TB 380 41 PDF



Tb 380 41 Pdf

Language:English, Dutch, French
Published (Last):16.10.2015
ePub File Size:17.57 MB
PDF File Size:8.10 MB
Distribution:Free* [*Registration needed]
Uploaded by: REBA

item accounting, and transaction reporting are contained in Department of the Army (DA) Pamphlet (Pam) , Technical Bulletin (TB) , AR , . DA Pamphlet e. Technical Bulletin (TB) f. AE Pamphlet 2. REFERENCES. Appendix A lists publications and forms. TB series, Procedures for Safeguarding, Accounting and Supply Control of COMSEC. Material, contains procedures used to account for COMSEC.

During this process, the bacterium is enveloped by the macrophage and stored temporarily in a membrane-bound vesicle called a phagosome. The phagosome then combines with a lysosome to create a phagolysosome. In the phagolysosome, the cell attempts to use reactive oxygen species and acid to kill the bacterium.

However, M. The primary site of infection in the lungs, known as the " Ghon focus ", is generally located in either the upper part of the lower lobe, or the lower part of the upper lobe.

This is known as a Simon focus and is typically found in the top of the lung. Macrophages , T lymphocytes , B lymphocytes , and fibroblasts aggregate to form granulomas , with lymphocytes surrounding the infected macrophages. When other macrophages attack the infected macrophage, they fuse together to form a giant multinucleated cell in the alveolar lumen. The granuloma may prevent dissemination of the mycobacteria and provide a local environment for interaction of cells of the immune system.

Macrophages and dendritic cells in the granulomas are unable to present antigen to lymphocytes; thus the immune response is suppressed. Differential patterns of prenatal ipsilateral and contralateral lung growth in cases of isolated left-sided congenital diaphragmatic hernia. Tkach, J. Walkup, L. Quantitative magnetic resonance imaging of bronchopulmonary dysplasia in the neonatal intensive care unit environment.

Care Med. Newer imaging techniques for bronchopulmonary dysplasia. Wu, C. Pulmonary hypoplasia induced by oligohydramnios: findings from animal models and a population-based study. Page, D. Anomalies associated with pulmonary hypoplasia. Triebwasser, J. For standard formats refer to figures When available. All correspondence pertaining to specific command requirements for classified operational key will be classified.

U Requisitions for Training and Test Material. Requisitions for training and test material will be submitted to CSLA by memorandum or message. Requests should be sent at the earliest possible date to ensure that follow-on editions are available when needed. U Availability. CSLA will initiate action to fill all other requests. Figure Classified for example purposes only. Contents will vary according to local requirements.

Classi fied for example purposes only. USKAK DSN P. There are exceptional cases wherein units operate in remote areas under extreme conditions and resupply may be 3. U Restricting the amount of material on hand is necessary to limit the likelihood and scope of compromises. Equipment that is located within a short driving or walking distance may be keyed with the same copy of key. The requirement for effective and secure communications.

This is particularly true in the case of key used by a large number of holders. U Location of Equipment to be Keyed. Point-to-point systems. U Monthly Superseded. Accounts are authorized to have the current effective edition plus five future editions. Each page of a pad or code and each section of tape may be used only one time and then destroyed.

U Administrative Capability. When Rapid Net Expansion is necessary. Each originator will hold a unique pad. The excessive use of manual and auto-manual cryptosystems may adversely affect the inherent cryptographic security of the system. User accounts are authorized to hold at least four editions of all key material but not to exceed six months including the current edition. Resupply procedures. U Security. The organizational capability to administer all elements of the cryptonet and to control the material involved.

These cryptosystems will be identified in operation and exercise plans.

U In determining copy count requirements for key. When there is a continuing need for extra copies. U Other than Monthly Superseded. Contingency cryptosystems must be obtained and must be in sufficient copy count to support those operations. Issuing extracts of protectively packaged keying material defeats the purpose of the protective packaging and increases the vulnerability of the key contained therein.

Refer to Chapter 4 of this TB for information on key tape canisters. U Key or extracts which are to be carried on special purpose aircraft for example.

