xcll commited on
Commit
ec8efb5
·
verified ·
1 Parent(s): 608ff59

Add files using upload-large-folder tool

Browse files
markdown/army/adp3_37.md ADDED
The diff for this file is too large to render. See raw diff
 
markdown/army/adrp1.md ADDED
The diff for this file is too large to render. See raw diff
 
markdown/army/adrp2_0.md ADDED
The diff for this file is too large to render. See raw diff
 
markdown/army/ar195-5.md ADDED
The diff for this file is too large to render. See raw diff
 
markdown/army/ar360-1.md ADDED
The diff for this file is too large to render. See raw diff
 
markdown/army/ar380-53.md ADDED
@@ -0,0 +1,777 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ## Security Communications Security Monitoring
2
+
3
+ Headquarters Department of the Army Washington, DC 23 December 2011
4
+
5
+ ## Summary Of Change Ar 38053 Communications Security Monitoring
6
+
7
+ This major revision, dated 23 December 2011--
8
+
9
+ o Renames Land Information Warfare Activity to 1st Information Operations
10
+ Command (para 1-4e(3)).
11
+ o Explains specific communications security monitoring activities (chap 2).
12
+ o Identifies the new military occupational specialties for communications
13
+ security monitoring (para 2-4h(2)).
14
+ o Adds information operations Red Team activities (chap 3). o Removes the requirement to obtain permission from the Assistant Secretary of
15
+ Defense for Networks and Information Integration to conduct communications security monitoring in the National Capital Region (throughout).
16
+ o Makes administrative changes (throughout).
17
+
18
+ ## Security Communications Security Monitoring
19
+
20
+ contained in this regulation may be modified by the proponent.
21
+
22
+ S u p p l e m e n t a t i o n . S u p p l e m e n t a t i o n o f this regulation and establishment of command and local forms are prohibited without prior approval from the Deputy Chief of Staff, G2 (DAMICDS), 1000 Army Pentagon, Washington, DC 203101000.
23
+
24
+ Suggested improvements. Users are invited to send comments and suggested improvements on DA Form 2028 (Recomm e n d e d C h a n g e s t o P u b l i c a t i o n s a n d B l a n k F o r m s ) d i r e c t l y t o H e a d q u a r t e r s , Department of the Army, Deputy Chief of S t a f f , G - 2 ( D A M I - C D S ) , 1 0 0 0 A r m y Pentagon, Washington, DC 203101000.
25
+
26
+ H i s t o r y . T h i s p u b l i c a t i o n i s a m a j o r revision.
27
+
28
+ S u m m a r y . T h i s r e g u l a t i o n p r e s c r i b e s U.S. Army policy for communications security monitoring. It implements NTISSD 600 and DODI 8560.01.
29
+
30
+ Distribution. This publication is available in electronic media only and is intended for command levels A, B, C, D, and E for the active Army, the Army National Guard/Army National Guard of the U n i t e d S t a t e s , a n d t h e U . S . A r m y Reserve.
31
+
32
+ Proponent and exception authority.
33
+
34
+ The proponent of this regulation is the Deputy Chief of Staff, G2. The proponent has the authority to approve exceptions or waivers to this regulation that are consistent with controlling law and regulations. The proponent may delegate this approval authority, in writing, to a division chief within the proponent agency or its direct reporting unit or field operating agency, in the grade of colonel or the civilian equivalent. Activities may request a waiver to this regulation by providing justification that includes a full analysis of t h e e x p e c t e d b e n e f i t s a n d m u s t i n c l u d e f o r m a l r e v i e w b y t h e a c t i v i t y ' s s e n i o r legal officer. All waiver requests will be e n d o r s e d b y t h e c o m m a n d e r o r s e n i o r leader of the requesting activity and forwarded through their higher headquarters t o t h e p o l i c y p r o p o n e n t . R e f e r t o A R 2530 for specific guidance.
35
+
36
+ Army internal control process. This regulation contains internal control provisions and identifies key internal controls that must be evaluated (see appendix C).
37
+
38
+ Applicability. This regulation applies to t h e a c t i v e A r m y , t h e A r m y N a t i o n a l Guard/Army National Guard of the United States, and the U.S. Army Reserve, unless otherwise stated. During mobilization or national emergency, chapters and policies
39
+
40
+ ## Contents (Listed By Paragraph And Page Number)
41
+
42
+ Chapter 1 Introduction, page 1
43
+ Purpose - 11, page 1 References - 12, page 1 Explanation of abbreviations and terms - 13, page 1
44
+ Responsibilities - 14, page 1
45
+ Chapter 2 Objectives and Requirements, page 2
46
+ Introduction - 21, page 2
47
+ Objectives - 22, page 3 Authorization to conduct communications security monitoring - 23, page 3
48
+ Prerequisites - 24, page 3
49
+ Training and standards for communications security monitoring - 25, page 4
50
+
51
+ ## ContentsContinued
52
+
53
+ Certification of notification procedures - 26, page 5 Use of monitoring products - 27, page 5 Acquisition of signals during maintenance and testing - 28, page 7 Foreign language communications - 29, page 7 Conduct of communications security monitoring, information operations Red Team activities, and Computer Defense Assistance Program - 210, page 7
54
+ Prohibitions on communications security monitoring, information operations Red Team, or penetration testing - 211, page 7
55
+ Communications security monitoring operations - 212, page 7 Communications security monitoring working materials - 213, page 8
56
+ Communications security monitoring reports - 214, page 9 Safeguarding communications security monitoring equipment - 215, page 9
57
+ Chapter 3 Information Operations Red Team, page 10
58
+ Explanation - 31, page 10
59
+ Attributes of effective Red Team activities - 32, page 10
60
+ Authorization to conduct red teaming - 33, page 10 Training and standards for Red Team activities - 34, page 10 Red Team operations - 35, page 11
61
+ Red teaming reports - 36, page 12
62
+ Chapter 4 Computer Defense Association Program, page 12
63
+ Introduction - 41, page 12
64
+ Objective - 42, page 12 Scope - 43, page 12 Authorization - 44, page 13 Computer Defense Association Program - 45, page 13
65
+ Computer Defense Association Program network assistance visit - 46, page 14
66
+ Penetration testing scope - 47, page 15 Computer Defense Assistance Program persistent penetration testing - 48, page 15
67
+ Chapter 5 Reporting violations, page 16
68
+ Oversight - 51, page 16 Reporting violations - 52, page 16
69
+
70
+ ## Appendixes
71
+
72
+ A.
73
+ References, page 17
74
+ B.
75
+ Forms of Monitoring Notification, page 20
76
+ C.
77
+ Internal Control Evaluation, page 20
78
+
79
+ ## Figure List
80
+
81
+ Figure 41: Program organization and structure, page 15
82
+
83
+ ## Glossary
84
+
85
+ 11. Purpose This regulation sets forth policies, responsibilities, and procedures for conducting communications security (COMSEC) monitoring, information operations (IO) Red Team activities, and Computer Defense Association Program (CDAP) activities within the Army and in support of Joint and combined operations and activities. This regulation implements Department of Defense instruction (DODI) 8560.01 and National Telecommunications and Information Systems Security Directive (NTISSD) 600. The principles of this regulation apply to all forms of COMSEC monitoring conducted by Army elements.
86
+
87
+ ## 12. References Required And Related Publications And Prescribed And Referenced Forms Are Listed In Appendix A. 13. Explanation Of Abbreviations And Terms Abbreviations And Special Terms Used In This Regulation Are Explained In The Glossary.
88
+
89
+ 14. Responsibilities a. General Counsel. The GC will (1) Review Department of the Army COMSEC monitoring policy for compliance with public law and national and Department of Defense (DOD) policies and regulations.
90
+
91
+ (2) Review and certify, in writing, biennially, that COMSEC monitoring notification procedures in effect are adequate throughout the Army.
92
+
93
+ (3) Review and approve COMSEC monitoring results for court use, in the event such results must be used for criminal prosecution.
94
+
95
+ (4) Review all requests for proposed COMSEC monitoring exercises, to include requests that are not based on an Army command (ACOM), Army service component command (ASCC), or direct reporting unit (DRU) request for approval (granted by the Deputy Chief of Staff, G2 (DCS, G2)).
96
+
97
+ b. The Judge Advocate General. TJAG will review all ACOM, ASCC, and DRU requests to conduct COMSEC
98
+ monitoring exercises prior to DCS, G2 approval.
99
+
100
+ c. The Inspector General. TIG will provide oversight of the Army's COMSEC monitoring program to ensure regulatory compliance.
101
+
102
+ d. Deputy Chief of Staff, G2. As the Secretary of the Army's single designee for COMSEC monitoring, the DCS, G2 will
103
+ (1) Develop, promulgate, and maintain Army COMSEC monitoring policy. (2) Grant waivers and exceptions to Army COMSEC monitoring policy after obtaining legal review from the GC
104
+ and TJAG.
105
+
106
+ (3) Review and approve biennial requests from ACOMs, ASCCs, and DRUs to perform COMSEC monitoring. (4) Certify the adequacy of Army COMSEC monitoring notification procedures of other DOD agencies when the Army monitoring elements operate jointly with DOD in support of Joint, combined, or multinational operations.
107
+
108
+ (5) Represent and defend the Army's interests pertaining to COMSEC monitoring at national and DOD Service meetings and working groups.
109
+
110
+ (6) Notify ACOM, ASCC, and DRU commanders before authorizing COMSEC monitoring that is not based on an ACOM, ASCC, or DRU request.
111
+
112
+ e. Commanding General, U.S. Army Intelligence and Security Command. The CG, INSCOM will (1) Provide Army support to the Joint COMSEC monitoring activity according to the most current Joint COMSEC
113
+ monitoring activity memorandum of agreement.
114
+
115
+ (2) Develop and disseminate the Army's techniques for conducting COMSEC monitoring.
116
+
117
+ (3) Through the commander, 1st Information Operations Command (1st IO CMD), develop and disseminate for the Army, techniques and procedures for conducting Information System (IS) security penetration and verification testing as it pertains to applicable phases of CDAP (see chap 4).
118
+
119
+ f. Commanding General, U.S. Army Training and Doctrine Command. The CG, TRADOC will (1) Develop, produce, and maintain an exportable standardized COMSEC monitoring training package to address the provisions of this regulation.
120
+
121
+ (2) Coordinate with the CG, INSCOM to incorporate results outlined in paragraphs 14e(2) and 14e(3) into the standardized training package.
122
+
123
+ g. Chief Information Officer/G6. The CIO/G6 maintains overall responsibility and oversight for policy and management of the Army computer emergency response team (ACERT) program. The CIO/G6 will
124
+ (1) Promulgate rules and procedures in AR 251 and AR 252, outlining system and network administrators'
125
+ responsibilities (vulnerability analysis) to keep the Army's IS operational and secure.
126
+
127
+ (2) Develop plans and policies to implement procedural and material protective measures and to validate requirements for protecting Army computers, communications, and command and control.
128
+
129
+ (3) Act as the Army's focal point for command and control protect. h. Administrative Assistant to the Secretary of the Army. The AASA (Director of Security Services) will
130
+ (1) Act as the ACOM, ASCC, and DRU head to ensure Secretariat, Army Staff, and field operating agency COMSEC monitoring compliance.
131
+
132
+ (2) Ensure COMSEC monitoring notification procedures are implemented and upheld (see paras 26 and 210). (3) Request authority to conduct COMSEC monitoring (see para 23). (4) Ensure personnel authorized to conduct COMSEC monitoring comply with the provisions of this regulation. (5) Ensure COMSEC monitoring products are used for their intended security purposes (see para 27). i. Deputy Chief of Staff, G3/5/7. The DCS, G3/5/7 will (1) Act as the Army Staff's operational focal point for IO.
133
+
134
+ (2) Exercise operational tasking authority over the 1st IO CMD, to include prioritization and validation of requests for 1st IO CMD COMSEC monitoring support.
135
+
136
+ j. Commanders of Army commands, Army service component commands, and direct reporting units. The commanders of ACOMs, ASCCs, and DRUs will
137
+ (1) Ensure COMSEC monitoring notification procedures are implemented and upheld (see paras 26 and 210). (2) Request authority to conduct COMSEC monitoring (see para 23). (3) Ensure personnel authorized to conduct COMSEC monitoring comply with the provisions of this regulation (see para 210).
138
+
139
+ (4) Ensure COMSEC monitoring products are used for their intended security purposes (see para 27). k. Commanders at all levels. The commanders will (1) Ensure COMSEC monitoring results are used only for their intended security purposes (see para 214). (2) Ensure a comprehensive and continuing COMSEC monitoring notification program is in effect (see paras 26
140
+ and 27).
141
+
142
+ (3) Ensure critical information is made available to COMSEC monitoring teams (see AR 5301). (4) Provide the necessary facilities and support (including security of COMSEC monitoring equipment and working materials) required by the monitoring element for the conduct of the mission.
143
+
144
+ ## Chapter 2 Objectives And Requirements
145
+
146
+ 21. Introduction a. DOD telecommunications systems are provided for official Government communications. When these systems are used by the Army components, they are subject to COMSEC monitoring, IO Red Team activities, and penetration testing as explained in this regulation.
147
+
148
+ b. COMSEC monitoring, IO Red Team activities, and penetration testing will be completed in a manner that satisfies the legitimate needs of the Army. Activities will be conducted to minimize the monitoring (purposely or inadvertently) of telecommunications not related to security objectives and will be performed in a manner that protects to the greatest degree possible the privacy and civil liberties of individuals whose telecommunications are subject to monitoring.
149
+
150
+ c. COMSEC monitoring, IO Red Team activities, and penetration testing are vulnerability assessment techniques that provide essential information not available through other sources for evaluating security within the Army.
151
+
152
+ d. COMSEC monitoring as discussed in this regulation does not pertain to the following: (1) The interception of wire and oral communications for law enforcement (LE) purposes as described in AR
153
+ 19053.
154
+
155
+ (2) Operations center communications monitoring as described in AR 19030. (3) Electronic surveillance as described in AR 38110. (4) Technical surveillance countermeasures. (5) TEMPEST (see glossary, sec II) as described in AR 38027. (6) Counterintelligence (CI) investigations. (7) Radio communications monitoring by net control stations to enforce net discipline.
156
+
157
+ (8) System and network administrators performing defensive IO functions to keep their own automated IS infrastructure operational and secure. This exemption is limited to performing vulnerability analysis of the operating systems of the IS directly under the control of the system and/or network administrators.
158
+
159
+ (9) Use of intrusion detection systems on the IS when the intrusion detection system is only used to monitor communications protocols, systems control information, and specific command and control, or words associated with commonly accepted or known penetration techniques.
160
+
161
+ (10) Research and evaluation development testing of the Army's telecommunications and IS, when such activities are performed in a lab environment using test-generated users or data.
162
+
163
+ (11) Classification of information as described in AR 3805.
164
+
165
+ 22. Objectives COMSEC monitoring is undertaken to
166
+ a. Collect operational signals needed to measure the degree of security being achieved by encryption, cryptographic equipment and devices, COMSEC techniques, and operations security (OPSEC) countermeasures.
167
+
168
+ b. Provide a basis from which to assess the type and value of information subject to loss through intercept and exploitation of official Government telecommunications.
169
+
170
+ c. Provide an empirical basis for improving the security of Army telecommunications against signals intelligence and other data exploitation.
171
+
172
+ d. Assist in determining the effectiveness of electronic attack; electronic protect, cover, and deception actions;
173
+ electronic warfare support; and OPSEC measures.
174
+
175
+ e. Identify Army telecommunications signals that exhibit unique external signal parameters, signal structures, modulation schemes, radio fingerprints, and so forth that could provide adversaries the capability to identify specific targets for subsequent geopositioning and exploitation purposes.
176
+
177
+ f. Provide empirical data to properly train users of Army telecommunications systems on COMSEC techniques and measures.
178
+
179
+ g. Evaluate the effectiveness of Army COMSEC education and training programs. h. Support defensive IO by identifying, verifying, and evaluating Army telecommunications and IS to exploit, degrade, or neutralize susceptibilities attempts.
180
+
181
+ 23. Authorization to conduct communications security monitoring COMSEC monitoring operations may be performed under the provisions of this regulation at the commander's discretion throughout the 2year approval cycle, provided the GC has certified adequacy of the command's notification procedures and the DCS, G2 has granted the command the authority to conduct the monitoring (see para 26a(1)).
182
+
183
+ 24. Prerequisites The following must occur before COMSEC monitoring, IO Red Team activities, and penetration testing can take place:
184
+ a. Users of official DOD telecommunications will be given notice that (1) Passing classified information over nonsecure DOD telecommunications systems (other than protected distribution systems or automated information systems accredited for processing classified information) is prohibited.
185
+
186
+ (2) Official DOD telecommunications systems are subject to monitoring at all times. (3) Use of official DOD telecommunications systems constitutes consent by the user to monitoring at any time.
187
+
188
+ b. The GC has certified the adequacy of the notification procedures in effect, and the GC and TJAG have given favorable legal review of any proposed COMSEC monitoring that is not based on an ACOM, ASCC, or DRU request.
189
+
190
+ c. The DCS, G2 has authorized monitoring to be conducted within the ACOM, ASCC, or DRU involved. d. Monitoring telecommunications systems of U.S. Government contractors at their own facilities require the express written approval of the chief executive officer or designee of the company. Requests for such monitoring will include a statement from the chief executive officer or designee outlining the notification procedures that have been implemented within the contractor's organization to afford notice to the contractor's employees (see para 24a). Such requests will be forwarded through command channels to the DCS, G2 (DAMICDS) for action. The DCS, G2 (DAMICDS) will obtain a legal review from TJAG and GC prior to taking any action. Requests must arrive at the DCS, G2 a minimum of 45 days prior to the date the monitoring is desired. The contractor's chief executive officer's approval is not required to monitor contractors who are performing duties in U.S. Government-controlled facilities.
191
+
192
+ e. Monitoring will not be conducted by Army personnel (Soldiers, civilians, or contractors employed by the Army)
193
+ on the telecommunications of another DOD component without the express written approval of the head (or designee) of that department or agency, unless the other DOD component is conducting the monitoring and Army personnel are serving only in a subordinate role.
194
+
195
+ f. One ACOM, ASCC, or DRU will not monitor the telecommunications or conduct IS penetration testing of another ACOM, ASCC, or DRU without the consent of that ACOM, ASCC, or DRU. The exception to this restriction is when the activity is directed by the DCS, G2.
196
+
197
+ g. Special attention will be provided to ensure monitoring operations avoid or filter out communications containing
198
+ privileged doctor-patient, lawyer-client, and chaplain-petitioner information.
199
+ h. Army COMSEC monitoring operations may be conducted only by the following personnel (Soldiers, civilians, or
200
+ contractors):
201
+ (1) Properly trained and certified personnel. (2) COMSEC monitoring personnel who possess the following military occupational specialties (MOS): (a) Enlisted Soldiers in career management field 35.
202
+ (b) Warrant officers in MOS 350 or MOS 352. (c) Commissioned officers in career management field 35.
203
+ (d) Personnel who have held MOS 05G or MOS 97G.
204
+ (3) Civilian intelligence specialists (IA0132) and security specialists (IA0080) assigned to monitoring billets. (4) Contractors whose statement of work specifically addresses COMSEC monitoring. i. All personnel conducting the Army COMSEC monitoring operations will acquire and maintain a security clearance based on a single scope background investigation.
205
+ 25. Training and standards for communications security monitoring COMSEC monitoring and related activities will be conducted in strict compliance with this regulation. Each individual involved in the conduct (collection and analysis) of COMSEC monitoring will receive formal training before participating in monitoring or penetration operations. All personnel will be knowledgeable and able to implement the provisions set forth in the following paragraphs, as instructed by a senior COMSEC certified person.
206
+
207
+ a. At a minimum, personnel will be trained on the following: (1) The provisions of this regulation, with particular emphasis on chapter 2. (2) The provisions of AR 38110. (3) The provisions of AR 38112. b. Formal training requirements to conduct monitoring operations may be fulfilled through either of the following: (1) Completion of a DOD COMSEC monitoring course. (2) Completion of an internal command training program using approved TRADOC course materials. The execution of command training programs will be approved by the DCS, G2 (DAMICDS).
208
+
209
+ c. For monitoring operations, the first lieutenant colonel (O5) or civilian equivalent (GS14) in the individual's chain of command will certify, in writing, the individual has been trained. A copy of this certification will be maintained on file at the monitoring unit, available for inspection by any inspector general (IG), oversight officer, or command inspector. Copies of these certifications will be provided to the DCS, G2 (DAMICDS) upon request.
210
+
211
+ d. When required, trained COMSEC monitoring mission supervisors may augment the COMSEC monitoring team's efforts with nontrained technical resources, provided
212
+ (1) The mission supervisor informs all nontrained personnel on the restrictions applied to COMSEC monitoring operations.
213
+
214
+ (2) All nontrained personnel work directly under a trained COMSEC monitoring supervisor. ( 3 ) T h e u s e o f n o n t r a i n e d p e r s o n n e l i s a p p r o v e d o n a c a s e - b y - c a s e b a s i s b y t h e A C O M , A S C C , o r D R U
215
+ commander.
216
+
217
+ e. Personnel participating in COMSEC monitoring will annually receive unit-level refresher training.
218
+
219
+ f. All personnel will cooperate fully with the Army and DOD GCs, intelligence oversight officers, and IGs, and will allow them access to all information necessary to perform their oversight responsibilities.
220
+
221
+ g. COMSEC monitoring equipment training will use signals that are subject to COMSEC monitoring, whenever possible. When those signals are not available, training in the use of COMSEC monitoring equipment may be conducted using those signals identified in paragraph 28a. When those signals identified in paragraph 28a are used to conduct COMSEC monitoring training, the following restrictions apply:
222
+ (1) The signal acquisition will be limited in extent and duration necessary to train personnel in the use of the equipment.
223
+
224
+ (2) No particular U.S. person's communications will be targeted without the specific written consent of that person. (3) The content of the telecommunications will be (a) Retained only when actually needed for training purposes.
225
+
226
+ (b) Disseminated only to persons conducting or participating in the training, except as provided in paragraph 27. (c) Destroyed immediately upon completion of the training.
227
+
228
+ h . W a i v e r s t o t h e p r o v i s i o n s o f p a r a g r a p h 2 - 5 w i l l b e g r a n t e d o n a n i n d i v i d u a l b a s i s b y t h e D C S , G - 2
229
+ (DAMICDS).
230
+
231
+ 26. Certification of notification procedures ACOM, ASCC, and DRU commanders will implement procedures to ensure all personnel are aware of the provisions of this regulation. Commanders must verify that their notification procedures are adequate.
232
+
233
+ a. Certification.
234
+
235
+ (1) The ACOM, ASCC, and DRU commanders will submit requests for certification to Headquarters, Department of the Army, DCS, G2 (DAMICDS), 1000 Army Pentagon, Washington, DC 203101000. Requests will arrive no later than 15 July of each odd-numbered year. Approval periods will run from 1 October (of each odd-numbered year) or date of certification by the GC (whichever is later) through 30 September (of the next odd-numbered year) to correspond with the fiscal year. Requests will include a detailed description of the notification procedures within the ACOM, ASCC, or DRU including the following:
236
+ (a) The exact wording of the warning notice on telephone directories. (b) The exact wording of the banner notice on IS. (c) The exact wording of the notice published quarterly in command bulletins, on command email (unclassified and classified), and similar publications and systems.
237
+
238
+ (d) A statement that DD Form 2056 (Telephone Monitoring Notification Decal) has been applied to all telephones and facsimile machines.
239
+
240
+ (e) A statement that command inprocessing includes a briefing that informs personnel that use of official telecommunications systems constitutes consent to monitoring.
241
+
242
+ (f) The identification of any other notification procedures used. (2) The DCS, G2 (DAMICDS) will review all requests to verify the presence of required information. The requests will be consolidated and forwarded to the GC for legal certification.
243
+
244
+ (3) Upon certification by the GC, the DCS, G2 (DAMICDS) will grant approval for the ACOM, ASCC, or DRU
245
+ to conduct COMSEC monitoring.
246
+
247
+ b. Forms of notification.
248
+
249
+ (1) Mandatory forms of notification. (a) Telephone or communications directory notice. Official Army telephone or communications directories, if published, will display the appropriate notice on the front cover or prominently within the general information section (see app B1).
250
+
251
+ (b) DD Form 2056.
252
+
253
+ 1. The DD Form 2056 will be applied to the front of all telephones (except tactical, cellular telephones, and portable electronic devices) within the Army.
254
+
255
+ 2. The DD Form 2056 will also be applied to the front of all secure telephone equipment, and so forth; however, the banner at the top of the form containing the words "DO NOT DISCUSS CLASSIFIED INFORMATION" will be removed or obliterated.
256
+
257
+ 3. The DD Form 2056 will be applied to the front of all data facsimile devices except those that are an internal part of another device (for example, a facsimile card in a personal computer). The DD Form 2056 will also be applied to the front of all secure data facsimile devices, but the words "DO NOT DISCUSS CLASSIFIED INFORMATION" will be removed.
258
+
259
+ (c) Computer logon, banner notice. See AR 252 for specific policy on the banner. (d) Periodic notices. Periodic notices will be published at least quarterly in command bulletins (see wording in app B1) via command unclassified and classified email and in similar publications and systems.
260
+
261
+ (2) *Optional forms of notification.* Optional forms of notification include the following:
262
+ (a) Periodic briefings and training classes for all assigned personnel. (b) Special memorandums from the commander or responsible senior staff officer to all personnel. (c) Local notification and consent procedures. ( d ) S t a t e m e n t s i n s t a n d i n g o p e r a t i n g p r o c e d u r e s , s i g n a l o p e r a t i o n i n s t r u c t i o n s , a n d s i m i l a r p u b l i c a t i o n s o r documents.
263
+
264
+ (e) The statement in appendix B2 may be placed on facsimile cover sheets. (3) *Waiver of mandatory forms of notification.* Requests for waivers to the mandatory forms of notification will be forwarded to the DCS, G2 (DAMICDS) for action.
265
+
266
+ 27. Use of monitoring products Communications security monitoring, IO Red Team activities, and CDAP products will be used only in pursuit of security objectives, except that
267
+ a. Information obtained either by COMSEC monitoring, IO Red Team activities, or CDAP may be used in connection with disciplinary or administrative action against Army personnel for knowing, willful, or negligent actions that result in the unauthorized disclosure of classified information (see AR 3805). In this case, the COMSEC monitoring, IO Red Team, or CDAP element is authorized to release names and recorded media regarding the telecommunications involved to the supported commander or designated representative for use as evidence. Procedures will be strictly adhered to as follows:
268
+ (1) The supported commander, after having consulted with the servicing judge advocate, will provide the COMSEC
269
+ monitoring, IO Red Team, or CDAP element with a written request, specifically identifying the telecommunications messages or communications required. The request will identify the servicing judge advocate consulted.
270
+
271
+ (2) The COMSEC monitoring, IO Red Team, or CDAP element will obtain a signed receipt from the supported commander or designated representative for the requested materials. The receipt will include a statement that the commander or representative is familiar with, and will comply with, the security requirements and privacy restrictions applicable to the material.
272
+
273
+ (3) The COMSEC monitoring, IO Red Team, or CDAP unit commander will notify the DCS, G2 (DAMICDS), in writing, within 5 working days of providing the material to the supported command.
274
+
275
+ b. Information may be obtained incidental to an authorized COMSEC monitoring, IO Red Team activity, or CDAP
276
+ mission that relates directly to a serious crime such as sabotage or threats or plans to commit offenses that threaten a life or could cause significant damage to or loss of official U.S. Government property (this includes data on official U.S. Government IS). This information will be reported immediately by the senior member of the COMSEC monitoring, IO Red Team, or CDAP team element present when the information is discovered.
277
+
278
+ (1) The commander of the COMSEC monitoring, IO Red Team, or CDAP element releasing the recorded media containing suspected criminal activity will notify the DCS, G2 (DAMICDS), in writing, of the circumstances within 24 hours of release of the material. The DCS, G2 (DAMICDS) will subsequently notify the GC. Notification will include the following:
279
+ (a) Nature of the suspected offense.
280
+
281
+ (b) Identification of the material released. (c) Date, time, and location where information was obtained.
282
+
283
+ (d) Anticipated action resulting from disclosure of the information.
284
+
285
+ (e) Location, name, and telephone number of the responsible individual where the materials are being held.
286
+
287
+ Note. Names or other data sufficient to identify any individuals who participated in the monitored communication will not be included in the report.
288
+
289
+ (2) When evaluating or assessing the security of Army IS, the COMSEC monitoring, IO Red Team, or CDAP
290
+ element may detect computer anomalies that could potentially be unauthorized intrusions into and from Army IS. When COMSEC monitoring, IO Red Team, or CDAP elements detect such anomalies, they must contact the systems administrator and/or information assurance security officer, or information assurance manager and regional computer emergency response team (RCERT) immediately. If the RCERT is not available then the systems administrator and/or network administrator, and/or information assurance security officer will contact the ACERT directly. In addition, report per local supervisory reporting policies in effect. The system administrator and/or RCERT will then follow the procedures of AR 252 for incident and intrusion reporting by taking measures to ascertain whether the anomaly is in fact an unauthorized intrusion, and by notifying CI and the criminal investigation division so that those organizations may conduct an investigation of the incident. The COMSEC monitoring, IO Red Team, or CDAP elements will not investigate and must discontinue monitoring the suspected intrusion as soon as the system administrator or RCERT is notified.
291
+
292
+ c. Whenever any information is officially reported to the commander under paragraphs 27a and 27b, above
293
+ (1) Stop all COMSEC monitoring, IO Red Team activities, or CDAP testing of the frequency, circuit, network, node, and/or individual device (unless under the exception of para 27b(2)) over which the information was obtained. Monitoring will not resume until
294
+ (a) All actions by the commander or LE agency related to the incident have been completed.
295
+
296
+ (b) The party involved in the incident no longer has access to the circuit, frequency, or network. (c) The commander has authorized resumption of the mission.
297
+
298
+ (2) The COMSEC monitoring, IO Red Team, or CDAP element team leader will immediately identify, mark as working papers, classify at a minimum of "Confidential," segregate, hold in suspense, and protect all recording media pertaining to the incident. If these materials are required for evidence, the following procedures will be used:
299
+ (a) The investigating commander or LE agency will request the recorded media, in writing, after having consulted with the local servicing judge advocate.
300
+
301
+ (b) COMSEC monitoring, IO Red Team, or CDAP element leader will obtain a signed receipt from the supported commander or designated representative for the requested materials. The receipt will include a statement that the commander or representative is familiar with, and will comply with, security requirements and privacy restrictions.
302
+
303
+ (c) The requesting agency will be informed that the recorded media will be returned to the monitoring element for final disposition when the materials are no longer required as evidence.
304
+
305
+ (3) The results of COMSEC monitoring, IO Red Team, or CDAP may not be used in a criminal prosecution without prior consultation with the GC and TJAG.
306
+
307
+ 28. Acquisition of signals during maintenance and testing
308
+ Maintenance and calibration of COMSEC monitoring equipment may require the acquisition of signals by maintenance personnel.
309
+ a. The following signals may be used without restriction: (1) Laboratory-generated signals. (2) Communications signals with the consent of all parties involved. (3) Commercial and public service broadcasts. (4) Noncommunication signals such as beacons, telemetry, and radar. b. Requests to use signals other than those listed above will be forwarded to the DCS, G2 (DAMICDS) for action.
310
+ 29. Foreign language communications a. Translation of foreign language conversations, messages, or data files that are recorded on official U.S. Government-owned or U.S. Government-leased telecommunication systems under the authority of this regulation is authorized.
311
+
312
+ b. Such communications may be translated by (1) A U.S. person with an appropriate U.S. security clearance. (2) A foreign national employee of the U.S. Armed Forces with a limited access authorization for this purpose (see AR 38067).
313
+
314
+ c. Translation must be done under the direct supervision of COMSEC monitoring personnel. Recordings and other working materials, including translations, will not be released outside the monitoring element, except as provided in paragraph 27 of this regulation. Transcripts will be treated as COMSEC monitoring working materials.
315
+
316
+ 210. Conduct of communications security monitoring, information operations Red Team activities, and Computer Defense Assistance Program a. COMSEC monitoring, IO Red Team activities, and CDAP may be conducted only for certified ACOMs, ASCCs, or DRUs that have notification procedures in place and approved by the GC, and when authorized by the DCS, G2.
317
+
318
+ b. COMSEC monitoring, IO Red Team activities, and CDAP will be conducted only in support of security objectives. COMSEC monitoring, IO Red Team activities, and CDAP will not be performed to support LE, criminal, or CI investigations.
319
+
320
+ c. COMSEC monitoring, IO Red Team activities, and CDAP will be conducted in (1) The least-intrusive manner possible. (2) A way that minimizes the monitoring of communications not relevant to security objectives. (3) A manner that ensures maximum privacy consistent with monitoring objectives. d. COMSEC monitoring, IO Red Team activities, and CDAP conducted by Army elements in support of Joint or combined operations and activities will be conducted in accordance with Joint or combined COMSEC monitoring and information assurance procedures, as long as those procedures have been reviewed and approved by the appropriate legal counsel.
321
+
322
+ 211. Prohibitions on communications security monitoring, information operations Red Team, or penetration testing a. COMSEC monitoring, IO Red Team, or CDAP activities, or the products of such activities, will not be used to enforce DOD policy limiting the use of official DOD telecommunications systems to the conduct of official business.
323
+
324
+ b. The results of COMSEC monitoring, IO Red Team, or CDAP activities will not be used to produce foreign intelligence or CI, as defined in executive order 12333 (EO 12333).
325
+
326
+ c. Credentialed CI and LE personnel are prohibited from performing or participating in COMSEC monitoring, IO
327
+ Red Team, or CDAP activities. CI personnel filling technical surveillance countermeasures billets are exempted from this provision.
328
+
329
+ 212. Communications security monitoring operations COMSEC monitoring operations include monitoring and/or recording telecommunications as well as the analysis of the material obtained.
330
+
331
+ a. COMSEC monitoring will be limited to official DOD telecommunications systems that are owned or leased by the U.S. Government for use by DOD personnel or the military departments.
332
+
333
+ b. Communications conducted over DOD telecommunications systems are assumed to be official communications subject to monitoring. However, recorded telecommunications will not be retained for a period greater than 30 days or disseminated if telecommunications have no relation to COMSEC monitoring objectives (except related to a crime) (see paras 22 and 27b).
334
+
335
+ c. COMSEC monitoring of wire line telephone systems will be conducted by bridging telephone lines before the point of connection between the DOD lines and the outside lines, as done at the main distribution frame. DOD
336
+ telecommunications may not be monitored when combined, multiplexed, or otherwise mixed with non-DOD telecommunications in such a way that monitoring of the non-DOD telecommunications is likely.
337
+
338
+ d. COMSEC monitoring of radio transmissions (other than those associated with cellular telephone systems) such as single channel voice radio, microwave, or similar means, will be limited to circuits dedicated only to DOD use and to transmissions that are sent and received by transmitting and receiving facilities dedicated to DOD use. No incidentally acquired non-DOD communication will be further monitored when it is determined that it is a non-DOD communication. A record of the inadvertently acquired information may be kept for signal identification and avoidance purposes; the record may describe the signal parameters (frequency, modulation, type, and timing) but will not identify the parties to the communication or contain any portion of the communication content between the parties.
339
+
340
+ e. COMSEC monitoring of trunked circuits (in which communication devices share the same frequency, but are divided into channels at a central control point) must be conducted on those circuits exclusive to the requesting ACOM, ASCC, or DRU. If units other than the requesting unit are using the trunked radio system, the commander(s) of the other using unit(s) must grant permission, in writing, for the COMSEC monitoring on the trunked circuits. The written permission(s) will be attached to the initial request.
341
+
342
+ f. COMSEC monitoring of other signals such as wireless computer networking devices, wireless voice over internet protocol, personal area network devices ("hands-free"), wireless peripheral devices, will be limited to circuits dedicated only to DOD use and to transmissions that are sent and received by transmitting and receiving facilities dedicated to DOD use.
343
+
344
+ g. COMSEC monitoring of cellular telephone systems will employ signal collection equipment that incorporates special design features that allow for the targeting of specific command cellular telephone numbers. The equipment will be programmed by the user to activate only on calls made to and from command-owned or command-leased cellular telephones. At no time will cellular telephone transmissions be monitored or collected using techniques that do not allow for filtering of non-DA or non-DOD cellular phone signals.
345
+
346
+ h. COMSEC monitoring of IS (for example, email and data transfer) will employ monitoring technologies designed to intercept network subscribers' incoming and outgoing messages or data. COMSEC monitoring will only be conducted on a network that originates or terminates on a DOD-owned or DOD-leased telecommunication. COMSEC monitoring of networks will not be performed with the intent to identify, track, or locate unauthorized users.
347
+
348
+ i. Procedures for conducting automated information systems penetration testing will be developed and disseminated by 1st IO CMD. This may include, but is not limited to, the following:
349
+ (1) Use of a wardialer or similar device to determine the presence of telephonic carrier devices connected to land line telephones being used by the monitored unit. COMSEC monitoring will be performed only on those telephone numbers positively identified as belonging to the unit being monitored. No other telephone numbers will be retained for any purpose.
350
+
351
+ (2) A wardialer is defined as software or hardware designed to dial a specified set of telephone numbers to determine the presence of telephonic carrier devices. These devices include, but are not limited to, modems and facsimile machines.
352
+
353
+ (3) Placing a network security monitor on the unit's network to perform searches of data traversing the system. Key word searches may be used as an analysis and time management tool. Selected key words may include standard terms associated with the identification of classified information and words directly relating to the supported unit's critical information list or other mission objectives.
354
+
355
+ (4) Keystroke-capturing software or devices will only be used on the host computer. No keystroke capturing software or device will allow for remote access by outside computers.
356
+
357
+ j. Telecommunications selected for analysis will not be routinely transcribed, except as provided for in paragraph
358
+ 27. When transcripts are made, they will not be included in interim or final COMSEC monitoring reports. Transcripts of communications (except those discussed in para 27) will be prepared and distributed as follows:
359
+ (1) If the supported commander's review of interim or final reports indicates that a knowing, willful, or negligent disclosure of classified information may have occurred, the commander or designee may request and be provided with transcripts of the telecommunications. Initial transcripts will not include the names of participants in the conversations or other information that would identify the participants, except in an official capacity.
360
+
361
+ (2) The data (for example, recordings, disks, or printouts) may be provided as specified in paragraph 27. k. Telecommunication data not related to the monitoring mission that are present on recordings will not be transcribed or otherwise annotated unless needed to support actions described in paragraph 27 and will be handled in accordance with paragraph 27 of this regulation.
362
+
363
+ 213. Communications security monitoring working materials a. Routine access to COMSEC monitoring working materials such as operator logs, operator or analyst notes, and recordings will be limited to those personnel specifically approved under paragraph 24. Working materials will not be released except as provided in paragraph 27. Working materials will be stored and maintained in a manner to ensure that the access restrictions are maintained in accordance with paragraph 214.
364
+
365
+ (1) COMSEC monitoring working materials will be controlled as working papers under the provisions of AR 3805.
366
+
367
+ A minimum classification of CONFIDENTIAL (or the classification of the information identified) will be assigned for all COMSEC working materials. The material in question will then be coordinated with the supported command and the appropriate classification determined.
368
+
369
+ (2) All recording media will be marked with the highest classification of material recorded and will retain this classification until degaussed, purged, or destroyed.
370
+
371
+ b. COMSEC monitoring working materials will be purged, destroyed or degaussed 30 calendar days after the final report is issued. An extension of up to 30 days may be granted in writing by the ACOM, ASCC, or DRU commander having operational control over the COMSEC monitoring element. Any extension beyond that must be submitted to the DCS, G2 (DAMICDS).
372
+
373
+ c. All written COMSEC monitoring working materials produced in the course of monitoring and analysis operations will be reviewed within 60 working days of the date produced to ensure that any information not pertinent to the monitoring mission is deleted. These written materials will be annotated with the name of the person conducting the review and the date the review was conducted.
374
+
375
+ d. Access to COMSEC monitoring working materials may be granted to commanders and other personnel exercising direct management authority over the COMSEC monitoring element if
376
+ (1) Such access is for the purpose of supervising, directing, and checking the efficiency, regulatory compliance, and mission effectiveness of COMSEC monitoring personnel.
377
+
378
+ (2) All personnel concerned are advised of the limitations on the release of information derived from COMSEC
379
+ monitoring (see para 27).
380
+
381
+ e. When COMSEC monitoring is conducted as part of an OPSEC survey or other vulnerability assessment, results obtained from the monitoring may be shared with other elements of the team to ensure that a fully integrated and comprehensive assessment or survey is made.
382
+
383
+ f. Working materials will be reviewed to ensure they are devoid of data extraneous to COMSEC monitoring objectives before the materials are released outside of the COMSEC monitoring element.
384
+
385
+ 214. Communications security monitoring reports The composition, format, and frequency of submission of COMSEC monitoring reports will be determined by the supported command after coordination with the team lead of the monitoring element. Interim reports may be requested on a daily or weekly basis. A final comprehensive mission report will be submitted to the command. Suspense and distribution of final reports will be determined through coordination with the supported command.
386
+
387
+ a. COMSEC monitoring reports will contain information only on the monitoring mission, the adequacy of security procedures within the command monitored, and recommended countermeasures.
388
+
389
+ (1) Report title pages and headers and footers of all pages of reports will prominently state, "COMSEC MONITOR-
390
+ ING INFORMATION. CONFIDENTIAL (AR 38053)."
391
+ (2) All reports, logs, and materials produced in the course of COMSEC monitoring will be afforded protection commensurate with the classification of the information and the sensitivity of the monitored activity. Reports or materials produced from COMSEC monitoring which identify security weaknesses of the monitored activity will be classified at least "CONFIDENTIAL" and downgraded to "UNCLASSIFIED" when security weaknesses are corrected (see NTISSD 600).
392
+
393
+ (3) Descriptions or gists of information disclosed that are necessary to understand the nature of any weakness may be included in the final report.
394
+
395
+ (4) Reports submitted under paragraph 27 are not considered COMSEC monitoring reports in the context of this paragraph.
396
+
397
+ (5) When COMSEC monitoring is conducted as part of a vulnerability assessment effort, OPSEC survey, or other security support, a separate report of the results of the monitoring need not be prepared. Any report produced from COMSEC monitoring material must be marked and prepared according to this regulation.
398
+
399
+ b. Reports and information acquired through COMSEC monitoring will not be disseminated outside the Army, except
400
+ (1) In support of mutual OPSEC objectives and the goals of other military Services, Joint commands, and DOD
401
+ agencies. This includes the exchange of technical information and reports (including working materials) within COMSEC monitoring channels.
402
+
403
+ (2) When required by a court order and approved by the DOD GC. (3) For counterintelligence, LE, or criminal purposes (see para 27).
404
+
405
+ 215. Safeguarding communications security monitoring equipment Equipment designed specifically for COMSEC monitoring will be safeguarded to prevent unauthorized use. Required safeguards are as follows:
406
+ a. Equipment installed in facilities or installations for COMSEC monitoring operations must be safeguarded by any of the following methods:
407
+
408
+ (1) Lock and key.
409
+ (2) Internal logon/logout security software. (3) Removal of a component that renders the equipment inoperative. b. Records will be maintained by each monitoring element that possesses equipment designed specifically for
410
+ COMSEC monitoring. These records will include the following:
411
+ (1) An inventory of the equipment on hand. (2) Location of each item in use. (3) Names of persons in charge of each item of equipment in use. c. Only those personnel assigned to COMSEC monitoring and/or maintenance duties will have access to COMSEC
412
+ monitoring equipment in use.
413
+
414
+ ## Chapter 3 Information Operations Red Team The Procedures In This Chapter Apply To Io Red Team Activities On Official Dod Information Systems Within The Army.
415
+
416
+ 31. Explanation An IO Red Team is an independent, threat-based, simulated opposition force that uses passive, active, technical, and nontechnical capabilities on a formal, time-bounded basis to expose and identify the vulnerabilities of friendly forces from an IO threat perspective. Red Team operations expose an organization's vulnerabilities and challenge its readiness by focusing on the identification of critical and classified information.
417
+
418
+ 32. Attributes of effective Red Team activities For Red Team activities to most effectively challenge and assess an organization's IS, the following conditions must be established:
419
+ a. Independence. Effective Red Team activities require that the Red Team act independently from the target organization for the duration of the assessment.
420
+
421
+ b. Rules of engagement. A defined rules of engagement (ROE) (support agreement and charter) must be developed and signed prior to all Red Team assessments. The ROE must be signed by the Red Team lead and approved by the proper level of authority for the target organization through the use of a trusted agent (as defined in para 35b). The ROE must address the adversary threat level (as defined in para 35a) to be portrayed by the Red Team.
422
+
423
+ 33. Authorization to conduct red teaming Individual Red Team members must be Army penetration test certified and IO Red Team certified. Red Teams must be National Security Agency or United States Strategic Command certified. Certified Red Team members are only authorized to conduct Red Team activities as part of a certified Red Team sanctioned mission.
424
+
425
+ a. Certification time period. Organizations may conduct Red Team activities for 3 years or until certification expires, whichever is sooner.
426
+
427
+ b. Certification authority. The National Security Agency is the certification authority for all DOD Red Team activities.
428
+
429
+ c. Certification eligibility. Army organizations seeking Red Team certification must have the capability to perform full spectrum Red Team vulnerability assessments. Full spectrum refers to the ability to portray an adversary from the perspectives of the 5 pillars of IO: operations security, electronic warfare, military deception, computer network operations, and psychological operations.
430
+
431
+ d. Threat computer network operations teams. Threat computer network operations teams are authorized to conduct threat simulation in support of the Army and DOD acquisition testing certification process under the authority of the DCS, G2 (DAMIFIT). Authority is granted to employ threat testing techniques and procedures over open networks in support of Army acquisition, logistics, and technology test events. Computer network scans and attacks are authorized and may be employed to infiltrate, expose, and identify vulnerabilities of systems.
432
+
433
+ 34. Training and standards for Red Team activities Red Team activities and related activities will be conducted in strict compliance with this regulation.
434
+
435
+ a. Knowledge of regulations, laws, and other guidance. In addition to team certification, each individual involved in the conduct of Red Team activities will receive formal training prior to participating in Red Team operations. At a minimum, personnel will be trained on the following:
436
+ (1) The provisions of this regulation. (2) AR 252. (3) AR 2555. (4) AR 34021.
437
+
438
+ (5) AR 38110.
439
+
440
+ (6) EO 12333. (7) DODD 3600.01. (8) Section 2511, Title 18, United States Code (18 USC 2511). (9) Omnibus Crime & Safe Street Act of 1968. (10) Public Law 100235 (PL 100235). (11) PL 104106. (12) PL 107347. b. Training certifications. For Red Team operations, the first lieutenant colonel (O5) or civilian equivalent (GS14)
441
+ in the individual's chain of command will verify in writing the individual has been trained in accordance with the provisions of paragraphs 33 and 34a of this regulation. A copy of this certification will be maintained on file at the unit, available for inspection by any IG, oversight officer, or command inspector. Individual certification is valid for 3 years or until the certified individual is no longer involved in Red Team activities, whichever is sooner. Individual certification is held separate from unit certification and has no effect thereon.
442
+
443
+ c. Nontrained personnel. When required, Red Team mission supervisors may augment the Red Team efforts with nontrained personnel, provided all nontrained personnel work under the direct supervision of trained and certified Red Team personnel.
444
+
445
+ d. Refresher training. Personnel participating in Red Team activities will receive annual unit-level refresher training and are required to renew individual certification every 3 years.
446
+
447
+ e. Violation reporting. Any information gathered as "data-at-rest" (DAR) or "data-in-motion" will be processed in accordance with paragraph 27b of this regulation.
448
+
449
+ f. Access for oversight. All Red Team personnel will cooperate fully with the Army and DOD GCs, intelligence oversight officers, and IGs in performing their necessary oversight responsibilities.
450
+
451
+ 35. Red Team operations Red Team operations expose vulnerabilities by challenging an organization's readiness and ability to protect information. Red Team activities focus on identifying an organization's critical and classified information to show the operational impact of physical, information and operations security shortcomings.
452
+
453
+ a. Threat-level replication. Red Team threat levels are categorized into 3 tiers.
454
+
455
+ (1) *Tier 1: "Script Kiddy."* Tier 1 adversaries are individuals who use tools that are publicly available. Tier 1
456
+ adversaries may not have a thorough understanding of the principles behind their actions, but are familiar enough with a tool to take hostile actions against a target.
457
+
458
+ (2) *Tier 2: "Hacker for Hire."* Tier 2 adversaries are funded organizations with the capability of developing custom tools to use in conjunction with tools that are publicly available. Tier 2 adversaries have a deep understanding of the principles behind their actions and pose a serious threat to their target's information.
459
+
460
+ (3) *Tier 3: "Nation State."* Tier 3 adversary is a government or organization with state sponsorship whose purpose is to gather information on foreign nations and adversely impact their operations.
461
+
462
+ b. Trusted agents. A trusted agent is a member of the target organization who is knowledgeable of the operation and is responsible for assisting the Red Team in coordinating all requirements for the assessment. Trusted agents are required to keep the knowledge of Red Team operations restricted to only personnel read in on the operation. Additional persons may be made aware of Red Team operations after discussion with an authorization by the Red Team lead. The trusted agent is also responsible for deconflicting real world activities from Red Team activities during the assessment. All trusted agents must sign a trusted agent confidentiality agreement form, agreeing to the aforementioned responsibilities prior to being briefed on any Red Team operation.
463
+
464
+ c. Information targeting. The ROE established prior to the assessment will determine the parameters for Red Team activities. A target or targets will be established between the Red Team leader and trusted agent as part of the planning phase of the assessment. The Red Team will use several support systems, each having a distinct methodology, to gather information guarded by the target and assess vulnerabilities in the target's established defense mechanisms. Red Team methods may include, but are not limited to the following:
465
+ (1) *Close access.* Consists of testing target tactics, techniques, and procedures in the areas related to OPSEC and physical security in close proximity. Examples of methods used are "dumpster diving," physical penetration of facilities, social engineering and/or elicitation, passive observation and/or monitoring, photography, and creation, and use of, false credentials.
466
+
467
+ (2) *Computer exploitation.* Employment of information assurance readiness testing (under DODI 8560.01, E2.9) and Red Team techniques consistent with computer network attacks to ensure adequate protection of critical and classified information. Methods include penetration testing, exploitation, reverse engineering, electronic reconnaissance, data analysis, privilege escalation, establishing a foothold through back doors, key loggers, Trojans, and Phishing. Red Team activities include monitoring data-in-motion and mining DAR.
468
+
469
+ (3) *Wireless communications or networking.* Wireless communications or networking comprises employment of wireless network discovery and techniques consistent with information assurance and/or computer network defense
470
+ (CND) to ensure adequate protection of critical and classified information is provided via the wireless spectrum. This includes the interception and exploitation of wireless communication signals.
471
+
472
+ d. Additional constraints. All vulnerabilities introduced into an organization's IS will be removed prior to the end of the assessment to prevent an adversary from exploiting the assessed organization.
473
+
474
+ e. Minimum deconfliction. To ensure that organizational resources are not diverted or distracted from handling real world issues in response to Red Team activities, the following deconfliction will be conducted.
475
+
476
+ (1) When conducting operations that include activities on the LandWarNet (LWN), Red Teams will coordinate and deconflict with the ACERT and U.S. Army Cyber Command. Additionally, Red Teams will gain authority from ACERT. These organizations will be provided source Internet protocol addresses; target Internet protocol addresses; point of contact names; and contact information so that network defenders can differentiate between authorized Red Team activities and real world threat activity.
477
+
478
+ (2) When conducting operations that may be reported as criminal acts or espionage on military installations, Red Teams will coordinate with the local provost marshal offices, CI detachments, criminal investigation divisions, and directorate of emergency services. Deconfliction is not necessary if these organizations are subject to the assessment; however, the Red Team will establish a trusted agent within each.
479
+
480
+ f. Network operations. To replicate a true adversary, certified Red Teams have the authority to access .mil networks from public domains through the use of remote operations. Remote operations refer to the transmission of traffic across multiple domains or subdomains from origin to destination.
481
+
482
+ 36. Red teaming reports Red Team vulnerability assessment reports consist of the analysis of all key vulnerabilities found and recommendations for risk reduction control measures. Red Team findings are reportable only to the unit requesting the assessment. Distribution of the Red Team vulnerability assessment report to parties other than the requesting unit must be authorized by the requesting unit. The final Red Team vulnerability assessment report should be submitted within 30 days of the completion of the Red Team operation, unless directed otherwise by the requesting unit.
483
+
484
+ ## Chapter 4 Computer Defense Association Program
485
+
486
+ 41. Introduction
487
+ The CDAP provides technical support for mitigating identified vulnerabilities to the following:
488
+ a. Requesting individual units and activities. b. The DCS, G3/5/7 or CND service providers.
489
+ 42. Objective a. Evaluate the CND posture and CND response actions of the Army LWN resources by testing and attempting to circumvent Army networks by emulating the methods of hostile actors. Identified deficiencies will be evaluated to determine the depth and degree of potential compromise to provide the appropriate assistance in securing the LWN. This may include, but is not limited to, recommending modifications of methods, techniques and configuration modifications; training of users and system administrators, and/or providing subject matter experts to assist. The CDAP teams evaluate installations and leverage lessons learned to improve local organizations' abilities and influence CND operations across the Army.
490
+
491
+ b. The major objectives are to (1) Confirm and demonstrate methods of intrusion and compromise that could be accomplished by unauthorized users.
492
+
493
+ (2) Confirm and demonstrate the depth and degree of intrusion. (3) Assess the network's ability to detect and respond to intrusions. (4) Evaluate non-user data files such as system-level files, user identification, and login/logoff scripts. User data files (including email) will not be examined, read, modified, recorded, or deleted as part of the penetration testing effort.
