Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
COMMAND & CONTROL
SYSTEMS ORGANIZATION
DRAFT
15 March 1985
CHOSUN NETWORK SECURITY MANUAL (U)
CLASS. BY:
DCA 184WO0224
DECLASSIFY ON: OADR
REQUESTS FOR THIS DOCUMENT
MUST BE REFERRED TO:
DRAFT
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
COMMAND & CONTROL
SYSTEMS ORGANIZATION
SECRET
DRAFT
15 March 1985
CHOSUN NETWORK SECURITY MANUAL (U)
CLASS. BY:
DCA 184WO0224
DECLASSIFY ON: OADR
REQUESTS FOR THIS DOCUMENT
MUST BE REFERRED TO:
DRAFT
SECRET
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
Section
Page
1.
INTRODUCTION ........................................
1-1
1.1
General ...........................................
1-1
1.2
Purpose.. .... .................................
1-1
1.3
Applicability and Scope ...........................
1-1
1.4
Authority .........................................
1-2
1.5
Amendments ........................................
1-2
1.6
Reproduction.. ..................................
1-2
1.7
Definition of Terms ...............................
1-2
1.8
References ........................................
1-2
2.
STATEMENT OF POLICY .................................
2-1
2.1
General .... .. .. .. .... . .... .............
2-1
2.2
Appointment of the Designated Approving
Authority.. ...................................
2-1
2.3
Network Operation.................... ............
2-1
2.4
Network Security Organization and Structure.......
2-1
2.5
Dissemination of Project CHOSUN Information.......
2-2
2.6
Multiple Safeguards ...............................
2-2
2.7
Continuous Evaluation .............................
2-3
2.8
Mode of Operations ................................
2-3
2.9
Summary of Security Requirements ..................
2-3
3.
CHOSUN NETWORK SECURITY ELEMENTS/RESPONSIBILITIES...
3-1
3.1
General ... .... ... .. .. .... ....
3-1
3.2
Designated Approving Authority Responsibilities...
3-1
3.3
Network Certification Working Group
Responsibilities ............ .............
3-3
3.4
Network Security Officer Responsibilities.........
3-5
3.5
Hub Security Elements ...... .... ...........
3-6
3.5.1
Hub Information System Security Officer
Responsibilities .............................
3-6
3.5.2
System Control Operator Responsibilities........
3-7
3.5.3
Network Control Operator Responsibilities .......
3-7
3.5.4
Central Technical Control Operator
Responsibilities ..............................
3-8
3.6
Node Security Elements.... ... . ..........
3-8
3.6.1
Node Information System Security Officer
Responsibilities .......... ......... ......
3-8
3.6.2
Technical Control Operator Responsibilities.....
3-9
3.7
Program Management Responsibilities ...............
3-10
3.8
User Responsibilities .............................
3-10
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
Section
Page
4.
CHOSUN NETWORK CERTIFICATION AND ACCREDITATION......
4-1
4.1
Objectives and Scope.... .... . .... .........
4-1
4.2
Steps in CHOSUN Certification and Accreditation...
4-1
4.3
Hardware/Software Certification ...................
4-3
4.4
Node Certification ................................
4-4
4.5
Node Accreditation ................................
4-4
4.6
Hub Certification .................................
4-5
4.7
Hub Accreditation.... .......................
4-5
4.8
CHOSUN Network Certification ......................
4-5
4.9
CHOSUN Network Accreditation... .................
4-6
4.10
Schedule for Recertification and
Reaccreditation.................................
4-6
4.11
Revoking Accreditation ............................
4-7
5.
PERSONNEL SECURITY ..................................
5-1
5.1
General .. ...........................
5-1
5.2
Personnel Identification ..........................
5-1
5.3
Access Authorization Process ......................
5-1
5.4
Access Requests ...................................
5-2
5.5
Clearance .........................................
5-3
5.5.1
Exceptions ........ ............................
5-4
5.5.2
Investigative Requirements ......................
5-4
5.5.2.1
Minimum Standards ..........................
5-4
5.5.2.2
Investigative Exceptions ...... ............
5-7
5.5.2.3
Special Investigative Requirement .............
5-7
5.5.2.4
Approved Investigative Agencies ...............
5-7
5.6
Security Indoctrination ...........................
5-7
5.7
Continuing Security Programs.. ..................
5-8
5.8
Access Termination and Debriefing .................
5-10
6.
PHYSICAL SECURITY ...................................
6-1
6.1
General .. .....................................
6-1
6.2
Structural Barriers ............................
6-1
6.3
Intrusion Detection Systems .......................
6-2
6.3.1
Perimeter Intrusion Detection ..................
6-2
6.3.2
Monitoring and Alarm Response ...................
6-2
6.3.3
Emergency Conditions ............................
6-3
6.4
Access Control ....................................
6-3
6.4.1
Access Roster........... .......................
6-3
6.4.1.1
Access by Uncleared Service Personnel .........
6-4
6.4.1.2
Access by Emergency Personnel .................
6-4
6.4.2
Intra-Agency Access .............................
6-4
6.4.3
Inter-Agency Access ... .......................
6-4
6.4.4
Non-Approved Personnel Access ...................
6-4
UNCLd'SSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172ROO0400050018-5
UNCLASSIFIED
Section
Page
6.4.5
Badges ................ .... ..........
6-5
6.5
Equipment Delivery ................................
6-6
7.
INFORMATION SECURITY.. .....................
7-1
7.1
Marking (General Provisions) ......................
7-1
7.1.1
Original Classification .........................
7-1
7.1.2
Derivative Classification... ... ...........
7-2
7.1.3
Identification of Classification Authority......
7-2
7.1.4
Declassification and Regrading Procedures .......
7-3
7.1.5
Applying Derivation Declassification Dates ......
7-3
7.1.6
Upgrading.......................................
7-4
7.1.7
Dissemination and Reproduction Notice...........
7-4
7.2
Marking Documents ...........................
7-4
7.2.1
Overall and Page Marking ........................
7-4
7.2.2
Marking Components ..............................
7-5
7.2.3
Portion Marking .................................
7-5
7.2.4
Compilations ....... . ....... ................
7-6
7.2.5
Subjects and Titles of Documents ................
7-6
7.2.6
File, Folder, or Group of Documents .............
7-6
7.2.7
Transmittal Document .... ................
7-6
7.3
Marking Classified Information Other
Than Documents ............ ...............
7-6
7.3.1
Charts, Maps, and Drawings ...................
7-7
7.3.2
Photographs, Films, and Recordings ..............
7-7
7.3.3
Decks of ADP Punched Cards ....................
7-8
7.3.4
Removable ADP and Word Processing Storage
Media..... ....... .. ... ....................
7-8
7.3.5
Documents Produced by ADP Equipment .............
7-9
7.3.6
Material for Training Purposes ..................
7-9
7.3.7
Miscellaneous Material ..........................
7-9
7.4
Additional Markings ...... ....................
7-10
7.4.1
Wholly UNCLASSIFIED Material ....................
7-10
7.4.2
Restricted Data .................................
7-10
7.4.3
Formerly Restricted Data .......... . ..
7-10
7.4.4
Special Access Program Documents and Material ...
7-10
7.4.5
Intelligence Sources and Methods Information....
7-11
7.4.6
COMSEC Material .................................
7-11
7.4.7
Associated Markings .............................
7-11
7.5
Storage and Safekeeping ...........................
7-11
7.5.1
General .... ............. .................
7-11
7.5.2
Standards for Storage Equipment .................
7-11
7.5.3
Storage of Classified Information ...............
7-12
7.5.4
Designations and Combinations ...................
7-13
7.6
Accountability and Control ... .. ... ... ...
7-14
7.6.1
Procedures for Handling TOP SECRET Information..
7-14
7.6.1.1
Control .......................................
7-14
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172ROO0400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
Section
Page
7.6.1.2
Accountability...... .........................
7-14
7.6.2
Procedures for Handling SECRET Information......
7-15
7.6.3
Procedures for Handling CONFIDENTIAL
Information.. .... ..... ..............
7-15
7.6.4
Procedures for Handling Working Papers..........
7-15
7.6.5 .
Receipt of Classified Material ..................
7-16
7.6.6
Restraint on Reproduction .......................
7-16
8.
ADP SECURITY ........................................
8-1
8.1
General ...........................................
8-1
8.2
Hardware... ........ .. .................
8-1
8.2.1
Design, Development, Installation ...............
8-1
Maintenance, and Modification .................
8-1
8.2.2
Configuration Management ........................
8-1
8.2.3
System Clearing Procedures ......................
8-2
8.3
Software............... ..........................
8-2
8.3.1
System and Application Software Design,
Development, Installation, Maintenance,
and Modification.... ........................
8-2
8.3.2
Configuration Management ........................
8-4
8.4
Audit Trails... . ..... ....................
8-5
8.5
ADP Products and Storage Media ........... .....
8-6
8.5.1
Marking, Storage, and Control/Accountability....
8-6
8.5.1.1
Marking .......................................
8-6
8.5.1.2
Storage..... ........ .....................
8-7
8.5.1.3
Control and Accountability....................
8-9
8.5.2
Erase, Declassification, and Destruction
Procedures ..................................
8-9
8.5.2.1
Erase Procedures.. ... ......................
8-9
8.5.2.2
Declassification Procedures ...................
8-10
8.5.2.3
Destruction Procedures.. .... .............
8-11
8.5.2.4
Disposition/Destruction Approval ..............
8-12
8.6
Access Controls ...................................
8-12
8.6.1
General .........................................
8-12
8.6.2
Changes.. ...................................
8-13
8.7
Security Incidents ................................
8-13
8.8
Contingency Operations Plans ......................
8-13
8.8.1
General .. ..............................
8-13
8.8.2
NISSO/HISSOInvolvement .........................
8-14
9.
COMMUNICATIONS SECURITY, PRIVACY, AND EMANATIONS
SECURITY ..........................................
9-1
9.1
General ...........................................
9-1
9.2
Communications Security ...........................
9-1
9.2.1
Encryption ......................................
9-1
9.2.2
COMSEC Custodian ................................
9-1
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
Page
9.2.3
RED Technical Control Facilities ................
9-1
9.3
Privacy...... . ....... ..................
9-1
9.3.1
Data EncryptionStandard(DES) ..................
9-1
9.3.2
DES Custodian.. ......................
9-2
9.4
Emanations Security (EMSEC) .......................
9-2
9.4.1
Facility Design .................................
9-3
9.4.2
Future Equipment Design, Testing and
tifi
ti
C
9
3
on .................................
er
ca
-
9.4.3
TEMPEST Testing... . .......................
9-3
9.4.4
Protected Distribution System .................
9-4
9.4.5
Acoustics Emanation Protection ..................
9-4
9.4.6
Other Considerations.. ...... ...........
9-4
9.4.6.1
Electromagnetic Interference (EMI) ...........
9-4
9.4.6.2
Electromagnetic Compatibility (EMC) ...........
9-4
9.4.6.3
Personally Owned Electronic Equipment.........
9-4
10.
SECURITY TESTING ....................................
10-1
10.1
General ...........................................
10-1
10.1.1
Purpose.. ...................................
10-1
10.1.2
Responsibility.. ..............................
10-1
10.2
Preplanned System Test ...........................
10-1
10.2.1
Test Scope.. . ............................
10-1
10.2.2
Test Schedule and Frequency .....................
10-2
10.2.3
Resources ... .............................
10-2
10.3
Unannounced Random System Tests ...................
10-3
10.3.1
Test Scope ......................................
10-3
10.3.2
Test Schedule ...................................
10-3
10.3.3
Resources .......................................
10-3
A - Definition of Terms .....................
A-1
.... ..... ... .......
B - Bibliography... ...
B-1
C - CHOSUN Security Classification Guide....
D - Request for Waivers .....................
TBD
D-1
E - ST&E Report Format.. ................
E-1
F - Site Security Checklists ................
F-1
G - Access Nomination Form......... ...
G-1
H - Statement of Work for an RF-Shielded
Enclosure... ........................
H-1
I - Approved Tape Degaussers................
I-1
J - Specifications for Magnetic Tape Erase
Equipment .............................
J-1
K - Approved Disk Pack Degaussers...........
K-1
L - Approved Paper Destruction Devices......
L-1
M - Glossary ................................
M-1
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
Figure
Page
3-1
CHOSUN Network Security Organization..........
3-2
8-1
Safeguard Statement ...........................
8-8
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
SECRET
SECTION 1. INTRODUCTION (U)
1.1 General (U)
(S) The CHOSUN network is designed to improve the nation's crisis
management capability in support of the President. To facilitate
this objective, the CHOSUN network will provide an audio/video
teleconferencing capability that will permit senior officials of
the Executive Branch to communicate freely and candidly during
crisis situations in an environment that approximates face-to-face
meetings.
(S) During crisis situations, the CHOSUN network will communicate
information of a highly sensitive nature from the White House to
participating agencies. In the interest of national security, the
network will provide extraordinary protective features to safeguard
the security and privacy of information communicated and to avoid
proliferation of knowledge about the configuration and capabilities
of the network. Multiple security measures to safeguard information
will include the continuous employment of protective features in the
hardware and software design configuration as well as procedural and
technical controls in the areas of personnel, physical, emanations,
and communications security.
(U) Continuing operation of the CHOSUN network will be contingent
upon the results of a continuing review, test, and favorable evalu-
ation of the security features of the network, including unannounced
evaluations of the security posture of each of the CHOSUN nodes.
(S) The Assistant to the President for National Security Affairs
is the Designated Approving Authority (DAA) for the CHOSUN network,
with sole authority to approve or disapprove the security and
privacy features of the CHOSUN network and accredit the network for
operation with classified information.
1.2 Purpose (U)
(U) This security manual provides the basic policy, criteria, tech-
niques, and procedures to implement, certify, accredit, operate, and
maintain the CHOSUN network.
1.3 Applicability and Scope (U)
(S) This security manual applies to all Executive Branch agencies
which develop, operate, maintain, or use the CHOSUN network. It
also applies to all contractors and/or private individuals who
develop, operate, maintain, or use the CHOSUN network. The provi-
sions of this security manual are binding. Conformance is not
discretionary.
SECRET
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
SECRET
1.4 Authority (U)
(C) This policy is established in accordance with the provisions of
National Security Decision Directive 95, the National Security Act
of 1947, and Executive Order 12356.
1.5 Amendments (U)
(U) All amendments or updates to this security manual will be pub-
lished, as necessary, by the Network Security Officer (NSO) of the
CHOSUN network. Proposed amendments or updates may be forwarded
under agency-head signature to the NSO.
1.6 Reproduction (U)
(S) Reproduction of this manual is not authorized. Additional
copies may be requested from the National Security Council (NSC)
in writing. The request must include the name of the accountable
individual and the full address of the recipient organization.
1.7 Definition of Terms (U)
(U) To avoid misunderstanding due to ambiguity of terms, defini-
tions for selected terms used in this manual are provided in
appendix A.
1.8 References (U).
(U) A list of documents used in the preparation of this manual is
provided as appendix B.
SECRET
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
SECRET
SECTION 2. STATEMENT OF POLICY (U)
2.1 General (U)
(U) The following subsections present specific policy statements
pertaining to all aspects of the CHOSUN network. These policies
establish mandatory requirements designed to ensure the security
of all information transmitted, stored, or processed by the network.
2.2 Appointment of the Designated Approving Authority (U)
(S) The Assistant to the President for National Security Affairs
will be the Designated Approving Authority for the CHOSUN network.
The DAA is responsible for providing official approval for the
initial and continued operation of the CHOSUN network, based on
continuing certification that all elements of the CHOSUN network
meet the mandatory requirements of this security manual. The
responsibilities of the DAA are specified in detail in sec-
tion 3.
2.3 Network Operation (U)
(U) No element of the network (node or hub) will be operational
without certification and accreditation in accordance with the
provisions identified in section 4.
2.4 Network Security Organization and Structure (U)
(S) The Designated Approving Authority will provide for the
appointment of the CHOSUN Network Security Officer to manage the
implementation of security and the testing and evaluation of the
security features of the CHOSUN network. The Network Security
Officer will appoint and chair a Network Certification Working
Group (NCWG), with members from the following agencies:
a.
(U)
National Security Agency.
b.
(U)
Central Intelligence Agency.
c.
(U)
Federal Bureau of Investigation.
d.
(U)
Department of Justice.
e.
(U)
United States Secret Service.
The responsibilities of the NSO are detailed in section 3. Addition-
ally, the organizations operating the hub and each node will nominate
individuals for DAA approval to serve as Information System Security
SECRET
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
SECRET
Officers for their respective sites. The responsibilities of the Hub
Information System Security Officer (HISSO) and the Node Information
System Security Officer (NISSO) are provided in detail in section 3.
2.5 Dissemination of Project CHOSUN Information (U)
(C) Since the CHOSUN network deals with crisis management decision-
making at the national level, the dissemination of information about
the network must be stringently controlled. Accordingly, a Security
Classification Guide has been prepared for Project CHOSUN. A copy of
this guide is provided as appendix C. The information security
requirements for Project CHOSUN are identified in section 7, Informa-
tion Security.
(C) The CHOSUN Security Classification Guide provides basic guidance
for determining (1) the security classification, (2) schedules for
downgrading, or (3) review of downgrading of Project CHOSUN infor-
mation. The guide was formulated to protect from any adversaries
sensitive information regarding the architecture, design, capabi-
lities, and limitations of Project CHOSUN.
(C) Project CHOSUN-related information is the property of the
National Security Council in the Executive Office of the President
of the United States. Any release of this information, either clas-
sified or UNCLASSIFIED, to persons outside of the Executive Branch
must be approved in writing by the NSO. All documents relating to
Project CHOSUN will be marked "Property of the National Security
Council. Written approval required for release."
(C) It must be assumed that hostile intelligence services have knowl-
edge of and will target Project CHOSUN. Therefore, every effort must
be made to protect information about its identity, system configura-
tion, and capabilities. Knowledge about the CHOSUN network must not
be proliferated.
2.6 Multiple Safeguards (U)
(U) The sensitivity of this system requires the application of every
available safeguard to protect against the multidisciplinary hostile
intelligence threat and to ensure the privacy of the officials utiliz-
ing the system. Multiple security measures and procedures will be
used to attain an acceptable level of security. The CHOSUN network
and the information transmitted within the network will be safeguarded
by the continuous employment of protective features in the ADP sys-
tem's hardware and software design and configuration, and by other
appropriate information, physical, personnel, technical, and commu-
nications security controls.
SECRET
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
2.7 Continuous Evaluation (U)
(U) The continued accreditation for the operation of the CHOSUN
network is contingent upon the results of a continuing review and
testing, including unannounced on-site inspections and favorable
evaluation of the security features of the network.
2,8 Mode of Operation (U)
(U) Crisis management decisionmaking at the national level requires
a diversity of information on an ad hoc basis from a variety of infor-
mation sources. The information required ranges from the most highly
classified Sensitive Compartmented Information (SCI) to UNCLASSIFIED
information available from commercial sources, public data bases, and
private individuals.
(U) The CHOSUN network must be capable of processing unclassified
information as well as multiple levels of classified information
within the framework of existing technology without sacrificing the
security protection provided to classified information or restrict
ing the flow of required information.
(C) In the near term, the required security will be achieved by
operating the network, to include the hub switch and all connected
nodes and node components, in the TOP SECRET/SCI system-high mode.
The system-high mode is defined as the utilization of the system
to process SCI information when the total network, to include the
central hub facility, node processors, and connected components,
is secured in accordance with the requirement for TOP SECRET infor-
mation and for all categories of SCI processed, stored, or trans-
mitted therein, and all users with access to the interconnected
network have a valid TOP SECRET clearance and access approvals for
all SCI stored, processed, or transmitted within the network.
(U) The desired long-term operational goal of the CHOSUN network is
to operate in a controlled security mode where at least some users
have neither a security clearance nor a need to know for all levels
of classification and all types of SCI stored, processed, or trans-
mitted within the network. The controlled mode will be achieved
using hardware, software, and/or procedural security measures evalu-
ated by the NCWG and approved by the DAA.
2.9 Summary of Security Requirements (U)
(U) The required security for the CHOSUN network will be provided
by the continuous employment of the following protective features:
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
a. (C) Personnel Security - All U.S. Government employees,
and contractor personnel, terminal operators, test and
maintenance personnel assigned to Project CHOSUN must meet
the requirements set forth in this document. The criteria
and procedures shall be applied equally to all personnel.
In addition, technical operators, U.S. Government and con-
tractor personnel assigned to the CHOSUN hub will submit
to polygraph testing.
b. (U) Physical Security - The physical security and certifi-
cation requirements for a closed storage Sensitive Compart-
mented Information Facility (SCIF) as outlined in NFIB/
NFIC-9.1/47 apply.
c. (U) Emanations Security (TEMPEST) - All equipment/systems
associated with Project CHOSUN will either be installed
within an RF-shielded room or installed in an RF-shielded
cabinet/rack. The enclosures must meet NSA Specification
65-6, as specified and amended by appendix H. The TEMPEST
guidelines for facility design and RED/BLACK installation
outlined in NACSIM 5203 apply to the Project CHOSUN SCIF and
the equipment/systems installed therein. Each Project
CHOSUN SCIF must be certified prior to commencing classified
operations. A request for facility certification using the
format of Annex A of NSA/CSS Manual 90-5 must be completed
by each agency/department and submitted to the NCWG.
d. (C) Communications Security:
(1) (U) Transmission Security - All Project CHOSUN cir-
cuits between the hub and each node shall be protected
by a cryptographic key generator providing traffic
flow security and operating 24 hours per day.
(2) (U) Cryptographic Security - All Project CHOSUN cir-
cuits between the hub and each node shall be protected
by a Class A cryptographic system, specifically, the
KG-81. End-to-end protection of data shall be accom-
plished using an NSA-approved Data Encryption Stan-
dard (DES) system which has been submitted to a
Security Fault Analysis. The KG-81 and DES crypto-
graphic periods shall be daily and per session,
respectively.
(3) (U) Physical Security - The area in which crypto-
graphic equipment is to be installed must meet the
requirements set forth in this document and access
to the area and the equipment must be restricted to
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
those personnel having a need to work. In those
agencies/ departments administering a Cryptograph
Clearance Program, each person requiring such access
must hold a valid cryptographic clearance.
(4) (U) Network Security - All microprocessor-based
telecommunications equipment/systems must be designed
to prevent the spillage of data from one channel to
another.
e. (U) ADP Security:
(1) (U) The hardware and software shall be developed,
tested, and maintained in accordance with the pro-
visions of Transmittal Memorandum No. 1 to 0MB
Circular No. A-71, as implemented in subsequent
sections of this manual.
(2) (U) Hardware and software configuration management
shall be in accordance with a Configuration Manage-
ment Plan approved by the Network Certification
Working Group.
(3) (U) The hardware/software shall provide the following
security features:
(a) (U) The software shall clear user-inserted infor-
mation stored on memory and hard disk and floppy
disk storage at the start and termination of each
conference or period of operation.
(b) (U) All individual users of network services,
programs, or data must be identified and authen-
ticated and their access request must be checked
to ensure that it is authorized prior to estab-
lishing a connection between the user and the
resource.
(c) (U) Each terminal shall be uniquely identified
by the system. The system will have the capa-
bility of making a positive identification of
each terminal prior to allowing that terminal
to access system resources.
(d) (U) The security classification level and
special access categories shall be identi-
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
fied with the information in the system, and
appropriate labeling of any output shall be
ensured.
(e) (U) The system shall produce, in a secure
manner, an audit trail containing sufficient
information to permit a regular security
review of system activity. Audit trails
shall be maintained at each node and at
the hub.
(f) (U) The system shall provide a real-time
facility to report security anomalies to a
security monitor.
(g) (U) The system shall isolate user data from
system control, net control, and technical
control data.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
SECTION 3. CHOSUN NETWORK SECURITY ORGANIZATION/RESPONSIBILITIES (U)
3.1 General (U)
(U) This section describes the tasks and responsibilities of all
personnel involved in the development, implementation, operation,
and maintenance of CHOSUN network security. Figure 3-1 presents
an overview of the security organization hierarchy for the CHOSUN
network.
3.2 Designated Approving Authority Responsibilities (U)
(U) The responsibilities of the DAA for the CHOSUN network are as
follows:
a. (U) Accredit the CHOSUN network for initial or continued
operation based upon review and evaluation of the appropri-
ate system/network certification documents.
b. (U) Accredit all major modifications to the CHOSUN network.
c. (U) Approve the entry of each CHOSUN node into the CHOSUN
network.
d. (U) Accredit each node and the hub for initial or continued
operation based upon a review and evaluation of the appropri-
ate node/hub certification documents.
e. (U) Make official decision for requiring nonscheduled net-
work recertification/reaccreditation upon evaluating input
of the NCWG.
f. (U) Appoint a CHOSUN NSO to manage the implementation of
security and the testing and evaluation of the security
features of the CHOSUN network.
g. (U) Authorize network access of all users of the CHOSUN
network.
h. (U) Provide official approval of any changes to the secur-
ity requirements of this manual, as recommended by the NCWG.
i. (U) Approve each node's interface with other ADP systems,
terminals, or networks in order to ensure that these inter-
faces do not degrade the security of the CHOSUN network.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
DESIGNATED
APPROVIN(
AUTHORITY 3.2
PROGRAM
MANAGEMENT 3,7
NETWORK
SECURITY
OFFICER 3,4
"in
rn
v
NODE INFORMATION
NETWORK
CERTIFICATION
WORKING GROUP 3.3
HUB INFORMATION
SYSTEM SECURITY OFFICER
3.5.1
SYSTEM CONTROL
OPERATOR
3.5.2
NETWORK CONTROL
OPERATOR
3.5.3
CENTRAL TECHNICAL
CONTROL OPERATOR
3.5.4
I (I I Includes Operations Center
I I I I Watch Officer/Duty Officer
1 3.8
1 1 TECHNICAL CONTROL
I I I OPERATOR 3.6.2
III - -- - --_..?
Figure 3-1. (U) CHOSUN Network Security Organization
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
gi,
rn
v
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
3.3 Network Certification Working Group Responsibilities (U)
(U) The responsibilities of the NCWG are as follows:
a. (U) Perform certification/recertification for all nodes
and the hub facility.
b. (U) Assess network-wide risk and perform periodic updates
of the network threat.
c. (U) Review, evaluate, and consolidate the results of
individual node and hub certifications and accompanying
Security Test and Evaluation (ST&E) reports.
d. (U) Prepare a Network Security Report based on the network
risk/threat analysis and individual ST&E reports.
e. (U) Review and evaluate all requests for waivers to the
provisions of this manual and provide to the DAA as part
of the node ST&E report all requests for waivers and a
recommendation for approval if appropriate.
f. (U) Based upon the Network Security Report, certify/
recertify the operational network and prepare a letter
of network certification for forwarding to the DAA.
g. (U) Advise the NSO on matters pertaining to network
security including a changing risk environment, or
other changes in security policy, procedures, or tech-
nical criteria.
h. (U) Review and evaluate all network security incidents
and violations and advise the DAA on the requirement/
potential requirement for recertification or deactivation
of the operational CHOSUN network.
i. (U) Participate in design reviews and validate the design
of security protective features in the network.
j. (U) Review, evaluate, and recommend for approval each
node's interface with other ADP systems, terminals, or
networks, in order to ensure that these interfaces do
not degrade the security of the CHOSUN network.
k. (U) Review, evaluate, and recommend for approval the
procedures that are used by each node to disconnect
elements of the node from the CHOSUN network, clear
memory and disk storage, interconnect with other systems
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
processing information at a lower level, and store or
destroy information in an approved mannner.
1. (U) Review, evaluate, and recommend for approval the
procedures that are used by each node to reconnect
elements back to the CHOSUN network after having been
interconnected with other systems processing informa-
tion at a lower level.
m. (U) Review, evaluate, and recommend for approval the
configuration management procedures for the CHOSUN
network as they relate to network security.
n. (U) Review and evaluate all proposed modifications to
CHOSUN hardware/software elements for their security
adequacy and inform the Network Configuration Manager
of those items approved for installation.
o. (U) Based on results of testing by the Program Manage-
ment Office, certify new system releases.
p. (U) Review and coordinate the Network Security Test
Program.
q. (U) Review results and activities of the CHOSUN Network
Test Team.
r. (U) Review, evaluate, and recommend for approval the
security features of the network Standard Operating
Procedures (SOP).
(C) The NCWG will initially be comprised of one representative from
each of the following:
a.
(U)
National Security Agency.
b.
(U)
Central Intelligence Agency.
c.
(U)
Federal Bureau of Investigation.
d.
(U)
Department of Justice.
e.
(U)
United States Secret Service.
The CHOSUN NSO will serve as a voting member and chairman of the NCWG
with authority to stop NCWG actions and present issues to the DAA.
Where conflicts arise, the Chairman of the NCWG will act as sole
interface to the DAA. The DAA will act as final arbiter for the
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
CONFIDENTIAL
resolution of all issues relating to the security and privacy of the
CHOSUN network.
3.4 Network Security Officer Responsibilities (U)
(U) The responsibilities of the NSO are as follows:
a. (U) Provide general supervision, administration, and over-
all coordination of CHOSUN network security matters, in-
cluding operations, test and evaluation, certification,
and accreditation.
b. (U) Prepare and disseminate all updates to the CHOSUN
Network Security Manual.
c. (U) Ensure that security instructions, guidance, and SOPs
are prepared, issued, and maintained for the network in
acco i e; with, DA :y:: ections.
d. (U) Maintain cognizance of all aspects of network security
including hardware, software, COMSEC, EMSEC, and all other
considerations relating to network security.
e. (U) Review and monitor all proposed network or node confi-
guration changes that may affect the security of the net-
work or any user node, and forward recommendations to the
NCWG for evaluation.
f. (U) Advise the Node Information System Security Officers
(NISSOs) and Hub Information System Security Officer (HISSO)
of scheduled outages for system testing or maintenance.
g. (U) Maintain a current library of network security documen-
tation. This library will include but not be limited to:
(1) (U) CHOSUN Network Security Manual.
(2) (U) All technical references, standards, and criteria
(current issues) required for certification of the
CHOSUN network.
h. (U) Approve network/facility access authorization requests
for all personnel other than user, forward user network
access authorization requests to the DAA for approval.
i. (U) Maintain a security roster for all nonuser personnel
approved for CHOSUN access, and assure system/network access
permissions have been installed for authorized users.
