Quantcast General techniques for RED equipment

Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search

4.3.2  General types of RED equipment.  Any device with an information
processing function can be used as RED equipment.  Current commercially
available telephone technology, coupled with inventory cryptographic devices,
has been used to form switched secure voice systems in RED enclaves.  In such
cases, standard telephone instruments might be used as RED devices.  Numerous
micro-, mini-, or mainframe computers, as well as digital and analog
facsimile devices, may be used as RED devices.  Video transmitting and
receiving equipment, with or without associated audio, may be classed as RED
devices.  Electronic/electric typewriters may be used as RED devices.  There
are numerous ancillary devices such as digital-to-analog or analog-to-digital
converters, synchronizers, magnetic tape readers and recorders, and card
readers/punches that may be classed as RED devices.
General techniques for RED equipment.  Teletypewriter devices.  There is extensive use of teletypewriter
devices throughout the Department of Defense (DoD).  Advancements in
technology have resulted in the introduction of numerous devices which
incorporate microcomputer circuitry, tape recording/reproducing devices, and
video display units (VDUs) to enhance the basic teletypewriter function.  The
type of equipment used and the operational environment will dictate the need
for more stringent TEMPEST controls.  Such controls might include additional
shielding and separation from other equipment, and increased physical
security such as visual screening of the VDU.  Such additional treatment
should be determined by the cognizant TEMPEST agency.  Secure voice systems.  There are various types of secure voice
systems being used within the DoD.  Many of these systems are designed to
work with unique telephone instruments and/or data and facsimile terminals
which perform required control and indicator functions.  Only approved
equipment and configurations should be used as an integral part of these
systems.  There are systems, however, that are designed to be operated by
using commercially available telephone systems.  Any device in the system may
be designated through a computer process as either a RED or BLACK terminal.
Extreme caution must be exercised to ensure adequate protection of all
equipment and wire lines.  Thorough customer education must be provided to
prevent possible compromise situations resulting from customer misuse.  A RED
telephone network should be totally contained within the CAA, but may have
trunks coupled to the central office telephone exchange.  These trunks should
be encrypted.


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc.