For the Navy Security community Vol. 1 No. 5 Spring/Summer 1988

NIMITZ, NIS host local police

inside: New Departments Information Security Personnel Security Physical Security Law Enforcement Reserve News Fleet Kudos Legal Issues Military Working Dogs More. .. fS~~.!!,'Y Vol. 1 No. 5 Spring/Summer 1988 Security community Special features From the editor: Murder, robbery aboard ship ...... 8 Auxiliary Security Forces -- defined...... 1 Since our last issue, I have received How to be a Spy in six easy lessons ...... 22 numerous phone calls ~d letters from Residential Security Measures --pamphlet...... 29 people in the fleet, asking, "When are Navy names top MWD Teams...... 32 we going to see the next Sentry?" As Computer Security...... 38 most of you probably already know, budgetary contraints held up this issue. Defending against terrorism: Part 5: Travel Security ...... 56 Hopefully, now that the new fiscal year News & Features is just around the corner, we will be NSIC's new Deputy Commander...... 4 back on schedule. MAl convicted of espionage...... 5 You will notice a lot of new ASF training at Willow Grove ...... 11 departments starting in this edition, such as Legal Issues, Information & USS NIMITZ Open House ...... 26 Personnel Security, and a much Sailor sentenced for DUI manslaughter...... 58 requested Reserve News section. These Departments new sections are representative of Sentry's expanded mission of addressing From the Commander...... 3 all aspects of security, rather than just Selection Board results ...... physical security and law enforcement. ww enforcement ...... 14 With this new mission comes a new ·~ ~ Information & Personnel Security...... 1 and larger audience. Sentry is now also Military Working Dogs...... 31 being mailed to all Security Managers and other personnel who were on the I..,egal Issues ...... 40 distribution for the Information and Physical Security...... 44 Personnel Security Newsletter, which was Reserve News ...... 48 absorbed into Sentry. Fleet Kudos ...... 54 I would like to thank all of those Commentary...... 59 people in the fleer who have taken the time to submit articles and photographs to Sentry. But I would also like to ask a favor. Please sendACI1ON photos, not static, posed shots. Also, black & white prints are preferrable to color -­ please no Polaroid or other 'instant' photos! Submit articles and photos to Sentry Editor, Naval Security & Investigative Command, Code 24J, Washington, DC 20388·5000. Articles, photos and other material for publica• tion must be released by your com• manding officer, publ ic affairs officer or other releasing authority.

2 Sentry Spring/Summer 1988 From the Commander:

Doing more with less

udgetary contraints are hitting you just set your mind to it. Accept everywhere. Almost everyone the personal responsibility of budg­ Bof us has begun to feel the ef­ eting resources, and take action. fects of having fewer and fewer re­ Do your part. sources to work with. Most of all, don't be afraid to ::.,...,-::. Yet our work requirements make suggestions. If you have a RearAdm John E- Gordon have not decreased proportionately. good idea to help your department On the contrary, they have continued save money, speak up. Any practi­ to increase, and we are finding our­ cal idea would be welcome. lated. At times they almost seem selves having to do more with less. NSIC, as well as many other interchangeable. Articles on physi­ That means that we have to find new commands, is currently undergo­ cal security may have information and better ways of utilizing limited ing some major reorganization at security impact, and could be of use resources. the headquarters level in an effort to security managers. On the other This doesn't just apply to per­ to better aUocate resources. One band, personnel security articles can sonnel in managerial positions or small example of this effort is evi­ contain information of importance those who make command decisions dent in the changes to this newspa­ to law enforcement personnel. See­ on resource allocation, it applies to per. ing this relationship, we decided to every one of us -- every sailor, every A short time ago, the Infor­ provide information from both sides Marine and every civilian employee! mation and Personnel Security Di­ of the house to both audiences. We all have to tighten our belts and rectorate of the Naval Security and Keeping two separate publications make what we have go further. Investigative Command (NSIC), was not cost-effective. So, the Infor­ You may say, "What can I do to published a quarterly newsletter mation and Personnel Security News­ stretch Navy dollars? I'm just an MA2 for security managers Navy-wide. letter, as a separate entity, no longer -- the bottom of my local totem pole. I The lnfomiation and Personnel Se­ exists. But the information that was can't make command decisions?" But curity Newsletter focused primarily in it has been incorporated into Sen­ you can! What you do can provide the on matters of information and per­ try, and distribution was expanded to greatest assistance to the overall pic­ sonnel security, with some articles include the security manager audi­ ture of your command and the Navy. on security clearance adjudication. ence. Even such simple things as taking NSIC also put out another By combining these two pub­ proper care of your leather gear -­ publication, Sentry, which was is­ lications we can get more informa­ making it last. This alone could save sued from the Law Enforcement tion out to more people -- and we can valuable dollars in terms of replace­ and Physical Security Programs do it for less. ment costs. Directorate. This was primarily a That's doing more with less! You can help ensure that physical security and law enforce­ Let's all do our share and help proper periodic maintenance is per­ ment publication and was directed conserve the Navy's valuable re­ formed on security department ve­ toward security officers, Masters­ sources. hicles. This will make our cars and at-Arlns, and other law enforce­ trucks last longer and help avoid ex­ ment and physical security person­ pensive repairs, not to mention how nel of the Navy and Marine Corps. much it would cost to buy new ones. Although the many aspects There are many things you, as of security are viewed as individual an individual, can do that will help if subjects, all of them are closely re-

Sentry3 Spring/Summer 1988 NSIC gets new Deputy Commander

arine Corps Col. Wayne A. Coomes, 51, recently took over as Deputy Commander, Naval Security Mand Investigative Command (NSIC). The colonel comes to NSIC from his last assignment as Head, Intelli­ gence Management Branch, Intelligence Division, Head­ quarters, United States Marine Corps, and brings over 28 years of experience to the command. A native of Evansville, Indiana, Col. Coomes served two tours in the Republic of Vietnam during the war. His first tour, in 1965, included service as commanding officer ofCompany"B", 3d Tank Battalion. In 1969, he returned to Vietnam to serve as an Intelligence Analyst with the Military Assistance Command. Col. Coomes is a 1980 graduate of the Naval War College. He has also completed several other courses, in­ cluding the Armed Forces Air Intelligence Officer Course. Among numerous unit and service awards; the colonel's personal decorations include the Bronze Star Medal with Combat "V", the Meritorious Service Medal, the Joint Service Commendation Medal with two Oak Leaf Col Wayne A Coomes Clusters, the Navy Commendation Medal with Combat Deputy Commander "V", and the Combat Action Ribbon.* Naval Security & Investigative Command

Naval Security Force resource management ~38 or .45 -- not bothF

by Lawrence N. Welch were applying a practical manage­ In the meantime, small arms NSIC Physical Security Specialist ment approach to conserve small arms ammunition and the needed dollars to hoever coined that time­ ammunition, save thousands of train­ acquire additional supplies are lim­ worn phrase, "it's not how ing man-hours, and limit wear and ited. W much you have, but how you tear on weapons. The Navy Security Force has to use it that really counts," probably was Conserving valuable resources make the best use of resources avail­ a very successful resource manager. becomes more critical as the Navy able. That means qualification with The new firearms training ini­ makes painful fiscal readjustments the duty weapon only! Either the .45 tiatives have proven to be quite expen­ due to budget reductions. or the .38 -- not both! * sive, considering the cost of ammuni­ Planners on the CNO and Policy documents on tion and weapons, and, in terms of Naval Security and Investigative NSF Firearms Proficiency training manhours. Command (NSIC) staffs continue to CNO WASHINGTON DC 1619012 DEC ·Through a series of communi­ seek reasonable, more cost-efficient 86 (Subj: Navy Security Forces) cations, the Chief ofNaval Operations alternatives to the high cost of devel­ CNO WASHINGTON DC 2818322 JAN (CNO) issued the policy that Navy oping firearms proficiency. Mobile 87 (Subj: Request for Navy Security Force Security Force members would qual­ ranges are already becoming a reality Information) ify with either the .45 caliber pistol or in some locales to reduce the exhorbi­ CNOWASHINGTON DCLTR.SER®N/ Ui6-87 OF 10 JUL 88 (Subj: Navy Security .38 caliber revolver, not both! tant costs of upgrading permanent Foree P-treanm Proficiency) By limiting shooters to qualifi­ facilities, and firearms simulators CNO WASHINGTON DC 192054ZAPR cations with the handgun they would continue to be examined as long-term 88 (Subj: Navy Security Force Firearms Pro­ actually be using on duty, analysts money-saving alternatives. ficiency)

Sentry 4 Spring/Summer 1988 MA 1convicted of espionage

by J02 John S. Verrico NSIC Public Affairs Assistant The documents stolen by Garcia, dealing with sub­ marine activities and classified "CONFIDENTIAL," were n22January 1988, a military judge found Master-at­ sold to the civilian for $800.00 and a promise of more money Arms First Class Wildredo Garcia guilty of espio­ after they were resold to a foreign government. Available 0 nage. evidence suggests the final destination of the information This verdict was the conclusion of a two-year joint could have been an East-Bloc country. investigation by the Naval Investigative Service (NIS) and The documents were intercepted and NIS believes the Federal Bureau of Investigations (FBI). that all of them were recovered before they could reach In late 1985, NlS and FBI officials received informa­ their destination. tion that a civilian businessman in Vallejo, California was Garcia was convicted of nine out of13 specifications, attempting to sell classified Navy documents to represen· including two for espionage and one for conspiracy to tatives of a foreign government. The investigation dis­ commit espionage, larceny, conspiracy to commit larceny, closed that these documents were stolen from the nearby sale of government property and violations of military Mare Island Naval Shipyard, and that the civilian had ac­ regulations. He was sentenced on the same day to 12 years quired them from a then-unknown al Lhe shipyard. confinement, reduction to E-1, forfeiture of all pay and al­ AnFBI cooperating identified Garcia as the lowances, and a dishonorable discharge. * Mare Island source.

Sentry S Spring/Summer 1988 Ens. Gary L. Caldwell 'Don't sell yourself short' by J02 John S. Verrico NSIC Public Affairs Assistant

ormer Chief Master­ at-Arms Gary L. F Caldwell was commis- sioned to lhe rank of ensign on 1 September 1988 while serving as the Master-at-Arms Rating Advisory Assistant at Naval Se­ curity and Investigative Com­ Ens. Gary L Caldwell receives his shoulder boards from wife, Debbie, and father-in-law, Col. Noel mand (NSIC) Headquarters, E. Craun, Jr. U.S. Army-Ret .. The colonel is formerly a Second Class Boatswain's Mate, who served Washington, DC. as a Master-at-Arms aboard the battleship USS NORTH CAROLINA after WWII. (Photo by J02 John S. Verrico, NSIC) Retired Army Col. Noel E. Craun, Jr., (Caldwell's father-in-law) performed the ceremony commissioning his RetiredMasterChiefMaster-at-ArmsJosephM. Radigan ~ then rendered the first salute to the officer. The certificate daughter's husband into the Navy Limited Duty Officer cited Caldwell's continuing affiliation with the fraternity of (LDO) community. chief petty officers. Marine Corps Col. Wayne A. Coomes, NSIC's "It was a hard decision whether or nol to apply for Deputy Commander, provided the opening and dosing the LDO program," Caldwell said. "I wasn't sure whether remarks at the ceremony, reminding all of the attendees or not I wanted to give up being 'the Chief,'" he added that, although the ceremony was indeed a celebration, glancing at Radigan. Along with Caldwell's commission as there was a serious side to the occasion that should be ensign, he was concurrently promoted to Senior Chief forefront in their minds. Petty Officer. '"With trust and confidence ... ,'" the colonel Lt. Pau!D. Norris, commanding officer ofNSIC's quoted from the promotion citation. "This means that we staff enlisted personnel and an LDO himself, affected the trust this individual with our lives ... and that we have the promotion to E-8. In 1982, then First Class Master-at­ confidence in him, that when our attention is on something else, he will get the job done," he said. Arms Caldwell worked for then Senior Chief Master-at­ "You don't know real committment until you're Arms Norris aboard USS NEW JERSEY (BB-62). Norris reminisced about the time he had recommended the LDO on the battlefield with your friends --and see them die. You program to one of his better first class petty officers. must conlinue your mission. That's committment. That's Caldwell bad told him that bis first goal was to make'chief.' the kind of committment this young man makes as he takes the oath of commission today," Coomes added. "Well, bed.id that," Norris said, adding that he was Caldwell's first assignment as an LDO will be especially happy to be part of the ceremony. Caldwell addressed NSIC's staff enlisted person­ Officer-in-Charge, Security Department, Naval Air Sta­ nel toward the end of the ceremony. "When I first came in tion Keflavik, Iceland. Caldwell will attend LDO/CWO the Navy ...I'd never dreamed of being an ensign. Don't sell Indoctrination at Naval Air Station Pensacola prior to yourself short! The first four years ( of service) aren'l reporting to Iceland. One of Caldwell's co-workers took his old uni­ always easy, but they're not all there is. There is always form out of mothballs to present a special certificate from someone there to pick you up, to help you out." * the Navy Chief Petty Officer community to the new ensign.

6Sentry Spring/Summer 1988 Tips from the sponsor

July 1988 by MA1 Thil Hurley Advisory Assistant for MA Programs

Selection board results pportunities for conversion to the Master-at-Arms rating are 0 excellent and the long range Congratulations to the following personnel who were selected for outlook continues to be good. Com­ conversion to the Master-at-Arms (MA) rating by the July 1988 Conver­ petition for selection; however, is sion Selection Board. becoming more intense. Prospective applicants and rated MAs should keep the following in mind. Kevin R Altman Richard T. Andreyo Gaylord Anliker Some areas in which candidates Greg D. Barrett Edward E. Bartel Richard A Beers are graded include potential, initia­ Keith A. Bennett Sandy F. Berry Alvin Buckner William C. Buie David P. Coughlin Bar:bara J. Davis tive, experience, education and ad­ Charles W. Davis Leonard Davis Richard G. Day ministration. Michael N. Dunn Steven W. Eskridge Roberto Garcia The two most important indica­ Ruth A. Garn David L. Gilbert Bruce A. Gonseth tions of a candidate's desire to suceed Patti J. Gonzales Eric L. Gooch Nathaniel P. Green are the individual's potential, deter­ Toney E. Griffin Marvin D. Hanson Donald L. Hardin mined by career preparation, and Wendy A. Hare Karen S. Holley Ramon Jones Michael D. Keller Larry D. Kennedy Brian M. Kramer initiative. Substantial points are Jamie Kwiatkowski Russell J. Ledford Shannon L. Lovejoy awarded to candidates who possess Vickie L. Lucas Michael W. McCain Robert W. McMahon these traits. Candidates can show Kurt A Millbaugh Donna Morton Alan L. Murawske these by completing law enforcement Domingo Ortiz Louise C. Parker Glenn E. Semar oriented courses, obtaining field expe­ Joyce L. Smith David A. Spain Christine M. Spence Michael R. Stanton Greg A. Stover Rebecca D. Stowers rience in MA-related duties, and Paul J. Sturm Curtis M. Thompson McArthur Wallace through formal or in-service training Adam G. Zaborowski in the law enforcement community. Education of any type also shows LDO /CWO Selection Board initiative and potential. College study is desirable, particularly in the law en­ January 1988 forcement area, and those possessing certificates or degrees will have an Congratulations to the following personnel who were selected to edge in this category. Technical train­ be commissioned as Physical Security (649) Limited Duty Officers ing in law enforcement is also valu­ (LDOs) by the January 1988 LDO Selection Board. able. The application's neatness, com­ James Apling James Covell Douglas Duplayer pleteness, and adherance to OPNA V­ Mark Hammargren Barbara Kaper Daniel Kisich Patricia Loonam Michael Reid Richard Robishaw INST 1440.1 indicate a candidate's Thomas Wilkes org'anizational, administrative, and communications skills. These cannot be over-emphasized. Points for ad­ Congratulations to the following personnel whowere selected to ministrative abilities can be a deter­ be commissioned as Physical Security Technicians (749) Chief Warrant mining factor. Officers (CWOs) by the January 1988 CWO Selection Board. Rated MAs in the fl need to be aware of their obligation to review and Enos Brents John Chase Michael aancy screen potential candidates. MA James Fields Cynthia Frisch Danny Futrell sponsors must take a greater interest James Grimes William Holmes John Paul Long in the screening process. Remember, the candidate you sponsor may one day be your partner. *

Sentry Spring/Summer 1988 7 Murder & Robbery aboard ship What does the Master-at-Arms do?

