STANDARDIZED COMSEC CUSTODIAN COURSE
The following qualifications must be met before requesting an allocation to attend INTEL 34. Personnel must-
NOTE: Students arriving at the INTEL 34 course without this memorandum will be sent back to their units.
Requests for waivers to prerequisites in the pamphlet, appendix B, paragraph B-2, should be sent through command channels to the Commander in Chief, USAREUR, ATTN: AEAGB-CI-S, Unit 29351, APO AE 09014. Requests should include-
G-4. EMERGENCY ALLOCATIONS
Requests for emergency allocations will be submitted through command channels to the course proponent (Commander in Chief, USAREUR, ATTN: AEAGB-CI-S, Unit 29351, APO AE 09014) and include the information in the pamphlet, appendix B, paragraph B-3.
MAIL AND MESSAGE ADDRESSES
Table H-1 reference list for mail and message addressees of offices in the basic pamphlet.
Mail and Message Addresses
|Activity||Mail Address||Message Address|
|Office of the Deputy Chief of Staff, Intelligence, HQ USAREUR/7A||CDRUSAREUR|
APO AE 09014
|CDRUSAREUR HEIDELBERG GE//AEAGB-CI-S//|
|Office of the Deputy Chief of Staff, Operations, HQ USAREUR/7A||CDRUSAREUR|
APO AE 09014-0103
|CDRUSAREUR HEIDELBERG GE//AEAGC-O-C3//|
|Office of the Deputy Chief of Staff, Logistics, HQ USAREUR/7A||CDRUSAREUR|
APO AE 09014
|CDRUSAREUR HEIDELBERG GE//AEAGD-SM-S//|
|C4 and Systems Integration Division, Office of the Deputy Chief of Staff Information Management, HQ USAREUR/7A||CDRUSAREUR|
APO AE 09014
|CDRUSAREUR HEIDELBERG GE//AEAIM-CO-SI//|
|5th Signal Command||Commander|
5th Signal Command
APO AE 09056
|CDR 5TH SIG CMD MANNHEIM GE//AFSE-IS-S//|
|Sub-Control Office, S3, 66th MI Gp||Commander|
66th Military Intelligence Group (Provisional)
APO AE 09178
|CDR 66THMIGP AUGSBURG GE//IAPG-SAS//|
|Communications Security Logistics Activity||Director|
U. S. Army Communications-Electronics Electronics Command, Communications Security Logistics Activity
Fort Huachuca, AZ 85613-7090
|CDR USACCSLA FT HUACHUCA AZ//SELCL-XX//(note)|
|United States Communications-Electronics Command, Communications Security Logistics Activity, Europe||Chief|
Communications Security, Logistic Activity, Europe
APO AE 09266
|CH USALAO SECKENHEIM GE//AMXLA-E-CCM//|
|United States Army Theater COMSEC Management Office, Europe||Commander|
United States Army Theater COMSEC Management Office, Europe
APO AE 09058
|USATCMO-EUR 11TH SIG DET MANNHEIM GE//AFSE-CLC-CMO/5BE001//|
|United States Army Theater COMSEC Logistics Supply Center, Europe, Maintenance Division||Commander|
United States Army Theater COMSEC Logistic Supply Center, Europe
APO AE 09058
|USATCLSC-EUR 11TH SIG DET MANNHEIM GE//AFSE-CLC-M//5JE519//|
|Headquarters, United States Army Material Command-Europe Central COMSEC Facility||Commander United States Army Materiel Command-Europe |
APO AE 09266
|CRD USAMC-E SECKENHEIM GE//5BE002//|
|NOTE: *Other office symbols are --|
SAMPLE COMSEC INCIDENT OR CCI INCIDENT REPORT
Figure I-1 is a sample communication security (COMSEC) incident report according to AR 380-40. Blank parentheses in the sample indicate paragraphs could be classified.