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
j. (U) Ensure that personnel no longer requiring CHOSUN access
are debriefed appropriately and that USERIDs/passwords are
removed from the system when network users are debriefed.
k. (U) Advise NISSOs/HISSO on site-unique security matters.
1. (U) Develop and conduct a network/system security test
program. Review and evaluate all test results, and provide
any resultant recommendations for modifications to existing
security procedures to the NCWG.
m. (U) Develop, conduct, and document a Security Training
Program for the NISSOs and the HISSO.
n. (U) Perform a security review of all security incidents and
related violations and provide immediate notification of all
violations to the NCWG. If required, direct that a node be
disconnected or that operation of the network be suspended.
o. (U) Serve as voting member 10i the NCWG,
in addition to being the NCWG chairman.
p. (U) Review and evaluate results of node/hub testing of
contingency operations plans for security measures and
modify security portions of the contingency operations plans
as necessary. Forward proposed changes to the NCWG for
approval.
3.5 Hub Security Elements (U)
3.5.1 (U) Hub Information System Security Officer Responsibili-
ties. The responsibilities of the HISSO are as follows:
a. (U) Provide general supervision, administration, and over-
all coordination of network security matters for the hub, to
include system control, network control, and central
technical control elements.
b. (U) Serve as designated custodian for safeguarding all
cryptographic equipment and materials (e.g., keying
materials, manuals).
c. (U) Ensure that security instructions, guidance, manuals,
and SOPs are implemented and maintained at the hub faci-
lities.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
d. (U) Notify the NSO of any security-related issues,
activities, and incidents at the hub or within the
operational network.
e. (U) Manage and assign responsibilitiy to the Central
Technical Control Operator (CTCO), the Network Control
Operator (NCO), and the System Control Operator (SCO) for
testing and evaluation of hub/network features under their
operational control.
f. (U) Inform the NSO of any proposed hardware or software
changes within the hub.
g. (U) For personnel other than users, request network/
facility access authorization/approval from the NSO
(see section 5.4, Access Requests).
h. (U) Exercise contingency operations plans for the hub
switch (see section 8.8). Results will be forwarded to
the NCWG via the NSO for approval of the subject plan(s).
3.5.2 (U) System Control Operator Responsibilities. As the
management element of the hub structure, the responsibilities of the
SCO are as follows:
a. (U) Implement security instructions, guidance, and SOPS
for the system control function.
b. (U) Maintain data results of routine security-related
hardware/software functional and performance testing;
this data should be retained for a period of six (6)
months.
c. (U) Maintain data on all reported system/network security
incidents; this data should be retained for a period of two
(2) years.
d. (U) Act as alternate to the HISSO for safeguarding all
cryptographic equipment and materials (e.g., keying
materials, manuals).
3.5.3 (U) Network Control Operator Responsibilities. As an
operational element of the hub structure, the responsibilities of
the NCO are as follows:
a. (U) Implement security instructions, guidance, and SOPs
for the network control function.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
b. (U) Monitor network operational security and report inci-
dents to the HISSO.
3.5.4 (U) Central Technical Control Operator Responsibilities. As
an operational element of the hub structure, the responsibilities of
the CTCO are as follows:
a. (U) Implement security instructions, guidance, and SOPS
for the central technical control function.
b. (U) Provide operational control of cryptographic equip-
ment and data encryption devices for the network.
c. (U) Monitor network security related to the technical con-
trol function and report incidents to the HISSO.
3.6 Node Security Elements (U)
3.6.1 (U) Node Information System Security Officer Responsibili-
ties. The responsibilities of the NISSO are as follows:
a. (U) Provide general supervision, administration, and over-
all coordination of all security matters for the node.
b. (U) Ensure that security instructions, guidance, and SOPS
are implemented and maintained at the node.
c. (U) Notify the NSO of any security-related issues, activi-
ties, and incidents at the node, including node outage
reports.
d. (U) Manage and assign responsibility to the local Techni-
cal Control Operator (TCO) for testing of node/network
features under his jurisdiction.
e. (U) Indoctrinate local users on applicable system/network
security requirements and responsibilities prior to utiliz-
ing or accessing the network.
f. (U) Monitor and enforce physical access controls to the
node facilities.
g. (U) Conduct daily routine checks of the Intrusion Detec-
tion System (see section 6.3).
h. (U) Provide for safeguarding all cryptographic equipment
and materials (e.g., keying materials, manuals).
3-8
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
i. (U) Maintain a current access roster of all node personnel
approved for CHOSUN access.
j. (U) Serve as Configuration Control Manager for the node,
and thus inform the NSO of any proposed node changes.
k. (U) Immediately debrief departing personnel who have had
access to the system/network, sending notification of
departure and debriefing to the NSO.
1. (U) For users, request network/facility access authori-
zation via the NSO; the NSO will forward each request to
the DAA for approval. For all other personnel, request
network/facility access authorization from the NSO (see
section 5.4, Access Requests).
m. (U) Formulate and test contingency operations plans for
the node system (see section 8.8).
n. (U) Prepare and forward to the NCWG for approval a node
interface document which describes all node interfaces to
the CHOSUN external ports.
o. (U) Prepare and forward to the NCWG all documentation of
the procedures that will be used at the node to disconnect
elements of the node from the CHOSUN network, clear the
system, process at a lower classification level, and
reconnect to the network.
3.6.2 (U) Technical Control Operator Responsibilities. The
responsibilities of the TCO are as follows:
a. (U) Implement security instructions, guidance, and SOPs
for the technical control functions.
b. (U) Monitor node security related to the technical control
function and report incidents to the NISSO.
c. (U) Act as alternate to the NISSO for safeguarding all
cryptographic equipment and materials (e.g., keying
materials, manuals).
d. (U) Provide operational control of cryptographic equipment
and data encryption devices for the node.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
3.7 Program Management Responsibilities (U)
(U) The responsibilities of the Program Manager are as follows:
a. (U) Provide initial definition of the requirements for
security features in the network.
b. (U) Retain the results of the design reviews as official
records of the program; this data should be retained for
a period of three (3) years.
c. (U) Document and retain the results of the security test
as official records of the program.
d. (U) Develop the initial SOPs for the CHOSUN operational
network.
3.8 User Responsibilities (U)
(U) All users of the network shall be briefed by the NISSO on the
need for exercising sound security practices in protecting the in-
formation processed, stored, or transmitted by the network.
(U) As initiated by a transmitting node, the system software will
provide the receiving node(s) with the audit elements appropriate
to each data/audio/video conference (e.g., classification of confer-
ence, participants; see section 8.4, Audit Trails). The NISSO will
ensure that the user(s) at the node is notified of the security mode
in which the system is operating and the nodes (users) participating
in the conference.
(U) At a minimum, originating users must:
a. (U) Be responsible for restricting distribution of data
to those nodes having a legitimate need to know.
b. (U) Ensure that all input ADP products (e.g., printed
listings, documents, hard-copy printouts of CRT displays)
are marked in accordance with requirements prescribed for
the highest level of classification of any information
contained in the product.
(U) At a minimum, receiving users must:
a. (U) Immediately report to the NISSO the receipt of any
ADP product not specifically requested or not marked with
the appropriate security classification.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
b. (U) Receipt for and protect all classified products trans-
mitted by the network (see section 8.5.1.3, Control and
Accountability).
3-11
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
SECTION 4. CHOSUN NETWORK CERTIFICATION AND ACCREDITATION (U)
4.1 Objectives and Scope (U)
(U) This section describes the basic policy and procedures to be
employed in the certification and accreditation of the CHOSUN net-
work. The objective of the certification and accreditation process
is to ensure that the CHOSUN network is developed, installed, opera-
ted, and maintained in accordance with requirements stated herein
in order to provide adequate security protection.
(U) The process of certification and accreditation is of extreme
importance in establishing and maintaining appropriate security
safeguards within the CHOSUN network. Therefore, it must receive
continuous attention, and be fully repeated at frequent intervals
to assure adequate protection and safeguarding against any/all
network changes and any/all environment changes.
(U) For purposes of clarity, the following definitions apply
throughout this section:
a. (U) Certification is a technical evaluation of a subject
network/system/subsystem demonstrating compliance with
stated security requirements.
b. (U) Accreditation is approval or official authorization
for a subject network/system/subsystem to handle sensitive
information in an operational environment. As such, the
accreditation process provides management control over
security decisions and official acceptance of any residual
risk.
4.2 Steps in CHOSUN Certification and Accreditation (U)
(U) Seven distinct elements are included within the certification
and accreditation process for CHOSUN:
a.
(U)
Hardware/software certification.
b.
(U)
Node certification.
c.
(U)
Node accreditation.
d.
(U)
Hub certification.
e.
(U)
Hub accreditation.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
f.
(U)
Network certification.
g.
(U)
Network accreditation.
Each element is briefly described below:
a. (U) Hardware/software certification provides a technical
evaluation that all software developmental and off-the-
shelf) and hardware satisfy security requirements of the
CHOSUN network. It is a composite evaluation based upon
delivered documentation, results of various tests (contrac-
tor performed and independently confirmed by Govern-
ment tests) and evaluation of the system in its proposed
operating mode/environment. Hardware/software certifica-
tion must be obtained before any CHOSUN system is approved
for deployment to a CHOSUN facility.
b. (U) Node certification is the complete security evaluation
or reevaluation of all CHOSUN components located within a
node facility. Its scope encompasses all facets of ADP,
personnel, physical, procedural, emanations, and communica-
tions security. It is based on the results of the node
ST&E, Operational Test and Evaluation (OT&E), and a node
risk analysis.
(U) While the major goal of the certification process is to
evaluate technical compliance with stated security policy/
requirements, it is recognized that in certain instances
related to site-unique conditions within a node element,
procedural compliance with a stated security requirement may
be best accomplished in a manner different than specified
herein. In no case will any security requirement be waived,
but alternative approaches to requirement satisfaction may
be considered on a very selective basis through a Request
for Waiver.
(U) As part of the node certification process, the NCWG is
responsible for identification of any security items not in
strict compliance with this manual. For those items identi-
fied and subsequently evaluated and determined to be in
noncompliance with the overall requirement, the user agency
will document a Request for Waiver (appendix D) and include
it in the Node ST&E report.
c. (U) Node accreditation is the formal approval for the node
to initiate or continue operation within the CHOSUN network.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
d. (U) Hub certification is the complete security evaluation/
reevaluation of a CHOSUN components located within the
hub facility. Its scope encompasses the switching equip-
ment, the control elements (network control, system control,
technical control) and all related network equipment. Its
scope encompasses hardware, software, personnel, procedures,
emanations, and communications security, and is based upon
a hub ST&E as well as operational testing performed with the
nodes. A risk analysis for the hub must also be included in
the ST&E report.
e. (U) Hub accreditation is the formal approval for the hub
facility to initiate or continue operation within the CHOSUN
network.
f. (U) Network certification for CHOSUN is the complete secur-
ity evaluation or reevaluation of the entire CHOSUN network.
Its scope encompasses all node facilities, the hub/switch,
transmission system, network-level control elements, and
network-level administrative and procedural security. It
is based upon results from node certification, hub/switch
certification, network-wide OT&E, and a rigorous, complete,
network-wide security risk analysis.
g. (U) Network accreditation is the formal approval for
initial or continued operation of the CHOSUN network. This
approval authorizes the handling of classified information
within the CHOSUN network, and also acknowledges official
acceptance of any residual risk.
4.3 Hardware/Software Certification (U)
(U) All hardware/software intended for implementation within the
CHOSUN network will be certified by the NCWG. This certification
is based upon:
a. (U) Technical review and evaluation of contractor-
developed documentation for developmental software.
b. (U) Technical review and evaluation of the integration
technique for interfacing off-the-shelf software with
developmental software.
c. (U) Technical review of contractor testing.
d. (U) Performance and review of an Independent Security
Test (IST).
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
e. (U) Technical evaluation of the proposed hardware
environment and associated operational procedures.
f. (U) A security risk analysis.
An ST&E report will be produced in order to provide documentation of
items a through f above.
4.4 Node Certification (U)
(U) The certification of a CHOSUN user node encompasses all facets
of telecommunications, personnel, physical, procedural, emanations,
and communications security. The certification is based upon re-
sults of node OT&E and a node security risk analysis.
(U) The NCWG is responsible for certification of all nodes, and
this process will be documented in a standardized ST&E Report; an
ST&E report format is provided in appendix E. As part of the ST&E,
the local NISSO must complete a security checklist, as shown in
appendix F.
(U) In all cases where a node ST&E report contains at least one
Request for Waiver, the NCWG may not certify the node until the
Request for Waiver is formally reviewed by the DAA. Upon official
approval by the DAA of the Request for Waiver, the NCWG will certify
the node if all other requirements are satisfied. If a Request for
Waiver is not approved by the DAA, the node personnel will take the
necessary steps to provide acceptable compliance and revise the node
ST&E report to reflect the actions taken. Requests for Waiver must
not be considered as a routine part of a node's ST&E. Requests for
Waiver will be approved only out of operational necessity and not for
budgetary constraints.
4.5 Node Accreditation (U)
(U) The accreditation of a CHOSUN node provides official approval
for that node to initiate or continue operations within the CHOSUN
system. Accreditation for an individual node will be the respon-
sibility of the DAA.
(U) Upon granting node certification, the NCWG will prepare a letter
of certification to be included with the following items as part of
the accreditation request package:
a.
(U)
The node ST&E Report.
b.
(U)
The node Security Manual.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
c. (U) The (proposed) roster of node personnel to have
CHOSUN access.
d. (U) The (proposed) node-unique information compart-
ments to be handled by the CHOSUN system.
e. (U) Recommended waivers, if any.
(U) As a goal, node accreditation should be completed within 30 days
of-node certification.
4.6 Hub Certification (U)
(U) Certification for the hub facility will be the responsibility of
the CHOSUN NCWG.
4.7 Hub Accreditation (U)
(U) Upon granting hub certification, the NCWG will prepare a letter
of certification to be included with the following items as part of
the accreditation request package:
a. (U) The hub ST&E Report.
b. (U) The hub Security Manual.
c. (U) The (proposed) roster of personnel working within
the hub facility.
d. (U) Recommended waivers, if any.
(U) Accreditation of the hub facility is the responsibility of the
DAA.
4.8 CHOSUN Network Certification (U)
(U) The CHOSUN network certification is the overall security evalua-
tion/reevaluation of the entire CHOSUN network; as such, its scope
includes the nodes, hub facility, transmission system, personnel, and
procedures of the entire CHOSUN network. It relies extensively upon
results of node/hub ST&Es.
(U) The NCWG will be responsible for the network certification pro-
cess. Upon completion of the certification activities, a letter of
certification will be prepared by the NCWG for the DAA. In addition,
as part of the accreditation request package, the following items
will be forwarded to the DAA:
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
a. (U) The CHOSUN Network Security Evaluation Report.
b. (U) The CHOSUN Network Security Manual.
c. (U) Specific identification of proposed nodes to be
approved for CHOSUN operation.
d. (U) Specific identification of proposed compartmented
information types to be approved for CHOSUN processing.
e. (U) Any requested waivers with NCWG evaluation and
recommendation for approval/disapproval.
4.9 CHOSUN Network Accreditation (U)
(C) The accreditation of the CHOSUN network provides official ap-
proval for initial or continued operation of the CHOSUN network, as
described in the network certification documents (i.e., specific
nodes included, specific compartments, and any operational limita-
tions stated therein). The Assistant to the President for National
Security Affairs is the DAA for the CHOSUN network and therefore has
the responsibility to issue CHOSUN network accreditation based upon
review and evaluation of the accreditation request package forwarded
from the NCWG.
(U) As a goal, accreditation of the CHOSUN network will be accom-
plished within 30 days of forwarding to the DAA the letter of CHOSUN
network certification.
(U) Results of network accreditation will be provided immediately
to the CHOSUN Network Security Officer to allow prompt initiation of
operational activation/re-activation planning.
4.10 Schedule for Recertification and Reaccreditation (U)
(U) Once the CHOSUN network has initially completed requisite certi-
fication and accreditation, it will require routine recertification
and reaccreditation every twelve months. The Network Security Manual
will be reviewed and updated annually as a component activity within
the network recertification/reaccreditation process.
(U) In other instances with the potential to necessitate recertifi-
cation/reaccreditation, the NCWG has the responsibility to analyze
the specific situation and develop a recommendation on the need for
recertification/reaccreditation. The NCWG may then recommend full
network-wide recertification/reaccreditation, or only selected steps
of the process. For example, a new node requesting entry to the
CHOSUN network may necessitate only certification/accreditation of
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
the new node and reassessment of system certification based upon the
newly provided ST&E rather than recertifying all nodes.
(U) Types of situations which may require network recertification
and reaccreditation include:
a. (U) Occurrence of a system/network violation which, in the
judgement of the NCWG, requires recertification/reaccredita-
tion.
b. (U) Addition of a new user node.
c. (U) Significant change in the risk environment. This
includes the proposed addition of a new compartmented
information category and changes in the threat/operating
environment.
d. (U) A major change in hardware or software.
In cases of these nonroutine situations with potential for full
network recertification/reaccreditation, final responsibility for
issuing a call for recertification/reaccreditation lies with the DAA
for the CHOSUN network.
4.11 Revoking Accreditation (U)
(U) The DAA may, at any time, revoke the system network
accreditation based on any change in the system/network security
posture. Types of changes that may cause revocation of accreditation
include but are not limited to the following:
a. (U) Occurrence of a system/network violation.
b. (U) A significant change in the risk or threat
environment.
c. (U) Information identifying additional system/
network vulnerabilities.
(U) The DAA will also be responsible for initiating the recerti-
fication/reaccreditation process of the system/network once the
change in security posture has been appropriately addressed (see
section 4.10).
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
SECTION 5. PERSONNEL SECURITY (U)
5.1 General (U)
(U) Installation of the CHOSUN network at multiple nodes in a
physically secure area requires stringent entry and access controls
to be exercised over all personnel having access to the network and
its peripherals. The CHOSUN network will operate in a system-high
environment (TS/SCI). Therefore, unescorted access to any CHOSUN
facility shall be limited to personnel who are cleared for TOP
SECRET and formally approved for access to all special categories of
information which will be processed, stored or transmitted by the
network and who additionally shall be approved for CHOSUN access by
the DAA or NSO.
(U) The granting of access to the CHOSUN operational network shall
be controlled under the strictest application of the "need-to-know"
principle and in accordance with the personnel security requirements
set forth in this document.
5.2 Personnel Identification (U)
(U) Personnel having potential access to CHOSUN network/facilities
are identified as users, operators (personnel performing technical
functions at the hub and user nodes), and Government and contractor
personnel who perform critical support functions in the implemen-
tation, testing, and maintenance of the network. Personnel other
than those cited above will not be authorized access to the network
or node/hub facilities without prior approval of the NSO.
5.3 Access Authorization Process (U)
(U) The process of access authorization to the network or node/hub
facilities will be the same for all personnel. The access authori-
zation process will be dependent upon:
a.
(U)
An access authorization request.
b.
(U)
Approval of the access authorization request based on:
(1)
(U)
Determination of need to know, and
(2)
(U)
Satisfactory background investigation of the
individual under consideration for access or evidence
of clearance which meets the requirements established
by this manual.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
5.4 Access Requests (U)
(U) The proper and careful selection of candidates (users or
support personnel) for access to CHOSUN is one of the most important
facets of CHOSUN security. Effective security is largely dependent
upon the personal integrity and security consciousness of the
candidate and the nominator. Therefore, emphasis will be placed on
the security screening of candidates for CHOSUN access and continued
reinforcement of security requirements. Nominators shall ensure
that candidates are of the highest quality in terms of loyalty,
character, integrity, discretion, and responsibility. Nominations
shall be screened for information incompatible with the personnel
standards presented in section 5.5 of this manual.
a. (U) Nomination Package Preparation. Nominations for
access to Project CHOSUN shall be prepared on the Access
Nomination Form provided as appendix G and will include the
candidate's full name, rank/grade, Social Security Number,
date and place of birth; organization and position
assigned; scheduled departure or reassignment, telephone
number; security clearance, type of investigation, date
granted and by whom; need-to-know justification of access;
retention period; certification, by the cognizant security
officer, that the individual meets the personal standards
set forth in section 5.5, without waiver.
(1) (U) For those candidates who meet the security
clearance criteria set forth in section 5.5, the
sponsor (nominator) shall complete the Access Nomi-
nation Form and submit it to the NSO for processing.
(2) (U) For candidates who require a personal security
investigation or reinvestigation in order to meet the
eligibility requirements, the nominator will submit
forms to his cognizant investigative agency for
completion of a background investigation that meets
the criteria set forth in section 5.5.2.1. Upon
completion of the required investigation and determi-
nation that the individual meets the prescribed
criteria, the justification for the candidate's need-
to-know requirement will be forwarded to the NSO.
b. (U) Nomination Package Submission. Nomination packages,
including requests for one-time-limited access, shall be
submitted by the Program Management Office (PMO), NISSO, or
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
HISSO to the NSO. The nominator will carefully review the
nomination package to determine if the candidate meets the
personnel reliability standards and need-to-know require-
ments before signing the nomination package. Names of
individuals not believed by the nominator to meet the need-
to-know criteria should not be forwarded to the NSO.
c. (U) Nomination Package Review and Approval. The DAA is
the sole authority for authorizing access to potential
users of the CHOSUN network. Users are those people who
require access to the video/data consoles in support of the
national crisis management decisionmaking process. All
other personnel seeking access to the node/hub facilities
(e.g., maintenance, technical control personnel) will be
approved by the NSO.
(U) The adequacy of the justification provided by the
nomination for an individual's access to CHOSUN information
shall be determined based on the need-to-know criteria. If
work can proceed without an individual's knowledge or
involvement at the CHOSUN level, then the individual does
not meet the criteria.
(U) Approved nomination shall be returned to the
nominator, who will arrange for notification of the
candidate of the date, time, and place of his security
indoctrination briefing and the conduct of the indoctri-
nation (see section 5.6).
5.5 Clearance (U)
(U) Individuals identified as requiring access to the network will
meet the following minimum personnel security standards:
a. (U) The individual shall be stable, of excellent character
and discretion, and of unquestioned loyalty to the United
States.
b. (U) Both the individual and the members of his or her
immediate family shall be United States citizens. For
these purposes, "immediate family" is defined as including
the individual's spouse, parents, brothers, sisters, and
children.
c. (U) The members of the individual's immediate family and
persons to whom he or she is bound by affection or obliga-
tion should neither be subject to physical, mental, or
other forms of duress by a foreign power, nor advocate the
use of force or violence to overthrow the Government of the
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
United States or the alteration of the form of Government
of the United States by unconstitutional means.
5.5.1 (U) Exceptions. Where there is a compelling need and a
determination has been made by the DAA that every reasonable
assurance has been obtained and that under the circumstances the
security risk is negligible, the standards set forth in sections
5.5.b. or 5.5.c. may be waived. Further, an exception to the provi-
sions of this manual applies for elected officials of the United
States Government, Federal judges, and those individuals for whom
the DAA makes a specific exception.
5.5.2 (U) Investigative Requirements. The investigation conducted
on an individual under consideration for access to CHOSUN will be
thorough and shall be designed to develop information as to whether
the individual clearly meets the personnel security standards. The
investigation will be current within five (5) years prior to an
individual's nomination for access to CHOSUN. If the background
investigation is over one (1) year old from the date of nomination
into CHOSUN, a subject interview and polygraph will be required.
Arrangements for polygraph will be made by the agency requesting the
access, through the investigative agency which normally provides
polygraph support.
(U) The investigation shall be accomplished through record checks
and personal interviews of various sources by trained investigative
personnel in order to establish positively the complete continuity
of identity to include date of birth, residences, education, employ-
ment, and military service. Where the circumstances of a case
indicate, the investigation shall exceed the basic requirements set
forth below to ensure that those responsible for authorizing access
have in their possession all the relevant facts in order to deter-
mine the candidate's eligibility.
(U) The individual shall furnish a signed personal history state-
ment, fingerprints of a quality acceptable to the investigative
agency, and a signed release, as necessary, authorizing custodians
of police, credit, education, and medical records, to provide record
information to the investigative agency. Photographs of the
individual shall also be obtained where additional corroboration of
identity is required.
5.5.2.1 (U) Minimum Standards. Minimum standards for the investi-
gation are as follows:
a. (U) Verification of date and place of birth and United
States citizenship.
5-4
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
b. (U) Check of the subversive and criminal files of the
Federal Bureau of Investigation, including submission of
fingerprint charts, and checks of such other national
agencies as are appropriate to the individual's background.
An additional check of Immigration and Naturalization
Service records shall be conducted on those members of the
individual's immediate family who are United States
citizens other than by birth or who are resident aliens.
c. (U) Check of appropriate police records covering all areas
where the individual has resided in the United States
throughout the most recent fifteen (15)-year period or
since age eighteen, whichever is the shorter period.
d. (U) Verification of the individual's financial status and
credit habits through checks of appropriate credit institu-
tions and interviews with knowledgeable sources covering
the most recent five (5)-year period.
e. (U) Interviews with neighbors in the vicinity of all the
individual's residences in excess of six (6) months
throughout the most recent five (5)-year period. This
coverage shall be expanded where the investigation suggests
the existence of some questionable behavioral pattern.
f. (U) Confirmation of all employment during the past fifteen
(15) years or since age eighteen, whichever is the shorter
period but in any event the most recent two years.
Personal interviews with supervisors and co-workers at
places of employment covering the most recent ten (10)-year
period.
(U) Verification of attendance at all institutions of
higher learning and at the last secondary school attended
for the most recent fifteen (15)-year period. Attendance
at secondary schools may be verified through qualified
collateral sources. If attendance at educational institu-
tions occurred within the most recent five (5) years,
personal interviews with faculty members or other persons
who were acquainted with the individual during his or her
attendance will be conducted.
h. (U) Review of appropriate military records.
i. (U) Interviews with a sufficient number of knowledgeable
acquaintances (a minimum of three developed during the
course of the investigation) as necessary to provide
continuity to the extent practicable, of the individual's
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
activities and behavorial pattern over the past fifteen
(15)-years with particular emphasis on the most recent five
(5)-years.
(U) When employment, education, or residence has occurred
overseas (except for periods of less than five (5)-years
for personnel on U.S. Government assignment and less than
ninety days for other purposes) during the past fifteen
(15) years or since age eighteen (whichever is the shorter
period), a check of the records will be made at the Depart-
ment of State and other appropriate agencies. Efforts
shall be made to develop sources, generally in the United
States, who knew the individual overseas in order to cover
significant employment, education or residence and to
attempt to determine if any lasting foreign contacts or
connections were established during this period. However,
in all cases where an individual has worked or lived out-
side of the United States continuously for over five years,
the investigation will be expanded to cover fully this
period in his life through the use of such investigative
assets and checks of record sources as may be available to
the United States Government in the foreign country(ies) in
which the individual resided.
k. (U) In those instances in which the individual has
immediate family members or other persons with whom he or
she is bonded by affection or obligation in any of the
situations described in 5.5.c. above, the investigation
will include an interview of the individual by trained
security, investigative, or counterintelligence personnel
to ascertain the facts as they may relate to the indivi-
dual's access eligibility.
1. (U) In all cases the individual's spouse shall, at a
minimum, be checked through the subversive files of the
Federal Bureau of Investigation and other appropriate
national agencies. When conditions indicate, additional
investigation shall be conducted on the spouse of the
individual and members of the immediate family to the
extent necessary to permit the determination that the
personnel security standards presented in this section are
met.
m. (U) A personal interview. of the individual will be
conducted by trained security, investigative or counter-
intelligency personnel when necessary to resolve any
significant adverse information and/or inconsistencies
developed during the investigation.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
5.5.2.2 (U) Investigative Exceptions. In exceptional cases, the
DAA may determine that it is necessary or advisable in the national
interest to authorize access prior to completion of the fully
prescribed investigation. In this situation, such investigative
checks as are immediately possible shall be made at once, and should
include a personal interview by trained security or counterintelli-
gence personnel. Access in such cases shall be strictly controlled,
and the fully prescribed investigation and final evaluation shall be
completed at the earliest practicable time.
5.5.2.3 (U) Special Investigative Requirement. In addition, all
personnel identified as operators, Government, and contractor
personnel working at the hub will be polygraphed prior to access
authorization/approval to the facility.
5.5.2.4 (U) Approved Investigative Agencies. Investigations
completed by the following Federal agencies are acceptable if they
encompass all of the investigative requirements cited in herein:
a.
(U)
Central Intelligence Agency.
b.
(U)
Defense Investigative Service.
c.
(U)
Department of the Treasury.
d.
(U)
Federal Bureau of Investigation.
e.
(U)
Office of Personnel Management.
f.
(U)
United States Secret Service.
5.6 Security Indoctrination (U)
(U) Once a nomination has been approved, no information or material
will be provided to the candidate until he/she has received a
security indoctrination briefing and has executed a Non-Disclosure
Agreement (NDA). NDAs shall be forwarded to the NSO and controlled
by the NSO for a period of 70 years after access termination.
Individuals approved for one-time-limited access will also execute
both a briefing and debriefing statement at the time of indoctri-
nation.
a. (U) All indoctrinations shall be accomplished by the NSO,
PM, NISSO, or HISSO. Indoctrinations shall consist of a
general description of the Project, as appropriate, and
instructions on how to protect CHOSUN information.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
b. (U) Specific instruction shall include the individual's
responsibility for notifying the NSO:
(1) (U) Upon any significant change in personal status,
(e.g., arrests, convictions, civil lawsuits involving
allegations of fraud, deceit or misrepresentation
against the individual, change of address, or change
of employment).
(2) (U) Upon unauthorized contact with a citizen of a
foreign country. (This recognizes the need for
certain indoctrinated individuals to undertake
activities requiring official contact with foreign
nationals).
(3) (U) Upon request for Project CHOSUN information from
unauthorized persons.
(4) (U) Upon intent to marry or divorce.
(5) (U) Of the intent to travel to or through any country
(countries) listed as denied areas (see DCID 1/20), at
least 30 days prior to such travel.
c. (U) Security reindoctrinations shall be conducted
annually, or when special events are scheduled to take
place (e.g., tests, exercises, and foreign travel).