by J02 John S. Verrico JOHN HANCOCK (DD-981). Senior Chief Master-at-Arms Larry NSIC Public Affairs Assistant At about 0745 on 15 March H. Walton, had secured the Disburs­ 1988, a Second Class Disbursing Clerk ing Office area and posted a duty n 13 July, a General Court went into his office on the SPRU­ master-at-arms in front of the door Martia] found Elect.-onics ANCE-class , to begin with orders that no one was to enter 0 Warfare Technician First Class preparations for the crew's payday. nor touch the door. Walton mustered Ruben Colon guilty of felony murder, He found the safe ajar. Nearly the remaining Master-at-Arms Force robbery and kidnapping. He was $95,000 of the crew's payroll and more by 0800, apprised them ofthe situation sentenced to life imprisonment, re­ than2,500blan.kU.S. Treasury checks and initiated a search throughout the duced in rate to E-1, forfeiture of all were missing from the ship's safe -­ ship for the money and missing officer, pay and allowances, and awarded a and he could not locate the ship's instructing them that nothing was to Dishonorable Discharge on 14 July. Disbursing Officer. The Executive be touched. The conviction was the result of Officer was notified and he secured a Naval Investigative Service (NIS) the ship's brow to prevent anyone At 0840, the ship's company investigation surrounding the murder from leaving or coming aboard. was called to quarters and the crew of a Navy officer and the robbery of a Within five minutes of the dis­ was informed of the situation. Be­ large amount of cash aboard the USS covery, the command master-at-arms, cause the ship was in its homeport, NlS

USS JOHN HANCOCK (DD-981 )-Acrewmember was convicted of murdering the disbursing officer and stealing nearly$95,000 in cash and more than 2,500 blank U.S. Treasury checks. The shipboard MA played a key role in securing the crime scene areas and organizing a search for the mis$ing money and disbursing officer, before turning th~ investigation over the Naval Investigative Service agents. (U.S. Navy photo) 8 But Walton, who volved in the investigation which in­ bas since transferred to cluded the interviews, evidence proc­ USS SANTA BARBARA essing, aerial surveillance of the sus­ (AE-28), handled the situ­ pects and the alerting of local banks. ation well and didjust what "(The investigation) was an he was supposed to do. He extraordinary coming together of a lot secured the crime scene of people, both inside and outside of areas, notified NIS, and the NIS organization," Strickland assisted with searches for said. "It was a tremendous effort by clues and evidence. With everyone involved." agents already on board, Strickland added that the ship's his task was made much master-at-arms helped quite a bit in easier. that "he ensured that crime scenes NIS assumed the in­ were properly secured and that noth­ vestigation and immedi­ inghad been contaminated. Hedidhis ately began processing the job well." crime scenes and gather­ On 12 April 1988, using a fed­ ing what little evidence eral search warrant based partly on a Uj.g. Ratish J>rasad they had. They checked for tip from a local bank official, NIS Murdered disbursing officer fingerprints at both sites, agents discovered $87,250.00 and conducted a blood analysis 2,575 blank U.S. Treasury checks in a was notified at their local Resident and collected the cords that bound the safe deposit box in nearby Jackson­ Agency (NISRA) office in Mayport. victim and a .38 caliber bullet (which ville, Florida. That safe deposit box NIS Special Agents came aboard was found lodged in a piece of luggage was rented to Colon, a 35-year-old HANCOCK shortly afterward and marking the Seabag Locker as the HANCOCKcrewmember from Vega assumed the investigation. murder site). Baja, Puerto Rico. A little after 0900, Walton, "It was a very successful inves­ Colon, an assistant to accompanied by the command master tigation," said Charles W. Strickland, HANCOCK's career counselor, was chief and the career counselor, lo­ Assistant Special Agent in Charge of arrested later that day onboard the cated the missing disbursing officer. NISRA Mayport, "especially consid­ ship and charged with strangling and He was in the ship's Seabag Locker. ering that we had so little to work with fatally shooting the disbursing officer. His hands and feet were tied, a clove­ in the beginning, as far as evidence was The destroyer got underway for hitch knot was around his neck, and concerned." thePersianGulfinearlyMay. A Navy there was a "large quantity ofblood on Agents from NISRAs Jackson­ spokesman at Mayport said the cap­ the deck inside the locker." He se­ ville, Orlando, Cecil Field and Kings tain and crew were keeping their cured the area and NIS agents arrived Bay were called to assist in the inves­ minds on their deployment, rather at the locke.r in less than two minutes. tigation and the intensive questioning than reflecting on the murder of their Later, it was determined that the offi. and interviewing of the destroyer's shipmate. "I think it's true for all the cer had been shot in the head •· a nearly 350-man crew. people l talked to on the ship. They're contact gunshot wound. "Everyone was interviewed at hoping to put this behind them as Lt.j.g.Ratish Prasad, a24-year­ least two or three times," a case re­ quickly as they can," he said. old Navy officer from Park Forest, Ill., viewer at NIS headquarters in Wash­ David L Brant, Special Agent in had been murdered. ington, DC, noted. Charge of NISRA Mayport summed Here it was. A shipboard MA's The investigation continued for up the success of the investigation by dreaded nightmare. Major crimes nearly a month as the agents produced saying it was "the result of a lot of hard committed aboard a Navy ship. No a list of suspects and began putting the work by many people." * witnesses. No murder weapon, nor pieces of the puzzle together. More any other evidence. than 40 agents of the NIS were in-

· Sentry9 Spring/Summer 1988 NAS Fallon Army and Navy working together the learning and training with our Navy base, a domestic disturbance at by L.t.j.g. Jim Jolliff counterparts and it's been very good. base theater, and a hostage situation Public Affairs Officer, NAS Fallon Training with the Navy has been a real in one of the barracks. Members from one hekeytotheNavy's physical se­ pleasure and we look forward to exer­ rotated responsibilities each inci­ curity/ law enforcemcnl pro­ cises planned throughout the remain­ senario to another. After on T grams is intensified training. der of the year." dent, participants were evaluated in handling the Recenlly, the Security Detachment at The program was initiated and their effectiveness situation which was fol­ Naval Air Station Fallon joined forces is currenlly headed by Master-At­ particular and answer pe­ with the Nevada Anny National Arms First Class Meldon L. Mitstifer, lowed by a question Guard to accomplish this intense NAS Security Detachment's Training riod. in the training training. Officer. "Enthusiasm and morale is at The next step the Auxiliary Using the principle that "an­ an all time high during the exercises," plan was to integrate Force with the permanent other set of eyes is helpful in spotting he said. "Hands-on training is much Security for a simulated Threat weak areas," members of both serv­ more enjoyable than sitting in a class­ security force (THREATCON) Exer­ ices agreed that the joint venture room." Condition Army National Guard did improved their individual readiness in Chief Boatswain's Mate cise. The in this exercise in order responding to and handling crisis situ­ Douglas Conklin, Operations Divi­ not participate of Lhe threat. If ations. sion Officer for the Securily Detach­ to add to the realism was to The 72nd Military Police (MP) ment, agreed that the training has an advanced THREATCON Guard would be Company of the Nevada Army Na­ been a great help for all involved. occur, the National and NAS tional Guard considered the training "Both entities are learning from each mobilized elsewhere, forces would have to exercises to be of great benefit for other. The National Guard has some Fallon's security the situation on their own. them. The training did not disrupt the good points to put out to our person­ handle this part of the training, "un­ local population and authorities as it nel and vice-versa," he said. During attempted to get in­ had done before the joint training ex­ During the February 1988 exer­ friendly" forces installation and cause a ercises, when the MPs had to train in cises, Guardsmen and Navy security side the target disruption. The disruption the public domain. personnel responded to three sepa­ simulated anything from tying a Army Capt. Ken Miller, Com­ rate crisis situation scenarios: a felony could have been an aircraft to placing a flag mander of the MP unit, said, "We're vehicle stop on a remote road on the ribbon on on an installation building, so the se­ curity forceshad to really be prepared. The purpose of the exercise was to dig out weak areas where the situation could be handled better. As a result of the level of coop­ eration which has been achieved be­ tween the different organizations, the NevadaArmy National Guard is plan­ ning to assist NAS Fallon's Security Detachment with security during the performance of the Navy's precision flying team, Blue Angels, scheduled for October 1988. The training being accom­ plished now is better preparing both the Army and Navy for the future. Joint efforts today will ensure better felony arrest. (U.S. Navy photo) Sailors and soldiers train together in a joint exercise security for everyone tomorrow. *

Sentry 10 Spring/Summer 1988 NAS Willow Grove ASF Training Underway

their assigned duties in a professional by Joseph K. Heil ations and Bomb Threats. The train­ Asst. Command Security Officer ees also received Field training in Civil manner. NAS Willow Grove Disturbances and Crowd/Mob Psy­ At the conclusion of the train­ chology and Control. ing session, the selectees listened to This training was provided by the comments of Cmdr. P.L. Zeimer, n article appeared in the Sum­ StaffSgt. W.RobertWhite, U.S.Army the air station's Executive Officer, mer 1987 edition of Sentry. en­ Special Forces, attached to the 157th who also presented certificates to A titled "Auxiliary Security Forces Separate Infantry Brigade (Mecha­ those who satisfactorily completed - Who are they?" Well, ask Willow nized) Willow Grove, Pa. their training. * Grove! The program will also include Naval Air Station Willow firearm proficiency and other training Grove is currently training its own as necessary and required to perform Auxiliary Security Force (ASF) using instructors from the Security Depart­ ment, Navy Medical Department and the U.S. Army. Naval Air Station Willow Grove's Commanding Officer, Capt. James Shapard opened the new pro­ gram by welcoming the selectees and expressing his appreciation for their concern and interest in the program. A 61-person ASF, consisting of a chief petty officer as the platoon and four 15-man squads, has been assigned to Security Operations. This will permit full manning of the vehicle patrols and stationary posts required in Threat Condition DELTA. Each squad also has a chief assigned as a squad leader. All are volunteers and assigned to ASF as collateral duty. Some of the training subjects covered included: Security Organiza­ tion, Radio Communications, Juris­ diction and Authority, Rule of Evi­ Members of the NAS Willow Grove Auxiliary Security Force (ASP) undergoing a clas.~roorn dence, Use of D eadly Force, Emer­ training session. (Photo by J06Cph K. Heil, NAS Willow Grove) gency Medical and Trauma Treat­ ment, Hostage and Barricade Situ-

Sentrvll Spring/Summer 1988 Auxiliary Security Forces -- defined

by Donald B. Cotton NSIC Anti-Terrorism Doctrine & Tactics Policy Branch

15 July 1986 CNO memo been established. * Training to do the job stated: "With the exception of A major component in achiev­ * Opportunity to do the job A Marine Corps Security Forces ing the Navy's goal to deter and defeat * C.ommand support when they (MCSF), Navy security forces are in­ the terrorist threat is the ASP. The do the job adequate to deter or defeat the known ASF, described in ALNA V 011/87 Undoubtedly one of the largest capability ofte"orist groups. Augment­ and SECNAVINST 5530.4A (Naval areas of concern bas been training. ing and restrocturing each element of Security Forces Ashore and Afloat), is CNO WASHINGTON DC 101847Z the Navy security force is necessary to composed of active duty Naval per­ DEC 87 prescribed minimum stan­ achieve a force capable of providing sonnel who serve on an additional or dards for ASF training and divided day-to-day security and law enforce­ collateral duty basis for a minimum of responsibilities between the Marine men4 as well as anti-te"orism deter­ 18 months. Host commands are re­ Cadres/Marine Corps Security Force rence and response." sponsible for organizing, equipping Battalion (MCSFBN) Mobile Train­ Since that day, security depart­ and training the ASP, while tenant ing Teams (MTT) and security de­ ments Navy-wide have been consoli­ commands provide the personnel, as partments. dated and reorganized; handguns and necessary. Many commands have Marine Cadres, to be assigned shotguns issued; thousands of rounds made commendable progress in de­ to approximately 85 Navy installa­ of ammunition expended for training; veloping their ASF. tions, and MCSFBN MITs to be and Marine Cadres, Fleet Anti-Ter­ In order to accomplish their deployed to installations where no rorism Security Teams (FAST) and mission, security personnel must be cadre is assigned, provide training in Auxiliary Security Forces (ASF) have given three basic elements: their designated subject areas because of their expertise gained in previous ASF TRAINING REQUIREMENTS assignments or the intensive six-week training program conducted by Marine Cadre/MTT will Instruct: MCSFBNs at Norfolk and Mare Is­ Topic Hours of Instruction land. This group of subjects deals Weapons (pistol/revolver/shotgun) 40 hrs mainly with small arms training, un­ - safety/proficiency armed self-defense, anti-terrorism Use of Poree 2 hrs Physical Training Daily and physical training. The second part Unanned self defense 4 hrs of the training, dealing primarily with Security Watchstanding (Interior Guard) 1 hr the requirements of the Physical Secu­ Search Techniques 4hrs rity and Loss Prevention Manual 1 hr Communications (OPNAVINST 5530.14A) is taught by Individual Tactics 2 hrs - cover/concealment/movement the security department personnel Anti-Terrorism Awareness 3 hrs because of their familiarity with the subject matter and experience. Security Department will instruct: Numerous questions regarding the various facets of theASF program 1 hr Security Department organization have been repeatedly asked. The Search & Seizure 1 hr UCMJ 1 hr "Top Ten" questions are listed here. Apprehension and Restraint 1 hr Major claimant security officers Crowd Control 1 hr should be able to answer any addi­ Basic First Aid 2 hrs tional questions your command or in­ Community Relations 1 hr stallation security department ,may Crime Prevention 1 hr Protection of Crime Scene 1 hr have. * Disaster & Emergency Plans 2hrs

(Local assets such as the Naval Investigative Service, Medical, Navy Legal Service Office, Explosive Ordnance Detachment, etc., should be used as appropriate.)

12 "TOP TEN" QUESTIONS ON THE ASF (1) HowlargeshouldtheASFbe? The claimant to CNO (OP-09N/NSIC- caliber pistols and 20% to be armed size of an installation's ASF is neces­ 24). with shotguns at any one time. sarily left to the discretion of the in­ stallation commander. The guidelines (5) What about assigning medical (7) What is the ASF mission? The are to determine the critical assets that personnel to the ASF? This question "Auxiliary Security Force" is a group must be protected during Threat had some basis in existing Navy Regu­ of active duty Naval personnel from Condition DELTA and size the ASF lations and was posed to the Navy host and tenant commands who are to man these posts for five days. The Judge Advocate General (JAG). The assigned on a collateral duty basis to number of personnel should be based JAG recognized the restrictions set augment regular security forces dur­ on the installation's defense concept, forth in Article 0845 of Navy Regs ing any scheduled or unscheduled not a percentage of the base popula­ which states that medical personnel event that requires a security augmen­ tion. The installation's mission, loca­ "shall be detailed or permitted to tation, such as heightened threat con­ tion, normal security posture, number perform only such duties... as are re­ ditions, or during an open house or ofcritical assets, political climate, size, lated to medical;" and the Geneva other command function. The ASF is and population are all factors that will Conventions of 12August 1949 which neither a counter-terrorism unit nor a determine the size of the ASP. It may provides that medical personnel are SWAT Team. be 40 or 240. entitled to special priviledges only when they are "exclusively engaged (8) Can civilians be assigned to the (2) When will the Marine Cadre ar­ in" medical activities. But he also ASF? The interest and willingness of rive? Filling cadre slots is an evolution citedArticle0736 of Navy Regs which many Navy civilian employees to par­ that will take several more months. states that "all commanding officers ticipate is commendable; however, Pilot sites (Naval Shipyard are required to protect and maintain based on a variety of legal issues "only Portsmouth, Naval Submarine Base the security of their command from active duty Navy personnel will be as­ New London, Naval Weapons Station attack, sabotage, and similar dangers." signed to the ASP." Civilians will not Yorktown, Fleet Training Center The JAG said that, although medical be assigned to the ASF. Dam Neck and Naval Air Station personnel are not to be assigned to the Oceana) received their cadres after ASF to protect combat readiness as­ (9) Is there a requirement for follow­ the first cadre trainer's class gradu­ sets, the bottom line is that "Mainte­ on training after initial training is ated in June 1987. All assignments nance of physical security is an inte­ completed? AU armed security per­ should be completed by the end of gral part of the administration of any sonnel will be required to fire quar­ 1988. medical unit. Providing medical per­ terly small arms sustainment training sonnel, therefore, to protect a medical courses. Additional refresher training (3) What training will the cadre pro­ facility, its patients and personnel, is is left to the discretion of the local vide and to whom? The cadre will be permitted under the Geneva Conven­ commander; however, SECNAV­ assigned to the security department to tion andArticle 0845, and is consistent INST 5530.4A requires ASF person­ train the ASF and regular security with the provisions of Article 0736, nel to train twice-a-month and exer­ force in all subject areas previously U.S. Navy Regulations, 1973." cise quarterly. described, including physical training and small arms proficiency. (10) How does an installation get a (6) What type weapons should be is­ cadre or MTI if the ASF ( or security (4) If my installation is not going to sued to the ASF? ASF weapons will department) is not armed? The an­ have a cadre assigned, how do we normally include the .45 caliber pistol swer is simple -- they don't! If there is schedule the Mobile Training Team? or 12 gauge shotgun. A few installa­ a need for a person to be assigned law The MCSFBN MTT Atlantic or Pa­ tions may have a sufficient number of enforcement or security duties, cific can be requested from the Fleet .38 caliber revolvers to arm the ASF, whether fixed post or mobile patrol, Commander through the chain of but they are exceptions. The then arming such forces should be command. Commands not under a installation's Weapons Allowance considered. * Fleet Commander should submit List should have been revised to allow their requests through their major 50% of the ASF to be armed with .45

Sentry 13 Spring/Summer 1988 '--'.---.._~..---...------~~-.---.. '----"" ___,...... _,,,_., ____, ___,. ..___, -=-

by Carlton A King basis for staffing and equipment needs of the security NSIC Administrative Pssistant for Crime Prevention Programs department and aids in the analysis of crime patterns and trends. Incomplete or inaccurate reports can hinder any and all of the above. aperwork is perhaps the least desirable task per­ In a recent review of over 4,000 ICRs, numerous formed in almost any career field. Law enforcement recurring errors were noted that can and should be cor­ Pis no exception to this, but, completing the Incident rected at the installation level. The guidance for properly Complaint Report (ICR), OPNAV Form 5527 /1, is one of completing and submitting ICRs is provided in OPNAV­ the most critical tasks that security police officers perform. INST 5580.1, Navy Law Enforcement Manual, Chapter 3 The ICR can be used as evidence in a major criminal ( as well as Appendix A). Some of the problem areas prosecution or court martial. It can be linked with other included: reports to provide a criminal history of a person who might 1. DETAILS OF INCIDENT DO NOT SUPPORT THE otherwise elude police detection. It provides a statistical OFFENSE CATEGORY During the review this was one of Paperwork nightmare Filling out the ICR

Sometimes it may seem as if you're drowning in paper...... but when it's done right, paperwork can be a breeze. ,.,.~ ~~~~~-. ~~"-£~

fflfl\i.H2

. ,,--.,,...,'-"'·.,,q:~::;:~-~·~t'...,...... ,.

Y,c~~ ·~ ! ~;- .-~~-. ,..,~,-~,~~ E $ r

..!:..L

~;~ -· 14 the most common errors noted. Many property-damage or 5. USE OF REPORT FORMS OTHER THAN THE personal-injury traffic accidents were classified as 7f9 APPROVED INCIDENT COMPLAINT REPORT instead of 7f3. Larceny reports were mistakenJy classified (OPNAVFORM 5527 /1) -Admittedly, there may be some as burglary and vice versa. report forms that appear to be superior to the Navy's ICR. 2. ASSUMED BY NIS? Simply because NIS was notified Different state, county and municipal jurisdictions' forms does not mean that they assumed the investigation. This may be appealing but they are not authorized for Navy use. problem is especially sensitive since NIS investigations are There are several Navy security police departments using entered into the Defense Central Index of Investigations civilian police or locally designed complaint and accident (DCII) separately. if block #17 of the ICR indicates that reports. This results in reports being received that are not the investigation was assumed by NIS, the ICR received compatible with the Navy's Uniform Crime Reporting from the security department will not be entered into DCII System (UCRS). in order to prevent duplicate investigation files. But if NIS 6.1YPEDNAME,RANK, TITLEANDSIGNATUREOF did not actually assume the case, the incident may not get APPROVING OFFICIAL It is readily apparent that this entered at all. After contact has been made with NIS, Base section, Block23, is one ofthe most overlooked areas ofthe Investigations or any other entity noted in block #21) of the ICR. Ofthe 4,000 reports reviewed, only two activities were ICR, that appropriate block should be checked. In all noted as submitting superior quality reports. They were cases, the name of the agent, investigator or other person most notable because there was an obvious review process who was contacted and the date and time ofthe notification by the approving authority. SUBASE New London and should be noted in the narrative, block #17. Remember Guantanamo Bay, Cuba should be recognized for the mere notification does not mean that the incident will be quality and professionalism displayed in their reports. investigated by NIS. Block #11 should be checked "yes" The Assistant Director for Law Enforcement, Naval only when the SAC or duty agent affirms that NIS will Security and Investigative Command, made the following conduct a follow-up investigation. rccornrnedationsfor securitydepartments to enhance their 3. DO WE USE FIRST PERSON VICE THIRD PERSON crime reporting system. IN THE NARRATIVE? This question has been asked - Every security police department should exercise supem­ numerous times and, from an official written policy stand­ sory oversight for Incident Complaint Reports (lCRs) that point, there is no stated preference. Some security depart- kave the department. ments require third person narratives, i.e. "This patrol unit - The department should develop a lesson plan for report responded to barracks 1423 on a disturbance complaint. writingandew:rymemberofthedepartmentshouldUJUJogo Upon arrival, this patrol unit observed.... " Others require initial training and, ifneeded, remedialtrainingon theproper first person narratives, i.e. "I responded to barracks 1423 on use ofthe incident complaint report and the accident report. a disturbance complaint. Upon arrival, I observed... " Both - The seauily officer, chief ofpolice or a qualified designee illustrations are correct and the Security Officer or Chiefof should be tasked with the respo,isibility for conducting Police should dictate local policy on first or third person periodic (preferred weekly) inspeaion ofreports. narratives. In many cases, both may have to be used in Although report writing may appear to be a burden­ order to clarify subjects named in the investigation. In a some task, it is an integral part of law enforcement. forthcoming revision to the Navy Law Enforcement Man­ Reports not only relate what happened in a particular ual, the Naval Security and Investigative Command will incident but, collectively, they reflect the quality and pro­ standardize report writing procedures to require the third­ fessionalism of the individual and the department submit- person method. ting them. No matter how ·qualified and thorough a law 4. WHERE, ON THE FIRST PAGE OF THE ICR. DO enforcement officer may be, if he or she cannot effectively YOU RECORD THE DATE AND TIME OF THE AC­ and accurately portray his or her investigative findings on TUAL EVENT? Blocks #12 and #13 are often used, due an Incident Complaint Report the officer's efforts will be to their proximity to "Assumed by NIS", to record the time unnoticed and incomplete. * and date that NIS was contacted. This is incorrect. Appen­ dix A to OPNAVINST 5580.1 directs you to use these blocks to indicate the time and date of the event being investigated.

Sentry IS Spring/Summer 1988 ~ ~ ,---. ,---. ~ ,__.. ,--.. ,--...... ~ ~ ...--.... ,._...... ~ ,---...... ~ ~ ,...... _, ,...... ----...... ---... "--" ,...... ~ ...__,,., ...,_, ...__,,., '-"" ..___...... __.. ..,___, ...... , --..., '-" ...... , .._,,, "--" ...___,, ...__, ...__, ----- ~ ..__, ...__,,. .._,,. ..._.,.

Police roles fire safety

by Daniel J. Benny, MA, C.P.P. "'"'• •XTINOUtSHINO OirectOf of Police, U.S. Navy Ships Parts Control Center aQUl~MaNT (oo4C• ... , ...... u ,o,, ~•<• ·- Pennsylvania Mectlanicsburg, r-' :i ·. ' [:]CJ he role of the police officer is to protect both people and property in their community. While some . ·?;.- T departments may look at this as only providing 0\ protection against criminal activities, most progressive departments utilize police personnel as part of their total ...... _,._ crime and loss prevention program. This may include fire ---···~·- - safety responsibilities. -- safety duties may include assisting in evacu­ Fire Training in the proper use of various types ot firefighting ations and actual fire fighting during structure or vehicle equipment should be provided to all police officers, with fires. Unfortunately, sufficient fire safety training is not an emphasis on firefighting safety. always provided. Training is usually limited to an oral review of evacuation procedures and a brief explanation of how fire equipment should be operated. fire drills conducted by local fire parties or departments. For the police officer to perform effectively in an This not only gives valuable, practical experience to the emergency situation, this type of training is insufficient. In officer should an emergency occur, but is an excellent tool addition to an initial orientation, hands-on training should in building community confidence in the police depart­ be conducted. ment.

EVACUATION OF STRUCTURES FIRE FIGHTING EQUIPMENT

Hands-on training in the use of all types of fire Some responsibilities of police officers during a fire fighting equipment utilized in the community.is essential. emergency is to assist in the evacuation of the structure and Through the cooperation of local fire departments or fire securing the outer perimeter and fire line. academies, police personnel can be given the opportunity The best method for police officers to learn what is to use various types of extinguishers and small diameter expected of them during an evacuation is to participate in hoses, such as those that would be found on standpipes within or near buildings, to put out actual fires. role is only to contain the fire, if A""ELAIIIU I.,.UO(L The police officer's ~ VAl.Vf I ~ CONTIIO possible, until professional fire fighters arrive. Training "~t fXaGU1$>!fM must emphasize this fact and stress safety factors. If a security or police department decides to use its .. personnel for these duties, it is their responsibility to ...., provide adequate professional training which will allow the . officers to perform their duties in a safe and effective Police officers should be aware of the manner. By using police officers as part of the total protec­ safety equiP,ment to location of all tion program, both lives and property can be saved when ensure they can respond quickly. such an emergency occurs. *

16Sentry Spring/Summer 1988 EVIDENCE

"I'm sorry, Joan. SYSTEM The evidence was ruled inadmiss­ able. There was It can said to be a problem in the evi­ make your case dence system." or break it

by MAI William J. Moriarity (a) Primary/Aitemat.e Evide,u;e Custodi­ LEPS Assistance Team, Pacific ans are not designated in writing by the commanding officer. s the eviden.ce custodian in your security depart­ (b) Evidence/Property Custody Docu­ ment doing his job co1Tectly? ments (OPNAVForm 552'7/22) are not being properly IIs the evidence custodian designated in writing? filled ouL Is evidence properly safeguarded? (c) Evidence Lockers/Rooms do not meet Are the appropriate logs, f onns and files being used the minimum requirements for safeguarding evidence. and properly documented and maintained? (d) Evidence is being improperly tagged, If you can answer "NO" to any of these ques­ packaged and marked. tions, the evidence system at your command is not (e) Evidence Log and Evidorce Files are being properly maintained. This means that evidence not being properly Tt!COl'dllJ and mainlainetL could be ruled as inadmissable and if that happens, (f) Evidence Lockers/Rooms contain you might as well "Kiss your case good-bye." items not pertmning to the evidence system. So take a look at your evidence system to ensure (g) lnventmies of evidence are not being that the requirements set forth in OPNA VINST conduct.ed and doa.unented.. 5580.1 (DON Law Enforcement Manual) are being (h) Proper evidence disposal procedures met. Ifnot, identify the problem areas and implement are not being conducted and doa.unented accordingly. corrective actions needed to meel those require­ These discrepancies are easy to correct if the ments. Take the necessary steps to ensure that those guidelines set forth in OPNAVINST 5580.1, Chapter standards are maintained. 17, Evidence Custody Procedures are followed. Evidence is an important part of the job of IT'S IMPORTANT! law enforcement. Take a look at your evidence system While conducting assist visits to various secu­ ~nd ~ake sur~ you are collecting, documenting, stor­ rity departments, the Law Enforcement and Physical mg, mventorymg and disposing of evidence properly. Security (LEPS) Assistance Team, Pacific, observed Remember, evidence is important, "It can make or several major discrepancies in command evidence break your case." * systems. The problem areas ranged from the lack of letters of designation to the use of non-approved evi­ dence disposal methods. The following list includes several of the most common discrepancies that were noticed:

Sentry Spring/Summer 1988 17 111111111111111111111111111 I II1 11111111I 11111I1111111111111111111111111 I I Ill III 11I II II II II II III I II II II II II II III I IIIII I 111111111111111111 INFORMATION SECURITY Classification review going well

he Information Security Over­ over FY 1986. However, there was a tion security program video which sight Office (ISOO) has issued 44% increase in the number of secu­ won the American Society for Indus­ T the 1987 annual report to the rity discrepancies reported. Some of trial Security Distinguished Achieve­ President. this increase can be attributed to ment Award for video competition. In the report, the ISOO direc­ heightened security awareness. Information on obtaining copies is tor noted that military operations and • The munber of original classifi­ available at (800) 382-0080. Arrange­ exercises have significant effects on cation authorities in the Executive ments for reproducing this video lo­ the classification of official informa­ Branch continued to decline to a rec­ cally can be made by calling the ISOO tion. In particular, Navy operations in ord low of 6,721. The Navy, however, staff at Commercial: (202) 535-7251. the Persian Gulfhave caused a signifi­ showed a slight increase. CNO(OP- cant increase in the number of re­ 09N) is now conducting a review of ported Department of Defense DoN original classification authori­ (DoD) classification actions. ties to determine their need to have * Reviews of information and that authority. personnel security programs and clas­ • Among all executive branch sified documents at DoD and Depart­ agencies, DoD accounted for more ment of the Navy (DON) facilities than 70% of all classification deci­ yielded the following results: sions, with the CIA accounting for • The document classification, 22%. downgrading and declassification • One percent of all original clas­ program is working well. Some areas sification actions were at the TOP SE­ of concern, however, are the overuse CRET level, 51 % at the Secret level of the indefinite duration ofclassifica­ and the remaining 48% at the Confi­ tion ( OAD R) and related over classifi­ dential level. (This statistic seems to cation. indicate that we are not overclassify­ • Agencies conducted Zl,522 ing at the TS level.) self-inspections, a marginal increase ISOO produced an informa-

RANKIN Update _hat is RANKIN? The Retrieval and Analysis of Notable additions to the series include guidance for the De­ Navy Classified Information (RANKIN) project is partment of Defense (DoD) Counterintelligence Program W an automated data base of security classification and the DoD Locks, Safes, Vaults, Containers, and Seals guides. A major overhaul of this data base was started in Program. March 1987 and is still underway. Meanwhile, several new Additional copies of DoD 5200.1-1, the DoD Index of and revised directives relating to the RANKIN program Security Classification Guides, are available. This index is have been completed or are nearing completion. The new useful to program managers to determine whether guidance Department of the Navy (DON) Space Programs security exists that may be relevant and adaptable to their classifica­ classification guide series (OPNAVINST 5513.14) has tion programs, plans, and projects and, if such guidance been approved by CNO (OP-09N) and has been distrib­ exists, where to find it. Use of the Index is helpful to avoid uted. The series contains guidance on Space-Based Radar divergent security classification determinations between (SBR) and the Navy Remote Ocean Sensing System components over like information. (NROSS). If you need assistance regarding DON classification Revision "C" toOPNAVINSTS5513.4 series, DON guid.p1ce, or would like a copy ofthe DoD Index, contact the security classification guidance for General Intelligence, RANKIN Program Manager, Ron Marshal~ at Commer­ Cover and Deception, Security and Investigative cial: (301) 427-5951, or AV: 291-5951. * Programs,has been signed and will soon be distributed.

