The form used for destruction, receipt, transfer, etc.
What is an SF-153.
In charge of management, security, and accountability for COMSEC material.
What is an LE?
A security occurrence involving individuals with access to COMSEC material that potentially jeopardizes its security.
What is Personnel Incidents?
The authorized erasure of electronically stored cryptographic keying material
what is Zeroization?
This physical material handling segment (PHMS) for the DoN; CMIO receives, stores, and ships COMSEC equipment to meet DoN requirements.
COMSEC Material Issuing Office. (CMIO)
The form used for Security Container Information, to record and store details or comnbinations for security containers.
What is an SF-700?
Someone who ensures compliance with security policies, manages Sensitive Compartmented Information Facilities (SCIFs), and oversees personnel clearances.
What is SSO?
The loss or compromise of hard drives, combinations, and classified COMSEC material.
What is Physical Security?
Reducing documents/printed materials to a soft, wet mass, making the information unrecoverable.
What is Pulping?
the formal process of verifying that all pages in a COMSEC publication/manual are accounted for.
What is a Page check?
The Activity Security Checklist is a form used to record daily end-of-day security checks.
What is an SF-701?
A security system requiring at least two authorized individuals to be present when handling COMSEC Material.
What is TPI?
Ex. Use of COMSEC equipment or devices not approved by NSA or with defective cryptographic logic.
What is Cryptographic Indecent?
A machine designed to permanently erase data from magnetic storage media, such as hard disk drives.
What is a degausser?
A time when a particular item of COMSEC material is no longer eligible for use. COMSEC material is superseded in one of three ways: regular, irregular, and emergency.
What is supersession?
The Security Container Checksheet is a form used to record the opening, closing. and security checks of a container.
What is an SF-702?
A formal, authorized list of personnel who have the required security clearance, formal training, and "need-to-know" to access, handle, and manage COMSEC Material.
What is an Access List?
These are actions that do not necessarily make a formal, reportable COMSEC incident BUT have the potential to jeopardize security of COMSEC. Typically divided into two categories.
What is Practices Dangerous to Security? (PDS)
The destruction of non-essential classified material in anticipation of a potential threat.
What is Precautionary Destruction?
An identifying combination of letters and numbers assigned to specific COMSEC materials, such as cryptographic keys, devices, etc.
What is a Short Title?
The Cryptographic Access and Termination form is used to authorize, certify, and terminate an individuals access to classified cryptographic information.
What is an SD-572?
What remains after COMSEC material is burned, shredded, or otherwise destroyed.
What is Residue?
Reviews the details of incidents reported to determine if additional reporting is required and if compromise as occured.
What is an EVALAUTH? (Evaluating Authority)
The meticulous, chronological documentation tracking the lifecycle of sensitive cryptographic materials, keys, devices, and documentation.
What is Chain of Custody?
2 AL Codes that are assigned to electronically generated keys.
What is AL Codes 6 and 7.