CSC verbal 1 Flashcards
how far away from a suspected device can members transmit communications and what form is to assist bomb notifications
portable radio or cellphones within 50 feet
mobile radios within 100 feet
AF Form 440, Bomb Threat
all buildings within how many feet of a briefcase sized IED should be evacuated and how long before the known detonation time do you terminate the search for the device
500 feet
30 minutes prior to or after the known det time
Security Forces units will ensure what control centers are properly trained to receive bomb threat calls, tracing and recording procedures and appropriate notifications
BDOC FSCs MSC LDA CSC KCCC
what does the size of a cordon depend on
Scope
complexity
location of the incident
in the event a hostile action is directed towards the DoE shipment while on F.E. Warren AFB, DoE personnel are under the tactical direction of whom
the installation Commander
senior Security Forces Leader
what is a blocked card alarm and what are the procedures when the entry controller receives a blocked card alarm?
- badge has been blocked or revoked from the system
- individual will depart low side of booth and proved AECS badge and military ID
- EC will check badge against MRABL and PRP/AUof Notifications log
- If individual is not listed on MRABL, EC will contact pass and registration and ascertain status of individual and or badge
- if individual has been suspended, contact individuals security manager and verify status
- if individual is suspended, initiate attempted penetration procedures.
what does the FPCON system describe
- Progressive level of protective measures that are implemented by all the DOD Components in anticipation of or in response to a terrorist threat or attack
- principal means through which commanders apply an operational decision on how to best guard against the terrorist threat
- protective measures identified in the FPCON system assist commanders in reducing the risks of terrorist attacks and other security threats to DOD personnel, units and activities.
at a minimum who must know how and when to use duress words
all personnel granted unescorted entry into the WSA
define FPCON Bravo
applies when an increased or ore predictable threat of terrorist activity exists
how will blotter entries be written
clear
concise
grammatically correct
limit the info in the entry to pertinent info and a summary of the incident covering the details
what affects may occur with prolonged implementation of FPCON Charlie
create hardship and affect the activities of the unit and its personnel
who may replace security forces personnel posted on the inner perimeter during a hostage/barricaded subject situation, if they are available and appropriate for use by the OSC
specialized teams
when will s/cs not be used for emergency entry into the WSA
during emergency entry of USAF/DoE convoys under confirmed hostile attack
authentication matrix’s are used by whom? how will all other forces authenticate
w-2, w-18, CSC, BDOC
last name authentication
what will be accomplished prior to any Nuclear Weapon Movement
interior SRTs conduct sweeps of areas of responsibility
exterior SRTs will sweep a minimum of 300 meters from fence
what is usually necessary to ensure comparable security for compensatory measures
additional forces
equipment
delay
barriers
what are the individual responsibilities under the Air Force Nuclear Weapons Surety Program
- inform supervisors if they are not qualified to perform a particular task
- report nuclear safety hazards/deficiencies or security problems to supervisors and unit safety representatives
- comply with the Two person Concept
- identify unreliable personnel to their supervisors
- report information which could affect their own ability or reliability to perform a task due to medical other problems
if the blocking force is overcome, how must the AS reposition their forces
- AS must immediately position personnel to place fire on/across any actual or potential opening
- if hostile forces breach the fence line and scatter, final denial fire on all structures may be necessary
what are the five things that deviations shall be applicable to
- physical security facilities
- plans
- procedures
- equipment
- monitoring standards
how will both members of a patrol conduct a sector strife of an alarm on the perimeter of the WSA
- ISRTs will conduct an IVA in vehicles for all WSA perimeter alarms checking the affected sector, to include half of each adjoining sector
- the ISRT will scan the inner/outer clear zones looking for an obvious cause of alarm. the driver will maintain radio communication with CSC.
- immediately after the initial assessment the driver will tactically position the vehicle to provide cover while providing overwatch for the rifleman
- the rifleman will conduct a more detailed search by walking slowly through the affected and adjoining sectors looking for packages, holes in fence fabric, anything that may appear suspicious with the associated FDB, bunkers, cameras
- check the inner and outer 30 foot clear zones from the alarmed fence