TOP-SECRET FROM THE NSA-U.S. ESPIONAGE AND INTELLIGENCE

U.S. ESPIONAGE AND INTELLIGENCE
Aerial reconnaissance photograph of Severodvinsk Shipyard, the largest construction facility in the Soviet Union, taken by a KH4-B spy satellite on February 10, 1969.
Organization, Operations, and Management, 1947-1996

In the aftermath of World War II, with the Cold War looming on the horizon, the United States began the process of developing an elaborate peacetime intelligence structure that would extend across a number of government departments. The operations of the U.S. intelligence community during the Cold War would range from running single agents, to marshaling the talents of thousands to build and deploy elaborate spy satellites.

The end of the Cold War brought major changes, but not the end of the U.S. government’s requirement for an elaborate intelligence structure. A number of intelligence organizations have been consolidated or altogether eliminated. New organizations have been established to provide more coherent management of activities ranging from military espionage, to imagery collection, to the procurement of airborne intelligence systems. The end of the Cold War has brought about the declassification of much information about intelligence organization and espionage activities that took place prior to the collapse of the Soviet Union.

Focus of the Collection

CIA Headquarters, Langley, VirginiaU.S. Espionage and Intelligence: Organization, Operations, and Management, 1947-1996 publishes together for the first time recent unclassified and newly declassified documents pertaining to the organizational structure, operations, and management of the U.S. intelligence community over the last fifty years, cross-indexed for maximum accessibility. This set reproduces on microfiche 1,174 organizational histories, memoranda, manuals, regulations, directives, reports, and studies, representing over 36,102 pages of documents from the Office of the Director of Central Intelligence, the Central Intelligence Agency, National Reconnaissance Office, National Security Agency, Defense Intelligence Agency, military service intelligence organizations, National Security Council and other organizations. U.S. Espionage and Intelligence presents a unique look into the internal workings of America’s intelligence community. The documents gathered here shed further light on U.S. intelligence organization and activities during the Cold War, and describe the consolidation and reevaluation of the intelligence community in the post-Cold War era. They are drawn from diverse sources, including the National Archives, manuscript collections in the Library of Congress, court files of major espionage prosecutions, presidential libraries, and most importantly, Freedom of Information Act requests. The result of this effort is an authoritative documents publication which, together with the National Security Archive’s previous collection on the structure and operations of the U.S. intelligence community,

U.S. Espionage and Intelligence provides a wealth of information and documentation on key aspects of intelligence organization and operations during and after the Cold War, including such extraordinary topics as:

  • the evolution of the CIA
  • the development and operation of key reconnaissance systems (SR-71, CORONA)
  • the consolidation of Defense Department intelligence
  • intelligence performance during the Persian Gulf War
  • damage assessments of Aldrich Ames’ espionage activities

Significance of the Collection

The U.S. intelligence community has played a key role in advising presidents from Harry Truman to Bill Clinton on the intentions and activities of the Soviet Union, as well as of other nations. It also came to absorb a significant portion of the federal budget, reaching an approximate high of $30 billion in the late 1980s.

U.S. Espionage and Intelligence allows scholars direct access to the newly declassified, detailed primary documents that contain the history of the military, diplomatic, and intelligence components of the Cold War, and which go far beyond what is available in secondary sources. This new information is essential for reaching an accurate understanding of what was happening behind the scenes and how it related to the more public aspects of Cold War policy and operations.

The material contained in this set concerning the post-Cold War era is crucial in assessing the intelligence community’s performance in critical areas such as the Persian Gulf War and the Aldrich Ames case. The material is also vital in understanding the evolution of the intelligence community since the end of the Cold War and its possible future–for that evolution may significantly influence the ability of the intelligence community to deal with critical threats such as proliferation of weapons of mass destruction and terrorism.

One-Stop Access to Critical Documents

It would take a monumental effort, as well as many thousands of dollars, to duplicate the information contained in this collection. U.S. Espionage and Intelligenceallows a researcher– whether interested in the CIA, military intelligence, intelligence performance in the Persian Gulf War, or post-Cold War intelligence reform–to use one source at one location to access the thousands of pages of declassified material on the U.S. intelligence community available in this set.

Through U.S. Espionage and Intelligence the researcher gains access to a wide variety of documents: internal histories of the CIA and a variety of military intelligence organizations; program histories of the SR-71 and CORONA; director of central intelligence and Department of Defense directives establishing organizations such as the National Reconnaissance Office and the National Imagery and Mapping Agency; plans for the consolidation and reform of Defense intelligence organizations after the Cold War and memoranda implementing the reforms; and assessments of intelligence community performance in a number of areas.

In-depth Indexing Makes Every Document Accessible

The National Security Archive prepares extensive printed finding aids for its collections. In- depth indexing offers users remarkable ease and precision of access to every document in the set. The printed Index provides document-level access to subjects, individuals, and organizations, and represents a major research contribution in itself. Important transactions within each document are indexed individually using a controlled subjects vocabulary.

The Guide includes an essay, events chronology, glossaries of key individuals, organizations, and terms, document catalog, and a bibliography of secondary sources.

Research Vistas

With its depth of documentary detail, the collection enables researchers to explore

  • U.S. intelligence performance
  • Cold War history
  • evolution of the U.S. intelligence community and its components
  • U.S. intelligence collection activities

The Collection is a Necessity For:

  • Scholars and students of
    • intelligence
    • national security organization and operations
    • Cold War history
  • Journalists
  • Librarians and bibliographers
  • Concerned citizens

Sample Document Titles

01/15/62 Legal Basis for Cold-War Activities, Lawrence Houston, [Classification Excised] Memorandum

03/27/64 Directive 5105.23, National Reconnaissance Office, Department of Defense, Top Secret Directive 05/23/67 Report on Plots to Assassinate Fidel Castro, Central Intelligence Agency, Secret Memorandum

07/00/73 Allen Welsh Dulles as Director of Central Intelligence, 26 February 1953-29 November 1961, Central Intelligence Agency, Top Secret Biographic Sketch

00/00/82 History of the Navy HUMINT Program, United States Navy, Top Secret History

03/15/91 Plan for Restructuring Defense Intelligence, Assistant Secretary of Defense for Command, Control, and Communication Intelligence, Secret Report

01/06/92 Task Force Report on Greater CIA Openness, Director of Central Intelligence, [Classification Excised] Memorandum

06/01/92 DCID 2/9, Management of National Imagery Intelligence, Director of Central Intelligence, Secret Intelligence Directive

09/00/92 Appendixes A, B, and C to the Final Report: National Reconnaissance Program Task Force for the Director of Central Intelligence, National Reconnaissance Program Task Force, Secret Report

12/18/92 Directive 5200.37, Centralized Management of Department of Defense Human Intelligence (HUMINT) Operations, Department of Defense, [Classification Unknown] Directive

08/00/93 Intelligence Successes and Failures in Operations Desert Shield/Storm, House Committee on Armed Services, [Classification Unknown] Report

01/21/94 A Description of Procedures and Findings Related to the Report of the U.S. Environmental Task Force, King Publishing, Paper

12/07/95 Statement of the Director of Central Intelligence on the Clandestine Services and the Damage Caused by Aldrich Ames, Director of Central Intelligence, Statement

03/01/96 Preparing for the 21st Century: An Appraisal of U.S. Intelligence, Commission on the Roles and Capabilities of the United States Intelligence Community, Report

12/19/96 United States of America v. Harold J. Nicholson, Superseding Indictment, U.S. District Court, Eastern District of Virginia, Indictment

Overview

Title
U.S. Espionage and Intelligence: Organization, Operations, and Management, 1947-1996

Content
Reproduces on microfiche 1,174 U.S. government records totaling 36,102 pages of documentation concerning the organizational structure, operations, and management of the intelligence community from World War II to the present.
Materials were identified, obtained, assembled, and indexed by the National Security Archive.

Series
The Special Collections

Arrangement
Microfiche are arranged chronologically. For ease of use, each document bears a unique accession number to which all indexing is keyed.

Standards
The documents are reproduced on 35mm silver halide archivally permanent positive microfiche conforming to NMA and BSI standards. Any microfiche found to be physically substandard in any way will be replaced free of charge.

Indexing
A printed Guide and Index accompanies the microfiche collection. The Guide contains an events chronology, glossaries, chronological document catalog and a bibliography of secondary sources. The Index provides in-depth, document level access to subjects and individuals.

U.S. Espionage and Intelligence Project Staff

Project Director

Dr. Jeffrey T. Richelson, project director, is a senior fellow at the National Security Archive and coordinates the Archive’s projects on U.S. policy toward China and ongoing documentation on U.S. intelligence issues. He previously edited the Archive’s collections on presidential national security documents, the history of the U.S. intelligence community, and the military uses of space. A former associate professor at American University, he received his Ph.D. in political science from the University of Rochester. Among his many books are Sword and Shield: Soviet Intelligence and Security Apparatus (1986), American Espionage and the Soviet Target (1988), America’s Secret Eyes in Space (1990), and A Century of Spies: Intelligence in the Twentieth Century (1995). His articles have appeared in a wide variety of professional journals and in publications ranging from Scientific American to the Washington Post. He is a regular commentator on intelligence and military issues for national television and radio.

Project Staff

Michael Evans, Research Assistant
Jane Gefter, Research Assistant
Michael Watters, Research Assistant

U.S. Espionage and Intelligence Advisory Board

Christopher Andrew, Corpus Christi College, University of Cambridge author, For the President’s Eyes Only

Loch Johnson, Department of Political Science, University of Georgia author, Secret Agencies: U.S. Intelligence in a Hostile World

David Wise, author, Nightmover: How Aldrich Ames Sold the CIA to the KGB for $4.6 Million

Praise for U.S. Espionage and Intelligence, 1947-1996

“Serious students of the structure and operations of American intelligence rely on the work of the National Security Archive. The new collection of intelligence documents, compiled for the Archive by Jeffrey T. Richelson, helps to pierce the labyrinth.”

David Wise
Author of Nightmover: How Aldrich Ames Sold the CIA to the KGB for $4.6 Million

“An invaluable supplement to the National Security Archive’s previous collection, The U.S. Intelligence Community 1947-1989, this brings the most recently declassified documents to the reader. Jeffrey Richelson’s useful introduction also serves to detail changes that have occurred in the structure of the U.S. espionage establishment.”

John Prados
Author of Presidents’ Secret Wars

TOP-SECRET-FAA Comunications Security 1991

https://i0.wp.com/cryptome.org/0005/faa-comsec.jpg

                                    ORDER
         Date:  3/5/91                                                         

      Initiated
           by:  ACO-300                                                        

      Subject: COMMUNICATIONS SECURITY (COMSEC) 
 
 FOREWORD                                     

      This order establishes policies and procedures and assigns
      responsibilities for ensuring agency compliance with requirements
      of the national communications security (COMSEC) policy.                 

      The guidance in this order is based upon COMSEC policy directives
      promulgated by the National Security Agency and implementing
      regulations and directives issued by the United States Air Force.
      Should a conflict exist between the requirements of this order
      and the appropriate national COMSEC policy or implementing
      directive, the national policy or directive will in all cases
      apply.  Instances of this type will be reported expeditiously to
      this headquarters.                                                       

      This order is marked FOR OFFICIAL USE ONLY.  It is to be
      safeguarded, handled and processed in accordance with
      requirements of Order 1600.15D.  This order is not releasable to
      contractors or to foreign nationals without the specific approval
      of the Assistant Administrator for Civil Aviation Security,
      Washington, D.C.  However, dissemination of pertinent information
      extracted from this order to contractors having a need-to-know is
      permissible when such release is authorized by applicable
      National COMSEC Instructions (NACI).                                     

      Changes in national COMSEC policy reflected in this order such as
      the institution of the Formal Cryptographic Access Program have
      been coordinated with and accurately state the position of the
      Office of the Secretary of Transportation.                               

      All FAA personnel whose duties require them to handle, process,
      store, safeguard, or otherwise have access to classified
      cryptographic material are required to become familiar with and
      conform to the requirements of this order.                               

      /s/ James B. Busey
          Administrator                                                        

                            FOR OFFICIAL USE ONLY
                     NOT RELEASABLE TO FOREIGN NATIONALS
         NOT RELEASABLE TO CONTRACTORS WITHOUT ORIGINATOR'S APPROVAL

                              TABLE OF CONTENTS                                

                                                                  Page         

      CHAPTER 1. GENERAL                                       1           

           1.  Purpose                                             1
           2.  Distribution                                        1
           3.  Cancellation                                        1
           4.  Explanation of Changes                              1
           5.  Definitions                                         2
           6.  Forms and Reports                                   2
           7.  Requests for Information                            2
           8.  Statement of Intent                                 2
           9.  Scope                                               2
          10.  Responsibilities                                    2
          11.  Interpretation                                      2
          12.  Authority to change this Order                      7
          13.-19.  Reserved                                        7           

      CHAPTER 2. POLICY FOR GRANTING ACCESS TO U.S.
 CLASSIFIED CRYPTOGRAPHIC INFORMATION            13           

          SECTION 1.  POLICY                                      13           

          20.  General                                            13
          21.  Policy                                             13           

          SECTION 2.  DEFINITION                                  13           

          22.  Cryptographic Information                          13           

          SECTION 3.  CRITERIA                                    14           

          23.  Access Requirements                                14
          24.  Polygraph                                          14
          25.  Contacts with Foreign Nationals and Unofficial
               Foreign Travel to Communist or other Designated
               Countries                                          15           

          SECTION 4.  GRANTING FORMAL CRYPTOGRAPHIC ACCESS        15           

          26.  Scope                                              15
          27.  Preparing AFCOMSEC Form 9                          17
          28.  Withdrawing FCA                                    18
          29.  Certificates of Personnel Declining Cryptographic
               Access                                             19
          30.-34.  Reserved                                       19           

      CHAPTER 3. COMMUNICATIONS SECURITY (COMSEC) DUTIES AND
		       RESPONSIBILITIES                                27           

          35.  General                                            27
          36.  COMSEC Custodians and Alternates                   27
          37.  Training                                           28
          38.  Waivers                                            30
          39.  Duties of the COMSEC Custodian                     30
          40.  Performance Standards                              31
          41.  Appointment of Custodians and Alternates           32
          42.  Monitoring Responsibilities                        32
          43.-49.  Reserved.                                      33           

      CHAPTER 4. SAFEGUARDING COMSEC FACILITIES                  39           

          SECTION 1.  GENERAL                                     39           

          50.  Purpose                                            39
          51.  Referenced Publications                            39
          52.  Background                                         39           

          SECTION 2.  PHYSICAL SECURITY STANDARDS                 40           

          53.  Physical Security Standards for Fixed COMSEC
               Facilities                                         40
          54.  Installation Criteria                              40
          55.  Facility Approvals, Inspection, and Tests          41
          56.  Intrusion Detecting Systems                        43
          57.-60.  Reserved                                       43           

          SECTION 3.  ACCESS RESTRICTIONS AND CONTROLS            43           

          61.  Unescorted Access                                  43
          62.  Escorted Access                                    45
          63.  Visitor Register                                   45
          64.  No-Lone Zones                                      46
          65.  Guard Services                                     46
          66.-70.  Reserved                                       47           

          SECTION 4.  PROTECTION OF UNATTENDED COMSEC EQUIPMENT   47           

          71.  General                                            47
          72.  Protection Requirements                            47
          73.-77.  Reserved                                       48           

          SECTION 5.  PROTECTION OF LOCK COMBINATIONS             48           

          78.  Purpose                                            48
          79.  Protection Requirements                            48
          80.  Access to Combinations                             49
          81.  Record of Combinations                             49
          82.-86.  Reserved.                                      50           

          SECTION 6.  NONESSENTIAL AUDIO/VISUAL EQUIPMENT         51           

          87.  Personally Owned Equipment                         51
          88.  Government Owned Equipment                         51
          89.-94.  Reserved                                       51           

          SECTION 7.  STANDARD OPERATING PROCEDURES (SOP)         51           

          95.  Requirement                                        51
          96.  Emergency Plan                                     52
          97.-101.  Reserved                                      53           

      CHAPTER 5. SAFEGUARDING AND CONTROL OF COMMUNICATIONS
                  SECURITY MATERIALS                              65           

         102.  General                                            65
         103.  Definitions                                        66
         104.  Handling Keying Material                           66
         105.109.  Reserved                                       66           

          SECTION 1.  GENERAL INFORMATION APPLICABLE TO ALL
                      COMSEC MATERIAL                             66           

         110.  Responsibilities for Safeguarding COMSEC Material  66
         111.  Transport of COMSEC Material                       67
         112.  Courier Responsibilities                           68
         113.  Open Display of COMSEC Material and Information    68
         114.  Destruction                                        68
         115.  Reporting Insecurities                             68
         116.  Evidence of Tampering                              69
         117.  Alteration of COMSEC Material                      69
         118.  Clearance Requirements for Guards                  69
         119.  Storage Requirements                               69
         120.  Other COMSEC Information                           70
         121.  Disposition of COMSEC Materials                    71
         122.  Page Checks of COMSEC Publications                 72
         123.  Daily or Shift Inventory Requirements              73
         124.  COMSEC Account Record File                         73
         125.-129.  Reserved                                      74           

      CHAPTER 6. CONTROLLED CRYPTOGRAPHIC ITEMS (CCI)            79           

         130.  Purpose and Background                             79
         131.  Definitions                                        79
         132.  Control Requirements                               80
         133.  Inventories                                        84
         134.  Reporting Insecurities                             84
         135.  Routine and Emergency Destruction                  84
         136.-144.  Reserved                                      84           

      CHAPTER 7. SECURE VOICE                                    89           

          SECTION 1.  GENERAL                                     89           

         145.  Purpose                                            89
         146.  Types and Models of STU-III                        89
         147.  Definitions                                        89
         148.-150.  Reserved                                      91           

          SECTION 2.  EXCEPTIONS                                  91           

         151.  Requests for Exception                             91
         152.-153.  Reserved                                      91           

          SECTION 3.  COMSEC CUSTODIAN DUTIES AND
                      RESPONSIBILITIES                            91           

         154.  General                                            91
         155.  Receipt of Key                                     91
         156.  Accounting for Key                                 92
         157.  Notices from the KMS/CAO                           93
         158.-160.  Reserved                                      94           

          SECTION 4.  KEYING OF TERMINALS                         94           

         161.  Initial Keying of Terminals                        94
         162.-163.  Reserved                                      94           

          SECTION 5.  ACCOUNTABILITY                              94           

         164.  Cryto-Ignition Key Handling and Local Accounting   94
         165.-166.  Reserved                                      95           

          SECTION 6.  REKEYING                                    96           

         167.  Electronic Rekeying                                96
         168.-170.  Reserved                                      96           

          SECTION 7.  PHYSICAL SECURITY                           96           

         171.  Unkeyed Terminal Type 1                            96
         172.  Keyed Terminal                                     96
         173.  Terminal Display                                   97
         174.  Use by Other U.S. Personnel                        97
         175.  Use by Foreign Nationals                           98
         176.  Storage                                            98
         177.  Use of the Secure Data Mode                        98
         178.  After Hours Protection                             98           

          SECTION 8.  TRANSPORTATION                              98           

         179.  Type 1 Terminals                                   98
         180.-182.  Reserved                                      99           

          SECTION 9.  INSTALLATION                                99           

         183.  General                                            99
         184.  Residences                                         100
         185.-186.  Reserved                                      100          

          SECTION 10.  MAINTENANCE                                100          

         187.  General                                            100
         188.  Access                                             100
         189.-190.  Reserved                                      100          

         SECTION 11.  PROTECTION OF KEY STORAGE DEVICES           101          

         191.  General                                            101
         192.  Fill Devices                                       101
         193.  Crypto-Ignition Keys (CIKs)                        102
         194.  Protection and Use of the Micro-KMODC              104
         195.-198.  Reserved                                      104          

          SECTION 12.  DESTRUCTION AND EMERGENCY DESTRUCTION      104          

         199.  General Requirement                                104
         200.  Reserved                                           104          

          SECTION 13.  REPORTABLE INSECURITIES                    105          

         201.  Insecure Practice/COMSEC Incident Handling         105
         202.-204.  Reserved                                      106          

          SECTION 14.  RECORDS RETENTION                          106          

         205.  General                                            106
         206.-208.  Reserved                                      106          

      APPENDIX 1. REQUIRED FORMS AND REPORTS (2 pages)           1          

      APPENDIX 2. SAMPLE CRYPTOGRAPHIC ACCESS BRIEFING (9 pages) 1          

      APPENDIX 3. CRYPTOGRAPHIC ACCESS CERTIFICATE (1 page)      1          

      APPENDIX 4. SECURE TELECOMMUNICATIONS FACILITY 1 
 AND COMSEC ACCOUNT CHECKLIST (6 pages)                    

      APPENDIX 5. PUBLICATIONS TO BE MAINTAINED BY ALL 1 
 FAA COMSEC ACCOUNTS (2 pages)                             

      APPENDIX 6. PHYSICAL SECURITY STANDARDS FOR FIXED 1 
 COMSEC FACILITIES (3 pages)                               

      APPENDIX 7. STANDARDS FOR SAFEGUARDING KEYING MATERIAL     1
                     (4 pages)          

      APPENDIX 8. ROUTINE DESTRUCTION AND EMERGENCY PROTECTION 1 
 OF COMSEC MATERIAL (7 pages)                              

                           FOR OFFICIAL USE ONLY
                         PUBLIC AVAILABILITY TO BE
                        DETERMINED UNDER 5 U.S.C. 552

                             CHAPTER 1. GENERAL                               

      1.  PURPOSE.  This order prescribes FAA standards and procedures
      for communications security (COMSEC) and implements changes in
      national COMSEC policy for FAA COMSEC operations.                        

      2.  DISTRIBUTION.  This order is distributed to Regional
      Administrators and Center Directors:  to the director level in
      the Office of System Engineering and Program Management, Office
      of Air Traffic System Management, Air Traffic Plans and
      Requirements Service, Advanced System Design Service, Office of
      Human Resource Development, Office of Training and Higher
      Education, and Logistics Service; to the division level in the
      Systems Maintenance Service, and Office of Civil Aviation
      Security, Operations to Emergency Operations Staff (ADA-20),
      Regional and Aeronautical Center Civil Aviation Security
      Divisions, Technical Center Civil Aviation Security Staff,
      Europe, Africa and Middle East Civil Aviation Security Staff; to
      COMSEC custodians including Air Route Traffic Control
      Centers; to the FAA manager/supervisor at each Joint Use System
      Long Range Radar Site; to Associate Program Managers for
      Engineering, Communications and Aircraft Acquisition Program.            

      3.  CANCELLATION.  Order 1600.8B, Communications Security
      (COMSEC), dated November 14, 1975, is canceled                           

      4.  EXPLANATION OF CHANGES.  This order updates FAA COMSEC
      policies and procedures to reflect national COMSEC policy
      guidance from the National Security Agency (NSA), and the U.S.
      Air Force (USAF).  It also establishes new training standards for
      individuals assigned as COMSEC custodians.  This revision:
           a.  Promulgates changes in national policy contained in NSA
      National COMSEC Instructions (NACSI) and National
      Telecommunications and Information Systems Security Instructions
      (NTISSI).                                                                

           b.  Establishes a Formal Cryptographic Access (FCA) Program
      in FAA to include mandatory requirements for cryptographic access
      briefings and Cryptographic Access Certificates.                         

           c.  Disseminates USAF guidance for implementing national
      COMSEC policy as set forth in USAF Regulations (AFR), USAF
      Special Purpose/Operational Miscellaneous (AFSAL) publications
      and related documents.                                                   

           d.  Prescribes policies and procedures governing the
      utilization and safeguarding of Controlled Cryptographic Items
      (CCI).                                                                   

           e.  Prescribes mandatory formal training requirements for
      COMSEC custodians.                                                       

           f.  Prescribes guidance concerning the Secure Terminal Unit
      (STU) III secure voice system.                                           

           g.  Establishes requirements for the inclusion of COMSEC
      duties and responsibilities as a Critical Job Element (CJE) in
      the individual performance standards for the COMSEC custodian and
      alternate(s).                                                            

      5.  DEFINITIONS.  The definitions contained in National
      Communications Security Committee (NCSC) 9 and Air Force
      Regulation (AFR) 56-2 apply to this order.  Definitions not
      contained in these references will be provided in the body of the
      order.                                                                   

      6.  FORMS AND REPORTS.  Appendix 1, Required Forms and Reports,
      contains a listing of the forms and reports required by this
      order.  Additional reporting requirements will be addressed in
      the portion of the order to which they pertain.                          

      7.  REQUESTS FOR INFORMATION.  Questions on the interpretation of
      the provisions of this order or their application shall be
      referred to the servicing security element in regions and centers
      or to the Director, Office of Civil Aviation Security,
      Operations, ACO-1, 800 Independence Avenue, S.W., Washington,
      D.C. 20591.                                                              

      8.  STATEMENT OF INTENT.  It is the intention of the FAA to
      ensure that requirements of the national COMSEC policy are fully
      understood and implemented by all having responsibilities for
      COMSEC operations and support within the agency.                         

      9.  SCOPE.                                                               

           a.  The provisions of this order apply to all FAA employees,
      military, civilian, and contractor, who are holders or users of
      NSA produced or authorized cryptographic information or who
      otherwise have access to such information, regardless of duty
      station, location, or position.                                          

           b.  FAA procurement actions which result in requirements for
      contractors to generate or utilize NSA approved or authorized/
      cryptographic information in the performance of the contract will
      be accomplished in accordance with Order 1600.56, Guidelines for
      FAA Participation in the Department of Defense (DOD) Industrial
      Security Program (ISP).  Access requirements shall be specified
      in accordance with National Telecommunications and Information
      Systems Security Policy (NTISSP) Number 3.                               

      10.  RESPONSIBILITIES.                                                   

           a.  Director, Office of Civil Aviation Security, ACO-1 is
      responsible for:                                                         

                (1)  Implementing the national COMSEC policy and the
      provisions of this order within the FAA.                                 

                (2)  Recommending policies for safeguarding of FAA
      information and data using COMSEC techniques to provide the
      required degree of protection.                                           

                (3)  Ensuring that cryptologic access briefings and
      debriefings are conducted and that cryptographic access
      certificates are signed in accordance with provisions of this
      order.                                                                   

                (4)  Establishing and ensuring the implementation of
      standards and procedures for handling, safeguarding, accounting,
      destruction, storage, access and control of classified and
      unclassified COMSEC and other NSA approved and authorized
      cryptographic materials in accordance with national COMSEC policy
      and this order.                                                          

                (5)  Developing standards and procedures for physical
      and environmental security of FAA cryptographic communications
      installations.                                                           

                (6)  Ensuring in coordination with the Program Director
      for Communications, FAA COMSEC equipment installations are
      designed in accordance with applicable national COMSEC policies
      pertaining to on-line and TEMPEST engineering standards.                 

                (7)  Monitoring headquarters, region, and center COMSEC
      accounts and appointment of COMSEC custodians.                           

                (8)  Ensuring that countermeasures and specialized
      communications security inspections are conducted of COMSEC
      secure communications areas in accordance with NSA and USAF
      directives, and this order.                                              

           b.  National Airspace System Engineering Service, ASE, is
      responsible for:                                                         

                (1)  Development of National Airspace System (NAS)
      plan/and baseline system requirements for COMSEC systems.                

                (2)  Ensuring the baselined COMSEC system requirements
      and interface requirements are consistent with national COMSEC
      engineering and security standards established by the NSA.               

                (3)  Formulating guidance and standards applicable to
      acquisition of facilities and equipment including COMSEC systems.        

                (4)  Coordination with the Office of Civil Aviation
      Security, on NAS plans and NAS system specifications involving
      COMSEC security requirements and resources.                              

           c.  Office of Air Traffic Systems Management, ATM, is
      responsible for:                                                         

                (1)  Establishing COMSEC requirements for support of
      air traffic control operational telecommunications.                      

                (2)  Developing and recommending national guidance,
      standards, and procedures for implementation of COMSEC in the
      security control of military and other air traffic pursuant to
      the FAA's support of the national defense.                               

                (3)  Coordination with the Office of Civil Aviation
      Security in establishing procedures and standards for the
      identification of sensitive and classified information and data
      in the air traffic control system requiring COMSEC protection.           

                (4)  Ensuring that sensitive and classified
      telecommunications in the air traffic control system are
      safeguarded in accordance with national COMSEC policy.                   

           d.  Air Traffic Plans and Requirements Service, ATR, is
      responsible for:                                                         

                (1)  Coordination with the Office of Civil Aviation
      Security in developing and implementing procedures and standards
      for the identification of COMSEC support required to ensure a
      secure and effective air traffic system telecommunications
      capability.                                                              

                (2)  Serving as the air traffic system focal point for
      coordination of COMSEC programs and requirements in support of
      the NAS.
           e.  Systems Maintenance Service, ASM, is responsible for:           

                (1)  Coordination with the Office of Civil Aviation
      Security to:                                                             

                     (a)  Identify requirements for communications
      security during network planning and engineering of future
      telecommunications networks or expansions or modifications to
      present networks.                                                        

                     (b)  Ensure operational compliance with
      communications security requirements in telecommunications
      maintenance support.                                                     

                (2)  Participate in the development of maintenance
      planning for COMSEC equipment and systems in the FAA, including
      identification of required COMSEC maintenance training for FAA
      personnel.                                                               

           f.  Office of Human Resource Development, AHD, is
      responsible for:                                                         

                (1)  Providing administrative and technical guidance
      and support for inclusion of the COMSEC custodian position in the
      Performance Evaluation Rating (PER) system.                              

                (2)  Establishing standards and criteria for
      designating the responsibilities of the custodian and alternate
      as CJE'S.                                                                

           g.  Office of Training and Higher Education, AHT, is
      responsible for:                                                         

                (1)  Providing administrative and technical guidance
      and support for mandatory training for custodians at the USAF
      COMSEC Account Management course.                                        

                (2)  Establishing and incorporating in appropriate
      directives criteria for evaluation of COMSEC responsibilities and
      training in career development programs for selected employees.          

           h.  Office of Labor and Employee Relations, ALR, is
      responsible for facilitating the implementation of the
      requirements of this order as required.                                  

           i.  Regions and Centers are responsible for implementation
      of this order within their areas of jurisdiction.                        

           j.  Office of Air Traffic System Management, Air Traffic
      Plans and Requirements Service, Systems Maintenance Service,
      National Airspace System Engineering Service are responsible for:        

                (1)  Implementing this order in those organizations
      that report to them who have a requirement for access to COMSEC
      information.                                                             

                (2)  Ensuring that COMSEC custodians receive formal
      COMSEC account management training and that operators and
      maintenance personnel are properly trained in procedures for
      safeguarding and handling of COMSEC material required in the
      performance of their duties.                                             

                (3)  Ensuring that all authorized COMSEC materials are
      properly obtained, procured, installed, operated, safeguarded,
      destroyed, or transferred when no longer required.                       

                (4)  Ensuring that viable emergency plans exist to
      minimize the risk of compromise of COMSEC materials during crisis
      situations.                                                              

           k.  Region and Center Civil Aviation Security Divisions and
      Staffs are responsible for:                                              

                (1)  Ensuring that COMSEC information and material in
      offices and activities under their control or jurisdiction are
      safeguarded and controlled in accordance with this order.                

                (2)  Providing staff guidance, assistance, and
      interpretation with regard to this order.                                

                (3)  Conducting COMSEC account inspections.                    

                (4)  Ensuring that insecurities involving COMSEC
      materials are reported to cognizant authorities in a timely and
      comprehensive manner as required by U.S. Air Force General
      Publication (AFKAG) 2 and NTISSI-4003.                                   

