Crypto Devices Flashcards
What are HJ times?
Bio grams wich tells us when to change crypto.
Does kyk13 store HJ times and short titles?
No fills only
Protocol to send a fill SKL - KYK13?
DS102 (smart to dumb)
Protocol to send a fill CYZ10 - SKL?
DS101 (dumb to smart)
Name security threats/methods with a brief description?
Imint - info gained from aerial recon flights and sat platforms
Sigint - used to describe communication intelligence
Comint - exploitation of electromagnetic transmissions and electronic int
Humint - includes patrol reports, interrogation, espionage and loose talk
Loss or compromise - theft, loss, destruction, disclosure or modification of government assets
Name principle sources of information?
Surveillance and reconnaissance Radio and communications Non comms emissions Document and information technology system Loose talk Discussions/brief Private correspondence Private telephone calls The media The Internet Civilians
Main threads to security and explain?
Espionage - obtaining info about organisation or a society that is considered secret or confidential without permission of the holder of the information
Sabotage - deliberate action aimed at weakening on enemy, oppressor or employer through subversion, obstruction disruption and/on destruction
Subversion - action designed to weaken the military, economic or political strength of a nation by undermining the morale loyalty or reliability of its citizens
Terrorism - unlawful use of or threatened use of force or violence against individuals or property to coerce or intimate government or societies, often to achieve political, religious or ideological objectives
Non traditional - events such as natural disasters, or actions by investigative journalists, criminals, disaffected or dishonest staff computer hackers and viruses
Four common causes to security breaches?
Handling
Custody
Access
Discussion
Name the 3 veting States?
Bc
Sc
Dv
When should you change combination?
1st brought into service Any one with access leaves or no longer requires access Intervals no longer than six months After any form of repairs by a locksmith After any inspection on the locks Suspected compromise
Name four ways of destruction?
Incineration
Shredding
Wet pulping
Mechanical disintegration
What does USO stand for and who does he report to?
Unit security officer and reports to the commanding officer
What is the action of loss of a classified document?
Conduct a thorough search up to a hour
Inform USO
extend the search
What are the action of compromise ?
100% check of contents
Inform the USO
Change the combination
What does TEMPEST stand for?
Transient Electromagnetic Pulse Emanation Standard
-unintentional radiation of intelligence bearing signals
Name 3 crypto statuses?
Current
Reserve
Superseded
What form do you use to account for your crypto?
MOD 371
What do you need to do before a road move with crypto?
Get authorisation from CDA Hereford
Be in possession of courier and escort documents
Have a locked container possibly bolted down
2 people in the vehicle (one person must be crypto authorised)
Never leave vehicle unattended
How many fills does a kyk take?
6