Physical Security Flashcards
____ is an executive-level forum that meets at least semi-annually to develop and refine antiterrorism program guidance, policy, and standards and act upon recommendations of the Antiterrorism Working Group and Threat Working Group to determine resource allocation priorities and mitigate or eliminate terrorism-related vulnerabilities.
The Antiterrorism Executive Committee (ATEC)
This group is responsible for assessing requirements for physical security, recommending and developing policy, preparing planning documents, and conducting criticality, vulnerability, and risk assessments.
ATWG stands for Antiterrorism Working Group. (ATWG)
This group is responsible for identifying foreign, domestic, and local threats and informing the installation commanding officer (CO) of current threat trends in the area of responsibility.
TWG is also known as the Threat Working Group. (TWG)
Note: The TWG is comprised of the Antiterrorism Officer, counterintelligence representative, law enforcement representative, operations security officer, information operations representative, and a chemical, biological, radiological, nuclear, and high yield explosives (CBRNE) representative. Commanders of larger installations may choose to include more individuals in their TWG.
_____ meets quarterly to provide advocacy, coordination, and oversight to assist in both vertical and horizontal mission assurance alignment efforts on issues that cut across all DoD protection programs, including antiterrorism.
The Mission Assurance Senior Steering Group (MA SSG)
_____ are designated for the security or safeguarding of property or material. Facility directors or installation commanders designate these areas.
Restricted Areas
Note: Restricted areas improve security by controlling access and providing additional layers of security.
Various types of physical security countermeasures include:
- Protective barriers
- Site lighting
- Security forces
- Security systems
- Facility access control
- Lock and key systems
- Storage containers and facilities
Protective Barriers
The first line of defense in any physical security system is usually some form of perimeter protection system. The perimeter of an installation or facility is the outermost area of responsibility.
Site Lighting
Lighting can be used for several purposes. It enables guard force personnel to observe activities inside or around an installation. Adequate lighting for all approaches to an area not only discourages attempted unauthorized entry, but also reveals persons within a given area.
_____ are made up of DoD civilian personnel, military personnel, and contract personnel who are employees of a private or commercial source contracted by the federal government, and even trained dogs, all of whom play an active part in protecting our national security and other DoD assets.
Security Forces
Security systems play an important role in protecting national security and other DoD assets. Security systems include:
- Interior intrusion detection systems (IDS)
- Exterior IDS
- Closed circuit television (CCTV) systems
- Access control systems
- Screening equipment
- Two-way radios
The purpose of an _____ is to deter, detect, document, and deny or delay intrusion.
Intrusion Detection System (IDS) // Interior IDS
____ is an excellent means for deterring and detecting loss, theft, or misuse of government property. They are used in a variety of facilities on installations and activities, including commissaries and exchanges.
CCTV
Note: CCTV systems have a camera that captures a visual image, converts it to a video signal and transmits it to a remote location. At the remote location the image can be received, displayed, recorded, and printed.
_____ is a process for ensuring that only authorized personnel are allowed into a designated area. This controls are implemented to prevent unauthorized personnel from entering designated areas. This control is one of the inner layers in the overall security-in-depth approach.
Access Control
At DoD installations and facilities, you may encounter guard force personnel using x-ray machines, similar to those seen at airports, scanning hand carried baggage coming into a facility.
Screening Equipment
Note: Additional measures, including portable hand held metal detectors, permanently installed metal detectors, and other specialized equipment may also be used before personnel are granted access to certain areas.
_____ typically serve as the primary means of communication between response forces and their respective control centers, as well as communication between response force members
Two-way radios
Note: While two- way radios are a great tool, there must be backup communications systems available in the event of a catastrophic radio failure. A good Plan B is always necessary!
Within the DoD, there are two primary types of locks that you will see being used.
These are combination and key-operated locks.
There are three types of approved combination locks used for the safeguarding of classified information.
- electromechanical lock used to secure classified material
- mechanical lock
- combination padlock
_____ is the authority to approve security containers used to store classified information. Security containers approved for storage of classified information are tested and certified by that same entity to ensure that a minimum level of protection against specified methods of unauthorized entry is provided.
General Service Administration (GSA)
_____ plans are comprehensive written plans providing for appropriate and economical use of personnel and equipment to prevent or minimize criminal or disruptive activities. It is essential that each installation, unit, or activity develop, implement, and maintain
Physical Security Plans
Note: Physical security plans have the potential to be designated For Official Use Only (FOUO) or may even be classified, and must be protected accordingly.
What ensures that everyone involved knows the procedures so that duties are carried out consistently and uniformly? They are supplemental guidance for implementing specific components of your physical security program.
SOPs and Post Orders
Note: SOPs are typically established to cover events such as fire, explosion, civil disturbance, major accidents, hostage situations, sabotage, bomb threats, terrorism attacks, and natural disasters.
Post orders typically establish duties, roles, and responsibilities at individual assignments, checkpoints, gates, and guard posts.
There are two types of inspections:
compliance inspections and self-inspections.
This type of inspection focuses on ensuring regulatory requirements are being met, usually by someone who may be in your immediate chain of command or higher headquarters. Assist visits, command inspections, and Inspector General (IG) inspections are examples of this inspection.
Compliance Inspections
This type of inspection is a review conducted by members of your own organization, usually with the aid of a checklist. This may serve to aid internal control, prepare for compliance inspections, and ensure your physical security program is implemented in a cost effective manner.
Self-inspections
Defensive measures used to reduce the vulnerability of individuals and property to terrorist attacks, to include limited response and containment
Antiterrorism
T or F: Terrorist threat levels should not be confused with Force Protection Conditions, also known as FPCONs.
True
Note: Threat levels are provided to senior leaders in order to assist in determining the appropriate FPCON level.
DoD uses a set of standardized terms to quantify terrorist threat levels. Threat levels are identified as Low, Moderate, Significant, and High.
- Low signifies no terrorist group is detected or the terrorist group is non-threatening.
- Moderate signifies terrorists are present but there are no indications of anti-U.S. activity. The Operating Environment favors the Host Nation or the U.S.
- Significant signifies anti-U.S. terrorists are present and they attack personnel as their preferred method of operation, or a group uses large casualty-producing attacks as their preferred method, but has limited operational activity. The Operating Environment is neutral.
- High signifies anti-U.S. terrorists are operationally active and use large casualty-producing attacks as their preferred method of operation. There is a substantial DoD presence, and the Operating Environment favors the terrorist.
What is defined as actions taken to prevent or mitigate hostile actions against DoD personnel, including family members, resources, facilities, and critical information.
Force Protections (FPCONs)
FPCONs are a DoD-approved system that standardizes the Department’s identification and recommended preventive actions and responses to terrorist threats to U.S. assets.
There are five FPCONs for DoD.
They are NORMAL, ALPHA, BRAVO, CHARLIE, and DELTA.
The two primary purposes of physical security are protection and _____
prevention
Feedback: The two primary purposes of physical security are protection and prevention.
A guard checking IDs at the gate of an installation is a good example of
what type of security?
Point Security
Feedback: A guard checking IDs is a good example of point security.
___________ is the layering of physical security countermeasures such as fencing, guards, cameras, lighting, and locks.
Security in depth
Feedback: Security-in-depth is the layering of physical security countermeasures such as fencing, guards, cameras, lighting, and locks.
Which policy guidance would you consult to find the minimum standards for the physical protection of DoD assets?
DoD 5200.08-R, Physical Security Program
Feedback: You should consult DoD 5200.08-R, Physical Security Program, to find the minimum standards for the physical protection of DoD assets.
T or F: You must identify assets, threats and vulnerabilities before you can conduct a risk analysis based on the impact and likelihood of an unwanted event happening.
True
Which policy should you consult to find the physical security requirements of protecting classified information?
DoDM 5200.01, Volumes 1-4 DoD Information Security Program
Feedback: You should consult DoDM 5200.01, Volumes 1-4, DoD Information Security Program, to find the physical security requirements for protecting classified information.
Which policy authorizes commanders to issue regulations for the protection or security of property and places under their command?
DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical
Security Review Board (PSRB) (correct answer)
Feedback: DoDI 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB), authorizes commanders to issue regulations for the protection or security of property and places under their command.
Who is charged with management, implementation, and direction of all physical security programs?
Physical Security Officer
Feedback: The physical security officer is charged with management, implementation, and direction of all physical security programs.
Who is responsible for providing valuable information on the capabilities, intentions, and threats of adversaries?
CI Support
Feedback: CI support is responsible for providing valuable information on the capabilities, intentions, and threats of adversaries.
Who is responsible for developing countermeasures against potential threats to national security and other DoD assets?
OPSEC Officer
Feedback: The OPSEC officer analyzes threats to assets and their vulnerabilities.
Who should be included in a Threat Working Group?
Antiterrorism Officer
Counterintelligence (CI) representative
Law enforcement representative
Operations security officer
Information operations representative
Chemical, biological, radiological, nuclear and high yield explosive representative
Feedback: All of these individuals should be included in a Threat Working Group (TWG). In addition, commanders of larger installations may choose to include more individuals in their TWG.
Which of these can be made of solid steel to make them more attack resistant?
Doors
Feedback: Doors are a weak spot on a building and can be made of solid steel to make them more attack-resistant.
Which of these house ventilation systems that should be secured with steel bars?
Roofs
Feedback: Roofs house air conditioning units and ventilation systems that should be secured with steel bars.
Which of these should be covered with a protective film to make them less dangerous in an attack?
Windows
Feedback: Windows should be covered with a protective film to make them shatter-proof.
Which of the following locks are approved to secure classified information or material?
Kaba Mas X-10
S&G 8077/AD
The Kaba Mas X-10 is one of several locks that meet FF-L-2740 series lock specification which are approved for securing classified information. Sargent and Greenleaf (S&G) 8077/AD can be used for storage of Secret or Confidential bulk or temporary indoor storage.
True or False. Standby lighting is used when regular lighting is not available.
False
Feedback: Emergency lighting is used when regular lighting is not available. Standby lighting is used when additional lighting is necessary.
True or False. Site lighting is used to enable guard force personnel to observe activities inside or outside the installation.
True
Feedback: Site lighting is used to enable guard force personnel to observe activities inside or outside the installation.
True or False. Movable lighting is used when supplemental lighting is needed such as at construction sites.
True
Feedback: Movable lighting is used when supplemental lighting is needed such as at construction sites.
At a minimum _________ should include special and general guard orders, access and material control, protective barriers, lighting systems, locks, and Intrusion Detection Systems (IDS).
Physical Security Plans
Feedback: At a minimum physical security plans should include special and general guard orders, access and material control, protective barriers, lighting systems, locks, and Intrusion Detection Systems (IDS).
________ establish duties, roles, and responsibilities at individual assignments, checkpoints, gates, and guard posts.
Post Orders
Feedback: Post orders establish duties, roles, and responsibilities at individual assignments, checkpoints, gates, and guard posts.
___________provide supplemental guidance for physical security programs and establish procedures for emergency events as well as operational and administrative procedures.
Standard Operating Procedures
Feedback: SOPs provide supplemental guidance for physical security programs and establish procedures for emergency events as well as operational and administrative procedures.
True or False. Commanders may only implement measures according to the FPCON level in force at the time.
False
Feedback: The FPCON system allows commanders to be flexible and adaptable in developing and implementing antiterrorism measures that are more stringent than those mandated by higher authorities whenever FPCONS are invoked.
True or False. Commanders must comply with and integrate DoD physical security and installation access control policies into their FPCON plans.
True
Feedback: Commanders must comply with and integrate DoD physical security and installation access control policies into their FPCON plans.
True or False. Commanders educate their personnel on the insider threat to DoD elements and personnel.
True
Feedback: Commanders educate their personnel on the insider threat to DoD elements and personnel in accordance with the November 21, 2012 Presidential Memorandum and with DoDD 5205.16, The DoD Insider Threat Program.
Integrating layers of security to protect DoD assets
Security in depth
Guarding a specific asset or resource
Point Security
Protecting an entire area such as an installation or facility
Area Security
Designating islands of high security within a sea of moderate security
Enclaving
NOTE: Signage serves many purposes on DoD installations and facilities. Signs can be informational to communicate messages, such as directing individuals to various locations, or they can be regulatory and serve as a deterrent, such as establishing boundaries for restricted areas.
Note: Signage serves many purposes on DoD installations and facilities. Signs can be informational to communicate messages, such as directing individuals to various locations, or they can be regulatory and serve as a deterrent, such as establishing boundaries for restricted areas.
Fencing can be either permanent or temporary.
- Chain link is one of the most common types of permanent fencing material.
- Barbed wire can be used as permanent fencing or as a temporary barrier.
_____ wire, also known as razor wire, is a commercially manufactured wire coil of high-strength steel barbed wire, clipped together at intervals to form a cylinder
Concertina Wire
It is widely used to warehouses, prisons, military installations, and field locations. Concertina wire can be used as permanent fencing when used as an outrigger on top of a chain link fence. This is a common use in combat environments to prevent unauthorized entry into an area or installation.
_____ is commonly used as a temporary barrier around construction sites and may also be used for crowd control.
Plastic netting
The netting is a good resource for clearly identifying areas personnel should not enter.
_____ are considered active if they require action by personnel or equipment to permit entry.
Active Barriers
_____ an area inside and outside the perimeter fence or barrier of the protected area. This area provide increased effectiveness of physical barriers, allow security forces to have unimpeded observation, and prevent intruders from being able to hide.
Clear zones
Note: Site lighting is used for several purposes in support of physical security. Site lighting supplements other protective measures such as patrols, barriers, and alarms by illuminating approaches to an area, offering surveillance capability, deterring unauthorized entry, and enabling guard forces to observe activities inside or around an installation or facility and enabling them to conduct inspections of personnel and vehicles.
Note: Site lighting is used for several purposes in support of physical security. Site lighting supplements other protective measures such as patrols, barriers, and alarms by illuminating approaches to an area, offering surveillance capability, deterring unauthorized entry, and enabling guard forces to observe activities inside or around an installation or facility and enabling them to conduct inspections of personnel and vehicles.
Stand-by lighting
They are used when additional lighting is necessary and may be activated by an alarm or motion detector. Standby lighting is similar to continuous lighting except the lamps are not continuously lit.
Emergency Site-Lighting
lighting is used during a power failure or when regular lighting is not available for any reason. This type of lighting depends on alternative power sources such as batteries or generators.
Movable Site-Lighting
consists of manually operated, movable towers or searchlights that may be lit during hours of darkness or only as needed.
T or F: Barbed wire is also known as razor wire.
False
T or F: Jersey barriers may be placed around buildings to prevent vehicles from getting too close to the buildings.
True
T or F: Rapidly flowing rivers are considered active barriers.
False
Surface Lighting
This method is intended to display a silhouette of any person passing between the light source and the building or to show the contrast of a person inside the building.
Glare Projection
This method is intended to make the inside of a protected area difficult to see from outside the protected area.
Controlled Lighting
This method is intended to limit the width of the lighted strip outside the perimeter of a protected area so as not to interfere with adjoining property, nearby highways, railroads, navigable waters, or airports.
Emergency lighting depends upon the power supply of the utility company.
False
Standby lighting is the type of lighting used when the primary power source fails.
False
Contract Security Forces
Contract Security Forces are comprised of non-DoD personnel who are employees of private or commercial sources contracted by the federal government.
Remember, whether government or contract, all security forces have the same mission—to protect DoD assets.
T or F: Contract security forces may be either military or civilian
False
T or F: Military working dogs can seek, detect, defend their handlers, and guard suspects.
True
The Premise Control Unit (PCU) is essentially the “brain” of the _____
IDS
It is the centralized device that receives changes of state from IDE sensors, and transmits an alarm or trouble condition to the monitoring station.
_____ is to adequately supervise and protect the communications between the alarmed area and the monitoring station to prevent modification and substitution of the transmitted signal.
Transmission Security Line
In high security areas, 128 bit or higher National Institute of Standards and Technology (NIST) listed encryption may be required. Transmission line security is determined and dictated by the type of DoD asset being protected.
Manual System
The basic manual access control system is simply personal recognition. This may be employed where a small number of employees are involved.
These employees must be trained to recognize and respond to the presence of unauthorized personnel. Another form of manual access control is a person who verifies an acceptable form of identification such as the Common Access Card (CAC).