Physical Security Flashcards
For SFPC and SAPPC
What is the purpose of Physical Security?
Prevention and Protection
What is Security-in-Depth?
- Integration of physical security measures to protect national security and DoD assets
- Accomplished through active and passive complementary security controls
What are the steps in the Risk Management Process?
Identify assets Identify threats Identify vulnerabilities Risk analysis Countermeasure options Risk management decisions
How does one Identify Assets in the Risk Management Process?
- Determine the nature and value of an asset
- Determine the degree of impact if the asset is damaged or lost
How does one Identify Threats in the Risk Management Process?
- A threat is the perceived imminence of intended aggression by a capable entity to harm
- Identify and assess the threats to assets identified in the Identify Assets step of the Risk Management Process
How does one Identify Vulnerabilities in the Risk Management Process?
- Vulnerabilities are weaknesses, characteristics or circumstances that can be exploited by an adversary to gain access to or information
- Identify the vulnerabilities and determine their extent
- If not addressed, vulnerabilities may result in the degradation, loss of life or damage to mission-essential resources
What is Risk Analysis?
The determination of an impact of an unwanted event and the likelihood that it could happen
What do Countermeasure Options do in regards to the Risk Management Process?
Protect DoD assets by reducing vulnerabilities and mitigating threats
What are Risk Management decisions based on?
The the cost versus the benefit of protecting a DoD asset
Physical Security Policies
DoD 5200.08-R DoDI 5200.08 DoDD 3020.40 DoDI 2000.12 DoDI O-2000.16 v1-2 DoDM 5100.76
Name 3 Physical Security Roles
Installation Commander or Facility Director
Antiterrorism Officer (ATO)
Physical Security Officer
Operations Security (OPSEC)
Officer Counterintelligence (CI) support personnel
Local, state and federal law enforcement officials
What is the purpose of the Antiterrorism Executive Committee (ATEC)?
- Develop and refine antiterrorism program guidance, policy and standards
- Determine resource allocation priorities and mitigate or eliminate terrorism-related vulnerabilities
- Act upon recommendations of the Antiterrorism Working Group and Threat Working Group
What is the purpose of the Antiterrorism Working Group (ATWG)?
- Assess requirements for physical security
- Recommend and develop policy
- Prepare planning documents
- Conduct criticality, vulnerability and risk assessments
What is the purpose of the Threat Working Group (TWG)?
- Identify foreign, domestic and local threats
- Inform the installation commanding officer (CO) of current threat trends in the area of responsibility
What is the purpose of the Mission Assurance Senior Steering Group (MA SSG)?
Advocacy, coordination and oversight to assist in both vertical and horizontal mission assurance alignment efforts on issues that cut across all DoD protection programs, including antiterrorism
What is the purpose of the Physical Security Officer?
Charged with management, implementation and direction of all physical security programs
What is the purpose of CI Support?
Provides valuable information on the capabilities, intentions and threats of adversaries
What is the purpose of the OPSEC Officer?
Responsible for developing countermeasures against potential threats to national security and other DoD assets
What positions/roles should be included in a Threat Working Group?
- Antiterrorism Officer
- CI Representative
- Law Enforcement Representative
- OPSEC officer
- Information Operations Representative
- Chemical, Biological, Radiological, Nuclear and High Yield Explosives (CBRNE) Representative
Who designates Restricted Areas?
- Facility directors or installation commanders designate restricted areas
- Warning signs displaying “Restricted Area” must be posted at the boundary of each restricted area
Name 3 Possible Building Protective Measures
- Entrances and exits limited to the minimum number
- Doors can be made of solid steel
- Windows can be covered with shatter-proof protective film
- Vents can be secured with steel bars
Name 5 Physical Security Countermeasures
Protective barriers Site lighting Security forces Security systems Facility access control Lock and key systems Storage containers and facilities
Fencing, poured concrete, hardened steel or natural barriers are examples of what?
Protective Barriers
What is the purpose of Site Lighting?
- Allows observation of persons and activities
- Discourages unauthorized entry
- Supplement other protective measures
Types of Lighting
- Continuous lighting - Fixed lights arranged to flood an area continuously with overlapping cones of light (common)
- Standby lighting - Like continuous lighting, except lamps are not on continuously, used when additional lighting is necessary
- Emergency lighting - Depends on alternative power sources and is reserved for times when regular lighting is not available
- Movable lighting - For supplemental lighting as necessary
Security Forces consist of what type of personnel?
