Table of Contents |
ASAS can deploy anywhere the commander needs it, from garrison or an intelligence support base to tactical command posts on the battlefield. Commanders and MI personnel must take proactive measures to protect the system, recognize and counter threats to the system's survivability, and provide security to protect its operations.
SURVIVABILITY |
The ASAS like most systems is vulnerable to a variety of threats. The type and degree of threat to ASAS is influenced by the type of unit in which the system operates and its proximity to hostile forces. Another factor is the capability of the threat to identify, locate, and target the ASAS or, more accurately, the unit that the ASAS supports. The most common battlefield threat to ASAS will be from lethal and nonlethal fires. Figure 6-1 shows some of the survivability measures that could be taken by a division ACE.
Positioning the ASAS to take advantage of concealment and cover reduces the vulnerability to direct and indirect fire. Conducting split-based operations where the bulk of ASAS equipment remains outside the AO can also dramatically reduce the risks poised by threat weapon systems. ACE personnel must be proficient in the use of camouflage to supplement natural concealment and cover in order to reduce the possibility of detection and attack by the enemy.
Using correct COMSEC procedures helps reduce ASAS vulnerability to nonlethal fires from EW systems. Reliance on MSE rather than the CCS's UHF or VHF radios reduces susceptibility to intercept, direction finding, and electronic attack. When use of UHF and VHF communications is necessary, the enforcement of COMSEC procedures can reduce the risks of enemy EW to these radio and ASAS.
SECURITY |
Most of the information the ASAS processes is classified defense information. ACE personnel must protect this information in accordance with Director of Central Intelligence Directives (DCIDs), DOD Manuals (DODMs), DIA Manuals (DIAMs), NSA United States Signals Intelligence Directives (USSIDs), and Army Regulations (ARs). These directives provide guidance and requirements on how to collect, process, produce, disseminate, store, and discuss classified information both in garrison and at field locations (see Figure 6-l).
Access to ASAS equipment processing SCI data located within a SCIF is limited to personnel with proper clearances and the need to know. DCID 1/14 and AR 380-67 provide guidance on personnel security. All personnel with access to SCI data, equipment, and work areas must be properly indoctrinated, cleared to the level of intelligence being processed or stored, possess a need to know, and be listed on a current security access roster. Personnel operating ASAS workstations must have individually assigned system user names and passwords.
Security standards for garrison operations are based on the guidance for use of SCIFS (as defined in DCID 1/21 and AR 380-28) in a semi-permanent configuration such as a motor pool or similar area. These standards are similar to those for field training and combat operations in that they can only prescribe the minimum requirements, since each situation differs. Situation and time permitting, personnel must improve on the minimum standards using the security considerations and requirements for permanent secure facilities as an ultimate goal. ACE personnel will use permanent facilities if available. The following SCIF requirements should be met while operating ASAS in garrison, field training, combat operations, or OOTW:
In field training, G2 (S2) or ACE personnel must request accreditation for a tactical field SCIF according to DCID 1/21. Temporary SCIFs are evaluated and accredited on a case-by-case basis due to the many variables in use, configuration, guard response, location, construction, and type of storage.
ASAS operators must have individual user names with assigned passwords protected by appropriate security measures. In garrison, ASAS operators must store all removable storage media and hardcopy products in approved containers. They must place the storage media in a locked container that the special security office (SSO) has authorized, and must remove and store the following components in accordance with regulations and unit SOPs:
ASAS COMSEC has the same requirements as other communications facilities processing SCI. COMSEC procedures must follow AR 380-5, AR 380-28, and AR 380-40. Personnel are not to operate nonsecure communications systems within the restricted classified discussion area. The ASAS-RWSs operate at the SECRET security level. Each workstation has its own signal address and interfaces with ASAS SCI workstations using the Version 2 Data Adapter (V2DA). Other local workstations interface with the ASAS-RWSs via a collateral LAN. The following security requirements include--
The following ASAS sanitization and destruction procedures should be incorporated into the ACE operations and unit SOP: