IT Security Directive for the Control of COMSEC Material in the

Transcription

IT Security Directive for the Control of COMSEC Material in the
UNCLASSIFIED
IT Security Directive
for the
Control of COMSEC Material in the
Government of Canada
ITSD-03A
March 2014
UNCLASSIFIED
ITSD-03A
Foreword
The IT Security Directive for the Control of COMSEC Material in the Government of Canada
(ITSD-03A) is an UNCLASSIFIED publication issued under the authority of the Chief,
Communications Security Establishment, in accordance with the Treasury Board of Canada
Secretariat Policy on Government Security.
General inquiries and suggestions for amendments are to be forwarded through departmental
communications security channels to COMSEC Client Services at the Communications Security
Establishment.
This directive supersedes the following standards that must be destroyed in accordance with
departmental procedures governing sensitive information:

Directive for the Control of COMSEC Material in the Government of Canada (ITSD-03),
October 2011.

Canadian Cryptographic Doctrine for the Disposal of Accountable COMSEC Equipment
(CCD-49), February 2008.

Minimum National Security Requirements for Managing and Distributing Key in a BLACK
State (ITSB-55), August 2013.
Communications Security Establishment will notify users of changes to this publication.
Effective Date
This directive takes effect on date of signature.
Originally signed by
Toni Moffa
Deputy Chief, IT Security
March 2014
© Government of Canada, Communications Security Establishment, 2014
Physical or electronic copies of this publication, in part or in whole, may be made for official
Government of Canada use only.
Foreword
March 2014
ii
UNCLASSIFIED
ITSD-03A
Summary of Changes
With the introduction of several new Information Technology Security Directives recently
published by the Communications Security Establishment to support Communications Security
in the Government of Canada, several chapters, articles and annexes of the original Directive for
the Control of COMSEC in the Government of Canada (ITSD-03), dated October 2011, have
been re-organized, removed or updated, as indicated below.
Removed
Annex A
Control of In-Process COMSEC Material moved to new ITSD-08.
Added
New Annex A
Managing and Distributing Key in a BLACK State.
Article 1.9
Conflict Resolution.
Article 1.11
Added reference to Canadian Controlled Goods Program (CGP)
and United States International Traffic in Arms Regulations
(ITAR) requirements.
Articles 2.6, 12.6.3,
Fig. 1
Defined the new CSE Industrial COMSEC Account (CICA),
which has been authorized to manage Canadian Private Sector
COMSEC Sub-Accounts (previously the purview of PWGSC/
ITSD).
Article 2.8.1
Introduction of cryptographic key states (RED and BLACK) that is
detailed in Annex A.
Article 7.3.2
Special Marking and Warning Caveat “Eyes Only”.
Articles 10.5 – 10.7
Access Controls for COMSEC Visits.
Modified
Article 1.5
Amended to include Other Levels of Government (OLG).
Articles 2.2.3, 13.2.6.4,
15.2.1, 15.2.2.1, 15.4.1
Changed the name of the regularly scheduled inventory from
“annual” to “periodic” and extended its schedule to 18 months
from 12 months.
Article 6.1.1
Amended Appointment Certificate requirements for renewal.
Article 6.2.3
Amended to include manual accounting sub-systems.
Article 6.3.2
Amended requirement for Custodians to provide confirmation of
changes to the COMSEC Signing Authority Form.
Summary of Changes
March 2014
iii
UNCLASSIFIED
ITSD-03A
Article 6.3.7
Amended the time line for continuity of COMSEC Account
service to reflect immediacy of appointment of new personnel and
forwarding updated Appointment Certificates to NCOR/COR.
Article 8.2.3
Amended secondary Tracer Notice action to include DCA
involvement.
Article 9.5
Amended Drop Accounting to introduce doctrine for handling
COMSEC material acquired from international sources outside of
normal COMSEC channels.
Article 10.2.3
Amended to provide a requirement for COMSEC Briefing updates
(every five years) for active COMSEC personnel.
Chapter 11
Amended Physical Security requirements to include fixed and
mobile COMSEC facilities, point to TRA requirements and RCMP
Physical Security Zoning standards in establishing COMSEC
facilities at home and abroad.
Article 12.2, 13.2.5.3,
13.2.5.4, 13.2.5.5
Amended to introduce control and management direction for
magnetic or optical Removable Storage Media (RSM) as detailed
in the new Annex A.
Article 12.4.5.3
Modified the preparation and packaging criteria for CCI.
Article 13.4.7
Amended to include requirement for confirmation that upgrade has
been completed (including audit requirements).
Chapter 14
Amended the disposal (destruction) of accountable COMSEC
material requirements to include the direction formerly provided in
the Doctrine for the Disposal of Accountable COMSEC Equipment
(CCD-49).
Chapter 16
Amended the COMSEC Emergency Protection Planning criteria.
Article 17.3.2
Amended the requirement to report “MUST” be corrected
observations within 10 days, and a negotiable correction period for
less impacting observations.
Article 17.3.3
Modified tracer action for missing documentation to provide
escalated oversight. Where applicable, a 2nd tracer will be sent
directly to the DCA vice COMSEC Account Custodian.
Summary of Changes
March 2014
iv
UNCLASSIFIED
ITSD-03A
Table of Contents
Foreword ........................................................................................................................ ii
Summary of Changes .................................................................................................. iii
List of Tables .............................................................................................................. viii
List of Figures ............................................................................................................ viii
List of Abbreviations and Acronyms .......................................................................... ix
1
Introduction......................................................................................................... 1
1.1
Purpose ..................................................................................................... 1
1.2
Authority..................................................................................................... 1
1.3
Scope ........................................................................................................ 1
1.4
Context ...................................................................................................... 2
1.5
Application ................................................................................................. 2
1.6
Expected Results ....................................................................................... 3
1.7
Compliance ................................................................................................ 3
1.8
Consequence of Non-Compliance ............................................................. 3
1.9
Conflict Resolution ..................................................................................... 3
1.10 Requests for Exception or Waiver ............................................................. 3
1.11 Canadian Controlled Goods Program and United States International
Traffic in Arms Regulations........................................................................ 3
1.12 Contact Information ................................................................................... 4
1.13 COMSEC User Portal ................................................................................ 4
1.14 Communications Security Establishment Web Site ................................... 4
2
National COMSEC Material Control System ..................................................... 5
2.1
Structure and Organization Overview ........................................................ 5
2.2
National Central Office of Record .............................................................. 6
2.3
Central Office of Record ............................................................................ 7
2.4
National Distribution Authority.................................................................... 7
2.5
COMSEC Accounts ................................................................................... 8
2.6
COMSEC Sub-Accounts ............................................................................ 8
2.7
Local Elements .......................................................................................... 9
2.8
Accountable COMSEC Material................................................................. 9
3
Major COMSEC Roles and Responsibilities ................................................... 11
3.1
General .................................................................................................... 11
4
Selection of COMSEC Personnel .................................................................... 14
4.1
COMSEC Custodial Personnel ................................................................ 14
4.2
Local Element .......................................................................................... 14
Table of Contents
March 2014
v
UNCLASSIFIED
ITSD-03A
5
Training ............................................................................................................. 16
5.1
General .................................................................................................... 16
6
Management of COMSEC Accounts ............................................................... 18
6.1
Establishing COMSEC Accounts ............................................................. 18
6.2
Files and Records .................................................................................... 19
6.3
Changes to COMSEC Accounts .............................................................. 21
6.4
Closing a COMSEC Account ................................................................... 23
6.5
Closing a COMSEC Sub-Account............................................................ 23
6.6
Suspension of a COMSEC Account ........................................................ 24
7
Identification of Accountable COMSEC Material ........................................... 25
7.1
General .................................................................................................... 25
7.2
Identification ............................................................................................ 25
7.3
Special Marking and Warning Caveats .................................................... 27
8
Accounting Forms, Reports and Notices ....................................................... 29
8.1
COMSEC Material Reports ...................................................................... 29
8.2
Tracer Notices ......................................................................................... 37
9
Special Accounting Requirements ................................................................. 39
9.1
Canadian Controlled COMSEC Material Outside of the National
COMSEC Material Control System .......................................................... 39
9.2
Release of Accountable COMSEC Material to the Private Sector ........... 39
9.3
Government Furnished Equipment .......................................................... 39
9.4
COMSEC Material under Contract........................................................... 39
9.5
Drop Accounting – COMSEC Material Received from a Foreign Entity ... 40
10
Access to Accountable COMSEC Material ..................................................... 42
10.1 Prerequisite for Access ............................................................................ 42
10.2 COMSEC Briefing and COMSEC Briefing Certificate .............................. 42
10.3 Two-Person Integrity ................................................................................ 43
10.4 No-Lone Zone .......................................................................................... 43
10.5 Access Control – COMSEC Visits ........................................................... 44
10.6 Foreign Government Organizations Visiting a Government of Canada
Department .............................................................................................. 45
10.7 Foreign Private Sector Companies Visiting a Government of Canada
Department .............................................................................................. 45
11
Physical Security .............................................................................................. 46
11.1 COMSEC Facilities .................................................................................. 46
11.2 Secure Storage ........................................................................................ 48
12
Distribution and Receipt of Accountable COMSEC Material ........................ 53
12.1 Distributing Accountable COMSEC Material ............................................ 53
Table of Contents
March 2014
vi
UNCLASSIFIED
ITSD-03A
12.2
12.3
12.4
12.5
12.6
12.7
Distributing Electronic Key on Magnetic or Optical Removable Storage
Media ....................................................................................................... 54
Tracking the Shipment of Accountable COMSEC Material ...................... 54
Packaging Accountable COMSEC Material ............................................. 55
Authorized Modes of Transportation ........................................................ 58
Authorized Couriers of Accountable COMSEC Material .......................... 60
Receiving Accountable COMSEC Material .............................................. 62
13
Handling and Use of Accountable COMSEC Material ................................... 64
13.1 Cryptographic Key ................................................................................... 64
13.2 Cryptographic Equipment ........................................................................ 66
13.3 COMSEC Publications ............................................................................. 68
13.4 Local Tracking of Non-Accountable COMSEC Material .......................... 71
14
Disposal of Accountable COMSEC Material................................................... 74
14.1 General .................................................................................................... 74
14.2 Destruction of Key ................................................................................... 74
14.3 Destruction of COMSEC Publications...................................................... 75
14.4 Destruction of Cryptographic Equipment ................................................. 75
14.5 Performing Routine Destruction ............................................................... 78
14.6 Routine Destruction Methods .................................................................. 80
15
COMSEC Account Inventory............................................................................ 82
15.1 Reasons for Inventory.............................................................................. 82
15.2 Types of Inventory ................................................................................... 82
15.3 Inventory Reports .................................................................................... 83
15.4 Inventory Conduct .................................................................................... 84
16
COMSEC Emergency Protection Planning ..................................................... 87
16.1 Requirement ............................................................................................ 87
16.2 Planning for Natural Disasters and Accidental Emergencies ................... 87
16.3 Planning for Emergencies in High Risk Environments ............................. 88
16.4 The Emergency Plan ............................................................................... 89
17
COMSEC Account Audit................................................................................... 92
17.1 Planning the Audit.................................................................................... 92
17.2 Conducting the Audit ............................................................................... 92
17.3 Audit Reporting ........................................................................................ 93
17.4 COMSEC Sub-Account Audits ................................................................ 94
18
COMSEC Incidents ........................................................................................... 95
18.1 General .................................................................................................... 95
18.2 Classes of COMSEC Incidents ................................................................ 95
18.3 Handling, Reporting and Evaluating COMSEC Incidents ........................ 95
Glossary ....................................................................................................................... 96
Table of Contents
March 2014
vii
UNCLASSIFIED
ITSD-03A
Bibliography .............................................................................................................. 103
Annex A - Managing and Distributing Key in a BLACK State ................................ A-1
A.1 Accounting and Handling Principles .......................................................A-1
Appendix A – Key Distribution Methods ................................................................. A-4
A.A.1 Key Distribution Methods ........................................................................A-4
Appendix B – Requirements for Key in a RED, BLACK or Benign Fill States ...... A-6
A.B.1 RED, BLACK or Benign Fill Key States ..................................................A-6
Appendix C – Foreign Produced BLACK Key ......................................................... A-9
List of Tables
Table 1 – Contact Information for COMSEC Offices ....................................................... 4
Table 2 – Key Held in Reserve...................................................................................... 51
Table 3 – Authorized Modes of Transportation for Accountable COMSEC Material ..... 59
Table 4 – Key States .................................................................................................... A-6
List of Figures
Figure 1 – National COMSEC Material Control System (NCMCS).................................. 5
Figure 2 – Example of Magnetic or Optical Removable Storage Media Label .............. 54
Figure 3 – Accountability Concept for Key in a BLACK State ...................................... A-2
Figure 4 – Key Distribution Methods for Key in a BLACK State ................................... A-4
Table of Contents
March 2014
viii
UNCLASSIFIED
ITSD-03A
List of Abbreviations and Acronyms
ACM
ACMCA
AEHF
AFU
ALC
ATU
Accountable COMSEC Material
Accountable COMSEC Material Control Agreement
Advanced Extremely High Frequency
Approval for Use
Accounting Legend Code
Authorization to Use
BET
Bulk Encryption Transaction
CA
CAN
CCD
CCI
CCF
CD-ROM
CFCSU
CGP
CHVP
CICA
CIK
CISD
CKL
CMAC
COMSEC
COR
Cryptonet
CSE
CSMI
CUAS
CUP
Controlling Authority
Canada
Canadian Cryptographic Doctrine
Controlled Cryptographic Item
Canadian Central Facility
Compact Disk Read-Only Memory
Canadian Forces Crypto Support Unit
Controlled Goods Program
Cryptographic High Value Product
CSE Industrial COMSEC Account
Cryptographic Ignition Key
Canadian Industrial Security Directorate
Compromised Key List
Crypto Material Assistance Centre
Communications Security
Central Office of Record
Cryptographic Network
Communications Security Establishment
Classified Security Management Infrastructure
Common User Application Software
COMSEC User Portal
DCA
DDSM
DND
DSO
DVD
Departmental COMSEC Authority
Directive on Departmental Security Management
Department of National Defence
Departmental Security Officer
Digital Versatile Disk
EDP
EKMS
Emergency Destruction Procedure
Electronic Key Management System
FAA
FOUO
FSU
Financial Administration Act
For Official Use Only (U.S.)
Field Software Upgrade
List of Abbreviations and Acronyms
March 2014
ix
UNCLASSIFIED
ITSD-03A
GC
GFE
Government of Canada
Government Furnished Equipment
HTTPS
Hypertext Transfer Protocol Secure
IC
ID
IFF
IP
ISDN
ISP
IT
ITAR
ITS AFU
ITSA
ITSB
ITSC
ITSD
ITSG
ITSLC
Integrated Circuit
Identifier
Identification Friend or Foe
In-Process
Integrated Services Digital Network
Industrial Security Program
Information Technology
International Traffic in Arms Regulations
Information Technology Security Approval For Use
Information Technology Security Alert
Information Technology Security Bulletin
Information Technology Security Coordinator
Information Technology Security Directive
Information Technology Security Guidance
Information Technology Security Learning Centre
KEK
KMID
KMSP
KP
KSD
Key Encryption Key
Key Material Identifier
Key Material Support Plan
Key Processor
Key Storage Device
LCMS
Local COMSEC Management Software
MITS
MOA
MOU
Management of Information Technology Security
Memorandum of Agreement
Memorandum of Understanding
NATO
NCAT
NCER
NCIO
NCMCS
NCOR
NDA
NLZ
NMT
North Atlantic Treaty Organization
National COMSEC Audit Team
National Cryptographic Equipment Reserve
National COMSEC Incidents Office
National COMSEC Material Control System
National Central Office of Record
National Distribution Authority
No-Lone Zone
Navy Multi-band Terminal
OLG
ORR
OTAD
OTAR
Other Levels of Government
Operational Rekey Report
Over-the-Air Distribution
Over-the-Air Rekey
List of Abbreviations and Acronyms
March 2014
x
UNCLASSIFIED
ITSD-03A
PC
PCB
PDS
PGS
PIN
PKI
PROM
PSTN
PWA
PWGSC
Personal Computer
Polychlorinated Biphenyls
Practice Dangerous to Security
Policy on Government Security
Personal Identification Number
Public Key Infrastructure
Programmable Read-Only Memory
Public Switched Telephone Network
Printed Wiring Assembly
Public Works and Government Services Canada
RCMP
RSM
Royal Canadian Mounted Police
Removable Storage Medium
SA&A
SCIP
SDNS
SKCR
SMART-T
SPIRS
Security Assessment and Authorization
Secure Communication Interoperability Protocol
Secure Data Network System
Seed Key Conversion Report
Secure Mobile Anti-Jam Reliable Tactical Terminal
Secure Data Network System (SDNS) Public Switched Telephone
Network (PSTN)-Integrated Services Digital Network (ISDN) Rekey
Subsystem
T3MD
TBS
TEK
TPI
TRA
TRI
TRR
Tier 3 Management Device
Treasury Board of Canada Secretariat
Traffic Encryption Key
Two-Person Integrity
Threat and Risk Assessment
Transfer Report Initiating
Transfer Report Receipt
U//FOUO
U.S.
UK
USB
UNCLASSIFIED//For Official Use Only (U.S.)
United States
United Kingdom
Universal Serial Bus
List of Abbreviations and Acronyms
March 2014
xi
UNCLASSIFIED
ITSD-03A
1
Introduction
The Government of Canada (GC) has established a program known as Communications Security
(COMSEC) to assist in the protection of classified information and data. The COMSEC program
involves the application of cryptographic security, transmission and emission security, physical
security measures, operational practices, and controls. The objective of COMSEC is to deny
unauthorized access to information derived from telecommunications and to ensure the
authenticity of such telecommunications.
“COMSEC material” is designed to secure or authenticate telecommunications information.
COMSEC material includes cryptographic key, devices, hardware, and firmware or software that
embodies or describes cryptographic logic. It also includes the documents that describe and
support these items.
NOTE:
1.1
Throughout the remainder of this document (except in the glossary), the term
“cryptographic key” will be referred to as “key”. The term “key” will include all
forms of physical or electronic key and will be used to refer to both singular and
multiple quantities of key.
Purpose
This directive provides the minimum security requirements for the control and management of
COMSEC material authorized by the Communications Security Establishment (CSE) for use by
the GC.
1.2
Authority
This directive is promulgated pursuant to the Policy on Government Security (PGS) that
delegates CSE as the lead security agency and national authority for COMSEC. CSE is
responsible for the development, approval and promulgation of COMSEC policy instruments and
for the development of guidelines and tools related to Information Technology (IT) security.
1.3
Scope
The methods for the control and management of Accountable COMSEC Material (ACM) vary
and are determined by the nature of the material itself. The scope of this directive includes:
 ACM, which requires control and accountability within the National COMSEC Material
Control System (NCMCS); and
NOTE: The term “accountable” in ACM is meant to define the CSE-approved control and
management requirements associated with ACM asset management within the
NCMCS.

COMSEC material (other than above), which requires control and local tracking by the
COMSEC Custodian through a manual or electronic tracking system outside of the NCMCS.
Introduction
March 2014
1
UNCLASSIFIED
ITSD-03A
COMSEC material under development, which requires local accounting and control within an
In-Process (IP) COMSEC accounting system, is not within the scope of this directive (refer to the
IT Security Directive for the Control and Management of In-Process COMSEC Material
[ITSD-08], for details on management of IP COMSEC material).
1.4
Context
This directive supports the PGS, the Operational Security Standard: Management of Information
Technology Security (MITS), and the Directive on Departmental Security Management (DDSM).
It should be read in conjunction with the following publications:

IT Security Directive for the Application of Communications Security Using CSE-Approved
COMSEC Solutions (ITSD-01A), December 2013;

Directive for the Use of CSEC-Approved COMSEC Equipment and Key on a
Telecommunications Network (ITSD-04), November 2011;

Directive for Reporting and Evaluating COMSEC Incidents Involving Accountable COMSEC
Material (ITSD-05), April 2012;

Directive for the Control of COMSEC Material in the Canadian Private Sector (ITSD-06),
March 2013;

IT Security Directive for the Control of CSE-Approved Cryptographic High Value Products
(CHVP) (ITSD-07), in development; and

IT Security Directive for the Control and Management of In-Process COMSEC Material
(ITSD-08), in development.
1.5
Application
This directive and the supporting directives identified in Article 1.4 apply to GC departments,
Other Levels of Government (OLG) and private sector companies that are authorized to handle,
control and safeguard CSE-approved COMSEC material to protect classified and
PROTECTED C information and data for the GC.
For the purpose of this directive, the term:

“GC department” includes any federal institution (e.g. department, agency, organization)
subject to PGS and to Schedules I, I.1, II, IV and V of the Financial Administration
Act (FAA), unless excluded by specific acts, regulations or Orders in Council;

“Other Levels of Government” includes provincial, municipal and local government
organizations (e.g. law enforcement agencies); and
Introduction
March 2014
2
UNCLASSIFIED
ITSD-03A

“private sector company” includes Canadian companies, organizations or individuals that do
not fall under the FAA or are not subordinate to a provincial or municipal government. It also
includes Canadian-based industries (or other non-government organizations) where security
is administered by the Industrial Security Program (ISP) of Public Works and Government
Services Canada (PWGSC).
1.6
Expected Results
Implementation of this directive will help ensure control, safeguard and accounting for ACM in
departmental communications operations.
1.7
Compliance
Compliance with these minimum security requirements is the responsibility of each organization
identified in Article 1.5; however, it does not preclude individual organizations from applying
more stringent security measures. Organizational directives that exceed the minimum security
requirements of this directive take precedence within that organization and associated network
connectivity with respect to Security Assessment and Authorization (SA&A) requirements.
1.8
Consequence of Non-Compliance
Failure to comply with this directive may result in escalated administrative controls being placed
on a COMSEC Account and possible suspension of key delivery.
1.9
Conflict Resolution
When a conflicting national-level COMSEC directive (e.g. ITSD series) is encountered, this
directive will take precedence. Any conflict between the requirements contained in this directive
and any other national (e.g. PGS, DDSM and MITS) or international (e.g. International Traffic in
Arms Regulations [ITAR]) requirements are to be submitted to COMSEC Client Services for
resolution.
1.10 Requests for Exception or Waiver
Requests for an exception (substitution) or a waiver (a temporary exemption from a specific
requirement) must be submitted by the DCA in writing and with a justification, to COMSEC
Client Services for approval.
1.11 Canadian Controlled Goods Program and United States
International Traffic in Arms Regulations
In addition to the direction provided in this directive for ACM assets, GC departments, OLG and
private sector companies must comply with the Canadian Controlled Goods Program (CGP) and
United States (U.S) ITAR requirements.
Introduction
March 2014
3
UNCLASSIFIED
ITSD-03A
1.12 Contact Information
The following table contains contact information for offices within CSE that provide COMSEC
support to users.
Unless otherwise specified, CSE’s telephone and secure fax contact numbers listed below are
attended from 8 a.m. to 4 p.m. Eastern Time, Monday to Friday.
Table 1 – Contact Information for COMSEC Offices
COMSEC Client Services
[email protected]
Telephone: 613-991-8495
Secure Fax: 613-991-8565
Crypto Material Assistance Centre (CMAC) and National Central Office of Record (NCOR)
[email protected]
Telephone: 613-991-8600
Fax: 613-991-7440
Secure Fax: 613-998-5686
National COMSEC Incidents Office (NCIO)
Telephone: 613-991-8175
After office hours:
Fax: 613-991-7588
Telephone: 613-991-8762
Secure Fax: Call 613-991-8175 for set up
Secure Fax: 613-991-8766
[email protected]
[email protected]
1.13 COMSEC User Portal
Authorized users may access the CSE COMSEC User Portal (CUP) at
https://comsecportal.cse-cst.gc.ca. The CSE CUP provides COMSEC-related UNCLASSIFIED
and PROTECTED A information, as well as Field Software Upgrades (FSUs) associated with
CSE-approved high assurance products, systems and services. For information on becoming an
authorized user of the CSE CUP, contact CMAC.
1.14 Communications Security Establishment Web Site
COMSEC publications and information (UNCLASSIFIED only) associated with CSE-approved
high assurance products, systems and services are available on the CSE web site at
http://www.cse-cst.gc.ca/en/group-groupe/high-assurance-technologies.
1.14.1 COMSEC Forms and Report Templates
COMSEC control and management forms and report templates identified in this directive are
available in the CSE CUP or through CMAC.
Introduction
March 2014
4
UNCLASSIFIED
ITSD-03A
2
National COMSEC Material Control System
2.1
Structure and Organization Overview
The NCMCS is a CSE-approved centralized national control system which includes the
personnel, training, and procedures that enable GC departments to ensure positive control and
effectively handle ACM. The NCMCS provides for the control of ACM through:

National Central Office of Record (NCOR)

Central Office of Record (COR)

National Distribution Authority (NDA)

