officers or warrant officers (if possible). Appointed enlisted personnel must be at least a staff sergeant for
custodian and sergeant for alternate.
b. Individual users must physically protect COMSEC material in their possession or under their control.
They have the primary responsibility for reporting any occurrence, circumstance, or act that could jeopardize the
security of COMSEC material. They also follow the COMSEC custodian's instructions for protecting and
COMSEC custodian duties. A COMSEC custodian is responsible for actions concerning accountable
COMSEC material charged to his account. The custodian routinely does:
a. Material receipt. He formally acknowledges receiving keying material, publications, and equipment.
b. Inventory. He makes sure that COMSEC inventories of material and equipment are conducted. He
also makes sure daily or shift-to-shift and other periodic inventories are conducted.
c. Transfer. He ensures that transfers of accountable material are properly reported and recorded.
d. Accounting. He makes sure material is accounted for, from receipt through final disposition. He
keeps publications current and promptly posts amendments.
e. Destruction. He makes sure COMSEC facility personnel are thoroughly familiar with emergency
f. Reports. He submits timely routine reports on the status of COMSEC material.
COMSEC keying process.
a. COMSEC key is a sequence of random binary bits used to set up initially, and change periodically,
permutations in crypto equipment. They are used to encrypt and decrypt electronic signals, control TRANSEC
processes, and produce other keys.
b. Cryptosystems provide security by preventing unauthorized persons from receiving information sent
electronically. Authentication systems help defend against enemy intrusion into communications nets. These
systems help to establish the authenticity of stations, communications, or operators. Both systems are needed to
have adequate operations security. Homemade authentication code systems are never allowed. The only Army-
approved systems are:
(1) Those produced by the National Security Agency (NSA). They are obtained through Army