APPENDIX G
STANDARDIZED COMSEC CUSTODIAN COURSE
G-2. PREREQUISITES
The following qualifications must be met before requesting an allocation to attend INTEL 34. Personnel must-
NOTE: Students arriving at the INTEL 34 course without this memorandum will be sent back to their units.
G-3. WAIVERS
Requests for waivers to prerequisites in the pamphlet, appendix B, paragraph B-2, should be sent through command channels to the Commander in Chief, USAREUR, ATTN: AEAGB-CI-S, Unit 29351, APO AE 09014. Requests should include-
G-4. EMERGENCY ALLOCATIONS
Requests for emergency allocations will be submitted through command channels to the course proponent (Commander in Chief, USAREUR, ATTN: AEAGB-CI-S, Unit 29351, APO AE 09014) and include the information in the pamphlet, appendix B, paragraph B-3.
APPENDIX H
MAIL AND MESSAGE ADDRESSES
Table H-1 reference list for mail and message addressees of offices in the basic pamphlet.
APPENDIX I
SAMPLE COMSEC INCIDENT OR CCI INCIDENT REPORT
Figure I-1 is a sample communication security (COMSEC) incident report according to AR 380-40. Blank parentheses in the sample indicate paragraphs could be classified.
___________________________________________________________________________ FROM: (REPORTING UNIT) TO: DIRNSA FT GEORGE G MEADE MD//V51A//(note 1) DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-IN// INFO: (HIGHER HQ AS DIRECTED BY UNIT STANDING OPERATING PROCEDURE) DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-OR/SELCL-KP-AU// (note 2) 66TH MI GP AUGSBURG GE//IAPG-SAS// (note 3) CDRUSAREUR HEIDELBERG GE//AEAGB-CI-S/AEAIM-CO-SI// CDRUSAREUR HEIDELBERG GE//AEAGD-SM-S// (note 4) CUSALAO EUROPE SECKENHEIM GE//AMXLA-E-CCM// NCEUR VAIHINGEN GE//F29// USATCMO EUR 11TH SIG DET MANNHEIM GE//AFSE-CLC-CMO/5BE001// (note 5) C O N F I D E N T I A L (SAMPLE - CLASSIFIED FOR TRAINING ONLY) (note 6) SUBJECT: COMSEC INCIDENT (U) OR CCI INCIDENT (U) (choose appropriate one) A. (U) AR 380-40, 01 SEP 94 B. (U) TB 380-41, CHAP 5, 01 OCT 94 C. (U) UR 380-40, PARA 10, 02 MAY 96 1. ( ) STATE WHETHER INITIAL, INITIAL/FINAL, AMPLIFYING, OR FINAL REPORT HERE. LIST COMSEC ACCOUNT, SUBACCOUNT, HAND-RECEIPT (FOR EXAMPLE, 5CE123-01-HR-05), OR PROPERTY BOOK OFFICER DODAAC FOR CCI INCIDENTS INVOLVING CONTROLLED CRYPTOGRAPHIC ITEMS (CCI). ONCE A CASE NUMBER HAS BEEN ASSIGNED TO AN INCIDENT, ALL AMPLIFYING REPORTS MUST STATE THE CASE NUMBER IN THIS PARAGRAPH. 2. ( ) MATERIAL IDENTIFICATION: (AS APPLICABLE) SHORT TITLE: USKAT 1234, EDITION: A, SEGMENTS: 25 THRU 31, TABLES: N/A, SETS: N/A, DAYS: 25-31, REG NO: 164, ALC: 1 (note 7). 3. ( ) BRIEF, PRECISE DESCRIPTION OF INCIDENT ACCORDING TO TB 380-41, PARAGRAPHS 5.28 THROUGH 5.30. IN THIS PARAGRAPH CLEARLY ADDRESS WHO, WHAT, WHEN, WHERE, WHY, AND HOW. INITIAL REPORTS MUST PROVIDE CONTROLLING AUTHORITIES (CONAUTHS) PRECISE FACTS SO PRECAUTIONARY MEASURES CAN BE DIRECTED (note 7). 4. ( ) PER AR 380-40, IDENTIFY TYPE OF INQUIRY OR INVESTIGATION PLANNED OR CONDUCTED ACCORDING TO AR 380-5 (note 6). NAME THE INVESTIGATING OFFICER (IF ASSIGNED). IAW AR 380-40, STATE ONE OF THE FOLLOWING (AS APPLICABLE): COMPROMISE, NO COMPROMISE, OR COMPROMISE CANNOT BE RULED OUT. 5. ( ) CONAUTH FOR ALL MATERIAL INVOLVED (note 7). 6. (U) DATE, TIME, AND NAME OF COORDINATION WITH CONAUTH. 7. ( ) THIS PARAGRAPH SHOULD PROVIDE ALL OTHER PERTINENT INFORMATION AVAILABLE (APPLICABLE TB 380-41, PARAGRAPHS 5.28 THRU 5.30, RESULTS OF INVESTIGATIONS, CORRECTIVE MEASURES IMPLEMENTED OR PLANNED TO PREVENT FUTURE INCIDENTS OF A SIMILAR NATURE). 8. (U) POC NAME, GRADE OR RANK, UNIT, AND DSN AND COMMERCIAL TELEPHONE NUMBERS. DERIVED FROM: MULTIPLE SOURCES (ONLY IF THIS IS A CLASSIFIED MESSAGE) DECLAS ON: DATE 10 YEARS FROM DATE OF MESSAGE (ONLY IF THIS IS A CLASSIFIED MESSAGE) ________________________________________________________________________ NOTES: 1. DIRNSA will be an action addressee on all COMSEC incident reports except those involving key at user or CONAUTH level, then DIRNSA will be an info addressee. DIR USACCSLA FT HUACHUCA AZ//SECL-KP-IN// will be action addressee on all CCI incidents. CONAUTH will also be an action addressee if key is involved. 2. DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-OR// will not be included on incident reports involving ALC 3 material. 3. Local CI control office to be included as an information addressee on all incidents. 4. The DCSLOG will be included as an information addressee on all incidents involving CCI. 5. USATCMO-E is included as an addressee only if the incident report effects edition status or effective dates for resupply (for example, supersession). 6. Classification guidance for message preparation is in AR 380-40 and TB 380-41, paragraph 5.1. 7. For physical incidents, reference TB 380-41, paragraph 5.28. For personnel incidents reference TB 380-41, paragraph 5.29. For cryptographic incidents reference TB 380-41, paragraph 5.30. ________________________________________________________________________
Figure I-1. Sample COMSEC or CCI Incident Report
SECTION I
MOBILE SUBSCRIBER EQUIPMENT (MSE) COMSEC GLOSSARY
AIRK
area interswitch rekey (see switch keys)
AKDC
Automatic Key Distribution Center, TSEC/KGX-93, (node center/large-extension nodes (NC/LENs))
AKMS
Army key management system
AN/CYZ-10
automatic net control device
BCOR
brigade COMSEC office of record. (This office is responsible for the generation and distribution of MSE keys to area signal battalions, CCOR, and DCORs.)
BCMO
brigade COMSEC management office
BT
bulk transfer
CCOR
corps COMSEC office of record (This office is responsible for MSE key distribution to users via the CMCS.)
CIK
cryptoignition key: normally issued via KSD-64 key fill devices (not currently used in MSE).
CIRK
common interswitch rekey (switdh keys).
CM
communications modem (orderwire keys).
COMSEC
communications security: COMSEC for the MSE network is achieved through netted cryptographic protection in four functional areas (T-O-S-S):
COMSEC Incident
Any incident that jeopardizes COMSEC. Such incidents should be reported immediately.
CMCS
COMSEC Material Control System. The system for accounting, safeguarding, and supply control of COMSEC material.
DCOR
division COMSEC office of record (This office is responsible for MSE key distribution to users via the CMCS.)
DTD
data transfer device (for example, AN/CYZ-10).
ETD
electronic key transfer device (for example, KYK-13/KYX-15).
Firefly
cooperative key technology (currently used in STU-IIIs).
HUS
hardened unique storage location for keys within the AKDC.
ICP
intertheater COMSEC package (This joint COMSEC key-tape system is held by the BCOR, the CCOR, and the DCORs. The BCOR loads ICP key at the PNCS and bulk transfers to NC/LENs as required.0
KEK
key encryption key (This key is used for over-the-air rekey (OTAR).)
key label
The identification (ID) assigned to electronically generated COMSEC key according to the unit SOP. As an example, V Corps MSE SOP for key labels is:
X N N N Z - ------- - ¦ ¦ +-- Edition ID: The BCOR assigns this ID for each new key generated. ¦ +-------- HUS location: The designated AKDC storage location. +-------------- Key type designator. This designator will be one of the following: A = AIRK N = CM Net key B = Bt T = TED C = CIRK U = U key K = CM Key transfer X = X key M = M key
key tag
electronic key ID used in data transfer devices (DTD) (table E-1).
KG-112
TSEC/KG-112 loop key generator (NC/LENs).
KG-194A
TSEC/KG-194A trunk encryption device (TED).
KOK-12/KOK-16
TSEC/KOK-12/KOK-16 electronic programmable COMSEC transfer devices used by COMSEC offices.
KSD-64A
Firefly key-fill device (not currently used in MSE).
KY-57
TSEC/KY-57 VINSON used to secure CM orderwire.
KY-68
TSEC/KY-68, digital subscriber voice terminal (DSVT).
KY-90
TSEC/KY-90, secure digital net radio interface (SDNRI).
KYK-13
COMSEC key transfer device issued to small-extension nodes (SENs), random-access units (RAUs), and subscriber terminals.
KYX-15A
COMSEC net control device issued to NC/LENs.
Leader NC
See SNCS
LEN
large-extension node
LKG
loop key generator, TSEC-112 (NC/LENs)
modem
A shortened version of modulator/demodulator. It is a device that connects a computers by using a telephone line.
MSNV
message switch net variable (switch keys)
MSRV
message switch rekey variable (switch keys)
NC
node center
NODE
A system connected to a network.
