Department of Defense Security Institute
STU-III HANDBOOK FOR INDUSTRY
February 1997
INTRODUCTION Secure transmissions whether telephone conversations, facsimile (fax) copies, or automated information systems (AIS) communications have long been possible through encryption, but for many years the equipment was bulky, complex, and expensive. In the 1960s the KY-3, one of the first practical voice encryption devices, came on the market. In 1970, the Secure Telephone Unit, First Generation (STU-I) was launched, followed in 1975 by the STU-II, which mustered some 10,000 users. In 1984, the
In 1986, National Communication Security Instruction (NACSI) 6002, "Protection of Government Contractor Telecommunications," was issued requiring defense contractors to transmit classified information and sensitive unclassified information solely over encryption equipment approved by the NSA. In 1987, the NSA-approved STU-III placed secure telephone service within the reach of nearly every defense contractor.
AT&T, GE (formerly RCA), and Motorola are the vendors for the STU-III. The Type 1 terminal is used to secure classified information and unclassified but sensitive information. All STU-IIIs are compatible, so if you obtain a STU-III from, say, GE it can "go secure" with a STU-III made by Motorola or AT&T. The Type 2 terminal is used to secure unclassified communications only.
We developed this handbook to assist Facility Security Officers (FSOs) of cleared defense contractors who require the STU-III, Type 1 unit. It covers step-by-step what you need to know and do to make the STU-III a valuable addition to your facility's operations. It summarizes and synthesizes directive guidance for the STU-III to supplement, not replace, such guidance. This guidance does not apply to the Type 2 terminal.
ASSESSING YOUR NEEDS First, determine which contracts will require STU-III, Type 1 access. As a rule of thumb, you should count all of your classified contracts in the total. Secure telecommunication via STU-III will improve your facility's performance on virtually any classified contract. Work with your facility's top management to ensure that the contracting officer for each classified contract inserts a statement of the requirement for protecting the telecommunication of classified information (and unclassified national security-related information). You will also need to know the highest classification level involved for each contract, so that telecommunications can be safeguarded at that level. Then determine how many STU-III terminal users there will be for each contract. TERMINALS Now is not too early to consider where you will put the STU-III equipment. In choosing locations, remember that in a cleared facility STU-III terminals must be installed only in private offices or work areas where access to the STU-III may be controlled in keeping with the requirements to protect
Will STU-III equipment be used in applications besides in-facility telephone terminals? You may need to use a STU-III for secure facsimile (fax) or AIS transmission. Perhaps there is a need for a cellular unit installed in a vehicle. Someone may need to use a STU-III at a residence. Take all of these uses into account from the outset.
Once you have drawn up a list of the STU-III applications at your facility, you can decide how many STU-IIIs you will require by type (e.g., single-line or five-line desk unit; cellular unit; mobile/ portable/ transportable unit).
KSD-64As, KEY, and CIKs
Next you need to decide how many KSD-64As you will need. Each STU-III comes with one blank KSD-64A.
KSD-64A stands for Key Storage Device with storage of 64,000 bits of information. The device is a key-shaped piece of plastic that contains a computer chip called an EEPROM. The EEPROM chip has Electronically Erasable Programmable Read Only Memory. The device is inserted like a key into a slot in the STU-III and turned to engage its computer chip with the electronic components of the STU-III. Since the KSD-64A is an EEPROM, NSA can use its special equipment to program it, erase the information it contains, and reprogram it with other information.Key Storage Device, KSD-64A
It is incidental, even confusing perhaps, that the KSD-64A is key-shaped. It is in fact named for the cryptographic information, called "key" by security professionals, that it often stores.
"Key" is a unique sequence of random bits used to set up and change the encoding and decoding function of a security device so that it can encode, decode, and authenticate information. It is this meaning of "key" that is used in the following terms:SEED KEY
- Key that is loaded into a STU-III terminal, enabling it to electronically obtain its operational key during a rekey phone call.OPERATIONAL KEY
- Key that is loaded into a STU-III terminal, enabling it to make direct secure calls to other STU-IIIs.The KSD-64A may also function as a CIK:
CIK
- A KSD-64A that stores an electronic "password." The CIK is inserted and turned in the STU-III terminal that shares this "password" to unlock the terminal's secure transmission features. The secure mode is locked when the CIK is removed. CIK stands for Crypto Ignition Key.A particular KSD-64A is commonly referred to by the type of electronic information it is storing at the time. A KSD-64A that is used to transport and transfer seed key to a STU-III unit is called a "seed key." A KSD-64A that is used to transport and transfer operational key to a STU-III unit is called an "operational key." A KSD-64A that contains an electronic "password" is called a "CIK."
Note also that when a KSD-64A is used to transport and transfer either seed key or operational key, it is referred to as a
fill device. It will "fill" the unkeyed STU-III with key; when, in addition, a CIK has been created and is inserted in the unit, the STU-III is said to be keyed.The
Electronic Key Management System, Central Facility (EKMS) generates and distributes all key used by STU-IIIs. The EKMS prepares customized key by combining user-specified ID information and NSA-generated cryptographic information. After the EKMS has generated the customized key, it assigns to it a unique Key Material Identification Number (KMID). The customized key, referred to as the terminal's key, is then loaded into a fill device. A card label attached to the fill device identifies the key contained in the device. The fill device is then shipped to a COMSEC account (COMSEC = Communications Security), where it is officially received and provided to an individual authorized to key the STU-III terminal (i.e., to load the key into the terminal).A fill device may be used just once to transfer key; after the transfer the fill device is empty or blank. A KSD-64A or a STU-III that does not contain key is said to be
zeroized; a button at the rear of the unit (Motorola and RCA/GE) or on the bottom of the unit (AT&T) is used to zeroize the STU-III. A fill device is required to key the STU-III only during initial setup and later on to rekey the STU-III after it has been zeroized (for instance, to change its ID information).A STU-III into which operational key has been transferred (loaded) is ready to operate in the secure mode. However, a STU-III unit into which seed key only has been loaded must have its seed key converted to operational key before it can go secure. The STU-III user initiates this conversion by placing a call to the EKMS.
During this call, the EKMS electronically converts the seed key in the STU-III to operational key.During this call, the EKMS also downloads the latest
Compromise Information Message/Compromised Key List (CIM/CKL) into the STU-III. When NSA determines that a possible compromise has occurred, it places the number of the compromised key (its KMID) onto the CKL. Updates to this list are provided in a CIM, which is exchanged automatically between the STU-III terminals during the setup, or handshake, for a secure call. If the KMID of a STU-III terminal is on the CKL, no other STU-III terminal can establish secure communications with it.Since operational key enables a user to make a secure call without having to be converted, it is more vulnerable to compromise than seed key. For this reason, NSA prefers not to transmit to STU-III users fill devices containing operational key. We will include operational key in what follows, but unless there are special circumstances at your facility, only "seed keys" should be ordered.
KEYSETS
Determine how many keysets of each STU-III unit will be needed. A
keyset consists of a combination of "key" and user ID data. The number of keysets that are available within a STU-III differs by vendor, as shown:Only one keyset is needed per STU-III, unless some users have a different clearance level and/or need-to-know than other users of that STU-III. If more than one keyset is needed, a separate seed key (or operational key) with its own identifying information must be obtained for each keyset you establish within the STU-III. For each keyset, the STU-III terminal can create a
master CIK, which will permit you to enable and disable some security functions of the STU-III and to create additional CIKs in the future as needed. With all of the STU-III models, up to 7 CIKs can be created per keyset if a master CIK is also made; otherwise, up to 8 CIKs per keyset can be created. The CIKs that enable a given keyset (designated for secure use at a particular classification level and with a particular need-to-know) within the STU-III will not enable any other keyset.Once you know the number of keysets you will be using, you also know the minimum number of seed keys [and/or operational keys] that will be required. Bear in mind, however, that you may wish to order duplicate fill devices from the EKMS, so that they will be on hand to refill the STU-III if you have to zeroize it (or if an employee zeroizes it by accident).
You will also need to decide whether to create one or more master CIKs. That is, for each keyset to be established, you must determine whether:
1. No master CIK need be created,
2. A master CIK will be created only to enable/disable some security functions of the STU-III, then zeroized, or
3. A master CIK will be created and retained to create additional CIKs in the future as needed. In this case, the facility must have storage capability at the level of the seed key's conversion classification level or a higher level.
Next, determine how many regular CIKs will be needed. Will you issue a CIK to each STU-III user? Or will you have only one or a few CIKs for each keyset, available for common use?
Once you know your needs __ keysets per terminal, CIKs per keyset, fill devices (seed key/operational key) per keyset, and the number of terminals by type __ you are ready to obtain your STU-III equipment.
METHODS OF OBTAINING TERMINALS Next, you need to settle on the method of obtaining the STU-III, Type 1 equipment. The contractor (your company) and the contracting officer negotiate agreements that govern how the costs of the STU-III capability will be treated under existing or new contracts that require the securing of telecommunication of classified information or unclassified but sensitive Government information. There are three main methods of obtaining a STU-III terminal, as follows: GFEA US department or agency, normally the User Agency for the contract, purchases the STU-III equipment and provides it to the contractor as
CAPUpon authorization of the contracting officer, the contractor may purchase the equipment from a vendor and charge it to the contract as Contractor Acquired Property (CAP). CAP is owned by the government, which handles disposition at the end of the contract.
COPSubject to an administrative determination by NSA that the contractor is eligible from a security viewpoint to own the equipment, the contractor may obtain it from a vendor as plant equipment as defined in the Federal Acquisition Regulation, 48.101(a). The equipment becomes Contractor Owned Property (COP). The contractor may recover the cost as for other plant equipment overhead. Only companies organized and existing under the laws of the US and Puerto Rico may acquire the STU-III as COP. (See COMSEC Supplement to ISM, Section V, para. 32b.)
Once a STU-III has been obtained as GFE, CAP, or COP, it may be redistributed to a subordinate entity, such as a division or subsidiary:
HRThe STU-III is provided on a hand receipt (HR) by a home office, parent company, or some other entity which will execute the STU-III COMSEC requirements.
If the contractor is to acquire the STU-III equipment directly, i.e., under CAP or COP, send a letter to the
NSA Central Office of Record (NSA COR) at this address:National Security Agency
Operations Building Nr. 3
ATTN: Y131
9800 Savage Road
Fort George G. Meade, MD 20755-6000
If CAP, provide in the letter:
A request for eligibility to directly procure the STU-III equipment.
If COP, provide in the letter:
NSA will determine the contractor's eligibility to procure the STU-III equipment and will notify the contractor in writing. The contractor will be required to execute a
CCI Control Agreement with NSA.How you obtain your STU-III determines whether your facility will need to execute a CCI Control Agreement and have a COMSEC account.
Under the NSA/DIS Loan Program, a Memorandum of Loan Agreement is required.Required only when the facility has to obtain its own key.
If your organization is obtaining the STU-III equipment under CAP or COP, it must execute a CCI Control Agreement with NSA. If you do not have a blank CCI Control Agreement, obtain one from:
If your organization is obtaining the STU-III equipment as GFE under the NSA/DIS Loan Program, it must execute a
Memorandum of Loan Agreement. If a COMSEC account is in place at your facility, or if an existing COMSEC account is available to support the requirement, well and good. If not, you will need to initiate a request for the establishment of a COMSEC account with NSA.COMSEC ACCOUNT
A COMSEC account is "an administrative entity identified by an account number, responsible for maintaining custody and control of COMSEC material." Simply put, NSA or some other governmental agency will establish an accountability system for your COMSEC equipment (STU-III) and other necessary material (key) and will assign a 6-digit number to the account.
As the chart above shows, a COMSEC account is required unless your facility is receiving both the STU-III and the key under a hand receipt issued by another entity, such as a home office. In this case your facility is using the COMSEC account of the other entity, which is assuming the accounting responsibilities. If, however, the STU-III comes to your facility on a hand receipt
and if you are instructed to obtain the key on your own, then you must establish a COMSEC account with NSA.If your contract or the instructions you have received indicate that the STU-III and key are the only COMSEC material needed, you will be applying for a
STU-III Only COMSEC Account (SOCA) . If you have been told that you will need additional COMSEC equipment, such as a KG-84 or KG-94, then you must obtain a regular COMSEC account.In applying for the COMSEC account, you need to nominate to NSA the persons who will serve as
COMSEC Custodian and Alternate COMSEC Custodian. If the key is at, or will convert to, the SECRET level or below, they must have final SECRET clearances. If the key is at, or will convert to, the TOP SECRET level, they must have final TOP SECRET clearances. When applying for a regular COMSEC account, the investigative basis for each clearance (investigation or periodic reinvestigation) must fall within the past 5 years.To apply for the COMSEC account send a letter to th
e NSA COR at the following address:National Security Agency
Operations Building Nr. 3
ATTN: Y131
9800 Savage Road
Fort George G. Meade, MD 20755-6000
Include in the letter:
Send a copy of the letter to your
DIS Field Office.If your method of obtaining the STU-III equipment is CAP or COP, attach a copy of the CCI Control Agreement executed by your organization to the letter sent to the NSA COR.
When the NSA COR has reviewed your documentation, they will respond to you by letter, with a copy to the DIS Field Office. The letter will confirm the establishment of the COMSEC Account, the assignment of the 6-digit account number, and the appointment of the COMSEC Custodian and Alternate. The letter will include a copy of the
CCI Control Agreement you forwarded, now also executed by NSA.
COMSEC CUSTODIANS The COMSEC Custodians are responsible for the accounting, handling, and disposition of all key for your STU-III terminals. They must verify that the persons to whom they issue key have an appropriate security clearance and need-to-know and that STU-III users follow your Standard Practice Procedures. Requirements and procedures for COMSEC Custodians are detailed in Section III, para. 18, of the COMSEC Supplement to the ISM and in Section 8 of the STU-III Key Management Plan. If you (the FSO), the COMSEC Custodian, and the Alternate COMSEC Custodian have not received a COMSEC briefing by a government representative, arrange for your DIS IS Representative to give the briefing. Also, if the COMSEC account will receive COMSEC material besides STU-III material, you must arrange for the COMSEC Custodian and the Alternate to attend the
Once your COMSEC account is in place, the NSA COR will send a copy of National Security Telecommunications and Information Systems Security Instruction (NSTISSI) 3013, "Operational Security Doctrine for the Secure Telephone Unit III (STU-III) Type 1 Terminal" and its annexes. However, if other INFOSEC policy documents are needed for contract performance, the contractor must request the User Agency contracting officer to provide the documents as Government Furnished Property (GFP).
For further guidance, have the COMSEC Custodian obtain the following:
From DIS:
From NSA:
From EKMS:
COMMAND AUTHORITY Next, nominate to the EKMS a person to serve as the
1. To establish Department/ Agency/ Organization (DAO) descriptions, which will become part of the customized key issued by the EKMS and part of the identification displayed in the message window of the distant STU-III during a secure call.
2. To select and register the User Representative, indicating appropriate "privileges," which include:
3. To monitor and maintain the accuracy of the User Repre-
sentative information on file at the EKMS.
Send the Command Authority appointment letter to:
EKMS Central Facility
P.O. Box 718
Finksburg, MD 21048-0718
The appointment letter must:
After the EKMS has processed your letter, it will send letters confirming the appointment of the Command Authority to both the contractor and the Command Authority, as a double check to detect any data entry errors or attempts to make unauthorized appointments.
USER REPRESENTATIVE Besides the confirmation letter, the EKMS will send the Command Authority a package of information that includes the "User Representative Registration Form." The Command Authority can then appoint and register the User Representative. (See Section 6 of the STU-III Key Management Plan.) Note that in a small organization one person may serve as COMSEC Custodian, Command Authority, and User Representative. The User Representative's responsibilities are: 1. To determine requirements for key within the organization, 2. To interact with the Command Authority for DAO administration and User Representative privilege changes, 3. To prepare and submit key orders to the EKMS, and 4. To monitor the status of key orders. Responsibilities and procedures for the User Representative are detailed in Section 7 of the STU-III Key Management Plan. After the EKMS has processed the registration form, they assign the User Representative a 6-digit identification number to use when ordering key. As with the double-check confirmation of the Command Authority appointment, the EKMS will send letters confirming the registration of the User Representative to both the Command Authority and the User Representative to detect any data entry errors or attempts to make an unauthorized registration. When the registration of the User Representative is confirmed, ensure that an approved contractor employee __ such as you (the FSO), the COMSEC Custodian, or the Alternate __ gives a COMSEC briefing to the User Representative. Next, ensure that the Command Authority and the User Representative check the information (registration data and ordering privileges) entered on the "STU-III User Representative Key Ordering Authorization Form" sent to them by the EKMS. The User Representative keeps this form for use when ordering key.
ORDERING KEY Recall that each STU-III terminal stores certain user-specific identification information and displays this information during a secure call. The display is critical because each party uses it to authenticate the distant party. For this reason, the identification information is also referred to as "authentication data." There are two parts to the identification: the DAO description and the Additional Identification Data ("free form" information). The Command Authority defines the DAO description, which specifies the terminal user's parent department, agency, or organization. The DAO description may be one or two lines:
The first line of a contractor's DAO description is the name of the US Corporation or other legal entity for which the Command Authority is appointed (e.g., Electric Widget Corporation). This line is displayed on the terminal of the distant party throughout a secure call.
A second line can be used to show location, division, or staff element (e.g., Electric Widget Services). It is displayed briefly to the distant user during the secure call setup. The Command Authority supplies the DAO description as part of registering the User Representative. The EKMS then assigns a unique 6-digit number (the DAO code) to the DAO description. The User Representative
To order the required seed key(s) [and/or operational key(s)], the User Representative must do the following:
The User Representative next enters the second part of the user identification: the Additional Identification Data, or "free form" information. The STU-III user determines this information, such as a specific location, section, position (title), or project, even the user's name, and notifies the User Representative. In all, three lines are available for authentication data. If the Command Authority has already specified a two-line DAO description, then there can be only one line of free form information:
ELEC WIDGET CORP
DAO DescriptionELEC WIDGET SVCSDAO Description
LASER WIDGET Additional Identification Data
If the Command Authority specifies only a one-line DAO description, there can be up to two
lines of free form information:
ELEC WIDGET CORP
DAO DescriptionLASER WIDGET Additional Identification Data
CHIEF ENGINEER Additional Identification Data
ORDERING BLANK KSD-64As If additional KSD-64As will be needed, now is a good time to order them from one of the two vendors: Datakey and CTS Corporation. (See inside back cover for further information.) SELECTING THE VENDOR (CAP & COP) If you are obtaining your STU-III as GFE __ for instance, under the NSA/DIS Loan Program __ or under a hand receipt, the equipment and vendor are selected for you. If, however, your method of obtaining the STU-III is either COP or CAP, then your facility will normally be allowed to select the vendor. You should acquire brochures from AT&T, GE, and Motorola and talk with their representatives. Talk also with contractors who have STU-IIIs. You'll find some obvious differences, such as price, and others that are more subtle. When you have decided on which STU-III unit to purchase, contact the vendor. Certify your facility's eligibility to the vendor and provide the following: Then issue the purchase order, and the vendor will send the STU-III to your facility.
STANDARD PRACTICE PROCEDURES Next, decide on the security procedures for the facility's STU-IIIs, fill devices, master CIK(s), and CIKs and prepare the STU-III Standard Practice Procedures (SPP). Tailor the SPP to your specific operation. Remember that although the user will be briefed on the use of the STU-III and the security precautions for the unit, the user's primary source of information will be the SPP. DIS has several STU-III SPPs to assist you. The next time your IS Representative comes by, discuss what you need or make a call. To get you started, the contents might include: 1. Purpose and Introduction 2. Definitions 3. Security Education 4. Roles and Responsibilities 5. Clearances and Need-To-Know 6. Physical Storage 7. Access Controls 8. Safeguards During Use 9. Secure Data Transmission (Fax & AIS) 10. Accountability 11. COMSEC Incidents 13. Attachments COMSEC briefing User Briefing or STU-III SPP Certification STU-III Terminal / KSD Hand Receipts STU-III Secure Call Log Fax Log The SPP must address the following ISM requirements, as applicable: STU-III with fax: STU-III with AIS: STU-III outside cleared facility: STU-III in vehicle:
RECEIPT OF SEED KEY The COMSEC Custodian will take receipt of the seed key(s). Although seed key is UNCLASSIFIED CRYPTO, it can be received only by a COMSEC Custodian who is cleared to the level of the operational key to which the seed key will be converted. The COMSEC Custodian should: If there is any difficulty, call the EKMS immediately at 1-800-635-5689. Note the discrepancy on the SF 153, and send it to the EKMS/CAO. Ensure that each seed key, which is UNCLASSIFIED CRYPTO, is left in its unopened plastic bag until use and is safeguarded by the best means available at your facility (e.g., GSA-approved security container) until it is loaded.
COMSEC incident.)
RECEIPT OF OPERATIONAL KEY, IF ANY The COMSEC custodian takes receipt of any operational key as above for seed key, except:
RECEIPT OF BLANK KSD-64As, IF ANY Take delivery of the additional KSD-64As, if any, that you ordered from a vendor. No special protection requirements apply to these blank devices, which will become CIKs. Once they become CIKs, however, they are locally accountable items.
RECEIPT OF STU-III You or your designee may take receipt of the STU-III terminal(s). Remember, each STU-III is a Controlled Cryptographic Item (CCI) (= accountable COMSEC). Note also that the NSA COR one-up transaction numbering system reverts to "1" every January 1. The numbering system applies to all reports (transfer, destruction, possession inventory) that do not list STU-III key. STU-III key must be reported separately; see Receipt of Seed Key, above. Ensure that each unkeyed STU-III is safeguarded as a high-value item (i.e., as though it were a computer).
Material Inspection Receiving Report," DD Form 250.
SETUP The STU-III is easy to assemble and install. Just follow the directions the vendor provides. Attach the handset cord to the handset and main unit. Then insert the telephone cord into an RJ-11 jack (household telephone jack). Finally, supply the power (plug the unit into a 110V wall outlet). That's all there is to it. You can now use the STU-III in its nonsecure mode just as you would any other telephone. With the STU-III assembled, you may enter phone numbers in its automatic dialer. If the STU-III will be used for fax or AIS, insert the cable plug from the device into the RS 232 port at the rear of STU-III. The STU-III comes equipped with an internal modem. STU-III data port guidance was recently issued by the
NONSECURE MODE To test the nonsecure operation of each unit, place a nonsecure call. While in the nonsecure mode, the STU-III operates as a
LOADING SEED KEY After terminating the nonsecure call, load seed key(s) into the appropriate STU-III(s).
For each keyset to be established within the STU-III terminal:
LOADING OPERATIONAL KEY, IF ANY After checking the nonsecure operation of the unit(s) to
be filled, load operational key(s), if any, into the appropriate
STU-III(s). For each keyset to be established within the
STU-III terminal, follow the same procedures provided for
loading seed key. Once the STU-III is loaded with
operational key and a CIK is inserted and turned in it, the
STU-III can operate in the secure mode immediately. While it is
not necessary to call the EKMS rekey number (1-800-635-6301),
you are urged to do so. Calling the rekey number will allow the
EKMS to 1) send a new operational key to the STU-III, and 2)
send the latest Compromise Information Message/Compromised Key
List (CIM/CKL) to the STU-III.
ACCOUNTABILITY: CIKs AND KEY Have the COMSEC Custodian establish local accountability for the CIKs created (see paragraph 8.5.1, STU-III Key Management Plan) and maintain accountability records for them. The local accountability records may be either the fill device card label (yellow CRYPTO ID card) supplied with the key, or another type of record that provides the same information (see Issuing CIKs to Users, below). When using the yellow
For each seed key [and/or operational key] loaded, have the COMSEC Custodian complete the final disposition portion of its L6061 card (e.g., date, conversion or zeroization) and file it alphanumerically in the inactive section of the COMSEC Register File. When zeroization is performed, also enter the EKMS STU-III key transaction number.
DESTRUCTION REPORTS Destruction reports will seldom be required. However, the COMSEC Custodian must submit an SF 153, completed as a
PROTECTING KEYED STU-IIIs Protect each keyed STU-III (unit that contains key
MAKING A SECURE CALL To test the secure operation of each unit, place a secure call. If the message window: If the display is not working, terminate the call immediately.
Both users must not discuss classified information which is at a higher level.
There is, however, the danger that while in the nonsecure mode someone might inadvertently discuss classified or sensitive information. Therefore, we recommend that you remain in the secure mode for the entire conversation.
HANDLING MASTER CIKs Ensure that any master CIK(s) created
PROTECTING CIKs Ensure that each regular CIK is protected as required.
USER BRIEFING You (the FSO), the COMSEC Custodian, or the Alternate Custodian gives the terminal users a user briefing, to include their reading the STU-III SPP and certifying in writing that they have read and understood the SPP. The briefing must cover at least the following: SAMPLE USER BRIEFING Substantial amounts of classified and sensitive unclassified information have leaked to our adversaries over nonsecure telecommunications circuits. Correct use of the STU-III can reduce this vulnerability. All STU-III users must follow sound, consistent security practices in order to prevent the compromise of classified material and communications by hostile intelligence services and other unauthorized persons. The following procedures are provided as general operational guidelines to ensure the proper use of the STU-III:
STU-III STANDARD PRACTICE PROCEDURES
CERTIFICATION
I have read and fully understand the security measures for the Secure Telephone Unit, Third Generation Type 1, or STU-III, set forth in the STU-III Standard Practice Procedures.
I accept the responsibility of being entrusted with a CIK (Crypto Ignition Key). I am aware that when the CIK is inserted into a STU-III unit, the STU-III/CIK unit becomes classified to the level of the key and must be protected at that level.
I will immediately report the loss of a CIK or a STU-III to the COMSEC Custodian or Alternate COMSEC Custodian.
_____________________________________________________________/___________
SIGNATURE DATE
_________________________________________________________________________
PRINTED NAME
______________________________________________________________/___________
SIGNATURE OF COMSEC CUSTODIAN DATE
NOTE: Copies of this certification will be maintained by the Facility Security Officer in the individual's personnel security folder and by the COMSEC Custodian in a separate COMSEC folder.
ISSUING CIKs TO USERS If provided for in the STU-III SPP, have the COMSEC Custodian issue CIKs to the terminal users and have them each sign either the reverse of the CIK's yellow Crypto ID card or a "CIK Hand Receipt."
CIK Hand Receipt
I, ___________________________________________________, an employee
(Printed Full Name)
of _______________________________________________________, acknowledge
(Organization)
receipt of one CIK (Crypto Ignition Key) having the serial number ________________
and associated with the STU-III terminal having the serial number ________________
I have read and fully understand the STU-III Standard Practices Procedures regarding my responsibilities and agree to abide by them.
_____________________________________/___________
SIGNATURE OF CIK RECIPIENT DATE
_____________________________________/___________
SIGNATURE OF COMSEC CUSTODIAN DATE
NOTE: Copies of this certification will be maintained by the Facility Security Officer in the individuals personnel security folder and by the COMSEC Custodian in a separate COMSEC folder.
REPORTS TO NSA Ensure that the COMSEC Custodian reports to NSA: Send reports to NSA at this address: DIRNSA Send
ATTN: X712
9800 Savage Road
Ft. Meade, MD 20755-6000
EKMS Central Facility
P.O. Box 718
Finksburg, MD 21048-0718
SECURITY EDUCATION PROGRAM Establish a continuous program of STU-III security education.
CONTINUING ACCOUNTABILITY Be sure that each month the COMSEC Custodian compares all seed keys received with all those on hand, those destroyed, and each monthly "Key Conversion Notice" from the EKMS. In the event that a CIK is lost, have the COMSEC Custodian delete the lost CIK from the appropriate keyset and from its terminal's CIK list. (NOTE: Do not notify the EKMS or NSA COR of the loss of a CIK unless there is an indication of espionage or sabotage.) Be sure that the COMSEC Custodian conducts the required
Inspect STU-III equipment and usage as part of your facility self-inspection. DIS industrial security representatives will audit contractor SOCAs as part of their regular industrial security inspections. DIS SOCA inspections replace audits by the NSA COR.
ANNUAL REKEY Ensure that, for each STU-III, a terminal user performs
at least annually an electronic rekey (replacement of
operational key with new operational key by means of a telephone
call to the EKMS). Although the requirement is to rekey once a
year, the EKMS encourages rekeying from two to four times a
year. During the rekey call the EKMS will send the STU-III the
latest CIM/CKL. The user should note the following: Ensure that, if needed, the COMSEC Custodian performs a physical rekey of the STU-III (replacement of operational key with new operational key by means of a fill device, KSD-64A). An electronic rekey call to the EKMS should also be made to ensure that the STU-III terminal receives the most recent CIM/CKL.
ZEROIZING AND REFILLING TERMINALS Zeroize and refill the STU-III as needed. The STU-III battery backup allows power to be removed, as in a power failure or unplugging the unit to move it, without losing the encryption data. The zeroization button bypasses this backup and erases the encryption data. After zeroization, the STU-III must be rekeyed and the CIKs must be remade. The STU-III is zeroized: In an Emergency. - If the STU-III is ever in danger of falling into hostile hands, zeroize it to prevent the adversary from obtaining a functional unit. For Transfer or Code Change. - If you need to transfer the STU-III to another entity of your organization or if you wish to change the DAO code (identifier), zeroize the STU-III and refill it using the new seed key [or operational key]. By Accident. - The accident usually follows an employee's curiosity. The employee starts playing with the buttons and zeroizes the unit. Be sure to brief your employees on the importance of not pressing or playing with the zeroization button. Refill the STU-III using a new seed key [or operational key]. For Shipment. - If you are required, for maintenance or other reasons, to return the STU-III to the vendor, DIS, or other government agency, you should normally zeroize it.
RELOCATING A TERMINAL Ensure that no STU-III is moved without the prior approval of the COMSEC Custodian. Ensure too that if the STU-III is ever shipped from the facility, no CIK that enables it is ever shipped with it. The CIK must be packaged and shipped separately.
USER REPRESENTATIVE CHANGES Ensure that the Command Authority monitors the User Representative(s) and keeps the EKMS informed of any changes in personnel or privileges. The "User Representative Registration Form" also serves as the means of notifying the EKMS of such changes. NEW CCI CONTROL AGREEMENT Ensure that your company executes a new CCI Control Agreement when necessary: 1.In the event that the name of the company changes. Any change in a company name invalidates a CCI Control Agreement, and 2.In the event that your facility is covered under a corporate CCI Control Agreement and has been "bought out" by another company whose corporate headquarters does not have an agreement on file with NSA.
COMSEC CLOSEOUT Have the COMSEC Custodian close the COMSEC account if it is no longer required.