                (5)  Developing and administering a Cryptologic Access
      Program in accordance with provisions of chapter 2, of this
      directive, to include the following:                                     

                     (a)  Ensuring that all personnel within their
      jurisdiction requiring access to U.S. classified cryptographic
      information sign a Cryptologic Access Certificate (AFCOMSEC Form
      9) prior to being granted access in accordance with provisions of
      Chapter 2 of this order and                                              

                     (b)  Ensuring that the signed cryptographic access
      certificate is made a permanent part of the individual employee's
      official security records and is accounted for in accordance with
      provisions of Order 1600.1C concerning retention of security
      clearance/access certificates.                                           

           l.  COMSEC Custodian is the properly appointed individual
      who manages and controls the accountable COMSEC material in the
      COMSEC Material Control System charged to his/her activity with
      responsibilities which include:                                          

                (1)  The receipt, storage, amendment, accountability,
      inventory, and issuance of COMSEC material charged to his/her
      account and destruction or transfer of material when it is no
      longer required.                                                         

                (2)  Ensuring that appropriate COMSEC material is
      readily available to properly authorized individuals whose duties
      require its use.                                                         

                (3)  Ensuring that all persons requiring access to U.S.
      classified cryptographic information receive a cryptographic
      access briefing in accordance with this directive and sign a
      cryptographic access certificate before they are permitted
      access.                                                                  

                (4)  Advising users and supervisors, as appropriate, of
      the required protection and procedures which must be provided
      COMSEC material issued to them for use, including the authorized
      procedures for destruction or disposition of such material when
      it is no longer required.                                                

                (5)  Reporting COMSEC insecurities in accordance with
      instructions in AFKAG-2 and NTISSI-4003.  COMSEC insecurities
      fall into three categories, cryptographic, personnel and
      physical.  Specific examples of each type are given in NTISSI
      4003.                                                                    

           m.  Individual users are responsible for:                           

                (1)  Knowledge of the requirements of this order.              

                (2)  Safeguarding and proper employment of all COMSEC
      material he or she uses or for which he or she is responsible in
      accordance with the provisions of this order.                            

                (3)  Promptly reporting to the custodian any
      occurrences, circumstances, or acts which could jeopardize the
      security of COMSEC material.  Should the custodian be unavailable
      the report is submitted to the servicing security element or
      ACO-300.                                                                 

           p.  Program Manager, Communications and Aircraft
      Acquisition, ANC-1, is responsible for:                                  

                (1)  Management of engineering planning, development,
      acquisition, and implementation of COMSEC equipments and systems
      in support of FAA requirements and the national COMSEC policy.           

                (2)  Recommending, through coordination with the Office
      of Air Traffic System Management and the Office of Civil Aviation
      Security, and other Federal Agencies, appropriate COMSEC
      equipments and systems to meet identified needs.                         

                (3)  Identification of required maintenance training
      for FAA personnel in coordination with the Systems Maintenance
      Service and the Office of Training and Higher Education.                 

                (4)  Coordination with the Office of Civil Aviation
      Security, Operations, to ensure that plans and specifications for
      COMSEC installations are reviewed and meet all FAA NSA security
      requirements prior to installation.                                      

                (5)  Developing and recommending engineering standards
      and procedures to implement national TEMPEST and COMSEC
      engineering criteria for the secure installation and operation of
      COMSEC equipment in the FAA in concert with ACS.                         

      11.  INTERPRETATION.  Questions regarding the interpretation of
      the provisions of this order or their application shall be
      referred to the Regional or Center Civil Aviation Security
      Division or Staff, or to the Manager, Investigations and Security
      Division, ACO-300, Office of Civil Aviation Security Operations,
      800 Independence Avenue, S.W., Washington, D.C., 20591.                  

      12.  AUTHORITY TO CHANGE THIS ORDER.  The Assistant Administrator
      for Civil Aviation Security is authorized to issue changes to
      this order which do not contain policy, assign responsibilities,
      or delegate authority.                                                   

      13.-19.  RESERVED.                                                       

                            FOR OFFICIAL USE ONLY
                          PUBLIC AVAILABILITY TO BE
                        DETERMINED UNDER 5 U.S.C. 552

               CHAPTER 2. POLICY FOR GRANTING ACCESS TO U.S. 
 CLASSIFIED CRYTOGRAPHIC INFORMATION                       

                             SECTION 1.  POLICY                                

      20.  GENERAL.  In accordance with policies established by the
      National Telecommunications and Information Systems Security
      Committee (NTISSC) in National Telecommunications and Information
      Systems Security Policy (NTISSP) Number 3, issued in December
      1988, and implemented by the Air Force Systems Security
      Instruction (AFSSI) 4000 of October 1, 1989, the FAA requires
      special access controls for certain U.S. classified cryptographic
      information, the loss of which would cause serious or
      exceptionally grave damage to U.S. national security.  This order
      provides policy, guidelines, and procedures as applicable to the
      Formal Cryptographic Access (FCA) Program.  It provides for an
      individual's eligibility, unofficial foreign-travel requirements,
      contacts with foreign nationals, procedures for granting and
      withdrawing FCA, and actions to take when personnel decline FCA.         

      21.  POLICY.  A formal Cryptographic Access Program is
      established in the FAA whereby access to certain U.S. classified
      cryptographic information shall only be granted to individuals
      who satisfy the criteria set forth herein.  All FAA employees and
      FAA contractor employees assigned duties as communications
      security (COMSEC) custodians; alternate COMSEC custodians; COMSEC
      accountants; COMSEC inspectors; cryptoequipment maintenance and
      installation personnel; key distribution center (KDC) personnel;
      telecommunications center personnel; any personnel identified by
      ACO-300; and any other persons who work full time in the above
      areas who have access to the cryptomaterial must have the FCA to
      meet the requirements of this order as well as the requirements
      established for two-person integrity.                                    

                           SECTION 2.  DEFINITION                              

      22.  CRYPTOGRAPHIC INFORMATION.  The terms used in this order are
      defined in AFR 56-2.  For the purposes of this directive U.S.
      classified cryptographic information is defined as:                      

           a.  TOP SECRET and SECRET, CRYPTO designated, key and
      authenticators.                                                          

           b.  All cryptographic media which embody, describe, or
      implement classified cryptographic logic; this includes full
      maintenance manuals, cryptographic descriptions, drawings of
      cryptographic logics, specifications describing a cryptographic
      logic, cryptographic computer software, or any other media which
      may be specifically identified by the NTISSC.                            

                            SECTION 3.  CRITERIA                               

      23.  ACCESS REQUIREMENTS.  An individual may be granted access to
      U.S. classified cryptographic information, only if that
      individual:                                                              

           a.  Is a U.S. citizen.                                              

           b.  Is an FAA employee or is a U.S. Government-cleared
      contractor approved by ACO-300.                                          

           c.  Possesses a security clearance appropriate to the
      classification of the U.S. cryptographic information to be
      accessed.                                                                

           d.  Possesses a valid need-to-know that has been determined
      to be necessary to perform duties for, or on behalf, of FAA.             

           e.  Receives a security briefing from the servicing security
      element in regions and centers, or from ACO-300 in headquarters,
      detailing the sensitive nature of cryptomaterial and the
      individual's responsibility for protecting cryptomaterial.
      Appendix 2 contains the text of the briefing.                            

           f.  Acknowledges the granting of such access by signing the
      Cryptographic Access Certificate AFCOMSEC Form 9 an example of
      which is contained in Appendix 3 of this order.                          

      24.  POLYGRAPH.  The NTISSP Number 3 provides for utilization of
      non lifestyle counterintelligence polygraph examinations under
      certain conditions.  FAA has determined however that the use of
      the polygraph will not be a requirement in the FAA COMSEC
      Program.                                                                 

      25.  CONTACTS WITH FOREIGN NATIONALS AND UNOFFICIAL FOREIGN
      TRAVEL TO COMMUNIST OR OTHER DESIGNATED COUNTRIES.                       

           a.  All FAA employees possessing an FCA must advise their
      servicing security element of all contacts with nationals of the
      listed governments and receive written permission from their
      facility or office manager with an information copy to the
      servicing security element and to ACO-300 for unofficial travel
      to these countries.                                                      

           Afghanistan                   Latvia
           Albania                       Libyan Arab Republic
           Angola                        Lithuania
           Berlin (Soviet Sector)        Mongolian Peoples
           Bulgaria                       Republic (Outer
           Cambodia (Kampuchia)           Mongolia)
           Peoples Republic of           Nicaragua
            China (Including Tibet)      Poland
           Cuba                          Rumania
           Czechoslovakia                South Yemen
           Estonia                       Syria
           Ethiopia                      Union of Soviet
           Hungarian Peoples             Socialist Republics
            Republic (Hungary)            (Russia)
           Iran                          Democratic Republic of
           Iraq                           Vietnam (North
           Democratic Peoples             Vietnam)
            Republic of Korea            South Vietnam
            (North Korea)                Yugoslavia
           Laos                                                                

           b.  The above restrictions are in addition to those
      requirements of Order 1600.61, Defensive Security Briefing
      Requirements for FAA Employees Traveling to Communist-Controlled
      Countries.                                                               

              SECTION 4.  GRANTING FORMAL CRYPTOGRAPHIC ACCESS                 

      26.  SCOPE.  This policy shall apply to all FAA employees
      civilian and military who satisfy the requirements of Section 3,
      above, and whose official duties require continuing access to
      U.S. classified cryptographic information.  Procedures to be
      followed in the granting of a Cryptographic Access Certificate
      are as follows:                                                          

           a.  COMSEC Manager and Custodian.  The COMSEC custodian or
      the manager responsible for COMSEC operations in a facility or
      office shall:                                                            

                (1)   Upon receipt of this order take appropriate
      action to coordinate with the supporting personnel office and the
      servicing security element to provide them with the names and
      positions of all personnel requiring FCA.                                

                (2)  Immediately notify the servicing security element
      of any change in status or need-to-know of individuals having
      FCA.                                                                     

            b.  Personnel Offices.  The personnel office will
      coordinate with the supporting security element to accomplish the
      following:                                                               

                (1)  To ensure that the master record reflects the
      requirement for FCA, and to arrange for the procedures to be
      followed to provide the required briefing, as well as
      need-to-know and clearance verification for each individual.             

                (2)  The personnel office will be responsible for
      entering into the Consolidated Management Information System
      (CPMIS) the correct information pertaining to FCA requirements
      for designated positions.                                                

                (3)  To develop procedures that will ensure that the
      servicing security element is informed whenever individuals with
      FCA change positions, terminate or otherwise no longer have need
      for the FCA in accordance with this directive.                           

                (4)  To coordinate with the servicing security element
      and to take such additional actions as may be required to ensure
      that the national security objectives of the FCA are supported
      and implemented.                                                         

           c.  Servicing Security Element.  The servicing security
      element will designate in writing an individual to serve as the
      FCA point-of-contact for implementation and coordination of the
      FCA Program.  This individual may be the personnel security
      officer and will be responsible for implementing the FCA Program
      within his/her area of responsibility.  To include the following
      actions:                                                                 

                (1)  Ensure that the requirements of this order are
      met.                                                                     

                (2)  Provide guidance to operating offices and
      personnel offices on the FCA Program.                                    

                (3)  Ensure that clearance data and other relevant
      information pertinent to individuals seeking FCA is correct and
      is entered into the CPMIS and Civil Aviation Security Information
      System (CASIS) to the extent that is necessary to permit accurate
      tracking of individuals in the FCA Program.                              

                (4)  Coordinate with Personnel and the operating
      facility or office to schedule briefing indoctrinations required
      for FCA and to obtain required signatures on Cryptographic Access
      Certificates (AFCOMSEC Form 9).                                          

                (5)  Ensure that the properly filled out AFCOMSEC Form
      9 (Cryptographic Access Certificate) is handled, documented, and
      retained as required by Order 1600.1C for clearance
      certifications.                                                          

           d.  Cryptographic Access Certificate.                               

                (1)  The facility or office manager having
      responsibility for the COMSEC operation or his or her designated
      representative in coordination with the supporting personnel
      office and the servicing security element will establish
      procedures for briefing personnel requiring FCA.                         

                (2)  Upon completion of the required briefing each
      individual requiring FCA will be asked to sign the Cryptographic
      Access Certificate.  The manager will normally sign as witness to
      the signature of the persons being granted access.                       

                (3)  The original copy of the signed certificate will
      be forwarded to the servicing security element in regions and
      centers, and to ACO-300 in the Washington Headquarters, where it
      will be permanently retained.                                            

           e.  Local Tracking Procedures for FCA.  Each facility or
      office having personnel assigned duties in paragraph 21 will, in
      coordination with the supporting Personnel Office and the
      servicing security element, develop written procedures, to
      include out-processing, for reporting the granting and
      termination of FCA.                                                      

           f.  FAA employees requiring an FCA at TDY locations and who
      meet all requirements of the FCA Program will be briefed prior to
      their departure and asked to sign the Cryptographic Access
      Certificate.  When all requirements have been met, clearance
      status notifications will include the fact that the individual
      has FCA.                                                                 

      27.  PREPARING AFCOMSEC FORM 9.                                          

           a.  AFCOMSEC Form 9.  (Appendix 3)  Include the following
      information on the AFCOMSEC Form 9:                                      

                (1)  Installation.  Facility or office where the
      individual is permanently assigned.                                      

                (2)  Unit or Office Symbol.  Individual's office and
      office symbol.                                                           

                (3)  Supporting COMSEC Account.  Self-explanatory.             

                (4)  Signature.  Payroll signature.                            

                (5)  Name.  Full name, last name, first name, middle
      initial.                                                                 

                (6)  SSN:  Will contain dashes (that is 001-01-0001)           

                (7)  Grade and Date of Birth.  Self-explanatory.               

                (8)  In Section 2, paragraph B, a line will be drawn
      through the last sentence in this paragraph which reads:  "I
      understand that I am subject to and consent to a periodic,
      counterintelligence polygraph examination."  This modification
      will be initialed both by the person signing the form and by the
      witness.                                                                 

      NOTE:  Type AFCOMSEC Forms 9 to ensure legibility and accuracy of
      the information.  The servicing security element and ACS-300 will
      return AFCOMSEC Forms 9 not properly and completely filled in.           

           b.  FAA Cryptographic Access Program.  Prepare three copies
      of AFCOMSEC Form 9.  Forward the original signed certificate to
      the servicing security element in regions and centers and to
      ACS-300 in the Washington Headquarters; one copy to the
      individual; and one copy for retention by the local COMSEC
      account (Folder 2).  Maintain locally retained certificates as
      long as individuals require cryptographic access.  Termination
      statements shall be copies of the locally retained certificate
      with the properly filled in bottom portion.                              

           c.  Supply of AFCOMSEC Forms 9.  Initial distribution of
      AFCOMSEC Forms 9 will be made by ACO-300 to servicing security
      elements in regions and centers who in turn will distribute the
      forms to the accounts for which they have monitor responsibility.
      After initial distribution, forms should be requisitioned as
      needed in accordance with guidance provided in AFKAG-2.                  

      28.  WITHDRAWING FCA.                                                    

           a.  Once granted the FCA may be withdrawn for only three
      reasons:                                                                 

                (1)  Administrative.  An individual is being reassigned
      by the facility or office manager to a position not requiring
      FCA, or a person is being reassigned to another FAA facility or
      region or is terminating employment.
                (2)  Suspension.  If a person's security clearance or
      any special access is suspended as outlined in Order 1600.1C,
      that person's FCA must be suspended until the matter is
      adjudicated favorably.  Suspension of the FCA requires that the
      individual be removed from COMSEC custodian and accounting duties
      that require access to cryptographic material until a final
      determination of reinstatement or revocation can be made.                

                (3)  Revocation.  Any person who has a security
      clearance withdrawn or special access denied will also have the
      FCA revoked.  This revocation of FCA is permanent and cannot be
      reinstated and permanently bars the individual from ever being
      assigned to duties within the areas in paragraph 21.                     

           b.  Facility and office managers will advise the servicing
      security element by message of any change in a person's FCA
      status resulting from suspension or revocation including reason
      for suspension or revocation.  The servicing security element
      will advise ACO-300 by message of all such actions.  In addition
      the facility and office manager will send an original copy of the
      Cryptographic Access Certificate to the servicing security
      element.  Keep a copy of the Cryptographic Access Certificate for
      90 days after signature for local records.                               

      29.  CERTIFICATES OF PERSONNEL DECLINING CRYPTOGRAPHIC ACCESS.
      Send the original copy of certificates of any personnel who
      decline to sign the Cryptographic Access Certificates through the
      servicing security element to ACO-300 for permanent retention.
      Certificates should contain all the information on the individual
      less the signature.  State that the individual has refused FCA on
      the face of the form and on the administering official's
      signature and signature block.                                           

      30.-34.  RESERVED.                                                       

                             FOR OFFICIAL USE ONLY
                           PUBLIC AVAILABILITY TO BE
                         DETERMINED UNDER 5 U.S.C. 552

           CHAPTER 3. COMMUNICATIONS SECURITY (COMSEC) DUTIES AND 
 RESPONSIBILITIES                                        

      35.  GENERAL.  All COMSEC material shall be entered into and
      retained in the COMSEC accounting system from the time of its
      origin until its ultimate destruction.  COMSEC accounts are
      established when a facility or activity manager has a need for
      secure information processing, and application is made through
      the servicing security element and ACO-300 to the USAF
      Cryptologic Support Center (AFCSC).  Upon approval by AFCSC the
      type of COMSEC account established will vary according to the
      mission it supports.  Within the FAA the two most common types of
      accounts are operational and administrative or monitor accounts.         

      36.  COMSEC CUSTODIANS AND ALTERNATES.                                   

           a.  Designation.  When a COMSEC account has been authorized
      the cognizant facility or office manager will appoint a qualified
      COMSEC custodian and at least one alternate custodian.  The
      appointment will be made in writing by properly completing an Air
      Force COMSEC (AFCOMSEC) Form 3, Appointment of COMSEC Custodians,
      for each COMSEC account.                                                 

                (1)  Managers of Civil Aviation Security Divisions
      shall be the appointing officials for COMSEC monitor accounts
      under their security cognizance.                                         

                (2)  The Manager, Investigations and Security Division,
      Operations, ACO-300, will be the appointing official for the
      headquarters COMSEC monitor account custodian and alternate.             

           b.  Grade Requirements.                                             

                (1)  FAA COMSEC custodians must be grade GS-9 or above.        

                (2)  FAA alternate custodians must be grade GS-7 or
      higher.                                                                  

           c.  Clearance Requirements.  Custodians and alternate
      custodian(s) positions are designated as non-critical sensitive
      for COMSEC accounts handling material at the Secret level or
      lower classification; for accounts handling Top Secret material
      the custodian and alternate custodian(s) positions are designated
      as critical sensitive.  Persons designated to fill these
      positions must be cleared for the highest classification of
      COMSEC material they will be required to handle or have access
      to.  Requirements are as follows:                                        

                (1)  For Top Secret COMSEC accounts, the designating
      official must ensure that persons designated as custodians and
      alternate custodians have a final Top Secret clearance based on a
      favorably adjudicated background investigation completed within
      the past 5 years.  Periodic reinvestigations (PRI) will be
      conducted within 5 years from the date of the last Sensitive
      Background Information, Background Information, or PRI in
      accordance with Order 1600.1C.                                           

                (2)  For COMSEC accounts handling classified material
      up to and including Secret, the designating official must ensure
      that the individuals designated as custodian and alternate
      custodian(s) as a minimum, have a final Secret clearance based on
      a favorably adjudicated Minimum Background Investigation (MBI).
      A PRI is recommended 5 years after placement and every 5 years
      thereafter.                                                              

                (3)  In making selections for custodian and alternate
      custodian the designating official shall give preference to
      qualified candidates who have maximum retainability in their
      current assignment.  Other considerations include the following:         

                     (a)  The individual must never have been relieved
      from COMSEC custodian duties for cause.                                  

                     (b)  If practical, custodians and alternate
      custodians should be selected on the basis of best qualified
      rather than seniority.  In this regard, consideration should be
      given to the following:                                                  

                          1  Persons with a background in COMSEC.              

                          2  Persons having a minimum total of three
      years previous COMSEC experience.                                        

      37.  TRAINING.                                                           

           a.  COMSEC Custodian.  For the purposes of this order the
      following shall apply:                                                   

                (1)  For individuals who have had no prior COMSEC
      experience and for individuals who have not been actively engaged
      in COMSEC activities during the 3 years prior to the date of
      their designation, attendance at the three week COMSEC Account
      Management Course conducted by the USAF is mandatory.                    

                     (a)  It is the responsibility of the FAA manager
      or other official designating the custodian to ensure that the
      designee is scheduled for attendance at this course within 60
      days of the date of appointment.                                         

                     (b)  Because the waiting period for this
      particular course is often several months, it is important that
      requests for allocations be submitted through appropriate
      region/center channels as soon as possible.                              

                     (c)  Additional information concerning this course
      may be obtained from the servicing security element, or from
      ACO-300, Washington, D.C.                                                

                (2)  For employees who have attended the U.S. Air Force
      COMSEC Account Management Course or other formal COMSEC training
      provided by the government within the past 3 years prior to their
      designation as custodian, attendance at the USAF COMSEC Account
      Management Training Course will normally not be required.
      Similarly, employees who have been actively engaged in COMSEC
      operations during the 3 years prior to their designation, will
      not be required to attend formal COMSEC training provided the
      nature of their duties has enabled them to develop the skills and
      proficiency required to perform the duties of custodian.                 

           b.  Alternate COMSEC Custodian(s).  Training for the
      employee(s) designated as alternate COMSEC custodian(s) is
      important, since the alternate performs the duties of the
      custodian in the custodian's absence.                                    

                (1)  Normally if the individual(s) designated as
      alternate custodian(s) have been engaged in COMSEC activities
      during the 3 years prior to their designation additional formal
      training will not be required.  It is highly desirable that at
      least one alternate custodian attend the 3 week USAF COMSEC
      Account Management Course.                                               

                (2)  As a minimum, however, it is mandatory that
      alternate custodians who have not been actively engaged in COMSEC
      activities during the 3 years prior to their designation be
      scheduled to attend approved COMSEC training of shorter duration
      than the USAF course within 60 days of their appointment.                

                     (a)  Courses approved for alternate custodian
      training include COMSEC account management training courses
      offered by the General Services Administration (GSA).  These are
      1 week training courses in COMSEC accounting offered at various
      times during the year in different geographic locations.                 

                     (b)  Allocations for GSA courses are obtained
      through appropriate region/center personnel training channels.
      Information concerning these courses is available from the
      General Services Administration, Communications Security Training
      Center, ATTN:  Registrar 7 KET-6, 1500 East Bannister Road,
      Kansas City, MO 64131-3087.                                              

           c.  Qualification Training Package.  As an interim training
      measure while an individual is awaiting a class date for the
      COMSEC Account Management Course in the case of custodians, or
      the GSA course for alternate custodians, the Qualification
      Training Package (QTP) should be used.  This is an Air Force
      produced COMSEC Account Management training package designed for
      self-study.  Requests for this package should be addressed to
      ACO-300 through the servicing security element.                          

           d.   Recurrent Training.  Recurrent training for COMSEC
      custodians and alternates shall be scheduled as necessary to
      ensure that individuals maintain a high level of proficiency in
      COMSEC account management procedures and practices.  Recurrent or
      proficiency training should be scheduled when the custodian
      determines that such training is required to achieve the required
      level of proficiency.                                                    

           e.  Coordination.  The servicing security element COMSEC
      monitor account will be provided an information copy of all
      requests for COMSEC training for custodians and alternate
      custodians.                                                              

      38.  WAIVERS.                                                            

           a.  Problems encountered in meeting minimum grade or
      training requirements for custodians or alternate custodians will
      be referred to ACO-300, through the appropriate servicing
      security element.                                                        

           b.  Where operational necessity is a consideration a request
      for waiver of minimum requirements may be submitted.                     

           c.  ACO-300 will be the approving authority for all waiver
      requests.  If a waiver is granted, it applies only to the
      designated individual and must not be transferred; it applies to
      the designated individual only while currently assigned; and it
      must be terminated if a qualified person meeting minimum grade
      requirements becomes available.  In addition, the waiver must be
      renewed annually.  Include the following information in all
      requests:                                                                

                (1)  COMSEC account number.                                    

                (2)  Name, grade, and clearance of the individuals
      desired for appointment.                                                 

                (3)  Present duty assignment.                                  

                (4)  Type custodian (primary or alternate).                    

                (5)  Complete justification.                                   

                (6)  Reason for nonselection, if applicable, of
      assigned individuals who are senior in grade and meet all other
      selection criterions.                                                    

                (7)  Date of any known projected personnel gains who
      would meet the minimum grade and/or training requirements.               

                (8)  Date the appointment is planned.                          

      39.  DUTIES OF THE COMSEC CUSTODIAN.  Specific duties for which
      the COMSEC custodian is responsible include the following:               

           a.  The development and implementation of a comprehensive
      user-training program for all persons who, in performing official
      duties, deal with COMSEC material.  An example would be the
      employees responsible for operation of COMSEC equipment at Joint
      Use Sites.  The training will include programs for user personnel
      that ensure these individuals are completely familiar with their
      duties and responsibilities in areas of control, physical
      protection, inventory and destruction of COMSEC material, and
      reporting of security hazards, violations, and possible
      compromises.  Refresher training is required as needed.                  

           b.  Ensure that requirements established in FAA's Formal
      Cryptographic Access (FCA) Program are understood and
      implemented.  This includes ensuring that personnel having an
      operational need for access have received a cryptographic access
      briefing, and have signed a Cryptographic Access Certificate,
      AFCOMSEC Form 9, as required by this order.                              

           c.  Be thoroughly familiar with directives concerning
      classified material such as Order 1600.2C, National Security
      Information.                                                             

           d.  Issue on hand receipt, all COMSEC material to users who
      need it for their job and ensure that all responsible users of
      this material know the procedures for protecting, accounting,
      destroying, and reporting possible compromise of such material.          

           e.  In coordination with the facility emergency planning
      staff, develop written plans to protect COMSEC materials in an
      emergency, and ensure that the plans are integrated with the
      facility contingency plan.  Train COMSEC personnel in their
      duties under the plan and ensure that adequate and appropriate
      destruction equipment and materials are readily available.               

           f.  Ensure that all necessary and appropriate COMSEC
      material is maintained by the account and that disposition
      instructions have been requested from the Central Office of
      Record (COR) for surplus or unneeded material.  Prepare and
      submit accounting reports promptly and accurately.                       

           g.  Ensure that standard operating procedures (SOP) are
      prepared as required, for secure and efficient conduct of
      COMSEC/operations within the cryptofacility.                             

      40.  PERFORMANCE STANDARDS.                                              

           a.  General.  The position of COMSEC custodian and that of
      alternate COMSEC custodian require persons of unquestioned
      integrity and loyalty.  The quality of the work performance of
      individuals in these positions has a direct reflection on the
      national security of the United States and is a vital factor in
      the support provided by the FAA COMSEC effort to the National
      Airspace System.  It is appropriate therefore that the position
      descriptions (PD) for individuals designated as COMSEC custodian
      or alternate COMSEC custodian include the COMSEC responsibilities
      assigned to that individual.                                             

           b.  Requirement.  Managers responsible for performance
      evaluation rating of individuals designated as COMSEC custodians
      or alternate COMSEC custodians will:                                     

                (1)  Ensure that the PD's include the COMSEC
      responsibilities of the individual(s).                                   

                (2)  Identify the COMSEC responsibility as a critical
      job element (CJE) in the performance standards for the
      individual(s).                                                           

      41.  APPOINTMENT OF CUSTODIANS AND ALTERNATES.                           

           a.  Each COMSEC account must have a COMSEC custodian and at
      least one alternate COMSEC custodian.  From a practical
      viewpoint, the COMSEC custodian should be thoroughly familiar
      with the day-to-day transactions of the COMSEC account.                  

           b.  As part of their monitor responsibilities, servicing
      security elements will:                                                  

                (1)  Ensure that proposed custodians and alternates
      meet the clearance requirements and qualifications for
      appointment as described in paragraph 21.                                

                (2)  Obtain original signatures of the designated
      custodian and alternate(s) in the proper blocks on each of four
      copies (three copies when action concerns a monitoring account)
      of AFCOMSEC Form 3.                                                      

                (3)  Ensure that all applicable blocks of all copies of
      the AFCOMSEC Form 3 are completed, including the "Effective Date"
      and "From" block.                                                        

                (4)  Forward the original copy of AFCOMSEC Form 3 under
      a covering letter to the Air Force Cryptologic Support Center
      (AFCSC), Attention:  MMIC, San Antonio, Texas 78243.  Refer to
      Situation F-2, AFKAG-2.  The letter should designate appointment
      or rescission of a custodian or alternate(s), as appropriate.
      One copy of AFCOMSEC Form 3 will be forwarded to FAA
      Headquarters, Washington, D.C. 20591, Attention:  ACO-300.  One
      copy shall be retained by the servicing security element
      monitoring account, and one copy shall be retained in the
      operational account.                                                     

      42.  MONITORING RESPONSIBILITIES.                                        

           a.  FAA/USAF Agreement.  By agreement with the U.S. Air
      Force (USAF), FAA will provide for the monitoring of all FAA
      COMSEC accounts.  The Manager, Investigations and Security
      Division, Operations, ACO-300, is responsible for the agencywide
      COMSEC monitoring effort at the headquarters level.  ACO-300 is
      also responsible for monitoring the administrative/monitor
      accounts of the regions, Aeronautical Center and Technical
      Center, and the operational and user accounts at the Washington
      Telecommunications Center.  The regional and center servicing
      security elements have been established as administrative
      accounts with the responsibility for the monitoring of
      operational and secure telecommunications facilities within their
      respective jurisdictions.                                                

           b.  Monitor/Inspection Requirements.  Monitor and inspection
      activities shall be conducted in accordance with the following
      requirements:                                                            

                (1)  Regional and center monitor accounts shall conduct
      a general inspection of each operational COMSEC account and
      secure telecommunication facility in their jurisdiction at least
      once each year.  Additional inspections will be conducted as
      required by Order 1650.7B.                                               

                (2)  Appendix 4, Secure Telecommunications Facility and
      COMSEC Account Checklist, shall be used as a guide in the conduct
      of the inspection.  The completion of the checklist does not in
      itself constitute a COMSEC inspection.  The inspector must be
      competent and knowledgeable in all phases of COMSEC.  A formal
      written report containing the results of the inspection and
      recommended corrective actions shall be provided to the facility
      or office manager having responsibility for the COMSEC operation,
      and to the custodian of the inspected account.  An information
      copy of COMSEC inspection reports shall be provided to ACO-300,
      ATTN:  ACO-320.                                                          

                (3)  Technical surveillance countermeasures (TSCM)
      inspections of secure telecommunications facilities shall be
      conducted in accordance with provisions of this order and Order
      1600.12C, Technical Security Countermeasures Program.                    

                (4)  ACO-300 will inspect regional and center monitor
      accounts at least once every two years.  In addition, ACO-300
      will schedule COMSEC inspections and surveys as required
      agencywide to ensure effective monitoring of regional and center
      COMSEC programs.                                                         

           c.  Administrative Requirements.                                    

                (1)  The custodian of each FAA COMSEC account shall
      forward a copy of all reports, correspondence, etc., pertaining
      to COMSEC accounting to his/her servicing security element
      monitoring account.  Regional and center monitor accounts shall
      provide copies of the documents pertaining to their account
      operations to ACO-300, ATTN:  ACO-320.  Conversely, AFCSC sends a
      copy of all reports, correspondence, etc., it originates to the
      appropriate monitoring account.                                          

                (2)  The monitoring account shall review these
      documents and ensure the completeness, accuracy, and timeliness
      of the accounting actions.  In the event that a monitor account
      receives a copy of a discrepancy report from AFCSC, the monitor
      account custodian shall ensure that the required corrective
      action is accomplished expeditiously.                                    

