This publication, Army Techniques Publication ATP 6-02.75 Techniques for Communications Security (COMSEC) Operations August 2015, provides guidance on the management, employment, handling, and storage of communications security materials. It outlines roles and responsibilities for all members of the Army Profession providing communications security planning, management, and accounting services in support of movement and maneuver, intelligence, fires, sustainment, mission command, protection, and the Army's portion of Department of Defense information networks (DODIN) capabilities. This publication addresses methods of key transport, provides the fundamental principles for communications security operations to support all echelons, and provides details of Key Management Infrastructure (KMI).
The principal audience for ATP 6-02.75 is commanders, signal staff officers at all levels, communications security account managers, and members of the Army Profession. Commanders and staffs of Army headquarters serving as joint force or multinational headquarters should also refer to applicable joint or multinational doctrine concerning the range of military operations and joint or multinational forces. Trainers and educators throughout the Army will also use this manual.
Effective tactical communications requires the management of keys, devices and other COMSEC material management at the lowest echelon possible, while maintaining the highest level of physical security for the equipment and material. Managers and operators must be capable of handling contingencies such as emergency key supersession, equipment failures, and removing or eliminating the key with minimal equipment outages. The need for security cannot override the basic requirement to communicate; the Army must balance these requirements.
ATP 6-02.75 consists of eight chapters-
Chapter 1 defines COMSEC, addresses equipment maintenance and the destruction of COMSEC material. This chapter also addresses the roles and responsibilities for civilian and military personnel providing COMSEC.
Chapter 2 provides Electronic Key Management System (EKMS) and Army Key Management System (AKMS) overview. This chapter also discusses modern keys and end cryptographic unit (ECU) interface specifications.
Chapter 3 addresses distribution planning, distribution execution, over the air rekeying, encrypted (Black) key distribution, encrypted key operations, and transfer key encryption key (TrKEK) management. This chapter includes joint/North Atlantic Treaty Organization/coalition operations, and exercise and deployment COMSEC support.
Chapter 4 describes hand receipting COMSEC material, issuing keys to local element, key management system certificate management, compromise recovery, and managing two-person integrity for COMSEC support.
Chapter 5 addresses cryptographic network planning and signal operating instructions loadset management.
Chapter 6 addresses ECU software upgrade planning and periodic tamper checks of ECUs.
Chapter 7 includes identifying controlled cryptographic items, transfer of controlled cryptographic items between Army and Navy accounts, transfer of controlled items between Army and Air Force or other service or agency, and transfer of controlled items from Department of the Army (DA) activity address code accounts.
Chapter 8 provides an overview of the KMI capabilities to include roles and responsibilities.
|Product dimensions:||8.50(w) x 11.00(h) x 0.10(d)|