SlideShare a Scribd company logo
1 of 3
REVISED WEAPON MANAGEMENT AND ARMOURY CONTROL PROCEDURES
It was considered that a revised and simplifies set of weapon management and armory control
procedures would be more acceptable to the Army and Police than the slightly prescriptive set
produced for, and used by, the Police Force. The reasoning underlying this conclusion is that
if the rules are simple enough it will be more trouble to avoid them than to comply with them.
Some resistance to the use of armories based on the principal of private ownership can be
anticipated. Many weapons are the personal property of the officers and soldiers who carry
them. It is unclear how this situation has arisen since originally the vast majority of weapons
used by the security forces; police, army, custodian corps, will have been provided by the Said
Barre regime or the individual’s clan. Nonetheless it is an imperative that whatever system is
adopted it should be:
• Transparent
• Verifiable
• Robust
This will encourage confidence in the System, not only among those using it, but also, in the
case of clan owned weapons, in the case of the ultimate owners of the weapons. It can also be
argued that the Army and Police are both organizations requiring obedience to orders and
discipline within them. In return, for the additional responsibilities that members of the
organizations bear, and in return for their salaries obligations are placed upon the members.
One of these obligations is that their “arms bearing” is controlled by the superior chain of
command. There will be situations in which individuals have to carry arms of duty for self-
defense reasons. These should be the exception, rather than the rule, and such weapon bearing
should require the Commander’s explicit written permission. This should be recorded in the
Daily Occurrence Book in which the full explanation is given, and certified, by the
Commander. It is suggested that such permission should be for a limited time; and renewed if
necessary at the expiration of, say, one month.
Weapon Management and Armory Control among the security forces is the first, tentative, step
towards complete civil weapon registration and disarmament of the civil population. It is also
a major component of Security Sector Reform (SSR); which, in Somalia, is the precursor to
Disarmament, Demobilization, and Reintegration (DDR).
Weapon Registration, relies on a system of interlocking checks and balances, each of which is
recorded in an accountable document. Accountable documents are folios, books, registers or
cards that are required to be kept and produced and for inspection by higher authority, whether
that be the town council, the next level up the chain of command or an independent non-
governmental organization. Together the document set provides proof of weapon ownership
and management.
Step 1 Creation of a Weapon Register.
The Weapon Register is the master document linking a weapon to an individual. As such, it
has to be certified as accurate by the commander and the individual and kept up to date. It can
be a loose –leaf book; however Commanders and their assistants, Armorers, have to understand
that once completed, weapon register pages must not be destroyed. A sample page is at
Attachment 1, it contains details of:
• Weapon Type
• Weapon Serial Number
• Name of the Owner
• Owner’s Signature
• Butt Number
• Date of entry
• Commander’s Signature confirming that the details are correct
Step 2 Weapon Cards.
Weapon Cards are receipts for weapons in safe keeping. Hence, it is axiomatic that an
individual is never in possession of his weapon and weapon card simultaneously. Weapon
cards are accountable documents in the possession of the individual. Their loss should be
treated as seriously as the loss of a weapon since a weapon card can be used to obtain a
weapon. The Weapon Card bears the name of the individual, his signature, a description of the
type and serial number of the weapon and its butt number. The butt number identifies which
particular space in the armory is allocated to that weapon. A suggested layout for a weapon
card is shown at Attachment 2.
Step 3 Regular Armory Inspections.
Regular, independent, armory inspections provide all concerned; commanders, individuals,
armorers and third parties with an assurance that the armory is being properly managed and
that a degree of weapon control and management exists. The inspector collects a set of
Inspection sheets from the Armorer and consults the latest version of the Weapon Register.
This tells him how many weapons should be in the armory, he can then check that for each
weapon supposedly held either a weapon or weapon card is present. More thorough checks
may involve checking a sample of the weapon serial numbers to ensure that all entries in the
Weapon Register are correct. A specimen page showing a suggested layout of an Inspection
Sheet is at Attachment 3.
ARMORY PROCEDURES & WEAPON MANGEMENT
Armories. An Armory is a secure store for weapons. Security is achieved through the layer
system. The first layer of security is that the armory is sited within a secure area. The second
layer of security comes from the external door and walls. The external door is secured with a
security lock and windows are barred so that personnel may not gain entrance through them
without causing undue noise. The third layer of security is achieved through key control. Only
authorized personnel should have access to the armory key. The fourth layer of security comes
from access control, only personnel with legitimate business are allowed to enter the armory
and then only one at a time. This is achieved through an access control cage within the armory.
The fifth layer of security is achieved by securing the weapons being kept to their racks by
means of a chain and padlocks. Finally, only unloaded weapons are allowed into and out of the
armory. Hence, the weapons being stored may not be used to threaten the Armorer and, if
stolen the weapons are useless without a supply of ammunition. Thus a gang may not raid the
armory and instantly arm themselves for the creation of further mayhem.
Weapon Racks. Weapon racks are designed to hold weapons securely. They are wooden racks
that allow the weapon to stand upright and be secured so that individual weapons cannot be
removed from the racks unless unlocked by the Armorer. The rack has spaces for individual
weapons, typically 25/side. Each weapon space is numbered and weapons should always be
placed in their designated space. If a weapon is not present then its corresponding weapon card
should be; indicating that the legitimate owner has possession of it for official purposes.
Receiving Procedure. Only unloaded weapons are allowed in the armory and the process of
unloading is when most accidental discharges occur, hence weapons should be unloaded before
they are taken into the Armory. When an armory is sited an unloading bay should be sited
close to the entrance. The unloading bay is an area of raked and sifted earth, presenting a face
raked at an angle of approximately 40o
generally contained within sandbags, also filled with
raked sieved earth, at which weapons may be pointed. Should an accidental discharge occur
the round is absorbed by the earth without deflection, or ricochet. On presenting his weapon to
the armorer the individual proves that it is unloaded by “showing clear”.
Unloading Drills. The magazine is removed from the weapon and the working parts operated a
minimum of three times. The ejected round, if any, is then collected and replaced in the
magazine. The safety catch is removed and the unloaded WEAPON POINTED IN A SAFE
DIRECTION, the safety catch is removed and the action released. The safety catch is then
reapplied.
Showing Clear. The working parts are pulled, and held, to the rear. The “holding open catch”,
if any, is applied. The Armorer physically checks, with his finger, that no round is in the
chamber. On assuring himself that the weapon is unloaded he acknowledges this with the word
“CLEAR”. Only on hearing this word from the armorer will the individual allow the working
parts to travel forward. The individual then checks that the weapon is pointed in a safe
direction and releases the action. The Armorer then takes possession of the weapon and after
checking its Butt Number places it in its designated rack location. As he does this, he takes the
weapon card and hands it to the weapon owner.
Issuing Procedure. An individual approaches the armory and enters the access cage. He hands
his Weapon card to the Armorer. The Armorer checks the Butt Number and goes to that rack
space. He selects the weapon and hangs the Weapon Card in its place; the weapon is then
taken to the individual and the Armorer pulls the working parts to the rear and holding them to
the rear allows the individual to satisfy himself that there is no round in the chamber. The
individual then announces “CLEAR” and, on hearing this, the Armorer allows the working
parts to go forward and checks that the weapon is pointed in a safe direction before releasing
the action and reapplying the safety catch. The individual then takes charge of the weapon and
leaves the armory.