      43.-49.  RESERVED.                                                       

                      FOR OFFICIAL USE ONLY
                       PUBLIC AVAILABILITY TO BE
                     DETERMINED UNDER U.S.C. 552

                 CHAPTER 4. SAFEGUARDING COMSEC FACILITIES                    

                             SECTION 1.  GENERAL                               

      50.  PURPOSE.  National Communications Security Instruction
      (NACSI) 4008, Safeguarding COMSEC Facilities, dated March 4,
      1983, prescribes standards for safeguarding COMSEC Facilities.
      NACSI 4008 is implemented for all USAF supported COMSEC accounts
      by Air Force Regulation AFR 56-6, same subject, dated November 3,
      1986, all FAA COMSEC accounts are required to comply with the
      policies and procedures established in these directives.  This
      chapter identifies specific requirements for which compliance is
      mandatory.                                                               

      51.  REFERENCED PUBLICATIONS.  Appendix 5, to this order contains
      a reference listing of NACSI'S, NTISSI'S, and AFR's that are to
      be maintained by all FAA COMSEC accounts.  The publications
      listed below pertain specifically to areas covered in this
      chapter.                                                                 

           a.  NACSI No. 4005, Safeguarding and Control of
      Communications Security Material, dated October 12, 1979.  This
      NACSI is implemented in USAF publication AFR 56-13, same subject,
      dated July 28, 1987.                                                     

           b.  NACSI No. 4009, Protected Distribution Systems, dated
      December 30, 1981.  Implemented by USAF publication AFR 56-19,
      same subject, dated November 3, 1986.                                    

           c.  NTISSI No. 4004, Routine Destruction and Emergency
      Destruction of COMSEC Material, dated March 11, 1987.
      Implemented by USAF publication AFR 56-5, same subject, dated
      August 28, 1987.                                                         

           d.  NCSC-9, National COMSEC Glossary, dated September 1,
      1982.                                                                    

      52.  BACKGROUND.                                                         

           a.  National standards for safeguarding COMSEC facilities
      are necessary to ensure the integrity of the classified COMSEC
      material contained therein.                                              

           b.  The principal threats which such safeguards must defend
      against are:                                                             

               (1)  Unauthorized access to or observation of classified
      COMSEC material.                                                         

               (2)  Tampering with or TEMPST exploitation of, COMSEC
      and associated telecommunications equipment.                             

               (3)  Clandestine exploitation of sensitive
      communications within a secure telecommunications
      facility (e.g. "bugging").                                               

                   SECTION 2.  PHYSICAL SECURITY STANDARDS                     

      53.  PHYSICAL SECURITY STANDARDS FOR FIXED COMSEC FACILITIES.            

           a.  Application.  For the purposes of this order, unless
      specifically stated otherwise, all FAA COMSEC facilities are
      considered as "fixed."  Should questions arise concerning the
      application of the physical security standards prescribed by this
      order to a specific facility they shall be addressed through the
      servicing security element to Manager, Investigations and
      Security Division, ACO-300, Washington, D.C., for resolution.            

           b.  Standards.  All FAA COMSEC secure telecommunications
      facilities will be designated as CLOSED Areas in accordance with
      Order 1600.2C and will comply with the physical security
      standards specified in this section and Appendix 3.                      

           c.  Special Security Requirements.  Users of COMSEC
      equipment should be aware of special security requirements that
      may apply to the system they are using.  NSA publishes these
      special doctrinal guidance documents as NACSI's in the 8000
      series.  The USAF implements the 8000 series NACSI's as AFSAL's
      and publishes and distributes them as specialized COMSEC
      publications in the COMSEC Material Control System (CMCS).  These
      documents are indexed in AFKAG-13 and are available on request to
      all COMSEC custodians.                                                   

           d.  Security/Engineering Approval.                                  

               (1)  The manager of the office or activity in which a
      secure telecommunications facility is located is responsible for
      ensuring that design and construction plans are coordinated
      through the servicing security element with ANC-120 and ACO-300
      prior to implementation.  This includes engineering and
      construction plans and specifications for proposed secure
      telecommunications facilities and ancillary terminal equipments,
      as well as plans for the reengineering or modification of
      existing facilities.  Failure to do this will result in automatic
      loss of certification for the secure telecommunications facility.
               (2)  Specifications and associated drawings must be
      submitted through the servicing security element to ACO-300 and
      to ANC-120.  Subsequent to a review of the plans and
      specifications, a joint determination will be made by ANC-120 and
      ACO-300 either approving the plans or identifying corrective
      actions that must be taken.                                              

      54.  INSTALLATION CRITERIA.  FAA facilities which generate,
      process, or transfer unencrypted classified information by
      electrical, electronic, electromechanical, or optical means shall
      conform to the guidance and standards in NACSI 4009, NACSIM
      5100A, and NACSIM 5203 with regard to protected wireline
      distribution systems.  Questions concerning security requirements
      shall be addressed through the servicing security element to
      ACO-300 for resolution.  Questions relevant to engineering and
      construction standards should be coordinated through the
      appropriate regional/center Airway Facilities channel and
      forwarded in writing to ANC-120, with an information copy to
      ACO-300 and the servicing security element.                              

      55.  FACILITY APPROVALS, INSPECTION, AND TESTS.                          

           a.  Approval to Hold Classified COMSEC Material.  Each FAA
      facility must be approved by the servicing security element
      before the facility may hold classified COMSEC material.  Such
      approval shall be based on an inspection by the servicing
      security element which determines that the facility meets the
      physical safeguarding and other requirements of this order.              

                (1)  The servicing security element will advise the
      facility manager by letter of the approval or disapproval of the
      facility with an information copy to ACO-300.  The facility will
      retain a copy of the approval letter in its COMSEC file.                 

                (2)  After initial approval, each FAA facility holding
      classified COMSEC material shall be reinspected in accordance
      with provisions of FAA Order 1650.7B as they pertain to Category
      1 facilities.  The facility shall also be reinspected and the
      approval reviewed, when:                                                 

                (a)  There is evidence of penetration or tampering,            

                (b)  Alterations are made which significantly change
      the physical characteristics of the facility,                            

                (c)  The facility is relocated or the facility is
      reoccupied after being temporarily abandoned.                            

           b.  Approval to Operate Secure Telecommunication Facilities.
      In addition to the requirement for physical security approval to
      hold classified COMSEC material, FAA secure telecommunications
      facilities require the following inspections and tests:                  

                (1)  General COMSEC Inspection.  ACO-300 is responsible
      for conducting a general COMSEC inspection of secure
      telecommunications facilities prior to initial activation where
      practicable, but in any case within 90 days after activation.
      Thereafter reinspection is required at intervals of no greater
      than 18 months.  At a minimum, the inspection shall assess secure
      operating procedures and practices, handling and storage of
      COMSEC material, routine and emergency destruction capabilities,
      compliance with installation (Red/Black) criteria, and obvious
      technical security hazards.
                (2)  Technical Surveillance Countermeasures
      Inspections.  TSCM inspections are conducted by ACO-300 in
      accordance with provisions of Order 1600.12C.                            

                     (a)  COMSEC custodians shall send requests for
      TSCM inspections of new secure telecommunications facilities
      through the appropriate servicing security element to ACO-300 in
      accordance with procedures required by Order 1600.12C.  Requests
      will be appropriately classified and should be submitted at least
      90 days before the projected activation date for the facility.           

                     (b)  After the initial TSCM survey ACO-300 will
      schedule subsequent surveys.                                             

                     (c)  Requests for TSCM support shall be submitted
      when any of the conditions exist that are described in
      subparagraphs 5b(2)(a), (b), and (c), Annex A to NACSI 4008/AFR
      56-6.                                                                    

                (3)  TEMPEST Inspections and Tests.  Visual TEMPEST
      inspections and, where determined to be necessary by ANC-120,
      instrumented TEMPEST tests shall be conducted at secure
      telecommunications facilities in accordance with requirements
      specified in subparagraphs 4b(3)(a) and (b), Annex A to NACSI
      4008/AFR 56-6.                                                           

      Written requests for instrumented TEMPEST test support should be
      submitted by the office or activity manager or COMSEC custodian
      through appropriate region/center channels to ANC-120 with an
      information copy to ACO-300.                                             

           c.  Daily Security Check.                                           

               (1)  Continuously Manned Facility.  In a continuously
      manned facility, a security check shall be made at least once
      every 24-hours.  This shall be a visual check to ensure that all
      classified COMSEC information is properly safeguarded, and that
      physical security protection system/devices (e.g., door locks and
      vent covers) are functioning properly.                                   

                (2)  Facilities that are Not Continuously Manned.  In a
      facility which is not continuously manned, the security check
      shall be conducted at least every 24 hours if the facility is in
      operation for 24 hours or more and prior to departure of the last
      person and shall include additional checks to ensure that the
      facility entrance door is locked and that, where installed,
      intrusion detection systems are activated.  Where a facility is
      unmanned for periods greater than 24 hours (e.g., during weekends
      and holidays) and the facility is not protected by an intrusion
      detection system that has been approved by ACO-300, a check shall
      be made at least once every 24 hours to ensure that all doors to
      the facility are locked and that there have been no attempts at
      forceful entry.                                                          

           d.  Activity Security Checklist.  FAA secure
      telecommunications facilities will use Standard Form (SF) 701,
      Activity Security Checklist, to record the daily security check.
      The national stock number for the SF 701 is 7540-01-213-7899.
      The form is available from the GSA.  In facilities which operate
      continuously, at the end of each shift, the person responsible
      (shift supervisor, for example) makes the security check.  The
      daily security check may be a part of, but not a substitute for,
      the daily (or shift) inventory of COMSEC material.
      NOTE:  If in a continuously operating facility the security
      container is not unlocked it will not be opened solely to
      inventory the contents.  An inventory will be conducted when the
      container is opened.                                                     

      56.  INTRUSION DETECTION SYSTEMS.  Intrusion detection systems
      used to protect COMSEC information must be specifically approved
      for that purpose by ACO-300 prior to installation.  When approved
      alarm systems replace permanent guards, they must be used with an
      immediate guard response which will not exceed 5 minutes under
      any condition.                                                           

      57.-60.  RESERVED.                                                       

                SECTION 3.  ACCESS RESTRICTIONS AND CONTROLS                   

      61.  UNESCORTED ACCESS.                                                  

           a.  General.  Unescorted access to FAA offices/activities
      handling, storing, or processing classified COMSEC material will
      be limited to:                                                           

                (1)  FAA government civilian or military personnel who
      are U.S. citizens and whose duties require such access and, if
      the material is classified, who have been granted a security
      clearance equal to or higher than the classification of the
      COMSEC material involved.                                                

                (2)  Normally, these individuals will have regular duty
      assignments in the facility.  The individuals must meet all
      requirements of the FAA Formal Cryptographic Access (FCA) Program
      as specified on Chapter 2 of this order.                                 

                (3)  The names of all such individuals shall appear on
      a posted formal access list.                                             

                (4)  Official visitors whose names do not appear on the
      access list may also be granted unescorted access by the COMSEC
      custodian or the facility manager having responsibility and
      authority for the COMSEC operations, provided the visitors
      require such access and meet the access requirements of NACSI
      4005 and this order to include verification of the fact that the
      individuals have received a cryptographic access briefing and
      have a current signed cryptographic access authorization.  All
      such visits shall be recorded on the visitor register (FAA Form
      1600.8 or equivalent).                                                   

                (5)  No individual will be allowed unescorted access to
      an FAA COMSEC facility who has not received a cryptographic
      access briefing and signed a cryptographic access authorization.         

           b.  Access Controls and Procedures for Secure
      Telecommunications Facilities.  The following controls and
      procedures will be used to control access to secure
      telecommunications facilities:                                           

                (1)  Entrance controls will be established to prevent
      entry by persons not listed on the authorized entrance list.
      Facilities using the locked-door system must have a buzzer system
      and a way to challenge and identify persons before they enter.           

                (2)  Entrance doors to FAA facilities shall be equipped
      with a fish-eye viewing device to permit identification of
      persons seeking admittance.                                              

                (3)  If guards are assigned, station them immediately
      outside the entrance.  Regardless of the control system used,
      entry procedures must ensure identification of persons seeking
      entry so as to prevent viewing of activities within the facility
      before entry is permitted.                                               

                (4)  Unrestricted entry to the secure
      telecommunications center will be limited to persons whose names
      appear on an official posted entrance list.  The authorized
      entrance list must contain the names of all persons regularly
      assigned duties within the secure telecommunications facility and
      those others whose duties require them to have frequent access.
      All personnel on the authorized entrance list must have received
      a cryptographic access briefing and must have a current signed
      Cryptographic Access Certificate on file which is verified by the
      custodian or the manager having responsibility for the COMSEC
      operation.  In addition, each individual on the list must have a
      valid clearance equal to or higher than the COMSEC information
      being given access to.  It is the COMSEC custodian's
      responsibility to verify the clearance for each individual on the
      authorized entrance list.  Custodians should consult with the
      servicing security element to determine the most effective method
      to verify clearance information and cryptographic access
      authorization data for each facility.                                    

                (5)  The following statement will be placed on the
      authorized entrance list, certifying that all persons listed
      thereon have been granted access to classified COMSEC information
      and that a security clearance is on file for each person:  "ALL
      PERSONNEL LISTED HEREON HAVE BEEN GRANTED ACCESS TO CLASSIFIED
      COMSEC INFORMATION AND APPROPRIATE DOCUMENTATION IS ON FILE."  By
      affixing his or her signature to this statement the custodian
      affirms that he or she has personally verified with the facility
      or activity personnel officer, or the servicing element, that
      each individual on the authorized access list has:                       

                     (a)  A current Form 1600.54, Notification of
      Personnel Security Action, on file;                                      

                     (b)  A clearance equal to the highest
      classification level of COMSEC material to which he/she will have
      access.                                                                  

                     (c)  Received a cryptographic access briefing and
      has signed a current Cryptographic Access Certification as
      required by this order.                                                  

                (6)  On the authorized entrance list, the COMSEC
      custodian will specifically designate those persons, by name, who
      may authorize admittance to others not on the list.  The number
      of persons authorized to admit others in this manner shall be
      kept to a minimum.  Usually, the facility manager having
      responsibility and authority over the COMSEC operation, and the
      custodian may authorize admittance.                                      

                (7)  The authorized entrance list will be signed and
      dated by the COMSEC custodian.  It is the custodian's
      responsibility to ensure that the list is current at all times.          

                (8)  An FAA Form 1600-8, Visitor Register, will be
      maintained to record the arrival and departure of all persons
      whose names do not appear on the authorized entrance and access
      list.  Completed FAA Form 1600-8, shall be maintained on file by
      the custodian for a period of two calendar years, after which
      they may be destroyed.                                                   

           c.  Access Control for Administrative/Monitor Accounts.  FAA
      administrative and monitor accounts do not require the stringent
      security measures required for secure telecommunications
      facilities.                                                              

                (1)  Administrative/monitor accounts are those which
      hold only general COMSEC publications or serve as issue points
      for codes and authentication systems.  This type of account
      requires adequate storage facilities and inventory controls.
      However, they may be located within general office space if
      measures are taken to exclude unauthorized and uncleared
      personnel and prevent viewing of COMSEC material when in use.            

                (2)  The custodian must closely control access to an
      administrative account's holdings; access must be limited to
      persons within the immediate working area who have a need-to-know
      and others whose duties require frequent access.  The
      requirements for granting access and certification or
      verification thereof are the same as for secure
      telecommunications facilities.                                           

      62.  ESCORTED ACCESS.
           a.  Uncleared visitors.  Uncleared visitors may be
      authorized admittance by the custodian, or the manager having
      operational responsibility for the COMSEC facility, provided
      effective security precautions are taken to preclude unauthorized
      access to classified information.  These visitors shall be under
      continuous escort by an individual whose name appears on the
      access list.  All such visits shall be recorded in the visitor
      register.                                                                

           b.  Repairmen.  When uncleared repairmen are admitted to
      perform maintenance on commercially contracted information-
      processing equipment which is connected to circuits protected by
      cryptographic equipment, the escort shall be a cryptorepair
      person or other technically qualified individual who is capable
      of recognizing acceptable and proper repair procedures for that
      type of equipment.  This is a means to control attempts at
      malicious action against the involved COMSEC equipment or
      installation.                                                            

      63.  VISITOR REGISTER.                                                   

           a.  Requirement.  A visitor register, FAA Form 1600.8, will
      be maintained at the COMSEC facility entrance area to record the
      arrival and departure of authorized visitors.                            

           b.  Procedure.  The visitor register shall contain the
      following information for each individual.                               

                (a)  Date and time of arrival and departure.                   

                (b)  Printed name and signature of visitor.                    

                (c)  Purpose of visit.                                         

                (d)  Signature of individual admitting visitor.                

           c.  Disposition.  Records of authorized visitors shall be
      retained in the custodian's files for a period of two calendar
      years, after which they may be destroyed.                                

      64.  NO-LONE ZONES.                                                      

           a.  Facilities which produce or generate key (in any form)
      distribution centers, and depots and other logistic activities
      which store or distribute large quantities of keying material
      shall employ no-lone-zone restrictions within all areas in which
      these activities take place.                                             

           b.  Refer to AFR 56-1, paragraph 3-5, for restrictions on
      single person access.                                                    

           c.  The majority of FAA COMSEC facilities handling or
      processing COMSEC material at the SECRET level or below will not
      have a need for institution of no-lone-zone measures.  Custodians
      having questions concerning no-lone-zone applications should
      direct them to ACO-300 through their servicing security element.         

      65.  GUARD SERVICES.                                                     

           a.  Purpose.  FAA facilities requiring the services of a
      secure telecommunications facility may for various reasons not be
      able to have a COMSEC resource in-house.  This would be the case
      for example, if a secure telecommunications facility were being
      reengineered and it was necessary to take the facility off-line
      for a period of time.  When this situation occurs, the FAA
      facility may enter into an agreement with another U.S. Government
      or military secure telecommunications facility to receive and
      transmit their classified and operational messages until the
      facility circuits are operational.  This is referred to as
      "guarding."                                                              

           b.  Requirement.  The FAA manager having operational
      authority and responsibility for a secure telecommunications
      facility will inform ANC-120 and ACO-300, through appropriate
      regional channels to include the servicing security element, of a
      requirement for "guard" service prior to making arrangements for
      such support.  Only secure telecommunications facilities operated
      by U.S. Government or military personnel will be used for
      guarding for classified FAA telecommunications.  Contractor
      operated secure telecommunications facilities will not be used.          

      66.-70.  RESERVED.                                                       

            SECTION 4.  PROTECTION OF UNATTENDED COMSEC EQUIPMENT              

      71.  GENERAL.                                                            

           a.  Noncontinuously Manned Facility.  In a noncontinuously
      manned facility, unattended COMSEC equipment shall be protected
      as prescribed in this section during periods when the facility is
      not manned.                                                              

           b.  Construction.  A facility which meets the construction
      requirements of Appendix 6 provides sufficient protection, under
      normal circumstances, for unattended, unkeyed COMSEC equipment
      installed in an operational configuration.  The requirements for
      the protection of COMSEC equipment in secure telecommunications
      facilities which normally operate unmanned for extended periods
      of time are covered in Annex C, NACSI 4008/AFR 56-6, under
      "Unattended, Fixed Secure Telecommunications Facilities."                

      72.  PROTECTION REQUIREMENTS.                                            

           a.  General.  In some situations there may be significant
      technical or operational reasons to locate communications and
      associated COMSEC equipments in unattended sites.  Any
      requirement for FAA activities to locate COMSEC equipment at
      unattended sites must be submitted through the servicing security
      element to ACO-300 for approval prior to implementation.  The
      request for approval will be submitted in writing, by the
      custodian or facility manager having authority over the COMSEC
      assets and will include the measures to be taken to satisfy the
      safeguarding requirements listed in subparagraph b, below.               

           b.  Safeguards.  Paragraph IID, Annex C to NACSI 4005/AFR
      56-13 establishes the following safeguard requirements:                  

                (1)  The site must be located in an area firmly under
      U.S. control.                                                            

                (2)  Cryptonets whose keying variables are held in
      COMSEC equipments located at unattended sites must be kept as
      small as possible, with unique keying material used on each link
      terminated at an unattended site where feasible.                         

                (3)  COMSEC equipment not in use may not be stored at
      an unattended site.  All COMSEC equipments located at unattended
      sites must be operationally required as on-line, standby or
      back-up items to terminate an active circuit.                            

                (4)  Keying material other than that which is
      electrically or physically held in the COMSEC equipments may not
      be stored at unattended sites.
                (5)  The FAA manager responsible for operation of the
      unattended site must arrange for timely guard force response to
      investigate incidents involving threats to the COMSEC equipment
      at the site.  Response planning should be conducted in
      coordination with the servicing security element.  The servicing
      security element will advise the manager on effective security
      planning and will provide investigative support when necessary.
      The FAA custodian responsible for the COMSEC material must be
      knowledgeable of these arrangements.                                     

                (6)  The FAA manager responsible for operation of the
      unattended site must ensure that inspections of the sites are
      conducted to verify that the COMSEC equipments have not been
      tampered with.  The inspections should be at random and at
      irregular intervals without excessive delay between the
      intervals.                                                               

      73.-77.   RESERVED.                                                      

                 SECTION 5.  PROTECTION OF LOCK COMBINATIONS                   

      78.  PURPOSE.                                                            

           a.  General.  The requirements of this section apply to
      combination locking devices for FAA COMSEC facility doors and
      security containers which hold classified, telecommunications
      security (TSEC) nomenclatured material.                                  

           b.  Collateral Classified Materials.  Combinations to FAA
      security containers which are used to store only collateral
      classified material that is not accountable under the COMSEC
      Material Accounting System (CMCS), may be controlled in
      accordance with this section or the requirements of Order
      1600.2C.  If a container is used to store both collateral and
      TSEC nomenclatured material the protection requirements of this
      section will apply.                                                      

      79.  PROTECTION REQUIREMENTS.                                            

           a.  Selection of Combinations.  Each lock must have a
      combination composed of randomly selected numbers.  This
      combination shall not deliberately or accidentally duplicate a
      combination selected for another lock within the facility and
      shall not be composed of successive numbers, numbers in a
      systematic sequence, nor predictable sequences (e.g., birthdates,
      social security numbers, and phone numbers).                             

           b.  Changing Combinations.  A lock combination shall only be
      changed by a cleared individual having a need-to-know for the
      information safeguarded by the lock.  Combinations must be
      changed:                                                                 

                (1)  When the lock is initially placed in use.  (The
      manufacturer's preset combination shall not be used.)                    

                (2)  When any person having authorized knowledge of the
      combination no longer requires such knowledge (e.g., through
      transfer or loss of clearance).                                          

                (3)  When the possibility exists that the combination
      has been subjected to compromise.                                        

                (4)  At least annually.
           c.  Classification of Combinations.  Lock combinations shall
      be classified the same as the highest classification of the
      information protected by the locks.  For a security container,
      this is the highest classification of the information held in the
      container; for a facility door, it is the highest classification
      of the information held in the facility to which the door
      controls access including that information stored in containers.         

      80.  ACCESS TO COMBINATIONS.                                             

           a.  Access to the combination of a lock used to protect
      COMSEC material shall be limited to individuals who are
      authorized access to the material in accordance with NACSI
      4005/AFR 56-13, and Chapter 2 of this order.                             

           b.  Where a container is used to store future editions of
      keying material, access to the combination shall be further
      restricted to the COMSEC Custodian and the Alternate
      Custodian(s).  Where this restriction cannot be applied because
      others must have access to the container for current editions of
      keying material or other material, future editions of keying
      material shall be stored separately in a locked strongbox which
      can be opened only by the Custodian and the Alternate
      Custodian(s).  The strongbox shall be kept in the security
      container.  Exceptions may be made in operational areas to allow
      shift supervisors access to the next future edition of keying
      material, but not to later future editions.                              

           c.  Access to combinations for security containers used to
      store Top Secret keying material will be controlled in accordance
      with requirements of NTISSI 4005, and Appendix 7.
      81.  RECORD OF COMBINATIONS.                                             

           a.  Standard Form 700.  The Standard Form (SF) 700, Security
      Container Information, NSN:  7540-01-214-5372, will be used to
      record the current combination to COMSEC containers.  Parts 2 and
      2A of each completed copy of SF 700 shall be classified at the
      highest level of classification of the information authorized for
      storage in the security container.  A new SF 700 must be
      completed each time the combination to the security container is
      changed.                                                                 

           b.  Emergency Access.  To provide for ready access to
      secured material in emergencies, a central record of lock
      combinations shall be maintained in a security container approved
      for storage of the highest classified combination.  The
      combination to this container shall be restricted to persons with
      proper clearance and need-to-know.  Provision must be made for
      access to the record of combinations in case of an emergency.            

           c.  Packaging Requirements.  Combinations to FAA COMSEC
      containers will be packaged and handled as follows:                      

                (1)  The SF 700 Part 2 and 2A containing the
      combination will be assigned a classification equal to the
      highest category of classified material stored within the
      container.  In addition to the classification, the SF 700 will be
      annotated to reflect the following:                                      

                     (a)  The identity of the container (reference
      paragraph 191, chapter 8, Order 1600.2C).  This will include the
      container, room, and building number.
                     (b)  The date the combination was changed.                

                     (c)  The responsible persons authorized access to
      the combination.                                                         

                (2)  Safe combination will be maintained within COMSEC
      channels.  This will not prevent storing combinations in FAA
      areas outside the secure communications facility or vault.  For
      combinations up to and including Secret a properly filled out SF
      700 should be forwarded to the servicing security element monitor
      account through COMSEC channels.  Proper packaging is required
      and delivery should be accomplished by courier.  Persons who have
      access to the security containers which house COMSEC combinations
      must have a clearance level equal to or above that required for
      access to security containers or vaults for which the
      combinations have been recorded, and must meet FAA FCA Program
      requirements specified in Chapter 2 of this order.  For storage
      outside the secure communications facility or vault the COMSEC
      custodian will require an SF 154 hand receipt for the combination
      and will maintain the current SF 154 receipt(s) in the COMSEC
      file.                                                                    

                (3)  For storage outside the secure telecommunications
      facility or vault, a combination storage location shall be chosen
      which allows ready access in an emergency but which is restricted
      to persons with proper clearance and need-to-know.  Top Secret
      combinations do not have to be recorded with the Top Secret
      Control Office (TSCO) since they are controlled within COMSEC
      channels.  Top Secret combination must be controlled however in
      accordance with NTISSI 4005, and Appendix 7.                             

           d.  Prohibition.  It is specifically prohibited for
      individuals to record and carry, or store insecurely for personal
      convenience, the combinations to facilities or containers in
      which COMSEC material is stored.  Also, records of such
      combinations may not be stored in electronic form in a computer.         

      82.-86.  RESERVED.                                                       

               SECTION 6.  NONESSENTIAL AUDIO/VISUAL EQUIPMENT                 

      87.  PERSONALLY OWNED EQUIPMENT.  Personally owned receiving,
      transmitting, recording, amplification, information-processing,
      and photographic equipment (e.g., radios, tape recorders,
      stereos, televisions, cameras, magnetic tape and film) shall not
      be permitted in FAA secure telecommunications facilities.                

      88.  GOVERNMENT OWNED EQUIPMENT.  Government-owned or leased (or
      company owned-or leased in the case of contractor-operated
      facilities) receiving, transmitting, recording, amplification,
      video, and photographic equipment (e.g., radios, music systems,
      TV monitors/cameras, and amplifiers) which are not directly
      associated with secure telecommunications operations or
      information processing activities may be used in secure
      telecommunications facilities provided approval for their use is
      granted by the FAA facility chief or manager having
      responsibility for and authority over COMSEC operations on a
      case-by-case basis, subject to the following:                            

           a.  The Government-owned equipment in FAA telecommunications
      facilities must be subjected to and pass all the same technical
      and TEMPEST security requirements that mission-essential
      equipment must pass.                                                     

           b.  Equipment must be reinspected or tested each time it is
      removed and then returned to the facility.                               

           c.  The manager responsible for approving the location of
      the equipment in the secure telecommunications facility will also
      be responsible for ensuring that a record of the latest approval
      and inspection/test is maintained in the secure
      telecommunications facility, and a copy provided to ACO-300
      through the servicing security element.                                  

           d.  The reinspection/test and record requirements do not
      apply to approved portable telephone "beepers" and two-way radios
      carried by visiting key personnel on official duty, if approved
      by the COMSEC custodian.                                                 

      89.-94.  RESERVED.                                                       

               SECTION 7.  STANDARD OPERATING PROCEDURES (SOP)                 

      95.  REQUIREMENT.                                                        

           a.  Requirement. Each FAA COMSEC secure telecommunications
      facility shall have a written COMSEC SOP.                                

           b.  Procedure.  The COMSEC custodian will prepare and
      maintain in a current status a written SOP which shall contain
      provisions for the secure conduct of facility operations and for
      the safeguarding of COMSEC material, for example the SOP should
      include procedures for:
                (1)  Cryptographic operations.                                 

                (2)  Local accountability of COMSEC material.                  

                (3)  Obtaining COMSEC maintenance support.                     

                (4)  Controlling access to the COMSEC area.                    

                (5)  Storage.                                                  

                (6)  Routine and emergency destruction.                        

                (7)  Reporting of insecurities.                                

           c.  Coordination.  The custodian will require all persons
      associated with the day-to-day operations of the secure
      telecommunications facility to familiarize themselves with the
      SOP initially and signify by their initials that they have reread
      the SOP at least once every 3 months thereafter.                         

      96.  EMERGENCY PLAN.  As an adjunct to its SOP each FAA Plan
      COMSEC facility shall have a current emergency plan prepared in
      accordance with guidance contained in NTISSI 4004/AFR 56-5.              

      The plan shall be written, and, as a minimum shall be structured
      to address the following concerns:                                       

           a.  Coordination with the overall facility/activity
      emergency contingency planning staff.  COMSEC
      emergency/contingency and destruction planning should be an
      integral part of the overall facility plan.
           b.  Fire reporting and initial fire fighting by assigned
      personnel.                                                               

           c.  Assignment of on-the-scene responsibility for ensuring
      protection of the COMSEC material held.                                  

           d.  Procedures for securing or removing classified COMSEC
      material and evacuation of the area(s).                                  

           e.  Protection of material when admission of outside
      firefighters into the secure area(s) is necessary.                       

           f.  Assessment and reporting of probable exposure of
      classified COMSEC material to unauthorized persons during the
      emergency.                                                               

           g.  Post-emergency inventory of classified COMSEC material
      and reporting of any losses or unauthorized exposure to the
      servicing security element.                                              

      97.-101.  RESERVED.

           CHAPTER 5. SAFEGUARDING AND CONTROL OF COMMUNICATIONS 
 SECURITY MATERIAL                                       

      102.  GENERAL                                                            

           a.  Purpose.  This chapter specifies minimum safeguards and
      establishes standard criteria for the protection and control of
      Communications Security (COMSEC) material in accordance with
      guidelines set forth in National Communications Security
      Committee document NCSC-1, Safeguarding COMSEC Material.  The
      NCSC has been replaced by the National Telecommunications and
      Information Systems Security Committee (NTISSC).  The U.S. Air
      Force implementing directive is AFR 56-13, Safeguarding and
      Control of Communications Security Material, dated July 28, 1986.        

           b.  Scope.  Controls for safeguarding COMSEC material apply
      to access, use, production, development, transportation, storage,
      accounting, and disposition.  Safeguards and control criteria for
      COMSEC material are specified herein in the following categories:        

                (1)  Keying material marked "CRYPTO" (e.g., key lists,
      key cards, codes, authenticators, one-time pads, CRIBS, rotors,
      keying plugs, tapes, keyed microcircuits, etc.).                         

                (2)  Crypto-equipment (including communications and
      information processing equipment with integral cryptography) and
      components thereof which embody the principles or logic of a
      cryptosystem, including COMSEC computer software and firmware.           

      NOTE:  "Firmware" refers to software that is permanently stored
      in a hardware device which allows reading and executing the
      software but not writing or modifying it.                                

