COMSEC ACCOUNTS Presented by: Steven R. Meaux COMSEC Custodian Raytheon Company, Garland TX 19-20 April 2006.

Slides:



Advertisements
Similar presentations
MAIN COMMITTEE OFFICERS DUTIES AND RESPONSIBILITIES.
Advertisements

Classified Contract Close-out By Jane Dinkel Security Manager LMMFC.
It the responsibility of the executive head of your state agency to maintain the property records of those assets under the control of the agency. This.
Property Custodian Meeting
CRYPTO Users Briefing.
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
ATC Conference Call January 10, 2008 Thank you for joining the call. We will start the call shortly. Please enter * 6 to mute your line and # 6 to unmute.
Introduction and Overview.   PowerPoint  Civil Service chapter 10 rules  Planning and evaluation form  Performance notes  Request for review Handouts.
Environmental Management System (EMS)
Planning for Certification in Plan your project In this presentation we present the tasks that must be completed in order to achieve certification.
Industrial Security 2010 Worldwide Security Conference.
What’s the path to a SSP? Information System Profile Contractor: Lockheed Martin, Missiles and Fire Control Address: 1701 W. Marshall Dr. Grand Prairie,
A Blueprint For Clinical Research: Standard Operating Procedures
ORGANIZATION. 2 Purchasing & Inventory Assessment Occurrence Management Information Management Process Improvement Customer Service Facilities & Safety.
U.S. Department of Veterans Affairs Veterans Health Administration Supportive Services for Veteran Families (SSVF) Program SSVF Grantee Uniform Monitoring.
1 Topic# 1 – Engagement Acceptance Readings, pages Procedures to be followed in accepting a new client: A.Communication with predecessor auditor.
Cleveland School District Gerald Finley, Property Manager Friday, July 27, 2012.
COMSEC (Communications Security)
Audits: How to Prepare and What to Expect Council of Senior Business Administrators Focus Session April 21, 2004 James Laird Assistant Dean for Finance.
Contractor Management and ISO 14001:2004
Information Systems Security Officer
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
Chapter 11: Follow-up Reviews and Audit Evaluation ACCT620 Internal Auditing Otto Chang Professor of Accounting.
What Is It And How Will We Measure It?
RJC Certification - (COP 9) Bribery and Facilitation Payments Training Module – March 2014.
State School Aid Act, Section 107, Adult Education
CASCOM -TRAINING DIRECTORATE QUARTERMASTER TRAINING DIVISION
Unclassified Controlled Cryptographic Item Access Briefing
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
Property Custodian Meeting July 10, Review of USM Internal Auditor Findings  Excerpt from the USM Internal Auditors report dated May 31, 2012:
Presented by: Insert Name Safety Management Consultant
1 NC WISE Parent Assistant A user-friendly web application to help parents track their children’s progress in school.
ISP Preparation Series 1 – Chapter 6. NISPOM Chapter 6 – Visits & Meetings Section 1: Visits General (6-100)  When it is anticipated that classified.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
Accounting & Purchasing Services’ Customer Advisory Group First Meeting – Welcome Annual Physical Inventory Training.
Safety Orientation for New Employees Christine Inman Norris USCA Health and Safety Manager.
Monitoring & Oversight Adult Education and Literacy (AEL) Programs Brenda B. Williams Project Manager Texas Workforce Commission Regulatory Integrity Division.
Section Five: Security Inspections and Reviews Note: All classified markings contained within this presentation are for training purposes only.
ISP Preparation Series 1- Chapter 3. CHAPTER 3: SECURITY TRAINING AND BRIEFING SECTION 1: SECURITY TRAINING General (3-100) - Provide all with training.
Chapter 10 – Cash Control and Banking
Mobile Audio/Video Recording Equipment Policy and Procedure Number PP
Health and Safety Policy
THE NUTS AND BOLTS OF ADVISORY COMMITTEES Development of Work-Based Learning Programs Unit 6-- Developing and Maintaining Community and Business Partnerships.
Making every vote count. United States Election Assistance Commission EAC Voting System Certification TGDC Meeting December 9-10, 2009.
Off Site Working Review SHRUG – 24 September 2008 John Luke.
720th Military Police Battalion Gauntlet 401ST MILITARY POLICE COMPANY Property Accountability 1LT Alexis Marks.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
Presented by Madeline Neumann National Chapter Coordinator.
1 Banking and Reconciliation. 2 To Certify As A Cash Handler  Visit the training website  Review the Payment Card Industry (PCI)
Managing a “Data Spill”
Data Coordinators Conference – 2014 Laura Marroquin CASEWORKER/JCMS Specialist Everything New Data Coordinators Should Know.
Paper-Based Test Security Training for Schools. Agenda Welcome Communication and Support Policy and Key Terms Scheduling Monitoring Preventing Plagiarism.
P1 Document Control and Various Documents. P2 Learning Objectives What are documents and records? Documents Why are they important? What documents should.
Paper-Based Test Security Training for Districts.
Child Support Director’s Association 2007 Training Conference Administrative Audits Presentation #107 September 18, 2007.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
SAFEGUARDING CLASSIFIED INFORMATION.
Presented by: Sharon Pender Louisiana State PTA Treasurer.
ITIL Project Change Management Workshop 7 February 2007
Education and Training Centre for Children - Need for Minimum Standards.
Property Custodian Meeting December, Review of USM Internal Auditor Findings  Capital and sensitive equipment inventory was not properly tracked.
Department of Child Support Services OFFICE OF AUDITS AND COMPLIANCE.
Managing a Security Container
TIMELINE FOR ORGANIZEING A CONFERENCE
MANUALS READ THE MANUALS!!
Training for New District Test Coordinators
INDIVIDUAL RESPONSIBILITY FOR THE CONTROL AND SAFEGUARDING OF A&E
Internal Controls.
Internal Controls.
Internal Controls.
Presentation transcript:

COMSEC ACCOUNTS Presented by: Steven R. Meaux COMSEC Custodian Raytheon Company, Garland TX 19-20 April 2006

AGENDA: Type of COMSEC Account NSA Visits (Audits) DD Form 254 Requesting a COMSEC Account Nominating COMSEC Custodian Custodial Training Inventory Management DIAS 6.4 NSA Visits (Audits) Standard Operating Procedure COMSEC EAP

(This briefing void where prohibited by law.) DISCLAIMER: Does not, in any way, shape or form, serve as formal certification for COMSEC Custodians. You MUST still attend the IAEC-2112 Custodial Training Course. (This briefing void where prohibited by law.)

APPLICABLE DOCUMENTATION NSA/CSS POLICY MANUAL 3-16, August 2005 (Control of Communications Security (COMSEC) Material NISPOM, February 28, 2006 (Chapter 9, Section 4, Communications Security (COMSEC) DIAS, Version 6.4

Types of COMSEC Accounts Traditional Account Seed Key-Only COMSEC Account (SOCA) (aka STU-III-Only COMSEC Account)

TRADITIONAL ACCOUNTS: Contractor facility that is required to hold and/or produce classified COMSEC material accountable within the CMCS. Usually bigger accounts Inventory contains various CCI equipment AN/CYZ-10, KG-194, KG-235, KG-75-KG-84, KGV-66, KIV-19, KIV-7, KOI-18, KOV-14, STU-III, USKAT-???, USKAU-123, USFZU-456, ETC, ETC, ETC.

SOCA ACCOUNTS: Contractor facility holds only CCI products and unclassified KSD-64A, that after key conversion, becomes an unclassified crypto-ignition key (CIK). Usually at smaller facility Inventory only contains STU-IIIs and Key

DD Form 254: Must require COMSEC Account. Item 11h must be marked “YES”. Usually an “Auditable Item”.

COMSEC CUSTODIAN: FSO nominates a COMSEC Custodian. Nomination submitted to NSA/COR Must satisfy PCL requirements of NISPOM Final Secret or Top Secret Clearance Nominated individual must meet criteria outlined in section 15 of NSA/CSS 3-16 Written approval received from NSA/COR

Custodian (Con’t) Individual selected: Responsible to assume duties and responsibilities of a COMSEC Custodian. In a position of authority which will permit them to exercise proper jurisdiction in fulfilling their responsibilities. Have not been previously relieved of COMSEC duties. In a position which will permit tenure as a COMSEC Custodian. Will not be assigned duties that will interfere with their COMSEC duties. Are actually performing the custodial function on a day-to-day basis.

"When that lawn mower cuts off your toes, don't come running to me." .My Mother taught me HUMOR. "When that lawn mower cuts off your toes, don't come running to me."

CUSTODIAN TRAINING: Attend IAEC-2112 Training within 6-months of appointment. Register on-line at: www.ccmit.org

32nd Annual COMSEC Managers' Conference Location: Disney's Coronado Springs Resort. Orlando, FL Hotel: Disney Coronado Springs Resort - Florida Conference Dates: August 21 - 24, 2006 Conference Fee: Free

2005 COMSEC MGR’S CONFERENCE August 21-24, 2005 LOOK WHAT HAPPENED!!

INVENTORY MANAGEMENT: Distributed INFOSEC Accounting System (DIAS). Very user friendly (Version 6.4) Efficient management of COMSEC inventory. Prepares forms and reports. Software provided at “No Cost” by NSA. Locally developed software approved by NSA. Manual Records not routinely approved.

My Mother taught me about TIME TRAVEL.. "If you don't straighten up, I'm going to knock you into the middle of next week!"

STAFF ASSISTANCE VISITS

SAV (Con’t) Should have following available for review: Appointment Letters FSO Custodian and Alternate Custodian Background Investigations Review COMSEC & Crypto Access Briefings

SAV (Con’t) Review COMSEC SOP, EAP & STU-III Guide Review SF-153s Review local & remote Hand Receipts Review Protective Technology Procedures Conduct 100 percent sighting of inventory

Standard Operating Procedure SOP should include: How you control COMSEC material at the local level. Local responsibilities. FSO Custodian Alternate Custodian Users

SOP (Con’t) Required Briefings Account Management Software COMSEC Crypto Account Management Software DIAS Locally developed (Approved by NSA) Applicable References Anything you deem applicable to your SOP.

Emergency Action Plan (EAP) EAP should include: Procedure for receiving first responders (police, fire fighters, paramedics & HAZMAT crews. Fire reporting & initial fire fighting. On-the-scene responsibilities. Securing or removing classified COMSEC. Protection of materials from responders.

EAP (Con’t) Assessment & reporting of probable exposure. Alternate COMSEC storage locations. Post-emergency inventory. Post-emergency reports to NSA/I5131 (COR) and NSA/1A (Insecurities).

My mother taught me the CIRCLE OF LIFE. "I brought you into this world, and I can take you out." And my favorite: My mother taught me about JUSTICE. "One day you'll have kids, and I hope they turn out just like you.”

THAT CONCLUDES MY BRIEFING . . . ??? ANY QUESTIONS ???