The Defence Manual of Security
The Defence Manual of Security
JSP 440
D Def Sy/6/3
RESTRICTED
RESTRICTED
Crown Copyright Reserved
ii
RESTRICTED
RESTRICTED
1. This manual comprises the following parts of JSP 440, the Defence Manual of
Security:
2. The three volumes have been updated to reflect the organisational changes of
the Security Structures Review (see Volume 1 Chapter 2 for further details), and in
the case of Volume 2 the collocation of the Defence Vetting Agency at York. Issue 2
also incorporates a number of amendments to JSP 440 that have been issued to
security staffs in the form of policy letters or separate security instructions.
4. The publication of Issue 2 of JSP 440 represents the first step towards
production of security policy guidance that will fully reflect the principles of
delegated security risk management set out in the Security Structures Review. The
rewrite of JSP 440 will be designated ‘Issue 3 JSP 440’. Issue 3 JSP 440 is not
expected to be published (in electronic form) until 2003. In the meantime, interim
guidance will be issued in the form of DSO Guidance Notes and Issue 2 will also be
amended approximately at six-monthly intervals. The first four DSO Guidance Notes
are included on the Issue 2 CD ROM; they are also published separately on MODWeb
and are being placed in the Army Electronic Library.
5. Establishments and units should address any requests for further advice or
interpretation in the first instance to their TLB Principal Security Adviser (see
Volume 1 Chapter 2 for details). Should they wish to seek advice from Directorate of
Defence Security staff, the following are the desk – level points of contact:
1
The original Issue 2 of Volume 2 was published during 2000 before the Security Structures Review
was completed.
RESTRICTED
RESTRICTED
Tel: 020 721 80289 Tel: 020 721 83764 Tel: 020 721 83746
CHOtS: DDefSy- CHOtS: DDefSy- CHOtS: DDefSy-
Phys(Gd/ROE) Pers Sy 2 Hd InfoSy(Pol)
DSDC(L)6a2
Defence Storage and Distribution Centre
Mwrwg Road
Llangennech
Llanelli
South Wales
SA14 8YP
John Cochrane
J C COCHRANE
Director Defence Security 26 October 2001
RESTRICTED
RESTRICTED
Personnel Security
VOLUME 1
Issue 2
PROTECTIVE SECURITY
MINISTRY OF DEFENCE
October 2001
RESTRICTED
RESTRICTED
Personnel Security
RESTRICTED
RESTRICTED
Contents
2. Security Responsibilities
3 Risk Management
5. Physical Security
8. Spare
9. Spare
10. Spare
15. Spare
Glossary of Terms
List of Abbreviations
Index
CHAPTER 1
PRINCIPLES OF SECURITY
Chapter Para Page
01 Principles of Security
Espionage 0107
Sabotage 0108
Subversion 0109
Terrorism 0110
Risk 0113
1-1
RESTRICTED
RESTRICTED
Defence Manual of Security
1-2
RESTRICTED
RESTRICTED
Principles of Security
CHAPTER 1
PRINCIPLES OF SECURITY
The Definition of Protective Security
0101. Protective security is the protection of assets from compromise. Compromise
can be a breach of:
0102. In assessing integrity and availability, consideration must be given to both the
direct and indirect consequences of compromise. For example, the theft of a personal
computer may be of limited direct consequence as such equipment can be relatively
cheaply replaced. The loss of the information contained on the computer may have
significant indirect consequences, particularly if no arrangements have been made for
backup storage of the information it contains.
1-1
RESTRICTED
RESTRICTED
Defence Manual of Security
Special Markings
0105. Only those with a need to know, or need to hold, should have access to
protectively marked information. When it is necessary to provide additional
protection by reinforcing the "need to know" principle, special markings that restrict
1-2
RESTRICTED
RESTRICTED
Principles of Security
The Threat
0106. The following paragraphs detail the five threats to security.
Espionage
0107. Espionage is defined as "Attempts to acquire information covertly or illegally
in order to assist a foreign power". Foreign intelligence services are continuously
collecting information for intelligence purposes. They:
a. Work mainly through agents who are either introduced into a country
or recruited locally. Such agents in their search for targets may be expected
to seek out those with human weaknesses who can be exploited particularly
through corruption or blackmail.
1-3
RESTRICTED
RESTRICTED
Defence Manual of Security
possible agent. Definitions of levels of espionage threat, including from SIGINT and
extremists, are at Annex C.
Sabotage
0108. Sabotage is defined as "An act falling short of a military operation, or an
omission, intended to cause physical damage in order to assist a hostile foreign
power or to further a subversive political aim". The following should be noted:
Subversion
0109. Subversion is defined as "Action designed to weaken the military, economic
or political strength of a nation by undermining the morale, loyalty or reliability of its
citizens". The threat from subversion stems not only from foreign intelligence
services but also from members of organizations such as those based on anarchism,
religious fanaticism, and extreme left and right wing ideologies. Organizations with
these ideologies may try to acquire protectively marked information, not necessarily
to give to a potential enemy, but to use it in a way that would bring the government
in general into disrepute.
Terrorism
0110. Terrorism is defined as "The unlawful use or threatened use of force or
violence against individuals or property in an attempt to coerce or intimidate
governments or societies to achieve political, religious or ideological objectives". It
represents a world-wide threat and is characterized by sudden and violent attacks.
Terrorist methods include murder, kidnapping, hostage-taking, hijacking of air, sea,
road and rail transport, and attacks on people, buildings, aircraft and vehicles by
1-4
RESTRICTED
RESTRICTED
Principles of Security
small arms, mortars, bombs and mines. Definitions of terrorist threat levels are at
Annex D. See also Chapter 7.
1-5
RESTRICTED
RESTRICTED
Defence Manual of Security
the actions of hackers - either those with legitimate access to systems or those
without such access.
Components of Security
0112. There are two different and interdependent parts of security:
1-6
RESTRICTED
RESTRICTED
Principles of Security
Risk
0113. Risk can be defined as “a future uncertain event” and is measured in terms of
likelihood and impact. No amount of security measures can ever totally eliminate
risk. The vulnerability of assets to threats must be reduced so that the likelihood of
compromise or loss is reduced to an acceptable level. Over protection leads to a
waste of resources and under protection leads to an unwarranted risk. Security
measures selected must be balanced and cost effective in their application. Further
details are in Chapter 3.
1-7
RESTRICTED
RESTRICTED
Defence Manual of Security
1-8
RESTRICTED
RESTRICTED
Principles of Security
ANNEX A TO
CHAPTER 1
SECURITY STANDARDS
Assets in each level of the protective marking system are required to be protected to
a specific level of protection. The protective markings therefore provide a means of
establishing the value of, and hence the level of protection to be afforded to,
particular assets. These levels of protection are detailed below.
TOP SECRET: Information and other assets should be held, processed, transmitted
or transported and destroyed under conditions which ensure that only those who can
be trusted with them and have been authorized gain access to them, that actual or
attempted compromises will be detected, and those responsible will be identified.
1A-1
RESTRICTED
RESTRICTED
Defence Manual of Security
1A-2
RESTRICTED
RESTRICTED
Principles of Security
ANNEX B TO
CHAPTER 1
DESCRIPTORS
1. Descriptors may be helpful in implementing the "need to know" principle by
indicating the nature of the asset's sensitivity and thereby helping to ensure that
access is limited accordingly. Aside from PERSONAL, which by definition requires
that the information is only made available in the first instance to the addressee, the
descriptors will normally be used in conjunction with a protective marking. Used
alone, descriptors may indicate who should see the material but do not of themselves
impose any particular handling or level of protection. A list of MOD descriptors is
below:
1B-1
RESTRICTED
RESTRICTED
Defence Manual of Security
1B-2
RESTRICTED
RESTRICTED
Principles of Security
ANNEX C TO CHAPTER 1
DEFINITIONS OF LEVELS OF ESPIONAGE THREAT
The definitions and threat levels below are used by the Security Service when
considering the threat from espionage, including SIGINT and Extremist threats.
Grade Definition
SIGNIFICANT or
1C-1
RESTRICTED
RESTRICTED
Defence Manual of Security
1C-2
RESTRICTED
RESTRICTED
Principles of Security
ANNEX D TO CHAPTER 1
DEFINITIONS FOR LEVELS OF TERRORIST THREAT
1. The definitions and terms for use in terrorist threat assessments have been
agreed by ACPO for use by the civil police and national agencies.
1D-1
RESTRICTED
RESTRICTED
Defence Manual of Security
1D-2
RESTRICTED
RESTRICTED
Principles of Security
ANNEX E TO CHAPTER 1
DEFENCE IN DEPTH
Official Secrets Acts 1911 - 1989
Perimeter Fences
Passes
Security Areas
Need to Hold
Protective Marking
Information
and
Material
Need to Know
Alarms
Vetting
Gate Control
Protective Lighting
1E-1
RESTRICTED
RESTRICTED
Defence Manual of Security
1E-2
RESTRICTED
RESTRICTED
Security Responsibilities
CHAPTER 2
SECURITY RESPONSIBILITIES
Chapter Para Page
02 Security Responsibilities
General 0201
Impact of Security Structures Review 0203
Responsibilities of Government Security Departments 0207
and Agencies
Responsibilities in the Ministry of Defence 0212
Responsibilities of TLB Holders and Chief Executives 0220
of Trading Funds
Responsibilities of Principal Security Advisers 0221
Categorisation of Establishments 0222
Security Surveys, Inspections and Audits 0224
Responsibilities of Command and other Security 0228
Staffs
Responsibilities of the Head of Establishment (HOE) 0229
Responsibilities of the Establishment Security Officer 0232
Lodger Units 0233
Responsibilities of Security Units 0234
Other Security Appointments 0235
Reporting of Incidents 0236
Security Incidents – Mandatory Reporting to Ministers 0237
Security Investigations 0242
Disciplinary and Criminal Considerations 0245
Post Incident Analysis 0248
Action on Loss or Compromise and Levels of 0249
Authorization to Write Off
Leaks of Official Information 0255
Waivers and Exemptions 0261
2-1
RESTRICTED
RESTRICTED
Defence Manual of Security
2-2
RESTRICTED
RESTRICTED
Security Responsibilities
CHAPTER 2
SECURITY RESPONSIBILITIES
General
0201. The Strategic Defence Review (SDR) of 1998 led to significant changes in
the way the business of the MOD is conducted. As a result, in September 1999, 2nd
PUS commissioned a review to examine the organisation of security in the
department. The Security Structures Review (SSR) considered all aspects of security
except policing, guarding and vetting. The results of the review were endorsed by
the Defence Management Board on 25 January 2001 as DMB(00)12. DCI GEN
148/01 reported the outcome.
0202. This chapter describes the organisation, management and delivery of security
in the MOD following the SSR. It sets out the delegations to Top Level Budget
(TLB) Holders and Chief Executives of MOD Trading Funds (TFCEs), and the
revised responsibilities of organisations and staff involved in determining security
policy, those implementing policy, and those providing security support, advice and
assistance.
2-3
RESTRICTED
RESTRICTED
Defence Manual of Security
Security Service
0208. The Security Service is the UK authority for all aspects of security. It is the
principal security adviser to government and is responsible for providing advice to
departments and agencies and other organisations on the nature and levels of threats
to security from espionage, terrorism and sabotage, and from the activities of those
who seek to overthrow or undermine Parliamentary democracy by political,
industrial or violent means. In order to counter such threats the Security Service
provides advice and assistance on physical, personnel, document, IT and technical
security measures and training for departmental staff.
2-4
RESTRICTED
RESTRICTED
Security Responsibilities
2-5
RESTRICTED
RESTRICTED
Defence Manual of Security
e. Liaison with the Cabinet Office, Security Service, OGDs and the Civil
Police on security policy issues.
2-6
RESTRICTED
RESTRICTED
Security Responsibilities
b. The Personnel Director and thence to 2nd PUS for all other aspects of
protective security policy.
2-7
RESTRICTED
RESTRICTED
Defence Manual of Security
2-8
RESTRICTED
RESTRICTED
Security Responsibilities
The formal audit process will draw upon the DSO’s Annual Report to the
DAC to determine the key themes to be examined.
STRAP Administration
0218. There are plans for STRAP administration responsibilities currently carried
out by STRAP Security Officers (STRAPSOs) to be re-brigaded under the DSSO.
Pending implementation of this change the pre-SSR arrangements are to continue.
c. The DLO and PJHQ are responsible for Civilians employed in their
TLBs (except for categories managed centrally), and for contractors
employed at DLO and PJHQ sites.
2-9
RESTRICTED
RESTRICTED
Defence Manual of Security
the DSO. They will form the membership of a new DSO advisory group, the DSO's
Risk Managers Forum (DRMF). TLB Holders and TFCEs will be responsible for
maintaining an audit trail of their risk management decisions, and for making a
formal annual report to the DSO on the state of security in their TLB/TF. An extract
from PUS’s letter of delegation to TLB Holders is shown below:
I look to you to ensure that Departmental security policy and standards set out in JSP
440 are implemented across your TLB. Your Principal Security Adviser (to be
appointed by you) will support you and should be consulted whenever you are
unclear about specific delegations or need more general advice. Should you or your
Principal Security Adviser be unsure about the interpretation and exercise of the
delegations or need specialist advice, you should consult the Departmental Security
Officer.
Specific Authority
Authority for the implementation of Departmental security policy and standards (set out
in JSP440 and other policy guidance) in your TLB.
Authority to take necessary timely action on receipt of terrorist and other security threat
alerts, and when necessary, the co-ordination of BIKINI Alert State and other counter-
measures for all units/establishments in your TLB area.
Authority to exempt units/establishments in your TLB area from compliance with
armed guarding and other prescribed security measures, within the limits for
variation set out in JSP 440 and other MOD policy guidance.
Authority for accrediting IT systems that are delegated to you by the Departmental
Security Officer (DSO).
Authority to undertake a programme of assurance activities to verify internal
security control processes. This will be subject to audit by the Defence Security
Standards Organisation (DSSO).
Responsibilities
You should ensure that your decisions on security adhere to Departmental risk
management guidelines.
You should, in consultation with the DSO, appoint a Principal Security Adviser (PSyA)
who will be your source of authoritative day-to-day advice. The PSyA should meet
minimum core competencies and have received the appropriate training. The PSyA
may be appointed from your TLB, or be provided from another, under agreed
arrangements. He or she should consult the DSO for specialist advice when needed,
including on any cross-TLB issues.
You should nominate a ‘risk manager’ to advise you on the balance between your
business needs and the security requirements, taking account of affordability, and to act
as the point of contact for the TLB with the DSO.
You should invest in the necessary training and education to ensure that all staff in
your TLB are adequately trained and have the right level of security awareness.
You must agree an audit programme for your TLB with the DSO.
You must submit an annual report to the DSO on the state of security in your TLB.
2-10
RESTRICTED
RESTRICTED
Security Responsibilities
d. Providing the TLB/TF focal point for the DSO and D Def Sy.
f. Liaison with the police and other security agencies in government and
industry as necessary.
2-11
RESTRICTED
RESTRICTED
Defence Manual of Security
Categorization of Establishments
0222. In order to determine priorities for the allotment of security effort, each
establishment should be allocated a security category. Categorisation of MOD
establishments will maintain a consistent baseline across the Defence spectrum and
assist with the risk management process that will inform resource allocation
decisions. It is, therefore, important that TLB Holders/TFCEs are able to give their
establishments a security profile, assessed against common definitions. Details on
the categorization of establishments are at Annex A.
0223. The categories into which establishments are placed must be reviewed at
regular intervals and on the following occasions:
2-12
RESTRICTED
RESTRICTED
Security Responsibilities
0225. TLBs/TFs are required to carry out a security survey when an establishment
is first formed, is reorganised and changes its role, or on completion of major works
services. The comprehensive survey report will be the baseline against which future
protective security of the establishment will be measured. Additional security
surveys may be conducted in response to special requirements as required by
TLBs/TFs.
0226. A new regime has been introduced to reflect the delegated responsibilities for
security risk management and a more flexible approach managing all aspects of the
changing threat. Threats to Defence establishments vary widely, as do their
vulnerabilities. Although every establishment should be subject to periodic formal
security inspection, the programme should reflect these differences. In determining the
frequency of inspections for establishments within their area, TLBs/TFs will need to
consider various factors. These will include: the criticality of the establishment’s output
in meeting MP objectives, the risk profile, the outcome of previous inspections and
audits, turnover of key personnel and any mandated requirements. Security inspection
reports will provide a major input into the DSO annual report to the DAC. TLB
Holders/TFCEs may elect to supplement formal inspections by advisory visits and by
the completion of security questionnaires. Further detail on inspections and guidelines
for periodicity are at Annex A.
2-13
RESTRICTED
RESTRICTED
Defence Manual of Security
h. Ensuring the maintenance of a close liaison with the Civil Police and
the co-ordination of security contingency plans when necessary.
2-14
RESTRICTED
RESTRICTED
Security Responsibilities
(1) The security aspects of new projects and maintenance works services
in the early planning stages.
p. Ensuring that security surveys and periodic inspections are carried out
on all subordinate establishments.
0230. The responsibilities of the HOE include bringing to the attention of all
personnel specific aspects of protective security as detailed below:
2-15
RESTRICTED
RESTRICTED
Defence Manual of Security
2-16
RESTRICTED
RESTRICTED
Security Responsibilities
2-17
RESTRICTED
RESTRICTED
Defence Manual of Security
i. Security liaison. Liaison with the security staff, the local security
unit and the local Civil Police.
Lodger Units
0233. Lodger Units will normally conform, in the first instance, to their own
Security Regulations, but they are also responsible to those of the host establishment,
whose HOE has a duty of care to ensure that security within the establishment does
not fall below the standards set out in JSP 440 and his own single service or HQ
Security Instructions. Where conformity is not possible deviations are to be noted in
a written agreement between the host establishment and the lodger unit, endorsed by
the PSyA of the host establishment TLB/TF and the chain of command of the lodger
unit. In principle, security responsibilities must lie where they can best be exercised.
If however the lodger unit has its own secure perimeter a different security regime
may apply within that perimeter, if this is considered to be in the best interest of
security. In the normal course, lodger units will, whenever possible, be subjected to
security inspections and audits at the same time as the host establishment and these
may, if appropriate, be conducted by the host unit security authority, even if the
lodger unit is required to submit its own annual report or be subject to inspection.
2-18
RESTRICTED
RESTRICTED
Security Responsibilities
2-19
RESTRICTED
RESTRICTED
Defence Manual of Security
2-20
RESTRICTED
RESTRICTED
Security Responsibilities
Reporting of Incidents
0236. It is important that all Defence related suspected, attempted, or actual security
incidents and weaknesses are reported to the appropriate PSyA and Command
security staff. PSyAs and Command security staffs are to stipulate their
requirements for upward reporting of incidents (losses, compromises, breaches,
weaknesses and attacks) on their establishments. The following incidents are always
to be reported to D Def Sy via the chain of command:
2-21
RESTRICTED
RESTRICTED
Defence Manual of Security
reported to security units and the Service Police, MDP or Civil Police in
accordance with single-Service instructions.
0238. Losses. For the purposes of reporting and investigation, losses are
categorized as follows:
0240. STRAP. The loss and/or compromise of STRAP material should be reported
and investigated in accordance with the security regulations laid down in the STRAP
Manual (JSP 440 Volume 5).
2-22
RESTRICTED
RESTRICTED
Security Responsibilities
Security Investigations
0242. PSyA and Command security staff are responsible for the overall co-
ordination of security investigations within their areas following submission of an
immediate report, either by signal or e-mail, within 24 hours of the loss or
compromise of the protectively marked material being confirmed or suspected (see
Annex F) by the establishment concerned. Early initial reports to PSyA and
Command security staffs allow a rapid judgement to be made as to the severity of the
incident and minimise any delay likely to accrue in returning to normal working
whilst any required security response takes place. It will also provide an opportunity
to provide specialist advice and guidance to the establishment at which the incident
occurred. After the immediate report has been sent, the following procedure should
be followed:
Notes:
2-23
RESTRICTED
RESTRICTED
Defence Manual of Security
0243. Care must be taken to assign an appropriate protective marking to all reports,
and to use appropriate communications channels.
0245. Malicious damage and theft. Deliberate damage to, and theft of, MOD
assets are clear indications of a criminal act having occurred, and other than in
cases where a serious breach of National Security has also occurred, the pursuit
of such incidents will normally be through the MDP or Service Police as appropriate.
0246. Immediate incident report. Unless the criminal activity is detected whilst
in progress, when MDP or Service Police as applicable should be contacted directly,
in all other cases an Immediate Incident Report should be raised to the PSyA or
Command security staff who will ensure that the appropriate Police authority is
contacted.
2-24
RESTRICTED
RESTRICTED
Security Responsibilities
Loss in Transit
0250. When material has been lost in transit between establishments, it is the
responsibility of the dispatching establishment to take all the necessary action and,
where appropriate, to inform the originator or owner of the material.
a. Take all reasonable steps to effect recovery, e.g. by reporting the loss
to the local security unit, the Civil Police, transport authority and lost
property office as appropriate.
a. Category 1.
(1) All TOP SECRET – PSyA and Command security staff (at
one star level).
2-25
RESTRICTED
RESTRICTED
Defence Manual of Security
c. Category 3. HOEs/COs/Directors.
Note: Authority to write off losses, as stated above, is only given from a
security standpoint. It in no way gives authorization to write off the sums of
money that may be associated with losses. This is covered in JSP 414.
0254. Should PSyA and Command security staff consider any loss or compromise
of such significance as to warrant attention by Ministers then D Def Sy should be
informed immediately.
0256. First news of a leak may come direct from a journalist attempting either to
verify the information obtained or wishing the Department or agency to know what
access to official information has been gained. In the rare cases where this occurs
prior to publication, it may be possible to seek an injunction to prevent publication.
2-26
RESTRICTED
RESTRICTED
Security Responsibilities
0258. The following factors need to be taken into account by the relevant PSyA or
Command security staff in preparing to report the incident as a leak to D Def Sy:
f. Whether or not the Official Secrets Acts are believed to have been
breached, if immediately apparent.
0260. D Def Sy, in conjunction with the relevant TLB/TF, will seek advice from the
DSO as to whether the details of the case warrant an investigation by the PSyA,
Security Unit, Service Police or MDP. This option must be considered before such
an investigation is initiated since an investigation that may result in criminal
proceedings must be conducted in accordance with the Police Codes of Practice. D
Def Sy will take all necessary upward reporting action within the Department where
a serious leak has been identified or is strongly suspected.
2-27
RESTRICTED
RESTRICTED
Defence Manual of Security
0263. Definitions of waivers and exemptions (other than for nuclear and IT assets)
are:
2-28
RESTRICTED
RESTRICTED
Security Responsibilities
Liaison
0266. In addition to normal staff liaison and inter-Service consultation (through
local security and intelligence committees, where they exist), contacts are to be
maintained at staff level with other national and international HQs and with
appropriate local security organisations and civil authorities. In parallel with this,
security staffs are to ensure that contacts between security units and the Civil Police
are established and maintained. Contact with the Security Service and Metropolitan
Police Special Branch (MPSB) is only to be carried out through D Def Sy unless
authority has been previously been granted for direct contact.
Financial Economy
0267. Recommendations for works services frequently involve high costs in
materials and labour charges but, while the need for economy is recognized, this
must not inhibit security units from making recommendations necessary to achieve
proper security protection. It is the task of PSyA and Command security staffs to
examine recommendations for security works services ensuring that only those that
are justified on security grounds are given their support. Where high costs are
involved, security staffs may require security units to suggest alternatives, with their
advantages and disadvantages, to help determine the most cost-effective measures.
2-29
RESTRICTED
RESTRICTED
Defence Manual of Security
providing assessments of the threat from terrorism, and for the planning and co-
ordination of protective security measures to counter the threat. In Great Britain
assessments are disseminated by D Def Sy. Overseas and in Northern Ireland,
assessments are made and disseminated by commands except that in the case of HM
ships visiting foreign ports the threat assessment at the time of the visit will be
promulgated by signal by DI RA (Coord). (Chapter 7 gives details of counter
terrorist measures).
2-30
RESTRICTED
RESTRICTED
Security Responsibilities
ANNEX A TO
CHAPTER 2
CATEGORISATION OF ESTABLISHMENTS AND
SECURITY INSPECTIONS
Introduction
1. The adoption of a combined matrix for categorization of establishments takes
account of the full threat spectrum and Risk Impact Level. It facilitates a
comprehensive approach to security inspections to include, where relevant, personnel,
physical and procedural security measures within the GSE/LSE Inspection (GLI) of
CIS installations within sites contained in Chapter 12 to JSP 440 Volume 3 Issue 2.
This combined matrix is shown in outline below:
A2 Medium High
B1 Medium
B2 Medium Low
C1 Low
C2 Very Low
Categorization Definitions
3. The definitions to be used in determining the categorisation of an establishment
in relation to the threats to information and material (assets) are as follows:
Category A1. (Risk Impact High). Establishments with a nuclear role and
holding nuclear weapons or Special Nuclear Material (SNM).
For example:
For example:
For example:
For example:
For example:
For example:
4. Categories P1-P3 relate to the threat to life posed by terrorism and retain
agreed pre-SSR definitions used to determine guarding criteria. These definitions are
contained in Section VIII to Chapter 5.
Inspection Periodicity
6. Threats to Defence establishments vary widely, as do their vulnerabilities.
Although every establishment should be subject to periodic formal security inspection,
the programme should reflect these differences. In determining the frequency of
inspections for establishments within their area, TLB Holders/TFCEs will need to
consider various factors. These will include: the criticality of the establishment’s output
JSP 440 Volume 2 Issue 2
2A-3
RESTRICTED
RESTRICTED
Defence Manual of Security
in meeting MP objectives, the risk profile, the outcome of previous inspections and
audits, turnover of key personnel and any mandated requirements. Security inspection
reports will provide a major input into the DSO’s annual Certificate of Assurance. TLB
Holders/TFCEs may elect to supplement formal inspections by advisory visits and by
the completion of security questionnaires. The guidelines for inspection periodicity are
shown below:
A2 Medium High 2 3 4 6
B1 Medium 3 3 4 6
B2 Medium Low 4 3 4 6
C1 Low 5 3 4 6
C2 Very Low 6 3 4 6
9. For many establishments, the guidance periodicity for asset and guarding
categories will differ. It will be for TLB Holders/TFCEs to schedule the inspections
programme so that both asset and guarding elements are inspected satisfactorily. As a
guide, when asset and guarding category periodicities differ, the asset category
periodicity should be taken as the driver for the conduct of comprehensive inspections,
and the guarding category periodicity for supplementary inspections of relevant CT
measures. For example TLB Holders/TFCEs might choose to schedule these additional
ANNEX B TO
CHAPTER 2
GUIDE TO THE CONTENTS OF SECURITY STANDING
ORDERS
The headings given below are a guide to the items to be considered for inclusion, as
appropriate, in security standing orders (SSOs). The list is not exhaustive as there
are normally local matters to be included, nor is it intended to be a guide as to layout
which should be arranged to enable parts to be issued as notices or for particular
appointments.
Control of Access
3. Control of access by:
a. Gate controls.
5. Handling of trespassers.
2B-1
RESTRICTED
RESTRICTED
Defence Manual of Security
7. Key control.
Security of Information
11. Orders for and method of promulgation of:
c. Security warnings.
h. Reporting of rumours.
j. Pen/tape friendships.
n. Release of information.
Security of Communications
12. Telephone security.
2B-2
RESTRICTED
RESTRICTED
Security Responsibilities
Security of Documents
14. Instructions for:
19. Reporting of and searching for missing documents, and action on loss or
compromise of protectively marked documents.
d. Control of typing.
2B-3
RESTRICTED
RESTRICTED
Defence Manual of Security
Security of Personnel
30. Maintenance of establishment vetting register.
32. Training of clerical staff, protectively marked equipment storemen, and arms
storemen in their security procedures.
34. Restrictions on, and control of, protectively marked material taken on
exercises or operations.
b. Guarding of documents.
c. Control of access.
d. Careless talk.
2B-4
RESTRICTED
RESTRICTED
Security Responsibilities
g. Telephone security.
Contracts Security
37. Security regulations for contractors. (See also Chapter 12).
2B-5
RESTRICTED
RESTRICTED
Defence Manual of Security
2B-6
RESTRICTED
RESTRICTED
Security Responsibilities
ANNEX C TO
CHAPTER 2
SECURITY ORDERS, REGULATIONS AND
INSTRUCTIONS FOR SECURITY OFFICERS
1. Security officers at all levels must acquaint themselves with current security
directives. They must also be aware of the sources of reference and guidance on
security matters contained in the publications detailed in this Annex. It is not
expected that all of the publications will be held, but security officers should be
aware of the existence of the documents.
a. Queen's Regulations for the Royal Navy, Army or Royal Air force (as
applicable).
k. Tempest regulations.
2C-1
RESTRICTED
RESTRICTED
Defence Manual of Security
n. IDO regulations:
(8) ACO 130 (Revised 1999) - Rules for the Handling and
Release of Information Marked ATOMIC.
a. BR 8988.
c. FLAGOs.
2C-2
RESTRICTED
RESTRICTED
Security Responsibilities
b. AGAIs (60974).
e. CD 1167.
g. RAF GAls.
2C-3
RESTRICTED
RESTRICTED
Defence Manual of Security
2C-4
RESTRICTED
RESTRICTED
Security Responsibilities
ANNEX D TO
CHAPTER 2
SECURITY INCIDENTS - MANDATORY REPORTING
TO MINISTERS
Scope
1. There is a requirement to staff reports on security incidents to Ministers in an
accurate and timely way to ensure that security incidents which might attract public,
Parliamentary or media attention are brought to their notice. This instruction
identifies which types of incident are to be reported and the methods to be used.
Advice can be sought at any stage from the appropriate TLB/Chain of Command,
who should be informed immediately that an incident has occurred.
b. Incursions onto MOD sites where there has been a significant failure
of security measures.
1
It is not possible to define “Significant” more specifically. It is a matter of judgement but advice
may be sought from the appropriate TLB PSyA/Chain of Command Security Staff or D Def Sy.
2D-1
RESTRICTED
RESTRICTED
Defence Manual of Security
Responsibilities
3. Responsibility for staffing reports to Ministers rests with the TLB/Chain of
Command which should take the lead consulting, as necessary, the Security Staff and
Civil Secretariats which must also be involved, and D Def Sy. (The exception to this
is HQ LAND where the Command Secretary will lead). However, the following
exceptions to this staffing arrangement apply:
It should, however, be noted that separate reporting instructions are set out in
JSP 440 Volume 4 covering Terrorist threats to nuclear assets, under
Codeword BINGHAM and where such incidents have a safety dimension
additional reporting under Codewords TOPSTAR, PRIMROSE or LIABLE
remains unchanged.
2D-2
RESTRICTED
RESTRICTED
Security Responsibilities
Procedures
5. In order to alert the security system that an incident has occurred and to
provide subsequent monitoring of it, there are four steps outlined below which are to
be followed. D Def Sy is to be an information addressee on all reports/submissions
and is able to provide advice at any stage of an incident or during the reporting
process.
Documentary Losses
2D-3
RESTRICTED
RESTRICTED
Defence Manual of Security
IT Incidents
APS/SofS }
DGS&S }
D Def Sy }
2D-4
RESTRICTED
RESTRICTED
Security Responsibilities
2D-5
RESTRICTED
RESTRICTED
Defence Manual of Security
2D-6
RESTRICTED
RESTRICTED
Security Responsibilities
ANNEX E TO
CHAPTER 2
SECURITY INCIDENTS - MANDATORY REPORTS TO
MINISTERS - INITIAL REPORT SIGNAL FORMAT
To: MODUK
Others as required
SIC: YAL/Y2G
Precedence: IMMEDIATE
2E-1
RESTRICTED
RESTRICTED
Defence Manual of Security
2E-2
RESTRICTED
RESTRICTED
Security Responsibilities
ANNEX F TO
CHAPTER 2
FORMAT OF IMMEDIATE SIGNAL REPORT OF
SUSPECTED LOSS OR COMPROMISE OF
PROTECTIVELY MARKED MATERIAL
The report is to state:
2F-1
RESTRICTED
RESTRICTED
Defence Manual of Security
2F-2
RESTRICTED
RESTRICTED
Risk Management
CHAPTER 3
RISK MANAGEMENT
03 Risk management
General 0301
3-1
RESTRICTED
RESTRICTED
Defence Manual of Security
3-2
RESTRICTED
RESTRICTED
Risk Management
CHAPTER 3
RISK MANAGEMENT
General
0301. Risk management provides the method for conducting the protective
security process. It is the means to ensure that the security measures adopted
to counter the threats posed to assets reduce the likelihood of compromise to
an acceptable level but are not greater than are warranted by the asset's value.
It is a common sense methodology to enable the selection of appropriate and
cost effective security measures. The main elements are:
3-3
RESTRICTED
RESTRICTED
Defence Manual of Security
Step 1
Stepdd
List Assets
Step 7
Step 2
Total Security
Review Determine
Asset Values
Step 5/6
Step 4
Identify
Vulnerabilities
(1) Information.
3-4
RESTRICTED
RESTRICTED
Risk Management
(a) Arms.
(b) Ammunition.
(c) Explosives.
(3) People
3-5
RESTRICTED
RESTRICTED
Defence Manual of Security
c. Step 3. List both Types and Levels of Threat. Against each asset
group (such as information) list the type(s) of threat (e.g. espionage or theft)
and the threat level as defined in Annex D to Chapter 1 or in the case of
terrorism Annex E to Chapter 1. An example of a completed record that
might be made by an establishment for Steps 1 to 3 of the Risk Management
Process is at Annex B.
3-6
RESTRICTED
RESTRICTED
Risk Management
3-7
RESTRICTED
RESTRICTED
Defence Manual of Security
3-8
RESTRICTED
RESTRICTED
Risk Management
and decisions in the risk management analysis have been recorded to enable
audit in the future.
3-9
RESTRICTED
RESTRICTED
Defence Manual of Security
3-10
RESTRICTED
JSP 440 Volume 1 Issue 2
C I A C I A
ANNEX A TO CHAPTER 3
Information
Documents
Equipment
RESTRICTED
Risk Management
RESTRICTED
IT Systems
Physical
3A-1
Arms
Ammunition
Explosives
Dangerous drugs
Toxic substances
Public funds
Operational
effectiveness
People
MOD employees
Dependants
Visitors
RESTRICTED
Defence Manual of Security
1. Note 1 - Asset. List assets in general terms under the appropriate asset
type heading, for example the "Arms" asset type might show just 2 entries "small
arms" and "support weapons". In the case of documents it is only necessary to
show "TOP SECRET", "SECRET", "CONFIDENTIAL", "RESTRICTED" if
documents with any of those protective markings are held. For IT systems state
only the project name and PC for personal computers.
2. Note 2 - Value. Show the protective marking for each asset under the
appropriate headings of Confidentiality (C) Integrity (I) Availability (A). In the
case of documents or other material, it is probable that only the 'C' column would
be completed, where as for equipment or IT systems the 'I' and 'A' might have a
protective marking value. For example although an IT system might only store
information protectively marked up to RESTRICTED, the damage that might
arise following the corruption or non availability of vital data might warrant a
higher protective marking under 'I' and 'A'. Unless physical assets have an aspect
of confidentiality such as a weapon that is CONFIDENTIAL, their value should
be recorded under 'A'. All arms, ammunition, and explosives are to be allocated
the protective marking SECRET, unless such as in the case of nuclear weapons
their value might be TOP SECRET.
3. Note 3 – Quantity. State only the approximate quantity e.g. for
CONFIDENTIAL DOCUMENTS – ‘200-250’ or an IT system – ’12 Terminals’.
4. Note 4 – Listing. State the register in which the assets are recorded if a
record is held. In the case of SECRET or TOP SECRET protectively marked
documents, equipment and material show ‘MOD Form 102’ and relevant volumes.
As CONFIDENTIAL and RESTRICTED are not recorded state ‘Not Recorded’
for any such holdings. Likewise for Physical Assets, give the record if one is kept
such as ‘Arms Register’.
5. Notes – Location. Give a very general statement of where the asset is
normally held or worked upon e.g. for Arms – ‘Armoury’ or RESTRICTED
documents – ‘all buildings’.
6. Note 6 – Aggregate Value. If the compromise of the full collection of
assets of a particular type would cause greater damage than the compromise of a
single asset, state the aggregate value under the headings Confidentiality (C),
Integrity (I) and Availability (A). For example, the compromise of the total
holdings of SECRET documents might cause damage in confidentiality to the
value of TOP SECRET. If the aggregation of items would not increase their
compromise damage from that shown in the value column, enter the same
protective markings as that of the Value column.
7. Note 7 – Threat Type/Level. Insert threat type e.g. Theft and level e.g.
MODERATE. Guidance for threat levels can be found in Annexes C, D and E to
Chapter 1.
ANNEX B TO CHAPTER 3
RECORD FOR STEPS 1, 2 AND 3 OF RISK MANAGEMENT PROCESS -
EXAMPLE
Asset Asset Value Quantity Listing Location Aggregate Threat
group/type (Note 1) (Note 2) (Note 3) (Note 4) (Note 5) value type/level
(Note 6) (Note 7)
C I A C I A
Information
Physical
-
Arms Small arms S 650-700 Arms Armoury S Theft/Low
Register
Ammo
All natures S 6-7000 Register Ammo Store S
C I A C I A
Public funds sub-unit
offices
AFVs C C 101 AB 562 S S
B Vehicles R R 71
Operational Vehicle Park C C
effectiveness Vehicle Park
MT
MT
People
ANNEX C TO
CHAPTER 3
UNIVERSAL BASELINE MEASURES
1. MOD organizations must comply with all relevant legislation including:
4. MOD organizations are to take all reasonable steps to ensure that security
considerations are taken into account in the design of information systems.
6. MOD organizations are to take reasonable steps to ensure that new buildings
are designed to reach reasonable standards of security and that the same standards of
security are achieved when existing buildings are adapted. (The appropriate British
standards provide useful guidance).
7. MOD organizations are to ensure that all valuable assets are kept in
environmentally suitable conditions.
8. MOD organizations are to ensure that all staff receive adequate education in
the application and relevance of protective security measures and in their own
protective security responsibilities in order to raise their level of awareness of the
importance of security issues.
3C-1
RESTRICTED
RESTRICTED
Defence Manual of Security
10. MOD organizations are to ensure that those handling protected assets are
made aware of the level of protection required. Usually this will be by marking the
asset but sometimes this may not be possible. Where protected assets are released
outside Government service, holders must also be given guidance about how to
achieve the required level of protection.
11. MOD organizations are to consider the need for a contingency plan in the
event of an emergency.
12. MOD organizations are to ensure that people are accommodated and work in
conditions which protect them from any likely threat.
3C-2
RESTRICTED
RESTRICTED
Control and Carriage of Protected Documents
CHAPTER 4
CONTROL AND CARRIAGE OF PROTECTED
DOCUMENTS
General 04001
Preparation of protectively
marked documents 04003
Production/reproduction of
TOP SECRET and SECRET
documents 04023
Destruction 04034
Musters 04055
General 04057
Files 04059
Packaging 04060
Receipting 04078
Transmission of mail to
foreign governments and
foreign-based defence contractors 04102
Introduction 04109
Homeworking 04158
CHAPTER 4
SECTION I
CONTROL OF DOCUMENTS
General
04001. Universal baseline measures. The following are universal baseline
measures:
Note: Physical protective measures for documents, including those in transit and at
temporary locations, are referred to in this Chapter but are given in more detail in
Chapter 5.
a. Each SECRET and TOP SECRET document is to bear the title of the
originating office, a reference number and date of origin. Any protectively
marked documents issued in a series are to be serially numbered.
04010. If MOD F 72 is being used, Part A of the completed form will be returned
with the completed work for retention with its duplicate for at least five years. Parts
B and C (as appropriate) will be retained for six months by the typing and/or
reproduction pool with the record of work done.
b. If the item is retained within the area served by the registration point,
"final disposal" details must give the reference of the file, folder, filing box
or library together with the enclosure/folio number.
(1) The front page of the PDR provides space for the supervising
officer to be identified and record the inspections.
04017. All documents marked SECRET or above which cannot be placed on a file
because of size or the nature of the material (eg books, computer tapes, films and
transparencies) are to be:
b. After incorporation of the amendment, the person who has made the
amendment should:
(1) Check the document against the list of effective pages (LEP).
(2) Check that, if any pages have been extracted, they tally with the
instructions accompanying the amendment.
(3) Before any extracted pages are destroyed, hand over the
documents to an authorised person for checking.
b. SECRET - PINK
c. CONFIDENTIAL - GREEN
d. UNCLASSIFIED/RESTRICTED - BUFF
04026. Shorthand writers. When requests are made for the services of a
shorthand writer, the security grading of the work is to be stated so that appropriate
security safeguards may be applied. The following principles are to be observed:
04027. Audio typing. Audio tapes received by typing sections for the
production of protected work should be safeguarded at all times according to the
highest protective marking ever recorded on the tape.
04030. Conditions for the installation and use of copying facilities. Where
centralised facilities are not available, or are unsuitable, eg for work on specially
sensitive or abnormal material, local copying facilities may be provided within
Establishments. The following conditions are to be observed:
04031. Where copiers are under the control of supervisors or their deputies, the
following procedure must be followed:
04032. Where user-held copiers, and copiers in centralised facilities which are
available to other staff, are controlled by automated devices, separate security
instructions will need to be promulgated. Advice should be sought from security staff
or security units.
b. Printer and other inked ribbons and correction tapes (eg acetate, paper,
thermal transfer and carbon ribbons) which have been used for protected work
must be kept in an appropriate security container when not in use and
eventually disposed of as protected waste. All typewriter ribbons, etc, should
be removed from equipment before it is allowed to leave official premises for
repair.
Destruction
04034. Baseline measure. Documents which are no longer in use and for which
there is no longer any adminstrative need, or which are considered unsuitable for
consideration for permanent preservation – guidance on the criteria and where to
forward relevant material is given in JSP 441 – may be destroyed. Destruction to be
undertaken by the originator, successor, or a person duly authorised within the holding
department. A record of SECRET and TOP SECRET documents should be made
which includes the date of destruction and authorisation.
04037. Documents which holders may destroy. Unwanted documents other than
those in categories included above may be destroyed and disposed of as protected waste
in accordance with paras 04038 - 04043 below.
a. The final column of the PDR should be endorsed with the names and
signatures of those certifying destruction of individual documents together
with the date.
Downgrading of information
04040. The regular review of holdings of protectively marked documents in any
media is desirable in terms of security, cost and convenience. Any review should
consider whether the current grading needs to be retained or whether it is possible to
downgrade or destroy the material. Only the originator, or successor, may authorize
downgrading but exceptionally, where the originator, or successor, cannot be traced,
copy documents may be downgraded by the holders after consultation with other
addressees. MOD F 171 may be used to request and authorize downgrading. An
example is at Appendix 1 to Annex A.
Methods of destruction
04041. General. Protected waste is to be destroyed by machine shredding,
pulverising, pulping or burning. Methods which enable protected material to be
reduced to unclassified waste before leaving the building/site are preferred. All paper
waste is to be destroyed by tearing into a minimum of four pieces and placing in an
appropriate Kraft paper sack. Before destruction, magnetic media which has been used
to store protected data should be wiped using a security-approved bulk eraser or, where
possible, overwritten using an approved erasure programme. If media contains
JSP 440 Volume 1 Issue 2
4-19
RESTRICTED
RESTRICTED
Defence Manual of Security
Sacks to be burnt under MOD arrangements are to be securely tied; sacks to be burnt or
pulped under HMSO arrangements are to be sealed using a security approved tag or
seal such as those issued by the Defence Courier Service.
a. Date of collection.
h. Supervisors signature.
Office keepers, etc, must inspect collection notebooks at intervals to ensure correctness
of entries and make spot checks of bags to ensure that quantities in store tally with
quantities recorded in the notebooks. Pending destruction, protected waste in sealed
sacks is to be kept in secure storage or security containers appropriate to its protective
marking.
JSP 440 Volume 1 Issue 2
4-20
RESTRICTED
RESTRICTED
Control and Carriage of Protected Documents
Spot checks
04044. Baseline measure. Spot checks are intended to ensure that the document
control system is adequate and functions correctly and that the rules are being observed
by the staff.
04049. Minimum standards for checks and musters. Checks and musters of
documents marked SECRET and above are to be carried out to the following minimum
standards:
a. TOP SECRET
b. SECRET
Note: Additionally, the following TOP SECRET and SECRET documents are
also subject to spot checks:
c. Shorthand notebooks.
04051. Microform. In order that the spot checking officer can verify that a jacketed
fiche master copy is complete, a diazo copy, which cannot be tampered with, should be
made for comparison purposes and should be replaced with a fresh copy whenever the
master is amended. The silver halide master and the diazo copy must he stored
separately. In addition, the following points affecting the integrity of microfilm should
be noted:
b. Roll film. Check the container details against the register and
periodically put the film on a reader to ensure that it is the correct film, that
frame numbers are in sequence and the diazo film is free from splices.
d. Microfiche. Check periodically that all fiche in sets are present and
that no improper substitution has been made.
04052. The officer conducting a spot check is to report to the head of establishment or
the nominated security officer. The report must contain the details as shown at
Appendix 1 to Annex B.
04053. HOE should ensure that all irregularities noted in reports are resolved.
Significant irregularities or any which cannot be resolved locally are to be reported to
the appropriate Principal Security Adviser’s staff who will notify DDefSy where
appropriate.
Musters
04055. TOP SECRET files are to be mustered annually. Musters ensure that TOP
SECRET files are not lost between the registry and areas served, a fact which would not
be disclosed by the system of spot checks outlined above. Special rules exist for
mustering ATOMIC and certain other documents on limited distribution. These are in
no way invalidated by the procedures outlined above. Certain documents originated by
JSP 440 Volume 1 Issue 2
4-24
RESTRICTED
RESTRICTED
Control and Carriage of Protected Documents
other Government departments and used within the Ministry of Defence may also be
subject to mustering and accounting procedures. Accountable IDO documents will be
mustered once every twelve months under arrangements made by DIS Sy (IDR).
SECTION II
Baseline measures
04056. Protective markings of SECRET, CONFIDENTIAL and RESTRICTED assets
should not appear on the outer cover, packaging or container sent outside an
establishment. The protection given to assets sent to or received from other countries
must take into account any international agreements on the carriage of protectively
marked assets. For TOP SECRET see Appendix 1 to Annex C.
General
04057. Protectively marked documents are to be prepared for transmission in
accordance with the instructions contained in Annex C and its Appendices;
Note: Care must be taken when addressing letters, etc, and their
envelopes/packaging, to ensure that details entered are clear, complete and correct;
similarly include an address to which replies can be sent. Detailed instructions for
preparing envelopes/packages containing protected material will be found at Annex C
to this Chapter. Certain material must be addressed to the recipient by name. Mail for
organisations listed in the MOD Directory should be addressed to branches, etc,
identified by abbreviated titles.
04058. Officers receiving protected or sensitive documents which are not of their
concern, are responsible for the items' onward despatch to the proper addressee or
return to the originator. Appropriate safeguards, as laid down in this Chapter, must
be applied. Where the consignor appears to be in breach of security regulations, the
establishment security officer should be informed who will take reporting action as
necessary.
Files
04059. When files bearing different protective markings are transmitted together, the
file bearing the highest marking is to be placed topmost inside the envelope or
wrapping. Files are to be securely fastened together and prepared for transmission in
accordance with instructions appropriate for the highest protective marking.
Packaging
04060. To reduce risk of loss or compromise during transmission, particular care is to
be taken when packing protectively marked documents or material. For detailed advice
on the correct way to package bulky/awkwardly shaped items, staff should contact their
local mail room or consult JSP 367. However, the following points are to be
considered:
d. Extra care must be taken when packing documents, etc, as parcels (even
when sent by "Letter Post") will be subject to rough handling during sorting
and transmission.
*Where applicable (see Annex C), double cover must be provided irrespective
of the type of packing or method of transmission.
Methods of transmission
04061. Certain documents, identified by their protective marking and/or destination
(see Annex C) must never be sent by Post Office services;
b. External services (other than the Post Office) may only be used for
transmission of material marked CONFIDENTIAL or SECRET where
approved by DDefSy.
Sealing - general
04065. All envelopes, packages and sacks, etc, containing TOP SECRET material,
and similar consignments of SECRET material for delivery abroad or in Northern
Ireland, are to be sealed to guard against surreptitious tampering. The following
paragraphs describe alternative methods to be employed.
04067. High security tape is not suitable for use other than on envelopes;
conventional wafer seals are to be applied to parcels and packages and metal seals to
mail sacks, etc (see para 04077).
04068. Storage, maintenance and disposal of high security tape. The following
should be observed:
JSP 440 Volume 1 Issue 2
4-28
RESTRICTED
RESTRICTED
Control and Carriage of Protected Documents
c. High security tape has a shelf-life of twelve months when stored under
recommended conditions. Rolls of tape will be serially numbered during
manufacture to facilitate sequential use and allow identification should this be
necessary.
d. Rolls, lengths and waste portions of high security tape, including any
remaining on used envelopes, should be protected to RESTRICTED standards
and kept under lock and key. Waste tape and used envelopes bearing high
security tape should be treated as protected waste and disposed of in
accordance with the relevant security regulations.
04068. Evidence of tampering. While use of high security tape on envelopes will
deter surreptitious attack, staff should be alert to the possibility of tampering. Those
receiving envelopes to which tape has been applied should look for the following:
Notes:
1. The level of security offered by these alternatives is less than was available
from the red high security tape.
2. The Keepsafe envelope is still available and offers the security and a high
level of integrity for the transmission of SECRET and TOP SECRET material.
04071. The approved Keepsafe security envelopes are available in a range of sizes, are
opaque and made from super strength plastic film. They incorporate a specialised
closure system offering maximum evidence of tampering and other security features as
follows:
b. The label flap has been added to enable addressees to affix labels to it
when required because, for security reasons, labels must not be fixed to the
main body of the envelope.
04072. Consignees should bear in mind that when sending material in Keepsafe
security envelopes for onward transmission via a forwarding agent (eg the Defence
Courier Service (DCS)) protective or other markings may be masked by overwrapping.
Arrangements should therefore be made with such organisations to ensure that the
material receives appropriate handling through all stages of its journey.
04073. Addressing and sealing. The following procedure should be followed when
addressing and sealing Keepsafe security envelopes:
b. The main body of the Keepsafe envelope is marked and addressed in the
same way as an envelope to be sealed with high security tape (Note: use ball
point pen - do not use labels or stamps).
(1) On a flat surface remove the printer release tape from the special
adhesive strip.
(2) Allow the closure flap to fall naturally over the envelope mouth,
and then press down on the adhesive strip so that the number of the
envelope remains legible. The envelope is correctly sealed only when
the printed release tape has been removed. Envelopes must not be
patched until they have been correctly sealed. Special attention should
be paid to sealing when the item to be transmitted is not flat; sharp edges
or points should be masked.
(4) The closure must not have any added reinforcing (eg cellulose
tape).
04076. Procurement. Keepsafe security envelopes are available from two sources:
Where an address label, ie self-addressed label or MOD Form 488, is used with wafer
seals, the label should be stuck down first before applying any seals.
Receipting
04078. Receipts are to be obtained confirming delivery of the following:
04079. Receipts rendered in accordance with para 04078 above may be standard
MOD Forms 24 or specially prepared proformae, eg produced as a tear-off strip on a
distribution sheet. In either case, the receipt should identify the following:
complete any receipt enclosed before arranging for PDR entries to be made. See also
sub para 04013(c).
04081. HOE are responsible for ensuring that receipts against items despatched from
their areas are returned promptly - within the time normally taken for transmission over
the route concerned (eg 10 working days for transmission within the United Kingdom).
Failure to respond quickly can result in detection of loss and compromise of sensitive
material being seriously delayed. Consignors who identify addressees who persistently
fail to return receipts promptly should report the matter to the establishment security
officer.
04082. Completed receipts, other than those relating to accountable documents (see
Definitions) for which separate instructions apply, are to be retained for two years.
04085. Before envelopes, mailbags and other containers used in the transmission of
protectively marked or sensitive material are discarded, they should be carefully
checked to ensure that they are empty.
04089. Where boxes, etc, are used to transmit a number of documents to a distribution
point, eg a mail room, consignors must place documents in envelopes addressed to
individual recipients so that 'need to know' is maintained after the box, etc, has been
opened.
04091. The security of a suite of boxes, etc, may be compromised by loss of a key or
when an unauthorized person has the opportunity to examine the lock. When not in
use, they are to be kept locked and stored under lock and key. When delayed in transit,
boxes, etc, are to be stored in a security container.
04092. When not in use, keys to boxes, etc, should be kept in a locked security
container. Boxes, etc, and their keys are to be mustered twice a year by the controlling
organiser. Key holders are personally responsible for the safety of keys in their charge.
Before handing-over official responsibilities, including handover to cover temporary
absence, keys are to be formally mustered and transferred to another officer. Any
changes in holders of boxes, keys, etc, are to be reported to the controlling organisation
immediately.
Note : Where TOP SECRET or other documents are to be sent by courier, the
addressee must be warned that he/she must receive them in person, producing
identification to the courier's satisfaction before the documents can be handed over.
The intended recipient is also to be informed that, after examination, the documents
must be replaced and resealed in an envelope for return to the consignor via the holding
HQ/Unit or, if needed for future reference, for retention by the latter.
(2) Address carefully and correctly, including the post code, ensuring
no reference to rank, decorations or appointment is shown on the
envelope.
(3) Do not stamp the envelope with any official stamp or add any
detail which could associate the item with the Ministry of Defence.
(4) Postage stamps must be used in all cases, do not use franking
machines or PPI impressions, labels or stickers.
b. The despatching organisation and the reference and date of origin of the
document enclosed should also be shown.
04100. Private mail for Service personnel and Defence Attaches serving in diplomatic
posts in countries of special security interest (see para 6 of Annex C) should be sent c/o
Private Letter Section, F&CO, via HQ DCS, BFPO 747.
04103. The 'despatching authority' must ensure that the originator has approved
release of their UK marked information to the recipient country. Where there is any
doubt, the appropriate Principal Security Adviser should also be consulted. Where the
intended recipient is a foreign-based defence contractor, the despatching authority must
also consult InfoSy(Industry)1 to ensure that the recipient company is authorized to
safeguard and store protectively marked material at the appropriate level.
04104. Mail received from UK defence contractors for onward transmission overseas
is only to be released in accordance with the rules contained in Chapter 11.
SECTION III
Introduction
04109. The removal of protectively marked material from official premises exposes it,
and often the carrier, to additional security risks. Protectively marked documents are
not to be taken away from official premises unless this is absolutely unavoidable and
essential for the conduct of official business. Every effort should be made to reduce
the risks associated with hand carriage by sending material through official channels
(including use of the DCS), and restricting documents carried both to the minimum
quantity and the lowest protective marking. Removal is subject to conditions laid
down in the following paragraphs. References to "protectively marked documents"
relate to documents marked CONFIDENTIAL or above.
04110. Documents marked SECRET or above are only to be taken outside official
premises by individuals holding written authority to do so (MOD F 924 or locally
produced alternative). A specimen is at Appendix 2 to Annex A.
HOE are to satisfy themselves that the security risks involved in removing protected
documents from official premises are justified in the public interest. Before departure,
officers authorized to remove protected documents are to be briefed on their safe
custody during transit and, if appropriate, overnight. Documents remain the
responsibility of the named individual until returned to the holding establishment or
handed-over to another authorized person (or official representative, eg contractor).
(Note: Briefcases, etc, are not approved security containers and cannot protect contents
against surreptitious examination by unauthorized persons (even if given only limited
access). Briefcases and other containers used to transport protectively
marked/sensitive material must remain under the carrier's personal custody at all times
until their contents can be secured in accordance with minimum security standards.)
d. The signed (top copy) of MOD Form 924 (or alternative) is to be carried
by the officer authorized to remove documents and presented on demand to
any person empowered to search briefcases, etc, - eg a security guard. The
duplicate form is to be retained by an officer appointed by the head of
establishment in accordance with local security instructions.
Removal for retention outside official premises for one or more nights
04112. Protectively marked documents should only be retained outside official
premises if they cannot be returned to the holding office, or alternative official
premises.
(The telephone number to be given is that of the security control room for your
building/establishment. If in doubt, consult your Principal Security Adviser for advice.)
While carrying protectively marked documents, briefcase, etc, keys should be kept
secure on the person, separate from the container.
Note: Authorised officers must not carry the prohibited items listed at Annex N
para 2 in their briefcase with protectively marked documents.
04117. Any briefcase may be used when carrying material marked RESTRICTED
provided it is locked (but see para 04116 regarding advice on travel to Northern
Ireland).
04119. Wherever possible (and particularly where long journeys and overnight stops
are likely):
04120. Where these arrangements are not practical, the following conditions apply:
04122. Travel by civil aircraft within UK. When travelling by civil aircraft within
UK (including Northern Ireland), staff may be required (as a precaution against possible
terrorist action) to assist airport security staff, by disclosing the contents of their hand
luggage, including briefcases. To prevent compromise of material protectively marked
SECRET or above, the following procedures are to be followed:
a. Prior to departure.
JSP 440 Volume 1 Issue 2
4-44
RESTRICTED
RESTRICTED
Control and Carriage of Protected Documents
(4) Lock the package and top copy of the MOD form 924 in a
sturdy dual combination lock and labelled commercial type briefcase;
the package should normally remain inside the briefcase until it reaches
its destination.
(1) If asked by airport security staff to open the briefcase, the MOD
officer should explain, discreetly, that it contains official documents
carried in pursuit of HMG business; to avoid public recognition as a
MOD official and to avoid the material carried being compromised, the
courier may ask for any search to be conducted in private. The
briefcase may be opened and the MOD Form 924 offered as
confirmation.
(2) The sealed package should not be opened except in the presence
of senior security staff and then only sufficient to display the nature of
the contents, eg papers; uncleared persons must not be allowed to read or
otherwise study sensitive material.
(3) Airport security staff should be asked to assist the officer, as
necessary, in resealing any package opened at their insistence.
Note: The advice contained in this paragraph applies also to ferry journeys
between Great Britain mainland and Northern Ireland, where similar checks
may be made at departure points.
04127. Except when ministers or senior officials are travelling with a group of
colleagues in British controlled transport to or from meetings in territories of countries
JSP 440 Volume 1 Issue 2
4-46
RESTRICTED
RESTRICTED
Control and Carriage of Protected Documents
presenting a special security risk (see Annex C), in no circumstances will permission be
given for the personal carriage of protectively marked documents (including
RESTRICTED) across the borders of, within, or over, such countries.
04128. In all cases where documents marked CONFIDENTIAL or above are taken
overseas, a list of the documents must be left with the dispatching establishment, a copy
being held with the documents in the container carried by the courier. The
establishment originating the consignment should also give notice, to the office to
which the material is addressed, of the courier's travel arrangements, so that undue
delay in delivery can be notified to the originating establishment for immediate
investigation.
04130. Written authority from the appropriate Principal Security Adviser on behalf of
the PUS, is required in respect of all applications for authority to carry protectively
marked material as a casual courier possessing diplomatic immunity. Authority will
only be granted to officers or senior non-commissioned officers of the Services or
established officials not below Administrative Officer grade, who are UK based and
citizens of the United Kingdom or Commonwealth and have been vetted at the
appropriate level.
04132. Subject to authority granted by the appropriate Principal Security Adviser, the
officer who is to act as casual courier will be required to report, with the documents to
be carried, to the Communications Department of the Foreign and Commonwealth
Office. The courier will be briefed for the journey and provided with a special courier's
passport and "diplomatic way-bill" valid for one journey only; the documents will be
sealed in a diplomatic bag. The officer must be in possession of a valid British
passport and visas necessary for the journey. These documents, and the properly
constituted diplomatic bag, provide the courier with inviolability and immunity from
JSP 440 Volume 1 Issue 2
4-47
RESTRICTED
RESTRICTED
Defence Manual of Security
any form of arrest or detention in the country of his destination abroad and in any other
countries he may pass through en route in accordance with international agreement. The
diplomatic bag may not be opened, examined (eg by airport scanner) or detained by
foreign authorities en route; in case of difficulty the local British representative must be
contacted. However, the privilege of diplomatic immunity must not be abused by also
carrying prohibited items in the diplomatic bag with protectively marked documents. A
list of prohibited items is given at para 1 of Annex N.
04133. Where it is essential for ministers or senior officials (normally members of the
Defence Council) travelling abroad to have access to official papers during the journey,
the appropriate Principal Security Adviser should be asked to make arrangements with
the Foreign and Commonwealth Office for the documents to be carried in a locked and
labelled pouch or briefcase instead of in a sealed bag. (Whatever the destination, such
exceptions require personal authorization by the PUS.) The requirement should be
indicated when submitting a request to the appropriate Principal Security Adviser in
accordance with para 04130.
04134. Where documents are needed in NATO countries at very short notice, the
appropriate Principal Security Adviser may exceptionally, at their discretion and subject
to the restrictions at paras 04125-04128 above, waive the need for diplomatic immunity
and authorize the carriage of UK or IDO (non-accountable) documents marked
CONFIDENTIAL or SECRET. Applications seeking authorization of casual couriers
within these constraints, signed by the head of establishment should be sent (in the form
shown at Annex E to this chapter) to the appropriate Principal Security Adviser at least
7 working days before the start of the journey abroad. Sector security authorities, at 1
star level or above, may delegate to nominated HOEs/COs authority to waive the need
for diplomatic immunity, and to authorize carriage of such documents by staff subject
to the restrictions at paras 04125-04128.
04135. Provided the journey does not involve travel through, to or over countries
presenting a special security risk, officers may carry UK and IDO RESTRICTED
documents without formal documentation as a casual courier. The documents must,
however, be carried in a sturdy dual combination locked commercial type briefcase.
c. Ensure that the officer nominated is cleared for access to the information
carried.
Authority to carry documents must be provided in writing (see para 04139) and be
issued only by, or on behalf of, the appropriate Principal Security Adviser (see para
04134).
04137. The officer may be authorized to travel to or through the following countries,
and to no others:
Belgium Luxembourg
Canada Netherlands
Denmark Norway
France Portugal
Germany Spain
Greece Turkey
Iceland United States
Italy
04139. Authorization under these rules must be in the form of Annex F, prepared in
duplicate, and signed by an officer to whom powers have been delegated by the
appropriate Principal Security Adviser (normally not below the rank of Assistant
Secretary or 1 star equivalent). The duplicate copy of each authorization should be
retained by the establishment security officer and made available for inspection by
security staff. Officers intending to carry documents must be issued with a set of
instructions, as detailed in Annex G, and must certify in writing, as in Annex H, that
they have read and understood them before departure.
04140. Authorization for carriage under the rules set out in this section is limited
solely to the transmission of UK, non-accountable NATO CONFIDENTIAL and
SECRET documents and UN documents (See Annex L). Documents bearing
additional markings should not be carried without reference to the appropriate Principal
Security Adviser or to the delegated officer. Provided the journey does not involve
travel through, to or over any non-NATO countries, UK and NATO RESTRICTED
JSP 440 Volume 1 Issue 2
4-49
RESTRICTED
RESTRICTED
Defence Manual of Security
04141. Documents must be carried under cover. The cover, securely sealed in
accordance with the rules contained in Section II, must be addressed to the officer
himself care of his destination. The cover must bear the reference number of the
Certificate of Authorization (Annex F), the departmental stamp and the signature of the
officer who signed the Authorization Certificate. The package must be carried in a
sturdy dual combination locked commercial type briefcase or similar container of a type
meeting the approval of the relevant security regulations.
04142. Authority under these rules will be given only in respect of documents
required at a meeting, subject to the conditions addressed in paragraph 04138.
Agreements on security with other countries generally provide that protected
information may only be exchanged on a Government-to-Government basis or between
international organisations concerned. Protectively marked documents should,
therefore, not be handed directly to representatives of overseas firms but where
necessary, released to a Government Department of the country concerned, or to the
local British Embassy or High Commission, for onward transmission. Receipts should
be obtained where necessary.
Note: Where an officer (who is not a casual courier) attends a meeting overseas
and has reason to believe he/she may be required to bring back protectively
marked documents to the United Kingdom, the officer should arrange with the
British Embassy, High Commission or Consular Office for his/her documentation
as a casual courier. Facilities for sealing the documents should be sought, and a
sturdy dual combination lock commercial type briefcase or other suitable official
container used to transport the documents to the UK.
04144. On return the casual courier should personally verify with the officer holding
the duplicate lists of material removed that all documents have been returned or receipts
JSP 440 Volume 1 Issue 2
4-50
RESTRICTED
RESTRICTED
Control and Carriage of Protected Documents
obtained. The casual courier should also send his Authorization Certificate to his
security officer. Any incidents of possible security significance that occurred during
the journey should be reported to the security officer.
04147. Any difficulties arising out of the implementation of para 04146 should be
referred to the appropriate Principal Security Adviser.
04148. Because of precautions taken by airline authorities, both at home and overseas,
to minimise the hijacking of aircraft on international flights the additional instructions in
Annex I should, until further notice, be issued to officers acting as casual couriers.
04150. Only in such exceptional circumstances may Sector security staff authorise,
at their discretion, an officer to carry material protectively marked up to SECRET
without diplomatic immunity. Where descriptors, codewords or caveats are included
in the marking then the approval of the appropriate Principal Security Adviser (at the
appropriate level) should be sought. Such Casual Couriers travelling under this
facility may be subject to Customs and security checks.
04151. Casual Couriers must not carry NATO documents to the following countries
without the permission of the appropriate NATO authority:
Australia Austria
Japan Sweden
Note: Travel by the airlines of the above countries should be avoided where
possible but may be allowed after due consideration of the risks which may
attract to the courier as well as the material he/she is carrying.
04153. PSyA staff should check with the FCO for the latest travel advice on all
countries before authorisation is given. The Casual Courier should also be briefed on
the dangers of hijacking and given a copy of the guidance at Annex I.
04154. PSyA staff must ensure that the Casual Courier is:
a. Cleared for access to the material carried;
b. Issued with instructions (Annex G) which he/she should certify as
having read and understood;
c. Carrying a written authorisation in the form of Annex F; and
d. Provided with a list of documents to be carried. A second copy should
be retained by the ESyO/USO/BSO.
Return to the UK
04155. On return the Casual Courier should personally verify with the officer
holding the duplicate list of material removed that all documents have been returned
or receipts obtained.
movement of TOP SECRET and other documents where only bags and small boxes are
involved is covered at para 04157.
e. During loading and unloading, staff must ensure that crates containing
protectively marked documents are not left unsupervised.
g. Driver and crew should be advised if any crates include fragile items ie
computers, etc. (The appropriate Sector IT security staff should be consulted
regarding relocation of computers).
h. Vehicles must have secure cargo areas where the only form of entry is
through lockable doors. Rear doors (ie main access to secure cargo area) of
vehicles are to be locked with an approved security padlock or with a good
quality padlock. Advice on locks and padlocks can be obtained from the
appropriate Sector security staff. Arrangements should be made to ensure that
one key is held by the relevant MOD officials at both the sending and
receiving points of the journey, unless the load is escorted by MOD staff, who
are insured to travel in the commercial vehicle.
k. The guard Forces at both the pickup and delivery points should be
informed of the crew and vehicle details and time of departure and
arrival.
Further detailed advice on the above can be obtained from the appropriate Principal
Security Adviser at an early stage.
04157. Branches that have quantities of TOP SECRET, ATOMIC or other documents
requiring special handling must send them separately through the DCS or by MOD
Mail Service (MMS). DCS/MMS will also move bags or boxes containing documents
marked up to SECRET provided the weight of each bag or box does not exceed 15Kg.
Documents will be moved on existing routes although special tasks can be undertaken
with prior consultation.
Homeworking
04158. Homeworking is defined as the use of a person's home as their normal place of
work and requiring access to/retention of official information. It is often described as
working from home. It should not be confused with working at home, which is the
term used to describe something which is strictly on a temporary basis eg during
transport disruptions or for overnight working (see para 04113).
04159. Homeworking entails special security risks and will only be allowed following
consideration, on a case by case basis by line management, the appropriate personnel
management authority and Sector security staff.
04160. The specific security rules which apply to homeworking are shown at Annex
M.
SECTION IV
SPECIAL MARKINGS
04161. Only those with a need to know, or need to hold, should have access to
protectively marked information. When it is necessary to provide additional protection
by reinforcing the "need to know" principle, special markings that restrict access should
be used, normally in conjunction with a protective marking. Special markings consist
of:
ANNEX A TO
CHAPTER 4
EXAMPLE OF MOD F 672
MOD Form 672
Record of Protectively Marked Documents (TOP SECRET and
SECRET) contained in:-
File Number
This card should be kept on the LEFT hand side of the file as the top enclosure.
Encl. No. Document Date of Copy No. Protective Date of
Reference No. Document Marking Downgrading
APPENDIX 1 TO
ANNEX A TO
CHAPTER 4
EXAMPLE OF MOD F 171
To: From:
It is requested that authority be given for the downgrading of the documents listed overleaf. If
downgrading is agreed, please state new protective marking in column (e); otherwise insert "No
change".
Date........................... Signature....................................
To: From:
Please note that the documents listed below should now be graded as shown in column (e)
(a) (b) (c) (d) (e)
Reference No. Description (i.e. File, Date Present protective Revised
letter, report etc.) marking protective
marking
APPENDIX 2 TO ANNEX A TO
CHAPTER 4
Serial No: Original MOD Form 924
Authority for and notification of the removal of documents marked CONFIDENTIAL and above from official premises to
destinations in the United Kingdom
Before completing this form, read the relevant paragraphs of DMS Vol 1, and the notes on the cover of this pad.
Rank/grade: Branch:
(b)
(a) (c)
Head of Establishment
4A2-1
RESTRICTED
RESTRICTED
Defence Manual of Security
Authority for and notification of the removal of documents marked CONFIDENTIAL and above
from official premises to destinations in the United Kingdom
Before completing this form, read the relevant paragraphs of DMS Vol 1, and the notes on the cover of this pad.
Rank/grade: Branch:
named in Part A is aware that the documents removed must be carried in accordance with current security regulations and remain in
his/her custody at all times unless placed in secure storage under officially approved arrangements.
Branch
ANNEX B TO
CHAPTER 4
OFFICE SECURITY CHECK SHEET
Room...................... Month......................
1. All security containers are securely locked and security keys mustered.
3. All photocopiers, computers and facsimile machines have been switched off,
hard disks removed (if applicable) and power supplies secured.
Date Time Signature Date Time Signature
APPENDIX 1 TO
ANNEX B TO
CHAPTER 4
SPOT CHECK REPORT
1. I selected the following documents at random from the protected document register (PDR)(MOD F
102), file index etc, for checking in accordance with DMS Vol 1 Chapter 4. Loose documents (as
distinct from files/folders - see para 2 below) together with any annexes and appendices were
checked for completeness.
Serial PDR serial Doc ref Doc date Protective Location of doc Remarks #
No marking (if held, quote
file no)
a.
b.
c.
d.
e.
f.
2. Of the files/folders listed above, I checked the TOP SECRET and SECRET contents of the following,
page by page and against the entries on the minute or inventory sheets.
a. ________________________________________________________________
b. ________________________________________________________________
c. ________________________________________________________________
Rank/Grade…………………………………………………………Name in Capitals…………………………
Notes:
1. A spot check should cover all PDRs.
2. If a document or receipt is produced insert "Seen", if not, insert "Not Seen" and report action taken
overleaf.
3. * Delete as appropriate.
4. No other record of this check should be made either on the documents themselves or in any supporting
register or index/inventory.
ANNEX C TO
CHAPTER 4
TRANSMISSION OF PROTECTED DOCUMENTS
General
1. These instructions provide guidance for the transmission of all types of
protected and unclassified documents except:
Note: Envelopes, packages, etc, reaching the mail room which do not comply with
instructions in this Annex will be returned to the originator. If necessary, mail will
be opened to identify the originator.
6. All official mail, (other than unclassified publicity and information material)
for diplomatic posts in the following countries is also to be sent by diplomatic bag:
Afghanistan Libya
Albania Mongolia
Belarus North Korea
Bulgaria Romania
Cambodia Russia (The Federation)
Cuba South Africa
Iran Syria
Iraq Ukraine
Laos Vietnam
APPENDIX 1 TO
ANNEX C TO
CHAPTER 4
TRANSMISSION OF TOP SECRET DOCUMENTS
FROM ANY MOD OR SERVICE LOCATION IN THE
UK TO ANY ADDRESSEE
WARNING
3. For addresses within approved locations served by the Defence mail service
(see para 3 of Annex C), the address must include the building and room number (for
locations outside London, the name of the town/city should also be included). The
post code must not be included.
5. For all addressees overseas, add the words "Certified Official", this being
endorsed by an authorising officer.
7. If the document bears a National caveat, eg "UK EYES ONLY", this must
not appear on the label; the label must be addressed "Exclusive to" the addressee by
name and appointment.
8. Prepare receipt (MOD Form 24) and insert, with the document, into the
envelope and proceed as follows:
or
Note: Parcels, packages, etc, must be sealed using wafer seals (see para 04077).
Normal Despatch
9. Sealed envelopes are to be conveyed by hand to the central registry, where
they will be recorded and inserted in an outer cover for further transmission. The
carrier is to give and take timed receipts (MOD Form 32) bearing the despatcher's
room number and stamp.
APPENDIX 2 TO
ANNEX C TO
CHAPTER 4
TRANSMISSION OF SECRET DOCUMENTS
SECTION I
4. If the document bears a National caveat, eg. "UK EYES ONLY", the
envelope is to be addressed "Exclusive to" an officer by name and appointment; the
caveat must not appear on the envelope, etc.
6. Insert the document (and receipt if appropriate) and stick down the flap (or
pack the document sticking down all seams).
JSP 440 Volume 1 Issue 2
4C1-1
RESTRICTED
RESTRICTED
Control and Carriage of Protected Documents
SECTION II
13. Mark "SECRET" boldly in red above and below the address; the protective
marking should be prefixed "WEU" or "NATO" if the contents are so marked.
14. Insert the document (and receipt) and stick down the flap (or pack the document
sticking down all seams).
16. Insert the first envelope/package and stick down the flap (or pack sticking down
all seams).
Normal Despatch
18. Sealed envelopes or packages should be placed in the "out" tray for collection
by transit services.
Despatch using Locked Pouches, etc
19. Documents transmitted in a locked pouch or box need not be enveloped
unless the recipient is to forward them to a third party; a receipt (MOD Form 24 or
equivalent - see para 04078) is to be attached to each loose SECRET document or set
of documents to be placed in the pouch. The pouch is to be addressed to the
intended recipient personally by name and/or appointment. (Key-holders are
responsible for onward despatch (taking appropriate safeguards) of any documents
received which are not of their concern.) Pouches, etc should be conveyed by hand
or through normal transit services.
SECTION III
23. Mark "SECRET" boldly in red above and below the address; the protective
marking should be prefixed "WEU" or "NATO" if the contents are so marked.
24. Insert the document (and receipt) and stick down the flap (or pack the
document sticking down all seams).
26. For mail to official addresses, apply the address as at para 22 above.
27. For mail to private addresses, use a plain envelope; address by name without
reference to rank, decorations, appointment, etc.
28. Insert the first envelope/package and stick down the flap (or pack sticking
down all seams).
Note: The outer envelope/wrapping must not bear any security markings,
branch stamp, or other markings which might associate it with the
Department. "PO Box 701, London WC2H 8BG" should be shown as the
return address.
30. Mark the envelope/package with the appropriate approved mail service in the
top left hand corner.
Normal Despatch
31. Sealed envelopes or packages should be placed in the "out" tray for collection
by transit services.
SECTION IV
36. Mark "SECRET" boldly in red above and below the address; the protective
marking should be prefixed "UK", "NATO" or "WEU" if the contents are so marked.
37. Mark the envelope/package "Certified Official", this being endorsed by an
authorising officer (see para 04099).
38. Insert document and receipt (MOD Form 24) and seal the flap and seams of
the envelope with high security tape as described at Appendix 5.
39. If a Keepsafe security envelope is used - seal in accordance with para 04073.
(3) Insert inner envelope/package and seal the flap (or pack
sticking down all seams).
(3) Insert inner envelope/package, seal the flap (or pack sticking
down all seams).
44. Mark "SECRET" boldly in red above and below the address; the protective
marking should be prefixed "UK", "NATO", or "WEU" if the contents are so
marked.
45. Insert the document and receipt (MOD Form 24) and despatch note (see
Appendix 6). Do not seal the flap of the envelope; packages should be loosely
secured, ie, do not stick down seams.
49. Mark "SECRET" boldly in red above and below the address; the protective
marking should be prefixed "UK", "NATO" or "WEU" if the contents are so marked.
51. Insert first unsealed envelope/loosely secured package and seal the flap and
seams of the envelope with high security tape as described at Appendix 5.
(3) Insert second envelope/package and seal the flap (or pack
sticking down all seams).
(3) Insert second envelope/package, seal the flap (or pack sticking
down all seams).
56. Address the envelope/package by name and appointment with postal address
(as appropriate) as follows:
58. Mark "SECRET" boldly in red above and below the address; the protective
marking should be prefixed "UK", "NATO", or "WEU" if the contents are so
marked.
60. Insert document and receipt (MOD Form 24) and seal the flap and seams of
the envelope with high security tape, if still available, as described at Appendix 5.
61. If a Keepsafe security envelope is used seal in accordance with para 04073.
a. For mail emanating from approved locations served by the MOD mail
service (see para 3 of Annex C):
(3) Insert inner envelope/package and seal flap (or pack sticking
down all seams).
(3) Insert inner envelope/package, seal the flap (or pack sticking
down all seams).
67. Mark "SECRET" boldly in red above and below the address; the protective
marking should be prefixed "UK", "NATO", or "WEU" if the contents are so
marked.
69. Insert the document and receipt (MOD Form 24) and seal the flap and seams
of the envelope with security tape as described at Appendix 5.
70. If a Keepsafe security envelope is used seal in accordance with para 04073.
73. Insert inner envelope/package and seal the flap (or pack sticking down all
seams).
74. Mark the envelope/package "Parcelforce 24" or "Defence mail service only" (if
service available) in the top left-hand corner.
APPENDIX 3 TO
ANNEX C TO
CHAPTER 4
TRANSMISSION OF CONFIDENTIAL DOCUMENTS
SECTION I
TRANSMISSION WITHIN MOD OR SERVICE
BUILDINGS/SITES OR BETWEEN APPROVED
LOCATIONS (INCLUDING OTHER GOVERNMENT
DEPARTMENTS) SERVED BY THE DEFENCE MAIL
SERVICE (SEE PARA 3 OF ANNEX C)
WARNING
3. If the document bears a National caveat, eg. "UK EYES ONLY", the
envelope is to be addressed "Exclusive to" and officer by name and appointment; the
caveat must not appear on the envelope, etc.
5. Insert the document and seal the flap (or pack the document sticking down all
seams).
Normal Despatch
7. Sealed envelopes or packages should be placed in the "out" tray for collection
by transit services or forward to registries or mail collection points.
SECTION II
TRANSMISSION TO EMBASSIES AND HIGH
COMMISSIONS IN CENTRAL LONDON SERVED BY
THE DEFENCE MAIL SERVICE FROM APPROVED
LOCATIONS ALSO SERVED BY THE DEFENCE MAIL
SERVICE (SEE PARA 3 OF ANNEX C)
WARNING
11. Mark "CONFIDENTIAL" boldly in red above and below the address; the
protective marking should be prefixed "WEU" or "NATO" if the contents are so
marked.
12. Insert the document and stick down the flap (or pack the document sticking
down all seams).
14. Insert the first envelope/package and stick down the flap (or pack sticking
down all seams).
Normal Despatch
16. Sealed envelopes or packages should be placed in the "out" tray for collection
by transit services or forward to registries or mail collection points.
SECTION III
TRANSMISSION TO ADDRESSES IN THE UK OTHER
THAN THOSE COVERED IN SECTION I & II OF
APPENDIX 3 AND EXCLUDING NORTHERN IRELAND
(SEE SECTION IV) FROM ANY MOD OR SERVICE
LOCATION IN THE UK
WARNING
20. If the document bears a National caveat, eg. "UK EYES ONLY", the
envelope/package is to be addressed "Exclusive to" an officer by name and
appointment; the caveat must not appear on the envelope/package.
21. Mark "CONFIDENTIAL" boldly in red above and below the address; the
protective marking should be prefixed "WEU" or "NATO" if the contents are so
marked.
22. Insert the document and stick down the flap (or pack the document sticking
down all seams).
24. For mail to official addresses, apply the address as at para 21 above.
25. For mail to private addresses, use a plain envelope; address by name without
reference to rank, decorations, appointment, etc.
26. Mark the envelope/package "Letter Post" in the top left hand corner.
27. Insert the first envelope/package and stick down the flap (or pack sticking
down all seams).
Note: The outer envelope/wrapping must not bear security markings, branch
stamp, or other marking which might associate it with the department. "PO
Box 701, London WC2H 8BG" should be shown as the return address.
28. Mail for ships in UK ports or home waters should be addressed to "HMS..., c/o
BFPO 999".
Normal Despatch
29. Sealed envelopes or packages, etc, should be placed in the "out" tray for
collection by transit services or forward to registries or mail collection points.
SECTION IV
TRANSMISSION TO DIPLOMATIC POSTS ABROAD,
AND OTHER ADDRESSES OVERSEAS INCLUDING
NORTHERN IRELAND FROM ANY MOD OR SERVICE
LOCATION IN THE UK
WARNING
5. The appropriate MOD Form 189 (Condition of Release Stamp) must be firmly
attached to each CONFIDENTIAL document sent to a foreign or
Commonwealth Government, or defence contractor of that country. The prefix
"UK" or where appropriate, "NATO" or "WEU" should appear before the
protective marking on the document.
33. If the document bears a (composite) National caveat, eg. "UK/US EYES
ONLY", the envelope/package is to be addressed "Exclusive to" an officer by name
and appointment; the caveat must not appear on the envelope/package.
34. Mark "CONFIDENTIAL" boldly in red above and below the address; the
protective marking should be prefixed "UK", "NATO" or "WEU" if the contents are so
marked.
36. Insert document and seal flap (or pack sticking down all seams).
(3) Insert inner envelope/package and seal the flap (or pack
sticking down all seams).
(3) Insert inner envelope/package and seal the flap (or pack
sticking down all seams).
40. If the document bears a (composite) National caveat, eg. "UK/US EYES
ONLY", the envelope/package is to be addressed "Exclusive to" an officer by name
and appointment; the caveat must not appear on the envelope/package.
41. Mark "CONFIDENTIAL" boldly in red above and below the address; the
protective marking should be prefixed "UK", "NATO" or "WEU" if the contents are
so marked.
42. Insert document and despatch note (see Appendix 6). Do not seal the flap or
the envelope; packages should be loosely secured, ie. do not stick down seams.
45. If the document bears a (composite) National caveat, eg. "UK/US EYES
ONLY", the envelope/package is to be addressed "Exclusive to" an officer by name
and appointment; the caveat must not appear on the envelope/package.
46. Mark "CONFIDENTIAL" boldly in red above and below the address; the
protective marking should be prefixed "UK", "NATO" or "WEU" if the contents are
so marked.
(3) Insert second envelope/package and seal the flap (or pack
sticking down all seams).
(3) Insert second envelope/package and seal the flap (or pack
sticking down all seams).
52. Address the envelope/package by name and appointment with postal address
(as appropriate) as follows:
53. If the document bears a (composite) National caveat, eg. "UK/US EYES
ONLY", the envelope/package is to be addressed "Exclusive to" an officer by name
and appointment; the caveat must not appear on the envelope/package.
54. Mark "CONFIDENTIAL" boldly in red above and below the address; the
protective marking should be prefixed "UK", "NATO" or "WEU" if the contents are
so marked.
56. Insert document and seal flap (or pack sticking down all seams).
(3) Insert inner envelope/package and seal the flap (or pack
sticking down all seams).
(3) Insert inner envelope/package and seal the flap (or pack
sticking down all seams).
60. If the document bears a (composite) National caveat, eg. "UK/US EYES
ONLY", the envelope/package is to be addressed "Exclusive to" an officer by name
and appointment; the caveat must not appear on the envelope/package.
61. Mark "CONFIDENTIAL" boldly in red above and below the address; the
protective marking should be prefixed "UK", "NATO" or "WEU" if the contents are
so marked.
63. Insert document and seal flap (or pack sticking down all seams).
(3) Insert inner envelope/package and seal the flap (or pack
sticking down all seams).
(3) Insert inner envelope/package and seal the flap (or pack
sticking down all seams).
Normal Despatch
65. Sealed envelopes or packages should be placed in the out tray for collection
by transit services or forward to registries or mail collection points.
APPENDIX 4 TO
ANNEX C TO
CHAPTER 4
TRANSMISSION OF RESTRICTED DOCUMENTS
SECTION I
4. Insert the document and stick down the flap (or pack the document sticking
down all seams).
SECTION II
TRANSMISSION TO EMBASSIES AND HIGH
COMMISSIONS IN CENTRAL LONDON SERVED BY
THE DEFENCE MAIL SERVICE (SEE PARA 3 OF
ANNEX C) FROM APPROVED LOCATIONS ALSO
SERVED BY THE DEFENCE MAIL SERVICE
WARNING
10. Insert the document and stick down the flap (or pack the document sticking
down all seams).
12. Method of despatch. Place in "out" tray for collection by transit services or
forward to registries or mail collection points.
SECTION III
TRANSMISSION TO ADDRESSES IN THE UK OTHER
THAN THOSE COVERED IN SECTION I & II OF
APPENDIX 4 EXCLUDING NORTHERN IRELAND (SEE
SECTION IV) FROM ANY MOD OR SERVICE
LOCATION IN THE UK
WARNING
14. For mail to private addresses, use a plain envelope; address by name without
reference to rank, decorations, appointments, etc.
15. Mail to and from locations not served by the Defence mail service should be
given the full postal address.
17. The envelope/wrapping must not bear any markings, branch stamp, etc,
which might associate it with the department. "PO Box 701 London WC2 8BG"
should be shown as the return address.
18. Insert the document and stick down the flap (or pack the document sticking
down all seams).
19. Method of despatch. Place in "out" tray for collection by transit services or
forward to registries or mail collection points.
SECTION IV
TRANSMISSION TO DIPLOMATIC POSTS ABROAD
AND OTHER ADDRESSES OVERSEAS, INCLUDING
NORTHERN IRELAND, FROM ANY MOD OR
SERVICE LOCATION IN THE UK
WARNING
21. Private addresses. Mail for private addresses should be sent in accordance
with the appropriate advice contained in either paras 04096 or 04106.
22. Ships. Mail for ships in overseas ports or waters should be addressed to
"HMS..., BFPO..." (see para 04107). A legible branch stamp incorporating the full
postal address of the sender may be used to indicate the return address. Where this
is not possible the return address should be "PO Box 701 London WC2H 8BG".
a. Inner envelope/wrapping.
(3) Mark "UK RESTRICTED" boldly in red above and below the
address.
(4) Insert the document and stick down the flap (or pack the
document sticking down the seams).
or
or
or
24. Use of the diplomatic bag. Mail addressed to diplomatic posts in countries
listed at para 6 of Annex C must always be despatched by diplomatic bag. The
following procedure should be followed:
a. Inner envelope/wrapping.
25. Other destinations. For destinations other than those shown at para 23b
above, select one unused envelope (or unused wrappings), or an envelope of good
quality to be used with an economy label, of suitable size and apply the reference and
date of origin of the document to be enclosed. In the case of UNCLASSIFIED mail,
the reference and date of origin of the document enclosed may be omitted from the
envelope. Address the envelope/package by name and/or appointment/branch and
full postal address. "PO Box 701 London WC2H 8BG" should be used as a return
address; a branch stamp is not required. The protective marking (RESTRICTED)
must not appear on the envelope/package.
26. Method of despatch. Place in "out" tray for collection by transit services or
forward to registries or mail collection points.
APPENDIX 5 TO
ANNEX C
SEALING OF ENVELOPES WITH HIGH SECURITY
TAPE
1. High security tape must be applied over all the envelope's seams, avoiding the
need for small pieces of tape; pocket or wallet style envelopes should be used, seam
arrangements simplifying tape application. Pocket style envelopes have a straight
sealing flap on one narrow side with a sealed flap opposite, and a seam running the
length of the envelope. Wallet style envelopes have a straight edge sealing flap along
their length, and side seams. Banker style envelopes are not suitable for use with the
tape; These have a triangular shaped sealing flap situated on one broad side of the
envelope and seams running diagonally across the envelope.
2. Moisten and stick down the gummed flap of the envelope. Apply high security
tape to cover the flap edge; tape should extend at least 1.5 cm on to the front of the
envelope. On pocket style envelopes, then apply tape to the sealed flap opposite.
Tape remaining seam(s) on the envelope last, overlapping tape on to other flaps/seams
and extending beyond crossover points on to the front of the envelope so that both ends
of each piece of tape are visible and seen to be firmly stuck to the envelopes surface.
Tape should always be applied to flaps/seams parallel to the nearest edge of the
envelope. See diagrams below.
3. Care should be taken to ensure address labels, where used, do not prevent
application of the tape directly to the surface of the envelope. Similarly, address labels
should not be applied so that they obscure high security tape.
Flap B
Extra strip of
sealing tape
Extra strip of
sealing tape
Extra strips of
tape extending
to front of
envelope
APPENDIX 6 TO
ANNEX C TO
CHAPTER 4
SPECIMEN DESPATCH NOTE
UNCLASSIFIED covering (insert protective marking)
_______________________________ _____________________________
_______________________________ _____________________________
_______________________________ _____________________________
Date:
Reference:
The documents listed below have been approved by the Ministry of Defence for
release to (insert full postal address of government or contractor facility)
_________________________________
_________________________________
_________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
Would you please arrange for their onward transmission through the appropriate
security channel.
Signed_______________
APPENDIX 7 TO
ANNEX C TO
CHAPTER 4
TRANSMISSION OF DOCUMENTS BEARING
DESCRIPTORS AND RESTRICTIVE MARKINGS
Rules on the transmission of such material are produced below for the convenience
of despatch staff.
In accordance with that for relevant protective a. Despatch to : MOD buildings or via
markings. Defence mail service
Enveloping : Double
c. Despatch to : Overseas
Notes:
RESTRICTED
overseas include “c/o
RESTRICTED
BFPO 999”
SECRET 1. Within MOD bldgs Single wrapping – no Stick down flap Yes – outside Defence Mail
or between approved protective marking or the building Service
4D-1
RESTRICTED
wrappings but not the 2nd wrapping to 2nd. Address to the
RESTRICTED
use Keepsafe
envelope
3rd wrapping to
be stuck down 3rd. Address to
LCT BFPO 1000
and use approved
mail services.
SECRET b. Defence Attach s/ Double wrapping + 1st wrapping Yes 1st. Address to the
Advisers and NI appropriate marking(s) on seal with Defence Attache/
the inner wrapping only security tape or Adviser or official
use Keepsafe address in NI.
envelope
2nd wrapping to 2nd. Address to
be stuck down LCT BFPO 1000
and use approved
mail services.
JSP 440 Volume 1 Issue 2
RESTRICTED
to be stuck LCT BFPO 1000
down (see note and use approved
4D-3
3) mail services.
SECRET d. HM Ships in overseas Double wrapping + 1st wrapping to Yes 1st. Address to
ports or waters appropriate be sealed with appropriate person
marking(s) on the security tape or CO of the ship
inner wrapping only or use using appropriate
Keepsafe BFPO number.
envelope 2nd. Address c/o
2nd wrapping BFPO 999 using
to be stuck approved mail
down services.
CONFIDENTIAL 1. Within MOD bldgs or Single wrapping with Stick down No Defence Mail
between approved no protective marking flap Service
locations (inc OGDs) showing or
served by Defence Mail Pouch (see Note 1)
Service
Protective marking Destination Type of covering and Sealing Receipt Transmission
JSP 440 Volume 1 Issue 2
marking
(if required)
CONFIDENTIAL 2. Embassies and High Double wrapping + Stick down No Defence Mail
Commissions in Central appropriate marking(s) flaps Service
London served by the on the inner wrapping
Defence Mail Service only or
RESTRICTED
other than 1 and 2 above appropriate marking(s) flaps post.
(excluding NI) on the inner wrapping For Ships in home
RESTRICTED
999
CONFIDENTIAL 4. Overseas including NI See Annex C Appendix
3, Section IV for
a. Foreign or detailed instructions
Commonwealth Govts or Triple wrapping + 1st wrapping No 1st. Address to the
their defence contractors appropriate marking(s) should NOT foreign govt or
on the 1st and 2nd inner be sealed company.
wrappings but not the 2nd wrapping 2nd. Address to the
3rd outer one to be stuck responsible British
down Embassy official.
3rd wrapping 3rd. Address to
to be stuck LCT BFPO 1000
down and use approved
mail services.
Protective marking Destination Type of covering and Sealing Receipt Transmission
JSP 440 Volume 1 Issue 2
marking
(if required)
CONFIDENTIAL b. Defence Attach s/ Double wrapping + Stick down No 1st. Address to the
Advisers and NI appropriate marking(s) on flap Defence Attache/
inner wrapping only Adviser or official
address in NI.
2nd. Address outer
envelope to LCT
BFPO 1000 and
use approved mail
RESTRICTED
4D- 5
marking
(if required)
RESTRICTED 1. Within MOD bldgs or Single wrapping with no Stick down No Defence Mail
between approved protective marking showing flap Service
locations (inc OGDs)
served by Defence Mail
RESTRICTED
Commissions in Central protective marking showing flap Service
London served by the
RESTRICTED
Note: 1. Documents transmitted in a locked pouch or box need not be enveloped unless the recipient is to forward them to a third person.
2. The use of Parcelforce 10 and 12 is more expensive than Parcelforce 24. D Def PCS agreement should be obtained for their use.
3. For mail emanating from locations not served by the British Forces Post Office the outer wrapping should be marked “Parcelforce 24” in the top left hand
corner.
4. Receipts are required for RESTRICTED documents transmitted to America, Canada and Italy.
RESTRICTED
Control and Carriage of Protected Documents
ANNEX E TO
CHAPTER 4
SPECIMEN FORM OF APPLICATION FOR
AUTHORITY TO TAKE DOCUMENTS MARKED
CONFIDENTIAL OR ABOVE OVERSEAS
a. Surname_________________________________________________
Forenames_______________________________________________
b. Rank/grade______ c. Establishment___________________________
Passport details:
c. Indicate:
______________________________________________________________
______________________________________________________________
4. Itinerary of journey:
______________________________________________________________
______________________________________________________________
b. Method of travel (if by air, state whether RAF or civil; if civil state
flight no. and airline).
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
Note: Casual courier status affords reduced protection for protectively marked
documents in transit and will only be authorized when absolutely necessary.
___________________________
Head of Establishment
Name(block capitals)_________________________________
Rank/grade_________________
Date_______________________
Branch Stamp
ANNEX F TO
CHAPTER 4
MINISTRY OF DEFENCE
Reference No._____________________________
Itinerary
Outward Return
Date
Method of Travel
From
To
Date of Issue
Name_______________
Rank/Grade___________
MINISTRY OF DEFENCE
CASUAL COURIER AUTHORIZATION
CERTIFICATE
Reference No.______________________________
Itinerary
Outward Return
Date
Method of Travel
From
To
Date of Issue
Name_______________
Rank/grade___________
ANNEX G TO
CHAPTER 4
INSTRUCTIONS TO OFFICERS ON THE PERSONAL
CARRIAGE OF PROTECTIVELY MARKED
DOCUMENTS OVERSEAS
3. You should ensure that a list of all documents that you will carry has been
prepared in duplicate and that the original has been left with your directorate or
establishment. The duplicate list must not be inside the package containing the
documents.
4. You should carry the package in a brief case or similar container of a type
detailed in sub para 04111b. Except in the circumstances described in para 9 below,
you should not open the package until you reach your destination. You should ensure
that during your journey the package does not leave your possession, thus you should
not leave it in hotel rooms or deposit it in hotel safes, luggage offices or lockers. At
your destination you should, wherever practicable, have the documents housed
overnight with a United Kingdom overseas Government representative or an authority
(see 7 below) approved by your Principal Security Adviser. If this is not practicable the
documents must not leave your personal custody even for a moment.
Afghanistan
Belarus
China (including Hong Kong SAR, Tibet and Macao)
Cuba
Iran
Iraq
Lebannon
Libya
North Korea
Russia
Sudan
Syria
Ukraine
Vietnam
Yugoslavia (Serbia and Montenegro)
Australia Japan*
Austria * Netherlands
Belgium New Zealand*
Canada Norway
Denmark Portugal
France Spain
Germany Sweden*
Greece Switzerland*
Iceland Turkey
Italy United States
6. You are not to discuss the documents you are carrying in any public place.
7. Should you lose the documents or if you are unable, because of sickness or for
any other reason, to safeguard them, you should seek immediate assistance from a
British Embassy, High Commission or Consular Officer (or Diplomatic Mission or
Government Department of any NATO country, NATO International Command or
Agency).+
+ If NATO documents are not being carried delete the words in brackets.
8. Wherever practicable you should return the documents to the United Kingdom
by diplomatic bag through a British Embassy, High Commission or Consular Office.
(The package should be open so that the contents can be verified in order to comply
with regulations) but it may be sealed in the presence of the Embassy, High
Commission or Consular Officer who receives it. If it is necessary for you to carry the
documents back with you, you should place them in the spare cover provided bearing
the same reference number, stamp and signature as used on the outward journey. The
cover must be sealed with wafer seals. (Wafer seals should have the addition of a
signature in ink across the seals and the package which should be reinforced by strips of
cellulose tape covering the seals and seams. If you have no means of sealing the
package in this way you should make the best use of whatever adhesive material is
available.) You should address it to yourself at your department.
10. If you have been obliged to open the package at the request of an official of the
country you are visiting, you should where possible notify the local British Embassy,
High Commission or Consular Office and you should report the incident to your
Principal Security Adviser or to your security officer on your return. If the action was
taken by a United Kingdom official you should also inform the above authorities.
11. On your return you should personally verify with the officer holding the
duplicate list that all documents have been returned or receipts obtained.
12. On your return you must send your authorization certificate to your security
officer and notify him of any incident of possible security significance. For example,
any failure or inability on your part to safeguard the documents or any undue interest on
the part of other persons in what you were carrying.
ANNEX H TO
CHAPTER 4
INSTRUCTIONS TO OFFICERS ON THE PERSONAL
CARRIAGE OF PROTECTIVELY MARKED
DOCUMENTS OVERSEAS
I certify that I have read and understood the above instructions and that I undertake to
observe them.
Signature.....................................................................
Rank .........................................................................
Establishment................................................................
Date...........................................................................
(Name).......................................................................
ANNEX I TO
CHAPTER 4
GUIDELINES TO COURIERS IN REGARD TO
HIJACKING
2. British airlines are given official advice on security measures against hijacking.
These airlines can therefore be relied on to a greater extent than others. These airlines
or service aircraft or aircraft on charter to the Armed Services should be used whenever
possible.
3. A casual courier should return from overseas with as few protectively marked
documents as possible.
5. At the conclusion of a hijacking when passengers are freed, the courier should
whenever possible carry away the documents.
ANNEX J TO
CHAPTER 4
DESCRIPTORS
1. Descriptors may be helpful in implementing the "need to know" principle by
indicating the nature of the asset's sensitivity and thereby helping to ensure that access
is limited accordingly. Aside from PERSONAL, which by definition requires that the
information is only made available in the first instance to the addressee, the descriptors
will normally be used in conjunction with a protective marking. Used alone, descriptors
may indicate who should see the material but do not of themselves impose any
particular handling or level of protection. A list of MOD descriptors is below:
ANNEX K TO
CHAPTER 4
CODEWORDS, NICKNAMES AND THE PROTECTION
OF COMPARTMENTED INFORMATION
Codewords and nicknames
1. Definitions. A codeword is a single word that is always expressed in
CAPITAL letters and is used to provide security cover for reference to a particular
protected matter. A nickname is a name made up of two words selected by the
originator and used for convenience for reference to any matter where security
protection is not required.
3. Use of codewords. Codewords are to be used solely for security purposes and
only registered codewords may be used. The primary purpose of codewords is to
conceal intentions, but they may also be used to limit the knowledge of particular
matters. They may be used:
their Principal Security Adviser. In the event of a codeword being required out of normal
working hours, application may be made to the Chief of the Defence Staff's Duty
Officer.
5. Notification of Use. When a codeword is taken into use, its meaning, with the
protective marking for both the codeword itself and its meaning, must be notified by the
user to the issuing authority through normal channels. Any changes must be notified as
they occur. Codewords taken into use but subsequently cancelled may not be re-used
without authority from the issuing authority.
10. Exercises. If, for real security reasons, codewords as opposed to nicknames, are
required for exercises, they should be issued by commands from the list of those allotted
by the DCMC. Care should be taken in defining the meanings of codewords used on
exercises particularly if there is a likelihood that it may become necessary later to release
codewords and their meanings to the Press. A codeword used for an exercise must
always be prefixed by the word EXERCISE, for example, EXERCISE MATADOR.
Nicknames only are required for RESTRICTED exercises.
11. Cancellation of codewords. Users are responsible for notifying the issuing
authority, through normal channels, of the cancellation and surrender of a codeword
when its purpose has been completed or it has been replaced after compromise. This
notification should include the protective marking retained by the meaning. Surrendered
codewords must in no circumstances be taken into use again without specific re-issue by
the issuing authority.
18. Compartment approval. This may be referred to by 3rd parties (i.e. those
outside MOD) as an “accreditation”, but within MOD the term accreditation is reserved
for the activity of ensuring that the IT systems are implemented to meet the needs of
UK protectively marked material at the High Water Mark of any and all compartments
to be used, which is carried out by the Defence Security Standards Organisation
(DSSO).
19. Risk assessment. The only compartmented information which has a MOD
recognised Risk Assessment methodology is the STRAP system as laid down in JSP440
Volume 5. In order to assess the overall security requirements for other
Compartmented data, a STRAP Equivalent Level (SEL) should be derived before
discussing protection requirement with security staffs. Advice on the selection of an
appropriate SEL can be obtained from Head of InfoSy(Tech), MB4154, 84505MB.
22. Compartmented information not solely controlled within MOD, for instance
STRAP, will have their own arrangements for appointment of CIRs, and any queries
should be addressed to Head of InfoSy(Tech), MB4154, 84505MB.
24. Incident handling. If any security incident occurs affecting systems used to
store, process or forward compartmented material, then in addition to any local
reporting arrangements, the MOD Joint Security Co-ordination Centre (JSyCC), which
has overall responsibility for such matters on behalf of the Departmental Security
Officer, must also be informed immediately. JSyCC can be contacted on 020-7218-
0117 (80117MB).
ANNEX L TO
CHAPTER 4
INTERNATIONAL DEFENCE ORGANISATIONS AND
INTERNATIONAL ORGANISATIONS
2. The IDO markings NATO, NACC, PfP or WEU immediately precede the
protective marking as follows:
a. NATO documents.
b. NACC documents.
c. PfP documents.
d. WEU documents.
3. NATO and WEU documents which are protectively marked TOP SECRET are
also marked with the IDO markings COSMIC or FOCAL respectively, as follows:
a. NATO documents.
b. WEU documents.
4. The meanings of the protective markings (or classifications) are similar to those
given at para 0103 of Chapter 1 with the exception that the degree of compromise
relates to the international organization concerned and not to the Nation. Should NATO
or a partner country wish to restrict distribution on certain NACC/PfP information, this
will be indicated by NATO/name of country ONLY on a separate line immediately
below the protective marking, eg.
PfP CONFIDENTIAL
NATO/POLAND ONLY
Handling procedures
9. IDO accountable documents are to be stored at the standards required for United
Kingdom TOP SECRET material.
11. Separate MOD Forms 102 are to be used for registering IDO accountable
documents.
13. The markings NATO, NACC, PfP,COSMIC, WEU, FOCAL or ATOMAL are
only to be placed on United Kingdom originated documents when:
17. Downgrading. IDO documents may not be downgraded without the consent of
the originator.
18. Copy numbering. All IDO TOP SECRET and SECRET documents are to be
copy-numbered with the total distribution shown, eg `Copy No 1 of 20'.
19. Page numbering. All IDO documents except those on a single sheet are to be
page-numbered. IDO TOP SECRET and SECRET documents are to show the total
number of pages of the whole document on the front page, eg `Total pages 14'. IDO
TOP SECRET and SECRET documents are also to show the total number of pages in
the main part, eg `1 of 9'; annexes and appendices are also to show this information, eg
`A1 of 3' or `B2-1 of 7'.
a. The reference number of the original document with its date of issue.
23. IDO documents marked RESTRICTED and bearing only the supplementary
markings NATO or WEU are to be handled in accordance with the general rules for UK
documents protectively marked RESTRICTED set out in Annex C.
Storage
24. IDO classified documents are to be stored in accordance with the minimum
standards for UK documents of the equivalent protective marking (but see para 9
above).
28. WEU classified information may not be passed outside the organization except
by the originator or with his consent.
30. Guidance on the method of carrying out NATO sub-registry and control point
surveys and inspection is contained in NATO Document AC/35/D/1006 (Revised)
dated 5 July 1976.
31. Separate reports on inspections of NATO sub-registries and control points are to
be sent to the Ministry of Defence DIS Sy IDR for onward transmission to NATO.
JSP 440 Volume 1 Issue 2
4L-5
RESTRICTED
RESTRICTED
Defence Manual of Security
a. NATO:
b. WEU:
International organisations
33. United Nations (UN). The UN sometimes require its material to be
protected and routinely employ markings (classifications) with the prefix "UN" which
are indistinguishable from our own. Although the terms may be the same, the
protection required may be different. Unless otherwise instructed, all UN marked
material should be accorded the same level of protection as comparable UK markings
would dictate.
ANNEX M TO
CHAPTER 4
SECURITY INSTRUCTIONS FOR HOMEWORKERS
Introduction
1. These instructions are designed to ensure that the minimum standards which
protect information in MOD offices are applied, as far as possible, in home
circumstances and a copy will accompany all letters of appointment for homeworkers.
They may not be relaxed and may be applied only in Great Britain. These rules will
also apply to those MOD office-based employees who regularly take work home.
General
2. Homeworkers are permitted to have access to official information with a
protective marking up to and including RESTRICTED, provided:
3. Before homeworking commences the homeworker must provide his or her line
manager with a written agreement to a visit to the home (and, thereafter, to periodic
spot checks) by representatives of the Principal Security Adviser’s staff to confirm that
satisfactory physical and procedural security measures are in place. Such agreement
must be confirmed whenever regular access to official information is involved,
irrespective of its protective marking level.
Personal security
4. Homeworkers should be especially careful not to draw attention to the fact
that they are working on official information at home. As homeworkers will have
few opportunities to discuss work problems with colleagues, they may be more
vulnerable to compromise by someone professing to show an interest in their work.
They need to be alert to this danger, and any instances of outsiders (or those without
a "need to know") showing undue interest should be reported to the appropriate
Principal Security Adviser’s staff.
(2) It is in a room to which the door and windows have been locked;
and
Telephone Security
6. Homeworkers should be alert to the dangers of passing protectively marked
information of possible use to terrorists, for targeting purposes, over the public
telephone network. Always confirm the identity of originators/recipients of telephone
calls. To minimize risk of eavesdropping, party-lines or multi-extensions are not
advisable. Similarly, use of radio telephones (including cordless and cellular
telephones) for passing RESTRICTED information is prohibited. The following table
addresses the precautions necessary when using the telephone to discuss protectively
marked information:
Photocopying/printing
9. It is important to keep copies of documents to the minimum necessary for the
proper conduct of business. Reproduction of RESTRICTED and above documents may
only be undertaken on an approved photocopier. UNCLASSIFIED documents may be
reproduced on local commercial copiers if operated by the homeworker, care being
taken to ensure, as far as possible, that documents are not read or identified as
MOD/official documents by others.
11. The homeworker's attention is also drawn to Annex C of Chapter 4 for full
details on postal arrangements to locations in Northern Ireland and overseas and the use
of return addresses on official mail.
Note: The telephone number given is that of the security control room, MOD Main
Building. The number of the appropriate Principal Security Adviser may be given
instead.
13. While carrying protectively marked documents, the container should remain in
the homeworker's possession at all times. Protectively marked documents are not to be
read in any public place or on public transport.
Note: Never journey abroad or to Northern Ireland carrying a briefcase bearing the
Royal cipher.
Review of Holdings
14. The homeworker should minimize official documents held at home. Holdings
should be reviewed at least every six months and, where appropriate,
forwarded/returned to the MOD.
Destruction of Waste
15. UNCLASSIFIED paper waste may be disposed of by shredding or tearing it
into small pieces and placing into household waste bins; it must be well mixed with
domestic rubbish. It must not be used as "rough" paper for use by other members of the
homeworker's household. RESTRICTED paper waste must be disposed of by a method
approved of by the appropriate Principal Security Adviser’s staff or returned to the
MOD for secure disposal. All non-paper waste must be returned to the MOD for secure
disposal.
ANNEX N TO
CHAPTER 4
CASUAL COURIERS - PROHIBITED ITEMS
1. Casual couriers who have been granted a single journey - casual courier
passport (with diplomatic immunity) for the purposes of carrying protectively
marked material overseas are to be aware that the following items are prohibited
from being carried in their diplomatic bag:
c. Combustibles.
f. Office equipment and office supplies, including blank forms and paper.
2. Casual couriers travelling within the United Kingdom, and those who have not
been granted diplomatic immunity but have nevertheless been authorised by their
relevant Principal Security Adviser to carry protectively marked documents overseas,
are prohibited from carrying the following items:
c. Combustibles.
CHAPTER 5
PHYSICAL SECURITY
Section Title
0 Introduction
I General Principles
XV Reprographic Machines
PHYSICAL SECURITY
Introduction 05101
General 05201
Introduction 05301
Fences 05303
General 05401
Doors 05409
Windows 05426
Glazing 05429
Roofs 05432
Downpipes 05435
General 05501
Overlooking 05503
Overhearing 05506
General 05601
General 05701
Testing 05725
General 05801
Definitions 05803
Search 05816
Trespassers 05818
Instructions 05837
Dogs 05848
Inroduction 051001
Definitions 051010
Management 051028
Doors 051031
Standards 051105
Ducting 051309
Security 051312
Facilities 051320
General 051401
Planning 051403
General 051501
Tempest 051508
General 051601
Pulping 051613
Incineration 051618
Disintegrators 051619
Sanding 051624
Shredding 051625
JSP 440 Volume 1 Issue 2
5-0-12
RESTRICTED
RESTRICTED
Physical Security
General 051701
Passes 051707
General 051801
General 051901
CHAPTER 5
GENERAL PHYSICAL SECURITY
INTRODUCTION
Layout of Chapter 5
05001. This chapter is set out in 18 sections following a similar format to the Cabinet
Office base-document, the Manual of Protective Security (MPS). It is so set out to
allow for simple amendment of the individual parts of the physical security chapter
following changes in policy. Each section has a paragraph at the beginning entitled
'Further advice, information and guidance' the purpose of which is to help the user in
the following ways:
c. Identify other chapters, sections and parts of the DMS which contain
additional information for the user.
a. Fences.
b. Lighting.
f. Guards.
g. Guard dogs.
i. Control of entry.
j. Secure rooms.
k. Hardened buildings.
l. CCTV.
Physical security measures are not primarily intended to prevent or deter attack by
overt military action.
Monitoring
05004. A system of regular surveys, inspections, reviews and checks is to be
implemented to ensure that physical security measures are well organised and
maintained as a part of the overall protective security of an establishment.
Defence in Depth
05005. The physical security measures chosen as a result of the risk analysis (RA)
(see Chapter 3) and minimum baseline measures methodologies carried out by an
JSP 440 Volume 1 Issue 2
5-0-4
RESTRICTED
RESTRICTED
Physical Security
Basic Principles
05006. The following basic principles apply:
a. Physical security measures are more effective and less costly if they
are incorporated in the design stage of new projects. It is appropriate,
therefore, to plan for higher levels of threat.
b. Top Level Budget Holder. The TLB Holders are responsible for the
implementation of security policy at establishments within the Defence
estate. Each TLB Holder will have a Principal Security Advisor (PSyA)
within his staff.
They are to ensure that physical security is properly enforced at all times and
that orders exist for duty checkers/guards.
Reference Documents
References in Manual
05011. A list of the documents referred to in this Chapter is at Annex A.
Security Units
05012. Establishment security staff should use the services of their appropriate
security units when required, in the implementation of the policy in this Chapter. It
is not expected that all appointed ESyOs will have the specialist security knowledge
and/or security staff to be able to implement, without specialist security unit advice,
the instructions contained in the Chapter. The role of the appropriate single-Service
security units/TLB PSyA staffs in the implementation process is, therefore,
important.
Conflict of Standards
05013. Where there is a conflict of physical security standards between JSP 440 and
other security instructions, the more rigorous standard will prevail unless specifically
notified otherwise.
SECTION I TO
CHAPTER 5
GENERAL PRINCIPLES
Introduction
General
05101. This section of Chapter 5 contains instructions for the physical protection of
information and equipment against attempts to acquire them illicitly by surreptitious
attack or theft.
Defence in Depth
05102. Physical measures represent only one aspect of protective security and they
need to be supported by sound personnel, document handling, communications and
computer security. Sensible management of security risks involves finding the most
effective (and cost effective) ways of countering the given threats by a combination of
measures from each of these areas. Good physical protection, preferably built into any
site or building from the beginning, is of fundamental importance.
Threat Levels
05105. The minimum baseline measures are those in the first column of the matrix
(headed L). The remaining columns offer a means of deciding on the increased
measures appropriate to levels of threat higher than Low. ESyOs are to keep
themselves regularly up-to-date on the nature and levels of threat to their assets (by
consulting their appropriate PSyA and local Service and civil police authorities); and
are to decide for themselves on the proper response to increased levels of threat, in the
light of local circumstances.
Numerical Values
05107. The numerical value of the baseline measures required for each level of the
protective marking system is made up from different sections of the menu of measures:
2 from mandatory sections of the menu of measures and the remainder from any of the
sections. This system of mandatory and additional measures is to ensure that a sensible
balance of measures is achieved and allows HOEs flexibility in the measures they apply
to reach the baseline position, taking into account the security facilities, equipment and
manpower at their disposal.
Menu of Measures
Sections
05109. The menu of measures is divided into 6 sections, each dealing with a particular
aspect of security (or layer of 'defence in depth'). For ease of application, the menu is
laid out as a proforma with scores (loading) provided for various options. Spaces are
also provided for inserting the various points scores.
Weighting of Measures
05110. Some measures are weighted in that their points score multiplies with that of
another measure (eg containers and locks), whilst others are added (eg fences, Perimeter
Intruder Detection Systems, lighting and CCTV). The value of zero is used as a
multiplier where a fence has no control of entry at its entry/exit points. Where control
of entry is provided, the multiplier of one will validate the points awarded to the fence.
Selection of Measures
05111. In deciding what measures to select, the user is to include existing security
measures and then fill in the score obtained. The results can then be compared with the
requirements of the matrix. From the comparison it will be apparent whether the
measures are excessive, adequate or need supplementing.
Additional Measures
05112. If additional measures are required, establishments are to decide which
measures to select in the light of the actual threats faced by them. If there is a threat
from forcible attack, for instance, the strength of a container may be a higher factor than
the Class of lock; conversely, if the threat is from surreptitious attack, a high class lock
may be a more important factor than the strength of the container. Used in this way,
with imagination and common sense, the menu will help ESyOs to find the measures
most appropriate to their particular situation, the threats they face and the resources
available.
(2) Resist flexing, twisting or jolting that will distort the carcass
and allow the insertion of probes or devices in order to gain access to
the container.
Security Locks
05115. Security locks are classified according to the level of protection they
offer, Class 4 being the highest and Class 1 the lowest level.
a. Class 4 locks. These are HIGH SECURITY locks which have a high
degree of resistance to expert and professional attack using exclusively
developed skills and resources judged not to be available commercially.
Note: All keys to security containers must be held securely in accordance with the
instructions in Section XII.
(2) Will normally have walls, floor and ceiling of concrete slab
construction.
b. Secure room. A room that meets the standard for a secure room is as
follows:
Selection of Locks
05117. Locks, for use on rooms, are to be selected from the range of locks listed in
paragraph 05115 above and detailed, by type, at Annex E.
JSP 440 Volume 1 Issue 2
5-1-5
RESTRICTED
RESTRICTED
Defence Manual of Security
(3) Has doors of reinforced steel or wood, faced with sheet steel.
05120 Spare
Note: Points for 'Escorted Visitors' within the MBMM can only be scored where all
visitors (including MOD employees) to an establishment are escorted.
e. Visiting guards. Guards who visit a site during the night and at
weekends and carry out rudimentary perimeter checks are classed as 'visiting
guards'. Such types of guard include those that may not normally be allowed
to enter the site or building visited but respond by calling out the "Key
Holder" in the event of a suspected intrusion.
Note: There are a further 2 types of guarding used in the security of equipment
matrix; these are described at para 051818.
(2) Offers a level of protection where the intruder has to plan the
intrusion in detail and have a full range of equipment capable of
substitution of vital system components.
(2) Does not normally have an appointed response force and relies
on a public response to a local alarm sounder or strobe lights.
Gates
05126. Gates are to be constructed to the same security standard as the fence and
some form of entry control must be in place otherwise the security of the fence will
be negated.
Security Lighting
05129. Security lighting can offer a high degree of deterrence to a potential intruder
in addition to providing the illumination necessary for effective surveillance either
directly by the guards or indirectly through a CCTV system. The standard of lighting
is to meet the minimum requirement and its installation be appropriate to the site
conditions.
ANNEX A TO
SECTION I
TO CHAPTER 5
MINIMUM BASELINE MEASURES MATRIX
TOP SECRET L M S H VH
ANNEX B TO
SECTION I
TO CHAPTER 5
MENU OF MINIMUM BASELINE MEASURES
Measure Loading Remarks
Section 1 – Container
1. Container/casing:
a. Class 4 4
b. Class 3 3
c. Class 2 2
d. Class 1 1
Sub-score (ss1) = a, b, c or d
2. Lock
a. Class 4 4
b. Class 3 3
c. Class 2 2
d. Class 1 1
Sub-score (ss2) = a, b, c or d
Measure Loading
Section 2 – Room
3. Room:
a. Strong Room 4
b. Strong Room 3
c. Secure Room 1
d. Locked Room 0
Sub-score (ss3) = a, b, c or d
4. Lock
a. Class 4 4
b. Class 4 3
c. Class 3 2
d. Class 2 1
e Class 1 0
Sub-score (ss4) = a, b, c, d or e
ANNEX C TO
SECTION I
TO CHAPTER 5
MINIMUM BASELINE MEASURES MATRIX - POINTS
CHECKSHEET
Reference:
Assessment
1. Asset assessed:
2. Protective marking:
3. Threat level:
Points check
4. Mandatory points.
Section 1. Pts required: Pts achieved:
Section 3. Pts required: Pts achieved:
Sections 4 & 5. Pts required: Pts achieved:
5. Additional points.
Any Sections. Pts required:
Sections 6 & 7 Pts achieved:
6. Summary of points.
Total Pts required: Pts achieved
7. Remarks.
ANNEX D TO
SECTION I
TO CHAPTER 5
GUIDE TO THE USE OF THE MINIMUM BASELINE
MEASURES MATRIX
First Actions
1. Produce a proforma that consists of the following documents :
a. Read off the total points required to protect the particular asset(s) at
the current threat level and write the figure on the points checksheet (eg '14'
for SECRET at Low; Low is the standard threat level unless otherwise
directed from D Def Sy by PSyAs).
b. Read off the mandatory points required for the sections and write the
figures on the points checksheet (eg '8' for Sections 1 and/or 2 plus 3).
4. Turn to the menu of baseline measures to carry out the assessment. A sample
assessment is at Appendix 1.
6. Section 2 - Room. Determine the Class of the room that the asset is held in
using the standards at para 05116 and shown, by type at Annex E, and insert the
'loading' figure in the sub-score column (ss3); for example an unlocked room would
attract 0 points. Similarly ascertain the 'loading' for the type of lock fitted to the
room using the standards at para 05115 and shown, by type at Annex E, and insert at
(ss4); for example a Chubb Mortice lock would attract 1 point. The section score is
achieved by multiplying the scores for the room and the lock.
Notes:
(1) Establishments are to follow the spirit of the baseline measures matrix at
all times. Therefore, heads of establishments are not to allow nonsensical
situations to arise such as fitting a Class 4 lock to a standard office door with
glass panes, in order to score more points on the matrix, which in turn would
allow other normal security precautions to be dispensed with.
7. Section 3 - Building. Using the standards at para 05118, determine the Class
of the building (its strength) and insert the loading score in the Section score column
(S3). For example a modern building of pre-cast panels can attract 3 points.
b. Determine the sub-score for the type of IDS on the establishment, area
and/or site using the standards at para 05123 and shown, by type at Annex E,
and insert at (ss9).
The Section 5 score is obtained by adding the scores for Guards and IDS and
inserting at (S5).
10. Perimeter. Decide what Class the establishment perimeter is using the
standards at paras 05124 and shown by type at Annex E and insert the 'loading' into
the sub-score (ss10); e.g. an approved 2.4m high chainlink fence with security
topping would merit 2 points. If the establishment has entry control insert 1 point at
(ss11); if it does not then no points are allotted. Similarly, insert the 'loading' figures
for the 'yes/no' measures for searches (ss12), perimeter intruder detection systems
(PIDS) at (ss13), CCTV (ss14) and lighting (ss15). The total score (S6) for
perimeter measures is obtained by multiplying the 'loading' scores of the Fence and
Entry control and then adding this figure to the total of the rest of the sub-scores.
Note: It is important to note that points for CCTV and lighting can only be obtained
if the equipment reaches the appropriate approved standards.
14. Flexibility of the Matrix. The advantage of the baseline measures matrix is
that it allows establishments the flexibility to choose their own security measures at a
given threat level as long as the baseline measure is reached and certain mandatory
measures are met. It also takes into account any enhanced security measures that the
establishmentt may have invested in such as AACS, CCTV or security lighting
thereby perhaps allowing the costs to be reduced in other areas of security.
16. 'Standard' loading on the matrix. Much of the 'loading' on the matrix
menu of measures will be the same for an establishment for each menu completed;
for example, the perimeter fence, guarding/patrols posture, entry control etc may be
standard for all menus on the establishment at a given threat level.
17. Change in threat level. If the threat changes, the ESyO should consult the
completed points checksheet and menu of measures to see if the measures in force
are still adequate or, in the case of a decrease in threat, whether certain measures can
be changed or dispensed with. By trying differing options within the menu for a
given protected asset, the ESyO should be able to obtain any new baseline position.
Example: The threat increases from Low ('L') to Moderate ('M') and the number of
points required to house TOP SECRET protectively marked material increases from
18 to 20. Assuming that a particular establishment has the minimum 18 points and
meets the mandatory points (which would not change for such an increase in threat)
it could meet the new baseline position by introducing 'frequent Internal Patrols' to
the existing 'External Patrols' thereby gaining the 2 extra points required.
Alternatively, it could choose to house all of its TOP SECRET assets in a higher
Class container which when multiplied with the value of the lock would meet the
new baseline.
APPENDIX 1 TO
ANNEX D TO
SECTION I
TO CHAPTER 5
MINIMUM BASELINE MEASURES MATRIX - POINTS
CHECKSHEET
Reference: STR/2031/6
Assessment
1. Asset assessed: Docs in HQ Building
2. Protective marking: SECRET
3. Threat level: L
_Points check
4. Mandatory points.
Section 1 and/or Pts required: 8 Pts achieved: 12
2 plus 3
Sections 4 & 5. Pts required: 2 Pts achieved: 16
5. Additional points.
Any Sections. Pts required: 2
Sections 6 & 7 Pts achieved: 3
6. Summary of points.
Total Pts required: 14 Pts achieved 24
7. Remarks.
COULD STORE SECRET DOCS IN LOWER CLASS
CONTAINERS WITH LOWER CLASS LOCKS AND/OR
REVIEW PATROL ACTIVITY WITH A VIEW TO REDCUCING IT
THREAT LEVELS
VH - Very High
H - High
S - Significant
M - Moderate
L - Low
Measure Loading
Section 2 – Room
3. Room:
a. Strong Room 4
b. Secure Room 3
c. Locked Room 1
d. Unlocked Room 0
Sub-score (ss3) = a, b, c or d
4. Lock
a. Class 4 4
b. Class 4 3
c. Class 3 2
d. Class 2 1 Mortice
e Class 1 0
Sub-score (ss4) = a, b, c, d or e 1
ANNEX E TO
SECTION I
TO CHAPTER 5
SUMMARY OF THE CLASSES OF SECURITY
EQUIPMENT AND SECURITY MEASURES
Security Equipment
1. Catalogue of Security Equipment - Change of Terminology. As a result
of the 'Review of Protective Security' the terminology used to describe the security
effectiveness of certain items of security equipment listed in the 'Catalogue of
Security Equipment' has changed. Items are now allocated to a Class instead of a
'Category or 'Group'. The table below will act as a conversion table until an
amendment to the catalogue is issued.
Containers
Page No Description Class
A3 Grade 1A Safe: Sizes 1,2,3 & 4 4
A6 Document Chest 4
Locks
Page No Description Class
B3 Manifoil MkIV Combination Lock 4
B6 Mersey Keylock 3
12 Codeguard Keypad 3
Rooms
Page No Description Class
C3 Strong Room 4
IDS
Page No Description Class
E3 AC 12 IDS Control Panel 4
Fences
Description Class
Notes:
1. Depending on the design combination used, it is possible for this fence also to
be considered as an IDS; thus, counting in 2 sections of the MBMM.
SECTION II TO CHAPTER 5
05201. Significant security advantages can be derived from the proper positioning of
buildings, roads and car parks within a site. Security requirements are to be
considered at the earliest stages of planning new sites or buildings, or alterations to
existing buildings, since physical security measures are invariably more expensive
and less effective when introduced at a later stage. It is essential that a long-term
view is taken on threats when buildings are planned and commissioned.
05202. Where necessary, advice on the current threats and specialist counter
measures may be obtained via TLB PSyAs who are to be consulted by
establishments in accordance with para 05206, before detailed planning or building
commences. Consideration should be given to the following:
RESTRICTED
RESTRICTED
Defence Manual of Security
Responsibilities
05205. Responsibilities for providing specialist security advice for works projects
and services are as follows:
b. Top level budgets (TLB) holder TLBs are responsible for the
provision of security works services and can obtain advice from their PSyAs.
RESTRICTED
RESTRICTED
Physical Security
d. Special Services Group (SSG). The role of SSG and the services that
it can provide to the MOD are detailed at Annex A.
05206. Before a works project or service is undertaken, the Project Sponsor (PS),
Project Staff Officer (PSO) or Property Manager (PROM) is to consult the ESyO
who is to attend siting boards as required and who will, if necessary, consult the
appropriate PSyA. The PSyA may wish to obtain further specialist advice. The
security involvement in work services can be summarised as follows:
RESTRICTED
RESTRICTED
Defence Manual of Security
f. Request for initial SSG advisory service. A proforma for use by TLB
PSyAs to request an initial SSG advisory service in respect of security
requirements at a Defence site is at Annex F. Individual establishments are
not to make contact with SSG without the consent of their Security Authority.
05207. The initial decision on the requirement for security equipments/systems will
invariably be taken at establishment-level. However, for all projects involving fences
(including PIDS), CCTV, IDS, security lighting or AACS, TLB PSyAs are to be
consulted to ensure that the equipment is:
d. Good value for money throughout the life of the system (i.e is not just
the cheapest option that subsequently proves to have expensive maintenance
costs).
Central Monitoring
05208.
RESTRICTED
RESTRICTED
Physical Security
Maintenance.
05210. It is essential that an audit of the security system is carried out, by a security
specialist qualified to do so, prior to acceptance. The requirement for a security
audit should be specified in the SSR and incorporated in the PB or PROPMAN
works order. Where an audit finds an unacceptable fault, it is for the PS or PROM to
consider whether this is a breach of the contract for the contractor to correct.
a. Purpose. The purpose of the audit, which must be carried out prior to
the acceptance of the facility by the Establishment, is to ensure that the
security requirements specified in the PB or works order have been fully met.
b. TLB PSyAs. ESyOs are to consult PSyA staff about the choice of
security specialist to be employed to carry out the audit of the system.
RESTRICTED
RESTRICTED
Defence Manual of Security
Site Selection
Factors to Consider
05212. Where a choice of locations exists for a new facility, the security advantages
and disadvantages of each are to be evaluated. Factors to consider are:
Site Layout
Security Perimeter
05213. Facilities used for work on protectively marked material are to have a
defined perimeter; a physical barrier such as a security fence, wall, or hedge; or a
psychological barrier designed to make any intruder feel vulnerable and exposed
(for details of perimeter security measures, see Section III).
Open Space
05214. The measures that apply for open spaces within the site layout are as follows:
a. Open space between any outer security perimeter and the buildings it
surrounds is to be planned so as to help patrolling, but hinder overlooking
and deprive intruders of cover.
c. The foliage of tall trees should be kept well clear of the ground and of
any fence. Account is also to be taken of shadows they may cast.
RESTRICTED
RESTRICTED
Physical Security
05216. An area can be provided outside the main site entrance for vehicles waiting
to enter. Traffic congestion can distract the guards. However, as with car parks, due
consideration is to be given to the potential terrorist threat. In these circumstances,
for Service establishments, waiting areas are normally to be located outside the
establishment close to the point of entry. Consideration should be given to
landscaping these areas to minimise the effects of the blast.
Ancillary Facilities
05217. Ancillary facilities are to be sited away from or at worst be on the periphery
of areas used for protected work. Public access routes, eg for maintenance work, for
the delivery of supplies or removal of refuse, are not, as far as possible, to pass
through areas used for work on protected material.
05218. Buildings with public access should be outside the security perimeter. If
such buildings have to be inside, they are to, where feasible, form part of the security
perimeter. Access through them, to the rest of the site, is to be controlled.
Number of Entrances
Lighting at Entrances
Guard Accommodation
RESTRICTED
RESTRICTED
Defence Manual of Security
05222. Working and living accommodation is to be sited well back from the
perimeter and, where possible, at least 25 metres from a car park or road.
05223. Armouries and ammunition stores are to conform to the standards detailed in
Chapter 6. The authority for ammunition stores is the Explosives Storage and
Transport Committee (ESTC) or the relevant Chief Inspector of Explosives; for
works aspects it is DE SCG. Likewise the works authority for armouries is DE SCG
under instruction from the relevant PSyA.
Building Finishes
05223c. Where appropriate, the inner face of perimeter walls and the lower part of
building exteriors should be finished in a light coloured material to aid detection of
intruders and/ or IEDs.
Accommodation Planning
Layout of Accommodation
RESTRICTED
RESTRICTED
Physical Security
Briefing of PM or WSM
05225. For each project/PROPMAN works service, the PSyA is to brief the
PS/PROM on the following:
d. The security problems arising out of the installation of lifts (see para
05232), air conditioning and other ducting.
a. Ground floor. The use of the ground floor is, wherever possible, to
be avoided for work on SECRET or TOP SECRET material as upper floors
are less vulnerable to intrusion, overhearing and overlooking.
RESTRICTED
RESTRICTED
Defence Manual of Security
Secure Zones
General
05227. When different degrees of security protection are required in various parts of
the building, the more sensitive areas are to be concentrated into a secure zone (or
zones). These are parts of a building to which entry is separately controlled. Secure
zones are not to be confused with secure rooms (see Section XI of this Chapter).
Building alterations are only required in order to provide access control to a secure
zone. Strengthened walls and doors may not be required, but security furniture or a
secure room of an approved standard may be required for the custody of higher
levels of protected material within the secure zone.
Inner Compartments
05229. Where an entire building or group of buildings is made into a secure zone, a
series of inner 'compartments' may be created with entry to each controlled
separately in one of the following ways:
a. By guards.
RESTRICTED
RESTRICTED
Physical Security
Adjoining Rooms
05230. Several adjoining rooms can be made into a secure zone if the rooms are
inter-communicating. A secure zone is to have one entrance/exit only, although
additional emergency exits may be required on safety grounds. All other doors
giving access to the secure zone are to be permanently secured.
05231. Where whole floors of a building are made into secure zones the following
measures apply:
Lifts
05232. When access to a secure zone, comprising several floors, is by lift, the
following applies:
a. The lifts are to be programmed not to proceed beyond the lowest floor
of the secure zone, where a control point is to be established.
05233. Where secure zones are established to house registries of protected material
the measures below apply:
05234. The use of open plan offices creates particular problems in respect of the
security of protectively marked material and the preservation of the "need to know"
principle.
RESTRICTED
RESTRICTED
Defence Manual of Security
General Principles
05235. The threat of espionage will always exist and the risk of information
becoming known to unauthorised personnel will increase in open plan offices. The
following general principles apply:
c. Individuals are responsible for the material with which they are
entrusted at all times, and are to be aware of the risk of overhearing and
overlooking, taking precautions as necessary.
05237. Desk and seating arrangements are to be such as to ensure that access to
protectively marked material by others without "a need to know" is difficult. This
applies to both hard copy information and that displayed on computer screens. The
arrangements are to take into account both overhearing and overlooking, internally
and externally.
RESTRICTED
RESTRICTED
Physical Security
05238. Where clear working groups can be identified, an individual can leave his
working space for short periods (less than 30 minutes) providing his desk area is
within view of an individual with the same access who can satisfactorily watch the
desk. This arrangement does not relieve responsibility for the material entrusted to
an individual who must ensure the material is adequately protected at all times.
05239. In instances where a desk area is vacated for less than 30 minutes but a
second individual is not available to oversee or in the event the desk is vacated for
more than 30 minutes then the following measures apply:
05240. There will be occasions when some individuals will hold small quantities of
protectively marked material subject to special handling arrangements and to which
access is limited. Such material is to be secured in document boxes with Manifoil
Mk IV combination locks to prevent others having access. When not in use these
boxes should always be held in another approved security container.
Sensitive Conversations
05241.
RESTRICTED
RESTRICTED
Defence Manual of Security
05242. In open plan offices the siting and supervision of computer printers, faxes and
photocopiers is important. The following rules apply:
05243. Open plan offices are to employ a duty security checker system to ensure
that all protectively marked material is secured at cease work. Alternatively, defined
working group areas within the open plan offices can ensure that the last person
leaving each area conducts a security check. This check should be certified on a
check list which clearly indicates the extent of the area to be checked.
Key Security
05244. Within open plan offices the reduction in suitable wall space restricts the use
of combination key boxes for the secure storage of keys. Key security arrangements
are to be reviewed to ensure that an effective system is established utilising security
containers and taking account of the requirements of authorised late workers.
Visitors
05245. Open plan offices make it more difficult to control the movement of visitors
and contractors e.g. maintenance staff. Uncleared personnel are always to be
escorted. Cleared personnel do not require escorts and staff should be alert to
unknown personnel in their work areas. Strangers should be challenged.
a. Identify those groups dealing with similar subjects and with similar
access to protectively marked material and try and ensure they are adjacent to
each other.
RESTRICTED
RESTRICTED
Physical Security
e. Ensure staff are aware of their responsibilities, and the need for care
when handling or discussing sensitive matters in an open plan environment.
g. Establish either a last man out system for working areas or a duty
security checker system to ensure the security of areas at the close of work.
h. Ensure that the last man out or duty security checker is aware of the
checks to be conducted and form to be completed.
RESTRICTED
RESTRICTED
Defence Manual of Security
(1) All windows, doors and other means of entry to the vacated
office are to be secured. Where doors have 2 means of locking (eg
digital push button lock and normal key lock) and the absence is in
excess of 30 minutes, both means of locking should be utilised (2
means of locking need not be utilised for RESTRICTED documents).
(3) The key to the door is to be held by the office occupant at all
times except when it is deposited with an authorised holder.
05248. Separate rules exist for open plan offices (see paras 05234-05246).
RESTRICTED
RESTRICTED
Physical Security
ANNEX A TO SECTION II
SPECIAL SERVICES GROUP (SSG)
General
1. The purpose of this Annex is to describe the role of SSG in supplying
services to MOD, and the arrangements for funding and the control of funding those
services. SSG provides in-Government expertise in most aspects of physical security
for employment by MOD. In setting its charges, SSG will minimize costs but is
under HM Treasury remit to achieve full recovery.
3. The services that SSG provide for the MOD are described in a Supply and
Services Agreement (SSA). MOD sponsors are as follows:
SSG Authority
4. The SSG Authority provides an advisory service that is currently free to
MOD customers at the point of delivery. Application for this service is to be made
through and supported by, PSyAs using the request form at Annex F. Tasking of the
SSG Authority is to be restricted to seeking advice on technical aspects that are
beyond the scope of available in-house security expertise. Examples are those
services detailed at sub-paras 7a and 7b. Wherever possible, the costs of security
advice for major projects, future major projects and the services described in sub-
paras 7c, d and e should be included within the budget of the project.
5. Where the SSG Executive are contracted to carry out the work, security
advice for the work, and any costs incurred, will be on a repayment basis and
charged to the contract.
RESTRICTED
RESTRICTED
Defence Manual of Security
SSG Executive
8. The SSG Executive can be employed by PSs/PROMs either in competition
with commercial firms or where the Security Authority has directed that SSG should
be used; PSs/PROMs should note the following:
a. Where it has been so directed, PSs and PROMs should ensure that
SSG's responsibilities are defined within the management system of the
works in general and are consistent with any regulations. Specifications and
documentation should be similar to those under which contractors or
sub-contractors are retained using WSMs or PMs.
b. The management of services carried out by the SSG Executive and its
construction, design and management regulation aspects, should be defined
in the PM's contract documents for projects or in the order placed on the
WSM for PROPMAN work.
c. All aspects of SSG Executive service for MOD will normally be carried
out on a repayment basis, including advice given by the Executive.
RESTRICTED
RESTRICTED
Physical Security
ANNEX B TO SECTION II
SECURITY ADVICE - CAPITAL WORKS
PROJECTS
STAGE 1
Statement of Requirement (SOR)
STAGE 2
SOR Staffing
STAGE 3
Option Study (OS)
Preparation/Staffing of draft OS
PSyA to provide a detailed check-list of security requirements for each option under
consideration (for example: robustness, glazing, locks, fencing, IDS and lighting
standards). As much detail as possible should be provided in order to ensure that all
appropriate security measures are incorporated and subsequent OS costings are
JSP 440 Volume 1 Issue 2 5-2-B-1
RESTRICTED
RESTRICTED
Defence Manual of Security
accurate. To assist with this process it may be appropriate for the ESyO to start
developing the OR seeking assistance from specialist security staffs (in exceptional
circumstances the PSyA can request assistance from SSG). Further advice on the
drafting of the OR can be found at Annex E.
STAGE 4
OS
STAGE 5
Approval by Budget Holder
ESyO to attend Siting Board (Siting Board may have been convened earlier). Any
further comments on security requirements to be passed to PS and PSyA.
STAGE 6
Project Brief (PB) Preparation
Note: It is important to ensure that the security scope of work in the PB is fully
defined. It should include only the essential security features (to MMR)* which
must be incorporated within the Project. Any changes to the scope of work after the
appointment of the Project Manager will not be affordable.
* In this context, MMR means only those measures which are necessary
to meet operational or other military need.
RESTRICTED
RESTRICTED
Physical Security
STAGE 7
Appointment of Project Manager
STAGE 8
Preparation of Design Brief
PSyA:
1. Attends design meetings as required.
STAGE 9
Design
STAGE 10
Appointment of Contractor
STAGE 11
Construction
STAGE 12
Hand-Over
ESyO attends Pre-Acceptance Board Testing and Handover Boards. PSyA attends
(if required). Certificates of acceptance to be provided to PS.
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Physical Security
ANNEX C TO SECTION II
SECURITY ADVICE - WORKS SERVICES
(PROPMAN)
STAGE 1
Works Request
STAGE 2
Maintenance of the
STAGE 3
Annual LTC Process
PSyA to provide advice to TLB work staffs during the validation process.
RESTRICTED
RESTRICTED
Defence Manual of Security
STAGE 4
Maintenance Programme)
STAGE 5
Design
ESyO to review Work Service Manager (WSM) sketch plans and working drawings.
STAGE 6
Construction Phase
STAGE 7
Completion of Works
RESTRICTED
RESTRICTED
Physical Security
ANNEX D TO SECTION II
SECURITY INVOLVEMENT IN WORKS RELATED
PRIVATE FINANCE INITIATIVE
To be issued.
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Physical Security
ANNEX E TO SECTION II
DRAFTING THE STATEMENT OF SECURITY
REQUIREMENT (SSR) AND OPERATIONAL
REQUIREMENT (OR)
Statement of Security Requirement
1. The SSR (also known as a brief or high level OR) forms part of the work
service SOR. It is a high level statement which indicates the assets to be protected,
the threat assessment, the perceived vulnerabilities to the threat, the security level
required, and the reliability and availability required of any proposed systems. The
SSR is developed by the ESyO, in consultation with the PSyA, when a security
requirement has been identified. The PROM/PS provides (via the ESyO) the
Security Authority with the basis against which the threat and security concept is set.
The threat appreciation is to incorporate any relevant local factors; eg a risk
assessment of the site and a summary of possible methods of attack.
RESTRICTED
RESTRICTED
Defence Manual of Security
(10) Responses.
b. Producing the OR. Using the SOR (incorporating the SSR), the OR
is written by the ESyO with assistance, if necessary from the TLB PSyA
staffs, a facilitator (such as SSG) and other stakeholders. There must be
communication with ALL the stakeholders during the production of the OR.
The stakeholders are everyone who has an interest in the operational security
of the site or building. This includes security managers, building owners,
building user representatives, budget holders, and the operators of any
technical security systems, current or proposed. There are 5 steps to be
followed in producing the OR:
(1) Step 1. Agree and list the assets and physical areas of
concern.
RESTRICTED
RESTRICTED
Physical Security
ANNEX F TO SECTION II
RESTRICTED
(When completed)
Grid reference :
Postal address :
Type of work (See Note 2): new build/ refurbishment/ IDS/ PIDS/ CCTV/ AACS/
SAMS/ lighting/ building construction/ fences/ blast protectio
RESTRICTED
(When Completed)
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
(When Completed)
Area of advice (See Note 3): option study/ pre-project advice/ initial project advice/
audit established system/ audit newly installed system/ trouble shooting/ other
(please specify).
Title :
Role :
POINT OF CONTACT
Name:
Appointment:
POINT OF CONTACT
Name:
Appointment:
RESTRICTED
(When Completed)
RESTRICTED
RESTRICTED
Physical Security
RESTRICTED
(When Completed)
POINT OF CONTACT
Name :
Appointment:
Name:
Appointment:
Address:
No. of copies:
-------------------------------------------------------------
The following items are attached for information (See Note 7)
RESTRICTED
(When Completed)
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
(When Completed)
Distribution:
External:
Notes:
(3) The following services cannot be obtained through the D Def Sy funded SSG
Advisory Account: installation, maintenance, commissioning, detailed project
advice, purchase of equipment, examining tenders. If in doubt, speak to your PSyA
Staffs or DDef Sy-Phys(Tech).
(6) Initial point of contact for SSG Adviser to discuss work service particulars or
arrange site visit.
(8) Request form to be forwarded to relevant PSyA Staffs for action unless
command instructions in place that state otherwise.
RESTRICTED
(When Completed)
RESTRICTED
RESTRICTED
Physical Security
ANNEX G TO
SECTION II
COUNTER TERRORIST PHYSICAL SECURITY
MEASURES FOR ALL MOD OWNED OR OCCUPIED
BUILDINGS
Introduction
1. This Annex details the minimum counter-terrorist physical security measures
which are to be applied to all MOD owned or occupied buildings.
2. The physical security measures, adapted for the MOD, are based on Cabinet
Office guidelines on robustness measures for buildings. The purpose of these
measures is to limit damage to the building fabric and injury to the occupants,
whatever the level of threat. Given the varying function and location of MOD
buildings, physical security measures should be applied on the basis of vulnerability
of the site.
a. Buildings that are not located within a secure perimeter or are located
within 100 metres of a secure perimeter will be HIGH unless other factors
afford protection from bombs/mortars.
Standard Measures
6. These measures are to be applied to all new MOD buildings being
constructed, leased for MOD use or refurbished. When applying these measures,
PSyAs should exercise common sense and give consideration to omitting certain
standards in the case of buildings deep within the perimeter or with low occupancy,
domestic facilities such as housing and sporting facilities such as squash courts.
(4) The floors and roof slabs should be constructed with in situ
reinforced concrete, or with pre-cast concrete slabs with a structural
topping suitably tied into the structural frame.
Enhanced Measures
8. Enhanced measures are those measures that are to be implemented, or
removed, as the Alert States increase, or decrease.
10. Not all the measures will necessarily be appropriate for a particular
establishment. It is, however, important to undertake a Security Survey examining
such aspects as location, exposure, activity, site conditions, etc so as to identify those
measures that are appropriate and then incorporate them into the contingency.
SECTION III TO
CHAPTER 5
Fences
General
05303. A perimeter fence forms a barrier and identifies the boundary of a protected
or restricted area. The level of protection offered by a fence depends on:
The type of fence used on the perimeter of a site is to reflect the type of threat, i.e.
terrorist, criminal etc.
Purpose of Fences
05304. Fences are not always to be regarded as being a major obstacle in themselves.
They are primarily a means of:
Effectiveness of a Fence
05305. The effectiveness of a fence as a barrier to or deterrent against intruders can
be increased by the following:
Classes of Fences
05306. The Classes of fences are at para 05124 and the types of specific barriers that
fall into each Class are shown at Section I, Annex E.
(1) The fence is to, wherever possible, run in straight lines for
ease of surveillance and erection.
(2) Junctions where the fence changes direction are usually easier
to climb and are therefore be kept to a minimum.
(4) Using natural or existing features may help minimise the use of
material in the fence.
(5) The manpower that will be needed for the surveillance of the
fence.
PIDS is envisaged. Careful planning and the selection of the best line for the
fence using natural features will increase the protective value of the fence,
and minimise the use of material and manpower required for construction and
subsequent security coverage. Where a security area abuts an external
boundary, additional security measures should also be considered and
applied.
Types of Fence
05309. Transparent fences should normally be preferred to opaque fences where
there is a need for guards to see outside the protected area. They are to be
constructed of the following:
a. Welded mesh.
b. Steel palisades.
d. Chain link.
Detailed specifications can be obtained from SSG via Command security staff.
Opaque Fences
05310. Where an opaque fence is needed the following applies:
construct. However there will be occasions where walls are essential for a
specific requirement that has to be met. Advice from Command security staff
is to be sought by establishments in such circumstances.
05314. Except for notices indicating that police/military working dogs are on patrol,
those indicating MOD property, Official Secrets Acts notices and those instructing
visitors to report to the Guardroom/Control of Entry Point. Security notice boards are
not to be used to indicate boundaries or perimeters.
Units Overseas
05315. Overseas units are to follow the spirit of para 05313, tailoring the notice to
the requirements of local law and of Status of Forces agreements.
Use of PIDS
05317. In securing assets requiring a high level of protection, the use of PIDS can be
considered. They can usefully enhance the effectiveness of other perimeter defences
(such as fences and guard forces) but they are prone to false alarms (which need to
be verified by CCTV or a guard force) and, if unsuitably sited, their probable rate of
detection may be low. See para 05302 for information on the PIDS 'Family of
Documents'.
Operational Requirement
05318. PIDS are expensive and care is to be taken in the selection, application and
installation of a PIDS to prevent it being circumvented or its usefulness being
impaired by a high incidence of technical problems or false alarms. An Operational
Requirement (OR) is to be compiled by the establishment after consultation with and
approval by Command security staff. Establishments are to define clearly what they
expect of a PIDS and to be aware of its limitations. In setting the requirements for a
PIDS installation the following is to be specified:
b. Any special requirements affecting the areas concerned and the degree
of security protection necessary.
d. The overall security plan and details of all related measures relevant
to the design of the system.
f. The position of the alarm display panel and details of related security
procedures.
Site Survey
05319. Following approval of the OR, a site survey is to be arranged by
Command security staff (who may task their single-Service security organisation, or
SSG. The site survey is to consider:
See also Chapter 5, Section II, Annex A for co-ordination of security aspects of
works services.
System Audit
05320. An audit of the PIDS system is to be carried out by professional security staff.
System Maintenance
05321. To ensure any system continues to provide its optimum performance,
performance testing, servicing and preventative maintenance is needed. These tasks
should keep costs down and maintain acceptable performance. The frequency for
carrying out each task should have been determined after consideration of the
possible threat, the manufacturer’s recommendations, the technical requirements of
the equipment, the effort required to complete each task and the cost of carrying out
the task compared to the benefits to be gained. Because PIDS consist of electronic
devices operating in an outdoor environment system confidence and availability can
only be maintained through regular maintenance, it is therefore recommended that
systems receive at least 4 maintenance visits per year.
Security Lighting
Effective Use of Lighting
05322. Lighting can make an important contribution to physical security but to be
effective it should be used in association with guards. If incorrectly applied, it can
assist intruders more than guard forces. Security lighting is to:
05323. Security lighting acts as a particularly good low cost deterrent. Even a low
level of illumination can deter potential intruders. Lamps which require long warm-
up periods are unsuitable for certain security lighting applications. Time switches,
movement sensors or photo-electric sensors can be useful for the control of security
lighting, but the latter are vulnerable to deliberate interference.
SECTION IV TO
CHAPTER 5
THE PHYSICAL SECURITY OF BUILDINGS
General
Classification of Buildings
05402. The Classes of buildings are at para 05118.
Building Surveys
05403. When a building requires additional security measures, it is to be surveyed by
professional security surveyors as detailed by PSyAs.
Points of Entry
05405. In any building housing protected material there are to be as few points of
exit and entry as the functions of the site and safety considerations allow.
d. Fuel chutes.
e. Manhole covers.
f. Parking/loading bays.
g. Electrical installations.
h. Drain pipes.
Factors to Consider
05408. When choosing from the many security options available, the following
points are to be taken into consideration:
Doors
c. External doors are to open outwards, because these are more difficult to
force.
f. Locking bars across the back of the door offer an extra layer of
protection.
External Keyholes
05411. The external keyholes of seldom used external doors are to be filled in.
Padbolts (barrel bolts secured by padlocks) or heavy locking bars on the inside give
further protection.
Glazed Doors
05413. Glazed or semi-glazed doors can be strengthened by fitting a steel mesh grille
to the doors. Alternatively expanding grille gates or steel roller shutters can be
installed behind the doors. If it is a prestige door where unobtrusive protection is
desirable, the glass can be replaced by security glazing material.
Double Doors
05414. Double doors are to be fastened by bolts attached to the first closing leaf of
the door (at the top and bottom) and a security deadlock, preferably fitted with a
hook-bolt attached to the other leaf. Double doors which are not final exit doors can
also be fitted with internal cross bars and the second closing leaf secured with barrel
bolts.
Inter-communicating Doors
05415. Doors communicating with other parts of a building under separate
occupancy should in general provide a degree of security similar to that of external
doors.
Internal Doors
05416. Where there is a requirement to keep doors to the basement, ground or first
floor rooms locked, the keys to the locks on such doors are to be held under secure
conditions but are to be readily accessible to authorised persons.
JSP 440 Volume 1 Issue 2
5-4-4
RESTRICTED
RESTRICTED
Physical Security
Door frames
05419. The following applies to door frames:
c. Where frames are secured by nails driven into the brickwork they can,
for greater security, be fitted with steel supports to both sides of the frame
and attached by steel brackets to the masonry; alternatively, expanding bolts
can be used provided that they are set deep into the brickwork.
d. Where the building fabric is not suitable for bolts or steel brackets, the
advice of PSyAs is to be sought regarding a satisfactory alternative.
Door Bolts
05420. The following applies to door bolts:
a. Door bolts are to be used in conjunction with security locks and fitted
in pairs (at the top and bottom of the door).
b. Bolts must not be capable of being opened from outside the door and
the fixing and strength of the staple are to be adequate.
c. Where the bolt engages into the floor it must engage fully and the hole
in the floor is to be kept free from obstruction.
f. For double rebated doors, flush bolts should be let into the edge of the
first closing half of the door so that they are completely covered by the half
of the door. For double doors without rebates, flush bolts with turnover levers
should be fitted in the same way.
Accessibility
05421. Hinge pins are not to be removable from outside the door neither should the
hinge fixing screws be accessible from either side when the door is closed.
Reinforcement
05422. Hinges can be reinforced by fitting dog bolts near each hinge. The male half
of each dog bolt is to be fitted to the hinged edge of the door and the female half to
the door frame. The 2 halves interlock when the door is closed, thereby preventing
the hinged edge of the door being levered away from the frame even if the hinges
have been removed.
Frames
05424. The frames of grilles or shutters should be well secured to the surrounding
structure of the building and preferably should be inaccessible from the outside of the
building.
Windows
05426. The following security points regarding windows apply:
b. All basement, ground floor and other windows which are readily
accessible are to have secure fittings.
Window Locks
05427. Some windows will require more positive protection by fitting them with
window locks. The most vulnerable windows are usually those at basement or street
level, those near fire escapes or verandas, or those immediately below the roof.
Glazing
05429. The various types of glazing and the standards they should meet are detailed
in the 'DE Specialist Construction Functional Standard - Glazing Standards for MOD
Buildings subject to Terrorist Threat.' This provides an element of blast and anti-
bandit protection, but not small arms or high level of intruder protection for which
further advice should be sought.
Double Glazing
Advantages
05430. The following advantages accrue from double glazing:
Care To Be Taken
05431. Care is to be taken with all glazing to ensure that the glazing bead or the
material used to secure the glazing material to the window frame is not accessible
from the outside and therefore to surreptitious attack.
Roofs
Access
05432. The following applies to roof accesses, primarily for establishments in urban
areas or buildings housing sensitive information or equipment:
c. Access from a roof into a building can in some cases be made via a
chimney. If this is so, suitable measures are to be taken to block off such
access by, eg, inserting a grille.
Roof Doors
05433. If the roof is accessible from neighbouring buildings or from the ground, roof
access doors should be secured in the same way as other external doors.
c. Screwing the frames in place and covering the glass with steel mesh
secured to the frame on the inside.
Downpipes
05435. Access to the upper floors of a building or from the roof may often be
afforded by way of rainwater or soil downpipes. Such access can be restricted by
boxing in the pipes or by treating them with anti-climb paint (a compound which
permanently retains the consistency of thin grease). It should only be applied at
heights above 2.4 m to avoid accidental contact by passers-by.
a. The need for protection with steel grilles or steel mesh screens
secured from below, providing that these do not enable easy access to the
building.
b. Vents into sunken areas or vents emerging at street level are also
vulnerable and may need to be fitted with internal steel grilles.
Parking/Loading Bays
05437. The following is to be considered for parking or loading bays under a stand
alone building in an urban area:
b. During working hours, the bays are to be under the care of a custodian
or, if the threat is high, closed with electronically operated shutters which are
only opened when the incoming vehicle has been identified and, if necessary,
searched.
Public Utilities
into sensitive areas. Advice on siting services entry points from the point of counter
terrorist measures is given in the 'DE Specialist Construction Design Guide -
Robustness Measures for Buildings of Conventional Construction.' This also gives
advice on location of services within the building.
SECTION V TO
CHAPTER 5
Overlooking
Optical and Photographic Equipment
05503. Modern optical and photographic equipment is capable of obtaining
intelligence from documents or other assets overlooked from a very oblique angle.
The effective range depends on the equipment used and the prevailing atmospheric
conditions but it is possible to read, or produce legible photographs of text or
diagrams, at distances of 50 metres.
Precautions to be Taken
05504. Where there is a risk from overlooking the following precautions are to be
taken:
RESTRICTED
RESTRICTED
Defence Manual of Security
g. Where net curtains do not provide adequate protection because the light
inside a room is brighter than that outside, opaque curtains or blinds are to be
fitted.
Overhearing
Considering the Risk
05506. Under normal urban conditions, ordinary speech is not intelligible beyond
the range of about 15 metres. In conditions of exceptional quietness or with
technical aids this range may be exceeded. However, in considering the risk of over-
hearing, account is to be taken of other sounds, such as traffic noise, which tend to
mask speech. The risk of fortuitous overhearing is obviously increased when
windows are open or when voices are raised.
