SECTION VII
SURVEILLANCE
24. COMSEC INCIDENT REPORTING
COMSEC custodians will report COMSEC incidents according to AR 380-40, TB 380-41, USAREUR Regulation 380-40, and this pamphlet.
a. COMSEC incidents unique to STU-IIIs will be reported according to DA Pamphlet 25-16 and DA Pamphlet 25-380-2. The format for the report is in this pamphlet, appendix I. STU-III-incident messages will be addressed to DIRNSACCSLA FT HUACHUCA AZ//SELCL-KP-IN// and the CONAUTH (if key is involved) for action. DIRNSA FT GEORGE G. MEADE MD//V51A/S213/Y183// will be listed as an information addressee along with other info addressees listed in USAREUR Regulation 380-40, paragraph 10.
b. CCI incidents for keyed and unkeyed CCI will be processed according to USAREUR Regulation 380-40, paragraph 10d.
c. COMSEC incidents involving NATO material will be reported according to applicable Allied Command, Europe (ACE), directives.
d. COMSEC incidents involving both NATO material and U.S. material will be reported separately according to ACE directives and this pamphlet, appendix I.
e. COMSEC incidents involving positive-controlled material will be reported to USCINCEUR, VAIHINGEN, GE//ECJ36(PMCT)// according to CJCSI-3260.01.
25. ROUTING OF REPORTS
NOTE: While all violations of AR 380-40 are serious incidents and may jeopardize the integrity of the COMSEC material involved, not all violations need to be assigned a COMSEC-incident case-number from the USACCSLA.
26. REPORT PRECEDENCE AND TIMELINESS
a. Message precedence for addressees and report-submission times are in AR 380-40.
b. COMSEC incident reports will not be sent to a higher headquarters for evaluation before the incident is reported to the appropriate addressees in USAREUR Regulation 380-40 and this pamphlet, appendix I. Incorrect routing delays evaluation and may damage the COMSEC capability of the cryptonet.
27. SIGNAL OPERATION INSTRUCTIONS
Incidents involving signal operating instructions (SOI ) material will be reported according to AR 380-5 as a loss-of-classified information.
NOTE: Once SOI material containing either ALC 3 or category-2 ALC 4 has been permanently issued to a user (hand-receipt holder), the COMSEC custodian is no longer accountable or responsible for the SOI material. Custodians will not issue or hand-receipt SOIs to themselves.
28. ASSESSMENTS, EVALUATIONS, AND INVESTIGATIONS
a. USAREUR commanders will examine reportable COMSEC incidents to determine the likelihood of foreign intelligence service (FIS) involvement (AR 380-40 and TB 380-41).
(1) If FIS involvement is not suspected, it will be reported as a COMSEC incident as prescribed in this pamphlet, appendix I.
(2) Any evidence, indication, or suspicion of FIS involvement must be reported according to AR 381-12, as a Subversion and Espionage Directed Against the U.S. Army (SAEDA) incident.
b. Reported COMSEC incidents will be examined by the USAREUR subcontrol office (SCO) (66th Military Intelligence Group (66th MI GP) (IAPG-SAS)) for indicators of FIS involvement. The USAREUR SCO will-
(1) Task the appropriate counterintelligence unit with action if FIS involvement is detected or suspected.
(2) Examine each SAEDA report involving COMSEC key. When appropriate, the SCO will pass information to the cryptonet CONAUTH through the Deputy Chief of Staff, Intelligence (DCSINT), HQ USAREUR/7A. The SCO will make the decision on supersession of the key.
c. A preliminary inquiry will be conducted according to AR 380-5 to determine the circumstances in a COMSEC incident. A COMSEC incident (for example, loss, theft, sabotage, espionage) may require a formal investigation according to the provisions of AR 15-6.
29. EVALUATING COMSEC INCIDENTS
CONAUTHs will evaluate COMSEC incidents according to AR 380-40.
SECTION VIII
CONTROLLED CRYPTOGRAPHIC ITEMS
30. GENERAL
Although the PBO maintains property accountability records for a CCI, once issued on a hand-receipt, accountability of the CCI becomes the responsibility of the user to provide security control and accountability through monthly inventory. A CCI will be controlled according to AR 380-40, DA Pamphlet 25-16, and DA Pamphlet 25-380-2. A CCI is sensitive and will be protected for the same reasons other unclassified but sensitive equipment (such as, night vision devices, weapons, M1 tank technology) is protected.
31. CCI REFERENCES
a. DA Pamphlet 25-16 prescribes security procedures for the STU-III.
b. DA Pamphlet 25-380-2 prescribes security procedures for CCIs.
c. The unit supply update (AR 710-2 series of regulations and DA pamphlets) provides policy on supply operations below the wholesale level, including CCIs in the standard logistic system.
d. AR 710-3 establishes policy and assigns responsibilities for operation and maintenance of DA asset-and-transaction reporting systems (including serial-number reporting of DOD CCIs).
32. CCI INCIDENT REPORTING
USAREUR Regulation 380-40 and this pamphlet gives guidance for reporting CCI incidents in USAREUR.
33. EXCEPTIONS
Requests for exception to DA policy on CCIs will be sent through command channels to the Commander, USAREUR/7A, ATTN: AEAGB-CI-S, Unit 29351, APO AE 09014.
34. STU-III INSTALLATION IN PRIVATE RESIDENCES
a. The DCSINT is the only approval authority in USAREUR for STU-III installation in private residences.
b. Requests for STU-III installation in a private residence will follow the guidance in USAREUR Regulation 380-40, paragraph 11 and appendix B.
35. FOREIGN ACCESS
Access to a keyed CCI will follow the guidance in USAREUR Regulation 380-40, paragraph 12.
SECTION IX
DEPARTMENT OF THE ARMY CRYPTOGRAPHIC ACCESS PROGRAM
36. QUALIFYING POSITIONS AND UNITS
Guidance for the Department of the Army Cryptographic Access Program (DACAP) in USAREUR is in AR 380-40, USAREUR Regulation 380-40, and this pamphlet.
a. Commanders will ensure that, if selected, personnel in qualified positions (those who require access according to AR 380-40) are briefed and debriefed, have signed briefing and termination certificates, and are available for a counter-intelligence scope polygraph.
b. USAREUR units qualified under provisions of AR 380-40 will appoint a DACAP point of contact (POC).
37. REPORTING CHANGES TO DATABASE
The DACAP POC will report changes in the DACAP database according to AR 380-40 and USAREUR Regulation 380-40, paragraph 13.
APPENDIX A
REFERENCES
A-1. CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION (CJCSI)
(S) CJCSI 3260.01, Policy and Procedures Governing the Authentication and Safeguarding of Nuclear Control Orders (U)
A-2. ARMY REGULATIONS (ARs)
AR 15-6, Procedures for Investigating Officers and Boards of Officers
AR 25-12, Communications Security Equipment Maintenance and Maintenance Training
AR 25-55, The Department of the Army Freedom of Information Act Program
AR 25-400-2, The Modern Army Recordkeeping System (MARKS)
AR 105-64, US Army Communications-Electronics Operation Instructions Program
AR 190-13, The Army Physical Security Program
AR 190-14, Carrying of Firearms and Use of Force for Law Enforcement and Security Duties
AR 380-5 and USAREUR Supplement 1, Department of the Army Information Security Program
AR 380-40, Policy for Safeguarding and Controlling Communications Security (COMSEC) Material
AR 380-53, Communications Security Monitoring
AR 381-12, Subversion and Espionage Directed Against the U.S. Army (SAEDA)
AR 381-14, (S) Technical Surveillance Countermeasures (TSCM) (U)
AR 710-2, Inventory Management Supply Policy Below the Wholesale Level
AR 710-3, Asset Transaction Reporting System
A-3. DEPARTMENT OF THE ARMY (DA) PAMPHLETS
DA Pamphlet 25-16, Security Procedures for the Secure Telephone Unit, Third Generation (STU-III)
DA Pamphlet 25-380-2, Security Procedures for Controlled Cryptographic Items
A-4. TECHNICAL BULLETINS (TBs)
TB 43-0001-06 series, Equipment Improvement Report and Maintenance Digest for Communications Security Equipment
TB 380-40, (C) Key Variable Management and Cryptosetting for Electronically Keyed COMSEC Systems (U)
TB 380-41, Procedures for Safeguarding, Accounting, and Supply Control of COMSEC Material
A-5. ALLIED COMMAND, EUROPE (ACE), DIRECTIVE
ACE Directive 90-9, Procedures for Safeguarding and Request of COMSEC Material
A-6. UNITED STATES ARMY, EUROPE (USAREUR), PUBLICATIONS
USAREUR Regulation 190-13, The USAREUR Physical Security Program
USAREUR Regulation 380-40, Safeguarding and Controlling Communications Security Material
USAREUR Regulation 380-85, Counterintelligence Services
A-7. NONCRYPTOGRAPHIC OPERATIONAL GENERAL (NAG) PUBLICATION
NAG 16D, Field Generation and Over-the-Air-Distribution of COMSEC Key in Support of Tactical Operations and Exercises
APPENDIX B
ACCLAIMS INSTRUCTIONS
Army Communications Security Commodity Logistics Accounting Information Management System (ACCLAIMS) Level IV is designed to provide automated data-processing support for Communications Security (COMSEC) account custodians. The system parallels the standard automated accounting and reporting procedures as prescribed by TB 380-41 for all levels within the U.S. Army. The information in this appendix gives specific key-stroke instructions for using the ACCLAIMS system.
B-1. HOW TO PLACE MATERIAL IN THE ACCOUNT
The COMSEC custodian will--
a. From the main menu, press F2, ASSETS.
b. From the submenu, press F1, RECEIPTS.
(1) For regular software (Secret and below), press F1, RECEIPT OF SOFTWARE (KEYS).
(2) For Top Secret (TS) two-person integrity (TPI) material, press F4, RECEIPT OF TPI MATERIAL.
(3) For hardware (equipment), press F3, RECEIPT OF HARDWARE.
c. Enter the account number, the date, and the serial number from the SF 153 (COMSEC Material Report) in the appropriate fields, press F1.
d. Enter the short title, the edition, the quantity, the beginning serial number in the appropriate fields, and the accounting legend code (ALC) (location is optional), press F1. Repeat this for every short title listed on the SF 153.
NOTE: If TPI material is listed on an SF 153 with Secret and below material, the TPI material must be entered separately under the RECEIPT OF TPI MATERIAL section.
e. Ensure there are two signatures on the voucher (SF 153) with TPI material.
f. Ensure "Date of Transaction" block on the SF 153 is filled in.
g. File a copy of the SF 153 in an Incoming Voucher File. Return the original to sender and send a copy to the Army COMSEC Central Office of Record (ACCOR) to the United States Army Communications-Electronics Command, Communications Security Logistics Activity (USACCSLA) (SELCL-KP-OR).