                (3)  Other COMSEC material of the following types:             

                     (a)  General COMSEC instructional documents,
      TEMPEST information, COMSEC equipment operating maintenance
      manuals, changing call signs and frequency systems, brevity
      lists, and keying material not marked "CRYPTO."                          

                     (b)  Crypto-ancillary material (including
      equipment or software designed specifically to facilitate
      efficient or reliable operation of crypto-equipment, or designed
      specifically to convert information to a form suitable for
      processing by crypto-equipment).                                         

      103.  DEFINITIONS.  For the purposes of this order the following
      terms shall have the meanings set forth below:                           

           a.  Communications Security (COMSEC).  Communications
      security (COMSEC) means protective measures taken to deny
      unauthorized persons information derived from telecommunications
      of the United States Government related to national security and
      to ensure the authenticity of such communications.  Such
      protection results from the application of security measures
      (including cryptosecurity, transmission security, emissions
      security) to electrical systems generating, handling, processing,
      or using national security or national security related
      information.  It also includes the application of physical
      security measures to communications security information or
      materials.                                                               

           b.  Telecommunications.  Telecommunications means the
      transmission, communication, or processing of information,
      including the preparation of information, by electrical,
      electromagnetic, electromechanical, or electro-optical means.            

           c.  National security.  National security means the national
      defense and foreign relations of the United States.                      

      104.  HANDLING KEYING MATERIAL.  Keying material marked "CRYPTO"
      must be handled within the COMSEC Material Control System (CMCS).
      This is a unique system set up for producing, transmitting,
      storing, accounting for, and destroying COMSEC material including
      International Pact Organization (IPO) material.  All
      nomenclatured COMSEC material (except material handled through
      publication distribution channels; such as National COMSEC
      Instructions (NACSI), National COMSEC/EMSEC Information Memoranda
      (NACSEM) and National COMSEC Information Memoranda (NACSIM)), is
      controlled within the CMCS throughout its life.  The system
      requires that all COMSEC material be handled only between COMSEC
      custodians through established channels.  Classified COMSEC
      material never enters the regular document distribution and
      control system.                                                          

      105.-109  RESERVED.                                                      

                SECTION 1.  GENERAL INFORMATION APPLICABLE TO ALL
                            COMSEC MATERIAL                                    

      110.  RESPONSIBILITY FOR SAFEGUARDING COMSEC MATERIAL.                   

           a.  Managers of FAA facilities and offices which use or
      handle COMSEC material are responsible for safeguarding and
      controlling all COMSEC material provided to or produced by their
      facility or office, and for establishing procedures which include
      the following:                                                           

                (1)  A Central Office of Record (COR).  For the FAA the
      U.S. Air Force Cryptologic Support Center, AFCSC/MMIC, San
      Antonio, Texas 78243-5000, is the Central Office of Record.              

                (2)  Establishment and Disestablishment of COMSEC
      Accounts.  Directive guidance for the establishment and
      disestablishment of FAA COMSEC accounts is contained in AFKAG-2
      and this order.                                                          

           b.  COMSEC Custodian.  The COMSEC Custodian is the properly
      appointed individual who manages and controls the accountable
      COMSEC material in the CMCS charged to his/her activity.  The
      custodian's responsibilities include:                                    

                (1)  Receiving, storing, amending, accounting for
      inventorying, and issuing COMSEC material charged to his/her
      account and destroying or transferring of material when it is no
      longer required.                                                         

                (2)  Ensuring that appropriate COMSEC material is
      readily available to properly authorized individuals whose duties
      require its use.                                                         

                (3)  Advising user and supervisors, as appropriate, of
      the required protection and procedures which must be provided
      COMSEC material issued to them for use, including the authorized
      procedures for destruction or disposition of such material when
      it is no longer required.
                (4)  Reporting insecurities in accordance with AFKAG-2
      and NTISSI 4003, COMSEC insecurities fall into three categories,
      cryptographic, personnel and physical.  Specific examples of each
      type are provided in NTISSI 4003, Reporting COMSEC Insecurities.         

           c.  Individual Users.  Individuals involved in the use of
      COMSEC material are personally responsible for:                          

                (1)  Safeguarding and proper employment of all material
      he or she uses or for which he or she is responsible.                    

                (2)  Reporting to proper authorities any occurrences,
      circumstances, or acts which could jeopardize the security of
      COMSEC material.                                                         

      111.  TRANSPORT OF COMSEC MATERIAL.                                      

           a.  Department of Defense Courier Service, State Department
      Diplomatic Courier Service, or departmental couriers are the
      preferred means of transporting COMSEC material.                         

           b.  Use of commercial passenger aircraft for the
      transportation of current or superseded keying material is
      normally prohibited.                                                     

           c.  FAA employees are not authorized to transport current or
      superseded key material for any reason without specific prior
      approval of the servicing security element in regions and
      centers, and ACO-300 in Washington Headquarters.  In addition,
      the employee must have a valid courier letter in accordance with
      the provisions of Order 1600.2C.  The courier letter must be
      signed by the employee's facility or office manager.  Before
      signing the letter it is the manager's responsibility to ensure
      that the employee has received a briefing on his or her
      responsibilities as a courier as required by Order 1600.2C.              

      112.  COURIER RESPONSIBILITIES.                                          

           a.  Couriers are responsible for ensuring the integrity of
      COMSEC material in their custody at all times.  Couriers will
      retain their letter of authorization in their possession at all
      times while actually transporting key materials.                         

           b.  Couriers transporting material into foreign countries
      must ensure that material is not subject to inspection by
      unauthorized personnel.  In no case will U.S. COMSEC material be
      permitted to enter foreign distribution channels unless it has
      been authorized for release by the proper U.S. authorities.              

           c.  In cases where the bulk of the material to be
      transported, or the physical configuration of the conveyance will
      not allow for the courier to keep the material on his person or
      in view at all times, arrangements should be made with the
      carrier to effect a "last-in-first-out" procedure that will
      ensure the material is given the most protection possible, and
      not left unattended at loading docks, cargo storage areas,
      baggage areas, railways platforms, etc.                                  

      113.  OPEN DISPLAY OF COMSEC MATERIAL AND INFORMATION.  The open
      or public display of U.S. Government or foreign COMSEC material
      and information at nongovernmental symposia, meetings, open
      houses, or for other nonofficial purposes is forbidden.  This
      prohibition includes discussion, publications, or presentation of
      COMSEC information for other than official purposes.  Any
      requests for the public or nonofficial display or publications of
      COMSEC information, including Freedom of Information Act
      requests, will be referred through ACS-300 to the Director,
      National Security Agency.                                                

      114.  DESTRUCTION.  Appendix 8 Routine Distribution and Emergency
      Protection of COMSEC Material, contains criteria and procedures
      for secure destruction of COMSEC material.  FAA COMSEC custodians
      will ensure that destruction requirements set forth in this order
      and AFKAG-2 are followed.                                                

      115.  REPORTING INSECURITIES.                                            

           a.  General.  Requirements for reporting COMSEC insecurities
      are specified in NTISSI 4003.  The USAF implementing regulation
      for NTISSI 4003 is AFR 56-12.                                            

           b.  Requirements.                                                   

                (1)  Insecurities associated with FAA COMSEC activities
      will be reported in accordance with NTISSI 4003 or AFR 56-12.
      Information copies of reports of COMSEC insecurities will be
      provided through COMSEC channels to the servicing security
      element and to ACS-300.                                                  

                (2)  The servicing security element will conduct an
      investigation of reported insecurities and submit four copies of
      FAA Form 1600-32 (Report of Investigation) to the Manager,
      Investigations and Security Division, ATTN:  ACO-300.                    

           c.  Classification of Insecurity Reports.  Reports of COMSEC
      insecurities and associated investigative reports shall be
      classified according to content in accordance with provisions of
      NTISSI 4002 and NTISSI 4003.  If there is doubt about the correct
      classification assistance should be requested from the servicing
      security element or ACO-300.  If there is doubt as to whether a
      report should be classified or unclassified, handle and safeguard
      it as classified until a final determination is made in
      accordance with provisions of chapter 4 in Order 1600.2C.                

      116.  EVIDENCE OF TAMPERING.  All instances where COMSEC material
      displays evidence of tampering shall be promptly reported to
      Director, National Security Agency, ATTN:  S-213, in accordance
      with provisions of NTISSI 4003 and AFR 56-12.  Information copies
      of the report shall be provided to the servicing security element
      and ACO-300.                                                             

      117.  ALTERATION OF COMSEC MATERIAL.  No modifications or changes
      in classification or markings or alterations of any kind shall be
      made to COMSEC material without prior approval of the NSA.
      Requests of this nature from FAA COMSEC activities will be
      submitted through COMSEC channels to AFCSC, ATTN:  AFCSC/MMI,
      with information copies to the servicing security element and
      ACS-300.  AFCSC will coordinate with the NSA as required.                

      118.  CLEARANCE REQUIREMENTS FOR GUARDS.  Those guards whose
      duties include responsibility for access and protection of
      classified COMSEC material will be appropriately cleared.  Those
      guards whose duties are primarily area control (gate guards,
      building security) need not be cleared when they are used to
      supplement other security measures and will not normally have
      access to classified information.  All guards must be responsible
      and trustworthy personnel and instructed concerning their
      responsibilities.  Foreign guards may be used for control only.
      Questions concerning clearance requirements for FAA guard
      personnel should be coordinated with the appropriate servicing
      security element.                                                        

      119.  STORAGE REQUIREMENTS.                                              

           a.  General.  Storage means the use of security containers,
      vaults, alarms, guards, etc., to protect COMSEC information
      during nonworking hours or when it is not under the direct and
      continuous control of properly cleared and authorized personnel.
      FAA managers and custodians responsible for COMSEC operations
      will ensure that the requirements of this paragraph as well as
      the more detailed standards and criteria in appendix 11 of this
      order are complied with.  Servicing security elements will assist
      COMSEC custodians in implementing these requirements.                    

           b.  Storage Requirements.  For each vault or container used
      to store classified COMSEC material:                                     

                (1)  Designate the level of classified material
      authorized for storage therein but do not show this designation
      externally.                                                              

                (2)  Assign a number or symbol for identification
      purposes.  Place the number or symbol in a conspicuous location
      on the outside of the vault or container.                                

                (3)  Prepare a General Services Administration/
      Information Security Oversight Office (GSA/ISOO) Form SF-700
      (Security Container Information Form) for each security container
      and vault door.  On this form identify the names, addresses and
      home telephone numbers of persons to be notified if the container
      is found insecure.  Post part 1 of the SF-700 conspicuously on
      the inside of the locking drawer of each security container, and
      on the inside of each vault door.  Refer to chapter 8 in Order
      1600.2C.  Even though more than four persons may know the
      combination, only those persons to be notified need be listed on
      part 1.  For ordering purposes the NSN for the GSA/ISOO SF-700
      form is 7540-01-214-5372.                                                

                (4)  Security containers or vaults used to store COMSEC
      information shall be located in areas not accessible to general
      traffic, which are locked or otherwise protected during
      nonworking hours.                                                        

                (5)  Security containers or vaults used to store keying
      material of any classification must never have been drilled to
      gain access unless the drilled parts are replaced with new or
      repaired combination locks or drawer heads.  This also applies to
      SECRET and TOP SECRET COMSEC material other than keying material.
      When containers have been drilled to gain access and have been
      repaired and inspected to ensure acceptable safeguarding
      capabilities/(reference chapter 8 in Order 1600.2C), they may be
      used to store COMSEC material including International Pact
      Organization (IPO) other than keying material, classified no
      higher than CONFIDENTIAL.                                                

      120.  OTHER COMSEC INFORMATION.                                          

           a.  General.  Classified COMSEC information not specifically
      covered by this order shall be safeguarded in accordance with
      requirements of Order 1600.2C, National Security Information.            

           b.  Requirement.  FAA COMSEC accounts will receive
      classified documents such as NACSIS, NTISSIs, AFRs, etc., that
      are not controlled within the CMCS.  Documents of this type are
      referred to as "collateral classified" and will not have a
      register number and will not be listed on inventories provided by
      AFCSC.  Because these documents are distributed through COMSEC
      channels they will normally be delivered directly to the
      custodian and will not be placed under control at the facility
      security control point (SCP).  It is the custodian's
      responsibility to ensure that documents of this type are placed
      under control in accordance with provisions of Order 1600.2C.
      Normally, this means returning documents classified SECRET or
      higher, to the facility/activity SCP, having them logged in, and
      then signed back to the COMSEC custodian.  Reference chapter 7,
      in Order 1600.2C.                                                        

           c.  Location of SCP.  The security control point (SCP)
      function for a facility/activity should not be collocated with
      the COMSEC secure telecommunications facility, in order to ensure
      separation between the document control functions of the SCP and
      the CMCS responsibilities of the custodian and alternate.                

      121.  DISPOSITION OF COMSEC MATERIAL.                                    

           a.  General.  After COMSEC material has been issued to an
      account or user it cannot be transferred or destroyed without
      specific prior approval.  The term "disposition" as used in this
      paragraph means the transfer (return to AFCSC or transfer to
      another FAA account or to an account of another department or
      agency) or destruction of COMSEC material.  Refer to AFKAG-2,
      chapters 5 and 6.                                                        

           b.  Requirements.  When material on hand excess to
      requirements is to be returned to AFCSC or is to be shipped to
      another account to meet operational requirements, specific
      disposition instructions must be furnished as follows:                   

                (1)  ACO-300 is the approval authority to transfer to
      another FAA account.                                                     

                (2)  AFCSC gives authority:                                    

                     (a)  To transfer to an account of another
      department or agency or return to account 616600.                        

                     (b)  For destruction.                                     

           c.  Request.  Requests for disposition instructions will be
      routed through the servicing security element with an information
      copy to ACS-300.                                                         

           d.  Exception.  The above rules do not apply to
      crypto-equipment.  AFCSC gives advance approval for all movement
      of crypto-equipment (AFKAG-2).  To meet contingencies and
      emergencies, ACO-300 in coordination with ANC-120 may approve the
      relocation of FAA assets and then notify AFCSC.                          

      122.  PAGE CHECKS OF COMSEC PUBLICATIONS.                                

           a.  General.  The integrity of COMSEC material must be
      ensured so that all material produced must be accounted for and
      maintained at the lowest possible exposure rate.  Although in
      most cases FAA COMSEC custodians have free access to the secure
      telecommunications facility (TCF) they support, keying material
      issued to the secure TCF is considered to be outside the COMSEC
      material control environment because of the exposure factor.
      When material is issued by the custodian, the receiver, whether
      the actual user or an intermediary, is considered to be a user.
      A local courier is not considered to be a user because, until
      material is sighted for by line item, the material is still
      accountable within the CMCS.                                             

           b.  Requirements.  A page check of all classified COMSEC
      publications is mandatory on certain occasions, both to satisfy
      security requirements and to ensure usability.  Page checks are
      to be made by first consulting the list of effective pages on the
      cover of the document and ensuring that each page is exactly as
      described.  The page check is recorded on the record of page
      checks page; or, if the publication has no record of page checks
      page, record the page check on the record of amendments page or
      on the front cover.  The date checked, signature, and
      organizational identification of the person making the check are
      required.  Page checks will be made:                                     

                (1)  On receipt of classified COMSEC material from any
      source.                                                                  

                (2)  During change of custodian.                               

                (3)  When entering an amendment or changes which adds,
      deletes, or replaces pages or affects page numbers (COMSEC Users
      Guide - AFR 56-10).                                                      

                (4)  At least annually.                                        

                (5)  Before destruction.  The page check conducted
      before a document is destroyed does not have to be recorded.
      Sealed keying material, whether sealed with the original
      production wrapping or sealed by the custodian according to Annex
      B, paragraph IIE3b, NACSI 4005/AFR 56-13, does not require page
      check before destruction.                                                

           c.  Exceptions to Page Check Requirements.  The following
      are exceptions to page check requirements listed in paragraph
      122b:                                                                    

                (1)  Check one-time pads that are sealed on the edges
      as individual pages are used.  No separate record of page check
      is required.  A page check of one-time pads that are not sealed
      on the edges is required only on issue to a user.                        

                (2)  Keycards and keylists enclosed in protective or
      restrictive wrappers should be retained within these wrappers for
      as long as possible.                                                     

                (3)  One-time tape does not require a segment check.           

           d.  Additional page checks.  FAA custodians are authorized
      to conduct additional page checks as needed.                             

      123.  DAILY OR SHIFT INVENTORY REQUIREMENTS.  A daily or shift
      inventory is required for:                                               

           a.  Legend 1 COMSEC material.  Equipments are identified by
      the suffix CA to the national stock number (NSN).                        

           b.  Legend 1 International Pact Organization COMSEC
      material; that is North Atlantic Treaty Organization.
           c.  Legend 2 COMSEC material.  Equipments are identified by
      the suffix CS to the NSN.                                                

           d.  Legend 3 COMSEC material.  Material whose accountability
      has been dropped between AFCSC and the FAA COMSEC account.               

           e.  Legend 5 COMSEC material.  Material which has not been
      placed into effect (reserve or contingency material).                    

      124.  COMSEC ACCOUNT RECORD FILE.  Each FAA COMSEC account shall
      maintain an account record file consisting of six folders as
      required by AFKAG-2.  A description of these files follows:              

           a.  Folder 1.  Accounting reports and an AFCOMSEC Form 14:          

                (1)  File authenticated copies of all accounting
      reports in numerical sequence by the account's voucher number.           

                (2)  Maintain an AFCOMSEC Form 14 in the front of the
      folder.                                                                  

                (3)  Classify this folder a minimum of CONFIDENTIAL.           

           b.  Folder 2.  AFCOMSEC Form 3.  This folder contains the
      current records appointing and rescinding the COMSEC custodian
      and alternate custodians for the COMSEC account.  AFCOMSEC form 9
      also shall be retained in this folder.                                   

           c.  Folder 3.  General accounting correspondence.  File
      copies of correspondence about COMSEC distribution and accounting
      (such as disposition instructions, procedure changes, and tracer
      actions).  Classify this folder equal to the highest
      classification of the correspondence therein.                            

           d.  Folder 4.  Mail and courier package receipts.  File
      package receipts for classified COMSEC material transmitted or
      received through Armed Forces Courier Service, other officially
      designated couriers, or the U.S. Postal Service.                         

           e.  Folder 5.  Hand receipts.  File signed copies of hand
      receipts for COMSEC material issued to users.  Destroy the
      receipt according to the instructions in AFKAG-2.                        

           f.  Folder 6.  Local destruction reports.  Keep reports as
      instructed in Situation E4, AFKAG-2.                                     

      125.-129.  RESERVED.                                                     

                        FOR OFFICIAL USE ONLY
                      PUBLIC AVAILABILITY TO BE
                    DETERMINED UNDER 5 U.S.C. 552


              CHAPTER 6. CONTROLLED CRYPTOGRAPHIC ITEMS (CCI)                 

      130.  PURPOSE AND BACKGROUND.                                            

           a.  The Controlled Cryptographic Item (CCI) category applies
      to specified, unclassified, secure telecommunications and
      information handling equipments and associated cryptographic
      components.  The intent is to promote the broad use of secure
      telecommunications and information handling equipments for the
      protection of national security (classified), and other sensitive
      information which should be protected in the national interest.          

           b.  Secure telecommunications and information and handling
      equipments and associated cryptographic components which are
      designated "Controlled Cryptographic Item" or "CCI" use a
      classified cryptographic logic; it is only the hardware or
      firmware embodiment of that logic which is unclassified.  The
      associated cryptographic drawings, logic descriptions, theory of
      operation, computer programs, and related cryptographic
      information remains classified.                                          

           c.  Procedures for controlling CCI secure telecommunications
      and information handling equipments and associated cryptographic
      components are required to guard against preventable losses to an
      actual or potential enemy.                                               

                (1)  In keeping with the spirit of expanded use of
      these equipments, minor lapses in carrying out control procedures
      shall be referred to the responsible manager as a matter of
      administrative discretion.  FAA employees can be held liable for
      the loss, damage, or destruction of Government property caused by
      their negligence, willful misconduct, or deliberate unauthorized
      use.                                                                     

                (2)  More serious infractions of CCI control procedures
      may constitute sabotage, loss through gross negligence, theft, or
      espionage that would be punishable under various sections of the
      United States Code or the Uniform Code of Military Justice.              

      131.  DEFINITIONS.                                                       

           a.  Controlled Cryptographic Item (CCI).  A secure
      telecommunications or information handling equipment, or
      associated cryptographic components, which is unclassified but
      controlled.  Equipments and components so designated shall bear
      the designator "Controlled Cryptographic Item" or "CCI".                 

           b.  Secure Telecommunications and Information Handling
      Equipment.  Equipment designed to secure telecommunications and
      information handling media converting information to a form
      unintelligible to an unauthorized intercepter and by reconverting
      the information to its original form for authorized recipients.
      Such equipment, employing a classified cryptographic logic, may
      be stand-alone-crypto-equipment, as well as telecommunications
      and information handling equipment with integrated or embedded
      cryptography.                                                            

           c.  Crytopgraphic Component.  The hardware or firmware
      embodiment of the cryptographic logic in a secure
      telecommunications or information handling equipment.  A
      cryptographic component may be a modular assembly, a printed
      circuit board, a microcircuit, or a combination of these items.
           d.  Access.  The ability or opportunity to obtain, modify,
      or use.  External viewing of a CCI does not constitute access.           

      132.  CONTROL REQUIREMENTS.  The following subparagraphs set
      forth the minimum requirements for controlling unkeyed CCI
      equipments and components utilized by the FAA.  Where such
      equipments and components contain classified key they shall be
      protected in accordance with the requirements of Chapter 5 of
      this Order.  Also, depending upon the application, other more
      stringent requirements may be prescribed.                                

           a.  Access.  A security clearance is not required for access
      to unkeyed CCI equipments and components.  However, access shall
      normally be restricted to U.S. citizens whose duties require such
      access.  Access may be granted to permanently admitted resident
      aliens who are U.S. Government civilian employees or active duty
      or reserve members of the U.S. Armed Forces whose duties require
      such access.  ACO-300 may grant waivers to permit non-U.S.
      citizens unescorted access to installed CCIs, regardless of the
      release status of the CCI, under conditions listed below:                

      NOTE:  The approval of the National Managers must be obtained by
      ACO-300 through AFCSC/SRMP before allowing such access by non-
      U.S. citizens in Communist block or other countries listed in the
      Attorney General Criteria Country List.  Such requests shall be
      routed through the servicing security element to ACO-300 together
      with complete justification and explanation of operational need.         

                (1)  Unkeyed CCI's:                                            

                     (a)  Such access is in conjunction with building
      maintenance, custodial duties, or other operational
      responsibilities normally performed by such personnel unescorted
      in the area now containing the CCIs before their installation;
      and                                                                      

                     (b)  The CCI is installed within a facility which
      is a U.S.-controlled facility or a combined facility with a
      permanent U.S. presence, as opposed to a host nation facility,
      even through the primary staffing is by host nation personnel;
      and                                                                      

                     (c)  The servicing security element has determined
      that the risk of tampering with the CCI which could result in
      compromise of U.S. information, classified or unclassified but
      sensitive, is acceptable in light of the local threat and
      vulnerability and the sensitivity of the information being
      protected and indicated by its classification, special security
      controls, and intelligence life; and                                     

                     (d)  Such access is not prohibited by Department
      of State policies and procedures applicable to FAA operation in a
      given geographic area.                                                   

                     (e)  The system doctrine for the CCI does not
      specifically prohibit such access.                                       

                (2)  Keyed CCI's.  In addition to all of the
      requirements for unkeyed CCIs, the following apply for unescorted
      access or use by foreign personnel:                                      

                     (a)  The foreign personnel are civilian employees
      of the U.S. Government or assigned to a combined facility; and
                     (b)  The CCI remains U.S. property, a U.S. citizen
      is responsible for it, and the presence of such installed CCIs is
      verified at least monthly; and                                           

                     (c)  The communications to be protected are
      determined to be essential to the support of FAA or combined
      operations; and                                                          

                     (d)  FAA and other U.S. users communicating with
      such terminals are made aware of the non-U.S. citizen status of
      the CCI user; and                                                        

                     (e)  Only U.S. personnel with classified U.S. keys
      may key CCI's.  Authorized foreign personnel may key CCIs with
      allied keys or unclassified keys.                                        

                (3)  Special Security Requirements.  If a CCI is to be
      installed and operated in a foreign country at a facility which
      is either unmanned or manned entirely by non-U.S. citizens,
      additional special security measures, such as vault areas,
      locking bars, safes, alarms, etc., are required.  Should an
      installation of this nature be required to support FAA operations
      it must be approved in advance by ACO-300 after coordination with
      AFCSC/SRM on a case-by-case basis.                                       

                (4)  Moving CCI's.  CCI's will not normally be moved
      from an environment where the tampering risk presented by non-
      U.S. citizen access is acceptable to a more sensitive environment
      where the risk is not acceptable.  If such action is an
      operational necessity, it must receive the prior approval of the
      FAA servicing security element and in overseas areas the
      cognizant representative of the Department of State for the
      particular geographic area.  All such CCI's must be examined for
      signs of tampering by qualified COMSEC maintenance personnel.
      Any evidence of tampering shall be reported as a COMSEC incident
      and immediate action will be taken to remove the CCI from
      operational use pending notification from the Director, National
      Security Agency.                                                         

           b.  Courier.  Authorized FAA employees and contractor
      employees (U.S. citizens) may courier CCI equipment and
      components.  Requirements for courier authorization are specified
      in FAA Order 1600.2C, National Security Information.                     

                (1)  Authorized persons may transport CCI aboard both
      Government and commercial aircraft, either handcarried or as
      checked baggage.  If it is checked as hold baggage on commercial
      airliners, it must be packaged in a container which is sealed in
      a manner that will detect unauthorized access to the enclosed
      material, such as tamper-detections tape, wire seals, etc.               

                (2)  CCI can be subjected to X-ray inspections;
      however, if airport security personnel require physical
      inspection, the inspection must be limited to external viewing
      only.  To avoid unnecessary delays and searches by airport
      personnel, prior coordination with the servicing security element
      shall be accomplished to ensure that airport personnel are
      informed in a timely manner of the transfer of CCI material.             

           c.  Storage and Transportation.                                     

                (1)  General.  Store and transfer CCI equipment and
      components in a manner that affords protection at least equal to
      that which is normally provided to weapons, computers,
      electronics equipment, etc., and ensures that access and
      accounting integrity is maintained.                                      

                (2)  Storage.  Handle CCI's in connection with
      warehouse functions provided they are under direct supervision of
      an individual who meets the access requirements of this chapter.         

                (3)   Transportation.                                          

                     (a)  General.  Ship CCI equipments and components
      by a traceable means in accordance with the following:                   

                          1  Within CONUS:                                     

                             a  Commercial carrier providing DOD
      Constant Surveillance Service (CSS)  (NOTE:  Contact the
      Transportation Officer of the nearest Defense Contract
      Administration Service Management Area (DCASMA) office for
      information concerning the carriers servicing the specific
      geographic area.  CSS is not available overseas.                         

                             b  U.S. registered mail provided the mail
      does not at any time pass out of U.S. control.                           

                             c  Authorized FAA or contractor courier.
      For contractor couriers, the authorization to act as a courier or
      escort for CCI equipment and components may be granted by the
      servicing FAA security element in accordance with FAA Order
      1600.2C.                                                                 

                             d  Diplomatic courier service.
                          2   Outside CONUS:  In foreign countries
      where there are two or more FAA facilities where FAA personnel
      are stationed, foreign nationals who are employed by the FAA may
      transport CCI's provided:                                                

                             a  There is a signature record that
      provides continuous accountability for custody of the shipment
      from pickup to ultimate destination, and                                 

                             b  There is a constant U.S. presence (for
      example, a U.S. person accompanies a foreign driver in couriering
      the material), or                                                        

                             c  The material is contained in a closed
      vehicle or shipping container which is locked and has a shipping
      seal that will prevent undetected access to the enclosed
      material.                                                                

           d.  Accounting.                                                     

                (1)  Within the FAA, CCI equipments shall be delivered
      to a primary FAA COMSEC account.                                         

                (2)  The COMSEC Custodian shall initially receipt for
      the CCI equipment, and will be responsible for ensuring that
      before further distribution is made the individual CCI items are
      entered into the Property Management System for the using
      facility, Region, or Center as appropriate.                              

      NOTE:  The custodian should coordinate with the responsible
      property management officer to ensure that the requirements of
      this order are met.                                                      

                (3)  CCI equipments shall be accounted for by serial
      number.  CCI components, installed in this equipment, do not
      require separate accountability.  Spares or other uninstalled CCI
      components shall be accounted for by quantity.                           

                (4)  The accounting system must provide the following:         

                     (a)  Establish a central point designated by the
      Property Management Officer for the using facility, region or
      center for control of CCI equipments.                                    

                     (b)  The identification of CCI equipment and
      components which are lost.                                               

                     (c)  Individual accountability in order to support
      prosecution in cases which involve infractions that would be
      punishable under the United States Code or the Uniform Code of
      Military Justice.                                                        

                (5)  The manager having property management
      responsibility for the using facility region or center shall
      ensure that procedures are followed to permit entering CCI
      equipment into the Property Management System data base in such a
      way that equipments can be accurately inventoried when necessary.        

      133.  INVENTORIES.                                                       

           a.  CCI equipments shall be inventoried at least annually.
      This includes uninstalled CCI equipments.  An inventory should
      also be accomplished whenever there is a change of personnel
      responsible for the safekeeping or accounting of an
      organization's holdings of CCI equipments and components.
      Reports of inventory shall be submitted to the central control
      point established for control of CCI equipments.  Inventory
      records shall be maintained current for as long as the using
      facility, region or center maintains CCI assets.                         

           b.  Inability to reconcile an organization's holdings of CCI
      equipments and components with the record of accountability at
      the established central control point shall be reported as an
      insecurity in accordance with this order and AFR 56-12.                  

      134.  REPORTING INSECURITIES.                                            

           a.  Users of CCI must be familiar with the criteria that
      constitutes an insecurity as specified in AFR 56-12.                     

           b.  All insecurities involving CCI equipments or components
      shall be reported through COMSEC channels in accordance with the
      following:                                                               

                (1)  Keyed equipment.  Report insecurities involving
      keying material according to AFR 56-12.                                  

                (2)  Unkeyed equipment.  Insecurities involving unkeyed
      CCI equipments shall be reported in accordance with AFR 56-12 and
      applicable FAA property management directives concerning the
      responsibilities for safeguarding and protection of high value
      U.S. Government property.                                                

      135.  ROUTINE AND EMERGENCY DESTRUCTION.                                 

           a.  The routine and emergency destruction procedures of AFR
      56-5 apply to CCI equipments and components.                             

           b.  Routine destruction of CCI equipment and components by
      FAA users is not authorized.  Equipment that is inoperative or no
      longer required shall be reported to the FAA servicing security
      element with a request for disposition instructions.  The
      servicing security element will be responsible for coordinating
      all such requests with ACO-300 prior to any disposition of the
      equipment.                                                               

      136-144.  RESERVED.                                                      

                          FOR OFFICIAL USE ONLY
                        PUBLIC AVAILABILITY TO BE
                      DETERMINED UNDER 5 U.S.C. 552

                          CHAPTER 7. SECURE VOICE                             

                             SECTION 1.  GENERAL                               

      145.  PURPOSE.  This chapter provides guidelines for use by the
      COMSEC custodian when dealing with the third generation or "user
      friendly" Secure Telephone Units; i.e., STU-III's, that are used
      to transmit classified information.                                      

      146.  TYPES AND MODELS OF STU-III.                                       

           a.  Type I.  These terminals are Controlled Cryptographic
      Items (CCI).  Type I STU-III terminals may be used to secure
      classified information, or unclassified but sensitive, voice or
      data communications when keyed with an appropriate level of
      keying material.  STU-III terminals are considered keyed when
      keying material has been loaded and an authorized Crypto Ignition
      Key (CIK) is inserted.  When keyed, Type I STU-III terminals must
      be safeguarded to the same classification level that the keying
      material being used is authorized to protect.  When the terminals
      are unkeyed, they are considered as high value property and are
      to be protected as CCI in accordance with provisions of NTISSI
      4001, Controlled Cryptographic Items, NTISSI 3013, Operational
      Security Doctrine for the secure Telephone Unit III (STU-III)
      Type 1 Terminal, AFSAL 4001A, Air Force COMSEC Publication
      Controlled Cryptographic Items and this order.                           

           b.  Type II.  Type II terminals may only be used with
      unclassified keying material.  Use of these terminals is not
      addressed in this chapter.                                               

      147.  DEFINITIONS.                                                       

           a.  Authentication Information.  Information which
      identifies a STU-III terminal.  Authentication information is
      specified for each STU-III key ordered and is included as a part
      of the key.  Each terminal's authentication information is
      displayed on the distant terminal during a secure call.
      Authentication information includes:                                     

                (1)  Classification level - the highest classification
      level authorized for an individual STU-III terminal.  During a
      secure call, the clearance level displayed on each terminal is
      the highest level common to both terminals, and is the authorized
      level for the call.                                                      

                (2)  Identification of the using organization (e.g.,
      FAA HQ, Wash. DC).                                                       

                (3)  Expiration date of the terminal's key.                    