Non-technical Overhearing
05507. Where there is perceived to be a real risk of non-technical overhearing,
whether deliberate or fortuitous, consideration is to be given to keeping windows
closed and fitting air extractors or ventilator discs to windows. At ground level,
overhearing may be prevented by the erection of a fence (not necessarily a security
fence) to keep potential eavesdroppers at a sufficient distance from vulnerable
windows.
Ancillary Staff
05508. Care is to be taken to prevent ancillary staff, eg cleaners or contractors, from
overhearing sensitive discussions.
RESTRICTED
RESTRICTED
Physical Security
SECTION VI TO CHAPTER 5
RESTRICTED
RESTRICTED
Defence Manual of Security
Type of Systems
05605. The following basic systems exist:
Applications of CCTV
05606. The possible applications of CCTV include:
System Considerations
Operational Requirement
05607. It is essential that before any purchasing action is commenced,
establishments define clearly what they expect a CCTV system to do by preparing an
OR. The OR is to specify the following (further guidance is to be found at Section II
Annex E):
RESTRICTED
RESTRICTED
Physical Security
ORs are to be agreed by PSyA security staff before being used as the basis for any
system procurement.
Site Survey
05608. A site survey is to be carried-out under the auspices of the PSyA security
staff utilising professional security staff (e.g. SSG staff – Annex A refers) by day and
by night (if night surveillance is required) and is to include the following points:
Camera Trials
05609. Following, or as part of the site survey, recorded camera trials are to be
carried out to ensure that proposed camera positions and equipment (fences, lighting
etc) meet the OR in appropriate lighting and weather conditions. ESyOs are to
maintain a Record of View for each installed camera so that following
maintenance/replacement, the same field of view is achieved. The ROTAKIN is to
be used in such trials.
RESTRICTED
RESTRICTED
Defence Manual of Security
Audit of System
05610. An audit of the CCTV system is to be carried out by professional security
staff.
The ROTAKIN
05612. The ROTAKIN is a test target, which has been designed by PSDB to
simplify the job of establishing and maintaining an effective CCTV system. It is
essentially a silhouette of a person 1.6m high. On it are high contrast patterns. It is
used to:
RESTRICTED
RESTRICTED
Physical Security
Range of Systems
05616. Systems range from a single camera processor and monitor system to groups
of cameras whose video signals are constantly assessed by a single processor.
Devices are available which can cope with the widely varying light conditions
encountered in the open; many are technically limited and suitable for interior use
only.
Limitations
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Physical Security
RESTRICTED
RESTRICTED
Defence Manual of Security
Uses of IDS
05705. The following factors concerning IDS are to be considered:
Operational Requirement
Compilation
05706. IDS are expensive and care is to be taken in the selection, application and
installation of an IDS to prevent it being circumvented or its usefulness being impaired
by a high incidence of technical problems or false alarms. An Operational
Requirement (OR) is to be compiled by the establishment after consultation with and
approval by PSyA security staff. Establishments are to define clearly what they expect
of an IDS and to be aware of its limitations. In setting the requirements for an IDS
installation the following is to be specified:
JSP 440 Volume 1 Issue 2 5-7-2
RESTRICTED
RESTRICTED
Physical Security
d. Any special requirements affecting the areas concerned and the degree
of security protection necessary.
f. The overall security plan and details of all related measures relevant
to the design of the system.
h. The position of the alarm display panel and details of related security
procedures.
Site Survey
05707. Following approval of the OR, a site survey is to be arranged by PSyA security
staff (who may task their single-Service security organisation, or SSG). The site survey
is to consider:
Audit of System
05708. An audit of the IDS system is to be carried out by professional security staff.
RESTRICTED
RESTRICTED
Defence Manual of Security
System Components
05709. An IDS installation is to include some or all of the following system
components:
a. Detection sensors.
c. An alarm display.
d. Installation wiring.
e. An alarm signalling link between the control panel and alarm display.
f. A reaction force.
Detection Sensors
05710. Detection sensors are designed to detect an intrusion within the area they cover
and to provide an indication to the control panel of the alarm condition. Various types
of sensors can be used in combination, particular at high-risk sites, to cover technical
vulnerability, reduce the incidence of false arms, and provide against failure. IDS
sensors are to be fitted on the points of entry, i.e. doors and windows. Further coverage
inside rooms and of security containers provides a second-line of defence.
Types of Sensor
05711. The types of detection devices available are divided into the following
categories:
d. Passive infra red sensors. Passive infra red sensors (PIR) monitor
the infrared heat profile of an area and detect changes caused by human
intrusion.
RESTRICTED
RESTRICTED
Physical Security
Control Panel
05712. The main functions of a control panel are to:
b. Detect tampering.
Event Log
Electronic Log
05713. Control panels built around a microprocessor are to include an electronic log or
event recorder that can be linked to a hard copy printer. The log is to provide a record
of all alarms and operational instructions, such as "setting" and "un-setting" of the
system. It will also provide an aid to monitoring the security of the system and
providing an audit trail.
RESTRICTED
RESTRICTED
Defence Manual of Security
Alarm Display
Alarm Signalling
05715. Currently, alarms may be signalled in the following manner:
b. Private lines. Private lines are direct telephone lines used exclusively
for alarm signalling and monitoring. This system provides protection against
'shorting out' or cutting the lines, which will cause an immediate alarm.
RESTRICTED
RESTRICTED
Physical Security
Installation Wiring
05717. The installation wiring in a high security system is to be monitored,
automatically, at all times, i.e. there should be continuous electronic examination of the
circuit connections to ensure that they are in working order and are not being tampered
with. There should be an immediate alarm if a fault occurs or line tampering is detected.
System Management
05719. The IDS system manager is to have TORs issued by the HOE.
RESTRICTED
RESTRICTED
Defence Manual of Security
high value/ sensitive assets and the Head of Establishment must have
confidence in the system’s integrity and be aware of the need to maximise the
system’s availability.
Standby Power
05722. The following measures apply to standby power:
b. Float charge batteries can be used for standby power. They should
have a sufficient capacity to cope with foreseeable contingencies.
05723. Spare.
RESTRICTED
RESTRICTED
Physical Security
e. Where the control panel is sited within an area that is not permanently
supervised it is to be secured in an approved security container. The
container is to be kept locked and protected by the IDS.
Testing
05725. The testing of IDS is to be by the activation of a sensor to check that an alarm
has been raised. IDS installed in high security sites are to be tested at least once a day.
Where this is not possible, they are to be tested regularly at intervals to be prescribed
in establishment security regulations and reporting action for malfunctions specified
accordingly. For testing of IDS on armouries and ammunition stores, see Chapter 6.
Event logs
05726. Where event recorders are fitted the following applies:
Investigation of Alarms
05727. In the event of an attack being mounted on an IDS, a sensor may give only one
warning before it is circumvented. Therefore each alarm is to be thoroughly
investigated by the establishment security staff and every attempt made to establish the
cause. Personnel are to be made aware that a sequence of unexplained alarms occurring
over a prolonged period of time can indicate that probing attacks are being carried out
or that an attacker is attempting to undermine confidence in the system.
Refurbishment of Buildings
05728. When a building or individual suite of offices is refurbished after an IDS has
been installed, the rearrangement of partition walls and the re-positioning of security
RESTRICTED
RESTRICTED
Defence Manual of Security
containers or protected equipment can reduce the level of protection originally provided
by the IDS. ESyOs are to ensure the following:
RESTRICTED
RESTRICTED
Physical Security
RESTRICTED
RESTRICTED
RESTRICTED
RESTRICTED
Physical Security
05802. Further information, advice and guidance on guards and patrols can be obtained
as follows:
g. Card B of JSP 398 gives guidance for Service personnel dealing with
trespassers on MOD property.
5-8-1
RESTRICTED
RESTRICTED
Defence Manual of Security
h. Card A of JSP 398 gives guidance for opening fire for Service
personnel authorised to carry arms and ammunition on duty in the UK.
Definitions
05803. The following definitions apply throughout this chapter:
5–8-2
RESTRICTED
RESTRICTED
Physical Security
a. Service police.
b. Service personnel.
Security Duties
05805. The main security duties of a guard force are as follows:
5-8-3
RESTRICTED
RESTRICTED
Defence Manual of Security
Arming Policy
05806. Arming policy is currently laid down in CDS 21/90. The related Arming
Directive is at DCDS(C)/06/04/01 dated 19 Nov 98 and JSP 440, Volume 1, Chapter
7.
Weapons
05807. Only SA80 (IW/LSW) or 9mm SLP with standard ball ammunition may be
issued to Service personnel or MDP on general security duties, unless written
authority from CINCs (or delegated 2-star authority) or CCMDP is held for the use
of other weapons. When weapons with an automatic fire capability are issued, only
the single shot mode is to be used. Weapons must be correctly zeroed.
05808. Before Service personnel or MDP are issued with arms and ammunition for
employment on general security duties they must receive adequate training in
weapons handling, safety, marksmanship and the Rules of Engagement as laid down
by CINCs, and CCMDP.
05809-05810. Spare.
05811. Defence Establishments are categorised for guarding purposes; the category
will determine the mandatory minimum guarding requirement for that establishment.
This categorisation does not include Cadet Units, to whom Chapter 6 of Volume 1
refers, or nuclear establishments, the security policy for which is covered by JSP
440, Volume 4. In order to avoid confusion with the categorisation used in JSP 440
Volume 1, Chapter 2, Section 2 for general security purposes, the numbers are
preceded by the letter P (for Priority)1:
1
Armed Forces Careers Information Offices are not included in this categorisation. Separate
instructions are contained in Chapter 7, Paragraphs 07069 to 07076 and Annex M.
5–8-4
RESTRICTED
RESTRICTED
Physical Security
gates may be included in the QRF provided their gates can be closed and
secured for the duration of the alert. At least one gate will need to remain in
operation for possible access of emergency services.
(2) SFA areas and buildings and areas, outside the scope of P1
and P2, which are recognised MOD/Service social centres, e.g.
NAAFI Clubs, Recreation Clubs or Messes in which people are not
accommodated.
2
For definition of ACTO see Chapter 6, Section I, Paragraph 06004b.
3
Some training camps are used so extensively that they need to be treated as if they were regularly
occupied.
5-8-5
RESTRICTED
RESTRICTED
Defence Manual of Security
Duties of Guards
05812. The specific duties of guards vary with circumstances but will include the
following:
(5) Carrying out mobile, foot and dog patrols where appropriate.
b. At cease work.
(1) Ensuring that all windows, doors, skylights, gates, etc are
secure.
(2) Checking that all security containers are properly locked and
that no protectively marked material (including waste) has been left
out.
(3) Carrying out mobile, foot and dog patrols where appropriate.
(1) Carrying out mobile, foot and dog patrols where appropriate.
5–8-6
RESTRICTED
RESTRICTED
Physical Security
Control of Entry
05813. All in-use entrances/exits to/from establishments are to be guarded by at
least one person. In P1 establishments, if armed guarding has been ordered, at least
one of these guards is to be armed. Where circumstances permit, an armed guard
may undertake control of entry duties on his own. At busy entrances with a number
of vehicle checkers an armed cover guard is to be posted (and this guard may
constitute the sole armed presence). Internal control of entry to sensitive
buildings/areas need not include an armed element unless local circumstances or
other MOD directives require otherwise. If an Automatic Access Control System is
in use, the HOE is to decide whether a guard is required or not (with advice from the
PSyA). The decision will depend upon the prevailing alert state and local threat
assessment.
Internal Patrols
05814. Internal patrols are to be mounted to cover those areas that are considered
likely terrorist targets (e.g. barracks accommodation, messes etc) which are not
covered by electronic surveillance systems or static point guards. In category P1
establishments, patrols should have an armed element if armed guarding has been
ordered. In daylight hours, patrols may consist of one person, but during the hours of
darkness the need for 2 man patrols should be considered. Emphasis should ideally
be placed on foot patrolling during the hours of darkness. The number and frequency
of these patrols is to be decided by the HOE.
External Patrols
05815. Off-base patrolling by armed Service personnel or MDP may only be
undertaken with the express written agreement of the Chief Constable of the local
CPF4, who is responsible for the policing and security outside the perimeter of a
Defence establishment.
Search
05816. Powers of search. HOE are to issue clear concise orders on Powers of
Search in their Establishment’s Orders for the Guard. Guard Commanders are to
ensure that their subordinates are aware of their orders. The MOD policy for
searching is at Annex C to this Chapter.
05817. Spare.
4
External patrols by MDP officers are authorised by the Consolidated Policing Protocol which is an agreement between
CCMDP and the Association of Chief Police Officers (ACPO) for England and Wales and ACPOS in Scotland.
5-8-7
RESTRICTED
RESTRICTED
Defence Manual of Security
Trespassers
05818. Specific guidance for Defence personnel on dealing with trespass on MOD
property is at Card B of JSP 398. This guidance was developed primarily to deal
with demonstrators but the direction it contains can equally be applied to dealing
with suspected terrorists or other intruders. HOE are to ensure that all personnel
employed on security duties are familiar with the requirements of Card B. COs/HOE
are to ensure their personnel understand their powers of arrest and, where applicable,
the local bylaws and Acts of Parliament which give additional powers of arrest to
Defence personnel.
Response Plan
05819. Each unit/establishment is to have a response plan. There must be a
nominated QRF (see Paragraph 05803d above) which, in Category P1 and P2
establishments must be capable of being armed and be armed, if armed guarding has
been ordered. The QRF can be found from a unit/establishment’s own resources, a
neighbouring establishment, the MDP or local CPF. The QRF must be capable of
mounting a swift5, effective response to either a terrorist attack, a request for
assistance from a member of the guard force or to an Intruder Detection Alarm
activation. The duties and responsibilities of the QRF must be clearly stated in their
orders. It should be noted that the initial response by a CPF might well be provided
by unarmed police officers.
Static Posts
05820. In addition to the static posts at the control of entry points, further static guard
posts may be established at the discretion of the HOE. In Category P1
establishments, these posts should have an armed component if armed guarding has
been ordered.
Cadet Units
05821. Members of Cadet Forces are authorised to carry out the following security
duties:
a. Officers and Adult Instructors (AI) may carry out general security
duties, including protection of arms and ammunition stores, but they may not
be armed with firearms. They may be equipped with batons for self-defence,
provided they have received adequate training in their use in accordance with
policy on the use of batons. Except at camps, they should only carry out
5
As a guide, a ‘swift, effective response’ will not normally exceed 10 minutes to mount.
5–8-8
RESTRICTED
RESTRICTED
Physical Security
b. At cadet camps, cadet officers and AIs must expect to carry out duties
which may include the duties of sentry/prowler guard in accordance with
Cadet Force regulations.
c. Cadets may carry out guard duties during daylight hours only (and
normally not later than 2200hrs) in accordance with Cadet Force regulations.
They may not be armed and must not be issued with batons, pick-helves or
any other type of weapon. Cadets are not to guard armouries or ammunition
stores.
d. MGS.
Guard Funding
05823. There are no funds specifically allocated for contract guards or temporary
civilian patrolmen for Cadet Force security. Where regular Service personnel, MDP
5-8-9
RESTRICTED
RESTRICTED
Defence Manual of Security
a. Entry points such as gates, firing points, target galleries, huts and tents
etc are to be thoroughly checked on arrival by an AI, secured throughout the
period they are in use, and checked again by an AI immediately before
departure.
05825. Spare
5–8-10
RESTRICTED
RESTRICTED
Physical Security
b. Normally they will not enter secure rooms or strong rooms unless
supervised by someone with authorised access. Nevertheless they are to check
the doors of such rooms (and any other locked rooms) during their normal
patrols.
Other Considerations
05830. Transition to war (TTW)/war role, or likely changes in the future use of the
site, may render it unwise to employ CGF on some tasks irrespective of the level of
protection provided for physical security purposes. The PSyA should also seek
advice on the likely impact of European legislation on employment conditions, e.g.
TUPE, and the Working Time Regulations (and its associated entitlements) in force
in GB. Such considerations may have an impact on the decision to employ CGF at
all, and could introduce long term financial penalties.
5-8-11
RESTRICTED
RESTRICTED
Defence Manual of Security
Supervision of Guards
05836. Supervisors are to make unannounced daytime/out of hours visits to ensure
that guards are undertaking their duties correctly, understand their orders and have, if
necessary, submitted written reports in respect of incidents. Supervisors should
initial the Daily Occurrence Book (DOB) and personal notebooks (if issued) during
visits to guards.
Instructions
Written Orders
05837. Mandatory instructions, in the form of written orders and SOPs are to be
provided to Guards and QRFs and are to:
(4) When a fire, bomb alert, hoax call or other emergency occurs.
5–8-12
RESTRICTED
RESTRICTED
Physical Security
The orders are to be reviewed on a frequent basis and are to be available for inspection
by the PSyA.
Signing of Orders
05838. A record sheet is to be maintained on which each guard signs as having read
and understood the orders. Guards are to sign such a record in the following
circumstances:
The record is to document the person's rank, number, name, signature and date of
signature. The records are to be kept for a period of 12 months following the date of
signature.
05839. Spare.
Patrols
General Principles
Consideration for Use
05840. COs/HOEs are to consider the use of security patrols, depending on the
security category of the establishment, and the minimum baseline measures for the
protection of protected material (see Section I) and the BIKINI alert state.
Arming of Patrols
05841. Patrols will be armed if armed guarding has been ordered by CinCs. DCDS(C)
is responsible for issuing an Arming Directive which CinCs may further amplify.
Nature of Patrols
05842. The nature and extent of the patrols will depend on the other security
measures that are in force within the establishment as part of the minimum baseline
measures methodology. Where a large area is to be protected, 'beats' should be
5-8-13
RESTRICTED
RESTRICTED
Defence Manual of Security
considered to separate patrols, each responsible for its own area. In determining the
tasks of the patrols, paragraphs 05812 and 05813 inclusive apply.
Patrol Procedures
Inside Buildings
05843. Guards patrolling inside buildings are to ensure the following:
(1) There are no intruders in any part of the buildings, the identity
of all personnel is known and their right to be in the buildings is
confirmed.
(4) All doors and windows and any other possible means of entry
are secure and intact.
b. On subsequent rounds.
(3) Checks are made that those doors, windows and other possible
means of entry on the route of the patrol are secure and intact. They
should be selected so that all are checked at least once every three
rounds.
External Patrols
05844. External guard patrols are to carry out occasional patrols around buildings
selected at random as follows:
a. First patrol. On the first patrol after close of work they should ensure
that all buildings are properly secured and, at sites secured by a perimeter, that
there are no intruders.
5–8-14
RESTRICTED
RESTRICTED
Physical Security
Timing of Patrols
05845. The timing of patrols is not to be made public and the guards themselves are to
be warned of this. Guards are not to be aware of the exact timing of patrols until they
come on duty.
Breaches of Security
05846. On each round they are to ensure that any breaches of security and incidents
receive immediate corrective action and are recorded and reported to the establishment
security staff. Any recovered protectively marked material is to be secured in an
approved security container. The full procedures to be taken for breaches of security
are laid down in JSP 440, Volume 1, Chapter 2.
b. Optional.
5-8-15
RESTRICTED
RESTRICTED
Defence Manual of Security
Dogs
Effectiveness and Deterrent
05848. Dogs are an effective intruder detection system when used to protect
installations where there is little or no human traffic at night. They are a particularly
effective deterrent to intruders.
In addition, standard pictorial warning signs (yellow triangle with a black silhouetted
dog's head) are to be displayed at regular intervals around the perimeter. Units abroad
are to have the signs in the local language.
Rules of Engagement
05851. The Rules of Engagement for the release of dogs by Defence personnel on
duty in the United Kingdom are contained in JSP 398, the Compendium of ROE, at
Card C, and are reproduced at Annex B to this Section.
5–8-16
RESTRICTED
RESTRICTED
Physical Security
5-8-17
RESTRICTED
RESTRICTED
Defence Manual of Security
5–8-18
RESTRICTED
RESTRICTED
Physical Security
RESTRICTED
RESTRICTED
Defence Manual of Security
18
19
20
21
22
23
24
25
26
27
28
29
30
31
RESTRICTED
RESTRICTED
Physical Security
1. Dogs may be used to assist with a lawful arrest or to prevent crime following
Rule 680. A dog must be used only in appropriate circumstances. The release of a
dog for the purpose of apprehending a person must only be used as a last resort, other
than the use of firearms, in the specific circumstances detailed below. Patrol Arm
True dogs, which are used for special roles, are highly suited for this task.
Challenging
OR
The Release
4. You are only to release the dog, should no other means be available to
apprehend a person, if, on reasonable grounds you believe:
5-8-B-1
RESTRICTED
RESTRICTED
Defence Manual of Security
OR
b. You, the handler, come under attack.
OR
c. A person is causing injury to others.
OR
d. A person is threatening to cause injury to others.
OR
OR
OR
OR
You may then release the dog using the appropriate command. Upon release, you
are to follow the dog and order the person to stand still. When they are still, you are
to command the dog to “leave”, regain control of the dog and initiate the arrest
procedure.
5–8-B-2
RESTRICTED
RESTRICTED
Physical Security
Introduction
1. This document sets out the MOD’s policy on searching, and is directed at non
– police Guard and Security Forces, including Service personnel, MGS and civilian
contract guard forces, on MOD property (MOD sites, establishments, premises and
land) in Great Britain. In general, a search may be carried out only where a person
consents to being searched. Members of a guard or Security force do not have any
specific powers in relation to search. The Civilian Police Forces (CPF) and MOD
Police (MDP) have certain other powers to carry out searches in other circumstances,
either under the Police and Criminal Evidence Act 1984 (PACE), or under Scottish
Law. The procedures and powers for searches carried out by Service police are set
out in JSP 484 (Service Instructions for Search).
5-8-C-1
RESTRICTED
RESTRICTED
Defence Manual of Security
5–8-C-2
RESTRICTED
RESTRICTED
Physical Security
Search Criteria
10. The term ‘search’ means the search of a person (the individual), their
personal belongings (eg baggage) or their vehicles. This includes the search of
unattended personal belongings on MOD property, for example briefcases or bags
left in offices, or unlocked desk drawers.
a. Person searching.
Guidelines.
11. The need for training of personnel assigned to searching duties will vary,
depending on the type of guard force and the categorisation of the establishment. As
5-8-C-3
RESTRICTED
RESTRICTED
Defence Manual of Security
a minimum, these personnel assigned to searching duties are to be made aware of the
following guidelines:
b. Reasons for search. Those carrying out searches must be able to explain
the reasons why they intend to carry out a search, as the person to be searched
may well ask the reason. Searchers should be able to explain that the search
is, for example, for security purposes (to deter or detect terrorists or
espionage), or to combat and deter theft.
c. Use of force. The use of force will not normally be justifiable. Force
may be used only by the CPF, MDP or the Service Police where they have
the necessary powers. In circumstances where an immediate and substantive
threat to life is believed to exist, personnel other than police officers may
carry out a forcible search - but only as a last resort. Searching personnel are
to be warned that the use of force when not justified, or an excessive use of
force when use of reasonable force is justified, may expose the searcher to
allegations of assault and possible criminal prosecution.
5–8-C-4
RESTRICTED
RESTRICTED
Physical Security
(i) Ask the person for an explanation and, if unsatisfied with the
response, ask the person to wait while the police are called to
investigate.
g. Instigation of, and selection for Search. Entry and Exit searches
will ordinarily be instigated by the Commanding Officer of the unit or by the
HoE. Where searching is conducted for deterrent value and not in response
to threat or specific information, personnel and / or vehicles are to be selected
for searching in an entirely random manner.
Clarification
13. Legal advice should be sought in any case of need for clarification, or in any
case of uncertainty regarding this sensitive and potentially contentious subject.
5-8-C-5
RESTRICTED
RESTRICTED
Defence Manual of Security
5–8-C-6
RESTRICTED
RESTRICTED
Physical Security
APPENDIX 1 TO
ANNEX C TO SECTION VIII
RECORD OF SEARCH All details to be printed
DATE: LOCATION:
Name
Service / ID number
Parent organisation
Male / Female *
SUBJECT OF SEARCH:
Name
Service / ID number
Parent organisation
Male / Female *
Signature of Searcher:
Signature of witness:
RESTRICTED
RESTRICTED
Defence Manual of Security
5–8-C1-2
RESTRICTED
RESTRICTED
Physical Security
APPENDIX 2 TO
ANNEX C TO SECTION VIII
*Delete as appropriate
5-8-C2-1
RESTRICTED
RESTRICTED
Defence Manual of Security
5–8-C2-2
RESTRICTED
RESTRICTED
Control of Entry
SECTION IX TO CHAPTER 5
CONTROL OF ENTRY
This Section is being completely revised by D Def Sy and will be the subject of a
Defence Council Instruction published in Oct 01 and issued in a DSO Guidance
Note.
5-9-1
RESTRICTED
Defence Manual of Security
5-9-2
RESTRICTED
Physical Security
SECTION X TO CHAPTER 5
AUTOMATIC ACCESS CONTROL SYSTEMS (AACS
Introduction
General
051001. This section deals with policy concerning the installation, effective use and
management of automatic access control systems (AACS) within the Defence estate.
Use of AACS
051003. Establishments are to be encouraged to consider the security benefits that
may be achieved by the installation of AACS to buildings or zones within buildings.
The benefits may be most applicable to establishments located in a single building in
an urban area where an AACS system could provide increased efficiency in
controlling access and a reduction in the guard force. Such a reduction may provide
significant long term cost savings.
051004. Further information, advice and guidance. Further information, advice and
guidance can be obtained from the following sources:
051005. Requirement for TLB PSyA approval. Whilst the initial decision on the
requirement for a AACS is taken at establishment level, it is essential within the
Defence estate that the quality of system ultimately procured for the establishment is
of an acceptable standard and design. This is achieved by the involvement of TLB
RESTRICTED
RESTRICTED
Defence Manual of Security
PSyA staffs monitoring and approving ORs from establishments to ensure that
appropriate standards are maintained throughout the Defence estate.
Operational Requirement
051007. It is essential that before any purchasing action is commenced,
establishments define clearly what they expect an AACS to do by preparing an OR.
The OR is to specify the following:
Special Note: Within MOD, AACS must at present, use a PIN and ‘Watermark’.
Site Survey
051008. Following approval of the OR, a site survey is to be arranged by TLB PSyA
security staff (who may task their single-Service security organisation, and/or SSG).
Audit of System
051009. An audit of the IDS system is to be carried out by professional security staff
in accordance with the direction given at Section II to this Chapter, para 05210.
Definitions
051010. The following definitions apply:
RESTRICTED
RESTRICTED
Physical Security
e. Keypad. A data entry point for the input of a code into an AACS.
Classes of AACS
051011. The Classes of AACS are described at para 05119.
Types of AACS
051012. There are 3 types of AACS, namely:
RESTRICTED
RESTRICTED
Defence Manual of Security
within the MOD estate for personnel; "hands free" systems may be used for vehicles.
Biometric systems are not to be installed without the prior approval of the
appropriate TLB PSyA and D Def Sy.
Installation Criteria
051014. When considering the installation of an AACS, a study of the minimum
baseline measures is necessary. Whenever it appears that a substantial saving in
manpower or a marked improvement in protective security will occur then AACS
should be considered for installation. The advantages and disadvantages which
should be considered in relation to the proposed installation are as follows:
Security Criteria
051015. Where an AACS is installed to control direct access to an area housing
protectively marked material it is to comply with the following:
b. Have a "fail shut" device which ensures that the area to which the
system gives access is secure in the event of a failure or emergency.
JSP 440 Volume 1 Issue 2 5-10-4
RESTRICTED
RESTRICTED
Physical Security
System Security
051016. When a AACS has been installed its reliability and security must be
maintained by good management, supervision and regular servicing. This includes:
System Criteria
Incorporation of Watermark® Technology
051018. An increasing number of establishments are installing or planning to install
AACS. It is MOD policy that new systems should be compatible with Watermark®
technology. In addition, to being a tried, tested, approved and secure technology,
Watermark® systems can utilise the Tri-Service Defence ID card (DIDC) and
permanent passes manufactured using Site Access Management Systems. This limits
the number of cards carried by an individual on an establishment. Accordingly,
Sector Security Authorities need to ensure that establishments install only
Watermark® compatible systems (the use of Special Services Group for system
surveys should ensure that this requirement is complied with).
RESTRICTED
RESTRICTED
Defence Manual of Security
Watermark® Specification
051019. Copies of the Watermark® specification can be obtained from SSG. The
names of approved 'Systems Houses' can also be obtained from SSG.
Effective use
Components
051020. There are 3 components which together determine the effectiveness of an
AACS, namely:
c. The control unit which accepts or rejects the token and orders the
barrier accordingly.
Barriers
051021. Barriers for the admittance of personnel can be doors, turnstiles or booths.
They are classed as "higher" or "lower" security installations.
LCU Records
051026. An LCU must be able to record the following:
JSP 440 Volume 1 Issue 2 5-10-6
RESTRICTED
RESTRICTED
Physical Security
a. Times of events.
CCU Capability
051027. In addition to the records required of an LCU, a CCU must be able action the
following:
a. Store all PINs in use and be able to accept updates at intervals not
exceeding 12 hours.
Management
051028. System manager. Every AACS is to have a system manager and
deputy with requisite support personnel nominated. The system manager and deputy
are to:
c. Control the issue of token access and PINs, including the validation
and deletion of access right.
g. Ensure that only they have access to the programming facilities of the
system.
Servicing of System
051029. The reliability of an AACS depends on regular servicing and correct use.
The system manager is to ensure that operating and maintenance staff receive
adequate training before the system commences operation and before system updates
occur.
RESTRICTED
RESTRICTED
Defence Manual of Security
Maintenance Contracts
051030. Establishments are to ensure that an effective maintenance contract is in
place through the life of the system which allows for repair to the system to be
actioned within 24 hours of the system failing.
Doors
051031. An AACS may be considered for use in conjunction with a conventional
door (for example, to restrict access to a room or area inside a building). However,
the level of security provided is dependent on the security standard of the door. A
door is more vulnerable to being circumvented than a properly designed barrier,
particularly by tailgating, therefore a strong adjustable door closer is to be fitted.
Secondary systems
Biometric Systems
051032. Biometric systems verify a user's identity by checking some physiological
feature offered at the point of entry against the record of the same feature held in the
computer database. Biometrics systems are currently under trial by D Def Sy. An
approved list of systems will be issued in due course.
RESTRICTED
RESTRICTED
Physical Security
SECTION XI TO
CHAPTER 5
General
Level of Protection
051101. Protectively marked material is to be given a level of direct protection
appropriate to its value so that those without authority do not gain access to it. The
first line of protection is a container or room.
Approved Containers
051103. Approved containers are designed to provide resistance to surreptitious
attack and are allocated to a Class (1 to 4) according to the degree of protection they
offer (Class 4 offering the highest level of protection and Class 1 the lowest). A
measure of protection against forcible attack is, in addition, offered by containers in
Classes 4 and 3. Containers used to house protectively marked material are to be
fitted with an appropriate lock (see Section XII of this Chapter).
JSP 440 Volume 1 Issue 2
5-11-1
RESTRICTED
RESTRICTED
Defence Manual of Security
Classification of Containers
051104. Containers are classified according to the level of protection they offer from
both forced and surreptitious attack. A list of classifications is at para 05114.
Security Equipment Assessment Panel (SEAP) approved containers are listed at
Section I, Annex E.
Standards
Modifications
051107. Establishments are not to modify or design their own security containers.
Requirements for a new type of security container are to be staffed through PSyAs
who will assess the requirement prior to consulting DDef Sy for assessment and
approval.
Surface Finish
051109. The surface finish on Class 2 to 4 security containers has been specially
selected. When damaged in a surreptitious attack it is difficult to restore without
leaving discernible traces. Establishments are not to arrange for containers to be
repainted or resprayed other than to the original standard. This standard of repainting
cannot be carried out on site and it is necessary to arrange for the work to be done in
a properly equipped factory facility. Details of security container refurbishing is
included in the Handbook of the Manual of Protective Security or as provided by
PSyAs by way of security instructions for container refurbishment.
Comments
051110. The following other precautions are to be taken with containers:
Numbering of Containers
051111. Every container is to be allocated a number by the ESyO and a record kept
of its history that show:
b. Prime responsibility lies with the person handing over the container.
On completion of the search, a MOD Form 425 (Certificate of Inspection) is
to be signed and attached stating:
' I CERTIFY THAT I HAVE SEARCHED CONTAINER (SER NO...) AND ALL
OFFICIAL PAPERS AND EQUIPMENT HAVE BEEN REMOVED.'
c. Containers that are fitted with combination locks are to have their
number reset to the manufacture's number.
Full instructions for the disposal of furniture are contained in JSP 384.
Key Boxes
051115. Key boxes are not to be fixed to plasterboard partition walls. If there is no
firm fixing available, e.g. into brick or concrete, key boxes are not to be used and
keys are to kept in other appropriate security containers. Holes are not to be drilled in
other containers for the purpose of fixing a key box to them.
Container Records
Mandatory Information
051116. The following mandatory information is to be displayed inside the
container:
Additional Information
051117. Where so required, the following information can be displayed inside the
container:
Immediate Action
051118. The following action is to be taken in addition to any administrative action
required under the provisions of Queens Regulations:
Secure Rooms
General
Introduction
051119. Where there is a need to house large quantities of protectively marked
material, it may be convenient and economical to store the material on open racking
in a specially protected room. The room is to be designed to offer the same level of
protection as the security containers it replaces.
Classes of Room
051121. The Classes of room identified as suitable for use instead of security
containers of Class 2 to 4 are described at para 05116. The rooms by type are shown
at Section I, Annex E.
Choosing a Room
Considerations
051122. When considering which type of room to construct the following is to be
considered:
Types of Room
051123. Where a room is used as a security container, ie protectively marked material
is kept therein without security furniture, the standards below apply.
Strongrooms
051124. A strong room giving protection equivalent to a Class 4 security container
is of permanent construction, is an integral part of a building, and has only one point
of entry fitted with a combination locked strong room door. Its floor, walls and
ceiling are otherwise unbreached and constructed of ferro-concrete. Advice on
construction details can be obtained via Command security staff.
Secure Rooms
051125. A secure room is designed to afford the same level of protection as the
security containers it replaces. There are three types of secure room designed for the
storage of protectively marked material. Types A and B are designed to combine
JSP 440 Volume 1 Issue 2
5-11-6
RESTRICTED
RESTRICTED
Physical Security
Locked Room
051126. A locked room is any room or office that can be locked (when left
unattended) and will offer a degree of protection to its contents. All material
protectively marked CONFIDENTIAL or above must be stored in approved security
containers in locked rooms subject to the provisions of para 05248.
ANNEX A TO
SECTION XI
TO CHAPTER 5
SECURE ROOMS
Standard Type A Secure Room
1. Introduction. There should be only one entrance in Type A Secure Room,
but if emergency exits are necessary they must be fitted with approved doors and
emergency exit devices and be wired into any installed intruder detection system.
Windows are not permitted. Air vents and ducts must be fitted with steel grilles or
bar sets. Protectively marked material may be held on open racking or in non-SEAP
approved containers in a Type A Secure Room. A lightweight version of the Type A
Secure Room is available for use when the standard structure is too heavy for the
building.
2. Specification.
4. Specification.
5-11-A-1
RESTRICTED
RESTRICTED
Defence Manual of Security
6. Specification.
c. Door. Ashford.
8. Specification.
c. Door. Ashford.
5-11-A-2
RESTRICTED
RESTRICTED
Physical Security
10. Specification.
c. Door. Croydon.
12. Specification.
c. Door. Croydon.
5-11-A-3
RESTRICTED
RESTRICTED
Defence Manual of Security
5-11-A-4
RESTRICTED
RESTRICTED
Physical Security
SECTION XII TO
CHAPTER 5
LOCKS AND SECURITY KEYS
Locks
General
Introduction
051201. Security locks used for the direct protection of protectively marked material
at levels of CONFIDENTIAL or above are to conform with SEAP approved
standards. For the purpose of assessing and countering security risks, security locks
are classified according to the level of protection they offer; Class 4 being the
highest security and Class 1 the lowest.
Classification of Locks
051203. The classification of locks is shown at para 05115. SEAP approved locks
are listed at Section I, Annex E.
Combination Locks
Operating Principle
051204. Combination locks which operate on the principle of rotating tumbler
wheels generally offer a greater degree of protection against surreptitious attack than
key locks.
Overlooking
051205. Security containers fitted with combination locks are not to be sited where
there is a possibility that the dial of the lock can be overlooked by unauthorised
persons (this includes siting containers away from windows where telephotography
may be a threat). Where it is not possible to change the position of a container
vulnerable to overlooking, dial masks are to be fitted to the lock.
Initial Supply
051206. Locks are supplied set on the manufacturers setting. When received, they
are to be safeguarded and there is to be no unauthorised access to them.
Recording of Settings
051207. The following applies to the recording of combination settings:
(2) The names and titles of the custodian and other persons
authorised to have access to the written record.
It is best practice, but not mandatory, for the envelope to be protectively marked to
the same level as the highest protective marking of the material held in the container
itself. The user of the container is to sign across the flap and add the date after the
envelope is sealed. The signature and flap are then to be oversealed with clear
cellulose tape of at least 19mm width. The duplicate combination is to be passed to
the ESyO, or in special circumstances the HOE, for safe custody.
Selection of Numbers
051208. When choosing combinations, the following are to be observed:
Scrambling of Lock
051209. Combination locks are to be fully scrambled whenever a container is closed
by turning the dial anti-clockwise at least five times.
051210. Spare.
Changing Settings
051211. The setting numbers are to be changed in the following circumstances:
a. When a container first comes into service or is taken over by a new user.
b. Every 6 months.
Attack Techniques
051213. Combination locks are vulnerable to a number of surreptitious attack
techniques. All Class 4 locks will offer a degree of protection against an attack by
drilling and manipulation; however personnel are to be aware of the potential threat
of the following types of attack:
051217. Sites located in remote areas, or where a high level of security must be
maintained, are advised to hold a limited supply of new or rebuilt locks, for use in
emergency.
Surreptitious Attack
051218. Key locks are vulnerable to surreptitious attack because they have a keyway
into which probes and picks can be inserted, and a key which can be compromised or
lost.
b. Mortice locks, which rely for strength on the door surrounding them,
are not suitable for use on doors of less than 44mm thickness.
c. Rim locks depend for their strength on the nature of the fixings to the
door.
Degree of Security
051221. A lock cannot offer any higher degree of security than the door to which it is
fitted. It is pointless to fit an approved lock to a door which is weak or ill fitting.
Security Keys
Definition
051222. Security keys are those which operate locks fitted to:
Unauthorised Persons
051223. Keys can be easily copied from an impression, a photograph or a
radiograph. Unauthorised persons are not to be given the opportunity to handle or
examine security keys.
c. The number of keys issued for any lock is to be kept to the minimum.
(1) The location of each key, together with a record of the lock to
which it belongs.
(2) The date the working key (but not the duplicates) was signed
out to the custodian.
(4) The printed names and ranks of the persons allowed to have
access to the key.
i. In-use security keys are to attract the same protective marking as the
most sensitive material that they protect and are to be stored, protected and
handled accordingly.
Spare Keys
051225. The following conditions apply to spare keys:
b. They are not to be held in the same container as the working key.
c. The spare keys are only to be issued to persons with authorised access
to the material the lock protects, on receipt of documentation proving that the
working key has been mislaid or lost. The keys are only to be issued to allow
for the contents of the container/secure room to be removed and placed in
appropriate secure conditions. The container/secure room is then not to be
used to house protectively marked material until such time as the locks have
been changed or all the keys have been located and compromise is not
suspected.
d. Details of the issue of spare keys are to be recorded and the security
staff informed, if the keys have been issued at 'branch' level.
It is best practice, but not mandatory, for the envelope to be protectively marked to
the same level as the highest protective marking of the material held in the container
itself. The user of the container is to sign across the flap and add the date after the
envelope is sealed. The signature and flap are then to be over-sealed with clear
cellulose tape of at least 19mm width.
Note: Each key issued with a lock is to be used in rotation as the in-use key for a
maximum period of 6 months.
Mustering
051226. In addition to the requirement for a 6 monthly muster of all security keys on
an establishment, security keys in regular use are to be mustered daily at close of
work.
Identification
051227. Keys are to be labelled to facilitate their daily issue and muster. The
labelling is to be such that it does not readily identify the container to which the key
belongs. Key rings are to be checked frequently to ensure that keys cannot become
detached.
Transmission
051228. Keys are to be transferred by hand of one authorised person to another, but
where this is not possible, they are to be transmitted under safeguards appropriate to
the highest protected marking to which the relevant lock gives access.
Change of Appointment
051236. On change of appointment, key custodians who signed for the keys are to
return them to the ESyO who will then issue them to the new custodian.
Other keys
051237. The locks and keys to non security containers or to intruder detection panels
etc are not in themselves security keys but they are used to secure items and
equipment in need of protection. Such keys are to be held and treated in a manner
appropriate to the material they protect.
Immediate Action
051238. The following action is to be taken in addition to any other disciplinary
action required under the provisions of QRs:
Introduction
Description of MDT Systems
051301. Mechanical document transfer (MDT) systems include those employing
rails, tracks or pneumatic tubes for the carriage of documents within buildings.
d. The system control panel (some systems have their controls on the
carrier).Detailed Security Measures
a. The threat.
RESTRICTED
RESTRICTED
Defence Manual of Security
Ventilation
051308. Where motor ventilation is necessary care is to be taken to ensure that this
does not allow access to the documents being carried.
Ducting
Design of Ducting
051309. Ducting through which the MDT runs is to be designed so that it is not
possible to halt or remove carriers while they are in transit. Access to control panels
which, on some systems, are situated on the outside of the carrier, is to be denied as
these control the route and destination of the carrier.
Location of Ducting
051310. Ducting may be run between buildings providing the buildings are within a
secure perimeter and any maintenance access panels are designed so as to prevent
unauthorised access to the track and the carriers.
Security
Supervision
051312. Arrangements are to be made to ensure that terminals are properly
supervised and given suitable protection when left unattended.
Security of Carriers
051313. Where carriers containing protectively marked documents are held at
terminals outside working hours the following is to be ensured:
RESTRICTED
RESTRICTED
Physical Security
Emergency power
051315. Provision is to be made for a standby power supply.
Efficiency
051319. Where an ADAS is part of a larger electronic office project, it has the
potential to improve efficiency. Although there may be little saving in staff time spent
on the initial registration of documents, an ADAS has the potential to reduce the time
devoted to the subsequent movement of paper where they pass regularly between
different locations.
Facilities
051320. An ADAS which is intended to replace manual accounting of protectively
marked documents must be capable of:
JSP 440 Volume 1 Issue 2 5-13-3
RESTRICTED
RESTRICTED
Defence Manual of Security
Security Measures
Access to the ADAS System
051321. Access to the ADAS system is to be limited to those authorised to use it and
the establishment security staff; the following software security measures are to be
applied:
b. All data alterations are to be recorded after initial data entry and
verification.
RESTRICTED
RESTRICTED
Physical Security
SECTION XIV TO
CHAPTER 5
ACCOMMODATION MOVES
General
Introduction
051401. This Section gives information about accommodation moves involving
protectively marked assets. To ensure that a move is successful, it is essential that
adequate planning of the security aspects of the move is undertaken at an early stage.
All personnel involved are to be made aware of their responsibilities.
Planning
Involvement of Security Officers
051403. The ESyO and/or other sub-unit security officer is to be involved in the
security planning of the move at the commencement of arrangements being formulated.
They are to be fully aware of and contribute to the plans of senior management.
f. Monitor proposals for any structural alterations, and check that they
do not adversely affect security.
The Move
Actions to be Taken
051405. In planning the move it is necessary to consider the distance involved and the
amount of protectively marked assets to be moved. All moves of protectively marked
assets are to be in accordance with a movement plan agreed in advance by the ESyO.
Personnel are to be made aware of their responsibilities during the move. All stages of
the move are to be supervised by security staff or appropriately cleared personnel who
are to be fully briefed on the details of the move plan. In addition the following is to be
actioned:
Closure of Establishments
051406. Establishments are to seek the advice of their PSyA/security unit in the event
of the establishment being scheduled for closure and the estate being sold. In
particular, the following criteria are to be considered:
SECTION XV TO CHAPTER 5
REPROGRAPHIC MACHINES
General
Definition
051501. The term reprographic machine is defined as any type of machine capable, by
any process, of producing copies of a document (eg photocopiers, facsimile machines,
joint fax/photocopiers, laser printers, etc).
Control of Use
Control of Access
051503. Access to reprographic machines is to be strictly controlled to prevent
unauthorised copying of protectively marked material.
Methods of Control
051504. Where the risk of unauthorized disclosure is high, or when SECRET and TOP
SECRET material is involved, the following methods of control apply:
RESTRICTED
RESTRICTED
Defence Manual of Security
of copies made against a PIN or entry code, together with time and date.
Such systems control who has had access only, and not what has been copied.
Potential Risks
051505. Reprographic machines can suffer faults or be vulnerable to attack in the
following ways:
RESTRICTED
RESTRICTED
Physical Security
d. Photo receptor belts and drums. Photo receptor belts and drums
may contain protectively marked information. If it becomes necessary to
dispose of the machine or to have the belt/drum removed for repair the
maintenance engineer should not be allowed to remove them from the
establishment until the measures detailed below are followed:
(1) A machine that has a volatile memory can have the memory
erased simply by switching off the power supply.
Power Supply
051507. The machine should be permanently connected to the building electrical
power supply via a non-detachable power supply cord, protected by a control box. Both
1 phase and 3 phase photocopiers may be hardwired however, to satisfy Health and
Safety Legislation (EN 60950), they are to be hardwired into an isolator and it must be
possible to lock off or remove the in-line fuses to the isolator. Where permanent
connection is not possible, the machine must be able to be isolated from the power
supply by a locking device such as a security plug box (Catalogue of Security
Equipment - 24.55.0039) or an AACS. At ceasework, keys are to be stored in a
security container.
Tempest
051508. Establishments intending to install electronic reprographic machinery in
areas requiring TEMPEST consideration are to obtain advice from PSyA staffs.
JSP 440 Volume 1 Issue 2 5-15-3
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Physical Security
General Principles
051603. The following general principles apply:
Administrative Procedures
051604. The administrative procedures detailing the rank of personnel able to
undertake the destruction and associated documentary requirements are contained in
Chapter 4.
JSP 440 Volume 1 Issue 2 5-16-1
RESTRICTED
RESTRICTED
Defence Manual of Security
(1) Incineration.
(2) Disintegration.
(3) Hammer-milling.
(4) Shredding.
(5) Pulping.
The methods are described in more detail below. In addition to destroying waste on
site, approved destruction facilities can be used to destroy all waste types.
RESTRICTED
RESTRICTED
Physical Security
b. General rubbish such as cans, bottles, food and broken glass is not to
be included with protectively marked waste.
c. The waste sacks, when filled, are to be secured before being taken to
the central destruction or collection point by appropriately cleared personnel.
Waste Sacks
051607. Waste sacks for the collection of protectively marked waste are to be
sufficiently strong (Eg. double-lined) to withstand rigorous handling. Where required,
special Kraft paper sacks identified by HMSO code numbers are available as follows:
Records
051608. The following recording action in a permanent notebook is to be taken with
respect to sacks of protectively marked waste:
RESTRICTED
RESTRICTED
Defence Manual of Security
Methods of Destruction
Incineration
051609. Incineration is the most effective method of destroying large quantities of
most types of protectively marked material. Criteria for the equipment is to be as
follows; it is to:
d. Be so designed that, if there are moving parts such as chain grates, the
material being incinerated cannot escape from the combustion chamber.
051610. Spare.
Shredding
Baseline Measures for Shredding Protectively Marked Material
051611. Protectively marked paper, carbon paper, card, and tape is to be shredded in
accordance with the following baseline measures before it may be treated as
non-protectively marked waste:
c. Papers are to be inserted as whole pages into the shredder with the
lines of print at right angles to the direction of shredding.
JSP 440 Volume 1 Issue 2 5-16-4
RESTRICTED
RESTRICTED
Physical Security
Additional Measures
051612. The following additional measures are to implemented:
Pulping
051613. Pulping machines are effective in destroying most paper and card and, with
certain provisos, waterproof and wet strength paper, flat photographic film and
laminates. Pulping is not to be used for the destruction of plastic materials, lithoplates,
paper tapes or films in rolls.
RESTRICTED Waste
051616. Waste marked RESTRICTED may be destroyed using any grille size.
RESTRICTED
RESTRICTED
Defence Manual of Security
Incineration
051618. All forms of magnetic media may be destroyed by incineration (see para
051609). Due to the toxic nature of certain substances used in some forms of magnetic
media, current regulations regarding the disposal of waste are to be complied with.
Disintegrators
051619. Disintegrators and hammer mills can be used for the destruction of all forms
of magnetic media.
Baseline Measure
051620. When destroying waste marked CONFIDENTIAL or above, a grille size of no
larger than 6mm is to be used.
RESTRICTED Waste
051621. Waste marked RESTRICTED can be destroyed using any grille size.
Use of Pre-breaker
0516182. Printed circuit boards (PCBs) and microchips can damage the blades of
disintegrators. When destroying large quantities of these materials a pre-breaker is to
be used. Hammer-mills are specifically designed to deal with such materials.
Noise Levels
051623. Disintegrators and hammer-mills are noisy in operation and are not suitable
for use in offices or quiet locations.
Sanding
051624. When the quantities of hard disks to be destroyed are small, the magnetic
media bearing surface of the disks may be removed by emery paper, a disc sander or
emery wheel. The remaining metal platter is then to be disposed of as non-protectively
marked waste. Appropriate Health and Safety precautions must be applied when using
this method.
Shredding
051625. Floppy disks can be destroyed using approved shredders, providing the rules
described in paras 051611 and 051612 are followed. Due to the high density of
JSP 440 Volume 1 Issue 2 5-16-6
RESTRICTED
RESTRICTED
Physical Security
Total Destruction
Incineration
051628. Microform is to be incinerated as follows:
a. Fed into the incinerator whole, i.e. not cut, shredded or disintegrated
beforehand.
b. Strictly accounted for right up to the point where the ash or dust has
been examined for total destruction.
Microform Destructor
051629. Microform may be destroyed using a SEAP approved microform destructor.
Commercial Services
051630. Details of commercial destruction services approved to destroy protectively
marked microform can be found in the CSE, obtained via Command security staff.
Partial Destruction
Shredding
051631. Microform destroyed using this method is to conform to the following rules:
RESTRICTED
RESTRICTED
Defence Manual of Security
Emergency Destruction
Overseas Theatres
051633. The need for emergency destruction of protectively marked material should
only arise in operational theatres overseas (see also Chapter 14 on Operational
Security). The following precautions are to be taken:
UK Establishments
051634. HOEs are to ensure that simple emergency plans are in existence which
stipulating the following:
d. Destruction priorities.
RESTRICTED
RESTRICTED
Physical Security
The plans are to be checked and reviewed at regular intervals. The emergency
destruction plan is to be built into establishment operational emergency plans.
Emergency exercises should include destruction drill exercises.
Planning Points
051640. Further points to consider are as follows:
a. Since fires will not burn without oxygen, the brazier or other
container must have enough holes in it to allow sufficient air to enter.
RESTRICTED
RESTRICTED
Defence Manual of Security
c. The mass of ash should be constantly stirred and lifted with a long
poker to ensure that no pages are left and that the ash is broken up.
RESTRICTED
RESTRICTED
Physical Security
Carbon Remove Yes (a) Yes Yes (b) Yes Yes (a) Mix with
Paper paper clips paper.
when
pulping or (b) Potential
shredding of discolour-
ing, if mixed
with paper.
Microform None Yes Yes (a) No Yes Yes (a) Mix with
paper.
3. Quick and effective destruction. All departments within a ship are to plan
for the quick and effective destruction of their protected information and material.
7. Planning prior to sailing. When ships are about to sail into a HTE in
shallow waters, the commanding officer is to action the following:
a. Arrange that only those documents that are essential to the operation
are carried.
RESTRICTED
RESTRICTED
Defence Manual of Security
8. Action if at sea. Where the ship is already at sea when ordered to enter a
HTE, the following applies:
a. Keying material.
b. Cypher tables.
c. Machine settings.
d. Superseded crypto.
RESTRICTED
RESTRICTED
Physical Security
After the destruction of other protectively marked information, where time permits,
inserts, permits, rotors machines, drums and adaptors are to be destroyed by hammer
or other suitable tool. Wiring is to be torn out and the separate parts thrown
overboard in different directions.
11. Use of security containers. All protectively marked documents that are
operationally essential are to be stored in appropriate containers. In the event of the
ship sinking. These documents are to be left in position to go down with the ship.
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Physical Security
CONFERENCE SECURITY
General
Aims
051701. The aims of conference security are as follows:
Location of CSO
051704. The CSO is to be provided with an office or appropriate area near the main
entrance and be provided with supporting personnel and equipment as necessary.
JSP 440 Volume 1 Issue 2 5-17-1
RESTRICTED
RESTRICTED
Defence Manual of Security
Security Plan
051705. The CSO is to prepare a security plan for the conference, based on an
assessment of the risks involved. This is to take into account:
f. Guarding/reinforcements requirement.
g. The need for a contingency plan against terrorist attack, including the
identification of bomb-safe areas within the building.
Access Control
051706. The CSO is responsible for arranging control of access to and within the
conference building. The number of entrances to the conference building is to be
kept to a minimum.
Passes
051707. The following applies with regard to passes:
RESTRICTED
RESTRICTED
Physical Security
Secure Zones
051708. Where so required, the CSO is to decide which are to be secure zones i.e.
those areas within the conference building to which only certain delegates,
authorised officials and security staff will have unescorted access. They must be
clearly defined and access to them controlled. Their number will depend on the level
of protectively marked information to be discussed, the lay-out of the building and
the requirements of the conference organisers.
Controlled Areas
051709. Outside the secure area but within the conference site/building there may be
other areas that may need to be pass controlled.
Document Security
051710. Document security within each delegation is the responsibility of the
delegation. The CSO is responsible for document security for any conference
secretariat and is to make arrangements for the typing, collation and reproduction of
protectively marked documents to be done in one secure area. At the end of the
conference the CSO may need to make arrangements to forward protectively marked
documents to delegates parent establishment using the correct channels.
a. Where facilities are so required, the CSO is to ensure that there are
adequate facilities for the collection and disposal of protectively marked
waste.
Security Containers
051712. Where required, suitable security containers are to be provided for the storage
of protectively marked material. The CSO is to make provision for key security if
containers with key locks have been issued.
RESTRICTED
RESTRICTED
Defence Manual of Security
Tape Recorders
051713. Tape recorders are not to be taken into the conference without the prior written
permission of the CSO. Tapes are to be appropriately protectively marked and
accounted for.
Technical Security
051714. When highly protectively marked information is to be discussed, consideration
is to be given to taking measures against eavesdropping.
Integrity of Equipment
051716. Establishments will be required to satisfy SAFE/SSG that suitable
arrangements have been made to ensure the integrity of the equipment while it is under
their control.
Arrangements by CSO
051717. The CSO is to ensure the following procedures are actioned in respect of SIE:
Special Features
051718. The CSO will be told by SAFE/SSG of any special features that will indicate
that the equipment may have been tampered with. If tampering is suspected or there
JSP 440 Volume 1 Issue 2 5-17-4
RESTRICTED
RESTRICTED
Physical Security
has been unauthorised access to the equipment, PSyA security staff and SAFE/SSG are
to be informed without delay.
Room Security
051719. The CSO is to implement the following:
a. That all personnel are aware of the need for proper room security.
d. Doors of those rooms that have not been technically inspected are to
be left open after working hours.
Security Breaches
051720. Security breach reports are to be forwarded by the guard force to the CSO and
ESyO, if different, without delay.
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Physical Security
SECTION XVIII
TO CHAPTER 5
SECURITY OF EQUIPMENT
General
Introduction
051801. The aim of this Section is to provide advice that allows heads of
establishment sufficient flexibility to decide on the protective measures to be applied
to the security of equipment according to the following:
Definition of Equipment
051803. The definition of equipment in the context of applying security measures is
divided into the following categories:
Methodology
051804. The security of equipment minimum baseline measures matrix follows the
same methodology of the matrix and menu system for the security of protectively
marked documents detailed in Section I to this Chapter.
The Threat
051806. The security of equipment minimum baseline measures matrices are
designed to provide an appropriate level of protection for equipment against the
ESPIONAGE rather than the terrorist or sabotage threats; however by their very
nature, many large items of equipment are very valuable in financial and operational
terms and the matrix provides for these factors. The system is aimed to be flexible
enough to cover operational deployments and not only protection at the home base. The
assumed threat level for the use of the matrix is LOW (L) unless otherwise directed by
PSyAs having been so advised by DDef Sy e.g. The threat level for Special Armour is
set at SIGNIFICANT.
Matrices
051808. There are 2 separate matrices corresponding to the categories of large items
of equipment kept in special-to-type buildings and large items of equipment kept in
the open; when assessing small items of equipment the minimum baseline measures
matrix shown in Section I to this Chapter is to be used. The matrices for large items of
equipment are at Annexes A and B. The matrices share a common menu of measures
which is at Annex C.
Range of Options
051809. The security of equipment matrices and menu of minimum baseline measures
provide a range of options which meet the baseline objectives. They are designed to
help the management of security risks by offering a means for the identification and
selection of the most suitable and cost-effective physical security measures to safeguard
protectively marked equipment against attempts to acquire them illicitly by surreptitious
attack or theft. Although many of the measures suggested will be helpful in a
counter-terrorist context (and suitable counter-terrorist measures already in place may,
of course, be taken into account in meeting the baseline measures), the weighting given
to the measures in the matrices is not primarily intended to meet terrorist threats.
Threat Levels
051810. The security of equipment minimum baseline measures are those in the first
column of each of the matrices (headed L). The remaining columns offer a means of
deciding on the increased measures appropriate to levels of threat higher than Low.
Establishment security officers (ESyOs) are to keep themselves regularly up-to-date on
the nature and levels of threat to their assets (by consulting their appropriate PSyAs and
local Service/civil police authorities); and are to decide for themselves on the proper
response to increased levels of threat, in the light of local circumstances.
Numerical Values
051812. The numerical value of the baseline measures required for each level of the
protective marking system is made up from different sections of the menu of measures;
some from mandatory sections of the menu of measures and the remainder from any of
the sections. This system of mandatory and additional measures is to ensure that a
sensible balance of measures is achieved and allows ESyOs flexibility in the measures
JSP 440 Volume 1 Issue 2
5-18-3
RESTRICTED
RESTRICTED
Defence Manual of Security
they apply to reach the baseline position, taking into account the security facilities,
equipment and manpower at their disposal.
Sections
051814. The menu of measures is divided into 7 Sections, each dealing with a
particular aspect of security (or layer of 'the defence in depth)'. For ease of application,
the menu is laid out as a proforma with numerical allocations provided; there are also
spaces for inserting the various points scores.
Weighting of Measures
051815. Some measures are weighted in that their points score multiples with that of
another measure (eg containers and locks), whilst others are added (eg fences, perimeter
intruder detection systems, lighting and CCTV). The value of zero is used as a
multiplier where a fence has no control of entry at its entry/exit points. Where control
of entry is provided, the multiplier x 1 will validate the points awarded to the fence.
Selection of Measures
051816. In deciding what measures to select, the user is to include existing security
measures and then fill in the score. The results can then be compared with the
requirements of the matrix. From the comparison it will be apparent whether the
measures are excessive, adequate or need 'topping up'.
Additional Measures
051817. If additional measures are required, establishments are to decide which
measures to select in the light of the actual threats faced by them. If there is a threat
from forcible attack, for instance, the strength of a container/casing may be a higher
factor than the Class of lock; conversely, if the threat is from surreptitious attack, a high
Class lock may be a more important factor than the strength of the container/casing.
Used in this way, with imagination and common sense, the menu will help ESyOs to
find the measures most appropriate to their particular situation, the threats they face and
the resources available.
Note: The MBMM points attracted by dog patrols may not be a constant factor
throughout a given period eg the patrols may only operate at night.
k. How packed.
m. Details of guards.
Periodic movement of similar equipment between the same parties on the same route
can be incorporated in one movement security plan, but otherwise a separate plan is to
be made for each movement.
Distribution of Plan
051820. A copy of the movement security plan is to be sent in advance to the
consignee. Relevant extracts from the plan are to be provided to the driver of the
consignment.
Packaging
051821. Equipment marked CONFIDENTIAL or above is to be concealed, as far as
practicable, in an anonymous covering or container. The protective marking is not to be
disclosed on the covering or container. Where practicable, the equipment and its
JSP 440 Volume 1 Issue 2
5-18-6
RESTRICTED
RESTRICTED
Physical Security
covering/container should be in the locked body of the vehicle. When being transported
in conjunction with UNCLASSIFIED or RESTRICTED material, equipment marked
CONFIDENTIAL or above is to be physically separated from it by an inner lockable
cage or similar barrier.
Escorts
051822. In addition to the driver, an escort is to be provided on each vehicle carrying
protectively marked material of CONFIDENTIAL or above. An escort or driver is to
remain with the vehicle at all times.
Communication
051823. Each vehicle on which material protectively marked CONFIDENTIAL or
above is being carried, is to have a two-way communication system easily accessible to
the driver/escort for use in emergencies.
Vetting
051824. Drivers and escorts of equipment protectively marked SECRET or above are
under the control of a person who is suitably cleared.
Rail Movement
051825. TOP SECRET equipment is not to be transported by rail. Otherwise, the
principles underlying the regulations for road movement are to be applied by the PSyA
in consultation with appropriate security staff when discussing the rail movement plan
with the movement staff.
Sea Movement
051826. The principles underlying the regulations outlined for road movement are to
be applied by the PSyA in consultation with appropriate security staff when discussing
the sea movement plan with the movements staff. In addition, so far as is practicable,
British owned and crewed ships should be used for the movement of CONFIDENTIAL
or above material. Where this is not possible the PSyA’s advice is to be sought. In
any event, unescorted access to the equipment by the crew is not permitted.
Air Movement
051827. Protectively marked equipment should normally be carried in RAF or RAF
chartered aircraft. The handover requirement and the requirement for escorts during the
flight should be discussed with PSyAs as required. Where this is not possible, the use
of diplomatic/non-diplomatic couriers should be considered.
ANNEX A TO
SECTION XVIII TO
CHAPTER 5
TOP SECRET L M S H VH
Mandatory - Section 1 1 1 1 1 1
Mandatory - Section 3 2 2 2 2 2
Mandatory - Sections 4 plus 5 ** 6 6 7 7 7
Additional - Any sections # 9 11 11 14 18
Total 18 20 21 24 28
SECRET L M S H VH
Mandatory - Section 1 1 1 1 1 1
Mandatory - Section 3 2 2 2 2 2
Mandatory - Sections 4 plus 5 * 4 4 5 5 6
Additional - Any sections # 7 9 9 12 15
Total 14 16 17 20 24
CONFIDENTIAL L M S H VH
Mandatory - Section 1 1 1 1 1 1
Mandatory - Section 3 2 2 2 2 2
Mandatory - Sections 4 plus 5 3 3 3 3 3
Additional - Any sections # 4 5 7 9 13
Total 10 11 13 15 19
RESTRICTED L M S H VH
Mandatory - Section 1 1 1 1 1 1
Mandatory - Section 3 1 1 1 1 1
Additional - Any sections # - - 1 2 3
Total 2 2 3 4 5
RESTRICTED
RESTRICTED
Physical Security
ANNEX B TO
SECTION XVIII
TO CHAPTER 5
MINIMUM BASELINE MEASURES MATRIX FOR
LARGE ITEMS OF EQUIPMENT KEPT IN THE OPEN
TOP SECRET L M S H VH
Mandatory - Section 1 2 2 2 2 2
Mandatory - Section 4 2 2 2 2 2
Mandatory - Sections 5 & 6 ** 8 8 8 8 8
Additional - Any Sections # 6 8 9 12 16
Total 18 20 21 24 28
SECRET L M S H VH
Mandatory - Section 1 1 1 1 1 1
Mandatory - Section 4 1 1 1 1 1
Mandatory - Sections 5 & 6 ** 8 8 8 8 8
Additional - Any Sections # 4 6 7 10 14
Total 14 16 17 20 24
CONFIDENTIAL L M S H VH
Mandatory - Section 1 1 1 1 1 1
Mandatory - Section 4 - - 1 1 1
Mandatory - Sections 5 & 6 ** 6 6 6 6 6
Additional - Any Sections # 3 4 5 7 11
Total 10 11 13 15 19
RESTRICTED L M S H VH
Mandatory - Section 1 2 2 2 2 2
Additional - Any Sections # - - 1 2 3
Total 2 2 3 4 5
RESTRICTED
RESTRICTED
Physical Security
ANNEX C TO
SECTION XVIII
TO CHAPTER 5
MENU OF MINIMUM BASELINE MEASURES FOR
SECURITY OF EQUIPMENT
Measure Loading
Section 2 – Room
3. Room:
a. Strong Room 4
b. Strong Room 3
c. Secure Room 1
d. Locked Room 0
Sub-score (ss3) = a, b, c or d
4. Lock
a. Class 4 4
b. Class 4 3
c. Class 3 2
d. Class 2 1
e Class 1 0
Sub-score (ss4) = a, b, c, d or e
ANNEX D TO
SECTION XVIII
TO CHAPTER 5
MINIMUM BASELINE MEASURES MATRIX - POINTS
CHECKSHEET FOR LARGE ITEMS OF EQUIPMENT
KEPT INSIDE SPECIAL-TO-TYPE BUILDINGS
Reference:
Assessment
1. Asset assessed:
2. Protective marking:
3. Threat level:
Points check
4. Mandatory points.
Section 1. Pts required: Pts achieved:
Section 3. Pts required: Pts achieved:
Sections 4 & 5. Pts required: Pts achieved:
5. Additional points.
Any Sections. Pts required:
Sections 6 & 7 Pts achieved:
6. Summary of points.
Total Pts required: Pts achieved
7. Remarks.
ANNEX E TO
SECTION XVIII TO
CHAPTER 5
Reference:
Assessment
1. Asset assessed:
2. Protective marking:
3. Threat level:
Points check
4. Mandatory points.
Section 1. Pts required: Pts achieved:
Section 4. Pts required: Pts achieved:
Sections 5 & 6. Pts required: Pts achieved:
5. Additional points.
Any Sections. Pts required:
Sections 7 Pts achieved:
6. Summary of points.
Total Pts required: Pts achieved
7. Remarks.
ANNEX F TO
SECTION XVIII TO
CHAPTER 5
a. Read off the total points required to protect the particular asset(s) at
the current threat Level and write the figure on the points checksheet (eg '14'
for SECRET at Low).
b. Read off the mandatory points required for the sections and write the
figures on the points checksheet (eg '8' for Sections 1 and/or 2 plus 3).
4. Turn to the menu of baseline measures to carry out the assessment. Sample
assessments can be found as follows:
Notes:
6. Section 2 - room. If applicable, determine the class of the room that the
equipment is held in using the standards at para 05116 and insert the 'loading' figure in
the sub-score column (ss3); for example an unlocked room would attract 0 points.
Similarly ascertain the 'loading' for the type of lock fitted to the room using the
standards at para 05115 and insert at ss4; for example a Chubb Mortice lock would
attract 1 point. The section score is achieved by multiplying the scores for the room
and the lock.
Note:
7. Section 3 - building. Using the standards at para 05118 determine the class
of the building (its strength) and insert the loading score in the Section score column
(S3). For example a modern building of pre-cast panels can attract 3 points.
insert in the sub- score column (ss6). Decide the loading for the visitor control and
insert in the sub-score column (ss7). The Section 4 score is achieved by adding the 2
scores together.
b. Determine the sub-score for the type of IDS on the establishment, area
and/or site using the standards at para 05123 and insert at (ss9).
The Section 5 score is obtained by adding the scores for guards and IDS and
inserting at (S5).
Example: Armoured vehicles are located in a storage area without any measures other
than security lighting. The total points for section 6 would be 2.
11. Section 7 - Outer perimeter. Decide what grade the establishment outer
perimeter fence is using the standards at para 05124 and shown by type at Section I
Annex E and insert the 'loading' into the sub-score (ss16); eg an approved 2.4 metre
JSP 440 Volume 1 Issue 2
5-18-F-3
RESTRICTED
RESTRICTED
Defence Manual of Security
high chainlink fence with security topping would merit 2 points. If the establishment
has entry control insert 1 point (ss17); if it does not then no points are allotted.
Similarly, insert the 'loading' figures for the 'yes/no' measures for searches (ss18),
perimeter PIDS (ss13), CCTV (ss14) and lighting (ss15). The total score (S7) for
outer perimeter measures is obtained by multiplying the 'loading' scores of the fence
and entry control and then adding this figure to the total of the rest of the sub-scores.
Example: An establishment has a Class 2 fence (2 points), with entry control (1 point).
Entry/exit searches are carried out by guards (1 point) but the establishment does not
have any PIDS (0 points). It also does not have any CCTV (0 points) or security
lighting to the appropriate standards (0 points). The total points for Section 7 would be
as follows:
Note: It is important to note that points for CCTV and lighting can only be obtained if
the equipment reaches the appropriate approved standards.
15. Flexibility of the matrices. The advantage of the baseline measures matrices
is that they allow establishments the flexibility to choose their own security measures at
a given threat level as long as the baseline position is reached and certain mandatory
measures are met. They also take into account any enhanced security measures that the
unit may have invested in, such as AACS, CCTV or security lighting, thereby perhaps
allowing the establishment to reduce its costs in other areas of security.
18. Change in threat level. If the threat changes, the ESyO should consult the
completed points checksheet and menu of measures to see if the measures in force
are still adequate or, in the case of a decrease in threat, whether certain measures can
be changed or dispensed with. By trying differing options within the menu for a
given protected asset, the ESyO should be able to obtain any new baseline position.
Example: The threat increases from Low ('L') to Moderate ('M') and the number of
points required to house TOP SECRET protectively marked material increases from
18 to 20. Assuming that a particular establishment has the minimum 18 points and
meets the mandatory points (which would not change for such an increase in threat)
it could meet the new baseline position by introducing 'Infrequent Internal Patrols' to
the existing 'External Patrols' thereby gaining the extra points required.
Alternatively, it could choose to house all of its TOP SECRET equipment in a higher
class of building which would meet the new baseline position.
APPENDIX 1 TO
ANNEX F TO
SECTION XVIII
TO CHAPTER 5
Assessment
1. Asset assessed: Armoured Vehicles
2. Protective marking: SECRET
3. Threat level: L
_Points check
4. Mandatory points.
Section 1. Pts required: 1 Pts achieved: 2
Section 3. Pts required: 2 Pts achieved: 3
Sections 4 & 5. Pts required: 4 Pts achieved: 16
5. Additional points.
Any Sections. Pts required: 7
Sections 6 & 7 Pts achieved: 5
6. Summary of points.
Total Pts required: 14 Pts achieved 26
7. Remarks.
STANDARD OF SECURITY REQUIRED WILL
MEET THREAT TO V
VHH LEVEL
THREAT LEVELS
VH - Very High
H - High
S - Significant
M - Moderate
L - Low
Measure Loading
Section 2 – Room Not applicable
applicable
3. Room:
a. Strong Room 4
b. Strong Room 3
c. Secure Room 1
d. Locked Room 0
Sub-score (ss3) = a, b, c or d
4. Lock
a. Class 4 4
b. Class 4 3
c. Class 3 2
d. Class 2 1
e Class 1 0
Sub-score (ss4) = a, b, c, d or e
APPENDIX 2 TO
ANNEX F TO
SECTION XVIII TO
CHAPTER 5
Reference:
STR/2033/6
Assessment
1. Asset assessed: Aircraft on dispersal
2. Protective marking: SECRET
3. Threat level: L
Points check
4. Mandatory points.
Section 1. Pts required: 1 Pts achieved: 1
Section 4. Pts required: 2 Pts achieved: 3
Sections 5 & 6. Pts required: 4 Pts achieved: 13
5. Additional points.
Any Sections. Pts required: 7
Sections 7 Pts achieved: 3
6. Summary of points.
Total Pts required: 14 Pts achieved 20
7. Remarks.
Standard
Standard of security provided will meet threat up
to and including HIGH.
TOP SECRET L M S H VH
Mandatory - Section 1 2 2 2 2 2
Mandatory - Section 4 2 2 2 2 2
Mandatory - Sections 5 & 6 ** 8 8 8 8 8
Additional - Any Sections # 6 8 9 12 16
Total 18 20 21 24 28
SECRET L M S H VH
Mandatory - Section 1 1 1 1 1 1
Mandatory - Section 4 1 1 1 1 1
Mandatory - Sections 5 & 6 ** 8 8 8 8 8
Additional - Any Sections # 4 6 7 10 14
Total 14 16 17 20 24
CONFIDENTIAL L M S H VH
Mandatory - Section 1 1 1 1 1 1
Mandatory - Section 4 - - 1 1 1
Mandatory - Sections 5 & 6 ** 6 6 6 6 6
Additional - Any Sections # 3 4 5 7 11
Total 10 11 13 15 19
RESTRICTED L M S H VH
Mandatory - Section 1 2 2 2 2 2
Additional - Any Sections # - - 1 2 3
Total 2 2 3 4 5
Measure Loading
Section 2 – Room Not applicable
3. Room:
a. Strong Room 4
b. Strong Room 3
c. Secure Room 1
d. Locked Room 0
Sub-score (ss3) = a, b, c or d
4. Lock
a. Class 4 4
b. Class 4 3
c. Class 3 2
d. Class 2 1
e Class 1 0
Sub-score (ss4) = a, b, c, d or e
RESTRICTED
RESTRICTED
Defence Manual of Security
a. Increased Efficiency.
d. Local and Wide Area Networks. The potential exists (if required) to
share data amongst user establishments via a central database.
RESTRICTED
RESTRICTED
Physical Security
Networking SAMS
Introduction
051906. A large number of visitors to Defence Establishments have no
clearance and, in the event of any requirement for investigation, there is little or no
information gathered with traditional paper systems. Even those with some form of
clearance are often put through the control of access process several times for
different establishments, and cross-referencing of information is impossible. This is
inefficient resulting in a duplication of effort, unnecessary escorting and resulting in
a lack of structured administrative and security information.
Benefits
051907. Existing SAMS users benefit from the information held on a local
database as it provides a history, as well as clearance details, personal data and image
for verification on each visit to a site. The information is, however, limited to each
user or organisation, and there is still a large amount of duplication of effort and
replication of data when one considers the number of separate databases. By having a
central database which is updated by all SAMS users, each time a new visitor or
contractor visits a site for the first time, staff will be able to check if there is a record
elsewhere, as well as on their own database. If the benefits detailed at Para 051905
above are true for a single establishment’s database then economies of scale and
enhanced benefits may be achievable through aggregating all the data collected
throughout the MOD.
Creation of MOD Central Database
051908. To address this situation a MOD central database has been established
at DERA Farnborough. This will give HOEs an option to draw-upon and contribute
to a centrally held database. Access to the database will be dependent on the user
having access to a suitably configured PC, running Windows NT and with a
connection to Restricted LAN Interconnect (RLI). There will be a joining fee for
each terminal requiring access to the central database, together with a monthly
service cost. This option can be obtained through the DGICS Catalogue (051910
refers).
RESTRICTED
RESTRICTED
Defence Manual of Security
System Procurement
Requirement for Command Security Staff Approval
051910. Whilst the initial decision on the requirement for SAMS is taken at
establishment level, it is essential that the quality of system ultimately procured for
the establishment is of an acceptable standard and design. This is ensured by the
involvement of PSyA security staffs monitoring and approving ORs from
establishments to ensure that appropriate security equipment standards are
maintained. To assist with this procurement, DGICS have identified the only
authorised supplier of systems to the MOD and placed their products within the
DGICS Catalogue. Systems on offer from the supplier range from basic permanent
pass production systems through to systems with full functionality that have the
capability to be networked and which can access the MOD central database. SAMS
are not to be purchased from sources other than DGICS as there will be no guarantee
that they will be compatible with the MOD central system.
Compilation of Operational Requirement
051911. An OR is to be compiled by the ESyO after consultation with and
approval by PSyA security staffs. The ESyO is to define clearly what is expected of
the system. As part of the process to identify the preferred supplier of SAMS to the
MOD a ‘Technical Specification for the Supply Site Access Management Systems
and Associated Goods and Services’ (CAT/104341 - Version 2). This document is
available through Special Services Group (SSG) and will asssist with the compilation
of the OR and performance specification. Establishments may also call upon the
assistance of TLB security specialists or SSG.
Site-Specific Surveying
051912. Before procuring any system, regardless of functionality, it is
important that the ESyO arranges for a site-specific survey to be conducted. This
process should use basic template designs as a basis for the survey with site-specific
requirements tailored to produce the optimum system for the site within defined
resources. Personnel with an engineering/security background, not merely a security
background must undertake the ‘technical survey’, in order to fully appreciate the
technical requirements site-by-site.
Audit Procedures
051913. A full audit of an installed SAMS is to be carried-out prior to
commissioning. The audit is to be carried-out by professional security staff.
Special Services Group
051914. SSG are available to assist with compilation of the OR, performance
specification, site survey and audit. Costs for such taskings will be borne by D Def
Sy through the MOD SSG Advisory Account. Requests for SSG assistance are to be
made in accordance with the instructions at Chapter 5 Section II Annexes A and F.
RESTRICTED
RESTRICTED
Physical Security
System Management
Terms of Reference (TORs).
051915. The SAMS system manager is to have TORs issued by the HOE.
System Security Policies (SSPs) and Security Operating Procedures (SyOPs)
051916. Appropriate SSPs and SyOPs must be issued for the system.
Consumables, Maintenance, Servicing and Training
051917. When procuring SAMS, the ESyO is to ensure that budgetary
provision has been made for the provision of consumables and also takes account of
the need to replace the system in future years (SAMS has an estimated system life of
8 years). In addition, he is to ensure that the Property Manager (PROM) includes the
requirement to maintain/ service the SAMS in the establishment’s Forward
Maintenance Register. It is calculated that maintenance/ servicing currently
represents 13.5% annually of capital outlay. Consideration is also to be given for the
requirement to provide initial and periodic continuation training.
Pass Production
Pass Designs
051918. SAMS is a computer based control of access system, that also has the
capability to produce passes. Whilst a variety of pass types can be produced,
dependent on the user’s needs and requirements, the following pass system template
is recommended for all SAMS equipped establishments.
b. Daily Visitors Pass. This will be a paper pass issued for very short-
term visitors to an establishment. It will have an adhesive backing that will
allow it to be attached to a coloured background which can stipulate whether
the visitor is to be escorted (red) or unescorted (green). The background to
the pass itself will be unique to the establishment and will have a barcode
facility. The bearer’s image will be in monochrome. There is the facility for
the production of a vehicle permit with this pass.
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Defence Manual of Security
CHAPTER 6
Introduction 06001
Definitions 06004
Responsibilities 06006
Keys 06028
Patrols 06034
Registers 06036
Checks 06037
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
Introduction 06201
RESTRICTED
RESTRICTED
Defence Manual of Security
Introduction 06301
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
Introduction 06401
Registers 06416
Keys 06417
Mini-armouries 06438
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
GENERAL INSTRUCTIONS
Introduction
06101. This chapter defines the minimum standards of physical security to be applied
to the storage and movement of conventional arms, ammunition and explosives held by,
or under the control of the MOD Defence Estate through its Crown Servants. Heads of
Establishments (HOE) should be aware that if they contemplate contracting out
management of armouries/ammunition stores, Crown immunity no longer applies and
they will be required to comply in full with the Firearms Act 1968 and the physical
standards for storage will be determined by the Civil Police. Any HOE considering this
move is strongly advised to seek advice and guidance from their Principal Security
Adviser (PSyA) before proceeding. This chapter does not apply to the protection of
special nuclear materials (SNM) and other radioactive materials (ORM), nor does it
apply to nuclear weapons, nuclear or radioactive munitions or reactor plant in the
custody of the Services. It does not detail the standards for the protection of biological
and chemical defence materials, advice on the protection, movement and storage of
which must be obtained from DD Def Sy Phys Sy.
06102. Logistics, engineering, weapon and movement staffs have important roles in
respect of the security and safety of arms, ammunition and explosives. PSyAs and their
staff are to work closely with them in order to ensure that all relevant legislation and
other regulations are complied with as far as is practicable in any given circumstances.
To this end these instructions take account of the publications detailed below, but
clearly cannot repeat them in their entirety. These publications are anyway subject to
update and it is essential, therefore, that close liaison is maintained with appropriate
branches.
RESTRICTED
RESTRICTED
Defence Manual of Security
06103. Where arms, ammunition and explosives merit protective marking on the basis
of confidentiality the rules in Chapter 5 for the security of equipment apply.
Definitions
06104. The following definitions when used in this document apply:
a. Ammunition and explosives. In this chapter the term includes all forms
of ammunition, explosives including detonators, pyrotechnics and anti-riot
agents. Inert items on their own (eg, those components of ammunition which
do not contain explosive, such as empty cartridge cases, links and chargers) are
not included in this definition.
(4) Full bore rifles, pistols, automatic fire weapons, shotguns and
.22 rifles.
(a) Barrels.
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
(f) Springs.
(h) Magazines.
(j) Bayonets.
At times of AMBER and RED BIKINI Alert, extra security measures may be
imposed by security staff to protect the movement of ACTO items.
e. Small Arms Trainer (SAT) weapons. The Home Office has agreed
that Proof Marked SAT weapons are neither live nor DP weapons, but fall into a
separate category of their own. Each PSyA is responsible for laying down the
protection standards for his area of responsibility, based on the overall policy
agreed with the lead PSyA on SAT (HQ Land Command G2). This means that
Proof Marked SAT weapons are to be afforded protection based upon
compromise affecting availability and integrity.
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
The Threat
06105. The threat to arms, ammunition and explosives stores comes from:
e. Authorized persons who abuse the trust placed in them, for whatever
reason.
Responsibilities
06106. D Def Sy. D Def Sy is responsible for security policy for arms, ammunition
and explosives.
06107. PSyAs. PSyAs are responsible for the implementation of security policy for
arms, ammunition and explosives within their respective areas of responsibility.
06108. C-in-Cs/TLB Holders. C-in-Cs/TLB Holders are responsible for ensuring that
the minimum standards required by this chapter are enforced within their
Commands/areas of responsibility.
RESTRICTED
RESTRICTED
Defence Manual of Security
06109. Heads of Establishments (HOE). HOE are to ensure that minimum standards
required by this chapter are enforced at establishment level and that any additional
measures required by TLB Holders are introduced. ESyOs are responsible at
establishment level for advising the HOE of the interpretation and implementation of
the policy for the security of arms, ammunition and explosives.
06110. Reserve and Cadet Forces. HQs of Reserve and Cadet Forces through their
officers commanding, are responsible for ensuring that at least the minimum standards
for the security of arms, ammunition and explosives are enforced by Reserve and Cadet
personnel, in furtherance of instructions issued by PSyAs.
06112. Chief Inspectors of Explosives (CIEs). CIEs are responsible for explosives
safe practices.
Security instructions
06113. Promulgation of security instructions. Each establishment having control of
materiel covered by this chapter is to publish Security Standing Orders/Instructions
detailing the procedures to be followed. The instructions are to be issued by the HOE.
A suggested format is at Annex A.
06114. Reviews and briefings. Security instructions are to be regularly reviewed and
promulgated by means of periodic briefings. The briefings are to emphasize the threat
and its likely forms, and stress the need to report any suspicious matter, loss, find or
security weakness.
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
06117. Records. Full records of holdings, use, expenditure and disposal of arms,
ammunition and explosives are to be maintained in the establishment to enable accurate
periodic accounting and spot checks to be carried out.
06118. Access. Access to all materials is to be controlled and permitted only to those
who have a need for such access in the performance of their duties.
06119. Delay. Physical security measures are to provide sufficient delay to allow for
the arrival of an appropriate response force.
06122. Armoury doors. Armoury doors are to be kept locked or bolted on the inside
when individuals are working inside, and should only be opened to allow authorized
entry or exit. Outward looking door viewers must be installed. There is to be a means of
external communication for those working inside when the doors are locked.
RESTRICTED
RESTRICTED
Defence Manual of Security
06127. Key control. Key control is to be used as the basis of strict control of access to
arms, ammunition and explosive store holdings.
Keys
06128. Issue. Keys for armouries or ammunition stores may only normally be issued
to personnel authorised in writing by the HOE to draw the keys, the same person should
not have access to the keys to both the armoury and ammunition store. Armoury or
ammunition store keys are not normally to be issued to any individual to allow him to
draw arms or ammunition alone or unsupervised.
Response force
06130. Related Instructions. Paragraphs 06131 to 06134 below are to be read in
conjunction with Chapter 5 Section VIII (Guards and Patrols).
06132. Other MOD Establishments. All other MOD establishments with armouries
and /or ammunition and explosive stores not guarded by Service Personnel or MDP are
to have contingency plans which provide a response force capable of being armed that
may include the Civil Police, and which will react in sufficient time, taking account of
the delay provided by the building construction, to prevent the loss of or damage to the
weapons, ammunition or explosives being protected. The decision as to whether the
response force is to be armed, if provided by the Civil Police, will rest with the Chief
Constable of the force involved.
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
06134. Spare.
Patrols
06135. In addition to checks being made at prescribed intervals with the occupants of
the stores/armouries when in use, (the precise timings to be decided by the HOE),
regular armouries and ammunition and explosive stores are to be externally patrolled
with the following frequency when they have ACTO items stored in them:
Registers
06137. All arms and ammunition and explosives on charge to an establishment are to
be listed in the appropriate registers and ledger. Records are also to be kept of all daily
issues and receipts and these records are to be retained for at least 36 months after the
last entry - these records will be subject to checking during protective security
inspections.
Checks
06138. Principles. The following principles apply for the checking of arms,
ammunition and explosives:
a. PSyAs are responsible for issuing instructions for the physical checking
of stocks of arms, ammunition and explosives. Checks are to be recorded in
dedicated logs which are to be inspected every 6 months and kept for 36
months.
RESTRICTED
RESTRICTED
Defence Manual of Security
c. Those involved in checking are to ensure that, where bulk stocks are
involved, the seals on boxes are inspected. If discrepancies are confirmed, the
fact is to be immediately brought to the attention of the ESyO (see Annex B).
06139. IDS. Functional checks of armoury and ammunition and explosive store IDS
are to be carried out as follows:
Note: The above will apply to establishments where the alarm terminates internally, ie
on the establishment. Where the alarm terminates externally, ie at a central monitoring
unit, an appropriate checking system must be included in the contract.
06140. Spare
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
b. The HOE.
d. Appropriate PSyA.
g. EAO/SATO.
a. The ESyO.
b. The HOE.
e. EAO/SATO.
06143. The PSyA will decide whether an investigation is required and the agency best
suited to conduct it. Investigation reports are to be forwarded to the PSyA for further
action or case closure.
Materials on loan
06144. Loans of material between establishments or to industrial firms are to be
formally approved by line management responsible for the material. The loan must be
documented and must specifically state the period of loan and the responsibility of the
recipient to provide security protection on delivery. The appropriate officer is to be
satisfied that effective safeguards exist and that the transfer is correctly authorized and
documented. Where loans are to be for long periods (one year or more) the recipient is
required to confirm that the materials are still held by him and correctly stored on a 6
monthly basis, or that the materials have been expended.
06145. Spare.
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
ANNEX A TO
SECTION I TO
CHAPTER 6
SUBJECTS TO BE COVERED IN ESTABLISHMENT
SECURITY INSTRUCTIONS FOR THE PROTECTION
OF ARMS, AMMUNITION AND EXPLOSIVES
4. Security responsibilities:
11. Details of response force arrangements (e.g. size, response time, orders,
activation and deployment).
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
ANNEX B TO
SECTION I TO
CHAPTER 6
REPORT FORMAT FOR THE LOSS, RECOVERY OR
ATTEMPTED THEFT OF COMPLETE ARMS,
AMMUNITION OR EXPLOSIVES
H Action taken. Person investigating loss, the nearest Security Unit (Area
Security Team, MI Bn, RAF P&SS, CBSy, DLO, DPA security organisation
(who and location)). Action being taken to prevent a further loss.
Notes:
RESTRICTED
RESTRICTED
Defence Manual of Security
ANNEX C TO
SECTION I TO
CHAPTER 6
FORMAT FOR REPORTING LOSS OR COMPROMISE
OF KEYS TO ARMOURIES AND MAGAZINES
Subject: Loss/compromise of armoury/magazine keys
B. Contents of armoury/magazine.
Notes:
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
Introduction
06201. These instructions are to be read in conjunction with other relevant JSPs,
statutory instruments, bye-laws and other forms of delegated legislation, and explosives
regulations that apply to movements of ammunition and explosives.
06202. All weapons in transit are to be treated as if they are classed within Section 5 of
the Firearms Act 1968. Arms, ammunition and explosives are at greater risk when they
leave the protected facilities of an establishment and are particularly vulnerable when
they are being transported off main roads, during the hours of darkness and at stopping
points whilst enroute.
Planning of movements
06204. General. All details of the move must be protected until the latest possible
moment. Normally, movement of arms, ammunition and explosives should be by the
most direct authorised route, however, when regular deliveries between the same two
locations are made movement arrangements should be regularly reviewed and varied,
even if this could result in administrative inconvenience or additional financial cost.
Details of the movement regulations for arms are held in JSP 327. Regulations for the
movement of ammunition and explosives are in JSP 445. Details of procedures to be
followed by Service shooting clubs and cadet forces when moving small amounts of
arms and ammunition are at Section IV of this chapter.
06206. Regular moves. When arms, ammunition and explosives stores are to be
moved on a regular basis and it is not possible to change routes or the pattern of
movements significantly, as per para 06058 above, then PSyAs are to be consulted in
the preparation of security plans. This includes any movement of such materiel to
Northern Ireland. Plans should consider the following:
RESTRICTED
RESTRICTED
Defence Manual of Security
another vehicle. Both vehicles dispatched at different times and via different
routes).
06207. Movement of ACTO stores during BIKINI Alert States AMBER and RED.
At BIKINI Alert States AMBER and RED no movement of ACTO stores (see
paragraph 06004b) is to take place without first consulting Command Security Staff for
advice on appropriate additional security measures. This may include delaying non-
essential moves until the Alert State has decreased.
(2) This also includes charter aircraft and ships and rail. When
these are to be used, both security and movements staff are to be
consulted for detailed instructions as to how arms and ammunition are to
be loaded/carried.
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
RESTRICTED
RESTRICTED
Defence Manual of Security
06209. In private transport. When PSyAs authorize the carriage of arms and/or
ammunition in privately owned transport the following rules are additionally to be
applied:
b. If both arms and ammunition are carried in the same vehicle, there must
be at least one person accompanying the driver.
06210. The minimum standards detailed above for the carriage of arms and ammunition
by individuals is to be reviewed regularly by PSyAs, and whenever the BIKINI alert
state changes.
06211. Detailed instructions are to be drawn up for action by individuals carrying arms
and ammunition when involuntary delays (such as road traffic accidents) occur on
journeys.
06212. Arms and explosives search (AES) teams. Team explosive samples are to be
held in approved containers. Where the size and design of the vehicle allow it, the
container should be securely attached to the vehicle either by bolts or steel cable and a
security padlock. When operations require an overnight stay away from parent Service
premises, the vehicle must be parked in an overnight staging area as defined in
Paragraph 06082.
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
documents for ammunition and explosives are as appropriate; F Mov 773, F Mov 936
a-e and authorised 'Tremcard'.
06222. Need to know. The driver and escort are to ensure that they do not discuss the
nature of their journey or duties with anyone who is not authorized to know and they
should report as soon as possible any suspicious or untoward incident or questions
raised by a member of the public.
06226. Securing of loads. Materials carried by road vehicles should where possible
be boxed or secured in lockable containers and when possible loaded in such a way as
to inhibit their removal except by mechanical means. The use of MOD 'Powder
Wagons' or similar enclosed box commercial vehicles, secured by approved padlocks is
particularly advised. Where open flat-bed trailers are used, sheeting is recommended as
screening. Consignments should be stowed in the vehicle in such a way that their
contents are not obvious to the casual observer.
06227. Duplicate security keys. When regular consignments are carried by road
and there are no safety requirements to check the load periodically, the following
applies:
RESTRICTED
RESTRICTED
Defence Manual of Security
when access to the load is required for any safety reason and security keys must
therefore accompany the load, they are to be secured on a chain and carried by
the driver or escort. No additional copies of keys are to be made.
06228. Instructions and briefings. Detailed instructions and briefings are given to
both driver and escort for each movement. Annexes B and C respectively provide
details of points to be covered. Annex D is a specimen form of authority to be carried
by the security escort/driver.
d. A sign will be carried by the escort indicating that the occupant will not
open windows or doors and showing the hazard and other details of the load but
if necessary will follow a police car to the nearest police station. A contact
number will also be on the sign, for police to use in case of emergency.
06230. Communications. All vehicles and convoys involved in the bulk movement
of arms are to have two-way communications easily available to the driver/escort to
summon assistance in case of emergency. Following an accident to the vehicle note
should be taken of the radio hazard limitations.
06231. Breakdown and accidents. If a vehicle breaks down, the civil police, the
nearest Service unit and consignor are to be informed without delay. Should the vehicle
be involved in an accident and the load, packaging or seals appear to be damaged, an
authorized armament officer/contractor is to be called to inspect the load before
anything is moved or handled. Repairs are not to be carried out in any garage until the
vehicle has been unloaded under Service supervision. If it is necessary during the
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
course of conveyance to transfer the contents from one road vehicle to another, an
authorized armament officer/contractor will be required to attend.
06234. Routing of vehicles and arming of escorts. The routing of vehicles should,
where possible and subject to safety requirements, be via Motorways and 'A' class
roads. Stops for rest and food should be taken at MOD or Service establishments.
Where this is not possible and stops are made at public service areas, the vehicle must
be parked to allow continuous observation. Outside of MOD or service establishments
an escort must stay with the vehicle at all times and be locked in the cab of the vehicle.
The person absent from the vehicle must carry the vehicle keys. Normally escorts will
not be armed. If the threat is such that arming of escorts is considered necessary,
guidance is to be sought from PSyAs.
06238. Small consignments. All consignments under 250Kg gross should be sent by
escorted Service transport; for such small quantities, a sealed rail wagon should be used
only when Service transport cannot be provided.
RESTRICTED
RESTRICTED
Defence Manual of Security
06241. Notification of DTMA MCC. In addition, consignors are to advise the DTMA
MCC by telephone, priority signal, teleprinter or telex on the day prior to dispatch
giving the following details:
e. The rail wagon number for single wagon consignments and at least 2
rail wagon numbers for each marshalling category when the consignment is
more than 1 wagon.
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
RESTRICTED
RESTRICTED
Defence Manual of Security
06247. General. Specific regulations for the movement by sea of ammunition and
explosives are covered in JSP 445. Whenever possible arms, ammunition and
explosives should be carried in Service shipping or, when this is not possible, in British
Shipping operating under the British Flag. If difficulties are encountered in meeting
this requirement then the DTMA MCC and the Security staff are to be consulted.
06248. Responsibilities.
06250. Sealing. Holds are to be sealed using approved seals in the presence of an
authorized representative of the consignor, and opened at the destination in the presence
of an authorized representative of the consignee, who is to be responsible for the
supervision of the unloading and the dispatch of the consignment to the unit location.
In certain circumstances the master of the vessel may require access to the sealed hold
and when this occurs the authorized representative of the consignee is to ensure
afterwards that the consignment has not been tampered with. Lockup stowage is
always required for small arms.
06251. Personal weapons. Personal weapons taken on board vessels are normally to
be labelled, stored under collective secure arrangements in the ship's armoury during
the voyage and only re-issued just before disembarkation.
06252. Responsibilities. On commercial ships, the responsibility for the security and
storage of arms lies with the Master of the vessel in consultation with the Commanding
Officer of the embarked unit. For short voyages, individuals may retain weapons in
their possession throughout the voyage. For longer voyages weapons should be stored
in the most secure locker or compartment made available under arrangements of the
ship's master, the Service embarkation authority and the Commanding Officer of the
embarked unit. In such circumstances guarding arrangements must be considered.
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
06253. General. Specific regulations for the movement by air of ammunition and
explosives are covered in JSP 335. Ideally materiels should be carried in RAF Aircraft
(and accord with Security regulations set out by the RAF) or British chartered aircraft
on contract to the MOD. Where this is not possible UK civil air lines or those of the
consignee's country may be used. (Civil aircraft must be registered in either the
consignor's or the consignee's country). The Captain should also normally be a British
national or a national of the recipient country. Flights must be direct wherever possible
and must not be over communist or other countries which present a threat.
d. The aircraft must be met as it lands at its destination, and the materials
delivered to the consignee (or his agent). Where this is not possible the material
must be stored under acceptable and agreed security protection.
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
ANNEX A TO
SECTION II TO
CHAPTER 6
- SECURITY ASPECTS TO BE CONSIDERED IN
MAKING A MOVEMENT PLAN OR PROVIDING
INSTRUCTIONS OR BRIEFINGS
1. Date and time of move. (Not at night unless operationally vital)
6. Provision of escorts.
9. Reporting of movement and arrival (must report back within specified times and
on arrival at destination).
15. Need to request assistance from MDP or Civil Police for any particularly
vulnerable part of the journey.
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
ANNEX B TO
SECTION II TO
CHAPTER 6
a. Route.
d. Accident routine.
e. Hand-over arrangements.
a. Identification of persons who may have access or who will take delivery.
3. You (or senior escort if a convoy is used) will be responsible for the security of
the consignment until it has been handed over to the consigned, or his authorities
representative, and a receipt obtained. In the event of unforeseen circumstances arising
during the journey, you must institute whatever measures you may consider necessary
to protect the consignment. To assist in such circumstances you will be provided with a
form of written authority which should be shown to the Civil Police or Service
Authorities in support of any request for assistance or additional security protection.
RESTRICTED
RESTRICTED
Defence Manual of Security
a. Take care to avoid incidents which might jeopardise the safety of the
consignment.
(2) Damage,
b. You must not permit any unauthorized person to have access to the
consignment or vehicle particularly when stationary or at an authorized stopping
point etc. Accompanying movement documents must not leave your possession
and may not be shown to unauthorized persons. Should the Civil Police wish to
inspect the vehicle then they must be told to contact your establishment to
obtain safety advice before doing so.
d. In the event of unforeseen delay the consignor and the consignee must
be informed at once. If necessary you should seek help from the authorities
mentioned at c. above.
e. You must ensure that the consignment is delivered to only the consignee
or his duly authorized representative. If unforeseen circumstances make it
necessary to transfer the consignment, or part of it, to other than the authorized
recipient you must first obtain authority to do so from the consignor.
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
6. If you are in any doubt about your duties or responsibilities as a security escort
you must obtain guidance before commencing the journey.
(Signature) ...............………………………………............
(Appointment) ..................………………………………...
(Must be a responsible person as defined in para 06004.j above).
(Establishment) …………………………………………………………….....................
(Date) ...........………….
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
ANNEX C TO
SECTION II TO
CHAPTER 6
RESTRICTED – When completed
(may be protectively marked higher if appropriate)
to ________________________________________
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
(may be protectively marked higher if appropriate)
Despatching unit:
Unit address:
and/or notify:
*Insert as appropriate
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
SECTION III TO
CHAPTER 6
MINIMUM STANDARDS FOR THE STORAGE OF
ARMS, AMMUNITION AND EXPLOSIVES
Introduction
06301. General principle. All arms, ammunition and explosives are to be
stored and protected in buildings and areas that meet the MOD security and
safety standards. The Defence Estates (DE) minimum standards for armoury
buildings are detailed at Annex A, and those for storage of ammunition and
explosives are at Annex B. Details of security locks are at Annex C to this
Section.
recommended. HOE are to ensure that any drawings or plans relating to their
establishments storage facilities are retained and are available for inspection
throughout the life of the building.
Storage of Weapons
06305. Man-portable weapons. When not in use all man-portable weapons,
including mortars, are to be stored as follows:
(1) Barrels.
(4) Springs.
(5) Magazines.
06306. Small Arms Trainers (SAT) weapons. SAT are to be held under
secure conditions. These secure arrangements (which will vary according to
location, number and type of stores, threat, etc) must meet security requirements
laid down by PSyAs.
b. When not in direct custody when being put to training use, all
items are to be suitably secured in a locked display cabinet, room,
building or compound appropriate to the highest Protective Marking
applied to any of the items concerned.
Note: Live materiel must never be used as training aids or for display
purposes.
Weapons on Display
06310. Where weapons, including trophy weapons and bayonets etc, are used
for display purposes, the following applies:
06311. Before any room, building or area is brought into use to display items,
for example in museums, at open days or on permanent display in instructional
or crew rooms, permission and advice are first to be sought from the PSyA.
Comprehensive orders are to be produced by the owner/custodian of the items
and approved by the PSyA.
necessary for the ESyO or the Safety/Explosives Officer to ensure that suitable
physical measures exist or arrange the removal of these items to suitably secure
and licensed accommodation.
a. Unsupervised
or
a. Authority must be obtained from the HOE where the arms and
ammunition are to be stored.
b. The civil police for the area in which the arms and ammunition
are to be stored must be consulted under the terms of the Firearms Act
1968; their approval for the storage, and any security conditions that
they may impose, must be obtained in writing; and such conditions must
be complied with.
06324. Issue. MDP weapons and ammunition are only to be issued on the
authority of the Chief Constable, MDP or the HOE.
ANNEX A TO
SECTION III TO
CHAPTER 6
PHYSICAL SECURITY STANDARDS FOR ARMOURY
BUILDINGS
Doors
2. If possible, only one access door is to be used, which is to be kept locked when
not in use. Detailed specifications for doors and door fastenings are:
b. When fitted, the steel plate should be wrapped around the edges of the
door and frame and secured on the edges and inside face by woodscrews,
countersunk and spaced not more than 100mm apart. The metal faces are to be
carried bolted at the centre and the corners, with the bolt heads fitted on the
outside faces.
c. The frames on which the doors are hung should be of the same standard
as the doors and should be securely fixed to the buildings by ragbolts at 600mm
between centres, set to a depth of at least 50mm. If the building fabric is not
suitable for ragbolts, the advice of Command security staff should be sought to
determine a satisfactory method of securing the frame. Any gap between frame
and masonry should be filled with material which cannot easily be removed.
e. A door security chain should be fitted and hinge bolts fixed to the frame
and hanging edge of the door.
3. If it is essential to fit double or sliding doors, padbolts must be fitted at the top
and bottom of each section. Sliding doors should be fitted so as to slide internally.
Sliding channels should be protected by fitting a raised concrete sill at floor level and a
heavy metal retaining rail at the top, firmly fixed to the fabric of the building.
4. Ideally, where double and sliding doors are fitted, provision should be made for
a small access door for personnel. The physical construction of this access door should
be as specified in para 2: it is to be fitted with the locks and devices described below.
Locks
5. Two approved locks are to be fitted to armoury building doors (see Annex C).
The types of locks to be used are:
a. Two rimlocks.
In general, new builds are to have locks included with the doorset, e.g. Benweld door
with ASSA hookbolt deadlocks.
7. Where the fabric of the building will not permit steel bars to be secured into
position, they should be welded to a frame of similar metal which should be welded or
burred to prevent their removal. The framework is to be securely bolted through the
building fabric.
8. If ventilators are necessary, they should be of the staggered airbrick variety and
must be as strong as the rest of the building. If not, they are to be reinforced with heavy
gauge mesh. If the interior of the building can be viewed through the ventilator, with or
without the interior lights being switched on, the ventilator is to be covered with metal
sheeting, standing proud from the ventilator to permit air circulation. The metal
sheeting should be of sufficient strength to prevent easy bending or distortion and
should be so fixed to the fabric as to prevent unauthorized removal from the outside.
Consideration should be given to fitting offset ventilators.
Hatchways
10. Where a hatch is necessary, e.g. to facilitate the issue of arms it should be
protected by whichever of the methods described above is most suitable. The
hatchway is to be included in the IDS and should incorporate identification slots and
sentry door viewers.
Intruder Detection Systems
11. A Class 4 IDS (see the Catalogue of Security Equipment for details) is to be
installed in all armouries containing weapons classified as ACTO as listed in Chapter 6
para 06104b and those weapons considered by Service Security Authorities to require
such protection. The purpose of the IDS is to ensure that the response force can
respond in accordance with para 06130 or 06131.
14. The advice of the PSyA is to be sought on the type of IDS and alarm system to
be installed.
15. System activating keys are to be treated as security keys and safeguarded in
accordance with the instructions in Chapter 5.
Inspection Grilles
16. A sentry door viewer should be fitted to external doors and issue hatchways to
permit the positive identification of persons seeking entry. An inspection grille,
suitably protected and large enough for identification documents to be passed through
for scrutiny, should also be let into the doors of buildings where control of entry is in
force, and into issue hatchways.
Internal Doors
17. Internal doors of armoury buildings, which directly lead to weapons, should be
constructed to the same standard as external doors, as per para 2.
Security of Weapons
18. Weapons are to be stored so that they cannot be removed quickly or easily by a
person who has gained unauthorized access to the armoury building. This can be
achieved in a number of ways depending on the type of weapon to be protected. 'In use'
weapons can be stored on a rack or in a steel cupboard and secured with a high tensile
steel rod or bar or a suitable steel wire rope, spliced and bound with copper wire and
then soldered or mechanically joined by the Talurit method, passed through the rack or
cupboard and the trigger guards of the weapons. The rod, bar or wire is then fixed by 2
hasps and secured by a security padlock. The fixing bolts of the hasps should be
properly secured, preferably by being secured into the building structure. Racks and
storage cupboards should be securely bolted to the floor and fabric of the room.
Security Lighting
20. The provision of external lighting for armoury buildings must take account of
the need to create a high degree of illumination and eliminate shadows. A lighting
factor of 3.0 lumens per 900 square centimetres should be achieved to illuminate the
building and its immediate surroundings. Lighting fixed to armoury buildings should
be in sealed glass bulkheads, located above the entrance doors and at all corners at a
height of between 2.44m and 3.05m. The operating switches for this lighting should be
located either within the building or in a secure position.
Security Keys
21. External keys to armoury buildings and keys to internal weapons stores are to be
protected in accordance with Chapter 5, i.e. as security keys. Keys to internal weapons
stores are not to be secured within the armoury building and are to be kept separate
from the external door keys. The security of keys is to be so arranged so that one
person cannot gain access to both arms and ammunition.
ANNEX B TO
SECTION III TO
CHAPTER 6
MINIMUM PHYSICAL SECURITY STANDARDS
FOR BUILDINGS CONTAINING ACTO
EXPLOSIVE STORES
1. Buildings containing ammunition and explosives are to be constructed
according to the standards set by the Explosives Storage and Transport
Committee (ESTC), which are incorporated into the mandatory Service
explosive regulations. A representative of the CIE will assist in the selection of
the building type to be considered and provide guidance to the designer on the
service regulations to be applied. These standards and regulations shall be read
in conjunction with DE (Specialist Construction Group) (DE(SCG)) Works
Services Functional Standards. DE(SCG), as the Works Technical Authority
for physical security and explosive buildings, should be consulted for design
approval prior to construction.
Doors
8. Doors used on explosive buildings are specified by the ESTC and may
override the security requirements because explosive safety considerations
specify a particular type and construction. The construction of the doors to meet
the minimum security requirements is detailed below and is to be applied if the
ESTC guidelines are not specific:
b. All doors are to be kept locked when the building is not in use.
100mm apart. The metal faces are to be carriage bolted at the centre and
corners, with the bolt heads fitted from the outside face.
e. The frames upon which the doors are hung should be of the
same standard as the doors. The frame should be secured to the building
by a suitable secure bolt system at 600mm centres, with a minimum
embedded length of 100mm. Any gap between the frame and masonry
should be filled with a fireproof and tenacious mastic.
10. Ideally a personnel access door should be fitted when sliding or double
door sets are specified. The physical characteristics of this type of door are to
be the same as specified in this Annex.
Locks
11. Locks from the approved types listed at Annex C are to be fitted to
explosives building doors. The number and types of locks to be fitted to
buildings storing explosives are to be selected from the following:
a. Two rimlocks.
b. High tensile steel bars are to be fitted. They are to be not less
than 20mm in diameter, spaced apart not more than 125mm between
centres, and set into the fabric of the building. The bars should be held
in place by 40 x 10mm flat steel spacers or plate spaced at not more than
460mm. The spacers should have 'T' ends that are secured to the fabric
with cement grout to a depth of 150mm on either side of the window.
13. Where the fabric will not permit steel bars to be secured into position,
they should be fixed internally by welding to the frame.
Hatchways
16. Where a hatch is necessary, i.e. to facilitate the issue of stores, it should
be protected by whichever of the methods described in this Annex is most
appropriate. The hatchway is to be included in the IDS.
18. An exception to para 17 may be granted by the PSyA for short term
storage, following consultation with the CIE and where an appropriate guard,
patrol or alternative security device or measure is provided so as to respond to
any unauthorised entry in time to prevent the loss of or damage to the
ammunition and/or explosives being protected.
21. The advice of CIE, DE(Works) and the PSyA is to be sought on the type
of IDS and alarm to be installed. Any IDS or alarm must electrically meet the
requirements of the electrical category of the explosives building.
Internal Doors
24. Internal doors protecting the explosives being stored are to be of the
same or equivalent standard as the external door type specified in para 8d.
Alternative equivalent doors may be found in JSP 411. For example the secure
gas-tight door at Figure 22 would be suitable.
Internal Storage
25. Where explosive safety regulations permit explosives to be stored in
manned areas the explosives are to be stored in authorised storage devices.
Keys to internal explosive stores are not to be secured within the building
containing the internal store, but are to be kept separate from the external keys
in a secure place and safeguarded in accordance with the instructions in Chapter
5.
Security Lighting
26. The provision of external lighting for explosives buildings must take
account of the need to create a high degree of illumination and eliminate
shadows. This requirement must be balanced against the overriding safety
requirement when the building is on an airfield.
Fences
28. Consideration should be given to providing a security fence if the local
situation dictates the need. The PSyA is to be consulted on the need for, and (if
required) standard of the fence. When a security fence is required the fence
should be positioned at least 20m from any explosives storage building. The
keys for the access gates are to be treated as security keys and handled in
accordance with the instructions in Chapter 5.
ANNEX C TO
SECTION III
TO CHAPTER 6
b. Ingersoll SC71.
c. Ingersoll SC73.
d. Ingersoll D20.
Mortise Locks
2. The locks listed below are the only mortise locks suitable for armoury
use:
c. Chubb 3K70(upright).
e. Chubb 3G110.
Note: Hookbolts must always be used for double and sliding doors.
Hinge Bolts
3. Security hinge bolts - e.g. Chubb pattern WS7.
SECTION IV
Introduction
06401. The general principles given in this section are to be applied to the storage of
cadet forces' arms and ammunition. The movement of cadet forces arms and
ammunition (e.g. from cadet forces to ranges and shooting camps) is to be in
accordance with Section II of this chapter. Whenever possible, arms and ammunition
are to be stored in Service establishments; the regulations for storage on regular
establishments are contained in Section III. However, alternative storage facilities may
need to be authorized and the Matrix for the storage of arms and ammunition within
cadet force premises described at para 06190, has been so designed to identify the
criteria required for storage in these circumstances.
RESTRICTED
RESTRICTED
Defence Manual of Security
standards of sub paras d or e above, where the facilities meet the index for short term
storage detailed in Annex A.
Matrix for the storage of arms & ammunition within cadet forces
premises.
06406. Methodology. The matrix at Annex A is to be used for the storage of arms and
ammunition within cadet force premises. It is similar in methodology to the Minimum
Baseline Measures Matrix used in Chapter 5 for physical security. A set of baseline
scores has to be met in order for arms and ammunition to be stored on cadet force
premises. The standards required are divided into 4 categories as follows:
a. Permanent Storage.
b. Temporary Storage.
c. Emergency Storage.
d. Storage of DP Weapons.
06408. Storage indices. The indices used to calculate the score for use with the Matrix
is at Annex B.
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
before being certified to hold arms and ammunition. Certification, is only to be given
following the implementation of essential recommendations.
06411. Issue of certificate. Arms and ammunition are not to be stored on premises
until the security unit has given approval and the appropriate cadet force HQ has issued
a certificate of authority to hold arms and ammunition.
06413. Security unit reports. Security unit reports, following inspections, or security
investigations, are to be forwarded to the appropriate Cadet Force HQ and PSyA, with
recommendations for the improvement of security facilities. The HQ is to define those
recommendations essential for the security of unit arms and direct the unit to implement
the modifications. The HQ is to decide, with the advice provided by the security unit
whether to withdraw temporarily the authority to hold arms pending the implementation
of the recommendations. When unit authority is withdrawn, the arms and ammunition
are to be removed immediately and stored in an authorized armoury.
a. When any doubt exists whether the cadet force unit's security standards
are adequate to safeguard its arms and ammunition eg following a break-in.
Registers
06416. Cadet forces are to maintain 3 registers:
a. Small Arms Register. This register is to bear the serial number of the
weapons on charge and the dates of voucher and receipt numbers.
RESTRICTED
RESTRICTED
Defence Manual of Security
(1) All weapons held within the cadet force premises are to be listed
individually by type.
Keys
06417. Protection of keys. Keys are to be protected as follows:
b. Approved arms chest keys. When not being used to receive or issue
arms, arms chests are to be locked. The keys held on a dedicated separate key
ring by the unit commander or his deputy.
d. Other security keys. Other unit security keys are to be kept in the
possession of the unit commander or an adult member of staff on a separate key
ring to those listed in sub-paras a to c above.
06418. Orders. Orders regarding the custody and issue of keys are to be
promulgated by the unit commander. They are to be regularly reviewed.
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
Alarm system
06420. Units are encouraged to install a suitable alarm system. Appropriate HQs are to
consider fitting an alarm system at those units where the civil police advise that it is
essential. Alternatively HQs are to order the removal of the arms and ammunition to a
secure authorized armoury.
Private weapons
06421. The cadet forces do not accept financial responsibility for any private weapons
placed in safe custody with Service issued weapons. The term 'private weapons'
includes weapons owned by private individuals and those purchased by the unit
concerned. The regulations concerning the handling, storage, safe custody and disposal
of these weapons are contained in the Firearms Act 1968. This Act also requires that,
when private weapons are held on unit premises, a firearms certificate is required.
06422. In order to qualify for a free issue of a firearms certificate, units require the
approval of the Secretary of State. Applications for such approval should be made to
the Home Office through local police stations or the National Rifle Association or
National Small-bore Rifle Association. Applications should give the correct title of the
unit, the type and calibre of weapons concerned, the range or ranges used, and the home
address of a responsible adult to whom the firearms certificate can be issued.
06423. Only those private weapons needed to meet or supplement cadet force training
requirements are to be stored in a unit's armoury/arms chest. No stored weapon is to be
greater than .22 calibre. Handguns of all types are prohibited.
06429. Spare.
RESTRICTED
RESTRICTED
Defence Manual of Security
(2) When fitted, the steel plate is to be wrapped around the edges of
the door and frame and secured on the edges and inside face by
woodscrews, countersunk and spaced not more than 100 mm apart. The
metal faces are to be carriage bolted at the centre and the corners, with
the bolt heads fitted on the outside faces.
(3) The frames on which the doors are hung are to be of the same
standard as the doors and should be securely fixed to the building by
ragbolts at 600 mm between centres, set to a depth of at least 50 mm. If
the building fabric is not suitable for ragbolts, the advice of PSyAs
should be sought to determine a satisfactory method of securing the
frame. Any gap between frame and masonry should be filled with
material which cannot easily be removed.
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
(1) Glass bricks. Glass bricks in pre-cast panels, i.e. bricks pre-set
into a concrete honeycomb rather than built in singly as in a brick wall.
(2) Steel roller shutters. Where steel roller shutters are used, it is
important to ensure that the guide frames are firmly secured to the side
walls and the locking mechanism is as strong as the shutter.
(5) High tensile steel bars. Steel bars not less than 19 mm in
diameter and at not more than 127 mm centres, held in place by flat steel
spacers at not more than 457 mm intervals. The spacers are not to be
less than 38mm x 10mm and be secured into the masonry or brickwork.
c. Doors. Ideally approved, purpose built, security doors and furniture are
to be used. However, wooden doors of solid laminated hardwood core or solid
multi-ply construction not less than 54 mm thick may be used and can be
improved as follows:
RESTRICTED
RESTRICTED
Defence Manual of Security
06433. The advice of the appropriate PSyA and the appropriate security unit is to be
sought before implementing enhanced security measures.
Security of weapons
06434. Only .22 (rimfire) calibre weapons, DP and sectioned weapons not falling into
the category laid down in para 06004b, are to be stored in cadet force premises. The
security requirements are:
b. The approved arms chests are to be secured by ragbolts through the base
into the solid building foundations with the opening edge next to a wall to
prevent leverage. A concrete infill or plinth is required for buildings on stilts
which permit access to the underside of the building.
(2) Two approved model security hinge bolts fitted on the hinged
edge of the door/lid.
(3) The door outer edge modified at source with integral lip; or
angle iron fitted top to bottom, tack welded - weld spots at intervals
down full length of outer edge; or angle iron fitted from top to bottom
with a continuous or running full length weld; or angle iron fitted from
top to bottom, tack welded - with the 2 areas covering the lock tongues
continuous welded over a length of 60 to 75 mm.
(4) Steel chains or cables with padlocks fitted. The cables are to be
located in, and welded to, the side walls of the arms chest.
RESTRICTED
RESTRICTED
Security of Arms, Ammunition and Explosives
Security of ammunition
06435. Under no circumstances is ammunition greater than .22 calibre to be held on
cadet force premises. Storage of .22 ammunition is to be in one of the following:
06436. Ammunition stocks. Stocks of .22 ammunition are to be kept to the minimum
compatible with training requirements. A maximum of 2000 rounds may be held at the
unit in approved ammunition boxes or ex-MOD safes and up to 5000 rounds in an
approved mini armoury. Where a unit wishes to hold more than 10000 rounds for
geographic distribution purposes, their security facility is to be inspected for suitability
by the appropriate security unit. A storage limit compatible with the secure facility will
be approved. All issues and receipts are to be entered in an ammunition issue/receipt
log.
RESTRICTED
RESTRICTED
Defence Manual of Security
Mini-armouries
06438. Mini-armouries have the following significant features:
d. There are to be 2 separate compartments, one for arms and one for
ammunition, divided by a 6 mm steel plate built into brickwork at front and
sides and welded to front angle iron.
Note:
(1). Facilities built before Jul 92 having walls constructed of 275 mm cavity
brickwork with stepped ventilators are acceptable.
RESTRICTED
RESTRICTED
The Defence Manual of Security
ANNEX A TO
SECTION IV TO
CHAPTER 6
The following matrix should be used to calculate the minimum security index
required to permit the storage of Service- owned weapons and ammunition on cadet
forces premises. Once the required index is known, use the tables at Annex B to
calculate the index value of security features present. Using Annex B the index for a
given Unit can be calculated and compared with the minimum requirement. If there is a
shortfall then Annex B can be used to determine the security enhancements that could
be made to bring the premises up to standard.
Notes:
(1) The risk is determined by the appropriate single-Service security unit and is
based upon a civil police assessment of the burglaries in the area, the amount of any
other arms, ammunition and explosive items within the unit and any other factors
relevant to individual locations. Where a security unit has not carried out on
assessment, the risk level is to be based on the insurance risk assessment used by
national firms.
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
The Defence Manual of Security
ANNEX B TO
SECTION IV TO
CHAPTER 6
a. For each of the 3 sections below examine the measures or facilities that
are in place and note the score for each.
c. Add the section scores together for the total index. (The total index must
include a score from each section).
Section One
1. Armouries.
Either:
2. Arms Chests.
a. Benweld.(4) 25
b. Benweld.(5) 15
c. TAC.(4) 10
d. Kennedy.(4) 10
Or
RESTRICTED
RESTRICTED
Defence Manual of Security
3. Ammunition Containers
Notes:
(3) Mini armouries are not considered stand-alone items. Therefore other sections
in this matrix apply also to establishments which hold mini armouries.
(5) Not installed in accordance with JSP 440, Chapter 6, para 06213(b).
RESTRICTED
RESTRICTED
The Defence Manual of Security
Section Two
Storeroom (housing the Arms Chest/Ammunition Container)
1. Secure storeroom(6). 25
(go to Section 3)
Sub total:
3. Floor & Ceiling. A single score for the weakest part of the floor or ceiling
of the room housing the Arms Chest/Ammunition Container.
a. Concrete. 2
b. Wood/Ply. 1
c. Plasterboard. 0
d. Ceiling tiles. -1
e. XPM or Weldmesh lined. add 2 for each
layer of (separated)
XPM(7)
Sub total:
Sub total:
RESTRICTED
RESTRICTED
Defence Manual of Security
a. Protection.
b. Frame
6. Door. A single score for the weakest of any internal door affording
access to the storeroom housing the Arms Chest/Ammunition Box.
RESTRICTED
RESTRICTED
The Defence Manual of Security
Notes:
(12) Such doors only score if the frame is in accordance with JSP 440, Chapter 6,
para 06210(d)(3).
(14) Of approved security pattern fitted at one-third and two-thirds down the locking
edge of the door.
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
The Defence Manual of Security
Section Three
SITE
Sub total:
Sub total:
Sub total:
RESTRICTED
RESTRICTED
Defence Manual of Security
Notes:
2. Total Index. To calculate the total index add together the Section
Scores. The final index is to include a positive score from Sections 1 and 2.
Total Index =
RESTRICTED
RESTRICTED
Counter Terrorist Measures
CHAPTER 7
COUNTER TERRORIST MEASURES
Para Page
Introduction 07101
General 07301
Batons 07324
General 07401
Plans 07402
Orders 07403
Briefing 07405
General 07501
Anonymity 07508
Section VI Leave and Temporary Duty Visits to Northern Ireland (NI) and the
Republic of Ireland (ROI)
General 07601
Leave in NI 07602
CHAPTER 7
SECTION I
COUNTER TERRORIST MEASURES
Introduction
07101. Threats to the security of MOD interests include espionage, terrorism, sabotage,
subversion and organized crime. These threats change profile over time, reflecting the
domestic and international scenes. The protective security system must therefore be
capable of countering all elements of the threat.
07102. The term terrorism is applied to the activities of those organizations resorting to the
use of violence and intimidation in the furtherance of political aims. Terrorist organizations
have available the wide range of attack options detailed in Annex A. The threat to Service
personnel and MOD civilian staff is under constant review. There may be a specific and
higher threat to certain personnel because of past service or particular appointments.
07103. The MOD has a duty of care to ensure that proper arrangements exist for the
protection of its personnel, weapons, equipment and property, wherever located. The
purpose of this Chapter is to give general guidance for protection against terrorism. PSyAs
and Command security staffs are responsible for providing detailed guidance on security
procedures commensurate with the prevailing threat and the mandatory minimum standards
of protection detailed in this chapter.
Terrorist Methodology
Terrorist Objectives
07104. Although their political aims may vary, terrorists have three common principal
objectives:
Non-Violent Extremists
07105. Non-violent extremist action directed at Defence interests often requires the
commitment of resources to counter it. The measures outlined in this Chapter provide a
sound basis for protection against such action. Anti-establishment demonstrations at
non-nuclear MOD sites are generally of a minor nature and can be dealt with by local
07107. Using the intelligence received, the MOD CEAG provides a monthly terrorist threat
assessment. This assessment is also used as the basis for setting the various BIKINI Alert
States in GB. The assessment is based on a six-tier system of threat levels applicable to
establishments, individuals and events. The definitions and terms for use in threat
assessments have been agreed by ACPO for use by the civil police and national
agencies. They aim to standardize terms used by all those concerned in assessing the
terrorist threat and implementing counter-measures.
Northern Ireland
07108. Due to the volatile nature of the terrorist threat in NI, all assessment in this area of
the UK is undertaken by personnel within the Province.
Overseas Theatres
07109. In overseas areas threat assessments are undertaken by in-theatre security
committees and groups. These committees and groups are similar to the MOD CEAG and
provide regional assessments of the current terrorist threat.
07112. The FPS has been established in GB to meet the requirement for rapid
dissemination of:
ANNEX A TO
SECTION I TO
CHAPTER 7
TERRORIST MODUS OPERANDI
1. When extremists use violence to further their political aims they are classified as
terrorists. The tactics used by terrorist organizations vary with their objectives. The threat
of violence to MOD personnel and property includes:
a. Rocket and bomb attacks, including petrol, nail, and acid bombs, intended
to inflict casualties, cause major economic damage, disruption, discredit to security
authorities or to gain publicity.
k. Attacks on aircraft on the ground and in the air to cause casualties and
damage and to publicize terrorist offensive power.
Terrorist Weapons
3. Occasionally terrorists use large weapons such as improvised heavy mortars
mounted and concealed inside vehicles, but they generally use weapons small enough to be
concealed easily until the moment of use, or weapons that are capable of rapid assembly
and breakdown. The armoury of well-organized terrorists normally includes collapsible
weapons, light mortars, small rocket launchers, man portable air defence weapons and all
types of small arms. They can be a mixture of professional manufacture or home made.
Care is usually taken to husband weapons, particularly those that are regarded as
prestigious, such as man portable air defence weapons and heavy calibre machine guns.
Use of Explosives
3. Terrorists use all types of manufactured and home-made explosives, sometimes in
great quantities. They become skilled in concealing the movement of explosives by using
specially adapted vehicles, suitcases, prams, carrier bags, and personal electronic
equipment. They utilize a variety of equipment and techniques in the construction of
improvised devices, examples of which are as shown below:
a. Switches:
(7) Heat switches activated by, for example, a vehicle exhaust system.
(8) Light sensitive switches activated by, for example, exposure to light
by removing a dustbin lid or discharging a photographic flash unit.
ANNEX B TO
SECTION 1 TO
CHAPTER 7
THE FOCAL POINT SYSTEM AND SUSPECTED
TERRORIST ACTIVITY REPORTING PROCEDURE
3. The Army Divisional HQ is the Focal Point for that area and is responsible for co-
ordinating and issuing a Focal Point Plan to cover all Service and MOD establishments
located within the division's geographical boundary. Within a division's area, Service and
MOD establishments are organized geographically into groups, and each group is co-
ordinated by a specified Nodal Point. In areas where there are large concentrations of
establishments it may be necessary to establish a third tier of co-ordination by using
Sub-Nodal Points. Normally, Service HQ or major RN shore establishments, RM and
Army units or RAF stations are nominated as Nodal and Sub-Nodal Points.
4. Divisional Focal Point Plans ensure that a simple unclassified message can be
relayed within one hour (in most cases by telephone) from any location within a division's
area to a point of contact for every other establishment throughout a division's geographical
area.
1
LONDIST is the only District within LAND. For the remainder of this Annex when Divisions are
mentioned LONDIST is included.
Reporting Incidents
5. In the event of a terrorist incident or suspected incident, which necessitates urgent
notification to local establishments, e.g. within the node, or when a local assessment is
made which causes an establishment to raise the BIKINI or TESSERAL Alert State or to
increase the counter measures in force, reports are to be made as follows:
a. To the civil police. The civil police have prime responsibility within GB
for dealing with terrorist incidents, including hoaxes, on MOD property and it is
essential that the local civil police are informed immediately.
(2) The Sub-Nodal Point, where there is one, is to inform its associated
Nodal Point and all other establishments to whom it has a responsibility to
pass information under the FPS.
(3) The Nodal Point is to inform its associated Focal Point and all other
Sub-Nodal Points and establishments to which it is required to pass
information under the FPS.
a. All HQ, establishments, units and stations are to nominate day and night
contact telephone numbers that are permanently manned. Where this is considered
Coordination
7. Chain of command. The FPS complements established single-Service and MOD
chains of command, which should normally be used for the passage of single-Service
reports to and from MOD.
10. Practices. HQ LAND will co-ordinate the practices of the FPS to involve all units
and establishments not less than twice annually in consultation with the appropriate PSyAs
where MOD HQ, DPA and DSTL establishments are involved and CINCFLEET,
2SL/CINCNAVHOME HQ STC, PJHQ and DLO for their respective establishments, units
and stations. They will also inform D Def Sy. These exercises are known as Exercise
Rapid Call.
11. Amendments. Any changes to the FPS that appear to be necessary as a result of its
use are to be reported through PSyA channels to HQ LAND who will inform D Def Sy.
12. Application in TTW and War. In TTW and war, the FPS will be expanded to
include the exchange of intelligence on all matters relevant to the defence and continued
function of all establishments involved in the system. It will be activated by MOD. Army
Division and Regional Brigade HQ will continue to act as Focal Points, but TAOR HQ,
when activated, will take over the responsibilities of Nodal Points for all establishments
within the TAOR. Details of the Wartime Focal Point System are in Part 1 of the United
Kingdom Commanders-in-Chief Committee MHD Plan.
Definitions
14. To ensure common understanding of some definitions and application of these
instructions, a number of terms need to be defined. These are:
(4) Service dependant's visitor who has been acting strangely or asking
suspicious questions.
(1) Unit Level. This will include MOD, Service, DPA, DLO and
DSTL establishments.
c. Focus. This is the focus of the collation activity that supports a particular
Service or TLB. They are as follows:
(6) CCRIO RMP. Whilst not a Service security focus, CCRIO RMP
is heavily involved in the investigation of suspect or stolen vehicles.
d. Resolved. This term implies that investigations show that the reported
activities are not terrorist-related or have been pursued to a reported conclusion.
Reporting Procedures
15. Individuals. All personnel, both Service and civilian, and their dependants are to
be instructed to report any activity that arouses their suspicions, however trivial it may
seem, without delay. Reports are to be made as follows:
b. All other suspect activities are to be reported immediately to the civil police
using 999, followed by a report to a Service reporting point, e.g. an individual's
unit, nearest Service unit or the MDP.
a. Ensure that the civil police are immediately made aware of the reported
suspect activity, particularly that to which an operational response by them appears
necessary.
18. TLB Level. If a wider dissemination is deemed necessary, the reports (or gist of
them) with comment from security staff, if appropriate, are to be passed to all the other
TLBs and security focus. CCRIO RMP should be included if suspect or stolen vehicles
feature in the report. Reports of significant incidents are also to be passed to MOD D Def
Sy.
19. MOD Action. D Def Sy will monitor ongoing cases and where appropriate prepare
briefs for Central and Ministerial staffs. D Def Sy will disseminate relevant details to
national agencies. A monthly summary of reporting activity will be produced for
discussion at the MOD CEAG.
20. CCRIO RMP Action. In addition to its current task, CCRIO RMP will review the
reports it receives of suspect or stolen vehicles with a view to discovering similarities in
reports stemming from independent sources. This is opposed to follow-up reports on
vehicles about which it had already disseminated information. Any such similarities are to
be drawn to the attention of the security focuses from which the independent reports
originated. This will allow further investigation if considered necessary.
APPENDIX 1 TO
ANNEX B TO
SECTION I TO
CHAPTER 7
FOCAL POINT SYSTEM
1. The Focal Point System (FPS) is designed to facilitate the rapid dissemination of
information up, down and laterally along the chain of command. A schematic example is
given below:
MOD UK
PJHQ
HQ LAND
FOCAL FOCAL
POINT Army FOCAL POINT Army
Divisional POINT Army Divisional
HQ SUB- Divisional HQ
FOCAL HQ
POINT
(if used)
NODAL NODAL
POINT POINT
Naval/Estb Naval/Estb
Regional Regional
Bde/Gar RAF Bde/Gar RAF
Stn HQ Stn HQ
MOD HQ US
BUILDING INSTALLATION
SUB-NODAL SUB-NODAL
POINT POINT
Army Unit
UNITS/ESTBS UNITS/ESTBS
APPENDIX 2 TO
ANNEX B TO
SECTION I TO
CHAPTER 7
PARTICIPATION IN THE FOCAL POINT SYSTEM
1. The Royal Navy. DNSyICP is the point of contact concerning Focal Point
arrangements. Subordinate RN/RM HQ, shore establishments and units may be used as
Nodal Points.
2. The Army. The responsibility for co-ordinating arrangements for the Focal Point
System is delegated to HQ LAND. Army Divisional HQ are used as Focal Points and are
to co-ordinate the Focal Point arrangements within their geographical boundaries.
3. The Royal Air Force. RAF stations and units may be approached direct through
SSyOs on matters concerning Focal Point arrangements, keeping the relevant RAF
Command HQ informed. RAF stations may be used as Nodal Points.
5. Other Allied Forces. Liaison with allied forces (other than US Forces based on
RAF stations) is through the controlling formation HQ of the Service with whom the allied
forces are stationed. In the event of an allied base being the responsibility of a department
other than one of the Services then advice is to be sought from MOD as to the correct
method of liaison.
7. DLO. Where a DLO unit is a lodger unit, liaison is to take place through the host
establishment, otherwise liaison is to take place directly with the Director/Head or Security
Officer of the DLO establishment concerned.
9. NAAFI. Army Divisional and Regional Brigade HQ are to liaise direct with
NAAFI regional managers for the inclusion in the Focal Point System of NAAFI premises
outside Service establishments.
SECTION II TO
CHAPTER 7
PRINCIPLES OF COUNTER TERRORIST PROTECTION
AND THE MOD COUNTER TERRORIST STRATEGY
Principles of Protection
07201. The principles of protection against terrorist attack are:
07208. The main purpose of CEAG is to receive and consider assessed intelligence on
current or future terrorist and extremist activity from both indigenous and international
threats which are of concern to defence interests world-wide. CEAG usually meets on the
first Wednesday of each month and issues an extremist threat assessment signal. Should
any new intelligence become available or terrorist incidents occur between the regular
meetings, the CEAG would meet in special session. All members of the CEAG are on call
at all times. The CEAG also provides, when necessary, members for 'ad hoc' working
groups to consider and approve joint counter terrorist policy.
Passage of Warnings
07209. In Great Britain, at Ministry of Defence level, warning of possible terrorist activity
may be received from the Security Service, the Metropolitan Police Special Branch or other
sources at any time. These reports are handled as follows:
07210. Commands and HQNI are responsible for laying down their own procedures for
passing warnings to formations.
Liaison with the Security Service and the Metropolitan Police Special
Branch.
07211.
a. D Def Sy is responsible for liaison with the Security Service and the
Metropolitan Police Special Branch on behalf of the MOD.
Establishments
07213.
a. The local threat. HOE are responsible for assessing the vulnerability of
their own establishment and for keeping the threat to their personnel, weapons,
equipment and property under review. They are given the authority to declare a
higher Alert State and additional measures in response to a local emergency –
PSyAs and Command security staff are to be informed of such action.
c. Briefing and training. HOE must ensure that all Service personnel and
MOD civilian staff are briefed regularly on the threat, the security measures that
they need to know and, most importantly, the need for vigilance at all times.
Security routines, particularly those concerned with the safety of personnel, must be
practised.
of their resources, providing information or assuring a facility is safe to use. The MOD
SWG assists the Joint Service Search Policy and Resources Committee (JSSPRC) to
develop search techniques and procedures and identify requirements for manpower and
equipment. The SWG is currently in abeyance and will be resurrected if required. In the
meantime, the work of CTS is carried forward by the JSSPRC.
Funding
07217. Funding for all physical security measures is provided by the appropriate TLB
holder. The guidance in this document must therefore be applied by PSyAs and Command
security staffs, balanced against their other commitments. If in the event of a significant
change in the terrorist threat additional security enhancement funds become available on a
centrally funded basis they will be allocated on a priority basis.
Responsibilities of the Security Service and the Civil Police for Counter
Terrorist matters in GB
Civil Authorities
07218. The primary responsibility for the maintenance of the Queen's Peace, the prevention
and detection of crime, the protection of life and property and the prosecution of offenders
(in support of the prosecuting authorities) rests with the civil police; any such incident or
suspicious activity must, therefore, be reported to the civil police immediately. In practice,
because of the heavy burden on civil police resources, the Services are required to accept
responsibility for the protection of their own personnel and dependants within establishment
perimeters. Establishments must maintain liaison with the local police on such matters as:
The Home Office for England and Wales and the Home and Health
Department for Scotland
07220. The Home Office for England and Wales and the Home and Health Department for
Scotland are responsible for the promulgation of policy on terrorist matters relating to the
civil police.
Civil Police
07221. In the civil police each constabulary or force is commanded by a Chief Constable
who has autonomous responsibility for all civil police counter terrorist operations
conducted within his jurisdiction. The Association of Chief Police Officers (ACPO) and its
Scottish Counterpart ACPO(Scotland) provide a national forum for the discussion of Home
Office policy and represent the 51 police forces in GB. The ACPO committee on terrorism
and allied matters specifically discusses anti-terrorist matters. Within individual forces, the
Assistant Chief Constable Operations (ACC Ops) is usually responsible for operational
control of counter terrorist operations.
Investigation of Terrorism
07222. The investigation of terrorism is carried out by the appropriate civil police CID. In
the case of Irish republican terrorism, the Metropolitan Police Anti-Terrorist Branch (SO13)
has a co-ordinating role.
a. Force.
a. Divisional.
b. Sub-Divisional.
SECTION III TO
CHAPTER 7
TERRORIST ALERT STATES
General
07301. The MOD terrorist Alert States are the foundation of counter terrorist security
precautions for all MOD personnel, the Alert States also provide maximum commonality
with other Government Departments. Overseas commands have similar Alert States
although they may be known by different codewords. They all provide controlled,
measured and standardized responses to the various terrorist threats applicable to the MOD.
The systems are concerned with:
a. Warning of possible terrorist activity.
07302. Establishments are to be prepared to change from one Alert State to another at short
notice.
Alert States
07303. The following codewords are used to convey warnings of possible terrorist activity:
a. BIKINI. Used to warn of non-specific forms of terrorist activity.
the in-theatre Joint Security Group (JSG) takes into account the threat level issued
by CEAG, as well as regional and in theatre assessments of the current terrorist
threat, and decides the Alert State.
07311. The OTTAL is updated on receipt of new intelligence that affects changes in
threat levels. Amendments are issued by signal to Defence Attaches and TLBs.
Personnel deploying overseas are to ensure that they are aware of the threat in the
country to which they are travelling.
07315. The HOE at any installation may authorize the arming of Service personnel if there
is a substantive or immediate threat to the establishment. Ministerial approval is to be
sought retrospectively through the chain of command without delay. The arming of
personnel on nuclear weapons security duties is to be in accordance with JSP 440 Volume
4.
Civil Police Jurisdiction
07316. The primary responsibility for maintaining law and order and the internal security
of the UK rests at all times with the civil authority, normally represented by the civil police.
The Armed Forces, which are subject at all times to the direction and control of HM
Government must, when operating in the UK, comply with the law and act in support of the
civil authority. Civil police primacy is therefore to be respected and the Armed Forces will
only take responsibility when the civil police assess that they do not have the capability or
resources to deal with particular situations. Even then, responsibility will be transferred to
the military for the minimum period of time necessary to enable effective action to be taken
to preserve life. The Chief Constable must therefore give his formal agreement to any
proposal to deploy Service personnel or MDP outside Service establishments.
Weapon States
07317. Weapons are not to be issued without ammunition. There are 3 possible arming
states for general use:
b. Security. Standing authority is granted to CINCs for the issue and use of
batons to personnel deployed on security duties. CEAG is to be informed when
batons are issued for security purposes.
Training
07325. Batons should only be issued to appropriately trained personnel. The single
Services are responsible for determining the scale of the training requirement and for the
implementation of suitable training. Minimum training standards are mandated at
Appendix 1 to Annex D. Auditable records of training are to be kept.
ANNEX A TO
SECTION III TO
CHAPTER 7
MOD BIKINI ALERT STATES - DEFINITIONS
1. General. There are five BIKINI Alert States1 which, in ascending order of
severity, are listed and defined below.
1
The same Alert State definitions and associated colour codes apply to the BFG KEENWIND system used
in Germany, Belgium, France and the Netherlands.
APPENDIX 1 TO
ANNEX A TO
SECTION III TO
CHAPTER 7
MOD BIKINI WHITE ALERT STATE - COUNTER
MEASURES
W1. Incremental Action. WHITE Alert State is the first and lowest of the five
Counter-Terrorist Alert States. Together with the Counter-Terrorist Baseline measures,
it provides the foundation of countermeasures on which the other Alert States are based.
All of the following countermeasures, which constitute good security practice, are to be
implemented.
d. Maintain a clear and tidy area in and around all buildings so that unusual
packages or articles can be spotted easily. If possible, consider moving objects
(e.g. dustbins and crates) which could be used to hide an explosive device to at
least 25 metres away from occupied buildings, or keeping them in a secured or
supervised building.
e. Ensure that fire fighting equipment is well maintained and that drills are
practised.
f. At least annually, hold practice bomb alerts and rehearse action on the
discovery of a suspected IED, VBIED or mortar attack, and for dealing with
suspect delivered/postal devices.
W5. Travel Security. Departmental vehicles should be locked when left unattended.
APPENDIX 2 TO
ANNEX A TO
SECTION III TO
CHAPTER 7
MOD BIKINI BLACK ALERT STATE - COUNTER
MEASURES
B1. Incremental Action. Implement all security arrangements applicable to BIKINI
WHITE and in addition, the measures detailed below. BIKINI BLACK is the lowest Alert
State at which the MOD will consider the arming of MOD guards and sentries.
d. Ensure that security works service action initiated under BIKINI WHITE
have been completed. If not, consider the implementation of low cost physical
protective measures.
b. Limit the number of access points for vehicles and pedestrians. Consider
using other exits on a random basis.
g. At least once every six months, hold practice bomb alerts and rehearse
action on the discovery of a suspected IED, VBIED or mortar attack, and for
dealing with suspect delivered or postal devices.
b. Drivers are to be briefed about the threat and the measures they should
adopt to counter terrorist attacks.
APPENDIX 3 TO
ANNEX A TO
SECTION III TO
CHAPTER 7
MOD BIKINI BLACK SPECIAL ALERT STATE -
COUNTER MEASURES
BS1. Incremental Action. Implement all security arrangements applicable to BIKINI
BLACK and, in addition, the measures detailed below.
a. Confirm that the civil police are aware of the increased Alert State and co-
ordinate security measures where appropriate.
b. Brief all personnel on the increased threat to security and advise them of
appropriate personal security measures. Ensure that all personnel are, or have been,
briefed on the plans and instructions for action to be taken in the event of a terrorist
attack; particularly in respect of IED, VBIED or mortar attack. NOTE: A thorough
knowledge of the action to be taken is essential if casualties are to be minimized.
a. If possible, move objects (e.g. dustbins and crates) that could be used to
hide an explosive device to at least 25 metres away from occupied buildings, or
keep them in secured or supervised buildings.
b. Inspect the exterior and interior of all buildings prior to occupation at least
daily. Where applicable, particular attention should be paid to domestic
accommodation and general purpose areas (e.g. recreation and dining areas) that
may require more frequent searching. Buildings, rooms and cupboards not in
regular use should be searched and secured, and then inspected periodically.
j. Check all sites not normally occupied by MOD personnel prior to use or
occupation. (The term sites includes ranges, assault courses, training camps, sports
grounds, drill halls etc).
APPENDIX 4 TO
ANNEX A TO
SECTION III TO
CHAPTER 7
MOD BIKINI AMBER ALERT STATE – COUNTER
MEASURES
A1. Incremental Action. Implement all security arrangements applicable to BIKINI
BLACK and BIKINI BLACK SPECIAL and, in addition, the measures detailed below.
a. Confirm that the civil police are aware of the increased Alert State and
consult them about precautionary measures to be taken outside perimeters.
b. Brief all personnel of the increased threat and draw attention to the
importance of applying their personal security measures.
d. Enforce very strict control of access. Reduce to the minimum and, where
practical, deny access to the establishment to non-departmental personnel.
i. Reduce to the minimum the use of top floors of frangible buildings that
give minimum protection.
APPENDIX 5 TO
ANNEX A TO
SECTION III TO
CHAPTER 7
MOD BIKINI RED ALERT STATE – COUNTER
MEASURES
R1. Incremental Action. Implement all security measures applicable to Alert States
BIKINI AMBER and, in addition, the measures detailed below.
a. Confirm that the civil police are aware of the increased Alert State and
consult them with a view to their closing public roads that might otherwise make
establishments particularly vulnerable to terrorist attack.
c. Cancel all activities that might place Service personnel at risk other than
those that are operationally or administratively essential.
a. Ensure that the strength of the guard force is such that the establishment
presents a very secure posture.
c. Search all parked vehicles immediately the RED Alert State is imposed and
at more frequent intervals thereafter.
e. According to the nature of the threat, review and adjust where necessary,
the concentrations and locations of personnel, inside and outside establishments, in
order to reduce the risks to them.
f. Avoid, wherever feasible, the use of single storey buildings and the top
floors of accommodation blocks.
g. Equip guards at appropriate locations with alarms so that they can give
warning of any mortar, IED or VBIED attack.
ANNEX B TO
SECTION III TO
CHAPTER 7
MOD TESSERAL ALERT STATES – DEFINITIONS
APPENDIX 1 TO
ANNEX B TO
SECTION III TO
CHAPTER 7
MOD TESSERAL ALERT STATES – COUNTER
MEASURES
Preparatory Measures
1. The preparatory measures listed below are to be reviewed periodically by units and
establishments and details reported through the chain of command.
c. Briefing and liaison. Establishments are to liaise with their local civil
police and MDP as appropriate, in order to agree with them on local TESSERAL
plans and counter measures and to seek their advice and assistance.
TESSERAL BLACK
2. Review and update, where necessary, all the contingency plans, orders and
instructions relating to TESSERAL and implement the following additional counter
measures:
a. Briefing. Brief all personnel (Service and civilian) on the threat and the
orders and instructions for higher TESSERAL Alert States.
b. Liaison. Establishments are to liaise with their local civil police, and MDP
as appropriate, in order to brief them on local TESSERAL plans and counter
measures and to seek their advice and assistance.
(1) Brief all personnel of the increased threat, especially pilots, ground
support crews and aircraft controllers.
(2) Inform civil police of the threat and co-ordinate plans for
safeguarding aircraft flight paths into and out of establishments.
(3) Prepare to activate contingency plans, and issue detailed Air Traffic
Control (ATC) procedures.
(1) In conjunction with local civil police carry out regular checks of
perimeters, especially under and adjacent to flight paths.
(2) Remind the civil police of any areas outside the perimeter from
where attacks could be mounted and that cannot be avoided by aircraft on
take off or landing.
(3) Warn all aircrew to report any unusual activity seen near approach
and overshoot areas.
TESSERAL AMBER
4. Implement all security arrangements applicable to TESSERAL BLACK SPECIAL
and implement the following additional measures where appropriate:
(2) Inform local civil police of the increased threat and consult them on
precautionary measures to be taken outside establishments' perimeters.
(2) Reduce flying to essential operational flights only and cease circuit
flying.
TESSERAL RED
5. Review all security arrangements applicable to TESSERAL AMBER and
implement the following additional measures where appropriate:
Notes:
1. Normally action outside MOD establishments will be entirely a matter for the Chief
Police Officer who, on receipt of a TESSERAL alert will take whatever action considered
appropriate. Exceptionally, and after consultation with the Home Office, the Chief Police
Officer may request aid in:
b. Helping to deal with terrorists who have been located but, because of their
actions or the way they are armed, are beyond the power of the civil police to
handle.
ANNEX C TO
SECTION III TO
CHAPTER 7
GUIDANCE ON MORTAR ATTACK COUNTER
MEASURES - ORDERS AND INSTRUCTIONS
Introduction
1. The guidance set out below will probably need to be addressed in any orders or
instructions produced by individual establishments concerning the planning, briefing and
action to be taken before, during and after any terrorist mortar attack. The guidance given
is not exhaustive and should be applied with due regard to the local circumstances
applicable to a particular establishment. Thought should be given to consulting local civil
police and other Service agencies that may be able to give professional advice on the
application of mortar counter measures and their implementation.
Preparation
2. A standard mortar attack alarm and all clear signal equipment must be immediately
available to guards and easily identifiable as such by personnel within an establishment.
4. On hearing the attack alarm, the sound of a mortar firing, or the detonation of a
mortar round, all personnel are to take cover immediately by:
5. Guards should take cover in guard posts where available and close viewing ports if
fitted. Guards should count the number of reports from the baseplate, the general direction
from which the mortar(s) firing is coming and the reports of the bombs exploding. These
details are then to be relayed to the main guardroom or security control room.
7. Personnel who are aware of the existence of an unexploded missile or casualties are
to inform the security control room or ICP immediately.
8. The security control room is to inform the civil police, the superior HQ and the
focal point system of the attack. The assistance of an EOD officer is to be requested by the
establishment or civil police and an RVP arranged away from the establishment.
10. Once the establishment has been secured and any casualties dealt with, the
clearance of the base plate position and any unexploded bombs should follow the normal
procedures for dealing with IEDs. This procedure should include clearance of the area, the
establishment of a cordon and an ICP by the civil police. The HOE is to act in support of
and as requested by the civil police, keeping his own authorities informed.
11. Once the base plate has been located, the area around the baseplate, the area under
the flight path and the impact area must all be cleared of personnel and cordoned off. The
evacuation of the area under the flight path is essential in order to minimize the danger from
an unfired or delayed action bomb still remaining in a mortar. These requirements may
entail the complete evacuation of the establishment.
12. Orders and instructions should include measures to cope with the disruption caused
by the attack to mains power and communication facilities and the potential risks involved
with hazardous or inflammable materials within the establishment.
13. The all clear should not be given until the ATO and the civil police commander
agree that it is safe to re-enter the cleared area.
ANNEX D TO
SECTION III TO
CHAPTER 7
THE ISSUE AND USE OF BATONS BY SERVICE
PERSONNEL
Introduction
1. A baton is a weapon that has the capability to seriously injure or kill. It is
therefore essential that those using a baton are authorized to carry it, are correctly trained
in its use and understand the circumstances that will allow its use. For the purpose of
this paper the term ‘baton’ includes any truncheon (generally regarded as obsolete),
expandable baton or rigid baton specifically designed for an operational, security or
policing purpose. It should not be confused with ‘baton rounds’, used in public order
situations, for which separate instructions apply. The use of pickhelves, staves or any
other implement as a substitute for a purpose-designed baton is not authorized.
Aim
2. The aim of this paper is to outline the situations in which the use of batons by
Service personnel may be authorized, and the procedures and constraints that apply to
their issue and use.
4. Batons may be a suitable weapon for use in both Peacetime Operations and
during Armed Conflict. The requirement for batons will therefore vary depending on the
nature of the conflict at the time.
5. The list of circumstances that follows illustrates the range of situations for which
the issue of batons may be appropriate.
Operations
6. Members of the Armed Forces may require to use batons in order to achieve a
mission on any type of Military Operation within the Spectrum of Conflict. Within such
an operation, batons may provide an effective option to, or be used with, other weapons.
Security
8. In order to provide security for the Department, personnel may be posted as
sentries to guard property or personnel. The MOD has a responsibility to equip its
personnel for the task on which they are employed and therefore a sentry should be
equipped on a basis commensurate with the assessed threat. A sentry could therefore be
equipped with a firearm (and perhaps also a baton), with a baton, or unarmed.
Policing Duties
9. The MDP and Service Police require batons to execute Police Duties. Where
their use has been approved by Minister (AF), CCMDP and Service Police Provost
Marshals will issue separate police instructions which accord with the Association of
Chief Police Officers (ACPO) guidelines. Consequently, this Policy Paper does not
apply to the MDP and/or the Service Police.
10. Batons could be required by Service personnel who may not be Service Police
but who could be employed in support of Service Police e.g. patrols, sentries or in
response to a specific incident.
Summary
11. Batons offer an effective weapon to provide:
14. Self Defence. In extremis, when faced by a particular substantive and immediate
threat and where the issue of batons may resolve the immediate situation, Commanding
Officers/Heads of Establishments (CO/HOE) and operational commanders may order the
issue of batons, notifying the chain of command as soon as possible.
“A person may use such force as is reasonable in the circumstances in the prevention of
crime or in effecting or assisting in the lawful arrest of offenders or suspected offenders
or persons unlawfully at large”.
16. Further guidance, designed for use in the field, is provided at JSP 398.
Training
Requirements
17. Those issued with a baton have the option to respond by means of overt
deterrence at the lower end of the scale, up to use of potentially lethal force at the other.
It is necessary therefore to ensure that all personnel equipped with a baton have
confidence in their ability to use it correctly in a number of situations within the law.
18. Training to meet Single Service requirements is necessary and it is for Single
Services to decide how these requirements are to be met incorporating the guidelines and
training objectives at Annex A. The training is to ensure that the trainee understands
how to use the baton correctly in a number of scenarios and this will help fulfil the
MOD’s responsibilities as an employer.
Records of Training
19. A clear and auditable record of initial and continuation baton training carried out
by Service personnel is to be maintained and available for scrutiny when required.
Resource Implications
20. Provision of Batons. The provision of batons, if required, will be a Single
Service responsibility. Only batons, as defined in paragraph 1, are to be issued and any
other implements currently issued for use are to be withdrawn.
21. Training Costs. Training costs are to be met by the Single Services.
Conclusions
22. The following conclusions have been reached:
e. Guidance for the operational use of batons at home and abroad, short of
Armed Conflict, is to be in accordance with English domestic law (paragraph
15).
f. Single Services are responsible for determining the scale of the training
requirement and for the implementation of suitable training (para 18).
h. Training and procurement costs will lie where they fall (paragraphs 20
and 21).
APPENDIX 1 TO
ANNEX D TO
SECTION III TO
CHAPTER 7
BATON TRAINING
General Guidelines
1. The following points relate to all personnel undergoing baton training.
b. All personnel must qualify on the basic course before being armed with
the baton.
(Experience gained by Police forces and the RN has shown that the above
elements of training takes a minimum of 4 hours to complete).
APPENDIX 2 TO
ANNEX D TO
SECTION III TO
CHAPTER 7
ROE FOR THE USE OF BATONS
Guidance for the Use of Batons by Service Personnel
General Rules
1. These ROE do not affect your general right to self-defence. However in all
situations you are to use the minimum force necessary to achieve your aim. Your baton
may only be used as a last resort.
2. Where personnel are authorized to use Public Order Control Equipment, JSP 398
Card D should be issued.
Striking
5. If you have to strike you should USE THE MINIMUM FORCE NECESSARY
TO ACHIEVE YOUR AIM.
After Striking
7. After striking you should:
AND
b. Decide upon any follow-up action required. (e.g. strike again, summon
assistance or give first aid).
AND
BUT
SECTION IV TO
CHAPTER 7
COUNTER TERRORIST PROTECTION WITHIN
ESTABLISHMENTS AND ELSEWHERE
General
07401. Thorough planning and supervision of protective measures is needed to defeat
terrorist attack. It is important to try to foresee what forms of attack terrorists might adopt.
In particular, establishments and individuals should assess where they are most vulnerable
and concentrate on these areas, instead of attempting to protect everything, to the same
extent, all the time. Protective measures stand the best chance of succeeding if:
a. Sound plans exist which are sufficiently simple and flexible to respond
quickly to changes in the threat and in the manning state of the establishment.
b. There are clear orders, standing operating procedures (SOPs) and guidance.
Plans
07402. Counter terrorist plans should cover the general precautions required at all times,
the action to be taken at each Alert State, and how to react to emergencies. They should be
based on command instructions and draw on the guidance given in this Chapter and Chapter
5. They should include such matters as:
but that may be vulnerable in periods of high threat such as Service families
accommodation areas (in conjunction with the civil police where appropriate), or
other living accommodation, ranges and local training areas, public houses and
cafes, transport facilities such as buses and railway stations, etc, regularly used by
Service personnel.
e. Liaison. The arrangements for liaison with the local police and adjacent
military establishments should be specified, and their participation reflected in
establishment security plans.
f. Post incident procedures. These should cover the procedures and actions
to be carried out in the event of a terrorist attack.
Orders
07403. Establishment orders, apart from covering the matters at paragraph 07402 above,
must give specific guidance on the action required in the event of the following:
g. An explosion or attack.
h. A mortar attack.
j. Other contingencies.