OTAR
over-the-air-rekey
OTAT
over-the-air-key transfer
PNCS
primary node center switch used for COMSEC key generation and distribution. Normally collocated with the signal brigade system control center (SYSCON).
RAU
random-access unit
SCCC
standardized COMSEC custodian course
SEN
small-extension node
SNCS
secondary node center switch (This switch is used for COMSEC key generation and distribution in the absence of the PNCS. It is also referred to as leader switch, which is typically collocated with signal battalion control centers (BATCONS).)
TED
trunk encryption device (for example, TSEC/KG-194A)
TEK
traffic encryption key
trunk keys
Four types of keys used with KG-194A trunk encryption devices (TEDs). This keys are-
orderwire keys
Two keys are used with the CM (KY-57) to provide secure orderwire capabilities:
SDNRI
secure digital net radio interface (for example, TSEC/KY-90)
subscriber keys
Three keys that are used to protect communications for mobile subscriber radio telephone (MSRT), wireline digital subscriber voice telephone (DSVT), and SDNRU (KY-90). These are-
SVAR
Procedures for loading S key in DSVTs for higher than Secret Collateral material transmitted over MSE. SVAR procedures are-
switch keys
The following are keys used by MSE NCs and LENs for secure-call processing:
TS/SCI
Top Secret/Sensitive Compartmented Information.
X key
See switch keys
V key
See switch keys
SECTION II
ABBREVIATIONS
66th MI Gp
66th Military Intelligence Group
ACCLAIMS
Army COMSEC Commodity Logistics Accounting and Information Management System
ACCOR
Army COMSEC Central Office of Record
ACE
Allied Command, Europe
AE
Army Europe
ALC
accounting legend code
AR
Army regulation
CATC
Combined Arms Training Center
CER
cryptoevaluation report
CCI
controlled cryptographic item
CCIR
change of custodian inventory report
cdr
commander
CF
central facility
CFAR
COMSEC facility approval request
CIK
cryptoignition key
CDRUSAREUR
Commander, United States Army, Europe
CJCSI
Chairman of the Joint Chiefs of Staff Intelligence
CMDSA
COMSEC Material Direct Support Activity
CNCS
cryyptonet control station
COMSEC
communications security
CONAUTH
controlling authority
COOP
continuity of operation
DA
Department of the Army
DACAP
Department of the Army Cryptographic Access Program
DCS
Defense Courier Service
DCSIM
Deputy Chief of Staff, Information Management, USAREUR
DCSINT
Deputy Chief of Staff, Intelligence, USAREUR
DCSLOG
Deputy Chief of Staff, Logistics, USAREUR
DCSOPS
Deputy Chief of Staff, Operations, USAREUR
DD
Department of Defense
DDMMYY
date to be filled in as a 2-digit number for the day (DD), month (MM), and year (YY)
DEROS
date expected to return from overseas
DIRNSA
Directory, National Security Agency
DOD
Department of Defense
DSN
Defense Switched Network
DTD
data-transfer device
DVOW
digital voice order wire
EAP
emergency action procedures
EKMS
Electronic Key Management System
ETS
estimated time of separation
FIS
foreign intelligence service
GDP
ground defensive position
GSA
General Services Administration
HUS
hardened unique storage
IAW
in accordance with
INSCOM
United States Army Intelligence and Security Command
INTEL 34
Standardized COMSEC Custodian Course-Europe
IR
item register
ISSM
information systems security manager
ISSO
information systems security officer
KAM
cryptographic operational maintenance manual
KAO
cryptographic operational operating manual
KEK
key encryption key
KSD
key storage device
LAR
logistics assistance representative
mm
millimeter
MOA
memorandum of agreement
MSE
mobile subscriber equipment
NAG
noncrytopgraphic operational general publication (coded)
NATO
North Atlantic Treaty Organization
NISPOM
National Industrial Security Program Operating Manual
NSA
National Security Agency
OADR
originating agency's determination required
OPCODE
operations code
OPLAN
operation plan
OTAD
over-the-air-key distribution
PBO
property book officer
PCS
permanent change of station
PLL
priority load list
PMO
provost marshal office
POV
privately owned vehicle
POC
point of contact
RCS
reports control symbol
reg
regulation
S2
intelligence office
S3
operations and training office
SAEDA
subversion and espionage directed against the United States Army
SAIR
semiannual inventory report
SCAR
Security Clearance Access Roster
SCCC
Standardized COMSEC Custodian Course
SCI
sensitive compartmented information
SCO
subcontrol office
SDNS
Secure Data Network System
SF
standard form
SOI
signal operation instructions
SOP
standing operating procedure
SST
secure subscriber terminal
STU-III
secure telephone unit, third generation
TB
technical bulletin
TBA
to be announced
TCLSC-E
Theater COMSEC Logistics Support Center-Europe
TI
technical inspection
TM
technical manual
TPI
two-person integrity
TRADOC
United States Army Training and Doctrine Command
TS
Top Secret
TSCM
technical surveillance countermeasures
U.S.
United States
USACCSLA
United States Army Communications-Electronics Command COMSEC Logistics Activity
USALAO-E
United States Army Logistics Assistance Office-Euorpe
USAREUR
United States Army, Europe