___________________________________________________________________________ FROM: (REPORTING UNIT) TO: DIRNSA FT GEORGE G MEADE MD//V51A//(note 1) DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-IN// INFO: (HIGHER HQ AS DIRECTED BY UNIT STANDING OPERATING PROCEDURE) DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-OR/SELCL-KP-AU// (note 2) 66TH MI GP AUGSBURG GE//IAPG-SAS// (note 3) CDRUSAREUR HEIDELBERG GE//AEAGB-CI-S/AEAIM-CO-SI// CDRUSAREUR HEIDELBERG GE//AEAGD-SM-S// (note 4) CUSALAO EUROPE SECKENHEIM GE//AMXLA-E-CCM// NCEUR VAIHINGEN GE//F29// USATCMO EUR 11TH SIG DET MANNHEIM GE//AFSE-CLC-CMO/5BE001// (note 5) C O N F I D E N T I A L (SAMPLE - CLASSIFIED FOR TRAINING ONLY) (note 6) SUBJECT: COMSEC INCIDENT (U) OR CCI INCIDENT (U) (choose appropriate one) A. (U) AR 380-40, 01 SEP 94 B. (U) TB 380-41, CHAP 5, 01 OCT 94 C. (U) UR 380-40, PARA 10, 02 MAY 96 1. ( ) STATE WHETHER INITIAL, INITIAL/FINAL, AMPLIFYING, OR FINAL REPORT HERE. LIST COMSEC ACCOUNT, SUBACCOUNT, HAND-RECEIPT (FOR EXAMPLE, 5CE123-01-HR-05), OR PROPERTY BOOK OFFICER DODAAC FOR CCI INCIDENTS INVOLVING CONTROLLED CRYPTOGRAPHIC ITEMS (CCI). ONCE A CASE NUMBER HAS BEEN ASSIGNED TO AN INCIDENT, ALL AMPLIFYING REPORTS MUST STATE THE CASE NUMBER IN THIS PARAGRAPH. 2. ( ) MATERIAL IDENTIFICATION: (AS APPLICABLE) SHORT TITLE: USKAT 1234, EDITION: A, SEGMENTS: 25 THRU 31, TABLES: N/A, SETS: N/A, DAYS: 25-31, REG NO: 164, ALC: 1 (note 7). 3. ( ) BRIEF, PRECISE DESCRIPTION OF INCIDENT ACCORDING TO TB 380-41, PARAGRAPHS 5.28 THROUGH 5.30. IN THIS PARAGRAPH CLEARLY ADDRESS WHO, WHAT, WHEN, WHERE, WHY, AND HOW. INITIAL REPORTS MUST PROVIDE CONTROLLING AUTHORITIES (CONAUTHS) PRECISE FACTS SO PRECAUTIONARY MEASURES CAN BE DIRECTED (note 7). 4. ( ) PER AR 380-40, IDENTIFY TYPE OF INQUIRY OR INVESTIGATION PLANNED OR CONDUCTED ACCORDING TO AR 380-5 (note 6). NAME THE INVESTIGATING OFFICER (IF ASSIGNED). IAW AR 380-40, STATE ONE OF THE FOLLOWING (AS APPLICABLE): COMPROMISE, NO COMPROMISE, OR COMPROMISE CANNOT BE RULED OUT. 5. ( ) CONAUTH FOR ALL MATERIAL INVOLVED (note 7). 6. (U) DATE, TIME, AND NAME OF COORDINATION WITH CONAUTH. 7. ( ) THIS PARAGRAPH SHOULD PROVIDE ALL OTHER PERTINENT INFORMATION AVAILABLE (APPLICABLE TB 380-41, PARAGRAPHS 5.28 THRU 5.30, RESULTS OF INVESTIGATIONS, CORRECTIVE MEASURES IMPLEMENTED OR PLANNED TO PREVENT FUTURE INCIDENTS OF A SIMILAR NATURE). 8. (U) POC NAME, GRADE OR RANK, UNIT, AND DSN AND COMMERCIAL TELEPHONE NUMBERS. DERIVED FROM: MULTIPLE SOURCES (ONLY IF THIS IS A CLASSIFIED MESSAGE) DECLAS ON: DATE 10 YEARS FROM DATE OF MESSAGE (ONLY IF THIS IS A CLASSIFIED MESSAGE) ________________________________________________________________________ NOTES: 1. DIRNSA will be an action addressee on all COMSEC incident reports except those involving key at user or CONAUTH level, then DIRNSA will be an info addressee. DIR USACCSLA FT HUACHUCA AZ//SECL-KP-IN// will be action addressee on all CCI incidents. CONAUTH will also be an action addressee if key is involved. 2. DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-OR// will not be included on incident reports involving ALC 3 material. 