COMSEC Accounts

COMSEC Sub-Accounts, and

Local Elements.
National Central Office
of
Record (NCOR)
GC Department
COMSEC Accounts
Local
Elements
COMSEC
Sub-accounts
National Distribution
Authority (NDA)
CSE Industrial
COMSEC Account
(CICA)
Department of National
Defence (DND)
Central Office of Record (COR)
COMSEC
Sub-accounts
DND
COMSEC Accounts
COMSEC
Sub-accounts
Local
Elements
Local
Elements
Local
Elements
Figure 1 – National COMSEC Material Control System (NCMCS)
National COMSEC Material
Control System
March 2014
5
UNCLASSIFIED
ITSD-03A
2.2
National Central Office of Record
2.2.1 Overview
NCOR is the entity at CSE which is responsible for overseeing the management and accounting
of ACM produced in, or entrusted to Canada. NCOR is not a COMSEC Account and never holds
ACM. NCOR responsibilities are assigned to three distinct roles: Registration Authority,
COMSEC Accounts Manager, and Key Processor (KP) Privilege Certificate Manager. These
roles are centrally administered by CMAC. Refer to Article 1.12 for contact information.
2.2.2 Registration Authority
As the national Registration Authority for all GC COMSEC Accounts, NCOR personnel:

manage the Electronic Key Management System (EKMS) Identifiers (IDs) (i.e. COMSEC
Account numbers) used in Canada;

assign a unique COMSEC Account Number (also known as EKMS ID) to each COMSEC
Account;

collect and maintain account registration data in the EKMS Directory Service;

provide registration data to COMSEC Accounts that do not have access to the EKMS
Directory Service;

confirm the appointment or termination of appointment of the DCA, COMSEC Custodian
and Alternate COMSEC Custodian(s);

open and close COMSEC Accounts for the GC;

temporarily deactivate COMSEC Accounts for GC departments;

register NCOR with allied COMSEC material control systems; and

register COMSEC Accounts with allied COMSEC material control systems when those
accounts are authorized to exchange ACM with allied countries.
2.2.3 COMSEC Accounts Manager
As National COMSEC Account Manager, NCOR personnel:

maintain a master inventory of all centrally accountable ACM for those COMSEC Accounts
under their purview;

process COMSEC Material Reports, including validation of signature(s) against signature
specimens;

perform periodic (sometimes called annual inventory in other documentation) inventory
reconciliations with COMSEC Accounts;
National COMSEC Material
Control System
March 2014
6
UNCLASSIFIED
ITSD-03A

monitor the effective dates of key to ensure it is destroyed and reported as destroyed in a
timely manner;

support the evaluation and recovery from compromise or potential compromise of COMSEC
material; and

liaise with COMSEC Account custodial staff and provide guidance and assistance on all
COMSEC accounting matters.
2.2.4 Key Processor Privilege Certificate Manager
As the KP Privilege Certificate Manager, NCOR personnel:

accept and validate requests for KP Privilege Certificate;

create, sign and distribute KP Privilege Certificates; and

maintain configuration control of KP Privilege Certificates.
2.3
Central Office of Record
A COR is an entity within a GC department that is responsible for overseeing the management
and accounting of ACM held by COMSEC Accounts subject to its oversight. NCOR will
establish a COR in a GC department upon approval from COMSEC Client Services. A COR can
only be established by receiving delegated authorities from the NCOR to administer the
regulatory processes of this directive within its own department.
NOTE:
2.4
CSE has established the Department of National Defence (DND) Canadian Forces
Crypto Support Unit (CFCSU) as a COR. Throughout this directive, the combined
term NCOR/COR will mean NCOR (or COR if applicable).
National Distribution Authority
The NDA is the entity at CSE responsible for the movement (receipt and distribution) of ACM in
and out of the country. It is also responsible for:

storing a limited amount of ACM for eventual distribution;

storing contingency key, in the event of system failure;

holding the National Cryptographic Equipment Reserve (NCER);

receiving ACM for disposal, or out-of-country repair or transfer;

receiving and redistributing allied ACM;

receiving damaged or defective ACM being returned to CSE for technical evaluation; and

generating and distributing electronic key, as required.
National COMSEC Material
Control System
March 2014
7
UNCLASSIFIED
ITSD-03A
2.5
COMSEC Accounts
GC departments must establish a CSE-approved COMSEC Account before receiving ACM.
Normally, only one COMSEC Account is established at each GC department. However, if
sufficient justification exists, COMSEC Client Services may approve the establishment of
additional COMSEC Account(s) within a GC department. COMSEC Accounts may establish
COMSEC Sub-Accounts and may register Local Elements. Each COMSEC Account is assigned
a unique COMSEC Account number by a NCOR/COR.
The minimum COMSEC Account personnel requirements include:

a DCA (refer to Article 3.1.3)

a COMSEC Custodian, and

at least one Alternate COMSEC Custodian.
NOTE 1: More than one Alternate COMSEC Custodian is recommended for COMSEC
Accounts requiring Two-Person Integrity (TPI) or No Lone Zone (NLZ) controls.
NOTE 2: Refer to Chapter 3 for requirements applicable to personnel roles and responsibilities
and Chapter 6 for information on establishing COMSEC Accounts.
2.6
COMSEC Sub-Accounts
GC departments may establish COMSEC Sub-Accounts to help facilitate control over a large
inventory or dispersed ACM. A COMSEC Sub-Account:

will be assigned a unique COMSEC Sub-Account number by the parent COMSEC Account
Custodian;

must have a COMSEC Sub-Account Custodian and at least one Alternate COMSEC
Sub-Account Custodian;

must exchange ACM and accounting transactions only with its own parent COMSEC
Account;

must not hold COMSEC material to which the parent COMSEC Account cannot have access;
and

must register Local Elements.
NOTE:
The CSE Industrial COMSEC Account (CICA) is responsible for establishing
COMSEC Sub-Accounts for the private sector and has a unique COMSEC
management relationship (Refer to the Directive for the Control of COMSEC
Material in the Canadian Private Sector [ITSD-06]).
National COMSEC Material
Control System
March 2014
8
UNCLASSIFIED
ITSD-03A
2.7
Local Elements
Local Elements are individuals who are authorized to hold, store and use ACM. Local Elements
share the COMSEC Account number of the COMSEC Account or COMSEC Sub-Account at
which they are registered. Local Elements are authorized to exchange ACM only with the
COMSEC Account or COMSEC Sub-Account at which they are registered. Local Elements are
not authorized to re-loan ACM.
Local Elements are not normally permitted to be registered at more than one COMSEC Account
or COMSEC Sub-Account at the same time; however, in cases where a GC department may have
more than one COMSEC Account or COMSEC Sub Account, Local Elements of that GC
department may be registered at each of the department’s COMSEC Account/Sub-Accounts.
NOTE:
2.8
Local Elements are typically departmental employees, embedded (to the department)
contractors, or personnel on assignment or integral to that department.
Accountable COMSEC Material
The NCMCS is approved to account for three types of ACM:

Key

Cryptographic equipment, and

COMSEC publications.
2.8.1 Key
The term key (also known as keying material or keymat in other documentation) refers to
information used to set-up and periodically change the operations performed in cryptographic
equipment for the purpose of encrypting and decrypting electronic signals and digital signatures,
determining electronic countermeasures patterns, or producing other key. Key is normally
accounted for by its short title. Throughout the remainder of this directive, the term key will refer
to singular or plural form. Refer to the IT Security Guidance on Cryptographic Key Ordering
Manual (ITSG-13) for additional detail.
Key is generated and delivered in one of two states:

RED (unencrypted), which is accounted for within NCMCS, or

BLACK (encrypted), which is not accounted for within NCMCS.
NOTE:
Annex A provides the minimum security requirements for the management of key in a
safe/protected (BLACK) state.
National COMSEC Material
Control System
March 2014
9
UNCLASSIFIED
ITSD-03A
2.8.2 Cryptographic Equipment
Cryptographic equipment is normally identified and accounted for by one short or long title,
rather than by individual components or sub-assemblies. Whenever a component or sub-assembly
that has been assigned a NCMCS Accounting Legend Code (ALC) is removed from its host
equipment, the item must be accounted for as a separate item within NCMCS and must be
identified separately by its individual short title. Refer to the Canadian Cryptographic
Doctrine (CCD) series for further information on specific cryptographic equipment.
2.8.2.1
Controlled Cryptographic Item
The CCI marking indicates a type of cryptographic equipment that must always be accounted for
and controlled within the NCMCS. The CCI category applies to specific unclassified, secure
communications and information handling equipment, as well as associated cryptographic
components and assemblies.
In many cases, COMSEC material in the CCI category will not be assigned a short title, but will
instead bear the manufacturer’s commercial designator. This equipment will be marked
“Controlled Cryptographic Item” or “CCI”, and will bear a government serial number label.
Since CCI and associated cryptographic components employ a classified cryptographic logic, it is
only the hardware or firmware embodiment of that logic that is unclassified. The associated
cryptographic engineering drawings, logic descriptions, theory of operation, computer programs,
and related cryptographic information remain classified.
2.8.3 COMSEC Publications
COMSEC publications may include:

cryptographic maintenance manuals

sensitive pages of a cryptographic maintenance manual

cryptographic operating instructions

classified full maintenance manuals

classified depot maintenance manuals

cryptographic logic descriptions

drawings of cryptographic logics

specifications describing a cryptographic logic

other classified cryptographic and non-cryptographic operational publications

replacement pages to the above and like publications, and

extracts, supplements and addenda from accountable COMSEC publications.
National COMSEC Material
Control System
March 2014
10
UNCLASSIFIED
ITSD-03A
3
Major COMSEC Roles and Responsibilities
3.1
General
All COMSEC Account personnel and other personnel requiring access to ACM must be
Canadian citizens (including those of dual nationality). Except for Canadian private sector
COMSEC Sub-Accounts (refer to ITSD-06), COMSEC Account personnel must be employees of
the GC department registered to the COMSEC Account.
3.1.1 Deputy Head
GC Department Deputy Heads are responsible for implementing this directive.
3.1.2 Departmental Security Officer
The DSO is appointed by the department Deputy Head. Among other duties, as listed in the PGS,
the DSO’s responsibility includes managing the department’s security program. For more details
on the roles and responsibilities of the DSO, consult the DDSM.
3.1.3 Departmental COMSEC Authority
A DCA may be appointed by the DSO to act in his or her stead to manage the departmental
COMSEC program. The DCA is responsible for developing, implementing, maintaining,
coordinating and monitoring a departmental COMSEC program that is consistent with the PGS
and its operational standards. Additionally, the DCA is responsible for the overall control of
ACM that has been charged to the departmental COMSEC Account. Refer to the DCA Quick
Reference Guide for an overview of the DCA responsibilities associated with the control of
COMSEC material.
NOTE 1: A GC department may determine that the Information Technology Security
Coordinator (ITSC) will appoint the DCA.
NOTE 2: In a department where a DCA is not appointed, the DSO or the ITSC must assume the
role and responsibilities of the DCA.
3.1.3.1
Separation of Duties
The DCA, or any other individual within the GC department fulfilling the role of the DCA, may
not be appointed as a COMSEC Custodian, Alternate COMSEC Custodian, COMSEC
Sub-Account Custodian or Alternate COMSEC Sub-Account Custodian.
COMSEC Custodian personnel must not be designated to manage more than one COMSEC
Account or COMSEC Sub-Account at the same time.
Major COMSEC Roles
and Responsibilities
March 2014
11
UNCLASSIFIED
ITSD-03A
3.1.4 COMSEC Custodian
COMSEC Custodians are responsible for the generation, receipt, custody, distribution,
disposition or destruction, and accounting of ACM entrusted to their COMSEC Account or SubAccount, in accordance with this directive. COMSEC Custodians are also responsible for
providing their Local Elements and other authorized users with cryptographic equipment
troubleshooting support and guidance on the use of key.
NOTE:
The COMSEC Custodian Quick Reference Guide provides an overview of the
responsibilities for the COMSEC Custodian, Alternate COMSEC Custodian,
COMSEC Sub-Account Custodian and the Alternate COMSEC Sub-Account
Custodian.
3.1.5 Alternate COMSEC Custodian
The Alternate COMSEC Custodian assists the COMSEC Custodian in the day-to-day activities
of the COMSEC Account or Sub-Account and performs the duties of the COMSEC Custodian in
the temporary absence of the COMSEC Custodian.
3.1.6 COMSEC Sub-Account Custodian
COMSEC Sub-Account Custodians are responsible for the generation, receipt, custody,
distribution, disposition or destruction, and accounting of ACM entrusted to their COMSEC SubAccount as detailed in this directive. COMSEC Sub-Account Custodians are also responsible for
providing their Local Elements and other authorized users with cryptographic equipment
troubleshooting support and guidance on the use of key.
3.1.7 Alternate COMSEC Sub-Account Custodian
The Alternate COMSEC Sub-Account Custodian assists the COMSEC Sub-Account Custodian
in the day-to-day activities of the COMSEC Sub-Account and performs the duties of the
COMSEC Sub-Account Custodian in the temporary absence of the COMSEC Sub-Account
Custodian.
3.1.8 Local Element
A Local Element is an individual who is authorized to hold, store and use ACM. Local Elements
are personally responsible for the control, safeguarding and disposition of ACM to which they
have been entrusted in accordance with the control and handling instructions provided by their
COMSEC Account or Sub-Account Custodian. Refer to the Local Elements Responsibilities
Form for complete detail.
Major COMSEC Roles
and Responsibilities
March 2014
12
UNCLASSIFIED
ITSD-03A
3.1.9 Controlling Authority for Cryptographic Networks
A cryptographic network (cryptonet) requires a DCA appointed Controlling Authority (CA) to
manage the operational use of the key assigned to the cryptonet and to develop a Key Material
Support Plan (KMSP) before the cryptonet can be given authority to operate. Refer to the
ITSD-04 for complete detail on the responsibilities of the CA and how to prepare a KMSP.
3.1.10 Other Authorized Users
In certain instances, individuals such as shift workers and technicians (hereinafter referred to as
authorized users) may require short term (immediate) access to ACM. Before allowing this
access, the COMSEC Custodian must ensure the intended authorized user meets the
requirements of Article 10.1.1, and:

signs for and maintains constant personal surveillance of the ACM until it is returned;

returns ACM for lock-up when not under positive personal possession;

does not transport the ACM to another work area or building without consent of the
COMSEC Custodian; and

understands what constitutes a COMSEC incident or potential COMSEC incident.
3.1.11 Key Ordering Personnel
The DCA is responsible for appointing key ordering personnel and establishing their privileges to
submit orders for key.
NOTE 1: The role of key ordering is a separate responsibility from COMSEC custodial duties;
however, the DCA may appoint the role of key ordering to COMSEC custodial
personnel.
NOTE 2: Refer to ITSG-13 for key ordering requirements.
3.1.12 Witness
The witness to COMSEC transactions is normally the Alternate COMSEC Custodian; however,
another individual with the pre-requisites for access to ACM and a security status at least equal
to the highest classification level of the ACM transaction being witnessed may act as a witness.
The witness must not sign any documentation without having personally sighted the ACM listed
on a transaction form.
Major COMSEC Roles
and Responsibilities
March 2014
13
UNCLASSIFIED
ITSD-03A
4
Selection of COMSEC Personnel
4.1
COMSEC Custodial Personnel
The DCA must carefully screen individuals who have been selected to become a COMSEC
Custodian, Alternate COMSEC Custodian, COMSEC Sub-Account Custodian or Alternate
COMSEC Sub-Account Custodian to ensure that each proposed individual:

is a Canadian citizen (including those of dual nationality);

possesses a security clearance at least equal to the highest sensitivity of the COMSEC
material held in the COMSEC Account, but never less than SECRET;

possesses a current COMSEC Briefing (refer to Article 10.2);

is a responsible individual who is qualified to assume the duties and responsibilities of
COMSEC Custodian, Alternate COMSEC Custodian, COMSEC Sub-Account Custodian or
Alternate COMSEC Sub-Account Custodian;

is in a position or level of authority, which would permit the individual to exercise proper
jurisdiction in fulfilling the responsibilities of the position;

has not previously been relieved of COMSEC Custodian, Alternate COMSEC Custodian,
COMSEC Sub-Account Custodian or Alternate COMSEC Sub-Account Custodian duties for
reasons of negligence or non-performance of duties; and

will not be assigned duties that would interfere or conflict with the duties as COMSEC
Custodian, Alternate COMSEC Custodian, COMSEC Sub-Account Custodian or Alternate
COMSEC Sub-Account Custodian.
4.2
Local Element
The COMSEC Custodian or COMSEC Sub-Account Custodian must ensure that Local Elements
are established for operational purposes where access to ACM is required. A Local Element
must:

be a Canadian citizen (including those of dual nationality);

possess a security clearance at least equal to the highest sensitivity of the COMSEC material
that will be provided;

possess a current COMSEC Briefing (refer to Article 10.2);

read and sign a Local Element Responsibilities Form;

be a responsible individual who is qualified to assume the duties and responsibilities of a
Local Element;
Selection of COMSEC Personnel
March 2014
14
UNCLASSIFIED
ITSD-03A

be in a position or at a level of authority which would permit the individual to exercise proper
jurisdiction in fulfilling the responsibilities of a Local Element; and

not have been previously relieved of Local Element duties for reasons of negligence or
non-performance of duties.
Selection of COMSEC Personnel
March 2014
15
UNCLASSIFIED
ITSD-03A
5
Training
5.1
General
COMSEC Custodians require formal training. The DCA must ensure that each new COMSEC
Custodian and Alternate COMSEC Custodian attends a formal COMSEC Custodian course
before or as soon as possible following the appointment. Other departmental personnel who use
or are responsible for the control of ACM may also attend this course.
5.1.1 Schedules and Registration
Training course schedules and registration information are available from the IT Security
Learning Centre (ITSLC) at CSE.
Personnel attending training that requires access to ACM will be COMSEC briefed by the ITSLC
if the attendee does not have a current signed COMSEC Briefing Form.
NOTE:
Due to technological, procedural and standards advances, COMSEC personnel who
have not performed COMSEC related duties for more than two years, must attend
formal COMSEC training.
5.1.2 Interim COMSEC Custodian Training
Where formal training is unavailable prior to appointment or when a new COMSEC Custodian
or Alternate COMSEC Custodian is unable to attend, the DCA or the COMSEC Custodian, as
applicable, must provide interim training. If interim training cannot be provided, contact NCOR
to arrange for interim training assistance.
5.1.3 COMSEC Accounting System Training
Before installing CSE-approved accounting software packages, COMSEC Custodians and
Alternate COMSEC Custodians must attend formal training. Other COMSEC Account personnel
may also attend this course.
5.1.4 Cryptographic Equipment Training
Before using cryptographic equipment, and to the extent possible, COMSEC Custodians and
Alternate COMSEC Custodians should attend formal cryptographic equipment training courses.
Local Elements may also attend these courses.
5.1.4.1
Manufacturer Provided Training
Some manufacturers of CSE-approved cryptographic equipment provide training for their
equipment. In order to attend this training, a visit clearance authorization for COMSEC access
must be requested through COMSEC Client Services.
Training
March 2014
16
UNCLASSIFIED
ITSD-03A
5.1.5 Other Training Courses
CSE offers additional training that will assist COMSEC Account personnel in the use and
protection of ACM and increase their knowledge of the basic concepts of IT security and
cryptography.
5.1.6 COMSEC Sub-Account and Local Element Training
COMSEC Custodians are responsible for training their COMSEC Sub-Account personnel and
Local Elements.
NOTE:
It is recommended that COMSEC Sub-Account personnel attend the formal
COMSEC Custodian training course provided by CSE.
Training
March 2014
17
UNCLASSIFIED
ITSD-03A
6
Management of COMSEC Accounts
6.1
Establishing COMSEC Accounts
A COMSEC Account must be established at a GC department before the department will be
permitted to receive ACM.
6.1.1 Request to Establish a COMSEC Account
A GC department requiring ACM must submit its requirement to COMSEC Client Services for
the establishment of a COMSEC Account. The request must include:


written correspondence containing –
o
justification for the requirement to hold ACM
o
interoperability requirements (beyond department)
o
highest security classification of the ACM, and
o
a statement that the minimum physical security standards of this directive can be met for
the highest level of sensitivity of ACM to be held; and
the following forms –
o
Account Registration, to identify the department, location and COMSEC custodial
personnel being appointed
o
Appointment Certificate, for each individual to be appointed to the COMSEC Account,
including the DCA, the COMSEC Custodian and at least one Alternate COMSEC
Custodian, and
NOTE: Incumbent Appointment Certificates must be renewed every 5 years.
o
COMSEC Signing Authority Form, also called the COMSEC Courier Certificate, to
provide records of COMSEC Account personnel or any additional departmental staff who
are authorized to receive and sign for ACM. Only COMSEC custodial personnel are
authorized to open parcels containing ACM and sign ACM reports.
6.1.2 Approval to Establish a COMSEC Account
Before validating a request to open a COMSEC Account, a CSE representative will visit the GC
department to verify that the physical security requirements of this directive (refer to Chapter 9)
can be met and that COMSEC Account personnel have been COMSEC briefed and trained.
Following validation of the request, NCOR/COR will provide written approval for the request
including:

the assigned COMSEC Account Number

a confirmation of the name of the DCA
Management of COMSEC Accounts
March 2014
18
UNCLASSIFIED
ITSD-03A

the verification of the appointment of the COMSEC Custodian and the Alternate COMSEC
Custodian(s), and

a list of publications required to effectively manage the COMSEC Account.
6.1.3 Establishing COMSEC Sub-Accounts
The DCA may establish one or more COMSEC Sub-Accounts to assist with the control of ACM
within the department. The DCA must implement procedures for opening a departmental
COMSEC Sub-Account based upon the direction contained herein.
6.1.4 Registering Local Elements
COMSEC Custodians and COMSEC Sub-Account Custodians must register Local Elements
before authorizing their access to or use of ACM (refer to Article 8.1.2.4). The registration of
Local Elements must include a record of the full name, title or designator, location and phone
number.
6.2
Files and Records
6.2.1 Administration Files
The COMSEC Custodian must establish and maintain administrative files containing
documentation related to the COMSEC Account, including (if applicable):

courier, mail and package receipts

general correspondence

IT Security Alerts (ITSAs)

IT Security Bulletins (ITSBs)

IT Security Approvals for Use (ITS AFU)

Account Registration Forms

Appointment Certificates

Security Screening Certificates

COMSEC Briefing Certificates

COMSEC Signing Authority Forms

COMSEC Incident Initial Reports

COMSEC Account Audit Reports

related files for each COMSEC Sub-Account (if applicable), and

other relevant documentation.
Management of COMSEC Accounts
March 2014
19
UNCLASSIFIED
ITSD-03A
6.2.2 Accounting Files
The COMSEC Custodian must establish and maintain accounting files (manual [paper] or
electronic) that are appropriate for the authorized accounting system being employed that
include:

copies of all accounting reports (refer to Chapter 8), records, registers and logs with
appropriate physical or digital signatures; and

copies of all Inventory Reports (refer to Chapter 15).
6.2.3 Approved Accounting Sub-Systems
CSE has approved the use of several automated and manual accounting/management systems to
accommodate the minimum security requirements of the NCMCS. These systems employ
terminology and procedures that are quite distinct from one another.
Each NCMCS-supporting system must be classified minimally to PROTECTED A with
additional appropriate classification to meet special inventory requirements (refer to
Article 6.2.4) and any other classified information stored on the system.
NOTE:
Automated accounting/management systems must employ data and system back-up
procedures to mitigate system failure.
Each department is responsible for ensuring its custodial personnel are trained in the use of the
appropriate CSE-approved accounting and management system.
Contact COMSEC Client Services for the list of approved automated and manual systems or for
requests for approval of new systems.
6.2.4 Classification of Records and Files
COMSEC Account records and files must be marked “PROTECTED A” unless they contain:

classified information (e.g. effective dates, classified long titles or remarks), in which case
the record or file must be marked in accordance with the sensitivity of the content; or

a list of ACM that was provided by a United Kingdom (UK) source, in which case the list
must be classified at least to the minimum standard that the UK is handling the material.
6.2.5 Retention and Disposition of Records and Files
Unless otherwise specified within this directive, all inactive or archived COMSEC Account
records and files must be retained for a period of no less than five years by the COMSEC
Custodian (or responsible DCA), after which they may be destroyed or forwarded to NCOR/COR
for disposal.
Management of COMSEC Accounts
March 2014
20
UNCLASSIFIED
ITSD-03A
6.2.6 Access to Records and Files
The COMSEC Custodian must limit access to COMSEC Account records and files to individuals
who have a need-to-know and meet the requirements for access to ACM (refer to Article 10.1.1).
Access to COMSEC Account records and files by individuals other than the COMSEC
Custodian or Alternate COMSEC Custodian must be closely monitored.
6.3
Changes to COMSEC Accounts
6.3.1 Changes to COMSEC Account Registration Information
COMSEC Custodians must promptly post changes to COMSEC Account registration
information (e.g. mailing and shipping addresses, phone numbers) to the Directory Server or
submit them to NCOR/COR. The Account Registration Form is to be used to submit these
changes.
6.3.2 Changes to the COMSEC Signing Authority Form
The COMSEC Custodian must submit a new COMSEC Signing Authority Form to NCOR/COR
whenever there is a change of personnel or other information. If there is no change to the existing
form, the COMSEC Custodian must provide confirmation annually to NCOR/COR via email.
The COMSEC Signing Authority Form contains the names, telephone numbers and signatures of
COMSEC Account personnel and any additional departmental staff who are authorized to sign
for shipments containing ACM.
6.3.3 Change of Personnel
Before the departure of currently appointed COMSEC Account personnel, the DCA must provide
NCOR/COR with an Appointment Certificate, including:

the new COMSEC Account personnel information; and

the “Termination of Appointment” section completed for the departing individual.
The DCA or COMSEC Custodian, as applicable, must ensure the new appointee receives a
COMSEC briefing and the appropriate COMSEC training.
6.3.4 Scheduling the COMSEC Custodian Changeover
The changeover of COMSEC Custodians should be scheduled at least 90 calendar days in
advance of the COMSEC Custodian’s departure date. The departing COMSEC Custodian and
the individual being appointed as the new COMSEC Custodian must conduct an inventory of the
ACM held in the COMSEC Account as detailed in Chapter 15.
The departing COMSEC Custodian will continue to be responsible for all ACM involved in any
unresolved discrepancy until all discrepancies are resolved.
Management of COMSEC Accounts
March 2014
21
UNCLASSIFIED
ITSD-03A
6.3.5 Conversion of a COMSEC Sub-Account to a COMSEC Account
The DCA must submit a letter to COMSEC Client Services requesting the establishment of a
new COMSEC Account in accordance with Article 6.1.1. The letter must contain justification for
the conversion of the COMSEC Sub-Account to a COMSEC Account. Upon approval of the
conversion, NCOR/COR will provide accounting instructions.
6.3.6 Change of Classification Level of a COMSEC Account
The DCA must submit a written request to COMSEC Client Services to change the level of
classification for the COMSEC Account. The request must include a justification for the
requirement and indicate the new level of classification required.
When a lower level of classification is requested, COMSEC Client Services will provide written
approval once NCOR/COR has confirmed that the COMSEC Account holds ACM at, or lower
than, the requested classification.
When a higher level of classification level is requested, COMSEC Client Services will provide
written approval once a CSE representative has visited the COMSEC Account to verify that the
physical security requirements of this directive can be met. The COMSEC Account must not
receive ACM at the higher level until approval of the change of classification level has been
granted.
6.3.7 Absence of COMSEC Custodial Personnel
6.3.7.1
Temporary Absence of COMSEC Custodian
In the absence of the COMSEC Custodian for a period of 60 calendar days or less, the DCA must
ensure the Alternate COMSEC Custodian immediately assumes the responsibilities and duties of
the COMSEC Custodian.
6.3.7.2
Temporary Absence of Alternate COMSEC Custodian
In the absence of the Alternate COMSEC Custodian for a period of 60 calendar days or less, the
DCA must ensure the second Alternate COMSEC Custodian immediately assumes the
responsibilities and duties. Where no second Alternate COMSEC Custodian has been appointed,
the DCA must appoint one and forward the Appointment Certificate immediately to
NCOR/COR.
6.3.7.3
Absence Longer than 60 Calendar Days
An absence of more than 60 calendar days must be treated as a permanent absence, and the DCA
must immediately appoint a new COMSEC Custodian or Alternate COMSEC Custodian, as
applicable and forward the Appointment Certificate to NCOR/COR.
Management of COMSEC Accounts
March 2014
22
UNCLASSIFIED
ITSD-03A
6.3.7.4
Unexplainable Departure of COMSEC Custodian or Alternate COMSEC
Custodian
In the case of an unexplainable (does not include death, serious illness, short notice personnel
transfer), sudden, indefinite or permanent departure of the COMSEC Custodian or Alternate
COMSEC Custodian, the DCA must take the following steps:
1. Immediately report the circumstances of any departure in accordance with Chapter 18.
2. Appoint a new COMSEC Custodian or Alternate COMSEC Custodian as required.
3. Ensure the combinations and the keys of containers and vaults are changed.
4. Ensure the new COMSEC Custodian or Alternate COMSEC Custodian immediately
conducts an inventory (refer to Chapter 15) with an appropriately cleared witness.
5. Ensure the COMSEC Account audit is conducted by the appropriate authority.
6.4
Closing a COMSEC Account
When a department no longer has a requirement to hold ACM, the DCA must provide COMSEC
Client Services with a written request to close the COMSEC Account and must include
Termination of Appointment Certificates for all COMSEC Account personnel.
Upon authorization from COMSEC Client Services, the COMSEC Custodian will transfer all
ACM currently held in the COMSEC Account to another COMSEC Account, or destroy it (if
authorized), and forward all accounting reports, Termination of Appointment Certificates, and a
signed “zero balance” inventory to NCOR/COR.
Once NCOR/COR has received the Termination of Appointment Certificates, confirmed that the
COMSEC Account no longer holds any ACM, and has updated the COMSEC Account status,
the NCOR/COR will issue a letter to the DCA, officially closing the COMSEC Account.
The DSO will ensure that all COMSEC Account files are retained for a period of five years and
then dispose of them in accordance with the direction at Article 6.2.5.
6.5
Closing a COMSEC Sub-Account
When it is determined that the requirement for a COMSEC Sub-Account no longer exists, the
DCA must take the following steps:

direct the COMSEC Sub-Account Custodian to return to the parent COMSEC Account, or
destroy (if authorized), all ACM held by the COMSEC Sub-Account and submit a signed
“zero balance” Inventory Report (refer to Chapter 15); and

provide the parent COMSEC Account with a Termination of Appointment Certificate for all
COMSEC Sub-Account personnel.
Management of COMSEC Accounts
March 2014
23
UNCLASSIFIED
ITSD-03A
6.6
Suspension of a COMSEC Account
6.6.1 General
In rare cases, due to the severity of account infraction(s) or the effect that poor account
management could have on other government departments or allies, NCOR/COR, in consultation
with the DSO, may temporarily suspend a COMSEC Account – including key delivery.
6.6.2 Consequence of Suspension
A COMSEC Account whose status is “suspended” will cease to have ACM transferred in or out.
The custodial staff will remain in place to conduct all other normal activities within the account,
including the corrective action that would lead to the lifting of the suspension.
NOTE:
NCOR/COR will inform the DSO, the DCA and the departmental COMSEC
Custodian that transfers of ACM to and from the account will be suspended. The
notification will include a list of the discrepancies that caused the suspension, the
corrective action needed to allow the lifting of the suspension and a target completion
date.
6.6.3 Lifting Suspension
Upon receipt of the Statement of Action Form, which certifies that corrective action has been
completed (or is underway), CSE may lift the suspension. Before lifting the suspension, CSE will
conduct another audit of the account to ensure that conditions have been rectified.
Upon lifting the suspension, NCOR/COR will notify other affiliated or affected organizations or
COMSEC accounts, and transfers of ACM to and from the COMSEC account will resume.
Management of COMSEC Accounts
March 2014
24
UNCLASSIFIED
ITSD-03A
7
Identification of Accountable COMSEC Material
7.1
General
ACM requires control and accountability within the NCMCS in accordance with its ALC and for
which transfer or disclosure outside COMSEC channels could be detrimental to the national
security of Canada and its allies.
7.2
Identification
7.2.1 Long Title
The long title provides a general description of the ACM. Long titles are normally, but not
always, UNCLASSIFIED.
7.2.2 Short Title
A short title is an identifying combination of letters or digits that consists of a maximum of
24 alphanumeric characters. A short title must be assigned to ACM at its point of origin for
accounting purposes. For some CSE-approved accounting/management systems (refer to
Article 6.2.3), special characters (e.g. /, -, * or #) are not allowed. For these systems, the special
characters that may appear on ACM short titles, cryptographic equipment nameplates and
COMSEC publications are replaced with a space. Short titles of ACM are UNCLASSIFIED. For
further details on short titles, contact COMSEC Client Services for reference to the CSE
publication IT Security Guidance on Short Title Nomenclature in Canada (ITSG-09).
7.2.3 Edition
ACM may be identified by a unique alphabetic or numeric designator. ACM may be time
sensitive and is superseded when the next edition becomes effective.
7.2.4 Accounting Numbers
7.2.4.1
Assignment of Accounting Number
ACM may be assigned a unique accounting serial or register number at the point of origin to
facilitate accounting (refer to Article 7.2.5 for a description of the relationship between
accounting numbers and the ALC). Serial numbers are used with CCI and cryptographic
equipment, while register numbers are used for any other material requiring an accounting
number.
Identification of Accountable
COMSEC Material
March 2014
25
UNCLASSIFIED
ITSD-03A
7.2.5 Accounting Legend Code
7.2.5.1
Description
An ALC is a numeric code assigned by the originator of the ACM to indicate its accounting and
reporting requirements. The ALC is recorded on all COMSEC Material Reports, but does not
normally appear on the ACM itself. The ALC assigned by the originator must not be changed
without authorization from COMSEC Client Services. Authorized changes to ALCs must be
managed through NCOR/COR, as noted in Chapter 8.
NOTE 1:
If the accountability of the ACM is in question, contact NCOR/COR.
NOTE 2:
ALC 3 and ALC 5 are not used.
7.2.5.2
Entry of COMSEC Material into the National COMSEC Material Control
System
Whenever COMSEC material is assigned an ALC, it must be entered into the NCMCS. This
ACM must be controlled in the NCMCS until it is authorized for destruction or other disposition,
or the appropriate authority removes the accountability requirement. A COMSEC Material
Report is used to enter ACM into the NCMCS in circumstances described at Article 8.1.3.
7.2.5.3
Accounting Legend Code 1
ALC 1 is assigned to physical and electronic ACM that is subject to continuous accountability to
NCOR/COR by short title and accounting (i.e. serial or register) number. ALC 1 ACM includes:

some unclassified and all classified physical key marked CRYPTO;

all cryptographic equipment (including CCI) approved for classified processing;

classified cryptographic software and firmware that are the functional equivalents of, or
emulate, cryptographic equipment operations and cryptography; and

classified full maintenance manuals and depot maintenance manuals (and their printed
amendments), which contain cryptographic information.
7.2.5.4
Accounting Legend Code 2
ALC 2 is assigned to physical ACM that is subject to continuous accountability to NCOR/COR
by short title and quantity. ALC 2 ACM may include:

classified and CCI components (e.g. modular assemblies, printed wiring assemblies [PWA],
integrated circuits [IC], microcircuits, microchips, permuters) intended for installation (but
not installed) in cryptographic equipment;

specific COMSEC devices; and

COMSEC publications.
Identification of Accountable
COMSEC Material
March 2014
26
UNCLASSIFIED
ITSD-03A
7.2.5.5
Accounting Legend Code 4
ALC 4 is assigned to physical ACM that, following initial receipt to the distributing COMSEC
Account, is locally accountable by the receiving COMSEC Account by short title and quantity, or
by short title and accounting number. ALC 4 ACM may include:

unclassified or classified COMSEC publications dealing with a cryptographic subject
(e.g. classified maintenance manuals);

protected and unclassified key (e.g. test, maintenance and training key); and

other unclassified or classified ACM which, due to the nature of the COMSEC information it
contains, requires accountability within the NCMCS.
7.2.5.6
Accounting Legend Code 6
ALC 6 is assigned to electronic key that is tracked by the GC EKMS and that is subject to
continuous accountability to NCOR/COR, as determined by the controlling authority for the key
and by the doctrine specific to the equipment, where applicable. ALC 6 may be assigned to
electronic key:

intended to protect information having a long-term intelligence value (e.g. TOP SECRET);

used to protect other key (e.g. Key Encryption Key [KEK]);

used for joint or combined interoperability;

marked CRYPTO;

used to generate other electronic key (e.g. Key Production Key); and

generated from ALC 1 physical key.
7.2.5.7
Accounting Legend Code 7
ALC 7 is assigned to electronic key that is tracked by the GC EKMS and that is locally
accountable to the generating COMSEC Account until final disposition.
7.3
Special Marking and Warning Caveats
7.3.1 CRYPTO Marking
The CRYPTO caveat is used to indicate the unique sensitivity of the ACM on which it appears
(or is otherwise identified). Items so marked, or identified by CSE as such, must always be
accounted for within the NCMCS. The CRYPTO marking will appear in bold letters on
classified printed circuit boards, on the covers of printed key, on disks, on individual key
variables, and (as required) on equipment and tags or labels affixed to physical storage device
(e.g. Key Storage Device [KSD-64]) containing electronic key.
Identification of Accountable
COMSEC Material
March 2014
27
UNCLASSIFIED
ITSD-03A
7.3.2 “Eyes Only”
Access to ACM with an “Eyes Only” caveat (e.g. CAN/EYES ONLY, CAN/US/EYES ONLY,
CAN/UK/EYES ONLY) is restricted only to those nationalities listed in the caveat. Access must
meet the ACM access control requirements listed in Article 10.1.1.
Identification of Accountable
COMSEC Material
March 2014
28
UNCLASSIFIED
ITSD-03A
8
Accounting Forms, Reports and Notices
8.1
COMSEC Material Reports
The primary accounting form used for the control and management of ACM is the multipurpose
COMSEC Material Report (commonly referred to as the GC-223 form). This form is used to:

report any change in the status of ACM (e.g. transfer, issue, possession, generation,
conversion, relief from accountability or destruction);

report the inventory holdings of a COMSEC Account (i.e. Inventory Report); and

provide notice of an action associated with ACM (i.e. Tracer Notice).
General instructions for the preparation of COMSEC Material Reports can be found on the back
of the GC-223 form. The following articles list the specific requirements applicable to the
preparation and distribution of each type of report. Refer to the Glossary for definitions of each
type of COMSEC Material Report.
8.1.1 Transfer Report
8.1.1.1
General
The distribution of ACM between two COMSEC Accounts is called a transfer. ACM being
transferred must be prepared and receipted for as detailed in Chapter 12. The COMSEC
Custodian who originates the transfer of ACM remains accountable for the material until the
signed receipt is returned.
COMSEC Client Services is required to approve:

all transfers of ACM by methods not pre-authorized in accordance with Article 12.5 and
Table 3; and

all transfers (includes loan) of cryptographic equipment between COMSEC Accounts in
accordance with Article 14.1.1.
8.1.1.2
Distribution
The following applies to the distribution of Transfer Reports:

along with the original, prepare sufficient copies of the Transfer Report to ensure effective
accountability:
o
enclose the original with physical shipment;
Accounting Forms, Reports
and Notices
March 2014
29
UNCLASSIFIED
ITSD-03A

o
if the report lists centrally-accountable ACM, send a copy to NCOR/COR of the receiving
COMSEC Account (COMSEC Accounts using an automated CSE-approved accounting
and management system will send an electronically-signed copy to NCOR/COR); and
o
retain a copy of the original on file until it can be replaced with a receipt signed by the
receiving COMSEC Custodian; and
when a receipt for a Transfer Report cannot be provided, the Transfer Report must be
cancelled. For example, if a removable data storage device (e.g. floppy disk, compact disk,
flash drive) containing the transaction was destroyed in transit, or if physical ACM being
transferred is destroyed in-transit, or if a Transfer Report was prepared and circumstances
cancelled the need for the ACM to be distributed, the intended receiving COMSEC Account
Custodian would not return a receipt for the material. The Transfer Report may be cancelled
by:
o
preparing a Cancel Distribution Transaction, and forwarding a copy to the intended
receiving COMSEC Account and NCOR/COR; or
o
marking the Transfer Report as cancelled and forwarding a copy to the intended receiving
COMSEC Account and NCOR/COR.
8.1.1.3
Receipt
To relieve the originating COMSEC Account from accountability for transferred material, the
receiving COMSEC Custodian must sign the Transfer Report, make copies and distribute them
as follows:

return the signed original to the originating COMSEC Custodian;

if the report lists centrally-accountable ACM, send a copy to NCOR/COR (COMSEC
Accounts using an automated CSE-approved accounting system will send an electronicallysigned copy to NCOR/COR); and

retain a signed copy of the original receipt on file.
8.1.2 Hand Receipt
8.1.2.1
General
The distribution of ACM to a COMSEC Sub-Account or Local Element is called an issue. ACM
being issued may be packaged as a shipment or it may be hand delivered directly to an authorized
recipient. Packages wrapped for shipment must be prepared in accordance with the direction in
Chapter 12.
Accounting Forms, Reports
and Notices
March 2014
30
UNCLASSIFIED
ITSD-03A
8.1.2.2
Distribution
The issuance of ACM is recorded on a Hand Receipt. When distributing ACM to a COMSEC
Sub-Account or a Local Element, the COMSEC Custodian must use a Hand Receipt.
Recipients must sign the Hand Receipt to certify their acceptance of the listed material, as well as
an understanding of the handling requirements for the ACM entrusted to them. Before signing
the Hand receipt, the recipient must inspect the ACM to verify the accuracy of the document and
to establish the condition of the material (refer to Chapter 12).
Control and tracking responsibilities for issued material remains within the COMSEC Account;
therefore, Hand Receipts are not sent to NCOR/COR.
NOTE:
Hand Receipts for ACM must be reviewed annually by the COMSEC Custodian to
ensure their accuracy and to verify the continued requirement for ACM by authorized
end-users.
8.1.2.3
Accountability
Accountability for issued ACM includes the issuing COMSEC Account, the COMSEC
Sub-Account (if applicable) and the Local Element. Upon signing the Hand Receipt, the recipient
assumes responsibility for the care and control of all material listed on the document; however,
the recipient’s signature on a Hand Receipt does not relieve the issuing COMSEC Custodian
from accountability for the issued material.
8.1.2.4
Confirmation before Issue
Before issuing ACM to a COMSEC Sub-Account or a Local Element, the COMSEC Custodian
must ensure the recipient meets the requirements for access to ACM (refer to Article 10.1.1):

has the appropriate storage facilities for the material listed on the Hand Receipt;

has been trained on the handling, storage, use and destruction (where authorized) of the ACM
listed on the Hand Receipt;

is aware of what constitutes a COMSEC incident;

where necessary, has established a local accounting system that maintains strict control of
each item of the ACM listed on the Hand Receipt whenever it –

o
must be accounted for during shift work operations; or
o
is temporarily loaned to another authorized user; and
signs the Hand Receipt acknowledging the receipt of the material and the understanding of
the responsibilities associated with handling the ACM listed on the Hand Receipt.
Accounting Forms, Reports
and Notices
March 2014
31
UNCLASSIFIED
ITSD-03A
8.1.2.5
Returning Accountable COMSEC Material
COMSEC Sub-Accounts and Local Elements must return ACM to the COMSEC Custodian if it
is no longer required and is not authorized for destruction.
ACM issued to a COMSEC Sub-Account must be returned to the parent account that issued the
material. The COMSEC Sub-Account Custodian must prepare a COMSEC Material Report
(annotate the “OTHER” box with “Hand Receipt”) addressed to the parent account.
Upon receipt and verification of the material, the COMSEC Custodian at the COMSEC Account
must sign the COMSEC Material Report and return it to the COMSEC Sub-Account, thereby
relieving the COMSEC Sub-Account from accountability for the returned material.
ACM issued to a Local Element must be returned to the COMSEC Account or COMSEC
Sub-Account that issued the material. The COMSEC Custodian must prepare a Hand Receipt for
material being returned from the Local Element. The COMSEC Custodian must ensure that the
Hand Receipt, which lists the material being returned from the Local Element, is addressed to the
COMSEC Account. The COMSEC Custodian’s signature on the Hand Receipt relieves the Local
Element from accountability for the returned ACM. Local Elements are not authorized to re-loan
ACM to any other Local Elements.
8.1.3 Possession Report
8.1.3.1
General
Occasionally, circumstances dictate that COMSEC material, for which a current record of
accountability within the NCMCS does not exist, be taken on charge at a COMSEC Account.
A Possession Report is used to document the entry of COMSEC material into the NCMCS in the
following circumstances when:

ACM under development or manufacturing has been accepted by the GC;

ACM received from a foreign government or international organization requires
accountability within the NCMCS;

ACM previously declared lost and removed from accountability is subsequently found;

a COMSEC publication requiring control within the NCMCS is reproduced in whole or in
part;

a Removable Storage Medium (RSM) is used to transfer or issue electronic key;

a non-automated COMSEC Account converts its inventory to an automated CSE-approved
accounting and management system; and

ACM is in the possession of a COMSEC Account and is not listed on any other COMSEC
Account inventory.
Accounting Forms, Reports
and Notices
March 2014
32
UNCLASSIFIED
ITSD-03A
8.1.3.2
Preparation and Distribution
Authorization from NCOR/COR is required before submitting a Possession Report. A
Possession Report may not be created by a COMSEC Sub-Account. The Sub-Account Custodian
must report the requirement to the parent COMSEC Account.
The following applies to the preparation and distribution of Possession Reports:

a brief description of why the item is being possessed must be included in either the
REMARKS column or after the “NOTHING FOLLOWS” line; and

if the report lists centrally-accountable ACM, a copy must be sent to NCOR/COR within five
working days following the creation of the report. Possession Reports listing only ALC 4 or
ALC 7 ACM must be retained locally.
8.1.4 Conversion Report
8.1.4.1
General
When it becomes necessary to change or correct a short title, an equipment modification number,
or the ALC of ACM, a Conversion Report must be raised. Conversion Reports may be initiated
by a COMSEC Custodian or by NCOR/COR. COMSEC Custodians must not initiate conversion
activities without receiving explicit instructions from NCOR/COR.
A Conversion Report may not be created at a COMSEC Sub-Account. The COMSEC
Sub-Account Custodian must report the requirement to the parent COMSEC Account.
If the COMSEC Account is using an automated accounting and management system that does
not have the capability to generate a Conversion Report, contact NCOR/COR for instructions.
8.1.4.2
Preparation and Distribution
In the preparation and distribution of Conversion Reports, the COMSEC Custodian:

may raise a Conversion Report only if the material being converted is on-hand at the
COMSEC Account;

must send a copy to NCOR/COR if the Conversion Report lists centrally-accountable ACM;

must send a copy of the Conversion Report to all COMSEC Sub-Accounts that hold ACM to
be converted; and

must retain a signed copy of the Conversion Report on file.
Accounting Forms, Reports
and Notices
March 2014
33
UNCLASSIFIED
ITSD-03A
8.1.5 Relief from Accountability Report
8.1.5.1
General
A COMSEC Custodian must seek relief from accountability for ACM that has been irretrievably
lost. An investigation must be conducted by the DCA to determine the injury caused by the loss
and the NCIO will issue a report on the results of the investigation.
A Relief from Accountability Report is used to document the removal of ACM from a COMSEC
Account inventory. Authorization from the NCIO is required before preparing a Relief from
Accountability Report.
If a COMSEC Account is using an automated accounting and management system that does not
have the capability to generate a Relief from Accountability Report, contact NCOR/COR for
instructions.
8.1.5.2
Preparation and Distribution
The following rules apply to the preparation and distribution of Relief from Accountability
Reports:

reference to the authority under which the ACM was removed from accountability must be
included in either the REMARKS column or after the “NOTHING FOLLOWS” line;

if the report lists centrally-accountable ACM, a copy must be sent to NCOR/COR; and

a signed copy of all Relief from Accountability Reports must be retained on file.
8.1.6 Destruction Report
8.1.6.1
General
Cryptographic material (e.g. key) must be destroyed after it is superseded. Other ACM
(e.g. equipment and publications) may be authorized for destruction after it has served its
intended purpose. A Destruction Report is used to document the physical destruction or
electronic zeroization of ACM, whether by authorized means or by accident, and serves to report
the items’ removal from accountability (refer to Chapter 14 for complete destruction
instructions).
8.1.6.2
Preparation and Distribution
The following applies to the preparation and distribution of Destruction Reports:

list, in alphanumerical order, all ACM that is scheduled for destruction;

enter the reason for the destruction (e.g. zeroized, superseded, filled in equipment [include
the short title and serial number of the equipment], obsolete) in either the REMARKS
column or after the “NOTHING FOLLOWS” line;
Accounting Forms, Reports
and Notices
March 2014
34
UNCLASSIFIED
ITSD-03A

if the Destruction Report lists centrally-accountable ACM, send a signed copy to
NCOR/COR; and

a signed copy of all Destruction Reports must be retained on file.
8.1.7 Consolidated Destruction Reports
8.1.7.1
General
Occasionally, ACM (e.g. superseded key) is authorized for destruction by personnel other than
the COMSEC Custodian. Except in operationally volatile situations, such destructions must be
performed in the same secure environment using the same security procedures required of the
COMSEC Custodian.
In such cases, the appropriate destruction documents, duly signed and witnessed, must be
forwarded to the COMSEC Custodian. The COMSEC Custodian must compile the documents
(e.g. Local Accountability Logs) into a single Consolidated Destruction Report for forwarding to
NCOR/COR.
8.1.7.2
Preparation and Distribution
The following applies to the preparation and distribution of Consolidated Destruction Reports:

review local destruction records for accuracy, appropriate authorizations and required
signatures;

list the ACM that was destroyed (and reported as destroyed on local accounting records)
during the month; and

annotate the report with “Consolidated Destruction Report”;

if the report contains centrally-accountable ACM, submit the report to NCOR/COR no later
than the 16th of the month following destruction of the key; and

retain a copy of all Consolidated Destruction Reports on file.
8.1.8 Seed Key Conversion Report
The Canadian Central Facility (CCF) generates a monthly Seed Key Conversion Report (SKCR)
for Secure Communication Interoperability Protocol (SCIP) equipment that lists the Key Material
Identifier (KMID) number of the key that has been converted from seed key to operational key.
When a user initiates a secure call from authorized SCIP equipment to the Secure Data Network
System (SDNS) Public Switched Telephone Network (PSTN) Integrated Services Digital
Network (ISDN) Rekey Subsystem (SPIRS), operational key is sent to that user’s SCIP
equipment. Once the operation is completed, the user can use their equipment to place secure
calls to other SCIP users.
Accounting Forms, Reports
and Notices
March 2014
35
UNCLASSIFIED
ITSD-03A
A copy of the SKCR will be sent to the COMSEC Account Custodian on a monthly basis or
upon request. The COMSEC Custodian must use the SKCR to verify that a Destruction Report
has been completed for all KMIDs listed on the report.
8.1.9 Operational Rekey Report
The CCF generates a monthly Operational Rekey Report (ORR) that lists the KMID of key for
SCIP equipment that were used to place a secure call to the SPIRS. Upon initiation of a secure
call to the SPIRS, a new operational key is downloaded to the SCIP equipment along with a
Compromised Key List (CKL). A copy of the ORR will be sent to the COMSEC Account
Custodian on a monthly basis or upon request. The ORR must be used to verify that end users
conduct quarterly rekey calls to the SPIRS and ensure that they have the latest CKL. The
COMSEC Custodian must use the ORR to verify that a Destruction Report has been completed
for all KMIDs listed on the report.
8.1.10 Inventory Report
8.1.10.1 General
COMSEC Custodians are responsible for conducting ACM inventories. During the inventory
process, the ACM held at the COMSEC Account is physically sighted and the actual holdings
are compared to the accounting records. The inventory process is very important as it is
sometimes the only means of discovering the loss or misuse of ACM. For a complete description
of inventories, refer to Chapter 15.
A list of COMSEC Account’s holdings is recorded on an Inventory Report.
8.1.10.2 Preparation and Distribution
The following rules apply to the preparation and distribution of Inventory Reports:

NCOR/COR will prepare, for distribution to each COMSEC Account, a list of all ALC 1,
ALC 2 and ALC 6 ACM held by a COMSEC Account. This list is called an Inventory Report
and contains all the material that the COMSEC Account has reported to NCOR/COR via
various COMSEC Material Reports (e.g. Transfer, Receipt, Destruction and Possession);

COMSEC Custodians must prepare an Inventory Report for each Sub-Account and Local
Element. This report must contain all ACM (i.e. ALC 1, ALC 2, ALC 4, ALC 6 and ALC 7)
issued to each element;

each Local Element must conduct a physical sighting of ACM in his or her possession,
annotate the Inventory Report as required, sign and have someone else witness and sign the
report, and then return the completed report to the COMSEC Custodian. The COMSEC
Custodian must retain a copy of each signed Inventory Report on file;
Accounting Forms, Reports
and Notices
March 2014
36
UNCLASSIFIED
ITSD-03A

the COMSEC Custodian must verify the accuracy of each returned report, resolve
discrepancies, report COMSEC incidents (for lost items) and return the signed Inventory
Report along with all supplemental accounting transactions to NCOR/COR. Inventory
Reports returned to NCOR/COR must contain a compilation of all ALC 1, ALC 2 and ALC 6
material held at the COMSEC Account; and

a copy of all signed Inventory Reports must be retained on file.
8.2
Tracer Notices
8.2.1 Tracer Notices – Transfers
If the signed Transfer Report (receipt) has not been received when due, tracer action must be
initiated as follows:

the initial tracer action may be accomplished via a documented phone call, e-mail, or by
using an official Tracer Notice;

the initiation of tracer action is dependent on the distribution method (e.g. electronic, courier)
and whether the COMSEC Account or NCOR/COR is initiating the tracer action; and

in exceptional cases, when physical ACM cannot be delivered and receipted within the
allotted time, an extension of up to 20 working days is acceptable. In such cases, a note must
be added on the Transfer Report.
NOTE:
If initial tracer action and NCOR/COR assistance fails to resolve the transfer,
secondary Tracer Notices must be sent to the DCA for action (including investigation
into potential COMSEC incident reporting).
8.2.2 Tracer Action by the COMSEC Custodian
The COMSEC Custodian must ensure that a signed receipt has been received for every transfer
initiated at the COMSEC Account as follows:

Electronic Distribution. If a signed receipt for the electronic distribution of key is not
received within five working days from the date of distribution of the ACM, the COMSEC
Custodian must initiate tracer action; or
If the signed receipt is not received within five working days of this initial tracer action, the
COMSEC Custodian must notify NCOR/COR. NCOR/COR will assist the COMSEC
Custodian in obtaining the receipt.