5.7 Continuing Security Programs (U)
(U) In order to facilitate the attainment of the highest standard
of personnel security and to augment both the access approval
criteria and the investigative requirements established by this
manual, participating CHOSUN departments and agencies shall insti-
tute continuing security programs for all individuals having access
to CHOSUN. In addition to security indoctrinations, these programs
shall be tailored to create mutually supporting procedures under
which no issue will escape notice or be left unresolved.
(U) The continuing security programs shall include the following:
a. (U) Security education programs to ensure that individuals
who are granted access are initially indoctrinated and
periodically thereafter instructed as to its unique sensi-
tivity so that they understand their personal responsibi-
lity for its protection. The individual should be instruc-
ted that the ultimate responsibility for maintaining eligi-
bility for continued access rests with the individual.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
Therefore, the individual is encouraged to seek appropriate
guidance and assistance on any personal problem or situa-
tion that may have a possible bearing on his eligibility
for continued access, and security counseling should be
made available. These instructions should be conducted by
individuals having extensive background and experience
regarding the nature and special vulnerabilities of CHOSUN
information.
b. (U) Security supervisory programs to ensure that super-
visory personnel recognize and discharge their special
responsibility in matters pertaining to the security of
CHOSUN information. Such programs shall provide practical
guidance as to indicators which may signal matters of
security concern. Specific instructions concerning
reporting procedures shall be disseminated to enable the
appropriate authority to take timely corrective action to
safeguard the security of the United States as well as to
provide all necessary help to the individual concerned in
order to neutralize his vulnerability.
c. (U) Security review programs to ensure that appropriate
security authorities receive and exchange, in a timely
manner, all information bearing on the security posture of
persons having access to sensitive information. Personnel
history information shall be kept current. Security and
related files shall be kept under continuing review.
d. (U) Periodic reinvestigation (PR) of individuals granted
access to CHOSUN information, material, or facilities will
be conducted on a five-year recurring basis. The PR shall
consist of all pertinent records, etc., enumerated in
section 5.5.2.1 above, as applicable for the intervening
period.
e. (U) Whenever adverse or derogatory information is
discovered or inconsistencies arise that could impact upon
an individual's security status, appropriate investigations
shall be conducted on a timely basis. The investigation
shall be of sufficient scope necessary to resolve the
specific adverse or derogatory information, or inconsis-
tency in question so that a determination can be made as to
whether the individual's continued participation in
activities requiring access to SCI is clearly consistent
with the interest of national security.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
5.8 Access Termination and Debriefing (U)
(U) Due to the extreme sensitivity of CHOSUN information and
locations, access must be limited to those persons requiring access
for the performance of their duties.
a. (U) Individuals no longer requiring access to CHOSUN
information or who may be terminated for cause shall be
debriefed by the PMO, NISSO, or HISSO and removed from the
CHOSUN access roster by the NSO. As part of the debriefing
process, departing individuals must complete a Security
Termination Statement that will be forwarded to the NSO for
retention.
b. (U) Access by individuals authorized for one-time-limited
access shall automatically terminate at the end of the
access period.
c. (U) For those individuals having access to the operational
network, the NSO will be responsible for deleting each
departing individual's USERID/password from the system and
rescinding the previously approved access authorization.
The NISSO will delete each departing individual's USERID/
password from the node's word processor.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
SECTION 6. PHYSICAL SECURITY (U)
6.1 General (U)
(U) The extreme sensitivity of the CHOSUN network requires extra-
ordinary physical security measures to guard against unauthorized
access to the nodes, hub, or any other component of the CHOSUN
facility. The standards set forth in this manual will be adhered to
at all times, whether the specific node is operational or inactive.
6.2 Structural Barriers (U)
(U) Requirements for parent rooms are outlined below:*
a. (U) Parent room walls will be constructed from truefloor
to trueceiling, with all openings in excess of 90 square
inches barred, baffled, and alarmed to detect any attempted
intrusion of personnel or listening/eavesdropping/transmit-
ting devices. Standard wall construction, consisting of
drywall with either metal or wooden studs, will be
considered adequate. Expanded steel (9-11 gauge) and three
(3) inches of fiberglass insulation are required in
addition to standard wall construction on all facilities
(e.g., conference rooms) which do not have RF shields.
(1) (U) Parent Room Housing an RF-Shielded Room. Main-
tain a minimum of 18 inches of "dead space" between
the exterior of the RF-shielded room and the interior
of the parent room perimeter walls.
(2) (U) Parent Room Housing RF-Shielded Cabinet/Racks.
Provide a minimum of STC 45 when measured at the
exterior of the parent room walls.
b. (U) Exterior doors will be constructed of 1 3/4-inch-solid
material, with hinge pins bradded or welded to preclude
removal. Each exterior door will have a three (3)-
position, changeable combination; GSA-approved, Group 1
lock; acoustic seal; and pneumatic door closer. Combina-
tions will be changed by CHOSUN-approved individuals only,
at least every six (6) months, recorded on the appropriate
form, and forwarded to the NSO for storage. Local storage
of combinations is not authorized.
*
(U) A parent room is defined as the space located inside a building
structure, within which is assembled either an RF-shielded enclosure
or one or more RF-shielded cabinet/racks.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
6.3 Intrusion Detection Systems (U)
6.3.1 (U) Perimeter Intrusion Detection. CHOSUN facilities will
be provided with perimeter intrusion detection systems to include,
but not be limited to:
a. (U) Balanced magnetic switches on all exterior doors,
configured for day/night use.
b. (U) Vibration detection of the interior of all perimeter
walls, active 24 hours a day.
c. (U) Passive infrared or omnidirectional ultrasonic
detection between the exterior wall and the RF shield,
active 24 hours a day.
d. (U) Line supervision between the facility and the annun-
ciator panel where the alarm is monitored, which will sound
an alarm in case of system failure or tampering.
e. (U) If the facility will not be continuously staffed 24
hours a day, 7 days a week, passive infrared detection will
be installed within the RF shield.
f. (U) All alarm sensors and control boxes will have tamper-
proof switches.
g. (U) All alarm systems will have 8-12-hour battery standby
power.
h. (U) All control boxes will be located inside the alarmed
area.
6.3.2 Monitoring and Alarm Response (U)
a. (U) A central station alarm monitoring system for each
node must be installed or integrated into existing alarm
consoles which will annunciate any alarm condition which
occurs at the CHOSUN facility. Zones must be configured in
such a way as to indicate the location of the alarm at the
facility (e.g., front door, "dead space" between RF shield
and outer wall of the parent room). Attempted entries with
an invalid card-reader card or individual identifier number
should also cause an alarm condition to occur.
b. (U) The central station will be staffed 24 hours a day,
7 days a week, and may not be left unattended for even
short periods of time.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
c. (U) Responses to alarms will be immediate and occur in all
cases of an alarm condition. Response time will not exceed
5 minutes. Only appropriately trained security personnel
should be designated to respond to alarms.
6.3.3 Emergency Conditions (U)
a. (U) The facility shall be equipped with HALON or a similar
fire suppressant.
b. The CHOSUN facility should be staffed by a minimum of two
people at all times both for security considerations and
safety considerations (e.g., in the event one person is
incapacitated due to medical emergency or fire).
c. (U) All facilities will have water detectors that trigger
an alarm in case of flooding. Plastic tarpaulins will be
available to cover equipment in case of pipe breakage.
d. (U) The physical security features of CHOSUN facilities
are such that they would preclude rapid response into the
facility unless the doors are opened from the inside.
e. (U) In a medical emergency or fire, preservation of life
is of paramount importance. Access will be granted to
doctors, emergency medical teams, and firefighters as
necessary. If practical, the system will be shut down and
classified material will be secured or covered prior to
allowing access. This should not, however, delay entrance.
f. (U) If possible, a CHOSUN-approved individual should be
present within the facility as long as it does not create a
hazard to the individual. Extraneous and/or unnecessary
personnel should not be allowed into the area.
g. (U) All facilities (nodes and hub) will be equipped with
an interruptible power supply.
6.4 Access Control (U)
6.4.1 (U) Access Roster. A roster of personnel approved for and
authorized access to CHOSUN facilities will be maintained by the NSO
and transmitted via the CHOSUN network to all nodes on a weekly
basis. Each node will receive only the listing of individual's
approved for access to that node. This roster will contain the
name, Social Security Number, date of birth, place of birth, level
of clearance, agency, nodes to which the individual has been
approved for access, and date of approval.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
6.4.1.1 (U) Access by Uncleared Service Personnel. Uncleared
service personnel e.g., electricians, carpenters, plumbers,
construction, cleaning, and delivery personnel) will be provided a
one-for-one escort at all times while in the CHOSUN facility.
6.4.1.2 (U) Access by Emergency Personnel. Access by emergency
personnel shall be in accordance with the provisions of para-
graph 6.3.3.d. above.
6.4.2 (U) Intra-Agency Access. Intra-agency access to a CHOSUN
facility will be controlled by a card-reader access control which
requires both a valid, electronically read card and three-number,
unique identifier code to be entered separately by the individual.
The NSO will change identifier codes at least semi-annually and
maintain a record of the change for one (1) year. Card-reader
systems will be installed with an Uninterruptible Power Supply (UPS)
or have a backup system which will sustain complete operation for a
minimum of eight (8) hours. The system must also be capable of
allowing egress while denying ingress in case of a system failure.
The card-reader system must not be installed on the door of the RF-
shielded rooms but must be installed on the door of the parent room.
6.4.3 (U) Inter-Agency Access. The access roster distributed by
the NSO will be the basis for determining if an individual autho-
rized CHOSUN facility access at one node will be automatically
allowed access to a CHOSUN facility at another node. If the visitor
is approved for CHOSUN access at one node but not at the node being
visited, access to the visited node may be granted at the discretion
of the visited agency.
6.4.4 (U) Non-Approved Personnel Access. Access by non-CHOSUN-
approved personnel will be held to an absolute minimum, consistent
with operational needs of the CHOSUN network, and under the con-
straints indicated below. A record of such visits will be made and
maintained for one (1) year. This record will include the name,
organization, date, time entered, time departed, purpose of visit,
and signature of escort. Each node shall coordinate with the
Network Security Officer prior to granting access to
non-CHOSUN-approved personnel.
(U) Each CHOSUN facility will have red flashing lights installed in
the ceiling of the facility in sufficient quantities to ensure that
they are visible to all personnel working within the facility.
Prior to entry of non-CHOSUN-approved personnel into the facility,
these red lights will be activated to inform all personnel that a
non-approved person is present and the node will be disconnected
from the network. The visitor will be under constant escort by a
CHOSUN-approved individual. Badges will be issued to non-CHOSUN-
approved individuals. These badges must conspicuously indicate that
the individual is non-CHOSUN approved. These badges must be worn on
6-4
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
an exterior garment, above waist level.
6.4.5 (U) Badges. Control and issuance of badges and identifi-
cation numbers are the responsibility of each node; however, certain
procedures must be followed in order to ensure the integrity of the
access control system. These procedures include the following:
a. (U) All issued badges will be accounted for by receipt to
include the signature of the individual who has been issued
the badge.
b. (U) All unissued badges will be stored in a separate
locked container within the CHOSUN facility. Unissued
badges will be inventoried monthly.
c. (U) All individual identifier codes must be randomly
computer generated, from within the CHOSUN facility.
d. (U) All individual identifier codes which have been issued
will be listed in a roster separate from the badge issuance
receipt system and sealed in a double envelope within the
container where blank badges are maintained.
e. (U) The central processing unit of the card-reader system
will be stored within the CHOSUN facility and locked in a
manner to preclude tampering.
f. (U) All lost or stolen badges will be immediately reported
to the issuing authority. The issuing authority will void
both the badge and identification number from the system.
g. (U) An event recorder will be connected to the central
processing unit of the card reader system which will record
all entrances, exits, invalid attempts, and alarm condi-
tions. A copy of these records will be maintained for a
period of thirty (30) days.
h. (U) Card-reader badges for access to a CHOSUN facility
should not leave the building in which the facility is
located. A system must be developed by each agency whereby
agency identification cards, building access, or other
similar identification is exchanged for the card-reader
badge. This exchange must, of course, occur outside the
CHOSUN facility, and adequate security must be provided to
this area to preclude loss or theft. (Agencies may propose
alternate methods of access control which provide the same
level of security (e.g., two-person reception area with
access roster and individual picture identification). The
DAA will approve all alternate methods via a Request for
Waiver.)
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
6.5 Equipment Delivery (U)
(U) Security problems are increased when property and material are
in transit. Loading and unloading procedures, compartmentalization
of cargoes in ships, railroad cars, aircraft, and movements of such
carriers present security hazards of varying degrees. It is
recommended that all electronic equipment and supplies be delivered
as directly as possible from the source to a neutral address at the
user agency and that the deliveries be accompanied by a qualified
security officer.
(U) To provide for the security of property and material in
transit, the responsibilities of the consignor, the carrier, and the
consignee must be clearly established. The protection of such
property and material is, in general, the responsibility of the
person who has the property in his custody. It is the responsi-
bility of the consignor to ensure that all cargo requiring security
protection is entrusted only to carriers properly cleared for
handling this cargo.
*(U) A more stringent OPSEC requirement needs to be developed for
the delivery of technical and nontechnical equipment (e.g., furni-
ture). 6-6
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
CONFIDENTIAL
SECTION 7. INFORMATION SECURITY (U)
(C) The dissemination of Project CHOSUN information must be strin-
gently controlled to protect crisis management at the national
level. Appendix C, the CHOSUN Security Classification Guide pro-
vides basic guidance for determining (1) the security classification
of CHOSUN information, and (2) schedules for downgrading or declas-
sifying information. The guide is designed to protect sensitive
information regarding the architecture, design, capabilities, and
limitations of Project CHOSUN from adversaries.
(C) Project CHOSUN related information is the property of The
National Security Council in the Executive Office of the President
of the United States. Any release of this information, either clas-
sified or unclassified, to persons outside The Executive Branch must
be approved in writing by the NSO. All documents related to Project
CHOSUN will be marked "Property of The National Security Council.
Written Approval Required for Release."
(U) The information provided in this section is extracted from
DOD 5200.1-R, Information Security Program Regulation. It provides
detailed procedures for the marking, control, and accountability of
classified information.
7.1 Marking (General Provisions) (U)
(U) Information determined to require classification protection
under this manual shall be so designated. Designation by means
other than physical marking may be used but shall be followed by
physical marking as soon as possible. Designation by physical
marking, notation, or other means serves (1) to warn the holder
about the classification of the information involved, (2) to
indicate the degree of protection against unauthorized disclo-
sure that is required for that particular level of classification,
and (3) to facilitate downgrading and declassification actions.
7.1.1 (U) Original Classification. At the time of original
classification, the following shall be shown on the face of all
originally classified documents or clearly associated with other
forms of classified information in a manner appropriate to the
medium involved:
a. (U) The identity of the original classification authority
by position title, unless he or she is the signer or
approver of the documents.
b. (U) The agency and office of origin.
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
c.
(U)
The overall classification of the document.
d.
(U)
The date or event for automatic declassification or
notation "Originating Agency's Determination Required" or
"OADR."
e.
(U) Any downgrading action to be taken and the date or
event thereof.
7.1.2 (U) Derivative Classification. At the time of derivative
classification, the following shall be shown on the face of all
derivatively classified documents or clearly associated with other
forms of classified information in a manner appropriate to the
medium involved:
a. (U) The source of classification; that is, the source
document or classification guide. If classification is
derived from more than one source, the phrase "Multiple
Sources" will be shown and the identification of each
source will be maintained with the file or record copy
of the document.
b. (U) The agency and office of the derivatively classified
document.
c. (U) The overall classification of the document.
d. (U) The date or event for declassification or the notation
"Originating Agency's Determination Required" or "OADR,"
carried forward from the classification source. If the
classification is derived from multiple sources, either
the most remote date or event for declassification marked
on the sources or if required by any source, the notation
"Originating Agency's Determination Required" or "OADR"
shall be shown.
e. (U) Any downgrading action to be taken and the date or
event thereof.
7.1.3 (U) Identification of Classification Authority. Identifi-
cation of a classification authority shall be shown on the "Classi-
fied by" line and shall be sufficient, standing alone, to identify
a particular official, source document or classification guide.
(U) If any information in a document or material is classified as
an act of original classification, the classification authority who
made the determination-shall be identified on the "Classified by"
line unless the classifier is also the signer or approver of the
document.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
(U) If the classification of all information in a document or
material is derived from a single source (for example, a source
document or classification guide), the "Classified by" line shall
identify the source document or classification guide, including
its date when necessary to ensure positive identification.
(U) If the classification of information contained in a document or
material is derived from more than one source document, classifica-
tion guide, or combination thereof, the "Classified by" line shall
be marked "Multiple Sources" and identification of all such sources
shall be maintained with the file or record copy of the document.
(U) If an official with requisite classification authority has been
designated by the head of an activity to approve security classifi-
cation assigned to all information leaving the activity, the title
of that designated official shall be shown on the "Classified by"
line. The designated official shall maintain records adequate to
support derivative classification actions.
7.1.4 (U) Declassification and Regrading Procedures. Whenever
classified information is downgr a or declassified earlier than
originally scheduled, or upgraded, the material shall be marked
promptly and conspicuously to indicate the change, the authority
for the action, the date of the action, and the identity of the
person taking the action. In addition, except for upgrading, prior
classification markings shall be cancelled, if practicable, but in
any event those on the first page, and the new classification mark-
ings, if any, shall be substituted. When classified information
is downgraded or declassified in accordance with the assigned down-
grading and declassification markings, such markings shall be a
sufficient notation of the authority for such action.
7.1.5 (U) implying Derivative Declassification Dates. New material
that derives its classification from information classified on or
after August 1, 1982, shall be marked with the declassification date,
event, or the notation "Originating Agency's Determination Required"
or "OADR" assigned to the source information.
(U) New material that derives its classification from information
classified prior to August 1, 1982, shall be treated as follows:
a. (U) If the source material bears a declassification date
or event, that date or event shall be carried forward to
the new material.
b. (U) If the source material bears no declassification date
or event or bears an indeterminate date or event such as
"Upon Notification by Originator," "Cannot be Determined,"
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
or "Impossible to Determine," or is marked for declassifi-
cation review, the new material shall be marked with the
notation "Originating Agency's Determination Required" or
"OADR."
c. (U) If the source material is foreign Government informa-
tion bearing no date or event for declassification or is
marked for declassification review, the new material shall
be marked with the notation "Originating Agency's Determi-
nation Required" or "OADR."
(U) New material that derives its classification from a classifica-
tion guide issued prior to August 1, 1982, that has not been updated
to conform with this Regulation shall be treated as follows:
a. (U) If the guide specifies a declassification date or
event, that date or event shall be applied to the new
material.
b. (U) If the guide specifies a declassification review date,
the notation "Originating Agency's Determination Required"
or "OADR" shall be applied to the new material.
7.1.6 (U) Upgrading. When material is upgraded, it shall be
promptly and conspicuously marked as prescribed, except that in
all such cases the old classification markings shall be cancelled
and new markings substituted.
7.1.7 (U) Dissemination and Reproduction Notice. Classified infor-
mation that the originator has determined to be subject to special
dissemination or reproduction limitations, or both, shall include,
as applicable, a statement or statements on its cover sheet, first
page or in the text, substantially as follows:
"Reproduction requires approval of originator. Further dis-
semination only as directed by (Insert appropriate office
or official)."
7.2 Marking Documents (U)
7.2.1 (U) Overall and Page Marking. Except as otherwise speci-
fied for working papers, the overall classification of a document,
whether or not permanently bound, or any copy or reproduction there-
of, shall be conspicously marked, stamped or affixed permanently at
the top and bottom on the outside of the front cover (if any), on the
title page (if any), on the first page, and on the outside of the
back cover (if any). Each interior page shall be marked top and
bottom according to its content. Alternatively, the overall classi-
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
fication of the document may be conspicuously marked or stamped at
the top and bottom of each interior page when such marking is neces-
sary to achieve production efficiency and the particular information
to which classification is assigned is otherwise sufficiently identi-
fied. In any case, the classification marking of a page shall not
supersede the classification marking of portions of the page marked
with lower levels of classification.
7.2.2 (U) Marking Components. The major components of some complex
documents are likely to be used separately. In such instances, each
major component shall be marked as a separate document. Examples
include each annex, appendix, or similar component of a plan, program
or operations order; attachments and appendices to a memorandum or
letter; each major part of a report.
7.2.3 (U) Portion Marking. Each section, part, paragraph, or simi-
lar portion of a -classified document shall be marked to show the
level of classification of the information contained in or revealed
by it, or that it is unclassified. Portions of documents shall be
marked in a manner that eliminates doubt as to which of its portions
contains or reveals classified information. Classification levels
of portions of a document shall be shown by the appropriate classi-
fication symbol placed immediately follow' er aoaa-s_1zt er or
number, or in the absenR s or numbers, immediately before
the beginning of the portion. In marking sections, parts, paragraphs
or similar portions the parenthetical symbols "(TS)" for TOP SECRET,
"(S)" for SECRET, "(C)" for CONFIDENTIAL, and "(U)" for UNCLASSIFIED,
shall be used. When appropriate, the symbols "RD" for Restricted
Data and "FRD" for Formerly Restricted Data shall be added, for
example, "(S-RD)" or "(C-FRD)." In addition, portions that con-
tain Critical Nuclear Weapon Design Information (CNWDI) will be
marked "(N)" following the classification, for example, "(S-RD) (N)."
(U) Illustrations, photographs, figures, graphs, drawings, charts,
and similar portions of classified documents will be clearly marked
to show their classification or unclassified status. Such markings
shall not be abbreviated and shall be prominent and placed within
or contiguous to the portion. Captions of such portions shall be
marked on the basis of their content also by placing the symbol
"(TS)," "(S)," "(C)," or "(U)" immediately preceding the caption.
(U) If, in an exceptional situation, parenthetical portion marking
is determined to be impracticable, the document shall contain a
statement sufficient to identify the information that is classified
and the level of such classification. Thus, for example, each por-
tion of a classified document need not be separately marked if all
portions are classified at the same level, provided a statement to
that effect is included in the document.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
(U) When elements of information in one portion require different
classifications, but segregation into separate portions would destroy
continuity or context, the highest classification required for any
item shall be applied to that portion or paragraph.
7.2.4 (U) Compilations. When classification is required to protect
a compilation of information, the overall classification assigned to
such documents shall be placed conspicuously at the top and bottom of
each page and on the outside of the front and back covers, if any,
and an explanation of the basis for the assigned classification shall
be included on the document or in its text.
7.2.5 (U) Subjects and Titles of Documents. Subjects and titles of
classified documents shall be marked with the appropriate symbol,
"(TS)," "(S)," "(C)," or "(U)" placed immediately following and to
the right of the item. When applicable, other appropriate symbols,
for example, "(RD)" or "(FRD)" shall be added.
7.2.6 (U) File, Folder, or Group of Documents. When a file,
folder, or group of classified documents is removed from secure
storage, it shall be marked conspicuously with the highest classifi-
cation of any classified document included therein or shall have an
appropriate classified document cover sheet affixed.
7.2.7 (U) Transmittal Document. A transmittal document, including
endorsements and comments when such endorsements and comments are
added to the basic communications, shall carry on its face a promi-
nent notation of the highest classification of the information trans-
mitted by it, and a legend showing the classification, if any, of the
transmittal document, endorsement, or comment standing alone. For
example, an unclassified document that transmits as an attachment a
classified document shall bear a notation substantially as follows:
"UNCLASSIFED WHEN SEPARATED FROM CLASSIFIED ENCLOSURE."
7.3 Marking Classified Information Other Than Documents (U)
(U) Security classification and applicable associated markings
assigned by the classifier shall be conspicuously stamped, printed,
written, painted, or affixed by means of a tag, sticker, decal, or
similar device, on classified material other than paper copies of
documents, and on containers of such material, if possible. If mark-
ing the material or container is not practicable, written notifica-
tion of the security classification and applicable associated mark-
ings shall be furnished to recipients. The following procedures for
marking various kinds of material containing classified information
are not all inclusive and may be varied to accommodate the physical
characteristics of the material containing the classified information
and to accommodate organizational and operational requirements.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
7.3.1 (U) Charts, Maps, and Drawings. Charts, maps and drawings
shall bear the appropriate classification marking for the legend,
title, or scale blocks in a manner that differentiates between the
overall classification of the document and the classification of
the legend or title itself. The higher of these markings shall
be inscribed at the top and bottom of each such document. When
folding or rolling charts, maps, or drawings would cover the
classification markings, additional markings shall be applied
that are clearly visible when the document is folded or rolled.
Applicable associated markings shall be included in or near the
legend, title, or scale blocks.
7.3.2 (U) Photogra hss, Films, and Recordings. Photographs, films
(including negatives), recordings, and their containers shall be
marked to assure that a recipient or viewer will know that classified
information of a specific level of classification is involved.
a. (U) Photographs. Negatives and positives shall be marked,
whenever practicable, with the appropriate classification
designation and applicable associated markings. Roll nega-
tives or positives may be so marked at the beginning and
end of each strip. Negatives and positives shall be kept
in containers bearing conspicuous classification markings.
All prints and reproductions shall be conspicuously marked
with the appropriate classification designation and appli-
cable associated markings on the face side of the print if
possible. When such markings cannot be applied to the face
side, they may be stamped on the reverse side or affixed by
pressure tape label, stapled strip, or other comparable
means. (NOTE: When self-processing film or paper is used
to photograph or reproduce classified information, all parts
of the last exposure shall be removed from the camera and
destroyed as classified waste, or the camera shall be pro-
tected as classified).
b. (U) Transparencies and Slides. Applicable classification
markings shall e sown clearly on the image of each trans-
parency or slide, if possible, or on its border, holder, or
frame. Other applicable associated markings shall be shown
on the border, holder, or frame.
c. (U) Motion Picture Films. Classified motion picture films
and video tapes shall be marked at the beginning and end of
each reel by titles bearing the appropriate classification
and applicable associated markings. Such markings shall be
visible when projected. Reels shall be kept in containers
bearing conspicuous classification and applicable associated
markings.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
bearing conspicuous classification and applicable associated
markings.
d. (U) Recordings. Sound, magnetic, or electronic recordings
shall contain at the beginning and end a clear statement of
the assigned classification that will provide adequate
assurance that any listener or viewer will know that clas-
sified information of a specified level is involved. Re-
cordings shall be kept in containers or on reels that bear
conspicuous classification and applicable associated
markings.
e. (U) Microforms. Microforms are images, usually produced
photographically on transparent or opaque materials, in
sizes too small to be read by the unaided eye. Accordingly,
the assigned security classification and abbreviated appli-
cable associated markings shall be conspicuously marked on
the microform medium or its container, so as to be readable
by the unaided eye. These markings shall also be included
on the image so that when the image is enlarged and dis-
played or printed, the markings will be conspicuous and
readable. Such marking will be accomplished as appropri-
ate for the particular microform involved. For example,
roll film microforms (or roll microfilm employing 16, 35,
70, or 105 mm films) may generally be marked as provided
for roll motion picture film.
7.3.3 (U) Decks of ADP Punched Cards. When a deck of classified
ADP punched cards is handled and controlled as a single document,
only the first and last card require classification markings. An
additional card shall be added (or the job control card modified)
to identify the contents of the deck and the highest classification
therein. Such additional cards shall include applicable associated
markings. Cards removed for separate processing or use and not
immediately returned to the deck shall be protected to prevent com-
promise of any classified information contained therein, and for
this purpose shall be marked individually.
7.3.4 (U) Removable ADP and Word Processing Storage Media.
a. (U) External. Removable information storage media on
devices, used with ADP systems and typewriters or word
processing systems, shall bear external markings clearly
indicating the classification of the information and
applicable associated markings. Include are media and
devices that store information recorded in analog or
digital form and that are generally mounted or removed by
the users or operators. Examples include magnetic tape
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
b. (U) Internal. ADP systems and word processing systems
employing such media shall provide for internal classi-
fication marking to assure that classified information
contained therein that is reproduced or generated, will
bear applicable classification and associated markings.
An exception may be made by the agency head, or designee,
for the purpose of exempting existing word processing
systems when the internal classification and applicable
associated markings cannot be implemented without exten-
sive system modification, provided procedures are
established to ensure that users and recipients of the
media, or the information therein, are clearly advised of
the applicable classification and associated markings.
7.3.5 (U) Documents Produced by ADP Equipment. At a minimum, the
first page, and the front and back covers, if any, of documents pro-
duced by ADP equipment shall be marked. Classification markings of
interior pages may be applied by the ADP equipment or by other means.
When the application of associated markings by the ADP equipment is
not consistent with economical and efficient use of such equipment,
such markings may be applied to a document produced by ADP equipment
by superimposing upon the first page of such document a "Notice of
Declassificaion Instructions and Other Associated Markings." Such
notice shall include the date or event for declassification or the
notation "Originating Agency's Determination Required" or "OADR"
and all other such applicable markings. If individual pages of a
document produced by ADP equipment are removed or reproduced for
distribution to other users, each such page or group of pages shall
be marked as prescribed, or by superimposing on each such page or
group of pages, a copy of any "Notice of Declassification Instruc-
tions and Other Associated Markings" applicable to such page or
group of pages.
7.3.6 (U) Material for Training Purposes. In using unclassified
documents or material to simulate classified documents or material
for training purpose, such documents or material shall be marked
clearly to indicate the actual unclassified status of the informa-
tion, for example, "(insert classification designation) for train-
ing, otherwise "unclassified" or "UNCLASSIFIED SAMPLE."
7.3.7 (U) Miscellaneous Material. Documents and material such as
rejected copy, typewriter ribbon, carbons, and similar items developed
in connection with the handling, processing, production, and use of
classified information shall be handled in a manner that assures ade-
quate protection of the classified information involved and destruc-
tion at the earliest practicable time. Unless a requirement exists
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
to retain this material or documents for a specific purpose, there is
no need to mark, stamp, or otherwise indicate that the information is
classified.
7.4 Additional Markings (U)
(U) The warning notices prescribed in this section shall be promi-
nently displayed on classified documents or materials, when appli-
cable. In the case of documents, these warning notices shall be
marked conspicuously on the outside of the front cover, or on the
first page if there is not a front cover. Transmittal documents,
including those that are unclassified shall also bear these addi-
tional warning notices, when applicable.
(U) When display of warning notices on other materials is not pos-
sible, their applicability to the information shall be included in
the written notification of the assigned classification.
7.4.1 (U) Wholly UNCLASSIFIED Material. Normally, unclassified
material shall not be marked or stamped "UNCLASSIFIED" unless it is
essential to convey to a recipient of such material that it has been
examined with a view to imposing a security classification and that
it has been determined that it does not require classification.
7.4.2 (U) Restricted Data. Classified documents or material con-
taining Restricted Data as defined in the Atomic Energy Act of 1954,
as amended, shall be marked as follows:
"This material contains Restricted Data as defined in the
Atomic Energy Act of 1954. Unauthorized disclosure subject
to administrative and criminal sanctions."
7.4.3 (U) Formerly Restricted Data. Classified documents or material
containing Formerly Restricted Data, as defined in section 142.d, Atomic
Energy Act of 1954, as amended, but no Restricted Data, shall be marked
as follows:
"Unauthorized disclosure subject to administrative and
criminal sanctions. Handle as Restricted Data in foreign
dissemination. Section 144.b, Atomic Energy Act, 1954."
7.4.4 (U) Special Access Program Documents and Material. Additional
markings as prescribed in directives, regulations, and instructions
relating to an approved Special Access Program shall be applied to
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
relating to an approved Special Access Program shall be applied to
documents and material containing information subject to the special
access program. Such additional markings shall not serve as the sole
basis for continuing classificaion of the documents or material to
which the markings have been applied. When appropriate, such mark-
ings shall be excised to ease timely declassification, downgrading,
or removal of the information from special control procedures.
7.4.5 (U) Intelligence Sources and Methods Information. Documents
that contain information relating to intelligence sources or methods
shall include the following marking:
"WARNING NOTICE--Intelligence Sources
or Methods Involved"
7.4.6 (U) COMSEC Material. Before release to contractors, a COMSEC
document will indicate on the title page, or first page if no title
page exists, the following notation:
"COMSEC Material - Access by Contractor Personnel Restricted
to U.S. Citizens Holding Final Government Clearance."
This notation shall be placed on COMSEC documents or material when
originated and when release to contractors can be anticipated.
Other COMSEC documents or material shall be marked in accordance
with National COMSEC Instruction (NACSI) 4005. Foreign dissemi-
nation of COMSEC information is governed by NCSC Policy Direc-
tive 14-2.
7.4.7 (U) Associated Markings. Other applicable associated mark-
ings required for documents shall be accomplished as prescribed in
this section or in any other appropriate manner.
7.5 Storage and Safekeeping (U)
7.5.1 (U) General. Classified information shall be stored only
under conditions adequate to prevent unauthorized persons from
gaining access. The requirements specified in this manual repre-
sent the minimum acceptable security standards.
7.5.2 (U) Standards for Storage Equipment. The GSA establishes
and publishes minimum standards, specifications, and supply
schedules for containers, vaults, alarm systems, and associated
security devices suitable for the storage and protection of
classified information. Heads of agencies may establish additional
controls to prevent unauthorized access. Security filing cabinets
conforming to Federal specifications bear a Test Certification Label
on the locking drawer, attesting to the security capabilities of the
7-11
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
container and lock. (On some older cabinets the label was affixed
on the inside of the locked drawer compartment.) Cabinets manu-
factured after February 1962 indicate "General Services Admini-
stration Approved Security Container" on the outside of the top
drawer.
7.5.3 (U) Storage of Classified Information. Classified infor-
mation that is not under the personal control and observation of an
authorized person will be guarded or stored in a locked security
container as prescribed below:
a. (U) TOP SECRET. TOP SECRET information shall be stored
in:
(1) (U) A safe-type steel file container having a built-
in three-position, dial-type combination lock approved
by the GSA or a Class A vault or vault-type room that
meets the standards established by the head of the
agency concerned. When located in buildings, struc-
tural enclosures, or other areas not under U.S.
Government control, the storage container, vault, or
vault-type room must be protected by an alarm system
or guarded during nonoperating hours.
(2) (U) An alarmed area, provided such facilities are
adjudged by the local responsible official, to afford
protection equal to or better than that prescribed in
a. (1) above. When an alarmed area is used for the
storage of TOP SECRET material, the physical barrier
must be adequate to prevent (1) surreptitious removal
of the material, and (2) observation that would result
in the compromise of the material. The physical bar-
rier must be such that forcible attack will give evi-
dence of attempted entry into the area. The alarm
system must provide immediate notice to a security
force of attempted entry. Under field conditions,
the field commander will prescribe the measures deemed
adequate to meet the storage standards contained in
a. (1) and (2) above.
b. (U) SECRET and CONFIDENTIAL. SECRET and CONFIDENTIAL
information shall be stored in the manner prescribed
for TOP SECRET; or in a Class B vault, or a vault-type
room, strong room, or secure storage room that meets
the standards prescribed by the head of the agency.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
7.5.4 (U) Designations and Combinations.
a. (U) Numbering and Designating Storage Facilities. There
shall be no external mark as to the level of classified
information authorized to be stored therein. For identi-
fication purposes each vault or container shall bear
externally an assigned number or symbol.
b. (U) Combination to Containers.
(1) (U) Changing. Combinations to security containers
shall be changed only by individuals having that
responsibility and an appropriate security clearance.
Combinations shall be changed:
(a) (U) When placed in use.
(b) (U) Whenever an individual knowing the combina-
tion no longer requires access.
(c) (U) When the combination has been subject to
possible compromise.
(d) (U) At least semiannually.
(e) (U) When taken out of service.
(U) Built-in combination locks shall be reset to the
standard combination 50-25-50; combination padlocks
shall be reset to the standard combination 10-20-30.
(2) (U) Classifying Combinations. The combination of a
vault or container used for the storage of classified
information shall be assigned a security classification
equal to the highest category of the classified infor-
mation authorized to be stored therein.
(3) (U) Recording Storage Facility Data. A record shall
be maintained for each vault, secure room or container
used for storing classified information, showing
location of the container, the names, home addresses,
and home telephone numbers of the individuals having
knowledge of the combination.
(4) (U) Dissemination. Access to the combination of a
vault or container used for the storage of classified
information shall be granted only to those individuals
who are authorized access to the classified information
stored therein.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
c. (U) Electrically Actuated Locks. Electrically actuated
locks (for example, cypher and magnetic strip card
locks) do not afford the required degree of protection
of classified information.
7.6 Accountability and Control (U)
7.6.1 (U) Procedures for Handling TOP SECRET Information. Agencies
shall establish the following procedures for handling TOP SECRET
information.
7.6.1.1 (U) Control. TOP SECRET Control Officers and alternates
shall be designated within offices to be responsible for receiving,
dispatching, and maintaining an accountability register of TOP
SECRET documents. Such individuals shall be selected on the basis
of experience and reliability, and shall have appropriate security
clearances.
7.6.1.2 (U) Accountability
a. (U) TOP SECRET Registers. TOP SECRET accountability regis-
ters shall be maintained by each office originating or
receiving TOP SECRET information. Such registers shall be
retained for 5 years and shall, as a minimum, reflect the
following:
(1)
(U)
Sufficient information to identify adequately the
TOP SECRET document or material to include the title
or appropriate short title, date of the document, and
identification of the originator.
(2)
(U)
The date the document or material was received.
(3)
(U)
The number of copies received or later reproduced.
(4)
(U)
The disposition of the TOP SECRET document or
material and all copies of such documents or material.
b. (U) Serialization. Copies of TOP SECRET documents and
material shall be numbered serially.
c. (U) Disclosure Records. Each TOP SECRET document or item
of material shall have appended to it a TOP SECRET disclo-
sure record. The name and title of all individuals, includ-
ing stenographic and clerical personnel to whom information
in such documents and materials has been disclosed, and the
date of such disclosure, shall be recorded thereon. Disclos-
ures to individuals who may have had access to containers
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
in which TOP SECRET information is stored, or who regularly
handle a large volume of such information need to be so re-
corded. Such individuals, when identified on a roster, are
deemed to have had access to such information. Disclosure
records shall be retained for 2 years after the documents
or materials are transferred, downgraded, or destroyed.
d. (U) Inventories. All TOP SECRET documents and material
shall be inventoried at least once annually. The inventory
shall reconcile the TOP SECRET accountability register with
the documents or material on hand. At such times, each
document or material shall be examined for completeness.
Agency officials may authorize the annual inventory of TOP
SECRET documents and material in repositories, libraries, or
activities that store large volumes of TOP SECRET documents
or material to be limited to documents and material to which
access has been granted within the past year, and 10 percent
of the remaining inventory.
e. (U) Retention. TOP SECRET information shall be retained
only to tie extent necessary to satisfy current requirements.
Custodians shall destroy nonrecord copies of TOP SECRET docu-
ments when no longer needed. Record copies of documents that
cannot be destroyed shall be reevaluated and, when appropri-
ate, downgraded, declassified, or retired to designated
records centers.
f. (U) Receipts. TOP SECRET documents and material will be
accounted for by a continuous chain of receipts.
7.6.2 (U) Procedures for Handling SECRET Information. Adminis-
trative procedures shall be established controlling SECRET material
originated or received by an activity; distributed or routed to a
sub-element of such activity; and disposed of by the activity by
transfer of custody or destruction. The control system for SECRET
must be determined by the practical balance of security and operating
efficiency.
7.6.3 (U) Procedures for Handling CONFIDENTIAL Information. Admini-
strative controls shall be established to protect CONFIDENTIAL infor-
mation received, originated, transmitted, or stored by an activity.
7.6.4 (U) Procedures for Handling Working Papers. Working papers
are documents and material accumulated or created in the preparation
of finished documents and material. Working papers containing clas-
sified information shall be:
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
a. (U) Dated when created.
b. (U) Marked with the highest classification of any
information contained therein.
c. (U) Protected in accordance with the assigned
classification.
d. (U) Destroyed when no longer needed.
e. (U) Accounted for, controlled, and marked in the manner
prescribed for a finished document of the same classi-
fication when any of the following occurs:
(1) (U) Released by the originator outside the activity
or transmitted electrically or through message center
channels within the activity.
(2)
(U)
Retained more than 90 days from date of origin.
(3)
(U)
Filed permanently.
(4)
(U)
TOP SECRET information contained therein.
7.6.5 (U) Receipt of Classified Material. Procedures shall be
developed within agencies to protect incoming mail, bulk shipments,
and items delivered by messenger until a determination is made
whether classified information is contained therein. Screening
points shall be established to limit access to classified infor-
mation to cleared personnel.
7.6.6 (U) Restraint on Reproduction. Portions of documents and
materials that contain TOP SECRET information shall not be repro-
duced without the consent of the originator or higher authority.
Any stated prohibition against reproduction shall be strictly
observed. The following measures apply to reproduction equipment
and to the reproduction of classified information.
a. (U) Copying of documents containing classified infor-
mation shall be minimized.
b. (U) Officials authorized to approve the reproduction of
TOP SECRET information shall be designated by position
title and shall review the need for reproduction of
classified documents and material with a view toward
minimizing reproduction.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
c. (U) Specific reproduction equipment shall be designated
for the reproduction of classified information. Rules for
reproduction of classified information shall be posted on
or near the designated equipment.
d. (U) Notices prohibiting reproduction of classified infor-
mation shall be posted on equipment used only for the
reproduction of unclassified information.
e. (U) Agencies shall ensure that the equipment used for
reproduction of classified information does not leave
latent images in the equipment or on other material.
f. (U) All copies of classified documents reproduced for any
purpose, including those incorporated in a working paper,
are subject to the same controls prescribed for the docu-
ment from which the reproduction is made.
g. (U) Records shall be maintained to show the number and
distribution of reproduced copies of all TOP SECRET
documents, of all classified documents covered by special
access programs distributed outside the originating agency,
and of all SECRET and CONFIDENTIAL documents that are
marked with special dissemination and reproduction
limitations.
7-17
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
7-18
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
SECTION 8. ADP SECURITY (U)
8.1 General (U)
(U) This section presents the ADP considerations necessary to pro-
vide requisite computer and network security. The requirements are
derived from DCID 1/16.
8.2 Hardware (U)
8.2.1 (U) Design, Development, Installation, Maintenance, and
Modification. All hardware will be procured and distributed by the
CHOSUN program office. All hardware will be tested for stand-alone
operation and for network operation within the CHOSUN design, engi-
neering, and integration facility prior to delivery and installation
at a node. Initial installation at a site will be done by the
CHOSUN contractor under the cognizance of the CHOSUN program manage-
ment office and persons responsible for security at that site.
(U) Maintenance of the hardware will be coordinated with the CHOSUN
NSO, NISSO, or HISSO affected. A record of all visits by mainte-
nance personnel shall be made and retained for one (1) year. (See
section 5, Personnel Security, and section 6, Physical Security,
for specific clearance requirements for maintenance and service
personnel.)
(U) Modification to the hardware must not be undertaken indepen-
dently by the nodes. Any modifications that are deemed necessary
must be reviewed and approved by the CHOSUN NCWG in accordance with
the CHOSUN Configuration Management Plan. Major modifications will
require recertification of the network by the NCWG and reaccredita-
tion by the DAA. (See section 4.10, Schedule for Recertification
and Reaccreditation.
8.2.2 (U) Configuration Management. The CHOSUN program office will
provide all sites with a SOP manual that contains a detailed
checklist of procedures to be employed by the nodes. This includes
the setting of all hardware switches, the powering up and down of
each individual device, the loading of the configured system with
standard software and firmware, system operating procedures, and
shutdown and restart procedures.
(U) The SOP will also include the optional procedures for purging
and disconnecting components of the node system in order to inter-
face with ADP systems or communications networks outside the CHOSUN
network which may be operating at a lower classification level. (A
"port-connected" alert will be placed on all conference User Control
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
Terminals (UCTs) for all word processing or graphic external inter-
connections.) In addition, procedures for reconnecting node compo-
nents, after processing at a lower classification level, will be
included. The SOP is primarily an operations manual, but its
existence and strict adherence to the procedures it sets forth are
essential to overall system security.
(U) Where node procedures vary from the SOP, each node is respons-
ible for preparing and submitting for NCWG review the text for node-
unique procedures. With the concurrence of the NCWG, node-unique
procedures will be included as an addendum to the SOP. Any proposed
changes to the standard hardware/software may impact operational
procedures. Therefore, as previously stated, all proposed changes
will be reviewed and evaluated by the configuration manager at the
nodes and submitted to the NCWG for approval before incorporation
into the SOP.
(U) A unique SOP will be developed for use at the hub. The topics
covered will be the same, but hub specifics will differ.
8.2.3 (U) System Clearing Procedures. At the termination of a
conference, all user data will be purged from the system. This will
normally include all removable media. In special cases, and then
only with the concurrence of the conference originator, removable
media may be removed before the clearing process. After system
clearing, removable media will be removed, marked appropriately if
not marked, and stored in a secure container. Clearing of memory
will be initiated by software at the hub.
8.3 Software (U)
(U) Software utilized in CHOSUN will be largely off-the-shelf soft-
ware with a limited amount of software newly developed by the vendor.
This section describes the procedures for developing, testing, and
controlling the software.
8.3.1 (U) System and Application Software Design, Development,
Installation Maintenance, and Modification. All software utilized
within the H UN network will be provided by the CHOSUN program
office. Sites may not modify or add to the software package
provided.
(U) The system consisting of commercial and newly developed software
must be tested and shown to satisfy the CHOSUN security requirements.
(U) All CHOSUN-developed software must be developed in a secure
environment and maintained under strict configuration management.
Those personnel responsible for the design and development of
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
software have the best knowledge of its possible weaknesses. There-
fore, all personnel (contractor and Government) who are involved in
the design and/or development of any software that is not commer-
cially available, shall have as a minimum, a TOP SECRET clearance.
Work shall be done in a classified environment and all listings
shall be labeled SECRET.
a. (U) Security specifications for each new system release
will be developed by the Program Management Office, coor-
dinated with the NSO, and approved by the NCWG prior to
development.
b. (U) In-process design reviews for new system releases will
be conducted by the Program Management Office in coordina-
tion with the NSO and NCWG to ascertain that the proposed
design meets the approved specifications. The results of
the design review will be fully documented and maintained
as official records of the Program Management Office.
c. (U) System tests of new system releases will be conducted
by the Program Management Office to demonstrate the func-
tionality and stability of the new system release and that
the system meets the approved security specifications.
Tests will be designed by the Program Management Office,
coordinated with the NSO, and approved by the NCWG. For
the purposes of this testing, it will be assumed that the
security features of the software can be penetrated under
serious and sustained efforts. The purpose of these tests
will not be to prove the integrity of the software and its
ability to withstand penetration efforts but rather to as-
certain that the security features function correctly under
normal constraints. The testing should answer questions
such as:
(1) (U) Is residue on scratch mass storage cleared
during allocation?
(2) (U) Do security caveats print correctly?
(3) (U) Are users and terminals properly identified?
(4) (U) Does the system properly detect and respond
to security incidents?
(5) (U) Are all audit reports relating to security
correct?
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
(6) (U) Do new security interfaces developed for this
release function correctly?
(U) Testing shall be conducted on development copies of the system
against unclassified test data bases. The volume and variety of test
data and the extent of testing shall be sufficient to ensure that the
system will function in a cohesive, identifiable, predictable, and
reliable manner. Upon completion of the test, the test results will
be fully documented and maintained as part of the official records of
the Program Management Office. Prior to installation of new system
releases, the NCWG will certify that the system meets the documented
and approved specifications and that results of the test demonstrate
that the security provisions are adequate.
(U) To preclude the inadvertent disclosure of classified information
to maintenance personnel, any node undergoing maintenance will be
offline from the network. In addition, any maintenance which
requires accessing any system dumps will be performed by maintenance
personnel with the requisite clearance to see any classified which
may be contained therein (see section 5, Personnel Security). The
NISSO/HISSO will be notified of all requirements for maintenance
personnel, and a record of such visits will be made and retained for
one year.
8.3.2 (U) Configuration Management. The software utilized at the
nodes is limited to that supplied by the CHOSUN program office. All
CHOSUN-developed software shall be classified SECRET. All new re-
leases will be delivered and installed by contractor personnel sup-
porting the CHOSUN Program Management Office. The NISSO shall be
responsible for assuring that the software is stored in a secure
container.
(U) The Program Management Office shall maintain an operational and
a developmental set of system software. In addition, a prior release
of the system shall be retained as backup. Backup copies of the
operating system and utilities will also be available at all nodes
and the hub. All proposed software modifications must be reviewed
and approved in accordance with the CHOSUN Configuration Management
Plan. The proposed change will be reviewed by the Configuration
Review Board to determine if the proposed modification significantly
affects security. All new software releases will be subjected to
design reviews and testing as identified in section 8.3.1. Inter-
release of individual changes (software patches) that significantly
impact security shall be distributed only with the approval of the
NSO after favorable evaluation of test results.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
(U) A software modification shall be considered to significantly
affect security if modules performing any of the following functions
are being altered:
a. (U) Audit.
b. (U) Authentication.
c. (U) Labeling.
d. (U) User identification.
e. (U) Privacy keying.
8.4 Audit Trails (U)
(U) The NSO shall examine the audit trails for the network on a
daily basis. The authority for any unexpected use of the network
shall be investigated. The users identified by the system audit
trail shall be compared to the facility lock audit trail.
(U) Audit trails shall be maintained at each node and at the hub,
and shall be retained for one year. The audit trails should be kept
in machine-readable form and may be consolidated if desired.
(U) The hub audit trail shall, at a minimum, record the following
information:
a. (U) Date and time of conference.
b. (U) Identity of individual who scheduled the conference.
c. (U) Participants in conference (nodes).
d. (U) Duration of conference.
e. (U) Unclassified name of conference (assigned by
scheduler).
f. (U) Classification of conference.
g. (U) Media used (e.g., voice, word processing).
h. (U) File and data tranfers, to include file name, sender,
number of box pages or freeze-frame screens transmitted,
and receiving users.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
i. (U) Date authorized for release (i.e., printing, storing
on a floppy disk).
(U) The node audit trail shall include, at a minimum, the following
information:
a. (U) Date and time of conference.
b. (U) Participants (individuals) at the node.
c. (U) Name of conference.
d. (U) Identification and classification of media utilized
as input or created as output.
e. (U) The classification, time sent, and destination
of all data leaving the node.
f. (U) Date authorized for release (i.e., printing or
storing on a floppy disk).
8.5 ADP Products and Storage Media (U)
8.5.1 (U) Marking, Storage, and Control/Accountability. All ADP
products (e.g., printed listings, documents, hard copy printouts of
CRT displays) and storage media (e.g., disk packs, magnetic tapes,
diskettes) shall be marked, stored, and controlled in accordance with
the requirements prescribed for the highest level of classification
and sensitivity of any information contained in the product or stored
on the media.
8.5.1.1 (U) Marking:
a. (U) ADP Products. All classified ADP products shall be
marked as prescribed below. Detailed procedures are pro-
vided in section 7. In addition, to provide a means for
controlling the products, all classified ADP products should
also be marked with the originator and a unique identifier.
To facilitate the proper safeguarding of products that cannot
have their assigned classification/sensitivity immediately
verified, the classification of the system environment in
which the product was produced should also be clearly indi-
cated on the front of the ADP product.
(1) (U) Printed Listings. Listings containing classified
information shall be marked with the intended security
classification on the top and bottom of each page.
The classification markings may be applied by the ADP
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
equipment or by other means. The front cover should
be marked with the safeguard statement as shown in
figure 8-1. Each page should be appropriately numbered,
and the user is responsible for checking the continuity
of page numbering as soon as practicable after receipt.
This review will reduce the possibility of accidental
distribution of material classified at a higher level
than the basic listing.
(2) (U) CRT Displays. The system shall display the appro-
priate classification level and caveats on the CRT
screen when a file is initially opened. If a hard copy
of the CRT display is made, the user is responsible for
adding the required security classification at the top
and bottom of each page.
b. (U) Storage Media. All storage media (e.g., magnetic
tapes, disks, disk packs, diskettes) shall be externally
marked with their overall security classification, special
access restrictions, and a permanently assigned identifi-
cation/control number.
(1) (U) Magnetic Tapes. In addition to the above-stated
minimum requirements, each magnetic tape shall have a
gummed label affixed containing, at least, the name of
the owner of the tape, date of creation, tape classi-
fication, identification of the tape contents, and the
tape identification/control number.
(2) (U) Removable Disk Packs. Removable disk packs shall
be marked with the same information required for mag-
netic tapes. The identification control number shall
be marked directly on the hub of the disk pack.
CAUTION: Care must be taken not to attach any labels
that would destroy the balance of the disk pack and
cause a disk crash. Use of a magic marker is best for
marking the pack itself. Gummed labels shall be af-
fixed to the top of the disk pack cover to control
information.
(3) (U) Other Media. All other media shall be conspicu-
ously marked on their covers with the minimum infor-
mation described above.
8.5.1.2 (U) Storage. All classified information (ADP products and
storage media) must be stored in accordance with requirements for the
highest classification and sensitivity of the information being
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
SAFEGUARD STATEMENT
HANDLE AS TOP SECRET SI/ / / INFORMATION UNTIL SIGNED BY
INDIVIDUAL WHO HAS DETERMINED THAT THE SECURITY CLASSIFICATION OF
THIS DOCUMENT IS APPROPRIATELY MARKED AND THAT THE DOCUMENT CAN
ASSUME THE HANDLING REQUIREMENTS FOR THAT CLASSIFICATION. REPORT
ANY UNUSUAL OR UNREQUESTED OUTPUT DISCREPANCIES IMMEDIATELY TO:
(INFORMATION SYSTEM SECURITY OFFICER, ROOM NUMBER, PHONE NUMBER).
I HAVE REVIEWED THIS DOCUMENT AND BASED ON THE CONTENT FOUND IT
SHOULD BE CLASSIFIED:
SIGNATURE DATE
UNCLASSIFIED
Figure 8-1. (U) Safeguard Statement
8-8
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
stored. Facilities for both open and closed storage of classified
information may be provided at each node. The NISSO will be
responsible for determining what information may be maintained in
an open storage facility. All other classified information, to
include all storage media and all network/system software, will be
maintained in a closed storage facility. Section 7.5, Storage and
Safekeeping, states the security requirements for the storage and
safekeeping of classified information.
8.5.1.3 (U) Control and Accountability. Control and accountabil-
ity procedures must be established for all classified informa-
tion. General procedures for control and accountability of ADP
products and storage media are provided below. Detailed procedures
are provided in section 7.6, Accountability and Control.
a. (U) ADP Products. The user shall receipt for all classi-
fied material received from the network. The user is
responsible for initiating formal accountability controls
for the products received. ADP products will be marked
on their front cover with a safeguard statement (see
figure 8-1). The user will be responsible for protecting
ADP products marked with the safeguard statement as appro-
priate for the highest classification and all categories
of data that were contained in the ADP system at the time
the product was produced. After reviewing the output
product, verifying its actual classification, and com-
pleting the safeguard statement, the customer may control
the product at its actual classification.
b. (U) Storage media. Procedures for maintaining an inven-
tory of all removable storage media shall be estab-
lished. As a minimum, the inventory listing should
contain the identification/control number, the highest
security classification/special category caveats, and date
of creation of the device. The inventory listing shall be
verified at least annually. Devices classified SECRET and
below should also be verified at least annually.
8.5.2 (U) Erase, Declassification, and Destruction Procedures.
8.5.2.1 (U) Erase Procedures. At the end of each conference,
each memory location of the processor and the special devices shall
be overwritten to preclude the unauthorized disclosure of classi-
fied data. The CHOSUN network software will provide the capability
for automatically overwriting areas of memory and the disks which
may be used to store data. Erased memory units and storage media
must still be protected in accordance with the requirements for the
highest classification and sensitivity of the information that
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
was stored, until the declassification procedures outlined in
section 8.5.2.2 have been applied.
8.5.2.2 (U) Declassification Procedures. Each node shall have on
site the necessary programs, equipment, and procedures for
declassifying all ADP equipment that may be used for processing or
storing classified material.
(U) When any of the memory units or storage media are removed from
the controlled environment, the following declassification proce-
dures apply:
a. (U) Magnetic Tapes. Appendix I lists the names and model
numbers of magnetic tape erase equipment that are approved
for declassifying magnetic tapes. Detailed specifications
for erasing magnetic storage media are contained in appen-
dix J, Specifications for Magnetic Tape Erase Equipment.
b. (U) Magnetic Disks and Disk Packs (Operative). When the
capability exists as an integral part of the storage sub-
system, an AC/DC erase will be applied to all data tracks
before the tracks are overwritten a minimum of three times
and the overwrite is verified. Appendix K lists approved
disk/disk pack degaussers. Thereafter, all storage loca-
tions will be overwritten a minimum of three times: once
with the binary digit "1," once with the binary digit "0,"
and once with a single numeric, alphabetic, or special
character. Such alphanumeric or other UNCLASSIFIED data
shall be left on the device. The current electrical used
in overwriting must be equal to or greater than that used
in recording the information, but of a strength that will
not damage or impair the equipment.
c. (U) Magnetic Disks and Disk Packs (Inoperative). If the
storage media has failed in such a manner that it cannot
be overwritten, the media may be declassified by one of
the following methods:
(1) (U) Expose the recording surface(s) to a permanent
magnet having a field strength at the recording sur-
face of at least 1,500 oersted. Care must be taken
to ensure that the entire surface is wiped at least
three times by a nonuniform motion of the magnet.
Care must also be taken to assure that all tracks
are covered by the center of the magnet. A thin
sheet of clear plastic (1-5 mil sheet) should be
used to prevent damage to the recording surface(s).
8-10
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
(2) (U) Disassemble the platters from the disk pack.
Sand off the recording surfaces,on both sides of
the platter.
(3) (U) Disassemble the platters from the disk packs.
Use a torch and burn off the recording surfaces on
both sides of the platters.
(4) (U) Disassemble the platters from the disk pack.
Sand off the recording surfaces on both sides of
the platters and spray paint the recording surfaces.
d. (U) Internal Memory. Hardware/software techniques for
the declassification of internal memory will be provided as
part of the system. See section 8.2.3, System Clearing
Procedures.
e. (U) Magnetic Storage Media Used To Store Analog, Video,
or Similar Nondi ital Information. Magnetic tape used to
record analog, video, or similar types of nondigital infor-
mation may be declassified by degaussing as in paragraph
8.5.2.2.a Rigid magnetic storage surfaces may be declas-
sified as in paragraph 8.5.2.2.b above, except that the
UNCLASSIFIED overwriting signal must be analog instead of
binary, with the latter recording left intact on the
device. In the case of a failure of the degausser or the
overwriting methods, a permanent magnet may be used as in
paragraph 8.5.2.2.c above for rigid recording surfaces.
8.5.2.3 (U) Destruction Procedures. Appendix L specifies approved
devices for the physical destruction of all classifed paper waste.
In addition, the following paragraphs define the procedures for the
destruction of classified ADP products and storage media.
a. (U) ADP Products. Classified documents and material shall
be destroyed by burning, or with the approval of the NISSO/
HISSO by melting, chemical decomposition, pulping, pulver-
izing, shredding, or mutilation sufficient to preclude
recognition or reconstruction of the classified information.
Records of destruction are required for compartmented, TOP
SECRET, and SECRET information. The record shall be dated
and signed at the time of destruction by two witnesses for
compartmented and TOP SECRET information and one witness for
SECRET. In the case of information placed in burn bags for
central disposal, the destruction record need only be signed
by the witnessing official or officials when the information
is so placed. Records of destruction shall be maintained
for a minimum of two years. In individual cases involving
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
SECRET information, the NISSO/HISSO may waive the require-
ment for destruction records if compliance would create an
unacceptable degree of operating inefficiency.
(U) Classified waste, such as handwritten notes, carbon
paper, printer ribbons, and working papers, shall also
be destroyed when no longer needed by a method described
above. Destruction records are not required.
b. (U) Storage media. Storage media that cannot be declassi-
fied in accordance with section 8.5.2.2 Declassification
Procedures, may be destroyed by burning or, with the
approval of the NSO, by melting, chemical decomposition,
pulping, pulverizing, shredding, or mutilation.
8.5.2.4 (U) Disposition/Destruction Approval. With the specific
approval in each case of the NISSO, storage media declassified in
accordance with the procedures described in paragraph 8.5.2.2 may
be handled as UNCLASSIFIED and released as necessary.
(U) A record of the declassification of storage media and the NISSO/
HISSO approval shall be maintained for a period of two years after
disposition of the devices or equipment.
(U) Guidance for the declassification of storage media not covered
in section 8.5.2.2 may be obtained by submission of all pertinent
details to the NSO for consideration on a case-by-case basis.
(U) In the absence of data eradication by approved equipment or
procedures, or at the direction of the NSO, storage media shall
be safeguarded in the manner prescribed for the highest classi-
fication, and for each special category, ever recorded thereon
until it is destroyed.
(U) All labels and security classification markings shall be removed
from the magnetic storage media after declassification but before
release as UNCLASSIFIED.
8.6 Access Controls (U)
8.6.1 (U) General. Each individual user of the system, including
personnel utilizing CHOSUN word processing equipment, will have a
unique UNCLASSIFIED USERID assigned. The NSO is responsible for
maintaining USERIDs, as well as generating and distributing the log-
on passwords for each USERID for network access. In addition, the
NISSO is responsible for generating and distributing USERIDs and
log-on passwords for the word processor at the node. All passwords
will be stored in an approved security container. A password-gene-
8-12
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
rating program may be utilized if approved by NSA.
(U) Official requests for individual(s) access will be submitted in
accordance with the procedures identified in section 5. The NSO will
act as central custodian of all system/network access authorization
requests and will notify the appropriate NISSO/HISSO or PMO of
approvals/disapprovals. The NISSO/HISSO will install a USERID and
password on the node's word processor for each CHOSUN user for his
node.
8.6.2 (U) Changes. Log-on passwords will be deleted or changed
under any of the following conditions:
a. (U) When an individual's access is withdrawn for any
reason (e.g., transfer, discharge, reassignment). In
a normal situation, individual access is withdrawn
before clearance is revoked.
b. (U) When a password or record of passwords has been
compromised or is suspected of being compromised.
c. (U) At least semiannually.
8.7 Security Incidents (U)
(U) All security incidents will be investigated by the NISSO/HISSO
to determine their cause and, where possible, corrective action will
be taken. In addition, all incidents affecting one or more nodes
will be reported to the NSO. The FBI will report all Soviet Bloc
threats to the National Security Council and then to the individual
agency NISSO. All incidents will be fully documented so that areas
requiring special corrective action can be identified. If it is
determined that a compromise of classified information may have
occurred, a report of facts surrounding the incident shall be imme-
diately forwarded by the NSO to the NCWG for evaluation. The
preliminary investigation conducted by the NSO may be followed by a
formal investigation by the NCWG if required. The NCWG will deter-
mine if system/network recertification is required. Individual
investigation reports will be maintained for three years.
8.8 Contingency Operations Plans (U)
8.8.1 (U) General. The procedures established in previous sections
for personnel, physical, information, communications, and ADP secur-
ity have been formulated to protect against deliberate attempts to
compromise the CHOSUN network, as well as those contingencies for
which safeguards may be implemented to protect against permanent
destruction, extended loss, or degradation of the node/hub network
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
capabilities.
(U) While high reliability of the node systems and the network is
critical, the availability of alternative communications media, the
close geographical proximity of the nodes, and the limited amount
of space at the nodes and hub militate against complete redundancy
of all equipment at all facilities.
8.8.2 (U) NISSO/HISSO Involvement. Due to the criticality of the
planning required for continuity of operations, the NISSO/HISSO will
be responsible for the formulation and periodic testing of the node
contingency plans. All test results will be forwarded to the NSO for
review and evaluation.
8-14
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
SECTION 9. COMMUNICATIONS SECURITY, PRIVACY, AND EMANATIONS
SECURITY (U)
9.1 General (U)
(C) Due to the extreme sensitivity of the information handled by
the CHOSUN network, positive measures to protect the electrical
information from disclosure to unauthorized persons must be taken.
These measures are grouped into three categories: Communications
Security (COMSEC), privacy, and Emanations Security (EMSEC).
9.2 Communications Security (U)
9.2.1 (C) Encryption. To ensure adequate communications security,
all signals leaving each node and the hub switch facility shall be
encrypted using KG-81 cryptographic equipment. This equipment will
be installed and operated in accordance with KAO-179A/TSEC, "Operat-
ing Instructions for the KG-81 in the CI-3 System, and TRI-TAC."
The keying material to be used for the KG-81s shall be TS/SCI and
must be protected by storage in a GSA container approved for TOP
SECRET or in a Class A vault.
9.2.2 (U) COMSEC Custodian. Each node and the hub facility will
appoint a COMSEC custodian and alternate custodian. These indivi-
duals shall be responsible for the acquisition, storage, operation,
maintenance, and safeguarding of all cryptographic materials at
their installation. Custodians should be appointed in accordance
with existing internal regulations of the agency involved.
9.2.3 (C) RED Technical Control Facilities. Since all RED tech-
nical control facilities process highly classified signals in the
clear, all such facilities must be designed, installed, and oper-
ated in accordance with NACSIM 5203. Positive means must be taken
to prevent either the inadvertent or deliberate connection of RED
signals to BLACK communications facilities. Under no condition is
the connection of RED signals (even though protected by Data Encryp-
tion Standard equipment) authorized to any public, private, or
Government communications network. All signal connections to the
Washington Area Wideband System (WAWS) must be on a BLACK basis.
9.3 Privacy (U)
9.3.1 (C) Data Encryption Standard (DES). To ensure privacy and
protection of the need-to-know requirement, DES equipment will be
used to further process classified information. It should be noted
that the use of DES does not provide communications security for
signals and hence any signals leaving the RED enclosure must be pro-
tected by cryptographic equipment or Protected Distribution Systems
9-1
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
(PDSs) in accordance with NACSIM 5203 and NACSI 4009. The DES is
not approved for the protection of data classified by the National
Security Act of 1947, as amended, or the Atomic Energy Act of 1954,
as amended. The DES shall be implemented according to FIPS Pubs. 46
and 81. Since data protected by DES is still considered as classi-
fied information, more stringent means of protection than those
required by FED STDs 1026 and 1027 are required (i.e., NACSIM 5203,
NASCI 4009, and NACSEM 7002). In addition, all DES equipment and
keying material will be protected as TOP SECRET.
9.3.2 (U) DES Custodian. Each node and the hub facility will ap-
point a DES custodian and alternate custodian. These individuals
will be responsible for the acquisition, storage, operation, main-
tenance, and safeguarding of all DES material. These individuals
will function similarly to the COMSEC custodians although the
regulations governing this application of the DES have yet to be
developed.
9.4 Emanations Security (EMSEC) (U)
(U) The Director of Central Intelligence (DCI) has directed in
DCID 1/19 that, "all electronic equipment which is used to pro-
cess or transmit SCI shall meet national standards for TEMPEST."
Therefore, all CHOSUN facilities must be TEMPEST accredited.
(C) Compliance with the National Communications Security Commit-
tee's (NCSC) National Policy on the Control of Compromising Emana-
tions is built into the CHOSUN system. There are three methods
that may be used for controlling compromising emanations: first,
to provide the equipment with a Controlled Zone (CZ) sufficient to
preclude a successful hostile intercept action; second, to implement
minimum-essential countermeasures to contain compromising emanations
within the CZ; and third, to design or modify any equipment used to
limit the strength of compromising emanations to acceptable limits
considering the available CZ. In CHOSUN, the CZ is the walls,
floor, and ceiling of the parent rooms within which are installed
the RF-shielded cabinet/racks.
(S) The implementation approach, as presented in the contractor's
proposal, for controlling emanations includes:
a. (S) An RF-shielded conference room facility for housing
the user consoles in a secure environment.
b. (S) Utilization of TEMPEST-approved racks/enclosure for
housing support equipment, privacy devices, video com-
pression equipment, and control processor equipment.
9-2
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
c. (U) Utilization of an approved protected distribution
system to distribute the CHOSUN signals within a node
facility.
(C) In addition, it is mandatory that all digital signals conform
to NACSI 5002, "Suppression of Compromising Emanations Through Low
Level Operation," or be installed using the requirements and methods
of Chapter 6, NACSIM 5203.
9.4.1 (U) Facility Design. All CHOSUN facilities shall be designed
and built in strict accordance with NACSIM 5203 and NACSI 4009. Pro-
tective measures that must be taken are delineated in NACSI 5004,
"TEMPEST Countermeasures for Facilities Within the United States."
More stringent measures, as determined by local authorities, may be
imposed.
9.4.2 (C) Future Equipment Design, Testing, and Certification. All
future equipment which will be used for processing RED CHOSUN
information and not planned for installation within an RF-shielded
room or RF-shielded equipment cabinet/racks, shall meet the
requirements specified in a. or b. below:
a. (U) Meet the baseline emanation limits established by
NACSIM 5100A, or
b. (U) Be modified after TEMPEST tests to provide an
equivalent level of protection as that provided by
NACSIM 5100A.
(U) For specific equipment planned for installation in a non-RF-
shielded environment, the provisions of NACSEM 5201, "TEMPEST
Guidelines for Equipment/System Design," apply to all new equipment
specifically designed and constructed for use in CHOSUN.
(U) A Preferred Products List (PPL) is prepared by the TEMPEST
Qualification Special Committee (TQSC) of the Subcommittee on Com-
promising Emanations (SCOCE), NCSC. Equipment appearing in the PPL
indicate compliance with the requirements of NACSEM 5100 or NACSIM
5100A and wherever possible should be selected for use in CHOSUN when
installed in a non-RF-shielded environment.
9.4.3 (U) TEMPEST Testing. All CHOSUN equipment and facilities
processing classified information shall be tested for compliance with
NACSIM 5100A. Newly installed equipment will require that testing be
accomplished before node recertification can be given.
9-3
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
(U) In addition to review and approval of the implementation
contractor's TEMPEST Control Plan, the Government and a represen-
tative of the NCWG will witness all TEMPEST-testing activities
performed by the contractor at the nodes and hub.
9.4.4 (C) Protected Distribution System. NACSI 4009 requires that
all signal distribution lines that carry classified data shall be
accomplished via a PDS and installed in accordance with NACSIM 5203.
9.4.5 (C) Acoustics Emanation Protection. Protection against
acoustical emanations shall be accomplished in accordance with
NACSIM 5103 for all CHOSUN nodes/facilities that process classified
information.
9.4.6 (U) Other Considerations
9.4.6.1 (U) Electromagnetic Interference (EMI). All equipment,
both RED and BLACK, installed or used within the CHOSUN network,
shall meet the requirements of Military Standard (MIL-STD)-461.
9.4.6.2 (U) Electromagnetic Compatibility (EMC). All equipment,
both RED and BLACK, installed or used within the CHOSUN network shall
meet the requirements of MIL-STD-462.
9.4.6.3 (U) Personally Owned Electronic Equipment. In order to
maintain the TEMPEST integrity of CHOSUN facilities, the introduction
of personally owned electronic equipment such as radios, televisions,
tape recorders, or computers into any CHOSUN facility is strictly
prohibited.
9-4
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
SECTION 10. SECURITY TESTING (U)
10.1 General (U)
10.1.1 (U) Purpose. While Security Test and Evaluation will be
a part of the certification process, a continuous security testing
program is necessary to maintain a secure environment and a high
security posture. Accordingly, it is essential that all aspects of
CHOSUN security be tested on a thorough and frequent basis; these
tests shall occur on both a scheduled basis and on unannounced
occasions in order to provide continuing evidence of the effective-
ness of the in-place security features.
10.1.2 (U) Responsibility. It is the responsibility of the Net-
work Security Officer to ensure that appropriate security testing
is carried out for CHOSUN; this testing shall be comprised of two
major elements: preplanned testing and unannounced spot-check
testing. Results of all test activities will be reviewed and
evaluated by the NSO, and any resultant recommendations for addi-
tional, enhanced security protection will be forwarded to the NCWG.
10.2 Preplanned System/Network Tests (U)
(U) The NSO is responsible for development of a comprehensive
security test program for CHOSUN to be approved by the NCWG.
The NSO will work with the NISSOs and HISSO in order to coordinate
individual, scheduled test periods and site visits relative to
various aspects of the test plan. The NISSOs/HISSO are responsible
for documenting the results of the testing activities and forwarding
results to the NSO.
10.2.1 (U) Test Scope. The NSO is responsible for development of
policy and procedures for security testing. Within the node/hub
element, testing activities/audit activities will be conducted to
include, at a minimum:
a. (U) Verify on-site availability of all current-issue
CHOSUN security documentation and procedural knowlege
by the NISSOs/HISSO.
b. (U) Perform periodic on-site inspections to ensure
physical integrity of all CHOSUN facilities, such as
equipment/equipment bays, and the protected distri-
bution system.
c. (U) Perform periodic on-site TEMPEST tests to ensure
absence of compromising emanations. Newly installed
equipment, or the modification of existing equipment,
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
will require that on-site TEMPEST testing be reaccom-
plished prior to the activation of the site and the
issuance of a new site certification.
d. (U) Review/verify completeness of all information
accountability records, as well as procedures/fa-
cilities for information storage and/or destruction.
e. (U) Review/verify completeness of system access logs
(e.g., operator, maintenance personnel) for nonuser
personnel.
f. (U) Conduct periodic checks on all "alarmed" elements
(e.g., intrusion detection system, external "ports"
from consoles).
g. (U) Review/verify node/hub roster for all nonuser per-
sonnel authorized for CHOSUN access.
10.2.2 (U) Test Schedule and Frequency. Periods in which tests
are to be performed within the node/hub elements will be coordinated
between the NSO and the cognizant NISSO/HISSO. In no case should
security testing activities take priority over operational use of
the CHOSUN network; local or network security tests in progress
when operational use is required shall be immediately suspended.
(U) Since security testing is a continuous process, there is no one
assigned frequency of repetition for the testing activities as dis-
cussed in section 10.2.1. It is expected that the range will vary
from a minimum of once daily for alarm systems to once every three
months for review/audit of accountability logs. Minimum-prescribed
frequencies of performance will be set in the Network Security Test
Plan.
10.2.3 (U) Resources. Personnel augmentation, if any, necessary
to perform the test activities within a node/hub element is the
responsibility of the NSO, through close coordination/cooperation
among the NSO and NISSOs/HISSO. It may be desirable to form a
network test team to perform all testing activities. If the team
concept is accepted, test team members should be selected in order
that all of the following areas of expertise are represented:
a.
(U)
Procedural security doctrine.
b.
(U)
Personnel security.
c.
(U)
Physical security.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
d.
(U)
Communications/emanations security.
e.
(U)
Computer security.
f.
(U)
Threat/exploitation currency.
10.3 Unannounced Random System Tests (U)
(U) In addition to the scheduled preplanned system tests discussed
in section 10.2, there will be unannounced spot checks of any/all
security features of the CHOSUN network. These tests will be
authorized by the NCWG, though the NSO is responsible for schedul-
ing the test times.
10.3.1 (U) Test Scope. The scope of potential test activities
for the unannounced security tests and spot checks is identical to
that of the preplanned tests (section 10.2).
10.3.2 (U) Test Schedule. Tests will be conducted as directed
by the NSO. As in the case of preplanned testing, any unannounced
security test will be suspended immediately if operational use of
the local CHOSUN element is needed.
10.3.3 (U) Resources. Resources to conduct unannounced tests
are the sole responsibility of the NSO. As discussed for preplanned
tests, it may be desirable to develop a network security team with
qualified membership in order to most effectively support the unan-
nounced checks.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
DEFINITION OF TERMS (U)
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
Access Data). The ability to receive products created or trans-
mitted by the system; implies no form of direct communication with
the system.
Access (Physical). The ability or means to enter a controlled area.
Access (System). The ability to communicate with (input to or re-
ceive output from) the system; implies physical access to the
system.
Access Code. A software feature designed to detect and prevent
unauthorized use (and permit authorized use) of the system.
Access Control. The process of limiting physical access to the
system and system access to the resources of the system) to author-
ized personnel.
Accreditation (Approval). The authorization and approval granted to
a system or network to process sensitive classified data in an oper-
ational environment. Accreditation of the system will be made on
the basis of certification by the Network Certification Working
Group that designated technical personnel have examined and verified
that the design (all network hardware and software) and implementa-
tion of the system meet prescribed technical and procedural require-
ments for achieving adequate system/data security.
Accreditation Authority. See Designated Approving Authority.
Audit. To conduct the independent review and examination of system
records/activities in order to test for adequacy of system controls,
to ensure compliance with established policy and operational proce-
dures, and to recommend any indicated changes in controls, policy,
or procedures.
Audit Trail. A software feature providing a chronological record of
system activities/functions that when reviewed/monitored gives an
accurate account of usage or user activity within the system.
Authentication. The software feature which verifies user eligibil-
ity to access the system.
Authorization. The granting to a user the right of access 1) to the
a controlled area or 2) to the system within the controlled area.
Backup Procedures. The provisions made for recovery of data and for
restart or replacement of equipment after degradation or loss of the
system. Also see Contingency Plans.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
Certification. The technical process, made as part of and in sup-
port of the accreditation process, whereby a procedure, hardware/
software component, system, or network is established as meeting
prespecified security requirements.
Classification. The determination that official information
requires, in the interests of national security, a specific degree
of protection against unauthorized disclosure, coupled with a desig-
nation signifying that such a determination has been made.
Closed Storage. The storage of sensitive compartmented information
and material in properly secured General Services Administration
(GSA) approved security containers within an accredited facility
when the facility is not occupied by authorized personnel.
Communications Security (COMSEC). The protection (hardware and
software) that ensures the authenticity of telecommunications and
that results from the application of measures taken to deny unautho-
rized persons any information which might be derived from the acqui-
sition of telecommunications.
Compartmented Intelligence. See Sensitive Compartmented Informa-
tion.
Compromise. The unauthorized disclosure or loss of sensitive/
classified information.
Compromising Emanations. Unintentional data-related or intelli-
gence-bearing signals which, if intercepted and analyzed, disclose
classified information being transmitted, received, handled, or
otherwise processed by any information-processing equipment.
Computer Facility. One or more computer systems with their peri-
pheral devices, technical controls, and communications equipment in
a single controlled area.
Configuration Control. See Configuration Management.
Configuration Management. The engineering management procedure that
includes the following elements:
a. Configuration Identification. Selection of the documents
which identify and define the configuration baseline
characteristics of an item.
b. Configuration Control. Controlling changes to the config-
uration and its identification documents.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
c. Configuration Status Accounting. Recording and reporting
the implementation of changes to the configuration and its
identification documents.
d. Technical Review. The method by which the contractor and
Government determine that the development of a configura-
tion item has reached contract milestone requirements.
e. Configuration Audit. Checking an item for compliance with
the configuration identification.
Contingency Plan. A plan which details alternative operational
procedures for performing functions which can no longer be performed
due to degradation or loss of the system.
Controlled Access. See Access Control.
Control Zone. The physical space that surrounds equipment that is
used to process sensitive defense/political information and that is
under sufficient physical and technical control to preclude unau-
thorized entry or compromise.
Countermeasure. A security feature or control (e.g., hardware/soft-
ware, personnel, physical, communications, or administrative) desig-
nated to reduce or eliminate security threats to the system.
Cryptographic System. A system which uses NSA cryptographic equip-
ment that is directly connected to a signal line, making continuous
processes of encryption and transmission or reception and decryp-
tion.
Data Security. The protection of data from accidental, unau-
thorized, intentional, or malicious modification, destruction, or
disclosure.
Declassification. The determination that classified information no
longer requires, in the interest of national security, any degree of
protection against unauthorized disclosures, together with a removal
or cancellation of the classification designation.
Derivative Classification. A determination that information is in
substance the same as information currently classified, and the
application of the classification markings.
Designated Approving Authority (DAA). The person designated to
approve/accredit the CHOSUN network for the processing, use,
storage, production, and transmission of sensitive/classified
information.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
Downgrade. A determination that classified information requires, in
the interest of national security, a lower degree of protection
against unauthorized disclosure than currently provided, together
with a changing of the classification designation to reflect such a
lower degree of protection.
Electromagnetic Emanations. Signals transmitted as radiation
through the air and through conductors.
Emanations Security (EMSEC). The protection resulting from all
measures designed to deny unauthorized persons information of value
which might be derived from intercept and analysis of compromising
emanations.
Encryption (End-to-End). Encryption of information at the origin
within a communications network and decryption occurring at the
final destination point.
Encryption (Link). The application of on-line crypto operations to
a ink of a communications system so that all information passing
over the line is encrypted.
Escort. A designated person who has the appropriate clearance
TS/SCI) and access authorization for material processed, stored,
and transmitted by the system and is sufficiently knowledgeable to
understand the security implications of and to control the activi-
ties of an individual who does not have the appropriate clearance
for unescorted access.
Hardware Security. Computer equipment features or devices used in
the system to preclude unauthorized access to data or system
resources.
Hub. The central switching facility for CHOSUN which links all
nodes in the network.
Hub Information System Security Officer (HISSO). The individual
designated to provide general supervision, administration, and
overall coordination of security matters for the Hub to include
System Control, Network Control, and Central Technical Control
elements.
Information Security. The result of any system of administrative
policies and procedures for identifying, controlling, and protecting
from unauthorized disclosure, information whose protection is
authorized by executive order or statute.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
Keying Materials. In cryptography, those devices which control the
operations of encryption and decryption.
Mode of Operation. The security environment and method of operating
the system. Also see System High.
Need-to-Know. The necessity for access to, knowledge of, or posses-
sion of classified or other sensitive defense information in order
to carry out official military or other governmental duties.
Responsibility for determining whether a person's duties require
that he possess or have access to certain information, and whether
he is authorized to receive it, rests upon the individual having
current possession, knowledge, or control of the information in-
volved and not upon the prospective recipient.
Network. The interconnection of the CHOSUN systems together with
the necessary communications support.
Network Certification Working Group (NCWG). The organization
designated to perform certification of the CHOSUN network.
Network Security Officer (NSO). The person designated to provide
general supervision, administration, and overall coordination of
CHOSUN system security matters, including operations, test, and
evaluation.
Node. A computer facility at the user's location.
Node Information System Security Officer (NISSO). The individual
designated to provide general supervision, administration, and
overall coordination of node security matters.
Open Storage. The storage of classified information on shelves, in
metal containers, locked or unlocked, but not in GSA-approved secure
containers, within an accredited facility while the facility is not
occupied by authorized personnel.
Operational Network. A network used to provide intercomponent
transfer of operational traffic (e.g., data, graphics, video)
between nodes.
Operator. A person technically qualified to perform certain func-
tions on the system. Also see Technical Control Operator.
Original Classification. An initial determination that information
requires, in the interest of national security, protection against
unauthorized disclosure, together with a classification designation
signifying the level of protection required.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
Parent Room. The space located inside a building structure, within
which is assembled either an RF-shielded enclosure or one or more
RF-shielded cabinet/racks.
Personnel Security. The procedures established to ensure that all
personne accessing the system have the appropriate clearance and
authorization.
Physical Security. That part of security concerned with the
physical measures designed to safeguard personnel, to prevent
unauthorized access to equipment, facilities, material and docu-
ments, and to safeguard them against espionage, sabotage, damage,
and theft.
Procedural Security. The management constraints; operational,
administrative and accountability procedures; and supplemental
controls established to provide an acceptable level of protection
for sensitive defense information and data.
Protected Distribution System (PDS). A telecommunications system
which has been approved by a legally designated authority and to
which electromagnetic and physical safeguards have been applied to
permit safe electrical transmission of unencrypted sensitive infor-
mation.
RED/BLACK Concept. The concept that electrical and electronic cir-
cuits, components, equipment, systems, and so forth, which handle
classified plain language-information in electric signal form (RED)
be separated from those which handle encrypted or unclassified
information (BLACK). Under this concept, RED and BLACK terminology
is used to clarify specific criteria relating to, and to differen-
tiate between, such circuits, components, equipment, systems, etc.,
and the areas in which they are contained.
Regrade. A determination that classified information requires a
different degree of protection against unauthorized disclosure than
currently provided, together with a change of classification
designation that reflects such different degree of protection.
SECRET. National security information or material requiring a
substantial degree of protection, the unauthorized disclosure of
which could reasonably be expected to cause serious damage to the
National security.
Security Incident. Any incident involving classified information in
which there is a deviation from the requirements of governing
security regulations. (Compromise, inadvertent disclosure, need-to-
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
know violations, and administrative deviation are examples of a
security incident.)
Security Test and Evaluation (ST&E). An examination and analysis of
the security features of the system as they have been applied in an
operational environment to develop factual evidence upon which an
accreditation can be based.
Sensitive Compartmented Information (SCI). That intelligence infor-
mation having special controls indicating restrictive handling for
which systems of compartmentation or handling are formally
established.
Sensitive Compartmented Information Facility (SCIF). An area, room,
group of rooms, or installation which has been accredited by appro-
priate authority for storage, discussion, and/or processing of sen-
sitive compartmented information.
Software Security. Those general purpose executive, utility, or
software eve opment tools, applications programs, and routines
which protect data or information handled by the system and its
resources.
System. The combination of all CHOSUN hardware, software, and firm-
ware at a node or the hub.
System High. For CHOSUN the utilization of the network to process,
store, or transmit Secure Compartmented Information (SCI) when the
total system, to include the central facility (Hub), the node
terminals, and all their connected peripheral devices, are secured
in accordance with the requirements for the highest classification
level of all types of SCI processed, stored, or transmitted therein.
TEMPEST. Short name referring to investigations and studies of com-
promising emanations. Sometimes used synonomously for the term
"compromising emanations" (e.g., TEMPEST testing).
Terminal Area. The physical space within the control zone of each
node housing the video/data consoles and peripheral devices of the
system.
TOP SECRET (TS). National security information requiring the
highest degree of protection, the unauthorized disclosure of which
could reasonably be expected to cause exceptionally grave damage to
the national security.
Unescorted. A person who has the appropriate clearance (TS/SCI) and
access authorization for material processed, stored, and transmitted
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
by the system to preclude the necessity of an escort when accessing
the system.
User(s). The primary person(s)/organization(s) who will utilize the
system for the purpose of exchanging sensitive defense information
with other users.
USERID. A unique group of alphanumeric characters that identifies a
particular individual for the purpose of utilizing the system.
Violation. See Security Incident.
Vulnerability. The susceptibility of a particular system to a spe-
cific attack, and the opportunity available to a threat agent to
mount that attack. A vulnerability is always demonstrable but may
exist independently of a known threat. In general, a description of
a vulnerability takes account of those factors under friendly
control.
A-10
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
SECRET
Classified by: DCA 184WO0224
Declassify on: OADR
SECRET
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
UNCLASSIFIED
(U) This appendix provides the complete citation for all references
contained within the CHOSUN Network Security Manual. The references
are listed by the issuing department/agency for each document.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
SECRET
(U) The White House, National Policy on Telecommunications and
Automated Information System Security, National Security Decision
Directive 145, 17 September 1984, UNCLASSIFIED.
(U) The President, National Security Information, Executive Order
12356 of April 2, 1982, Federal Register, Vol. 47, No. 66,
UNCLASSIFIED.
(S) National Security Council, Crisis Information and Management
System CIMS : Project Medusa , White House National Security
Decision Directive 95, 18 May 1983, SECRET.
(U) Director of Central Intelligence, Minimum Personnel Security
Standards and Procedures Governing Eligibility for Access to
Sensitive Compartmented Information, DCID 1/14, 13 May 1976,
9N-CLASSIFIED.
(U) Director of Central Intelligence, Security of Foreign Intelli-
gence in Automated Data Processing Systems and Networks (U j, DCID
1/16, 6 June 1978, CONFIDENTIAL.
(U) Director of Central Intelligence, Computer Security Regulation (U),
Attachment to DCID 1/16, 4 December 1984, CONFIDENTIAL.
(U) Director of Central Intelligence, Security Policy for Sensitive
Compartmented Information (U), DCID 1/19, 28 June 1982, CONFIDENTIAL.
(U) Director of Central Intelligence, Security Policy Concerning Travel
and Assignment of Personnel with Access to Sensitive Compartmented
Information (U), DCID 1/20, 6 June 1978, CONFIDENTIAL.
(U) Director of Central Intelligence, U.S. Intelligence Community
Physical Security Standards for Sensitive Compartmented Information
Facilities (U), NFIB/NFIC-9.1/47, 23 April 1981, FOUO.
(U) Defense Intelligence Agency, Physical Security Standards for
Sensitive Compartmented Information Facilities (U), DIAM 50-3,
20 August 1976, FOUO.
(U) Defense Intelligence Agency, Security of Compartmented Computer
Operations (U), DIAM 50-4, 24 June 1980, CONFIDENTIAL.
(U) National Security Agency, Operating Instructions for the KG-81
in the CI-3 Systems, and TRI-TAC (U), KAO- 79A TSEC, December 1974,
CONFIDENTIAL.
SECRET
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
(U) National Security Agency, Specification for RF-Shielded Enclosures
for Communications Equipment: General Specifications (U), NSA
Specification 65-6, Appendix B of NACSEM 5204, January 1979,
CONFIDENTIAL.
(U) National Security Agency/Central Security Service, TEMPEST Security
Program (U), NSA/CSS Regulation 90-5, 20 August 1980, CONFIDENTIAL.
(U) National Security Agency, Communications Security Equipment System
Document, TSEC/KG-81 Family (U), CSEEB-35, CONFIDENTIAL.
(U) National Security Agency, Compromising Emanations Laboratory Test
Standard, Electromagnetic (U), NACSE 51U0, March 1974, ONFI ENTIAL.
(U) National Security Agency, Shielded Enclosures (U), NACSEM 5204,
January 1979, CONFIDENTIAL.
(U) National Security Agency, TEMPEST Guidelines for Equipment/System
Design (U), NACSIM 5201, September 1978, CONFIDENTIAL.
(U) National Security Agency, COMSEC Guidance for ADP Systems (U),
NACSIM 7002, CONFIDENTIAL.
(U) National Security Agency, Compromising Emanations Laboratory
Test Requirements, Electroma netics U , NACSIM 51OOA, July 1981,
CONFIDENTIAL.
(U) National Security Agency, Compromising Emanations Laboratory Test
Standard, Acoustics (U), NACSIM 5103, CONFIDENTIAL.
(U) National Security Agency, Guidelines for Facility Design and
RED/BLACK Installation (U), NACSIM 5203, 30 June 1982, CONFIDENTIAL.
(U) National Security Agency, Protected Distribution Systems (U),
NACSIM 4009, 30 December 1981, CONFIDENTIAL.
(U) National Security Agency, TEMPEST Countermeasures for Facilities
Within the United States (U), NACSIM 5004, NFIDENTIAL.
(U) National Communications Security Committee, NCSC Policy Direc-
tive 14-2.
(U) Office of Management and Budget, Security of Federal Automated
Information Systems, OMB Circular A-71, Transmittal Memorandum No. 1,
27 July 1978, UNCLASSIFIED.
(U) National Security Act of 1947, 61 Stat. 495, 26 July 1947.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
(U) Atomic Energy Act of 1954, 68 Stat. 919, 30 August 1954.
(U) National Technical Information Agency, Telecommunications:
Interoperability and Security Requirements for Use of the Data
Encryption Standard in Physical Layer of Data Communications,
FED-STD-1026, UNCLASSIFIED.
(U) National Technical Information Agency, General Security
Requirements for Equipment Using the Data Encryption Standard,
FED-STD-1027, 14 April 1982, UNCLASSIFIED.
(U) Department of Defense, Information Security Program Regulation,
DoD 5200.1-R, August 1982, UNCLASSIFIED.
(U) Department of Defense, Security Requirements for Automatic
Data Processing (ADP) Systems, DoD 52 0.28, 18 December 1972,
UNCLASSIFIED.
(U) Department of Defense, ADP Security Manual, DoD 5200.28-M,
January 1973, UNCLASSIFIED.
(U) Department of Defense, Sensitive Corn artmented Information
TEMPEST Policy and Guidance U , TCO/BCO DoD letter dated 15 May 1979,
CONFIDENTIAL.
(U) Department of Defense, Military Standardization Handbook RED/
BLACK Engineering - Installation Guidelines U , MIL-HDBK-232,
14 November 1972, CONFIDENTIAL, Superseded by NACSIM 5203).
(U) Department of Defense, Electromagnetic Emission and Suscepti-
bility Requirements for the Control of Electromagnetic Interference,
MIL-STD-461B, 1 April 1980, UNCLASSIFIED.
(U) Department of Defense, Electromagnetic Interference Character-
istics Measurement of, MIL-STD-462, 9 February 1971 Int. Notice 4
dated 1 April 1980 , UNCLASSIFIED.
(U) Department of Defense, Method of Insertion-Loss Measurement (U),
MIL-STD-220A, UNCLASSIFIED.
(U) Department of Defense, Method of Attenuation Measurement for
Enclosures, Electromagnetic Shielding, for Electronic Test Purposes (U),
MIL-STD-285, UNCLASSIFIED.
(U) Department of Defense, General Specification for Filter, Radio
Interference (U), MIL-F-15733, UNCLASSIFIED.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
(U) National Fire Protection Association, American National Standard:
National Electric Code, UNCLASSIFIED.
(U) National Bureau of Standards, Data Encryption Standard, FIPS
PUB 46, 15 January 1977, UNCLASSIFIED.
(U) National Bureau of Standards, DES Modes of Operation, FIPS
PUB 81, 2 December 1980, UNCLASSIFIED.
(U) Department of the Army, Automated Systems Security, AR 380-380,
15 April 1979, UNCLASSIFIED.
(U) Department of the Army, Control of Compromising Emanations (U),
AR 530-4, CONFIDENTIAL.
(U) Department of the Army, Army Automation Management, AR 18-1,
15 August 1980, UNCLASSIFIED.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
CHOSUN SECURITY CLASSIFICATION GUIDE (U)
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
REQUEST FOR WAIVER (U)
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
(U) This appendix provides a generalized form/format for a CHOSUN
user node/facility to request a specific waiver from the network
security policies and procedures stated herein. Waivers will be
granted on a very limited basis in those instances where site-unique
facility/operational limitations warrant, and are granted for a
limited time only.
(U) The waiver form, to be completed and endorsed by the NCWG as
part of the site certification process, is unclassified prior to
being completed. Classification of the completed form will be
determined based upon the actual content.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
REQUEST FOR WAIVER
1. Name of site:
2. Site location: Rooms:
Building:
Address:
3. Identification of requirement for which waiver is requested:
(Cite paragraph in Security Manual)
4. Specific reason for waiver request:
5. Alternate compliance proposed:
6. (Expected) Duration of waiver:
7. Steps being taken to eventually meet requirement:
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
8. Other requirements implied:
(Cost, time, manpower, operational impact etc.)
NCWG Representative
Security Officer
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
SECURITY TEST AND EVALUATION REPORT FORMAT (U)
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
(U) This appendix presents a format for reporting results of the
Security Test and Evaluation performed as part of the certification
process for CHOSUN operation.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
1. COVER SHEET
? Organization/Agency, location
? ST&E time span
? Date of report
? Classification of report/declassification schedule
? Identification/signature of individual(s) responsible
for ST&E as documented herein
2. INTRODUCTION AND EXECUTIVE SUMMARY
? Project CHOSUN overview
- Organization/Agency Role/Mission
? Objective of the report
? Report organization
? Major evaluation findings and recommendation(s)
3. BACKGROUND
? Established security standards, criteria or policies
? Specific assumptions and definitions relative to ST&E
? Specific scope of this ST&E
(i.e., exact boundary conditions assumed for this site
during ST&E)
? ST&E Summary
- Participants tests analysis
- Tests
- Analysis
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
4. MAJOR FINDINGS
? Assets
? Threats
? Exposures
In place
? Control mechanisms
a Vulnerabilities
- Residual - no action recommended
- Requiring correction
5. RECOMMENDED CORRECTIVE ACTION(S)
? Identify action to correct cited vulnerability
- Costs, priority, impact
- Responsible element
- Subsequent evaluation
Annex A - Detailed Configuration/Description of Site Security
Annex B - Test Plan
Annex C - Test Result(s)
Annex D - Site Checklist(s)
Annex E - Site Risk Analysis
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
SITE SECURITY CHECKLISTS (U)
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
(U) This appendix provides generalized formats/suggested versions
of individual site security checklists to be completed as an
essential part of the site certification process. Unless otherwise
indicated, the checklists are extracted from DIAM 50-3. Individal
checklists are provided for:
A.
(U)
General Information
B.
(U)
Procedural/Administration Security
C.
(U)
Physical/Facility Security
D.
(U)
TEMPEST
E.
(U)
ADP Security
(U) These checklists are unclassified prior to data being
entered. Classification of the completed checklists will be
determined individually based upon their content.
(U) Reponsibility to complete the individual checklists lies with
the Node/Hub Security Officer although the NCWG may elect to
inspect/review any element within the scope of assets/procedures
covered by these checklists.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
A. GENERAL INFORMATION
1. Name of Site:
2. Site Location: Rooms:
Building:
Address:
3. Node/Hub Security Officer: TEL/AUTOVON:
Alt. Security Officer: TEL/AUTOVON:
4. Reason for Site Certification: Original:
Renewal:
5. Duty Hours: 1) Continuous:
2) to days of week
3) Other
6. For Original Certification:
1) Construction completed Date anticipated complete Date
2) Tech. Security Survey completed (Date)
3) TEMPEST Security Checklist completed (Date)
7. For Renewal of Certification:
1) Certification/Accreditation granted by (document/authority)
on (Date)
2) Last Inspected by on (Date)
Deficiencies
F-5
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
Corrected
3)
TEMPEST Certification/Accreditation granted by
on
(Date)
4)
ADP Certification/Accreditation granted by
on
(Date)
5. Date Site Certification Requested:
Node/Hub Security Officer
F-6
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
B. PROCEDURAL/ADMINISTRATION SECURITY
ADMINISTRATION
1. Node/Hub Security Officer: AUTOVON/TEL:
Alternative Security Officer: AUTOVON/TEL:
2. Current/Most Recent Version of CHOSUN Security Documentation Available
CHOSUN Network Security Manual
Node/Hub Security Manual
Node/Network Operating Procedures
Node/Network Contingency Operations Plans
Node Security Test Plan
3. CHOSUN Security Orientation:
Date of Most Recent Course Completion: NSO
Alt NSO
4. Program to Inform Local Security of CHOSUN
Site Commander/Senior Executive Ops. Officer
Briefed on
By
Remarks:
PROCEDURAL
1. The following standardized current issue briefings are maintained by NSO:
CHOSUN Security Indoctrination (Type 1 - Users, Type 2 - Other)
CHOSUN Security Debrief
CHOSUN Security Overview
2. Node/Hub Security Manual Last Update
F-7
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
C. PHYSICAL/FACILITY SECURITY
7. Description of surrounding area outside of building:
a. Fence
b. Fence lighting
c. Fence guards
d. Relationship of building to surrounding area
8. Building:
a. Constructio
b. Building access control. Continuous? During security hours only?
c. Guards (Military) (Civilian)
(1) Clearances
(2) Frequency of checks
(9) Communications
(4) Emergency procedures
(5) Reserves
9. Remarks:
F-8
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
Facility security
10. Access control:
a. Guards (Military) (Civilian)
b. Assigned personnel
(1) Clearances
(2) Communications
(9) Emergency procedures
(4) Reserves
11. Windows:
12. Ventilating ducts:
a. Walls
b. Ceiling
c. Floor
14. Soundproofing: (all of the preceding)
15. False ceiling:
a. Type
b. Distance between false and true ceilings
16. Remarks:
F-9
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
UNCLASSIFIED
Doors
17. Number of entrances:
18. Types of doors used-
a. Vault door (manufacturer, model number)
b. Wood (thickness/hollow/solid)
c. Wood w/metal (thickness of both door and metal covering; hollow, solid, metal on both sides)
d. Metal (thickness/hollow/honeycombed)
e. Other
19. Number and types of doors used for emergency exits:
a. Vault door (manufacturer, model number)
b. Wood (thickness.'hollow/solid)
c. Wood w/metal (thickness of both door and metal covering; hollow, solid, metal on both sides)
d. Metal (thiclmess/hollow/honeycombed)
e. Other
20. Type of lock: (entrances)
a. Combination (manufacturer, model, and group number)
b. Is the entrance door Of not a vault door) and/or the access control door equipped with a pneumatic door
closer? Yes No (if no, why not)
F-10
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
UNCLASSIFIED
21. Locks on inspection ports/windows: Of any)
22. Have hinges been properly secured on doors opening outward? Yes No
How?
23. Soundproofing: (all doors)
24. Type of locking device used on emergency exits:
a. Lock, describe
b. Metal strap or bar
c. Security deadbolt(s)
d. Panic hardware
e. Other, describe
25. Type of access control device used during duty hours:
a. Cypher lock
b. Key lock
c. Electrical release
d. Guard
e. Other
26. Is combination lock of vault door opening into non-secure area protected against tampering?
No Why? Yes How?
27. Combination changed by:
on
28. Combination on file at:
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
29. Double check system:
F-12
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
UNCLASSIFIED
Containers
31. GSA approved- Class How many
32. Open/closed signs:
33. Combinations changed by: On
34. Combinations filed at:
35. Double check system:
36. Remarks:
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
UNCLASSIFIED
Alarm Protection
If at least two appropriately cleared personnel are on duty 24 hours every day and have the capability of con-
tinuous audio or visual surveillance of the entire facility, the following is not required; however, it is suggested
that it be completed for information purposes. Give manufacturer and model numbers in answering the follow-
ing questions where applicable.
37. Door protection:
a. Alarm door switch
b. Television
c. Heat detector
d. Lacing
e. Capacitance
f. Other
38. Window protection:
a. Alarm tape
b. Switch
c. Capacitance
d. Television
e. Other
39. Perimeter wall protection:
a. Vibration detection
b. Lacing
C. Capacitance
d. Other
40. Interior protection: )within facility, below false ceiling)
a. Volumetric alarm system
b. Television
c. Other
41. Ventilation and duct protection:
a. Barriers
b. Acoustic baffles
c. Canvas, rubber, or transparent plastic vent connection joints
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
d. Inspection ports
?. Brealrwire alarms ? Duct trap
f. Capacitance
S. Other
42. Overhead protection: (space above false ceiling)
a. Volumetric alarm system
b. Vibration detection
c. Alarm lacing
d. Other
43. Perimeter (fence)protection:
a. Fence alarm
b. Capacitance
c. Television
d. Guards and/or sentry dogs
44. Line supervision protection:
a. Inspection only, explain
b. Continuous conduit
c. Low security line supervision
d. High security line supervision
e. Other
45. Guard response time for an alarm:
When last tested
46. Are all alarms operational?
47. Is emergency/back-up power available for the alarm systems?
Yes No How Long?
48. Location of alarm annunciator panel:
49. Is the alarm system equipped with the "REMOTE TEST"feature?
60. If Ultra Sonics (volumetric alarms) are used, has the "oscillator" circuit been modified so as to create an
alarm should component failure occur? Yes, How? No, Why?
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172 R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
61. Is procedure established for periodic testing of alarms?
62. When last tested- By whom
63. Description of test methods:
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172 R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
UNCLASSIFIED
Telephone System
54. Type of system installed.
a. Switchboard Type
b. Key system Type
c. Conventional (one or two line instruments)
d. Other
55. Are the key system and main frame located within the facility? Yes No Answer the
following:
a. Where is the main frame located?
b. What type of security is afforded the main frame equipment room?
c. Where is the key system located?
d. What type of security is afforded the key system equipment?
e. How are the telephone lines routed from the frame room to the facility or key system?
f. What type of security is afforded the telephone lines?
56. Number and type of instruments installed (manufacturer, model numbed
67. Type of ringer unit used for each instrument:
a. Non-resonant. give manufacturer and model number
b. Light signal unit, describe
c. Other, describe
68. Category of telephone security:
a. Category I
b. Category II
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B0l172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
c. Category III
d. Remarks -
59. Is telephone equipped with "HOLD "feature? Yes No Is handset equipped with:
a. WE type G-10F Push-to-operate
b. Other, describe by manufacturer, model number and mode of operation
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96 BO 1172 R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
UNCLASSIFIED
Administration
a. How and where is waste stored; how often collected?
b. Method of destruction
c. Nomenclature of disintegrator (if applicable)
d. By whom?
e. Are certificates of destruction completed and maintained?
62. Emergency destruction plan:
a. Is it part of overall command or agency plan?
b. What priority is assigned to the sensitive compartmented information material?
c. Is plan practical?
d. What type of devices are available for accomplishing the emergency destruction of material?
e. Make and model number of pulping or shredding equipment used (if applicable)
f. Where are the emergency destruction sites located in relationship to the facility?
63. Char Force:
a. Used to clean secure areas
b. Clearances
c. Security procedures in effect when char force is in the area
64. ADPS:
a. What is the highest level of classified information processed?
C S TS SI TK Other (Specify)
b. If SCI is processed, has TEMPEST accreditation been granted in accordance with references e and f (yes)
(no) and overall ADP system accreditation granted in accordance with DIAM 50.4 (yes) (no)?
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
65. Local security situation:
a. Is the facility commander being briefed by local counterintelligence personnel regarding the local
counterintelligence situation?
b. By whom?.
c. How often?
66. Remarks:-
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96 BO 1172 R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
Intercom Systems
67. Is an intercom system used? No Yes
Type
a. Telephone component feature (If this type, disregard following.)
b. Separate system; give type of system
68. Are all stations within the facility? Yes No
If answer is no. give justification why station(s) must be outside of the facility and describe the measures us-
ed to protect the facility from technical penetrations by using the intercom lines routed to stations outside of
the facility
69. Has the intercom sytem been tested by technicians during a technical survey?
Yes No What were the findings, and have recommendations been complied with?
Yes No (If not, why?)
70. Are there any disconnect or special security features installed? No Yes
Describe
71. Remarks:
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
UNCLASSIFIED
Sound Cover Systems
72. Does the facility have a sound cover system installed?
Yes No (If no, disregard the following.)
73. What type of sound source is used to produce the sound cover for the systems?
a. Phonograph
b. Tape recorder
c. Other
74. Hou, are the audio transmission lines routed from the system's amplifier to each speaker/enclosure and
what type of cable is used for this purpose?
a. Unshielded cable
b. Shielded cable
c. Electrical metalic tubing (EMT) (Conduit)
75. Are all of the speakers/enclosures contained within the facility? Yes No
76. Has the sound cover system been tested by technicians during a technical survey?
Yes No What were the findings, and have recommendations been complied with? (If not,
why?
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
UNCLASSIFIED
Electrical/Electromechanical Equipment
78. Does the facility contain electricapelectromechanical equipment used to process sensitive compartmented
information? Yes No (If affirmative, complete the TEMPEST Security Checklist, enclosed
with TCOIBCO DoD letter, "Sensitive Compartmented Information TEMPEST Policy and Guidance,"
15 May 1979.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B0l172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
Unusual Security Vulnerabilities
79. Is the facility located in an aria that is subject to burglarious attack and/or mob violence?
Yes No If yes, describe nature of threat and additional security measures established to
cope with this vulnerability.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
1. (U) Identification and location of organization submitting request.
2. (U) Floor plans of the building containing the SCI area which show
the following:
a. The boundaries of the SCI area and SCI room numbers.
b. The classification level of the areas surrounding, above, and
below the SCI area.
c. Areas where foreign nationals have access, including classified
areas. Indicate whether areas are manned 24-hours a day by at least
U.S. SECRET cleared personnel and under U.S. control.
d. Areas within facility where personnel with less than U.S.
SECRET clearance can obtain access without being properly escorted or
under continuous surveillance.
3. (U) Drawing showing:
a. Outline of building containing SCI area and its surrounding out-
side area, including roadways, loading zones, parking lots, etc.
b. If applicable, areas outside the building which are protected
with approved alarm systems or which are under continuous surveillance
by personnel with at least a U.S. SECRET clearance.
4. (U) Floor plan of SCI area showing:
a. Location and identity of electronic equipments by manufacturer
and model number and, if applicable, the circuit with which the equip-
ments are associated.
b. The classification level of information processed by each
equipment.
c. Routing and identity of lines, cables, and other metallic con-
ductors which leave the SCI area, including telephone, power, signal, and
alarm lines, pipes, air conducting ducts, etc.
*Source: TCO/BCO DOD Letter, "Sensitive Compartmented Information
TEMPEST Policy and Guidance (U)" CONFIDENTIAL, 15 May 1979.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
d. Location of telephone instruments, telephone line filters,
power line filters, signal ground points, etc.
5. (U) Will signal lines carrying unencrypted SCI information be
routed into areas of loner classification or into uncontrolled areas?
If so, describe TEMPEST and physical security protective measures outside
of SCIF.
6. (U) Will SCI be transmitted outside the SCIF? If so, identify user,
building, and room number of distant location for each circuit. If
circuit goes directly to an AUTODIN Switching Center (ASC), just
identify the ASC.
7. (U) Will both SCI and collateral information be processed elec-
tronically within the SCI areas? If so, is the signal line distribution
installed in accordance with DoD Directive C-5030-58-M (pages 17-19)?
8. (U) What percentages of SCI, IS, S, C, U are processed by each
equipment? Indicate total number of hours/week each equipment is used.
9. (U) Identify all electronic equipments and wirelines that are
located within six feet of SCI equipment and SCI signal lines.
10. (U) Do cables carrying SCI information to, from, and between equip-
ments have at least one overall non-ferrous metallic shield? If no,
describe. Are they in metallic conduit or ducts?
11. (U) Reference Figures 1, 2, and 3. Do all telephone cables in
the SCI area have at least one overall non-ferrous metallic shield?
Are they in metallic conduit or ducts? Are they filtered before leaving
(a) the SCI area or (b) lesser facility controlled area? If answer to
(b) is yes, describe. Are filters grounded to a low impedance ground
within the controlled area? Is maximum separation maintained between
lines to and from filters, e.g., not grouped together? Are signal
cables separated from telephone lines?
12. (U) Do pipes and air conditioning ducts leaving the SCI area have
non-conductive sections at their points of egress from (a) the SCIF or
-(b) lesser facility controlled area? If answer to (b) is yes, describe.
13. (U) Are the SCI equipments installed within an RF-shielded room?
If so, provide manufacturer's name, model number, and attenuation
characteristics, if available.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
14. (U) Has a RED/BLACK inspection been performed to determine com-
pliance of the facility with RED/BLACK engineering criteria of MIL-
HDBK-232? If so, provide copy of inspection report and describe
corrective measures implemented if discrepancies were identified.
15. (U) Has an instrumented TEMPEST survey (TEMPEST Test) been
performed? If not, has a test been scheduled? If so, were emanations
detected outside (a) the SCI area, (b) areas under continuous (direct
or CCTV) surveillance by at least SECRET cleared personnel or where
protective measures (alarm systems) are used (refer to paragraph 4. of
Policy and Guidance on Control of Compromising Emanations). Describe
corrective measures discrepancies were Identified. orward copy
of test report.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
E. ADP SECURITY
A. HARDWARE *
1. Utilisation:
a. Do you monitor your operations for compliance with
schedules?
b. Do you correlate meter hours with utilization hours?
c. Do you monitor scheduled maintenance activities to
ensure proper reliability and hardware performance?
d. Do you verify all periods of down time?
e. Do you check "end meter" with "begin meter" read-
ings each morning for unexplained gape?
f. Do you check all incoming work against an authorized
user list?
Do you spot-check output for possible misuse of system
Do you have an updated distribution system to pre-
vent an unauthorized person from receiving a confi-
dential report?
2. Commu4cations Security :
a. Do all communication links between remote terminal
areas and the central computer facility meet the re-
quirements for the transmission of the higher classifica-
tion and for all categories of data which are contained
in the system?
b. Are all remote terminals uniquely identified?
c. Are dial-up terminals disabled from connection to the
central computer facility during classified processing
periods?
3. Emanations Security:
a. Has the facility been. evaluated in accordance with
applicable TEMPEST procedures to determine risk?
b. Has all installed ADPE been TEMPEST tested?
c. Has ADPE which dose not meet TEMPEST require-
ments been provided filtered power, if necessary?
d. Are all changes, repairs, and modifications to TEM,-
PEST modified ADPE controlled so that the equip-
ment emanations characteristics are not altered?
4. Erase and Declassification Procedures:
a. Is each memory location used for the storage of classi-
fied data overwritten when it is no longer required
before reuse, or before the content of the location may
be read?
b. Are the necessary programs, equipment, and pro-
cedures for declassifying any and all ADP equipment
used for the processing or storage of classified data on
site?
YES NO COMMENTS
----------------
----------------
----------------
*Sources:DoD 5200.1-R,DoD 5200.28, MIL-HDBK-232, AR 18-1, AR 530-4
F-28
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172 R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
UNCLASSIFIED
6. Magnetic Tapes and Disks:
a. Does your tape and disk accountability procedure
cover :
(1) Frequency of use?
(2) Frequency of cleaning?
(3) Authorized user?
b. Are magnetic tapes and disks filed in an orderly
manner?
c. Are tapes cleaned on a regular basis (once each 10
uses is recommended)?
d. Do you check and clean your disk packs or have it done
by contract?
YES NO COMMENTS
e. Are tapes kept in their containers except when in use? ------
f. Are tapes stored vertically?
g. Are tape utilization records maintained?
b. Are tape containers cleaned periodically?
i. Are tape beads cleaned every shift?
j. Do you sample test your tapes periodically for drop-
outs, to determine the general condition of your tape
library?
k. Do you strip frayed leader regularly?
1. " Have you investigated the possibility of a tape rehabil-
itation or recertification program?
m. Is your tape library located in an area secure from
explosion or other dangers?
n. Do you use storage vaults specifically designed for
magnetic media for critical tape files?
o. Have you considered magnetic detection equipment ------ ----
to preclude the presence of a magnet near your tapes
and disks?
p. Do you provide similar protection for your tape files
while they are in transit to a backup site, etc.? ------ ----
q. Are ADP products marked with:
(1) Date of creation?
(2) Highest classification of any information contained in
in the product?
(3) Downgrading or exemption instructions when placed
in permanent files?
(4) A unique identifier?
(5) The classification of the system's environment when
the product was produced if the assigned classification
cannot be immediately verified by the customer?
UNCLASSIFIED
----------------
----------------
----------------
----------------
----------------
----------------
----------------
----------------
----------------
----------------
----------------
----------------
Declassified and Approved For Release 2011/11/10: CIA-RDP96B0l172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
UNCLASSIFIED
YES NO COMMENTS
r. Are all ADP storage devices marked with:
(1) The overall security classification which meets the
highest classification of any information stored on the
device?
(2) Special access restrictions?
(3) A permanently assigned identification/code number?
(4) A color code?
B. SOFTWARE SECURITY *
1. Physical Security:
a. Are the essential programs, software systems, and
associated documentation in your Program Library
located in a locked vault or secured area?
b. Hare you provided backup files at a secondary location
for both the programs and the associated documenta-
tion?
2. Access Restrictions:
a. Have you restricted access to the essential programs
and software systems on a need-to-know basis in the
prime and backup areas?
b. Do you employ a multilevel access control to your
(1)
(2)
data files?
By various levels of security classification?
By various breakdowns within a file, i.e., by block,
record, field, and characters?
(3) By read only, write only, update, etc.?
c. Do you perform periodic checks to validate the secu-
rity software utilities and tables of access codes?
d. If you employ remote access to online data bases, do
you employ techniques to prevent more than one user
updating files at any given time?
3. Remote Terminals:
a. Do you employ keyword or password protection?
(1) If so, do you change keywords and passwords semi-
annually (annually)?
b. Do you employ software scrambling techniques during
transmission of vital data?
c. Do you employ hardware cryptographic devices dur-
ing transmission of vital data?
d. Do you restrict terminal users to higher level languages
such as COBOL, FORTRAN, and PL/1, to prevent
their access to machine language coding (which can be
used by a knowledgeable systems programer to over-
*Sources: DoD 5200.28, DoD 5200.2841
F-30
UNCLASSIFIED
-----------------
----------------
-----------------
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172 R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
ride or alter software such as operating systems, secu-
rity utilities, tables, etc.)?
4. Operating Systems:
a. Do your operating systems have built in protection to
prevent the bypassing of security utilities and the un-
authorized access to data bases by a knowledgeable
programer familiar with the system?
b. Are memory bounds tested following maintenance,
initial program load, and each restart?
c. Can your own software systems technologists be de-
pended upon not to circumvent the normal access
procedures by use of a special coding thus violating the
integrity of the system?
d. Are all modifications to the operating system verified by
by the Security Officer or personnel designated by
him?
e. Is a record of all operating system modifications main-
tained until &t least the next software release?
S. Application Programs:
a. Are well designed restart and recovery procedures in-
corporated and utilized?
b. Do your restart procedures properly handle the more
complex requirements presented by files that are proms
essed in random rather than sequential order?
c. Are programing changes and maintenance well con-
trolled and documented?
d. Do you employ diagnostic and test routines to validate
outputs from critical reporting systems?
6. Threat Monitoring:
a. Do you maintain a monitor log of those who access
data banks or any sensitive files?
b. Do you use a software security routine to monitor at-
tempts to access sensitive files by unauthorized users?
(1) Does this routine notify the operator via the on-line
console?
(2) Does this routine provide a record of all such attempts
via a printout at day's end?
c. Does your organization use the data obtained above to
develop patterns which can help to track down pos-
sible suspects who misuse or have unauthorized access
to vital data records?
d. Are all security incidents investigated to determine
their cause and where possible, the corrective action to
be taken?
F-31
UNCLASSIFIED
YES NO COMMENTS
----------------
----------------
- - - - - - - - - - - - - - - -
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
YES NO COMMENTS
e. Is a formal investigation in accordance with DOD
Regulation 5200.1-11 conducted whenever a compro-
mise or suspected compromise is the result of the secu-
rity incident?
C. SERVICE PERSONNEL
1. In-House:
a. Do you control access to vital areas for custodial, else-
. and other in-house maintenance personnelt
b. Do you provide special escorts for maintenance per-
sonnel who are not appropriately cleared?
2. Vendor:
a. Do you have a list of each vendor's authorized service
and systems support personnel?
b. Do you insist on positive identification?
c. Do you supervise their activities to ensure that they
don't compromise your security?
d. Do you insist that vendors verify that they have per-
formed a background check on their personnel?
FILES
1. On-Line and Off-Line Program Files:
a. Are the duplicate files stored in a separate building
from the originals?
b. Have you considered the merits of leasing underground
storage space from a reputable vital records concern?
c. Do you store programs in low fire hazard containers?
d. Do you have a current inventory of such files?
e. Have you held a "dry run" in the past 3 months to test
the ease and accuracy of your file backup system?
f. Are program changes controlled and recorded?
Are changes made only to a reproduced version of the
original program file with the original left intact?
h. Do you maintain a record of items withdrawn from
production file area?
i. Does Computer Operations review systems documen-
tation for compliance with' operational standards?
Do you maintain any type of backup of source data
for programs under development?
k. Are programs classified according to a predetermined
classification policy?
UNCLASSIFIED
----------------
----------------
----------------
----------------
----------------
----------------
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
2. Documentation :
a. Do you have documentation standards which include:
(1) We or Bow charts?
(2) Current listing?
(3) Input and Output formats?
(4) Output samples?
(6) User documentation?
(6) Copies of test data?
(7) Adequate explanation of codes, tables, calculations,
etc.?
(8) Explanation of error messages?
(9) Rejected record procedures?
(10) Explanation of halts?
(11) File sequence description?
(12) Control and balancing instructions?
b. Do you maintain duplicates of all documentation?
c. Is the duplicate filed in a separate building from the
original?
d. Do you utilize low fire hazard storage equipment for
documentation?
e. Do you inventory this file at least annually?
f. Do you review your documentation backup period-
ically to ensure its current applicability?
g. Are changes in programs and documentation coordi.
nated and approved by the cognizant areas?
h. Are changes reviewed by the internal auditor?
i. Does Computer Operations review systems documen-
tation for compliance with operational standards?
3. Data Files :
a. Is the retention cycle for the data files documented for
sack application?
b. Does the user review this procedure regularly for
compliance?
c. Are all data files maintained within and under the con-
trol of the computer complex rather than user?
d. Are files classified in terms of degree of sendtivity and
value to the organization?
e. Are files (tape, disk, or card) kept in an area other than
the computer room?
YES NO COMMENTS
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
UNCLASSIFIED
f. Is this area fire-protected?
g. Is access specifically controlled?
h. Do you use special low fire hazard storage containers
for critical files?
i. Is your program for source document retention co-
YES NO COMMENTS
ordinated with your file reconstruction procedures? ------ ----
Do you "dry run" your data file security system
periodically to ensure compliance with standard
procedure?
k. Do you know the relative value of a given program
application or file?
1. Do you understand and comply with the legal require-
ments for file retention?
m. Do you educate the user to participate effectively in a
file classification program?
E. INTERNAL AUDIT CONTROLS
1. Does an overall audit control philosophy exist relatingto com-
puter systems concerned with assets?
2. Are computer usage and production controls employed? ------
Is user input controlled to ensure receipt of all input data?
3.
4. Is output monitored to ensure compliance with standards?
5. Do error reporting and follow-up procedures exist?
6. Does a quality control exist to verify proper execution of
reports?
7. Are program changes controlled?
8. Are all options of all programs tested?
9. Are conversions controlled to ensure continuity?
10. Does the installation ensure separation of duties?
11. Is the installation adequately protected against intrusion? ------ ----
12. Does backup exist for programs and files?
13. Does backup exist for hardware?
14. Are the systems auditable?
15. Does the auditor get involved during the system design
phase?
F. TIME-RESOURCE SHARING
(i.e., the concurrent use of any system by two or more
users-includes time sharing, multiprocessing, multipro-
graming, etc.)
1. Are remote terminals available only to selected individuals?_ ------
2. Is access to terminal controlled by:
F-34
UNCLASSIFIED
----------------
----------------
----------------
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
a. Locked doors?
b. Posted guards?
c. Other restraints?
3. Is the location of the terminal such that each user's privacy
is ensured?
4. Do you have an absolute control of portable terminals to
prevent their theft and misuse?
5. Do you utilize "passwords" to identify a specific terminal
and a specific user?
6. Is the password protection system really tamperproof?
7. Is the interval at which passwords are changed appropriate
to the security requirements?
8. Is the password combined with physical keys or access
badges?
9. Does the system software restrict a given individual to
specific data files only?
to. Is the right to add, delete, or modify files limited by software
controls?
11. Is access to the "keyword" and "lock-word" files restricted?
12. Does the system maintain accurate records of all activity
against each data file?
13. Are security-override procedures classified at the highest
level and the use of override closely monitored?
14. Are scramblers or other cryptographic techniques utilized
as appropriate?
15. Is the time-resource sharing security system monitored and
reviewed?
16. Is program debugging of the security system closely moni-
tored and controlled?
17. Do you have software protection of online operating sys-
tems/applications programs?
CONTINGENCY PLAN
Backup Facilities:
a. Do you have a backup computer available?
(1) If yes, is it in :
(a) The same room? (not good)
(b) A different room-same building? (better)
(c) A separate location? (best)
(2) Can it handle your workload?
UNCLASSIFIED
YES NO COMMENTS
----------------
--------------
----------------
----------------
----------------
----------------
----------------
----------------
----------------
----------------
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
UNCLASSIFIED
b. If not, do you have access to another computer?
(1) Contractual agreement?
(2) Test at least quarterly?
(3) Does the installation take computer security seriously?
(4) Can it handle your workload?
c. Do you have an implementation plan for use of
backup installation?
d. Do you test and review it periodically?
e. Do you have a regular maintenance schedule?
f. Do you monitor it for compliance?
g. Does the vendor stock span parts locally?
2. Do you have a written contingency plan covering:
a. Who is responsible for each functional area?
b. A detailed notification procedure clearly specifying-
"Who calls whom?"
(1) Management?
(2) Emergency crews?
(3) Users?
(4) Backup sites?
(5) Service personnel?
(6) Facilities personnel?
c. Criteria for determining extent of disruption?
d. The responsibility for retaining source documents
and/or data files for each application?
e. Identification of backup installations?
f. Destruction or safeguarding of classified material in
the central computer facility in the event the facility
must be evacuated?
g. Items such as:
(1) Purchase or lease of new or temporary computer
equipment?
(2) Acquisition of air conditioning equipment?
(3) Purchase of computer time/services?
(4) Acquisition of additional manpower?
(5) Acquisition of furnishings, cabinets, etc.?
(6) Acquisition of replacement tapes/diskpacks?
(7) Alternate site preparation?
YES NO COMMENTS
-----------------
-----------------
-----------------
-----------------
- - - - - - - - - - - - - -
----------------
----------------
----------------
F-36
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
YES NO COMMENTS
(8) Travel accommodations?
(9) Orderly transportation of computer jobs, personnel,
and related materials?
(10) Duplication of backup files?
(11) Continuing security in contingency mode?
h. Do you have a contingency training program for all
ADP personnel?
UNCLASSIFIED
----------------
----------------
----------------
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
APPENDIX G
ACCESS NOMINATION FORM (U)
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
(U) This appendix provides the format for requesting access to
CHOSUN facilities and/or the CHOSUN network. The incomplete form
is UNCLASSIFIED. The completed form will be classified SECRET.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
PROJECT CHOSUN ACCESS NOMINATION FORM
DATE
2
TO
3 FROM
CHOSUN NETWORK SECURITY OFFICER
REQUESTING AGENCY
4
1 NOMINEE IDENTIFICATION
FULL NAME RANK/GRADE DATE OFSRTH
PLACE OF BIRTH SOCIAL SECURITY NUMBER
ADDRESS OF AGENCY/ORGANIZATION ASSIGNED POSITION
TELEPHONE NUMBER SCHEDULED DEPARTURE/REASSIGNMENT DATE
5
1 CLEARANCE/INVESTIGATIVE DATA
LEVEL HELD SCI ACCESS INVESTIGATIVE AGENCY
DATE GRANTED TYPE OF INVESTIGATION
(BGGNATURE CERTFES COMPLGANCE WITH CLEARANCE/NVESTI3ATIVE
AGENCY SECURITY OFFICER APPROVAL REQUIREMENTS SPECFED IN CHOSUN NETWORK SECURITY MANUAL)
6
JUSTIFICATION FOR ACCESS
SPECIFY NODES TO BE ACCESSED, REASON FOR ACCESS, NEED-TO-KNOW, TYPE OF ACCESS (LF- FACILITY ONLY OR NETWORK)
PERIOD OF ACCESS (SPECFY DATE(s) )
NISSO/HISSO/PMO SIGNATURE DATE OF SIGNATURE
AGENCY SIGNATURE APPROVAL POSITION OF APPROVING AGENT
DATE OF APPROVAL
7
1 ACCESS AUTHORIZATION
NSO SIGNATURE APPROVAL/DISAPPROVAL DATE
DAA SIGNATURE APPROVAL/DISAPPROVAL DATE
COMMENTS
UNCLASSIFIED
G-4
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
STATEMENT OF WORK FOR AN RF-SHIELDED ENCLOSURE (U)
Classified by: NSDD-95
Declassify on: OADR
(U) NOTE: This Outline Statement of Work is classified CONFIDENTIAL.
When detailed site-unique information is added to Attachments A, D, E,
G, I, and J and the document is associated with a specific Project
CHOSUN site, the Final Statement of Work must be classified a minimum
of SECRET, as determined by the result of a review by cognizant
authority.
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
CONFIDENTIAL
(C) This outline document provides a mechanism for the procurement
of a Project CHOSUN standard RF-shielded enclosure in which to house
a node video console and a node digital data console. Essentially,
the document complies with NSA's NACSEM 5204, Appendix B (NSA
Specification No. 65-6, which provides 100 dB of electromagnetic
attenuation) amended to include: 45 dB worth of acoustic treatment;
18 to 24 inches of clear space around and over the RF-shielded room;
a minimum of 4 inches of clear space under the enclosure; and
special treatment of the parent room.
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
CONTENTS
Section
Page
1.
INTRODUCTION .........................................
H-7
2.
GENERAL REQUIREMENTS .................................
H-7
3.
ASSEMBLY AND INSTALLATION ............................
H-8
4.
APPLICABLE PUBLICATIONS ..............................
H-9
5.
DRAWINGS, INSTRUCTIONS, AND REPORTS ..................
H-9
6.
MATERIAL .............................................
H-11
7.
INSTALLERS ...........................................
H-15
8.
INSPECTION AND MATERIAL TESTS ........................
H-15
9.
APPROVAL AND ACCEPTANCE ..............................
H-16
10.
ADDITIONS AND CORRECTIONS ............................
H-17
11.
CAUSE FOR REJECTION ..................................
H-17
12.
WARRANTY .............................................
H-17
13.
SPECIFIC QUALITY CONTROL .............................
H-17
14.
OPERATION AND MAINTENANCE INSTRUCTIONS, PARTS
LIST, AND TEST PROCEDURES ............................
H-18
15.
GOVERNMENT FURNISHED MATERIAL AND INFORMATION........
H-19
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
PAGE
A.
GENERAL SPECIFICATION FOR RF-SHIELDED ENCLOSURE......
H-21
B.
REQUIRED ELECTROMAGNETIC ATTENUATION .................
H-25
C.
REQUIRED ACOUSTIC ATTENUATION ........................
H-27
D.
ENCLOSURE DIMENSIONS .................................
H-29
E.
PARENT ROOM ..........................................
H-31
F.
INTERIOR FINISH ......................................
H-33
G.
SERVICE PENETRATIONS .................................
H-35
H.
POWER LINE FILTER SPECIFICATION ......................
H-37
I.
ELECTRICAL DISTRIBUTION ..............................
H-41
J.
AIR CONDITIONING .....................................
H-43
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
SECTION 1. INTRODUCTION (U)
1.1 Background (U)
(C) One safeguard the U.S. Government uses to protect its sensitive
information from being electrically compromised is conducting clas-
sified meetings and discussions in permanent electromagnetic
shielded enclosures. Therefore, offerors are requested to submit
proposals for the design, fabrication and installation of an
RF-shielded enclosure as identified in attachment A hereto. As-
sembly and installation of this enclosure shall be at a Government
facility in the Washington, D.C., metropolitan area. The exact
location will be identified upon date of contract award, or sooner
if deemed necessary by the Government.
1.2 Scope of Work (U)
(U) The Contractor shall provide the qualified personnel, faci-
lities and materials necessary to design, fabricate and install an
RF-shielded enclosure as denoted herein, in accordance with the
attached general specifications which are hereby incorporated by
reference and made a part hereof.
(U) This Statement of Work, with its attachments, covers the
design, fabrication and installation of the above-mentioned RF-
shielded enclosures, hereinafter referred to as "enclosure."
SECTION 2. GENERAL REQUIREMENTS (U)
2.1 General (U)
(U) The enclosure shall be assembled by a firm regularly engaged in
the manufacturing of RF-shielded enclosures and must have built
similar enclosures of at least the size specified in attachment A.
No prototype or nonstandard items will be used. All equipment and
devices must be in common use and have spare parts readily avail-
able.
2.1.1 (U) RF-Shielded Enclosure. The Contractor shall furnish a
turn-key shielded enclosure designed, built, and assembled at
Government facilities or identified by the Contracting Officer and
in conformance with NSA Specification No. 65-6, including Heating-
Ventilation-Air Conditioning (HVAC), electrical, plumbing, fire
detection, and architecturally sound systems.
(U) The RF-shielded enclosure shall be built and tested strictly to
the requirements of NSA Specificiation No. 65-6 (Appendix B of
NACSEM 5204), unless specified exemptions or changes are made within
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
this Statement of Work. Where the above NSA Specification does not
give specific direction on a particular construction or testing
problem, the Contractor shall propose one or more possible solutions
to the Contracting Officer's Technical Representative (COTR) for his
approval or selection prior to implementation. Discrepancies noted
by the Contractor between the NSA Specification cited above, other
specifications to be followed in part (such as NACSIM 5203 or those
listed in Section 4. herein) or any Government furnished or approved
drawings shall be promptly brought to the attention of the COTR for
clarification and resolution.
2.2 (U) The enclosure(s) shall meet (or exceed) the electro-
magnetic attenuation requirements as described in attachment B,
hereinafter referred to as "attenuation requirement."
2.3 (U) The enclosure(s) shall continue to meet (or exceed) the
attenuation requirements for a period of three (3) years after
initial field acceptance without requiring major maintenance (i.e.,
retightening of bolts, screws).
2.4 (U) The enclosure(s) shall meet (or exceed) the acoustic
attenuation requirement as described in attachment C.
2.5 (U) Whenever possible, the enclosure(s) shall have inter-
changeable wall panels to permit the relocation of panels containing
the door, power line filters, signal line penetrations, and air
conditioning and ventilation penetrations during installation while
still maintaining all the requirements of this Statement of Work
(SOW).
2.6 (U) The enclosure(s) shall be capable of being increased or
decreased in length and/or width, at a later date, by the addition
or removal of one or more of the RF panels while still maintaining
all the requirements of this specification.
2.7 (U) The enclosure(s) shall be capable of disassembly and
subsequent reassembly, at a later date, while still maintaining all
the requirements of this specification.
SECTION 3. ASSEMBLY AND INSTALLATION (U)
(U) Installation of the enclosure(s) will be at a later date at a
location somewhere within the Washington, D.C.,metropolitan area as
specified by the Contracting Officer. The Contractor shall provide
installation personnel within ten (10) days after delivery of the
enclosure.
H-8
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
SECTION 4. APPLICABLE PUBLICATIONS (U)
4.1 (U) The following standards of the latest addition in effect
on the date of invitation for bid form a part of this specification
to the extent specified herein. The requirements of this specifi-
cation, its attachments and supplements will prevail in the event of
conflict with any of the below-mentioned publications.
4.2 Department of Defense, National Security Agency (U)
a. (U) NACSEM 5203 Guildelines for Facility
Design and Red/Black Installation
b. (U) NACSEM 5204 Shielded Enclosures
c. (U) NSA Specification National Security Agency
No. 65-6 Specification for RF-Shielded
Enclosures for Communications
Equipment: General Specification
(Appendix B of NACSEM 5204)
4.3 Military Standards (U)
a. (U) MIL-STD-220A Method of Insertion-Loss
Measurement
b. (U) MIL-STD-285 Attenuation Measurement for
Enclosures, Electromagnetic
Shielding, for Electronic Test
Purposes, Method of
c. (U) MIL-F-15733 Filters, Radio Interference,
General Specification for
4.4 American Standards (U)
a. (U) American National (All Applicable Publications)
Standards Institute
b. (U) National Electrical Code
SECTION 5. DRAWINGS, INSTRUCTIONS, AND REPORTS (U)
5.1 Preliminary Drawings (U)
(U) Four (4) sets or preliminary drawings (not less than 24" x 36")
of the proposed enclosure, to include one set of sepias, shall be
submitted to the Contracting Officer or his representative within
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
twenty (20) days after award of the contract. They shall include an
architectural drawing showing the dimensions of the enclosure and
external features such as power line filters, floor and ceiling
supports systems, signal line penetrations, air conditioning and
ventilation penetrations, door and door swing area requirements, and
any other features which may require modification to the original
enclosure design and/or the parent room.
5.2 Final Drawings (U)
(U) Two (2) complete sets of final drawings shall be included with
the shipment of each enclosure. One (1) set of not less than 24-
inch x 36-inch mylar sepias must be provided to the Contracting
Officer or his representative not less than fifteen (15) days prior
to shipment of the enclosure. Sepias must be of highest quality and
produce clearly detailed copies. Drawings will not be reduced in
size from originals. The final drawings shall incorporate all
revisions, additions, deletions, and/or corrections resulting from
the review of the preliminary drawings. In addition, they will
include, for each enclosure:
a. (U) An architectural drawing showing the dimensions of the
enclosure and external features such as systems, signal
line penetrations, air conditioning and ventilation
penetration, door and door swing area requirements.
b. (U) An architectural drawing of the interior finish.
c. (U) Detail drawings of the RF panels; floor and ceiling
support systems; access openings, power, signal, air
conditioning and ventilation penetrations; and lighting
layout.
d. (U) Cross-sectional drawing of the walls, floor, and
ceiling including the floor and ceiling support systems and
interior finish.
e. (U) Cross-sectional drawings of the access opening.
f. (U) Electrical schematic diagrams and connection drawings
of the power line filters, power distribution panel(s),
access opening alarm, and lighting.
g. (U) A complete set of installation instructions describing
in detail the step-by-step procedure for installing the
entire enclosure and auxiliary components.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
h. (U) The original manufacturer's (not Contractor's)
descriptive brochure or service manual for each auxiliary
device. (The Contractor's brochure or service manual for
auxiliary devices will be accepted only when no manufac-
turer's brochure or service manual exists.) Xerox-type
copies are not acceptable.
SECTION 6. MATERIAL (U)
6.1 General (U)
(C) All materials used in the construction of the enclosure shall
be new, of current manufacture, and of a high grade, free from all
defects and imperfections. Workmanship shall be in acccordance with
good modern industrial practices. Should a definite material not be
specified, a material shall be used which will meet the requirements
of this specification and will be in agreement with good engineering
practices.
6.2 Substitution of Parts and Materials (U)
(U) If the Contractor desires to substitute another part or
material (1) where the specifications and approved drawings require
a specific item, or (2) where a particular part or materials have
been previously approved for use, he shall notify the Contracting
Officer immediately (by telephone) and submit a written statement
describing the proposed substitution and the reason therefor. Along
with the statement, he shall submit evidence that such a substitu-
tion is at least the equal of the part of material specified or
previously approved. At the discretion of the Contracting Officer,
samples may be required which will demonstrate by testing the suita-
bility of the proposed substitution.
6.3 Mechanical (U)
6.3.1 (C) Enclosure Size. The size of the enclosure shall be
specified in the specification applicable to each enclosure
(attachment D). The minimum inside vertical dimension of the
enclosure will be no less than nine feet, with approximately one
foot used for a raised floor and six inches utilized for a hung
ceiling. The adequacy of the remaining seven feet, six inches for
the node operational area will be determined by the Government and
the Project CHOSUN prime contractor.
6.3.2 (U) Parent Room Dimensions. The parent room dimensions
shall be specified in the specification applicable to each enclosure
(attachment E).
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
6.3.3 (U) Enclosure Weight. The gross weight of the enclosure
shall not exceed 80 pounds/square foot (as averaged over the floor
area occupied by the enclosure).
6.3.4 (U) RF Panels. The RF panels shall be fabricated from zinc-
coated steel, laminated to both sides of exterior-grade plywood or
3/4" wood particle board. The combined thickness (gauge) of the
steel shall be sufficient to meet (or exceed) the attenuation
requirements. Uniform panel thickness shall be ensured so that the
mechanical joints form a positive, flat contact, thereby producing a
tight RF seal between every mating surface. Contact between dissi-
milar metals shall be avoided to prevent galvanic action.
6.3.5 (U) Panel Size. The RF panels shall be no greater than 96
inches in length to 48 inches in width unless otherwise specified.
6.3.6 (U) Joints Between Panels. The framing (or clamping) system
shall be fabricated from not less that 1/8-inch thick, zinc-coated,
structural steel. The selection of material and its configuration
shall provide the rigidity, elasticity and hardness necessary to
ensure proper structural strength and RF-tight joints without need
for RF gasketing, foil, caulking, knurling, welding, or soldering.
Clamping pressure shall be applied to all seams by cadmium-plated,
(no less than 1/4-inch) self-threading or machine, phillips-head or
hex-head screws, placed on maximum 4-inch centers capable of proper
and uniform torqueing to assure maximum metal-to-metal conformity
and an RF-tight joint. Contact between dissimilar metals shall be
avoided to prevent galvanic action. The framing (or clamping)
system shall be designed so that installation can be accomplished
entirely from inside the enclosure. The framing (or clamping)
system shall meet (or exceed) and maintain the attenuation require-
ments without maintenance (i.e., retightening of bolts, screws) for
a minimum or three (3) years.
6.3.7 (C) Under-Structure (Floor Support System). Supporting
elements between the enclosure and the parent room floor shall be
incorporated in the enclosure design. This system shall use
transparent lucite and rubber blocks to elevate the enclosure no
less than 2 inches and no more than 18 inches (unless otherwise
specified) to provide unobstructed surveillance of the area between
the underside of the enclosure and the floor of the parent room.
6.3.8 (U) Structural Requirements
6.3.8.1 (U) Floor Loading. The floor support structure shall be
designed to carry an average floor load of 80 pounds per square foot
with a miximum point load of 175 pound per square foot over a
4-square-foot area.
H-12
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
CONFIDENTIAL
6.3.8.2 (U) Deflection
6.3.8.2.1 (U) Walls. A static load of 75 pounds applied with
normal pressure to the wall surface at any point shall not cause a
deflection exceeding 1/250th of the span between supports.
6.3.8.2.2 (U) Ceiling. Deflection shall not exceed 1/480th of the
span.
6.3.8.3 (U) Structural Support Beams. Structural support beams
may be employed (on the outside of the enclosure only) provided the
outside dimensions (length, width, and height specified in the
Supplemental Data) are not exceeded. No parent room-to-enclosure
ceiling supports shall be used unless specified.
6.3.9 (U) Assembly. The complete enclosure (i.e., RF panels,
framing system, structural beams, under-structure) shall be capable
of assembly on site without welding or soldering.
6.3.10 (U) Access Opening. Will consist of an entrance vesti-
bule. The entrance vestibule, which will be the same performance
and sound attenuation requirements as the enclosure, will be
equipped with two interlocking electromagnetic door systems, Ray
Proof Model RCM-8CM-85G-80 (or equivalent), to maintain shielding or
the enclosure at all.times. The outer door will have a Sergeant and
Greenleaf Codetronics cipher lock Model 8419 for restricted person-
nel access to the room. Both doors will have special audio treat-
ment to meet the attenuation requirements of attachment C. Oper-
ation of the door latching/unlatching mechanism and the overhead
door actuator is through a series of microswitch contacts and
actuator buttons or floor mats which control an electric motor drive
of the latching mechanism and then the automatic door actuator. An
electrical safety mat is provided on the swinging side of the door
to instantaneously stop the opening or closing operation should
anyone be in danger of being struck by the moving door leaf. The
operation of the door is protected by means of a complete manual
override capability. It must be possible to open the door from
either side, in the event of a failure, such as loss of mechanical
power, by means of an emergency manual mechanism. Doors shall be
electrically interlocked to prevent simultaneous opening of both
doors.
6.3.11 (C) Interior
6.3.11.1 (U) Floors. Masonite (or equivalent) shall be installed
flush with the RF floor clamps. All RF floor clamps shall be
secured by utilizing counter-sunk flat-head screws. A raised floor
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
of approximately one foot in height shall be installed. The floor
covering shall be commercial grade carpet (color selection by
customer).
6.3.11.2 (C) Walls. The interior walls shall be constructed of
5/8-inch sheet rock, attached by metal furring studs on 16-inch
centers with door and ceiling tracks. Attached to this wall will be
Armstrong Soundsoak 85, 1-inch-thick wall panels (a sample of avail-
able colors to be provided to customer for selection prior to order-
ing and installation.) Colors should be limited in range to ensure
high color temperature for video camera signals. A soft blue or
soft green is preferred, at least from the chair rail molding uD. A
4-inch vinyl base molding will be provided at the base of the wall
(color coordinated in the wall). See attachment F regarding
Armstrong Soundsoak 85.
6.3.11.3 (C) Ceiling. The ceiling shall be constructed of
5/8-inch sheet rock attached by metal furring studs on 16-inch
centers. A hung ceiling of approximately six inches in depth will
be installed equipped with acoustical ceiling tile.
6.3.12 (U) Service Penetrations. The quantity, type and location
of service penetrations will be as specified in attachment G.
6.3.13 (U) Air Conditioning Requirements. See attachment J.
6.4 Electrical (U)
6.4.1 (U) Power Line Filters. Specifications for the power line
filters are provided in attachment H.
6.4.2 (U) Electrical. Specifications for the electrical distri-
bution equipment and material are provided in attachment I.
6.4.3 (U) Grounding. The enclosure shall have a single point
ground and be electrically isolated from any building ground systems
or potential current-carrying material. Internal wiring shall have
an isolated neutral, and a common grounding terminal will be pro-
vided on the external surface of the enclosure adjacent to the power
penetrations.
6.4.4 (U) Lighting. Interior lighting shall consist of low
profile, incandescent round-shaped ceiling fixtures (3-100W/nominal
size of 15 1/2-inch diameter x 6-inch with nominal output of 4800
lumens). Light fixtures are to be surface mounted to acoustical
tile. Lighting needs to be diffused for video operation and provide
high color temperature. Light switches shall be provided and
located near the entrance doorway. Each switch that controls
H-14
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
overhead lighting shall be equipped with a suitable dimmer switch.
NOTE: If flourescent lamps are employed, they must be specially
designed for use in a TEMPEST environment.
6.5 Fire Detection System (U)
6.5.1 (U) A fire detection system/smoke and ionization detector
system shall be installed within the shielded enclosure. If a fire
detector is activated, a bell or other audible warning device shall
sound and a light shall illuminate within the enclosure and at a
location (to be determined) outside the enclosure. Such outside
location shall be in either the parent room or in close proximity
thereto.
6.5.2 (U) The fire detection system will be provided and installed
by the Contractor. The Contractor shall provide all conduit and
wiring required to connect this system. Shielded wiring shall be
used to connect the smoke and ionization detectors with the control
circuits. Wiring shall be tagged for proper identification. All
penetrations of the shield shall maintain the RF integrity of the
enclosure.
SECTION 7. INSTALLERS (U)
(U) Installation of the enclosure as detailed herein shall be
conducted by expert field technicians/representatives with Depart-
ment of Defense national security clearances, minimum level of
SECRET.
SECTION 8. INSPECTION AND MATERIAL TESTS (U)
8.1 Monitoring Inspections (U)
(U) During the design and fabrication phase of the enclosure(s),
the Government reserves the right to conduct monitoring inspections
at the Contractor's plant. It will be the responsibility of the
Contractor to advise the Contracting Office of the details where
deviations from the Statement of Work, its attachments or applicable
specifications to each enclosure exist.
8.2 Material Inspections (U)
(U) After the enclosure has been fabricated, a material inspection
may be made by the Contracting Officer or the COTR at the Contrac-
tor's plant to facilitate payment. This in no way relieves the
Contractor of his resonsibility to provide any parts or material
which may be missing at the time the material inspection is made.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
8.3 Component Tests (U)
(U) During the process of design and fabrication, the Government
reserves the right to conduct tests when material and/or methods are
being employed which, in the opinion of the Contracting Officer, may
not meet the requirements of this Statement of Work, its attach-
ments, or the specifications applicable to each enclosure.
8.4 (U) A preliminary test shall be conducted prior to instal-
lation of the interior finishes and full acceptance test upon com-
pletion of the enclosure. Testing shall be in accordance with the
procedures of NSA Specification No. 65-6 and the acoustic attenu-
ation test portion of NSA Specification 65-5. A test plan shall be
submitted for approval and full test report submitted upon comple-
tion. Tests shall be performed by Contractor personnel with all
required in-calibration test equipment. The Government reserves the
right to conduct independent tests to determine the degree of
shielding achieved.
8.5 (C) RF leaks will be detected by means of a Contractor-
provided TS-31 Monitoring System as manufactured by Quanta Systems.
It is understood that the Contractor may have difficulty in obtain-
ing the necessary release in order to acquire the TS-31 system.
Should this be the case, the Contractor will immediately notify the
Government so that appropriate steps may be taken to assure its
release for use on this project. In addition, the Contractor will
provide a Shielding Integrity Monitoring System (SIMS) unit, which
operates at 462 MHz.
SECTION 9. APPROVAL AND ACCEPTANCE (U)
9.1 Design Approval (U)
(U) The preliminary drawings for each enclosure shall be reviewed
and approved by the Contracting Officer or the COTR prior to the
manufacturing phase.
9.2 RF and Acoustical Acceptance Tests (U)
(U) The Contractor shall furnish all test equipment and personnel
to demonstrate compliance with NSA Specification No. 65-6 and
meeting an acoustical attenuation of 45 dB. The number of test
frequencies shall be designated by the COTR. The COTR may, at his
discretion conduct separate RF and acoustical tests to verify the
Contractor's results.
H-16
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
SECTION 10. ADDITIONS AND CORRECTIONS (U)
10.1 (U) Additions and/or corrected drawings, publications, and
instructions shall be supplied to the Contracting Officer as soon as
the addition and/or correction has been incorporated. Changes made
to the enclosure during installation must be reflected in final
revised or corrected drawings.
SECTION 11. CAUSE FOR REJECTION (U)
11.1 (U) The work supplied under this contract shall be in all
respects, including design, construction, installation, workmanship,
performance and quality, in strict accordance with the requirements
specified.
11.2 (U) Evidence of non-compliance to specified requirements
shall constitute cause for rejection, and it shall be the responsi-
bility of the Contractor to make all necessary corrections at no
extra charge to this contract.
SECTION 12. WARRANTY (U)
(U) The RF-shielded enclosure, less moving parts, shall be
guaranteed against defective materials and workmanship and to retain
the specified shielding characteristics for a period of five years
from date of acceptance test.
(U) Moving parts, such as the door, access ports and access panels,
shall be guaranteed for a period of one year from date of acceptance
test.
SECTION 13. SPECIFIC QUALITY CONTROL (U)
(U) In addition to the general quality control requirements, the
Contractor's Quality Control Representative shall perform the
following:
a. (U) Verify that all new materials are unused, free from
defects and imperfections in workmanship and material.
b. (U) Verify that the workmanship and finish shall be such
as to ensure satisfactory operation consistent with the
requirement of these specifications. The equipment shall
be thoroughly clean and free of excess materials, chips and
loose spattered foreign materials. Dissimilar metals
shall be protected from galvanic action at contact points.
c. (U) Verify that the mechanics engaged in machining,
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
welding, supervision, and testing shall have not less than
two years of responsible experience in their trades and in
the employ of manufacturers of radio frequency shielding
building components. Helpers and apprentices shall work
under the supervision of responsible mechanics.
d. (U) Verify that the door shall be mated to its frame so as
to ensure proper, uniform pressure on all RF seals. Mated
assemblies shall be match-marked for installation and all
critical measurements recorded, and verified at time of
installation.
e. (U) Keep permanent records of receiving inspection of all
materials, as well as manufactured assemblies and in-shop
tests and inspections. Spot checking of these records
shall be performed on site, prior to use in the install-
ation.
SECTION 14. OPERATION AND MAINTENANCE INSTRUCTIONS, PARTS LIST, AND
TEST PROCEDURES (U)
a. (U) Operation and maintenance instruction: The instruc-
tions shall include complete procedures necessary to
operate and maintain the equipment as recommended by the
manufacturer. The following sections shall be included, as
applicable: ..
(1) (U) Safety precautions.
(2) (U) Assembly and installation procedures.
(3) (U) Adjustment and alignment.
(4) (U) Routine and preventive maintenance procedures,
including a table of recommended frequencies of
performing each procedure; e.g., filter cleaning or
replacement, lubrication of door mechanisms, etc.
(5) (U) Checkout procedures.
(6) (U) Troubleshooting procedures.
(7) (U) Repair and corrective maintenance replacement
procedures.
b. (U) Items of equipment to be described shall include:
(1) (U) Hinges.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
(2)
(U)
Latching hardware.
(3)
(U)
RF gaskets or seals.
(4)
(U)
All types of filters.
(5)
(U)
Panel supporting members.
c. (U) Parts Lists: A parts list shall be furnished which
shall include those spares and parts recommended by the
manufacturer to assure efficient operation for one year's
operation following expiration of the warranty period.
This list shall cover components, replacements, supplies,
and expendable items as may be required.
d. (U) Test Procedures: Detailed procedures shall be
prepared and submitted, covering all tests specified
herein, and shall include blank forms for recording and
validating the test data.
SECTION 15. GOVERNMENT FURNISHED MATERIAL AND INFORMATION (U)
(U) The Government shall prepare the parent room(s) to accept the
RF-shielded enclosure as outlined in attachment E. Specific vari-
ations will be addressed on a site-by-site basis.
H-19
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
ATTACHMENT A
GENERAL SPECIFICATIONS FOR RF-SHIELDED ENCLOSURE (U)
SECTION 1. GENERAL (U)
(U) This covers the general requirements applicable to the design
and fabrication of an RF-shielded enclosure.
SECTION 2. ENCLOSURE DELIVERY SCHEDULE (U)
(U) The enclosure shall be delivered according to the schedule
provided by the Contracing Officer.
SECTION 3. ENCLOSURE MAXIMUM OVERALL OUTSIDE DIMENSIONS (U)
a. (U) Length:
b. (U) Width:
c. (U) Height:
ENTER SITE-UNIQUE
INFORMATION
(U) Length shall be within 1 inch of the above value, width shall
be within 1 inch of the above value, and height shall be within 1
inch of the above dimension.
SECTION 4. PARENT ROOM DIMENSIONS (See Attachment E) (U)
a. (U) Length:
b. (U) Width:
c. (U) Height:
ENTER SITE-UNIQUE
INFORMATION
HERE
(U) The parent room dimensions will not be smaller than above
values.
SECTION 5. PERSONNEL ACCESS DOOR (U)
(U) The personnel access doors will be as specified in Section
6.3.10 of the Statement of Work.
SECTION 6. ELECTRICAL (U)
a. (U) Three phase electrical service shall enter the
enclosure. The main feeders shall be terminated in power
distribution panels located as shown in attachment I.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
b. (U) The approximate location of the power line filters,
power distribution panels and ground stud are shown in
attachment I. The Contractor shall determine the quantity
of materials (i.e., length of wire and conduit, number of
conduit fittings). The Contractor shall include all
material necessary to furnish a complete and functional
electrical distribution and lighting system. The holes, in
the RF wall panel, for the power line filter penetrations
and ground stud, shall be cut during field installation.
c. (U) The enclosure light shall be designed for operating on
120V A.C., single-phase, 2-wire (plus equipment ground).
d. (U) All conduit must be surface-mounted ferrous metal
conduit, or approved channeling with associated ferrous
fittings; EMT (thin wall) is preferred. Fittinqs must be
compression or threaded type. Junction boxes and pull
boxes, if required, must be of ferrous metal construction
and all knockout openings sealed. All such boxes will be
mounted on the enclosure identified in attachment I.
SECTION 7. AIR CONDITIONING PENETRATION (U)
a. (U) Insulated Brass Waveguide Penetrations. The
Contractor shall provide insulated brass waveguide
penetrations for the air conditioning chilled water supply
and return lines. The dimensions, type of material and
quantity are to be specified by the Contractor based on
type of air conditioning package supplied with enclosure.
b. (U) Noninsulated Brass Wave uide Penetrations. The
Contractor shall provide noninsulated brass waveguide
penetrations for the air conditioning condensate drain
lines. The dimension, type of material and quantity are to
be specified by the Contractor.
(U) The holes, in the RF wall panels, for the insulated
and noninsulated penetrations shall be cut during field
installation.
c. (U) Fresh Air Ventilation. Twelve-inch by 12-inch honey-
comb air vents shall be provided for fresh air ventila-
tion. The quantity and location of the honeycomb air vents
are to be determined by the Contractor based on size and
configuration of enclosure. Exhaust fans shall be provided
on the honeycomb air vents. The exhaust fans shall be
rated to provide one (1) air change in ten (10) minutes.
Each honeycomb air vent shall have a flush-fitting type
H-22
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
louvered grill on the interior finished wall. Each intake
honeycomb shall have a cleanable, reusable dust filter
installed on the outside of the enclosure. Both the intake
and exhaust honeycomb air vents shall be acoustically
treated, on the exterior of the enclosure only, to meet (or
exceed) the acoustic attenuation requirement of attachment C.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
REQUIRED ELECTROMAGNETIC ATTENUATION (U)
CJ W
V
w o 11
Z J
CSW IIIMJ 11111 111111
H- 25
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172 R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
O
O J
O Q
TOT
y 1
Jill Il I i 0
- -
r
I III I I
a -
HIM
REQUIRED ACOUSTIC ATTENUATION (U)
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
ENCLOSURE DIMENSIONS (U)
SECTION 1. GENERAL (U)
(C) A platform shall be provided for installation under the
enclosure which shall be capable of supporting the enclosure and its
contents without buckling or sagging. Platform design shall allow
unobstructed surveillance of the area between the underside of the
platform and floor of the parent room at all times. There shall be
18 inches of clearance between the floor of the parent room and the
underside of the platform. Supporting pillars of the platform shall
be transparent. Acoustical isolation shall be provided in the
design of the platform to prevent transmission of sound from the
enclosure to the floor of the parent room.
(U) The inside vertical dimension of the RF-shielded enclosure will
be no less than nine feet, with approximately one foot utilized for
a raised floor and approximately six inches utilized for a hung
ceiling. Final interior dimensions will be provided by the Project
CHOSUN implementation contractor.
SECTION 2. SPECIFIC (U)
(U) The inside dimensions of the proposed enclosure are as shown on
the attached drawing and are approximately:
a.
(U)
Length
feet
b.
(U)
Width
feet
c.
(U)
Height
10 feet*
TYPICAL. ACTUAL DIMENSIONS
MUST REFLECT UNIQUE ON-SITE
REQUIREMENTS
*(U) Ceiling height is restricted by the presence of structural
beams at a height from the floor of 10 feet 5 inches; there
fore, the enclosure cannot exceed 10 feet and the lucite
support blocks cannot exceed 4 inches.
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
ATTACHMENT E
PARENT ROOM (U)
SECTION 1. GENERAL (U)
(U) Unless otherwise specified, the Government will prepare the
parent room to accept the RF-shielded enclosure. The Government
will furnish to the Contractor architectural drawings depicting:
the size and location of AC power service entrances; air handler
ducts; existing door openings; signal line, Red ground, and
Protected Distribution System (PDS) routing and entrances; and
protrusions into the parent room space caused by such items as:
pipes, conduit, columns, vertical service chassis, ceiling beams and
supports, and the like.
a. (U) The Government's design goal is to provide the
Contractor a parent room with a vertical unencumbered
dimension of twelve feet, slab-to-slab, within which to
assemble an RF-shielded enclosure with a vertical dimension
of approximately nine feet.
b. (U) The parent room must provide approximately 18-24
inches of clear space between the outside wall of the RF-
shielded enclosure and the inside wall of the parent room.
c. (C) The parent room flooring will be a white linoleum and
all adjacent walls and the ceiling area will be painted
three coats of white enamel in preparation for the install-
ation of the enclosure.
d. (U) The entire parent room area will be air conditioned by
the existing building system. This area is also to be
heated and equipped with a building sprinkler system.
SECTION 2. PARENT ROOM DIMENSION (U)
(U) The maximum dimensions of the parent room are as shown on the
attached drawing, are to be confirmed by the Contractor by field
measurements, and are approximately:
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
a. (U) Length
b. (U) Width
c. (U) Height
ENTER SITE UNIQUE
INFORMATION
HERE
SECTION 3. SPECIFIC (U)
ENTER SITE-UNIQUE
INFORMATION
HERE
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
ATTACHMENT F
Fabric Covering
Thickness (normal)
Absorption Coefficient
Coefficients
Three-Frequency Averag
e
(speech privacy range
absorption)
Four-Frequency Average
NRC Specification Range
e
Speech Privacy Noise
Isolation Class (NIC)
(tested in accordance
with PBS C.2 procedure
III S)
Fire Hazard Classifica-
tion (ASTM E84 Tunnel
Test)
Flame Spread
Fuel Contributed
Smoke Density
INTERIOR FINISH (U)
Soundsoak 85
Low-density Silok'" mineral fiberboard
Embossed needlepunch modacrylic reinforced with
woven glass-fiber scrim
9'
24"
1"
.13 .41 .88 1.06 .99 .98
.98
NRC .85
.80-.90
20
25 or less
20
65
4.00
Concealed aluminum splines attach to drywall,
plaster, brick, block, metal studs, and metal
partitions.
Soft blues or soft greens to enhance video
pickup.
Fabric is colorfast to wet and dry-cleaning
procedures and most spot-cleaning solvents.
Surface Dust: Removed by vacuuming or light
brushing. Spots: Dry-cleaning fluid or carpet
shampoo. Typical Stains: Coffee. soft drinks,
ink crayon, carbon, chewing gum can be com-
pletely removed from Soundsoak fabric.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
SERVICE PENETRATIONS (U)
SECTION 1. GENERAL (U)
(U) The quantity, type, and location of all service penetrations
shall be determined by the contractor in consonance with the Govern-
ment's representative. All such penetrations shall conform to the
RF-shielding requirements of all enclosures.
SECTION 2. SPECIFIC (U)
ENTER SITE-UNIQUE
INFORMATION
HERE
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
POWER LINE FILTER SPECIFICATION (U)
SECTION 1. SCOPE (U)
1.1 (U) This specification covers the detailed requirements for RF
interference power line filters, hereinafter referred to as "fil-
ters," to be used on the RF-shielded enclosures.
SECTION 2. GENERAL INFORMATION (U)
2.1 (U) The filters shall be designed and manufactured in accor-
dance with the latest issue of military specification MIL-F-15733,
and shall be capable of meeting full conformance with test
procedures as specified in MIL-STD-220A (full load).
SECTION 3. GENERAL REQUIREMENTS (U)
3.1 (U) The filters shall provide a minimum of 100 dB attenuation
to all types of signals betweem 14 kHz and 10 GHz at full load.
3.2 (U) The filters shall be designed such that the inductance
coils do not saturate under rated load and that the voltage drop
across each filter at rated load does not exceed 2.0 volts RMS.
3.3 (U) The filters shall be designed and manufactured for
continuous operation at rated load with a temperature rise not to
exceed 25 degrees centigrade above ambient.
3.4 (U) The filters shall comply with MIL-F-15733 overload safety
requirement for 140 percent rated current for 14 minutes as well as
being capable of withstanding short-term current surges in excess of
five (5) times rating without damage.
3.5 (U) The filters shall be rated for 250V A.C./600V D.C., 50 or
60 Hz.
3.6 (U) All required filters shall be externally surface mounted
at a location designated by the COTR.
SECTION 4. POWER SYSTEMS (U)
4.1 (U) The filters shall be capable of operation on the following
power systems:
4.1.1 (U) 120/208V A.C., three-phase, four-wire, 50 or 60 Hz.
H-37
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
SECTION 5. MECHANICAL (U)
5.1 (U) The filter impregnant shall be nonflammable as classified
by Underwriters Laboratories, Inc.
5.2 (U) The filter housing shall be fabricated from corrosion
resistant finish or nonrusting stainless steel and all seams are to
be continuously welded.
5.3 (U) Soft solder shall not be used in the construction of the
hermetically sealed portion of the filter case.
5.4 (U) Each filter shall be provided with hermetically sealed
alumina electrical terminals and these terminals shall be welded or
brazed to the filter case. Soft solder shall not be used to provide
a seal for the terminals.
5.5 (U) Both the input and output terminals will be contained
within the filter housing.
5.6 Filter Input (U)
5.6.1 (U) The filter housing shall have an access opening to the
input terminal large enough to accommodate field installation of the
feeder wire. A removable cover shall be installed on the access
opening.
5.6.2 (U) A UL-approved solderless electrical lug shall be
installed on the input terminal to provide a means for connecting
the feeder wire in the field. The lug shall be sized to accept a
wire rated at the ampacity of the filter.
5.6.3 (U) Each filter shall have a discharge resistor affixed to
its input. The value of the resistor shall be such that the
residual energy can be discharged to 90 percent of its maximum value
within three seconds after the power is removed from the filter.
5.7 Filter Output (U)
5.7.1 (U) If an access opening is provided to the output terminal
within the shielded compartment of the filter housing, it shall have
a cover with a gasket between the cover and the cover mating surface
to maintain the RF interference integrity of the filter.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
5.7.2 (U) A stranded, copper, thermoplastic, insulated-type THW,
600 VAC-rated wire conductor, no less than 48 inches long, shall be
installed on the output terminal of the filter. The size of the
wire shall be as follows:
a.
(U)
50 AMP Filters -- AWG #6
b.
(U)
100 AMP Filters -- AWG #2
c.
(U)
150 AMP Filters -- AWG #1/10
d.
(U)
200 AMP Filters -- AWG #3/0
5.7.3 (U) A threaded pipe waveguide penetration shall be installed
on the output side of the filter. Installation hardware (i.e.,
nuts, washers, gasketing) shall be provided for installing the
filters on the shielded enclosure in the field. The diameter of the
waveguide through which the wire from the output terminal (paragraph
5.7.2 above) shall be governed by the latest edition of the National
Electrical Code. The physical characteristics of the waveguide, the
installation hardware, and method of installation shall be such to
maintain the RF interference integrity of both the filter and the
RF-shielded enclosure.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
ELECTRICAL DISTRIBUTION (U)
SECTION 1. GENERAL (U)
a. (U) All electrical service within the enclosure shall
conform to the current standards outlined in the latest
edition of the National Electrical Code Handbook, and shall
be in accordance with NACSIM 5203, NACSEM 5204, and NSA
Specification No. 65-6. The electrical service within this
enclosure shall be provided by a Red distribution system as
defined in NACSEM 5203. Electrical service shall be
120/208 volts AC, 60 Hz three-phase "Y." All phases plus
the neutral line shall be filtered in accordance with
NACSEM 5204 and NSA Specification No. 65-6. The filters
shall be installed on the outside of the enclosure. The
Red electrical service shall be adequate to provide a
three-phase ampere electrical distribution panel, complete
with 20 amp circuit breakers. This panel shall be located
within the enclosure and appropriately covered to match the
decor of the interior of the enclosure.
b. (U) Additional filters shall be furnished as required for
the cipher lock/interlock door system and fire detector
(ionization). Sufficient duplex outlets shall be provided
and installed by the Contractor in accordance with the
National Electrical Code Handbook. Physical separation of
the electrical distribution service to individual outlets
may also be required by the Government's representative. A
circuit breaker panel shall be provided and installed
adjacent to the filters outside the enclosure by the
Contractor. A sufficient quantity of circuit breakers
shall be provided to allow a separate circuit breaker for
each duplex outlet.
c. (U) The Contractor shall provide a manual trip switch
inside the enclosure and in close proximity to the doorway
which is capable of interrupting all electrical service
within the enclosure. This trip switch will be adequately
marked to indicate that it is an emergency shut off switch.
SECTION 2. SPECIFIC (U)
ENTER SITE-UNIQUE
INFORMATION
HERE
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
CONFIDENTIAL
AIR CONDITIONING (U)
SECTION 1. GENERAL (U)
(U) Air conditioning facilities for the enclosure(s) shall be
provided as specified in the contract. Internal ductwork and
waveguides shall be supplied by the enclosure contractor in all
cases, and he shall be responsible for ensuring that the aircon-
ditioning installation does not degrade the attenuation of the
enclosure.
a. (C) Ductwork. All ductwork shall be designed to provide
the acoustic attenuation in compliance with the require-
ments of attachment C.
b. (U) Waveguides. All air ducts passing through the panels
of the enclosure shall be attached to high frequency elec-
tromagnetic waveguide cutoff type vents inserted in the
enclosure panels to provide RF attenuation in compliance
with the requirements of attachment B.
SECTION 2. SPECIFIC (U)
a. (U) The contractor shall provide an air conditioning
package capable of easily cooling the enclosure based on
the equipment installed within and the average presence of
from persons within the enclosure.
b. (U)
ENTER SITE-UNIQUE
INFORMATION
HERE
CONFIDENTIAL
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
APPROVED TAPE DEGAUSSERS (U)
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
(U) This appendix provides a list of approved tape degaussers for
CHOSUN. After following the appropriate procedures for degaussing
using an approved device, the storage media may be downgraded and
released from the controlled environment. This list of approved
devices is extracted from DIAM 50-4.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
N
?1.)
N
N
5-
5-
I-
C
I-
N-
?r
?r
CO
Q)-O
CO
00
C1
E C)
Cl
C)
Cr
Cr
C \J.
.Cr- ?
N
N
C)
U
.
LO
UU
Ln
Ln
S
C.
4-J, CL
-
4-)
4J
d
Q V)
d
CL
Z
0
\
O
U
z
CL
+?)
r
S_
U I
I
O
C) M
+)
N -
Lf)
U
'- O
C
U Cf
e-1
W 0)
r-+
?r
N CO
~-
Y
N
+~ O
U L.L.
r-~
C
- I
0) 4J
?r I-
Q)
Q)
r- 0
4J C1.
3 CO
J
4-4 H m
u
?r C
to CV
00
O CY
(C \ mt
?r
Y
\
e--4
2 1
S-
C (A 1
>
C
a)
V)
I
M
C)
?r U M
C)
to
a)
O 4-' Lf)
ca O
4-)
r? ?r O
p ?r
(C N
S- U -4
C1
O
O E 0)
S_
i.....
4-) O M
r-N
C.
N RCN
10-0
O
U-0 LL.
r? I
E LO
cc 1
41 E
C O
C) 0 I-
=
0 .--1
0 0
to
() 00
r- S. CL
CO -
UU)
U-0 F-
oU
CD
WCL CV
U
?a
Q)
4-
C)
UNCLASSIFIED
(D
t.0
0.0
C11~0
tD
C,
0) tz
CYI
O
N
C N
C N
C N
C N
C N
C C V
S-
4-
?r -1
?r r-1
?r e-I
?r e-I
r e--I
?r e--1
?r
S-
5- rC
(CO
(CO
(CO
(CO
(0
O
(CO
C-
C) U
S_ I
S? I
S_ I
S_ I
S.
I
S_ I
C)
d
MO
0O
MO
0O
in O
GO
S-
Q CV
Q N
Q N
? CV
QN
'.c o?.- a
N E >t vt O 1"1 10 ?0 0
O L V ? rn S.
u
0) )..) N 0) V 0) O
V .->?- w C V V
O 0) IO N N 10 0) 0)
E s Ip 0) Y C 0) L V
w 0) C V ~-I L 10
V s- ?C
u d a
L N
C) r0 O
C 0) G
L 0) X
naI V G)
S0
3 O 4- G)
?) i s-
VI 0) N
a) O) E
. ZIO
)0 0) 7
u E L i
C 0V
C O1
r ~ Ol L
10 C 1.I
aa)
L > L 4
1-) ar u O
r L
O. 0) N
O. 10
>5 O ?- 0)
?- N 3 L
E ~? w
v V E rn
N 0) 7 C
I n L i ? .-
)a u V V
C
0) iO
V
t V
+-) Q 1) O)
1] L Y b.I L. N E +) 0) 4?I
1- q V 4- N IO 0) N E ?0 - Q)
Q 0) V VI O v VI L. Y L O ?.- ? C
\ () C a) V I. C W In V L t y 0
? t 4- 10 V In M- > ?.- O) 3 Cu IO
n u.^ OV C E
?- O) 0)
L V 10 ?> G N 0 V VS N 0 O)
o '~ o ar > )c c > )o c e C
L .-. >) > L D E L
U O d E V 41
H E Ol VI In ?~ Q) VI VS
VI ?.I
L Ol V C N v y Inv C
C, 4;
?-+ Q u 4) ~- C V 0/ N H C V 4'
O
N OJ b) Y 10 .~ Y ep
E moo uLEU u4-r`O
d O 7 O 10 4- O.C 7 0 Ip :3:2 = ?`) L
0 .... E ' E O v 4) VI V 0) - F) 0 3 r0
7 V
0)
u
O
0) Z r?? N C?) R
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
UNCLASSIFIED
APPROVED PAPER DESTRUCTION DEVICES (U)
L-1
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96B01172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
(U) This appendix contains a list of types of equipment which have
been tested and approved by the National Security Agency and which,
when equipped as specified, meet the routine destruction standards
for paper COMSEC materials.
(U) Approval of a specific equipment has been based only on exami-
nation of residue and a physical security evaluation of the equip-
ment. Such factors as reliability, rate of wear, and frequency of
key part replacement have not been evaluated, and NSA does not
endorse manufacturers' claims concerning these aspects. Hourly
volume rates stated are estimates based on average rates for
destruction of paper materials and may vary depending on variety,
volume, and loading.
(U) Other equipment will be added to this list as it is evaluated
and approved. Queries or information concerning equipment not shown
on the list may be addressed to the Director, National Security
Agency, ATTN: S133, Fort George G. Meade, MD 20755.
(U) Many, though not all, of the devices listed are available from
the GSA Federal Supply Schedule.
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
NSA-APPROVED PAPER DESTRUCTION DEVICES (U)
C
z
0
r
Cl)
Cl)
m
v
EQUIPMENT
DESIGNATION
Air Fed Model 3
Incinerator
Waring 7-Speed
Blender
Destroyit Cross
Cut Shredder
CAPACITY
LBS
MANUFACTURER OR DISTRIBUTOR PER HOUR
Buffalo Metal Fabricating Corp. 6
50 Wecker Street
Buffalo, NY 14215
Waring Products Division
Dynamics Corporation of America
New Hartford, CT 06057
The Michael Lith Sales Corp. 25
145 West 45th Street
New York, NY 10036
1101 Skokie Boulevard
Northbrook, IL 60062
Security Engineered Security Engineered Machine Co. 50
Model 700 5 Walkup Drive
Westboro, MA 01581
Security Engineered Security Engineered Machine Co. 50
Dry Disintegrator 5 Walkup Drive
Model 1 Westboro, MA 01581
Jay-Bee Model MB2 Jay-Bee Manufacturing Co., Inc. 50-75
and MB3 Office P.O. Box 986 75-100
Disintegrator Tyler, TX 75701
Not approved for high
wet strength paper.
Office Model. Low noise
level.
3/32" filter screen required.
Sound enclosure available.
3/16" filter screen required.
Moderate noise level.
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
m
v
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
C
z
r
m
v
DESIGNATION
Intimus 0007
Shredder
(Cross Cut)
Jay-Bee Model AB
Disintegrator
Air Fed Model 2
Incinerator
Security Engineered
Dry Disintegrator
Model 2
Jay-Bee Model 3CB
Disintegrator
Tyler, TX 75701
MANUFACTURER OR DISTRIBUTOR
CAPACITY
LBS
PER HOUR
REMARKS
Whitaker Bros. Business
Also marketed as the
Machines Inc.
5913 Georgia Avenue, NW
Washington, DC 20011
Jay-Bee Manufacturing Co., Inc.
P.O. Box 986
75-150
Cummins Model 48 Shredder.
Discontinued. 3/16" fil-
ter screen required. High
C
Tyler, TX 75701
Buffalo Metal Fabricating Corp.
85-120
noise level and some dust.
z
50 Wecker Street
Buffalo, NY 14215
r
Security Engineered Machinery Co.
5 Walkup Drive
Westboro, MA 01581
Jay-Bee Manufacturing Co., Inc.
100
200
3/32" filter screen required.
Sound enclosure available.
3/16" filter screen required.
P.O. Box 986
High noise level.
Dry Disintegrator 5 Walkup Drive
Model 3 Westboro, MA 01581
SOMAT Model 30 IS SOMAT Corporation
Pulper Box 831
Coatsville, PA 19320
Discontinued. 3/32" fil-
ter screen req. High noise
level.
Discontinued. Not
approved for high wet
strength paper. 5/16"
ring hole strainer
required.
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
m
v
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
C
z
C,
r
a"
rn
0
EQUIPMENT
DESIGNATION
Air Fed Model 1
Incinerator
Jay-Bee Model
Disintegrator
CAPACITY
LBS
MANUFACTURER OR DISTRIBUTOR PER HOUR REMARKS
Buffalo Metal Fabricating Corp. 200-450
50 Wecker Street
Buffalo, NY 14215
Jay-Bee Manufacturing Co., Inc. 300
P.O. Box 986
Tyler, TX 85801
Security Engineered Security Engineered Machine Co. 400
Disintegrator 5 Walkup Drive
Model 1012 Westboro, MA 01581
Jay-Bee Model 3 ISW Jay-Bee Manufacturing Co., Inc. 750
Disintegrator P.O. Box 986
Tyler, TX 85801
Security Engineered Security Engineered Machinery Co. 600
Disintegrator 5 Walkup Drive
Model 22 Westboro, MA 01581
3/16" filter screen
required. High noise
and dust levels.
Destroys printed cir-
cuit boards when equip-
ped with appropriate
filter screen.
3/32" filter screen
required. Sound enclosure
available.
3/32" filter screen
required. High noise
and dust levels. Destroys
printed circuit boards
when equipped with
appropriate filter screen.
3/32" filter screen
required. Sound enclosure
available. Destroys
printed circuit boards
when equipped with
appropriate filter screen.
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
m
v
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
C
z
0
r
Cl)
EQUIPMENT CAPACITY
LBS
DESIGNATION MANUFACTURER OR DISTRIBUTOR PER IIOUR REMARKS
DDS Hammermill Document Disintegration Systems 600 Discontinued. 3/16" filter
Model 12 2075 Belgrave Avenue screen required . High
Huntington Park, CA 90255 noise and dust levels.
Destroys printed circuit
boards when equipped with
appropriate filter screen.
Security Engineered Security Engineered Machinery Co. 800 3/32" filter screen
Disintegrator 5 Walkup Drive required. Sound enclosure
Model 1424 Westboro, MA 01581 available. Destroys
printed circuit boards
when equipped with appro-
priate filter screen.
DDS Hammermill Document Disintegration Systems 1000 Equipped with 3/16" filter
Model DDS-18 L&F Industries screen. High noise and
2075 Belgrave Avenue dust levels. Destroys
Huntington Park, CA 90255 printed circuit boards
when equipped with appro-
priate filer screen.
Jay-Bee Model 4 ISW Jay-Bee Manufacturing Co., Inc. 1500 3/16" filter screen
Disintegrator P.O. Box 986 required. High noise
Tyler, TX 75701 and dust levels. Destroys
printed circuit boards
when equipped with
appropriate filter screen.
DDS Hammermill Document Disintegration Systems 2300 3/16" filter screen
Model DDS-24 2075 Belgrave Avenue required. High noise
Huntington Park, CA 90255 and dust levels. Destroys
printed circuit boards
when equipped with appro-
priate filter screen.
C
z
0
r
U)
U)
M
m
v
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
m
v
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
THIS PAGE INTENTIONALLY LEFT BLANK
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
GLOSSARY (U)
AC/DC Alternating Current/Direct Current
ADP Automatic Data Processing
C Confidential
CCSO Command and Control Systems Organization
CNWDI Critical Nuclear Weapon Design Information
COMSEC Communication Security
CTCO Central Technical Control Operator
CZ Controlled Zone
DAA Designated Approving Authority
dB decibel
DCA Defense Communications Agency
DCI Director of Central Intelligence
DCID Director of Central Intelligence Directive
DES Data Encryption Standard
DIAM Defense Intelligence Agency Manual
DPI Data Processing Installation
EMC Electromagnetic Compatibility
EMI Electromagnetic Interference
EMSEC Emanations Security
FRD Formerly Restricted Data
GSA General Services Administration
HISSO Hub Information System Security Officer
Hz Hertz
ips inches per second
IST Independent Security Test
MIL-STD Military Standard
NAC National Agency Check
NACSEM National COMSEC/EMSEC Information
NACSI National COMSEC Information
NCO Network Control Operator
NCSC National Communications Security Committee
NCWG Network Certification Working Group
NDA Non-Disclosure Agreement
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
UNCLASSIFIED
NFIB National Foreign Intelligence Board
NFIC National Foreign Intelligence Committee
NISSO Node Information System Security Officer
NSA National Security Agency
NSA/CSS National Security Agency/Central Security Service
NSC National Security Council
NSDD-95 National Security Decision Directive 95
NSO Network Security Officer
OADR Originating Agency's Determination Required
OMB Office of Management and Budget
OPR Office of Primary Responsibility
OT&E Operational Test and Evaluation
PDS Protected Distribution System
PM Program Manager
PMO Program Management Office
PPL Preferred Products List
PR Periodic Reinvestigation
RD Restricted Data
RF Radio Frequency
S Secret
SCI Sensitive Compartmented Information
SCO System Control Operator
SCIF Sensitive Compartmented Information Facility
SCOCE Subcommittee on Compromising Emanations
SOP Standing Operating Procedures
ST&E Security Test and Evaluation
STC Sound Transmission Class
TCO Technical Control Operator
TQSC TEMPEST Qualification Special Committee
TS Top Secret
TSA Temporary Secure Area
U Unclassified
UCT User Control Terminal
UPS Uninterruptible Power Supply
WAWS Washington Area Wideband System
UNCLASSIFIED
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5
SECRET
SECRET
Declassified and Approved For Release 2011/11/10: CIA-RDP96BO1172R000400050018-5