Regulation, OPNAVINST 5510.1, hereinafter calledthe Security Manual.Military identification cards are required to becarried by all active duty military. They aid onlyin recognizing the individual, not access orclearance.A command identification card/badge assists inidentifying the level of security clearance of theholder or where the holder is authorized to enter.These cards/badges are only an aid and may notbe used as the basis for granting access toinformation or areas.A personnel security clearance will be issued to anindividual by the Department of the Navy CentralAdjudication Facility (DONCAF), or other designatedclearance authority with favorable completion ofrequired paperwork in accordance with the SecurityManual. A copy of OPNAV 5510/413 (ClearanceReport) will be filed in the member’s permanent servicerecord and in the security officer’s files.CONTROL OF COMPROMISINGEMANATIONS (TEMPEST)Compromising emanations (CE), referred to as“TEMPEST,” are unintentional data-related orintelligence-bearing signals. If these signals areintercepted and analyzed, they could disclose theinformation transmitted, received, handled, orotherwise processed by electrical information-processing equipment or systems. Any electricalinformation-processing device, whether an ordinaryelectric typewriter or a large complex data processor,may emit compromising emanations.TEMPEST VULNERABILITYASSESSMENT (TVA)The vulnerability of a ship, aircraft, shore station,transportable equipment, or a contractor facility isdetermined by a TEMPEST Vulnerability Assessment.This assessment includes each of the following factors,which, together, create vulnerability:Susceptibility— The probability that TEM-PEST signals exist and are open to exploita-tion.Environment— The primary environmentalconsiderations are the geographical location of aship, aircraft, shore station, or contractor facility;physically and electrically controlled spaces;adherence to approved installation criteria; andthe use of TEMPEST-approved equipment orsystems.Threat— The capability and motivation of anenemy to exploit the TEMPEST signal.The interaction of all of these factors determines thevulnerability. From this assessment and consideringthe category, classification, or sensitivity of theinformation involved, a determination will be made.An Instrumented TEMPEST Survey (ITS) will bescheduled, or the requestor will be placed in the“acceptable risk” category.Tempest Vulnerability Assessment Request(TVAR)A TVAR must be submitted prior to processingclassified data. This request should be sent to the NavalCriminal Investigative Service, Washington D.C., witha copy to CO, NAVELEXSECCEN and othercommands as appropriate. The list of requiredinformation is available in Navy Implementation ofNational Policy on Control of CompromisingEmanations (U), OPNAVINST C5510.93.Some ships are identified by CNO as highTEMPEST risk platforms. Those which are likely to bethe target of hostile TEMPEST collection efforts willbe scheduled for an Instrumented TEMPEST Survey(ITS). No TVAR is required from any ship.EMISSION CONTROL (EMCON)EMCON is used to prevent an enemy fromdetecting, identifying, and locating friendly forces. Itis also used to minimize electromagnetic interferenceamong friendly systems. EMCON is normally imposedby a commander to control all electromagneticradiations. Once EMCON is imposed, general orspecific restrictions may be added to the EMCON order,depending on the operational, intelligence, or technicalfactors for the area affected.For radiomen, EMCON usually means either fullradio silence or HF EMCON. The most securecommunications methods during EMCON reduce, butdo not eliminate, the possibility of identification. It isassumed that any electromagnetic radiation will beimmediately detected, and the position of thetransmitting ship will be fixed by an enemy. You willfind detailed information on the implementation ofEMCON and its degree of adjustment in Electronic5-2
Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business