1sSentry Spring/ Summer 1988 Ill II 1111111111111 IIIII 1111111 Ill 111111111111111111111111111111111111111111111111111I r111f11111 111111111111111111111111111111111111111 IIII I 11 ,e11e11 PERSONNEL SECURITY o,iet stu ies SOVIET SEAPOWER PROGRAMS

he Soviet Seapower programs are highly polished presentations that are designed to help heighten awareness of the Soviet Union. A five­ T member instruction team will come to local commands and set up a classified or unclassified multimedia presentation, complete with Russian music, military flags, naval warfare crests, and authentic Soviet navy uniforms. The Soviet Seapower team is assigned to the Navy and Marine Corps Intelligence Training Center (NMITC), Dam Neck, Virginia. The May 1987 issue ofALL HANDS provided an in-depth look at the people and props that are part of the Soviet Seapower program team. The SECRET-level classified version, called the Soviet Seapower Education Program, is usually an all-day function lasting from 0800 to 1500 (with a built-in lunch break). The minimum size audience is 250 persons. The SovietSeapower Awareness Program is the unclassified version and is a two and one half hour presentation. For more information, contact: NMITC, Bldg 420, Attn: SSEP, Dam Neck, Virginia Beach, VA 23461- 5575; or call AV 433-8190/8202. *

SOVIET TECHNOLOGICAL BRIEFING TEAM

he Soviet Technological Briefing Team provides a one-hour w1clas­ sified briefing on the Soviet military attitude toward America and T American technology -- an unusual way to start a conference or security awareness seminar. · Two active duty military members provide the aviation/technology oriented briefing. The Soviet Technological Briefing Team has appeared before civic groups, ROTC, college conferences and veterans organizations. The requesting organization is usually responsible for the travel expenses of the two-man team. For additional information and to schedule an appear­ ance call Master Sgt. Hodson at AV 787-5120, or Commercial: (513) 257- 5120, or write to: FrD/PA, Wright Patterson AFB, Ohio 45433-6508. *

Sentry19 Spring/Summer 1988 1•11•11•11•11•11•11•11e11e11e11e11e11e11•1•11•11•11•11•11•11•n•11•11•11•11•11•11•11•11•11•11•11•11•11•11•11•11•11e11e11•11•11•11•11e11 e11e11e11e11e11•11•11•11e11•11•11•11•11•11•11•11•11•11•11•1

SECURITY AWARENESS WEEK "FOLLOW THE RULES"

Internal Security is to be taken seriously," said Rear Adm.John E. Gordon, Commander, Naval Security and Investigative Command, on 14 March 1988, in the opening speech of the Security Awareness Week seminar' ' held at Naval Air Station Patuxent River. "Since the Walker-Whitworth spy case the Navy has become more aware of the need for internal security," he said. _The Navy has seen a 37% decrease in granted security clearances and the Navy Security Manual has been rewritten. These changes came about due to the Navy's heightened concern of espionage matters since the Walker-Whitworth spy ring was uncovered. The admiral also mentioned the NSIC 24-hour Hotline for information on alleged, suspected or actual espionage. On the HOTLINE, (800) 445-7343, personal interviews can be arranged and confidentiality will be assured. He asked that all personnel be alert to security problems around them. "The reasons for espionage have changed," Gordon said. "Thirty years ago, personal beliefs motivated most spies. Today, money is the primary reason for entering into espionage. Foreign government agents look for persons who have access to classified materials and are in financial difficulty. Regulations, when followed, keep employees from falling into a trap. "You must follow the rules because the rules are made to protect our national secrets, and those secrets could be, in some future battle, the difference between victory and defeat. *

INFORMATION AND PERSONNEL SECURITY

REGIONAL ASSISTANCE

s part of a continuing effort to improve security in the Navy, an experienced Information and Personnel Security specialist has been assigned to the Naval Investigative Service Regional A Offices (NTSRO) at London, Norfolk and Pearl Harbor. These security specialists will work with commands to improve the safeguarding of classified information and the professionalism of security personnel. Assistance will be in the form of consultations on security problems, program evaluations and training. More information will be provided to [ocal commanders as the security specialists report aboard the NISROs. *

2osentry Spring/Summer 1988 1e11ene11e11e11ene11e11e1Iei1enene11e11e11e11e11e11e11e11e11e11e11e11e11e11e11e11e11ene11e11•11•I1•11•IIe1Ie11e11e1Ie11e11e11e11eI1eue11e1, IIIIIIII II II II II II IIIIII IIII I111 111111111111I1I1111111111111I1I11111I1111111I1I I Ill I II 11I11111I11111I1 111 I I1I1I1I1IIJI II II 1111I1I1111111I1I1I111111111I11111111111I III II 11I1I1111111111I II 11

SECURITY ACTION LINE

The Security Action Line, Autovon 291- 5971 or Commercial (301) 427-5971, is available for immediate assistance on INFORMATION AND PERSONNEL security problems. During duty hours, you will be referred to the member of our staff who can best answer your particular questions. After duty hours, your message will be recorded and answered the next working day.

Sentry21 Spring/Summer 1988 11 1111111111111111111111111111111111111111111111111111 II Illllllll 1111 1111111111I I I111I1I I III I I lllll I1I1I1I11111I1I1I1I111I1I1I111I1I1111111I1I1I1I1I111I1 III I II ll I1I1I1I1I1I1 1111I1I1I1111111I1I1I1I1I1I111I1I I II II II I How to Be a Spy 'in Six Easy Lessons . ..

Join a group and pretend you belong 1 there. Be unobtrusive or bold, as the occasion demands. Nice guys assume that everyone else is a nice guy and -­ here's a laugh -- won't challenge your "need to know" for fear of hurting your feelings. Watch for sensitive or classified material 2left unattended. Lunch periods and coffee breaks are times of good hunting.

Check wastepaper baskets for pay dirt. Scribbled 3notes and frazzled carbons are just as good as "smooth copy."

22 Find employees with more classified material in 4 their possession than they really need. This is the pack rat type. They have only a general idea of what documents they have so if some of them disappear ...

Remember, not all sensitive or classified material 5 is printed. A few microfiche or a dozen slides can be a bonanza.

Keep a sharp eye for classified material that has not 6 been properly logged, because this plays right into your hands. When you snatch it you are home free. You've left no trail, only a dead end. (Better yet, use a copy machine. That's the best way to get classified information without leaving any trail. Details on this procedure nex,t issue.)

... . lessons which also help us to detect and prevent espionage.

Adapted from "Security Awareness Month Communique" issued by Defense Investigative Service. Artwork by Graphics Division, Defense General Supply Center, Richmond, Va.

SentryzJ Spring/Summer 1988 11111111111111 II I Ill III II II II II II I I 11111111111111111111 1111 II II II I I 11111111111111111111 II 11111111111111111111111111111111111111111111111I II II II I I 11111111111111 1111111111 1111111111111111111111111111111111111111111111

problems regarding the individual and The secret that we believe they are suitable for a position of trust with the government. to protecting Unfortunately, there have been sev­ eral instances where friends or co­ Classified workers were aware of significant in­ formation -- but failed to report it. Information Reasoning behind this seems to range from simply not wanting to get in­ volved to fear of reprisal. But each of us have a responsibility to be truthful Get and accurate when providing informa­ tion for background investigations. These investigations are conducted to involved protect every one of us and are part of the first step in the Navy's efforts to protect classified informa­ by M. D. Bruggeman NI$ Special Agent tion. Coun_terintelligence Directorate Americans have been alarmed by the number of espionage cases that have been uncovered in the past sev­ Excuse me, sir. We are investi­ eral years. The damage to our nation's gating Mr. John Doe to deter­ security and the cost to our country, in mine his suitability for access to terms of money needed to overcome classified material within the Depart­ the damage, have been significant. If ''ment ofDefense. We understand he is there is any consolation to be found in an associate ofyours. Do you have any these cases, it is that in several of them information, or know of any reason it was the alertness ofco-workers, and why Mr. Doe would not be suitable for their willingness to accept their re­ the position?" sponsibility to report suspicious activ­ "Who,John? No. He's a great ity, that uncovered the espionage. guy. No problems." Department of the Navy Now Mr. Doe is suspected of (DON) efforts to protect classified espionage. Had the person being information are broken down into questioned about Mr. Doe told the four areas. These are personnel secu­ investigators everything he knew rity, security regulations, security about John, some potentially very sig­ awareness and investigations. Each nificant damage to our nation's de­ area cannot stand alone and each in­ fense would have been prevented. volves the active participation of all Why didn't he? DON members. They are all interre­ Many of us have been inter­ lated and every DON member must viewed as part of a background inves­ understand his or her role in maintain­ tigation conducted on a co-worker or ing the integrity of the system. friend. The easiest and quickest way The first part of the system is to get this time-consuming procedure personnel security. It is the responsi­ over with is to report that there are no bility of the DON to carefully select

24 11I1I1I1I1I1I111I1I II 11111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111111II I I IIII II Illl ll l I II II II I1I1I1I1I1I1I1I1

and screen the personnel that will have access to classified information. Part of this process is to conduct back­ ground investigations on individuals selected for access to classified mate­ rial. It is also necessary to ensure that these background checks are periodically updated and that the ad­ judication process is properly exer­ cised with clearances being denied to those who do not satisfy the basic requirements. The second part of the system concerns security regulations. Every person who comes in contact with classified information must be knowl­ edgeable of the DON regulations for handling classified material. These regulations are established to provide ate the situation and determine if Many of the investigations conducted a uniform method for handling and espionage is occurring or likely to by the Naval Investigative Service are providing protection to classified occur. We do not live in a vacuum. initiated as the result of reports by material. At times these regulations Activities by our co-workers that re­ DON personnel. Counterintelligence are inconvenient and may seem to flect on their suitability to have access investigations are a complex under­ hamper operational efficiency. It may to classified material must be re­ taking with many legal guidelines, but appear that not following the regula­ ported. We must be aware that espio­ each investigation must start from a tions does no great harm and gets the nage is a very serious threat to the report of suspicious activity or known job done more quickly; however, this security of our country, be willing to security violation. Without the help of action leaves us open to disciplinary get involved and be sensitive to secu­ all DON personnel, very few investi­ actions and worse, we contribute to a rity problems in our work place. gations would be initiated and our se­ work environment that could allow a The final part of the system is curity would be greatly diminished. person committing espionage to work investigation. This occurs when a We, as DON members, com­ freely. Violations of security regula­ problem has been identified. A pro­ prise the first line of defense in pro­ tions should be promptly reported. fessional investigation protects the tecting our nation's security. We have The regulations are for all DON per­ rights of those involved and allows the responsibility to properly protect sonnel and we all have a responsibility, legal or administrative action to be the classified material we come into not only to follow the regulations, but taken if appropriate. The investiga­ contact with and to report circum­ to report violations. tion of espionage or significant secu­ stances we observe that c-0uld result in The third part of the system is rity problems also gives the respon­ the improper handling of classified called security awareness. As stated sible commander a report of the defi­ material or information. Even from earlier, some of our recent espionage ciencies that allowed the problem to "insignificant" security violations, cases were discovered because of the occur. It helps the commander to activities which threatened our alertness of co-workers and their will­ determine ifsecurity procedures need nation's security have been uncovered ingness to report suspicious activity. better enforcement or to change inef­ and stopped. We all must be involved. The prompt reporting of suspicious fective procedures. Investigations do It is our best defense in countering the behavior and security violations al­ not stand alone. To be effective, they espionage threat. * lows investigative personnel to evalu- rely on the other parts of the system.

Sentry2S Spring/Summer 1988 USS MMITZ (CVN-68) Carrier hosts Open House for law enforcment officials

by Special Agent Mitchell L. .Anderson, MA1 James Head, and MA1 Randy Railey photos by AN Evan E. Schultz and PHAN Peter Silver USS NIMITZ (CVN-68)

ne morning, the command It was proposed to the com­ the heads of various local, state, and judge advocate and the NJS manding officer that a day be set aside federal agencies in the Bremerton and 0 Special Agent Afloat were to thank those law enforcement offi­ Seattle areas. having their usual cup of coffee on­ cials who helped the ship in transition Tour routes were established board the aircraft carrier USS NIM­ to her new home, and made her feel and tour guides were recruited from ITZ (CVN-68), when an idea was like a welcomed addition lo the Puget the Master-at-Arms Division, the le­ born. Sound community. The proposal was gal offices, and the brig staff, as well as Since NIMITZ arrived in her enthusiasticly supported and the from the local NIS Office in Bremer­ new homeport of Bremerton, Wash­ wheels were set in motion to plan the ton. Upon hearing of the event, vari­ ington in July 1987, the command has first "Law Enforcement Appreciation ous volunteers from different depart­ been assisted by the efforts of the men Day." ments onboard NIMITZ came forth and women in the local, state, and Captain Brent M. Bennitt, to offer lhier assistance in the en­ federal law enforcement communi­ NIMITZ's commanding officer, sent deavor and the ship's Supply Depart­ ties. out invitations for January 30, 1988 to ment provided refreshments and opened the ship's stores so the guests could purchase souvenirs. At first it was expected that 200- 250 people would respond to the invi­ tations. However, the planners under­ estimated the interest of the commu­ nity. Within a short period oftime, 400 confirmed reservations were re­ ceived. True to the 'NIMITZ team­ work-tradition,' more volunteers came forward to serve as tour guides. The event was scheduled to begin at 0900, but at 0840, a frantic call was received from the pier sentry who declared that the visitors had arrived! Coffee cups were stowed, do­ nuts inhaled, and Law Enforcement Appreciation Day was underway! At Several Bremerton-area law enforcement officials and their families watch and listen intently one point there were more than 200 as a NIMITZ sailor describes the functions of the aircraft carrier's helm. eager visitors ass em bled in the hanger bay. 26 Visitors were greeted at the ship's afterbrow, asked to sign a visitor's log, and were treated to the movie "Air Power at Sea." Then it was off to tour the ship. The route consisted of the hanger bay, forecastle, carrier air traffic control center, navigation bridge, flight deck, mess decks, and the ship's stores. In each of the locations the visitors re­ ceived an overview of the function and mission of that particular work center. Many were surprised to learn that there was also a Marine detach­ ment on board the aircraft carrier. I The Marines provided a static display A Marine demonstrates the workings of several types of sma I arms from the ship's of the latest weapons employed in armory to some of NIMITZ's fascinated guests. their role of providing physical secu­ rity for the ship. Just to prove that some things never change, one young visitors, the most popular stop on the Law Enforcement Appreciation Marine kept Marine Corps tradition tour had to have been the ship's stores, Day." The youngest visitor was only a alive by field-stripping his .45 caliber for almost everyone was sporting a few weeks old, and the oldest guest pistol at least 50 times. NIMITZ ball cap, and lighting ciga­ was 82. With the tour behind them, rettes with their new NIMITZ light­ If evident by the favorable each individual bad a better apprecia­ ers. comments by the departing visitors tion of life aboard the world's largest When the cake platters were and the numerous letters of thanks warship. Back in the hanger bay, empty and the clean up process had and appreciation that were received, visitors bad an opportunity to enjoy begun, the final count was in: more one can only conclude that Law En­ some refreshments, converse with old than 30 law enforcement and judicial forcement Appreciation Day was a friends and make new ones. agencies were represented and over day well spent. * As was evident by the departing 800 visitors had attended "NIMITZ

USS NIMITZ LAW ENFORCEMENT APPRECIATION DAV

OPEN HOUSE

-TOURS -FILMS -SOLNENIRS -FAMILIES WELCOME

Sentry27 Spring/Summer 1988 CAF Director receives SECDEF's highest civilian award

by Gary M. Comerford, NSIC Public Affairs Officer

an Jacobsen, Director of the CenLral Adjudication Facility (CAP), was awarded the Secretary of Defense Medal for Meritorious Civilian D Service, the highest civilian award given by the Secretary of Defense, in July. Rear Adm. John E. Gordon, Commander NSIC, presented the award to Jacobsen in a ceremony held at Naval Security and Investigative Command (NSIC) Headquarters. Jacobsen received the award for his work on the Department ofD efense Polygraph Program. He was assigned Lo the staff of Deputy Under Secretary of Defense for Counterintelligence and Security as the Assistant for Personnel Security from November 1985 to January 1988 (when he reported to NSIC). During this period he instituted a number of programs, including the DoD poly­ graph program for which he received his award. *

Dan Jacobsen, shown with wife Jackie and children, Heather, 6, and Scott, 4, wears his medal with pride. (Photo by Gary M. Comerford, NSIC Public Affairs Officer)

Anti-terrorism pamphlet IXl@\YHJ U@ on@@ ~lhl@®@ ~@~@® for your command Master copy you can reproduce !Pages 29 and 30 are the Anti-Terrorism IResldlential Measures pamphlet be next two pages are designed as an Anti-Terror­ Security ism/Crime Prevention brochure. Just copy both pages T Just photo-copy front and back of the following ( front and back) of the two pages, fold where indicated and you h ave an instant supply of pamphlets to support Crime Prevention efforts. pamphlet -- make as many Make as many copies as you need and store the original in copies as you need! ... a safe place for future use. In this issue, we are addressing residential security meas­ ures which can help people protect their homes from crime and reduce opportunities for terrorist activity. This pam­ phlet was o riginally produced by the Naval Investigative Service. We will try to keep you "stocked" with a variety of brochures and pamphlets to support Crime Prevention and other programs. Look for more Crime Prevention and other topics in future issues of Sentry. Any questions regarding this pamphlet or sugges­ tions on subject matter and possible topics, should be referred to Editor, Sentry, Naval Security & Investigative FIGURE (I) Command, Code 24J, Washington, D .C. 20388-5400 or call fold as indicated In Figure (1) J02 John Verrico at AV: 293-3490 or Comm: (301) 763- 3490. * and yol.JJ' re ready to give them out at your commandli

28 Sentry Spring/Summer 1988 Develop at least an aquaintance with your immediate Remember that your residential security is only as TERRORISM ANTI-TERRORISM ANTI­ neighbors. If warranted, devise a visual distress signal to good as your residence's weakest security feature. For in­ -TERRORISM ANTI-TERRORISM ANTI· warn neighbors of a threat. stance, you can own a state of the art lock system for Tl-TERRORISM ANTI-TERRORISM AN. your doors, but they will not be very effective if you leave your windows open. "IT/-TERRORISM ANTI-TERRORISM Al Special Considerations for Children .NTI-TERRORISM ANTI-TERRORISM A For any further information or assistance, please con­ Ensure that your children know to avoid playing in tact your local N IS office. ANTI-TERRORISM ANTI-TERRORISM isolated areas. Encourage them to play and travel in W ANTI-TERRORISM ANTJ-TERRORIS1. groups. Available NIS Support ,M ANTI-TERRORISM ANTI-TERROR/~ Warn children about being approached or questioned by strangers. Encourage them to report anything unusual to Upon request, the Naval Investigative Service has the you. capability to provide the following support in consideration of the terrorist threat: ANTI-TERRORISM Make certain that they keep you informed of their whereabouts at all times. 1. Terrorist briefings/lectures RESIDENTIALSECURITY Advise school officials not to release your children to 2. Advice and guidance on terrorist related incidents and anyone other than family members and/or designated crisis management staff members, and only after verifying Identification. MEASURES 3. Threat assessments for specific commands, areas, events and persons Tl-TERRORISM ANTI-TERRORISM AN'. Domestic Employees VT/- TERRORISM ANTI-TERRO~ISM Al 4. Protective Service Operations for select individuals Where possible, before employment, provide refer­ upon confirmation of a legitimate threat. (Note: Re­ NT/-TERRORISM ANTI-TERRORISM A. ences and biographical data on the potential employee to quires express approval of the Director, Naval In­ ANTI-TERROR1c-•• • "'T"t.TERRORISM . appropriate U.S. government personnel In order that a vestigative Service) security check can be conducted. 'rf ANTI-TEFJ. _.,-:::;:==:::::::,..._ TERROR/SA 5. Investigation of suspecled/actual terrorist incidents ,MANTI . 7iRRORI~ Domestic employees should be briefed on security prac­ tices and procedures. They should be the ones to answer 'ISM AN "ERROR. the door rather than family members. They should be in­ RISM Ji ..n TERRO, structed not to admit strangers, repairmen or anyone ORIS -TERR< without verifying their identities and purpose. Employees should be informed of expected visitors and provided with lORISN. II If '/-TERR a physical description and time of arrival of expected qoRJSM lTI-TERI guests. ':/RORIS ~==--=-~~ ANTI-TEF You should continuously appraise the attitude and alert­ ERROR/SM ~~~e,. ..SM ANTI-Tl ness of employees and watch for indications of laxness TERRORISM A , , t:.'HRORISM ANTI-~ and/or changes of allegiance. · TERRORISM ANTI-TERRORISM ANTI• Safe Haven Tl-TERRORISM ANTI-TERRORISM AN1 VT/-TERRORISM ANTI-TERRORISM A'1 If possible, your residence should contain an area NTI-TERRORISM ANTI-TERRORISM A, which is identified as a safe haven or safe room. If in­ truders try to gain access to your residence, this room ANTI-TERRORISM ANTI-TERRORISM . gives you additional time for emergency personnel to re­ H ANTI-TERRORISM ANTI-TERROR/SN spond. The room should have a sturdy door and lock with an emergency exit. Ideally, safe havens should contain an '>MANTI- TERRORISM ANTI-TERRORJS emergency communication system, medical supplies, 'ISM ANTI-TERRORISM ANTI-TERROR, water, sanitary facilities, food, and emergency lighting. Distribution: Stocked: RISM ANTI-TERRORISM ANTI-TERROJ Bathrooms often make good safe rooms. For more infor­ SNDL Parts I and 11 CO,NAVPUBFORMCEN mation regarding the security features of a safe haven 5801 Tabor Ave. OR/SM ANTI-TERRORISM ANTI-TERR< consult your local NIS office. Philadelphia, PA 19120 rORISM ANTI-TERRORISM ANTI-TERR qORISM ANTI-TERRORISM ANTI-TERF This pamphlet was prepared by the Naval Security - Reliability of utilities (disruption of electricity or please contact your security officer or your local NIS and Investigative Command to inform and caution Depart­ telephone services would facilitate intruders gaining ac­ office. ment of the Navy (DON) personnel and their dependents cess to your area.) about terrorism and measures that can be taken to enhance their residential security. Although this pamphlet - Easy access to main roads. Precautions for the Family is directed towards those DON personnel serving outside - Off street secured parking (preferably a lockable the continental limits of the United States (OCONUS), the It is important to make sure that family members garage). security precautions described are equally applicable to receive appropriate briefings and that they are aware of daily routines in CONUS and will help combat criminal - Adequate exterior lighting. the security threat in your area. The safety of .your family and/or terrorist threats against DON personnel. You and is dependent upon the involvement of all family members your dependents are encouraged to review the pamphlet If possible, have your residence surveyed by a profes­ in proper security measures. The following suggestions prior to any permanent change of station (PCS), and sional security officer. Request guidance from your local will enhance the safety of all your family. discuss all pertinent aspects. If you have any further security officer on what residential security standards questions, please contact your local Naval Investigative should apply for your area and make an informal survey Have family members memorize telephone numbers for Service (NIS) Resident Agency. of your own residence. emergency situations. Make sure all family members, par­ ticularly children, know how to ·use the phone. In Terrorist acts at personal residences, while rare, can Physical Security OCONUS areas make sure they know how to use the possibly be thwarted by taking a few common sense local phone system. Post emergency numbers near the precautions. Individual alertness, awareness of the threat, Physical security measures that you can practice at phone. If your residence is equipped with a portable radio and taking basic protective measures have proven to be home vary and should be evaluated in accordance with or duress device for emergencies, ensure that all family deterrents against the terrorist threat. This pamphlet con­ the threat in your local area. The following areas will have and staff members know how to operate it. tains basic protective measures that, if understood and an impact on the ease of intruders entering your home: followed, will significantly reduce vulnerability to terrorism. fencing, outside lighting, landscaping (large shrubs near Warn family members against revealing information about entrances provide cover for possible intruders), animals, travel or other family plans. Site Selection guards and an alarm system. Be wary of telephone surveys in which you are asked for Do not post your name/rank so as to identify your names and ages of your children. Do not divulge perti­ If you are selecting your own residence, the following residence. nent family information to any unknown person over the suggestions should be taken Into consideration: phone. - A well designed and well managed apartment is more Any access to your residence is a potential entrance for secure than a separate house. an intruder. Measures should be effected to Keep close control on information pertaining to your ad­ strengthen/secure doors, windows, vents, or air condition­ dress, itineraries and family. - The next most secure dwelling is a cooperative com­ ing openings. pound, which is a number of separate houses clustered in We suggest you develop a family biography, to be kept in the same general area. Look for areas where other DON Make it a family practice to habitually keep outside doors a safe location, containing identification information on or diplomatic residences are located. These compounds and the garage closed and locked. When necessary each family member that would assist the authorities in are common in many areas, and may include a fenced change the door locks. the event that an emergency should occur, including perimeter, guards, lighting and/or alarm systems. medical records, photos and a set of fingerprints. Ensure that you have a substantial door (solid core) wilh - A separate residence In a suburban area, or in an a substantial locking system, such as a deadbolt, that can It is absolutely vital that the doors never be opened to isolated environment can be adequately secured. Even not be easily kicked in. Keep all accessible windows and unscheduled repairmen or strangers. Ensure that your so, this type of residence is more vulnerable to intrusion doors locked. door has a peephole. Repairmen's identities should than those already mentioned. Housekeys are an item that both terrorists and thieves always be verified when you do not recognize them. - The least secure residence is one which is located in like to get their hands on. Keep them separate from car In OCONUS areas, instruct family members and domestic a crowded neighborhood in an urban environment. This keys and maintain accountability for them by all family help not to accept any unsolicited packages. Mail should type of residence should be avoided if possible. members. be routed through the office. Check to see if there are adequate smoke/fire alarms with Site selection should include attention to the flavor of the a back up energy source. Consider the use of an intru­ Be alert for persons disguised as public utility crews, neighborhood. Identification of high crime neighborhoods sion detection system (IDS). workers, vendors, etc., who may be conducting a can be obtained from your command security officer or surveillance. Report any unusual or suspicious activity in the local NIS office. Become familiar with the capabilities A dog is still one of the best alarm systems. the vicinity of your residence. and limitations of the local police. Aquaint yourself with the prospective neighborhood by walking or driving Again, for fu.rther guidance and. specific requirements for In OCONUS situations make sure that all family members through the area. The following factors should also be physical security for your residence, such as specific know enough of the local language to seek help, police considered: types of locks, alarm systems and hardening techniques, and medical assistance. MWD PROGRAM

hey serve !hroughout the Navy - protectmg our resources, T fighting the war against drugs, School answering bomb threats and acting as an ever vigilant partner lo our Mas­ ters-at-Arms. And they do all that for for dogs no pay except food, shelter and com­ panionship. They are our Navy's mili­ tary working dogs. Basic training for the dogs and technical training for dog handlers is conducted as an all-service effort at Professionalism begins the Air Force Security Police Acad­ emy, Lackland Air Force Base, Texas. at Lackland Dogs and students are taught sepa· rately in the areas of patrol and drug detection, while explosive detector dog training is conducted simultanc· ously with their human counterparts. The Naval Technical Training Center Detachment, commanded by Lt. Mi­ After the dog successfully ous and requires a high level of profi­ chael P. Bryce, has 19 personnel as• completes patrol dog training, it un­ ciency of the "team" prior to gradu­ signed - 13 dedicated to the training of dergoes a series of tests to determine ation. the dogs and 6 who instruct the stu­ its aptitude to be trained as either a Duty at Lackland is physically dents in handling those dogs. drug or explosives detector. These and mentally demanding requiring The 52 multi-service dog train­ tests, like all of the training proce­ courage, dedication to duty and fast ers assigned to the Dog Training Sec­ dures, are the work of Dr. Dan Craig, reflexes. The rewards are the satisfac­ tion, under the guidance of Chief who applies years of experience in tion of seeing an untrained dog or Master-at-Arms Lisa Albuquerque, experimental psychology to the pro­ student become a reliable member of have the unique job of training the gram. a law enforcement team with the po­ patrol and drug detection dogs. "The Following fmal certification in tential to save lives or fight in the war Dog Training Section is the founda­ the Dog Training Section, the dog is against drugs and terrorism. The tion of the military working dog pro· either prepared for shipment to a field trainers and instructors also learn gram in any service or agency. The unit or is placed in one of the handler valuable skills that ultimately benefit quality and quantity of dogs that we courses at Lackland to act as a "train­ Navy kennels. And most importantly, produce determines the future of the ing aid" for the student who is learning they are part of a small but proud program," Albuquerque said. the techniques of dog handling. The profession that is a vital link in the Most of the dogs arc purchased patrol dog course teaches the basic military working dog program. in Europe by the Department of De­ uses of the military working dog in­ For more information on the fense Dog Center and arc delivered to cluding the areas of obedience, con­ military working dog program, see the Dog Training Section for their trolled aggression and intruder appre­ OPNAVINST 5585.2. The program initial conditioning. The dogs must hension in buildings and outdoors. sponsor is the Naval Security and show a high level of aggression to meet Navy students attending this six week Investigative Command (OP-09N) the purchasing standards. That en· course often receive a follow-on and information on schools is avail­ sures a challenging time for the trainer course in either the four-week drug or able in the Catalog of Navy Training who is tasked with controlling, focus­ nine-week explosives detector han­ Courses (CANTRAC). * ing and directing that aggression. It is dler course in order that they can meet the trainer's job to take an indiscrimi• the needs of individual commands. nately aggressive dog and create a The explosives detector course, reliable, motivated patrol partner for unique in its training of the handler Reported by MAC Lisa Albuquerque the law enforcement officer. and dog together, is especially ardu- NTTC Detachment, Lackland AFB

Sentry3l Spring/Summer 1988 Navy names

he Navy's "best" Military Working Dog (MWD) confidence course, degree of detector proficiency above Teams were recently selected as a result of the 1987 basic requirements, and controlled aggression. Handlers T MWD Program Manager's Annual Assessment. and kennelmasters were also evaluated on leadership The selections were based on criteria established by qualities, military bearing and appearance. MWDs were the Law Enforcement and Physical Security (LEPS) Assis­ evaluated on grooming. The best and most improved tance Teams Atlantic and Pacific. kennels were determined by additions or changes which To determine who was best, MWD tea.ms weTe improved operational effectiveness, appearance and sani­ evaluated on obedience (on- and off-leash), expertise on a tation of kennel structures and administrative spaces,

BEST DRUG DETECTION TEAM

PACFLT LANTFLT MA2 Robin L. Hopkins & Beau MAl Ronald L. Jacobs & Lucy Naval Air Station North Island Naval Amphibious Base Little Creek, Norfolk

BEST PATROL/EXPLOSIVE TEAM

PACFLT LANTFLT Mr. Ku Sok Pak & Rex EOl Kent Davis & Mark Fleet Activities Chinhae, Korea Naval Station Roosevelt Roads, Puerto Rico

BEST PATROL TEAM PACFLT LANTFLT Officer Donald C. Adams & Renna IC2 Terry L. Dunn & Cora Naval Station San Diego Naval Submarine Base Kings Bay, Georgia

32 ~~~88~8~~888~

top dog teams organization and neatness of documents and reference The MWD Program Manager advises that"hopeful material, and the maintenance and availablility of equip­ candidates for next year's competition should bear in mind ment. lhat perfecting basic fundamentals is not enough. They According to both LEPS teams, competition was should develop new and advanced methods that will make intense and final selections were made after careful consid­ their teams and kennels more operationally effective."* eration of all aspects of dog and handler abilities, and kennel operation. The top teams each demonstrated prog­ ress well beyond basic requirements and proficiency levels.

BEST SMALL BREED TEAM

PACFLT LANTFLT MA 1 Bryan K. Fischer & Sam MAC Patrick B. Jaworski & Kadee Naval Submarine Base Bangor, Washington Naval Station Charleston

BEST KENNEL

PACFLT LANTFLT Naval Submarine Base Bangor Naval Submarine Base New London

MOST IMPROVED KENNEL PACFLT U.S. Facility Subic Bay, Republic of the Philippines

Sentrv33 Spring/Summer 1988 U.S. Facility Subic Bay, Philippines From grim to glorious Navy's biggest MWD program getting better all the time

by MAC Michael Isley plosive/narcotics detection and in­ rest of the nation. Assistant Kennelmaster/Trainer truder interdiction. Working in this atmosphere Subic Bay, Philippines TheRepublicofthe Philippines can prove to be very interesting. There is a unique country consisting of ap­ are eight major dialects and 87 sub­ Awesome" is just an adjective, proximately 7,100 islands. (Subic Bay dialects spoken by Filipinos, although but it is the only one that accu­ is located on one of the three major English is one of three major lan­ rately describes how it feels to islands, Luzon, which is considered guages and is spoken by more than work as a Military Working Dog the rice bowl ofthe country.) Over the 40% of the population. Although the '' (MWD) handler at the largest Navy centuries, a tremendous number of Filipinos learn formal English MWD facility in the world. Stop won­ cultural intermarriages from Indone­ throughout their high school years, dering where the top MWD kennel is sia, Malaysia, China, Spain, Great Americans are more inclined to use located--it's in SubicBay, Philippines. Britain and the United States, has slang terms and euphemisms. The Part of the U.S. Facility Secu­ produced an unparalleled heritage in resulting disparities in the language rity Department (FSD) at Subic Bay, the Philippines. A 350-year Spanish make for some hilarious, as well as the MWD facility is located at the occupation influenced the islands frustrating, moments during the Naval Air Station Cubi Point, about greatly and left a telling mark on the course of a workday, and give new seven miles from FSD's main head­ Philippine culture, customs and reli- meaning to the phrase "communica­ quarters. gion. tion gap." Kennelmaster, Senior Chief There are approximately A major consideration during Master-at-Arms Donald Huffman, 29,000 Filipino workers at the U.S. our training phase is the weather. The has been on board since October 1985. Facility which consists of over 60 average daily temperature is in the He directly supervises about 16 U.S. commands in a 15,000 acre area. The 90s, with 86% humidity. During the military handlers, 16 Filipino supervi­ combined U.S. facilities at Subic Bay rainy season ofJune through October, sors (these include shift lieutenants, and Clark Air Force Base, 45 miles the average rainfall is over 150 inches, desk sergeants and training NCO's), north of Subic, are the second largest and we have an average of five or six two DOD narcotic dog handlers, two employers of Filipinos •· second only tropical cyclones during the season. veterinarians, three kennel support to the government of the Philippines. So, weather does play an important personnel and 75 Filipino patrol dog People come from all around the role in our training cycle. The hotter handlers. He also controls the assign­ country to find work here. Wages, it gets, the more we have to rest our ment and use of about 100 military which are established by an annual dogs or re-arrange the work schedule working dogs of all breeds which are survey of 200 local companies, are so that training can be held during the capable of performing tasks like ex- generally much higher than for the cooler hours.

