Quantcast Controlled BLACK Equipment Area (CBEA)

Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search
 
  
 


MIL-HDBK-232A
5.7.1.5  RED equipment area (REA).  The REA is that space within the LEA
designated for the installation of communications and information processing
equipment that is intended to process plain text classified information.  It
is represented as the upper portion of the pyramid.
5.7.1.6  Other areas and considerations.  In addition to the above spaces and
areas, two subclasses exist which may dictate the size of a space, or may
identify a need to apply protection to a space as a precaution.  These are
equipment radiation TEMPEST zones (ERTZs) and controlled BLACK equipment
areas (CBEAs).
5.7.1.6.1  Equipment radiation TEMPEST zone (ERTZ).  The ERTZ is that area or
zone established as a result of determined or known equipment radiation
TEMPEST characteristics.  The zone includes all space within which a
successful hostile intercept of compromising emanations is considered
possible.  An ERTZ normally would be associated with equipment in an REA.
5.7.1.6.2  Controlled BLACK equipment area (CBEA).  A CBEA is a BEA, not
within an LEA, which is afforded entry control at a security level
commensurate with operational requirements.  Examples of CBEAs are technical
control facilities and radio relay sites supporting LEAS.  Such facilities
are typically afforded such protection to prevent HUMINT exploitation,
equipment destruction, or network sabotage.
5.7.1.7  Design.  When a new facility is designed, close coordination between
the system engineer and physical plant engineer in conjunction with the
operational planners, is needed to assure all required physical security
measurers can be included in the design.  An increase in real estate may
negate the need and expense of shielding or encapsulation of equipment to
contain emanations and prevent exploitation.  Appendix B discusses the
principles of physical security in facility design.  It is intended to give
the designer an overview of physical security and is not meant to override
DoD, service, or agency directives, regulations, or policies.
5.7.2  Emissions security.  Emissions security, as discussed here, are those
measures taken in the design and installation of a facility.  These measures:
a.
Contain compromising emanations to the extent possible.
b.
Reduce those emanations.
c.
Prevent exploitation of those emanations.
d.
Prevent the introduction of clandestine devices and fortuitous probes
into a facility.
Emissions security also encompasses principles of EMC.
5.7.2.1  Emanations containment.  Where indicated by NACSI 5004, the designer
should utilize equipment which has been TEMPEST approved.  Such equipment has
been designed and certified as either totally containing its emanations, or
having emanations of such low magnitudes as to be virtually nonexploitable.
With proper attention to good engineering practices, RED/BLACK separation,
and good installation practices, a high level of confidence and a very low
level of risk can be achieved.  Where nonTEMPEST equipment must be used, the
engineer should research instrumentation sweeps of facilities using similar
78





 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc.