wikileaks ico  Home papers ico  Cables mirror and Afghan War Diary privacy policy Privacy
Identifier
Created
Classification
Origin
09STATE23578
2009-03-12 18:26:00
SECRET//NOFORN
Secretary of State
Cable title:  

TEMPEST COUNTERMEASURES REQUIREMENTS - SEOUL

Tags:   AADP  ABLD  ACOA  AMGT  ASEC  KSEO  KRIM  KGIT  KNET  KCIP 
pdf how-to read a cable
VZCZCXYZ0000
RR RUEHWEB

DE RUEHC #3578 0711843
ZNY SSSSS ZZH
R 121826Z MAR 09
FM SECSTATE WASHDC
TO RUEHUL/AMEMBASSY SEOUL 0000
INFO RUEHBK/AMEMBASSY BANGKOK 0000
RUEHBJ/AMEMBASSY BEIJING 0000
RUEHML/AMEMBASSY MANILA 0000
						S E C R E T STATE 023578 

NOFORN
SEOUL FOR RSO IMO AND ESO
BEIJING FOR ESC
MANILA FOR RDSE (ACTING)
BANGKOK FOR RIMC
SIPDIS

E.O. 12958: DECL: UPON CLOSURE OF U.S. EMBASSY SEOUL
TAGS: AADP ABLD ACOA AMGT ASEC KSEO KRIM KGIT KNET KCIP
SUBJECT: TEMPEST COUNTERMEASURES REQUIREMENTS - SEOUL

REF: 00 STATE 126075

Classified By: M.J. STEAKLEY, DS/ST/CMP, REASON: 1.4 (C) AND (G)

S E C R E T STATE 023578

NOFORN
SEOUL FOR RSO IMO AND ESO
BEIJING FOR ESC
MANILA FOR RDSE (ACTING)
BANGKOK FOR RIMC
SIPDIS

E.O. 12958: DECL: UPON CLOSURE OF U.S. EMBASSY SEOUL
TAGS: AADP ABLD ACOA AMGT ASEC KSEO KRIM KGIT KNET KCIP
SUBJECT: TEMPEST COUNTERMEASURES REQUIREMENTS - SEOUL

REF: 00 STATE 126075

Classified By: M.J. STEAKLEY, DS/ST/CMP, REASON: 1.4 (C) AND (G)


1. (S/NF) These revised TEMPEST countermeasures requirements
are effective immediately. Requirements apply to the Chancery
at Seoul, located at 82 Sejong-ro. Post's relevant threat
levels at the time of this telegram are High for Technical
and High for Human Intelligence.


2. (S) TEMPEST requirements are determined by the Certified
TEMPEST Technical Authority (CTTA) and approved by the
Countermeasures Division Director. These requirements apply
to all information processing systems for this facility.


A. (S) TOP SECRET and SCI CLASSIFIED Automated Information
System (AIS): Post is authorized to use TEMPEST Level 1 AIS
equipment for processing classified national security
information (NSI) at the TOP SECRET or SCI level within the
Embassy core area of the CAA. Post is authorized to use
Commercial-off- the-Shelf (COTS) AIS equipment within a CSE
or equivalent that meets NSA 94-106 specifications. Use of
higher level equipment is approved.


B. (S) SECRET (COLLATERAL) CLASSIFIED (AIS): Seoul is
authorized to use TEMPEST Level 1 AIS equipment for
processing classified NSI at the SECRET level within
restricted and core areas of the CAA. Post was previously
authorized Zone A equipment, but that equipment category is
being phased out and is no longer being procured. By October
1, 2013, Seoul must have replaced all Zone A classified
processing equipment with TEMPEST Level 1 equipment. Post is
authorized to use COTS AIS equipment within a certified

shielded enclosure (CSE) or equivalent that meets NSA 94-106
specifications.


C. (S) SENSITIVE BUT UNCLASSIFIED AIS: Use of COTS AIS for
processing unclassified and sensitive but unclassified (SBU)
within the Embassy restricted area and core area of the CAA
is approved. Unclassified and multimedia equipped
unclassified processing equipment to be used within a CAA
must be purchased, shipped, stored, installed, maintained and
repaired in accordance with 12 FAH-6 H-542, and may not be
located inside a CSE.


3. (S) Secure video teleconferencing (SVDC), if requested,
will be addressed in a SEPTEL following completion of
coordination with VCI/VO.


4. (S) All Classified Automated Information System (CAIS)
equipment, components and peripherals must be secured in
accordance with Overseas Security Policy Board (OSPB)
requirements for classified discussion, processing and/or
storage overseas. Thin Clients with embedded flash memory,
at facilities with 24-hour cleared American presence, are
permitted to remain unsecured within the Controlled Access
Areas (CAA) as long as the equipment is rebooted prior to
vacating the premises.


5. (S) Fiber optic cabling is required for classified
connectivity. Fiber optic cabling is also required for
unclassified (SBU) connectivity for any IT equipment located
within a CSE. Equipment used to process classified
information outside a CSE must be installed, to the maximum
extent possible, in accordance with Recommendation A of
NSTISSAM TEMPEST 2-95 with the following additional
requirements:

- Be located a minimum of one meter (three feet spherical)
from other computer and electronic equipment used for
unclassified information processing.

- Be located a minimum of one meter (three feet spherical)
from telephones, modems, facsimile machines, and unshielded
telephone or signal lines that do not leave USG-controlled
property (for example, phone lines that go to the post phone
switch).

- Be located a minimum of two meters (six feet spherical)
from telephones, modems, facsimile machines, and unshielded
telephone or signal lines that transit USG-controlled
property (for example, direct phone lines that do not go
through the post telephone switch, telephone switch lines
going out, any wire going to antennas on the roof, etc).

- Be located a minimum of 3 meters (ten feet spherical) from
active radio transmitters (two-way radios, high frequency
transceivers, satellite transceivers, cellular devices,
Wi-Fi devices, Bluetooth, etc.) and must not use the same AC
power circuit as active radio transmitters (to include cell
phone chargers).

- Be located a minimum of three meters (ten feet spherical)
from cable television antenna feeds and any Warren switch
with the switch on. This distance can be reduced to one
meter if the Warren switch is off when processing classified.

- Be located to have no physical contact with any other
office equipment or cabling.


6. (S) Classified conversations up to SECRET may be conducted
in the CAA offices or vaults in accordance with 12 FAH-6
H-313.10-4. Classified discussions shall be conducted in CAA
spaces with DS-approved acoustic countermeasures or in secure
conference rooms (SCRs) or equivalent according to the OSPB
Conduct of Classified Conversations standard. Classified
conversations above the SECRET level are restricted to
relevant core areas.


7. (U) All requirements apply to all agencies under Chief of
Mission authority and pertain to the Chancery building only.
Tenant agencies may employ additional TEMPEST countermeasures
within their respective offices.


8. (U) For further information or clarification regarding 12
FAH-6 H-540 Automated Information Systems Standards, please
contact DS/CS/ETPA. For other, TEMPEST related issues,
please contact the Department CTTA at DSCTTA@state.sgov.gov.


9. (U) Post must verify that these TEMPEST countermeasures
have been implemented and report so in an updated Technical
Security Assessment (TSA). All proposed change requests to a
CAA countermeasures environment must be sent to the
Department, identified for DS/ST/CMP action.


10. (U) This telegram should be retained by Post until
superseding requirements are received.
CLINTON