Try to keep transmissions to 15 seconds or less. Longer periods increase the odds an enemy will intercept and
exploit a message.
(2) Poor TRANSEC may make the sending unit an information source for an enemy. The enemy
may not target that unit for destruction until it outlives its usefulness.
(3) Operators must avoid unauthorized discussions and chatter. Trained enemy signal analysts can
exploit them. Topics for operators to avoid include:
(a) Locations and equipment.
(b) Communication problems.
(c) Morale and operations.
c. Cryptosecurity uses approved systems to keep communications secure. Cryptosecurity involves:
(1) Providing technically sound cryptosystems.
(2) Ensuring their proper use.
d. Physical security involves protecting equipment, material, and documents from access or observation
by unauthorized persons. Some possible threats are loss, theft, sabotage, and unauthorized access.
a. COMSEC material is used to protect communications and ensure their authenticity. It has two
(1) COMSEC equipment refers to all COMSEC hardware. This includes equipment end items,
components, and repair parts.
(2) COMSEC key and publications include COMSEC material, except equipment, that performs or
helps perform cryptographic functions. Examples are forms of COMSEC keying material, call frequency
systems, and COMSEC publications.
b. The following help to identify COMSEC material:
(1) The Army Master Data File (AMDF) lists catalog data for all equipment.
(2) The COMSEC Material Management Data Catalog lists catalog data for all COMSEC material.
It is referred to as the ARKAG 2.
(3) Critical data elements help to identify COMSEC items.