You are on page 1of 216

NONRESIDENT

TRAINING
COURSE
April 1997

Information Systems
Technician Training Series
Module 1—Administration and Security
NAVEDTRA 14222

NOTICE
Any reference within this module to “Radioman” or the former
“Radioman rating” should be changed to “Information Systems
Technician” and the “Information Systems Technician (IT) rating”.
The subject matter presented relates to the occupational
standards for the IT rating.

DISTRIBUTION STATEMENT A: Approved for public release; distribution is unlimited.


Although the words “he,” “him,” and
“his” are used sparingly in this course to
enhance communication, they are not
intended to be gender driven or to affront or
discriminate against anyone.

DISTRIBUTION STATEMENT A: Approved for public release; distribution is unlimited.


PREFACE
By enrolling in this self-study course, you have demonstrated a desire to improve yourself and the Navy.
Remember, however, this self-study course is only one part of the total Navy training program. Practical
experience, schools, selected reading, and your desire to succeed are also necessary to successfully round
out a fully meaningful training program.

COURSE OVERVIEW: In completing this nonresident training course, you will demonstrate a
knowledge of the subject matter by correctly answering questions on the following subjects: AIS
Administration, Communications Administration, Communications Security, AIS Security, and General
Security.

THE COURSE: This self-study course is organized into subject matter areas, each containing learning
objectives to help you determine what you should learn along with text and illustrations to help you
understand the information. The subject matter reflects day-to-day requirements and experiences of
personnel in the rating or skill area. It also reflects guidance provided by Enlisted Community Managers
(ECMs) and other senior personnel, technical references, instructions, etc., and either the occupational or
naval standards, which are listed in the Manual of Navy Enlisted Manpower Personnel Classifications
and Occupational Standards, NAVPERS 18068.

THE QUESTIONS: The questions that appear in this course are designed to help you understand the
material in the text.

VALUE: In completing this course, you will improve your military and professional knowledge.
Importantly, it can also help you study for the Navy-wide advancement in rate examination. If you are
studying and discover a reference in the text to another publication for further information, look it up.

1997 Edition Prepared by


RMCS(SW/AW) Deborah Hearn and
DPC(SW) Walter Shugar, Jr.

Published by
NAVAL EDUCATION AND TRAINING
PROFESSIONAL DEVELOPMENT
AND TECHNOLOGY CENTER

NAVSUP Logistics Tracking Number


0504-LP-026-8610

i
Sailor’s Creed

“I am a United States Sailor.

I will support and defend the


Constitution of the United States of
America and I will obey the orders
of those appointed over me.

I represent the fighting spirit of the


Navy and those who have gone
before me to defend freedom and
democracy around the world.

I proudly serve my country’s Navy


combat team with honor, courage
and commitment.

I am committed to excellence and


the fair treatment of all.”

ii
CONTENTS

CHAPTER

1. AIS Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1

2. Communications Administration . . . . . . . . . . . . . . . . . . . . . . 2-1

3. Communications Security . . . . . . . . . . . . . . . . . . . . . . . . . . .3-1

4. AIS Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..4-1

5. General Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ..5-1

APPENDIX

I. Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .AI-l

II. Glossary of Acronyms and Abbreviations . . . . . . . . . . . . . AII-1

III. References Used to Develop the TRAMAN . . . . . . . . . . . . . AIII-1

I N D E X . . . . . . . . . . . . . . . . . . . . . . . . . . . . .INDEX-1

iii
SUMMARY OF THE RADIOMAN
TRAINING SERIES

MODULE 1

Administration and Security—This module covers Radioman duties


relating to administering AIS and communication systems. Procedures and
guidance for handling of classified information, messages, COMSEC material
and equipment, and AIS requirements are discussed.

MODULE 2

Computer Systems—This module covers computer hardware startup,


including peripheral operations and system modification. Other topics dis-
cussed include computer center operations, media library functions, system
operations, and troubleshooting techniques. Data file processes, memory
requirements, and database management are also covered.

MODULE 3

Network Communications—This module covers network administration,


LAN hardware, and network troubleshooting. Related areas discussed are
network configuration and operations, components and connections, and
communication lines and nodes.

MODULE 4

Communications Hardware—This module covers various types of com-


munications equipment, including satellites and antennas. Subjects discussed
include hardware setup procedures, COMSEC equipment requirements,
distress communications equipment, troubleshooting equipment, satellite
theory, and antenna selection and positioning.

MODULE 5

Communications Center Operations—This module covers center opera-


tions, including transmit message systems, voice communications, center
administration, quality control, and circuit setup/restorations. Guidelines for
setting EMCON and HERO conditions and cryptosecurity requirements are
also discussed.

iv
INSTRUCTIONS FOR TAKING THE COURSE

ASSIGNMENTS assignments. To submit your assignment


answers via the Internet, go to:
The text pages that you are to study are listed at
the beginning of each assignment. Study these https://courses.cnet.navy.mil
pages carefully before attempting to answer the
questions. Pay close attention to tables and Grading by Mail: When you submit answer
illustrations and read the learning objectives. sheets by mail, send all of your assignments at
The learning objectives state what you should be one time. Do NOT submit individual answer
able to do after studying the material. Answering sheets for grading. Mail all of your assignments
the questions correctly helps you accomplish the in an envelope, which you either provide
objectives. yourself or obtain from your nearest Educational
Services Officer (ESO). Submit answer sheets
SELECTING YOUR ANSWERS to:

Read each question carefully, then select the COMMANDING OFFICER


BEST answer. You may refer freely to the text. NETPDTC N331
The answers must be the result of your own 6490 SAUFLEY FIELD ROAD
work and decisions. You are prohibited from PENSACOLA FL 32559-5000
referring to or copying the answers of others and
from giving answers to anyone else taking the Answer Sheets: All courses include one
course. “scannable” answer sheet for each assignment.
These answer sheets are preprinted with your
SUBMITTING YOUR ASSIGNMENTS SSN, name, assignment number, and course
number. Explanations for completing the answer
To have your assignments graded, you must be sheets are on the answer sheet.
enrolled in the course with the Nonresident
Training Course Administration Branch at the Do not use answer sheet reproductions: Use
Naval Education and Training Professional only the original answer sheets that we
Development and Technology Center provide—reproductions will not work with our
(NETPDTC). Following enrollment, there are scanning equipment and cannot be processed.
two ways of having your assignments graded:
(1) use the Internet to submit your assignments Follow the instructions for marking your
as you complete them, or (2) send all the answers on the answer sheet. Be sure that blocks
assignments at one time by mail to NETPDTC. 1, 2, and 3 are filled in correctly. This
information is necessary for your course to be
Grading on the Internet: Advantages to properly processed and for you to receive credit
Internet grading are: for your work.

• you may submit your answers as soon as COMPLETION TIME


you complete an assignment, and
• you get your results faster; usually by the Courses must be completed within 12 months
next working day (approximately 24 hours). from the date of enrollment. This includes time
required to resubmit failed assignments.
In addition to receiving grade results for each
assignment, you will receive course completion
confirmation once you have completed all the

v
PASS/FAIL ASSIGNMENT PROCEDURES For subject matter questions:

If your overall course score is 3.2 or higher, you E-mail: n311.products@cnet.navy.mil


will pass the course and will not be required to Phone: Comm: (850) 452-1501
resubmit assignments. Once your assignments DSN: 922-1501
have been graded you will receive course FAX: (850) 452-1370
completion confirmation. (Do not fax answer sheets.)
Address: COMMANDING OFFICER
If you receive less than a 3.2 on any assignment NETPDTC N311
and your overall course score is below 3.2, you 6490 SAUFLEY FIELD ROAD
will be given the opportunity to resubmit failed PENSACOLA FL 32509-5237
assignments. You may resubmit failed
assignments only once. Internet students will For enrollment, shipping, grading, or
receive notification when they have failed an completion letter questions
assignment--they may then resubmit failed
assignments on the web site. Internet students E-mail: fleetservices@cnet.navy.mil
may view and print results for failed Phone: Toll Free: 877-264-8583
assignments from the web site. Students who Comm: (850) 452-1511/1181/1859
submit by mail will receive a failing result letter DSN: 922-1511/1181/1859
and a new answer sheet for resubmission of each FAX: (850) 452-1370
failed assignment. (Do not fax answer sheets.)
Address: COMMANDING OFFICER
COMPLETION CONFIRMATION NETPDTC N331
6490 SAUFLEY FIELD ROAD
After successfully completing this course, you PENSACOLA FL 32559-5000
will receive a letter of completion.
NAVAL RESERVE RETIREMENT CREDIT
ERRATA
If you are a member of the Naval Reserve,
Errata are used to correct minor errors or delete you may earn retirement points for successfully
obsolete information in a course. Errata may completing this course, if authorized under
also be used to provide instructions to the current directives governing retirement of Naval
student. If a course has an errata, it will be Reserve personnel. For Naval Reserve retire-
included as the first page(s) after the front cover. ment, this course is evaluated at 8 points. (Refer
Errata for all courses can be accessed and to Administrative Procedures for Naval
viewed/downloaded at: Reservists on Inactive Duty, BUPERSINST
1001.39, for more information about retirement
https://www.advancement.cnet.navy.mil points.)

STUDENT FEEDBACK QUESTIONS

We value your suggestions, questions, and


criticisms on our courses. If you would like to
communicate with us regarding this course, we
encourage you, if possible, to use e-mail. If you
write or fax, please use a copy of the Student
Comment form that follows this page.

vi
Student Comments
Information Systems Technician Training Series
Course Title: Module 1—Administration and Security

NAVEDTRA: 14222 Date:

We need some information about you:

Rate/Rank and Name: SSN: Command/Unit

Street Address: City: State/FPO: Zip

Your comments, suggestions, etc.:

Privacy Act Statement: Under authority of Title 5, USC 301, information regarding your military status is
requested in processing your comments and in preparing a reply. This information will not be divulged without
written authorization to anyone other than those within DOD for official use in determining performance.

NETPDTC 1550/41 (Rev 4-00

vii
CHAPTER 1

AIS ADMINISTRATION

LEARNING OBJECTIVES

Upon completing this chapter, you should be able to do the following:

l Describe the preparation and monitoring of the run schedule.

l Examine console printouts, logs, and describe the analysis of console


printouts and logs.

l Schedule computer downtime with users, to include hardware maintenance


and software upgrades.

l Prepare emergency urgent change requests, to include application and


system programs.

l Prepare, review, and coordinate trouble reports.

l Describe how to conduct and update an AIS equipment inventory.

l Describe the preparation and analysis of system performance reports.

l Explain the establishment and maintenance of system resource limits.

l Describe how to project future application growth capabilities.

l Explain how to prepare guidelines for contingency/disaster recoveries, to


include adequate replacement parts and backup media and current
backups.

Are scheduling systems really necessary to get to develop monthly production schedules in
the work done? No; but unless you are working at coordination with user-assigned subsystem
an AIS facility with unlimited resources, it would coordinators. You will also need to develop daily
not be long before confusion and disorder set in if workload schedules to meet user-established deadlines.
you did not have one. That would be followed by If your computer system has online capabilities, you
unhappy and dissatisfied users demanding their output will need to be sure users have access when they need
products in a timely manner. Users rely on computer it and that the system is responsive.
operations and support personnel to get their jobs done
Technical administration and support are important
on time.
aspects of automated information system (AIS) facility
Whether your AIS facility has one or several management. As a technical administrator, you will be
computers, it will be your job to see that the AIS making hardware and software projection reports,
production work of your command is processed in a software performance reports, hardware utilization
timely reamer. This means schedules. You will need reports, and trouble reports. You will be responsible for

1-1
implementing performance-tuning initiatives to the customer, but also by your fellow workers,
improve computer system performance. You will also supervisor, and, in some cases, management. The
be expected to project future application growth quality of your work will be your signature when
capabilities. All these are technical functions needed to dealing with other AIS personnel and customers.
ensure the smooth operation of an AIS facility.
I/O control is a process. Your job will be to follow
In this chapter, you will learn about the many your installation’s procedures. Although the
varied tasks you may perform as an input/output control procedures may differ from one installation to another,
clerk and then as a scheduler, reports preparation,
trouble reports, technical assists, and operational they all require the same knowledge and skills.
guidelines. Our objective is to give you a better As an I/O control clerk, you act as the middle person
understanding of the importance, scope, and between the user (customer) and the computer.
responsibilities that go with processing production Normally, the users come to you with a transmittal or
jobs—receiving jobs, scheduling AIS production
request form and sometimes with their input—source
within the AIS facility, and ensuring the accuracy and
timeliness of products. documents, magnetic tapes, diskettes, and so on.
Before accepting and logging in their jobs, take a few
moments to look over the transmittal form. Be sure that
I/O CONTROL all the necessary entries are properly filled in, that they
I/O control is the interface between the user and the are readable, and that any special instructions are
computer system. Figure 1-1 shows an example of the understandable. It is better to clear up any
role played by I/O control in the processing of computer misunderstandings right then and there, rather than
jobs. having to contact the user again later and possibly cause
a delay in the job getting on the computer. Never be
I/O CONTROL PROCEDURES embarrassed to ask questions. You must remember that
many of the users you come in contact with are
I/O, as you know, stands for input/output. The
people who perform I/O functions are called control non-ADP oriented; therefore, it is up to you to help them
clerks, I/O control clerks, job-staging clerks, understand the process and its requirements.
distribution clerks, or computer aids. In short, these are Once you have logged the job in, you may work
the people who are responsible for the quality and
with data entry to prepare data or programs; then with
control of data processing input and output media and
products. They ensure that the data to be processed the media library to pull the needed tapes or disks; and
meets all the requirements as outlined in the input then with computer operations to have the job run.
criteria (instructions and procedures), that all data are Once the job has been run on the computer, you may
processed, that all processing steps are performed, that check the output products. When you are sure the
the output products are distributed to the appropriate outputs are OK, you distribute them according to
users once they are complete. instructions, log the job out, and file or return the job
To be an efficient and effective I/O control clerk, materials to the user.
you should be able to work on your own with a Study figure 1-1 for a few moments. It will help
minimum of supervision; work well with other people;
you see how the work flows and how you, as an I/O
display tact and diplomacy; be a good communicator;
use sound judgment; be logical, methodical, and control clerk, fit in the picture. The functional areas are
persuasive; and most of all be able to respond to users’ listed across the top of the figure.
requests. Although you may manage to stay out of the As you enter the level of middle management, you
limelight in this job, you do perform an integral function will be required to take on added duties and additional
in the overall ADP operation. The importance and
responsibilities. You will be a technical administrator,
impact you have (whether it be aboard ship or ashore)
is far-reaching and invaluable. Most opinions and you will provide support to management. You will
formulated by the AIS users (customers) are based on use your expertise to evaluate current procedures and
the quality of their output products and their personal equipment and to make recommendations for
contact with you as an I/O control clerk. Your attitude improvements to operations. This includes estimating
toward your job and its importance is seen not only by future equipment needs.

1-2
Figure 1-1.—Typical I/O control workflow.

1-3
OPERATIONAL REQUIREMENTS In looking over this form, you will notice that it
provides you with such information as the following:
Your operational requirements will include some or l The program name, job number, or task number
all of the following tasks: that is used to reference a particular job
l Receive user job requests. application;

l Maintain input and output control logs. l The user’s name, department and/or
organization, and phone number;
l Verify inputs to be processed to ensure they are
o Where and/or to whom the output is to be sent;
correct and in accordance with the run folder or
run instructions. l The desired completion date of the job;
l Make system control language (SCL) run stream l The computer (machine type) to be used for the
changes as required for correct data processing job.
of the user’s runs.
l The type of operation to be performed:
l Input the user’s run package (jobs) to the production, test, assemble, compile, and so on;
computer operations personnel according to a
schedule. l The quantity and type of input media and/or
material to be used: magnetic tape, blank
l Monitor the jobs in progress to ensure that all checks, and so on; and
data are processed and that all processing steps
have been properly performed. l Any special instructions or remarks the user
wishes to include.
l Balance the number of records input relative to
the number output. You will also notice that the lower portion of the
AIS service request (see figure 1-2) is reserved for
l Verify the format and the number of copies of operations use only. This is where you enter the
each printed output in accordance with time and date that the job was accepted for processing
instructions in the run folder. (lower left-hand corner). The remaining blocks are
l Reconcile processing discrepancies and used by the people in operations to indicate when the
inconsistencies. job started, when it was completed, along with any
significant comments about the job during the time it
l Ensure that printed outputs are complete, was run.
properly collated, and assembled.
If, while reviewing the user’s request, you happen
l Arrange for distribution of outputs to authorized to come across a discrepancy or find something that is
users. incomplete or unclear, be sure to bring it to the user’s
l Operate a variety of auxiliary equipment: attention. Just remember that throughout the course of
your conversation, you are to be tactful and diplomatic.
copying machines, decollators, tape cleaners,
You must always keep in mind that you are representing
CRT terminals, and so on.
your command, and the image you project, both
l Become familiar with the basic operations of the personally and professionally, is as important to your
AIS computer facility. job as the work that is being submitted. The key word
is communication, NOT confrontation. Once you have
Now that you are familiar with the process and with accepted the user’s request, you make the necessary
operational responsibilities, let’s look at the parts: entries in the job control log.
transmittal forms, input control logs, job preparation,
scheduling, monitoring, and output products.
Job Control Log
Processing AIS Service Requests
A job control log is important, especially when you
Your first task may be to receive jobs from users. deal with multiple users. It will be up to you to keep an
Each job will have an AIS service request of some type. up-to-date record of all jobs received for processing. A
A typical AIS service request is illustrated in figure 1-2. job control log will serve as a continuous point of

1-4
Figure 1-2.—A typical AIS service request.

1-5
Figure 1-3.—Job control log.
reference. Figure 1-3 illustrates a typical layout of input which the job (or system) is to be executed or run. In
control information. addition, it indicates all of the inputs: magnetic tapes,
When you receive a job, make an initial entry in the disks, and diskettes required, depending upon the type
log. As the job progresses, make additional entries as of run or possible options the user selected. There could
appropriate. For example, if you send input to data be one or several magnetic tapes and/or disk files needed
for the job. You might be required to retrieve them from
entry to be keyed, record this in the log. In the event a
job or its accompanying input becomes side-tracked, the media library, or you might just lookup the tape/disk
numbers and annotate them on the run sheet.
misplaced, or lost, you still have a means of tracking
down the job or its input. The log can be of great help. CONTROL PARAMETERS.— The task folder
It points out such things as when the job was submitted, will also indicate any parameters that are required.
the disposition of the input media, the location or the These parameters provide application programs with
computer system to which the job was assigned, the variable information, data elements that change from
progress (number of steps) the job has already gone one run to the next. For example, the type of run requested:
through, the type and amount of input submitted, the (D)aily, (W)eekly, (M)onthly, (Y)early, (E)dit input
person who accepted the job, and soon. If you are still only, and so on, or the entering of a date. You maybe
unable to locate the missing item, you are able to notify required to key in one or several of these parameters,
the user. That person’s name, organization, and phone depending upon the complexity of the system.
number were initial entries in the log.
OUTPUT REQUIREMENTS.— The task folder
Job Preparation and/or the computer run sheet show you all of the output
To properly prepare the user’s job (specifically the products: magnetic tapes/disks, and special forms that
input) for processing, you must have a certain amount are produced during the running of the job or system.
of information. This information is located in what is As an I/O control clerk, you maybe tasked to provide
called a task folder, job folder, run folder, or run the computer operators with the correct number of
procedure. Do not confuse these with run book, run blank, handwritten, or preprinted output tape/disk
manual, or run instructions, which provide computer labels and ensure a sufficient supply of tapes, disks,
program operating instructions for the operators. The paper, and special forms are on hand before the job or
task folder provides you with such things as a run sheet, system is scheduled to be run.
control parameters, and output requirements. Job Monitoring
RUN SHEET.— The run sheet contains the pro- Although we would like to believe all jobs run
gram name or names and the job or task number under without error, there are occasions when a program

1-6
prematurely or abnormally terminates. It does not and the resulting actions taken, the various output files
process to normal end of job (EOJ). When this occurs, created, and so on.
the operator is expected to take whatever corrective In the majority of cases, the computer console print-
actions are necessary to get the job going again. More out will provide you with the answers you are looking
often than not, the operator is able to recover a job by for when it comes to reconciling processing discrepancies.
recreating a tape/disk file, moving the file to another For example, it will inform you of the reasons certain
device, or possibly cleaning the read/write mechanisms output products—tapes, diskettes, or report listings—
of the device prior to rerun. But, there are times when were not produced. Possibly the operator selected an
the operator will notify you (the I/O control clerk) to incorrect program option, or the input parameters were
assist in correcting the problem. Such would be the case incorrect or incomplete before starting the job. In short,
when the input parameters are in error, the user’s input you are responsible and also accountable for every job
is bad, or the job aborted because of an unrecoverable you work on, from the time it is submitted by the user
program error. If this happens, you maybe responsible until its delivery back to the user.
for collecting all the data, both input and output, along
with any memory dumps, and forwarding them all to When checking the user’s output, you should once
again refer to the run sheet and/or task folder to verify
the programmer.
that all items requested were, in fact, produced. If the
During the recovery phase of an operation, the oper- output is in the form of magnetic tape, disk, or diskette,
ator may need you to provide certain input parameters be sure it is labeled properly, given the proper
or tape/disk files before the job can be executed. classification, and it is on the appropriate media
Because of time constraints, a job that abnormally (magnetic media that has been designated for mail-out
terminates may have to be rescheduled. If so, you may or distribution only).
be responsible for seeing to it that the job gets When checking reports, make sure they were run
rescheduled and that the user is notified of any job delay.
on the proper forms (size and type), that no pages are
We could go on and on, but by now you are beginning missing and the correct number of copies were printed,
to get the picture. These examples are just a few of the and that all print is legible and lined up properly.
many things that can get in the way of achieving a
normal EOJ. We bring them to your attention to make Once the output is checked, you then package each
you aware of the types of problems that can and do arise, completed copy of the report, along with any other out-
and the manner in which you are to respond. Hopefully, put products and the original input, place it in the proper
you now know and are aware that monitoring a job pickup area, and log the job out in the job control log.
means more than just calling up the operator to see how You may need to notify the user when the job is ready.
the job is progressing. It means you must oversee the If, during the course of checking over the user’s
job to its completion, doing whatever is necessary to output, you happen to come across something unusual
help keep the job (or system) on track. or you find an error, by all means, pull (reject) the job
Output Products immediately, bring it to the attention of your superior,
and notify the user of the delay. Even at this late stage,
Output from computer processing—The work that it is better to reject a job to correct any problems or
has been completed—may take the form of a printed discrepancies rather than to release it, only to have it
document, magnetic tape, or magnetic disk or diskette. returned for rerun later.
In all cases, both you and the computer operator are
responsible for ensuring that all completed jobs run USER SUPPORT
successfully. In addition, you are responsible for The term user support covers a broad range of duties.
identifying and coordinating the various outputs for They include answering inquiries from users, providing
each job, and for initiating their correct distribution. logistical support, and processing trouble reports.
To determine whether a job (or system) ran User Inquiries
successfully (to a normal EOJ) and that all processing Normal inquiries from users include system status,
steps were properly performed, you may have to review job status, and reporting trouble. It is the job of the
the computer console printout. This printout indicates technician to answer these questions promptly and
such things as the number of input records read, the accurately. A user might ask:
various input files updated, all error conditions (error
messages) that the operator encountered during the run l Why is the system slow?

1-7
l What is the status of a particular job? During your work shift, one of your many jobs will
be to monitor job/production status on a regular basis
l What step is it in? to determine if there is any actual or potential slippage
l Has it printed out yet? in the schedule. It will be your job to balance operations
resources and optimize workflow. There will be times
l Do I have a problem with my terminal? when you must make adjustments in the sequence of
Logistical Support work (within the constraints of the overall schedule) to
optimize productivity. In computer operations, you
The most common user support you will deal with must be able to examine problems that have occurred
is logistical support. This will include the need for new during production and initiate corrective action within
or different equipment to meet the command’s mission operations or with the users.
or current equipment that needs corrective
maintenance, or scheduling preventive maintenance.
Forward this type of user support to the division chief THE SCHEDULING ENVIRONMENT
or the division officer, since it requires the relocation or AND REQUIREMENTS
the acquisition of equipment.
Trouble Calls
As the technician, you will be receiving and
responding to trouble calls. When the user calls to
submit a trouble call, remember to get all the required
information:
* User’s name;
l Type of trouble encountered;
. Date and time; and
l Job being done when the trouble started.
Schedulers and production control coordinators are
The preceding is only an example of what might be
responsible for coordinating the work efforts of many
included on the trouble report at your command. Your
people. They prepare, distribute, and maintain produc-
command will have the reporting procedures for
tion schedules for their AIS facility or data center. They
submitting trouble reports, with an example of a trouble
analyze job requirements (old and new) to determine
report. Each command has a specific trouble call
the impact each job has on production resources. They
format and a tracking procedure.
also inform the LPO or division chief when scheduling
CUSTOMER LIAISON requirements will exceed computer system resources.
In short, schedulers act as coordinators from the time a
When involved with or communicating with the request is received until a job is successfully completed.
user (customer), you must use tact and diplomacy. You The scheduler is responsible for keeping the AIS
must be able to understand and resolve the requests of
facility’s assembly line running as smoothly and
the customer. You will also have to deal with
efflciently as possible. Schedulers ensure that jobs are
discrepancies and explain problems to customers. You scheduled and entered into the production job stream at
must be able to independently recognize and resolve
the proper time. They also ensure that all necessary
discrepancies and be knowledgeable enough to know resources are available to maintain a constant workflow
when you can resolve a discrepancy and when to refer throughout the AIS facility.
complex problems to your supervisor or leading chief.
PEOPLE, PLACES, and THINGS are the
MANAGING PRODUCTION
important factors of a scheduler’s job. The first factor
Once you become a shift supervisor, you will be res- is PEOPLE. You must learn to deal with various
ponsible for managing the scheduling and operation of personalities. The second factor is PLACES. You have
all production activities associated with computer process- to learn what goes on in other fictional work areas.
ing within your shift. You will monitor the workflow The third factor is THINGS. You have to cope with run
and make adjustments to meet changing requirements. times, deadlines, computer hardware and software

1-8
malfunctions, problems with production programs, and must consider the number of processors and peripheral
TIME itself (that 24-hour period in which you are to devices available and how they interconnect. The
schedule as much production work as possible). second factor deals with the operating mode of the
computer. The operating mode may be batch, online,
THE SCHEDULING ENVIRONMENT
real-time, time sharing, multiprogramming,
How difficult is it to prepare a schedule? you might multiprocessing, teleprocessing, networking, or any
ask. That depends on the size and complexity of your combination of these. Having knowledge of the
data processing installation in terms of hardware, different operating modes will help you understand the
software, and support personnel. You must consider operating environment in which you will be working.
many things when preparing a schedule. As a start, you This knowledge will help you understand how to go
have to ask yourself the following questions: about scheduling work for the system.
l What types of jobs are to be processed? THE JOB OF SCHEDULER
o In what processing environment will the jobs The job of scheduler, or production control
run—real-time? online? batch? coordinator as it is sometimes called, requires you to
have specific knowledge and skills if you are to
l What special-handling requirements are there, if effectively schedule the computer and the other related
any? activities that revolve around it. You must have a good
working knowledge of AIS concepts and be thoroughly
l What amount of work is to be processed
familiar with the operation of your facility’s computer
(workload)? system(s)—the actual hardware components
As scheduler, you will be responsible for: themselves. You also need to know how the operating
system in use works, what applications and production
Preparing and maintaining established schedules jobs you are to schedule, the time it takes to run them,
for various time periods: daily, weekly, and how to make up job streams using system control
monthly; language (SCL) statements, and so on.
Reviewing and acting on all types of AIS service One of your primary jobs will be to keep production
requests as they are submitted to you; schedules up-to-date and as accurate and complete as
Distributing production schedules to various possible. In addition to making up production
work areas within your AIS facility; schedules for computer processing, you must be equally
concerned with two other factors: precomputer
Organizing data processing priorities for both processing and postcomputer processing.
scheduled and nonscheduled work;
Precomputer processing includes ensuring all
Entering jobs into the production job stream to inputs are received on time according to prearranged
achieve maximum use of computer resources; schedules. Postcomputer processing includes ensuring
Tracking work in progress to ensure everything output products are complete, accurate, and delivered
is running according to schedule; to the user when promised. Too often these areas are
either overlooked or forgotten, because our interest is
Analyzing problems in connection with generally focused on the computer. We can easily
production jobs and adjusting computer overload or underload precomputer and postcomputer
processing schedules to use whatever time is resources. This will have the same effect as
available until problems can be corrected and a overloading or underloading the computer—either user
rerun can be initiated; service deteriorates or AIS services are underused. For
TOTAL AIS scheduling to be achieved, YOU must
Maintaining accurate logs and adhering to consider all of the fictional work areas in the assembly
administrative reporting requirements; and line, especially the end users. All are affected by the
Determining the accuracy of schedules based on scheduling process, and because of this, you must give
reviewing production results. each work area proper consideration.
How you go about scheduling work on the Having working knowledge and experience in the
computer system will depend on two factors. The first fictional areas for which you will prepare schedules
factor deals with how the system is configured. You will also help you. As scheduler, you will be putting

1-9
together information from several sources: I/O control, . Be responsive to users’ needs.
data entry, and the magnetic media library.
The job of a scheduler is a high-visibility position.
Depending upon how your AIS facility is You will be responsible not only for the flow of work
structured, your operational requirements will include throughout the AIS facility but also for the amount of
tasks, duties, and functions as follows: work that will be accomplished within an allocated
period of time.
* Receive user job requests.
AIS WORKFLOW ANALYSIS
l Analyze production requirements.
Every AIS facility is site unique regarding the types
l Assign job/run control numbers. of hardware and operating system (OS) software in use.
l Maintain accurate logs. However, every site does have a formal or informal
workload structure that encompasses all of the AIS
l Carry out administrative reporting requirements. fictional work areas and the users. Figure 1-4
illustrates a typical AIS facility’s workflow structure.
o Prepare production schedules.
This particular site operates in a multiprogramming
l Write SCL statements. environment and handles batch, online batch, and
real-time processing. Study this figure for a moment.
o Make up job streams for production runs. You will see how the work flows in, and about, and out
l Maintain and revise production schedules. of the AIS facility. You will see how you, as a scheduler,
fit into the picture.
l Distribute production schedules.
In looking at figure 1-4, you will notice this AIS
o Monitor production. facility is composed of five fictional work areas:
l Know how jobs interface. o Production Control—Scheduling, I/O Control,
l Be able to read console run sheets and logs. Quality Control;
l Data Entry;
o Know the capabilities and capacities of the
computer systems. * Computer Operations;
l Know the files in use and how to reconstruct l Media Library; and
them.
o Technical Support.
8 Know how to readjust schedules.
Each functional work area is responsible for
l Know the time it takes to run each production specific segments of the workflow. How they work
job. together and with you, as the scheduler, will determine
if your job is easier or more difficult. Learn what they
As scheduler, you will work on your own with only
minimal supervision. To be effective, you will need do. The next paragraphs will give you a basic
understanding of their responsibilities and their
more than a good working knowledge of your facility’s
interactions with other work areas.
hardware components, data processing concepts,
operating systems, and system control languages. You PRODUCTION CONTROL personnel act as
must be able to: liaison between the AIS facility and the user
community. The division chief and LPO normally deal
Work well with other people; with users during the initial scheduling phase. They
Demonstrate tact and diplomacy; will assist scheduling by ironing out any problems early
in the scheduling phase. When necessary, they will also
Use sound judgment; work with the users to adjust data flow and output
Be logical, systematic, and persuasive; schedules based on user and production requirements.

Demonstrate analytical ability; SCHEDULING personnel make production


commitments for the AIS facility to meet user
Be a good communicator (speaking, listening, requirements. They provide processing schedules to
and writing); and coordinate inputs and outputs between I/O control, data

1-10
Figure 1-4.—AIS facility workflow structure.

1-11
entry, computer operations, and the magnetic media MEDIA LIBRARY personnel check in/out tapes,
library. disks, diskettes, and documentation to computer
I/O CONTROL personnel handle all incoming operations personnel. They also condition, clean,
work for AIS services along with all types of input retire, store, and transfer magnetic media to off-site
media from the user. Some of these inputs are source storage and other outside activities.
documents, magnetic tape, and diskettes. I/O control TECHNICAL SUPPORT personnel provide
personnel perform the following tasks: scheduling and production control with technical
support, as needed, to resolve production problems.
Count, verify, edit, and total all source They examine problems that occur during production
documents received; to determine if errors were caused by hardware or
Check that the amount of input data is system/applications software. Then, they initiate
approximately the same amount as was indicated corrective action with computer operations and/or
in the production schedule; scheduling.
Verify all incoming work for accuracy and legibility; By charting all AIS facility functions and defining
their interrelationships, you, as scheduler, are able to
Log all inputs received in various input/output create a workflow diagram for your particular
control logs; scheduling environment. It will help you to decide
Coordinate the receipt of late submissions with which functions and fictional areas require scheduling
users and scheduling; and which do not. Now that you have some idea of how
the work flows in, and about, and out of the AIS facility,
Forward source documents to data entry and let’s see how you, as a scheduler, fit into the picture.
computer inputs to either computer operations or
the media library depending on when the job is Normally, the users get together with the division
scheduled; chief, LPO, and yourself (as scheduler) to make their
requests for AIS services known for the upcoming
Receive output products from quality control; month(s). This initial scheduling phase is known as the
process, log, and package output products; and planning phase or forecasting phase. By knowing these
ensure proper and timely delivery to users. workload demands early, more time is available to
QUALITY CONTROL personnel review all determine where excessive demands and inadequate
completed output products from data entry and demands are being made on resources. To put it another
computer operations to determine their accuracy and way, the forecasting phase allows everyone to see where
completeness before releasing them to I/O control there may be an overloading or underloading of AIS
personnel for further processing and distribution. They resources.
forward incomplete or incorrect jobs to scheduling or As the users go about presenting their daily, weekly,
technical support for further investigation. and monthly requirements, you will be busy
DATA ENTRY personnel convert source incorporating their requirements into the production
documents into machine-readable form using some schedule. During the forecasting phase, you must
type of key-driven (terminal) device if this is not done remember to set aside whatever time is needed for file
by the user. They accept source documents, key-enter and computer maintenance. You should pay particular
and verify all inputs, and return completed data to attention to those out-of-the-ordinary and one-time
quality control so it can be checked for completeness requests that tend to pop up. These, too, must be
and accuracy before turning it back over to I/O control accommodated in the schedule. When given a new job
to be submitted with the job. where there are no previous production statistics, ask
the user for a rough time estimate of how long the job
COMPUTER OPERATIONS personnel operate may run. Ask if there will be input data, and if so, will
the computer and associated peripheral devices in it require data entry services. Know how many and
accordance with authorized schedules. They receive what resources the job will use. Know the environment
inputs and associated run instructions from I/O control, in which the job will run—online, batch, or real-time.
update schedules as the work is completed, forward You will want to keep a close eye on new jobs.
output products to quality control, and transfer
magnetic media to the library for further handling and Using previous schedules and scheduling
processing. procedures as a guideline, you can begin to prepare

1-12
(plan) a rough schedule. When scheduling old jobs, you All of these benefits can be achieved through an
will have expience and history to follow. Knowing effective scheduling system.
what resources (hardware, software, and personnel)
your AIS facility has available will help you see where THE SCHEDULING PROCESS
the peaks (overloading) and valleys (underloading) are
The scheduling process has three moving parts: you,
in the schedule. It will be your job to take the resources,
the information, and the method. Let’s look at each.
the time available, the estimated run times, the time jobs
must be started and completed, and whatever other THE SCHEDULER
information is needed to establish a meaningful and As scheduler, you must be well organized.
workable schedule with the best job mix possible. You Scheduling jobs through the various work areas within
will prioritize and plan. Once you have ironed out all your AIS facility is much like scheduling the events of
the wrinkles and prepared a smooth schedule, you will your own personal day-to-day life, except it’s a lot more
submit it up the chain of command for approval. Once technical and involved. You set aside predetermined
approved, you will distribute the schedules to the amounts of time to do certain things. Call it “a
various functional work areas. things-to-do list” if you will.
THE BENEFITS OF SCHEDULING It would be nice if your things-to-do list consisted
of nothing more than having to accept incoming
What are some of the benefits of having a schedule/ requests from the users, finding holes to plug their jobs
scheduling system in place? One answer is PREDICT- into the schedule, and waiting for the jobs to show up
ABILITY. A scheduling system makes everyone’s job on the completed list. If that were the case, your
easier by adding predictability to the AIS environment. things-to-do list would be relatively small and
To your superiors, it provides a means of holding down seemingly uncomplicated. If your AIS facility has such
costs through better use of personnel and equipment. an abundance of resources that any demands made by
Other possible benefits of scheduling areas follows: the users can be easily met, then your facility is probably
wasting resources and incurring more expenses than it
l Effective use of all AIS resources; should. This is probably not the case. To the contrary,
l Increased throughput; your command will probably have just enough
resources or too few.
l Decreased turnaround time;
As scheduler, you must decide which jobs to
l User deadlines met; process first, second, third, and so on. Which jobs can
be run together? You need to determine the job mix.
l Users made responsible for providing input on How big are the jobs in terms of memory use? What
schedule; resources do they use-disk drives, tape drives, printer,
l Improved communications with users; and so on? How long will each job run? In what
environment must each job be run?
l Avoidance of overloading and underuse of
Under ideal conditions, you can work through your
resources;
things-to-do list in a relatively short period of time and
l Job delays more readily apparent; come up with a workable schedule. In reality, however,
things do not necessarily go according to plan or, rather,
l Documentation of scheduling deviations and according to schedule. Equipment, other people, and
their causes; outside influences are all problem areas.
l Reduced confusion within the AIS facility; A lack of productivity and missed deadlines can be
l Better use of multiprogramming capabilities; caused by unexpected problems, such as:
o Late submission of input from the user;
l AIS facility able to review its own effectiveness;
l Waiting for data entry to complete a job step;
l Predictability of the effects of an increased
workload; and * Having to locate a missing file in the library;
l Predictability of future equipment and personnel @ Job stream parameters entered into the system
needs. incorrectly.

1-13
You may face any number of these and other long a job will reside in memory. Processing time is
situations each day. You should have a backup or normally estimated for a multiprogramming
contingency plan in the event you lose a piece of environment since most computers today process
hardware. For example, if the fastest printer is down, programs/data in this fashion, and job mix affects the
will the user be satisfied with one printed copy now and overall processing time for a job.
the remaining copies printed tomorrow? Or is there
Let’s assume you have a static workload with no
another AIS facility in your immediate area that will let
jobs being added to or deleted from the schedule. Even
you use its printer? It will be your job to prepare the
under these conditions, you can expect job processing
most realistic schedule you can, and then be ready to
to deviate from the schedule. Why? you might ask. The
adjust it. What tools will you have to help you prepare
reasons for this are the uncertainty about job processing
the schedules? What information will you need? What
time and disrupted processing. Take, for example, a job
methods can you use? In the following section, we talk
that normally has a processing time of 45 minutes.
about the types of information you will need to prepare
Today, because of a large increase in input, the job
a schedule. Then we explore a few of the scheduling
processing time is 1 hour, thus delaying all the
methods you might use.
following jobs by 15 minutes. This is unavoidable and
INFORMATION NEEDS must be expected. The same is true of disrupted
processing, whether it is hardware failure or software
Regardless of the scheduling method used, you will
problems. One way to avoid these delays is to include
need to know specific types of information. Some
a specified amount of buffer time in your schedule. You
information is job-related; that is, information about the
might add a safety factor of 10 percent to the expected
resources, media, and time needed for a particular job.
processing time. In our previous example where
Some information is AIS facility-related; for example,
processing time increased from 45 minutes to 1 hour, a
workload, anticipated resource changes, number of
buffer time of 10 percent would only give you an
operators available, the system capabilities and
additional 4.5 minutes of processing time. This would
capacities, and so on. You will need to consider both.
still have been inadequate. However, since all the
Let’s look at the job-related and AIS facility-related
following jobs also have buffer time built into their
areas in a little more depth.
scheduled processing time, the job overrun should not
One of the most apparent pieces of job-related be that critical for meeting the overall schedule of a
information is that every job has resource requirements. shift.
These requirements vary considerably from one job to
the next. One job may require 125K of memory with Another piece of job-related information to
no other peripheral devices except a printer for output. consider applies to multiprogramming environments.
Another job may require four tape drives, two disk The challenge here is to combine as many jobs as
drives, a printer, and only 40K of memory. But a job’s possible so that each resource is used to its maximum.
resources cannot be looked at in these terms alone. Can In a nonmultiprogramming environment, you have no
you recall the terms PREcomputer and POSTcomputer problem in scheduling jobs because you can process
processing? All AIS facility resources must be only one job at a time. However, resources are
considered. You must consider data entry functions, job underutilized, and that’s a fact you must live with. This
setup functions, and output control functions. is a direct result of having all resources dedicated to one
Overloading data entry can delay jobs, causing them to computer, even when they are not needed. On the other
be assembled for computer processing later than hand, multiprogramming allows you to execute several
scheduled. Suppose I/O control is overloaded. What jobs at the same time using as many resources as
difference would it make if jobs were processed and possible. The difficulty of manually preparing such a
completed as scheduled? They would only be delayed schedule for a system that runs in a multiprogramming
because work is backed up or personnel are not environment is in trying to obtain a job mix that makes
available. Overutilization of resources affects service. the best use of most resources without bogging down
Underutilization of resources is expensive and wasteful. the entire computer system.
The balance will be up to you and the efficiency of your
schedule. Figure 1-5 gives you some idea of how main storage
and peripherals can be fully utilized as a result of the
Another piece of job-related information to proper job mix. It shows where the jobs are in memory,
consider is processing time. To set aside a sufficient and what tapes and disk drives are used by each job. It
amount of time for processing, you must know how also shows information about printing and printers. It

1-14
Figure 1-5.—Resource utilization in a multiprogramming environment.

1-15
is difficult to obtain an optimum job mix using manual Now that we have covered job-related information,
scheduling techniques, but it can be done. Most often, we will discuss AIS facility-related areas and how these
the solution to obtaining maximum throughput in a can affect your production schedule.
multiprogramming environment (on a continuous
You may recall that to prepare an effective sched-
24-hour basis) is to use one of the more sophisticated
ule, you must know your AIS facility’s resources: how
automated scheduling packages. These packages have work comes into, flows through, and leaves your facil-
all of the considerations we have been discussing ity; the capabilities and capacities of your system; and
programmed into the software. workload demands on the system. As a scheduler, your
Another piece of job-related information to goal is to match resource capacities (people, places, and
consider is job dependencies. Most AIS facilities things) to workload demands while satisfying user
process both single-program jobs and multiprogram deadlines and priorities. This is often difficult to do,
systems. Examples of multiprogram systems are the especially when resource capacities vary because of
supply and 3-M systems. These systems consist of hardware failures, specific shift requirements,
many programs that are normally executed as separate personnel on leave, and unpredictable user demands.
job steps within a system. Or, the programs may be Your workload can exceed capacity, which has a direct
processed as separate jobs that must be processed in a effect on service. Or, the capacity can exceed the
specific sequence. Therefore, you must know their workload. This leaves AIS resources underutilized. So
proper sequence. It would be foolish to execute a job how do you reach a happy medium? you might ask. You
that prints the output of an updated file that had yet to do it by ensuring that the workload demands put upon
the AIS facility’s resources are balanced as much as
be updated. It should be just as obvious if a job
possible and that the total resources available are kept
abnormally terminates that all jobs following it must be
as close to the maximum capacity as possible.
canceled and rescheduled, allowing sufficient time for
the terminated job to be rerun. Canceling and The effective use of resources has a lot to do with
rescheduling dependent jobs may seem like an easy task how you prepare a schedule. However, other things
to perform. However, in reality, it can become a affect scheduling effectiveness. One thing that disrupts
complex and difficult operation. schedules is the late receipt of input from the users. This
often results in a lot of hectic activity. Data entry, possibly
And finally, we have priorities and deadlines to I/O control, and computer operations have to try to meet
consider. Some scheduling methods place primary original deadline commitments. If they cannot, you, as
importance on priority. Each job is assigned a priority, the scheduler, have to reschedule jobs, while dissatisfied
and the jobs are processed according to the users complain because their jobs are not out on time.
highest-priority job that can be scheduled based on
available resources. Priority scheduling is often used But you say the user has no right to complain? You
in automated scheduling systems. Some scheduling are right. Often, the users do not realize they are the
methods place primary importance on deadlines, cause of the delays. So what can you do? Educate
them! Inform the users of the effects late input submis-
processing jobs according to the earliest deadline or
sions have on the schedule. They sometimes do not
sometimes latest deadline. When you prepare a
realize how long it takes to prepare their input. All jobs
schedule, remember to take into account job
scheduled should have an established input receipt time.
requirements that include the following:
When scheduling, include in your schedule sufficient
l Data entry; buffer time between scheduled receipt time and actual
due time. And last, but not least, report scheduling
l Job setup and output control functions; deviations and their causes to your superiors. In this
l Computer processing time; way, the process can be reviewed and improved.

* Resource requirements; Something else you have to consider in connection


with scheduling effectiveness is your ability to
l Operating environment; reschedule quickly. You must be prepared to make
adjustments to schedules. You will have to contend
l Job dependencies; with power outages, corrective maintenance, deadlines
l Job priorities; and or priority changes, special job requests, and so on. You
must also consider processing delays. Rejected
l Deadlines. transactions may have to be reentered before a priority

1-16
job can continue. An unreadable tape or disk file may Friday; weekly; monthly; quarterly; semiannually; or
have to be recreated. Errors in SCL statements in the annually. Be sure time is included for testing, planned
job stream may have to be corrected. The most serious maintenance, file maintenance, and backup procedures.
delays usually result from abnormally terminated jobs For systems with online users, be sure to provide ample
and hardware failures. Regardless of what the situation capacity and time.
may be, you must be prepared to readjust schedules as
Schedule Review
quickly as possible with a minimum of disruption.
Once you have developed the monthly schedule,
you must ensure that the schedule is adequate and meets
PRODUCTION SCHEDULING the requirements. To do this, you will see that the
The AIS facility is tasked with the responsibility of proposed monthly production schedule is distributed to
providing computer support to the command. This the appropriate subsystem coordinators for their
includes support to medical/dental, supply, review. Before the end of the current month, the
administration, financial, and maintenance. Each of subsystem coordinators are to return the monthly
these areas will have a subsystem coordinator assigned schedule with their concurrences or changes and
to work with you on monthly schedule requirements recommendations back to you for screening. You will
and on processing problems. You will also prepare screen it to ensure they have not overscheduled any day,
daily workload schedules. and that there will be enough time for system backups
and planned maintenance. The screening process
MONTHLY PRODUCTION SCHEDULE should include a review by the production control
DEVELOPMENT coordinator, who looks for any specific input/output
As the AIS manager, you will be responsible for requirements. For example, special forms may have to
developing and distributing a monthly AIS operations be ordered. This must be done early enough to have the
schedule. You have used monthly schedules, but you forms when the job is to be run. After screening the
may never have given much thought as to what it takes changes and recommendations and making any
to develop one. adjustments needed, have a smooth copy of the
schedule prepared and distributed to all subsystem
To develop the monthly schedule, you must know coordinators and the department head before the
the requirements of all the application systems/jobs to beginning of the month to which the schedule applies.
be run during the month. Many production jobs are run Figure 1-6 is an example of part of a monthly production
on a cyclic basis—daily; Monday, Wednesday, and schedule.

Figure 1-6.—Part of a monthly production schedule..

1-17
Effects on Monthly Schedules schedule that you will prepare for the AIS facility. The
format varies among facilities; there is no wrong or right
After the monthly schedule is completed and format. Normally, we break the day into three
approved, there will always be times when it has to be shifts—days, eves, and mids. The day shift is
changed. The subsystem coordinators are responsible responsible for testing. The eve shift is responsible for
for adjusting their schedule and for submitting the production. The mid shift is responsible for finishing
schedule changes to the AIS facility. Some of the things production and doing the nightly saves.
that will cause the schedule to be changed are as You will have to develop the workload schedule by
follows: reviewing the monthly schedule and combining it with
System/program errors. Jobs may abort any newer information. The input/output requirements
because of system or program processing errors. will have to be reviewed, and you will need to be ready
The operator will get an error message or an to make changes to the schedule based on unforeseen
indication on the system console. This may events.
require the operator to reboot the system,
recreate an input file, or rerun a job. The System Input/Output Requirements
operator will annotate the run sheet describing
the problem. The abort code will be the key to Before a job is started, certain input and output
determining what caused the problem. requirements must be met. The I/O control clerk must
review the production workload schedule to see which
Software testing. You will schedule an amount job is to be run. Then the clerk must look at the job run
of time for software testing based on your best folder to make sure that all the input files are available
estimate. No matter how much time you allow and all the necessary output media is readily available.
for software testing, it will never seem to be
enough. Problems seem to arise every time you l Input requirements. If the job requires tapes or
start to test a new software system. These disk files as input, the I/O control clerk will
include the system going down, the system check with the media librarian to see if these files
hanging up, the system entering a loop, or a are ready and available. And, if they are not
syntax error occurring that the programmers ready, when they will be available for the job. In
missed. some cases, it maybe necessary to reschedule a
job while waiting for the input.
New/changed requirements. There will be
times when jobs are added to the schedule to o Output requirements. The job may require
meet special needs. Examples are budget cuts, special forms or multipart paper to be printed.
extra money at the end of the month, The I/O control clerk will check the job run
requisitions, tracking, and assist visit folder to see if the job will require any special
preparation. forms and then check to see that they are
available. The production control coordinator
Job conflicts. A job with a high priority maybe will have looked at the requirements when the
submitted late. monthly schedule was developed to allow
Input files not available. Sometimes there will enough time to order the forms. The job may
be a delay in receiving the input files for a job. produce output tapes or diskettes, requiring the
I/O control clerk to check with the media
Whatever the problem, it will be the production librarian to make sure enough scratch tapes and
control coordinator’s job, with your approval, to adjust blank diskettes are available for the job.
the schedule to accommodate the changes required.
Effects on Workload Schedules
WORKLOAD SCHEDULE DEVELOPMENT
On any given day or shift, almost anything can go
When we talk about workload schedules, we are wrong. A job may abort. A tape may not read. User
referring to how to set up the daily work schedule in an requirements may change. A high-priority job maybe
AIS facility. These are the daily adjustments to the submitted. Personnel may be called off the job to do
monthly production schedule and how they affect something else. This means there will be times when
personnel requirements and staffing. This is an internal you must change the way work is to be completed

1-18
during the day. For example, to stay on schedule during coordinator to be sure proper corrective action was
monthly, quarterly, or yearly processing, production taken.
work will have to be run during the day shift. You may
also have to have additional saves run in association APPLICATION PROGRAM PROCESSING
with monthly, quarterly, or yearly processing. Another ERRORS
example is as you are preparing to load a software
update, you might have special saves run during another To determine the causes of application program
shift. This will ensure that the data is backed up and a errors, you have two areas of concern—hardware and
good copy of the software is available if the update does software. Let’s look at some of the most common
not work properly. You may also have to reschedule causes in each of these areas.
some of the production work.
Anytime the normal work schedule is changed, it Hardware Problems
may affect the online users by slowing the system
response time or causing the system to be unavailable With respect to the hardware, not only each specific
to the users. Care must be taken when the schedule is piece of equipment is a possible cause of a problem, but
to be changed. Try to cause the minimum interruption you also have external environmental concerns.
to online users, and do keep them notified of the
changes. Some of the most frequent hardware problems are:
. Head crash;
. Tape drive damage to a tape; and
PRODUCTION PROCESSING
. Tape read/write errors.
During production processing, the I/O control
clerk, production control coordinator, and operators If tape read/write errors cannot be conected by
will monitor the schedule and the jobs to see that the cleaning the read/write heads, a maintenance technician
work is being accomplished as planned. When should be called. For head crashes and tape drive
problems arise, as they will, you may need to become damage, a maintenance technician should always be
involved. You may be involved in determining the called.
cause of the problem and in working with the user to The most common external environmental
solve the problem. The common causes of problems are problems are:
application program processing errors and system
downtime. l Loss of power;
Users must be informed concerning any production l Voltage spikes; and
problems pertaining to their jobs. When you talk to the
users, you must know which job had the problem, what l Loss of air conditioning.
the problem was, and what, if anything, AIS can door What action should be taken will depend on the
did do to correct the problem. Besides notifying the damage done. The operator may be able to recover the
user of production problems, you will be required to job completely by rebooting and restarting the job. If
notify them of system downtime or nonavailability. the data files have been corrupted, the operator may
Setting up procedures for the operator and the need assistance from the user and/or the media librarian.
production controller to follow will help in solving
problems and in communications with users. Software Problems
For online users, the subsystem coordinators are the
most qualified and highly trained individuals on their Examples of the common software problems are:
particular subsystem and should be assisting users with l Wrong file specified;
processing problems. This does not eliminate the need
for the operators to become knowledgeable in the l Program entered a loop; and
workings of each subsystem, since they normally are
l File not available.
called first when a problem occurs. You will need to
examine any production problems that occur and work The preceding is only a very brief list of possible
with the shift supervisor and/or production control problems. There are too many different causes to list in

1-19
this manual because of the number of different system, it is usually a simple task to produce a new
application software programs being used. schedule. You can usually direct the system with a
command or two to produce a new schedule or a
To correct software-related problems, the operator
simulated schedule. In a manual scheduling system, it
must refer to the job run folder and the program operator
will require some cooperation between the subsystem
manual for the corrective action to take. Your operators
coordinators and AIS operations to replan the schedule
will have predefined steps to follow when researching
to get all the work done in a timely manner.
the cause of the error in the specific program operator’s
manual. The operator manual explains the steps to
follow in connecting the problem and any restart points. HELP-DESK SUPPORT
The job run folder will contain the name and phone
number of the person to contact if the problem cannot
be easily corrected. The help-desk procedures we talk about here are
those relating primarily to online users. To help your
SYSTEM DOWNTIME operators communicate effectively with online users,
you will want to have procedures established for them
The system downtime and nonavailability can be to follow. To develop help-desk procedures, keep
categorized under two different topics—scheduled and several steps in mind. These steps include logging the
unscheduled. problem, researching the problem, fixing the problem,
and analyzing the problem for possible changes to
Scheduled Downtime training and/or documentation. Once the problem has
been fixed, the operator will notify the user that
processing may be continued. You will want to monitor
Scheduled downtime and nonavailability include
the help-desk support for its effectiveness and to
the time for system saves, scheduled maintenance for
the equipment, and scheduled processing preparation. provide feedback to, and receive feedback from, the
users, subsystem coordinators, and managers as well as
You will include scheduled downtime on the monthly
production schedule when the requirement is known in your own staff.
time. You may also add it to a workload schedule when
needed.
Logging the Problem
Unscheduled Downtime
The operator logs a problem to document its
Unscheduled downtime and nonavailability occurrence and to provide the information needed to
include the system being down because of power solve the problem. The information includes the abort
failures, the loss of air conditioning, or rebooting the code, what step in processing the user was doing, what
system. They may also include system degradation system the user was on, and what corrective action was
because apiece of equipment is down, even though the taken. Figure 1-7 is an example of a log sheet that can
system can still be used for production. Since be used for making entries. This log provides a tracking
unscheduled downtime is not something you can plan system for user problems and can be used to show if a
for, you will have to react, replan schedules, and advise pattern is developing. If a pattern develops, this log will
users of changes when their work and/or deadlines will provide the necessary background information needed
be adversely affected. If you are using an automated when the programmer is notified.

