Preview

KP Changeover Case Summary

Satisfactory Essays
Open Document
Open Document
515 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
KP Changeover Case Summary
A CAV was conducted with the CAM of CA 5EP193, 287th Signal Company, 78th Signal Battalion, Camp Zama, Japan. The CAM recently graduated from the LCMS and CAMC course and roughly had two month’s experience comprehending COMSEC operations. The CIR explained the procedures reporting Failure Issuing Traditional or Modern Electronic Keys to a Local Element and Database or Battery Failure of a Modern Fill Device. The CIR informed the CAM that all instructions could be found in TB 380-41 4.4.5. Upon reviewing ALC inventories, the CIR noted that current REINIT 2 CIKs were outdated and the KP Changeover exceeded 90 days requirement. The CIR stated that failure to perform KP Changeover is a reportable COMSEC Incident, IAW DOC-119-10. The CIR provided guidance on how to submit a COMSEC Incident report pertaining to a late KP Changeover. The CIR inspected the contents of the Disaster Recovery Kit (DRK) and noted the ACAM’s backup user CIK was …show more content…
The account is preparing to conduct a Lifeboat due to the issues with their LCMS workstation. Currently CA 5DP103 cannot issue Modern Key, can only issue Traditional Key through Common User Application Software and Card Loader User Application Software does not work because it cannot detect Modern Key in its inventory. The CIR reviewed the accounts Standard Operating Procedures which supported the unit’s unique Special Operation mission. The CIR gave recommendations of managing Local Elements, maintain destruction documentation and account files. The CIR conducted a physical security inspection of the new purposed location of the COMSEC Vault located in within their compound. The CIR also noted short title USKAR B9190 in their account needed to be changed from ACL 1 to ACL 4. The account will be preforming a CCIR to replace their primary CAM within the next month and has requested another CSLA with the new CAM by the end of the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    -PLANNER ORIENTATED. As EKMS Manager, he conducted 20 Spot Checks, two self-assessments, three base-wide inventories managing four local elements, 450 pieces of cryptographic material, ensuring 100% accountability and compliance. His organization and planning were critical in the preparation for the 2016 EKMS Immediate Supervisor In Command (ISIC) inspection.…

    • 165 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Mutandum Corporation Case

    • 963 Words
    • 4 Pages

    There are numerous reasons to retire our computer technology. Some systems become obsolete due to current technological advances. Some are replaced because they become infected with viruses or otherwise no longer function properly. And others simply just don’t meet the requirements of our business. In order to retire these systems in an efficient, safe and economical manner, we must take into consideration numerous factors that would otherwise but our business at risk. The following policy includes the implementation of recommendations that will keep sensitive information secure while ensuring that we remain in compliance with federal regulations all the while keeping to our business model centering on efficiency.…

    • 963 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Ics 200 Final Paper

    • 1131 Words
    • 5 Pages

    (a) When a new Incident Commander assumes command, the outgoing Incident Commander should be demobilized to avoid confusion…

    • 1131 Words
    • 5 Pages
    Good Essays
  • Good Essays

    A collaboration of short stories behind the scenes of an exciting era in American history. The author portrays many different point of views throughout the stories from the actual soldiers to the people who worked around the bases of Iraq and Afghanistan to the priests and chaplains that helped keep the soldiers sane. Though the book suffered slightly from its overuse of military jargon it flourished with great imagery and the clear, enjoyable voice. Also, the different point of views help correlate the different perspectives and at times touches upon Phil Klay’s personal connections to the book.…

    • 846 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Do you remember when ESU’s were the “one stop shop” for Cutter support? Ideally, if your Cutter had an electronic casualty and needed to order a part, you would generate a CASREP and request ESU acquire the part. Then things changed. Cutters transitioned to ALMIS and ESU’s morphed into Base C4IT Departments (BCD’s). BCD’s functioned only as the “checkbook”, purchasing parts when requested by the Cutter Product Lines (PL). Technically, BCD’s simply stepped in when requested by PL’s, TISCOM, or C3CEN. Now, if you needed a NTNO item, you still created a CASREP and requested BCD assistance. However, if your item was Coast Guard owned, then you addressed it in ALMIS and SFLC Product Line would request the assistance from BCD. Confused yet? Simply put, Cutters would no longer request BCD assistance unless it was for a NTNO item.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The current general emergency demand requires up to 58 positions driven by current doctrine and manuals for the Juniper class. General emergency was determined to be the most manpower intensive condition and is the recommended compliment for general emergency based on an assessment of current damage control and repair party doctrine’s. Therefore, the CGC Walnut does not have a sufficient amount of personnel to respond to a general emergency situation not accounting for people that take leave, temporary duty assignments, or on light…

    • 540 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Saunders Kkrk Case Study