                (4)  Foreign access to the terminal, where appropriate
      (e.g. CAN, US/KOR, US/NATO).                                             

           b.  Authorized Person.  A person who meets the access
      requirements of NTISSI/AFSAL No. 4001, Controlled Cryptographic
      Items, (AFR 56-20 when published), and this directive, and who
      has adequate clearance if classified material is involved.               

           c.  Crypto-Ignition Key (CIK).  A key storage device (KSD)
      which contains a portion of STU-III key(s) in encrypted form.
      Insertion of the CIK into the terminal(s) for which it was
      created allows the terminal(s) to be used in the secure mode;
      withdrawal disables the secure mode.                                     

           d.  CIK Information.  Split portions of an encrypted STU-III
      key, a part of which resides in the CIK, the other in the
      terminal.                                                                

           e.  Interoperable CIK.  A single CIK which may be programmed
      to work in more than one terminal.                                       

           f.  Key.  Information (usually a sequence of random binary
      digits) used to initially set up and to periodically change the
      operations performed in a crypto-equipment for purposes of
      encrypting or decrypting electronic signals; for determining
      electronic counter countermeasures (ECCM) patterns (e.g., for
      frequency hopping or spread spectrum); or for producing other
      keys.                                                                    

      NOTE:  Key replaces the terms "variable," "key(ing) variable,"
      and "cryptovariable".                                                    

           g.  Keyed Terminal.  A terminal which has been keyed, in
      which the CIK is inserted.                                               

           h.  Key Encryption Key (KEK).  A key that is used in the
      encryption and/or decryption of other keys for transmission
      (rekeying) or storage.                                                   

           i.  Key Storage Device (KSO).  The name given to the
      physical device that can be used as a fill device and also as a
      CIK for all Type 1 terminals.  It is a small device shaped like a
      physical key and contains passive memory.  When it is used to
      carry key to Type 1 terminals it is termed a fill device; when it
      is used to protect key that has been loaded into Type 1
      terminals, it is termed a CIK.                                           

           j.  Master CIK.  A CIK which may be used to create
      additional CIKs for a terminal as they are required, up to the
      terminal's maximum.                                                      

           k.  Micro-KMODC.  An MS-DOS compatible personal computer
      with a custom hardware/software configuration which, when
      connected to a Type 1 terminal, may be used to electronically
      order and receive STU-III keys.                                          

           1.  Unkeyed Terminal.  A terminal which contains no keys or
      one which has been keyed but from which the CIK has been removed
      and properly secured.                                                    

           m.  User Representative.  A person formally designated to
      order keys for STU-III terminals.                                        

           n.  U.S. Controlled Space.  An area, access to which is
      physically controlled by authorized U.S. Government personnel.           

      148.-150.  RESERVED.                                                     

                           SECTION 2.  EXCEPTIONS                              

      151.  REQUESTS FOR EXCEPTION.  Requests for exception to any of
      the provisions of this chapter must be submitted prior to
      implementation to the Emergency Operations Staff, ADA-20, who is
      Controlling Authority for the FAA STU-III Program.                       

      152.-153.  RESERVED.                                                     

          SECTION 3.  COMSEC CUSTODIAN DUTIES AND RESPONSIBILITIES             

      154.  GENERAL.  The COMSEC Custodian handling STU-III key
      performs those responsibilities normally associated with handling
      and controlling other COMSEC material as specified in this order.
      The COMSEC Custodian is responsible for initial receipt of key,
      for storage until issued to a user, and for all accounting until
      the key is "destroyed."  Although the COMSEC Custodian may be
      the person who actually keys terminals and creates the associated
      CIK's, he or she may instead issue the key to authorized users,
      who load the key and create CIK's.  COMSEC Custodians are also
      responsible for the preparation of a number of control and
      accountability reports.                                                  

      155.  RECEIPT OF KEY.  The COMSEC Custodian will receive the key
      from the Key Management System (KMS) in the form of a key storage
      device, KSD-64A, used as a fill device.  The following applies:          

           a.  Fill Device Labels.  Each fill device will have an
      attached card label.  The card label will be removed by the
      COMSEC Custodian when the key in the fill device is loaded into a
      terminal.  The fill device card label contains space for the
      COMSEC Custodian to write the serial number of the terminal, the
      name of the each user, and the serial number of each KSD-64A that
      is used as a CIK for the terminal.  It is important that a local
      record be maintained of the terminal serial number as it relates
      to the key material identification (KMID) number (or Registration
      Number) binding.                                                         

            b.  Fill Device Packaging.  Fill devices will be shipped
      from the KMS packaged in heat sealed plastic bags.  Packaged fill
      devices will be placed in boxes with shipping papers (SF-153
      COMSEC Material Report).  The boxes will be double wrapped in
      accordance with appropriate COMSEC standards.  A copy of the
      SF-153 COMSEC Material Report must be signed by the COMSEC
      Custodian and returned as the receipt for the key.                       

           c.  Incoming Inspection.  The procedures for incoming
      inspection are as follows:                                               

                (1)  Inspect the package.  If any tampering is evident,
      submit a COMSEC incident report.                                         

                (2)  Take inventory of the package contents against the
      shipping papers.                                                         

                (3)  If all is in order, fill in the appropriate
      blocks, sign the enclosed receipt and return it to the
      KMS/Central Accounting Office (CAO).                                     

                (4)  If all is not in order, call the KMS immediately,
      note the discrepancy on the SF-153, and send it to the KMS/CAO.          

           d.  Storage and Protection of Key.  Fill devices stored by a
      COMSEC Custodian prior to loading into a terminal should remain
      sealed in the plastic bag.  The storage of the fill devices must
      be in accordance with procedures prescribed by this order for the
      storage of classified COMSEC keying material.                            

      156.  ACCOUNTING FOR KEY.  The COMSEC Custodian plays a critical
      role in accounting for STU-III key.  The Custodian is supported
      by the STU-III CAO and the cognizant Central Office of Record
      (COR).                                                                   

           a.  STU-III Type I Key.  The STU-III Type I operational and
      Type I seed key is accounted for by registration number
      Accounting Legend Code 1 (ALC-1).  All test key is unclassified
      and assigned ALC-4 (i.e. after receipt at the user COMSEC
      account, they are locally accountable).                                  

      NOTE:  TOP SECRET Type I operational key requires two person
      integrity handling in accordance with National doctrine, unless a
      specific exemption has been granted by the controlling authority
      (ADA-20) with approval of the National Manager (NSA).                    

           b.  Reports.  In addition to complying with all cognizant
      COR rules and requirements, the COMSEC Custodian is responsible
      for submitting the following reports directly to the KMS/CAO:            

                (1)  Key Receipts.  An SF-153 COMSEC Material Report
      will be included in each key order shipped from the KMS.  The
      Custodian must verify that all listed devices were received and
      then fill in the appropriate blocks, sign the SF-153, and return
      the original to the KMS/CAO.                                             

                (2)  Transfer Reports.  The sending COMSEC Custodian
      must generate an SF-153 Transfer Report whenever STU-III key is
      shipped between COMSEC accounts.  A copy of the report must be
      sent to the KMS/CAO.  The receiving Custodian must receipt for
      the keys and send a copy of the receipt to the KMS/CAO.                  

      Only STU-III key should be listed on Transfer Reports sent to the
      KMS/CAO.  Transfer reports for other types of key and for COMSEC
      equipment should be sent to the appropriate COR (for FAA accounts
      the COR for COMSEC materials other than STU-III is normally the
      US Air Force Cryptologic Support Center (USAFCSC), Kelly Air
      Force Base, TX).                                                         

                (3)  Destruction Reports.  The COMSEC Custodian must
      generate and submit an SF-153 Destruction Report to the KMS/CAO
      when Type I operational key is loaded into a terminal or
      zeroized.  Destruction Reports generated for key loaded in a
      terminal will contain the signature of the Custodian or alternate
      and the serial number of the STU-III terminal in the Remarks
      Column (Block 13).  Destruction Reports for TOP SECRET Type I
      operational key require two signatures, that of the Custodian or
      alternate and a witness.  Destruction Reports for zeroized key
      require two signatures.  Do not mix STU-III key destruction
      reports with other key transactions.  Destruction Reports are not
      required for Type I seed key successfully loaded into a STU-III
      terminal since the electronic conversion call to the KMS results
      in the automatic generation of a Key Conversion Notice (KCN)
      which serves as the Destruction Report.  The KSD-64A should not
      be physically destroyed by breaking or smashing the device as
      this does not guarantee destruction of the key material in the
      device.  For approved destruction procedures refer to the current
      STU-III Key Management Plan and the servicing security element.          

                (4)  Possession Reports.  Possession Reports are used
      when a shipment of key material is received without any
      accompanying paperwork.  The receiving Custodian should generate
      an SF-153 Possession Report and submit it to the KMS/CAO and
      other locations as directed by his COR.  Do not mix STU-III key
      Possession Reports with other key Possession Reports.                    

      157.  NOTICES FROM THE KMS/CAO.                                          

           a.  Key Conversion Notices.  When Type 1 seed key is loaded
      into a terminal, the user must call the KMS to obtain (convert it
      to) the Type I operational key.  The KMS/CAO generates a Key
      Conversion Notice which is sent to the accountable COMSEC
      Custodian informing him or her of the KMID numbers of seed key
      converted to operational key.  This notice indicates the serial
      number of the terminal into which the seed was loaded, the KMID,
      and the date of conversion.  The Custodian should verify that
      this is the terminal in which the key was loaded in order to
      maintain accurate records.  Additionally, this notice must be
      used by the COMSEC Custodian to ensure that all seed keys listed
      have, in fact, been converted.  Any discrepancies must be
      immediately reported as a COMSEC incident.  Delay in reporting
      constitutes a reportable COMSEC incident.  The KCN also documents
      any Type 1 operational key that has been rekeyed before
      notification of a destruction is received at the KMS/CAO.                

           b.  Tracers.  When a key shipment has been sent via
      registered mail to a COMSEC account and the SF-153 key receipt is
      not returned to the KMS/CAO within 30 days, or when key is sent
      by DCS to a COMSEC account and the SF-153-30 key receipt is not
      returned within 45 days, the KMS/CAO will send a Tracer Report to
      the Custodian to determine if the key has been received.  If the
      Custodian has received the key, the key receipt should have the
      applicable blocks filled in and should be submitted to the
      KMS/CAO.  If the key has not been received, the Custodian should
      immediately contact the KMS/CAO for instructions.                        

      158.-160.  RESERVED.
                       SECTION 4.  KEYING OF TERMINALS                         

      161.  INITIAL KEYING OF TERMINALS.                                       

           a.  Procedures for the initial keying of terminals differ
      slightly depending on the type of key.  A separate procedure for
      each type of key (seed and operational) is described below.
      These procedures may vary if a master CIK is desired and may vary
      among terminal vendors.  For detailed information on the specific
      key loading procedures for terminals, see the vendor's key
      loading instructions.                                                    

           b.  CIK's are created for a terminal during the key loading
      procedure.  Therefore, the user organization must decide if a
      master CIK should be created to allow CIK's to be programmed at a
      later time, or decide the number of regular CIKs needed for each
      terminal prior to loading the key.  The STU-III permits creation
      of a master CIK, which allows additional CIKs to be created at a
      later time.                                                              

      162.-163.  RESERVED.                                                     

                         SECTION 5.  ACCOUNTABILITY                            

      164.  CRYPTO IGNITION KEY HANDLING AND LOCAL ACCOUNTING.  To
      operate in the secure mode, a CIK must be inserted into a
      terminal and turned.  This paragraph discusses the accountability
      requirements prescribed for CIK's in terms of guidance in the
      STU-III doctrine and factors that affect both the accounting
      procedures and the number of CIK's required for an organization.
      It is understood that each user organization will disseminate any
      detailed or clarifying doctrinal guidance.                               

           a.  Local Accountability Requirements.                              

                (1)  CIK's are locally accountable.  This means that a
      local record of the CIK's and the persons to whom CIK's for each
      terminal are issued should be maintained.  The COMSEC Custodian
      or an authorized user should record the serial number of the
      STU-III terminal, the KSD-64A serial numbers, and the name of
      each terminal user in the appropriate spaces on the back of the
      fill device card.  Each card is perforated so that it can be
      detached and retained by the Custodian or an authorized user in a
      3x5 card file.                                                           

                (2)  Taking a periodic inventory of the CIK's for each
      terminal is encouraged.                                                  

                (3)  When loss of a CIK is locally reported, the
      Custodian or the authorized user can disable use of that CIK on
      the appropriate terminal.                                                

                (4)  Local guidance to terminal users concerning CIK
      accountability should be formulated and distributed
      appropriately.                                                           

           b.  Crypto Ignition Key Management.  There are a number of
      factors that affect the management and control of CIK's to
      include those listed below.                                              

                (1)  Multiple Terminal Users.  Each user activity or
      office must determine how many people will be allowed to use a
      terminal, which method(s) of multiple use will be allowed, and
      how many CIK's are required.  The methods for supporting multiple
      users of a terminal are as follows:                                      

                     (a)  Shared CIK'S.  A single CIK can be shared
      among a number of users.  During normal duty hours, this CIK can
      be left in the terminal if the terminal is located in a secure
      area where no unauthorized person could gain access to the
      terminal.                                                                

                     (b)  Multiple CIK'S.  STU-III terminals will
      support up to eight CIK's for each key.  The identification
      information displayed during a secure call will be the same for
      each of the eight CIK'S, and any of the eight CIK's can be used
      to operate the terminal.  These CIK's can be issued to several
      users.                                                                   

                     (c)  Multiple Key Sets per Terminal.  STU-III
      vendors offer terminals which can be filled with more than one
      key at a time.                                                           

                (2)  Multiple Terminals per Crypto Ignition Key.
      STU-III vendors offer a feature which will allow a single CIK to
      be associated with more than one terminal (an "interoperable"
      CIK).  This feature requires a single CIK to be programmed by
      each terminal with which it is to be used.  The use of multiple
      terminals per CIK complicates local accountability and security
      procedures, but permits greater flexibility for the user.                

                (3)  Master Crypto Ignition Keys.  STU-III's contain a
      master CIK feature which allows additional CIK's to be created at
      a later date.  However, the total number of CIK's per key stored
      in a terminal may never exceed eight.                                    

      165.-166.  RESERVED.                                                     

                            SECTION 6.  REKEYING                               

      167.  ELECTRONIC REKEYING.  The STU-III KMS provides for
      electronic rekeying of Type I terminals through a rekey call to
      the KMS.  (The Type 2 terminals cannot be electronically
      rekeyed.)  During this process, the terminals identification
      information is not changed.  Only the terminal's cryptographic
      information is changed.  The KMS supports electronic rekey over
      the public telephone networks (1-800 service and regular
      commercial networks) and the DOD AUTOVON network.  The situations
      in which electronic rekeying is performed are:                           

           a.  Initial Keying.  When a terminal is physically keyed
      with Type 1 seed key, a call to obtain Type I operational key is
      necessary.  When a terminal is physically keyed with Type I
      operational key, a call to the KMS rekey number is strongly
      recommended to obtain a current copy of the Compromised Key List
      (CKL) and the Compromise Information Message (CIM).                      

           b.  Scheduled Rekeying.  The terminal user is required to
      call the KMS for an electronic rekey at least once each year.
      Some terminals display the key expiration date automatically each
      time the CIK is inserted.                                                

           c.  When Rekey Notification is Received from the KMS.  A
      universal rekey notification to call for a rekey will be
      promulgated by mail or AUTODIN to all COMSEC Custodians.  The
      COMSEC Custodians will be responsible for directing each of their
      terminal users to call for a rekey.  In addition, the STU-III KMS
      has the capability to use the CIM message to notify STU-III
      terminals via the terminal display to call for a rekey.  (In
      those circumstances where a terminal user cannot call for an
      electronic rekey when such a notice is received, the terminal
      will have to be physically rekeyed.)                                     

      NOTE:  Electronic rekeying is performed by placing a secure call
      to the KMS through toll-free 800 service, AUTOVON, or direct dial
      lines.  The rekey telephone numbers are listed in the STU-III
      User's Manual.                                                           

      168.-170.  RESERVED.                                                     

                        SECTION 7.  PHYSICAL SECURITY                          

      171.  UNKEYED TERMINAL - TYPE 1.  In the unkeyed mode, the
      terminal can be used to place only unsecured, unclassified calls
      which are not sensitive.  An unkeyed terminal must be protected
      in accordance with the requirements of NTISSI/AFSAL 4001, and
      chapter 6 of this order.                                                 

      172.  KEYED TERMINAL.  When the terminal is keyed, it may be used
      in the secure mode by authorized persons only.  The terminal must
      be afforded protection commensurate with the classification of
      the key it contains as required by NACSI 4005/AFR 56-13, and
      Chapter 5, of this order.  When persons in an area are not
      cleared to the level of the keyed terminal, it must be under the
      operational control and within view of at least one appropriately
      cleared, authorized person.
      173.  TERMINAL DISPLAY.  Proper use requires strict attention to
      the authentication information displayed on the terminal during
      each secure call.  When two terminals communicate in the secure
      mode, each terminal automatically displays authentication
      information of the distant terminal.  The information displayed
      indicates the system capacity, and does not authenticate the
      person using the terminal.  Therefore, users must use judgement
      in determining need-to-know when communicating sensitive but
      unclassified or classified information.  If the display fails the
      terminal must not be used in the secure mode.                            

           a.  Authentication.  Authentication information is
      representative of the distant terminal and should match the
      distant user.  If there is question as to the validity of this
      information, sensitive but unclassified and classified
      information should not be communicated, even though voice
      recognition may be possible.                                             

           b.  Display.  When the display indicates that the distant
      terminal's key has expired, this could be an indication of
      unauthorized system access.  If the period is excessive (e.g.
      more than two months), users should not exchange sensitive
      unclassified or classified information.                                  

           c.  Classification Level.  Users must adhere to the
      classification level indicated on the terminal display.  Because
      of the interoperability among terminals of different
      classification levels, the display may indicate a level less than
      the actual classification of either terminal's own key(s) (e.g.,
      when a SECRET terminal calls a CONFIDENTIAL terminal,
      "CONFIDENTIAL" is displayed on both terminals as the approved
      level for the call).  Therefore users must observe the display
      with each call and limit the level of information accordingly.           

           d.  System Testing.  During system testing, authentication
      information on the display may vary, as required for the test;
      however, the display will always indicate that the call is for
      TEST purposes only.  Classified information may not be
      transmitted during system tests.                                         

      174.  USE BY OTHER U.S. PERSONNEL.                                       

           a.  Keyed Type 1 terminals may be used by or under the
      direct supervision of authorized persons only.  When
      operationally required, authorized persons may permit others not
      normally authorized to use the keyed terminal (e.g., persons not
      assigned to the FAA office, service or facility identified in the
      display and persons whose clearance does not meet the level
      indicated on the display) under the following conditions:                

                (1)  The call must be placed by an authorized person.          

                (2)  After reaching the called party, the caller must
      identify the party on whose behalf the call is being made,
      indicating their level of clearance.  Again, the maximum
      classification level may not exceed that level which appears on
      the terminal display.                                                    

           b.  Uncleared or otherwise unauthorized persons must not be
      permitted to overhear classified conversations or to have access
      to classified or sensitive information transmitted over the
      terminal.                                                                

      175.  USE BY FOREIGN NATIONALS.  NTISSI 4001/AFR 56-20 and
      Chapter 6 of this order, limit access to CCI equipments to U.S.
      citizens and permanently admitted resident aliens who are
      employees of the U.S. Government.  For the FAA prior approval of
      the Manager, Emergency Operations Staff, ADA-20, is required for
      any exception to this policy.                                            

      176.  STORAGE.  Type 1 terminals must be stored as specified in
      NTISSI/AFSAL 4001, and Chapter 6, of this order.  Foreign
      nationals who are employed by the U.S. Government at locations
      described in paragraph 179 below, may handle Type 1 terminals in
      connection with warehouse functions, provided they are under the
      direct supervision of an individual who meets the access
      requirements of NTISSI/AFSAL 4001, and Chapter 6.                        

      177.  USE OF THE SECURE DATA MODE.  During data transmissions,
      each Type I terminal must be manned by authorized persons.  The
      data must be sent only after the sending and receiving parties
      have observed the terminal display and have assured themselves of
      the appropriateness of the information transfer (i.e., is the
      sending/receiving party's organization level in the terminal
      display?).  If the terminal is attached to a computer, computer
      security and system issues should be addressed separately with
      the servicing security element prior to start of operations.
      Additional assistance in the area of computer security is
      available if needed from ACO-340, Washington, D.C.  It is
      important that these issues be addressed because of the inherent
      interoperability of all STU-III terminals.                               

      178.  AFTER HOURS PROTECTION.  When authorized persons are not
      present, the CIK must be removed from the terminal and properly
      protected as specified in this chapter.  Area controls must be
      sufficient to ensure access and accounting integrity of the
      terminal.                                                                

                         SECTION 8.  TRANSPORTATION                            

      179.  TYPE I TERMINALS.                                                  

           a.  Type 1 terminals must be unkeyed during shipment.  In no
      instance may KSDs containing seed or operational KEK's or CIK's
      be included in the same container or shipment as Type 1
      terminals.                                                               

           b.  Type I terminals may be transported by any means that
      provides continuous accountability and protection against losses
      and unauthorized access while in transit.  These criteria are
      satisfied by any of the following:                                       

                (1)  FAA courier authorized in accordance with
      provisions of Order 1600.2C.                                             

                (2)  FAA authorized contractor/company, U.S. citizen
      courier.                                                                 

                (3)  U.S. Registered Mail provided it does not at any
      time pass out of U.S. control and does not pass through a foreign
      postal system or any foreign inspection.                                 

                (4)  Commercial carriers under constant surveillance
      service (CSS) in CONUS only.  FAA elements may obtain information
      concerning these services from the General Services
      Administration (GSA), ATTN:  Traffic and Travel Services.
                (5)  U.S. military or military-contractor air service
      (e.g., Military Airlift Command, LOGAIR, QUICKTRANS) provided the
      requirements for CSS are observed.                                       

                (6)  U.S. Diplomatic Courier Service (overseas service
      only).  FAA STU-III units intended for overseas installation in
      FAA facilities or office spaces will be transferred to the
      Department of State for transportation to the overseas location.
      All movements of this type will be coordinated through the
      Manager, Emergency Operations Staff, ADA-20, Washington, D.C.            

                (7)  Armed Forces/Defense Courier Service (ARFCOS)
      outside the 48 contiguous states when no other means of secure
      transportation is available.                                             

      180.-182.  RESERVED.                                                     

                          SECTION 9.  INSTALLATION                             

      183.  GENERAL.  Type 1 terminals may be installed in U.S.
      controlled spaces (including vehicles) and in residences of U.S.
      Government officials.  The fundamental purpose of the Type 1
      terminal is to provide a readily available, easy to use secure
      telephone capability for all personnel who have a need to discuss
      classified or sensitive information.                                     

           a.  Acoustic Security.  Local acoustic security is an
      important consideration.  The greatest security threat to
      telephone conversations is where they are most vulnerable to
      hostile intercept and exploitation -- during transmission over
      the telephone network.  Therefore, a common-sense approach should
      be followed on acoustic security for the Type 1 installation.            

           b.  Servicing Security Element.  Specific provisions for
      achieving acoustical security should be determined in
      coordination with the servicing security element for each FAA
      using organization prior to STU-III installation.  The manager or
      supervisor having responsibility for the STU-III terminal is
      responsible for ensuring that acoustical security measures are
      enforced to preclude unauthorized overhearing of classified or
      sensitive but unclassified telephonic discussions.                       

      184.  RESIDENCES.  Type 1 terminals installed in residences may
      be used only by the persons for whom they are installed.  All of
      the security requirements for preventing unauthorized access to
      classified and sensitive information, and to the keyed terminal
      must be observed.                                                        

           a.  The terminal must be located in an area of the home
      where family members or other unauthorized persons will not
      overhear or view classified or sensitive information.                    

           b.  The CIK must be removed from the terminal following each
      use and kept in the personal possession of the user, or properly
      stored.                                                                  

           c.  If the CIK is stored in the residence and the associated
      terminal is used to protect classified information, the CIK must
      be protected in a GSA-approved security container.                       

           d.  When the terminal is used in the data mode, classified
      information that is viewed on the screen should be removed as
      soon as possible, and should not be printed out unless there is
      appropriate classified storage.                                          

           e.  Installation of STU-III equipments in residences will
      require the prior approval of the servicing security element and
      the responsible COMSEC custodian.                                        

      185.-186.  RESERVED.                                                     

                          SECTION 10.  MAINTENANCE                             

      187.  GENERAL.  NTISSI/AFSAL 4001 contains the training
      requirements which apply to all persons who maintain COMSEC
      equipment, to include the Type 1 terminal.  Authorized
      maintenance personnel need not be cleared unless they require
      access to classified COMSEC information to perform terminal
      maintenance.                                                             

      188.  ACCESS.  Maintenance personnel may not have access to a
      terminal which has been keyed for normal operations.  Therefore,
      any terminal which will be removed or disassembled for repair
      should first be zeroized.  However, if terminal malfunction
      prevents zeroization, the terminal may be returned, minus the
      CIK, which must be retained in appropriate storage by authorized
      persons.  When an FAA terminal is removed from an operational
      area by maintenance personnel the associated KEK's will be
      zeroized.                                                                

      189.-190.  RESERVED.                                                     

               SECTION 11.  PROTECTION OF KEY STORAGE DEVICES                  

      191.  GENERAL.  When they contain KEK's or CIK information, KSD's
      must be protected against unauthorized access.  When they contain
      none of the above information, KSDs require no special handling
      or protection, and their loss is not a reportable insecurity.            

      192.  FILL DEVICES.  Fill devices containing KEK's must be
      safeguarded in accordance with Annex B of NACSI 4005/AFR 56-13,
      and Chapter 5 of this order.                                             

           a.  Access.  An appropriate clearance is required for access
      to a fill device when it contains a classified operational KEK.
      Although seed KEK's are handled as UNCLASSIFIED CRYPTO, COMSEC
      Custodians and users must also be appropriately cleared to
      receive seed KEK's with classified data.                                 

           b.  Classification and Accountability.  See Section 3, of
      this Chapter.                                                            

           c.  Transportation.                                                 

                (1)  Within the U.S.  Fill devices containing
      classified operational KEK's should routinely be transported by
      cleared designated courier or ARFCOS.  However, if distribution
      is to a location which cannot reasonably be served by the above
      means, or the urgency for delivery precludes their use,
      operational KEK's classified up through SECRET may be transported
      by U.S. Registered Mail.  Seed KEK's and unclassified operational
      KEK's may be transported by any means prescribed for transporting
      classified COMSEC material or by U.S. Registered Mail.                   

                (2)  Outside of the U.S.  Fill devices containing
      operational KEK's, regardless of classification, must be
      transported in accordance with arrangements made with the U.S.
      Department of State Office of Communications Security.  Seed
      KEK's, regardless of clearance data may be transported by any
      means prescribed for operational KEK'S.                                  

                (3)  Quantity.  Normally, up to 50 operational and/or
      seed KEK's may be shipped in a single package.  However, when for
      emergency reasons classified operational KEK's must be
      transported by U.S. Registered Mail within the U.S., no more than
      25 may be included in a single package.                                  

           d.  Reserve Key.  Although there is no prohibition against a
      COMSEC Custodian holding some level of seed or operational key in
      reserve for emergency use (e.g., if a terminal fails), that level
      should be kept to a minimum consistent with operational
      requirements, in order to limit the exposure of keys in long-term
      storage.                                                                 

                (1)  COMSEC Custodians must notify the KMS of damaged,
      broken, or otherwise unusable fill devices and return them to the
      KMS for disposition.  The devices must be returned at their
      original classification.                                                 

                (2)  A seed or operational key is considered destroyed
      after it has been loaded in a terminal.  Seed KEK's are
      automatically dropped from central accountability once the
      terminal has been rekeyed through a call to the KMS.  A formal
      destruction report is not required.                                      

                     (a)  COMSEC Custodians must submit a formal
      destruction report for operational KEKs which have been manually
      loaded into the terminal, where a call is not made to the KMS for
      rekeying (a witness to the destruction is not required since the
      terminal records the identification of the key loaded).                  

                     (b)  Manually loaded operational KEK's not
      replaced through a call to the KMS or reported destroyed by a
      destruction report will appear on the COMSEC Custodian's next
      scheduled inventory.                                                     

           f.  Unused KEK(s).  An unused KEK which has passed its
      expiration date should be zeroized (in a Type I terminal) by the
      COMSEC Custodian.  Zeroization must be witnessed by another
      authorized person (e.g., the alternate custodian) who must also
      sign the destruction report submitted to the KMS by the COMSEC
      custodian.  Once zeroized, the KSD may then be used as a CIK.            

      193.  CRYPTO-IGNITION KEYS (CIKS).                                       

           a.  General.  At least one CIK must be created immediately
      following the manual loading of a KEK into a terminal.
      Additional CIK'S, up to the terminal's maximum, may be created at
      this time; or, if the terminal design supports it, the first CIK
      may be designated as a master CIK, allowing subsequent creation
      of additional CIK's as they are required.  Since CIK's permit the
      terminal to be used in the secure mode, they must be protected
      against unauthorized access and use.  The number of CIK's created
      should be kept to the minimum required for operational necessity.        

           b.  Access.  CIK's may normally be retained in the personal
      custody of authorized persons, who must protect them as valuable
      personal property.  Any person who may have unrestricted access
      to the keyed terminal may retain the CIK.                                

           c.  Accountability.  CIK's should be accounted for locally
      to minimize insecurities associated with their use.  Local
      accounting includes maintaining a record of all CIK's created
      along with the names, organizations/locations of the persons to
      whom they are issued.  In addition, the user should verify at
      least once a year to the COMSEC Custodian that he or she still
      holds the CIK.  Verification of CIK holdings should be in writing
      from user to COMSEC account in accordance with procedural
      instruction published by the respective user organizations or the
      Controlling Authority.                                                   

           d.  Transportation.  CIK's may be transported by any means
      prescribed for seed KEKs, or on the person of an authorized user.
      CIKs must always be shipped separately from terminals.                   

           e.  Protection in Use.  During operational hours the CIK may
      be left in the terminal so long as authorized persons are present
      and the terminal is under the continuous visual supervision and
      physical control of an authorized user.  If the area is left
      unattended, authorized persons are not present, or if for any
      reason it is not possible for an authorized user to maintain
      constant visual surveillance and physical control over the
      terminal, the CIK will be removed from the terminal and
      maintained in the personal possession of an authorized user.  In
      the event that the CIK is to be kept in the same room as the
      terminal, the CIK must be afforded protection commensurate with
      the classification of the keyed terminal (e.g., in a GSA-approved
      security container for CONFIDENTIAL, SECRET and TOP SECRET).             

           f.  Losses.
                (1)  Loss of a CIK must be promptly reported to the
      responsible COMSEC Custodian, who must initiate immediate action
      to delete that CIK from all terminals with which it was
      associated.  All losses shall be reported within 72 hours of the
      loss to the responsible FAA COMSEC Custodian.                            