34 Subic Bay's MWD Program is the largest in the Navy. Shown here is only about one third of the facility's MWD force.

Wetrytovaryourtrainingtech­ lieve that our training is limited only hand or fall victim to it. Hopefully, our niques as much as possible. We by our imagination, and believe me, vigilant stance will prevent that from emphasize training in patrol work one's imagination can run wild here in happening to any of us here at Subic (paying particular attention to in­ the Philippines. Bay. truder detection) and explosive detec­ One aspect of our operation is Every conceivable challenge to tion. The killings of three Americans the transportation of our MWD a military working dog handler is and a Filipino at Clark AFB on 28 teams. We have to make sure we can within your grasp-- right here in Subic. October 1987 have made us more gettoour posts to relieve other teams, Professional development can be, and aware of the terrorist threat and our in addition to maintaining mobile pa­ is, achieved here at a level quite unlike vulnerabilities to attack. Training trols. This is an everyday headache any other facility in the world. Loyalty, anti-terrorist dogs and patrol dogs to and you can appreciate the impor­ integrily, professional conduct and re­ operate under automatic weapons tance of having a good and reliable sponsibility may be buzzwords to some fire, and, the training of tracker dogs maintenance program for all ve­ people, but it's a way of life for us at are part of programs currently in hicles. Subic. We want hard-chargers and operation or under consideration. We designed cages to fit on the those willing to put in 150%. Those We also conduct training with back of mobile patrol units which al­ who think the MWD field is a skate job our FSD street patrols so they can fully low for visibility and easy exit for the need not apply. * appreciate the abilities of a K-9 unit. dog should the handler need him. This joint cooperative venture shows Since sedans are limited, we use the patrolmen what the MWD can do pickup trucks. This is the most pro­ for them, and how to best use a dog ductive and realistic way of using a ••••••••••••••••••• team for law enforcement. Although patrol dog with the mobile patrol. •U.S. Facility Subic Bay~• As a military working dog han­ • • our primary objective is quality, realis­ •MWD program was selected• tic training, we also have our demon­ dler in the Philippines, motivation to stration teams for different com­ maintain proficiency and profession­ :as the Most Improved Ken-: mands or groups who are interested in alism is easy to generate. The ever­ •nel for 1987. • what we do. We conduct several dem­ present threat of terrorism, not just ••••••••••••••••••• onstrations annually for these groups here--but everywhere Americans are and visiting schools. In a spirit of stationed, demands constant training cordial cooperation with our host al­ and the necessity to be ever-alert. It is lies, we demonstrate for local police one thing to read about terrorism and units the MWD capabilities. We be- quite something else to witness it first-

Sentry3S Spring/Summer 1988 NAS Point Mugu The President's dogs

ment and foreign dignitaries, the complex became emi­ by MA1 Fk>bert Quesada and Charles A. Dykes nent. Thus, the air station expanded from one-dog to a NAS Point Mugu four-dog kennel. A primary function of the Military he Military Working Dog (MWD) Section of Pa­ Working Dog Section at Point M ugu is to provide security cific Missile Test Center/Naval Air Station Point for the arrival and departure of the President, Vice Presi­ T Mugu, California, consists of four MWDs: A dent, First Lady, as well as other top government officials patrol/explosive dog, a drug detector dog and two patrol such as the Secretary of Defense, Secretary of State and dogs. They provide twenty-four hour security against ter­ other dignitaries. These operations are conducted in rorists, bombings, illegal drugs and unauthorized intruders conjunction with White House Staff and Secret Service such as fence jumpers and suspects in buildings. These are personnel. Upon departure of these VIPs, the Military special MWDs -- they are the President's dogs, providing Working Dog Section resumes its normal duties of keeping protection and support to the President of the United the station secure. States and other dignitaries travelling to and from the West Due to day and night utilization of the drug detector Coast White House. dog, drug activities and abuse on board the station have been curtailed. Drug lec­ tures, featuring the capa­ bilities of the drug dog, have enhanced the deter­ rent effect. Demonstra­ tions by Military Working Dogs at the Naval Air Sta­ tion, other military instal­ lations and at clubs such as the Elles Club, the Rotary Club, etc., have made the public aware of the Mili­ tary Working Dog Pro­ gram as an effective asset to the security of installa­ tions throughout the Navy. The Military Work­ ing Dog Program at Point Mugu is still expanding, both in size and expertise. MWD Handlers have one thing in mind, "Be ready Initially, only one dog was assigned to Point Mugu. for any situation!" That first MWD was a drug detector dog. As the Naval Air ''We are ready! Our dogs are ready!" * Station developed into its present day complex, coupled with the arrival and departure of the President, top govern-

36Sentry Spring/Summer 1988 ' '

by J02 John S. Verrico play a very innocuous greeting. Oth­ programs issued from Naval Security NSIC Public Affairs Assistant ers, however, are malicious and will and Investigative Command Head­ modify and erase files. quarters to Naval Investigative Serv­ ehlgh University recently re­ The virus will generally reside ice offices. ported that data recorded on in the computer's memory file and * Do not download ex­ L computer diskettes in their infect a good command (*.COM) file. ecutable programs from electronic computer laboratory was suddenly When the command file utiliz.es stan­ bulletin boards onto operational becoming unrecoverable. The data dard resident commands such as machines. could no longer be accessed or repro­ COPY, DIR (Directory), ERASE, * Do not use copied or duced. The laboratory had been in­ TYPE, VERIFY, MKDIR (Make Di­ pirated software. fected with a computer virus. rectory), RMDIR (Remove Direc­ "'Use a "Write-Protect" The electronic mail system for tory) or CHOIR (Change Directory), tab on disks containing a the IBM regional office in Tampa, the virus spreads to the command files COMMAND.COM file. Florida was infected with a similar on another disk or networked com­ * Do not use shareware virus. puter. The cycle then repeats itself programs. The Hebrew University in and ultimately wipes out numerous In short, practice safe comput­ Jerusalem was infected with a soft­ files. For example, the Lehigh virus ing with your operational computers. ware time bomb which was set to begin was designed todestroythe root direc­ If you suspect a virus, worm, destroying files on May 13. tory, Boot program and File Alloca­ time bomb or other ADP security There have also been reported tion Table (FAT) in order to make the problem, notify the NSIC ADP Secu­ viruses at the University of Delaware, information stored on a disk unre­ rity Officer, Special Agent Michael M. Georgetown University, the Univer­ coverable. This was accomplished by Houghton at (202) 763-3775 or Au­ sity of Pittsburgh, the University of "writing" zeros onto the first 32 sec­ tovon 293-3775. * Pennsylvania, and the Martin Mari­ tors ofa disk. This is the portion ofthe etta Facility. Over the past several disk on which all of the months there have been numerous directory and addressing incidents ofcomputer viruses destroy­ information is stored. ing data on disks, irretrievably wiping These viruses can out data, and modifying operating be prevented, but only system programs in the commercial through good data man­ automated data processing (ADP) agement techniques. industry. Operational machines The computer virus is a very can be kept from infec­ small piece of a program code that is tion by following these self-propagating and may be triggered basic guidelines: by some designated action or specified * Use only time. These viral infections are de­ software that comes in sealed contain­ This article was produced with infor­ signed to spread automatically from ers from respected dealers. mation and guidance provided by Mr. one computer to another and from * Use only standard Jerry T. Oney, Assistant Director, Infor­ disk to disk. Many of these viruses are application programs obtained mation Systems Department, Naval intended as jokes and generally dis- through ordinary supply channels; i.e. Security and Investigative Command.

Sentry37 Spring/Summer 1988 1ml) roving■ Computer Security (Part 2 of 2)

by RM. Lewis ( a) Identification and control of personnel are not LEPS Assistance Team San Diego in effect and are not included in the Physical Security Plan (ref (a), chapter 5, and ref (b), para. 1.2.lg). variety of aspects contribute to making an Auto­ matic Data Processing (ADP) system secure, and a 2. Security of ADP Media -- A number of characteristics make certain commands ( a) Activities maintain working copy media in excess particularly vulnerable. If any one of these are neglected, a of 180 working days (ref. (b), para. C.2e). security loophole is formed. (b) Inventories of tapes, disks and other ADP media Each command should be on the lookout for warn­ classified as Secret or above, are not maintained. These ing signs that their ADP security requirements are not in items are not controlled as completed documents, main­ compliance with the requirements set forth in the following tained on appropriate control logs, nor given permanently­ instructions: assigned identification numbers (ref. (b), para. C.2e). ( c) Hard-copy reports are not marked atthe top and a. OPNAVJNST 5530.14A (DON Physical Security and bottom of each page with the appropriate classification or Loss Prevention Manual) the word "UNClASSIFIED" (ref. (b), para. C.3e). ( d) Activities are not placing required classification b. OPNAVJNST 5239.lA (DON Automatic Data Process• markings on containers where punched or aperture cards ing Security Program) are stored. Additionally, each tape, cassette, or disk is not marked with removable external markings that depict the c. OPNAVJNST 5510.lH (U.S. Navy Information and overall security classification, special category(if appropri­ Personnel Program Regulations) ate) and are not assigned permanent identification num­ bers (ref. (b) para.s C.3a and C.3b). d. CSP lA (S) (Cryptographic Security Policy and Proce• ( e) Computers are not marked to the highest level dures Manual) of classified material authorized for processing on that unit (ref (b), para. C.3g). The following is a list of the prevalent areas of ADP security (f) Activities do not have a viable ADP security shortcomings. The directives listed above are the refer­ training program (ref. (b), chapter JO and appendi.x D). ences where guidance can be found for each of these areas. (g) ADP areas are not designated in writing as exclusive, limited, or controlled as necessary (ref. ( a), para. 1. Access and Movement Control -- 0305a). (h) Restricted-area access points are not properly

38 ADP Security Guidance and where to find it

posted (ref. (a), para. 0307). ( q) The activity does not have interim authority to (i) Lock and key control officers are not designated operate if not currently accredited (ref (b ), para. 3.1.b). in writing (ref (a), para. 0308a). ( r) Contingency plans for the overall ADP Security (j) Lock and key control systems do not reflect Program have not been developed (ref (b), chapter 7). positive lock and key accountability (ref (a), para. 0308/). (s) Current emergency notification rosters for all (k) Security containers, vaults, and strongrooms do personnel involved in disaster recovery are not maintained not conform to minimum standards (ref. (c), para. 14-2). (ref. (b), para. 7.7.d). (I) Central processing units data-linked into data (t) Security incident reports are not processed encryption systems (Black Unit) for transmittal, are non­ properly (ref. (b), para. 8.9). TEMPESTcertified (Red Unit). The simultaneous trans­ (u) The ADP Security Officer, who is responsible to mission of Red to Black creates the potential for compro­ the security manager for the protection of classified infor­ mise of encyption codes (ref (d)). mation being processed in the automated system, is not (m) Personnel possessing lower security classifica­ cleared to the level ofthe material being processed (ref. (c), tion levels have the potential for access to material with para. 2-12). * higher security classification (ref. (a), para. 0408, and ref (b ), page A-10, para. (b )). (n) ADP Security Officers are not designated in writing (ref (b), para. 2.2.a.2). (o) When the activity procured or acquired ADP resources (e.g., equipment, maintenance, software, serv­ ices, etc.) from a contractor, the commanding officer or his designee did not coordinate with the ADP Security Officer for assistance with security requirements in prepar­ ing security specifications (ref. (b ), para. 2.2. e). (p) Activities have not developed a comprehensive Activity ADP Security Plan (AADPSP) which would pro­ vide adequate security to their ADP activities, including the integrity of the data being handled (ref (b), para. 2.2a.1).

Sentry39 Spring/Summer 1988 • 00000000000000000000000000000000000000000001 LEGAL ISSUES

When can you testify?

A look at Navy policy governing testimony and the release of informa !ion by Navy personnel

hat would you do if ... concurs. Basically, what that means is sion, Merit Systems Protection Board, ... a neighbor asks you to tes­ that the department wants to know Federal Labor Relations Authority or W tify as a character witness in ju­ when its employees are testifying in as provided by a negotiated grievance or collective bargaining procedure; venile court where she and her hus- court on job-related matters and also -- When the requester is an band are seeking to adopt their foster to control the release of official infor­ attorney for the federal government child? mation. who represents the United States. ... you receive a subpoena to Specific procedures to seek -- Those cases relating to DoD give testimony in a slander suit be­ DoD approval are outlined in the di­ Directive 5220.6, "Industrial Person­ tween two civilian employees? You rective. These procedures would nel Security Clearance Program"; were the investigator in a theft allega­ apply to all of the aforementioned -- Testimony before a grand tion the defendant falsely lodged examples, except the first one, which against the plaintiff. would be exempt because the testi­ jury; -- Releases under the Privacy ... a prosecutor in a New York monywould be clearly not job-related. Act or Freedom of Information Act; murder case wants you to testify about The Navy implemented the -- Releases of information and the admission the suspect made to you DoD directive by issuing SECNAV­ comments, interviews, etc. not related when he was on active duty and you, an INST 5820.8, but inadvertently omit­ to litigation (however, check with MAC, were the head of base security ted a critical section which cites an­ your Public Affairs Officer for guid­ in the Philippines? other exemption to the procedure of ... the victim of an on-base car securing prior approval. ance on this); theft asks for a copy ofthe NIS report? The procedure does not apply -- Releases by DON personnel ... the executor of a murder to disclosures " ...to federal, state and to counsel retained by them for litiga­ victim's estate wants you to take her to local prosecuting and law enforce­ tion unless the information is classi­ the on-base quarters where the victim ment authorities in conjunction with fied, privileged or otherwise protected from disclosure; was killed? an investigation conducted by a DoD -- In cases involving garnish­ What do these cases have in criminal investigative organization". common? All are governed by The SECNA VINST is currently being ment orders for child support and/or SECNAVINST 5820.8, Subj: Release amended to include this information. alimony under SECNAVINST of Official Information for Litigation Other situations or cases where 7200.16. Purposes and Testimony by Depart­ the procedures are not required in­ lf you have any questions on ment of the Navy Personnel. clude: disclosures or testimony, contact your On 23 July 1985, the Depart­ -- Courts-martial and adminis­ local command legal office. * ment of Defense issued a directive trative proceedings ( such ·as Courts of which fosters the disclosure of official Inquiry, administrative discharge information and the appearance of boards); · DoD personnel as witnesses in fed­ -- Administrative proceedings Reported by S/A Judy Schevtchuk eral, state and foreign courts -- but conducted by oron behalfof the Equal Deputy Special AssiStantfor Legislative only after DoD has been advised and Employment Opportunity Commis- & Judicial Affairs

40Sentry Spring/Summer 1988 00000000000000000000000000000000 0 00000000000000000000000 Seizure or pursuit?