Physical Distribution. If a signed receipt for the physical shipment of ACM is not received
within ten working days from the date of shipment, the COMSEC Custodian must initiate
tracer action; or
Accounting Forms, Reports
and Notices
March 2014
37
UNCLASSIFIED
ITSD-03A
If the receipt is not received within ten working days of this initial tracer action, the
COMSEC Custodian must notify NCOR/COR. NCOR/COR will assist the COMSEC
Custodian in obtaining the receipt.
8.2.3 Tracer Action by National Central Office of Record/Central Office of Record
8.2.3.1
Tracer Action for Transfer Reports
If NCOR/COR has not received a signed Transfer Report (receipt) within 20 working days of the
date on which the report was sent, NCOR/COR will send a Tracer Notice to the delinquent
account. Up to three Tracer Notices may be sent.
NCOR/COR occasionally receives signed receipts for Transfer Reports that have not been
forwarded to NCOR/COR. The receipt cannot be reconciled unless the original Transfer Report
has been processed. In such cases, NCOR/COR will immediately send a Tracer Notice for the
missing Transfer Report.
8.2.3.2
Tracer Action for Inventory Reports
Tracer Notices may also be sent with respect to the inventory process. During an inventory,
NCOR/COR may discover that COMSEC Material Reports have not been forwarded for
processing at NCOR/COR.
Missing COMSEC Material Reports will result in NCOR/COR’s inability to reconcile a
COMSEC Account’s inventory. NCOR/COR will originate tracer action for the missing
COMSEC Material Reports.
8.2.3.3
Failure to Respond to Tracer Notices
Failure to respond to Tracer Notices could result in an immediate audit of the COMSEC
Account.
Accounting Forms, Reports
and Notices
March 2014
38
UNCLASSIFIED
ITSD-03A
9
Special Accounting Requirements
9.1 Canadian Controlled COMSEC Material Outside of the National
COMSEC Material Control System
ACM, including CCI, must only exit the NCMCS via the NDA. Canadian CCI destined for use
outside of Canada must be accounted for and handled within the receiving foreign nation’s
formal COMSEC channels. Subsequent to CSE providing case-by-case authority with a foreign
nation, the NDA will initiate formal transfer to a foreign nation’s established COMSEC Account
with appropriate notification being sent to the foreign nation’s responsible COR.
NOTE 1: Where a foreign private sector company or organization is involved, the ACM,
including CCI, must be transferred to an established COMSEC Account or, in the
case of CCI under development (within established IP channels), via the appropriate
foreign nation’s NDA, in coordination with the foreign NDA’s COR (refer to
ITSD-06).
NOTE 2: COMSEC Client Services may authorize GC departments or private sector companies
or organizations to bypass this channel and ship directly if sufficient justification is
provided in writing before the distribution.
9.2
Release of Accountable COMSEC Material to the Private Sector
Refer to ITSD-06 for accounting and control direction applicable to the release of ACM to the
Private Sector.
9.3
Government Furnished Equipment
9.3.1 Government Furnished Equipment for Canadian Industry
Refer to ITSD-06 for accounting and control direction applicable to Government Furnished
Equipment (GFE) ACM being transferred to a Canadian industry COMSEC Sub-Account.
9.3.2 Government Furnished Equipment for Allied Contractors
Transfer or loan of GFE ACM to or from allied contractors is handled on a case-by-case basis.
Contact COMSEC Client Services.
9.4
COMSEC Material under Contract
Refer to ITSD-06 and equipment-specific doctrine for accounting and control direction
applicable to ACM under a maintenance or repair contract and COMSEC publications under a
reproduction or translation contract.
Special Accounting Requirements
March 2014
39
UNCLASSIFIED
ITSD-03A
9.5
Drop Accounting – COMSEC Material Received from a Foreign
Entity
9.5.1 General
CSE maintains agreements with foreign authorities that allow for acquisition and accounting of
ACM from a foreign entity. This must always be through CSE.
When a GC department is entrusted with ACM by a North Atlantic Treaty Organization (NATO)
or another international authority, the ACM must be accounted for, transported, stored and
handled in accordance with the direction contained herein for Canadian ACM of equivalent
sensitivity. Similarly, Canada accepts that its allies will also account for, transport, store, and
handle Canadian ACM in accordance with their own national policies and procedures. This
arrangement is known as drop accounting. There is no requirement for GC departments to hold
the policy and procedural publications of the nation or alliance that provides the material, except
as detailed in Article 9.5.3.
9.5.2 North Atlantic Treaty Organization Funded Units
When ACM is drop accounted to a Canadian entity to support NATO sponsored activity, all
NATO ACM holdings must be accounted for, transported, stored, and handled in accordance
with the publications: Instructions for the Control and Safeguard of NATO Cryptomaterial
(SDIP 293) and NATO Crypto Distribution and Accounting Publication (AMSG 505). In
addition, COMSEC incidents involving NATO ACM must be reported to the NCIO who will
subsequently report the incident to the NATO authority, as detailed in ITSD-05.
9.5.3 North Atlantic Treaty Organization Accountable COMSEC Material
Requiring Two-Person Integrity Control
When a GC department is provided NATO ACM that requires TPI control, such items must be
accounted for, transported, stored and handled in accordance with the Policy and Procedures for
the Handling and Control of Two-Person Controlled NATO Security Material (AMSG 773). The
format of NATO ACM requiring TPI control is significantly different from Canadian TPI
material and requires different storage and handling procedures.
9.5.4 International COMSEC Material Control
COMSEC material that has been acquired through bilateral arrangement outside of regular
CSE-approved COMSEC channels requires authority and coordination from COMSEC Client
Services. COMSEC Client Services must liaise with the international authority for the release of
the COMSEC material and determine the appropriate control (accounting within NCMCS or
tracking outside of NCMCS) mechanisms and safeguarding criteria to manage the material until
no longer required, at which time the COMSEC material will be disposed of as directed by
COMSEC Client Services.
Special Accounting Requirements
March 2014
40
UNCLASSIFIED
ITSD-03A
Once management criteria is acquired, COMSEC Client Services will initiate an Approval for
Use (AFU) notice or an Authorization to Use (ATU) letter identifying the minimum security
requirements for handling and using this COMSEC material.
Special Accounting Requirements
March 2014
41
UNCLASSIFIED
ITSD-03A
10
Access to Accountable COMSEC Material
10.1 Prerequisite for Access
10.1.1 Access by Government of Canada Employees and Contractors
Access to ACM may be granted to Canadian citizens (including those of dual nationality) who:

possess a valid GC security clearance or reliability status commensurate with the security
classification of the material and information they will access;

have a “need-to-know”;

have been given a COMSEC Briefing;

have signed a COMSEC Briefing Certificate; and

are familiar with applicable ACM control procedures.
NOTE:
Access by persons with Permanent Residence Status is not authorized.
10.1.2 Access by Foreign Nationals
Access to ACM may be granted to foreign nationals (i.e. non-Canadian citizens) upon approval
from CSE on a case-by-case basis. Requests for such access must be submitted in writing to
COMSEC Client Services.
10.2 COMSEC Briefing and COMSEC Briefing Certificate
10.2.1 Requirements
The DCA and COMSEC Custodian must ensure individuals requiring access to ACM receive a
COMSEC Briefing and sign a COMSEC Briefing Certificate. A COMSEC Briefing is required
for individuals (including COMSEC Account personnel, Local Elements, individuals attending
CSE and international COMSEC courses and COMSEC forums; and, individuals who need “user
access” or “maintainer access” during installation, troubleshooting, repair, or physical keying of
equipment) who require access to:

ACM controlled within the NCMCS;

cryptographic information, which embodies, describes or implements a classified
cryptographic logic;

cryptographic information including, but not limited to, full maintenance manuals,
cryptographic computer software (must be a continuing requirement);
Access to Accountable
COMSEC Material
March 2014
42
UNCLASSIFIED
ITSD-03A

classified IP COMSEC material or CCI and components at any phase during its production or
development; and

key or logic during its production or development.
10.2.2 Retention of COMSEC Briefing Certificates
A COMSEC Briefing Certificate must be retained on file by the COMSEC Custodian for a
minimum of two years after an individual’s authorization to access ACM has ended.
10.2.3 COMSEC Debriefings/Updates
COMSEC debriefings are not required when access to ACM is no longer required. Periodic or
annual briefing updates are required every five years for active COMSEC Custodians, Alternate
COMSEC Custodians and Local Elements, including other authorized users. Any individual
being re-appointed at the same or at a different COMSEC Account as a COMSEC Custodian,
Alternate COMSEC Custodian or Local Element must be given a new COMSEC Briefing and
sign a new COMSEC Briefing Certificate.
10.3 Two-Person Integrity
TPI is a security measure designed to prevent any one person from having access to specified
ACM (e.g. TOP SECRET key). Each individual granted TPI access must be capable of detecting
in the other person any incorrect or unauthorized security procedures with respect to the task
being performed. TPI-regulated storage and handling requires the use of security devices
protected by two approved locks (refer to the Royal Canadian Mounted Police [RCMP] Security
Equipment Guide [G1-001]), Personal Identification Numbers (PINs) or passwords, with no one
person having access to both sets of combinations, lock keys, PINs or passwords.
10.4 No-Lone Zone
Certain areas in a COMSEC facility may be designated as a NLZ. A minimum of two authorized
individuals must be in visual contact with each other at all times within a NLZ. If the departure
of one individual would leave a single occupant, then both individuals must leave and secure the
NLZ.
The DCA will establish a NLZ for COMSEC Accounts that:

receive, store, handle, use or destroy TOP SECRET key;

produce physical key; or

take part in the design, development, manufacture or maintenance of cryptographic
equipment.
Access to Accountable
COMSEC Material
March 2014
43
UNCLASSIFIED
ITSD-03A
10.5 Access Control – COMSEC Visits
10.5.1 General
Visits within and outside Canada that involve the exchange of accountable and classified
COMSEC information require COMSEC access authorization from COMSEC Client Services.
NOTE 1: Refer to ITSD-06 for details on Canadian private sector COMSEC visit access
requirements.
NOTE 2: Visits between GC departments may be arranged between the respective DCAs.
Normal access controls must be enforced.
10.5.2 GC Department Visiting a Foreign Government
A GC department visiting a foreign government must submit a visit request (refer to
Article 10.5.5) to COMSEC Client Services for COMSEC access. The request must be submitted
at least 45 days in advance of the anticipated visit.
COMSEC Client services will confirm COMSEC access with the foreign government COMSEC
authority and notify the requestor.
10.5.3 GC Department Visiting a Canadian or Foreign Private Sector Company
A GC department visiting a Canadian or foreign private sector company must submit a visit
request (refer to Article 10.5.5) to PWGSC Canadian Industrial Security Directorate (CISD),
including the requirement for COMSEC access. CISD will request COMSEC access
authorization from COMSEC Client Services. The request must be submitted at least 45 days in
advance of the anticipated visit.
COMSEC Client services will confirm COMSEC access with the foreign government COMSEC
authority and provide confirmation to CISD.
10.5.4 Visit Confirmation
Once COMSEC access authorization and visit clearance has been provided, it is the
responsibility of the requester, prior to the visit, to ensure that the visit clearance and COMSEC
access authorization are in place at final destination. This should be done at a minimum of five
working days prior to the visit to ensure any discrepancies can be resolved.
Access to Accountable
COMSEC Material
March 2014
44
UNCLASSIFIED
ITSD-03A
10.5.5 COMSEC Access Authorization Request Criteria
Requests submitted to COMSEC Client Services must include:

surname

all given names

date of birth (DD/MM/YYYY)

place of birth

citizenship (including dual nationality)

clearance level (verified by security staff)

copy of signed COMSEC Briefing Certificate

contract or sub-contract number associated with visit requirement

reason for visit (COMSEC access required)

name, telephone, fax, email address of security point of contact at destination

name, telephone, fax, e-mail address of point of contact or office of primary interest at
destination, and

full address of company or agency to be visited.
NOTE:
For visits outside Canada, include passport number and expiry date.
10.6 Foreign Government Organizations Visiting a Government of
Canada Department
A foreign government organization may request a COMSEC visit authorization, through their
national COMSEC control office, to visit a GC department. All visits that require access to ACM
or classified COMSEC information or material must be authorized by COMSEC Client Services.
The visit authorization request must include the criteria at Article 10.5.5.
10.7 Foreign Private Sector Companies Visiting a Government of
Canada Department
A foreign private sector company may request a COMSEC visit authorization to visit a GC
department through their national industrial security authority, who will then process the request
through CISD. All visits that require access to ACM or classified COMSEC information or
material must be authorized by COMSEC Client Services.
The visit authorization request must include the criteria at Article 10.5.5.
Access to Accountable
COMSEC Material
March 2014
45
UNCLASSIFIED
ITSD-03A
11
Physical Security
11.1 COMSEC Facilities
11.1.1 Requirement
A COMSEC facility must be established wherever ACM is generated, stored, repaired or used. A
COMSEC facility is either fixed or mobile.
NOTE:
An office environment where only user-level cryptographic equipment and BLACK
key is available for individual use is not considered a COMSEC facility; however, the
office area must be protected, at a minimum, to the highest classification of the
equipment when keyed.
11.1.2 Planning and Establishing a Fixed COMSEC Facility
When planning and establishing a fixed COMSEC facility, the DCA must:

consult with COMSEC Client Services to accommodate the direction in Chapter 4 of this
directive;

ensure a Threat and Risk Assessment (TRA) is conducted before initial activation (where
practical) and periodically thereafter based on threat, physical modifications, sensitivity of
operations and COMSEC incident reports of a serious nature.

establish the COMSEC facility in an area which provides positive control over access using a
hierarchy of zones (refer to Article 6.2 of the Treasury Board of Canada Secretariat [TBS]
Operational Security Standard on Physical Security) and the RCMP Guide to the Application
of Physical Security Zones (G1-026);

construct the COMSEC facility according to the TBS Operational Security Standard on
Physical Security and the RCMP G1-026; and

produce a standard operating procedure (in conjunction with a COMSEC Emergency Plan)
containing provisions for securely conducting facility operations.
11.1.3 Access Controls and Restrictions
The COMSEC Custodian must:

ensure positive control over the COMSEC Account’s ACM; and

ensure a TRA is conducted before initial activation (where practical) and periodically
thereafter based on threat, physical modifications, sensitivity of operations and COMSEC
incident reports of a serious nature.
Physical Security
March 2014
46
UNCLASSIFIED
ITSD-03A
11.1.4 Fixed COMSEC Facility Approval
11.1.4.1 Inspection of Facility for COMSEC Account Work Area
The DCA must contact COMSEC Client Services to arrange a security inspection by the National
COMSEC Audit Team (NCAT) at CSE for each new, remodeled or relocated facility. The
inspection provides assurance to the DCA and to NCOR that physical security measures and
COMSEC management measures have been established to the level necessary to begin
COMSEC Account operations.
Upon successful conclusion of the inspection, or when all inspection anomalies have been
rectified, COMSEC Client Services will provide written approval to the DCA and to NCOR to
commence COMSEC Account operations.
11.1.5 Mobile COMSEC Facilities
A COMSEC facility that can be readily moved from one location to another is called a Mobile
COMSEC facility (e.g. aircraft, ships and ground vehicles). This does not include ships that have
been classified as fixed facilities.
NOTE:
If a mobile COMSEC facility is operational in a fixed location for three months or
longer, it is considered a fixed COMSEC facility, and all requirements for fixed
COMSEC facilities –except construction– apply.
11.1.5.1 Mobile Facility Security
Where a mobile COMSEC facility is contained within a solid enclosure (e.g. van or shelter), all
access points other than the entrance door must be secured from inside the facility and:

the entrance door must be secured with a lock (resistant to opening by manipulation and
surreptitious attack), as provided for in the RCMP G1-026; or

approved locking bars or other locking devices must be used on equipment racks to deter and
detect removal of, or tampering with, the cryptographic equipment.
Unattended mobile facilities containing RED key, codes, or authenticators must be guarded. If
the mobile facility is located in Canadian or allied territory, a roving guard making rounds at least
every four hours is sufficient as the host nation may be used for area control. If the mobile
facility is located in non-Canadian or non-allied territory, Canadian guards must be used and
must be situated at all times in the immediate area of the COMSEC facility, preferably within the
COMSEC facility.
Physical Security
March 2014
47
UNCLASSIFIED
ITSD-03A
11.1.5.2 Aircraft Containing Accountable COMSEC Material
When aircrews lay-over in non-allied nations and Canadian guards are not available, aircrews
must attempt to have classified key transported to a Canadian facility for secure storage. If this is
not possible, ACM may remain onboard the aircraft, but the following requirements must be
strictly adhered to:

cryptographic equipment must be zeroized or contain only encrypted key. If the equipment is
filled with RED key, the equipment must be configured so that it cannot be operated by
unauthorized personnel (e.g. by removing the Cryptographic Ignition Key [CIK] or disabling
the PIN);

all key not protectively packaged must be destroyed or removed for personal custody by the
pilot or by a pilot-authorized crew member;

all remaining RED key must be secured in a department or agency-approved container
mounted in or internally secured (e.g. chained and locked) to the aircraft structure; and

the aircraft and container must be locked. If the aircraft is not lockable, an alternate method to
secure the aircraft must be implemented (e.g. more frequent inspections). The aircraft and
container must be checked by Canadian personnel (e.g. flight crew) at least daily for aircraft
parked on either military or civilian airfields within Canada, its territories and possessions.
Aircraft parked on other airfields must be checked at least every 12 hours for signs of tampering
or penetration. Any suspected tampering must be reported in accordance with the requirement of
ITSD-05.
11.1.5.3 Mobile COMSEC Facility Approval
Approval authority to establish, monitor and manage Mobile COMSEC facilities in a GC
department is delegated to the DCA.
11.2 Secure Storage
11.2.1 Security Containers
ACM must be stored in security containers (e.g. vaults, safes, file cabinets) that are approved for
the classification or protected level of the ACM and which meet the requirements of the RCMP
G1-001. Security containers used for the storage of ACM must be located in a security zone
appropriate for the level of the ACM.
NOTE:
A briefcase is not considered a storage container and must not be used as such.
Physical Security
March 2014
48
UNCLASSIFIED
ITSD-03A
11.2.2 Segregation of Accountable COMSEC Material in Storage
The rules for the minimum segregation of ACM in physical storage are:

effective editions, reserve editions and superseded key awaiting destruction must be stored
separately from one another in approved security containers (refer to the RCMP G1-001); and

key or CIKs must not be stored in the same security container as the equipment with which
they may be used.
NOTE:
In situations where space is at a premium, segregation may be accomplished using a
locked strongbox (strongly-made metal box typically used for safeguarding valuables)
housed within a single security container.
11.2.3 Opening of Security Containers in Emergency Situations
When the COMSEC Custodian and Alternate COMSEC Custodian(s) are not available to open a
security container in an emergency, the DCA (or other DCA-designated authority) may direct the
opening of the security container under the following conditions:

at least two individuals must be present to gain access to the combination or keys and to open
the security container;

the individuals who opened the security container must prepare a written report (containing
an inventory of the entire contents and the circumstances surrounding the access requirement)
to the individual(s) in charge of the security container, after the emergency opening; and

the individual responsible for the security container must conduct a full inventory of the
ACM and change the combination(s) immediately upon their return and report any
discrepancies as a COMSEC incident to the COMSEC Custodian.
In the event of an emergency where access is required to ACM that has been previously issued to
a Local Element who is not available, the individual requiring immediate access must contact
either the COMSEC Custodian or Alternate COMSEC Custodian, or in their absence the DCA.
11.2.4 Incidents Involving Unattended Security Containers
In the event of a security incident (e.g. if a container or vault is found open and unattended
during or after normal working hours), the individual discovering the incident must notify the
COMSEC Custodian or Alternate COMSEC Custodian. If the COMSEC Custodian or Alternate
COMSEC Custodian cannot be located, one of the other individuals on the list of individuals
having knowledge of the combinations to the container must be contacted. The COMSEC
Custodian and Alternate COMSEC Custodian must conduct a full inventory of the container’s
contents and then secure the container (e.g. provides a new key lock or change the combination).
In the event of an incident relating to ACM that has been issued to a Local Element, the
individual discovering the incident must contact either the COMSEC Custodian or Alternate
COMSEC Custodian.
Physical Security
March 2014
49
UNCLASSIFIED
ITSD-03A
11.2.5 Protecting Lock Combinations and Lock Keys
11.2.5.1 General
ACM held by the COMSEC Sub-Account Custodian must remain under his or her direct control
until transferred to another COMSEC Account or issued to a Local Element or authorized user.
Once the ACM is transferred or issued, it becomes the responsibility of the receiving COMSEC
Account or Local Element or authorized user to secure the ACM in an approved security
container (refer to the RCMP G1-001) until used/destroyed.
NOTE:
Any sign of tampering with or suspicion of compromise of a lock or its associated
combinations, or keys, must be immediately reported to the DCA.
11.2.5.2 Locks, Combinations and Keys
The types of combination locks and key locks suitable for securing ACM are found in the RCMP
G1-001. Key locks or combinations to locks must be changed on a regular basis according to
departmental security procedures, but must be changed immediately in the following situations:

an individual ceases to require access to the security container; or

the key, combination or lock is known or suspected to have been compromised.
Combinations and spare keys must be protected and stored by the DCA (or other authorized
individual) commensurate with the highest sensitivity level of the information or material
protected by the lock.
11.2.5.3 Record of Lock and Combination Holders
The COMSEC Custodian must keep a record of the name and telephone number of the
individuals having knowledge of the combinations (or hold lock keys) to security containers in
which ACM is stored.
11.2.5.4 Combinations and Keys for Two-Person Integrity Containers and
No-Lone Zones
The COMSEC Custodian must ensure that no one person may change both combinations, will be
allowed access to both keys, or have knowledge of both combinations to a security container
used to store ACM requiring TPI control or to an area used as a NLZ.
11.2.6 Storage of Cryptographic Key
11.2.6.1 Storage Requirements
Key not under the direct continuous control of a cleared and authorized individual (or individuals
where applicable) must be stored in an area protected by security guards or by an intrusion
detection system in accordance with the classification of the key (i.e. Security Zone, High
Security Zone).
Physical Security
March 2014
50
UNCLASSIFIED
ITSD-03A
11.2.6.2 Key Held in Reserve
The amount of key to be held in reserve varies with the supersession rate of the key. Table 2
provides a best practices rule that should be considered when holding key in reserve.
Table 2 – Key Held in Reserve
Supersession Rate
Held in Reserve
Key superseded daily, ten times monthly, semimonthly and monthly.
Key effective during the current month, plus
three months reserve.
Key superseded every two months or quarterly.
Effective key plus two in reserve.
Key superseded semi-annually, annually and
irregularly.
Effective key plus one in reserve.
SDNS seed key (five year retention factor).
One seed key may be held in reserve.
11.2.7 Storage of Cryptographic Equipment
11.2.7.1 General
All cryptographic equipment must be stored in a manner consistent with its classification and
security markings (e.g. CRYPTO, CCI) when not under the direct and continuous control of
appropriately cleared and authorized personnel. Cryptographic equipment may require special
storage procedures or storage facilities. Refer to the equipment-specific doctrine for additional
direction.
NOTE:
UNCLASSIFIED cryptographic equipment and unkeyed CCI require storage that
must provide reasonable protection from compromise, theft, tampering and damage.
11.2.7.2 Preparation for Storage
Cryptographic equipment must never be stored in a keyed state, unless:

operational requirements mandate it and no practical alternative exists; or

keyed equipment cannot be zeroized due to malfunction or damage.
When cryptographic equipment is required to be stored in a keyed state, it must be stored in
accordance with the highest classification of key loaded in the equipment.
NOTE 1: CCI that use a CIK are considered unlocked whenever the CIK is inserted and locked
with the CIK removed and not accessible for use by unauthorized persons.
NOTE 2: CCI that use only a PIN to unlock the secure mode are considered unlocked whenever
the PIN is entered.
Physical Security
March 2014
51
UNCLASSIFIED
ITSD-03A
NOTE 3: CCI that use a CIK and password/PIN combination are considered unlocked
whenever the CIK is inserted and the proper password authenticated.
11.2.7.3 Spare or Standby Cryptographic Equipment
Spare or standby cryptographic equipment that is located within a secure work area may be
considered installed for operation. The storage requirements in the previous articles are not
applicable to such equipment.
11.2.8 Storage of Accountable COMSEC Publications
Accountable COMSEC publications must be stored in accordance with their security
classification and any caveat(s) or other security markings.
Physical Security
March 2014
52
UNCLASSIFIED
ITSD-03A
12
Distribution and Receipt of Accountable COMSEC
Material
12.1 Distributing Accountable COMSEC Material
It is a COMSEC Custodian’s responsibility to ensure that individual shipments of ACM are kept
to the minimum required to support operational requirements (including contingency operations).
When preparing ACM for distribution, the COMSEC Custodian must:

ensure the receiver meets the requirements for storage of the shipped material;

perform page checks, equipment checks and inspection of protective packaging before
packaging;

zeroize or remove CIKs from all CCI before transportation (or, when circumstances warrant,
keyed devices may be hand-carried by authorized GC couriers or contractor couriers);

package operational and seed key separately from their associated cryptographic equipment
(including CCI) and transport in different vehicles on different days, unless –
o
the application or design of the equipment is such that the corresponding key cannot be
physically separated;
o
the key is an UNCLASSIFIED maintenance key (which may be shipped in the same
container as its associated cryptographic equipment); or
o
there are no other means available to effect delivery to support an immediate operational
requirement;
NOTE:
When cryptographic equipment (e.g. ECU) must be shipped in a keyed state
or with its associated key, ship the package in accordance with the
classification of the key or the cryptographic equipment, whichever is higher.

dispatch the list of effective dates of editions of key separately, and on different days, from
the key;

package each Traffic Encryption Key (TEK) separately from its associated KEK;

package components, which, as a whole comprise a cryptographic system (i.e. the
cryptographic equipment, ancillaries, associated documentation and key variables), separately
and transport in different shipments;

apply TPI controls to TOP SECRET key during transit unless the key is enclosed in
protective packaging and is double-wrapped (in which case only one courier is required);
Distribution and Receipt
of Accountable COMSEC Material
March 2014
53
UNCLASSIFIED
ITSD-03A

ensure that electronic key is transmitted in accordance with the applicable system or
equipment-specific doctrine; and

prepare a COMSEC Material Report in accordance with Chapter 10 of this directive.
12.2 Distributing Electronic Key on Magnetic or Optical Removable
Storage Media
In addition to the criteria at Article 12.1, when electronic key is distributed (i.e. transferred or
issued) on magnetic or optical RSM, the selected RSM must be controlled as a separate
COMSEC item within NCMCS as ALC 4. The COMSEC Custodian must affix a label to the
RSM similar to the example label depicted in Figure 2. The accounting number is taken from a
“next in sequence” number log maintained by the COMSEC Custodian to record the sequential
serial numbers of the RSM. The originating COMSEC Custodian must prepare and process a
Possession Report in accordance with Chapter 8 to enter the new ACM into the NCMCS before
distributing the RSM (and the electronic key).
A Transfer Report is required to account for the physical transport of RSM and another Transfer
Report is required to account for the transfer of the electronic key that is being transported by the
RSM. Both reports must be signed and returned to the originating COMSEC Account.
If RED key is being transported on a magnetic or optical RSM, the label must also display the
CRYPTO marking and the highest classification of key being transported (minimum SECRET).
Classification:
SECRET (CRYPTO if applicable)
Accounting Legend Code:
ALC 4
Short Title:
CAKAE 4005 (+ EKMS ID)
Accounting Number:
(Unique next in sequence number)
Figure 2 – Example of Magnetic or Optical Removable Storage Media Label
12.3 Tracking the Shipment of Accountable COMSEC Material
Following the shipment of ACM, the COMSEC Custodian must:

notify the recipient, within 24 hours of shipment, of the details of the shipment and the
estimated time of delivery;

ensure the telephone numbers of both the shipping and the receiving COMSEC Accounts are
listed on the waybill when ACM is shipped by commercial carrier or Canada Post Priority
Courier;

keep a local record of the shipment; and
Distribution and Receipt
of Accountable COMSEC Material
March 2014
54
UNCLASSIFIED
ITSD-03A

follow-up to ensure the ACM is delivered to the authorized recipient according to schedule,
and
o
if a shipment is not received within 48 hours of expected delivery, initiate shipment tracer
action with the carrier to determine the last known location of the shipment; and
o
if the location is not determined and the shipment is not recovered within 24 hours of the
shipment tracer initiation, assume that the shipment is lost in transit and immediately
report the loss as a COMSEC incident as detailed in Chapter 18.
12.4 Packaging Accountable COMSEC Material
12.4.1 Overview
The packaging used for the distribution of physical ACM will depend upon the size, weight,
shape of the material and the intended method of transport. All ACM must be double-wrapped or
otherwise encased in two opaque containers and securely sealed (including seams) before it is
transported.
12.4.2 Inner Wrapping
The inner wrapping must:

be secure enough to detect tampering;

guard against damage; and

be marked as follows:
o
full addresses of both the shipping and receiving COMSEC Accounts;
o
highest classification or protected level of the contents;
o
caveat “CRYPTO” if any of the contents are so marked; and
o
notation “TO BE OPENED ONLY BY THE COMSEC CUSTODIAL PERSONNEL”.
The sealed envelope containing the copies of the COMSEC Material Report may be enclosed
inside the package or affixed to the external surface of the inner wrapping of the package. When
more than one package is required, the envelope may be enclosed or affixed to the first package
of the series.
NOTE:
Manufacturer’s protective packaging (e.g. key canisters) is not considered an inner
wrapping when preparing items for shipment (refer to Article 13.1.4).
Distribution and Receipt
of Accountable COMSEC Material
March 2014
55
UNCLASSIFIED
ITSD-03A
12.4.3 Outer Wrapping
The outer wrapping must:

be secure enough to prevent damage to the contents or inadvertent or accidental unwrapping;

not bear any indication that the package contains classified or protected ACM;

be marked as follows:

o
full addresses of both the shipping and the receiving COMSEC Accounts;
o
shipment number or authorized courier number; and
o
package number, followed by a forward slash (“/”) and by the total number of packages in
the shipment (e.g. 1/3, 2/3, 3/3); and
have all required customs documentation clearly identified and affixed to the wrapping.
12.4.4 Types of Packaging
12.4.4.1 Envelopes
Double envelopes may be used for the shipment of ACM by mail or by courier. If the inner
envelope contains cryptographic material (of any classification) or ACM classified SECRET or
above, both the inner and outer envelope flap must be sealed with reinforced or tamper evident
tape in addition to the envelope gum seal.
If the inner envelope contains ACM classified CONFIDENTIAL or below, both the inner and
outer envelopes require gum sealing only. However, envelope flaps should be sealed with
reinforced or tamper evident tape if, in the opinion of the COMSEC Custodian, the envelopes
may tear during transportation.
12.4.4.2 Parcels
Good quality brown wrapping paper and fibre-reinforced paper tape should be used when
preparing COMSEC parcels. Such parcels must be packaged and bound as follows:

all seams of the inner wrapping must be bound with fibre-reinforced paper tape;

sharp corners must be reinforced or bound with cardboard to prevent damage to the inner
wrapping while in transit; and

outer wrapping must consist of paper and fibre-reinforced tape heavy enough to ensure a
suitably sturdy parcel.
Distribution and Receipt
of Accountable COMSEC Material
March 2014
56
UNCLASSIFIED
ITSD-03A
12.4.4.3 Cartons
Cartons may be used as the inner or outer container for a shipment. Used cartons must be in good
condition, with all previous markings obliterated. Additional packing must be used within the
carton to prevent movement of the contents. Fibre-reinforced paper tape must be used to seal all
seams and to reinforce edges and corners.
12.4.5 Wooden Crates and Transit Cases
Wooden crates or transit cases should be used only as outer wrapping for shipments, except when
specially designed and authorized to be used as inner wraps. The outer crate or case must be
strapped with a minimum of one strap lengthwise and one widthwise, both centred. The clamp
securing the strap running lengthwise must be positioned above the strap running widthwise.
12.4.5.1 Canvas Bags
A canvas bag may be used as the outer wrapping of a parcel. The bag must be sealed with a lever
lock and security fastener (e.g. disposable plik seal). The identification number on each security
fastener is a tamper evident security control that must be used to detect unauthorized access to
the bag. The user must take note of the security fastener’s unique ID/serial number of the security
fastener is used to seal the bag. Later, when the bag is to be opened, the user must verify that the
ID number of the security fastener on the bag has not changed. This verification of the ID number
confirms that the bag has not been opened by anyone and then resealed using a different security
fastener. The seams of the bag must be on the inside. Damaged or repaired bags must not be
used.
12.4.5.2 Briefcases
Within Canada, a briefcase with a GC-approved lock is an appropriate outer wrapper for ACM
carried by authorized departmental couriers. Refer to the RCMP G1-001 for details.
12.4.5.3 Controlled Cryptographic Items
CCI must be prepared and packaged as follows:


Unkeyed CCI must be packaged for shipment in any manner that:
o
provides sufficient protection from damage, and
o
provides evidence of any attempt to penetrate the package while the material is in transit.
In order to conceal the sensitive nature of the shipment, packages containing CCI must not be
externally marked as CCI or show the item description (nomenclature) of the equipment
being shipped. For exterior container documentation purposes, CCI are considered controlled
and sensitive items.
Distribution and Receipt
of Accountable COMSEC Material
March 2014
57
UNCLASSIFIED
ITSD-03A

CCI must only be shipped to authorized activities. Packages must be addressed in a manner
that will ensure delivery of the material to an organization with an individual designated to
accept custody for it at the recipient activity. An individual’s name should not be used in the
address; rather a functional designator should be used (e.g. an office symbol or an NCMCS
COMSEC Account number).
12.5 Authorized Modes of Transportation
12.5.1 General
The approved modes of transportation for Canadian ACM are listed in Table 3.
12.5.2 North Atlantic Treaty Organization and Foreign COMSEC Material
12.5.2.1 Classified COMSEC Material and UNCLASSIFIED Key Marked CRYPTO
The approved modes of transportation listed in this chapter do not apply to NATO or foreign
classified ACM or UNCLASSIFIED key marked CRYPTO. This ACM must be transported in
accordance with NATO and foreign national manuals, such as:

Communications Security and Cryptography (IS-4) – Part 1: Management of Cryptographic
Systems, UK.

Communications Security and Cryptography (IS-4) – Part 2: Forms and Instructions, UK.

Instructions for the Control and Safeguarding of NATO Cryptomaterial (SDIP 293).

NATO Crypto Distribution and Accounting Publication (AMSG 505).

Control of Communications Security (COMSEC) Material (NSA/CSS Policy Manual
No. 3-16), United States (U.S.).
NOTE:
Contact COMSEC Client Services for information regarding these publications.
12.5.2.2 UNCLASSIFIED, RESTRICTED and U/FOUO Accountable COMSEC
MATERIAL (other than key marked CRYPTO)
UNCLASSIFIED, RESTRICTED and U/FOUO foreign and NATO ACM (other than key
marked CRYPTO) must be shipped by the modes listed in Table 3 as approved for
PROTECTED A ACM of the same type. CCI, whether of foreign or national origin, must always
be shipped by the modes listed in Table 3.
Distribution and Receipt
of Accountable COMSEC Material
March 2014
58
UNCLASSIFIED
ITSD-03A
Table 3 – Authorized Modes of Transportation for Accountable COMSEC Material
Classification or Protected Level of ACM
(refer to COMSEC Material Legend)
Destination
1, 2
3, 4, 5
6, 7
8
9
Within Canada
A, B, C
(Notes I, II, IV)
A, B, C, D
(Notes I, II, IV)
A, B, C, D, E, F
(Notes I, II, IV)
A, B, D, E, F
A, B, C, D, E, F
(Notes I, II)
Between Canadian Addressees
Outside of Canada (Note V)
A, B, C
(Notes I, II, IV)
A, B, C, D
(Notes I, II, IV)
A, B, C, D
(Notes I, II, IV)
A, B, D, E, F
A, B, C, D, E, F
(Notes I, II)
To or From Non-Canadian
Addressees (Note VI)
A, B, C
(Notes I, II, IV)
A, B, C, D
(Notes I, II, III, IV)
A, B, C, D
(Notes I, II, III, IV)
A, B, D, E
A, B, C, D
(Notes I, II, III)
UNCLASSIFIED ACM may be shipped by any means intended to assure safe arrival at its destination.
UNCLASSIFIED ACM marked with “CRYPTO” caveat must be shipped as per PROTECTED A (Note IV).
COMSEC Material Legend:
Authorized Mode Legend:
1
All TOP SECRET and PROTECTED C ACM
A
Canadian Government Diplomatic Courier Service
2
All key not in protective packaging
B
Authorized departmental couriers
3
Classified cryptographic Information (not TOP SECRET)
C
Electronic transfer
4
Classified cryptographic equipment
D
Contractor’s authorized couriers
5
SECRET key in protective packaging
E
Authorized commercial carriers
6
PROTECTED B, CONFIDENTIAL and SECRET COMSEC Information
F
Canada Post Priority Courier Service
7
CONFIDENTIAL and PROTECTED B key in protective packaging
8
UNCLASSIFIED CCI and UNCLASSIFIED cryptographic material
9
PROTECTED A ACM
Notes:
I
Systems for electronic transfer of ACM are authorized by CSE on a case-by-case basis.
II
Electronic transfer of key when authorized by CSE and in accordance with system or equipment operational doctrine.
III
Departmental and Contractor’s couriers authorized by CSE for urgent requirements only.
IV
NATO and foreign COMSEC material (including key) may require additional considerations (refer also to SDIP-293, AMSG-505,
NSA/CSS Policy Manual 3-16, IS-4, etc. for details).
V
Refers to those addressees outside of Canada, where mail and shipment of material, once delivered, are handled and opened by
Canadian citizens (including those of dual nationality), e.g. Canadian Forces bases, Canadian embassies, consular offices.
VI
Refers to any other foreign addressee not covered in Note V.
Instructions: Locate the correct classification/protected level of the ACM from the COMSEC Material Legend. Find the destination in the
upper left hand column. The authorized modes of transportation are indicated by letters, which correspond to letters listed in the
Authorized Mode Legend. Refer to the notes for additional information.
Distribution and Receipt
of Accountable COMSEC Material
March 2014
59
UNCLASSIFIED
ITSD-03A
12.6 Authorized Couriers of Accountable COMSEC Material
12.6.1 Canadian Government Diplomatic Courier Service
The Canadian Diplomatic Mail Services of Foreign Affairs, Trade and Development Canada
provides all authorized diplomatic courier services for the GC.
12.6.2 Authorized Departmental Couriers
12.6.2.1 Requirements
Before authorizing the appointment of a departmental courier for the transport of ACM, the DCA
must ensure the courier:

is a Canadian citizen (including those of dual nationality);

is appointed for a specific period of time;

carries an authorized COMSEC Courier Certificate;

is cleared to a security level equal to or higher than the highest classification or protected
level of the ACM that is being carried;

has been appropriately briefed regarding responsibilities upon appointment; and

is provided with COMSEC Signing Authority Forms (refer to Article 6.3.2), as required.
12.6.2.2 COMSEC Courier Certificate
The COMSEC Courier Certificate attests to all concerned individuals (e.g. air carrier security
agents, customs officials) that the sealed container or package transported by the courier holds
only official matter. Presentation of the courier certificate should extend immunity from search or
examination of the official material carried or escorted by the courier. When further verification
is needed regarding the authenticity of a COMSEC Courier Certificate, the courier will direct the
concerned individual to contact the nearest Canadian military or diplomatic representative, as
appropriate.
12.6.2.3 Courier Instructions
The DCA must brief the courier and provide written instructions regarding his or her
responsibilities to personally safeguard the ACM until the package has been delivered to and
signed for by the authorized recipient. The courier instructions must include, at a minimum, what
actions to take:

before the start of the trip (e.g. contacting airline security or customs officials to make
arrangements for clearance without inspection);
Distribution and Receipt
of Accountable COMSEC Material
March 2014
60
UNCLASSIFIED
ITSD-03A

during the pre-boarding security screening or customs inspection, to ensure the ACM is not
compromised or damaged (e.g. requirement to show the COMSEC Courier Certificate when
requested to do so by appropriate authorities);

for alternate storage arrangements and whom to contact in the event of emergency situations,
lengthy delays or stopovers en route; and

in the event of loss, compromise or possible compromise of ACM and know whom to contact
in such a case.
12.6.2.4 Customs and Pre-Boarding Inspections
In cases where customs officials request or demand to view the contents of a COMSEC
shipment, the authorized courier, or the COMSEC Custodian if called, will request an interview
with the Chief of Customs or Air Transport Security Authority. The courier may agree to limited
inspection as a means of assuring customs officials that the shipment contains nothing other than
what is described on the documentation (e.g. X-ray is authorized). Whenever COMSEC packages
are subjected to increased scrutiny, the authorized courier will request that the inspection:

take place in a private location;

be conducted by duly authorized individuals in the presence of the authorized courier; and

be restricted only to the external viewing of the ACM.
The courier may be obliged to discontinue the courier run and return to the point of departure
with the ACM if an arrangement regarding the extent of customs clearance examination required
cannot be reached.
12.6.3 Contractor’s Authorized Couriers
Appropriately cleared contractor personnel who have been appointed by CSE may be employed
as couriers. Contact CICA for details on the requirements that must be met by personnel
appointed as contractor couriers. A COMSEC Courier Certificate is required.
12.6.4 Commercial Carriers
A commercial carrier service (including Canada Post Priority Courier Service) may be used as a
courier service for ACM (at the levels specified in Table 3) on the condition that the carrier can
ensure a continuous chain of accountability and custody for the material while in transit. The
courier must offer speed of service (e.g. overnight delivery), physical protection and track-andtrace capabilities.
A commercial carrier (non-military contracted aircraft) may be used to transport CCI providing
the carrier warrants in writing that the carrier:

provides door-to-door service and guarantees delivery within a reasonable number of days
based on the distance to be travelled;
Distribution and Receipt
of Accountable COMSEC Material
March 2014
61
UNCLASSIFIED
ITSD-03A

possesses a means of tracking individual packages within its system (i.e. manual or
electronic) to the extent that should a package become lost, the carrier can, within 24 hours
following notification, provide information regarding the last known location of the
package(s);

guarantees the integrity of the transporters’ contents at all times;

guarantees the integrity of package contents, including protection against damage, tampering
and theft;

has the capability to store in-transit COMSEC packages in a securely locked facility
(e.g. security cage) that is accessible solely to authorized carrier personnel, should it become
necessary for the carrier to make a prolonged stop at a carrier terminal (during overnight
stopovers);

obtains manual or electronic signatures, whenever a shipment changes hands within the
carrier company; and

obtains date-timed signatures upon pickup and delivery.
12.7 Receiving Accountable COMSEC Material
12.7.1 Preparation before Receiving Accountable COMSEC Material
Before receipt of any ACM, the COMSEC Custodian must:

notify the departmental mailroom or shipping area of –
o
the name of the departmental COMSEC Account that has been established
o
the name and internal address of the COMSEC Custodian, and
o
the requirement to deliver mail and packages addressed to the COMSEC Account to the
COMSEC Custodian unopened;

provide the departmental mailroom or shipping area with up-to-date copies of the COMSEC
Signing Authority Form; and

ensure other individuals who are authorized to sign for packages can provide appropriate
secure storage for the received package(s) (when the COMSEC Custodian or Alternate
COMSEC Custodian is not available).
12.7.2 Inspection of Packages
On receipt of a shipment, the COMSEC Custodian must:

carefully inspect the outer wrapping and inner wrapping of the shipment for signs of damage
or tampering before removing each wrapping;
Distribution and Receipt
of Accountable COMSEC Material
March 2014
62
UNCLASSIFIED
ITSD-03A

check the addresses on both outer and inner wrapping to confirm the shipment has been sent
to the intended recipient;

immediately report any evidence of possible tampering with either the inner or outer
wrappings or unauthorized access to the contents as a possible COMSEC incident in
accordance with Chapter 18 and –
o
pending investigation of a possible compromise, discontinue unwrapping the package and
quarantine the package; and
o
notify the shipping COMSEC Custodian to annotate all ACM involved as “Pending
Investigation”.
12.7.3 Validation of Content
When satisfied that the packaging has not been tampered with, the COMSEC Custodian must:

open the package (with TPI control in place if the shipment contains TOP SECRET key or
other key requiring TPI control);

unpack the contents and verify that the items listed on the enclosed COMSEC Material
Report match the items shipped by confirming:
o
the short title, edition and quantities of all items, and
o
accounting numbers, where applicable;

report any discrepancies to the shipping COMSEC Custodian and, if required, contact
NCOR/COR for assistance with reconciliation of the discrepancy;

inspect the protective packaging on each item of ACM, where applicable;
NOTE: Certain items of ACM are protectively packaged at the time of production and
must not be opened until they are to be issued to the authorized user.

page check all copies of accountable COMSEC publications;

if applicable, process and reconcile electronic key received on magnetic or optical RSM and
destroy the RSM within three working days of receipt; and

if no discrepancies are found, sign the three copies of the COMSEC Material Report and
distribute in accordance with instructions found at Article 8.1.1.3.
Distribution and Receipt
of Accountable COMSEC Material
March 2014
63
UNCLASSIFIED
ITSD-03A
13
Handling and Use of Accountable COMSEC Material
13.1 Cryptographic Key
13.1.1 Purpose and Use
Key may be used only for its intended purpose and only in the equipment for which it was
produced, unless otherwise directed by the responsible cryptonet CA for the key.
13.1.2 Key States (RED and BLACK)
Key is developed, distributed and handled in one of two states: RED (unencrypted) key state or
BLACK (encrypted) key state. RED key is accounted for in the NCMCS and BLACK key is
tracked outside of the NCMCS while in the BLACK state.
13.1.3 Labels
Except for labels affixed to protective packaging at a production facility, no other labels may be
affixed to the protective packaging of any key unless authorized by COMSEC Client Services.
13.1.4 Protective Packaging
Some key are protectively packaged at the time of production and will not, in most cases, be
opened until issued to an authorized user. The protective packaging must be inspected for signs
of tampering upon initial receipt, during inventory, before transfer or issue and before destruction
of sealed key.
NOTE 1: Protective packaging applied to individual TOP SECRET key must be removed under
TPI controls.
NOTE 2: Manufacturer’s protective packaging (e.g. key canisters) is not considered an inner
wrapping when preparing items for shipment (refer to Article 12.4.2).
13.1.4.1 Electronic Key on a Key Storage Device
The COMSEC Custodian must ensure that protective packaging for electronic seed or
operational key received on a key storage device is not opened before operational use. The key
storage device will normally be attached to a label bearing the identification information for the
electronic key and will be sealed in a plastic bag or in thermoplastic film.
Handling and Use of Accountable
COMSEC Material
March 2014
64
UNCLASSIFIED
ITSD-03A
13.1.5 Copies of Key
13.1.5.1 Operational Symmetric Key
Operational key may be copied, in whole or in part, as authorized by the CA for the key and in
accordance with equipment-specific doctrine (refer also to Article 13.1.5.3). The following rules
apply:

retain the short title of the key being copied;

safeguard the copies according to their classification and CRYPTO caveat (if applicable);

do not retain the copies beyond the destruction date for the key from which they were copied
(they may be destroyed before this date);

destroy the copies before destroying the original key from which the copies were made; and

locally account for the copies using a manual tracking system when equipment or system
audit trails are not available.
13.1.5.2 Test Symmetric Key
Test key may be copied and accounted for within a COMSEC Account as ALC 4 or ALC 7. If
the test key is transferred to another COMSEC Account, all copies must be destroyed.
13.1.5.3 Asymmetric Key
Copying of any asymmetric key is forbidden.
13.1.6 Two-Person Integrity Controls
TPI controls must be applied to RED TOP SECRET key and other CA-identified key from the
time of production to destruction unless:

the TOP SECRET key is loaded into a cryptographic equipment that is built to preclude
access to the TOP SECRET key; or

the TOP SECRET key has been issued for tactical mission use only.
NOTE: In this instance the term “tactical” refers to data or information that requires
protection from disclosure and modification for a limited duration, as
determined by the originator or information owner.
Handling and Use of Accountable
COMSEC Material
March 2014
65
UNCLASSIFIED
ITSD-03A
13.2 Cryptographic Equipment
13.2.1 Sight Verification
The COMSEC Custodian must verify the completeness of cryptographic equipment upon initial
receipt, during inventory, and before transfer or issue.
NOTE:
The term cryptographic equipment includes classified and unclassified COMSEC
equipment and CCI.
13.2.2 Equipment Labels
The only approved labels that may be attached to cryptographic equipment or to its protective
packaging are:

a manufacturer label;

an equipment nomenclature plate;

a CCI label;

one or more tamper-evident labels; and

any other CSE-authorized labels.
An approved label must not be removed or covered by another label unless specifically
authorized by CSE.
Visible signs of label tampering must be reported as detailed in Chapter 18.
13.2.3 Modification
Modification of any kind (including labelling) to cryptographic equipment may only be made
upon approval of COMSEC Client Services. Approved modifications to cryptographic
equipment must be done by authorized and qualified personnel.
13.2.4 Cryptographic Equipment, including Controlled Cryptographic Items,
Installed for Use in Attended, Unattended or Residential Operations
Use of cryptographic equipment, whether in attended or unattended operation (including
residences) requires the COMSEC Custodian to ensure that:

users of the equipment meet the requirements for COMSEC access as referred to in
Article 10.1.1;

have read and understood the equipment-specific doctrine;

equipment installed for operational use is protected based on the classification of the
equipment or the key, whichever is higher; and
Handling and Use of Accountable
COMSEC Material
March 2014
66
UNCLASSIFIED
ITSD-03A

authorized procedures have been put in place to prevent unauthorized access to, or
unauthorized use of, the equipment or its associated key.
13.2.5 Key Storage and Fill Equipment Containing Key
13.2.5.1 Common Fill Devices Containing Key
Common Fill Devices (e.g. KYK-13) that store key in RED form and provide no record of
transactions must not be used for long term storage of key. Key may be held in this device no
longer than 12 hours after the end of the applicable cryptoperiod. This type of device must be
marked to show the highest classification of the key contained and must be kept under TPI
controls whenever it holds TOP SECRET key.
13.2.5.2 Tier 3 Management Devices Containing Key
Tier 3 Management Devices (T3MD) that store key in encrypted form must be used in
accordance with the equipment-specific doctrine. Additional direction is detailed in Annex A.
13.2.5.3 Magnetic and Optical Removable Storage Media
Magnetic and optical RSM containing RED key must be returned to secure storage after the key
or associated data has been loaded into the end equipment. RSM holding key must be marked to
show the highest classification of the key held and, where applicable, must display the CRYPTO
marking. Additional direction is detailed in Annex A.
NOTE:
RSM includes CD-ROMs, DVDs and all other optical media, Universal Serial Bus
(USB) flash drives, memory storage cards and all other magnetic media.
13.2.5.4 Re-use of Accountable Magnetic and Optical Removable Storage Media
Accountable RSM that has been used to transfer key directly between GC EKMS LMD/KP
platforms may only be re-used within the GC EKMS, and for the same purpose, once the key it
contained has been removed.
Accountable RSM that has been used for other than the GC EKMS key transfer above is not
authorized for re-use and once the RSM and the key being transported has been processed and
reconciled, the RSM must be physically destroyed within three working days of receipt.
13.2.5.5 Re-use of Non-Accountable Magnetic and Optical Removable Storage
Media
Non-accountable RSM used in the transfer of BLACK key may be re-used once the BLACK key
has been removed and once the RSM has been appropriately sanitized (refer to Clearing and
Declassifying Electronic Data Storage Device [ITSG-06] for details on RSM declassifying and
sanitization).
Handling and Use of Accountable
COMSEC Material
March 2014
67
UNCLASSIFIED
ITSD-03A
13.2.6 Equipment Audit Trails
13.2.6.1 Responsibility for Reviewing
The audit trails for cryptographic equipment must be reviewed as specified in the
equipment-specific doctrine.
13.2.6.2 Reviewing Audit Trails
The individual authorized to monitor the audit trail data must:

not be the primary cryptographic equipment user;

meet the access requirements in Article 10.1.1;

have sufficient knowledge concerning the authorized use of the applicable cryptographic
equipment and the key stored or filled in the equipment;

confirm only authorized copies of key are made;

be able to detect any anomalies in the audit trail data; and

send a record of the conduct of the audit trail review to the COMSEC Custodian.
13.2.6.3 Retention of Audit Logs
Audit logs must be retained as detailed in Article 6.2.5, or as detailed in the equipment-specific
doctrine if different from this directive.
13.2.6.4 Retention of Records of Audit Trail Reviews
The COMSEC Custodian must retain a record of the completion of audit trail reviews until the
COMSEC Account receives a Periodic Inventory Reconciliation Notification letter attesting that
the account inventory has been reconciled.
13.3 COMSEC Publications
13.3.1 Reproduction
Accountable COMSEC publications may be reproduced upon specific written authorization from
the originator. Instructions for reproduction of extracts will be contained in the publication’s
handling instructions. Publications that are authorized for reproduction must be reproduced by
the COMSEC Custodian unless they are authorized for reproduction under a Private Sector
contract. Refer to ITSD-06 for information on the reproduction of accountable COMSEC
publications under a GC contract for Private Sector services procured through PWGSC.
Handling and Use of Accountable
COMSEC Material
March 2014
68
UNCLASSIFIED
ITSD-03A
13.3.2 Frequency of Page Checks
Accountable COMSEC publications and associated amendments must be page checked:

during each COMSEC Account inventory

upon receipt

before transfer and issue

before routine destruction, and

after posting any amendment (includes removal of pages or replacement of pages).
13.3.3 Conducting Page Checks
13.3.3.1 Requirement
The COMSEC Custodian (or other authorized individual) must conduct a page check of unsealed
ACM to ensure the presence of all required pages. To conduct the page check, the presence of
each page must be verified against the “List of Effective Pages” or the “Handling Instructions”,
as appropriate.
13.3.3.2 No Missing Pages
If there are no missing pages, the “Record of Page Checks” page must be signed and dated. If the
accountable COMSEC publication has no “Record of Page Checks” page, the notation must be
placed on the cover.
13.3.3.3 Missing Pages
If any pages are missing, the “Record of Page Checks” page must be annotated accordingly and a
COMSEC Incident Report must be submitted in accordance with Chapter 18. When pages are
missing upon initial receipt of accountable COMSEC publications from a production facility, the
COMSEC Custodian must notify the issuing authority and request disposition instructions
(e.g. transfer back for replacement, destroy, use with missing page).
13.3.3.4 Duplicate Pages
In the case of duplicate pages, the COMSEC Custodian must prepare a Possession Report in
accordance with Chapter 8 and notify NCOR/COR for disposition instructions of the duplicate
page(s). The Possession Report must list the page number as part of the short title
(e.g. AMSG 600, page 3) and list the accounting number assigned to the ACM. A notation of the
duplicate page(s), and the resultant disposition of the duplicate page(s), must be entered on the
“Record of Page Checks” page.
Handling and Use of Accountable
COMSEC Material
March 2014
69
UNCLASSIFIED
ITSD-03A
13.3.4 Amendments to Accountable COMSEC Publications
13.3.4.1 Printed Amendments
The COMSEC Custodian must account for the printed amendment as an accountable COMSEC
publication in accordance with its respective ALC until the printed amendment has been posted
and its residue destroyed. Care should be taken when preparing the Destruction Report to ensure
that the short title, edition, and accounting number of the amendment are reported (rather than
that of the publication). Printed amendments must be entered in sequence. If one is received and
the previous amendment(s) have not been entered, the previous amendment(s) must be entered
(or acquired and entered) before the latest amendment can be processed.
13.3.4.2 Message Amendments
A message amendment is used to announce information that must be immediately entered into an
accountable COMSEC publication. Post the amendment and note the entry on the “Record of
Amendments” page, then file the message amendment according to its security classification or
protected level and ALC. Message amendments must be entered in sequence. If a message
amendment is received but the previous amendment(s) were not entered, the previous
amendments must be entered before the new amendment can be entered.
13.3.4.3 Posting Amendments
The following applies to the posting of amendments:

the COMSEC Custodian (or other authorized individual) must post the amendment as soon
as possible after its receipt (or effective date);

personnel who is authorized to post amendments must be appropriately trained;

specific instructions contained in the letter of promulgation or handling instructions must be
read and understood before posting amendments;

entire amendments must be posted at one time, and not extended over a period of time;

if replacement pages are included in an amendment, page checks of both the publication and
the residue of the amendment must be made before destruction of the residue. Inadvertent
destruction of the effective portions of publications, along with the residue from
amendments, must be reported as a COMSEC incident in accordance with Chapter 18;

personnel posting amendments must annotate the posting of the amendment on the “Record
of Amendments”. If pages were added to or removed from the publication, date and sign the
“Record of Page Checks” page;
Handling and Use of Accountable
COMSEC Material
March 2014
70
UNCLASSIFIED
ITSD-03A

personnel, other than the COMSEC Custodian, posting amendments must return all residue
of the amendment (including any pages removed from the publication) to the COMSEC
Custodian for destruction;

amendment residue must be placed in a sealed envelope marked with the short title,
accounting number and the classification of the amendment;

amendment residue must be destroyed within five working days after entry of the
amendment; and

after an amendment has been entered, the publication must be page checked by a member of
the custodial staff other than the person who entered the amendment.
13.4 Local Tracking of Non-Accountable COMSEC Material
13.4.1 Local Tracking System
Certain material associated with cryptographic equipment (e.g. CIKs, PINs, configuration disks),
which is not controlled within NCMCS, must be controlled by the COMSEC Custodian through
a local tracking and control system separate from the NCMCS. It is the responsibility of the
originating authority to identify this material. Control and handling of this material will be
according to this directive, unless otherwise specified by the applicable equipment-specific
doctrine or the originator.
13.4.2 Control and Protection of Cryptographic Ignition Keys
The COMSEC Custodian must locally track CIKs using departmental procedures that minimize
any potential for compromise associated with their use. Local tracking procedures for CIKs will
include:

maintaining a record of each CIK created, including the serial number of the CIK (if
possible), the serial number of the associated equipment, location of the equipment, date the
equipment was keyed, and the name of each Local Element authorized to use the CIK;

ensuring each CIK is signed for and held by the Local Element to whom it has been issued
and verifying, at least annually, that all Local Elements hold their CIK;

shipping CIKs (separately from their associated equipment) in a COMSEC channel approved
by CSE;

providing adequate storage for a CIK when it is not held under the personal control of the
Local Element; and

zeroizing or destroying CIKs that are no longer required.
Handling and Use of Accountable
COMSEC Material
March 2014
71
UNCLASSIFIED
ITSD-03A
13.4.3 Record of Personal Identification Numbers and Passwords
When a written record of PINs or passwords is required, the COMSEC Custodian must ensure:

the record contains the name and telephone number of the individual(s) having knowledge of
the PIN or password, the serial number of the associated equipment, the location of the
equipment, and the date the PIN or password was changed;

the record of PINs or passwords is safeguarded as directed by its classification or the
classification of the associated equipment, whichever is higher;

access to individual PINs or passwords is restricted to the individual to whom it is assigned,
unless an emergency situation dictates otherwise; and

the record of PINs and passwords or individual PINs and passwords are distributed via
COMSEC channels or via approved methods for classified material.
13.4.4 Change of Personal Identification Numbers and Passwords
The COMSEC Custodian must ensure that PINs and passwords for cryptographic equipment are
changed as detailed in the equipment-specific doctrine. Where direction is not provided, the PIN
or password must be changed when:

the equipment is first put into use by the COMSEC Custodian;

an individual knowing the PIN or password ceases to have authorized access to the
equipment;

an unauthorized individual has had access to the written record of the PIN or password;

the PIN or password is known or suspected to have been compromised; and

the PIN or password has not been changed in the last six months.
13.4.5 Storage of Personal Identification Numbers and Passwords
When records of PINs or passwords, or a list of PINs and passwords, need to be maintained, they
must be safeguarded and managed by an appropriate authority (DCA or COMSEC Custodian)
who must mark and protect the list in accordance with the minimum classification level of the
highest classification of the material being protected by the PIN or password.
13.4.6 Configuration Disks
The COMSEC Custodian must ensure the label on the equipment configuration disk identifies
the equipment to which it belongs, the date it was created, and its classification. Local tracking
includes recording the information on the label, the name of the individual responsible for the
control of the disk and the location of the associated equipment.
Handling and Use of Accountable
COMSEC Material
March 2014
72
UNCLASSIFIED
ITSD-03A
13.4.7 Software Upgrades
All software upgrades must be approved by COMSEC Client Services. The COMSEC Custodian
must control the equipment software upgrade process to ensure that all operational cryptographic
equipment, including the equipment held in reserve, is compatible. All mandatory software
upgrades must be completed by the date directed by CSE.
NOTE:
Completion of mandatory software upgrades must be confirmed to COMSEC Client
Services and is auditable.
Handling and Use of Accountable
COMSEC Material
March 2014
73
UNCLASSIFIED
ITSD-03A
14
Disposal of Accountable COMSEC Material
14.1 General
While COMSEC Client Services must promulgate disposal instructions for obsolete
cryptographic equipment and associated ACM, GC departments are responsible for the process
of disposing surplus, obsolete, superseded or unserviceable ACM in accordance with the
minimum standards set forth in this directive.
Disposal of ACM may be accomplished in one of three ways: transfer, sale or destruction.
14.1.1 Disposal Action – Transfer or Sale
DSOs or DCAs must contact COMSEC Client Services to facilitate the transfer or sale of ACM
to another authorized department.
14.1.2 Disposal Action – Destruction
Except for regularly superseded key or publications, the DSO or DCA must contact COMSEC
Client Services to facilitate the destruction of ACM.
14.1.2.1 Routine Destruction
It is imperative that authorized destruction of ACM be performed promptly, in order to keep to a
minimum the amount of ACM held in inventory.
14.1.2.2 Emergency Destruction
Where the risk of compromise in a hazardous situation or in an emergency is greater than the
security in place to prevent the compromise, emergency destruction must be considered. Refer to
Chapter 16 for details.
14.2 Destruction of Key
14.2.1 General
Superseded key is normally authorized for destruction when the next edition becomes effective
unless directed otherwise by the CA for the key.
14.2.2 Unavailability of Destruction Devices
Key that cannot be zeroized or destroyed at the COMSEC Account due to unavailability of
destruction devices must be transferred to the NDA for destruction.
Disposal of Accountable
COMSEC Material
March 2014
74
UNCLASSIFIED
ITSD-03A
14.2.3 Key Issued for Use
Superseded key, whether regularly or irregularly superseded, must always be destroyed within
12 hours of supersession except in the following circumstances:

in the case of an extended holiday period or when special circumstances prevent compliance
with the 12-hour rule (e.g. destruction facility not operational), key must be destroyed as soon
as possible and should not be held longer than 72 hours following supersession;

where authorized destruction devices are not available, superseded key must be destroyed as
soon as practicable upon completion of operations;

the destruction of KEK must be accomplished as soon as the key is filled into the
cryptographic equipment unless specific equipment or systems doctrine allows retention; or

key involved in compromised situations must be destroyed within 72 hours after disposition
instructions are received and the Destruction Report sent to NCOR/COR immediately
following destruction.
14.2.4 Emergency Supersession
Key involved in an emergency supersession must be destroyed in accordance with the CA’s
instructions.
14.2.5 Defective Key
Damaged or defective key must not be destroyed at the COMSEC Account. The COMSEC
Custodian must immediately report the matter to the appropriate CA for instructions. Defective
key must be transferred to the NDA at CSE for evaluation and destruction (i.e. physical
destruction, zeroization or rendering the key unuseable).
14.3 Destruction of COMSEC Publications
Accountable COMSEC publications must be destroyed within 15 working days following the
date of supersession or the authorized date of destruction. COMSEC publications must be page
checked no more than 48 hours before their destruction.
14.4 Destruction of Cryptographic Equipment
Accountable cryptographic equipment, including CCI, must not be destroyed, dismantled or
cannibalized without specific authorization from COMSEC Client Services.
Disposal of Accountable
COMSEC Material
March 2014
75
UNCLASSIFIED
ITSD-03A
14.4.1 Destruction Facilities
Destruction facilities vary as to the level of destruction they can accommodate. Therefore, all
destruction facilities must be approved by CSE prior to the destruction of cryptographic
equipment. Currently, only CSE possesses the capability to destroy all types of cryptographic
assemblies, components and integrated circuits.
When cryptographic equipment has been designated for destruction, COMSEC Client Services
will issue specific instructions in regards to the dismantling of the equipment and the transferring
of specific items to CSE for destruction.
If a department has CSE-approved COMSEC destruction facilities available on site, the
COMSEC Custodian may undertake the destruction process once written authorization is
provided by COMSEC Client Services.
14.4.2 Dismantling Cryptographic Equipment
Cryptographic equipment must be dismantled before destruction. CSE is responsible for
determining the necessary dismantling procedures for cryptographic equipment.
The general dismantling procedures includes the removal of cryptographic assemblies,
components and integrated circuits, hazardous assemblies and components, as well as all name
plates, labels and other identifying affixtures that could identify a piece of equipment as being an
COMSEC item.
Destruction procedures may differ from device to device. CSE is also responsible for determining
which dismantling processes are to be completed by CSE and which processes may be effected
by specifically trained and authorized departmental personnel.
14.4.3 Expense of Destruction
Under normal circumstances, the expense of the entire destruction process (cost and logistics) is
the responsibility of the GC department disposing the equipment. Departments should contact
COMSEC Client Services for current information on the financial responsibilities related to the
destruction of accountable cryptographic equipment.
14.4.4 Destruction Procedure
Cryptographic equipment that is authorized for destruction must be destroyed within a controlled
environment.
The destruction process includes, but may not be limited to:

removal and disposal of accountable COMSEC assemblies, components and integrated
circuits;

removal and disposal of hazardous assemblies, components and integrated circuits;
Disposal of Accountable
COMSEC Material
March 2014
76
UNCLASSIFIED
ITSD-03A

removal and disposal of non-accountable, non-hazardous assemblies and components;

removal and disposal of name plates, labels and other identifying affixtures;

disposal of chassis and other remaining non-accountable parts; and

accounting for removed accountable cryptographic assemblies, components and integrated
circuits.
14.4.5 Removal and Disposal of Accountable Cryptographic Assemblies,
Components and Integrated Circuits
The removal of accountable cryptographic assemblies, components and integrated circuits must
be performed by authorized personnel. The destruction of accountable cryptographic assemblies,
components and integrated circuits must be performed by the COMSEC Custodian and must be
witnessed by an authorized and properly cleared and COMSEC briefed individual. A Destruction
Report must be prepared.
NOTE:
Although destruction can be achieved by incineration, disintegration or pulverization,
the incineration of assemblies, components and integrated circuits is not
environmentally friendly and is no longer practiced. CSE is responsible for
determining the particulate size to which components must be pulverized or
disintegrated.
14.4.6 Disposal of Hazardous Assemblies, Components and Integrated Circuits
All assemblies, components and integrated circuits that are deemed to be hazardous waste must
be removed and disposed of in accordance with federal and provincial environmental and
hazardous waste regulations.
All Polychlorinated Biphenyls (PCB) must be removed and disposed of separately in accordance
with federal and provincial environmental and hazardous waste regulations.
Equipment may have lithium batteries that are hardwired into the circuitry. Prior to the removal
of the lithium batteries, the authorized personnel dismantling the equipment should contact their
respective departmental safety officer for advice and guidance with respect to the safety and
environmental regulations specific to disposal of lithium batteries.
NOTE:
Contact COMSEC Client Services for guidance if there is uncertainty as to whether or
not an assembly or component is hazardous to the environment.
14.4.7 Removal and Disposal of Non-Accountable, Non-Hazardous Assemblies
and Components
Non-accountable equipment assemblies and components, including PWs and other parts that are
deemed non-hazardous may be disposed of in accordance with departmental regulations for
normal waste.
Disposal of Accountable
COMSEC Material
March 2014
77
UNCLASSIFIED
ITSD-03A
14.4.8 Removal and Disposal of Name Plates, Labels and Other Identifying
Affixtures
As part of the disposal process, all name plates, labels and other affixtures that could identify a
piece of equipment as being accountable cryptographic equipment must be removed from the
chassis and physically destroyed beyond recognition to ensure that it cannot be reused. Name
plates, labels and other affixtures that are marked with a classification marking
(CONFIDENTIAL, SECRET or TOP SECRET) must be destroyed as classified waste in
accordance with local procedures.
14.4.9 Destruction of Chassis and Other Remaining Non-Accountable Parts
The chassis and remaining parts may be disposed of through commercial destruction or recycling
facilities once all accountable cryptographic assemblies, components and integrated circuits,
hazardous waste, as well as name plates, labels and other identifying affixtures are removed.
Departments are to contact COMSEC Client Services for a current listing of approved
commercial destruction facilities.
14.4.10
Accounting for Removed Assemblies, Components and Integrated
Circuits
COMSEC Client Services will identify which removed cryptographic assemblies, components
and integrated circuits require control and accountability within the NCMCs prior to their
destruction. This material will be accounted for as ALC 2 and will be entered into the NCMCS
by Possession Report.
NOTE:
Once the authorized assemblies, components, integrated circuits, name plates, labels
and other identifying affixtures have been removed from the original cryptographic
equipment, the original equipment is considered to be non-accountable at which time
a Destruction Report must be prepared to remove it from NCMCS accountability. The
now non-accountable chassis must be disposed of as indicated in Article 14.4.9.
14.5 Performing Routine Destruction
14.5.1 Personnel
14.5.1.1 COMSEC Custodian and Alternate COMSEC Custodian
The COMSEC Custodian and the Alternate COMSEC Custodian normally perform the routine
destruction of ACM. However, granting the authority to destroy superseded ACM to other
appropriately cleared and COMSEC-briefed individuals is preferable to delaying destruction,
even for a short time.
Disposal of Accountable
COMSEC Material
March 2014
78
UNCLASSIFIED
ITSD-03A
14.5.1.2 Local Element
A Local Element may be granted the authority by the COMSEC Custodian to destroy key in the
presence of an appropriately cleared and COMSEC briefed witness, if an approved destruction
device is available. If an approved destruction device is not available, the key must be returned to
the COMSEC Custodian for destruction.
14.5.1.3 Witness
The destruction of all physical material and electronic key on physical media must be witnessed.
Two authorized individuals must sight the ACM being destroyed and then witness the complete
destruction or zeroization of the ACM. The zeroization (i.e. destruction) of electronic key may or
may not require a witness depending on whether the equipment records an audit trail. Refer to the
equipment-specific doctrine for direction.
14.5.2 Training
The COMSEC Custodian must ensure that the individuals whom they authorize to destroy ACM:

meet the requirements for access (refer to Article 10.1.1) to the ACM being destroyed;

are briefed on the correct procedures and methods of destruction; and

are trained in the use of authorized destruction devices.
14.5.3 Destruction Steps
The following steps must be carried out by the two individuals performing the destruction:
1.
verify that the material to be destroyed is authorized for destruction before listing the
material on the Destruction Report;
2.
perform equipment verification and page checking before destruction (normally, no earlier
than 48 hours before the scheduled destruction);
3.
list all material to be destroyed on the Destruction Report in accordance with Article 8.1.6.
Use the (unsigned) Destruction Report (or other local destruction log) as a “check list”
during the destruction process to ensure that the correct ACM will be destroyed;
4.
if sufficient destruction facilities are not available and the individuals carrying out the
destruction have been authorized to transport the ACM:
a.
place the material listed for destruction in burn bags or other destruction containers
b.
seal and mark the containers in accordance with the appropriate classification or
protected level (if there is more than one container they must be individually
numbered (e.g. 1 of 2, 2 of 2), and
c.
transport the material directly to the location where the destruction is to take place.
Disposal of Accountable
COMSEC Material
March 2014
79
UNCLASSIFIED
ITSD-03A
5.
immediately before destruction, verify the material being destroyed (short title, edition,
accounting number, and quantity for each item) against the Destruction Report (or other
local destruction log) ensuring that all accounting information is correct;
6.
immediately destroy the material using approved destruction methods;
7.
examine the destruction device and the surrounding area to ensure that all material has been
destroyed;
8.
thoroughly inspect the residue to ensure that the destruction was complete; and
9.
sign and witness the Destruction Report (or other local destruction log) unless the
equipment-specific doctrine specifies that a witness is not required. The Destruction Report
must not be signed until the complete destruction of the listed material is confirmed.
14.6 Routine Destruction Methods
14.6.1 Paper Accountable COMSEC Material
14.6.1.1 General
The destruction criteria listed in the following articles apply to classified key and to media which
embody, contain, describe or implement a classified cryptographic logic. Paper ACM may be
destroyed by any means approved for the destruction of paper ACM of equal classification or
protected level.
NOTE:
Where possible, burning or pulverizing should be used as the preferred method for
ensuring complete destruction.
14.6.1.2 Incineration
The burning of paper ACM must be complete (so that all material is reduced to white ash) and
contained (so that no unburned pieces escape). Ashes must be inspected and, if necessary,
broken up.
14.6.1.3 Pulverizing, Chopping or Pulping
Pulverizing, chopping or pulping devices used to destroy paper ACM must reduce the ACM to
bits no larger than five millimeters (1/5 inch) in any dimension.
NOTE:
DO NOT PULP paper-Mylar-paper key tape, high wet strength paper (map stock) and
durable-medium paper substitutes (e.g. Tyvek olefin, polyethylene fibre). These
materials do not reduce to pulp and must be destroyed by burning, pulverizing,
chopping or cross-cut shredding.
Disposal of Accountable
COMSEC Material
March 2014
80
UNCLASSIFIED
ITSD-03A
14.6.1.4 Cross-Cut Shredding
Using Type II shredders to reduce material to shreds not more than 1.0 millimeters wide and
14.4 mm long is considered complete destruction (refer to the RCMP G1-001 for details.
14.6.2 Non-Paper Accountable COMSEC Material
14.6.2.1 Removable Storage Media
The disposal of RSM (e.g. microforms, CD-ROMs, DVDs and all other optical media, USB flash
drives and all other removable flash drives) must be consistent with the individual system and
equipment-specific doctrine, CSE ITSG-06 and the RCMP G1-001.
14.6.2.2 Hardware Key
Contact COMSEC Client Services for authorization to destroy or dispose of hardware key, such
as Programmable Read Only Memories (PROMs), and permuting plugs and their associated
manufacturing aids.
14.6.2.3 Electronic Key
The destruction of electronic key is accomplished by zeroization or overwriting of the key.
For instructions on the destruction or zeroization of electronic key loaded in accountable
cryptographic equipment, refer to the appropriate equipment-specific doctrine.
Disposal of Accountable
COMSEC Material
March 2014
81
UNCLASSIFIED
ITSD-03A
15
COMSEC Account Inventory
15.1 Reasons for Inventory
An inventory is the verification of a COMSEC Account’s holdings. NCOR/COR maintains a
database that reflects all ALC 1, ALC 2 and ALC 6 ACM charged to each COMSEC Account.
The database contains data taken from COMSEC Material Reports (e.g. Destruction, Possession)
that COMSEC Accounts submit to NCOR/COR. Any COMSEC Material Reports that were
processed by an account but were not entered in NCOR/COR database will result in a
discrepancy between NCOR/COR database and the COMSEC Account records.
Inventories serve to ensure that:

COMSEC Account records are up-to-date;

NCOR/COR database is up-to-date by verifying that all COMSEC Material Reports have
been forwarded to NCOR/COR and have been processed by NCOR/COR;

ACM charged to a COMSEC Account is actually on-hand and has been sighted by authorized
personnel; and

ACM charged to a COMSEC Account is still required for use by the account.
15.2 Types of Inventory
15.2.1 Periodic Inventory
The COMSEC Custodian and the Alternate COMSEC Custodian must conduct a periodic
(minimally every 18 months) sight inventory of all ACM in their COMSEC Account (including
all Local Elements and COMSEC Sub-Accounts) or as directed by NCOR/COR.
NCOR/COR will distributes an Inventory Report that lists all ACM charged to the COMSEC
Account as of the date of printing. A sight inventory must be conducted to verify the presence of
the material listed on the report. The COMSEC Custodian must return the signed Inventory
Report to NCOR/COR no later than 10 working days after the initial receipt of the report.
15.2.2 Change of COMSEC Custodian Inventory
In cases of sudden (indefinite or permanent) departure of the COMSEC Custodian, the
newly-appointed COMSEC Custodian must conduct a sight inventory of all ACM in the
COMSEC Account.
Upon completion of the inventory, the new COMSEC Custodian must sign the Inventory Report
as the Custodian. The new COMSEC Custodian, except for discrepancies being resolved,
assumes responsibility for all ACM in the account.
COMSEC Account Inventory
March 2014
82
UNCLASSIFIED
ITSD-03A
15.2.2.1 Special Inventory
The COMSEC Custodian must complete a special inventory when directed to do so by
NCOR/COR or DCA. Special inventories may be requested for reasons such as the suspected
loss of ACM or frequent deviation from accounting procedures.
The procedures used for a periodic (sometimes called annual inventory in other documentation)
inventory must be used for a special inventory.
15.3 Inventory Reports
15.3.1 National Central Office of Record/Central Office of Record
NCOR/COR-initiated Inventory Reports are distributed to COMSEC Accounts to announce the
beginning of the inventory process. Each Inventory Report lists all ALC 1, ALC 2 and ALC 6
ACM that have been recorded in the NCOR/COR database for the respective COMSEC Account
as of the date of the printing.
NOTE:
CSE has approved the use of several automated and manual accounting/management
systems to accommodate the minimum security requirements of the NCMCS. These
systems may employ terminology and procedures that are quite distinct from each
other (refer to Article 6.2.3) and any other classified information stored on the system.
15.3.2 COMSEC Account Inventory Report
Inventory Reports produced by the COMSEC Custodian at a COMSEC Account may be directed
at two different audiences:

within the COMSEC Account, where they may be distributed for use during the physical
sighting of on-hand material; and

NCOR/COR, in order to report the complete holdings of the COMSEC Account.
15.3.3 Distribution within the COMSEC Account
The COMSEC Custodian prepares Inventory Reports for internal distribution to Sub-Account(s)
and Local Elements. These Inventory Reports list all ALC 1, ALC 2, ALC 4, ALC 6 and ALC 7
ACM that the COMSEC Custodian has issued to elements within the COMSEC Account and
which are still out on loan.
15.3.4 Distribution to National Central Office of Record/Central Office of Record
The COMSEC Custodian compiles the results of all Inventory Reports that were distributed
within the account and returns a consolidated account Inventory Report to NCOR/COR. This
report contains all ALC 1, ALC 2 and ALC 6 ACM held by the COMSEC Account.
COMSEC Account Inventory
March 2014
83
UNCLASSIFIED
ITSD-03A
15.3.5 Amendment of Inventory Report
The Amendment to Inventory Report is used to report any discrepancies between a COMSEC
Account’s inventory and the NCOR/COR-initiated Inventory Report. For example, if a
COMSEC Account failed to submit a Destruction Report to NCOR/COR, all the material
destroyed by the account that was listed on the Destruction Report, would not be recorded in the
NCOR/COR database. Consequently, the NCOR/COR-initiated Inventory Report would list that
material as being on-hand at the COMSEC Account. An Amendment to Inventory Report would
provide the details of the missing Destruction Report. When submitting the Amendment to
Inventory Report, the COMSEC Custodian must attach all supplemental accounting reports in
order for NCOR/COR to proceed with the inventory reconciliation.
15.4 Inventory Conduct
15.4.1 General
The COMSEC Custodian must ensure that a sight inventory of the entire COMSEC Account is
carried out during the inventory. Before the expected receipt of the periodic
NCOR/COR-initiated Inventory Report, the COMSEC Custodian must:

generate a COMSEC Account Inventory Report;

conduct a sight inventory of ACM that has been issued to Local Elements or direct the Local
Element to do so with an appropriate witness;

direct each COMSEC Sub-Account Custodian to conduct a sight inventory of COMSEC SubAccount holdings in the same manner as described for a COMSEC Account inventory; and

conduct a sight inventory of the ACM on-hand and under the direct custody of the COMSEC
Custodian.
15.4.2 Sight Inventory
The COMSEC Custodian will provide an Inventory Report for personnel conducting a sight
inventory of ACM. The following applies when conducting a sight inventory of ACM:

the sight inventory must be conducted by two individuals who are appropriately cleared and
who have been COMSEC briefed;

the two individuals conducting the sight inventory must verify that the ACM on-hand agrees
with the COMSEC Account Inventory Report;

unsealed accountable COMSEC publications must be page checked;

cryptographic equipment in use does not need to be opened to verify it contains all required
subassemblies and elements;
COMSEC Account Inventory
March 2014
84
UNCLASSIFIED
ITSD-03A

removable assemblies that are listed separately on an Inventory Report and are not listed on
the equipment’s chassis must be physically sighted unless the equipment is undergoing tests
or is in operation;

electronic key that is stored in equipment with a verifiable audit trail may be inventoried
without a witness; and

COMSEC Custodians are responsible to NCOR/COR for only the original ALC 6 electronic
key distributed to the account or generated by the account. Copies of electronic key are
locally accountable.
15.4.3 Reconciling the COMSEC Account Inventory Report
15.4.3.1 Local Element Inventory Reconciliation
Persons conducting Local Element inventories may mark-up the Inventory Report to indicate that
material is on-hand or, conversely, that it is lost, missing or contains extra material. They must
both sign the Inventory Report before returning it to the COMSEC Custodian.
The COMSEC Custodian must reconcile the Inventory Report returned from all Local Elements
with the COMSEC Account Inventory Report.
15.4.3.2 COMSEC Sub-Account Inventory Reconciliation
The COMSEC Sub-Account Custodian must return his or her signed Inventory Reports to the
COMSEC Account Custodian for reconciliation. If discrepancies are noted in any COMSEC
Sub-Account Inventory Report, the COMSEC Custodian must direct the custodian of that
COMSEC Sub-Account to take corrective action within 48 hours of receipt of such notice, to
advise the COMSEC Custodian of the action taken and to submit any substantiating reports
required.
The COMSEC Custodian must reconcile the Inventory Reports returned from all COMSEC
Sub-Accounts with the COMSEC Account Inventory Report.
15.4.3.3 COMSEC Account Reconciliation
Upon receipt of the NCOR/COR-initiated Inventory Report, the COMSEC Custodian must
reconcile the COMSEC Account holdings with the NCOR/COR-initiated Inventory Report. This
is accomplished by conducting a sight inventory of all ACM held by all elements within the
account and returning a signed Inventory Report to NCOR/COR.
15.4.4 Completion and Submission of Inventory Report and Supplements
Upon completion of the COMSEC Account inventory, the COMSEC Custodian and the witness
must sign and date the Inventory Report. The number of supplemental accounting reports and
pages of amendments must be entered on the last page of the Inventory Report.
COMSEC Account Inventory
March 2014
85
UNCLASSIFIED
ITSD-03A
The Inventory Report and the Amendment to Inventory Report with all supplemental COMSEC
Material Reports (if required) must be sent to NCOR/COR no later than ten working days after
receipt of the NCOR/COR-initiated Inventory Report. A signed copy of the Inventory Report
must be retained on file.
15.4.5 National Central Office of Record/Central Office of Record Reconciliation of
COMSEC Account Inventory Report
NCOR/COR will process Inventory Reports submitted by COMSEC Accounts.
If NCOR/COR notifies a COMSEC Account of discrepancies between the COMSEC Account
Inventory Report and NCOR/COR Inventory Report, the COMSEC Custodian must attempt to
resolve the discrepancies.
If the discrepancies are the result of missing COMSEC Material Reports, the COMSEC
Custodian must prepare and submit, within 48 hours, an Amendment to Inventory Report with all
supplemental COMSEC Material Reports to update NCOR/COR database.
If the sight inventory of the COMSEC Account is correct, and there are no missing COMSEC
Material Reports, NCOR/COR will issue an Inventory Reconciliation Report, which certifies the
inventory as being correct.
If the sight inventory reveals lost or missing ACM or other discrepancies, a COMSEC incident
must be reported as detailed in Chapter 18. An Inventory Reconciliation Report will not be
issued until all discrepancies have been resolved or an investigation into the incident has been
completed and disposal instructions issued.
COMSEC Account Inventory
March 2014
86
UNCLASSIFIED
ITSD-03A
16
COMSEC Emergency Protection Planning
16.1 Requirement
Every GC department that holds ACM must maintain a current, documented emergency plan for
the protection and positive control of ACM appropriate for:

natural disasters or accidental emergencies likely to occur in their location (e.g. hurricanes,
tornadoes, earthquakes, floods or fires). Consideration must be given to incorporating this
plan into the Business Continuity Plan established for the entire GC department. Procedures
must emphasize maintaining security control over the ACM until order is restored without
endangering life; and

high risk environments (e.g. those with potential or imminent hostile situations). Emergency
Plans in high risk environments must include Emergency Destruction Procedures (EDP).
16.2 Planning for Natural Disasters and Accidental Emergencies
Planning must provide for:

safety of all personnel (or prime importance);

assignment of on scene responsibility for ensuring the protection and positive control of all
ACM;

protection or removal of ACM in the event that the admission of unauthorized individuals
into the secure area(s) becomes necessary;

evacuation of the area(s);

assessment and reporting of the probable exposure of ACM to unauthorized individuals
during the emergency;

post-emergency inventory of ACM and reporting of the loss or unauthorized exposure of
ACM to the DCA;

identification of primary and secondary recovery sites, when recovery will not be possible at
the current location;

identification of critical resources required to support the recovery;

off-site storage facilities; and

business continuity during and business resumption following the emergency event.
COMSEC Emergency
Protection Planning
March 2014
87
UNCLASSIFIED
ITSD-03A
16.3 Planning for Emergencies in High Risk Environments
16.3.1 Situational Assessment
Planning for potential hostile activity (e.g. enemy attack, civil uprising, riot) must concentrate on
the activities necessary to safely evacuate or securely destroy the ACM (without endangering
life). It must take into consideration all possible situations which could occur, such as those in
which:

an orderly withdrawal could be conducted over a specified period of time;

a volatile environment exists such that destruction must be performed discretely in order to
avoid triggering hostilities; or

invasion or capture is imminent.
16.3.2 Consideration Factors
Other important factors to consider when planning for potential hostile activity are:

likelihood of the various types of hostile actions and the threats that those actions pose;

availability and adequacy of physical security protection (e.g. perimeter controls, strength of
guard forces, physical defences at locations which hold ACM);

availability of transportation and adequate storage facilities for emergency evacuation and an
assessment of the probable risks associated with emergency evacuation;

availability and adequacy of facilities for emergency destruction of ACM, including approved
destruction devices, electrical power, location, personnel; and

requirement for, and availability of, external communications during emergency situations.
NOTE:
Unless there is an urgent need to restore communications after relocation, key should
be destroyed rather than evacuated.
16.3.3 Protecting Accountable COMSEC Material
There are three options for the control of ACM in an emergency due to hostile activity:

securing ACM;

removing ACM from the scene of the emergency; and

destroying (or disabling) ACM (refer to equipment-specific doctrine).
Planners must consider which of the above options (singly or in combination) are applicable to
particular situations, and to their facilities.
COMSEC Emergency
Protection Planning
March 2014
88
UNCLASSIFIED
ITSD-03A
The option(s) from which to choose in various situations should be clearly stated in the plan. The
following two scenarios are provided as examples:


if it appears that a civil uprising is to be short lived and that the COMSEC facility is to be
only temporarily abandoned, the actions to take could be as follows:
o
ensure that all superseded key has been destroyed;
o
gather up current and future key and take it along if adequate security protection is
available, or destroy it using approved methods;
o
zeroize the key from all keyed operational or on standby equipment;
o
remove all classified and CCI components from cryptographic equipment and lock them,
along with other classified ACM, in approved storage containers;
o
secure the facility door(s) and leave; and
o
upon return, conduct a complete inventory; and
if it appears that the facility is likely to be overrun, the emergency destruction procedures
should be put into effect.
16.3.4 External Communications
External communications during an emergency situation should be limited to contact with a
single remote point. This point will act as a distribution centre for outgoing message traffic and
as a filter for incoming queries and guidance, thus relieving site personnel from multiple
activities during the emergency. When there is a warning of hostile intent and the physical
protection is inadequate to prevent overrun of the facility, secure communications should be
discontinued in time to allow for thorough destruction of all ACM.
16.4 The Emergency Plan
16.4.1 Development
The DCA, in coordination with the COMSEC Custodian, is responsible for the preparation,
implementation and annual re-evaluation of the COMSEC Emergency Plan. Coordination with
appropriate security, fire and safety personnel will ensure that the plan is realistic, workable, and
accomplishes the goals for which it is prepared. The duties under the plan must be clearly
described and the contact information for all individuals with duties under the plan must be
documented. Refer to the COMSEC Emergency Plan Template for an outline of the COMSEC
Emergency Plan, including emergency destruction priorities.
COMSEC Emergency
Protection Planning
March 2014
89
UNCLASSIFIED
ITSD-03A
16.4.2 Maintenance and Testing
The COMSEC Custodian must ensure that:

all individuals are aware of the existence of the plan and how alerts and warnings to an
emergency event will be communicated;

each individual who has duties assigned under the plan receives detailed instructions on how
to carry out these duties when the plan is put into effect;

all individuals are familiar with all duties, so changes in assignment can be made if
necessary;

training exercises are conducted periodically, to ensure that all personnel (especially new
personnel) can carry out their duties; and

the plan is revised (if necessary) based on experience gained in the training exercises.
16.4.3 Emergency Destruction Priorities
16.4.3.1 General
In deteriorating conditions, every reasonable effort should be made to remove ACM, especially
that which is not in use, to a safe place before hostile activities escalate to the point that removal
is impossible. Where loss of positive control of the ACM is imminent, the following
considerations must be entertained:

destruction or erasure of key is preferable to losing positive control of the key;

if unable to destroy every publication, destroy the sensitive pages (i.e. those containing
cryptographic logic); and

zeroize (or tamper) cryptographic equipment (refer to equipment-specific doctrine), remove
their batteries and physically destroy the equipment if no other option is available.
NOTE:
When sufficient personnel and destruction facilities are available, more than one
person destroys the ACM.
16.4.3.2 Combined ACM Priorities
Due to the potentially limited availability of personnel and facilities during an emergency
situation, ACM should be destroyed according to the following priorities:
1.
all key marked CRYPTO, in the following order –
a. superseded key, in descending order of classification or protected level from TOP
SECRET,
COMSEC Emergency
Protection Planning
March 2014
90
UNCLASSIFIED
ITSD-03A
b. currently effective key, in descending order of classification or protected level from TOP
SECRET, and
c. future key, in descending order of classification level from TOP SECRET;
2.
COMSEC publications marked CRYPTO and status documents showing the effective dates
for key;
3.
classified pages from classified maintenance manuals (or the entire manual if classified
pages are not separately identified);
4.
classified and CCI components of classified equipment and CCI;
5.
any remaining classified ACM or other classified material; and
6.
any other COMSEC material.
16.4.4 Emergency Destruction Methods
Any of the methods approved for the routine destruction of classified ACM may be used for
emergency destruction. Physical destruction devices may be available at certain locations outside
Canada. Information concerning these devices is available from COMSEC Client Services. Basic
hand tools should be readily available should they become necessary for destruction of
cryptographic equipment.
16.4.5 Reporting Emergency Destruction
Accurate and timely reporting of emergency destruction is essential in order to evaluate the
severity of an emergency and is second in importance only to ensuring that the ACM is
thoroughly destroyed. A report must be submitted to NCOR/COR as soon as possible. The report
must clearly indicate, for the destroyed ACM, the method(s) of destruction, and the degree of
destruction. This report must also identify any items that were not destroyed and which may be
presumed compromised. In such cases, a COMSEC Incident Report must be submitted, as
detailed in Chapter 18.
COMSEC Emergency
Protection Planning
March 2014
91
UNCLASSIFIED
ITSD-03A
17
COMSEC Account Audit
17.1 Planning the Audit
17.1.1 Purpose of an Audit
A CSE-initiated COMSEC audit provides an independent review of a COMSEC Account’s
records and activities to ensure ACM produced by or entrusted to the COMSEC Account is
controlled and managed as detailed in this directive.
17.1.2 Frequency of Audits
A CSE representative will audit COMSEC Accounts at least once every 18 months. Audits may
be conducted more frequently based on:

previous audit findings;

size of the COMSEC Account inventory;

types and classification of ACM in use;

volume of COMSEC Material Reports;

frequency of deviation from COMSEC directive;

abnormal number of COMSEC Custodian changes; or

type of automated accounting and management system in use at the COMSEC Account.
17.1.3 Scheduling the Audit
CSE will normally provide a three weeks advance notice of the audit. However, the audit may
occur on short notice when irregularities of a serious nature have occurred. The CSE
representative conducting the audit will:

contact the COMSEC Account Custodian (usually via a phone call or e-mail) to schedule the
audit;

confirm the date and time of the audit, in writing; and

provide an audit check list that will be used as a guide during the audit.
17.2 Conducting the Audit
17.2.1 Access to COMSEC Account Holdings
CSE representatives conducting the COMSEC audit are authorized to have supervised access to
all COMSEC Account reports, records and files, including electronic files and databases, upon
presentation of their CSE identification badge and copy of their COMSEC Briefing Certificate.
COMSEC Account Audit
March 2014
92
UNCLASSIFIED
ITSD-03A
NOTE:
The CSE representatives may require supervised access to COMSEC Sub-Account
and Local Element sites. COMSEC Sub-Account and Local Element audits must be
coordinated by the COMSEC Account Custodian (refer to Article 15.4.2).
17.2.2 Scope of the Audit
The audit must be sufficient in scope to determine the accuracy of COMSEC accounting records
and to confirm that ACM control procedures have been, and continue to be, correctly applied.
The audit includes:

verification that accounting reports, records and files are complete and accurate;

verification of compliance with packaging, marking and distribution procedures;

verification of the consistent application of procedures and processes (including physical
security) related to the control, storage and use of ACM;

assessment of the adequacy of automated accounting system controls;

detailed audit of IP accounting records, if applicable;

verification of the completion of COMSEC Sub-Account audits, if applicable; and

discussion with the COMSEC Custodian regarding any problems encountered with the
control of ACM or the maintenance of the COMSEC Account.
17.2.3 Exit Interview
Upon conclusion of the COMSEC Account audit, the CSE representative will hold an exit
interview with the DSO, the DCA (if designated) and the COMSEC Custodian to advise them of
any situations that require immediate corrective action and to brief them on the audit findings and
recommendations.
NOTE:
If neither the DSO nor the DCA is available, the CSE representative will reschedule
the exit interview.
17.3 Audit Reporting
17.3.1 COMSEC Account Audit Report
The COMSEC Account Audit Report will document all observations, recommendations and
required corrective actions. CSE will provide the DCA with a copy of the COMSEC Account
Audit Report within 15 working days of completion of the audit. If corrective actions are
required, a Statement of Action Form will be included with the COMSEC Account Audit Report.
COMSEC Account Audit
March 2014
93
UNCLASSIFIED
ITSD-03A
17.3.2 Statement of Action Form
The COMSEC Custodian must complete the corrective actions stated in the COMSEC Account
Audit Report and return a signed Statement of Action Form identifying observations that
“MUST” be corrected to CSE within ten working days of receipt of the COMSEC Account Audit
Report. If, due to operational requirements, the required corrective actions cannot be completed
before the due date, CSE may grant an extension to this period. Observations that were deemed
to impact the COMSEC Account to a minor degree may be negotiated with COMSEC Client
Services.
17.3.3 Failure to Return a Statement of Action Form
CSE will send a Tracer Notice to the DCA if the signed Statement of Action Form is not received
when due. If a signed Statement of Action Form is not returned to CSE at the end of an additional
ten working days following dispatch of the initial Tracer Notice, a second Tracer Notice will be
sent to the DCA and copy the COMSEC Custodian. After another five working days, following
the second tracer, if the signed Statement of Action Form has not yet been received by CSE, the
matter will be treated as a COMSEC incident and forwarded to the NCIO for action.
17.4 COMSEC Sub-Account Audits
17.4.1 Requirement
The COMSEC Custodian must audit COMSEC Sub-Accounts(s) at least once every 18 months,
using the same considerations and in the same manner as detailed in this chapter.
17.4.2 Communications Security Establishment Participation
Although COMSEC Custodians are normally responsible for conducting audits of their
COMSEC Sub-Accounts, CSE may conduct an audit of a COMSEC Sub-Account, including
Local Elements, when irregularities of a serious nature have occurred.
NOTE:
COMSEC Sub-Account and Local Element irregularities notwithstanding, CSE may
request to collaborate with the COMSEC Account Custodian during routine audits.
COMSEC Account Audit
March 2014
94
UNCLASSIFIED
ITSD-03A
18
COMSEC Incidents
18.1 General
A COMSEC incident occurs whenever there is a situation or activity that jeopardizes the
confidentiality, integrity or availability of COMSEC information, material or services.
Prompt and accurate reporting of COMSEC incidents (e.g. Local Element > Custodian > DCA >
NCIO) minimizes the potential for compromise of ACM and the classified information that it
protects. Unless all personnel who handle or manage ACM immediately report all occurrences
that are specifically identified as COMSEC incidents, corrective action cannot be implemented in
a timely manner to mitigate or eliminate their impact.
It is important that all suspected COMSEC incidents be promptly reported to the responsible
DSO/DCA as detailed in the ITSD-05.
18.2 Classes of COMSEC Incidents
COMSEC Incidents fall into one of two classes: Practices Dangerous to Security (PDS) or
Compromising Incidents.
18.2.1 Practices Dangerous to Security
PDS are incidents that are considered minor violations of administrative requirements and do not
result in the loss of control, unauthorized access or unauthorized viewing of ACM. PDS are
considered administrative infractions and are not reportable at the national level. PDS do not
result in a compromise of information, assets or functionality, but create situations where
exploitation is possible unless action is taken to correct the practice. Even minor violations may
warrant an evaluation. Therefore, PDS must be handled locally by the DSO/DCA in accordance
with departmental directives.
18.2.2 Compromising Incidents
Compromising incidents may have serious consequences for operational security. Investigation
of compromising incidents helps to determine if sensitive records were irretrievably lost by the
rightful owners or accessed by an unauthorized individual. It is important to note that the
compromise of sensitive information or asset(s) may have implications far beyond the local
authorized user or GC department. Compromising incidents are reportable at the national level
(report to COMSEC Custodian, DSO/DCA and NCIO).
18.3 Handling, Reporting and Evaluating COMSEC Incidents
For specific details on how to handle, report and evaluate COMSEC Incidents, follow the
direction in the ITSD-05.
COMSEC Incidents
March 2014
95
UNCLASSIFIED
ITSD-03A
Glossary
This glossary contains definitions for the terms used in this ITSD.
5-Eyes
Canada, Australia, New Zealand, United Kingdom and
United States.
Access
The capability and opportunity to gain knowledge or
possession of, or to alter, information or material.
Access Control
Ensuring authorized access to assets within a facility or
restricted area by screening visitors and material at
entry points by personnel, guards or automated means
and, where required, monitoring their movement within
the facility or restricted access areas by escorting them.
Accountability
The responsibility of an individual for the safeguard
and control of COMSEC material which has been
entrusted to his or her custody.
Accountable COMSEC Material
Communications Security (COMSEC) material that
requires control and accountability within the National
COMSEC Material Control System in accordance with
its accounting legend code and for which transfer or
disclosure could be detrimental to the national security
of Canada.
Accountable COMSEC Material
Control Agreement (ACMCA)
A binding agreement between Communications
Security Establishment and an entity (Government or
Canadian private sector) not listed in Schedules I, I.1,
II, IV and V of the Financial Administration Act that
will permit the acquisition, accounting, control,
management and final disposition of communications
security material.
Accounting Legend Code (ALC)
A numeric code used to indicate the minimum
accounting controls for Communications Security
(COMSEC) material within the National COMSEC
Material Control System.
Glossary
March 2014
96
UNCLASSIFIED
ITSD-03A
Audit
The process of conducting an independent review and
examination of system records and activities in order to
test the adequacy of system controls, to ensure
compliance with established policy and operational
procedures, and to recommend any changes in controls,
policy, or procedures.
Audit Trail
A chronological record of system activities to enable
the construction and examination of a sequence of
events or changes in an event (or both).
Authorized User
For the purpose of this directive, an individual (other
than the Custodian, Alternate Custodian or local
Element), who is required to use COMSEC material in
the performance of assigned duties.
BLACK Key
Encrypted Key.
Canadian Central Facility
The entity within Communications Security
Establishment that provides centralized cryptographic
key management.
Canadian Cryptographic Doctrine
(CCD)
The minimum security standards for the safeguard,
control and use of Communications Security
Establishment–approved cryptographic equipment and
systems.
Canadian Private Sector
Canadian organizations, companies or individuals that
do not fall under the Financial Administration Act or
are not subordinate to a provincial or municipal
government.
Central Office of Record (COR)
The office of a federal department or agency that keeps
records of accountable COMSEC material held by
elements subject to its oversight.
Communications Security
(COMSEC)
The application of cryptographic, transmission,
emission and physical security measures, and
operational practices and controls, to deny unauthorized
access to information derived from telecommunications
and to ensure the authenticity of such
telecommunications.
Compromise
The unauthorized access to, disclosure, destruction,
removal, modification, use or interruption of assets or
information.
Glossary
March 2014
97
UNCLASSIFIED
ITSD-03A
COMSEC Custodian
The individual designated by the departmental
Communications Security (COMSEC) authority to be
responsible for the receipt, storage, access, distribution,
accounting, disposal and destruction of all COMSEC
material that has been charged to the departmental
COMSEC Account.
COMSEC Incident
Any occurrence that jeopardizes or potentially
jeopardizes the security of classified or protected
Government of Canada information while it is being
stored, processed, transmitted or received.
COMSEC Material
An item designed to secure or authenticate
telecommunications information. COMSEC material
includes, but is not limited to, cryptographic key,
equipment, modules, devices, documents, hardware,
firmware or software that embodies or describes
cryptographic logic and other items that perform
COMSEC functions.
Controlled Cryptographic Item
(CCI)
An UNCLASSIFIED secure telecommunications or
information system, or associated cryptographic
component, that is governed by a special set of control
requirements within the National COMSEC Material
Control System and marked “CONTROLLED
CRYPTOGRAPHIC ITEM” or, where space is limited,
“CCI”.
Controlling Authority (CA)
The entity designated to manage the operational use and
control of key assigned to a cryptographic network.
Crypto Material Assistance Centre The entity within Communications Security
Establishment responsible for all aspects of key
(CMAC)
ordering including privilege management, the
management of the National Central Office of Record
and the administration of the Assistance Centre.
Cryptographic
Pertaining to or concerned with cryptography.
NOTE: Often abbreviated as “crypto” and used as a
prefix, e.g. cryptonet.
Cryptographic Equipment
Glossary
Equipment that performs encryption, decryption,
authentication or key generation functions.
March 2014
98
UNCLASSIFIED
ITSD-03A
Cryptographic Logic
The embodiment of one (or more) cryptographic
algorithm(s) along with alarms, checks, and other
processes essential to effective and secure performance
of the cryptographic process(es).
Cryptographic Network
(cryptonet)
Two or more pieces of cryptographic equipment
connected together that utilize cryptographic key for the
protection of information.
Cryptoperiod
A specific length of time during which a cryptographic
key is in effect.
CSE Industrial COMSEC Account The entity at the Communications Security
Establishment responsible for developing,
(CICA)
implementing, maintaining, coordinating and
monitoring a private sector communications security
program that is consistent with the Policy on
Government Security and its related policy instruments
for the management of accountable COMSEC material.
Departmental COMSEC
Authority (DCA)
The individual designated by, and responsible to, the
departmental security officer for developing,
implementing, maintaining, coordinating and
monitoring a departmental communications security
program which is consistent with the Policy on
Government Security and its standards.
Departmental Security Officer
(DSO)
The individual responsible for developing,
implementing, maintaining, coordinating and
monitoring a departmental security program consistent
with the Policy on Government Security and its
standards.
Electronic Key
A key that is stored on magnetic or optical media, or in
electronic memory, transferred by electronic
transmission, or loaded into cryptographic equipment.
Exception
An authorization granted by COMSEC Client Services
for an agreed-upon deviation or divergence from a
specific minimum COMSEC requirement.
Government of Canada (GC)
Department
Any federal department, organization, agency or
institution subject to the Policy on Government
Security.
Glossary
March 2014
99
UNCLASSIFIED
ITSD-03A
Issue
The process of distributing COMSEC material from a
COMSEC Account to its COMSEC Sub-Account(s) or
Local Element(s).
Key Management
The procedures and mechanisms for generating,
disseminating, replacing, storing, archiving, and
destroying cryptographic key.
Key Material Support Plan
(KMSP)
A detailed description of the communication security
requirements of a cryptographic network.
Keyed
Refers to the state of a cryptographic equipment in
which cryptographic key has been loaded for use or
storage.
Keying Material
A key, code, or authentication information in physical,
electronic or magnetic form.
Local Accounting
The process by which a COMSEC Custodian records
and controls, in the National COMSEC Material
Control System, COMSEC material that is not
reportable to the Central Office of Record.
Local Element
An individual registered at a COMSEC Account or
COMSEC Sub-Account who is authorized to receive
COMSEC material from that account.
Local Tracking
The process used by the COMSEC Custodian to control
and monitor the movement of COMSEC-related
material outside of the National COMSEC Material
Control System.
NOTE: This process does not assign an Accounting
Legend Code number.
Locked
Refers to the state of a cryptographic equipment in
which the secure mode has not been accessed (e.g. by
means of a Cryptographic Ignition Key [CIK], a
Personal Identification Number [PIN] or a combination
of CIK/PIN and password).
Modification
Any change to the electrical, mechanical or software
characteristics of a piece of cryptographic equipment.
National Central Office of Record
(NCOR)
The entity at Communications Security Establishment
responsible for overseeing the management and
accounting of all accountable COMSEC material
produced in, or entrusted to, Canada.
Glossary
March 2014
100
UNCLASSIFIED
ITSD-03A
National COMSEC Audit Team
(NCAT)
The entity at Communications Security Establishment
responsible for conducting COMSEC audits of
COMSEC Accounts within the National COMSEC
Material Control System.
National COMSEC Incidents
Office (NCIO)
The entity at Communications Security Establishment
responsible for managing communications security
incidents through registration, investigation,
assessment, evaluation and closure.
National COMSEC Material
Control System (NCMCS)
A centralized system, which includes personnel,
training and procedures, that enables Government of
Canada departments to effectively control and handle
accountable COMSEC material.
National Distribution Authority
(NDA)
The entity within the Canadian Communications
Security (COMSEC) community responsible for the
secure receipt, storage, distribution and disposal of
COMSEC material originating at Communications
Security Establishment or received from or destined to
foreign countries.
Other Levels of Government
(OLG)
Provincial, municipal and local government
organizations (e.g. law enforcement agencies).
Over-The-Air Rekey (OTAR)
The changing of traffic encryption key or transmission
security key in remote cryptographic equipment by
sending new key directly to the equipment over the
communication path it secures.
Over-The-Air Transfer (OTAT)
The electronic distribution of cryptographic key without
changing the traffic encryption key used to secure the
communications path.
Protective Packaging
Packaging techniques for COMSEC material, which
discourage penetration, reveal that a penetration has
occurred, or inhibit viewing and copying of COMSEC
material, before the time it is exposed for use.
RED Key
Unencrypted key.
Removable Storage Medium
(RSM)
A small device that is used to transport or store data
(e.g. disks, memory cards, flash drives).
Glossary
March 2014
101
UNCLASSIFIED
ITSD-03A
Tier 3 Management Device
(T3MD)
A cryptographic equipment that securely stores,
transports and transfers (electronically) cryptographic
key and that is programmable to support modern
mission systems.
Transfer
The process of distributing COMSEC material from
one COMSEC Account to another COMSEC Account.
Two-Person Integrity (TPI)
A control procedure whereby TOP SECRET key and
other specified key must not be handled by or made
available to one individual only.
Unkeyed
Refers to the state of a cryptographic equipment in
which no cryptographic key has been loaded for use or
storage.
Unlocked
Refers to the state of a cryptographic equipment in
which the secure mode has been accessed (e.g. by
means of a Cryptographic Ignition Key [CIK], a
Personal Identification Number [PIN] or a combination
of CIK/PIN and password).
Waiver
An authorization granted by COMSEC Client Services
to be excluded from the obligation of adherence to a
specific minimum COMSEC requirement.
Glossary
March 2014
102
UNCLASSIFIED
ITSD-03A
Bibliography
The following source documents were used in the development of this directive:




Communications Security Establishment
o
Canadian Cryptographic Doctrine for the Disposal of Accountable COMSEC
Equipment (CCD-49), February 2008 (now superseded by this ITSD).
o
Clearing and Declassifying Electronic Data Storage Devices (ITSG-06), July 2006.
o
Directive for Reporting and Evaluating COMSEC Incidents Involving Accountable
COMSEC Material (ITSD-05), April 2012.
o
Directive for the Control of COMSEC Material in the Canadian Private Industry
(ITSD-06), June 2013.
o
Directive for the Control of COMSEC Material in the Government of Canada
(ITSD-03), October 2011 (now superseded by this ITSD).
o
Directive for the Use of CSE-Approved Cryptographic Equipment and Key on a
Telecommunications Network (ITSD-04), November 2011.
o
Government of Canada Facility Evaluation Procedures (ITSG-12), June 2005.
o
IT Security Directive for the Application of Communications Security Using
CSE-Approved Solutions (ITSD-01A), December 2013.
o
IT Security Guidance on Cryptographic Key Ordering Manual (ITSG-13), May 2006.
Department of Justice
o
Controlled Goods Regulations, May 20, 2013 (updated as of November 8, 2013).
o
Financial Administration Act (FAA), 1985 (updated as of November 22, 2013).
North Atlantic Treaty Organization
o
Instructions for the Control and Safeguard of NATO Cryptomaterial (SDIP 293).
o
NATO Crypto Distribution and Accounting Publication (AMSG 505).
o
Policy and Procedures for the Handling and Control of Two-Person-Controlled NATO
Security Material (AMSG 773).
Public Works and Government Services Canada
o
Industrial Security Manual (ISM), December 11, 2009.
Bibliography
March 2014
103
UNCLASSIFIED
ITSD-03A




Royal Canadian Mounted Police
o
Guide to the Application of Physical Security Zones (G1-026), September 2005.
o
Security Equipment Guide (G1-001), March 2006.
Treasury Board of Canada Secretariat
o
Directive on Departmental Security Management (DDSM), July 2009.
o
Operational Security Standard: Management of Information Technology Security
(MITS), July 1, 2009.
o
Operational Security Standard on Physical Security, February 18, 2013.
o
Policy on Government Security (PGS), updated as of July 2009.
United Kingdom
o
Communications Security and Cryptography (IS-4) – Part 1: Management of
Cryptographic Systems.
o
Communications Security and Cryptography (IS-4) – Part 2: Forms and Instructions.
United States
o
Control of Communications Security (COMSEC) Material (NSA/CSS Policy Manual
No. 3 -16), National Security Agency (NSA).
o
International Traffic in Arms Regulations (ITAR), U.S. Department of State,
April 1, 2012.
Bibliography
March 2014
104
UNCLASSIFIED
ITSD-03A
Annex A - Managing and Distributing Key in a BLACK State
A.1
Accounting and Handling Principles
There are three distinct accounting and handling principles for distributing key in a BLACK
(encrypted) state:
1. Any key that must be accountable within the National COMSEC Material Control System
(NCMCS) remains accountable regardless of whether the actual key is in its original RED
(unencrypted) state, or it has been converted to a BLACK (encrypted) state. The requirement
for a key’s continuous accountability within the NCMCS remains until it is destroyed (e.g.
zeroized, filled into an End Cryptographic Unit [ECU]) and removed from COMSEC
accountability by a custodian through a Destruction Report.
2. A key in a BLACK state is treated as PROTECTED A and is NOT separately accountable
within the NCMCS because the original key remains accountable. However, a key that is in a
BLACK state should be tracked locally, outside of the NCMCS, to have assurance of
delivery.
3. If Removable Storage Media (RSM) are used in the transfer of the key in BLACK state, some
of the media may become separately accountable inside the NCMCS (refer to Appendix
A.A.1.3).
A.1.1
Accounting Concept
Figure 3 illustrates the accountability concept for a key in a BLACK state.
A Transfer Key Encryption Key (TrKEK) or Key Encryption Key (KEK) is used to convert a key
in a RED state into a key in a BLACK state. The identical TrKEK or KEK is used to reconvert
the key in a BLACK state back to a key in a RED state.
Annex A – Managing and Distributing
Key in a BLACK State
March 2014
A-1
UNCLASSIFIED
ITSD-03A
Not
NCMCS
Accountable
NCMCS
Accountable
Transfer Key
1
in a BLACK State
RSM-B (only for Method 4)
RSM-A, T3MD, LCMS
Key converted in a
BLACK State
Convert
Key in a
RED State
Transfer Key
Accountability
(Transfer Report
Initiating [TRI], Transfer
Report Receipt [TRR],
GC-223)
Key reconverted
in a BLACK State
ReConvert
Key in a
RED State
NCMCS
NCMCS
Accountable Key
Accountable
Key
Figure 3 – Accountability Concept for Key in a BLACK State1
A.1.2
Network Transmission
A key in a BLACK state may be transmitted over any:

classified network

Government of Canada departmental network that has been accredited to protect
PROTECTED A or PROTECTED B information, or

public network (e.g. the Internet), as long as it is protected minimally with Public Key
Infrastructure (PKI) encryption or Hypertext Transfer Protocol Secure (https) encrypted
connection.
Source Device
Destination Device
1 This process is further detailed in Appendix A – Key Distribution Methods.
Annex A – Managing and Distributing
Key in a BLACK State
March 2014
A-2
UNCLASSIFIED
ITSD-03A
A.1.3
Physical Shipment

A key in a BLACK state may be transported using the physical shipment of RSM or a Tier 3
Management Device (T3MD).

The initial RSM (refer to RSM-A in Appendix A) containing a key in a BLACK state must
be transported using CSE-approved methods for shipment of ACM, as detailed in this
directive.

A subsequent RSM (refer to RSM-B in Appendix A) containing a key in a BLACK state may
be transported via any means authorized to safeguard physical shipment of PROTECTED A
or higher information.
The associated RED decryption TrKEK or KEK must be transported separately to the end user
using CSE-approved methods for shipment of ACM.
Annex A – Managing and Distributing
Key in a BLACK State
March 2014
A-3
UNCLASSIFIED
ITSD-03A
Appendix A – Key Distribution Methods
A.A.1
Key Distribution Methods
As illustrated in Figure 4, there are four methods of distributing an Electronic Key Management
System/Classified Security Management Infrastructure (EKMS/CSMI) produced key in a
BLACK state:

Method 1 - Over the EKMS/CSMI classified network.

Method 2 - Using T3MDs.

Method 3 - Using an RSM to devices of equal or higher classification (e.g. SECRET to
SECRET, or SECRET to TOP SECRET).

Method 4 - Using an RSM over UNCLASSIFIED public networks or over PROTECTED A
or PROTECTED B departmental networks.
Source
Device
BLACK Key
Method 1
Destination Device #1
(SECRET)
EKMS/CSMI
e.g. LCMS
BLACK Key
Canadian
Central
Facility
(CCF),
LCMS
or
CSMI
Workstation
Method 2
e.g. CARDS
BLACK Key
RSM-A
(SECRET)
ALC 4
Method 3
(new)
Destination Device #3
(SECRET or
TOP SECRET)
e.g. CARDS
BLACK Key
(SECRET)
Destination Device #2
(PROTECTED A
or higher)
Method 4
(new)
RSM-A
(SECRET)
ALC 4
File Transfer
Standalone
PC
(SECRET)
BLACK Key
RSM-B
(PROTECTED A)
Destination Device #4
(PROTECTED A
or higher)
e.g. Department Network
Figure 4 – Key Distribution Methods for Key in a BLACK State
A.A.1.1
Method 1 – Distributing EKMS/CSMI-Produced Key in a BLACK State
over the EKMS/CSMI Classified Network
Using LCMS, a key in a BLACK state can be distributed directly between an EKMS/CSMI
source to an EKMS/CSMI destination by using LCMS’ electronic key distribution functions
(e.g. Bulk Encrypted Transaction [BET]).
Appendix A – Key Distribution Methods
March 2014
A-4
UNCLASSIFIED
ITSD-03A
A.A.1.2
Method 2 – Distributing EKMS/CSMI-Produced Key in a BLACK State
using a T3MD
A key in a BLACK state can be removed from the EKMS/CSMI source onto a T3MD for
distribution. The T3MD can then be physically transported to the end destination or the key can
be sent to another T3MD at a distant location via Over-the-Air Distribution (OTAD). Additional
direction can be found in equipment-specific doctrine.
A.A.1.3
Method 3 – Distributing EKMS/CSMI-Produced Key in a BLACK State
using RSM to Devices of Equal or Higher Classification (e.g. SECRET
to SECRET, or SECRET to TOP SECRET)
Using Common User Application Software (CUAS), a key in a BLACK state can be removed
from the EKMS/CSMI source onto an RSM, which can be used to distribute the key in a BLACK
state electronically over a classified (SECRET or higher) system or, the RSM with the BLACK
key can be physically transported to an end destination, as detailed in this directive.
NOTE:
An RSM (RSM-A in Figure 4) that has been loaded with key via EKMS or CSMI
requires special handling: the RSM that is connected to an EKMS or CSMI terminal
must be assigned a unique short title, be classified SECRET and be handled as
ALC 4.
The key in a BLACK state resident on the RSM remains PROTECTED A. Once the
key in a BLACK state is removed from the RSM, the RSM must still be handled as
SECRET, ALC 4, and may be reused only within EKMS/CSMI or destroyed as
detailed in this directive and in ITSG-06.
A.A.1.4
Method 4 – Distributing a Key in a BLACK State using RSM over
UNCLASSIFIED Public Networks or over PROTECTED A or
PROTECTED B Departmental Networks
Using CUAS and an appropriate transfer procedure, key in a BLACK state can be transported via
RSM to UNCLASSIFIED public networks or protected departmental networks for further
electronic distribution. This procedure must be done utilizing a departmental approved File
Transfer Sanitization and Inspection application on a standalone UNCLASSIFIED PC to transfer
the key in a BLACK state from the initial RSM (RSM-A in Figure 4) onto another clean RSM
(RSM-B in Figure 4). Once Method 4 has been initiated, the stand-alone Personal Computer (PC)
will be SECRET until such time as it is downgraded (refer to ITSG-06).
NOTE 1: The RSM (RSM-A in Figure 4) must be handled as detailed in Article A.A.1.3 .
NOTE 2: The second RSM (RSM-B in Figure 4) will become PROTECTED A and will NOT
be accountable within NCMCS; however, it must be sanitized (refer to ITSG-06) after
the key in a BLACK state is removed from the RSM.
Appendix A – Key Distribution Methods
March 2014
A-5
UNCLASSIFIED
ITSD-03A
Appendix B – Requirements for Key in a RED, BLACK or
Benign Fill States
This appendix defines the distinct requirements for key in a RED state, a BLACK state and a
Benign Fill state.
A.B.1
RED, BLACK or Benign Fill Key States
Before key is filled into an ECU, it is either in transit or in storage. Table 4 below describes the
three possible states in which key can exist while it is in transit or in storage.
Table 4 – Key States
Key States During Transit or Storage
RED State
BLACK State
 Unencrypted key; OR
Definition
 Encrypted key that
has a decryption
mechanism that is not
protected enough to
meet the definition of
a key in a BLACK
state.
Appendix B – Requirements for Key
in a RED, BLACK or Benign Fill States
 Key that has been
protected with
CSE-approved
encryption; AND
 Has a decryption
mechanism (refer to
NOTE 1) that is:
o
protected with
appropriate
safeguards, and
o
stored and
transmitted
separately from the
encrypted key.
March 2014
Benign Fill State
 Key that has been
encrypted at the
point of
generation such
that it can only be
decrypted after
being filled into
the ECU.
A-6
UNCLASSIFIED
ITSD-03A
Key States During Transit or Storage
RED State
Examples
BLACK State
 TrKEK or KEK used
 BET.
to convert a key from a
 TrKEK-encrypted key or
RED state to a
key package.
BLACK state, or from
 KEK-encrypted key or
a BLACK state to
key package.
RED state (refer to
NOTE 1).
Benign Fill State
 SCIP Rekey.
 KP Rekey.
 Key in a T3MD with
the CIK/password
accessible.
Can be converted to
BLACK state.
Can be reconverted to RED
state.
None. Benign Fill
key state cannot be
changed.
ITSD-03A is not applicable.
ITSD-03A is not
applicable.
Accounting
A key in a RED state is
always considered to
logically exist, even after
conversion to BLACK
state, and therefore must
follow this directive’s
requirements for ACM
until the key no longer
exists in either BLACK
state or RED state.
Handling
Classification
Equal to the highest
classification of the
communication that the
key is authorized to
protect.
Possible
Key State
Transitions
Appendix B – Requirements for Key
in a RED, BLACK or Benign Fill States
Should be tracked outside of
NCMCS to have assurance
Should be tracked
of delivery.
outside of NCMCS
to have assurance of
delivery.
PROTECTED A
March 2014
A-7
UNCLASSIFIED
ITSD-03A
Key States During Transit or Storage
RED State
Must not be transmitted
over a network.
(refer to NOTE 2)
Network
Transmission
Physical
Shipment
Must follow this
directive’s requirements
for physical shipment of
RED key.
BLACK State
Benign Fill State
May be transmitted over any network authorized to
protect PROTECTED A or higher information. For
example:
 Public Switched Telephone Network (PSTN)
protected with SCIP;

Internet-protected with PKI or https; and

protected or classified department networks.
May be transported via any means authorized to
safeguard physical shipment of PROTECTED A or
higher information.
NOTE 1: The decryption mechanism for a key in a BLACK state is a TrKEK or KEK key in a
RED state, which has a handling classification equal to that of the key being protected
before it is encrypted with the TrKEK or KEK.
NOTE 2: Except where necessary for emergency operations, a key in a RED state must be
converted to a BLACK state before transmission over a network.
Appendix B – Requirements for Key
in a RED, BLACK or Benign Fill States
March 2014
A-8
UNCLASSIFIED
ITSD-03A
Appendix C – Foreign Produced BLACK Key
The distribution concepts and methods defined in Appendix A.A.1.3 apply equally to both
Canadian produced key and key produced by a foreign country. Following are two examples to
assist in understanding how to handle foreign produced key.
Example 1 – A U.S.-produced Identification Friend or Foe (IFF) Mode 4/5 key in a RED
state is converted in the U.S. to a key in a BLACK state using a KEK.

Upon receipt in a Canadian COMSEC Account, an IFF Mode 4/5 key in a BLACK state is
treated as PROTECTED A, non-accountable, COMSEC material. It is transferred as
described in Article A.1 and Appendix A until it is used in a benign-like fill application
directly into the ECU.

The decryption KEK is shipped separately and loaded into the ECU.
Example 2 – A U.S.-produced Advanced Extremely High Frequency (AEHF) key in a
BLACK state is distributed to Canada via Over-the-Air Rekey (OTAR) or OTAD.

During OTAD operations, the key in a BLACK state is sent to a T3MD (e.g. SKL) and is
treated as PROTECTED A, non-accountable, COMSEC material and is transferred as
described in Article A.1 until it is directly filled into AEHF Secure Mobile Anti-Jam Reliable
Tactical Terminals (SMART-T) or transferred to a CD-ROM, which is used to fill AEHF
Navy Multi-band Terminals (NMTs).

OTAR operations directly fill the ECU.
Appendix C – Foreign Produced
BLACK Key
March 2014
A-9