physical protection system uses small sensors mounted
at intervals on the fence and at each gate.
Emanations Protection
In evaluating the need for perimeter protection, take
into  account  the  possibility  that  electromagnetic  or
acoustic  emanations  from  AIS  hardware  may  be
intercepted.  Tests  show  that  interception  and
interpretation of such emanations may be possible
under the right conditions by technically qualified
persons using generally available hardware. As a rule
of thumb, interception of electromagnetic emanations
beyond 325 yards is very difficult. However, if there is
reason  to  believe  that  a  potential  exposure  to
interception exists, seek technical guidance from upper
management and the Chief of Naval Operations.
Measures to control compromising emanations are
subject to approval under the provisions of  Control of
Compromising Emanations, DOD Directive C5200.19,
by  the  cognizant  authority  of  the  component  approving
security features of the AIS system. Application of
these measures within industrial AIS systems is only at
the direction of the contracting activity concerned under
provisions of the Security Requirements for Automated
Information Systems (AISs), DOD Directive 5200.28,
and the requirements are to be included in the contract.
Interior Physical Protection
Intrusion detection systems (IDSs) (OPNAVINST
5510.1) provide a means of detecting and announcing
proximity or intrusion that endangers or may endanger
the security of a command. The use of an IDS in the
protective program of a command may be required
because of the critical importance of a facility or
because of the location or the layout of the command.
Remember,  IDSs  are  designed  to  detect,  not
prevent,   an   attempted   intrusion.   Thus,   a
comprehensive security plan must contain appropriate
security  measures  along  with  procedures  for  an
effective reaction force.
Remote Terminal Areas Protection
The physical and personnel security requirements
for the central computer facility area are based upon the
overall requirements of the total AIS system. The
remote terminal area requirements are based upon the
highest classified and most restrictive category and type
of material that will be accessed through the terminal
under system constraints.
Each  remote  terminal  should  be  individually
identified  to  ensure  required  security  control  and
protection.  Identify  each  terminal  as  a  feature  of
hardware in combination with the operating system.
Before  personnel  of  a  component  that  is  not
responsible for the overall AIS operation can use a
remote  device  approved  for  handling  classified
material, security measures must be established. These
security measures are established by the authority
responsible for the security of the overall AIS. They are
agreed to and implemented before the remote device is
connected to the AIS.
DOD component systems may become part of a
larger AIS network. The approval and authority to
authorize  temporary  exceptions  to  security  measures
for the components system in the network requires two
components.  These  include  the  DOD  component
operating  the  AIS  system  and  the  DOD  component
having  overall  responsibility  for  the  security  of  the
network.
Each  remote  terminal  that  is  not  controlled  and
protected as required for material accessible through it
should be disconnected from the AIS system when the
system  contains  classified  information.  Disconnect
procedures are used to disconnect remote input/output
terminals and peripheral devices from the system by a
hardware  or  software  method  authorized  by  the
designated  approving  authority  of  the  central  computer
facility.
Security Survey
An annual security survey of the AIS facility area
should be conducted by the AIS technical manager. The
first step of the survey is to evaluate all potential threats
to the AIS facility as discussed earlier in this chapter.
The second step is to define and tabulate areas within
the facility for control purposes. Details depend on the
specifics of each facility, but the following are common
areas  to  consider:
l
l
*
l
l
l
l
l
l
Public entrance or lobby;
Loading dock;
Spaces occupied by other building tenants;
AIS facility reception area;
AIS input/output counter area;
AIS data conversion area;
Media  library;
Systems analysis and programming areas;
Computer room spaces;
4-24