                (2)  In the event of the loss of an unkeyed terminal,
      the associated CIK(s) must be protected at the classification
      level of the key.  Absence of the terminal prevents the erasure
      of the CIK information in the terminal; therefore, the CIK must
      be zeroized, or protected at the level of the terminal when
      keyed.                                                                   

           g.  Disposition.  Once a CIK has been disassociated from a
      terminal (either through deletion of the CIK from the terminal,
      or zeroization of the associated seed or operational KEK in the
      terminal), the CIK requires no special controls and may be
      retained for further use in the same or other terminals.                 

           h.  Master CIK.  The master CIK should be subject to
      additional controls to prevent its loss or use to make
      unauthorized CIK's or unauthorized secure calls.  Master CIK's
      should be kept under the personal control of an authorized person
      who has been briefed on its sensitivity and the requirements for
      its control.                                                             

                (1)  The master CIK should be maintained in a GSA
      approved security container except when it is required to create
      other CIK's or to place secure calls.                                    

                (2)  Storage of the master CIK must be commensurate
      with the classification of the associated KEK.                           

           i.  Interoperable CIK.  An interoperable CIK may be created
      for concurrent use with one of the keys in up to four Type 1
      terminals.  Authentication information associated with the
      interoperable CIK (i.e., organization and clearance level) must
      be representative of every person with access to this CIK.  If
      the clearance level varies between terminals, any person with
      access to the interoperable CIK must be cleared to the highest
      level of the associated key.  While use of an interoperable CIK
      provides users operational flexibility, COMSEC Custodians should
      assure that the appropriate accounting is maintained and that
      losses are acted upon promptly.  It is important that the
      custodian be aware of the status of an interoperable CIK since
      the terminals in which it is used will probably not be colocated
      and each terminal may also have other CIK's associated with it.
      For these reasons, it is recommended that an interoperable CIK
      remain at all times in the personal possession of a single
      individual assigned responsibility for its use.                          

      194.  PROTECTION AND USE OF THE MICRO-KMODC.  The micro-KMODC may
      be used to electronically order and receive keys.  User
      representatives may order keys, but only appropriately cleared
      COMSEC Custodians may receive keys.  The following guidelines
      apply:                                                                   

           a.  Location.  There are no restrictions on where the
      micro-KMODC may be installed.  However, during use, controls must
      be instituted to prevent unauthorized access to the system and
      its keys.                                                                

           b.  Classifications.  All classifications of key may be
      ordered through a micro-KMODC.  However, only unclassified
      operational KEKs, and all seed KEKs regardless of their clearance
      data, may be received at the micro-KMODC.                                

           c.  Disks.  Floppy disks containing seed and operational
      KEK's received at the micro-KMODC must be labelled and handled as
      UNCLASSIFIED CRYPTO material, and must remain under the local
      control of the COMSEC Custodian.  Each KEK on the disk is
      centrally accountable to the KMS.  A receipt is automatically
      generated for these keys between the micro-KMODC and the KMODC,
      and the appropriate COR notified.  Therefore, a separate
      possession report is not required.  KEK's which remain in the
      COMSEC Custodian's account, whether on the disk or in a fill
      device, will be subject to continuous central accounting until
      converted (seed KEK's) or reported destroyed (operational KEK's).        

           d.  Destruction.  When the floppy disks will no longer be
      used for storage of keys, they must be destroyed in accordance
      with NTISSI 4004/AFR 56-5.                                               

      195.-198.  RESERVED.                                                     

              SECTION 12.  DESTRUCTION AND EMERGENCY PROTECTION                

      199.  GENERAL REQUIREMENT.  The provisions of NTISSI 4004/AFR
      56-5, must be followed in the disposal and emergency protection
      of Type 1 terminals and KSD's used as fill devices and CIK'S.            

      200.  RESERVED.                                                          

                    SECTION 13.  REPORTABLE INSECURITIES                       

      201.  INSECURE PRACTICE/COMSEC INCIDENT HANDLING.                        

           a.  General.  With any secure communications system,
      incidents and compromises of terminals and key are possible.  The
      design of the STU-III terminals and keying concept minimizes the
      threat of compromised traffic; therefore, compromise recovery is
      focused on preventing an adversary from posing as a valid user
      (e.g. a keyed terminal is lost and someone is pretending to be
      the individual identified by the terminal's key).  This paragraph
      provides an introduction into the compromise recovery feature for
      Type I terminals.  For Type 2 terminals, there is no compromise
      recovery capability available.                                           

           b.  Compromise Types.  The terminal users and COMSEC
      Custodians are primarily responsible for detecting potential
      compromises and following through with necessary reporting
      procedures.  These potential compromises are broken into two
      classes:  insecure practices/locally reportable events; and,
      COMSEC incidents/centrally reportable events.                            

                (1)  Insecure Practices/Locally Reportable Events.
      Insecure practices are not in and of themselves COMSEC incidents,
      but could lead to loss of integrity of the user's information as
      well as information of other system users.  For this reason,
      insecure practices should be managed locally.  Examples of
      locally reportable events are the loss of a CIK, and failure to
      rekey a terminal within two months of the end of the
      cryptoperiod.  STU-III doctrine contains a complete listing of
      insecure practices.  Incidents of this type shall be reported to
      the servicing security element for the region or center
      concerned.                                                               

                (2)  COMSEC Incidents/Centrally Reportable.  Centrally
      reportable events are reported to the NSA by secure phone,
      AUTODIN, or registered mail.  The AUTODIN reports should be sent
      to:  DIRNSA FT GEO G MEADE MD//S2// (Reports of insecurities
      involving KEK's must include the assigned KEK identification
      number, whether or not there were any CIK's involved, and whether
      they were under protection when the insecurity occurred.)  The
      following are examples of centrally reportable incidents:                

                     (a)  Loss of a master CIK.                                

                     (b)  Failure to zeroize CIK information from a
      Type I terminal within 72 hours of the loss of a CIK.                    

                     (c)  Failure of the COMSEC Custodian to notify the
      KMS that a seed KEK listed on the conversion notice still exists
      in his or her COMSEC account.                                            

                     (d)  Use in the secure mode of a terminal whose
      display is inoperable.                                                   

                     (e)  Failure to adequately protect or zeroize a
      CIK that is associated with an unkeyed terminal which is lost.           

                     (f)  Indication in the terminals display that the
      distant terminal contains compromised key.                               

      202.-204.  RESERVED.                                                     

                       SECTION 14.  RECORDS RETENTION                          

      205.  General.  In addition to the normal records which are
      retained for accounting purposes, certain information must be
      kept to facilitate the automated Federal Secure Voice System
      compromise recovery mechanism.  The following information must be
      maintained for each KEK until it is truly destroyed (i.e.,
      finally zeroized from the terminal or overwritten by a new KEK):         

           a.  The identification of the terminal into which each KEK
      was loaded.                                                              

           b.  The identification of all CIK's associated with each KEK
      by terminal.                                                             

           c.  The identification of all terminals associated with each
      CIK, by CIK.                                                             

      NOTE:  This information may be recorded on the card which
      accompanies each fill device or it may be computerized.                  

      206.-208.  RESERVED.                                                     

                       FOR OFFICIAL USE ONLY
                     PUBLIC AVAILABILITY TO BE
                   DETERMINED UNDER 5 U.S.C. 552

                   APPENDIX 1. REQUIRED FORMS AND REPORTS                     

          Form Number          Unit of             Title
                               Issue                                           

      1.  AFCOMSEC Form 3      Sheet          Record of Custodian              

      2.  AFCOMSEC Form 9      Sheet          Cryptographic Access
                                              Certificate                      

      3.  AFCOMSEC Form 14     Sheet          COMSEC Material Voucher
                                              and Package Register             

      4.  AFCOMSEC Form 16     Sheet          COMSEC Account Daily-
                                              Shift Inventory                  

      5.  FAA Form 1600.8      Sheet          Visitor Register
                                              (Stock No. 0052-00-91
                                              -2000)                           

      6.  FAA Form 1600.54     Sheet          Notification of Personnel
                                              Security Action
                                              (Stock No. 0052-00-869
                                              -4000)                           

      7.  SF-153               Sheet          COMSEC Material Report           

      8.  SF-700               Sheet          Security Container
                                              Information
                                              (NSN:  7540-01-214-5372)         

      9.  SF-701               Sheet          Activity Security Check
                                              - list.
                                              (NSN:  7540-01-213-7899)         

      10.  SF-702              Sheet          Security Container Check
                                              Sheet NSN 7540-01-213
                                              -7900                            

                                              (NSN:  7540-01-213-7900)
      11.  SF-703              Sheet          TOP SECRET Cover Sheet
                                              (NSN:  7540-01-213-7901)         

      12.  SF-704              Sheet          SECRET Cover Sheet
                                              (NSN:  7540-01-213-7902)         

      13.  SF-705              Sheet          CONFIDENTIAL Cover Sheet
                                              (NSN:  7540-01-213-7903)         

      14.  SF-706              Pack           TOP SECRET Label
                                              (NSN:  7540-01-207-5536)         

      15.  SF-707              Pack           SECRET Label
                                              (NSN:  7540-01-207-5537)         

      16.  SF-708              Pack           CONFIDENTIAL Label
                                              (NSN:  7540-01-207-5538)         

      17.  SF-709              Pack           CLASSIFIED Label
                                              (NSN:  7540-01-207-5540)         

      NOTE:  Ordering information for the above forms is as follows:           

                a.  FAA Forms:  Orders for additional copies of FAA
      forms should be submitted to the FAA Depot, Mike Monroney
      Aeronautical Center, ATTN:  AAC-434, P.O. Box 25082, Oklahoma
      City, Oklahoma 73125.                                                    

                b.  AFCOMSEC forms should be ordered by letter request
      60 days before current supply is depleted.  Letter request should
      be sent to HQ ESC/DAPD, San Antonio, TX 78243-5000.  Request an
      estimated 6 month supply.                                                

                c.  Standard forms (SF) should be ordered through
      normal document acquisition channels from the GSA.  If any
      difficulty is encountered obtaining specific SFs contact the
      servicing security element for assistance.                               

                         FOR OFFICIAL USE ONLY
                   Public Availability to be Determined
                           Under 5 U.S.C. 552

              APPENDIX 2. SAMPLE CRYPTOGRAPHIC ACCESS BRIEFING                

      1.  You have been selected to perform duties that will require
      access to U.S. classified cryptographic information.  It is
      essential that you be made aware of certain facts relevant to the
      protection of this information before access is granted.  You
      must know the reason why special safeguards are required to
      protect U.S. classified cryptographic information.  You must
      understand the directives which require these safeguards and the
      penalties you will incur for the unauthorized disclosure,
      unauthorized retention, or negligent handling of U.S. classified
      cryptographic information.  Failure to properly safeguard this
      information could cause serious to exceptionally grave damage, or
      irreparable injury, to the national security of the United States
      or could be used to advantage by a foreign nation.                       

      2.  U.S. classified cryptographic information is especially
      sensitive because it is used to protect classified information.
      Any particular piece of cryptographic keying material and any
      specific cryptographic technique may be used to protect a large
      quantity of classified information during transmission.  If the
      integrity of a cryptographic system is breached at any point, all
      information protected by the system may be compromised.  The
      safeguards placed on U.S. classified cryptographic information
      are a necessary component of government programs to ensure that
      our Nation's vital secrets are not compromised.                          

      3.  Because access to U.S. classified cryptographic information
      is granted on a strict need-to-know basis, you will be given
      access to only that cryptographic information necessary to
      perform your duties.  You are required to become familiar with
      Order 1600.8C, as well as AFRs 56-10 and 56-13.  Sections 641,
      793, 794, 798, and 952, Title 18, U.S. Code are contained in
      attachments 1 through 6 of this appendix.  Cited directives and
      Executive Order 12356 are attached in a briefing book for your
      review at this time.                                                     

      4.  Especially important to the protection of U.S. classified
      cryptographic information is the timely reporting of any known or
      suspected compromise of this information.  If a cryptographic
      system is compromised, but the compromise is not reported, the
      continued use of the system can result in the loss of all
      information protected by it.  If the compromise is reported,
      steps can be taken to lessen an adversary's advantage gained
      through the compromise of the information.                               

      5.  You should know that intelligence services of some foreign
      governments prize the acquisition of U.S. classified
      cryptographic information.  They will go to extreme lengths to
      compromise U.S. citizens and force them to divulge cryptographic
      techniques and materials that protect the nation's secrets around
      the world.  You must understand that any personal or financial
      relationship with a foreign government's representative could
      make you vulnerable to attempts at coercion to divulge U.S.
      classified cryptographic information.  You should be alert to
      recognize those attempts so that you may successfully counter
      them.  The best personal policy is to avoid discussions that
      reveal your knowledge of, or access to, U.S. classified
      cryptographic information and thus avoid highlighting yourself to
      those who would seek the information you possess.  Any attempt,
      either through friendship or coercion, to solicit your knowledge
      regarding U.S. classified cryptographic information must be
      reported immediately to your servicing security element, or to
      ACO-300, ATTN:  ACO-320, Headquarters, Federal Aviation
      Administration, 800 Independence Avenue, S.W., Washington, D.C.,
      telephone 202-267-3961.                                                  

      6.  In view of the risks noted above, unofficial travel to
      certain communist or other designated countries will require the
      prior approval of your manager and the servicing security
      element, or ACO-300.  It is essential that you contact your
      manager and the region/center security office, or ACO-300, if
      such unofficial travel becomes necessary.                                

      7.  Finally, you must know that, should you willfully or
      negligently disclose to any unauthorized persons any of the U.S.
      classified cryptographic information to which you will have
      access, you will be subject to administrative and civil
      sanctions, sanctions, including adverse personnel actions, as
      well as criminal sanctions under the Uniform Code of Military
      Justice or the criminal laws of the United States, as
      appropriate.                                                             

                                 APPENDIX 2
                                Attachment 1                                   

                  Title 18, United States Code Section 641.
                     Public Money, Property or Records.                        

      "Whoever embezzles, steals, purloins or knowingly converts to his
      use or the use of another, or without authority, sells, conveys
      or disposes of any records, voucher, money, or thing of value of
      the United States or of any department or agency thereof, or any
      property made or being made under contract for the United States
      or any department or agency therefor;                                    

      "Whoever receives, conceals, or retains the same with intent to
      convert it to his use or gain, knowing it to have been embezzled,
      stolen, purloined or converted - shall be fined not more than
      $10,000 or imprisoned not more than ten years or both; but if the
      value of such property does not exceed the sum of $100, he shall
      be fined not more than $1,000 or imprisoned not more than one
      year or both.                                                            

      "The word 'value' means face, par, or market value, or cost
      price, either wholesale or retail, whichever is greater."                

                                 APPENDIX 2
                                Attachment 2                                   

                  Title 18, United States Code Section 793.
           Gathering, Transmitting or Losing Defense Information.              

      "(a) Whoever, for the purpose of obtaining information respecting
      the national defense with intent or reason to believe that the
      information is to be used to the injury of the United States, or
      to the advantage of any foreign nation, goes upon, enters, flies
      over, or otherwise obtains information concerning any vessel,
      aircraft, work of defense, navy yard, naval station, submarine
      base, fueling station, fort, battery, torpedo station, dockyard,
      canal, railroad, arsenal, camp, factory, mine, telegraph,
      telephone, wireless, or signal station, building, office,
      research laboratory or station or other place connected with the
      national defense owned or constructed, or in progress of
      construction by the United States or under the control of the
      United States, or of any of its officers, departments, or
      agencies, or within the exclusive jurisdiction of the United
      States, or any place in which any vessel, aircraft, arms,
      munitions, or any other materials or instruments for use in time
      of war are being made, prepared, repaired, stored, or are the
      subject of research or development, under any contract or
      agreement with the United States, or any department or agency
      thereof, or with any person on behalf of the United States, or
      otherwise on behalf of the United States, or any prohibited place
      so designated by the President by proclamation in time of war or
      in case national emergency in which anything for the use of the
      Army, Navy, or Air Force is being prepared or constructed or
      stored, information as to which prohibited place the President
      has determined would be prejudicial to the national defense; or          

      (b) Whoever, for the purpose aforesaid, and with like or reason
      to believe, copies, takes, makes, or obtains, or attempts to
      copy, take, make, or obtain, any sketch, photograph, photographic
      negative, blueprint, plant map, model, instrument, appliance,
      document, writing, or note of anything connected with the
      national defense; or                                                     

      (c) Whoever, for the purpose aforesaid, receives or obtains or
      agrees or attempts to receive or obtain from any person, or from
      any source whatever, any document, writing, code book, signal
      book, sketch, photograph, photographic negative, blueprint, plan,
      map, model, instrument, appliance, or note, of anything connected
      with the national defense, knowing or having reason to believe,
      at the time he receives or obtains, or agrees or attempts to
      receive or obtain it, that it has been or will be obtained, taken
      made or disposed of by any person contrary to the provisions of
      this chapter; or                                                         

      (d) Whoever, lawfully having possession of, access to, control
      over, or being entrusted with any document, writing, code book,
      signal book, sketch, photograph, photographic negative,
      blueprint, plan, map, model, instrument, appliance, or note
      relating to the national defense, or information relating to the
      nation defense which information the possessor has reason to
      believe could be used to the injury of the United States or to
      the advantage of any foreign nation, willfully communicates,
      delivers, transmits or causes to be communicated, delivered or
      transmitted or attempts to communicate, deliver transmit or cause
      to be communicated, delivered or transmitted to receive it, or
      willfully retains the same and fails to deliver it on demand to
      the officer or employee of the United States entitled to receive
      it; or                                                                   

      (e) Whoever having unauthorized possession of, access to, or
      control over any documents, writing, code book, signal book,
      sketch, photograph, photographic negative, blueprint, plan, map,
      model, instrument, appliance, or note relating to the national
      defense, or information relating to the national defense which
      information the possessor has reason to believe could be used to
      the injury of the United States or the advantage of any foreign
      nation, willfully communicates, delivers, transmits, or causes to
      be communicated, delivered, or transmitted, or attempts to
      communicate, deliver, transmit or cause to be communicated,
      delivered, or transmitted the same to any person not entitled to
      receive it, or willfully retains the same and fails to deliver it
      to the officer of employee of the United States entitled to
      receive it; or                                                           

      (f) Whoever, being entrusted with or having lawful possession of
      control of any document, writing, code book, signal book, sketch,
      photograph, photographic negative, blueprint, plan, map, model,
      instrument, appliance, note, or information relating to the
      national defense, (1) through gross negligence permits the same
      to be removed from its proper place of custody or delivered to
      anyone in violation of his trust, or to be lost, stolen,
      abstracted, or destroyed, or (2) having knowledge that the same
      has been illegally removed from its proper place of custody or
      delivered to anyone in violation of its trust, or lost, or
      stolen, abstracted, or destroyed, and fails to make prompt report
      of such loss, theft, abstraction, or destruction to his superior
      officer -- shall be fined not more than $10,000 or imprisoned not
      more than ten years, or both, or                                         

      (g) If two or more persons conspire to violate any of the
      foregoing provisions of this section, and one or more of such
      persons do any act to effect the object of the conspiracy, each
      of the parties to such conspiracy shall be subject to the
      punishments provided for the offense which is the object of such
      conspiracy."                                                             

                                 APPENDIX 2
                                Attachment 3                                   

                  Title 18, United States Code Section 794.                    

                       Gathering or delivering defense
                   information to aid foreign government.                      

      "(a) Whoever, with intent or reason to believe that it is to be
      used to the injury of the United States or to the advantage of a
      foreign nation, communicates, delivers, or transmits, or attempts
      to communicate, deliver, or transmit, to any foreign government,
      or to any fraction or party or military or naval force within a
      foreign country, whether recognized or unrecognized by the United
      States, or to any representative, officer, agent, employee,
      subject, or citizen thereof, either directly or indirectly any
      document, writing, code book, signal book, sketch, photograph,
      photographic negative, blueprint, plan, map, model, note,
      instrument, appliance, or information relating to the national
      defense, shall be punished by death or imprisonment for any term
      of years or for life.                                                    

      (b) Whoever, in time of war, with intent that the same shall be
      communicated to the enemy, collects, records, publishes, or
      communicates or attempts to elicit any information with respect
      to the movement, numbers, description, condition, or disposition
      of any of the Armed Forces, ships, aircraft, or war materials of
      the United States or with respect to the plans or conduct, or
      supposed plans or conduct of any naval or military operations, or
      with respect to any works or measures undertaken for or connected
      with, or intended for the fortification or defense of any place,
      or any other information relating to the public defense, which
      might be useful to the enemy, shall be punished by death or by
      imprisonment for any term of years or for life.                          

      (c) If two or more persons conspire to violate this section, and
      one or more of such persons do any act to effect the object of
      the conspiracy, each of the parties to such conspiracy shall be
      subject to the punishment provided for the offense which is the
      object of such conspiracy."                                              

                                 APPENDIX 2
                                Attachment 4                                   

                  Title 18, United States Code Section 798.
                    Disclosure of classified information.                      

      "(a) Whoever knowingly and willfully communicates, furnishes,
      transmits, or otherwise makes available to an unauthorized
      person, or publishes, or uses in any manner prejudicial to the
      safety of interest of the United States or for benefit of any
      foreign government to the detriment of the United States and
      classified information -                                                 

           (1)  concerning the nature, preparation, or use of any code,
      cipher, or cryptographic system of the United States or any
      foreign government; or                                                   

           (2)  concerning the design, construction, use, maintenance,
      or repair of any device, apparatus, or appliance used or prepared
      or planned for use by the United States or any foreign government
      for cryptographic or communication intelligence purposes; or             

           (3)  concerning the communication intelligence activities of
      the United States or any foreign government; or                          

           (4)  obtained by the process of communications intelligence
      from the communications of any foreign government, knowing the
      same to have been obtained by such processes - shall be fined not
      more than $10,000 or imprisoned not more than ten years, or both.        

      (b) As used in subsection (a) of this section -- The term
      'classified information' means information which, at the time of
      a violation of this section, is for reasons of national security,
      specifically designated by a United States Government Agency for
      limited or restricted dissemination or distribution; the terms
      'code,' 'cipher,' and 'cryptographic system' include in their
      meanings, in addition to their usual meanings, any method of
      secret writing and any mechanical or electrical device or method
      used for the purpose of disguising or concealing the contents,
      significance, or meanings of communications; the term 'foreign
      government' includes in its meaning any person or persons acting
      or purporting to act for or on behalf of any faction, party,
      department, agency, bureau, or military force of or within a
      foreign government, or for or on behalf of any government or any
      person or persons purporting to act as a government within a
      foreign country, whether or not such a government is recognized
      by the United States.  The term 'communications intelligence'
      means all procedures and methods used in the interception of
      communications and the obtaining of information from such
      communications by other than intended recipients; The term
      'unauthorized person' means any person who, or agency which, is
      not authorized to receive information of the categories set forth
      in subsection (a) of this section, by the President, or by the
      head of a department or agency of the United States Government
      which is expressly designated by the President to engage in
      communication intelligence activities for the United States.             

      (c) Nothing in this section shall prohibit the furnishing, upon
      lawful demand, of information to any regularly constituted
      committee of the Senate or House of Representatives of the United
      States of America, or joint committee thereof."                          

                                  APPENDIX 2
                                 Attachment 5                                  

                  Title 18, United States Code Section 952.
                    Diplomatic codes and correspondence.                       

      "Whoever, by virtue of this employment by the United States,
      obtains from another or has or has had custody of or access to,
      any official diplomatic code, and without authorization or
      competent authority, willfully publishes or furnishes to another
      any such code or matter, or any matter which was obtained while
      in the process of transmission between any foreign government and
      its diplomatic mission in the United States, shall be fined not
      more than $10,000 or imprisoned not more than ten years, or
      both."                                                                   

                                 APPENDIX 2
                                Attachment 6                                   

                  Title 50, United States Code Section 783
                                  Offenses.                                    

      "Communications of classified information by Government officer
      or employee.  It shall be unlawful for any officer or employee of
      the United States or any department or agency thereof, or of any
      corporation the stock of which is owned in whole or in major part
      by the United States or any department or agency thereof, to
      communicate in any manner or by any means, to any person whom
      such officer or employee knows or has reason to believe to be an
      agent or representative of any foreign government or member of
      any Communist organization as defined in paragraph (5) of section
      782 of this title, any information of a kind which shall have
      been classified by the President (or by the head of any such
      department, agency, or corporation with approval of the
      President) as affecting the security of the United States,
      knowing or having reason to know that such information has been
      so classified, unless such officer or employee shall have been
      specifically authorized by the President, or by the head of the
      department, agency, or corporation by which this officer or
      employee is employed, to make such disclosure of such
      information."                                                            

                       FOR OFFICIAL USE ONLY
                        PUBLIC AVAILABILITY TO BE
                      DETERMINED UNDER 5 U.S.C. 552

                APPENDIX 3. CRYPTOGRAPHIC ACCESS CERTIFICATE                  

                      CRYPTOGRAPHIC ACCESS CERTIFICATE
              (This form is covered by the Privacy Act of 1974)                

      Privacy Act Statement:  Authority.  Executive Order 9397.
      Routine and sole use of the SSN is to identify the individual
      precisely when necessary to certify access to US cryptographic
      information.  While disclosure of your SSN is voluntary, your
      failure to do may delay certification, and in some cases, prevent
      original access to US cryptographic information.                         

                            Section 1 (Type Only)
      _________________________________________________________________
      | Installation    | Unit/Office Symbol    | Supporting COMSEC   |
      |                 |                       | Account Number      |
      |                 |                       |                     |
      |_________________|_______________________|_____________________|        

      Instructions:  Section 2 of this certificate must be accomplished
      before an individual may be granted access to US cryptographic
      information.  Section 3 will be accomplished when the individual
      no longer requires such access.  This certificate (original) will
      be made a permanent part of the official records of the person
      concerned.                                                               

                     Section 2.  Authorization for Access to US
                                 Cryptographic information                     

        A.  I understand that I am being granted access to US
      cryptographic information.  I understand that my being granted
      access to cryptographic information involves me in a position of
      special trust and confidence concerning matters of national
      security.  I hereby acknowledge that I have been briefed
      concerning my obligation with respect to such access.                    

        B.  I understand that safeguarding US cryptographic information
      is of the utmost importance and that the loss or compromise of
      such information could lead to irreparable damage to the US and
      its allies.  I understand that I am obligated to protect US
      cryptographic information and I have been instructed in the
      special nature of this information and the principle for the
      protection of such information.  I acknowledge that I have also
      been instructed in the rules requiring that I report any
      unofficial foreign contacts and travel to my appropriate security
      officer and that, before this briefing, I reported any
      unauthorized foreign travel or foreign contacts I may have had in
      the past.  I understand that I am subject to and consent to an
      aperiodic, counterintelligence security polygraph examination.           

        C.  I understand fully the information presented at the
      briefing I have received and am aware that any disclosure of US
      cryptographic information to unauthorized persons may make me
      subject to prosecution under the criminal law of the US.  I have
      read this certificate and my questions, if any, have been
      answered.  I acknowledge that the briefing officer has made
      available to me the provisions of Sections 641, 793, 794, 798,
      and 952, Title 18, US Code and Executive Order 12356.  I
      understand that, if I disclose to any unauthorized person any of
      the cryptographic information to which I have access, I may be
      subject to prosecution under the Uniform Code of Military Justice
      and/or the criminal laws of the US.  I understand and accept that
      unless I am released in writing by an authorized representative
      of my appropriate security office, the terms of this certificate
      and my obligation to protect all cryptographic information to
      which I may have access apply during the time of my access and at
      all times thereafter.                                                    

      ACCESS GRANTED THIS ____________ DAY OF _________________ 19 ____        

      SIGNATURE ______________________ NAME, GRADE, SSN, DOB __________
                                                            (Type Only)        

      ________________________________ ________________________________
      SIGNATURE OF ADMINISTERING       NAME, GRADE,         (Type Only)
      OFFICIAL                         OFFICIAL POSITION                       

                     SECTION 3.  TERMINATION OF ACCESS TO US
                                 CRYPTOGRAPHIC INFORMATION                     

      I am aware that my authorization for access to cryptographic
      information is being withdrawn.  I fully appreciate and
      understand that the preservation of the security of US
      cryptographic information is of vital importance to the welfare
      and defense of the US.  I certify that I will never divulge any
      US cryptographic information I acquired, nor discuss with any
      person any of the US cryptographic information to which I have
      had access, unless and until freed from this obligation by
      unmistakable or categorical official notice from competent
      authority.  I have read this agreement carefully and my
      questions, if any, have been answered to my satisfaction.  I
      acknowledge that the briefing officer has made available to me
      Sections 641, 793, 794, 798, and 952 of Title 18, US Code,
      Section 783(b) of Title 50, US Code; and Executive Order 12356.          

                                       () Administrative
      REASONS FOR WITHDRAWAL           () Suspension
      (Check One:)                     () Revocation
      ACCESS WITHDRAWN THIS __________ DAY OF _________________ 19 ____        

      SIGNATURE ______________________ NAME, GRADE, SSN, DOB __________
                                                            (Type Only)        

      ________________________________ ________________________________
      SIGNATURE OF ADMINISTERING       NAME, GRADE,     (Type or Stamp)
      OFFICIAL                         OFFICIAL POSITION                       

                     FOR OFFICIAL USE ONLY
                  Public Availability to be Determined
                        Under 5 U.S.C. 552

             APPENDIX 4. SECURE TELECOMMUNICATIONS FACILITY AND 
 COMSEC ACCOUNT CHECKLIST                             

      1.  All items in the checklist apply to COMSEC accounts and
      COMSEC user facilities unless considered not applicable by the
      servicing security element or ACS-300 due to specific
      circumstances.  Only those items preceded with an asterisk in
      parentheses (*) apply to administrative accounts.                        

      (*)  2.  (Some questions are self contained that is, good
      management practice dictates an affirmative response to the
      question, but the question itself is the only authority.                 

                                   General                                     

      (*)  1.  Is a semiannual (or upon change of custodian) inventory
      of the COMSEC account being performed as required?
      (AFR 56-10)                                                              

      (*)  2.  Have all discrepancies indicated on previous inspection
      reports (regional/center servicing security element inspections
      and Headquarters ACS-300 inspections) been corrected?
      (AFKAG-1)                                                                

      (*)  3.  If the answer to (2) is "no" what discrepancies still
      exist and what action has been taken to correct them?  Have
      timely follow-up actions been taken? (AFKAG-1)                           

      (*)  4.  Has the COMSEC custodian verified the final clearance of
      all personnel listed on the COMSEC accounts authorized
      entrance/access list each month?  (AFR 56-6/NACSI 4008)
      (*)  5.  Has the custodian verified that each person on the
      authorized entrance/access list has complied with all
      requirements of FAA's Formal Cryptographic Access (FCA) Program
      to include having received a briefing and having a signed,
      current Cryptographic Access Certificate on file?  (AFSSI 4000,
      Order 1600.8C)                                                           

      (*)  6.  Has the facility manager having responsibility for
      COMSEC or the COMSEC custodian validated the authorized
      entrance/access list on a monthly basis?  (AFR 56-6/NACSI 4008)          

      (*)  7.  Do the COMSEC storage areas of the COMSEC account meet
      minimum physical security requirements established by National
      COMSEC Instruction (NACSI) 4008 and Order 1600.8C?                       