B-2. HOW TO ISSUE MATERIAL TO A HAND- RECEIPT HOLDER
The COMSEC custodian will--
a. From the main menu, press F2, ASSETS.
b. From the submenu, press F2, ISSUES/ TRANSFERS.
c. From the sub-submenu, press F1, ISSUE TO A HAND RECEIPT HOLDER.
d. Enter the hand-receipt holder number, the short title, the edition, the serial or register number (see note on screen), and the quantity in the appropriate fields.
e. Enter the letter "Y" in the ALC 4 "drop box" (on screen) for ALC 3 and ALC 4 material. This action will delete these items from the account after the SF 153 is acknowledged. Leave this block blank for ALC 1 and ALC 2 material.
f. Press F1. Repeat the steps in d and e for each short title or edition on the hand-receipt.
g. When all entries are made, press ESC/F10 to return to sub-submenu.
h. Press F4, PRINT SF 153 FORM.
i. Press F1 to begin printing.
j. After the SF 153 is printed and signed, press F2, ASSETS, from the main menu.
k. Press F4, ACKNOWLEDGMENT, from the submenu.
l. Press F2, SUB ACCOUNT/HRH ACKNOWLEDG-MENT.
m. Enter the hand-receipt number and the voucher number of the hand-receipt, press F1.
n. Initial the SF 153 and write "ACK" (acknowledgment) on the form after NOTHING FOLLOWS. This entry verifies to account personnel that the hand-receipt is acknowledged and identifies who made the acknowledgment.
o. If the hand-receipt will be for ALC 1 or ALC 2 material, file the SF 153 in a reportable voucher file. If the material is ALC 3 or ALC 4, file the form in a nonreportable voucher file.
NOTE: Check hand-receipt holder files to ensure that they have an authorization memorandum, a briefing statement, and a certification of security clearance, before hand-receipting material.
B-3. HOW TO TRANSFER MATERIAL TO ANOTHER ACCOUNT
The COMSEC custodian will--
a. From the main menu, press F2, ASSETS.
b. From the submenu, press F2, ISSUES/TRANSFERS.
c. From the sub-submenu, press F2, TRANSFER TO ACCOUNT.
d. Enter the receiving account number for the transferring account material in the appropriate fields. Include the short title, the edition, the serial number, and the quantity of material being transferred (see note on screen), press F1. Repeat these steps for each item listed on the transfer.
e. Press ESC/F10 to return to the sub-submenu.
f. Press F4, PRINT SF 153 FORMS.
g. Press F1 to begin printing.
h. After the SF 153 is signed, press F2, ASSETS, from the main menu.
i. Press F4, ACKNOWLEDGMENT, from the submenu.
j. Press F1, ACCOUNT ACKNOWLEDGMENT.
k. Enter the receiving account number and the voucher number from the SF 153 in the appropriate fields, press F1.
l. Initial the SF 153 and write "ACK" on the form after NOTHING FOLLOWS. This entry verifies to the account personnel that the hand-receipt is acknowledged and shows who made the acknowledgment.
m. If the transferred material will be ALC 1 or ALC 2 material, file the SF 153 in a reportable voucher file. If the transferred material will be ALC 3 or ALC 4, file the form in a nonreportable voucher file.
NOTE: Keep the suspense copy of the SF 153 until the signed original is returned.
B-4. HOW TO FLAG MATERIAL FOR LOCAL DESTRUCTION (OTHER THAN STU-III-KEY)
The COMSEC custodian will-
a. From the main menu, press F2, ASSETS.
b. From submenu, press F6, DESTRUCTION.
c. From the sub-submenu, press F3, MATERIAL FOR DESTRUCTION BY PARENT ACCOUNT.
d. Press F2, ALL OTHER SOFTWARE.
e. Enter the short title and the edition to be destroyed, press F1. Repeat this step for all material to be destroyed.
f. Press ESC/F10 after all material is entered.
g. Press F1 to begin printing.
h. After the SF 153 is signed, from the main menu, press F2, ASSETS.
i. From the submenu, press F6, DESTRUCTION.
j. Press F4, PROCESS RETURNED DESTRUCTION REPORTS.
k. Press F1, ALL MATERIAL HAS BEEN DESTROYED.
l. Type in the parent account voucher number, press F1.
m. Initial the SF 153 and write "PROC" (for processed) after NOTHING FOLLOWS. This entry verifies to the account personnel that the action was processed and shows who did the processing.
n. File the SF 153 in the destruction file folder until a consolidated destruction voucher is processed.
B-5. STEPS FOR LOCAL DESTRUCTION
The COMSEC custodian will--
a. From main menu, press F2, ASSETS.
b. From submenu, press F6, DESTRUCTION.
c. From sub-submenu, press F3, MATERIAL FOR DEST BY PARENT ACCOUNT.
d. For STU-III, press F1, STU-III KEY.
e. Enter the necessary information for the terminal serial number. Indicate if STU-III is keyed, press F1.
f. Press F1 again to print SF 153.
g. For any other destruction, press F2, ALL OTHER SOFTWARE.
h. Enter the necessary information, press F1.
i. Press F1 again to print the SF 153.
B-6. STEPS FOR PROCESSING RETURNED DESTRUCTION REPORTS
The COMSEC custodian will--
a. From main menu, press F2, ASSETS.
b. From submenu, press F6, DESTRUCTION.
c. From sub-submenu, press F4, PROCESS RETURNED DESTRUCTION REPORTS.
(1) For vouchers where all material was destroyed, press F1.
(2) For vouchers where all material was not destroyed, press F2.
(3) For sub-account and hand-receipt holder vouchers, press F3.
d. After each selection, fill in necessary information and press F1 after each selection.
e. Initial the SF 153 and write "ACK" on the form after NOTHING FOLLOWS. This entry verifies to account personnel that the process was acknowledged and shows who made the acknowledgment.
f. If the destruction was for ALC 1 or ALC 2 material, file the SF 153 in a reportable voucher file. If the material was ALC 3 or ALC 4, file the form in a nonreportable voucher file.
B-7. HOW TO FLAG STU-III KEYS FOR LOCAL DESTRUCTION
The COMSEC custodian will--
a. From the main menu, press F2, ASSETS.
b. From the submenu, press F6, DESTRUCTION.
c. From the sub-submenu, press F3, MATERIAL FOR DESTRUCTION BY PARENT ACCOUNT.
d. Press F1, STU-III KEY.
e. Enter the short title, the edition, the serial number of key, the quantity, and the STU-III serial number in the appropriate fields. If the key was zeroized, leave this blank, press F1. Repeat this step if more than one STU-III was keyed.
f. Press ESC/F10. Press F1 to begin printing.
g. After voucher is signed, press F2, ASSETS, from the main menu.
h. Press F6, DESTRUCTION, from the submenu.
i. Press F4, PROCESS RETURNED DESTRUCTION REPORT.
j. Press F1, ALL MATERIAL HAS BEEN DESTROYED.
k. Enter the parent-account voucher number, press F1.
l. Initial the SF 153 and write "PROC" (for processed) on the form after NOTHING FOLLOWS. This entry verifies to account personnel that the action was processed and shows who processed the action.
m. File voucher in the destruction file folder until the consolidated destruction voucher is processed.
B-8. HOW TO PROCESS DESTRUCTION REPORTS (DA FORM 5941-R) FROM HAND-RECEIPT HOLDERS
The COMSEC custodian will--
a. From the main menu, press F2, ASSETS.
b. From the submenu, press F6, DESTRUCTION.
c. From the sub-submenu, press F4, PROCESS RETURNED DESTRUCTION REPORTS.
d. Press F3, ADDITIONS TO DESTRUCTION REPORT.
e. Enter the hand-receipt number, the Julian date, the number "8888" in the voucher serial number block, the short title, the edition, the serial number, and the quantity, press F1. Repeat this for every short title or edition on the report.
f. Initial the SF 153 and write "PROC" (for processed) on the voucher after NOTHING FOLLOWS. This entry verifies to account personnel that the action was processed and shows who processed the action.
g. File voucher in local destruction file folder until consolidated destruction report is processed.
h. Check hand-receipt folder and line-through any material on the hand-receipt. If all material is destroyed, return hand-receipt to the hand-receipt holder.
B-9. HOW TO PREPARE A CONSOLIDATED DESTRUCTION REPORT
The COMSEC custodian will--
a. Make a back-up file before beginning.
b. From the main menu, press F2, ASSETS.
c. From the submenu, press F6, DESTRUCTION.
d. From the sub-submenu, press F5, CONSOLIDATED DESTRUCTION REPORT TO ACCOR.
e. Read the screen. All local destruction reports must be processed before continuing. Enter the letter "Y" if all vouchers have been processed. Press F1. Press ESC.
f. Press F1 to begin printing.
g. Verify the items against the local-destruction reports and sign the SF 153.
h. File the consolidated destruction report in the reportable voucher file. File the local vouchers in the local destruction file. File the generic vouchers (not printed from the ACCLAIMS computer) in the generic destruction file.
B-10. HOW TO CREATE AN ACCOR DOWNLOAD DISK
The COMSEC custodian will--
a. Make a "back-up" disk.
b. From the main menu, press F2, ASSETS.
c. From the submenu, press F9, CREATE 153 ACCOR DISK.
d. Read the menu.
e. After loading a disk, press F1.
f. After creating the disk, create an ACCOR disk-summary report.
g. From the main menu, press F5, REPORTS.
h. From the submenu, press F9, SELECT REPORTS TO PRINT.
i. From the sub-submenu, press F1, ACCOR DISK REPORT.
j. Press F1 to print.
k. Send the bottom portion of the voucher that lists reportable vouchers to the ACCOR. The account manager will sign the voucher to verify data has been sent to the ACCOR.
l. Keep the top portion of the voucher to download to ACCOR.
m. After downloading the disk, rename the file, JO2ACORD, and file it on a consolidated destruction disk.
(a) At C\: (prompt) in DOS, type: RENAME JO2ACORD JANACORD.
(b) Put the yearly consolidated disk in "A" drive and type: COPY JANACORD A:
(c) After checking the disk for the copied JANACORD file, remove and store the disk.
(d) Delete the file from the "C" drive. Ensure computer is in "C" drive and type: DEL JANACORD.
B-11. HOW TO DOWNLOAD TO ACCOR
The COMSEC custodian will--
a. Check the STU-III telephone next to the ACCLAIMS computer. Settings should be 2400 baud, asynchronous.
b. Insert the disk with the information for ACCOR in drive "A".
c. Select the PROCOMM system. Press any key. Press "ALT-P" to check settings. Settings should be at 2400 baud, N, 8, 1, COM1. Press ESC to exit. Press "PAGE UP".
d. Press 2, KERMIT.
e. Enter: "A:JO2ACORD".
NOTE: Do not press the enter key.
f. Dial the ACCOR on the STU-III connected to the ACCLAIMS computer.
NOTE: The telephone number for the ACCOR is DSN: 312-879-7479, or civ: 99-001-520-538-7479.
g. Give the ACCOR manager the COMSEC account number (for example, 5CE000) to be downloaded.
h. After making a secure voice connection with ACCOR on the STU-III, make the secure data connection. When secure, press the enter key on the computer.
i. After completion, press "ALT X" to exit DOS.
j. After downloading is complete, the ACCOR account manager should give the last line-item received to verify that the transmitted information was complete. Check this information against the ACCOR disk-summary report.
k. File disk-summary report in the ACCOR disk file.
