Career Field Education and Training Plan (CFETP)
On-The Job training Records.
Career Development Course (CDC)
Job Qualification Standard (JQS)
Career field subdivision
Communications administration, information manangement, and computer components.
Electronic principles, transmission systems, and wireless communications
Plans and implementation, land mobile radio, and programming
Cyber surety, C4 systems, and transmission lines.
Private, federal, and military spectrum manangement
Military, federal, and civil spectrum management
Military and civil spectrum management only
Comercial and federal only
The using activity
The radio technician
Installation spectrum manager
Communications squadron officer
Spectrum XXI database
Standard Frequency Action Format (SFAF)
DD Form 1494, Application for Equipment Frequency Allocation
Client systems technician (3D1X1)
Cyber transport technician (3D1X2)
Computer systems programmer (3D0X4)
Knowledge operations management (3D0X1)
While in storage
Upon contact with target
Facility is a class B rated vault and personnel gaurding the material know the combination to the lock
Facility is a class B rated vault and personnel gaurding the material do not know the combination to the lock
Stroage container is a non-GSA approved security container, but is modified with a hasp and an approved dial-type lock
Stroage container is a non-GSA approved security container, but is modified with two hasps and two approved three position dial-type locks.
On installations, COMSEC material need not to be sealed
During convoys, position COMSEC material in the lead vehicle.
During convoys, position COMSEC material in the middle of the convoy.
Off installations, enclose material in a sealed package or within a sealed briefcase.
Personnel, electronic, and physical
Physical, personnel, and cryptographic
Physical, electronic, and cryptographic.
Cryptographic, personnel, and electronic.
Immediately after the occurrence of the incident, and report it to the COMSEC responsible officer (CRO) or COMSEC manager.
Immediately after the occurrence of the incident, and report it to the group commander and security manager.
Within 12 hours of the occurrence of the incident, and report it to the CRO or COMSEC manager
Within 12 hours of the occurrence of the incident, and report it to the unit commander and security manager.
Using a compromised, superseded, or defective COMSEC key
Finding an electronic surveillance device in or near a COMSEC facility
Using COMSEC equipment without completing a required alarm-check test.
Discussing the details of a COMSEC equipment failure over an unsecured phone.
Lack of training
The level of classification on the system
Emissions security assessments
Technical surveillance team investigations
The dimensions of the building housing the equipment
For Official Use Only
Buffer overflow files
North Atlantic Treaty Organization Restricted
Confidential communications security