Board Flashcards
FAIRECONRONONEINST 2280.1A
Handling and accounting of CMS
COMVAQWINGPACINST 2280.1F
COMSEC material system (CMS) policies and procedures
FAIRECONRONONEINST 5530.1F
Physical security
FAIRECONRONONEINST 5510.2
VQ1 CMS emergency action plan
FAIRECONRONONEINST 5510.4
VQ1 emergency destruction plan
Who is the command security manager?
N2 department head. LCDR Peeler.
What is the command security managers relationship to the CMS/EKMS program?
Verifying that potential users have the proper clearance.
4 requirements for gaining access to COMSEC
- Authorized writing by the CO
- Proper clearance
- Need to know
- PQS qualification
Define access
The opportunity and capability to obtain knowledge of COMSEC
Define need to know
Individuals with a valid need to know whose official duties require access to COMSEC
Define clearance
Requires a security clearance equal to or higher than the classification of the material
5 uses of the SF 153
- Transfer
- Inventory
- Destruction
- Hand receipt
- Other
What is the SF 700 used for?
Record passwords and combos
Storage procedures for safeguarding PINs, passwords and combos.
Use SF 700. Store in a secure off site central location and do monthly integrity checks.
What is a SF 701 used for?
End of day security checklist for spaces containing classified material.
What is the SF 702 used for?
Records the opening/closing of secure containers or doorways
What is the CMS 25 form used for?
Record of routine destruction of KEYMAT.
What is an optional form 89 used for?
Documents maintenance of a security container
How long do you keep an optional form 89? Where do you keep it?
For the life of the security container.
The back of the drawer that has the lock on it.
What are AL codes?
Accountability Legend codes.
Determine how COMSEC material is accounted for
2 places you could locate what each AL Code means.
- SF 153
2. EKMS 1B CH. 2 Section 230
Explain the importance of reporting COMSEC incidents
So appropriate action can be taken to minimize adverse impact on national security.
What chapter in the EKMS 1B covers COMSEC incidents?
Chapter 9
3 types of COMSEC incidents with examples.
- Physical incident: the physical loss of COMSEC material.
- Personnel incident: espionage, capture of persons
- Cryptographic incident: using COMSEC keying material that is compromised or superseded.
What is PDS?
Practices Dangerous to Security
What chapter in the EKMS 1B has information pertaining to PDS?
Chapter 10
2 types of PDS and an example.
- Reportable: early destruction of key that needs reissue
2. Non Reportable: early destruction of key that does not need to be reissued
What does CCI stand for?
Controlled Cryptographic Item.
KY-58, KYV-5, KG-84
State the reason for zeroizing CCI and fill devices.
To prevent compromise
What are the preferred methods of destruction for CCI?
Zeroize and destroy till total breakage
Is COMSEC repaired at command level?
No
Who do we turn broken COMSEC to and what forms are required?
FRCNW with a green MAF and CMS 17 custody card.
Who can authorize cryptographic period extensions?
The Controlling Authority of the material.
How would you locate a cryptographic period for a short title?
Using a current ESM Effective Status Message
How would you locate a current ESM?
Check message traffic and search SIPR net or JWICS
What is a page check and when are they required?
The process of checking every page of an issued document or pub for discrepancies and damage.
Upon issuance, transfer, destruction and inventory.
What are the 3 possible statuses of KEYMAT?
Reserve on Board (ROB), effective and superseded
Define black key
Encrypted key
Define red key
Unencrypted key
Define modern key
FIREFLY type key. Electronic.
Define traditional key
Non FIREFLY key or paper key.
Can COMSEC be stored with non COMSEC in the same drawer?
Nope
How should COMSEC be organized when stored?
By status (ROB, effective, superseded) and classification.
Why is it important to store COMSEC by status and classification?
To execute EAP/EDP effectively by precedence of material
What type of container is used to store COMSEC?
General Service Administration (GSA) approved safe
What type of container can COMSEC materials be couriered in when not on an aircraft?
Any container that can’t be easily tampered or accessed by unauthorized personnel.
How is a GSA approved container identified?
By a GSA labeled placard
What are the approved locks for use when safeguarding COMSEC materials?
- X series
- S&G combo locks
- Standard navy issued brass locks with no master key
How are lock combos classified?
Classified the same as the highest level of material being protected.
When must a combo be changed?
- Initial use
- No longer require access
- Compromise
- Taken out of service
- Maintenance
- Every two years
What are the preferred methods of destruction for key tape?
- Burning
- NSA approved microfilm shredder
- Acetone
How long do you have to destroy issued KEYMAT? KEYMAT on board an aircraft?
12 hours on the ground.
On board an AC, destroy as soon as practicable upon completion of airborne operations.
What are the 3 different types of super session?
- Emergency: the destruction of KEYMAT that has or may be compromised.
- Routine: the normal destruction of KEYMAT that has regularly superseded.
- Irregular: destruction of KEYMAT when an event happens.
What actions should a user take when an unauthorized destruction occurs?
Submit a report to the EKMS custodian. It is assessed as a reportable or non reportable PDS.
What is TPC?
Two Person Control: continuos surveillance and control of materials and devices at all times by a minimum of two authorized persons
What is TPI?
Two Person Integrity: a system of handling and storing designed to prevent single person access to certain COMSEC KEYMAT
What are the TPI/TPC requirements for using and storing KEYMAT?
TPC when KEYMAT is unsecured
TPI when storing or securing.
What are the TPI/TPC requirements for electronic fill devices?
TPC & TPI when filled.
Not needed when empty.
What are the TPI/TPC requirements for routine destructions?
TPC
What are the TPI/TPC requirements for crypto ignition keys CIK?
TPC is only needed when plugged into the corresponding gear that has been filled.
What are the TPI/TPC requirements for the flight line?
TPC and TPI for outside the flight line.
TPC or TPI inside the flight line.
How does the COMSEC material control system apply to this command?
It applies to VQ1 because we use sensitive information to operate and it is important to our national security protect that information.
Can our command execute missions without a CMS program in place?
No