

*Could this be the future of the USAF TACLANE? Is this incremental or disruptive technology?Watch the video...

Features

Front Panel:

Front Panel

Tamper

Zeroize

Battery

Rear Panel

TEMPEST

Configuring TACLANE

Config.

Secure Telephone Equipment (STE)

STE

-STE is designed to use Integrated Services Digital Network (ISDN) telephone lines which offer higher speeds of up to 128k bits per second and are digital.

-The STE sets look like ordinary high-end office desk telephones and can place unsecured calls to anywhere on the public switched telephone network (PSTN).

-The STE cryptographic engine is on a removable Fortezza PC Card that is provided separately.

STE

Learn more about creating dynamic, engaging presentations with Prezi