FACILITY CLEARANCE TERMINATION If the contractor's facility clearance is being terminated, a SOCA is in effect, and one or more NSA/DIS STU-III Loan Program terminals are located at the facility, ensure that the following actions are taken:
EKMS a "User Representative Registration Form" deleting the User Representative. This deletion will cancel all current and future key order requests.
DEFINITIONS ACCESS: The ability and opportunity to obtain knowledge of classified or sensitive information, equipment, or other materials; or the ability and opportunity to have unrestricted use, handling, or physical control thereof. The particular requirements for access to different categories of COMSEC materials are detailed in the COMSEC Supplement to the ISM and other official documents. ACOUSTIC SECURITY: Security practices relating to the prevention of unauthorized overhearing of discussions involving classified or unclassified but sensitive information. ALTERNATE COMSEC CUSTODIAN: The individual designated by proper authority to perform the duties of the COMSEC Custodian during the temporary absence of the COMSEC Custodian. AUTOMATED INFORMATION SYSTEM (AIS): An assembly of computer hardware, software, and firmware configured for the purpose of automating the functions of calculating, computing, sequencing, storing, retrieving, displaying, communicating, or otherwise manipulating data, information and textual material. CENTRAL ACCOUNTING OFFICE (CAO): The part of the Electronic Key Management System (EKMS) that provides accounting support to Central Offices of Record (CORs) and COMSEC Custodians for STU-III key. CENTRAL OFFICE OF RECORD (COR): A central office which keeps records of all accountable COMSEC material received by or generated within elements subject to its oversight. Usually within a government department or agency, its duties include establishing and closing COMSEC accounts, maintaining records of COMSEC Custodian and Alternate Custodian appointments, performing COMSEC inventories, and responding to queries concerning account management. NSA serves as the COR for most government contractors. CIK: A key storage device (KSD) that must be plugged into a COMSEC equipment to enable secure communications. It contains an electronic "password" used to lock and unlock a terminal's secure mode. The secure mode is unlocked when the CIK is inserted and turned, locked when it is removed. CIK is the abbreviation for Crypto Ignition Key. COMMAND AUTHORITY (CA): Individual responsible for managing STU-III key assets for a department, agency, or organization. The Command Authority determines the DAO Description and appoints User Representatives, assigning to them their key ordering privileges. COMMUNICATIONS SECURITY (COMSEC): COMSEC refers to protective measures taken to deny unauthorized persons information derived from telecommunications of the US Government relating to national security and to ensure the authenticity of such communications. COMSEC protection results from the application of security measures to electrical systems which generate, handle, process, or use national security information and also includes the application of physical security measures to COMSEC information or materials. COMPROMISE: The disclosure of classified information to persons not authorized access thereto. COMPROMISED KEY LIST (CKL): A list of compromised STU-III keys distributed by the EKMS to terminals during rekey calls. COMSEC ACCOUNT: An administrative entity responsible for maintaining custody and control of COMSEC material and identified by a 6-digit account number. COMSEC CUSTODIAN: The individual designated by proper authority to be responsible for the receipt, transfer, accountability, safeguarding, and destruction of COMSEC material assigned to a COMSEC account. COMSEC SUPPLEMENT TO THE ISM (CSISM): A section of the Industrial Security Manual published separately as DoD 5220.22-S. It establishes policies, procedures, and responsibilities for the control of COMSEC material furnished to, generated or acquired by US industry. It covers the safeguarding controls for classified and unclassified COMSEC material and equipment resident at cleared industrial facilities. CONTROLLED CRYPTOGRAPHIC ITEM (CCI) A secure telecommunications or information handling equipment, or associated cryptographic component or ancillary device which is unclassified when unkeyed (or when keyed with UNCLASSIFIED key) but controlled. Equipment and components so designated shall bear the designator "Controlled Cryptographic Item" or "CCI." CRYPTO: A marking or designator identifying all COMSEC key used to secure or authenticate telecommunications carrying classified or sensitive but unclassified government or government derived information, the loss of which could adversely affect the national interest. DEPARTMENT/AGENCY/ORGANIZATION (DAO) CODE: A 6-digit identification number assigned by the EKMS to a DAO description and used by the User Representative when ordering key. DEPARTMENT/AGENCY/ORGANIZATION (DAO) DESCRIPTION: A one or two line designation of the user's parent department, agency, or organization. The Command Authority determines the DAO Description, which forms the first part of the terminal user's identification information (authentication data) and appears in the distant terminal's display during a secure call. DESTRUCTION REPORT: Documentation on an SF 153 of the physical or electronic destruction of COMSEC material by NSA-authorized means. ELECTRONIC KEY MANAGEMENT SYSTEM (EKMS): The STU-III system, administered by the EKMS Central Facility, that provides all keying services to the user community. FILL DEVICE: Any one of a family of devices developed to read in, transfer, or store encryption key (e.g., Key Storage