I’ve noticed that the programmable in-line encryption device KGV-72, NSN 5810-01-564-3364, is sometimes left unsecured.
I’ve seen some units unscrew the devices and store them outside the vehicles. It’s usually because the KGV-72 lock key is missing or the locking block is broken. What’s the solution for these problems?
TM 11-5810-268-13 (Nov 17) states that a KGV-72 must be secured using the built-in locking block (also known as lock provision). The devices are often unsecured or unscrewed and removed because a padlock key was lost or worse, the block was damaged (see the article HERE
According to the Communications Security Logistics Activity (CSLA), units must
ensure the KGV-72 is always locked. New KGV-72s come with four mounting screws and provision for a Series 200 lock; however, units must provide the lock itself.
Units can direct exchange a KGV-72 that has a broken locking block through the Army system, as long as FLIPL information is included with the request. Until the new KGV-72 is received, secure the damaged KGV-72 per unit SOP or guidance from the KGV-72 item manager.
Key loss is more often than not the result of lack of key control, which is a unit responsibility. The guidance and references provided HERE
apply to this situation. A lot of headaches can be avoided by ensuring there’s a key control SOP in place and that it’s followed.