More Related Content

What's hot

Civil Military Relations
Civil Military RelationsCivil Military Relations
Civil Military RelationsRaj RANA
 
Theories of International Relations essay
Theories of International Relations essayTheories of International Relations essay
Theories of International Relations essayNatasha Alves
 
Compendio De Armas Disimuladas
Compendio De Armas DisimuladasCompendio De Armas Disimuladas
Compendio De Armas Disimuladasalbatross
 
Approaches to IR
Approaches to IRApproaches to IR
Approaches to IRKostyk Elf
 
Incident command
Incident commandIncident command
Incident commandBruce Mims
 
Historical World War II Pictures 1
Historical World War II Pictures 1Historical World War II Pictures 1
Historical World War II Pictures 1guimera
 
Concept of human security
Concept of human securityConcept of human security
Concept of human securityAdan Butt
 
Manual de Ensino Trabalho de Comando (EB60-ME-13.301)
Manual de Ensino Trabalho de Comando (EB60-ME-13.301)Manual de Ensino Trabalho de Comando (EB60-ME-13.301)
Manual de Ensino Trabalho de Comando (EB60-ME-13.301)Falcão Brasil
 
The Cold War
The Cold WarThe Cold War
The Cold Warcguccione
 
Depth study history germany unit 1
Depth study history germany unit 1 Depth study history germany unit 1
Depth study history germany unit 1 Wan Farida Hamimi
 
I. strategic stadies and international relations
I. strategic stadies and international relationsI. strategic stadies and international relations
I. strategic stadies and international relationsrizkiar
 
WWII Ch 31
WWII Ch 31WWII Ch 31
WWII Ch 31grieffel
 
Teoria e-imagenes-balistica-forense lic.cottier-2011
Teoria e-imagenes-balistica-forense lic.cottier-2011Teoria e-imagenes-balistica-forense lic.cottier-2011
Teoria e-imagenes-balistica-forense lic.cottier-2011Silvia Alvarez Luna
 
[2012 12-04 3] - terrorism definition and type
[2012 12-04 3] - terrorism definition and type[2012 12-04 3] - terrorism definition and type
[2012 12-04 3] - terrorism definition and typeCarlos Oliveira
 
Arms Control and Disarmament
Arms Control and DisarmamentArms Control and Disarmament
Arms Control and DisarmamentAnikesh Sinha
 

What's hot (20)

Civil Military Relations
Civil Military RelationsCivil Military Relations
Civil Military Relations
 
Theories of International Relations essay
Theories of International Relations essayTheories of International Relations essay
Theories of International Relations essay
 
Pistola 1
Pistola 1Pistola 1
Pistola 1
 
Terrorism
TerrorismTerrorism
Terrorism
 
Compendio De Armas Disimuladas
Compendio De Armas DisimuladasCompendio De Armas Disimuladas
Compendio De Armas Disimuladas
 
Approaches to IR
Approaches to IRApproaches to IR
Approaches to IR
 
Incident command
Incident commandIncident command
Incident command
 
The Great Debates.ppt
The Great Debates.pptThe Great Debates.ppt
The Great Debates.ppt
 
Historical World War II Pictures 1
Historical World War II Pictures 1Historical World War II Pictures 1
Historical World War II Pictures 1
 
Concept of human security
Concept of human securityConcept of human security
Concept of human security
 
Manual de Ensino Trabalho de Comando (EB60-ME-13.301)
Manual de Ensino Trabalho de Comando (EB60-ME-13.301)Manual de Ensino Trabalho de Comando (EB60-ME-13.301)
Manual de Ensino Trabalho de Comando (EB60-ME-13.301)
 
The Cold War
The Cold WarThe Cold War
The Cold War
 
Depth study history germany unit 1
Depth study history germany unit 1 Depth study history germany unit 1
Depth study history germany unit 1
 
Hezbollah
HezbollahHezbollah
Hezbollah
 
I. strategic stadies and international relations
I. strategic stadies and international relationsI. strategic stadies and international relations
I. strategic stadies and international relations
 
Just war theory
Just war theoryJust war theory
Just war theory
 
WWII Ch 31
WWII Ch 31WWII Ch 31
WWII Ch 31
 
Teoria e-imagenes-balistica-forense lic.cottier-2011
Teoria e-imagenes-balistica-forense lic.cottier-2011Teoria e-imagenes-balistica-forense lic.cottier-2011
Teoria e-imagenes-balistica-forense lic.cottier-2011
 
[2012 12-04 3] - terrorism definition and type
[2012 12-04 3] - terrorism definition and type[2012 12-04 3] - terrorism definition and type
[2012 12-04 3] - terrorism definition and type
 
Arms Control and Disarmament
Arms Control and DisarmamentArms Control and Disarmament
Arms Control and Disarmament
 

Viewers also liked

Elbrus 2003, Russia
Elbrus 2003, RussiaElbrus 2003, Russia
Elbrus 2003, RussiaJim Geiger
 
Quantum vacation - Hyderabad / Gachibowli
Quantum vacation - Hyderabad / GachibowliQuantum vacation - Hyderabad / Gachibowli
Quantum vacation - Hyderabad / GachibowliQuantum vacations
 
Radio comunication 101
Radio comunication 101Radio comunication 101
Radio comunication 101Tony Taylor
 
Digital Citizenship (2016)
Digital Citizenship (2016)Digital Citizenship (2016)
Digital Citizenship (2016)Daniel Budd
 
Mr. tiger goes wild teacher companion digital art
Mr. tiger goes wild teacher companion digital artMr. tiger goes wild teacher companion digital art
Mr. tiger goes wild teacher companion digital artArtfulArtsyAmy
 
Digital Transformation Paris 2015
Digital Transformation Paris 2015Digital Transformation Paris 2015
Digital Transformation Paris 2015Jane McConnell
 
Automação de Teste para REST, Web e Mobile
Automação de Teste para REST, Web e MobileAutomação de Teste para REST, Web e Mobile
Automação de Teste para REST, Web e MobileElias Nogueira
 
Introdução ao desenvolvimento de aplicações web
Introdução ao desenvolvimento de aplicações webIntrodução ao desenvolvimento de aplicações web
Introdução ao desenvolvimento de aplicações webRodrigo Branas
 
Dogmatic Close Quarter Battle (CQB)
Dogmatic Close Quarter Battle (CQB)Dogmatic Close Quarter Battle (CQB)
Dogmatic Close Quarter Battle (CQB)CQB TEAM
 
Start IoT with jQueryMobile - 기초6
Start IoT with jQueryMobile - 기초6Start IoT with jQueryMobile - 기초6
Start IoT with jQueryMobile - 기초6Park Jonggun
 
Start IoT with JavaScript - 1.기초
Start IoT with JavaScript - 1.기초Start IoT with JavaScript - 1.기초
Start IoT with JavaScript - 1.기초Park Jonggun
 
Curso Treinamento Automação de testes com Selenium Qualister
Curso Treinamento Automação de testes com Selenium QualisterCurso Treinamento Automação de testes com Selenium Qualister
Curso Treinamento Automação de testes com Selenium QualisterQualister
 
TDC2016SP - Trilha Digital Transformation
TDC2016SP - Trilha Digital TransformationTDC2016SP - Trilha Digital Transformation
TDC2016SP - Trilha Digital Transformationtdc-globalcode
 
Sanders, Digital Art History Project Proposals for the Getty Research Institute
Sanders, Digital Art History Project Proposals for the Getty Research InstituteSanders, Digital Art History Project Proposals for the Getty Research Institute
Sanders, Digital Art History Project Proposals for the Getty Research InstituteAshley Sanders, Ph.D.
 
Causes, Effects and Precautions against Earthquake
Causes, Effects and Precautions against EarthquakeCauses, Effects and Precautions against Earthquake
Causes, Effects and Precautions against Earthquakesaqlain_01
 

Viewers also liked (20)

Quantum vacation Hyderabad
Quantum vacation HyderabadQuantum vacation Hyderabad
Quantum vacation Hyderabad
 
Elbrus 2003, Russia
Elbrus 2003, RussiaElbrus 2003, Russia
Elbrus 2003, Russia
 
R. Klingbeil, 2013: Where Do We Go Now? Opportunities and Challenges for Wate...
R. Klingbeil, 2013: Where Do We Go Now? Opportunities and Challenges for Wate...R. Klingbeil, 2013: Where Do We Go Now? Opportunities and Challenges for Wate...
R. Klingbeil, 2013: Where Do We Go Now? Opportunities and Challenges for Wate...
 
Quantum vacation - Hyderabad / Gachibowli
Quantum vacation - Hyderabad / GachibowliQuantum vacation - Hyderabad / Gachibowli
Quantum vacation - Hyderabad / Gachibowli
 
Radio comunication 101
Radio comunication 101Radio comunication 101
Radio comunication 101
 
Apostila ms-project
Apostila ms-projectApostila ms-project
Apostila ms-project
 
Digital Citizenship (2016)
Digital Citizenship (2016)Digital Citizenship (2016)
Digital Citizenship (2016)
 
N. Momjian & R. Klingbeil, 2014. Legal Issues and the ESCWA-BGR Inventory on ...
N. Momjian & R. Klingbeil, 2014. Legal Issues and the ESCWA-BGR Inventory on ...N. Momjian & R. Klingbeil, 2014. Legal Issues and the ESCWA-BGR Inventory on ...
N. Momjian & R. Klingbeil, 2014. Legal Issues and the ESCWA-BGR Inventory on ...
 
Documentação Ágil
Documentação ÁgilDocumentação Ágil
Documentação Ágil
 
Mr. tiger goes wild teacher companion digital art
Mr. tiger goes wild teacher companion digital artMr. tiger goes wild teacher companion digital art
Mr. tiger goes wild teacher companion digital art
 
Digital Transformation Paris 2015
Digital Transformation Paris 2015Digital Transformation Paris 2015
Digital Transformation Paris 2015
 
Automação de Teste para REST, Web e Mobile
Automação de Teste para REST, Web e MobileAutomação de Teste para REST, Web e Mobile
Automação de Teste para REST, Web e Mobile
 
Introdução ao desenvolvimento de aplicações web
Introdução ao desenvolvimento de aplicações webIntrodução ao desenvolvimento de aplicações web
Introdução ao desenvolvimento de aplicações web
 
Dogmatic Close Quarter Battle (CQB)
Dogmatic Close Quarter Battle (CQB)Dogmatic Close Quarter Battle (CQB)
Dogmatic Close Quarter Battle (CQB)
 
Start IoT with jQueryMobile - 기초6
Start IoT with jQueryMobile - 기초6Start IoT with jQueryMobile - 기초6
Start IoT with jQueryMobile - 기초6
 
Start IoT with JavaScript - 1.기초
Start IoT with JavaScript - 1.기초Start IoT with JavaScript - 1.기초
Start IoT with JavaScript - 1.기초
 
Curso Treinamento Automação de testes com Selenium Qualister
Curso Treinamento Automação de testes com Selenium QualisterCurso Treinamento Automação de testes com Selenium Qualister
Curso Treinamento Automação de testes com Selenium Qualister
 
TDC2016SP - Trilha Digital Transformation
TDC2016SP - Trilha Digital TransformationTDC2016SP - Trilha Digital Transformation
TDC2016SP - Trilha Digital Transformation
 
Sanders, Digital Art History Project Proposals for the Getty Research Institute
Sanders, Digital Art History Project Proposals for the Getty Research InstituteSanders, Digital Art History Project Proposals for the Getty Research Institute
Sanders, Digital Art History Project Proposals for the Getty Research Institute
 
Causes, Effects and Precautions against Earthquake
Causes, Effects and Precautions against EarthquakeCauses, Effects and Precautions against Earthquake
Causes, Effects and Precautions against Earthquake
 

REVISED WEAPON MANAGEMENT AND ARMOURY CONTROL PROCEDURES (

  • 1. REVISED WEAPON MANAGEMENT AND ARMOURY CONTROL PROCEDURES It was considered that a revised and simplifies set of weapon management and armory control procedures would be more acceptable to the Army and Police than the slightly prescriptive set produced for, and used by, the Police Force. The reasoning underlying this conclusion is that if the rules are simple enough it will be more trouble to avoid them than to comply with them. Some resistance to the use of armories based on the principal of private ownership can be anticipated. Many weapons are the personal property of the officers and soldiers who carry them. It is unclear how this situation has arisen since originally the vast majority of weapons used by the security forces; police, army, custodian corps, will have been provided by the Said Barre regime or the individual’s clan. Nonetheless it is an imperative that whatever system is adopted it should be: • Transparent • Verifiable • Robust This will encourage confidence in the System, not only among those using it, but also, in the case of clan owned weapons, in the case of the ultimate owners of the weapons. It can also be argued that the Army and Police are both organizations requiring obedience to orders and discipline within them. In return, for the additional responsibilities that members of the organizations bear, and in return for their salaries obligations are placed upon the members. One of these obligations is that their “arms bearing” is controlled by the superior chain of command. There will be situations in which individuals have to carry arms of duty for self- defense reasons. These should be the exception, rather than the rule, and such weapon bearing should require the Commander’s explicit written permission. This should be recorded in the Daily Occurrence Book in which the full explanation is given, and certified, by the Commander. It is suggested that such permission should be for a limited time; and renewed if necessary at the expiration of, say, one month. Weapon Management and Armory Control among the security forces is the first, tentative, step towards complete civil weapon registration and disarmament of the civil population. It is also a major component of Security Sector Reform (SSR); which, in Somalia, is the precursor to Disarmament, Demobilization, and Reintegration (DDR). Weapon Registration, relies on a system of interlocking checks and balances, each of which is recorded in an accountable document. Accountable documents are folios, books, registers or cards that are required to be kept and produced and for inspection by higher authority, whether that be the town council, the next level up the chain of command or an independent non- governmental organization. Together the document set provides proof of weapon ownership and management. Step 1 Creation of a Weapon Register. The Weapon Register is the master document linking a weapon to an individual. As such, it has to be certified as accurate by the commander and the individual and kept up to date. It can be a loose –leaf book; however Commanders and their assistants, Armorers, have to understand that once completed, weapon register pages must not be destroyed. A sample page is at Attachment 1, it contains details of: • Weapon Type
  • 2. • Weapon Serial Number • Name of the Owner • Owner’s Signature • Butt Number • Date of entry • Commander’s Signature confirming that the details are correct Step 2 Weapon Cards. Weapon Cards are receipts for weapons in safe keeping. Hence, it is axiomatic that an individual is never in possession of his weapon and weapon card simultaneously. Weapon cards are accountable documents in the possession of the individual. Their loss should be treated as seriously as the loss of a weapon since a weapon card can be used to obtain a weapon. The Weapon Card bears the name of the individual, his signature, a description of the type and serial number of the weapon and its butt number. The butt number identifies which particular space in the armory is allocated to that weapon. A suggested layout for a weapon card is shown at Attachment 2. Step 3 Regular Armory Inspections. Regular, independent, armory inspections provide all concerned; commanders, individuals, armorers and third parties with an assurance that the armory is being properly managed and that a degree of weapon control and management exists. The inspector collects a set of Inspection sheets from the Armorer and consults the latest version of the Weapon Register. This tells him how many weapons should be in the armory, he can then check that for each weapon supposedly held either a weapon or weapon card is present. More thorough checks may involve checking a sample of the weapon serial numbers to ensure that all entries in the Weapon Register are correct. A specimen page showing a suggested layout of an Inspection Sheet is at Attachment 3. ARMORY PROCEDURES & WEAPON MANGEMENT Armories. An Armory is a secure store for weapons. Security is achieved through the layer system. The first layer of security is that the armory is sited within a secure area. The second layer of security comes from the external door and walls. The external door is secured with a security lock and windows are barred so that personnel may not gain entrance through them without causing undue noise. The third layer of security is achieved through key control. Only authorized personnel should have access to the armory key. The fourth layer of security comes from access control, only personnel with legitimate business are allowed to enter the armory and then only one at a time. This is achieved through an access control cage within the armory. The fifth layer of security is achieved by securing the weapons being kept to their racks by means of a chain and padlocks. Finally, only unloaded weapons are allowed into and out of the armory. Hence, the weapons being stored may not be used to threaten the Armorer and, if stolen the weapons are useless without a supply of ammunition. Thus a gang may not raid the armory and instantly arm themselves for the creation of further mayhem. Weapon Racks. Weapon racks are designed to hold weapons securely. They are wooden racks that allow the weapon to stand upright and be secured so that individual weapons cannot be removed from the racks unless unlocked by the Armorer. The rack has spaces for individual
  • 3. weapons, typically 25/side. Each weapon space is numbered and weapons should always be placed in their designated space. If a weapon is not present then its corresponding weapon card should be; indicating that the legitimate owner has possession of it for official purposes. Receiving Procedure. Only unloaded weapons are allowed in the armory and the process of unloading is when most accidental discharges occur, hence weapons should be unloaded before they are taken into the Armory. When an armory is sited an unloading bay should be sited close to the entrance. The unloading bay is an area of raked and sifted earth, presenting a face raked at an angle of approximately 40o generally contained within sandbags, also filled with raked sieved earth, at which weapons may be pointed. Should an accidental discharge occur the round is absorbed by the earth without deflection, or ricochet. On presenting his weapon to the armorer the individual proves that it is unloaded by “showing clear”. Unloading Drills. The magazine is removed from the weapon and the working parts operated a minimum of three times. The ejected round, if any, is then collected and replaced in the magazine. The safety catch is removed and the unloaded WEAPON POINTED IN A SAFE DIRECTION, the safety catch is removed and the action released. The safety catch is then reapplied. Showing Clear. The working parts are pulled, and held, to the rear. The “holding open catch”, if any, is applied. The Armorer physically checks, with his finger, that no round is in the chamber. On assuring himself that the weapon is unloaded he acknowledges this with the word “CLEAR”. Only on hearing this word from the armorer will the individual allow the working parts to travel forward. The individual then checks that the weapon is pointed in a safe direction and releases the action. The Armorer then takes possession of the weapon and after checking its Butt Number places it in its designated rack location. As he does this, he takes the weapon card and hands it to the weapon owner. Issuing Procedure. An individual approaches the armory and enters the access cage. He hands his Weapon card to the Armorer. The Armorer checks the Butt Number and goes to that rack space. He selects the weapon and hangs the Weapon Card in its place; the weapon is then taken to the individual and the Armorer pulls the working parts to the rear and holding them to the rear allows the individual to satisfy himself that there is no round in the chamber. The individual then announces “CLEAR” and, on hearing this, the Armorer allows the working parts to go forward and checks that the weapon is pointed in a safe direction before releasing the action and reapplying the safety catch. The individual then takes charge of the weapon and leaves the armory.