o
Superseded, current, and future rotors and cribs.
o
Top secret multiholder key effective within 30 days.
o
Superseded tactical operations codes.
o
Secret and confidential multiholder key effective within 30 days.
o
o
Classified elements or subassemblies of cryptosystems.
o
o
Remaining classified COMSEC material.
Emergency destruction is accomplished by any means which result in the least
likelihood of unauthorized recovery.
Commanders must be aware of all
factors concerned prior to implementing emergency plans for evacuation
and/or destruction.
Replacement of COMSEC material after a crisis is
after a compromise.
Learning Event 2:
IDENTIFY MEASURES TO PROTECT TRANSMISSIONS.
1.
all measures designed to protect transmissions.
The goal of transmission
security is to protect all transmissions from interception, traffic
analysis, and imitative deception.
security is critical in denying the enemy access to information.
2.
Many areas must be supervised to attain an effective level of
transmission security.
Poor message preparation, improper classification,
the command to change call signs and frequencies, and excessive use of one
poor transmission security by operators, and a monumental problem exists.
3.
As a supervisor, your responsibility lies in the performance of your
operators. To maintain an acceptable level of transmission security, each
operator must continually practice transmission security measures. This is
frequently used communications in military units.
Consequently, effective
4.
Transmission security begins on a radio net with the use of assigned
call signs and frequencies. Call signs are changed daily or as necessary.
Their purpose is to deny the enemy information regarding identification and
disposition of tactical units. Call sign suffixes are used in conjunction
with the call sign to identify the specific user of the call sign. Station
and net operations are checked to ensure that call signs are not associated
with unit designations.
16