Upon completing this chapter, you should be able to do the following:
Identify the procedures for verifying the identification and clearance of
Identify the procedures for TEMPEST requirements.
Identify methods of controlling access to security areas, including
designation of restricted areas, requirements relating to lock combinations,
and procedures for sanitizing sites and equipment.
Identify the procedures and regulations for marking material and
conducting inventories of classified material (Secret and below).
Identify the procedures used for clearing media and hardware of classified
material (Secret and below).
Identify the regulations and procedures for declassification or destruction
of classified hardware and the destruction of classified material (Secret
Identify the regulations and procedures covering the receipt, inspection,
handling, destruction, and verification of classified material (SPECAT or
Top Secret and above).
Your duties as a Radioman will require that you
handle considerable amounts of classified information
and equipment. You should be able to recognize
classified matter and know what to door not dowith
it. Security is as basic a part of your assignment as
operating telecommunications equipment.
Safeguarding classified information is an integral part
of your everyday duties.
The security of the United States in general, and of
naval operation in particular, depends upon the
safeguarding of classified information. As a Radioman,
you will learn information of vital importance to both
the military and the nation. At times, vast amounts of
classified message information will pass through your
You must be security conscious to the point that you
automatically exercise proper discretion in the
discharge of your duties. In this way, security of
classified information becomes a natural element of
every task and not an additionally imposed burden.
RECIPIENTS IDENTIFICATION AND
Identification may be provided with the member
military identification card, command identification
cards or badges. Normally, local standard operating
procedures cover the individual commands
requirements. Guidelines for identification and access
are contained in the Department of the Navy
Information and Personnel Security Program