(1) Key and COMSEC documents are destroyed as the commander specifies. Devices or methods
approved for routine destruction are acceptable, if the device or method used will totally destroy the material. The
following can be used to destroy documents:
(b) Document destroyer kits.
(c) Incendiary file destroyer.
(2) COMSEC equipment, as a general guideline, is only destroyed as a last resort to prevent it from
falling into unauthorized hands. Its destruction must be thorough enough to destroy all logic circuits. If the
classified assemblies are destroyed, the remainder of the equipment does not have to be destroyed. The following
are approved for emergency destruction:
(a) Thermite incendiaries.
(c) Fire axes.
(d) Acetylene torches.
(e) Whenever emergency plans are used, message reports are sent to several addressees. A copy
Activity. The COMSEC supporting elements within the chain of command also receive a copy. TB 380-41
contains the addresses.
(3) If an emergency incident does not result in a security violation, the report will:
(a) List the material destroyed or relocated.
(b) State the method and degree of destruction.
(c) State the circumstances that caused the emergency plans to be used.
(4) If an emergency incident results in a security violation, four separate reports are sent.
(a) The initial report provides all available facts about the destruction or abandonment of