*USAREUR Regulation 380-40

Security

Safeguarding and Controlling Communications Security Material

2 May 1996


*This regulation supersedes USAREUR Regulation 380-40, 24 November 1992.


This version includes change 1, 29 May 1996 and change 2, 27 Feb 1997.


For the Commander in Chief:

DAVID L. BENTON III
Major General, GS
Chief of Staff

Official:

Seal

ROBERT L. NABORS
Brigadier General, GS
Deputy Chief of Staff,
Information Management

Summary. This regulation establishes policy and prescribes procedures for safeguarding, controlling, and disposing of communications security material in USAREUR.

Applicability. This regulation applies to organizations supported by USAREUR that handle COMSEC material.

Supplementation. Commanders will not supplement this regulation without Commander in Chief, USAREUR (AEAGB-CI-S), approval.

Forms. This change prescribes three new forms: AE Form 380-40A-R (Accountability Register for DD Form 2501 (Courier Authorization)), AE Form 380-40B-R (COMSEC Custodian STU-III-Key Accountability Record), and AE Form 380-40C-R (Key Management Worksheet). These forms may be reproduced locally on 81/2- by 11-inch paper through the servicing forms management office.

Suggested Improvements. The proponent of this regulation is the Office of the Deputy Chief of Staff, Intelligence, HQ USAREUR/7A (AEAGB-CI-S, 370-8179/6564). Users may send suggestions to improve this regulation on DA Form 2028 (Recommended Changes to Publications and Blank Forms) to the Commander in Chief, USAREUR, ATTN: AEAGB-CI-S, Unit 29351, APO AE 09014.

Distribution. Distribute according to DA Form 12-88-E, block 0800, command level A.


CONTENTS

1. Purpose
2. References
3. Terms and Abbreviations
4. Responsibilities
5. Resolving Conflicts
6. Controlling Top Secret Crytokey
7. Transporting COMSEC Key
8. Emergency Plan Coordination and Approval
9. Command COMSEC Inspections
10. COMSEC-Incident Reporting
11. STU-III Installation in Private Residences
12. Foreign Access
13. Cryptographic Access Program
14. AE 380-40 Series

Appendixes
A. References
B. Security Telephone Unit, Third Generation, Program Guidance

Glossary


1. PURPOSE
This regulation establishes policy and assigns responsibilities for safeguarding and controlling communications security (COMSEC) material in USAREUR. This regulation will be used with AR 380-19, AR 380-40, DA Pamphlet 25-16, DA Pamphlet 25-380-2, and Technical Bulletin (TB) 380-41.

2. REFERENCES
Appendix A lists references.

3. TERMS AND ABBREVIATIONS
AR 380-19, AR 380-40, and publications listed in appendix A explain terms used in this regulation. The glossary defines abbreviations used in this regulation.

4. RESPONSIBILITIES

5. RESOLVING CONFLICTS

6. CONTROLLING TOP SECRET CRYPTOKEY
Top Secret cryptokey will be controlled and protected according to AR 380-40, with the following exceptions:

7. TRANSPORTING COMSEC KEY

8. EMERGENCY PLAN COORDINATION AND APPROVAL

9. COMMAND COMSEC INSPECTIONS
Each COMSEC account and subaccount will receive a command COMSEC inspection (AR 380-40). A command COMSEC inspector will be appointed at appropriate echelons to conduct these inspections. The inspector will send a report for each inspection to the Commander in Chief, USAREUR, ATTN: AEAGB-CI-S, Unit 29351, APO AE 09014.

10. COMSEC-INCIDENT REPORTING

ACTION ADDRESSEES:
CONAUTH
DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-IN//
INFO:
HIGHER HQ AS DIRECTED BY UNIT SOP
DIRNSA FT MEADE MD//V51A//
DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-OR/SELCL-KP-KEY//
(USAREUR COMMAND)
CINCUSAREUR HEIDELBERG GE//AEAGB-CI-S/AEAIM-CO-SI//
CDR 66TH MI GP AUGSBURG GE//IAPGE-OPU//
NCEUR VAIHINGEN GE//F29//
USATCMOEUR 11TH SIG DET WORMS GE//ASQE-CLC-CMO/5BE001//
CUSALAOEUR SECKENHEIM GE//AMXLA-E-CCM//

