Protecting Air Force Security Systems Flashcards
How is force protection achieved?
Through the successful execution of three related but distinct lines of effort; integrated defense, emergency management and critical infrastructure program
What are the two central areas of change of perspective required in the shift to ID?
First is from resource-based defense poster to a risk based defense pastor second is from compliance base operations to effects base operations
What FP effect should be developed to identify the presence of an object or event if possible military interest ,whether a threat or hazard?
Detect
What are the 3 types of control authority that reside in every organization in the Armed Forces?
Administrative(AFCON), Operational(OPCON), and Tactical(TACON)
What does TACON provide?
Sufficient authority for controlling and directing the application of force or tactical use of combat support assets within the assigned mission or task
What type of fencing is authorized for use in a restricted area?
Type A
For what are elevated barriers used?
To identify restricted areas located on the flight line
What are the 5 basic lighting systems used for restricted areas?
- Entry point
- boundary
- special purpose
- area lighting and very near infrared
- combination
What type of warning signs is acceptable in areas with widespread illiteracy?
Danger or warning signs
Where are SRTs required?
At all installations supporting PL 1,2 or 3 resources
Where can ESRTs operate?
Inside or outside of the restricted area in which they are assigned
What will the RAB issuing authority do if the owner of a lost badge is not located within two weeks?
Destroy the badge
What must be done before a RAB is laminated?
Mark the badge with a locally devised authenticated feature
When using the exchange badge system, what is the ECs next step after confirming an individual is authorized access into a restricted area?
Compares the 1199B with the 1199A maintained within the EC
As an EC what action do you take in the event an individual passes back a wrong countersign when requesting entry into a restricted area?
Take as a sign of duress or hostile nature, can put them at an disadvantage and removing them from restricted area, consider separating individuals as well
What are primary duties of a sentry?
To maintain surveillance over assigned areas, reacting and reporting any unauthorized entry or personnel found in the area
When does a CIS control entry into aircrafts?
When the aircraft is carrying specific PL 1 assets
How are deviations from established security criteria categorized?
Technical, temporary, or permanent deviations and must be applicable to physical security facilities, plans, procedures, equipment, and monitoring standards
How often must the approving authority review all permanent security deviations?
Every year
What form must be used to document security deviations?
AF form 116, request for deviation from security criteria
What does the nuclear roadmap contain?
It contains comprehensive action plans describing the actions required to restore public trust and ensure a credible nuclear deterrence
What does the nuclear roadmap aim to identify?
Common actions that must be standardized to ensure safe, secure and reliable nuclear operations
What is the nuclear weapons security standard?
Is the denial of unauthorized access to nuclear weapons; preventing loss of custody; and preventing to the maximum extent possible radiological contamination caused by unauthorized acts
For what purpose is the nuclear weapons security program design?
- Deny unauthorized access to nuclear weapons
- prevent damage or sabotage to nuclear weapons
- prevent loss of custody of nuclear weapons
- prevent unauthorized nuclear detonation
- prevent to the maximum extent possible radiological contamination caused by unauthorized acts or damage
- ensure weapons are operationally available to the president of the US
What do the nuclear weapon security program concepts mandate?
That the security system stops an intruder before unauthorized access to a weapon can be achieved.
What is a nuclear weapon incident?
An unexpected event involving the release or potential release of nuclear material caused by adversary actions and in this way differs from nuclear related accidents
For what is a NDA(national defense area) used and who must designate and mark the NDA boundary?
Used to safeguard classified defense information to protect DOD equipment and or material outside the confines of a military installation, but within the territory of the US. The senior DOD representative at the scene must designate and mark the boundary of the NDA
For what reason was a split knowledge concept designed?
To prevent a lone individual from having complete knowledge of the entire launch function
Why are interior denial systems more effective than denial systems positioned outside the nuclear weapon storage structure?
Because they cannot be easily observed and defeated by adversary furthermore they are better protected from adverse weather conditions
Who will develop local procedures for MMB used and maintenance?
MAJCOMS
What should the recapture or recovery of a nuclear weapon plans include?
Must include specific actions to take, procedures to follow, personnel required, tactics, and weapons to use for all likely potential recapture and recovery situations or scenarios for the site and nuclear weapons concerned
What forms the cornerstone of the threat planning for nuclear security systems?
NSTCA(nuclear security threat capabilities assessment)
Why are vulnerability assessments conducted at nuclear weapons operating locations?
To determine the facilities vulnerability to sabotage, stand off attack, theft, loss, seizure, or unauthorized access by both external and internal threats
How is a missile complex comprised?
Comprised of 3 to 4 squadron areas containing five missile alert facilities providing housing for deployed security forces members and service teams and LFs which houses the Intercontinental ballistic missile nuclear resource