FMS
No
BPC
Yes
Note Input Responsibility
CWD
Date Range Of Use
All
Note Usage

Mandatory for LOAs that add EEUM-designated UAS or UAS EEUM-designated components.

Mandatory for Amendments and Modifications that add or include EEUM-designated UAS or UAS EEUM-designated components if the newest version of the note is not on the implemented version of the case.

Note Text
  1. The Benefitting Country understands that this Unmanned Aerial System (UAS) has been designated for Enhanced End Use Monitoring (EEUM). The Benefitting Country has previously agreed to comply with all of the physical security, accountability, and end-use requirements associated with the UAS for the lifecycle of the system and allow the United States Government (USG) inventory verifications.

  2. The Benefitting Country will provide the Security Cooperation Organization (SCO) and/or other appropriate U.S. Government representatives a written letter of intent prior to receipt of the equipment.

  3. A storage facility visit must be conducted and certified by MILDEPs before EEUM -designated UAS or UAS EEUM -designated components are delivered.

  4. The Benefitting Country has previously agreed to implement the UAS security requirements as contained in this Security Note. Measures taken by the Benefitting Country to meet these requirements must be substantially the same degree of security protection the U.S. provides prior to delivery. Equivalence is determined by assessing the threat, security presence, detection capabilities, entry control measures, and response capabilities of the Benefitting Country.

  5. Site Certification. Prior to the delivery of the EEUM-designated UAS, EEUM-designated Ground Control Station (GCS), or EEUM-designated components, a physical security site certification will be performed by the USG. A copy of the approved physical security site certification will be kept on-site at each operational location and is reviewable at any time by inspectors conducting EEUM of the UAS. The USG will provide the Benefitting Country with a DoD Golden Sentry EEUM UAS checklist and serial numbers that will be referenced during all USG end-use, accountability and security verifications.

  6. Physical Security/Access Control. The UAS and EEUM-designated items/components shall be stored in facilities that are at least substantially the same degree of security protection the U.S. provides. Specific requirements for storage shall be agreed upon by the USG prior to delivery of the UAS. The standards will at least meet the following:

    1. Installation Perimeter/Boundary Controls. Perimeter controls will deter, detect, and delay unauthorized access to the UAS system. Access control points will be established to control authorized entry.

    2. Fencing. Restricted areas where the ground stations and/or UAS physically reside must be enclosed by a 7-foot chain link fence with continuous intrusion detection and electronic or human surveillance. UAS resources will be positioned at least 250 feet from the installation perimeter.

    3. Lighting. Restricted area lighting will be provided for installation perimeters and facility storage exterior doors to detect unauthorized entry.

    4. Intrusion Detection System (IDS). At a minimum, an operational IDS will be installed on storage facilities containing UAS, components, and technical data.

    5. Surveillance. A Closed Circuit Television camera system is required in all hangars, maintenance areas, and areas where classified UAS technical data/documents are stored and will be monitored by recorded electronic surveillance systems. Systems will provide 24/7 capability and be tamper protected and provide 60-days of playback capability.

    6. UAS EEUM-designated items/components. When not installed on the aircraft, UAS EEUM components shall be stored inside facilities with the following controls:

      1. In a steel cage that provides a minimum of 10 minutes of forced entry delay, that is secured by at least two high security locks.

      2. Keys to these locks are to be kept in a GSA Class-5 equivalent locked safe.

      3. Two-person rule A and B controls apply. No one person will have access to both keys at any time. Two-person rule A and B key custodian controls will be established and maintained.

      4. A key control register will be kept for those who access the storage area to record the time, date, and name of the person removing/using the keys, including the date and time of key return to the key custodian and secured in a locked safe.

    7. Access. The Benefitting Country shall establish a roster of all personnel who have been authorized access to the UAS, components, and technical data. The access roster will be kept to a minimum number of personnel on a need-to-know basis in order to complete their duties. The Benefitting Country will provide this listing to the USG and ensure that changes to the listing are promptly reported. No access to UAS, components, technical data, classified or unclassified information for third-country or third-party nationals is permitted by the Benefitting Country unless explicitly granted by USG.

      1. The Benefitting Country will create and maintain an access log to document all personnel access to the UAS, components, and technical data. The access log will contain at least the following:

        1. Date and Time

        2. Purpose for accessing the facility

        3. Full Name (Printed)

        4. Signature

    8. Security Control Center. UAS facilities must have a security control center, which is manned 24-hours per day and monitors all intrusion detection systems, alarms, and provides command, control and communications for security personnel. Physical protection of the security control center shall be equivalent to those outlined for the UAS and Ground Control Station.

    9. Security Forces. A dedicated internal security response team must be capable of responding immediately to threats/alarms. An additional armed response element of at least two personnel must be capable of responding within 10 minutes. Security Forces will be equipped with two-way communications and will conduct daily checks of restricted area perimeters and facilities and report security deficiencies or issues to the Security Control Center.

    10. Ground Control Station (Fixed and Mobile). Procedures and requirements for physical protection of UAS ground station hardware and software are equivalent to those outlined for the aircraft.

    11. Inventories. All EEUM-designated UAS items/components are to be inventoried 100% by serial number, on a quarterly basis. Inventory and accountability documentation maintained by the Benefitting Country must be retained for at least three-years and will be made available for review upon U.S. Government request.

  7. Maintenance. All UAS and EEUM-designated items will follow maintenance requirements listed in other notes of the LOA. Third country nationals, industries or their representative will not accomplish any maintenance functions unless approved in writing by the USG. Defective major components of the UAS will be returned to USG-designated depot level repair facilities and transported under proper security protection.

  8. Mandatory Reporting. Any unauthorized destruction, loss, theft, or access to the UAS hardware, software, or technical information, as well as any allegation, report, or evidence of unauthorized attempts to collect such information must be reported by the recipient government directly to the Security Cooperation Organization - U.S. Embassy within 24-hours. The Benefitting Country agrees to provide a written report with details of the incident within 30 calendar days to the U.S. Government. This report will include the steps being taken both to recover the equipment (if applicable) and to prevent recurrence.

  9. Demilitarization. The Benefitting Country will obtain USG disposition instructions that either direct transporting UAS or components back to the USG or designated staging area and/or comprehensive guidance on demilitarization/disposal management.

  10. Unauthorized Destruction, Loss, Theft, or Access. The Benefitting Country will immediately notify the U.S. Government (through the Security Cooperation Organization (SCO) to the Defense Security Cooperation Agency (DSCA)) of any disposal, compromises, or losses and provide necessary assistance if the U.S. Government desires to initiate recovery operations.