APPENDIX G
STANDARDIZED COMSEC CUSTODIAN COURSE

G-1. QUOTAS

G-2. PREREQUISITES
The following qualifications must be met before requesting an allocation to attend INTEL 34. Personnel must-

NOTE: Students arriving at the INTEL 34 course without this memorandum will be sent back to their units.

G-3. WAIVERS
Requests for waivers to prerequisites in the pamphlet, appendix B, paragraph B-2, should be sent through command channels to the Commander in Chief, USAREUR, ATTN: AEAGB-CI-S, Unit 29351, APO AE 09014. Requests should include-

G-4. EMERGENCY ALLOCATIONS
Requests for emergency allocations will be submitted through command channels to the course proponent (Commander in Chief, USAREUR, ATTN: AEAGB-CI-S, Unit 29351, APO AE 09014) and include the information in the pamphlet, appendix B, paragraph B-3.

G-5. EXCEPTIONS


APPENDIX H
MAIL AND MESSAGE ADDRESSES

Table H-1 reference list for mail and message addressees of offices in the basic pamphlet.


APPENDIX I
SAMPLE COMSEC INCIDENT OR CCI INCIDENT REPORT

Figure I-1 is a sample communication security (COMSEC) incident report according to AR 380-40. Blank parentheses in the sample indicate paragraphs could be classified.



___________________________________________________________________________



FROM:   (REPORTING UNIT)



TO:     DIRNSA FT GEORGE G MEADE MD//V51A//(note 1)

        DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-IN//



INFO:   (HIGHER HQ AS DIRECTED BY UNIT STANDING OPERATING PROCEDURE)

DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-OR/SELCL-KP-AU// (note 2)

66TH MI GP AUGSBURG GE//IAPG-SAS// (note 3)

CINCUSAREUR HEIDELBERG GE//AEAGB-CI-S/AEAIM-CO-SI//

CINCUSAREUR HEIDELBERG GE//AEAGD-SM-S// (note 4)

CUSALAO EUROPE SECKENHEIM GE//AMXLA-E-CCM//

NCEUR VAIHINGEN GE//F29//

USATCMO EUR 11TH SIG DET MANNHEIM GE//AFSE-CLC-CMO/5BE001// (note 5)

C O N F I D E N T I A L (SAMPLE - CLASSIFIED FOR TRAINING ONLY) (note 6)

SUBJECT: COMSEC INCIDENT (U) OR CCI INCIDENT (U) (choose appropriate 

one)

A. (U) AR 380-40, 01 SEP 94

B. (U) TB 380-41, CHAP 5, 01 OCT 94

C. (U) UR 380-40, PARA 10, 02 MAY 96

1. ( ) STATE WHETHER INITIAL, INITIAL/FINAL, AMPLIFYING, OR FINAL REPORT 

HERE. LIST COMSEC ACCOUNT, SUBACCOUNT, HAND-RECEIPT (FOR EXAMPLE, 

5CE123-01-HR-05), OR PROPERTY BOOK OFFICER DODAAC FOR CCI INCIDENTS 

INVOLVING CONTROLLED CRYPTOGRAPHIC ITEMS (CCI). ONCE A CASE NUMBER HAS 

BEEN ASSIGNED TO AN INCIDENT, ALL AMPLIFYING REPORTS MUST STATE THE CASE 

NUMBER IN THIS PARAGRAPH.

2. ( ) MATERIAL IDENTIFICATION: (AS APPLICABLE) SHORT TITLE: USKAT 1234, 

EDITION: A, SEGMENTS: 25 THRU 31, TABLES: N/A, SETS: N/A, DAYS: 25-31, 

REG NO: 164, ALC: 1 (note 7).

3. ( ) BRIEF, PRECISE DESCRIPTION OF INCIDENT ACCORDING TO TB 380-41, 

PARAGRAPHS 5.28 THROUGH 5.30. IN THIS PARAGRAPH CLEARLY ADDRESS WHO, 

WHAT, WHEN, WHERE, WHY, AND HOW. INITIAL REPORTS MUST PROVIDE 

CONTROLLING AUTHORITIES (CONAUTHS) PRECISE FACTS SO PRECAUTIONARY 

MEASURES CAN BE DIRECTED (note 7).

4. ( ) PER AR 380-40, IDENTIFY TYPE OF INQUIRY OR INVESTIGATION PLANNED 

OR CONDUCTED ACCORDING TO AR 380-5 (note 6). NAME THE INVESTIGATING 

OFFICER (IF ASSIGNED). IAW AR 380-40, STATE ONE OF THE FOLLOWING (AS 

APPLICABLE): COMPROMISE, NO COMPROMISE, OR COMPROMISE CANNOT BE RULED 

OUT.

5. ( ) CONAUTH FOR ALL MATERIAL INVOLVED (note 7).

6. (U) DATE, TIME, AND NAME OF COORDINATION WITH CONAUTH.

7. ( ) THIS PARAGRAPH SHOULD PROVIDE ALL OTHER PERTINENT INFORMATION 

AVAILABLE (APPLICABLE TB 380-41, PARAGRAPHS 5.28 THRU 5.30, RESULTS OF 

INVESTIGATIONS, CORRECTIVE MEASURES IMPLEMENTED OR PLANNED TO PREVENT 

FUTURE INCIDENTS OF A SIMILAR NATURE).

8. (U) POC NAME, GRADE OR RANK, UNIT, AND DSN AND COMMERCIAL TELEPHONE 

NUMBERS. DERIVED FROM: MULTIPLE SOURCES (ONLY IF THIS IS A CLASSIFIED 

MESSAGE) DECLAS ON: DATE 10 YEARS FROM DATE OF MESSAGE (ONLY IF THIS IS 

A CLASSIFIED MESSAGE)

________________________________________________________________________



NOTES: 1. DIRNSA will be an action addressee on all COMSEC incident 

reports except those involving key at user or CONAUTH level, then DIRNSA 

will be an info addressee. DIR USACCSLA FT HUACHUCA AZ//SECL-KP-IN// 

will be action addressee on all CCI incidents. CONAUTH will also be an 

action addressee if key is involved.

2. DIR USACCSLA FT HUACHUCA AZ//SELCL-KP-OR// will not be included on 

incident reports involving ALC 3 material.

3. Local CI control office to be included as an information addressee on 

all incidents.

4. The DCSLOG will be included as an information addressee on all 

incidents involving CCI.

5. USATCMO-E is included as an addressee only if the incident report 

effects edition status or effective dates for resupply (for example, 

supersession).

6. Classification guidance for message preparation is in AR 380-40 and 

TB 380-41, paragraph 5.1.

7. For physical incidents, reference TB 380-41, paragraph 5.28. For 

personnel incidents reference TB 380-41, paragraph 5.29. For 

cryptographic incidents reference TB 380-41, paragraph 5.30.

________________________________________________________________________

Figure I-1. Sample COMSEC or CCI Incident Report


GLOSSARY

SECTION I
MOBILE SUBSCRIBER EQUIPMENT (MSE) COMSEC GLOSSARY

AIRK
area interswitch rekey (see switch keys)

AKDC
Automatic Key Distribution Center, TSEC/KGX-93, (node center/large-extension nodes (NC/LENs))

AKMS
Army key management system

AN/CYZ-10
automatic net control device

BCOR
brigade COMSEC office of record. (This office is responsible for the generation and distribution of MSE keys to area signal battalions, CCOR, and DCORs.)

BCMO
brigade COMSEC management office

BT
bulk transfer

CCOR
corps COMSEC office of record (This office is responsible for MSE key distribution to users via the CMCS.)

CIK
cryptoignition key: normally issued via KSD-64 key fill devices (not currently used in MSE).

CIRK
common interswitch rekey (switdh keys).

CM
communications modem (orderwire keys).