Briefing
07405. Establishments must ensure that all personnel are briefed, trained and practised in
terrorist precautions. The extent to which this is necessary is for HOE to decide, based on
the current threat, the role and state of training of the establishment and directions issued by
superior HQ. A large part of an establishment's protection and that of individuals should be
based on the physical security measures described elsewhere in this manual coupled with
normal military skills, alertness and initiative. However, there are protective measures that
are necessary normally only during periods of high threat; at other times they tend to be
forgotten. Advice on such measures is covered in succeeding paragraphs.
Operation ROUNDUP
07406. Operation ROUNDUP is the establishment level operation to alert its personnel to
the possible presence of intruders and/or IEDs within the establishment. Its implementation
requires:
07407. All MOD establishments are to have plans to instigate Operation ROUNDUP
should the presence of intruders or IEDs be suspected or as a proactive security measure.
Focal Point reporting should only be used in the event of an actual terrorist related incident.
Operation WIDEAWAKE
07408. Operation WIDEAWAKE can be used to initiate a search for IEDs at start-work. It
can be instigated at establishment level and higher formations can also order its
implementation at one or more establishments. Establishments may be passed this
codeword, through the Focal Point System, and should consider whether to initiate a similar
procedure at their own establishment.
Searching of Vehicles
07414. Vehicles, both military and civilian, are an easy target for terrorists and all MOD
personnel must understand how to search them.
07416. The need to protect careers offices must be balanced with the requirements of
Service recruiting policy and the need for an “open door” approach. Security arrangements
will also be complicated by local planning restrictions, multiple occupancy of buildings and
tenancy or lease agreements. However, the application of the security measures detailed
below should provide a realistic degree of security.
The Threat
07417. The types of attack most likely against Armed Forces Careers Offices are as
follows:
a. A time delay IED attack close to or inside careers office premises, probably
involving the placement of a device in silent hours.
Security Planning
07418. Each Armed Forces Careers Office must possess a comprehensive security plan that
should include the following:
(4) Joint careers office and civil police post incident plan.
07419. Minimum security standards at Armed Forces Careers Offices are at Annex F.
Contact Lists
07422. Viable contact lists (24 hour cover) are to be maintained and passed to the relevant
Focal Point System node or sub-node and local civil police. This will ensure that careers
staff may be contacted at any time.
Security Advice
07423. Careers staff should be encouraged to seek advice from their PSyAs and Command
security staff or local security unit. Guidance should also be obtained from current DCIs
covering security at public military events and personal security measures.
07425. HOE are responsible for the immediate action to be taken after a terrorist incident
has occurred. Post incident operational control within perimeters is to be handed over to a
civil police officer on request. Once a formal hand-over is completed, the HOE is to
continue to provide help and support to the civil police as required.
07426. Although the following procedures have been developed for use in GB, the content
should be used in overseas commands as a guide to develop local contingency plans.
Contingency Plans
07427. To ensure that correct action is taken by personnel after a terrorist incident has
occurred, HOE are to produce written local contingency plans. These plans are to be drawn
up in conjunction with the local civil police and should, where possible, be joint plans. To
be effective, contingency plans must be regularly rehearsed, ideally with the civil police and
other emergency services. Copies of plans should be held by the civil police, other
emergency services and appropriate HQ.
07429. Details of the action to be taken in the event of the terrorist incidents are detailed in
the following Annexes and Appendices:
Civil Police
07430. Details of the civil police civil police control and co-ordination of the emergency
services’ response in the event of a major terrorist incident are at Annex G.
a. EOD. Service EOD teams provide assistance to the civil police throughout
GB on request. Such assistance is requested by the civil police direct to the
JSEODOC at Didcot.
(2) Any civil police request for specialist search assistance should be
passed to Joint Service EOD Operations Centre (JSEODOC).
(1) Contact name and telephone number of the person who can give
additional details of the task.
(6) Timings.
d. Photo recce. Photo recce requests are to passed to MOD through the chain
of command.
e. Service police. Service police will attend the scene of a terrorist incident,
and are trained and equipped to provide the following assistance to the civil police:
(2) Communications.
(1) HOE.
(2) Make decisions based upon facts, including the possible changing
of security Alert States and the introduction of enhanced security measures.
(a) Ensure that D Def Sy, PSyAs and Command security staffs
are aware of the incident.
a. The civil police are directly responsible for media liaison after a terrorist
incident.
(1) Provide an update briefing for the Command Media Ops staff who
may deploy to the scene of a terrorist incident.
(2) Keep the media away from the scene until media liaison facilities
are agreed by the civil police.
(5) The HOE should bear in mind that public relations is a command
function, and that although operational tasks take priority the need to
reassure the public or to gain recognition for positive actions taken are
significant considerations and in certain circumstances may be of
overriding importance.
07436. The setting of an SVA is a local arrangement between the HOE and the local civil
police commander; they will determine its boundaries according to local circumstances,
availability of resources and counter terrorist security requirements.
07437. It is currently assessed that a terrorist group will normally spend considerable time
reconnoitring and making its preparations prior to mounting an attack. One or more
members of the group may well be within an SVA watching a target prior to attack. The
terrorist group will subsequently enter the SVA to attack an establishment and may select
mortar base plates or firing points within the SVA.
07438. It is within the SVA, particularly during the reconnaissance and preparatory stages
of an attack, that the terrorist is vulnerable to identification. However skilfully he or she
merges into the local pattern of life, the terrorist is usually a stranger in an unfamiliar
environment. It is this vulnerability which SVA plans should seek to exploit.
Aim of an SVA
07439. The aim of an SVA is to establish an area, primarily around the outside of
establishments, in which counter terrorist security awareness is raised. Joint civil police
and MOD measures utilising increased public awareness of the terrorist threat and
modus operandi are implemented, if appropriate, to identify suspicious activity and
subsequently to deter, disrupt or respond to an attack.
07440. The aim is not one of general deterrence, but one of fully utilising the eyes and ears
of those in the vicinity of Service establishments with a view to identifying suspicious
activity and reporting it to the appropriate authorities. Publicity of the scheme is to be
strictly limited to those living within the SVA.
SVA Plans
07441. SVA plans should include the following:
a. A civil police led observation and reporting plan designed to raise the level
of public awareness and identify suspect terrorist activity within the SVA.
Implementation of SVA
07442. Phase One - Preparatory Measures
a. Joint police and Service liaison. Establishments, in consultation with
their PSyAs and Command security staff and civil police HQ, should identify
where SVAs are needed and decide whether their satellite establishments need
separate SVAs. At locations where other Service establishments are collocated or
in close proximity, HOEs should consider establishing joint SVAs. SVA co-
ordinating groups may be necessary and could include:
(2) HOE.
(3) ESyO.
(1) A joint appreciation conducted by the local civil police and MOD,
to include the following:
(a) Within the civil police and Services, education and training
might include terrorist methods of operation, familiarity with the
ground, the SVA pattern of life, observation and reporting
techniques, vehicle recognition and joint police and Service
incident handling drills.
c. Service Personnel
(1) Civilians. Directly to the local civil police using the 999 system or
a locally arranged Freephone system.
(2) Civil police. By radio or report directly to the civil police control
room.
(3) Service personnel. Either directly to the civil police or where this
has been agreed locally, to the main guardroom or Service police.
b. Collection system. The civil police are responsible for the handling of all
terrorist related information produced within the SVA. However, various Service
police and security agencies have collation systems for all security reports passed to
them including those related to SVAs. Such reports are then passed on to the civil
police and other agencies as appropriate.
Maintenance of SVAs
07445. Security is, in part, an attitude of mind and is a continuous process. The local civil
police commander and HOE will need to consider appropriate means of maintaining
security awareness through repetition and reinforcement of the need to maintain vigilance.
This could include:
a. Recruiting activities.
b. Publicity tours.
c. Band concerts.
d. Parades.
07449. The event may take place on or off MOD property. All such events are at risk from
terrorist attack or interference by extremists.
6. However, if in doubt about the status of an event, advice should be sought from the
appropriate PSyA or Command security staffs in sufficient time to allow for 6 weeks notice
of the event to be given to the civil police.
Division of Responsibility
07452. The civil police have overall responsibility for security at PMEs both on and off
MOD property. In general, the Service takes the lead in arranging security on MOD
property and the civil police take the lead outside MOD property including liaison, when
necessary, with the British Transport Police.
(2) Where possible varies routes to and from entry and exit choke
points.
after the event. Personnel may be in uniform or civilian clothes, as agreed by the
civil police.
d. Ensure the security of military personnel, equipment and arms at the event
and during travel to and from it, using secure overnight storage and accommodation
as appropriate.
f. Seek advice on security from their PSyA and Command security staff if
required.
Commands
07454. PSyAs and Command security staffs are responsible for monitoring all PMEs to
ensure that they are being dealt with correctly. HQ RAF P&SS is responsible for
monitoring and co-ordinating security for all PMEs for the RAF.
Coordination
07456. Outside a Service establishment where more than one Service or unit is
participating, the relevant Army HQ in whose area the event is to take place will ensure (in
conjunction with the other Services) that responsibility for Service aspects of security are
clearly laid down, and co-ordinated, including the appointment of an overall Event Security
Officer (ESO) (see Annex I). Whenever possible this will be an officer or WO.
Financial Liability
07457. Where the civil police have a statutory responsibility to provide security, they also
have the associated financial liability, regardless of the period of notice involved. For
officially sponsored events, civil police would not seek to raise charges. For private
engagements run by a commercial sponsor, whether or not for financial gain, the organizer
will be responsible for meeting any police charges raised, in addition to the normal charges
raised by MOD. If Service attendance at an event is cancelled on civil police advice for
security reasons, MOD will assume no financial liability. Commercial sponsors should be
advised of the full extent of their liability when booking engagements. It would be
improper for any such costs to be met from the Defence budget.
07459. For the details of points of contact in Army Brigade and Division HQ, supporting
Military Intelligence Sections and the civil police force HQ to be informed see the current
DCI GEN.
07460. Organizers are to await the civil police force HQ contact officer's notification of the
local civil police point of contact and are then to inform the ESO who will:
a. Liaise with the local civil police prior to the event to discuss the
proposed security arrangements, in particular any requirement for Service
assistance if the event is to take place outside MOD property. If appropriate, a
joint reconnaissance of the venue should be conducted by the local civil police
commander and the ESO.
b. If the event is not on MOD property, ensure that the military assistance
agreed with the civil police is provided.
07462. Should the relevant Service Authority wish an event to go ahead, even if the civil
police cannot be given 6 weeks notice, negotiations with the civil police about this event are
to be conducted through HQ London District. If an event has to be cancelled for any
reason, then all addressees are to be informed as soon as possible.
Royal Parks
07463. Service Bands with engagements in the Royal Parks are to travel to London in
civilian clothes and change at the locations shown below. Bands should, wherever possible,
move in one vehicle. Bands are to change back into civilian clothes before leaving London
District. Contact should be made with the relevant location at least 4 weeks before the
event as follows:
Action to be Taken
07465. Establishments and staffs sponsoring, organising or participating in PMEs are to
ensure that notification takes place at least 6 weeks before the event by informing one of
the following:
a. Liaison with the local civil police and relevant security organizations.
c. Providing a security brief for the sponsor, organizers and participating unit.
07467. The ESO is to take account of relevant paragraphs of the Aide Memoire for ESOs
in GB at Annex I when planning participation in a PME overseas.
07469. The ESO should ensure that the ESyO, Service police, civil police, and local
security unit or RAF P&SS are aware of the event. The ESO should also ensure that a
security plan is prepared based on the current threat assessment.
NB: The list of police and army units to be notified prior to an event is published in
current DCIs and will be updated as required.
Training within GB
07471. Public notification of use of ranges and training areas. Over a long period of
time the custom has grown up of publishing, for the benefit (including safety) of members
of the public, details of forthcoming training activities on our ranges and training areas. It
would clearly be extremely difficult to cease all such notification, particularly in respect of
training areas that fall within a national park or where specified routes are open to the public
when a range is not in use. However, information published should be kept to the minimum
compatible with the above purpose.
a. Due to their fixed and permanent nature, established training camps can be
targeted relatively easily by terrorists. In addition, their small or non-existent
regular guard or caretaker element can make it comparatively easy for devices to be
placed. Where practicable, there should be continuity of occupation, e.g. an
advance party of an incoming unit should take over from a rear party of an outgoing
unit. It is appreciated that this may be difficult for Reserve or cadet units.
d. When the unit or sub-unit leaves the camp for the training area, all doors
and window shutters (if applicable) of accommodation vacated should be locked.
On return to the camp a check for IEDs should be made (OP WIDEAWAKE), the
extent of which would depend on whether or not a rear party had remained in the
camp.
07473. Approaches to permanent training camps may be targeted with a view to the
placing of booby trap IEDs, RCIEDs or the carrying out of a mortar attack. Particular
vigilance should be exercised in relation to the close approaches, in particular route choke
points, culverts etc.
a. Access points and facilities, e.g. gates, firing points, range consoles, target
galleries, huts, kitchens, ablutions and tents etc are to be thoroughly checked on
arrival, secured throughout the period in use and checked again on departure if
appropriate.
Private Land
07475. Training on private land is generally unpredictable and would be difficult for a
terrorist organization to target, but the relevant Alert State measures should be enforced
throughout the training period.
Adventurous Training
07476. Unless there are good reasons for not doing, personnel on adventurous training
should adopt the principle of anonymity. The expedition should, therefore, be civilianized
in every respect (including clothing and vehicles). Rules for adventurous training and
expeditions are contained in DCIs reissued annually. The expedition leader will need to
read the relevant DCI in the early planning stages of an expedition; copies of the DCI
should be held by establishment training staff. Whenever possible unattended vehicles
should be left in a secure area. However, in all cases vehicles are to be thoroughly searched
if they have been left unattended.
Training outside GB
07478.
terrorist attack exists. Military CTS capabilities have been developed primarily to defeat
the Irish republican terrorist threat, but are equally capable of countering threats from other
terrorist groups.
Terminology
CTS
07480. Military CTS involves the use of systematic procedures to find terrorists and their
resources and to confirm the presence or absence of bombs within specified boundaries.
The objectives of CTS include obtaining evidence, depriving terrorists of their resources,
providing information or assuring a facility is safe to use. It is conducted by trained
personnel who may be supported by other agencies including intelligence, Arms and
Explosive Search Dog Teams, EOD Teams, Electronic Counter Measures and Aerial
Photographic Reconnaissance. The following terms are commonly used:
a. High Risk Search (HRS). HRS operations are searches carried out when
it is assessed that there is a high probability of a bomb, booby trap or improvised
explosive device (IED) being present.
b. Low Risk Search (LRS). LRS operations are searches carried out when it
is assessed that there is a low probability of a bomb, booby trap or IED being
present.
Policy
Civil Police
07481. In the UK, Chief Constables are responsible for CTS operations within their own
areas. The Home Office provides guidance to police forces on CTS matters and on the
procedures to be used by police forces requiring military CTS assistance.
MOD
07482. Within MOD the Army Department takes the lead on CTS issues. Specific
responsibilities are as follows:
Units
07484. Unit commanders are to ensure that all personnel are trained to be CTS aware, and
are responsible for security arrangements and procedures within the unit. A Unit Search
Co-ordinator (USC), normally the Unit Security Officer, is to be appointed to be
responsible for CTS arrangements and for CTSA training within the unit. Units should seek
CTS and CTSA advice and assistance where necessary from their FSC.
CTS Resources
07485. There is a wide variety of resources that can contribute to CTS operations. These
resources are not available in all theatres, but are tailored to meet theatre requirements. The
types of resource and their capabilities are outlined in this section.
Police
07486.
a. Civil Police. Civil police in GB and NI have the capability to carry out
LRS using Police Search Teams (PSTs) under the control of a Police Search
Advisor (POLSA). Their capabilities are similar to those of Service Police Search
Teams (SPSTs). The capabilities of civil police in other theatres will vary.
b. Service Police. Service Police have the capability to form SPSTs. Such
teams are trained and equipped to carry out LRS. Their employment is primarily
for defensive search operations for specific events. SPSTs should operate under
direct command of a trained Service Police Search Advisor (SPSA) or Royal
Engineer Search Advisor (RESA). SPSTs are deployed by the Army and the RAF.
c. MOD Police (MDP). MDP have POLSAs and low risk PSTs deployed at
certain locations in UK. Additional teams can be tasked centrally by Territorial
Operations Branch for MDP HQ.
All Arms
07487. All units have some search capability. This capability should include at least CTSA
trained personnel. The all arms capabilities are:
a. CTSA. Personnel trained to be CTSA can carry out basic CTS procedures
using simple equipment (e.g. torches and mirrors) provided under local
arrangements. These should only be employed in random low risk searches in areas
with which they are familiar. These personnel cannot be formed into search teams
and are not a substitute for a qualified, fully equipped, search team.
b. Patrol Search. Patrol Search is an all arms LRS capability currently only
employed in NI but which could be employed in other theatres if the threat
warranted it. It involves search by all arms units as part of normal patrol activity,
using limited types of search equipment. The patrol search capability is limited to
route checks, rummage search of areas, and vehicle and personnel searches, under
direction of their unit commanders. Training for patrol search is carried out within
units under direction of RSME. Patrol Search operations should be co-ordinated by
the Unit Search Co-ordinator (USC).
Supporting Agencies
07489. A wide variety of agencies may be involved in search operations. Search advisors
will suggest which supporting assets might be necessary. The following, which is not a
comprehensive list, provides some examples:
b. EOD Team. Where EOD action may be required the involvement of the
appropriate JSEOD team or Ammunition Technical Officer (ATO) should be
considered.
07491. If the risk warrants it, a fully trained search advisor should be employed to
determine the type of search required.
Assistance to Police
07492. In the UK, military CTS assistance to police or other civil organizations is
carried out under MACP arrangements as follows:
a. NI. GOC NI can employ the Army to carry out CTS under MACP as a
standing arrangement.
b. GB. The method of providing CTS assistance depends upon the degree of
urgency:
(1) Planned Operations. Requests from the civil police are directed
to DMO (MO2), who will then task as appropriate.
ANNEX A TO
SECTION IV TO
CHAPTER 7
CONTINGENCY PLANNING FOR UNEXPECTED
EVENTS
Scope of Planning
1. Establishment contingency plans must lay down procedures for:
g. Appointing an Incident Control Officer (ICO), (in working hours the unit
security officer (USO)), to be responsible for directing the response to the threats.
More than one control officer may be necessary in large depots or establishments.
Evacuation
2. Arrangements for evacuation should be pre-planned and practised. There are two
options:
3. Safe assembly areas of evacuation should be searched and cleared before moving
personnel to them and where possible the approach routes should also be cleared. Care
should be taken to avoid vulnerable areas such as car parks, refuse bins, etc (that could have
explosives planted in them) when moving personnel during evacuation procedures.
Stand-down
6. 'Stand-down' and 'lock up' drills should be organized in advance, either to order the
return to duty, or to disperse, with further instructions as to when to return.
Detailed Guidance
7. Guidance on the detailed action to be taken on the discovery of an explosive
device is given at Appendix 1 to Annex H.
ANNEX B TO
SECTION IV TO
CHAPTER 7
SPECIAL PRECAUTIONS FOR PROTECTION OUTSIDE
MOD ESTABLISHMENTS
General
1. The greatest protection will stem from maintaining individual vigilance and
avoiding predictable patterns of activity. Common-sense and alertness are of paramount
importance. Where regular patterns of activity are unavoidable Service personnel should
adopt positive protective measures, e.g. by forming organized groups with nominated
'look-outs' at times of high risk. In such circumstances it may be necessary for units to
consult the civil police.
Unit Movement
3. Units should:
e. Adopt a system for reporting any suspicious activity and for taking action
on such information.
(3) Check the arrangements for the carriage of baggage and equipment.
g. Consider the need to take special precautions to avoid being surprised when
using public transport. These might include, for example, making arrangements for
the searching of railway stations and carriages before use, avoiding advance
publicity, etc.
h. Obtain advice from the civil police, Service police or local security unit as
necessary.
Drivers
4. The following guidance for drivers may be applied by units to personnel whether
on duty in Service vehicles or in private cars. Drivers should:
c. Look out for areas along routes that could be used for an ambush.
d. Observe other vehicles and people and look out for suspicious activities.
Avoid and then report any suspicious activity.
e. Carry a mobile phone or know the location of public call boxes along
routes and carry relevant telephone reporting numbers and suitable coins/cards.
Training
6. Training often involves the regular use of ranges and training areas. The nature of
range work tends to compel units to follow predictable patterns of activity because regular
use of butts, firing points, etc, is unavoidable. When planning training, units should
consider the following:
Sporting Activities
7. Sporting activities, like training, may produce predictable patterns of activity. Units
should consider:
b. Searching sports areas and arenas, etc, before use and, in particular,
changing accommodation that may need protection while in use.
a. The requirement to brief all concerned on the risks involved when using
public houses, clubs, etc. At times it may be necessary to lay down that Service
personnel go out in groups and that each group has an agreed lookout responsible
for the security of the group, sometimes known as SHARKWATCH.
b. The need to organize social functions with care, particularly official ones
and to draw up a proper security plan in conjunction with others, as necessary,
again it may be necessary to adopt SHARKWATCH.
c. The need for liaison with the civil police and, where appropriate, with the
managers of frequently used local places of entertainment, who may agree to
participate in SHARKWATCH.
b. The need to exercise particular care when using public transport. Control
of baggage should be emphasized.
c. The need for individuals to take the same security precautions with their
private cars as with Service vehicles (see paragraphs 3 and 4).
ANNEX C TO
SECTION IV TO
CHAPTER 7
ADVICE ON HANDLING ANONYMOUS TELEPHONE
CALLS WITH WARNINGS OR THREATS
1. General. Suspicion that an IED may have been planted within an establishment
often results from an anonymous telephone call or bomb warning. Any such call must be
taken seriously even though subsequent investigation may reveal a false alarm or hoax.
Terrorists have used hoax calls in the past to test reactions, observe evacuation procedures
and encourage complacency. The following definitions are in general use:
a. Bomb warning. This term refers to the manner in which the incident
starts. The majority of bomb warnings are received by telephone but the term also
covers the alarm that is raised on the discovery of a suspect item.
b. Bomb scare. After a bomb warning has been investigated and discredited,
any precautionary measures may be relaxed and normal activity resumed. This
incident would be termed a “bomb scare.”
b. Attempt to obtain the name of the caller and their address and telephone
number or a contact point. You should point out to the caller that by giving these
details they are indicating that it is a genuine warning.
c. Attempt to keep the caller talking on the line and elicit further information
if possible.
d. Keep the line open after the caller ends the call; this will make it easier to
trace the call.
2. Facts to be obtained. During the course of the call the recipient should attempt to
establish the following:
a. Establishment involved.
3. Other useful facts. Security staffs will require details of the following:
a. Voice characteristics.
(4) Was it slurred or indicative that the person was under the influence
of drink or drugs?
(6) Did the caller give the impression that the message was being read
out?
b. Background noises.
(1) Was there any sound that would indicate someone else was with the
caller, e.g. prompting or giggling in the background?
(2) Was there any background noise of road traffic, aircraft, radio or
juke box etc?
a. Inform the civil police immediately using the 999 system. (The civil police
will inform the JSEODOC who will place an EOD team on standby).
b. Inform the appropriate HQ, local security unit and Focal Point depending
on local SOPs.
d. Carry out establishment level search to confirm that an IED has been
placed. Guidance on counter terrorist search awareness is included in Annex J.
6. Use of BT '1471' facility. When a call is received on a direct dial BT line the
recipient should dial 1471 immediately after the call, in order to trace the call (assuming the
caller has not barred this facility).
APPENDIX 1 TO
ANNEX C TO
SECTION IV TO
CHAPTER 7
CHECKLIST FOR TELEPHONED BOMB WARNINGS
OBTAIN AS MANY OF THE FACTS LISTED BELOW AS
POSSIBLE
(Switch on Tape Recorder if Connected)
1. EXACT WORDING OF THE THREAT: ...............................................................
...............................................................................................................................................
...............................................................................................................................................
...............................................................................................................................................
...............................................................................................................................................
...............................................................................................................................................
(KEEP THE TELEPHONE LINE OPEN - even if the caller disengages).
2. QUESTIONS TO ASK:
a. Where is the bomb right now? .....................................................................
b. When will it explode?...................................................................................
c. What does it look like?.................................................................................
d. What kind of bomb is it? ..............................................................................
e. What will cause it to explode? .....................................................................
f. Did you place the bomb?..............................................................................
g. Why?.............................................................................................................
h. What is your name?......................................................................................
i. What is your address?...................................................................................
j. What is your telephone number?..................................................................
This part of the form should be completed once the caller has hung up and the
Establishment Security Control/CIVPOL have been informed.
6. DATE AND TIME OF CALL: Date and
Time:
Length of call: Length:
Extension on which call received: Ext:
ABOUT THE CALLER
Sex of caller? Male Female
Nationality? ............................................. Age? ...................................................................
THREAT LANGUAGE
Well Spoken Irrational Taped
CALLERS VOICE
Calm Crying Clearing Throat Angry
BACKGROUND SOUNDS
Street Noises House Noises Animal Clear
Noises
REMARKS
...............................................................................................................................................
...............................................................................................................................................
...............................................................................................................................................
...............................................................................................................................................
...............................................................................................................................................
...............................................................................................................................................
Signature:................................................. Date:...................................................................
ANNEX D TO
SECTION IV TO
CHAPTER 7
ACTION UPON DISCOVERY OF A SUSPECT POSTAL
BOMB
General
1. In basic terms, a postal bomb is an IED that has been delivered to an individual or
organization though the mail system. It is likely to have been handled by several people
during transmission and will be constructed to withstand such man-handling.
a. Place the object on the nearest level surface, such as a table or the floor.
b. Without further handling the object, make a detailed note of any markings
and characteristics, including size, post mark etc.
4. Do not:
d. Attempt to cover the object with sand, or sandbag around the object, or
surround the object by steel cabinets or other furniture, as this is likely to enhance
any explosive shrapnel effect.
5. If suspicions are aroused once the package has been partially opened, or the
contents partially removed, carry out the same immediate reaction drills.
APPENDIX 1 TO
ANNEX D TO
SECTION IV TO
CHAPTER 7
POSTAL BOMB RECOGNITION
Types of Postal Bomb
1. A postal bomb is essentially an anti-personnel weapon that is usually designed to
explode at the moment of opening. The device will invariably contain an explosive charge,
a detonator or igniter to initiate the charge and some form of triggering mechanism. The
triggering mechanism will probably employ an electrical igniter system, a percussion
device involving the release of a spring-loaded striker, or a simple frictional method of
ignition.
e. If there is any springiness in the top, bottom or sides of the package or letter
(but do not bend excessively).
h. If there are grease marks on the envelope or parcel wrapping (from the
“sweating” of the explosive).
a. The feel will indicate whether there is only folded paper inside the
envelope (that will show that it is all right). A bomb will probably have
stiffening, e.g. by cards or the feel of metal.
4. It may not be possible to feel any solid objects in the package since these are not
essential ingredients and, if present, may be shielded by padding. It is also important to
realize that the envelope and its contents may be quite flexible.
a. Tearing apart the envelope. This action can either operate a simple
electrical switch or release the spring-loaded retainer of a striking mechanism.
b. Pulling out a tucked in envelope flap. The interior part of the flap may be
connected by a thread to an electrical switch, to a friction device or to the retainer of
a percussion striker. It should be noted that, in some devices, the necessary pull on
an operating thread is very small indeed.
c. Using a paper knife. The use of a paper knife could pull a thread, as in
sub-paragraph 4b above.
ANNEX E TO
SECTION IV TO
CHAPTER 7
SAMPLE GUIDE TO IDENTIFICATION OF
IMPROVISED EXPLOSIVE DEVICES (IED)
DO NOT MOVE OR TOUCH ANY SUSPECT OBJECT THAT HAS NOT
COME THROUGH THE POST. IT MAY BE BOOBY-TRAPPED.
a. Point of origin; e.g. the post mark or name of sender, being particularly
careful with items postmarked from Northern Ireland that are 2 cm or more in
thickness. If from an unusual point of origin or sender, treat as suspect, but do not
return to the sender for validation.
e. Protruding wires (even well prepared devices can get damaged in transit).
g. If there are grease marks on the envelope or parcel wrapping (from the
“sweating” of explosives).
k. To cater for modern explosives, a packet may be less than 2cm thick,
otherwise the above characteristics may be similar.
l. In addition, in the case of letter, the feel of the letter will indicate
whether there is only folded paper inside the envelope (that will show that it is
alright) or if there is some stiffening material or metal.
2. If suspicions remain, place the package on the nearest horizontal firm surface.
Leave the room, having opened the windows if possible. Leave the door open but prevent
other people entering. Call the Security Officer or a member of the Guard Force.
3. If you have started to open the package when suspicions are aroused, put it down
gently on a firm surface, protecting the face and body if possible by reaching around a desk
or steel cupboard or by leaving the room and reaching around the door post into the room.
Leave the room, leaving the door open. Prevent others entering. Call the Security Officer
or a member of the Guard Force. If it is prudent to lock the room, give the key to the Guard
Force or Security Officer.
a. Visible characteristics. IEDs are often assembled with adhesive tape. The
following may also be present:
ANNEX F TO
SECTION IV TO
CHAPTER 7
MINIMUM SECURITY STANDARDS AT ARMED
FORCES CAREERS OFFICES
1. Front door. The front door is to have:
b. Laminated glass fitted or glass covered with anti shatter film (ASF) and/or
bomb blast net curtains (BBNC).
c. Remote control locks fitted where entrance is away from main entrance or
cannot be seen from main reception.
d. A CCTV camera with appropriate lighting fitted to cover the entrance with
a monitor located in the reception area, whenever the entrance is away from the
main door or cannot be seen from main reception.
2. Entrance halls and passage ways. All internal entrance halls and passages should
have good lighting to assist staff when checking for IEDs. Similarly, immediately adjacent
external passage ways or entrance halls, where devices could be concealed, should be
illuminated and capable of being viewed from within by use of mirrors or windows and, if
considered necessary by a specialist survey team, monitored by a CCTV system.
3. Glass frontages and windows. There is no standard security template for the
protection of window displays. Careers offices vary in size and location and each display
window must be assessed separately. Specialist survey personnel will assess individual
requirements. Those windows and fanlights not used for display purposes are to be
protected by ASF, bomb blast curtains and bars, as necessary.
4. Rear doors. Rear doors are to be fire resistant and of solid construction. Heavy
duty bolts and 5-lever deadlock are to be fitted unless the door is designated as a Fire Exit,
when a Fire Safety or Fraser Bar is to be fitted. Any window or aperture in the door is to be
covered by a metal grille. Finally, if the door is in regular use a heavy duty digital lock is to
be fitted.
5. Letter boxes. All letterboxes are to be sealed and arrangements made for the mail
to be collected from the local Post Office or delivered by hand during office working hours.
7. Reception desk panic button. The reception desk is to have a concealed panic
button fitted that sounds a muted alarm to summon assistance from other members of staff.
8. Garages and parking. Ideally, all careers office vehicles should be garaged in a
secure parking area e.g. at a police station, or in unmarked lockable garages. The
garages should, if practicable, be monitored by a CCTV camera system and/or an audible
alarm. Where neither secure parking or lockable facilities are available then vehicles
should be parked in discrete parking areas up to 15 minutes away from the careers office.
Whenever possible the “buddy” system should be used in respect of such parking.
Either two personnel travel in the same vehicle or two vehicles park relatively close
together at synchronized times and the occupants move to and from the careers office
together. Garages or parking spaces are not to be marked to indicate military usage, and
wherever possible those “reserved” (but unmarked) spaces should be regularly
exchanged with other “reserved” spaces.
10. Rolling grilles to cover windows and entrances. Rolling grilles to cover
windows and entrances should be considered for offices assessed to be at high risk from
vandalism.
11. Emergency exits. Where practicable, a careers office is to have an emergency exit
on a different side of the building from the main entrance.
12. Outside sheds and storage areas. Outside sheds and storage areas (to store refuse
bins etc) are to be well-built and have substantial hard wood or metal doors and are to be
secured by a 5-lever deadlock. All careers office equipment and aids should be stored in an
internal store.
b. When arriving at or leaving the careers office, staff should consider the use
of a “buddy” system to provide mutual support and visual cover for each other.
e. Personnel should wear civilian clothes when travelling to and from careers
office premises and make a conscious effort to blend in with the local civilian
population.
15. Service vehicles. If it is essential that they are used Service vehicles are to be
parked within Service establishments whenever possible. They are only to be parked
unattended in public places where it is unavoidable and, in such cases, they must be
searched thoroughly prior to re-use.
16. UVIED detection. If the Service vehicle is fitted with a UVIED detection alarm
system (such as TALOS), the alarm display unit is to be checked before attempting to enter
or touch the vehicle. All drivers of vehicles fitted with UVIED detection systems are to be
fully briefed on their operation before using the vehicle. Appropriate guidance has been
issued to users.
18. Vehicle parking. Where it is necessary to use vehicles in the vicinity of careers
offices and to park them locally, consideration is to be given to the following measures:
d. Parking some distance (up to 15 minutes walking radius) from the careers
office. Close parking will more easily enable terrorists to link vehicles to the office.
a. Office furniture in public areas should not have shelves or drawers where
IEDs could be left.
c. Public access into the careers office should be restricted to one door only
which is to be monitored by a member of staff.
d. Visitors to the careers office are to be identified and supervised whilst in the
careers office.
23. Parking by the general public. Where possible, parking by the general public
should be restricted within 25 metres of the careers office through negotiations with local
authorities by use of:
c. Cones (that could cover a device) should only be used as a last resort.
24. If it is not possible to restrict public parking outside careers offices, the staff should
be alert to any unusual activity in relation to vehicles and their occupants.
25. Careers offices environs. Exits and entrances are to be kept clear of debris and
other items that could conceal an IED, including refuse bins and bicycles.
b. Careers conventions.
c. School visits.
27. Much of this activity is, by its very nature, open to the public and pre-notified, if not
publicized, before the event. Careers office staff should therefore be aware that these
activities could provide terrorists with a means whereby they could be targeted. The
provisions of paragraphs 07448 to 07469 (Security at Public Military Events) should, when
applicable, be applied for all such events. In addition, the appropriate aspects of the
following Annexes should be considered and acted upon:
ANNEX G TO
SECTION IV TO
CHAPTER 7
CIVIL POLICE CONTROL AND COORDINATION OF
THE EMERGENCY SERVICES' RESPONSE IN THE
EVENT OF A MAJOR TERRORIST INCIDENT
Command and Control
1. Dependent on the size and location of the incident, 3 levels of civil police
command and control may be established:
b. ICP. The ICP will control and co-ordinate the management of the
incident, providing a central point of contact for all emergency and specialist
services. The ICP will be the responsibility of an ICP co-ordinator and also
under the command of the Incident Officer.
2. Whilst the rank of officers nominated may vary dependent on the individual
force establishments, the following command functions will be necessary:
3. Where forces adopt the GOLD, SILVER, BRONZE concept the following
applies:
4. As these command and control functions are established, the tasks associated
with each will be progressively implemented. Invariably, however, initial responsibility
after an incident will fall to the first officer to arrive at the scene who will act as Incident
Officer, until replaced by a senior officer, and to the Divisional and Force Operations
Rooms which will undertake the rapid mobilization of resources.
b. Type of incident.
e. Casualties.
c. Inform the senior officer on duty who will attend and assume the role of
Incident Officer.
b. FCP.
c. Traffic control.
d. Divisional Command.
e. Divisional personnel.
f. Local authority.
i. Scene photographers.
k. Press liaison.
Scene Management
9. The immediate and overriding responsibility of the emergency services at the
scene of an incident is to save life. To this end, the Fire and Ambulance Services must
be afforded the opportunity to utilize their training and experience. The prime
responsibility of the Incident Officer is to facilitate the deployment of the
emergency/specialist services.
10. During the rescue phase, the civil police co-ordinating role is vital and the
Incident Officer, who is the link to every other police control, will undertake a
preliminary reconnaissance and determine what action has been taken to establish:
a. An ICP.
c. Traffic control.
d. Casualty clearance.
e. Property team.
g. Mortuary facilities.
11. When it becomes apparent that no further life can be saved other considerations
take precedence:
c. Investigation.
a. Safe.
b. Accessible.
c. Conspicuous.
d. Secure.
appointed to oversee the maintenance and resourcing of the cordons through the
ICP.
b. The civil police will make provision for media liaison as follows:
a. Immediate action will be taken by the civil police to ensure free passage
for emergency traffic to and from the scene.
16. RVP. As soon as practical, all civil police resources attending the scene will be
directed to nominated or pre-designated RVPs. An officer will be appointed to run the
RVP. The function of the RVP is as follows:
d. Issue equipment.
Casualty Clearance
17. The civil police will liaise closely with the Ambulance Service and the MO in
charge at the scene. To co-ordinate the removal of the injured, the Ambulance Service
after consultation with the Emergency Services as to location, routing and signing will
set up:
Evacuees
18. An officer with local knowledge will normally be the designated Evacuation
Officer. He will be responsible to the Incident Officer for all evacuations.
Investigation
20. After an incident, the overall Incident Commander will appoint a Senior
Investigating Officer to collate evidence for:
a. The Coroner.
b. Any Inquiry.
c. Criminal Proceedings.
21. Teams of officers under the command of the Senior Investigating Officer will be
responsible for evidence gathering from the scene and for interviewing witnesses as
follows:
a. Survivors.
b. Eyewitnesses.
d. Technical witnesses.
e. Background witnesses.
f. Identification witnesses.
22. Once the rescue and victim recovery phases of the operation are complete, an
extensive search will be undertaken to recover items for evidential purposes. Police
personnel trained in search techniques will be used for the task.
APPENDIX 1 TO
ANNEX G TO
SECTION IV TO
CHAPTER 7
ACPO EMERGENCY PROCEDURES TERMINOLOGY
Approach Path. Route taken from the inner cordon entry point to the scene of the crime or
seat of explosion.
Casualty. Any person who is directly involved or is affected by an incident, i.e. survivors,
deceased, evacuees.
Casualty Bureau. Central contact and information point established by the civil police for
all records and data relating to casualties.
Cordons
Inner cordon. Surrounds the immediate scene of crime and provides security for
it.
Outer cordon. Seals off an extensive area to which unauthorized personnel are not
allowed access.
Cordon Entry Point. Point at which authorized personnel gain entry to the inner cordon.
The entry point is normally controlled by the cordon officer/commander or nominated
cordon personnel.
Evacuation Assembly Point. Area or building to which evacuees are directed before
subsequent transportation to a rest area.
First Officer to the Scene. First civil police officer directed to the scene of an incident to
assess and inform.
FCP. The control point nearest to the scene of the incident responsible for immediate
deployment and security.
ICP. The point from which the management of an incident is controlled and co-ordinated.
The central point of contact for all specialist and emergency agencies on site.
IC SILVER. The civil police forward operational commander, controlling and co-
ordinating the police operation within the controlled area and responsible to the overall
civil police incident commander. The Service equivalent is the establishment incident
commander, normally the Duty Officer.
Major Incident Control Room. Established by the civil police in protracted incidents to
co-ordinate overall response, dealing with ongoing manpower and logistics requirements
and providing facilities for senior command functions.
OIC GOLD. The designated civil police chief officer who assumes command of the
operation as a whole. The Service equivalent is the senior officer, i.e. the HOE.
Police Call Back. Procedure whereby the civil police call back to confirm an initial call is
bonafide and subsequently maintain an open line to the establishment main guardroom or
ICP.
Press Liaison Officer. Civil police representative responsible for the initial release of
information from the scene of an incident.
PLP. Area adjacent to the incident scene designated for the exclusive use by accredited
media representatives and through which official press releases occur.
Red Line Telephone. The dedicated telephone line for incoming calls only, which is used
by the civil police to call back and remains open thereafter.
RVP. Point to which all resources arriving at the outer cordon are marshalled, directed for
logging, briefing, equipment issue and deployment further forward if required.
RVP Officer. Civil police officer responsible for the routine of the RVP.
Rest Centre. Building designated by the local authority for the temporary accommodation
of evacuees.
Senior Investigating Officer. The senior detective officer appointed by the OIC to
assume responsibility for all aspects of the civil police investigation.
ANNEX H TO
SECTION IV TO
CHAPTER 7
GENERAL PRINCIPLES OF INCIDENT MANAGEMENT
General
1. Although each incident will be different in nature, it is possible to lay down certain
principles that will be common to all.
Evacuation
2. Evacuation of a building or area may become necessary as a result of the discovery
of a suspicious item, a warning, or in consequence of an explosion. Once ordered, the
evacuation must be effected quickly, but in a controlled and co-ordinated fashion.
4. Area to be cleared. The area to be cleared will depend upon the nature of the
incident:
a. Suspect IEDs
b. Explosion. At least 100m from the extremity of the scene of the explosion.
5. The size of the area will also be influenced by topography and secondary hazards,
such as fuel or a large expanse of glass. Due consideration should also be taken of likely
blast effects.
6. Method of evacuation.
a. Direction. Starting at the scene of the incident, work outwards. In the case
of suspect devices, avoid evacuating past the object or being in line of sight.
(3) Where to go, including exit points and the route to, and location of,
the Evacuation Assembly Point. Routes should be chosen to avoid
confusion or bunching and that avoid potential hazards such as plate glass
or windows.
(2) Carry out a quick visual search of their immediate work and living
areas.
(4) Leave the area and proceed to the evacuation assembly point.
(4) Establishment should avoid the regular and routine use of the same
assembly point as part of exercises or in response to threatening telephone
calls.
Cordon
6. The cordon area may be divided into the inner and outer cordons.
(1) Size. The size of the area to be cordoned will depend upon the
nature of the incident, but it should encompass the entire danger area and in
particular the area that has been cleared and evacuated. It is easier to
contract a cordon at a later stage than to expand it.
Control
7. The following command and control elements should be established in response to
any incident:
(3) Ensure that full briefings are given to the civil police, EOD,
Command staffs, and Focal Point depending upon local SOPs.
Once control of the incident has been passed to the civil police incident officer, the
incident commander should remain with him to act as a liaison officer.
(1) The point of contact for specialist agencies and the emergency
services.
(2) Located in a building equipped with telephones and radios and may
often be a custom built command post such as a control room or guard
room.
Alternative ICP locations should be identified for activation, should the primary
ICP be located in a potential danger area.
(7) Torches.
e. Rendezvous Point (RVP). The RVP is the point to which the civil police,
EOD and other emergency services will report before being directed forward to the
ICP or FCP. The RVP should:
(2) Have adequate access and parking space for a large number of
vehicles.
f. Briefing
(1) Once control of the incident scene has been established an area
should be nominated for briefings to take place. Ideally, the briefing area
should be located close to the ICP.
(2) A detailed briefing should be prepared for civil police and EOD,
detailing the circumstances of the incident and all actions that have been
taken.
Terminology
8. Standard ACPO Emergency Procedures Terminology is detailed at Appendix 1 to
Annex G.
APPENDIX 1 TO
ANNEX H TO
SECTION IV TO
CHAPTER 7
ACTION UPON DISCOVERY OF A SUSPECTED IED
General
1. If a suspicious object is discovered that could be an IED and its presence cannot be
readily explained it is to be treated as a genuine device and must not be touched or moved.
Either an object is suspicious or it is not. There is no such thing as a possible suspect IED.
2. Attempts to establish ownership of the object or the identity of the person who
placed it should continue, but should not take precedence over immediate response drills.
4. Phase Two - Clear. Having confirmed the presence of a suspect IED, all personnel
should be evacuated from the surrounding area. The size of the area to be cleared will
depend upon the nature and size of the object, together with any secondary hazards that
may be present; as a guide the following distances should be observed:
5. Phase Three - Cordon. A cordon should be established around that area that has
been cleared, to prevent personnel entering into the danger area.
a. Continue attempts to identify the owner or person who placed the object.
Consideration should be given to making suitable public address system broadcasts.
c. Issue suitable briefings to the civil police, PSyAs and Command security
staff, local security unit and Focal Point as may be appropriate.
APPENDIX 2 TO
ANNEX H TO
SECTION IV TO
CHAPTER 7
ACTION SHOULD AN IED EXPLODE
Explosion after Evacuation - No Casualties
1. The Cordon should be maintained. Access to the area of the explosion is to be
restricted to specialist personnel, e.g. EOD and the civil police.
2. The Fire Service may be required to fight any fires that may threaten undamaged
buildings provided this can be achieved without putting personnel at risk from other IEDs.
b. PSyAs and Command security staff, local security unit and Focal Point
(depending on SOPs).
b. Those rescue personnel approaching the seat of the explosion should move
in on a designated approach path and exit by the same route. This will reduce the
risk from other IEDs and minimize the possibility of contaminating or destroying
evidence in the debris.
APPENDIX 3 TO
ANNEX H TO
SECTION IV TO
CHAPTER 7
ACTION IN THE EVENT OF A MORTAR ATTACK
Immediate Response Drills by Gate Guards or Patrols
1. It is likely that gate guards or patrols will be the first to be aware of a mortar attack.
Their immediate response should be to activate the attack alarm or relay a message to the
security control by radio.
2. The gate guard or patrol is then to take cover and attempt to count the reports from
the base plate and the reports of bombs exploding. This information is to be reported
without delay to the Security Control with details of the area attacked and the direction from
which the mortars were launched, if this can be assessed.
4. Take cover.
(1) The civil police using 999. Request the civil police to:
(2) PSyAs and Command security staff, local security unit and Focal
Point (depending on local SOPs).
b. Keep personnel under cover. There is no laid down time for remaining in
cover. However, the commander on the spot should anticipate a 2 phased attack
that could last 15 minutes.
d. Once the base plate has been located, the area around the base plate to a
radius of 300m and the area under the flight path and the impact area to a radius of
100m must be cleared of personnel and cordoned off. Ensure that no attempts are
made to touch the base plate or any blinds.
e. Once casualties have been dealt with and the area secured, the control drills
that are to be followed are the same as those for an IED.
7. Personnel who are aware of the existence of unexploded bombs or blinds are to
inform the Incident Control Point immediately.
APPENDIX 4 TO
ANNEX H TO
SECTION IV TO
CHAPTER 7
ACTION IN THE EVENT OF A TERRORIST SHOOTING
ATTACK
General
1. Armed personnel coming under fire from a terrorist gunman within establishment
perimeters should respond positively, operating within the authorized and relevant ROE
JSP and according to establishment plans and orders.
a. Contact location.
c. Casualties.
4. Clear the area. Take whatever follow-up action may be necessary to clear and
secure the area and ensure there is no further threat.
5. First aid. Apply first aid to any casualties and call an ambulance.
6. Hot pursuit. Action to pursue and apprehend the gunman can only be taken within
the provisions of JSP 385. NB, This does not apply to Scotland. If hot pursuit has to take
place beyond establishment boundaries, consideration must be given to the danger posed to
the general public and the ability of the local police to respond. If such action is successful,
the gunman should be arrested and held until handed over to the civil police.
7. Inform civil police. Inform the local civil police (and the MDP or Service police if
stationed at the location), notify the local security unit, PSyA or Command security staff.
All relevant police forces should be informed of the precise nature and location of the
incident, although the primacy of the civil police in the investigation must be respected. In
addition, it should be made clear whether there are other suspects or vehicles and, if so, full
descriptions given where possible.
Subsequent Action
8. Clearance. Check the establishment for any devices. Do not touch discarded
weapons or equipment. Be aware of possible booby traps.
9. Cordon. Isolate the scene and place a cordon around the firing point area and the
contact point until the civil police arrive. Thereafter, act on their instructions.
10. Control
a. Maintain a log of the sequence of events for a subsequent full report and for
use at any subsequent enquiry.
11. Witness information. Ensure that any witnesses, military or civilian, do not leave
the scene before the police arrive. If a Service person or MDP officer has carried out the
shooting, ensure that the individual remains under escort until the civil police arrive. (The
individual who fired is likely to be in a state of shock and should, if possible, be escorted to
a nearby building rather than required to remain exposed at the scene).
12. Evidence. Take action to preserve all evidence in the immediate area as well as at
the scene (including spent ammunition cases). The scene of the incident should not be
interfered with except for safety reasons until the civil police are present. Weapon(s)
should not be touched until a police authorized firearms specialist is in attendance.
13. Reporting. Inform PSyAs and Command security staff, local security unit and
Focal Point as required by local SOPS.
14. Brief personnel. Brief all Service personnel and their families living in the
immediate area on:
15. Press statement. HOE should, if necessary, issue a short press statement
confirming an incident has taken place. A standard statement for this purpose is provide
below. HOE should liaise with the police and their Command Media Ops staff over the
further release of public information. No personal details of those involved should be
given. No other personnel should make any statement to the media.
17. In normal circumstances an individual should provide information that may have an
immediate bearing on the apprehension of terrorists, the saving of life or the prevention of
damage to property.
20. Obtain the advice and assistance of the SMO or retained Civilian Medical
Practitioner to ensure that the person responsible for the shooting is assessed for the effects
of stress or any other medical condition resulting from the incident.
APPENDIX 5 TO
ANNEX H TO
SECTION IV TO
CHAPTER 7
ACTION IN THE EVENT OF A PROXY BOMB ATTACK
General
1. Proxy bombs can explode any time after being delivered, immediate response drills
therefore must be implemented quickly.
2. The driver of a proxy bomb may well be acting under duress. The individual must
be handled firmly but politely and is a potentially valuable witness.
b. Attempt to persuade the driver to drive the vehicle to a place where the
explosion may cause less damage. Areas to which vehicles can be driven should be
a previously designated part of the establishment identified in the contingency plan.
e. Inform the civil police using 999 and send a telephone Incident Report.
f. Inform the PSyA or Command security staff, local security unit and
Focal Point depending on local SOPs.
ANNEX I TO
SECTION IV TO
CHAPTER 7
AIDE MEMOIRE FOR EVENT SECURITY OFFICERS
(ESOS)
1. This Aide Memoire is designed primarily for the use of non-specialist ESOs
nominated to cover PMEs off MOD property. ESO responsibilities for PME on MOD
property should be overseen by the ESyO.
3. Five weeks before the event. Contact the civil police to discuss detailed security
arrangements. Points should include:
c. Protection of transport.
d. Control of access to the venue from the moment any search beings or, if no
search is required, when it is opened to the public until all participants are
dispersed. (Unauthorized personnel should not be admitted once the clearance
search has been started).
f. The roles of Service personnel provided for security duties such as the
protection of transport.
a. Transport.
b. Dress.
c. Security personnel. Ensure that unit personnel are organized to meet the
number agreed with the civil police. If other support was requested ensure it is
being provided.
5. Shortly before the event. Brief all personnel on the general security plan ensuring
that:
8. On arrival. Contact the senior civil police officer on arrival and introduce your
security personnel. If possible, together with the senior civil police officer, detail them to
their duties.
9. During the event. Visit your security personnel to ensure all is well.
10. After the event. Ensure that, in accordance with the overall civil police plan, your
security personnel remain on duty until all Service personnel are withdrawn.
11. In the event of an incident. In the event of an incident assist the senior civil police
officer, where you can, in handling the matter.
12. Post event action. If any aspect of the security plan was not satisfactory, inform
the chain of command.
APPENDIX 1 TO
ANNEX I TO
SECTION IV TO
CHAPTER 7
NOTIFICATION OF A PUBLIC MILITARY EVENT (PME)
IN GB
1. Military Reference….................……………..Date....................….......
Command SyO..................……….........................................................
From:
.................................…..............................................…………........…
............................................................................................……………
............................................................................................……………
Start.....….........….…………...…
Finish......................…....…….…
Date of Leaving.................................…………………………………..
............…………………..................................................................................
........................................…………………......................................................
(If less than 6 weeks notice is given the event may not be policed)
...................................................................................…………………...........
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
...................................................…………………...........................................
.........................................................................................………………….....
............................................................................................…………………..
............................................................................................…………………..
9. If a March or Parade:
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
c. Location of Dais...……………............................................................
............................................................................................…………………..
............................................................................................…………………..
b. Sponsor……...................................................................……………..
b. At the Event..................................................................………………
a. To be used....................................................................……………….
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
b. Parking Arrangements.................................................…………….....
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
16. Publicity:
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
b. Follow up publicity.....................................................………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
Rank/Name Appointment
....................................... .......................................
....................................... .......................................
....................................... .................…...................
....................................... .................…...................
....................................... .................…...................
....................................... .................…...................
....................................... .................…...................
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
............................................................................................…………………..
Signed............................…… Name/Rank/Appt..............................………
APPENDIX 2 TO ANNEX I TO
SECTION IV TO CHAPTER 7
PME Acknowledgement Slip
(to be completed by appropriate Civil Police Force HQ)
1. To: .................…….......…......................................................………
2. From: .........…........…….….......................................….....................
Reference............................. Venue...............................…..……..
a. A search will be conducted and full Police cover will be given throughout
the Event.
c. The event has been noted and local Police Officers have been informed.
6. Your Civil Police contact for the security arrangements for the event is:
APPENDIX 3 TO
ANNEX I TO
SECTION IV TO
CHAPTER 7
NOTIFICATION OF A PUBLIC MILITARY EVENT
OVERSEAS
To:
HQ Comd )
From: Reference:
2. DATE OF EVENT AND ON-SITE REHEARSALS (If less than 6 weeks state
reason for late notification):
3. LOCATION OF EVENT
b. Numbers participating:
d. Event Security Officer (ESO) (Responsible for civil police liaison and
security organization - to include telephone numbers)
e. Overall ESO (If other Service units are involved in the event) (3):
6. TRANSPORT ARRANGEMENTS
a. Transport to be used:
7. TRAVEL ARRANGEMENTS
a. Outward journey.
b. Return journey.
8. ACCOMMODATION ARRANGEMENTS
a. Changing accommodation:
9. PUBLICITY
NOTES:
(1) Duty (Include details of type of activity, i.e. marching band, concert band, display team etc). Service,
community, charity or fee-paying engagement.
(3) This may be decided subsequently in conjunction with the other Services if appropriate.
APPENDIX 4 TO
ANNEX I TO
SECTION IV TO
CHAPTER 7
OPEN DAY SECURITY PLANS
1. The style, format and structure of the open day security plan will be dictated by
local circumstances; however, it should contain the following essential elements:
(2) The location and arrangement of key elements of the open day, to
include the crowd line, car parks, static equipment displays, VIP and
Service enclosures, trade and exhibition stands etc.
(3) The location of access gates and physical barriers, including the
erection of temporary obstructions and fences.
g. Arming arrangements.
b. Public car parks. The siting of public car parks will be dictated by the
layout of the establishment; however, public car parks are not to abut static
equipment displays or public buildings so as to avoid collateral damage in the event
of an explosion. Additionally, consideration is to be given to:
(1) The provision of 'fire lanes' within the car park to allow easy access
for emergency vehicles.
(2) The provision of a dedicated and secure parking area for VIP
guests.
(1) Trade stands and displays are to be sited far enough away from
static equipment to avoid collateral damage in the event of an explosion.
(2) All trade and exhibition stands are to display a locally produced
certificate of authority to trade or display.
(3) A member of the security staff is to brief all traders and exhibitors
upon arrival about basic security precautions to be observed on the
establishment. In particular, the briefing should include:
e. VIP and dedicated Service enclosures. Facilities provided for VIPs and
enclosures set aside solely for use by Service personnel and their families, such as
mess enclosures, are to be the subject of specific security precautions, to include:
(3) The briefing of staff employed therein on the need for increased
vigilance within the area.
(2) Buildings that are in use but not open to the public.
e. Access to the non-public area. Access points linking the public and non-
public areas are to be manned by Service personnel who are to exercise strict
control of entry, including rigorous identity checks of any person seeking entry to
the non-public areas of the establishment.
(2) Exercising strict control of entry on all buildings that are in use.
APPENDIX 5 TO
ANNEX I TO
SECTION IV TO
CHAPTER 7
OFF SITE EVENTS
Off Site Events (Excluding PMEs) - Physical Security General
1. The terrorist threat increases the risk to any MOD activity held off MOD
property, particularly where members of the Armed Forces are involved, and when any
members of the public have prior knowledge of the event. If the terrorist threat to an
identifiable MOD organized or sponsored Off Site Event (OSE) is assessed at
SIGNIFICANT (Level 3) or higher, whenever possible the event should be held on
MOD premises.
Action to be taken
3. At the initial planning stages of an OSE, prior to the booking of a venue, an
Event Security Officer (ESO) is to be appointed. The ESO is to inform the
Establishment Security Officer (ESyO) of the proposed OSE. If the ESyO requires
additional advice, especially where the event may fall under the definition of a PME, this
is to be sought through the chain of command or from the appropriate PSyA or
Command security staff. ESyOs are to maintain lists of all current OSEs within their
locality, keeping the local police informed as appropriate. In addition, ESyOs for all
OSEs sponsored by the Royal Navy are to contact their local RN Area Security Team.
4. Maintaining the anonymity of the MOD connection is the most important factor
in OSE planning; from the time of the initial booking or enquiry, to the conclusion of the
event. When making the booking the venue should be told not to record or publicise the
MOD connection (for example on notice boards or directional signs). Where possible
the booking should be with an address that does not reveal any MOD or military
connection. All those attending the function are to be forewarned to use the event’s
pseudonym when contacting the chosen venue. Additionally, event organizers are to
note the following:
b. Loose talk in public areas of the venue that may identify the participants
with the MOD should be avoided.
i. Service transport is not to be used to travel to and from the venue unless
it has been ‘civilianized’ and service drivers should not wear uniform. Security
of vehicles will normally remain the responsibility of the owner or driver.
ANNEX J TO
SECTION IV TO
CHAPTER 7
GUIDANCE ON COUNTER TERRORIST SEARCH
AWARENESS SECURITY MEASURES (CTSASM)
Individual CTSASM
1. General. Individuals can play a vital part in ensuring their own safety, and that of
others in their immediate vicinity, by being alert and punctilious in their application of
CTSASM.
(1) Before getting into a vehicle that has been left unattended.
(3) Entering an unguarded place of work that has been left unoccupied.
Establishment CTSASM
4. CTSASM for establishments are both preventative and protective. The following
measures applied at unit level by search aware personnel should greatly increase the unit's
level of security:
(1) Identifying potential observation points and lines of sight into and
within the location.
g. Sealing. Where possible, those areas and spaces that might be used to hide
bombs should be searched and sealed so that unauthorized entry can be more
readily detected.
a. Identify those buildings that are most vulnerable and which terrorist might
wish to attack, i.e. living accommodation, messes, guardroom, NAAFI.
(3) Low Risk (GREEN) i.e. buildings that are rarely occupied such as
garages and stores.
6. Stage Two. Use this colour system to plot the vulnerability assessment onto a plan
of the establishment. Colour coding will provide priorities for search, i.e. RED area first.
7. Stage Three. Sub-divide the establishment into sectors providing the following:
b. These areas should be plotted onto search sector cards which are issued to
each search team by the search organizer. Each card should include any relevant
information for that given area of responsibility e.g. simplex lock combinations.
(Keep cards under lock and key when not in use).
Conduct of Search
8. Stage One. The search organizer assembles search team leaders and allocates
search tasks and sector cards. A record should be kept of potential team leaders who should
ideally have had previous search experience. It is recommended that search team leaders
with a detailed knowledge of particular areas should be given those to search.
9. Stage Two. Teams are assembled and briefed by their team leaders. Each team
should consist of up to 10 search aware personnel drawn from whoever is available within
the unit.
a. Buildings.
(1) Carry out an external search of walls, foliage, the roof and refuse
areas. Do not forget to search for disturbed ground where an IED may have
been buried in close proximity to an external wall.
(2) Search those internal areas that are easily accessible such as
ablutions, rest rooms, stairwells and corridors.
(3) Search those internal areas that are not easily accessible such as
accommodation rooms, false ceilings and attics.
(4) Search starting on the ground floor and clearing each floor before
moving up.
(b) They each carry out sweeps at floor, mid and ceiling level.
Be sure to search the middle of the room including any furniture.
Search Equipment
12. Search equipment should be easily accessible and possibly held in the guardroom
and should include:
a. Torches.
b. Telescopic mirrors.
c. Ladders.
d. Screwdrivers.
e. Sector cards.
g. Radios.
h. Safety harness.
i. Periscopes, endoscopes.
Search Advice
13. Search advice is available on request from the following sources. If in doubt as to
who to consult an approach should be made initially to the FSC at the appropriate HQ.
d. Police Search Advisers within the Home Department police and MDP.
SECTION V TO
CHAPTER 7
PERSONAL COUNTER TERRORIST SECURITY
MEASURES
General
07501. Certain terrorist organizations have shown that they may consider personnel with
MOD connections to be “legitimate targets”. During a terrorist campaign, therefore, all
personnel are at risk from attack. An attack could materialise at any time or place and
personnel need to remain vigilant even when at home or travelling.
07502. Within GB, the standard graded threat levels are also used to indicate the level of
threat to an individual. The definitions of the threat levels have been previously described
in Section I paragraph 07107.
Terrorist Targeting
07504. Terrorist organizations use open source material to obtain information for use in
targeting personnel. A wide variety of information sources are used for this purpose
including the media and publications such as telephone directories, electoral rolls, “Who's
Who”, the Service Lists and Service journals.
07505. In addition, terrorists can be expected to conduct general observations and target
reconnaissance of personnel or target areas such as Service families accommodation, places
of entertainment used by personnel and routes used to travel to and from work.
see as appropriate to their circumstances bearing in mind the level of threat that pertains at
the time.
Anonymity
07508. When a serious terrorist threat has been identified, personnel should be alert to the
dangers of unnecessarily identifying themselves as being members of the MOD or Armed
Forces. The following list, whilst not exhaustive, is intended as a reference guide to those
areas where identification with the Services could be avoided:
a. General.
(3) TV licence.
g. Absent Voting. The rules for those individuals that elect to vote by means
of a Service declaration remain unchanged. Those overseas can only vote by
proxy, while those physically in the UK but who are unable to vote in person, may
vote by either post or proxy. Those individuals that choose to register on a local
electoral register, and who are not registered as Service voters through a Service
declaration, will be able to vote either by post or proxy if they are overseas or away
from home during an election or are disabled. All personnel will need to contact
their local Electoral Registration Office directly if they wish to register under these
arrangements.
h. Council Tax. A legal right exists in the Council Tax legislation for
individuals who believe themselves to be at risk of violence to request anonymous
registration with local authorities. MOD has been informed that local Council Tax
registration authorities are likely to treat applications from Service personnel for
anonymous registration favourably. The following advice is therefore given to
establishments, units and individuals in GB:
i. Schools. Parents of children at boarding school should warn the staff of the
school of the need, especially in periods of high threat, to exercise careful control
over information that may identify Service parents.
l. Mailing lists. If personnel find their names on mailing lists, these can be
removed by applying to the Mailing Preference Service, 1 Leeward House,
Plantation Wharf, London, SW11 3TY or FREEPOST 22 London, W1E 7EZ. This
firm will normally assist where the individual is on a list maintained by one of the
firm's subscribers. There is, however, no guarantee that any name can be removed
from all lists world-wide.
or
or
Action in GB
07510. The Security Service informs D Def Sy and provides a threat assessment if
intelligence is received that a particular individual is targeted by terrorists. In addition,
advised by the CEAG, D Def Sy nominates a small number of personnel who match
interdepartmental criteria developed from the factors at sub-paragraphs 07509 a to c above,
for assessment by the Security Service. Vulnerability and risk are taken into account.
Those assessed to be at or above Significant threat (level 3) (see paragraph 07107 for
definition) are categorized High Threat Personnel (HTP) and certain essential protective
security measures (PSM) are authorized for them. These are in line with interdepartmental
standards and are additional to or subsume any measures provided under the terms of
Chapter 5. If armed protection is justified it is provided by the appropriate Home
Department Police Force (HDPF). A list of HTP is published periodically by D Def Sy.
d. Physical protective security measures at the home and place of work of the
HTP.
Close Protection
07513. Close Protection (CP) is the armed protection by Service police or other specially
trained personnel of an individual (the “principal”) against unconventional, direct, harmful
attack at close quarters. Its sole aim is to protect the principal. In conventional military
operations or where enemy Special Forces (SF) may be deployed, CP is a matter for the
operations staff advised by the intelligence staff. The intelligence staff provide assessments
of the threat upon which decisions are made. Armed protection of HTP in mainland GB is
the exclusive responsibility of HDPF. Where there is a terrorist threat or the risk of attack
by other violent extremists in NI or overseas the security staff should advise whether CP is
appropriate. CP will usually be appropriate for HTP assessed to be at threat levels 1 or 2.
a. Alertness. HTP and their families and staff should be inquisitive and alert
at all times for the many sources of danger. The security staff, security unit POC,
the HTP and his personal staff should examine the individual's security
arrangements from the terrorist viewpoint to see whether they can detect any
weaknesses.
Home Security
07516. Guidance on personal security at home is given at Annex A to this Section.
ANNEX A TO
SECTION V TO
CHAPTER 7
GUIDANCE ON PERSONAL SECURITY AT HOME
General
1. This guidance is designed for personnel at higher threat (HTP) but all should draw
on it as necessary to suit their own particular circumstances. This Annex is designed to be
read by the individuals concerned.
Anonymity
3. You should avoid giving information about where you are going and what you are
doing. You should aim to achieve anonymity outside Service establishments, particularly
where you live, shop, or take recreation. In particular, you should:
a. Ensure that military stores such as MFO boxes and items of uniform are not
left outside your house or in your private vehicle where they can be seen by
strangers.
f. Arrange for your private and personal mail to be addressed to your office
and not to your private address. Ask anyone who may correspond with you to omit
your rank from any mail sent to your private address.
c. If a key is lost in suspicious circumstances, report the fact and have a new
lock fitted.
d. Working keys should never carry any form of written identification. If you
need to identify keys, a system of colour coding could be used.
e. Never leave keys under the mat or in other obvious hiding places.
b. When answering the door, do not put on the hall light. An external light in
the vicinity of the door should be kept burning during the hours of darkness, see
paragraph 7.
c. If you have glass panes in the door, prevent observation by, for example,
fitting a thick curtain.
f. Make a safety check each night before retiring to ensure that all doors and
windows are properly closed and locked.
a. Consider locking drive gates with a security lock to prevent vehicle entry.
Lighting
7. At least one strong light should be kept burning in the area of the front door during
hours of darkness, so that you do not signal your approach to the door by turning on a light.
Remember:
a. If you go out at night prepare for your return before leaving. Turn on any
outside approach lights and lights in the garage, leave a light burning in the house in
a regularly used room - not just the hall light. Consider using a light plugged into a
time switch that will simulate activity within the house; do not overlook the need to
vary timing and position.
Telephone
7. Site your telephone in such a position that you cannot be observed through
windows or doors when using it. Consider having an extension in the bedroom. Also:
d. Telephones fitted with BT caller display and call return services can
identify the number you call from. Consider having your telephone blocked from
this service. Alternatively, by dialling 141 before the number called your number
will be protected. This service may be useful for the tracing of anonymous or
threatening calls - by dialling 1471 immediately after the call is received.
a. Arrange fixed times for workmen to call. Check their identity and never
leave them alone in the house. If they are unexpected, call their works office.
d. Check newly engaged staff. If additional staff are engaged for a function
they should be vouched for and identified by a responsible person.
e. Deliveries by tradesmen
Mail
10. Familiarize yourself with action to be taken on receipt of a letter or package that
might contain an explosive device.
11. Guidance on the advice you should give private correspondents addressing mail to
you is given in paragraph 3.
Alarms
12. Consider fitting a 'panic alarm' bell to the outside of the house with switches
upstairs and down. Consider an alarm to a neighbour's house.
14. Vary your times as much as possible for sporting activities, e.g. visits to a golf club,
tennis courts, etc. Do not regularly go walking alone in the country, or go on lone fishing
trips, etc.
16. Instruct children never to admit strangers to the house. As soon as they are able to
learn, teach them when and how to alert police or neighbours.
f. Tell you at all times where and with whom they will be, when away from
the house.
g. Never discuss what you do and to tell you if they are ever questioned about
you by anyone.
19. Young children should be accompanied to and from bus stops, where necessary.
Also:
c. Do not allow younger members of the family to collect or open your mail.
Absence
20. If you leave your residence for a period of days, ensure it is locked and secured.
Arrange for visits to be made by the police and neighbours. On return be suspicious. Do
not push excessively against a door that normally opens easily.
ANNEX B TO
SECTION V TO
CHAPTER 7
GUIDANCE ON PERSONAL SECURITY WHEN
TRAVELLING
1. The following guidance is intended to offer general advice to personnel when
travelling. Personnel should adopt measures as appropriate to their circumstances, the
assessed level of terrorist threat and Alert State.
a. Destination.
b. Person to be visited.
c. Method of travel.
3. Avoid travelling in uniform including to and from work. If the wearing of uniform
cannot be avoided, it is recommended that a civilian jacket or coat is worn to cover the
uniform when in the vehicle (mixed dress in public is not encouraged). NEVER hitch hike
in uniform.
4. Never allow yourself to be driven by anyone who is not known to you other than on
accredited public transport.
5. Be alert for anything unusual or out of place at the beginning and the end of the
journey.
8. Restaurant, hotel and travel reservations should be made without reference to rank,
title or, where avoidable the Services.
(1) Know your vehicle thoroughly, when searching for an IED you
must know what should be attached, inside or underneath.
(3) Never leave your vehicle unlocked. Remember to secure all the
doors, sunroof, bonnet and boot. Use the alarm or immobiliser if fitted.
(5) Secure bonnet locks and lockable petrol caps should be fitted and
used whenever possible.
(7) Never carry other people's baggage or packages unless you have
personally checked the contents.
(9) Carry a torch with you to check your vehicle after dark. Do not
leave the torch in the vehicle.
(10) Switch off the courtesy light inside the vehicle to avoid
illumination when getting in and out.
(11) Always try to park the vehicle in a lockable garage at home and at
work. If no garage is available, leave it in a supervised car park or where
the general public can see it.
(2) Looking at the doors, boot and bonnet for signs of tampering.
(4) Checking around and behind each wheel and inside the wheel arches.
(6) Unlocking the vehicle and checking the driver’s area. Checking inside,
including under seats, the glove compartment, under the bonnet and inside the
boot area.
(7) If any signs of tampering are noted or anything suspicious is found such
as unusual objects inside the vehicle or attached and out of place.
STOP
No attempt should be made to touch, start or move the vehicle. Keep all persons
away from the vehicle. The police should be called immediately.
c. On the move.
(1) Ensure that windows are fully closed when the vehicle is parked
and opened only enough for ventilation when you are driving.
(2) Look forward along the row of vehicles parked in the street for
anything of a suspicious nature and through the driving mirror for following
vehicles.
(4) Conform to traffic flow but keep your distance from the vehicle in
front.
(7) If you suspect that you are being followed, try not to allow yourself
to be overtaken or forced off the road. Take a known detour, and if still
suspicious, stop at the nearest police station or Service establishment.
(8) Ensure that you have sufficient fuel to avoid stopping at unknown
or isolated filling stations.
(10) Beware of accident scenes in isolated areas; these may have been
staged.
e. At sea, try to obtain your own cabin and ensure that the door is kept locked.
12. Hotels.
a. If you have to visit an area frequently, avoid using the same hotel on each
visit.
b. Do not meet visitors in your room who are unknown or not vouched for.
Meet them in a public room where others will be present.
13. Use of Service issued baggage. The use of Service issued baggage when travelling
could identify the carrier as a Service person. Personnel are therefore advised:
a. Not to use items of Service issued baggage for leave and off-duty travel
(except the 'civilianized' holdall).
APPENDIX 1 TO
ANNEX B TO
SECTION V TO
CHAPTER 7
ADDITIONAL SECURITY PRECAUTIONS FOR STAFF
CAR DRIVERS
1. The security precautions listed at Annex B are generally applicable to all drivers.
The role of staff car drivers and their responsibility for passengers raise additional security
considerations.
2. Units should examine the need to brief staff car drivers and potential passengers on
the additional points outlined below:
b. Waiting. Staff car drivers may spend significant periods of time waiting.
They should be aware that a more effective way of guarding a vehicle is to observe
it from a sensible position outside the vehicle rather than by sitting in it.
c. Actions on the move. Drivers should be particularly vigilant and adopt the
following procedures:
(2) There must always be room to manoeuvre the vehicle. This means
not getting boxed in by other vehicles or caught in traffic jams.
ANNEX C TO
SECTION V TO
CHAPTER 7
SECURITY AT PLACES OF ENTERTAINMENT
1. In GB, places of entertainment (e.g. public houses, wine bars, restaurants and even
theatres) have in the past been attractive targets for terrorist attack. The measures advised
below should be adopted in places of entertainment as appropriate.
3. Avoid talking about matters that identify you as a member of the MOD or Armed
Forces.
4. Do not wear uniform, unit ties, blazers with official crests, T-shirts or sweatshirts
with MOD logos or any item of clothing that would identify you as a member of the MOD
or Armed Forces.
5. At large group gatherings, an individual, who should not drink alcohol, should be
appointed to remain on watch both inside and outside the place of entertainment; this is
known as SHARKWATCH.
7. Repeated and regular use of the same place of entertainment should be avoided.
8. Do not use Service or MOD transport to travel to and from the venue unless it has
been civilianized.
9. Do not place anything in or on your vehicle that would identify you as a member of
the MOD.
ANNEX D TO
SECTION V TO
CHAPTER 7
DEALING WITH THE MEDIA
1. Individuals. Publicity is an important means of informing the public and gaining
recognition for the MOD and for efforts of individual personnel. However, all personnel
should, in their relations with the media, ensure that they do not divulge information that
would assist terrorists to target either themselves or other members of the MOD. The
following provides some general guidance:
a. Individuals are always free to decline to give any information to the press.
c. Avoid giving ranks and addresses in public notices in the personal and
social columns of newspapers.
d. Individuals who feel that they are at particular risk by virtue of the branch
of the MOD to which they belong, or because of operational duties they have
performed, who have agreed to be involved in a story in a MOD magazine or
newspaper, should ensure personally that biographical detail is cleared with them
before publication.
3. Service publications editors. The editors of Service publications should take care
to avoid inadvertently providing information that could be useful to terrorists. Guidance on
security matters is available to editors of Service publications and establishment magazines
from MOD and Command Media Ops and security staffs.
5. Honours and awards. Staff responsible for gazetting and publicising honours and
awards are to ensure that, where necessary, suitable arrangements are made to protect the
anonymity of individuals whose background makes them especially vulnerable to terrorist
attack.
a. The names of those at one-star and below are not normally to be released.
(1) Intelligence.
7. Any other organization that feels that it deserves special status should, consult D
Def Sy through the chain of command.
ANNEX E TO
SECTION V TO
CHAPTER 7
SURVIVAL IN HOSTAGE SITUATIONS
1. Good personal counter terrorist security and anonymity as described elsewhere in
the Defence Manual of Security (JSP 440) are the most effective counter measures to
avoid targeting and therefore becoming a victim in a hostage or kidnapping situation.
2. Very few military personnel have been kidnapped or held hostage in the past.
However there has been a general increase in kidnapping world-wide and there is
therefore an increased possibility of military personnel being held as human shields
during humanitarian or peace keeping operations.
3. The security advice contained in this Annex is based on the Foreign and
Commonwealth Office (FCO) Brief Guidance Notes on Personal Protection Measures
Overseas.
General
4. Nobody can predict when, where or against whom terrorists will strike.
Although senior officers may be singled out as an attractive target, because of their high
publicity value, all ranks must be aware of the danger. For this reason it is important to
retain anonymity within the local community and to keep a low profile, especially when
off duty. Service personnel must make every effort to keep up to date, through their
designated overseas security authority (this must be decided prior to deployment), with
any changes to the threat. This is reflected in the Overseas Terrorist Threat Assessment
List (OTTAL), which is disseminated by MOD D Def Sy. However, despite a thorough
awareness and appreciation of the terrorist threat, together with the application of
preventative measures, kidnapping can still take place, therefore all ranks should be
aware of survival techniques if taken hostage.
5. Once captured the hostage is on his or her own, usually in total isolation. Their
immediate reaction and subsequent behaviour during captivity can be vital in leading to
their eventual release unharmed. The following notes have been prepared from
debriefings of hostage victims.
Moment of Capture
6. This is generally one of the most critical and dangerous parts of the abduction
phase. Any sudden or unexpected movement, noise or cry for help is likely to provoke a
violent response from the terrorist, which could prove fatal to the captive. In a hostage
situation tension will remain high until the terrorists are sure that they are in control.
They will attempt to gain a psychological advantage by putting the captive on the
defensive.
Resist or Submit?
7. Whether to resist or surrender to kidnappers must remain a personal decision.
You should weigh carefully the danger of resistance in the face of what may be
overwhelming odds. If you decide not to resist, assure the abductors of your intention to
co-operate, particularly during the abduction phase. Remember that resistance is
extremely risky because the terrorists are already mentally prepared to meet this
contingency and are acting under a great deal of tension during the first few moments of
the operation.
Stay Alert
9. Try to occupy your mind by noting sounds, direction of travel, passage of time,
conversations of the terrorists and any other information which later could lead to their
capture and conviction.
Living Conditions
10. The living conditions of hostages vary greatly from incident to incident. In
general hostages are detained in cramped conditions and in isolation. There will usually
be a complete lack of privacy and conventional toilet facilities may not exist.
Maintaining dignity and self-respect under such conditions will be difficult, but such
standards are important for survival.
Fear
11. Fear is the most important tool of terrorists. They use it to control, intimidate
and wear down the hostage, negotiators and anyone sympathetic to the victim's plight.
Fear may be further induced by the captors loading and unloading weapons in the
presence of the hostage, displaying excesses of temper, resorting to physical abuse and
staging mock executions. Fear of dying is very real and it can become overwhelming,
particularly during the early stages of captivity. Although death is a possibility
remember that, statistically, the odds favour a hostage being released.
Time
12. Experience has shown that the more time that has elapsed the better are the
chances of the hostage being released or rescued. For this reason, although the passing
of time in captivity is depressing, it is to the hostage's advantage.
Boredom
13. To ward off the effects of boredom and keep up morale, the hostage must
discipline himself to take daily physical exercise and engage in creative mental activity
such as reading, writing or any other pursuit that exercises the mind. Because of the
likely cramped space, physical exercise may be reduced to running on the spot, push ups
and sit ups. Isometric exercises may have to be used to overcome cramped space or
physical restraints.
Illness
14. A side effect of captivity for some hostages is illness caused by inadequate meals
or poor diet. Gastro-intestinal upsets or constipation may also be suffered. Though such
symptoms may be unpleasant they do not generally threaten life and the hostage should
not hesitate to complain to the terrorists, who normally want to keep their hostage alive
and at least reasonably well.
Rapport
15. It is important for the hostage to establish an early rapport with the captors.
Studies have shown that the more human their victims appear, the more difficulty the
captors will have in carrying out threats of violence against them. The display of family
photographs or discussions about children and family matters have, occasionally, been
instrumental in saving the lives of hostages. Of course, you must avoid giving the
terrorists any information, which they could use later to their advantage. This is a matter
of fine judgement, particularly for female hostages, and care should be taken not to give
the terrorists the wrong impression by becoming too familiar.
Rescue or Release
16. Most hostages who die are killed during rescue attempts. So it is crucial for
hostages to be particularly alert, cautious and obedient if they suspect that such an
attempt is close at hand. The terrorists may be extremely nervous during any
negotiations, especially if the process is long and drawn out. As the central figure in any
rescue attempt, the hostage must avoid all sudden moves, which would invite reaction
from the rescue force as well as from the terrorists. The natural impulse to stand up and
run must be resisted as it could easily be thought to be the action of one of the terrorists
by the rescue force. The hostage's safest course is to drop immediately to the floor and
lie as flat as possible. Carry out any request by the rescue force and remember that the
rescuers may not know you initially and they are trained to treat everyone as a suspect
until positively identified.
SECTION VI TO
CHAPTER 7
LEAVE AND TEMPORARY DUTY VISITS TO
NORTHERN IRELAND (NI) AND THE REPUBLIC OF
IRELAND (ROI)
General
07601. In order to protect Service personnel and to prevent the Security Forces becoming
involved in avoidable additional effort and danger, restrictions exist on the taking of leave
in Northern Ireland (NI) and the Republic of Ireland (ROI). Service personnel should be
well aware of the inherent risks involved and that while the security situation in NI remains
unsettled they would not wish to visit either country without good reason. Restrictions on
personnel taking leave and visiting on temporary duty have therefore been introduced and it
is essential that the rules and guidance laid down in this Section are observed. By doing so
unnecessary administrative effort and disappointment to individuals will be avoided. It is
the responsibility of the HOE to ensure that only eligible personnel are granted permission
to visit NI or the ROI whether on or off duty.
Leave in NI
07602. Regardless of any change in conditions of eligibility, notification or reporting, the
following is to be observed by all Service personnel taking leave in NI.
b. Service style or issued clothing and equipment, e.g. Service issue raincoats,
overcoats, holdalls, Service ties, blazers or badges, are not to be worn or carried.
Baggage labels showing Service particulars and badges and stickers on vehicles
showing military connections must be removed.
d. Regulations for firearms, including air and gas weapons, are published
periodically in DCIs/GAIs. HOE are to ensure that these regulations are brought to
the attention of personnel intending to travel to NI.
e. Personnel should not indicate that they work for the Services or talk about
their job or place of work.
(3) Has a parent or first relative, i.e. brother, sister or child, domiciled
in NI.
(4) Has urgent private affairs in NI that cannot be postponed and the
requirements cannot be met by a meeting outside NI or by correspondence.
Any cases of doubt are to be referred to security staff.
07606. The prevalent state existing throughout NI under the current assessed security
situation is Condition Restricted.
07607. As the security situation in NI changes it is sometimes necessary to place areas out
of bounds at short notice to all Service personnel, therefore, permission to take leave may
be withheld despite correct notification of the intended leave period and the eligibility of the
individual concerned. Establishments will be advised accordingly.
07609. HOE are responsible for ensuring that the notification by signal provides at least 21
clear days notice before the intended leave visit. Signals should be sent ROUTINE, except
in compassionate circumstances, when an IMMEDIATE signal is to be sent in addition to
the further actions required as detailed at paragraph 07613. Confirmation of receipt must be
obtained for all applications. Included in the confirmation will be whether authority is
granted or not and whether any specific instructions will apply.
a. To give the relevant Brigade HQ the opportunity to assess the risk to the
individual and advise the HOE that a visit may warrant postponement or
cancellation.
Leave Addresses
07611. Because of the rapidly changing security situation, Service personnel will only be
granted permission to stay at, or visit, private addresses that have been specified for
clearance at the time of the signalled application. Any intention to attend wedding services
and receptions or christenings etc, must be notified at the time of the original submission
and should include additional addresses and intended dates of visits.
07614. In addition to receiving a briefing prior to their departure on leave, all Service
personnel will be required to report in person for an additional security briefing, at either the
Security Advice Centre (SAC) RAF Aldergrove for RAF personnel, or the R IRISH
Battalion TAOR HQ of the area concerned, immediately upon arrival in the Province.
Personnel will be advised of the exact reporting requirement, by signal, to their parent
establishment prior to the move. On conclusion of the leave period Service personnel will
be required to book out by telephone with the SAC or TAOR HQ. Failure to attend the
security briefing may place the individual at increased risk and disciplinary action may be
taken against Service personnel who fail to comply.
a. Naval and Army personnel. The Brigade HQ in whose TAOR the leave
has been taken is to be informed by telephone.
07618. Service personnel granted frequent visitor status will be required to attend an initial
security brief with subsequent update briefs at regular intervals. The intervals between
update briefs will be at the discretion of the relevant Brigade HQ G2 staff.
07619. A deterioration in the security situation or of specific threats may result in the
withdrawal of status at short notice. Any abuse of the privilege will also result in the
immediate withdrawal of status.
(3) Green vehicle moves. Green vehicle moves are permitted on this
service.
07621. Personnel travelling to NI on duty visits are normally to travel by air to Belfast
International Airport (Aldergrove) or Belfast City Airport (Harbour).
Marriage within NI
07622. Service personnel wishing to marry in NI and who fulfil the conditions detailed in
paragraph 07605 should make a formal application to their HOE. Details are then to be sent
by CONFIDENTIAL letter to HQNI (SO3 G2(CI)), the Brigade HQ (SO3 G2) of the area
in which the marriage and reception is due to take place. RN and RAF (SAC RAF
ALDERGROVE) single-Service security staffs with security responsibilities for their
personnel in NI should also be included on the distribution. The letter is to be dispatched to
arrive at least 30 days in advance of the impending marriage containing the detail required
at Annex D.
07623. Personnel who wish to wear uniform during the marriage ceremony may only do so
with the prior specific authority of HQNI.
07626. Visits to defence contractors should not be made unless the matter cannot be dealt
with by correspondence or by a reference to a departmental head in NI. In all cases the
length and frequency of any visit is to be kept to an absolute minimum.
07628. Notification of any duty visit is to arrive in the signal format at Annex E at least 14
days in advance of the intended visit. Prior to embarking on the visit, visitors are advised to
contact either HQNI or the relevant Brigade HQ G2 staff for advice on the security situation
at the time.
07633. The accompanying party is to comprise a minimum of two Service personnel who
are to wear civilian clothes. Vehicles are to be secured whilst on the car deck of the ferry
and are to be thoroughly checked prior to disembarkation.
07634. Escorts will be provided from the ferry port to the ultimate destination in NI. This
requirement is to be indicated on the notification signal at Annex E.
07638. There are three 'states' affecting the eligibility for leave that apply to all, or part, of
the ROI and will vary according to the security situation in NI and the assessed threat.
These 'states' apply to presence in the ROI and should not be confused with conditions laid
down under normal single-Service regulations, for the entitlement to travel at public
expense.
b. Condition Restricted. This implies that there is some risk involved and
that details of all visits will be notified to the Garda Siochana (Police) by the
BRITMILREP Dublin. HOE permission should only be given to an individual who
has a genuine need to visit the ROI, who has a specific approved address to go to,
and who fulfils at least one of the following criteria:
(1) Was domiciled in the ROI up to the time of joining the Armed
Forces.
(2) Is married and the spouse would normally be domiciled in the ROI.
(3) Has a parent or a first relative, i.e. brother, sister or child domiciled
in the ROI.
(4) Has urgent affairs to settle in the ROI that cannot be postponed and
which cannot be met by a meeting outside the ROI or by correspondence.
As a guide to the application of this condition by HOE, personnel attending
as participants at legal proceedings would be eligible as would a groom or
bride (but not their guests) if there is a good reason why the marriage
cannot take place elsewhere. Where personnel wish to visit fiancées or
partners, the HOE is to be satisfied of the substantive nature of the
relationship and the necessity for the visit. Holidays, recreational activities
or sport do not qualify for leave under this state. Any cases of doubt are to
be referred to the BRITMILREP Dublin.
At the time of publication Condition Restricted applies for leave to all areas of the ROI.
Notification
07639. The BRITMILREP Dublin is to be notified by signal when Service personnel are
granted leave to the ROI by the HOE. HOE are responsible for ensuring that the
notification arrives 21 days before the intended visit, except in compassionate
circumstances or, exceptionally, when leave is granted at short notice. The BRITMILREP
Dublin will advise if there are any reasons why the leave should not take place, all
applications will be acknowledged. The signal should be addressed to BRITMILREP
Dublin using the format at Annex F.
Accomodation
07640. Holiday cottages, touring holidays, camping sites and caravan parks will not be
approved for leave visits under Condition Restricted. The BRITMILREP Dublin
maintains a list of approved hotels for the Dublin area which can be consulted. Hotels
North of the River Liffey in central Dublin will not normally be cleared for use.
Applicants are warned that they should seek advice from the BRITMILREP Dublin
before booking accommodation and making a financial commitment.
Notification
07641. All notifications are to be protectively marked RESTRICTED unless there is reason
to afford a higher protective marking. Notification for visits to the border counties of
Donegal, Leitrim, Louth, Monaghan and Cavan should also be copied to HQNI BFPO 825,
Signal address: NORIRELAND and for information to single-Service security staff with
responsibility for personnel in NI.
Briefings
07642. Before Service personnel go on leave to the ROI, the HOE is to ensure that they
are briefed by a member of the establishment security organization using the information
contained in Annex G.
07643. Events may occur during a visit that would make consultation with the
BRITMILREP Dublin necessary e.g. where an individual has been granted compassionate
leave to visit a sick relative who subsequently dies and the need to attend the funeral arises
or when an individual is sick at home and liable to remain in the ROI following leave
expiry date. Individuals are to be briefed to consult the BRITMILREP Dublin should such
a change of circumstances occur. Service personnel are therefore to be in possession of the
BRITMILREP Dublin telephone number when proceeding to the ROI.
Family Visits
07644. Service personnel are encouraged to adopt the foregoing procedures when members
of their families are planning to visit the ROI unaccompanied by them.
Recall Procedure
07645. The notification procedures above will ensure that the BRITMILREP Dublin is in a
better position to provide assistance in the event MOD decide to order the recall of all
Service personnel on leave in the ROI. In the event of recall, those responsible are to
ensure that OHMS envelopes or similarly indicative communications or telephone calls are
not sent or made to individuals on leave in the ROI.
security brief at Annex I applies. Activities that fall under the category of temporary
duty visits include:
e. Representational sport.
Accommodation
07649. BRITMILREP Dublin holds a list of approved hotels for the Dublin area.
Bookings should not be made through the Central Hotel Booking Service and care
should be taken to avoid compromising MOD or Service connections when making
reservations.
a. All Service personnel and MOD civilian staff, intending to visit NI or the
ROI either on leave or temporary duty, are to read and comply with the contents of
Section VI to Chapter 7 of JSP 440.
ANNEX A TO
SECTION VI TO
CHAPTER 7
BRIEF PRIOR TO VISITING NORTHERN IRELAND (NI)
ON LEAVE OR DUTY
1. This brief is to be provided to all personnel prior to travelling on leave or duty to
NI.
2. When on leave in NI civilian clothes are to be worn at all times. Civilian clothes
are also to be worn when travelling to NI, personnel serving on temporary duty are to wear
civilian clothes when off duty and outside the boundaries of their establishment.
3. Military style or issued clothing and equipment (e.g. raincoats, overcoats, holdalls,
Service ties, blazers and badges are not to be worn or carried. Baggage labels showing
Service particulars are to be removed.
4. Privately owned vehicles with registrations (e.g. NATO) that could identify the
occupants as being connected with the Services are not to be taken to NI. Badges and
stickers showing Service connections are to be removed.
5. Firearms regulations, including air and gas weapons, are different in NI, further
advice can be obtained from: Royal Ulster Constabulary, Explosives and Firearms
Licensing Department, RUC Lisnasharragh, Montgomery Road, Belfast, BT6 9JD.
6. Personnel are to exercise discretion at all times, maintaining anonymity about any
MOD or Service connections.
8. Personnel are forbidden to take part in any public activity that may aggravate the
security situation by provoking violence or increasing tension in the local community.
9. Service personnel are not to use public transport, including taxis from airports or
ferry ports. Unless travelling in their own vehicle they should ensure that they are met at
either the ferry port or airport.
10. Personnel should ensure that they have contact numbers for the unit or relatives
they are visiting, as well as loose change or phone cards to make telephone calls.
11. All orders received from the Security Forces (whether police or military) are to be
complied with regarding movement or behaviour while in NI.
12. Service personnel will be given a security briefing on arrival in NI and should be
aware that failure to follow the briefing provided is likely to result in disciplinary action.
ANNEX B TO
SECTION VI TO
CHAPTER 7
NORTHERN IRELAND LEAVE - SIGNAL FORMAT
To: 3 INF BDE PORTADOWN }
SIC: WAI
NORIRELAND LEAVE
D. Establishment or unit including the full civilian and military contact telephone
numbers and extensions of relevant leave administration staffs.
H. Route with method of travel, to include flight or ferry timings (when known)
otherwise approximate timings are to be given.
K. Any other relevant information that may assist the relevant Brigade HQ in
assessing eligibility for leave.
NOTES:
Note 1: The Brigade HQ in whose Tactical Area of Operations (TAOR) the leave destination is situated.
Note 2: The signal is to be protectively marked RESTRICTED, unless the text requires a higher protective
marking.
Note 3. Ethnic Appearance Identity Code (IC) 1 White European; 2 Dark European; 3 Afro Caribbean; 4
Asian; 5 Oriental; 6 Arab; 0 Unknown.
ANNEX C TO
SECTION VI TO
CHAPTER 7
MAP OF NI BRIGADE AREAS
ANNEX D TO
SECTION VI TO
CHAPTER 7
DETAILS REQUIRED FOR IMPENDING MARRIAGE IN
NORTHERN IRELAND (NI)
1. The details listed below are to be sent by CONFIDENTIAL letter to the Bde HQ in
whose TAOR the wedding and reception is taking place at least 30 days in advance of the
impending marriage:
a. Service number, rank, name, initials, ethnic appearance1 and any significant
distinguishing marks or features.
c. Unit.
h. Duration of visit.
i. Date of wedding.
j. Location of wedding.
k. Location of reception.
m. Travel arrangements.
1
Ethnic Appearance Identity Code (IC) 1 White European; 2 Dark European; 3 Afro
Caribbean; 4 Asian; 5 Oriental; 6 Arab; 0 Unknown.
ANNEX E TO
SECTION VI TO CHAPTER 7
NORTHERN IRELAND DUTY VISIT BY SERVICE
PERSONNEL - SIGNAL FORMAT
To: NORIRELAND
RAF ALDERGROVE (See Note 1)
3 INF BDE PORTADOWN }
8 INF BDE LONDONDERRY } (See Note 2)
39 INF BDE LISBURN }
SIC: WAX/YAA
C. Service unit or name and address of civilian firm to be visited in NI. A contact
telephone number and name must also be provided.
D. Dates of visit and stay in NI, including arrival and departure dates and travel
details.
NOTES:
1. For RAF visitors only, if the visitor is of Wg Cdr rank or below and does not
intend visiting any other unit or formation other than RAF Aldergrove; then SRAFONI
(Sy Servs) will authorize the visit. In this instance RAF ALDERGROVE is to be an
action addressee and NORIRELAND an info addressee; the text of the signal is to
include “RAF ALDERGROVE FOR SY SERVS”.
ANNEX F TO
SECTION VI TO CHAPTER 7
REPUBLIC OF IRELAND LEAVE - SIGNAL FORMAT
To: BRITMILREP DUBLIN
SIC: WAI
E. Leave address in ROI and contact telephone number within reach of this
address. (See Note 4)
H. Route with method of travel to include flight or ferry timings. When travel is by
vehicle the registration number and colour make and type detail is to be provided.
I. Details (including date, time and place) of any public or semi-public functions
(e.g. wedding or funeral including church and reception) to be attended should be given.
NOTES:
1. Only required if visit includes an address in the border counties of Donegal,
Leitrim, Louth, Monaghan or Cavan.
ANNEX G TO
SECTION VI TO
CHAPTER 7
BRIEF PRIOR TO VISITING THE REPUBLIC OF
IRELAND ON LEAVE
Introduction
1. All visits to the Republic of Ireland (ROI) by Service personnel on leave require
specific prior notification to the Defence Attaché (British Military Representative Dublin
(BRITMILREP Dublin)). Notification should be made by signal using the format at
Annex F. The following brief is to be provided to all personnel prior to travelling on leave
to the ROI.
The Threat
2. Republican influence affects the manner in which Service personnel are
perceived in the ROI and may place them at risk if identified. While the security
situation in NI remains unsettled, republican terrorist groups retain the capability to
target Service personnel on leave or temporary duty in the ROI. Republican influence in
the ROI remains significant and some elements of the general public sympathize with
republicans in the North and have provided support. Although it is assessed that an
attack within the ROI is unlikely, awareness of the presence of identified Service
personnel increases the risk. It is more likely that republican terrorist groups would
attempt to gain targeting intelligence in order to mount an attack elsewhere. Close
Quarter Assassination (CQA) is assessed to be the most likely form of attack if an
appropriate target is presented. Additionally, dissident loyalist terrorist groups have
threatened attacks against targets in the ROI, in which visitors might inadvertently
become involved.
4. Privately owned vehicles with registration plates (e.g. NATO) which identify
Service connections are not to be taken to the ROI. Badges and stickers that show
Service connections are to be removed. Service personnel are to ensure that they are
either met at the airport or ferry port or are fully briefed on their onward route.
Personnel should ensure that they have contact numbers for the relatives they are visiting, as
well as loose change or phone cards to make telephone calls.
5. Service personnel should exercise common sense and discretion at all times with
the aim of maintaining a low profile and protecting their personal anonymity while in the
ROI. Service personnel should be prepared to provide a residential (non-military)
address that, if necessary, also matches their credit card address. Disturbances or
politically motivated events are to be avoided. Identity as a member of the Armed
Forces, is not to be routinely disclosed except to the Irish Defence Forces or the Defence
Attaché (British Military Representative Dublin (BRITMILREP Dublin)) or Garda
Siochana (Police) in cases of emergency or difficulty. All orders and instructions
received from the Garda, Irish Defence Forces or BRITMILREP Dublin are to be
complied with regarding movement or behaviour while in the ROI.
6. If, exceptionally, Service personnel on leave in the ROI have a valid reason to
travel to NI, specific permission is to be obtained from the BRITMILREP Dublin and
HQNI.
3700 – Switchboard*
Note* Outside working hours the Embassy Switchboard will connect to the duty officer
who should only be connected in an emergency.
ANNEX H TO
SECTION VI TO
CHAPTER 7
REPUBLIC OF IRELAND TEMPORARY DUTY VISIT BY
SERVICE PERSONNEL - SIGNAL FORMAT
To: BRITMILREP DUBLIN
SIC: WAX/YAA
B. Parent Establishment or unit. to include full civilian and military contact telephone
numbers and extensions of relevant administration staff.
C. Purpose of visit.
D. Irish Defence Force unit or name and address of civilian firm or organization to be
visited. A contact number and name of sponsor must also be provided.
E. Dates of visit and stay in ROI, including arrival and departure dates and travel
details. (See Note 4).
1. Only required if visit includes an address in the border counties of Donegal, Leitrim, Louth, Monaghan or Cavan.
3. The signal is to be protectively marked RESTRICTED, unless the text requires a higher protective marking.
4. Military vehicles, including civilianized military vehicles and RN/RAF/AAC support vehicles, may not be brought to the ROI
without special high level approval from the ROI government.
5. See paragraph 07649 of Section VI, BRITMILREP Dublin will provide details of approved hotels in the Dublin area.
ANNEX I TO
SECTION VI TO
CHAPTER 7
BRIEF PRIOR TO VISITING THE REPUBLIC OF
IRELAND ON TEMPORARY DUTY
Introduction
1. All visits to the Republic of Ireland (ROI) by Service personnel on temporary
duty require specific prior authorization by the Defence Attaché (British Military
Representative Dublin (BRITMILREP Dublin)). Applications should be made by letter
giving full details or by signal using the format at Annex H. The following brief is to be
provided to all Service personnel prior to travelling to the ROI.
The Threat
2. Republican influence affects the manner in which Service personnel are
perceived in the ROI and may place them at risk if identified. While the security
situation in NI remains unsettled, republican terrorist groups retain the capability to
target Service personnel on leave or temporary duty in the ROI. Republican influence in
the ROI remains significant and some elements of the general public sympathize with
republicans in the North and have provided support. Although it is assessed that an
attack within the ROI is unlikely, awareness of the presence of identified Service
personnel increases the risk. It is more likely that republican terrorist groups would
attempt to gain targeting intelligence in order to mount an attack elsewhere. Close
Quarter Assassination (CQA) is assessed to be the most likely form of attack if an
appropriate target is presented. Additionally, dissident loyalist terrorist groups have
threatened attacks against targets in the ROI, in which visitors might inadvertently
become involved.
4. Military style or issue clothing and items of equipment (e.g. holdalls, Service
ties, blazers and badges) are not to be worn, openly displayed or carried when travelling
to or in the ROI. Labels and markings that show Service connections are to be removed
from baggage. Defence ID cards may be taken to the ROI but a passport or driving
licence should be used for routine identification purposes.
6. When driving in the ROI, a suitable road map is to be carried at all times. Unless
taking part in an official event, which is sponsored and organized by the Irish Defence
Forces and specifically authorized by BRITMILREP Dublin, Service personnel are not
to enter the border counties of Donegal, Leitrim, Cavan, Monaghan and Louth.
Hitchhikers are not to be picked up. A street map of Dublin can be purchased from most
bookshops and stationers. Note that in Dublin City centre, when on foot and North of
the River Liffey, Service personnel are advised to remain within the central area
bounded by Capel Street - Parnell Street - Gardiner Street Lower. Dublin is a large city
with all the usual associated risks including vehicle theft, street crime, mugging and drug
abuse.
7. Service personnel should exercise common sense and discretion at all times with
the aim of maintaining a low profile and protecting their personal anonymity while in the
ROI. Outside Irish Defence Force establishments, Service personnel should behave as
tourists and be prepared to provide a (non-military) residential address that, if necessary,
also matches their credit card address. Disturbances or politically motivated events are
to be avoided. Identity as a member of the Armed Forces, is not to be routinely
disclosed except to the Irish Defence Forces or the BRITMILREP Dublin or Garda
Siochana (Police) in cases of emergency or difficulty. All orders and instructions
received from the Garda, Irish Defence Forces or BRITMILREP Dublin are to be
complied with regarding movement or behaviour while in the ROI.
8. If, exceptionally, Service personnel on temporary duty in the ROI have a valid
reason to travel to NI, specific permission is to be obtained from the BRITMILREP
Dublin and HQNI.
3700 – Switchboard*
Note* Outside working hours the Embassy Switchboard will connect to the duty officer
who should only be connected in an emergency.
CHAPTER 8
(SPARE)
CHAPTER 9
(SPARE)
CHAPTER 10
(SPARE)
CHAPTER 11
DISCLOSURE OF PROTECTED INFORMATION
Chapter Para Page
Introduction 1101
Publications 1138
Introduction 1145
Policy 1146
Principles 1149
Procedures 1160
References 1174
Courses 1181
Introduction 1187
CHAPTER 11
SECTION I
DISCLOSURE OF PROTECTED INFORMATION
OUTSIDE GOVERNMENT SERVICE (EXCLUDING TO
OTHER COUNTRIES (SEE SECTION II))
Introduction
1101. This chapter lays down the principles to be observed when considering the
disclosure of protected information to persons or bodies outside the Government
service. A MOD civilian (including staff in MOD agencies such as DERA), contractor
or member of the Armed Services is to disclose such information to another person or
body outside Government service only when satisfied that the recipient meets, as a
minimum, all of the following:
Having been satisfied that the criteria at a. to d. above can be met, the person wishing to
disclose such information should finally seek authorization from the appropriate
security authority.
(Note: BC (Basic check) and BC + NIB (Basic check + National Identification Bureau)
are not security clearances)
Need to Know * * * * * *
Originator/ * * * * * *
Sponsor consent
Developed *
Vetting
RESTRICTED
BC + NIB *
BC * *
11-6
Physical * * * * * *
Measures
RESTRICTED
Disclosure of Protected Information
1103. When an individual needs access to protected information the sponsor must
seek the appropriate level of clearance via Principal Security Adviser staff. The
submission should be made on the relevant security questionnaire, see Volume 2. There
is no objection to the individual completing the form.
1105. Where custody of protectively marked documents is not required, but where
protected information may be passed verbally, the sponsor should brief the recipient on
security responsibilities at the earliest opportunity. The recipient must also be asked to
sign the Official Secret Act (OSA) declaration (MOD Form 134) at this time. The
recipient will retain one copy of the OSA form and return the other copy to the sponsor.
1108. Sponsors must not release protected material to any individual or company until
advised by InfoSy(Industry) or Single Service Principal Security Advisers’ staff that
they may do so.
Disclosure of information
To contractors.
1110. Security principles for the safe-guarding of information and material bearing a
protective marking apply with equal force during contract negotiations and in the
course of work against a defence contract. Chapter 12 of this manual contains detailed
instructions for contracts’ branches and other branches/organisations involved with
placing protected contracts and releasing protected information to contractors.
1111. Before entering into any discussions that may involve or lead to a disclosure of
information marked CONFIDENTIAL or above, heads of establishments are to obtain
InfoSy(Industry) or Single Service Principal Security Advisers approval to deal with the
firm(s) concerned, or with named individual(s), even if disclosure of information
marked CONFIDENTIAL or above is not expected to be necessary until preliminary
negotiations have been completed.
1114. The advice of Principal Security Adviser staff is to be sought where a request
for protected information is received from a university Defence lecturer who is not
directed or controlled by the Ministry of Defence, and no advance instructions have
been received from the Secretary Academic Studies Steering Group.
To the media
1120. The term 'media' should be taken to cover newspapers and periodicals and other
publications (including information placed on the Internet), radio and television films,
news-reels, video recording, still photographs, exhibitions and publicity and advertising
of all forms.
1124. The procedures outlined above also apply when contractors are seeking
approval for the publication of photographs of buildings, apparatus, etc. erected or
installed at MOD premises.
To local authorities
1126. The "need to know" rule applies with particular force to elected representatives
of local authorities, or their associations, if for no other reason than that they are subject
to frequent change and their physical security measures are less apparent. The safest
course is to impart the minimum information necessary to achieve the purpose and then
only in response to legitimate enquiries. Wherever possible protected information
should be diluted so that release can be undertaken at unclassified or at most
RESTRICTED level.
parliamentary duties are not allowed access to information graded higher than
RESTRICTED. Access to CONFIDENTIAL information may be authorised by the
responsible minister. Where information bearing a protective marking is
communicated, the member of Parliament is to be informed explicitly of its marking.
When considering access by a UK MEP to UK protected information the minister
responsible for authorising disclosure must be satisfied that such information will not
be disclosed to MEPs of other nationalities.
1129. It is unlikely that members of Parliament will have facilities for the
safe-guarding of protectively marked documents. Such information should not be
communicated to them in writing without approval from Principal Security Adviser
staff.
1130. When a Member of Parliament has to be given clearance for access to protected
information in a private capacity - eg, as director of a firm undertaking protectively
marked contracts - the Home Office is to be consulted, through the relevant Principal
Security Adviser staff.
To Parliamentary committees
1131. The Public Accounts Committee (PAC) and the House of Commons Defence
Committee (HCDC) will, at the department's request meet in closed session but all
other parliamentary committees admit public and media to their hearings.
1132. Guidance regarding HCDC can be found in the 'Notice for Witnesses' available
from the HCDC Liaison Officer in the Secretary of State's Private Office; advice to
officials appearing before the PAC is available from D Fin Pol.
1133. The House of Commons clerks/staff are responsible for ensuring that
distribution of protected information disclosed to parliamentary committees will be
restricted to those persons whom departments have agreed may have access.
On the telephone
1136. Telephone requests for information from callers where the caller cannot be
satisfactorily identified, should not be met immediately. The caller should be asked to
give a telephone number at which he/she can be contacted, this number being checked
before any information is disclosed. If the caller declines to give a number the matter is
to be reported to the ESyO. The telephone is vulnerable to scan and intercept and
highly insecure.
(2) The constraints detailed in sub para (1) do not apply where they
would be counter-productive to the activities and interests of the
Defence Export Services Organisation (DESO) or DCCS.
g. Use of the office address for receipt of personal mail, etc. Use of the
office address as a receiving point for private mail is at the discretion of
individuals and subject to guidance/instructions from local security staffs, eg
use of BFPO addresses and mail for single Service personnel. Official
address/telephone number should not be disclosed for consumer surveys, on
hire purchase or credit agreements, or on similar documents.
Publications
1139. MOD Personnel Manual Volume 7 Section 6 and Chapter 3 Annex M and
MOD Form 655, describe how permission may be obtained by members of
the civilian component of the Ministry of Defence. Service personnel are to
refer to the relevant instructions in Queen's Regulations. Permission is not
required for a lecture, speech or publication that is intended solely for a
purely Government organisation or conference, or for attendance at a meeting
of a scientific or technical organisation at which a contribution to discussion
may be made. Staff must, however, guard against unauthorised disclosure of
official information on these and similar occasions and observe the normal
precautions for safeguarding protectively marked information. Particular care
Careless talk
Chain letters
1141. It is for individuals to decide whether they wish to become involved in such
letters, but they are advised for security reasons not to do so. Attention is drawn to the
need to avoid any unnecessary linkage between individuals, official appointments
and/or addresses. Participation in such letters could increase the terrorist threat to an
individual and their family. Official resources are not to be used, eg stationery, typing,
duplicating, communications and transit services.
1142. An application for a foreign registered aircraft to carry out aerial survey or other
similar flights over the United Kingdom would normally be submitted to the
Department of Trade, who after appropriate enquiry would submit it for clearance to
the Secretary, Defence Press and Broadcasting Advisory Committee (Sec/DPBAC).
Any application, from whatever source, received directly within the Ministry of
Defence, should be referred to Sec/DPBAC.
Unsolicited mail
a. photographs;
b. autographs;
In all such cases, staff are advised not to respond. Should staff receive requests from
such sources, they should refer the matter to their ESyO for advice/action as necessary.
1144. To ensure that official maps, charts, plans, air photographs (including air photo
mosaics and films) and diagrams which are made available to the public meet the
legitimate needs and interests of their users, without prejudicing the safety and security
of sensitive MOD establishments and installations, staff should refer to the guidance at
Annex C. If there are any problems concerning sensitive sites, relating to this subject,
the ESyO/USyO should refer the matter to the relevant Principal Security Adviser for
advice.
SECTION II
RELEASE OF PROTECTED INFORMATION TO
OTHER COUNTRIES
Introduction
1145. These instructions set out the policy, principles, controls and procedures for the
release of protected information to Governments, companies and individuals of other
countries, by the UK Government and UK companies. These instructions should be
brought to the attention of all concerned, and any enquiries about the policy should be
referred to Principal Security Adviser staff. It should be noted that the UK adopts a
policy of PROTECTIVE MARKINGS and DESCRIPTORS for its material based
upon the consequences of its COMPROMISE in general, whereas other countries
CLASSIFY their material on the grounds of National Security. In the UK system
there is no unique indicator that a National Security aspect is present, eg. a
document marked CONFIDENTIAL - MANAGEMENT may be so marked for
National Security reasons as well as Management reasons.
Policy
1146. The policy for the release of military information is laid down by the Director
General International Security Policy (DGISP). The word 'Military' is deemed to
encompass all 'Defence' information.
1147. The main object of the policy is to strike a balance between the requirements of
security and of the perceived benefits of political, economic or other factors.
1148. A table of recommended release levels (Table 'X') is issued and kept up to date
by DESP 2. The contents of Table 'X' are very sensitive and the distribution of it is
strictly limited. Any queries on Table 'X' should be addressed to the DESP 2 Sec2.
Principles
1150. Information should not be disclosed to other countries unless the Release
Authority (see paragraph 1162) is satisfied in respect of both the recipients' "need to
know" and their ability and intention to safeguard that information. The criteria to be
used to judge whether release should be permitted should include the following:
e. The need for the recipient country to receive this information in order to
assist it to contribute to the defence of Western democracy.
These criteria, however, may be amended by special agreements between the United
Kingdom and other countries or such other special considerations as those referred to
below.
1151. A sponsor branch must be aware of the ownership of the information and must
ensure before disclosure that the owner agrees to disclosure. This applies to owners
both within and outside the United Kingdom. Thus, the Department should not release
information that is the property of, originates in, or is of important interest to, another
Department without the latter's consent. Similarly no information which is the property
of a private individual or contractor should be released without their consent, and the
United Kingdom should not release to a third country information that is the property of
another country without the latter's concurrence.
1152. Cost data should not be released without the approval of the appropriate finance
or administrative branch since it may be prejudicial to subsequent tendering,
international collaborative sharing, commercial, sales or project interests.
Section.
1154. In the context of these instructions, the term "information" means information
about Defence related items including equipment and documentation which:
1155. There are political, security and in some cases commercial factors which must
be considered prior to any agreement to export defence material. On a day to day basis,
approval for the release of protectively marked information and hardware overseas is
obtained through the Arms Working Party (AWP) (made up of Equipment Security
Branch, DD Def Sy(S&T) and various members of the DIS as appropriate, using the
Form 680 procedure.
1156. In addition to the MOD, the other Government departments involved in control
are:
b. The Department of Trade and Industry (DTI) which operates the export
licensing system.
c. HM Customs and Excise which enforces the controls on the import and
export of goods.
1157. The legal authority controlling the release of official information is the Official
Secrets Act 1989.
1158. The Import, Export and Customs Powers (Defence) Act 1939 and the Customs
and Excise Management Act 1979 govern the export of goods from the UK. The
regulations which currently control the export of goods are contained in the current
Export of Goods (Control) legislation for military goods and in the Dual-use and
Related Goods (Export Control) legislation for other controlled goods.
1159. Prior to the export of licensable defence material, the provision of an export
licence from DTI is required. The types of export licence that may be issued are:
Procedures
1160. This section sets out the procedures to be followed by divisions and branches
for the release of information to other countries and is based upon the principles and
policies detailed in the preceding paragraphs.
b. To ensure that the agreements with other nations about the release of
information of overseas origin are not broken.
Release authority
1162. Authorization to release military information overseas will depend upon the
content of the information and the country to which it is to go.
1163. Acting as the agent of the Release Authority, the Defence Research Information
Centre (DRIC), is the prescribed routine channel for the transmission overseas on initial
distribution and in, response to specific requests, of Ministry of Defence Scientific and
Technical Reports. The DRIC obtains technical policy, patents, commercial and
security clearances and is responsible for affixing the appropriate conditions of release.
DRIC maintains a record of releases made and can furnish such information on
request.
1165. The prefix "UK" must be added to protective markings on all hard copy
documents to be passed to other countries. However, in formal signal messages
transmitted over the Defence Communications Network, the prefix "UK" is not
recognised. Therefore, staff must only apply the appropriate protective marking and
use the term "UK CLASSIFIED RELEASED IN CONFIDENCE" as the first words of
the text. If in doubt as to the correct release instructions for overseas messages, staff
should initially contact their local COMMCEN staff for advice.
1166. The United States does not appear in Table 'X' and sponsor branches may, with
the consent of the release authority and the owner of the information, release
protectively marked information (excluding that detailed in para 1164 for which
specific rules, detailed in Table 'X' apply).
1167. When a release proposal by a sponsor branch outside the Defence Export
Services Organisation has a current or potential "Sales" implication, the appropriate
Regional Marketing Directorate (RMD) should be consulted.
Conditions of release
1168. When information is released overseas the recipient country should be advised
of "The Conditions of Release" which may vary according to the reasons for disclosure.
The appropriate "Conditions of Release" are to be shown on all protectively marked
and UNCLASSIFIED documents released to all overseas recipients either by means of
a rubber stamp or a label (see Annex A). In some cases it may be necessary to write
specific 'Conditions of Release', if those specified in Annex A do not completely meet
the requirement; in such cases the advice of the appropriate Principal Security Adviser
staff is always to be sought.
k. Documents are despatched via the sponsor branch who should arrange
transmission through approved Government to Government, or other approved
channels.
1173. Prior to the release of private venture funded information overseas, its
protection should be determined in consultation with DD DefSy(S&T). As in the case
of Government- owned information, its release is then subject to MOD Form 680
procedure.
References
1174. When documents are being released, care should be taken to avoid references to
reports which would not be supplied because of their protective marking or sensitivity.
1176. On occasions there is a need to arrange for the release of information carrying a
higher protective marking than equipment to be supplied. When such instances occur,
this release must also be the subject of an MOU.
1178. In the absence of a General Security MOU, all other MOUs relating to the sale
of protected equipment and the release of associated information must contain security
clauses, as required under para 1175 above, and InfoSy(Industry)1 advice is to be
sought.
1179. Patent action in support of present or eventual commercial exploitation need not
necessarily be prevented by military security considerations; the United Kingdom has
patent security agreements with a number of countries so that patent applications can be
made to cover patentable information even though it may be protected. A patent
security agreement between the UK Government and a foreign Government should be
made to ensure that information released by one to the other will be afforded the same
degree of protection by the receiving Government as it was given by the releasing
Government. Under the agreement it is then possible to arrange for patent applications
to be made in the security section of each country's Patent Office and to be withheld
from publication until the security restrictions are lifted. Patent protection in the
conventional sense could not begin until then, but the arrangement does not affect the
priority date for the eventual patent.
1180. It is generally part of such a patent security agreement that a country wishing to
file a security classified patent application in another country's Patent Office shall also
transmit a copy of the information (patent specification) to the other country's defence
authorities. More detailed information about these arrangements is available from the
Intellectual Property Rights Group (IPRG), which files and prosecutes patent
applications, and the Inventions Unit – DD DefSy(S&T), which monitors the
implementation of the patent security arrangements.
Courses
1181. Foreign and Commonwealth students may be admitted to UK military courses
as arranged by International Defence Training (IDT) staffs or courses arranged by List
X firms. If an IDT course is above the limit set for release of information to the
particular nation by Table X then the IDT should seek advice from the appropriate
single-Service Principal Security Adviser, before a firm offer is extended.
Unsolicited mail
1182. The guidance given in paragraph 1143 should be applied to unsolicited mail
whether received from overseas or in the country concerned.
SECTION III
POLICY FOR THE DISCLOSURE BY THE UNITED
KINGDOM OF INFORMATION OWNED BY OTHER
COUNTRIES AND INTERNATIONAL DEFENCE
ORGANISATIONS
Information relating to projects developed jointly with other
countries
1183. From time to time an arrangement is reached by the United Kingdom with one
or more countries for the joint development of a particular project. The information
resulting from such an arrangement becomes "combined" and as such cannot be
released without the mutual determination of all countries participating in the project.
1186. Similar considerations to those set out in para 1185 apply in these cases.
However, any proposal to release information belonging to one of the other IDOs to a
country not belonging to that IDO, unless the information is of entirely United
Kingdom origin, should be referred as appropriate to Principal Security Adviser staff.
SECTION IV
SECURITY ARRANGEMENTS FOR THE RELEASE OF
UK PROTECTIVELY MARKED INFORMATION TO
COMBINED JOINT TASK FORCES
(CJTFS)/COALITION MISSIONS INVOLVING THE UK
ARMED FORCES
Introduction
1187. The following guidance is only to be used in the absence of any security
information being issued by the relevant CJTF/Coalition mission responsible for the
joint operation prior to and shortly following deployment of UK Armed Forces to the
area concerned. However the UK Chief J2/senior security advisor should ensure that
the guidance issued by the relevant CJTF/Coalition mission fully reflects the context of
this Section.
1189. This guidance only sets out additional security requirements for the
release/exchange of UK protectively marked information to a CJTF/Coalition mission.
Robust rules, to prevent accidental compromise of UK protectively marked
information, should be issued by the Chief J2/senior security advisor covering joint
operations' rooms, briefing, IT networks, postal and courier systems etc. JSP 440
should be consulted for detailed guidance regarding the physical security, carriage,
handling and accounting procedures for UK protectively marked information.
Principles of release
r. Once established, the security policy and procedures for the handling of
protectively marked information, of the lead organisation/nation, shall apply to
the UK Armed Forces contingent participating in the CJTF/Coalition mission;
(1) UK SECRET
Releasable to (Name of CJTF/Coalition mission)
(2) UK SECRET
Releasable to (eg WEU/NATO members only/CJTF/Coalition
mission
(3) UK SECRET
Releasable to (name of CJTF/Coalition mission - Name/Names
of Country(ies) only)
Information Systems
Release authority
1197. These authorities are listed in order (only in respect of UK protectively marked
information) as follows:
ANNEX A TO
CHAPTER 11
CONDITIONS OF RELEASE LABELS/STATEMENTS
FOR DOCUMENTS RELEASED TO OVERSEAS
RECIPIENTS
1. The conditions of release labels/statements described in paragraphs 4-7 below
are to be used by the Ministry of Defence on all protectively marked and unclassified
documents which have been approved for release to other named Governments except
those unclassified documents which can be given unlimited distribution, or papers for
which there are no special handling requirements. The term 'document' should be
interpreted widely to not only include formal technical or scientific reports but also
technical memoranda, tabulated data, trials, reports etc.
"
ANNEX B TO
CHAPTER 11
THE SAFEGUARDING OF COMMERCIALLY
SIGNIFICANT INFORMATION IN TECHNICAL
MEMORANDA AND REPORTS
1. To avoid any misunderstanding regarding the disclosure of commercially
sensitive information, documents carrying the descriptor marked COMMERCIAL are
to incorporate appropriate instructions to recipients. Companies having proprietary
rights to information in such documents must signify their agreement to disclosure
before MOD permission for disclosure can be given. Where disclosure of
information is to be controlled or otherwise limited, documents are to carry
Conditions of Release" instructions (detailed at Paragraph 3) after categorisation as
follows:
A document containing information falling into more than one category must bear
more than one label.
Category 1 Documents
COMMERCIAL 1
RELEASE CONDITION
Category 2 Documents
COMMERCIAL 2
RELEASE CONDITIONS
Note: This does not affect the right of release by MOD for use on MOD
contract work.
Category 4 Documents
4
COMMERCIAL
MOD only
This document and the information it contains are for use within UK
Government only and must not be released to any other persons without the
agreement of the originator.
ANNEX C TO
CHAPTER 11
SECURITY OF OFFICIAL MAPS, CHARTS, PLANS,
AIR PHOTOGRAPHS (INCLUDING AIR PHOTO-
MOSAICS AND FILMS) AND DIAGRAMS
Maps, charts and plans
d. Each Principal Security Adviser keeps a list of sensitive sites within its
area of responsibility. These lists are reviewed annually to consider if there is a
continuing need for map, chart, plan or photography restrictions to apply to the
sites which have been identified.
4. The MOD considers itself bound, in the interests of safe navigation, to indicate
on its published charts, radio stations which give navigational direction-finding service
and certain installations on land which would be conspicuous to a mariner from
seawards. Nevertheless, the latter need not be specified in detail, and they are in nay
case very prominent objects which cannot be concealed. In addition, overhead cables
must be shown where they cross waterways, thereby limiting headroom. The MOD
also considers itself bound to show names against marine terminals, jetties, wharves etc
connected with sensitive sites where such names are of vital interest to shipping.
8. All official maps, charts and plans which merit security protection should be
overstamped with the appropriate protective marking. Protectively marked maps,
charts and plans may be issued only to those who have a "need-to-know" and are
authorised to receive them; the directorate/unit responsible for the protectively marked
content should always be consulted.
9. Official photographs (including air photo air-mosaics and films) and diagrams
which include any of the sensitive sites covered by this guidance should be similarly
treated.
10. Guidance on the regulation of air imagery from Service sources is contained in
JSP 348.
Open Skies
11. This guidance does not apply to photography carried out under the Open Skies
Treaty.
ANNEX D TO
CHAPTER 11
SECURITY ASSURANCE
1. The (country or organisation) represented by (name, rank and function) in the
furtherance of the (name of the CJTF/Coalition mission) agrees:
c. to use the information only for the purposes for which it was provided;
d. not to transfer the information to a third party without the prior written
approval of the originator of the information; and
CHAPTER 12
CONTRACTS SECURITY
Chapter Para Page
Introduction 12001
Definitions 12003
Sub-section IB - Conditions of
contracts relating to security
12-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
Introduction 12090
Principles 12093
12-4
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
12-6
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
CHAPTER 12
SECTION I
CONTRACTS SECURITY
SUB-SECTION IA
Introduction
12001. This Chapter describes the security procedures which apply and the protective
arrangements which need to be implemented in connection with the award of a protected
contract to Industry.
12002. The security measures which are necessary depend on the protection given to:
The security measures afforded to any contract, at any level, for goods or services
depend on the protective marking of the contract. Before deciding on the protective
marking of any contract the security authority of the requisitioning branch or
establishment (see below) is to be consulted to ensure that the protective marking
proposed by the requisitioning branch or establishment is correct. The security
authority should normally be approached before the feasibility study is written, and
certainly before the invitation to tender is offered. For protective markings of
CONFIDENTIAL or above, the full range of security measures described in this chapter
are applicable. Where the marking does not exceed RESTRICTED, the security
measures are less stringent and are summarised in Sub-section 1K. Care must be
exercised to distinguish between the protection given to the work performed or
information disclosed under the contract and the protective marking of the tender or
contract documents themselves which are generally lower. (See Sub-section 1D).
Definitions
12004. "Secret Matter" and "Restricted aspects". The term 'Secret Matter', is any
matter connected with or arising out of the execution of a contract marked
CONFIDENTIAL or above. The term 'Restricted Aspects' similarly refers to material or
aspects of information marked RESTRICTED. The 'Secret Matter' and the 'Restricted
Aspects' are defined to the contractor in a 'Security Aspects Letter' (SAL), or by a
'Security Aspects Clause' in the contract, or by a Restricted Aspects Letter.
12005. Contract Arrangements. For the purpose of these instructions, the term
'contract' covers invitations to tender, tenders, advance orders, contracts, extracts and
orders.
12006. List X. This term refers to contractors or subcontractors who have been formally
placed on List X because they are undertaking work marked CONFIDENTIAL or above
- "On the Company Premises". Contractors who are on the list are not entitled to
any preferential status in the granting of new contracts.
Security Advisers
12008. The security authority. The security authority is the security branch
ultimately responsible for identifying and overseeing the security aspects of a contract.
12-8
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
SUB-SECTION IB
CONDITIONS OF CONTRACTS
RELATING TO SECURITY
. The texts of DEFCONs 531 and 659 are reproduced as Annexes A and B.
12011. All Government contracts placed in the UK are subject to DEFCON 531 but
where it is necessary to disclose to the contractor information marked
CONFIDENTIAL, SECRET, or TOP SECRET, DEFCON 659 must also be included.
DEFCON 659 takes precedence over DEFCON 531
12012. DEFCON 659 is not to be used for contracts placed with Overseas contractors.
The security provisions for these and other types of contracts are dealt within Sections 8
and 9.
12015. Amongst other things DECON 659 draws attention to the provisions of the
Official Secrets Act and obliges the contractor:
c. To ensure that employees with access to the "secret matter" are aware of
and observe the security obligations imposed on the contractor and to report any
default on their part.
DEFCON 76 also obligates the contractors employees to comply with any rules,
regulations and requirements in force whilst at the establishment as required and
dictated by the Head of Establishment or his delegated official. For security, the
applicable requirements of JSP 440 will be required to be communicated to the
contractors personnel and overseen by the Establishment Security Officer (ESyO). In
addition, and where appropriate, PPP/PFI/CFQ Guides and the provisions of the
Template of Security
Requirements at Annex X may also be applied.
12-10
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
SUB-SECTION IC
12018. Preliminary negotiations of a general nature with the potential contractor may be
made prior to approval, provided that:
12019. Submission to Info Sy (Industry)2/3 for approval may be waived only if the
Requisitioning Branch or Contracts Staff (as appropriate) holds unexpired Info Sy
(Industry)2/3 provisional approval to release protected matter at the appropriate level to
the company.
12020. Officers of the Ministry of Defence must not disclose information marked
CONFIDENTIAL or above to a member of a company, however senior, without first
satisfying themselves that he has a 'need to know' and has been 'Authorised for Access'
to protected information at the appropriate level.
12021. For contractors not on List X Info Sy (Industry)2/3 are responsible for processing
"Authority for Access" for the 2 or 3 initial contacts. If the contractor is on List X, the
Security Officer, (whose name can be obtained from Info Sy (Industry)2/3) should be
asked whether an individual has been "Authorised for Access" to protected information.
12025. It is up to the Requisitioning Branch to establish whether the contractor holds the
12-12
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
programme costs, the contractor must be made aware of the likely requirements
at this stage.
Document security
12028. All information marked CONFIDENTIAL or above being despatched to
contractors must be sent initially to the Security Officer in the case of a company already
on List X; or to the initial contact of the company who will ensure that the information is
properly recorded and protected. However, care should be taken to address the Security
Officer by name only, not by appointment. The outside envelope must not bear the
words "Security Officer". The name of the Security Officer may be obtained from
Info Sy (Industry)2/3.
12-14
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
Visits to contractors
12030. Under clause 3 d) of DEFCON 659, a contractor has a duty to ensure that a
visitor has written approval from the Ministry of Defence to discuss protected matters.
He also has a duty to satisfy himself about the 'need to know' of any visitor, whatever his
status. This latter requirement applies equally to RESTRICTED and UNCLASSIFIED
matters.
12031. In order to avoid delay and embarrassment at the time of a visit, officers of the
Ministry of Defence should observe the following rules:
a. When intending to visit a contractor for the first time, they should ensure
that they are introduced beforehand by letter from the Head of Branch or some
other officer known to the contractor. The letter should be sent to the
contractor's Security Officer.
e. They should not seek to use their official position to try to convince a
contractor of their 'right' to have access to protected information connected with
contractors or to visit parts of his premises other than those with which they are
personally concerned.
12033. The person visiting should be escorted at all times unless that person satisfies
the required security status for unescorted access (see para 12033 above). He must be
left in no doubt about the protective marking of any information that has been disclosed
to him and then he is responsible for safeguarding it (see para 12022). If documents
marked CONFIDENTIAL or above are handed out at demonstrations, conferences etc,
each document is to be copy numbered and strictly controlled, and the names of persons
receiving copies recorded. At the end of each session of the demonstration, conference
etc, visitors are to hand in their copies. When transmission is to be made to their official
address, this must be done through normal secure channels. However, the material
should be addressed initially to the security officer of the company (see para 12029) who
will ensure that the documents are properly recorded and safeguarded. Further guidance
on control and transmission of protected documents is given in Chapter 4.
12-16
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
SUB-SECTION ID
a. Will the execution of this contract involve the disclosure and/or custody
of information marked CONFIDENTIAL or above on the contractors premises?
12036. If the answer to the question in para 12036a is that information marked
CONFIDENTIAL or above will be disclosed, the Requisitioning Branch must take
action in accordance with Sub-section IC. In addition, the Contracts Staff must include
DEFCON 659 in the tender or contract document.
12038. When compiling entries for the MOD Contracts bulletin, Requisitioning or
12-17
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
Contract Branches must ensure that each entry is UNCLASSIFIED. It is also essential
to ensure that the subscriber will not be able to build up a picture of a protected project
from the scanning of a number of UNCLASSIFIED entries. Requisitioning Branches
must therefore consult the Project Branch and the Operational Requirements Branch
before forwarding entries for inclusion in the bulletin, which relate to a protected
contract.
European Journal
12039. Depending upon the value of a particular contract, EEC legislation requires that
such contracts must also be advertised in the European Journal. However, where a
contract will involve access to protectively marked information bearing a national
caveat, or will involve access to sensitive sites/equipment, an application for exemption
to advertise should be submitted for Info Sy (Industry)1 for consideration.
12-18
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
SUB-SECTION IE
"The requirement under DEFCON 659 for the provision of a Security Aspects
Letter is waived, as all work on the contract will be carried out on Government
premises only."
Advice on the compilation of SALs can be sought from Def Sy (S&T). Any difficulties
which the company foresees or experiences in protecting the "secret matter" should be
referred to Info Sy (Industry)2/3.
a. The aim of the SAL or security aspects clause at the tender stage is to
ensure that the contractor safeguards protected information, documents or
material adequately during and after the tender stage; and to enable the
contractor to make financial provision in the tender for the measures which will
need to be taken to safeguard the "secret matter" in the event of them being
subsequently awarded the contract.
12-19
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
12042. Contracts Staff will be guided by SALs when protectively marking their
correspondence and it is therefore important that all sensitive features of the work which
are likely to be the subject of correspondence between Contracts Staff and contractors
should be correctly identified.
c. When the work to be undertaken by the contractor does not stem from a
Service requirement (eg research initiated by the Ministry of Defence), the
appropriate protective markings may have to be decided by the R&D
establishment or project branch concerned, in consultation with Def Sy (S&T) in
the first instance.
e. Projects at very early stages of development may not yet have been
considered by a technical grading committee; it is then necessary to seek the
advice of the OR Branch sponsoring the project and Def Sy (S&T). The
Requisitioning Branch together with the sponsor and Def Sy (S&T) should then
analyze the project, and allocate appropriate protective markings to the main
features, assemblies and sub-assemblies which need to be protected, in a
Technical Grading Guide if necessary.
12-20
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
Level of signature
12044. It is important that SALs should be signed at such a level as to reflect their
importance. It is not possible to lay down hard and fast rules, but as a general rule, the
signatory should not be less than Band C1. The signatory should also be competent to
answer technical questions on matters of detail arising from the definition of the "secret
matter". Where this is not possible (eg when the Requisitioning Branch is acting on
behalf of an outstation establishment) the name and telephone number of the individual
to whom detailed technical enquiries should be referred to should be included in the
SAL.
12-21
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
Example letters
12045. Examples of the type of Security Aspects Letters are reproduced at Annexes G to
L.
12046. Annexes G - L may be reproduced locally, but there is no obligation to use them
provided the content of the appropriate proforma is included in the SAL.
12047. The SAL (undated) must be forwarded to the Contracts Staff with the requisition
or request for tender action. Any contract proposal for protected work received without
a draft SAL should be returned to the originating branch for further action.
12049. The Requisitioning Branch should ensure that a prompt response to the SAL is
received from the contractor stating that he understands and will implement the
provisions of the SAL.
12-22
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
Grading Guide, the Requisitioning Branch may, instead of issuing a separate SAL
request the inclusion of the following clause in the tender or contract document,
supplying the references to be inserted:
Security Aspects
For the purpose of DEFCON 659, the "secret matter" of the Contract
shall be as defined in ..... The Contractor shall confirm in writing to [the
Requisitioning Branch) that this definition of the "secret matter" has been
brought to the attention of the person directly responsible for the security
of the Contract, that the definition is understood, and that measures can
and will be taken to safeguard the "secret matter", and shall immediately
refer any difficulty in these respects to [the Requisitioning Branch].
12054. Apart from their normal distribution, contracts dispatch centres and Contracts
Staff must arrange distribution of copies of the SAL (indicating if it is provisional) with
the related contract, to:
12-23
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
12-24
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
SUB-SECTION IF
Amendments to contracts
12055. Amendments to contracts must be protected according to their content, and
branches initiating contract amendment action must inform the Contracts Staff of the
appropriate protective marking. They must also consider whether the amendments
necessitate any alteration or addition to the definition of "secret matter".
12057. When the "SECRET matter" is defined by a clause in the contract, and the
description in the Technical Grading Guide is changed, the Requisitioning Branch
should request the Contracts Staff to make an amendment to the contract in the form of
the security aspects clause at para 12054 (adapted to suit the circumstances). The
Requisitioning Branch must in the meantime ensure that the contractor is immediately
made aware of the changes to the Technical Grading Guide.
12-25
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
12-26
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
SUB-SECTION IG
"Submissions for approval under Clause 7 a) of DEFCON 659 are not required
in respect of work to be carried out by subcontractors at premises which are
known to be on List X. In other cases the information required under DEFCON
659, Clause 7a) shall be submitted to Info Sy (Industry)2/3 and copied to your
Security Adviser in accordance with arrangements notified in "Manual of
Protective Security” (MPS).
12062. In all cases, the main contractor will be required to include the conditions in the
subcontract equivalent as laid down at Appendix to DEFCON 659 and to define to the
subcontractor the "Secret Matter" of the subcontract.
12-27
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
12-28
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
SUB-SECTION IH
12065. The Requisitioning Branch or Contracts Staff (as appropriate) must give Info Sy
(Industry)1 a minimum of 10 days notice when seeking security approval of contractors
in NATO countries and a minimum of 15 days notice for contractors in non-NATO
countries. On no account should CONFIDENTIAL information be passed to an
overseas contractor without consulting Info Sy (Industry)1, who will confirm in writing
their approval to use the contractor, and provide the appropriate overseas security
conditions to be included in the ITT or contract documents. Where a contractor is not
already security cleared, advice should be sought from Info Sy (Industry)1, telephone
No. 020 7218 4263/0125.
12066. If Info Sy (Industry)1 gives security approval, the overseas contractor must be
provided with details of the information which is protectively marked, and notified that
he is required to give at least the same protection to this information as he is obliged to
give to information of equivalent security grading entrusted to him by his own
government. The Requisitioning branch must prepare an SAL which should be attached
to the formal ITT contract documents that are sent to the contractor (see annexes O and
P).
12-29
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
before placing a RESTRICTED contract with an overseas contractor (but see para
12070). The Requisitioning Branch must verify by reference to the instructions on the
release of military information (promulgated by the RMIPC) that the country is not one
which is debarred from receiving any protected information. The Security Conditions to
be included in RESTRICTED ITT or contract documents are reproduced at Annex Q.
12068. The Requisitioning Branch must inform the contractor in writing of the
RESTRICTED Security Aspects and notify him that this information may be disclosed
only to those of his employees who have a "need to know" for the performance of the
contract.
12069. Requisitioning Branch or Contracts Staff (as appropriate) should consult Info Sy
(Industry)1 using the proforma at Annex N should they wish to place a RESTRICTED
contract with a contractor in Australia, Austria, Israel, Italy, South Africa, South Korea,
Spain, Sweden, Switzerland, The Netherlands or USA.
12-30
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
SUB-SECTION IJ
12073. An SAL must be issued for each order involving access to information marked
CONFIDENTIAL or above. It should take the general form of Annex H, but the
reference in the first paragraph should be to sub-paragraph A 1(a) of Section 1 of the
'Standing Instructions Relating to Agency Establishments'. Distribution must be as in
para 12057.
12075. Before negotiating the agreement, the branch sponsoring it must obtain personal
details on Security Questionnaire & Supplement forms (available from the usual forms
supplier) of any person who will be engaged in the research, and submit them to
DVA(York) for approval. The formal agreement/contract must include a security
clause, and Info Sy (Industry)2/3 must be consulted about the wording at an early stage.
In general, the security clause will state the protection which must be afforded to the
work, and will require, amongst other things, that no person shall be engaged upon the
work without the prior approval of the Ministry of Defence, that persons engaged on the
12-31
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
work shall be subject to and sign the Official Secrets Acts declarations, and that
protected material shall be protected in accordance with security instructions. A copy of
the formal agreement/contract should be sent to Info Sy (Industry)2/3. It is especially
important that sponsoring and other branches, who may be asked to approve the
engagement of individuals for the work or to agree to individuals having access, should
consult DVA(York) before replying.
12077. Some contracts subject to the General Conditions of Government Contracts for
Building and Civil Engineering Works (Forms GC/WORKS/1 and CCC/WORKS,
C1001 and 2) and to MOD DEFCONS derived there from are placed by the Defence
Procurement Agency. These include a 'secrecy' clause drawing attention to the Official
Secrets Act and a clause empowering the Ministry of Defence to exclude persons from
the site of the work.
12079. There are no special security provisions in the Conditions of Local Purchase
Orders (LPO). It is therefore undesirable for work protectively marked
CONFIDENTIAL or above to be placed in this way. Work so marked should be placed
by headquarters Contracts Staff responsible for the stores concerned, and if the
requirement is recurrent, an enabling arrangement should be considered.
12081. Local purchase orders must not be placed for film if the purchase price includes
12-32
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
processing, unless it is quite certain that no protected material will be included in the
exposed film. Enabling arrangements with the major makers of photographic film
contain DEFCON 659 and provide for the direct demand by outstation establishments
for supplies of film and for processing where relevant. Special arrangements are
promulgated by the contracts division for the handling of protected film under these
contracts, and outstation establishments must ensure that these are adhered to when
despatching exposed protected film. Any difficulty should be referred to the appropriate
Contracts Staff.
12-33
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
12-34
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
SUB-SECTION IK
Security measures
12-35
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
12-36
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
SUB-SECTION IL
12087. When processing protectively marked information, the same security policy
guidelines apply to computer and information technology systems owned by contractors
or subcontractors as for such systems in HMG service. These guidelines are described
in the Manual of Protective Security (MPS); Chapter 5 Annex 3 gives the minimum
mandatory computer security standards for any information technology system
handling HMG protectively marked information (CESG Compusec Memorandum No
10). DMS Volume 3 reflects and expands these guidelines for all parts of the MOD.
12088. Requisitioning branches or project managers are responsible for the security
aspects (including IT security) of any contracts they award and manage. To meet the
above policy guidelines, they must seek approval (accreditation or confirmation of
accreditation) from Info Sy (Industry) 2/3 of any IT system to be used to process
protectively marked HMG information (see DMS Vol 3). They will arrange for the
approval of any IT systems, the appropriate advice to be given on how the work is to be
processed, and on what security and operation procedures will be required to protect the
security aspects.
12089. Any ITT or contract must make it clear that approval (accreditation) by an
approved HMG authority of any IT system processing protectively marked HMG
information is mandatory.
12-37
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
12-38
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
SECTION II
Introduction
12090. Integrated Project team (IPT) Leaders are formally responsible for all aspects of
security for their projects. The purpose of this Section is to outline, for all IPT Leaders
at all levels and their staff in MOD Headquarters, outstations, Commands, Defence
Procurement Agency and Agencies, the resources available to assist them in the
identification and protection of security aspects of their projects.
12091. Every IPT Leader needs to ensure that the procedure for the award of
protectively marked contracts and the protection of work in industry are followed.
Principles
12093. Reliable security is achieved by:
b. Need to know. This rule must be impressed on all concerned both in the
Ministry of Defence and in industry.
12-39
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
the User Requirement, Document (URD) and System Requirement Document (SRD)
although some preliminary discussions may have taken place before hand. The security
clauses in the URD or SRD are generally stated in broad terms. These need to be
amplified when preparing guidance for use in the protection of documents and
hardware, preferably in the form of a technical grading guide.
12-40
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
b. The definitions set out in a SAL should not leave the firm with any
doubts or difficulties concerning its interpretation. The firm's Security Adviser
will give detailed guidance to the firm on the way physical, documentary and
emission protection requirements are to be met.
c. The SAL for a demonstration phase needs to be in greater detail than that
for any earlier phase. The security gradings or requirements must be analyzed
and interpreted by the IPT Leader, if necessary in consultation with the
Equipment Capability Customer and Def Sy (S&T). The contractor must be
advised of the appropriate security gradings to be applied to detailed drawings,
assemblies, sub-assemblies and lesser items of hardware and all related
documentation. The SAL should be signed by not less than a C1 grade. The
advice of Def Sy (S&T) should be sought if any difficulty is encountered in
drafting.
Review of grading
12096. The Technical Grading Guide is reviewed at least annually by the appropriate
grading committee or sub-committee:
12-41
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
(2) The Land Systems Equipment Security Policy Committee and its
sub-committees, which deal with most equipment procured for the
Army.
12-42
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
a. For minor projects the security function is normally carried out by the
IPT Leader who retains the responsibility of Project Security Officer. For all
major projects protected at CONFIDENTIAL or above, a technical officer shall
be appointed by the Project Manager to assume the duties of Project Security
Officer. He should be familiar with the project, be normally of at least C1 grade,
and have a reasonable expectation of continuity in post.
(1) The drafting of SALs and the security plan for the project, in
consultation as necessary with Info Sy (Industry)2/3, CBSy 2, Info Sy
(Tech), Def Sy (S&T) and Equip Sec 3.
12-43
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
afforded to the project conforms with the current protective marking of a completed or
cancelled project.
c. The IPT Leader is responsible for arranging, in the absence of any other
action, for the current secret aspects letter to be reviewed once per year.
12101. Information should only be released to the press through Defence Public
Relations staff to whom all requests from the press must be referred. Consultation
between the Equipment Capability branch for the project, the IPT Leader, the
contractors and the appropriate security grading authority (see para 12100 and Annex T)
is essential before any release is made by Defence Public Relations staff. Releases and
the conditions on which they are made must be recorded by the Operational
Requirements branch and it is essential for this information to be passed to D Def Sy
and others involved in the project.
12-44
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
d. The Inventions Unit D Def Sy (S&T) Inv & Pat is responsible for advice
to the Patent Office on prohibition for security reasons of the publication of
British and foreign patent applications.
Research programmes
12102. The organization responsible for initiating a research project should seek advice
on project security grading from Def Sy (S&T), who will consult the appropriate Service
sponsor branch and the Project Manager responsible for the project for which the
outcome of the research may eventually be used. Any proposed release of information
concerning a research project is to be referred to Def Sy (S&T).
12-45
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
12-46
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX A TO CHAPTER 12
MINISTRY OF DEFENCE
DISCLOSURE OF INFORMATION
1. 'Information' means any information in any written or other tangible form
disclosed to one party by or on behalf of the other party under or in connection with
the Contract.
5. Clauses 2 and 3 shall not apply to any Information to the extent that either party:
a) exercises rights of use or disclosure granted otherwise than in consequence of,
or under, the Contract;
12A-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
b) has the right to use or disclose the Information in accordance with other
conditions of the Contract; or
c) can show:
i) that the Information was or has become published or publicly available for
use otherwise than in breach of any provision of the Contract or any other
agreement between the parties;
ii) that the Information was already known to it (without restrictions on
disclosure or use) prior to it receiving it under or in connection with the
Contract;
iii) that the Information was received without restriction on further disclosure
from a third party who lawfully acquired it and who is himself under no
obligation restricting its disclosure; or
iv) from its records that the same information was derived independently of
that received under or in connection with the Contract; provided the
relationship to any other Information is not revealed.
6. Neither party shall be in breach of this Condition where it can show that any
disclosure of Information was made solely and to the extent necessary to comply
with a statutory, judicial or parliamentary obligation. Where such a disclosure is
made, the party making the disclosure shall ensure that the recipient of the
Information is made aware of and asked to respect its confidentiality. Such disclosure
shall in no way diminish the obligations of the parties under this Condition.
12A-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX B TO CHAPTER 12
MINISTRY OF DEFENCE
SECURITY MEASURES
Definition
1. In this Condition:-
a) "Secret Matter" means any matter connected with the Contract, or its
performance which is designated in writing by the Authority as "Top Secret",
"Secret" or "Confidential", and shall include any information concerning the
content of such matter and anything which contains or may reveal that matter;
b) "Employee" shall include any person who is an employee or director of the
Contractor or who occupies the position of a director of the Contractor, by
whatever title given.
Security measures
12B-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
Sub-Contracts
Termination
12B-3
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
12B-4
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
Definition
1. In this Condition:-
a. "Secret Matter" means any matter connected with the Agreement, or its
performance which the First Party informs the Second Party in writing has
been designated by the Authority as "Top Secret", "Secret" or "Confidential",
and shall include any information concerning the content of such matter and
anything which contains or may reveal that matter;
b. "Employee" shall include any person who is an employee or director of
the Second Party or who occupies the position of a director of the Second
Party, by whatever title given.
c. The "Authority" means the Secretary of State for Defence.
RESTRICTED
RESTRICTED
Security Measures
RESTRICTED
RESTRICTED
Contracts Security
Sub-Contracts
7. If the Second Party proposes to make a sub-contract which will involve the
disclosure of Secret Matter to the sub-contractor, the Second Party shall:
a. submit for approval of the Authority the name of the proposed sub-
contractor, a statement of the work to be carried out and any other details known
to the Second Party which the Authority shall reasonably require;
b. incorporate into the sub-contract the terms of this Condition and such
secrecy and security obligations as the Authority shall direct.
c. inform the Authority immediately he becomes aware of any breach by the
sub-contractor of any secrecy or security obligation and, if requested to do so by
the Authority, terminate the Agreement.
Termination
8. The First Party shall be entitled to terminate the Agreement immediately if:
a. the Second Party is in breach of any obligation under this Condition; or
b. the Second Party is in breach of any secrecy or security obligation
imposed by any other contract with the Crown;
RESTRICTED
RESTRICTED
where the Authority consider the circumstances of the breach jeopardise the secrecy
or security of the Secret Matter and notifies its contractor accordingly.
RESTRICTED
RESTRICTED
Contracts Security
ANNEX C
MINISTRY OF DEFENCE
Definitions
General
2.
a) The Officer in Charge shall provide such available administrative and
technical facilities for the Contractor's representatives employed at
Government Establishments for the purpose of the Contract as may be
necessary for the effective and economical discharge of work under the
Contract. These facilities will be provided free of charge unless otherwise
stated in the Contract. The status to be accorded to the Contractor's
representatives for messing purposes will be at the discretion of the Officer in
Charge.
b) Any land or premises (including temporary buildings) made available to
the Contractor by the Authority in connection with the Contract shall be made
available to the Contractor free of charge, unless otherwise stated in the
Contract, and shall be used by the Contractor solely for the purpose of
performing the Contract. The Contractor shall have the use of such land or
premises as licensee and shall vacate the same upon completion of the
Contract. Any utilities required by the Contractor shall be subject to the
charges set out in the Contract.
12C-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
c) The Contractor shall have no claim against the Authority for any additional
cost or delay occasioned by the closure for holidays of Government
Establishments, where this is made known to him prior to placing the Contract.
4. The total liability of the Contractor under Condition 3 herein shall be subject to
any limitation specified in the Contract.
Contractor's property
a) where any such loss or damage was caused or contributed to by any act,
neglect or default of any Government Servant, agent or contractor then the
Authority shall accept liability therefore to the extent to which such loss or
damage is so caused or contributed to as aforesaid; and
b) where any property of the Contractor has been taken on charge by the Officer
in Charge, and a proper receipt has been given therefore, then the Authority shall
be liable for any loss or damage occurring to that property while held on such
charge as aforesaid.
Contractor's representatives
6. The Contractor shall submit in writing to the Authority for approval, initially and
as necessary from time to time, a list of the representatives who may need to enter a
Government Establishment for the purpose of, or in connection with, work under the
12C-2
JSP 440 Volume1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
Contract, giving such particulars as the Authority may require, including full details
of birthplace and parentage of any representative who:
7. The Authority will issue passes for those representatives who are approved by him
in accordance with Condition 6 herein for admission to a Government Establishment
and a representative shall not be admitted unless in possession of such a pass. Passes
shall remain the property of the Authority and shall be surrendered on demand or on
completion of the work
9. The decision of the Authority upon any matter arising under Conditions 6 to 8
shall be final and conclusive.
Observance of regulations
10.
a) The Contractor shall be responsible for ensuring that his representatives
have the necessary probity (by undertaking a Basic Check) and, where
applicable, are cleared to the appropriate level of security when employed
within the boundaries of a Government Establishment. The Contractor's
representatives shall comply with such rules, regulations and requirements as
may be in force whilst at that Establishment.
b) Where the Contractor requires information on the Basic Check procedure
or security clearance for his representative and/or is not in possession of the
relevant rules, regulations and requirements and/or requires guidance thereon,
he shall apply in the first instance to the Project Manager/Equipment Support
Manager.
c) When on board ship, compliance with the rules, regulations and
requirements shall be in accordance with the Ship's Regulations as interpreted
by the Officer in Charge. Details of such rules, regulations and requirements
shall be provided on request by the Officer in Charge.
12C-3
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Transport overseas
11. Where the Contractor's representatives are required by the Contract to join or
visit a Government Establishment overseas, transport between the United Kingdom
and the place of duty (but excluding transport within the United Kingdom) shall be
provided free of charge by the Authority whenever possible, normally by Royal Air
Force or by MOD chartered aircraft. The Contractor shall make such arrangements
through the Project Manager/Equipment Support Manager named for this purpose in
the Contract. When such transport is not available within a reasonable time, or in
circumstances where the Contractor wishes his representatives to accompany
materiel for installation which he is to arrange to be delivered, the Contractor shall
make his own transport arrangements. The Authority shall reimburse the Contractor's
costs for such transport of his representatives on presentation of evidence supporting
the use of alternative transport and of the cost involved. Transport of the Contractor's
representatives locally overseas which is necessary for the purposes of the Contract
shall be provided wherever possible by the Authority and, where so provided, will be
free of charge.
12C-4
JSP 440 Volume1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
15. The Contractor shall, wherever possible, arrange for funds to be provided to his
representatives overseas through normal banking channels (eg by travellers cheques).
If banking or other suitable facilities are not available, the Authority shall, upon
request by the Contractor and subject to any limitation required by the Contractor,
make arrangements for payments, converted at the prevailing rate of exchange
(where applicable), to be made by the Establishment to which the Contractor's
representatives are attached. All such advances made by the Authority shall be
recovered from the Contractor.
12C-5
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
12C-6
JSP 440 Volume1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX D TO CHAPTER 12
MEMORANDUM
TO: Info Sy (Industry)2/3 FROM:
ROOM 312
St Giles Court
1-13 St Giles High Street REF NO:
London WC2H 8LD DATE
STAMP:
12D-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
12D-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX E TO CHAPTER 12
COMPLETION OF FORMS
SECURITY QUESTIONNAIRE
Personal to:
12E-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
12E-2
JSP 440 Volume 1 issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX F TO CHAPTER 12
Personal to:
2. You should be aware that any protected information which may be disclosed
under this tender/contract is entrusted to you in strict confidence. It is protected by and
its recipients will be subject to the Official Secrets Acts 1911 to 1989. This applies
whether or not a contract or subcontract is eventually placed with you.
3. Can I please therefore ask you [and the other 2 employees Mr ......... and Mr
...........] to complete the enclosed Official Secrets Acts Form E74 in duplicate, retaining
one copy and returning the other to me at the above address.
Yours sincerely
12F-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
12F-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX G TO CHAPTER 12
SECURITY ASPECTS LETTER FOR INVITATIONS TO
TENDER TO UK CONTRACTORS CURRENTLY
ON LIST X
(PROTECTIVE MARKING)
Messrs ............................................
Dear Sir
1. On behalf of the Secretary of State for Defence, I hereby give you notice that any
sketch, model, article, note or document, or information connected with or arising out of
the above-mentioned Invitation to Tender, is subject to the provisions of the Official
Secrets Acts 1911-1989. Your attention is particularly drawn to the following specific
aspects which must be fully safeguarded:
PROTECTIVE ASPECTS
MARKING
(PROTECTIVE MARKING)
12G-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
(PROTECTIVE MARKING)
3. If you have any difficulty either in interpreting this definition of the protected
aspects or in safeguarding them, will you please let me know immediately, and send a
copy of your letter to your Security Adviser.
4. In the event of a contract being placed with you, these aspects would constitute
`SECRET matter' for the purpose of clause1 a) of Def Con 659 - Security Measures.
5. Any access to protected information on MOD premises that may be needed will
be subject to MOD security regulations under the discretion of the MOD Project Officer.
Yours faithfully
(PROTECTIVE MARKING)
12G-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX H TO CHAPTER 12
SECURITY ASPECTS LETTER FOR INVITATIONS TO
TENDER TO UK CONTRACTORS WHERE
PROVISIONAL MOD SECURITY APPROVAL FOR THE
COMPANY HAS BEEN GRANTED AND WHERE
CONFIDENTIAL OR ABOVE NEEDS TO BE
DISCLOSED AT THE TENDER STAGE
(PROTECTIVE MARKING)
Messrs ................................
Dear Sirs
1. On behalf of the Secretary of State for Defence, I hereby give you notice that any
sketch, plan, model, article, note or document, or information connected with or arising
out of the above-mentioned Invitation to Tender, is subject to the provisions of the
Official Secrets Acts 1911-1989. Your attention is particularly drawn to the following
specific aspects which must be fully safeguarded:
(PROTECTIVE MARKING)
12H-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
(PROTECTIVE MARKING)
4. If you have any difficulty either in interpreting this definition of the protected
aspects or in safeguarding them, will you please let me know immediately.
5. In the event of a contract being placed with you, the above aspects would constitute
`secret matter' for the purpose of clause 1 a) of Def Con 659 - Security Measures.
6. Any access to protected information on MOD premises that may be needed will
be subject to MOD security regulations under the direction of the MOD Project Officer.
Yours faithfully
(PROTECTIVE MARKING)
12H-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX I TO CHAPTER 12
SECURITY ASPECTS LETTER FOR INVITATIONS TO
TENDER TO UK CONTRACTORS WHERE
PROVISIONAL MOD APPROVAL HAS BEEN
GRANTED FOR THE CONTRACTOR BUT NO
INFORMATION ABOVE RESTRICTED NEEDS TO BE
DISCLOSED AT THE TENDER STAGE
PROTECTIVE MARKING
(not higher than RESTRICTED)
Messrs .......................................
Dear Sir
1. On behalf of the Secretary of State for Defence, I hereby give you notice that any
sketch, plan, model, article, note or document, or information connected with or arising
out of the above-mentioned Invitation to Tender, is subject to the provisions of the
Official Secrets Acts 1911-1989.
2. In the event of a contract being placed with you, the following aspects would
constitute `secret matter' for the purpose of clause 1 a) of Def Con 659 - Security
Measures..