      (*)  8.  Is there documented approval on file certifying that the
      COMSEC account has been inspected and approved for the storage of
      classified COMSEC information by the servicing security element
      for regions/center and by ACS-300 for Washington Headquarters?
      (AFR 56-6/NACSI 4008, AFR 56-13/NACSI 4005)                              

      (*)  9.  Are SF 700, Security Container Information, prepared and
      affixed to the inside of vault doors and the locking drawer of
      GSA approved safes and containers? (AFR 56-13/NACSI 4005)                

      (*)  10.  Are safe/vault combinations changed in accordance with
      Order 1600.2C to include at least every 12 months or when a
      person knowing the combination is relieved, transferred, or
      terminated? (AFR 56-6/NACSI 4008)
      (*)  11.  Does the COMSEC facility have an emergency plan which
      provides adequate instructions for implementing
      safeguarding/destruction procedures in the event of an emergency?
      (AFR 56-10/COMSEC User's Guide, AFR 56-5/NTISSI 4004)                    

      (*)  12.  Have all assigned personnel including COMSEC custodian
      and alternates, reviewed and participated in quarterly tests (dry
      runs) of the emergency plans?  (AFR 56-5/NTISSI 4004)                    

      (*)  13.  Have the COMSEC emergency plans been coordinated with
      the contingency plans or the facility both initially and whenever
      significant changes are made?  (AFR 56-5/NTISSI 4004, AFR
      56-10/COMSEC User's Guide)                                               

      (*)  14.  Have adequate destruction equipment and materials been
      provided or suitable arrangements made for emergency destruction?
      (AFR 56-5/NTISSI 4004)                                                   

      (*)  15.  Does the account report file contain transfer,
      destruction, and inventory reports?  Are they filed in numerical
      order by voucher Number? (AFKAG-2)                                       

      (*)  16.  Is the account report file properly classified, with a
      minimum of CONFIDENTIAL? (AFKAG-2)                                       

      (*)  17.  Does the account properly maintain the AFCOMSEC Form
      14, COMSEC Material-Voucher and Package Register?  (AFKAG-2)             

      (*)  18.  Is the AFCOMSEC Form 3 current and maintained in the
      account report file?  (AFKAG-2)                                          

      (*)  19.  Is the proper disposition made of all COMSEC files and
      records?  (AFKAG-1, AFR 56-10/COMSEC User's Guide)                       

                              Physical Security                                

      (*)  20.  Were correct procedures used to identify and admit
      inspection personnel?  Was each person in the inspection party
      required to sign the FAA Form 1600.8, Visitor Register, upon
      admittance?  (AFR 56-6/NACSI 4008)                                       

      NOTE:  All personnel not listed on the access list must be signed
      in on FAA Form 1600.8 prior to being granted access to the COMSEC
      area.                                                                    

           21.  Has a way been provided so that persons seeking entry
      may be identified prior to admission or viewing of COMSEC
      operations?  (AFR 56-6/NACSI 4008, AFR 56-13/NACSI 4005)                 

           22.  Are all secure telecommunications facility doors
      solidly constructed and fitted with approved secure locks?
      (AFR 56-6/NACSI 4008, AFR 56-13/NACSI 4005)                              

           23.  Is the secure telecommunications facility sound proofed
      and have measures been taken to prevent acoustic interception?
      (AFR 56-6/NACSI 4008)                                                    

           24.  Is an authorized entrance list posted inside the
      facility or inside the COMSEC security container (for an
      administrative facility)?  (AFR 56-6/NACSI 4008)                         

           25.  Is the authorized entrance list limited to persons
      assigned and others whose duties may require frequent admittance?
      (AFR 56-6/NACSI 4008)                                                    

           26.  Are specific persons designated by name to authorize
      admittance to those persons not on the authorized entrance and
      access list?  (AFR 56-6/NACSI 4008)                                      

           27.  Are visitors being processed in and escorted within the
      facility?  (AFR 56-6/NACSI 4008)                                         

           28.  Is a copy of the most current TSCM survey on file?
      (AFKAG-1, Order 1600.12C)                                                

      (*)  29.  Have the operational STU-III terminals located in
      offices and residences been inspected within the previous 6
      months by technically competent personnel?                               

      (*)  30.  Is strict accountability maintained for all accountable
      COMSEC material held?  (AFKAG-2, AFR 56-10/COMSEC User's Guide,
      and AFR 56-13/NACSI 4005)                                                

      (*)  31.  During the periodic inventories prescribed in AFKAG-2,
      is the material physically sighted, including material on hand
      receipts to users?  (AFKAG-2)                                            

      (*)  32.  Are written directives in effect that ensure all
      persons who have classified COMSEC material on hand receipt are
      relieved from accountability before permanent departure?
      (AFKAG-2)                                                                

      (*)  33.  Is a daily or shift inventory made for all COMSEC
      materials and equipments where applicable?  (AFR 56-10/COMSEC
      User's Guide, AFR 56-13/ NACSI 4005)                                     

      (*)  34.  Is an inventory performed of COMSEC materials stored in
      a locked safe or other container before closure or locking of the
      container?  (AFR 56-13/NACS1 4005)                                       

           35.  (U)  Is COMSEC and keying material at user activities
      being destroyed immediately, but no later than 12 hours after
      supersession?  (AFR 56-5/NTISSI 4004)                                    

           36.  (U)  Are COMSEC materials at the COMSEC account being
      destroyed as soon as possible after supersession, but within the
      time requirements of AFR 56-5?  (AFR 56-5/NTISSI 4004)                   

      (*)  37.  (U)  Is proper documentation being maintained locally
      for accountable COMSEC materials destroyed before normal
      reporting to the central office of record (COR)?  (AFR
      56-5/NTISSI 4004, AFR 56-10/COMSEC User's Guide)                         

      (*)  38.  (U)  Are all assigned personnel familiar with the
      procedures for reporting possible physical compromises?  (AFR
      56-10/COMSEC User's Guide, AFR 56-12/NTISSI 4003)                        

      (*)  39.  (U)  Have page checks been made and properly recorded
      in COMSEC documents as required?  (AFR 56-10/COMSEC User's Guide,
      AFR 56-13/NACSI 4005)                                                    

      (*)  40.  (U)  Are security checks being performed at the end of
      each shift or on a daily basis as required?  (AFR 56-10/COMSEC
      User's Guide)                                                            

      (*)  41.  (U)  Are adequate authorized facilities available to
      destroy classified waste and are they convenient to each facility
      or account?  (AFR 56-5/NTISSI 4004)                                      

      (*)  42.  (U)  Are there appropriate signs displayed to designate
      the secure telecommunications facility as a CLOSED Area?  (Order
      1600.8C, Order 1600.2C)                                                  

      NOTE:  This item applies to administrative accounts only if
      operations codes or authentication systems are held for issue to
      users.                                                                   

      (*)  43.  (U)  Are users given adequate guidance on effective
      dates, accounting, supersession, destruction, physical security,
      and reporting of COMSEC insecurities?  (AFR 56-10/COMSEC User's
      Guide, AFR 56-11/COMSEC Duties and Responsibilities)                     

           44.  (U)  Has the account developed written standard
      operating procedures (SOP), on handling, controlling and
      protecting COMSEC assets including inventory and destruction?
      (AFKAG-1, AFR 56-6/NACSI 4008)                                           

           45.  (U)  Have user accounts developed in coordination with
      the COMSEC custodian their own written SOPs on the handling,
      controlling and safeguarding of COMSEC assets to include
      inventory and destruction?  (AFR 56-10/COMSEC User's Guide, AFR
      56-6/NACSI 4008)                                                         

           46.  Are all applicable TOP SECRET keying material being
      handled and protected under Two Person Integrity or is an AFCSC
      approved waiver on file?                                                 

                           Cryptographic Security                              

           47.  Are the referenced directives used with appropriate
      SOPs to report insecurities?  (AFR 56-12/NTISSI 4003)                    

           48.  Has a training program been initiated to ensure
      proficiency in all phases of COMSEC operation.  Is this training
      documented?  (AFR 56-10/COMSEC User's Guide, AFR 56-11/COMSEC
      Duties and Responsibilities)                                             

           49.  Has a specified time been established for circuit
      changes and is a record kept of the time of last change to ensure
      the cryptoperiod is not exceeded?  (AFKAG-1.  AFR 56-5/NTISSI
      4004, AFR 56-10/COMSEC User's Guide, AFR 56-13/NACSI 4005)               

           50.  Does the operations section maintain SOPs which list
      current SPECAT codewords and outline specific procedures for
      processing and safeguarding these types of messages?  (AFKAG-1)          

           51.  If appropriate, have persons been briefed on any
      special handling procedures required by the originator or
      recipient of SPECAT messages?  (AFKAG-1)                                 

                              COMSEC Management                                

      (*)  52.  Are all COMSEC materials (initial and resupply) and
      amendments thereto being received and posted on a timely basis?
      (AFKAG-2 and AFR 56-11/COMSEC Duties and Responsibilities)               

      (*)  53.  When permissible, are extracts made from COMSEC
      publications rather than requesting increased allowance?  (AFR
      56-9/NACSI 4004)                                                         

      (*)  54.  With reference to 54, above - was controlling authority
      approval obtained to make extracts?  (AFR 56-9/NACSI 4004)               

      (*)  55.  Are all items and amounts of COMSEC materials limited
      to those which are absolutely essential to the efficient
      operation and mission of the FAA facility being supported?
      (AFKAG-1, AFKAG-2, AFR 56-10/COMSEC User's Guide, AFR
      56-11/COMSEC Duties and Responsibilities, AFR 56-13/NACSI 4005)          

      (*)  56.  Are COMSEC holdings surveyed on a continuing basis to
      determine if items are no longer required or are being received
      in quantities in excess of requirements?  (AFKAG-1, AFKAG-2, AFR
      56-10/COMSEC User's Guide, AFR 56-11/COMSEC Duties and
      Responsibilities, AFR 56-13/NACSI 4005)                                  

      (*)  57.  Has required annual COMSEC indoctrination or training
      been administered to FAA contractors having access to COMSEC
      materials or information (training identical to that provided for
      FAA personnel)?  (AFKAG-1, AFR 56-12/NTISSI 4003)                        

      (*)  58.  Are both the custodian and the alternates familiar with
      and actively performing their assigned duties and
      responsibilities?  (AFR 56-11/COMSEC Duties and Responsibilities)        

      (*)  59.  Are all insecurity reports thoroughly reviewed for
      accuracy by the COMSEC custodian and the facility or office
      manager having responsibility for COMSEC before being forwarded
      through official channels?  (AFR 56-12/NTISSI 4003)                      

      (*)  60.  Has corrective action been taken to prevent the
      recurrence of COMSEC insecurities?  (AFR 56-12/NTISSI 4003)              

      (*)  61.  Are insecurity reports being processed in a timely
      manner? (AFR 56-12/NTISSI 4003)                                          

      (*)  62.  Is the COMSEC custodian conducting user training prior
      to issue of COMSEC materials and at least annually?  (AFR
      56-10/COMSEC User's Guide, AFR 56-11/COMSEC Duties and
      Responsibilities)                                                        

      (*)  63.  Is there training documentation available at the
      account?  (AFR 56-10/COMSEC User's Guide, AFR 56-11/COMSEC Duties
      and Responsibilities)                                                    

      (*)  64.  Has the COMSEC custodian made maximum use of the
      Qualification Training Package (QTP) 491X1-30E, COMSEC Account
      Management, for training of all assigned personnel not attending
      the formal COMSEC training course.  Is documentation of training
      on hand in the COMSEC account?  (AFR 56-11/COMSEC Duties and
      Responsibilities)                                                        

           65.  Have all applicable personnel been granted Formal
      Cryptographic Access (FCA)?  Have procedures been established to
      debrief personnel upon departure (PCS, termination or
      retirement), and for suspension or revocation of access.  (Order
      1600.8C)                                                                 

           66.  Are all waivers granted to COMSEC accounts or COMSEC
      responsible personnel current?                                           

                               FOR OFFICIAL USE ONLY
                             PUBLIC AVAILABILITY TO BE
                           DETERMINED UNDER 5 U.S.C. 552

           APPENDIX 5. PUBLICATIONS TO BE MAINTAINED BY ALL FAA COMSEC 
 ACCOUNTS                                               

      1.  General.  The publications listed in paragraph 3, below, are
      to be maintained in each FAA COMSEC operational and monitor
      account.                                                                 

      2.  Abbreviations.  The following abbreviations are used in this
      Appendix with the associated meanings as shown below.                    

           a.  AFR - Air Force Regulation.  This is an Air Force policy
      document.  The 56-series of AFRs are directives implementing the
      national COMSEC policy as established by the National Security
      Agency (NSA).                                                            

           b.  NACSI - National Communications Security Instruction.
      The NACSI is an NSA publication that establishes national COMSEC
      policies and procedures.                                                 

           c.  NTISSI - National Telecommunications And Information
      Systems Security Instruction.  The NTISSI is also an NSA
      document.  NTISSIs are used to promulgate current COMSEC doctrine
      and frequently will supersede an older NACSI.                            

           d.  NACSI/AFR or NTISSI/AFR.  When the AFR number is also
      provided on a NACSI or NTISSI it indicates that the Air Force has
      added its own guidance and interpretation to the basic NSA
      document.                                                                

      3.  Publication Listing.                                                 

      _________________________________________________________________
      Item          AFR NO.     NSA Reference          Subject
      _________________________________________________________________
      01             56-1                          Signal Security             

      02             56-2        NCSC-9         Communications Security
                                                  Glossary                     

      03             56-3        NTISSI 4002    Classification Guide
                                                  for COMSEC                   

      04             56-4        NACSI 6002     Security of Defense
                                                  Contractor
                                                    Telecommunications         

      05             56-5        NTISSI 4004    Routine Destruction and
                                                  Emergency Protection
                                                    of COMSEC Material         

      06             56-6        NACSI 4008     Safeguarding COMSEC
                                                  Facilities                   

      07             56-7        NACSI 4007     Management of Manual
                                                  Cryptosystems                

      08             56-9        NACSI 4004     Controlling Authorities
                                                  for COMSEC Material          

      09             56-10       .....          COMSEC User's Guide            

      10             56-11       .....          COMSEC Duties and
                                                  Responsibilities
      11             56-12       NTISSI 4003    Reporting COMSEC
                                                  Insecurities                 

      12             56-13       NACSI 4005     Safeguarding and
                                                  Control of COMSEC
                                                    Material                   

      13             56-19       NACSI 4009     Protected Distribution
                                                  Systems                      

      14             56-20       NACSI 4001     Controlled
                                                  Cryptographic Items          

      15             .....       NTISSI 4005    Control of TOP SECRET
                                                  Keying Material              

      16             AFSAL 4001  NTISSI 4001    Controlled
                                                  Cryptographic Items          

      17             .....       NTISSI 3013    Operational Security
                                                  Doctrine for the
                                                    Secure Telephone
                                                    Unit III (STU-III)
                                                    Type 1 Terminal            

                       FOR OFFICIAL USE ONLY
                       PUBLIC AVAILABILITY TO BE
                      DETERMINED UNDER 5 U.S.C. 552

             APPENDIX 6. PHYSICAL SECURITY STANDARDS FOR FIXED 
 COMSEC FACILITIES                                

      1.  INTRODUCTION.  This appendix sets forth the standards for the
      physical security safeguarding of fixed FAA COMSEC facilities.
      It implements the provisions of Annex A, NACSI No. 4008/AFR 56-6.
      These standards apply to fixed FAA facilities which contain
      classified COMSEC material and which are devoted principally to
      normal activities involving these materials (e.g., secure
      telecommunications, manufacturing, training, maintenance, and
      storage).  Unless reference is made to a specific facility type,
      these standards apply equally to all FAA fixed COMSEC facilities.        

      2.  LOCATION.  FAA fixed COMSEC facilities will be located in an
      area which provides positive control over access, and is as far
      as possible from areas which are difficult or impossible to
      control (e.g., parking lots, ground floor exterior walls,
      multiple corridors or driveways, or surrounded by other
      uncontrolled buildings or offices).                                      

      3.  CONSTRUCTION.  A fixed COMSEC facility must be constructed of
      solid, strong materials to prevent unauthorized penetration and
      to show evidence of attempts at unauthorized penetration.  It
      must provide adequate attenuation of internal sounds which could
      divulge classified information through walls, doors, windows,
      ceilings, air vents and ducts.  Maximum physical security is
      achieved when these facilities are of vault-type construction as
      specified in Annex E to NACSI No. 4005/AFR 56-13.  As a minimum,
      construction or modification of an area containing a FAA fixed
      COMSEC facility shall conform to the following requirements.             

           a.  Walls, Floor, and Ceilings.  Walls, floors, and ceilings
      shall be of sufficient structural strength to prevent, or show
      evidence of attempts at, unauthorized penetration.  Walls shall
      be constructed from true floor to true ceiling.  Where false
      ceilings are used, additional safeguards are required to resist
      unauthorized entry (e.g., installation of an approved intrusion
      detection system in the area above the false ceiling).                   

           b.  Doors and Entrance Areas.  Only one door shall be used
      for regular entrance to the facility.  Other doors may exist for
      emergency exit and for entry or removal of bulky items.  All
      doors shall remain closed during facility operations and will
      only be opened to admit authorized personnel or material.  The
      following standards apply to FAA COMSEC facility doors and
      entrance areas.                                                          

                (1)  Main Entrance Door.                                       

                     (a)  Design and Installation.  The door must have
      sufficient strength to resist forceful entry.  In order of
      preference, examples of acceptable doors are:                            

                          1  GSA-approved vault doors.                         

                          2  Standard 1-3/4-inch, internally
      reinforced, hollow metal industrial doors.                               

                          3  Metal-clad or solid hardwood doors with a
      minimum thickness of 1-3/4-inches.                                       

      The door frame must be securely attached to the facility and must
      be fitted with a heavy-duty/high-security strike plate and hinges
      installed with screws long enough to resist removal by prying.
      The door shall be hung so that the hinge pins cannot be removed
      from the exterior side of the door.                                      

                     (b)  Door Lock.  The main entrance door to FAA
      fixed C0MSEC facilities must be equipped with a GSA-approved,
      built-in, Group 1-R lock. (Note:  A GSA-approved Group 1-R lock
      is a three-position combination lock with a changeable
      combination, is manipulation proof, and is radiation resistant.)
      When FAA COMSEC facilities are continuously manned, an
      electronically actuated lock (e.g., cipher lock or keyless
      pushbutton lock) may be used on the entrance door to facilitate
      the admittance of authorized personnel when the facility is
      operationally manned.  Electronic locks do not afford the
      required physical security protection and may not be used as a
      substitute for the Group 1-R lock required to secure the facility
      when it is not manned.                                                   

                          1  If a cipher lock is used, it must be one
      of the following:                                                        

                             a  Federal Stock Number (FSN) 6350-957-
      4190.  This lock is being produced by several manufacturers.  FSN
      5340-757-0691, manufacturers' part number 152, electric latch
      release, is also needed.                                                 

                             b  Simplex Pushbutton Combination Lock,
      Model NL-A-200-S.  This lock is manufactured by Simplex Security
      Systems, Inc., Collinsville, CT.                                         

      Note:  The knowledge of the combination must be strictly
      controlled and released only to persons assigned regular duties
      within the secure telecommunications facility.  It is emphasized
      that this type of lock is used only as a convenience feature and
      affords no protection from forced or surreptitious manipulation.
      Pushbuttons must be cleaned at least weekly.                             

                          2  A key-operated, pin-and-tumbler,
      night-latch-type lock may be used for personnel access control
      during periods when the facility is operationally manned if the
      following conditions are met:
                             a  The lock must be mounted so that it
      cannot be removed from the outside.                                      

                             b  The lock must have a spring-load
      locking feature.                                                         

                             c  All keys must be numbered and issued
      only on hand receipts to provide a written record of all keys.
      Extra keys will be maintained within the FAA COMSEC facility and
      will be accounted for on the daily inventory.                            

                (2)  Other Doors.  Other doors (e.g., emergency exit
      doors and doors to loading docks) must meet the same installation
      requirements as facility entrance doors but must be designed so
      that they can only be opened from inside the facility.  Approved
      panic hardware and locking devices (lock bars, dead bolts, knobs,
      or handles) may be placed only on the interior surfaces of other
      doors to the facility.                                                   

                (3)  Entrance Areas.  Entrances to FAA COMSEC
      facilities shall be equipped with a device which affords
      personnel desiring admittance the ability to notify personnel
      within the facility of their presence.  A method shall be
      employed to establish positive visual identification of a visitor
      before entrance is granted.  Additionally, the entrance area
      shall be designed in such a manner that an individual cannot
      observe classified activities until access requirements are
      completed.                                                               

           c.  Windows.  COMSEC facilities should not contain windows.
      Where windows exist they will be secured in a permanent manner to
      prevent them from being opened.  Windows will be alarmed and/or
      barred to prevent their use as an access point.                          

      Observation of internal operations of the facility shall be
      denied to outside viewing by covering the windows from the inside
      or otherwise screening the secure area from external viewing.            

                (5)  Other Openings.  Air vents, ducts, or any similar
      openings which breach the walls, floor or ceiling of the facility
      shall be appropriately secured to prevent penetration.  Openings
      which are less than 90 square inches shall have approved baffles
      installed to prevent an audio or acoustical hazard.  If the
      opening exceeds 90 square inches, acoustical baffles shall be
      supplemented by either hardened steel bars or an approved
      intrusion detection system.  All holes, cracks, and other
      openings in walls, floors, and ceilings will be permanently
      filled in or sealed to prevent insertion of surveillance devices.        

                               FOR OFFICIAL USE ONLY
                                PUBLIC AVAILABILITY TO BE
                              DETERMINED UNDER 5 U.S.C. 552

           APPENDIX 7. STANDARDS FOR SAFEGUARDING KEYING MATERIAL             

              SECTION 1.  PHYSICAL ACCESS, STORAGE AND CONTROLS                

      1.  Basis for Protection.  The cryptographic security of
      transmitted information is based primarily on the proper use of
      uncompromised keying material.  The safeguarding and control of
      keying materials used to protect national security information
      are of paramount importance.  To ensure that these keying
      materials are provided the most rigorous and comprehensive
      handling and protection, they must be distributed through the
      COMSEC Material Control System.  Safeguarding of keying material
      is achieved procedurally through restrictions and controls
      governing access, distribution, storage, accounting, use, and
      disposition.                                                             

      2.  Controls.                                                            

           a.  Application.                                                    

                (1)  The requirements of this Appendix apply to all
      hard-copy keying material intended for use to protect
      telecommunications carrying national security information, or to
      ensure their authenticity.  Such keying material, both classified
      and unclassified, will be marked "CRYPTO."                               

                (2)  Additional or differing guidance for certain types
      of keying material may appear in the handling or operating
      instructions of affected systems, and will take precedence over
      the provisions of this appendix and the basic order.                     

                (3)  Specific guidance concerning controls for keying
      variables in electronic form will appear in NSA-published system
      NACSIs and USAF AFSALS.                                                  

                (4)  Guidance on handling of maintenance and test key
      is contained in Annex D, NACSI 4005/AFR 56-13, and in specific
      handling instructions for the material.  In cases of conflict,
      specific handling instructions for the material will take
      precedence.                                                              

           b.  Access.                                                         

                (1)  Government Civilian or Military Personnel Who Are
      U.S. Citizens.  Access to COMSEC keying material other than TOP
      SECRET may be granted to U.S. citizens whose duties require such
      access and, if the material is classified, who have been granted
      a security clearance equal to or higher than the classification
      of the keying material involved.  Access to TOP SECRET COMSEC
      keying material will be governed by requirements of NTISSI 4005.         

                (2)  Contractors and Foreign Nationals.  Access by U.S.
      contractor personnel and by noncitizens is governed by national
      COMSEC policy directives.  Questions concerning such access
      should be directed to ACS-300 through the servicing security
      element.                                                                 

                (3)  Immigrant Aliens.  Refer to Annex B, NACSI
      4005/AFR 56-13.                                                          

                (4)  Need-to-Know.  Clearance or rank does not, in
      itself, entitle any individual to have access to keying material.
      Each person having access to keying materials must need the
      material in the performance of his or her duties or
      responsibilities and be familiar with his or her responsibilities
      for its protection, use and disposition.                                 

           c.   Storage.  Unless appropriately cleared persons are
      using or otherwise safeguarding keying material, it will be
      stored in the most secure facilities available.  As a minimum,
      the following storage requirements apply:                                

                (1)  TOP SECRET.  (Refer to NTISSI 4005)                       

                     (a)  TOP SECRET material will be stored in an
      approved steel security container meeting requirements for
      two-person integrity controls as specified in NTISSI 4005.  The
      container will be physically located in a room or vault that has
      an Intrusion Detection System (IDS) installed, and which has been
      inspected and approved by the servicing security element for TOP
      SECRET storage.                                                          

                     (b)  As an alternative to (a) above, TOP SECRET
      material may be stored in an area that has been approved by the
      servicing security element as a secure area, and is manned
      continuously 24-hours a day by personnel holding final clearances
      authorizing them access to the highest classification of material
      stored.  Two-person integrity controls apply.                            

                     (c)  A Class "A" vault constructed in accordance
      with the specifications outlined in Annex E, NACSI 4005/AFR
      56-13.                                                                   

                     (d)  At user locations, TOP SECRET keying material
      shall be stored under two-person integrity controls employing two
      different GSA approved Group 1R combination locks, with no one
      person authorized access to both combinations.  Storage can be in
      a strongbox within a security container, in a security container
      within a vault, or in a security container with two combination
      locks.  At least one of the combination locks must be built-in,
      as in a vault door or in a security container drawer.  If a
      requirement exists for an approved combination padlock the lock
      selected must be a changeable, three position combination padlock
      meeting Federal Specification FF-P-110.                                  

                (2)  SECRET.  SECRET keying material shall be stored
      in:                                                                      

                     (a)  Any manner approved for TOP SECRET.                  

                     (b)  An approved steel security safe procured from
      the General Services Administration (GSA) Federal Supply
      Schedule.                                                                

                     (c)  A Class "B" vault constructed in accordance
      with the specifications outlined in Annex E, NACSI 4005/AFR
      56-13.                                                                   

                (3)  CONFIDENTIAL.  CONFIDENTIAL keying material shall
      be stored in:                                                            

                     (a)  Any manner approved for TOP SECRET or SECRET.        

                     (b)  An approved steel security container having a
      built-in Group 1R, three position, changeable combination lock.          

                (4)  UNCLASSIFIED.  Unclassified keying material shall
      be stored in:                                                            

                     (a)  The same manner as required for TOP SECRET,
      SECRET, or CONFIDENTIAL.                                                 

                     (b)  In the most secure manner available to the
      user.                                                                    

      3.  Supplementary Controls and Older Containers.  Supplementary
      controls such as guard forces, alarms, etc., shall be used as
      determined necessary by the servicing security element to protect
      security containers and areas against unauthorized access.
      Security containers which do not meet the prescribed standards
      may continue to be used until approved containers can be
      procured, in accordance with provisions of chapter 8, Order
      1600.2C.  If a nonapproved container is used or open area storage
      is unavoidable, the classified keying material must be under
      protection of a guard force, or protected by an alarm system
      approved by ACO-300, with immediate guard response capability.
      Frequent and irregular checks should be made of the area.                

      4.  Keyed Equipments.  Equipments which must be stored in a keyed
      condition must be protected in a manner consistent with the
      classification of the keying variable they contain.  Protection
      provided may never be less than for the classification of the
      unkeyed condition of the equipment.                                      

      5.  Split Variables.  Security procedures for equipments
      utilizing split variables will normally be addressed in the
      handling and security doctrine for the specific system.  In most
      cases, removal of part of a split variable permits the equipment
      to be handled as if it were unkeyed.
                          SECTION 2.  DISTRIBUTION                             

      1.  General.  COMSEC custodians are responsible for ensuring that
      keying materials are properly prepared for shipment, that only
      authorized means of shipment are used, that accounting and
      transfer reports are submitted on a timely basis, and that
      packages are examined upon receipt for signs of tampering and
      possible tampering reported.                                             

           a.  Preparation for Shipment.                                       

                (1)  Wrapping:  Keying material will be double-wrapped
      and securely sealed prior to shipment.                                   

                (2)  Markings:                                                 

                     (a)  Inner wrapping will be marked with the
      security classification of the material, "TO" and "FROM"
      addressees, the COMSEC account number, and the instruction "ATTN:
      COMSEC Custodian", or "To Be Opened Only By COMSEC Custodian" or
      equivalent, and the "CRYPTO" marking.                                    

                     (b)  Outer wrappings will contain the "TO" and
      "FROM" addressees and any other notations to facilitate delivery.
      The outer wrapping of the package shall not reveal whether the
      package contains classified information or keying material.
      Material transmitted by State Department diplomatic pouch must
      indicate that "Courier Accompaniment is Required."                       

           b.  Methods of Transmittal.                                         

                (1)  Keying materials must be moved in the custody of
      authorized, and, if classified material is involved, cleared
      department, service, agency, or contractor couriers, U.S.
      Diplomatic Courier Service, or Department of Defense Courier
      Service.  Refer to Annex B, NACSI 4005/AFR 56-13.                        

                (2)  For TOP SECRET keying material, two-person
      integrity controls shall apply whenever local couriers are used
      to transport TOP SECRET key material from a user COMSEC account
      to another user account or location.  Refer to NTISSI 4005.
      Controls shall apply whenever local couriers are used to
      transport TOP SECRET key material from a user COMSEC account to
      another user account or location.  Refer to NTISSI 4005.                 

                        FOR OFFICIAL USE ONLY
                      PUBLIC AVAILABILITY TO BE
                    DETERMINED UNDER 5 U.S.C. 552

               APPENDIX 8. ROUTINE DESTRUCTION AND EMERGENCY 
 PROTECTION OF COMSEC MATERIAL                      

      1.  INTRODUCTION.  This appendix implements the provisions of
      NTISSI Number 4004/AFR 56-5, and establishes standards and
      procedures for the routine and emergency destruction of COMSEC
      materials within the FAA.  The security that is achieved through
      the proper use of contemporary U.S. cryptosystems is heavily
      dependent upon the physical protection which is afforded the
      associated keying material.  Current and superseded keying
      material is extremely sensitive, since its compromise potentially
      exposes to compromise all traffic encrypted with it.                     

      2.  POLICY.                                                              

           a.  Keying Material.  Keying material must be destroyed as
      soon as possible after it has been superseded or has otherwise
      served its intended purpose.  Destruction reports are submitted
      in accordance with AFKAG-2.                                              

           b.  Defective or Faulty Key Material.  As an exception to
      the stated policy defective or faulty key will not be destroyed.
      Instead material in these categories will be reported to
      AFCSC/MMIA, through COMSEC channels, with information copies to
      DIRNSA/S042, and ACS-300.  The material will be held for
      disposition instructions.                                                

           c.  Superseded or Obsolete Cryptoequipment.  Destruction of
      superseded or obsolete cryptoequipment and its supporting
      documentation is also required.  FAA COMSEC accounts will request
      disposition instructions from AFCSC/MMIA.
           d.  Waste Paper Material.  All waste paper material, whether
      containing classified information or not, which is removed from
      the secure telecommunications facility or from the associated
      teletypewriter equipment area, shall be safeguarded and destroyed
      as classified waste.  Teletypewriter, printer, and typewriter
      ribbons used to process classified information will also be
      safeguarded and destroyed as classified material.                        

