COMSEC material that has been superseded or is no longer needed and is
Superseded key cards, key lists, key tapes, pads, codes,
authenticators, or extracts thereof, will be destroyed immediately after
use, if possible. If immediate destruction is not possible, the key will be
destroyed within 72 hours of supersession. COMSEC material may be destroyed
by burning, pulverizing, chopping, shredding, or chemical alteration. The
preferred method of destruction is burning.
The materials are burnt
completely to reduce it to ash. Care should be taken to control the fire to
ensure that no burned pieces are allowed to escape.
The ashes should be
inspected and, if necessary, broken up or stirred. The destruction of key
material will be recorded as required by local policy.
Emergency evacuation and destruction plans are prepared to guard
against possible compromise of COMSEC material.
Emergency plans include
information on the location of keys, combinations, security containers, and
the assignment of specific duties. Duties in an emergency plan are assigned
by duty position rather than by name. Emergency plans address the measures
to be taken to effectively accomplish evacuation, storage, and/or
destruction of COMSEC material.
Emergency plans involving COMSEC are
integrated into the command emergency plans found in the unit SOP.
Evacuation of COMSEC material consists of removal of the material to a safe
location. During the removal, every effort is to be made to prevent loss or
When an area is to be evacuated, classified COMSEC
material may be placed in secure storage.
Secure storage consists of
securing the material in authorized vaults or safes. In this situation, a
guard(s) should remain in or around the storage area. You should consider
the likelihood of returning to the site before deciding to put COMSEC
material in secure storage.
Storage of material would serve no useful
purpose if a return to the area was not planned.
10. When a possible emergency is foreseen, take precautionary measures --
reduce COMSEC material holdings.
Precautionary actions can take the same
form as emergency actions. For example, future keying material and backup
systems may be stored. All superseded material, especially keying material,
should be destroyed at the first hint of an emergency. Removal or storage
of other than the superseded key should be considered before destruction.
11. When destruction of COMSEC material becomes necessary, material is
destroyed according to priority. Superseded, classified, key-marked crypto
is given the highest destruction priority.
Following that, current key
(except for authenticators and confidential operations codes) are destroyed.
Remaining COMSEC material is destroyed in the following order.