A recent Supreme Court decision delineates between the two

uppose you are a Master-at­ packets. The defense referred to the The police did not activate a siren or Arms on patrol in your vehicle act of following the suspect as a "sei­ flashers; they did not command the S and you see someone turn and zure" and claimed it was unlawful suspect to halt, or display any weap­ run when he notices your approach. since no probable cause existed to ons; they also did not operate the car You follow him to see where he is justify it. in an aggressive manner to block the going, but make no attempt to appre­ The magistrate ruled in favor suspect's course or otherwise control hend him. While you are following of the suspect. the direction or speed of his move­ him, you witness him discard some­ The prosecution appealed to ment. Noting that while the very pres­ thing. You stop, pick it up, discover the Supreme Court who declared that ence of a police car driving parallel to illegal drugs and arrest the suspect for what the defense referred to as a "sei­ a running pedestrian could be some­ possession of narcotics. zure," was, in fact, "investigatory pur­ what intimidating, the court stated The defense may argue that suit," and was justified. that this kind of police presence does your act of following the suspect con­ In overturning the lower not, in itself, constitute a seizure and stituted a "seizure," which was not court decision, the Supreme Court the suspect could reasonably have justified, and that the subsequent ar­ stated that the test to determine believed that he was free to disregard rest was therefore unlawful. Can the whether a person bas been 'seized' the police presence and go about his case be dismissed on this basis? within the meaning of the Fourth business. These were the circum­ Amendment is that "only if, in view of In that light, the Court con­ stances of a case earlier this year and all of the circumstances surrounding cluded . that the suspect was not according to a 13 June 1988 Supreme the incident, a reasonable person "seized" by the police before he dis­ Court decision the actions were law­ would have believed that he was not carded the packets containing the ful free to leave." The Court stated that controlled substance, and that the act At a preliminary hearing the "the police conduct involved here of following the suspect was consid­ defense moved to dismiss the charges would not have communicated to the ered "investigatory pursuit." * on grounds that the suspect had been reasonable person an attempt to cap­ unlawfully "seized" during the police ture or otherwise intrude upon the Reported by LI. Robert C. Wyda pursuit preceding his disposal of the suspect's freedom of movement." NSIC Assistant Staff Judge Advocate

Sentry 41 Spring/Summer 1988 The Lighter Side Anned Forces Information Service Free Stuff! No-cost 0 law enforcement equipment esearcb through the Naval Supply Depot, Technical Sec­ Rtion, Y okosuka, Japan, re­ cently revealed that several pieces of police personnel equipment can be ordered at no-cost to the ordering command. Thanks to the Supply Petty Officer from USS MIDWAY' s Legal Department who initiated the re­ ~ search last winter and discovered the secret to ordering the following equip­ ment:

Belt, Law Enforcement, black leather, male NSN: 8465-01-033-1736 (Note: each belt size has a different stock number -- check your microfiche)

Keyring holder, Leather black ·watch out! Loose lips! Loose lips!" NSN: 8465-00-003-1203

Holder, flashlight NSN: 8465-00-107-8223 *

POTENTIAL FOR COMPROMISE

SILVER RECOVERY PROGRAM

he Silver Recovery Program requires that all excess photographic materials be turned in to a Defense Reutilization and Marketing Office (DRM O). This program salvages the small quantities of the precious metal T that are produced in the photographic developing process and provides an additional source of revenue for the government. One problem with this procedure has arisen that may lead to a com promise of classified information. During a recent inspection at a DRMO, some material marked "CONFIDENTIAL" was discovered in an open container. This material was old and may have become declassified many years ago; nevertheless, proper preventative action taken by submitting commands can ensure that classified material does not get into the wrong hands. All potentially classified photographic materials should be shredded prior to shipping and transfer to DRMOs. Questions regarding this program should be directed to Michael F. Brown, Classification Management Division, Information and Personnel Security Directorate, Naval Security and Investigative Command at AV: 291-5901. *

42 Sentry Spring/Summer 1988 - MACM Lynn L. Chapman 'Small Child' keeps growing

by Judy l..a7.arus Where does the Staff Writer, Great Lakes BuUetin emphasis have to RTC Great Lakes be? What are s one of 57 of the original 486 commands looking Masters-at-Arms still on active for? Different MACM Lynn Chapman at her d";'j;'at NACU, Great Lakes. (Photo by A duty, Master Chief Master-at­ types of duty as­ Judy Lazarus) Arms Lynn L. Chapman has observed signments also had changes and growth within the MA to be taken into consideration. "MAs She is currently serving as Chief rating. might be part of the major security Petty Officer-in-Charge of the Navy "Before the rating was estab­ force at shore commands," she ex­ Absentee Collection Unit (NACU), lished in 1973," Chapman reflected, plained, ''but ona ship, they maybe on Great Lakes. "It is my first tour back "there was no specific rating for law independent duty where they are the up in the cold country," said enforcement and security. There lone ranger." Chapman, a native of Wisconsin. "I were not many shore billets for sea­ Since its inception, the rating have been on the east and west coasts intensive ratings such as Hull Techni­ has continued to grow. There have and served in Spain and Italy." cians and Machinist's Mates, so they been changes in duties and in the type Working at NACU for the past did the work via on-the-job training." of investigations MAs conduct. two years "is totally different from "When our rating started it was Chapman stressed the new anything I've ever done," the Master almost like a small child," Chapman training requirements and higher Chief noted. "I'm an administrator, observed. "There was no form to it. caliber ofpeople in the rating, and the responsible for the entire unit, for The job depended on what command credibility the MA rating now enjoys. locating and returning absentees." you were at and how that particular Chapman was selected for Her people work hard, she said and command wanted to run the rating. conversion to the MA rating while added, "I'm a cog in the wheel to There was no standardization from serving as a Photographer's Mate ensure that we get the job ac­ base to base." (PH) in Spain where she worked with complished." Over the years the rating has the Naval Investigative Service (NIS). When NACUs came into exis­ grown in professionalism. "PHs did a lot of work on crime tence in 1980, there were 9,000 Navy "Now there are law enforce­ scenes with NIS, especially overseas," deserters. At last reading there were ment manuals, training guidelines, Chapman explained. She'd heard 3,500. and standard forms used throughout about the new MA rating, put in her "I enjoy the MA rating," the Navy. And the rating is accepted," application, and was selected. Chapman said. "I've seen two inter­ Chapman added. "At first, there was As an MA, Chapman has esting sides of it -- photography and resistance and resentment. It was the worked in investigations and patrol law enforcement and I consider my­ old idea of saying, 'We don't have a work but seems to have a preference self very fortunate." * problem."' for patrol ( or street work) because In building the new rating, vari­ "you're out , moving around, making ous aspects had to be considered. contact with people."

Sentry 43 Spring/Summer 1988 PHYSICAL SECURITY The Navy Physical

by Jon H. Lynch The concept of the process is when. In other words, it can not be just Physical Security Specialist quite simple. If you think ofthe physi­ a regurgatation of SECNAV or LEPS Assistance Team, San Diego cal security program as the face of a OPNAV policy. It must assign specific clock and the steps in the process as tasks to competent individuals to be here seems to be considerable the hours, it will help put the concept accomplished at or by a certain time. confusion concerning the Physi­ into perspective. The plan must be all inclusive and T cal Security Program. During The PhysicalSecurity and Loss complement whatever host/tenant the past three years security programs Prevention Plan appears at the top of relationship we may be in as well as have improved, but not as rapidly as the clock because the plan sets the any formal Memorandum Of Under­ possible. In many cases this is caused guidelines and tone of the security standing (MOU) or Inter-Service by a lack ofunderstanding of the DON program. The plan has to be written Support Agreement (ISSA). Physical Security Program process. in the context of who will do what, by The annual Physical Security

PHYSICAL SECURITY & LOSS PREVENTION PLAN

SECURITY EDUCATION PHYSICAL SECURITY SURVEY & TRAINING

NIS THREAT PSRC/PSRB STAFFING

COMMANDING ISSA/MOU OFFICER'S UPDATE PRIORITIES

IN-HOUSE FIXES NAVY PHYSICAL (BETTER MGT / ADMIN) SECURITY POM (BAM)

OPT AR-FUNDED WAIVERS & PROJECTS EXCEPTIONS MID-YEAR BUDGET REVIEW

44 Security Program Clock

enhance cost re­ knows what he needs to upgrade his Survey is at the one o'clock position help can be used to projects can be security posture. because it tells us our current security duction. Usually llhese relatively short Review and update of the MOU posture and identifies weaknesses to accomplished in a and/or ISSA comes along at nine overcome in order to get to an im­ time. Sometimes MOUs and ISSAs proved level ofsecurity. The results of Six o'clock is our chance at mid­ o'clock. for two or more years. the survey are used to drive the hand of year budget review monies. The are good However, an annual review is neces­ the clock to position 2 through 12. chance to gel these monies may come time to re­ sary because situations change based At the 2 o'c1ock position The with no notice and little on the needs and capabilities of all Physical Security Review Committee spond. By having completed a ­ parties concerned. (PSRC) or Physical Security Review ough survey, staffed the results, estab­ Ten o'clock brings us to the NIS Board (PSRB) ( as appropriate) staffs lished command priorities and fixed Threat Assessment. This is put out at the results ofthe physical security sur­ what we could, we can rapidly respond It is a tool the CO and vey and makes recommendations to to the mid-year budget review. This is least annually. Security Officer can use in the continu­ the commanding officer. Good staff­ an excellent opportunity lo get money ed updating ofthe command's security ing should result in possible courses of for the security projects that are high the command posture and plan. action, alternatives, options and rec­ priority, but not within Last, but certainly not least, is ommendations. OPTAR. the security education and training Three o'clock is when the The seven o'clock position is program. This program actually goes commanding officer establishes his lhe time to submit requests up the and on year round. It includes physical priorities. These priorities are based chain of command for waivers you security and loss prevention, person­ on the results of the survey, recom­ exceptions. Remember, whether ex­ nel security, information security, mendations of the staff and the con­ are requesting an original waiver, automated data processing (ADP) cept as outlined by the command's tension of a waiver or an exception, security and security force training. Physical Security and Loss Prevention you must include compensatory meas­ Undoubtedly, there are several Plan. ures that are realistic and sustainable. other items you can reasonably argue Four o'clock and it's time for in Waivers are requested for deficiences be included in the physical house fixes. This is when security we plan to fix when money and man­ and should security process. However, the truth deficiences are corrected through power become available. Exceptions we can't of the matter is that many individuals better management and administra­ are requested for deficiences or assigned security responsibilities, tion of the security program. This may fix due to physical considerations with host both miiitary and civilian, don't under­ include revision and update to the Status ofForcesAgreements etc. stand the process and how each item Physical Security and Loss Prevention nations, builds on the other to give us a viable Plan, better key security and lock At eight o'clock we use the Navy program. By understanding the pro­ control program, etc. These are no­ Physical Security POM Baseline As­ and following the process you cost fixes that enhance our security sessment Memoranda (BAM) to re­ gram easier and increase posture. quest funding for security construc­ can make your job and the security posture of your command. OPTAR funded projects come tion projects, security equipment along at five o'clock. These arc asu­ military and civilian security person­ a!Jy low cost projects that the CO has nel ceiling points. The POM package * identified as having top priority. In must get down to the activity level some cases, local purchase and self- because the lowest echelon OIC best

Sentry 4S Spring/Summer 1988 The Navy Lock Program Protecting the fleet ...

here is more to buying a lock determines an asset needs protection than just going down to the withanewpieceof security equipment T local hardware store. It takes a -- for example a padlock for a door. lot of research and testing to deter­ NSIC coordinates Tri-Service input mine which locks are considered low, for the degree of protection required medium or high security, and to de­ and dictates security policy for this cide which ones will be used where. protection, and tasks the Naval Facili­ Regulations governing the pro­ ties Engineering Command with de­ tection of Navy assets (both classified termining research and funding and unclassified) are promulgated by guidelines. NCEL is then tasked with the Department of Defense (DoD). the actual research and development The DoD Lock Program is often taken of the new lock. This may involve for granted at the local level, but there setting design specifications or re­ is more to this much overlooked pro­ viewing proposed specifications, test­ gram than meets the eye, and a lot of ing padlocks already on the market, or people have their bands in it. possibly even designing a new pad­ The Navy has been theprogram lock. manager for the DoD Lock Program In most cases, the equipment since January 1985. Commander, required to meetthe specified security Naval Security and Investigative objectives for these assets are de­ Command (NSIC) ,currently sets the scribed in terms of performance char­ policy for the program as part of his acteristics, such as the lock's strength, role as Special Assistant for Naval ease of operation, tamper-resistance, Investigative Matters and Security etc. These characteristics are further (OP-09N). Lock Program policies, broken down and defined in military procedures and products are coordi­ specifications, military standards and nated through the Tri-Service Re­ federal specifications. Since much of quirements Working Group this equipment is also used by other (TSRWG). Program direction and government agencies, coordination is funding functions have been dele­ initiated through the TSRWG and the gated to the Naval Facilities Engineer­ Interagency Advisory Committee on ing Command. The Naval Civil Engi­ Security Equipment. neering Laboratory (NCEL), Port Hueneme, California, provides tech­ In the development of lock nical guidance. specifications there are times when a For an example of how this design flaw or other problem with the breaks down, let's take a look at the lock is not discovered until after pro­ typical procedure involved. DoD duction and shipment. Security per- 46 ... Providing direction for DoD

sonnel, through operational insight serviced locaJly. For example, as you or you can call AV: 482-1879/1882 or and alertness, have discovered many may know, Medeco keyways and Commercial: (812) 854-1879 /1882. of these vulnerabilities with locking blank keys are protected by strict One thing to keep in systems. Input on locks and locking controls to prevent unauthorized key miod... current technology used for the devices is encouraged from the field. duplication. There is a support pro­ design and manufacture of locks, If any problems are noted concerning gram established to service the safes, vaults and seals is over 30 years locks or security containers, NCEL is Medeco high security key system. The old. However, the technology used to the point of contact for direct techni­ Navy has a key and lock repair facility defeat these security systems has cal supportto the fleet. The Technical in Indiana, which is responsible for improved significantly in recent years. Manager, Bob Leek, can be contacted repair of the Navy's high security lock­ The DoD Lock Program is es­ at AV: 360-5927 or Commercial: (805) ing systems. The use of this facility sential to ensure adequate protection 982-5927; or by writing to: Command­ allows the Navy to service high secu­ for the DoD's classified and high value ing Officer, Naval Civil Engineering rity locks at roughly half the cost of assets. * Laboratory, Code L56, Port Huen­ contractor support. Any support eme, Ca. 93403; Attn: Bob Leek. needed can be addressed directly to Quite often a need arises for Commanding Officer, Naval Weap­ Reported by Kevin Kenworthy service and repair oflocks and security onsSupport Center, Code 208, Crane, NSIC Physical Security Specialist containers, some of which cannot be In. 47522; Attn: Lock Repair Facility;

"Are you the guy who ordered the -proof locks?"