Figure 1-7.—Help-desk log.

1-20
Researching the Problem Remember, you are responsible for overseeing the
work accomplished. Provide feedback to the production
In researching the problem, you will need the abort control coordinator, I/O control clerk, and shift super-
code. With the abort code, you can determine the cause visor, as needed, to improve performance and operation.
and what action will need to be taken to get the user
processing again. Talk to the subsystem coordinators; are they
satisfied with the service and the products?
Solving the Problem Look carefully at new applications:
How does the new application affect the
To solve the problem, the operator may have to other applications running concurrently?
reboot the computer, reload a disk file, contact the
programmer, or have the users restart processing. All Can the system efficiently handle the new
these solutions are dependent on what the abort code is. work or do adjustments need to be made to
the job mix and schedules?
Monitoring Help-Desk Support What is the impact of the new application on
online user response time?
You will need to review the help-desk log to
Look carefully at modified applications:
determine if the problems reported can be corrected by
changing or adding a training program. To solve the What is their impact on the system?
problem, you may need to update the program Does it take more or less time to process the
documentation to show the problem and its cause and modified applications?
solution. Be sure the users are receiving the types and
levels of support they need. Listen to them. Ask if they Were any problems encountered?
are satisfied with the help-desk support. What else do Do you need to talk to users about the impact
they need? Listen to your staff, get their ideas, and work of changes on the overall workload or
with them to continually improve support. throughput time?
Look for trends in the production process:
PRODUCTION CONTROL
— Are there times when the system seems
When you hear the term production control, you overloaded and slow?
usually think of the quality of the facility’s output
products. This is not the only area of concern. You — Are jobs backlogged that must be run the
should be looking at all areas of production, particularly next day?
daily operations. — Are there times when the system is almost
idle?
DAILY OPERATIONS Your review of daily operations and asking yourself
these questions will provide valuable input to that
You will want to look at the previous day’s log. process as well as having an impact on how jobs will be
Evaluate what happened. scheduled in the future.
l Were all scheduled jobs run?
OUTPUT REPORTS
l When something went wrong, was the user
notified? Output reports can be broken into two major
l What action was taken to correct the problem? categories—management and customer/user reports.

l Was the job rerun? Management Reports


l Was it necessary to rerun a series of jobs? If so,
was it done? Management reports are usually a consolidation of
information prepared for presentations and briefings.
l Are there corrections/adjustments you need to These reports sometimes require a cover letter or your
make to the workload schedule for today? comments as to the content. You will need to review

1-21
the data contained in the reports to make sure it is valid. HARDWARE AND SOFTWARE
You will also be responsible for ensuring that the reports PROJECTION REPORTS
are complete and presentable. When we say
presentable, we mean readable—all the characters are Along with life-cycle management, you will be
there and can be read. It would be unprofessional to required to prepare reports to project what hardware and
submit these reports in less than perfect condition. software will be needed to meet the command’s future
missions. It is important to keep this in mind as you
Customer/User Reports submit the Abbreviated System Decision Paper
(ASDP), as required by Life Cycle Management Policy
Being involved in a customer-oriented service, you and Approval Requirements for Information System
have overall responsibility for ensuring the quality of Projects, SECNAVINST 5231.1. The following is a
all the products prepared in the AIS facility. The main brief overview of a portion of what is required in the
complaints from users are poor print quality, missing ASDP:
pages, and poor alignment of the printing. Remember,
this checking applies to all reports that leave the AIS 1 . Outline the need for automation as it relates to
facility. Be sure your operators, production specific elements of the command’s mission.
coordinators, and I/O control clerks know the standards Summarize the fictional requirements and
of quality expected. Ensure they are checking the information-dependent tasks.
products during processing and before sending them to 2 . Summarize the selected Federal Information
the customer/users. Processing (FIP) resource solution (functional
requirements of the hardware and software)
AUTOMATED INFORMATION intended to satisfy the information processing
SYSTEM (AIS) REPORTS need. Explain the acquisition strategy,
indicating whether acquisitions will be
You will be expected to prepare a variety of reports. competitive or noncompetitive and from what
It will be your responsibility as a technical AIS manager source the hardware and software may be
to report to upper management on the status, acquired.
performance, equipment inventory, and requirements of
3 . Summarize the projected costs (personnel,
the AIS facility. At a minimum, you should include
information concerning your areas of responsibility hardware, software, security mechanisms, and
including user-related information. The form of these facilities) associated with developing an
reports is the responsibility of each parent command’s operational system.
upper management. We can only provide examples and 4 . Include any additional information that will
general suggestions, not authoritative guidance. facilitate understanding and evaluating the
information system proposal. Training,
Reports should be regular, concise, and graphical,
if possible. The amount of information you report security, privacy, maintenance, mobility, and
site preparation should be addressed.
should not exceed upper-management’s requirements.
“Too much, too often” is a problem common to many You will be expected to have the insight to predict
performance reporting schemes. Information should be the future, since the users will not always know what
easy to understand, but sufficient to support the they will need later.
decision-making process. The reports should compare
the facility’s current level of performance against a set
of predefined performance goals. APPLICATION SOFTWARE
PERFORMANCE REPORTS
Examples of reports needed for management of an
AIS facility include the following:
Management will require reports that show whether
l Hardware and software projection reports; the application software in use is performing as
designed. Here are two items of information to include
l Application software performance reports; in these reports:
l System utilization reports; and
l Average length of time any particular job
l Operating system software reports. remains in the system; and

1-22
How long a priority job (priority 1, 2, and 3) Job run out of sequence. The job-run-out-of-
waits to be run. sequence abort can be caused by the schedule
This information can be used to change your being incomplete, not listing all the jobs, or the
existing standard operating procedures (SOPs) and aid schedule not being turned in on time. Another
in preparing schedules. For example, you might want cause might be an inexperienced operator
to change the maximum time a priority job waits to be running the wrong job.
run. File corrupted. The file-corrupted abort is
normally caused by a system failure. This can
HARDWARE UTILIZATION REPORTS be the result of a disk head crash, the loss of
power, or a power fluctuation.
In addition to the application software performance
reports, you will prepare the reports that cover hardware File not available. The file-not-available abort
utilization. Your hardware utilization reports should is caused when the input file was not received or
include the following types of information: when the job was run out of sequence and the
input file has not been created yet.
The amount of system idle time;
Out of free disk space. The out-of-free disk-
The amount of system setup time; space abort is usually a result of poor
The amount of system production time; housekeeping techniques. For example, files
that are no longer needed have not been
The amount of downtime, not only for the whole removed. Be sure housekeeping tasks are
system but also for each particular piece of performed on a regular basis. This problem also
equipment. (This could help you explain why can be remedied by using some of the
the idle time seems unusually high, if it does.) performance-tuning initiatives discussed later in
This information can help you schedule the work for this chapter.
your system. Keep in mind that under-utilization of These operating system software reports are a good
hardware can result in a loss of equipment and/or source of information for preparing the management
personnel. Equipment may be removed if it is not being reports and aiding in the performance-tuning initiatives.
fully used. If you aren’t doing the amount of work for We also need these reports for background information
the number of people assigned, you may have billets for submitting trouble reports, which are covered later
taken away. in this chapter.

OPERATING SYSTEM SOFTWARE


REPORTS EQUIPMENT INVENTORIES

Operating system software reports are primarily With the ever-increasing need to trim the budget,
used for the AIS facility’s research. They can cover AIS resources have become a critical area. This is
such problems as hardware under-utilization and causing a real need for accurate and complete computer
application software aborts. hardware inventories. We must verify the accuracy of
these inventories annually to ensure we can support our
Hardware under-utilization can be measured by command’s mission.
excessive idle time. This can be caused by no jobs to
be run or no users logged on. Also, constant or When new equipment is acquired, it is to be added
excessive downtime for a specific piece of equipment to the inventory. The inventory will contain such
with no effect on production will be considered as a information as:
waste of hardware.
l Manufacturer;
Some of the most common problems that result in
application software aborts are as follows: l Type of equipment;
Wrong file specified. The wrong-file-specified l Model number;
abort can be caused by transposing the characters
l Serial number;
in the file name or inputting an old file instead
of the new file. Q Minor property number;

1-23
Location; and Add or Change a Disk Drive
custodian. By adding a new disk drive or replacing a disk drive
Normally, a complete inventory is conducted with a larger drive, you will reduce the problems you
annually, with spot inventories conducted periodically may have with disk space. Remember, if you add or
throughout the year. All of this will be controlled by change a disk drive, you must modify the system setup
your local SOP. so the system will recognize the new drive.

SOFTWARE
PERFORMANCE-TUNING
INITIATIVES Let’s look at some operating system changes
available. Remember, anytime you are preparing to
The reports we have covered are good sources for make changes to your operating system, you must
determining what performance-tuning techniques to consult the system operator manual first. It will show
implement. Now let’s look at some performance-
you what can and cannot be changed on your particular
tuning choices available, both hardware and software. system. The operating system changes you can make
Be sure they are authorized by your command before are as follows:
implementing them.
. Reconfigure the system;
HARDWARE
Three possible hardware choices are as follows: l Change buffer sizes;

l Increase computer memory; l Change memory addresses.

l Reduce file fragmentation; and Reconfigure the System


l Add or change a disk drive. When we reconfigure the system, we can move the
Increase Computer Memory device drivers into extended memory. We can move
disk files from a smaller capacity disk drive to a larger
To increase a computer system’s memory, we can capacity drive; this will also help with fragmentation.
add memory chips or memory boards. This will allow
us to run larger, more complex programs on the system. Change Buffer Sizes
We can also create cache memory, which is used with
the central processor to improve execution speed and By changing buffer sizes, we increase the
enhance central processor performance. This is input/output activity of the system, resulting in the job
accomplished by reducing the access time required to finishing faster. This will also help reduce the chances
repeatedly fetch frequently used information stored in that the system will lock up.
main memory. For average program mixes, cache
memory yields a 50-percent increase in processing Change Memory Addresses
speeds. The cache memory is a random-access memory
(RAM) buffer that provides high-speed storage By changing memory addresses, you can tailor
capabilities from main memory and makes this data extended and expanded memory to the system’s needs.
available to the central processor with a private central This results in freeing memory for the execution of
processor/cache interface. production jobs.
Reduce File Fragmentation
TROUBLE REPORTS AND
File fragmentation occurs when you delete a file,
TECHNICAL ASSISTS
leaving, basically, a hole in the information on the hard
disk, or when you add information to an existing file You will be responsible for submitting trouble
when there is no contiguous space left next to the file. reports on software and hardware problems.
To correct fragmentation, you can make a backup, Remember to follow the instruction from the command
reformat the hard disk, and restore your files. You can receiving the trouble report. In most cases, this will be
also run a software program referred to as a the Navy Maintenance and Supply Systems Office
defragmenter to reorganize the files so the data in each (NAVMASSO). As shown in figure 1-8, the trouble
file is contiguous. report contains a lot of information. Items 13, 14, and

1-24
Figure 1-8.—Typical trouble report form.

1-25
15 are reserved for the receiving command’s use. Most A file has become corrupted and no good save
of the items are self-explanatory, but let’s cover two that tapes are available to rebuild the file.
aren’t as obvious.
The system keeps hitting 100 percent of capacity
Item number 3 asks for the priority assigned. and locks up.
Critical means that you cannot work around the
problem to continue operating. Urgent means that you The system keeps dropping I/O channels.
can work around the problem, but a resolution is If the hardware problem can be traced to a specific
required immediately. Routine means the correction is piece of equipment, notify the maintenance technicians
needed, but you can work around the problem and live to handle the problem.
with it until it is fixed.
When you start to fill in item 11, remember to enter TECHNICAL ASSISTS
a complete, detailed description of the problem you are
experiencing. Include the screen or menu number, if After submitting a trouble report, you will need to
applicable, the option number, if applicable, and any coordinate with the central design activity to see if the
error message received. problem can be taken care of over the phone or if it will
require a technical assist. If it requires a technical assist,
Various procedures will have to be followed for there may be a requirement to arrange for
personal computers (PCs), depending on the problem. transportation, entry to the facility, and/or escorts. You
For commercial software problems, inform the software will need to schedule time for the technician to use the
manufacturer of the problem giving as much system and notify the users that the system is
information as possible. Normanlly, the manufacturer unavailable.
will tell you how to correct the problem over the phone,
or if the problem will be corrected with the release of
the next version of the program. For hardware, it is OPERATIONAL GUIDELINES
usually covered by either a maintenance contract or When preparing the operational guidelines for your
manufacturer’s warranty. With a maintenance contract, facility, you should consider four major areas as
you will follow the instructions for repair as outlined in follows:
the contract. The owner’s manual of equipment
covered by a manufacturer’s warranty will have a phone . Future growth capabilities;
number to contact a repair technician.
o Backup operations;
SOFTWARE TROUBLE REPORTS l Contingency plans and disaster recoveries; and
l Emergency responses.
Normally, the trouble reports for the software are
submitted by that subsystem’s coordinator, after To develop these and other operational guidelines,
notifying the AIS facility. you will need to review the current SOPS, command’s
mission, run folders, and monthly production
Some of the most common trouble reports for
schedules. While reviewing these, you are looking to
software include the following:
make sure that the current and/or proposed operational
l Monthly files are not being cleared at the guidelines will allow the AIS facility to meet the
beginning of the new month. command’s mission.
l Report titles are wrong. FUTURE GROWTH CAPABILITIES
. Bad data was entered into a file and cannot be
removed through normal procedures. Projecting future growth capabilities is often the
most overlooked operational guideline. Projecting
HARDWARE TROUBLE REPORTS future growth should have been done when the system
was designed, but it can be done at any time it is needed.
It is the AIS facility’s responsibility to submit the Users are one of your last sources of information
trouble reports on system hardware problems. The when it comes time to start projecting. They know how
common reasons for hardware trouble reports include their workload has increased in the past and can forecast
the following: what it will be in the future. With this information, and

1-26
by knowing the limitations of the existing system, you an inventory of the parts so if the parts are not on board,
can project what additional equipment will be needed they can be ordered.
to handle the future workload of the command.
EMERGENCY RESPONSES
This may include additional network drops and
terminals located throughout the command, spare parts,
backup media, and personnel. The most important The last major area we are going to look at is
thing to remember when projecting the future growth emergency response. When a problem occurs, such as
capabilities is to take your time when doing the a job aborts or the system goes down, the steps you and
research. You don’t want to come up short when your AIS staff must follow are:
requesting the additional materials that you expect to 1. Log the problem. A good rule is to log
need later on. everything; this can save time and help to
identify problems early.
BACKUP OPERATIONS
2. Notify management, users, and the
maintenance technician. By notifying
Backup operations fall into two categories: normal
management, you provide them the information
and special saves.
they need to answer questions and make
Normal saves. Normal saves are the ones worked decisions concerning the system. If the users
into the monthly production schedules. These saves are are kept informed, they won’t be as apt to keep
normally done every day or night and are the most calling the operators when the operators are
important recovery tool available to you. busy trying to get the system back up and
running. In notifying the maintenance
Special saves. Special saves are the ones that need
technicians, whether hardware or software, you
to be done before and after the implementation of a
need to tell them what you were doing, exactly
software upgrade and during monthly and yearly
what happened, and what you have tried to do
production runs. The saves that are done in association
to fix the problem.
with a software upgrade are not covered on your
production schedule, since upgrades are not released on 3. Adjust staffing when possible. Adjusting
any published schedule. staffing works in two ways. If the system is
going to be down for an extended period of time,
CONTINGENCY PLANS AND DISASTER it is a waste to keep all the operators there with
RECOVERIES nothing to do. Likewise, there are times when
additional expertise will have to be brought in
The most important part of disaster recovery is to help get the system up and running. Either
having a contingency plan and current backup files. way, this will be your decision as the AIS facility
The AIS facility’s contingency plan covers what is manager. You will have to analyze the situation
required to get the facility back online as soon as and decide what skills are needed to solve a
possible. Your contingency plan should include problem, who has the skills, who is available,
emergency response, backup operations, and recovery how many personnel are needed, and so on.
plans. To have current backups, we must ensure that
normal saves are done as scheduled. The saves can be
EMERGENCY URGENT CHANGE
categorized as either whole system or data file saves.
REQUESTS
The AIS facility’s resources, schedule, and instructions
will be the governing factors as to which category of Occasionally, the best-laid plans will have to be
saves and the frequency with which the saves will be changed. One of these times is when an emergency
done. For further guidance, as to the minimum urgent change request (priority job) comes in.
frequency and the category of saves, refer to the local Normally, there is a good reason for each emergency
type commander’s (TYCOM) instructions. urgent change request. These change requests cover
both application and system programs.
Another part of the recovery process is making sure
that replacement parts are available. There are For application programs, some reasons for urgent
constraints as to the number of parts maintained change requests are a special report needed for a
onboard your activity. Before a major deployment (or meeting, last-minute corrections before starting a
periodically for shore activities), it is important to take monthly or yearly job, and a deadline that is moved to

1-27
an earlier time. Invariably, a priority job comes in that in any other business, customers must be treated with
must be run just when the shift is almost over. Being a courtesy, tact, and diplomacy. It is the I/O clerk’s job
customer-oriented service, it is our job to get the to receive jobs from users; maintain logs, prepare jobs
product out. to be run on the computer; make sure everything is
With system programs, three common reasons for ready on time; communicate with users on job
urgent change requests are special saves, changes to the requirements and problems; and check, prepare, and
operating system, and system testing by NAVMASSO. distribute output products.
Each of the I/O control clerk’s tasks may involve
SUMMARY
customer liaison. Maintaining good customer relations
Scheduling is the interface between the user, I/O is as important as processing the customer’s jobs.
control, and computer operations. The scheduler’s job
is to follow the AIS facility’s scheduling procedures to We talked about different types of reports,
develop daily, weekly, and/or monthly production performance-tuning initiatives, application software
schedules. libraries, trouble reports and technical assists,
You will be depended on to effectively and operational guidelines, and emergency change requests.
efficiently schedule the computer and other related This is, by no means, a complete list. As you continue
resources of your AIS facility to meet user processing in your career, you will be adding new skills and more
requirements. responsibilities to these. This chapter gives you the
Input/output control is an important AIS function. foundation needed to build on, with the skills you have
It is the point of contact for AIS users (customers). Like and those you will learn.

1-28
CHAPTER 2

COMMUNICATIONS ADMINISTRATION

LEARNING OBJECTIVES

Upon completing this chapter, you should be able to do the following:

l Identify the background and mission of the departments within the National
Communications System.

l Identify the mission and policy of naval communications.

l Identify the functions of the Naval Telecommunications System and the


roles of communications management personnel.

l Identify the elements and responsibilities related to standard message


processing.

l Identify the procedures for minimize consideration and processing of


messages.

l Identify the procedures used for general administration and handling of


communication files.

l Identify the procedures used in communications planning.

l Identify the procedures for conducting watch-to-watch inventories and


updating the NWPs.

l Identify the role of the naval warfare publications library (NWPL)


including NWPL administration and maintenance.

“Naval communications” is the term assigned to the commands and aboard ship. We will also discuss the
entire communications effort of the Department of the various publications used in naval communications.
Navy, both afloat and ashore. The naval These publications provide standard guidance for all
communications complex is the total of all phases of naval communications, such as basic
Navy-operated communications installations and communications doctrines, message preparation, and
services. The communications complex provides, proper circuit discipline.
operates, and maintains tactical communications,
including fleet broadcast, ship to shore, and air to NATIONAL COMMUNICATIONS
ground. The operating forces and all commands and SYSTEM
activities ashore depend on this complex for reliable
transmission and receipt of information. The National Communications System (NCS) was
established to achieve a cohesive effort in the event of
In this chapter, we will give you a broad overview war. The NCS provides a unified governmental system
of how naval communications is organized at shore that links together the communications facilities and

2-1
components of the various Federal agencies. Naval communications must always be ready to
Essentially, all branches of the Federal Government, shift to the requirements of wartime. Our peacetime
both civilian and military, are part of the NCS. Each organization and training must be capable of making
department and branch, however, has its individual this shift rapidly and with a minimum of changes.
organization, methods, and procedures. Without this capability, our forces would be severely
handicapped, and vital defense information would
DEFENSE COMMUNICATIONS never reach its destination. For this reason, we have a
SYSTEM well-defined communications structure, with
The Defense Communications System (DCS) responsibilities assigned to each element, from the
exists to support the three military departments (Navy, Chief of Naval Operations (CNO) down to individual
Army, Air Force) and other Department of Defense fleet units.
activities. The circuits that make up the DCS are
government-owned or leased and are point-to-point
circuits that are long-haul and worldwide. The DCS POLICY OF NAVAL
combines many of the communication elements of the COMMUNICATIONS
three military forces into a single communications
system. The policy of naval communications is to:
Although the Naval Telecommunications System l Establish and maintain effective communica-
(NTS) and the DCS are two different communications
tions within the Department of the Navy;
systems (fleet and ashore, respectively), they are
constantly intermixed. For example, as often happens, l Encourage at all levels of command an effort to
a naval message originated aboard ship and destined for improve techniques, procedures, and efficiency;
a shore activity leaves the ship over the NTS, but final
routing is accomplished over the DCS circuits. The l Cooperate with the military services, Defense
interface between the NTS and DCS is always provided Information Systems Agency (DISA), and other
by the shore communications facility. departments and agencies of the U.S.
Government and allied nations;
DEFENSE INFORMATION SYSTEMS l Encourage development of the amateur and
AGENCY commercial communications activities of the
The Defense Information Systems Agency (DISA) United States to enhance their military value and
gives operational direction to the DCS. With reference to safeguard the interests of the nation; and
to the DCS, the DISA must ensure that the system is l Promote the safety of life at sea and in the air by
operated and improved so as to meet the continual
long-haul, point-to-point requirements that arise. maintaining communications facilities with the
U.S. Merchant Marine, aircraft over sea, and
The DISA functions under the management of a appropriate U.S. and foreign communication
director who is appointed by the Secretary of Defense.
stations.
The director is a flag-rank officer and is responsible for
coordinating the combined communications elements
of the three military departments.
NAVAL TELECOMMUNICATIONS
SYSTEM
MISSION OF NAVAL
COMMUNICATIONS The word “telecommunications” includes all types
of information systems in which electric or
The mission of naval communications is to provide
electromagnetic signals are used to transmit
and maintain reliable, secure, and rapid
communications, based on war requirements, to meet information between or among points. The Naval
the needs of naval operating forces. Naval Telecommunications System (NTS) is comprised of all
communications must also satisfy the requirements of the end terminal processing equipment, transmission,
the Defense Communications System (DCS) and the switching, cryptographic, and control devices used to
National Communications System (NCS). transmit operational information in the Navy.

2-2
The NTS provides electrical and optical l Commander, Naval Computer and Telecom-
communications from the commander in chief and munications Command (COMNAVCOMTEL-
naval commanders down to all naval forces under its COM);
command. You should remember that the NTS is used l Naval Computer and Telecommunications Area
primarily to exercise command and control over the Master Stations (NCTAMSs);
naval operating forces; not the shore establishment.
l Naval Computer and Telecommunications
Most shore establishments are served through the
Defense Communications System (DCS). Naturally, Stations (NAVCOMTELSTAs, sometimes
referred to as NCTSs);
there are overlapping portions of each system where
necessary. l Naval Communications Detachments
(NAVCOMTEL DETs, also abbreviated
Operational direction and management control of NCTDs);
the assigned elements of the NTS are the responsibility
l Naval Data Automation Commands (NAV-
of the Commander, Naval Computer and
DACs);
Telecommunications Command (COMNAVCOM-
TELCOM). l Naval Security Group Departments (NAV-
SECGRUDEPTs) of NAVCOMTELSTAs; and
In naval communications, COMNAVCOM-
TELCOM determines the responsibilities of each of the l Navy-Marine Corps Military Affiliate Radio
various commanders, whether a fleet commander or the System (MARS).
commanding officer of a ship. For example, direction
and control of all naval fleet broadcasts, ship shore, COMMANDER, NAVAL COMPUTER
air-ground, and other direct fleet-support AND TELECOMMUNICATIONS
telecommunications are assigned to the fleet COMMAND
commanders in chief. That is to say, all Pacific Fleet
naval broadcasts are under the operational direction and With the merging of Automated Information
control of the Commander in Chief, Pacific Fleet Systems (AIS) and telecommunications, the mission
(CINCPACFLT). The same applies to Atlantic Fleet and responsibilities of COMNAVCONTELCOM have
greatly increased. You will see COMNAVCOM-
navak broadcasts. These broadcasts are under the
TELCOM continue to change and grow as
operational direction and control of the Commander in telecommunications technology advances into the 21st
Chief, Atlantic Fleet (CINCLANTFLT). century.
Fleet commanders in chief are responsible for the There have already been changes in the makeup of
adequacy of communications to satisfy the needs of the COMNAVCOMTELCOM claimancy as
their respective fleets. They, in turn, assign broad communications stations have merged with Naval
communications responsibilities in the form of fleet Regional Data Automated Centers (NARDACs).
operation orders (OPORDs). OPORDs are to be Those communications stations that do not merge with
complied with at every level down through individual an AIS activity will become Naval Computer and
commanding officers of operating ships. Telecommunications Stations (NCTSs) or Naval
Computer and Telecommunications Detachments
The commanding officers use only those portions (NCTDs).
of the fleet commander’s communications OPORD that
Although not all-inclusive, COMNAVCOMTEL-
affect them. In this simple, yet direct, manner, the NTS COM’s responsibilities include the following:
is administered at every operational level in the fleet,
according to that ship’s mission and communication l Integrates and consolidates Navy common-user
needs. We will talk more about OPORDs later in this ashore communications and information
chapter. resources (IR) (including personnel) into the
NAVCOMTELCOM claimancy, and
The Naval Telecommunications Command is implements Navy IR management policy within
composed of the following elements: the claimancy;

2-3
Advises the Director, Naval Space and Warfare The world is divided into four Naval
Command, of validated communications Communications Areas (NAVCOMMAREAs):
requirements that may demand development or Western Pacific (WESTPAC), Eastern Pacific
modification of satellite communications (EASTPAC), Atlantic (LANT), and Mediterranean
systems; (MED) (figure 2-l). All communications activities
within any of these geographical areas are organized to
Formulates policy on, and exercises operate under the operational control of a NCTAMS.
authoritative control over, the Navy These master stations are the major sites in a
Communications Security Material System COMMAREA and are the primary keying stations for
(CMS), and reviews or initiates action in cases that area. They are the entry points for Navy Tactical
of loss or compromise of CMS material; Satellite Systems and also operate and maintain one or
Serves as Department of the Navy (DON) more Defense Satellite Communications System
manager of leased portions of Navy dedicated (DSCS) terminals.
and common-user information transmission The NCTAMSs have, as part of their organization,
systems; a fleet telecommunications operations center (FTOC).
Manages the Navy and Marine Corps Military This is the focal Point for fleet communications support.
Affiliate Radio System (MARS) and coordinates To support the operating forces of each fleet
Navy participation in amateur radio matters; commander in chief (FLTCINC), the authority to
Establishes, implements, and maintains the Fleet exercise operational direction over all NAVTELCOMs
Operational Telecommunications Program; is delegated on an area basis to the commanding offiers
of the master stations. Operational direction is
Manages International Maritime Satellite decentralized down to the commanding officers of the
(INMARSAT) communications ground NCTAMSs. These commanding officers report to and
interfaces to naval communications for the DON are immediately responsible to the FLTCINC.
and handles any other commercial COMNAVCOMTELCOM, however, exercises overall
telecommunications authorized by law or treaty; operational direction to assure integration of the
worldwide system, taking into consideration the
Operates and maintains the NCTSs, NARDACs, requirements and priorities of other FLTCINCs and/or
and assigned elements of the Defense higher authority. You should refer to the appropriate
Communications System (DCS); Fleet Operational Telecommunications Program
Serves as technical advisor to CNO for (FOTP) manual for futher information.
communications/enlisted ratings (RM, ET, and Within the various NAVCOMMAREAs are
assists in career development and training for alternate NCTAMSs. They coordinate control of
these ratings; and communications under the direction of the primary
Serves as central design agency for NCTAMSs.
communications in the DON, performs
life-cycle management on Navy Standard NAVAL COMPUTER AND
Communications Software components. TELECOMMUNICATIONS
STATION
NAVAL COMPUTER AND
TELECOMMUNICATIONS AREA A Naval Computer and telecommunications
MASTER STATIONS (NCTAMSs) Station (NAVCOMTELSTA) is a communications
station with the primary responsibility for
As we mentioned earlier, there have been changes communications in a large specific area. This
in the claimancy of NAVCOMTELCOM. As a result, responsibility includes all communications facilities
each of the former NAVCAMS has been redesignated and equipment required to provide essential fleet
as a NCTAMS, and has merged with a NARDAC. The support and fixed communications services. For
four NCTAMSs are NCTAMS EASTPAC, Honolulu, example, NAVCOMTELSTA, Diego Garcia, serves a
Hawaii; NCTAMS LANT, Norfolk, Virginia; large geographical area of the Pacific and Indian oceans.
NCTAMS WESTPAC, Guam; and NCTAMS MED, It also includes facilities and equipments necessary to
Naples, Italy. interface with all other NAVCOMTELSTAs or

2-4
Figure 2-1.—Naval communications areas.

communications detachments on all naval NAVAL SECURITY GROUP


communications matters. It also provides Naval DEPARTMENTS
Industrial Fund (NIF) AIS services to Navy customers.
The Naval Security Group Departments
NAVAL COMPUTER AND (NAVSECGRUDEPTs) come under the authority of
TELECOMMUNICATIONS Commander, Naval Security Group Command
DETACHMENT (COMNAVSECGRU), and are responsible for the
cryptologic and related functions of the Navy.
NAVSECGRUDEPTs maybe part of a NCTAMS or a
A Naval Computer and Telecommunications NAVCOMTELSTA. As such, COMNAVSECGRU
Detachment (NAVCOMTELDET) is a small exercises technical control over the cryptologic
telecommunications facility that is assigned a limited, operations, whereas COMNAVCOMTELCOM has
or specialized, mission and has a limited number of overall responsibility for the management and
personnel and facilities. operating efficiency of the NAVSECGRUDEPTS.

MILITARY AFFILIATE RADIO


NAVAL DATA AUTOMATION FACILITY SYSTEM (MARS)

A Naval Data Automation Facility (NAVDAF) A function of the Military Affiliate Radio System
comes under the control of an NCTS or a NARDAC. (MARS) is to provide auxiliary communications to
NAVDAFs provide AIS services in areas where no military, civil, and/or disaster officials during periods
NARDACs are located. The workload of a NAVDAF of emergency. The Navy encourages amateur radio
is normally less than that of a NARDAC. operators to affiliate with MARS. Many of the

2-5
operators have earned their amateur radio licenses from Establishing Standards
the Federal Communications Commission.
Standards of performance must be established to
The amateur radio operators, using their amateur determine the effectiveness of operations and service
stations on Navy radio frequencies, receive training in provided against customer requirements and system
naval communications procedures and practices. capability. Standards must be established for internal
Besides assisting in emergency situations, MARS functions as well as for overall system performance.
operators also create interest and furnish a means of After performance standards are established, the control
training members in naval communications. You can elements and manner of control can be determined.
find detailed information about the MARS program in
U.S. Navy-Marine Corps Military Affiliate Radio It is most important that performance standards be
System (MARS) Communications Instructions, NTP 8. established in the general areas of reliability, speed,
security and economy. These areas can be broken
down into standards for internal operation, equipment,
NAVAL COMMUNICATIONS personnel, maintenance, supply, and so forth.
MANAGEMENT
Realistic standards of performance must be
As radiomen advance, they can expect to assume established. This allows maximum use of resources
additional authority and responsibility. A first class or without overcommitment. The standards must be
chief will most likely be placed in charge as a watch compatible with command requirements and within
supervisor, leading petty officer or chief, or even as a resource capability. The standards must also be flexible
division officer. These are only a few of the many enough to allow for changing operating conditions.
leadership positions to which they might be assigned. Skill levels and manning levels change constantly.
In summary, eventually, a career Radioman is going to Equipment status and configurations are never stable.
be a manager. Operating conditions and commitments change from
day to day. Therefore, each communications facility
The Navy has conducted extensive studies to manager must establish flexible standards to
pinpoint problems in the area of communications accommodate changing requirements and situations.
organization and management. These were done to
allow communications personnel to take corrective Management Responsibilities
action on the problem areas. Use of sound managerial Mid-management radiomen must realize the need
principles helps us accomplish our mission. for progressively improving standards. The following
All levels of management require an evaluation points may assist mid-management radiomen in
standard. Managers are then able to properly evaluate improving standards within their division:
specific communication systems or components. Such
an evaluation provides a basis for comparison of l Overcoming Resistance— The practice of
equipment, personnel, and even complete facilities. relying on past performance as a basis for
This evaluation forms the basis for establishing establishing standards is often sound. With an
additional standards and guidelines. A continuing organized effort, however, conditions can be
evaluation requires data collection via a system of changed to improve performance. If the
feedback reports from all managerial levels. personnel responsible for better performances
participate in the organized effort, the problem
of resistance to higher standards is often
EVALUATING PERFORMANCE eliminated.
l Improving Conditions— Owing to the rapid
Effectiveness of naval communications is the first
consideration in the management of any growth and change in the character of
communications facility. The overall capability must communications systems, considerable
be viewed in relation to each functional unit. Standards managerial effort must be devoted to improving
of performance can be established and control elements the effectiveness of operations and service. The
determined. An evaluation of the entire system must be essential approach to this type of problem can be
completed by the highest level of command. Each summarized in a sequence of three stages:
operational unit must be scrutinized by the chief or first — Discovery of the problems; that is, what part
class in charge. of an existing condition needs improving;

2-6
Diagnosis to determine what changes are l WHEN the work is to be performed;
needed to bring about the needed
improvement; and l HOW the work is to be accomplished;

Remedial action; that is, implementing the l WHERE the work is to be performed; and
necessary changes. l WHO is responsible for completing the work.
Responsibility— Responsibilities must be PERSONNEL MANAGEMENT
established in accordance with the
organizational structure and be clearly defined. Good managerial traits and supervisory abilities are
prerequisites for the first class or chief petty officer who
Organizational Considerations— Leading is required to function as a front line supervisor and
radiomen must realize that the existing manager. The RM1 or RMC will normally be the RM
organizational structure may be a contributing supervisor and will have many managerial and
factor to poor personnel performance. In such supervisory responsibilities added to those present at
instances, recommendations to realign the the junior petty officer level.
organizational structure must be seriously
considered. Supervision involves working with people, and a
major responsibility of a supervisor is production. A
Conservation of Personnel Resources— The good supervisor knows how to get a job done by getting
communications facilities manager must be the most out of personnel. However, the desire to attain
constantly aware of the need to conserve an acceptable production level must not be at the
personnel resources at all levels. Conservation expense of personnel assets. People have the right to
of personnel resources is accomplished by be treated as individuals and respected as such. If
evaluating personnel requirements properly and treated in any other reamer, no amount of pressure will
by using available personnel effectively through create a permanent increase in production levels. While
proper training and assignment. you want to achieve a high level of production, you also
want your personnel to produce willingly and be
GENERAL ADMINISTRATION interested in their work.
OFFICE MANAGEMENT
A communications facility should function
effectively and efficiently. This is normally the result The physical location of a communications office
of the senior supervisor’s ability to set up and manage is normally predetermined by higher authority.
the organization. Furthermore, the space allotted to the various sections
is usually determined by competent engineers based on
Good supervisors retain open minds. They available space. After discussing the matter with the
recognize the need for change and implement those senior petty officers in the division, the division officer
changes as required. They acquire a thorough or division chief usually determines the physical
knowledge of the functions performed by their area of location of furniture and equipment.
responsibility and understand how it relates to the
When the office layout is being planned, primary
overall mission. Only then can they plan a rational
consideration must be given to proper flow of paper and
approach to correct a problem or make positive
work, the physical location of workspaces, and the
changes.
internal communications of the division.
Although the current structure and methods may Secondary factors to be considered are the number
meet the objectives of the division, a periodic review of personnel to be accommodated, safety standards,
should still be conducted. The goal is to develop more security of classified material, structural location of
efficient office methods, techniques, and routines. electrical outlets, and physical locations of bulkheads
Procurement of state-of-the-art equipment may require and passageways.
a complete evaluation and reorganization of divisional
workflow and workspace layout. To plan properly, the Paper and Work Flow
supervisor must know the following information: Good paper flow is the smooth movement of
WHAT work is to be done; paperwork from one desk or individual to another. As
much as possible, the paperwork should flow in one
WHY the work is to be performed; direction through various sections with no reversals or

2-7
criss-crossing. Figure 2-2 shows the ideal l New equipment is ordered or is to be installed;
communications space layout with sequential or
workflow. Placing related tasks in adjacent spaces
reduces distance and increases efficiency of operations. . There is a change in allotted space.
This ultimately increases the work accomplished. Before actually moving personnel or equipment, it is a
Workflow affects the placement of sections within good idea to draw a scale model of the anticipated
the division and the location of desks, files, and other layout. You can then evaluate the idea and judge its
equipment. Changes should only be made to improve effectiveness.
workflow. Deviations from approved methods can In evaluating an office layout, you should consider
result in loss of time and motion and cause delays in the following factors:
completion of work assignments.
Office congestion;

Physical Factors Personnel supervision;


Use of space;
The physical layout of workspaces should be Volume of work versus people; and
reviewed when:
Office appearance.
There is evidence of improper workflow;
Internal Communications
The number of personnel or office procedures
change;
A large portion of communications office work
The volume of work increases or decreases; consists of receiving, distributing, and filing
communications, reports, instructions, and records.
Another major portion of the work is the disposition of
correspondence. When handling correspondence, the
supervisor must establish standard procedures. Once
decided, these procedures should be conveyed both
vertically and horizontally. Vertical communications
are routed up and down the chain of command.
Horizontal communications are routed to other
divisions and departments.
Vertical communications can be either formal or
informal. Formal information usually consists of office
procedures, watches, schedules, job instructions, and
written orders. Formal communications are handled to
ensure wide dissemination and accuracy of information,
to avoid distortions, and to provide a permanent record.
Informal information is usually passed orally and
provides guidance and instructions on work
assignments.
Horizontal communications can be either formal or
informal. Personnel holding parallel positions (two
watch supervisors for instance) can sometimes resolve
problems through informal communications without
involving higher authority. On the other hand, formal
communications must be used when the subject
requires approval through the chain of command.
Formal communications may be in the form of station
directives, administrative procedures, or station watch
Figure 2-2.—Ideal communications space layout. bills.

2-8
COMMAND COMMUNICATIONS officer is embarked aboard a ship, making that vessel
ORGANIZATION the flagship. In such cases, the embarked commander
assumes control of flagship communications. The
The structure of the communications organization commanding officer is still responsible for the proper
of a command depends on command size and whether handling of message traffic within the ship.
the command is ship- or shore-based. Not all Navy
ships have a communications department. Basic Communications Officer
Operational Communications Doctrine (U), NWP 4
(NWP 6-01), designates the types of ship that should
have a communications department. In ships that are The communications officer (COMM officer) is
not so designated, communications personnel are responsible for the organization, supervision, and
assigned to the operations department, but the coordination of the command’s exterior
communications functions are the same as those for communications. At shore stations, the COMM officer
ships with a communications department. Future is the department head. Aboard ship, the COMM
organization may structure communication and officer may be assigned as a department head or may be
automated systems into a combined information assigned under the operations officer. Aboard ship, the
systems department. COMM officer is also responsible for the management
of related internal communications systems.
Senior enlisted personnel may be assigned
communications duties normally assigned to officers if
there are insufficient officers to fill communications Radio Officer
billets. Figure 2-3 shows a normal shipboard
communications organization. Key billets are further The radio officer is in charge of the
discussed in this chapter. communications center. This officer is responsible for
organizing and supervising assigned personnel to
Commanding Officer ensure accurate, secure, and rapid communications.
The radio officer is responsible to the communications
The commanding officer of a ship or a shore officer for:
command is responsible for the communications of that
command. The only exception to this is when a flag @ Preparing the command’s communications plan;

Figure 2-3.—Communications organization.

2-9
Monitoring the proper allocation of equipment COMMUNICATIONS WATCH OFFICER
for operations; (CWO).— The CWO is responsible to the
communications officer for:
Preparing and maintaining the communications
watch, quarter, and station bill; Ensuring that communications capabilities are
accomplished in accordance with the
Conducting the communications training command’s mission;
program; and
Incoming and outgoing traffic, ensuring that all
Preparing standard operating procedures (SOPs) messages, transmitted or received, are handled
for the communications center. rapidly and accurately in accordance with
On small ships, the communications officer and the existing regulations; and
radio officer maybe the same person. Ensuring compliance with existing
communications directives and monitoring the
Communications Security Material System performance of on-watch personnel and spaces.
(CMS) Custodian Fleet Communications (U), NTP 4, contains a detailed
listing of the duties of the CWO.
The CMS custodian is responsible to the SENIOR WATCH SUPERVISOR (SWS).—
commanding officer for: When assigned, the SWS is the senior enlisted person
on watch in communications spaces and is responsible
Managing the CMS account in accordance with to the CWO for:
the instructions contained in the
The proper handling of all communications;
Communications Security Material System
(CMS) Policy and Procedures Manual, CMS 1; Notifying the CWO on all matters of an urgent
Advising the commanding officer on matters or unusual nature;
concerning the physical security and handling of Examining operational logs and monitoring
CMS publications and materials; equipment alignment and operation; and
Stowage of CMS publications and materials, as Directing action necessary to prevent or
well as the drawing, correcting, and authorized overcome message backlogs.
destruction; and
In addition to the duties listed in NTP 4, the SWS is also
Submitting all reports concerning the responsible for any other duties as maybe assigned by
accountability and issuance of CMS the CWO.
publications and materials.
COMMUNICATIONS CENTER SUPER-
VISOR.— The communications center supervisor is
Watch Section Personnel responsible to the CWO and SWS for:
Supervising message processing and circuit
The functions of the operational organization of a operations;
communications command consist of: Directly supervising all radiomen on watch in
the message processing center; and
Message processing, circuit operation, technical
control, data processing, and operation; and Notifying the CWO and SWS on all matters of
an unusual or urgent nature.
Control of voice circuits and the operation of
satellite circuits, where installed. TECHNICAL CONTROL SUPERVISOR.—
The technical control (“tech control”) supervisor is
The combined efforts of the operational responsible to the CWO for:
organization are performed in various spaces
simultaneously. In the next section, we will discuss the Establishing and maintaining required circuits,
duties and responsibilities of some of the key billets and initiating action to restore or bypass failed
within this organization. equipment;

2-10
Ensuring that quality monitoring and control When a flag officer is embarked, the ship’s
procedures are used on all systems; communications officer, communications watch
officers, and enlisted communications personnel may
Maintaining the status board showing pertinent be ordered to additional duty in the flag
information on all equipment, nets, and circuits communications division. These personnel are directly
in use; and responsible to the flag communications officer for the
Directly supervising all personnel assigned to operation of the flag communications functions. The
technical control and transmitter room spaces. ship’s communications officer reports to the flag
communications officer and is the contact officer for
matters pertaining to the handling of ship and staff
Command Ship Communications message traffic. Figure 2-4 illustrates a standard watch
organization aboard a ship with a flag embarked.
The term “flagship” is sometimes used instead of By now, you should have a basic idea of how naval
“command ship” but means the same thing. Either term communications is organized at shore commands and
means that a group, squadron, or division commander aboard ship. Remember that there are variations in all
is embarked on board, thereby making that vessel the organizations. The command size, scope of operations,
flagship, or command ship. We mentioned earlier that, and personnel assets are just a few of the factors that
in flagships, the embarked commander assumes affect the structure of the communications organization.
responsibility for communications functions. The flag
communications officer is responsible for ship and flag OPERATION ORDERS
communications requirements. However, the internal
routing of message traffic remains the responsibility of Operation orders (OPORDs) are directives issued
the commanding officer of the ship in which the flag is by naval commanders to subordinates for the purpose
embarked. of effecting coordinated execution of an operation.

Figure 2-4.—Communications watch organization.

2-11
Operation orders are prepared in accordance with a traffic) is the most important part of processing
standing format, as set forth in Naval Operational messages. Accounting for all messages processed in
Planning, NWP 11 (NWP 5-01). your message center is accomplished with logs.
Although ashore and afloat automated systems
An OPORD is an operations plan made up of the
automatically log, store, and retrieve messages, there
heading, body, and ending. The basic plan, contained
still is a need to manually log and file both incoming
in the body of the OPORD, is concise and contains
and outgoing messages.
minimum detail. More detailed information on various
ship departments is contained in enclosures (called
annexes and appendixes). CENTRAL MESSAGE LOG
The annex of most concern to radiomen is the
communications annex. The communications annex, Depending upon the traffic volume processed, a
along with its appendixes and tabs, discusses the many message center may use either a separate
details to be considered in planning communications for outgoing/incoming log or a combined Central Message
a particular operation. In this annex, you can find such Log to record processed message traffic. All messages
information as the applicable circuits, equipment, and are logged in the Central Message Log after they have
frequencies that will be used in the upcoming opera- been logged in the appropriate circuit log. The normal
tion. practice is to use separate logs for outgoing and
incoming messages (figure 2-5).
STANDARD OPERATING The entries in the Central Message Log are station
PROCEDURES serial number (SSN), precedence, DTG (original on a
readdressal), originator (original on a readdressal),
In addition to the OPORDs, you should also subject, classification, time of receipt (TOR) for
become familiar with the standard operating proce- incoming messages or time of delivery (TOD) for
dures (SOPs) used by your division and department. outgoing messages for each message. It is also useful
SOPs should be sufficiently complete and detailed to to indicate on the log over which circuit the message
advise personnel of routine practices. The detail was relayed. This is helpful during tracer situations.
depends upon such variables as the state of training, the The Central Message Log is filed in the
complexity of the instructions, and the size of the communications center master file on top of the
command. messages processed for that radio day (raday).
Staff sections, divisions, and departments often find
it convenient to establish their own SOPs for operating TOP SECRET CONTROL LOG
their respective areas and for guiding their personnel in
routine matters. Some examples of communications
SOPs are: Upon receipt of a Top Secret message, including
SPECAT SIOP-ESI, addressed to the parent command
Procedures for persons going aloft; or subscriber of the message center, the center assigns
a sequential number and enters the originator, DTG, and
Handling of visitors in radio spaces; and copy count of the message into the Top Secret Control
MINIMIZE procedures. Log. A separate entry is made for each addressee. The
messages must be annotated as “Copy ___ of ___” and
Communications SOPs are written to meet an “Page ___ of ___.” The message must also be assigned a Top
objective. SOPs may vary from command to command Secret control sequential number.
and may differ according to their objectives. Your job
will be to recommend changes or maybe even write the
objectives. In any event, a complete set of SOPs will CIRCUIT LOGS
enable you and your shipmates to perform your duties
in a responsible, professional, and safe manner. Records of messages sent via ship-shore circuits,
whether primary shipshore, full-period termination,
and soon, must be maintained. This ensures continuity
MESSAGE LOGS
of traffic, accurate times of delivery/receipt, and precise
Accounting for messages addressed to your guard files for possible tracer action. These actions should be
list (list of commands for which you receive message recorded on the Received Message Record, OPNAV

2-12
Figure 2-5.—Central Message Log for outgoing and incoming messages.

2-13
Figure 2-6.—Received Message Record, OPNAV Form 2110-15.

2-14
Form 2110-15 (figure 2-6). Although this form is PROCESSING OUTGOING MESSAGES
primarily designed as a record of received messages, Outgoing messages are those messages originated
only a pen-and-ink change is necessary for its use as a by:
send log.
l The command;

JOURNAL LOGS l Commands served by the communications


center;
In most automated systems, all significant system l An afloat command if a flag officer is embarked;
events are entered in a journal log. This log is a l An addressable unit onboard the ship as well as
chronological record of data processing operations, all messages accepted for relay.
which may be used to reconstruct a previous or updated
The flow chart in figure 2-7 shows the actions
version of a file.
required to process outgoing messages.
All system-level commands entered by an operator
are logged. Log entries are usually queued for delivery HANDLING AUTOMATICALLY
to a printer as they are generated, but this is optional. PROCESSED OUTGOING MESSAGES
However, they are always journaled to a file from which
Those messages introduced into the
they can be recalled and printed at a later time, as LDMX/NAVCOMPARS from a PCMT, VDT, paper
desired. This log gives a system operator or supervisor tape reader, data speed reader (DSR), card reader, or
the ability to review current and previous system events. magnetic tape are considered “outgoing.” They are
prepared in JANAP 128, modified ACP 126, or other
In addition, the journal log supports message acceptable formats. Most outgoing messages are
accountability. The system records the receipt of every destined to be delivered to distant communications
formal message and the termination of every formal centers and commands. Others also have delivery
message delivery that it schedules. requirements for in-house distribution to commands

Figure 2-7.—Steps for processing outgoing messages.

2-15
serviced by the communications center. The basic steps system; first ones in are the first ones processed out.
for processing outgoing messages are shown in figure The LDMX/NAVCOMPARS validates the message
2-8. header and assigns routing indicators (RIs) for delivery
as required.
The system recognizes whichever format is used
upon entry and then validates the start-of-message and If the system cannot assign an RI automatically, it
end-of-message. After validation, the system outputs will display the addressee line to the router VDT. The
either an accept or a reject notice to the operator via the router may assign the correct RI, place the message on
outgoing log. Together with the action notice, the a queue, reject the message from further processing, or
system then outputs a unique header line to identify the correct the short title of the addressee if in error.
message. Accepted messages are assigned a Process
A system status containing accounting information
Sequence Number (PSN), which is included in the
pertinent to all the messages on a hold queue will be
accept notice. They are then stored on diskette for
displayed to the router via the VDT, when the router
recovery purposes and queued for processing on a
first-in, first-out basis by precedence order. queue is empty or upon demand by the operator. The
router can then retrieve any message on the hold queue
Emergency command or FLASH precedence by its PSN. If the router rejects the message, the system
messages cause any lower precedence messages to be will record it and print a reject notice on the service log.
interrupted and a cancel transmission (bust) sequence Any message determined by the LDMX/
to be transmitted. The emergency command or FLASH NAVCOMPARS system to be duplicated will be
message is transmitted, and normal message processing rejected to the service printer with the proper
by precedence is resumed. annotation.
Messages are selected for processing based on their After all routing is appended to the message, the
precedence and on the order they arrived into the system assigns the language and media format (LMF)

Figure 2-8.—Steps for processing automatic outgoing messages.

