EKMS Flashcards
Name some EKMS Equip.
KG-175, KY-58, KYv-5, KGV-11, KIV-7M, PYQ-10, MD-1324, KG-40, KG-250, STE
What is an irridium phone?
SAT telephones that can be used aboard a ship
What is FACCON?
Master kill switch for all electrical circuits onboard the ship
Blackout Proceedures:
If blackout occurs notify CWO, Then start shutting off all crypto devices
EKMS
Electronic key management system
KMI
Key Management Infrastructure
EKMS 1E
policies and proceedures
EKMS 3E
EKMS inspection manual
CMS 5E
CMS crypto EQUIP. information guidance manual
NAG 16
OTAT/OTAR manual
OTAT
Over the air transfer
OTAR
Over the air repeat
2280.3
NCTS instruction
5511.6
EAP
CMS 25
Local keymat destruction report
SF 700
Record of safe combination change
SF 701
Security container checklist
SF 702
Security container open and closure log
SF 153
Record of transfer, reciept, destruction, and inventory of crypto
OF 89
Record of safe maintenance
What annex has retention periods for each EKMS forms?
Annex Tango
CNO
Overall responsible within the navy of cryptographic items
ISIC
NCTAMS LANT
NCMS
Central Office
EKMS Manager
Command Dependant
EKMS Alternates
Command Dependant
EKMS Clerk
Command Dependant
EKMS Incidents
Personnel, Physical, Cryptographic
Personnel
Espionage, Stealing
Physical
Loss/compromise of crypto
Cryptographic
Loading incorrect crypto
PDS
Practice Dangerous to Security
Reportable
PDS reported to ISIC, Ex: Lost CIK
Non-Reportable
PDS reported to CO, Ex: missing 702 Signature
Teir 0
NSA
Teir 1
NCMS/COR
Teir 2
NCTS
Teir 3
Local elements
Top secret
Orange
Secret
Red
Classified
Blue
Unclas
Green
Effective
In use to support operations
Superseded
No longer authorized for use
Regular Supersession
Pre-determined date
Irregular Supersession
Occurs as a result of use
Emergency Supersession
Compromised
AL code 1
Serial
AL code 2
Quantity, accountable to the COR
AL code 4
Quantity, accountable locally
AL code 6
Electronically generated, accountable to COR
AL code 7
Electronically generated, accountable locally
EDP
Emergency destruction plan
Transport of COMSEC
TPI req., be on access list, EKMS qualified, courier card
Combo change
Lock is placed in use, when someone no longer needs access, compromised, every 2 years
when do you conduct inventory?
semiannually, annually, COC, disestablishment
DFS
Defense courier system, top secret/secret courier service
Amendments
any changes to a publication
TPI
two person integrity
TPC
two person control
Segment
a piece of physical Key-tape
SKL
simple key loader that emulated other systems, holds up to 10,000 keys
CCI
controlled crypto item
CIK
password and username to access PYQ-10