B-12. HOW TO PROCESS A DESTRUCTION VOUCHER FROM A HAND-RECEIPT HOLDER IF THERE IS NO GENERIC VOUCHER
The COMSEC custodian will--
a. From the main menu, press F2, ASSETS.
b. From the submenu, press F6, DESTRUCTION.
c. From the sub-submenu, press F1, MATERIAL FOR DESTRUCTION BY PARENT ACCOUNT.
d. Type the short title and the edition of material to be destroyed, press F1.
e. Use the "PRINT DESTRUCTION REPORT FOR SUBACCOUNT/HRH" option to print the SF 153 destruction vouchers.
NOTE: The voucher number is the Julian Date (YDDD) and the number "8888." This number will be used to identify each voucher for the PROCESS RETURNED DESTRUCTION REPORTS option.
B-13. HOW TO DO A REBUILD OF THE ACCLAIMS SYSTEM
The COMSEC custodian will--
a. Make a "back-up" file of ACCLAIMS.
b. Log off ACCLAIMS. Press F10 to go to DOS.
c. Change directory (CD) to ACCLAIMS. (Type: CD ACCLAIMS.)
d. Enter: AL4TOOLS.EXE
e. Scroll to REBUILD, press ENTER.
f. Scroll to ALL FILES, press ENTER.
g. When finished, escape the file and change directory out of ACCLAIMS (Enter: CD..).
h. Enter DA5 to return to Direct Access.
NOTE: A REBUILD of ACCLAIMS should be done quarterly.
B-14. HOW TO RECEIVE THROUGH PROCOMM
The COMSEC custodian will--
a. Check the STU-III telephone next to the ACCLAIMS computer. Settings should be 2400 baud, asynchronous.
b. Insert a blank disk in drive "A".
c. Select the PROCOMM system, press any key. Press "ALT P" to check the settings. (Settings should be at 2400 baud, N, 8, 1, COM 1, press ESC to exit.) Press "PAGE DOWN."
d. Establish a voice connection with the sender on the STU-III next to the ACCLAIMS computer.
e. After making a secure voice connection on the STU-III, make the secure data connection. When secure, press 2, KERMIT, on the computer.
f. Once the information has been transferred, the last file name will appear on the screen, press ESC. Press "ALT V" to view the file.
g. Tell the sender the last file received. If all the information was received, the transmission is successful.
h. After completion, press "ALT X" to exit DOS.
APPENDIX C
EMERGENCY PLAN
This appendix provides a sample emergency plan and the emergency-plan format. A copy of the emergency plan will be given to the installation physical security officer to include in the installation physical security plan. The emergency plan normally will be marked "FOR OFFICIAL USE ONLY" with exemption category-2 according to AR 25-55, unless it contains classified information.
Sample Emergency Plan
Annex A
Annex B
Annex C
Annex D
Annex E
Annex F
Annex G
Annex H
Annex I
DEPARTMENT OF THE ARMY
2d MILITARY INTELLIGENCE BATTALION
COMSEC Account 5CE000
APO AE 09056 |
AEUAE-B-RT-5CE000 | 1 November 1996 |
SAMPLE EMERGENCY PLAN |
WARNING |
Unauthorized disclosure of classified information could cause serious or exceptionally grave damage to national security. The loss, damage, or compromise of classified material could seriously damage the fulfillment of the national defense |
The use of deadly force is defined in AR 190-14 and USAREUR Supplement 1, Commanders and COMSEC custodians will follow the policy in USAREUR Regulation 380-40, paragraph 8. |
1. References.
a. AR 380-40, Policy for Safeguarding and Controlling Communications Security (COMSEC) Material, 1 September 1994.
b. Technical Bulletin (TB) 380-41, Procedures for Safeguarding Accounting and Supply Control of COMSEC Material, 29 September 1995.
c. USAREUR Regulation 380-40, Safeguarding and Controlling Communications Security Material, 2 May 1996.
d. USAREUR Pamphlet 380-40, Communications Security (COMSEC) Custodian Guide, 3 March 1997. |
2. General.
a. Situation. The communications security (COMSEC) facility, Headquarters, 2d Military Intelligence Battalion (2d MI Bn), is subject to emergencies caused by fire, storm, flood, civil disturbances, or attacks that may require evacuating, storing, or destroying COMSEC material and COMSEC-related material.
b. Mission. Personnel will prevent compromise or loss of COMSEC MATERIAL DURING EMERGENCIES.
c. Implementation. The following personnel, in the order listed, may implement this emergency plan:
(1) Commander, 2d MI Bn.
(2) Executive Officer, 2d MI Bn.
(3) Information systems security officer (ISSO).
(4) COMSEC custodian for COMSEC ACCOUNT 5CE000.
(5) Noncommissioned officer in charge (NCOIC), Battalion Communications Section, 2d MI Bn.
(6) Senior person present.
d. Responsibilities:
(1) Before an emergency, the following responsibilities will be assigned:
a) The Commander, 2d MI Bn, will implement the plan and provide the necessary equipment and personnel.
(b) The COMSEC custodian or alternate will prepare emergency plans and ensure that personnel involved in the plan train a minimum of four times a year.
(2) During an emergency, the following responsibilities will be assigned:
(a) The NCOIC, Battalion Communications Section, will help the ISSO or COMSEC custodian supervise the execution of this plan. NCOIC Battalion Communications Section will obtain vehicles when necessary.
(b) Personnel assigned to this facility will carry out the instructions in this plan.
e. Forces and Resources. The forces and resources for this plan are as follows:
(1) Personnel assigned duties in the COMSEC vault and one person from the radio repair section.
(2) Personnel assigned duty in the ultra-high frequency (UHF) and the very high frequency (VHF) sections.
(3) M4 document destroyers in the COMSEC vault and in the security-office area.
(4) The dumpster behind the headquarters building (bldg 21). If the dumpster will be used for destruction, the senior person present will send an individual to get 5 gallons of diesel fuel from the 21/2-ton truck (bumper number C121) in the motor pool.
(5) Tools for emergency destruction of COMSEC equipment. These tools are mounted on the wall of the COMSEC vault.
(6) Carbon dioxide fire extinguishers for electrical fires are behind the door of the vault. Water-filled extinguishers for paper and wood fires are in the hallway leading to the vault.
(7) Organic transportation will be used to evacuate COMSEC material. The vehicle will be the 21/2-ton truck (bumper number C121) assigned to the facility. An alternate vehicle will be coordinated with the motor sergeant (555-1212).
(8) The primary evacuation site will be the Operation Plan (OPLAN) 4102 GDP location. The map with primary and alternate routes is in file 380-3XX, in safe 2, drawer 1. The commander or senior person present may determine alternate evacuation sites when necessary.
(9) The vault door combination is in the security office, room 9, safe 1. A copy of this plan is also posted above safe 4 in the security office.
a. Secure Storage Plan. This is the plan for storage of COMSEC material in the event of a bomb threat, fire, or natural disaster. Normally secure storage will be implemented unless otherwise directed (annex A).
b. Precautionary Destruction Plan. If there is knowledge of impending completion destruction, this is the plan for reduction of COMSEC holdings in an anticipation of complete destruction (annex B).
c. Total Destruction Plan. This is the plan for complete destruction of COMSEC material (annex C).
d. Evacuation Plan. The plan for evacuation of the COMSEC facility (annex D).
|
(AR 25-55, paragraph 3-200, exemption 3a, prescribes protective markings.) |
At a minimum, memorandum will be marked:
FOR OFFICIAL USE ONLY |
ANNEX A
SECURE STORAGE PLAN |
1. General. Secure storage means locking communications security (COMSEC) material in authorized COMSEC facilities before personnel temporarily evacuate the area. |
2. Purpose. This plan will be implemented when it becomes necessary for personnel to leave the facility for a temporary period when evacuation of COMSEC material is not practical. Examples of situations when secure storage plan would be implemented include the following:
a. Bomb threat.
b. Uncontrollable fire.
c. Natural disasters.
|
3. Execution. On notification of implementation of this plan from the commander or the senior member present (Emergency Plan, para 2c), the COMSEC custodian or senior person present will ensure that-
a. The items register (IR) card file or Army COMSEC Commodity Logistics Accounting and Information Management System (ACCLAIMS) levels III, IV, and V diskettes and COMSEC accounting files are secured.
b. Cryptoequipment is zeroized.
c. Classified COMSEC material is gathered and placed in safe number 2.
d. Remaining classified material is placed in safes 1 or 2, wherever space exists.
e. Safes are locked and checked.
f. Personnel evacuate the facility and take the IR cards or ACCLAIMS level III, IV, and V diskettes. The last person out of the facility will lock the entrance door.
|
4. Afteraction Reports. On return to the facility, the custodian and a cleared witness will check safety and accountability of all account personnel, inventory all holdings, and complete an afteraction report according to the basic plan, paragraph 4. |
(At a minimum, memorandum will be marked:)
FOR OFFICIAL USE ONLY |
ANNEX B
PRECAUTIONARY DESTRUCTION PLAN |
1. General. When a possible emergency is expected, precautionary destruction is required. Communications security (COMSEC) holdings must be reduced to the minimum required for continuous operation. Precautionary destruction makes further emergency actions, if necessary, easier and quicker. Positive-controlled material is not subject to precautionary destruction. |
2. Implementation. Superseded COMSEC keys and other unneeded material listed in paragraph 3 will be destroyed as an emergency precaution. |
3. Priority of Destruction. Material will be destroyed in the following order:
a. Superseded items listed in CJCSI 3260.01 in safe 4, drawer 1.
b. Superseded Top Secret key lists and operations codes (OPCODEs) in safe 2, drawer 1.
c. Superseded Secret key lists and OPCODEs in safe 2, drawer 1.
d. Superseded Confidential key lists and OPCODEs in safe 2, drawer 4.
e. Superseded authentication tables in safe 2, drawer 4.
f. Superseded signal operation instructions (SOIs) in safe 2, drawer 4.
g. Any remaining superseded material in safe 2, drawer 4.
h. COMSEC keying material not required for continued operation beyond 60 days. Canister systems should retain one future edition.
i. Cryptographic operational maintenance manual (KAM), cryptographic operational operating manual (KAO), and other COMSEC publications not required for immediate operations in safe 3, drawers 2 and 3.
j. Other classified material in file cabinet 1 and safe 2, drawer 3.
|
4. Execution.
a. On notification of implementation of this plan by the commander or senior person present (Emergency Plan, para 2c), assigned personnel immediately will report to the facility. If execution is required outside normal duty hours, the staff duty officer will notify assigned personnel by the fastest means possible, using the unit alert roster. During normal duty hours, the shift supervisor or senior person present will notify assigned personnel.
b. The COMSEC custodian or senior person present will protect the items register (IR) card file or the Army COMSEC Commodity Logistics Accounting and Information Management System (ACCLAIMS) level III, IV, or V diskettes that are on top of the COMSEC custodian's desk. The DA Form 2653-R (COMSEC Account--Daily Inventory Sheet (LRA)) will be used to record destroyed items and post emergency action reports.
c. The COMSEC custodian or the senior person present will send a driver to the motor pool to pick up the assigned military vehicle (bumper number C121) or the alternate vehicle (bumper number C122) and immediately return to the facility for further instructions.