12I-1
JSP 440 Volume 1 issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
PROTECTIVE MARKING
(not higher than RESTRICTED)
3. The enclosed form, which outlines the principal measures required to safeguard
RESTRICTED information, is attached for your information.
4. Will you please confirm that measures can and will be taken as necessary to
safeguard the protective aspects referred to above.
Yours faithfully
PROTECTIVE MARKING
(not higher than RESTRICTED)
12I-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX J TO CHAPTER 12
SECURITY ASPECTS LETTER FOR CONTRACTS AT
CONFIDENTIAL AND ABOVE TO LIST X
CONTRACTORS
(PROTECTIVE MARKING)
Messrs ..................................
Dear Sirs
1. On behalf of the Secretary of State for Defence. I hereby give you notice that the
following aspects are designated `Secret Matter' for the purpose of clause1 a) of Def
Con 659 - Security Measures included in the above contract:
a. The above definition of the Secret Matter of the above contract has been
brought to the attention of the person directly responsible for the security of this
contract.
3. If you have any difficulty either in interpreting the definition of the Secret Matter
or in safeguarding it, will you please let me know immediately, and send a copy of your
letter to your Security Adviser.
Yours faithfully
Copies to:
Info Sy (Industry)2/3
Def Sy (S&T) (PROTECTIVE MARKING)
12J-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
12J-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX K TO CHAPTER 12
Messrs ..................................
Dear Sirs
1. On behalf of the Secretary of State for Defence, I hereby give you notice that the
following aspects are designated `Secret Matter' for the purpose of clause 1 a) of Def
Con 659 - Security Measures included in the above contract:
If you have any difficulty either in interpreting the definition of the Secret Matter or in
safeguarding it, or in any other respect, will you please let me know immediately.
(PROTECTIVE MARKING)
12K-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
(PROTECTIVE MARKING)
Yours faithfully
Copies to:
Info Sy )industry)2/3
Def Sy (S&T)
(PROTECTIVE MARKING)
12K-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX L TO CHAPTER 12
SECURITY ASPECTS LETTER - CHANGE TO OR
AMENDMENT OF A SECURITY ASPECTS LETTER
(PROTECTIVE MARKING)
Messrs ..................................
Dear Sirs
1. On behalf of the Secretary of State for Defence, I hereby give you notice that the
following aspects are designated `Secret Matter' for the purpose of clause 1 a) of Def
Con 659 - Security Measures included in the above contract:
a. This re-definition of the Secret Matter of the above contract has been
brought to the attention of the person directly responsible for the security of this
contract.
3. If you have any difficulty either in interpreting the definition of the Secret Matter
or in safeguarding it, will you please let me know immediately, and send a copy of your
letter to your Security Adviser.
Yours faithfully
Copies to:
Info Sy (Industry)2/3
Def Sy (S&T)
(PROTECTIVE MARKING)
12L-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
12L-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX M TO CHAPTER 12
DOUBTFUL GRADINGS
................. .................
................ .................
................. .................
Dear Sir
From our knowledge of the subject and the written definition of the secret matter
in the Security Aspects Letter, reference ................. we should have considered a grading
of ................. more appropriate.
If you agree with this would you please let us know so that we may re-grade the
document.
If, on the other hand, you confirm that your grading is correct we should be
much obliged if you would, in due course, amend the Security Aspects Letter so that we
know precisely what information must be safeguarded under Def Con 659.
Our Security Adviser has asked us to use this form when in doubt about a
grading and to send him a copy.
Yours faithfully
Copy to:
Info Sy (Industry)2/3
Def Sy (S&T)
12M-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
12M-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX N TO CHAPTER 12
(PROTECTIVE MARKING)
MEMORANDUM
A. Full Name and Address of Contractor B. Full Name and Address of Place of
Manufacture (if Different from A.)
D. Name of Project:
Signed:
Date:
(PROTECTIVE MARKING)
12N-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
12N-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX O TO CHAPTER 12
Dear Sir
(PROTECTIVE MARKING)
12O-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
(PROTECTIVE MARKING)
b. Measures can, and will, be taken to safeguard the classified matter as set
out above and in the tender documents.
Yours faithfully
Copies to:
Info Sy (Industry)1
Def Sy (S&T)
(PROTECTIVE MARKING)
12O-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX P TO CHAPTER 12
SECURITY ASPECTS LETTER FOR CONTRACTS TO
OVERSEAS FIRMS APPROVED BY INFO SY
(INDUSTRY)1 FOR RELEASE OF INFORMATION AT
THE APPROPRIATE PROTECTIVE MARKING
(PROTECTIVE MARKING)
Messrs
CLASSIFICATION ASPECTS
b. The requirement and obligations set out above and in the contract
document can and will be met.
Yours faithfully
Copies to:
Info Sy (Industry)1
Def Sy (S&T)
(PROTECTIVE MARKING)
12P-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
12P-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX Q TO CHAPTER 12
Definitions
Security grading
2. The Authority shall issue a RESTRICTED Aspects Letter which shall define the
RESTRICTED matter that is furnished, or which is to be developed, under this Contract.
The Contractor shall mark all RESTRICTED documents which he originates or copies
during the Contract with the equivalent national grading.
3. Except with the consent in writing of the Authority, the Contractor shall not
disclose the Contract or any provision thereof to any person other than a person
employed by the Contractor. It must be confined to those members of the staff whose
access to the information is essential for the purpose of his duties.
4. Except with the consent in writing of the Authority the Contractor shall not
make use of the Contract or any information issued or furnished by or on behalf of the
Authority otherwise than for the purpose of the Contract, and, save as provided for in
Clause 5 the Contractor shall not make any article or part thereof similar to the Articles
for any other purpose.
5. Subject to any rights of Third Parties, nothing in this Condition shall, however,
constrain the use for any purpose by the Contractor of any specifications, plans,
drawings and other documents, the rights of which vest in him otherwise than as a result
of work carried out under this Contract.
7. When not in use RESTRICTED documents should be stored under lock and key.
12Q-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
Loss
Transmission
12Q-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX R TO CHAPTER 12
Definitions
Security grading
2. The Authority shall issue a RESTRICTED Aspects Letter which shall define the
RESTRICTED matter that is furnished, or which is to be developed, under this
Contract. The Contractor shall mark all RESTRICTED documents which he
originates or copies during the Contract with the equivalent national grading.
3. The Contractor's attention is drawn to the provisions of the Official Secrets Acts
1911 to 1989 in general, and to the provisions of Section 2 of the Official Secrets Act
1911 (as amended by the Act of 1989) in particular. The Contractor shall take all
reasonable steps to ensure that all persons employed on any work in connection with
the Contract have notice that these statutory provisions apply to them and will
continue so to apply after the completion or earlier termination of the Contract.
5. When not in use RESTRICTED documents should be stored under lock and key.
12R-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Loss
12R-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX S TO CHAPTER 12
SECURITY ASPECTS LETTER FOR A CONTRACT
INVOLVING INFORMATION PROTECTIVELY
MARKED RESTRICTED BUT NOT ABOVE, TO UK
FIRMS
(PROTECTIVE MARKING)
Messrs ..........................
Dear Sirs
1. On behalf of the Secretary of State for Defence I hereby give you notice that the
following aspects of the work under the above contract are marked RESTRICTED:
3. I have to remind you that information about this contract must not without the
approval of the Authority be published or communicated to anyone except where
necessary for the execution of the contract.
4. Your attention is drawn to the provisions of the Official Secrets Acts 1911-1989
in general, to the provisions of Section 2 of the Official Secrets Act 1911 (as amended
by the Act of 1920) in particular, that you should take all reasonable steps to ensure that
all persons employed on any work in connection with the contract have notice that these
statutory provisions apply to them and will continue so to apply after the completion or
earlier determination of the contract.
(PROTECTIVE MARKING)
12S-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
(PROTECTIVE MARKING)
6. The enclosed form, which outlines the principal measures required to safeguard
RESTRICTED information is attached for your information.
Yours faithfully
(PROTECTIVE MARKING)
12S-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX T TO CHAPTER 12
Note : In each case, the secretary is provided from the Branch which supplies the
Chairman. The results are published in the Army List of Classified Equipment (ALCE),
edited by Def Sys ESB (OM).
This Committee does not meet formally. Its Executive Secretary, DDef Sy (S&T),
obtains and disseminates the classification policies in major international collaborative
projects, and through the Air Equipment Security Sub-Committees.
The Air Equipment Security Sub-Committees cover the following aspects of air
equipment:
Technical Secretariat for all the Air Equipment Security Sub-Committees is Def Sy
(S&T).
These sub-committees meet at the relevant stage in the project when material
classification changes are required.
Def Sy (S&T) are also responsible for the provision of classification guides for private
venture funded equipment, atomic weapons and nuclear warheads, and guided weapons
for all three Services.
12T-3
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
12T-4
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
ANNEX U TO CHAPTER 12
3. The variant is one of the more common forms of private venture. Many such
variants may be no more than paper studies prepared for consideration by the defence
department of other prospective overseas customers. Each variant should be subjected
to a proper security assessment, since it may embody protectively marked aspects of
Service projects and therefore require formal departmental approval of release before
details of it may be made available to prospective overseas customers. Supporting
documentation, etc may also require in-house protection by the contractor and by
potential and actual customers.
4. The derivatives may not necessarily come formally to the notice of IPT Leaders.
The existence of paper studies or work on such derivatives should in every case be
reported to the security grading authority. A foreign power will rightly assume that
Service technology is fully abreast of such derivative work, that the performance of
Service equipment is unlikely to fall short of the performance of the derivative, and that
there will be much in common in the design work. Hence a degree of security
protection may be required to protect Service interests. Derivative projects may
subsequently be adopted for limited or full UK Service use.
12U-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Defence Manual of Security
6. Overseas sales of private venture equipment need not concern IPT Leaders,
except where they conflict with a contractor's undertakings to the department, eg if they
make unacceptable demands on existing design, production, or testing resources, or
where they require the release of information (protectively marked or unclassified).
7. For further information on private venture funded projects, see the Security In
Industry insert B1 of the Manual of Protective Security.
12U-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Security Responsibilities
ANNEX V TO CHAPTER 12
TEMPLATE OF SECURITY REQUIREMENTS (TSR) FOR
CONTRACTORS REQUIRING ACCESS TO [INSERT NAME OF
SITE]
Contents
Para
Introduction 1
Background 2
Guidance 3-4
Reference Documents 9
Counter Terrorism 20
Security Operations 27
Crime Prevention 34
JSP 440 Volume 1 Issue 2
12V-1
RESTRICTED
RESTRICTED
Defence Manual of Security
Training 35-36
RESTRICTED
RESTRICTED
Security Responsibilities
Introduction
1. The information contained in this Template of Security Requirements
(TSR) details the obligations and requirements of the Establishment Security
Officer (ESyO) and Contractors when contractor personnel require access to
[insert name of site].
Background
2. The Ministry of Defence (MOD) is subject to threats from espionage,
sabotage, subversion, terrorism and crime, and has a security infrastructure
throughout the Department. To counter these threats, the Department has established
a range of security regulations and procedures with which the Contractor will be
required to comply. Security is the responsibility of all personnel on MOD sites and
contract (including sub-contract) employees are to comply with all security
regulations and orders that are in issue (or may, from time to time, be issued) by the
Head of Establishment or on his behalf by the Establishment Security Officer
(ESyO) or other Security Authority. The Contractor is required to have a
disciplinary system to ensure that action can be taken against any member of staff
who fails to comply with security regulations or orders.
Guidance
3. The purpose of this TSR is to provide basic principles and guidance on the
security requirements when contractors personnel are required to undertake work at
[insert name of site]. The policy and specific security regulations are contained in
JSP 440 (Defence Manual of Security). In particular further information can be found
in JSP 440, Volume 1, Chapter 5 on Physical Security and the requirements on
Access to sites, Chapter 12 on Contract Security and Vetting of contractor personnel
in Volume 2. Copies of this TSR must be provided to the Contractor’s Site Manager
or his deputy as appropriate for communication to the contractors personnel.
4. One of the main activities of security is to control access, which includes the
reception of visitors. One of the purposes of access control is to establish identity,
especially that of temporary or short term contractors, for whom it may not be
practicable to carry out security vetting (which may involve Counter Terrorist Check
(CTC) clearances) which takes up to 6 weeks, or 6 months for the higher or foreign
clearances. Access measures may involve vehicle and body searches and, very
RESTRICTED
RESTRICTED
Defence Manual of Security
importantly, the need to escort those not in possession of a Defence Identity Card or
a local unescorted access pass. However, escorting is seldom possible without a
detrimental effect on the efficient running of the unit, and the instructions in this TSR
are designed to give flexibility whilst maintaining security. For instance, it may be
reasonable to accept that the identity documents provided by recognised
organisations to their employees towards proof of identity. Also the new Driving
Licence with photo is likely to be accepted.
RESTRICTED
RESTRICTED
Security Responsibilities
Reference documents
9. The references applicable to this TSR are contained in Appendix 2.
Personnel security
10. A fundamental part of personnel security within the MOD is the principle that
access to classified or protectively marked material is limited to those personnel with
the need to know the information in order to perform their duties efficiently. This is
known as the "need to know" principle and is enforced irrespective of rank or
appointment.
11. In addition to the need to know principle, access to classified material is not
permitted unless the appropriate security clearance has been granted. The process
leading to the issue of a security clearance is called security vetting. The Contractor
is to ensure that all staff are subjected to background checks. All posts filled or
created by the contractor are to have the appropriate level of clearance determined
by the level of access given on a case by case basis. In addition, where access to
national caveats is concerned, the rules in JSP 440 Volume 1 are to be applied.
Where necessary, the ESyO will advise on the level of security clearance needed
subject to the level of access required.
12. The policy on security clearances for the MOD is contained in JSP 440
Volume 2. The minimum level of clearance for any contract employee to have
unescorted access to MOD sites is the Basic Check (BC), in addition, a CTC is
needed for all who declare Irish or certain foreign connections. CTC may be needed
for all employees at sites of special importance, or where criminal convictions have
been declared or are suspected. All contractor employees are required to fill in the
Security Questionnaire MOD Form 1109 which will be checked by the ESyO, or
completed under his supervision. The BC is an employment check and may also be
carried out by the contractor under the supervision of the ESyO. This level of
clearance also permits supervised access to assets upto and including those
protectively marked CONFIDENTIAL. Any access to SECRET material requires
Security Check (SC) clearance, and access to specific higher levels, such as regular
access to TOP SECRET requires Developed Vetting (DV). Dual nationals (of which
one nationality is British) may only have access to UK EYES DISCRETION
information with the approval of the originators. If the contract involves the release
of UK EYES DISCRETION information to named recipients, such individuals may
only exercise their named recipient discretion, to disseminate further, in consultation
JSP 440 Volume 1 Issue 2
12V-5
RESTRICTED
RESTRICTED
Defence Manual of Security
with the originator or owner of the information. The ESyO will provide advice on
which posts need to be DV-annotated. There may also be access restrictions to some
types of protectively marked material by people who hold another nationality in
addition to British or who are not entirely British nationals.
14. In all instances, BC procedures are to be completed by the Contractor and the
results notified to ESyO, in the form of a Basic Check Verification Record (BCVR),
in advance of personnel reporting for work. If the Contractor is a List X firm, and
personnel have already been security cleared, it is the firm’s responsibility to notify
the EsyO of the security clearance details of the personnel. Clearance levels of such
personnel are to be notified to the ESyO before access to protectively marked
material will be granted. If the Contractor is either not a List X firm or is a List X
firm but the personnel do not hold the relevant clearance, it is their responsibility to
ensure that vetting applications are completed, in respect of their own and any Sub-
Contractor's staff, and submitted to the ESyO who, after verifying that clearance is
required, will formally sponsor the clearance application and forward the forms to
the appropriate Vetting Authority.
15. The Contractor is required to maintain a current list of all employees, Sub-
Contractors and their agents detailing all posts, requisite security clearance levels and
expiry date, along with the personal details of the incumbent and provide the ESyO
with an updated list upon request. The Contractor is responsible for maintaining an
auditable and accurate record of the security clearance of all personnel introduced to
the establishment in conjunction with the contract, for a period of 7 years. Should
any circumstances arise which could bring into question an employee's suitability to
hold or retain security clearance, or to have continued access to [insert name of site],
the Contractor is required to notify the ESyO without delay.
RESTRICTED
RESTRICTED
Security Responsibilities
17. Under Government nationality rules, the MOD can refuse to disclose or
permit access to information if disclosure or access would be contrary to the national
security interest. In particular, material bearing certain caveats carries nationality
qualifications.
Physical security
18. The ESyO is responsible for determining the physical security measures
appropriate for the safeguarding of protectively marked material. The type of secure
container, lock and level of checking required will be assessed and instructions
issued in accordance with security regulations.
19. Contractors and their staff will be required to adhere to the MOD policies on
physical security and be responsible for the handling and storage of sensitive
materials, data and information in their custody or control. Security containers will
be provided. All protectively marked material is to be handled in accordance with
JSP 440 Volume 1.
Counter Terrorism
20. The overall responsibility for counter terrorism (CT) within the UK lies with
the civil police. At [insert name of site] the is ESyO responsible for actioning CT
measures for the protection of personnel within MOD property. It is the
responsibility of the Contractor, Sub-Contractors and their staff to cooperate with
any security measures that may be imposed. Any staff who fail to comply with CT
measures increase the risks to all personnel and will be liable to be excluded from
[insert name of site] either permanently or for a prescribed period at the discretion of
the ESyO.
Security access
21. Access to [insert name of site] is the prerogative of the Head of
Establishment who has the authority to exclude personnel or their vehicles from
MOD property in response to security threats or personal indiscipline.
22. The ESyO is responsible for enforcing access control policies, and the
Contractor is responsible for ensuring that all staff comply with control of entry
requirements. All persons entering [insert name of site ]are required to positively
identify themselves and are liable to be searched on entering or leaving the
Establishment and at certain other facilities. Failure to comply may render staff
liable to exclusion from the Establishment.
23. All contract staff are to be in possession of a Pass at all times within the
bounds of [insert name of site]. In addition, all staff are expected to identify
JSP 440 Volume 1 Issue 2
12V-7
RESTRICTED
RESTRICTED
Defence Manual of Security
themselves using the Pass, upon the request of any Service person or other MOD
employee.
24. The ESyO is responsible for issuing all contract personnel with a Pass. The
Contractor is responsible for ensuring passes are withdrawn from those personnel
who leave his (or his Sub-Contractor's) employ, and returned to the ESyO for
cancellation.
c. The DO retains the right to implement security spot checks on all the
Contractor's staff and security records and, either in isolation or in
conjunction with the Contractor, his Sub-Contractors or agents.
d. The Contractor is to ensure that all staff are made aware of the "need
to know" principle and is to limit access to protectively marked assets to
those who require such access in the course of their duties. Further advice
regarding access restrictions may be obtained from the ESyO.
RESTRICTED
RESTRICTED
Security Responsibilities
Security operations
27. There are a number of counter-terrorist measures, which may be implemented
at short notice or over extended periods, intended to protect from, or at least diminish
the effects of, various terrorist threats against the Establishment and its personnel.
These include operations BIKINI, TESSERAL and ROUNDUP as well as other
contingency plans. Specific details and required responses are detailed in security
Standing Orders.
RESTRICTED
RESTRICTED
Defence Manual of Security
32 The use of approved security products falls into 2 categories: those to which
the Contractor will have access, and those installed by the Contractor. Should a
Contractor have access to, or custody to, approved security products, he should be
aware that any unauthorised disclosure of information regarding any aspect of the
product may constitute a breach of the Official Secrets Acts and Copyright law.
33. The ESyO 's consent is required prior to the introduction or use of any non-
approved equipment. This includes the use of any 'innovation' developed by the
Contractor.
Crime Prevention
34 The Contractor is to establish an internal control programme to eliminate
fraud and theft. The Contractor's employees will be expected to cooperate with
MOD policy crime prevention programmes, which include submitting to a cursory
search of vehicles and bags entering and leaving [insert name of site].
Training
35. With assistance from the ESyO the Contractor is required to train his staff,
and those of his permanent Sub-Contractors or agents, to a level of competence and
understanding of security regulations that will enable them to ensure they are
complied with at all times. Indeed, all personnel are to receive security training to
the level and within the timescale detailed in Appendix 3. The course content for all
security training is to be agreed by the ESyO.
TSR schedule
37. A TSR Schedule is at Appendix 4 for the guidance of Security Staff and
should be included in the TSR, though adapted for each situation.
Appendices:
RESTRICTED
RESTRICTED
Contracts Security
APPENDIX 1 TO ANNEX V
DEFINITIONS AND ABBREVIATIONS
Serial Term, Expression or Definition
No Title
(a) (b) (c)
1 Establishment Security ESyO is the generic term for Base Security
Officer (ESyO) Officer (BSO) or Unit Security Officer (USO) in
the Royal Navy, Unit Security Officer (USO) or
Branch Security Officer (BSO) in the Army,
Station Security Officer (SSyO) in the Royal Air
Force and the appointed chief specialist security
officer in MOD Agencies or industry.
5 Security Vetting The Basic Check is needed for security vetting and
CTC clearance and, whilst not in itself a vetting
measure, allows authorised and supervised access to
CONFIDENTIAL on a need to know basis. Vetting
includes Security Check (SC) for SECRET,
Developed Vetting (DV) for higher access and
Counter Terrorist Check for those with Irish or
some foreign connections and some others.
RESTRICTED
RESTRICTED
7 Protective Security The MOD protects its assets in terms of the threat
posed and the value of the material. A protective
marking indicates the value of material. Material
with a protective marking is to be safeguarded in
accordance with security regulations.
RESTRICTED
RESTRICTED
Contracts Security
RESTRICTED
RESTRICTED
RESTRICTED
RESTRICTED
APPENDIX 2 TO ANNEX V
REFERENCE DOCUMENTS
The notations against the above references have the following meanings:
G - The policies and procedures contained therein are not mandatory, but
proposals for alternatives must fully interface with procedures in use globally.
12V-App2-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
12V-App2-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
APPENDIX 3 TO ANNEX V
Serial Post/Functional
Training Frequency Remarks
No Area
(a) (b) (c) (d) (e)
1 Managerial Post Induction - ½ Day On Within one month of
Holders Appointment taking up
appointment.
2
Handling On Within one month of
protectively Appointment taking up
marked material - appointment.
½ day
3 All ESyOs ESyOs course - On Within 3 months of
3 days Appointment taking up
appointment.
4 All Registry Course - On Within one month of
Registry/Typing/ 5 days Appointment taking up
Admin Staff appointment.
Note:
This table is representative and may require extension or modification to take
account of posts at individual establishments.
12V-App3-1
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
12V-App3-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
APPENDIX 4 TO ANNEX V
TSR Schedule
Item Major Contract Related Requirement or Performance Standard
No Requirement Information
1 General
2 Security
Clearances
3 Vetting
Administration
Requirements
3a List X Contractors
3a(ii) Notify the ESyO of SC/DV is to be in issue before No more than 25% of clearances
the clearance level any access to protectively notified <48hrs and >24hrs before
of any staff marked material connected to starting work. No clearances notified
previously cleared annotated posts can be <24hrs before starting work.
under the List X permitted.
system, before they
report to work.
3b Non-List X Firms
3b(iii) When required, The ESyO is responsible for Not more than 20% submitted <72hrs
ensure that all conducting CTC screening but >48hrs and 10% submitted
completed CTC and for processing other <48hrs but >24hrs, before access
forms are submitted security clearance required.
to the ESyO for applications to DVA.
processing.
12V-App4-2
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
5 Protective Security
6 Counter Terrorism
6a Comply with CT Measures will be set out by the No incidence of contract (including
measures. Easy and will vary according to sub-contract) staff failing to comply
the threat level. fully with CT measures.
7 Access
Requirements
12V-App4-3
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
8 International
Arms Inspections
and Security
Operations
8a Ensure that all Actions and associated measures No incidence of contract (including
contract staff do detailed in Operation Orders and sub-contract) staff obstructing Arms
not obstruct Security Standing Orders. Inspections.
International Arms
Inspections.
12V-App4-4
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
9b Control and In accordance with JSP 440 and 100% compliance with MOD
administer all IT Security Standing Orders. regulations.
systems and their
associated media
used to process
official
information.
10 Communications
Discipline and
Security
10a Comply with In accordance with JSP 440 and No incidence of contract (including
Communications Security Standing Orders. sub-contract) staff failing to comply
Discipline and fully with Communications
Security Discipline and Security requirements.
requirements.
11 Security
Approved
Products
11b Obtain the ESyO’s The ESyO will determine if the No incidence of non-security
consent before use of security approved approved products being used
initiating any products is required. without the agreement of the ESyO.
innovation.
12 Crime Prevention
12V-App4-5
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
13a Attend induction As set out in Appendix 3. Course 100% attendance at courses within
and refresher content agreed by the ESyO. prescribed timescales.
security training.
13b Attend security As set out in Appendix 3. Course No incidence of untrained personnel
training relevant to content agreed by the ESyO. handling or having access to
posts involved in protectively marked material
handling unsupervised.
protectively
marked material.
14 Records and
Deliverables
14a Maintain records In accordance with JSP 440 Vol No incidence of incorrectly
on the creation, 1 and Security Standing Orders. maintained records.
copying,
registering,
movement,
transmission or
destruction of
protectively
marked material in
accordance with
Government,
MOD and any
Service
regulations.
15 Materials,
Equipment and
Facilities
15a Registers, charging As required by JSP 440 Vol 1 No incidence of incorrect forms being
sheets and other and Security Standing Orders. used in the administration of
forms and protectively marked material.
documents
required to
administer
protectively
marked material
will be available
through the
stationery supply
system.
12V-App4-6
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
Contracts Security
16a Security Locks and As required by JSP 440 Vol 1 No incidence of protectively marked
Furniture. and ordered through the ESyO. material being stored in anything
Approved security other than approved security
locks and furniture furniture.
will be supplied
through the supply
system.
12V-App4-7
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
12V-App4-8
JSP 440 Volume 1 Issue 2
RESTRICTED
RESTRICTED
CHAPTER 13
SECURITY EDUCATION, TRAINING AND
AWARENESS
Introduction 1301
Responsibilities 1304
Education 1321
Training 1340
RESTRICTED
RESTRICTED
RESTRICTED
RESTRICTED
CHAPTER 13
Introduction
1302. Aims. This chapter covers two aspects of one subject, the aims of each are:
a. Security education. To ensure that all who work within the MOD, both
military and civilian, irrespective of their access to protectively marked
assets/material, understand both the security threat and their responsibilities for
countering it.
1303. Higher coordination. This is achieved by means of the Security Awareness Working
Group (SAWG) which is chaired by DDefSy.
Responsibilities
1304. The Ministry of Defence. The Director of Defence Security (DDefSy) is, inter alia,
responsible for formulating and sustaining policy on, and coordination of, security education
and training in the MOD as a whole.
1305. Central Budget Security (HQ, PE & Industry). CB(Sy) is responsible for advising
on security training requirements throughout the MOD civilian estate. It includes a small
training branch for the provision of basic protective security training and Branch Security
Officer (BSO) courses and liaises with other agencies to facilitate more specialised training.
RESTRICTED
RESTRICTED
1306. The Defence Intelligence and Security Centre (DISC). DISC is a Defence Agency
and is located at Chicksands. It comprises the following schools:
f. Implementing Royal Navy and Army security training policy through courses
of instruction at, or sponsored by, the DISC.
1307. The RAF Provost & Security Training Squadron (P&STS). P&STS is located at
RAF Halton. The OC is responsible for implementing Royal Air Force security training
policy through courses of instruction at P&STS.
c. Providing advice and assistance for both intermediate level and establishment
security education and training.
d. The preparation and issue to DISC and to P&STS and down the chain of
command of education and training material from case histories and reports.
1309. Intermediate Commanders. These commanders are responsible for the security
education and training within their command. Such commanders can make a major
RESTRICTED
RESTRICTED
1310. Directors and heads of divisions in MOD and MOD agencies. Such persons are
responsible for ensuring that:
c. Those personnel who have full or part-time security duties attend suitable
education and training courses to enable them to fulfil their responsibilities.
1311. Heads of establishments (HOE). These individuals are the most important links in
the chain of command/management as far as security is concerned. It is therefore imperative
that such persons should be, and be seen to be, thoroughly security conscious; they must
insist on the highest standards of security throughout the establishment. They must appoint
an ESyO and an EITSyO and make sure that they are properly trained by attending the
appropriate course(s) prior to taking up their appointment, or within three months of doing so.
The single most important factor in maintaining high standards of security will be the attitude
adopted by the head of establishment to this subject.
1312. Establishment security officers (ESyO). The generic responsibilities of the ESyO
are shown at para 0227 in Chapter 2 of Volume 1; and those of the EITSyO are given in
Annex B to Chapter 1 of Volume 3.
1313. The ESyO, in conjunction with the EITSyO, should organize and arrange for security
education and training on behalf of his HOE; so that all personnel understand the nature of
the threat to security, and are instructed in the application of security procedures to counter
the threat. Security education and training should be a continuous process; it must never be
allowed to recede into the background due to other pressures. Special attention must be given
to ensure the appropriate training of all personnel whose employment involves security
duties. Such personnel include:
RESTRICTED
RESTRICTED
b. Clerks, secretaries and all those who handle protectively marked documents.
d. Service and unit police, members of unit guards including civilian security
officers (MOD Guard Service) and contract guards.
1314-1320. Reserved
Security education
1321. The security education needs of new recruits should be assessed and met as early as
possible. Security education should be part of an ongoing training process, to ensure that the
subject is not allowed to lapse into the background. Properly handled, security education
should make all members of the Armed Services and all civilians who work for them or for
the MOD aware:
a. That a threat exists and its nature (see para 1322 below).
b. That the individual has personal responsibility for security including their
own.
e. Of the security risks associated with overseas travel, more especially for those
with SC and particularly with the DV clearances.
1322. The Threat. Current threats to security, not in any particular order of priority, arise
from:
b. Sabotage.
c. Subversion.
RESTRICTED
RESTRICTED
d. Terrorism.
e. Non traditional threats, eg leakage, hacking, fraud theft and criminal damage.
1323. Weapons, ammunition and explosives. All serving personnel are to be regularly
reminded to pay the greatest attention to the security of weapons, ammunition and explosives
(see Chapter 6). The need for maximum vigilance in this matter is underscored by the fact
that such items stolen from the military are known to have been used to murder British
servicemen.
a. All staff must be given security education at least once in a calendar year. The
subjects to be covered are non-exhaustive but must include topics listed in para 1321
above.
1325. Reserved.
1326. Teaching. Security education can be dull, unless it is put over imaginatively and in a
way that grips the interest. The aids which should be considered are detailed at Annex B.
1327. Internal security education material. Internal security education material will be
coordinated where necessary by DDefSy and includes:-
RESTRICTED
RESTRICTED
1328. External security education material. The quarterly "Security Education News"
(SEN) and other occasional briefing notes, booklets and pamphlets published by the Security
Service contain topical and timely articles and advice on security issues. Whenever possible,
SEN uses Clip Art illustrations. Persons controlling security education may use and
reproduce this material to promote security as an integral part of the work of the individual
and organisation.
1329. New procedures. When changes in security rules or procedures are introduced, care
is to be taken to ensure that these changes are made known to those affected. Furthermore,
any fresh training that may become necessary as a result of such changes should be
conducted without delay.
1330-1339. Reserved.
Security training
1340. Such training is mandatory for all officers and civilians going to security staff
appointments, including those where security is only part of their work. It is also necessary
for all types of establishment security officer, secretarial staff, those engaged with weapons
or explosive ordnance, and all others whose duties impinge on, or have an element of security
in, their responsibilities. The appropriate Director of Security or his equivalent lays down the
type of course that all staff officers and civilians with security responsibilities should attend.
All lead command headquarters have this information.
1341. Range of subjects. Security training must invariably include instruction on:
RESTRICTED
RESTRICTED
e. Practical experience in applying the security rules and procedures on the tasks
in which staff are, or will be, engaged.
1342. Annual refresher training. The staff listed in Paragraph 1340 above are to receive
annual refresher training. This training is to be recorded in a register, the details of which are
specified in Paragraph 1324b(1) to (4). The subjects to be covered are primarily the threat
followed by whatever topics listed in para 1341 above are most appropriate. Within Head
Office establishments, responsibility for conducting this training rests with branch security
officers. Outside Head Office, the training will be run by either security specialists or
ESyOs.
1343. Training methods. Though a large amount of training will be through central
courses of instruction; details of which are published annually in DCIs and by training teams
visiting establishments, there will also be the need for talks and seminars. Detailed guidance
is given in Annex B.
1344. External courses. The Ministry of Defence D Def Sy is able to arrange vacancies on
outside courses of kinds not seen within the MOD (normally of one day's duration) with the
Security Service. The Civil Service Staff College also runs a number of security courses,
which are chargeable to local budget holders. Requests for further information and bids for
vacancies should be made through Lead Commands, who hold details.
1345. Specialist training support. Both at home and in certain overseas commands
Intelligence Corps and RAF P&SS personnel provide security education and training
facilities for establishments within the commands. Elsewhere, specialist units provide
RESTRICTED
RESTRICTED
similar, but more limited, security education and training support as required by the security
staff.
1346. IT security training. In addition to that available within the MOD, such training is
also provided by the Security Service, the Civil Service Staff College, the Communications
Electronics Security Group (CESG), DISC, P&STS and the Defence IT Management
Training Centre (DITMTC). All these courses are open to both Services and civilian
personnel.
1347. Individuals moving for the first time to posts with responsibilities and tasks involving
protectively marked material should be fully briefed by the ESyO on the security implications
of the work, and the correct practices to be adopted on taking up their positions. Whenever
possible, security education & training should be an intrinsic part of the preparation of a new
post.
1348. Persons who already have some experience of protectively marked material should
receive specific training when they are given significant additional tasks or responsibilities.
In particular, further training will be required on management training courses. This should
include a clear security education and training element, clarifying the respective
responsibilities of line and personnel management for the security of staff in their charge.
Examples of additional security education and training requirements, which are likely to arise
from changes in or extension of duties include:
RESTRICTED
RESTRICTED
Security Education, Training and Awareness
ANNEX A
ANNEX B
5. Posters. Posters are not intended to teach lessons, but to remind staff of the
threats to security and of the principal security measures necessary to combat them.
To retain their impact, posters must not only be prominently displayed but also
frequently changed.
6. Wall Calendars. These, featuring a different security theme for each month,
particularly when well designed, can be very effective in pressing home the security
message.
secure use of the telephone and of computers). Stickers should be placed on, or
adjacent to, the equipment concerned, but not on security containers.
Note: Many security training aids produced by other Agencies, such as those
advertised in "Security Education Material" and "Security Education News", now
attract a cost.
ANNEX C
6. With both presentations and courses, frequent question and answer periods
provide a change of pace and the opportunity of digesting the information. Such
periods need to be guided or simulated by the course staff.
7. Appropriate visual aids (eg multimedia, the overhead projector, slides and the
display board) should, whenever possible, be used to reinforce the effect of the
spoken word. Clear and simple aids that enhance the talk but do not distract the
audience should be used.
ANNEX D
Introduction
1. Essentially, multimedia involves the use of text, graphic and animation files,
photographic images and sound and video clips to create dynamic, computer based
information delivery and learning products. Multimedia products are invariably
packaged, ie recorded in a simplified playable format, on CD ROMs (Compact Disk
Read Only Memory). Each CD can store up to the equivalent of 650 million
characters and can be played on a compatible multimedia system.
2. The basic stand alone multimedia system differs from the standard personal
computer, or laptop, in that it includes a CD ROM drive, sound card and separate
speakers. Some systems include a MPEG (Motion Picture Expert Group) card that
allows full screen viewing of video clips without loss of picture quality.
Multimedia Products
a. Training/education.
b. Information Management.
c. Product catalogues.
d. Advertising.
e. Presentations.
Multimedia Advantages
slashed their training budgets and reduced their training resources. On the other, the
need for training has risen relative to the
Benefits of CBL
6. Organisations using CBL as part of the whole of their training strategy have
reported the following benefits when comparing CBL with traditional teaching
methods; that it:-
7. To make the best use of resources the Security Service has set up a
multimedia production group. The group comprises qualified trainers with
multimedia authorising skills. They are responsible for identifying, analysing and
developing appropriate multimedia products in support of our protective security
advisory and education roles. As a pilot scheme the Security Service has produced a
CBL package which deals with the handling of sensitive intelligence. This package
has been distributed for use by thousands of individuals dispersed worldwide. Its
cost works out at about 42.5 pence per user!
CHAPTER 14
General 1401
Principles 1412
Procedures 1419
CHAPTER 14
1402. Surprise and security are two of the principles of war; surprise cannot be
achieved without good security. On operations, the tempo, nature and extent of activity
may preclude carrying out in full the detailed security procedures outlined elsewhere in
JSP 440. This is not to suggest that security on operations is of less importance than at
peacetime base locations or on exercises. Indeed, the success of operations depends in
great measure on the element of surprise and on the steps taken to prevent knowledge of
friendly force intentions reaching the adversary; security enhances freedom of action by
limiting vulnerability to adversary activities and threats. Thus, security on operations is
based primarily on the security of information. The main object is to prevent the
adversary obtaining information about our intentions, order of battle, vulnerabilities,
deployment and movements. In certain types of operations, especially where terrorism
is involved, measures required to prevent the seizure of arms, ammunition and
equipment, and attacks against our own forces with, for example, improvised explosive
devices, also assume significant importance.
1403. Although the detailed procedures given elsewhere in JSP 440 may not all be
fully appropriate to the operational scenario, the principles upon which these procedures
are based remain equally valid in both peace and war.
1404. The aim of this chapter is to provide general guidance to assist commanders to
produce their own security orders while deployed on operations ranging from minor
conflict to general war. To ensure that all personnel are familiar with their
responsibilities, these procedures are to be practised on exercises as appropriate.
on operations. Further information and details of OPSEC can be found in AJP-01 and
JDP 3/98.
Force Protection
1406. In future conflict, the emphasis will be on joint operations with UK forces
operating as part of a multinational force. The battlespace will be non-linear with
few or no ‘safe’ areas, and the Host Nation administration may well have collapsed,
exposing the force to a wide range of threats. Security and protection, as key
components of capability, assume an even higher importance in joint operations.
JDP 1/99 considers UK doctrine for Force Protection in a joint and multinational
context and provides a framework for comprehensive protection of the deployed
force to conserve its fighting strength, in order to achieve its mission with minimum
casualties to both personnel and equipment. The UK doctrine examines, within the
context of joint operations, future conflict and the need for Force Protection, its aim,
definitions and principles; its constituent elements; a concept of operations; and its
command and control. The protection of the force, including the force generation
phase, on the UK mainland, in NI and permanent garrisons abroad is addressed by
existing MOD and theatre policy covering standing security measures although such
policy may be modified in response to other operations.
1407. Force Protection can be defined as a process which aims to conserve the
fighting potential of the deployed force by countering the wider threat to all its
elements from adversary, natural and human hazards, and fratricide. Force
Protection is not an issue that can be addressed separately or in isolation. It is an
integral part of operations and must be incorporated into the Commander’s plan from
the outset. In Joint Operations involving UK forces overseas the CJO’s Strategic
Estimate will consider Force Protection as a factor, and this should be reflected in the
deployed force levels. The Force HQ will examine Force Protection in more detail in
the Operational Estimate, which will confirm Force Protection policy and security
requirements based on the threat assessment.
e. Liaison with Host Nation Security Forces. Where the host nation
security forces retain some operational capability, liaison is vital to co-
ordinate actions. In some cases Host Nation security forces may have
primacy, in nearly all they can provide intelligence and other related
information about conditions in theatre.
Security Orders
1411. Requirement. Force HQ security staff are responsible for the preparation and
issue of security orders for operations and deployments. A checklist of headings that
should be used in security orders is at Annex B. Not all headings need be used but
security plans should include countering specific threats and must be reviewed regularly
to adjust to changes in the threat. Security orders must provide for the denial to the
adversary of information and intelligence received directly or indirectly from for
example:
Principles
1412. The following principles must be observed.
c. Security planning must start at the highest level with the initial concept
of operations and be integral to operational planning.
Threat Assessment
1413. Responsibility. Force Protection is a risk management process based on the
threat assessment, the results of which determine measures addressing: overall and
collective protection; security; and health and safety. Over-protection to counter an
improbable threat can divert scarce resources from achieving the mission. An overall
threat assessment (which should include the protagonists’ current and possible future
intent derived from their aims, doctrine, culture and history) will be conducted at
MOD/PJHQ level as part of the planning process. An overall assessment of Force
Protection requirements based on this threat assessment should be incorporated into
the CDS directive. Once the force has deployed, the Force HQ will refine this threat
assessment as part of the Joint Task Force Commander’s (JTFC) estimate and
directive. Additional localized assessments will need to be conducted, particularly in
OOTW and Peace Support Operations (PSO), where the threat may vary. Where
more than one adversary exists, their intents, threats and capabilities must be
included in the threat assessment. This may reveal a threat to the UK mainland or
UK forces in other theatres arising from a conflict, which may include non-violent
activities such as PSYOPS and other associated tactics aimed at influencing
international perceptions. Countering such threats will be the responsibility of the
local authorities. The threat assessment should consider the following security
elements:
a. Future intentions.
e. Order of battle.
b. Radio and line communications. All messages sent by radio are liable
to interception by the adversary. Similarly, although to a lesser degree,
messages sent by landline can also be intercepted by the adversary. The
importance of the strict application of communications security procedures laid
down in Chapter 9 is particularly important.
1416. Security of personnel. The adversary may attempt to undermine the morale of
our own troops and to breed disaffection using the following main methods:
1417. Security of materiel. The key factors in countering sabotage of all types,
including minor damage and pilferage of materiel, are a well trained and supervised
guard force, strict physical security controls, and effective access control.
1418. Personal security. The adversary will attempt to assassinate or capture key
personnel. Likely adversary targets should be identified by the Force HQ security staff
in consultation with the intelligence branch. Trained close protection (CP) teams
should be deployed by the appropriate staff to protect these individuals. Details of the
movement plans of such individuals should be kept on a strict need-to-know basis.
Procedures
1419. Security of operations. Security must be an integral part of all operational
plans. To be effective security must be considered from the earliest stages of
operational planning. Steps to be considered are:
1420. Physical security. Detailed physical security arrangements for HQs and units
in the field will depend on the local threat and on the type of HQ or unit concerned.
The following points are to be considered:
a. Control of access.
c. Track discipline.
e. Vehicle parking.
f. Noise control.
g. Lighting control.
(6) To advise the OPSEC staff on, and in conjunction with that staff,
monitor the implementation of relevant OPSEC measures.
(14) To ensure that until such time as they are taken over by
communications staff or units, no radio, television or telephone
installations are available for use by adversary sympathizers.
ANNEX A TO
CHAPTER 14
SUGGESTED OUTLINE OF STAFF RESPONSIBILITIES
FOR SECURITY WITHIN A FORCE HQ ON
OPERATIONS
Chief J2
Advice to the force commander on all aspects of Force security.
SO2/SO3 J2(X)
Organization and day to day direction of the Force HQ security staff.
Staff work concerned with security investigations carried out by security units
Direction of all protective security measures including the arrangements for the
handling and custody of protectively marked documents, and vetting or screening of
locally employed personnel, within Force HQ.
SO2/SO3 J2(SP)
Control of access to and dissemination of information from special communications
cell.
Initial investigation of all security incidents within their branch and subsequent
requests (if appropriate) for security unit involvement.
Ensuring that all branch personnel are fully aware of security procedures.
ANNEX B TO
CHAPTER 14
CHECK LIST OF SECURITY ASPECTS TO BE
COVERED IN SECURITY ORDERS
The following security matters need to be addressed as soon as an operation is
envisaged.
(The list is not exhaustive, nor will items apply under all circumstances.)
18. Restrictions on radar and radio testing and the use of radio communications.
ANNEX C TO
CHAPTER 14
SECURITY BRIEFING FOR PERSONNEL DEPLOYING
ON OPERATIONS
Briefing
1. All personnel deploying on operations are to be briefed on the following
subjects where applicable:
a. The threat. This should cover all phases of the operation and all areas
involved, e.g: ports of entry and exit, staging ports and in theatre.
e. The security risks inherent in conversation with civilians prior to, during
and after operations. The need to report any suspicious approach which may be
made by civilians.
g. Communications security.
b. Control and recording the issue and receipt of arms, ammunition and
explosives.
4. Only those protectively marked documents that are essential for use during an
operation are to be removed from their normal secure place of storage and taken into the
field. Such documents are to be protected as follows:
b. The individual who is normally responsible for their accounting and safe
custody is to retain a copy of the list. Should the unit security officer issue the
documents further, he is to do so on signature to those individuals who need to
use them. If the documents are destroyed this should be supported by an
appropriate witness signature.
unattended when not in use. The normal rules for controlling access to
protectively marked documents are to be applied at all times.
d. At the end of the operation the branch or unit security officer is to recall
all documents issued by him and check them for completeness. On completion
of the recovery phase he is to return them to the owning individual where they
are to be checked once more for completeness, as in sub-paragraph a above,
before being returned to their normal place of storage.
d. When all details in the register have been deleted the register is to be
closed formally and retained for one year.
6. A l00 per cent check of those essential policy and reference documents
protectively marked TOP SECRET is to be carried out daily. TOP SECRET
documents that are dependent on the operational situation for their degree of protective
marking are to be subject to checks as laid down by the force commander. A l00 per
cent check of all extant TOP SECRET documents is to be carried out at the end of the
operation.
10. Such instructions may form part of SOPs or Security Standing Orders. They are
to include:
a. The need for physical checks of the equipment during all phases of the
operation and at each location as appropriate (including whilst under repair).
ANNEX D TO
CHAPTER 14
b. Protective markings.
Registration of Documents
4. Prior to deciding that the use of the Protected Document Register (MOD Form
102) for protectively marked documents marked SECRET and above is not possible
without adversely affecting operations, a commander should consider whether the
continued use of the register for TOP SECRET and CODEWORD material should
continue. If not, he should consider the possibility of each unit keeping a record in the
appropriate log. The following details should be entered in the log:
b. The reference number of the battle board clip or file into which the
message is filed by the unit.
Checks
6. Checks of documents marked SECRET and above, should be made at
appropriate intervals laid down by the Force HQ security staff.
Destruction
7. All protectively marked documents taken into the field are to be reviewed for
destruction on a daily basis.
Safeguards on Operations
11. Protectively marked documents that are not in use but are still required to be
held are to be stored in locked secure containers approved by the Force HQ.
15. Protectively marked documents should be held in HQs and units as far from the
front line as operationally acceptable.
16. Protectively marked documents should not be carried when closing or in contact
with the adversary unless operationally essential.
Loss or Compromise
17. The loss or compromise, or suspected compromise of a document marked
SECRET or above is to be reported immediately to Force HQ, to the HQ or unit which
originated the document, and to all other HQs and units affected. The reporting HQ or
unit is to include in the report an immediate assessment of the damage caused so that
counter compromise action can be taken.
Unclassified Documents
18. Unclassified documents, including letters, diaries and photographs should not be
carried on operations when closing with the adversary, as they may give useful
information to interrogators in the event of capture.
ANNEX E TO
CHAPTER 14
2. Allusions to any of the following matters are forbidden at all times in private
correspondence and telephone calls during operations, whether they relate to naval,
military or air forces, except in specific releases authorized by the Force HQ:
j. Effect of any action by the adversary. Any remark that may tend, if
published, to encourage the adversary, to cause despondency in our own forces,
people or allies, or to incite a feeling of hostility among the people in the theatre
of operation or in neutral countries.
6. It is forbidden to send through the post photographs or films except those taken
under proper authority.
8. It is forbidden to make use of the civil postal service in the theatre of operations.
ANNEX F TO
CHAPTER 14
Codewords
4. Issue. Codewords are issued by Force HQ to subordinate HQs on demand.
Similarly, subordinate HQ are responsible for issue to units on demand. Bids for an
allocation of codewords should be made as early as possible so that requirements can be
met and an adequate reserve list of codewords for issue can be maintained.
"Codeword is ........"..
Nicknames
7. To prevent duplication the use of specific nicknames should be authorised by
superior HQ.
Passwords
8. Force HQ is responsible for issuing a force password to be changed at 1200
hours local time daily. To avoid problems of dissemination, lists of passwords and their
period of validity should be issued, sometime in advance - commensurate with the
operational profile of password users.
ANNEX G TO
CHAPTER 14
a. Detect and prevent entry and exit of persons suspected of being engaged
in espionage, sabotage subversion or terrorism or undesirable political activity.
Organisation
2. Within the theatre or area concerned a TCS HQ will be formed under the
command of a senior security control officer (SSCO). The duties of SSCO are outlined
below. Since the work of TCS in any theatre or area will depend on the prevailing
circumstances and the reliability of other control agencies they are given only in general
terms.
4. TCS HQ will direct the work of security control officers (SCOs) who command
TCS detachments at port, frontiers and airfields. The RN, Army or RAF may provide
these detachments.
a. To act as liaison officer between the Army or RAF SCO and the RN
authorities or the approved port authority.
c. To ensure, in consultation with the SNA etc that all HM ships conform
to the TCS regulations in force.
c. Prevent or detect the introduction of any item that may be used for
sabotage or subversive purposes.
d. Ensure that all the security control measures designed to channel all
traffic through travel control posts are working smoothly.
Methods
8. Control of entry into and exit from a territory is achieved by:
a. Port control.
b. Frontier control.
c. Airfield control.
9. At ports, frontiers and airfields TCS falls into two broad divisions. These are:
Travel Control
10. Travel control has two aspects common to all its posts at ports, frontiers and
airfields. These are:
a. The preventive role which involves the examination of all persons and
materiel in transit, with the aim of carrying out the tasks listed in paragraph 2 a.
and b. above.
b. The informative role, which involves the screening of all travellers with
the aim of carrying out the task listed in paragraph 2 c.
b. Examination, which must take place at such a point that no person, can
embark or disembark or cross the frontier without authority. Guards may be
necessary. Travellers must have passports examined, visas or entry permits
checked and be checked against security suspect and stop lists; they may be
12. The informative role includes the interrogation of selected travellers who have
been assessed in the initial screening as possessing information of possible intelligence
value. Action may consist of:
Security Control
13. The success of travel control depends on well organized security control which,
in turn, must be tied in with all other security measures. The executive responsibilities
of all concerned must be clearly defined and understood.
14. The way in which traffic will be canalized through ports, frontiers or airfields
will vary with the geographical and other factors. The essentials of preventive security
controls are discussed in the following paragraphs.
15. Coastlines. A prohibited zone (PZ) is necessary, both on the seaward and
landward side of the coastline. This involves a coast watching system and normal civil
and service controls in the PZ. These usually consist of:
16. Ports and dock areas. A port of dock area will normally be declared a
protected place (PP). The port commandant or approved authority is responsible for the
physical protection of the port and for all other security matters therein.
17. Frontiers. Where no natural obstacles exist a physical barrier should be erected
and the frontier clearly marked. The frontier must be guarded either by police, frontier
guards or troops as a deterrent to illegal frontier crossers (IFCs).
19. Security along the frontier and within the PFZ is the responsibility of the area
commander.
20. Airfields. Close liaison between air traffic control tower and TCS personnel is
essential if the latter are to be informed on the movement of aircraft entering or leaving
the airfield. Security control in the airfield is the executive responsibility of the station
commander, advised by the I(S)O and the local APM.
24. Reports will vary according to circumstances but are normally covered by
standard formats. They will include:
a. Examination reports.
c. Crew report.
h. Incident reports.
e. Local index.
f. Seamen’s index.
Conclusion
26. TCS is a necessary part of the overall security plan. For it to be efficient:
a. It must be integrated with the other security measures, under the control
of the CI staff.
CHAPTER 15
(SPARE)
CHAPTER 16
NATIONAL CAVEATS
General 1601
Exchange/integrated/attached personnel
(including those serving in joint operations)
serving with the UK Armed Forces and
Gurkhas serving with the British Army 1613
Waivers 1615
RESTRICTED
RESTRICTED
Defence Manual of Security
CHAPTER 16
NATIONAL CAVEATS
General
1601. This chapter provides guidance on the use of core national caveats, guidance on
marking assets to be sent to the US and the special handling instructions for messages.
Throughout this chapter you will see references made to the words listed below. These
are deemed to mean the following:
c. “Owner”- the originator or his/her successor(s). In the event that the original
post may have been abolished, then the owner becomes whoever has immediate line
management responsibility for that post.
1603. Before applying a national caveat to any information, the originator should
give serious consideration to the content, recipients and the likely uses to which that
information will be put within MOD. This is particularly relevant in the following:
caveats (eg UK EYES ONLY or UK EYES DISCRETION). The prefix "UK" is not
a national caveat. It is used to prevent protectively marked information from being
disclosed under existing or future local Freedom of Information (FOI) legislation in
other countries (For sending UK information to the US see paras 1622 to 1626).
Composite caveats
1607. A composite caveat denotes that the information may be shared by nationals
of more than one country (eg UK/US etc). The aim of composite caveats is to
restrict the dissemination of sensitive assets by limiting disclosure only to foreign
nationals with a proven “need-to-know”, who are authorised and appropriately
cleared for access. These caveats are most widely used in areas of activity where the
exchange of sensitive information is routine, for example, between the international
JSP 440 Volume 1 Issue 2
16-4
RESTRICTED
RESTRICTED
National Caveats
1610. Dual nationals in industry Dual nationals (of which one nationality
is British) employed by UK contractors may only have access to UK EYES
DISCRETION information with approval of the originator. Where MOD contracts
involve the release of UK EYES DISCRETION information, and where dual
nationals have been granted access to such information by the originator, the contract
Security Aspects Letter should be the same as stated in para 1609 above.
may only be granted, without the originator(s) approval, where the civilian non-UK
national is a national of one of the countries concerned.
1612. Non-UK nationals Such nationals are not to be given access to any UK
national caveated information without the express approval of the originator. They
are only allowed access to composite caveated information if they are a national of
one of the countries concerned. Release is subject to the requirements of sub-
paragraphs 1608a-d above being fulfilled and having regard to the release levels set
out in Table X which is issued by DESP2. Where conflict exists, the rules on release
of protectively marked information take precedence.
Waivers
1615. Exceptionally, it may be necessary to grant access to a specific document to
those not normally entitled to receive nationally caveated information. Permission
for a waiver should always be sought from the originator, who should consider the
release levels set out in Table X and consult Info(Exp)Access1 if there is potential
for release under any foreign Freedom of Information (FOI) regimes. Originators are
advised to consult their Principal Security Adviser before carrying out a risk analysis
to determine the potential damage to UK national security should such information
be passed on to a third country.
1618. National caveats must not appear on envelopes. You should address it to
either an individual or a specific post entitled to receive it. The envelope should be
marked EXCLUSIVE. This will ensure that in an addressee's absence, special local
arrangements will enable a designated officer to gain access to the information and
act accordingly. Details on how to correctly despatch protectively marked
information is given in JSP 440, Volume 1, Chapter 4.
1619. Registered files, branch folders or other covers enclosing caveat information
must be marked accordingly. When in transit, despatching procedures laid down in
JSP 440, Volume 1, Chapter 4 are to be followed.
1623. Under the terms of the UK/US General Security Agreement, UK protectively
marked material will be protected form automatic release, provided that it is prefixed
"UK". However, such information may still be requested under US legislation, and
originators should be prepared to justify why the information should not be
Fig 1a
Fig 1b
It should be noted that this label will only provide protection to information passed to
the US Departments of Defense and Energy, as they are the only departments granted
exemption from the US FOIA provisions. No other marking should be used unless
there is a written agreement with the US authority concerned that information so
marked will be protected from disclosure.
1628. Departments and agencies should consult their Principal Security Adviser
where they experience difficulties in applying appropriate markings for assets to be
sent to the US, or in the general handling of US classified information.
1630. Originators may specify that a signal message receives SPH by assigning a
SPH instruction or caveat. Not all SPH instructions are recognised by the
international community - this is indicated in brackets after each instruction shown
below.
1631. The changes to security described in this chapter, and the wider distribution
of SPH cryptographic facilities, has enabled caveats and SPH instructions to be sent
and received in signal form throughout Defence.
ANNEX A TO
CHAPTER 16
UK EYES DISCRETION 1 No No No No No
Notes:
1 See Annex C for release of UK EYES DISCRETION information to exchange
and integrated officers and officers on attachment with the MOD.
2 In certain arenas, primarily the intelligence domain, the exchange of
information with all of the allies mentioned in the table above is routine. In
such circumstances, it may be a branch's/unit's or agency's normal, authorised
practice to allow the holders of information discretion to share it with those
countries, with the caveat CANAUSNZUKUS EYES ONLY being assumed
rather than explicit. Originators should therefore ensure that they apply the
appropriate national caveat to information when it is necessary to constrain
dissemination to nationals of those countries.
ANNEX B TO
CHAPTER 16
UK PROTECTIVE MARKINGS IN MESSAGES TO
ADDRESSEES SERVED BY NON-UK COMMS
NETWORKS AND USE OF THE SPH INSTRUCTION 'UK
COMMS ONLY'
Introduction
1. The SPH instruction 'UK COMMS ONLY' may be appropriate for example
where a UK addressee is served by a non-UK comms network, and sight of the text of a
message may cause embarrassment to either the UK or the host organisation/nation.
The use of this SPH instruction ensures that a message reaches the intended UK
addressee(s) without having been seen by non-UK nationals. (This may be achieved by
off-line encryption, by using suitably approved or protected UK communications links
or, in some cases by sending a signal by protectively marked mail.) The paragraphs
below contain the rules for the highest UK protective markings which may be sent over
non-UK communications networks.
networks.
3. Provided the address section does not include a UK Signal Message Address
(SMA), signal messages up to and including UK SECRET may be sent to foreign
agencies over suitably secure and approved US, NATO or old Commonwealth
networks. Originators must be sure the text is releasable, and must insert the words
'UK CLASSIFIED RELEASE IN CONFIDENCE' at the start of message text.
RESTRICTED
National Caveats
DISCRETION (DV/SC+) (DV/SC+)
o o o
16C-1
Notes:
# Serving members of the UK Armed Forces and MOD civilians who are
Commonwealth or Republic of Ireland nationals – see para 1611.
CHAPTER 17
Chapter Para
17. STRAP Security Guidelines (Sanitized)
CHAPTER 17
STRAP SECURITY GUIDELINES (SANITIZED)
Introduction to the STRAP System
1701. The "STRAP System", which is explained fully in Volume 5 - STRAP Security,
is a set of nationally agreed principles and procedures to enhance the "need-to-know"
protection of sensitive intelligence (and related operational information) produced by
the principal UK Intelligence Agencies, including MOD sources. STRAP is a
Codeword, not an acronym. It is used to mark most types of material handled under the
STRAP System. (Where this is practicable, because of technical constraints, the
originating Agencies will give guidance on the STRAP equivalent of Codewords.) The
Codeword STRAP, in isolation, does not require a protective marking.
1704. The "traditional" threat to the UK's intelligence operations from foreign
intelligence services (FIS) remains a potent one - particularly in the field of scientific,
technical and industrial espionage - and the classic methods of attack are likely to be
employed. However, many of today's high priority intelligence targets are not
connected to a foreign Government or, therefore, to a professional intelligence service.
Whilst this may be seen to reduce the level of risk, it does not make these intelligence
operations any less vulnerable.
1705. For example, activities against the UK national interest, such as terrorism, drug
trafficking and other illegal dealing by individuals and organisations are increasing in
significance - and hence in priority as intelligence targets. The threat to operations
against these targets is less likely to arise from positive acts of counter-espionage, than
from leakage of information through disaffected members of staff, or as a result of the
attentions of an investigative journalist, or simply by accident or carelessness.
1706. In this wider definition of Threat, the "enemy" is unwelcome publicity of any
kind, and through any medium. The most effective safeguard is to reinforce those
JSP 440 VOLUME 1 Issue 2
17-3
RESTRICTED
RESTRICTED
aspects of security that minimise the risk of leakage of sensitive intelligence operations
or product into the public domain - whether by accidental exposure or deliberate intent.
The STRAP System aims to achieve this.
1708. Information that requires protection under the STRAP System will be clearly
defined and labelled. It will be carried by authorized couriers during transit, and signed
receipts will be obtained at all stages of handover.
1711. Within the Department are individually appointed STRAP Security Officers
(STRAPSOs) who oversee the implementation of the approved STRAP security
measures within the Services and MOD HQ, DPA and DERA. The principal Sector
STRAPSOs are as follows:
JSP 440 VOLUME 1 Issue 2
17-4
RESTRICTED
RESTRICTED
STRAP Security Guidelines (Sanitized)
CHAPTER 18
SECURITY INSTRUCTIONS FOR THE USE OF
UNARMED COMMERCIAL GUARD FORCES IN
GREAT BRITAIN
Introduction 1801
Vetting 1817
UNCLASSIFFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFFIED
UNCLASSIFIED
Security Instructions for the Use of Unarmed Commercial Guard Forces in GB
CHAPTER 18
SECURITY INSTRUCTIONS FOR THE USE OF
UNARMED COMMERCIAL GUARD FORCES IN
GREAT BRITAIN
Introduction
1801. The purpose of these instructions is to set out minimum security standards,
criteria and procedures for the selection and use of commercial companies to provide
contracted unarmed guard forces to the MOD, including its agencies. Heads of
Establishment (HOE) may seek higher standards if they wish, bearing in mind the
additional costs which might be incurred.
1805. No contract for the use of commercial guards may be entered into before
consulting the PSyA. Contracts are to be arranged through the appropriate
Commercial Staff (CS). Contact details are at Annex A.
18-1
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
1806. Guidance for the HOE, the PSyA and CS on the security aspects of seeking a
commercial guarding contract is set out at the Annexes. The guidance applies to the
security element of all guarding contracts, including multi-activity contracts (MAC),
public and private partnership projects involving guarding, private finance initiatives,
market testing, contracting out processes and to sub-contractors providing a guarding
service via a prime contractor. The decision whether to include security guarding in a
MAC is to be a matter of consultation with DGS&S through D Def Sy.
General
1810. To ensure that MOD contracts are only awarded to CGFs that are capable of
achieving and sustaining the required standards, the compulsory eligibility criteria set
out in Paragraphs 1811 to 1817 are mandated. Under CFQ rules MGS are exempt
from this scrutiny.
or
18-2
UNCLASSIFIED
UNCLASSIFIED
Security Instructions for the Use of Unarmed Commercial Guard Forces in GB
Accreditation
1812. Companies which are invited to tender must satisfy the CS that they are
certified by an accredited third party body to ISO 9000 sequence of Quality
Management and Quality Assurance Standards. It is important that the Certification
Body also includes in its accredited scope, the full requirement of BS 7499:1998
(Code of Practice for Static Guarding, mobile patrol and keyholding services).
Particularly stringent attention must be paid to the company’s recruiting policy and
standards.
a. If necessary confirm with D Def Sy and with HOEs, at whose sites the
firm has an existing contract, that contracts and are being fulfilled
satisfactorily.
Manpower
1814. The CS is to ensure that the contract stipulates that, in accordance with the
EU Working Time Directive, guards are to work a maximum average 48-hour week,
in shifts not exceeding 12 hours. A minimum manning ratio of 4 guards for each 24-
hour post is mandated. The Contractor is to maintain an adequate pool of employees
who are security cleared and trained to the required standards to ensure that the
guarding requirement is fully met at all times.
Training
1815. Companies invited to tender must agree that all commercial guards and on-
site supervisors will have achieved the training standards laid down in Annex D,
before the start of the contract.
Statements of requirements
1816. Advice on the need for and preparation of Statements of Requirements (SOR)
is at Annex E.
Vetting
1817. All commercial guard force personnel must undergo a Basic Check (BC) and
Counter Terrorist Check (CTC) before they are permitted to take up their duties. The
18-3
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Evaluation of tenders
General
1818. On receipt of tenders, CS will call for a technical evaluation. The purpose of
the evaluation is to ensure that the company meets the standards required by these
instructions. It is to be conducted by the PSyA on behalf of the HOE. The PSyA is
to inform the CS of any company judged unable to meet the security requirements of
the Contract. The report of the Technical Evaluation should be forwarded to the CS
who will then conduct the commercial evaluation and, taking all aspects of the tender
into account, recommend a company to the HOE for award of the contract.
Medical
1819. In putting forward the name of a Guard or Supervisor for employment the
Contractor should be required to confirm in writing in each and every case that they
have established that the Guard or Supervisor is medically fit for employment. If this
is subsequently found not to be so, the Guard or Supervisor should be withdrawn by
the Contractor and replaced by an approved substitute. The cost of any medical
examinations required should be borne by the company competing for the Contract.
The medical standards required by a company of its site employees should be
examined. The following is an extract from BS 7499:1998. Paragraph 5.1. These
should be used as medical guidelines when drawing up a contract.
Conduct
1820. A code of conduct for on-site employees, the terms of which tendering
companies must accept, is at Annex F.
18-4
UNCLASSIFIED
UNCLASSIFIED
Security Instructions for the Use of Unarmed Commercial Guard Forces in GB
18-5
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
18-6
UNCLASSIFIED
UNCLASSIFIED
Security Instructions for the Use of Unarmed Commercial Guard Forces in GB
ANNEX A
COMMERCIAL STAFFS AND
TLB PRINCIPAL SECURITY ADVISERS
COMMERCIAL STAFFS
1. CINCFLEET / 2SL/CNH:
2. CINCLAND / AG:
3. CINCSTC / HQ PTC:
a. ADC/STC, Bldg 1406, RAF Daws Hill, High Wycombe HP11 1SH
18A-1
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
a. FMG1b1, Poplar minus one, Mail Point # 2005, Abbey Wood, Bristol,
DS34 8JH
TLBs
Trading Funds
18A-2
UNCLASSIFIED
UNCLASSIFIED
Security Instructions for the Use of Unarmed Commercial Guard Forces in GB
ANNEX B
SEQUENCE OF EVENTS IN APPOINTING
COMMERCIAL GUARD FORCES
2. Having received confirmation from the PSyA that the award of a commercial
guarding contract would be compatible with current security policy the Head of
Establishment (HOE) decides if such a contract is desirable. The establishment then
initiates a Statement of Requirement (SoR) as detailed at Annex D.
10. CS forwards the technical element of the tenders to HOE (through the Project
Officer undertaking management of the requirement on his behalf) and the PSyA for
evaluation. The PSyA is to carry out this evaluation and inform CS of any tenders
that are non-compliant and ranking all tenders in order of technical merit.
18B-1
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
11. CS conducts commercial evaluation of tenders, and taking into account the
technical and commercial evaluations, recommends the winning tender to the HOE
for approval.
15. CS notifies D Def Sy and the PSyA of details of winning bid using the
proforma at Annex H.
16. Contractor initiates vetting action for his employees in accordance with
Annex C, Appendix 3.
18B-2
UNCLASSIFIED
UNCLASSIFIED
Instructions for the Use of Unarmed Commercial Guards in GB
ANNEX C
RESPONSIBILITIES OF HEADS OF
ESTABLISHMENTS
Acquiring a Contract
1. On reaching a decision that contract guarding for the establishment is
desirable, the Head of Establishment (HOE) is to nominate a Project Officer from the
staff, directed to manage the project from "cradle to grave". The Project Officer is to
establish contact with the Principal Security Adviser (PSyA) and Commercial Staff
(CS). Some PSyAs may direct the DO to establish contact and maintain liaison with
the local Security Unit. The PSyA will provide contact details.
2. The Project Officer is responsible, on behalf of the HOE, for the following:
18C-1
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
18C-2
UNCLASSIFIED
UNCLASSIFIED
Instructions for the Use of Unarmed Commercial Guards in GB
APPENDIX 1 TO
ANNEX C
DAILY BRIEFING FOR GUARD FORCE
1. Every member of the guard force is to be briefed by his supervisor, who will,
in turn, have received a briefing from the establishment DO or his representative,
before the tour of duty starts.
2. The briefing should include at least the following as appropriate, but it should
be noted that this list should not be regarded as exhaustive:
b. Alert state.
d. Planned events.
h. Communications.
i. Administration.
18C1-1
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
18C1-2
UNCLASSIFIED
UNCLASSIFIED
Instructions for the Use of Unarmed Commercial Guards in GB
APPENDIX 2 TO
ANNEX C
MONITORING GUARD FORCE PERFORMANCE
General
1. This Appendix gives guidance to the Designated Officer (DO) in monitoring
Commercial Guard Force performance. In order to exercise any control of
performance it is incumbent on the Head of Establishment (HOE) to ensure that the
following points are covered fully in the Statement of Requirements (SoR) - (see
Annex E).
c. Training standards.
Manpower
3. The Contractor should maintain sufficient resources to ensure the
performance required in the contract is achieved. This may include maintaining a
specified number of guards on site at times of designated alert.
4. In nominating those staff that he would wish to assign to the task, the
Contractor must provide a strength of Guard Force sufficient to be self-contained and
able to cover normal time off, meal breaks, leave, training and sickness. The
mandated minimum ratio is 4 guards to each 24-hour guard post.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Hours of work
8. The DO should ensure that any contractual limitations on working hours are
adhered to. A daily record is to be kept on site by the Contractor for the regular
inspection by the DO, of hours and shifts worked by each individual.
9. DOs should be aware that the normal hours of work should be 48 hours per
week; as an exception an extra shift or number of hours may be worked up to a
maximum of 56 hours in a period of 7 days. A Guard or Supervisor, having worked
56 hours in 7 consecutive days, must be given 48 hours consecutive time off by the
Contractor unless there is an emergency whilst he is waiting for a replacement. Over
an agreed reference period, normally 17 weeks but in certain circumstances (as set
out in the EU WTD) up to 52 weeks, the contractor is to ensure that his employees
do not exceed an average of 48 hours of weekly working time.
10. Whenever a Guard or Supervisor leaves his post (e.g. for a rest, meal or tea
break) the contract should require his duties to be assumed by a replacement guard or
supervisor.
UNCLASSIFIED
UNCLASSIFIED
Instructions for the Use of Unarmed Commercial Guards in GB
b. The Contractor shall further provide foul weather clothing for each
Guard and Supervisor when on duty which, when worn, will not impede the
execution of their tasks.
12. Equipment.
d. The DO will undertake to provide for the use by the Contractor's staff
such specialist search and communications equipment as may be deemed
necessary for their contracted tasks.
Code of conduct
13. Contract guarding personnel will be contractually expected to abide by the
MOD's "Code of Conduct for Guards" (see Annex F). This Code amplifies the basic
code of conduct contained in BS 7499. The DO is to report any contravention of the
Code as a breach of contract. Any member of the CGF who is in breach of the
MOD's Code of Conduct may be refused access (by the DO) to the MOD property
being guarded under the terms of the contract.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
per shift out of normal working hours including at weekends and public holidays
(inspection at more frequent intervals can be arranged under the terms of the contract
if so required by the DO).
16. During silent hours duties, frequent communication between site and area
control either by telephone or radio is essential; the frequency may be varied
according to the importance of that which is being protected but once per hour is
normal with irregular "reverse" calls being made by Control to ensure that all is well;
any missed calls from the site should be investigated immediately by the Company.
Supervision by the DO
17. The guard force on duty is to be wholly responsible to the requirements of the
DO in execution of their agreed tasks. Guards on duty are to be visited, not less than
once every 24 hours by the DO's staff or representative, this may be in conjunction
with the Contractor's Inspectorate.
18. The guard force is to be tested in the execution of their agreed tasks not less
than once a year by the DO (who should consult the TLB Principal Security Adviser
(PSyA) over details of the execution of the test and assistance from the local Security
Unit if required). The Contractor's Inspectorate may attend such exercises as
observers. The DO is to render to the Contractor a report on each occasion of a test
and within 30 days of that test on the effectiveness and performance of the guard
force; for their part, the Contractor shall respond to that report within 30 days of
receiving the report. No on-site training or exercises are to take place without the
permission of the DO.
19. In an emergency the DO will have the right to order the Contractor's staff on
duty to perform such reasonable tasks as may be necessary for the security of the
site. Any such emergency task must be reported to the Contractor, the Commercial
Staff (CS) and the TLB PSyA as soon as reasonably possible. See Annex G,
Paragraphs 3 and 4.
Industrial action
20. In the event of industrial action by any of the guards on the establishment
premises, the DO is not to interfere but is to inform the Contractor and in the first
instance ask him to provide alternative arrangements. If he is unable or unwilling to
18C2-4
UNCLASSIFIED
UNCLASSIFIED
Instructions for the Use of Unarmed Commercial Guards in GB
do so the DO is to seek alternative guarding arrangements from the PSyA (if deemed
necessary, depending on the scale of the industrial action) as an immediate action.
Full details of the industrial action are to be forwarded to the CS.
18C2-5
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
18C2-6
UNCLASSIFIED
UNCLASSIFIED
Security Instructions for the Use of Unarmed Commercial Guard Forces in GB
APPENDIX 3 TO
ANNEX C
GUARD FORCE VETTING
3. On receipt of the MOD Form 1109 and BCVR, the HOE is to satisfy himself
that they contain sufficient information on the prospective guard for the award of the
BC clearance. The award of BC clearance is to be recorded by the HOE and the
supporting documentation retained on the applicant’s file.
4. The HOE is to forward the original MOD Form 1109 to the relevant Vetting
Agency for completion of a CTC. A copy of the original MOD Form 1109 is to be
retained by the HOE for record purposes. The Vetting Agency is to report the
granting of a CTC to the HOE and this clearance is to be recorded.
5. In forwarding the BCVR and MOD Form 1109, the Contractor is to confirm
in writing (using the proforma at the end of this Appendix) that they have themselves
carried out a background check on the prospective guard covering the previous 3
years, or a lesser period for recent school leavers, consulting former employers as
necessary, and have no reason to doubt the reliability of the guard or supervisor. In
this context it should be noted that the security companies do not have access to the
Police National Computer, nor are they exempt from the Rehabilitation of Offenders
Act.
6. The Contractor should be required to give not less than 3 month's notice to
the DO, should the Contractor wish to assign Guards or Supervisors who are, or have
been, employed on duties concerned with a foreign embassy or a company abroad.
The DO is to notify the appropriate TLB Principal Security Adviser (PSyA) and
provide as much detail as possible.
18C3-1
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
From: (Company)
Telephone:
Fax:
Date:
Contract number:
Age of guard
Page 1 of 2
18C3-2
UNCLASSIFIED
UNCLASSIFIED
Security Instructions for the Use of Unarmed Commercial Guard Forces in GB
It is confirmed that:-
a. Full background enquiries have been completed to BSIA or equivalent
standards covering the last years without adverse result.
7. BCVR & MOD Form 1109 are attached and details are correct to the best of
my knowledge.
8. Approval is granted for the above named to work under the terms of the
above Contract:
Page 2 of 2
18C3-3
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
18C3-4
UNCLASSIFIED
UNCLASSIFIED
Security Instructions for the Use of Unarmed Commercial Guard Forces in GB
ANNEX D
TRAINING OF COMMERCIAL GUARDS
Training Standards
1. All contract guards and on-site supervisors, including those who form the
mandated reserve pool and normally work elsewhere, are to have successfully
completed the MOD Unarmed Guard Training Course (MUGTC) prior to
commencing their duties.
MUGITC
3. The course documentation is held by the Security Industry Training
Organisation Ltd (SITO), the National Training Organisation for the Secure
Environment. A summary of the course training objectives is at Appendix 1. The
MUGTC may only be taught by instructors who have successfully completed the
SITO “Train the Trainers Course Parts I and II” and the “SITO/MOD Train the
Trainers Part III Assessment Module”. All guards and on-site supervisors must
successfully complete the MUGITC before they commence work.
MUGInTC
4. The course documentation is held by SITO. All guards and on-site
supervisors must successfully complete the MUGInTC during their first 2 days on-
site, as part of their induction process. Guards nominated for the reserve pool may
complete the MUGInTC up to 12 months prior to employment. If not employed on-
site over a 12 month period, they must retake the course to remain eligible for
employment.
Continuation Training
5. There is a requirement for a minimum of 13 hours of on-site continuation
training to be completed over a two-year cycle after 1year in-post, for each guard and
on-site supervisor. The training is mandatory and Companies must provide sufficient
manpower to accommodate the requirement. Companies are to:
18D-1
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
7. SITO will maintain a database, on behalf of MOD, of all guards and on-site
supervisors who have sat and passed the MUGTC. A list of all personnel so
qualified will be provided to the HOE by the contractor prior to the start of the
contract. Untrained personnel may not be used for guarding except in extremis when
no alternative is available. Prior authorisation in this instance is to be obtained from
the HOE. If this happens on a frequent basis, the PSyA is to be informed by the
HOE and consideration is to be given to terminating the contract. On passing the
MUGTC personnel will receive a PDLB from SITO in which Initial, Induction and
Continuation Training and NVQ achievements will be recorded. This book must be
available at all times for inspection by SITO/MOD representatives.
8. All companies must allow the SITO auditing team and/or MOD Inspection
teams access to their training courses, training records and to inspect their employees
PDLBs. TLB PSyAs may initiate such an inspection at any time. HOEs who have
any doubts about the training standards of any guards at their establishments should
request an inspection by the appropriate PSyA. A full audit report is to be submitted
to the appropriate PSyA and D Def Sy.
18D-2
UNCLASSIFIED
UNCLASSIFIED
Security Instructions for the Use of Unarmed Commercial Guard Forces in GB
9. HOEs may contact SITO direct to consult the databases of either Qualified
Trainers or Trained Guards. This can be achieved by contacting the Operations
Department either by e-mail (address: [email protected]) or by facsimile (fax number:
(01905) 724949). Telephone calls will not be accepted initially until the contact has
been authenticated by one of the approved methods.
10. Company Training Staff wishing to obtain information from the database
must apply in writing to SITO Operations Dept quoting their individual SITO
Trainer’s Number.
a. Provide SITO with a list of instructors who are to teach the course (by
fax or e-mail – see Paragraph 9 above) and confirm that all have successfully
completed the SITO “Train the Trainers Course Parts I and II” and the
“SITO/MOD Train the Trainers Part III Assessment Module”. SITO will
verify the list against their records.
Validation of Training
12. Validation of the training course will be carried out by D Def Sy periodically.
18D-3
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
NVQ/SVQ
13. The company must have a training programme in place which will ensure that
within 9 months of the start of the MOD contract at least 30% of its guards allocated
to the contract will possess:
or
The company must also ensure that it can maintain that level of NVQ/SVQ
involvement for the duration of the contract.
18D-4
UNCLASSIFIED
UNCLASSIFIED
Security Instructions for the Use of Unarmed Commercial Guard Forces in GB
APPENDIX 1
TO ANNEX D
THE MOD UNARMED GUARD INITIAL TRAINING
COURSE
m. Execute a patrol.
18D1-1
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
18D1-2
UNCLASSIFIED
UNCLASSIFIED
Security Instructions for the Use of Unarmed Commercial Guard Forces in GB
ANNEX E
STATEMENTS OF REQUIREMENTS
Introduction
1. Once the HOE has reached a decision that commercial guarding would be
appropriate for the site, the sequence of events at Annex B is to be followed in full
consultation with the PSyA and Commercial Staff (CS). Before tenders can be
sought by the CS, the security requirements must be clearly defined by the sponsor
establishment in a Statement of Requirements (SoR), also known in some areas as a
Statement of Security Requirements (SSR). The SoR should comprise the site
specific, mandatory security requirements. These requirements should take the form
of stating the output required of the contractor, for example "to deny access to the
site by unauthorised persons" rather than to state an input requirement "x number of
access control personnel to be employed". In this way, responsibility for denying
access rests with the contractor should a breach occur. Factors to be considered in
preparing the SoR are set out below. The TLB PSyA must be consulted on the
contents of the SoR. The Commercial Staff should also advise during its preparation.
2. The SoR will form the basis of the contract resulting from the tendering
exercise. The contractor is only bound to perform the requirements specified in the
contract.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
PSyA, the HOE is to forward the SoR, together with financial approval from the
budget manager, to the CS who will invite competitive tenders based on the SoR.
5. In preparing the SoR, the HOE and PSyA should cast it in terms of defining
the task or output required of the Contractor, rather than an input in terms of
specifying the number of guard posts required for each task. The latter is a matter for
the prospective bidder to consider having been given the task(s) and will be judged
by the HOE and PSyA at the technical evaluation phase of the contract process.
Note, however, that a minimum-manning ratio of 4 personnel to each 24-hour
guarding post is mandated at Paragraph 1814 of this Chapter.
18E-2
UNCLASSIFIED
UNCLASSIFIED
Security Instructions for the Use of Unarmed Commercial Guard Forces in GB
c. Site Patrols:
e. General Responsibilities:
18E-3
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
(5) Fire.
h. Communications:
j. Conditions of service:
k. Guard Force Facilities (The SoR will need to specify who will
provide which facilities i.e. either MOD or the Contractor):
1
See Annex G, Paragraph 3 for the requirement to insert a Security Enhancement Clause in all
commercial guarding contracts
2
Ditto
18E-4
UNCLASSIFIED
UNCLASSIFIED
Security Instructions for the Use of Unarmed Commercial Guard Forces in GB
(2) Furniture.
l. Additional/Reserve manpower.
10. The SoR will form the basis of the contract resulting from the tendering
exercise. Only the requirements specified in the Contract will be performed by the
Contractor. Accordingly, it is essential that any proposed changes to the SoR which
may arise during the evaluation process must be scrutinised and approved by the
HOE and the PSyA before the contract is awarded.
18E-5
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
18E-6
UNCLASSIFIED
UNCLASSIFIED
Instructions for the Use of Unarmed Commercial Guards in GB
ANNEX F
CODE OF CONDUCT FOR COMMERCIAL GUARDS
EMPLOYED BY MOD
Introduction
1. The principal function of the Guard is to support the maintenance of security
at MOD units and establishments where the Guarding Contract applies.
Personal Qualities
2. Commercial Guards employed on MOD Contracts are required to uphold the
fundamental values and requirements inherent in the Rule of Law. In doing so, each
individual will need to exhibit the following personal qualities:
a. Honesty.
b. Integrity.
c. Impartiality.
d. Common sense.
Code of Conduct
Professional Approach
4. Guards must strive to maintain the highest standards. The manner in which
Guards approach their duties will influence the way others measure their efficiency
and ultimately the effectiveness of what they do.
Rule of Law
5. The Law (Statute and Common) reflects rules imposed upon the community
that are binding.
18F-1
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Exercise of Powers
6. Guards must carefully weigh up all factors; be fair and firm but above all
avoid intolerance, over-enthusiasm and being dictatorial. They must show caution
when acting upon suspicion and comply with the law concerning citizen's powers of
arrest. (The Police and Criminal Evidence Act 1984, Section 24 and Criminal Law
Act 1967, Section 3).
a. Neglecting or, without due and sufficient cause, failing to carry out
promptly and diligently a required task within their Job description whilst at
work.
e. Divulging to any other person, who does not need to know, any matter
which is protectively marked or is the private business of the MOD or
contractors, past or present.
18F-2
UNCLASSIFIED
UNCLASSIFIED
Instructions for the Use of Unarmed Commercial Guards in GB
o. Failing to report for duty at the correct time and place unless due
notice and reasons have been given to their supervisor.
18F-3
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
18F-4
UNCLASSIFIED
UNCLASSIFIED
Security Instructions for the Use of Unarmed Commercial Guard Forces in GB
ANNEX G
SECURITY CONSIDERATIONS ON COMMERCIAL
ISSUES
Evaluation of Tender Bids
1. Commercial Staff (CS) are responsible for making a recommendation for the
award of a contract to the HOE, with input from the TLB Principal Security Adviser
(PSyA) in evaluating the technical aspects of the bid.
Variation of Requirement
General
3. An alteration to the guarding posture may be required due to a change in the
overall threat level, reassessment of the security of the location concerned by the
relevant security staff, or due to particular security requirements for a specific event
(e.g. a VVIP Visit). Thus, all guarding contracts are to contain a Security
Enhancement Clause (SEC) to meet the additional requirements of higher Alert
States. The contract should state that in the case of a change to the threat level the
Designated Officer (DO) has the right to invoke the SEC without prior permission.
(See Annex C, Appendix 2, Paragraph 19). The DO should familiarise himself with
the contract documents which may have procedures which differ from those detailed
below.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
c. Obtain financial approval for the proposed change, and then forward
the financially endorsed requisition to the CS.
d. CS will then negotiate with the Contractor and agree a price for the
proposed amendment, and then issue a formal amendment to the contract.
UNCLASSIFIED
UNCLASSIFIED
Security Instructions for the Use of Unarmed Commercial Guard Forces in GB
obligations. For example, any evidence that the contractor is working his staff on
shifts in excess of what is permitted in the contract should be recorded and reported
as a breach. The CS will write to the Contractor to ensure that the MOD's
contractual rights are safeguarded. Minor problems should be covered in regular
monthly contractor/client meetings, but all indications of dissatisfaction (including
those dealt with orally at local level) are to be recorded and kept on file. More
serious breaches should be notified immediately in writing to the CS, copy to the
PSyA. If the report is deemed by the PSyA to be particularly serious, for example
the incident calls the functioning of the company, as opposed to individual
employees of the company, into question, or is likely to attract media attention, D
Def Sy is to be notified. PSyAs are to include details of all serious instances of
breach of contract in their annual security report to D Def Sy.
Change in Role
8. If it is likely that the location to be guarded will have a change of
occupancy/role which may invalidate the use of commercial guards, the change is to
be reflected in the terms for terminating the contract.
TUPE
10. When permanent MOD staff are to be transferred under the Transfer of
Undertakings (Protection of Employment) Regulations 1981 (TUPE), advice is to be
sought from Command Secretariats and Civil Management. The sensitivity of
industrial relations, particularly where permanent staff are to be transferred under
TUPE, should not be underestimated. Where redundancy may result, Ministers may
need to be informed. Command Secretariats and Civil Management will advise.
Where MDP and/or MGS may be involved, the relevant HQ should also be
consulted. All TUPE transfers of MOD staff are to be managed in accordance with
the “Code of Practice for TUPE Transfers in MOD Contracts” which has been agreed
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
with TUs and Industry. This code of practice is to be used by all parties involved in
contracting with MOD and outlines best practice to be followed for the transfer of
staff under TUPE from MOD to the private sector, or between contractors.
UNCLASSIFIED
UNCLASSIFIED
Security Instructions for the Use of Unarmed Commercial Guard Forces in GB
ANNEX H
RESTRICTED - COMMERCIAL
(When completed)
CONTRACT START/RENEWAL PROFORMA
Complete white boxes as appropriate
Contractor Name:
Address:
Telephone no:
Commercial Staff:
TLB of Establishment being guarded:
Type of guarding (Tick the appropriate box if the activity is included in the contract)
Composition of Guard Force (Tick box if Commercial Guard Force is integrated with any of the following)
Shift pattern
No of hours per guard per Total complement of guards to fulfil the contract,
week: including a reserve to cover sickness and leave etc:
(when completed)
RESTRICTED – COMMERCIAL
18H-1
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
18H-2
UNCLASSIFIED
RESTRICTED
Glossary
GLOSSARY OF TERMS
The definitions given in this glossary are intended for use specifically within the
terms of this manual for dealing with Defence security matters. Some terms shown
below are more precise or particular than when used for general purposes and
defined elsewhere (e.g. in Joint Warfare Publication 0-01.1 - United Kingdom
Glossary of Joint and Multinational Terms and Definitions).
Gloss - 1
RESTRICTED
RESTRICTED
Defence Manual of Security
asset.
Barrier fence A fence used to delineate an area where access may need
to be controlled in certain circumstances, e.g., in the event
JSP 440 Volume 2 Issue 2
Gloss - 2
RESTRICTED
RESTRICTED
Glossary
Basic Check (BC) This is NOT a security check but merely a means to
provide a degree of assurance of identity, nationality and
integrity. MOD Employees with basic check alone are
only allowed access to government assets marked
RESTRICTED and CONFIDENTIAL under normal
supervision.
Branch Security Officer An officer appointed by the senior staff officer of a branch
(BSO) of a headquarters to be responsible for the security
arrangements within that branch. Attendance on an
establishment security officers course is mandatory.
Gloss - 3
RESTRICTED
RESTRICTED
Defence Manual of Security
Gloss - 4
RESTRICTED
RESTRICTED
Glossary
assemblies).
Communication (by censorship).
Publication (by censorship, licensing and restrictions of
newsprint).
Counter intelligence The NATO definition is: Those activities which are
concerned with identifying and counteracting the threat to
Gloss - 5
RESTRICTED
RESTRICTED
Defence Manual of Security
Cryptographic keying Material used for the settings of encryption devices for
material cryptographic machines; the settings are changed at
predetermined intervals.
Cryptographic security The defence against crypto-analysis which results from the
protection given to classified traffic by the use of
cryptographic equipment, ciphers and codes.
Gloss - 6
RESTRICTED
RESTRICTED
Glossary
Gloss - 7
RESTRICTED
RESTRICTED
Defence Manual of Security
Establishment Security ESyO is the generic term for Base Security Officer (BSO)
Officer (ESyO) or Unit Security Officer (USO) in the Royal Navy, Unit
Security Officer (USO) or Branch Security Officer (BSO)
in the Army, Station Security Officer (SSyO) in the Royal
Air Force and the appointed chief specialist security
officer employed in MOD Agencies or industry.
Global security The GSE is the general security environment in which the
environment (GSE) computer system is located. It covers everything outside
the control of the systems manager (SM), which may have
involved a systems security (e.g. site access control) (see
also security domains).
Higher Threat Personnel A small number of individuals who have been assessed as
(HTP) at a higher threat of terrorist attack than the majority of
Service personnel and for whom certain essential
additional precautions for protection are authorized.
Gloss - 8
RESTRICTED
RESTRICTED
Glossary
International Defence The words NATO and WEU (COSMIC and FOCAL when
Organization (IDO) NATO and WEU TOP SECRET documents, respectively,
are involved) are special markings which, when applied to
a document, signify that the document is authorized for
circulation on a need to know basis within the IDOs of the
North Atlantic Treaty Organization or the Western
European Union, respectively, and subject to certain
security procedures and regulations of these organizations.
Gloss - 9
RESTRICTED
RESTRICTED
Defence Manual of Security
On-line system A system which performs directly under the control of the
central processor, while the user remains in
communication with the computer.
Gloss - 10
RESTRICTED
RESTRICTED
Glossary
Protected information Information in any form, both oral and recorded, which is
to be safeguarded in the interests of national or
international security and which has been classified with a
protective marking. See also Protective marking.
Protective security check A check carried out by, or on the orders of, a head of
establishment to ensure that a specific security measure
within his establishment is adequate and correctly applied.
Gloss - 11
RESTRICTED
RESTRICTED
Defence Manual of Security
Protective security An examination carried out by, or on the orders of, a head
review of establishment of the overall security arrangements
within his establishment. The purpose is to maintain the
establishment system of protective security.
Gloss - 12
RESTRICTED
RESTRICTED
Glossary
Secure armoury (and (Note: ammunition should not normally be stored in the
secure ammunition same room as arms). An armoury or ammunition store
store) which complies with the minimum structural standards
laid down in the appropriate SAFE/SSG specification, and
is either:
Security Check (SC) The level of clearance required for posts involving long-
term, frequent and uncontrolled access to assets marked
SECRET and those which afford occasional and controlled
access to assets marked TOP SECRET.
Gloss - 13
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED – Buff
UNCLASSIFIED - Any colour other than Red,
Pink or Green
Security container An item of security equipment approved by the Security
Equipment Assessment Panel and supplied by
DOE(SSG/SFE) for the storage or carriage of protected
material. The container are classified according to the
level of security they offer; Class 4 being the highest and
Class 1 the lowest.
Security education The instruction given to all Service personnel and MOD
civilian staff to keep them informed of the threat to
security and aware of their general responsibilities for
countering it.
Gloss - 14
RESTRICTED
RESTRICTED
Glossary
Security lock A lock which has been tested to establish its resistance to
both surreptitious and forcible attack and which has been
approved by the Security Equipment Assessment Panel.
Security locks are divided into four classes: 1 to 4. Class 4
being the highest and Class 1 the lowest level.
Security units Security unit is the generic term given to area security
teams in the Royal Navy, Intelligence Corps MI and
security units in the Army, Provost & Security Services
(P&SS) regions in the Royal Air Force and security
personnel in the DLO, DPA and MOD Centre.
Security vetting The routine process for identifying persons who are
suitable for access to information protectively marked
SECRET or above. There are two levels of security
clearance within the MOD: Security Check (SC) and
Developed Vetting (DV); other Government Departments
may use a third and lower Basic Check (BC).
Gloss - 15
RESTRICTED
RESTRICTED
Defence Manual of Security
Strong room Strong rooms and secure rooms are specially constructed
rooms which provide a specified degree of security
protection, according to their structural detail laid down in
the appropriate SAFE/SSG specification (which are held
by DE), for the storage of classified material. Strong
rooms provide a higher degree of protection than secure
rooms.
Structurally approved An Army term for an armoury which complies with the
armoury minimum structural standards laid down in the appropriate
SAFE/SSG specification (which are held by DE), but is
not fitted with an approved intruder detection system
(IDS), nor visited hourly, nor permanently occupied.
Gloss - 16
RESTRICTED
RESTRICTED
Glossary
Threat types These cover surreptitious attack, e.g. from espionage and
leakage, theft, e.g. from burglary or dishonest staff,
damage, e.g. from vandalism, hostile members of the
public, pressure groups or natural disasters and so on. The
threat from terrorism is considered separately and
appropriate steps are incorporated into the universal
baseline measures.
Transmission security Defence against traffic analysis, that is, against everything
that an intercept organisation can do to derive intelligence
Gloss - 17
RESTRICTED
RESTRICTED
Defence Manual of Security
Universal baseline Measures which apply to all assets at all levels of the
measures protective marking system.
Gloss - 18
RESTRICTED
RESTRICTED
Abbreviations
LIST OF ABBREVIATIONS
The abbreviations listed below are intended for use specifically within the terms of
this manual for dealing with Defence security matters.
BC Basic Check
CI Counter intelligence
Abbrev - 1
RESTRICTED
RESTRICTED
Defence Manual of Security
DE Defence Estates
DP Drill purpose
DS Directing Staff
Abbrev - 2
RESTRICTED
RESTRICTED
Abbreviations
DV Developed Vetting
Abbrev - 3
RESTRICTED
RESTRICTED
Defence Manual of Security
IT Information technology
KP Key Point
Abbrev - 4
RESTRICTED
RESTRICTED
Abbreviations
SC Security Check
TF Trading Fund
Abbrev - 5
RESTRICTED
RESTRICTED
Defence Manual of Security
VP Vulnerable Point
Abbrev - 6
RESTRICTED
RESTRICTED
Index
Index - 1
RESTRICTED
RESTRICTED
Defence Manual of Security
Index - 2
RESTRICTED
RESTRICTED
Index
Index - 3
RESTRICTED
RESTRICTED
Defence Manual of Security
Index - 4
RESTRICTED
RESTRICTED
Index
Index - 5
RESTRICTED
RESTRICTED
Defence Manual of Security
Index - 6
RESTRICTED
RESTRICTED
Index
Protective marking of work and documents, -to industry, Chapter 12 Section I Sub-section IC
Chapter 12 Section I Sub-section ID -to other countries, Chapter 11 Section II
-European Journal, 12041 -to other countries, policy, 1146-1148
-MOD Contracts Bulletin, 12040 -to other countries, principles, 1149-1153
-of contract documents, 12039 Removal of protected marked material:-
-responsibility of the requisitioning branch, -between official premises during office
12037-12038 relocation, 04156-04157
Protectively marked arms, ammunition and -for retention outside official premises for one or
explosives, storage of, 06307 more nights, 04112-04113
Protectively marked documents, -for return or delivery within same working day,
-authorization for reproduction, 04009-04010 04111
-control and carriage, Chapter 4 -from official premises, 04109-04110
-copy numbering, 04007 Replica weapons, MOD owned, 06143
-destruction of originals, 04034 Reporting of incidents-0236
-disposal of unwanted documents, 04035-04039 Reproduced documents copy numbering, 04007
-downgrading, 04040 Reprographic machines, Chapter 5 Section XV
-maintenance of files/folders and other covers, Republic of Ireland (ROI):-
04022 -leave travel to the ROI, 07636
-methods of destruction, 04041-04043 -brief prior to visiting the ROI on temporary
-musters, 04054 duty-Chapter 7 Section VI Annex I
-preparation, 04003-04006 -brief prior to visiting the ROI on leave-Chapter
-production/reproduction TOP SECRET and 7 Section VI Annex G
SECRET documents, 04023-04028 -temporary duty visit by Service personnel,
-recording location, movement and disposal, signal format, Chapter 7 Section VI Annex H
04013-04021 -Temporary duty visits to the ROI, 07648
-registration and filing, 04011-04012 -Leave in ROI, signal format, Chapter 7 Section
-safe custody of material used, 04033 VI Annex F
-spot checks, 04044-04053 Response force, 06130
Protectively marked equipment, movement of, Responsibilities:-
051819-051827 -of PSyAs, 0221
Protectively marked waste, destruction, 04041- -of the Head of Establishment, 0229
04043 -of the JSyCC, 0216
Proxy bomb attack, action in the event of, -of the Establishment Security Officer, 0232
Chapter 7 Section IV Appendix 5 to Annex H -in the Ministry of Defence, 0212
Public Military Event (PME):- -of TLB Holders/trading Fund Chief Executives,
-acknowledgement of notification, Chapter 7 0220
Section IV Appendix 2 to Annex I -of Command and other security staffs, 0228
-in GB, notification of, Chapter 7 Section IV -of Government security departments and
Appendix 1 to Annex I agencies, 0207
-overseas, notification of, Chapter 7 Section IV -of other security appointments, 0235
Appendix 3 to Annex I -of security units, 0234
-security at, 07448-07469 Risk, 0113
Public utilities, 05438 Risk analysis, Chapter 3
R Risk management, practice, 0303
Receipting, 04078-04082 Risk management, universal baseline measures,
Registers, 06136 Chapter 3 Annex C
Release of Military Information Policy Risk management process, Record for steps,
Committee (RMIPC):- Chapter 3 Annex A
-terms of reference, Chapter 11 Annex A Risk management process, Record for steps –
Release of protectively marked information:- example, Chapter 3 Annex B
-conditions of release, 1168-1171 Rooflights, 05434
-control of release, 1154-1159 Roofs, 05432-05433
-procedures, 1160-1161 Rooms: -
-release authority, 1162-1167 -choosing a room, 051122
JSP 440 Volume 1 Issue 2
Index - 7
RESTRICTED
RESTRICTED
Defence Manual of Security
Index - 8
RESTRICTED
RESTRICTED
Index
Index - 9
RESTRICTED
RESTRICTED
Defence Manual of Security
Index - 10
RESTRICTED
RESTRICTED
Personnel Security
VOLUME 2
Issue 2
PERSONNEL SECURITY
MINISTRY OF DEFENCE
October 2001
RESTRICTED
RESTRICTED
Personnel Security
RESTRICTED
RESTRICTED
Contents
VOLUME 2
CONTENTS
Page
Introduction Intro-1
Chapter
Part 1 – Fundamentals of Personnel Security
1. Principles of Security
Part 2 – Vetting of Service Personnel, MOD Civil Servants and the Staff
of MOD Agencies
5. The Basic Check (BC)
7. Spare
RESTRICTED
RESTRICTED
Defence Manual of Security
16. Spare
Index
ii
RESTRICTED
RESTRICTED
Introduction
INTRODUCTION
Purpose and Description
1. The purpose of the Defence Manual of Security (DMS) Volume 2 (the
Volume) is to lay down the personnel security regulations and measures which are to
be applied throughout the Armed Services, to MOD civil servants, to the staff of
MOD agencies and to contractors’ employees working for the MOD or for the
Services.
b. Part 2 – setting out the personnel security vetting measures that apply
to Service personnel, to MOD civil servants and to the staff of MOD
agencies.
4. To assist users to find the information they require, each chapter is preceded
by a list of contents. An index is also provided
Intro - 1
RESTRICTED
RESTRICTED
Defence Manual of Security
Application
5. The regulations and measures throughout the volume apply generally to:
a. All Regular and Reserve Forces of the Royal Navy, the Royal
Marines, the Army and the Royal Air Force.
e. Persons serving with the Combined Cadet Force (CCF), the Sea Cadet
Corps (SCC), the Army Cadet Force (ACF) and the Air Training Corps
(ATC).
Volume 5 - STRAP
7. This volume supersedes the policy elements of the following single Service
publications and instructions which relate to personnel security:
Intro - 2
RESTRICTED
RESTRICTED
Introduction
a. Royal Navy:
b. Army:
Definitions
11. A full glossary of terms relating to Defence security matters is contained in
the DMS Volume 1 “Protective Security”. Terms of particular note used in this
volume are:
Intro - 3
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Introduction
a. Royal Navy and Royal Marines: The Naval Secretary for Royal
Navy and Royal Marine officer appointments; Commodore Naval Drafting
for drafting of ratings; HQ Royal Marines (Manning Office) for RM other
ranks; and the appropriate CPMA for civil servants.
b. Army: The Army Personnel Centre (APC) for officers and soldiers,
MOD Chaps (A) for RAChD and DALS for AGC(ALS) officers plus the
appropriate CPMA for civil servants.
c. Royal Air Force: The RAF Personnel Management Agency for RAF
personnel and the appropriate CPMA for civil servants.
Intro - 5
RESTRICTED
RESTRICTED
Defence Manual of Security
Intro - 6
RESTRICTED
RESTRICTED
Introduction
ANNEX A
PERSONNEL SECURITY STAFFS
Intro A- 1
RESTRICTED
RESTRICTED
Defence Manual of Security
DLOHQ-DLO-PSYA Spur 11
E Block
Ensleigh Fax:
Bath 01225-467299
BA1 5AB
PJHQ-J2-SO1-PSYA PJHQ(UK)
Sandy Lane
Northwood Fax:
Middx 019238-46013
HA6 3JJ
Intro A- 2
RESTRICTED
RESTRICTED
Introduction
ANNEX B
DEFENCE VETTING AGENCY (DVA)
Intro B- 1
RESTRICTED
RESTRICTED
Defence Manual of Security
Intro B - 2
RESTRICTED
RESTRICTED
Introduction
ANNEX C
LINE MANAGEMENT: PRINCIPAL SECURITY
ADVISER RELATIONSHIP
Formation Line Management Principal Security
Adviser
Central TLB 2nd PUS Hd CB(Sy)
AD NSy(P)
(GC Prov&Pers Sy
(RAF)HQ PTC)
Intro C- 1
RESTRICTED
RESTRICTED
Defence Manual of Security
Intro C -2
RESTRICTED
RESTRICTED
Principles of Security
PRINCIPLES OF SECURITY
Chapter Para
01 Principles of Security
Introduction 0101
1-1
RESTRICTED
RESTRICTED
Defence Manual of Security
1-2
RESTRICTED
RESTRICTED
Principles of Security
CHAPTER 1
PRINCIPLES OF SECURITY
Introduction
0101. This chapter provides a brief summary of the principles of security in the
context of personnel security. More detailed information is contained in Chapter 1 of
the Defence Manual of Security (DMS) Volume 1 ‘Protective Security’.
a. Espionage
b. Subversion
c. Sabotage
d. Terrorism
e. Non traditional
Espionage
0104. A prime area of interest, so far as personnel security is concerned, is the
exclusion from access to protectively marked information or material of those people
who might become involved in espionage owing to some form of inducement or
pressure applied to them, or because of ideological beliefs or disaffection.
0105. Foreign intelligence services (FIS) try to collect information for intelligence
purposes and to break through our security defences. They work mainly through
agents who are either introduced from overseas or are recruited locally. These agents
are known to seek out those with character weaknesses or special circumstances (eg.
relatives in countries presenting a special security risk) who can be exploited through
bribery, blackmail or other pressures. No one with access, or who may later have
access, to sensitive information or material may be considered too unimportant to be
cultivated either as a useful contact or possible agent.
1-3
RESTRICTED
RESTRICTED
Defence Manual of Security
Subversion
0106. Personnel may be subject to the threat of subversion by FIS and members of
organisations whose interests are inimical to those of HM Government. It may not
be easy to detect this form of attack at first sight, so personnel should be alert to
disguised approaches.
Sabotage
0107. Sabotage is a threat normally associated with a state of war, with conditions
of international tension, or during local internal security situations.
Terrorism
0108. Acts of terrorism may continue to be perpetuated in the UK. The nature of
the threat, whether in the UK or overseas, will vary depending on the local situation.
Non Traditional
0109. This covers the compromise of information or assets through, for example,
theft, accidental loss, “leaks” and non traditional actions of disaffected staff, fraud
and deliberate compromise, corruption or destruction of computer or other data.
Such compromise represents a threat to security in its wider sense.
Protective Security
0110. Protective security is maintained by a combination of:
1-4
RESTRICTED
RESTRICTED
Principles of Security
Protective Marking
0112. Assets are protectively marked according to the damage that unauthorised
disclosure could cause. An understanding of the Government’s protective marking
system is required in order to reach the appropriate conclusions about the levels of
protection needed in particular circumstances. Guidance on this system is given in
Volume 1, Chapter 1 para 0103.
1-5
RESTRICTED
RESTRICTED
Defence Manual of Security
1-6
RESTRICTED
RESTRICTED
Basics of Personnel Security
Responsibilities of Principal
Security Advisers (PSyA) 0204
2-1
RESTRICTED
RESTRICTED
Defence Manual of Security
2-2
RESTRICTED
RESTRICTED
Basics of Personnel Security
CHAPTER 2
2-3
RESTRICTED
RESTRICTED
Defence Manual of Security
c. The DLO and PJHQ are responsible for civilians employed in their
TLBs (except for categories managed centrally), and for contractors
employed at DLO and PJHQ sites.
Contact details for the personnel security staffs are at Annex A to the Introduction.
0207. The owner of the DVA is the Director General Security & Safety (DGS&S)).
(1) On recruitment
c. In service
RESTRICTED
RESTRICTED
Basics of Personnel Security
0209. Where the Chief Executive, in accordance with the guidelines previously
agreed with the customer organisations, ie. the relevant Service Command, TLB or D
Def Sy, judges the circumstances of a case to be sufficiently contentious, the relevant
customer organisation will be consulted. Appropriate arrangements are to be set out
in separate Service Level Agreements (SLAs) between the Agency and its customers.
The final decision to grant a security clearance in such cases will rest with the
customer.
0213. To achieve these ends, it is most important that any doubts about an
individual’s loyalty, reliability or trustworthiness are brought to the attention of the
security authorities without delay so that, where necessary, action can be taken to
limit the risk to security.
b. Security vetting.
2-5
RESTRICTED
RESTRICTED
Defence Manual of Security
c. Supervision of personnel.
Confidentiality of Information
0216. Recruitment authorities are deemed to be the agents of security vetting
organisations in their handling of completed security questionnaires. However, the
information provided on such forms is solely for use by security vetting
organisations; recruitment authorities are not to take any account of such information
in their consideration of a candidate’s suitability for actual recruitment.
0219. Any information revealed will be treated in the strictest confidence and will
not necessarily disqualify an individual from having a security clearance, but it has to
be considered by the security vetting organisation.
RESTRICTED
RESTRICTED
Basics of Personnel Security
and enables the subject of the data to have access to it under certain conditions. The
Act covers certain types of manual data as well as automated data. The Act contains
a number of exemptions including one for national security. The Secretary of State
has signed a certificate under the national security exemption that exempts data that
is processed for vetting and intelligence and security investigations and operations
from disclosure to the subject and from other provisions of the Act where this is
required to safeguard national security. There is a right of appeal to the Information
Tribunal, which will hear cases involving national security. The Tribunal will have
the power to quash a Ministerial certificate. Further information on the Act is
available on the Data Protection website, which can be found under Instructions on
the MODWeb, or sought from TLB Data Protection Officers.
0221. Where the Data Protection Act provides subject access rights, for example in
respect of criminal records information held by police, these rights are not to be
abused by compelling the subject to apply for access, under the Act, to such
information for employment purposes. This practice, known as ‘enforced subject
access’ is an offence under the Act. Improper use of information relating to offences
may constitute an offence under Rehabilitation of Offenders legislation detailed at
para 0218 above.
0222. Spare
2-7
RESTRICTED
RESTRICTED
Defence Manual of Security
Offences punishable under OSA 1911 and OSA 1920 are shown at Annex A. A basic
guide to OSA 1989 is given at Annex B.
Note: At the time of going to print, the latest editions of the two MOD forms were
134 (3/97) and 135 (1/98).
2-8
RESTRICTED
RESTRICTED
Basics of Personnel Security
ANNEX A
OFFENCES PUNISHABLE UNDER EARLIER
OFFICIAL SECRETS ACTS (OSAs)
1. OSA 1911
a. Section 1 of the Act makes it an offence, broadly, for any person for a
purpose prejudicial to the interests or safety of the State, to obtain or communicate
information which might be directly or indirectly useful to an enemy.
2. OSA 1920
b. Section 3 of the Act makes it an offence for any person to interfere with
officers of the police or members of Her Majesty’s forces in the vicinity of any
prohibited place.
d. Section 6 provides that it shall be the duty of every person to give on demand
information as to the commission of offences under the 1911 or 1920 Act and
penalises failure to fulfil this duty.
2A-1
RESTRICTED
RESTRICTED
Defence Manual of Security
2A-2
RESTRICTED
RESTRICTED
Basics of Personnel Security
ANNEX B
A BASIC GUIDE TO THE OFFICIAL SECRETS ACT
1989
Background
1. The Official Secrets Act 1989 came into force on 1 March 1990. The 1989
Act replaces section 2 of the Official Secrets Act 1911, under which it was a criminal
offence to disclose any official information without lawful authority. Under the 1989
Act it is an offence to disclose official information only in six specified categories,
and only if the disclosure is damaging to the national interest.
2. This guide gives answers to basic questions about the 1989 Act. It does not
cover everything in the Act, but the respective PSyA should be able to provide more
information and advice if needed.
2B-1
RESTRICTED
RESTRICTED
Defence Manual of Security
d. Members of the Public and others who are not Crown Servants or
government contractors but who have, or have had, official information in
their possession.
(2) The weapons, stores or other equipment of those forces and the
invention, development, production and operation of such equipment
and research relating to it;
2B-2
RESTRICTED
RESTRICTED
Basics of Personnel Security
question. It is ultimately for the jury to decide, when the case comes to trial, whether
damage has in fact occurred.
2B-3
RESTRICTED
RESTRICTED
Defence Manual of Security
2B-4
RESTRICTED
RESTRICTED
Basics of Personnel Security
b. People who have been notified in writing that they are subject to
section 1(1) of the Act,
Prosecutions
14. In England and Wales, prosecutions for most offences under the Act may be
instituted only by or with the consent of the Attorney General. In Northern Ireland
they may be instituted only by or with the consent of the Attorney General of
Northern Ireland.
2B-5
RESTRICTED
RESTRICTED
Defence Manual of Security
17. These are summary offences, triable in England and Wales by a Magistrates’
court. The maximum penalties are three months’ imprisonment or a £2000 fine, or
both.
2B-6
RESTRICTED
RESTRICTED
The Vetting Regime
Introduction 0301
Aftercare 0337
Annex A. HM Government’s
Statement of Vetting Policy 3A-1
3-1
RESTRICTED
RESTRICTED
Defence Manual of Security
3-2
RESTRICTED
RESTRICTED
The Vetting Regime
CHAPTER 3
THE VETTING REGIME
Introduction
0301. The Review of Protective Security (RPS) completed in 1994 was a
fundamental and wide-ranging review of the Government’s security policies and
practices. It resulted from recognition of the changes in the wider environment in
which Government departments and agencies and Government contractors operate,
particularly changes in the level and nature of the threats to national security.
0302. In the area of personnel security, the RPS concluded that the vetting process
served a useful purpose, not only in disclosing circumstances which might lead to
breaches of security, but also as a deterrent to those who might otherwise seek to
undermine that security. The Review recommended, however, a new approach to
vetting with the greater engagement of line managers and increased openness with
staff in post about the outcome of the security vetting process. It also recommended
an updated range of checks and security clearances, details of which are given in this
chapter.
0303. All candidates for security vetting are to be asked to complete a security
questionnaire which will explain the purpose of the procedure and invite them to
provide the personal details required for the necessary checks to be undertaken.
Vetting will then be carried out on the basis of HM Government’s Statement of
Vetting Policy at Annex A.
0304. In essence, the purpose of vetting is to exclude those who might be a security
risk from having access to protectively marked information or material or to MOD
establishments. The process consists of collecting information on individuals and
making a judgement based on that information. However, vetting cannot guarantee
that a person is totally reliable still less can it give assurance that he will remain so
for all time. There is, therefore, a need both for close and continuous supervision by
more senior staff of all those who have access to protectively marked assets or to
MOD establishments, and for periodic reassessment of security clearances.
3-3
RESTRICTED
RESTRICTED
Defence Manual of Security
0308. All persons who may be susceptible to external pressure on account of close
Irish, or specific overseas, connections are to be subjected to a CTC before they can
be recruited into HM Forces or offered civilian employment with the MOD. Those
who subsequently acquire a close Irish, or specific overseas, connection or one with a
potential for hostility towards the British Government (for example through
marriage) are similarly subjected to the CTC process. The CTC also serves to assist
3-4
RESTRICTED
RESTRICTED
The Vetting Regime
in the protection of Service personnel, MOD civil servants and their families who
may be at risk. A CTC enables an individual to have general, but not specific, access
to military or to sensitive establishments.
0309. For the relevance of CTC to persons who unsupervised regularly handle arms,
ammunition or explosives or who work as armourers (or equivalent) see para 0610.
Procedure
0311. An SC clearance involves:
0312. Full background about the applicability of financial checks, CRC and FQs, is
given at Annex 3C.
Criteria
0313. An SC is required in the following circumstances:
3-5
RESTRICTED
RESTRICTED
Defence Manual of Security
Application of Criteria
0314. At SC level, ‘long-term, frequent and uncontrolled access’ should be
interpreted as having unsupervised handling of SECRET material on a regular basis.
This could be daily or weekly but should constitute a core function of the post.
‘Long-term, frequent and uncontrolled access’ also covers access to enough
SECRET information to allow an individual to obtain a comprehensive picture of a
SECRET plan, policy or project. It will also be required for posts where the holder
has custody of a small quantity of SECRET material.
0315. In those instances where Service personnel or MOD civilians, who are only
BC-approved obtain inadvertent or occasional access to UK SECRET assets, this is
acceptable providing the conditions of para 0507 are fulfilled.
SC Review
0316. MOD personnel and List X Company employees holding SC clearance will
be subjected to a review of that clearance at ten year intervals or as required.
Similarly, the clearances of persons originally vetted at PV(S) or NV level will be
subjected to a review ten years after PV(S) or NV was first granted, or as soon
thereafter as is feasible, or as required. The exceptions are Non-List X Company
employees and consultants whose clearance will be reviewed every three years,
because the aftercare for them is limited.
SC Review Procedure
0317. Details are given in para 0828.
Further Guidance
0318. Specific departmental guidance on the application and maintenance of SC
clearances is given in Chapters 8 and 12.
3-6
RESTRICTED
RESTRICTED
The Vetting Regime
Procedure
0320. A DV clearance involves:
e. A subject interview.
Criteria
0321. A DV clearance is required in the following circumstances:
3-7
RESTRICTED
RESTRICTED
Defence Manual of Security
g. For posts connected with British diplomatic and consular missions, at the
discretion of the Foreign and Commonwealth Office. See also para 0329.
Application of Criteria
0322. “Long-term, frequent and uncontrolled access” should be interpreted as
having unsupervised access to assets marked TOP SECRET on a continuous basis,
and as an integral part of the post. This excludes:
It follows that SC clearance should be adequate for the conditions listed above.
DV Review
0323. MOD personnel and List X Company employees holding DV clearances will
be subjected to a review:
The exceptions are List X Sub contractors, consultants and certain volunteer reserve
personnel whose clearance will be reviewed every three years, because the aftercare
for them is limited. Reviews can be brought forward at any time at the discretion of
the appropriate security vetting organisation.
3-8
RESTRICTED
RESTRICTED
The Vetting Regime
DV Review Procedure
0324. Details are given in para 0923.
Further Guidance
0325. Specific departmental guidance on the application and maintenance of DV
clearances is given in Chapters 9 and 13.
0330. For exceptional access to TOP SECRET STRAP material for SC post
holders, the STRAP security authority may, on request, grant dispensation where, for
urgent operational reasons, it is necessary to permit an SC post holder to have access
to TOP SECRET STRAP material. In all other cases for access to TOP SECRET
STRAP material, the post holder will require DV security clearance. Further detail is
available in Volume 5. See also para 0907.
3-9
RESTRICTED
RESTRICTED
Defence Manual of Security
0333. Pending the outcome of a review, the Cabinet Office has agreed that the new
rules for access to national caveat material for persons with dual nationality should
also apply to access to composite caveat material (eg UK/US, UK/GE etc), but see
Note.
0334. Service, MOD civilian and contractors’ personnel with dual nationality, neither
of which is British are to be treated as foreign nationals for the purpose of access to
caveat material. DMS Volume 1 Chapter 16 sets out the policy on national and
composite caveats.
0336. Certain difficulties may arise when a security cleared individual marries or
forms a stable partnership with a person of non-UK origin, or to a person normally
3-10
RESTRICTED
RESTRICTED
The Vetting Regime
Aftercare
0337. The CTC, SC and DV security vetting processes provide an acceptable level
of assurance as to an individual’s integrity, and of the appropriateness of their having
access to, or knowledge or custody of, sensitive Government assets or information.
But vetting alone does not provide a guarantee of future reliability. It is, therefore,
important that personnel security continues after the initial security clearance has
been granted, or in the case of personnel not deemed to require vetting, after BC
approval has been given. It is also important that any new information or concerns
that may affect the reliability of an individual are brought promptly to the attention
of the appropriate authorities. This is achieved through a combination of aftercare
and security clearance, ie SC and DV review procedures.
The definition of aftercare is given in the introductory chapter para 11a. A full
description of HOEs’ responsibilities in this sphere may be found in paras 1817 to
1825.
3-11
RESTRICTED
RESTRICTED
Defence Manual of Security
3-12
RESTRICTED
RESTRICTED
The Vetting Regime
ANNEX A
HM GOVERNMENT’S STATEMENT ON VETTING
POLICY
1. In the interests of national security, safeguarding Parliamentary democracy
and maintaining the proper security of the Government’s essential activities, it is the
policy of HM Government that no one should be employed in connection with work
the nature of which is vital to the interests of the State who;
(1) espionage
(2) terrorism
(3) sabotage
3A-1
RESTRICTED
RESTRICTED
Defence Manual of Security
3A-2
RESTRICTED
RESTRICTED
The Vetting Regime
ANNEX B
LIST OF SECURITY QUESTIONNAIRES AND REVIEW
GUIDANCE
SC and DV
initial clearances
SC and DV
reviews
DV initial
clearances and
reviews
3B-1
RESTRICTED
RESTRICTED
Defence Manual of Security
3B-2
RESTRICTED
RESTRICTED
The Vetting Regime
ANNEX C
FINANCIAL CHECKS
Credit Reference Checks (CRCs)
1. CRCs are undertaken to confirm a subject’s credit status. A company,
contracted by the Cabinet Office, is employed to carry out such checks using the
following information:
a. The subject’s surname and forename(s);
c. Any other standard civilian addresses during the previous five years.
3. Where the information given on the report indicates that there is cause for
concern, the subject may be asked to complete a Financial Questionnaire (FQ); this
will enable his financial situation to be assessed in greater depth. Individuals will be
supplied with the results of the check upon request.
b. The CRC has been carried out and the results suggest that further
investigation is warranted; or
5. Completion of the FQ will more easily enable the assessor to analyse the
subject’s financial situation by examining details of a person’s finances. In most
cases where a CRC has highlighted problems and led to the completion of a FQ, the
completed questionnaire should resolve these doubts. However, should misgivings
remain, a subject interview should be conducted.
3C-1
3C-2
Introduction 0401
4-1
RESTRICTED
RESTRICTED
Defence Manual of Security
4-2
RESTRICTED
RESTRICTED
Nationality Rules
CHAPTER 4
0403. Whilst the fact that a person is not a British national may not of itself be a bar
to security clearance, nationality will need to be noted since it may have a bearing on
the management of postings. There may also be cases when the subject originates
from a country whose interests are inimical to those of the UK and where there is a
fundamental conflict of interest which prevents the granting of security clearance.
Such conflicts of interest will be addressed on a case by case basis by reference to
the relevant Principal Security Adviser during the security vetting process.
4-3
RESTRICTED
RESTRICTED
Defence Manual of Security
Special DV Posts
0408. When a person is being considered for a post in the Defence Intelligence Staff
(DIS) or a Special Access Operation (SAO) the special nationality rules set out in
Annex D apply. For the Government Communications Headquarters (GCHQ) the
special nationality and residency rules set out in Appendix 1 to Annex D apply. In
managing such appointments it will be incumbent on the posting authority to
establish the nationality requirement from the appropriate Principal Security Adviser.
If the individual meets the specialist nationality requirements the posting authority
will confirm or initiate DV clearance.
4-4
RESTRICTED
RESTRICTED
Nationality Rules
0411. The Armed Forces are not subject to the European Union (EU) Rules on the
freedom of movement of workers and employment in the Services has not been open
to EEA nationals other than those, for historical reasons, from the Republic of
Ireland. Also, although all Service posts require the holder to show special
allegiance to the Crown, such posts cannot be designated “Reserved” – see para 0413
below – as the Service incumbents do not exclusively have to be UK nationals.
Reserved Posts
0413. Reserved Posts (formerly Public Service posts) are those designated as
requiring special allegiance to the State. Candidates for these posts must be UK
citizens. Commonwealth and Irish citizens are no longer eligible, although those in
post on 1 June 1996 have been granted reserved rights. Aliens may not be employed
in “Reserved” posts.
Waivers
0414. These will no longer be granted for recruitment to “Reserved” posts.
RESTRICTED
RESTRICTED
Defence Manual of Security
members eligible for employment are listed in Annex A to Volume 2 of the MOD
Personnel Manual.
Aliens
0416. Non Reserved posts may be filled by an alien holding an Alien’s Certificate.
In this case aliens are defined as those who are neither Commonwealth nor EEA
nationals. Annex A to Volume 2 of the MOD Personnel Manual details the
recruitment procedures to be followed by Civilian Personnel Management
Authorities when obtaining Aliens’ Certificates.
Contractors’ Employees
0417. The nationality rules applied to the Armed Forces and to MOD civil servants
do not generally apply to the security vetting of contractors’ employees.
Nevertheless, nationality, including dual nationality, will need to be noted since a
non British national may experience special conflicts of interest. Accordingly,
restrictions on access will need to be considered on a case by case basis.
Residency Rules
General
0418. Unless satisfactory enquiries can be made through official liaison channels in
the country of origin or other place of residence, candidates should normally have
resided continuously in the UK immediately prior to their application for a security
clearance for the periods of time stated below:
Further details are set out in Annexes F and G. Exceptionally, residency waivers
may be granted to nationals of Commonwealth or EEA countries who do not meet
the normal requirements.
4-6
RESTRICTED
RESTRICTED
Nationality Rules
Overseas Residency
0419. Paras 0606, 0804 and 0904 provide guidance respectively in relation to CTC,
SC and DV. In general, if applicants have residency in a country where the Security
Service are able to conduct checks, there should be no bar to a clearance.
4-7
RESTRICTED
RESTRICTED
Defence Manual of Security
4-8
RESTRICTED
RESTRICTED
Nationality Rules
ANNEX A
APPLICANTS FOR HM FORCES WHO DO NOT
REQUIRE SECURITY CLEARANCE ON ENTRY:
NATIONALITY AND RESIDENCY CONSIDERATIONS
Nationality
1. To be accepted for non-commissioned service in the Army other than to
sensitive employment an applicant should be free from immigration restrictions;
have unrestricted rights of entry to, and normally be resident of, the United
Kingdom, who is:
a. a Commonwealth citizen, or
Residency
3. For this category of applicants there are no residency rules.
4A-1
RESTRICTED
RESTRICTED
Defence Manual of Security
4A-2
RESTRICTED
RESTRICTED
Nationality Rules
ANNEX B
APPLICANTS FOR HM FORCES WHO REQUIRE
CLEARANCE TO SECURITY CHECK LEVEL:
NATIONALITY CONSIDERATIONS
1. To be accepted for service in the Royal Navy, Royal Marines and Royal Air
Force or in the Army as an officer, or as a candidate for certain closed employments
and trades, ie. as an applicant needing vetting to SC level, a person must satisfy all of
the following conditions:
a. That he was born in the UK; or in what is, (or then was) a
Commonwealth country or in the Republic of Ireland
Parents
2. The nationality of a candidate’s parents is immaterial when he applies to join
HM Forces but, should any enquiry about them prove adverse, this could lead to the
subject not being suitable for SC clearance and so being unemployable.
Commonwealth Citizens
3. The term “Commonwealth citizen” includes; a British citizen, a Dependent
Territories citizen, a British Overseas citizen, a British subject under the British
Nationality Act 1981 or a citizen of an independent Commonwealth country.
Dual Nationals
4. Such personnel may not be enlisted until the recruiting authority has obtained
confirmation from the government of the other nation of the dual national that the
individual concerned is not liable for national service or for recall to military service
with that nation.
Waiver
5. A waiver of nationality requirements will normally be granted by the
Secretary of State for Defence for candidates who are British citizens at the time of
application, regardless of place of birth or former nationality. In exceptional
circumstances, a waiver of the nationality requirements may be granted by the
Secretary of State for Defence to applicants who are Commonwealth citizens, or
Republic of Ireland nationals, at the time of their application, regardless of place of
4B-1
RESTRICTED
RESTRICTED
Defence Manual of Security
birth or former nationality. Any candidate who seeks such a dispensation will have
his case considered on its individual merits.
Subsequent DV Clearance
6. When a person holding SC clearance is selected for DV clearance later in his
career, the rules in Annex C or Annex D (as appropriate) are to be followed.
4B-2
RESTRICTED
RESTRICTED
Nationality Rules
ANNEX C
APPLICANTS FOR HM FORCES WHO REQUIRE
CLEARANCE TO DEVELOPED VETTING LEVEL FOR
GENERAL, NON-SPECIALIST POSTS:
NATIONALITY CONSIDERATIONS
1. To be accepted as a person needing clearance to DV level for employment in
the Royal Navy, Royal Marines, Royal Air Force or in the Army, an individual must
satisfy all the following conditions:
Commonwealth
3. The term “Commonwealth citizen” includes; a British citizen, a Dependent
Territories citizen, a British Overseas citizen, a British subject under the British
Nationality Act 1981 or a citizen of an independent Commonwealth country.
Dual Nationals
4. Such personnel may not be enlisted until the recruiting authority has obtained
confirmation from the government of the other nation of the dual national that the
individual concerned is not liable for national service or for recall to military service
with that nation.
Waiver
5. A waiver of nationality requirements will normally be granted by the
Secretary of State for Defence for candidates who are British citizens at the time of
4C-1
RESTRICTED
RESTRICTED
Defence Manual of Security
4C-2
RESTRICTED
RESTRICTED
Nationality Rules
ANNEX D
SPECIAL NATIONALITY RULES
Part I – For all posts, military or civilian, in the Defence Intelligence Staff (DIS)
1. DIS posts are designated as Reserved Posts. This means that, because of the
nature of the work, the information or of the material dealt with, the post holders owe
special allegiance to the State. DIS posts are therefore open only to UK nationals.
2. DIS posts require that staff posted into them meet the following nationality
conditions:
a. They must be British at entry and should have held British citizenship
for ten years.
b. They should not have held any other nationality in the last five years.
3. Where applicants for DIS posts have not held British nationality for the
prescribed periods, or where the family as defined above has a non British nationality
connection, a decision will be taken on a case by case basis.
5. The spouse/cohabitant and his surviving parents should also hold British
nationality and no other.
4D-1
RESTRICTED
RESTRICTED
Defence Manual of Security
6. Members of the subject’s immediate family, and any other person to whom
the subject is bound by affection or obligation, should not be subject to physical,
mental or other forms of duress by a foreign power.
4D-2
RESTRICTED
RESTRICTED
Nationality Rules
APPENDIX 1 TO ANNEX D
NATIONALITY AND RESIDENCY RULES FOR GCHQ
1. Candidates for employment at GCHQ or the Joint Technical Language
Service (JTLS) must satisfy the following rules.
Nationality
2. The subject must be a British citizen (but see Note 1).
3. One of the subject’s parents must be a British citizen or have substantial ties
with the United Kingdom or, if deceased, have had such citizenship or ties before
death. (See Note 2).
Note 1: If the subject holds dual nationality, of which one component is British, he
will nonetheless be considered. If successful, the subject will normally be required
to give up his non-British nationality as a condition of confirmation of appointment
to GCHQ or the JTLS.
4D1-1
RESTRICTED
RESTRICTED
Defence Manual of Security
Residency
5. Candidates for employment at GCHQ or the JTLS must normally have been
resident in the UK for 10 years prior to the date of their application. A candidate
may nonetheless be considered if (for example) he has been:
b. Studying abroad.
6. In such cases, the subject must be able to provide referee cover for the
period(s) of residency overseas.
Waivers
8. The Secretary of State for Foreign and Commonwealth Affairs may, at his
discretion, waive any of the nationality and residency rules set out above.
4D1-2
RESTRICTED
RESTRICTED
Nationality Rules
ANNEX E
MEMBERS OF THE COMMONWEALTH AND
MEMBER STATE OF THE EUROPEAN ECONOMIC
AREA (EEA)
Members of the Commonwealth
The United Kingdom
Dependent Territories
Anguilla
Bermuda
British Antarctic Territory
British Indian Ocean Territory
British Virgin Islands
Cayman Islands
Falkland Islands and Dependencies
Gibraltar
Montserrat
Pitcairn, Henderson, Ducie and Oeno Islands
South Georgia & the South Sandwich Islands
(St Helena and Dependencies (principally Ascension and Tristan da Cunha)
Turks and Caicos Islands
The Sovereign base areas of Akrotiri and Dhekelia (areas in Section 2 (1) of the
Cyprus Act 1960)
Other Countries
Antigua and Barbuda
Australia
Australian External Territories:
Australian Antarctic Territory (including MacDonald, Heard and
Macquarie Islands)
Christmas Island
Cocos (Keeling) Islands
Norfolk
The Bahamas
Bangladesh (formerly East Pakistan)
4E-1
RESTRICTED
RESTRICTED
Defence Manual of Security
Barbados
Belize (formerly British Honduras)
Botswana (formerly Bechuanaland Protectorate)
Brunei
Cameroon
Canada
Cyprus (Republic of)
Dominica
Fiji
The Gambia
Ghana which comprises the former colonies of:
The Gold Coast (including Ashanti)
The Northern Territories of the Gold Coast (a Protectorate)
Togoland (a UK trust territory)
Grenada
Guyana (formerly British Guiana)
India
Jamaica
Kenya
Kiribati (formerly Gilbert Islands)
Lesotho (formerly Basutoland)
Malawi (formerly Nyasaland)
Malaysia which includes:
The Federation of Malaya, comprising the former Crown Colonies of
Malacca and Penang and the former Protected states of Johore, Kedah,
Kelantan, Negri Sembilan, Pahang, Perak, Perlis, Selangor and Trengganu,
Sabah and Sarawak (formerly British North Borneo).
The Maldives
Malta
Mauritius
Mozambique
Namibia
Nauru
New Zealand
New Zealand Territories
a. Colonies and Dependencies:
Niue
Ross Dependency
Tokelau Islands Group (formerly Union Islands)
b. Associate State:
Cook Islands (they have complete internal self-government, but
citizens are New Zealand citizens).
4E-2
RESTRICTED
RESTRICTED
Nationality Rules
4E-3
RESTRICTED
RESTRICTED
Defence Manual of Security
4E-4
RESTRICTED
RESTRICTED
Nationality Rules
ANNEX F
APPLICANTS WHO REQUIRE CLEARANCE TO
SECURITY CHECK (SC) LEVEL: RESIDENCY
CONSIDERATIONS
1. The residency rule in this context is defined as follows:
Residency Waiver
3. Unless covered under para 1. Above, a waiver of the residency rule by the
appropriate Service Command/TLB Holder is required for all candidates who need
SC vetting, and who have resided outside the UK for more than a total of 12 months
in the five years immediately preceding their application. In the context, however,
periods not exceeding 28 days may be disregarded for any calculation of a 12 month
period.
4F-1
RESTRICTED
RESTRICTED
Defence Manual of Security
4F-2
RESTRICTED
RESTRICTED
Nationality Rules
ANNEX G
APPLICANTS WHO REQUIRE CLEARANCE TO
DEVELOPED VETTING (DV) LEVEL: RESIDENCY
CONSIDERATIONS
1. The residency rule in this context is defined as follows:
Referees
3. Subjects will be required to provide referee cover for periods of residency
overseas. The referees must be British citizens who can be interviewed, preferably in
the UK. The duration of a subject’s residency overseas and the country(ies) in which
the subject has lived will also be relevant.
Residency Waiver
4. A waiver of the residency rule by the appropriate vetting authority Note 1 is
required for all candidates who need DV and who have resided outside the UK for
more than a total of 12 months in the ten years immediately preceding application.
In this context, however, periods not exceeding 56 days may be disregarded for any
calculation of the 12 month period.
4G-1
RESTRICTED
RESTRICTED
Defence Manual of Security
waiver of the residency rule if he has so resided for a minimum of 24 months in the
ten years immediately preceding the application.
Note: The waiver rules for GCHQ are different – see para 8 to Appendix 1 to Annex
4D.
4G-2
RESTRICTED
RESTRICTED
The Basic Check
Introduction 0501
Purpose 0502
Validity 0515
5-1
RESTRICTED
RESTRICTED
Defence Manual of Security
5-2
RESTRICTED
RESTRICTED
The Basic Check
CHAPTER 5
THE BASIC CHECK (BC)
Introduction
0501. The report of the Review of Protective Security (RPS) emphasised the
importance of an integrated approach to protective security and recommended that:
Separate procedures apply to BCs in industry where long term contracts are involved.
Full details are given in Chapter 11. Overall, the BC will impinge most directly on
recruiting authorities.
Purpose
0502. The BC is not a formal security clearance. Because of this a person who has
been subjected successfully to the BC process is described as BC-approved. It is
designed to provide a level of assurance as to the trustworthiness and integrity of
individuals whose work, in the main, involves uncontrolled access to, or knowledge
or custody of, government assets protectively marked up to CONFIDENTIAL. This
is done by confirming identity and nationality as well as ascertaining to a degree
their background and character.
5-3
RESTRICTED
RESTRICTED
Defence Manual of Security
Note: In due course, this category of individual and other persons who
necessarily work with young persons will become subject to Employment
Vetting, the details of which have yet to be determined.
Level of Access
0506. BC approval (see para 0502) allows Service personnel and MOD civilians to
have unsupervised access to UK material protectively marked up to
CONFIDENTIAL. Access to NATO or to foreign material (including collaborative
projects) protectively marked CONFIDENTIAL or higher requires SC level
clearance.
RESTRICTED
RESTRICTED
The Basic Check
who have only been BC-approved. When this happens, those individuals may
continue to have that level of access, if SC is not assessed to be necessary, providing
the commander/line manager/project manager judges that there is a “need to know”,
gives authority in writing and exercises proper supervision. See also the Note below.
0510. Should an applicant not be enlisted/employed within one year, the BCVR and
other supporting papers may be destroyed.
5-5
RESTRICTED
RESTRICTED
Defence Manual of Security
Furthermore, the individual will need to sign the declaration at Appendix 1 to Annex
5C acknowledging that a NIS may form part of the BC process. Both forms should
be retained on the individual’s personal file.
0512. Depending on the output from NIS the respective security vetting
organisation will recommend to the recruiting agency whether the individual should
be employed. The form at Annex 5C meets this requirement.
Limitation of BC Access
0514. A BC once completed and finalised may not be withdrawn. However, if an
individual holding a security clearance has it suspended, denied or withdrawn, the
individual’s access is to be limited to that authorised by the relevant security vetting
organisation.
Validity
0515. A BC will need to be completed on individuals before they are employed.
However, once employed a BC may not be withdrawn. It remains extant until the
holder resigns, retires or otherwise becomes “non-effective”. (Career breaks for
maternity or paternity leave, even lengthy periods of such leave, do not constitute
being “non-effective”). At this level, any security concerns, which arise after an
individual is employed, will need to be resolved by management means or treated as
matters of discipline. Security vetting organisations will be able to offer guidance to
commanders and line managers, as well as to personnel branches and project
managers. The BC approval of Armed Forces’ personnel who retain a Reserve
liability following a period of Regular service remains extant until that Reserve
liability expires.
5-6
RESTRICTED
RESTRICTED
The Basic Check
ANNEX A
GUIDANCE ON HOW TO VERIFY IDENTITY
Introduction
1. The procedures for Basic Checks formalise the enquiries that are carried out
as part of the recruitment process to Government service in order to provide a degree
of assurance as to the identity and background of a prospective
serviceman/employee. An important part of this procedure is ensuring that
individuals are who they say they are. Guidance on how to check identity as part of
the BC process is given below.
Documents to be Checked
2. Before recruitment, prospective recruits/employees should be asked to
provide original documents to establish their identity. Duplicates and photocopies
should not under any circumstances be accepted. The documents necessary to
establish identity will vary according to the nationality of the individual concerned:-
British Nationals
3. Either a full (10 year) current British passport or, if the subject is over 21, a
full passport that has lapsed within the last five years or a combination of at least
two of the following:
a. Preferably:
(2) P45.
5A-1
RESTRICTED
RESTRICTED
Defence Manual of Security
4. In some instances, particularly where young people are concerned, it may not
be possible to fulfil the above requirement. Where this appears genuinely to be a
problem the subject should be asked for a passport-sized photograph of himself
endorsed on the back with the signature of a person of some standing in the
community (eg a JP, medical practitioner, officer in HM Forces, clergyman, teacher,
lecturer, lawyer, bank manager or civil servant) and accompanied by a signed
statement, completed by the same person, stating the period of time that the subject
has been known to him (minimum of three years). The statement should always be
checked to ensure that the signature matches that on the back of the photograph and
that it contains a legible name, address and telephone number. In all cases of doubt,
and for a random sample of the others, the signatory should be contacted, preferably
by telephone, to check that he did complete the statement and has known the subject
for a minimum of three years.
5A-2
RESTRICTED
RESTRICTED
The Basic Check
Other Nationalities
6. Either a full passport issued by the country concerned or a document/letter
issued by the Home Office establishing the individual’s immigration status in the
UK.
Checking Documents
8. When checking documentation it should be borne in mind that a small
proportion of individuals may not be who they say they are. There may be a number
of reasons for such deception including:
b. Illegal immigration.
10. There are a number of simple steps which can be taken to verify the
documents produced:
5A-3
RESTRICTED
RESTRICTED
Defence Manual of Security
c. To check, as far as possible, that the paper and typeface are similar to
any others you may have to hand or may have examined recently and that the
watermark, where appropriate, is present. Passports and driving licences
invariably contain a watermark.
11. You should also note the date of issue of the documents presented to you.
Particular care should be taken where documents are recently issued, especially if all
the documents available to you are new and there is little referee coverage (see
below).
5A-4
RESTRICTED
RESTRICTED
The Basic Check
APPENDIX 1 TO ANNEX A
GUIDANCE ON VERIFYING BACKGROUND AND
CHARACTER
Introduction
1. Where a BC is being carried out as the groundwork for a SC or DV or, in
conjunction with a CTC, only one reference is needed. This should be from the
individual’s most recent employer and should cover a period of one year or be from a
previous employer for the same period. If an employer’s reference is not available, a
personal or academic reference should be obtained.
b. Personal referees.
References
Previous Employers
3. Ideally, a reference should first be sought from this source. However, since
an applicant may have been unemployed for some time, or his previous employer
may not be in a position to produce a reference, a second personal reference (see para
4 below) must be obtained. In cases where an applicant has been in HM Forces or
the civil service during the past three years, the employer’s reference should be
sought from his former, immediate superior or line manager, and not from the
Service or Department.
Academic Institutes
4. Where an applicant has been in full time education during the previous three
years, a reference on headed notepaper should be acquired from the relevant school
or college.
5A1-1
RESTRICTED
RESTRICTED
Defence Manual of Security
Personal Referees
5. These are nominated by the applicant. Persons of some standing in the
community (see Annex A para 4) should be put forward unless their personal
knowledge of the applicant is likely to be insufficient to enable them to provide a
considered reference. Where the applicant is unable to nominate a person of
standing, a reference should be obtained from personal acquaintances who are not
related to, or involved in, any financial arrangement with the applicant.
Dearth of Referees
7. Exceptionally, in those instances where referees are found to be in short
supply, the recruiting authority should apply to its respective personnel authority for
dispensation.
5A1-2
RESTRICTED
RESTRICTED
The Basic Check
ANNEX B
BASIC CHECK VERIFICATION RECORD (BCVR)
1. APPLICANT/EMPLOYEE DETAILS
Surname:……………………
Forenames:…………………………………………
Address:………………………………………………………………………………
………………………………………………………Tel:……………………………
…………………….Date of Birth:……………… Place of
Birth:……………………………………. Nationality:…………………
Former or dual nationality:…………………….. (with dates if applicable)
(with dates if applicable)
2. CERTIFICATION OF IDENTITY
a.
b.
c.
d.
3. REFERENCES
a.
5B-1
RESTRICTED
RESTRICTED
Defence Manual of Security
b.
Name: Post:
Signature: Date:
5B-2
RESTRICTED
RESTRICTED
The Basic Check
ANNEX C
RESTRICTED – STAFF (when completed)
PART 1
(Unit)…………………………………………………………..
Date of Birth……………………………………….
Private
address………………………………………………………………………………………………….
………………………………………………………………………………………………………….
………………………………………………………………………………………………………….
………………………………………………………………………………………………………….
1. S/he has been subjected to a Basic Check (BC). Adverse information resulting from the BC
should be attached to this application.
2. To complete the extended BC process required for this appointment, please arrange for a NIS
check to be carried out.
3. The above person has given written permission for the check to be made and is aware that
any ‘spent’ convictions will be disclosed.
Date: Signature:
Name:
Tel:
5C-1
RESTRICTED
RESTRICTED
Defence Manual of Security
PART II
1. Would you please conduct an NIS check for national security purposes on the person whose
particulars appear at Part I.
2. I am satisfied that the particulars given are accurate and that the above named person has
given written permission for the check to be made and is aware that any spent convictions will be
disclosed.
3. I certify that this request for conviction information is for a purpose which has been
authorised by the Association of Chief Police Officers.
Date
____________________________________________________________________
PART III
Subject………………………………………………………
Proposed Post……………………………………………..
b. We recommend that the person should NOT be employed in the post specified
above. This is not to say that the person is unsuitable for employment in an alternative post.
You are reminded that in the case of prospective employees, you are not required to inform
the person why s/he is not being taken on.
Date
5C-2
RESTRICTED
RESTRICTED
The Basic Check
APPENDIX 1 TO ANNEX C
PERSONAL DECLARATION
Surname…………………………………………………….Date of
Birth…………………..
First Names in full………………………………………..Place of
Birth………………….
I understand that the recruiting process may involve a criminal record check which
will, if undertaken, be conducted on the grounds of national security and result in any
‘spent’ convictions held against me being disclosed on a strictly in confidence basis
to the MOD security vetting organisation for assessment.
Signature
Date
5C1-2
5C1-2
Introduction 0601
Purpose 0602
Procedure 0603
Nationality 0605
Residency 0606
Access 0607
Application to Weapons/Ammunition/
Explosives Handlers 0610
Timescale 0620
6-1
RESTRICTED
RESTRICTED
Defence Manual of Security
6-2
RESTRICTED
RESTRICTED
The Counter Terrorist Check (CTC)
CHAPTER 6
THE COUNTER TERRORIST CHECK (CTC)
Introduction
0601. The Counter Terrorist Check (CTC) is a level of security clearance.
However, unlike SC and DV, CTC clearance does not provide access to protectively
marked information or material. A CTC is required to be carried out in the interests
of national security before anyone can be:
Procedure
0603. A CTC entails the completion of a Security Questionnaire (MOD Form
1109), confirmation of identity and a check of both counter terrorist and police
records.
Vetting Authority
0604. The DVA is responsible for granting CTC clearances.
6-3
RESTRICTED
RESTRICTED
Defence Manual of Security
Nationality
0605. The nationality rules governing eligibility for employment within MOD are
set out in Chapter 4.
Residency
0606. General guidance is given in para 0418. Vetting authorities may however
exercise discretion having regard to the total coverage which has been achieved. In
certain circumstances, particularly where an applicant is of UK origin, a shorter
period of residency may be accepted, subject to a waiver being granted by the vetting
authority.
Access
0607. A CTC may be required as a condition of unescorted access as defined in
para 0601a above. HOEs are to ensure that a CTC is carried out before an individual
is employed in a post giving access to any of the following:
6-4
RESTRICTED
RESTRICTED
The Counter Terrorist Check (CTC)
0611. Where persons currently engaged in such duties do not hold at least BC and
full CTC clearance, priority action should be initiated to achieve that level of security
clearance.
0613. Persons who require unescorted access to areas used to store arms,
ammunition and/or explosives or to areas occupied by people who could constitute
an attractive target for terrorists are to be subjected to this procedure irrespective of
the length of their proposed visit. Where a CTC is required, heads of establishments
are to ensure that those concerned are not given unescorted access to their
establishment until the CTC has been completed satisfactorily.
6-5
RESTRICTED
RESTRICTED
Defence Manual of Security
a. A genuine reason for the visit has been positively established, ie the
individual has been officially invited to attend or has some statutory or
official power to enter.
Note: The provisions contained in para 0614 do not apply to Central TLB, DPA and
Trading Fund establishments.
RESTRICTED
RESTRICTED
The Counter Terrorist Check (CTC)
0618. If recruiting authorities or establishment security staffs are ever in any doubt
as to whether a CTC is required they are to consult the Principal Security Adviser
(Annex Intro A-1) on matters of policy and the vetting authority on any specific
vetting issues.
Clearance Action
0619. Once the requirement for a CTC has been identified by the appropriate
authority, cases are to be processed under the agreed administrative procedures for
each Service Command’s/TLB’s area of responsibility, ensuring that the
confidentiality of the information provided by the individual is protected at all times.
Timescale
0620. A CTC generally takes four to six weeks to complete from the date of receipt
of the correctly completed security questionnaire at the vetting authority but may
take up to four or more months.
6-7
RESTRICTED
RESTRICTED
Defence Manual of Security
0625. Spare.
6-8
RESTRICTED
RESTRICTED
The Counter Terrorist Check (CTC)
ANNEX A
DEFINITION OF CLOSE IRISH CONNECTIONS
c. Has a close relative who was born or resides, or has in the last five
years resided, in Northern Ireland or in the Republic of Ireland.
d. Has, or has had, a close association, eg. a fiancee, cohabitant etc with
an individual who was born or resides, or has in the last five years resided, in
Northern Ireland or in the Republic of Ireland.
6A-1
RESTRICTED
RESTRICTED
Defence Manual of Security
6A-2
RESTRICTED
RESTRICTED
The Counter Terrorist Check (CTC)
ANNEX B
DEFINITION OF SPECIFIC OVERSEAS
CONNECTIONS
3. Further guidance may be found at Annex A to Chapter 21. This lists those
countries to which Special Security Regulations Apply (CSSRA). Perusal of it,
when related to current events, will give a good indication as to which countries fall
into those categorised at para 2 above.
6B-1
RESTRICTED
RESTRICTED
The Counter Terrorist Check (CTC)
6B-2
RESTRICTED
RESTRICTED
Defence Manual of Security
CHAPTER 7
(SPARE)
Nationality 0803
Residency 0804
Criteria 0805
Timescale 0818
Notification 0819
Aftercare 0826
SC Review 0827
8-1
RESTRICTED
RESTRICTED
Defence Manual of Security
8-2
RESTRICTED
RESTRICTED
Security Check of Service and Civilian Personnel
CHAPTER 8
SECURITY CHECK OF SERVICE AND CIVILIAN
PERSONNEL
Purpose and Procedures
0801. The purpose of the Security Check (SC) and the procedures for carrying out
SC clearances are set out in paras 0310 and 0311.
Vetting Authority
0802. The vetting authority responsible for SC clearances is the Defence Vetting
Agency.
Nationality
0803. The nationality rules governing eligibility for employment within MOD are
contained in Chapter 4.
Residency
0804. General guidance is given in para 0418. Vetting authorities may exercise
discretion having regard for the total coverage which has been achieved. In certain
circumstances, particularly where an applicant is of UK origin, a shorter period of
residency may be accepted, subject to a waiver being granted by the vetting
authority.
Criteria
0805. The criteria covering the requirement for SC clearance and the application of
the criteria are contained in paras 0313 and 0314.
0806. Heads of establishments (HOE) are to ensure that personnel are cleared to SC
level before they are granted access to protectively marked information and assets to
the levels specified in paras 0313 and 0314.
8-3
RESTRICTED
RESTRICTED
Defence Manual of Security
Pre-entry Requirements
0807. Personnel in the areas and categories listed below are required to be SC
cleared prior to recruitment or enlistment.
a. Royal Navy
b. Army
(2) Soldier entrants recruited for certain closed trades and units.
8-4
RESTRICTED
RESTRICTED
Security Check of Service and Civilian Personnel
(2) The Pay & Personnel Agency which has been specially
authorised to employ clerical staff having only BC approval and CTC
clearance.
0811. The aim should be to grant SC to prospective recruits within six months of
the procedure being started. If unforeseen delays occur that extend the procedure to
not longer than under one year, the candidate must be asked to re-sign and re-date the
Declaration on MOD Form 1109 and to enter the following statement on page 10 or
11 as appropriate.
“I hereby certify that since I initially completed the questionnaire there have
been no changes to the information which I provided then.”
8-5
RESTRICTED
RESTRICTED
Defence Manual of Security
Note: Should minor changes have taken place, such as a change of name following
marriage, this is acceptable providing the latest details have been entered, initialled
and dated.
0814. SC clearance may be sought concurrently with the BC but a clearance cannot
be granted until confirmation has been received that the BC has been satisfactorily
completed.
0816. SC clearance may be sought concurrently with the BC but a clearance cannot
be granted until confirmation has been received that the BC has been satisfactorily
completed. Should the applicant withdraw for any reason, the vetting authority
should be informed.
0817. If there is evidence of serious illness or mental instability the case must be
referred to the British Medical Institute/Civil Service Occupational Health Unit to
8-6
RESTRICTED
RESTRICTED
Security Check of Service and Civilian Personnel
obtain a medical opinion of fitness for employment and security clearance before
submission to the vetting authority.
Timescale
0818. SC clearance will normally take between four to six weeks to complete, from
date of receipt of the correctly completed security questionnaire at the vetting
authority, but it can take longer, especially where Irish or specific overseas enquiries
are involved.
Notification
0819. The vetting authority will notify the initiating authority or establishment of
the granting or denial of SC clearance. Where clearance has been granted to a
member of staff, arrangements should be made locally by the HOE to ensure the
individual is informed.
Limitation of Clearance
0822. Where it has been decided that a person’s level of access is to be below that
authorised for SC, the HOE is to be informed and the personnel authority given any
necessary guidance on the individual’s future employment.
Validity of Clearance
0823. SC clearance has replaced PV(S) clearance which previously replaced NV
clearance. PV(S) and NV clearances remain valid for ten years or until the
individual resigns, retires or otherwise become ineffective. An SC clearance will
remain valid for ten years (see para 0316) or until resignation or retirement, except
where it is withdrawn or suspended, or lapses prior to recruitment (para 0810) or
when no longer required. It may require revalidating when an individual returns to
duty after a period of absence of twelve months or more.
8-7
RESTRICTED
RESTRICTED
Defence Manual of Security
0824. SC clearances for the categories of staff in the Central TLB, DPA and
Trading Funds set out below only remain valid for the periods specified after which
the whole clearance procedure is to be repeated, if required.
b. College based sandwich course students and bursaries for the period
of attachment.
0825. When civilian staff, who are in possession of SC clearance, cease to require
the clearance because of transfer, resignation etc the vetting authority is to be
notified of the full name, date of birth, status and date of cessation of requirement for
the clearance. In the case of the transfer of a civilian employee, the name is required
of the receiving department.
Aftercare
0826. The personnel security process continues after a clearance has been granted.
Aftercare arrangements are outlined in paras 1817 – 1824.
SC Review
0827. SC clearances will be reviewed as specified in para 0828. Responsibility for
initiating the review of an SC clearance rests with:
Procedure
0828. A SC review involves:
RESTRICTED
RESTRICTED
Security Check of Service and Civilian Personnel
d. A check with the Security Service, only if there has been a change of
partner or of step-parent since the initial clearance or last review, or if the
individual had previously been subjected to Normal Vetting (NV) as opposed
to PV(S) or SC clearance.
8-9
RESTRICTED
RESTRICTED
Defence Manual of Security
8-10
RESTRICTED
RESTRICTED
Security Check of Service and Civilian Personnel
ANNEX A
RESTRICTED – STAFF (When completed)
Name:……………………………………..Present post/establishment:……………………………
Grade:……………………………………..Proposed post/establishment:………………………
1. The above named is being considered for employment in the named post* /a general
vacancy* requiring SC clearance. This is a RESERVED*/NON RESERVED* POST.
3. It is certified that:
(1) *A Basic Check has been completed and a Basic Check verification record
(BCVR) is attached; OR
There is no evidence of any potentially adverse information or of serious illness or mental instability*
/the following potentially significant factors have been revealed* (copies of relevant papers are
attached):
___________________________________________________________________________
___________________________________________________________________________
Name…………………………………………………(Block Capitals)
Rank/grade……………………………………
8A-1
RESTRICTED
RESTRICTED
Defence Manual of Security
8A-2
RESTRICTED
RESTRICTED
Security Check of Service and Civilian Personnel
ANNEX B
CLEARANCE OF LOCALLY ENGAGED CIVILIANS
OVERSEAS
1. Locally engaged civilians (LEC) fall into three categories:
c. Aliens.
b. Resided in the UK for six months or more during the previous five
years.
In such cases, the security questionnaire is to be clearly marked on the top of the
front cover in red “For UK Checks”.
Other Locally Resident British Civilians
5. In the absence of suitable dependants of either UKBCS or servicemen, locally
resident British citizens should be considered for employment since they can
8B-1
8B-2
Nationality 0903
Residency 0904
Criteria 0905
Timescale 0916
Notification 0917
Aftercare 0920
DV Review 0922
9-1
RESTRICTED
RESTRICTED
Defence Manual of Security
9-2
RESTRICTED
RESTRICTED
Developed Vetting of Service and Civilian Personnel
CHAPTER 9
DEVELOPED VETTING OF SERVICE AND CIVILIAN
PERSONNEL
Purpose and Procedures
0901. The purpose of Developed Vetting (DV) and the procedures for carrying out
DV clearances are set out in paras 0319 and 0320.
Vetting Authorities
0902. The vetting authority responsible for DV clearances is the Defence Vetting
Agency (DVA).
Nationality
0903. The nationality rules governing eligibility for employment within MOD are
contained in Chapter 4.
Residency
0904. General guidance is given in para 0418. Vetting authorities may, however,
exercise discretion having regard to the total coverage which has been achieved. In
certain circumstances, particularly where an applicant is of UK origin, a shorter
period of residency may be accepted and a waiver granted by the appropriate vetting
authority.
Criteria
0905. The criteria covering the requirement for DV clearance and the application of
the criteria are contained in paras 0321 and 0322.
a. Assessing whether a post meets the criteria for being designated DV.
9-3
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Developed Vetting of Service and Civilian Personnel
0909. Where the above restrictions would cause special difficulties exceptional
authority may be granted for DV clearance to be initiated in specific cases. If and
when such authority is granted under the terms of sub-para 0908a, the requirements
of para 0921 will apply. Requests for waivers of the above limitations should be sent
to:
Civilian Staff
0911. The responsibility for initiating DV clearance is as follows:
RESTRICTED
RESTRICTED
Defence Manual of Security
delegated recruiting authority are to raise the request direct to the vetting
authority using the same form on their own authority.
Clearance Action
0912. An initial assessment of the individual’s suitability to undergo enquiries,
based on available information, is made. If satisfactory, the individual is provided
with a Security Questionnaire (MOD Form 1109), DV Supplement (MOD Form
1110) and Financial Questionnaire (MOD Form 1117) for completion and
submission to the vetting authority. Cases are to be processed under the agreed
administrative procedures for each Service Command and for each TLBs area of
responsibility, ensuring that the confidentiality of the information provided by the
individual is protected at all times.
0913. If, following the application for DV and before clearance is granted,
circumstances arise which cast doubt on the reliability of the individual, the initiating
authority or establishment must inform the vetting authority without delay.
Provisional DV Clearance
0914. Where it is essential for urgent operational or other exceptional reasons, the
grant of a provisional DV clearance may be authorised by the vetting authority,
before the full DV procedure has been completed. Such cases are to be kept to a
minimum and the procedures associated with a SC clearance (para 0310) are to have
been satisfactorily completed before a provisional clearance is granted.
0915. The full investigation is to be completed as soon as possible, so that the grant
of the provisional clearance can be confirmed or otherwise.
Timescale
0916. A DV clearance involves extensive enquiries and may take up to six months
to complete from receipt of the correctly completed security questionnaire, DV
supplement and financial questionnaire at the vetting authority. It is important,
9-6
RESTRICTED
RESTRICTED
Developed Vetting of Service and Civilian Personnel
therefore, that requests for DV clearance are initiated as early as possible. When
there is a need for urgent DV clearance to meet an operational need, advice should be
sought from the vetting authority.
Notification
0917. The vetting authority will notify the initiating authority or establishment of
the granting or denial of DV clearance. Where clearance has been granted to a
member of staff, arrangements are to be made locally to inform the individual.
Validity of Clearance
0919. DV clearance has replaced PV(TS) and EPV which in turn replaced PV
clearance. Holders of PV(TS) and EPV clearances may be deemed to hold a valid
DV clearance. A DV clearance will remain valid until resignation, retirement or the
previously notified lapse date except where it is withdrawn or suspended or lapses
when no longer required. It may require revalidating when an individual returns to
duty after a period of absence of 12 months or more. See also para 0922.
Aftercare
0920. The personnel security process continues after a clearance has been granted.
Aftercare arrangements are outlined in paras 1817 – 1825.
DV Review
0922. DV clearances will be reviewed at the intervals laid down in para 0323.
Responsibility for initiating the review of a DV clearance where there is a continuing
requirement for the clearance rests with:
9-7
RESTRICTED
RESTRICTED
Defence Manual of Security
Procedure
0923. A DV review involves:
d. A check with the Security Service, but only if there has been a change
of partner or of step-parent since the initial clearance or last review, or if the
partners’ parents were not checked during the previous clearance.
9-8
RESTRICTED
RESTRICTED
Developed Vetting of Service and Civilian Personnel
Dormant/Reserve/War Appointments
0926. Posting authorities have the task of ensuring that DV clearances for persons
earmarked for such appointments remain valid
9-9
RESTRICTED
RESTRICTED
Defence Manual of Security
9-10
RESTRICTED
RESTRICTED
Developed Vetting of Service and Civilian Personnel
ANNEX A
9A-1
9A-2
Introduction 1001
10-1
RESTRICTED
RESTRICTED
Defence Manual of Security
10-2
RESTRICTED
RESTRICTED
Commercial Security Guards
CHAPTER 10
COMMERCIAL SECURITY GUARDS
Introduction
1001. Full background concerning their employment is given in JSP 440 Volume 1,
Chapter 18. Additional specialised information is contained in the Cabinet Office
Manual of Protective Security, Chapter 3, Section 8. That chapter covers such
matters as:
a. Suitability of firms.
d. Conditions of contract.
10-3
RESTRICTED
RESTRICTED
Defence Manual of Security
Vetted Reserves
1006. To fulfil his commitments, a contractor should be required to maintain
sufficient reserves of manpower who are security cleared to the requisite level.
Normally, this will be in the ratio of 1:6 to the numbers employed on the contract.
10-4
RESTRICTED
RESTRICTED
Basic Check of Contractors’ Employees
General 1101
11-1
RESTRICTED
RESTRICTED
Defence Manual of Security
11-2
RESTRICTED
RESTRICTED
Basic Check of Contractors’ Employees
CHAPTER 11
BASIC CHECK OF CONTRACTORS’ EMPLOYEES
General
1101. Similar standards of reliability are expected of contractors’ staff as for
Service personnel and government employees. It should be made clear to contractors
at an early stage that people employed on MOD work should meet a certain standard
of reliability. In accordance with DEFCON 76, responsibility for initiating BC
approval rests with the contractor however, security authorities are under remit to
supervise the contractors’ work in this field.
Level of Access
1102. The Basic Check is not a security clearance. However, confirmation that the
BC has been carried out will provide sufficient assurance of reliability to allow
contractors’ employees frequent access, under normal supervision, to RESTRICTED
and CONFIDENTIAL material of UK origin on a need-to-know basis.
1103. It should also be noted that a Security Check (SC) or Developed Vetting
(DV) cannot be carried out unless a BC has been completed. Furthermore, the
minimum level of clearance required to allow unescorted access to MOD Head
Office sites is an SC.
Verification of Identity
1105. An important part of establishing the reliability and integrity of contractors’
employees is ensuring that they are who they say they are. Candidates must be asked
to provide original documents to establish their bona fides. Duplicates and
photocopies must not, under any circumstances, be accepted. Certified true copies of
original documents are acceptable for onward transmission to MOD when necessary.
1106. The documents necessary to establish identity will vary according to the
nationality of the individual concerned. Full details are given in Annex 5A.
11-3
RESTRICTED
RESTRICTED
Defence Manual of Security
Verification of Integrity
1107. The contractor must obtain two types of reference for an employee, each of
which should cover at least the last three years. The first should, ideally, be obtained
from the previous employer. Where this is not possible because the individual has
been unemployed or his previous employer is no longer in business or declines to
provide a reference on grounds of company policy, a second personal reference must
be obtained. Where an individual has been in full time education a reference must be
sought from the relevant school or other academic institution. In cases where the
individual has served in the Armed Forces or in the Civil Service during the past
three years, references should be sought from previous line managers named by the
candidate and not from the Service or Department.
1108. The second type of reference must be sought from a personal referee
nominated by the candidate. Ideally, such a referee should be of professional
standing eg. solicitor, civil servant, teacher, accountant, bank manager, doctor or
officer of the Armed Forces. However, individuals should be advised to nominate
such a person only when their personal knowledge of that individual is likely to be
sufficient to allow them to provide a considered reference. Where the individual is
unable to nominate such a person, a reference should be obtained from personal
acquaintances to whom they are not related, by birth or marriage, or involved in any
financial arrangement with the candidate.
1109. Where an individual has been overseas for a period greater than six months
during the past three years every effort must be made to obtain a reference from the
overseas employer.
1110. To ensure that the right questions are addressed about the candidate’s
integrity and to minimise the workload on referees and hence increase the probability
of obtaining a quick reply, references should be sought using the covering letter for
the BC Reference Report Form at Annex A.
1111. Where necessary, references may be obtained by telephone, but they must be
recorded on the standard form (Annex 5B1-2) together with identifying details of the
referee and of the person obtaining the reference. The fact that the reference has
been obtained by telephone must be recorded.
1112. For a current employee who has been with the company for the past three
years or more a perusal of company records and a check with a manager, using the
standard reference form, is sufficient and no further references are required.
11-4
RESTRICTED
RESTRICTED
Basic Check of Contractors’ Employees
Approval of Access
1115. Providing the:
b. Appropriate references are attached and none of the referees has given
any indication that he has reservations about the suitability of the candidate to
be employed on sensitive MOD work;
e. Candidate has not worked, or resided overseas, for more than six months
during the past three years; the MOD Sponsor, the company security controller or the
ESyO may then grant approval for the candidate to have access to protectively
marked material within the limits set out in para 1102. In the Central TLB, DPA and
11-5
RESTRICTED
RESTRICTED
Defence Manual of Security
Trading Funds for Non List X contractors, the MOD Sponsor or ESyO will forward a
copy to all BC documentation along with the appropriate completed security
questionnaire to the DVA for assessment and decision.
Approval by Principal Security Adviser
1116. If, however, any of the above conditions are not met, a copy of the BC
documentation together with the Criminal Record Declaration must be forwarded to
the respective PSyA with a covering letter explaining the reasons for referral. The
originator should retain originals of the documentation (except the Criminal Record
Declaration if submitted in a sealed envelope). After consideration, the relevant
PSyA will advise the originator whether approval has been granted for the candidate
to have the relevant access.
Retention of Documentation
1118. The documentation associated with a BC should be retained by the MOD
sponsor for a period of twelve months after the subject has ceased to be employed.
1119. Where an employee of a List X or Non List X company leaves to join another
such company, the individual may have his BCVR with the accompanying
documentation transferred to the new company together with a reference from the
losing company.
11-6
RESTRICTED
RESTRICTED
Basic Check of Contractors’ Employees
11-7
RESTRICTED
RESTRICTED
Defence Manual of Security
11-8
RESTRICTED
RESTRICTED
Basic Check of Contractors’ Employees
ANNEX A
BASIC CHECK
Covering Letter for Reference Report Form
The draft covering letter shown below may be used together with the attached Basic
Check Reference Report Form. Alternatively, companies may wish to include the
Report Form with their normal letter requesting references.
Subject:__________________________________________
You may be aware that we are required to seek references to confirm the
reliability of persons who may have access to certain classes of Government
material. The person named above who is an employee of/has applied for
employment with this company comes within the terms of this procedure.
He/she has given us your name as a previous employer/personal acquaintance willing
to give such a reference. It would be appreciated, therefore, if you would be good
enough to let us have any information about him/her, which you think may help us in
assessing his/her reliability, by completing the attached report form and returning it
to us as soon as possible.
Yours sincerely
11A-1
JSP 440 Volume 2 Issue 2 AL1
RESTRICTED
RESTRICTED
Defence Manual of Security
ANNEX B
BASIC CHECK REFERENCE REPORT FORM
Subject:__________________________
1. Are you related to the subject? If so please state your relationship:
2. Over what period have you know the subject? Please give approximate
month and year:
From: To:
5. Do you know of any factor concerning the subject which might cause his/her
fitness for employment on sensitive work to be questioned? If so please give details.
(Among relevant factors are significant financial difficulties, abuse of alcohol or
drugs, an extravagant mode of living or signs of mental or physical illness which
may impair judgement or reliability).
The above answers are correct to the best of my knowledge and belief.
Name: Signature:
Company Stamp
(if applicable)
11B-1
RESTRICTED
RESTRICTED
Defence Manual of Security
11B-2
RESTRICTED
RESTRICTED
Basic Check of Contractors’ Employees
ANNEX C
ACCESS TO GOVERNMENT OWNED MATERIAL
Criminal Record Declaration
The company named at the bottom of this form has Government contracts, some or all of which
require it to hold material or information which is the property of the Government. The company has
a duty to protect these assets while in its possession and this obligation extends to its employees and
agents. Since you are, or may become, such a person please complete the following:
5. Have you ever been convicted or found guilty by a Court of any offence in any country
(excluding parking but including all motoring offences even where a spot fine has been administered
by the police) or have you ever been put on probation or absolutely/conditionally discharged or bound
over after being charged with any offence or is there any action pending against you? You need not
declare convictions which are “spent” under the Rehabilitation of Offenders Act (1974). Yes/No*
6. Have you ever been convicted by a Court Martial or sentenced to detention or dismissal
whilst serving in the Armed Forces of the UK or any Commonwealth or foreign country? Yes/No*
7. Do you know of any other matter in your background which might cause your reliability or
suitability to have access to government assets to be called into question? Yes/No*
I declare that the information I have given above is true and complete to the best of my knowledge
and belief. I understand that any false information or omission in the information I have given may
disqualify me for employment in connection with Government contracts.
The information you have given will be treated in strict confidence. You do not need to show the
completed form to any representative of the company. If you wish you may place the completed form
in a sealed envelope, sign your name across the flap and return it to the company. The company will
then forward it to the Government department concerned.
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Basic Check of Contractors' Employees
ANNEX D
RESTRICTED-STAFF (When completed)
CRIMINAL CONVICTION DECLARATION FORM (List X firms only)
Notes on completion:
1. Please use BLOCK CAPITALS in black ink or typescript, using an additional information page if
necessary:
2. Answer all questions as fully as possible. Where the answer is not known, enter N/K or N/A where an
answer is not applicable.
In the interests of national security, safeguarding Parliamentary democracy and maintaining the proper security of
the Government's activities, it is the policy of HMG that no one should be employed in connection with work the
nature of which is vital to the interests of the State;
(i) who is, or has previously been involved in, or associated with, espionage, terrorism, sabotage, or
actions intended to overthrow or undermine Parliamentary democracy by political, industrial or violent means; (this
includes membership of, or association with, any group which is involved with such activities).
(ii) who is susceptible to pressure or improper influence, for example, because of current or past
conduct; has shown dishonesty or lack of integrity which throws doubt on their reliability; or has demonstrated
behaviour, or is subject to circumstances which may otherwise indicate unreliability.
In accordance with this policy, all individuals in posts which require them to have access to MOD SECRET
information and assets may be subject to a check against the National Collection of Criminal Records. When
completing this form, you must declare any criminal convictions that you may have, including those which are
"spent". In accordance with the Rehabilitation of Offenders Act 1974 (Exceptions) Order 1975, and the
Rehabilitation of Offenders (Northern Ireland) Order 1978 (Exceptions) Order 1979, spent convictions may also be
taken into account where national security is concerned. In Northern Ireland spent convictions may also be taken
into account where the protection of public safety or public order is involved. The relevance of particular criminal
offences is a matter for the Department to decide; YOU MUST THEREFORE DECLARE ALL
CONVICTIONS INCLUDING THOSE WHICH INVOLVED A JUVENILE COURT, WHETHER OR
NOT "SPENT" UNDER THE ABOVE ACTS. THERE ARE NO EXCEPTIONS.
Once completed, this Form should be placed in a sealed envelope, with your signature over the flap, and handed
to the Security/Personnel Officer for onward transmission to the Ministry of Defence.
CURRENT SURNAME:.........................................................................................................…
ANY OTHER SURNAME USED:.............................................................................................…
FULL FORENAME(S):..........................................................................................................….
DATE OF BIRTH:....../....../.......PLACE OF BIRTH:........................................................…………..
CURRENT NATIONALITY (including any dual nationality):..............................................................
PROOF OF BRITISH CITIZENSHIP (if applicable):........................................................................
PROPOSED EMPLOYMENT:.................................................................................................…
RESTRICTED
RESTRICTED
Defence Manual of Security
FINAL DESTINATION:
From To
1.
2.
3.
Have you ever been convicted by a Court, including a Juvenile Court, of any offence in any country
(excluding minor motoring offences?
YES NO
If you have answered YES please give details of the offences referred to:
Have you ever been convicted by Courts Martial or sentenced to dismissal whilst serving in the Armed Forces
of the UK or any other Commonwealth or foreign country.
YES NO
RESTRICTED
RESTRICTED
Basic Check of Contractors' Employees
DECLARATION: I declare that I have read and understand Her Majesty's Government's policy concerning
individuals employed in work, the nature of which is vital to the interests of the State, as described on page one. I
understand that this Form will be submitted for checking against the records in accordance with that policy.
I declare that the information I have given is true and complete to the best of my knowledge and belief. In addition, I
understand that any false statement or deliberate omission in the information I have given on this Form may
disqualify me for employment in connection with Crown contracts.
SIGNED......................................DATE...............................................................
COMPANY ADDRESS
FOR NOTIFICATION
OF DECISION:
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Security Check of Contractors’ Employees
Nationality 1205
Residency 1206
Criteria 1207
Timescale 1210
Authorization 1211
Validity 1214
12-1
RESTRICTED
RESTRICTED
Defence Manual of Security
12-2
RESTRICTED
RESTRICTED
Security Check of Contractors’ Employees
CHAPTER 12
SECURITY CHECK OF CONTRACTORS’ EMPLOYEES
Purpose and Procedures
1201. The purpose of the Security Check (SC) and the procedures for carrying out
SC clearances are set out in paras 0310 and 0311.
Vetting Authorities
1202. The DVA is responsible for granting SC clearances to contractors' employees
including Non List X company employees working on single Service (including US
Forces) contracts and on tri-Service contracts with a single Service lead.
1203. The DVA is similarly responsible for vetting Non List X company employees
working in or covered by:
d. MOD contracts
b. List X Security Controllers apply direct to the DVA for clearances for
such staff operating on all List X sites.
Nationality
1205. The nationality rules governing eligibility for employment within MOD are
contained in Chapter 4.
12-3
RESTRICTED
RESTRICTED
Defence Manual of Security
Residency
1206. Candidates for SC clearance, regardless of origin, should normally have
resided continuously in the UK immediately prior to their application for a minimum
of five years. In certain circumstances, particularly where an applicant is of UK
origin, a shorter period of residence may be accepted, subject to a waiver being
granted by the appropriate vetting authority. See also para 0804.
Criteria
1207. The criteria covering the requirement for SC clearance and the application of
the criteria are contained in paras 0313 and 0314.
1208. In the case of all MOD Head Office sites, the minimum level of clearance
required to allow unescorted access is an SC clearance. In all other MOD
establishments, Defence Agencies and GOCO sites, the minimum level of clearance
is determined in accordance with the level of access required. For commercial
security guards, see Chapter 10.
Timescale
1210. SC clearance will normally take between four to six weeks to complete, from
the date of receipt of the correctly completed security questionnaire at the vetting
authority, but it can take longer.
Authorization
1211. The vetting authority will inform the security controller for List X company
employees, or the project manager or establishment security officer (ESyO) for Non
List X company employees when clearance has been authorised. The latter are
responsible for notifying the contractor.
1212. Contractors' employees must not be engaged on MOD contracts until the
appropriate clearance is received.
12-4
RESTRICTED
RESTRICTED
Security Check of Contractors’ Employees
Access Control
1213. In all cases where it is not possible to give approval for SC clearance to an
individual, the security controller, or project manager or ESyO is to ensure that the
necessary access control is enforced.
Validity
1214. An SC clearance is valid for a maximum period of three years from the date
of issue except in the case of:
SC Review
1216. If required, SC clearances will be renewed every five years. Responsibility
for initiating the review of an SC clearance rests with the MOD sponsor, project
manager, ESyO or (RAF only) station security officer. The individual is to be
provided with a Security Questionnaire (Review) Guide (MOD Form 1127) and
be asked to update his personal details by completing a Security Questionnaire
(MOD Form 1109).
RESTRICTED
RESTRICTED
Defence Manual of Security
Administrative Procedures
1218. Cases under paras 1215 to 1217 are to be processed under the agreed
administrative procedures ensuring that the confidentiality of the information
provided by the individual is protected at all times.
SC Review
1220. The SC clearances for direct employees of a List X firm are reviewed every
ten years whilst sub-contractors’ clearances are reviewed every five years. The
individual is to be provided with a Security Questionnaire (Review) Guide (MOD
Form 1127) and be asked to update his personal details by completing a Security
Questionnaire (MOD Form 1109).
Administrative Procedures
1222. Cases under para 1219 to 1221 are to be processed under the agreed
administrative procedures ensuring that the confidentiality of the information
provided by the individual is protected at all times. However, those uncleared List X
company employees who require an SC clearance to work on MOD premises are to
be cleared as for Non List X employees. See paras 1215 and 1216.
12-6
RESTRICTED
RESTRICTED
Security Check of Contractors’ Employees
12-7
RESTRICTED
RESTRICTED
Defence Manual of Security
12-8
RESTRICTED
RESTRICTED
Security Check of Contractors’ Employees
ANNEX A
POTENTIAL LIST X EMPLOYEES: ACCEPTANCE OF
OVERSEAS SECURITY CLEARANCES
1. It is generally accepted throughout the NATO area that, under the principle of
reciprocity, a personnel security clearance issued by an individual’s parent PSyA is
accepted by another member nation for access to its classified material at the
appropriate level, and where there is a need to know.
4. It has therefore been agreed that when a potential candidate for a List X
company is identified but s/he is resident outside the UK, D DefSy InfoSy(IVCO)
will ask the appropriate overseas security authority to grant the individual a security
clearance to SECRET level. This can only be achieved for NATO member nations
or for countries with which the UK has a General Security Arrangement (GSA). For
other countries the SC application should be submitted in the normal way.
5. When a security clearance has been granted by the overseas security authority
an equivalent level UK clearance should be issued. This will be valid for three years
and be subject to the usual limitations regarding access to caveat material or to other
foreign material. After three years, the DVA will effect re-vetting if it is still
required.
12A-1
RESTRICTED
RESTRICTED
Security Check of Contractors’ Employees
12A-2
RESTRICTED
RESTRICTED
Developed Vetting of Contractors’ Employees
Nationality 1304
Residency 1305
Criteria 1306
Timescale 1311
Validity 1313
13-1
RESTRICTED
RESTRICTED
Defence Manual of Security
13-2
RESTRICTED
RESTRICTED
Developed Vetting of Contractors’ Employees
CHAPTER 13
DEVELOPED VETTING OF CONTRACTORS'
EMPLOYEES
Purpose and Procedures
1301. The purpose of Developed Vetting (DV) and the procedures for carrying out
DV clearances are set out in para 0319 and 0320.
Vetting Authorities
1302. The DVA is the vetting authority responsible for granting DV clearances to
contractors’ employees. It is responsible for carrying out the vetting for Non List X
company employees working on single Service contracts (including US Forces) and
on tri-Service contracts with a single Service lead.
1303. The DVA is similarly responsible for vetting Non List X company employees
working in or covered by:
d. MOD contracts
f. List X companies.
Nationality
1304. The nationality rules governing eligibility for employment within MOD are
contained in Chapter 4.
13-3
RESTRICTED
RESTRICTED
Defence Manual of Security
Residency
1305. Candidates for DV clearance, regardless of origin, should normally have
resided continuously in the UK immediately prior to their application for a minimum
of ten years. In certain circumstances, particularly where an applicant is of UK
origin, a shorter period of residence may be accepted and a waiver granted by the
appropriate vetting authority. See also para 0904.
Criteria
1306. The criteria covering the requirement for DV clearance and the application of
the criteria are contained in paras 0321 and 0322.
Designation of Posts
1307. It is the responsibility of the MOD sponsor or project manager to determine
whether a post occupied by a contractor’s employee meets the criteria for DV
clearance.
13-4
RESTRICTED
RESTRICTED
Developed Vetting of Contractors’ Employees
Timescale
1311. DV clearance involves extensive enquiries which can take up to six months to
complete. It is, therefore, important that requests for DV clearance are submitted
well in advance of the commencement of a contract.
Notification of Clearance
1312. The DV clearance decision will be notified to the security controller, MOD
sponsor or establishment security officer (ESyO) in writing. It will be their
responsibility to inform the individual of the decision.
Validity
1313. A DV clearance is valid for a maximum period of five years from the date of
issue except in the case of:
c. Cessation of employment.
DV Review
1315. If required, DV clearances will be renewed initially after five years and then
every seven years. Responsibility for initiating the review of a DV clearance where
there is a continuing requirement for the clearance rests with the vetting authority or,
RAF only, station security officer. The individual is to be provided with a Security
Questionnaire (Review) Guide (MOD Form 1127) and be asked to complete a
Security Questionnaire (MOD Form 1109), DV Supplement (Review) (MOD Form
1112) and Financial Questionnaire (MOD Form 1117).
13-5
RESTRICTED
RESTRICTED
Defence Manual of Security
Administrative Procedures
1317. Cases under paras 1314 to 1316 are to be processed under the agreed
administrative procedures for each Service’s or TLB’s area of responsibility,
ensuring that the confidentiality of the information provided by the individual is
protected at all times.
DV Review
1320. To ensure that DV clearances do not become outdated and to reflect the need
for regular review, List X company employees’ clearances will be reviewed initially
after five years and then at least every seven years. The individual is to be provided
with a Security Questionnaire (Review) Guide (MOD Form 1127) and be asked to
complete a Security Questionnaire (MOD Form 1109), DV Supplement (Review)
(MOD Form 1112) and Financial Questionnaire (MOD Form 1117).
13-6
RESTRICTED
RESTRICTED
Developed Vetting of Contractors’ Employees
Administrative Procedures
1322. Cases under paras 1318 to 1320 are to be processed under the agreed
administrative procedures, ensuring that the confidentiality of the information
provided by the individual is protected at all times.
13-7
RESTRICTED
RESTRICTED
Defence Manual of Security
13-8
RESTRICTED
RESTRICTED
Short Term Contractors Employed by the Armed Forces
14-1
RESTRICTED
RESTRICTED
Defence Manual of Security
14-2
RESTRICTED
RESTRICTED
Short Term Contractors Employed by the Armed Forces
CHAPTER 14
SHORT TERM CONTRACTORS EMPLOYED BY THE
ARMED FORCES
Introduction
1401. The security measures to be enforced in respect of short term contractors
differ considerably from those governing List X and other long term contractors.
Both latter categories have an MOD sponsor. The rules governing security
clearances for such contractors are given in Chapters 11, 12 and 13.
1402. All the Services engage contractors whose staff undertake short term work.
This, in the context of security, is taken to be that scheduled to last 14 days or less.
While security considerations must be paramount, the level of vetting or access
control required must be assessed in the context of risk management. The outcome
of the exercise will necessarily relate primarily to the latest threat assessment about
an establishment’s vulnerability and extend to:
1404. If the time factor permits, all short term contractors’ employees should be
subjected to the Basic Check. This is because virtually all Service establishments
contain RESTRICTED assets which such persons will inevitably see or access. On
occasions, however, the time available before the contractor has to start work will be
so short as to permit only the application of access control measures and, where
possible, escorting. See para 1412.
Verification of Identity
1405. Full particulars are shown in Annex 5A where the requirements are
specifically stated. Responsibility for establishing identity rests with the main
14-3
RESTRICTED
RESTRICTED
Defence Manual of Security
contractor, who may delegate this task to a sub contractor. The establishment
security officer (ESyO) has responsibility to make sure that the contractors/sub
contractors are verifying identity conscientiously.
Contractors’ Staff
1407. Those needing entry to Service establishments will normally be required to
complete a Security Questionnaire (MOD Form 1109) on which the CTC box at page
1 has first been ticked by the firm’s respresentative or the ESyO.
1408. Once MOD Form 1109 has been filled in by the individual the firm’s
representative will complete page 12 and record which documents (Annex 5A) have
been used to establish the subject’s identity.
CTC Processing
1409. Only in those cases where either of the following are revealed is full CTC
processing required.
14-4
RESTRICTED
RESTRICTED
Short Term Contractors Employed by the Armed Forces
Access Controls
1412. This subject has a close relationship with, but is not an integral part of,
vetting. This arises because those persons who are not security cleared for access to
Service establishments need to be controlled through such means as official passes,
photographs, booking in and out and escorts. Some guidance on these matters may
be found in Chapter 6, paras 0612 to 0614. Further material is given in JSP 440
Volume 1, Chapter 5, Section IX.
14-5
RESTRICTED
RESTRICTED
Defence Manual of Security
14-6
RESTRICTED
UNCLASSIFIED
Defence Manual of Security
CHAPTER 15
(SPARE)
CHAPTER 16
(SPARE)
Definitions 1702
Retrospective Denial/Withdrawal of
Security Clearance 1713
Suspension/Restoration of Security
Clearance 1716
17-1
RESTRICTED
RESTRICTED
Defence Manual of Security
17-2
RESTRICTED
RESTRICTED
Denial, Withdrawal, Suspension and Lapsing of Security Clearance
CHAPTER 17
DENIAL, WITHDRAWAL, SUSPENSION AND LAPSING
OF SECURITY CLEARANCE
Introduction
1701. The decision to deny or withdraw security clearance from Service personnel,
civilian staff and contractors' employees is made by the relevant authority (see
Chapter 2) who ensures that factors outside the field of security, particularly career
interests, are taken fully into account. The decision to deny or withdraw a security
clearance is always made in accordance with the guidance in the Cabinet Office
publication, ‘Manual of Protective Security – Personnel Security’, Chapter 4 of
March 1998 and with the relevant internal procedures for appeals against adverse
security vetting decisions. See para 1709 et seq.
Definitions
Denial
1702. Denial of security clearance is the refusal to grant a clearance.
Withdrawal
1703. Withdrawal of a security clearance is the removal of a clearance previously
granted.
Suspension
1704. Suspension of security clearance is the temporary removal of a clearance
pending an investigation and/or administrative action.
Lapsing
1705. Lapsing of a security clearance occurs when a clearance has exceeded its
period of validity or when the security authorities, in conjunction with
personnel/civilian management, consider that the holder no longer requires that
clearance to conduct his duties.
RESTRICTED
RESTRICTED
Defence Manual of Security
1708. Where there are clear grounds for supposing that security clearance will be
denied or withdrawn, the facts of the case should be agreed as far as is possible with
the subject before a final decision on clearance is taken. This will include agreeing a
factual record of any subject interview. This does not apply if the clearance is an
integral part of the initial recruitment process. Any interviews will be conducted
after consideration of source protection and under the umbrella of vetting
confidentiality.
Appeals Procedures
1709. The internal appeals procedures against adverse security vetting decisions for
Service personnel, civil servants and employees of MOD contractors are at Annexes
A, B and C. These are not, however, available to recruits. Individuals who have
exhausted these procedures and remain dissatisfied with the result may, where the
decision to deny or withdraw a clearance, submit an appeal to the independent
Security Vetting Appeals Panel. The Secretariat function for the Panel will be
carried out by the Security Division of the Cabinet Office who will provide guidance
notes for appellants.
Administrative Procedures
1710. The decision to deny or withdraw a security clearance will be notified by the
security authorities to the appropriate personnel/civilian management branch and the
head of establishment (HOE). The notification will state whether and when the
decision may be reviewed.
17-4
RESTRICTED
RESTRICTED
Denial, Withdrawal, Suspension and Lapsing of Security Clearance
1714. Spare
17-5
RESTRICTED
RESTRICTED
Defence Manual of Security
17-6
RESTRICTED
RESTRICTED
Denial, Withdrawal, Suspension and Lapsing of Security Clearance
ANNEX A
APPEALS AGAINST ADVERSE SECURITY VETTING
DECISIONS: INTERNAL PROCEDURES FOR SERVICE
PERSONNEL
Naval Service
1. If a security clearance is recommended to be denied or withdrawn, the
recommendation is to be put to the Chief of Staff to 2SL/CNH. Prior to the recom-
mendation being reviewed, a subject interview will be conducted and the individual
will sign to acknowledge that the facts in the interview report are a true reflection of
the interview. If the recommendation is upheld, RN personnel may immediately
state a complaint under the normal redress procedures provided for in the Naval
Discipline Act 1957. The Admiralty Interview Board will consider the complaint
and the individual will be informed of its decision.
Army
2. If a security clearance is to be denied or withdrawn, the individual will either
be informed personally by his Commanding Officer or by the Head of Personnel
Security (Army) Secretariat at an interview. Whenever feasible and appropriate, the
Head of Personnel Security (Army) Secretariat will conduct an interview in those
cases involving denial or withdrawal of a high level of security clearance and in
instances where a career implication is involved. The background leading to the
decision and the right to make a redress of complaint will be explained at the
interview. If individuals are not satisfied with the outcome, they may appeal to their
Commanding Officer under the normal redress of complaint procedures provided for
in the Army Act 1955. The redress of complaint may be considered by the Army
Board under these procedures. The individual will be informed of the Army Board’s
decision.
17A-1
RESTRICTED
RESTRICTED
Defence Manual of Security
Footnote: The existence of the Security Vetting Appeals Panel shall be drawn to the
attention of individuals at the time they are informed of the arrangements for their
internal appeals procedures.
17A-2
RESTRICTED
RESTRICTED
Denial, Withdrawal, Suspension and Lapsing of Security Clearance
ANNEX B
APPEALS AGAINST ADVERSE SECURITY VETTING
DECISIONS: INTERNAL PROCEDURES FOR MOD
CIVIL SERVANTS
Action Prior to an Appeal
1. Upon a clear indication that a clearance is to be denied or withdrawn and with
a reasonable expectation (after consultation with the Personnel Management
Authority) that an employee's career will be affected, the individual is to be invited
to attend for interview with a Defence Vetting Agency (DVA) assessor and provided
with a copy of the evidence (or reasons as far as is possible) on which any future
action will be based.* The subject is then to be given a set period of time to correct
any area which he or she does not consider to be a true record and be allowed to
comment on their situation generally. Following such action, the DVA assessor will
decide either:
The Appeal
3. In the event of clearance being denied or withdrawn, the individual is to be so
informed (with the reasons for the decision being stated as far as is possible) and
given 28 days in which to submit a written appeal to PUS. The appeal is to be for-
warded direct to the relevant personnel security staff for review and, unless the
original decision is reversed, staffing to PUS or to his nominated deputy for a ruling
on whether the original decision to deny or withdraw should stand. The appellant
may opt for the appeal to be heard orally and may be accompanied by a colleague or
by a representative of a recognised Trade Union at the hearing. The individual
17B-1
RESTRICTED
RESTRICTED
Defence Manual of Security
should be informed of the outcome of the appeal, with the reasons for the decision
being stated as fully as possible.
17B-2
RESTRICTED
RESTRICTED
Denial, Withdrawal, Suspension and Lapsing of Security Clearance
ANNEX C
APPEALS AGAINST ADVERSE SECURITY VETTING
DECISIONS: INTERNAL PROCEDURES FOR MOD
CONTRACTORS' EMPLOYEES
Action prior to an Appeal
1. Upon a clear indication that a clearance is to be denied or withdrawn, the
Defence Vetting Agency (DVA) assessor will provide the individual with a copy of
the evidence (or reasons as far as is possible) on which any future action will be
based. This will usually be done in writing, but there may be occasions when an
interview with a member of the Agency's staff is appropriate.* The subject is then to
be given a set period of time to correct any area which he or she does not consider to
be a true record and be allowed to comment on their situation generally. Following
such action, the DVA assessor will decide either:
The Appeal
2. In the event of clearance being denied or withdrawn, the individual is to be so
informed (with the reasons for the decision being stated as far as is possible) and
given 28 days in which to submit a written appeal. The appeal is to be forwarded
direct to the Chief Executive of the DVA for review of all the circumstances, and for
a ruling on whether the original decision to deny or withdraw should stand. In
exceptional or finely balanced cases, the Chief Executive DVA may elect to refer the
matter to the relevant personnel security staff for consideration, including possible
referral to PUS or to his nominated deputy. The individual should be informed of the
outcome of the appeal, with the reasons for the decision being stated as fully as
possible.
17C-1
RESTRICTED
RESTRICTED
Defence Manual of Security
17C-2
RESTRICTED
RESTRICTED
Personnel Security Responsibilities of Heads of Establishments
Briefing 1807
Aftercare 1817
18-1
RESTRICTED
RESTRICTED
Defence Manual of Security
18-2
RESTRICTED
RESTRICTED
Personnel Security Responsibilities of Heads of Establishments
CHAPTER 18
PERSONNEL SECURITY RESPONSIBILITIES OF
HEADS OF ESTABLISHMENTS
Background
1801. Vetting is a process for establishing the suitability of personnel for access to
protectively marked or sensitive assets and for ensuring that those who are granted
such access remain suitable. Given that vetting does not provide a definitive and
constant level of total assurance it is incumbent on HOEs, a definition of which is
given at para 11b in the Introduction to this Volume, to take a positive interest in
those under their control. This chapter sets out the need for active, yet properly
balanced, supervision throughout the chain of command and line management.
b. Briefing them on the security aspects of their job and on the level of
security performance expected of them.
RESTRICTED
RESTRICTED
Defence Manual of Security
e. Dealing with problems and discussing any concerns with their ESyO.
1805. Apart from the wider responsibilities listed at para 1804 above, HOEs are
also responsible for the following, guidance on which is given in paras 1816 to 1825
below.
Briefing
1807. The HOE is also responsible for briefing staff on arrival or on change of job
about any aspects of the work that might raise issues of security or potential conflicts
of interest. Similarly, they may be involved in the briefing of individuals before they
are granted access to particularly sensitive assets.
Monitoring Staff
1808. The vast majority of staff are security cleared without difficulty and
throughout their service never give cause for concern. However, the MOD is reliant
on HOEs and their subordinates to spot potential difficulties and draw attention to
them.
1809. HOEs and their subordinates are expected to monitor the behaviour of their
staff for security. They should look out for the types of behaviour described in
RESTRICTED
RESTRICTED
Personnel Security Responsibilities of Heads of Establishments
1814. It is important that all allegations of a security nature are resolved for the sake
of all concerned. Any lingering doubts or suspicions are likely to demoralise those
who work in the affected area. Failure to take seriously a complaint relating to
security could tempt someone to leak information as the only means of getting the
matter taken up at higher level.
1815. Where a security problem is dealt with in the early stages it is often possible
to resolve the matter without detriment to the individual or the MOD.
18-5
RESTRICTED
RESTRICTED
Defence Manual of Security
Aftercare
General
1817. Aftercare is defined at para 11 in the Introduction and in more detail at para
0337. The full background is contained in the MPS Chapter 4.6.
1819. In considering the need for an AIR, care should be taken about forming
judgements on what may appear to be isolated incidents or circumstances that seem
to have little relevance to security. Such factors may take on a wholly different
perspective when considered together with other information already held by the
vetting authorities. In general, matters of fact are always to be reported and
suspicions should only be reported when, if they were to be verified, they would cast
serious doubt on an individual’s security reliability. Annex A provides advice on
factors to be considered in relation to an individual’s security reliability.
Young Personnel
1821. Young personnel who find themselves in a sensitive environment require
special supervision. Their lack of experience and maturity may cause vulnerability
in a number of areas. The responsibilities of handling highly sensitive information
may not always be appreciated at a time when they are still not fully acquainted with
their environment and its overall security standards. When DV clearance is granted
to a person under the age of 21, special vetting aftercare measures are put into place.
These measures will include the nomination by the HOE of a suitable supervisor, to
monitor the subject’s character and conduct. Instructions for this supervision are set
out at Annex B.
RESTRICTED
RESTRICTED
Personnel Security Responsibilities of Heads of Establishments
the umbrella of vetting confidentiality. Responsibility for triggering the SAF process
currently varies between Sectors. Following collocation of the DVA and IT
recruitment-engineering, it is anticipated that it will be centralised within the DVA.
The content of the SAF contributes to a person’s vetting record and will be of value
at the next review of security clearance. The suggested format for a SAF is at Annex
D.
Conflicts of Interest
1824. On occasions, Service personnel, MOD civil servants, contractors’ employees
or one of their close relations may come to notice as having been implicated with an
organisation or belief which is incompatible with military service or with access to
protectively marked assets or to MOD establishments or sensitive sites. This
information should be reported, in writing, without delay to the respective Principal
Security Adviser. The report should be protectively marked to indicate the content
and/or potential sensitivity of the case.
Subversion
1825. Any indication of subversive activity, interest or belief is to be reported,
without delay, to the respective Principal Security Adviser in accordance with
Service Command/TLB instructions. Should there be an overt, prima facie, case of
disciplinary significance, then appropriate investigation will need to be instigated.
However, a security vetting interest will remain and the circumstances should be
reported as indicated in para 1818 above.
18-7
RESTRICTED
RESTRICTED
Defence Manual of Security
Hypnotic Entertainment
1828. The employment of hypnotic entertainers in Service establishments is not to
be encouraged. This is because individuals under hypnosis are neither in control of
their faculties nor able to recall what they may have said or done. Such a situation is
deemed to be incompatible with the responsibility associated with the holding of a
security clearance. Annual security lectures should bring out the dangers inherent in
hypnotic entertainment
Breaches of Security
Physical Security – Losses and Recovery
1829. For details see JSP 440 Volume 1 Chapter 5 para 05939 to 05942.
18-8
RESTRICTED
RESTRICTED
Personnel Security Responsibilities of Heads of Establishments
ANNEX A
NOTES FOR GUIDANCE WHEN CONSIDERING AN
INDIVIDUAL'S SECURITY RELIABILITY
Vulnerability
1. These notes are intended to help identify factors that may render an
individual susceptible to pressure or improper influence, or otherwise indicate
unreliability. Some of the most obvious of these are:
c. Alcohol abuse.
g. Compulsive gambling.
Warning signs
2. It is not possible to produce a definitive list of the sort of problems to look
out for because individuals vary and what might be considered a potential danger
signal in one person might be considered relatively normal for another. However, it
is very important to be alert for any signs of significant and potentially worrying
aspects or changes in a person's behaviour or lifestyle and, if any such changes occur,
to report them immediately and not wait for the next periodic formal review of the
individual's security reliability. In some cases, slight signs that all is not well,
particularly if they become more obvious when a person is under pressure, may
indicate the beginnings of a serious security problem.
18A-1
RESTRICTED
RESTRICTED
Defence Manual of Security
Drugs
4. An apparent change in personality or general attitude to, for example, family,
colleagues or work.
a. erratic timekeeping;
a. furtive behaviour;
b. stealing;
d. obvious familiarity with slang expressions for drugs and the methods of
taking them;
f. attempts to keep arms covered even in hot weather (to hide needle
marks);
18A-2
RESTRICTED
RESTRICTED
Personnel Security Responsibilities of Heads of Establishments
Alcohol
7. Inadequate or uneven performance at work particularly indicated by:
a. lack of concentration;
b. loss of interest;
c. afternoon lethargy;
g. oversensitivity to criticism;
h. poor timekeeping.
a. bleary eyes;
b. slurred speech;
c. flushed face;
d. unsteadiness;
e. hand tremors;
a. moodiness;
b. anxiety;
c. depression.
18A-3
RESTRICTED
RESTRICTED
Defence Manual of Security
18A-4
RESTRICTED
RESTRICTED
Personnel Security Responsibilities of Heads of Establishments
ANNEX B
GUIDELINES FOR NAMED SUPERVISORS OF
PERSONNEL AGED UNDER 21 OCCUPYING DV
POSTS
Introduction
1. The role of the supervisor of personnel working in sensitive areas is a
particularly important one and this is especially so where young people are
concerned. It is not always possible to avoid employing personnel under 21 years of
age in sensitive areas. Where it proves to be unavoidable, special care is needed to
ensure the close supervision of such personnel, who are at an impressionable age and
whose character, interests and opinions are likely still to be developing.
Close supervision
3. A supervisor will be expected to get to know the individual well and to keep
in sufficiently close contact with him to be able to discern any potential problems
and any changes in his behaviour or attitudes and to bring them to the attention of his
HOE without delay. This process will require supervisors to be sensitive to the
personal problems and concerns of young staff, and be prepared to listen
sympathetically to them and to encourage them to seek help in resolving any
problems they may have which, if unchecked, could lead to difficulties in the future.
18B-1
RESTRICTED
RESTRICTED
Defence Manual of Security
18B-2
RESTRICTED
RESTRICTED
Personnel Security Responsibilities of Heads of Establishments
ANNEX C
RESTRICTED - VETTING (1)(when completed
..............................
..............................
..............................Date: .......................
Establishment/Unit:..............................Regt/Corps:.................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
5. Assessment of the risk to security that may result from the subject's continued access to
protectively marked material:
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
18C-1
RESTRICTED
RESTRICTED
Defence Manual of Security
6. Details of action already taken to limit the subject's access to protectively marked
material, and of any disciplinary or administrative actions taken or being considered:
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
7. Recommendation of HOE/Commander(5):
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
.............................................................................................................................................................................
Rank:...............................................................Appointment:..........................................................................
Establishment/Unit/Branch stamp
Copy to:
PsyA who, if there is a need to know, will advise subordinate Security staffs on a "Personal for"
basis
18C-2
RESTRICTED
RESTRICTED
Personnel Security Responsibilities of Heads of Establishments
Notes:
1. In addition to the descriptor VETTING, the minimum protective marking given to this
report is to be RESTRICTED.
3. Insert current employment and level of access and, if known, future employment with
date and level of access.
4. Full details of the incident are to be included; where appropriate, any supporting
documents (eg supervising officers' reports) are to be attached.
18C-3
RESTRICTED
RESTRICTED
Defence Manual of Security
18C-4
RESTRICTED
RESTRICTED
Personnel Security Responsibilities of Heads of Establishments
ANNEX D
Details of subject
Security Appraisal
2. Are you satisfied with the subject's attitude toward security? YES/NO
3. As far as you are aware, has he/she been responsible for any breaches of
security during the last 12 months? YES/NO
18D-1
RESTRICTED
RESTRICTED
Defence Manual of Security
4. To the best of your knowledge, has he/she shown any evidence of:
5. If you have answered YES to any of the elements of Question 4 above, please
give brief details:
6. How well is the subject known to you outside of normal working hours?
WELL
SLIGHTLY
NOT AT ALL
7. Are you aware of any other grounds for doubting the subject's suitability for
continued DV clearance? YES/NO
18D-2
RESTRICTED
RESTRICTED
Personnel Security Responsibilities of Heads of Establishments
Note: If, by completion of this form, you have highlighted any concerns about the
subject's continued suitability for access to highly sensitive material, you should
consult the security officer and consider the need for an Aftercare Incident Report to
be raised.
18D-3
RESTRICTED
RESTRICTED
Defence Manual of Security
18D-4
RESTRICTED
RESTRICTED
Security Advice on Travel
19-1
RESTRICTED
RESTRICTED
Defence Manual of Security
19-2
RESTRICTED
RESTRICTED
Security Advice on Travel
CHAPTER 19
Security Advice
1902. The relevant points of contact for security advice on travel are:
Special Regulations
General
1903. There are special regulations governing travel by Service personnel and
MOD Civilians to a number of countries. Advice on where to find further
information is given below. In cases of doubt personnel should consult their
Establishment Security Officer (ESyO).
19-3
RESTRICTED
RESTRICTED
Defence Manual of Security
Ireland
1905. Guidance on travel to Northern Ireland and the Republic of Ireland is
published in Volume 1 Chapter 7 paras 07160 to 07205. This is complemented by
single Service travel rules and by special rules for travel to Northern Ireland and the
Republic of Ireland for Service personnel.
19-4
RESTRICTED
RESTRICTED
Security Advice on Travel
1911. There is an increasing trend towards terrorism without frontiers. Usama bin
Laden, and groups who have allied themselves with him, are the protagonists in this
increasingly global threat, posing a threat across most of the developing world, as
well as in parts of Western Europe and the US. Irish related terrorism has also been
responsible for a number of attacks on British military personnel abroad in the past
and this could occur again.
1912. Terrorists may use a number of alternatives to attack a target rather than use
direct violence. For example, terrorist groups are becoming increasingly computer
literate and are not only using computers for communications, propaganda and the
gathering of targeting information, but there is the possibility of them being used to
carry out harassment or attacks against the government infrastructure. There is also a
steady increase in the number of Westerners who are being kidnapped; however it is
difficult to distinguish whether this is for terrorist or criminal motives.
1914. The threat from terrorism is volatile and it would not be practicable to list
here the countries where there is a particular threat since the list would quickly
become out of date. Travellers should consult the MOD Monthly Threat Assessment
(see para 1917) for the terrorist threat and check FCO Travel Advice about civil
disorder and other matters (see para 1918).
Guidelines
1915. General guidelines for security against terrorism when travelling can be
found in Volume 1 Chapter 7 Annex O.
Responsibility of Individuals
1916. Service personnel and MOD Civilians must comply with the special
regulations for travel to certain countries (see paras 1903-1906). Service personnel
must also comply with any single Service instructions on travel. Otherwise there is
no requirement for staff to seek security permission to travel to any country,
including those at Annex A, and normally no formal briefing or debriefing will be
necessary. However, if anything of security concern arises while the traveller is in
any foreign country, he must report as soon as possible after returning the full
circumstances to his ESyO.
19-5
RESTRICTED
RESTRICTED
Defence Manual of Security
through ESyOs, who have access to the Monthly Threat Assessment signal issued by
the MOD, which is also available on the MODWeb.
1918. The FCO Travel Advice Unit also provides advice to travellers on threats
from terrorism and civil disorder, and on health, travel regulations, and other matters.
This advice can be obtained from:
a. The appropriate ESyO
b. BBC 2 Ceefax, page 470 onwards
c. The FCO Travel Advice Unit, London
Tel: 0207-238-4503/4
Fax: 0207-238-4545
d. Internet: http://www.fco.gov.uk/travel/default.asp
19-6
RESTRICTED
RESTRICTED
Security Advice on Travel
ANNEX A
COUNTRIES IN WHICH THERE IS A HIGH SECURITY
THREAT TO MOD VISITORS FROM FOREIGN
INTELLIGENCE SERVICES
Armenia Azerbaijan
Bosnia-Herzegovina Georgia
Iran Iraq
Kazakhstan Latvia
Libya Lithuania
Note. Amendments to this list will be notified periodically by D Def Sy, usually in
a DCI(Gen).
19A-1
RESTRICTED
RESTRICTED
Defence Manual of Security
19A-2
RESTRICTED
RESTRICTED
Notification of Security Clearances for Transfers, Detached Duty and Exchanges
20-1
RESTRICTED
RESTRICTED
Defence Manual of Security
20-2
RESTRICTED
RESTRICTED
Notification of Security Clearances for Transfers, Detached Duty and Exchanges
CHAPTER 20
NOTIFICATION OF SECURITY CLEARANCES FOR
TRANSFERS, DETACHED DUTY AND EXCHANGES
Introduction
2001. This chapter deals with the notification of security clearances for MOD
personnel involved in both internal and external transfers. Many of the internal
notification procedures are heavily dependent on single-Service administrative
methods which are exclusive to each area. The scope of this chapter, therefore,
provides only the broad, departmental requirements which will have to be amplified
in other orders and instructions. The overall provision, which must apply to this
area, is that without the requisite level of assurance of probable reliability (Basic
Check) or security clearance no access to sensitive information or assets is to be
allowed.
2003. In all cases, the receiving organisation has the right to examine the security
papers relating to an individual before accepting him on transfer or loan. If the
individual requires Developed Vetting (DV) clearance, the relevant papers must be
examined before the transfer or loan takes place. If the transferee does not have
appropriate clearance, it is the responsibility of the receiving department to ensure
that the correct level of clearance is obtained. This should be achieved before the
transfer takes place. However, where this is not possible, the subject can be accepted
at the discretion of the Head of Establishment.
RESTRICTED
RESTRICTED
Defence Manual of Security
2005. If the supplying department has, in its records, information supplied by the
Security Service, such information is not to be passed to a receiving department
outside the MOD without prior reference to the Security Service.
2007. Certificates are to be sent to the single Service element (where one exists) of
the formation or unit concerned or to the receiving NATO agency, before the arrival
of the subject. NATO security clearances are not required for personnel filling
national appointments who have access to NATO SECRET or COSMIC TOP
SECRET material, provided that the appropriate national level of security clearance
is in issue.
clearance and that the level is properly notified to the receiving PSyA well before the
movement takes place. Certification is to be made as appropriate (see para 2006).
20-4
RESTRICTED
RESTRICTED
Notification of Security Clearances for Transfers, Detached Duty and Exchanges
e. Non-industrial civil servants working in the MOD and for the RN,
RM and RAF.
2013. Should there be any aftercare elements associated with the clearance in issue,
the parent vetting authority is to consider the need for onward briefing to the
receiving area.
20-5
RESTRICTED
RESTRICTED
Defence Manual of Security
2017. In the absence of any form of MOD authority, no access to sensitive assets or
information is to be given to foreign nationals. Similarly, even if such exchange of
information is authorised, it is not to proceed without suitable assurances of security
clearance.
b. There must not have been more than one year between leaving one
organisation and joining another.
c. The individual must not have resided overseas for more than six
months in that year.
20-6
RESTRICTED
RESTRICTED
Notification of Security Clearances for Transfers, Detached Duty and Exchanges
ANNEX A
NATO UNCLASSIFIED
____________________________________________________________________
1. Full name………………………………………………………………………………………………………………
……………………………………………………………………………………………………………………………………….
Signed:…………………………………….Rank/Grade:……………………………………..
Title:……………………………………….Date:………………………………………………
NATO UNCLASSIFIED
------------------------------------------------------------------------------------------------------
Notes:
(If ‘ATOMAL’ clearance is shown, the classification is to be qualified by the words ‘SUBJECT TO INDOCTRINATION’).
2. Expiry Date: the date of expiry for this certificate is NOT to be later than 5 years after the date of issue of
EITHER the subject’s
4. Despatch of Certificate. Detach this tear-off slip (notes 1 to 4) prior to the despatch of the certificate.
20A-1
RESTRICTED
RESTRICTED
Defence Manual of Security
20A-2
RESTRICTED
RESTRICTED
Notification of Security Clearances for Transfers, Detached Duty and Exchanges
ANNEX B
Surname and
forenames:………………………………………………………………………
……………………………………………………………………………………….
in conformity with current WEU regulations and may receive classified information
up to and including:
…………………………………………………………………………………………
…………………………………………………………………………………………
Signed:………………………………………………
Rank/Grade…………………………………………
Date:…………………………………………………
20B-1
RESTRICTED
RESTRICTED
Defence Manual of Security
20B-2
RESTRICTED
RESTRICTED
Notification of Security Clearances for Transfers, Detached Duty and Exchanges
ANNEX C
POSTINGS: POTENTIAL CONFLICTS OF INTEREST
WHILE ON MILITARY OPERATIONS OUTSIDE THE
UK
Introduction
1. In any developing crisis involving operations outside the UK, personnel with
the ability to speak the local language(s) and provide local knowledge will invariably
be at a premium and be required at short notice. Those best able to meet this remit
and to fill key operational posts will often be those with parental or other ties in the
country(ies) concerned. This may give rise to potential conflicts of interest which
cannot be investigated through the normal security vetting process. Frequently, there
will be insufficient time to complete the full DV procedure, even where this is
justified, before the individual has to deploy. There may be a risk, therefore, that
some individuals in key positions with particular attributes may become liable to
pressure once deployed.
Aim
2. To ensure that individuals in the categories outlined in above are properly
briefed and debriefed when posted to key appointments on overseas operations in a
time of crisis.
Executive Action
3. At the outset of certain (eg. peacekeeping) operations outside the UK, all
subordinate commanders are requested to ensure that the following actions are
carried out:
a. Pre-Deployment
b. Post-Deployment
(1) The debriefing of all those briefed (vide para 2012 a.(2)).
20C-1
RESTRICTED
RESTRICTED
Defence Manual of Security
Responsiblities
4. Responsibilities are allocated as follows:
Promulgation
5. These instructions should be brought to the attention of relevant staffs at
regular intervals and implemented whenever sensitive operations outside the UK are
mounted.
20C-2
RESTRICTED
RESTRICTED
Security Directions for Countries to which Special Security Regulations Apply
(CSSRA)
Aim 2103
21-1
RESTRICTED
RESTRICTED
Defence Manual of Security
21-2
RESTRICTED
RESTRICTED
Security Directions for Countries to which Special Security Regulations Apply
(CSSRA)
CHAPTER 21
SECURITY DIRECTIONS FOR COUNTRIES TO
WHICH SPECIAL SECURITY REGULATIONS APPLY
(CSSRA)
Introduction
2101. In recent years, Arms Control Inspections, the NATO steered Partnership for
Peace (PfP), OUTREACH and other confidence building programmes have
significantly increased contacts with foreign nationals. Such contacts have the
potential for giving rise to serious security concerns and require special security
measures and awareness, particularly if the contact involves nationals of a country
which has not yet reformed its political system.
The Threat
2102. Service personnel and MOD civilians, regardless of their rank, grade and
level of security clearance, are of potential interest to many Foreign Intelligence
Services (FISs). Included on the agenda of most FISs is the assimilation of
scientific, defence and technological information as well as biographical information
on individuals for possible exploitation at a later date. It is naïve to assume that
friendly countries would not be interested in such information as there is fierce
competition between rival defence contractors because national and financial stakes
are so high. FISs may recruit agents who are nationals of a third country or they may
deploy their own staff posing as nationals of a third country. Clearly, there is a need
to exercise due caution when dealing with any foreign national and for a strict
general application of the ‘need to know’ principle. Annex D lists FIS methods of
entrapment etc.
Aim
2103. The aim of this chapter is to provide guidance on the security measures to be
taken by all who have contact with nationals of CSSRAs during official or private
travel to such countries or when using their airlines, overland transport or shipping
companies.
RESTRICTED
RESTRICTED
Defence Manual of Security
promulgated by their host Service, which itself has a duty to keep the parent PSyA
informed about travel approved for their attached personnel.
2105. These directions do not apply to Service personnel taking part in overseas
deployments or to organisations managed by a defence contractor. Exceptionally,
pre-notification of visits is not a requirement for staff involved with Arms Control
activities but compliance with all other security rules is mandatory. Security
controllers concerned about the special threat posed by foreign countries to the
Government assets that they hold should obtain advice from the contracting
authority.
CSSRA
2106. In this chapter countries in which foreign intelligence services pose a
particular threat to UK interests are termed Countries to which Special Security
Regulations Apply (CSSRA). A list of such countries is at Annex A and also
appears in Defence Council Instructions (General). This list is updated from time to
time. In drawing up this list, no account is taken of the danger posed by local
terrorist groups or of the degree of civil unrest which may be encountered in the
countries concerned. Threats of this nature can change very quickly and our source
of protective security information is the Foreign & Commonwealth Office Foreign
Travel Unit in London.
“It has long been the practice for government departments and agencies to advise
employees of the problems that they may encounter when travelling overseas. This
is for the protection of both government assets and the employees themselves.
Departmental advice is based on central guidelines which are kept under regular
review, but it is for each department or agency, having regard to the nature of its
work, to decide whether restrictions should be imposed in relation to any particular
country or category of employees.”
21-4
RESTRICTED
RESTRICTED
Security Directions for Countries to which Special Security Regulations Apply
(CSSRA)
Note: DLO staff in the first instance contact their unit security officer.
Foreign Contacts
Contacts made in the UK
2109. Chapter 22 deals with the security measures that cover personal contacts
established during visits, both official and when on leave, by all foreign nationals to
the UK and to MOD bases overseas.
b. Briefing individuals about the threat to their security which may result
from a future encounter and an emphasis on the need to safeguard
protectively marked information, particularly that of high level.
d. Recording, centrally, that the contact has taken place along with any
significant intelligence or security information which becomes apparent.
Reporting Contacts
2111. Any incident or circumstance that gives rise to security suspicion about a
foreign contact is to be reported without delay to the ESyO for investigation by the
appropriate authority. Such investigation may result from any significant
21-5
RESTRICTED
RESTRICTED
Defence Manual of Security
2113. Any significant contact with nationals of a CSSRA, while abroad on a duty or
private visit as an individual, or with a group, is to be reported to the nominated SyO
of the official group, or to the ESyO of the parent unit on return to UK or base
overseas. If the ESyO deems the contact to have been significant or suspicious he is
to report the facts to the security point of contact without delay. The security point
of contact is to arrange all appropriate follow-up action.
RESTRICTED
RESTRICTED
Security Directions for Countries to which Special Security Regulations Apply
(CSSRA)
d. Internet: http://www.fco.gov.uk/travel/default.asp
2116. A check should also be made with the travel agent or with the Embassy of the
country concerned about entry visa requirements. Medical and inoculation advice can
be obtained from a GP. Before travel arrangements are paid for the permission of the
appropriate security point of contact should be sought for the journey to be
undertaken, in the light of duties on which the subject is, or has been engaged. See
also para 2117, where the sub-paras explain the requirement to inform, or to obtain
permission from, the security point of contact before travel arrangements are made.
STRAP inducted personnel should also refer to JSP 440 Volume 5 Chapter 4 Annex
E paras 26 to 28.
a. All personnel due to make an outward visit to any of the CSSRA are
to inform their ESyO. This should be done at the earliest opportunity and,
normally not later than fourteen working days in advance of the visit. The
ESyO will then notify the security point of contact at once and preferably by
fax. The proforma at Annex C may be adapted by Sectors to suit their
specific needs. The security point of contact will normally respond to such
requests by phone or in writing with five working days.
21-7
RESTRICTED
RESTRICTED
Defence Manual of Security
Note: There are no restrictions additional to those in para 2116b for SAO,
STRAP 1 and STRAP 2 inducted personnel. Other intelligence
compartments may have additional travel restrictions; compliance with these
is the responsibility of the individual and of the relevant compartment
controller.
International Appointments
2118. As well as forwarding full details about their intention to travel to a CSSRA,
Service personnel and MOD civil servants serving in international appointments (eg.
NATO, UN and European Union etc) are to consult their local UK National Security
Authority for advice. They are then to comply with these instructions as modified by
any international regulations that may apply.
21-8
RESTRICTED
RESTRICTED
Security Directions for Countries to which Special Security Regulations Apply
(CSSRA)
Debriefing
2119. All personnel who have travelled to any of the CSSRA are to be debriefed by
their ESyO or other body nominated by their Command on their return, as follows:
Travel to the People’s Republic of China (PRC) but NOT the Special
Administrative Region (SAR) of Hong Kong
2120. In addition to the reporting requirement described at para 2114, clearance for
travel to the PRC including Macao but excluding the SAR of Hong Kong, is required
from MOD Sec(O)2 for:
2121. Annex F contains advice based on the Security Service pamphlet Security
Advice for Visits to China, and Annex G contains advice from the Security Service
pamphlet Security Advice for Visits to Russia and the former Soviet Republics.
21-9
RESTRICTED
RESTRICTED
Defence Manual of Security
21-10
RESTRICTED
RESTRICTED
Security Directions for Countries to which Special Security Regulations Apply
(CSSRA)
ANNEX A
COUNTRIES TO WHICH SPECIAL SECURITY
REGULATIONS APPLY (CSSRA)
Belarus
China – Note 1
Russia
Ukraine
Notes:
1. Includes Tibet, Macao and the Special Administrative Region (SAR) of Hong
Kong.
21A-1
RESTRICTED
RESTRICTED
Defence Manual of Security
21A-2
RESTRICTED
RESTRICTED
Security Directions for Countries to which Special Security Regulations Apply
(CSSRA)
ANNEX B
THE PRINCIPAL CIRCUMSTANCES IN WHICH
CONTACTS ARE MADE BY FOREIGN
INTELLIGENCE SERVICES FOR INTELLIGENCE
PURPOSES
b. Visits to CSSRA.
21B-1
RESTRICTED
RESTRICTED
Defence Manual of Security
21B-2
RESTRICTED
RESTRICTED
Security Directions for Countries to which Special Security Regulations Apply
(CSSRA)
ANNEX C
f. Have you any relatives resident or employed in the country(ies) you propose
to visit? If so, give details:
h. In connection with your proposed visit are you aware of any other matters
which may present a security concern?
Signature: Date:
21C-1
RESTRICTED
RESTRICTED
Defence Manual of Security
Signature:…………………………………………………..
Date:…………………………………………………………
ESTABLISHMENT/UNIT/SHIP:…………………………………………………..
21C-2
RESTRICTED
RESTRICTED
Security Directions for Countries to which Special Security Regulations Apply
(CSSRA)
ANNEX D
METHODS OF INTELLIGENCE ENTRAPMENT AND
DEFENSIVE MEASURES
The Targeting of Visitors by Intelligence Services
1. The methods of intelligence entrapment described in the following
paragraphs are of particular importance with regard to the CSSRA listed at Annex A.
2. All MOD Service and civilian personnel (regardless of the degree of security
clearance which they may hold) should be aware that they may become objects of
interest to the intelligence service of any country listed in Annex A from the time
that they file their visa application with the consulate of the country concerned.
Entrapment Ploys
5. Because of the control which the local intelligence service may achieve as a
result of the methods described above, visitors must take special care not to break
local laws. They must conduct themselves in such a way as not to lay themselves
open to blackmail or pressure. Visitors must realise that in these countries the legal
authorities work closely with the intelligence service. “Ploys” which may be used to
trap the unwary are described below.
21D-1
RESTRICTED
RESTRICTED
Defence Manual of Security
Sexual Involvement
7. Intelligence services use the threat of exposure, following sexual involvement
with a local, in order to blackmail visitors into working for them. The intelligence
services may “arrange” the liaison itself, or may exploit a spontaneous liaison.
Visitors should be wary of entering into any friendship which might attract the
attention of the local intelligence service. Homosexual acts which are legal in the
UK may be contrary to local laws.
Currency Transactions
8. It is dangerous for a visitor to get involved in illegal currency deals.
Apparently highly advantageous offers to change the local currency for Western
currency are probably illegal and may be arranged by the local intelligence service.
Intending visitors are advised to obtain the latest information on currency regulations
from a reputable travel agent, bank or state tourist office of the country concerned
before leaving the UK. These regulations are likely to change and fresh enquiries
should be made before each visit.
Blackmarket Goods
9. Local laws may forbid the sale or purchase of certain goods and deals of this
kind may be exploited by the local intelligence service. Visitors should not be
tempted into deals involving the sale of any consumer goods which they have
brought with them. Antiques and religious objects may be subject to stringent local
laws on export and visitors must ensure that they have the correct permit before
attempting to take these out of the country.
these items could lead to prosecution and subsequent pressure to co-operate with the
local intelligence service.
RESTRICTED
RESTRICTED
Security Directions for Countries to which Special Security Regulations Apply
(CSSRA)
when travelling to the country concerned. The local intelligence service may put
pressure on the visitor through their family. Persons in this category will be of
special interest to the local intelligence service and, even if the partner of an official
has obtained British nationality, he or she must realise that in the country concerned
they may no longer be under the protection of the UK as the country may not
acknowledge any change of nationality. Holders of dual nationality will be in a
similar position.
Photography
12. Unthinking use of a camera can lead to misunderstanding. The taking of
photographs and video films should be restricted to places which are normal tourist
attractions. Local sensitivities may be offended by taking photographs and films of
poor or less developed areas. The taking of such photographs, or of photographs
near military installations or prohibited areas could lead to accusations of
involvement in espionage and exploitation by the local intelligence service. When in
doubt about taking a photograph visitors should ask first.
Defensive Measures
13. Visitors may be exposed to security dangers if they are detained by the local
authorities as a result of failing to avoid any of the pitfalls outlined above or as a
result of infringing any local law or traffic regulation. A person thus involved may
be approached by the local militia or the local intelligence service which might seek
to extract a promise of co-operation with the authorities in exchange for an
undertaking that no charges will be preferred. Such undertakings should not be
given if they can be avoided. Legal documents admitting to wrongdoing or to a
misdemeanour should not be signed unless under an intolerable stress or on the
advice of an official from a British mission. A visitor must report the situation as
fully as possible to the local UK consulate at the earliest possible opportunity. On
return to the UK, the visitor must make a full report, in writing, of the incident in
question to their security point to contact. A full and honest report, even if to the
detriment of the visitor, will neutralise the possibility of blackmail.
21D-3
RESTRICTED
RESTRICTED
Defence Manual of Security
21D-4
RESTRICTED
RESTRICTED
Security Directions for Countries to which Special Security Regulations Apply
(CSSRA)
ANNEX E
FORM OF REPORT FOR SIGNIFICANT CONTACTS
MADE WITH NATIONALS OF COUNTRIES TO
WHICH SPECIAL SECURITY REGULATIONS APPLY
(CSSRA)
a. General information:
RESTRICTED
RESTRICTED
Defence Manual of Security
21E-2
RESTRICTED
RESTRICTED
Security Directions for Countries to which Special Security Regulations Apply
(CSSRA)
ANNEX F
TRAVEL BRIEF FOR VISITORS TO CHINA
Introduction
1. China is now one of the world’s fastest growing economies. And, despite the
difficulties of working there, many foreign companies are eager to join the increasing
number of those who are investing their time, money and effort in establishing links
with China.
2. The purpose of this brief is not to discourage the development of trade, nor to
warn against the financial and legal pitfalls of working in China which, incidentally,
are many! This brief gives advice about Chinese intelligence activity and how you
can guard against the risks it might pose to you when visiting China.
4. The Chinese have realised that it is not productive to simply steal technology
and then try to ‘reverse engineer it’. Through intelligence activity they now attempt
to acquire an in-depth understanding of production techniques and methodologies.
There is an obvious economic risk to the UK. Our hard earned processes at very little
cost and then reproduce them with cheap labour.
5. It is also, potentially, more serious than the above. In certain key military
areas China is at least a generation behind the West. The Chinese may be able to
acquire illegally the technology that will enable them to catch up. The real danger is
that they will then produce advanced weapons systems which they will sell to
unstable regimes. They have a track record of doing so. The consequences for the
world’s trouble spots and any UK involvement there could be disastrous.
21F-1
RESTRICTED
RESTRICTED
Defence Manual of Security
scientific and technical field, is vast and indiscriminate. They do not ‘run agents’ –
they ‘make friends’. Although there are Chinese ‘intelligence officers’, both civilian
and military, these fade into insignificance behind the mass of ordinary students,
businessmen and locally employed staff who are working (at least part-time) on the
orders of various parts of the State intelligence gathering apparatus.
Cultivation
7. The process of being cultivated as a ‘friend of China’ (ie. an ‘agent’) is subtle
and long-term. The Chinese are adept at exploiting a visitor’s interest in, and
appreciation of, Chinese history and culture. They are expert flatterers and are well
aware of the ‘softening’ effect of food and alcohol. Under cover of consultation or
lecturing, a visitor may be given favours, advantageous economic conditions or
commercial opportunities. In return they will be expected to give information or
access to material. Or, at the very least, to speak out on China’s behalf (becoming an
‘agent of influence’).
Technical Attacks
9. The Chinese intelligence services are known to employ telephone and
electronic ‘bugs’ in hotels and restaurants. They have also been known to search
hotel rooms and to use surveillance techniques against visitors of particular interest.
Compromise
10. The Chinese intelligence services have been known to use blackmail to
persuade visitors to work for them. Sexual involvement should be avoided, as should
any activity which can possible be construed as illegal. This would include dealing
in blackmarket currency or Chinese antiques and artefacts, straying into ‘forbidden’
areas or injudicious use of a camera or video recorder.
RESTRICTED
RESTRICTED
Security Directions for Countries to which Special Security Regulations Apply
(CSSRA)
12. Common sense will tell you to be careful in your dealings so that you do not
give away more than you mean to, or find yourself in a position where you will feel
obliged to do more for the Chinese than you know you ought. Careful use of the
telephone and postal system will prevent you from giving away free information. By
avoiding indiscreet and injudicious behaviour you will prevent yourself from being
compromised. If the worst case happens, and you are arrested and charged, or if you
have been caught in an embarrassing situation you should always insist on being
immediately allowed to contact the British Embassy immediately.
21F-3
RESTRICTED
RESTRICTED
Defence Manual of Security
21F-4
RESTRICTED
RESTRICTED
Security Directions for Countries to which Special Security Regulations Apply
(CSSRA)
ANNEX G
TRAVEL BRIEF FOR VISITS TO RUSSIA AND THE
FORMER SOVIET REPUBLICS
21G-1
RESTRICTED
RESTRICTED
Methods of Compromise
5. Careful behaviour should be sufficient to avoid difficulties with the FSB, but
visitors should bear in mind that they can get into trouble in many ways. Unofficial
financial transactions, such as obtaining local currency at favourable rates or selling
personal possessions to acquaintances, are all in contravention of local laws. A
Russian friend or acquaintance may ask a visitor to deliver a letter or a present to
some relative living in the West, but this is again in breach of local regulations.
Taking works of art out of Russia is a serious offence, while drink-driving
regulations are rigorous. There are strict rules about taking photographs in Russia
and it is advisable to find out in advance where cameras may be used.
6. Irregularity in personal behaviour may also lead to trouble. The FSB may
attempt to capitalise on sexual liaisons between visitors and local nationals. In
addition, the FSB may attempt to compromise and subsequently blackmail through
knowledge of marital infidelity or sexual activity the target may wish to hide.
Risk of Arrest
7. A visitor who commits any offence against local laws runs the risk of being
arrested and threatened with the withdrawal of business facilities, imprisonment or
exposure unless he or she agrees to work for the FSB. Attempts may be made to
induce the victim to sign a confession or to agree to cooperate. Alternatively, the
evidence may be stored away for use at a later date, perhaps when their
circumstances have changed (for example, after the visitor has married, or entered a
different field of employment).
21G-2
RESTRICTED
RESTRICTED
Security Directions for Countries to which Special Security Regulations Apply
(CSSRA)
8. Visitors may face any of these hazards whenever they visit Russia but the
FSB is especially active during Trade Fairs. At these times particular care should be
taken.
Final Point
11. Visitors to any foreign country should remember that it is in their own
interests to tell the British authorities abroad (the Embassy, High Commission or
Consulate) or the Police at home if they have been in trouble, or if they suspect that a
foreign intelligence service is interested in them. Anything they say will be treated
as strictly confidential and advice on how to avoid any further difficulties will be
offered.
21G-3
RESTRICTED
RESTRICTED
21G-4
RESTRICTED
RESTRICTED
Incoming Visits by all Foreign Nationals
Introduction 2201
Aim 2203
22-1
RESTRICTED
RESTRICTED
Defence Manual of Security
22-2
RESTRICTED
RESTRICTED
Incoming Visits by all Foreign Nationals
CHAPTER 22
SECURITY DIRECTIONS FOR INCOMING VISITS BY
ALL FOREIGN NATIONALS
Introduction
2201. In recent years Arms Controls Inspections, the NATO steered Partnership for
Peace (PfP), the UK initiative on OUTREACH and other confidence building
programmes have significantly increased contacts with foreign nationals. Such
contacts have given rise to serious concerns about security and have stimulated the
measures outlined in this chapter to safeguard our protectively marked information
and the security integrity of the individual.
Aim
2203. The aim of these directions is to outline the security procedures covering
incoming visits by all foreign nationals (including those from CSSRAs).
2205. Spare.
2206. The term ‘visitor’ in these instructions means any person who is not a British
national and is not a person described in para 2207.
22-3
RESTRICTED
RESTRICTED
Defence Manual of Security
2207. These directions are not applicable to the following foreign nationals:
Sponsor
2208. This term ‘sponsor’ is used to describe the MOD or other Service authority
which endorses the requirement for each visit by a foreign national.
22-4
RESTRICTED
RESTRICTED
Incoming Visits by all Foreign Nationals
2212. The sponsor is to provide the relevant security point of contact with the
names of the prospective visitors, dates of birth, current employment, place to be
visited, the date and purpose of the visit. This information is to be supplied as soon
as it becomes available. The security point of contact will then arrange for checks to
be carried out with the aim of establishing if there is any evidence to suggest that
there is any FIS involvement in the visit. Following authorization for the visit to take
place, the sponsor is to arrange for the respective security staff to draw up a relevant
security plan. It should cover:
22-5
RESTRICTED
RESTRICTED
Defence Manual of Security
2216. Applications for visits by foreign nationals not on accreditation lists are
covered at para 2219. Exceptions are detailed at paras 2223 and 2229 and are only
permitted where separate security arrangements apply to the visit.
Accredited Officials
2218. Certain officials of the London based Defence staffs of Australia, Canada,
New Zealand and the United States of America are designated “accredited officials”.
This means that they are included on an accreditation list authorising their entry to
specified MOD establishments. Details are held by D Def Sy, the International Visit
Control Office (IVCO) and Lead Commands.
RESTRICTED
RESTRICTED
Incoming Visits by all Foreign Nationals
that official requests for visits where access to sites or to material is only
required at RESTRICTED level or below are not required. In such
circumstances compliance with local security regulations, such as the need to
provide escorts, must not be neglected.
2220. For visits to Service sites, the sponsor of the foreign visitors should apply
directly to the respective PSyA. The criteria governing access to such site is as
stated in para 2219. See also para 2223.
22-7
RESTRICTED
RESTRICTED
Defence Manual of Security
Command, details should be passed to Command HQ who will ask the relevant
Embassy or High Commission (countries list at Annex B) to submit a formal
application for security clearance of the visit. Separate action will be taken in the
case of other countries (see para 2220).
Attaches who make direct approaches for visits or courses should be referred to the
White Book.
RESTRICTED
RESTRICTED
Incoming Visits by all Foreign Nationals
security access allowed. This is to be done in sufficient time for the necessary
consultation to take place with all interested parties prior to visit approval being
given.
2230. For the Central TLB, IVCO will not always receive security details of VIP
visitors. It is the responsibility of the host to escort all such visitors at all times and
to inform the site PSyA of full names and details of visitors together with the
intended date of their proposed visit.
2231. Unsolicited foreign visitors will also not have submitted security clearance
details through the visits procedure. This being so, the host will be responsible for
informing the site PSyA of the visit at the earliest opportunity and for escorting them
at all times.
Employment of Au-pairs
2233. Service and MOD employed civilian staff are to request approval, for reasons
of security, before employing CSSRA nationals as au-pairs. All such applications
are to be submitted to the ESyO for onward transmission to the appropriate PSyA. A
completed security questionnaire (MOD Form 1109) should, ideally, accompany
each application. Applications covering foreign nationals from CSSRAs (listed in
Chapter 21, Annex A) may not be approved.
RESTRICTED
RESTRICTED
Defence Manual of Security
instance, contact D Def Sy(S&T). Direct approaches should not be made to foreign
arms manufacturers and dealers without the permission of the relevant PSyA.
22-10
RESTRICTED
RESTRICTED
Incoming Visits by all Foreign Nationals
ANNEX A
SECURITY INSTRUCTIONS FOR OUTREACH AND
PARTNERSHIP FOR PEACE
Introduction
1. It is essential that all units take proper security action when engaged in the
above activities. OUTREACH is HMG’s bilateral assistance programme to nearly
all countries in central and eastern Europe and a number of Former Soviet Union
(FSU) countries. PfP is an assistance programme led and coordinated by NATO. A
list of countries covered by OUTREACH is at Appendix 1. The directorate for
Central and Eastern Europe (DCEE) and the Directorate of North Atlantic & Western
Europe (DNAWE) are responsible respectively for OUTREACH and PfP. Both have
agreed that these instructions should be used as a security guide by all Service units
or individuals who become involved in such activities, visits or exercises whether
required to act as hosts or visitors.
2. All visit sponsors have an obligation to consult the relevant security point of
contact about pending visits into the latter’s area of concern. The obligation for
reporting travel or contact is on individuals except where an official group is
concerned in which case a nominated person of the unit or HQ branch involved
should act on behalf of individuals in making and keeping contact with his local
security section. Overall, the aim is to achieve security but minimise red tape while
keeping a record of contacts, names and unusual occurrences.
Security Concerns
3. The principal concern is to protect individuals from the continuing hostile
intelligence and long term recruiting activities by Russia and agents in other
CEE/FSU countries still linked to GRU, the Russian military intelligence service or
SVR, the State intelligence service previously known as the KGB. A further concern
is the protection of information particularly that relating to scientific or technical
matters and equipment. There is also a need to record centrally, for counter
intelligence purposes, contacts made and information obtained.
22A-1
RESTRICTED
RESTRICTED
Defence Manual of Security
22A-2
RESTRICTED
RESTRICTED
Incoming Visits by all Foreign Nationals
APPENDIX 1 TO ANNEX A
OUTREACH COUNTRIES AND ASSOCIATED AREAS
OF UK ACTIVITY
OUTREACH Countries
Albania Latvia
Armenia Lithuania
Azerbaijan Moldova
Belarus Romania
Bulgaria Slovakia
Croatia Slovenia
Estonia Tajikistan
Georgia Ukraine
Kazakhstan Uzbekistan
Areas of UK Activity
Defence management reform
In-country advisers
22A1-1
RESTRICTED
RESTRICTED
Defence Manual of Security
Russian resettlement
UK training opportunities
22A1-2
RESTRICTED
RESTRICTED
Incoming Visits by all Foreign Nationals
APPENDIX 2 TO ANNEX A
SECURITY BRIEF FOR UNIT PERSONNEL INVOLVED
IN OUTREACH VISITS OR PFP TRAINING
(The following details may be adapted by Commands to suit their
particular purpose)
Introduction
1. This brief is necessary due to your pending visit to, from or contact with,
Russians, nationals of the FSU or former Eastern Bloc countries. You need to be
aware of the potential dangers that may result from your exposure to the attentions of
their intelligence agencies. This brief outlines what is required of you with regard to
your personal security and conduct.
4. Personal security and conduct. The following rules, properly heeded, will
help to protect you and your colleagues from any potentially embarrassing and/or
compromising situations that may arise:
22A2-1
RESTRICTED
RESTRICTED
Defence Manual of Security
b. Exchange of gifts. Do not give or accept any gift unless it forms part
of an official arrangement or is of a trivial nature.
22A2-2
RESTRICTED
RESTRICTED
Incoming Visits by all Foreign Nationals
ANNEX B
APPLICATIONS FOR INWARD VISITS BY OVERSEAS
NATIONALS
Indonesia Philippines
* Special arrangements exist for visit requests from Singapore to be passed via the
British High Commission.
22B-1
RESTRICTED
RESTRICTED
Defence Manual of Security
22B-2
RESTRICTED
RESTRICTED
Incoming Visits by all Foreign Nationals
ANNEX C
LIST OF NATO COUNTRIES
Belgium
Canada
Czech Republic
Denmark
France
Germany
Greece
Hungary
Iceland
Italy
Luxembourg
Netherlands
Norway
Poland
Portugal
Spain
Turkey
Note: There is a strong likelihood that a dispensation will be granted to other friendly
countries enabling them to undertake visits without making a formal application vide
para 2219 b. Such countries may include Australia, New Zealand and Sweden.
22C-1
RESTRICTED
RESTRICTED
Defence Manual of Security
22C-2
RESTRICTED
RESTRICTED
Security Directions for Visits Abroad on Duty or Official Business
Aim 2302
23-1
RESTRICTED
RESTRICTED
Defence Manual of Security
23-2
RESTRICTED
RESTRICTED
Security Directions for Visits Abroad on Duty or Official Business
CHAPTER 23
SECURITY DIRECTIONS FOR VISITS ABROAD ON
DUTY OR OFFICIAL BUSINESS
Introduction
2301. Though not directly related to personnel security, it is administratively
convenient to cover this subject adjacent to the other chapters on travel.
Aim
2302. The aim of these directions is to outline the security procedures covering
visits by UK staff abroad on duty or official business. Chapter 19 contains general
security advice on travel abroad.
RESTRICTED
RESTRICTED
Defence Manual of Security
behaviour, not draw undue attention to themselves and be on their guard to ensure
that protectively marked information does not fall into the wrong hands. Before
leaving the UK, staff must make themselves fully conversant with the security
regulations pertaining to their visit. The following rules, which also apply to
sponsored consultants and firms’ representatives, cover the protective security of
personnel travelling abroad on duty or business.
23-4
RESTRICTED
RESTRICTED
Security Directions for Visits Abroad on Duty or Official Business
NATO HQ Brussels
2309. When visiting NATO HQ Brussels, the following information should be
submitted to the appropriate single Service security staff, or to the IVCO for MOD
civilians:
Full name
Rank/Grade
Reason for visit (to include NATO committee member or title, eg. UK Del,
AC/102)
2310. Sector security authorities are responsible for sponsoring visits to NATO
HQs and sites by Australian and New Zealand integrated staff and may also be
required to issue NATO clearance certificates for other integrated personnel.
NATO HQ Passes
2311. Passes will normally be available for collection by the visitor at the Main
Gate to the HQ NATO compound on production of appropriate identification, eg.
passport or ID card. The issue of an annual pass can be arranged by the appropriate
PSyA staff on written request for those intending to visit frequently, eg 12 times a
year. A passport photograph must accompany the application. It is stressed that if an
application for an annual or temporary pass which is to state the official's security
clearance has not been processed by the UK Delegation to NATO, the visitor will not
be permitted to enter the NATO HQ. The individual’s security clearance must be
verified before entry. Contractors' employees and other non government personnel
not travelling as part of an official MOD party are required to submit visit requests to
the IVCO using standard IVCO proforma issued for that purpose. The issue of
annual passes can be arranged by the IVCO for such personnel, subject to the
provisions described above.
RESTRICTED
RESTRICTED
Defence Manual of Security
authorities in the UK. Delay in notifying the appropriate PSyA will cause difficulties
to all concerned, including the possible refusal of the visit by the host nation.
USA - 8 weeks
Canada- 6 weeks
Germany - 7 weeks
Spain - 6 weeks
France - 5 weeks
Italy - 4 weeks
Norway - 6 weeks
Netherlands - 4 weeks
NATO HQ - 2 weeks
Other Regulations
Countries to which Special Security Regulations Apply
2313. There are special rules for travel to a small number of countries where the
threat from foreign intelligence sevices is particularly high. These are known as
Countries to which Special Security Regulations Apply (CSSRA). See Chapter 21
for further information.
Ireland
2314. Guidance on travel to Northern Ireland and the Republic of Ireland is
published in Volume 1 Chapter 7 paras 07160 to 07205. This is complemented by
single Service travel rules and by special rules for travel to Northern Ireland and the
Republic of Ireland for Service personnel.
RESTRICTED
RESTRICTED
Security Directions for Visits Abroad on Duty or Official Business
will often require notification of pending visits to their country of accreditation are
able to provide detailed up to date advice. In cases of duty travel to high risk areas,
Security Authorities hold the MOD Overseas Terrorist Threat Assessment List
(OTTAL) and are able to arrange an intelligence briefing.
23-7
RESTRICTED
RESTRICTED
Defence Manual of Security
23-8
RESTRICTED
RESTRICTED
Index
INDEX
Access
provided by BC ………………………………………………………........ 0506
provided by CTC …………………………………………………………... 0607
to caveat material by dual nationals …………….…………………….... 0331
to STRAP material ……………………………………………………….... 0329
Accredited officials ……………………………………………………………….... 2218
Adult Instructors
Employment Vetting ………………………………………………………...0505
Aftercare …………..………………............................................ 0337, 1817
Aftercare Incident Report (AIR)...................................... 1818, 18-C
Definition of............................................................. Intro-4, 0337
Responsibilities of HOE …………………………………………………........... 1826
Aims of personnel security …………………………………………………..…… 0211
Alcohol abuse, possible signs of …………………………………………………. 18-A
Appeals, against adverse vetting decisions……………………………………... 1709
MOD Civil Servants …………………………………………………… 17-B
MOD contractors, holding SC or DV clearance …………………... 17-C
Service Personnel ……………………………………………………… 17-A
Appointments, dormant/dual reserve/war ……………………………………… 0926
Appropriate Principal Security Adviser ……………........... Intro-A, 2108, 2209, 2304
Arms control inspections …………………………………………………………. 2232
Au-Pairs, employment of ………………………………………………………… 2233
Authorities, principal for personnel security matters …………… Intro-A
Basic Check …………………………………………………………………...0306, 0501
Application of BC within the MOD ……………………………......... 0505
Contractors, responsibility for ……………………………………...... 1101
Covering letter for Reference Report Form ……………………….. 11-A
Existing non-vetted personnel ……………………………………….... 0508
Level of access ………………………………………………………….. 0506
Need for …………………………………………………………........... 0505
Progression to full security clearance ………………………........... 0513
Purpose ……………………………………………………................. 0502
Review, on change of personal circumstances....................... 0516
Reference Report Form ………………………………………………. 11-B
Validity …………………………………………………………............ 0515
Verification …………………………………………………………….... 0509
Verification of background and character …………………............ 0504
Verification of identity and nationality ………………………………. 0503
With NIS check ……………………………………………………….0511, 1120
Index - 1
RESTRICTED
RESTRICTED
Defence Manual of Security
Index - 2
RESTRICTED
RESTRICTED
Index
Index - 3
RESTRICTED
RESTRICTED
Defence Manual of Security
Index - 4
RESTRICTED
RESTRICTED
Index
Index - 5
RESTRICTED
RESTRICTED
Defence Manual of Security
Index - 6
RESTRICTED
RESTRICTED
Index
Index - 7
RESTRICTED
RESTRICTED
Defence Manual of Security
Index - 8
RESTRICTED
RESTRICTED
Index
Index - 9
RESTRICTED
RESTRICTED
Defence Manual of Security
Index - 10
RESTRICTED
RESTRICTED
CIS Security
VOLUME 3
Issue 2
MINISTRY OF DEFENCE
October 2001
RESTRICTED
RESTRICTED
CIS Security
RESTRICTED
UNCLASSIFIED
Contents
CONTENTS
Chapter
4. Media Management
(including documents and discs)
5. Hardware Security
6. Software Security
7. Malicious Software
(including Viruses)
8. Portable CIS
(including Laptops)
9. Deployable CIS
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
CHAPTER 1
Introduction
01001. This Chapter gives guidance on the security of Communications and Information
Systems (CIS) in use within Defence and lays down security standards.
01002. CIS Security seeks to protect the data held on CIS by addressing the following:
01003. CIS Security measures within the MOD are designed to address both malicious
attack and non-malicious failures and accidents as sources of compromise of
Confidentiality, Integrity, and Availability.
01004. Accountability for all aspects of security within MOD, including CIS, rests
formally with the Permanent Under Secretary of State (PUS), who has general
responsibility for assuring compliance with HMG security policies either directly, or
through the Departmental Security Officer (DSO), the Director General Security and
Safety (DGS&S).
Applicability
01005. The regulations laid down within this manual represent the MOD minimum
(“Baseline”) requirements for security of CIS. ‘Baseline’ in this context means that it is
expected that the document will be applied in all cases, unless there are strong,
documented, reasons for not doing so. These have mainly been derived from National
policy, interpreted to make them more applicable to MOD’s various operating
environments.
UNCLASSIFIED
UNCLASSIFIED
either in the terms of a bilateral / multilateral agreement (typically for material governed
by International Document Organisations (IDO) such as NATO), or as a condition of
release (for externally owned or internally compartmented material such as STRAP, as
detailed at Volume 5).
01007. If any other cases are identified where an apparent mismatch between the MOD
and National policy is identified, it should be assumed that the more stringent
requirement should be followed, but clarification should be sought from DDefSy.
01009. Within MOD, these standards are interpreted for the specific Defence
environment by this Manual, and may therefore attract a higher requirement than the
HMG baseline. Consequently the generic HMG documents should not normally be
required as reference documents, although some of the supporting guidance documents,
such as CESG Infosec Memoranda, may be directly used by MOD and are therefore
directly referenced within this manual.
01010. Should a specific requirement exist which is covered by the generic HMG
standards but not by this Manual, DDefSy must be consulted before proceeding.
01013. These regulations apply to all CIS owned and managed by MOD, to CIS owned
and managed under contract to, or on behalf of, MOD, and to privately owned and
contractor owned CIS when carried on MOD or service property, or being used for
UNCLASSIFIED
UNCLASSIFIED
Official purposes. This manual applies to all elements of the MOD and Defence
Agencies.
Exceptions
01014. This manual does not cover the standards for protection of the financial integrity
of data concerned with public and service funds and accounts, which is the
responsibility of other authorities and advice should be sought on such matters from the
appropriate finance branch.
01015. This chapter does not give guidance on the security requirement imposed by the
Data Protection Act. This is laid down in Joint Service Publication (JSP) 406 - Guidance
and Instructions Relating to the Data Protection Act 1984 and amended by the Data
Protection Act 1988. Guidance on all aspects of the Act can be obtained from the
Ministry of Defence Data Protection Office (MOD DPO) based at Minerva House. All
systems covered by the Act are to be registered with the MOD DPO together with any
claims for exemptions under the Act.
Principles
01016. A CIS is defined as an assembly of electronic communications and/or computer
hardware and software configured for the purpose of processing, storing or forwarding
information and whose security is the responsibility of a single management.
01017. All CIS that are to be used to process, store or forward Official Information are
to be approved by the DSO, through the appropriate security chain of command, to
confirm that their use does not present either an unacceptable risk to national security or
the operation of the Defence business.
01018. All security depends on a balance of measures to reduce the risk of compromise
to an acceptable level. These measures are a number of “facets of security”, which are :
- Physical
- Personnel
- Media
- Procedural
UNCLASSIFIED
UNCLASSIFIED
01020. Complexity is very much less for CIS with no external connections, and these,
generally referred to as Information Technology (IT) systems form the largest group of
systems within Defence.
01021. The early Chapters of this Manual constitute the Baseline needs of such stand
alone systems and single personal computers (PCs) with devices for exchanging data on
a batch basis and is for the guidance of personnel responsible for their security. The
term stand-alone encompasses desktop PCs and portable IT systems, with small
numbers of users.
01022. The physical, procedural and personnel measures set out here will apply, as
appropriate, to all CIS. More detailed guidance on complex and interconnected CIS is
to be found later in this manual.
01023. Risk Management The principle of Risk Management is used to adjudge the
Countermeasures required to counter the Threats and Vulnerabilities to a CIS, weighted
against an Asset Valuation:
b. For Availability and Integrity, the Asset Valuation is based upon the
importance of the CIS to both the unit/establishment mission, and for Defence as
a whole. This requires the assignment of the Criticality Level (CL) to the system
or service, as detailed at Annex A.
01024. When performing an asset valuation, it will be necessary to carry out a review of
the potential affects of data aggregation on the overall highest the Protective Marking,
and similarly of system interconnection on the overall CL of the system-of-systems.
Such aggregation should be used within to drive the Risk Assessments carried out, such
as those laid down in Chapter 6 and Chapter 14.
01025. Additionally, it is necessary to ascertain whether or not any of the data on the
systems is of a purely ephemeral nature, as this may give the Accreditors discretion to
reduce the security requirements below that which would normally be required for long
term data at the same protective marking level.
UNCLASSIFIED
UNCLASSIFIED
with a lifetime of less than 24 hours, or administrative information with a lifetime of less
than 1 week.
01027. An issued that can lead to a perceived Aggregation effect is the incorrect
application of protective markings to data items. Users are encouraged to review the
label, where applied, of any information at the time of its creation, to ensure that this is
indeed correct. This is especially important in cases, such as documents with default
protective markings embedded in headers and footers, where experience has shown that
for many System High systems the default High Water Mark (HWM) is seemingly
applied with little apparent regard to the information contain, resulting in either under,
or more frequently over, marking. This should be reflected in SyOPs where applicable.
Release of Information
01029. It is a fundamental tenet of Operations Security (OpSec), that nothing should be
revealed to unauthorised persons that could either be of interest to any enemy, or of
advantage to an attacker.
01032. The use of all Departmental CIS facilities is, and will continue to be, subject to
security monitoring. All material held on MOD CIS equipment is deemed to be the
property of the Department itself, and staff are reminded that, as a consequence, so-
called “private” information held on any Departmental CIS facility will not be afforded
any special protection and will be accessible to line management and investigating staff
without prior recourse.
Basic Requirements
01033. The protection of information is covered in some detail in other volumes of the
Defence Manual of Security. Annex C considers some of the implications, particularly
when information is held on IT systems. There are a number of requirements that must
UNCLASSIFIED
UNCLASSIFIED
be met before any CIS is allowed to handle official information. The main topics
highlighted below give a brief introduction to CIS security.
01034. Accreditation (Chapter 2). Before any CIS is allowed to store, process or
forward official information, it must be given security approval, known as
Accreditation, which is granted by the Defence Security Standards Organisation
(DSSO), PSyA Security Staffs or competent authority. Failure to obtain Accreditation
can result in confiscation of the affected CIS.
01035. For systems processing highly Protectively Marked material, or whose operation
is Critical to Defence interests, approval may include detailed examination of system
specific security requirements agreed between the System Operating Authorities (SOA)
and Security staff. Specific rules apply to categories of sensitive material or externally
sourced material, generically referred to as Compartmented Information, but often
referred to as Codeword material. In addition to the requirements for system and site
Accreditation from the designated Accreditor(s), approval is also required from the
Control or Release Authority before the material may be passed to or stored on the
system(s). These rules are covered in detail in Annex D.
01037. Registration (Chapter 3). All CIS, including those handling non-protectively
marked data, are to be registered. The registration form will give details of the system,
and for stand alone desktop PCs and laptop systems the registration document together
with the Security Operating Procedures (SyOPs) fulfils the role of the required SPD set.
01039. Disposal of CIS Equipment (Chapter 5). When CIS equipment and media
becomes surplus to requirement, all protectively marked material that has been
processed or stored on these items must not be expose to an unacceptable risk of
compromise during disposal.
01040. Illegal Software (Chapter 6). MOD cannot condone the illegal copying of
software for use on a MOD system. All civilian and military personnel making,
acquiring or using unauthorized copies of software expose themselves to internal
disciplinary action and possible criminal prosecution.
UNCLASSIFIED
UNCLASSIFIED
01041. Malicious Software (Chapter 7). All CIS must include in their SyOPs specific
instructions to counter the threat from computer viruses and other forms of malicious
software.
01042. Use of Portable Systems (Chapter 8). Personnel, who use portable systems,
including laptops, should be aware that additional security measures are required. These
cover the use, interconnection, transport and protection of the portable system.
01043. Deployable Systems (Chapter 9). CIS security on exercises and operations
must be appropriate for a range of threats and changes of physical environments. The
enforcement of CIS security countermeasures on exercises and operations requires
personnel with the appropriate engineering skills, authority, responsibility and training
01045. Incident Reporting (Chapter 11). All security incidents must be reported,
either up the security chain of command, or, for certain types of incident requiring
urgent action to nominated specialist reporting points.
01046. Compliance Checking (Chapter 12). In order to ensure that the security
measures agreed as part of the Accreditation are maintained, periodic Compliance
Checking is carried on behalf of the DSSO, PSyA Security Staffs or competent authority
issuing the Accreditation.
01047. Installation Control (Chapter 21). Installation Design Authorities (IDA) are
responsible for ensuring that systems are installed in such a manner to not compromise
either their own electromagnetic security or that of other systems in their vicinity.
01050. Telephone Security (Chapter 18). It must be noted that specific rules exist for
the use of (speech) Telephony within MOD, and in particular that there are significant
controls over the use of both Cordless and Portable (Mobile) telephones.
01051. Facsimile Security (Chapter 19). It must be noted that specific rules exist for
the use of both Image and Data Facsimile within MOD.
UNCLASSIFIED
UNCLASSIFIED
The Threat
01052. The origins and nature of the threats to official information processed
electronically are similar, but not identical, to those to protectively marked information
stored and handled in other forms.
01053. An Annual Threat Assessment (ATA) is issued to all Government Departments
giving generic statements as to the main sources of Threat. This will include personnel
who may be from or influenced by Foreign Intelligence Services (FIS), authorized users
who, for whatever motive, may seek to gain access to official information they have no
'need to know', subversive or terrorist organizations, and investigative journalists.
01054. This ATA however is predicated upon a non-military and UK mainland view of
the Threat, and consequently does not take into account the varying environments in
which the MOD has to operate. MOD’s Joint Security Coordination Centre (JSyCC)
therefore issues a regular series of bulletins giving a greater degree of granularity,
entitled “Information Security Threat Summaries” (ISTS) to Security Staffs, and those
seeking detailed information should consult the security chain of command
Vulnerabilities of CIS
01056. A CIS is especially vulnerable to attack, because:
b. CIS are able to store protectively marked data in a concentrated and compact
form, where it can be copied, corrupted or damaged quickly and surreptitiously.
f. CIS equipment has an intrinsic value and is thus liable to theft in its own
right.
UNCLASSIFIED
UNCLASSIFIED
01057. The vulnerability of a system can be greatly reduced by good initial planning
(which will include the production of SPD), and by the vigorous enforcement of sound
SyOPs, reinforced by compliancy reviews, security surveys and inspections, and unit
reviews and checks.
01058. Due to the evolution of CIS technologies, and their inherent susceptibility to
“bugs” and “design features”, new generic technical vulnerabilities are being discovered
virtually on a daily basis. Additionally, differing types of CIS platforms will have their
own specific vulnerabilities identified. Furthermore, Malicious Software is deliberately
designed and promulgated to exploit vulnerabilities, as detailed in Chapter 7.
Risk Assessment
01060. MOD policy is that an accreditor, prior to use, must independently assess the
security of all information systems. An accreditor requires evidence in order to
confirm that the intended use of a system to process, store or forward information
does not present an unacceptable risk to National Security.
01061. The effective conduct of MOD operations requires that the security (which
includes confidentiality, integrity and availability concerns) of information and
services are not subjected to unacceptable risk of compromise.
01062. Formal Risk Analysis and Management methods are now necessary to cope
with the complex security problems presented by information systems and networks
01064. The risk assessment must be agreed by the Accreditor, normally through one of
the system / project security management fora. The results should form the basis of all
security work in support of the system. Risk Assessment and Risk Management are
covered in greater detail in Chapter 14.
01065. For systems processing STRAP material, JSP 440 Volume 5 represents a
minimum standard, to be read over and above the requirements laid down in Chapter
14.
UNCLASSIFIED
UNCLASSIFIED
Registration
01066. With the increasing proliferation of CIS hardware and software assets within
MOD it is imperative that details of all such assets are formally recorded. This will
assist the DSO and systems/installation managers in accounting for and assisting in the
auditing of all devices and software. Furthermore, recording details will aid any
investigation should hardware devices be stolen or moved from their approved location.
01067. The format for Registration of systems are given at Chapter 3, with a short form
being applicable to small systems, and a formalised Project Registration Form (PRF) for
larger enterprises.
b. SPD for large and distributed systems, which will have to be specifically
written for each CIS in question.
Accreditation
01069. Accreditation can fall into 4 basic categories:
UNCLASSIFIED
UNCLASSIFIED
01071. Complex systems may require the use of formal Evaluation and
Certification, as detailed at Chapter 6, and this is largely dependant which of one of
four distinct modes of operation, known as the Mode of Secure Operation, that the CIS
can be categorised as operating within :
01072. A special case of Dedicated Mode is Session Processing Mode, which permits
the use of a dedicated machine at different protective marking levels of data by using
separate media sets. If this method is to be used, the additional paragraphs in Chapter
3 Annex S will require to be added to system security instructions.
01074. The purpose of integrity protection is to give adequate and appropriate assurance
against the risk of IT assets being created, amended or deleted other than by
appropriately authorised users.
UNCLASSIFIED
UNCLASSIFIED
01076. This policy further recognises that integrity and availability are primarily system
or service properties. Integrity and availability protection requirements will normally be
assessed at the system level, though specific countermeasures may be applied at lower
levels.
01077. In assessing the protective requirements for official information systems the
security objectives of integrity and availability shall be considered alongside that of
confidentiality. The different natures of the three security objectives are recognised but
it is acknowledged that failure to safeguard any one of them can result in the
compromise of information or other assets.
01078. Integrity and availability protection requirements shall be established for all
systems and networks storing, processing or transmitting official information.
01079. The requirements for protection of integrity and availability shall be determined
through a risk assessment process, involving IT project staffs and security accreditation
authorities as appropriate.
01080. For each of integrity and availability, the risk assessment process shall assign
systems to one of two protection requirement ranges, standard or enhanced, and shall
consider which supporting security services are relevant. See Chapter 6 Annex B.
01081. Countermeasures can be drawn from several different security fields often
operating in combination; the two protective ranges are each associated with levels and
types of countermeasures that are therefore indicative only (see countermeasures below):
protection shall respond primarily to any specific risks highlighted by the risk
assessment.
01082. It is recognised that, in the case of certain applications (e.g. in nuclear or air
safety contexts), the possible consequences of a loss or compromise of integrity or
availability may be so catastrophic that enhanced measures, special to these fields, will
always be required even if the threat is assessed as only slight.
Business Continuity
01083. Disruption can arise due to the failure of system components, denial of access
or corruption of stored information. Unless planned for, retrieval of data after a
disruption is often difficult, time-consuming and sometimes impossible.
01084. Business Continuity addresses what needs to be done to ensure that key
activities can survive disruptive events. It involves the identification of priorities and
the application of risk management to what has traditionally been termed disaster
UNCLASSIFIED
UNCLASSIFIED
recovery. Business Continuity embraces more than just IT: it includes people and
processes, accommodation, paper and electronic records.
f. Exercising and maintaining the plans to ensure they are up to date and
effective.
01086. Top level Budget Holders are required to ensure that adequate Business
Continuity arrangements are in place in their areas. ICS(Pol)BCT under the joint
sponsorship of CM(IS) and DGS&S published the Guide to Business Continuity in
Defence.
Homeworking
01087. Homeworking is defined as the use of a persons home as their normal place of
work using officially supplied equipment. It is often described as working from home.
It should not be confused with working at home which is the term used to describe
someone working at home on a strictly temporary basis e.g. during transport disruptions.
Staff who regularly work at home for any other reason; eg regular working in the
evenings or to collect e-mail, are subject to the homeworking rules.
UNCLASSIFIED
UNCLASSIFIED
01088. The specific security rules, which refer to homeworking, are shown at Annex E.
The rules for working at home are covered by paragraphs 01089 to 01091 if a privately
owned system is to be used; otherwise the rules for the use of a portable IT system as
laid down at Chapter 8 are to be followed.
01090. Security Measures. The rules for IT security stated in this chapter apply, and
additionally the following rule also applies. Official information must not be stored on
the same physical media as private information or programs. All data used for any
purpose on a home computer must be checked for viruses before being introduced to any
Defence system by any means.
Legal Aspects
01092. At present there is no legislation aimed specifically at the security of computers
in the government, public, corporate or private sectors. However, there are a number of
UK statutory provisions that can be applied to computers, their security and the
protection of the data stored on them.
01093. Official Secrets Act. This act lays down requirements for the proper control of
government information.
01094. Computer Misuse Act. This deals with the rights of computer owners against
the unauthorized use of a computer by any party, making offences of attempted or actual
penetration or subversion of computer systems. Under the terms of Section 3 of the
Computer Misuse Act it is a criminal offence to introduce unauthorized software into a
computer system. For the purposes of this instruction unauthorized software is defined
as software not obtained via authorized channels. ITSOs are to ensure that only
authorized software is loaded and used on systems under their control. This is to be
reflected in SyOPs. Additionally, where appropriate and feasible, screen warnings
against unauthorised access should be displayed at the system log-on prompt.
01095. Data Protection Act 1984 and Data Protection Act 1998. These are the
statutory means of ensuring that adequate security is employed when maintaining
records containing personal data. These have been updated as a result of the European
Data Protection Directive.
UNCLASSIFIED
UNCLASSIFIED
01097. Proprietary software products are usually supplied under a licence agreement
that restricts the use of products to specified systems and may limit copying to the
creation of back-up copies only. Users and individuals will be acting unlawfully if they
use, make, transfer, distribute, translate or adopt any copies of computer software
without a licence or the written authorization of the copyright owner.
01098. MOD cannot condone the illegal copying of software, the storage of that
illegally copied software in a computer, which would include copying the software into
a computer and/or the loading of such software into memory. All civilian and military
personnel making, acquiring or using unauthorized copies of software expose
themselves to internal disciplinary action and possible criminal prosecution. The use of
illegally acquired software in Defence computer and electronic office systems is strictly
forbidden. The Head of Establishment/CO is to ensure by regular and recorded checks
that IT systems under their control do not contain or use illegally copied software. This
should be reflected in SyOPs.
01099. Civil Evidence Act 1968 and the Police and Criminal Evidence Act. These
acts define conditions under which computer based evidence may be obtained and used.
01100. Wireless Telegraphy Act 1949. This prohibits the unauthorized use of
wireless telegraphy apparatus for the transmission or reception and subsequent
disclosure of communications.
01103. Public Records Act 1967. This is the statutory provision for the proper care
and preservation of documentary records of government activity, ensuring that
Departments transfer to the Public Record Office (PRO) sufficient records that describe
how they have carried out their functions and duties.
UNCLASSIFIED
UNCLASSIFIED
01104. Human Rights Acts. This is the statutory provision enshrining the European
Convention on Human Rights.
Commercial Aspects
01105. As the MOD is the country’s largest user of Information Security related
products, Users, CIS, and Security staffs can expect to be approached by product
vendors wishing to market their product. It is recommend that all such marketing
approaches for Information Security related products, other than those already listed in
the MOD ICS Catalogue, UK ITSEC approved product list, or similar, be referred to
the Defence Infosec Product Coordination Group (DIPCOG) who are charged jointly
by DDefSy and CM(IS) with reviewing such products suitability for defence.
DIPCOG can be contacted through Hd DefSy(Tech), SY340, 85854MB.
01106. The improper use of MOD CIS will have both a direct and indirect
detrimental impact on the MOD’s ability to conduct its business effectively and
efficiently. The MOD must also meet its legal obligations for ensuring that its
employees do not misuse its CIS facilities.
01107. The improper use of MOD CIS has potentially wide ranging ramifications for
the Department, its staff, its customers, and others. Even where activities are
unauthorised, there may be severe legal and/or financial consequences for the
Department. Some of the most serious potential effects are listed below:
a. breaches of national security;
b. breaches of confidentiality (including infringement of personal privacy
and breach of commercial confidentiality);
c. disruption to Departmental business activities;
d. damage to Departmental IT facilities;
e. legal cases (libel, harassment etc) brought against the Department;
f. Departmental or personal embarrassment;
g. compromised personal security;
h. infringement of intellectual property rights;
i. use of unauthorised software;
j. harassment of any nature;
k. negligent misstatement.
01108. All staff should be aware that the MOD does not condone, and will not
tolerate, the unauthorised use of its CIS. It is committed to preventing instances of
improper use from occurring. Where criminal activity is suspected the Department
will not hesitate to refer the matter to the Ministry of Defence Police for investigation.
UNCLASSIFIED
UNCLASSIFIED
Disciplinary action may be taken against any member of staff who misuses MOD's
CIS.
Incident Reporting
01109. Any hardware or software security weakness, malicious software attack and
other security related incidents or weaknesses must be reported. The MOD is a
contributing Department to the Government wide Unified Incident and Reporting
Scheme (UNIRAS). The rules for incident handling are covered in Chapter 11.
Compliance
01110. The achievement of Accreditation for a system declares that an Accreditor, as a
Competent Authority has reviewed and accepted the Risks and their Management for the
system(s) as installed. The validity of this situation can only endure as long as the Risks
do not change, and the configuration is unchanged.
01111. To maintain effective security for the lifetime of a system, in addition to the
measures inherent in Project Management structures such as Security Working Groups
(SWG) and Configuration Management (CM) Boards, additional procedures are
required that ensure ongoing compliance with security requirements until the system is
finally withdrawn.
01112. Any system used to store, process or forward Official Information may be
subject to technical or procedural Compliancy review by appropriate MOD Security
Authority staffs, or other Competent Bodies agreeable to MOD Security Authorities.
01113. All Compliancy activities result in some form of deliverable, typically a report,
being generated for use by the Accreditor(s) as evidence for continuance of
Accreditation. Compliance checking is covered in detail in Chapter 12.
Security Inspections
01114. The DSO retains the right, irrespective of any delegation, to inspect
without warning any IT installation within the Defence ambit, including industry
and agencies. This will in certain cases override the need for local sponsorship for
a visit.
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
An Introduction to CIS Security
ANNEX A TO
CHAPTER 1
1. Criticality Levels (CL) are used to gauge the impact of any disruption to a CIS, or
exploitation of any information they contain. Their purpose is to assist in deciding
where security resources can be most effectively applied.
3. There are four defined CL, which in decreasing order of impact are:
and/or
e. lead directly to loss of life or threaten the internal stability of the UK.
5. CL1 systems will therefore be predominately those systems which are critically
essential to the UK’s war fighting capability (eg Command and Control, weapon
platforms/systems and some communication, logistic and admin systems) and those
which process and store critical and highly sensitive intelligence information.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
and/or
UNCLASSIFIED
UNCLASSIFIED
An Introduction to CIS Security
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
An Introduction to CIS Security
APPENDIX 1 TO ANNEX A
TO CHAPTER 1
CIS CRITICALITY LEVEL WORKSHEET TEMPLATE
(…………………………………………………………..)
Insert Appropriate Protective Marking when complete
1. In order to determine Criticality Level of individual MOD CIS, the following criteria
should be used to provide a numerical value for each of the following questions. If the
answer to any question covers more than one answer, then you should tick each answer
and then add them together to calculate the overall total for each question. For a CIS
decomposed into its functional elements (Services / Infrastructures or Domains / Islands
/ Connections / Causeways) the calculation should be done for each element.
a. System Name:_____________________________________________
b. System Locations:__________________________________________
(…………………………………………………………..)
Insert Appropriate Protective Marking when complete
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
(…………………………………………………………..)
Insert Appropriate Protective Marking when complete
a. Central Government. 10
b. Nuclear Deterrence. 8
c. Weapon Delivery Platform. 8
d. Operations. 8
4
e. C ISR 8
f. Communications 6
g. Intelligence. 5
h. Training. 3
i. Administration. 1
4. What would be the effect on any of the above Core Functions if the service provided
by the system was not available?
5. How many individuals are dependent on the functions provided by the system?
a. Less than 10 0
b. Between 10 and 100 5
c. Between 100 and 250 8
d. Between 250 and 500 10
e. Over 500 20
(…………………………………………………………..)
Insert Appropriate Protective Marking when complete
UNCLASSIFIED
UNCLASSIFIED
An Introduction to CIS Security
(…………………………………………………………..)
Insert Appropriate Protective Marking when complete
CONNECTIVITY
6. How many other systems is the MOD CIS connected to? Direct or indirect
connection to the Internet equates to unknown number of systems.
7. Is the system reliant on any other system for the transmission or receipt of data to
fulfil its Core Function/Role?
a. Yes. 10
b. No. 0
Connectivity Sub-Total_______________
COMMAND LEVEL
Where a system spans more than one of the above levels, each of the values are added
together, to calculate the overall score.
Score _________________
(…………………………………………………………..)
Insert Appropriate Protective Marking when complete
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
(…………………………………………………………..)
Insert Appropriate Protective Marking when complete
9. What is the highest Protective Marking level the system will operate at?
a. TOP SECRET . 10
b. SECRET. 7
c. CONFIDENTIAL. 5
d. RESTRICTED. 1
e. UNCLASSIFIED. -5
a. STRAP 1 or 2.
b. Compartmented Information.
c. VRK.
d. COSMIC, ATOMIC or ATOMAL.
(1) Yes. 10
(2) No 0
AVAILABILITY
(…………………………………………………………..)
Insert Appropriate Protective Marking when complete
UNCLASSIFIED
UNCLASSIFIED
An Introduction to CIS Security
(…………………………………………………………..)
Insert Appropriate Protective Marking when complete
13. During what phases of any crisis, conflict or war will the system be required to
support?
14. What is the acceptable timeframe for the system not being available to users?
(…………………………………………………………..)
Insert Appropriate Protective Marking when complete
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
(…………………………………………………………..)
Insert Appropriate Protective Marking when complete
15. Can the function of the system be replicated by other means within an acceptable
operational outage time and within resources likely to be available?
a. No. 10
b. Partially. 0
c. Yes. -10
16. List those applications which support the Core Function of the system. and give the
appropriate value. If there are more than 10 such applications, the most significant 10
should be chosen. Score is the highest single value achieved by any of the applications.
APPLICATION VALUE
Score _________________
Availability Sub-Total____________________
(…………………………………………………………..)
Insert Appropriate Protective Marking when complete
UNCLASSIFIED
UNCLASSIFIED
An Introduction to CIS Security
(…………………………………………………………..)
Insert Appropriate Protective Marking when complete
INTEGRITY
18. What would be the effect on the complete loss of the system?
Integrity Sub-Total____________________
(…………………………………………………………..)
Insert Appropriate Protective Marking when complete
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
(…………………………………………………………..)
Insert Appropriate Protective Marking when complete
(…………………………………………………………..)
Insert Appropriate Protective Marking when complete
UNCLASSIFIED
UNCLASSIFIED
An Introduction to CIS Security
ANNEX B TO
CHAPTER 1
3. The current edition of the DA Notices was issued in 1993 and recognises the
changed circumstances following the break- up of the Soviet Union and Warsaw Pact
and the UK's involvement in smaller-scale conflicts, the undiminished threat from
terrorist attacks and the risk of proliferation of weapons of mass destruction. It also
takes account of the continued targeting of the UK by foreign intelligence services.
4. Compliance with the DA Notice system does not relieve the editor of
responsibilities under the Official Secrets Acts.
5. The Secretary DPBAC (the DA Notice Secretary) is the servant of the
Government and the Press and Broadcasting sides of the Committee. He is available at
all times to Government departments and the media to give advice on the system and,
after consultation with Government departments as appropriate, to help in assessing
JSP 440 Volume 3 Issue 2 1B-1
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
DA NOTICE NO 4
CIPHERS AND SECURE COMMUNICATIONS
1. It is requested that no details be published, without prior consultation,
of HM Government's highly classified codes and ciphers, related data
protection measures and communication facilities, or those of NATO or other
allies.
UNCLASSIFIED
UNCLASSIFIED
An Introduction to CIS Security
ANNEX C TO
CHAPTER 1
General Principles
2. a. In general terms, all information has some value whether that represents
the value of resources spent on its collection and recording or the value that can
be gained from its exploitation. When assessing its value a judgement has to be
made on the degree of damage likely to be caused to government assets caused
by compromise. The cause of compromise can be broken down into four
general groups:
(1) Disclosure.
(2) Theft.
(3) Destruction.
(4) Tampering.
c. Also, in general terms, information can be owned and the owner can and
should be responsible for determining its level of protection (see paragraph 5
below). This includes information released to the UK Government by
international agreement or on a commercial basis.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Secrets Act. The originator of "official" information is not, therefore, the owner of that
information. The rules for the protection of "official" information are based on the
allocation of a protective marking, the criteria for which are set out in other security
publications. The authority to allocate a protective marking is limited to certain ranks
and appointments, although in an emergency the originator of a document of any rank
may authorize any protective marking provided the definitions laid down are used and
can be justified.
National Caveats
4. Instructions for the use of national caveats are promulgated in other security
publications but some important extracts are set out here with regard to the two core
national caveats.
UNCLASSIFIED
UNCLASSIFIED
An Introduction to CIS Security
Aggregation of Information
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
An Introduction to CIS Security
ANNEX D TO CHAPTER 1
PROTECTION OF COMPARTMENTED
INFORMATION
Overview
Compartment Approval
Risk Assessment
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
drawn from the staff of one of the MOD Accreditation Authorities. The Control /
Release Authority is responsible for nominating their CIR(s), and the details of this
nomination must be supplied to D Def Sy in accordance with the format laid down at
Appendix 1. In selecting an Agent, the following metric should be used :
Incident Handling
UNCLASSIFIED
UNCLASSIFIED
An Introduction to CIS Security
APPENDIX 1 TO
ANNEX D TO
CHAPTER 1
(…………………………………………………………..)
Insert Appropriate Protective Mark when complete
Compartment Reference
Number1
Name Protective Marking
Common Name or
CodeWord
Other Codewords2
Short UNCLASSIFIED
Description3
Compartment Overview Details Protective Marking
Compartment Controller
Compartment Infosec
Representative Nominee
Notes
1 To be supplied by DDefSy
2 List
3 If no existing UNCLASSIFIED description exist, a simple statement such as “Special Intelligence” should be
used.
4 Details as to SEL derivation from DDefSy
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
ANNEX E TO
CHAPTER 1
Introduction
1. These instructions are designed to ensure that the minimum standards which
protect information in MOD offices are applied, as far as possible, in home
circumstances and a copy will accompany all letters of appointment for Homeworkers.
They may not be relaxed and may be applied only in Great Britain. These rules will also
apply to those MOD office-based employees who regularly take work home.
General
3. Before homeworking commences the homeworker must provide his or her line
manager with written agreement to a visit to the home (and, thereafter, to periodic spot
checks) by representatives of the security directorate to confirm that satisfactory physical
and procedural security measures are in place. Such agreement must be confirmed
whenever regular access to official material is involved, irrespective of protective
marking level.
Personal security
4. Homeworkers should be especially careful not to draw attention to the fact that
they are working on official information at home. As homeworkers will have few
opportunities to discuss work or problems with colleagues, they may be more vulnerable
to compromise by someone professing to show an interest in their work. They need to
JSP 440 Volume 3 Issue 2 1E-1
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
be alert to this danger and instances of outsiders (or those without a `need to know')
showing undue interest should be reported to the Departmental Security Officer.
5. Many aspects of security which are taken for granted in MOD buildings and
establishments are difficult to replicate in the home. As far as is possible, homeworkers
must adhere to the following guidelines:
(2) It is in a room to which the door and windows have been locked;
and
UNCLASSIFIED
UNCLASSIFIED
Telephone Security
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
10. All information and programs must be must be protected in accordance with the
policy for portable CIS in Chapter 8. All removable disks should be secured under lock
and key (see para 5a).
11. To avoid the possible danger of introducing malicious software, the following
additional requirements must be met:
Photocopying/Printing
12. It is important to keep copies of documents to the minimum necessary for the
proper conduct of business. Reproduction of RESTRICTED documents should be
undertaken on an approved photocopier supplied by the Department for the purpose, or
on a machine available within the Department itself. UNCLASSIFIED material may be
reproduced on local commercial copiers if operated by the homeworker, care being
taken to ensure as far as possible that documents are not read, or identified as
MOD/official material by others. RESTRICTED and above material may only be
printed on an approved photocopier or printer supplied by the Department for this
purpose, or an a machine available within the Department itself.
13. The minimum standards for transmitting documents and other material through
postal services are as follows:
UNCLASSIFIED
UNCLASSIFIED
15. Where it is necessary to remove RESTRICTED material from the home (to
attend a meeting, for example), it should be carried in a locked container such as a
briefcase. The container is to bear a label securely attached to the outside giving
instructions to the finder. Only one side should normally be visible, the reverse being
obscured by a protective cover. The visible side of the label is to read: `If found please
see instructions on the reverse side of this label'. The reverse side is to read: `Anyone
finding this [container] is asked to telephone 01371-854444 or hand it in at the nearest
police station or railway or other transport authority with a request that they should take
that action'.
Note: The telephone number given is that of the Security Control Room in Main
Building. The number of the appropriate Service security authority may be given
instead.
16. While carrying protectively marked documents, the container should remain at
all times in the homeworker's personal possession. Protectively marked documents
should not be read in any public place or public vehicle. Note: Never journey abroad or
to Northern Ireland carrying a briefcase bearing the Royal cypher.
Review of Holdings
17. The homeworker should minimize official material held at home. Holdings
should be reviewed at least every six months and, where appropriate, forwarded/returned
to the Department.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Destruction of Waste
Files
19. MOD practice should be followed. This normally means that documents should
be filed, in date order, as soon as possible and a file minute sheet kept.
File Lists
20. Lists of all files held at home should be kept by both the Department and the
homeworker.
UNCLASSIFIED
UNCLASSIFIED
An Introduction to CIS Security
APPENDIX 1 TO
ANNEX E TO
CHAPTER 1
1. This document constitutes the Security Operating Procedures (SyOPs) for the IT
system, detailed below, to be used for homeworking. They are issued by the ITSO in
accordance with Defence Manual of Security Volume 3, and have been approved by the
Accreditor. All personnel using the system are to comply with these SyOPs, and no
departure from or amendment to them is permitted unless prior authorization is obtained
from the Accreditor.
2. Breaches of these orders may render the offender liable to disciplinary action.
Equipment Details
Make:
Model:
Serial No:
Administration
Job Title:
Branch:
Tel No:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Job Title:
Branch:
Tel No:
6. Authorized users of this system are listed at ANNEX A. Additions, deletions and
amendments to the list of authorized users must be approved by the ITSO.
Personnel Security
8. All authorized users of this system must have the appropriate security clearance
for the material processed on the system.
Personal Security
9. Homeworkers should be especially careful not to draw attention to the fact that
they are working on official information at home. Instances of outsiders (or those
without a 'need to know') showing undue interest should be reported to the Departmental
Security Officer.
10. Many aspects of security which are taken for granted in MOD buildings and
establishments are difficult to replicate in the home. As far as is possible, homeworkers
must adhere to the following guidelines.
UNCLASSIFIED
UNCLASSIFIED
An Introduction to CIS Security
(2) It is in a room to which the door and windows have been locked:
and
Physical Security
12. Where the system is normally based on an MOD site but transported to and from
home premises On a regular basis, blanket permission, covering a suitable period of
time, must be obtained from the ESyO or ITSO for this type of removal.
13. Where the system is to be based at the home premises, permission for this type
of usage must be obtained from the ESyO or ITSO.
15. When not in use the system and any associated magnetic media, eg floppy disks,
removable hard disks, etc, must be protected and handled in a manner commensurate
with the highest protective marking of material processed on the system.
16. While equipment and any associated removable media are in transit outside a
secure MOD environment, the media, where possible, should be carried separately from
the equipment. In addition, where a portable computer incorporates a rechargeable
battery pack, this must be removed or disconnected to allow internal memory to
discharge. All IT equipment to be used for official purposes by the homeworker must be
approved by the appropriate security authority.
17. All information and programs must be protected in accordance with the policy
for portable CIS in Chapter 8. All removable disks should be secured under lock and
key.
18. To avoid the possible danger of introducing malicious software, the following
additional requirements must be met:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
19. Connection of the computer used at the home premises is strictly limited to those
departmental IT systems and equipments to which the homeworker would connect in the
course of their duties when at the MOD site. Remote connection to these IT systems is
only permissible using encryption to an approved government standard over the
communications link. Under no circumstances may the computer used by the
homeworker be connected to any other computer system or network.
Hardware Security
20. Equipment must be checked before use for obvious signs of tampering. Any
suspected problems should be reported to the ITSO without delay and the equipment
should not be used until checked and cleared.
Software Security
21. No software from unauthorized sources may be loaded into the system.
22. Back-up copies should be made of any software or data essential to the operation
of the system. These should be kept in a different location to the working copies of the
software and data flies. Back-up copies should be made frequently and an annual test
should be conducted to verify the back-up copies are usable.
23. Individual users are responsible for ensuring that back-up copies of any data files
essential to their work are adequately maintained.
24. Any suspected attack by virus or other malicious software must be reported to
the appropriate security authority without delay and the system must not be used until a
security investigation has been carried out.
UNCLASSIFIED
UNCLASSIFIED
An Introduction to CIS Security
ANNEX A
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
An Introduction to CIS Security
ANNEX F TO
CHAPTER 1
Notes:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Introduction 02001
Accreditors 02053
Dispensations 02088
Oversight 02104
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
CHAPTER 2
Introduction
02001. This Chapter gives guidance on the Organisation and Management of for
Communications and Information Systems (CIS) in use within Defence. It is a principle
that the security approval and compliance functions should be separated, wherever
possible, from the project management and the system operating authority functions
and should reside under a separate chain of command.
02002. A requirement for good management practices applies throughout the system
lifecycle:
a. Inception
b. Implementation
c. Operation
d. Decommissioning
02003. However, for routine systems, the emphasis is on the security management
activities in the Operation phase. More detail on security requirements for other
phases, applicable normally to large and complex systems, can be found at Chapter 13.
02004. Within the Operation Phase, the following Security Management Activities
are required:
b. Security Accreditation;
c. Security Compliance.
UNCLASSIFIED
UNCLASSIFIED
02007. In order to provide effective and efficient security policy for MOD information
and communications systems, the staffs of D Def Sy on behalf of the Departmental
Security Officer, and CM(IS) co-operate at every level. Coordination of policy is
achieved by cross representation on security policy and technical security policy
committees and working groups.
02009. Where appropriate this guidance is submitted for inclusion in later versions of
JSP 440, and it can be assumed that any DCI, which was issued more than 3 months
before the publication date of the latest update to this volume has been superseded.
UNCLASSIFIED DIANs will normally be available on the MODWEB and similar
Intranets, and on the Security Section of the MOD ICS catalogue CD-ROM.
02010. Defence Security Standards Organisation (DSSO). The DSSO task falls
into two main areas:
02011. DSSO accreditors will advise business managers of the risks to their CIS
systems and how best to mitigate and reduce them. The decision to accept the
residual risk will lie with the business manager in consultation with other
stakeholders. DSSO auditors will focus on assessing the effectiveness of the
integrated risk management process of the TLB Holder/Trading Fund Chief
Executive (TFCE).
02012. Top Level Budget Holders (TLBs) and Trading Fund Chief Executives
(TFCEs). Responsibility for the implementation and risk management of security
policy and standards has now been formally delegated to TLB Holders/TFCE. Each
UNCLASSIFIED
UNCLASSIFIED
02014. Joint Security Coordination Centre (JSyCC). The JSyCC, which is part of
the DSO's organisation, acts as the coordinating point for Security Alerting, Reporting,
and Response. The JSyCC also has responsibility for management of compliance
activities. The role of the JSyCC is covered in greater detail at paragraph 02045.
Accreditation Authorities
02015. Enforcement of Security for CIS is primarily carried out by the process of
Accreditation, which must be obtained before any CIS system is permitted to store,
process or forward any official information. The Accreditation confirms, for the Data
Owner(s), the fact that Confidentiality provisions of the implementation do not present
an unacceptable risk to the Information being processed, and also confirms, for the
System Operating Authority (SOA), that appropriate asset protection for Integrity and
Availability is in place.
02017. This role may be further delegated by the nominated PSyAs to Security staffs
under their control, as required, and such staff must not have any responsibilities in
respect of the operation of any systems they accredit.
UNCLASSIFIED
UNCLASSIFIED
Delegated Responsibilities
02020. Normally PSyAs will be responsible for systems for which the "Data Owner"
is one of their respective TLB holders or for which the TLB is financially responsible.
02021. PSyAs are responsible for maintaining a register of every IT system in their
area of responsibility and for recording the level of security protective marking of data
which each is authorized to process. PSyAs are responsible for notifying the
Coordinating Installation Design Authority (CIDA) of the planned installation of any IT
system. PSyAs are to arrange for protective security surveys and inspections of all
units with systems. In addition, they are to ensure that units proposing new systems,
which are likely to process data protectively marked CONFIDENTIAL or above, are
also surveyed and inspected before processing is authorized. They are responsible for
investigating and advising on each new proposal for a system and for ensuring that the
security factors are identified and taken into account during the planning stage.
UNCLASSIFIED
UNCLASSIFIED
02024. In the case of the Ministry of Defence Police (MDP), the Service Police,
members of the Intelligence Corps or the units identified above, such knowledge can be
assumed. In all other cases, staff acting as security investigators DSO. To facilitate
identification, all MOD civilian staff on these duties are issued with an Investigator’s
Identity Card, examples of which can be obtained on request from JSyCC.
UNCLASSIFIED
UNCLASSIFIED
02029. There is a need throughout this JSP to have a shorthand description of the
organizational responsibilities at the centre of the IT spectrum of security. For
convenience, these central roles have been amalgamated under the generic title of
Information Technology Security Officer (ITSO). Whilst it may be possible for the
person in a single post within a small system to have all such responsibilities, inevitably
the individual PSyA Security Staff will decide how these responsibilities are to be split
for more complex systems and at large organizations. Generic responsibilities of an
ITSO are shown at Annex A.
UNCLASSIFIED
UNCLASSIFIED
02031. It should be noted that the term ITSO is used in other Government
Departments to referred to the senior post in a Department with responsibility for IT
security.
02032. System Operating Authority (SOA). All large and distributed systems,
which may or may not extend outside establishment boundaries, must be operated
under the Authority of an officer in whom adequate authority is delegated by the
appropriate CO etc. and to whom users will be accountable. The SOA must be
appointed before a system is put into service. The SOA is responsible for all aspects of
system operations, but for large or complex system the day-to-day management of the
system will normally be delegated to one or more System Administrators (SA) and
System Security Officers (SSO). The SOA is responsible for ensuring that Security
Operating Procedures (SyOPs) are both published and ensuring signed as being read
and understood by all users of the system. Where the role of SOA and SA are
combined, this person is normally referred to as the System Manager (SM). The
responsibilities of a System Operating Authority are described at Annex B.
02033. System Administrator (SA). Large and distributed systems will usually be
managed on a day-to-day basis by one or more System Administrators (or equivalent)
to whom adequate authority is delegated by the SOA. The SA(s) should assume his
duties before a system has been commissioned, and will be responsible for the
extension or alteration of a system in service.
02035. Managers. When two or more systems located in separate areas are joined,
there is to be a Network Manager responsible for coordinating the security
arrangements; the responsibilities must be clearly defined in the Security Policy
Documentation (SPD) and approved by the DSSO or appropriate PSyAs security staff.
Each of the SOA will retain direct responsibility for the standard of security of his or
her own system, and will be accountable to the Network Manager for meeting the
security requirements of the network, as stated in the SPD.
UNCLASSIFIED
UNCLASSIFIED
a. Communications security.
c. Access controls.
d. Audit trails.
e. Data integrity.
02037. Security Assurance Coordinator (SAC). For large and complex projects and
systems, or sites/formations with extensive use of IT systems, a SAC should be
appointed, both to provide advice and assistance to the project / system management
authorities, and to reduce the resourcing implications being placed on external agencies
such as Accreditors.
02038. The role of a SAC is one of the “permitted extensions” to the functions of a
Project Assurance Team (PAT) as laid down within the Governmental PRINCE
methodology, and can also be considered to be an expansion upon the role of an IT
Security Officer (ITSO). Details of the Terms of Reference (TOR) for a SAC are laid
down at Annex D.
UNCLASSIFIED
UNCLASSIFIED
throughout the life of the system where there is no CIDA with this
responsibility. Each system will have an IDA.
02040. Fuller details of the IDA/CIDAs and their responsibilities are shown at Annex
E.
02041. Users. Every user of a system has a duty to ensure the security and integrity
of information in the system and must understand the responsibilities for this. They
must:
a. Be conversant with all security orders and instructions issued for use with
the system, for which they will be required to sign confirmation;
c. Ensure that all input, programs, output are allocated the appropriate
protective marking and caveat. This includes all intermediate documents,
which may be created during processing, and traffic to be passed over a data
link;
02042. The corollary of these responsibilities is that CIS systems are potentially more
vulnerable to disaffected personnel than manual systems. Any person with access to
CIS systems may be in a position to interfere with or damage the equipment and storage
media; to alter or delete the data; to see or obtain sensitive material being stored,
displayed, processed or otherwise handled. Particularly with office based CIS, it may
be impracticable to secure such material temporarily whilst uncleared staff are working
in the area without seriously disrupting the work of the unit/establishment and therefore
particular care must be taken to avoid casual overlooking.
02043. All users of systems used to store, process, or forward official information are
to assent in writing to security monitoring of their activities before being given access
to the system, and are required to annually reconfirm this assent in writing unless the
logon process to the system itself displays an appropriate notification, as laid down at
Chapter 6, which must be acknowledged before logging in successfully.
02044. The regulations relating to Personnel Security are laid down at JSP440
Volume 2, and these are amplified for CIS at Annex F.
UNCLASSIFIED
UNCLASSIFIED
02046. Fuller details of the roles of JSyCC are given at Chapter 11. Outside core
working hours, the MOD maintains an Information Security Duty Officer (ISyDO),
which is a role fulfilled by members of DDefSy or JSyCC staff.
02047. Details of Incident Handling procedures, for both Detection and Response,
within MOD are given in Chapter 11.
02048. Any significant or urgent Vulnerability and Threat alerts will be issued by
JSyCC as either Vulnerability Warning Notices (VWNs) or Threat Warning Notices
(TWNs), details of which are contained at Annex G. The requirements for acting
upon VWN and TWN are laid down later in this Chapter, and units’ requirements for
subsequent Installation Vulnerability Validation (IVV) are detailed at Chapter 12.
02049. Details of the CIS Verification program, including both routine Inspections
and Vulnerability Analysis, and the Enhanced Intruder Testing (EIT) program are given
in Chapter 12.
UNCLASSIFIED
UNCLASSIFIED
throughout the whole lifespan of the project or system. Terms of Reference for a SWG
are at Annex H.
02051. The SWG's function is to provide support to the project so that the accreditor
is in a position to grant security authority to operate in due time and that any
consequential changes to the project that affect security are recognised and suitable
measures implemented. This implies responsibility throughout the whole life span of
the project. In particular the SWG is to:
c. Identify both general and particular threat agencies that might exploit project
vulnerabilities;
02052. Installation Security Committee (ISC). An ISC is a variant upon the SWG,
convened under the same Terms of Reference, but intended to cover IT Security issues
for a number of different systems within a Site or Formation.
Accreditors
02053. The Accreditor is responsible for confirming that the specific implementation
of any CIS has been appropriately secured in a duly diligent manner, taking account of
national and departmental regulations, and as such does not present an unacceptable
risk to national security.
UNCLASSIFIED
UNCLASSIFIED
02056. The Accreditor's advice is to be sought from the outset for all CIS
implementations, and where one a SWG is convened, the Accreditor is to be a full
member of this group. For large, complex or operational CIS projects, the Accreditor
should be consulted as to whether they wish a member of Tender Assessment Boards or
to participate in higher-level Project Management Boards. Whenever security is on the
agenda or may be discussed of other project meetings (e.g. discussions with industry
and contractors), the Accreditor is to be consulted in advance. All decisions that may
have an impact on any aspect of security and ITSEC or Common Criteria evaluation
parameters should be agreed with the Accreditor.
UNCLASSIFIED
UNCLASSIFIED
02060. Accreditation Panel. Where an CIS system does not fall solely within the
boundaries of a single Accreditator’s remit, connects to departments or organisations
outside MOD, or holds information belonging to departments or organisations outside
MOD, an Accreditation Panel (AP) will probably need to be established, with
representatives for all Accreditors and from the Project Office. In most such cases, the
DSSO will normally choose to staff the chairing of such panels.
02061. The AP will normally be an infrequent group, which would form only when
specific Accreditation issues arise. They will be chaired by the "lead Accreditor", with
secretariat functions provided by the affected project(s) or system(s). Routine Security
issues should continue to be progressed through Security Working Groups (SWG).
Membership would normally be restricted to the Accreditors and necessary CIS
security agencies.
02062. There are a number of standing Accreditation Bodies in existence, for instance
the Multinational Security Accreditation Board (MSAB) which deals with CCEB and
NATO Accreditations, and projects should consult the DSSO when planning
accreditation timescales, as there are benefits to defence in utilising such standing
bodies rather than convening a multitude of separate APs with broadly similar
representation.
UNCLASSIFIED
UNCLASSIFIED
02068. Although a Risk Management approach is taken, it must be realised that there
are certain National Minimum Standards, including "baseline measures", with which
MOD is obliged to comply.
02069. Where an accreditor exercises discretion to vary the requirement from that laid
down in National or Departmental regulations, this will be done on the basis of a
specific Risk Assessment for the system(s)affected. Requirements for dispensations
below National Minimum Standards are laid down later in this chapter. In cases where
an accreditor has to raise the requirements, the specific risks addressed must be
documented in the SPD.
Risk Acceptance
02071. The Accreditation process works in conjunction with the need for
Operational Authorization, which is a subsequent management approval process
whereby the System Operating Authority(s) (SOA) and Data Owner(s) accept any
residual risks identified by the accreditation process. The Senior Responsible Officer
is the individual who accepts the risk.
02072. An Accreditation Status, which will be issued in the form of a Certificate that
should be held as part of the security register, can fall into one of 5 basic categories.
UNCLASSIFIED
UNCLASSIFIED
02073. Full Accreditation. The target for all permanently installed CIS should be to
achieve Full Accreditation, which will be full compliance with all the SPD as endorsed
by the Accreditor(s). In such circumstances, the Accreditation Certificate will be
countersigned by the Accreditor and a representative of the System Operating
Authority(s) (SOA) and Data Owner(s), and thereby grants Operational Authorization
as well. An example of an Accreditation Certificate is given at Annex I Appendix
1.
02074. Interim Accreditation. Where a permanently installed CIS is does not fully
meet the Target of Accreditation, but the shortfalls are as a result of a phased system
development, a constrained Interim authorization (of limited duration and scope, as
defined in the Certificate) can be issued instead, typically to permit Installation /
Testing / Commissioning and "Initial Operating Capability" (IOC).
02076. Conditional Accreditation. For permanently installed CIS, which do not fully
meet the Target of Accreditation whose shortfalls are of an unplanned nature (e.g.
minor vulnerabilities found by Evaluation or from unscheduled minor changes), a
constrained Conditional authorization (of limited duration and scope, as defined in the
Certificate) can be issued. Conditional Accreditation can also be used in a planned
manner for short duration installations such as Prototype/Demonstrator systems and
quick notice deployments, where the full Accreditation cycle would be a nugatory
effort. The need for Conditional Accreditation of short notice operations was formerly
referred to as “Operational Exigency approvals”.
02077. In view of the increased risk being taken in such circumstances, the
Accreditation Certificate as signed by the Accreditor will specifically itemised the
shortfalls against the Target of Accreditation (for unplanned instances) or against
national and departmental standards (for short duration installations). The
countersignature in these cases must be made by a senior representative, of not less than
2* level, of the System Operating Authority(s) (SOA) and Data Owner(s) who in so
doing accepts the risk, and thereby grants Operational Authorization.
UNCLASSIFIED
UNCLASSIFIED
02082. It should be noted that Accreditation will become invalid if the particular use,
configuration or environment of the system changes. It is therefore essential that before
any proposed changes are implemented that they are discussed with the Accreditor,
who will advise whether it is necessary to seek formal reaccreditation.
Multinational Accreditation
02084. When operating in a multinational environment, it should be noted that NATO
or Coalition documents may refer to Full Accreditation as "System Approval To
Operate" (SATO), and/or Interim Accreditation as "Interim Approval To Operate"
(IATO). Similarly, the term Designated Approving Authority (DAA) or System
Approving Authority (SAA) will be encountered instead of Accreditor in NATO or
Coalition documentation.
UNCLASSIFIED
UNCLASSIFIED
assurance activities. Details of these activities are given at Chapter 6, with the
methodology for determining such requirements in MOD, an interpretation upon HMG
Infosec Standard No. 1, contained at Chapter 6 Annex B.
Dispensations
02088. Cases will arise where, on a Risk Management basis, a dispensation is
required to permit operation of a system in cases where compliance with either
National Minimum Standards, including "baseline measures", or system specific
Accreditation requirements cannot be met. This may be for one of a number of
reasons, the most common being:
c. Operational Exigencies;
02089. In most cases, the authority to operate in such a manner will accrue from a
Conditional or Interim Accreditation, which identifies both the deficiencies, and the
proposed way forward. However, in cases where the tolerance of such Accreditation is
exceeded, then a specific dispensation should be sought, which may take one of 3
forms:
a. Waiver;
UNCLASSIFIED
UNCLASSIFIED
b. Exemption;
c. Dispensation.
02090. The PSyA will normally issue waivers, Exemptions and Dispensations, but for
the following categories of system they can only be given with the explicit permission
of the DSSO:
02092. Waiver. A waiver is a risk management tool that allows rules to be waived, in
extraordinary circumstances, for periods up to one year, when it is judged that a
temporary deviation will not result in any vulnerability being exploited. Accordingly, a
waiver gives approval for the temporary deviation from the mandatory standards in
circumstances where:
UNCLASSIFIED
UNCLASSIFIED
b. All feasible compensatory measures have been taken and nothing more
can be done.
02096. Full Dispensation: no time limit, but Security Policy Documentation must
reflect the details of the Dispensation, including the details of the issuing Competent
Authority.
Configuration Management
02098. Configuration. Configuration is the general term given to an IT system to
identify and describe its hardware, software and firmware. The configuration also
includes the physical layout, connection of the component parts and software version
information.
02100. This will not only encompass the security features provided by hardware,
software and firmware security measures where these exist but also the operating
system and application packages.
UNCLASSIFIED
UNCLASSIFIED
Configuration Plan
02102. As a guide this should cover:
g. The ITSO or nominated deputy is to seek initial security authority for the
proposed change.
Oversight
02104. The accreditation of CIS within MOD is largely delegated by the DSO to the
DSSO and PSyAs, who may have further sub-delegated accreditation powers.
02105. The DSO, however, retains the right, irrespective of any delegation(s),
to review the Accreditation of any CIS installation within the Defence ambit,
including industry and agencies. This will in certain cases override the need for
local sponsorship for a visit.
UNCLASSIFIED
UNCLASSIFIED
02106. The DSSO provides an independent security audit capability to enable the
DSO to certify that security policy is being implemented adequately and cost-
effectively across the whole of MOD and its Trading Funds
02108. To guard against any perception of abuse of discretion, a review and appeals
procedure is provided:
02109. In such cases, the PSyA(s) for the TLB(s) involved should initially be
contacted for a review of the decision. In cases where it is the decision of the PSyA(s)
themselves that are called in to question, or where an impasse has been reached where
more than one Security Authority is involved, the DSSO will act as the final arbiter of
such Appeals.
Dispensation Review
02110. In cases where compliance with either National Minimum Standards,
including "baseline measures", or system specific Accreditation requirements cannot be
met, the Accreditor may, on Risk Management basis, need to grant or seek a
dispensation.
02112. In the case of Waiver, when renewal after the initial 12 month maximum
period is required. In these instances a revised case, justifying its continuance is to be
submitted through the Security Authority to DSSO as a request for an exemption.
UNCLASSIFIED
UNCLASSIFIED
02113. In the case of Exemptions, the case for their continuance is to be reviewed
every 5 years. A list of Exemptions is to be included in the PSyAs Annual Reports to
D Def Sy.
Security Compliance
02116. The achievement of Accreditation for a system declares that an Accreditor, as
a Competent Authority has reviewed and accepted the Risks and their Management for
the system(s) as installed. The validity of this situation can only endure as long as the
Risks do not change, and the configuration is unchanged.
02117. To maintain effective security for the lifetime of a system, in addition to the
measures inherent in Project Management structures such as Security Working Groups
(SWG) and Configuration Management (CM) Boards, additional procedures are
required that ensure ongoing compliance with security requirements until the system is
finally withdrawn.
02118. Within the MOD environment, all activities are implicitly liable to review to
ensure that the relevant procedures and regulations are being complied with. It is
therefore inherent that any system used to store, process or forward Official Information
may be subject to technical or procedural compliance review by appropriate MOD
Security Authority staffs, or other Competent Bodies agreeable to MOD Security
Authorities, with or without the knowledge of its users.
a. Oversight;
b. Compliance;
c. Incident Response.
02120. The subjects of Compliance and Incident Response are complex topics in their
own right, and have Chapters of this Volume dedicated to them, with Incident Handling
forming Chapter 11 and Compliance forming Chapter 12.
UNCLASSIFIED
UNCLASSIFIED
02122. Threat. JSyCC promulgates both Threat Warning Notices (TWN), which
relate to specific Information Security Threats, and Threats Change Notices (TCN),
which advise of modifications to the overall “Cannel” Levels.
02123. The action required upon the receipt of a TWN will be dependent on the
specific content of the alert.
02124. The action required upon the receipt of a TCN is a combination of the Cannel
Level and the Criticality Level of the system, as laid down in the following table:
02127. Where Vulnerability Rectification Directives (VRD) have been issued, PSyAs
are responsible for collating progress against these VRD within their area of
responsibility (AOR), and providing progress summaries to JSyCC.
UNCLASSIFIED
UNCLASSIFIED
02128. Compliance with other VWNs is achieved through the practice of Installation
Vulnerability Validation (IVV), as laid down at Chapter 12.Further information on
Vulnerability and Threat Warning Notices is given in Annex G to this Chapter.
Incident Reporting
02129. Any hardware or software security weakness, malicious software attack and
other security related incidents or weaknesses must be reported. The MOD is a
contributing Department to the Government wide Unified Incident and Reporting
Scheme (UNIRAS). The rules for incident reporting are covered in Chapter 11.
Security Inspections
02130. The DSO retains the right, irrespective of any delegation(s), to inspect
without warning any IT installation within the Defence ambit, including industry
and agencies. This will in certain cases override the need for local sponsorship for
a visit.
02132. Awareness. The main vehicle for the promulgation of general information
security information across all personnel in Defence is this manual, augmented as
required by Defence Council Instructions (DCI). This is supplemented by additional
background information provided on various Intranet web severs, and included as
part of the Security section of the DCSA Catalogue for those users not having access
to the main intranets.
UNCLASSIFIED
UNCLASSIFIED
02135. Should course directors or event organisers wish to include one or more
Information Security sessions within courses or events that they intend to run, D Def
Sy should be contacted in the first instance for advice.
02137. These courses are designed both to provide pre-employment training for
designated posts, and to provide means to infuse additional training as required for
existing practitioners.
02138. An annual DCI GEN is published by D Def Sy summarising all the MOD
and Government provided courses. Before contracting for commercially provided
courses, units are advised to consult either their PSyA or D Def Sy.
02141. To aid the need for CPD, PSyAs may run seminars or roadshows for staff
within their TLBs, details of which can be obtain direct from these authorities.
UNCLASSIFIED
UNCLASSIFIED
02142. The Defence Infosec Product Coordination Group (DIPCOG) runs a series
of Open Days for CIS and Security staffs where security product vendors are invited
to showcase new technologies, which will include briefing sessions covering MOD
and Governmental policy and organisational updates by D Def Sy and EC-CCII-
IOCM.
02145. Until MOD is able to formally recognise CPD options afforded by external
professional bodies therefore, the following framework should be taken as guidance
as to the level of effort likely be required for maintenance of Information Security
currency amongst MOD practitioners:
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
Organisation and Management of Security
ANNEX A TO
CHAPTER 2
Generic Responsibilities
1. The post of ITSO has been established to address the problems encountered with
unit-level administration of security for IT systems.
3. The ITSO is responsible to the CO/Hd of E for all IT systems security within the
unit/establishment, although for larger systems (eg CHOTS) may only be acting in a
liaison capacity with a dedicated System or Network Security Officer.
4. The post is a security rather than an IT function, and care must be taken to avoid
conflict of interests if appointing IT staff into such posts to ensure segregation of
responsibility.
5. The ITSO and ESyO will need to interact to ensure overall security is maintained.
a. Providing security advice to the installation staff and system users and,
where appropriate organising Installation Security Committees (ISC).
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
d. Reporting to the PSyA security staff or DSO where appropriate, any security
loopholes, infringements and vulnerabilities which may come to light.
a. Maintaining a security log which, in conjunction with the system log (which
may be maintained by the SM or NW Manager), should record sufficient details
about the normal activities of the system to enable a history of events to be
reconstructed. The security log should monitor and record activities (against
times and dates) which could jeopardise the security of the system including:
b. Ensuring that the security maintenance and system logs are examined and
countersigned by the ESyO at intervals decided by the DSO.
c. Ensuring that all personnel having access to the installation are appropriately
security cleared or supervised and are aware of the local security regulations,
maintaining a record of all persons authorized to use any part of the systems and
the extent of their authorizations, and arranging for suitable security education
for all installation staff and system users.
d. Issuing of passwords or other access control devices (if both are in use, the
ITSO should be responsible for issuing one or the other but not both).
e. Ensuring that visual checks are made on equipment for signs of tampering
and that the inspections are recorded in the security log.
UNCLASSIFIED
UNCLASSIFIED
Organisation and Management of Security
protectively marked data and that external signs which might permit deductions
to be drawn about previous usage are removed.
d. The details of these and other courses are published annually in a DCI GEN.
There may be appropriate Single Service Courses available as an alternative.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Organisation and Management of Security
ANNEX B
TO CHAPTER 2
d. Determining the Security Processing Mode and seeking approval for it from the
appropriate authority, via the Security Chain of Command.
e. When directed, arranging for independent testing of the system, including any
remote site, and inspection of, its documentation.
j. Ensuring the secure use of data links and remote terminals. He or she must not
allow connection of a terminal until all security requirements have been met, and
must keep the security arrangements of each remote terminal under constant review
in conjunction with the Commanding Officer or Head of Establishment of the unit in
which the system is situated.
UNCLASSIFIED
UNCLASSIFIED
k. Arranging the necessary supervision and control of all maintenance and repairs,
especially when carried out by civilian contractors.
l. Ensuring that validation checks are carried out when changes are made to the
system controlling/operating software.
m. Appointing an SSO and, where relevant, a NSO, and ensuring the security of
remote terminals.
UNCLASSIFIED
UNCLASSIFIED
Organisation and Management of Security
ANNEX C TO
CHAPTER 2
a. Maintaining SyOPs for the system, and circulating SyOPs to staff on a regular
basis.
b. Providing system security advice to the system's management, system staff, and
system users.
d. Ensuring that all personnel having access to the system are appropriately security
cleared and/or supervised, and are aware of the local security regulations.
e. Maintaining a record of all persons authorized to use any part of the system, and
the extent of their authorization.
h. Ensuring that records of hardware, firmware, and software changes and defects
are kept and regularly examined for unusual trends.
j. Ensuring the proper custody of magnetic media and other system documents.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
l. Ensuring that before their release from the system, checks are made on
documents which have undergone an approved declassification procedure to show
that they do not, in fact, contain protectively marked data and that the external signs
which might permit deductions to be drawn about previous usage are removed.
m. Maintaining and examining system security logs which should record sufficient
details about the normal activities of the system to enable a history of events to be
reconstructed. The security log should include monitoring and recording of
activities (against date, time, and user) which jeopardize the security of the system,
including:
UNCLASSIFIED
UNCLASSIFIED
Organisation and Management of Security
ANNEX D TO
CHAPTER 2
2. The SAC must have a sound understanding of how electronic security measures
are designed and implemented in secure systems. He must have a good working
knowledge of configuration management practices for secure systems and he must be
aware of the importance of procedures which can provide traceability in software.
4. The SAC will report on security matters to the Accreditor. He will present
unresolved difficulties to the Security Working Group (SWG), co-ordinate security
functions among the SWG and carry out the decisions of the SWG.
5. The SAC advises, monitors and reports on security matters relating to the
project and may on occasions chair the SWG on behalf of the Project Manager. His
main tasks are to:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
f. inform the Project Board, through the Project Manager, of the Security
Working Group decisions;
h. channel advice from the National Security Authorities advisers and TLB
Principal Security Advisers (PSyA) to the SWG;
UNCLASSIFIED
UNCLASSIFIED
Organisation and Management of Security
ANNEX E TO
CHAPTER 2
Principles
2. In order to ensure the Confidentiality, Integrity and Availability of all IT equipment
within the MOD, and to comply with both National and MOD regulations, it is essential
that the relevant security authority and IDA and/or CIDA are notified in advance of all
new requirements and/or when changes to the type(s), location(s), classifications or
number(s) of equipments installed are proposed. The CIDA will vet all designs and
proposals of new systems and incorporate them into existing drawings and plans (See
Appendix 1).
3. The primary concern is that systems processing protectively marked information are
installed and operated in such a way that they do not compromise their own security, or
that of other systems in the vicinity. It is also important that Unclassified systems are
reviewed by the appropriate security authority, both to ensure that the equipment and its
installation does not affect or assist in the escape of emanations from classified systems
(TEMPEST), and to minimise the risks to the confidentiality, integrity and availability
of systems and data (eg from "hacker" and virus attacks).
Responsibilities
4. It is the responsibility of Branch/Unit Security Officers to ensure that the relevant
National and MOD regulations are applied within branches, although for larger systems
the Project Office may assume responsibility for all branches using the system.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
5. The security staff is responsible for ensuring that protectively marked information is
protected and that IT systems dealing with such data are accredited. There may often be
a local Establishment level security officer through whom the request should be made.
6. The IDA and/or CIDA are responsible for ensuring that all equipment is installed and
operated in such a way that it does not compromise the equipment's safety or security, or
that of other systems in the vicinity. This will include security measures and technical
countermeasures being implemented as required and the maintenance of good
engineering practices to comply with national regulations. In some areas there is a
requirement that all such requests are passed to the Establishment/Building Services
manager.
7. The central contact/advisory points for both security and installations concerns are
given in the table below. If there is any doubt as to whom the IDA/CIDA for an area is
the relevant TLB Principal Security Adviser (PSyA) should be consulted.
UNCLASSIFIED
UNCLASSIFIED
Organisation and Management of Security
Factors
8. Appendix 1 lists the main items of information that will be required by the security
authority and (C)IDA and this should be obtained before seeking any clearance for either
security or installation design approval.
Summary
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Organisation and Management of Security
APPENDIX 1 TO
ANNEX E TO
CHAPTER 2
c. Location of the room(s) within the site, with a general floor plan
showing any party features.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
b. For shared accommodation: whether the MOD have either their own
switchboard or, if not, whether telephones are filtered at the point of
entry to MOD areas.
f. Office furniture.
UNCLASSIFIED
UNCLASSIFIED
ANNEX F TO
CHAPTER 2
PERSONNEL SECURITY FOR CIS
Threats
1. Disaffected or dishonest staff may threaten valuable information and assets in
various ways, either on their own behalf or as agents of others. Threats to CIS system
security can arise from any individual who has the necessary level of expertise and
knowledge of the system and requisite access to the system. It is also possible that
someone with the necessary expertise could school an inexpert accomplice to carry out
actions by proxy. It follows that staff with legitimate entry to CIS facilities may have
unique opportunities for the unauthorized and surreptitious acquisition of information,
for tampering with the data or for permitting its extraction by unauthorized persons.