    • 1375 Words
    • 6 Pages

    After years of deliberation, Saunders Hall at UNC-Chapel Hill has become “Carolina Hall” (Stancill). Saunders was a leader of the Klu Klux Klan (KKK) during the 19th century. The board of trustees voted 10-3 to change the name; however, many questioned if their vote was going to be seen as changing history. Inevitably, it was seen as an act of righting a wrong of history given the board of trustees from 1920 used Saunders’ leadership in the KKK as a qualifier for naming the building. “We’re not changing history, we’re not rewriting it. We’re shining a bright light on it,” said trustee Alston Gardner. Gardner congratulated student activists for their perseverance, but added, “Now I hope you direct your passion on more substantial issues.” Trustee…

    • 1375 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    According to the “2016 EKMS Town Hall brief”, COMSEC Incidents and PDSs have increased 130% over the last three years (2). It is undoubtful that this large influx of incidents and PDSs are contributed by improper account maintenance produced from inadequate training. In my experience a solid training program can prevent many of the issues arising such as late destruction, unauthorized access, and reoccurring maintenance tasks. Moreover, the increase in the amount of incident and PDSs led has led to the potential for our enemies to compromise our communications systems and disrupt future operations. Overall, the increase of COMSEC Incidents and PDSs reflects that the current EKMS training program in…

    • 724 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Does Mariner have an account agreement for CSC Floors? We do not have a special account agreement for CSC floors and all we would require is the attached New Dealer enrollment application be completed along with the requested information. (The requested recent balance sheet and income statement is optional but can speed up the approval if provided)…

    • 367 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Essay: Business Continuity and strategic pre-incident changes the company would follow to ensure the well-being of the enterprise.…

    • 3361 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    ANNEX J – Information Assurance (All Users) J-1 BN COMSEC Procedures 1. References. a. USASOC Pam 25-1, Information Mission Area Procurement. b. USASOC Pam 25-2, Personal Use of Government-Owned IMA Resources Guide. c.…

    • 2469 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Accountablitly and how it has a roll in the Army. One type of accountability is personal item accountability for instance your wallet and ID. As a PFC and in the Army for almost 2 years i know how important accountablitly of personal items are and expecally possible security risk items.According to AR735-5 Army property is considered as follows; Army property is all property under the control of the Department of the Army (DA) except property accounted for as owned by a nonappropriated fund (NAF) activity. It must be accounted for on a property account unless specificallyexempted by an AR. Property leased by an Army activity is considered Army property for accounting purposes.Property loaned to a non-Army activity remains Army property. Real property accounts for all assets on the installation regardless of who funded the construction or pay for sustainment (except privately owned) will be reflected in the installation real property inventory.Property built by NAF, Air Force, and Navy are considered tenants on the installation and will be reflected as such in the inventory (see Security risk items can be any of the following: CAC card ID, SIPR tokens, DAGRs, used Hard Copy paper,ect. Loss ofany of these items can hurt the battery on many levels.The CAC Card is a multy use identifcation card. it allows you access to military instalations, use of government computers, verifaction of id for uraniry analasis, social security number(if you have an older CAC card)and access to other personal data that can lead to stolen identaties. Any out side source trying to negetivly affect our armed services and or counrty could use our CAC cards to figure out how they work and gain access to our secure bases and or computers. An enemy of the United States on our installations cause a sever security risk because gathering information on our troops movements, and locations of important buildings such as the Base Defense Operations Center or even our dinning facilitys. These…

    • 778 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Range Safety

    • 71848 Words
    • 288 Pages

    DA PAM 385–63 Range Safety This administrative revision, dated 4 August 2009-o Clarifies procedures for application, processing, and approval for a Certificate of Risk Acceptance (para 3-9c(6)). Makes administrative changes (throughout).…

    • 71848 Words
    • 288 Pages
    Powerful Essays
  • Satisfactory Essays

    Cw3 Wacasey

    • 80 Words
    • 1 Page

    CW3 Wacasey's sphere of influence far exceeded ASG-KU, he orchestrated the turnover and delivery of 24 light sets, ensuring they met 10/20 standards, to the 94th Saleh Al-Mohammed Mechanized Brigade in the spirit of partnership building and via the Defense Cooperation Agreement Right of First Refusal. CW3 Wacasey was instrumental in the coordination of maintenance actions of special high priority MRAP variants to return them to FMC with the US Intelligence and Security Command (INSCOM), Army G-2, and Army…

    • 80 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    securing gear

    • 311 Words
    • 1 Page

    The loss of any equipment can lead to a loss in operational security. You don’t want information much less equipment to fall into enemy hands. This could potentially lead to a loss of life.…

    • 311 Words
    • 1 Page
    Satisfactory Essays