Download Print this page

Motorola STU-III/R Operation, Installation, And Maintenance Manual page 58

Remote controllable secure voice/data terminal

Advertisement

C h a p t e r 9
S e c u r i t y
This chapter provides basic security information for operating and
safeguarding the STU-III/R. This chapter is not intended to replace
the organization's security manual. Instead, it introduces some
important aspects for safeguarding the STU-III/R, its keying
material, and related equipment.
C O M S E C
C U S T O D I A N
All sites using STU-III/R terminals must have aCOMSEC
Custodian. The COMSEC Custodian handles all activities relating
t o c l a s s i fi e d C O M S E C h a r d w a r e a n d d o c u m e n t a t i o n . R e f e r t o N S A
security manuals for specific duties and requirements of the
C O M S E C C u s t o d i a n .
S E C U R I T Y
A W A R E N E S S
person with authorized access to the STU-III/R should know:
A n y
The STU-III/R is aControlled Cryptographic Item (CCI), and
national communications security (COMSEC) policy requires
the user to protect it.
With the CIK inserted, the STU-IIRR and CIK become
classified to the highest level of any keying material in the
terminal (STU-III or STU-II keying material). Do not leave
i t u n s e c u r e d a n d u n a t t e n d e d !
The cognizant security person prescribes the specific security
procedures for controlling and using the STU-III/R and CIK.
L O S T
O R
S T O L E N
C I K
If the STU-III/R CIK is lost or stolen, the user must immediately
secure or zeroize the STU-III/R. In addition, the user must report
this to the cognizant security person.
9 - 1

Advertisement

loading