Counter Measures
2. Vetting.
a. All authorized users are to have security approval appropriate to the
highest level of data processed/stored by the CIS system or commensurate with
the Mode of Secure Operation.
b. Security approval may be required for personnel who do not have direct
access to the system but whose duties bring them regularly into offices where
the system is located.
c. SyOPs are to detail the appropriate level of clearance for all personnel
who have direct access to the system and similarly those whose duties bring
them regularly into offices where CIS systems are located.
3. Access.
a. The Security Policy Documentation will detail the specific requirement for
access, in particular where the two person rule applies. System specific
regulations are to be included.
b. The ITSO is responsible for ensuring that no person has direct or indirect
access to the CIS system without proof of security approval. SyOPs are to
detail the action to be taken when ancillary staff such as cleaners and
workmen are present in offices where the system is located.
UNCLASSIFIED
UNCLASSIFIED
c. SyOPs are to detail circumstances where the 'Two Person Rule' should be in
operation, and who is to be involved. In addition to the standing
requirements covering the processing of protectively marked information,
this will also be required when technical staff such as CIS manufacturers,
system designers, engineers and other technical staff who by virtue of their
knowledge of, and potential access to, the system hardware and software
have an opportunity for the surreptitious compromise of the system.
4. Supervision.
a. Supervisors of staff with authorized access to sensitive CIS systems are to
pay particular attention to any signs of unreliability. Where it appears that
staff may become disaffected due perhaps to disciplinary or redundancy
action, it may be necessary to deny staff their usual access to a system.
5. Security Awareness.
a. All staff with access to CIS systems are to be instructed on the security
regulations and procedures they are expected to comply with or are
responsible for. They are periodically to be provided with a set of SyOPs
and are to sign that they have read and understood them.
UNCLASSIFIED
UNCLASSIFIED
Organisation and Management of Security
ANNEX G TO
CHAPTER 2
2. It should be noted that these notices refer solely to CIS Vulnerabilities and
Information Security Threats. Non-Information Security Threats, such as the Bikini,
Tahiti and Tesseral systems, are the responsibility of the DDefSy Threat Desk and will
generally be promulgated via the Security Chain of Command.
JSYCC/A&W/xxx/yyyymmdd-nn[-a]
4. Where updates are issued, these will be issued as supplementary editions to the
original version.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Vulnerability Information
6. Vulnerabilities are graded according to their severity, in line with the following
table:
8. The majority of VWN and VRDs will be the MOD instantiation of the
information received from the Unified Incident Reporting and Alerting Scheme
(UNIRAS), operated by the UK National Infrastructure Security Co-ordination Centre.
UNIRAS Briefings will normally be issues as VWN, and UNIRAS Alerts as VRD. As
some MOD units may also receive copies of UNIRAS material by other route, a Web
Page is available within the DGS&S area of MODWeb, and other intranets taking feeds
from MODWeb, showing a mapping between the JSyCC A&W reference and the
UNIRAS reference.
9. In addition to the UNIRAS information, JSyCC may from time to time issue
WN or VRD from other sources, such as that obtained from Dstl, from Allies through
for a such as the Military Federation of Incident Response and Security Teams
(MILFIRST), in which JSyCC represents MOD in what is currently a community of
AUS/CAN/UK/US, from NATO. Additionally, there may be times when the CIS in
question is only relevant to MOD, and so JSyCC, as an element of NISCC, will take
responsibility for this dissemination rather than UNIRAS.
UNCLASSIFIED
UNCLASSIFIED
Organisation and Management of Security
Threat Information
11. The overall Information Security Threat Summary (ISTS) to MOD assets is
issued on a regular basis from JSyCC to PSyA Staffs, which provides a more granular
version of the Government-wide Annual Threat Assessment (ATA), including details
for MOD units not within the UK mainland that the ATA primarily covers.
13. The UK MOD uses the UNCLASSIFIED Codeword “CANNEL” for Overall
Threat Alert levels, which are broadly equivalent to the “InfoCon” levels in use by the
US Department of Defence (DOD), and a general measure of the Threat level within
the static environment.
14. The meaning of the Cannel levels are given in the following table :
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Amber This level should be used when In addition to the actions for Black,
limited MEA have occurred and the the following responses/counter
effect of any MEA has had limited measures are required to be
impact on operations/deployments. implemented:
This level of alert may be used under
the following conditions: a. Isolate any MOD CIS systems,
which may have been attacked.
a. There are specific Indicators &
Warnings occurring; which indicate b. Cease all non-operational
limited MEA against MOD CIS internet connectivity.
have either occurred or are
imminent. c. Execute a ‘minimise’ on all
MOD CIS interconnections to
b. MEA have been detected, provide bandwidth in support of
which have had limited operational operational activity.
impact on military operations or
deployments. d. Consider re-configuration,
rerouting or disconnection of
critical/non critical networks.
UNCLASSIFIED
UNCLASSIFIED
Organisation and Management of Security
Red This level should be used when there In addition to the actions for Amber,
is either a general or specific MEA the following responses/counter
on MOD CIS systems, which will measures are required to be
have a significant disruption to implemented:
military operations or deployments.
It should be used under the a. Cease all internet connectivity
following conditions: unless sanctioned by the Defence
Crisis Management Organisation
a. There has been a wide spread (DCMO) through JSyCC.
series of successful MEA on MOD
CIS systems, at military locations or b. Sever all connections between
on military operations and systems at differing protective
deployments. marking levels unless sanctioned by
the DCMO through the JSyCC.
b. The attacks carried out will have
been widespread and will undermine d. IRSTs are placed on immediate
the MOD ability to fulfil its military on-call basis.
commitments.
15. Changes to the Cannel levels are promulgated by Threat Change Notices (TCN),
which are necessarily brief to ease the load on the signal system. In most cases
additional information for any increased TCN will be provided in a Threat Warning
Notices (TWN).
16. Cannel Level can only be assumed to be valid for the UK Mainland. Threat
levels for Overseas based units and / or mobile staff should be sought direct from
JSyCC, and for all operational deployments from JSyCC via PJHQ (SO1 J3 C2W).
17. Specific Threat information (e.g a hacker group known to be targetting specific
types of hardware) are disseminated using TWN. Where the TWN information exceeds
UNCLASSIFIED, Signal Message dissemination will normally be used to obviate
difficulties of transfer of protectively marked email to some MOD units.
18. The unified Levels as published in the ATA and ISTS are used to describe
Threat in TCN and TWN :
Level Threat
Level 6 Very High
Level 5 High
Level 4 Significant
Level 3 Moderate
Level 2 Low
Level 1 Negligible
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
19. Request For Information (RFI) are issued when JSyCC has been given
uncorroborated information relating to potential Vulnerabilities or, occasionally,
Threats, and feedback is sought from the MOD community to increase the information
available for a security intelligence assessment. This will typically relate to network
based intrusions.
20. RFIs will normally only be sent to either MRCs or to System Operating
Authorities known to have the capability to monitor connections to external networks.
Occasionally, a wider RFI may be issued, for instance when a prevalence analysis is
required for a specific virus.
Dissemination
21. The default method of promulgation of VWN and TWN is by electronic mail,
either using Intranet or Internet mail services. The majority of the information is
received by JSyCC through the internet, and thus internet broadcast may be found to be
received faster than those on MOD intranets.
22. In order to receive A&W information, units must take action to ensure they
receive both signal messages and email.
23. Signal Messages Receipt of signal message A&W alerts is a 2 stage process:
a. Check with the local or guard COMMCEN that traffic is received for the
units Signal Message Address (SMA), and that this SMA is included within
Address Indicator Group (AIG) 1001 ;
b. Request that the COMMCEN include the unit on the SIC Distribution
List (SDL) for all traffic received under SIC ‘Y3A’.
UNCLASSIFIED
UNCLASSIFIED
Organisation and Management of Security
ANNEX H TO
CHAPTER 2
Constitution
d. OR Branch
2. Where no SAC has been appointed for a project of System or Project, the Project
Management Authority or System Operating Authority is responsible for nomination of an
alternative secretary.
d. EC(CCII)IOCMProj
JSP 440 Volume 3 Issue 2 2H-1
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Aim
5. The Security Working Group (SWG) will provide the forum in which all IT
security matters are discussed and formulated in support of the project sponsor and
accreditors, including the development of Security Policy Documentation SPD, such as
SSPs and SISPs.
6. The SWG reports to the Project Board during system development, or the System
Operating Authority thereafter.
Responsibilities
b. Providing advice and guidance on security matters to the project board and
project staff.
c. Providing advice on the areas of risk analysis and risk management as they
pertain to security matters.
Meeting Frequency
UNCLASSIFIED
UNCLASSIFIED
Organisation and Management of Security
ANNEX I TO
CHAPTER 2
ADS produced
Implementation
(Design & Build)
ACCREDITATION Accreditor
Inspection
(Investigations)
Operation
SPD maintained
Minor
Changes
Withdrawal
Drawdown
Inspection
KEY
Project
Activity
Security
Activity
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Organisation and Management of Security
APPENDIX 1
ANNEX I TO
CHAPTER 2
OUTLINE FULL OR INTERIM
ACCREDITATION CERTIFICATE
Ministry of Defence <Organisation
Certificate of CIS Security Acreditation Crest>
System/Project Name
Date of Certificate
An Accreditation Review for this <system/project> has been carried out by the
Accreditor, taking consideration of the Accreditation Evidence Statement (AES) of
<date> attached.
The Residual Risks associated with <system/project> were found to within the
tolerance allowed by National and Departmental Standards, and Accreditation is
therefore granted.
Operation of the system outside the parameters laid down in the Security Policy
Documentation (SPD) and the AES will invalidate Accreditation.
This accreditation is liable to periodic review, and a revised AES must be submitted
every <x> years.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Accreditor Details
Name
Post
Representing <TLB name or DSSO>
Signature
Date
Operational Authorisation
Name
Post
Representing
Signature
Date
UNCLASSIFIED
UNCLASSIFIED
Organisation and Management of Security
APPENDIX 2
ANNEX I TO
CHAPTER 2
OUTLINE CONDITIONAL
ACCREDITATION CERTIFICATE
System/Project Name
Date of Certificate
An Accreditation Review for this <system/project> has been carried out by the
Accreditor, taking consideration of the Accreditation Evidence Statement (AES) of
<date> attached.
The Residual Risks associated with <system/project> were not found to be within the
tolerance allowed by National and Departmental Standards, and the operation of the
system is therefore carried out on the basis of Risk Acceptance by the Security
Champion(s) as detailed below:
Operation of the system outside the parameters laid down in the Security Policy
Documentation (SPD), AES, and this RRA will invalidate Accreditation.
This accreditation is liable to periodic review, and a revised AES must be submitted
every <x> years.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Accreditor Details
Name
Post
Representing <TLB name or DSSO>
Signature
Date
Name
Post
Representing <TLB name or DGInfo>
Signature
Date
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
Introduction 0301
Registration 0305
Maintenance 0339
Compliance 0340
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
CHAPTER 3
0302. The Manual of Protective Security requires that accreditation is achieved under
the conditions specified in an Accreditation Document Set (ADS). HMG Infosec
Standard No 2 provides a guide to organising and producing an Accreditation
Document Set to form the basis for accreditation and the maintenance of accreditation
status. The Security Policy Documentation described in this chapter fulfils the
requirements of HMG Infosec Standard No 2 and a cross-reference table is provided
at Annex A.
The Threat
0303. The origins and nature of the threats to official information processed
electronically, are similar to those to protectively marked information stored and
handled in other forms, which are outlined in other volumes of the Defence Manual of
Security. The main threat to official information processed/stored on IT Systems is
from personnel who may be from or influenced by foreign intelligence services (FIS),
or authorized users who, for whatever motive, may seek to gain access to official
information they have no 'need to know'. The threat from subversive or terrorist
organisations, investigative journalists and others must also be considered.
Registration
0305. General. In order to standardise IT registration procedures, within the MOD,
the use of a common form will be necessary. The form is given at Annex C. It is to be
completed by the system/installation manager when the IT equipment/software is
received within their area of responsibility. Once completed the form should be retained
JSP 440 Volume 3 Issue 2 3-3
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
by the manager and a copy sent to the ITSO/ESyO. As and when there is an amendment
to be made to the document the manager must notify the security authorities
accordingly.
a. Hardware. When a new IT system is received the system/installation
manager will record, on the Registration Form, all the details required ensuring
that serial numbers etc are correct. The completed form will then be forwarded
to the appropriate branch/unit security officer. When IT equipment is replaced
or disposed of details will be notified to the security officer. If at any stage of
the systems life-cycle the equipment is moved from its approved location the
system or installation manager will record details on his copy of the Registration
Form.
b. Software. When the system/installation manager takes delivery of a
new IT system he will record on the Registration Form details of all software
supplied with that system. Details will include the name of the operating system
and any applications software that is supplied by the manufacturer/distributor of
the system. Details of the software licence number and the date installed will be
recorded on the Registration Form. If at any stage in the future additional
software is loaded and stored on the system the Registration Form is to be
amended accordingly by the ITSO. This recording action will assist in
identifying any unauthorized software that may be resident on the system.
0307. An outline of the Security Policy Documentation for small systems (small Local
Area Network (LAN) or Server with several terminals) is at Annex E. Annex F is a
guide for the production of SyOPs for systems other than standalone PCs or portables.
0308. For unclassified systems, the security statement may do no more than to ensure
that the system is not used for protectively marked information. The relevance of the
Data Protection Act, other legislation, protection against unauthorized amendment or
system denial (e.g. by virus attack) will need to be considered, as will interconnections
to other systems.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
0310. Under the portfolio approach, Security Policy Documentation for large and
distributed systems may be produced for one of 2 reasons:
a. As part of the Project Management cycle, often dealing with Project and
Infosec Risk. These documents normally have a title beginning with “Infosec";
0311. Several of the new documents specified in this chapter are derived from the
Domain Approach research, conducted under the MOD’s Applied Research
Programme. Additional guidance on these documents will be incorporated into Defence
Information Assurance Notice No. 7, ‘Security Policy Documentation’.
Project Documentation
0314. Project Documentation shall consist of:
a. Project Registration Form (PRF);
b. Infosec Scoping Appraisal (ISA).
0316. Project Registration Form (PRF). The PRF acts as the initial Registration
with the Accreditor(s), and must be completed for all systems other than those small
systems using generic documentation. It is intended to allow forward planning of
Accreditor resources to support projects. A sample is given at Annex G.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
0317. Projects, which are sufficiently complex to warrant the raising of a PRF will
also need to raise a CIDA Notification Form (CNF), details of which are provided at
JSP480 – Code of Practice for Installation Design.
0318. Infosec Scoping Appraisal (ISA). An ISA documents the results of an
appraisal of the security-related risk to a project or group of related projects. An ISA
should be short, generally no more than 6 pages of information, and for simple
projects may be as little as 1 page. A template for an ISA is at Annex H.
0319. The purpose of conducting the appraisal is to minimise the risks to the
project(s) arising from the need for security controls and accreditation. It should be
concerned in broad terms with the security aspects of the requirements and the risks
associated with them. Although some consideration of possible solutions will need to
be made, the overall emphasis should be on identifying security-related risk to the
project(s) and managing the accreditation process. An ISA shall include the Security
Risk Category for the project(s), see Chapter 14.
0320. All new projects shall produce an ISA. The ISA shall be endorsed by the
accreditor(s) before any significant budgetary commitment to the project. Note that
an ISA does not form any part of the evidence supporting the accreditation
decision(s).
0321. Infosec Management Plan (IMP). An IMP is an overall plan for managing
the accreditation process for a project or set of related projects. Further details about
the expected contents of an IMP are given in Annex I. An Annex to the IMP should
contain the Accreditation Evidence Statement (AES) for each planned accreditation
decision.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
operationally ineffective, it should be agreed between the accreditor, project and user
community. Further details about the suggested structure of an IRMA can be found
at Annex J.
0326. Security Risk Assessment (SRA) A SRA records the risk assessment for a
specific Target of Accreditation, and further details about the expected contents of a
SRA are given in Annex K. Chapter 14 gives generic guidance on Risk Assessment
and Risk Management.
0328. The SRS includes non-technical aspects, such as physical and security
management requirements, and the requirements for security barriers, security
functionality and evaluation assurance. The risk assessment, which justifies the
requirements in the SRS, should be recorded in the SRA. Note that an early version
of the SRS may be used to support the ITT for a development contract.
0329. Security Aspects of the Design (SAD) A SAD describes how the design and
implementation of the system meets the requirements defined in the SRS. Further
details about the expected contents of a SAD are given in Annex M. Note that the
response to an SRS in an ITT may be an Outline SAD.
0330. System Configuration Model (SCM). The SCM is the living document used
to record the current configuration of the system, reflecting changes as they occur to
ensure that a valid baseline for both internal and external compliance checking
activity is available. Annex N provides an outline of the type of information that
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
should be contained in a SCM, although it is likely for larger systems that the SCM
will be held in a database rather than as a monolithic hardcopy document.
0331. Code of Connection (CoCo). Further details about the suggested structure of
a CoCo can be found at Annex O. Where only a bilateral connection is ever
envisaged, a short Interconnection Security Measures Statement (ISMS) can be used
instead.
Operational Documentation
0333. Once a system has been designed and implemented, an Operational Security
Management Plan (OSMP) is required to support the Installation, Commissioning,
Operation and Withdrawal of the CIS. An OSMP shall contain, or refer to, all the
information necessary to configure, operate and maintain the Target of Accreditation
in a secure manner. Further details about the expected contents of an OSMP are
given in Annex Q. This includes the SyOPs, roles and responsibilities and re-
accreditation conditions. OSMPs are required to be maintained throughout the system
lifecycle. An OSMP should include:
a. Installation and Commissioning Security Instructions (ICSyI);
b. Technical Operation and Maintenance Security Instructions
(TOMSyI);
c. User Security Instructions (USyI) or Subscriber Security
Instructions (SSyI);
d. Incident Response Plan (IRP) - template at Appendix 1 to
Annex Q;
0334. The OSMP will need to be updated to reflect changing staff responsibilities, and
the Emergency and Contingency Plan (ECP) and Incident Response Plan (IRP) will
need to be regularly tested.
0335. A guide to the production of Technical Operation and Maintenance SyOPs for
UNIX based systems is at Annex R to this Chapter and much of it may also be relevant
to production of SyOPs for other operating systems used for medium and large systems.
0336. SyOPs are to be produced to the satisfaction of and for approval by the
Accreditor, whose decisions on the SyOPs are final. SyOPs are the
documentation/orders specifying the procedures, which are to be, carried out in order to
ensure the security of a system as defined in the Security Policy Documentation.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
0337. The use of all Departmental CIS facilities is, and will continue to be, subject
to monitoring. All material held on MoD CIS equipment is deemed to be the
property of the Department itself, and staff are reminded that, as a consequence, so-
called “private” information held on any Departmental IT facility will not be
afforded any special protection and will be accessible to line management and
investigating staff without prior recourse.
0338. All SyOPs shall include the statement in the previous paragraph. SyOPs shall
also ensure that the users recognise that in signing the Security Operating Procedures
(SyOPs), they assent to such monitoring and implicitly indemnify the MOD against any
action under Article 8 of the European Convention on Human Rights.
Maintenance
0339. Once in service, in order for the Accreditation Document Set to continue to be
relevant, it is import that the System Operating Authority arrange for all Security Policy
Documentation to be reviewed at least annually, and at any major change in the
Environment (technical or physical).
Compliance
0340. System Documentation. The production of Security Policy Documentation is a
prerequisite to the achievement of System Accreditation, as laid down at Chapter 2.
0341. As part of the Verification Activities laid down in Chapter 12, checks will be
performed on all operational systems to ensure that the Security Policy Documentation
in use is both available and still relevant.
0342. User Documentation. In order to demonstrate that users are conversant with the
Security Operating Procedures (SyOPs) that affect their particular function, ITSOs or
their delegated representatives should maintain a log showing which SyOPs have been
provided to each users. Users should be required to regularly re-sign that they are aware
of the SyOPs requirements.
Legacy Documentation
0343. National guidance on the production of System Security Policies (SSPs), and
associated Security Policy Documents, is set out in CESG Electronic Information
System Security Memorandum No. 5 (“Memo 5”). The main Security Policy
Documentation items that were required by the Memo 5 were:
a. PSP – Program Security Policy;
b. CSP – Community Security Policy;
c. SSP – System Security Policy;
d. SEISP - System Electronic Information Security Policy;
e. SISP - System Interconnection Security Policy.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
0344. All of the above may be found prefixed with an “I” to indicate the Initial
version, as the development approach was one of reiteration, frequently leading to large
and cumbersome documents with much redundancy. To aid those encountering such
documents, or charged with maintaining such Security Policy Documentation for
Legacy systems, the following guidance may be helpful.
0345. Community Security Policy (CSP). A CSP is a high level document that
brings together the common security requirements of a family of related CISs. The SSP
of each CIS in the family will be based on the CSP. CSPs are part of the accreditation
process and are produced by, or on behalf of, the Project Manager to the satisfaction of,
and for approval by, the accreditor.
0346. System Security Policy (SSP). The SSP under Memo 5 documentation forms
the basis for accreditation. It should be prepared by, or on behalf of, the Project
Manager to the satisfaction of and for approval/endorsement by the Accreditor. The
Accreditor's decisions on SSP matters shall be final. In order to establish that the
operation of an CIS will not breach security, the Accreditor will require an explicit
statement covering:
a. The scope of the system (a brief system description or schematic).
b. The protective marking of the information to be processed, stored or
forwarded.
c. The specific measures that are to be implemented.
d. The allocation of responsibilities for enforcing them.
e. Any appropriate measures that the Accreditor may deem necessary.
0347. This information was set out in a formal document, known as the SSP. A SSP
was required for all CIS processing official information. The introduction of CIS and
other electronic systems can cut across the normal chains of responsibility within a unit
or HQ and it is a purpose of the SSP to clarify such issues and, in particular, to establish
overall responsibility for system security. To this end the scope of the system is defined
in terms of managerial responsibility. The SSP is a dynamic document. It can be
amended to meet changes in the system, only with the approval of the accreditor.
0348. It should be noted, however, that Memo 5 is written to cover the general case
for all Government CISs, and as a result it may prove difficult to apply in practice.
Nevertheless the guidance set out in Memo 5 is valid. It does require interpretation,
tailoring to meet specific situations and a clear understanding of both the users needs
and the technical proposals.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
ANNEX A TO
CHAPTER 3
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
RESTRICTED
Security Policy Documentation
ANNEX B TO
CHAPTER 3
Introduction
1. The origins and nature of the threats to information processed electronically are
similar to those for information held in other forms. This statement concentrates on
aspects in which the threats to information which are particular to Information
Technology (IT). It does not consider the risks from hazards such as fire or flood. In
particular it does not give advice on specific counter-measures which should be
implemented as a result of a vulnerability and risk assessment for a given system.
2. This statement covers the general threat to IT systems. In special situations (e.g.
Northern Ireland) a specific threat assessment should be obtained through the security
chain of command.
RESTRICTED
RESTRICTED
Defence Manual of Security
8. Members of the Public. The fact that information held electronically may be open
to novel forms of surreptitious attack provides a special attraction to certain individuals,
commonly known as 'hackers'. Whilst the efforts of hackers are unlikely to be directed
specifically against protectively marked information, there is added kudos in breaking
into Defence systems, so much information might be discovered fortuitously. This
threat is enhanced by the spread of computer literacy and the publicity given to the use
of "Internet" and similar data services. In particular there is a high threat to any
unprotected IT system connected to the public telephone network.
9. Theft and loss and capture. There is ample evidence that IT hardware and
components are attractive targets for theft by the criminal community. The small size of
modern portable computers, and in particular storage media associated with IT systems,
have frequently led to loss. For operational systems the risk of capture has to be
assessed.
Methods Of Attack
10. Agent Penetration. As with information held in other forms, the most likely
method of attack on electronically-processed protectively marked information is through
an agent within an organization who has legitimate access either as a user or as an IT
specialist, such as an engineer or programmer. Apart from seeing, copying, or otherwise
procuring protectively marked information, an agent may be able to subvert system
RESTRICTED
RESTRICTED
Security Policy Documentation
12. Interception and TEMPEST. Like all communications links, data links are
vulnerable to interception, particularly when transmitted by radio relay. Most long
distance communications involve radio relay links. In addition, many types of electronic
equipment emit unintended information-bearing radiation (TEMPEST), which may also
be detected. The TEMPEST threat in the United Kingdom is generally Very Low
except for some sites in the Greater London area. In North-West Europe and in other
Commands, where sites can be in close proximity to foreign diplomatic premises or
ships, the threat is higher.
14. Network Penetration. The technical expertise available to FIS and the
criminal hacker community is high and probably exceeds other groups. It does not
preclude such expertise being purchased. Such hackers will target defence systems, and
in particular those with little or no security protection in the hope of collating aggregated
information. They will make use of "social engineering" (lying, normally over the
telephone) to obtain background information before mounting an attack. Even if their
activities do not lead to compromise by unauthorised disclosure of information, they
may well corrupt or delete critical parts of system data or software.
RESTRICTED
RESTRICTED
Defence Manual of Security
Conclusion
16. Malicious software. Computer viruses and other forms of malicious software
can be introduced into an IT system in a number of ways including carelessness or
through malicious intent. Regardless of the way that Malicious software is introduced
the effects can be severe. Macro viruses are spread by both floppy disk and E-mailed
attachments.
RESTRICTED
UNCLASSIFIED
Security Policy Documentation
ANNEX C
RESTRICTED
(When Completed)
RESTRICTED
(When Complete)
JSP 440 Volume 3 Issue 2 3C-1
UNCLASSIFIED
JSP 440 Volume 3 Issue 2
UNCLASSIFIED
3C –2
UNCLASSIFIED
Security Policy Documentation
APPENDIX 1 TO
ANNEX C TO
CHAPTER 3
3. Advice has been given for TEMPEST control and this advice has been
incorporated for this installation.
4. It is understood that no alteration may be made to the system once it has been
accredited.
Signature
Rank
ESyO/ITSO
Tel extn:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
System Accreditation
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
ANNEX D TO
CHAPTER 3
Introduction
1. This document constitutes the System Policy Documentation (SPD) and the
Security Operating Procedures (SyOPs) for the IT system, when read in conjunction
with the attached registration form. They are issued by the ITSO in accordance with
Defence Manual of Security Volume 3, and have been approved by the Accreditor. All
personnel using the systems are to comply with these SyOPs, and no departure from or
amendment to them is permitted unless prior authorization is obtained from Accreditor.
2. Breaches of these orders may render the offender liable to disciplinary action.
4. The term user throughout these orders refers to the Authorised User of each
equipment who is cleared to see and process any information on their own equipment
Physical Security
6. The system may only be used in the location(s), as specified in the Registration
form, and may not be removed without the permission of the ITSO, after consultation
with the Installation Design Authority (IDA)/Coordinating IDA (CIDA), Accreditor, or
their delegated representatives.
JSP 440 Volume 3 Issue 2 3D-1
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
7. When not in use all removable media, which includes Printer Ribbons (where
appropriate), as well as magnetic media such as floppy disks and removable hard disks,
must be securely stored in a container appropriate to their protective marking. It is to be
remembered that magnetic media will assume, and are to be colour coded for, the
highest protective marking of information stored or processed on the system {if
DEDICATED} or permitted by the session {if SESSION PROCESSING}.
8. Any keys and Personal Identification Devices (PIDs) for the computers are to be
secured appropriately for the protective marking whenever the equipment is not in use.
9. The printer is to always be checked and cleared of any printed output before the
office is left unattended. Where a laser printer has been used to print PROTECTIVELY
MARKED documents, an UNCLASSIFIED test print is to be run through the machine
before switching off to clear the printer memory.
10. VDUs and printers are to be situated so that no data can be overlooked from
either outside the area, especially from outside the building, or by persons within the
area who are not authorized users. In open plan offices, any 30 minute rule is only
acceptable if all personnel having uncontrolled access to the area have Need To Know
(NTK), and in other cases the following additional measures are needed : {eg screen
blanker with password to reactivate}
User Security
11. Each user is responsible for the security of their equipment and any magnetic
media associated with it or any output produced by the equipment in either paper or
magnetic form and the protection of any password.
Document Security
12. All magnetic media is to be uniquely marked and registered in accordance with
Security Regulations. Unless declassified by data destruction (See Annex C to Chapter
4) the Protective Markings of magnetic media will be retained and will determine the
eventual method of disposal of the media.
13. All printed material is to show the protective markings of the information,
marked in accordance with the security regulations and the procedures for receipt,
exchange, dissemination, declassification and destruction of such material followed
accordingly.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
Hardware Security
14. All equipments are to be checked before use for obvious signs of tampering.
Any suspected problems are to be reported to the ITSO without delay and the
equipments are not to be used until checked and cleared.
15. All protectively marked material is, where possible, to be removed from the
equipment before maintenance engineers are allowed access to the equipments. Unless
appropriately security cleared engineers must be supervised whilst they are working on
the equipment.
16. All magnetic media introduced to the system by the engineer for diagnostic
purposes must be virus checked first. All magnetic media used on the system and faulty
items removed from the system must be treated in accordance with the security
measures appropriate to the highest protective marking of data held on the system; this
will normally result in such items being retained on Defence premises.
17. Items of equipment which may contain protectively marked material are not to
be removed from MOD premises for repair without permission from the appropriate
security authority. Where such permission cannot be given repair of the equipment will
be by total replacement of the faulty part(s) and the damaged component(s) must be
retained and destroyed in a manner commensurate with the potential protective marking.
Where protectively marked data is involved any magnetic media used by an engineer
for diagnostic purposes must be retained and the security measures pertaining to other
magnetic media apply.
18. All hardware failures must be reported to the SM who will arrange for the
necessary maintenance and maintain the records of system failures.
Software Security
19. All software used on the system is to be from authorised sources and properly
licensed. Software may only be installed with the express authority of the ITSO and
after the installation disks have been checked for viruses.
20. Back-up copies should be made of any software or data essential to the operation
of the system. These should be kept in a different location to the working copies of the
software and data files. Back-up copies should be made frequently and an annual test
should be conducted to verify that the back-up copies are usable. Disks used for backing
up data must be checked for malicious software before use. Once back-up disks have
been made, they are to be stored at a location away from the main site.
21. Any suspected attack by malicious software must be reported to ITSO without
delay and the system should not be used until a security investigation has been carried
JSP 440 Volume 3 Issue 2 3D-3
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
out. #Insert after here either the full rules from DMS Vol 3 of the actions to be taken or
refer to the chapters and paragraphs. This will depend on whether the machine is used
solely on Defence sites.#
Communications Security
22. No other terminal, PC, modem or fax (of whatever description) is to be attached
to the equipment covered by these SyOPs, and the equipment is not to be connected to a
network.
Tempest Security
23. All equipment is to be installed, and the installation maintained, to comply with
any requirements from BTR/01/200(3), and any TEMPEST certified equipments must
be maintained appropriately.
26. Backups. Individual users are responsible for ensuring that back-up copies of
any data files essential to their work are adequately maintained.
27. Emergency, Fire and Evacuation. In the event of any other incident requiring
the evacuation of the area, the equipment is to be, if possible, be secured, but not at the
expense of personal safety.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
Virus Protection
28. Anti-virus software must be used when data are input to the system on magnetic
or optical media. If CESG certified anti-virus software is available it must be used,
otherwise DGICS catalogue listed anti-virus software must be used. The procedures
used depend on whether the organization has implemented anti-virus 'border protection'
or not. The attached annex gives the location of the anti-virus 'sheep dip' facilities if
available. The following procedures must be adhered to in each case.
(2) Any disk destined for a system must be checked fro viruses first.
29. All users who receive a significant number of compressed or encrypted files
should install 'On-access' virus protection even if they are protected by a 'Boundary
Protection Facility'. The following procedures should be followed to provide additional
protection.
c. As soon as the copy has been made, the transfer diskette must be
returned to the originator. Under no circumstances is the system to be rebooted
while the exchange medium is in place.
d. The system manager should change the BIOS settings to force system to
look for the boot-up sector on the C: drive before looking at the A: drive.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
b. Do not switch off or re-boot the system until being given permission to
do so by ITSO or PSyA.
d. Locate and isolate all disks and other i/o media which may have been
used on the infected workstation.
e. Identify and isolate any workstation which may have been infected.
f. Identify and warn any users that may have been sent infected files.
31. Recovery of data must not be started until the ITSO is satisfied that any
investigation will not be compromised and gives explicit permission to begin. Virus
scanning and eradication of viruses from suspect workstations and disks is only to be
carried out by personnel specifically authorized to do so by PSyA.
32. Where the anti-virus strategy incorporates the use of a central 'sheep dip' facility,
reinforced by the use of a workstation media authorization guard (WMAG), the WMAG
package must be set for a specific protective marking level. If there are systems working
at different protective marking levels, the WMAG must be set on a separate machine for
each protective marking level. End user systems should not contain software capable of
subverting the WMAG mechanism such as primitive level disk editors.
33. Instructions describing the treatment for electrical shock are to be displayed in
every room or office containing computer equipment. All Health & Safety regulations
concerning electrical equipment are to be freely available to all members of staff that use
such equipment and must be observed.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
ANNEX E TO
CHAPTER 3
Introduction
Basic Facts
4. Reference and Date of Authority to Operate. [This may not yet be given by the
accreditor].
5. In Service Date.
Security Responsibilities
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
System Description
Data
Users Of System
20. Clearances. [The lowest vetting level of the user population is to be shown].
System Configuration
21. Hardware:
c. Media loading arrangements. [The number and type of media loading devices
should be stated, e.g. one ¼" tape drive, one 3.5" 1.44Mb floppy disk drive. The
security controls for the use of these devices and the magnetic media produced by
them should be detailed].
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
d. Hard disk arrangements. [The quantity, size and type of hard disk should be
detailed as well as whether they are fixed or removable. If removable, the
individual serial numbers are to be recorded. The security controls should be stated
for the secure storage, registration and handling of the system hard disks].
e. Schematic diagram/Topology.
22. Software:
b. Application Software. [List the application software the system is to use, e.g.
WordPerfect 5,1, SuperCalc 5, etc.].
Security Arrangements
23. Arrangements for the Secure Operation and Storage of Protectively Marked
Items. [This must include hardware, software, magnetic and paper media used by or
output from the system].
30. TEMPEST Threat Assessment. [Result of this assessment and who carried it out
should be given].
31. Limitations in use. [The minimum spacing from other equipment including
telephones and other system wiring or radio transmitters should be specified. Any
special requirements that have been stipulated should be included].
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Contingency Plans
32. Fire, Flood and Serious Breakdown. [The minimum arrangements to counteract
these occurrences should be shown].
Accreditation Conditions
34. All requests for modification to the system must first be considered by the System
Manager, who is to identify any security sensitive changes for approval by the
accreditation authority. In particular no new connectivity for the system, nor any
reprocessing of data in a security class for which the system is not accredited, may be
made without the express approval of the accreditation authority.
35. There will be no variation from this document without the prior approval of the
system accreditor.
In signing this document the accreditor assumes that the information supplied is
accurate. The inclusion on this system of data in categories and protective
marking levels not covered in this document, without prior written permission of
the system accreditor, shall be sufficient reason to instigate security breach
investigation procedures.
Accreditation Signature
.......................................
Accreditation Authority
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
ANNEX F TO
CHAPTER 3
Introduction
1. SyOPs are a description of the method by which the security policy described in the
System Policy Documentation (SPD) is to be implemented. Personnel and their
responsibilities are identified.
2. SyOPs are to be produced for all systems which are intended to process or store
official information. This includes word processors and electronic typewriters.
3. The ITSO should ensure that SyOPs for every system he/she has responsibility for be
produced. SyOPs are required before accreditation can be given.
b. Physical Security.
c. Personnel Security.
d. Document Security.
e. Computer Security.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
i. Configuration Management.
5. The content of SyOPs will vary considerably from system to system and this Annex
is intended to provide guidance only. Those personnel responsible for producing SyOPs
will extract from this checklist only that detail relevant to their particular system.
However, the structure and content of SyOPs for a particular system must be agreed by
the accreditor before security approval is given to operate.
7. This section is also to contain details, where applicable, relating to the following
aspects:
b. Details of the Mode(s) of Secure Operation relevant to the IT system, and the
level of protective marking permitted for each mode.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
f. Procedures for the control of engineering and other support staff who may
require access.
i. Instructions to ensure that SyOPs are circulated to all appropriate staff and
that their receipt is acknowledged.
Physical Security
a. Definition of the computer area(s) - a floor plan of the office should be given
showing the location of all IT equipment.
b. Keys and/or lock combinations - identity, where kept, records kept, who is
permitted to draw and/or use.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Personnel Security
10. Any person who is able to enter a location containing IT equipment may be in a
position to interfere with or damage such equipment, and have access to protectively
marked material being printed or displayed. The threat to IT system security can arise
from any individual who has the necessary level of professional expertise and
knowledge of the system and the requisite access to the system. It follows that staff with
legitimate entry to IT facilities may have unique opportunities for the unauthorized and
surreptitious acquisition of information, or for permitting its extraction by unauthorized
persons. In addition, there may be certain key personnel, for example systems
programmers, systems analysts, and commercial consultants, with unique knowledge of
the IT system security features and hence the potential to compromise them.
11. This section is to provide details, where appropriate, of all aspects of personnel
security, including:
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
d. Any specific details relating to certain ancillary staff such as cleaners and
workmen.
e. Any specific details relating to who is allowed access to each site, building,
room, etc.
Document Security
12. In an IT system the volume and compactness of the information processed, its
ready accessibility, and the ease and speed of copying data, sometimes at remote
locations, underlines the need for strict document security measures.
13. It is to be remembered that "document" covers all forms of media holding sensitive
information, for example, paper documents, magnetic media, other machine-readable
media, microfilm and fiche, printer ribbons, etc.
14. This section is to provide details of, where appropriate, the following:
c. Procedures for the acquisition, storage, and control of, and accounting for,
magnetic and other machine-readable media.
Computer Security
15. Hardware and software security mechanisms can contribute separately and in
combination to the security of an IT system by providing facilities for:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Hardware Security
16. Hardware security refers to the protective security features provided by the physical
components of an IT system. This sub-section is to provide details of, or make reference
to, where appropriate, the following aspects of hardware security:
d. Procedures for the institution of regular (preferably daily) checks for signs of
tampering with equipment and to ensure that hardware cabinets are kept locked
in normal circumstances.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
Software Security
17. Software security refers to the protective security features which may be provided
by:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
18. This sub-section is to provide details, where appropriate, of the method of use and
control of any protective features provided by software, specifying in particular the:
e. Control over the facilities for copying or modifying the operating system
software, with details of the authority and documentation required.
19. This sub-section is also to provide details, where applicable, concerning system and
application software, including:
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
c. Protective Marking.
e. Copying controls.
f. Use of macros.
20. The sub-section on Monitor and Audit is to be a summary of all monitoring and
audit procedures, both manual and system maintained, and individual allocation of
responsibilities relevant to the IT system/network. It is to include:
a. The procedures for running monitor programs and details of audit facilities.
b. Details of the security journals and how they are to be used, both for error
investigation and for specific file, or personnel, oriented event or activity tracing
as well as general scanning for abnormal trends.
c. The arrangements for the regular inspection of the audit trail, in order to
enable unauthorized access, or attempts, to be discovered promptly and allow
appropriate remedial action to be taken.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
21. This section is to provide details of the regular, security relevant, back-up
procedures including, where appropriate:
b. Frequency of back-up.
22. This section is also to provide details of, or refer to, the security procedures,
including emergency destruction procedures and those pertaining to recovery, to be
followed in the event of exceptional circumstances, for example:
f. Flood/liquid leakage.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
23. This section is also to provide a summary of, or refer to, the exercising of
emergency and contingency procedures, and the frequency with which exercises take
place.
Communications Security
Crypto Security
26. This sub-section is to provide details of, or make reference to, the following
aspects, of crypto security where appropriate:
Emission Security
27. This sub-section is to provide details of, or make reference to, the following
aspects, where appropriate, of emission security:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Transmission Security
28. This sub-section is to provide details of, or make reference to, the following
aspects, where appropriate, of transmission security:
Configuration Management
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
30. This section is to provide details of, or make reference to, the following features of
a configuration management plan where these relate to security aspects of hardware,
firmware, and software:
e. The controls applicable to changes in source code, the running version of the
object code, test features, and test documentation.
f. The controls applicable to providing assurance that the current version of the
system maps consistently with the documentation and associated code.
g. The controls applicable for the generation of a new version of the system
including utilities and software packages.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Conclusion
32. SyOPs form an essential component of how security is applied to IT systems and
networks and address all aspects of security, not just hardware and software. SyOPs
should be formulated with great care and attention to detail. Users should be made fully
conversant with their relevant aspects of the SyOPs and understand their implications in
order that they may play their full part in the achievement of overall security and should
sign to signify that they have read them.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
ANNEX G TO
CHAPTER 3
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
ANNEX H TO
CHAPTER 3
REFERENCES
BASIC INFORMATION AND SECURITY SCOPE SUMMARY
Key Security Characteristics Maximum Minimum Criticality Authorisation
Protective Clearance Level
Marking
Business Yes No N/A
Infrastructure Yes No N/A
Connections Yes No N/A
Security Risk Category
Project reference
Accreditor(s)
Next Project Milestone & Date
Document Status
Approved by
Prepared by
1. Give a paragraph describing the objective of the project and references to further
information.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Appraisal
8. Give the results of an appraisal of the key security risks to the operational system
arising from the overall requirements, making clear any assumptions. Security
concerns that give rise to project risk should be identified. Describe why other
security concerns are not considered to be a risk to the project.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
Project Milestones
12. Identify any agreements with the accreditor that are anticipated for key project
milestones, such as Initial Gate, Main Gate, ITT for a development contract, user
trials and evaluation or Health Check activities.
Project Security
13. Identify any factors affecting project security, for example the need for cleared
development staff or a secure development area.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
ANNEX I TO
CHAPTER 3
Template
1. An Infosec Management Plan (IMP) is one of the concepts being developed under the
Domain Approach, and a formal template was not available at the time of publication.
Instead, the following general guidance should be taken in account when producing an
IMP. In due course, this Annex will contain a template, supported by guidance in
Defence Information Assurance Notice No 7 ‘Security policy Documentation’.
General Guidance
2. An Infosec Management Plan (IMP) is concerned with the accreditation process for
a project, or group of related projects. It does not provide evidence in support of
accreditation.
3. An IMP is the means whereby agreement is reached with the accreditor on what is
necessary in this particular project(s) for the Accreditation Evidence Statement (AES)
for each accreditation decision and what additional agreements with the accreditor are
planed during the project. An IMP will contain much of the information that would
normally be provided in Chapter 1 (Introduction) of a Memo 5 SSP. Note that an IMP
may also be used to describe generic requirements for several projects, as a
replacement for a Memo 5 Community Security Policy (CSP).
4. The level of detail appropriate for an IMP will depend upon the complexity of the
project(s) and Infosec detail in other project documentation and plans. In some cases,
an IMP may be a simple extraction of relevant information from other documentation
that is presented to and endorsed by the accreditor. In other cases, the IMP may be
component of the general project documentation.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
6. Not all information need necessarily be known at each stage in the project.
Furthermore, as the IMP is a management tool, not all the information need
necessarily be formally endorsed by the accreditor. However, the accreditor may be
able to provide advice, based on experience and knowledge of projects.
UNCLASSIFIED
RESTRICTED
Security Policy Documentation
APPENDIX 1 TO
ANNEX I TO
CHAPTER 3
2. For those systems being procured under Vote 3 procedures, the Project
Management Authority (PMA) is responsible for seeking all approvals until the point
that the system is Technically Transferred (TT) to the OA or ESM.
6. For projects that are not, or have not as yet, adopted the portfolio approach to
security an AES should still be produced as a standalone document unless or until an
RESTRICTED
UNCLASSIFIED
Defence Manual of Security
8. The structure of the AES has been designed to allow as much essential
information as possible to be summarised on ideally one side of A4. The header
block is largely self-explanatory, but the main body of the table need some
clarification :
UNCLASSIFIED
RESTRICTED
Security Policy Documentation
RESTRICTED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
ANNEX J TO
CHAPTER 3
Template
General Guidance
2. Not all projects will need to conduct an Infosec Risk Management Appraisal.
Whether one is required it is expected to have been be agreed with the accreditor
through the Infosec Management Plan (IMP).
b. Select an option;
c. Agree a plan between the project team, user community and accreditor(s)
that is likely to provide an accreditable, technically feasible and
operationally effective system;
d. Record the rationale for the above decision, to facilitate impact assessment
for future change proposals;
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
e. Identify the key risks to the project arising from the agreed plan and how
these will be managed;
f. Ensure that the resources likely to be required to develop, document and
maintain security for the chosen option have been identified by the project.
5. An IRMA document should contain, for each option that was considered
during the appraisal:
,
a. A description of the security aspects of the business requirements with no
significant uncertainty remaining. This should cover all areas of business,
including the Information Exchange Requirements for the business done
with any existing or planned interconnected systems;
f. Any links and dependencies with other projects or organisations and the
relationship to high level requirements, such as those in the organisation’s
Business Continuity Plan;
g. The key assumptions and decisions made and the reasons for acceptance or
rejection;
6. An IRMA should also identify how the risks arising from the chosen option
will be managed.
7. Note that the business requirements need not be the same for each option, but
may be modified to compromise on possible a workable secure solution. For example,
JSP 440 Volume 3 Issue 2 3J-2
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
a business aspiration for web sharing may be modified to email to accommodate the
need for a wide disparity between the clearances of people who aspire to share the
information. Alternatively, the business process could be modified to exclude those
with insufficient clearance from the web. The IRMA discusses the impact of such
compromises on the business aspirations, for example the business impact of email
rather than web or of a smaller group sharing the web.
8. An IRMA should always be agreed between the project, user community and
accreditor. Responsibility for production of an IRMA would rest with the project,
although it may be produced in conjunction with industry consultants and security
advisors.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
ANNEX K TO
CHAPTER 3
Template
General Guidance
2. A Security Risk Assessment (SRA) is the document that justifies the security
requirements placed on the Target of Accreditation. It is largely equivalent to Chapter
3 (Security Requirements) of a Memo 5 SSP.
3. The required contents of the SRA should be agreed with the accreditor as part
of the Infosec Management Plan (IMP). A SRA may contain:
f. A Risk Register identifying all security risks and how they are to be
disposed. This will identify those:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
ANNEX L TO
CHAPTER 3
Template
General Guidance
2. A SRS defines the detailed security requirements for a specific Target of
Accreditation against which the effectiveness of an implementation, or proposed
implementation, can be assessed. An early version may also be used to support the
ITT for a development contract. A SRS is equivalent to Chapter 2 (System
Description) and some parts of Chapter 5 (Security Measures) of a Memo 5 SSP.
3. The required contents of the SRS may be agreed with the accreditor as part of
the Infosec Management Plan (IMP). It is suggested that an SRS should contain the:
i. The description will identify all the business data that requires
protection and everyone who is involved in that business;
ii. This description must include all interconnected systems and the
nature of the permitted connections. Hence it is a description of the
total information process from a security viewpoint, including the
Information Exchange Requirements.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
iii. This description must have been agreed as workable with the user
community;
b. Required security functions of the Target of Accreditation;
e. Details of which aspects of the above (a-d) are outside the scope of this
Target of Accreditation and any security relevant assumptions that have been
made about them;
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
ANNEX M TO
CHAPTER 3
Template
1. The Security Aspects of the Design (SAD) document is one of the concepts
being developed under the Domain Approach, and a formal template was not available
at the time of publication. Instead, the following general guidance should be taken in
account when producing a SAD. In due course, this Annex will contain a template,
supported by guidance in Defence Information Assurance Notice No 7 ‘Security Policy
Documentation’.
General Guidance
2. A SAD describes how the design and implementation of the system meets the
requirements defined in the Security Requirements Statement (SRS). The SAD is also
a key document with respect to risk traceability and can be used to ensure that
proposed changes to the Target of Accreditation remain secure, as it links the
implementation, SyOPs, Interconnection Security Measures Statements (ISMS), etc.,
to the Security Requirements Statement (SRS), and hence to the risk assessment in the
SRA.
4. The required contents of a SAD, and any outline to be produced by the bidders
for a development contract, should be agreed with the accreditor as part of the Infosec
Management Plan. It is suggested that a SAD should contain:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
c. The assumptions that have been made about security that is outside the
scope of the Target of Accreditation, and references to any relevant documents
such as Service Level Agreements, Codes of Connection, Site Security Plans
or Business Continuity Plans;
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
ANNEX N TO
CHAPTER 3
1. The following represents a high level summary of the types of information that
should be contained in a System Configuration Model (SCM).
2. It does not presume any particular methodology for maintaining this information,
with examples currently in use being:
d. System options, such as BIOS settings and hard disk partition formats;
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
ANNEX O TO
CHAPTER 3
This generic template must be tailored so that it specifies conditions applicable to the
assumptions of the project’s risk assessment and the services being provided.
Purpose
Authority
Signature
Post
Date
<name> System Signature
Operating Authority Post
(SOA) Date
References
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Conformity
Condition Specification
CoCo-1 A Connected System must be accredited as meeting national and
departmental minimum standards, in accordance with JSP440.
CoCo-2 The minimum standards applicable to a Connected System shall
be the greater of those required for the maximum security
markings of data handled by the Connected System and <name>.
CoCo-3 The impact of all proposed changes to a Connected System shall
be assessed for their impact on <name>.
CoCo-4 All existing and planned direct and indirect onward connections
from a Connected System shall be brought to the attention of the
<name> SOA prior to connection to <name>, and explicitly
identified in the SOCC.
CoCo-5 The minimum clearance on a Connected System shall be
<clearance>.
CoCo-6 No data Protectively Marked above <PM> shall be exchanged
with or over <name>.
CoCo-7 All points of connection to <name> shall be within <geographical
area>.
CoCo-8 Data may only be exchanged with or over <name> using the
permitted types of business connection defined in the <name>
accreditation documentation, Ref. A.
CoCo-9 Data exchanged with or over <name> must comply with the
constraints on communications protocols defined in the <name>
accreditation documentation, Ref. A.
CoCo-n Add, delete or amend as required
Valid assumptions
4. A Connected System may make the following assumptions about the security
provided by <name>:
<insert list>. The list of assumptions about security must correspond to the
functional services offered to a Connected System.
Administration
5. Systems must complete and supply a signed copy of the SOCC given at
Appendix 1 to the <name> System Operating Authority (SOA) prior to
connection.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
Additional connections
Authorisation
On the basis of the information made available to them, and to the best of their
knowledge, the undersigned agree that <connected system name>, as defined by Ref.
A, conforms to the requirements of Ref. B.
Signature:
Post:
Name:
Date:
Signature:
Post:
Name:
Date:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
ANNEX P TO
CHAPTER 3
Introduction
1. An Interconnection Security Measures Statement (ISMS) is equivalent to a
short form Memo 5 SISP. An ISMS should contain the following as set out in the
template below:
…………………………… …………………………….
(name) (name)
(title) (title)
System Operating Authority System Operating Authority
……………………………. ……………………………….
(name) (name)
(title) (title)
System Accreditor System Accreditor
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
References:
[…] of […] SPD for [name of first system]
[…] of […] SyOPs for [name of first system]
[…] of […] SPD for [name of second system]
[…] of […] SyOPs for [name of second system]
This ISMS covers the link, called [name of link (if applicable)], between [name of
first system] located in [location of system] and [name of second system] located in
[location of system]. The link enables the controlled transfer of [data files /
Electronic Mail …] between the two systems.
[First System Name] has been granted [Interim / Full] Accreditation and is permitted
to handle data protectively marked up to [RESTRICTED / CONFIDENTIAL /
SECRET / TOP SECRET]. It also has approval to handle the following: - [COMINT
/ UK EYES / VRK …].
The lowest clearance of any user of [first system name] is [BC / SC / DV]. [Any
other significant aspects of clearance, e.g. all users have a STRAP briefing, to be
included].
[Second System Name] has been granted [Interim / Full] Accreditation and is
permitted to handle data protectively marked up to [RESTRICTED /
CONFIDENTIAL / SECRET / TOP SECRET]. It also has approval to handle the
following: - [COMINT / UK EYES / VRK …].
The lowest clearance of any user of [second system name] is [BC / SC / DV]. [Any
other significant aspects of clearance, e.g. all users have a STRAP briefing, to be
included].
[…] information shall not be transferred between the systems [via E-mail …].
[…] data may only be transferred using [special software / procedures …] and
subject to the formal agreement [Reference …].
[First System Name] operated in [DEDICATED / SYSTEM HIGH /
COMPARTMENTED / MULTI-LEVEL SECURE] mode of operation.
[Second System Name] operated in [DEDICATED / SYSTEM HIGH /
COMPARTMENTED / MULTI-LEVEL SECURE] mode of operation.
No additional category of material may be put onto either system, nor may the secure
mode of operation be changed, without prior approval of the appropriate security
authorities.
Each System Operating Authority must inform the other System Operating Authority
of any changes that may have an impact on security, especially changes to
connectivity. This document is be reviewed annually on [review date] by signatories,
or their successors, to confirm that the above conditions still apply.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
ANNEX Q TO
CHAPTER 3
Template
Introduction
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
3. Procedural measures are a prerequisite foundation for security, and where the
appropriate foundation has not been laid then it will be almost impossible to implement
a secure system.
5. Users should be required to sign to confirm that they have sighted and
understood SyOPs at commencement of access to any CIS, and thereafter at a
frequency to be agreed with the Accreditor.
6. The single set of SyOPs that are utilised for standalone computers or small
networks will not be adequate for more complex systems, as these will require
considerably more attention to the responsibilities of the staff actually running the IT
system.
8. SyOPs should:
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
APPENDIX 1 TO
ANNEX Q TO
CHAPTER 3
IRP Template
3. An IRP is one of the concepts being developed under the Domain Approach,
and a formal template was not available at the time of publication. Instead, the
following general guidance should be taken in account when producing an IRP. In due
course, this Annex will contain a template, supported by guidance in Defence
Information Assurance Notice No 7 ‘Security Policy Documentation’
Background
4. Terminology :
5. The following matters serve as indicative list of the issues that may be
considered as CIS Security Incidents :
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
a. Damage / disaster ;
b. Theft ;
c. Physical infiltration ;
d. Hacking :
(i) Internal ;
e. Misuse of resources;
f. Malicious software:
(i) Virus;
(ii) Worm;
(iii) Trojan;
h. Personnel error;
i. Personnel shortage.
7. How ?
9. Recording of Incidents
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
Triage
11. The term “Triage” is used to describe the assessment of severity of any incident,
and deciding the mature of follow up action required.
12. Upon detection of an Incidents, apply the following 5 stage analysis to decide
upon action required :
13. Where the response required is dependent on Criticality Level (CL) of the CIS
affected, the following metric should be applied
Escalation Routes
14. During working hours, incidents should normally be progressed through the
Security Chain of Command if applicable, but for times where it is unclear within
which PSyA remit a matter lies, or for significant issues that occur outside core
working hours, the MOD maintains an Information Security Duty Officer (ISyDO),
which is a role fulfilled by members of D Def Sy staff.
15. The ISyDO is nominated to the Government CERT as the MOD’s first point of
contact for information security problems, and for OGDs reacting to electronic attack.
16. During core working hours, the ISyDO can be contacted via the D Def Sy Duty
Line. The Ministry of Defence Police (MDP) Central Information Room (CIR) act as
the initial point of contact for the ISyDO outside core working hours, and can be
contacted as follows:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Reporting
17. It is required that all suspected, attempted, or actual incidents and
weaknesses are to be reported to the relevant Security Authority(s), via the
security chain of command if applicable.
20. Where possible, such reports are to made by PRIORITY signal, or facsimile, in
order not to delay a return to normal working whilst a security investigation takes place.
A signal format is given at Annex A to Chapter 10. If in doubt, contact the security
chain of command.
21. In all cases, a full UNIRAS report is to be made using form GS490 ("Report of
IT Security Incident") or GS490A ("Report of IT System/Product Weakness"), marked
according to the maximum protective marking of the data processed, minimum
RESTRICTED (see Annex B).
22. The form is to be completed by the unit/establishment at the site of the incident
and is to be sent to the relevant Security Authority, via the security chain of command.
If in doubt as to which form to complete, contact the security chain of command or
Security Authority. On no account is the vendor of a faulty product to be informed
without first seeking the advice of the Security Authority.
Breaches
23. Certain categories of incident will where it is likely that a compromise of
Protectively Marked Information require more in-depth investigation, and
ESyOs/ITSOs should consult the PSyA or ISyDO direct for instances of :
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
25. The Ministry of Defence Police has a special investigative capability for
Computer-based evidence, who can be contact for advice :
26. Malicious Damage and Theft. Deliberate damage to, and theft of,
MOD CIS asserts is clear indication of a criminal act having occurred, and other than
in cases where a serious breach of security has also occurred, the pursuit of such
incidents should normally be through the Ministry of Defence Police (MDP) or, for
cases solely involving Service Personnel, the appropriate Service Police.
29. Misuse of resources. Improper use of MOD CIS facilities comprises an ever
widening range of activities and behaviour, contrary to Security Operating Procedures
(SyOPs), sound practice, or commonsense. It can be as a result of a deliberate action,
or of an unintentional action or failure to act, but for the purposes of this manual, CIS
improper use is defined as the deliberate, inappropriate or illegal use of any part of the
MoD’s IT facilities.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
30. A general list of prohibited use of MOD CIS can be found at Annex E, with the
most common incidents including the sending of offensive/abusive or excessive
(“spam”) e-mail; the use of e-mail or other facilities for private commercial purposes;
the use of sexually explicit material as desktop `wallpaper’; the importation,
distribution and use of unauthorised software (including graphics files, text files,
computer games and many other variants); and accessing, without permission, of non
work-related Internet sites, typically for Downloading or Forwarding of Indecent
Material.
31. All staff are responsible for ensuring that both they, and their colleagues, use
these facilities in an appropriate, lawful and effective manner. All staff have a
responsibility to report to their line management any suspected cases of IT misuse
which they encounter, irrespective of their personal views on the severity of the alleged
offence, or whether or not they have been directly affected or offended by the activity in
question. Someone receiving, for example, sexually explicit material via MoD IT
facilities has a responsibility to report the matter, even if they do not personally take
offence.
32. Line managers, in turn, must consider what, if any, action to take in accordance
with the relevant disciplinary procedures set out in the MoD Personnel Manual and
other Instructions. Disciplinary action may be taken against any member of staff who
misuses MOD’s IT facilities, or even attempts to do so. This may result in dismissal.
33. When undertaking evaluations prior to contacting MDP where cases of misuse
are suspected, care should be taken not to take any action that might later prejudice a
criminal investigation. Guidance on preservation of evidence is given at Annex D.
34. Before taking an action therefore, Security Staffs should contact either the
designated Information System Misuse Officer (ISMO) within their PSyA, or, for
urgent matters outside of core hours, the MOD Information Security Duty Officer
(ISyDO), who will advise on appropriate action to be taken. Where criminal activity is
suspected, the involvement of the Ministry of Defence Police (MDP) or, for cases
solely involving Service Personnel, the appropriate Service Police, will normally be
sought thereafter.
35. In the particular case of any case of Indecent or Obscene Material being found
on systems, due to certain legal requirements it is stressed that all local investigations
should be ceased until either a Police Officer ,or a PACE trained ISyDO / ISMO
registered with the MDP, can be attend to assess whether the material discovered does
indeed constitute “Indecent or Obscene” matter, and use an agreed severity
categorisation to determine whether the matter should be progressed as Disciplinary,
Security and/or Police matter.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
36. It should be noted that the involvement of Police may have serious implications
for business continuity where, for example, it is necessary to impound CIS equipment
in order to carry out any investigations arising.
System Weaknesses
38. IT systems often contain faults which come to light only after extensive use, or
when unusual conditions enable them to be discovered. Occasionally, these faults are
already known to the manufacturer or supplier; often, they are not.
39. In order that the appropriate security and/or technical authorities can react to
make systems less flawed or susceptible to misuse, possible security weaknesses or
faults, are to be reported. The importance of reporting these incidents cannot be over-
emphasized. Even a problem discovered on an UNCLASSIFIED computer may have
implications for a Protectively Marked system running on similar hardware or software,
or using similar procedures. Moreover, systems may have an operational significance
additional to the level of protection required by the data held. All such incidents are to
be reported.
Hoaxes
40. The Internet is constantly being flooded with information about Malicious
Software (e.g. computer viruses and Trojan Horses). However, interspersed among real
Malicious Software warnings are hoaxes. Whilst these do not infect computer systems,
they are still time consuming and costly to handle.
41. In particular, a number of issues are commonly raised about emails, and the
following should therefore be noted :
c. Messages may also contain URLs or hypertext links that point to Web-
sites with malicious code that can unwittingly be imported by the user.
42. All Malicious Software alerts confirmed as originating from UNIRAS may be
regarded as Authoritative, and only MOD Security Authorities, CM(IS), or the Sector
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
44. Should the Hoax DIAN not reference the matter reported in the unconfirmed
warning, for instance in the case of “new” Hoaxes, then the following list of Internet
Uniform Resource Locators (URLs) are useful Open Source references on this topic,
which are widely accepted as being Authoritative Public Domain Sources, and will
normally be kept current with the newer Hoaxes :
http://ciac.llnl.gov/ciac/CIACHoaxes.html
http://www.datafellows.com/hoax.html
http://www.drsolomon.com/vircen/vanalyse/va005.html
http://kumite.com/myths
http://www.sophos.com/virusinfo/scares/
http://www.symantec.co.uk/avcenter/hoax.html
45. Where no such correlation is found, PSyA should then be consulted who will
advise as to whether a UNIRAS Report to definitively establish the veracity of the
alleged Alert is required.
Investigations
46. Investigations into minor breaches and compromises are normally performed on
behalf of the Head of Establishment by local Security Staffs, and Major Investigations
will be performed under the remit of a PSyA in the case of systems with Sole
Accreditation, or an Accreditation Panel for Joint Accreditation.
47. Major investigations will normally carried use the specialist security staffs
provided at Sector levels for the Inspection function, and may be augmented by
additional staffs from other areas of MOD, Government, Police, or contract support
personnel, where particular technical or investigative expertise is required.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
Recovery
50. How ?
Closures
51. How ?
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
APPENDIX 2 TO
ANNEX Q TO
CHAPTER 3
2. The full topic of Business Continuity Planning (BCP) is without the scope of
JSP440, and units wanting further information should contact :
Name
Post
Telephone
3. The system Accreditor will however wish to see that at least the system specific
elements of BCP have been addressed in the form of a Emergency and Contingency
Plan, which will normally be provided as an Annex to the Security Management Plan
(SMP). Security Operating Procedures (SyOPs) should also contain links to the ECP,
normally within the Technical Operation and Maintenace Security Instructions
(TOMSyI), but if relevant also within the User Security Instructions (USyI).
Situation
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Back-up Procedures
6. Back-ups should be afforded the same protection as the live data held on the
system. Back-ups should be held separately from the live data and ideally in a different
location to the system.
Content
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
Relevance
8. Emergency and contingency plans are to be relevant to the system they refer to.
9. In determining the pre-planning that will be required for an ECP, the following
table should be used, based on the Criticality Level (CL) of the CIS in question. It
should be noted that measures are additive, so that the requirement for CL1 includes all
those specified for CL2-4.
10. The efficacy of an ECP can only be achieved if they are exercised regularly.
These exercises should not be restricted to the same scenarios but to all scenarios
identified in the threat to the system. A regular programme of exercises are to be
established and practised. Lessons learnt are to be promulgated among the staff and
SyOPs altered if required. Similarly the plans may need to be amended.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
ANNEX R TO
CHAPTER 3
1. Introduction.
a. Aims of SyOPs.
List any systems that are networked and have their own System Operating
Procedures.
(3) State the highest protective marking level on the system and mode
of operation (eg System high).
b. Unix specifics.
UNCLASSIFIED
UNCLASSIFIED
3. Personnel Security
a. Introduction.
Training courses.
Maintain awareness.
Annex so that the list can be changed without having to agree the whole
document.
4. Physical Security
a. Introduction.
Note the risk of gaining 'root' privileges through access to system equipment and
console.
Root, superuser or other system wide privileges (Annex)
Disabling logins.
Hardware/software disabling of communications external to the area.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
5. Document Security.
a. Introduction
Definition of document.
Delaying prints.
Labelling.
Access to media library.
Destruction procedure.
Logging use.
Policy on import of media (eg virus control)
6. Hardware Security.
a. Introduction.
UNCLASSIFIED
UNCLASSIFIED
Change control.
(1) General.
Security rules
Checking for protectively marked data on system.
Downgrading beforehand.
Running HW diagnostics.
7. Software Security.
a. Introduction.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
Disabling logins
Access to peripherals.
Building Unix
Device drivers.
d. Purging memory.
Uses of accounts
Account numbers.
User privileges
Special purposes.
Special privileges
Special purposes
UNCLASSIFIED
UNCLASSIFIED
f. System software.
(5) List of SUID programmes and reasons for use and the UID and GID
assumed by each program.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
g. Auditing.
Notification to:
/tmp area.
/usr/tmp
/usr/spool/...
UMASK setting.
a. Classified working.
Clearing screens
Any special logout processes.
UNCLASSIFIED
UNCLASSIFIED
Dial in.
Distributed processing.
System network files eg hosts. equiv, -rhosts communications to be used
eg SENDMAIL, RLOGIN, TELNET, FTP, NFS, NIS.
Both annexes below can be repeated as many times as necessary to cover proprietary
network architectures.
Each one need not be very long because it covers only the security aspects of
management.
Annex A to Section 8.
This is general guidance to be supplied to the terminal user on how to keep the system
secure while using a terminal.
(1) Introduction.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
(3) Printing.
Annex B to Section 8.
h. Network security.
(3) General.
a. Introduction.
b. Unix integrity.
c. Master backup.
UNCLASSIFIED
UNCLASSIFIED
d. System monitoring.
Checks for user names in use, excessive privileges, number of device errors.
e. System auditing.
f. Security journals.
g. User Protection.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
(5) Access to 'root' should normally be via 'su' from an account unique to
the individual user if more than one user has access to 'root', rather than a
direct login to 'root' so that audit of who took superuser actions can be
made.
i. Viruses
Action to be taken.
UNCLASSIFIED
UNCLASSIFIED
a. Introduction.
b. Access to accounts.
(2) Passwords.
Restrictions
Use of.
(1) System.
(2) Software.
(3) Security.
UNCLASSIFIED
UNCLASSIFIED
Security Policy Documentation
ANNEX S TO
CHAPTER 3
paraX. The following sessions at different protective marking levels of data on separate
media sets are currently defined:
a. Protective marking level 1, [list here the serial numbers of the set of media.]
b. Protective marking level 2, [list here the serial numbers of the set of media.]
paraX+1. For each change between protective marking levels, the following procedures
are to be followed:
a. Close down the current session, remove and secure media at this protective
marking level and switch off all equipment for at least 15 seconds to allow
volatile memory to purge.
c. Obtain media for new protective marking level and reload all equipment in
accordance with standard procedures, thus establishing a dedicated session at an
alternative protective marking level.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Media Management
MEDIA MANAGEMENT
Chapter Para Page
04 Media Management
Introduction 0401
Definition 0402
Markings 0406
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Media Management
CHAPTER 4
MEDIA MANAGEMENT
Introduction
0401. In an IT system, the volume and compactness of the information being
processed, its ready accessibility, and the ease and speed of copying data, underlines the
need for strict document security measures. Protectively marked information held on IT
documents must be given a level of protection and control equivalent to that applied to
protectively marked documents in paper form. The general principles of document
security as described in other security documentation are to be applied. However, there
are certain problems specific to IT systems and these are addressed below.
Definition
0402. The following are to be considered IT documents:
a. Paper including:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
f. CCTV Screens.
0405. In the case of stand-alone PCs only, National and IDO information may be
held on the same hard or floppy disk subject to the following conditions:
a. The two classes of information are kept in separate directories which are
clearly labelled, or the disk is partitioned into more than one logical drive
and the national and IDO information kept in separate drives. Each drive must
be labelled.
UNCLASSIFIED
UNCLASSIFIED
Media Management
Markings
0406. Information which has been converted into machine-readable form and placed
on IT documents is to be marked as if it were in plain language. Similarly data, e.g.
numerical calculations, without headings or other identification is to be marked as if the
headings were included.
0407. All IT documents are to carry their markings in eye-readable form, this is not to
be lower than the highest marking of the data they bear (in most cases this is the highest
protective marking processed on associated system). Colour coding, using labels or the
issued media, is to be used to indicate the protective marking of documents.
e. Application programs.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
All storage media are to carry their protective markings and descriptors in eye-readable
form throughout their lives unless downgraded in accordance with paragraph 0442.
0410. Plain Language Documents. These are to be marked in accordance with the
provisions of other security documentation.
0411. Printer Output. The protective marking of printer output is to be marked in the
centre of the top and bottom of every page. This can be achieved through a program
instruction, by the use of pre-printed stationery, or manually. The protective marking
may alternatively be shown, within an installation, by using coloured stationery. If
coloured stationery is used, it is to conform to the protective marking colour code. The
use of yellow paper is permitted to distinguish compartmented (“codeword”) material
from other material of the same protective marking level. The pages of TOP SECRET
and SECRET output are to be page numbered either manually or automatically.
0412. Punched Paper Tape. Punched paper tapes are to be given a protective marking
in plain language near the start and finish of the punching and at both ends of each piece
of tape. Paper tape with pre-printed markings spaced at regular short intervals is also
available from HMSO.
c. The front of any suspension rings used to support the tape spools during
storage.
Magnetic tape, including its leaders and trailers should not be inscribed physically or
chemically with markings, nor have labels fixed directly to it. Labels should not be
attached to the collars of self-loading magnetic tapes.
UNCLASSIFIED
UNCLASSIFIED
Media Management
0415. Data Cartridge. The tapes in cartridges which hold large quantities of data
onwide magnetic tape are commonly inscribed by the manufacturer with a unique
number which is visible (on the tape itself) through the outer casing. This number
cannot be easily altered or erased and can serve as the registration number (para 0425
refers). Although the tape remains attached to the spool when the equipment is in
operation, the spool becomes separated from its outer casing. The outer casings are
interchangeable and external labels or markings should not, in any event, be applied to
them. Additionally, colour-coded cartridges are to be used in accordance with the rules
at Annex B.
0416. Floppy Disks (Diskettes). Floppy disks, or diskettes, are enclosed in a jacket
which is sealed by the manufacturer and should never be opened. Markings are to be
applied to labels fixed firmly to one side (whichever is specified by the manufacturer) of
disk jackets. Markings should not be heavily inscribed with the label in position, since
this could damage the floppy disk inside. If jackets are kept in paper or cardboard cases,
markings are to be applied to the front and back of the cases. For SECRETand above,
only pre-serial numbered, MOD supplied colour-coded diskettes are to be used unless
dispensation has been obtained from the Accreditor(s). Colour-coded diskettes are to be
used in accordance with the rules at Annex B.
0417. Removable Magnetic Disks. Removable magnetic disks and disk packs are to
have markings:
a. Indelibly written in felt pen directly on the top of the disk or disk pack
and also on the front for those that are used in PCs or portable systems. This
marking should, wherever possible, be placed so that it can be seen whilst the
item is in the drive.
b. Applied on labels fixed to the top and side of the plastic covers in which
the disk or disk packs are normally stored or housed.
0418. Fixed Magnetic Disks. Fixed magnetic disks vary considerably in size and
construction, and no general rule can be adopted other than that protective markings are
to be applied to the case of the equipment containing the fixed magnetic disk and these
items are then to be treated as items of classified equipment.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
0421. Other Devices. Different types of memory are constantly being developed.
They may present novel problems of applying protective markings and further advice is
to be sought through the security staff.
b. To restrict access to those with both security clearance and need to know.
0423. General Principles. The following principles are to be adhered to in all cases:
UNCLASSIFIED
UNCLASSIFIED
Media Management
with, the command security staff and system Accreditors(s) are to be consulted on the
detailed measures to be applied.
a. All the media protectively marked SECRET or above held in the custody
of a section or branch (probably in registration number order).
0426. Removable Storage Media. The following points should be kept in mind:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
0428. Printed and other human-readable output. Plain printed text or other output,
the nature and meaning of which can be readily assessed by the originator, is to be
protectively marked according to its content. This is in line with the general
requirements of other security documentation. Format, legibility, and volume of output
are to be within reasonable bounds. Technical, schematic or large volumes of data are
not suitable for such uncontrolled output and should therefore be protectively marked as
for the highest protective marking the system processes. The output should be inspected
to ensure that the security protective marking is correct.
UNCLASSIFIED
UNCLASSIFIED
Media Management
systems in particular occasionally use media for temporary storage, often without
the knowledge of the user.
(1) The procedures for handling all output are to be incorporated into
the system Security Operating Procedures (SyOPs) and submitted for
approval by the appropriate security authority prior to using the system.
The agreed SyOPs are to be brought to the attention of all users on a
regular basis.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
(1) Print the protective marking at the top and bottom of each page.
(2) Page number the pages of TOP SECRET and SECRET print
outs.
0431. Hard Copy Output from Program Testing. Programs are to be tested, as far as
possible, using unclassified dummy data. When it is necessary to use live protectively
marked data, the hard copy output is to be treated as protectively marked. Hard copy
output from test runs is not to be allowed to accumulate, but is to be destroyed when no
longer required.
0432. Graphs, Charts, Drawings etc. Output from other peripherals, such as plotters,
which produce eye-readable material should be dealt with in the same way as textual
print.
0434. Paper Tape. The output from paper tape punches presents additional problems
in that it is more difficult to identify the protective marking of the content. The
following measures will be necessary. Where possible the program or controlling
system software should punch, at the beginning of the paper tape, information on the
identity of the job, its owner and the security protective marking of the output. This
should be carried out in plain language. However, if this is not possible, means must be
readily available for the interpretation of the information as an essential part of the
output identification procedure.
UNCLASSIFIED
UNCLASSIFIED
Media Management
0438. Back-up copies of protectively marked files stored at a different location are to
be protected in accordance with the protective marking of the information stored.
0441. Wherever passwords are printed or written down, they are to be given protection
commensurate with the highest protective marking processed by the system to which
they refer. They should normally be stored under the same conditions as combinations
for manifoil locks; i.e. sealed in an envelope with clear instructions stating the
conditions under which it can be opened.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Details of the rules and procedures for clearing and purging are at Annex C.
UNCLASSIFIED
UNCLASSIFIED
Media Management
unless all magnetic storage devices, including fixed disks, have been removed and
retained or destroyed, or declassified if applicable, before returning the equipment. It is
NOT sufficient to over-write the disk several times see Annex C.
0448. The Security Equipment Assessment Panel (SEAP) Catalogue contains a list of
approved commercial facilities that can be used for the destruction of protectively
marked waste.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Media Management
ANNEX A TO
CHAPTER 4
2. a. In general terms, all information has some value whether that represents
the value of resources spent on its collection and recording or the value that can
be gained from its exploitation. When assessing its value a judgement has to be
made on the degree of damage likely to be caused to government assets caused
by compromise. The cause of compromise can be broken down into four
general groups:
(i) Disclosure.
(ii) Theft.
(iii) Destruction.
(iv) Tampering.
c. Also, in general terms, information can be owned and the owner can and
should be responsible for determining its level of protection (see paragraph 5
below). This includes information released to the UK Government by
international agreement or on a commercial basis.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
person (other than one authorised to receive it) is expressly forbidden by the Official
Secrets Act. The originator of "official" information is not, therefore, the owner of that
information. The rules for the protection of "official" information are based on the
allocation of a protective marking, the criteria for which are set out in other security
publications. The authority to allocate a protective marking is limited to certain ranks
and appointments, although in an emergency the originator of a document of any rank
may authorize any protective marking provided the definitions laid down are used and
can be justified.
National Caveats
4. Instructions for the use of national caveats are promulgated in other security
publications but some important extracts are set out here with regard to the two core
national caveats.
UNCLASSIFIED
UNCLASSIFIED
Media Management
Aggregation of Information
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Media Management
ANNEX B TO
CHAPTER 4
COLOUR-CODED MEDIA
Introduction
1. Diskettes and other items of storage media coloured green, pink, or red, are
available from the MOD ICS catalogue. The principles for using diskettes are set below.
Each disk uniquely numbered and indelibly marked 'MOD' and should be used as
follows:-
3. Hence, subject to paras 4 and 5 below, diskettes are only to be used if they are of
the colour appropriate to the highest protective marking of information for which the
equipment has been cleared (see table above). This also applies to diskettes which
contain programs or system software.
5. Where equipment has already been approved for use at different protective
markings at different times (dedicated sessions), then the appropriately coloured, or non
colour-coded, diskette may be used provided the equipment has first been purged of
more highly protectively marked data by an approved method. Approval for such use of
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Implementation
6. Each colour coded diskette has a unique serial number. Each pack of 10
contains consecutive numbers, displayed on the wrapping, and may be regarded as
unclassified until the packaging is broken. Base/Unit Security Officers are to record (by
serial number) the issue of packs to users, since each diskette is to be individually
accounted for. This will help security staff to trace the origin of misplaced media.
7. Once taken into use (as soon as the wrapping is broken) the individual items are
to be treated as protectively marked documents: they are to be labelled and recorded as
appropriate. When recording the diskette in a classified (or other, appropriate)
document register, the unique serial numbers printed on the diskettes are to be used.
9. Unless the protectively marked non colour-coded diskettes which have been
replaced or superseded meet the criteria laid down in Chapter 4, they may not be
de-classified nor down-graded but must be physically destroyed by an approved method.
10. The items listed below are now also available in a colour-coded range from the
MOD ICS catalogue and are mandated to be used, retrospective action is not required
but all new buys must be colour coded. The principles for usage are as given for
diskettes.
DC Data Cartridges
Mini Data Cartridges
4mm DAT Cassettes
8mm DAT Cassettes
8mm Exabyte Cartridges
3480 Series Archival Grade Cartridges
Archival Grade Reel to Reel Tape
Recordable CDs
UNCLASSIFIED
UNCLASSIFIED
Media Management
ANNEX C TO
CHAPTER 4
Introduction
1. When IT equipment becomes surplus to requirements care must be taken to
ensure that its disposal does not expose any protectively marked material which it has
processed or stored, to an unacceptable risk of compromise. This guidance applies to all
types of computer storage media: magnetic disks and tapes, optical disks, magnetic
computer memory and semi-conductor memory. Where it is impractical to separate the
computer storage media from the equipment of which it is a part, the guidance should
be taken to apply to the whole equipment.
3. The physical properties of storage media are such that, even after a thorough
overwriting, minute electrical or magnetic effects may remain. However it is a
technically complex operation, requiring specialist equipment and considerable
resources, to recover usable data.
Threats
4. The threat of protectively marked data being compromised is lowest when
storage media is released for re-use within the same or equivalent security environment.
The threat is significantly increased when storage media is released outside the secure
environment. Disposal of storage media on the open market, by resale or recycling,
increases the potential for data falling accidentally into the wrong hands or being
positively targeted. The threat may relate to the attractiveness of the data to an attacker.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
c. Cryptovariables;
Secure Erasure
6. Secure erasure defines a more thorough process than deletion and may comprise
of any of the following depending on the security risk assessment:
UNCLASSIFIED
UNCLASSIFIED
Media Management
10. Equipment meeting the SEAP Degaussing Standard Class 1 is acceptable for
secure erasure of media that has held RESTRICTED and Degaussing Standard Class 2
is acceptable for secure erasure of media that has held CONFIDENTIAL and above.
11. Staff should be aware that degaussing might not be fully effective on some of
the modern high-density back-up storage media. The approved equipments are not
suitable for degaussing magnetic tapes and cartridges with coercivity greater than
1700 Oersteds. When purchasing magnetic media, the supplier will be able to
provide information on its coercivity.
12. COTS overwriting products, which meet the baseline and enhanced standards
set out in CESG Infosec Memorandum No.7, must be used for secure erasure of media.
13. The Baseline Standard requirements for COTS overwrite utilities are:
b. Both overwrite and verification applications shall report the actual disk
capacity to be overwritten. (The actual disk capacity should be ascertained,
possibly by calculation, prior to overwriting since BIOS, FDISK, CHKDSK and
Windows etc, cannot be relied upon to accurately report disk capacity);
e. The verification application shall report any bad or unusable sectors that
cannot be overwritten;
14. The Enhanced Standard requirements for COTS overwrite utilities are:
b. Both overwrite and verification applications shall report the actual disk
capacity to be overwritten. (The actual disk capacity should be ascertained,
possibly by calculation, prior to overwriting since BIOS, FDISK, CHKDSK and
Windows etc, cannot be relied upon to accurately report disk capacity);
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
e. The verification application shall report any bad or unusable sectors that
cannot be overwritten.
17. Semiconductor Memory and Magnetic Media. For clearing of data up to and
including CONFIDENTIAL, overwriting products that meet the Baseline Standard
shall be used.
18. For clearing of SECRET and TOP SECRET data, overwriting products that
meet the Enhanced Standard shall be used.
19. A trusted computer system may have a mechanism that enforces an object re-
use policy, which ensures that non-privileged users cannot recover another user’s data
from recycled storage media. Systems that have an object re-use mechanism that is
assured (that is to say the implementation has been evaluated by an independent,
accredited, evaluation facility), meet the Baseline and Enhanced Standard requirements
for secure erasure for all protective markings.
20. Low level formatting refers to overwriting below the level of the operating
system. These formatting facilities tend to be manufacturer specific and may not be
readily available to users. Where it is possible to perform a low-level format, and
secure erasure can be positively verified, this will meet the Baseline Standard
requirements for secure erasure.
21. Optical Disks. Re-writeable optical disks that have held data up to and
including CONFIDENTIAL may be cleared in accordance with the Baseline Standard.
UNCLASSIFIED
UNCLASSIFIED
Media Management
Read-only and recordable (Write Once Read Many) optical disks cannot be cleared and
must be destroyed.
25. Before storage media that has held protectively marked data is released outside
the secure environment, it should be purged, after which it may be considered not to
require a protective marking.
26. Semiconductor Memory and Magnetic Media. Storage media that has held
attractive data (see para 5) should not be disposed of outside the United Kingdom. If it
is located outside the United Kingdom and cannot be returned, then the only practical
solution is destruction.
27. Before releasing storage media within the United Kingdom, that has stored held
attractive data other than SECRET, whether for disposal, repair, exchange or return
after hire, advice should be sought from the national security authorities, through the
appropriate PSyA security staff and D Def Sy.
28. When releasing storage media that has held other protectively marked data, for
re-cycling, resale or destruction, local security staff should be satisfied that it has been
properly purged and therefore no longer needs to be protectively marked.
29. For purging of data up to RESTRICTED, overwriting products that meet the
Baseline Standard should be used. Alternatively the media may be degaussed using
equipment meeting SEAP Degaussing Standard Class 1.
30. For purging of data up to SECRET, overwriting products that meet the
Enhanced Standard should be used. Alternatively the media may be degaussed using
equipment meeting SEAP Degaussing Standard Class 2.
31. If hard disk drives are to be degaussed, the drive assembly must be removed
from its housing or caddy to expose the platters before degaussing. If it is not possible
to remove the drive, overwriting or destruction are the only options.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
32. In some circumstances, where particularly sensitive or attractive data (see para
5) has been stored, then destruction may be considered the only secure disposal option.
Destruction may also be preferred in other cases as representing the most economical
security measure, given the relatively low cost of magnetic media).
33. Optical Disks. Re-writable, read-only, recordable (Write Once Read Many)
optical disks shall be destroyed in accordance with the SEAP guidance.
35. Leased equipment containing non–removable storage media should have the
media purged before it is returned to the vendor.
37. Repair or exchange of computer storage media should be carried out either in
situ within the secure controlled site, or at a suitable List X facility. In extreme
circumstances, where on-site/List X facilities are not available, the faulty media may
need to be escorted by suitably cleared/qualified personnel to a non-List X contractor’s
premises to oversee the repair or exchange. The repair and return of storage media
should be supervised at all times.
Disposal by Destruction
38. Protectively marked IT equipment and media can be disposed of by using an
approved method of destruction. MOD and Government approved commercial
facilities exist to undertake destruction. The SEAP catalogue contains a list of approved
commercial facilities that can be used for the destruction of protectively marked IT
equipment and media. The advice of the appropriate PSyA security staff should be
sought regarding requirements for destruction of protectively marked IT equipment and
media.
Security Approval
39. The authority of the ITSO is to be sought prior to the reallocation or disposal of
protectively marked IT equipment.
UNCLASSIFIED
UNCLASSIFIED
Media Management
Erasure Requirements
40. The erasure requirements for different types of media for re-use, disposal and
repair/exchange are set out in Appendix 1.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Media Management
APPENDIX 1 TO ANNEX C TO
CHAPTER 4
Notes:
1. In accordance with the Baseline overwriting Standard.
2. In accordance with the Enhanced Overwriting Standard
3. All degaussers must comply with the SEAP standards
4. Destroy – Disintegrate , incinerate, pulverise, shred or melt.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
MAGNETIC
TAPES RE-USE DISPOSAL REPAIR/EXCHANGE
Baseline Enhanced Baseline Enhanced Baseline Enhanced
Standard Standard Standard Standard Standard Standard
TYPE I Any Any Any Any Any approved Any approved
(up to 350 Oe) approved approved approved approved Class 2 Class 2
1 1 1
degausser Class 2 Class 1 or 2 Class 2 degausser degausser
1 1 1
degausser degausser , degausser ,
2 2
or destroy or destroy
Notes:
UNCLASSIFIED
UNCLASSIFIED
Media Management
MAGNETIC
MEMORY RE-USE DISPOSAL REPAIR/EXCHANGE
Baseline Enhanced Baseline Enhanced Baseline Enhanced
Standard Standard Standard Standard Standard Standard
1 2 1 2 1 2
MAGNETIC Overwrite , Overwrite , Overwrite , Overwrite , Overwrite , Overwrite , or
3 4 3 or 4 4, 3 or 4 4
BUBBLE or degauss or degauss degauss , or degauss degauss degauss
or 4 5 5
MEMORY or destroy or destroy
1 2 2 2 1 2
MAGNETIC Ovewrite , Overwrite , Overwrite , Overwrite , Overwrite , Overwrite , or
3 4 4 4 3 or 4 4
CORE or degauss or degauss degauss , or or degauss , degauss degauss
or 4 5 5
MEMORY destroy or destroy
Notes:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
SEMI-
CONDUCTOR RE-USE DISPOSAL REPAIR/EXCHANGE
MEMORY Baseline Enhanced Baseline Enhanced Baseline Enhanced
Standard Standard Standard Standard Standard Standard
1 2 1 2 1 2
RAM Overwrite Overwrite Overwrite Overwrite Overwrite Overwrite ,
then then then then remove
remove all remove all remove all all power
power, or power, or power
7 7
destroy destroy
1 2 1 2 2 2,3
DRAM Overwrite Overwrite Overwrite Overwrite , Overwrite , Overwrite ,
7
or remove then then or destroy then leave then leave
all power remove all remove all powered-up powered-up
power power, or for 72 for 72 hours
7
destroy hours
4 5 4 5 4 5
EPROM UV erase UV erase UV erase , UV erase UV erase , UV erase
then then then then
1 2 1 2
Overwrite , Overwrite Overwrite Overwrite
7 7
or destroy or destroy
6 6 6 6
FLASH Chip Chip Chip erase Chip erase Chip erase Chip erase
6 6
EPROM erase or erase then then then then then
1 2 1 2 1 2
Overwrite Overwrite Overwrite , Overwrite , Overwrite Overwrite
7 7
or destroy or destroy
6 6 6 6
EEPROM Chip Chip Chip erase Chip erase Chip erase Chip erase
6 6
erase or erase then or then then then
1 2 1 2 2,3 2,3
Overwrite Overwrite Overwrite Overwrite Overwrite Overwrite
7 7
or destroy or destroy
7 7 7 7 7 7
OTHER Destroy Destroy Destroy or Destroy or Destroy or Destroy or
DEVICES or seek seek CESG seek CESG seek CESG seek CESG
CESG advice advice advice advice
advice
Notes:
1. In accordance with the Baseline Overwriting Standard
2. In accordance with the Enhanced Overwriting Standard
3. Each overwrite shall reside in memory longer than protectively marked data.
4. Ultra-Violet (UV) erase in accordance with manufacturers’ recommendations.
5. Increase UV erase time by a factor of 5
6. Full chip erase as per manufacturers’ data sheets.
7. Destroy – Disintegrate, incinerate, pulverise, shred or melt.
UNCLASSIFIED
UNCLASSIFIED
Media Management
OPTICAL
DISKS RE-USE DISPOSAL REPAIR/EXCHANGE
Baseline Enhanced Baseline Enhanced Baseline
Standard Standard Standard Standard Standard Enhanced
Standard
RE-
1 3 1 3 1 3
WRITABLE Erase Destroy Erase or Destroy Erase Destroy
2
CD-RW destroy
DVD-RAM
DVD-RW
READ ONLY
2 3 2 3 2 3
CD-ROM Destroy Destroy Destroy Destroy Destroy Destroy
DVD-ROM
DVD-Video
DVD-Audio
RECORDABLE
2 3 2 3 2 3
(WORM) Destroy Destroy Destroy Destroy Destroy Destroy
CD-R
CD-RW
Notes:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Hardware Security
HARDWARE SECURITY
Chapter Para Page
05 Hardware Security
Introduction 0501
Laplink 0519
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Hardware Security
CHAPTER 5
HARDWARE SECURITY
Introduction
0501. The following additional security measures with regard to the physical security
of hardware are to be implemented.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
removable) labels stating that unauthorized access to the system may constitute a
criminal offence under the Computer Misuse Act (1990). Such labels may be
obtained through normal publication outlets.
Physical Security
0503. Physical security measures are to be commensurate with the highest protective
marking of data to be processed or stored within the system and the stipulated Mode of
Secure Operation.
0504. Minimum security standards of protection are laid down in Volume 1. Where
cryptographic facilities are required, additional physical security measures may be
required and advice should be sought through the security chain of command. All CIS
containing official information are subject to protective security surveys and inspections
by security units under the direction of security staffs.
Site Selection
0505. Site selection for CIS can have a considerable effect on the protective measures
necessary and consequent costs. The CIDA must be involved in the site selection
process for ALL systems. The site encompasses not only the location of the system but
also the location of spares, system media and support services. There will be a need to
identify the following:
a. Highest level of protective marking to be processed.
0506. Once these locations have been identified, physical security controls can be built
round them commensurate to the systems Mode of Secure Operation and protective
UNCLASSIFIED
UNCLASSIFIED
Hardware Security
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Hardware Security
Portable IT Systems
0513. For the purposes of this document portable IT systems are defined as those
systems for which it is envisaged that there will be no permanent local security
environment. This introduces additional risks, particularly of theft and TEMPEST
considerations. Such systems, with the appropriate security accreditation, can be used to
produce data at any level of protective marking. Within the MOD, portable IT Systems
are categorised as follows:
a. Laptops. Laptops, which include most notebooks and palmtops, are
Portable IT System equipped with the range of ports normally present on a
standard PC.
b. Electronic Personal Organisers. Electronic Personal Organisers include
any such devices which are capable of storing magnetic data and exchanging
such data with a PC but not equipped with the normal range of PC ports.
c. Electronic Personal Diaries. Electronic Personal Diaries are devices
capable of storing data in a magnetic form but which cannot communicate with a
PC.
Portables do not include mobile systems such as those mounted on mobile military
platforms.
0514. The specific rules which govern the use of portable IT systems are Chapter 8.
Generic SyOPs for portable systems are at Annex A to Chapter 8.
0516. The process involves the loading of specific software onto the above computers
which allows data to be converted to what closely resembles a bar code pattern, which
can be read by the data link watches.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
0517. On no account is any of this software to be loaded onto any MOD owned
machine or any other machine on which MOD data is to be processed or stored.
Digital Cameras
0518. Digital cameras, both still and video, that are used to import/export digital
pictures to/from CIS are subject to the policy listed below:
a. They are to be registered as peripheral devices.
b. They are to be protectively marked according to the level of the subject
that they have been used to photograph.
c. Cameras that have had images or data transferred to them from a CIS,
are to be protectively marked to the highest level of data held on the system if
this is higher than the protective marking normally associated with the images
taken.
d. Cameras that become a protectively marked item as a result of b. or c.
above are to be stored in a container appropriate to the protective marking they
attract.
e. No imagery from any camera may be loaded onto an Intranet or Internet
page without the express permission of the release authority as detailed at
Chapter 10.
f. At the end of its useful life the digital camera is to be physically
destroyed if it has held protectively marked material. (There is currently no
approved method of purging a digital camera’s memory.)
"Laplink" Devices
0519. Devices, such as LapLink or PsiWin, which are used to link a portable or
desktop system to another portable or desktop systems by the use of software in the
transmitting and receiving systems and a physical link, are only to be used with the
express permission of the accreditors of each system to be linked. It should be noted
that any systems which are to be linked in this manner cannot be regarded as standalone
but must be viewed as a network and therefore an SPD must be provided.
UNCLASSIFIED
UNCLASSIFIED
Hardware Security
0521. In the case of hired or leased equipment, where protectively marked data is
processed, some special agreement is necessary for the retention of disks upon return of
the equipment.
0522. If the use of a fixed disk system for the storage of information graded
CONFIDENTIAL or above is unavoidable, then the following action is to be taken.
When not in use, the device is to be disconnected and stored in an appropriate security
container, taking into account the protective marking of the data stored and security
position of the environment concerned. NB. Some small systems can be specially
modified so that the fixed disk unit becomes free standing, and can be disconnected
from the computer to facilitate storage in a standard security container. Either:
a. The equipment must be operated within an approved secure electronic
cabinet, either purpose built or of standard design. The PSyA or DSSO
Accreditor must be consulted prior to the procurement of purpose built security
cabinets.
b. The equipment must be sited in a secure room of the appropriate
standard.
0523. If fixed disk equipment is to be removed off-site for maintenance or repair, then
one of the following courses of action is to be adopted:
a. The disk platters must be removed and retained on-site, thus
declassifying the remainder of the equipment which can then be removed by the
contractor. Following repair, the unit will be fitted with new disk platters by the
contractor.
b. If it is not possible to remove the disk platters on-site, then the
equipment may be taken to the contractor's premises if accompanied at all times
by a cleared member of staff. The member of staff is to supervise the complete
repair and return of the equipment, or the removal and return of the disk platters
for destruction.
c. The fixed disk unit may be released as a classified item to a contractor
with the appropriate security clearance. The unit for repair must either be
escorted or transported through the Courier Service. The Security Staff must be
consulted in such instances.
0524. Depending on the protective marking and sensitivity of data held in the unit and
the cost of a replacement unit, destruction may be the only secure and cost effective
solution.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
additional methods of destroying hard disk units. Once the unit has been dismantled, the
disk unit platters may be destroyed by one of the following methods:
a. By immersion in an acid bath until the magnetic layer of the disk surface
has been completely erased.
b. By cutting or breaking the disk into small pieces, followed by
incineration or disintegration.
c. By removing the magnetic layer of the disk with emery paper, an
emery wheel or disk sander.
0526. There are a number of approved commercial facilities which provide destruction
services for magnetic media protectively marked up to and including TOP SECRET.
PSyA should be consulted for details of these facilities.
Remote Diagnostics
0529. A number of computer manufacturers have remote diagnostic facilities which
can be used to speed maintenance and reduce the time a system is unserviceable.
Remote diagnostics are considered to be a security risk and approval must be obtained
from the accreditor before they are installed. Where dispensation is granted for the use
of dial-up lines or remote diagnostic facilities to access an IT system, the security
instructions relating to such a facility must be adhered to. Remote diagnostics are not
permitted on protectively marked systems without the express authority of the PSyA or
DSSO Accreditor.
UNCLASSIFIED
RESTRICTED
Hardware Security
ANNEX A TO
CHAPTER 5
RESTRICTED
RESTRICTED
Defence Manual of Security
doors and frames to a room with lightly protected windows, or into a structure
offering little protection to forcible attack. Windows can seldom be considered to be
security barriers, so actions are required to ensure that attempts at ingress are slowed
in order to maximise the chances of observation.
RESTRICTED
RESTRICTED
Hardware Security
7. If the structure fails to meet any of the above criteria, then either an approved
container to SEAP standard 1200 or Loss Prevention Standard 1228 should be used to
store the equipment, or more detailed advice to using the assessment techniques laid
down in Volume 1 will be required, and the physical security adviser should be
contacted to discuss the options (e.g. BS4737 Burglar Alarms or Intruder Detection
Systems (IDS)) available.
a. There is control of visitors to the MOD space during working hours, and it
is secured outside working hours, with no "30 minute rule" being permitted
during working hours if the space is accessible to unescorted non-MOD
personnel ;
b. After MOD working hours, the space is only accessible to approved guard
patrols, or, subject to the agreement of the Security Authority, to staff of Other
Government Departments (OGD) / List X contractors, if the site/building is
shared exclusively with such organisations ;
c. All security keys are held under secure conditions, such as a key safe.
9. Provided that the above requirements are met, then in order to achieve the
"Security Enhanced Room" within the structure (remembering this does NOT make it
a "secure room"), the following specific countermeasures should be implemented,
where they do not already exist.
10. Walls Any joints in partition walling should be taped to aid detection.
11. Floors and Ceilings Any openings (e.g. trap doors), should be either
lockable (e.g. with hasp / staple / approved padlock) or sealed closed.
12. Doors All room doors should be of 44mm solid construction (fire pattern),
without externally adjustable hinges.
13. All room doors in use should be fitted with a Category "C" Deadlock (e.g.
Ingersoll SC71) or equivalent, in addition to any Privacy Locks used during working
hours.
14. Any Emergency doors in the room should be to fire pattern, and fitted with an
Ingersoll Rim Automatic Deadlock (fire pattern), or other approved emergency exit
device (e.g. Frazer Bar).
15. Any room doors not in use should be permanently sealed, or kept locked and
bolted from the inside.
RESTRICTED
RESTRICTED
Defence Manual of Security
16. Any glazed apertures of maximum dimension less than 150mm should be fitted
with wired safety glass or 100 micron (0.004") Anti Shatter film,
17. Any glazed apertures of maximum dimension greater than 150mm should be fitted
with either an internal XPM screen or blanked off, either construction to the standard of
the adjoining wall, or by the provision of a 10mm plywood skin.
18. Windows Any external windows should at minimum be fitted with 100
micron (0.004") Anti Shatter Film (ASF) to BS6204 (which acts as both a deterrent to
ingress, and affords limited IED protection), and those that are not double glazed units
or fitted with toughened safety glass should have this ASF applied to both sides.
19. All external opening lights should be fitted with key operated window locks to
BS3621, or secured shut.
20. The use of internal XPM screen may be preferred in some cases on external
windows, but in such cases advice should be sought from the Security Authority, as it
may have deleterious effects, by drawing unwanted attention to the space
21. Any opening lights on internal windows should be fitted with key operated
window locks, or secured shut.
22. Building Services Any Air Handling Plant or Grilles should be firmly
secured to the structure of the building, with fixings only internally accessible.
23. Provisions must be made for external inspection of the room whilst
unattended:
b. If the are any spaces hidden from the door viewer, convex mirrors should
be fitted to allow their inspection
d. Where buildings are internally patrolled during silent hours, the guard
forces must be made aware of the inspection requirement and procedures.
24. This specification will be updated once the provisional European standard for
construction and testing of external doors and windows for burglar resistance (ENV
1627-1E) has been ratified.
RESTRICTED
UNCLASSIFIED
Hardware Security
ANNEX B TO
CHAPTER 5
3. Protectively marked storage media which have reached the end of their useful
lives are to be disposed of as protectively marked waste in accordance with the
instructions contained in this document. (See Annex C to Chapter 4 for the exceptions
to this rule.)
4. Protectively marked storage media which have not reached the end of their
useful lives but which are no longer required, may be transferred to other secure
installations with the agreement of the PSyA. However, in these circumstances, the
magnetic storage media is to retain the highest protective marking of information ever
stored, and must be protected for that level of protective marking. Prior to removal to
another installation, the disks are to be overwritten. (See Annex C to Chapter 4 for more
details.)
a. The System Manager should check that all civilian engineering contract
personnel maintaining or repairing items of system hardware processing
protectively marked information are appropriately cleared. A list of such
personnel is to be maintained.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
(2) DTG.
UNCLASSIFIED
UNCLASSIFIED
Software Security
SOFTWARE SECURITY
Chapter Para Page
06 Software Security
Introduction 0601
Principle 0603
Procurement 0604
Vulnerabilities 0608
Passwords 0615
Biometrics 0622
Functionality 0626
Assurance 0629
Responsibilities 0640
Aim 0641
Recording 0642
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Software Security
CHAPTER 6
SOFTWARE SECURITY
Introduction
0601. There is a considerable variation in the degree of security provided by system
software. Within the limits of a particular configuration, it is necessary to strike a
balance between operational and security requirements. With added sophistication,
software becomes more costly to produce and makes increasing demands on hardware
and personnel resources. It is difficult to make software completely secure against a
skilled and determined attack, and software alone cannot be relied upon to provide
complete system security.
0602. This chapter covers the generic issues associated with providing software
security mechanisms, including the methodologies for assessing the requirements for
functionality and assurance of Passwords (Annex A) and the system as a whole (Annex
B).
Principle
0603. When implementing a software based solution, the principle of Least
Capability (sometimes referred to as Least Privilege) should be adhered to, whereby
Users, and Processes / Hardware acting on their behalf, are only afforded access to those
functions and data that are essential for the specific Information Storage, Processing and
Exchange Requirements that have been identified to meet the business need.
Procurement
0604. Where COTS software is to be procured with Security Enforcing Functions
(SEFs), but the Assurance Requirements calculation at Annex B does not produce a
need for formal system evaluation, then for it is important for all products not formally
approved under the various CESG schemes (e.g. ITSEC or CAPS) that an appropriate
MOD endorsement of this software’s efficacy is obtained.
0605. For items contained within the Security section of the MOD (DCSA) Catalogue,
such approval can be assumed, as inclusion of all items is controlled by the Defence
Infosec Product Co-ordination Group (DIPCOG), which is Chaired jointly by
InfoSy(Tech) and EC(CCII)IOCM/Proj, and includes CESG representatives.
0606. For all other such COTS procurements, Accreditor sanction must be obtained
before procurement action is initiated.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
0607. It must be noted that MOD endorsement of a product cannot be construed as any
absolute guarantee of functionality or assurance, but rather serves as a statement that no
significant exploitable vulnerabilities were known at the time of sanction.
Vulnerabilities
0608. The vulnerabilities of software stem from the following factors:
0609. A proactive management regime is therefore required to ensure that the impact
of such software vulnerabilities is minimised, which at the minimum will involve the
monitoring of Official and Open Source information on new vulnerabilities, as laid
down at Chapter 2 Annex G.
0610. Where Evaluated products or systems, as discussed later in this Chapter, are to
be used, consideration should be given to the supplier’s Flaw Remediation regime. The
Common Methodology for Information Technology Security Evaluation, Part 2, v1.0
(CEM) provides a Supplement outlining a framework for obtaining assurance of this
regime, under of the ALC_FLR family (Flaw remediation).
UNCLASSIFIED
UNCLASSIFIED
Software Security
Mobile Code
0611. Mobile code is the term used to describe a variety of software technologies that a
portable between multiple operating environments (e.g. operating systems). The main
technologies covered by this description currently are :
a. Java ;
b. Javascript ;
c. ActiveX ;
0612. The main vulnerability that mobile exposes is a remote means of circumventing
security measures residing in the target platform.
0613. MOD policy on the use of mobile code is contained in a Defence Information
Assurance Notice (DIAN), rather than within JSP440, as both the National and
Departmental policy is under evolution. The use of mobile code on MOD systems must
be specifically sanctioned by the Accreditor(s) of the system(s) for which it is proposed.
Software Records
0614. Detailed records are to be maintained of all software held (as per Chapter 1) by
units. It is considered that such records should comprise part of the file for each system
which contains information that provides a complete security history of that system.
Passwords
0615. For most CIS, basic forms of software access control and individual
accountability will involve the use of passwords, which are can be subdivided as :
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
0616. Passwords are, therefore, normally to be individually owned, rather than owned
in common by a group of individuals. A single password is not to be used on two or
more systems which process data at different levels of protective marking. In any
installation, reliance is not to be placed solely on passwords for authenticating system
users. Passwords are to be augmented by other authentication measures or access
control devices, such as can be provided by physical, hardware or software means.
0617. Annex A details the MOD method of determining the technical requirements for
any automated password system, based upon the system’s security profile, and provides
guidance on selection of user generated passwords where no automated scheme is
implemented.
0618. In the interests of Availability, user passwords that cannot be reset by a System
Administrator must be recorded and then stored in a container appropriate to the
maximum Protective Marking level of information stored, processed or forwarded on
the CIS, with sufficient segregation of access to the password (e.g. sealed envelope) to
ensure need-to-know, Special Access approvals, and individual accountability is
preserved. All System Administrator passwords must be recorded.
UNCLASSIFIED
UNCLASSIFIED
Software Security
b. ITSO should obtain and protect sealed copies from users of passwords
for any and all systems in the same manner as combinations for physical security
containers, and ensure that manual changes are made as appropriate.
0621. User Responsibilities In order for a password scheme to be secure, the user
must follow certain procedures, which are to be included in the User Security
Instructions (USyI) for the system as defined at Chapter 3:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Biometrics
0622. The use of biometric technologies (e.g. fingerprint recognition) to support
Identification and Authentication (ID&A) mechanisms for defence is not currently
recommended for most MOD systems. Any interest in the use of such technologies
within MOD should be referred to InfoSy(Tech) through the Accreditor for advice
before any procurement action is initiated.
Logon Banners
0623. Wherever possible, a “Logon Banner” (e.g. the Registry setting
“LegalNoticeCaption” with Windows NT™ or a text file invoked by “.profile” in
UNIX) should be provided to summarise the requirements for access to a system
which may be needed to institute legal action in case of any breach occurring. The
suggested format for the text would be:
UNCLASSIFIED
UNCLASSIFIED
Software Security
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Functionality
0626. HMG Infosec Standard No 1, as interpreted for MOD at Annex B, gives only
the broadest guidance on authentication and access control, stating that all functionality
must be specified in the relevant Security Policy Documents (SPD) since the security
functionality of systems or components depends on their purpose. Some further
functionality requirements accrue from HMG Infosec Standard No 3 for Interconnected
systems, as interpreted for MOD at Chapter 15. Features which are required are based
on the Mode of Operation as follows:
a. Dedicated Systems.
(2) All users must be positively identified at the start of each processing
session
UNCLASSIFIED
UNCLASSIFIED
Software Security
0627. ISO 15408, the Common Criteria for Information Technology Security
Evaluation (CC) provides for the concept of pre-defined groups of functionality against
which Products can be Evaluated, or which can be used as a baseline for System
Evaluations. These take the form of Protection Profiles (PP), some of which have
evolved from the Functional Classes of the previous European Information Technology
Security Evaluation Criteria (ITSEC) standards, and like the similar classes from the
older US Trusted Computer System Evaluation Criteria (TCSEC) also include
Assurance requirements.
0628. Although the generic CC PPs can provide a basis for the functionality
requirements for secure systems, they are inherently limited by the need to be applicable
to the widest possible audience, and as such Products evaluated against these PP may
not meet the whole Defence requirement. Similarly, System specific Targets of
Evaluation (TOE) may be composed from generic CC PPs, but may well need additions
to meet the overall requirement, for instance for CIS primarily used as communication
switches or where data integrity is the main concern.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Assurance
0631. When developing a new CIS, HMG Infosec Standard No.1, as interpreted for
MOD at Annex B, is the approved methodology to link the required functionality to an
appropriate level of assurance. If a high assurance requirement is derived, this can lead
to a significant increase in project costs.
0632. Formal evaluation procedures are required to obtain both Assurance, which is
the confidence that may be held in the security provided by the TOE, and Correctness,
which refers to the accuracy with which security claims are reflected in this target. The
Assurance and Correctness Levels derived for new developments will be in term of the
CC, but procedures exist to allow Accreditor recognition of Products or Systems
evaluated against the older ITSEC, or even the previous UK Levels (UKL), which have
all been approved for use by HMG where appropriate. The use of any other assurance
method, such as TCSEC, will require consultation with both the Accreditor and the
Defence Technical Security Authority, InfoSy(Tech).
0633. Where a requirement for formal assurance is identified, this will need to be
supported by Certification in accordance with Government Minimum Standards.
Certificates are produced as a result of Evaluations, of systems and products, undertaken
by accredited organizations known as Commercial Evaluation Facilities (CLEFs), with
the Certification being undertaken by the UK Certification Body (CB), jointly managed
by the Communications-Electronics Security Group (CESG) and the Department of
Trade and Industry (DTI).
0634. Both CC and the older ITSEC criteria benefit from International Mutual
Recognition (MR) Agreements, which permits Products evaluated in one country to be
used in the other signatory countries to the MR Agreement. Where MR is not a
concern, for instance for systems being built for MOD, or for products whose vendors
do not perceive a requirement for formal MR, there are a number of other CESG
schemes which may be appropriate for use by defence, using alternative Assurance
Packages (AP) to those covered by the MR Evaluation Assurance Levels (EAL). At the
time of publication, the alternative CESG APs are :
UNCLASSIFIED
UNCLASSIFIED
Software Security
0635. Additional APs are also being considered, and in the interim their use for
defence will be subject to approval by InfoSy(Tech) until this document is updated.
The use of either SYS, FTA or CHECK must be agreed with the Accreditor(s) by
procurement authorities in advance, as in many cases the more rigorous approach of
formal CC evaluations will be necessary.
0636. All of these evaluation methodologies only apply to the Computer Security
(CompuSec) aspects of SEFs, and where Communications Security (ComSec)
techniques (i.e. cryptography) are also contained with the TOE, this requires separate
approval. The corollary of this is that a ComSec approval does not necessarily mean
that all CompuSec aspects of a TOE have been analysed, and procurement authorities
must satisfy their Accreditor(s) that both aspect have been comprehensively addressed
where both are required.
0637. For defence use, as detailed at Chapter 23, all cryptography must be formally
approved by the National Technical Authority (NTA), CESG, before being used to
provide either ComSec and/or CompuSec for Protectively Marked material. The main
way in which this is achieved for commercially produced Baseline Grade (BG) and
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Enhanced Grade (EG) items is the CESG Assisted Product Scheme (CAPS), which
provides assurance of the cryptographic components of a system and software
functionality that directly supports these components.
0638. Where MOD projects engage in any form of Assurance Activity, be it System
Evaluations, or sponsoring Product Evaluations, the contract must be let in such a way
as to allow MOD re-use the efforts made in such assurance activities as far as possible,
to prevent nugatory effort.
0637. The degree and depth of monitoring and detail recorded for auditing will depend
on the highest level of protection required by the data being processed or stored and the
Mode of Secure Operation. For dedicated systems none may be required. Additionally
the type of system, the location and physical security measures in place, will also
influence the degree and depth of the monitoring and audit. Security staff will give
advice on the security measures that are to be implemented.
Responsibilities
0638. It is the responsibility of the ITSO or a nominated individual to carry out audits
of the accounting records. The frequency is to be laid down in the SyOPs and a record
kept of all such activity. Similarly the appointed individual should be identified by post.
Aim
0639. The aim of the accounting and auditing facility is to identify any types of normal
or abnormal activity of potential security significance on the system. Anything
associated with a user's access to the system or to a protected object (e.g. a file, device,
or other computer) within the system, is a security related event.
Recording
0640. This section gives information on the structure of the automatic recording of
security relevant events that take place on a system. These events form the accounting
UNCLASSIFIED
UNCLASSIFIED
Software Security
file which provides a basis for the audit trail. They are to include, as a minimum, the
events listed below.
0641. Security relevant events fall into two categories, namely legitimate events and
violations.
(2) The creation or deletion of files and the assigning of their level of
protective marking.
0642. For each of the events listed above, the following information is to be recorded:
a. Type of event,
b. User ID,
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
d. Device ID
0643. The accounting records should have a facility to provide the System Manager
with a hard copy of all or selected activity. There should also be a facility for the
records to be printed in an easily readable form.
0644. All security records are to be inaccessible to users without a need to know.
0645. Operating systems are capable of recording vast amounts of detailed information
about a wide range of system events. However, most operating systems have facilities
to allow the system manager to define and select which events are to be recorded in the
audit log as security audit messages. Generally, for the purposes of system security, it is
the recording of exceptional events that is required and will be of greatest interest in
determining compliance with the SSP.
0646. Unattended Terminals. Users are to be automatically logged off the system if
their terminals have been inactive for some predetermined period of time, to prevent an
attacked making use of an unattended terminal. An audit report is to be created of the
system-generated logoff, so that repeated incidents may be dealt with by the SSO. For
installations employing very high security measures, it may be thought necessary to
enforce a re-authentication procedure at frequent intervals (say 50% of the forced logoff
time) during the session.
0647. In order to assist with technical inspections and recovery from system failures
etc a record is to be maintained of all software fixes and patches that are made to a
system.
0648. Collecting security audit messages in the security audit log file is useless without
periodically reviewing it for suspicious activity. Most operating systems have facilities
for generating reports from the audit log. Utilities are also generally provided to analyze
the log for patterns of unusual behaviour. The analysis over a period of time may reveal
a pattern of activity that clearly indicates security violations. Particular attention should
be taken with accounts which have enhanced privileges.
Baseline Patterns
0649. It is important to establish what are the normal and acceptable patterns of use of
a system before potential security problems can be recognised. Once this is done
procedures should be established to regularly review the audit log. Normal events can
be identified by answers to the following:
b. Who are the specific users who normally operate with higher privileges?
UNCLASSIFIED
UNCLASSIFIED
Software Security
d. What are the regular batch or network jobs that run at specific times of
the day?
0650. The size, number of users and amount of system use will help determine how
often this should be done. The most common type of report is a brief daily listing of
selected events that is created from running a batch job every evening before midnight.
It is important that such reports are reviewed as soon as possible in order to gain early
warning of any system security breaches. Analysis of audit logs is a specialised job and
requires considerable experience and expertise to recognise events of suspicious activity
requiring further investigation and follow up. Logs must be protected from unauthorised
modification.
Suspicious Activity
0651. Whenever this analysis reveals a potential security incident a detailed
investigation of the relevant security events should be carried out. Common forms of
system attack that should be recognised as suspicious include:
c. Attempting break-in;
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
initial guidance and policy framework can be given. Before attempting to deploy any
IDS or RTM capability within MOD, InfoSy(Tech), JSyCC, and EC(CCII)IOCM/Proj
should be consulted through the Accreditor(s) for current guidance.
0654. The term Intrusion is defined in Chapter 11, as one of the likely outcomes of
RTM or IDS detecting an occurrence with be the need to handle an incident. At the
simplest, the review of accounting records by security staffs can be considered to be a
special, manual, case of IDS.
0655. IDS is a means of detecting unauthorised use of, or attack upon, a computer or
network. The use of IDS is not a panacea, it is only one of a number of measures
which may be required to protect a system or network. It should be noted that in order
for an IDS to work, a number of supporting factors will need to be considered:
a. Where the IDS is used to analyse data from more than one Host or Probe,
it is essential that synchronisation of timebases is provided if the resultant
analysis is to be of any value. For evidential purposes, it is recommended that
the master timebase be synchronised to a source at least as accurate as a
“Stratum 2” Internet time service. To conform with other operational practice
it is recommended that ZULU time be used for all IDS recording and
reporting;
0656. A Risk Assessment approach will be required to determine the nature of the
IDS to be provided, both in terms of Functionality and Assurance, in accordance with
the requirements laid down at Chapter 6 Annex B and at Chapter 14.
0657. The protection service required may vary depending on the IDS employed.
Where Confidentiality is the main concern, the risk assessment will be driven by
Protective Marking, but where Integrity and Availability services are the main driver,
Asset Valuation in terms of Criticality Level (CL) should primarily be used to drive
the Risk Assessment.
0658. IDS is either Host based (HIDS) or Network based (NIDS). A mixture of each
type offers the most effective defence. The type and location of IDS will depend on the
level of threat and the functionality required.
0659. Currently, IDS offers maximum protection when incorporated within the Secure
Managed Interface (SMI) at the entry/exit point(s) of a system or network, either as an
UNCLASSIFIED
UNCLASSIFIED
Software Security
0660. Critical hosts within a network (such as servers) should also be protected with
additional host based IDS, which may be implemented as software Agents on hosts, or
as additional, free-standing Sensors. In such cases the IDS may be configured not
only to detect intrusions, but also to provide some internal anomalous behaviour
detection.
0661. An IDS can use either Event or Content based Logging, with the latter
approach having significant performance and sizing implications.
0662. The self-protection requirements for the IDS platform and/or any cryptography
used within any IDS should be assessed on the same basis as the Identification and
Authentication (ID&A) barrier(s) for the hosts being protected, as laid down at
Annex B. It may be necessary to provide a dedicated infrastructure for IDS reporting,
separate from that being monitored by the IDS itself.
0663. It is the intention of MOD to use a mix of IDS products which are compatible
and interoperable. Although standards for recording of information such as US
Department of Defense (DOD) Common Intruder Detection Framework (CIDF), and
the Internet Engineering Task Force’s (IETF) Intruder Detection Exchange Format
(IDMEF) and Incident Object Description and Exchange Format (IODEF) have been
proposed, most current commercial products are, however, proprietary, and do not
conform to these standards. Investment in IDS may therefore require a change to a
standards conformant product at some future time, if the IDS is to be integrated into a
MOD-wide IDS structure, but as an interim measure an ability to produce “syslog”
format if required is highly desirable.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Software Security
ANNEX A TO
CHAPTER 6
PASSWORDS
Password Schemes
1. Minimum Standards. Minimum standards for passwords, derived from
standards published by the National Technical Authority (NTA), CESG, are as follows :
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Software Security
user authenticate himself, by supplying his UID and password. The password for use on
a remote host is to be different form that used on the local host.
(1) The date and time of user's last login (or logoff).
(2) The location of the terminal used for the last login.
(3) Each unsuccessful login attempt to use this ID since the last
successful login.
b. This provides a means for the user to determine if someone else is using,
or attempting to guess, his UID and password. Such notification is to be given
immediately after successful login; the system is to require an acknowledgement
from the user (a key depression) that the information has been read before the
screen is overwritten with the next set of broadcast information.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
as to assist an attacker. Any error messages are to appear at the end of the
attempted login, regardless of where in the procedure the error occurred.
Technical Measures
6. The following technical requirement should be included in the Security Target
(ST), as laid down at Chapter 3, for any system where a password generation or
encryption technology is to be implemented, other than where this functionality
is already pre-approved as part of a CESG Evaluation. This represents the
generic Protection Requirement for Software Cryptographic Modules for
System High processing in protected environment:
b. If the enclosure includes any doors or removable covers, then they shall
be locked with pick–resistant mechanical locks that employ physical or logical
keys, or they shall be protected via tamper evident seals (e.g. evidence tape,
holographic seals)
f. All cryptographic software, key variables (KV) and other critical security
parameters shall be under the control of an operating systems that provides
controlled access protection (i.e protection to ITSEC F–C2, certified to an
assurance level appropriate for the system)
i. The operating systems shall provide the capability to specify the rights
(execute, write, delete) of operators to cryptographic program images and
data contained on the cryptographic module's secondary store or in
computer memory
UNCLASSIFIED
UNCLASSIFIED
Software Security
b. Passwords should not bear any direct or indirect relationship to the User
(e.g. own, family, pets’ or location names or nicknames, car registration
numbers etc.) or Post (e.g. job tally, project name) ;
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
b. Take first 3 characters of each of a 3 word phrase (mai bui lon), or the
first 2 of a 4 word phrase (de mi he of) ;
10. If the system concerned treats upper and lower case characters as being different
for password purposes, this can be further strengthened by alternating upper and lower
case in the password (e.g. (‘Ma1Bu1L0n’ or ‘DeM1hE0f’)
UNCLASSIFIED
UNCLASSIFIED
Software Security
ANNEX B TO
CHAPTER 6
Background
1. Rapid and unremitting change in the IT world means that fixed and absolute
security solutions are hard to define and harder to achieve, so the process of risk
management calls for a healthy measure of pragmatism. The method documented here
has evolved over nearly a decade, as a combination of widely-accepted basic
principles and actual experience within HMG, and this document helps security staff
decide what level of technical security is appropriate to achieve their overall risk
management aim.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
5. The CompuSec principle which can be stated as ‘every specific Threat should
be countered or the Risk posed by that Threat deemed acceptable’, will indicate to a
great extent what functionality is needed.
Status
6. It is a Baseline requirement that those responsible for securing protectively
marked information within HMG will use this agreed standard method, which has been
specifically tailored to the current security environment. ‘Baseline’ in this context
means that it is expected that the document will be applied in all cases, unless there are
strong, documented, reasons for not doing so.
7. This document has been derived from the generic HMG Infosec Standard, but
has been adapted in line with Departmental Security Officer’s (DSO) Discretion to make
it more applicable to MOD’s various operating environments. It is therefore the MOD
Minimum Standard, and any comments regarding it should be directed to the
InfoSy(Tech) office in DDefSy.
Applicability
8. Where specially sensitive classes of information are stored, processed, or
forwarded, the MOD is bound to comply with the regulations governing their protection
either in the terms of a bilateral / multilateral agreement (typically for multinational
instances) or as a condition of release (for externally owned material).
9. The main instances of this will be for STRAP material, as regulated by Volume
5. For STRAP and other especially sensitive material, in addition to carrying out an
assessment against this document, an assessment against the compartment(s)
requirements must also be carried out, and the higher of the requirements will form the
baseline. In cases where this cannot be met, InfoSy(Tech) and the Compartment Infosec
Representative(s) (CIR) should be informed in writing before proceeding.
UNCLASSIFIED
UNCLASSIFIED
Software Security
11. The method applies primarily to individual Security Barriers, and analysis of a
complete system can require a large number of very similar calculations (use of the
software tool will ease this task).
12. The method can also apply to a group of Security Barriers, or even a
‘monolithic’ approach for the whole system as was common with previous issues of
this method, generating only one Assurance Level, although this may result in an
Assurance Level higher than necessary for some or all of the Security Measures. This
may be appropriate when:
14. This methodology should be used at the design stage to investigate various
design and configuration options, including changes to the Physical, Personnel or
Procedural Security Measures, to arrive at an optimally cost-effective solution.
15. Having carried out a preliminary assessment based upon an outline solution,
the calculated assurance level(s) will fall within one of 5 defined CompuSec TOA
groupings which indicate the assurance approach required. In all cases where
Evaluation, Verification, or Analysis is advocated, the goal is to prove that “no
significant exploitable vulnerability exists”.
16. If the assurance approach indicated by the indicated TOA group is not felt to
be feasible, the Accreditor should in the first instance consider whether either of the
following approaches should be applied :
17. Should this approach still not produce an acceptable solution, a risk management
decision will be required, and the Accreditor will therefore need to produce a risk
assessment for the appropriate Senior Responsible Officer (SRO), as laid down at
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
b. Arrange for the system to be Evaluated and Certified under the ITSEC,
Common Criteria, or other CESG recognised schemes to a level lower than
that calculated by this method, and accept the additional risk ;
18. Experience has shown that when several Certified Products are combined in a
system, there are increased problems caused by mis-configuration or misuse, and by
interactions between products. In such situations a System Evaluation is highly
desirable. If only one product provides all the security functionality, mis-configuration
or misuse is less likely, and a System Evaluation is not usually necessary.
19. Before proceeding with ESE Inspection (EI) and Vulnerability Analysis (VA),
the Accreditors will require evidence of a sensible baseline against which to proceed
(analogous to the Target of Evaluation (TOE) used in formal evaluations), which will
probably take the form of a System Configuration Model (SCM) that can be validated
and checked by the Verification staff. It should be remembered the system’s identified
Criticality Level (CL) also has an inherent Compliance Requirement for other
Verification activity throughout the system lifecyle.
Accreditor Discretion
20. This is a risk management tool, and if the method is followed and the Security
Measures Evaluated and Certified to the level indicated then the Residual Risk should
be acceptably low.
21. However, even the best Technical Security Barriers cannot alone protect fully
against worst case situations, for instance a determined knowledgeable Potential
UNCLASSIFIED
UNCLASSIFIED
Software Security
Attacker with unlimited access to the system. If Accreditors consider that even the
very low Residual Risk is unacceptable, they may, in consultation with InfoSy(Tech),
wish to exceed the recommended levels of Assurance or add other forms of
protection.
22. The calculation works to a precision of one decimal place, with the calculated
Assurance Level being rounded to the nearest whole number to give the required
Assurance Level. In borderline cases Accreditors may wish to round either way if, in
their opinion and for justifiable reasons, they feel that there are local factors which the
calculation does not adequately take into account. Examples of such justification
would be a very strong security management regime which would allow a reduction in
the requirement, whereas a poor history of the prime contractor in delivering
compliant security solutions will of course necessitate rounding up. In all such cases
the reasoning must be included with the records of the calculations.
24. Should the calculation produce an Assurance Level of zero or lower, this
means that no formal Certification is needed. However this should not be interpreted
as meaning that no security functionality is necessary, and it becomes a MOD Best
Current Practice (BCP) Target of Accreditation. It remains up to the Accreditor to
take a considered view and decide whether exceptionally the security functionality
could be omitted.
Reaccreditation
25. Where system security parameters change, for instance through new network
connections, large change in user population or type of data, a fresh assessment using
this document is recommended. The Accreditor will be a key player in this review
process, and this may require that the system is formally reaccredited.
Concepts
26. Potential Attackers A Potential Attacker is anyone who is not an authorised
user of the data or system. In some cases people may be Potential Attackers even
though they have legitimate access, for instance if they are allowed to see information
but not modify it, then they are Potential Attackers as far as an Integrity attack is
concerned. The following are examples (in no particular order) of groups of people
who may be Potential Attackers:
• system users without the necessary clearance level for the data
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
• maintenance staff
• cleaners
• journalists
• investigators
• terrorists
• extremists
• competitors
27. Potential Attackers will vary considerably in how likely they are to try to
mount an attack, the type of attack, what resources they can bring to bear, how much
effort they are prepared to expend, and the opportunity they have to mount an attack.
28. Attacks may or may not be easily detected. A subverted employee would try to
remain undetected, whereas a disgruntled employee might try a blatant attack on data
Integrity in order to cause embarrassment.
29. Potential Attackers may be extremely knowledgeable about the system they are
attacking, or they may know little. The availability of ready-made hacking tools can
greatly enhance the effectiveness of an Attacker.
31. Potential Attackers’ capabilities may be limited by the system itself, either in
the facilities the Potential Attacker can bring to bear or because there is limited time
for the Potential Attacker to access the system. The total facilities a Potential Attacker
has available are not relevant, only those that he can bring to bear on the target of
attack.
UNCLASSIFIED
UNCLASSIFIED
Software Security
32. In a networked system, all those with physical or logical access to the network
should be considered as Potential Attackers except when they are legitimate users of
the data to be protected by the Security Barrier under consideration.
33. Ways of grouping data, Potential Attackers and security functionality are
developed below that clarify this idea.
34. An essential feature of the method hinges on the distinction between a Security
Measure and a Security Barrier. The former provides protection against some
particular aspect of the threat that Potential Attackers pose to the data. The latter is a
combination of one or more such Security Measures, which may be independent or
co-operating; taken as a whole it provides the total protection required to counter the
threat to the data from the group of Potential Attackers.
35. In a monolithic system, the Security Barrier comprises all the security
functionality of the system. It is important to bear in mind the distinction between
Security Measures and Security Barriers whilst reading this section. The discussion is
mainly in terms of confidentiality, although similar considerations apply when
considering Security Measures for other purposes.
37. The analyst may if desired group Potential Attackers according to other
characteristics provided this does not significantly increase the number of groups and
is not simply a device to reduce the numbers in the groups. If a Potential Attacker has
multiple Technical Factors he should be counted in each group.
38. To introduce a further flexibility the analyst may subdivide a small number of
the resulting Potential Attacker groups. Not more than 10 such sub-groups should be
introduced; they should correspond to real differences in the Potential Attacker
characteristics, and sub-groups of a Potential Attacker group should give rise to
significantly different Assurance requirements.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
different Security Measures on those sub-systems will all form part of the Security
Barrier that protects the data.
40. In the Integrity and Availability cases the data should in general be grouped
according to the Impact that compromise would have, that is, the value of the Impact
parameter, but data may be grouped on other criteria at the analyst's discretion.
41. Each group of Potential Attackers will then present a Threat to each data
group, and each such Threat is addressed by a group of technical measures. This group
of measures is, by definition, a Security Barrier. The method works out an Assurance
Level for Security Barriers, and the degree of Assurance required in a Security Barrier
is determined mainly by the characteristics of the group of Potential Attackers and the
characteristics of the data group.
43. To use these grouping options effectively, it is desirable to have an idea of the
likely design of the system and the particular Security Measures that will be used. It is
envisaged that these Assurance Level calculations will be made iteratively by the
system designers as they evolve to a design that can incorporate the required level of
security in the most economical way.
44. In the Integrity case, separate Security Barriers define the functionality that
prevents the modification of a particular group of data by a particular group of
Potential Attackers. It is necessary to stretch the definition of a Potential Attacker
group a little to accommodate the possibility that data corruption may sometimes not
be attributable to a particular Potential Attacker, that is, data may require protection
against unattributable accidents.
45. In the Availability case, a further extension of the Security Barrier concept is
necessary. Denial of Service attacks threaten services rather than data. It is therefore
necessary for the analyst to define particular groups of services (or sub-services) that
require enhanced protection, characterised by the Impact if they are compromised.
Then a separate Security Barrier is deemed to protect each service from each group of
Potential Attackers. Again such a Barrier may require protection against unattributable
accidents.
UNCLASSIFIED
UNCLASSIFIED
Software Security
approach, but runs into problems where part of a system is relatively isolated and it is
desired to treat this part in some way differently from the rest of the system. Further
guidance on networked systems is given at Chapter 15.
47. Focusing on one Security Barrier at a time means that sub-system boundaries
need not be rigidly specified: the analysis encompasses the full system, and Assurance
can be concentrated in relatively isolated sub-systems. It is however still important to
define the total scope of the analysis and what external Security Measures can be
assumed to be in place.
53. In all cases where a Defence in Depth argument is used within MOD, the
exercise of Accreditor discretion must be sanctioned by the Sector Security Authority(s)
involved, who will require proof that the mechanisms employed to implement the
Barrier Functions (BF) are, indeed, functionally independent in both Implementation and
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Operation (e.g. based upon differing paradigms such as stateless and stateful operation).
If the calculated assurance requirement being addressed exceeds EAL3.4, or if
Compartmented information is involved, the Departmental Security Officer (DSO), as
represented by InfoSy(Tech), must also be consulted.
55. In all cases where a Dilution argument is used within MOD, the exercise of
Accreditor discretion must be sanctioned by either the PSyA of the TLB involved, the
DSSO, or, if Compartmented information is involved, the Departmental Security Officer
(DSO), as represented by InfoSy(Pol), must also be appraised.
56. In all cases the grant of a sanction will require the submission of proof that the
dilution is indeed stochastic (random), in both time and space where applicable, and that
no additional channels (e.g. descriptive filenames or scan-able labels) exist to subvert
the perceived degree of randomness. In this context, Randomness can be considered to
be any Pseudo-Random sequence with its auto-correlation function approaching zero
(i.e. ≤0.025 for n≤1000 to ≤0.005 for n≥1,000,000).
Methods Of Analysis
57. The essence of security analysis is to identify all the Risks in terms of the
Threats and Vulnerabilities, then to place appropriate Security Barriers to reduce each
Risk to an acceptable level. This document does not mandate any particular risk
identification method. However, CRAMM is an HMG-preferred analysis tool which
aids in detailed analysis and is recommended when advice on specific detailed
Security Measures is required. Whatever method of analysis is chosen, it should be
methodical and well documented.
UNCLASSIFIED
UNCLASSIFIED
Software Security
a. Lack of Clearance Level : The Potential Attacker does not hold the
Clearance Level necessary to see protectively marked material. This applies
where material is marked using the standard protective markings
RESTRICTED, CONFIDENTIAL, SECRET and TOP SECRET, and the
Potential Attackers lack checks and clearances of: Basic Check, Security
Check and Developed Vetting. Systems with internal Access Controls for this
reason have a Multilevel Mode of Operation. Security Barriers which are
provided for this reason likewise have a Multilevel Mode of Operation.
61. For completeness, systems where all Potential Attackers are excluded by non-
technical means, and all users need access to all the data, have a Dedicated Mode of
Operation.
62. When assessing the conceptual mode of operation of a Security Barrier which
prevents logical access to system by those having physical access, the value used
depends on whether the Potential Attacker(s) have an appropriate clearance level, where
COMPARTMENTED mode reflects their lack of access approval, or whether the
Potential Attacker(s) do not have an appropriate clearance level, in which case the
MULTI-LEVEL mode is appropriate.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
levels, Baseline for the majority of normal situations, and Enhanced, for special
environments or where special risks have been identified.
64. ‘Baseline’ in this context means those Security Measures which represent
industry good practice, which can be regarded for now as being the equivalent of a
requirement for those technical measures that would be required under ISO9001 and
BS7799.
65. When Enhanced protection is indicated, this document can be used to calculate
an Assurance Level. The CRAMM tool can be used for a more detailed analysis of
Integrity functionality.
66. The Security Measures supporting Confidentiality may also support Integrity.
For instance, access controls may be able to set independent Read, Modify and Write
permissions. Important Security Measures include the use of:
67. Digital signatures may be used where additional Integrity is required. The
subject of digital signatures is complex and should their use be contemplated
specialist advice from InfoSy(Tech) should be sought.
68. Measures specifically to protect for Integrity are usually determined locally.
This document gives guidance later on finding an appropriate Assurance Level should
such a Measure be indicated.
70. The HMG standards establishes two protection levels, Baseline and Enhanced,
and requires system owners to assign their systems to one category or the other. The
acceptable level of Availability is an operational matter, and how that Availability is
achieved is a design decision. The CRAMM tool can be used for a more detailed
analysis of Availability requirements. Although protecting against hardware failure is
UNCLASSIFIED
UNCLASSIFIED
Software Security
outside the formal scope of this document, suitable Security Measures include, in
ascending order:
73. This document gives guidance later on finding an appropriate Assurance Level
should such a Security Measure be indicated.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
c. Deterrence ;
75. Security Accounting and Audit is a useful Security Measure to counter the
threat posed by privileged users, such as system managers, who are able to override
normal access controls. On some systems the fact that all such users’ actions are
accountable may be the only deterrent to such an attack.
76. Experience has shown that in practice Security Accounting and Audit systems
are often difficult to operate. Security Accounting logs are difficult to understand and
unusual activity which may indicate a breach is usually obscure. Auditing is very time
consuming and tedious. Except in a well-disciplined environment Audit is rarely
performed effectively.
78. It is worth noting that there are attack tools for common operating systems
which can hide a successful attack by altering the Security Accounting records.
79. This document allows compensation for less than fully effective Security
Accounting and Audit by raising slightly the Assurance Level of other Security
Barriers. The functionality that can be regarded as fully effective is detailed in the
parameters for effective Security Accounting and Audit.
UNCLASSIFIED
UNCLASSIFIED
Software Security
82. Personnel Security Measures can interact with Technical Security Barriers.
There is often an opportunity to reduce the required Assurance Level of the Technical
Security Barriers significantly, or even remove them, by increasing the clearance of
Potential Attackers. This reduces required Assurance Levels in its own right and may
well change the Mode of Operation, resulting in a further reduction in required
Assurance Levels.
85. Accreditors will need to use their discretion when considering the
effectiveness of Procedural Security Measures and any consequential reduction in
other Security Measures, and may need to seek advice from InfoSy(Tech).
87. If communications paths are accessible to the public, as is often the case, using
an appropriate grade of crypto immediately reduces (effectively to zero) both the
Threat to the data in transit and the Threat to Confidentiality of the end systems via
the communications path. More information on the use of cryptos is available in
Infosec Memorandum 3.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
91. Identification and Authentication (ID&A) All systems should have the
following functionality:
92. Passwords are part of most ID&A Security Measures. Specific requirements
relating to passwords and their generation and management are given Chapter 6,
supplemented by CESG CompuSec Memorandum No 8 (Password Guidelines) if
required.
93. Internal Access Control - DAC and MAC All systems, except the few
working in Dedicated Mode, need internal Access Controls to prevent Potential
Attackers from reading, modifying, or otherwise interacting with the data.
94. This document cannot describe the detailed functions that must be provided
for this purpose. As a general rule, any communication path between a Potential
Attacker and the data can be used to carry an attack or leak data. It is for the system
designers and implementers to identify all possible means of attack and ensure that
they are blocked. It is precisely because this is a difficult and error prone task that
Evaluation and Certification can add value to the procurement process.
95. In a Discretionary Access Control (DAC) system, a user can be given the right
to access data by any other user who already has access. In a Mandatory Access
UNCLASSIFIED
UNCLASSIFIED
Software Security
Control (MAC) system, an ordinary user cannot give another user access rights; this
provides protection against careless or malicious users and also against malicious
code that attempts to mimic the actions of users.
96. Traditionally MAC has been implemented by operating systems that assign
protective marking labels to data and permit access only when user clearances are
consistent with protective marking. There is no requirement for this specific
implementation if the required protection can be provided in other ways. The most
common alternative is trusted downgrade or trusted release, whereby DAC is provided
within security domains, and data is transferred between domains or released only by
the actions of specifically authorised staff.
97. Technical Security Measures (trusted paths) ensure that the actions are
performed by people rather than by malicious code, and carelessness and malice are
deterred by a higher level of Accounting and Audit.
98. Where the Potential Attacker has the required Clearance Level or Special
Access Approval for the data but may lack a Need-to-Know, the use of DAC is
permissible. Where the Potential Attacker does not have the required Clearance Level
or Special Access Approval for the data (Multilevel or Compartmented Mode of
Operation), MAC is required. This is summarised in the following table :
99. Where the presence of nationally caveated material, for example, UK/US
EYES ONLY, calls for a Compartmented Mode of Operation, and hence calls for
MAC, there are subtle points of interpretation. The definition of UK EYES ONLY
permits the originator, and only the originator, to extend access to the material. It is
difficult to design systems which provide originators with this freedom. This conflict
may be resolved by Procedural Security Measures.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
104. Security Accounting and Audit The term ‘Accounting and Audit’ in this
document refers only to general purpose Security Accounting and Audit, that is, the
UNCLASSIFIED
UNCLASSIFIED
Software Security
recording of actions and events that may indicate attempts to circumvent ID&A or
Access Controls. There may well be requirements for other types of accounting and
audit - such as financial audit, or audit needed for local business management reasons
- which exceed those stated below but are outside the scope of this document.
105. Normally an Security Accounting and Audit system will be required. Where a
Security Accounting and Audit system is lacking, and this increases the reliance
placed on associated Security Barriers, then the calculated Assurance Level of those
Security Barriers is increased. (Depending on rounding, this may or may not increase
the required Assurance Level.)
106. In this document the treatment of Security Accounting and Audit is separated
into two aspects: firstly the minimum recommended Security Accounting and Audit
functionality, and secondly the effect the presence (or absence) of Accounting and
Audit functionality may have on the required Assurance Level of other Security
Measures. The first of these uses the term ‘Security Accounting and Audit Rating’, the
second uses the term ‘Accountability’.
107. The specific events to be included in the Security Accounting depend on the
‘Security Accounting and Audit Rating’ as derived from the table below.
108. The Security Accounting and Auditing system itself may need Certification,
and the Assurance Level can be calculated by using the method in the worksheets.
• Type of event
• User ID
110. The Security Officers(s) should be able to print an easily readable report of all
or selected events.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
112. The frequency and type of audit is a matter of judgement for the Accreditor or
DSO, and will depend on the nature of the business and other local factors. The basic
recommendation is that effective Audit should take place at adequate intervals.
113. Data Exchange In most systems data will be moved around and may be
exchanged with other systems. Maintaining the Confidentiality, Integrity and
Availability of transferred data may need special Security Measures. Many protocols
exist which ensure data Integrity during transfer. HMG-approved cryptos can be used
to ensure Confidentiality during transfer. Various forms of redundancy can be used to
ensure system or data
UNCLASSIFIED
UNCLASSIFIED
Software Security
117. There are two special cases where it may not be obvious what the parameter
values should be where there is:
118. The parameter values for these two special cases are stated explicitly where
appropriate. The term ‘public physical access’ applies where a terminal or part of the
system is placed in a public space where there is uncontrolled access, such as a public
library. ‘Public logical access’ is where there is the possibility of accessing the system
via another system, such as the Public Switched Telephone Network (PSTN), to
which the public has access.
119. Although Potential Attackers will have been grouped on the basis of their most
important common characteristics, they can be expected to differ in minor parameters.
This raises the question of what values of these parameters to assign to the group as a
whole. The general guidance is to assign the typical, or average, value, rather than the
worst case. If it is particularly difficult to decide on a typical value, then the limited
dispensation to subdivide the group should be. In a ‘monolithic’ calculation, use
worst-case values for Protective Marking and Clearance.
• Environmental Factor
• Mode of Operation
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
- Facilities Available
- Cumulative Opportunity
• Accountability
• Quantity of Data
122. It is important that where any direct or indirect connection to public networks is
identified as a result of this analysis, an explicit statement as to its presence must be
made in association in presentation of the results of the Risk Analysis to Accreditors. If
Virtual Private Networking (VPN) technology is used, it may not be apparent whether or
not such direct or indirect connection to public networks exists.
123. Client-Server VPN (CSVPN), which use encrypted tunnelling either between
hosts or between clients and hosts, with encryption under the control of the System
Management Authority, are analogous to Link Encryption and can be considered to be
provided link level protection commensurate with the Grade of cryptography available,
and thus provides separation from public networks.
124. On the other hand, Service Provider Furnished VPN (SPFVPN) can be
implemented by either Cryptographic or Closed User Group (CUG) mechanisms,
UNCLASSIFIED
UNCLASSIFIED
Software Security
outside the control of the System Management Authority, and as such can only be
considered to provide isolation from public networks if both the specific architecture can
support this concept, and an appropriate level of trust can be demonstrated in the Service
Provider.
125. In addition to the generic Environmental Factors laid down, certain classes of
MOD systems have specific Environmental Factors, based upon their Criticality Level
(CL):
126. Advice can be obtained from the JSyCC office within DDefSy as to threats to
specific MOD locations or formations.
127. For cases where the Security Barrier protects against an accidental breach of
security the value is Normal.
128. The numerical value to be used in calculations derived from this parameter is
found on the working chart.
130. Number of Potential Attackers This parameter is needed for all cases.
131. Values are 1-10, 11-50, 51-200, 201-1000, 1001-5000, greater than 5000
132. Where there is public physical or electronic access, the value is greater than
5000.
133. Where precise connections of Potential Attackers are not known, for example
when the system is frequently reconfigured, or connected to other systems that are
imperfectly understood, a conservative (high) value should be used. If the value of
>5,000 is selected, this will have the effect to Saturating the factor in the analysis, and
will thus provide “future-proofing” against any subsequent use of cascade connections
either within or without the system management(s)’ control.
134. For cases where the Security Barrier protects against an accidental breach of
security, in the confidentiality case the value is that appropriate to the number of
people who would be in a position to exploit the breach. For example, if the accident
were to release the information to the public, the value would be >5000, but if only to
one individual, then the value would be 1-10. In the Integrity, Availability and
Accounting and Audit cases, where there is no obvious group of people who might
exploit a failure, the value >5000 should be used.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
135. As explained above, Potential Attackers are grouped, and the number in each
group is input to the calculation.
136. The numerical value to be used in calculations derived from this parameter is
found on the appropriate working chart - refer to Appendices 1-4.
139. This is the normal Clearance Level of the Potential Attackers and can have the
values Uncleared, Basic Check (BC), Security Check (SC), Developed Vetting (DV).
In this document the term Basic Check includes complying with any checks made
which are locally approved and are broadly comparable to a formal Basic Check.
140. Where the public have physical or electronic access to the system but are to be
excluded by the Security Barrier under consideration from access to some parts of the
system, the value is Uncleared.
143. Protective Marking of Data This parameter is needed only for the
Confidentiality and Security Accounting & Audit cases.
144. This is the normal protective marking and can have values:
• RESTRICTED
• CONFIDENTIAL
• SECRET
• TOP SECRET
UNCLASSIFIED
UNCLASSIFIED
Software Security
147. MOD systems should be assessed for a Criticality Level (CL), the details of
which are included in Chapter 1 :
148. Note that this parameter reflects only the effect of loss of Integrity or
Availability, not the protective marking of the data which normally reflects the effect
of loss of Confidentiality. Thus it would be possible to have data marked TOP
SECRET but with an Impact of Minor should its Integrity be lost, and vice-versa.
149. Only the more immediate effects should be considered; remote consequences
which would require a long chain of unlikely events should be ignored.
150. Mode of Operation The Mode of Operation of the Security Barrier under
consideration applies in the Confidentiality case only and is determined from the
reason for providing the Security Barrier - refer to paragraph 64 - and summarised in
table below.
152. The Technical Factor is an important parameter that reflects the constraints,
imposed by the system or its environment, on the ability of a Potential Attacker to
mount an attack. If a Potential Attacker has limited facilities available to mount, and
little opportunity for, an attack, then the Technical Factor is low. If a Potential
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Attacker has many facilities available and unlimited opportunity for attack, then the
Technical Factor is high.
154. It may be that a Potential Attacker has several interfaces directly available,
providing him with widely differing facilities and opportunities. These interfaces
should in principle be regarded as relating to differing Security Barriers, and the
Potential Attacker should be counted as attacking each Security Barrier (that is, he
should be counted many times). However, it is quite likely that the same Security
Measures will be present in each Security Barrier; the highest assurance requirement
then applies.
155. More complicated scenarios are also quite common: one interface may give a
Potential Attacker access to a more restricted interface. If there is no potential for
subverting the more restricted interface then its Technical Factor should be used. For
example, a Potential Attacker may have unrestricted access (high Technical Factor) to
a PC, but only receive broadcast teletext messages on it. Clearly he can do nothing to
influence the second computer that generates the messages. However, if his PC has a
trusted connection to the second computer, but the software provided on the PC is
only able to request the teletext message the situation is very different. He can very
easily introduce new software and increase the technical factor at the interface.
Therefore, if one interface gives access to functionality that protects the second more
restricted interface, then that functionality must be assured to the level determined by
the Technical Factor at the first interface. Only then can the Technical Factor at the
second interface be used to determine the assurance required of any further
functionality.
156. Facilities Available The value for the Facilities Available represents the
Potential Attacker’s capability at the target of attack. Determining the value for this
parameter requires considerable judgement. Guidance on the appropriate value is
given in the lists below, but if the actual facilities available to a Potential Attacker are
not listed then either an informed estimate of the nearest equivalent should be made,
or the Security Authorities consulted.
157. Not all the facilities on the system need to be taken into account, but only
those facilities which the Potential Attacker can bring to bear on the Security Barrier
under attack.
UNCLASSIFIED
UNCLASSIFIED
Software Security
Very Limited Situations in which Potential Attackers have very limited capability at
the target of attack, typically where no more than the following
facilities are available:
• communications only
• E-mail without the possibility of any attachments or macros
• receive-only terminals
• Potential Attackers presented with a Logon Screen protected by a
User identification and Password Measure conforming to Chapter 6
Annex A
Limited Situations in which Potential Attackers have limited capability at the
target of attack, typically:
• simple office automation facilities, for example, word-processing, E-
mail with non-executable attachments and no facility to run macros,
diary facilities, appointment scheduling
• menu-driven captive applications.
Normal Situations in which Potential Attackers have significant capability at
the target of attack, typically:
• operating system accessible to Potential Attackers
• E-mail with executable attachments
• Potential Attackers presented with a Logon Screen protected by a
User Identification and Password Measure not conforming to Chapter
6 Annex A
• macro, database or Fourth Generation Languages (4GL) available
• floppy disk drive where there are other Security Measures in place
(such as a 2-man rule) to prevent software being introduced via, or the
computer being booted from, the floppy disk drive.
Extensive Situations in which Potential Attackers have extensive capability at
the target of attack, typically:
• full compilers and program development facilities which potentially
support attacks on Security Barriers
• automated penetration tools
• network analysis tools
• packet sniffing software
• floppy disk drive where there is no Security Measure in place to
prevent software being introduced via the floppy disk drive.
158. For cases where the Security Barrier protects against an accidental breach of
security the value is Very Limited.
159. For most modern standard office automation facilities the value Normal is
appropriate. This includes cases where there are limited compilers associated with the
office automation system.
160. Where an assertion is made that User identification and Password Measure
conforming to Chapter 6 Annex A are used, separate calculations must thereafter be
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
performed for each instance of the Password Measure in addition to that for the barrier
under consideration. This calculation is to be performed with the value of the Facilities
Available parameter set at a level appropriate to the system architecture if the password
mechanism were not in place, and the resultant calculated assurance level for each such
calculation be used in determining the Password Measure from Chapter 6 Annex A.
161. It is stressed that in addition to any ITSEC evaluation requirement the subject
Barrier may attract, the use of this CESG password measures will also require that
CESG Review and Approve the use implementation of the Password. It should also be
remembered that supporting ESE measures for the Protection of Software Cryptographic
Modules as laid down at Chapter 6 will be required.
165. The period over which the opportunity should be calculated is the estimated
lifetime during which the protectively marked information will need to be protected
(the perishability). If there is regular audit of the system’s activity, such that any
attempts to breach security are likely to be detected, then the value may be set to
reflect the interval between audits.
UNCLASSIFIED
UNCLASSIFIED
Software Security
• <1 hour
• 1-5 hours
• 5-20 hours
• 20-80 hours
• >80 hours
167. For cases where the Security Barrier protects against an accidental breach of
security the value is >80 hours. The Default value is >80 hours.
169. Level of Publicity This parameter is needed for all cases. It is an estimate
of how well-known the existence of the data is, or may reasonably become, to the
Potential Attackers. The possible values are:
Concealed Where it is unlikely that Potential Attackers of the Data via the
Security Barrier under consideration will be aware of the existence of
the Data.
Known Where the Potential Attackers are likely to be generally aware of the
presence of the data but would not know its network address.
Publicised Where the Potential Attackers will be aware of the exact nature and
approximate network address of the data.
Advertised Where the Potential Attackers will be aware of the exact nature and
network address of the data.
170. For cases where the Security Barrier protects against an accidental breach of
security the value is Concealed.
171. The numerical value to be used in calculations derived from this parameter is
found on the working chart.
173. If invoking the Dilution principle then the Sector Security Authorities will
advise a suitable value for this parameter .
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
175. Accountability This parameter is needed for all cases. It takes account
of the presence, or absence, of a Security Accounting and Audit Measure.
177. Note that the value of the Security Accounting and Audit Rating is irrelevant
in determining this parameter. To qualify for a value of Comprehensive all the
functionality must be provided, irrespective of the fact that the Security Accounting
and Audit Rating may have a value of ‘partial’ or ‘none’.
178. It is noted that in some case the accountability may not be technically
achievable. In particular, the widely used Windows NT operating system, even with
Security Extensions, does not completely meet the specification for Comprehensive.
For “vanilla” NT based systems, the Partial Accountability parameter of –0.3 should be
used within the worksheets, and if NT(SE) has been implemented, a specific
Accountability parameter of –0.5 should be used within the worksheets.
179. In all other cases, the exercise of Accreditor discretion must be sanctioned by the
Sector Security Authority(s) involved, who will require proof that the requirement is
technically either unachievable or inappropriate, and that appropriate Procedural
Measures are in place to compensate. If Compartmented information is involved, the
Departmental Security Officer (DSO), as represented by InfoSy(Pol), must also be
appraised.
180. There will be abnormal situations where the functionality is not applicable. In
these cases a value of Comprehensive may still be appropriate if all the security
relevant actions are recorded and will routinely be audited.
181. Any Security Accounting and Auditing facility may itself need Certification,
and the Level of Assurance is determined later in the worksheets.
182. The numerical value to be used in calculations derived from this parameter is
found on the working chart. The default value is None. This parameter can alter the
Assurance Level by 0.6.
183. Quantity of data This parameter is needed for the Confidentiality case
only. For other cases it should be set to the >1G value.
UNCLASSIFIED
UNCLASSIFIED
Software Security
184. This parameter reflects only the quantity of data being protected by the
Security Barrier under consideration. The basis is that a large amount of data is more
attractive than a small amount. The Assurance Level calculation is not very sensitive
to this parameter.
185. The parameter has possible values <30K Bytes, 30K-1G Bytes, >1G Bytes.
186. For most systems the value will be the maximum of >1G, but the parameter
allows a small reduction in Assurance Level where only very small quantities of data
are present.
187. If it is felt that the reduction in Assurance Level for a small Quantity of Data is
not justified, then the default value of >1G may be used.
188. The numerical value to be used in calculations derived from this parameter is
found on the working chart.
191. Identify which assets are to be protected by the Security Barrier under
consideration. For the Confidentiality case the assets will be protectively marked data.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
196. The procedure in every case is to work down the list of parameters in the left-
hand column of the worksheets, circling or highlighting appropriate values in the next
column.
197. Column 3 translates this into a numerical value, which is then entered in the
final column for calculation. For some parameters, column 3 involves a sub-
calculation using 2 self-explanatory inputs to provide a single number for column 4.
198. Add up the numbers in column 4. This produces a calculated EAL, which is
then rounded to the nearest whole number to give the required EAL.
199. The table below shows the correspondence with ITSEC E-levels.
a. Best Current Practice (BCP) TOA (EAL ≤0.0) Even when there
is no need for any Government level of assurance, due diligence should be
exercised in the implementation of CompuSec functionality, in line with Best
Current Practice (BCP). This will include consideration of all relevant public
standards, such as Internet Engineering Task Force (IETF) Requests For
Comments (RFC) and vendor furnished security guidance ;
• Either:
UNCLASSIFIED
UNCLASSIFIED
Software Security
• Or:
• Either:
• Or:
• Either:
• Or:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Software Security
APPENDIX 1 TO
ANNEX B TO
CHAPTER 6
Clearance Status
Parameters Values UC BC SC DV Values
Protective Marking RESTRICTED 1.2 -1.6 -3.0 -4.4
CONFIDENTIAL 2.9 0.4 -0.8 -2.1
SECRET 4.5 2.3 1.2 0.1
refer to paragraph 143 TOP SECRET 6.2 4.3 3.3 2.4
Mode of Operation Multi-Level 0.0
Compartmented 0.0
refer to paragraph 150 System High -1.0
Environmental Factors High 1.0
Increased 0.5
refer to paragraph 121 Normal 0.0
Number of Potential Attackers >5,000 2.0
1,001-5,000 1.6
201-1,000 1.1
51-200 0.8
11.50 0.4
refer to paragraph 130 1-10 0.0
Facilities Available - refer to paragraph 156 VL L N E
Cumulative Opportunity <1 hour -2.0 -1.0 0.0 1.0
1.5 hours -1.7 -0.7 0.2 1.2
5-20 hours -1.5 -0.5 0.5 1.5
20-80 hours -1.2 -0.2 0.7 1.7
refer to paragraph 163 >80 hours -1.0 0.0 1.0 2.0
Level of Publicity Concealed -0.3
Known 0.0
refer to paragraph 169 Publicised 0.3
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Software Security
APPENDIX 2 TO
ANNEX B TO
CHAPTER 6
Clearance Status
Parameters Values UC BC SC DV Values
Impact Minor 1.2 -1.6 -3.0 -4.4
Significant 2.9 0.4 -0.8 -2.1
Major 4.5 2.3 1.2 0.1
refer to paragraph 146 Extreme 6.2 4.3 3.3 2.4
Environmental Factors High 1.0
Increased 0.5
refer to paragraph 121 Normal 0.0
Number of Potential Attackers >5,000 2.0
1,001-5,000 1.6
201-1,000 1.1
51-200 0.8
11.50 0.4
refer to paragraph 130 1-10 0.0
Facilities Available - refer to paragraph 156 VL L N E
Cumulative Opportunity <1 hour -2.0 -1.0 0.0 1.0
1.5 hours -1.7 -0.7 0.2 1.2
5-20 hours -1.5 -0.5 0.5 1.5
20-80 hours -1.2 -0.2 0.7 1.7
refer to paragraph 163 >80 hours -1.0 0.0 1.0 2.0
Level of Publicity Concealed -0.3
Known 0.0
refer to paragraph 169 Publicised 0.3
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Software Security
APPENDIX 3 TO
ANNEX B TO
CHAPTER 6
Clearance Status
Parameters Values UC BC SC DV Values
Impact Minor 1.2 -1.6 -3.0 -4.4
Significant 2.9 0.4 -0.8 -2.1
Major 4.5 2.3 1.2 0.1
refer to paragraph 146 Extreme 6.2 4.3 3.3 2.4
Environmental Factors High 1.0
Increased 0.5
refer to paragraph 121 Normal 0.0
Number of Potential Attackers >5,000 2.0
1,001-5,000 1.6
201-1,000 1.1
51-200 0.8
11.50 0.4
refer to paragraph 130 1-10 0.0
Facilities Available - refer to paragraph 156 VL L N E
Cumulative Opportunity <1 hour -2.0 -1.0 0.0 1.0
1.5 hours -1.7 -0.7 0.2 1.2
5-20 hours -1.5 -0.5 0.5 1.5
20-80 hours -1.2 -0.2 0.7 1.7
refer to paragraph 163 >80 hours -1.0 0.0 1.0 2.0
Level of Publicity Concealed -0.3
Known 0.0
refer to paragraph 169 Publicised 0.3
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Software Security
APPENDIX 4 TO
ANNEX B TO
CHAPTER 6
Clearance Status
Parameters Values UC BC SC DV Values
Protective Marking RESTRICTED 1.2 -1.6 -3.0 -4.4
CONFIDENTIAL 2.9 0.4 -0.8 -2.1
SECRET 4.5 2.3 1.2 0.1
refer to paragraph 143 TOP SECRET 6.2 4.3 3.3 2.4
Environmental Factors High 1.0
Increased 0.5
refer to paragraph 121 Normal 0.0
Number of Potential Attackers >5,000 2.0
1,001-5,000 1.6
201-1,000 1.1
51-200 0.8
11.50 0.4
refer to paragraph 130 1-10 0.0
Facilities Available - refer to paragraph 156 VL L N E
Cumulative Opportunity <1 hour -2.0 -1.0 0.0 1.0
1.5 hours -1.7 -0.7 0.2 1.2
5-20 hours -1.5 -0.5 0.5 1.5
20-80 hours -1.2 -0.2 0.7 1.7
refer to paragraph 163 >80 hours -1.0 0.0 1.0 2.0
Level of Publicity Concealed -0.3
Known 0.0
refer to paragraph 169 Publicised 0.3
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Software Security
APPENDIX 5 TO
ANNEX B TO
CHAPTER 6
2. Since that time, the MOD, via DERA CIS3 and IA(ICS)’s Applied Research
Package (ARP) 21.c has independently evolved the Domain Methodology for defining
systems and networks, and advice on its use can be obtained from IA(ICS)Impl.
4. A domain model identifies the physical environments from which people operate
computer systems. These contain the potential attackers that may constitute a threat to
the data in the system. It also defines domains within the system that represent the
logical places where people invoke software to work on their behalf. Membership of a
domain provides facilities to reach data and enables members to pose a different threat
to the data in the system. For this reason, they may be regarded as distinct groups of
potential attackers. Data is held in Repositories that may be reached from one or more
domains.
5. As part of the domain model, a set of tables defines the numbers and minimum
clearances of members of environments and domains and the maximum protective
markings of data handled in domains. The model therefore provides the basic
information required to identify threats and analyse them at a high level. In depth
analysis of the threats, however requires detailed knowledge of the technical design,
configuration and modes of operation of the IT that implements the security
requirements expressed in the domain model. Discussion of how this is achieved is
beyond the scope of this note.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
6. The diagram below illustrates a simple domain model. The data in repository R
is reachable from a domain D representing a computer system that may be operated from
a physical environment E by entering portal P.
D
E P R
7. In this case, there are at least two groups of potential attackers for the data in R:
the members of E who are not members of domain D, and the members of D. The
barriers to be considered should therefore:
8. The first of these barriers consists of a single ‘logon’ measure to counter the
threat of non-members attempting to enter the domain. Calculation of the required EAL
for this barrier uses the normal calculation for confidentiality. It is based on the
characteristics of the environment members as potential attackers and the minimal
facilities available to them in attempting to logon.
10. For the access control measures, the normal Memo 10 calculation for
confidentiality applies, while for the accounting measure, a separate table is used to
calculate the required EAL. The potential attackers in this case are all the domain
members and the facilities available are all those provided to users in the domain.
11. Access control and accounting measures both depend on identification of the
domain member concerned, which is provided by the logon measure. The required EAL
for the logon measure is therefore the greater of the levels calculated for each of the
barriers that depend on it.
UNCLASSIFIED
UNCLASSIFIED
Software Security
12. In practice, domain models will be more complex than in this example. The
members of connected domains must also be included as potential attackers and data
handled by these domains must be considered as data under threat. In most cases, the
potential attackers will be divided into separate groups according to clearances etc.
and the data will be divided into groups according to protective markings.
13. In addition, different types of connection between domains will permit different
causes of compromise and will determine the facilities available to potential attackers.
Hence further division of groups will be made on the basis of technical factors. While
such factors are crucially dependent on the design of the system, the domain model of
security requirements can give a good indication of what these might be.
14. In the case of messaging channels between domains which do not carry
attachments capable of carrying executables the facilities available are rated as ‘low’,
but if the attachment may carry executable code such as macros, the rating is ‘normal’.
A connecting repository which is read-only within a domain will reduce the facilities
available to other domains, which may therefore be rated as low, whereas for read/write
repositories, the rating would be normal.
15. In assessing the different causes of compromise and consequent threat posed
by groups of potential attackers to some data, it is necessary to make some
assumptions about the facilities provided to users within and between domains, how
these facilities will be implemented and the security measures that may be employed.
These assumptions may relate to IT and/or procedures and must be recorded with the
results of the calculations to which they apply.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Software Security
ANNEX C TO
CHAPTER 6
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Software Security
ANNEX D TO
CHAPTER 6
ASSURANCE ACTIVITY FEEDBACK FORM
RESTRICTED – COMMERCIAL
(when completed)
Timescales
Costs
Overall
Satisfaction
NOTES
Where elements are COTS or GOTS products that have been included as part of a
system, these should be itemised separately.
(when completed)
RESTRICTED – COMMERCIAL
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
RESTRICTED
Software Security
ANNEX E TO
CHAPTER 6
3. Section IV briefly describes the various objectives that should be met in order
to cover the different threats detailed in Section III. The user should familiarise
themselves with the objectives that are required to meet the threats that are of
particular concern to their system.
4. The descriptions used in Sections III and IV are generic and not specific to any
service that may be utilised by a network user. Section V addresses the security
requirements that underpin the objectives of Section IV, and it is here where the
descriptions become more specific.
5. In order to gain full value from Section V the user should consider what
services are provided on their network, and whether any could pose a potential risk.
This will determine which of the security requirements will need to be implemented.
6. This document does not state how the security requirements should be
implemented. It is up to the individual user to determine whether, in their network, the
requirement should be met by a technical solution or by a procedural measure.
Introduction
PURPOSE
RESTRICTED
RESTRICTED
SCOPE
9. This document describes the perceived threats relevant to a system that has
connections with less assured domains. It then defines a set of security objectives that
such a system should meet, and finally defines a set of detailed security requirements
that meet the objectives.
10. The content of this document is based upon CESG’s current understanding of
technologies, threat, vulnerabilities, and departmental requirements.
11. This policy is also intended to help Departments ensure compliance with the
Lawful Business Practice Regulations and related telecommunications data protection
legislation.
DEFINITIONS
Background
INTRODUCTION
RESTRICTED
RESTRICTED
Software Security
14. Monitoring can be carried out at system or Intranet level, where an Intranet is a
system or systems such as the GSI. System monitoring should be primarily concerned
with ensuring safe user behaviour and identifying anomalous user and network
activity, ie it should endeavour to identify activities likely to compromise system
information. Intranet monitoring should be concerned with identifying events that
occur across a number of systems and which may not be visible at the system level.
16. Monitoring may, at the department’s discretion, also be used for other lawful
purposes. It could, for example, detect abusive or offensive material or improper use
of official assets. However, departments should be aware of the requirements of the
data protection regulations detailed in Section B.
17. Protective monitoring policy must be compliant with the following legislation:
USER NOTIFICATION
19. The Lawful Business Practice Regulations permit the monitoring of IT systems
by managers for specified purposes, including in the interests of national security, to
prevent or detect crime and to secure the effective operation of the system. But they
stipulate that ‘reasonable efforts’ must be made to notify all users of the system of the
monitoring. Cabinet Office Security Division have advised that ‘reasonable efforts’
might include circular notices, pop-up messages, information within e-mail
banners/disclaimers, notices on Intranet home pages and statements in staff
handbooks/employment terms.
RESTRICTED
RESTRICTED
20. Information collected during monitoring should not be used for purposes other
than those for which it was introduced, and about which users were notified, unless it
reveals criminal activity or gross misconduct.
Threats
INTRODUCTION
21. This section documents the currently known threats that are relevant to any
department with a system connected to public networks.
SPECIFIC THREATS
RESTRICTED
RESTRICTED
Software Security
Assumptions
INTRODUCTION
22. It has already been stated that defensive monitoring is only one of a number of
countermeasures that should be employed. It is assumed that these countermeasures
will be applied to a system being subjected to defensive monitoring.
SECURITY ASSUMPTIONS
RESTRICTED
RESTRICTED
A8 Systems will only support services at their boundary that are supported by
a clearly justified business case. All others should be blocked by a suitably
approved firewall.
A9 All existing barriers will have been subjected to a risk assessment in
accordance with HMG Infosec Standards, and implemented as required by those
standards.
23. This section defines a number of objectives that counter the threats identified
in section four.
OBJECTIVES
O3 Potential Release - Auditing shall look for evidence that users are
behaving in a manner that could result in the release of sensitive information.
RESTRICTED
RESTRICTED
Software Security
24. The following table demonstrates how the objectives and assumptions are
intended to counter the identified threats. This table should be used to ensure a threat
has been sufficiently countered.
T1 T2 T3 T4 T5 T6
A1 x x
A2 x
A3 x x
A4 x
A5 x
A6 x
A7 x
A8 x x
A9 x
O1 x x x x x x
O2 x x x x
O3 x x x
O4 x x
O5 x x x x x
Security Requirements
INTRODUCTION
25. This section defines the security requirements that should be met in order to
meet the objectives defined in the previous section.
POLICY
RESTRICTED
RESTRICTED
RESTRICTED
RESTRICTED
Software Security
POTENTIAL RELEASE
ALLOWED SERVICE
RESTRICTED
RESTRICTED
O1 O2 O3 O4 O5
SR1 x
SR2 x
SR3 x
SR4 x
SR5 x
SR6 x
RESTRICTED
UNCLASSIFIED
Malicious Software
MALICIOUS SOFTWARE
Chapter Para Page
07 Malicious Software
Introduction 0701
Effects 0705
Threat 0706
Vulnerabilities 0707
Countermeasures 0712
Viruses 0714
Recovery 0736
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Malicious Software
CHAPTER 7
MALICIOUS SOFTWARE
Introduction
0701. Malicious Software is a general term covering several types of software code
introduced into a system to perform tasks that are not part of the system's designed
functionality. Malicious software is intended to compromise a Communications and
Information Systems by breaking its confidentiality, corrupting its integrity or affecting
its availability. It is not to be confused with unexpected functions due to errors in
software, mis-keying, or the misuse of operating system commands.
0702. Some forms of malicious software, especially viruses, present a real risk to
MOD CIS. Viruses, in terms of numbers of security incidents, represent the biggest
threat to MOD CIS. Relatively simple countermeasures can minimise the risks. A key
countermeasure is high user awareness of the problem. Anti-virus software (AVS)
must be installed on all MOD CIS. It is also essential to ensure that latest version of the
AVS is installed.
0703. Variants of malicious types appear almost on a daily basis. In most cases the
visible impact on your system will be different though the general advice contained in
this Chapter will always be relevant. CESG Infosec Memorandum No. 12 gives
additional information on dealing with the different types of malicious software.
0704. The boundaries between different types of malicious software are not always
clear-cut but they generally fall into one or more of the following:
a. Viruses. These are so called because they attach to healthy programs and
replicate themselves, thus infecting other programs and systems. The primary
target for viruses is the PC operating system but all major operating systems
have been targeted though to a lesser extent. Viruses are, by far, the most
common type of malicious software and a whole industry has been built up to
combat them
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
d. Worms. Worms, like viruses, replicate themselves but they do not attach
to specific programs. A variant is where the original program makes copies of
itself but retains control over its 'offspring'. The primary target for worms is
networked systems.
e. Mobile Codes. Mobile codes can be used maliciously. Mobile codes are
meta-codes, which are designed to be executable on multiple platforms or
architecture by use of an intermediary interpreter or virtual machine. Examples
of mobile code are Java, Javascript, ActiveX, COBRA and software agents.
Effects
0705. The actual damage done to the security of the system under attack depends on
the action triggered. This action is called 'the payload' and can vary from benign or no
action to catastrophic action. In general, malicious software attacks system availability
and data integrity by corrupting files on the system. Attacks against the confidentiality
of data on the system are less common. The most obvious attack on confidentiality is
the clandestine capturing of usernames and passwords for use in subsequent hacking
attacks.
Threat
0706. Malicious software can originate from many sources such as disaffected staff,
foreign intelligence services, investigative journalists or terrorists. However, in practice,
the vast majority of malicious software attacks originate from delinquent enthusiasts
who are unlikely to gain from the inconvenience caused apart from a certain amount of
notoriety. There are exceptions to this.
Vulnerabilities
0707. In order to be effective, a malicious software attack has to gain access to the
system in some way. Viruses can be propagated in a number of ways. Any medium that
can store or transmit data can carry a virus including: diskettes, CD-ROMs, network
communication lines, telephone/modem lines, disk fax machines and e-mail
attachments. The most common sources of risk are described below.
UNCLASSIFIED
UNCLASSIFIED
Malicious Software
0708. A number of ways of gaining access to a system, for the purpose of delivering
malicious software, are described below:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Vulnerability Classes
0709. The Joint Security Co-ordination Centre (JSyCC), as described at Chapter 2, is
responsible for maintaining a central source of Vulnerability and Threat information for
all aspects of CIS security, promulgating Vulnerability Warning Notices (VWN) as
necessary.
0711. Using this categorisation the System Operating Authority (SOA) action required
can be determined:
Countermeasures
Software Development
0713. There are two main ways in which software development and amendment takes
place: When an upgrade of the operating system or application programs is offered by a
computer manufacturer, or where software programs are written by suitably qualified
"In-House" personnel, to enhance or develop applications and utilities. The following
UNCLASSIFIED
UNCLASSIFIED
Malicious Software
Viruses
0714. Most viruses are designed to attack systems running the most popular
operating systems. To date these are DOS, Microsoft Windows 3.x, 95, 98, 2000 and
NT. Viruses have been written for other operating systems such as Linux and the
Apple Macintosh environment but these make up a fraction of the overall virus
population
0715. Viruses come in a variety of forms using different techniques to both hide and
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
propagate. Initially, viruses could only spread via the Boot Sector of a disk or with an
executable program file. The macro language facility in Microsoft Office products,
especially Microsoft Word, provides the environment for a new generation of virus
writers. The development of powerful macro languages has blurred the boundary
between data and programs making it possible to propagate viruses via wordprocessing
documents and spreadsheets.
0716. Macro-Viruses now pose the greatest threat to systems, as they are much more
likely to be passed from user to user, either via diskette or e-mail. This technique also
allows macro viruses to cross to different operating systems because an infected Word
document created on a Windows machine might run quite happily on an Apple
Macintosh running Word.
0717. The popularity of Microsoft Word has led to the majority of macro viruses to
date being written for this, and other, Microsoft Office products. Any Word document
file, unless it is in RTF format, could potentially contain a virus. Staff should not
assume the macro virus problem only exists for Microsoft - any product that gains
popularity and has a facility to execute user statements is liable to be misused by the
virus writers.
0718. Any form of executable file or object is vulnerable to virus infection. Once
activated the virus payload may attack any file stored within the system, or any system
within a network. Systems are particularly vulnerable in working areas where access
and the circulation of floppy disks are uncontrolled. E-mail attachments are now the
primary method for transporting infected objects.
0719. Actual infection of a host computer occurs when the virus code is executed.
Viruses are designed so that the act of executing them is triggered without the
knowledge or consent of the user, when a normal process is carried out.
0720. There are a number of ways of detecting viruses; none of them are perfect.
Viruses can be identified directly by their form or signature, by their actions or by
changes made to previously uninfected files. It is these techniques, along with strong
procedures, that allow the threat from viruses to be combated. Annex B gives details of
techniques of virus detection. Annex C gives details of defensive techniques against
viruses.
Anti-Virus Software
UNCLASSIFIED
UNCLASSIFIED
Malicious Software
0722. There are however a considerable number of scanners available with no formal
evaluation or readily available guidance on their relative effectiveness. MOD
commissioned a DSTL study of open source publications with the aim of producing a
list of trustworthy market leading of commercial off the self (COTS) AVSs.
0723. The list is published in Defence Information Assurance Notice No.5, which is
distributed to PSyA staff. The scanners listed have given good test results in recent
open publications and provide a market leading measure of protection against viruses.
The list will be reviewed regularly and updated as required.
a. At system boundaries ;
b. On all hosts;
c. On workstations.
0724. The nature of the “boundary” placement will depend on the system architecture
implemented, and could be using a WMAG on a small LAN or an e-mail content
checker on a large network.
0725. Where information transfer is by media transfer, all incoming and exported
media is to be checked for viruses and the systems themselves checked on a regular
basis. This is particularly important where systems exchange data by disk transfer,
including diskfax interconnections.
0726. The following table gives an indication as to where the AVS should be placed:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
0727. Before entering into a contract for AVS, the required frequency for availability
of updates must be ascertained, based on the Criticality Levels of the systems and the
ratings of malicious code:
0728. For critical systems consideration should be given to using two different AVS
products in tandem. AVS products should always be kept current.
Impact of Cryptography
0729. Where Baseline Grade (BG) cryptography is being used to provide desktop to
desktop encryption between end user computer systems, the Accreditor may require that
encryption keys be lodged at any MOD controlled Secure Managed Interface (SMI), as
defined at Chapter 15, that is transitted to facilitate checks for Malicious Software.
0730. Training of all users in measures against malicious software is critical; otherwise
protective procedures will not be followed. Helpdesk staff should also be trained in
recognising virus infections and should be familiar with reporting procedures. It is also
essential that effective contingency plans are in place to recover systems from virus
attacks and this implies trained personnel as well as suitable software.
Management Controls
0731. Most network operating systems employ security features which if applied
correctly will provide adequate file protection. Any file or directory on the network
that the user can modify is at risk from a virus. The system administrator should
adhere to the following rules when setting permissions for files/directories on the
network:
a. All executable files and shared templates on the network should be put
into a read-only directory.
b. Each user should have their own private home directory on the
network. Other users may be allowed to read from but not write to these home
directories. If a user’s workstation becomes infected the same user’s home
directory on the network may also become infected but the rest of the network
will be safe.
UNCLASSIFIED
UNCLASSIFIED
Malicious Software
These allow, for example, for documents to be created and modified by more
than one user. If one user’s workstation becomes infected the shared directory
may become infected. If a second uninfected user workstation then accesses
files on the shared directory this too may become infected. Each time a file is
accessed from the shared directory it should be treated with caution and
checked with anti-virus software prior to opening.
0732. For large systems and networks the system security officer, or an appropriately
security trained member of staff, should be identified as the focal point for the reporting
of virus infections. This role should be defined, together with an agreed scope of
authority, in the Security Policy Documentation. This member of staff should be familiar
with the escalation procedures in event of a large-scale virus infection. These escalation
procedures should cover actions to be taken with regard to connected systems and
reporting procedures to higher MOD authorities. Incident Handling is covered in
Chapter 11.
0733. Large systems and networks should have documented procedures on managing
incidents, in the form of an Incident Response Plan (IRP) as defined at Chapter 3. This
should include details as to how levels of degradation are to be managed, if it is required
for operational reasons. For networks and interconnected systems it may be necessary to
have a form of Service Level Agreement to cover circumstances, which could include
whether to:
a. keep the system running and manage in conjunction with the AVS
vendor;
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
d. Locate and isolate all disks and other I/O media, which may have been
used on an infected workstation.
a. Identify and isolate any workstation, which may have been infected.
b. Identify and warn any users that may have been sent infected files.
Recovery
0736. Once the PSyA is satisfied that an investigation will not be compromised they
may authorize disinfection and, where required, data recovery procedures. Virus
scanning and eradication of viruses from suspect workstations and disks is only to be
carried out by personnel specifically authorized to do so by PSyA.
0737. All malicious software incidents are to be reported initially using the format laid
down in Annex A to Chapter 11, then, when resolved to the Unified Incident Reporting
and Alert Scheme as described in Chapter 11. It is essential that an investigation is
carried out so that the source of the malicious software can be established and action
taken to limit the spread of infection and minimize the chance of recurrence. The
investigation should be initiated by PSyA in accordance with their own procedures.
UNCLASSIFIED
UNCLASSIFIED
Malicious Software
ANNEX A TO
CHAPTER 7
1. Systems which prevent unauthorized floppy disks being used on the PC,
significantly reduce the opportunity for viruses to be introduced. However, unless
authorization is always preceded by a thorough virus scan, preferably by more than one
scanning product, they provide no specific defence against the virus itself.
2. WMAG are proactive in that they aim to prevent any situation where a virus
can infect a computer system through a floppy drive. They work on the principle that
once the guard system is loaded on a PC, only authorized floppy disks can be used.
Whether or not the individual PC is granted the right to authorize software is decided
when the system is loaded. WMAG provide a mixture of software and hardware
control.
4. Some WMAG have additional utilities to monitor all processor activity and
then to prevent and report any actions which have been designated by the user as
illegal, such as an unauthorised write access to elsewhere on the disk. This helps
identify any virus which has not been caught by the gateway scan or has been
introduced into the PC through the communications port from a modem.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
a. Only authorized floppy disks can be used with the PC. This not only
reduces the risk of malicious software, but also the use of pirated software and
generally any unofficial software.
UNCLASSIFIED
UNCLASSIFIED
Malicious Software
ANNEX B TO
CHAPTER 7
1. Virus protection products can be divided into three broad categories: 'On demand',
'On access' and activity monitoring. 'On demand' products require the user to initiate
virus detection by starting the anti-virus software manually. This is the most common
way of using scanners and is ideal for providing a controlled anti-virus boundary for an
organization. It is only necessary to install such software on a small number of
quarantine "sheep dip" PCs to provide a measure of protection for all the organization's
PCs. 'On access' products check files automatically whenever they are to be accessed.
To be effective, this software must be installed on all the systems to be protected.
Activity monitoring software does not detect viruses, as such, but detects and blocks
suspicious activity. To be effective, this software must be installed and active on all
systems to be protected. Anti-virus software must be upgraded on a regular basis and
kept current.
2. Each virus has a form that can be recognised by appropriate software provided it is a
known virus. This is the basis of the best known type of anti-virus software - virus
scanners.
a. Advantages.
(1) The input medium can be scanned for known viruses before any
files are loaded or copied onto the system's hard disk(s).
(2) Companion software can normally locate and remove the virus.
(3) A single PC can act as a guard for all other systems by scanning
all incoming disks.
b. Disadvantages.
(1) Only viruses known to the scanner will be detected. As new viruses
are constantly being created, often by modifying old viruses,
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
(2) False detections can occur when part of a valid file is mistaken
for a virus.
3. Viruses can be detected by monitoring the system for 'suspicious' actions. Virus
protection software is available that will detect and intercept suspicious actions before
any harm can be done.
b. Disadvantages.
(1) Detects viruses only after they become active, however, if the
virus is not allowed to perform any damaging action this may not be
considered a disadvantage.
(2) The anti-virus software must be installed and running on all PCs
at all times to monitor program activity. Apart from the cost, the
presence of such a program will affect system performance.
4. Viruses that attach themselves to programs will make changes that are detectable. In
its most primitive form the program file will become slightly longer but it is possible for
UNCLASSIFIED
UNCLASSIFIED
Malicious Software
a virus to overcome this. More sophisticated detection methods introduce some sort of
'digital signature' calculated from the original file contents. If the file is infected its
signature will be different, making the infection apparent.
a. Advantages.
b. Disadvantages.
(2) Will not detect viruses that were already present when the initial
file signature was calculated.
Heuristic Scanning
5. Although the name implies a learning process, in practice, most software that uses
this technique checks files for the potential of 'virus type' activity. This is normally done
by disassembling the program code to detect 'suspicious' functions. In essence, it is an
activity monitor, which works prior to the virus becoming active.
a. Advantages.
(4) A single PC can act as a guard for all other systems by scanning
all incoming disks.
b. Disadvantages.
(2) Has been unreliable in the past but this technique is improving
and may become the best defence against Macro-Viruses.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Malicious Software
ANNEX C TO
CHAPTER 7
DEFENSIVE TECHNIQUES AGAINST VIRUSES
Introduction
Configuration Management
Back-ups
3. If a system is subjected to a virus attack the only effective means of recovering may
be to recover the files from backed-up material. The key to any recovery programme is
good backup procedures; accordingly, procedures for regularly backing up data must be
identified in system SyOPs.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
5. An organization can protect itself very effectively from disk borne viruses by setting
up a 'Boundary Protection Facility'. Boundary protection is implemented by ensuring
that all input media are subjected to virus checking and cleaning on specifically
designated "sheep dip" PC(s) before any files can be copied to the organization's
working PCs. It is recommended that the "sheep dip" PC(s) utilize both a virus
signature scanner and an heuristic scanner (often included in the same package). If
effective boundary controls are introduced, disks can be exchanged within the
organization with minimum risk of viruses being propagated. Boundary control can be
enforced by using disk authorization software which makes it impossible for non-
authorized disks to be read by PCs within the boundary.
E-mail Scanner
7. This resides on a (firewall) server and scans all e-mail before it is passed through to
the destination e-mail server. It is good network design to use this (on a server) in
combination with on-access scanners on workstations.
8. Internet connections are only allowable with authorization from the appropriate
accreditor. It is recommended that an air-gap be maintained between the Internet
terminal and user systems. Files originating from the Internet should be transferred
using a disk via the disk boundary facility.
9. Boundary protection is very effective but it is still possible for viruses to reach the
user's workstation via a number of loopholes. Unknown viruses will not be detected by
UNCLASSIFIED
UNCLASSIFIED
Malicious Software
a signature scanner and may fool an heuristic scanner, but the biggest loophole is
introduced by the increasingly common use of compression and encryption. It is not
possible for any anti-virus product to expand or decrypt all files as many compression
standards are used and 'blanket' decryption is not only virtually impossible but very
undesirable. The best way of dealing with this is to install 'On access' scanners and/or
activity monitors on the users' workstations.
10. Procedures used to protect from virus attack must conform to the basic principles
described below.
f. Direct connection to any external system shall only be made with the
explicit permission of the appropriate accreditor(s).
i. The network manager of any system with external links must provide
virus guard software to examine all incoming and outgoing mail.
11. The additional measures below should be considered when feasible and appropriate.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
a. Disk authorization packages can be used to prevent users using disks that
have not been virus checked. This will also prevent the use of 'pirated' software.
UNCLASSIFIED
UNCLASSIFIED
Introduction 0801
Background 0803
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
CHAPTER 8
Introduction
0801. This Chapter gives guidance on the security requirements specific to portable
Communications and Information Systems (CIS) in use within Defence.
0802. For the purposes of this document portable IT systems are defined as those
systems for which it is envisaged that there will be no permanent local security
environment. This introduces additional risks, particularly of theft and TEMPEST
considerations. Such systems, with the appropriate security accreditation, can be used to
produce data at any level of protective marking. Within the MOD, portable IT Systems
are categorised as follows:
0803. Portables do not include mobile systems such as those mounted on mobile
military platforms which are covered in Chapter 9, Deployable Systems.
Background
0804. Portable CIS are valuable and powerful management tools which enable more
flexible use of computing power. The inherent portability and power of such systems
creates a significant degree of risk to security.
UNCLASSIFIED
UNCLASSIFIED
0805. In the past, the lack of any certified technical means to safeguard such systems
led to the imposition of procedural safeguards which limited the use and effectiveness of
this technology within the MOD. The MOD has been severely embarrassed in the past,
not primarily by the loss of such devices, but by the potential compromise of data
contained within them.
0806. To prevent future embarrassment, a trusted means of protection which will
nullify the effects of a physical loss of such equipment can be employed. Evaluated and
certified products which encrypt systems in their entirety are now becoming available
enabling progressive liberalisation of the usage of Portable CIS. The policy on
encryption set out in paras 0821 to 0828 below is specifically aimed at reducing the
damage resulting from the loss or capture of Portable CIS.
Specific Regulations
0807. Accreditation All Portable CIS used to process official information must be
registered in accordance with the regulations laid down in Chapter 2, which will
include a “Authority for Carriage” letter. This includes, where applicable, the serial
number of the cryptographic key in the list of software.
0808. The accreditation of Portable CIS recognises an authorized Home Base. When
Portable CIS are removed from this Home Base they are to be accompanied by written
authority showing details of the system, associated magnetic media and peripherals and
their associated protective marking. Annex A gives a generic example of the letter of
“Authority for Carriage”.
0809. Privately owned Portable CIS are to be used in accordance with the regulations
stipulated at Chapter 1, Paragraphs 01091 - 01093.
0811. Physical Security and Siting Portable CIS can normally be used in any official
location in Great Britain, subject to any overriding local regulations with regard to their
carriage into sensitive areas.
0812. Care must always be taken to ensure that protectively marked information cannot
be overlooked by unauthorised persons.
0813. All magnetic disks, and other forms of memory storage which retain information
when the power supply is disconnected are subject to the appropriate document security
rules.
0814. Before importing portable equipment into any site, local security approval must
UNCLASSIFIED
UNCLASSIFIED
be obtained in advance, through the normal channels. The local rules in force for such
documentation, such as gate passes, remain in force. The rules governing Homeworking
are laid down in Chapter 1 Annex E.
0815. Installation Control All Portable CIS must meet MOD recognised EMC
standards. Any system which is intended to process information protectively marked
CONFIDENTIAL or above must have a TEMPEST certificate from an MOD
TEMPEST authority, and may only be used in MOD or OGD controlled spaces which is
already approved for processing of material at this level.
0816. In all cases the basic TEMPEST requirements for separation of protectively
marked systems, whether the laptop or fixed installations nearby, must be adhered to,
and care must be taken to site the Portable CIS away from telecommunications devices.
0817. Compliance ITSOs/BSOs must be provided with details of all portable CIS in
their area of responsibility for which they will issue appropriate authority for carriage
letters as laid down at Annex A. ITSOs/BSOs will be required to set up procedures to
carry out random checks of any Portable CIS introduced into their area to ensure that the
terms of their SPD are being met.
0818. Introduction of a privately owned Portable CIS onto MOD premises will be on
the understanding that the ITSO/BSO, or other security staff, have the right to check that
the use is within the regulations. At the discretion of, and if required by, the ITSO/BSO
this may include providing full access to any private data.
0819. MOD security guards are advised to random check containers that could be used
to carry portable CIS (i.e. bags) for the presence of such CIS, and, where found, may
require the bearer to produce the form of authorisation for carriage as laid down at
Annex A. Failure to produce such an authorisation may result in the temporary
confiscation of the equipment until the responsible ITSO/BSO can be contacted.
0820. Interconnection Portable CIS must not be linked to any other CIS or
network without prior security approval, including a Risk Assessment to the recipient
CIS. Links via a PSTN modem, ISDN Terminal Adapter (TA), or other such device
(e.g. embedded GSM in PDAs) across a public telephone system are forbidden, even for
UNCLASSIFIED working, without the specific approval of the Accreditor.
0821. Portable CIS holding material protectively marked CONFIDENTIAL and above
shall not be linked to the Internet.
UNCLASSIFIED
UNCLASSIFIED
SECRET respectively. Further COTS products are being certified under the ITSEC
scheme. Users seeking further advice on these devices should, in the first instance,
contact the appropriate PSyA. The procedures for the procurement, distribution,
accounting and use of Kilgetty within the MOD are described at Annex A to Chapter
23.
0823. The fitting and use of disk and file encryption products on officially provided
Portable CIS is to be in accordance with the endorsed SPD. [Note: Disk and file
encryption products are generally not available for Palmtops, Electronic Personal
Organisers and some Notebooks.] They may process information up to the level of
protection specified by the CESG algorithm provided with the product. Where
approved encryption products are not mandated and cannot be employed, or are not
considered necessary, then provided appropriate physical security measures are in place,
it is still acceptable for protectively marked information to be processed on portable
devices.
0824. The following rules apply to laptops taken outside the Global Security
Environment, i.e. away from the authorized home base, or are liable to loss or capture.
0825. If there are any technical difficulties in applying this policy, advice is to be
sought from the PSyA who can, exceptionally, exempt the requirement.
0826. The above policy represents the baseline standard. However the use of full disk
encryption is recommended for all Portable CIS processing official information that are
liable to removed from the Global Security Environment.
0827. Where a fixed hard drive is fitted to a system used to process and store
protectively marked information and the encryption option has been chosen, in
accordance with the regulations laid down in Chapter 23, the device must be installed
before it leaves the users home base.
0828. If the disk encryption product incorporates a Touch Memory Device, the Token
Key should be kept separate from the laptop whenever the Portable CIS is not in use or
in transit, and removed from the laptop when left unattended.
UNCLASSIFIED
UNCLASSIFIED
0829. Disk encryption products are vulnerable when the system is connected to a
public network. If a Portable CIS with a disk encryption product installed is to be
connected to a public network an inline COMSEC device must also be installed. If a
Portable CIS with disk encryption is lost or captured, and subsequently returned, the
BIOS must be reset and the disk encryption product must be unloaded and a new version
installed.
There are restrictions on the use and movement of cryptographic equipment abroad. If
it is intended to take a Portable CIS employing encryption outside of Great Britain,
advice should be sought from the PSyA via the security chain of command. Guidance
on the export and import of KILGETTY and similar encryption devices is at Annex B
to Chapter 23.
0830. The normal rules for the carriage of protectively marked documents apply in all
cases for the carriage of Portable CIS. Although encryption will permit the secure
removal of protectively marked information from units or establishments, the
procedures for this activity will largely relate to those already in place for hard copy
protectively marked documents. Personnel will not be able to remove encrypted,
protectively marked data without authority. The existing security regulations contained
within JSP 440, Volume 1 must be adhered to.
0832. Portable CIS, in addition to the attractiveness of any Protectively Marked data
contained, also constitute Valuable and Attractive (V&A) items, and if transported
outside of MOD controlled areas are at significant risk of being stolen, both whilst in
transport and if left unattended. The standard protective security regulations as laid
down in Volume 1 for the protection of assets must therefore be followed.
0833. All new Portable CIS, other than handhelds, which are intended to be
transported and/or used outside MOD controlled areas should be carried in a
container whose external appearance does not draw attention to the probable,
valuable and attractive, (V&A) nature of its contents (e.g for bags, neither being of a
distinctive “laptop bag” design nor visibly bearing any computer manufacturers or
suppliers label or logo). Any Legacy equipments should also be furnished with such a
container if their residual lifetime exceeds 1 year. The required style of container is
available from the MOD ICS catalogue.
UNCLASSIFIED
UNCLASSIFIED
Customs Issues
0834. When carrying any portable computers overseas, it is recommended that
copies of software license agreements should be carried, as some Country’s Customs
Official may require proof that no new or illicit software is being transported.
0835. Additionally, it should be noted that Her Majesty’s Customs and Excise
(HMC&E) has introduced a policy of randomly carrying out technical scans of laptop
computers for illicit material. Chapter 11 provides some background on what may be
regarded as illicit material, which is normally assumed to be the type of material of
Indecent or Obscene nature banned from MOD systems.
UNCLASSIFIED
UNCLASSIFIED
0838 Electronic Personal Diaries are not to be used for the storage of protectively
marked data.
0838 Handheld CIS must not be linked to any other CIS or network without prior
security approval, including a Risk Assessment to the recipient CIS. Data may be
exchanged with a standalone PC provided the exchange is permitted by the SPD for the
PC and the SPD for the organiser. The PC must have current 'On-access' anti-virus
software (AVS), installed which is updated regularly, as laid down at Chapter 7. Such
exchanges of data are to be limited to PCs operating at RESTRICTED and below.
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
Security of Portable CIS
ANNEX A TO
CHAPTER 8
GENERIC AUTHORITY FOR CARRIAGE LETTER FOR
PORTABLE IT SYSTEMS
On Official Letterhead :
FOR ATTENTION OF :
References:
A. JSP440 (Defence Manual of Security) Volume 3 (CIS)
B. Wassenaar Agreement
C. NATO Status of Visiting Forces Agreements
D. US International Traffic in Arms Regulations (ITAR)
Identification
1. In accordance with Reference A, it is hereby certified that the following officer
(“The Bearer”) is authorised to carry and use Official portable computer equipments :
Rank/ Title
Name
Post
Service/Staff Number
ID Card Number
Authorised Equipments
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Security Approval
3. This authorisation permits the use of the equipments at up to a <Protective
Marking> level of Protective Marking, in accordance with the Registration
Document/System Policy Documentation (SPD) and Security Operating Procedures
(SyOPs) which are to be carried with the equipment.
6. Any queries relating to the Bearer whilst in the USA should be addressed to:
Return of Equipment to UK
7. It has been agreed with Her Majesty’s Customs and Excise (HMC&E) that
should a Customs Officer at port of entry declare a requirement to scan the media
associated with these Portable Computer Equipments, the Bearer is to direct that the
matter must be referred to an appropriately cleared Investigation Officer, who should
be contacted through:
UNCLASSIFIED
UNCLASSIFIED
Security of Portable CIS
8. Should you require any further information, please contact the undersigned.
<Signature>
<Name>
<Rank/Grade>
<Establishment>/<Branch> Security Officer
a. Delete paragraphs not required, e.g. for a portable computer that is only to be
used in UK delete references B, C and D and paragraphs 4, 5, 6 and 7.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Security of Portable CIS
ANNEX B TO
CHAPTER 8
Introduction
1. This document constitutes the System Policy Documentation (SPD) and the
Security Operating Procedures (SyOPs) for the IT portable computer system as detailed
in the attached registration form. They are issued by the ITSO in accordance with the
Defence Manual of Security, and have been approved by the Accreditor. All personnel
using the systems are to comply with these SyOPs, and no departure from or amendment
to them is permitted unless prior authorization is obtained from Accreditor.
2. Breaches of these orders may render the offender liable to disciplinary action.
Administration
Job Title:
Branch:
Tel No:
Job Title:
Branch:
Tel No:
Personnel Security
7. All authorized users of this system must have the appropriate security clearance
for the material processed on the system. (Basic Check (BC), Security Vetted (SV) etc).
If need to know separation is necessary, users should not share magnetic media, unless
JSP 440 Volume 3 Issue 2 8B-1
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Physical Security
8. The system is normally based in .................................. and must not be removed
without the permission of the ESyO or ITSO. In addition a register must be maintained
showing the occurrences of removal of the system from its location. This register
should show the date of removal, responsible officer, location system taken to, and the
date the equipment was returned.
9. When not in use the system and any associated magnetic media, eg. floppy discs,
removable hard discs, etc, must be protected and handled in a manner commensurate
with the highest protective marking of material processed on the system.
10. Outside secure Defence environments the equipment may only be used for
unclassified work (ie. below RESTRICTED) unless specific permission for protectively
marked work has been given by the appropriate security authority. While equipment
and associated removable media are in transit outside a secure MOD environment, the
media should be carried separately from the equipment.
11. The equipment must not be operated within # metres of telephones, other
communication devices or any other electrical equipment processing protectively
marked information. (# metres to be defined for the system) No connection is to be
made to any Fax/Modem or other such device without the approval of the security
authority.
Document Security
12. The term 'documentation' in this context refers to any information-bearing part
of the system and includes floppy discs, removable hard discs, magnetic tape, internal
non-volatile storage and printer ribbons.
13. All magnetic media is to be uniquely marked and registered in accordance with
Security Regulations. Unless declassified by data destruction (see Annex C to Chapter
4) the protective markings of magnetic media will be retained and will determine the
eventual method of disposal of the media.
14. Document and equipment disposal must conform with the regulations pertaining
to the highest protective marking of material held on or processed by the system.
15. Information displayed on the VDU screen must be protected from overlooking
by unauthorized persons.
Hardware Security
16. Equipment must be checked before use for obvious signs of tampering. Any
JSP 440 Volume 3 Issue 2 8B-2
UNCLASSIFIED
UNCLASSIFIED
Security of Portable CIS
suspected problems should be reported to the ITSO without delay and the equipment
should not be used until checked and cleared.
17. Staff must declare the equipment in advance when visiting other organizations
and be prepared to forego its use in sensitive areas.
18. All protectively marked material is, where possible, to be removed from the
equipment before maintenance engineers are allowed access to it. Unless appropriately
security cleared engineers must be supervised whilst they are working on the equipment.
19. All magnetic media introduced to the system by an engineer for diagnostic
purposes must be checked for viruses first. All magnetic media used on the system and
faulty items removed from the systems must be treated in accordance with the security
measures appropriate to the highest protective marking of data held on the system; this
will normally result in such items being retained on Defence systems.
20. No item of equipment which may contain protectively marked material may be
removed from MOD premises for repair without permission from the appropriate
security authority. Where such permission cannot be given repair of the equipment will
be by total replacement of the faulty part(s) and the damaged component(s) must be
retained and destroyed in a manner commensurate with the potential protective marking.
Where protectively marked data is involved any magnetic media used by an engineer
for diagnostic purposes must be retained and the security measures pertaining to other
magnetic media apply.
21. All hardware failures must be reported to the SM who will arrange for the
necessary maintenance and maintain the records of system failures.
Software Security
22. All software used on the system is to be from authorized sources and properly
licensed. Software may only be installed with the express authority of the ITSO and
after the installation disks have been checked for viruses.
23. Back-up copies should be made of any software or data essential to the operation
of the system. These should be kept in a different location to the working copies of the
software and data files. Back-up copies should be made frequently and an annual test
should be conducted to verify that the back-up copies are usable.
24. Any suspected attack by a virus or other subversive software must be reported to
the ITSO without delay and the system should not be used until a security investigation
has been carried out. #Insert after here either the full rules from DMS Vol 3 of the
actions to be taken or refer to the chapters and paragraphs. This will depend on whether
the machine is to used solely on Defence sites.#
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Backup Procedures
27. Individual users are responsible for ensuring that back-up copies of any data files
essential to their work are adequately maintained.
Virus Protection
28. 'On-access' virus protection software must be installed and active at all times. The
installed anti-virus software must be updated on a regular (monthly or better) basis. If
the home base employs 'boundary virus protection', all disks used on the portable system
must be treated in the same way as a system in an external organization.
b. Unless explicit permission is given by the system manager, only data files
may be copied.
c. As soon as the copy has been carried out, the transfer diskette must be
returned to the originator. Under NO circumstance is the system to be rebooted
while the exchange media is in place.
d. The system manager should change the BIOS settings to force system to
look for the boot-up sector on the C: drive before looking at the A: drive.
b. The system is quarantined, along with all media associated with it.
c. Do not switch off or re-boot the system until being given permission to
do so by local or PSyA.
UNCLASSIFIED
UNCLASSIFIED
Security of Portable CIS
e. Locate and isolate all disks and other i/o media which may have been
used on the infected workstation.
f. Identify and isolate any workstation which may have been infected.
g. Identify and warn any users that may have been sent infected files.
31. Recovery of data must not be started until the ITSO is satisfied that any
investigation will not be compromised and gives explicit permission to begin. Virus
scanning and eradication of viruses from suspect workstations and disks is only to be
carried out by personnel specifically authorized to do so by PSyA.
32. Where the anti-virus strategy incorporates the use of a central "sheep dip" facility,
reinforced by the use of a workstation media authorization guard (WMAG), the WMAG
package must be set for a specific protective marking level. If there are systems working
at different protective marking levels, the WMAG must be set on a separate machine for
each protective marking level. End user systems should not contain software capable of
subverting the WMAG mechanism such as primitive level disk editors.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
RESTRICTED
Deployable CIS
DEPLOYABLE CIS
(CIS SECURITY ON OPERATIONS)
Chapter Para
General 0901
Responsibilities 0904
Countermeasures 0916
RESTRICTED
RESTRICTED
RESTRICTED
RESTRICTED
Deployable CIS
CHAPTER 9
DEPLOYABLE CIS
(CIS SECURITY ON OPERATIONS)
General
0901. Most CIS are in static environments with established physical security and
known threats. CIS security on operations must be appropriate for a range of threats and
changes of physical environments. Deployments are now commonly made by multi-
national ad hoc HQs, frequently with commercial equipment. Hence, the
enforcement of CIS security countermeasures on operations requires personnel with
the appropriate engineering skills, authority, responsibility and training
0902. Volume 1 Chapter 14 sets out the requirements for Security on Operations.
Sub-para 1414.d. requires that appropriate protective measures for IT systems on
such deployments are to be set out in System Policy Documentation (SPD) and
Security Operating Procedures (SyOPs) but gives no explicit advice. Volume 1
Chapter 14 Annexes C and D give advice on the protection of documents and
equipment but make no specific reference to IT systems, although it should be noted
that electronic media, such as disks, are to be treated as documents. With the advent
of an increasing number of actual and planned IT infrastructures for use in field
situations it is now necessary to promulgate a consistent policy for all systems based
on existing custom and practice. This chapter applies to CIS Security on exercises or
operations on land.
Phases of a Deployment
0903. A typical deployment may comprise one or all of the following phases for
which the threats and appropriate actions will differ:
RESTRICTED
RESTRICTED
Responsibilities
0904. The commander at every level is responsible for security within that
command. Security should enhance an operation; not constrain it. Nevertheless, the
compromise of security could well have much wider consequences than within the
command itself or the particular operation and this must be taken into account by
commanders when managing the risks involved. Commanders are to ensure that all
IT assets within their command have current accreditation.
0906. System accreditation covers the electronic environment inside each system
and the local environment that is controlled by the users of the system. The global
environment (controlled site) surrounding this local environment is controlled by or
on behalf of the joint or international higher HQ as part of the general security
requirement following the general security policy of that HQ. Authority to accredit
some minor CIS may be delegated to staff or units in theatre.
0908. Physical security measures for IT systems are described in Chapter 5. The
commander of a site is responsible for ensuring that systems within the site are properly
accredited and installed and that security procedures are followed. He may delegate
authority for these security enforcing functions to an IT Security Officer (ITSO) as
detailed at Annex A to Chapter 2 and to a RADSEC Control Officer (RCO) as
detailed at Annex E to Chapter 21. Additional CIS equipment brought into a site is to
be "adopted" both by the RCO for installation practice and by the ITSO for
confirmation that user security procedures are held and followed. Deployment RCO
and ITSO are required to provide security advice in roles where they may be isolated
RESTRICTED
RESTRICTED
Deployable CIS
from support for extended periods of time. The RCO must therefore be experienced
in both general installations and TEMPEST matters and the ITSO must be
experienced in both general and procedural security.
0910. Every individual who handles protectively marked or vital information and
material is personally responsible for safeguarding it in the appropriate manner.
Normally, only individuals who have been explicitly approved are to have access to
such information and material. SyOPs are to address this issue in detail. To assist
availability, security documentation should preferably be on the system or in soft copy.
Additional Vulnerabilities
0911. Some of the additional vulnerabilities arising from operational deployments
are as follows:
c. Individuals are more likely to make mistakes and neglect duties due to
extreme physical conditions and tiredness.
RESTRICTED
RESTRICTED
f. Private or official commercial CIS use, e.g. flight bookings, must only
include the minimum essential official information.
Threat Assessment
0913. A statement of generic threat to IT systems is given at Annex B to Chapter 3.
This can be customised for IT systems intended for deployment within the SSP. When
a system is deployed to a new theatre of operations, the accreditor is to be notified so
that the predicted threat may be validated against the current threat, and appropriate
additional countermeasures, relaxations or waivers adopted. If the system manager is
notified of a change of threat, this is to be passed to the accreditor.
0914. IT systems are a principal source of information from which the enemy and
other potential attackers will attempt to derive information. Additional threats, to
those given at Annex B to Chapter 3, are as follows:
d. The level and type of threat will vary over time and must be kept
under constant review. Thus in static operations, espionage may be a major
threat whereas in mobile operations the risk of loss and capture is more
significant. IT systems which are intended for deployment on operations are
to have appropriate countermeasures detailed in their SSP and SyOPs.
0915. IT systems intended for deployment are accredited against a generic set of
threat, information types, user types, location types, interconnection requirements and
management control with agreed countermeasures. Whilst many systems are used as
predicted, operational circumstances can change the system requirements and available
RESTRICTED
RESTRICTED
Deployable CIS
resources. Unsanctioned changes may cause an unnecessary risk and invalidate the
authority to operate the system. The proposed change must be detailed to the accreditor
and a waiver sought. For installations, the RCO may authorise changes on behalf of the
CIDA but must notify both CIDA and the accreditor if national minimum standards
cannot be met and seek a waiver.
Countermeasures
0916. Collective Security (The Global Environment). IT systems do not exist in
a vacuum. They can expect to receive considerable protection from the surrounding
environment in which they are located. This will range from the conceptual, such as
policy on personnel vetting or the release of information, to the severely practical,
such as the provision of guards. The following are particular measures to be
included in SyOPs.
RESTRICTED
RESTRICTED
0918. Electronic Security. Within IT systems it is usual for the system itself to
enforce security, using software, cryptography and so on. From the user point of
view this is initiated by the entry of a password on the system, which allows it to
identify a role and permit access to certain resources. In static situations it will be
normal to allocate passwords to individuals to enforce accountability at this level. At
the discretion of local System Manager it is permissible to amend this rule as
follows:
a. Should the operational situation require it, a single role and password
may be shared by a number of staff users only if a paper record is maintained
as to who had access to a work station at any time (by use of a shift log etc.)
The local system manager is to record the decision to use group passwords
and the situation that justified their use. Such paper records are to be retained
for a period of 5 years.
RESTRICTED
RESTRICTED
Deployable CIS
Compliance Activities
0923. Notification to the Security Authority of the deployment of a system on
operations is a trigger for several compliance activities as follows:
c. Monitoring as appropriate.
Further Advice
0924. CIS Security on operations is a complex and developing field, advice is
available and should be sought from theatre J2 staff, PSyA and Senior HQ security
staff as required.
RESTRICTED
RESTRICTED
RESTRICTED
UNCLASSIFIED
Internet Security
INTERNET SECURITY
10 Internet Security
Introduction 1001
Compliance 1035
Cryptography 1044
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Internet Security
CHAPTER 10
INTERNET SECURITY
Introduction
1001. The Internet provides a means of connecting computers around the world. It is
an open environment, whose whole purpose is to facilitate the exchange of information.
However, its very openness also makes it vulnerable to security threats. The Internet is
a public network that has no central management or control. The user has no control
over the route a message will take when it crosses the Internet and it is possible for
messages to be read or modified. Connection of a system to the Internet makes it
vulnerable to other Internet users with malicious intent. Even though a very tiny
minority of users will attempt to steal, alter or delete information or disrupt services and
systems, the risk will always be there.
a. E-mail, which allows the exchange of mail messages with other users
anywhere in the world. E-mail is more than a messaging service as it provides
the facility to append a variety of attachments;
1003. The security issues for each of the above services are included in the table at
Annex A.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
important to ensure that the appropriate security controls and procedures are
implemented to protect MOD assets.
1005. Malicious software poses by far the greatest risk to Internet users. It is vital that
adequate protective measures, as detailed at Chapter 7, are introduced to diminish the
risk of virus infection spreading from an Internet connected system or terminal to other
systems within an organisation.
1006. Hacking, unauthorised release and interception are the other significant risks
associated with connection to the Internet.
1007. Users of any MOD system considering connection to the Internet must
understand the risks of taking such action and ensure that the security policy detailed
below, which also applies to other public data networks, is followed in all cases.
Authority To Connect
1008. Authority to connect to the Internet from within the MOD is retained at TLB or
Trading Fund level. Applications are to be made through the local IT Security Officer
(ITSO), Branch Security Officer (BSO) or equivalent to the appropriate Principal
Security Advisor (PSyA) and the Coordinating Installation Design Authority (CIDA).
1009. Due to the very public nature of the Internet, security relevant incidents which
relate to its use by MOD are likely to attract a much greater amount of unfavourable
reaction from both the Press and, potentially, Parliament, than the perceived impact of
the incident in simple (Confidentially) terms would suggest. Security staffs therefore
may require in the event of such incidents to direct that connection to the Internet be
severed until appropriate remediation can be applied.
1011. All systems must have appropriate Security Policy Documentation (SPD) as
laid down at Chapter 3. For standalone systems this will typically be a set of Security
Operating Procedures (SyOPs) expanded to include basic configuration details, which
are to be approved by the appropriate PSyA. All systems connected to, or to any system
onwardly connected to, the Internet must be accredited. Only authorised personnel
should be permitted to use the system.
1012. The system to be connected should normally be dedicated to the role and
process only non-protectively marked (i.e. UNCLASSIFIED) information. Protectively
marked material must not be published on the Internet. Any official information
processed, which is not for public view should be segregated by use of a firewall or
UNCLASSIFIED
UNCLASSIFIED
Internet Security
similar product, the sophistication of which will depend on the quantity and type of
information held on the system.
1013. The provision of telephone or other communications lines, which may be used
to provide Internet, access will vary depending on local circumstances. In all cases,
however, potential users must seek the advice of both the appropriate PSyA and the
Authorised Telecommunications Officer (ATO).
1015. Gaining a connection to the Internet also requires prior approval from the
sector Co-ordinating Installation Design Authority (CIDA). The CIDA is concerned
with the load on telecommunications networks and the security of the proposed
installation, including the risk of TEMPEST (the leakage of electromagnetic
radiation from computer equipment which could potentially compromise secure data
on nearby machines). As a result of this approval process, it may be necessary to
make changes to the physical layout of the office. The CIDAs are listed in Chapter 2
Annex E.
1017. The approval of the PSyA must be obtained prior to connection. In addition to
clearly detailing the requirement and the protectively marked information involved, the
case to connect must demonstrate fully that an assessment of the risks has been
undertaken and any residual risk accepted.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
1020. Users of stand-alone Unclassified systems attached to the Internet should ensure
that the information held or created, does not, by virtue of its nature or aggregation,
warrant upgrade to a higher level of protective marking. If this does occur, the
information should be removed to a different system and the hard disk used during
connection to the Internet must be overwritten in accordance with the procedures in
Chapter 4.
1021. Transfer of information from a system connected to the Internet must follow the
policy and procedures set out in Chapter 7 for checking for the presence of viruses and
other malicious software. Extreme care must be taken if importing executable code.
1023. National policy allows the use of encryption products incorporating Public
Domain (PD) algorithms for Baseline encryption and applies primarily where there is
a requirement to protect information for confidentiality. Baseline products will
normally be developed commercially and evaluated by CESG for government use
through the CESG Assisted Products Scheme (CAPS) prior to their inclusion on the
DCSA Catalogue. Further information on the application of cryptography is at para
1044 and Chapter 23.
1025. Beneath these High Level Domain (HLD), MOD units and formations can
register sub-domains, and advice on acquiring Official domain names can be
obtained from DCSA CM DNAA on Copenacre Military (01225-81-) 3379.
1026. FIRST is the international Federation of Incident Response and Security Teams,
which, amongst other activities, takes responsibility for assigning focal points for
Internet domains.
UNCLASSIFIED
UNCLASSIFIED
Internet Security
1028. All MOD Internet facilities must use these Official domains, and Legacy
domain names not complying with these conventions must be migrated to an Official
domain name by February 2002. In certain cases other additional domain names
may also be used, with the justifications normally accepted being :
a. Where there has been prior (Legacy) use of a non-Official domain for
a publicly known Internet facility, such as a website or widely distributed
email address, and where the immediate cessation of such a domain could
cause a loss of communications. The need for such additional external
domains should be reviewed on a regular basis ;
b. Where the unit or formation deals with the general public, and there
are concerns that a domain name could accidentally or deliberately be
generated that may appear to those not aware of the MOD’s domain policy as
an Official address. In such cases (e.g. MODCERT) registration of the
relevant .ORG and .ORG.UK domains will normally suffice to “preserve the
brand”.
1029. In all cases where external domains are to be used, DCSA CM DNAA and
DCCS(IN) must be informed, the primary website and email addresses must be set
up on, or migrated to, an Official domain, and redirection emplaced on the external
domain to the Official domain. It is permitted to retain a single redirection webpage
on such external domains, which should contain the following information :
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
1032. For simple, standalone, Unclassified systems being connected to the Internet
however, the SMI can be constituted with the following software functionalities as a
minimum which can be considered to provide some measure of Integrity and
Availability protection:
Incident Handling
1034. Any abnormal security related conditions identified by a user must be reported
to the security authorities as well as to technical support staff. The normal incident
reporting methods are to be applied. The rules for incident handling are covered in
detail in Chapter 11, and it is stressed that due to the pervasive nature of the Internet,
timely reporting of incidents is vital.
Compliance
1035. The controls that have been implemented should be regularly reviewed to
ensure that they are being used properly and that they still provide the level of
protection that meets the security requirement.
1036. All CIS that is used to store, process, or forward Official MOD information
remains liable to Compliance Checking, as laid down at Chapter 12.
UNCLASSIFIED
UNCLASSIFIED
Internet Security
E-Mail Security
1037. Official e-mail addresses should, wherever possible, conform to the naming and
addressing standard as specified by the Defence Message Handling Sub Committee
(DMHSC) and should be disclosed with discretion and only used for official business.
They are to use Official Internet Domain Names and their associated Mail Exchange
(MX) e-mail addresses as laid down earlier in this Chapter.
1038. Unless the e-mail service is provided from a MOD infrastructure with a pre-
assigned ‘.mod.uk’ / ‘.mil.uk’, ‘.dstl.gov.uk’, or ‘.moduk.org’ address, there are 2
ways to achieve a ‘.mod.uk’ / ‘.mil.uk’ e-mail address :
1039. Although it is unlikely that mail hosts will afford users with the opportunity to
automatically generate strong (CESG approved) passwords, where the user is given the
option to choose the mailbox password then these should be selected in accordance with
the guidelines given at Chapter 6 Annex A.
1040. There are potential dangers in using e-mail and that these particularly relate
to the legal ability to access interpersonal e-mail and the capability of e-mail systems
to retain messages deleted by the sender. In addition e-mail messages may be
disseminated to, and therefore retained by, a much wider audience than the sender
intended. Close attention should be paid to the protective marking of material and the
factual content of e-mail messages.
a. Contract. The e-mail is not intended nor should be taken to create any legal
relations, contractual or otherwise;
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Mail Servers
1042. Any mail servers connected to the internet should be configured not to return
“user not known” or similar responses, as the probing of mail servers by random
email addresses for such responses is a well known technique used by attackers to
carry out a reconnaisance of systems.
1043. All email servers connected to the internet must be configured to preclude
their operation as Open Mail Relays. This is an essential attribute for all MOD email
servers, aimed at prevent unauthorized users from utilizing MOD assets for purposes
such as anonymous, abusive or bulk mailings, which can lead to offending servers
being blacklisted and thus rendered unusable.
Cryptography
1044. Material not attracting a protective marking may be sent over the Internet
without protection. Cryptographic protection should be considered if there are integrity,
availability or authentication issues associated with the material.
a. For electronic mail only, Baseline Grade (BG) cryptography that has
been approved by CESG may be used to protect transmissions between
appropriately cleared parties. This will normally involve the offline
encryption of RESTRICTED attachment to be linked to an UNCLASSIFIED
email, and is based upon an assumption of randomness, dilution, and short
duration of storage. The use of mailboxes as “virtual repositories” (i.e. where
they not regularly cleared) could potentially attract a requirement for a higher
grade cryptography for any material stored therein. This is likely to be a
particular issue for Web-based mail ;
b. For all other uses, including FTP server, “Virtual Drives”, and remote
backup services, InfoSy(Tech) should be contacted through the PSyA or
DSSO as to the requirement.
1046. The use of the Internet for transmission of material protectively marked
CONFIDENTIAL and above is currently prohibited.
UNCLASSIFIED
UNCLASSIFIED
Internet Security
1050. The MOD and the single Services have well-established Websites, managed
by the Directorate of Corporate Communication Services (DCCS) for the three
Service DCCs. DSTL also maintains a number of Websites. In general, the MOD
central Website oversees MOD and tri-service subjects and the Service Websites deal
with single-Service subjects. DCCS also has a wider responsibility for MOD policy
on the use of the Internet.
1051. All the Webmasters listed below welcome enquiries from anyone in MOD
who wishes to publish information or provide services over the Internet:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
1052. All MOD information must be published on a Web server with measures in
place to provide Integrity and Availability protection. The unauthorised modification
(e.g. defacement by a "hacker") is likely to attract a significant amount of unfavourable
reaction from both the Press and, potentially, Parliament. Defacement and excessive
downtime cause unacceptable damage both in terms of MOD's public image and its
ability to provide services to the public.
1053. All Web servers hosting official MOD web sites, whether directly managed by
Government or using DCCS contracted Servers, must therefore be Accredited by the
relevant PSyA or the DSSO. In order to obtain accreditation it will be necessary for
details of the security measures required to achieve security Accreditation to be
enshrined in the security aspects letter agreed as part of the Contract. The Target of
Accreditation will be at minimum :
UNCLASSIFIED
UNCLASSIFIED
Internet Security
1055. As with e-mail addresses, it is important that only recognised, Official MOD
Internet Domain Names are used for MOD Websites. The primary Websites for each
Official domain will have Home Page links to a number of pages of global applicability
for all MOD web sites, including aspects such a Copyright, Disclaimers, Acceptable
Use, and a list of all recognised Official Domains, as well as Security issues.
1056. Links for security issues will include embedded email hotlinks, and alternative
contact details, to permit Internet users to contact the MODCERT. It is therefore
important that all official MOD Websites must provide a link back to one of these
primary sites so that users can easily notify MODCERT if any vulnerabilities are
detected on MOD Web servers.
1057. Where the author has a business requirement to publish directly to the Web
server, either due to the volume of material or frequency of updates, it is possible to
provide access to a sub-directory on the MOD server that can be accessed remotely.
This requires prior approval by the MOD Webmaster.
1058. Unofficial Websites, such as those belonging to MOD clubs and societies,
and private Websites established and maintained by individual staff are not to display
any protectively marked material, or any official information, which is not for public
view. Additionally, such Websites are to conform to the principles of the Data
Protection Act (DPA) and other relevant legislation. The style and presentation of an
unofficial or private Website should not give the impression that it is an officially
sanctioned source of Defence information. Staff are advised to seek advice through
the local ITSO if they are considering establishing a Website on a Defence or
Government related topic. Any links to official MOD Websites must be approved by
the Accreditor of that Website. Staff maintaining unofficial Websites are to ensure
that these do not provide links to other Internet sites which might damage the public
image of the MOD or cause it unnecessary embarrassment.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Intranet Security
1060. An Intranet uses Internet technology and communication protocols on a
network, or group of networks, which can be accessed only by authorised
individuals. An Intranet can provide the full range of Internet type services and can
be connected to the Internet through a controlled gateway. Intranets are systems and
as such are subjected the policies set out in this manual. Some specific policy issues
are highlighted below.
1061. The protective marking of e-mail messages and their attachments must be
clearly displayed in accordance with the SyOPs for the system.
1064. Staff responsible for Websites should ensure that information held or created,
does not as a result of aggregation warrant upgrade to a higher level of Protective
Marking than that to which the Intranet is accredited.
1066. The Internet is a hostile environment, and appropriate care should be taken
when using Internet facilities to preserve Confidentiality, Integrity and Availability.
Although this is not an exhaustive list of precautions, the following should be
UNCLASSIFIED
UNCLASSIFIED
Internet Security
considered, both when using the Internet for official purposes, and also when using
the Internet by other means for personal purpose.
1067. Staff should be aware that some companies are offering Internet services
specifically targeted at the armed forces. These companies may use official sounding
names and offer the use of e-mail addresses with authentic military sounding domain
names.
1068. Staff should be cautious in their dealings with companies offering Internet
services, and in particular in any personal use of Internet features such as Chat
Rooms. Reference to personal details, which could affect their personal security or
reference to official activities or Service interests, should be avoided. Staff should be
vigilant in their use of the Internet and if in doubt staff should verify the authenticity
of those that they are dealing with. In any instances where personal internet contact
expresses interest in service, departmental or political affairs, especially if this contact is
from a foreign country, should be reported to the relevant unit security officer.
1069. Internet addresses of all kinds (e.g. mail name, Web server, File Transfer
server) are easily “spoofed”, and wherever possible some authentication should be
used before trusting any information obtained from the Internet.
1070. For Web and File Transfer servers, it is preferable to use the IP address
(dotted decimal format) when known rather than the eye readable domain name
format. It is relatively easy either accidentally or deliberately to “poison” either the
Domain Name Service (DNS), or a local Cache or Proxy, so that the information is
sourced from a different server, which may have been subverted by an attacker.
1071. All files downloaded from or transmitted across the Internet should be
checked for Malicious Software, in accordance with Chapter 7.
1072. All Internet users should be aware of the dangers of false information, known
as “Hoaxes”, many being passed on from the originator via reputable sources.
Guidance on spotting hoaxes, and their close relatives Chain Letters, is given at
Chapter 11.
a. External organisations will log accesses to their own Websites. This can
identify both the user and the MOD. It may give further information to others
for instance when an interest is expressed in a Newsgroup posting;
c. Software, or other information, must not be downloaded unless the user has
the right to copy it;
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
1075. The use of private internet facilities for official purposes on anything other than
an occasional is discouraged, as if a business case exists (e.g. email exchange or file
retrieval) for the use of Internet for official purposes, official CIS support should be
procured and installed.
1076. The are facilities to monitor against misuse of the Internet. For example,
some Internet Service Providers (ISPs) are able to provide audit trails. Commercially
available software can also be used to limit access to a predefined range of Websites,
e.g. pornographic sites.
1077. Types of prohibited activity are listed at Annex B. It is recommended that that
a copy of Annex B is displayed next to terminals connected to the Internet.
UNCLASSIFIED
UNCLASSIFIED
Internet Security
ANNEX A TO
CHAPTER 10
SECURITY ISSUES FOR INTERNET SERVICES
The table below sets out some security issues and solutions for each of the major
Internet services.
Protection for Information Exchange, E-Commerce and EDI can be provided by the
use of a Value Added Network (VAN) as an alternative to the Internet
UNCLASSIFIED
UNCLASSIFIED
Internet Security
UNCLASSIFIED
UNCLASSIFIED
Internet Security
ANNEX B TO
CHAPTER 10
PROHIBITED USE OF INTERNET SERVICES
1. The use of Internet services in the following types of activities is specifically
prohibited.
2. These activities may result in disciplinary action being taken against the person
found misusing the Internet service for such purposes.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Principles 1110
Responsibilities 1115
Detection 1122
Triage 1124
Reporting 1132
Hacking 1147
Assessment 1171
Response 1175
Remediation 1186
Closure 1187
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Authority 1190
UNCLASSIFIED
UNCLASSIFIED
CHAPTER 11
1102. MOD’s ability to respond and contain security incidents occurring within the
Electronic Security Environment (ESE) of the MOD’s CIS is fundamentally less easy
to reduce to simple rules, as the nature of issues constituting an incident is less clearly
delineated in these cases. The topic of incident handling is part of the wider issue of
what is referred to in Allied groupings as Alert, Warning and Response (AWR), with
details of the Warning policy within MOD being contained in Chapter 2 Annex G.
1103. Of particular note is the fact that even if such an event occurs on an
UNCLASSIFIED or CL4 CIS, it may either directly or indirectly put Official
information at risk, or have additional implications. A good illustration of such wider
implications would be the unauthorised modification (e.g. defacement by a hacker) of
an Official Website. This is a compromise of the integrity of Official Information,
albeit UNCLASSIFIED, and is likely to attract a much greater amount of unfavourable
reaction from both the Press and, potentially, Parliament, than the perceived impact of
the incident in Confidentially terms would suggest.
1105. The terms CERT (Computer Emergency Response Team or CSIRT (Computer
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Security Incident Response Team) are often colloquially used to describe the
organisations responsible for this type of activity, but with wide variations on Terms of
Reference. Within MOD therefore, the following terminology is to be used to describe
elements of the role:
1107. CIS Incidents may impact on some or all or the following Security services:
a. Confidentiality;
b. Integrity;
c. Availability.
1108. This Chapter describes the method which is to be used to report and respond to
such security-relevant incidents or weakness, involving an initial fast response,
followed by a more considered report.
UNCLASSIFIED
UNCLASSIFIED
Principles
1110. In order to appropriately handle all Information Security Incidents within
Defence, it is important that the standardised procedures laid down in this Chapter are
used in handling all incidents, however trivial they may seem initially, as failure to do
so may jeopardise any investigation or other follow up action later discovered to be
necessary.
National Policy
1111. The National Infrastructure Security Coordination Centre (NISCC) is a
distributed organisation consisting of various central Government Departments
including CESG, MOD/DSTL and the Police co-ordinated through the Cabinet
Office. It is responsible for overall issues relating to Infrastructure Security, and in
particular is charged with:
Privacy Of Data
1113. It is a condition of use of all Departmental CIS facilities is, and will continue to
be, subject to monitoring, a fact which will normally be part of the User Security
Instructions (USyI) or Security Operating Procedures (SyOPs) that users are expected
to sign for as having read on a regular basis.
1114. All material held on MOD CIS equipment is deemed to be the property of the
Department itself, and staff are reminded that, as a consequence, so-called private
information held on any Departmental IT facility will not be afforded any special
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
protection and will be accessible to line management and investigating staff without
notice.
Responsibilities
1115. Joint Security Co-ordination Centre (JSyCC) The JSyCC, as detailed at
Chapter 2, has overall responsibility for co-ordination of all information security
Alerting and Incidents Handling within MOD:
1116. During working hours, incidents should normally be reported to JSyCC via the
appropriate MRC where one exists. For significant issues that occur outside core
working hours, the MOD maintains an Information Security Duty Officer (ISyDO),
which is a role fulfilled by members of DDefSy or JSyCC staff, and is nominated to
GCERT (UNIRAS) as the MOD’s initial point of contact for all Information Security
problems, and for OGDs reacting to Electronic Attack. Contact details for the JSyCC
are given at Annex A, and the ISyDO can be reached through the JSyCC.
UNCLASSIFIED
UNCLASSIFIED
the affected unit(s), skills required, and IRST resource availability. Contact details for
MOD IRST formations are given at Annex A, but it is stressed that units should not
normally approach an IRST direct, but rather must report the incident first to the MRC
or JSyCC and allow triage to be carried out.
Incident Cycle
1119. The Incident Response Cycle consist of the following phases:
a. Detection;
b. Triage;
c. Reporting;
d. Assessment;
e. Response;
f. Post-Analysis;
g. Remediation;
h. Closure.
1120. Responsibility for incident handling is shared between the System Operating
Authority (SOA), Line Management, and the Security Staffs.
1121. Incident Handling procedures are part of the overall MOD AWR capability,
with the Warning function, as described at Annex G to Chapter 2, being an element of
the MOD Security Intelligence capability as defined at Chapter 1 of JSP440 Vol 1.
The CIS A&W is a function performed by JSyCC on behalf of the Departmental
Security Officer (DSO), and is intended to derive useful information from studying
attempts to break through security controls. Although security intelligence is a matter
which is principally the concern of security staffs and security units, all personnel in
the MOD, whether Service or civilian, contribute to it by the prompt reporting of
suspicious activity.
Detection
1122. Incidents will be detected by:
a. User Organisations;
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
c. Security staffs;
e. MRCs.
1123. All MOD users are responsible for the reporting of any incident they discover
through the appropriate chain of command.
Triage
1124. The process of Triage is that of an initial assessment of severity of any incident
immediately after its detection, and deciding the nature of the immediate action
required.
1126. There should normally be no need to carry out a specific Impact assessment, as
the CIS should already have a Criticality Level (CL) assigned, as laid down at Chapter
1 Annex A. However, it is possible that the CL of a system may need to be varied to
meet particular circumstances, for instance if it is supporting an Operational
Deployment.
1127. Having made a severity assessment, reporting units should attempt to make an
initial classification of the incident type, based upon the following taxonomy of CIS
Security Incidents types derived from the UNIRAS system :
b. Hacking:
UNCLASSIFIED
UNCLASSIFIED
(iii) Internal;
c. Malicious software:
(i) Virus;
(ii) Worm;
(iii) Trojan;
d. Misuse of resources;
e. Physical infiltration;
f. Theft;
i. Personnel shortage;
j. Damage / disaster;
k. Fraud;
l. Bogus enquiry;
m. Hoaxes;
n. (Other).
1128. Hoaxes. The Internet is constantly being flooded with information about
Malicious Software (e.g. computer viruses and Trojan Horses). However, interspersed
among real Malicious Software warnings are hoaxes. Whilst these do not infect
computer systems, they are still time consuming and costly to handle.
1130. All other warnings should be treated as provisional in the first instance. A
Defence Information Assurance Notice (DIAN) is issued on a regular basis that lists
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
CIS related Hoaxes known to be circulating, along with a list of Internet Uniform
Resource Locators (URLs) to Open Source references on known Hoaxes that are
updated on a more dynamic basis.
1131. Only once these sources have been reviewed, to make an initial estimate of the
nature of any non-authoritative warning received, should the appropriate escalation
action be taken :
Reporting
1132. It is mandatory for all Defence related CIS that all suspected, attempted, or
actual incidents and weaknesses are to be reported to the JSyCC, via the relevant MRC
where appropriate. Reporting of incidents is a vital part of the overall information
security posture, as the trend analysis that can be performed at both a National
(UNIRAS) and Departmental (JSyCC) level is used on an evolutionary basis to inform
the risk management judgements.
1133. The potential impact of any occurrence, which will normally be the Criticality
Level (CL) of the affected systems is used to determine the timescale in which the
incident should be reported to the relevant MRC for upwards reporting to the JSyCC.
Normal reporting timescales are detailed in the following table:
UNCLASSIFIED
UNCLASSIFIED
1134. Special considerations also apply to certain types of incident, as detailed later
in this Chapter.
1135. Early initial reports to Security Staffs allow a rapid judgement to be made as to
the severity of the incident, and to minimise any delay likely to accrue in return to
normal working whilst any required security response takes place. It will also provide
them with an opportunity to provide specialist advice and guidance to the establishment
at which the incident occurred.
1136. Care must be taken to assign an appropriate Protective Marking to all reports,
and to use appropriate communications channels to meet this Protective Marking.
1138. A summary of the information required for initial reports is provided at Annex
C, and some units may have access to software that will allow automatic submission of
this information to the MRC / JSyCC.
1139. In all cases, a full report will also be required once the Incident has been closed,
protectively marked according to its content. In all cases where Criminal or Security
investigation has occurred, the report should be marked RESTRICTED-
INVESTIGATION at minimum.
1140. The final report should normally be completed by the Unit(s) detecting the
Incident, and is to be forwarded to JSyCC, via the MRC where appropriate. An
electronic version is available for online completion on some MOD Intranets, which
will allows the updating of the record created for the initial report.
1141. If in doubt as to which form to complete, contact the appropriate MRC or the
JSyCC. On no account is the vendor of a faulty product to be informed without first
seeking the advice of the JSyCC.
1142. Major Breaches. Certain categories of incident will require either a more rapid
or in-depth investigation than that indicated by CL alone, including in some cases a
Counter Intelligence (CI) investigation. Unit(s) detecting the Incident, or the MRC,
should immediately contact the JSyCC or ISyDO for direction in all instances of:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Security Breaches
1144. Breach of Security Policy. Where a breach of National or Departmental
security policy has occurred, the Head of Establishment is responsible for ensuring that,
in addition to any action required by this Chapter, appropriate personnel security action
is also taken.
1145. Cryptosecurity Breaches. More details on this topic are provided at Chapter
23.
1146. Transmission Violations. More details on this topic are provided at Chapter
18 (Telephony), Chapter 19 (Facsimile), Chapter 23 (Cryptosystems), or Chapter
25 (Messaging Systems).
Hacking
1147. Electronic Attack Electronic attack is defined for UK Government as
gaining unauthorised electronic access to a CIS in order to exploit them for
unauthorised or intelligence purposes, or, in the case of MEA, to disrupt their
operation. This is often referred to in Allied documents as a Computer Network
Exploitation (CNE) or Computer Network Attack (CNA).
1148. At the simplest the defacement of an Internet or Intranet Web Site is prima
facie evidence that a MEA has occurred, although the fact that an intrusion has
occurred does not in itself mean that there has been an EA or MEA.
UNCLASSIFIED
UNCLASSIFIED
1150. Outside of Defence, the de facto method of assigning EAR focal points for
Internet domains lies with the Federation of Incident Response and Security Teams
(FIRST) organisation. MOD, through DCSA, is registered via Nominet as the owner
of the Internet Class A 25.x.x.x domain (‘.mod.uk’ /‘.mil.uk’), the Class B domain
146.80.x.x (‘dstl.gov.uk’/ ‘dera.gov.uk’/ ‘dera.hmg.gb’) operated by DSTL, and Class
C domain 205.136.x.x (‘moduk.org’/ ’bdsw.org’) operated by BDS(W). MODCERT
is registered with FIRST as being the competent authority responsible for these
domains, with JSyCC being designated as the focal point for all communications
with other FIRST Teams.
1151. Additionally, there are a number of Legacy Internet Websites and mail
addresses used by MOD without this naming scheme, most of which will be operated
by ISPs on behalf of MOD, which have not as yet been migrated to an Official
domain. It is important that the JSyCC, as the MOD FIRST point of contact, is
informed immediately of incidents affect such CIS.
1152. The ‘.mil’ Internet Top Level Domain (TLD) and its associated sub-domains
are not related to UK MOD, but rather to the US DOD. However, as JSyCC has
cooperation agreements with FIRST, Allies, Other Government Departments (OGD),
and commercial entities that constitute the Critical National Infrastructure (CNI),
incidents affecting any TLD or High Level Domains (HLD) relevant to such partners
should be notified to JSyCC who will make sure the appropriate authorities are
informed.
1153. Other External Hacking. This incident type covers the majority of Intrusions
that make the attention of the News Media, and will include the activities of Hobby
Hackers, Hacktivists and Script Kiddies. Regardless of apparent motive, any Intrusion
will be regarded as prima facie evidence of a criminal activity, typically of the
Computer Misuse Act.
1154. Internal Hacking. The nature of what constitutes Internal Hacker is difficult to
define, as it often will not technically constitute an Intrusion. Typical examples would
be privilege abuse (e.g. unauthorised modification of shared files), or unauthorised
privilege escalation (often referred to as a root compromise from the UNIX heritage).
1155. In all cases where an external intrusion into MOD networks has occurred, part
of the investigation will normally require a “trace back” in an attempt to ascertain the
origin of the intrusion.
1156. Active tracing techniques into other domains can be considered by that
domain’s owners as an intrusion in their own right, and could therefore be regarded as
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
illegal, or even an EA / MEA. Active tracing techniques must not therefore be used
without prior sanction by JSyCC.
1157. In all such cases, the details of the source domain obtained from passive tracing
should be supplied to JSyCC. Where the source is believed to be an Internet Service
Provider (ISP), MRCs may contact the ISP’s Abuse or Security teams direct to pursue
the matter, ensuring that JSyCC, as the MOD FIRST representative, is copied all
information passed to such ISPs.
System Weaknesses
1158. IT systems often contain faults which come to light only after extensive use, or
when unusual conditions enable them to be discovered. Occasionally, these faults are
already known to the manufacturer or supplier; often, they are not.
1159. In order that the appropriate security and/or technical authorities can react to
make systems less flawed or susceptible to misuse, all possible security weaknesses or
faults are to be reported, through the MRC where appropriate, to the JSyCC.
1162. Malicious Damage and Theft. Deliberate damage to, and theft of, MOD
CIS assets are clear indications of a criminal act having occurred, and as such either
the Ministry of Defence Police (MDP) or Service Police, as appropriate, must be
contacted. In cases where a serious breach of National Security has also occurred (i.e.
Category 1 material is involved), JSyCC must also be informed immediately.
1163. Reporting Units or the MRC are responsible for ensuring that an UNIRAS
Incident Report is raised in addition to any report supplied to the Police.
UNCLASSIFIED
UNCLASSIFIED
1165. Misuse of resources. Improper use of MOD CIS facilities comprises a range
of activities and behaviour, contrary to Security Operating Procedures (SyOPs), sound
practice, or commonsense, and may be defined as “the deliberate, inappropriate or
illegal use of any part of the MOD’s CIS facilities”. Chapter 1 contains a summary of
many of the legal constraints on the use of CIS, including the Data Protection Act
(DPA), the Computer Misuse Act (CMA), and the Copyright, Designs and Patents Act
(CDPA).
1166. The list of prohibited use of MOD CIS that has been published included a
variety of activities that fall without the remit of security, but those common incidents
types likely to be brought to the attention of security staffs include:
1167. Personnel are individually responsible for using MOD CIS in an appropriate
and lawfully effective manner. All personnel have a responsibility to report any
suspected cases of CIS misuse which they encounter.
1168. Where criminal activity is suspected, the Ministry of Defence Police (MDP) or
Service Police as appropriate should be contacted immediately. Reporting Units or the
MRC are responsible for ensuring that an UNIRAS Incident Report is raised in
addition to any report supplied to the Police.
1169. When cases of misuse of resources are suspected, but no clear indication of
criminal activity exists, care should be taken not to take any action that might later
prejudice a criminal investigation, and guidance on preservation of evidence is given at
Annex D. Before taking an action, Security Staffs should immediately contact
JSyCC, or, for urgent matters outside of core hours, the MOD Information Security
Duty Officer (ISyDO), who will advise on appropriate action to be taken.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Assessment
1171. Upon receipt of the initial report, the MRC or JSyCC will issue an Incident
Report Occurrence Number (IRON) that is used to track the incident for the rest of its
existence, until an Incident Report Closure Number (IRCN) is issued. Sectors may also
allocate their own reference number (e.g. RAF Police case number) for internal use, but
the IRON must be included for all external communications.
1173. Based upon the Report made by reporting Unit(s), the MRC or JSyCC / ISyDO
will make an assessment of the type of response required. A number of different types
of Response have been identified, as defined in the table below. If it is felt that the
Incident may fall into more than one of these types, the response actions should be
carried out in strict accordance with the Priority sequence assigned below so as not to
prejudice any follow up action that may be required.
1174. Where the response required is dependent on Criticality Level (CL) of the CIS
affected, the following metric should be applied:
Response
1175. Before commencing any detailed investigation or other form of response, an
appropriate Incident Reporting action as laid at paragraphs 1134 - 1146 must be carried
UNCLASSIFIED
UNCLASSIFIED
out. There may be wider implications that the reporter is not aware of that will require
the MRC, JSyCC or ISyDO to direct a different course of action than the local Unit
may otherwise have intended.
1177. Local Security Staffs normally perform minor breaches investigations on behalf
of the Head of Establishment.
1178. Computer based Forensics Failure to comply with the requirements laid
down in the Police and Criminal Evidence (PACE) Act may jeopardise any future
prosecution.
1179. In cases where no criminal activity is suspected, but where there is a perceived
need for Computer-based evidence for other purposes, then the JSyCC should be
contacted who will be able to direct units to either the MDP Computer Crime and
Examination Unit (CCEU), or to Service Police units having access to Computer
Forensic capability, as appropriate.
1181. Unit Response. Large systems and networks should have documented
procedures on managing incidents, in the form of an Incident Response Plan as defined
at Chapter 3. This should include details as to how levels of degradation are to be
managed, if it is required for operational reasons. For networks and interconnected
systems it may be necessary to have a form of Service Level Agreement to cover
circumstances, which could include whether to:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Post-Analysis
1182. Once the initial Incident Response has been carried out, the final incident
report must be produced by the unit or formation affected, using the IRON already.
Wherever possible these reports should be submitted to the relevant MRC or JSyCC
as appropriate using the MODAWR feeder database system where available, but
legacy reporting techniques using previous UNIRAS database formats (Access or
st
Excel), or the GS490 series hardcopy forms, will be accepted until 1 July 2002.
1183. Such reports will be added to databases held by JSyCC and other agencies
(including UNIRAS), and used both to direct follow up activity if necessary, and
Trend Analysis to inform the wider view on Threats, Vulnerabilities and Risks. The
JSyCC will disseminate investigative reports to other Security staffs as and where
applicable.
1184. For all instances of EA and MEA, and some other technical incidents, a more
in-depth analysis of information relating to an Incident may also be appropriate,
which will typically involve the detailed examination of ESE Accounting and Audit
records. Unit(s) and/or the MRC should provide any assistance requested by JSyCC
in this respect, which may be used to direct any Remediation required.
Remediation
1186. Once any Incident Response has been completed, it is the affected Unit(s)
responsibility to arrange for any required remediation to the CIS(s) affected. In some
cases this will require re-accreditation of the system, as laid down at Chapter 2.
Closure
1187. No Incident may be considered closed until an Incident Report Closure
Number (IRCN) has been obtained from the MRC or JSyCC, which will not be issued
until all required Post Analysis and Remediation has been completed.
CIS Support
1188 The Defence CIS architecture to support the overall MODAWR capability,
and its linkages to NISCC and Allies, is currently under development, which will
include the provision of a hardened MOD AWR Bearer Network (MABN) to provide
an out of band link between the core formation involved in these activities.
UNCLASSIFIED
UNCLASSIFIED
1189. In the interim, it is essential that all MRCs and IRSTs have access as a
minimum to mail services on both the Internet and RLI, have a valid Signal Message
Address with appropriate SIC distribution configured for Y3A and Y3B, and have IT
equipment to run the distributed MODAWR database that is being produce to
supplant the previous UNIRAS system. Any local IT initiatives that include Incident
Handling aspects, such as Fault Ticketing systems, should as a minimum support
data import and export in line with the latest version of the Internet Engineering Task
Force’s (IETF) Incident Object Description and Exchange Format (IODEF), which
was RFC3067 at time of the publication of this document.
Authority
1190. In cases where there is a significant operational imperative for a CIS to be
operated where its security is non-compliant with national and departmental baseline
requirements, for instance when an incident has occurred, Risk Management principles
permit senior staff, of at least 2* rank, to accept the risk of continuing its operation
contrary to the advice from an MRC or JSyCC, provided that :
a The material processed on the system does not fall within Category 1, as
laid down in Volume 1 ;
1191. The nature of modern CIS, and in particular the degree of interconnectivity, will
however mean that a security incident or weakness occurring within one management
domain may well have adverse implications for the wider Defence community. In such
cases, the JSyCC may, in consultation with ACDS(Ops) and/or DG Info, need to direct
either the cessation of processing on any affected CIS installation, or its isolation from
other domains, whilst any Incident Response and Remediation takes place.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Incident Handling
ANNEX A TO
CHAPTER 11
2. The table overleaf gives contact details for units assigned to ICC, MRC or IRST
roles at the time of publication of this Volume. An updated version of the table can be
found on the Joint Security Co-ordination Centre website on the MOD Intranet.
UNCLASSIFIED
JSP440 Volume 3 Issue 2
MOD Incident Handling Units
Unit UNIRAS Telephone Contacts Email
Title
Type Number Core Hours Duty Officer Facsimile Messages (SIC Intranet Internet
Y3B)
ICC 47-0001 Joint Security Co-ordination 020-7218-0117 020-7218-0117 020-7218-1165 MODUK JSyCC [email protected]
Centre (JSyCC)
MRC 47-0002 MDP CIR 01371-85-4444 01371-85-4444 01371-85-4030 CCMDP MDP CIR t.b.a.
WETHERSFIELD
IRST 47-0003 MDP CEU 01371-85-4480 01371-85-4444 01371-85-4030 CCMDP t.b.a. t.b.a.
WETHERSFIELD
MRC 47-0100 PJHQ(UK) J2 CI/Sy 38027NW Contact ISyDO 38019NW PJHQUK t.b.a. t.b.a.
MRC 47-0101 BF Cyprus 5185 CYP Contact ISyDO 5144 CYP t.b.a. t.b.a. t.b.a.
UNCLASSIFIED
MRC 47-0102 BF Falkland Islands 6556 MPA Contact ISyDO 6735 MPA t.b.a. t.b.a. t.b.a.
11A-2
MRC 47-0103 BF Gibraltar 5428 GIB Contact ISyDO 4513 GIB t.b.a. t.b.a. t.b.a.
MRC 47-0110 PJHQ Deployed Formations 01923-8-46145 Contact ISyDO 01923-8-46013 PJHQUK t.b.a. t.b.a.
MRC 47-0200 NATO CIRC CC Contact JSyCC Contact ISyDO t.b.a. t.b.a. t.b.a. t.b.a.
IRST 47-0201 NC3A Contact JSyCC Contact ISyDO t.b.a. t.b.a. t.b.a. t.b.a.
IRST 47-0900 CESG Consultancy Support Contact JSyCC Contact ISyDO t.b.a. t.b.a. t.b.a. t.b.a.
IRST 47-0901 MODCERT Contract Contact JSyCC Contact ISyDO t.b.a. t.b.a. t.b.a. t.b.a.
Support
MRC 47-1000 CB(Sy) 020-7218-2857 Contact ISyDO t.b.a. t.b.a. t.b.a. t.b.a.
MRC 47-1001 CITSO(NA) +1-202-588- Contact ISyDO +1-202-588- t.b.a. t.b.a. t.b.a.
6848 7888
MRC 47-1003 DIS 020-7218-5105 Contact 020-7218-7210 t.b.a. t.b.a. t.b.a.
ISyDO
MRC 47-1100 DPA Sy 0117-91-30622 Contact t.b.a. t.b.a. t.b.a. t.b.a.
ISyDO
MRC 47-1200 DLOHQ Sy 01225-4-68941 Contact ISyDO t.b.a. t.b.a. t.b.a. t.b.a.
JSP440 Volume 3 Issue 2
UNCLASSIFIED
MRC 47-1400 Met Office t.b.a. t.b.a. t.b.a. t.b.a. t.b.a. t.b.a.
Incident Handling
MRC 47-2000 DNSYICP 27135 PY Contact ISyDO 27127PY t.b.a. t.b.a. t.b.a.
UNCLASSIFIED
IRST 47-2001 RN SIB 23131 PY Contact ISyDO 23193PY t.b.a. t.b.a. t.b.a.
IRST 47-2002 CITSS(RN) 25586 PY Contact ISyDO 27127PY t.b.a. t.b.a. t.b.a.
IRST 47-2300 UKHO t.b.a. t.b.a. t.b.a. t.b.a. t.b.a. t.b.a.
11A-3
MRC 47-3000 Land G2 Sy(Info) 3875/3695SM 3673SM 2800SM t.b.a. t.b.a. t.b.a.
MRC 47-3001 PM(A) 94321 3659 Contact ISyDO 94321 5658 t.b.a. t.b.a. t.b.a.
MRC 47-3002 UKSC(G) / G2Sy(Info) 2764JHQ Contact ISyDO 2769JHQ t.b.a. t.b.a. t.b.a.
MRC 47-3003 HQNI / G3Sy(Info) 42588LIS Contact ISyDO 41822LIS t.b.a. t.b.a. t.b.a.
IRST 47-3004 AISU 94649 2416 0771 972763 96649 2420 t.b.a. t.b.a. t.b.a.
MRC 47-4000 SYCIS(RAF) 95331 6687 95331 6670 01480 458623 t.b.a. t.b.a. t.b.a.
MRC 47-4001 RAF P&SS (UK) 95381 8234 95381 8220 01462 817144 t.b.a. t.b.a. t.b.a.
MRC 47-4002 RAF IPOC 95712-7499 Contact ISyDO t.b.a. t.b.a. t.b.a. t.b.a.
IRST 47-4003 591SU 95712-7499 Contact ISyDO t.b.a. t.b.a. t.b.a. t.b.a.
UNCLASSIFIED
Incident Handling
UNCLASSIFIED
UNCLASSIFIED
Incident Handling
ANNEX B TO
CHAPTER 11
2. Due to the variety of incident types covered by MOD and UNIRAS reporting
requirements, the reporting chain can vary depending on the type of incident
encountered.
3. The table overleaf gives assignment of reporting points to the units assigned to
ICC, MRC or IRST roles for the standard incident categories. This assignment was
current at the time of publication of this Volume, and an updated version of the table can
be found on the Joint Security Co-ordination Centre website on the MOD Intranet.
UNCLASSIFIED
JSP440 Volume 3 Issue 2
MOD Initial Incident Reporting Points (using UNIRAS “sub-department” designator from Annex A)
Bogus Enquiry
Security Policy
including EA /
Responsibility
Of Resources
Hardware or
Procedural
Infiltration
Personnel /
Damage or
affected by
Personnel
Malicious
Breach of
Software
Software
Shortage
Hacking
Physical
Incident
Disaster
Area of
Failure
Misuse
Fraud
Other
Error
MEA
Theft
Hoax
Impact pan- 47-0001 47-0001 47-0001 47-0001 47-0001 47-0002 47-0001 47-0001 47-0001 47-0001 47-0002 47-0001 47-0001 47-0001
MOD or on
OGD or
Allies, CL1
or Category
UNCLASSIFIED
known
DCSA 47-1201 47-1201 47-1201 47-1201 47-1201 47-0002 47-1201 47-1201 47-1201 47-1201 47-0002 47-1201 47-1201 47-1201
Networks
Overseas 47-0100 47-0100 47-0100 47-0100 47-0100 47-0100 47-0100 47-0100 47-0100 47-0100 47-0100 47-0100 47-0100 47-0100
garrisons,
current
11B-2
deployments,
CJO TLB
Northern 47-3003 47-3003 47-3003 47-3003 47-3003 47-3003 47-3003 47-3003 47-3003 47-3003 47-3003 47-3003 47-3003 47-3003
Ireland units
Units in 47-3002 47-3002 47-3002 47-3002 47-3002 47-3002 47-3002 47-3002 47-3002 47-3002 47-3002 47-3002 47-3002 47-3002
Northwest
Europe
including
UKSC(G)
Units based 47-1001 47-1001 47-1001 47-1001 47-1001 47-1001 47-1001 47-1001 47-1001 47-1001 47-1001 47-1001 47-1001 47-1001
in North
America
JSP440 Volume 3 Issue 2
Bogus Enquiry
Security Policy
including EA /
Responsibility
Of Resources
Hardware or
Procedural
Infiltration
Personnel /
Damage or
affected by
Personnel
Malicious
Breach of
Software
Software
Shortage
Hacking
Physical
Incident
Disaster
Area of
Failure
Misuse
Fraud
Other
Error
MEA
Theft
Hoax
FLEET & 47-2000 47-2000 47-2000 47-2000 47-2000 47-2001 47-2000 47-2000 47-2000 47-2000 47-2001 47-2000 47-2000 47-2000
2SLCNH
TLBs
LAND & AG 47-3000 47-3000 47-3000 47-3000 47-3000 47-3000 47-3000 47-3001 47-3000 47-3000 47-3001 47-3000 47-3000 47-3000
TLBs
STC and 47-4000 47-4000 47-4000 47-4000 47-4000 47-4000 47-4000 47-4001 47-4000 47-4000 47-4001 47-4000 47-4000 47-4000
PTC TLBs
UNCLASSIFIED
UNCLASSIFIED
Incident Handling
2nd PUS 47-1000 47-1000 47-1000 47-1000 47-1000 47-0002 47-1000 47-1000 47-1000 47-1000 47-0002 47-1000 47-1000 47-1000
DPA TLB 47-1100 47-1100 47-1100 47-1100 47-1100 47-0002 47-1100 47-1100 47-1100 47-1100 47-0002 47-1100 47-1100 47-1100
DLO TLB 47-1200 47-1200 47-1200 47-1200 47-1200 47-0002 47-1200 47-1200 47-1200 47-1200 47-0002 47-1200 47-1200 47-1200
11B-3
and DARA
Trading Fund
DSTL 47-1300 47-1300 47-1300 47-1300 47-1300 47-0002 47-1300 47-1300 47-1300 47-1300 47-0002 47-1300 47-1300 47-1300
Trading Fund
UKHO 47-2300 47-2300 47-2300 47-2300 47-2300 47-0002 47-2300 47-2300 47-2300 47-2300 47-0002 47-2300 47-2300 47-2300
Trading Fund
Met Office 47-1400 47-1400 47-1400 47-1400 47-1400 47-0002 47-1400 47-1400 47-1400 47-1400 47-0002 47-1400 47-1400 47-1400
Trading Fund
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Incident Handling
ANNEX C TO
CHAPTER 11
(ii) Location(s) ;
3. Summary of Incident
This is to include the details of any IP address ranges from an attack may have
originated, or names of any malicious software detected.
4. Damage Assessment
The reporting unit must carry out an initial assessment of possible damage to
Confidentiality, Integrity and Availability of the system and the information, along with
an assessment as to whether the incident was deliberate or accidental. It is not sufficient
merely to describe possible damage as 'serious' without explanation.
5. Brief Description
The reporting unit must attempt an initial assessment to summarise how or why the
incident is believed to have occurred.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Incident Handling
ANNEX D TO
CHAPTER 11
2. Physical Evidence
- Recognition and location of where acquired
3. Collect Evidence
- Ensure that no forensic tests (fingerprints ...) are required before attempting
to collect evidence
4. Identify Evidence
- Unique identification marks should be placed on all media EXCEPT
HANDWRITTEN EVIDENCE
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
- Open reel tape can be marked with permanent marker on the dull side - the
first 15-20 feet before the BOT contains NOTHING of use to a system
[Permanent marker]
- Take car as magnetic media are very sensitive to dust, fingerprints, and
physical damage, all of which could destroy the evidence
UNCLASSIFIED
UNCLASSIFIED
Incident Handling
- All printout should be stored flat, between binders, and away from strong
light.
- Only photocopies of evidence should be returned too active use before the
investigation is completed
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Compliance Activities
COMPLIANCE ACTIVITIES
Chapter Paragraph Page
12 Compliance Activities
General 1201
Principle 1204
Review 1207
Monitoring 1212
Inspection 1218
Oversight 1234
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
Compliance Activities
CHAPTER 12
COMPLIANCE ACTIVITIES
General
1201. Compliance is a general term to describe activities which ensure that systems are
properly configured to protect confidentiality, integrity and availability.
1202. Within the Defence environment, any system used to store, process or forward
official information may be subject to compliance activity by the appropriate Security
staffs, or other competent bodies acting on their instructions, with or without the
knowledge of its users.
Principle
1204. The accreditation process ensures that a competent authority has reviewed and
accepted the risks to the system as installed. The purpose of compliance is to ensure that
the risks to a system are being managed effectively, and to provide a documented basis
for continuance of accreditation.
Frequency Of Activity
1205. The frequency of compliance activity is based primarily on the criticality level
(CL) of a system, which is assigned, following a risk assessment, by the system owner.
Criticality levels are described in Chapter 1 Annex A. The tables in this Chapter show
mandated and/or guideline frequencies for each type of compliance activity, and relate
to all IT systems regardless of size or connectivity. Mandated activity is to be
implemented not later than 1 July 2002, but may be regarded as guideline prior to that
date.
UNCLASSIFIED
UNCLASSIFIED
1206. Details of the assessed criticality level for all new systems are to be included in
the security policy documentation, which is described in Chapter 3.
Review
1207. Reviews are performed on behalf of the SOA, to ensure that security is being
managed correctly. There are two types of review; Security Reviews and Installation
Vulnerability Reviews (IVRs). Review should not be confused with inspection and
audit, which are compliance-related activities carried out on behalf of the Principal
Security Advisor (PSyA) or Defence Security Standards Organisation (DSSO), and the
DSO, respectively.
1210. The vulnerability information for an IVR will come from a number of sources
including specialist advice from MOD and other government agencies, and List X
contractor support:
UNCLASSIFIED
UNCLASSIFIED
Compliance Activities
1211. The the following table shows mandated Security Review and IVR activity
levels, which should be increased by one level if the system is connected directly or
indirectly to the Internet.
Monitoring
b. ComSec monitoring;
(iii) FRSec.
1214. MOD policy on the use of IDS is still developing, but the broad principle is
to use a mix of compatible and interoperable IDS products. Further details are
given at Chapter 6.
1215. IDS are not mandated but, where implemented, it is strongly recommended that
their output is accessible to a MOD Monitoring and Reporting Centre (MRC), as
described in Chapter 11, in addition to any local monitoring. IDS provided for
Criticality Level (CL) 1 and 2 systems must provide such a feed to a MRC, and the
MRC must be capable of responding to IDS alerts whenever the system is operational.
1216. ComSec and RadSec monitoring are carried out by specialist staff from other
organisations within MOD or Government. Their use is subject to control by PsyAs
JSP 440 Volume 3 Issue 2 12-5
UNCLASSIFIED
UNCLASSIFIED
System Frequency
Profile Fixed System Deployed System
CL1 2 yearly Annually
CL2 5 yearly 2 yearly
CL3/4 Not normally required 5 yearly
Inspection
1219. Inspecting Staff will be designated by Security staffs, and will normally be
drawn from specialist security staffs, or staff from other areas of Government, or
contract support personnel.
a. GSE/LSE Inspection;
b. ESE Inspection;
UNCLASSIFIED
UNCLASSIFIED
Compliance Activities
1227. The mandated ESE Inspection and guideline VA levels are shown in the
following table:
UNCLASSIFIED
UNCLASSIFIED
Note: System locations used for ITSEC or CC Penetration Tests will not normally
require an initial ESE Inspection or VA.
1229. Copies of VA reports are to be supplied to the JSyCC who are responsible for
collation of the vulnerability picture for MOD as a whole.
1230. COMSEC Routine Inspection. Routine inspections are required of all sites
holding Enhanced Grade or High Grade COMSEC equipment. Each new
implementation will require a pre-installation COMSEC Routine Inspection, and
thereafter if there has been any change to the COMSEC equipment installation. More
detail is provided at Chapter 23, and in the appropriate COMSEC publications.
UNCLASSIFIED
UNCLASSIFIED
Compliance Activities
1233. RadSec On Site Test In some cases, the threat to and vulnerabilities of a
particular installation will mean that a RadSec On-Site Test is required, to address either
TEMPEST or ELSEC issues, as detailed in Chapter 21. This test will be carried out by
specialist staffs from the CIDA or from other Government Agencies.
Oversight
1234. Details of the extent to which Sectors have met the requirements for both
mandated and guideline compliance activities are to be included in their Annual
Security Report.
1235. In addition to the routine compliance activities described in this chapter, the
Departmental Security Officer retains the right to inspect without warning any CIS
installation within the Defence ambit, including industry and agencies.
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
Compliance Activities
ANNEX A TO
CHAPTER 12
2) Raise Incident
Report.
UNCLASSIFIED
UNCLASSIFIED
SECRET or CL2 D
Other C
UNCLASSIFIED
UNCLASSIFIED
Security in the Project Lifecycle
Chapter Para
Introduction 1301
Compliance 1334
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Security in the Project Lifecycle
CHAPTER 13
Introduction
1301. This chapter deals with security activities in the system lifecycle for IT systems
of a larger and more complex nature. The operation of such systems will, almost
certainly, involve specialist staff to manage their technical operation, and it is important
to realise that security considerations start very early in the procurement cycle.
1302. It covers both “Vote 1” (non-operational. and “Vote 3” (DPA led) procurement
procedures, and by alternative measures such as those installed and operated for MOD
by PFI and PPP partners. Systems not procured using these methods are still subject to
security input, and all procurement is to follow the guidance given in JSP 343 (MOD IT
Project Guide).
1304. This requires the total involvement of the security staff from the initial planning
stages, and throughout development and installation, so that maximum benefit can be
derived from the recognised authorities in the various fields of computer security.
Defence Security Standards Organisation (DSSO) or TLB Principal Security Adviser
(PSyA) staff or their nominated representatives are to be informed when proposals are
submitted for a new or enhanced installation.
1305. At the outset of a project the nature of the Security Policy Documentation that is
required should be agreed with the MOD accreditor. This is particularly important if a
contractor is being employed to produce the Security Policy Documentation.
1306. An IT Security Working Group (SWG) must be established for all large,
complex or operational CIS systems and projects. The SWG is to be formed from the
outset for all CIS systems and projects, and is to be chaired by a senior member of the
project/system staff, who will also provide resources, accommodation and
administrative support for the SWG. The SWG is responsible for all aspects of security
within the project or system and for supporting the accreditor and project sponsor. It
reports to the project sponsor, accreditor and project board, and is to meet at frequent
intervals, as determined by the project sponsor and accreditor, throughout the whole
lifespan of the project or system. The role of the SWG is covered in Chapter 2.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Targets Of Accreditation
1307. Defining the scope of a large and distributed IT resources in terms of boundaries
and management responsibilities is a complex and on-going task. Particular difficulties
arise from:
a. Communication Systems;
c. Cases where the scope and function of the system is still evolving or may
be planned to have a dynamic architecture.
1308. A different perspective being offered may also mean an end-user service formed
from a number of “layers”, each of which may have its own security requirements, and
care must be taken to ensure that layers are mutually co-operative and do not undermine
each others security functionality. A typical example of a layered approach would be:
a. Bearers;
c. Services / Applications.
1309. It is worth noting the way in which this security “layering” differs from that used
in ISO7498 (the Open Systems Interconnection (OSI) Reference Model (RM)) and the
Internet Protocol (IP) suite, which are both also layered approaches, can be seen from
the diagram below:
OSIRM IP Security
Level Function Layer Layer
7 Application Application Application
6 Presentation
5 Session
4 Transport Transport Infrastructure
3 Network Network
2 Data Link Link Bearers
1 Physical
1310. The Target of Accreditation, once agreed, may become contractually binding
where the implementation of a CIS is to be carried out by a contractor. In such cases,
changing MOD requirements after contract let will not normally be applied
retrospectively without agreement by both the Accreditor and Project Management
Authority.
UNCLASSIFIED
UNCLASSIFIED
Security in the Project Lifecycle
1312. Projects interested in the use of the Domain approach should consult
EC(CCII)IOCMProj via their PSyA for further information and advice as to the
applicability of the technique to their needs.
Security Activities
1315. It is strongly recommended when initiating a new project that Project Names are
drawn from Codeword index to prevent duplication.
Extramural Assistance
1316. For large and complex systems, it is likely that in addition to the security
resources available from with the Project Management or System Operating Authorities
respective organisations, additional specialist assistance will also be needed.
1317. The following table uses the Risk Categories laid down at Annex A to Chapter
14 to determine the requirements for extramural assistance:
Risk Category SAC EC(CCII)IO NTA DSSO
CMProj
A Mandatory Mandatory Mandatory Mandatory
B Recommended
C Recommended Not required
D Recommended Not required Not required
E Not required
JSP 440 Volume 3 Issue 2 13-5
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Resource Implications
1319. When initiating a Project, it is important that the resources required for security
throughout the lifecycle are identified at an early stage, both in terms of personnel and
budget. The following table identifies the main security costs likely to be encountered
during a system lifecycle:
UNCLASSIFIED
UNCLASSIFIED
Security in the Project Lifecycle
1320. This table is by no means an exhaustive list of the activities that may require
project resources, and PSyA advice should be sought before finalising this list for a
project.
Vote 1 Procurement
1321. The PRINCE Project Management methodology, which is mandated for Defence
non-operational systems over a specific value, does not specifically cover IT Security. It
is the Project Manager's responsibility, however, to ensure that the system implemented
meets security requirements.
1322. For large and complex projects and systems, or sites/formations with extensive
use of IT systems, a Security Assurance Coordinator (SAC) should be appointed, both to
provide advice and assistance to the project / system management authorities, and to
reduce the resourcing implications being placed on external agencies such as
Accreditors.
1323. The role of a SAC is one of the “permitted extensions” to the functions of a
Project Assurance Team (PAT) as laid down within the Governmental PRINCE
methodology, and can also be considered to be an expansion upon the role of an IT
Security Officer (ITSO). Details of the Terms of Reference (TOR) for a SAC are laid
down at Chapter 2 Annex D.
Vote 3 Procurement
1325. The Smart Procurement Initiative has led to a more tightly coupled acquisition
approach based upon joint MOD and Industry manned Integrated Project Teams (IPTs).
1326. The full repercussions of these changes have not been finalised as yet, advice as
to the best practice for this new system should be sought from the PSyA, who will hold
the Interim Guidance Note (IGN) and Defence Information Assurance Notice on this
subject.
1328. The accreditor's agreement would generally coincide with project milestones,
such as Initial Gate, Main Gate (under Smart Procurement), development contracts or
JSP 440 Volume 3 Issue 2 13-7
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
user trials. The accreditor can agree the required Accreditation Evidence Statement
and project risk related documents as an Infosec Management Plan (IMP), in the early
stages of the project (probably around Initial Gate). The IMP applies to the project,
and is concerned with their management of the accreditation process for one or more
Targets of Accreditation.
1329. The minimum security contribution to Initial Gate is an Infosec Scoping
Appraisal (ISA). Agreement of the ISA is the accreditor's way of indicating that
he/she is happy that the need for security and accreditation have been adequately
recognised by the project. The ISA should be short, no more than 6 pages, and maybe
only a single side. It should contain the security scope of the project, links and
dependencies, the key factors influencing the Operational Security Management Plan,
and an outline IMP. The level of security-related project risk is given by a Security
Risk Category, which determines whether or not a Security Working Group and/or
detailed IMP are required.
1330. For complex projects the accreditor may endorse an Infosec Risk Management
Appraisal before Main Gate. This records the results of the project’s appraisal of
solution options and justifies which they will develop into a Target of Accreditation
and accompanying ADS. In simpler projects, the accreditor may be able to endorse
either or both the Security Risk Assessment and Security Requirements Statement
before Main Gate.
Business Continuity
1332. Disruption can arise due to the failure of system components, denial of access
or corruption of stored information. Unless planned for, retrieval of data after a
disruption is often difficult, time-consuming and sometimes impossible.
1333. Business Continuity addresses what needs to be done to ensure that key
activities can survive disruptive events. It involves the identification of priorities and
the application of risk management to what has traditionally been termed disaster
recovery. Business Continuity embraces more than just IT: it includes people and
processes, accommodation, paper and electronic records. More details on Business
Continuity are given in Chapter 1.
Compliance
UNCLASSIFIED
UNCLASSIFIED
Security in the Project Lifecycle
system(s) as installed. The validity of this situation can only endure as long as the Risks
do not change, and the configuration is unchanged.
1335. To maintain effective security for the lifetime of a system, in addition to the
measures inherent in Project Management structures such as Security Working Groups
(SWG) and Configuration Management (CM) Boards, additional procedures are
required that ensure ongoing compliance with security requirements until the system is
finally withdrawn.
1336. Any system used to store, process or forward Official Information may be
subject to technical or procedural Compliancy review by appropriate MOD Security
Authority staffs, or other Competent Bodies agreeable to MOD Security Authorities.
1337. All Compliancy activities result in some form of deliverable, typically a report,
being generated for use by the Accreditor(s) as evidence for continuance of
Accreditation. Compliance checking is covered in detail in Chapter 12.
1338. The security activities for this stage are to be documented in the Project Plan.
The removal of all information, both in electronic form and hardcopy, which has been
stored or processed by the system are to be in accordance with the specified security
procedures. Prior to the system's removal from service, information about the
organization of the configuration is to be retained for traceability purposes.
1339. There may be systems, the nature of whose configurations is sensitive, where the
close down stage is to comply strictly with specified security measures and be in
accordance with prescribed guidance on computer security requirements and the security
regulations described elsewhere in this volume.
1340. Disposal of surplus CIS equipment and media that has held or processed
protectively marked material is covered in Chapters 4 and 5.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Risk Assessment and Management
Introduction 1401
Methods 1405
Accreditation 1425
Compliancy 1427
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Risk Assessment and Management
CHAPTER 14
Introduction
1401. This chapter provides generic guidance on Risk Assessment and Risk
Management and does not specify a methodology to undertake the analysis and
management activities required. Risk Assessment and Risk Management are treated as
two related but separate activities. Risk Analysis is the identification and assessment
of the risks, based on asset values, threats and vulnerabilities. Risk Management is the
process of identifying, controlling and minimising or eliminating security risks to an
acceptable level and involves managing the uncertainty within the risk analysis itself
1403. A framework for the management of security within MOD is being developed,
based on the domain-based approach to Accreditation, with the aim of minimizing
risk in complex projects and will be incorporated into future issues of JSP440 Volume
3.
1404. The framework describes a MOD accreditation cycle which divides security
activities, including risk assessment and risk management, into four phases:
Methods
1405. Formal Risk Analysis and Management methods are now necessary to cope
with the complex security problems presented by information systems and networks.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
1406. The following are examples of some the Risk Analysis and Management
methods:
1407. It is for the project manager to decide the most appropriate method to be used,
in conjunction with the Accreditor. In some cases it is not necessary to carry out a full
risk assessment for every project since many systems will operate within the
boundaries of higher level MOD security policy. The Accreditor will confirm whether
an existing risk assessment is both current and comprehensive enough for the purpose
in hand. In a full risk assessment all assets will be identified together with the asset
owners who may be accountable for whether the risks to a particular asset justify
particular levels of investment in counter-measures.
Risk Analysis
1408. Risk is dependent on the asset values, the threats, and the vulnerabilities. Risk
Analysis involves the identification and assessment of the levels of risks calculated
from the assessed values of assets and the assessed levels of potential threats to, and
the potential vulnerabilities of, those assets. The range of risks to IT systems is
complex and requires proper analysis to ensure that the risks are adequately managed.
Like all business risks, the level of risk changes with circumstances.
1409. The risks to MOD IT systems that may affect the confidentiality, integrity,
availability and the legal and regulatory compliance of IT resources must be
identified. Risk may be present where a potential threat coincides with a potential
vulnerability. Effective assessment of risk will require the assistance of both business
managers and IT systems staff, possibly using other experts as required on technical
issues.
UNCLASSIFIED
UNCLASSIFIED
Risk Assessment and Management
1410. HMG Infosec Standard No.1 (HMG IS1) is the Government standard for
assessing technical risks i.e., those that affect the design and configuration of an IT
system. HMG IS1 provides guidance about how strong electronic counter-measures
should be in particular circumstances. HMG IS1 is mandatory for all HMG IT systems
carrying protectively marked information. The results of this method are key to the IT
Security Evaluation and Certification Scheme and the Common Criteria, for the
evaluation of the strength of security features. The MOD interpretation of HMG IS1,
together with additional guidance, is at Annex B to Chapter 6.
1411. The Scoping phase of the Accreditation cycle requires the production of an
Infosec Scoping Appraisal (ISA). An HMG IS1 or detailed risk assessment does not
need to be conducted for an ISA. Instead, a simplified risk assessment should identify
the level of risk to the project arising from the need for security controls and
accreditation. The risk should be assigned a Security Risk Category on a scale of A-E,
where A represents a very high risk to the project and E a very low risk. Security Risk
Categories are fully defined in Annex A.
1412. The Appraisal phase for all but the simplest projects requires the comparison
of options based on an assessment of security risks, the results of which are recorded
in an Infosec Risk Management Appraisal (IRMA). An HMG IS1 risk assessment is
required for each of the options discussed in an IRMA, but the assessment need not be
detailed.
1414. During the Maintenance phase, further risk assessment is required when there
is a significant change to the perceived threats, the system itself, or its mode of use.
This re-assessment updates the Security Risk Assessment.
1415. The boundary, for the system(s) that forms the Target of Accreditation, should
be carefully established before identifying assets. All sensitive and valuable assets
within the boundary, which are essential to the business process, should be identified.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
b. Software assets;
c. Communications;
d. Physical assets;
e. People;
f. Services;
g. Utilities.
1417. Values, which represent the importance of the assets to the business, should be
assigned to each asset. These can be expressed in terms of confidentiality, availability
and integrity, and an asset could therefore have its value expressed at three different
levels.
Asset Register
1418. An asset register is not an inventory or configuration control record book. The
granularity should be set by the range of values and asset owners rather that numbers
of items, processes etc. At its most complex it might embrace a complete register of
all the various CIS assets. Accreditations involving complex risk assessments and
asset valuations will require a full asset register.
1419. Some assets retain the same value to the organisation throughout their
operational life. Some change on a predictable basis, and some unpredictably. If these
variations in asset value are likely to occur, the details should be recorded in the asset
register. This will ensure that risk management decisions reflecting value variations
are clearly linked to an organisation's business processes.
Threat Assessment
1420. For each asset or asset group a list of both the types, including environmental
if applicable, and levels of threat should be drawn up. It is necessary to assess the
likelihood of a threat being enacted and this should take account of:
a. Threat frequency;
b. Deliberate;
UNCLASSIFIED
UNCLASSIFIED
Risk Assessment and Management
c. Accidental.
Vulnerability Assessment
1421. The vulnerabilities of each asset or groups of assets should be identified and
an assessment made of the levels of those vulnerabilities. The level is an indicator of
how serious each vulnerability is and the likelihood that if a threat was to manifest
itself that the vulnerability would be successfully exploited. The vulnerability level
should also reflect the probability that vulnerabilities will be discovered in the system
during its lifetime.
Risk Management
1422. Risk Management is the process by which perceived risks are eliminated,
reduced, accepted or transferred. This involves the identification, selection and
adoption of countermeasures to the identified security risks, to reduce them to a level
that is assessed as acceptable. It may also involve activities to manage the uncertainty
of a risk assessment through monitoring or risk reduction studies, planning for repeat
assessments and preparing contingency plans should the risk prove unacceptable in
the future. A balance has to be agreed between proactive and reactive risk
management measures.
1424. The following documents, which underpin Risk Management decisions during
the ongoing Risk Management process are detailed in Chapter 3:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Accreditation
1425. The goal of the Accreditation process will be to gather evidence that residual
risks have be minimised to an acceptable level. Evidence of this for most non-technical
facets of security will be demonstration of compliance with MOD baseline security
standards. For the 3 technical aspects, as well as compliance with baseline security
standards, the organisation(s) responsible for the system’s implementation should
demonstrate that no unacceptable risk from actual or potential significant exploitable
vulnerabilities, or risks of failure of security functionality, exist.
1426. Accreditation does not obviate the need for a subsequent management
approval process whereby the System Operating Authority(s) (SOA) and Data
Owner(s) accept any residual risks identified by the accreditation process.
Compliancy
1427. The achievement of Accreditation for a system declares that an Accreditor has
reviewed and accepted the Risks and their Management for the system as installed. The
validity of this situation can only endure as long as the Risks do not change, and the
configuration and mode of use is unchanged.
1428. To maintain effective security for the lifetime of a system, in addition to the
measures inherent in Project Management structures, additional procedures are required
that ensure ongoing compliance with security requirements until the system is finally
withdrawn. These are detailed in Chapter 12.
UNCLASSIFIED
UNCLASSIFIED
Risk Assessment and Management
ANNEX A TO
CHAPTER 14
1. Five Security Risk Categories, A-E, are defined. The categories broadly group
projects according to the degree of security risk to information inherent in the
requirements. The assumption is that a greater security risk gives rise to security
requirements that may be difficult to implement and that this increases the risk to the
project. The Security Risk Categories are:
B High Risk
C Significant Risk
D Low Risk
2. For each category the key mechanisms by which the accreditor and project
team should communicate to manage a successful accreditation process are defined.
The risk management strategies for the categories are distinguished according to the
requirement for a Security Working Group (SWG) and the formal endorsement of the
Infosec Management Plan (IMP) by the accreditor(s).
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
D Yes Yes No
E Yes No No
UNCLASSIFIED
UNCLASSIFIED
Risk Assessment and Management
APPENDIX 1 TO
ANNEX A TO
CHAPTER 14
2. The Security Risk Category for a project shall be no lower than any of the
values determined from the table on page 3 for every area of business or
infrastructure that is within the scope of the project, or that will involve assets that
the project is responsible for or directly uses. Areas of business or infrastructure may
be grouped together to ease the analysis.
Concepts
4. Areas of business are referred to as ‘business domains’ and parts of the
infrastructure as ‘infrastructure islands’. If the operational requirements do not allow
the information exchange requirements to be predefined and constrained, all of the
data and all of the people that the procurement will support, including those they
interact with in other systems, shall be considered as a single business domain.
Similarly, if the components that implement data exchanges between different parts
of the infrastructure cannot be identified, isolated and managed, all of the
infrastructure supporting or connected to the system to be procured shall be
considered as a single infrastructure island.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
JSP440 Volume 3 Issue 2
MINIMUM REQUIREMENTS
DETERMINATION OF A SECURITY Within the Internal Within the Internal Direct Connections Indirect
RISK CATEGORY Business Domain Infrastructure Island Connections
Use Group 1 – see Use Group 2 – see below Use Group 1 for connected business domain
The Security Risk Category shall be no below Use Group 2 for connected infrastructure
lower than the minimum requirements and island
all the special cases that apply. A dash (‘-‘)
Not Authorised
Not Authorised
Not Authorised
Security Check
Security Check
Security Check
indicates that a particular case does not
Basic Check
Basic Check
Basic Check
Basic Check
raise the category above the minimum
Uncleared
Uncleared
Uncleared
Uncleared
requirements.
UNCLASSIFIED
Maximum Protective Top Secret C D A A A A A A A A A B A B B - B B
1 2 2
Marking handled by
an Internal Business
14A1-3
Secret D A B - B A B - B B C - C B -
Domain or
Infrastructure Island Confidential D A - - B B - - B B - - C - -
Restricted E D - - D D - - D D - - D D -
Maximum Criticality Criticality Level 1 C A A - A A - A A - B B
Level of an Internal Criticality Level 2 C A - - A - - B - - B -
Business Domain or
Infrastructure Island Criticality Level 3 D Notes:
Criticality Level 4 E Note 1: The minimum category may only be D if there are no connections.
Note 2: The minimum category may be B if data can only ever be received from the connected
If any part of the business or supporting C business or infrastructure, and can never be supplied by the Top Secret business or
infrastructure is intended to be deployable infrastructure.
Explanation of Groups
Group 1 is all the people who conduct the business of a domain. The minimum clearance of these people is required.
Group 2 is all the people who have legitimate access to, or are served by, an infrastructure island. The minimum clearance is required.
In addition, the ‘Not Authorised’ column applies whenever there are people who are not authorised to access all the relevant caveats
or codewords that are present.
UNCLASSIFIED
Defence Manual of Security
Further action required: If any ‘external’ business or infrastructure has a higher Protective Marking
than any of the internal ones, the values from the table for the direct and indirect connections from
these shall also be identified. If any of these values are higher than the Security Risk Category for the
project, this shall be brought to the attention of the project’s accreditor so that any necessary dialogue
with other accreditors can be initiated.
UNCLASSIFIED
UNCLASSIFIED
Security of Interconnected CIS
Scope 1501
Threats 1530
Vulnerabilities 1531
Accreditation 1553
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Security of Interconnected CIS
CHAPTER 15
Scope
1501. The previous chapters have mainly dealt with CIS, whether small or large, that
are within the control of a single System Operating Authority (SOA) and have no
internal management boundaries.
1502. This chapter considers the interconnection of two or more systems, either within
the remit of a single SOA where internal management boundaries are present (e.g. 2
networks of differing protective marking levels) , or crossing SOA boundaries.
1503. The purpose of this chapter is to give general guidance on secure system
interconnection, highlight some of the issues, and set out Defence policy for identifying
and countering the risks involved.
Security Principles
1505. When CIS interact, it is necessary to ensure that one system does not undermine
the protective measures of the other.
1506. The underlying security principles are the standard Confidentiality, Integrity and
Availability (CIA), and in this context all data transported from one system to another
should be protected from, among others:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
a. Unauthorised disclosure ;
b. Unauthorised modification ;
c. Misdirection ;
d. Monitoring ;
e. Replay ;
f. Deletion ;
g. Insertion ;
h. Masquerading ;
1508. Examples of an SMI will range from an internal software port control on a
small system connected to Publicly Accessible Network (PAN), through COTS
“screening routers” at internal domain boundaries and specialised devices at external
domain boundaries.
1509. To aid the protection of interconnected systems, it is vital that the principle of
Least Capability is strictly adhered to, and that only those communications protocols
(including related ports, services and daemons as applicable) required to implement the
agreed Information Exchange Requirements (IER) are enabled, with all others being
specifically disabled or removed wherever technically possible.
UNCLASSIFIED
UNCLASSIFIED
Security of Interconnected CIS
should be sought from the Defence Technical Security Authority, InfoSy(Tech), and
the relevant Applied Research Program office, EC(CCII)IOCM/Proj1.
1514. It will be noted that the sequence of BFs has a symmetry with the IP “stack”.
For most protocols, the efficacy of the controls is increased by adding together
multiple Barrier Functions, and an indicative table of efficacy of mechanism is given
below :
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
1515. Not all protocols can be practically controlled at each level, and a summary of
the credibility of efficacy claims for BF mechanisms in various IP related protocols is
given at Annex A. Due to the dynamic nature of both the technologies and their
vulnerabilities, before proceeding on this basis the Accreditor(s) should be consulted
to ensure that no update by an Interim Guidance Notice (IGN) has occurred.
1517. The use of the DBA notation, as summarised at Annex B, will aid in the
assessment of the placement of BF mechanisms.
1518. The use of Real Time Monitoring (RTM) techniques and Intruder Detection
Systems (IDS) can provide additional countermeasures where so required. Further
details of RTM / IDS are given at Chapter 12.
Interconnection Types
1519. Before examining the proposed technical interconnection, the “business” nature
of the interaction as predicated by the system’s Information Exchange Requirements
(IER) should be characterised in terms of the NATO Interoperability Planning
Document WP 71-76 of Feb 93, which identifies 6 levels of interconnection. They are
reproduced in full at Annex A to this chapter and identify appropriate security measures,
and are to be consulted whenever systems interconnect.
1520. Having described the high level nature of the interconnection(s) envisaged, a
number of different scenarios for interconnection exist, which can be summarised as :
UNCLASSIFIED
UNCLASSIFIED
Security of Interconnected CIS
1521. It is important that the Risk Analysis is initiated with a firm understanding of
which of these scenarios is proposed, as they will influence both the Threat and
Vulnerabilities.
1522. The majority of connections currently being requested are based upon the
Internet Protocol (IP), which in itself, unlike previous network level packet switching
protocols used in Government such as the International Telecommunications Union
(ITU-T) X.25, is a connectionless rather than connection-orientated protocol, although
some of the higher level protocols it carries (e.g. Transmission Control Protocol –
RFC0793) can provide a connection-orientated reliable service.
1523. The IP protocol suite, as detailed in the series of Internet Engineering Task Force
(IETF) documents called Request For Comments (RFC), does not directly map to the
terminology of the International Standards Organisation (ISO) Open System
Interconnection Reference Model (OSIRM) as laid down in ISO7498, but IP (RFC0791)
can be considered to approximate to a Network (OSIRM Level 3) Protocol, with TCP/IP
or UDP (User Datagram Protocol – RFC0768) approximating to Transport (OSIRM
Level 4).
1524. Also as part of the Risk Analysis, it is import to consider in detail the proposed
nature of the communications channel itself in terms of NATO Interoperability Planning
Document (NIPD) levels of interconnection as laid down at Annex C. This will impact
upon the way in which any BPDs behave, and thus will impact on the “facilities
available” in terms of the Assurance Requirements for CIS as laid down at Chapter 6
Annex B :
NIPD Level Channel Type Facilities Available
5B Internet Protocol suite Extensive
Other Channels Normal
Packet encrypted or “tunnelled” Very Limited
Stream encrypted or “tunnelled” N/A
5A Internet Protocol suite Extensive
Other Channels Limited
Packet encrypted or “tunnelled” Very Limited
Stream encrypted or “tunnelled” N/A
4 Internet Protocol suite Extensive
Other Channels Very Limited
≤3 Manual interfaces and “air gaps” Very Limited
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
1526. Client-Server VPN (CSVPN), which use encrypted tunnelling either between
hosts or between clients and hosts, with encryption under the control of System
Operating Authority (SOA), are analogous to Link Encryption and can be considered to
provide link level protection commensurate with the Grade of cryptography available,
and thus provides separation from shared networks.
1527. On the other hand, Service Provider Furnished VPN (SPFVPN) can be
implemented by either Cryptographic or Closed User Group (CUG) mechanisms,
outside the control of the SOA, and as such can only be considered to provide isolation
from shared networks if both the specific architecture can support this concept, and an
appropriate level of trust can be demonstrated in the Service Provider.
1528. Where cryptographic protocols are intended to cross SMIs, specific approval
should be sought in advance from the Accreditor(s) as use of cryptography will typically
invalidate the BFs within the BPD or SMI.
1529. The SMI must be capable of being constrained to a NIPD Level of interaction
appropriate for the Security Profile of the connecting systems, with the maximum
permitted information flow characteristics derived from Annex A.
Threats
1530. As an extension to the threats to individual CIS, threats to the information being
exchanged can arise from:
Vulnerabilities
UNCLASSIFIED
UNCLASSIFIED
Security of Interconnected CIS
b. Security policies and measures for the interconnected systems may not
be identical ;
c. The data passed between the systems may hide malicious software or
may have its confidentiality, integrity or availability compromised in transit ;
Sources Of Compromise
1532. From the consideration of Threats and Vulnerabilities, the following specific
sources of potential compromise to interconnected CIS can be summarised :
1533. Within Defence the following specific interconnection risks will be assessed and
policies followed so that:
1534. Measures to implement these policies will vary between systems and change as
technical progress is made.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
1537. Technical Resilience. System services are to be implemented in such a way that
the security impact of a technical failure is acceptable and proportionate to the perceived
chance of failure, whether that failure is deliberately induced or accidental.
1538. Proactive Management. Systems and security management must have the
resources and skills to detect and deter attacks, and to manage the response adequately,
with minimum disruption to the business. All staff, including Accreditors, must be
flexible to learn from any incidents and to apply the results quickly and effectively.
Interconnection Scenarios
1539. All such connections require a formally constituted SMI, which will consist of
one or more BPD, and any necessary BF within Hosts. Any SMI which consists of
multiple components will normally have a differing degree of assurance in their
strength.
1540. As a general principle, the components with the highest degree of assurance
should be those “facing outwards”, a configuration colloquially referred to as presenting
a “hardened” edge device to the main attack vector. For example, if 2 BPDs are used to
control a TCP/IP based connection, the one with the highest assurance level, or the one
with the greatest percentage of its networking software within the Certified baseline,
should be used as the hardened edge.
UNCLASSIFIED
UNCLASSIFIED
Security of Interconnected CIS
Export Repository (normally within the DMZ) across the SMI (for instance from
Web sites, databases and directories).
1543. Countermeasures against the risks will need to be provided either within a
Boundary Protection Device (BPD), the connected MOD domain(s), or some
combination of the two. In particular the function of an Export Sanction is to be
incorporated to guard against Accidental Leakage, and limit the attractiveness of
Deliberate Leakage across the SMI.
1544. At the simplest this will be a BPD which implements a technical mechanism
such as a Discretionary Message Guard (“Mail Guard”) or Trusted Publisher, or a
manual control such as a Releasing Officer, utilising a Security Release Control
Terminal (SRCT).
d) Provide split DNS to guard against the Port 53/UDP attacks that most
commercial FireWalls are vulnerable to ;
e) Provide for both incoming and outgoing address restrictions, at both the
transport (IP) and application (e.g. mail address) level. In particular care should
be taken to limit the maximum number of email addresses that are accepted from
an external domain in any one message to obviate Denial of Service (DoS) risks,
with a authorisation procedures to constrain the release of such message only to
appropriately designated personnel;
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
either
UNCLASSIFIED
UNCLASSIFIED
Security of Interconnected CIS
pot” which can be monitored for signs of any attack (there being no legitimate
need ever to connect to such any host, any connection attempts can be
considered as prima facie evidence of any attack, to be handled as laid down in
Chapter 11).
Risk Assessment
1548. The means of implementation for these policies will depend to a considerable
extent on the level of interconnection. For instance,
b. In other where systems are open to each other electronically (i.e. Level
4,5A or 5B), the appropriate technical measures are derived from the level of
interconnection.
1549. The detailed functionality of the SMI will need to be determined on a case by
case basis, based upon connection scenario, NIPD level and channel type(s). It is,
however, stressed that as a minimum each SOA should have at least one BPD within a
SMI which is under their direct management control (e.g. screening router between
“internal” LAN and shared LAN / WAN).
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
1552. Technical security measures will normally require a formal ITSEC evaluation,
and, if based upon COTS Certified packages, a further Penetration Test to confirm
correct configuration.
Accreditation
1556. As part of the Smart Procurement Initiative (SPI), the concept of Shared Data
Environments (SDE) has been developed, which is based upon the interconnection of 3
or more domains to form an Extranet. The 3 types of domain involved in a SDE are :
a. MOD domain(s) ;
b. Shared domain(s) ;
c. External domain(s).
1557. Specific security advice for SDEs should be sought from DSy(Pol) before
proceeding with any implementation.
UNCLASSIFIED
UNCLASSIFIED
Security of Interconnected CIS
1559. It is recognised that certain specific security measures are required for such
Extranets, as laid down in the Security Framework for IAG, Modernising Government
Supplement 24, with the security requirements for those elements of the service
contained wholly internal to Government remaining the remit of existing HMG Security
Policy.
1560. The IAG recognises a number if different types of domain to form such
Extranets:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
1561. Specific security advice for implementing IAG services within MOD must be
sought from InfoSy(Tech) before proceeding with any implementation.
Incident Handling
1562. As part of the Accreditation process, evidence will be required that
management procedures are in place to detect and respond to any incidents affecting
all MOD systems party to the connection(s) are in place, in accordance with Chapter
11. The preferred solution is for all SMIs to be directly or remotely accessible by
protected means from a recognized Monitoring and Reporting Centre (MRC) with 24
hour coverage.
UNCLASSIFIED
UNCLASSIFIED
Security of Interconnected IT Systems
ANNEX A TO
CHAPTER 15
BARRIER FUNCTIONS (BF)
EFFICACY OF PROTOCOL CONTROLS
1. Based upon the current state of security technologies, the table overleaf
indicates the efficacy achievable for various combinations of IP related protocols and
Barrier Functions (BF). The assessed efficacy is an indication of that currently felt to
be achievable at the current state of the art, and is expressed in terms of:
(ii) GF Toolkits;
c. N/K - Not Known indicates that the protocol has been identified for
investigation, but that no conclusion had been reached at the time of
publication;
4. Due to the dynamic nature of the technologies and vulnerabilities involved, the
relevant PSyA or the DSSO should be consulted before proceeding on the basis of this
UNCLASSIFIED
UNCLASSIFIED
+ Interactive
Exchange Requirement
Transport
Transport
Transport
Transport
+ Content
+ Content
+ Format
+ Format
+ Format
ICMP COTS GF GF X
NTP and SNTP N/K N/K N/K N/K
Other Time Protocols N/K N/K N/K N/K
(e.g. GPS)
SMTP COTS COTS COTS GF
X.400 COTS COTS COTS GF
1
HTTP - Browse Down COTS COTS COTS X
2
HTTP - Browse Up COTS COTS X X
HTTPS COTS X X X
3
FTP - Connect Up COTS COTS GF X
4
FTP - Connect Down COTS COTS GF GF
NNTP N/K N/K N/K N/K
IMPP/MSNP(1863/TCP) N/K N/K N/K N/K
LDAP/X.500 – Server COTS COTS X X
Only
DNS – Server Only COTS COTS N/K N/K
SNMP versions 1 and 2 X X X X
SNMP version 3 COTS COTS GF N/K
OTH-Gold GF GF N/K N/K
5
H.323/T.120 Video X COTS X X
H.323/T.120 Document X COTS GF GF
transfer
ICA COTS X X X
RDP COTS X X X
CORBA (end to end) N/K N/K N/K N/K
MDX + Other Proprietary N/K N/K N/K N/K
1
This is when a browser is invoked from a high domain in order to view the web server contents of a
lower domain.
2
This is when a browser is invoked from a low domain in order to view the web server contents of a
higher domain.
3
This is when the original connect request is initiated from a low domain to a higher domain.
4
This is when the original connect request is initiated from a high domain to a lower domain.
5
An interactive control may be achieved on call setup.
UNCLASSIFIED
UNCLASSIFIED
ANNEX B TO
CHAPTER 15
1. The symbols used in a domain model are all shown in this quick reference guide.
2. The symbols in the table are included as separate ‘pictures’, so that they can be
copied from an electronic version of this document using ‘cut and paste’. Alternatively, a
Visio template is available for creating domain model diagrams with the Visio tool.
Basic elements
Internal domain
Name
External domain
Name
Environment
Name
Portal
E1 D1
One-way
D1 D2
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
Connection types
Message connection type
or Name Filestore
or Name Database
Conferencing types
or Name Video-conferencing
or Name White-boarding
Miscellaneous connections
or Name Printing
FAX
or FAX Name Fax
or Name Telephone
UNCLASSIFIED
UNCLASSIFIED
Cloning
Clone zone
Refinement
Refined domain
Refined environment
UNCLASSIFIED
RESTRICTED
Security of Interconnected CIS
ANNEX C TO
CHAPTER 15
1. Level 1 Interconnection.
a. Application.
(3) The information systems, where they exist, play no part in level 1
interconnection, and no standardization of systems is required.
However, the use of common message standards considerably enhances
the understanding and usability of the transfered information.
RESTRICTED
RESTRICTED
Defence Manual of Security
c. Operating Process.
RESTRICTED
RESTRICTED
Security of Interconnected CIS
d. Security Aspects.
2. Level 2 Interconnection.
c. Operating Process.
RESTRICTED
RESTRICTED
Defence Manual of Security
(e) The system B liaison team operator interprets the data by:
RESTRICTED
RESTRICTED
Security of Interconnected CIS
d. Security Aspects.
3. Level 3 Interconnection.
RESTRICTED
RESTRICTED
Defence Manual of Security
c. Operating Process.
(e) Either:
RESTRICTED
RESTRICTED
Security of Interconnected CIS
d. Security Aspects.
4. Level 4 Interconnection.
a. Application. Level 4 is for two systems which are open to each other,
but which have predetermined and fixed technical access constraints exist on the
extent of the access by each system to the other.
(5) The interface between the two systems is fully automated, and
permits the exchange of information, within the limited subset, without
the intervention of any operator of either system. However, it will be
necessary for the two systems to have a common understanding of each
other's access controls and information integrity criteria and parameters,
RESTRICTED
RESTRICTED
Defence Manual of Security
c. Operating Process.
(3) Under normal circumstances, the user will not be aware of the
mechanism being used to satisfy his request. The user will employ his
normal information retrieval or request procedures for access to all
information to which he has access rights.
d. Security Aspects.
(1) Software and hardware and human procedures will provide the
necessary constraints on access to control the exchange of information,
to limit interoperability in accordance with the operational and security
requirements.
RESTRICTED
RESTRICTED
Security of Interconnected CIS
5. Level 5 Interconnection.
a. Application. Level 5 is for two systems which are open to each other,
and which conform to minimum standards for information definition and
transfer such that there are no fixed constraints on the extent of access by users
of one system to the other, but dynamic constraints are applied to each systems,
in accordance with the current operational situation, such that only a user-
defined subset of the total information base of one system is available to the
other.
(5) The interface between the two systems is fully automated, and
permits the exchange of information, within the defined subset, without
the intervention of any operator of either system. However, it will be
necessary for the two systems to have a common understanding of each
others access controls and information integrity criteria and parameters,
RESTRICTED
RESTRICTED
Defence Manual of Security
c. Operating Process.
(3) Under normal circumstances, the user will not be aware of the
mechanism being used to satisfy his request. The user will employ his
normal information retrieval or request procedures for access to all
information to which he has access rights.
d. Security Aspects.
RESTRICTED
RESTRICTED
Security of Interconnected CIS
6. Level 6 Interconnection.
a. Application. Level 6 is for two systems which are open to each other,
which conform to minimum standards for information definition and transfer,
and for which there are no constraints on the extent of access by users of one
system to the other; the two systems thus appear to both sets of users to be a
single system. It is likely that such situations will only apply to two systems
within a single command, or between two systems of a single nation.
(4) The interface between the two systems is fully automated, and
permits the exchange of any information without the intervention of any
operator of either system. However, it will be necessary for the two
systems to have a common understanding of each others access controls
and information integrity criteria and parameters, as well as the
definition of the information subset that may be subject to exchange. It
will also be necessary for some technical parameters to be aligned.
Differences in any of these controls, criteria and parameters will impose
limitations on the extent to which the systems may interoperate, and may
reduce the interoperability to level 4.
RESTRICTED
RESTRICTED
Defence Manual of Security
c. Operating Process.
(2) Under normal circumstances, the user will not be aware of the
mechanisms and procedures. More than one mechanism may be in force
at any time. The definition of the access rights of individual users will
not be affected by the definition of the access mechanisms to be
employed.
d. Security Aspects.
RESTRICTED
UNCLASSIFIED
Security of Interconnected CIS
ANNEX D TO
CHAPTER 15
2. From this diagram, a series of abstract diagrams should be prepared, with each
abstract centring on one domain under MOD control and showing all the other domains
as an external domain. Straight line connections should be drawn from this “Protected”
domain being analysed to all external domains (i.e. showing “full meshed” connection),
and these should be numbered individually.
3. For each connection, determine the number of steps removed from the domain
under consideration, which gives the “degrees of indirection”:
4. Using these diagrams, the following methodology can be used to determine the
Risk Profile of all connections.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Confidential
Unclassified
Top Sercet
Restricted
Secret
TOP SECRET 1
SECRET 1 1 3
CONFIDENTIAL 1 3 5
RESTRICTED 1 3 5 7
UNCLASSIFIED 1 3 5 7 9
9. The Basic Risk Profile (BRP) is the highest number from either the Protective
Marking or Criticality Level sections of the table :
Separation Modifier
UNCLASSIFIED
UNCLASSIFIED
Security of Interconnected CIS
Accreditation Modifier
Cascade Modifier
10. Having completed the table, the CRP for each connection is determined by
summing the values. The worst case CRP for each domain is used to derive the
requirement for security functionality within the Secure Managed Interface (SMI) on the
boundary of the domain, using the following table :
11. The functionality requirements for the different types of protection are given in
Chapter 15.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
International Collaboration
INTERNATIONAL COLLABORATION
Chapter Para Page
16 International Collaboration
Introduction 1601
Definitions 1604
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
International Collaboration
CHAPTER 16
INTERNATIONAL COLLABORATION
Introduction
1602. This chapter provides core policy statements, which form the basis for the
comparison of individual nations IT security policy, to determine if there are
inconsistencies that may conflict when interoperable or joint systems are being
considered. It provides a high level check-list rather than detailed policy. The security
arrangements for the release of UK protectively marked information to Combined Joint
Task Forces/Coalition missions, involving UK Armed Forces, are in JSP 440 Volume 1
Chapter 11.
Definitions
1604. The following terminology may be encountered when dealing with International
Collaboration programs:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Interconnection Scenarios
1606. When interconnecting through a CWAN, the following specific security issues
should be considered:
D SMI D
PAN C
E A
ACCREDITED
CWAN
F F
B A
A A
B
UNCLASSIFIED
UNCLASSIFIED
International Collaboration
1607. Requirement to Accredit. All IT systems are to be accredited. For each system
the System Sponsor(s)/Owner(s) is to ensure that this occurs. IT systems may need to be
reaccredited when the system configuration is changed from that which was previously
accredited.
1608. Post Accreditation Audit. The national Defence Security Authority shall ensure
that post accreditation auditing is conducted.
1609. Authority for Granting Waivers and Concessions. Only national Defence
Security Authorities may grant waivers and concessions to national security policy.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
1612. Contingency Planning. For each IT system the System Sponsor(s)/Owner(s) are
responsible for formulating, testing and maintaining a contingency plan.
1614. Use of Defence Systems Outside a Defence Controlled Area. The use of a
Defence IT system to process Defence information outside a Defence controlled area
must be approved by the national Defence Security Authority.
1616. Passwords. Users are to ensure that passwords are protected outside the system
to a level consistent with the classification of the system.
1617. Breaches of Security. Procedures must be in place for identifying, reporting and
managing breaches of security.
1619. Overall Physical Security. All physical security which is a part of an IT system
is to be in accordance with participating member nations national policy and standards,
as defined by their respective security authorities.
UNCLASSIFIED
UNCLASSIFIED
International Collaboration
1620. Import of Information. The import of all information into a IT system from any
source, either by media or a network connection to an external system, is to be approved
in accordance with operating procedures. It is also to be legally acquired and used in
accordance with the licence agreement.
1623. Handling and Marking of Electronic Storage Media. All types of removable
electronic storage media is to be labelled, handled, accounted for, de-classified or re-
classified, and disposed of, in accordance with their security classification.
1628. Access Control. The Sponsor(s)/Owner(s) are to determine the access controls
that will be used to control users of the system when accessing the other connected
systems.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
1633. Tempest Standards. The basis for Tempest standards within Defence is the
relevant National Security Instructions.
UNCLASSIFIED
UNCLASSIFIED
International Collaboration
ANNEX A TO
CHAPTER 16
Introduction
2. Overall control of a joint development project or system will normally be under the
control of a Joint Project Office (JPO) which will be responsible for appointing a multi-
national security working group. The principles and processes set out below are intended
to provide the basis for developing individual memoranda of agreement.
Basic Principles
4. When required by the system security policy, security products used in a system
must have been evaluated against the ITSEC and ITSEM, or Common Criteria, by
Information Technology Security Evaluation Facilities (ITSEFs) approved by the JCP.
5. The nations shall agree to the sharing of the evaluation results, provided that
adequate evaluation competence can be demonstrated by a participating nation. Once
demonstrated, their ITSEC product evaluation results may be reused in the system
evaluations.
6. Copies of all evaluation documents and deliverables shall be distributed among the
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Evaluation Process
10. Numbers of Evaluators and Foreign Auditors. Each nation will be permitted to
supply a number of evaluators in a joint evaluation team, which is in proportion to the
total number of participating nations.
11. For any evaluation, the number of foreign auditors from a given nation shall total no
more than two at any one time. At least one foreign auditor per evaluation per nation
shall be permitted.
12. Funding. Each evaluation will normally be funded by the evaluation sponsor.
Funding of certification fees will be negotiated on a case by case basis.
Certification Process
13. Joint Certification Panel (JCP). The JCP shall comprise representatives from the
certification bodies of the participating nations. Each meeting of the JCP shall require at
least one representative from each national Certification Body.
14. The Chairman shall be from the nation whose evaluation is under consideration,
otherwise general meetings will be held on a rotational basis. The Secretary shall be
from the host nation.
UNCLASSIFIED
UNCLASSIFIED
International Collaboration
16. Conduct of System Evaluation. Prior to the evaluation, the JCP shall approve the
Evaluation Work Plan (EWP).
17. During the evaluation, the JCP shall review the conduct of the evaluation and
determine whether the evaluation has met the requirements of ITSEC/ITSEM or
Common Criteria.
19. If unanimous agreement cannot be achieved by the JCP on the EWP or the conduct
of the evaluation, the ITSEF's national Certification Body shall request appropriate
additional evaluation work.
20. The JCP shall approve the Evaluation Technical Report (ETR) and confirm the
evaluation results.
21. The national Certification Body will issue, to the national Accreditation Authority
and the JCP, a national certification report for the evaluated system.
22. A national Certification Body may also issue an endorsement (with any caveats) of a
certification report received from another nation.
23. When the Security Accreditation Panel (or in the case of single national system
implementations each national Accreditation Authority) has endorsed all national
certification reports and has given its subsequent formal accreditation, this shall be the
evidence to be presented by the JPO to the Joint Acceptance Committee as part of the
overall Acceptance into Service process.
Document Distribution
24. The Joint Project Office (JPO) shall be responsible for ensuring that all required
evaluation deliverables are produced by the evaluation sponsor and developer.
25. The national Certification Body shall be responsible for arranging distribution of the
Evaluation Technical Report(s), the Certification report(s) and any related documents to
the certification bodies of the other nations.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
RESTRICTED
Introduction to Communications and Electronic Security
Applicability 1701
Aim 1702
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Introduction to Communications and Electronic Security
CHAPTER 17
INTRODUCTION TO
COMMUNICATIONS AND ELECTRONIC SECURITY
Applicability
1701. Line Managers are responsible for ensuring that staff under their control are
briefed in the use of communications and electronic systems for passing protectively
marked information as laid down in this JSP.
Aim
1702. The term InfoSec is used to describe the Technical Facets of Security, which
encompass the disciplines of CompuSec, RadSec and ComSec. The aim of this Part is
to state the ComSec and RadSec regulations and practices that will be encountered in the
working environs of the MOD and associated establishments. The issue of CompuSec is
discussed in detail at Part 1.
1704. Communications security (ComSec) is the collective title for measures taken to
protect all aspects of communications to deny access to information of value which
might be derived from a study of communications material and information to
unauthorised persons, or to mislead authorized persons in their interpretation of the
results of such a study. ComSec has 4 components:
RESTRICTED
RESTRICTED
Defence Manual of Security
1705. The current MOD policy is therefore that for all operational military
communications should be carried out in accordance with the communications
procedures laid down in Allied Communications Publications (ACPs), as supplemented
by Defence Communications Publications (DCPs), in conjunction with the Security
Requirements laid down in this Manual.
1706. All users of communications systems are to have a working knowledge if the
relevant publications, and to be trained in the correct use of the procedures adopted
therein. The adherence to the authorized procedures allows military communications to
be established, and information transmitted, rapidly and concisely, and reduces the
opportunity for misunderstanding, which materially improves ComSec, and the
efficiency and reliability of communications.
1708. The techniques for obtaining information in this way are well known and it must
therefore be assumed that our communications are under constant study by foreign
intelligence agencies. In addition there is always the possibility of the exploitation of
this source of information by subversive organizations, and on occasions by the press
and public.
RESTRICTED
RESTRICTED
Introduction to Communications and Electronic Security
Installation Control
1713. In order to maintain the security of CIS, good installation practice is required, in
terms of both initial fit and configuration management throughout life.
1714. Enforcement is primarily carried out by the process of Installation Design, which
must be obtained before any CIS is permitted to store, process or forward any official
information. The issue of an Installation Design Conformance Certificate verifies for
the Data Owner(s) that implementation does not present an unacceptable Confidentiality
risk to the Information being processed, and also confirms, for the System Management
authority, that appropriate asset protection for Integrity and Availability is in place.
1715. To the extent to which systems fall completely within their area of responsibility,
the control of this subject is vested in the designated Coordinating Installation Design
Authority (CIDA), who are acting as the agent of the DSSO or TLB PSyA in the
discharge of security relevant aspects of their duties. Details of the CIDAs are given at
Annex C to Chapter 21.
1716. The appropriate CIDA for a site or system is determined from the organisation
responsible for security for the site or platform.
RESTRICTED
RESTRICTED
Defence Manual of Security
1718. Details as to the subordinate staffs within Sectors tasked with performing
elements of IT and communications system/installation Design Control are laid down in
the RadSec element of this Volume, Chapter 21.
Operations Security
1719. The topic of Operational Security (OpSec) is addressed in more detail at
Volume 1, but in the context of communications security it is particularly important to
consider OpSec where the subject matter is notionally UNCLASSIFIED, as inferences
can be drawn from operator chatter and mannerisms, use of jargon, and call signs. The
following will be the main areas requiring a specific OpSec assessment.
1721. Test Tapes It is essential that where the same test tapes are frequently used in
conjunction with a cryptosystem (e.g. within ACP127 messaging), that the agreed,
standard test tape is used rather than “home made” test tapes, however humours they
may be, as the standardised for has been proven to both exercise all the functions of the
equipment, and not to have any non-standard formatting or errors that would allow
indentification of Service, formation, or unit involved.
RESTRICTED
RESTRICTED
Defence Manual of Security
ANNEX A TO
CHAPTER 17
TRANSMISSION SECURITY
Introduction
1. Transmission Security (TranSec) is the element of ComSec which addresses the
following:
Countermeasures
2. TranSec measures are designed to obstruct enemy attempts to disrupt or gather
intelligence from our use of communications. These measures include the following:
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Telephone Security
TELEPHONE SECURITY
Chapter Para Page
18 Telephone Security
Pagers 1820
Compliance 1823
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Telephone Security
CHAPTER 18
TELEPHONE SECURITY
Protectively Marked Speech over Telephones
RESTRICTED
RESTRICTED
Defence Manual of Security
1803. Microwave circuits may be used for long distance and some local telephone calls
in place of conventional cable circuits. Subscribers will not normally be aware that
their calls are being routed over microwave links. Such links can be intercepted from
numerous places including foreign diplomatic premises both within the UK and
overseas.
1804. The following defines the requirements for the protection of telephone
conversations:
RESTRICTED
RESTRICTED
Telephone Security
d. If during the period of a call, if either caller recognises the other party is
raise the level of the conversation above the highest Protective Marking
permitted for the system, then the call should be terminated immediately ;
1806. Where databases mapping telephone numbers to users or posts are present, the
inference of the Data Protection Act is that the information will have to be protected as
if it were Protectively Marked at least RESTRICTED, and should be specifically
addressed in SPD which must be approved by the Accreditor(s).
Terminal Apparatus
RESTRICTED
RESTRICTED
Defence Manual of Security
marked messages. To this end, all callers who might leave a message are to be
reminded of this rule by suitable words, such as :
1811. VoiceMail There are inherent security risks in the use of voicemail systems.
Voicemail is not to be used to record protectively marked messages. To this end, all
callers who might leave a message are to be reminded of this rule by suitable words,
such as
1812. Voice Mailbox contents are liable to monitoring by the System Operating
Authority (SOA).
1813. The PIN/Password for the mailbox should be changed by the user from the
default to one that is not linked to person, post or office number.
1814. Facilities for the use of remote interrogation of mailboxes should not offer
“backdoors” into other parts of the telephone system. Any evidence of possible
malicious abuse of the system must be reported to Sector Security Staffs.
Cordless Telephones
1816. Analogue (CT1) cordless telephones will not be approved as terminal
instruments on extensions connected to a MOD telephone exchange.
1817. Digital (DECT) cordless telephones will not normally be approved as terminal
instruments on extensions connected to an MOD telephone exchange, but regulations
for their specific approval are contained at Annex B.
Voice Over Ip
1819. The Internet Protocol (IP) allows for various types of information, including
RESTRICTED
RESTRICTED
Telephone Security
Pagers
1820. Any information sent to a pager, or to the similar “SMS” capability of a mobile
phone, should be UNCLASSIFIED only, and will be liable to mobile / portable
telephone regulations if capable of transmit as well as receive operation.
Counter Eavesdropping
1821. Guidance on both the threat from audio-eavesdropping and on the required
protective security measures is given Chapter 27.
1822. When considering the Protective Marking of any telephone call, it should always
be remembered that there may be an indirect threat of additional information from
“overhearing” of background audio content, which can include audio output from a
computer, and keyboard and printer 'chatter'.
Compliance
Incident Handling
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
UNCLASSIFIED
Telephone Security
ANNEX A TO
CHAPTER 18
ACCREDITATION OF TELEPHONE
EXCHANGES TO SECRET
1. The generic advice contained within this Annex has been withdrawn in the light
of the availability of catalogue services from Defence Communication Service Agency
(DCSA):
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
RESTRICTED
Telephone Security
ANNEX B TO
CHAPTER 18
CORDLESS TELEPHONES
Equipments
1. Cordless telephones, which include the analogue (CT1/CT2) and digital
(CT3/DECT) technologies, rely on a radio link for part of any connection, and present
specific security issues.
4. From events highlighted in national press and other sources there is evidence of
persons wishing to gain access to telephone conversations and exploit the results of
those interceptions.
5. Conversations made over analogue cordless telephones are easy to intercept and
record. Digital technology provides a measure of protection by commercial encryption
over the air interface, and has been approved for TranSec purposes only for protection
of RESTRICTED information within the UK mainland.