494
+
495
+ 43. Scope The CDAP is executed to protect and defend all unclassified and classified information systems used to plan, direct, coordinate, control, and support Army forces operating on the Army LWN for active Army, U.S. Army Reserve, and Army National Guard.
496
+
497
+ 44. Authorization a. CDAP missions are conducted in accordance with this regulation, AR 252, Chairman of the Joint Chiefs of Staff Instruction 6510.01F, and are authorized by the service provider, consent and COMSEC exceptions to Electronic Communications Privacy Act (18 USC 2511(2)(a)(i), 18 USC 2511(2)(c), and 18 USC 107(b)(1) of PL 99508, Section 107 (b)(1)), as well as PL 100235, and as amended by PL 104106.
498
+
499
+ b. Headquarters, Department of the Army Computer Network Operations Standing EO 09608 authorizes 1st IO
500
+ CMD to conduct persistent penetration testing (PPT).
501
+
502
+ 45. Computer Defense Association Program a. A program executed to evaluate the CND posture of Army LWN IS used to plan, direct, coordinate, control, and support Army forces (active Army and Reserve Components) across the full spectrum of conflict. Identified deficiencies (vulnerabilities) will be assessed to determine the depth and degree of potential compromise to provide the appropriate assistance in securing the LWN. This may include, but is not limited to, recommending modification of methods, techniques and configurations; and training of users and system administrators. CDAP missions can be requested by the unit commander or the designated approving authority. CDAP missions can also be directed by the DCS, G3/5/7 or CND service provider. The CDAP consists of multiple mission types based on requirements with recognition to the growing complexity of computer network operations and the ability to counter threat forces that are determined to undermine and compromise network operations. RCERTs, by using uniform procedures and required metrics, provide the computer Warfighters a consistent and uniform view of the network security posture. Required topics of the mission metrics are defined in the CDAP methodology.
503
+
504
+ b. The CDAP consists of 3 mission types (1) *Network assistance visit.* A mission responding to an organization's request that a team of subject matter experts test and evaluate the CND posture of their network and network devices, and provide assistance to improve the organization's security posture. The goal is to prevent unauthorized access by emulating the methods of hostile entities to assess the target network. A network assistance visit (NAV) consists of the following phases:
505
+ (a) Phase 1: Pre-coordination, ROE, and in brief. (b) Phase 2: Network survey, technical support, custom training and assistance, and organizational repairs. (c) Phase 3: Penetration testing and verification. (d) Phase 4: Executive summary, outbrief, and final report (on compact disk within 30 to 60 days). (2) *Network damage assessment.* The goal of an network damage assessment (NDA) is to validate suspected compromises and identify the depth of intrusions to gain knowledge for use in mitigation, recovery, and future prevention of possible compromises. NDAs are detailed examinations of installations initiated after a suspected or confirmed network compromise. NDAs are collaborative missions conducted by Network Enterprise Technology Command, 1st IO CMD, RCERTs, computer crime investigative units, the garrison commander, and the regional director, or any particular vendor associated with the systems being affected. The final report will be classified as required by findings and intended for general distribution and use by CND professionals.
506
+
507
+ (3) *Persistent penetration testing.* DCS, G3/5/7 or 1st IO CMD directed missions (authorized by EO 09608, dated
508
+ 25 Jan 08) for execution of tactical overwatch operations and network surveillance of the LWN (and networked devices connected to the LWN) to conduct open network testing that can be launched from any location and at anytime. PPT missions are based on mission triggers (for example, sensor data, intelligence, and signal spillage or beaconing signals from an IS) that can be performed on a 24 hours a day/7 days a week basis to include, but not limited to, identifying the signal and shutting down the source; verifying network deficiencies by identifying potential weaknesses and circumventing the defensive posture to gain access onto the network; and recommending mitigating actions.
509
+
510
+ c. CDAP missions are conducted by RCERTs that dispatch mission support teams comprised of subject matter experts and select units operating under 1st IO CMD memorandum of agreement.
511
+
512
+ d. All IS contact with the target network may be from outside the target network as deemed appropriate by the CDAP team and in accordance with ROEs and regulations. Other methods such as Phishing, Web site hijacking, pretexting, and so forth, may also be used.
513
+
514
+ e. During the penetration testing phase, the requesting unit or activity must explicitly give consent to the application of techniques and procedures specified in the ROE (unless the mission has been directed by the DCS, G3/5/7, in which case, consent is not required).
515
+
516
+ f. The CDAP team will cease activity if an unauthorized intrusion is detected during any phase of the program. The CDAP team will follow established procedures for notifying the unit and protecting the affected network. The CDAP team's efforts on the affected network will not continue until authorization is received by the ACERT and/or the RCERT.
517
+
518
+ g. The CDAP team does not have the authority to investigate criminal or foreign intelligence service involvement. h. Only personnel with a current top secret security clearance will conduct the network penetration testing. i. Network penetration testing and PPT is conducted by Army certified penetration testing technicians. j. All CDAP team members will be trained and certified in accordance with the requirements of this regulation, AR
519
+ 252, and 1st IO CMD CDAP methodology.
520
+
521
+ k. When conducting support in accordance with paragraph 210 of this regulation, records of all penetration testing
522
+ (type, time, and duration) against Army IS will be maintained as required for statistical purposes.
523
+
524
+ 46. Computer Defense Association Program network assistance visit a. When preparing for a CDAP NAV, the following procedures will be adhered to: (1) The ACERT and/or RCERTs will organize and manage the NAV team, as directed by the program manager under the authorization of the commander, 1st IO CMD.
525
+
526
+ (2) The CDAP manager or designee will (a) Coordinate with the requesting unit's or activity's designated point of contact to obtain mission overview and necessary requirements.
527
+
528
+ (b) Ensure training, certification, and qualification of all team members. (3) The requesting unit or activity will (a) Be responsible for all information systems within the target network (unless directed by the DCS, G3/5/7 or the CIO/G6).
529
+
530
+ (b) Request support via memo (available at ACERT home page https://www.acert.1stiocmd.army.mil/index.jsp), signed by the commander or chief of staff (unless directed by the DCS, G3/5/7 or the CIO/G6).
531
+
532
+ (c) Appoint a point of contact to work all requests, requirements, and issues.
533
+
534
+ b. The following program organization and structure will be adhered to (see fig 41): (1) *Phase 1 - Request/authorization.* Provides authorization and information about the target IS network and establishes the "operating and mission parameters" or ROE. The CDAP team provides a pre-brief to unit commander and support staff on details of each phase, expected outcomes, schedule, and limitations.
535
+
536
+ (2) *Phase 2 - Network survey.* Obtains information about the design and implementation of the target network and discovers (scans for) information about devices on the network and its possible weaknesses. This information is used to compare differences between design and implementation and evaluates the network's susceptibility to intrusion.
537
+
538
+ (3) *Phase 3 - Network penetration testing.* This phase examines the degree and depth of information compromise which could be obtained by potential intruders; evaluates the ability of the targeted network to detect the presence of an intruder; and acts as threat "actors" attempting to circumvent the targeted networks defenses by several means
539
+ (a) Wireless communication. Wireless networking, cellular communication detection, personal area network device paging and other such portable electronic devices.
540
+
541
+ (b) Social engineering (for example, Phishing, Web site hijacking, pretexting, and so forth) defense. The CDAP
542
+ Team will provide verification of suspected vulnerabilities, analysis of network protection capabilities, to include user awareness, and technical support to assist in remediation procedures. All findings and activities will be documented.
543
+
544
+ (4) *Phase 4 - Final Report.* The requesting unit or activity will receive an executive summary outlining impacts and recommendations for securing the target network. The full report will provide detailed information on impacts, risk assessments, and recommended fixes to secure the target network or subnet. This report is sensitive and dissemination of the information will be controlled by 1st IO CMD.
545
+
546
+ 47. Penetration testing scope Security testing, as defined by Committee on National Security Systems Instruction (CNSSI) 4009, in which evaluators attempt to circumvent the security features of an IS based on their understanding of the system design and implementation. Its purpose is to confirm and demonstrate through penetration testing techniques and procedures the degree of IS defensive postures, vulnerabilities, and mitigating processes.
547
+
548
+ 48. Computer Defense Assistance Program persistent penetration testing The execution of tactical overwatch operations and network surveillance of Army networks and networked devices connected to the LWN that may be performed on a 24 hours a day/7 days a week basis.
549
+
550
+ a. The PPT is a command-directed or mission-triggered (for example, sensor data, intelligence, spillage, or beaconing signals from an IS) activity.
551
+
552
+ b. The persistent presence force consists of subject matter experts that are certified penetration testing technicians drawn from 1st IO CMD (DetachmentB and RCERTs). They conduct testing of the LWN and they can be launched from any location at anytime for example
553
+ (1) Identify spillage or beaconing signals from an IS. (2) Track the signal and shut down the source.
554
+
555
+ (3) Verify network deficiencies by identifying potential weaknesses.
556
+ (4) Circumvent those weaknesses. (5) Recommend mitigating actions c. A unit's or activity's explicit consent to monitor during PPT is not required in accordance with AR 252.
557
+
558
+ ## Chapter 5 Reporting Violations
559
+
560
+ 51. Oversight All activities, materials, and records covered in this regulation are subject to IG, intelligence, and security oversight inspections at any time.
561
+
562
+ 52. Reporting violations Individuals who discover a violation of the activities described in this regulation will promptly report the violation to the unit commander, IG, intelligence oversight officer, or the command security manager.
563
+
564
+ a. The commander, IG, or intelligence oversight officer will ensure that a competent inquiry or investigation into the reported violation is conducted. They will ensure that the circumstances of the violation are reported within 5 working days, through command channels to the DCS, G2 (DAMICDS), with information copies to GC and TIG. Reports will contain the following:
565
+ (1) Nature of the violation (for example, unauthorized monitoring). (2) Dates and times of the incident. (3) Location (name of installation or activity) where the incident occurred. (4) Individuals (last name, first name, middle initial) involved in the incident. (5) Brief summary of the incident. (6) Corrective actions taken. (7) Current status of the inquiry. b. Questionable activity and information relating to violations of Federal law as addressed in AR 38110 will be reported under the provisions of AR 38110.
566
+
567
+ c. The DCS, G2 (DAMICDS); GC; TJAG; and TIG will work together to ensure appropriate action is taken to correct the violation and to prevent future occurrences of the same violation.
568
+
569
+ d. Within 5 working days of discovery of the incident, the GC, in coordination with TIG, will send a copy of the initial report and the proposed corrective actions to the Assistant Secretary of Defense for Networks and Information Integration.
570
+
571
+ ## Appendix A References Section I Required Publications
572
+
573
+ AR 252
574
+ Information Assurance (Cited in paras 14g(1), 26b(1)(c), 27b(2), 34a(2), 44b, 45j, and 48c.)
575
+ AR 2555
576
+ The Department of the Army Freedom of Information Act Program (Cited in para 34a(3).)
577
+ AR 254002
578
+ The Army Records Information Management System (ARIMS) (Cited in para C4d.)
579
+ AR 19030
580
+ Military Police Investigations (Cited in para 21d(2).)
581
+ AR 19053
582
+ Interception of Wire and Oral Communications for Law Enforcement Purposes (Cited in para 21d(1).)
583
+ AR 34021
584
+ The Army Privacy Program (Cited in para 34a(4).)
585
+ AR 3805
586
+ Department of the Army Information Security Program (Cited in paras 21d(11), 27a, and 213a(1).)
587
+ AR 38027
588
+ Control of Compromising Emanations (FOUO)( (Cited in para 21d(5).)
589
+ AR 38067
590
+ The Department of the Army Personnel Security Program (Cited in para 29b(2).)
591
+ AR 38110
592
+ U.S. Army Intelligence Activities (Cited in paras 21d(3), 25a(2), 34a(5), and 52b.)
593
+ AR 38112
594
+ Threat Awareness and Reporting Program (Cited in para 25a(3).)
595
+ AR 5301
596
+ Operations Security (OPSEC) (Cited in para 14k(3).)
597
+ DODI 8560.01
598
+ Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing (Cited in paras 11, 35c(2).) (Available at http://www.dtic.mil/whs/directives/.)
599
+ NTISSD 600
600
+ Communications Security (COMSEC) Monitoring (Cited in paras 11, 214a(2).) (Available at http://www.cnss.gov/.)
601
+
602
+ ## Section Ii Related Publications A Related Publication Is A Source Of Additional Information. The User Does Not Have To Read It To Understand This Regulation.
603
+
604
+ AR 251
605
+ Army Knowledge Management and Information Technology AR 38114
606
+ Technical Counterintelligence (TCI) (U)
607
+
608
+ ## Ar 38120 (S/Nf) The U.S. Army Counterintelligence Program (U) Ar 381143 Nonstandard Material Policies And Procedures (U)
609
+
610
+ CJCSI 6510.01F
611
+ Information Assurance (IA) and Support to Computer Network Defense (CND) (Available at http://www.dtic.mil/ cjcs_directives/.)
612
+
613
+ ## Cnssi 4009 National Information Assurance (Ia) Glossary (Available At Http://Www.Cnss.Gov/.) Dodd 3600.01 Information Operations (Io) (Available At Http://Www.Dtic.Mil/Whs/Directives/.) Eo 09608 Project Labor Agreements (Available At Http://Www.Gpoaccess.Gov/Uscode.)
614
+
615
+ EO 12333
616
+ United States intelligence activities (Available at http://www.gpoaccess.gov/uscode.)
617
+
618
+ ## Pl 90351 Law Enforcement Assistance (Available At Http://Thomas.Loc.Gov/Bss/.) Pl 99508 Electronic Communications Privacy Act Of 1986 (Available At Http://Thomas.Loc.Gov/Bss/.) Pl 100235 Federal Computer System Security Training (Available At Http://Thomas.Loc.Gov/Bss/.) Pl 104106 National Defense Authorization Act For Fiscal Year 1996 (Available At Http://Thomas.Loc.Gov/Bss/.) Pl 107347 EGovernment Act Of 2002 (Available At Http://Thomas.Loc.Gov/Bss/.) 18 Usc(B)(1) Crimes And Criminal Procedure (Available At Http://Www.Gpoaccess.Gov/Uscode.)
619
+
620
+ 18 USC 107
621
+ Intelligence activities: intercept encrypted or other official communications of United States executive branch entities or United States Government contractors for communications security purposes (Available at http://www.gpoaccess. gov/uscode.)
622
+ 18 USC 2511
623