2-16
(JANAP 128), content indicator code (CIC) (JANAP General Message— A message that has a wide,
128), originating station routing indicator (OSRI), predetermined, standard distribution. General
station serial number (SSN), and time of file (TOF) to messages are normally titled with a sequential number
the message. The message is then paged and sectioned for the current year; for example, ALCOM 28/96,
according to JANAP 128, and queued for transmission. NAVOP 30/96. The title indicates distribution and
serves as the address designator.
Data-pattern messages may be introduced into the
system via card or magnetic tape. The format will be
in accordance with JANAP 128 procedures for data ADDRESS GROUPS
messages. During the message preparation, processing,
transmission, and filing, the same controls and Address groups are four-letter groups assigned to
restraints used for narrative message processing will represent a command, activity, or unit. In military
also apply to data-pattern messages. communications, address groups can be used in the
same manner as call signs to establish and maintain
The message may also have delivery requirements communications. Generally speaking, the Navy uses
for distribution to commands serviced by the address groups the same way as call signs. Address
communications center. The system will automatically groups never start with the letter N; hence, they are
assign internal message distribution for all guard easily distinguishable from naval radio call signs.
commands. If the system cannot provide internal Address groups, however, follow no distinctive pattern,
distribution, the message will be displayed to the and the arrangement of the four letters that constitute
inrouter for assistance. them conveys no significance whatsoever.
Afloat commands (except individual ships) and
MESSAGE AND ROUTING shore-based commands or activities not served by their
ADDRESSEES own communications facilities are assigned address
Most messages have at least one addressee groups. For example:
responsible for taking action on the contents and for l Senior commands and commanders ashore, such
originating any necessary reply. Addressees who have as the Secretary of Defense and the Secretary of
an official concern in the subject of the message, but the Navy;
who do not have primary responsibility for acting on it,
receive the message for information. Although l Navy bureaus, systems commands, and district
information addressees are usually concerned only commandants; and
indirectly with a message, they occasionally must take l Elements of the shore establishment having a
action of some kind within their own commands. Some
need for direct addressing and receipt of message
messages contain only information addressees.
traffic (such as weather centrals).
Messages may be divided into types, according to Among other uses, address groups facilitate
the way they are addressed, as follows: delivery of message traffic when a communications
Single-Address— A message that has only one center serves so many activities that its own call sign is
addressee, which may be either for action or insufficient to identify the addressee. Address groups
information. are contained in Allied Call Sign and Address Group
System—Instructions and Assignments, ACP 100, and
Multiple-Address— A message that has two or in U.S. Call Sign &Address Group System Instructions
more addressees, which may be either action or & Assignments (U.S. Supplement No. 1), ACP 100 U.S.
information and where each addressee is informed of SUPP-1. Like call signs, address groups are divided
all other recipients. into the following types:
Book— A message destined for two or more
addressees but where the drafter considers it l Individual activity;
unnecessary that each addressee be informed of other l Collective;
addressee(s). Book messages are routed according to
each addressee’s relay station. All unnessary l Conjunctive;
addressees are deleted from the face of the message l Geographic;
before being sent to the addressee(s) served by that
particular relay station. l Address indicating; and

2-17
l Special operating. be processed by an AIG address designator. For
example, let’s assume that a hypothetical AIG (AIG 31)
Individual Activity Address Groups is used to address SUBMISS/SUBSUNK message
traffic by COMSUBLANT to 30 action addressees and
Individual activity address groups are 35 information addressees. Since a single AIG (AIG
representative of a single command or unit, either afloat 31) is used, 65 call signs and address groups are
or ashore. For example: eliminated from the heading of the message.
DTCI—COMNAVSURFLANT; and AIGs are normally created when particular types of
SSMA—CHIEF OF NAVAL OPERATIONS (CNO). message traffic become repetitive enough (at least 12
times a year) and are addressed to enough of the same
Collective Address Groups addressees to warrant it. Among such message traffic
are:
Collective address groups represent two or more
commands or activities. Included in this group are l Alerts, air defense warnings, operational or
commanders and their subordinate commanders. For emergency actions, and so forth;
example: l Destructive weather warnings, such as
JTBC—DESRON 6; and hurricanes and typhoons;
YQHV—SUBRON 16. l Logistical transactions and reports;
Conjunctive and Geographic Address Groups l Intelligence summaries;

Conjunctive and geographic address groups are l Movement reports, such as aircraft, ships, and
discussed together because they are interrelated in their personnel; and
usage. l Notices to airmen (NOTAMs).
Conjunctive address groups have incomplete A point for you to remember is that an AIG will not
meanings and must have geographic address groups be established for groups of addressees numbering
added to them to denote a specific command or location. fewer than 16. A complete listing of AIGs by number,
For this reason, conjunctive address groups are used cognizant authority, and purpose is contained in U.S.
only with one or more geographic address groups. For Navy Address Indicating Group (AIG) and Collective
example, the conjunctive address group XZKW means Address Designator (CAD) Handbook, NTP 3 SUPP-1.
“All ships present at ___ .” To complete the meaning, A partial listing of AIGs, along with specific action and
it must be followed by a geographic address group. information addressees, can be found in ACP 100 U.S.
Geographic address groups are the equivalent of SUPP 1.
geographical locations or areas. They are always
preceded by conjunctive address groups. For example, Special Operating Groups
the address group DEXL could represent Newport, R.I.
Therefore, all ships present at Newport would be Special operating groups (SOGs) are four-letter
addressed XZKW DEXL. groups that are identical in appearance to address
groups. SOGs are provided for use in the headings of
Address Indicating Groups messages to give special instructions. However, SOGs
are not used unless specifically authorized by CNO.
Address indicating groups (AIGs) represent 16 or They must always be encrypted. SOGs may be used
more specific and frequently recurring combinations of singly or with encrypted or unencrypted call signs or
action and/or information addressees. The purpose of address groups.
AIGs is to increase the speed-of-traffic handling. They
shorten the message address by providing a single DISTRIBUTION CLERK
address group to represent a large number of addressees.
This eliminates individual designators for each address The distribution clerk reproduces copies of the
used in the heading. messages according to the routing instruction of the
Messages that are repetitively addressed to a inrouter and outrouter. The distribution clerk is
constant group of 16 or more addressees can effectively responsible for making the required number of copies

2-18
each subscriber requires and slotting the messages into AUG 96 means the 22nd day of August plus the time in
the appropriate subscriber box. Greenwich mean time (GMT). The dates from the first
It is important that the clerk remain alert to prevent to the ninth of the month are preceded by a zero. We
slotting messages into the wrong box. This could cause will talk more about the GMT system shortly.
an undelivery situation. The distribution clerk, who The DTG designation is followed by a zone suffix
handles a great number of messages throughout the and the month and year. The month is expressed by its
watch, must be aware of high-precedence messages and first three letters and the year, by the last two digits of
ensure that they are reproduced and distributed in a year of origin; for example, 081050Z AUG 96. The
timely manner for immediate pickup by the subscriber. zone suffix ZULU (Z), for Greenwich mean time, is
The clerk must also be “up” on the message center’s used as the universal time for all messages. The
current SOP for handling special and classified exception is where theater or area commanders
messages. prescribe the use of local time for local tactical
To prevent viewing by unauthorized personnel, situations. Radiomen never use 2400Z and 0000Z as
certain messages, such as PERSONAL FOR, the DTG of a message. The correct time would be either
AMCROSS, and classified messages, must be placed in 2359Z or 0001Z, as appropriate.
envelopes for pickup by subscribers.
GREENWICH MEAN TIME.— In naval
Classified messages are placed in two envelopes; communications, the date-time group is computed from
the inner envelope is stamped with the classification and a common worldwide standard. To meet the need for
any special-handling markings, and then sealed in worldwide time standardization, the international
accordance with local instructions. The outer envelope Greenwich mean time (GMT) system was developed.
is marked with the addressee, originator, and DTG of The GMT system uses a 24-hour clock instead of the
the message, and then sealed. two 12-hour cycles used in the normal civilian world.
After reproducing and distributing a message, the In the GMT system, the Earth is divided into 24
distribution clerk places the original copy into a box for
zones. Zone zero lies between 7 1/2° east and 7 1/2°
filing by the file clerk. When a message is reproduced
from the sole copy of a broadcast message, the original west of the 0° meridian. The 0° meridian passes through
copy or a filler must be returned to the broadcast file. Greenwich, England. The time in this zone (zone zero)
If two-ply paper is used on the circuit, the top copy may is called Greenwich mean time (GMT). The military
be used as the master file copy and the bottom copy more commonly refers to this as ZULU time. Both
retained as the circuit monitor copy. names refer to the same standard.
Each time zone extends through 15° of longitude.
COMMON MESSAGE ELEMENTS Zones located east of zone zero are numbered 1 through
12 and are designated minus. To obtain Greenwich
Before covering the basic format of military mean time, you must subtract the zone number in
messages, we will first discuss the time system and which you are located from local time.
precedence categories used in naval communications.
Zones located west of zone zero are also numbered
TIME 1 through 12 but are designated plus. These zones must
be added to the local zone time to obtain GMT. As we
Time is one of the most important elements in will discuss shortly, the 12th zone is divided by the
communications. Messages are normally identified 180th meridian, which is the international date line.
and filed by either date-time group or Julian date,
depending on the method of transmission. Each zone is further designated by a letter. Letters
A through M (J is omitted) designate the eastern, or
Date-Time Group minus, zones. Letters N through Y designate the
western, or plus, zones. The designating letter for GMT
The date-time group (DTG) is assigned for is Z (ZULU). The zone number, prefixed by a plus or
identification and file purposes only. The DTG consists minus sign, constitutes the zone description. Zones
of six digits. The first two digits represent the date, the crossing land areas often follow boundaries, natural
second two digits represent the hour, and the third two features, or regional demarcations to keep similar or
digits represent the minutes. For example, 221327Z closely related areas within the same zone.

2-19
CONVERTING GMT AND LOCAL Julian Date
TIMES.— Most countries have adopted the GMT
system. As a Radioman, you will need to be able to The Julian date consists of seven digits. The first
convert local time to GMT. To do this, you must three digits represent the day, and the last four digits
understand the GMT system. Figure 2-9 is a chart represent the hour and minutes. The first day of the
showing the time zones of the world. Refer to the chart calendar year is Julian 001, and each day is numbered
as you study the material in the next paragraphs. consecutively thereafter. For example, in Julian
0311315, 031 is the 31st day of the calendar year
To illustrate converting local time to GMT, assume (January 31), and 1315 is the filing time.
that we are in zone R and the local time is 1000R (10
a.m.). Referring to the time chart in figure 2-9, you can PRECEDENCE
see that zone R lies west in longitude from zone zero,
and is designated plus 5. Therefore, we add 5 hours to The message drafter indicates the desired
the local time, 1000, to find that GMT is 1500Z. To writer-to-reader delivery time (speed-of-service)
convert GMT to local time, we reverse the process and through the assignment of a message precedence.
subtract 5 hours from the GMT (1500Z) to obtain Although the drafter determines the precedence, the
1000R. releaser should either confirm or change it. (We will
talk more about the responsibilities of the drafter,
The U.S. military services use the 24-hour system originator, and releaser later in this chapter.)
to express time in four-digit groups. The first two digits
Precedence is assigned according to urgency, based
of a group denote the hour and the second two digits,
solely on speed-of-service, not according to the
the minutes. Thus, 6:30 a.m. becomes 0630; noon is
importance of the subject matter or the text. For
1200; and 6:30 p.m. is 1830. Midnight is expressed as
example, an unclassified message may be assigned an
0000 (never as 2400), and 1 minute past midnight IMMEDIATE precedence, whereas a Secret message
becomes 0001. Remember, to eliminate any possible may be assigned a ROUTINE precedence. In this
confusion, never use 0000Z or 2400Z as the date-time situation, the unclassified message requires fast action
group of a message. The correct time would be either or response, whereas the Secret message may not
2359Z or 000IZ. require any action at all.
We mentioned earlier that the 12th zone is divided The following paragraphs list the various
by the 180th meridian. This meridian is the precedence categories, their indicators, and basic
international date line (IDL) (figure 2-9). This is where definitions:
each worldwide day begins and ends. A westbound
ROUTINE (R)— This category is assigned to all
ship crossing the line loses a day, whereas an eastbound types of traffic that justify electrical transmission but
ship gains a day. This time zone is divided into literal which are not of sufficient urgency to require a higher
zones MIKE and YANKEE. The eastern half of zone precedence.
12 is designated MIKE (-12), and the western half is
designated YANKEE (+12). PRIORITY (P)— This category is reserved for
messages that furnish essential information for the
Now we come to a very important point in our conduct of operations in progress. This is the highest
discussion. Since MIKE and YANKEE are two parts of precedence normally authorized for administrative
a single zone, the time in MIKE and YANKEE is always messages.
the same. When the IDL is crossed from either
IMMEDIATE (O)— This category is reserved for
direction, the day must change. Since we have already messages relating to situations that gravely affect the
established that there is a l-hour difference between national forces or populace and which require
each of the 24 time zones, it is clear that there is always immediate delivery to addressees.
a situation where it is a day earlier or later in one part
of the world than it is in another. The primary point to FLASH (Z)— This category is reserved for initial
remember about this zone is that it is always the same enemy contact reports or operational combat messages
time in zone MIKE as it is in zone YANKEE, but it is of extreme urgency; message brevity is mandatory.
never the same day! You can find more information on YANKEE (Y)— In addition to the four major
time zones in Communication Instructions General (U), precedence categories, an EMERGENCY
ACP 121. COMMAND PRECEDENCE (ECP) is used within the

2-20
Page 2-21.

Figure 2-19.—Time zone chart of the world.


AUTODIN system. This ECP is identified by the messages, except those containing Restricted
precedence prosign Y and is limited to designated Data or Formerly Restricted Data.
emergency action command and control messages.
RELEASER
MESSAGE USER RESPONSIBILITIES
The releaser is a properly designated individual
A message user is any individual authorized to authorized to release messages for transmission in the
draft, release, and/or process electronically transmitted name of the command or activity. The releasing
messages. There are certain responsibilities associated individual ensures that the drafter has complied with the
with the origination of a message. These requirements contained in NTP 3. In addition to
responsibilities are separate and distinct and concern the validating the contents of the message, the signature of
following parties: the releaser affirms compliance with message-drafting
instructions. The signature of the releaser authorizes
Originator; the message for transmission.
Drafter; and After a message has been properly released, it is
Releaser. delivered to the telecommunications center (TCC) for
transmission. The DTG is normally assigned here.
Occasionally, the responsibilities may overlap, Proper transmission, receipting, and filing procedures
especially if one person is serving a dual capacity. For are done by the communications personnel.
example, communications officers may occasionally
draft and release messages, thus making them both An important point that you should remember
drafters and releasers. about the DTG is that it is assigned for identification
and file purposes only. It is not used to compute
ORIGINATOR message processing time.

The originator is the authority (command or MESSAGE READDRESSALS


activity) in whose name the message is sent. The
originator is presumed to be the commanding officer of If you receive or send a message and later determine
the command or activity. Most often, the originator and that another activity may need to act on or know about
the releaser are one and the same. the information in the message, you can readdress the
original message to that activity. If you receive a copy
In some cases, the drafter, releaser, and originator
of a message as an “information addressee,” you can
are all the same person. For example, if the
only readdress the original for information purposes.
commanding officer drafts a message for transmission,
he or she is the drafter as well as the releasing authority Use a short form or long form, depending on how
for the activity in whose name the message is sent. long ago the original message was sent. For both the
short form and long form, you must:
DRAFTER
Fully identify the message you are readdressing.
The drafter is the person who actually composes the Enter the new addressee(s).
message. In accordance with NTP 3, the drafter is
responsible for: Enter the original message originator.
a Proper addressing and using plain language Include the original date-time group.
address (PLA) designators correctly;
Use the Process Sequence Number (PSN), if
e Clear, concise composition; contained in the original message.
l Selecting the precedence; If the original message was sent within the last 60
days, use the short form to readdress it. Messages are
l Ensuring the proper format; held in the message center file for up to 60 days. On
l Assigning the proper classification; and the short form, enter the from, to, and information
addressees in the fields provided. Send the short form
l Ensuring the application of proper downgrading to the message center where it will be combined with
and declassification instructions to classified the text of the original and then sent.

2-22
The short form readdressal is always unclassified. their commands only with prior permission from one of
However, it must state the classification of the the three authorities just mentioned.
readdressed message.
During minimize conditions, FLASH and
Messages over 60 days old are routinely deleted IMMEDIATE traffic should be restricted to a maximum
from the message center files. If the original message of 100 and 200 words, respectively. Message releasers
to be readdressed is more than 60 days old, use the long are also kept to a minimum and must be specifically
form. Enter the from, to, and information addressees in designated in writing. We briefly discuss additional
the fields provided. Unlike the short form, you retype minimize guidelines later in this chapter. NWP 4
the entire message. Classify the long form the same as (NWP 6-01) contains information pertaining to the
the original message. types of normal, environmental, and supply traffic that
When a sectionalized message is readdressed, each may be sent over normal channels and circuits during
minimize.
section of the message must be readdressed separately.
The headerlines and addressees must be the same on SERVICE MESSAGES
each readdressal. The PSN must match that of the
section being readdressed, but the respective section Service messages are short, concise messages
number is omitted. Each section of the readdressed between communications personnel. These messages
message should have the same date-time group. have the authority of an official communication and
must receive prompt attention. If the action requested
The precedence of the readdressal message maybe in a service message cannot be accomplished within a
lower, the same as, or of a higher precedence than the reasonable time, the station originating the service
original message when deemed operationally message should be notified. Service messages are
imperative by the readdressal authority. normally assigned a precedence equal to the message
General formatting instructions and preparation being serviced.
guidance are available in NTP 3. Message readdressal
procedures may vary slightly at different TCCs. The Service messages deal with many topics. You will
required procedure may be verified through the local find that most deal with corrections, repetitions,
TCC. broadcast reruns, and misrouted or missent messages.
You must remember that a service message should be
MINIMIZE MESSAGES promptly dealt with and retained until all actions
concerning it have been completed. Once action is
Military telecommunications systems tend to complete, it is good practice to attach a copy of the
become overloaded during an emergency. Naturally, it service message to the serviced message when it is filed,
becomes necessary to reduce unnecessary traffic or mark it with the DTG of the service(s).
volume to clear user circuits for essential traffic. This
reduction in traffic is accomplished by use (usually by Requests for information through service messages
message) of the word “MINIMIZE.” Minimize means should be as brief, concise, and accurate as possible.
“It is now mandatory that normal message and Careful attention to detail and the use of proper
telephone traffic be reduced drastically so that vital operating techniques by communications and crypto
messages connected with the situation indicated will personnel will reduce the number of service messages
not be delayed.” required.

A messaget ordering minimize consists of the word Service messages are normally prepared in
“MINIMIZE” followed by the area affected (scope), abbreviated plaindress format and may be assigned
reason, and duration of the minimize condition (when sequential reference numbers. (We discuss plaindress
known). Minimize messages must be brought to the messages later in this chapter.) The service message
immediate attention of the leading communications number immediately follows the abbreviation “SVC” in
petty officer (LPO) and the communications officer. the message text. If used, sequential service reference
numbers may continue throughout the calendar year.
The Chief of Naval Operations (CNO), fleet
When you reply to a service message received with a
commanders in chief, and area coordinators are
reference number, the text of the reply should refer to
authorized to impose minimize conditions on users of
the number. For example:
naval communications systems. Subordinate
commanders may impose minimize over elements of

2-23
This example is a service message inviting attention the required retention limit if tracer action is in progress
(ZUI) to a previous service message with a reference prior to the expiration date. You can find detailed
number of 0245. Occasionally, you will see the information concerning tracer action in JANAP 128.
acronym COSIR in a service message text, which means
“Cite Our Service in Reply.” Authorized operating Termination Request Messages
signals are used to the greatest extent possible in service
messages, but clarity must not be sacrificed for brevity. Ships send termination request messages to
establish circuits w i t h a N C T A M S o r
The security classification is the first word of all NAVCOMTELSTA on a limited or full-time basis. A
service message text. This is followed by the termination request message must be sent to the
abbreviation “SVC.” If the service message requires cognizant NCTAMS at least 48 hours prior to activating
special handling, the special-handling designator the requested termination. If the ship has a requirement
follows the security classification. For example: for a full-time termination, it will be assigned a routing
indicator by the cognizant NCTAMS. NTP 4 contains
detailed information pertaining to termination requests
and formats.
A service message may quote the textual content of
a classified message or refer to the classified message Communications Guard Shift Messages
in a manner that reveals textual content. In this case,
the service message must be assigned the same Communications guard shift (COMMSHIFT)
classification as the classified message being serviced. messages are required when a command shifts its guard
You can find detailed information on service messages from one broadcast or servicing communications center
in Automatic Digital Network (AUTODIN) Operating to another. When possible, the shift takes effect at
Procedures, JANAP 128. 0001Z of the new radio day. When broadcasts are
shifted, an overlap period before and after the effective
Tracer Messages time is observed to ensure continuity of traffic. The
command guards both broadcasts during the overlap
Tracer messages are special types of service period.
message. Tracers are sent to determine the reason for COMMSHIFT messages are sent to the NCTAMS
excessive delay or nondelivery of a message previously of the communication areas from which the old and the
sent. Normally, tracer requests are initiated by a new broadcasts originate. COMMSHIFT messages are
message originator or addressee. However, a situation necessary because of operational considerations or
may dictate that tracer action be initiated by the changes in the deployment schedule of a ship. These
originating communications station, the relay station, messages are necessary when a command needs to
or the communications station of the addressee. effect a shift at a time other than that indicated by its
Tracer action continues on a station-to-station basis movement report. Detailed information concerning
until the cause of delay has been determined. Upon communications guard shift messages and formats is
receipt of a tracer, a station should examine its records contained in NTP 4.
for the time of receipt and transmission of the message
being traced. This information is compiled and Broadcast Screen Requests
transmitted with the tracer action to the preceding
station(s) and to the station that originated the tracer. Broadcast screen requests (BSRs) are service
The station that caused the delay or nondelivery must messages to request the rerun (ZDK) of missed or
cite the reason and provide a summary of corrective garbled messages. BSRs are sent to the Broadcast
action in the report. Keying Station (BKS) or to the designated broadcast
screen ship that is responsible for the broadcast channel.
Tracer action requests must be initiated as soon as NTP 4 provides detailed information and prescribes
the discrepancy is discovered. Action must be initiated proper format for drafting a BSR.
no later than 4 days after the original time of
transmission for a tactical addressee. For nontactical COMMSPOT Reports
addressees, action must be initiated no later than 30 days
from the original time of transmission. In-station COMMSPOT reports are used to advise of any
records, files, logs, and tapes must be retained beyond situation that might cause significant disruption of

2-24
tactical communications. These reports are submitted command must be filed in their appropriate files and a
by all ships and nonterminated units when unusual filler for these messages placed in the broadcast file.
communications difficulties are encountered.
COMMSPOT reports must be submitted as soon as STATION FILE
unusual communications difficulties are experienced to
minimize further deterioration of the communications The station file is divided into two parts:
situation. communications center master file and visual station
file. With the exception of broadcast messages, the
master file contains the circuit or “as is” copy, including
COMMUNICATIONS CENTER FILES any message endorsements, of all messages
Every message handled by a ship or transmitted, received, or relayed by the
communications station is placed in one or more files. communications center. Narrative visual messages or
Some files are maintained by all ships and stations. fillers must be filed in the communications center
Other files are optional and are maintained only to fill master file.
the needs of a particular ship or station.
GENERAL MESSAGE FILE
COMMUNICATIONS CENTER
MASTER FILE The general message file contains copies of all
effective general messages that require retention based
The communications center master file is the heart on the communications center’s current guard list. This
of the filing system. This file contains a copy or filler file is subdivided by general message title (such as
of every message sent or received by your command. ALNAV, ALCOM, NAVOP), and messages are filed in
Messages or fillers must be filed in DTG order to serial number order instead of DTG order. An example
facilitate speed in locating messages. Those messages of a general message serial number is ALNAV 10/96.
not having DTGs should be filed behind messages of This indicates that it is the 10th ALNAV sent in 1996.
the same date. Separate incoming and outgoing The individual file is marked with the classification
communications center master files maybe maintained. of the highest classified message contained therein.
The classified files may be segregated by security
CRYPTOCENTER FILE classification if desired. If a general message is
canceled during the current year, the message may be
The cryptocenter file contains a copy of each Top destroyed, but a filler must be placed in the file to
Secret, SPECAT (less SIOP-ESI), and messages identify and indicate the disposition of all current-year
designated for special privacy, regardless of general messages.
classification. Tight Control (TICON) and NATO
messages must have their own files. Fillers for FACSIMILE FILE
messages in this file must be placed in the master station
file. The facsimile file contains a copy of all
transmissions processed by facsimile equipment. A
SPECAT SIOP-ESI FILE filler for all facsimile messages must be placed in the
communications center master file.
The SPECAT SIOP-ESI file contains the master
copy of all SIOP-ESI messages received by the COMMERCIAL TRAFFIC FILE
communications center. Fillers for these messages
must be placed in the master station and cryptocenter The commercial traffic file contains messages sent
files. by commercial systems in accordance with Fleet
Communications (U), NTP 4. This file is maintained
BROADCAST FILE by the commercial traffic clerk.

The broadcast file contains a copy or filler of each EMBARKED COMMAND FILE
message transmitted or received by the broadcast
method. This file must be stored in accordance with the The embarked command file is maintained by the
highest classification of the information contained. Top embarked commander’s staff. When embarked
Secret and SPECAT messages addressed to the commanders depart their flagships, they may require

2-25
that their files accompany them. Therefore, the
embarked command file is maintained separately from
the flagship file. Flagship communications personnel
are responsible for processing outgoing and incoming
messages for the embarked staff.

NATO/ALLIED FILES

Classified messages of foreign origin must be


provided the same protection as U.S. messages of
equivalent classification. Foreign Restricted messages,
for which there is no U.S. equivalent, must be protected
the same as U.S. Confidential messages, except that
Restricted messages do not have to be stored in a
security container. You can find U.S. equivalent and
foreign classifications in the Department of the Navy
Information and Personnel Security Program
Regulation, OPNAVINST 5510.1, hereinafter called
the Security Manual.
NATO classified messages may not be filed with
U.S. classified message. However, NATO classified
message files may be stored in the same storage area
with U.S. messages provided that the NATO files are
clearly marked as such. Figure 2-10.—Example of a message filler.
FILE FILLERS
also be printed on the lower right-hand corner. This aids
Because of repeated reference to previously sent personnel in easily locating messages in the files. When
message traffic, you must be able to locate all messages a message is removed from a file, it is important that it
easily and quickly. Therefore, you must always return be refiled as soon as possible.
a message to the same file from which it was removed
and in the proper filing order. When you remove a The importance of maintaining well-kept files and
message from a file, always insert a filler, or tickler, in of moderating among the various watch sections cannot
its place. be overemphasized. Maintaining accurate files and
records and observing proper procedures contribute to
Fillers are locally prepared forms that identify the an efficient shipboard or shore communications
message by the original DTG, the message originator, organization. You should be aware that different ships
information as to where the message is located, and the and stations may do basic procedures in slightly
personal sign of the person removing the message from different ways. All commands, however, must conform
the file and completing the filler. For readdressal to the requirements contained in communications
messages, a filler is made for each readdressal date-time operating instructions and publications.
group. The message itself is filed under the original
date-time group. Figure 2-10 shows an example of a
message filler, or tickler. RETENTION OF FILES

FILE MAINTENANCE Communication logs and files are retained by a


communications center for a specified time period, as
Messages and fillers are filed in ascending shown in table 2-1. After the time period indicated, the
date-time group order. The earliest message of the radio logs and files should be destroyed either by burning or
day (raday) will be at the bottom of the file. Automated shredding. Because of the volume of message traffic
systems print the DTG of each message on the lower processed, logs and files can take up significant space
right-hand corner of each message. For messages in the message center; therefore, they should be
processed on nonautomated systems, the DTG should destroyed in a timely manner.

2-26
Table 2-1.—Retention Period of Logs and Files

COMMUNICATIONS PLANNING To be effective, the communications planner needs


comprehensive knowledge of the organizational
The primary objectives of communications
structure established for the operation and the
planning are:
capabilities and limitations of the communications and
To provide for effective connectivity to support command center facilities available to the force.
the exercise of command and the exchange of
essential information; and COMMUNICATIONS REQUIREMENTS
To advise the commander of the implications of
communication capabilities and limitations for The operational tasks assigned to various units
the operation plan and its execution. require radio nets that link units engaged in the same
The communications plan has to consider activity or task. Communications circuits follow the
reliability, security, and speed. The communications command lines of the task unit or contribute to its
planner chooses facilities and methods that will best tactical effectiveness by providing for essential
satisfy operational requirements. The plan provides for information exchange. These considerations provide
the command and control capability by which the the essential elements for determining communications
operation will be controlled and directed. requirements.

2-27
PROTECTION OF COMMUNICATIONS Communications Deception

Enemy interception and disruption of Communications deception, part of the field of


communications are of primary concern to any tactical deception, is the use of devices, operations, and
communications planner. Every facet of techniques with the intent of confusing or misleading
communications facilities, methods, and procedures the user of a communications link or a navigation
needs to be examined in terms of security, vulnerability system.
to deception, and the electronic protection (EP) required
for maximum protection. EA and EP

Communications Security Electronic attack (EA) is that division of electronic


warfare (EW) involving actions taken to prevent or
Security is the safeguarding of information. As it reduce an enemy’s effective use of the electromagnetic
pertains to communications, security is usually referred spectrum. Enemy EA concerns the communications
to in terms of communications security (COMSEC) and planner because overcoming enemy jamming and
signal security (SIGSEC). Security will be discussed in deception imposes certain restrictions on general
more depth in chapter 3. Various devices and communications operations procedures.
procedures are used to increase security, including: Electronic protection (EP) is that division of EW
l Authentication— A security measure designed involving actions taken to ensure friendly effective use
of the electromagnetic spectrum despite an enemy’s use
to protect communications systems against of electronic warfare. The planner must be aware of EP
acceptance of false transmissions or simulations capabilities available.
by establishing the validity of a transmission,
message, or originator.
THE COMMUNICATIONS PLAN
l Codes— Any system of communication in
which arbitrary groups of symbols represent The communications plan satisfies the
units of plain text. Codes are often used for communications requirements of an operation. It
brevity and/or security. specifies circuits, channels, and facilities to be used and
l Ciphers— Any cryptologic system in which stipulates the policies and procedures that are
arbitrary symbols or groups of symbols represent applicable. The plan is, in effect, an assignment of
communications tasks to be performed by subordinate
units of plain text.
commanders or by supporting commands.
l Radio Silence— A condition in which all or
The planner first establishes requirements for
certain radio equipment is kept inoperative communications and then determines the best means for
(frequency band and/or types of equipment are satisfying them. This process may reveal shortages or
specified). inadequacies in what is available. If inadequacies are
l Monitoring— The act of listening, carrying out identified, it may become necessary to share circuits or
surveillance on, and/or recording the emissions facilities, as well as merging or consolidating
of one’s own or allied forces for the purpose of requirements. All possibilities should be considered to
support valid operational requirements.
maintaining and improving procedural standards
and Security. In planning communications, the planner must
l Identification Friend or Foe (IFF)— A system evaluate such factors as the performance, capabilities,
and capacities of systems, facilities, and personnel.
using electromagnetic transmissions to which These factors are merely guides and averages. They
equipment carried by friendly forces represent the sum result of experience in previous
automatically responds. For example, by similar situations, and are considered only after any
emitting predetermined IFF pulses, friendly local factors are determined. These factors change from
forces can distinguish themselves from enemy time to time and must all be available for final
forces. determination of communications requirements.

2-28
TELECOMMUNICATIONS SERVICE is called frequency, and the distance between each
REQUEST (TSR) vibration is called wavelength. Frequency and
wavelengths are discussed in a later module.
When a command requires additions, deletions, or
changes in existing Defense Communications System Spectrum Management
(DCS) circuits, it must initiate a TSR. The submission
of a TSR is not a simple process and requires research A great invention in the 19th century ultimately led
and planning. The Defense Information Systems to the need for spectrum, or frequency, management.
Agency (DISA) publishes a publication called This invention was the wireless or, as we know it today,
Submission of Telecommunications Service Request, the radio. At first, there were only two radio
DISA CIRCULAR 310-130-1, that provides frequencies—50 kilohertz (kHz) and 1000 kHz. Today,
instructions for preparing and submitting TSRs. New, the spectrum is recognized by international treaty to
increased, or updated services are expensive and require extend up to 3000 gigahertz (GHz). The development
substantial justification. of radar, satellites, and other technologically advanced
systems and their subsequent demands on the frequency
The increasingly high cost of telecommunications spectrum have contributed to the need for frequency
support, especially leased services, has resulted in the management.
high visibility of communications programs at all levels
of government. This fact underscores the need for Frequency Allocation
managerial awareness and improved life cycle
documentation of telecommunications resources. The Department of the Navy will obligate no funds
Planning and developing a responsive naval for equipment until a frequency allocation has been
telecommunications system requires early obtained. This means that all actions necessary to
identification and consideration of user requirements. establish a frequency band for a specific item must be
Programming is required to obtain necessary resources. completed and approved prior to budgeting funds.
Normally, these requirements should be defined and The allocation approval authority considers the
submitted at least 2 years in advance to permit timely type of service the item will provide and the
system planning and programming. classification of the emission. This authority also
enforces rules and regulations and compliance with
TELECOMMUNICATIONS SERVICE technical standards. The approval authority also
ORDER (TSO) ensures the compatibility of emerging equipment with
other equipment operating in the same electromagnetic
The TSO is the authorization to start, change, or environment.
discontinue circuits, trunks, links, or systems. It is used
to amend previously issued TSOs and to effect Interservice frequency coordination is another
administrative changes. important consideration. It reduces the potential for
harmful inteference if more than one service develops
The basic circuit design information for all new or similar items that will operate in the same band. The
changed circuits will be provided by the TSO. The TSO coordination is the responsibility of the Chief of Naval
may also be used as the authority to procure specific Operations (CNO), working through the United States
devices and ancillary equipment necessary to install the Military Communications Electronics Board
circuit or services designated. (USMCEB).

FREQUENCY MANAGEMENT Frequency Assignment

Over the last quarter century, electronics has Frequency assignment is the process of authorizing
pervaded virtually every facet of our life. High-tech a system or equipment to operate on a discrete
electronic devices, especially those that radiate, make frequency (or frequencies) and within a specified set of
constant use of the electromagnetic spectrum. constraints. Examples of constraints are power,
The term “electromagnetic spectrum” refers to the emission bandwidth, location of antennas, and
operating time.
natural vibrations that occur when a force is applied to
a substance. These vibrations occur with various Authority for using radio frequencies by Navy and
speeds and intensities. The speed at which they occur Marine Corps activities within the United States and

2-29
Possessions (US&P) is obtained from the For Official Use Only (FOUO)
Administrator, National Telecommunications and
Information Administration (NTIA), Washington, D.C. FOUO is the designation used on official
information not requiring a security classification but
The CNO establishes overall policy for spectrum
which must be withheld and protected from public
management within the Department of the Navy.
release. Unclassified messages containing FOUO
Authority for using radio frequencies by Navy and information must have the abbreviation “FOUO” after
Marine Corps activities within the area of responsibility
the designation “UNCLAS.”
of a unified or specified commander is obtained from
the Joint Chiefs of Staff through the USMCEB. Within Encrypt for Transmission Only (EFTO)
the Department of the Navy, the Naval Electromagnetic
Spectrum Center (NAVEMSCEN) authorizes Certain categories of unclassified messages may be
frequency assignment applications and ensures all identified as having potential value if subject to
prerequisites are completed. analysis, but do not meet the criteria for security
classification. The special designation “EFTO” was
SPECIAL-HANDLING MARKINGS established to protect these unclassified messages
during electrical transmission.
Certain types of messages require special-handling EFTO is not required on unclassified messages
markings in addition to that provided by the security addressed exclusively among Navy, Marine Corps, and
classification. Among these markings are such Coast Guard commands. EFTO is authorized for use
designations as Caveat, Restricted Data (RD), Formerly within the Department of Defense, including the
Restricted Data (FRD), LIMDIS, FOUO, EFTO, National Security Agency. However, EFTO is required
SPECAT, PERSONAL FOR, NATO RESTRICTED, on FOUO messages addressed to DOD activities
and ALLIED RESTRICTED. outside the continental United States. Bear in mind,
however, that just because information is FOUO, it is
Caveat Messages not automatically EFTO, and vice versa.
As we mentioned earlier, EFTO is a transmission
When used with special-handling instructions, the marking for unclassified messages. FOUO markings,
word “caveat” means a warning by authoritative orders however, define a certain category of information
that directs or imposes one to protect an element, requiring special handling. Neither FOUO nor EFTO
usually special message traffic. markings are security classifications; both are
special-handling designations. You can find detailed
information on EFTO and FOUO markings in Basic
Restricted Data and Formerly Restricted Data Operational Communications Doctrine (U), NWP 4
(NWP 6-01).
The marking “Restricted Data” (RD) is applied to
all data concerned with the design, manufacture, or use SPECAT
of nuclear weapons. Also included in this category is
the special nuclear material used in energy production. The SPECAT marking means special category.
SPECAT messages are classified messages identified
The marking “Formerly Restricted Data” (FRD) with a special project or subject. SPECAT messages
pertains to defense information that has been removed require special-handling procedures in addition to the
from the RD category but must still be safeguarded as handling procedures for the security classification of
classified defense information. FRD material cannot be the message. There are four SPECAT categories:
released to foreign nationals except under specific
international agreement. SPECAT;
SPECAT EXCLUSIVE FOR (SEF);
LIMDIS (Limited Distribution)
SPECAT Single Integrated Operational
Plan-Extremely Sensitive Information
The LIMDIS designator is applied only to classified (SIOP-ESI); and
messages which, because of the subject matter, require
limited distribution within the addressed activity. PSEUDO-SPECAT.

2-30
SPECAT and SPECAT EXCLUSIVE FOR messages The same criteria pertaining to minimize conditions
must be at least Confidential. SPECAT SIOP-ESI noted earlier in this chapter still apply. The releasing
messages are always Top Secret. PSEUDO-SPECAT officer must review and decide on the message’s merit,
messages are normally unclassified messages that which means the message will be sent, either
require limited distribution. Examples of electrically or by another means. When a message is
PSEUDO-SPECAT messages include AMCROSS released, it must include the words “MINIMIZE
messages, urinalysis test results, and HIV test results. CONSIDERED” and “RELEASED BY.”
SPECAT messages are handled only by those Messages that will not be sent electrically during
personnel who are authorized by the commanding minimim periods should be returned to the originator
officer in writing to view them. The types of with the reason for their return. Normally
information assigned SPECAT and handling nontransmitted messages will be sent via U.S. mail if
procedures can be found in NWP 4 (NWP 6-01) and in they meet established security guidelines.
Fleet Communications (U), NTP 4, respectively.
JCS EMERGENCY ACTION MESSAGES
PERSONAL FOR
Joint Chiefs of Staff (JCS) Emergency Action
PERSONAL FOR is the marking applied when Messages (EAMs) contain key instructions or
message distribution must be limited to the named information from high-level authority and have
recipient. Only flag officers, officers in a command predetermined formats (pro forma). Such messages are
status, or their designated representatives may originate transmitted by various communications systems and
PERSONAL FOR messages. normally carry FLASH (Z) precedence. They are vital
messages of an extremely time-sensitive nature, and
NATO RESTRICTED rapid processing is mandatory to achieve the fast
reaction required by their content. Usage and handling
The United States does not have a security procedures are issued by the JCS to those who have a
classification equivalent to NATO RESTRICTED. need to know.
NATO messages classified as restricted must be
safeguarded in a manner similar to FOUO messages. SPECAT messages come in two variations. One
Messages originated by NATO must be handled in type includes both the general SPECAT and the
accordance with NATO Security Procedures (U), SPECAT Single Integrated Operational Plan—
OPNAVINST C5510.101. Extremely Sensitive Information (SPECAT SIOP-ESI).
This type of SPECAT message is associated with code
ALLIED RESTRICTED words or projects. For example, a Secret message
whose subject matter deals with a special project
The United States does not have a security entitled “TACAMO” would have a classification line
classification equivalent to ALLIED RESTRICTED. reading SECRET SPECAT TACAMO. SPECAT
However, these messages must be handled in the same SIOP-ESI messages are always classified Top Secret.
manner as Confidential messages. U.S.-originated SPECAT (less SIOP-ESI) messages must be classified
messages containing ALLIED RESTRICTED at least Confidential.
information are marked as “Confidential” immediately The other type of SPECAT message is SPECAT
following the security classification. EXCLUSIVE FOR (SEF). SEF is used only within the
naval community for highly sensitive matters,
MINIMIZE CONSIDERED high-level policy, or when politically sensitive
information is to be passed only to a particular
During an actual or simulated emergency, it may individual. The classification line would then contain
become necessary to decrease the amount of record the name of that individual. For example, a Secret
and/or voice communications on military message destined exclusively for Admiral W. T. Door
telecommunications circuits. When this occurs, it is
would read:
called MINIMIZE. In essence, all messages that are not
urgent will not be transmitted. Those messages that
concern a mission or safety of life are considered SEF messages are reserved for use by flag officers
imperative and, therefore, require transmission during and officers in a command status. These messages are
minimize. not intended for use in operational matters, and they

2-31
may not be readdressed nor referenced in other narrative of the NWPL in accordance with the Naval Warfare
messages. Documentation Guide, NWP 0 (NWP 1-01).
SPECAT messages are handled only by those
NAVAL WARFARE PUBLICATIONS
personnel who are authorized to view them as approved
LIBRARY (NWPL) CLERK
in writing by the commanding officer.
The NWPL clerk is a person assigned by the
NAVAL WARFARE PUBLICATIONS NWPC. The clerk is responsible for the upkeep and
LIBRARY maintenance of the library. The NWPL clerk maintains
all records and receipts in the central file, orders all
The naval warfare publications library (NWPL) is necessary publications and changes thereto, and enters
the designation assigned to that group of all changes and amendments to publications physically
communications and operational publications held in the NWPL. The clerk reports all matters of
designated as part of the publication allowance for the concern to the library custodian.
command. These publications contain required
procedures, signals, and other information of an NWPL ADMINISTRATION
operational or mission-essential nature. They may also
include information involving safety. The NWPL The NWPL custodian issues publications to holders
provides for the central administration and maintenance and short-term users. A holder is a person who has
of communications and operational publications. permanent subcustody of a publication under the central
These publications include, but are not limited to: control of the NWPL. The holder is responsible for
maintaining the publication, entering all changes and
Naval telecommunications publications (NTPs);
amendments, and providing adequate security. A user
Naval warfare publications (NWPs); is a person who checks out a publication for temporary
or short-term custody.
Fleet exercise publications (FXPs);
Signature custody and disclosure records for
Allied tactical publications (ATPs); classified material are maintained as required by the
Allied exercise publications (AXPs); Security Manual. Signature custody of unclassified
publications is not required. However, the records of
USN addenda to allied publications; and the NWPL should provide an up-to-date location of
publications that have been issued to holders or checked
Miscellaneous allied publications. out to users. Where signature custody is not required,
The objective of central administration of naval a locator card maybe used in place of a catalog card to
warfare publications (NWPs) is to ensure that these check out publications to users.
publications are correct and readily available for their
intended use. Some NWPs contain information that is NWPL MAINTENANCE
necessary for the proper performance of individual
duties and is important for individual professional Several basic files are used in maintaining the
development. Therefore, NWPs must be readily NWPL. One is the custody file, which contains a
available for use by individuals with a duty-related need NWPL Catalog Card, OPNAV Form 5070-11 (figure
or a general professional need for the information. 2-11), for each naval warfare publication on allowance
or on board. The purpose of this file is to maintain an
NAVAL WARFARE PUBLICATIONS up-to-date record of the holder and location of each
CUSTODIAN publication. This record also helps keep track of entries
and changes to the publication. The catalog card can
also be used as a custody card and as a destruction
The responsibility for managing the NWPL is
record. When used as a record for security purposes, it
assigned to an officer or senior petty officer who is
must be retained as required by the Security Manual.
responsible to the executive officer, department head,
or division officer. This assignment is a collateral duty, The administrative file, sometimes called the
and the person assigned is known as the naval warfare transaction file, contains designation letters for
publications custodian (NWPC). This person is custodian, local allowance/inventory sheets, the
responsible for the overall administration and security directives file, responsibility acknowledgment forms,

2-32
Figure 2-11.—NWPL Catalog Card.

2-33
publication notice route slips, destruction records, NWPL BINDERS
inspection documentation letters, and copies of all
correspondence pertaining to naval warfare Binders for U.S. naval warfare publications are
publications. Included in the administrative file is the color-coded according to their security classification.
Change Entry Certification form, OPNAV 5070/12, The color codes are RED for Secret, YELLOW for
shown in figure 2-12. This form is filled out by the Confidential, and BLUE for unclassified.
holder of the applicable publication. Material in the Allied/NATO publications have white binders
administrative file must be retained for 2 years. regardless of security classification.

Figure 2-12.—Change Entry Certification form.

2-34
ENTRY OF CHANGES number of the message correction to the original or
revised publication. The last number is the printed
The timely and accurate entry of changes to NWPL change that incorporates the material. For example,
publications is necessary to ensure accurate, up-to-date NMC 7/3 is the 7th message correction and is
information as well as information continuity. The incorporated into the publication by change 3.
NWPL clerk is responsible for making changes or
corrections to NWPL publications or ensuring that PUBLICATION NOTICE
holders receive. and make the changes in a timely
manner.
A publication notice gives a brief summary of a new
Changes are often so numerous that all publication or change. The notice is included with each
communications personnel may become involved in hardback copy and is furnished solely for routing by the
making them. The NWPL clerk is responsible for NWPC. These notices keep all cognizant personnel
ensuring that all personnel making changes or informed of the changes to naval warfare publications.
corrections to NWPL publications know the proper The notices are destroyed when no longer useful.
procedures for making these changes. These
procedures are a follows:
WATCH-TO-WATCH INVENTORY
l Check the Foreword or Letter of Promulgation
of the change for the effective date of the To ensure positive control of NWPL publications,
change/correction to ensure that the publication
a watch-to-watch inventory should be conducted. At
to be corrected is effective.
the change of each watch, the watches jointly conduct
l Read all the specific instructions contained in the a visual inventory of every publication held by the
change or correction before making the entry. watch section. Those loose-leaf publications requiring
a page check at the end of the watch must be indicated
l Use any dark ink EXCEPT RED for pen-and-ink on the inventory sheet.
entries. Red is not visible under red night lights
used aboard ship. The signing of the watch-to-watch inventory by the
relieving watch certifies that the publications were
l Type lengthy pen-and-ink corrections on a
sighted, the required page checks were conducted, and
paste-in cutout. All superseded matter must be that the relieving watch stander is responsible for them.
deleted in ink prior to inserting the cutout. Any discrepancies should be resolved prior to the
l Use flaps when no room exists for a cutout. relieving of the watch.
When used, flaps should be attached to the
All signatures in the watch-to-watch inventory
binder side of the page. must be in ink. The inventory may be destroyed after
l Use rubber cement or mucilage for pasting 30 days if it is no longer needed for local reference. If
instead of glue or gummed tape. watch-to-watch inventories are not required aboard
ship, a daily inventory is required.
l Make a notation in the margin adjacent to the
entry after making pen-and-ink corrections,
citing the source of the correction; for example, EXTRACTS
ALCOM 007/96.
After page changes are entered, a page check must Naval warfare publications may be extracted/
be conducted and the page change and page check reproduced for use in training or operations of U.S.
recorded on the Record of Changes and Corrections forces. All extracts must be properly marked with the
sheet. security classification and safeguarded in accordance
with the Security Manual.
Corrections to NWPL publications are issued by
message when the material requires rapid The classification assigned to an extract is the
dissemination. These numerical message corrections highest classification assigned to any article, paragraph,
(NMCs) are normally sent as general messages. NMCs page, or pages from which the information is taken.
are assigned a two-number designation separated by a Guidance for allied (NATO) publications is found in
slant sign. The first number indicates the sequential their NATO letters of promulgation.

2-35
RECEIVING NEW OR REVISED NAVAL WARFARE PUBLICATIONS
PUBLICATIONS
Naval warfare publications (NWPs) incorporate the
When new or revised publications are received, you results of fleet tactical development and evaluation
should check the Foreword and the U.S. Letter of programs and fleet and allied (NATO) experience.
Promulgation for the effective status of the publication. NWPs also provide information about the tactical
The Foreword shows the effective status of the capabilities and limitations of equipment and systems.
publication for allied usage; the U.S. Letter of NWP 0 (NWP 1-01) provides guidance for managing
Promulgation for U.S. use. the NWPL and lists the publications contained in the
library.
A revision to a publication can be issued that is
effective for U.S. use but not for allied use. Particular
care should be taken not to destroy the previous edition FLEET TELECOMMUNICATIONS
until the new revision is effective for allied use as well. PUBLICATIONS

Fleet telecommunications publications (FTPs) are


ALLIED COMMUNICATIONS the guiding doctrine of a NCTAMS for the
PUBLICATIONS communications area under its jurisdiction. To provide
optimum communications responsiveness to fleet
With worldwide cooperation among friendly requirements. FTPs incorporate the unique
nations and the United States, the need arose for communications procedures for the COMMAREA into
coordinated and standardized communications. To a standardized fleet-oriented procedural document.
meet this need, the allied communications publications FTPs are based on the NTP series.
(ACPs) were developed. The ACP series provides
communications instructions and procedures essential COMMUNICATIONS INFORMATION
to conducting combined military operations and BULLETINS
communications in which two or more allied nations are
involved. A Radioman’s work often requires
familiarity with ACPs. Communications information bulletins (CIBs) are
developed by each NCTAMS to provide reference
information on specific tactical communications
JOINT ARMY-NAVY-AIR FORCE subjects. CIBs also provide communications operating
PUBLICATIONS personnel with communications procedural
information applicable to a specific COMMAREA.
Joint Army-Navy-Air Force publications NTP 4 lists the CIBs and their contents.
(JANAPs) were developed to coordinate and
standardize communications among the U.S. military
services. The publication Status of Noncryptographic SUMMARY
JANAPs and ACPs, JANAP 201, lists the short and long As you have learned from this chapter, the naval
titles, content of each publication, and the current communications establishment is quite complex. We
edition of JANAPs and ACPs. communicate not only with other U.S. naval
commands, both at sea and ashore, but also with other
NAVAL TELECOMMUNICATIONS U.S. military services and allied nations. Before the
PUBLICATIONS messages that you send reach their destinations, they
may travel through other networks in the Defense
Communications System.
Naval telecommunications publications (NTPs) are
the main communications publications in use by the We have introduced you to the basic principles of
U.S. Navy, Coast Guard, and Marine Corps. The NTPs communications management, evaluation of both
include information and guidance from basic personnel and the work area, and duties of individual
communication information (NTP 4), to frequency positions within the command. We have also covered
spectrum management (NTP 6), and commercial traffic various categories of messages that have both internal
(NTP 9), just to name a few areas of communications. and external use in the message center.

2-36
This chapter has introduced you to the standard The various publications that you, as a
procedures associated with handling incoming and communicator, rely on are continually being updated.
outgoing messages. Because of the volume of Communications is an area that is constantly changing
messages a telecommunications center processes, it is in areas of equipment and procedures. Therefore, it is
essential that communications personnel observe all the important you become thoroughly familiar with all the
handling procedures to prevent losing or delaying publications and current changes that pertain to your
delivery of messages to subscribers. communications area.

Understanding the communication plan will give The tasks of a message center are extremely
you a view of the ever-changing overall plans for your important. Your understanding of the handling
ship or shore station and its requirements for mission procedures is key to providing fast and accurate
completion. communication to the fleet.

2-37
CHAPTER 3

COMMUNICATIONS SECURITY

LEARNING OBJECTIVES

Upon completing this chapter, you should be able to do the following:

Identify the procedures used in handling, inventorying, destroying, and


setting up COMSEC equipment.

Identify reports and forms associated with CMS reporting requirements.

Identify the procedures and measures to be used with transmission security.

As a Radioman, you will often deal with sensitive In this chapter, we will see how these elements of
subject matter that requires special security handling. COMSEC are unique to the duties of a Radioman.
It is for this reason that we have communications
security (COMSEC). Within the framework of CRYPTOSECURITY
COMSEC, we have directives and requirements that
deal specifically with communications material. The Navy has instituted a unique distribution
system to achieve technically sound cryptosystems.
COMSEC involves all the protective measures The Navy has also developed strict accountability and
taken to deny unauthorized persons information control procedures to ensure proper use of
derived from the possession and study of telecom- cryptosystems.
munications relating to national security. COMSEC
also consists of the measures taken to ensure the COMMUNICATIONS SECURITY
authenticity of our communications. COMSEC MATERIAL SYSTEM
includes the following: (CMS)
Cryptosecurity, which results from measures The CMS is designed to ensure the proper
taken to provide technically sound cryptosys- distribution, handling, and control of COMSEC
tems and their proper use; material and to maintain the cryptographic security of
Physical security, which results from physical communications. Procedures governing the CMS can
be found in Communications Security Material System
measures taken to safeguard COMSEC material
(CMS) Policy and Procedures Manual, CMS 1.
and information;
Transmission security, which results from CMS Account
measures designed to protect transmissions from
interception and exploitation by means other Every command with a CMS account is assigned
than cryptoanalysis; and an account number by the Director, Communications
Security Material System (DCMS). A command or
Emission security, which results from measures activity with a CMS account number receives its
taken to deny unauthorized persons information COMSEC material directly from national and Navy
derived from the interception and analysis of sources. A CMS account command may also be
emanations from crypto and telecommunica- responsible for COMSEC material transferred to other
tions equipments. commands. The command assigns a CMS custodian

3-1
and alternates the responsibility for all overall CMS Witness
management of the CMS account.
There may be times when you will be assigned as a
CMS Custodian and Alternate CMS witness. You will be responsible for assisting a
Custodians custodian or user in performing routine administrative
tasks related to the handling of COMSEC material. As
a witness, you must be familiar with applicable CMS
The CMS custodian is the person designated in procedures and command directives.
writing by the commanding officer to maintain the CMS
account for the command. The alternate custodians are
CMS Responsibilities
also designated in writing by the commanding officer
and assist the CMS custodian.
Whether you are a CMS user or a witness, you are
In the custodian’s absence, the alternates assume responsible for the proper security, control,
the duties of the custodian. Their duties include accountability, and destruction of CMS material in your
receiving, inventorying, destroying, and issuing workspace. Everyone involved with CMS material
COMSEC material and equipment to authorized users must comply with the procedures in CMS 1-related
administrative and procedural publications. You must
and local holders. They are also responsible for training also comply with the CMS instructions of the command
all personnel involved in CMS and submitting required and higher authority.
COMSEC reports to the proper authority in a timely
manner. CMS 1 provides details on the responsibilities
CMS Training Requirements
of the CMS custodian and alternates.