               SECTION 1.  PROCEDURES FOR ROUTINE DESTRUCTION
                             OF COMSEC MATERIAL                                

      3.  GENERAL.                                                             

           a.  Routine Destruction.  Routine destruction will normally
      be accomplished by the COMSEC custodian and the alternate COMSEC
      custodian(s).  However, this restriction should not preclude
      granting the authority to perform destruction of superseded
      material to additional appropriately cleared persons, who then
      certify the destruction to the COMSEC custodian, if such action
      is required to avoid delay in accomplishing the destruction.  The
      terms "appropriately cleared" and "cleared" mean possession of a
      security clearance for the highest classification of material to
      be destroyed.                                                            

           b.  FAA COMSEC Activities.  In FAA facilities the COMSEC
      custodian, alternate custodian, or appropriately cleared person
      designated by the custodian, will accomplish actual destruction
      in the presence of a cleared witness.                                    

           c.  Requirements.
                (1)  Routine destruction may be accomplished at the
      using facility by a cleared individual and witness.  The issuing
      COMSEC custodian must be advised by the user, either verbally or
      in writing, that the user has destroyed the material.  Verbal
      confirmation must be followed up with written confirmation of
      destruction as soon as possible.  For accounting purposes the
      COMSEC custodian will then consider the material destroyed.  In
      such cases, the COMSEC custodian must brief the user on the
      necessity for prompt and complete destruction of superseded
      keying material, and for prompt reporting of any loss of control
      of material before destruction could be accomplished.                    

                (2)  Extreme care must be taken not to accidentally
      destroy COMSEC material.  Do not destroy COMSEC material unless
      one or more of the following conditions exists:                          

                     (a)  The COMSEC custodian has issued instructions
      to the user.  For example, the material is listed on the COMSEC
      custodian's formal monthly destruction report or in a status
      document, such as AFKAG-14, as being authorized for destruction.         

                     (b)  A superseding document authorizes, in its
      handling instructions, the superseded document to be destroyed.          

                     (c)  The controlling authority supersedes the
      document and authorizes its destruction.                                 

                     (d)  Emergency destruction plans are in effect.           

                (3)  Destruction and witnessing officials for user
      accounts must be appointed in writing and a copy provided to the
      COMSEC custodian.                                                        

                (4)  The user records destruction of legend 1 and 2
      material by preparing two copies of each destruction report (SF
      153).  Users will send one copy to the COMSEC custodian and
      retain the other in the user COMSEC account files.                       

      4.  SCHEDULING ROUTINE DESTRUCTIONS.                                     

           a.  Keying Material.  Keying material designated CRYPTO
      which has been issued for use should be destroyed as soon as
      possible after supersession.  In any event, the destruction
      should be accomplished within not more than 12 hours after
      supersession.  Where special circumstances prevent compliance
      with the 12-hour standard the FAA facility manager having
      responsibility for COMSEC operations may grant an extension of up
      to 24 hours.                                                             

           b.  Complete Editions of Key Material.  Complete editions of
      superseded keying material designated CRYPTO which are held by a
      user account shall be destroyed within 5 days after supersession.
      Every effort must be made by COMSEC personnel however, to destroy
      the superseded material within the 12 hour period established as
      the standard.                                                            

           c.  Maintenance and Sample Key Material.  Maintenance and
      sample keying material not designated CRYPTO is not regularly
      superseded and need only be destroyed when physically
      unserviceable.                                                           

           d.  Classified COMSEC Publications.  Superseded classified
      COMSEC publications which are held by a user COMSEC account shall
      be destroyed within 15 days after supersession.  Every effort
      must be made by COMSEC account personnel to destroy superseded
      material within the 12 hour standard period.                             

           e.  Amendment Residue.  The residue of entered amendments to
      classified COMSEC publications shall be destroyed within 5 days
      after entry of the amendment.                                            

           f.  Compromised Material.  Compromised material will be
      destroyed no later than 12 hours after receipt of disposition
      instructions.  DO NOT destroy the COMSEC material involved in an
      investigation unless directed by NSA or AFCSC.                           

           g.  Correspondence.  When it has no further value destroy
      correspondence concerning superseded documents and material.             

      5.  ROUTINE DESTRUCTION METHODS.                                         

           a.  General.  The authorized methods for routinely
      destroying paper COMSEC material are burning, pulverizing or
      chopping, crosscut shredding, and pulping.  Nonpaper COMSEC
      material authorized for routine destruction must be destroyed by
      burning, chopping or pulverizing, or chemical alteration.  FAA
      COMSEC custodians are responsible for ensuring that destruction
      of paper COMSEC material is accomplished using an NSA-approved
      paper destruction device (some of which are also approved for
      destruction of printed circuit boards), and employing
      NSA-approved destruction methods.  In addition to the guidance
      provided in this order, all FAA COMSEC custodians must also be
      familiar with, and abide by, the requirements for destruction
      reflected in the following references:                                   

                (1)  NSA-approved paper destruction devices are listed
      in Annex B, NTISSI 4004/AFR 56-5.                                        

                (2)  NSA-approved destruction methods are explained in
      Annex C, NTISSI 4004/AFR5 6-5.
           b.  Paper COMSEC Material.  The criteria given below apply
      to classified COMSEC keying material and media which embody,
      describe, or implement a classified cryptographic logic.  Such
      media include full maintenance manuals, cryptographic
      descriptions, drawings of cryptographic logics, specifications
      describing a cryptographic logic, and cryptographic software.
      Other paper COMSEC material may be destroyed by any means that
      are listed in Chapter 9, FAA Order 1600.2C that are approved for
      other paper material of equal classification or sensitivity.             

                (1)  When destroying paper COMSEC material by burning,
      the combustion must be complete so that all material is reduced
      to white ash, and contained so that no burned pieces escape.
      Ashes must be inspected and, if necessary, broken up or reduced
      to sludge.                                                               

                (2)  When pulping, pulverizing, or chopping devices are
      used to destroy paper COMSEC material, they must reduce the
      material to bits no larger than 5 millimeters (0.197 inches) in
      any dimension.                                                           

                (3)  DO NOT PULP paper-mylar-paper key tape or high wet
      strength paper (map stock) and durable-medium paper substitute
      (e.g., TYVEC olefin, polyethylene fiber).  These materials will
      not reduce to pulp, and must be destroyed by burning,
      pulverizing, chopping or crosscut shredding.                             

                (4)  When crosscut (double cut) shredders are used to
      destroy COMSEC material, they must reduce the material to shreds
      not more than 3/64-inch (1.2 mm) in width and not more than
      1/2-inch (13 mm) in length, or not more than 1/35-inch (0.73 mm)
      in width and not more than 7/8-inch (22.2 mm) in length.                 

           c.  Nonpaper COMSEC Material.  The authorized methods of
      routinely destroying nonpaper COMSEC material are burning,
      melting, chopping, pulverizing, and chemical alteration.  The
      material must be destroyed to the extent that there is no
      possibility of reconstructing classified information by physical,
      chemical, electrical, optical, or other means.                           

                (1)  Microforms.  Microforms (microfilm, microfiche, or
      other reduced-image photo negatives), may be destroyed by burning
      or by chemical means, such as immersion in household bleach (for
      silver film masters), or acetone or methelyne chloride (for diazo
      reproductions) for approximately 5 minutes.  When destroying by
      chemical means, film sheets must be separated and roll film must
      be unrolled.  Refer to Annex C, NTISSI 4004/AFR 56-5, for
      additional methods and guidance.  Use caution when destroying by
      chemical means to avoid potential hazards.  Protective clothing
      and goggles should be worn.                                              

                (2)  Magnetic Media.  Magnetic or electronic storage or
      recording media are handled on an individual basis.  Refer to
      Annex C, NTISSI 4004/AFR 56-5.                                           

                (3)  Plastic Canisters.  The objective in destroying
      plastic canisters used to hold keying material is to disfigure
      the two large flat surfaces (sides) of the canister.  This can be
      accomplished by inserting the canister inside a zip-lock bag and
      either puncture or smash the empty canister.  An empty canister
      will shatter.  Do not attempt to destroy an empty canister
      without the noted safety precautions included in the handling
      instructions.  Zip-lock bags are not furnished with the
      canisters.  Adequate safety precautions must be taken to prevent
      injuries that could. be caused by flying pieces of plastic when
      the canister shatters.                                                   

           d.  COMSEC Equipment and Components.  Routine destruction of
      COMSEC equipment and components is NOT AUTHORIZED.  Equipment
      which is unserviceable and cannot be repaired, or which is no
      longer required shall be reported to ANC-120, and to ACO-300
      through the appropriate region/center servicing security element.
      Custodians should review and be familiar with the procedures
      contained in AFKAG-2, USAF COMSEC Accounting Procedures, for
      returning COMSEC equipment and components.  Equipment which is
      unserviceable or no longer required will be retained until
      disposition instructions are provided.                                   

      6.  REPORTING ROUTINE DESTRUCTION.                                       

           a.  General.  FAA COMSEC accounts will report routine
      destruction in accordance with guidance in chapter 6, AFKAG-2.
      FAA accounts and users must destroy and witness all classified
      COMSEC material and record the destruction on an SF 153.                 

           b.  Legend 1 and 2 Material.  Users of keycards, keytapes,
      and keylists will:                                                       

                (1)  Use the destruction record provided with the
      material to record destruction of each day's key settings as soon
      as possible after supersession but no later than 72 hours.  FAA
      facilities which have a normal Monday through Friday operation
      are authorized superseded weekend key settings on the Monday
      following that particular weekend.  If the supersession date
      falls on a non-duty day, return the material on the first duty
      day thereafter.                                                          

                (2)  Return keycard booklet covers or keylist booklets
      or keytape canisters and records of destruction as well as unused
      emergency key settings to the issuing FAA custodian or destroy as
      directed by the custodian no later than 24 hours after monthly
      supersession.                                                            

           c.  Legend 3 or 5 Material.                                         

                (1)  Superseded legend 3 or 5 material must be
      destroyed as soon as possible after use, but no later than 12
      hours after supersession.  The 12-hour time limit is authorized
      for use only when mission requirements preclude immediate
      destruction.                                                             

                (2)  Destroy Secret and Confidential COMSEC material
      (by appropriately cleared destruction and witnessing officials)
      and certify destruction on an SF-153.                                    

                (3)  FAA users will retain certificates of destruction
      (SF 153, COMSEC Material Report, or AFCOMSEC Form 1) for all
      classified legends 3 and 5 material for a period of 2 calendar
      years.                                                                   

           d.  Disposing of Legend 4 Material.  Classified or
      unclassified material is accountable to AFCSC by the accounting
      number or by the quantity on initial receipt and must be reported
      to AFCSC when it is transferred or becomes excess.                       

                (1)  When accounting legend 4 material is no longer
      needed or superseded, users must return the material, except
      amendment residue, to the issuing COMSEC account.                        

                (2)  FAA COMSEC accounts will forward a decrease
      request for the legend 4 material according to AFKAG-2.                  

                (3)  The issuing COMSEC account must destroy and
      witness classified legend 4 COMSEC material.  Destruction is
      recorded on an SF-153.                                                   

           e.  Destruction and Witnessing Official.  Both the
      destruction and the witnessing officials must sign all
      destruction reports subject to the following rules:                      

                (1)  The FAA COMSEC custodian, or alternate COMSEC
      custodian in the absence of the custodian, must sign the
      AFCSC-prepared monthly destruction report.                               

                (2)  Within FAA COMSEC accounts grade requirements are
      as specified in chapter 2, of this directive.                            

                (3)  For FAA COMSEC users, the destruction official
      will be an appropriately cleared responsible individual.  There
      is no grade requirement specified formally for users, therefore,
      facility and activity managers having responsibility for COMSEC
      must use their discretion when appointing responsible
      individuals, and must ensure that these individuals are
      trustworthy and knowledgeable.                                           

                (4)  Clearance requirements are:                               

                     (a)  Within FAA COMSEC-accounts, the witnessing
      official must meet the clearance requirements of the COMSEC
      material being destroyed.  If, for any reason, no one is
      available who meets this requirement, the COMSEC custodian may
      waive the clearance requirement for the witnessing official, in
      which case the witnessing official's examination of the material
      to be destroyed must be confined to the front cover of the
      material.                                                                

                     (b)  For FAA users, the witnessing official must
      meet the clearance requirements of the material being destroyed.
      In an emergency, the destruction official may waive the clearance
      requirement of the witnessing official, subject to the same
      precautions noted in (a), above.                                         

                           FOR OFFICIAL USE ONLY
                         PUBLIC AVAILABILITY TO BE
                        DETERMINED UNDER 5 U.S.C. 552


TOP-SECRET: Soviets Planned Nuclear First Strike to Preempt West, Documents Show

Soviets Planned Nuclear First Strike to
Preempt West, Documents Show

Warsaw Pact Allies Resented Soviet Dominance and “Nuclear Romanticism”

Bloc Saw Military Balance in West’s Favor from 1970s On, Especially in Technology

New Volume of Formerly Secret Records Published on 50th Anniversary of Warsaw Pact

National Security Archive Electronic Briefing Book No. 154

For more information contact
Vojtech Mastny 202/415-6707
Malcolm Byrne – 202/994-7043

May 13, 2005

Read “The Warsaw Pact, gone with a whimper”
by Malcolm Byrne and Vojtech Mastny
The International Herald Tribune
May 14, 2005
“The Warsaw Pact, gone with a whimper”
by Malcolm Byrne and Vojtech Mastny, International Herald Tribune, May 14, 2005

Advance praise for new volume:

A “remarkable book … not just a story for experts or historians – it is a chronology of significance and an era we must never forget.”
The Rt. Hon. Lord Robertson of Port Ellen, NATO Secretary General ’99-’03

“A remarkable achievement … [T]his pioneer effort will be an indispensable resource for Cold War scholars.”
Lawrence S. Kaplan, Georgetown U., author of NATO Divided, NATO United

“[T]his invaluable volume illuminates not only the ‘inside history’ of the Warsaw Pact, but, as reflected in that story, the history of Soviet-East European relations.”
William Taubman, Amherst College, Pulitzer Prize-winning author of Khrushchev: The Man and His Era

“[Mastny] and Byrne are to be congratulated for producing this monumental volume, with a trove of translated documents that is a major boon to both scholars and teachers.”
William E. Odom (Lt. Gen., Ret.), former Director, U.S. National Security Agency, author of The Collapse of the Soviet Military

Washington D.C. August 13 th, 2011 – The Soviet-led Warsaw Pact had a long-standing strategy to attack Western Europe that included being the first to use nuclear weapons, according to a new book of previously Secret Warsaw Pact documents published tomorrow. Although the aim was apparently to preempt NATO “aggression,” the Soviets clearly expected that nuclear war was likely and planned specifically to fight and win such a conflict.

The documents show that Moscow’s allies went along with these plans but the alliance was weakened by resentment over Soviet domination and the belief that nuclear planning was sometimes highly unrealistic. Just the opposite of Western views at the time, Pact members saw themselves increasingly at a disadvantage compared to the West in the military balance, especially with NATO’s ability to incorporate high-technology weaponry and organize more effectively, beginning in the late 1970s.

These and other findings appear in a new volume published tomorrow on the 50th anniversary of the founding of the Warsaw Pact. Consisting of 193 documents originating from all eight original member-states, the volume, A Cardboard Castle? An Inside History of the Warsaw Pact, 1955-1991, provides significant new evidence of the intentions and capabilities of one of the most feared military machines in history.

Highlights of the 726-page volume include highly confidential internal reports, military assessments, minutes of Warsaw Pact leadership meetings, and Politburo discussions on topics such as:

* The shift beginning in the 1960s from defensive operations to plans to launch attacks deep into Western Europe. (Documents Nos. 16, 20a-b, 21)

* Plans to initiate the use of nuclear weapons, ostensibly to preempt Western first-use. (Documents Nos. 81, 83)

* Soviet expectations that conventional conflicts would go nuclear, and plans to fight and win such conflicts. (Documents Nos. 81, 83)

* The deep resentment of alliance members, behind the façade of solidarity, of Soviet dominance and the unequal share of the military burden that was imposed on them. (Documents Nos. 4-6, 33-37, 47, 52)

* East European views on the futility of plans for nuclear war and the realization that their countries, far more than the Soviet Union, would suffer the most devastating consequences of such a conflict. (Documents Nos. 22b, 38, 50, 52)

* The “nuclear romanticism,” primarily of Soviet planners, concerning the viability of unconventional warfare, including a memorable retort by the Polish leader that “no one should have the idea that in a nuclear war one could enjoy a cup of coffee in Paris in five or six days.” (Documents Nos. 31, 115)

* Ideologically warped notions of Warsaw Pact planners about the West’s presumed propensity to initiate hostilities and the prospects for defeating it. (Documents Nos. 50, 73, 79, 81)

* The impact of Chernobyl as a reality check for Soviet officials on the effects of nuclear weapons. (Document No. 115)

* The pervasiveness and efficacy of East bloc spying on NATO, mainly by East Germans (Documents Nos. 11, 28, 80, 97, 109, 112)

* Warsaw Pact shortcomings in resisting hostile military action, including difficulties in firing nuclear weapons. (Documents Nos. 44, 143)

* Data on the often disputed East-West military balance, seen from the Soviet bloc side as much more favorable to the West than the West itself saw it, with the technological edge increasingly in Western favor since the time of the Carter administration (Documents Nos. 47, 79, 81, 82, 130, 131, 135, 136)

The motives accounting for the Warsaw Pact’s offensive military culture included not only the obsessive Soviet memory of having been taken by surprise by the nearly fatal Nazi attack in June 1941 but primarily the ideological militancy of the Marxist-Leninist doctrine that posited irreconcilable hostility of the capitalist adversaries. The influence of the doctrine explains, for example, the distorted interpretation of secret Western planning documents that were unequivocally defensive documents to which Warsaw Pact spies had extensive access. So integral was the offensive strategy to the Soviet system that its replacement by a defensive strategy under Gorbachev proved impossible to implement before the system itself disintegrated.

The Soviet military, as the ideologically most devoted and disciplined part of the Soviet establishment, were given extensive leeway by the political leadership in designing the Warsaw Pact’s plans for war and preparing for their implementation. Although the leadership reserved the authority to decide under what circumstances they would be implemented and never actually tried to act on them, the chances of a crisis spiraling out of control may have been greater than imagined at the time. The plans had dynamics of their own and the grip of the aging leadership continued to diminish with the passage of time.

The new collection of documents published today is the first of its kind in examining the Warsaw Pact from the inside, with the benefit of materials once thought to be sealed from public scrutiny in perpetuity. It was prepared by the Parallel History Project on NATO and the Warsaw Pact (PHP), an international scholarly network formed to explore and disseminate documentation on the military and security aspects of contemporary history. The book appears as part of the “National Security Archive Cold War Reader Series” through Central European University Press.

The PHP’s founders and partners are the National Security Archive, a non-governmental research organization based at The George Washington University; the Center for Security Studies at ETH Zurich; the Institute for Strategy and Security Policy at the Austrian Defense Academy in Vienna; the Machiavelli Center for Cold War Studies in Florence; and the Norwegian Institute for Defence Studies in Oslo.

In addition to documents, the volume features a major original essay by Vojtech Mastny, a leading historian of the Warsaw Pact, and contextual headnotes for each document by co-editor Malcolm Byrne. A detailed chronology, glossaries and bibliography are also included.

The documents in the collection were obtained by numerous scholars and archivists, many of them associated with PHP and its partners, including the Cold War International History Project at the Woodrow Wilson International Center for Scholars in Washington D.C.

The vast majority of the documents were translated especially for this volume and have never previously appeared in English.

Attached to this notice are ten representative documents taken from the list above. They appear as they do in the volume, i.e. with explanatory headnotes at the top of each item.

The documents in their original languages can be found in their entirety on the Center for Security Studies website.

On Saturday, May 14, a book launch for A Cardboard Castle? will take place in Warsaw at the Military Office of Historical Research. The address is: 2, ul. Stefana Banacha, Room 218. It will begin at 11:30 a.m. Speakers include:

* Gen. William E. Odom, former Director, U.S. National Security Agency
* Gen. Tadeusz Pioro, senior Polish representative to the Warsaw Pact
* Brig. Gen. Leslaw Dudek, Polish representative to the alliance
* Prof. dr. hab. Andrzej Paczkowski, Polish Academy of Sciences
* Dr hab. Krzysztof Komorowski, Military Office of Historical Research
* Prof. dr hab. Wojciech Materski, Polish Academy of Sciences

Documents
Note: The following documents are in PDF format.
You will need to download and install the free Adobe Acrobat Reader to view.

Below are ten representative documents from A Cardboard Castle?. They are numbered as they are in the volume and include explanatory headnotes at the top of each item. Links to the original documents — in their orginal languages — appear at the end of each entry.

Document No. 16: Speech by Marshal Malinovskii Describing the Need for Warsaw Pact Offensive Operations, May 1961 – original language

Document No. 21: Organizational Principles of the Czechoslovak Army, November 22, 1962 – original language

Document No. 50: Memorandum of the Academic Staff of the Czechoslovak Military Academies on Czechoslovakia’s Defense Doctrine, June 4, 1968 – original language

Document No. 64: Report by Ceaus,escu to the Romanian Politburo on the PCC Meeting in Budapest, March 18, 1969 – original language

Document No. 81: Marshal Ogarkov Analysis of the ?Zapad? Exercise, May 30-June 9, 1977 – original language

Document No. 83: Soviet Statement at the Chiefs of General Staff Meeting in Sofia,
June 12-14, 1978 – original language

Document No. 109: East German Intelligence Assessment of NATO?s Intelligence on the Warsaw Pact, December 16, 1985 – original language

Document No. 115: Minutes of the Political Consultative Committee Party Secretaries? Meeting in Budapest, June 11, 1986 – original language (part 1 – part 2 – part 3)

Document No. 136: Summary of Discussion among Defense Ministers at the Political Consultative Committee Meeting in Warsaw, July 15, 1988 – original language (part 1 – part 2)

Document No. 143: Czechoslovak Description of ?Vltava-89? Exercise, May 23, 1989 – original language

TOP-SECRET: U.S. ESPIONAGE AND INTELLIGENCE

U.S. ESPIONAGE AND INTELLIGENCE
Aerial reconnaissance photograph of Severodvinsk Shipyard, the largest construction facility in the Soviet Union, taken by a KH4-B spy satellite on February 10, 1969.
Organization, Operations, and Management, 1947-1996


Aldrich Ames is arrested by the FBI as he leaves his house on February 21, 1994. In the aftermath of World War II, with the Cold War looming on the horizon, the United States began the process of developing an elaborate peacetime intelligence structure that would extend across a number of government departments. The operations of the U.S. intelligence community during the Cold War would range from running single agents, to marshaling the talents of thousands to build and deploy elaborate spy satellites.

The end of the Cold War brought major changes, but not the end of the U.S. government’s requirement for an elaborate intelligence structure. A number of intelligence organizations have been consolidated or altogether eliminated. New organizations have been established to provide more coherent management of activities ranging from military espionage, to imagery collection, to the procurement of airborne intelligence systems. The end of the Cold War has brought about the declassification of much information about intelligence organization and espionage activities that took place prior to the collapse of the Soviet Union.


Focus of the Collection

CIA Headquarters, Langley, VirginiaU.S. Espionage and Intelligence: Organization, Operations, and Management, 1947-1996 publishes together for the first time recent unclassified and newly declassified documents pertaining to the organizational structure, operations, and management of the U.S. intelligence community over the last fifty years, cross-indexed for maximum accessibility. This set reproduces on microfiche 1,174 organizational histories, memoranda, manuals, regulations, directives, reports, and studies, representing over 36,102 pages of documents from the Office of the Director of Central Intelligence, the Central Intelligence Agency, National Reconnaissance Office, National Security Agency, Defense Intelligence Agency, military service intelligence organizations, National Security Council and other organizations.

U.S. Espionage and Intelligence presents a unique look into the internal workings of America’s intelligence community. The documents gathered here shed further light on U.S. intelligence organization and activities during the Cold War, and describe the consolidation and reevaluation of the intelligence community in the post-Cold War era. They are drawn from diverse sources, including the National Archives, manuscript collections in the Library of Congress, court files of major espionage prosecutions, presidential libraries, and most importantly, Freedom of Information Act requests. The result of this effort is an authoritative documents publication which, together with the National Security Archive’s previous collection on the structure and operations of the U.S. intelligence community, The U.S. Intelligence Community: 1947-1989, published in early 1990, provides a comprehensive record of U.S. espionage and intelligence activities since World War II.

U.S. Espionage and Intelligence provides a wealth of information and documentation on key aspects of intelligence organization and operations during and after the Cold War, including such extraordinary topics as:

  • the evolution of the CIA
  • the development and operation of key reconnaissance systems (SR-71, CORONA)
  • the consolidation of Defense Department intelligence
  • intelligence performance during the Persian Gulf War
  • damage assessments of Aldrich Ames’ espionage activities

Significance of the Collection

The U.S. intelligence community has played a key role in advising presidents from Harry Truman to Bill Clinton on the intentions and activities of the Soviet Union, as well as of other nations. It also came to absorb a significant portion of the federal budget, reaching an approximate high of $30 billion in the late 1980s.

U.S. Espionage and Intelligence allows scholars direct access to the newly declassified, detailed primary documents that contain the history of the military, diplomatic, and intelligence components of the Cold War, and which go far beyond what is available in secondary sources. This new information is essential for reaching an accurate understanding of what was happening behind the scenes and how it related to the more public aspects of Cold War policy and operations.

The material contained in this set concerning the post-Cold War era is crucial in assessing the intelligence community’s performance in critical areas such as the Persian Gulf War and the Aldrich Ames case. The material is also vital in understanding the evolution of the intelligence community since the end of the Cold War and its possible future–for that evolution may significantly influence the ability of the intelligence community to deal with critical threats such as proliferation of weapons of mass destruction and terrorism.

One-Stop Access to Critical Documents

It would take a monumental effort, as well as many thousands of dollars, to duplicate the information contained in this collection. U.S. Espionage and Intelligenceallows a researcher– whether interested in the CIA, military intelligence, intelligence performance in the Persian Gulf War, or post-Cold War intelligence reform–to use one source at one location to access the thousands of pages of declassified material on the U.S. intelligence community available in this set.

Through U.S. Espionage and Intelligence the researcher gains access to a wide variety of documents: internal histories of the CIA and a variety of military intelligence organizations; program histories of the SR-71 and CORONA; director of central intelligence and Department of Defense directives establishing organizations such as the National Reconnaissance Office and the National Imagery and Mapping Agency; plans for the consolidation and reform of Defense intelligence organizations after the Cold War and memoranda implementing the reforms; and assessments of intelligence community performance in a number of areas.

In-depth Indexing Makes Every Document Accessible

The National Security Archive prepares extensive printed finding aids for its collections. In- depth indexing offers users remarkable ease and precision of access to every document in the set. The printed Index provides document-level access to subjects, individuals, and organizations, and represents a major research contribution in itself. Important transactions within each document are indexed individually using a controlled subjects vocabulary.

The Guide includes an essay, events chronology, glossaries of key individuals, organizations, and terms, document catalog, and a bibliography of secondary sources.

Research Vistas

With its depth of documentary detail, the collection enables researchers to explore

  • U.S. intelligence performance
  • Cold War history
  • evolution of the U.S. intelligence community and its components
  • U.S. intelligence collection activities

The Collection is a Necessity For:

  • Scholars and students of
    • intelligence
    • national security organization and operations
    • Cold War history
  • Journalists
  • Librarians and bibliographers
  • Concerned citizens

Sample Document Titles

01/15/62 Legal Basis for Cold-War Activities, Lawrence Houston, [Classification Excised] Memorandum

03/27/64 Directive 5105.23, National Reconnaissance Office, Department of Defense, Top Secret Directive 05/23/67 Report on Plots to Assassinate Fidel Castro, Central Intelligence Agency, Secret Memorandum

07/00/73 Allen Welsh Dulles as Director of Central Intelligence, 26 February 1953-29 November 1961, Central Intelligence Agency, Top Secret Biographic Sketch

00/00/82 History of the Navy HUMINT Program, United States Navy, Top Secret History

03/15/91 Plan for Restructuring Defense Intelligence, Assistant Secretary of Defense for Command, Control, and Communication Intelligence, Secret Report

01/06/92 Task Force Report on Greater CIA Openness, Director of Central Intelligence, [Classification Excised] Memorandum

06/01/92 DCID 2/9, Management of National Imagery Intelligence, Director of Central Intelligence, Secret Intelligence Directive

09/00/92 Appendixes A, B, and C to the Final Report: National Reconnaissance Program Task Force for the Director of Central Intelligence, National Reconnaissance Program Task Force, Secret Report

12/18/92 Directive 5200.37, Centralized Management of Department of Defense Human Intelligence (HUMINT) Operations, Department of Defense, [Classification Unknown] Directive

08/00/93 Intelligence Successes and Failures in Operations Desert Shield/Storm, House Committee on Armed Services, [Classification Unknown] Report

01/21/94 A Description of Procedures and Findings Related to the Report of the U.S. Environmental Task Force, King Publishing, Paper

12/07/95 Statement of the Director of Central Intelligence on the Clandestine Services and the Damage Caused by Aldrich Ames, Director of Central Intelligence, Statement

03/01/96 Preparing for the 21st Century: An Appraisal of U.S. Intelligence, Commission on the Roles and Capabilities of the United States Intelligence Community, Report

12/19/96 United States of America v. Harold J. Nicholson, Superseding Indictment, U.S. District Court, Eastern District of Virginia, Indictment

Overview

Title
U.S. Espionage and Intelligence: Organization, Operations, and Management, 1947-1996

Content
Reproduces on microfiche 1,174 U.S. government records totaling 36,102 pages of documentation concerning the organizational structure, operations, and management of the intelligence community from World War II to the present.
Materials were identified, obtained, assembled, and indexed by the National Security Archive.

Series
The Special Collections

Arrangement
Microfiche are arranged chronologically. For ease of use, each document bears a unique accession number to which all indexing is keyed.

Standards
The documents are reproduced on 35mm silver halide archivally permanent positive microfiche conforming to NMA and BSI standards. Any microfiche found to be physically substandard in any way will be replaced free of charge.

Indexing
A printed Guide and Index accompanies the microfiche collection. The Guide contains an events chronology, glossaries, chronological document catalog and a bibliography of secondary sources. The Index provides in-depth, document level access to subjects and individuals.

Date of Publication
April 1997


U.S. Espionage and Intelligence Project Staff

Project Director

Dr. Jeffrey T. Richelson, project director, is a senior fellow at the National Security Archive and coordinates the Archive’s projects on U.S. policy toward China and ongoing documentation on U.S. intelligence issues. He previously edited the Archive’s collections on presidential national security documents, the history of the U.S. intelligence community, and the military uses of space. A former associate professor at American University, he received his Ph.D. in political science from the University of Rochester. Among his many books are Sword and Shield: Soviet Intelligence and Security Apparatus (1986), American Espionage and the Soviet Target (1988), America’s Secret Eyes in Space (1990), and A Century of Spies: Intelligence in the Twentieth Century (1995). His articles have appeared in a wide variety of professional journals and in publications ranging from Scientific American to the Washington Post. He is a regular commentator on intelligence and military issues for national television and radio.

Project Staff

Michael Evans, Research Assistant
Jane Gefter, Research Assistant
Michael Watters, Research Assistant

U.S. Espionage and Intelligence Advisory Board

Christopher Andrew, Corpus Christi College, University of Cambridge author, For the President’s Eyes Only

Loch Johnson, Department of Political Science, University of Georgia author, Secret Agencies: U.S. Intelligence in a Hostile World

David Wise, author, Nightmover: How Aldrich Ames Sold the CIA to the KGB for $4.6 Million

Praise for U.S. Espionage and Intelligence, 1947-1996

“Serious students of the structure and operations of American intelligence rely on the work of the National Security Archive. The new collection of intelligence documents, compiled for the Archive by Jeffrey T. Richelson, helps to pierce the labyrinth.”

David Wise
Author of Nightmover: How Aldrich Ames Sold the CIA to the KGB for $4.6 Million

“An invaluable supplement to the National Security Archive’s previous collection, The U.S. Intelligence Community 1947-1989, this brings the most recently declassified documents to the reader. Jeffrey Richelson’s useful introduction also serves to detail changes that have occurred in the structure of the U.S. espionage establishment.”

John Prados
Author of Presidents’ Secret Wars