Quantcast Two Person Integrity

 
  
 
Keying  Material—  Superseded  keying  material must be destroyed first, then keying material that becomes effective in 1 or 2 months. Nonessential   Classified   COMSEC Documents—  This   material   includes maintenance,  operating,  and  administrative manuals. COMPLETE DESTRUCTION.—  When com- plete  destruction  is  ordered,  COMSEC  material  must  be destroyed as follows: Keying Material— Keying material is always destroyed first in the following order: superseded, effective, then reserve. Superseded keying material that has been used to encrypt  traffic  is  the  most  sensitive  of  the  three categories. If superseded keying material falls into enemy hands, all past intercepted traffic is subject to compromise and analysis. Superseded keying material must be destroyed within 12 hours after supersession. Effective   keying   material   is   destroyed   after superseded  keying  material.  Reserve  keying  material is  keying  material  that  will  become  effective  within  the next 30 days. Reserve keying material is destroyed after effective keying material. Keying material must be stored in priority order for destruction.  Top  Secret  material  must  be  destroyed ahead of Secret material, and Secret material destroyed ahead of Confidential material. This applies to all categories of keying material. COMSEC  Documents—  COMSEC documents are   destroyed   next.   COMSEC   documents include cryptoequipment maintenance manuals, operating instructions, general publications, status   publications,   CMS-holder   lists   and directories.   COMSEC   documents   contain information on the types of cryptoequipments we use, the level of technology we have attained, and  the  way  our  COMSEC  operations  are organized and conducted. COMSEC Equipment— COMSEC equipment is destroyed last. In emergencies, the immediate goal regarding cryptoequipment is to render the equipment  unusable  and  unrepairable.  The operating   and   technical   manuals   for cryptoequipments   provide   details   on   the techniques for rapid and effective destruction. VERIFY  DESTRUCTION.—  There are two parts to verifying the destruction of COMSEC material, witnessing and inspection of destroyed material. Two  individuals  conducting  the  destruction  must personally witness the complete destruction of the material. Then, they will sign and date the destruction documents   after   all   material   has   actually   been destroyed. An inspection of the destroyed material must ensure that  the  destruction  is  complete  and  the  destruction device  is  working  properly.  When  using  shredders, choppers, pulverizers or pulpers, you need only to examine a sample of the residue. If you are using an incinerator, verify that all residue is broken up by stirring or sifting through the remains. The last detail is to inspect the surrounding area afterwards to ensure that no material escaped during the destruction   process. The destruction plan itself is contained in the overall emergency plan. The emergency plan should always provide for securing, removing, or destroying the material, depending on the situation. The  appropriate  course  of  action  and  timing  should be stated in the overall destruction plan. For example, if there is a local civil uprising that appears to be short-lived,  destroying  all  material  would  probably  not be necessary. In this situation, a partial destruction of the more sensitive superseded material might be made, some of the remaining material removed, and the rest secured. The commanding officer will normally implement the emergency plan. Should the situation prevent contact  with  the  commanding  officer,  other  individuals, such as the COMSEC officer or COMSEC custodian, are usually authorized to implement the plan. During an   emergency,   personnel   safety   overrides   the destruction  priority. TWO-PERSON INTEGRITY Two-person integrity (TPI) is the security measure taken  to  prevent  single-person  access  to  COMSEC keying  material  and  cryptographic  maintenance manuals. TPI is accomplished as follows: The constant presence of two authorized persons when COMSEC material is being handled; The use of two combination locks on security containers used to store COMSEC material; and 3-9

 


Privacy Statement - Copyright Information. - Contact Us

comments powered by Disqus

Integrated Publishing, Inc.
9438 US Hwy 19N #311 Port Richey, FL 34668

Phone For Parts Inquiries: (727) 755-3260
Google +