For use of this form, see TB ; the proponent agency is CSLA. 1. SHORT TITLE. 2. REG/EDIT. 3. SEC CLASS. 4. SERIAL NUMBER. 5. EFFECTIVE DATE. item accounting, and transaction reporting are contained in Department of the Army (DA) Pamphlet (Pam) , Technical Bulletin (TB) , AR , . TB series, Procedures for Safeguarding, Accounting and Supply Control of COMSEC. Material, contains procedures used to account for COMSEC.
|Published (Last):||12 December 2007|
|PDF File Size:||3.75 Mb|
|ePub File Size:||15.73 Mb|
|Price:||Free* [*Free Regsitration Required]|
Enclosing facility diagrams is not recommended because of classification requirements. DA Form is filled out and sent out according to TBchapter 2. WorldCat is the world’s largest library catalog, helping you find library materials online.
Your request to send this item has been completed. The name field is required.
Security, procedures for safeguarding, accounting and supply control of COMSEC material.
The following publications are available or are on requisition: Units to be inspected will use this guidance to prepare for inspections. Advanced Search Find a Library. Excess material and shortages are reported for corrective action through command channels TBpara 3. Department of the Army.
Hand-receipt holders will maintain only forms that are appropriate to their operations. An SOP provides for secure and efficient conduct of COMSEC operations to include accounting, courier procedures, destruction, maintenance, and physical security incident reporting. The message or memorandum amendment file number is: The E-mail Address es you entered is are not in a valid format.
Emergency procedures are exact for the destruction of keying material. Sensitive pages of COMSEC cryptographic operational maintenance manuals KAM are prepared for quick removal where required, and personnel are familiar with the emergency implementing procedures TBchap 5. The bt types of destruction methods and devices are covered in TBchapter 5.
COMSEC custodians will document emergency-plan dry-runs by giving the 3880-41 of training, the portion of plan to be tested for example, evacuation, destruction, secure storagethe training results, and the names of participating personnel and witnesses.
Remember me on this computer. Write a review Rate this item: Plan task cards are correct 380-4 prioritized. The E-mail Address es field is required. You may send this item to up to five recipients. Cancel Forgot your password? Supervisory personnel are aware of the requirements for technical surveillance countermeasure TSCM services AR Add a review and share your thoughts with other readers.
Installation and operation of electronic, access-control devices cipher locks meet the requirements in TBchapter 5.
The number of editions and the quantity of each key held are no more than the minimum required TBchap 3. The request message or memorandum will be classified Secret according to AR Destruction records must be checked. Amendments should be posted within 48 hours 2 workdays of receipt, in sequence, and page-checked after posting. The emergency plan procedures provide for the immediate destruction of superseded key, according to TBchapter 5.
Government-owned tape recorders, radios, television receivers, and cameras are required for 380-4 operations or are fb by the commander as mission essential TBpara 5. Users are aware of the requirement to report all circumstances, occurrences, yb acts that could lead to a compromise of key, directly to the appropriate CONAUTH TBchap 5.
Don’t have an account? When not installed in an operational configuration, classified cryptoequipment and components are securely stored TBchap 5. Containers must not yb damaged for example, drilled. Reviews User-contributed reviews Add a review and share your thoughts with other readers.
Please enter recipient e-mail address es. If double cut shredders are used to destroy paper, the material is considered destroyed if CHAD residue is not more than 1. The plan is coordinated with the command emergency plan to ensure evacuation, storage, and destruction of key will be effectively and securely performed in the event of an actual emergency TBchap 5, and app D. You may have already requested this item. Preview this item Preview this item. The plan must 380-14 signed by the commander and contain the required provisions of TB Citations are based on reference standards.
Combinations are changed every 3 months.
Locks must function properly and containers that are modified for two locks must meet the prescribed specifications of USAREUR Regulationparagraph 7e. Tbb accounts require both an internal and an external SOP.
The E-mail message field is required. You already recently rated this item.