unit files for a minimum of 90 days, and then they are disposed of according to the established procedures of the
concerned DOD component. The provisions of AR 25-400-2, The Modern Army Recordkeeping System
(MARKS), dated 15 October 1986, apply.
Inventories of keys and locks are conducted semiannually. Inventory records are retained in unit files for a
minimum of one year, and are then disposed of according to the established procedures of the DOD component
concerned. The requirements given in AR 25-400-2 apply.
When individuals (such as duty officers) must have keys immediately available for any reason, they must sign for
a sealed container of keys. A sealed container is a locked and sealed key container, or a sealed envelope
containing the key or the combination to the key container. When the sealed container of keys is transferred from
one individual to another, the unbroken seal is evidence that the keys have not been disturbed. The seal need not
be broken for an inventory of the keys. However, evidence of tampering with a sealed container requires an
inventory of the keys and other actions as determined by the commander. If the keys are not placed in a sealed
container, an inventory of the keys must be made by SN or using other identifying information on each key (such
as a stamped number on the key). The inventory and the change of custody must be recorded.
Combination Changes
The combinations to locks on vault doors or on class V security containers are changed annually or upon change
of custodian, armorer, or other person having knowledge of the combination. They are also changed when the
combination may have been compromised and when the container is first put into service. The combination is
recorded, sealed in an SF-700 (Security Container Information) envelope, and stored in a safe that meets the
storage requirements given in AR 380-5, Department of the Army Information Security Program, dated 25
February 1988. No other written record of the combination may be kept. Controls must be established to ensure
that envelopes containing combinations to locks are not made available to unauthorized personnel.
Replacement Locks and Keys
Replacement of lock cylinders and broken keys for high-security locks may be requested through normal supply
channels. Coordinate requests through the key control custodian. MACOMs are designated as approval
authorities for any deviation from normal key procurement procedures (such as requests for the procurement of
extra keys for high-security locks).
Intrusion Detection System
The IDS is an essential part of the physical security system. When used, it promotes the economical and efficient
use of manpower. The IDS must be an approved, DOD-standardized system, such as the Joint-Service Interior
Intrusion Detection System (J-SIIDS); the AN/GSS-20 alarm set, anti-intrusion, restricted area, which uses
microwave or ultrasonic signals to detect movement in an enclosed area; or commercial equipment that has been
approved by the appropriate DOD component according to DOD Directive 3224.3. Components of the J-SIIDS
are given first consideration. Before any commercial IDS is purchased, leased, or renewed for lease, technical
review and approval by the MACOM commander is required according to the procedures given in AR 190-13.
3-13
MM0170