d. The COMSEC custodian or the senior person present will send one person to the arms room, if necessary, to pick up three weapons and immediately return to the facility for further instructions.
e. Material will be destroyed in the priority listed in this annex, paragraph 3. Total destruction of one item is preferred to partial destruction of all material. The senior person present and a witness will list each item on DA Form 2653-R as it is destroyed.
f. Items to be destroyed will be removed under guard to the destruction location. The alternate location is the dumpster behind the building.
g. Personnel will use only ABC M4 document destroyers (or the means available to your unit) to complete total destruction.
h. COMSEC material and equipment not in operational use will be prepared for total destruction or evacuation.
i. Guards will remain in the vicinity of the facility; personnel will remain on duty during the emergency.
|
5. Afteraction Report. An afteraction report will be prepared using IR cards, DA Form 2653-R, and appropriate ACCLAIMS files according to the basic plan, paragraph 4. |
(At a minimum, memorandum will be marked:) FOR OFFICIAL USE ONLY |
ANNEX C
TOTAL DESTRUCTION PLAN |
1. General. Communications security (COMSEC) custodians will totally destroy COMSEC material when capture is inevitable or evacuation is impossible. Items will be destroyed in the order given in this annex, paragraph 2. When conducting total destruction, total destruction of one item is more desirable than partial destruction of several items. |
2. Priority of Destruction. Material will be destroyed in the order listed below.
a. Priority 1 items specified in CJCSI 3260-01.
b. Priority 2 items specified in CJCSI 3260.01.
c. Superseded and effective Top Secret keylists and operations codes (OPCODEs) in safe 2, drawer 1.
d. Zeroized operational cryptoequipment and fill devices.
e. Superseded and effective Secret keylists and OPCODEs in safe 2, drawer 1.
f. Superseded and effective Confidential keylists and OPCODEs in safe 2, drawer 2.
g. Last priority items as identified in CJCSI 3260.01.
h. Sensitive compartmented information/Top Secret message files and Top Secret magnetic storage media in safe 3, drawer 1.
i. Future Top Secret keylists and OPCODEs that are effective in the next 30 days in safe 1, drawer 2.
j. Future Secret and Confidential keylists and OPCODEs in safe 1, drawer 2.
k. Sensitive pages of cryptoequipment maintenance manuals in safe 2, drawer 3.
l. Classified equipment boards in priority load list (PLL) storage cabinets.
m. Remainder of cryptoequipment maintenance manuals, cryptoequipment operating instructions, and emergency action procedures (EAP) volumes in safe 2, drawer 3.
n. Remaining classified COMSEC material (including future keys, unclassified cryptokeys, superseded authenticators, signal operation instructions (SOIs), classified message files, and cryptoequipment) in safes 1, 2, and 3, file cabinets, and equipment racks. |
3. Execution.
a. The place of destruction will depend on the time available.
(1) Destruction will take place in the incinerator (basement of headquarters building).
(2) The alternate location for destruction is the dumpster behind the building.
(3) If time does not permit actions in (1) and (2) above, paper materials will be spread over the floor, soaked with diesel fuel, and ignited. Care should be taken to ensure that all other actions are complete and that the area and buildings are clear of people.
b. On notification of implementation of this plan by the commander or the senior person present (Emergency Plan, para 2c), assigned personnel will report immediately to the facility. If execution is required outside normal duty hours, the staff duty officer will notify assigned personnel by the fastest means possible, using the unit alert roster. During duty hours, the shift supervisor or the senior person present will notify assigned personnel.
c. The COMSEC custodian or the senior person present will secure the items register (IR) card file or Army COMSEC Commodity Logistics Accounting and Information Management System (ACCLAIMS) level III, IV or V diskettes.
d. The COMSEC custodian or the senior person present will send a driver to the motor pool to get enough diesel fuel to destroy the paper material.
e. The COMSEC custodian or the senior person present will send one person to the arms room, if necessary, to pick up three weapons and immediately return to the facility for further instructions.
f. Material listed in priority order (this annex, para 2) will be prepared for immediate destruction. The senior person present and one witness will list items prepared for destruction for post emergency reporting on DA Form 2653-R. Once this list has been completed, the material on the list will be destroyed.
g. COMSEC equipment will be taken apart and smashed. Smashed pieces will be scattered over a wide area, buried, or burned beyond recognition.
|
4. Afteraction Report. An afteraction report will be prepared using IR cards or ACCLAIMS files according to the basic plan, paragraph 4. |
(At a minimum, memorandum will be marked:)
FOR OFFICIAL USE ONLY |
ANNEX D
EVACUATION PLAN |
1. General.
a. Communications security (COMSEC) material will be evacuated when directed by the responsible authority. Before evacuating COMSEC material, the custodian or senior person present will consider--
(1) How the material will be needed later.
(2) What dangers are involved in moving the material.