Applicability
Countermeasures
6. Specific precautions, and operating limitations, are required to minimise the
risk of compromise of information by use of cordless telephones.
RESTRICTED
RESTRICTED
Defence Manual of Security
(i) At the entrance to any area where the use of mobile telephones
is prohibited ;
Additional Considerations
9. Cordless telephones should not be used in places denoted as "Hazardous Areas"
or other areas where the use of such apparatus is prohibited under Health and Safety
regulations. It should be noted that electronic equipments compliant with Civil EMC
standards are not guaranteed to be immune from Radio Frequency Interference (RFI)
from cordless telephones (e.g. DECT handsets) operated within 1m of the equipment in
question.
RESTRICTED
RESTRICTED
Telephone Security
ANNEX C TO
CHAPTER 18
Overview
1. Mobile (portable) telephones, which include the major cellular telephone
networks (BT Cellnet, One2One, Orange and Vodafone etc.) rely on a radio link for
the whole or part of any connection. They may be hand carried devices or instruments
forming part of an installation in a vehicle. In this Annex the term mobile telephone
is used to cover all such devices.
2. The mobile telephone industry is a fast evolving area of technology, and is
subject to a wide range of acronyms. Appendix 1 provides a summary of the
terminology and technologies that may be encountered in this area, as there may be
some variation in the terms used by suppliers to that specified in this Annex.
Circuit Switched Data Calls to MOD CIS RESTRICTED Not normally permitted
accredited to RESTRICTED
RESTRICTED
RESTRICTED
Defence Manual of Security
Applicability
11. These regulations apply equally to officially supplied, privately owned and
contractor owned mobile telephones when carried on MOD or service property, or
being used for Official purposes, and for its use for Voice purposes.
12. When a mobile telephone is to be used for purposes other than Voice,
additional considerations must be taken into account:
a. Fax purposes : the regulations covering Facsimile as laid down at
Chapter 19 must be followed in addition to the measures laid down in this
Annex ;
RESTRICTED
RESTRICTED
Telephone Security
Countermeasures
14. Specific precautions, and operating limitations, are required to minimise the
risk of compromise of information by use of mobile telephones.
15. Device dependant considerations :
a. Legacy analogue (1G) mobile telephones are only to be used for
UNCLASSIFIED speech. It is the responsibility of the analogue user to ensure
that other parties are aware of this limitation ;
b. GSM900 / GSM1800 mobile telephones when being operated within
mainland UK are approved for voice telephone calls up to and including
RESTRICTED without additional countermeasures.
c. Where there is any requirement for the use of GSM technology
(including such technologies embedded in notebook computers or PDAs) to
be used in Circuit Switched Data (CSD) or General Packet Radio Service
(GPRS) modes for the passage of official information, specific approval must
be obtained in advance from the relevant PSyA or the DSSO. Any devices
enabled for GPRS/EGPRS services must be configured to allow the user to
control the activation of the link ;
d. The Signalling System 7 (SS7.05) Short Message Service (SMS) is
limited to UNCLASSIFIED use only ;
e. When any mobile phone is being operated outside of mainland UK
(“roaming”), all calls involving this device are limited to UNCLASSIFIED
only, and it is the responsibility of the roaming user to ensure that other parties
are aware of this limitation ;
f. LEO satellite mobile phones are only to be used for UNCLASSIFIED
speech. It is the responsibility of the LEO user to ensure that other parties are
aware of this limitation ;
g. Dual or multi mode (e.g. GSM cellular / DECT cordless and GSM
cellular / LEO satellite mobile) devices are to be used in accordance with the
most prescriptive requirements;
RESTRICTED
RESTRICTED
Defence Manual of Security
Additional Considerations
18. Mobile telephones should not be used in places denoted as "Hazardous
Areas" or other areas where the use of such apparatus is prohibited under Health and
RESTRICTED
RESTRICTED
Telephone Security
RESTRICTED
UNCLASSIFIED
Telephone Security
APPENDIX 1 TO
ANNEX C TO
CHAPTER 18
MOBILE TELEPHONE TAXONOMY
The following table summarises the current and predicted terminology and technologies in the mobile
telephone industry. It will be noted that some terms (e.g. PCS) are used to describe multiple differing
technologies.
Applicability
Generation
Additional
Standards
Facilities
Network
Service
Notes
and
1G Total Access FDMA UK / Europe N/A
Communications Service
(TACS) and Enhanced Total
Access Communications
Service
Advanced Mobile Phone USA / CAN
Service (AMPS)
Nordic Mobile Telephony Scandinavia
(NMT)
2G Digital-AMPS (D-AMPS) TDMA USA / CAN Interim standard with mix
IS-54 of analogue and digital:
superceded by IS-136
Global Standard for Mobiles 200kHz Worldwide • Short Message
(GSM) at 900Mhz (GSM900) 8 timeslot Service (SMS) ≤160
and 1800Mhz as Personal TDMA bytes
Communications Service • Circuit Switched Data
(PCS1800 / GSM1800) (CSD) 9.6-14.4 kb/s
GSM at 1900Mhz USA / CAN
(GSM1900 / PCS1900)
United States Digital Cellular 3 timeslot North / South
(USDC) or Digital PCS TDMA America
IS-136
TIA/EIA-136
CdmaOne AMPS or Digital CMDA USA / CAN
PCS IS-95
Personal Digital Cellular Japan
(PDC) or Personal
Handyphone System (PHS)
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Applicability
Generation
Additional
Standards
Facilities
Network
Name(s)
Service
18E1-2
UNCLASSIFIED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Telephone Security
ANNEX D TO CHAPTER 18
VOICEMAIL
1. Voicemail is not to be used to record protectively marked messages. To this
end, all callers who might leave a message are to be reminded of this rule by suitable
words, such as "This is the voicemail-box for extension 1234. Please leave an
UNCLASSIFIED message after the tone.".
5. If the system permits, the total amount of information on the voicemail system
is to be kept to a minimum by some form of purge or ageing-off procedure.
6. The PIN/Password for the mailbox should be changed by the user from the
default to one that is not linked to person, post or office number.
7. Facilities for the use of remote interrogation of mailboxes should not offer
backdoors into other, possibly sensitive, parts of the telephone system. Any evidence
of possible malicious abuse of the system must be reported through the security chain
of command.
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Facsimile Security
FACSIMILE SECURITY
Chapter Para Page
19 Facsimile Security
Introduction 1901
Applicability 1905
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Facsimile Security
CHAPTER 19
FACSIMILE SECURITY
Introduction
1901. Facsimile equipment is provided for the transmission of documents and signal
messages over either dedicated (point to point) or telephone (dial up) lines such as those
provided by Government or Service telephone systems, British Telecom, Mercury or
other commercial organizations. Because of the inherent dangers of passing Government
information accidentally or intentionally to unauthorised recipients via facsimile, it is
necessary to ensure that the use of such equipment is strictly controlled.
1902. If it is necessary to use a facsimile machine for copying, it must also comply
with the copier rules laid down in Volume 1, and must not be used to copy material of a
higher protective marking than that authorized for transmission from the terminal.
Applicability
1905. This chapter gives the basic instructions that are applicable to all dedicated
facsimile devices i.e. insecure and secure facsimile and insecure and secure DISKFAX.
The instructions are based on insecure facsimile machines and additional information on
the extra rules that apply to secure facsimile and DISKFAX are at Annexes A and B
respectively.
1906. Additional technologies now exist which are capable of carrying out the same
functions as dedicated facsimile machines, including :
RESTRICTED
RESTRICTED
Defence Manual of Security
1907. In general the same principles as laid down in this chapter should be used for
these additional technologies, but the technology specific paragraphs in this Chapter
must also be complied with. Any technologies not specifically mentioned within this
Chapter can be assumed to not be currently approved for MOD use, and any requirement
for use of such technologies should therefore be referred to InfoSy(Tech) for direction.
1909. He/she is responsible for overseeing its day to day operation. A Deputy
Controller is to be nominated to cover periods when the Controller is absent. The
Controller is to be appointed before the facsimile terminal is installed, to assist in the
planning and development of working practices.
1911. The nominated Controller must produce written SyOPs for each secure and
insecure terminal under his/her control. These SyOPs must reflect the requirements of
this document and be approved by the relevant security authority before a terminal is
first used. The SyOPs must be brought to the attention of users. A suggested format for
SyOPs is shown at Annex C for facsimile and Annex D for DISKFAX.
1912. The Controller is to maintain a list of persons authorized to use the terminal.
The Controller or an authorized Deputy is responsible for ensuring that each
transmission has been properly authorized and that the terminal is suitable for the
transmission in accordance with para 1818 and paras 1815 - 1816 below.
Physical Security
1913. General. Facsimile equipment should be located in a room where general
access to the machine is denied but in which at least one person, ie the Controller or
his/her Deputy is on duty.
RESTRICTED
RESTRICTED
Facsimile Security
turning the machine off at close of play, ensure that a test print is made to clear the
facsimile's memory. If a memory capability is available, PIN code protection must be
enabled.
or
b. Locking the access door to the room where the facsimile is installed,
1916. Where unattended out of hours working in the `receive mode only' is required, or
if the above cannot be achieved :
either
a. The equipment is in a designated secure area or locked room.
Document Security
1918. All pages of a document to be transmitted by the facsimile must be clearly
marked with the protective marking, top and bottom, situated centrally and the page
number.
Transmission Security
1919. General. Depending on the geographical location, terminals are only
authorised to transmit or receive certain levels of protectively marked information, as
detailed below:
RESTRICTED
RESTRICTED
Defence Manual of Security
ensure that the facilities for handling such material are in place. No `Special
Handling' information may be passed.
1920. Warning Notices. Each facsimile terminal is to bear a notice indicating the
highest protective marking of material that can be passed over the system, in accordance
with the following:
b. For all other insecure terminals overseas or in Northern Ireland the notice
is to read:
RESTRICTED
RESTRICTED
Facsimile Security
Insecure
Secure
Transmission Procedures
1925. When using dial up facilities, care must be taken by the operator that the correct
number has been dialled before transmitting any facsimile material. If it is discovered
that a facsimile message has gone to an incorrect terminal, due to faulty dialling or
misrouting, the actions set out in paras 1824-1826 below are to be followed.
RESTRICTED
RESTRICTED
Defence Manual of Security
1926. The most common reason for the misdirection is the incorrect use of Public
Switched Telephone Network (PSTN) dialling codes, often and sometimes inaccurately
referred to as “outside line” or “BT” (British Telecom) codes. Users are reminded that
before they dial any PSTN code they must normally precede it with either a 0 or 9
(dependent upon telephone exchange) to connect the line. PSTN should not be used as
the first choice for connection but as a last resort. Users of insecure facsimiles who are
using stored PSTN numbers are to check that they have preceded the code with the
correct access digit described.
1928. Most facsimile machines allow users to insert both the telephone number and a
terminal identifier (normally the branch name) of the facsimile machine. Both of these
items are displayed on every page transmitted and also they are shown on the display
panel of facsimile machine trying to transmit to it. It is recommended that both these
options are used as they provide a simple method of checking that the correct connection
has been prior to transmission.
RESTRICTED
RESTRICTED
Facsimile Security
1933. Some equipments also have a volatile memory acting as a buffer store for data
transmitted or received. This buffer store is normally cleared when the machine is
switched off but for added security an UNCLASSIFIED A4 size paper with a computer
picture such as a computer test pattern or similar document followed by a blank sheet of
paper should be fed through the machine before the equipment is sent away for repair or
disposal.
1934. Maintenance on site should undertaken by security cleared UK nationals who are
to be supervised at all times. Engineers who are not security cleared are to be escorted
and supervised at all times. A log is to be maintained of all repairs.
Remote Diagnostics
1935. Remote diagnostics where fitted are to be permanently disabled.
Fax Modems
1937. In addition to complying with the requirements for facsimile machines laid down
in this Chapter, the installation of a “FAX modem” in any personal computer will
require the adaptation of the generic Security Policy Documentation (SPD) for such
RESTRICTED
RESTRICTED
Defence Manual of Security
systems laid down at Chapter 1 to accommodate the changed configuration, and will
thus require specific Accreditation by the PSyA or DSSO rather than simple
Registration.
1938. A common feature of FAX modems is the ability to send and receive facsimile
(fax) messages to and from similarly equipped computers or ordinary fax machines, in
addition to being able to communicate with other modem-equipped computers or
computer networks. Switching between these two modes of operation is usually
controlled by software. Despite their apparent advantages, fax/modems represent a
significant threat to system security because their usefulness depends largely on
continuous dial-in access and they are therefore especially vulnerable to hacking.
Fax Servers
1939. In addition to complying with the requirements for facsimile machines laid down
in this Chapter, the presence of the “FAX server” on the network must be factored into
the Assurance Requirement assessment for the network to be carried out in accordance
with Annex A to Chapter 14. If there is any intention to directly or indirectly connect
the FAX server to the PSTN, then the Attacker Populace will by definition be greater
than 5,000 uncleared persons.
RESTRICTED
RESTRICTED
Facsimile Security
ANNEX A TO
CHAPTER 19
Physical Security
RESTRICTED
RESTRICTED
Defence Manual of Security
Document Security
Transmission Security
Where a secure facsimile machine serves more than one department within a HQ or
Unit, the Controlling Officer must keep a list of nominated personnel for each
Dept/Unit.
10. Warning Notices. Each facsimile terminal is to bear a notice indicating the
highest protective marking of material that can be passed over the system, in accordance
with the following:
RESTRICTED
RESTRICTED
Facsimile Security
d. Copy numbers are also to be marked on the front page of the document
NOT the transmission proforma in the following manner.
12. The Facsimile Transmission Proforma, when used, must be transmitted as the
first page of any facsimile document.
RESTRICTED
RESTRICTED
Defence Manual of Security
be checked against the journal and filed with the journal and will be subject to spot
checks by security staffs.
Transmission Procedures
Receipt Procedures
RESTRICTED
RESTRICTED
Facsimile Security
d. When prior arrangements have been made for the Controlling Officer at
the receiving terminal to copy a document protectively marked SECRET or
above or requiring special handling, the following rules are to be applied:
(3) All copies are to be entered into the incoming MOD F102 and
passed to the addressees on signature.
19. Background.
RESTRICTED
RESTRICTED
Defence Manual of Security
20. Policy for Secure Facsimile over PATRON Extensions. When endorsed by
the sector MOD CUSECFAX and the sector PATRON operational sponsors, facsimile
machines may be used on PATRON telephone extensions to transmit and receive
protectively marked traffic up to and inclusive of TOP SECRET UK EYES (non-
STRAP), provided the TEMPEST installation rules and the procedural rules are applied.
It is stressed that requirements for facsimile over PATRON are only to be endorsed
when MOD CUSECFAX is deemed as inappropriate.
22. Rules and Procedures. Where a case is approved for the use of facsimile over
PATRON, rather than MOD CUSECFAX, particular attention is to be drawn to the
following rules and procedures:
g. The caller is to be satisfied that a PATRON link has been established and
that the recipient is authorised to receive the information, prior to any facsimile
transmission.
RESTRICTED
RESTRICTED
Facsimile Security
23. Sector MOD CUSECFAX Sponsor. The overall Defence MOD CUSECFAX
security authority is the Defence ComSec Operating Authority in DCSA. Sector MOD
CUSECFAX sponsors (from whom prior endorsement of all PATRON facsimile
installations is to be obtained) are as follows:
a. Navy - DCIS(N)
b. Army - DCIS(A)
c. RAF - DCIS(RAF)
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Facsimile Security
ANNEX B TO
CHAPTER 19
Introduction
1. DISKFAX is the commercial name given to a device which enables the transfer
of data stored on either 3.5 or 5.25 inch diskettes between similar equipment via "dial-
up" telephone lines. Despite the name, it is a data transfer device and not a facsimile.
There are two variants of DISKFAX, one fitted with a non-removable integral hard disk
and the other with no hard disk facility. DISKFAX does not provide any security
protection to the data either in storage or transmission and is considered to operate in
DEDICATED mode.
Applicability
3. This Annex applies to all DISKFAX used within Defence and Defence
Contractors for the transfer of official information and no departure from or variation to
it is permitted unless prior authorization is obtained from the appropriate security
authority.
RESTRICTED
RESTRICTED
Defence Manual of Security
Physical Security
7. The equipment is to be switched off and secured whenever the office or other
area in which it is located is to be unattended for any period of time exceeding the
normal 30-minute rule. When unattended all removable magnetic media (e.g. Floppy
Disks) must be securely stored in a container or secure room appropriate to the highest
protective marking of material ever stored or transmitted on the machine, and of at least
adequate level for protecting RESTRICTED information. If a DISKFAX with fixed
hard disc is used, the equipment must be treated in the same manner as removable media
i.e. it must be securely stored as laid down above.
8. Where none of the above can be achieved, the DISKFAX machine must be
disconnected and stored in a secure cabinet. In special cases, the security and
communications authorities may authorize unattended out of hours working in the
`receive mode only' provided that:
RESTRICTED
RESTRICTED
Facsimile Security
9. Before use each day all equipment should be checked for any obvious signs of
tampering. Any suspicious matters should be reported to the local security staffs
without delay and the equipment is not to be used until checked and cleared. The fitting
of frangible security seals to the body of the machine in suitable positions to prevent
surreptitious access will simplify the daily checks. In the event of any emergency
evacuation of the area, the DISKFAX is, if possible, to be left in a secure condition.
Transmission Security
RESTRICTED
RESTRICTED
Defence Manual of Security
14. Each DISKFAX is to bear a notice indicating the highest protective marking of
material that can be passed over the system, in accordance with the following:
Transmission Procedures
15. Before transmission, the data recorded on the diskette is to be examined using
suitable utilities capable of displaying or block printing the entire contents to ensure that,
because DISKFAX transmits the entire contents of the diskette, only files intended for
transmission have been recorded and that the highest protective marking recorded does
not exceed the limits set out in paragraphs 6 and 8 above.
18. The DISKFAX machine is to be disconnected once the transmission has taken
place.
Receipt Procedures
19. Upon receipt of material via DISKFAX, the Controller is to ensure that the
received data is downloaded only on to diskettes of the type specified in paragraph 21.
20. All received material must be virus checked before it is downloaded into the
recipients system. All material is to be checked for viruses before being transmitted.
RESTRICTED
RESTRICTED
Facsimile Security
Diskettes
21. A separate set of diskettes is to be maintained specifically for use with the
DISKFAX; they are to conform to existing MOD policy for the use of colour coded
diskettes and are to be clearly identified on the label with the word "DISKFAX"
followed by a sequential serial number. Only diskettes issued by the DISKFAX
Controller and appropriately marked are to be used in the DISKFAX machine.
Privately owned diskettes are NOT to be used.
22. Diskettes for use on the DISKFAX machine are to be held by the DISKFAX
Controller and issued as required within the Directorate/Branch/Unit. The issue is to be
controlled by the Controller and, after transmission or downloading, the diskettes are to
be re-formatted and returned to the controller for safe custody.
24. When no longer required, DISKFAX with integral hard disks should have the
hard disks removed and physically destroyed if the equipment has been used to transfer
any material protectively marked RESTRICTED or above.
RESTRICTED
RESTRICTED
Defence Manual of Security
Protective
Marking
From: To:
This disk has been checked to ensure that only the files listed below are
present.
Protective
Marking
RESTRICTED
RESTRICTED
Facsimile Security
ANNEX C TO
CHAPTER 19
Name:....................Dept:...........Room:.........Tel No..........
Name:....................Dept:...........Room:.........Tel No..........
"The secure facsimile terminal consists of a "list of authorized users is shown at Annex
A. Any person not shown on this list, wishing to use the facsimile machine may only do
so with the approval of the Facsimile Controller".
RESTRICTED
RESTRICTED
Defence Manual of Security
8. Administrative Procedures.
b. "After dialling the required number, make sure you have been connected
to the correct destination".
RESTRICTED
RESTRICTED
Facsimile Security
c. "Do not attempt to hide any violation of transmission security. If the fact
is known, action can be taken to minimize any damage caused".
Date:............................
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Facsimile Security
ANNEX D TO
CHAPTER 19
Name:....................Dept:...........Room:.........Tel No..........
Name:....................Dept:...........Room:.........Tel No..........
4. DISKFAX System. (All DISKFAX). This should be description of the system and
whether it is insecure or secure eg
5. Authorised Users. (All DISKFAX). "A list of authorized users is shown at Annex
A (of the SyOPs). Any person not shown on this list, wishing to use the DISKFAX
RESTRICTED
RESTRICTED
Defence Manual of Security
10. Physical Security. (All DISKFAX). This section should contain instructions for
the security of the equipment when left unattended, the checks to be made for
tampering, details of where keys are held and procedures to be carried out at cease
work.
RESTRICTED
RESTRICTED
Facsimile Security
the word "DISKFAX" followed by a sequential serial number. Only diskettes issued by
the DISKFAX Controller and appropriately marked are to be used in the DISKFAX
machine. No other diskettes are to be used."
13. "Diskettes for use on the DISKFAX machine are to be held by the DISKFAX
Controller and issued as required within the Directorate/Branch/Unit. The issue is to
be controlled by the Controller and, after transmission or downloading, the diskettes are
to be re-formatted, to ensure that no residual data remains on a diskette, and returned to
the Controller for safe custody. Standard file deletion procedures or utilities are
not acceptable for this purpose."
15. Only diskettes from the separately maintained pool for use on the DISKFAX are to
be used.
16. Copy or save the file(s) to be transmitted onto an empty disk. Only files for one
recipient should be batched together; where there are files for more than one recipient
either:
17. Create a standard identification file called, for example, "OODETAIL" using a
word processing package, and which must contain the following information:
a. A title;
18. This file in the above format must be created even when only one data file is
being transmitted. The total number of bytes occupied by the files should also be
noted.
19. DISKFAX machines must use dial-up telephone lines in conjunction with a
RESTRICTED
RESTRICTED
Defence Manual of Security
20. The transmission whether successful or not must be recorded in the register.
22. The details of receptions/unloads are to be entered into the register held at the
terminal point.
23. For DISKFAX with Fixed hard Disc. Once a message has been unloaded to a
diskette, it cannot be unloaded a second time. It is essential that immediately a
transmission has been unloaded, the identification file is checked to ensure that the
correct one has been unloaded. If the correct transmission has been unloaded, the
sender should be notified of receipt of the transmission. If, however, a transmission
intended for another recipient has been unloaded, the floppy disk must be passed to the
correct recipient immediately. A different blank disk must then be used to unload the
correct transmission.
24. If an expected transmission cannot be found on the hard disk list, inspect the
unload register to see if a transmission matching the one expected has been unloaded. If
it has, contact the person who unloaded it. If any transmission is "misplaced",
immediately report the facts to the DISKFAX Controller or Deputy Controller.
25. All received material must be virus checked before it is downloaded into the
recipients system.
RESTRICTED
RESTRICTED
Facsimile Security
b. "If you transmit a document or part of a document for which this terminal is
not approved, you must report the fact to the DISKFAX Controller
immediately". The Controller will then take the necessary reporting action.
c. "Do not attempt to hide any violation of transmission security. If the fact is
known, action can be taken to minimize any damage caused".
Date:.......................... .......................................
Signature of DISKFAX Controller
RESTRICTED
JSP 440 Volume 3 Issue 2
RESTRICTED
19D-6
NOTE 1 - The system number is also the "Short-Code" dialling code for the system, ie when the DISKFAX shows
"RECALL:"
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
UNCLASSIFIED
Video Security
VIDEO SECURITY
Chapter Para
20 Video Security
Introduction 2001
Part 2: CCTV
Introduction 2006
Description 2007
Introduction 2011
Multi-Point 2022
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Compliance 2031
UNCLASSIFIED
UNCLASSIFIED
Video Security
CHAPTER 20
VIDEO SECURITY
Introduction
2001. SPI systems. SPI systems allow visual (still image) or audio transmission
between sites, but not simultaneously. SPI systems currently have no network
capability. Use of a modem allows digital information conversion and compression,
thus enabling its use over analogue, cellular or RF links, using bandwidths as low as
l6kbit/s (this does not however prevent its use over ISDN or kilostream/megastream
lines). Storage and printing of these images is achieved via normal PC functions. SPI
systems are telephones that have a camera and screen to permit the transmission of
photographic images when the telephone is not being used for voice. The system also
incorporates the use of standalone PC technology to store and manage photograph files.
The camera can be used to transmit images of either hand-held documents,
equipments, persons or items on a background.
2002. SPI systems are subject to the same COMSEC, TEMPEST and procedural
security considerations as other telephone equipment and should only be used within
the limit of the protective marking for which the equipment and the transmission are
authorised. The limit of protective marking for the transmission is determined by the
location of the transmitting and receiving equipment, the transmission medium and the
accreditation of the. local exchange. Additionally, because PC based storage and
management software is used within the SPI system, each equipment of this kind
requires Security Policy Documentation, as laid down at Chapter 3, which will
normally be a System Security Policy (SSP) and Security Operating Procedures
(SyOPs), similar to those necessary for Secure Fax and DiskFax systems.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
when considering the position of the subject and camera direction. This is especially
the case in open plan offices. A visual warning that SPI equipment is in use may need
to be displayed on the door to an office or close to where the transmission is occurring
in an open plan area.
Sector Control
2005. While experience is being gained with this relatively new technology, all
requirements for the procurement of SPI systems should be approved by the relevant
Principal Security Advisor in consultation with CIDA.
UNCLASSIFIED
UNCLASSIFIED
Video Security
Part 2: CCTV
Introduction
2006. This section covers CCTV where information is processed by cable and not by
video base-band transmission or radio frequency carrier.
Description
2007. CCTV provides a reasonable degree of security provided that the master and the
monitors and all their lines are wholly contained in a secure building. The technical
security risks comprise:
b. TEMPEST.
2008. In many cases one master unit serves a number of monitors in different locations.
When showing protectively marked information the security of all the monitors is to be
taken into account. If the monitors are left permanently in one position the power
supply is to be fitted with an approved security cover secured by approved padlock. The
transmission cable is to be permanently sealed to the TV aerial jack. The CIDA must
approve all such installations.
2009. If monitors are stored elsewhere and are only connected for specific programmes
the security of all transmission cable aerial connectors is to be taken into account. They
are all to be fitted with an approved security cover secured by an approved padlock. (It
is possible to record a programme direct onto a video cassette recorder without using a
TV.)
2010. Video Tapes. These should be stored in a manner appropriate to their protective
marking. (See JSP 440 Vol I Chapter 5 Section 1 Annex A).
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Introduction
2011. Video conferencing systems. Video conferencing allows visual (moving
image) and audio transmission simultaneously between sites, permitting near normal
person to person communications or small meetings to be held between distributed
groups. To allow this duplex operation, it invariably requires one ISDN2 line offering
a minimum bandwidth of l28kbit/s (two channels at 64kbit/s).
2012. Video conferencing allows visual and audio transmission between sites,
permitting near normal person-to-person communications or small meetings to be held
between distributed groups.
2014. All secure video conferencing and cryptographic equipment combinations must
meet the National and Departmental TEMPEST guidelines contained in Chapter 21.
2015. Where NATO classified information is also to be handled, the equipment must
also meet the NATO guidelines contained in MC315.
2016. Where a conflict arises between the assessed national and NATO local threat
levels, the TEMPEST standards appropriate to the higher threat level are applicable.
2017. All items of video conferencing equipment must be compatible with the
standards encompassed within ITU/TSS H.32O. NATO has adopted ITU standards to
facilitate interoperability between nations. There are separate audio transmission
standards mandated for narrowband and wideband systems (bandwidth 2 Mbits/s and
above) in ITU/TSS H.320 recommendations . An operational audio transmission
standard G.728 is also available and is suitable for use with both systems. To provide
interoperability between video conferencing systems, it is recommended that the
operational audio standard G.728 is provided on MOD procured items of video
conferencing equipment.
2018. Secure video conferencing terminals may, if required, use approved recording
equipment.
UNCLASSIFIED
UNCLASSIFIED
Video Security
Installation Policy
2019. Secure video conferencing systems must be installed in accordance with the
TEMPEST regulations.
a. Point-to-Point.
b. Multi-Point.
Point-to-Point
2021. Point-to-point transmissions made between stand alone video conferencing
systems must be protected by a means designed to ensure their security. Video
conferencing systems require the same level of protection of transmission paths as other
communications media, in accordance with current regulations.
Multi-Point
2022. Multi-point Secure Video Conferencing (MPSVC) systems may be required in
various military and government organisations and military locations world-wide. It is
envisaged that MPSVC facilities will be utilised as a common user facility available to
all staff, with the appropriate security clearances, in the pursuance of their duties.
Connectivity of MPSVC systems will be achieved through a multi-point control unit
(MCU) sited at a suitable location in the communications network. The MCU may be
accessed by either dial-up or permanent private wire (PW) connection. Consideration
should be given that as a common user facility, the protective marking of a conference
may vary from UNCLASSIFIED through to TOP SECRET codeword. In this case
transmissions between users must be protected to the highest potential protective
marking to be used, and it may therefore prove more financially expedient to purchase
High Grade (HG) system at the outset rather than identify funds to update later.
2023. System sponsors should alert cryptographic sponsors to their needs as early as
possible because of the long lead times associated with the provisioning of
cryptographic products.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
2024. Funds are not to be committed to equipment procurement until an SSP has been
produced and agreed to the satisfaction of the accreditor as a satisfactory basis upon
which to proceed.
Documentation Requirement
2025. All MPSVC systems handling protectively marked information are to have an
Security Policy Documentation (SPD) in accordance with Chapter 3. The SPD is to be
produced by the system project office or sponsor, to the satisfaction of the accreditor(s),
and will be used as the basis of accreditation of the system by the appropriate the
Principal Security Advisor or the DSSO. Point-to-point systems utilizing bulk
encryption techniques or a secure telephone for security protection need only produce
Terminal Security Operating Instructions. Point-to-point users who join an existing
MPSVC system on an occasional basis must ensure full compliance with the MPSVC
system SPD prior to use.
2026. The SPD set produced must include Security Operating Instructions applicable
to individual terminal installations and approved by the relevant unit/branch security
officer.
h. Obtaining accreditation.
UNCLASSIFIED
UNCLASSIFIED
Video Security
b. RN systems - DCIS(N)
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Compliance
2031. Compliance checks, including routine COMSEC monitoring for transmission
violations, may be carried out against all MOD video systems in accordance with
Chapter 12.
Incident Handling
2032. Any security incidents affecting video systems must be handled in accordance
with the regulations relevant to the installation, and a report raised to the Joint Security
Co-ordination Centre (JSyCC), through the appropriate Monitoring and Reporting
Centre (MRC) where applicable, in accordance with Chapter 11.
UNCLASSIFIED
RESTRICTED
Radiation Security (RadSec)
Introduction 21001
Responsibilities 21004
SECTION 1 – TEMPEST
EMC 21010
Responsibilities 21014
SECTION 2 – ELSEC
Overview 21081
Responsibilities 21092
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
Countermeasures 21111
SECTION 3 – RFSEC
Overview 21127
Responsibilities 21136
Countermeasures 21146
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
CHAPTER 21
Introduction
21001. Radio frequency (RF) waves are forms of Electromagnetic Radiation (EMR),
and their presence in the environment, both as a matter of design in sensor (e.g. radar)
and communications systems, and as a consequence of the fundamental electronic
design of CIS equipments, present potential security issues in terms of Confidentiality,
Integrity and Availability.
a. TEMPEST ;
b. ELSEC ;
c. RFSEC.
21003. The security of data deliberately modulated upon RF signals is covered within
the Communications Security (COMSEC) discipline, typically by the use of
cryptographic systems, as laid down at Chapter 23. A diagram providing a high level
illustration of the inter-relationships with other Information Security disciplines in the
context of RadSec is given at Annex A, with fuller details of the non-technical aspects
of Information Security are given at Chapter 1.
Responsibilities
21004. UK national RadSec policy is the responsibility of the Cabinet Information
Systems Security Policy Committee (SO(IS)): the authority for advising on the
implementation of this policy, including the provision of TEMPEST and ELSEC
standards for the testing of equipment and installations, lies with CESG. CESG liases
closely with the Security Service and other appropriate authorities, which are
responsible for assessing the overall threat and for advising on the need for
countermeasures.
21005. Responsibility for assessing the threat, vulnerability, and hence the risk, and
deciding on the countermeasures for projects/systems, lies with the Departmental
Security Officer (DSO) through the security chain of command.
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
SECTION 1 - TEMPEST
21006. Emissions All electrically-powered equipment is liable to produce unintended
electromagnetic signals. Compromising emanations are unintentional data-related or
intelligence-bearing signals which, if intercepted and analysed, disclose protectively
marked information being transmitted, received, handled, or otherwise processed by
information processing equipment, system or platform.
21008. Equipment used for information processing may emit signals that are
compromising. Such compromising emanations may be propagated through space,
along nearby conductors, and by other unintended transmission channels. The
interceptability, propagation ranges and analysis of these emanations are affected by
a variety of factors, e.g. the functional design of the information processing
equipment, its installation, physical and associated personnel security, as well as the
electromagnetic ambient noise conditions.
EMC
21010. Electromagnetic Compatibility (EMC), which describes the undesirable effects
of mutual interference between devices, addresses many of the same concerns as
TEMPEST, albeit generally to less rigorous standards. The main EMC emission effects
are:
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
21012. A system's ability to withstand such effects is referred to as immunity, and the
effects addressed are:
b. Transients and RFI conducted into the equipment via the mains supply ;
e. Electrostatic discharge.
Responsibilities
21014. Overall responsibility for assessing the TEMPEST threat, vulnerability, and
risk, lies with the MOD TEMPEST Authority, InfoSy(Tech), on the staff of the
Departmental Security Officer (DSO), and is implemented through the security chain of
command.
21015. Responsibility for the selection of countermeasures for individual systems lies
with Project Managers and or System Operating Authorities (SOA), but the individual
threat assessment process is a matter purely for the security authority.
21016. For shared UK/NATO facilities, the TEMPEST authority shall be decided on a
case by case basis by the host nation. For UK national assets that process NATO
information, the authority is CESG or its delegated representative.
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
21019. In addition to the security and project management staffs, a number of roles are
identified within MOD as having specific TEMPEST responsibilities.
21022. Details of the MOD CIDAs and PTCAs are given at Annex B.
21023. Subordinate to the CIDAs are a number of different types of technical staffs, all
of whom have some involvement in ensuring that Installations are properly performed
or maintained:
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
21027. TEMPEST Control Officers (TCO) For deployments away from CIDA
planned or established sites, the UK commander of the deployment is responsible for
configuration control of CIS containing UK national information. This configuration
control is to be effected by TEMPEST Control Officers (TCO) acting with the authority
of the commander. More information on TCOs is given at Annex D.
Risk Assessment
21029. A risk assessment is to be carried out early in the planning stages of a project in
order to minimise any subsequent impact on design and cost caused by TEMPEST
considerations. A similar exercise will need to be conducted when modifications to
existing equipment are proposed.
21030. The risk assessment compromises a review of the generic and local threats and
vulnerabilities, as is common throughout security.
21032. However, TEMPEST attacks are expensive in resources, difficult to mount, and
unpredictable in outcome. They normally require close access to the system being
targeted and are therefore likely to be attempted only where all the following
circumstances are met:
c. An attack is practical (i.e. the attacker can acquire a safe listening post close
enough to the radiating equipment and from which he can operate undetected
over an extended period).
21033. The TEMPEST Threat Assessment (TTA) to MOD facilities and equipment
is provided by the Joint Security Co-ordination Centre (JSyCC) within DDefSy as
part of the Information Security Threat Summary (ISTS) issued to PSyA and Co-
ordinating Installation Design Authorities (CIDA). This is based upon the Annual
Threat Assessment (ATA), prepared by the Security Service and published with the
endorsement of the Official Committee on Security.
JSP 440 Volume 3 Issue 2 21-7
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
21034. The status of Threats, unless specifically catered for in a current ISTS, should
be verified with the JSyCC Intelligence Cell (JSyCC Int) to ensure that the ISTS
threat level for a particular environment is still valid.
21036. Note, however, that where radio transmitters are involved, a TEMPEST
related attack can be mounted far more easily and the need for close proximity no
longer exists.
21037. In all cases where radio transmitters are known or planned to be located in close
proximity to MOD CIS used to store, process or forward Protectively Marked material,
both the appropriate PSyA and the CIDA must be consulted in advance of any
procurement action for such devices, as specific TEMPEST equipments may be
required. As with all RF effects, it is important that the question of proximity of radio
transmitters is considered in a Spherical manner i.e. taking account if all 3 dimensions.
21039. The outcome of the TCA will dictate whether any specific measures need to be
considered before equipment is purchased. Conditions vary widely between
installations and as countermeasures are usually expensive (especially when applied
retrospectively). The TCA may identify the need for a TEMPEST Visual Inspection
(TVI) to be carried out prior to the commissioning of the installation. This will be
carried out by the Sector TEMPEST Authority.
21040. Within the UK mainland, other than in certain parts of Greater London, the
prevailing for TTA many years has remained at Level 6 (Negligible), and this can be
assumed to be the case unless units have been specifically advised otherwise by their
PSyA. For all other locations, a bespoke TCA is to be carried out for each installation
under arrangements made by the PSyA, preferably at the planning stage, but in any case
must be completed before any equipment is procured.
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
21045. The staff responsible for providing specific TCAs are normally the PSyA, but in
the case of Joint Force Deployments both PJHQ J2 and JSyCC Int should be
consulted at the earliest possible juncture for a consolidated TCA.
Tempest Zoning
21046. The term Zoning is used in different contexts within TEMPEST. Within
MOD, the terms Red Zone are used to designate areas where the CIDA accept
compromising emanations may be present, and Black Zone is used for areas where
the CIDA believe no compromising emanations may be present.
Defensive Measures
21048. There are a number of ways in which the risks from TEMPEST attack can be
reduced. In many cases, particularly where the threat is regarded as Level 5 (Low) or
Level 6 (Negligible), prudent siting of equipment and correct installation will provide
sufficient protection.
21049. The MOD minimum standards for TEMPEST countermeasures is laid down at
Annex D. This is derived from CESG Infosec Memorandum No. 16, as interpreted for
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
the MOD environment. All Risk Assessments for TEMPEST requirements within
Defence are to use this standard as a Baseline, and for certain instances where Special
Material (e.g. Intelligence or Operations) is to be processed, Accreditors may require
additional precautions.
21052. Security Policy Documentation (SPD) for the CIS being considered must record
the results of the assessments against both these requirements, and the way in which
these are to be achieved.
21055. Bespoke assessments of the current threat level are to be obtained from
JSyCC Int prior to all UK forces deployments.
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
21060. Within the current UK mainland Threat, the use of equipments meeting both
the civil (89/336/EEC) and military (DEF STAN 59-41 or US equivalent MIL-STD-
461) EMC standards, although not specifically designed to provide countermeasures
to loss of information integrity and availability, should provide adequate
countermeasures.
Tempest Equipment
21061. The requirements for TEMPEST Certified equipments to be used within MOD
will be derived from Annex D. It should be noted that the requirement for such
certification relates not only to the environment but also to be Potential Vulnerability
(PV) of the equipment in question, as more vulnerable equipment types will have a
large Interference Zone (IZ) which may require Certification to prevent side-effects on
other equipments in the vicinity.
21062. Where specific TEMPEST equipments or facilities are required to be built for
MOD purposes, the guidance laid down in CESG Infosec Memorandum No. 16 (IM16)
in respect of TEMPEST Certification requirements is to be followed. This will require
the production of a TEMPEST Control Plan (TCP).
21065. This guidance does not relate to equipment which includes other security
features in addition to TEMPEST protection such as cryptographic equipment, or
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
equipment containing cryptographic devices which may require more stringent methods
of disposal.
21067. In all other case, JSP480 – Codes of Practice for Installation Design should be
followed for all MOD installations, which encapsulates Best Current Practice for
installation and as such minimises the TEMPEST vulnerabilities that could be exploited
by opportunist attackers.
21068. Units should retain British TEMPEST Regulations BTR/01/200, which was
previously used as the minimum standard for installation practice, to cover Legacy
installations until they are replaced with installations implemented in accordance with
either AMSG-719 or JSP480 as appropriate.
21072. In such cases, the guidance laid down in CESG Infosec Memorandum No. 16 in
respect of TEMPEST Qualification requirements is to be followed, which will require
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
the production of a TEMPEST Control Plan (TCP) by the Project Office, working in
conjunction with the PRCA.
Compliance Checking
21074. Where a TCA has given leeway to procure non-TEMPEST certified equipment
subject to a post installation TEMPEST On-Site Test (TOST), the necessary testing is
arranged through the CIDA in conjunction with the PSyA. Some projects may also
identify the need for a TOST where TEMPEST equipments have been used.
21075. Post-test reports are forwarded to the PSyAs who will specify whether any
remedial action is necessary. Further details on such activities are given at Chapter
12.
Incident Handling
21076. Compromises of TEMPEST should be reported, as with all other Information
Security concerns, in line with the requirements of Chapter 11.
Further Advice
21077. The MOD source publication, in addition to this Manual, which details the
basic Installation Design requirements is :
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
SECTION 2 - ELSEC
Electronic Emission Security (ELSEC)
21079. The measures taken to prevent interception and exploitation of those
intentional electromagnetic emissions not produced specifically for communications
purposes are broken down into Electronic Emission Security (ELSEC) and Radio
Frequency Security (RFSEC). Although related disciplines, ELSEC is the subject of
this section, and RFSEC is covered in Section 3.
Overview
21081. The interception of Radio Frequency (RF) transmissions of every type is an
attractive and profitable source of intelligence, in particular because the large theoretical
propagation distances as detailed at Chapter 26 means it can in principle be undertaken
from the safety of home territory; international air space; or the high seas; and from
foreign diplomatic and trade premises, or during other activities, in the United
Kingdom.
21083. The nature of the Threat environment means that the requirements for ELSEC
measures currently necessary are only those required to counter the ELINT
(Electronic Intelligence) element of any SIGINT (Signals Intelligence) gathering
activities by a hostile group or country.
21084. The aim of ELSEC practices is to minimise, as far as possible, the risk of
compromise of emission information that would in itself be protectively marked
CONFIDENTIAL and above, by limiting the opportunities for its interception by any
hostile group or country. Total denial is impracticable in most cases without seriously
impeding the progress of a project through its developmental stages and more so when
operational. Emitters must emit; but the security aim must be to assess the risk and
implications of compromise by interception and then to apply protective measures
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
commensurate with protective marking, the characteristics of the emission, and the local
conditions.
21086. The technical analysis of such emissions can provide data which may also allow
development of similar equipment or systems, but also effective electronic
countermands (ECM). These may involve sophisticated deception and decoy
techniques or jamming. Indeed successful interception and analysis could allow the
development and deployment of countermeasures to coincide with the operational use
of the target signals.
21087. The intercept of only seconds of a complex signal can provide vital information
as to its purpose, modes and technical characteristics. Generally speaking, a high signal
level is necessary for analysis but even low level will alert an interceptor to a signal of
interest and for subsequent attempt at intercept he can then maximise his resources.
Weaknesses or exploitable features, which may not be evident to the developer, may
give hostile analysts an early lead in designing countermeasures.
21088. The system types for which RF emissions will need to be considered for
ELSEC are radars, including those used for:
a. Surveillance ;
b. Target acquisition ;
d. Shell Tracking ;
e. Fuzing Systems.
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
21090. In providing protection for the emissions listed, consideration must also be
given to the security of any communications associated with their testing, servicing
and operation, in accordance with Chapter 23.
Responsibilities
21092. Overall responsibility for assessing the ELSEC threat, vulnerability, and risk,
lies with the MOD ELSEC Authority, InfoSy(Tech), on the staff of the Departmental
Security Officer (DSO), and is implemented through the security chain of command.
21093. Responsibility for the selection of countermeasures for individual systems lies
with Project Managers and or System Operating Authorities (SOA), but the individual
threat assessment process is a matter purely for the security authority.
21094. In addition to the DSO, the National Technical Authority (CESG), and security /
project management staffs, a number of roles are identified within MOD as having
specific ELSEC responsibilities.
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
21098. Project ELSEC Control Officers (PECO). Project Officers should be aware
of the possibility of ELSEC affecting any project for which they are responsible. If
necessary, Project Officers and Establishments should consider appointing a project
ELSEC Control Officer (PECO); one of whose main responsibilities will be
configuration control. Guidance on this topic, documentation and training is available
through META.
21099. Defence Intelligence Staffs (DIS). The DIS is responsible for production of
information relating to the current ELSEC Threat, which is then disseminated through
DDefSy.
Risk Assessment
21100. A risk assessment is to be carried out early in the planning stages of a project in
order to minimise any subsequent impact on design and cost caused by ELSEC
considerations. A similar exercise will need to be conducted when modifications to
existing equipment are proposed.
21101. The risk assessment compromises a review of the asset value, the generic and
local threats, and the vulnerabilities, as is common throughout security.
21102. Information Value The sensitivity of an emission may be gauged from the
classification assigned to the project.
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
21104. However, ELSEC attacks are expensive in resources, difficult to mount, and
unpredictable in outcome. They are therefore likely to be attempted only where all the
following circumstances are met:
21105. The general ELSEC Threat to MOD facilities and equipment is provided by
the Intelligence Cell within the DDefSy Joint Security Co-ordination Centre (JSyCC) as
part of the regular Information Security Threat Summaries (ISTS) which are issued
to defence Principal Security Advisors (PSyA) and to META. This is based upon the
Annual Threat Assessment (ATA) as prepared by the Security Service and published
with the endorsement of the Cabinet Office Committee on Security (SO), with the
ISTS being updated from subsequent information from DIS.
21106. In addition to the ISTS, DIS issues specific warnings by formal signal message
of any short-term changes to the ELINT Threat environment, such as the presence of
known collection platforms (typically AGIs) within UK territorial waters.
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
Countermeasures
21111. The detail and amount of effort required for protection of both intentional and
unintentional emissions of each system are to be assessed by considering the
following key factors :
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
d. Receipt and review of the DIS ELINT warning messages for any short-term
environmental issues.
21114. Enforcement of good OpSec discipline during trials, including ComSec and
TranSec precautions as necessary. This will involve at least :
21115. Careful safeguarding of telemetry records and channel allocations; the latter
being varied as often as practicable during a series of trials.
21116. For higher risk scenarios, additional measures may be required, and META
should be approached for detailed advice.
21118. The ECP is to contain the system specific details of any countermeasures
required, and must be endorsed by META before any tests or trials are commenced.
Compliance Checking
21119. Where a Risk Assessment so indicates, an ELSEC On-Site Test (EOST) may be
required. Further information on the principles for such activities are given at Chapter
12, and within Def Stan 09-3 which gives detailed information relating to acceptable
emission levels and related topics.
21120. The following table provides guidance on the frequency required for EOSTs:
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
21121. Post-test reports are forwarded to the relevant PSyAs who will specify whether
any remedial action is necessary, copied to META and CESG.
Incident Handling
21122. Compromises of ELSEC should be reported, as with all other Information
Security concerns, in line with the requirements of Chapter 11.
21123. It may be thought that once information has been disclosed there is no further
need for its protection, but if a disclosure is complete, accurate and explicit, it would
only free that particular item from the need for continued protection if every
potentially hostile authority noted and appreciated the disclosure and believed it to be
true.
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
SECTION 3 RFSEC
Radio Frequency Security (RFSEC)
21125. The measures taken to prevent interception and exploitation of those
intentional electromagnetic emissions not produced specifically for communications
purposes are broken down into Electronic Emission Security (ELSEC) and Radio
Frequency Security (RFSEC). Although related disciplines, ELSEC is the subject of
Section 2, and RFSEC is covered in this Section.
Overview
21127. The interception of Radio Frequency (RF) transmissions of every type is an
attractive and profitable source of intelligence, in particular because the large theoretical
propagation distances as detailed at Chapter 26 means it can in principle be undertaken
from the safety of home territory; international air space; or the high seas; and from
foreign diplomatic and trade premises, or during other activities, in the United Kingdom.
21128. RF interception can reveal information relating certain aspects of the electronic
techniques employed in the equipment; the extent and preparedness of the country’s
defences, and the capacity of its industrial resources which is otherwise protected by
physical, personal and CIS security measures.
21129. The aim of RFSEC practices is to minimise, as far as possible, the risk of
compromise of emission information that would in itself be protectively marked, by
limiting the opportunities for its interception by any hostile group or country. Total
denial is impracticable in most cases without seriously impeding the progress of a
project through its developmental stages and more so when operational. Emitters must
emit; but the security aim must be to assess the risk and implications of compromise by
interception and then to apply protective measures commensurate with protective
marking, the characteristics of the emission, and the local conditions.
21130. The protective marking associated with information obtainable from interception
of non-communications electronic emissions, is generally considered to be higher in the
early stages of research and development. Although it may not be practicable to
maintain the same degree of security from the beginning of development of equipment
to the in-service date and beyond, continuation of security is essential.
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
21131. The technical analysis of such emissions can provide data which may also allow
development of similar equipment or systems, but also effective electronic countermands
(ECM). These may involve sophisticated deception and decoy techniques or jamming.
Indeed successful interception and analysis could allow the development and
deployment of countermeasures to coincide with the operational use of the target signals.
21132. The intercept of only seconds of a complex signal can provide vital information
as to its purpose, modes and technical characteristics. Whereas a high signal level is
necessary for the type of detailed analysis against which ELSEC countermeasures are
deployed, low signal level can also be beneficial interceptor and may help target a
subsequent attempt at interception with greater resources.
21133. A variety of system types exist for which RF emissions will need to be
considered for RFSEC, including:
a. Radars ;
21135. In providing protection for the emissions listed, consideration must also be
given to the security of any communications associated with their testing, servicing
and operation, in accordance with Chapter 23.
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
Responsibilities
21136. Overall responsibility for assessing the RFSEC threat, vulnerability, and risk, lies
with the MOD RFSEC Authority, InfoSy(Tech), on the staff of the Departmental
Security Officer (DSO), and is implemented through the security chain of command.
21137. Responsibility for the selection of countermeasures for individual systems lies
with Project Managers and/or System Operating Authorities (SOA).
Risk Assessment
21138. A risk assessment is to be carried out early in the planning stages of a project in
order to minimise any subsequent impact on design and cost caused by RFSEC
considerations. A similar exercise will need to be conducted when modifications to
existing equipment are proposed.
21139. The risk assessment compromises a review of the asset value, the generic and
local threats, and the vulnerabilities, as is common throughout security.
21140. Information Value The sensitivity of an emission may be gauged from the
classification assigned to the project.
21141. Threat The simple interception of signals does not require the technically
sophisticated facilities needed for analysis of the types of waveform information
which ELSEC seeks to protect, and thus many potential adversaries, including
terrorist groups, can easily acquire the capability to exploit RFSEC vulnerabilities.
21142. However, RFSEC attacks can be expensive in manpower resources, and are
inherently unpredictable in outcome. They are therefore likely to be attempted only
where the attacker can acquire a position close enough to the radiating equipment and
from which he can operate undetected over an extended period.
21143. The general RFSEC Threat to MOD facilities and equipment is provided by
the Intelligence Cell within the DDefSy Joint Security Co-ordination Centre (JSyCC Int)
as part of the regular Information Security Threat Summaries (ISTS) which are issued
to Principal Security Advisors (PSyA) in MOD. This is based upon the Annual
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
Threat Assessment (ATA) as prepared by the Security Service and published with the
endorsement of the Cabinet Office Committee on Security (SO), with the ISTS being
updated from subsequent information from DIS.
21144. In addition to the ISTS, DIS issues specific warnings by formal signal message
of any short-term changes to the ELINT Threat environment, such as the presence of
known collection platforms (typically AGIs) within UK territorial waters.
Countermeasures
21146. The detail and amount of effort required for protection of both intentional and
unintentional emissions of each system are to be assessed by considering the
following key factors :
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
d. Receipt and review of the DIS ELINT warning messages for any short-term
environmental issues.
21149. Enforcement of good OpSec discipline during trials, including ComSec and
TranSec precautions as necessary. This will involve at least :
21150. Careful safeguarding of telemetry records and channel allocations; the latter
being varied as often as practicable during a series of trials.
21151. For higher risk scenarios, additional measures may be required, and
InfoSy(Tech) should be approached for detailed advice.
Incident Handling
21152. Compromises of RFSEC should be reported, as with all other Information
Security concerns, in line with the requirements of Chapter 11.
21153. It may be thought that once information has been disclosed there is no further
need for its protection, but if a disclosure is complete, accurate and explicit, it would
only free that particular item from the need for continued protection if every
potentially hostile authority noted and appreciated the disclosure and believed it to be
true.
RESTRICTED
UNCLASSIFIED
Radiation Security (Radsec)
ANNEX A TO
CHAPTER 21
RELATIONSHIP OF DISCIPLINES
The following diagram attempts to provide a high level illustration of the inter-
relationships between disciplines in the context of RadSec.
Security
JSP440
Information Operations
Security Security
440 Vol 3 JWPs
InfoSec
(a.k.a “IA”)
TranSec EmSec
Chapter 17 Chapter 26
EMC
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Radiation Security (Radsec)
ANNEX B TO
CHAPTER 21
CO-ORDINATING INSTALLATION DESIGN
AUTHORITY
Initial Points Of Contact
Royal Air Force DCSA DEI DS6 RAF Henlow 7886 HEN
Fax 7687 HEN
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
RESTRICTED
Radiation Security (RadSec)
ANNEX C TO
CHAPTER 21
Equipment and systems used to process information protectively marked CONFIDENTIAL and
above
INSPECTABLE Less than 20 metres 1 Greater than 20 metres but Greater than 100 metres
SPACE Less than 100 Metres
TEMPEST
THREAT
LEVEL
Level 1 Consult your TEMPEST authority
(Very High)
Level 2 AMSG-720 equipments2, AMSG-788 or Military EMC3 AMSG-784 or Military
(High) installed to AMS719 equipments2, installed to EMC3 equipments2,
AMS719 installed to AMS719
Level 3 AMSG-788 or Military AMSG-784 or Military EMC3 Civil EMC equipments,
(Significant) EMC3 equipments2, equipments2, installed to installed to JSP4804
installed to AMS719 AMS719
Note 1 Inspectable Space less than 8 metres, consult both the PSyA and CIDA.
Note 2 Civil EMC for military deployments to new locations for the first month.
Note 3 Military EMC is DEF STAN 59-41 or US equivalent MIL-STD-461
Note 4 All equipment built to AMSG-784 or higher, cryptographic equipments, transmitter equipments
and their associated cabling, and approved or protected circuits transiting MOD site boundaries
shall be installed in accordance with AMSG-719F
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
In all cases, Civil EMC equipment required installed in accordance with JSP 480
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
ANNEX D TO
CHAPTER 21
Accountability
3. The TCO is responsible to the senior UK commander at his location for all
aspects of his task. A Static Site TCO will normally be superseded by the
appointment of a SCIDA (who may be the same person) for installations that
become permanent.
Deployment TCO
4. During a deployment, installation security may be achieved by filtering and
interlinking vehicles, cabins or discrete equipment in an approved manner.
However, deployments are now commonly made by multi-national as ad hoc
HQs, frequently with commercial-of-the-shelf equipment using host-nation
infrastructure.
RESTRICTED
RESTRICTED
Defence Manual of Security
6. The TCO must work closely with the designated Sector TEMPEST Authority
and the CIDA, if applicable. The TCO should be the Force CIS Officer (FCISO).
This individual is to be clearly nominated and given sufficient authority by the
UK force commander to carry out his duties.
Training
7. The TCO must be experienced and trained in general installation and
TEMPEST matters. Additionally, a Deployment TCO is required to provide
TEMPEST advice in a role where he may be isolated from support for extended
periods of time.
8. The TCO should have a basic understanding of both fixed-site and mobile
installation design criteria, TEMPEST phenomena and related electromagnetic
vulnerabilities, cost-effective countermeasures, documentation and support
services, practical problems encountered when applying theoretical principles,
copper and fibre usage, connection and isolation.
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
ANNEX E TO
CHAPTER 21
(1) Introduction.
(2) List of Contents.
(3) Appointments (ie TCO, Deputy TCO, LCOs, SyO etc).
RESTRICTED
RESTRICTED
Radiation Security (RadSec)
Note:
RESTRICTED
RESTRICTED
Protectively Marked CIS Record Card
APPENDIX 1 TO
ANNEX E TO
CHAPTER 21
PROTECTIVELY MARKED CIS RECORD CARD
TCP Reference:
1. User Formation/Unit.
2. Location, Building and Room No(s) containing terminal equipment.
3. CIDA responsible for room containing equipment.
4. Location security authority responsible for room containing equipment.
5. Location engineering authority responsible for room containing equipment.
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Controlled Circuits
CONTROLLED CIRCUITS
Chapter Para Page
22 Controlled Circuits
Definitions 2201
Maintenance 2237
Inspection 2238
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Controlled Circuits
CHAPTER 22
CONTROLLED CIRCUITS
Definitions
2201. A "Controlled Circuit" is any Defence communications link that has been
authorized for the transmission of Official Information.
2202. A Controlled Circuit consists of a land line (either fibre optic or wire), the
associated terminal and any intermediate equipments, and applies to all
communications circuits whether by dedicated point to point links or those forming part
of a network such as a Local Area Network (LAN) of a computer installation.
Approval Of Circuits
2205. All Controlled Circuits must be authorised by a Coordinating Installation
Design Authority (CIDA), or their nominated representative. All data circuits within
an MOD controlled GSE are to be Controlled Circuits.
RESTRICTED
RESTRICTED
Defence Manual of Security
2209. Where a system requires the use of Protected or Approved Circuits, system
sponsors/project officers are to seek approval in principle from both the PSyA(s) and
Accreditors before entering into commitments which depend on Approved Circuits
being available.
2211. In the case of Protected or Approved Circuits, this will include measures so as
to minimise the risk of interception.. Approval procedures are to take into account each
specific component of a circuit, including line, terminal, and intermediate equipment.
2212. Any Circuit whose physical installation is such that interception is made
relatively simple, and/or is difficult to detect, may only carry RESTRICTED and
UNCLASSIFIED information.
2213. Wireless networking technologies, using Radio Frequency (RF) or Infrared (IR)
carriers, are normally only permitted for carriage of UNCLASSIFIED information.
Exceptionally, RESTRICTED information may utilise wireless technologies, but only
in cases where both the PSyA and CIDA have approved the specific implementation.
Approval Procedures
2214. Applications for approval of circuits are to be made by the Installation Design
Authority (IDA), as the technical authority, via the security chain of command. For all
circuits, confirmation is required that the following criteria have been met:
2215. For Protected Circuits, confirmation is also required the area in which the
circuits are contained is able to be adequately supervised by establishment, with
RESTRICTED
RESTRICTED
Controlled Circuits
supporting measures to minimise the risk of tampering which must be approved by the
CIDA.
2218. Circuits which are contained entirely within a building which meets the
physical security requirements of a minimum of 6 points aggregated from the
Guard/IDS/Entry Control sections of the assessment matrix in JSP 440 Volume 1
Chapter 5 and where the possibility of undetected interception is negligible, may carry
information up to and including SECRET without additional physical protection to the
line element. On exit from such buildings, circuits approved for SECRET and below
are to be contained in secure ducting. Where practicable, manhole covers provided to
permit access to the cabling, are to be secured by class 3 security padlocks. The keys to
the padlocks are to be handled as security keys. Where this is not practicable
alternative physical security measures, as advised by the security authority, are to be
taken.
2220. Whilst the above is the minimum standard for physical protection there may be
occasions when it is considered necessary to apply additional measures such as sealing
of conduit/trunking in which circuits are installed to make the detection of intrusion
easier. Where this is contemplated, system security officers/IDAs should seek advice
from the Sector Security Staffs.
2221. Circuits in buildings which do not meet the physical security standards detailed
at para 2218 may be considered for approval for SECRET and below providing
additional safeguards are taken to provide protection to all elements of the circuit
including the line, commensurate with the physical security protection provided by the
building or establishment. The standards of protection will be advised by PSyAs on a
RESTRICTED
RESTRICTED
Defence Manual of Security
case by case basis. Measures taken must also be designed to reveal any signs of
tampering or intrusion.
2223. Where fibre-optic cables are to be installed, the CIDA will request a
performance test of each fibre on initial installation, and the results of such tests should
be archived to allow future comparison if required.
2227. If the requirement is for use with Protectively Marked information, unless
CESG approved encryption is to be used, where the maximum level will be that laid
down in Chapter 23, the maximum permitted level will be RESTRICTED, and this
will be subject to the following additional constraints :
a. The PSyA will need to review the environment, and in particular the
proximity and nature of any neighbours, before deciding whether or not wireless
networking can be permitted ;
RESTRICTED
RESTRICTED
Controlled Circuits
2229. In the exceptional case of the installation of either multi-security level (MSL) or
one-way devices that bridge between protective marking levels, in addition to any
Accreditation requirement accruing from Chapter 6 in respect of the software or
hardware mechanisms implemented to maintain separation, it is also important that for
TEMPEST reasons, as detailed at Chapter 21, Electromagnetic separation is provided
across the interface, which will normally necessitate at least one of the controlled
circuits forming the signal path to be implemented in Fibre-optic cable.
2232. Where fibre-optic cables are not allocated to a specific system, these may
remain unterminated but are to be under the control of the CIDA. A record of each
unterminated fibre is to be notified to the CIDA. Initial allocation of fibres is to be
dictated by CIDA.
2233. Changes to configuration, where fibres are transferred from one system to
another, are to be agreed by both system security officers and co-ordinated by the
CIDA.
2234. All unterminated fibres should be physically inspected and accounted for
annually.
RESTRICTED
RESTRICTED
Defence Manual of Security
Circuits. The SPD should address the physical safeguards to be applied, maintenance
and inspection to ensure the continued integrity of the circuits.
Maintenance
2237. Maintenance of Controlled circuits is only to be carried out by, or under the
direct supervision of technically qualified persons, holding security clearance
commensurate with the protective marking of material for which the circuit has been
approved.
Inspections
2238. Approved circuits are to be inspected by or under the direction of the System
Security Officer appointed under the OSMP. Inspections are to be carried out at
regular intervals as detailed in the OSMP. Inspections should concentrate on areas
where the approved circuit is most vulnerable ie junction boxes, roof and ceiling voids
where the cable route is out of sight. The inspection is intended to reveal whether
attempts have been made to intercept transmissions by the attachment of devices or
unauthorized additional cables. Special attention should be paid to unaccountable
cables diverting from the authorized route. A guide to points to be addressed during
inspections is contained in Annex A; System Security Officers may seek further
guidance from PSyAs.
RESTRICTED
UNCLASSIFIED
Approved Circuits
ANNEX A TO
CHAPTER 22
(h) Small capacitors and/or resistors on terminal blocks which may be used
for high impedance bridging.
(j) Equipment attached to fibre-optic cables along the route of the cables.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
RESTRICTED
Cryptographic Systems
CRYPTOGRAPHIC SYSTEMS
Chapter Para Page
23 Cryptographic Systems
Definitions 2307
Maintenance 2343
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Cryptographic Systems
CHAPTER 23
CRYPTOGRAPHIC SYSTEMS
Purposes of Cryptography
2301. Cryptography is defined as being the art or science concerning the principles,
means and methods for rendering plain text unintelligible, and for converting encrypted
messages into an intelligible form.
2302. This definition basically refers to the use of Encryption / Decryption for
Confidentiality, but it is worth noting that cryptographic techniques are also used for
Authentication (e.g. Digital Signatures) and Integrity (e.g. Cryptographic Checksums
and Message Digests).
2304. Most HMG approved encryption systems currently deployed are based upon
symmetric cryptography, but there are a growing number of asymmetric systems being
developed.
2305. It should be remembered that even when the content of a message is encrypted
and cannot be read, a determined long-term attacker can often gain valuable
information by analysing the flow of information between parties on a communications
network. This can reveal chains of command or links between organisations and their
locations. Increased activity can indicate reactions to an event or interest in a particular
incident. Traffic flow security (TFS) techniques can be applied to link encryption
devices to make it appear that the link is constantly active by making the genuine traffic
indistinguishable.
RESTRICTED
RESTRICTED
Defence Manual of Security
guidance on the use of certain Cryptographic Systems that due to their widespread
deployment are not solely constrained to use by Authorised Cryptographic personnel.
Fuller details regarding cryptographic material, definitions, marking, handling and
Authorization are given in the relevant specialist ComSec publications, details of which
can be obtained by authorised personnel from either the Defence COMSEC Authority
(InfoSy(Tech) within DDefSy) or the Defence COMSEC Operating Authority (IA
branch within DCSA).
Definition
2307. Although full details are given in the relevant specialist ComSec publications,
the following definitions are offered to allow initial discussions to take place.
Grades of Cryptography
2314. Cryptographic systems and equipment are graded according to the level of
protection they provide. The grade of cryptography available will be a major factor in
the selection and approval for a particular purpose. The grades of cryptography
authorised for use in MOD are:
RESTRICTED
RESTRICTED
Cryptographic Systems
2316. MOD policy differs from the guidance given in the Government Manual of
Protective Security (MPS) and CESG Handbook on Cryptographic Security
(BID/01/1) in that :
RESTRICTED
RESTRICTED
Defence Manual of Security
and the requirements above may be varied on a case by case basis provided
that the Defence ComSec Operating Authority can be satisfied that the
information in question is genuinely ephemeral within the sense of this
manual ;
2317. System sponsors are to provide Defence ComSec Operating Authority with
details of their intended secure communications link/network during initial planning
stages. This should include information on the community of interest/size of network,
location of terminals, protective marking of information to be passed and whether any
special categories of information are to be handled.
2318. For situations requiring either HG and EG cryptography, Traffic Flow Security
(TFS) techniques will normally be required, and any decision not to implement such an
approach must be agreed with the Defence ComSec Operating Authority. Where
requirements are identified to use cryptographic equipments in a manner for which they
are not explicitly approved (e.g. encrypting LOW across HIGH), specific sanction must
be sought from the both the Defence ComSec Operating Authority and InfoSty(Tech).
2319. All approved cryptosystem are to be operated in accordance with the relevant
Handling Instructions, which will be either in the form of a British Interdepartmental
Document (BID), normally for HG systems, or a Defence Information Assurance
Notice (DIAN), normally for EG and BG systems. It should be noted that completion
of the CAPS approval process for EG and BG systems does not mean that either KV
generation procedures or Handling Instructions will have been completed, and it is the
responsibility of the Defence Infosec Product Co-ordination Group (DIPCOG), chaired
by InfoSy(Tech) with representation from both the Defence ComSec Operating
Authority and CESG to ensure that these steps have been completed before issuing a
DIAN which will allow the use of such products in defence.
2321. PKC equipments not requiring the use of any supporting PKI (e.g BID/2010
BRENT) may be used in Defence in accordance with the operating instructions detailed
in the appropriate national and/or departmental publications.
2322. Any requirement for the use of PKI with Defence should be referred to both the
MOD PKI Management Authority for advice, and must be endorsed by both the
Defence ComSec Operating Authority and the Accreditator(s) before procurement
action is initiated.
RESTRICTED
RESTRICTED
Cryptographic Systems
Operational Exigencies
2323. In extreme circumstances, an Operational Commander of not less than 2*
rank may determine that there are operational imperatives for Enhanced Grade (EG)
encryption to be used for the protection of “short term SECRET” information,
accepting the consequential security risks. These circumstances should only be for a
limited time period, for example, the duration of a specific operational mission, must
be notified in writing to the Defence ComSec Operating Authority, and must only be
in respect of a Communications or IT systems or Networks wholly within the
Commander's jurisdiction. These circumstances will therefore not be permitted in a
networked environment where a Commander's decision could lead to a propagation of
unacceptable risk(s) to the rest of the community, or where third party controlled or
released information is stored or processed on the system(s).
2324. When considering the use of Enhanced Grade (EG) encryption for the
protection of short term SECRET information, if any of the following considerations
apply then the use of High Grade (HG) encryption will continue to be required:
c. Situations where the local Threat is greater than Level 4 (Moderate) and
TEMPEST or tamper protection is an issue.
Approval Procedures
2325. When it has been determined that encryption is necessary the Defence ComSec
Operating Authority will identify the most appropriate equipment for the purpose and
give approval for the requirement. Any approval will be restricted to a particular area
of operations, will limit the type of information to be passed and will only be on a case
by case basis. Approval for use of cryptographic equipment will not be delegated to any
other organisation.
RESTRICTED
RESTRICTED
Defence Manual of Security
Handling Requirements
2331. Cryptomaterial bearing the CRYPTO marking, referred to as CRYPTO Items,
require special handling and whole-life accounting procedures, and detailed guidance
on the measures for CRYPTO Items is contained in BID/01/1.
2332. Other items of cryptomaterial which do not warrant CRYPTO marked handling
and whole-life accounting procedures may attract specific requirements, either
generically as in the case of US sources Crypto Controlled Items (CCI) or on a case-by-
case basis as laid down in the relevant BID or DIAN.
RESTRICTED
RESTRICTED
Cryptographic Systems
item bearing the CRYPTO marking must, of course, be moved through CRYPTO
channels.
2335. All HG and EG cryptography authorised for use within HMG can be considered
to constitute “strong” encryption in export control terms, and will thus generally require
an export licence in addition to CESG release procedures. BG cryptography based on
CESG algorithms will attract similar constraints, but BG cryptography based on PD
algorithms may well have a more flexible export posture, which is a major reason for
the defence preference for unencumbered PD solutions at the BG level. The Defence
ComSec Operating Authority should therefore be consulted before making any plans to
move cryptographic systems from the UK or permanent overseas locations, having first
reviewed the relevant BID or DIAN.
RESTRICTED
RESTRICTED
Defence Manual of Security
Secure Containers
2340. Where cryptographic equipment is installed in a secure container, the container
is to be firmly fixed to the fabric of the structure.
2341. Secure containers are not to be drilled or cut for access except through the
panels provided for this purpose. The drilling of holes in any other part of a container
renders it insecure and no longer approved for secure storage. (JSP 440 Volume 1
refers).
Installation Standards
2342. Cryptographic equipment and associated terminal equipment is to be installed
in accordance with TEMPEST regulations as detailed at Chapter 21.
Maintenance
2343. Maintenance of cryptographic equipment is only to be carried out by, or under
the supervision of formally trained and cleared personnel.
Control by IDA/CIDA
2344. Installation Design Authorities (IDA) are to ensure that the design of any
communications system to process protectively marked information is to meet the
physical and COMSEC requirements of this document. A Co-ordinating Installation
Design Authority(CIDA) is appointed for each MOD building or establishment, who is
responsible for ensuring there is no conflict between individual systems processing
protectively marked information. IDAs are responsible for advising and where
necessary seeking approval from the appropriate CIDA before work is undertaken to
provide secure communications installations.
Cryptographic Spaces
2346. Where on-line cryptographic equipment and/or cryptographic material are not
stored in lockable security containers, the areas containg these items are to be
designated as cryptographic spaces, and access is to be restricted to personnel
authorised by the CO/HOE. A list of authorised personnel is to be maintained, and
visitors to cryptographic spaces are required to sign a register and give their reason for
visiting. When they are in use, to ensure that they are not to be overlooked by
unauthorised personnel, unmanned cryptographic spaces are to be secured by an
approved security lock (see JSP 440 Volume 1 Chapter 5 Section 1 Annex E).
Portable material such as keys, tapes and fill devices are to be locked away.
RESTRICTED
RESTRICTED
Cryptographic Systems
Compliance Checking
2347. The Defence ComSec Operating Authority is responsible for the enforcement of
the policy laid down in this Chapter, specialist ComSec regulations relevant to the
installation, and the BID(s) and DIAN(s) relevant to the cryptosystem, in accordance
with Chapter 12.
2348. Additionally, where Baseline Grade (BG) cryptography is being used to provide
desktop to desktop encryption between end user computer systems, the Accreditor may
require that encryption keys be lodged at any MOD controlled Secure Managed
Interface (SMI), as defined at Chapter 15, that is transitted to facilitate checks for
Malicious Software (Chapter 7) and Transmission Violations (Chapter 11).
Incident Handling
2349. The main threat to any cryptographic system is the possibility of the physical
compromise of its keying material. The strictest possible control must be exercised
over cryptographic material from the time of its production to its destruction.
2350. The loss of a cryptographic equipment, cipher, code, or any protectively marked
associated document or the loss of any document which may prejudice the use of a
cryptographic system constitutes compromise of the system.
Authentication by Cryptography
2352. Where Cryptographic Authentication is required, formally approved Digital
Signature mechanisms should be used, details of which can be obtained from
InfoSy(Tech). It should be noted that where cryptography is being used for
Encryption / Decryption purposes to maintain Confidentiality, this cannot be assumed
to automatically provide Cryptographic Authentication.
Integrity By Cryptography
2353. Where Cryptographic Integrity Checks are required, formally Cryptographic
Integrity mechanisms (e.g. Cryptographic Checksums and Message Digests) should be
used, details of which can be obtained from InfoSy(Tech) It should be noted that
where cryptography is being used for Encryption / Decryption purposes to maintain
Confidentiality, this cannot be assumed to automatically provide Cryptographic
Integrity.
RESTRICTED
RESTRICTED
Defence Manual of Security
Interoperable Cryptography
2354. Most cryptographic systems in official defence use at present are those
designed and built for UK government purposes, and their interoperability options,
where applicable, are based on this model. A limited number of online cryptographic
equipments of either UK or Allied origin can be configured to allow their
interoperation with external entities, typically defence Allies, and it is important that
any such interoperability requirement is identified to the Defence ComSec Operating
Authority as early as possible in the procurement cycle.
2356. Most early implementations of such technologies (e.g. PGP for HMG) rely on
asynchronous communications techniques, and their interoperation can therefore be
configured retrospectively if so required without a consequential risk of data loss.
RESTRICTED
RESTRICTED
Cryptographic Systems
ANNEX A TO
CHAPTER 23
2. This Annex does not affect the restrictions and regulations for the movement of
any other form of cryptomaterial or equipment.
RESTRICTED
RESTRICTED
Defence Manual of Security
a. KILGETTY
b. SAFEDIAL
All Products
Additional Restrictions
Kilgetty
Permitted - NATO, EU, Australia, New Zealand, Sweden
Safedial
Permitted - World wide
RESTRICTED
RESTRICTED
Cryptographic Systems
Prior to Travel
6. Notwithstanding the MOD list of approved destinations, personnel travelling
overseas with encryption protected systems remain responsible for ensuring that they
have the appropriate clearances for using such equipment in their destination country.
This provision particularly applies when travelling to foreign military establishments,
regardless of country, which may have additional regulations concerning the use of
such equipment within them. The overseas point of contact or sponsor for a visit
should be the focus for such enquiries.
Points of Contact
8. Further advice regarding these instructions can be obtained from:
InfoSy(Tech)ComSec (Tel: (9)621x80124)
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Cryptographic Systems
ANNEX B TO
CHAPTER 23
Physical Security
2. The overall physical security requirement for the equipment will be governed
by the maximum protective marking of material to be protected by the cryptographic
equipment in question, in accordance with Volume 1. In addition, due to the valuable
and sensitive nature of these equipments :
a. Any container used to protect the equipments should be secured to rigid part
of the building structure ;
RadSec
3. The installation requirements will be determined by the highest protective
marking of material to be protected by the cryptographic equipment in question:
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
UNCLASSIFIED
Cryptographic Systems
ANNEX C TO
CHAPTER 23
Requirement
3. There is a growing requirement for use of BG Public Domain (PD)
cryptography to allow protected information exchange with wide range of external
partners, who would not have been eligible for the release of cryptographic systems
based upon CESG algorithms.
Profile
5. Any implementation of IPSec for MOD must :
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Dissemination
6. This Annex is an UNCLASSIFIED document that may be released to interested
vendors, provided that such a release is made under the clear understanding that the
rd
contents are for Official Use Only, and may not be further released to 3 parties
without consent of the originator in MOD.
UNCLASSIFIED
UNCLASSIFIED
Cryptographic Systems
ANNEX D TO
CHAPTER 23
2. This requirement is based upon CESG Infosec Manual T, as interpreted for the
military environment. This document refer only to publicly available implementations
of TLS and the products that use them. This pragmatic approach to this particular class
of products does not imply similar concessions for any other cryptographic
products. The UK Government’s continued position is to evaluate as thoroughly as
possible cryptographic mechanisms used to secure protectively marked data. In
particular, inclusion in this document of a cryptographic algorithm, method or protocol
does not imply CESG recommendation unless explicitly stated.
3. TLS can only be one component in securing a distributed system: the protocol
does not protect the integrity or the confidentiality of any data stored on servers, or
being processed within a client domain. It provides no protection against vulnerabilities
present in the end systems or in the management of those systems. Other measures
designed to assure overall system security may in some circumstances reduce or
eliminate the requirement for TLS. It should also be noted that the advertised presence
of TLS might mislead users into believing that better system security is present than in
fact exists.
Background
4. The Transport Layer Security protocol has been devised by the Internet
Engineering Task Force (IETF) as a non-proprietary development of the popular
Secure Sockets Layer (SSL) protocol developed by Netscape Communications
Corporation. For many purposes, TLS can be thought of as equivalent to SSL v3.1.
TLS v1.0 was released in 1998.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
SMTP (Simple Mail Transfer Protocol), NNTP (Network News Transfer Protocol),
LDAP (Lightweight Directory Access Protocol) and POP3 (Post Office Protocol).
8. TLS enables client and server to secure a TCP connection by encrypting all
traffic between client and server. The protocol does not provide confidentiality or
integrity for data stored on the server, or when it is processed within the client
domain.
c. In addition, TLS allows sessions which are not encrypted but which
are authenticated and protected against tampering. This is useful in countries
where encryption is forbidden by law, but data integrity is still desired ;
10. TLS / SSL is the only encryption protocol that is present by default in the
majority of desktop environments.
Limitations
12. TLS only provides protection only between TCP end points and other
UNCLASSIFIED
UNCLASSIFIED
Cryptographic Systems
Configuration
13. TLS is not a single product, but a protocol that is implemented, to varying
standards and degrees of correctness, in several commercial products. Given that
most problems in a given system are due to the implementation and that it will not be
feasible to evaluate commercial implementations, CESG have taken a pragmatic
view as to the configuration offering the best security for protectively marked data.
14. The RFC for the TLS protocol is constantly under review and the number of
available ciphersuites is expanding. In particular, it is likely that the TLS standard
will be updated in the near future to include one or more ciphersuites specifying the
recently selected AES algorithm. It is therefore likely that situations will arise in the
near future that are not covered by this document. Users who believe that such a
situation applies to their project should contact InfoSy(Tech) for the latest
recommendations.
15. Provided the requirement for encryption is no more than HMG Baseline
Grade (BG), the way in which TLS can be used to provide confidentiality and
authentication services is in the following configuration:
c. For signature algorithms, the modulus must be 1024 bits with a 160
bit parameter;
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Dissemination
16. This Annex is an UNCLASSIFIED document that may be released to interested
vendors, provided that such a release is made under the clear understanding that the
rd
contents are for Official Use Only, and may not be further released to 3 parties
without consent of the originator in MOD.
UNCLASSIFIED
RESTRICTED
Messaging Security
MESSAGING SECURITY
Chapter Para Page
24 Messaging Security
Descriptors 2413
NO PLAY 2414
References 2417
Disclaimers 2428
RESTRICTED
RESTRICTED
RESTRICTED
RESTRICTED
Messaging Security
CHAPTER 24
MESSAGING SECURITY
Introduction
2401. An interorganisational ("formal") message is an Official message subject to
formal release and commitment, that is legally binding under Engliish Law and Military
Law, and is accountable. A Message Transfer Service (MTS) takes full responsibility
for a formal message from its point of submission the point at which the recipient(s)
accept staff procedural responsibility.
2402. Description of the Service. Formal signal messages are carried over the
worldwide Defence Communications Network (DCN) which extends through gateways
to diplomatic, NATO, allied and old Commonwealth nations. The formal message
service is provided specifically to support the rapid transmission of operational
command, control, logistic and administrative orders and reports, etc. required to meet
the needs of Defence and the Diplomatic Service.
2403. Formal signal messages are sent under the authority of the unit or organisation
and are authorised by a releasing officer - they are inter-organisational rather than
interpersonal. Unlike other electronic means, formal messaging offers unique
standards of service which support delivery within set time limits according to
precedence and guarantee integrity and confidentiality according to protective marking,
caveat, descriptor and any special handling instructions. These standards are defined in
the UK supplement to Allied Communications Publication (ACP) 127 and associated
ACPs.
2404. The use of electronic mail services, such as the ITU-T X.400 standard, for
Interorganisational Messaging is not widely support at present, and these regulations
therefore are limited to the Signal systems. Some generic guidance on electronic mail
is given under Interpersonal Messaging Security later in this chapter.
2405. Message Writing and Handling. Instructions for the staff in writing and
handling formal signal messages are contained in JSP 101 and single-Service
publications. Messages are delivered and distributed via Communication Centres
(COMMCEN). The delivery and distribution service may be manual, automated or
semi-automated. Messages are submitted to COMMCEN either in paper form - F Sigs
266 and 266A (text continuation sheet), or electronically through an approved formal
message application. Other objects (such as disk) or forms may be used provided they
meet the subject field requirements described in JSP 101 and are authorised by the OIC
COMMCEN. In most large HQ, delivery and distribution is achieved through a
Receipt and Delivery Centre (RDC) or a Registry.
2406. Protective Markings, Caveats and Special Handling Instructions. The vast
majority of the DCN is approved for the transmission of protective markings up to and
including SECRET. TOP SECRET messages and messages requiring the use of a
caveat and/or a special handling instruction, are to be addressed to the Special Handling
Cell in the COMMCEN. Details of how these messages are handled and delivered are
contained in ACP 122 UK Supp-l(A) - TOP SECRET and Special Handling Messages.
2407. Special Handling (SPH). TOP SECRET formal messages and those given a
caveat and/or a special handling instruction are normally processed separately from
non-SPH messages, in call cases by suitably vetted and indoctrinated staff. The
channels used for such traffic are specially approved, and will support either greater
authentication at each end or off-line encryption. STRAP and other Special
Compartmented traffic is carried over entirely separate channels which are not
described here. Most, but not all, major COMMCENs have the resources to process
special handling messages. Staff should check details of the provision of special
handling services with the local COMMCEN or CIS staff.
Protective Markings
2408. Categories. Messages are given a protective marking appropriate to the
contents and circumstances in which the message is sent as either: 'TOP SECRET',
'SECRET', 'CONFIDENTIAL' or 'RESTRICTED'. Messages relating to certain
subjects must always be given a protective marking; details at Annex A (reproduced
from Annex D, Chapter 16 of JSP 101).
2409. Message Form. The protective marking is entered in the box or field provided
and on every page of the message. If the message does not warrant a protective
marking the word 'UNCLAS' is to be entered to indicate that security considerations
have not been overlooked. Messages marked with a protective marking are handled in
the same way as other protectively marked documents. COMMCEN are not permitted
to accept messages which are not marked with a protective marking, or with 'UNCLAS'
or 'CLEAR' (see paragraph 2410).
RESTRICTED
RESTRICTED
Messaging Security
2411. Prefixes. Current DCN gateways into other networks only support the IDO
approved prefixes 'WEU' and 'NATO'. The use of any other prefix will cause the
message switch or gateway to reject the message. Staff should also note that the words
'Classification', 'Classified' and 'Unclassified' remain valid international terms. (Only
the UK has changed to calling classifications protective markings.)
Descriptors
2413. Descriptors are used by UK Defence to indicate the sensitivity of material and
the need to limit access. (They are not recognised by the international community.)
Where a descriptor or descriptors are required (no more than two should be applied in
the same message) they are written as the first words of the text followed immediately
by a full stop. They are also entered at the top and bottom of the message form in the
box marked 'Descriptor/Special Handling Caveat'. Example (start of text):
No Play
2414. During exercises, the need to differentiate between exercise play and real
activity, eg a real emergency of some kind, is accommodated through the use of the
proword 'NO PLAY'. This is inserted as the first and last words of text, and in the
Message Instructions box. 'NO PLAY' messages are subject to the same threat from
intercept as all other message traffic; they must bear an appropriate protective marking.
If insecure communications are used, the exploitable text of formal and informal signal
messages must be encoded unless the time delay involved is likely to endanger human
life. The international proword 'NODUF' (No Direction Finding) may be used by allied
formations, but is not used in UK joint message procedures.
Releasing Officer
2415. Formal signal messages are unique in requiring the authority of a releasing
officer who authorizes a message for and on behalf of the organisation which he or she
represents. (The responsibilities of the releasing officer are described fully in JSP 101.)
For convenience, the grades of officers required to release messages of each protective
marking are given here.
2416. Requirements for exceptions to the above should be referred to both the
Principal Security Advisor (PSyA) responsible for the unit or formation involved, and
to DCSA Messaging at Corsham.
References
2417. Unique Reference. The combination of Date Time Group and Subject
Indicator Code (SIC) is used as the originator's unique reference in formal signal
messages, eg 'YOUR BDZ 121315Z JAN 98' and 'MODUK NAVY LGN 151624Z
FEB 98'.
2418. Messages which refer to the text of messages or documents bearing a protective
marking of CONFIDENTIAL or above should normally be given a protective marking
of RESTRICTED or higher.
RESTRICTED
RESTRICTED
Messaging Security
Informal Messaging
2424. Description of the Service. Electronic mail ("e-mail") services, such as the
ITU-T X.400 standard, or the Internet Engineering Taks Force (IETF) Simple Message
Transport Protocol (SMTP) as laid down in RFC822, have been designed to provide
informal "interpersonal" messaging services (IPMS).
2426. It should be noted that although there are several de facto commercial means of
providing Confidentiality of e-mail by encryption, such as PGP and S/MIME, they are
not approved for use with Protectively Marked information unless both a CESG
Assisted Product Scheme (CAPS) approval and the associated Defence Information
Assurance Notice (DIAN) has been issued.
RESTRICTED
RESTRICTED
Messaging Security
Disclaimers
2428. As e-mail is not a formally recognised form of interorganisational messaging, it
is generally recommended that the following style of "disclaimer" is added below the
signature block to highlight the lack of a formal Release Officer function when sending
messages without an organization :
<Name>
<Post Title>
Ministry of Defence
mailto:<e-mail address>
tel:<telno>
fax:<telno>
--
The information contained in this e-mail and any subsequent correspondence is
confidential and is intended solely for the recipient, for those other than the
recipient any disclosure, copying, distribution, taken or omitted to be taken in
reliance on such information is prohibited and may be unlawful.
2429. If, while linked to a public data network, the auto response is set so that the
message transfer service (MTS) generates a receipt for in coming e-mail, the following
text should be used:
"The recipient acknowledges that the MOD is unable to exercise control over
the content of information contained in transmissions made via the Internet.
The MOD hereby excludes any warranty as to the quality or accuracy of any
information contained in this message and any liability of any kind for the
information contained in it, or for its transmission, reception, storage or use in
any way whatsoever."
sanction process must involve both the explicit authorisation by the user to send the
item to the Internet, and the removal of any indication (e.g. the plain text work
UNCLASSIFED in the header) that the message may have come from anything other
than an UNCLASSIFED source.
RESTRICTED
RESTRICTED
Messaging Security
ANNEX A TO
CHAPTER 24
(2) Are more than 14 days ahead; nevertheless, the CinC, flag
officer or senior officer concerned has discretion to advance or postpone
the date of the downgrading provided that, in the former case, clearance,
where required, has been obtained and local civil authorities have been
informed.
(3) Are less than 14 days ahead but, in the case of Commonwealth
or foreign countries, clearance is still awaited, or, in the case of courtesy
visits to British non-naval ports, the local civil authorities have still to
be informed.
c. Exercise and training programmes and details of ships and unite taking
part in a particular exercise except when such information has been specifically
declassified.
d. Sailing signals for HM ships and for Royal Fleet Auxiliaries (RFAs)
operating with the fleet.
RESTRICTED
RESTRICTED
Defence Manual of Security
3. Intelligence.
d. Military information.
4. Scientific.
5. Technical.
6. Communications.
d. Electronic warfare.
7. Personnel.
a. Movements of ships and other matters which might affect the morale of
the fleet.
RESTRICTED
RESTRICTED
Messaging Security
d. Outbreaks of epidemics.
8. Logistics. Logistics requirements and fuel state messages from frigates and
above and replenishment at sea (RAS) RFAs are always to be protectively marked.
Such messages from non HAS RFAs and ships below frigates are to be protectively
marked on their merit.
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
UNCLASSIFIED
Messaging Security
ANNEX B TO
CHAPTER 24
3. Sponsors of AIGs who wish to include an addressee for whom delivery can only be
achieved by facsimile in an AIG, are required to contact their command HQ CIS branch
for them to nominate a COMMCEN (equipped with facsimile) to be responsible for
onward delivery to the addressee. Having obtained command HQ CIS branch authority
in this way, sponsors shall inform CDCN and DCPB so that details may be entered into
routing data bases and publications.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Facsimile Security
4. The security rules governing the use of facsimile equipment are shown at Chapter
18. Violations are also to be reported in accordance with the instructions contained in
Chapter 4 to ACP 121 UK SUPP-1(A).
Precedence
Receipts
6. It shall be possible to conduct a full audit trail for all signal messages transmitted by
facsimile.
b. The onus is on the sending station to ensure that a receipt is obtained for
every message.
UNCLASSIFIED
UNCLASSIFIED
Security in Wide Area (Bearer) Networks
Introduction 2501
Principle 2505
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
Security in Wide Area (Bearer) Networks
CHAPTER 25
Introduction
2501. This Chapter deals with the security requirements for the carriage of official
information across wide area (bearer) networks, where a wide area or bearer network is
defined as one that crosses the perimeter of a MOD Global Security Environment
(GSE).
2503. Most MOD-provided wide area bearer network services are furnished by the
Defence Communications Services Agency (DCSA), and the security requirements and
restrictions on the use of their services are laid down in the Code of Connection (CoCo)
for the affected service(s). Details of DCSA CoCos can be obtained from DCSA
Infosec on Corsham military extension 3073.
2504. If other instances are encountered where MOD is to provide its own wide-area
communications bearers, the same general principles should normally be applied unless
agreement is obtained from either the TLB or Trading Fund Principal Security Advisor
(PSyA) concerned, or the DSSO, with regard to designation of such bearers as
Controlled, Protected or Approved Circuits in accordance with Chapter 22.
Principle
2505. The starting assumption for the use of any publicly provided, or encrypted
MOD provided, wide area bearer circuit is that it should not be used to carry any
unencrypted (RED) official information protectively marked RESTRICTED or above
unless there is specific guidance given in this Chapter.
2506. In no cases should any such circuits be used for the unencrypted transmission
of information of information protectively marked CONFIDENTIAL and above
without the approval of either the PSyA concerned or the DSSO.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
2510. The revised Threat Assessment for RESTRICTED has indicated that there is
no longer a general requirement for encryption for Traffic Confidentiality purposes
within the UK mainland, but due to different threat criteria, this excludes Northern
Ireland, will still requires encryption of RESTRICTED information. This Policy does
not cover use of public packet-switched data networks (e.g. “Internet”), and specific
policy for this is contained both later in this Chapter, and at Chapter 10.
System Considerations
2512. The level of protection of the communications is considered as part of the
system risk assessment, which is to be carried out in accordance with the National
Minimum Standards, on which technical elements of the Accreditation plan will be
based. The following sections consider generic issues for both dial-up and permanent
circuits.
2513. In particular, Accreditors are concerned over the risk of a static password,
irrespective of its strength, being carried en clair across a public network, as
compromise of the password can subvert the Confidentiality, Integrity and Availability
of the whole system, rather than the just the Confidentiality of the subset of data
carried across a compromised link.
UNCLASSIFIED
UNCLASSIFIED
Security in Wide Area (Bearer) Networks
2516. In all cases where "dial in" connections are to be provided to IT systems
handling other than purely UNCLASSIFIED data, these should have "dial back"
functionality of at least the following set of features, to reduce the residual risk from
the insecure bearer connection to be dealt with by the attached IT system
b. The dial-back unit must only generate the return dial-back number from
its own tables:
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
(ii) Additional data supplied by the caller or the PTO (e.g. calling
line identifier (CLI) / caller display system (CDS) should not be relied
upon as part of the generation ;
(iii) The dial-back number should not be a line which has call
redirection services available to preclude unauthorised / unnotified
mis-diversions ;
(c) Measures be provided to ensure that a new path through the public
network is provided for the dialled-back call to preclude line seizure
(i) If the same PSTN circuit is to be used for both incoming and
outgoing calls, the dial back unit must being capable of "force
disconnecting" the incoming call. For normal, 2 wire, PSTN circuits
this can be achieved by changing the line impedance appropriately for
greater than the 30 seconds "debounce" window to ensure a full "call
clear" by the exchange line card circuits ;
(ii) If separate PSTN circuits are used for both the incoming and
returned calls, or for ISDN circuits where the out of band signalling
manages the call, no additional measures will be required for this
aspect.
2517. The details of the dial-back system should be included within the System or
Network Security Policy, and its use must be reinforced by Security Operating
Procedures (SyOPs).
2518. In cases where the dial-back modem is integrated with the system's
Identification and Authentication mechanisms, then its functionality and assurance
should be calculated in accordance with National Minimum Standards, including the
systems considerations for passwords en clair, and included within the Security Policy
Documentation (SPD) for agreement with the Accreditor.
2519. For ISDN2e dial-up circuits, care must be taken to ensure that the signalling (D)
channel is not configured for user data, as this can provide and “always on” connection
without any indication to the end user.
UNCLASSIFIED
UNCLASSIFIED
Security in Wide Area (Bearer) Networks
Chapter 22. The following criteria must be met for RED (unencrypted) Protected
Circuits, and in any other case Baseline Grade (BG) encryption will be required :
2522. The following technologies have been granted specific approvals by the UK
Infosec National Technical Authority, CESG :
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
plc (BT) may be used for the carriage of information protectively marked
RESTRICTED and below.
2523. Where additional technologies are identified for which no specific statements
are made in this Chapter, InfoSy(Tech) should be approached though the PSyA or
DSSO as appropriate for guidance before any procurement action is initiated. Frame
Relay and ATM technologies have already been so identified, and detailed guidance
will follow in due course.
Documentation Requirement
2524. In all cases, the use, or lack of use, of encryption for RESTRICTED circuits
transiting the secure boundary of the site(s) must be clearly identified in SPD along
with the grounds for the decision within the context of this guidance.
2525. In cases where encryption is required under these rules, please contact the
Defence ComSec Operating Authority at DCSA.
2526. It should be remembered that this is intended as generic guidance only, and, as
with all installations, the Security staffs and Installation Design Authorities (IDAs)
may need to vary the requirements to meet the particular scenario for each system.
UNCLASSIFIED
UNCLASSIFIED
Security in Wide Area (Bearer) Networks
2529. When selecting a VPN, the above constraints must be considered and reflected
in the Security Policy Documentation (SPD) of the CIS(s) being implemented.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
RESTRICTED
Radio Frequency (RF) Devices
Introduction 2601
RADHAZ 2605
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Radio Frequency (RF) Devices
CHAPTER 26
RESTRICTED
RESTRICTED
Defence Manual of Security
EMSEC / EMCON
2604. MOD is concerned with security of deliberate emissions, such as those from
Radio, Radar and Telemetry systems. The technical security measures taken to
prevent information being available to unauthorised personnel from electronic
emanations of communications equipments is referred to as Emission Security
(EMSEC), and it, along with the related topic of Emission Control (EMCON), which
is used in an operational environment to counter Direction Finding (DF) is covered in
Service communications and OpSec publications.
RADHAZ
2605. In addition to security concerns about the operation of RF devices on MOD
sistes or platforms, or by MOD personnel, the issue of Radiation Hazard (RadHaz)
should also be considered, which is covered in Service communications and OpSec
publications.
Voice Procedure
2606. The use of incorrect procedure, lack of thought before speaking, and individual
mannerisms on voice radio nets combine to create a major source of insecurity.
2607. It is essential that all those who use voice radio are well trained in correct voice
procedure and thoroughly practised in its use. Although the availability of speech
security equipments on voice nets is becoming more common, the requirement for
knowledge of correct procedures and the need for a high degree of net discipline still
remains.
RESTRICTED
RESTRICTED
Radio Frequency (RF) Devices
2610. Additionally, the CO/HOE should ensure their staff are aware of the need to be
vigilant for RF transmitters being installed proximate to the site boundaries, and for the
CIDA to be informed should such equipments be installed.
2612. At present not PMR or mobile radio data systems are approved for the
transmission of any Protectively Marked information, and all terminal equipments are
to be controlled in a manner analagous to mobile phones whilst on MOD sites, which
will typically involve their being completely powered of to disable any “always on”
components.
Portable Transmitters
2613. Secure communications and IT installations are designed to take into account
any RF transmitters in the immediate locality. Whilst it is relatively simple to
compensate for fixed transmitters, portable devices could compromise any unencrypted
information being processed on IT equipments in the vicinity. It is therefore necessary
to impose restrictions on the use of portable RF transmitters.
2614. Where portable radio transmitters are officially provided for security purposes,
i.e. by members of Ministry of Defence Police ((MDP) or MOD Guard Service (MGS),
these are normally prohibited from being used in buildings where information
protectively marked at CONFIDENTIAL or above is electronically stored, processed or
forwarded, or in any other area so designated by the CIDA, except in emergency
situations. Certain specialist portable radio transmitters can be safely used in these
environments, and advice should be sought from the CIDA if so required.
2615. Where a requirement is identified for the use of portable radio transmitters
within the perimeter of an MOD site or establishment for reasons other than security,
provided this is not within areas where protectively marked information is
electronically processed or is discussed, the Commanding Officer or Head of
RESTRICTED
RESTRICTED
Defence Manual of Security
Establishment may approach the appropriate PSyA and the CIDA for approval. Special
attention is to be paid to contractors using portable transmitters.
2616. All users of portable transmitters are to be briefed on their use and the dangers
of using a transmitter in a radiation hazardous area such as in the vicinity of explosives.
2617. Issues specifically dealing with mobile (portable) and cordless telephones are
dealt with in Chapter 18.
Wireless Networking
2618. The use if wireless networking technologies to carry Official information is
governed by Controlled Circuit regulations, as laid down at Chapter 22.
2619. Additionally, care must be taken to ensure that no technologies based upon
wireless technologies (e.g. “Bluetooth” or RF based Identification and Authentication
(ID&A) mechanisms) are enabled on systems used to store, process, or Official
information, unless specifically so sanctioned by the relevant Accreditor, and
documented in Security Policy Documentation (SPD).
RESTRICTED
RESTRICTED
Radio Frequency (RF) Devices
2623. The Director/Head of Establishment is responsible for ensuring that all holders
of amateur/citizen band radio transmitting licences are fully briefed on the possible
security dangers, and that they understand the rules and the need for complying with
them. The Director/Head of Establishment should notify the appropriate PSyA of any
incidents reported under sub-paras f and g.
2624. The rules given in paragraph 2621 apply also to personnel interested in amateur
radio who operate only receivers, but who also correspond by letter or QSL card with
other amateur operators.
Radio Microphones
2626. All radio microphones and PA systems currently in production and use from
Commercial Off The Shelf (COTS) sources use unencrypted RF links, and as such are
not normally to be used for other than UNCLASSIFIED purposes.
RESTRICTED
RESTRICTED
Defence Manual of Security
2627. Should a requirement be identified for the use of such technologies for
RESTRICTED material, approval may be sought on a case-by-case basis from both the
PSyA and the CIDA, provided that :
c. At least a 100m controlled zone exists between the structure and the
perimeter of the MOD site.
RESTRICTED
UNCLASSIFIED
Chapter Para
Introduction 2701
Responsibilities 2702
Scope 2703
Threat 2705
Principles 2709
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
CHAPTER 27
INTRODUCTION TO
ACOUSTIC SECURITY
Introduction
2701. An often overlooked aspect of security is the issue of protecting information
when carried in an acoustic (sound) form. The aim of this Chapter is to state the
regulations and practices that will be encountered within the working environs of the
MOD and associated establishments.
Responsibilities
2702. Line Managers are responsible for ensuring that staff under their control are
briefed in the aspects of Acoustic Security relevant in their work as laid down in this
JSP.
Scope
2703. Acoustic security covers 2 majors areas of interest:
a. Security of conversations ;
b. Security of emissions.
2704. This Chapter covers the basic principles of Audio security, which are the means
to protect the conversations of MOD personnel. More detailed advice is provided in
later Chapters to cover the more specialist topics of Acoustic security:
a. Counter Eavesdropping ;
Threat
2705. The general threat against information carried in Acoustic form is covered in
the Annual Threat Assessment which is issued by the MOD Departmental Security
Officer’s staff (DDefSy and the DSSO), and thereafter promulgated to the Principal
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
Security Advisors (PSyAs) in all TLBs and Trading Funds. COs/HOEs requiring
specific threat guidance should initially contact their PSyA who will seek specialist
advice from InfoSy(Tech).
2707. The threat posed to an individual or area can increase under certain
circumstances. This might be because of media interest, major financial events,
evidence or suspicion of information loss through eavesdropping, or for other reasons.
2708. The threats associated with the protection of sensitive conversations within
MOD facilities and platforms against deliberate attack are detailed in Chapter 28 (for
active eavesdropping), Chapter 29 (Structural Acoustic Protection), and Chapter 30
(Acoustic Emission Security) for non-audio emissions (e.g. Sonar).
Principles
2709. Good practice and common sense can provide most of the security required for
the less sensitive conversations that routinely occur within the MOD, where the bulk of
the information discussed will be at the UNCLASSIFIED or RESTRICTED levels.
The protection of occasional discussions at higher Protective Marking levels, randomly
distributed in time and space and diluted by the mass of other information is aided by a
culture of ongoing good practice.
2710. All conversations are inherently vulnerable unless the potential attacker can be
denied access to the vicinity of them. The vulnerability relates to the area in which the
conversation is being held. An understanding of the basic principles will help
determine the need for appropriate countermeasures.
2711. The single most important countermeasure is an awareness amongst staff of the
security risk associated with overhearing. This will involve promoting security
awareness amongst new and existing staff through security lectures (including
UNCLASSIFIED
UNCLASSIFIED
induction lectures) and other courses, and distribution of awareness material. It will be
intended to warn staff not to discuss sensitive matters in public places or where they
can be overheard by uncleared visitors, contractors etc.
2712. Additionally, staff must be aware of the need to actively reduce the risk of
casual overhearing by closing doors (and windows if necessary) when holding sensitive
discussions.
2713. Good building access controls will be the main deterrent to any potential
eavesdropper. Good building design is important, and the incorporation of sensitive
zones sited away from vulnerable points (i.e. adjacent to public areas or toilets, or on
ground floor perimeters) is recommended. Staff should be well briefed on the need to
prevent unauthorised access; the regime should be supported by suitable pass and
access control systems. There should be control and supervision of visitors and staff
with limited clearances (e.g. cleaners, maintenance staff etc).
Operations Security
2715. The topic of Operational Security (OpSec) is addressed in more detail at JSP
440 Volume 1, but in the context of Audio security it is particularly important to
consider OpSec where the subject matter is notionally UNCLASSIFIED, as inferences
can be drawn from operator chatter and mannerisms, use of jargon, and call signs.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
RESTRICTED
Counter Eavesdropping
COUNTER EAVESDROPPING
28 Counter Eavesdropping
Scope 2801
Threat 2804
Vulnerabilities 2805
Countermeasures - General
Inspections 2813
Buildings 2817
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Counter Eavesdropping
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Counter Eavesdropping
CHAPTER 28
COUNTER EAVESDROPPING
Scope
2801. Eavesdropping generally refers to the use of listening devices (bugs) in order to
overhear, and transmit or record, conversations. This includes long-term devices,
perhaps concealed in the fabric of a building, quick-plant devices hidden in a room and
certain long-range attack techniques.
2803. The methods, problems and techniques involved in the planting of photographic
bugs, (concealed still or video cameras) are essentially the same as those used for audio
bugs although the object of the attack will be slightly different. They are less common
than audio bugs, but the protective measures are essentially the same.
Threat
2804. The general threat of eavesdropping, and other attacks, is covered in the Threat
Assessment which is issued annually to Principal Security Advisors (PSyA) in TLBs
and Trading Funds (TF). COs/HOEs requiring specific threat guidance should initially
contact their PSyA who will seek advice from the Joint Security Co-ordination Centre
(JSyCC). The elements of the threat which are peculiar to eavesdropping are outlined
below:
RESTRICTED
RESTRICTED
Defence Manual of Security
Vulnerabilities
2805. All conversations are vulnerable unless the potential attacker can be denied
access to the vicinity of them. The vulnerability relates to the area in which the
conversation is being held. The various types of attack can include deliberately planted
devices (quickly concealed or deeply embedded in the building), telephone or data-line
taps, fortuitous devices (eg accidentally transmitting cellphones), or mains conducting
devices. An understanding of the basic principles will help determine the need for
appropriate countermeasures.
2806. All devices need a power source and a means of recovering the conversations
being collected. The power can be battery or mains electricity, and the device may be
remotely switched on and off to conserve power and avoid detection. Recovery of the
conversation is often by radio transmission to a nearby listening-post, transmitting
down a mains circuit, or a telephone wire or some other feature of the building
infrastructure.
RESTRICTED
RESTRICTED
Counter Eavesdropping
Risk Assessment
2808. It is the responsibility of CO/HOEs to assess the risk of an audio eavesdropping
attack in their area using the risk management assessment questionnaire at Annex E to
determine a suitable cost effective and risk managed response to the perceived threat.
CO/HOEs are to consult their PSyA when assessing the risks to their establishments,
and technical security request form (at Annex A) are also to be staffed through the
PSyAs. At Annex B are flow charts to be used as a quick look guide in deciding when
it is necessary to approach the PSyA for the provision of appropriate countermeasures.
Countermeasures - General
Control Of Access
2809. Good building access controls will be the main deterrent to any potential
eavesdropper. Good building design is important, and the incorporation of sensitive
zones sited away from vulnerable points (ie adjacent to public areas or toilets, or on
ground floor perimeters) is recommended. Staff should be well briefed on the need to
prevent unauthorised access; the regime should be supported by suitable pass and
access control systems. There should be control and supervision of visitors and staff
with limited clearances (eg cleaners, maintenance staff etc).
Control Of Equipment
2810. Measures should be taken to control the introduction by visitors of potentially
hazardous electronic devices such as mobile radios, cellphones or various types of
recorder, into sensitive areas. Resident staff use of such devices is also to be
controlled.
Data Communications
2812. Although computer (or data) communications lines are also digital, they carry
greater volumes of information, and thus could be more attractive than telephone
RESTRICTED
RESTRICTED
Defence Manual of Security
lines. Therefore, protective measures for data lines should include encryption, use of
fibre-optic cabling or anti-tamper devices on cabling where the risk of eavesdropping
is high. Inspections
Inspections
2813. Counter eavesdropping inspections of sensitive premises may be used to reduce
risk where access control measures may have been breached, or to supplement access
control measures in areas where the threat is deemed to be high. Inspections are no
substitute for good access control measures however. Inspections vary from casual
scrutiny of an office by occupants, to simple physical searches and detailed technical
inspections (sweeps) by experts. Detailed technical sweeping of government and
overseas' sites is usually only carried out by the technical authority as authorised by the
Security Service; currently commercial companies are not licensed or authorised to
sweep such government/overseas' sites. Some military and other specialised units are
trained by the technical authority to carry out limited electronic sweeping at military
and other sites both within the UK and overseas. All requests for inspections should be
submitted in writing, using the proforma at Annex A to the appropriate PSyA.
RESTRICTED
RESTRICTED
Counter Eavesdropping
Buildings
2817. It is reasonable to assume that in general, most sensitive conversations will take
place within sites, buildings or rooms which are normally used for processing or storing
material up to the same level of protective marking. It therefore follows that sufficient
physical, personnel and procedural security measures should already be in place. In
most cases within UK, those measures will also provide sufficient counter
eavesdropping protection, but where additional measures are required, Chapter 29
should be consulted.
2818. The principle to bear in mind when considering physical security measures for
counter eavesdropping protection, is the prevention of access by attackers to the
sensitive area, even when the area is unoccupied and the protectively marked material
is safely stored in approved containers. Particular attention must therefore be paid to
"out-of- hours" protection (guard patrols, IDS, secured rooms etc).
2820. It may also be necessary (where the threat warrants) to control access to areas
adjacent to (including above and below) sensitive rooms in order to prevent casual
overhearing and technical attacks which can be carried out from outside the target
room.
2821. One of the main justifications for entry and exit searching at access control
points is to deter the introduction (by staff and visitors) of equipment which might be
used to record or transmit sensitive conversations. This applies mainly to sound
recorders (tape recorders, etc) and radio transmitters such as cellphones, mobile radios,
portable telephones, etc. Signs should be prominently displayed at access control
points of sensitive areas, clearly indicating that such items are prohibited and warning
that random searches are conducted
2822. Conference venues and other non-List X commercial premises present difficult
problems, because there will be limitations in the application of security. In general it
is not advisable to hold prearranged highly sensitive (ie CONFIDENTIAL or higher)
discussions (such as conferences) in commercial premises within the UK unless
significant measures have been taken to protect those premises in consultation with the
relevant PSyA. Overseas, where the threat is higher than in the UK, it is not advisable
to hold prearranged discussions in commercial premises above UNCLASSIFIED.
RESTRICTED
RESTRICTED
Defence Manual of Security
Overseas staff considering higher level discussions at such venues, should consult
PJHQ J2X for advice.
RESTRICTED
RESTRICTED
Counter Eavesdropping
Digital Telephones
2828. Digital telephones are significantly more difficult to tap than analogue
telephones and should therefore be used wherever appropriate. Approved secure
telephones do, of course, supply significantly more protection against tapping.
Control Of Voice-Processors
2829. Voice-processing boards in personal computers (PCs) can malfunction or be
tampered with to act as microphones in rooms, and can store or transmit eavesdropped
conversations. Unless operationally necessary, such features should be physically
disconnected by a competent person.
Control Of PA Systems
2830. PA speakers inside a sensitive room can readily be adapted to act as
microphones if access can be gained to the PA system wiring elsewhere. Where access
to this wiring is not fully controlled, consideration should be given to siting speakers
outside sensitive rooms. Safety must not be compromised of course, and technical
measures may need to be applied to isolate speakers which must remain in sensitive
areas.
RESTRICTED
RESTRICTED
Defence Manual of Security
2833. Where official PDAs and mobile phone are to brought into sensitive areas, care
must be taken that their recording facilities cannot be accidentally activated by the
holder, or remotely activated. Ancillary recording equipments may only be brought
into sensitive areas by the approval of the appropriate local security staffs.
Inductive Loops
2834. As well as the direct audio signal, it is also possible for an attacker to exploit
the inductive loops fitted to various types of equipments to aid those with hearing
disabilities. If any equipment fitted with such facilities is to be intalled on a defence
site, the Co-ordinating Installation Design Authority (CIDA) as laid down at Chapter
17 should be consulted.
Acoustic Hoods
2835. Acoustic hoods offer some privacy in general office areas, but must be sited
carefully to be effective.
RESTRICTED
RESTRICTED
Counter Eavesdropping
Physical Search
2837. Periodic physical searches by security staff (usually security guards in MOD
civilian establishments and trained service personnel in service establishments) are an
effective countermeasure against quick-plant devices. Basic guidelines for carrying out
a physical search can be found at Annex C. Advice on training in physical searching is
available through the relevant PSyA.
Rotation Of Telephones
2838. Rotation of telephones is an effective and low-cost method of reducing the risk
of bugging of the telephones of particular prominent targets. Phones are redistributed
amongst users at intervals (eg six monthly), possibly via a central pool. However, it is
important to ensure that rotated telephones are checked for eavesdropping devices
before they are passed on to a new user.
2840. Where feasible, the specialised units shall provide technical assistance to any
unit or establishment, whether military or civilian, whose own PSyA is unable to carry
out the requested LES. Costs for LESs will be borne by the TLB or TF, as appropriate.
Tamper Proofing
2842. Tamper proofing, or tamper-detection of equipment (telephones, answerphones)
and related infrastructure (telephone sockets, junction boxes, mains sockets, extension
cables and multi-sockets etc) may detect replacement or tampering. This can be
achieved by seals, details of which are given in Volume 1 Chapter 5.
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Counter Eavesdropping
RESTRICTED
RESTRICTED
Defence Manual of Security
15. REMARKS
SIGNED BY:
NAME:
RANK:
BRANCH/DIRECTORATE
RESTRICTED
RESTRICTED
Counter Eavesdropping
ANNEX B
CHART TO ASSESS POSSIBLE REQUIREMENT FOR
COUNTER EAVESDROPPING MEASURES WITHIN
THE UK
YES NO
NO
YES
YES NO
Do you believe the area to have been Consult appropriate PSyA for
compromised in any way? further advice.
YES NO
RESTRICTED
RESTRICTED
Defence Manual of Security
YES NO
NO
YES
YES NO
Do you believe the area to have been Consult PJHQ J2X for further
compromised in any way? advice.
YES NO
RESTRICTED
RESTRICTED
Counter Eavesdropping
ANNEX C
PHYSICAL SEARCHES FOR EAVESDROPPING
DEVICES
Physical search
c. Where possible, consider how long an attacker would have had access
to the room. The less time an attacker has access to an area, the more chance
there is that the device will be a "quick plant type" or a device superficially
hidden in something common to either an office or the room generally (eg plug
adaptor or ornament).
Phase 2 - Procedures
RESTRICTED
RESTRICTED
Defence Manual of Security
a. Lock the door and commence the search working in accordance with the
plan.
c. Pay particular attention to any changes which you believe have been
made since any previous search (eg new furniture and furnishings).
RESTRICTED
RESTRICTED
Counter Eavesdropping
5. Full details are given in Annex F, but the following is a brief summary of the
action to be taken if a device is found:
b. For rooms where sensitive discussions take place, and the room is
searched periodically, check on the arrangements for controlling access, and the
security of the door keys (including duplicates). Where the search has taken
place prior to a conference, access should be controlled until the conference is
complete.
RESTRICTED
RESTRICTED
Defence Manual of Security
c. If the room has been searched prior to a conference, ensure that any
furniture, ornaments, flowers etc brought into the room before the conference
are examined, and nothing extra is brought in after the search.
RESTRICTED
RESTRICTED
Counter Eavesdropping
ANNEX D
MINIMUM STANDARD OF EQUIPMENT REQUIRED
FOR A LIMITED ELECTRONIC SWEEP (LES)
2. Before purchasing any new and expensive equipment, the LES authority should
determine the types of eavesdropping attack likely to be encountered and purchase the
appropriate equipment. The following is a list of the type of equipment that may be
required by an LES team to fulfil its duties, giving specification parameters approved
by the technical authority.
(1) monitoring for line borne audio signals in the frequency range
300Hz to 12kHz on mains, telephone or computer wiring. It should be
capable of monitoring on either the LIVE or NEUTRAL line relative to
earth;
(2) a tuned radio frequency (RF) unit capable of detecting line borne
RF signals in the frequency range 10kHz to 30MHz on mains, telephone
or computer wiring; and
b. Scanning receiver
This should be capable of scanning for, and locking on to, spatial transmitters
operating in the frequency range 10MHz to 2GHz. It should be easy to operate
and have a demodulating facility to aid signal identification. If considered
necessary, a second scanning receiver could be used to extend the frequency
coverage to 4GHz.
RESTRICTED
RESTRICTED
Defence Manual of Security
RESTRICTED
RESTRICTED
Counter Eavesdropping
ANNEX E
RISK MANAGEMENT ASSESSMENT OF POSSIBLE
EAVESDROPPING ATTACK
1. List valuable assets eg:
RESTRICTED
RESTRICTED
Defence Manual of Security
b. Terrorist groups.
c. Disaffected staff.
d. Criminals.
e. Investigative journalists.
(1) a ban on all mobile phones, radio equipment etc being brought
into controlled areas;
(2) checks carried out periodically for tampering (eg traces of holes,
scratch marks etc);
RESTRICTED
RESTRICTED
Counter Eavesdropping
(3) strict control of entry to the site telephone exchange, frame room
and junction boxes;
b. Are the physical security baseline measures laid down in JSP 440,
Volume 1, Chapter 5 adhered to?
(1) excessive;
(2) adequate; or
(3) inadequate
RESTRICTED
RESTRICTED
Defence Manual of Security
f. If adequate, do no more.
RESTRICTED
RESTRICTED
Counter Eavesdropping
ANNEX F
ACTION TO BE TAKEN ON DISCOVERY OF AN
EAVESDROPPING DEVICE
Principal
On Discovery
4. The local security staffs should inform the appropriate PSyA, by secure means
immediately. If the incident occurs outside of normal duty hours then information
should be directed to the appropriate PSyA Duty Officer where one exists, or in other
cases direct to the JSyCC.
Escalation Procedure
5. Guidance must be sought from the Security Service through the JSyCC before
any further action is taken.
Post-find investigation
RESTRICTED
RESTRICTED
Defence Manual of Security
8. Details of the investigation, once completed, are to be furnished to the DSO via
the JSyCC.
RESTRICTED
RESTRICTED
Counter Eavesdropping
ANNEX G
2. All doors to a swept room shall be fitted with security approved locks.
4. No more than two keys are to be cut for locks to doors of swept rooms. One
key is to be retained by the local security staffs, for use in an emergency, the other by
the appointed person responsible for the room. The key(s) must never be left
unattended in the lock or be taken out of the building/off the site. The key(s) must be
kept in a secure container fitted with an approved combination lock when not in use.
The keys are to be included in the six monthly check of security keys laid down in
Section XII to Chapter 5 of Volume 1.
6. The person responsible for the swept room should seek the advice of Sector
security staff, as appropriate, through the local security staffs before any works services
are carried out in a swept room.
7. The person responsible for a swept room shall maintain a security log book
(MOD Form 931) showing the following details:
8. The security log book should be periodically examined by the local security
staffs and may be inspected by the appropriate PSyA at any time.
RESTRICTED
RESTRICTED
Defence Manual of Security
room until the item has been examined and approved by appropriate security staff.
When furniture or equipment is sent away for repair, or temporarily stored elsewhere,
the fact that it came from, or may return to, a swept room should not be disclosed.
10. All staff should be made aware that eavesdropping devices can be extremely
small and may be planted in a wide range of products.
11. Any circumstances which suggest that a swept room may have been
compromised should immediately be reported to the ocal security staffs and the
guidance given in Annex F followed.
12. The above guidance is to be followed if the integrity of the swept room is not to
be compromised.
RESTRICTED
UNCLASSIFIED
Chapter Para
Introduction 2901
Assessment 2902
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
UNCLASSIFIED
UNCLASSIFIED
CHAPTER 29
Assessment
2902. When planning the construction of a new facility, the relocation of staff, or a
new or changed role, Project Managers should seek to determine the like volumes and
frequencies of discussions that will take place above RESTRICTED.
UNCLASSIFIED
UNCLASSIFIED
Defence Manual of Security
2907. The principle to bear in mind when considering physical security measures for
acoustic protection, is the prevention of access by attackers to the sensitive area. If
uncleared personnel are granted access to such areas they should be supervised by
appropriately cleared staff.
2908. It may also be necessary (where the threat warrants) to control access to areas
adjacent to (including above and below) sensitive rooms in order to prevent casual
overhearing which can be carried out from outside the target room.
2909. One justifications for entry and exit searching at access control points is to deter
the introduction (by staff and visitors) of equipment which might transmit sensitive
conversations, such as cellphones and mobile radios. Signs should be prominently
displayed at access control points of sensitive areas, clearly indicating that such items
are prohibited and warning that random searches are conducted.
2910. Conference venues and other non-List X commercial premises present difficult
problems, because there will be limitations in the application of security. In general it
is not advisable to hold prearranged highly sensitive (ie CONFIDENTIAL or higher)
discussions (such as conferences) in commercial premises within the UK unless
significant measures have been taken to protect those premises in consultation with the
relevant PSyA. Overseas, where the threat is higher than in the UK, it is not advisable
to hold prearranged discussions in commercial premises above UNCLASSIFIED.
Overseas staff considering higher level discussions at such venues, should consult the
PJHQ PSyA for advice.
UNCLASSIFIED
RESTRICTED
Acoustic Emission Security
Introduction 3001
Overview 3005
Responsibilities 3012
Countermeasures 3022
RESTRICTED
RESTRICTED
Acoustic Emission Security
RESTRICTED
RESTRICTED
Acoustic Emission Security
CHAPTER 30
3002. The security of data deliberately modulated upon acoustic emissions is covered
within the Communications Security (COMSEC) discipline, typically by the use of
cryptographic systems, as laid down at Chapter 23.
3004. The nature of the threat environment means the current requirements for
Acoustic Emission security measures deal only with the countering of Intelligence
gathering activities by a hostile group or country.
Overview
3005. The interception of acoustic emissions can be an attractive and profitable source
of intelligence, as it can in principle be undertaken from the safety of home territory;
international air space; or the high seas. Such interception could reveal information
relating to certain aspects of the electronic techniques employed within the equipment
or the extent and preparedness of the country’s defences, which is otherwise protected
by physical, personal and CIS security measures.
RESTRICTED
RESTRICTED
Acoustic Emission Security
3008. The technical analysis of such emissions can provide data which can be used
against MOD platforms, and/or may allow development of similar equipment or
systems. These may involve sophisticated deception and decoy techniques or jamming.
Indeed successful interception and analysis could allow the development and
deployment of countermeasures to coincide with the operational use of the target
signals.
3009. The intercept of only seconds of a complex signal can provide vital information
as to its purpose, modes and technical characteristics. Generally speaking, a high signal
level is necessary for analysis but even at low level this will alert an interceptor to a
signal of interest and for a subsequent attempt at intercept he/she can then maximise
resources. Weaknesses or exploitable features, which may not be evident to the
developer, may give hostile analysts an early lead in designing countermeasures.
3010. The main system types for which acoustic emissions will need to be
considered are as follows:
a. Sonars ;
e. Fuzing Systems.
3011. In providing protection for the emissions listed, consideration must also be
given to the security of any communications associated with their testing, servicing
and operation, in accordance with Chapter 23.
Responsibilities
3012. UK national security policy is the responsibility of a Cabinet Office Committee
(SO), who hold the authority to advise on the implementation of this policy, having
liased with the Security Services and other appropriate authorities responsible for both
assessing the overall threat and advising on the need for countermeasures.
RESTRICTED
RESTRICTED
Acoustic Emission Security
3013. Overall responsibility for assessing the threat, vulnerability, and risk, lies with
the MOD Security Authority, Sy(Pol)2c, on the staff of the Departmental Security
Officer (DSO), and is implemented through the security chain of command.
3014. Responsibility for the selection of countermeasures for individual systems lies
with Project Managers and/or System Operating Authorities (SOA), the individual
threat assessment process is however a matter purely for the security authority.
3015. Defence Intelligence Staffs (DIS). The DIS is responsible for production of
information relating to the current Acoustic Emission Threat.
Risk Assessment
3016. A risk assessment is to be carried out early in the planning stages of a project in
order to minimise any subsequent impact on design and cost caused by Acoustic
Emission considerations. A similar exercise will need to be conducted when
modifications to existing equipment are proposed.
3017. The risk assessment will comprise of a review of the asset value, the generic and
local threats, and the vulnerabilities.
3018. Information Value The sensitivity of an emission may be gauged from the
classification assigned to the project:
3020. DIS issues specific warnings by formal signal message of any short-term
changes to the threat environment, such as the presence of known collection platforms
(typically AGIs) within UK territorial waters.
RESTRICTED
RESTRICTED
Acoustic Emission Security
Countermeasures
3022. The detail and amount of effort required for protection of both intentional and
unintentional emissions of each system are to be assessed by considering the
following key factors :
Incident Handling
3025. Actual or suspected compromises of Acoustic Emissions must be reported, as
with all other Information Security concerns, in line with the requirements of
Chapter 11.
RESTRICTED
DEPARTMENTAL SECURITY OFFICER
GUIDANCE NOTES
Intentionally blank
D/Def Sy 1/9
August 2001
Introduction
3. Separate guidance is being issued on revised responsibilities for dealing with the
security of nuclear weapons and nuclear materiel.
Background
4. The Strategic Defence Review (SDR) of 1998 led to significant changes in the
way the business of the department is conducted. As a result, in September 1999, 2nd
PUS commissioned a review to examine the organisation of security in the department.
This review – the Security Structures Review (SSR) – was to consider all aspects of
security except policing, guarding and vetting. The results of the review were endorsed
by the Defence Management Board on 25 January 2001 as DMB (00) 12. DCI 148/01
reported the outcome.
1
Impact of SSR
5. A guiding principle of the SSR was that security is a core business issue and
should be firmly embedded in management systems and processes of the Department
with ownership of risk unambiguous, and aligned with budgetary authority and
accountability. It is the responsibility of everyone working in the Department. The
management of security risk is to complement and mirror the application of corporate
governance principles.
2
ordination Centre (JSyCC) to co-ordinate alerts and warnings of information
security incidents, including electronic attacks. The JSyCC will provide a 24 hour
/ 7 day week watch keeping capability. Its role is described at Appendix 1 to
Annex A.
3
accreditation function for networked IT systems that cross TLB/Trading Fund
boundaries. The responsibilities of the DSSO are set out at Annex F.
JSP 440
7. One of the recommendations of the SSR was that the MOD Security Manual, JSP
440, should be reviewed and rewritten to set out the essential requirements of security in
the Department. It should show clearly which standards are mandated and which are
appropriate for risk management. The new JSP 440 is unlikely to be produced before
2003; in the meantime, Volumes 1-3 of Issue 2 of the current JSP 440 will be published
shortly to incorporate pre-SSR amendments and this note on security responsibilities.
Further interim guidance on security policy will be issued in the form of a series of DSO
Guidance Notes.
Gloria Craig
Gloria Craig
DSO
SY 326 80462MB
4
List of Annexes and Appendices
5
Intentionally Blank
6
D/DefSy 1/9
August 2001
Role
1. The Directorate of Defence Security (DDefSy) is responsible to the DSO for the
formulation and promulgation of security policy for the protection of all MOD
information, assets and personnel, including international security arrangements for the
sharing of MOD information with other governments and with Defence industry.
Responsibilities
c. Primary responsibility for nuclear security matters (but on key issues will
act only in concert with the Director of Nuclear Policy).
e. Liaison with the Cabinet Office, Security Service, OGDs and the Civil
Police on security policy issues.
A-1
electronic attack. The detailed responsibilities of the JSyCC are given at
Appendix 1.
n. Support the DSO in identifying the MOD's security education and training
needs and in contributing to the formulation of the policy to meet those needs.
(Note. This reflects a responsibility placed on the DSO in the Manual of
Protective Security. Exercise of this responsibility will have to take account of the
Defence Training Review).
o. Preparation of the annual DSO's Report to the DAC, including tasking and
collation of TLB Holder/TFCE reports and staffing of follow-up action required.
Accountability
a. DCDS(C) and thence to VCDS for the policy on the protection of MOD
personnel and assets against terrorists and other extremists including the counter
extremist Alert State.
b. The Personnel Director and thence to 2nd PUS for all other aspects of
protective security policy.
A-2
D/DefSy 1/9
August 2001
Appendix 1 to
Annex A to DSO Guidance Note No 1
Role of JSyCC
To act as focal point for information security intelligence, maintain a central source of
vulnerability and threat information, and promulgate summaries, alerts and rectification
directives as necessary.
Specific Responsibilities
A1-1
Intentionally Blank
A1-2
D/Def Sy 1/9
August 2001
Annex B to DSO Guidance Note No 1
I look to you to ensure that Departmental security policy and standards set out in JSP 440
are implemented across your TLB. Your Principal Security Adviser (to be appointed by
you) will support you and should be consulted whenever you are unclear about specific
delegations or need more general advice. Should you or your Principal Security Adviser
be unsure about the interpretation and exercise of the delegations or need specialist
advice, you should consult the Departmental Security Officer.
Specific Authority
Authority for the implementation of Departmental security policy and standards (set
out in JSP 440 and other policy guidance) in your TLB.
Authority to take necessary timely action on receipt of terrorist and other security
threat alerts, and when necessary, the co-ordination of BIKINI Alert State and other
counter-measures for all units/establishments in your TLB area.
Authority for accrediting IT systems that are delegated to you by the Departmental
Security Officer (DSO).
Responsibilities
You should ensure that your decisions on security adhere to Departmental risk
management guidelines.
You should, in consultation with the DSO, appoint a Principal Security Adviser
(PSyA) who will be your source of authoritative day-to-day advice. The PSyA
should meet minimum core competencies and have received the appropriate
training. The PSyA may be appointed from your TLB, or be provided from
another, under agreed arrangements. He or she should consult the DSO for
specialist advice when needed, including on any cross-TLB issues.
B-1
You should nominate a ‘risk manager’ to advise you on the balance between your
business needs and the security requirements, taking account of affordability, and to
act as the point of contact for the TLB with the DSO.
You should invest in the necessary training and education to ensure that all staff in
your TLB are adequately trained and have the right level of security awareness.
You must agree an audit programme for your TLB with the DSO.
You must submit an annual report to the DSO on the state of security in your TLB.
B-2
D/DefSy 1/9
August 2001
TLBs
Trading Funds
DSTL……………………….. Mr S Mepham
Met Office…………………... Mr M Sands
UK Hydrographic Office…… Mr S Parnell
DARA………………………. Capt P R Bishop RN
C- 1
Intentionally Blank
C-2
D/DefSy 1/9
August 2001
Specific Responsibilities
e. Liaison with other Principal Security Advisers and co-ordinate the sharing
of security support activities.
h. Ensuring security surveys and periodic inspections are carried out in all
subordinated establishments.
D-1
j. Development and implementation of revised structures as necessary to
meet the full range of TLB Holder’s/ Trading Fund Chief Executive’s
responsibilities that flow from the Security Structures Review.
a. DDefSy is responsible for civilians in the Central TLB, DPA and Trading
Funds and their non List X contractors, for List X industry (but TLB Holders are
responsible for List X contractors employed at their sites), and for categories such
as SCS and MDP managed centrally.
b. The single Services are responsible for their Service personnel wherever
they are employed, for civilians employed in Service TLBs (except for categories
managed centrally), and for contractors employed at their Service sites.
c. The DLO and PJHQ are responsible for civilians employed in their TLBs
(except for categories managed centrally), and for contractors employed at DLO
and PJHQ sites.
D-2
D/Def Sy 1/9
August 2001
TLBs
Trading Funds
E-1
Intentionally Blank
E-2
D/DefSy 1/9
August 2001
Accreditation
2. DSSO accreditors will advise business managers of the risks to their IT systems
and how best to mitigate and reduce them. The decision to accept the residual risk will lie
with the business manager in consultation with other stakeholders. If stakeholder interests
conflict, resolution will be determined by either DG Info, ACDS (Ops) or CJO in
accordance with established crisis response processes.
Security Audit
3. DSSO auditors will focus on assessing the effectiveness of the integrated risk
management process of the TLB Holder/Trading Fund Chief Executive (TFCE). The
precise methodology will be developed in partnership with TLB Holders/TFCEs in a
series of pilot audits that will begin in September 01. Key areas to be addressed include:
The formal audit process will begin on 01 April 02 and will draw upon the DSO's Annual
Report to the DAC to determine the key themes to be examined.
STRAP Administration
4. There are plans for STRAP administration responsibilities currently carried out by
Sector STRAP Security Officers (STRAPSOs) to be re-brigaded under the DSSO.
Pending implementation of this change, the pre-SSR arrangements are to continue.
F-1
Intentionally Blank
F-2
DDef Sy/6/15
September 2001
Introduction.
2. In parallel, DCS 17, the SDR and the Security Structures Review (SSR) have
recommended changes to the way in which security is managed and controlled in the
MOD. The SSR embeds security decision-taking in core management processes at Top
Level Budget/ Trading Fund (TLB/TF) level. This note explains how to manage security
risk in a way consistent with JSP 503 (Business Continuity) and with JSP 462 (Corporate
Governance), which Directorate of Performance & Analysis (D P+A) are producing for
the Defence Management Board (DMB). It also examines the link between security risks
and the hierarchy of Balanced Scorecard objectives and explains how risk appetite is
1
The Turnbull Report – Internal Control: Guidance for Directors on the Combined Code
1
DDef Sy/6/15
September 2001
determined. Finally, it outlines the audit process that the Defence Security Standards
Organisation (DSSO) will undertake with TLB Holders and Chief Executives of Defence
Trading Funds (TFCEs) on behalf of the Departmental Security Officer (DSO), Director
General Security & Safety (DGS&S).
Risk.
2. The MOD defines risk generically as a future uncertain event that could
influence the achievement of departmental objectives and statutory obligations. The
key element is the uncertainty of the outcome; taking a risk may result in benefit or harm.
This general definition covers the risk that occurs at all levels and in all areas of
departmental activity. Such risk arises from the random nature of events, imperfect or
incomplete knowledge, human behaviour, resource and time constraints, and lack or
failure of control systems. It is assessed in terms of likelihood and impact using
qualitative and quantitative methods and judgement born of corporate and individual
experience.
3. Within that generic definition, risk has a more specific meaning in the security
context. MOD security policy is laid down in JSP 440 and derives from the Cabinet
Office Manual of Protective Security (MPS), revised in April 2000 to incorporate BS
7799 (Information Security Management). Security risk is perceived as a threat of
compromise to the Confidentiality, Integrity and/or Availability of assets and is
defined as a combination of threat and vulnerability. The sub-elements of threat and
vulnerability are described as the likelihood of a potentially compromising event taking
place and the feature or characteristic of an asset that could be exploited in an attack.
Thus, despite the more negative perception of security risk, the consequence is assessed
in the same way as generic risk, in terms of likelihood and impact. It is therefore entirely
reasonable to make security risk management decisions using the processes and
terminology common to the corporate governance mechanisms specified by the DMB for
all other departmental risk management. JSP 440 will require some change to reflect this.
2
DDef Sy/6/15
September 2001
3
DDef Sy/6/15
September 2001
6. In practical terms, risk appetite (the range of risk) and tolerance (the level of risk)
can be determined by answering such questions as:
b. Can we tolerate the level of each accepted risk, and the aggregate level of
risk, in the light of current control mechanisms?
c. Are legal, statutory and baseline control requirements met, and at what
impact on output, time and cost?
e. What impact does our risk have on internal and external stakeholders?
There is an evident corollary between this generic approach and a more specific
application in regard to security.
7. Although functional areas such as security afford scope for a more bespoke
approach to identifying risks, security risk should be managed through corporate
governance mechanisms. Equally, while the DSO will indicate any specific legal,
4
DDef Sy/6/15
September 2001
statutory or regulatory security baseline objectives, the DMB will determine departmental
risk appetite and tolerance through the DCP. But specialist staff input will be required to
identify threats accurately, advise on cost-effective risk mitigation (reduced likelihood)
and reduction (reduced impact) strategies and indicate whether the residual risk is
consistent with any mandated baseline control or legal obligation. The TLB/TF security
risk manager will adjudicate in conflicts between business and security interests by
considering issues of residual or reasonably foreseeable risk (in the light of existing or
proposed controls), practicality and cost. He or she may draw on the DSSO for impartial
expert advice. Higher levels of appeal would involve the TLB Holder/TFCE and DSO
personally.
The Process
9. The techniques appropriate to the stages of the risk management process will be
familiar to Principal Security Officers (PSyAs); an approach to the process, for example,
is described in Supplement 2 of MPS. This Guidance Note does not describe the
techniques in detail but simply notes some key considerations:
5
DDef Sy/6/15
September 2001
required output, risk appetite, tolerance and mandatory controls. Both qualitative
and quantitative methods should be used. The present system of grading threat
levels between VERY HIGH (Grade 1) and NEGLIGIBLE (Grade 6) is consistent
with D P+A Level 2 methodology, and the Cabinet Office / SSG definitions
regarding frequency may also be useful. See Annex C.
c. Risk Planning. The key to effective planning is to complete the Risk Register
for managing each significant risk. Typically this will include identifying who is
responsible for control implementation, the resources to be used, the budget
allocation, timescale and mechanism for monitoring and reviewing compliance
with the risk management plan. See Annex D. MOD adopts four strategies to
respond to risk: Transfer, Tolerate, Treat and Terminate. In many areas it is
unlikely that, as provider of last resort, the Department can completely transfer or
terminate risk.
d. Risk Control. This term covers the processes whereby the effect of planned
activity is monitored, reported and reviewed. There is a wide range of control
mechanisms, and it is inappropriate to direct which should be used as their utility
differs in differing areas. But, in an integrated risk management system, it is
essential to use a common methodology to assess their effectiveness. The DMB
has adopted a four-category control rating classification (Red, Amber, Yellow and
Green) that is wholly applicable to security:
6
DDef Sy/6/15
September 2001
In assessing the overall quality of controls, you should consider both the effectiveness of
the mitigation/reduction and the efficiency of the control procedure in terms of output,
cost and time. You should also consider developing Key Risk Indicators (KRI) to
complement other Management Plan Performance Indicators (PI). Control rating
assessments will be required in TLB Holder/TFCE annual reports, on which the
DSO will draw so as to report to the Defence Audit Committee (DAC) and provide the
annual Certificate of Assurance (CoA) that will form part of PUS’s Statement of Internal
Control.
10. The CoA cannot rely solely on self-reporting. The DSO will therefore audit TLB
Holder’s/TFCE’s security risk management process. Audit frequency will be conditioned
by the criticality of TLB/TF output to DCP objectives, the level of risk in the TLB/TF,
and MPS/JSP 440. Alternatively, of course, they will be carried out at the request of the
TLB Holder/ TFCE. The audit will help establish how effectively TLB Holders/ TFCEs
are discharging the specific security responsibilities delegated to them.
Gloria Craig
Gloria Craig
DSO
SY 326 80462MB
7
DDef Sy/6/15
September 2001
List of Annexes:
E. DSSO Audit
8
DDef Sy/6/15
September 2001
A-1
DDef Sy/6/15
September 2001
Intentionally Blank
A-2
DDef Sy/6/15
September 2001
HIGH
MEDIUM
IMPACT LOW
LIKELIHOOD
OUTPUT RESOURCE
I
M
P PROCESS LEARNING
A
C
T
LIKELIHOOD
B-1
DDef Sy/6/15
September 2001
Intentionally Blank
B-2
DDef Sy/6/15
September 2001
RISK RISK
IMPACT Corporate definition IMPACT Definitions by
Level 1 must apply Level 2 appropriate MB
C- 1
DDef Sy/6/15
September 2001
1 Certain to occur 1
C- 2
DDef Sy/6/15
September 2001
Risk:
Risk Manager:
D-1
DDef Sy/6/15
September 2001
Intentionally Blank
D-2
DDef Sy/6/15
September 2001
DSSO AUDIT
1. Properly, much of the detail of the audit process will be developed in partnership
with TLB Holders/ TFCEs in the first year of the DSSO’s existence (01 Apr 01 – 31 Mar
02). However, certain key principles will condition that work and can be spelled out here.
E-1
DDef Sy/6/15
September 2001
Intentionally Blank
E-2
D/DDefSy/170/9/1/1 RESTRICTED
September 2001
Background
1. The MOD security inspection régime, along with the associated categorisation
of MOD establishments for security purposes, has been in place for many years. As a
result of the Security Structures Review (SSR), ownership of the security risk and
responsibility for risk management has passed to TLB Holders and Chief Executives of
MOD Trading Funds (TFCEs). The SSR included the recommendation that the
security inspection regime be reviewed.
Aim
2. The aim of this Guidance Note is to establish the policy for security inspections
post SSR.
Scope
3. The scope of this note is limited to outlining the DSO's standing requirement
for information on security compliance, and to the policy guidance needed by TLB
Holders/TFCEs to carry out their security inspection responsibilities. Reference will
be made to the complementary process of independent audit to be established as a
result of the SSR but only to explain the linkage with inspections, and the distinction
between the two activities. Details of the future audit policy, and the way in which a
Defence Security Standards Organisation (DSSO) audit team will operate, will be
promulgated separately
1
RESTRICTED
D/DDefSy/170/9/1/1 RESTRICTED
September 2001
Definitions
5. Loose use of the terms ‘survey’, 'inspection' and ‘audit’ can cause confusion.
The following definitions apply:
Assurance Requirements
“to provide an appropriate method for assuring that the required levels of
protection is being achieved. As part of this process the DSO should provide
the Head of the Department, or agency, with an annual Certificate of
Assurance. This certificate is designed to provide a formal assurance that the
organisation is achieving the required levels of protective security and to
highlight areas of specific security concern.”
2
RESTRICTED
D/DDefSy/170/9/1/1 RESTRICTED
September 2001
In the MOD the DSO delivers this assurance by submitting an annual report to the
Defence Audit Committee. This report is dependent on the contributions provided by
TLB Holders/TFCEs covering the state of all aspects of protective security for their
respective areas of responsibility, reported against criteria and other guidance provided
by the DSO. In future, the feedback from the independent audit function carried out by
the DSSO will be an important contribution to the DSO's report.
7. While management of the security risk, in accordance with the policy guidance
in DSO Guidance Note No. 2, will be delegated to TLB Holders/TFCEs, it will be
necessary to have consistent sets of baseline criteria to inform not only TLB decisions
on resource allocation and the inspection regime, but also the DSSO audit process.
The majority of these criteria will be in the form of advisory guidance although a few
will be mandatory. These baseline criteria will be promulgated in DSO Guidance Notes
pending publication of the New JSP 440. This approach will involve the use of two
tools in particular:
Categorisation of Establishments
3
RESTRICTED
D/DDefSy/170/9/1/1 RESTRICTED
September 2001
Notes:
10. Individual establishments and lodger units within a large site should be
assessed according to their individual assets and vulnerabilities. The fact, for instance,
that the perimeter and Service living accommodation on a large site is designated P1
for ‘threat to life’ reasons and includes a sensitive unit that requires a Category A2
rating, should not be taken to mean that each and every establishment on the site
should be accorded the same Category A2 rating regardless of the activities conducted
within its own discrete area. Where there is a specific area within an establishment
that requires a higher category, e.g. an operations or communications centre, it may be
categorised separately from the remainder of the establishment and the remainder may
then be placed in a lower category for inspection purposes.
4
RESTRICTED
D/DDefSy/170/9/1/1 RESTRICTED
September 2001
11. There are four Criticality Levels (CL1, CL2, CL3 and CL4), which are used to
gauge the impact of any disruption to CIS, or exploitation of any information they
contain. The criteria for establishing the right criticality level for CIS are in Issue 2 of
JSP 440, Volume 3 Chapter 1.
12. TLB Holders/TFCEs will be required to carry out a security survey when an
establishment is first formed, is reorganised and changes its role, or on completion of
major works services. The comprehensive survey report will be the baseline against
which future protective security of the establishment will be measured. Additional
security surveys may be conducted in response to special requirements of the TLB
Holders/TFCEs. This is no change to the pre-SSR regime.
13. The pre-SSR inspection régime was mandatory in character, and a new régime
is required to reflect TLB Holders’/TFCEs’ delegated responsibilities for security risk
management and a more flexible approach to managing all aspects of the changing
threat. Threats to Defence establishments vary widely, as do their vulnerabilities.
Although every establishment should be subject to periodic formal security inspection,
the programme should reflect these differences. In determining the frequency of
inspections for establishments within their area, TLB Holders/TFCEs will need to
consider various factors. These will include: the criticality of the establishment’s
output in meeting management plan objectives, the risk profile, the outcome of
previous inspections and audits, turnover of key personnel, and any mandated
requirements. TLB/TF inspection reports will provide a major input into the DSO’s
annual Certificate of Assurance. TLB Holders/TFCEs may elect to supplement formal
inspections by advisory visits and by the completion of security questionnaires. The
guideline for the periodicity of inspections is shown in the categorization matrix
below:
5
RESTRICTED
D/DDefSy/170/9/1/1 RESTRICTED
September 2001
14. It will be for TLB Holders/TFCEs to determine the detailed form of their own
inspections, adjusting the emphasis to take account of the importance of the
establishment's outputs to the TLB/TF, its risk profile and security history. Guidance
on best practice on the form and conduct of security inspections will be promulgated
separately.
15. TLB Holders/TFCEs may opt to inspect at more frequent intervals than given
in the above matrix, in accordance with their risk management and resource decisions.
If they elect to inspect establishments in a given category at intervals greater than the
periodicity indicated in the matrix, TLB Holders/TFCEs will be required to provide an
audit trail and rationale for the decision as part of the process of their reporting of
security assurance and subsequent audit.
16. For many establishments, the guidance periodicity for asset and guarding
categories will differ. It will be for TLB Holders/TFCEs to schedule their inspections
programme so that both asset and guarding elements are inspected satisfactorily. As a
guide, when asset and guarding category periodicities differ, the asset category
periodicity should be taken as the driver for the conduct of comprehensive inspections,
and the guarding category periodicity for supplementary inspections of relevant
Counter Terrorist (CT) measures. TLB Holders/TFCEs might, for example, choose to
schedule these additional CT inspections around the mid point between comprehensive
inspections. The following examples illustrate the options open to TLB Holders /
TFCEs:
6
RESTRICTED
D/DDefSy/170/9/1/1 RESTRICTED
September 2001
Conclusion
17. Following the SSR, the implementation of protective security in the MOD is
the responsibility of TLB Holders / TFCEs as owners of the risk. They will have
support from specialist security staffs. TLB Holders/TFCEs will need to prioritise the
allocation of inspection resources in accordance with their interpretation of a Defence-
wide system of categorising establishments dependent on the threat faced. The
implementation of protective security by TLB Holders/TFCEs may involve variation
from advisory baseline criteria set by DDefSy in accordance with their risk
management decisions, and they will maintain an auditable record of their security
decisions and processes.
Gloria Craig
Gloria Craig
DSO
SY 326 80462MB
Annex:
7
RESTRICTED
D/DDefSy/170/9/1/1 RESTRICTED
September 2001
Intentionally Blank
8
RESTRICTED
D/DDefSy/170/9/1/1 RESTRICTED
September 2001
Category A1. (Risk Impact High). Establishments with a nuclear role and
holding nuclear weapons or Special Nuclear Material (SNM).
A-1
RESTRICTED
D/DDefSy/170/9/1/1 RESTRICTED
September 2001
Category C1. (Risk Impact Low). Establishments holding assets or carrying out
a role the loss, disruption or compromise of which would cause difficulty in
maintaining the operational effectiveness or a key business output of the TLB/TF
or MOD.
A-2
RESTRICTED
D/DDefSy/170/9/1/1 RESTRICTED
September 2001
A-3
RESTRICTED
D/DDefSy/170/9/1/1 RESTRICTED
September 2001
(2) SFA areas, and buildings and areas outside the scope of P1 and
P2 that are recognised MOD/Service social centres, e.g. NAAFI clubs,
recreation clubs or Messes in which people are not accommodated.
A-4
RESTRICTED
D/D Def Sy/170/3/2/3 RESTRICTED
October 2001
Background
2. The policy on ID Cards and Passes is one such area where co-ordination by the
Centre is required if access to units/establishments across the Department is to be
efficiently and securely managed. It is stressed, however, that nothing in any policy shall
interfere with the Head of Establishment’s/Commanding Officer’s (HoE/CO) ultimate
responsibility for the security of his/her establishment and, therefore, he/she will have the
final say on authorising entry to that particular site.
Strategic Policy
3. The MOD policy on Identity Cards and Passes issued by the Director of Defence
Security (D Def Sy) is intended to provide a framework upon which individual
TLB/Comd/TF can develop consistent implementation of their access control régimes. The
strategic intent, developed in response to the direction given by 2nd PUS, is that MOD
employees, both Service and civilian, should be able to move about the MOD estate with
the minimum amount of security checks commensurate with the prevailing threat levels.
Annex A is a wiring diagram of the security structure within MOD as it applies to this
issue.
1
RESTRICTED
D/D Def Sy/170/3/2/3 RESTRICTED
October 2001
General Principles
5. The policy has additionally been guided by the following principles:
d. The generic new pass designs, which have been approved by the PSyAs,
shall be gradually introduced across the MOD, within a timescale agreed between
D Def Sy and the appropriate PSyA. However, those local designs currently in use
should run their course in order to avoid waste. Additionally, those establishments
whose staff have no requirement to visit any other MOD establishment(s) may
continue to use locally produced single site passes.
2
RESTRICTED
D/D Def Sy/170/3/2/3 RESTRICTED
October 2001
Further Information
5. The revised policy is set out in the following Annexes:
a. Definitions - Annex B.
Effective Date
The introduction of the generic MOD Pass, and the acceptance of Defence Identity Cards
to provide access across the Defence estate, is to take effect with effect from 1 October
2001. Additionally, the possible introduction of a generic pass for MOD vehicles is
currently being discussed with TLB/Comd.
Gloria Craig
Gloria Craig
DSO
SY 326 80462MB
3
RESTRICTED
D/D Def Sy/170/3/2/3 RESTRICTED
October 2001
Intentionally Blank
4
RESTRICTED
RESTRICTED
MOD HQ
Director of Defence Security
Attend DIDCAC Defence Logistics Organisation Central TLB Defence Procurement Agency
as required DLO HQ MOD MB DPA HQ
SyA-4 CB(Sy)2c SyA-3
HQ NI Meteorological Office UK Hydrographic Office Defence Aircraft Repair Defence Science &
SO2 G2 PSyA PSyA Agency Technology Laboratory
PSyA SyA – Porton Down
A-1
RESTRICTED
RESTRICTED
Intentionally
Blank
A-2
RESTRICTED
RESTRICTED
Annex B to
DSO Guidance Note No 4
DEFINITIONS
b. Controlled Area. An area which may be entered only upon the presentation of
valid appropriate identification.
c. Special Area. In terms of ID Cards and Passes a Special Area is one which requires
additional control of entry procedures on security or health and safety grounds. This means
that a local pass will be issued for entry into such areas and that a Defence ID Card or
Generic MOD Pass will not grant automatic access. To define an entire establishment as a
Special Area will require the approval of the TLB/Comd/TF PSyA. Sections, sub-units and
lodger units within an establishment can be defined as Special Areas by the HoE/CO if
required.
e. Generic MOD Pass. This new document (design approved by D Def Sy) is
anonymous as to area, enabling the registered holder to enter a controlled area or number of
areas. Such passes may be issued to:
• Contractors.
Colour coded RED and of two types (Security Check or Basic Check)
f. Local Pass. A document, (design approved by D Def Sy) anonymous as to area, that
is issued by establishments who are not yet able, or have no need, to issue Generic MOD
B-1
RESTRICTED
RESTRICTED
Passes. It may also be document anonymous as to area, enabling the registered holder to
enter a single Special Area.
g. TRIGRAM. A unique three letter identifier on the front of the MOD Generic Pass
which is issued by D Def Sy through TLB/Command PSyAs. Its purpose is to identify the
establishment or group of establishments to which the pass holder has authorised access as
agreed by the appropriate TLBs/Commands.
B-2
RESTRICTED
RESTRICTED
Annex C to
DSO Guidance Note No 4
1. Defence ID cards will be accepted as passes to all MOD establishments at which the holder
has legitimate business. The following cards are currently authorised:
• Royal Navy )
• Royal Naval Reserve )
• Royal Fleet Auxiliary ) (Form S1511 Revised 4/98)
• Royal Navy Exchange )
• Royal Navy Careers Service )
• Royal Navy Retired (Retired Officer Grades) (Form S1511 8/95)
The holder must produce this card if requested to do so by a duly appointed person in the
execution of his/her duty. Its loss must be reported to the issuing authority immediately.
IF FOUND, THIS PASS SHOULD BE PLACED IN THE NEAREST POST BOX FOR
RETURN TO: FREEPOST, PO BOX 3037, LONDON N1 IBR .”
Single Services/TLBs//TFs who wish to use their own return FREEPOST address for lost ID cards,
as in the case of the Royal Navy, should arrange this directly with Consignia (new name for the
Post Office) and amend the above wording accordingly.
C-1
RESTRICTED
RESTRICTED
4. Security staffs who wish to authenticate Defence ID Card should contact the following:
5. Defence ID cards are to be returned to the issuing/release authority for cancellation when the
holder is no longer entitled, under instructions issued by the single Services.
C-2
RESTRICTED
RESTRICTED
Annex D to
DSO Guidance Note No 4
1. D Def Sy has approved a generic design for MOD establishment passes. Each
establishment or group of establishments will have a unique three letter ‘TRIGRAM’ which will
indicate the access rights of the holder.
2. There are four types of pass that use the generic design as follows:
This pass will authorise entry into the issuing establishment and may be accepted at other
establishments on agreements reached by the appropriate HoE/CO and approved by their
respective PSyAs.
d. Single Site Pass. May be issued at the discretion of the HoE/CO to the following:
a. MOD Employees:
D-1
RESTRICTED
RESTRICTED
d. Single Site Pass. Maximum 3 years or any shorter period determined by PSyA or
HoE/CO.
The holder must produce this card if requested to do so by a duly appointed person in
the execution of his/her duty. Its loss must be reported to the issuing authority
immediately.
IF FOUND, THIS PASS SHOULD BE PLACED IN THE NEAREST POST BOX FOR
RETURN TO: FREEPOST, PO BOX 3037, LONDON N1 IBR .”
Single Services/TLBs/TFs who wish to use their own return FREEPOST address for lost passes,
as in the case of the Royal Navy, should arrange this directly with Consignia (new name for the
Post Office) and amend the above wording accordingly.
D-2
RESTRICTED
RESTRICTED
(when complete)
Annex E to
DSO Guidance Note No 4
Please find enclosed a copy of new pass/ID Card/Certificate of Credentials* design for your
approval and the issue of an SP number and/or TRIGRAM.*
Name:
Rank/Grade:
Appointment:
This design is recommended / not recommended and forwarded to D Def Sy for approval.
Name:
Rank/Grade:
Appointment:
Tel Ext:
For D Def Sy Use:
This pass/ID card/Certificate of Credentials design is approved / not approved for the following
reason(s):
D Def Sy-Phys(Tech)
for Director of Defence Security
RESTRICTED
(when complete)
RESTRICTED
(when complete)
Intentionally
Blank
RESTRICTED
(when complete)
RESTRICTED
Annex F to
DSO Guidance Note No 4
1. Ultimately, D Def Sy intend to submit a proposal to have a central database of all passes,
ID cards and where appropriate the security clearance levels of personnel. Careful consideration
is being given to the associated security and data protection issues and a trial system called Site
Access Management Systems Link (SAMSLINK) is currently being evaluated.
2. Initial indications from the trial suggest that considerable savings can be achieved, in both
terms of time and cost, in the secure processing of visitors to MOD establishments and the
authentication of valid MOD ID cards and passes. Additionally, the system can be used by
establishments for asset tracking, traffic management and for the production of building or site
occupancy data in the event of an emergency.
3. Much work and consultation is still required before such a system can be introduced.
However, D Def Sy is co-ordinating its efforts with staff from DG Info and their work on smart
cards. In the meantime, two initial wiring diagrams of the proposed system are at Appendix 1.
Comments regarding SAMSLINK or the proposed central database are invited and are to be
addressed to D Def Sy-Phys(Tech) through the appropriate PSyA staff officer detailed in Annex
A
F-1
RESTRICTED
RESTRICTED
Intentionally
Blank
F-2
RESTRICTED
RESTRICTED
Appendix 1 to Annex F
PAN-MOD SITE ACCESS MANAGEMENT SYSTEM
CENTRAL DATABASE – ID CARDS & PASSES
MOD RN
Notification of
Central Database Personnel Mgt
Clearance Status Notification of Employees and ID
(ID Cards/Passes & Card Watemark Numbers
Security Clearances)
Army
Personnel Mgt
Notification of
Defence Vetting Agency Exchange of Data Lost or Stolen Passes
RAF
Personnel Mgt
Civilian Mgt
Navy Units Central TLB Establishments HQ MDP
RN Signal
Army Units DLO Establishments
Reporting
System
HQ NI Units
Civil Police
F-1-1
RESTRICTED
RESTRICTED
Intentionally
Blank
F-1-2
RESTRICTED
RESTRICTED
MOD SECURITY SITE ACCESS MANAGEMENT
UNIT / ESTABLISHMENT DIAGRAM
MOD
Central Database
(ID Cards/Passes &
Security Clearances)
Defence Vetting Agency
MOD Staff
Vehicles Personnel Evacuation Reports
Contract Staff