TB 380-41 PDF

For use of this form, see TB ; the proponent agency is CSLA. 1. SHORT TITLE. 2. REG/EDIT. 3. SEC CLASS. 4. SERIAL NUMBER. 5. EFFECTIVE DATE. item accounting, and transaction reporting are contained in Department of the Army (DA) Pamphlet (Pam) , Technical Bulletin (TB) , AR , . TB series, Procedures for Safeguarding, Accounting and Supply Control of COMSEC. Material, contains procedures used to account for COMSEC.

Author: Daimuro Jubar
Country: South Africa
Language: English (Spanish)
Genre: Relationship
Published (Last): 3 November 2008
Pages: 104
PDF File Size: 8.77 Mb
ePub File Size: 7.24 Mb
ISBN: 402-1-33043-366-7
Downloads: 54434
Price: Free* [*Free Regsitration Required]
Uploader: Vunris

View all subjects More like this Similar Items. Some accounts require both an bt and an external SOP. When installed in an operational configuration, unattended, unkeyed cryptoequipment is left installed and protected in a manner approved by the commander according to TBchapter 5. Finding libraries that hold this item When the COMSEC facility is th, it has the necessary safeguards, determined by the commander, to protect against unauthorized entry 3804-1chap 5. Keying material approved for use within the U.

Please enter recipient e-mail address es. The plan is coordinated with the command emergency plan to ensure evacuation, storage, and destruction of key will be effectively and securely performed in the event of an actual emergency TBchap 5, and app D. WorldCat is the world’s largest library catalog, helping you find library materials online.

Security, procedures for safeguarding, accounting and supply control of COMSEC material.

Reference publications are filed under 1jj according to AR If double cut shredders are used to destroy paper, the material is considered destroyed if CHAD residue is not more than 1. It provides specific instructions and requirements that should be included in this type of SOP. Current and future editions of key are stored in separate drawers. Superseded key is completely destroyed by burning or by using destruction devices and methods according to the guidance in TBchapters 4 and 5.

Cryptosystems used by the command are either locally generated electronic key or preprinted key produced by the National Security Agency NSA. Accounting legend code ALC 3 material should be issued, not hand-receipted.

Users are aware of the requirement to report all circumstances, occurrences, or acts that could lead to a compromise of key, directly to the appropriate CONAUTH TBchap 5. Account personnel know their responsibilities in an emergency, according to AR You already recently rated tv item. Any discrepancy found during the dry run is corrected immediately and the plan changed accordingly AR Preview this item Preview this item.

The authentication system must be NSA-approved. Maintenance manuals and operating instructions are destroyed not later than 15 days after the item was superseded and posted to an IR card or an asset inventory and destruction report.

The message address is: Please enter your name. Tbb me on this computer.

The areas to be inspected D-3 and D-4 are numbered according to the inspector’s checks. Destroyed items are removed from DA Form R. Citations are based on reference standards. The keying material on 380-1 is routinely used or is held for a valid contingency TBpara 3.

Classified microfiche are only destroyed by burning or an approved chemical solution according to TB Combinations also are changed when an individual knowing the combination no longer needs access AR The recommended types of destruction methods and devices are covered in TBchapter 5.

Daily security checks are made at the end of each work-day and on non-workdays as required TBchap 5. Mandatory modifications to classified COMSEC equipment are applied and equipment modification record plates document the modification according to TB series. Linked Data More info tv Linked Data.

Create lists, bibliographies and reviews: The E-mail message field is required.

The emergency plan includes provisions from TBchapter 5, determined as appropriate by the commander. A modified SF Security Container Information top part is posted, and panel buttons are kept clean. Home About Help Search. Advanced Search Find a Library.

COMSEC accounts.

Add a review and share your thoughts with other readers. DA Form is filled out and sent out according to TBchapter 2. The request message or memorandum will be classified Secret according to AR The amount of key issued to accounts by a controlling authority CONAUTH is reviewed four times a year to ensure that minimum stock levels are consistent with the operations and contingency plans on hand.

You may send this item to up to five recipients. Adequate emergency destruction material and devices are available and working TBchap 5.

Search WorldCat Find items in hb near you. However, formatting rules can vary widely between applications and fields of interest or study.

Plan task cards are correct and prioritized.