Authentication will be accomplished via secure communications means between the appropriate military authority and the ATCSCC for the implementation of ESCAT. Implementation will be validated with a call back via secure communications to the appropriate military authority. Further dissemination of information may be accomplished over non-secure communications.


Tried the LawStack mobile app?

Join thousands and try LawStack mobile for FREE today.

  • Carry the law offline, wherever you go.
  • Download CFR, USC, rules, and state law to your mobile device.