The CMS custodian and alternates are responsible


CMS Local Holder for training all personnel involved with COMSEC
material in the proper handling, security, accounting,
A CMS local holder is a command or activity that and destruction of COMSEC material. The CMS
receives its COMSEC material support from a CMS custodian may use the Personnel Qualifications
Standards (PQS) for CMS as a training tool. All
account command. The local holder command has a
personnel who become involved with CMS should
designated CMS custodian and alternates who are complete the PQS training course.
responsible to their commanding officer for the proper
handling of COMSEC material and training of
personnel involved. For example, if a ship drew all of CMS Storage Requirements
its COMSEC material from a central account
maintained by the squadron commander, the ship would COMSEC material must be stored separately from
have to be a local holder. Local holders must draw all non-COMSEC material. This helps ensure separate
control for COMSEC material and makes emergency
of their material from only one CMS account and may destruction of COMSEC material easier. COMSEC
not be local holders to two or more accounts. material of different security classifications may be
stored in the same security container drawer. COMSEC
CMS User material, however, must be segregated according to
classification so that it can be destroyed in a timely
manner in an emergency.
A CMS user is an individual who requires
COMSEC material to accomplish an assigned duty or Storage requirements for COMSEC keying
material are more stringent than for nonkeying material.
who needs COMSEC material for advancement study
All COMSEC keying material requiring two-person
or training purposes. A CMS user must be properly integrity (TPI) must be stored in such a manner that a
cleared and authorized by the commanding officer to single person, including the CMS custodian, cannot
handle CMS material. As a Radioman, you will most obtain access. CMS 1 lists the storage requirements for
likely become a user of COMSEC material. COMSEC keying material.

3-2
Receipt 1 . Transfer Report— Used to document and
report the transfer of COMSEC material from
When COMSEC material is issued to a watch one CMS account to another or one holder to
station, the area must be occupied and operated on a another.
24-hour, 7-day-a-week basis; an 8-hour, 5-day-a-week 2 . Destruction Report— Used to document or
basis; or any similar basis (for example, combat report the physical destruction of COMSEC
information center (CIC)). COMSEC material material. The destruction must be witnessed by
received at a watch station must be signed for on a local two appropriately cleared and authorized
custody document. persons. The report must be completed
When you are on duty, the watch supervisor is immediately after the material is destroyed.
responsible for all the COMSEC material listed on the Destruction reports are not normally submitted
watch-to-watch inventory. Additionally, any required to DCMS unless directed to do so by DCMS.
page checks will be conducted prior to assuming a. Local destruction— Destruction will be
responsibility for the listed COMSEC material. documented and retained locally using a SF
Any inventory discrepancies found must be 153, or a locally prepared equivalent form
reported immediately to the CMS custodian or an (CMS 25). Top Secret and Secret
alternate custodian in accordance with CMS 1 and also destruction reports must be kept for 2 years.
logged in the RADAY log. Local destruction records are mandatory for
all AL 1 and 2 COMSEC, regardless of
classification, and optional for AL 3 and 4
CMS Inventory
COMSEC material classified Confidential
and below.
Each time a watch section changes, the oncoming
watch supervisor and a witness must inventory all 3 . Receipt Report— Used to document or report
COMSEC material held at a watch station. Two-person receipt of COMSEC material (usually used with
integrity must be maintained at all times during the a transfer report).
inventory. When you inventory COMSEC material, 4 . Inventory Report— Used to document and
you must do the following: report the physical inventory of COMSEC
Account for all keying material and page-check material. There are three types of CMS
open keying packages; inventories. Fixed-cycle (FC), Special, and
Combined.
Visually inventory all COMSEC equipment and
a. Fixed-cycle inventory is to ensure that all
account for equipment by quantity; and
accounts satisfy the national requirements
Page-check all COMSEC publications. for a semiannual inventory of keymat and an
annual inventory of equipment and
The inventory sheet must list COMSEC material by
publications.
short title, edition, and accounting number (if any).
Both persons must sign the inventory sheet. CMS 1 b. Special SF 153 inventory is to satisfy the
outlines the requirements for inventorying COMSEC Navy requirement to conduct and document
material. the mandatory Change of Command and
Custodian inventories.
COMSEC Material Accounting Reports c. Combined SF 153 inventory may
sometimes be used for both the requirements
COMSEC material accounting reports provide an for a Fixed-cycle inventory and a Special
audit trail for all accountable COMSEC material. inventory.
Reports may be prepared manually or be computer-
5 . CMS 25 ONE-TIME KEYING MATERIAL
generated. There are specific requirements for
DESTRUCTION REPORT— This report is a
submitting all reports, including where they go and who
two-sided document used to record destruction
they go to. These requirements are found in CMS 1.
of individual, one-time keying material
The following reports are briefly described as to segments of COMSEC material. Side one is
their general use. This list is not all-inclusive. numbered 1-31 for daily use; the reverse side

3-3
explains the digraphs that are printed to the left 6. CMS 25B COMSEC KEYING MATERIAL
of the short title on each segment of extractable LOCAL DESTRUCTION REPORT- The
tape (figure 3-l). CMS 25B is a two-sided report used to record
CONFIDENTIAL (When Filled In)
CMS-25 ONE-TIME KEYING MATERIAL DESTRUCTION REPORT
Retain this form locally lAW Annex T, CMS 1. SeeChapter 7, Art 790 for instructions on destroying one-time keying
material
These individual one-time keying material cards or segments were destroyed on the dates and by the two
individuals indicated below:

Formal destruction of the entire publication iu accordancewith CMS 1 on TN dated


Grade/Signature Grade/Signature
CLASSIFIED BY CMS-1 I

CONFIDENTIAL (When Filled In)


Figure 3-lA.-CMS-25 ONE-TIMEKEYING MATERIAL DESTRUCTIONREPORT(front).

3-4
Figure 3-1B.—CMS-25 ONE-TIME KEYING MATERIAL DESTRUCTION REPORT (back).

3-5
destruction of keytape segments of COMSEC of segmentsl-31A must be recorded on the “A”
keying material packaged in the “VF” format side and segmentsl-3 1B on the “B” side (figure
(62 unique segmentsper canister). Destruction 3-2)
CMS25B COMSEC KEYING MATERIAL LOCAL DESTRUCTION REPORT
The individuals whose signatures appear below, certify that they have destroyed the individual keytape
segmentson the dates indicated. Retain this form in accordancewith Annex T,
CONFIDENTIAL (When filled in)
Signature Signature Date of Destruction

,
29A
30A
31A

(Command Title and Account Number)

SHORT TITLE EDITION REG# AL Code


Classified by: CMS 1
Declassify on: Originating Agency’s Determination Required.
CONFIDENTIAL (When filled in)
Figure3-2A.-CMS 25B COMSECKEYING MATERIAL LOCAL DESTRUCTIONREPORT(front).

3-6
CMS25B COMSEC KEYING MATERIAL LOCAL DESTRUCTION REPORT
The individuals whose signatures appear below, certify that they have destroyed the individual keytape
segmentson the dates indicated. Retain this form in accordancewith Annex T.
CONFIDENTIAL (When filled in)
Se Signature Signature Date of Destruction

2A
3A
4A
5A
6A -
7A
8A
9A
10A
11A
12.4
13A
.I.
14A
15A
16A
17A

(Command Title and Account Number)

-- -
SHORT TITLE EDITION REG # AL CODE
Classified by: CMS 1
Declassify on: Originating Agency’s Determination Required.
CONFIDENTIAL (When filed in)
Figure3-2B.-CMS 25B COMSECKEYING MATERIAL LOCAL DESTRUCTIONREPORT(back).

3-7
7. CMS 25MC COMSEC KEYING after supersession. Superseded authentication
MATERIAL LOCAL DESTRUCTION publications and document; must be destroyed no later
REPORT- The CMS 25MC is used to record than 5 days after supersession.
destruction of multiple-copy segments of
EMERGENCY DESTRUCTION.- COMSEC
COMSEC keying material packaged in
canisters (figure 3-3). material that must be destroyed in an emergency is
divided into three categories:
CMS Destruction l Keying material;
As a Radioman, you may very well be involved l COMSEC documents;and
with the routine destruction of COMSEC material. The * COMSEC equipment.
destruction methods that we discussed earlier are also
used for COMSEC material. CMS 1 gives complete As we mentioned earlier, an emergencyplan consistsof
details on priority of destruction of CMS materials. both precautionary destruction and complete
destruction.
ROUTINE DESTRUCTION.- Superseded
COMSEC material must be destroyed as soon as PRECAUTIONARY DESTRUCTION.- When
possible after supersession. Keying material marked precautionary destruction is ordered, COMSEC
“CRYPTO” must be destroyed no later than 12 hours material must be destroyed as follows:

CMS25B COMSEC KEYING MATERIAL LOCAL DESTRUCTION REPORT


The individuals whose signatures appear below, certify that they have destroyed the individual keytape
segmentson the dates indicated. Retain this form in accordance with Annex T.
CONFIDENTIAL (When filled in)
Seg/Copy # Signature Signature Date of Destruction

(Command Title and Account Number)

SHORT TITLE EDITION REG# AL CODE


Classified by: CMS 1
Declassify on: Originating Agency’s Determination Required.
CONFIDENTIAL (When filled in)
Figure3-3.-CMS 25MC COMSECKEYING MATERIAL LOCAL DESTRUCTIONREPORT.

3-8
Keying Material— Superseded keying material VERIFY DESTRUCTION.— There are two parts
must be destroyed first, then keying material that to verifying the destruction of COMSEC material,
becomes effective in 1 or 2 months. witnessing and inspection of destroyed material.

Nonessential Classified COMSEC Two individuals conducting the destruction must


Documents— This material includes personally witness the complete destruction of the
material. Then, they will sign and date the destruction
maintenance, operating, and administrative
documents after all material has actually been
manuals.
destroyed.
COMPLETE DESTRUCTION.— When com-
An inspection of the destroyed material must ensure
plete destruction is ordered, COMSEC material must be
that the destruction is complete and the destruction
destroyed as follows: device is working properly. When using shredders,
Keying Material— Keying material is always choppers, pulverizers or pulpers, you need only to
destroyed first in the following order: superseded, examine a sample of the residue. If you are using an
effective, then reserve. incinerator, verify that all residue is broken up by
stirring or sifting through the remains.
Superseded keying material that has been used to
encrypt traffic is the most sensitive of the three The last detail is to inspect the surrounding area
categories. If superseded keying material falls into afterwards to ensure that no material escaped during the
destruction process.
enemy hands, all past intercepted traffic is subject to
compromise and analysis. Superseded keying material The destruction plan itself is contained in the
must be destroyed within 12 hours after supersession. overall emergency plan. The emergency plan should
always provide for securing, removing, or destroying
Effective keying material is destroyed after the material, depending on the situation.
superseded keying material. Reserve keying material
is keying material that will become effective within the The appropriate course of action and timing should
next 30 days. Reserve keying material is destroyed be stated in the overall destruction plan. For example,
after effective keying material. if there is a local civil uprising that appears to be
short-lived, destroying all material would probably not
Keying material must be stored in priority order for be necessary. In this situation, a partial destruction of
destruction. Top Secret material must be destroyed the more sensitive superseded material might be made,
ahead of Secret material, and Secret material destroyed some of the remaining material removed, and the rest
ahead of Confidential material. This applies to all secured.
categories of keying material.
The commanding officer will normally implement
COMSEC Documents— COMSEC documents the emergency plan. Should the situation prevent
are destroyed next. COMSEC documents contact with the commanding officer, other individuals,
include cryptoequipment maintenance manuals, such as the COMSEC officer or COMSEC custodian,
operating instructions, general publications, are usually authorized to implement the plan. During
status publications, CMS-holder lists and an emergency, personnel safety overrides the
destruction priority.
directories. COMSEC documents contain
information on the types of cryptoequipments
we use, the level of technology we have attained, TWO-PERSON INTEGRITY
and the way our COMSEC operations are
organized and conducted. Two-person integrity (TPI) is the security measure
taken to prevent single-person access to COMSEC
COMSEC Equipment— COMSEC equipment keying material and cryptographic maintenance
is destroyed last. In emergencies, the immediate manuals. TPI is accomplished as follows:
goal regarding cryptoequipment is to render the
equipment unusable and unrepairable. The The constant presence of two authorized persons
when COMSEC material is being handled;
operating and technical manuals for
cryptoequipments provide details on the The use of two combination locks on security
techniques for rapid and effective destruction. containers used to store COMSEC material; and

3-9
The use of two locking devices and a physical CRYPTO-RELATED INFORMATION—
barrier for the equipment. Crypto-related information may be classified or
unclassified. It is normally associated with
At no time can one person have in his or her
cryptomaterial but is not significantly
possession the combinations or keys to gain lone access
descriptive of it. In other words, it does not
to a security container or cryptographic equipment
describe a technique or process, a system, or
containing COMSEC material. Neither can one person
equipment functions and capabilities.
have sole possession of COMSEC material that requires
Crypto-related information is not marked
TPI security.
“CRYPTO” and is not subject to the special
safeguards normally associated with
CRYPTOGRAPHIC OPERATIONS AND cryptoinformation.
OPERATOR REQUIREMENTS
CRYPTOSYSTEM— The term “cryptosys-
As a Radioman, you will be required to learn and tern” encompasses all the associated items of
understand the more detailed procedures and processes cryptomaterial that are used together to provide
involving cryptographic operations. Cryptographic a single means of encryption and decryption.
procedures and associated equipments are governed by
All items of a related nature that combine to form a
many strict rules and standards. To understand
system must be given the strictest security. Any failure,
cryptographic operations and their importance, you
equipment, or operator that adversely affects the
must understand the following terminology:
security of a cryptosystem is called cryptoinsecurity.
CRYPTO— The marking “CRYPTO” is not a
GENERAL AND SPECIFIC CRYPTO-
security classification. This marking is used on
SYSTEMS— During your cryptographic duties,
all keying material and associated equipment to
you will sometimes hear the terms “general” and
protect or authenticate national security-related
information. All material and equipment “specific” applied to some cryptosystems. A
general cryptosystem consists of a basic
marked “CRYPTO” require special
principle and method of operation, regardless of
consideration with respect to access, storage, and
the cryptomaterials used. In other words,
handling.
regardless of the types of materials or elements
CRYPTOMATERIAL— The term “crypto- used, the method of operation will always be the
material” refers to all material, such as same, whether encrypting, decrypting, or
documents, devices, or apparatus, that contain authenticating.
cryptoinformation. Furthermore, the material A specific cryptosystem is one within a general
must be essential to the encryption, decryption, system that is necessary and confined to actual
or authentication of telecommunications. encryption, decryption, or authentication. These
Cryptomaterial is always classified and is systems are identified by the short and long titles of their
normally marked “CRYPTO.” variables.
Cryptomaterial that supplies equipment settings
and arrangements or that is used directly in the CRYPTOVARIABLES— A cryptovariable is
encryption and decryption process is called keying an element of a cryptosystem that directly affects
material. Keying material is afforded the highest the encryption and decryption process. These
protection and handling precautions of all information variables are divided into two types: primary
and material within a cryptosystem. Keying material is and secondary.
always given priority when an emergency plan is A primary cryptovariable is the most readily and
implemented. frequently changed element of a cryptosystem. A
secondary cryptovariable is one that permits change of
CRYPTOINFORMATION— The category of
circuit operation without altering the basic equipment.
cryptoinformation is always classified. This A secondary cryptovariable must also be used in
type of information normally concerns the conjunction with appropriate primary variables.
encryption or decryption process of a
cryptosystem. It is normally identified by the The commanding officer is responsible for ensuring
marking “CRYPTO” and is subject to all the that personnel are thoroughly trained and certified for
special safeguards required by that marking. cryptographic duties. This training may be formal or

3-10
on-the-job training. The CMS custodian is responsible All an operator would have to do is observe the alarm
for ensuring that cryptographic operators receive the indications and ensure the alarm indicator returns to
training necessary to perform these duties and that they operate. The electronic key would normally come from
meet the following minimum qualifications: the Net Control Station (NCS).
Be properly cleared for access to the material The added feature of OTAT is that the key can be
with which they will be working; extracted from an OTAT-capable cryptosystem using a
KYK-13 or KYX-15/KYX-15A. The key is then
Be authorized by the commanding officer to loaded into another cyptosystem as needed. More
perform crypto duties; and detailed information on OTAR/OTAT is available in the
Be familiar with local crypto procedures. Procedures Manual for Over-the-Air Transfer (OTAT)
and Over-the-Air Rekey (OTAR) and Field Generation
and Over-the-Air Distribution of Tactical Electronic
TRANSMISSION SECURITY Key, NAG-16C/TSEC.
Transmission security results from measures
designed to protect transmission from interception and Authentication
exploitation by means other than cryptographic
analysis. In the next paragraphs, we will discuss Authentication is a security measure designed to
specific methods of transmission security. protect a communications or command system against
fraudulent transmissions or simulation. Authenticating
COMMUNICATIONS SECURITY systems have instructions specifying the method of use
(COMSEC) EQUIPMENT and transmission procedures. By using an
authenticating system properly, an operator can
There are numerous types of cryptographic distinguish between genuine and fraudulent stations or
equipment used throughout the Navy. However, they transmissions. A station may include authentication in
all perform the same basic function—to encipher or a transmitted message. This security measure is called
decipher a communications signal. transmission authentication. The types of
authentication are:
During secure transmission, the cryptoequipment
accepts a “plain text” teleprinter or data signal l Challenge and Reply— This is a prearranged
containing classified information from the classified system whereby one station requests
(red) patch panel and adds a “key” (randomly chosen authentication of another station (the challenge).
bits generated internally). This composite signal is By a proper response, the latter station
relayed as an encrypted signal. establishes its authenticity (the reply).
Following this encryption, the signal is fed to the l Transmission Authentication— A station
unclassified (black) patch panel where it is patched establishes the authenticity of its own
directly to a converter. This converted audio signal is transmission by either a message- or a
then routed to the transmitter for transmission. self-authentication method. A message
authentication is a procedure that a station uses
Over-the-Air Rekey/Transfer (OTAR/OTAT) to include an authenticator in the transmitted
message. Self-authentication is a procedure that
Many of the new cryptosystems that use the 128-bit a station uses to establish its own authenticity,
electronic key (ANDVT, KY-58, KG-84A/C, and and the called station is not required to challenge
KY-75) are now capable of obtaining new or updated the calling station.
key via the circuit they protect or other secure
communications circuits. This process is known as The following examples are instances when
over-the-air rekey (OTAR) or over-the-air transfer authentication is mandatory:
(OTAT). The use of OTAR or OTAT drastically reduces l A station suspects intrusion on a circuit;
the distribution of physical keying material and the
physical process of loading cryptoequipments with key l A station is challenged or requested to
tapes. authenticate;
A station may have nothing to do with actual l A station directs radio silence or requires another
physical CRYPTO changeovers on a day-to-day basis. station to break an imposed radio silence; and

3-11
A station transmits operating instructions that Several audio tones used in rapid sequence to
affect communications, such as closing down a amplitude modulate a carrier (called bagpipe
station, shifting frequency, or establishing a from its characteristic sound).
special circuit. Interference is normally a nondeliberate intrusion
You can find further information on authentication upon a circuit. It unintentionally degrades, disrupts,
in Communications Instructions—Security (U), ACP obstructs, or limits the effective performance of
122. electronic or electrical equipment. Interference usually
results from spurious emissions and responses or from
MEACONING, INTRUSION, JAMMING, intermodulation products. Sometimes, however,
AND INTERFERENCE (MIJI) interference may be induced intentionally, as in some
forms of electronic warfare. An example of
MIJI is a term used to describe four types of interference is the interruption of military transmissions
interference that you are likely to experience in a given by a civilian radio broadcast.
situation. The more effective methods of dealing with MIJI
Meaconing is the interception and rebroadcast of are contained in Fleet Communications, NTP 4, and in
navigation signals. These signals are rebroadcast on the Reporting Meaconing, Intrusion, Jamming, and
received frequency to confuse enemy navigation. Inteference of Electromagnetic Systems, OPNAVINST
Consequently, aircraft or ground stations are given 3430.18.
inaccurate bearings. Meaconing is more of a concern
to personnel in navigation ratings than to you as a
Radioman. However, communications transmitters are SUMMARY
often used to transmit navigation signals. Since In this chapter we introduced you to the basic
communications personnel operate the transmitters, concepts of communications security, described
they must know how to deal with any communications various cryptosystems, and familiarized you with the
problems resulting from meaconing. procedures and methods of transmission security.
Intrusion is defined as any attempt by an enemy to As a Radioman, you have a two-fold job concerning
enter U.S. or allied communications systems and security. The first, of course, is to properly perform
simulate our traffic to confuse and deceive. An your duties within general security guidelines. Security
example of intrusion is an unauthorized radio guidelines pertain to everyone in every official capacity.
transmission by an unfriendly source pretending to be Second, you must also perform your duties in such a
part of an air traffic control service and giving false manner as to protect the integrity and overall value of
instructions to a pilot. secure communications.
Jamming is the deliberate radiation, reradiation, or Security violations result from bad personal habits,
reflection of electromagnetic signals to disrupt enemy
security indifference, occupational fatigue, or
use of electronic devices, equipment, or systems. In ignorance of established regulations. When security
jamming operations, the signals produced are intended
violations occur in installations located in foreign
to obliterate or obscure the signals that an enemy is
countries, the violations become more serious because
attempting to receive. Some common forms of
of an activity’s greater vulnerability to hostile
jamming include:
exploitation. With respect to COMSEC, security
l Several carriers adjusted to the victim frequency; violations could prove costly.
l Random noise amplitude-modulated carriers; Security precautions mentioned in this chapter do
not guarantee complete protection, nor do they attempt
l Simulated traffic handling on the victim to meet every conceivable situation. Anyone who
frequency; adopts a commonsense outlook can, however, solve
l Random noise frequency-modulated carriers; most security problems and gain a knowledge of basic
security regulations. For information on local security
l Continuous-wave carrier (keyed or steady); and rules, study your command’s security regulations.

3-12
CHAPTER 4

AIS SECURITY

LEARNING OBJECTIVES

Upon completing this chapter, you should be able to do the following:

l Identify the procedures for issuing and updating user identification and
passwords and for validating customer authorization.

l Identify the procedures for performing, directing, and validating security


inspections and for reporting and investigating security violations.

l Identify the procedures for developing and updating security plans.

l Recognize how to implement and evaluate countermeasures and


contingency plans.

l Identify the procedures for preparing and updating emergency action


plans.

l Explain how to implement and evaluate security test and evaluation


procedures.

l Explain how to safeguard AIS classified material.

AIS security is a cycle of events that never ends. your AIS facility. It is protecting equipment, media,
You start with the development of a security plan for the data and people. AIS security is limiting access,
facility. This plan includes conducting an in-depth risk avoiding misuse, and preventing destruction. It is
assessment covering different types of disasters that preventing changes to data that would make the data
threaten the security of the AIS facility. Once the unreliable. It covers the denial of service and the
security plan is in place, the inspections begin. You will destruction of computer rooms, the loss of
be responsible for preparing the inspection plan and confidentiality, fraud, the theft of computer time as well
conducting the inspection using the guidelines provided as the computer itself. AIS security is a critical part of
in the security instructions. your job.
In this chapter, you will learn about AIS As you probably noticed from reading the learning
security—from the implementation of the security plan objectives, AIS security has its own terminology and
through conducting security inspections. This includes jargon. To carry out your AIS responsibilities, you need
AIS threat and risk analysis, disaster protection, to be familiar with these terms and their meanings.
contingency planning, inspection preparation, and data
privacy. AIS SECURITY CONCEPTS

Our AIS security goal is to take all reasonable


WHAT IS AIS SECURITY?
measures to protect our AIS assets. Keep in mind that
AIS security is more than protecting classified AIS assets (hardware, software, data, supplies,
information and keeping unauthorized personnel out of documentation, people, and procedures) have value.

4-1
Their value can usually be stated in dollar terms. It costs failures and compromising emanations are also threats.
money to repair or replace hardware. It costs money to Another term associated with threats is their probability
reprogram and redocument. It costs money to retrain of occurrence. What is the likelihood that something
personnel. Unauthorized access costs money. Service will happen? Probabilities are measured in time—once
delays cost money. a pico second, once a memory cycle, once a fiscal year,
once a century.
AIS Assets
Vulnerability
Our AIS assets (figure 4-1) include the facilities,
hardware, software, data, supplies, documentation, Threats cannot reach an AIS asset without the aid
people and procedures. These assets combine to and assistance of a vulnerability. Vulnerabilities are the
provide service. Service is computer time, holes threats sneak through or weaknesses they exploit.
telecommunications, data storage, user support, Vulnerabilities are caused by lack of AIS security
application system development, and operation. planning, poor management, disorganization, disorder,
Service must be available to those authorized to receive inadequate or improper procedures, open data and open
it when they request it. Information is at the top of the door policies, undocumented software, unaware or
triangle. It is the ultimate AIS asset. Information is the unconcerned personnel. You can help limit the
reason the rest exists. vulnerabilities by following established AIS security.
policies and procedures.
Threats
Successful Attacks and Adverse Events
Threats are things that can destroy your assets
(figure 4-2). Easy to recognize, threats come in two Successful attacks and adverse events result from a
basic forms: people and environmental changes. combination of threats, vulnerabilities, and AIS assets.
People are a threat because they sometimes do When a threat takes advantage of a vulnerability and
unexpected things, make mistakes, or misuse resources, does harm to your AIS assets, a successful attack or
steal, subvert, and sabotage (deliberate threats). Some adverse event has occurred. Successful attacks and
of us even smoke and spill soft drinks in computer adverse events may be roughly grouped as losses or
rooms. Environmental threats are things like heat, abuses. You can lose hardware, software, and data.
humidity, explosions, dust, dirt, power peaks, power You can lose documentation and supplies. You can lose
failures; and natural disasters like fire, floods, key staff personnel. Losses often result in denial of
hurricanes, thunderstorms, and earthquakes. Hardware service, preventing access to information when it is

Figure 4-1.—AIS assets.

4-2
Figure 4-2.—Threats to AIS assets.

needed. Abuse relates to unauthorized access to Likelihood and Risk


service, unwanted destruction or alteration of data and
software, and unauthorized disclosure of classified Likelihood and risk relate to successful attacks and
information. adverse events. Likelihood relates to chance-what is
We have an adverse event with every fire and with the likelihood (probability) that a successful attack or
every flood caused by a broken pipe in a computer an adverse event will occur? Risk has to do with
money; it tells us about the cost of loss or abuse from
room. We have a successful attack with every bowling
an adverse event overtime. We first ask, “What is the
score, recipe, or school paper stored online, and with value of the AIS asset that will be abused or that we will
every computer hacker that plays crash-the-computer lose if a given successful attack or adverse event
or scramble-the-data. occurs?” Then we ask, “How often can we expect that

4-3
particular attack or event to occur?” Remember, the TECHNICAL CONTROLS.— Technical con-
successful attack or adverse event results from a trols are embedded in hardware, software, and
particular threat exploiting a particular vulnerability. It telecommunications equipment. They are diagnostic
is very specific reasoning. The greater the value of the circuitry, component redundancies, and memory
AIS asset and the more likely the successfid attack or protect features. They are controls built into the
adverse event, the greater the risk. Figure 4-3 shows operating system. They include log-on IDs and
this risk analysis concept. Risks are usually expressed passwords to enable only authorized users access to the
in terms of dollars per year, the annual loss expectancy. computer system. They are accounting routines,
encryption coding, and audit trails.
Countermeasures ADMINISTRATIVE CONTROLS.— Ad-
ministrative controls concern people and procedures.
Once the threats and vulnerabilities are known and They include who is authorized to do what, methods to
the likelihood and risk of a successful attack or an keep track of who enters a sensitive area, who receives
adverse event are determined, a plan is developed to set
a delivery, and who requests a sensitive report. The
up countermeasures (controls) to lessen or eliminate the operating procedures you follow will sometimes
vulnerabilities. If you have a countermeasure, you have include security requirements. You are responsible for
a protected vulnerability. If you have an unprotected
adhering to the procedures to ensure AIS requirements
vulnerability, you do not have a countermeasure. Some
are met.
countermeasures help us prevent adverse events,
whereas others detect adverse events. We have MANAGERIAL CONTROLS.— Managerial
measures to minimize the effects of successful attacks controls tie everything together. They concern
or adverse events. We also have measures, called planning and evaluation. They include audits to review
contingency plans, to recover from a successful attack the effectiveness and efficiency of the countermeasures.
or an adverse event. Figure 4-4 gives an example of They check to make sure that the measures are actually
each type of security measure strategy as it relates to in place, being followed, and working. Problems found
fire loss. Figure 4-5 shows threats, vulnerabilities, and require replanning and reevaluation to see that
countermeasures to our assets. corrections are made.
Another way to categorize countermeasures is by
type: physical, technical, administrative, and RISK MANAGEMENT
managerial (figure 4-6).
Risk management involves assessing the risks,
PHYSICAL CONTROLS.— We usually think of
determining loss potential estimates, and selecting
physical control first. They include the locked
countermeasures appropriate to prevent, detect,
computer room door, physical layout, fire
minimize, and recover from successful attacks and
extinguishers, access barriers, air conditioners,
adverse events. Management selects the
moisture detectors, and alarms.
countermeasures, making sure that the cost of the
measure is less than the cost of the risk. The trick is to
select the countermeasure that will result in the lowest
total cost while taking all reasonable measures to
protect our AIS assets.
Keep in mind that the presence of a vulnerability
does not in itself cause harm. A vulnerability is merely
a condition or set of conditions that may allow the
computer system or AIS activity to be harmed by an
attack or event. Also, keep in mind that an attack made
does not necessarily mean it will succeed. The degree
of success depends on the vulnerability of the system or
activity and the effectiveness of existing
countermeasures. Countermeasures may be any action,
device, procedure, technique, or other measure that
reduces the vulnerability of an AIS activity or computer
Figure 4-3.—AIS security risk analysis. system to the realization of a threat.

4-4
Figure 4-4.—An example of countermeasures against fire loss.

Figure 4-5.—Threats, vulnerabilities, and countermeasures.

Not all attacks and events can be avoided. If we


cannot reasonably prevent something, we want to detect
the problem as early as possible, minimize the damage
and destruction, and recover as quickly and efficiently
as possible. To help us minimize and recover, we
develop contingency plans.

Contingency plans (backup plans) provide for the


continuation of an activity’s mission during abnormal
operating conditions. These are plans for emergency
response, backup operations, and post-disaster
recovery. They include a preparation phase that
includes the steps to be taken in anticipation of a loss to Figure 4-6.—Types of AIS security countermeasures.

4-5
lessen damage or assist recovery. The action phase In the next paragraphs, you will learn about
includes the steps to be taken after a successful attack management responsibilities, your responsibilities,
or adverse event to minimize the cost and disruption to physical security measures, and data security measures.
the AIS environment. Again, our goal in AIS security is to prevent or
minimize the opportunity for modification, destruction,
disclosure, or denial of service.
SCOPE OF AIS SECURITY
As the Navy has become increasingly dependent on MANAGEMENT RESPONSIBILITY
the use of AIS for its payroll, supply functions, tactical
information, and communications, the need to protect AIS security is everyone’s responsibility, and only
AIS assets has taken on greater importance. Risk the commanding officer (CO) can ensure that AIS
management is an ongoing effort. Whether you are in a security receives the support required at every level.
large AIS facility with a full-time information system The success of your command’s AIS security program
security manager (ISSM) or a facility where the depends upon the support of the CO. The CO and the
functions of the ISSM are a collateral duty, your AIS security staff are responsible for taking the
installation will have established security measures to necessary steps to provide an adequate level of security
protect its AIS assets. for all AIS-related activities, automated information
systems, and networks, including those developed,
The five areas of consideration for the Navy’s AIS
operated, maintained, or provided by contractors.
security program are hardware (I), data (II), human
resources (III), software (IV), and communications Each AIS facility has an information system
(COMM) (V). These are shown in figure 4-7. Because security manager (ISSM). His or her primary duty is to
each AIS facility is different, each facility has its own serve as the single point of contact for all matters
AIS security risk management program. You’ll be relating to AIS security at your command. The ISSM
responsible for following the requirements of your usually reports directly to the CO. Now, let’s talk a little
facility’s AIS security program. about the security staff.

Figure 4-7.—Department of the Navy AIS security areas.

4-6
Many factors determine the numbers and types of out and find out what your responsibilities are, rather
people assigned to the AIS security staff. These factors than finding out the hard way through a bad experience.
include the type of activity, its size, its hardware That brings us to your responsibilities.
configuration(s), types of work to be processed, and so
on. Your command’s AIS security staff may include PERSONAL RESPONSIBILITY
any one, several, or all of the following people:
You play an important role in the success of your
Command security manager; command’s security program. As we stated earlier,
Information system security manager (ISSM); security is everybody’s job, from seaman recruit to
admiral.
Information system security officer (ISSO);
Do not leave listings unattended or files open for
Network security officer (NSO); unauthorized browsing. If you see a stranger in your
work area, it is your job to confront (challenge) that
Terminal area security officer (TASO). individual regardless of his or her rate or rank, job title,
These people are specialists. Some day you may be or status within or outside of your command. For the
one of them. They have been trained and are most part, you know who is authorized to be in your
knowledgeable in such areas as the following: work area.
l General security awareness; As a computer operator, you are responsible for
protecting hardware from fire, flood, sabotage, and
l User and customer security; internal tampering. You are also concerned with
l Security administration; protecting applications software, systems software,
program and data files, and all forms of input and output
* Security violation reporting; media with which you will be working.
l Hardware and software security; If you are working in the magnetic media library,
you are responsible for protecting all library-related
l Systems design security; equipment (tape/disk cleaners, tape degaussers,
l Terminal and device related security; tape/disk certifiers, and so on). If you are handling and
working with classified media and materials, you must
l Telecommunications security; handle, store, and dispose of them in accordance with
established procedures. The same rules apply
l Physical security;
regardless of what area you maybe working in; whether
l Personnel security; you are a data entry operator, a control clerk in
production control (I/O), a computer programmer, or an
l Computer auditing; analyst. All positions require you to pay attention to
l Data security; AIS security. The key word is protect.

l Risk assessment methodology; Believe it or not, AIS security is not really that
difficult to understand, nor is it difficult to carry out.
l Contingency and backup planning; Sixty-five percent of it is nothing more than using good
old common sense; the remaining thirty-five percent
l AIS security and Navy contractors; comes from awareness that you get through proper
l Disaster recovery; training.
l Security accreditation; and Try thinking of AIS security and protecting its
related assets the same way you would protect your
l Security test and evaluation. home and personal effects. In AIS we are talking
millions of dollars, some of them yours. Think about
From this list you can see that AIS security is a
complex area and requires many specialized skills and the kind of AIS security you would want to have
installed if that AIS facility were yours and what you
knowledges. In addition, each member of the AIS
would do to protect all its assets.
security staff is responsible for ensuring that you are
adequately trained in AIS security. Do you know the From this point on, the rest is up to you. Stay alert,
name of your command ISSM? If not, seek him or her keep your eyes and ears open to what is going on around

4-7
you, and never hesitate to challenge or question l Natural disaster protection. The effects of
someone or something that you feel is wrong or out of natural disasters must be prevented, controlled,
character. and minimized to the extent economically
feasible by the use of detection equipment (heat
PHYSICAL SECURITY MEASURES sensors, smoke detectors), extinguishing
systems, and well conceived and tested
Physical security is the one area with which you are contingency plans.
most likely to be familiar. It deals with such things as
personnel, the environment, the facility and its power
Environmental Security
supply(ies), fire protection, physical access, and even
the protection of software, hardware, and data files.
Temperature and humidity can affect the operation
Your command must provide physical security for -
of your computer facility. Whenever possible,
your AIS facility. The degree of physical security at computer equipment is operated within the
your installation or command depends on its physical manufacturer’s optimum temperature and humidity
characteristics, its vulnerability within the AIS range specification. Fluctuations in temperature
environment, and the type of data processed. Minimum and/or humidity over an extended period of time can
physical security requirements include four basic areas cause serious damage to the equipment. So, with that
that your command must address: physical security in mind, you are probably asking yourself, “What are
protection, physical access controls, data file the acceptable levels for computer operation?”
protection, and natural disaster protection. Normally, you can find this information in the
l Physical security protection. Physical security command’s standard operating procedures (SOPs), or
protection takes on two forms. The first is you can check with your supervisor. If neither are
physical barriers, such as solid walls, caged-in available, a safe rule of thumb is a temperature of 72°
areas, bulletproof glass, locked doors, and even Fahrenheit, ±2°, and a humidity of 55%, ±5%.
continual surveillance of the controlled area. To maintain a constant temperature and humidity to
The second involves people and the procedures the computer facility or remote terminal areas, keep all
that you must follow, such as looking up names doors and windows closed. Because temperature and
on the access list to determine who is authorized humidity are vitally important to computer
in a given space or area. There are also escort performance, it is essential that only designated
procedures you must follow to be sure that your personnel be allowed to regulate these types of
party gets to the right place and/or person. environmental controls.
l Physical access controls. Physical access
If your workspace has a recording instrument to
controls are implemented to prevent monitor the temperature and humidity, by all means
unauthorized entry to your computer facility or check it periodically to be sure it is within the prescribed
remote terminal areas. Physical access controls limits. If you notice a significant fluctuation (up or
can be accomplished in several ways: down), notify your supervisor.
conventional key and lock set, electronic key
system, mechanical combination lock, or Some devices have built-in warning signals (a light,
electronic combination lock. Regardless of the audible sound, or both) to warn you of near-limit
type of system installed at your command, it is conditions for temperature and/or humidity.
important to remember that keys belong on your
key-ring or chain, electronic keys or cards should Lighting
be in your possession at all times (except when
sleeping), and combinations should be
memorized, not written down somewhere for You are responsible for ensuring that adequate
everyone to see. lighting is maintained. Be particularly attentive to
emergency lights. If they are not functioning properly,
l Data file protection. Physical access to data report the problem to your supervisor as soon as
files and media libraries (magnetic disks, tape possible. Emergency lights are installed for your
files, microforms, and so on) is authorized only protection and safety, not for the safety of the
to those personnel requiring access to perform equipment. They are there to ensure a quick exit if you
their job. must evacuate in a hurry.

4-8
Physical Structure Security Some computer systems are equipped with an
uninterrupted power source (UPS). A UPS provides the
In the Navy we often decide we need computer auxiliary power for your equipment that may be
equipment and then wonder where we are going to required if your command’s mission dictates
install it. The existing building (or shipboard continuous AIS support to fulfill its obligations or if
compartment) may not lend itself to the physical your computer system is in an area where there are
security requirements needed to protect the system. frequent brownouts. Auxiliary power should be
Things like false overheads (ceilings) can conceal checked on a periodic basis.
water and steam pipes. The pipes should be checked on
a regular basis and any irregularities reported Fire Protection
immediately. Personnel should be familiar with the
locations and operation of the cut-off valves for the Fire protection is one of the major elements of any
pipes. Air-conditioning ducts in the overhead, if not command’s physical security program. All personnel
properly insulated, can result in condensation, causing (military and civilian) receive periodic training in
water to drip down on the computer. emergency procedures in case of fire. The training
usually includes, at a minimum, proper equipment
When repair work is scheduled within the computer shutdown and startup procedures, information about
spaces (working under the raised floor or in the your fire detection and alarm systems, use of emergency
overhead), be sure to take all necessary precautions to power (especially aboard ship), use of fire-fighting
protect the equipment. Use plastic sheeting to cover the equipment, and evacuation procedures.
system (particularly the CPU). Watch out for overhead
water or steam pipe bursts and for activated sprinkler Master control switches are used to shut off all
systems. Ensure maximum personnel safety, while power to your AIS spaces in the event of fire. If your
keeping disruption to a minimum. Dust coming from air-conditioning system is not setup for smoke removal,
the work area can damage the equipment: clogged it is probably connected to the master control switches.
filters result in overheated components, a head crash on The master control switches are normally located at the
a disk drive, dirty read/write heads on tape drives, and exit doors, so in an actual emergency you do not have
so on. Remember, the key word is to protect all AIS to pass through a dangerous area to activate the
assets. switches. These switches should be easily
recognizable. They are clearly labeled and protected to
prevent accidental shutdown. Commands that process
WARNING
critical applications will have master control switches
that allow for a sequential shutdown procedure of your
Should your equipment be exposed to
equipment. Learn the location of the switches and
water, do not turn it on until it has been
procedures used in your computer spaces.
thoroughly checked out by qualified
maintenance personnel. There will be enough portable fire extinguishers for
you to fight a relatively small or self-contained fire.
Power Supply Protection Extinguishers are placed within 50 feet of the computer
equipment. Prominently displayed markings and/or
Your computer facility and remote terminal areas signs are above each extinguisher, and each is easily
require adequate power. Variations in electrical power accessible for use.
can affect the operation of computer equipment. Most
computer equipment is designed in such away that it is
able to rectify the incoming ac current, filter it, and WARNING
regulate the resulting dc current before it is applied to
the computer circuitry. However, this filtering and Be sure to use only carbon dioxide or
regulation cannot be expected to eliminate voltage inert-gas fire extinguishers on electrical fires.
variations beyond a reasonable range. Power
fluctuations can cause unpredictable results on One final note. Experience has shown repeatedly
hardware, logic, and data transfer. Should your system that prompt detection is a major factor in limiting the
encounter such fluctuations, it is highly recommended amount of fire damage. Computer areas require a fire
that the equipment be shut down at once until the detection system capable of early warning and with an
problem is corrected. automatic fire extinguishing system.

4-9
Hardware Protection Classified Data

Hardware security is defined in the Department of Handling requirements and procedures for
the Navy Automatic Data Processing Security Program, classified AIS media (Confidential, Secret, and Top
OPNAVINST 5239.1, as “Computer equipment Secret) are the same as those for handling classified
features or devices used in an AIS system to preclude information. Anyone who has possession of classified
unauthorized, accidental or intentional modification, material is responsible for safeguarding it at all times.
disclosure, or destruction of AIS resources.” You need to be familiar with the four security modes
that provide for processing classified data: system
DATA PROTECTION MEASURES high, dedicated, multilevel, and controlled.

FIPS (Federal Information Processing Standards) SYSTEM HIGH SECURITY MODE.— A


PUB 39 Glossary for Computer Systems Security computer system is in the system high security mode
defines data security as “The protection of data from when the central computer facility and all of the
unauthorized (accidental or intentional) modification, connected peripheral devices and remote terminals are
destruction, or disclosure.” We are always concerned protected in accordance with the requirements for the
with the integrity of data; is the data the same as that in highest classification category and type of material then
the source documents? We want to ensure that the data contained in the system. All personnel having
has not been exposed to accidental or intentional computer system access must have a security clearance,
modification, disclosure, or destruction. but not necessarily a need-to-know for all material then
contained in the system. In this mode, the design and
Depending on the type of data being processed, the operation of the computer system must provide for the
other users with access to the system, and the technical control of concurrently available classified material in
features of the system to provide the needed safeguards, the system on the basis of need-to-know.
the system may have to operate in a specific security
mode. DEDICATED SECURITY MODE.— A com-
puter system is operating in the dedicated security mode
If your command processes classified and/or when the central computer facility and all of its
sensitive unclassified data, it must abide by certain rules connected peripheral devices and remote terminals are
to protect it. In the central computer facility (where the exclusively used and controlled by specific users or
host computer is located), the physical security group of users having a security clearance and
requirements will be equal to the highest classification need-to-know for the processing of a particular
of data being handled. If there are two or more category(ies) and type(s) of classified material.
computer systems located in the same controlled area,
the systems should be separated to limit direct personnel MULTILEVEL SECURITY MODE.— A
access to a specific system. computer system is operating in the multilevel security
mode when it provides a capability permitting various
In remote terminal areas, security requirements are
categories and types of classified materials to be stored
based upon the highest classification of data to be
and processed concurrently in a computer system and
accessed through the terminals. Each remote terminal
must be identifiable through hardware or software permitting selective access to such material
concurrently by uncleared users and users having
features when it is connected to a computer system or
differing security clearances and need-to-know.
network processing classified data. The system or
network must know who is logging on. Separation of personnel and material on the basis of
security clearance and need-to-know is accordingly
If the computer system to which your remote accomplished by the operating system and associated
terminal is connected is processing classified data and system software. In a remotely accessed
your terminal is not authorized, controlled, or protected resource-sharing system, the material can be selectively
for that classification of data, it must be disconnected. accessed and manipulated from variously controlled
The disconnect procedures may be by a hardware terminals by personnel having different security
measure (such as turning off a switch at the host clearances and need-to-know. This mode of operation
computer) or a software measure (such as deleting the can accommodate the concurrent processing and
ID of your terminal during certain processing periods). storage of (1) two or more categories of classified data,
Because each data classification has different security or (2) one or more categories of classified data with
requirements, we cover each separately. unclassified data, depending upon the constraints

4-10
placed on the system by the designated approving handling to assure that it is not intentionally or
authority. unintentionally lost or destroyed.
CONTROLLED SECURITY MODE.— A AIS MEDIA PROTECTION MEASURES
computer system is operating in the controlled security
mode when at least some personnel (users) with access AIS media protection is important because that is
to the system have neither a security clearance nor a where we store data, information, and programs. All
need-to-know for all classified material then contained data and information, whether classified or not, require
in the computer system. However, the separation and some degree of protection. Software also requires
control of users and classified material on the basis, protection. You would not want to lose the only copy
respectively, of security clearance and security of a program you had worked 4 months to write, test,
classification are not essentially under operating system and debug. The amount of protection depends on the
control as in the multilevel security mode. classification of data, the type of AIS storage media
used, the value of the material on it, and the ease with
Sensitive Unclassified Data which the material can be replaced or regenerated. AIS
media includes magnetic tapes, disks, diskettes, disk
Sensitive unclassified data is unclassified data that packs, drums, cathode-ray tube (CRT) displays, hard
requires special protection. Examples are data For copy (paper), core storage, mass memory storage,
Official Use Only and data covered by the Privacy Act printer ribbons, carbon paper, and computer output
of 1974. microfilm and microfiche.
The Privacy Act of 1974 imposes numerous You are responsible for controlling and
requirements upon federal agencies to prevent the safeguarding (protecting) the AIS media at all times.
misuse of data about individuals, respect its For purposes of control, AIS media can be divided into
confidentiality, and preserve its integrity. We can meet two types or categories: working copy media and
these requirements by applying selected managerial, finished media. You will be working with both.
administrative, and technical procedures which, in
combination, achieve the objectives of the Act. Working copy media is temporary in nature. It is
retained for 180 days or less and stays within the
The major provisions of the Privacy Act that most confines and control of your activity. Examples of
directly involve computer security are as follows: working copy media are tapes and disk packs that are
e Limiting disclosure of personal information to used and updated at frequent intervals and coding forms
authorized persons and agencies; that are returned immediately to the user after
processing.
l Requiring accuracy, relevance, timeliness, and
completeness of records; and Finished media is permanent in nature. It includes
tapes and disk packs, hard-copy output, or any other
l Requiring the use of safeguards to ensure the AIS media containing data or information to be retained
confidentiality and security of records. for more than 180 days. Finished media can be released
To assure protection for AIS processing of sensitive to another activity. For example, a magnetic tape can
unclassified data, the Navy has established the limited be sent to another activity as a finished media.
AIS access security mode. However, the receiving activity may treat it as working
copy media if it is kept 180 days or less. Of course, AIS
A computer system or network is operating in the media, whether working copy or finished copy, requires
limited access security mode when the type of data the use of security controls.
being processed is categorized as unclassified and
requires the implementation of special access controls Security Controls
to restrict the access to the data only to individuals who
by their job function have a need to access the data. The security controls we discuss are general in
nature and are considered the minimum essential
Unclassified Data controls for protecting AIS media. Your activity’s
standard operating procedures (SOPS) are designed to
Although unclassified data does not require the ensure that an adequate level of protection is provided.
safeguards of classified and sensitive unclassified data, Classified working copy media must be dated when
it does have value. Therefore, it requires proper created, marked, and protected in accordance with the

4-11
highest classification of any data ever recorded on the each page with the appropriate classification or the
media. If classified working copy media is given to a word “unclassified,” and each page should be
user, the user is then responsible for its protection. consecutively numbered.
Classified finished media must be marked and CRT DISPLAYS.— The appropriate security
accounted for. You may be responsible for inventorying classification marking is displayed at the top of the
magnetic tapes, disk packs, and other forms of AIS screen when displaying classified data or information.
media. Your activity must maintain a master list of AIS
media that is classified as Secret or Top Secret. This
master list includes the overall security classification of Disposition of Media
the media and the identification number permanently
assigned to it. The media must also be controlled in the There comes a time when the media or the
same manner prescribed for classified material outside information on the media is no longer needed. With
an AIS environment. For additional information, microfilm, microfiche, and printouts, we destroy the
consult the Department of the Navy Information and media with the data. The same is not true of magnetic
Personnel Security Program Regulation, OPNAVINST media. We can erase and reuse the media when the data
5510.1 (hereinafter called the Security Manual).
is no longer needed. However, the media cannot
function forever. Tapes and disks become damaged or
Security Markings eventually wear out.
Your activity will have procedures for marking AIS When a disk or tape becomes unusable, it must be
media. These are important to protect the media from disposed of. But first, each disk and tape must be
unauthorized, accidental, or intentional disclosure, accounted for. It may have been used for classified data.
modification, destruction, or loss. You can imagine The magnetic media librarian will see that it is disposed
how easy it is to pickup an unmarked tape, load it on of properly. If the media contained classified data, it
the tape drive, and have whatever is on it recorded over will be degaussed before being destroyed.
by a program. You have probably done this to tapes
with your tape cassette recorder/player. This is why we There are two other problem areas we tend to forget:
have mechanical means, like tape rings and diskette printer ribbons and carbon paper. Ribbons and carbon
notches, to protect magnetic media. These methods, paper must be disposed of properly. Because of the
combined with clearly marked labels, go a long way large variety of ribbons and printers, it is difficult to
toward protecting data and programs on magnetic state with certainty that any and all classified
media. Let’s look at the types of markings the Navy information have been totally obscured from a given
uses for the various types of media for marking
ribbon unless you examine that ribbon in detail.
classified data.
Therefore, printer ribbons are controlled at the highest
MAGNETIC MEDIA.— Each magnetic tape, classification of information ever printed by that ribbon
diskette, and disk pack must be externally marked with until that ribbon is destroyed. The same ribbon is used
a stick-on label with the overall security classification in the printer for classified and unclassified information
and a permanently assigned identification number. consistent with the levels of physical security enforced
When the tapes, diskettes, and disk packs are to be
for the area.
declassified by degaussing, all external labels
indicating the classification must be removed unless the Carbons are easily readable and must be handled
media will be immediately used to store information of and disposed of in accordance with the classification of
the same classification. Many installations set aside data they contain. Remember, regardless of what the
groups of tapes and disks for recording classified data media is, it must be disposed of in accordance with the
at each security level.
Security Manual if it ever contained classified
HARD-COPY REPORTS, MICROFILM, AND information.
MICROFICHE.— Hard-copy reports or printouts
from a printer, terminal, plotter, or other computer Basically, the requirement states that the data must
equipment and microfilm and microfiche must be be destroyed beyond recognition. If the media did not
properly marked. Those prepared during classified contain classified information, follow your activity’s
processing must be marked at the top and bottom of standard operating procedures (SOPs).

4-12
AIS SECURITY PROGRAM Q Command standards for system design,
IMPLEMENTATION programming, testing, and maintenance to
The risk analysis and higher authority instructions reflect security objectives and requirements;
provide the basis for an AIS security program. Even l Contingency plans for backup operations,
though implementation of the program depends on local
disaster recovery, and emergency response; and
instructions/directives and conditions, it may not be
clear just where to begin. l Booklets or command instructions for AIS staff
indoctrination in security program requirements.
AIS SECURITY PROGRAM PLANNING
Depending on the normal practices of the AIS
Following is a suggested outline to use as a basis facility, these documents may be completely separate
for planning an AIS security program: items or they may be included in other documents. For
example, emergency response plans for the AIS facility
o Perform preliminary planning. Establish an might be included in the command’s Disaster Control
AIS security team to prepare an AIS security Plan. Similarly, security standards could be added to
program and make responsibility assignments. existing documents.
l Perform a preliminary risk analysis. This will
The final point to be made is the importance of
identify major problem areas.
continuing the inspection and review of the security
l Select and implement urgent “quick fix” program. A major effort is required for the initial risk
security measures. This should be done on an analysis, but once it is completed, regular review and
as-needed basis. updating can be done much more quickly. By
o Perform and document a detailed risk evaluating changes in command mission, the local
analysis. This will allow for review and environment, the hardware configuration, and tasks
approval. performed, the AIS technical manager can determine
what changes, if any, should be made in the security
l Justify cost and document action plans. program to keep it effective.
Based on the approved risk analysis selected,
develop budgets and schedules for security
measures, contingency plans, training and AUTHORITATIVE REFERENCES
indoctrination plans, and test plans.
Numerous higher authority instructions relate to
l Carry out the approved action plans.
physical security, data protection, and security in
l Repeat the detailed risk analysis and general. You should have a thorough knowledge of
subsequent steps regularly, at least annually. them before implementing any security plan. Refer to
Conduct more frequently if required based on the the following instructions and manuals to learn about
results of tests, inspections, and changes in AIS security and when making security decisions:
mission or environment.
l Department of the Navy Automatic Data
Processing Security Program, OPNAVINST
AIS SECURITY PLAN
5239.1 with enclosures;
DOCUMENTATION
l Guideline for Automatic Data Processing Risk
Include adequate documentation in the action
plans. For example, the documentation might include Analysis, FIPS PUB 65 (enclosure 3 to
the following: OPNAVINST 5239.1);

A security policy statement that provides general l Department of the Navy Information and
guidance and assigns responsibilities; Personnel Security Program Regulation,
OPNAVINST 5510.1;
A security handbook (with instructions) that
describes in detail the security program and o Department of the Navy Information Systems
procedures and the obligations of AIS personnel, Security (INFOSEC) Program, SECNAVINST
users, and supporting personnel; 5239.3.