+ Interception and disclosure of wire, oral, or electronic communications prohibited (Available at http://www.gpoaccess. gov/uscode.)
624
+ 18 USC Chapter 119
625
+ Wire and electronic communications interception and interception of oral communications, definitions (Available at http://www.gpoaccess.gov/uscode.)
626
+ Section III Prescribed Forms Except where otherwise indicated below, the following forms are available as follows: DA Forms are available on the APD Web site (http://www.apd.army.mil); DD Forms are available on the Office of the Secretary of Defense Web site (http://www.dtic.mil/whs/directives/infomgt/forms/formsprogram.htm).
627
+
628
+ DD Form 2056
629
+ Telephone Monitoring Notification Decal (Cited in paras 26a(1)(d), 26b(1)(b)1, 26b(1)(b)2, and 26b(1)(b)3.)
630
+ Section IV Referenced Forms Except where otherwise indicated below, the following forms are available as follows: DA Forms are available on the APD Web site (http://www.apd.army.mil); DD Forms are available on the Office of the Secretary of Defense Web site (http://www.dtic.mil/whs/directives/infomgt/forms/formsprogram.htm).
631
+
632
+ DA Form 112
633
+ Internal Control Evaluation Certification DA Form 2028
634
+ Recommended Changes to Publications and Blank Forms
635
+
636
+ ## Appendix B Forms Of Monitoring Notification This Appendix Provides Guidance For Application Of Banners Concerning Information Systems Security Monitoring Certification Notifications, Standard Mandatory Notice And Consent Provisions, And Facsimile Cover Sheets.
637
+
638
+ B1. Telephone or communications directory notice ATTENTION! DO NOT PROCESS, STORE, OR TRANSMIT CLASSIFIED INFORMATION ON NONSECURE TELECOMMU- NICATIONS SYSTEMS. OFFICIAL DOD TELECOMMUNICATIONS SYSTEMS - INCLUDING TELEPHONES, FACSIMILE MACHINES, COMPUTER NETWORKS, AND MODEMS - ARE SUBJECT TO MONITORING FOR TELECOMMUNICATIONS SECURITY PURPOSES AT ALL TIMES. USE OF OFFICIAL DOD TELECOMMUNICATIONS SYSTEMS CONSTITUTES CONSENT TO INFORMATION SYSTEMS MONITORING.
639
+
640
+ B2. Facsimile cover sheet ATTENTION! DO NOT PROCESS, STORE, OR TRANSMIT CLASSIFIED INFORMATION ON UNSECURED TELECOMMU- NICATIONS SYSTEMS, INCLUDING FACSIMILE MACHINES, ARE SUBJECT TO MONITORING FOR INFOR- MATION SYSTEMS SECURITY MONITORING AT ALL TIMES. USE OF THIS SYSTEM CONSTITUTES CONSENT TO INFORMATION SYSTEMS SECURITY MONITORING.
641
+
642
+ ## Appendix C Internal Control Evaluation C1. Function The Function Covered By This Evaluation Is For Comsec Monitoring.
643
+
644
+ C2. Purpose The purpose of the evaluation is to assist unit commanders in evaluating key internal controls. It is not intended to cover all controls.
645
+
646
+ C3. Instructions Answers must be based on actual testing of the key internal controls such as document analysis, direct observation, interviewing, sampling, and simulation. Answers that indicate deficiencies must be explained and the corrective action indicated in supporting documentation. These internal controls must be evaluated at least once every 5 years. Certification that the evaluation has been conducted must be accomplished on DA Form 112 (Internal Control Evaluation Certification).
647
+
648
+ C4. Test questions a. Are key management controls identified in the governing Army regulation? (Headquarters, Department of the Army functional proponent only.)
649
+ b. Are required publications, as shown in AR 38053, appendix A, available to COMSEC monitoring personnel?
650
+
651
+ (They do not have to be maintained on hand.)
652
+ c. Have discrepancies noted in the most recent COMSEC monitoring audit/inspection or command COMSEC
653
+ monitoring inspection been corrected?
654
+
655
+ d. Are records created and managed in accordance with AR 254002? e. Are procedures in place to ensure all personnel, including contractors, are aware of the provisions of this publication?
656
+
657
+ f. Does the command have a COMSEC monitoring certification request approved by the DCS, G2 on file? g. Have all personnel involved in the conduct (collection and analysis) of COMSEC monitoring received formal training and formally certified in accordance with this publication?
658
+
659
+ h. Have appropriate security personnel (for example, information assurance security officers) been appointed? i. Are all personnel participating in COMSEC monitoring receiving annual refresher training? j. Are incidents and violations reported properly?
660
+
661
+ ## C5. Supersession Not Applicable.
662
+
663
+ C6. Comments Help make this a better tool for evaluating internal controls. Submit comments to Headquarters, Department of the Army, DCS, G2 (DAMICDS), 1000 Army Pentagon, Washington, DC 203101000.
664
+
665
+ ## Glossary Section I Abbreviations 1St Io Cmd 1St Information Operations Command
666
+
667
+ AASA
668
+ Administrative Assistant to the Secretary of the Army
669
+
670
+ ## Acert Army Computer Emergency Response Team
671
+
672
+ ACOM
673
+ Army command ASCC
674
+ Army service component command CDAP
675
+ Computer Defense Association Program CG
676
+ Commanding General CI
677
+ counterintelligence CIO/G6
678
+ Chief Information Officer, G6
679
+ CND
680
+ computer network defense CNSSI
681
+ Committee on National Security Systems Instruction COMSEC
682
+ communications security DAR
683
+ data-at-rest DCS, G2
684
+ Deputy Chief of Staff, G2
685
+ DCS, G3/5/7
686
+ Deputy Chief of Staff, G3/5/7
687
+ DOD
688
+ Department of Defense
689
+
690
+ ## Dodi Department Of Defense Instruction
691
+
692
+ DRU
693
+ direct reporting unit EO
694
+ executive order GC
695
+ General Counsel GS
696
+ general schedule IG
697
+ inspector general IO
698
+ information operations
699
+
700
+ ## Inscom U.S. Army Intelligence And Security Command
701
+
702
+ IS
703
+ Information System LE
704
+ law enforcement LWN
705
+ LandWarNet MOS
706
+ military occupational specialty NAV
707
+ network assistance visit NDA
708
+ network damage assessment
709
+
710
+ ## Ntissd National Telecommunications And Information Systems Security Directive
711
+
712
+ O5
713
+ LTC lieutenant colonel OPSEC
714
+ operations security PL
715
+ public law PPT
716
+ persistent penetration testing RCERT
717
+ regional computer emergency response team ROE
718
+ rules of engagement TIG
719
+ The Inspector General TJAG
720
+ The Judge Advocate General
721
+
722
+ ## Section Ii Terms
723
+
724
+ Communications security monitoring The act of listening to, copying, or recording transmissions of one's own official telecommunications to provide material for analysis to determine the degree of security being provided to those transmissions.
725
+
726
+ Computer Defense Association Program
727
+ Conducted by the ACERT to ensure the overall security of the LWN. The program consists of the following 3 mission types:
728
+ a. Network assistance visits. Identify and provide remediation for computer network security weaknesses. b. Network damage analysis. Identify, remediate, and recommend countermeasures to LWN compromises.
729
+ c. Persistent penetration testing. Tactical overwatch of the LWN under the order of the DCS, G3/5/7 or the 1st IO
730
+ CMD.
731
+ Consent An agreement by a person to permit DOD communications security components to monitor official communications. Consent may be oral, written, or implied. Consent is implied when adequate notice is given that the use of official Government communications carries with it the presumption of consent.
732
+
733
+ Content The data contained in a telecommunications message, computer folder, or file. Telecommunication messages include, but are not limited to, telephone (both cellular and conventional), radio, pager, and computer network traffic.
734
+
735
+ Data-at-rest All data stored on hard drives, thumb drives, digital video disks, compact disks, floppy diskettes, and other similar storage media.
736
+
737
+ Data-in-motion Data that transverses a network either internally or externally, and is not in a state of storage, such as DAR. This includes active communications via telephone (both cellular and conventional), radio, and pager, as well as computer traffic that is transmitted between any network nodes.
738
+
739
+ Electronic surveillance The acquisition of the contents of nonpublic communication by electronic means without the consent of a person who is a party to the communication, but not including the use of radio direction finding equipment solely to determine the location of a transmitter.
740
+
741
+ Government telecommunications Telecommunications of an employee, officer, contractor, or other entity of the U.S. Government which concern an official purpose of U.S. Government and which are transmitted over a telecommunications system owned or leased by the U.S. Government or a U.S. Government contractor.
742
+
743
+ Information operations Red Team (IO Red Team)
744
+ An independent, threat-based, and threat-simulated opposition force that uses passive, active, technical, and nontechnical capabilities on a formal, time-bound basis to expose and exploit the vulnerabilities of friendly forces from an IO threat perspective.
745
+
746
+ Keystroke monitoring A specialized form of audit trail software or specially designed device (tool) that records every keystroke struck by a user and every character of the response that the IS returns to the user. Keystroke monitoring on the Army's LWN is only authorized by RCERTS, certified Red Team members, and other official activities operating in official capacities.
747
+
748
+ ## Mission Support Teams A Set Or Ad Hoc Team Of Subject Matter Experts Who Conduct Various Missions (To Include Cdap). Penetration Testing Security Testing In Which Evaluators Attempt To Circumvent The Security Features Of An Is Based On The Evaluators
749
+
750
+ understanding of the system design and implementation. Its purpose is to confirm and demonstrate through penetration testing techniques and procedures the degree of IS defensive postures, vulnerabilities, and procedures.
751
+
752
+ Persistent penetration testing A directed mission based on mission triggers (for example, sensor data, intelligence, and signal spillage or beaconing signals from an IS) that can be performed on a 24 hours a day/7 days a week basis to include, but not limited to, identifying the signal and deactivating the source, verifying network deficiencies by identifying potential weaknesses and circumventing the defensive posture to gain access onto the network, and recommending mitigating actions.
753
+
754
+ TEMPEST
755
+ A name referring to the investigation, study, and control of compromising emanations from telecommunications and automated information systems equipment (see CNSSI 4009).
756
+
757
+ ## Section Iii Special Abbreviations And Terms This Section Contains No Entries. Usapd
758
+
759
+ # Electronic Publishing System Onecol Formatter Win32 Version 274
760
+
761
+ PIN:
762
+ 004092000
763
+ DATE:
764
+ 12-23-11
765
+ TIME:
766
+ 13:37:41
767
+ PAGES SET:
768
+ 29
769
+
770
+ DATA FILE:
771
+ C:\Wincomp\r380-53.fil
772
+ DOCUMENT:
773
+ AR 38053
774
+
775
+ SECURITY:
776
+ UNCLASSIFIED
777
+ DOC STATUS: REVISION
markdown/army/ar380-86.md ADDED
@@ -0,0 +1,577 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Security
2
+
3
+ ## Classification Of Former Chemical Warfare, Chemical And Biological Defense, And Nuclear, Biological, And Chemical Contamination Survivability Information
4
+
5
+ Headquarters
6
+ Department of the Army
7
+ Washington, DC
8
+ 22 June 2005
9
+ UNCLASSIFIED
10
+
11
+ ## Summary Of Change
12
+
13
+ AR 38086 Classification of Former Chemical Warfare, Chemical and Biological Defense, and Nuclear, Biological, and Chemical Contamination Survivability Information This rapid action revision, dated 22 June 2005--
14
+
15
+ o Changes classification reasons and durations (para 5b and table 1, para 4d). o Clarifies what stocks are referred to (table 1) and the type of stock
16
+ mentioned (table 1, para 5b).
17
+ o Clarifies the type of binary component (table 1, paras 1b(2) and 2b). o Clarifies types of agents (table 1, para 5b(2)(d)) and the movement of agents
18
+ (table 1, para 5b(2)(e).
19
+ o Clarifies the term "nontraditional agent" (glossary). o Makes administrative changes throughout.
20
+ This rapid action revision, dated 1 February 2005--
21
+
22
+ o Changes the systematic review date for information classified under the
23
+ purview of this regulation (para 5f).
24
+ o Updates the Executive Order governing this regulation (throughout
25
+ publication).
26
+ o Adds paragraph incorporating guidance for nontraditional agents (table 1,
27
+ para 4).
28
+ o Adds nontraditional agents to ensure guidance is provided under operational
29
+ requirements (table 1, para 5).
30
+ o Changes classification reason and duration (table 1, para 5b). o Adds definition for nontraditional agents to terms (glossary).
31
+ This revision, dated 15 March 2002--
32
+
33
+ o Corrects paragraph entitled "Proponent and exception authority." o Corrects "Supplementation" paragraph. o Corrects "Suggested improvements" paragraph. o Removes"CBDCOM" and inserts "SBCCOM" throughout the document. o Removes "The Office of the Deputy Chief of Staff for Operations and Plans" and
34
+ inserts "Deputy Chief of Staff, G-8", throughout the document.
35
+ o This revision dated 7 May 2001 - o This revision corrects the classification guidance in table 1, paragraph
36
+ 5a(1) and (2) from CONFIDENTIAL-Exemption 2 to UNCLASSIFIED.
37
+ o Adds paragraph 6e(4) to table 1.
38
+ Washington, DC 22 June 2005
39
+
40
+ ## Security Classification Of Former Chemical Warfare, Chemical And Biological Defense, And Nuclear, Biological, And Chemical Contamination Survivability Information
41
+
42
+ Guard of the United States, and the U.S. Army Reserve.
43
+
44
+ History. This publication is a rapid action
45
+ r e v i s i o n . T h e p o r t i o n s a f f e c t e d b y t h i s
46
+ r a p i d a c t i o n r e v i s i o n a r e l i s t e d i n t h e
47
+ summary of change.
48
+
49
+ Proponent and exception authority.
50
+ The proponent of this regulation is the
51
+ Deputy Chief of Staff, G8. The Deputy
52
+ Chief of Staff, G8 has the authority to
53
+ approve exceptions or waivers to this reg-
54
+ ulation that are consistent with controlling
55
+ law and regulations. The Deputy Chief of
56
+ Staff, G8 may delegate this approval au-
57
+ t h o r i t y , i n w r i t i n g , t o a d i v i s i o n c h i e f
58
+ within the proponent agency or a direct
59
+ reporting unit or field operating agency of
60
+ the proponent agency in the grade of colo-
61
+ nel or the civilian equivalent. Activities
62
+ may request a waiver to this regulation by
63
+ providing justification that includes a full
64
+ analysis of the expected benefits and must
65
+ i n c l u d e f o r m a l r e v i e w b y t h e a c t i v i t y ' s
66
+ senior legal officer. All waiver requests
67
+ will be endorsed by the commander or
68
+ s e n i o r l e a d e r o f t h e r e q u e s t i n g a c t i v i t y
69
+ and forwarded through higher headquar-
70
+ ters to the policy proponent. Refer to AR
71
+ 25-30 for specific guidance.
72
+
73
+ Summary. This regulation on the classification of chemical warfare and chemical a n d b i o l o g i c a l d e f e n s e i n f o r m a t i o n h a s been revised. This revision incorporates the classification of nontraditional agents.
74
+
75
+ Applicability. This regulation applies to t h e A c t i v e A r m y , t h e A r m y N a t i o n a l Army management control process.
76
+
77
+ This regulation contains management control provisions, but does not identify key
78
+
79
+ Contents (Listed by paragraph and page number)
80
+ Purpose - 1, page 1
81
+ References - 2, page 1
82
+ Explanation of abbreviations and terms - 3, page 1
83
+ Responsibilities - 4, page 1
84
+ Policies - 5, page 1
85
+
86
+ ## Appendix A. References, Page 7 Glossary
87
+
88
+ # Effective 22 July 2005
89
+
90
+ m a n a g e m e n t c o n t r o l s t h a t m u s t b e evaluated.
91
+
92
+ S u p p l e m e n t a t i o n . S u p p l e m e n t a t i o n o f
93
+ this regulation and establishment of com-
94
+ mand and local forms are prohibited with-
95
+ out prior approval from the Deputy Chief
96
+ of Staff, G8 (DAPR-ZA), Washington,
97
+ DC 203100700.
98
+
99
+ Suggested improvements. Users are
100
+ invited to send comments and suggested
101
+ improvements on DA Form 2028 (Recom-
102
+ m e n d e d C h a n g e s t o P u b l i c a t i o n s a n d
103
+ B l a n k F o r m s ) d i r e c t l y t o H Q D A
104
+ ( D A P R - F D B ) , W a s h i n g t o n , D C
105
+ 203100700.
106
+
107
+ Distribution. This publication is availa-
108
+ ble in electronic media only and is in-
109
+ tended for command levels C and D for
110
+ t h e A c t i v e A r m y , t h e A r m y N a t i o n a l
111
+ Guard of the United States, and the U.S.
112
+ Army Reserve.
113
+
114
+ 1. Purpose This regulation
115
+ a. Provides guidance for classification of U.S. Army former chemical warfare materiel, chemical and biological defense, and nuclear, biological, and chemical (NBC) contamination survivability information within the framework of criteria set forth in AR 3805 and Executive Order (EO) 12958, as amended.
116
+
117
+ b. Concerns research, development, testing, and evaluation (RDTE), and the procurement of chemical and biological defense materiel for the purposes not prohibited by the chemical and biological weapons arms control agreements. The movement and storage of former chemical warfare agents or munitions, chemical and biological defense materiel and designs/materiel for NBC contamination survivability are also addressed. Classification guidance for riot control agents, herbicides, conventional munitions and weapons, and smoke and incendiary agents or munitions are not included. These classes of materiel are not categorized as chemical warfare materiel.
118
+
119
+ c. Provides guidance for classification of programs and plans for which the Army is responsible as executive agent for the chemical and biological defense program.
120
+
121
+ ## 2. References Required And Related Publications And Prescribed And Referenced Forms Are Listed In Appendix A. 3. Explanation Of Abbreviations And Terms Abbreviations And Special Terms Used In This Regulation Are Explained In The Glossary.
122
+
123
+ 4. Responsibilities a. Principal officials of Headquarters, Department of the Army, will apply the policies and procedures of this regulation to programs and actions within their staff responsibility.
124
+
125
+ b. Major Army commanders, major subordinate commanders, installation commanders, and operational commanders who deal with former offensive chemical warfare programs, chemical and biological defense, and NBC contamination avoidance/survivability information will apply the policies and procedures of this regulation to programs and actions within their command responsibility.
126
+
127
+ c. Program or project managers for programs who include former offensive chemical warfare programs, chemical and biological defense, and NBC contamination avoidance/survivability information will use the policies and procedures of this regulation for classification purposes.
128
+
129
+ d. Systems managers for systems that include former offensive chemical warfare programs, chemical and biological defense, and NBC contamination avoidance/survivability information. These individuals will use the policies and procedures of this regulation for classification purposes.
130
+
131
+ 5. Policies a. Information under the purview of this regulation, unless special circumstances require otherwise (see para 5c), will be classified at the recommended level and duration consistent with national security (see tables 1, 2 and 3). Originators of documents classified by this regulation and other sources (marked "multiple sources") will consider the duration of classification when computing the declassification date specified from
132
+ (1) The proper section of tables 1, 2, or 3. (2) Declassification instructions appearing on other source documents. This regulation will be listed as one of the sources of classification on the record copy of the document (see AR 3805).
133
+
134
+ b. Documents and information classified before 27 September 2003 will be processed for systematic review as set forth in AR 3805, para 39. Extensions of classifications are not automatic. Exceptions to the above include classified information which, in the judgment of the holder, continues to merit security classification and that meets the criteria of AR 3805. This information will be promptly processed for systematic review as prescribed by AR 3805, chapter 3, section II. This original classification authority may extend the classification; see paragraph 5e.
135
+
136
+ c. This regulation does not limit the responsibility of originators to classify or declassify information or assign a higher classification when, in their judgment, the circumstances warrant such action. If the originators of the information have the requisite original classification authority, they may classify the information at the higher level. If the originators do not have the requisite original classification authority, they may proceed as required by AR 3805. However, information may not be reclassified after it has been declassified and released to the public under proper authority. The Deputy Chief of Staff, G8 will provide help in establishing proper levels of classification.
137
+
138
+ d. A program security classification guide will be developed for each system and equipment development program that involves RDTE of technical information. Initial basic classification guidance applicable to technical characteristics of the system or equipment will be developed and submitted for each new program identified in the Program Objective Memorandum (POM). A detailed classification guide will be developed and issued as soon as possible after the approval of the POM. Approval of classification guides for U.S. Army research, development, and acquisition activities will be integrated into the materiel acquisition and decision process under AR 701.
139
+
140
+ e. Original classification may be extended only
141
+ (1) In accordance with the standards set forth in this guide, by the official with requisite original classification authority for this guide.
142
+
143
+ (2) For successive periods not to exceed 10 years each. (3) If all known holders of information can be notified of such action before the date or event previously set for declassification.
144
+
145
+ f. Information containing permanent historical value that is 25 years or older will be subject to EO 12958, as amended, section 3.4(b).
146
+
147
+ g. In any compilation of information, if at least three specific pieces of unclassified information would lead a reasonable and prudent person to deduct that this information (if made available to adversaries) would probably cause serious damage to the national security if released, then this compilation should be classified SECRET.
148
+
149
+ ## Classification Guidance For Chemical Warfare And Chemical Defense Information Information Classification
150
+
151
+ 1. RDTE data on lethal and incapacitating chemical agents and munitions (including binary chemical agents, munitions, and simulants).
152
+
153
+ a. Data. Vulnerability data revealing significant materiel or operational deficiencies in U.S. total defense training and readiness.
154
+
155
+ SECRETExemption 2.
156
+
157
+ b. Agents.
158
+
159
+ (1) The chemical formulas and scientific names for standardized agents in the V, G, and Hseries and for incapacitating agent BZ.
160
+
161
+ UNCLASSIFIED.
162
+
163
+ UNCLASSIFIED.
164
+
165
+ (2) The chemical formula for a standardized agent (as listed above) being evaluated for defensive and protective purposes as well as human or animal toxicity, pharmacological, or physiological effects data when associated with either the chemical formula or its nondescriptive code. (See note 3.)
166
+ (3) Toxicity, pharmacological, and physiological effects data in relation to humans and animals using agent nondescriptive code for standard agents.
167
+
168
+ UNCLASSIFIED.
169
+
170
+ | (4) Militarily effective doses for humans. | CONFIDENTIALDeclassify 15 |
171
+ |----------------------------------------------------------------|------------------------------|
172
+ | years from original date of clas- | |
173
+ | sificationExemption 2. (Does | |
174
+ | not preclude assignment of higher | |
175
+ | classification if warranted under | |
176
+ | standards of AR 3805, chap 2. | |
177
+ | See para 5 | |
178
+ | c | |
179
+ | of this regulation.) | |
180
+ | c | |
181
+ | . Simulants. | |
182
+ | (1) The chemical formulas and scientific names. | UNCLASSIFIED. |
183
+ | (2) Toxicity, pharmacological, and physiological effects data. | UNCLASSIFIED. |
184
+ | (3) Details of production processes. | UNCLASSIFIED. |
185
+
186
+ 2. RDTE data on binary chemical agents (in addition to para 1 of this table). Classification of information for binary chemical agents and munitions will follow the guidance provided in paragraph 1 of this table and in a through e below. Subjects not specifically addressed will be UNCLASSIFIED unless special circumstances warrant classification. (See para 5c.)
187
+ a. Use of the name or formula of all agents with reference to binary munitions.
188
+
189
+ UNCLASSIFIED.
190
+
191
+ b. Use of the chemical name or formula or any binary ingredients in connection with U.S. Type-
192
+ Classified binary agents or concepts.
193
+
194
+ UNCLASSIFIED.
195
+
196
+ c. Chemical reaction data when applied to a specific munition design other than VX or GB. (See
197
+ note 1.)
198
+ CONFIDENTIALExemption 2.
199
+ d. Conjunctive use of nondescriptive codes and chemical names or formulas for binary reactants.
200
+ UNCLASSIFIED.
201
+ e. Toxicological data being evaluated for defensive or protective purposes.
202
+ CONFIDENTIALExemption 2.
203
+ 3. Former agent production and munition filling such as lethal and incapacitating agents (including binary chemical agents and munitions).
204
+ a. Locations of former production and filling facilities.
205
+ UNCLASSIFIED.
206
+ b. Facility capacities for agent production and munitions filling.
207
+ UNCLASSIFIED.
208
+ c. Total quantity of agents or munitions produced or filled (per facility and total programs).
209
+ UNCLASSIFIED.
210
+ d. Data on total and partial procurement programs associated with acquisition objectives.
211
+ UNCLASSIFIED.
212
+ e. Facility design and operating capability.
213
+ UNCLASSIFIED. UNCLASSIFIED.
214
+
215
+ 4. Nontraditional agents (NTA) and simulants a. The use of generic terms such as NTA in generic descriptions of chemical defense work provided the term is not associated with specific chemical compounds, any specific nation, or any nonstate actor.
216
+
217
+ b. Indication that an NTA is generic term for potential threat agents developed by foreign entities
218
+ (not further identified).
219
+
220
+ UNCLASSIFIED.
221
+
222
+ c. The identification of the structure, formula, synthesis, production process, or significant physical
223
+ properties of any NTA.
224
+ SECRETDuration: A date 25 years from event or date of document (reason: EO 12958, as amended, sec. 1.4(h)).
225
+
226
+ ## Table 1 Classification Guidance For Chemical Warfare And Chemical Defense InformationContinued Information Classification
227
+
228
+ d. The identification (for example, formulas, chemical names, and technical data, and so on) of any
229
+ compound as a simulant for any NTA.
230
+ SECRETDuration: A date 25 years from event or date of document (reason: EO 12958, as amended, sec. 1.4(h)).
231
+ 5. Operational requirements, movement and storage of defensive materiel, lethal and incapacitating agents and munitions .from the declared stockpile, and toxic agents prepared and shipped for RDTE purposes.
232
+ a. Defensive materiel. (Consumption rates, stockage requirements, inventory levels, and movement.)
233
+ UNCLASSIFIED. However, may require classification if presented in context with specific theaters or OPLANS. May also require classification under item 5c.
234
+ b. Agents and munitions.
235
+ (1) Overall chemical stockpile inventory/types/amounts.
236
+ UNCLASSIFIED.
237
+ (2) Movement. (a) Movement into or out of areas not under U.S. jurisdiction.
238
+ UNCLASSIFIED. Operations Security (OPSEC) SENSITIVE. (See AR 5301.)
239
+ (b) Movement within areas under U.S. jurisdiction.
240
+ UNCLASSIFIED.
241
+ (c) Quantities of material involved in inter- or intra-installation movements.
242
+ UNCLASSIFIED. OPSEC SENSI-
243
+ TIVE. (See AR 5301.)
244
+ (d) Movement of former type-classified toxic agents for defense RDTE purpose.
245
+ UNCLASSIFIED. OPSEC SENSI-
246
+ TIVE. (See AR 5301.)
247
+ (e) Movement of nontraditional agents or other toxic compounds for defensive RDTE purposes.
248
+ Normally Unclassified OPSEC
249
+ SENSITIVE (see AR 5301) but may be up to SECRET (see para 5c of this regulation.
250
+ (3) Storage of obsolete stockpiles.
251
+ (a) Identity of storage sites in U.S. territory, continental United States (CONUS), and outside continental United States (OCONUS).
252
+ UNCLASSIFIED.
253
+ (b) Identity of storage sites not in U.S. territory.
254
+ UNCLASSIFIED.
255
+ (c) Identity of Formerly Utilized Disposal sites not in U.S. territory (not previously declassified
256
+ through diplomatic channels).
257
+ CONFIDENTIALExemption 2.
258
+ (4) Storage within the United States, Johnston Island, and sites not in U.S. territory. (a) Total stocks of agents and munitions in the U.S. stockpile.
259
+ UNCLASSIFIED.
260
+ (b) Total stocks of agents at one installation or site.
261
+ UNCLASSIFIED.
262
+ (c) Total stocks of agents at more than one installation site.
263
+ UNCLASSIFIED.
264
+ (d) Total stocks of a single agent at one installation or site.
265
+ UNCLASSIFIED.
266
+ (e) Total stocks of a single agent at more than one installation or site.
267
+ UNCLASSIFIED.
268
+ (f) Total stocks of a single-filled munition (such as projectile, 155mm, GB) at one installation or
269
+ site.
270
+ UNCLASSIFIED.
271
+ (g) Total stocks of a single-filled munition at more than one installation or site.
272
+ UNCLASSIFIED.
273
+ (h) Quantities of obsolete materiel or materiel maintained solely for RDTE or training.
274
+ UNCLASSIFIED.
275
+ (5) Demilitarization or disposal programs.
276
+ (a) Quantities of agents or munitions identified in proposed or planned demilitarization or disposal
277
+ programs.
278
+ UNCLASSIFIED. OPSEC SENSI- TIVE. (See AR 530-1.)
279
+ (b) Quantities of agents or munitions identified in approved demilitarization or disposal program.
280
+ UNCLASSIFIED. OPSEC SENSI- TIVE. (See AR 5301.) SECRETExemptions 2 and 4.
281
+ 6. Chemical defense, protection, prophylaxis, and therapy (including RDTE data).
282
+ a. Chemical defense and protection.
283
+ (1) Detection levels required for defense against chemical agents.
284
+ UNCLASSIFIED.
285
+ (2) Protection levels required for chemical defense equipment.
286
+ UNCLASSIFIED.
287
+ (3) Contamination avoidance or decontamination measures.
288
+ UNCLASSIFIED.
289
+ b..Information on new, unique, or significant chemical defense principles whose revelation would
290
+ be of substantial value to a potential enemy.
291
+ SECRETDuration: 25 years from the date of the original decision (reason: EO 12958, as amended, sec. 1.4(g)).
292
+ c. Information revealing significant materiel and/or operational deficiencies in the overall U.S. chemical defense posture, training, and readiness, when revelation would be of substantial value to a potential enemy.
293
+
294
+ d. Field formulation information on prophylaxis and therapy.
295
+
296
+ Normally UNCLASSIFIED. However, may require classification if the information represents a technological breakthrough of military significance, when revelation would be of substantial value to a potential enemyExemption 2. (See para 5c of this regulation.)
297
+
298
+ ## Table 1 Classification Guidance For Chemical Warfare And Chemical Defense InformationContinued
299
+
300
+ | Information | Classification |
301
+ |----------------------------------------------------------------------------------------------------------|---------------------------------------|
302
+ | f. | |
303
+ | Threat data and analysis. | |
304
+ | (1) Intelligence based threat information. | As classified by appropriate intelli- |