ACTION ADDRESSEES:
DIRNSA FT MEADE MD//V51A//
DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-IN//
INFO:
HIGHER HQ AS DIRECTED BY UNIT SOP
CONAUTH
DIR USACCSLA FT HUACHUCA AZ//SELCL-KP- OR/SELCL-KP-KEY
(USAREUR COMMAND)
CINCUSAREUR HEIDELBERG GE//AEAGB-CI-S/AEAIM-CO-SI//
CDR 66TH MI GP AUGSBURG GE//IAPG-SAS//
NCEUR VAIHINGEN GE//F29//
USATCMOEUR 11TH SIG DET WORMS GE//ASQE-CLC-CMO/5BE001//
CUSALAOEUR SECKENHEIM GE//AMXLA-E-CCM//

ACTION ADDRESSEE:
DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-IN//
INFO:
HIGHER HQ AS DIRECTED BY UNIT SOP
DIRNSA FT MEADE MD//V51A//
DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-OR/SELCL-KP-KEY//
(USAREUR COMMAND)
CINCUSAREUR HEIDELBERG GE//AEAGB-CI-S/AEAIM-CO-SI//
CDR 66TH MI GP AUGSBURG GE//IAPG-SAS//
NCEUR VAIHINGEN GE//F29//
USATCMOEUR 11TH SIG DET WORMS GE//ASQE-CLC-CMO/5BE001//
CUSALAOEUR SECKENHEIM GE//AMXLA-E-CCM//

ACTION ADDRESSEES:
DIRNSA FT MEADE MD//V51A//
DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-IN//
INFO:
HIGHER HQ AS DIRECTED BY UNIT SOP
CONAUTH
DIR USACCSLA FT HUACHUCA AZ//SELCL-KP- OR/SELCL-KP-KEY//
(USAREUR COMMAND)
CINCUSAREUR HEIDELBERG GE//AEAGB-CI-S/AEAIM-CO-SI/AEAGD-SM-S//
CDR 66TH MI GP AUGSBURG GE//IAPG-SAS//
NCEUR VAIHINGEN GE//F29//
USATCMOEUR 11TH SIG DET WORMS GE//ASQE-CLC-CMO/5BE001//
CUSALAOEUR SECKENHEIM GE//AMXLA-E-CCM//

ACTION ADDRESSEES:
DIRNSA FT MEADE MD//V51A//
DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-IN//
INFO:
HIGHER HQ AS DIRECTED BY UNIT SOP
CINCUSAREUR HEIDELBERG GE//AEAGB-CI-S/AEAIM-CO-SI//
CDR 66TH MI GP AUGSBURG GE//IAPG-SAS//
(USAREUR COMMAND)
NCEUR VAIHINGEN GE//F29//
USATCMOEUR 11TH SIG DET WORMS GE//ASQE-CLC-CMO/5BE001//
CUSALAOEUR SECKENHEIM GE//AMXLA-E-CCM//

ACTION ADDRESSEES:
DIRNSA FT MEADE MD//V51A//
DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-IN//
INFO:
HIGHER HQ AS DIRECTED BY UNIT SOP
CINCUSAREUR HEIDELBERG GE//AEAGB-CI-S/AEAIM-CO-SI//
CDR 66TH MI GP AUGSBURG GE//IAPG-SAS//
(USAREUR COMMAND)
NCEUR VAIHINGEN GE//F29//
USATCMOEUR 11TH SIG DET WORMS GE//ASQE-CLC-CMO/5BE001//
CUSALAOEUR SECKENHEIM GE//AMXLA-E-CCM//

ACTION ADDRESSEE:
DIRNSA FT MEADE MD//V51A//
INFO:
HIGHER HQ AS DIRECTED BY UNIT SOP
CINCUSAREUR HEIDELBERG GE//AEAGB-CI-S/AEAIM-CO-SI//
CDR 66TH MI GP AUGSBURG GE//IAPG-SAS//
(USAREUR COMMAND)
DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-OR/SELCL-KP-KEY//
NCEUR VAIHINGEN GE//F29//
USATCMOEUR 11TH SIG DET WORMS GE//ASQE-CLC-CMO/5BE001//
CUSALAOEUR SECKENHEIM GE//AMXLA-E-CCM//

ACTION ADDRESSEES:
DIRNSA FT MEADE MD//V51A//
CONAUTH
INFO:
HIGHER HQ AS DIRECTED BY UNIT SOP
CINCUSAREUR HEIDELBERG GE//AEAGB-CI-S/AEAIM-CO-SI//
CDR 66TH MI GP AUGSBURG GE//IAPG-SAS//
(USAREUR COMMAND)
DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-OR/SELCL-KP-KEY//
NCEUR VAIHINGEN GE//F29//
USATCMOEUR 11TH SIG DET WORMS GE//ASQE-CLC-CMO/5BE001//
CUSALAOEUR SECKENHEIM GE//AMXLA-E-CCM//

ACTION ADDRESSEES:
DIRNSA FT MEADE MD//V51A//
CONAUTH
INFO:
HIGHER HQ AS DIRECTED BY UNIT SOP
CINCUSAREUR HEIDELBERG GE//AEAGB-CI-S/AEAIM-CO-SI//
CDR 66TH MI GP AUGSBURG GE//IAPG-SAS//
(USAREUR COMMAND)
DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-OR/SELCL-KP-KEY//
NCEUR VAIHINGEN GE//F29//
USATCMOEUR 11TH SIG DET WORMS GE//CLC-CMO/5BE001
CUSALAOEUR SECKENHEIM GE//AMXLA-E-CCM//

ACTION ADDRESSEES:
DIRUSACCSLA FT HUACHUCA AZ//SELCL-KP-IN//
CONAUTH (IF KEY IS INVOLVED)
INFO:
DIRNSA FT MEADE MD//V51A//
DIRUSACCSLA FT HUACHUCA AZ//SELCL-EP-C (CCISP)//
HIGHER HQ AS DIRECTED BY UNIT SOP
CINCUSAREUR HEIDELBERG GE//AEAGB-CI-S/AEAIM-CO-SI/AEAGD-SM-S//
(USAREUR COMMAND)
CDR 66TH MI GP//IAPG-SAS//
NCEUR VAIHINGEN GE//F29//
USATCMOEUR 11TH SIG DET WORMS GE//ASQE-CLC-CMO/5BE001//
CUSALAOEUR SECKENHEIM GE//AMXLA-E-CCM//

11. STU-III INSTALLATION IN PRIVATE RESIDENCES
Requests for STU-III installation in a private residence will be made according to this regulation, appendix B. Requesters must be high-level officials who require frequent secure-telephone-voice communication after normal duty hours. Officials not listed in USAREUR Regulation 25-22, appendix E, must submit requests through command channels to the Commander in Chief, USAREUR, ATTN: AEAGB-CI-S, Unit 29351, APO AE 09014, using the format in this regulation, figure B-1. The STU-III may be installed in residences of designated essential personnel for the duration of their service in that capacity in support of operations or contingencies. If the request is approved, the following standards and conditions must be met:

12. FOREIGN ACCESS

13. CRYPTOGRAPHIC ACCESS PROGRAM

14. AE 380-40 Series

Page ___ of ___ pages. The first blank is the sequential number of this page. The second blank is the total number of pages of the form.

Issuing authority. The command issuing the DD Form 2501.

Month and year. The month and year the form is being used.

Card number. The card number on the DD Form 2501.

Issued to. The name of the courier.

Issue date. The day, month, and year the DD Form 2501 is issued.

Expiration date. The day, month, and year the DD Form 2501 expires.

Courier's signature. The signature of the courier.

Security manager's signature. The signature of the security manager or a designated representative, which verifies the information on that line.

Date. The day, month, and year the form is first used.

Point of contact. The name of the person and the office to contact for information about the key.

Telephone number. The telephone number of the point of contact.

Location:

COMSEC account. The COMSEC account number of the unit issuing the key.

COMSEC custodian or alternate. The name of the COMSEC custodian or designated alternate who will issue the key to the user.

STU-III

Key classification. The security classification of the key (for example, Secret, Top Secret).

Key edition. The edition of the key in effect.

Master key serial number. The serial number of the master key.

CIK serial number. The serial number of the cryptoignition key (CIK).

Name and rank/grade. The typed or printed name and rank or grade of the person who receives the key.

Organization. The organization of the person who receives the key.

Signature. The signature of the person who receives the key.

CONAUTH. The cryptonet control station (CNCS) (for example, V Corps).

Date. The day, month, and year the form is first used.

Key ID. The key identification (ID) is the key-tag information (for example, COOL) (USAREUR Pam 380-40, app E, table E-1).

Key type. The type of key in use. Two entries will be required for each net using electronic rekeying procedures (for example, TEK, KEK).

COMSEC equipment. The equipment in which the key will be used (for example, MSE, KY-57, KY-99).

Classification. The classification of the key to be used.

Date generated. The day, month, and year the key was generated.

Effective period. The beginning and ending dates the key will be effective.

To/DTG. The date time group (DTG) the key is signed to the user.

From/DTG. The DTG the key is returned or zeroized.

Signature. The signature of the user.

NOTE: When filled in, this form is classified Confidential and will be protected according to AR 380-5. The form will be maintained for 90 days after all electronic keys entered on this form have been superseded.


Appendix A