4-13
AIS THREATS AND RISK ANALYSIS Department of the Navy Physical Security and Loss
Prevention, OPNAVINST 5530.14.
First, when designing its security program, a
command must look at the potential AIS threats and RISK ANALYSIS
perform a risk analysis.
The AIS facility upper management should begin
AIS THREATS development of the security program with a risk
analysis. A risk analysis, as related to this chapter, is
the study of potential hazards that could threaten the
When planning a security program, the AIS performance, integrity, and normal operations of an AIS
technical manager should be aware of all the types of facility. Experience at various commands shows that a
threats that may be encountered. Not every Navy AIS quantitative risk analysis produces the following
facility will be faced with each type of threat, especially benefits:
if the facility is aboard ship. The impact of a given
threat may depend on the geographical location of the l Objectives of the security program relate directly
AIS facility (earthquakes), the local environment to the missions of the command.
(flooding), and potential value of property or data to a l Those charged with selecting specific security
thief, or the perceived importance of the facility to
measures have quantitative guidance on the type
activists and demonstrators or subversives. Examples
and amount of resources the AIS facility
of natural and unnatural threats include:
considers reasonable to expend on each security
l Unauthorized access by persons to specific areas measure.
and equipment for such purposes as theft, arson, l Long-range planners receive guidance in
vandalism, tampering, circumventing of internal applying security considerations to such things
controls, or improper physical access to as site selection, building design, hardware
information; configurations and procurements, software
l AIS hardware failures; systems, and internal controls.
l Failure of supporting utilities, including electric l Criteria are generated for designing and
power, air conditioning, communications evaluating contingency plans for backup
circuits, elevators, and mail conveyors; operations, recovery from disaster, and dealing
with emergencies.
l Natural disasters, including floods, windstorms,
fires, and earthquakes; l An explicit security policy can be generated that
identifies what is to be protected, which threats
l Accidents causing the nonavailability of key are significant, and who will be responsible for
personnel; executing, reviewing, and reporting the security
l Neighboring hazards, such as close proximity to program.
chemical or explosive operations, airports, and
Loss Potential Estimates
high crime areas;
l Tampering with input, programs, and data; and The first step to consider when preparing the risk
analysis is to estimate the potential losses to which the
l The compromise of data through interception of AIS facility is exposed. The objective of the loss
acoustical or electromagnetic emanations from potential estimate is to identify critical aspects of the
AIS hardware. AIS facility operation and to place a monetary value on
The preceding list of threats to the operation of an the loss estimate. Losses may result from a number of
AIS facility contains only a few of the reasons why each possible situations, such as:
command should have an ongoing security program l Physical destruction or theft of tangible
adapted and tailored to its individual needs and assets. The loss potential is the cost to replace
requirements. Not all threats and preventive measures lost assets and the cost of delayed processing.
can be discussed in this chapter. However, we will
cover the more common threats and remedial measures. l Loss of data or program files. The loss
For a thorough review of the subject, refer to the potential is the cost to reconstruct the files, either

4-14
from backup copies if available or from source The remaining four loss potential types listed are
documents and possibly the cost of delayed dependent on the characteristics of the individual data
processing. processing tasks performed by the AIS facility. AIS
technical managers should review each task to establish
o Theft of information. The loss potential
which losses a facility is exposed to and which factors
because of theft is difficult to quantify. Although affect the size of the potential loss. Call on users to help
the command itself would sustain no direct loss, make these estimates.
it clearly would have failed in its mission. In
some cases, information itself may have market To make the best use of time, do a rapid, preliminary
value. For example, a proprietary software screening to identify the tasks that appear to have
package or a name list can be sold. significant loss potential. An example of preliminary
l Indirect theft of assets. If the AIS is used to estimates is shown in table 4-1.
control other assets, such as cash, items in Having made a preliminary screening to identify
inventory, or authorization for performance of the critical tasks, seek to quantify loss potential more
services, then it may also be used to steal such precisely with the help of user representatives familiar
assets. The loss potential would be the value of with the critical tasks and their impact on other
such assets that might be stolen before the activities. Mishaps and losses that could occur should
magnitude of the loss is large enough to assure be considered, on the assumption that if something can
detection. go wrong, it will. The fact that a given task has never
l Delayed processing. Every application has been tampered with, used for an embezzlement, or
changed to mislead management in the command is no
some time constraint, and failure to complete it
assurance that it never will be. At this stage of the risk
on time causes a loss. In some cases the loss
analysis, all levels of management should assume the
potential may not be as obvious as, for example,
worst.
a delay in issuing military paychecks.
To calculate the loss potential for physical
destruction or theft of tangible assets, AIS technical Threat Analysis
managers and upper management should construct a
table of replacement costs for the physical assets of the The second step of the risk analysis is to evaluate
AIS facility. The physical assets usually include the the threats to the AIS facility. Threats and the factors
building itself and all its contents. This tabulation, that influence their relative importance were listed
broken down by specific areas, helps to identify areas earlier in this chapter. Details of the more common
needing special attention. While the contents of the threats are discussed later in this chapter and, to the
typical office area may be valued at $100 to $500 per extent it is available, general information about the
square foot, it is not unusual to find the contents of a probability of occurrence is given. Use these data and
computer room are worth $5,000 to $10,000 per square higher authority instructions/manuals and apply
foot. The estimate is also helpful in planning for common sense to develop estimates of the probability
recovery in the event of a disaster. of occurrence for each type of threat.
Table 4-1.—Example of Preliminary Estimates of Loss Potential

4-15
While the overall risk analysis should be conducted cause theft-of-information losses; but, in varying
by the AIS technical manager, other personnel at the degrees, all three result in physical destruction losses
AIS facility can contribute to the threat analysis, and and losses because of delayed processing. Likewise,
their help should be requested.Table 4-2 includes a list internal tampering could causean indirect loss of assets.
of common threats at a shore AIS facility, with space In each casewhere there can be significant loss, the loss
for listing the agency or individual to contact should the potential is multiplied by the probability of occurrence
need arise. Your AIS facility should have a similar list of the threat to generate an annual estimate of loss.
with local contacts of help and information.
Remedial Measures Selection
Annual Loss Expectancy
When the estimate of annual loss is complete, AIS
The third step in the risk analysis is to combine the upper management will have a clear picture of the
estimates of the value of potential loss and probability significant threats and critical AIS tasks. The response
of loss to develop an estimateof annual loss expectancy. to significant threats can take one or more of the
The purpose is to pinpoint the significant threats as a following forms:
guide to the selection of security measures and to
develop a yardstick for determining the amount of l Alter the environment to reduce the
money that is reasonable to spend on each of them. In probability of occurrence. In an extreme case,
other words, the cost of a given security measureshould this could lead to relocation of the AIS facility
relate to the loss(es) against which it provides to a less-exposed location. Alternatively, a
protection. hazardous occupancy adjacent to or inside the
AIS facility could be moved elsewhere.
To develop the annual loss expectancy, construct a
matrix of threats and potential losses. At each l Erect barriers to ward off the threat. These
intersection,ask if the given threat could causethe given might take the form of changesto strengthenthe
loss. For example, fire, flood, and sabotage do not building against the effects of natural disasters,
Table4-2.-Threat HelpList

LOCAL PHONE
COMMON THREATS SOURCES OF LOCAL INFORMATION AND HELP NUMBER
Fire
Flood
Earthquake
Windstorm
Power failure
Air-conditioning failure
Communications failure
AIS hardware failure
Intruders, vandals
Compromising emanations
Internal theft
Internal misuse

4-16
saboteurs, or vandals. (See the Security Manual 1. The annual cost is to be less than the reduction
and OPNAVINST 5530.14 for evaluation in expected annual loss that could be caused by
guidelines.) Special equipment can be installed threats.
to improve the quality and reliability of electric 2. The mix of remedial measures selected is to be
power. Special door locks, military guards, and the one having the lowest total cost.
intrusion detectors can be used to control access
The first criterion simply says there must be a cost
to critical areas.
justification for the security program-that it returns
l Improve procedures to close gaps in controls. more in savings to the AIS facility than it costs. This
These might include better controls over may seem obvious but it is not uncommon for an AIS
operations or more rigorous standards for manager to call for a security measure, to comply with
programming and software testing. higher authority security instructions and directives,
without first analyzing the risks.
l Early detection of harmful situations permits
more rapid response to minimize damage. The second criterion reflects the fact that a given
Fire and intrusion detectors are both typical remedial measure may often be effective against more
examples. than one threat. See table 4-3.
l Contingency plans permit satisfactory Since a given remedial measure may affect more
accomplishment of command missions than one threat, the lowest cost mix of measures
following a damaging event. Contingency probably will not be immediately obvious. One
plans include immediate response to possible way to make the selection is to begin with the
emergencies to protect life and property and to threat having the largest annual loss potential. Consider
limit damage, maintenance of plans and possible remedial measures and list those for which the
materials needed for backup operation offsite, annual cost is less than the expected reduction in annual
and maintenance of plans for prompt recovery loss. Precision in estimating cost and loss reduction is
following major damage to or destruction of the not necessary at this point. If two or more remedial
AIS facility. The command’s Disaster Control measures would cause a loss reduction in the same area,
Plan should coincide with the AIS facility’s list them all, but note the redundancy. Repeat the
contingency plans. process for the next most serious threat and continue
until reaching the point where no cost justifiable
Table 4-3 shows examples of remedial measures for measure for a threat can be found. If the cost of a
a few threats. When selecting specific remedial remedial measure is increased when it is extended to
measures, use the following two criteria: cover an additional threat, the incremental cost should
Table 4-3.—Example of Remedial Measures by Threat Type

4-17
be noted. At this point, there exists a matrix of and thus identify the subset of remedial measures that
individual threats and remedial measures with estimates appears to be the most effective. At this point, review
of loss reductions and costs, and thus an estimate of the the estimates and refine them as necessary to ensure
net saving. This is shown graphically in table 4-4. compliance with higher authority security instructions.
For each threat (A, B, C, and D), the estimated loss If all the preceding procedures are followed, the
reduction (column 1), the cost of the remedial measure following factors will be established and documented:
(column 2), and the net loss reduction (column 3) are
given in thousands of dollars. By applying remedial l The significant threats and their probabilities of
measure J to threat A at a cost of $9,000, a loss reduction occurrence;
of $20,000 can be expected (a net saving of $1 1,000). l The critical tasks and the loss of potential related
Furthermore, remedial measure J will reduce the threat to each threat on an annual basis;
B loss by $10,000 at no additional cost and the threat C
loss by $4,000 at an added cost of only $1,000. Finally, l A list of remedial measures that will yield the
though, it appears that it would cost more than it would greatest net reduction in losses, together with
save to apply J to threat D. Therefore, J would not be their annual cost.
implemented for D. The net loss reduction from J could With this information at hand, AIS upper
be expressed as: management can move ahead with implementing the
AIS security program. Since the analysis of remedial
measures will have identified those with the greatest
impact, relative priorities for implementation can also
The table indicates that J and K have the same reduction be established.
effect on threat A. Since K costs more than J, it might,
at first glance, be rejected. However,
AIS DISASTER PROTECTION
Fires, floods, windstorms, and earthquakes all tend
to have the same basic effects on AIS operations. They
and cause the physical destruction of the facility and its
contents and interrupt normal operations. They also
represent a threat to the life and safety of the AIS staff.
To illustrate the effects of the physical destruction of a
facility, we have selected fire safety. Other causes of
disasters include the loss of support utilities and
Therefore, while J and K are equally effective on threat breaches of AIS facility physical security.
A, K appears to be more effective than J on the other
threats. Further checking shows their combined use FIRE SAFETY
results in the greatest overall net loss reduction.
By going through the process just described, using Experience over the last two decades demonstrates
preliminary estimates for cost and loss reduction, you the sensitivity of AIS facilities to fire damage resulting
can test various combinations of remedial measures, in disruption of operations. A number of major losses
Table 4-4.—Threat Matrix Table

4-18
have involved noncombustible buildings. In the cases The actual performance of a building will depend
where vital magnetic media tapes were safeguarded and not only on the type of construction, but also on design
the computer hardware was relatively uncomplicated, details, such as:
rapid recovery was possible, often in a matter of days.
However, if a large computer configuration were l Fire walls, which, in effect, divide a structure
destroyed or if backup records were inadequate, into separate buildings with respect to fires;
recovery could take many weeks or months. l Fire-rated partitions, which retard the spread of
Fire safety should be a key part of the AIS facility’s a fire within a building;
security program. It should include the following l Fire-rated stairwells, dampers, or shutters in
elements:
ducts; fire stops at the junction of floors, and
l Location, design, construction, and maintenance walls and similar measures to retard the spread
of the AIS facility to minimize the exposure to of smoke and fire within a building; and
fire damage; l Use of low-flame spread materials for floor,
l Measures to ensure prompt detection of and wall, and ceiling finish to retard propagation of
response to a fire emergency; flame.

l Provision for quick human intervention and Understand that this discussion is very simplified.
However, consideration of these factors as they apply
adequate means to extinguish fires; and to an existing or projected AIS facility will help to
l Provision of adequate means and personnel to determine the amount of attention to pay to fire safety.
limit damage and effect prompt recovery. Seek the assistance of a qualified fire protection
engineer or local base fire personnel in evaluating the
inherent fire safety of the AIS facility and identifying
Facility Fire Exposure hazards.
The fourth factor in fire safety is the way in which
The first factor to consider in evaluating the fire the building is operated. Keep in mind that the inherent
safety of an AIS facility is what fire exposure results fire safety of a building can be rendered ineffective by
from the nature of the occupancy (material) of adjacent careless operation; for example:
buildings and the AIS facility building. Generally
speaking, the degree of hazard associated with a given l Fire doors propped open;
occupancy (material) depends on the amount of l Undue accumulation of debris or trash;
combustible materials, the ease with which they can be
ignited, and the likelihood of a source of ignition. l Careless use of flammable fluids, welding
equipment, and cutting torches;
The second and third fire safety factors are the
design and construction of the building. Five basic l Substandard electric wiring;
types of construction are described in table 4-5, with l Inadequate maintenance of safety controls on
their approximate destruction times.
ovens and boilers; or
Table 4-5.—Estimated Destruction Time by Fire for Selected l Excessive concentration of flammable materials
Construction Types
(AIS facilities, for example, have a particular
hazard from the accumulation of lint from paper
operations).
The AIS security program should strive, in
coordination with the building maintenance staff, to
identify and eliminate dangerous conditions. NOTE:
This must be a continuing effort and a consideration in
the assignment of security management
responsibilities. The security inspection plan should
include verification of compliance with established
standards.

4-19
Fire Detection computer room, and administrative offices)
should be displayed as a group on the control
Despite careful attention to the location, design, panel. In other words, when an alarm sounds,
construction, and operation of the AIS facility, there is inspection of the control panel should indicate
still the possibility of a fire. Experience shows which area or zone caused the alarm. Generally,
repeatedly that prompt detection is a major factor in and preferably, each detector includes a pilot
limiting fire damage. Typically, a fire goes through light that lights when the detector is in the alarm
three stages. Some event, such as a failure of electrical state. In some cases there should be a separate
insulation, causes ignition. An electrical fire will often indicator light at the control panel for each
smolder for a long period of time. When an open flame detector. It is also important to see that the alarm
develops, the fire spreads through direct flame contact, system itself is secure. Its design should cause a
progressing relatively slowly, with a rise in the trouble alarm to sound if any portion of it fails,
temperature of the surrounding air. The duration of this or if there is a power failure. Take steps to assure
stage is dependent on the combustibility of the materials the system cannot be deactivated readily, either
at and near the point of ignition. Finally, the maliciously or accidentally.
temperature reaches the point at which adjacent
combustible materials give off flammable gases. At Personnel response. Meaningful human
this point, the fire spreads rapidly and ignition of nearby response to the detection and alarm systems is
materials will result from heat radiation as well as direct necessary if they are to be of any value. This
flame contact. Because of the high temperatures and means the fire detection system should be
volumes of smoke and toxic gases associated with this designed to assure that someone will always be
third stage, fire fighting becomes increasingly difficult alerted to the fire. Typically, the computer room
and often prevents people from remaining at the fire staff is expected to respond to an alarm from the
site. AIS facility alarm system. A remote alarm
Given the objective to discover and deal with a fire should also be located at another point in the
before it reaches the third stage, one can see the building that is occupied at all times, such as the
limitation of fire detection that depends on detecting a lobby guard post, security center, or building
rise in air temperature. For this reason, the areas in engineer’s station. This provides a backup
which electronic equipment is installed should be response when the computer area is not
equipped with products-of-combustion (smoke) occupied. If there is any possibility the remote
detectors. Such detectors use electronic circuitry to alarm point will not be occupied at all times, a
detect the presence of abnormal constituents in the air third alarm point should be located offsite,
that are usually associated with combustion. usually at the nearest fire station or the
command’s fire department for the facility.
In designing an effective fire detection system,
consider the following points: Maintenance. Proper maintenance is essential
to the fire detection system. The nature of smoke
Location and spacing of detectors. The detectors is such that nuisance alarms may be
location and spacing of detectors should take caused by dust in the air or other factors.
into consideration the direction and velocity of Because of this, there is a tendency to reduce
air flow, the presence of areas with stagnant air, sensitivity of the detectors to eliminate nuisance
and the location of equipment and other potential alarms, with the result that detection of an actual
fire sites. Note that detectors may be required fire may be delayed. To ensure proper operation,
under the raised floor, above the hung ceiling,
see that qualified personnel (a vendor
and in air-conditioning ducts as well as at the
representative, building engineer, or Public
ceiling. It may also be wise to put detectors in
Works Center personnel) verify correct
electric and telephone equipment closets and
operation at the time of installation, and at least
cable tunnels.
once each year thereafter. Furthermore, each
Control panel design. The design of the fault condition should be corrected immediately.
detection control panel should make it easy to Unfortunately, a common tendency is to turn off
identify the detector that has alarmed. This the fire detection system or silence the alarm
implies that the detectors in definable areas (for bell, creating the danger that there will be no
example, the tape vault, the east end of the response if a fire should occur.

4-20
In addition to alerting personnel to the presence of size, needs military personnel who are knowledgeable
a fire, the detection equipment can be used to control and trained in fire safety. Any practical and effective
the air-conditioning system. There is some support for organization for fire protection must be designed to
the view that, upon detection, air-handling equipment assure prompt action immediately at the point where a
be shutdown automatically to avoid fanning the flames fire breaks out. This usually necessitates every
and spreading smoke. This is not the best plan, as organizational unit or area of a command having a
nuisance alarms will result in needless disruption. The nucleus of key personnel who are prepared, through
preferred technique is to cause the system to exhaust instruction and training, to extinguish fires promptly in
smoke by stopping recirculation, and switching to their beginning stage. Such individuals become
100-percent outside air intake and room air discharge. knowledgeable in specialized fire protection and the
As a rule, this can be done by adjusting air-conditioning systems applicable to the facility in question: how to
damper controls and their interconnection with the fire turn in an alarm, which type of extinguisher to use for
detection system. However, it may be necessary to which type of fire, and how to use it. Further, such
modify the air-conditioning system. The use of either individuals can serve as on-the-job fire inspectors,
technique is at the discretion of command policy. constantly seeking out, reporting, and correcting
conditions that may cause fires. They can help ensure
Fire Extinguishment
that fire-fighting equipment is properly located and
Fire extinguishment may be accomplished using maintained, that storage does not cause congestion that
one or more of the following four methods: could hamper fire fighting, and that general
housekeeping is maintained at a reasonably high level
l Portable or hand extinguishers. Operated by to minimize fire risk.
military or civil service personnel to help control
the fire before it gets out of hand. SUPPORTING UTILITIES PROTECTION

l Hose lines. Used by military, civil service, or Every Navy AIS facility is dependent upon
supporting utilities, such as electric power and air
professional fire fighters to attack the fire with
conditioning, and may have to depend on
water.
communication circuits, water supplies, and elevators
l Automatic sprinkler systems. Release water for its operation. Not all commands are self-sufficient;
from sprinkler heads activated in the temperature they contract some or all of these utilities from civil
range of 135°F to 280°F. sources. In using these utilities, AIS technical
managers should consider the probability of occurrence
l Volume extinguishment systems. Fill the room
and the effects of breakdowns, sabotage, vandalism,
with a gas that interferes with the combustion fire, and flooding. These effects can then be related to
process.
the needs of the AIS facility as established by the risk
To ensure the effectiveness of portable analysis.
extinguishers, several measures should be observed.
We have selected electrical power to illustrate
Place extinguishers in readily accesssible locations, not
support utility protection. Variations of a normal
in comers or behind equipment. Mark each location for
waveform in the electric power supply can affect the
rapid identification; for example, paint a large red spot
operation of AIS hardware. The AIS hardware rectifies
or band on the wall or around the column above the
point where each extinguisher is mounted. It is the alternating current, filters, and voltage; regulates the
important for each AIS technical manager to ensure resulting direct current; and applies it to the AIS
proper inspection in accordance with command policy. circuitry. The filtering and regulation cannot be
Each extinguisher should have an inspection tag affixed expected to eliminate voltage variations beyond a
to it with the signature of the inspecting petty officer or reasonable range. If line voltage is 90 percent or less of
fire marshal and the inspection date. nominal for more than 4 milliseconds, or 120 percent
or more of nominal for more than 16 milliseconds,
In all probability, the AIS facility technical manager excessive fluctuations can be expected in the dc voltage
will want to establish a first line of defense against fire applied to the hardware circuitry. This power
involvement between the time of notification of, and fluctuation causes unpredictable results on hardware,
response by, professional or highly trained firefighters, logic, and data transfer. These power line fluctuations,
and will incorporate this as part of the command’s referred to as transients, are usually caused by
Disaster Control Plan. Every command, regardless of inclement weather.

4-21
Internally generated transients depend on the
configuration of power distribution inside the AIS
facility. The effects of internal transients can be
minimized by isolating the AIS hardware from other
facility loads. Ideally, the computer area power
distribution panels should be connected directly to the
primary feeders and should not share step-down
transformers with other high-load equipment.
The risk analysis should include a complete power
transient and failure study. It should also carefully
consider the projected growth in particularly sensitive
applications (such as real-time or teleprocessing) in
projecting future loss potential. Figure 4-9.—UPS with transfer switch.

In some cases it may be economically feasible to If the facility’s current needs exceed its UPS
connect the AIS facility to more than one utility feeder capacity, it may be economically feasible to use
via a transfer switch. If one feeder fails, the facility’s multiple, independent UPS units, as shown in figure
load may be transferred to the alternate feeder. This 4-10. Since each unit has its own disconnect switch, it
technique is of greater value if the two feeders connect can be switched offline if it fails.
to different power substations. Finally, if the risk analysis shows a major loss from
If the AIS facility is in a remote area, an power outages lasting 30 to 45 minutes or beyond, an
uninterrupted power supply (UPS) is usually required onsite generator can be installed, as shown in figure
as a backup power source. The UPS system can be 4-11. The prime mover may be a diesel motor or a
manually or automatically controlled from prime power turbine. When the external power fails, UPS takes over
sources or from the AIS computer site. The typical UPS and the control unit starts the prime mover
consists of a solid-state rectifier that keeps batteries automatically. The prime mover brings the generator
charged and drives a solid-state inverter. The inverter up to speed. At this point, the UPS switches over to the
synthesizes alternating current for the computer. A generator. Barring hardware failures, the system
simplified block diagram is shown in figure 4-8. supports the connected load as long as there is fuel for
Depending on the ampere-hour capacity of the the prime mover. Note that the generator must be large
battery (or batteries), the UPS can support its load for a enough to support other essential loads, such as air
maximum of 45 minutes without the prime power conditioning or minimum lighting, as well as the UPS
source. At the same time, it will filter out transients. To load.
provide extra capacity to protect against a failure of the
UPS, a static transfer switch can be inserted between
the UPS and the computer, as shown in figure 4-9. The
control circuitry for the static switch can sense an
overcurrent condition and switch the load to the prime
power source without causing noticeable transients.

Figure 4-8.—Simplified block diagram of an uninterrupted


power supply (UPS). Figure 4-10.—Multiple, independent UPS units.

4-22
Figure 4-11.—UPS with onsite generation.

When this configuration is used, maintain a close material from the area, complete destruction of the
communication liaison with the power plant source to classified material on a phased priority basis, or
ensure the generator is coming up to normal speed for appropriate combinations of these actions.
the switchover from UPS. The UPS system takes over The emergency plans should also provide for the
automatically, and the change in power source may not protection of classified information in a manner that
be noticed in the AIS facility. However, when the UPS minimizes the risk of loss of life or injury to AIS
system changes over to the generator, it may require a personnel. The immediate placement of a trained and
manual power panel setting in the AIS facility by the preinstructed perimeter guard force around the affected
AIS technical manager. area to prevent the removal of classified material is an
AIS FACILITY PHYSICAL PROTECTION acceptable means of protecting the classified material.
This action reduces the risk of casualties.
The physical protection of the AIS facility can be
thought of as the process of permitting access to the Security requirements for the central computer AIS
facility by authorized persons, while denying access to facility area should be commensurate with the highest
others. The physical protection of an AIS facility is not classified and most restrictive category of information
as stringent for an AIS facility that processes being handled in the AIS. If two or more computer
unclassified data as it is for an AIS facility that systems are located in the same controlled area, the
processes classified data. In the following equipment comprising each system may be located so
example/discussion, assume the facility processes that direct personnel access, if appropriate, is limited to
classified material and provides physical protection in a specific system.
accordance with OPNAVINST 5510.1 and
Boundary Protection
OPNAVINST 5530.14. Pay particular attention to
applying physical protection and security policy The threat analysis may indicate the need to protect
wherever AIS equipment is used for processing the property boundary of the AIS facility. This may be
classified information in accordance with accomplished by installing fences or other physical
OPNAVINST 5239.1. barriers, outside lighting, or perimeter intrusion
detectors, or by using a patrol force. Often a
Ensure plans are developed for the protection,
combination of two or more of these will be sufficient.
removal, or destruction of classified material in the case
Fences should be 8 feet high with three strands of
of a natural disaster, civil disturbance, or enemy action. barbed wire. Fences provide crowd control, deter
The plans should establish detailed procedures and
casual trespassers, and help in controlling access to the
responsibilities for the protection of classified material
entrances; however, they do not stop the determined
so that it does not fall into unauthorized hands in the
intruder.
event of an emergency. Also, indicate what material is
to be guarded, removed, or destroyed. An adequate In situations where manpower shortages exist, the
emergency plan for classified material should provide fence can be equipped with penetration sensors that
for guarding the material, removing the classified should sound an internal alarm only. This type of

4-23
physical protection system uses small sensors mounted protection. Identify each terminal as a feature of
at intervals on the fence and at each gate. hardware in combination with the operating system.
Emanations Protection Before personnel of a component that is not
responsible for the overall AIS operation can use a
In evaluating the need for perimeter protection, take
remote device approved for handling classified
into account the possibility that electromagnetic or
material, security measures must be established. These
acoustic emanations from AIS hardware may be
security measures are established by the authority
intercepted. Tests show that interception and
responsible for the security of the overall AIS. They are
interpretation of such emanations may be possible
agreed to and implemented before the remote device is
under the right conditions by technically qualified
connected to the AIS.
persons using generally available hardware. As a rule
of thumb, interception of electromagnetic emanations DOD component systems may become part of a
beyond 325 yards is very difficult. However, if there is larger AIS network. The approval and authority to
reason to believe that a potential exposure to authorize temporary exceptions to security measures
interception exists, seek technical guidance from upper for the component’s system in the network requires two
management and the Chief of Naval Operations. components. These include the DOD component
operating the AIS system and the DOD component
Measures to control compromising emanations are having overall responsibility for the security of the
subject to approval under the provisions of Control of network.
Compromising Emanations, DOD Directive C5200.19,
by the cognizant authority of the component approving Each remote terminal that is not controlled and
security features of the AIS system. Application of protected as required for material accessible through it
these measures within industrial AIS systems is only at should be disconnected from the AIS system when the
the direction of the contracting activity concerned under system contains classified information. Disconnect
provisions of the Security Requirements for Automated procedures are used to disconnect remote input/output
Information Systems (AIS’s), DOD Directive 5200.28, terminals and peripheral devices from the system by a
and the requirements are to be included in the contract. hardware or software method authorized by the
designated approving authority of the central computer
Interior Physical Protection facility.
Intrusion detection systems (IDSs) (OPNAVINST
Security Survey
5510.1) provide a means of detecting and announcing
proximity or intrusion that endangers or may endanger An annual security survey of the AIS facility area
the security of a command. The use of an IDS in the should be conducted by the AIS technical manager. The
protective program of a command may be required first step of the survey is to evaluate all potential threats
because of the critical importance of a facility or to the AIS facility as discussed earlier in this chapter.
because of the location or the layout of the command. The second step is to define and tabulate areas within
the facility for control purposes. Details depend on the
Remember, IDSs are designed to detect, not specifics of each facility, but the following are common
prevent, an attempted intrusion. Thus, a areas to consider:
comprehensive security plan must contain appropriate
security measures along with procedures for an l Public entrance or lobby;
effective reaction force. l Loading dock;
Remote Terminal Areas Protection * Spaces occupied by other building tenants;
The physical and personnel security requirements
l AIS facility reception area;
for the central computer facility area are based upon the
overall requirements of the total AIS system. The l AIS input/output counter area;
remote terminal area requirements are based upon the
highest classified and most restrictive category and type l AIS data conversion area;
of material that will be accessed through the terminal l Media library;
under system constraints.
l Systems analysis and programming areas;
Each remote terminal should be individually
identified to ensure required security control and l Computer room spaces;

4-24
l Communications equipment spaces; and Table 4-6.—Secunty Measures Checklist

l Air conditioning, UPS, and other mechanical or


electrical equipment spaces.
The survey should verify security measures already
in place and recommend any improvements to upper
management. Obtain a current floor plan on which to
depict all areas within the facility. Include all access
points and any adjacent areas belonging to the AIS
facility, such as parking lots and storage areas. Begin
the survey at the perimeter of the AIS facility,
considering the following:
l Property line. Include fencing, if any, and type.
Note the condition, the number of openings
according to type and use, and how they are
secured. Are there any manned posts at the
property line?
l Outside parking facilities. Are these areas
enclosed, and are there any controls? Are
parking lots controlled by manned posts or are
devices used?
l Perimeter of facility. Note all vehicular and
pedestrian entrances and what controls are used,
if any. Check all doors—their number, how they
are secured, and any controls or devices, such as
alarms or key card devices. Check for all ground
floor or basement windows and how they are
secured, screening or bars, for example, and their
vulnerability. Check for other entrances, such as
vents and manholes. Are they secured and how?
Check for fire escapes—their number and
locations and accessibility to the interior of the
facility from the fire escape (windows, doors,
roof). How are accessways secured?
l Internal security. Begin at the top floor or in
the basement. Check for fire alarm systems and
devices. Note the type, location, and number.
Where does the alarm annunciate? Check
telephone and electrical closets to see if they are
locked. Are mechanical and electrical rooms
locked or secured? Note any existing alarms as
to type and number. Determine the number and
locations of manned posts, hours, and shifts.
l Monitoring facility. Know the location, who
monitors, who responds, its type, and the number
of alarms being monitored.
Table 4-6 is a checklist of other questions that
should be asked in the survey.

4-25
When the security survey is complete, it provides a Each AIS facility should establish and appoint
picture of the existing alarm systems and the location members to a formal board to construct, review, and
of each. It also shows the number and location of recommend command procedures for approval in
manned posts, the number of personnel at these posts, creating a COOP program. Figure 4-12 shows
and the schedule of each. suggested tasks and how they may be set up and
With these facts in hand, the AIS technical manager assigned. Each AIS facility will need to adapt to its own
can evaluate existing access controls and protection special circumstances and make full use of the resources
measures, identify areas where remedial measures are available to it.
needed, and select specific measures.
Always consider the use of various types of security EMERGENCY RESPONSE
hardware devices to augment the existing personnel PLANNING
protective force. Through the use of such devices, it
may be possible to save on operating cost. The term emergency response planning is used here
to refer to steps taken immediately after an emergency
occurs to protect life and property and to minimize the
CONTINGENCY PLANNING impact of the emergency. The risk analysis should be
Operation plans and the command’s organizational reviewed by the AIS technical manager to identify
manual are prepared and executed for the emergency conditions that have particular implications
accomplishment of the command’s specific mission. for AIS operations, such as protection of equipment
These operation plans assume normal working during a period of civil commotion and subsequent to a
conditions, the availability of command resources and natural disaster (fire or flood, for example). Where civil
personnel, and a normal working atmosphere. Despite commotion and natural disaster are found, local
careful use of preventive measures, there is always instructions should be developed and implemented to
some likelihood that events will occur that could meet the special needs of the AIS facility. These
prevent normal operations and interfere with the instructions and procedures may be designated the
command accomplishing its mission. For this reason,
“Loss Control Plan” and implemented as part of COOP.
contingency plans are included in the AIS security
program. For the purpose of this chapter, we refer to Loss control can be particularly important to the
these contingency plans as the Continuity of Operations AIS facility. In a number of recent fires and floods, the
Plan (COOP). value of being prepared to limit damage is amply
Three different types of contingency plans makeup demonstrated. By reviewing operations and the
a COOP security program for an AIS facility: locations of critical equipment and records with shift
leaders, the AIS technical manager can develop
Emergency response. There should be measures to use in case of an emergency. The
procedures for response to emergencies, such as guidelines should be similar to the following:
fire, flood, civil commotion, natural disasters,
bomb threats, and enemy attack, to protect lives, 1. Notify online users of the service interruption.
limit the damage to naval property, and minimize
2. Terminate jobs in progress.
the impact on AIS operations.
3. Rewind and demount magnetic tapes; remove
Backup operations. Backup operation plans
disk packs.
are prepared to ensure essential tasks (as
identified by the risk analysis) can be completed 4. Power down AIS hardware and cover with
subsequent to disruption of the AIS and that plastic sheeting or other waterproof material.
operations continue until the facility is
5. Put tapes, disks, run books, and source
sufficiently restored or completely relocated.
documents in a safe place.
Recovery. Recovery plans should be made to
6. Power down air-conditioning equipment.
permit smooth, rapid restoration of the AIS
facility following physical destruction or major If evacuation of work areas is ordered or likely,
damage. instruct all personnel to:

4-26
Figure 4-12.—Organization and tasks for COOP.

1. Put working papers and other unclassified designate one or more individuals in each AIS area who,
material in desks or file cabinets and close them. in the event of an emergency, will determine what can
be done to protect equipment and records without
2. Turn off equipment, but leave room lights on.
endangering life, and direct AIS staff members
3. Close doors as areas are evacuated, but ensure accordingly.
that locks and bolts are not secured.
Earlier in this chapter, we discussed measures to
The loss control plan should define the steps to be protect the facility against the effects of fire.
taken, assign responsibilities for general and specific Semiannually, review the protective plans with the
steps, and provide any needed materials and equipment operations division officer to assure that all normal
in handy locations. In some cases, ample time will be requirements and any special requirements of the AIS
available to take all measures, but in extreme facilities are satisfied. At the same time, brief upper
emergencies, life safety will dictate immediate management on the AIS facility plans and status, to get
evacuation. For this reason, the loss control plan should their advice and to ensure good coordination.

4-27
When emergency response planning is completed Substitute other procedures. If increased cost
and approved, it should be documented succinctly for or degraded service can be accepted temporarily,
easy execution. See figure 4-13. it may be possible to use other procedures. If
printer capability is lost, print tapes could be
COOP BACKUP PLANNING carried to a backup facility for offline printing.
It might also be possible to substitute batch
processing for online processing temporarily. In
The risk analysis should identify those situations in some cases, where compatible hardware is not
which backup operations will probably be needed to available, it maybe feasible to maintain a second
avoid costly delays in accomplishing the command software package that is functionally identical to
mission. The next step is to develop plans for backup the regular package but technically compatible
operations, which are economically, technically, and with the offsite AIS hardware that is available for
operationally sound. Details will depend on
backup use.
circumstances at the AIS facility, but some general
guidance and suggestions can be helpful in considering Modify tasks to reduce run time. To stretch
the alternatives. available backup resources, it might be feasible
to eliminate or postpone portions of a task, such
Backup operations may take place onsite when as information-only reports or file updates that
there is only a partial loss of capability. However, they are not time urgent. In some cases, it might help
may require one or more offsite locations when there is to double the cycle time for a task; that is, run a
major damage or destruction. The backup procedures daily task every other day instead.
may replicate normal operation or be quite different.
When considering backup, AIS management will often By considering these possibilities for each task, the
find that an exact replica of the onsite AIS system is not AIS technical manager can develop the specifications
available for backup or the time available per day is less for the minimum backup requirements (AIS hardware,
than the amount needed to complete all assigned tasks. resources, and hours per day necessary for adequate
From this, you might conclude that backup is backup).
impossible. On the contrary, a number of things can be
To evaluate alternate backup modes and offsite
done to make backup resources available. The
facilities, consider such factors as:
following are examples:
AIS hardware usage;
Postpone the less urgent tasks. Tabulate the
AIS tasks in descending order of urgency as Transportation of military and civil service
identified by the risk analysis. Having estimated personnel with needed supplies and materials;
the time to return to normal following a
disruptive event, AIS management can quickly Maintenance personnel at the offsite location;
see which tasks can be set aside. These include and
such things as program development, long cycle Overtime cost factor for civil service personnel.
(monthly, quarterly, or annual) processing, and
long-range planning. As long as adequate As these factors come into focus—identification of
catch-up time is available after the return to critical tasks, specific backup modes, and usable offsite
normal, there should be a number of tasks that AIS facilities-the outlines of the optimum backup plan
can be safely postponed. will begin to emerge. In general, it is wise to form
several COOP backup plans; for example:
A minimum duration plan. A plan for backup
FIRE EMERGENCY RESPONSE
operation that is not expected to extend much
1. Report fire (list phone number). beyond the cause of delay which forces a shift to
backup operation; namely, a minimum duration
2. Assess life-safety hazard.
plan that would probably include only the most
3. Evacuate facility if necessary. time urgent AIS tasks.
4. Initiate loss control procedures. A worst-case plan. A plan for backup operation
for as long as it takes to reconstruct the AIS
Figure 4-13.—Fire emergency response. facility after total destruction.

4-28
In-between plans. Plans for one or more Administrative information. It is probable that
operating periods between minimum duration COOP backup operation will require special
and worst case. personnel assignments and procedures,
temporary employment or reassignment of
A plan for each major partial failure mode. personnel, use of special messengers, and other
While the individual COOP plans are geared to departures from normal. Details are to be
different objectives, they can usually be constructed documented, along with guidance on obtaining
from a common set of modules. It is often most required approvals.
effective to make a detailed plan for total destruction When each of the COOP backup plans is
since this is the most demanding situation. completed, it should include full documentation and
Scaled-down versions or individual elements from this have upper management approval. Each of the plans
plan can then be used for the less-demanding situa- may have considerable duplication. However, it is
tions. suggested that each plan be completely documented to
be sure nothing has been overlooked.
Each COOP backup plan should cover the
following five basic areas: RECOVERY PLANNING
Performance specifications. This is a
statement of the specific ways in which The use of a backup facility usually means both
performance of each task departs from normal; extra expense and degraded performance. Therefore,
for example, tasks postponed, changes in cycle give some thought to recovery by developing and
maintaining supporting documents that minimize the
times, and schedules.
time required for recovery. Furthermore, the AIS staff
User instructions. Backup operation may will be hard pressed by backup operations. If others can
require users to submit input in different forms handle recovery, the workload on the AIS staff will be
or to different locations or may otherwise call for reduced during the emergency and the process will
altered procedures. These should be clearly undoubtedly be carried out more effectively and
spelled out to avoid confusion and wasted economically. Recovery from total destruction requires
motion. the following tasks be completed:

Technical requirements for each AIS task. Locate and obtain possession of enough floor
Backup operation of an AIS task will require the space to house the AIS facility with a live-load
availability at the offsite AIS facility of the capacity as required by the AIS hardware and
following items: current program and data files, suitably located with respect to users and AIS
staff spaces.
input data, data control and operating instruction
(which may differ from normal instruction), Perform required modifications for needed
preprinted forms, carriage control tapes, and the partitions, raised floor, electric power
like. These requirements must be documented distribution, air conditioning, communications,
for each task. Procedures also need to be security, fire safety, and any other special
established to ensure the materials needed for requirements.
backup operation are maintained offsite on a Procure and install AIS hardware.
current basis.
Procure needed supplies, office equipment and
Computer system specifications. One or more furniture, tape storage racks, decollators, and so
offsite computer systems are selected for backup forth.
operation. The following information should be
recorded for each system: administrative Verify that all needed hardware, equipment, and
information about the terms of backup use, the materials are on hand and in good working order.
location of the system, the configuration and Then transfer operations from the backup site to
software operating system, a schedule of the reconstituted AIS facility.
availability for backup operation, and the If the necessary documents have been prepared and
tentative schedule of AIS tasks to be performed stored offsite before the emergency, it should be
on the system. possible for all but the last tasks to be completely

4-29
reconstructed with minimum effort. Figure 4-14 shows Similar tests of procedures for fire fighting, loss
a simplified step diagram of a normal reconstruction control, evacuation, bomb threat, and other
effort. emergencies will give assurance that plans are adequate
and workable. At the same time. they provide an
COOP TESTING
opportunity for training AIS personnel. Each test
Because emergencies do not occur often, it is should have a specific objective. A team should be
difficult to assure adequacy and proficiency of assembled to prepare a scenario for the test, to control
personnel and plans without regular training and and observe the test, and to evaluate the results. This
testing. Therefore, it is important to plan and budget evaluation provides guidance for modifications to
for both. The availability of needed backup files may emergency plans and for additional training. The
be tested by attempting to repeat a particular task using important point is to be sure the emergency plans do, in
onsite hardware but drawing everything else from the fact, contribute to the security of the AIS facility.
offsite location. Experience demonstrates the value of
such tests in validating backup provisions; it is not
uncommon to discover gross deficiencies despite the SECURITY INSPECTIONS
most careful planning. Compatibility with the offsite The final element of the AIS security program for
facility should be verified regularly by running one or every naval AIS facility should be a review or
more actual tasks. A number of AIS facilities conduct inspection process. The inspection should be an
such tests as a part of an overall inspection. independent and objective examination of the
information system and its use (including
organizational components) and including the
following checks:
Checks to determine the adequacy of controls,
levels of risks, exposures, and compliance with
standards and procedures; and
Checks to determine the adequacy and effec-
tiveness of system controls versus dishonesty,
inefficiency, and security vulnerabilities.
The words independent and objective imply the
inspection complements normal management inspec-
tions, visibility, and reporting systems and is neither a
part of, nor a substitute for, any level of management.
What can an inspection be expected to accomplish?
First, it evaluates security controls for the AIS facility.
Second, it provides each level of management an
opportunity to improve and update its security program.
Third, it provides the impetus to keep workers and
management from becoming complacent. Fourth, if
done effectively, it tends to uncover areas of
vulnerability. Remember, risks change, and new threats
arise as systems mature.
Major factors to consider in determining the
frequency of internal inspections include the frequency
of external inspections, the rate of change of the AIS,
the amount and adequacy of controls, the threats that
face the facility, the results of previous inspections, and
the directions of higher authority. Inspection activity,
direction, and implementation are usually at the
discretion of the commanding officer of the command
Figure 4-14.—Simplified diagram of an AIS facility with jurisdiction over the AIS facility.

4-30
INSPECTION PREPARATION from the AIS facility being evaluated need not
significantly affect the objectivity of the
The inspection should be conducted by some
inspection process.
department or facility outside the span of control of the
AIS technical manager. One of the main principles in Users. Users have the most to gain from an
selecting an inspection team is that members should not effective inspection because of their dependence
be responsible for AIS operations. Team members on the AIS facility, yet too often they have little
should have some knowledge of data processing and, if or no interest in AIS controls or security
possible, basic inspection principles. A programming measures. To encourage participation in the AIS
or AIS operations background is desirable but not security program, one or more users who are
essential. An experienced military or civil service user concerned about sensitive data being
of AIS services might have the necessary qualifications. compromised, disclosed, or destroyed should be
The role of the team is not to develop security controls, motivated to join or should be appointed to the
but to evaluate established controls and procedures. inspection team.
Also, the team should not be responsible for enforcing
control procedures, which is clearly an AIS Building management. Many of the physical
management responsibility. security controls to be inspected—fire prevention
and detection, air conditioning, electric power,
The character of each of the inspection team access controls, and disaster prevention-relate
members is extremely important. Judgment, objectiv- to building management and engineering.
ity, maturity, ability, and a probing nature will all affect
the success of the inspection. The leader of the inspec- Outside specialists. Independent, experienced
tion team must be able to organize the efforts, prepare viewpoints provided by outside consultants can
be very helpful.
a good written report, and communicate findings
effectively. The leader should be an officer, warrant The composition of the team can be flexible. One
officer, chief petty officer, or U.S. civilian employee of the prime requirements is that it consist of people
who is GS-7 or above. If not technically oriented, the who are objective. If only one AIS facility is to be
team leader should be assisted by someone whose inspected, the members of the team can be assigned for
technical judgment and knowledge of AIS is reliable. the term of the inspection and then returned to their
normal jobs. If there are many AIS facilities under the
The size of the team depends upon the size of the jurisdiction of the command, it might be advisable to
facility and the scope of the inspection. A large facility establish a permanent inspection team to review all
should consider including personnel from the following facilities on a recurring basis. In any event, the
areas on the inspection team: composition of the team should be changed periodically
to bring in fresh viewpoints and new and different
Internal inspection. The knowledge and inspection techniques.
discipline to conduct an inspection can be
provided through internal inspection specialists. THE INSPECTION PLAN
Inquisitiveness, a probing nature, and attention
A comprehensive inspection plan must be
to detail are typical characteristics desired for
developed to properly conduct an internal inspection of
inspection board members. Even though an
security. It should be action-oriented, listing actions to
inspection team member generally is not trained
be performed. The plan must be tailored to the
in data processing technology, it should not be
particular facility. It should include the report and
difficult to appoint team members with some
report formatting requirement and the distribution of
data processing knowledge.
the final report. This means quite a bit of work is
Security. A security officer is a welcome required in its development.
addition to an inspection team.
The first step is to examine the security policy for
Computer operations. Technical expertise in the AIS facility. This policy may apply to an entire
data processing is required. Both programming naval district, a command, a ship, a department, or a
knowledge and operations experience is helpful. single AIS facility. In any case, the security policy
Perhaps the data processing internal security should be reviewed and pertinent security objectives
officer has these skills and, if so, should be a extracted for subsequent investigation. The next step is
prime candidate for the team. Using someone to review the risk analysis plan, identifying those

4-31
vulnerabilities that are significant for the particular topics. One must, however, avoid irrational
facility. Third, the AIS Facility Security Manual, the concentration on anyone aspect of the program.
Operations Manual, and other appropriate documents Management overemphasis as a result of a recent
should be reviewed to determine what the specified security breach should be tempered with a
security operating procedures are. And last, the AIS rational approach toward investigating all
facility organization chart and job descriptions should aspects of computer security.
be examined to identify positions with specific security Another step in the process of developing an
or internal control responsibilities. This background inspection plan is the review of previous inspection
material forms the basis for the development of the reports. Many times these identify weaknesses or
inspection plan. A number of general questions should concerns that should have been corrected, and so should
be considered when formulating the inspection bean item of special attention in the current inspection.
program. The following are examples:
CONDUCTING INSPECTIONS
What are the critical issues with regard to
security? Does the AIS facility process Advantages can be gained from using both
classified or otherwise sensitive data? Does the scheduled and surprise inspections. A scheduled
processing duplicate that of other data centers, inspection should meet the general policy requirements
thereby providing some sort of backup or of the particular facility and should occur at least
contingency capability? Or is it a stand-alone annually. This could be a major inspection conducted
activity processing unique applications? What by an outside command, an internal inspection, or a spot
are the critical applications in terms of the check inspection to review specialized items of interest,
inspection emphasis? perhaps as a result of previous inspection reports of
findings. The distinguishing characteristic is that it is
What measures are least tested in day-to-day scheduled in advance, with a resultant flurry of
operations? For example, if the computer fails preparation by the AIS facilities. It motivates cleaning
every day at 1615 because of power switchovers, up loose ends, but limits what can really be learned from
the immediate backup and recovery the inspection.
requirements are likely to be well formulated and A surprise inspection is designed to test on a
tested. However, the complete disaster recovery no-notice basis certain elements of security and control.
plan probably has not been tested, unless there is It should be approved by the commanding officer of the
a specific policy to do so. This is a key point. command in charge of the AIS facility. It can be
Security measures of this type are often accomplished by the command or an external
inadequately exercised. inspection team. It can be used to test those elements
What inspection activities produce the best reviewed on a surprise basis, such as fire response,
maximum results for least effort? A test of fire access control, and personnel complacency.
detection sensors under surprise conditions tests When a scheduled inspection is conducted, the first
not only the response to alarms but also the step normally is to interview AIS personnel. Generally,
reaction of the fire party and the effectiveness of the first walk-through includes interviews with the AIS
evacuation plans. In interviewing personnel, the technical manager. Searching questions, rather than
team should design questions to elicit leading questions, should be the rule, and the best
comprehensive answers. For example, the approach is to allow the interviewee to talk as freely as
question “How would you process an possible. If you are the interviewer, ask questions to put
unauthorized job?” is likely to elicit more the interviewees in the position of probing for their
information than “Are job authorization controls answers. For example, “What is your biggest access
effective?” The most likely answer to the second control problem?” not “Do your people wear badges?”
question is a simple and uninformative “Yes.” Ask how illegal entry or sabotage would be
accomplished. Do not hesitate to ask the same
What are the security priorities? Because of
questions of more than one person. It is interesting how
particular policy, a request for an investigation,
varied the responses can be.
or an incident of loss, interruption, or
compromise, the testing of a particular security The conduct of the interviewer is important. Strive
measure probably should receive more emphasis to be open in dealing with interviewees. Avoid
than another equally important but noncurrent allusions to private information and obscure references

4-32
to other people or events or in any other way cultivating A detailed report of observations made;
an air of mystery or superiority. It goes without saying
the use of good human relations techniques is essential Conclusions drawn from the observations; and
to a successful interview. Nothing can be gained by Recommendations for corrective actions, as
being belligerent and antagonizing the interviewee. appropriate.
Your conduct should be firm and inquisitive, but also
calm, sincere, and open. Probe in some detail any The degree of cooperation received should be noted and
answer that appears evasive or defensive. favorable conclusions should be given the same
prominence as deficiencies. Tables, charts, and
Taking notes is a matter of individual preference. matrices of results, statistical tests, and conclusions may
Some people take very adequate notes at listening be very helpful. Distribute the final report to the AIS
speed. Others must devote all their attention to facility and the command upper management as
listening. If note taking is a problem, the interview prescribed in the planning phase.
could be conducted by two-person teams. Another
alternative is to use a portable tape recorder, making INSPECTION FOLLOW-UP
certain the interviewee knows in advance that the An inspection is of little use unless it is the basis for
interview is being taped. If a two-person team or a tape improvement, correction, and management follow-up.
recorder is not available, attempt to listen and absorb as The responsibility for implementation of such activity
much as possible, then record notes and impressions normally resides with the commanding officer (CO) of
directly after the conclusion of the interview. the command. The CO must, in turn, assign
The evaluation tests can be scheduled or come as a responsibilities for corrective action. The best
surprise. Most security inspections include testing the approach is to summarize each major deficiency on a
emergency, fire, evacuation, and disaster recovery control sheet, outlining requirements, problem
activities. Access controls should also be tested on a definition, responsibility, action taken or required, and
no-notice basis. Tests are best scheduled or conducted follow-up action. In addition, an indication should be
early in the inspection rather than after everyone is made of the date that action should be completed, or if
alerted to the presence of the inspection team. Special it is to continue. Some of the corrective action may
concern, guidance, and instructions must be taken into require additional funds; this should be noted.
consideration when the AIS facility has armed guards. Corrective action, follow-up, and disposition of the
It is possible to test the adequacy of programmed deficiencies should follow a recurring reporting cycle
controls and data authorization by submitting jobs that to upper management. Quarterly reports are
attempt to bypass these controls. Take care not to recommended for any inspection control items still
destroy live data. However, if AIS upper management open.
believes error detection and correction controls really
work, then there should be no objection to the The final step is a frank and honest evaluation of
introduction of deliberate errors to test these controls. the inspection itself by AIS facility management and the
inspection team. A group discussion should be held
The inspection team should convene periodically, with the expressed purpose of improving future
preferably at the end of each day’s activity, to review inspection procedures and processes. The inspection
progress and to compare notes. Areas of weakness or plan may need to be amended or the team composition
concern should be highlighted, and additional tests or may need to be changed. The emphasis of the
interviews scheduled to investigate further any inspection should always be positive—one of helping
particular areas of concern. Copies of the inspection AIS management at all levels to improve the security
working paper should be classified, numbered, dated, and control of the AIS facility.
and organized for ease of understanding, review, and
comparison.
At the completion of the inspection, a written report DATA PRIVACY
is to be prepared immediately, while impressions are The Privacy Act of 1974 (Public Law 93-579)
still fresh. As a rule, the inspection report includes: imposes numerous requirements upon naval commands
An executive summary; to prevent the misuse or compromise of data concerning
individuals. Navy AIS facilities that process personal
A description of the inspection—dates data must provide a reasonable degree of protection
locations, scope, objectives, and so forth; against unauthorized disclosure, destruction, or

4-33
modification of personal data, whether it is intentional The major provisions of the Privacy Act that most
or results from an accident or carelessness. directly involve computer security are found in the
Department of the Navy Information Systems following parts of title 5, United States Code (U.S.C.),
Security (INFOSEC) Program, SECNAVINST 5239.3, section 552a:
provides guidelines for use by all Navy organizations 1. Subsection (b)—limits disclosure of personal
in implementing any security safeguards that they must information to authorized persons and
adopt to implement the Privacy Act. It describes risks commands.
and risk assessment, physical security measures,
appropriate information management practices, and 2. Subsection (e)(5)—requires accuracy,
computer system/network security controls. relevance, timeliness, and completeness of
records.
Department of the Navy Privacy Act (PA) Program,
3. Subsection (e)(10)—requires the use of
SECNAVINST 5211.5, implements the Privacy Act and
safeguards to ensure the confidentiality and
personal privacy and rights of individuals regarding
security of records.
their personal records. It delineates and prescribes
policies, conditions, and procedures for the following: The following terminology is used in discussing the
treatment of personal data:
Any Department of the Navy system of records
possessing a record on an individual must verify Confidentiality. A concept that applies to data.
it has the record upon the request of the It is the status accorded to data that requires
individual. protection from unauthorized disclosure.
The identity of any individual requesting Data integrity. The state existing when data
personal record information maintained on them agrees with the source from which it is derived,
must be confirmed before the information is and when it has not been either accidentally or
released. maliciously altered, disclosed, or destroyed.
An individual must be granted access to his/her Data Security. The protection of data from
personal files on request. accidental or intentional, but unauthorized,
modification, destruction, or disclosure.
Any request from an individual concerning the
amendment of any record or information Safeguards that provide data protection are grouped
pertaining to the individual for the purpose of into three categories: physical security measures,
making a determination on the request or information management practices, and computer
appealing an initial adverse determination must system/network security controls. Specifically, these
be reviewed. are:
Personal information is collected, safeguarded, Physical security measures. Measures for
and maintained, and decisions are made protecting the physical assets of a system and
concerning its use and dissemination. related facilities against environmental hazards
or deliberate actions as discussed earlier in this
The disclosure of personal information, and chapter.
decisions concerning which systems records are
to be exempted from the Privacy Act. Information management practices.
Procedures for collecting, validating,
Rules of conduct are established for the guidance
processing, controlling, and distributing data.
of Department of the Navy personnel who are
subject to criminal penalties for noncompliance Computer system/network security controls.
with the Privacy Act. Techniques available in the hardware and
The Chief of Naval Operations is responsible for software of a computer system or network for
administering and supervising the execution of the controlling the processing of and access to data
Privacy Act and SECNAVINST 5211.5 within the and other assets.
Department of the Navy. Additionally, the Chief of Technological safeguards for security risks are
Naval Operations is designated as the principal Privacy presented in figure 4-15. They may be viewed in
Act coordinator for the Department of the Navy. relation to the control points within a computer

4-34
Figure 4-15.—Personal data security risks and technological safeguards.

