SECTION VII
SURVEILLANCE

24. COMSEC INCIDENT REPORTING
COMSEC custodians will report COMSEC incidents according to AR 380-40, TB 380-41, USAREUR Regulation 380-40, and this pamphlet.

25. ROUTING OF REPORTS

NOTE: While all violations of AR 380-40 are serious incidents and may jeopardize the integrity of the COMSEC material involved, not all violations need to be assigned a COMSEC-incident case-number from the USACCSLA.

26. REPORT PRECEDENCE AND TIMELINESS

27. SIGNAL OPERATION INSTRUCTIONS
Incidents involving signal operating instructions (SOI ) material will be reported according to AR 380-5 as a loss-of-classified information.

NOTE: Once SOI material containing either ALC 3 or category-2 ALC 4 has been permanently issued to a user (hand-receipt holder), the COMSEC custodian is no longer accountable or responsible for the SOI material. Custodians will not issue or hand-receipt SOIs to themselves.

28. ASSESSMENTS, EVALUATIONS, AND INVESTIGATIONS

29. EVALUATING COMSEC INCIDENTS
CONAUTHs will evaluate COMSEC incidents according to AR 380-40.

SECTION VIII
CONTROLLED CRYPTOGRAPHIC ITEMS

30. GENERAL
Although the PBO maintains property accountability records for a CCI, once issued on a hand-receipt, accountability of the CCI becomes the responsibility of the user to provide security control and accountability through monthly inventory. A CCI will be controlled according to AR 380-40, DA Pamphlet 25-16, and DA Pamphlet 25-380-2. A CCI is sensitive and will be protected for the same reasons other unclassified but sensitive equipment (such as, night vision devices, weapons, M1 tank technology) is protected.

31. CCI REFERENCES

32. CCI INCIDENT REPORTING
USAREUR Regulation 380-40 and this pamphlet gives guidance for reporting CCI incidents in USAREUR.

33. EXCEPTIONS
Requests for exception to DA policy on CCIs will be sent through command channels to the Commander, USAREUR/7A, ATTN: AEAGB-CI-S, Unit 29351, APO AE 09014.

34. STU-III INSTALLATION IN PRIVATE RESIDENCES

35. FOREIGN ACCESS
Access to a keyed CCI will follow the guidance in USAREUR Regulation 380-40, paragraph 12.

SECTION IX
DEPARTMENT OF THE ARMY CRYPTOGRAPHIC ACCESS PROGRAM

36. QUALIFYING POSITIONS AND UNITS
Guidance for the Department of the Army Cryptographic Access Program (DACAP) in USAREUR is in AR 380-40, USAREUR Regulation 380-40, and this pamphlet.

37. REPORTING CHANGES TO DATABASE
The DACAP POC will report changes in the DACAP database according to AR 380-40 and USAREUR Regulation 380-40, paragraph 13.


APPENDIX A
REFERENCES

A-1. CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION (CJCSI)

(S) CJCSI 3260.01, Policy and Procedures Governing the Authentication and Safeguarding of Nuclear Control Orders (U)

A-2. ARMY REGULATIONS (ARs)

AR 15-6, Procedures for Investigating Officers and Boards of Officers

AR 25-12, Communications Security Equipment Maintenance and Maintenance Training

AR 25-55, The Department of the Army Freedom of Information Act Program

AR 25-400-2, The Modern Army Recordkeeping System (MARKS)

AR 105-64, US Army Communications-Electronics Operation Instructions Program

AR 190-13, The Army Physical Security Program

AR 190-14, Carrying of Firearms and Use of Force for Law Enforcement and Security Duties

AR 380-5 and USAREUR Supplement 1, Department of the Army Information Security Program

AR 380-40, Policy for Safeguarding and Controlling Communications Security (COMSEC) Material

AR 380-53, Communications Security Monitoring

AR 381-12, Subversion and Espionage Directed Against the U.S. Army (SAEDA)

AR 381-14, (S) Technical Surveillance Countermeasures (TSCM) (U)

AR 710-2, Inventory Management Supply Policy Below the Wholesale Level

AR 710-3, Asset Transaction Reporting System

A-3. DEPARTMENT OF THE ARMY (DA) PAMPHLETS

DA Pamphlet 25-16, Security Procedures for the Secure Telephone Unit, Third Generation (STU-III)

DA Pamphlet 25-380-2, Security Procedures for Controlled Cryptographic Items

A-4. TECHNICAL BULLETINS (TBs)

TB 43-0001-06 series, Equipment Improvement Report and Maintenance Digest for Communications Security Equipment

TB 380-40, (C) Key Variable Management and Cryptosetting for Electronically Keyed COMSEC Systems (U)

TB 380-41, Procedures for Safeguarding, Accounting, and Supply Control of COMSEC Material

A-5. ALLIED COMMAND, EUROPE (ACE), DIRECTIVE

ACE Directive 90-9, Procedures for Safeguarding and Request of COMSEC Material

A-6. UNITED STATES ARMY, EUROPE (USAREUR), PUBLICATIONS

USAREUR Regulation 190-13, The USAREUR Physical Security Program

USAREUR Regulation 380-40, Safeguarding and Controlling Communications Security Material

USAREUR Regulation 380-85, Counterintelligence Services

A-7. NONCRYPTOGRAPHIC OPERATIONAL GENERAL (NAG) PUBLICATION

NAG 16D, Field Generation and Over-the-Air-Distribution of COMSEC Key in Support of Tactical Operations and Exercises


APPENDIX B
ACCLAIMS INSTRUCTIONS

Army Communications Security Commodity Logistics Accounting Information Management System (ACCLAIMS) Level IV is designed to provide automated data-processing support for Communications Security (COMSEC) account custodians. The system parallels the standard automated accounting and reporting procedures as prescribed by TB 380-41 for all levels within the U.S. Army. The information in this appendix gives specific key-stroke instructions for using the ACCLAIMS system.

B-1. HOW TO PLACE MATERIAL IN THE ACCOUNT
The COMSEC custodian will--

NOTE: If TPI material is listed on an SF 153 with Secret and below material, the TPI material must be entered separately under the RECEIPT OF TPI MATERIAL section.

B-2. HOW TO ISSUE MATERIAL TO A HAND- RECEIPT HOLDER
The COMSEC custodian will--

NOTE: Check hand-receipt holder files to ensure that they have an authorization memorandum, a briefing statement, and a certification of security clearance, before hand-receipting material.

B-3. HOW TO TRANSFER MATERIAL TO ANOTHER ACCOUNT
The COMSEC custodian will--

NOTE: Keep the suspense copy of the SF 153 until the signed original is returned.

B-4. HOW TO FLAG MATERIAL FOR LOCAL DESTRUCTION (OTHER THAN STU-III-KEY)
The COMSEC custodian will-

B-5. STEPS FOR LOCAL DESTRUCTION
The COMSEC custodian will--

B-6. STEPS FOR PROCESSING RETURNED DESTRUCTION REPORTS
The COMSEC custodian will--

B-7. HOW TO FLAG STU-III KEYS FOR LOCAL DESTRUCTION
The COMSEC custodian will--

B-8. HOW TO PROCESS DESTRUCTION REPORTS (DA FORM 5941-R) FROM HAND-RECEIPT HOLDERS
The COMSEC custodian will--

B-9. HOW TO PREPARE A CONSOLIDATED DESTRUCTION REPORT
The COMSEC custodian will--

B-10. HOW TO CREATE AN ACCOR DOWNLOAD DISK
The COMSEC custodian will--

B-11. HOW TO DOWNLOAD TO ACCOR
The COMSEC custodian will--

NOTE: Do not press the enter key.

NOTE: The telephone number for the ACCOR is DSN: 312-879-7479, or civ: 99-001-520-538-7479.

B-12. HOW TO PROCESS A DESTRUCTION VOUCHER FROM A HAND-RECEIPT HOLDER IF THERE IS NO GENERIC VOUCHER
The COMSEC custodian will--

NOTE: The voucher number is the Julian Date (YDDD) and the number "8888." This number will be used to identify each voucher for the PROCESS RETURNED DESTRUCTION REPORTS option.

B-13. HOW TO DO A REBUILD OF THE ACCLAIMS SYSTEM
The COMSEC custodian will--

NOTE: A REBUILD of ACCLAIMS should be done quarterly.

B-14. HOW TO RECEIVE THROUGH PROCOMM
The COMSEC custodian will--


APPENDIX C
EMERGENCY PLAN

This appendix provides a sample emergency plan and the emergency-plan format. A copy of the emergency plan will be given to the installation physical security officer to include in the installation physical security plan. The emergency plan normally will be marked "FOR OFFICIAL USE ONLY" with exemption category-2 according to AR 25-55, unless it contains classified information.

Sample Emergency Plan
Annex A
Annex B
Annex C
Annex D
Annex E
Annex F
Annex G
Annex H
Annex I


DEPARTMENT OF THE ARMY
2d MILITARY INTELLIGENCE BATTALION
COMSEC Account 5CE000
APO AE 09056
AEUAE-B-RT-5CE0001 November 1996
SAMPLE EMERGENCY PLAN
WARNING
Unauthorized disclosure of classified information could cause serious or exceptionally grave damage to national security. The loss, damage, or compromise of classified material could seriously damage the fulfillment of the national defense
The use of deadly force is defined in AR 190-14 and USAREUR Supplement 1, Commanders and COMSEC custodians will follow the policy in USAREUR Regulation 380-40, paragraph 8.
1. References.

    a. AR 380-40, Policy for Safeguarding and Controlling Communications Security (COMSEC) Material, 1 September 1994.

    b. Technical Bulletin (TB) 380-41, Procedures for Safeguarding Accounting and Supply Control of COMSEC Material, 29 September 1995.

    c. USAREUR Regulation 380-40, Safeguarding and Controlling Communications Security Material, 2 May 1996.

    d. USAREUR Pamphlet 380-40, Communications Security (COMSEC) Custodian Guide, 3 March 1997.
2. General.

    a. Situation. The communications security (COMSEC) facility, Headquarters, 2d Military Intelligence Battalion (2d MI Bn), is subject to emergencies caused by fire, storm, flood, civil disturbances, or attacks that may require evacuating, storing, or destroying COMSEC material and COMSEC-related material.

    b. Mission. Personnel will prevent compromise or loss of COMSEC MATERIAL DURING EMERGENCIES.

    c. Implementation. The following personnel, in the order listed, may implement this emergency plan:

      (1) Commander, 2d MI Bn.

      (2) Executive Officer, 2d MI Bn.

      (3) Information systems security officer (ISSO).

      (4) COMSEC custodian for COMSEC ACCOUNT 5CE000.

      (5) Noncommissioned officer in charge (NCOIC), Battalion Communications Section, 2d MI Bn.

      (6) Senior person present.


    d. Responsibilities:

      (1) Before an emergency, the following responsibilities will be assigned:

        a) The Commander, 2d MI Bn, will implement the plan and provide the necessary equipment and personnel.

        (b) The COMSEC custodian or alternate will prepare emergency plans and ensure that personnel involved in the plan train a minimum of four times a year.

      (2) During an emergency, the following responsibilities will be assigned:

        (a) The NCOIC, Battalion Communications Section, will help the ISSO or COMSEC custodian supervise the execution of this plan. NCOIC Battalion Communications Section will obtain vehicles when necessary.

        (b) Personnel assigned to this facility will carry out the instructions in this plan.

    e. Forces and Resources. The forces and resources for this plan are as follows:

      (1) Personnel assigned duties in the COMSEC vault and one person from the radio repair section.

      (2) Personnel assigned duty in the ultra-high frequency (UHF) and the very high frequency (VHF) sections.

      (3) M4 document destroyers in the COMSEC vault and in the security-office area.

      (4) The dumpster behind the headquarters building (bldg 21). If the dumpster will be used for destruction, the senior person present will send an individual to get 5 gallons of diesel fuel from the 21/2-ton truck (bumper number C121) in the motor pool.

      (5) Tools for emergency destruction of COMSEC equipment. These tools are mounted on the wall of the COMSEC vault.

      (6) Carbon dioxide fire extinguishers for electrical fires are behind the door of the vault. Water-filled extinguishers for paper and wood fires are in the hallway leading to the vault.