Device, KSD-64A). GOVERNMENT FURNISHED PROPERTY (GFP): Property in the possession of or directly acquired by the government and subsequently made available to a contractor but of which the Government retains ownership. GFP includes Government Furnished Equipment (GFE). HAND RECEIPT (HR): A document used to record local or temporary transfer of material from a custodian to a user and acceptance by the user of the responsibility for the material. KEYED: Containing cryptographic key. In applications employing a CIK, the crypto-equipment is considered keyed when an enabling CIK is inserted in the unit. KEY STORAGE DEVICE (KSD): The device that can be used as a fill device and also as a CIK for STU-III terminals. It is small, shaped like a key, and contains passive memory (ROM). When it is used to carry key to a terminal it is called a fill device; when it is used to protect encryption key that has been loaded into terminals, it is called a CIK. KEY MANAGEMENT PLAN: NSA guidance (EKMS-702.01) for managing the accounting and handling procedures for STU-III key. OPERATIONAL KEY: Encryption key sufficient to enable a STU-III that has been unlocked by an appropriate CIK to make direct secure calls up to a predesignated level of classification with other keyed STU-IIIs. PERSONNEL (SECURITY) CLEARANCE (PCL): An administrative determination that an individual is eligible, from a security point of view, for access to classified information of the same or lower category as the level of the PCL being granted. SECURE TELEPHONE UNIT, THIRD GENERATION (STU-III): The STU-III Type 1 terminal is a dual-purpose telephone capable of transmitting voice and data. It may be used as an ordinary telephone that operates over the public telephone network. It may also be used as a secure telephone to communicate through the public telephone network with other STU-III Type 1 terminals (classified and unclassified but sensitive information) and with Type 2 terminals. SEED KEY: Key that is loaded into a STU-III terminal by a fill device to enable the terminal to electronically obtain its operational key of a predetermined classification during a rekey call to the NSA Electronic Key Management System. TELECOMMUNICATION: The preparation, transmission, communication or related processing of information by electrical, electromagnetic, electromechanical, or electro-optical means. UNKEYED: Containing no key or containing a key which has been protected from unauthorized use by removing the CIK. USER REPRESENTATIVE (UR): An individual or office that operates as the agent of the Command Authority authorized to order key for a particular department, agency, or organization. ZEROIZE: To remove or eliminate the key from a crypto-equipment or fill device.
LIST OF LETTERS AND FORMS
CONTACT ADDRESSES NSA CENTRAL OFFICE OF RECORD National Security Agency (301) 688-8110 Operations Bldg. Nr. 3 ATTN: Y131 9800 Savage Road Ft. George G. Meade, MD 20755-6000 NSA STU-III PROGRAM OFFICE NSA STU-III Program Office 1-800-328-STU3/7883 ATTN: X24 (410) 684-7073 9800 Savage Road Ft. George G. Meade, MD 20755-6000 EKMS CENTRAL FACILITY EKMS Central Facility 1-800-635-5689 (Key Assistance) P.O. Box 718 1-800-635-6301 (Rekey) Finksburg, MD 21048-0718 (301) 526-3200 (Rekey) DEFENSE INVESTIGATIVE SERVICE Defense Investigative Service (703) 325-6057 ATTN: V0432 1340 Braddock Place Alexandria, VA 22314-1651 STU-III VENDOR HELP LINES AT&TGE/RCAMotorola 1-800-243-7883 1-800-521-9689 1-800-922-4357 (919) 279-3411 (609) 727-5282 (602) 437-2822 KSD-64A VENDORS DATAKEYCTS Corporation 407 West Travelers Trail 9210 Science Center Drive Burnsville, MN 55337-2554 New Hope, MN 55428-3635 (612) 890-6850 1-800-328-8828 (612) 533-3533 fax (612) 890-2726 fax (612) 553-3037
ABBREVIATIONS AIS - Automated Information System CAO - Central Accounting Office CAGE - Commercial and Government Entity CAP - Contractor Acquired Property CCI - Controlled Cryptographic Item CIK - Crypto Ignition Key CIM - Compromise Information Message CKL - Compromised Key List COMSEC - Communications Security COP - Contractor Owned Property COR - Central Office of Record DAO - Department/Agency/Organization DCS - Defense Courier Service DIS - Defense Investigative Service DoD - Department of Defense DoDSI - Department of Defense Security Institute EKMS - Electronic Key Management System, Central Facility FAR - Federal Acquisition Regulation FSO - Facility Security Officer FSVS - Future Secure Voice System GFE - Government Furnished Equipment GFP - Government Furnished Property HR - Hand Receipt IS - Industrial Security ISM - Industrial Security Manual, DoD 5220.22-M KCN - Key Conversion Notice KMID - Key Material Identification Number KSD - Key Storage Device NACSI - National Communication Security Instruction NSA - National Security Agency NSTISSC - National Security Telecommunications and Information Systems Security Committee NSTISSI - National Security Telecommunications and Information Systems Security Instruction POTS - Plain Old Telephone System SOCA - STU-III Only COMSEC Account SPP - Standard Practice Procedures STU-III - Secure Telephone Unit, Third Generation, Type 1
If you are interested in purchasing any of the equipment
listed on this page then please contact us. Granite Island Group offers a full
line of communications and technical security products ranging from inexpensive
body worn bug detectors, and encryption
equipment, to full TSCM deployment kits suitable for high threat corporate
and diplomatic TSCM inspections.
Our prices and terms are very competitive, and we offer only the highest
quality equipment available in the industry.
To be contacted for a confidential consultation please E-mail: jmatk@tscm.com
or send a letter via US Mail to:
or call:
URL: http://www.tscm.com/ |