Regulation, OPNAVINST 5510.1, hereinafter called
the Security Manual.
Military identification cards are required to be
carried by all active duty military. They aid only
in recognizing the individual, not access or
clearance.
A command identification card/badge assists in
identifying the level of security clearance of the
holder or where the holder is authorized to enter.
These cards/badges are only an aid and may not
be used as the basis for granting access to
information or areas.
A personnel security clearance will be issued to an
individual by the Department of the Navy Central
Adjudication Facility (DONCAF), or other designated
clearance authority with favorable completion of
required paperwork in accordance with the Security
Manual. A copy of OPNAV 5510/413 (Clearance
Report) will be filed in the members permanent service
record and in the security officers files.
CONTROL OF COMPROMISING
EMANATIONS (TEMPEST)
Compromising emanations (CE), referred to as
TEMPEST, are unintentional data-related or
intelligence-bearing signals. If these signals are
intercepted and analyzed, they could disclose the
information transmitted, received, handled, or
otherwise processed by electrical information-
processing equipment or systems. Any electrical
information-processing device, whether an ordinary
electric typewriter or a large complex data processor,
may emit compromising emanations.
TEMPEST VULNERABILITY
ASSESSMENT (TVA)
The vulnerability of a ship, aircraft, shore station,
transportable equipment, or a contractor facility is
determined by a TEMPEST Vulnerability Assessment.
This assessment includes each of the following factors,
which, together, create vulnerability:
Susceptibility The probability that TEM-
PEST signals exist and are open to exploita-
tion.
Environment The primary environmental
considerations are the geographical location of a
ship, aircraft, shore station, or contractor facility;
physically and electrically controlled spaces;
adherence to approved installation criteria; and
the use of TEMPEST-approved equipment or
systems.
Threat The capability and motivation of an
enemy to exploit the TEMPEST signal.
The interaction of all of these factors determines the
vulnerability. From this assessment and considering
the category, classification, or sensitivity of the
information involved, a determination will be made.
An Instrumented TEMPEST Survey (ITS) will be
scheduled, or the requestor will be placed in the
acceptable risk category.
Tempest Vulnerability Assessment Request
(TVAR)
A TVAR must be submitted prior to processing
classified data. This request should be sent to the Naval
Criminal Investigative Service, Washington D.C., with
a copy to CO, NAVELEXSECCEN and other
commands as appropriate. The list of required
information is available in Navy Implementation of
National Policy on Control of Compromising
Emanations (U), OPNAVINST C5510.93.
Some ships are identified by CNO as high
TEMPEST risk platforms. Those which are likely to be
the target of hostile TEMPEST collection efforts will
be scheduled for an Instrumented TEMPEST Survey
(ITS). No TVAR is required from any ship.
EMISSION CONTROL (EMCON)
EMCON is used to prevent an enemy from
detecting, identifying, and locating friendly forces. It
is also used to minimize electromagnetic interference
among friendly systems. EMCON is normally imposed
by a commander to control all electromagnetic
radiations. Once EMCON is imposed, general or
specific restrictions may be added to the EMCON order,
depending on the operational, intelligence, or technical
factors for the area affected.
For radiomen, EMCON usually means either full
radio silence or HF EMCON. The most secure
communications methods during EMCON reduce, but
do not eliminate, the possibility of identification. It is
assumed that any electromagnetic radiation will be
immediately detected, and the position of the
transmitting ship will be fixed by an enemy. You will
find detailed information on the implementation of
EMCON and its degree of adjustment in Electronic
5-2