exchanging information. When two terminals
communicate in the secure mode, each terminal
automatically displays the authentication
(identification) information of the distant terminal, and
a list of compromised CIKs. This information is
scrolled through the display window during secure call
setup. The first line of the identification information
and the classification level are displayed for the
duration of the secure call. The information displayed
indicates the approved classification level for the call,
but does not authenticate the person using the terminal.
The terminal users are responsible for viewing this
information to identify the distant party and the
maximum security classification level authorized for
the call.
Secure data transmissions using STU-IIIs may be
made by connecting a computer modem phone plug into
the MODEM plug receptacle on the backside of the
unit, and then activating the "SECURE DATA" mode.
The STU-III terminals and keys are
Communications Security (COMSEC) material and
require special handling. The terminals and keys are
administered through the STU-III COMSEC Account
(SCA) Custodian. Both the terminals and keys that are
issued to users must be signed for. Since the seed key is
classified, it must be afforded protection in accordance
with Secure Telephone Unit Third Generation STU-III
COMSEC Material Management Manual, CMS 6.
Although unkeyed STU-III terminals may be carried on
mobile operations or exercises, the seed key is never
transported, and the CIK key must be transported
separately from the STU-III unit.
Because CIKs permit the STU-III terminals to be
used in the secure mode, the CIKs must be protected
against unauthorized access and use. CIKs may be
retained by the users who sign for them on local
custody. Users must take precautions to prevent
unauthorized access and must remember to remove the
CIKs from the associated terminals.
When the terminal is unkeyed, it must be provided
the same protection as any high-value government item,
such as a personal computer. When the terminal is
keyed, the terminal assumes the highest classification
of the key stored within it and must be protected in
accordance with the classification of that key.
TELEFAX.Nearly every command uses
automatic telephone facsimile (telefax or fax) send and
receive terminals to transfer graphic and written
environmental information. This equipment may be
used to transfer unclassified information only. Figure
1-3 shows an example of a pregummed 1.5-inch by
4-inch label containing certain information that should
be included on every telefax. Some commands use a
pre-printed cover-page containing this information.
# OF PAGES:
FROM
TO:
COMMAND:
COMMAND:
OFFICE CODE:
OFFICE CODE:
PHONE #:
FAX #:
FAX #:
Figure 1-3.Example of a telefax address label.
Operation of telefax equipment is usually very
simple. You place the original information on the feed
tray, dial the destination fax number on the key pad or
on the attached telephone instrument, and press the
"send" key when a high pitched tone is heard in the
receiver. Detailed instructions are normally attached to
each terminal. The receive mode is fully automatic.
TELEPHONE MODEMS.Telephone modems
are electronic equipment that allow computers to
transmit data directly over telephone circuits. Modems
are also used to connect desktop computers to Local
Area Networks (LANs) or to Wide Area Networks
(WANs). There are many different modems in use
throughout the Naval Meteorology and Oceanography
Command. Most desktop computers now contain a
built-m modem.
Modems are controlled via the computer with a
special type of software program called a
communications protocol program. These programs
allow the operator to specify the telephone number to be
accessed and to specify various communications
parameters for the transmitted signal. It is beyond the
scope of this training module to discuss the operating
procedures for the various protocol programs or
communications parameters. Operating instructions for
each program are included with the program manual
issued with the software. Specific protocol parameters
allow the user to access programs such as NODDS.
The Naval Meteorology and Oceanography
Command Telephone and Address Listing contains
addresses, telephone numbers, and telefax numbers for
all Naval Meteorology and Oceanography Command
activities, Marine Corps weather activities, and offices
of other military activities associated with meteorology
and oceanography (METOC) support. Your Leading
Chief usually maintains the directory and may provide
copies at key telephone locations throughout your
activity.
1-6