305
+ | gence activity. | |
306
+ | (2) Locally generated threat data. | Classified in accordance with ap- |
307
+ | propriate classification guide. | |
308
+ | g | |
309
+ | . Critical vulnerabilities. (See note 2.) | SECRETExemption 2. |
310
+ | h | |
311
+ | . Key scheduling dates. | |
312
+ | (1) Army readiness date, initial operational capability date, and initial deployment. | UNCLASSIFIED. |
313
+ | (2) Release for production. | UNCLASSIFIED. |
314
+ | (3) Type classification standard. | UNCLASSIFIED. |
315
+ | (4) Complete system test schedule date. | UNCLASSIFIED. |
316
+ | 7. Site security measures (including physical security plans and related documents). | |
317
+ | a | |
318
+ | . Facilities. | Normally UNCLASSIFIED. How- |
319
+ | ever, may require classification if | |
320
+ | sufficient compilation of informa- | |
321
+ | tion in these subparagraphs al- | |
322
+ | lows identification of critical vul- | |
323
+ | nerabilitiesExemption 2. | |
324
+ | (1) Name and mission of facility. | |
325
+ | (2) Purpose and objective of plans or documents. | |
326
+ | (3) Identification of restricted areas. | |
327
+ | (4) Perimeter barriers. | |
328
+ | (5) Security lighting. | |
329
+ | (6) Communications. | |
330
+ | (7) Lock and key control, personnel, vehicle, and material access controls. | |
331
+ | (8) Emergency support coordination with other Army, military, governmental, or civilian organiza- | |
332
+ | tions. | |
333
+ | b | |
334
+ | . Threat data and analysis. | |
335
+ | (1) Threat information. | Classified in accordance with ap- |
336
+ | propriate classification guide. | |
337
+ | (2) Locally generated threat data. | Classified in accordance with ap- |
338
+ | propriate classification guide. | |
339
+ | c | |
340
+ | . Critical vulnerabilities. (See note 2.) | CONFIDENTIALExemption 2. |
341
+ | d | |
342
+ | . Protection priorities. | UNCLASSIFIED. OPSEC SENSI- |
343
+ | TIVE. (See AR 5301.) | |
344
+ | e | |
345
+ | . Intrusion detection system (IDS). | |
346
+ | (1) Numbers, types, and exact locations of IDS sensors installed on a storage structure or in con- | |
347
+ | junction with a perimeter barrier. | |
348
+ | UNCLASSIFIED. OPSEC SENSI- | |
349
+ | TIVE. (See AR 5301.) | |
350
+ | (2) Existence of line supervision employed on IDS circuits. | UNCLASSIFIED. OPSEC SENSI- |
351
+ | TIVE. (See AR 5301.) | |
352
+ | (3) Details of methods of line supervision employed on IDS circuits when the information would | |
353
+ | disclose techniques for circumvention. | |
354
+ | CONFIDENTIALDeclassify | |
355
+ | upon deactivation of the IDS sys- | |
356
+ | tems or change in the type of su- | |
357
+ | pervision employed. | |
358
+ | (4) Detailed drawings and wiring diagrams. For example, drawings and diagrams indicating which | |
359
+ | sensors are installed and showing color coded interconnections between each sensor and the con- | |
360
+ | trol unit. System options (alarm option, length of time delay, and signal transmission option) indicated | |
361
+ | on diagrams. | |
362
+ | CONFIDENTIALReview for | |
363
+ | declassification 25 years from | |
364
+ | original date of classification or | |
365
+ | upon reconfiguration of the IDS | |
366
+ | Exemption 2. Regrade to UN- | |
367
+ | CLASSIFIED in the case of mate- | |
368
+ | riel maintained in limited quanti- | |
369
+ | ties for training. | |
370
+ | (5) Location of IDS control units and cable terminal boxes (when not observable from outside the | |
371
+ | chemical exclusion area). | |
372
+ | CONFIDENTIALReview for | |
373
+ | declassification 25 years from | |
374
+ | original date of classification or | |
375
+ | upon reconfiguration of the IDS | |
376
+ | Exemption 2. | |
377
+ | (6) Visual or electro-optical surveillance. | |
378
+ | (a) Use of visual or electro-optical surveillance. | UNCLASSIFIED. |
379
+ | (b) Types and locations of system or systems used. | UNCLASSIFIED. |
380
+ | (c) Exploitable weaknesses or shortfalls of the system or systems as employed in the area. | CONFIDENTIALDeclassify |
381
+ | upon elimination of the weakness | |
382
+ | from all sites or inactivation of the | |
383
+ | site(s). | |
384
+ | f | |
385
+ | . Duress codes. | CONFIDENTIALExemption 2. |
386
+ | g | |
387
+ | . Security forces. | |
388
+ | (1) Augmentation force deployment. | CONFIDENTIALExemptions 2 |
389
+ | and 4. | |
390
+
391
+ ## Table 1 Classification Guidance For Chemical Warfare And Chemical Defense InformationContinued
392
+
393
+ | Information | Classification |
394
+ |------------------------------------------------------------------------------------------------|----------------------------|
395
+ | (2) Tactical defense plan. | CONFIDENTIALDeclassify |
396
+ | upon deactivation of all sites with | |
397
+ | similar defense plans. | |
398
+ | (3) All other information including weapons, ammunition, patrols and strength. | UNCLASSIFIED. OPSEC SENSI- |
399
+ | TIVE. (See AR 5301.) | |
400
+ | 8. Past doctrinal field manuals and documents describing U.S. offensive employment of chemical | |
401
+ | agents. | |
402
+ | CONFIDENTIALExemption 2. | |
403
+
404
+ Notes:
405
+ 1 This becomes UNCLASSIFIED when the information is officially released to (a) the Russian Federation, under the provisions of the Memorandum of Understanding between the Soviet Union and the U.S. regarding the Bilateral Verification Experiment and Data Exchange Related to Prohibition of Chemical Weapons (signed 23 September 1989), or (b) the Chemical Weapons Convention, unless higher classification is warranted under the standards of AR 3805, chap II. See para 5c of this regulation. Notification by DA of official exchange date will be provided.
406
+
407
+ 2 The term critical vulnerabilities applies to those vulnerabilities which, if known by hostiles, would provide an avenue by which hostiles could breach security and reasonably be expected to gain physical access to chemical agents.
408
+
409
+ 3 The testing and evaluation of materiel furnished by intelligence agencies, or studies on, or experimental evaluation of the vulnerability of specific facilities may require classification. (See para 5c.)
410
+
411
+ ## Classification Guidance For Biological Defense Information
412
+
413
+ | Information | Classification |
414
+ |------------------------------------------------------------------------------------|------------------------------------------------------|
415
+ | 1. Information revealing significant total systems or operational deficiencies and | |
416
+ | capabilities in U.S. biological defense posture, training, and readiness. | |
417
+ | SECRETExemptions 2 and 4. | |
418
+ | 2. Biological defense RDTE. | |
419
+ | a | |
420
+ | . The identity of micro-organisms and toxins being studied, their characteris- | |
421
+ | tics, and the consequences of their administration to appropriate hosts. | |
422
+ | UNCLASSIFIED. | |
423
+ | UNCLASSIFIED (refer to SBCCOM protection special- | |
424
+ | ists). | |
425
+ | b | |
426
+ | . Testing and evaluation of filters and other means of protection from | |
427
+ | microbial aerosols, and of materiel and procedures for decontamination. (See | |
428
+ | note.) | |
429
+ | SECRETExemption 2. | |
430
+ | c | |
431
+ | . Results of testing and evaluation of materiel/systems which demonstrate | |
432
+ | vulnerabilities/major operational deficiencies of specific defense systems, com- | |
433
+ | ponents, or materials. | |
434
+ | d | |
435
+ | . General medical research and procedures for protecting personnel against | |
436
+ | biological agents. | |
437
+ | UNCLASSIFIED (see para 1 if higher classification is | |
438
+ | appropriate). | |
439
+ | e | |
440
+ | . Results of medical research revealing operational deficiencies/vul- | |
441
+ | nerabilities in biological defense. | |
442
+ | SECRETExemption 2. | |
443
+ | f | |
444
+ | . Storage of biological materials. | |
445
+ | (1) Inventories and listings of seed stocks and toxins (unless source re- | |
446
+ | stricted). | |
447
+ | UNCLASSIFIED. | |
448
+ | (2) Listings of strains and quantities of a biological material (unless source re- | |
449
+ | stricted). | |
450
+ | UNCLASSIFIED. | |
451
+ | g | |
452
+ | . Medical doctrine for the protection of personnel against biological agents. | UNCLASSIFIED (see para 1 if higher classification is |
453
+ | appropriate). | |
454
+ | 3. Biological defense systems. | |
455
+ | a | |
456
+ | . Complete systems design in enough detail to suggest applying counter- | |
457
+ | measures. | |
458
+ | SECRET (see para 1). | |
459
+ | b | |
460
+ | . System performance determining criteria. | SECRET (see para 1). |
461
+ | c | |
462
+ | . Deployment plans. | SECRETExemption 4. |
463
+ | d | |
464
+ | . Formal patterns of detection and warning system deployment. | SECRET (see para 1). |
465
+ | e | |
466
+ | . Quantity and location of vaccine and antiserum other than at operational | |
467
+ | level. | |
468
+ | UNCLASSIFIED. | |
469
+ | f | |
470
+ | . Recipients of specific vaccines for other than operational purposes. | UNCLASSIFIED. |
471
+ | g | |
472
+ | . Information revealing planning for defensive measures against terrorist use | |
473
+ | of biological materiel. | |
474
+ | SECRET (see para 1). | |
475
+ | h | |
476
+ | . Biological defense doctrine. | UNCLASSIFIED (Becomes classified if it contains in- |
477
+ | formation revealing significant total systems or opera- | |
478
+ | tional deficiencies and capabilities as stated in para 1). | |
479
+
480
+ Notes: The testing and evaluation of materiel furnished by intelligence agencies, or studies on, or experimental evaluation of the vulnerability of specific facilities may require classification. (See para 5c.)
481
+
482
+ ## Classification Guidance For Nuclear, Biological And Chemical (Nbc) Contamination Survivability Information Information Classification
483
+
484
+ CONFIDENTIALExemptions 2 and 3.
485
+ 1. NBC contamination survivability/vulnerability testing and evaluation.
486
+ a. Specific hardness vulnerability to NBC agents that could cause the system
487
+ to either fail or significantly reduce its ability to perform its mission critical functions.
488
+ CONFIDENTIALExemption 2.
489
+ b. Specific compatibility vulnerability that could prevent a soldier in MOPP 4
490
+ from performing a mission critical task.
491
+ CONFIDENTIALDeclassify when vulnerability no longer exists.
492
+ c. Specific decontaminability vulnerability that could result in more than a negligible risk to unprotected personnel following decontamination with standard decontaminants and procedures. 2. Specific criteria for NBC contamination survivability without reference to a system's assessed vulnerability to these criteria.
493
+ UNCLASSIFIED.
494
+ 3. Identification of materials/components affected by NBC decontaminants.
495
+ UNCLASSIFIED.
496
+ 4. Identification of materials/components not affected by NBC contaminants and decontaminants.
497
+ UNCLASSIFIED.
498
+
499
+ ## Appendix A References Section I
500
+
501
+ AR 701
502
+ Army Acquisition Policy. (Cited in para 5d.)
503
+ AR 3805
504
+ Department of the Army Information Security Program. (Cited in paras 1a; 5a(2), 5b, and 5c, and table 1.)
505
+ AR 5301
506
+ Operations Security (OPSEC). (Cited in table 1.)
507
+ EO 12958
508
+ Classified National Security Information. (Cited in paras 1a and 5f and table 1.) (Available at www.archive.gov/
509
+ index.html.)
510
+
511
+ ## Section Ii Related Publications This Section Contains No Entries. Section Iii Prescribed Forms This Section Contains No Entries. Section Iv Referenced Forms This Section Contains No Entries. Glossary Section I Abbreviations Ar Army Regulation
512
+
513
+ BZ
514
+ 3-Quinuclidinyl benzilate
515
+
516
+ ## Conus Continental United States
517
+
518
+ DA
519
+ Department of the Army DCS, G8
520
+ Deputy Chief of Staff, G8
521
+ EO
522
+ Executive Order GB
523
+ Sarin (GB): O-Isopropyl methylphosphonofluoridate
524
+
525
+ ## Hqda Headquarters, Department Of The Army Ids Intrusion Detection System Mopp Mission Oriented Protective Posture
526
+
527
+ NBC
528
+ nuclear, biological, chemical OCONUS
529
+ outside continental United States OPLANS
530
+ operations plans OPSEC
531
+ operations security POM
532
+ Program Objective Memorandum RDTE
533
+ research, development, test, and evaluation
534
+
535
+ ## Sbccom U.S. Soldier And Biological Chemical Command
536
+
537
+ U.S.
538
+
539
+ United States O-Ethyl S-Diisopropylaminoethyl Methylphosphonothiolate
540
+
541
+ ## Section Ii Terms Agent Nondescriptive Code An Arbitrary Abbreviated Designation For An Agent (For Example, Vx).
542
+
543
+ biological defense research A generic term applied to all research efforts and materiel development related to protecting and defending U.S. forces against an adversary's employment of biological agents, munitions, or weapon systems.
544
+
545
+ binary chemical munition A munition designed to use two relatively nontoxic chemicals which combine during functioning of the weapon system to produce a toxic chemical agent for release on target.
546
+
547
+ chemical agent A chemical substance intended for use in military operations to kill, seriously injure, or incapacitate humans through its chemical properties. Excluded from consideration are riot control agents, smoke, and incendiary agents.
548
+
549
+ chemical warfare A generic term applied to all efforts and materiel related to lethal and incapacitating chemical agents and munitions or weapon systems. This term also applies to protecting and defending U.S. forces against an adversary's employment of such agents or munitions or weapon systems.
550
+
551
+ mission-oriented protective posture 4 (MOPP4)
552
+ A level established by the commander depending on the risk of nuclear, biological, and chemical attack. These levels give guidance on wearing of the MOPP gear.
553
+
554
+ ## Munition An Item Of Materiel Used To Disseminate An Agent.
555
+
556
+ nontraditional agent A generic term for chemical or biochemical materiel that is not U.S. type-classified as a chemical agent but assessed to be in development by foreign threat elements and that could emerge as a threat agent.
557
+
558
+ simulant A substance or material that is used in place of toxic agent (chemical or biological) in training, research, testing, or evaluation.
559
+
560
+ ## Toxin A Poisonous Chemical By-Product Of Micro-Organisms, Animals, Or Plants. Type Classification Identification By Army Materiel Status Record Action Of An Item Or Component To Indicate Its Adoption For Service Use. Section Iii Special Abbreviations And Terms This Section Contains No Entries. Usapd
561
+
562
+ # Electronic Publishing System Onecol Formatter Win32 Version 222
563
+
564
+ PIN:
565
+ 004097000
566
+ DATE:
567
+ 06-23-05
568
+ TIME:
569
+ 10:36:30
570
+ PAGES SET:
571
+ 14
572
+ DATA FILE:
573
+ C:\wincomp\r380-86.fil DOCUMENT:
574
+ AR 38086
575
+ SECURITY:
576
+ UNCLASSIFIED
577
+ DOC STATUS: REVISION
markdown/army/ar50-6.md ADDED
The diff for this file is too large to render. See raw diff
 
markdown/army/atp3-01-8.md ADDED
The diff for this file is too large to render. See raw diff
 
markdown/army/atp3_01x8.md ADDED
The diff for this file is too large to render. See raw diff
 
markdown/army/atp4-02-7.md ADDED
The diff for this file is too large to render. See raw diff
 
markdown/army/atp5-0-6.md ADDED
The diff for this file is too large to render. See raw diff
 
markdown/army/fm3-01-44.md ADDED
The diff for this file is too large to render. See raw diff
 
markdown/army/fm3-6.md ADDED
The diff for this file is too large to render. See raw diff
 
markdown/army/fm3-92.md ADDED
The diff for this file is too large to render. See raw diff
 
markdown/army/fm3_21x38.md ADDED
The diff for this file is too large to render. See raw diff
 
markdown/army/ruleoflaw.md ADDED
The diff for this file is too large to render. See raw diff
 
markdown/army/spaceops.md ADDED
The diff for this file is too large to render. See raw diff
 
markdown/army/tc2-91-4.md ADDED
The diff for this file is too large to render. See raw diff
 
markdown/army/tc7_21x13.md ADDED
The diff for this file is too large to render. See raw diff