Protectively packaged keying material will be issued as entire editions. In these cases. U Should on-hand stock of a cryptosystem or authentication system become depleted or compromised. Key carried on special purpose aircraft will be destroyed as soon as possible after supersession. TB difficult or even impossible.

Each approval will be granted on the basis of operational necessity and the resupply situation. Such activities will use Chapters 1.

Accounting and management data specified in Chapter 4. DA Pam U AR U Policies and Procedures for Property Accountability. The property book will contain a page for each item of authorized classified COMSEC equipment reflecting authorization and identification data only. U To effectively control the status. The generating account assigns ALC 6 and 7 based upon the circumstances under which the material will be used see Chapter 6.


U ALC 4. Appendix C. The use of 4. The only exception is hand receipt entries and on-hand balances on Items Register IR cards. U ALC 2. TB the original or a copy. For destruction of ALC 6 key material. The use of Explicit key is highly discouraged due to the complexity of the procedures required. U Forms. U ALC 1. For destruction of ALC 1 key material.

This material is not accountable to the COR. Table contains a list of accounting forms. Instructions for file name. U Files. It is reportable and centrally accountable to the COR.

U ALC 7. Explicit key by user accounts is highly discouraged due to the complexity of the procedures required.

U ALC 6. A stamped or typed signature is not authorized.

U Reports. Used by facilities to record daily or shift-to-shift inventories. TABLE TB typewritten or written legibly in black or blue ink. Table 4.

A there are two types of comsec equipment controlled

Start a new register at the beginning of each calendar year. Exceptions are as follows: Check the Situation Column and determine which application applies.

Conversion Reports. U Tables For additional information on the sudden and unexpected departure of a custodian refer to Chapter 2.

Indicate circumstances involved. Upon sudden and unexplained departure of the custodian. U All packages. U In addition to routine distribution and normal receipt of requested material.

Check for evidence of attempts to open or alter the package. U CLSFs are exempt from the requirement to open sealed containers when the containers are only being handled for further distribution IAW paragraph 4. U The using activity custodian will open equipment containers within 2 working days after receipt. U When the protective packaging is opened within the account and when the material is hand-receipted to a user. U Verification of Contents.

U Discrepancies. U Improperly Delivered Package. TB 4. Verify that the contents of the package have not been exposed. If the package or container has been tampered with or the contents exposed. U Inspection. After checking the shipment and reporting any incident. U Extracts. Include the issuing or shipping account as an addressee. If duplicate or misnumbered pages are received. U When publication is transferred.

A keypad with extracts removed is considered partially destroyed. U Prior to document destruction. A record of page checking name. Y13 see Appendix F. No further reporting is necessary unless directed. When a page is discovered missing. U Duplicate or Misnumbered Pages. Submit a report classified according to contents to the office that issued the publication.

These items are not to be opened unless the material is to be used within 72 hours or a physical security check is to be conducted due to package tampering. U Duplicate Pages: Submit a report classified according to contents to the NSA. CLSFs holding key for further distribution are exempted from pagechecking requirements. TB on the appropriate Items Register Card s. Additional page checks must also be performed: U For efficient use of material and labor.

A copy of all vouchers received from non-Army accounts will be sent to the COR. U For purposes of security and preservation of contents. In case of duplicate pages. The duplicate pages will be destroyed and a Local Destruction Report prepared. A record of page checking will be posted to the Record of Page Check of accountable documents. Change of Custodian.

U Upon change of custodian. Take no further action unless directed by the issuing office. U Missing Pages. Always note the circumstances and the material involved. TB check or inventory these items. The CLSF may open these packages for partial distribution. When a discrepancy is discove red. If opened. To check or inventory such items.

Do not open these items prior to issue to the user. In such cases. CCIR until repacked and sealed. Retain the completed disposition record: Depending on the ALC.

Even when opened. Do not remove key tape segments for inventory. The local destruction certification showing the destruction of the used pages will accompany the partially used key. Julian date of the report. A voided voucher number will not be used again during the same calendar year. Voucher number series will be assigned to transactions that are to be reported to the COR. Outgoing voucher numbers are assigned to local transactions that are not forwarded to the COR.

For traditional manual accounts. U Traditional Account Voucher Numbers. Begin with number 1 and then additional forms.

Headquarters, Department of the Army

In the case of a hand receipt. Each recorded voucher number represents an account transaction i. U Block 7.

U Block 1. Enter a description of the transaction. Transaction Description. Account Number. Unit Identification Code. DCS Register Number.

U Block 2. Transfer Report. Enter the initials of the individual making the control register entry indicating that all necessary actions have been completed. Enter the DCS voucher number or registered mail number.

TB Table 4 U Block 3. New registers must be started at the beginning of each calendar year.

Use of these registers will ensure that a voucher number is not duplicated. Two registers must be maintained: U Block 8. U Block 4. Destruction Report. If the full range of voucher numbers is used prior to year-end. U Block U Block 6. Enter the UIC of the preparing organization or activity. When both sides of the form are completed. Page Number. Each form will be identified as a single page. U Block 5. U Block 9. Voucher Number. FROM b. UIC 5. JUL 03 U When material is returned.

JUL 03 Figure This applies to hand receipts only. U The following IR Cards will be used: It is recommended that when an account receives multiple copies of each edition of a short title. Conversion Report voucher numbers will also be recorded in the disposition portion of the IR Card to show why certain material is no longer in the account. Record information as is directed in the following paragraph. Enter the ALC for material represented. Enter serial numbers as follows: Correction fluid white-out can be used to make corrections to IR Cards.

Any combination of these may be used. Enter the edition designator or register number for the entry. Figures and show two methods of recording destruction. U Special Possession and Conversion Report voucher numbers will be recorded in the receipt portion of the IR Cards to show the source from which the material was received or modified. Single-line entries should be used for equipment entries to facilitate hand receipting and transfers.

Enter the physical location of material represented this entry is optional. In some cases. Enter account number of the shipper from block 2 of the incoming SF Enter the voucher serial number below the date.

The signature of the custodian and a witness in this column certifies that these two individuals personally destroyed the material. Enter the appropriate code to indicate the type of transaction: U For a transfer.

You might also like: DAVID ADGER CORE SYNTAX PDF

At the end of each month. Enter the Julian date of the transaction. For hand receipts and issues ALC 4. Enter the Julian date of local destruction or issue of ALC 4 material.

This procedure eliminates the requirement for individual Local Destruction Reports. Enter the Julian date from block 4 of the incoming SF The IR Card must be signed certifying destruction at the same time the destruction date is entered.

Enter the ALC number for material represented. Completion Instructions see Figures and This entry is optional for ALC 1 items.

Unlike DA Form E. Enter the quantity for all material that is accountable by quantity. If the item is an end item. U DA Form Enter the short title for the end item involved. D for Destruction. T for Transfer. When completing Items Register Cards. DA Form Enter the outgoing voucher serial number from block 4 of outgoing SF On-hand balances should be annotated in pencil to allow changes. Enter the number of days the equipment is out on loan. Enter the Julian date from block 4 of the outgoing SF TB b U If one serial number is used per line.

For hand receipts. This entry is not required for items the custodian is maintaining serial number accountability. Enter the service or agency borrowing the equipment. Enter the account number of the recipient from block 7 of the outgoing SF Enter the total on-hand balance with each entry.

U The following guidelines are applicable to the control of key tape segments. If the second letter matches the one in the first column. In addition to the SF hand receipt. An example would be: The first letter explains the number of keys.

Once the key tape segment disposition record has any information entered on it that reveals classified information e. The second letter gives the cryptoperiod.

A copy of the key disposition record will be retained upon destruction of key tape segments to identify those personnel actually performing destruction. U The second letter of the two-letter code is the cryptoperiod.. Use this disposition record as a management tool in the local accounting of key tape segments.

The following procedures apply to the use of key tape canisters: The information for these entries is contained in a two-letter code digraph to the left of the short title on the tape leader. DA Form E is a reproducible form in an easy-to. U If the first letter on the tape leader matches the one in the first column. The custodian will return the hand receipt SF to the user.

The use of diagonal lines or quotation marks is not authorized. If there are any key tape production problems discovered with the canister.

A there are two types of comsec equipment controlled

Retain the DA Form E with the associated tape canister until all tape segments have been destroyed. TB a U Single copies of key tape segments used for secure communications should be destroyed immediately after successful encryption of communications has been achieved.

When this is not possible. Should a custodian discover that a Local Destruction Report is not on file to support a Consolidated Destruction Report.

Key that is designed for off-the-air applications has no prescribed cryptoperiod and may be used until no longer serviceable. The unex posed duplicated segment s will be maintained for use backup in case of systems failure within the cryptoperiod and destroyed no later than 12 hours after the supersession date.

If due to system failures all duplicate copies are used and destroyed. The custodian will attach all local destruction documents directly to the Consolidated Destruction Report to ensure the records are not destroyed prematurely as well as for easy access for review by the custodian.

These entries are required each time a segment s is are pulled. If a security container has not been opened during a shift. In the event material cannot be located. G-2 and subsequent approval by the NSA b. This subparagraph applies only to physical hard copy key.

U Immediately after loading the DTD. U When duplicate key is on hand. The COMSEC Custodian is responsible for the key tape segment accounting procedures and the physical security of used key tape segments. Shift-to-shift accountability will be accomplished using the DA Form E included in Appendix D in conjunction with the key tape segment disposition record see figures and Seal the envelope. The second check is made by the COMSEC Custodian to verify that disposition records reflect the correct material issued to the user as shown on the hand receipt.

This should be clearly outlined in the hand-receipt holder briefings and local SOPs. Use the following two checks to account for used key tape segments. The following procedures apply when key tape segments in a canister are prematurely exposed: If a key tape segment or canister is misplaced. Ensure segments are destroyed or physically sighted by verifying the next upcoming segment in the key canister window. The first check is done at the operational area before each shift is relieved to ensure that all used key tape segments were placed in destruction channels i.

All accounting for used key tape segments must take place before the responsible shift is relieved. TB the envelope. A new envelope must then be prepared as stated in the preceding paragraph. U The loading of key into a DTD to satisfy emergency mission requirements. Hilliard 7 Jan 03 Teresa B. JUL 03 See paragraph 4. Hilliard 3 Jan 03 Teresa B. Hilliard 2 Jan 03 Teresa B. Figure 4 Moreno 3 Jan 03 Dennis R. Hilliard 1 Jan 03 Dennis R.

Hilliard 5 Jan 03 Teresa B. Hilliard 6 Jan 03 Dennis R. Hilliard 8 Jan 03 Teresa B. Moreno 8 Jan 03 Dennis R. Hilliard 5 Jan 03 Dennis R. Hilliard 2 Jan 03 Dennis R.

Related titles

Hilliard 31 Jan 03 Dennis R. Hilliard 1 Feb 03 Teresa B. Hilliard 7 Jan 03 Dennis R. Moreno 7 Jan 03 Dennis R.

Moreno 5 Jan 03 Dennis R. Moreno 2 Jan 03 Dennis R. SF Issue of ALC 4 material. This form is for use in printed hard copy. Enter the Julian date and voucher serial number.

Legible carbon-imprinted signatures on the SF are acceptable. Conversion Report. Outgoing Number. Enter short titles in alphanumerical sequence starting on line one. Inventory Report. All entries will be single-spaced. All other pages will be initialed or signed. Date of Report.

U Reports will be signed in black or blue ink. Multiple pages will be signed on the last page. U Individual s signing verifying deletions or corrections to an SF will initial the report in black or blue ink. Incoming Number optional. Hand Receipt. For TS material. Enter the calendar date the report is completed. Date of Transaction. Enter the calendar date on which the transaction occurred used for hand receipt and Incoming.

The year. Place an "X" in the appropriate sub-block for the type of report or action being completed: Transfer Report.. For information only. Enter the Julian date and voucher serial number e.

Place an "X" in the Received. Enter serial numbers for ALC 1 material. Include the following information: Accounting Numbers. Enter quantity of each line entry. Make an entry when appropriate or when directed in specific report instructions. When the serial numbers are not in series or the quantity is 1. The Material Hereon has been.In either case. CSLA will inform the commander what action is necessary to obtain approval.

U When the protective packaging is opened within the account and when the material is hand-receipted to a user. U Policies and Procedures for Property Accountability. T for Transfer. U Reports. Days