3. Local CI control office to be included as an information addressee on all incidents. 4. The DCSLOG will be included as an information addressee on all incidents involving CCI. 5. USATCMO-E is included as an addressee only if the incident report effects edition status or effective dates for resupply (for example, supersession). 6. Classification guidance for message preparation is in AR 380-40 and TB 380-41, paragraph 5.1. 7. For physical incidents, reference TB 380-41, paragraph 5.28. For personnel incidents reference TB 380-41, paragraph 5.29. For cryptographic incidents reference TB 380-41, paragraph 5.30. ________________________________________________________________________
Figure I-1. Sample COMSEC or CCI Incident Report
MOBILE SUBSCRIBER EQUIPMENT (MSE) COMSEC GLOSSARY
area interswitch rekey (see switch keys)
Automatic Key Distribution Center, TSEC/KGX-93, (node center/large-extension nodes (NC/LENs))
Army key management system
automatic net control device
brigade COMSEC office of record. (This office is responsible for the generation and distribution of MSE keys to area signal battalions, CCOR, and DCORs.)
brigade COMSEC management office
corps COMSEC office of record (This office is responsible for MSE key distribution to users via the CMCS.)
cryptoignition key: normally issued via KSD-64 key fill devices (not currently used in MSE).
common interswitch rekey (switdh keys).
communications modem (orderwire keys).
communications security: COMSEC for the MSE network is achieved through netted cryptographic protection in four functional areas (T-O-S-S):
Any incident that jeopardizes COMSEC. Such incidents should be reported immediately.
COMSEC Material Control System. The system for accounting, safeguarding, and supply control of COMSEC material.
division COMSEC office of record (This office is responsible for MSE key distribution to users via the CMCS.)
data transfer device (for example, AN/CYZ-10).
electronic key transfer device (for example, KYK-13/KYX-15).
cooperative key technology (currently used in STU-IIIs).
hardened unique storage location for keys within the AKDC.
intertheater COMSEC package (This joint COMSEC key-tape system is held by the BCOR, the CCOR, and the DCORs. The BCOR loads ICP key at the PNCS and bulk transfers to NC/LENs as required.0
key encryption key (This key is used for over-the-air rekey (OTAR).)
The identification (ID) assigned to electronically generated COMSEC key according to the unit SOP. As an example, V Corps MSE SOP for key labels is:
X N N N Z - ------- - ¦ ¦ +-- Edition ID: The BCOR assigns this ID for each new key generated. ¦ +-------- HUS location: The designated AKDC storage location. +-------------- Key type designator. This designator will be one of the following: A = AIRK N = CM Net key B = Bt T = TED C = CIRK U = U key K = CM Key transfer X = X key M = M key
electronic key ID used in data transfer devices (DTD) (table E-1).
TSEC/KG-112 loop key generator (NC/LENs).
TSEC/KG-194A trunk encryption device (TED).
TSEC/KOK-12/KOK-16 electronic programmable COMSEC transfer devices used by COMSEC offices.
Firefly key-fill device (not currently used in MSE).
TSEC/KY-57 VINSON used to secure CM orderwire.
TSEC/KY-68, digital subscriber voice terminal (DSVT).
TSEC/KY-90, secure digital net radio interface (SDNRI).
COMSEC key transfer device issued to small-extension nodes (SENs), random-access units (RAUs), and subscriber terminals.
COMSEC net control device issued to NC/LENs.
loop key generator, TSEC-112 (NC/LENs)
A shortened version of modulator/demodulator. It is a device that connects a computers by using a telephone line.
message switch net variable (switch keys)
message switch rekey variable (switch keys)
A system connected to a network.
primary node center switch used for COMSEC key generation and distribution. Normally collocated with the signal brigade system control center (SYSCON).
standardized COMSEC custodian course
secondary node center switch (This switch is used for COMSEC key generation and distribution in the absence of the PNCS. It is also referred to as leader switch, which is typically collocated with signal battalion control centers (BATCONS).)
trunk encryption device (for example, TSEC/KG-194A)
traffic encryption key
Four types of keys used with KG-194A trunk encryption devices (TEDs). This keys are-
Two keys are used with the CM (KY-57) to provide secure orderwire capabilities:
secure digital net radio interface (for example, TSEC/KY-90)
Three keys that are used to protect communications for mobile subscriber radio telephone (MSRT), wireline digital subscriber voice telephone (DSVT), and SDNRU (KY-90). These are-
Procedures for loading S key in DSVTs for higher than Secret Collateral material transmitted over MSE. SVAR procedures are-
The following are keys used by MSE NCs and LENs for secure-call processing:
Top Secret/Sensitive Compartmented Information.
See switch keys
See switch keys
66th MI Gp
66th Military Intelligence Group
Army COMSEC Commodity Logistics Accounting and Information Management System
Army COMSEC Central Office of Record
Allied Command, Europe
accounting legend code
Combined Arms Training Center
controlled cryptographic item
change of custodian inventory report
COMSEC facility approval request
Commander, United States Army, Europe
Chairman of the Joint Chiefs of Staff Intelligence
COMSEC Material Direct Support Activity
cryyptonet control station
continuity of operation
Department of the Army
Department of the Army Cryptographic Access Program
Defense Courier Service
Deputy Chief of Staff, Information Management, USAREUR
Deputy Chief of Staff, Intelligence, USAREUR
Deputy Chief of Staff, Logistics, USAREUR
Deputy Chief of Staff, Operations, USAREUR
Department of Defense
date to be filled in as a 2-digit number for the day (DD), month (MM), and year (YY)
date expected to return from overseas
Directory, National Security Agency
Department of Defense
Defense Switched Network
digital voice order wire
emergency action procedures
Electronic Key Management System
estimated time of separation
foreign intelligence service
ground defensive position
General Services Administration
hardened unique storage
in accordance with
United States Army Intelligence and Security Command
Standardized COMSEC Custodian Course-Europe
information systems security manager
information systems security officer
cryptographic operational maintenance manual
cryptographic operational operating manual
key encryption key
key storage device
logistics assistance representative
memorandum of agreement
mobile subscriber equipment
noncrytopgraphic operational general publication (coded)
North Atlantic Treaty Organization
National Industrial Security Program Operating Manual
National Security Agency
originating agency's determination required
property book officer
permanent change of station
priority load list
provost marshal office
privately owned vehicle
point of contact
reports control symbol
operations and training office
subversion and espionage directed against the United States Army
semiannual inventory report
Security Clearance Access Roster
Standardized COMSEC Custodian Course
sensitive compartmented information
Secure Data Network System
signal operation instructions
standing operating procedure
secure subscriber terminal
secure telephone unit, third generation
to be announced
Theater COMSEC Logistics Support Center-Europe
United States Army Training and Doctrine Command
technical surveillance countermeasures
United States Army Communications-Electronics Command COMSEC Logistics Activity
United States Army Logistics Assistance Office-Euorpe
United States Army, Europe