COMSEC
communications security: COMSEC for the MSE network is achieved through netted cryptographic protection in four functional areas (T-O-S-S):

COMSEC Incident
Any incident that jeopardizes COMSEC. Such incidents should be reported immediately.

CMCS
COMSEC Material Control System. The system for accounting, safeguarding, and supply control of COMSEC material.

DCOR
division COMSEC office of record (This office is responsible for MSE key distribution to users via the CMCS.)

DTD
data transfer device (for example, AN/CYZ-10).

ETD
electronic key transfer device (for example, KYK-13/KYX-15).

Firefly
cooperative key technology (currently used in STU-IIIs).

HUS
hardened unique storage location for keys within the AKDC.

ICP
intertheater COMSEC package (This joint COMSEC key-tape system is held by the BCOR, the CCOR, and the DCORs. The BCOR loads ICP key at the PNCS and bulk transfers to NC/LENs as required.0

KEK
key encryption key (This key is used for over-the-air rekey (OTAR).)

key label
The identification (ID) assigned to electronically generated COMSEC key according to the unit SOP. As an example, V Corps MSE SOP for key labels is:


X N N N Z

- ------- - ¦ ¦ +-- Edition ID: The BCOR assigns this ID for each new key generated. ¦ +-------- HUS location: The designated AKDC storage location. +-------------- Key type designator. This designator will be one of the following: A = AIRK N = CM Net key B = Bt T = TED C = CIRK U = U key K = CM Key transfer X = X key M = M key

key tag
electronic key ID used in data transfer devices (DTD).

KG-112
TSEC/KG-112 loop key generator (NC/LENs).

KG-194A
TSEC/KG-194A trunk encryption device (TED).

KOK-12/KOK-16
TSEC/KOK-12/KOK-16 electronic programmable COMSEC transfer devices used by COMSEC offices.

KSD-64A
Firefly key-fill device (not currently used in MSE).

KY-57
TSEC/KY-57 VINSON used to secure CM orderwire.

KY-68
TSEC/KY-68, digital subscriber voice terminal (DSVT).

KY-90
TSEC/KY-90, secure digital net radio interface (SDNRI).

KYK-13
COMSEC key transfer device issued to small-extension nodes (SENs), random-access units (RAUs), and subscriber terminals.

KYX-15A
COMSEC net control device issued to NC/LENs.

Leader NC
See SNCS

LEN
large-extension node

LKG
loop key generator, TSEC-112 (NC/LENs)

modem
A shortened version of modulator/demodulator. It is a device that connects a computers by using a telephone line.

MSNV
message switch net variable (switch keys)

MSRV
message switch rekey variable (switch keys)

NC
node center

NODE
A system connected to a network.

OTAR
over-the-air-rekey

OTAT
over-the-air-key transfer

PNCS
primary node center switch used for COMSEC key generation and distribution. Normally collocated with the signal brigade system control center (SYSCON).

RAU
random-access unit

SCCC
standardized COMSEC custodian course

SEN
small-extension node

SNCS
secondary node center switch (This switch is used for COMSEC key generation and distribution in the absence of the PNCS. It is also referred to as leader switch, which is typically collocated with signal battalion control centers (BATCONS).)

TED
trunk encryption device (for example, TSEC/KG-194A)

TEK
traffic encryption key

trunk keys
Four types of keys used with KG-194A trunk encryption devices (TEDs). This keys are-

orderwire keys
Two keys are used with the CM (KY-57) to provide secure orderwire capabilities:

SDNRI
secure digital net radio interface (for example, TSEC/KY-90)

subscriber keys
Three keys that are used to protect communications for mobile subscriber radio telephone (MSRT), wireline digital subscriber voice telephone (DSVT), and SDNRU (KY-90). These are-

SVAR
Procedures for loading S key in DSVTs for higher than Secret Collateral material transmitted over MSE. SVAR procedures are-

switch keys
The following are keys used by MSE NCs and LENs for secure-call processing:

TS/SCI
Top Secret/Sensitive Compartmented Information.

X key
See switch keys

V key
See switch keys

SECTION II
ABBREVIATIONS

66th MI Gp
66th Military Intelligence Group

ACCLAIMS
Army COMSEC Commodity Logistics Accounting and Information Management System

ACCOR
Army COMSEC Central Office of Record

ACE
Allied Command, Europe

AE
Army Europe

ALC
accounting legend code

AR
Army regulation

CATC
Combined Arms Training Center

CER
cryptoevaluation report

CCI
controlled cryptographic item

CCIR
change of custodian inventory report

cdr
commander

CF
central facility

CFAR
COMSEC facility approval request

CIK
cryptoignition key

CINCUSAREUR
Commander in Chief, United States Army, Europe

CJCSI
Chairman of the Joint Chiefs of Staff Intelligence

CMDSA
COMSEC Material Direct Support Activity

CNCS
cryyptonet control station

COMSEC
communications security

CONAUTH
controlling authority

COOP
continuity of operation

DA
Department of the Army

DACAP
Department of the Army Cryptographic Access Program

DCS
Defense Courier Service

DCSIM
Deputy Chief of Staff, Information Management, USAREUR

DCSINT
Deputy Chief of Staff, Intelligence, USAREUR

DCSLOG
Deputy Chief of Staff, Logistics, USAREUR

DCSOPS
Deputy Chief of Staff, Operations, USAREUR

DD
Department of Defense

DDMMYY
date to be filled in as a 2-digit number for the day (DD), month (MM), and year (YY)

DEROS
date expected to return from overseas

DIRNSA
Directory, National Security Agency

DOD
Department of Defense

DSN
Defense Switched Network

DTD
data-transfer device

DVOW
digital voice order wire

EAP
emergency action procedures

EKMS
Electronic Key Management System

ETS
estimated time of separation

FIS
foreign intelligence service

GDP
ground defensive position

GSA
General Services Administration

HUS
hardened unique storage

IAW
in accordance with

INSCOM
United States Army Intelligence and Security Command

INTEL 34
Standardized COMSEC Custodian Course-Europe

IR
item register

ISSM
information systems security manager

ISSO
information systems security officer

KAM
cryptographic operational maintenance manual

KAO
cryptographic operational operating manual

KEK
key encryption key

KSD
key storage device

LAR
logistics assistance representative

mm
millimeter

MOA
memorandum of agreement

MSE
mobile subscriber equipment

NAG
noncrytopgraphic operational general publication (coded)

NATO
North Atlantic Treaty Organization

NISPOM
National Industrial Security Program Operating Manual

NSA
National Security Agency

OADR
originating agency's determination required

OPCODE
operations code

OPLAN
operation plan

OTAD
over-the-air-key distribution

PBO
property book officer

PCS
permanent change of station

PLL
priority load list

PMO
provost marshal office

POV
privately owned vehicle

POC
point of contact

RCS
reports control symbol

reg
regulation

S2
intelligence office

S3
operations and training office

SAEDA
subversion and espionage directed against the United States Army

SAIR
semiannual inventory report

SCAR
Security Clearance Access Roster

SCCC
Standardized COMSEC Custodian Course

SCI
sensitive compartmented information

SCO
subcontrol office

SDNS
Secure Data Network System

SF
standard form

SOI
signal operation instructions

SOP
standing operating procedure

SST
secure subscriber terminal

STU-III
secure telephone unit, third generation

TB
technical bulletin

TBA
to be announced

TCLSC-E
Theater COMSEC Logistics Support Center-Europe

TI
technical inspection

TM
technical manual

TPI
two-person integrity

TRADOC
United States Army Training and Doctrine Command

TS
Top Secret

TSCM
technical surveillance countermeasures

U.S.
United States

USACCSLA
United States Army Communications-Electronics Command COMSEC Logistics Activity

USALAO-E
United States Army Logistics Assistance Office-Euorpe

USAREUR
United States Army, Europe