4-35
system/network. This perspective shows the elements The programmer responsible for support of the
of a computer system/network, beginning with the operation or function under consideration;
offline storage of personal data in machine-readable
media (for example, tapes and disks) and progressing A representative from the facility responsible for
through the many possible processing modes. It managing AIS operations;
includes the use of interactive computer terminals at A system programmer (if the command has
local and remote locations and the linking of local system programmers in a separate fictional
systems via communications networks. It stresses the area);
value of physical security measures and information
management practices, in relation to computer A computer specialist assigned the responsibility
system/network controls. for overseeing or inspecting system security; and
The individual responsible for security.
PERSONAL DATA RISK ASSESSMENT
PERSONAL DATA SECURITY RISKS
The first step toward improving a system’s security
is to determine its security risks using the criteria Each command should identify its specific risks and
discussed earlier in this chapter. A personal data evaluate the impact of those risks in terms of its
security risk assessment benefits a command in three information files. Experience indicates the most
ways: commonly encountered security risks are usually
accidents, errors, and omissions. The damage from
It provides a basis for deciding whether these accidental events far exceeds the damage from all
additional security safeguards are needed for other personal data security risks. Good information
personal data. management practices are necessary to reduce the
It ensures that additional security safeguards damage that can result from these occurrences.
help to counter all the serious personal data Personal data security risks include:
security risks.
Input error. Data may not be checked for
It saves money that might have been wasted on consistency and reasonableness at the time they
safeguards that do not significantly lower the are entered into the system; or data may be
overall data risks and exposures. disclosed, modified, lost, or misidentified during
input processing.
The goal of a risk assessment is to identify and
prioritize those events that would compromise the Program errors. Programs can contain many
integrity and confidentiality of personal data. The undetected errors, especially if they were written
seriousness of a risk depends both on the potential using poor programming practices or were not
impact of the event and its probability of occurrence. extensively tested. A program error may result
in undesirable modification, disclosure, or
In general, the risk assessment should consider all destruction of sensitive information.
risks, not just risks to personal data. While this section
of the chapter emphasizes the security of personal data, Mistaken processing of data. Processing
it is best to develop an integrated set of security requests may update the wrong data; for
safeguards and requirements that protect all classified example, a tape mounted at the wrong time.
and other valuable data in the system wherever possible.
Data loss. Personal data on paper printouts,
The risk assessment should be conducted by a team magnetic tapes, or other removable storage
which is fully familiar with the problems that occur in media may be lost, misplaced, or destroyed.
the daily handling and processing of the personal Improper data dissemination. Disseminated
information. The participants on the risk assessment data may be misrouted or mislabeled, or it may
team should include: contain unexpected personal information.
A representative of the operating facility Careless disposal of data. Personal data can be
supported by or having jurisdiction over the data retrieved from wastepaper baskets, magnetic
under consideration; tapes, or discarded files.

4-36
Every AIS facility’s technical manager and upper Operating system flaws. Design and
management should establish strict controls and implementation errors in operating systems
procedures over individuals authorized to access the allow a user to gain control of the system. once
personal data files. If everyone at the facility needs the user is in control, the auditing controls can
authority to access personal data files, the security be disabled, the audit trails erased, and any
measures should adequately control system access. If information on the system accessed.
there are persons working on the system whose access
should be limited, the following risks should be Subverting programs. Programs containing
considered: hidden subprograms that disable security
protections can be submitted. Other programs
Open system access. This means there may be can copy personal files into existing or
no control over who can either use the AIS or misidentified files to use when protection is
enter the computer room. relaxed.
Theft of data. Personal data maybe stolen from Spoofing. Actions can be taken to mislead
the computer room or other places where it is system personnel or the system software into
stored. performing an operation that appears normal but
actually results in unauthorized access.
Unprotected files. Personal data files may not
be protected from unauthorized access by other Eavesdropping. Communications lines can be
users of the AIS. This applies to online files and monitored by unauthorized terminals to obtain
also to offline files, such as files on magnetic or modify information or to gain unauthorized
tapes. The offline files are sometimes accessible access to an AIS.
simply by requesting a tape be mounted.
Dial-in access. There is serious danger that INFORMATION MANAGEMENT
unauthorized persons can access the system PRACTICES
when remote, dial-in access is allowed.
Information management practices refer to the
Open access during abnormal circumstances. techniques and procedures used to control the many
Personal data that is adequately protected during
operations performed on information to accomplish the
normal operations may not be adequately command’s objectives. They do not extend to the
protected under abnormal circumstances.
essential managerial determination of the need for and
Abnormal circumstances include power failures, uses of information in relation to any command’s
bomb threats, and natural disasters, such as fire mission. In this context, information management
or flood. includes data collection, validation and transformation;
The physical destruction or disabling of the AIS is information processing or handling; record keeping;
not normally a primary risk to privacy. However, all information control, display, and presentation; and,
computer systems presently in use are vulnerable to finally, standardization of information management
deliberate penetrations that can bypass security operations.
controls. These types of security penetrations require
extensive technical knowledge. At present, the Navy Before enacting new policies in personal data
has experienced very few of these deliberate handling procedures, AIS technical managers should
penetrations. Commands designing large computer analyze current practices. To facilitate the explanation
networks should consider the following risks early in of their roles, the information management guidelines
the planning stage: presented in the following material are grouped into
major categories: handling of personal data,
Misidentified access. Passwords are often used maintenance of records to trace the disposition of
to control access to a computer or to data, but personal data, data processing practices, programming
they are notoriously easy to obtain if their use is practices, assignment of responsibilities, and
not carefully controlled. Furthermore, a person procedural inspecting. Every practice presented may
may use an already logged-in terminal, which the not be required at every Navy AIS facility by upper
authorized user has left unattended, or may management. Select only the suggested practices
capture a communications port as an authorized relevant to the designated command’s environment and
user attempts to disconnect from it. mission, or approved by upper management.

4-37
Handling of Personal Data Carefully control products of intermediate
processing steps. For example, control scratch
Access to personal information will be limited to tapes and disk packs to ensure they do not
authorized individuals of agencies in the Department of contribute to unauthorized disclosure of
Defense who have an official need for the record, except personal data.
when the information is otherwise releasable under the
disclosure or access provisions of the Privacy Act. Maintain an up-to-date hard-copy authorization
list. The list should include all individuals
The following practices are suggested for the (computer personnel as well as system users)
handling of personal data: allowed to access personal data. It is used in
Prepare a procedures handbook. Describe the access control and authorization validation.
precautions to be used and obligations of Maintain an up-to-date hard-copy data
computer facility personnel during the physical dictionary. This dictionary should be the
handling of all personal data. Include a reference complete inventory of personal data files within
regarding the applicability of the procedures to the computer facility to account for all
those government contractors who are subject to obligations and risks.
the Privacy Act. Personal information that is
processed, accessed, maintained, or disposed of Maintenance of Records to Trace the
by contractors must be handled within the terms Disposition of Personal Data
and conditions of Section 7-104.96 of the
Defense Acquisition Regulation. The following practices are suggested for the
maintenance of records:
Label all recording media that contain personal
data. Labeling the media reduces the probability Establish procedures for maintaining correct,
of accidental abuse of personal data. It also aids current accounting of all new personal data
in fixing the blame in the event of negligent or brought into the computer facility.
willfully malicious abuse. If the information
resides on removable storage media, it should be Log each transfer of storage media containing
externally labeled. External warnings must personal data to or from the computer facility.
clearly indicate that the media contain personal Maintain logbooks for terminals used to access
information subject to the Privacy Act; for personal data by system users.
example, PERSONAL DATA—PRIVACY
ACT of 1974. Note that abbreviations must not Data Processing Practices
be used.
Store personal data in a manner that conditions The following practices are suggested for data
users to respect its confidentiality. For example, processing procedures:
store personal data under lock and key when not Use control numbers to account for personal data
being used. upon receipt and during input, storage, and
If a program generates reports containing processing.
personal data, have the program print clear Verify the accuracy of the personal data
warnings of the presence of such data on the acquisition and entry methods employed.
reports.
Take both regular and unscheduled inventories
Color code all computer tape reels, disk pack of all tape and disk storage media to ensure
covers, and so on, which contain personal data, accurate accounting for all personal data.
so they can be afforded the special protection
required by law. Use carefully devised backup procedures for
personal data. A copy of the data should be kept
Keep a record of all categories of personal data at a second location if its maintenance is required
contained in computer-generated reports. This by law.
facilitates compliance with the requirements that
each command identify all personal data files Create a records retention timetable covering all
and their routine uses by the command. personal data and stating minimally the data

4-38
type, the retention period, and the authority Designate an individual responsible for
responsible for making the retention decision. examining facility practices in the storage, use,
and processing of personal data, including the
After a computer failure, check all personal data
use of security measures, information
that was being processed at the time of failure for
management practices, and computer system
inaccuracies resulting from the failure.
access controls. Both internal uses and the
If the data volumes permit economic processing, authorized external transfer of data should be
some sensitive applications may use a dedicated considered by this individual and any risks
processing period. reported to the relevant upper management
authority and the AIS technical manager.
Examine files created from files known to
contain personal data to ensure they cannot be Designate an individual responsible during each
used to regenerate any personal data. A formal processing period (shift) for ensuring the facility
process must be established to determine and is adequately staffed with competent personnel
certify that such files are releasable in any given and enforcing the policies for the protection of
instance. personal data.
In aggregating personal data, consider whether Ensure that all military, civil service, and other
the consequentfile has been increased in value to employees engaged in the handling or
a theft-attracting level. processing of personal data adhere to established
codes of conduct.
When manipulating aggregations and
combinations of personal data, make it Procedural Inspecting
impossible to trace any information concerning
an individual. Take steps so that no inference,
Whenever appropriate, conduct an independent
deduction, or derivation processes can be used to
examination of established procedures. Inspections of
recover personal data.
both specific information flow and general practices are
possible. The following points should be considered
Programming Practices when developing an inspection:
The following practices are suggested for Inspecting groups can be established within
programming procedures: organizations to provide assurance of
compliance independent of those directly
Subject all programming development and responsible.
modification to independent checking by a
second programmer, bound by procedural Independent, outside inspectors can be contacted
requirements developed by a responsible to provide similar assurance at irregular
supervisor. intervals.

Inventory current programs that process or Inspection reports should be maintained for
access personal data; verify their authorized routine inspection and used to provide additional
usage. data for tracing compromises of confidentiality.
Enforce programming practices that clearly and IDENTIFICATION TECHNIQUES
fully identify personal data in any computer
program. Once security measures and information
Strictly control and require written authorization management practices are established, the AIS
for all operating system changes that involve technical manager should consider methods of personal
software security. identification of individuals for authorized access to the
AIS facility. The identification of each individual
Assignment of Responsibilities allowed to use a system is a necessary step in
safeguarding the data contained in that system.
The following practices are suggested for the For a broader knowledge of personal identification
assignment of responsibilities: and identification techniques, refer to Guidelines on

4-39
Evaluation of Techniques for Automated Personal Learn the AIS terminology and requirements.
Identification, FIPS PUB 48. Keep alert; early detection of problems is the key to
minimizing damage and destruction.

SUMMARY Security of all types should be a continuous matter


with every AIS technical manager. In this chapter, we
AIS security is everyone’s job. The key word is have scratched only the surface of the material available
PROTECT: take all reasonable measures to protect our on classified security, physical security, and security
AIS assets. Be sure you know what to do if a fire breaks and privacy of data. It is a subject with which everyone
out, the air conditioning goes off, the power goes down should be completely up-to-date. Study the material
(with or without an UPS), or an unauthorized person is presented and referenced in this chapter to become
in your computer facility. knowledgeable in AIS security.

4-40
CHAPTER 5

GENERAL SECURITY

LEARNING OBJECTIVES

Upon completing this chapter, you should be able to do the following:

Identify the procedures for verifying the identification and clearance of


recipients.

Identify the procedures for TEMPEST requirements.

Identify methods of controlling access to security areas, including


designation of restricted areas, requirements relating to lock combinations,
and procedures for sanitizing sites and equipment.

Identify the procedures and regulations for marking material and


conducting inventories of classified material (Secret and below).

Identify the procedures used for clearing media and hardware of classified
material (Secret and below).

Identify the regulations and procedures for declassification or destruction


of classified hardware and the destruction of classified material (Secret
and below).

Identify the regulations and procedures covering the receipt, inspection,


handling, destruction, and verification of classified material (SPECAT or
Top Secret and above).

Your duties as a Radioman will require that you You must be security conscious to the point that you
handle considerable amounts of classified information automatically exercise proper discretion in the
and equipment. You should be able to recognize discharge of your duties. In this way, security of
classified matter and know what to do—or not do—with classified information becomes a natural element of
it. Security is as basic a part of your assignment as every task and not an additionally imposed burden.
operating telecommunications equipment.
Safeguarding classified information is an integral part RECIPIENT’S IDENTIFICATION AND
of your everyday duties. CLEARANCE
The security of the United States in general, and of Identification may be provided with the member
naval operation in particular, depends upon the military identification card, command identification
safeguarding of classified information. As a Radioman, cards or badges. Normally, local standard operating
you will learn information of vital importance to both procedures cover the individual command’s
the military and the nation. At times, vast amounts of requirements. Guidelines for identification and access
classified message information will pass through your are contained in the Department of the Navy
hands. Information and Personnel Security Program

5-1
Regulation, OPNAVINST 5510.1, hereinafter called adherence to approved installation criteria; and
the Security Manual. the use of TEMPEST-approved equipment or
systems.
Military identification cards are required to be
carried by all active duty military. They aid only Threat— The capability and motivation of an
in recognizing the individual, not access or enemy to exploit the TEMPEST signal.
clearance. The interaction of all of these factors determines the
A command identification card/badge assists in vulnerability. From this assessment and considering
identifying the level of security clearance of the the category, classification, or sensitivity of the
holder or where the holder is authorized to enter. information involved, a determination will be made.
These cards/badges are only an aid and may not An Instrumented TEMPEST Survey (ITS) will be
be used as the basis for granting access to scheduled, or the requestor will be placed in the
information or areas. “acceptable risk” category.
A personnel security clearance will be issued to an
individual by the Department of the Navy Central Tempest Vulnerability Assessment Request
Adjudication Facility (DONCAF), or other designated (TVAR)
clearance authority with favorable completion of
required paperwork in accordance with the Security A TVAR must be submitted prior to processing
Manual. A copy of OPNAV 5510/413 (Clearance classified data. This request should be sent to the Naval
Report) will be filed in the member’s permanent service Criminal Investigative Service, Washington D.C., with
record and in the security officer’s files. a copy to CO, NAVELEXSECCEN and other
commands as appropriate. The list of required
information is available in Navy Implementation of
CONTROL OF COMPROMISING National Policy on Control of Compromising
EMANATIONS (TEMPEST) Emanations (U), OPNAVINST C5510.93.
Compromising emanations (CE), referred to as Some ships are identified by CNO as high
“TEMPEST,” are unintentional data-related or TEMPEST risk platforms. Those which are likely to be
intelligence-bearing signals. If these signals are the target of hostile TEMPEST collection efforts will
intercepted and analyzed, they could disclose the be scheduled for an Instrumented TEMPEST Survey
information transmitted, received, handled, or (ITS). No TVAR is required from any ship.
otherwise processed by electrical information-
processing equipment or systems. Any electrical
information-processing device, whether an ordinary EMISSION CONTROL (EMCON)
electric typewriter or a large complex data processor,
may emit compromising emanations. EMCON is used to prevent an enemy from
detecting, identifying, and locating friendly forces. It
TEMPEST VULNERABILITY is also used to minimize electromagnetic interference
ASSESSMENT (TVA) among friendly systems. EMCON is normally imposed
by a commander to control all electromagnetic
The vulnerability of a ship, aircraft, shore station, radiations. Once EMCON is imposed, general or
transportable equipment, or a contractor facility is specific restrictions may be added to the EMCON order,
determined by a TEMPEST Vulnerability Assessment. depending on the operational, intelligence, or technical
This assessment includes each of the following factors, factors for the area affected.
which, together, create vulnerability: For radiomen, EMCON usually means either full
Susceptibility— The probability that TEM- radio silence or HF EMCON. The most secure
PEST signals exist and are open to exploita- communications methods during EMCON reduce, but
tion. do not eliminate, the possibility of identification. It is
assumed that any electromagnetic radiation will be
Environment— The primary environmental immediately detected, and the position of the
considerations are the geographical location of a transmitting ship will be fixed by an enemy. You will
ship, aircraft, shore station, or contractor facility; find detailed information on the implementation of
physically and electrically controlled spaces; EMCON and its degree of adjustment in Electronic

5-2
Warfare Coordination, NWP 3-51.1 (formerly NWP RESTRICTED AREAS
10-1-40).
Designating security spaces as restricted areas
provides an effective and efficient means for a
SECURITY AREAS command to restrict access and control movement. In
restricted areas, only those personnel whose duties
Different spaces aboard ship and different areas actually require access and who have been granted
within a shore activity usually have varying degrees of appropriate security clearance are allowed freedom of
security importance. The degree of security of each movement within the area.
area depends upon its purpose and the nature of the
work, information, equipment, or materials concerned. Persons who have not been cleared for access to the
Access to security areas must be controlled in a manner information contained within the area may, with
consistent with the security level. appropriate approval, be admitted into the area. While
in these spaces, however, uncleared persons must be
escorted, or other security procedures implemented to
SANITIZING SITE AND EQUIPMENT prevent any unauthorized disclosure of classified
information.
Sanitizing an area or equipment is done to make it All designated restricted areas must have warning
acceptable for access by personnel who are not cleared. signs posted at all entrances and exits. These areas must
This is used to prevent unauthorized persons from have clearly defined perimeters and, if appropriate,
gaining access that would allow them to identify the Restricted Area warning signs posted on fences and
purpose or nature of your work, information, equipment barriers.
and materials concerned.
To meet this situation, each command should apply Access to Spaces
differing protective measures commensurate with the
degree of security importance. Persons who have not The commanding officer or the officer in charge
been cleared for access to the information contained over security spaces is responsible for controlling
within the area, with appropriate approval, may be access to these areas. Procedures should limit access to
admitted into an area, but they must be controlled by an security spaces only to those persons who have a need
escort at all times. Follow guidelines set forth in the to know. No one has a right to have access to classified
Security Manual and local standard operating information or spaces based solely on clearance, rank,
procedures. or position.
A few of the basic requirements are listed below. Each command establishes a pass or badge
identification system to restrict access and to help
Remove, turn over, or place in drawers any control movement. Control of movement within the
classified material that may be out on desks. area is normally accomplished by requiring the display
or presentation of the pass or badge for that particular
Replace any keying material in the safe and lock. area.
Cover any status boards showing conditions of
equipment, frequencies, systems, and so forth. Access List
Cover all frequencies dialed into equipment.
Admission of visitors to communications spaces is
Cover monitors or turn off monitor screens if a topic of major concern to radiomen since access to
possible. communications spaces under operating conditions
usually permits viewing of classified traffic and
Do not conduct any work-related discussions.
equipment. A security badge does not automatically
At no time will the escort leave someone unattended. mean that visitors have a “need to know” or that they
The watch section or day working staff maybe required should be granted access. Admission to
to support the escort in cases where work is being communications spaces is granted only to personnel
conducted by numerous uncleared personnel in more whose names, rates/ranks, and clearance level appear
than one area. on the official access list.

5-3
Access lists, which must be signed and approved by mentioned earlier, no one has a right to access based
the commanding officer, should be posted at each solely upon security clearance, rank, or position.
entrance to a communications space. Admission of
persons other than those on the access list is subject to STORAGE OF CLASSIFIED MATERIAL
the specific approval of the commanding officer or his
or her designated representative. All classified matter not in actual use must be stored
Personnel not on the access list nor specifically in a manner that will guarantee its protection. The
granted permission by the commanding officer for entry degree of protection necessary depends on the
must be escorted or supervised at all times while in classification category, quantity, and scope of the
communications spaces. material involved. Normally, the type and extent of
physical protection required are determined before an
activity begins its day-to-day or watch-to-watch
Communications Center Visitors Log routine.
A communications center visitors log (or register) It is very likely that an appropriate physical security
is used to record the arrival and departure of authorized program is already in effect when you report aboard.
personnel whose names do not appear on the access list. Details concerning physical security standards and
Fleet Communications (U), NTP 4, recommends the requirements for classified information are contained in
following column headings for visitors logs: the Security Manual.
Date; Unattended Containers
Visitor’s printed name;
If you find an open and unattended container or
Organization the visitor is representing; cabinet containing classified matter, you should report
Purpose of visit; it to the senior duty officer. Do not touch the container
or contents, but guard them until the duty officer arrives.
Visitor’s signature; The duty officer then assumes responsibility for such
further actions as locking the security container,
Officer authorizing access to restricted area(s); recalling the responsible person or persons, and
Escort’s name; reporting the security violation to the commanding
officer. The custodian must conduct an immediate
Time in; and inventory of the contents of the security container and
Time out. report any loss to the commanding officer.

Access to Classified NATO Messages Combinations

Only those personnel who hold a security clearance Combinations to security containers containing
equal to or greater than the clearance required for U.S. classified material are made available only to those
material may have access to NATO messages. NATO persons whose duties require access to them. The
messages and documents belong to NATO and must not combinations of security containers containing
be passed outside the NATO organization. NATO classified information must be changed at least every 2
Security Procedures (U), OPNAVINST C5510.101, is years, unless more frequent change is dictated by the
the authority for the proper handling, storage, type of material stored within. Combinations must also
accounting, classification, and clearances of NATO be changed under the following circumstances:
material. When an individual knowing the combination no
The final responsibility for determining whether a longer requires access;
person is granted access to a security area rests upon the When the combination has been subject to
individual who has the authorized possession,
possible compromise or the security container
knowledge, or control of the information involved and
has been discovered unlocked and unattended;
not upon the prospective recipient. No number of
and
written rules or governing statutes can replace
individual initiative and common sense. As we When the container is taken out of service.

5-4
The combination of a security container used for (TS) for Top Secret,(S) for Secret, (C)for Confidential,
the storage of classified material is assigned a security and (U) for Unclassified.
classification equal to the highest category of classified
It is not uncommon to see foreign-originated
material authorized to be stored in the container.
Records of combinations are sealed in an envelope classified information in U.S. messages and documents.
Paragraphs that contain foreign-originated classified
(Standard Form 700) and kept on file in a central
location designated by the commanding officer. information must be properly marked; for example,
“U.K.(C)” or “NATO(S).”
Cipher Locks At the beginning of Restricted Data and Formerly
Restricted Data paragraphs, use the appropriate
Cipher locks and safe combinations are handled in classification symbol with the abbreviation “RD” or
accordance with guidelines found in the Security “FRD,” such as “(S-RD),” “(C-FRD).”
Manual. With the addition of electrically actuated
locks (that is, cipher and magnetic strip card locks), this Titles and subjects are classified according to their
type of lock still does not afford the degree of protection content, regardless of the overall classification of the
required for classified information. They may NOT be document. Normally, the symbols indicating the
used as the primary means to safeguard classified classification assigned to a title or subject are placed in
material. Cipher or magnetic strip card locks are parentheses immediately following the item, as in the
normally used for access to an area only. following example:

GENERAL MARKING
REQUIREMENTS SPECIAL-HANDLING MARKINGS
Classified documents and material must be clearly
and conspicuously marked. Special markings, such as In addition to security classification categories,
LIMDIS and Restricted Data, are normally placed near other markings also appear on some documents and
the classification markings. These markings inform messages. Among these markings are such
and warn recipients of the classification assigned and designations as Restricted Data (RD), Formerly
indicate the level of protection required. These Restricted Data (FRD), LIMDIS, FOUO, EFTO,
markings also identify the information that must be SPECAT, PERSONAL FOR, NATO RESTRICTED,
withheld from unauthorized persons. and ALLIED RESTRICTED.
Top Secret, Secret, and Confidential classification
markings must be stamped, printed, or written in capital Restricted Data and Formerly Restricted Data
letters larger than those used in the text of the document.
These security markings should be red in color, when The marking “Restricted Data” (RD) is applied to
practicable, and be placed at the top and bottom center all data concerned with the design, manufacture, or use
of each page. of nuclear weapons. Also included in this category is
All reproductions or copies of classified materials, the special nuclear material used in energy production.
regardless of form, must bear clearly legible security
classification markings and notations in the same The marking “Formerly Restricted Data” (FRD)
manner as on the copied or reproduced material. pertains to defense information that has been removed
Copying equipment does not always clearly reproduce from the RD category but must still be safeguarded as
all colors of ink or marginal images. If the reproduction classified defense information. FRD material cannot be
process does not clearly reproduce the security released to foreign nationals except under specific
markings appearing on the original copy, all copies international agreement.
must be marked in the same positions and size as on the
original. LIMDIS (Limited Distribution)
Paragraph markings are required for classified
documents. The appropriate security markings are The LIMDIS designator is applied only to classified
placed at the beginning of the classified paragraph. The messages which, because of the subject matter, require
symbols used to indicate paragraph classification are limited distribution within the addressed activity.

5-5
For Official Use Only (FOUO) SPECAT and SPECAT EXCLUSIVE FOR messages
must be at least Confidential. SPECAT SIOP-ESI
FOUO is the designation used on official messages are always Top Secret. PSEUDO-SPECAT
information not requiring a security classification but messages are normally unclassified messages that
which must be withheld and protected from public require limited distribution. Examples of
release. Unclassified messages containing FOUO PSEUDO-SPECAT messages include AMCROSS
information must have the abbreviation “FOUO” after messages, urinalysis test results, and HIV test results.
the designation “UNCLAS.” SPECAT messages are handled only by those
personnel who are authorized by the commanding
Encrypt for Transmission Only (EFTO) officer in writing to view them. The types of
information assigned SPECAT and handling
Certain categories of unclassified messages maybe procedures can be found in NWP 4 and in Fleet
identified as having potential value if subject to Communications (U), NWP 4, respectively.
analysis, but do not meet the criteria for security
classification. The special designation “EFTO” was PERSONAL FOR
established to protect these unclassified messages
during electrical transmission. PERSONAL FOR is the marking applied when
EFTO is not required on unclassified messages message distribution must be limited to the named
addressed exclusively among Navy, Marine Corps, and recipient. Only flag officers, officers in a command
Coast Guard commands. EFTO is authorized for use status, or their designated representatives may originate
within the Department of Defense, including the PERSONAL FOR messages.
National Security Agency. However, EFTO is required
on FOUO messages addressed to DOD activities NATO RESTRICTED
outside the continental United States. Bear in mind,
however, that just because information is FOUO, it is The United States does not have a security
not automatically EFTO, and vice versa. classification equivalent to NATO RESTRICTED.
NATO messages classified as restricted must be
As we mentioned earlier, EFTO is a transmission safeguarded in a manner similar to that for FOUO
marking for unclassified messages. FOUO markings, messages. Messages originated by NATO must be
however, define a certain category of information handled in accordance with NATO Security Procedures
requiring special handling. Neither FOUO nor EFTO (U), OPNAVINST C5510.101.
markings are security classifications; both are
special-handling designations. You can find detailed ALLIED RESTRICTED
information on EFTO and FOUO markings in Basic
Operational Communications Doctrine (U), NWP 4. The United States does not have a security
classification equivalent to ALLIED RESTRICTED.
SPECAT However, these messages must be handled in the same
manner as Confidential messages. U.S.-originated
The SPECAT marking means special category. messages containing ALLIED RESTRICTED
SPECAT messages are classified messages identified information are marked as “Confidential” immediately
with a special project or subject. SPECAT messages following the security classification.
require special-handling procedures in addition to the
The Security Manual contains complete
handling procedures for the security classification of
information on paragraph, subparagraph, and document
the message. There are four SPECAT categories:
markings.
SPECAT;
SPECAT EXCLUSIVE FOR (SEF); HANDLING AND STORAGE OF
CLASSIFIED MATERIAL
SPECAT Single Integrated Operational
Plan-Extremely Sensitive Information Classified messages must be provided accounting
(SIOP-ESI); and and control procedures that correspond to their assigned
classification. Accounting and control of classified
PSEUDO-SPECAT. messages serve the following functions:

5-6
Limit dissemination; As custodian of classified material, you are
responsible for protecting and accounting for the
Prevent unnecessary reproduction; and material at all times. You must ensure that the material
Determine the office or person normally is protected from disclosure to uncleared personnel,
responsible for the security of the material. such as a visitor being escorted through your working
spaces. If working outside of normal communication
With Top Secret messages, it is also important to keep spaces, you must ensure that classified material is
a current record of who has the information and who locked in an approved security container when the
has seen it. material is not in use or under direct supervision.
Since distinctions are made among the three levels
of classification, distinctions are also made in the CARE DURING WORKING HOURS.— Every
degree of accountability and control. Within each Radioman must take the necessary precautions to
command, specific control and accountability prevent access to classified information by
procedures are established to ensure that classified unauthorized persons. These precautions include:
material is properly controlled and that access is limited
only to cleared personnel. When removed from storage for working
purposes, classified documents must be kept
SECURITY PERSONNEL under constant surveillance or face down or
covered when not in use.
To control classified information with maximum
efficiency, the commanding officer designates a Preliminary drafts, carbon sheets, plates,
security manager, usually an officer. The security stencils, notes, work sheets, and all similar items
manager is responsible for the command’s overall containing classified information require special
security program, which includes the security of precautions. They must be either destroyed
classified information, personnel security, and the immediately after they have served their purpose
command’s security education program. or given the same classification and safeguarded
in the same manner as the classified material
In addition, the commanding officer usually produced from them.
appoints a Top Secret Control Officer (TSCO). The
TSCO is responsible for the receipt, custody, Typewriter ribbons used in typing classified
accounting, and disposition of Top Secret material in material must be protected in the same manner
the command. The TSCO is normally subordinate to as the highest level of classification for which
the security manager. If a separate person is not they have been used. Fabric typewriter ribbons
designated as the TSCO, the security manager maybe may be considered as unclassified when both the
designated as TSCO. The duties of the security upper and lower sections have been recycled
manager and the TSCO are outlined in the Security through the machine five times in the course of
Manual. regular typing. Those ribbons that are classified
must be destroyed as classified waste.
Besides the security manager and the TSCO, every
command involved in processing data in an automated CARE AFTER WORKING HOURS.— At the
system must designate an Information System Security close of each watch or working day, all classified
Officer (ISSO). The ISSO is responsible to the security material that is passed from watch to watch must be
manager for the protection of classified information properly inventoried. Custody is then transferred to the
processed in the automated system. relieving watch supervisor. All other classified
material must be locked in an approved security
Custody of Classified Material container. A system of security checks at the close of
each working day is the best method to ensure that all
An individual who has possession of or is charged classified material held is properly protected. Whether
with the responsibility for safeguarding and accounting your watch section is being relieved by the oncoming
for classified material or information is the “custodian” watch or you are securing an office space, you should
of that material or information. As a Radioman, you are make an inspection to ensure as a minimum that:
constantly in possession of classified material,
including messages, publications, and equipment. All classified material is properly stored.
Therefore, you are a custodian of classified material as
long as the material is in your possession. Burn bags are properly stored or destroyed.

5-7
Wastebaskets do not contain classified material. Only the text will be removed from the
monitor roll.
Classified notes, carbon paper, carbon and
plastic typewriter ribbons, rough drafts, and The message will be destroyed, and the
similar papers have been properly stored or monitor roll will be initialed by two
destroyed. As a matter of routine, such items witnessing officials.
should be placed in burn bags immediately after
they have served their purpose. The broadcast serial number checkoff sheet
will also be initialed by two witnessing
When classified material is secured in security officials.
containers, the dial of combination locks should 2. Destroy:
be rotated at least four complete turns in the same
direction. Top Secret, SPECAT/TS, and above material will
be destroyed by two witnessing officials. Persons
CLASSIFIED MATERIAL (SPECAT/TS performing any destruction must have a clearance level
AND ABOVE) equal to or higher than the material being destroyed.
The destruction of Top Secret, SPECAT/TS, and above
material must be recorded. Destruction may be
Classified material excludes communications
recorded on OPNAV form 5511/12 (figure 5-1), or any
security (COMSEC) material, which is handled by
other record which includes complete identification of
CMS 1 procedures. Further in-depth information on
the material, number of copies destroyed, date of
classified material can be found in the Security Manual
destruction, and personnel completing destruction. The
and in NTP 4.
two witnessing officials responsible for the destruction
1. Receive: must sign the record of destruction. The records of the
destruction are retained for 2 years.
The Top Secret Control Officer (TSCO) is
responsible for receiving, maintaining “cradle to grave” 3. Verify destruction:
accountability registers for, distributing and destroying
Top Secret, SPECAT/TS, and above documents. The destruction of Top Secret, SPECAT/TS, and
above material must be verified by both witnesses
All Top Secret, SPECAT/TS, and above material signing the destruction sheet and either turning it over
received or originated by a command, which the TSCO to the TSCO or placing it in the cryptocenter master file
is responsible for, is entered into the command’s until it is superseded, usually within 2 years.
accountability log.
Top Secret, SPECAT/TS, and above message HANDLING TOP SECRET MATERIAL
traffic, handled by naval communication stations for
relay or broadcast delivery only, or received by an afloat
command via the fleet broadcast but not addressed to Although administrative records are maintained for
that command will be accounted for and destroyed in each classification category, the strictest control system
accordance with NTP 4. is required for Top Secret material.

Top Secret, SPECAT/TS, and above messages Except for publications containing a distribution
addressed to the command are: list by copy number, all Top Secret documents and each
item of Top Secret equipment must be serially
Logged into the cryptocenter log. numbered at the time of origination. Also, each
document must be marked to indicate its copy number
Master copy is placed in the cryptocenter file, (for example, Copy No. ___ of ___ Copies).
and fillers are placed in the appropriate files.
Each page of a Top Secret document not containing
One copy is given to the TSCO for entry into
a list of effective pages (LOEP) must be individually
the command’s controlled distribution
numbered (for example, Page ___ of ___ pages). Top
register.
Secret documents are required to have a list of effective
Top Secret, SPECAT/TS, and above messages pages and a page-check page. Top Secret documents
received by an afloat command but NOT addressed to may be reproduced only with the permission of the
the command via the broadcast: originator or higher authority.

5-8
:LASSIFIED MATERIAL DESTRUCTION REPORT CLASSIFICATION (Indicate when title or
)PNAV 5511112 (REV. 3-75) S/N 0107.LF-055.1160 other identification is classified)
‘0: Commanding Officer, USS NEVERSAIL UNCLASSIFIED
ROM (Name md addressof activity)
Top Secret Control Officer
The classified material described below has been The purpose of this form is to provide activities with
estroyed in accordance with regulations established by the a record of destruction of classified material. Also, copies
kpartment of the Navy Information Security Program may be utilized forreports to activities originating material,
!egulation;OFWAV INSTRUCI’ION 55 10. 1G. where such reports are necessary.

DESCRIPTION OF MATERIAL

LOG/ ENCLOSURES TOTAL


3ERIAUDTG ORIGINATOR DATE COPY NO. ROUTE (IDENT. 8 NO.) NO.
SHEET NO. PAGES

10052 CINCPACFLT letter (Date) 1 4 4

*FlCER OR INDlVlDUAL AUTHORIZING DESTRUCTION (Signawe, Rank/Rat~VGmde)DATE OF DESTRUCTlON


(Date)
IlTNESSlNG OFFICIAL (Sipamre, RankLRat&Grade) WlTNESSING OFFICIAL (Signature, RaaMRaWGrade)
John Doe Jane Smith

Figure5-L-Classified MaterialDestructionReport.

5-9
A continuous chain of receipts for Top Secret information that lacks the totality and finality of
material must be maintained. Moreover, a Record of declassifying. There are distinct and specific
Disclosure, OPNAV form 5511/13, for Top Secret techniques to clear media and hardware; a sampling
material is attached to each document that circulates follows:
within a command or activity. Each person having
knowledge of the contents of a Top Secret document Magnetic tapes: Overwrite one item with any
must sign the attached Record of Disclosure. Top one character or perform degaussing.
Secret messages, documents, and publications must be Magnetic media used to store analog, video, or
stored in a security container separate from those other nondigital information: Overwrite using
classified Secret and below. analog signals instead of digital.
HANDLING SECRET MATERIAL Internal memory, buffers, registers, or similar
Every command is required to establish storage areas: Use hardware clear switch, power
administrative procedures for recording all Secret on reset cycle or a program designed to overwrite
material originated and received. These administrative the storage area.
procedures, as a minimum, must include a system of
Cathode-ray tubes (CRTs): Ensure that there is
accountability for Secret matter distributed or routed no burned-in classified information by
within the command, such as a communications log.
inspecting the screen surface.
Accounting of Secret material may or may not be
centralized.
DESTRUCTION OF CLASSIFIED
Unlike Top Secret material, Secret material does
not require signed receipts distributed or routed within MATERIAL
the command. However, it is extremely important that Classified material that is no longer required should
you ensure that the person who is receiving Secret not be allowed to accumulate. Destruction of
messages or material is properly cleared, and his or her superseded and obsolete classified materials that have
name appears on an access list released by the served their purpose is termed “routine destruction.”
commanding officer.
HANDLING CONFIDENTIAL MATERIAL ROUTINE DESTRUCTION
Procedures for handling Confidential material are There are specific directives that authorize the
less stringent than those for Secret. There is no routine destruction of publications, message files, and
requirement to maintain records of receipt, distribution, cryptomaterials. As a Radioman, you should carefully
or disposition of Confidential material. However, study these directives so that you may properly comply
Confidential material must still be protected from with them. Additionally, the letter of promulgation of
unauthorized disclosure by access control and publications often sets forth disposition instructions
compliance with regulations on marking, storage, about destruction requirements for that publication.
transmission, and destruction. Other materials, such as classified rough drafts,
HANDLING CLASSIFIED AIS MATERIAL worksheets, and similar items, are periodically
destroyed to prevent their accumulation.
Classified AIS storage media and output must be
controlled and safeguarded in accordance with its Top Secret, Secret, and Confidential material may
security classification. Specific procedures on be destroyed by burning, pulping, pulverizing, or
security requirements for handling and storing AIS shredding. Destruction must be complete and
material are found in the Department of the Navy reconstruction of material impossible. The most
Automatic Data Processing Security Program, efficient method of destroying combustible material is
OPNAVINST 5239.1. by burning.

DESTRUCTION PROCEDURES AND


CLEARING MEDIA AND REPORTS
HARDWARE
Declassifying AIS media is a procedure to erase Top Secret material will be destroyed by two
totally all classified information stored in the media. witnessing officials. Persons performing any
The clearing of AIS media is used to erase classified destruction must have a clearance level equal to or

5-10
higher than the material being destroyed. Destruction To ensure the complete destruction of bound
will be recorded on a record that provides for complete publications, the pages must be torn apart and crumpled
identification of the material being destroyed. before they are placed in bags. All material must be
Destruction records must include number of copies watched until it is completely consumed. The ashes
destroyed, date of destruction, and personnel must be broken up and scattered so that no scraps escape
completing destruction. These records are maintained destruction.
for 2 years.
Secret messages must be destroyed following the Shredding
two-person rule, without a record of destruction.
Alternatively, one person may destroy Secret messages Crosscut shredding machines are relatively quiet
if a record of destruction is made. The commanding and may be used aboard ships where incinerator
officer may impose additional controls for Secret facilities are not available. Crosscut shredders are
messages if warranted and if they reasonably balance replacing incinerators in many areas where burning is
security against operational efficiency. not allowed because of the Clean Air Act. Crosscut
shredding machines must reduce classified material to
Confidential material and classified waste are shreds no greater than 3/64 inch wide by 1/2 inch long.
destroyed by authorized means. Personnel performing Crosscut shredding suffices as complete destruction of
destruction must hold an appropriate clearance and are classified material, and the residue may be handled as
not required to record destruction. unclassified material with the exception of some
COMSEC material. Not all crosscut shredders are
If the material has been placed in burn bags for suitable for destroying microfiche, so make sure the one
central disposal, the destruction record is signed by the you are using has that capability before attempting to
witnessing officials at the time the material is placed in shred microfiche.
the burn bags. Records of destruction must be retained
for 2 years.
Pulverizing and Disintegrating
All burn bags must be given the same protection as
the highest classification of material in them until they Pulverizers and disintegrators designed for
are destroyed. Since several burn bags may accumulate destroying classified material are usually too noisy and
for burning, it is important to keep an accurate record dusty for office use unless installed in a noise- and
of the number of bags to be burned. Burn bags must be dust-proof enclosure. Some pulverizers and
serially numbered and a record kept of all subsequent disintegrators are designed to destroy paper products
handling until destroyed. only. Others are designed to destroy film, typewriter
ribbons, photographs, and other material.
Burning
Jettisoning or Sinking
As a Radioman, you will probably assist in the Material to be jettisoned during emergency
burning of classified material. Every member of a burn destruction must be placed in weighted bags. The sea
detail must know exactly what is to be burned and depth should be 1,000 fathoms or more. However, if
should double-check burn material against an inventory water depth is less than 1,000 fathoms, the material
list before the material is burned. should still be jettisoned to prevent easy recovery.
To provide for accountability of the burn bags, the
supervisor of a burn detail must be sure that the bags are EMERGENCY PLANS
numbered (or counted) before they are removed from
the workspaces. The supervisor of a burn detail must Emergency plans provide for the protection,
have either a log or checkoff list that lists the number removal, or destruction of classified material.
of bags to be burned. At the destruction site, each bag Commands holding classified material must develop an
is checked off the list as it is destroyed in the presence emergency plan to fit their needs. The primary
of the witnessing officials. Witnessing officials are requirement of an emergency plan is that it adequately
persons performing any destruction. They must have a provide for the rapid and complete destruction of the
clearance equal to or higher than the material being classified material. Emergency plans must cover three
destroyed. areas of emergencies:

5-11
Natural disasters, such as hurricanes; Evacuation of the area, including a decision
whether to store classified material or remove it
Civil disturbances, such as rioting; and from the area; and
Enemy action. Admitting outside fire fighters into the area.
Emergency plans should provide for the protection PRECAUTIONARY ACTIONS
of classified material in such a manner as to minimize
the risk of loss of life or injury to personnel. Precautionary destruction reduces the amount of
classified material on hand in case emergency
For destruction, the command’s emergency plan destruction later becomes necessary. Destruction
must do the following: priorities remain the same during precautionary
destruction. However, when precautionary destruction
Emphasize procedures and methods of
is held, material essential to communications must not
destruction, including place and destruction
be destroyed. For example, communications operating
equipment required;
procedures and publications that are to become
Clearly identify the exact location of all effective in the near future would not be destroyed.
classified material; Communications operating procedures that are already
effective, necessary, and being used would also not be
Prioritize material for destruction; and destroyed.
Assign personnel by billet, areas of The following actions should be taken daily:
responsibility for destruction.
All superseded material should be destroyed in
Priorities
accordance with its prescribed time frame.
When the emergency plan is implemented, priority
of destruction is based on the potential effect on national Unneeded material should be returned to the
security should the material fall into hostile hands. issuing agencies.
COMSEC material is destroyed first. The priorities for Material should be stored in such a way as to
emergency destruction are as follows: make it readily accessible for removal during
FIRST PRIORITY— Top Secret COMSEC destruction.
material and classified components of Contrary to widespread opinion, there is no security
equipment and all other Top Secret material; policy requiring destruction of unclassified messages.
However, some message centers with high volumes of
SECOND PRIORITY— Secret COMSEC classified and unclassified message traffic may find it
material and all other Secret material; more efficient to destroy all messages and intermingled
THIRD PRIORITY— Confidential COMSEC files as though they were classified. Under some
material and all other Confidential material. circumstances, units operating in foreign ports or waters
and commands situated in foreign countries may take
After you have destroyed the classified for which additional precautions in disposing of unclassified
you are responsible, you should destroy any material.
unclassified equipment that could be of use to an enemy.
You should also destroy pertinent technical, descriptive,
and operating instructions. SUMMARY
FIRE PLANS This chapter has discussed general security
In addition to an emergency plan, a plan of action considerations to provide you with a working
in the event of fire is also required. As with an knowledge of this important aspect of your job. As a
emergency plan, it is important that all comunications Radioman, you have a two-fold job concerning security.
personnel familiarize themselves with their command The first, of course, is to properly perform your duties
fire plan. Normally, the fire plan provides for the within general security guidelines. Security guidelines
following: pertain to everyone in every official capacity. Second,
you must also perform your duties in such a manner as
Local fire-fighting apparatus and personnel to to protect the integrity and overall value of secure
operate the equipment; communications.

5-12
Security should be second nature insofar as the Security precautions mentioned in this chapter do
practice of personal habits is concerned. However, not guarantee complete protection nor do they attempt
second nature does not mean “without thinking.” It to meet every conceivable situation. Anyone who
behooves all of us to take security seriously and practice adopts a commonsense outlook can, however, solve
sound security habits in the interests of naval operations most security problems and gain a knowledge of basic
and our overall national security. security regulations.

5-13
APPENDIX I

GLOSSARY

A COMMSHIFT— A message sent to a NCTAMS to


move its guard from one broadcast or servicing
ADDRESS GROUPS— Four-letter groups assigned communications center to another.
to represent a command, activity, or unit; used
in the same manner as a call sign. COMMSPOT— A report to advise of any situation
that might cause significant disruption to tactical
AIS FACILITY-RELATED INFORMATION— Work- communications.
load, anticipated resource changes, number of
operators available, the system capabilities, etc. COMNAVCOMTELCOM (COMMANDER,
NAVAL COMPUTER AND TELECOM-
B MUNICATIONSCOMMAND)— Headquarters
for all naval shore-based communications.
BACKLOG— The work waiting to be run (processed)
on a computer. CONTINGENCY PLANS— Backup plans for the
continuation of an activity’s mission during
BATCH PROCESSING— A method of processing in abnormal operating conditions.
which similar items are grouped together and
processed all at one time. CWO (COMMUNICATIONS WATCH OF-
FICER)— Responsible for the efficient running
BOOK MESSAGE— A message for two or more of the watch, including equipment and person-
addressees in which the drafter considers it nel; responsible to the communications officer.
unnecessary that each addressee be informed of
the other(s). D
C
DRAFTER— The person who actually composes a
message for transmission.
CMS ALTERNATE CUSTODIAN— Responsible to
the CMS custodian and commanding officer for
the CMS account; is held accountable on the DTG (DATE-TIME GROUP)— A method of
same level as the custodian. assigning a date and time to message traffic
consisting of six digits, two each to represent
CMS CUSTODIAN— Responsible to the com- date, hour, and minutes; begins at the start of
manding officer for the correct accountability each new day at 0001Z.
and maintenance of the CMS account.
E
CMS LOCAL HOLDER— A command or activity
that receives COMSEC material support from a EA (ELECTRONIC ATTACK)— Involves actions
CMS account command. taken to prevent or reduce an enemy’s effective
use of the electromagnetic spectrum. EA
CMS USER— An individual CMS user that requires replaces electronic countermeasures (ECM).
COMSEC material to accomplish an assigned
duty, advancement study, or training purpose. ELECTROMAGNETIC SPECTRUM– The natural
vibrations that occur when a force is applied to
COMMUNICATIONS CENTER SUPERVISOR— a substance. These vibrations occur with various
Responsible for message processing, circuit speeds and intensities. The speed at which they
operations, and supervision of personnel; occur is called frequency, and the distance
responsible to the SWS, when assigned. between each vibration is called wavelength.

AI-1
EMERGENCY PLAN— Provides for the protection, INMARSAT (INTERNATIONAL MARITIME
removal, or destruction of classified material. SATELLITE COMMUNICATIONS)— A
satellite system that interfaces naval com-
EP (ELECTRONIC PROTECTION)— Involves munications for the DON and commercial
actions taken to ensure friendly effective use of telecommunications authorized by law.
the electromagnetic spectrum despite an enemy’s
use of electronic warfare. EP replaces elec- I/O CONTROL CLERK— The person responsible
tronic counter-countermeasures (ECCM). for the quality and control of data processing
input and output media and products.
EXTRACTS— Portions of naval warfare publica-
tions that are extracted/reproduced for use in J
training or operations. All extracts must be
properly marked with security classification and JETTISONING— A type of destruction that is
safeguarded. completed by throwing material overboard at
sea at a depth of at least 1,000 fathoms or more;
F also known as Sinking.

FLASH PRECEDENCE— Identified by the JOB DEPENDENCY— When a job requires the
precedence prosign “Z.” Category reserved for output from another job, it is said to be
initial enemy contact reports or operational dependent on another job.
combat messages of extreme urgency. Brevity is
mandatory. Speed of service objective is not
fixed. Handled as fast as humanly possible with JOB-RELATED INFORMATION— Information
an objective of less than 10 minutes. about the resources, media, and time needed for
a particular job.
FRD (FORMERLY RESTRICTED DATA)–
Pertains to defense information that has been JULIAN DATE— Consists of seven digits; the first
removed from the Restricted Data category but three digits represent the date, and the last four
is still safeguarded as classified defense digits represent the hour and minutes; begins on
information. the first day of the calendar year.

G M

GENERAL MESSAGE— A message with wide, MARS (MILITARY AFFILIATE RADIO SYS-
predetermined and standard distribution. TEM)— Provides auxiliary communications to
military, civil, and/or disaster officials during
I periods of emergency. Users are licensed by
the Federal Communications Commission
IFF (IDENTIFICATION FRIEND OR FOE)— A (FCC).
system using electromagnetic transmissions to
which equipment carried by friendly forces MULTIPLE-ADDRESS MESSAGE— A message with
automatically responds to distinguish themselves two or more addressees.
from enemy forces.
MULTIPROCESSING— A computer processing
IMMEDIATE PRECEDENCE— Identified by the mode that provides for simultaneous processing
precedence prosign “O.” Delivery time reserved of two or more programs or routines by use of
for very urgent messages relating to situations multiple CPU’s.
that gravely affect the security of national/allied
forces. Examples of use: amplifying report of MULTIPROGRAMMING— A computer processing
initial enemy contact or unusual major mode that provides for overlapping or inter-
movements of military forces. Speed of service leaving the execution of two or more programs
objective is 30 minutes to 1 hour. at the same time by a single processor.

AI-2
N use: situation reports on position of front where
attack is imminent, orders to aircraft formation
NETWORKING— A processing mode that allows or units to coincide with ground or naval
separate computers, joined by transmission lines, operations. Speed of service objective is 1 to 6
to share a group of common peripherals. hours.

NWPL CLERK— Usually assigned by the NWPL R


custodian and is responsible for the upkeep and
maintenance of the NWPL. RD (RESTRICTED DATA)— Pertains to all data
concerned with the design, manufacture, or use
NWPL CUSTODIAN— Is responsible for managing of nuclear weapons or special nuclear material
the NWPL, usually assigned to an officer or used in energy production.
senior petty officer as a collateral duty.
REAL-TIME PROCESSING— A computer proces-
O sing method in which data about a particular
event is entered directly into the computer as
ONLINE— A method of data processing that allows the event occurs and is immediately processed
users the ability to interact with the computer. so it can influence future processing.

ORIGINATOR— The authority in whose name a RELEASER— A properly designated individual


message is sent. authorized to release messages for transmission
in the name of the command or activity.
P
RESTRICTED AREA— Designated spaces that
restrict access and control movement within.
PERSONAL FOR– Messages distributed to a single
recipient. Only flag officers, officers in a com- ROUTINE PRECEDENCE— Identified by the
mand status, or their designated representative precedence prosign “R.” Delivery time assigned
may originate PERSONAL FOR messages. to be used for all types of message which does
not justify a higher precedence. Examples of
PLANNING PHASE— The initial scheduling phase in use: administrative, logistics, or personnel
which information is gathered from the users. matters. Speed of service objective is 3 hours or
start of business the following day.
POSTCOMPUTER PROCESSING— Ensuring out-
put products are complete, accurate, and S
delivered to the user.
SANITIZING— Makes an area or equipment ac-
PRECAUTIONARY ACTIONS OR PRECAU- ceptable for access by personnel who are not
TIONARY DESTRUCTION— An action to cleared.
remove or reduce the amount of classified
material on hand in case emergency destruction SCHEDULER— The person responsible for prepar-
becomes necessary at a later time. ing, distributing, and maintaining production
schedules.
PRECEDENCE— A delivery time assigned to a mes-
sage according to the urgency of that message, SCHEDULING— The interface between the user,
based solely on writer-to-reader time. I/O control, and computer operations.