(3) How safe the new location is for storing the material.
b. If unfavorable conditions exist for removing the material, the precautionary (annex B) or total destruction (annex C) plan will be implemented. This annex does not apply to emergencies caused by fire or natural disasters. The secure storage plan will be implemented during fires or natural disasters (annex A). |
2. Execution.
a. On notification of implementation of this plan by the commander or senior person present (Emergency Plan, para 2c), assigned personnel immediately will report to the facility. If execution is required outside normal duty hours, the staff duty officer will notify assigned personnel by the fastest means possible, using the unit alert roster. During normal duty hours, the shift supervisor or senior person present will notify assigned personnel.
b. The COMSEC custodian or senior person present will protect the items register (IR) card file or the Army COMSEC Commodity Logistics Accounting and Information Management System (ACCLAIMS) level III, IV, or V diskettes that are on top of the COMSEC custodian's desk. The DA Form 2653-R (COMSEC Account--Daily Inventory Sheet (LRA)) will be used to record destroyed items and post emergency action reports.
c. The COMSEC custodian or the senior person present will send a driver to the motor pool to pick up the assigned military vehicle (bumper number C121) or the alternate vehicle (bumper number C122) and immediately return to the facility for further instructions.
d. The COMSEC custodian or the senior person present will send one person to the arms room, if necessary, to pick up three weapons and immediately return to the facility for further instructions.
e. The COMSEC custodian or the senior person present will instruct one person to zeroize keyed COMSEC equipment.
f. The COMSEC custodian or the senior person present will ensure that material is locked in a safe. If movement of safes is impractical, containers such as footlockers or boxes in the storage room will be used to secure material during transport.
g. The COMSEC custodian or the senior person presen will ensure that equipment and material will be moved to the vehicle waiting outside the facility.
h. The COMSEC custodian or the senior person present will ensure that the local military police (123-4567) and the previously coordinated escort are notified. |
3. Evacuation Sites.
a. Primary. Ground defensive position (GDP) location or continuity of operation (COOP) site designated in Operation Plan (OPLAN) 4102. Primary and alternate route maps are in safe 1, drawer 2.
b. Secondary. The senior person present may designate an alternate location if the primary is not practical or feasible.
c. Other. Further movement to different locations must be anticipated before and during evacuation. |
4. Conduct During Evacuation.
a. During evacuation, personnel accompanying material will be alert for unusual activity. If the vehicle is attacked by ground forces and capture is imminent, the COMSEC material will be destroyed by any means available, including destroying the vehicle by igniting the fuel tanks.
b. On arrival at the evacuation site, a complete inventory will be taken and reports will be prepared.
c. When emergency plans result in abandoning COMSEC material, every effort will be made to recover the material at the earliest possible opportunity. The safety of the individuals involved in recovery operations will be considered. Recovered COMSEC material will be controlled and retained until further disposition instructions are received. |
5. Afteraction Reports. An afteraction report will be prepared according to the basic plan, paragraph 4. |
(At a minimum, memorandum will be marked:)
FOR OFFICIAL USE ONLY |
ANNEX E
FIRE EMERGENCY PLAN |
1. General. Procedures in this annex will be followed when a fire occurs in the COMSEC facility. Annex A applies if a fire exists in the building housing the cryptofacility. |
2. Location of Firefighting Equipment.
a. A CO2 extinguisher for chemical fires is mounted next to the COMSEC facility door.
b. Water extinguishers for paper and wood are in hallways.
c. Firefighting tools are mounted on the wall. |
3. Execution. The person discovering the fire should-
a. Sound the alarm and disconnect electrical devices.
b. Report the fire to fire department (telephone number 117) and give the location, building number (21), room number (6), name, and telephone number. If telephones do not work, send a messenger to the military police desk sergeant (bldg 123) to report the fire. Extinguish the fire using available firefighting equipment.
c. Notify the senior person present, who will ensure the item register (IR) card file or Army COMSEC Commodity Logistics Accounting and Information Management System (ACCLAIMS) level III, IV, or V diskettes are removed.
d. Implement the secure storage plan (annex A) and, if time permits, bring the fire under control.
e. Post guards during the entire evacuation and temporary storage period.
f. Post guards and screen COMSEC material to prevent unauthorized viewing, if possible, when firefighters or other unauthorized personnel must enter the facility. |
NOTE: Firefighters will not be delayed from fighting the fire for the formality of signing in. Foreign-national firefighters will be asked to provide only their names. These names will be provided to the supporting counterintelligence element after the fire is extinguished. |
4. Afteraction Report. After the emergency, the custodian will conduct a physical inventory using the IR cards or ACCLAIMS files and complete an afteraction report according to the basic plan, paragraph 4. |
(At a minimum, memorandum will be marked:)
FOR OFFICIAL USE ONLY |
ANNEX F
COORDINATION |
This plan has been reviewed for compatibility with command plans. Commitments in these plans can be met. |
TROY T. AIKMAN LTC, MI Commanding | WILLIAM BATES CPT, MI S2 |
EMMITT D. SMITH MAJ, MI S3 | JAY P. NOVACEK 1LT, SC CE Staff Officer |
NATHANIEL N. NEWTON CPT, IN HHC Commander | CHAD W. HENNINGS GS-12 Battalion ISSO |
RAY DONALDSON CW4, USA Motor Officer | KEVIN F. WILLIAMS MAJ, MP Provost Marshal |
LEON H. LETT GS-11 Post Safety Officer | CHARLES S. HALEY GS-13 Post Fire Marshal |
(At a minimum, memorandum will be marked:)
FOR OFFICIAL USE ONLY |
ANNEX G
ANNUAL OPERATOR REVIEW |
NAME ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ |
DATE ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ |
SIGNATURE ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ |
(At a minimum, memorandum will be marked:)
FOR OFFICIAL USE ONLY |
ANNEX H
RESULTS OF QUARTERLY DRY RUN |
PORTION OF PLAN PRACTICED: |
DATE OF PRACTICE: |
1. PERSONNEL PARTICIPATING: |
2. RESULTS: |
3. RECOMMENDATIONS: |
4. SIGNATURE OF CUSTODIAN AND WITNESSES: |
(At a minimum, memorandum will be marked:)
FOR OFFICIAL USE ONLY |
ANNEX I
SIGNATURE SHEET |
NAME ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ |
DATE ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ |
SIGNATURE ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ ___________________ |
(At a minimum, memorandum will be marked:)
FOR OFFICIAL USE ONLY |