      (7) Organic transportation will be used to evacuate COMSEC material. The vehicle will be the 21/2-ton truck (bumper number C121) assigned to the facility. An alternate vehicle will be coordinated with the motor sergeant (555-1212).

      (8) The primary evacuation site will be the Operation Plan (OPLAN) 4102 GDP location. The map with primary and alternate routes is in file 380-3XX, in safe 2, drawer 1. The commander or senior person present may determine alternate evacuation sites when necessary.

      (9) The vault door combination is in the security office, room 9, safe 1. A copy of this plan is also posted above safe 4 in the security office.

    a. Secure Storage Plan. This is the plan for storage of COMSEC material in the event of a bomb threat, fire, or natural disaster. Normally secure storage will be implemented unless otherwise directed (annex A).

    b. Precautionary Destruction Plan. If there is knowledge of impending completion destruction, this is the plan for reduction of COMSEC holdings in an anticipation of complete destruction (annex B).

    c. Total Destruction Plan. This is the plan for complete destruction of COMSEC material (annex C).

    d. Evacuation Plan. The plan for evacuation of the COMSEC facility (annex D).

(AR 25-55, paragraph 3-200, exemption 3a, prescribes protective markings.)
At a minimum, memorandum will be marked:
FOR OFFICIAL USE ONLY



ANNEX A
SECURE STORAGE PLAN
1. General. Secure storage means locking communications security (COMSEC) material in authorized COMSEC facilities before personnel temporarily evacuate the area.
2. Purpose. This plan will be implemented when it becomes necessary for personnel to leave the facility for a temporary period when evacuation of COMSEC material is not practical. Examples of situations when secure storage plan would be implemented include the following:

    a. Bomb threat.

    b. Uncontrollable fire.

    c. Natural disasters.

3. Execution. On notification of implementation of this plan from the commander or the senior member present (Emergency Plan, para 2c), the COMSEC custodian or senior person present will ensure that-

    a. The items register (IR) card file or Army COMSEC Commodity Logistics Accounting and Information Management System (ACCLAIMS) levels III, IV, and V diskettes and COMSEC accounting files are secured.

    b. Cryptoequipment is zeroized.

    c. Classified COMSEC material is gathered and placed in safe number 2.

    d. Remaining classified material is placed in safes 1 or 2, wherever space exists.

    e. Safes are locked and checked.

    f. Personnel evacuate the facility and take the IR cards or ACCLAIMS level III, IV, and V diskettes. The last person out of the facility will lock the entrance door.

4. Afteraction Reports. On return to the facility, the custodian and a cleared witness will check safety and accountability of all account personnel, inventory all holdings, and complete an afteraction report according to the basic plan, paragraph 4.
(At a minimum, memorandum will be marked:)
FOR OFFICIAL USE ONLY



ANNEX B
PRECAUTIONARY DESTRUCTION PLAN
1. General. When a possible emergency is expected, precautionary destruction is required. Communications security (COMSEC) holdings must be reduced to the minimum required for continuous operation. Precautionary destruction makes further emergency actions, if necessary, easier and quicker. Positive-controlled material is not subject to precautionary destruction.
2. Implementation. Superseded COMSEC keys and other unneeded material listed in paragraph 3 will be destroyed as an emergency precaution.
3. Priority of Destruction. Material will be destroyed in the following order:

    a. Superseded items listed in CJCSI 3260.01 in safe 4, drawer 1.

    b. Superseded Top Secret key lists and operations codes (OPCODEs) in safe 2, drawer 1.

    c. Superseded Secret key lists and OPCODEs in safe 2, drawer 1.

    d. Superseded Confidential key lists and OPCODEs in safe 2, drawer 4.

    e. Superseded authentication tables in safe 2, drawer 4.

    f. Superseded signal operation instructions (SOIs) in safe 2, drawer 4.

    g. Any remaining superseded material in safe 2, drawer 4.

    h. COMSEC keying material not required for continued operation beyond 60 days. Canister systems should retain one future edition.

    i. Cryptographic operational maintenance manual (KAM), cryptographic operational operating manual (KAO), and other COMSEC publications not required for immediate operations in safe 3, drawers 2 and 3.

    j. Other classified material in file cabinet 1 and safe 2, drawer 3.

4. Execution.

    a. On notification of implementation of this plan by the commander or senior person present (Emergency Plan, para 2c), assigned personnel immediately will report to the facility. If execution is required outside normal duty hours, the staff duty officer will notify assigned personnel by the fastest means possible, using the unit alert roster. During normal duty hours, the shift supervisor or senior person present will notify assigned personnel.

    b. The COMSEC custodian or senior person present will protect the items register (IR) card file or the Army COMSEC Commodity Logistics Accounting and Information Management System (ACCLAIMS) level III, IV, or V diskettes that are on top of the COMSEC custodian's desk. The DA Form 2653-R (COMSEC Account--Daily Inventory Sheet (LRA)) will be used to record destroyed items and post emergency action reports.

    c. The COMSEC custodian or the senior person present will send a driver to the motor pool to pick up the assigned military vehicle (bumper number C121) or the alternate vehicle (bumper number C122) and immediately return to the facility for further instructions.

    d. The COMSEC custodian or the senior person present will send one person to the arms room, if necessary, to pick up three weapons and immediately return to the facility for further instructions.

    e. Material will be destroyed in the priority listed in this annex, paragraph 3. Total destruction of one item is preferred to partial destruction of all material. The senior person present and a witness will list each item on DA Form 2653-R as it is destroyed.

    f. Items to be destroyed will be removed under guard to the destruction location. The alternate location is the dumpster behind the building.

    g. Personnel will use only ABC M4 document destroyers (or the means available to your unit) to complete total destruction.

    h. COMSEC material and equipment not in operational use will be prepared for total destruction or evacuation.

    i. Guards will remain in the vicinity of the facility; personnel will remain on duty during the emergency.

5. Afteraction Report. An afteraction report will be prepared using IR cards, DA Form 2653-R, and appropriate ACCLAIMS files according to the basic plan, paragraph 4.
(At a minimum, memorandum will be marked:)
FOR OFFICIAL USE ONLY

ANNEX C
TOTAL DESTRUCTION PLAN
1. General. Communications security (COMSEC) custodians will totally destroy COMSEC material when capture is inevitable or evacuation is impossible. Items will be destroyed in the order given in this annex, paragraph 2. When conducting total destruction, total destruction of one item is more desirable than partial destruction of several items.
2. Priority of Destruction. Material will be destroyed in the order listed below.

    a. Priority 1 items specified in CJCSI 3260-01.

    b. Priority 2 items specified in CJCSI 3260.01.

    c. Superseded and effective Top Secret keylists and operations codes (OPCODEs) in safe 2, drawer 1.

    d. Zeroized operational cryptoequipment and fill devices.

    e. Superseded and effective Secret keylists and OPCODEs in safe 2, drawer 1.

    f. Superseded and effective Confidential keylists and OPCODEs in safe 2, drawer 2.

    g. Last priority items as identified in CJCSI 3260.01.

    h. Sensitive compartmented information/Top Secret message files and Top Secret magnetic storage media in safe 3, drawer 1.

    i. Future Top Secret keylists and OPCODEs that are effective in the next 30 days in safe 1, drawer 2.

    j. Future Secret and Confidential keylists and OPCODEs in safe 1, drawer 2.

    k. Sensitive pages of cryptoequipment maintenance manuals in safe 2, drawer 3.

    l. Classified equipment boards in priority load list (PLL) storage cabinets.

    m. Remainder of cryptoequipment maintenance manuals, cryptoequipment operating instructions, and emergency action procedures (EAP) volumes in safe 2, drawer 3.

    n. Remaining classified COMSEC material (including future keys, unclassified cryptokeys, superseded authenticators, signal operation instructions (SOIs), classified message files, and cryptoequipment) in safes 1, 2, and 3, file cabinets, and equipment racks.
3. Execution.

    a. The place of destruction will depend on the time available.

      (1) Destruction will take place in the incinerator (basement of headquarters building).

      (2) The alternate location for destruction is the dumpster behind the building.

      (3) If time does not permit actions in (1) and (2) above, paper materials will be spread over the floor, soaked with diesel fuel, and ignited. Care should be taken to ensure that all other actions are complete and that the area and buildings are clear of people.

    b. On notification of implementation of this plan by the commander or the senior person present (Emergency Plan, para 2c), assigned personnel will report immediately to the facility. If execution is required outside normal duty hours, the staff duty officer will notify assigned personnel by the fastest means possible, using the unit alert roster. During duty hours, the shift supervisor or the senior person present will notify assigned personnel.

    c. The COMSEC custodian or the senior person present will secure the items register (IR) card file or Army COMSEC Commodity Logistics Accounting and Information Management System (ACCLAIMS) level III, IV or V diskettes.

    d. The COMSEC custodian or the senior person present will send a driver to the motor pool to get enough diesel fuel to destroy the paper material.

    e. The COMSEC custodian or the senior person present will send one person to the arms room, if necessary, to pick up three weapons and immediately return to the facility for further instructions.

    f. Material listed in priority order (this annex, para 2) will be prepared for immediate destruction. The senior person present and one witness will list items prepared for destruction for post emergency reporting on DA Form 2653-R. Once this list has been completed, the material on the list will be destroyed.

    g. COMSEC equipment will be taken apart and smashed. Smashed pieces will be scattered over a wide area, buried, or burned beyond recognition.

4. Afteraction Report. An afteraction report will be prepared using IR cards or ACCLAIMS files according to the basic plan, paragraph 4.
(At a minimum, memorandum will be marked:)
FOR OFFICIAL USE ONLY



ANNEX D
EVACUATION PLAN
1. General.

    a. Communications security (COMSEC) material will be evacuated when directed by the responsible authority. Before evacuating COMSEC material, the custodian or senior person present will consider--

      (1) How the material will be needed later.

      (2) What dangers are involved in moving the material.

      (3) How safe the new location is for storing the material.

    b. If unfavorable conditions exist for removing the material, the precautionary (annex B) or total destruction (annex C) plan will be implemented. This annex does not apply to emergencies caused by fire or natural disasters. The secure storage plan will be implemented during fires or natural disasters (annex A).
2. Execution.

    a. On notification of implementation of this plan by the commander or senior person present (Emergency Plan, para 2c), assigned personnel immediately will report to the facility. If execution is required outside normal duty hours, the staff duty officer will notify assigned personnel by the fastest means possible, using the unit alert roster. During normal duty hours, the shift supervisor or senior person present will notify assigned personnel.

    b. The COMSEC custodian or senior person present will protect the items register (IR) card file or the Army COMSEC Commodity Logistics Accounting and Information Management System (ACCLAIMS) level III, IV, or V diskettes that are on top of the COMSEC custodian's desk. The DA Form 2653-R (COMSEC Account--Daily Inventory Sheet (LRA)) will be used to record destroyed items and post emergency action reports.

    c. The COMSEC custodian or the senior person present will send a driver to the motor pool to pick up the assigned military vehicle (bumper number C121) or the alternate vehicle (bumper number C122) and immediately return to the facility for further instructions.

    d. The COMSEC custodian or the senior person present will send one person to the arms room, if necessary, to pick up three weapons and immediately return to the facility for further instructions.

    e. The COMSEC custodian or the senior person present will instruct one person to zeroize keyed COMSEC equipment.

    f. The COMSEC custodian or the senior person present will ensure that material is locked in a safe. If movement of safes is impractical, containers such as footlockers or boxes in the storage room will be used to secure material during transport.

    g. The COMSEC custodian or the senior person presen will ensure that equipment and material will be moved to the vehicle waiting outside the facility.

    h. The COMSEC custodian or the senior person present will ensure that the local military police (123-4567) and the previously coordinated escort are notified.
3. Evacuation Sites.

    a. Primary. Ground defensive position (GDP) location or continuity of operation (COOP) site designated in Operation Plan (OPLAN) 4102. Primary and alternate route maps are in safe 1, drawer 2.

    b. Secondary. The senior person present may designate an alternate location if the primary is not practical or feasible.

    c. Other. Further movement to different locations must be anticipated before and during evacuation.
4. Conduct During Evacuation.

    a. During evacuation, personnel accompanying material will be alert for unusual activity. If the vehicle is attacked by ground forces and capture is imminent, the COMSEC material will be destroyed by any means available, including destroying the vehicle by igniting the fuel tanks.

    b. On arrival at the evacuation site, a complete inventory will be taken and reports will be prepared.

    c. When emergency plans result in abandoning COMSEC material, every effort will be made to recover the material at the earliest possible opportunity. The safety of the individuals involved in recovery operations will be considered. Recovered COMSEC material will be controlled and retained until further disposition instructions are received.
5. Afteraction Reports. An afteraction report will be prepared according to the basic plan, paragraph 4.
(At a minimum, memorandum will be marked:)
FOR OFFICIAL USE ONLY



ANNEX E
FIRE EMERGENCY PLAN
1. General. Procedures in this annex will be followed when a fire occurs in the COMSEC facility. Annex A applies if a fire exists in the building housing the cryptofacility.
2. Location of Firefighting Equipment.

    a. A CO2 extinguisher for chemical fires is mounted next to the COMSEC facility door.

    b. Water extinguishers for paper and wood are in hallways.

    c. Firefighting tools are mounted on the wall.
3. Execution. The person discovering the fire should-

    a. Sound the alarm and disconnect electrical devices.

    b. Report the fire to fire department (telephone number 117) and give the location, building number (21), room number (6), name, and telephone number. If telephones do not work, send a messenger to the military police desk sergeant (bldg 123) to report the fire. Extinguish the fire using available firefighting equipment.

    c. Notify the senior person present, who will ensure the item register (IR) card file or Army COMSEC Commodity Logistics Accounting and Information Management System (ACCLAIMS) level III, IV, or V diskettes are removed.

    d. Implement the secure storage plan (annex A) and, if time permits, bring the fire under control.

    e. Post guards during the entire evacuation and temporary storage period.

    f. Post guards and screen COMSEC material to prevent unauthorized viewing, if possible, when firefighters or other unauthorized personnel must enter the facility.
NOTE: Firefighters will not be delayed from fighting the fire for the formality of signing in. Foreign-national firefighters will be asked to provide only their names. These names will be provided to the supporting counterintelligence element after the fire is extinguished.
4. Afteraction Report. After the emergency, the custodian will conduct a physical inventory using the IR cards or ACCLAIMS files and complete an afteraction report according to the basic plan, paragraph 4.
(At a minimum, memorandum will be marked:)
FOR OFFICIAL USE ONLY



ANNEX F
COORDINATION
This plan has been reviewed for compatibility with command plans. Commitments in these plans can be met.
TROY T. AIKMAN
LTC, MI
Commanding
WILLIAM BATES
CPT, MI
S2
EMMITT D. SMITH
MAJ, MI
S3
JAY P. NOVACEK
1LT, SC
CE Staff Officer
NATHANIEL N. NEWTON
CPT, IN
HHC Commander
CHAD W. HENNINGS
GS-12
Battalion ISSO
RAY DONALDSON
CW4, USA
Motor Officer
KEVIN F. WILLIAMS
MAJ, MP
Provost Marshal
LEON H. LETT
GS-11
Post Safety Officer
CHARLES S. HALEY
GS-13
Post Fire Marshal
(At a minimum, memorandum will be marked:)
FOR OFFICIAL USE ONLY



ANNEX G
ANNUAL OPERATOR REVIEW
NAME
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
DATE
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
SIGNATURE
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
(At a minimum, memorandum will be marked:)
FOR OFFICIAL USE ONLY



ANNEX H
RESULTS OF QUARTERLY DRY RUN
PORTION OF PLAN PRACTICED:
DATE OF PRACTICE:
1. PERSONNEL PARTICIPATING:
2. RESULTS:
3. RECOMMENDATIONS:
4. SIGNATURE OF CUSTODIAN AND WITNESSES:
(At a minimum, memorandum will be marked:)
FOR OFFICIAL USE ONLY



ANNEX I
SIGNATURE SHEET
NAME
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
DATE
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
SIGNATURE
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
___________________
(At a minimum, memorandum will be marked:)
FOR OFFICIAL USE ONLY