PRECOMPUTER PROCESSING— Ensuring all in- SHREDDING— A type of destruction that involves
puts are received on time. using a cross-cut shredding machine. Residue
must be reduced to shreds no greater than 3/64
PRIORITY PRECEDENCE— Identified by the inch wide by 1/2 inch long.
precedence prosign “P.” Delivery time reserved
to message for essential information for the SINGLE-ADDRESS MESSAGE— A message with
conduct of operations in progress. Examples of only one addressee.

AI-3
SPECIAL-HANDLING MARKINGS— Additional E-8, or E-9) or a civilian employee, (GS-7 or
markings or designations on some messages that above) who is responsible for the receipt,
alert the user or communications center that the custody, accounting, and disposition of Top
message requires special attention in handling. Secret material within the command.
Some of these include Caveat, Restricted Data
(RD), Formerly Restricted Data (FRD), FOUO, TSO (TELECOMMUNICATIONS SERVICE
EFTO, SPECAT, and PERSONAL FOR. ORDER)— Used to authorize the start, change,
or discontinue circuits, trunks, links, or systems.
SWS (SENIOR WATCH SUPERVISOR)— When
assigned, the senior enlisted person on watch TSR (TELECOMMUNICATIONS SERVICE
responsible for handling all communications REQUEST)—Initiates additions, deletions, or
matters; responsible to the CWO. changes from the originating command to
existing Defense Communications System (DCS)
T circuits.

TVA (TEMPEST VULNERABILITY ASSESS-


TECH CONTROL SUPERVISOR— Responsible for
establishing and maintaining required circuits, MENT)— The vulnerability of a ship, aircraft,
including initiating actions to restore or bypass shore station transportable equipment, or a
failed equipment, quality monitoring, supervising contractor facility to susceptibility, environment,
assigned personnel, and controlling procedures and threat.
for all systems; responsible to the CWO.
TVAR (TEMPEST VULNERABILITY ASSESS-
MENT REQUEST)— A request submitted prior
TELEPROCESSING— A method of data processing
to processing classified data to the Naval
in which communications devices are used.
Criminal Investigation Service.
TERMINATION REQUEST MESSAGE— A message Y
sent to request establishment of circuits with a
NCTAMS or NAVCOMTELSTA on a limited YANKEE PRECEDENCE— This category is in
or fill-time basis. addition to the four major precedences
categories; it is an EMERGENCY COMMAND
TIME SHARING— A processing mode in which PRECEDENCE (ECP). It is identified by the
users share computer system resources through precedence prosign “Y” and limited to
online terminals. designated emergency action command and
control messages. Speed of service objective is
TSCO (TOP SECRET CONTROL OFFICER)— An not fixed. Handled as fast as humanly possible
officer, senior noncommissioned officer (E-7, with an objective of less than 10 minutes.

AI-4
APPENDIX II

GLOSSARY OF ACRONYMS AND ABBREVIATIONS

A D

ACP— Allied communications publication. DCS– (1) Defense Courier Service (2) Defense
AIG— Address indicating group. Communications Service.
AIS— Automated information system. DCMS— Director, Communications Security
ALCOM— All commands. Material System.
ALNAV— All Navy. DESRON— Destroyer squadron.
AMCROSS— American Red Cross. DISA— Director, Information Security Agency.
ATP– Allied tactical publication. DON— Department of the Navy.
AUTODIN— Automatic Digital Network. DODCAF— Department of Defense Central Ad-
AXP— Allied exercise publication. judication Facility.
DSCS— Director, Satellite Communications System.
DSR— Data speed reader.
B
DTG— Date-time group.

BKS— Broadcast keying station.


BSR— Broadcast screening request. E

C EA— Electronic attack (replaces electronic counter-


measures (ECM)).
CE— Compromising emanations. EAM— Emergency Action Message.
CIB— Communications Information Bulletin. EASTPAC— Eastern Pacific.
CIC— (1) Content Indicator Code (2) Combat Infor- ECP— Emergency command precedence.
mation Center. EFTO— Encrypt for transmission only.
CINCLANTFLT— Commander in Chief, Atlantic EMCON— Emanation control.
Fleet. EOJ— End of job.
CINCPACFLT— Commander in Chief, Pacific Fleet. EP— Electronic protection (replaces electronic
CMS— Communications Security Material System. counter-countermeasures (ECCM)).
CNO— Chief of Naval Operations.
COMMAREA— Communications area. F
COMMO— Communications Officer.
COMMSHIFT— Communications shift.
COMMSPOT— Communications spot report. FC— Fixed-cycle.
COMNAVCOMTELCOM— Commander, Naval FCC— Federal Communications Commission.
Computer and Telecommunications Command. FIFO— First-in, first-out.
COMNAVSECGRU— Commander, Naval Security FLTCINC— Fleet Commander in Chief.
Group. FOTP— Fleet Operational Telecommunications
COMNAVSURFLANT— Commander, Naval Surface Program.
Forces Atlantic. FOUO— For Official Use Only.
COMSEC— Communications security. FRD— Formerly Restricted Data.
COSIR— Cite our service in return. FTOC— Fleet Telecommunications Operations
CP— Change proposal. Center.
CRT— Cathode-ray tube. FTP— Fleet training publication.
CWO— Communications Watch Officer. FXP— Fleet exercise publication.

AII-1
G NATO— North Atlantic Treaty Organization.
MMAREA— Naval communications area.
GENADMIN— General Administrative. NAVCOMPARS— Naval Communications Proces-
GHz— Gigahertz. sing and Routing System.
GMT— Greenwich Mean Time. NAVCOMTELDET— Naval Computer and Tele-
communications Detachment.
H NAVCOMTELCOM— Naval Computer and Tele-
communications Command.
HF— High frequency. NAVCONTELSTA— Naval Computer and Tele-
HW— Hardware. communications Station.
NAVDAC— Naval Data Automation Center.
I NAVDAF— Naval Data Automation Facility.
NAVELEXSECCEN— Naval Electronics Security
IDL— International Date Line. Center.
IDS— Intrusion Detection System. NAVEMSCEN— Naval Electromagnetic Spectrum
IFF— Identification, friend or foe. Center.
INMARSAT— International Maritime Satellite Sys- NAVOP— Naval Operations.
tem. NAVSECGRUDEPT— Naval Security Group De-
IR— Information resources. partment.
ISSM— Information Systems Security Manager. NAVTELCOM— Naval Telecommunications Com-
ISSO— Information Systems Security Officer. mand.
ITS— Instrumented TEMPEST Survey. NCS— (1) Naval Communications Station (2) Na-
tional Communications System (3) Net Control
J Station.
NCTAMS— Naval Computer and Telecommunica-
JANAP— Joint Army-Navy-Air Force Publication. tions Area Master Station.
JCS— Joint Chiefs of Staff. NCTS— Naval Computer and Telecommunications
Station.
K NIF— Naval Industrial Fund.
NMC— Numerical message correction.
kHz— Kilohertz. NOTAM— Notice to airmen.
NSO— Network Security Officer.
L NTIA— National Telecommunications and Infor-
mation Administration.
LANT— Atlantic. NTP— Naval telecommunications publication.
LDMX— Local Digital Message Exchange. NTS— Naval Telecommunications System.
LIMDIS— Limited distribution. NWPC— Naval warfare publications custodian.
LMF— Language and media format. NWPL— Naval Warfare Publications Library.
LOEP— List of effective pages. NWP— Naval warfare publication.
M O

MARS— Military Affiliate Radio System. OPORD— Operation Order.


MED— Mediterranean. OSRI— Originating station routing indicator.
MIJI— Meaconing, Interference, Jamming, and In- OTAR— Over-the-air rekey.
trusion. OTAT— Over-the-air transfer.
MTF— Message text format.
P
N
PCMT— Personal Computer Message Terminal.
NARDAC— Naval Regional Data Automation Cen- PC— Personal computer.
ter. PLA— Plain Language Address.

AII-2
PQS— Personnel Qualification Standards. TICON— Tight control.
PRO FORMA— Predetermined format. TOD— Time of delivery.
PROSIGNS— Procedural signs. TOF— Time of file.
PSN— Processing sequencing number. TOR— Time of receipt.
TPI— Two-person integrity.
R TR— Trouble report.
TSC— Top Secret control officer.
RADAY— Radio day. TSEC— Telecommunications security.
RD— Restricted Data. TSO— Telecommunications service order.
RI— Routing indicator. TSR— Telecommunications service request.
RMKS— Remarks. TVA— TEMPEST Vulnerability Assessment.
TVAR— TEMPEST Vulnerability Assessment Re-
S quest.

SEF— SPECAT Exclusive For. U


SIGSEC— Signal security.
SIOP-ESI— Single Integrated Operational Plan- UPS— Uninterrupted power supply.
Extremely Sensitive Information. US&P— United States and Possessions.
SOG— Special Operating Group. USMCEB— United States Military Communica-
SOP—Standard operating procedure. tions-Electronics Board.
SPECAT— Special Category.
SSN— Station serial number. V
SUBMISS— Submarine missing.
VDT— Video display terminal.
SUBRON— Submarine squadron.
SUBSUNK— Submarine sunk. W
SVC— Service.
SWS— Senior Watch Supervisor. WESTPAC— Western Pacific.

T Z

TASO— Terminal Area Security Officer. ZDK— Send again (“Z” signal).
TCC— Telecommunications Center. ZUI— Your attention is invited to . . . (“Z” signal).

AII-3
APPENDIX III

REFERENCES USED TO DEVELOP


THE TRAMAN

Allied Call Sign and Address Group System–Instructions and Assignments, ACP
100(F), Joint Chiefs of Staff, Washington, DC, March 1984.

Automatic Digital Network (AUTODIN) Operating Procedures, JANAP 128(J),


Joint Chiefs of Staff, Washington, DC, July 1993.

Basic Operational Communications Doctrine (U), NWP 4 (Rev. B) (NWP


6-01), Chief of Naval Operations, Washington, DC, September 1989.

Communication Instructions General (U), ACP 121(F), Joint Chiefs of Staff,


Washington, DC, April 1983.

Communications Instructions—General, ACP 121 US SUPP-1(F), Joint Chiefs


of Staff, Washington, DC, June 1981.

Communications Instructions Security (U), ACP 122, Joint Chiefs of Staff,


Washington, DC, 1981.

Communication Instructions—Operating Signals, ACP 131(D), Joint Chiefs of


Staff, Washington, DC, May 1986.

Communications Instuctions–Tape Relay Procedures, ACP 127(G), Joint


Chiefs of Staff, Washington, DC, November 1988.

Communications Instructions–Teletypewriter (Teleprinter) Procedures, ACP


126(C), Joint Chiefs of Staff, Washington, DC, May 1989.

Communications Security Material System (CMS) Policy and Procedures


Manual, CMS 1, Department of the Navy, Washington, DC, March 1993.

Department of the Navy Automated Information Systems (AIS) Security


Program, SECNAVINST 5239.2, Secretary of the Navy, Washington, DC,
November 1989.

Department of the Navy Information and Personnel Security Program


Regulation, OPNAVINST 5510.1H, Chief of Naval Operations,
Washington, DC, May 1991.

Department of the Navy Physical Security and Loss Prevention, OPNAVINST


5530.14B, Chief of Naval Operations, Washington, DC, December
1988.

Department of the Navy Privacy Act (PA) Program, SECNAVINST 5211.5D,


Secretary of the Navy, Washington, DC, July 1992.

AIII-1
Department of the Navy Security Program for Automatic Data Processing
Systems, OPNAVINST 5239.1A, Chief of Naval Operations, Washington,
DC, August 1982.

Fleet Communications (U), NTP 4(C), Commander, Naval Telecom-


munications Command, Washington, DC, June 1988.

Fleet Telecommunications Procedures for Atlantic and Mediterranean Naval


Communications Areas, NCTAMS LANT/MEDINST C2300.1, Naval
Computer and Telecommunications Area Master Station LANT/Naval
Computer and Telecommunications Area Master Station MED,
September 1993.

Fleet Telecommunications Procedures for the Pacific and Indian Ocean Naval
Communication Areas, NCTAMSEASTPAC/NCTAMS WESTPACINST
C2000.3D, Naval Computer and Telecommunications Area Master
Station EASTPAC/Naval Computer and Telecommunications Area
WESTPAC, 10 August 1992.

Guideline for Automatic Data Processing Risk Analysis, Federal Information


Processing Standards (FIPS) Publication 65, Department of Commerce,
National Bureau of Standards, Springfield, VA, August 1979.

Guideline for Evaluation of Techniques for Automated Personal Identification,


Federal Information Processing Standards (FIPS) Publication 48,
Department of Commerce, National Bureau of Standards, Springfield,
VA, April 1977.

Hussain, Donna, and K. M. Hussain, Managing Computer Resources, Second


Edition, Richard D. Irwin, Inc., Homewood, IL, 1988.

Local SOP and PQS, Bureau of Naval Personnel (PERS-1043B), Washington,


DC.

Local SOP and PQS, Enlisted Program Management Center (EPMAC), New
Orleans, LA.

Local SOP and PQS, USS EISENHOWER (CVN-69).

Local SOP and PQS, USS NASSAU (LHA-4).

Message Address Directory, Joint Chiefs of Staff, Washington, DC, June 1990.

Naval Warfare Documentation Guide, NWP 0 (Rev. P) (NWP 1-01), Chief of


Naval Operations, Washington, DC, January 1990.

Operational Reports, NWP 10-1-10 (NWP 1-03.1), Chief of Naval Operations,


Washington, DC, November 1987.

Security Requirements for Automated Information Systems (AISs), DODD


5200.28, Deputy Security of Defense, Washington, DC, March 1988.

Telecommunications Users Manual, NTP 3(1), Commander, Naval Tele-


communications Command, Washington, DC, January 1990.

AIII-2
U.S. Call Sign & Address Group System Instructions & Assignments, ACP 100
U.S. SUPP-1(N), Joint Chiefs of Staff, Washington, DC, June 1989.

U.S. Navy Address Indicating Group (AIG) and Collective Address Designator
(CAD) Handbook, NTP 3 SUPP-1(K), Commander, Naval Telecom-
munications Command, Washington, DC, August 1986.

AIII-3
INDEX

A Annual loss expectancy, 4-16


AIG, 2-18 Attacks, 4-2
AIS disaster protection, 4-18 Automated scheduling systems, 1-40
fire safety, 4-18
supporting utilities protection, 4-21 B
AIS facility physical protection, 4-23 Backup plans, 4-5,4-28
AIS media protection measures, 4-11 Backup operations, 4-28
disposition of media, 4-12 Batch, 1-9, 1-12
security controls, 4-11 Boundary protection, 4-23
security markings, 4-12
BSR, 2-24
AIS security, 4-1
authoritative references, 4-13
C
contingency planning, 4-26
data privacy, 4-33 CAD, 2-18
disaster protection, 4-18 CIBs, 2-36
plan documentation, 4-13 Classified data, 4-10
program implementation, 4-13 controlled security mode, 4-11
program planning, 4-13 dedicated security mode, 4-10
security inspections, 4-30 multilevel security mode, 4-10
threats and risk analysis, 4-14 system high security mode, 4-10
AIS security concepts, 4-1 Classified material, 5-6
AIS assets, 4-2 clearing media and hardware, 5-10
countermeasures, 4-4 handling, 5-6
likelihood and risk, 4-3 Classified material destruction, 5-10
threats, 4-2 routine, 5-10
vulnerability, 4-2 procedures, 5-10
successful attacks/adverse events, 4-2 reports, 5-10
AIS security goal, 4-1 types, 5-10
AIS security program, 4-6 Classified material destruction types, 5-10
AIS security staff, 4-6 burning, 5-11
information systems security manager (ISSM), shredding, 5-11
4-6 pulverizing, 5-11
information systems security officer (ISSO), disintegrating, 5-11
4-7 jettisoning/sinking, 5-11
command security manager, 4-7 Classified material handling, 5-6
network security officer (NSO), 4-7 SPECAT/Top Secret and above, 5-8
terminal area security officer (TASO), 4-7 AIS, (classified) 5-10
AIS service request, 1-5 Confidential, 5-10
AIS threats and risk analysis, 4-14 Secret, 5-10

INDEX-1
Classified material handling—Continued Communications management, 2-6
Top Secret, 5-8 evaluating performance, 2-6
Top Secret control officer (TSCO), 5-6 general administration, 2-7
Classified material handling of SPECAT/Top office management, 2-7
Secret and above, 5-8 personnel management, 2-7
destruction, 5-8 responsibilities, 2-7
verification, 5-8 Communications Officer, 2-10
CMS, 2-10 Communications material accounting general
CMS alternate, 3-2 reports, 3-3
CMS custodian, 2-10, 3-2 destruction, 3-3, 3-8
CMS local holder, 3-2 receipt, 3-3
CMS user, 3-2 transfer, 3-3
CMS witness, 3-2 Communications material accounting general
Command communications organization, 2-9 reports destruction, 3-3, 3-8
CMS custodian, 2-10 CMS 25 one-time keying material destruction
commanding officer, 2-9 report, 3-4
communications center supervisor, 2-10 CMS 25B COMSEC keying material local de-
communications officer, 2-9 struction report, 3-6
CWO, 2-10 CMS 25MC COMSEC keying material local
radio officer, 2-9 report, 3-8
technical control supervisor, 2-10 regular, 3-3
Command ship communications, 2-11 Communications material accounting inventory
Commander, Naval Computer and Telecom- reports, 3-3
munications Command (COMNAV- combined SF-153, 3-3
COMTELCOM), 2-3 fixed-cycle, 3-3
COMMSHIFT, 2-24 special SF-153, 3-3
COMMSPOT, 2-24 Communications material accounting reports, 3-3
Communications (COMM), 4-6 general, 3-3
Communications center files, 2-25 inventories, 3-3
broadcast file, 2-25 Communications planning, 2-27
commercial traffic file, 2-25 communications plan, 2-28
cryptocenter file, 2-25 EP and EA, 2-28
embarked command file, 2-25 frequency management, 2-29
facsimile file, 2-25 protection, 2-28
file fillers, 2-26 requirements, 2-27
file maintenance, 2-26 spectrum management, 2-29
general message file, 2-25 telecommunications service order (TSO), 2-29
master file, 2-25 telecommunications service request (TSR),
NATO/allied files, 2-26 2-29
retention of files, 2-26 Communications planning frequency management,
SPECAT SIOP-ESI file, 2-25 2-29
station file, 2-25 allocation, 2-29
Communications center supervisor, 2-10 assignment, 2-29

INDEX-2
Communications security, 3-1 Communications Security Material System (CMS)
authentication, 3-11 destruction—Continued
Communications Security Material System emergency, 3-8
(CMS), 2-10, 3-1 precautionary, 3-8, 5-12
equipment, 3-11 routine, 3-8
MIJI, 3-12 verify, 3-9
personnel, 3-2 Communications Security Material System (CMS)
responsibilities, 3-2 precautionary destruction, 3-8
transmission security, 3-11 keying, 3-9
Communications security authentication, 3-11 nonessential, 3-9
challenge and reply, 3-11 Communications watch officer (CWO), 2-10
transmission, 3-11 Compromising emanations, 3-1, 5-1
Communications security MIJI, 3-12 Computer operations, 1-4, 1-10
harmful interference, 3-12 Contingency plan, 1-14, 1-26, 4-5, 4-26
interference, 3-12 Contingency planning, 4-26
intrusion, 3-12 COOP backup planning, 4-28
jamming, 3-12 COOP testing, 4-30
meaconing, 3-12 emergency response planning, 4-26
Communications security personnel, 3-2 recovery planning, 4-29
CMS alternate, 3-2 COOP, 4-26
CMS custodian, 3-2 backup planning, 4-28
CMS local holder, 3-2 testing, 4-30
CMS user, 3-2 Countermeasures, 4-4
CMS witness, 3-2 administrative controls, 4-4
Communications security responsibilities, 3-2 managerial controls, 4-4
inventory, 3-3 physical controls, 4-4
receipt, 3-3 technical controls, 4-4
storage, 3-2 Cryptographic operations, 3-10
training, 3-2 crypto, 3-10
Communications security transmission security, cryptoinformation, 3-10
3-11 cryptomaterial, 3-10
destruction, 3-8 crypto-related information, 3-10
equipment, 3-11 cryptosystem, 3-11
OTAT/OTAR, 3-11 cryptovariables, 3-11
two-person integrity (TPI), 3-9 responsibilities, 3-11
Communications Security Material System (CMS) terms, 3-10
complete destruction, 3-9 Cryptosecurity, 3-1
effective keying material, 3-9 operations and requirements, 3-1
keying material, 3-9 Customer/user reports, 1-21
superseded keying material, 3-9 CWO, 2-10
Communications Security Material System (CMS)
destruction, 3-8 D
complete, 3-9 Data, 4-6

INDEX-3
Data entry, 1-2, 1-6, 1-12 Human resources, 4-6
Data privacy, 4-33
identification techniques, 4-39 I
information management practices, 4-37 Information needs, 1-14
personal data risk assessment, 4-36 Initial scheduling phase, 1-10
personal data security risks, 4-36 Interior physical protection, 4-24
Data protection measures, 4-10 I/O control, 1-2, 1-10, 1-12, 1-16
classified data, 4-10 I/O control clerk, 1-2, 1-6, 1-18, 1-21
sensitive unclassified data, 4-11
unclassified data, 4-11 J
DCS, 2-2 Job control log, 1-4
Defense Communications System, 2-2 Job dependencies, 1-16
Defense Information System Agency, 2-2 Job monitoring, 1-6
Destruction of classified material, 5-10 Job preparation, 1-6
DISA, 2-2 control parameters, 1-6
Downtime, 1-19, 1-20, 1-23 output requirements, 1-6
run sheet, 1-6
E
EAM, 2-31 L
EFTO, 2-30 LIMDIS, 2-30
Emanations protection, 4-24 Loss potential estimates, 4-14
EMCON, 5-2
Emergency plans, 5-11 M
fire, 5-12 Management reports, 1-21
precautionary, 3-8, 5-12 Managing production, 1-8
priorities, 5-12 MARS, 2-5
Emergency response planning, 4-26 Media library, 1-2, 1-12
Message and routing address types, 2-17
F broadcast screening request (BSR), 2-24
Fire safety, 4-18 communications guard shift (COMMSHIFT),
facility fire exposure, 4-19 2-24
fire detection, 4-20 communications spot (COMMSPOT), 2-24
fire extinguishment, 4-21 service, 2-23
Flagship (See command ship communications), termination requests, 2-24
2-11 tracer, 2-24
FOUO, 2-30 Message and routing addresses, 2-17
FRD, 2-30 address group, 2-17
address indicating groups (AIGS), 2-18
G collective address designator (CAD), 2-18
GMT, 2-19 message addresses, 2-17
routing indicators, 2-17
H special operating groups (SOGs), 2-12
Help-desk support, 1-20 types, 2-23

INDEX-4
Message elements, 2-19 Naval Computer and Telecommunications Area
conversion of GMT/local time, 2-20 Master Station (NCTAMS), 2-4
DTG, 2-19 Naval Computer and Telecommunications Detach-
Greenwich mean time (GMT), 2-19 ment (NAVCOMTEL DET), 2-5
Julian date, 2-20 Naval Computer and Telecommunications Station
time, 2-19 (NAVCOMTELSTA), 2-5
Message logs, 2-12 Naval Data Automation Command (NAVDAC),
central message log, 2-12 2-3
circuit logs, 2-12 Naval Data Automation Facility (NAVDAF), 2-5
journal logs, 2-15 Naval messages, 2-19
Top Secret control log, 2-12 classes, 2-23
Message precedences, 2-20 message readdressals, 2-22
FLASH, 2-20 types, 2-23
IMMEDIATE, 2-20 Naval Security Group Departments (NAV-
PRIORITY, 2-20 SECGRUDEPTS), 2-5
ROUTINE, 2-20 Naval Telecommunications System, 2-2
YANKEE, 2-20 Naval Warfare Publications Library (NWPL),
Message readdressals, 2-22 2-32
Message user responsibilities, 2-22 administration, 2-32
drafter, 2-22 binders, 2-34
originator, 2-22 clerk, 2-32
releaser, 2-22 custodian, 2-32
MIJI, 3-12 entry of changes, 2-35
Military Affiliate Radio System (MARS), extracts, 2-35
2-5 maintenance, 2-32
Minimize, 2-23, 2-31 publication notice, 2-35
Multiprocessing, 1-9 publications, 2-35
watch-to-watch inventory, 2-35
Multiprogramming, 1-9, 1-10
Naval Warfare Publications Library (NWPL)
publications, 2-36
N
allied communications, 2-36
National Communications System (NCS), 2-1 communications information bulletins (CIBs),
Naval communications, 2-1 2-36
command organization, 2-1 fleet telecommunications, 2-36
commander, 2-2 Joint Army-Navy-Air Force, 2-36
mission, 2-2 naval telecommunications, 2-36
NAVCOMTEL DET, 2-5 naval warfare, 2-36
NAVCOMTELSTA, 2-4 receiving or revised, 2-36
NAVDAF, 2-5 NAVCOMMAREA, 2-4
NCTAMS, 2-4 NCS, 2-1
policy, 2-2 Networking, 1-9
telecommunication system, 2-2 NTS, 2-2
Naval Communications Area, 2-4 NWPL, 2-32

INDEX-5
O Q
Online processing, 1-9 Quality control, 1-12
Operating system, 1-9, 1-10, 1-22
Operation orders, 2-3 R
OPORDs, 2-3, 2-11 Radio officer, 2-9
OTAR, 3-11 RD, 2-30
OTAT, 3-11 Recovery, 4-29
Output products, 1-1, 1-4 emergency response planning, 4-26
planning, 4-29
P Remedial measures selection, 4-16
Physical security, 4-8, 5-4 Remote terminal areas protection, 4-24
cipher locks, 5-5 Risk analysis, 4-14
combinations, 5-4 Risk management, 4-4
containers, 5-4
data file protection, 4-8 S
natural disaster protection, 4-8 Scheduler, 1-2, 1-8, 1-13
physical access controls, 4-8 Scheduling, 1-2, 1-19
physical security protection, 4-8 Scheduling methods, 1-14, 1-16
storage, 5-4 Scheduling process, 1-13
Physical security measures, 4-8 Scope of AIS security, 4-6
environmental security, 4-8 management responsibility, 4-6
fire protection, 4-9 personal responsibility, 4-7
hardware protection, 4-10 Security, See AIS security.
lighting, 4-8 Security, 5-3
physical security, 4-8 areas, 5-3
physical structure security, 4-9 classification, 5-6
power supply protection, 4-9 handling, 5-6
Postcomputer processing, 1-9 physical, 5-4
Precomputer processing, 1-9 Security areas, 5-3
Priorities, 1-9, 1-16 access, 5-3
Processing time, 1-14 access list, 5-3
Production control, 1-10, 1-21 restricted, 5-3
daily operations, 1-21 sanitizing, 5-3
output reports, 1-21 visitor’s log, 5-4
production control coordinator, 1-8, 1-9, 1-17 Security handling, 5-6
Production control and scheduling, 1-27 after working hours, 5-7
Production processing, 1-19 personnel, 5-7
application program processing errors, 1-19 working hours, 5-7
help-desk support, 1-20 Security inspections, 4-30
system downtime, 1-20 conducting inspections, 4-32
Production scheduling, 1-17 inspection follow-up, 4-33
monthly, 1-17 inspection plan, 4-31
workload schedule development, 1-18 inspection preparation, 4-31

INDEX-6
Security markings, 4-12 Standard Operating Procedures (SOPS) 2-12
CRT displays, 4-12 Supporting utilities protection, 4-21
hard-copy reports, microfilm, and microfiche,
4-12 T
magnetic media, 4-12 Technical control supervisor, 2-10
Security modes, 4-10 Teleprocessing, 1-9
controlled, 4-11 TEMPEST, 5-2
dedicated, 4-10 compromising emanations (CE), 5-2
multilevel, 4-10 TEMPEST vulnerability assessment (TVA),
system high, 4-10 5-2
Security survey, 4-24 TEMPEST vulnerability assessment report
Senior Watch Supervisor (SWS), 2-10 (TVAR), 5-2
Service Message, 2-23 TEMPEST vulnerability assessment (TVA), 5-2
SOGs, 2-18 environment, 5-2
SPECAT, 2-25, 2-30, 5-6 susceptibility, 5-2
Special handling markings, 2-30, 5-5 threat, 5-2
allied restricted, 2-31, 5-6 Threat analysis, 4-15
caveat, 2-30 Time sharing, 1-9
Encrypted for Transmission Only (EFTO), TPI, 3-9
2-30, 5-6 Tracer message, 2-24
For Official Use Only (FOUO), 2-30, 5-6 TSCO, 5-6
Formerly Restricted Data (FRD), 2-30, 5-5 TSO, 2-29
JCS Emergency Action Message (EAM), 2-31 TSR, 2-29
Limited Distribution (LIMDIS), 2-30, 5-5 TVA, 5-2
MINIMIZE considered, 2-31 TVAR, 5-2
NATO Restricted, 2-31, 5-6
PERSONAL FOR, 2-31, 5-6 U
Restricted Data (RD), 2-30, 5-5 Uninterrupted power source (UPS), 4-9
Special Category (SPECAT), 2-25, 2-30, 5-6 Uninterrupted power supply (UPS), 4-22
Special-handling markings for Special Category User support, 1-7
(SPECAT), 2-25, 2-30, 5-6 logistical support, 1-8
SIOP-ESI, 2-31 trouble calls, 1-8
PSEUDO, 2-31 user inquiries, 1-7

INDEX-7
Assignment Questions

Information: The text pages that you are to study are


provided at the beginning of the assignment questions.
ASSIGNMENT 1
Textbook Assignment: “AIS Administration,” chapter 1, pages 1-1 through
1-28.

1-1. You are working as an I/O 1-4. As an I/O control clerk, you
control clerk. Before can be expected to operate a
accepting a job for variety of equipment, such
processing on the computer, as copying machines, and
you should look over the terminals. These are known
transmittal form to ensure as what type of equipment?
which of the following
criteria is met? 1. Online
2. Auxiliary
1. All copies have been 3. Secondary
filed 4. Independent
2. All entries are readable
and understandable 1-5. On the transmittal form, the
3. All required outputs block marked “OPERATIONS USE
have been specified ONLY” contains which of the
4. All SCL statements are following items of
in the proper sequence information?
1-2. Computer operations has just 1. Job/task number
informed you that the 2. Computer to be used
payroll update (a series of 3. Type of operation
18 jobs) is finished and performed
ready for pickup. Upon 4. When the job was
receiving the output, you accepted
should take what action
immediately? 1-6. As an I/O control clerk, one
of your jobs will be to keep
1. Use the burster an up-to-date record of all
2. Log the jobs out jobs received for
3. File the jobs processing. What document
4. Check the output should you use?
products
1. A run schedule
1-3. As an I/O control clerk, you 2. A job schedule
will NOT be expected to 3. A pass down log
perform which of the 4. A job control log
following tasks?
1-7. If the input that comes with
1. Make SCL changes to a job becomes misplaced or
production run streams lost, you still have means
2. Monitor jobs to ensure of tracking it down by
all data-are processed lookinq in what control log
3. Reconcile processing entry?
discrepancies and
inconsistencies 1. Program name
4. Assist the computer 2. Type of input
operator in setting up 3. Input forwarded
production jobs 4. Computer system

1
1-8. To properly prepare the 1-11. During the SUADPS daily
user’s input for processing, update for supply, problems
you as I/O control clerk reading the current master
must have a certain amount read file (MRF) on disk
of information available, drive 241 are encountered.
such as computer run sheet, The job terminates
how to make up control or prematurely, leaving eight
SCL statements, and any jobs to be run. The
special output requirements computer operator calls on
the job may call for. This you as the I/O control clerk
information can be found in to help in the recovery
the process. You can be
expected to perform all
1. run book except which of the
2. job manual following tasks?
3. task folder
4. master run manual 1. Provide the operator
with the input
1-9. A run sheet to be used by parameters and/or SCL
the computer operator should statements to recover
contain which of the the job
following information? 2. Remove the defective
disk pack from drive 241
1. Breakpoints and forward it to the
2. Partition numbers technicians to be
3. Recovery procedures checked out
4. List of required inputs 3. See to it that the
remaining jobs are
1-10. If a job terminates before rescheduled once the
going to a normal EOJ, you master file is
as the I/O control clerk may recreated, and notify
be required to collect which the user
of the following 4. Provide the operator
data/information? with the file
identification number
1. Output data and memory needed to recover the
dump only MRF file
2. Input data and SCL
statements only 1-12. As an I/O control clerk, to
3. Input data, output data, determine that a job ran
and memory dump successfully and that all
4. Output data, console processing steps were
printout, and SCL properly carried out, you
statements should review what document?

1. The pass down log


2. The computer run sheet
3. The confirmation report
4. The computer console
printout

2
1-13. As an I/O control clerk, 1-17. As an I/O control clerk, if
what document provides you during the process of
with a list of all the error checking over the user’s
conditions and messages for output products, you happen
all jobs run on the computer to come across an error, you
during a work shift? should carry out which of
the following actions?
1. The error/discrepancy
report 1. Log the job out, and
2. The computer console inform the user of the
printout error at the time of
3. The error message log pickup only
3. The rerun report 2. Bring the error to the
attention of your
1-14. As an I/O control clerk, you superior, then log the
may be responsible for job out with the
reconciling processing appropriate comments
discrepancies . To determine only
the problem, which of the 3. Reschedule the job as if
following documents will nothing has happened,
usually provide you with the and notify the user
information you need? there will be a slight
delay
1. The pass down log 4. Pull the job
2. The computer run sheet immediately, bring the
3. The confirmation report error to the attention
4. The computer console of your superior so the
printout job may be rescheduled,
and notify the user
1-15. As an I/O control clerk, you
are checking over the user’s 1-18. As an I/O control clerk, You
output products and need to will be involved with and
verify that all items communicating with the user.
requested were produced. To Which of the following
do this, you should refer to communications skills must
which of the following you possess in order to
sources? maintain a good relationship
with the user?
1. The run manual
2. The task folder 1. Refer problems to users
3. The user manual 2. Explain problems only
4. The instruction folder 3. Understand requests only
4. Understand requests and
1-16. As an I/O control clerk, explain problems
once you have packaged the
user’s output products and
placed them in the pick-up
area, you should log the job
out in which of the
following logs?

1. The job control log


2. The user’s job log
3. The production log
4. The EOJ/pick-up log

3
1-19. A scheduler does NOT perform 1-23. As scheduler, you will be
which of the following concerned with precomputer
tasks? processing for which of the
following reasons?
1. Review AIS requests
2. Prepare schedules 1. To see that the work is
3. Operate the computer to performed accurately
run production jobs 2. To see that sufficient
4. Organize data processing magnetic media are
-
priorities for both available to store the
scheduled and data
unscheduled work 3. To ensure that all
inputs are received on
1-20. What method should you use time according to
to determine the accuracy of prearranged schedules
your schedules? 4. To ensure users are
complying with standard
1. Monitor the jobs operating procedures
2. Review production
results 1-24. If you schedule so much work
3. Supervise computer for the computer that you
operations overload the computer
4. Review job control logs system, which of the
following results is likely
1-21. To determine how to go about to occur?
scheduling work on your
facility’s computer system, 1. AIS services are
you should depend on which underutilized
of the following factors? 2. User service
deteriorates
1. The number of jobs to be 3. Precomputer processing
scheduled service deteriorates
2. The system configuration 4. Each of the above
only
3. The operating mode of 1-25. As a scheduler, which of the
the system only following factors must you
4. The system configuration know about the files in use?
and operating mode
1. Where to find them in
1-22. Which of the following is the magnetic media
NOT an example of a computer library
operating mode? 2. Where to store them in
the magnetic media
1. Prime-time library
2. Real-time 3. The record sizes and
3. Online blocking factors of each
4. Batch file
4. How to reconstruct them

4
1-26. As a scheduler, what 1-30. Source documents are
information must you know received and processed by
about the jobs you are to what (a) functional area,
schedule? and checked for completeness
and accuracy by what (b)
1. How jobs interface only functional area?
2. How much time it takes
to run each job only 1. (a) Data entry
3. How jobs interface and (b) Quality control
how much time it takes 2. (a) Data entry
to run each job (b) Technical support
4. How to operate the 3. (a) Scheduling
computer to back up (b) Quality control
production jobs 4. (a) Scheduling
(b) Technical support
1-27. As a scheduler, you do NOT
have to be proficient in 1-31. To chart the interaction
which of the following between the functional areas
skills? of an AIS facility, what
type of chart should you
1. Sound judgment prepare?
2. Tact and diplomacy
3. Analytical ability 1. Data flowchart
4. Systems design 2. Systems flowchart
3. Workload diagram
1-28. Production control acts as 4. Workflow diagram
liaison between the AIS
facility and the user 1-32. To determine what the
community to perform which demands will be on the AIS
of the following functions? facility for the upcoming
month, which of the
1. Provide magnetic media following personnel usually
support to the user meet(s) with the users?
2. Provide programming
services to the user 1. Division chief only
3. Adjust data flow and 2. Division chief and LPO
output schedules based only
on user and production 3. Division chief, LPO, and
requirements scheduler
4. Determine if errors are 4. Computer operations
caused by hardware or supervisor and scheduler
systems/applications
software 1-33. During the forecasting phase
of scheduling, you must
1-29. What functional area remember to set aside time
receives incoming work and in the schedule for which of
checks to be sure the amount the following maintenance
of input data is tasks?
approximately the amount
indicated on the production 1. File and computer
schedule? 2. Tape drive
3. Disk drive
1. Technical support 4. Each of the above
2. Quality control
3. I/O control
4. Data entry

5
1-34. When you schedule recurring 1-38. As scheduler, in addition to
(old) jobs, which of the having information about
following types of computer resources, you need
information is/are best to information about what other
use? area(s) of processing?
1. New estimates from users 1. Precomputer processing
2. Job experience and only
history 2. Postcomputer processing
3. Latest job run time on only
your system 3. Precomputer and
4. Average job run time on postcomputer processing
other systems 4. Output processing by
users
1-35. Scheduling enables
management to make which of 1-39. What is the primary
the following judgments? difficulty of manually
scheduling jobs in a
1. A prediction of the multiprogramming
effects of an increased environment?
workload
2. An evaluation of data 1. Specifying priorities
entry operator skills 2. Specifying deadlines
3. An analysis of 3. Obtaining a job mix that
production program handles job dependencies
errors without processing jobs
4. A plan for user training out of order
4. Obtaining a job mix that
1-36. As scheduler, you will need makes the best use of
a backup or contingency plan most resources without
for which of the following bogging down the entire
reasons? computer system
1. To allow for hardware 1-40. Resources, workflow, system
breakdowns and capabilities and capacities,
malfunctions and workload demands are all
2. To schedule users’ what type of information?
requirements
3. To allow for late 1. Job-related
submission of input from 2. Workload-related
the user 3. Resource-related
4. To correct job 4. AIS facility-related
parameters that are
entered into the system 1-41+ TO be sure sufficient time
incorrectly is scheduled for a job, you
will probably want to add
1-37. Resource requirements, extra time to the estimated
processing time, job time as a safety factor.
dependencies, priorities, What is this type of time
and deadlines are all what called?
type of information?
1. Excess time
1. Job-related 2. Time-plus
2. Workload-related 3. Real time
3. Resource-related 4. Buffer time
4. AIS facility-related

6
1-42. As scheduler, to provide for 1-46. During production
priority changes, special processing, monitoring the
job requests, power outages, jobs to see that the work is
and corrective maintenance, being accomplished as
you must take which of the planned is the
following actions? responsibility of all except
which of the following
1. Reboot the computer personnel?
system quickly without
operator assistance 1. Operator
2. Readjust schedules 2. I/O control clerk
quickly with a minimum 3. Technical administrator
of disruption 4. Production control
3. Revise your normal coordinator
scheduling procedures to
avoid these problems 1-47. Who is the most qualified
4. Request scheduling and highly trained
assistance from computer individual to assist online
operations personnel users with their particular
processing problems?
1-43. When preparing a monthly
schedule, you should be sure 1. Operator
to include time for which of 2. Shift supervisor
the following requirements? 3. Production control clerk
4. Subsystem coordinator
1. Testing only
2. Planned maintenance only 1-48. Which of the following
3. Backup procedures only problems is one of the most
4. Testing, planned frequent hardware problems
maintenance, and backup associated with production
procedures processing?
1-44. Which of the following 1. Loss of power
things do NOT normally 2. Printer out of paper
affect the approved monthly 3. Tape read/write errors
schedule? 4. Wrong printer forms
loaded
1. System backups
2. Software testing 1-49. Which of the following
3. System/program errors problems is NOT a common
4. Input files not external environmental
available problem?
1-45. A work load schedule is 1. Head crash
which of the following types 2. Loss of power
of schedules? 3. Voltage spikes
4. Loss of air conditioning
1. External only
2. Internal only
3. External and internal

7
1-50. To correct software related 1-54. To improve system
problems, the operator must performance, you can look
refer to which of the for trends in the production
following sources for the process. Which of the
corrective action to take? following trends would NOT
be looked at?
1. Program operator manual
only 1. Impact of modified
2. Job run folder only applications
3. Program operator manual 2. Times when system was
and job run folder idle
4. System manual 3. Backlog of jobs to be
run
1-51. Unscheduled downtime can 4. Times when system seems
result from all except which slow
of the following causes?
1-55. The amount of information
1. Power failures you include in an AIS report
2. Rebooting the system should NOT exceed whose
3. Loss of air conditioning requirements?
4. System saves
1. User’s
1-52. When a software problem is 2. Supervisor’s
researched, which of the 3. Facility manager’s
following items is the most 4. Upper management’s
important?
1-56. Which of the following items
1. Abort code is NOT required in an ASDP?
2. Program step
3. Action taken 1. Outline of the need
4. Date job submitted 2. Prediction of the future
need
1-53. To improve performance and 3. Summary of the selected
operation, you should FIP resource solution
provide feedback to all but 4. Summary of the projected
which of the following costs
people?
1-57. Downtime reported on the
1. Shift supervisor hardware utilization report
2. I/O control clerk includes which of the
3. Technical administrator following types of downtime?
4. Production control
coordinator 1. Whole system only
2. Each piece of equipment
only
3. Whole system and each
piece of equipment as
appropriate
4. Equipment awaiting
installation

1-58. Hardware under-utilization


can be measured by excessive
idle time.

1. True
2. False

8
1-59. Which of the following 1-64. When you cannot work around
situations is NOT usually a a problem to continue
cause of application operating, what priority
software aborts? should you assign to the
trouble report?
1. File corrupted
2. File not available 1. Critical
3. Job run in sequence 2. Routine
4. Out of free disk space 3. Urgent
1-60. Which of the following 1-65. When you can work around the
reports are good sources for problem but a resolution is
determining what required immediately, what
performance-tuning priority should you assign
techniques to implement? to the trouble report?
1. Hardware and software 1. Critical
projection 2. Routine
2. Application software 3. Urgent
performance
3. Hardware utilization 1-66. All of the following are
4. Operating system common reasons for the
software submission of a hardware
trouble report except which
1-61. With average program mixes, one?
cache memory can-yield what
percent increase in 1. System keeps locking up
processing speed? 2. System keeps dropping
I/O channels
1. 30% 3. Corrupted file and no
2. 40% save tapes are available
3. 50% 4. Bad data entered in file
4. 60%
l-67. When preparing the
1-62. You can make all but which operational guidelines for
of the following changes to your facility, which of the
the operating system? following areas should you
consider?
1. Change memory addresses
2. Reconfigure disk drives 1. Backup operations only
3. Reconfigure the system 2. Contingency plans and
4. Change buffer sizes disaster recoveries only
3. Emergency responses only
1-63. When submitting a trouble 4. Backup operations,
report, you must follow the contingency plans and
instruction from which of disaster recoveries, and
the following commands? emergency responses
1. The type commander 1-68. Which of the following is
2. The command receiving NOT a common reason for
the trouble report urgent change requests?
3. The command sending the
trouble report 1. Changes to the operating
system
2. Equipment degradation
3. System testing
4. Special saves

9
ASSIGNMENT 2
Textbook Assignment: “Communications Administration,” chapter 2, pages 2-1
through 2-29.

2-1. DCS circuits are owned or 2-5. Naval communications


leased by what organization? includes which of the
following policies?
1. AT&T
2. The Joint Military 1. To promote the safety of
Communications life at sea and in the
Management Office air by maintaining
3. The U.S. Government communications with
4. NAVCOMTELCOM appropriate
communications
2-2. The DCS combines elements facilities
from the three military 2. To encourage at all
services into a single levels of command an
communications system. effort to improve
techniques, procedures,
1. True and efficiency
2. False 3. To establish and
maintain effective
2-3. Who exercises operational communications within
control over the DCS? the Department of the
Navy
1. The civilian head of the 4. Each of the above
DCA
2. The head of the JCS 2-6. Concerning area of coverage,
3. The military head of the what is the primary
NTS distinction between the NTS
4. The military head of and the DCS?
DISA
1. The DCS units are fleet
2-4. What is the mission of naval associated, and the NTS
communications? facilities are primarily
ashore
1. To provide reliable, 2. The NTS facilities are
secure, and rapid fleet associated, and
communications the DCS units are
2. To provide reliable, primarily ashore
simple, and rapid 3. Navy teleprinter
communications communications are
3. To provide controlled, within the realm of the
secure, and functional NTS; Navy communications
communications by any other means are
4. To provide easy, secure, under the cognizance of
and rapid communications the DCS
4. Navy teleprinter
communications are
within the realm of the
DCS; Navy communications
by any other means are
under the cognizance of
the NTS

10
2–7. Who is responsible for
operational and management
control of the elements of A. NCTAMS
the NTS? B. NAVCOMTELSTA
C. NAVCOMTELDET
1. Commander, Naval Support D. NAVSECGRUDEPT
Force
2. Commander, Naval
Computer and Figure 2A
Telecommunications
Command IN ANSWERING QUESTIONS 2-11 THROUGH
3. Commander in Chief, 2-14, SELECT FROM FIGURE 2A THE
Atlantic Fleet NAVAL TELECOMMUNICATIONS COMMAND
4. Chief of Naval ELEMENT DESCRIBED.
Operations
2-11. Assigned a limited or
2-8. HOW do fleet commanders specialized mission.
assign communications
responsibilities to their 1. A
respective fleets? 2. B
3. C
1. Communications 4. D
Information Bulletins
(CIBs) 2-12. Responsible for cryptologic
2. Wide Area Network (WAN) operations.
3. Operation Orders
(OPORDs) 1. A
4. Naval messages 2. B
3. C
2-9. The world is divided into 4. D
what total number of Nava]
Communications Areas 2-13. Entry point for Navy
(NAVCOMMAREAS)? Tactical Satellite Systems.

1. Five 1. A
2. Six 2. B
3. Three 3. C
4. Four 4. D

2-10. Who exercises coordination 2-14. Provides Naval Industrial


and control of all naval Fund ADP services.
communications within each
NAVCOMMAREA? 1. A
2. B
1. Officer in Charge, 3. C
NAVCOMMAREA 4. D
2. Naval Computer and
Telecommunications Area
Master Station
3. The fleet CINC in the
area
4. Naval Communications
Station

11
2-15. When you are assigned as a 2-18. To overcome resistance to
communications manager, what changes in performance
should be your first standards, which of the
consideration? following methods is
recommended?
1. Compare the
communications 1. Show the personnel
organization with others concerned how wasteful
of similar size their former methods
2. Evaluate the were
effectiveness of 2. Give personnel a
organization’ s complete description of
communications the changes being made
3. Evaluate the personnel 3. Permit personnel who
training program will be-affected by the
4. Rotate personnel in changes to participate
their jobs to improve in the organizing effort
training 4. Advise the personnel
concerned that they must
2-16. To measure the effectiveness overcome their natural
of the operations and resistance to change
services-provided by your
communications facility, you 2-19. You may improve overall
should establish standards personnel performance by
of performance for which of evaluating which of the
the following areas? following factors?
1. Speed 1. Personnel requirements
2. Security 2. Existing organizational
3. Reliability structure
4. A1l of the above 3. Both 1 and 2 above
4. The need for qualified
2-17. Fixed standards for work replacements
measurement processes
present what potential 2-20. A lack of efficiency in a
problem? communications division is a
direct reflection of the
1. They may prevent changes management skills of which
that are needed as a of the following
result of changing individuals?
conditions
2. They limit variety in 1. Commanding officer
work assignments 2. Senior supervisor
3. They tend to limit 3. Training officer
individual work 4. Watchstanders
potential
4. They allow for
individual initiative,
which is undesirable

12
2-21. To reorganize divisional 2-26. Who is responsible to the
workflow and workspace communications officer for
layout, what information do compliance with
you need to plan properly? communications directives
and for the accurate and
1. What work is to be done rapid handling of messages?
2. When the work is to be
performed 1. Communications watch
3. HOW the work is to be officer
accomplished 2. Senior watch supervisor
4. Each of the above 3. Communications center
supervisor
2-22. What is a major 4. Technical control
responsibility of a supervisor
supervisor?
2-27. Who directly supervises all
1. Promote timeliness radiomen on watch in the
2. Monitor production message processing area and
3. Maintain proper work is responsible for notifying
hours the CWO and SWS on any
4. Ensure personnel are fit unusual or urgent matters?

2-23. When office layout is being 1. Assistant watch


planned, what is the primary supervisor
consideration? 2. Radio officer
3. Communications center
1. Security of classified supervisor
material 4. Technical control
2. Safety factors supervisor
3. Number of personnel to
be accommodated 2-28. Who is responsible for
4. Proper flow of paper and examining operational logs,
work monitoring equipment
alignment and operation, and
2-24. The physical layout of your preventing message
. backlogs?
office should be arranged so
that paperwork will flow in 1. Communications center
what direction(s)? supervisor
2. Senior watch supervisor
1. One direction 3. Radio officer
2. A clockwise direction 4. Technical control
3. Back-and-forth supervisor
4. Two directions at once
2-29. Who has full responsibility
2-25. What publication lists the for the internal handling of
types of ships that are message traffic within the
required to have a ship?
communications department?
1. Commanding officer
1. NWP 1 (NWP 2-01) 2. Executive’ officer
2. ACP 100 3. Communications officer
3. NWP 4 (NWP 6-01) 4. Radio officer
4. NTP 4

13
2-30. Who is responsible for the 2-34. Directives issued by naval
organization, supervision, commanders to effect the
and coordination of the coordinated execution of an
command’s external operation are known by what
communications? term?

1. Radio officer 1. Communications plan


2. Communications officer (COMMPLAN)
3. Communications watch 2. Execution order (EXORD)
officer 3. operation order (OPORD)
4. Communications watch. 4. Standard operating
supervisor procedure (SOP)
2-31. Who is responsible for 2-35. An OPORD is made up of what
preparing and maintaining three parts?
the communications watch,
quarter, and station bill? 1. Heading, plan, and
closure
1. Communications officer 2. Beqinning, body, and
2. Communications watch annex
officer 3. Heading, body, and
3. Radio officer closure
4. Senior watch supervisor 4. Heading, body, and
ending
2-32. Who is responsible for
maintaining the status board 2-36. Detailed information for
which displays equipment, various ship departments is
nets, and circuit contained in what two
information? enclosures?

1. Communications officer 1. Annexes and appendices


2. Communications center 2. Annexes and tabs
supervisor 3. Appendices and indexes
3. Senior watch supervisor 4. Annexes and indexes
4. Technical control
supervisor 2-37. A document issued by an
organization to advise its
2-33. Who is responsible for personnel of internal
managing the command’s CMS routine practices is most
account and for advising the commonly issued in what
commanding officer on all format?
matters concerning CMS?
1. Division instruction
1. Communications officer 2. Division officer
2. Radio officer instruction
3. Crypto officer 3. Standard operating
4. CMS officer procedure
4. Operational instruction

14
2-38. How detailed a standard 2-42. What type of address group
operating procedure (SOP) is must always have more
depends on which of the information added to it to
following factors? serve as a complete station
and address designator?
1. The state of training
2. The complexity of the 1. Individual activity
instructions address group
3. The size of the command 2. Collective address group
4. Each of the above 3. Conjunctive address
group
2-39. What type of message is 4. Address indicating group
destined for two or more
addressees, none of whom is 2-43. What always precedes
informed of any other geographic address groups?
addressee?
1. Individual activity
1. Book address groups
2. General 2. Collective address
3. Multiple-address groups
4. Single-address 3. Conjunctive address
groups
2-40. What type of message has a 4. Address indicating
wide, predetermined, groups
standard distribution?
2-44. What is the purpose of
1. Book address indicating groups
2. General (AIGs)?
3. Multiple-address
4. Single-address 1. To reduce the number of
address groups required
2-41. How can four-letter address in the heading of a
groups be distinguished from message
Navy four-letter 2. To convey special
international radio call instructions in the
signs? heading of a message
3. To provide an alternate
1. Address groups are address group in the
transmitted with a event that the primary
hyphen between the first address group is
and second letters compromised
2. Address groups are 4. To locate the originator
transmitted with a of a message
hyphen between the third geographically
and fourth letters
3. Address groups are 2-45. A single address group that
always transmitted twice represents a set of four or
4. Address groups do not more activities, including
begin with the letter N the cognizant authority, is
known by what term?

