INTRODUCTION Each employee of the Federal Government is responsible for safeguarding national security information, classified or unclassified, and US Government property. Thus, it is the responsibility of all to be familiar with the various security procedures to prevent the unauthorized disclosure of CLASSIFIED and SENSITIVE/unclassified information and the loss, theft, or misuse of government property. This Security Reference Guide is provided as an aid to you in becoming familiar with the various security procedures and requirements. All users of this guide are encouraged to assist in improving and updating it. Please direct all questions or suggestions to the Security Office, 42440. INTRODUCTION The Automation Security Team provides security support in the areas of automated data processing security (ADP Security), word processing equipment security (WPE Security), signals security (SIGSEC) and TEMPEST. If you have questions in this area , contact the Automation Security Team on X42440. In this pamphlet, the following topics are discussed: • Tempest • Automation Security AUTOMATION SECURITY TEMPEST Tempest is the unclassified codeword that represents the study of, and countermeasures to, compromising emanations. TEMPEST applies to all electronic and electro-mechanical equipment, including automatic data-processing equipment (ADPE), word-processing equipment (WPE), test measuring and diagnostic equipment (TMDE), and automated telecommunications systems (ATS) that will be required to process classified information. The application of TEMPEST countermeasures is required before allowing the processing of any classified information. The basic requirements and regulations governing TEMPEST are found in AR 530-4 (Control of Compromising Emanations) and the AMC Supplement thereto. Should you have any questions regarding TEMPEST, contact the Harry Diamond Laboratories TEMPEST Control Officer (TCO), ERADCOM Security Office, X42440. TEMPEST AUTOMATION SECURITY 1. Automation Security addresses the protection of Automated Data Processing (ADP) resources, including not only the actual hardware but also the information, personnel, supplies, etc. that make up the entire Data Processing Activity (DPA) . 2. The information that requires protection includes classified, sensitive unclassified defense information, Privacy Act, and asset/resource accounting or controlling information. 3. Automation Security is a multi-disciplined approach to the overall environment of automation. It includes the areas of personnel, hardware , software, environmental, and procedural security as they apply to automation. 4. The basic guidance available to employees is contained in AR 380-380 (Automation Security), the DARCOM Supplement 1 and ERADCOM Supplement 1 thereto . 5. All automated systems must be evaluated to determine whether or not they require the protection afforded by the governing regulations. The method for accomplishing this is called risk assessment. Chapter 9, AR 380-380, gives the basic guidance required to perform the required risk assessment. 6. Upon determination that an automated system requires accreditation to process any type of sensitve data, the Accreditation Authority should be contacted. For guidance concerning the accreditation of automated systems or any other matter relating to Automation Security, contact the ADP Systems Security team, ERADCOM Security Office, X42440 . AUTOMATION SECURITY The Information Security and Intelligence Team provides security support in the areas of information security, classification management, industrial security, operations security (OPSEC), foreign disclosure, personnel security, special access programs (NATO and CNWDI), security education, patent security reviews and counterintelligence. If you have a question in this area, call the Security and Intelligence Team on X42440. In this pamphlet, the following topics are discussed: • Mailing Classified Material • Safeguarding and Storage • Document Markings • End-of-Day Security Checks • Operations Security (OPSEC) • Security Classification Guides • Special Access Programs • Personnel Security • Visit Authorizations • Hand-carrying Classified Material • Foreign Travel • Foreign Information Requests • Foreign Visits • Industrial Security INFORMATION SECURITY AND COUNTERINTELLIGENCE SAFEGUARDING AND STORING CLASSIFIED MATERIAL Classified material that is not under the personal control and observation of an authorized person will be stored in an approved locked security container as described below: TOP SECRET material must be stored in a safe or safe-type steel file container that has a three-position, dial-type combination lock approved by the General Services Administration , or in a Class A vault that meets the standards described in Appendix F, AR 380-5 . SECRET and CONFIDENTIAL maTerial may be stored in the manner authorized for TOP SECRET material; or in a Class B vault; or in a vault-type room, strong room, or security storage room which meets the standards described in Appendix F, AR 380-5 . DA Form 727 must be affixed to the safe/vault containing classified material. This form is used to record the number assigned to the security container for identification purposes and to list all personnel who have knowledge of the combination to that container. The reverse side of DA Form 727 contains a Privacy Act Statement and must be signed by each individual on the front of the form. SAFEGUARDING AND STORAGE DOCUMENT MARKINGS/WORKING PAPERS/COVER SHEETS 1. Classification markings must be immediately recogn izable by anyone who has access to the material. • TOP SECRET • SECRET • CONFIDENTIAL 2. Overall classification markings must appear on the following pages . • Front cover (if any) • Title page (if any) • First page • Back cover (if any) 3 . Classification markings must appear on each interior page according to highest level of information on that page . 4 . Portion marking must appear as follows. • Each section , part, paragraph, etc . shall be marked to show the level of classification or be marked "Unclassified " (U) . • The letters "(U) " for Unclassified , "(C)" for CONFIDENTIAL , "(S)" for SECRET and "(TS)" for TOP SECRET are used to portion mark. • Place each portion marking immediately following the paragraphs's number or letter or at the end of subjects and titles. 5. Marking information other than on documents must appear as follows. • Mark special categories of material other than documents, such as hardware, charts, maps, drawings, photographs, films , recordings , and ADP or ~or