DoD civilian personnel
DoD military personnel
DoD contract personnel (private or commercial source)
Trained dogs
Name 3 Duties of Security Forces
Roving patrol Response force Security system monitoring Dispatching Escorting
Name 3 types of Security Systems
Access control systems Screening equipment Two-way radios Closed circuit television (CCTV) Exterior Intrusion Detection Systems Interior Intrusion Detection Systems
Name the 4 types of interior IDS
- Volumetric Detectors - Detect changes in the environment in a particular area
- Interior Barrier Protectors - Protect against amateur intruders (including infrared beams/trip wires)
- Proximity Detectors - Provide point security and protect items inside a building
- Operable Opening Switches - Used on doors, windows, and other similar openings
What are the 4 Exterior IDS Sensors?
- Fence Disturbance Sensors - Detect fence disturbances
- Invisible Barrier Protectors - Detect motion within a specific area using microwave or infrared technology
- Buried Line Sensor - Reacts to vibrations or pressure in a certain area (line buried)
- Electric Field Sensor - Multiple wires, one with a current and the other a sensing mechanism. When something enters the
electromagnetic field that is in the wire, the energy in the wire is disturbed and activates
an alarm
Access Control System
Various types of access control systems!
- Simplistic manual systems (non-electronic cipher lock)
- Costly automated electronic systems (biometric devices)
What is the purpose of the Two Way Radio?
- Communication between response forces and control centers
- Communication between response force members
Identification systems, methods of control and entry and exit inspections are all part of what type of procedures?
Facility Access Control Procedures
What are some examples of Methods of Control?
- Escorts
- Access Control Rosters
- Badging Systems
- Two-Person Concept
What is Key Control?
Process to account for all locks and keys
Minimum key control procedures include a key register to:
- List keys
- Document key issuance, return and/or disposition
What distinguishes a vault from other facilities?
Constructed to meet strict forcible entry standards
What distinguishes a Secure Room from other facilities?
- Designated and authorized for open storage of classified info
- Usually built to commercial construction standards
Can weapons, funds, jewels and/or drugs be stored in the same security container with classified information?
No
What is the purpose of the Standard Operating Procedure (SOP)?
- Provides supplemental guidance for implementing specific components of a physical security program
- Establishes duties and responsibilities for the physical security program
- Ensures a consistent and uniform physical security program
What is the purpose of Compliance Inspections and who conducts them?
Purpose - Ensures regulatory requirements are being met
Who Inpects- Someone in your immediate chain of command or higher headquarters
What is the purpose of Self Inspections and who are they conducted by?
Purpose - Aids internal control, prepares for compliance inspections and ensures the physical security program is implemented in a cost effective manner
Who - Members of your own organization, usually with the aid of a checklist
What is Anti-Terrorism?
Defensive measures used to reduce the vulnerability of individuals and property to terrorist attacks
*Includes limited response and containment
What is the purpose of Terrorist Threat Levels?
Threat levels are identified as Low; Moderate; Significant; and High
Threat levels are provided to senior leaders in order to assist in determining the appropriate FPCON level
What are the 4 Terrorist Threat Levels?
Low - No terrorist group is detected or the terrorist group is non-threatening
Moderate - Terrorists are present but no indications of anti-U.S. activity (operating environment favors the host nation or the U.S.)
Significant - anti-U.S. terrorists are present and they attack personnel as their preferred method of operation or a group uses large casualty-producing attacks as their preferred method, but has limited operational activity (operating environment is neutral)
High - Anti-U.S. terrorists are operationally active and using large casualty-producing
attacks (operating environment favors the terrorist)
What is the purpose of Force Protection?
Prevents or mitigates hostile actions against DoD personnel including family members, resources, facilities and critical information
What are the 5 Force Protection Conditions?
Normal Alpha Bravo Charlie Delta
SOP
- Provides supplemental guidance for physical security programs
- Establishes procedures for emergency events as well as operational and administrative procedures
What is the purpose of Post Orders?
Establishes duties, roles and responsibilities at individual assignments, checkpoints, gates and guard posts
What are the minimum items that should be included in Physical Security Plans?
- Special and general guard orders
- Access and material control
- Protective barriers, lighting systems, locks and Intrusion Detection Systems (IDS)