1. Conjunctive address
group
2. Collective address group
3. Collective address
desiqnator
4. Call-sign

15
2-46. The Navy uses GMT as a 2-50. An eastbound ship crossing
common 24-hour worldwide the international date line
time standard in messages loses a day.
for the date-time group and
time of file. What does GMT 1. True
stand for? 2. False
1. Greenwich Mean Time 2-51. What is an important point
2. General Master Time to remember about the MIKE
3. Greenwich Master Time and YANKEE zones?
4. Global Mean Time
1. The day changes along
2-47. The world is divided into with the time, plus or
what total number of GMT minus 1 hour
time zones? 2. The day remains the
same, but the time
1. 6 changes, plus or minus 1
2. 12 hour
3. 24 3. The day and the time
4. 48 remain the same
4. The day changes, but the
2-48. The time zone which passes time remains the same
through Greenwich, England,
is most commonly known by 2-52. How many digits make up the
what term? Julian date?
1. GREEN time zone 1. Nine
2. ROMEO time zone 2. Seven
3. YANKEE time zone 3. Six
4. ZULU time zone 4. Four
2-49. If you were stationed in 2-53. The precedence of a message
time zone ROMEO, how would should be based on what
you convert (a) local time factor?
to GMT and (b) GMT to local
time? 1. The urgency of the
message
1. (a) Subtract 5 hours 2. The classification of
from local time the message
(b) add 5 hours to GMT 3. The number of addressees
2. (a) Add 5 hours to local who are to receive the
time message
(b) subtract 5 hours 4. The importance of the
from GMT subject matter
3. (a) Subtract 5 hours
from GMT 2-54. What is the highest
(b) add 5 hours to local precedence that is normally
time authorized for
4. (a) Add 5 h ours to GMT. administrative messages?
(b) subtract 5 hours
from local time 1. Routine
2. Priority
3. Immediate
4. Flash

16
2-55. What precedence is assigned 2-59. Which of the following
to a message that is of such messages are used to
urgency that it must be determine delay or
brief? nondelivery of a message on
a station-to-station basis?
1. Priority
2. Immediate 1. Pro forma
3. Yankee 2. Service only
4. Flash 3. Tracer only
4. Both service and tracer
2-56. What precedence is limited
to designated emergency 2-60. Which of the following
action command and control messages are described as
messages within the AUTODIN short and concise messages
system? between operators dealing
with message corrections,
1. Priority broadcast reruns, and
2. Immediate missent or misrouted
3. Flash messages?
4. Yankee
1. Pro forma
2-57. Composing a message and 2. MINIMIZE
selecting the proper 3. Service only
classification and 4. Service and tracer
precedence is the
responsibility of what 2-61. Where does an activity send
individual? the results of a tracer
investigation?
1. The drafter
2. The releaser 1. To the originator of the
3. The originator tracer message only
4. The commanding officer 2. To the preceding
station(s) only
2-58. Before accepting a message 3. To the originator of the
originated in or destined tracer message and the
for an area under minimize preceding station(s)
for transmission, the only
outrouter must ensure that 4. To the originator of the
which of the following tracer message, the
information is on the preceding station(s),
message? and the following
station
1. The notation “MINIMIZE
CONSIDERED” in the 2-62. To establish a termination
appropriate area of the with a NCTAMS or
message form NAVCOMTELSTA, a ship must
2. The releaser’s name and send a request what minimum
rank/grade in the last time in advance?
line of the message text
3. Both 1 and 2 above 1. 24 hr
4. The notation “MINIMIZE 2. 48 hr
CONSIDERED” stamped on 3. 72 hr
the message form or 4. 96 hr
diskette

17
2-63. When it needs to shift
broadcast guard, a ship A. Authentication
sends what type of message?
B. Codes
1. Termination request
message C. Ciphers
2. Communications guard
shift D. Radio silence
3. Service message
4. Broadcast screen request E. Monitoring

2-64. Broadcast screen requests F. Identification Friend


should be sent to what or Foe (IFF)
organization?
Figure 2A
1. Broadcast rerun station
2. Broadcast radiating IN ANSWERING QUESTIONS 2-67 THROUGH
station 2-72,SELECT THE SECURITY DEVICE OR
3. Broadcast control PROCEDURE FROM FIGURE 2A THAT IS
station BEST DESCRIBED IN THE QUESTION.
4. Broadcast keying station
2-67. Any cryptologic system in
2-65. A COMMSPOT report should be which arbitrary symbols or
sent under what groups of symbols represent
circumstances? units of plain text.

1. As soon as unusual 1. A
communication 2. C
difficulties arise 3. E
2. As soon as communication 4. F
difficulties are
corrected 2-68. Uses electromagnetic
3. Whenever unusual transmissions to which
communication equipment carried by
difficulties are friendly forces
expected automatically respond.
4. Durinq solar flare-ups
1. B
2-66. What type of message is 2. C
placed in the cryptocenter 3. E
file? 4. F

1. SPECAT 2-69. A procedure designed to


2. SPECAT SIOP-ESI protect communications
3. TICON systems against acceptance
4. NATO of false transmissions or
simulations by establishing
the validity of a
transmission, message, or
originator.

1. A
2. B
3. C
4. D

18
2-70. A system of communication in 2-73. The communications plan
which arbitrary groups of satisfies communications
symbols represent units of requirements by providing
plain text; used for brevity what information?
and/or security.
1. Specifies circuit
1. A operators, equipment,
2. B and traffic capabilities
3. C 2. Establishes watchbills,
4. E software requirements,
and deployment times
2-71. A condition in which all or 3. Designates enemy
certain radio equipment is communications
kept inoperative. frequencies, supporting
COMMSTAs, and supply
1. A requirements
2. B 4. Specifies circuits,
3. C channels, and facilities
4. D to be used
2-72. The act of listening, 2-74. What document initiates the
carrying out surveillance addition, deletion, or
on, and/or recording the change to an existing DCS
emissions of own or allied circuit?
forces.
1. Telecommunications
1. A Service Order (TSO)
2. B 2. Telecommunications
3. E Service Request (TSR)
4. F 3. Circuit Service Transfer
(CST)
4. Request for Modification
of Circuit (RMC)

19
ASSIGNMENT 3
Textbook Assignment: “Communications Administration (continued),” chapter
2, pages 2-29 through 2-37; “Communications, Security,”
chapter 3, pages 3-1 through 3-12; “AIS Security,”
chapter 4, pages 4-1 through 4-12.

3-1. If you desire to delete an 3-5. Which of the following


existing DCS circuit, you constraints should be
should submit what type of considered when a frequency
request? assignment is authorized?
1. An AUTODIN deletion 1. Power, emission
request bandwidth, location of
2. A telecommunications antennas, and operating
service request time
3. A DCA circular request 2. Power, receiver
4. A technical control locations, and
service request atmospheric conditions
3. Bandwidth, sidebands,
3-2. Requirements for new harmonics, and power
telecommunications services requirements
should be defined and 4. Power, harmonics, and RF
submitted what minimum time hazards to personnel
in advance?
3-6. What authority grants Navy
1. 1 yr and Marine Corps activities
2. 2 yr within the U.S. permission
3. 3 yr to use radio frequencies?
4. 6 mo
1. Naval Electromagnetic
3-3. What does a TSO authorize? Spectrum Center
(NAVEMSCEN)
1. Funding to begin basic 2. National
circuit design Telecommunications and
2. Starting, changing, or Information
discontinuing circuits Administration (NTIA)
3. Procurement of specific 3. United States Military
devices or ancillary Communications
equipment Electronics Board
4. Both 2 and 3 above (USMCEB)
4. Chief of Naval
3-4. Navy funds cannot be Operations (CNO)
obligated for developing or
procuring communications
equipment that uses a
portion of the frequency
spectrum until what is
obtained?

1. Frequency usage estimate


2. A frequency allocation
3. A spectrum study
4. An FCC recommendation

20
3-7. In the Navy, what 3-10. What is the objective of the
organization authorizes central administration of
frequency assignment the NWPL?
applications?
1. To ensure that the
1. The United States publications in the NWPL
Military Communications are correct and readily
Electronics Board avail-able for use
(USMCEB) 2. TO ensure that personnel
2. The National have a place to study
Telecommunications and for advancement
Information 3. To ensure that personnel
Administration (NTIA) have access to
3. The Joint Chiefs of publications and
Staff periodicals on the
4. The Naval latest technology
Electromagnetic Spectrum 4. To ensure that personnel
Center (NAVEMSCEN) have access to the most
recent and best-selling
3-8. Who is authorized to send novels
PERSONAL FOR messages?
3-11. Who is responsible for the
1. E-7 military or GS-7 management of the NWPL?
civilian (or above)
2. Officers of flag rank or 1. The naval warfare
in a command status only publications officer
3. All officers 2. The naval warfare
4. Anyone who needs to send publications custodian
a personal message 3. The naval warfare
publications librarian
3-9. What is contained in the 4. The naval warfare
publications in the NWPL? publications manager
1. Manning plans, battle 3-12. What publication provides
organizations, and guidance for the
future deployment administration and security
schedules of the NWPL?
2. Awards information,
maintenance schedules, 1. OPNAVINST 5510.1
and supply information 2. NTP 4
3. Required procedures, 3. NWP 4 (NWP 6-01)
signals, and other 4. NWP 0 (NWP 1-01)
operational and
mission-essential 3-13 . Who is responsible for
information changes or corrections to
4. Operational NWPL publications?
requirements, battle
organizations, and 1. The NWPL clerk
deployment schedules 2. The primary user
3. The NWPL custodian
4. The communications watch
officer

21
3-14. Who is considered to be a 3-18. What colors are assigned to
holder under the the binders for U.S. naval
administration of NWPL? warfare publications of
different classifications?
1. A person who holds NWPL
publications for short 1. Secret - red,
terms only Confidential - green,
2. A person who transports Unclassified - white
publications to and from 2. Secret - red,
the NWPL Confidential - yellow,
3. A person who has Unclassified - blue
permanent subcustody of 3. Secret - red,
publications from the Confidential - yellow,
NWPL Unclassified - white
4. The NWPL custodian 4. Secret - red,
Confidential - green,
3-15. Which of the following files Unclassified - blue
are used in NWPL
maintenance? 3-19. Where is the effective date
of the publication
1. Signature and custody change/correction found?
fries
2. Administrative and 1. In the Record of Changes
transaction files page
3. Signature and 2. In the List of Effective
administrative files Pages (LOEP)
4. Custody and 3. In the Foreword or
administrative files Letter of Promulgation
4. In the Title page
3-16. The NWPL administrative file
is also known by what other 3-20. Which of the following
term? colors should be used to
make pen-and-ink corrections
1. Transaction file to NWPL publications?
2. Office file
3. A-1 file 1. Green only
4. Custody file 2. Black or blue only
3. Any dark color except
3-17. Material in the red
administrative file must be 4. Any color is acceptable
retained for what minimum
time ?

1. 1 yr
2. 2 yr
3. 5 yr
4. 6 mo

22
3-21. What does the designation 3-24. Coordinate and standardize
“NMC 6/2” on a correction communications procedures
mean? among U.S. military
services.
1. It is the 6th message
correction and will-be 1. A
incorporated into the 2. B
publication by printed 3. C
change number 2 4. D
2. It is the 2nd message
correction and will be 3-25. Main publications used by
incorporated into the Navy, Coast Guard, and
publication by printed Marine personnel for
change number 6 communications.
3. It was sent on the 2nd
of June of the current 1. A
year 2. B
4. It is the 6th change to 3. C
the 2nd revision of the 4. D
publication
3-26. Incorporate the results of
3-22. What document contains fleet tactical development
guidance for taking extracts and evaluation programs and
from a NATO publication? NATO experience and provide
information about the
1. OPNAVINST 5510.1 tactical capabilities and
2. ACP 121 limitations of equipment and
3. NWP 0 (NWP 1-01) systems.
4. NATO letter of
promulgation 1. A
2. B
3. C
4. D
A. ACPs
B. NTPs
C. JANAPs
D. NWPs A. CMS account
B. CMS custodian
C. CMS local holder
Figure 3A D. CMS user

IN ANSWERING QUESTIONS 3-23 THROUGH


3-26, SELECT THE PUBLICATIONS FROM Figure 3B
FIGURE 3A THAT ARE DESCRIBED.
IN ANSWERING QUESTIONS 3-27 THROUGH
3-23. Provide communications 3-29, SELECT THE TERM FROM FIGURE
instructions and procedures 3B THAT IS DESCRIBED.
essential to conducting
combined military operations
in which two or more allied
nations are involved.

1. A
2. B
3. C
4. D

23
3-27. A command with an account 3-31. What number of signatures
number that draws its COMSEC is/are required on the
material directly from COMSEC watch-to-watch
national or Navy inventory sheet?
distribution sources.
1. One
1. A 2. Two
2. B 3. Three
3. C 4. Four
4. D
3-32. What is the maximum length
3-28. COMSEC material needs are of time that you are
met by drawing such material authorized to hold
from the squadron commander. superseded (a) keying
material marked CRYPTO and
1. A (b) authentication
2. B publications?
3. C
4. D 1. (a) 24 hours (b) 24
hours
3-29. An individual who requires 2. (a) 12 hours (b) 5
the use of COMSEC material days
for a short time to 3. (a) 5 days (b) 12
accomplish a specific task. hours
4. (a) 5 days (b) 5
1. A days
2. B
3. C 3-33. What are the three types of
4. D keying material in
descending priority of
3-30. Which of the following destruction?
statements concerning
storage requirements for 1. Superseded, reserve,
COMSEC material is/are effective
correct? 2. Effective, superseded,
reserve
1. COMSEC material may be 3. Reserve, effective,
stored with other superseded
communications material 4. Superseded, effective,
according to security reserve
classification
2. COMSEC material must be 3-34. Effective keying material is
stored separately from the most sensitive of the
non-COMSEC material three types of keying
3. COMSEC material of material.
different classification
may be stored. together 1. True
regardless of 2. False
classification if
storage limitations are
a factor
4. Both 2 and 3 above

24
3-35. What is the purpose of 3-38. May be classified or
Two-Person Integrity? unclassified; normally
associated with
1. To prevent a single cryptomaterial but not
person from having significantly descriptive of
access to COMSEC it.
material
2. To prevent more than two 1. A
persons from having 2. B
access to COMSEC 3. C
material 4. D
3. To provide for an
alternate custodian in 3-39. Encompasses all associated
the event the primary is items of cryptomaterial that
unavailable provide a single means of
4. To allow for a division encryption and decryption.
of responsibilities
among the custodians 1. A
2. B
3. C
4. D
A. CRYPTO
B. Cryptoinformation 3-40. A failure that adversely
C. Crypto-related affects the security of a
information cryptosystem is known by
D. Cryptosystem what term?

1. Cryptoexposure
2. Cryptoinstability
Figure 3C 3. Cryptodeficiency
4. Cryptoinsecurity
IN ANSWERING QUESTIONS 3-36 THROUGH
3-39, SELECT THE TERM FROM FIGURE 3-41. A system within a general
3C THAT IS DESCRIBED. system confined to actual
encryption, decryption, or
3-36. Marking used to protect or authentication is known by
authenticate national what term?
security-related information
on all keying material and 1. Cryptovariable
associated equipment. 2. Specific cryptosystem
3. Secondary cryptosystem
1. A 4. Supporting cryptosystem
2. B
3. C 3-42. The most frequently changed
4. D element of a cryptosystem is
known by what term?
3-37. Always classified and
normally concerns the 1. Primary cryptovariable
encryption or decryption 2. Secondary cryptovariable
process of a cryptosystem. 3. Crypto modifier
4. Cryptosystem internal
1. A variable
2. B
3. C
4. D

25
3-43. What are the primary 3-46. When you receive a message
advantages of (a) that has an authenticator in
over-the-air rekey (OTAR) it, what action, if any, are
and (b) over-the-air you required to take?
transfer (OTAT)?
1. Prepare a message to
1. (a) Requires less challenge the originator
circuit downtime for 2. Send a message that you
loading keylists, and are in receipt of the
(b) no operator training message
required 3. Pass the message on to
2. (a) Reduces distribution higher authority for
of physical keying them to challenge the
material, and (b) originator
eliminates process of 4. None
loading equipment with
key tapes 3-47. As an operator, you are
3. (a) Reduces distribution required to authenticate in
of physical keying which of the following
material, and (b) no situations?
operator training
required 1. You suspect intrusion on
4. (a) Eliminates process the circuit
of loading equipment 2. You are requested to
with key tapes, and (b) authenticate
no operator training 3. You are requested to
required break radio silence
4. Each of the above
3-44. What is the purpose of
transmission authentication?

1. To guard against
fraudulent or simulated A. Meaconing
transmissions B. Interference
2. To inform the other C. Jamming
operator that you are D. Intrusion
receiving the
transmission
3. To acknowledge the Figure 3D
transmission of the
other operator IN ANSWERING QUESTIONS 3-48 THROUGH
4. To allow the other 3-51, SELECT THE TERM FROM FIGURE
operator to acknowledge 3D THAT IS DEFINED.
your transmission
3-48. The interception and
3-45. The self-authentication rebroadcast of navigational
method is used in which of signals on the same
the following transmissions? frequency.

1. Transmission and reply 1. A


2. Challenge and reply 2. B
3. Transmission 3. C
authentication 4. D
4. Challenge authentication

26
3-49. An attempt by the enemy to 3-53. Which of the following
enter U.S. or allied assets is NOT considered an
communications systems and AIS asset?
simulate traffic with the
intent to confuse and 1. People
deceive. 2. Hardware
3. Software
1. A 4. Environment
2. B
3. C 3-54. In AIS security terminology,
4. D what term is used for the
things that can destroy AIS
3-50. The deliberate use of assets?
electromagnetic signals with
the objective of impairing 1. Threats
communications circuits. 2. Probability
3. Vulnerability
1. A 4. Countermeasures
2. B
3. C 3-55. To express the cost of a
4. D loss or abuse from an
adverse event over time,
3-51. Usually a nondeliberate what AIS security term is
electrical disturbance that used?
unintentionally prevents the
effective use of a 1. Risk
frequency. 2. Likelihood
3. Vulnerability
1. A 4. Countermeasure
2. B
3. C 3-56. In AIS security, risks are
4. D usually expressed in which
of the following terms?
3-52. Which of the following
statements best describes 1. Days
the overall goal of AIS 2. Dollars
security? 3. Equipment
4. Personnel
1. To take all reasonable
measures to protect AIS 3-57. In AIS security terminology,
assets the controls to lessen or
2. To prevent data and eliminate known threats and
programs from being vulnerabilities are called
destroyed or sabotaged
3. To keep unauthorized 1. physical barriers
personnel out of your 2. security routines
AIS facility 3. backup procedures
4. To take whatever 4. countermeasures
measures are necessary
to protect equipment and
people

27
3-58. Under AIS security, 3-62. In addition to hardware and
countermeasures (controls) software, what are the other
that are embedded in three areas of consideration
hardware, software, and for the Navy’s AIS security
telecommunications equipment program?
are what type of controls?
1. Data, personnel, and
1. Physical environment
2. Technical 2. Data, human resources,
3. Managerial and logistics
4. Administrative 3. Data, human resources,
and communications
3-59. Under AIS security, 4. Media libraries,
countermeasures (controls) environment, and
that concern people and communications
procedures, such as who is
authorized to do what or who 3-63. Which of the following
receives or requests a personnel serves as the
sensitive report, are what single point of contact for
type of controls? all matters related to AIS
security?
1. Physical
2. Technical 1. Executive officer
3. Managerial 2. Information system
4. Administrative security manager
3. Security violations
3-60. Under AIS security, officer
countermeasures (controls) 4. Systems security manager
that concern planning and
evaluation, such as audits 3-64. AIS security is not really
to review the effectiveness that difficult to
and efficiency of understand. What percent is
countermeasures that are in (a) common sense, and (b)
place, are what type of proper training?
controls?
1. (a) 55% (b) 45%
1. Physical 2. (a) 60% (b) 40%
2. Technical 3. (a) 65% (b) 35%
3. Managerial 4. (a) 70% (b) 30%
4. Procedural
3-65. The manufacturer’s optimum
3-61. In regard to AIS security, temperature and humidity
the continuation of an range specifications for AIS
activity’s mission during equipment operation are NOT
abnormal operating available. Which of the
conditions is provided by following (a) temperature
which of the following and (b) humidity ranges are
means? considered acceptable for
computer operation?
1. Countermeasures
2. Contingency plans 1. (a) 65° ±5° (b) 55% ±5%
3. Security risk plan 2. (a) 65° ±5° (b) 65% ±2%
4. Emergency response team 3. (a) 72° ±2° (b) 55% ±5%
4. (a) 72° ±2° (b) 65% ±2%

28
3-66. In AIS environmental 3-70. For processing classified,
security, emergency lights the central computer
are installed in computer facility and all its related
facilities for what primary peripheral devices (both
reason? local and remote) are
protected for the highest
1. To protect personnel classification category and
2. To assist fire fighters type of material contained
3. To locate AIS equipment in the system. The system
4. To locate fire-fighting is said to be in what
equipment security mode?
3-67. Fluctuations in electrical 1. Controlled
power can adversely affect 2. System low
the operation of AIS 3. System high
equipment. If your 4. Totally dedicated
command’s mission dictates
continuous AIS support, each 3-71. For processing level I data,
computer system should be the central computer
equipped with which of the facility and all its related
following equipment? peripheral devices (both
local and remote) are
1. A motor/generator exclusively used and
2. An ac, dc regulator controlled by specific users
3. A voltage surge having a security clearance
protector and need-to-know for the
4. An uninterrupted power processing of a particular
source cateqory of classified
material. The system is
3-68. In regard to AIS security, operating in what security
master control switches are mode?
used to shut off all power
to your AIS spaces in the 1. Dedicated
event of a fire. These 2. System low
master control switches are 3. Multilevel
normally installed at what 4. System high
location?
2
3-72. For processing level I data,
1. In the CO storage room an AIS system provides the
2. In the security capability of permitting
officer’s space various categories of
3. At the exit doors of the classified materials to be
AIS spaces stored, processed, and
4. On the master control selectively accessed on a
panel of the computer concurrent basis by users
having differing clearances
3-69. Which of the following and need-to-know. The
security modes does NOT system is said to be in what
apply to processing security mode?
classified or level I data?
1. Controlled
1. Dedicated 2. Undedicated
2. System low 3. System low
3. Multilevel 4. Multilevel
4. System high

29
3-73. What category of AIS media 3-74. Which of the following
is considered temporary in categories of AIS media is
nature and is retained for permanent in nature and is
180 days or less? retained for a period of
more than 180 days?
1. Smooth
2. Working 1. Smooth
3. Finished 2. Working
4. Intermediate 3. Finished
4. Intermediate

30
ASSIGNMENT 4
Textbook Assignment: “AIS Security (continued),” chapter 4, pages 4-13
through 4-26.

4-1. In which of the following 4-4. AS a guideline for risk


steps in planning an AIS analysis, which of the
security program, will major following FIPS publications
problem areas be identified? should you use?

1. Perform action plans 1. FIPS PUB 47


2. Perform preliminary 2. FIPS PUB 53
planning 3. FIPS PUB 65
3. Perform a preliminary 4. FIPS PUB 79
risk analysis
4. Perform and document a 4-5. The impact of a given threat
detailed risk analysis may depend on all but which
of the following factors?
4-2. Which of the following steps
in planning an AIS security 1. Geographical location
program allows for review 2. Local environment
and approval? 3. Perceived threat of
vandals
1. Perform action plans 4. Potential value of
2. Perform preliminary property to a thief
planning
3. Perform a preliminary 4-6. Which of the following is a
risk analysis threat to an AIS facility?
4. Perform and document a
detailed risk analysis 1. Hardware failure
2. Tampering with inputs,
4-3. A security policy statement programs, and data
should provide which of the 3. Accidents causing
following information? nonavailability of key
personnel
1. General guidance and 4. Each of the above
assignment of
responsibilities 4-7. It is recommended that the
2. General guidance and AIS facility upper
listing of management begin development
responsibilities of the security program with
3. Detailed guidance and a/an
assignment of
responsibilities 1. risk analysis
4. Detailed guidance and 2. inventory of equipment
listing of 3. survey of data integrity
responsibilities 4. intensive training
program

31
4-8. A quantitative risk analysis 4-11. The loss of program files
produces which of the has which of the following
following results? loss potentials?
1. Long-range planners 1. Cost to replace assets
receiving guidance on 2. Cost to reconstruct
personnel requirements files
2. The security program 3. Security compromise
objectives directly 4. Value of assets stolen
relating to the mission before loss is detected
of the command
3. Criteria generated for 4-12. Which of the following is
designing and evaluating the loss potential that may
internal controls result from the indirect
4. An estimate of losses to theft of assets?
be expected
1. Cost to replace assets
4-9. When the risk analysis is 2. Cost to reconstruct
prepared, the first step to files
be considered is to 3. Security compromise
4. Value of assets stolen
1. develop an estimate of before loss is detected
annual loss expectancy
2. estimate the potential 4-13. To show replacement costs
losses to which the AIS for the physical assets of
facility is exposed the AIS facility, AIS
3. evaluate the threats to technical managers and upper
the AIS facility management should use which
4. review the security of the following methods?
program objectives
1. Build a graph
4-10. The loss potential estimate 2. Construct a table
has which of the following 3. Produce a list
objectives? 4. Write a description
1. To place a monetary 4-14. The AIS technical manager
value on the loss should call on which of the
estimate only fallowing personnel to
2. To identify critical assist in making
aspects of the AIS loss estimates?
facility operation only
3. To place a monetary 1. Users
value on the loSS 2. Vendors
estimate and to identify 3. Programmers
critical aspects of the 4. Supervisors
AIS facility operation
4. To determine data
replacement requirements

32
4-15. After a preliminary 4-18. The third step to be
screening to identify the considered when you prepare
critical tasks, the AIS the risk analysis is to
technical manager should
perform which of the 1. develop an estimate of
following tasks next? annual loss expectancy
2. estimate the potential
1. Determine the scope of losses to which the AIS
the critical tasks facility is exposed
2. Develop an estimate of 3. evaluate the threats to
annual loss expectancy the AIS facility
3. Quantify loss potential 4. review the security
with the help of user program objectives
representatives
4. Determine the back-up 4-19. Fire, flood, and sabotage,
system requirements for in varying degrees, result
the critical tasks in which of the following
losses?
4-16. The second step to be
considered when you prepare 1. Indirect loss of assets
the risk analysis is to 2. Physical destruction
3. Data compromise
1. develop an estimate of 4. Theft of information
annual loss expectancy
2. estimate the potential 4-20. Reducing the probability of
losses to which the AIS some occurrence by altering
facility is exposed the environment could be
3. evaluate the threats to accomplished in which of the
the AIS facility following ways?
4. review the security
program objectives 1. Implementing more
rigorous standards for
4-17. To develop estimates of the programming and software
occurrence probability for testing
each type of threat, the AIS 2. Preparing a backup
technical manager should use system for offsite
all except which of the operations
following resources? 3. Providing military
guards and special door
1. Standardized Navy-wide locks
formula 4. Relocating the AIS
2. Higher authority facility
instructions/manuals
3. Common sense
4. Data

33
4-21 Which of the following is an 4-24. All but which of the
example of erecting barriers following events tends to
to ward off a threat? have the same basic effect
as the others on
1. Implementing more AIS operations?
rigorous standards for
programming and software 1. Fire
testing 2. Rain
2. Preparing a backup 3. Earthquake
system for offsite 4. Windstorm
operations
3. Providing military 4-25. In minimizing an AIS
guards and special door building’s exposure to fire
locks damage, which of the
4. Relocating the AIS following factors should be
facility considered?
4-22. When selecting a specific 1. Contractors
remedial measure, a total of 2. Design only
how many criteria should be 3. Location only
used? 4. Design and location
1. One 4-26. An AIS physical security
2. Two program should include which
3. Three of the following fire safety
4. Four elements?
4-23. Which of the following is 1. Measures to ensure
one possible way to select a prompt detection of and
remedial measure to minimize response to a fire
a threat? emergency
2. Provision for quick
1. Begin with the threat human intervention and
having the largest adequate means to
annual loss potential extinguish fires
2. Begin with only those 3. Provision of adequate
measures for which the means and personnel to
cost can be estimated limit damage and effect
precisely prompt recovery
3. Begin with only those 4. All of the above
remedial measures that
would not cause a loss 4-27. In evaluating the fire
reduction in the same safety of an AIS facility, a
area total of how many factors
4. Begin with the remedial are to be considered?
measures for which the
annual cost is more than 1. Five
the expected reduction 2. Six
in annual loss 3. Three
4. Four

34
4-28. Which of the following 4-32. Durinq the third staqe of a
factors affects the degree fire, fire fighting becomes
of hazard associated with a increasingly difficult and
given occupancy? often people cannot remain
at the fire site for which
1. Weight of the material of the following reasons?
2. Amount of combustible
material 1. Toxic gases only
3. Exposed surface of the 2. High temperatures only
material 3. Large volume of smoke
4. Package in which the only
material is stored 4. Toxic gases, high
temperatures, and large
4-29. When the safety features of volume of smoke
an AIS facility building are
designed, which of the 4-33. Prompt fire detection is
following factors should be best accomplished through
considered? the use of which of the
following detectors?
1. Heat-resistant lights
2. Building operation 1. Gas
3. Fire walls 2. Heat
4. Storm doors 3. Smoke
4. Flame
4-30. The inherent fire safety of
a building can be rendered 4-34. When detectors are
ineffective because of which installed, which of the
of the following conditions? following factors need NOT
be considered?
1. Fire doors propped open
2. Standard electrical 1. The location of
wiring equipment
3. Use of low-flame spread 2. The direction and
materials velocity of air flow
4. Products-of-combustion 3. The presence of areas
detectors with stagnant air
4. The location of fire
4-31. Experience in fire fighting extinguishers
shows that the major factor
in limiting fire damage is 4-35. In the design of the
detection control panel,
1. prompt detection of which of the following
fires indications should
2. experienced fire be included?
fiqhters
3. multiple fire 1. The power supply status
extinguishers of each detector
4. quick response time to 2. Which detector has
alarms alarmed
3. The cause of the alarm
4. What type of detector
has alarmed

35
4-36. To assure that someone will 4-40. What is the minimum
be alerted to a fire, which temperature required to
of the following alarm activate an automatic
locations is recommended as sprinkler system?
the primary location?
1. 115°F
1. Computer room 2. 125°F
2. Personnel office 3. 135°F
3. Commanding officer’s 4. 145°F
office
4. Buildinq maintenance 4-41. To ensure the effectiveness
of portable extinguishers,
4-37. Reducing the sensitivity of which of the following
the smoke detectors to measures should be observed?
eliminate nuisance alarms
may have which of the 1. Extinguishers should be
following results? marked for rapid
identification
1. Save energy 2. Extinguishers should
2. Extend equipment life have inspection tags
3. Delay fire detection 3. Extinguishers should be
4. Cause poor personnel placed in corners
performance 4. Extinguishers should be
placed on the floor, not
4-38. In an actual fire situation, mounted
the air handling equipment
could be shut down 4-42. Military personnel who are
automatically to avoid which knowledgeable and trained in
of the following problems? fire safety are needed by
which of the following types
1. Straining the air of commands?
handling equipment
2. Excessive energy 1. Small commands only
consumption 2. Medium commands only
3. Excessive filter wear 3. Large commands only
4. Spreading smoke and 4. Every command
fanning. the flames
4-43. When using supporting
4-39. When fire detection systems utilities, AIS technical
are interconnected with air managers should consider the
handling equipment, a probability of occurrence
preferred technique is to and the effects of which of
cause the system to take the following conditions?
which of the following
measures? 1. Vandalism only
2. Sabotage only
1. Exhaust the smoke 3. Fire only
2. Lower the thermostat 4. Vandalism, sabotage, and
3. Recirculate the smoke fire
4. Use inside air for
intake

36
4-44. Excessive fluctuation in the 4-48. An uninterrupted power
dc voltage applied to the supply (UPS) consists of a
hardware can be caused if solid-state rectifier that
the line voltage is 90 performs which of the
percent or less of nominal following functions?
for more than what minimum
number of milliseconds? 1. Drives a solid-state
inverter only
1. 7 2. Keeps batteries charged
2. 6 only
3. 5 3. Drives a solid-state
4. 4 inverter and keeps
batteries charged
4-45. Power fluctuations in line 4. Synthesizes alternating
voltage cause unpredictable current
results in which of the
following components? 4-49. The UPS battery supply can
support a facility load for
1. Logic only a maximum of how many
2. Hardware only minutes?
3. Data transfer only
4. Logic, hardware, and 1. 35
data transfer 2. 40
3. 45
4-46. In an AIS facility, the 4. 50
effects of internal power
fluctuations can be 4-50. The control circuitry for a
minimized in which of the static transfer switch
following ways? performs which of the
following functions?
1. Grounding the CPU
2. Isolating the AIS 1. Senses variations in
hardware from other frequency
facility loads 2. Senses an overcurrent
3. Wiring all components in condition
parallel 3. Switches the load to the
4. Wiring each component alternate power source
with a circuit breaker 4. Stops the flow of power

4-47. The technique of connecting 4-51. Using multiple, independent


the AIS facility to more UPS units can provide which
than one utility feeder has of the following benefits?
more protection value when
the feeders are connected in 1. Power consumption is
what manner? lowered
2. Each unit can be
1. To the same junction box switched offline if it
2. From the same utility fails
pole 3. The metering of
3. To different power component power
substations consumption is
4. To different utility facilitated
meters 4. All of the above

37
4-52. If the risk analysis shows a 4-56. Which of the following
major loss from power contingency plans for
outages lasting 30 to 45 dealing with classified
minutes or longer, which of material should NOT be
the following measures considered in emergencies?
should be taken?
1. Destruction
1. Installing an on-site 2. Protection
generator 3. Removal
2. Cutting back on 4. Reproduction
operations
3. Relocating the facility 4-57. In an emergency, the
4. Adding more multiple, placement of a perimeter
independent UPS units guard force around the
affected area provides
4-53. Which of the following protection in which of the
components must be large following ways?
enough to support
air-conditioning or minimum 1. Provides external
lighting as well as the UPS contact when
load? communications are lost
2. Prevents the removal of
1. Generator classified material
2. Alternator 3. Reduces the risk of
3. Prime mover additional destruction
4. Alternate mover 4. Provides AIS access
control
4-54. Providing physical
protection for an AIS 4-58. Which of the following
facility involves which of methods may be used to
the following processes? protect the property
boundary of the AIS
1. Denying access to facility?
unauthorized persons
2. Permitting access to 1. Roving patrol only
authorized persons 2. Fencing-only
3. Both 1 and 2 above 3. Roving patrol and
4. Minimizing the risks of fencing
a natural disaster 4. Security badges
4-55. Wherever AIS equipment is 4-59. Fences installed for
used for processing boundary protection should
classified information, be (a) what minimum height
which of the following with (b) what minimum number
instructions should be used of strands of barbed wire?
for applying physical
protection and security 1. (a) 8 feet (b) 2
policy? 2. (a) 8 feet (b) 3
3. (a) 10 feet (b) 2
1. OPNAVINST 5230.12 4. (a) 10 feet (b) 3
2. OPNAVINST 5239.1
3. SECNAVINST 5211.5
4. SECNAVINST 5233.1

38
4-60. Penetration sensors mounted 4-64. The use of an intrusion
on fences and gates should detection system (IDS) in a
provide which of the protective program is
following alarms when covered in which of
tripped? the following instructions?

1. External only 1. OPNAVINST 5239.1


2. Internal only 2. OPNAVINST 5510.1
3. External and internal 3. SECNAVINST 5211.5
4. SECNAVINST 5233.1
4-61. Tests show that
electromagnetic or acoustic 4-65. The physical security
emanations from AIS hardware. requirements for a remote
may be intercepted up to a terminal area are based upon
maximum of how many yards which of the following
away? classifications?

1. 150 1. The classification of


2. 230 the central computer
3. 325 facility
4. 400 2. The classification of
the remote terminal area
4-62. If the AIS technical manager 3. The classification of
plans to take measures to the data that will be
control compromising accessed through the
emanations, those measures terminal
are subject to approval 4. The classification
under the provisions of assigned by higher
which of the following DOD authority
directives?
4-66. When the AIS system contains
1. 5200.19 classified information, what
2. C5200.19 action, if any, must be
3. 5200.28 taken for each remote
4. C5200.28 terminal that is not
controlled?
4-63. The application of the
measures to control 1. Disconnect
compromising emanations 2. Place offline
within the industrial AIS 3. Turn off
systems is at the direction 4. None
of the contracting activity.
concerned under the 4-67. In the annual security
provisions of which of the survey of an AIS facility,
following DOD directives? what is the second step?

1. 5200.19 1. Define and tabulate


2. C5200. 19 areas within the
3. 5200.28 facility for
4. C5200.28 control purposes
2. Evaluate all potential
threats to the AIS
facility
3. Identify areas where
remedial measures are
needed
4. Recommend improvements
to upper management

39
4-68. When the annual security 4-72. Which of the following facts
survey is conducted, it are used by the AIS
should begin at which of the technical manager to
following areas? evaluate existing access
controls and protection
1. Roof measures?
2. Basement
3. Perimeter 1. The schedule of alarm
4. Top floor tests
2. The design of the alarm
4-69. When surveying the perimeter system
of the facility, the AIS 3. The number and location
technical manager need NOT of manned posts
check which of the following 4. The distance between the
accessways? manned posts and the
building
1. Fire escapes
2. Doors and windows 4-73. Which of the following items
3. Other entrances, such as are prepared and executed
vents for the accomplishment of
4. Manned posts at the the command’s specific
property line mission?
4-70. When surveying the internal 1. Operation plans only
security of a facility, the 2. Operation plans and-the
AIS technical manager should command’s organizational
follow which of the manual
following guidelines? 3. Emergency response plans
only
1. Begin the survey on the 4. Emergency response plans
roof and the command’s
2. Determine where alarms organizational manual
annunciate
3. Finish the survey in the 4-74. A total of how many
mailroom area different types of
4. Note the volume of the contingency plans make up a
alarms COOP security plan?
IN ANSWERING QUESTION 4-71, REFER 1. One
TO TABLE 4-6 IN THE TEXT. 2. Two
3. Three
4-71. Which of the following 4. Four
questions need NOT be
included in the physical
security survey?

1. Is the present equipment


up-to-date?
2. Is the alarm system
inspected and tested
occasionally to ensure
operation?
3. What kind of sound does
the alarm make?
4. How many zones of
protection are within
the protected building?

40
4-75. The risk analysis should be
reviewed by which of the
following people?

1. Production control clerk


2. Response team
3. Technical manager
4. Upper management

41
ASSIGNMENT 5
Textbook Assignment: “AIS Security (continued),” chapter 4, pages 4-26
through 4-40; “General Security,” chapter 5, pages 5-1
through 5-13.

5-1. The AIS technical manager 5-4. Backup operations may take
can develop measures to use place onsite under which of
in case of emergency by the following conditions?
reviewing operations and
records with which of the 1. A partial loss of
following personnel? capability
2. Major damage only
1. Production control clerk 3. Major destruction only
2. Response team members 4. Major damaqe and
3. Shift leaders destruction
4. Users
5-5. For the purpose of making
5-2. All personnel should be backup resources available,
instructed to take which of which of the following tasks
the following security can be set aside?
measures if an evacuation of
work areas is ordered? 1. Short-term planning
2. Program development
1. Secure classified 3. Weekly processing
material in desks or 4. Backup processing
file cabinets
2. Turn equipment and room 5-6. When backup alternatives are
lights off considered, which of the
3. Close the doors as areas following substitute
are evacuated but leave procedures may be
the doors unlocked implemented during an
4. Power up the emergency?
air-conditioning
equipment 1. A hard disk input could
be used for a failed
5-3. To ensure that all safety telephone input
requirements of the AIS 2. Online processing could
facility are satisfied, the be substituted for batch
AIS technical manager and processing
the operations division 3. Print tapes could be
officer should review carried to a backup
the protective plans with facility for offline
what frequency? printing
4. Both 2 and 3 above
1. Monthly
2. Quarterly
3. Semiannually
4. Annually

42
5-7. To evaluate alternate backup
modes and offsite A. Administrative information
facilities, you should B. Computer system
consider all but which of specifications
the following factors? C. Performance specifications
D. User instructions
1. AIS hardware usage
2. Maintenance personnel
for your AIS building
3. Overtime cost factor for Figure 5A
civil service personnel
4. Transportation of IN ANSWERING QUESTIONS 5-10 THROUGH
personnel with needed 5-12, SELECT FROM FIGURE 5A THE
supplies and materials AREA OF THE COOP BACKUP PLAN
DESCRIBED.
5-8. When developing the optimum
backup plan, it is wise to 5-10. The specific ways in which
form several backup plans, performance of each task
one of which has which of departs from normal is
the following charac- stated.
teristics?
1. A
1. Extends beyond the cause 2. B
of delay 3. C
2. Includes each minor 4. D
partial failure
3. Lasts at least half the 5-11. Input in different forms may
time required to be required.
reconstruct the facility
4. Includes one or more 1. A
operating periods 2. B
between minimum duration 3. C
and worst case 4. D

5-9. Each COOP backup plan should 5-12. The location of the system
cover a total of how many is given.
basic areas?
1. A
1. Five 2. B
2. Six 3. C
3. Three 4. D
4. Four
5-13. The process of recovery will
be carried out more
effectively and economically
if handled by which of the
following personnel?

1. The users only


2. The AIS staff only
3. The users and AIS staff
4. Personnel other than the
AIS staff

43
5-14. Before recovery from total 5-17. The characteristic of an
destruction is achieved, all inspection being independent
but which of the following and objective implies that
tasks must be completed? the inspection has which of
the following relationships
1. Locating floor space for to management?
the AIS facility without
regard for live load 1. Replaces normal
capacity management inspections
2. Verifying all needed 2. Is a part of normal
hardware, equipment, and management visibility
materials 3. Complements normal
3. Performing facility management inspections
modifications 4. Is a substitute for the
4. Procuring hardware management reporting,
system
5-15. For COOP testing, a team
should be assembled to 5-18. An inspection can be
perform all except which of expected to accomplish which
the following tasks? of the following tasks?
1. Prepare a scenario for 1. Evaluate security
the test controls for the AIS
2. Control and observe the facility
test 2. Provide users an
3. Evaluate the test opportunity to maintain
results the AIS security program
4. Provide training 3. Provide the impetus to
keep workers and
5-16. Which of the following is a management complacent
standard for an AIS facility 4. Uncover adequate
inspection? operational areas
1. It should be dependent 5-19. In determining the frequency
and subjective of internal inspections, the
2. It should examine the AIS technical manager should
information system and consider which of the
its use followinq factors?
3. It should ignore
adequacy controls 1. Operation workload
4. It should be the first 2. The rate of change of
element in a physical the AIS
security program 3. The SOPS of the AIS
staff
4. The results of the last
inspection only

44
5-20. What is the role of the 5-24. The group of people who have
inspection team? the most to gain from an
effective inspection are the
1. To develop security
controls 1. members of the
2. To evaluate established inspection team
controls 2. members of the security
3. To enforce control force
procedures 3. programmers in the
4. To develop security facility
procedures 4. users of the facility
5-21. Which of the following 5-25. Which of the following is a
characteristics of the characteristic of a
inspection board members comprehensive inspection
will NOT affect the success plan?
of the inspection?
1. It is action-oriented
1. Ability 2. It lists actions to be
2. Objectivity bypassed
3. Probing nature 3. It is tailored for
4. Punctuality universal installation
4. It allows freedom in the
5-22. Which of the following is report design
NOT an important character-
istic for the inspection 5-26. In developing a
board members? comprehensive inspection
plan, what is the third
1. Ability to enforce step?
controls
2. Attention to detail 1. Review the risk analysis
3. Inquisitiveness plan
4. Probing nature 2. Examine the security
policy and extract
5-23. Which of the following types pertinent objectives
of expertise is helpful for 3. Examine the AIS facility
a member of the inspection organization chart and
team? job descriptions
4. Review documents to
1. Operations experience determine the specified
only security operating
2. Security experience only procedures
3. Security experience and
programming knowledge
4. Operations experience
and programming
knowledge

45
5-27. When formulating the 5-31. A surprise inspection should
inspection program, which of be approved by which of the
the following areas is the following personnel?
most important to consider?
1. The facility security
1. The most recent security officer
breach without regard 2. The AIS technical
for security priorities manager
2. The activities that 3. The commanding officer
produce minimum results of the command in charge
with the most effort of the AIS facility
3. The critical issues with 4. The commanding officer
regard to security of the user command
4. The measures that are
tested most frequently 5-32. In conducting a scheduled
in day-to-day operations inspection, which of the
following is normally the
5-28. It is considered first step?
advantageous to test fire
detection sensors under 1. Interviewing the AIS
surprise conditions for personnel
which of the following 2. Scrutinizing the AIS
reasons? facility records
3. Inventorying the AIS
1. To test the response to hardware capabilities of
alarms the facility
2. To test the reaction of 4. Testing the AIS facility
the fire party access control
3. To test the procedures
effectiveness of
evacuation plans 5-33. Most security inspections
4. Each of the above include testing which of the
following activities at AIS
5-29. Why should the review of facilities?
previous inspection reports
be part of the process of 1. Fire-fighting procedures
developing an inspection 2. Facility evacuation
plan? 3. System backup
4. Personnel placement
1. To show trends procedures
2. To identify weaknesses
that should have been 5-34. What is the preferred
corrected frequency at which the
3. To identify strengths inspection team should
that were identified convene to review progress
4. To identify previous and compare notes?
team members
1. At the end of each day’s
5-30. With what frequency should a activity
scheduled inspection take 2. At the end of each
place? week’s activities
3. Every 2 weeks
1. Monthly 4. Every 3 weeks
2. Quarterly
3. Semiannually
4. Annually

46
5-35. After the completion of the 5-38. For any control item that is
inspection, when should the still open, it is
written report be prepared? recommended that reports be
turned in to upper
1. When requested by the management with what
supervisor of the AIS frequency?
facility being inspected
2. When requested by the 1. Weekly
commanding officer of 2. Monthly
the AIS facility being 3. Quarterly
inspected 4. Semiannually
3. Immediately after the
inspection, while the 5-39. DELETED
impressions are still
fresh
4. After an extended period
of time to allow the
inspection team members
to reflect on the
inspection process

5-36. Who is responsible for


implementing the
recommendations received
from the inspection? 5-40. Which of the following
subsections of the Privacy
1. The AIS technical Act (title 5, section 552a)
manager requires the use
2. The security officer of safeguards to ensure the
3. The commanding officer confidentiality and security
4. The TYCOM of records?
5-37. The best approach in 1. Subsection (b)
assigning responsibilities 2. Subsection (c)
for corrective action is to 3. Subsection (e) (5)
summarize each major 4. Subsection (e) (10)
deficiency on a control
sheet outlining which of the
following areas?

1. An executive summary
2. The action taken or
required
3. The date the deficiency
was discovered
4. The reporting official

47
5-41. A personal data security 5-44. When security measures to
risk assessment benefits a adequately control system
command in all but which of access to personal data are
the following ways? developed, they should
include protection from all
1. It saves money that except which of the
might have been wasted following risks?
on safeguards that do
not significantly lower 1. Dial-in access
the overall data risks 2. Open system access
2. It ensures that 3. Physical destruction of
additional security the AIS
safeguards help to 4. Unprotected files and
counter all the serious theft of data
personal data security
risks 5-45. Commands designing large
3. It provides a basis for computer networks should
deciding whether consider which of the
additional security following risks early in the
safeguards are needed planning stages?
for personal data
4. It considers only the 1. Eavesdropping only
risks to personal data 2. Misidentified access and
eavesdropping only
5-42 . Which of the following 3. Operating system flaws
participants should NOT be and subverting programs
included on the risk only
assessment team? 4. Misidentified access,
eavesdropping, operating
1. A representative of the systems flaws,
operating facility subverting programs, and
2. An individual spoofing
responsible for security
3. A system programmer 5-46. Information management
4. A systems analyst practices include all but
which of the following
5-43. Data may be misrouted, mis- activities?
labeled, or it may contain
unexpected personal 1. Data collection,
information as a result of validation, and
which of the following data transformation
security risks? 2. Information processing
or handling
1. Input errors 3. Information control,
2. Program errors display, and
3. Improper data presentation
dissemination 4. Managerial determination
4. Mistaken processing of of the need and use of
data the information

48
5-47. Which of the following 5-50. Which of the following
practices is/are suggested pieces of equipment might be
for the handling of personal considered a TEMPEST hazard?
data?
1. Personal computer
1. Label recording media 2. Electric typewriter
that contain data of 3. Both 1 and 2 above
local personnel only 4. A copying machine
2. Carefully control
products of intermediate 5-51. The vulnerability of a ship
processing steps or aircraft can be
3. Maintain an online, determined by which of the
up-to-date hardcopy following means?
authorization list of
all individuals who have 1. A TEMPEST survey
access to any data 2. A TEMPEST vulnerability
4. Both 2 and 3 above assessment
3. A TEMPEST investigation
5-48. Which of the following 4. An emission control test
practices is/are suggested
for the maintenance of 5-52. What is the purpose of
personal records? EMCON?
1. Establish procedures for 1. To intercept and
maintaining correct, rebroadcast signals to
current accounting of confuse hostile forces
all new personal data 2. To prevent hostile
brought into the forces from detecting,
computer facility identifying, and
2. Maintain logbooks for locating friendly forces
terminals that are used 3. To minimize the amount
to access any data by of transmission time on
system users live circuits
3. Both 1 and 2 above 4. Both 2 and 3 above
4. Log each transfer of
storage media containing 5-53. What is the designation of
data to the computer
. security spaces requiring
facility access control?
5-49. For a broader knowledge of 1. Controlled area
personal identification and 2. Exclusion area
identification techniques, 3. Restricted area
you should refer to which of 4. Limited area
the FIPS publications?
5-54. Which of the following
1. FIPS PUB 31 information should appear in
2. FIPS PUB 48 a visitors log for a
3. FIPS PUB 79 communications center?
4. FIPS PUB 114
1. Visitor’s printed name
and signature
2. Purpose of visit and the
escort’s name
3. Date and time of visit
4. Each of the above

49
5-55. The combination to a 5-58. Which of the following
classified material conditions for protecting
container must be changed at classified material after
what maximum interval? workinq hours is NOT in
accordance with security
1. Monthly instructions?
2. Every 6 months
3. Every 12 months 1. Classified documents are
4. Every 24 months in locked authorized
containers
5-56. Which of the following 2. Classified notes, carbon
statements concerning the paper, typewriter
security classification of a ribbons, and rough
safe combination is correct? drafts have been
destroyed or are in
1. All combinations are locked authorized
classified Secret containers
regardless of the 3. The contents of
classification of wastebaskets containing
contents stored within classified material were
2. All combinations are not burned, but are in
classified Confidential locked authorized
regardless of the containers
classification of 4. Burn bags, ready for
contents stored within burning the next day,
3. All combinations are are securely stapled,
handled as official numbered, and neatly
information lined up along the
4. Combinations are bulkhead
assigned a security
classification equal to 5-59. What is the minimum number
the highest category of of times the dial of a
classified material security container must be
stored rotated in the same
direction to ensure it is
5-57. An individual who is locked?
responsible for safeguarding
.
and accounting for 1. Five
classified material is known 2. Two
by what term? 3. Three
4. Four
1. Custodian
2. User
3. Keeper
4. Guardian

50
5-60. During routine destruction 5-64. Records of destruction of
of classified material, what classified material must be
is the ultimate goal of the maintained for what minimum
destruction? length of time?
1. To clear files of old 1. 1 yr
material so there is 2. 2 yr
more room for new 3. 6 mo
material 4. 18 mo
2. To make reconstruction
of the material 5-65. HOW are burn bags accounted
impossible for prior to burning?
3. To prevent unauthorized
reproduction 1. Bags are placed in a
4. To destroy the material secure place and
as quickly as possible inventoried daily
2. Each bag must be
5-61. What is the most efficient serially numbered and a
means of destroying record kept of all
classified material? subsequent handling
until destroyed
1. Burning 3. Each office is
2. Shredding responsible for its burn
3. Jettisoning bag until the day of
4. Pulping destruction
4. On the day of
5-62. Persons witnessing destruction, each bag is
destruction of classified serially numbered
material must have a
security clearance of at 5-66. What is the maximum
least what level? allowable size of material
shredded by a crosscut
1. Confidential shredding machine?
2. Secret
3. Top Secret 1. 1/32 inch wide by 1 inch
4. The level of the long
material being destroyed 2. 1/32 inch wide by 1/2
inch long
5-63. When is a record of 3. 3/64 inch wide by 1/2
destruction required for inch long
Secret messages? 4. 3/64 inch wide by 1 inch
long
1. If only one person
performs destruction 5-67. If classified material must
2. If the messages have be jettisoned during
special markings emergency destruction, what
3. If the messages have to should be the minimum depth
be jettisoned of the water?
4. During routine
destruction 1. 500 fathoms
2. 700 fathoms
3. 1,000 fathoms
4. 5,000 fathoms

51
5-68. Which of the following areas 5-71. In addition to having an
must be covered in a emergency destruction plan,
command’s emergency action all commands are required to
plan? have what other type of
emergency plan?
1. Enemy actions
2. Civil disturbances 1. Fire
3. Natural disasters 2. Evacuation
4. Each of the above 3. Security force
4. Watch security
5-69. When a command implements
its emergency plan, the 5-72. Which of the following
priority of destruction material should NOT be
should be based on what destroyed during a
factor? precautionary destruction?

1. The speed at which the 1. Material of a historical


material can be nature
destroyed 2. Material that has been
2. The amount of material superseded
that can be destroyed in 3. Material essential to
the least amount of time communications
3. The potential effect on 4. Material that is
national security should unneeded
the material fall into
hostile hands 5-73. What should be done with
4. The number of personnel superseded classified
required for destruction material?

5-70. When an emergency plan is 1. Retain indefinitely


implemented, which of the 2. Retain for two years,
following material should be then destroy
destroyed first? 3. Retain for one month,
then destroy
1. SPECAT material 4. Destroy in accordance
2. Special access material with its prescribed time
3. COMSEC material frame
4. PERSONAL FOR material

52

You might also like