Sentry 47 Spring/&.immer 1988 "' '"' :::::: -=- ft: ---- ""'=:::-:...:.-tib - t:l = - /tr-

Physical Security Review Committee A valuable advisory source

by Richard A. Pollack drafts and recommends required manage and execute an effective NAVEUR Security Office changes, and reviews reports of sig­ Physical Security and Loss Prevention nificant losses and security breaches, Program. and based on analysis of such in­ Commanding Officers who ne of the most important advi­ stances, recommends improvements advocate the importance of security sory sources available to a to the Physical Security and Loss Pre­ must make real commitments to it by 0 command security officer is vention Program. designating an active an viable PSRC the Physical Security Review Commit­ A properly designated, func­ to advise and assist the command tee (PSRC). This committee, desig­ tioning and dedicated PSRC can Security Officer. This action would nated in writing by the Commanding greatly assist the Security Officer to indicate a positive and real commit­ Officer, is composed ofprimarily non­ plan, implement, enforce and super­ ment to fully support Physical Secu­ security personnel, and is generally vise the required programs. rity and Loss Prevention Programs. tasked to advise and assist in applying Unfortunately, visits by the the standards of and implementing the Law Enforcement and Physical Secu­ * Physical Security and Loss Prevention rity (LEPS) Assistance Teams to nu­ Program. OPNAV Instruction merous naval commands have dis­ 5530.14A provides guidance on spe­ closed that this ideal situation is the cific responsibilities of the PSRC. exception instead of the rule. Visits Among its assigned tasks, the revealed that Security Officers were Committee assists in determining basically on their own when it came to security requirements and evaluates managing the command security pro­ security programs implemented at grams. In some cases, Security Offi­ the command and its tenant activities, cers were unaware of the need for ~ including advising on the establish­ PSRC and the valuable counsel such a ment of restricted areas. committee could provide. These fac­ The Committee reviews physi­ tors usually resulted in the failure of cal security and loss prevention plan the Security Officer to implement,

4gSentry Spring/Summer 1988 NAVELEXCEN Charleston Standardizing Security Communications

by Michael J. Peebles Senior DES/Trunking Project Engineer

ntil recently, communications for law enforcement storage and logistic movement at multiple sites world­ and physical security within the Navy has been a wide. This system was the first in the world to use DES to Uneglected area. Very little guidance was available provide protected voice communications. concerning the equipment to be used and the system -- The Senior Officers Security Communications structure for security communications. Predictably, there System was developed by NAVELEXCEN Charleston in is no standard system, and next to no logistic supportability direct reponse to the kidnapping of General Dozier by the for the myriad of communications systems to be found at Red Brigades in Italy. This was the first communications Navy installations world-wide. system specifically designed for the protection of senior The Naval Security and Investigative Command officers and civilians during high terrorist threat condi­ (NSIC) is taking steps to aUeviate this problem by develop­ tions. Four of these DES communications systems have ing a standard security communications system which will been installed in overseas locations. be phased in over the next several years. -- The AEA/ISEA assignment established NA V­ Actual development of this communications system ELEXCEN Charleston as the Navy's primary point of has been assigned to the Naval Electronic Systems Engi­ contact for all DES communications -- including security. neering Center (NA VELEXCEN) Charleston by NSIC. The center has provided engineering and procurement as­ NA VELEXCEN was first formed from several sistance to many shore activities world-wide. They have elements of the Charleston Naval Shipyard in November also recently purchased more than$5 million worth ofDES 1%1. This activity was named Shore Electronics Depart­ equipment for the Navy Security Force, and undertook ment. In August 1966, the command became a field activity DES communications tasks in the Persian Gulfand Central of the newly formed Naval Electronic Systems Command, America. now the Space and Warfare Systems Command NAVELEXCEN Charleston has a wealth ofexperi­ (SPAWARSYSCOM), and was designated as Southeast ence in security-related communications systems. They Division. In January 1974, the activity was renamed and can use this experience to develop a standard security given its present title to recognize increased engineering communications system which, when fully deployed, will and shipboard electronic installation efforts. allow security personnel to concentrate on the task at hand, Today, NA VELEXCEN Charleston serves the instead of whether or not his or her radio is operating Navy by providing engineering services for ship and shore properly. Standard security communications will also communities, and follow-on technical support. Major provide for more efficient and effective use of equipment, systems responsibilities include Air Traffic Control Sys­ improved equipment maintenance and other logistic sup­ tems, Naval Reserve Electronics Program, Stand Alone port elements, and provide a means to standardize training Message Preparation Devices, AN/SLQ-17 -Electronic for communications. * W arfareSystem, ELF Communication System, Submarine Communication Improvement Program equipment, Elec­ tronic Security System Program, Radiac Acquisition and [NA VELEXCEN Charleston will continue this series of Engineering Program, Engineering Agent for the ­ articles on security communications in an effort to pro­ magnetic Environmental Effects Shore Facilities Program, vide security personnel a better understanding of land­ Naval Ordnance Communications (NAVORDCOMM), mobile communications. Future articles will address Senior Officers Security, and Acquisition Engineeriing common tem1s, DES, equipment capabilities, frequency Agent (AEA)/In-Service Engineering Agent (ISEA) for allocation and assignment, and other aspects in the de­ Data Encryption System (DES) communications. velopment of a security communicalions system. The The last three functional areas have provided center welcomes comments, questions or suggestions NAVELEXCEN invaluable experience in the type ofland­ regarding these articles. Write to: Commanding Officer, mobile communications system used for security. NAVELEXCEN Charleston, Code 231, 4600 Marriott -- The NA VORDCOMM System was developed Drive, North Charleston, South Carolina 29418-6504.J specifically for the security of special weapons during

Sentry 49 Spring/Summer 1988 RESERVE NEWS Intelligence Specialist First Class Sharon E. Moody, who is cur­ rently considering conversion to Mas­ ter-at-Arms, is a captain with the Cobb County Georgia Police Depart­ Our Qualified Reserve Force ment ( one of the top police depart­ ments in the country), and is the commanding officer for the Crimes Against Children Unit. While in Washington DC, Capt. Moody pre­ sented training seminars to NIS Spe­ cial Agents at NSIC on child abuse investigations. Moody, a 1970 gradu­ ate of the University of Georgia and a 1973 graduate of the Georgia Police Academy, has had 15 years of police experience, 14 years of which as a detective with the Crimes Against Children Unit. Moody is assigned to the FIRSTEURLANT 0%7 Reserve Unit at NAS Atlanta.

Master-at-Arms First Class Tommy L. Keheley, another Cobb County Police Department captain, These Res6rvists have 80 years of police experience between them. Pictured here with Rear has had over 18 years of law enforce· Adm. John E. Gordon, Commander, Naval Security and Investigative Command, are: (from ment experience, 81/2 years of which left) MA1 Tommyl. Keheley (Captain, Cobb County Georgia Police Department), IS2Bradley was in investigations including narcot­ L. Pope (Chief of Police, Canton, Ga.), MA1 Gregory L. Owen (Special Agent in Charge, ics and intelligence. He is currently in Georgia Bureau of Investigations), MA1 Terry L. Crowell (Special Agent, GBI) and IS1 Sharon charge of the department's Special E. Moody (Captain, Cobb County Ga. PD). (Photo by J02 John S. Verrico, NSIC) Activities Section, which is made up of in charge of the Metropolitan Drug five specialized units. Keheley has 26 by J02 John S. Verrico and Vice Force in Atlanta. He has 13 specialized schools to his credit, in­ NSIC Public Affairs Assistant years of experience in law enforce­ cluding the FBI National Academy oday's Naval Reserve is better ment and holds a degree in Criminal and U.S. Secret Service schools, and and more qualified than ever. Justice from the University of Geor­ holds degrees from the Universities of T Reservists bring their many gia. Virginia and Georgia, and the South­ years ofexperience to the Navy. Many Master-at-Arms First Class ern Technical Institute. of our Reserve Masters-at-Arms Terry L. Crowell, with nearly 20 years Intelligence Specialist Second (MAs) are working as policemen or of law enforcement experience, bas Class Bradley L. Pope, formerly Cap­ detectives in police departments been serving as a special agent with the tain of the Intelligence Division of the around the country. GBI for the past 12 years. Prior to that Cobb County Georgia Police Depart­ Recently five reservists com­ he worked for the Los Angeles Police ment, is currently serving as the Chief pleted their two-week Active Duty for Department for six years and served of Police in Canton, Georgia. A Training at Naval Security and Inves­ nearly two years as the Chiefof Police graduate of the FBI National Acad­ tigative Command (NSIC) Head­ in Eastman, Georgia. Crowell is a emy, Pope has more than 13 years of quartersin Washington DC, and it was certified law enforcement instructor law enforcement experience and is readily apparent that these sailors and holds a Criminal Justice degree currently enrolled in Kennesaw Col­ were highly qualified. from Moorpark Junior College in lege in Marietta, Georgia. Master-at-Arms First Class California. He is currently serving as Between them, these five indi­ Gregory L. Owen is the SpecialAgent­ the leading petty officer of the security viduals bring eighty years of police in-Charge of the Georgia Bureau of force for his reserve unit at Naval Air experience to the Navy's reserve law Investigations (GBI) and is currently Station Jacksonv:ille, Fla. enforcement contingent. *

soSentry Spring/Summer 1988 NAVTELCOM reservist first to earn new NEC

eserve First Class Master-at-Arms Rodney E. Special Agent with a reserve unit ofthe U.S. Army Criminal Owens, became the first reservist to be awarded Investigation Command. Since transferring to the Naval Rthe MA-2002 Military Investigator NEC in April Reserve, Owens has served with the Master-at-Arms Force 1988. A criminal investigator for the Commonwealth of at Philidelpbia Naval Base and USS ESTOCIN (FFG-15). Pennsylvania for over 10 years, Owen has been affiliated In the civilian world he has held positions as Nuclear with the Naval Reserve since May 1986 and is currently Security Officer and Police Officer with two police depart­ assigned asSecurity Director with Naval Telecommunica­ ments. tions Command Headquarters 0306, Washington DC. Owens is a certified protection officer and holds Owens, 35, brings several years of diversified civil­ professional certification through the International Acad­ ian and military law enforcment experience to the Naval emy of Criminology. He is also a certified locksmith and Reserve. After release from active duty in the U.S. Air security systems specialist. * Force, he served as a Security Police Law Enforcement Specialist Supervisor in the Air Force Reserve, and as a

NISRO-RU 0602 (New York) Reservists aid maJ• or exercise

by Lt. Jay S. Caputo Public Affairs Officer, NISRO RU 0602

ive members of the Naval Investigative Service Regional Office Reserve Unit 0602 (NISRO RU 0602), New York, responded to a short notice request for reserve officers with law enforcement/ F physical security backgrounds. These officers were requested by Commander, Naval Base Norfolk, Va. to assist with the planning, preparation and execution of Physical Security Exercise (PSX) 87, an exercise invoiving Norfolk's resident commands. This exercise was run concurrently and intertwined with a major fleet exercise, Solid 87. Cmdr. Mike Homan, Lt. Cmdr.'s Charles Johnson and William Clifford, and Lt's Jay Caputo and William Siedenstein, all credentialed NIS Reserve Agents, represented NISRO RU 0602 during this exercise. These officers controlled a simulated gate protest, a sniper scenario, aircraft hijacking, hostage situation, attempted assassination of flag officers, several flightline penetrations, and several "Zulu-Five-Oscars" (bomb threats). At the conclusion of this eventful Active Duty Training ( ACD UTRA) the general feeling among the participants was that the exercise was a rather successful learning experience, not only for those whose security was tested, but also for the officers and enlisted reservists who took part in PSX-87. The members of NISRO RU 0602 and other experienced reservists who took part in PSX-87 brought a vast expanse of knowledge to the exercise and greatly enhanced its credibility. The fact that these individuals were fortunate enough to be on hand to observe the events of PSX-87 enhances not only their own individual readiness, but that of their unit as well. *

Sentry Sl Spring/Summer 1988 ~,,,.,> \ RESERVE ~ In the Spotlight ... f MA1 Alejandro Patino

he has been promoted to criminal in­ vestigator, and has been involved in the kind of international exploits the rest of us read about in magazines or Meet a modern watch on the evening news. For example, Patino was as­ signed to a protective detail in Jacksonville, Florida. During an on­ Matt Dillon going trial, many witnesses testified against Colombian Carlos Lehder­ Rivas. Lehder-Rivas was extradited about a year ago, andwas charged with conspiracy to import cocaine. He was a known member of the Medellin Cartel, an organization alleged to be by JOI Joann Hellmann week stint at the police academy -- a responsible for over 80 percent of the Naval Air Station, Barber's Point, Hawaii program that covered every aspect of cocaine that enters the United States. police work from arrest procedures to Early in 1986, Patino was as­ Hey pardner, meet a modern search warrants. signed to San Diego as part of the Fu­ day Matt Dillon." First Class As interesting as his job as a gitive Investigative Strike Team Master-at-Arms Alejandro police officer was, a year later Patino (FIST) which made over 3,600 arrests. Patino is a Naval Reservist who stands set his sights on an even more chal­ The operation lasted about eight out' 'by virtue of his unique occupation lenging career. weeks, and covered major cities along -- he's a Deputy U.S. Marshal. "I realized the federal law en­ the U .S./Mexico border. Patino got involved in law en­ forcement system offered greater "We used ruses, like having a forcement during his last two years on opportunities," he explained. "I ap­ marshal dress up as a mailman and active duty with the Navy. He was plied for, and was hired by, the Border deliver packages to the fugitive's last stationed at Naval Station, Pearl Har­ Patrol. known address. Or we'd deliver let­ bor, Hawaii, in the Master-at-Arms/ "During the same time, I was ters offering bogus prizes or tax re­ Shore Patrol Department. Since his being processed for the Marshal's funds," Patino pointed out. discharge from active duty in August Service. I was interviewed, selected, Other specialty areas that 1981, Patino has been attached to and on the job within two weeks. Plus, Marshals handle (besides court secu­ numerous units of the Reserve com­ I was allowed to fill a vacancy here in rity, witness protection, fugitive inves­ munity. His most recent affiliation is the Hawaii office." tigations, and organized crime and as the Chief Master-at-Arms and Since 1984, Patino has attended drug enforcement) are seizure and Command Security Force Supervisor the Criminal Investigator and U.S. forfeitures, threat analysis, and work­ for the Naval Reserve Unit at Naval Marshal's recruit schools, firearms ing with Interpol, the international Air Station Barber's Point, Hawaii. instructor school, and the advanced police organization. "I became very interested in the U.S. Marshal and protective service In a Marshal's line of work, field and decided to apply to the schools, all located at the Federal Law there's lots of travel, danger and ad­ HonoluluPolice Department after my Enforcement Training Center in venture, and according to Patino, discharge. I was accepted in February Glynco, Georgia. He has also at­ there's no such thing as a typical day. 1982, and took advantage of the train­ tended numerous law enforcement "In the course of a day, I may be ing and opportunities that were of­ seminars and conferences. providing court security in the morn­ fered," says Patino. Since Patino joined the Justice ing, pursuing and arresting a fugitive The training included a 32- Department's U.S. Marshal Service, by midday, assist another justice 52 agency .in processing cash that has been seized during the early after­ noon, then be instructed to pack my bags and catch a flight to the mainland for another assignment," Patino ' elaborated. "The amount of travelling that I do varies from month to month; but I have logged no less than 100,000 miles a year going to the mainland, Guam, American Samoa, and inter­ island travel. The majority of the trav­ elling that I do involves prisoner trans­ portation," he added. The job certainly has its share of danger, but Patino says his training helps him to always be physically and ..... MAI Al Patino completed a two-week ACDUTRA at NSIC Headquarters in July 1988. During mentally prepared and, to an extent, this period, Patino assisted NSIC personnel in reviewing and coordinating lesson plans for able to instinctively react when threat­ a Basic Naval Reserve MA Law Enforcement Course, and provided reference material. He ened. And, he says, he's got his trusty developed a comprehensive list of directives and other reference materials pertinent to Naval six-shooter. * Reserve Security Units, to be used as a distribution guide. Patino also is coordinating the establishment of a Naval Reserve Security Unit in Hawaii. It was a busy ACDUTRA for the Deputy Marshal who also represented NSIC at the National Defense University 19-21 July, in the Low Intensity Conflict Gaming Systems Wargame exercise. (Photo by J02 John S. Verrico, NSIC)

Sentry53 Spring/Summer 1988 USS SAJPAN (UIA-2) Entire MAA Force gets ESWS qualified

by J03 Michael Massung , USS SAIPAN (LHA-2)

he Master-at-Arms Force in USS SAIPAN (LHA-2) recently reached a milestone as all eight members of the force became Enlisted Surface Warfare Specialists (ESWS). T The eight (from left) are: MAC (SW) Robert G. Ruger, MA1 (SW) Raymond S. Jahnke, MA1 (SW) Kenneth W. Roadman, IC1 (SW) Howard Middleton,ABH1 (SW) Patrick McHale, MA1 (SI/'-/) Michael H. Meussling, MA1 (SW) Clinton S.Johnso'n,and OS2 (SW) Richard W. Saunders (not shown). As Chief Master-at-Arms, Ruger instills in his personnel a desire to achieve. He set requirements that all his personnel must be Master-at-Arms PQS qualified within two months after reporting for duty and should be ESWS qualified as soon as possible. Jahnke, one of the rated MAs, said of the accomplishment, "Because we are in generallooked upon by everyone as 4.0 sailors, having the ESWS pin is icing on the cake." McHale, an Aviation Boatswain's Mate Aircraft Handler, said, " I think that it shows the versatility of the Master-at-Arms training program ... that even in a relatively short period of time aviation personnel are able to get their (surface warfare qualification)." The chief and all of SAIPAN's Masters-at-Arms encourage all MAs to go for the silver cutlasses because two points can mean an advancement in YOUR CAREER! "GO FOR IT!" (Photo by PH3 Donald Kolb) *

USS BRUMBY (FF-1044) heodore Roosevelt once said, "Do what you can, with what you MAC gets 3 awards in 3 months have, where you are." Chief Master-at-Arms (SW) Michael R. T Schwartz (left) is certainly making the most of his sea tour aboard the Charleston-based frigate USS BRUMBY (FF-1044). In a less than three month period, he received his Enlisted Surface Warfare pin and two medals. On 15 December 1987, Schwartz was designated an Enlisted Surface Warfare Specialist, receiving his crossed cutlasses after his before the ship's ESWS board. Cmdr. ~- R. Wall, BRUMBY's Commanding Officer, presented Schwartz with the ESWS pin and congratulated him on his fine performance before the board. In January 1988, Schwartz received a Navy Achievement Medal for his superior performance as BRUMBY's Chief Master-at-Arms and his outstanding community service. Schwartz was active in commu­ nity affairs in the Portland, Maine area where BRUMBY was undergo­ ing overhaul. In February, he was awarded his third Good Conduct Medal. "Chief Schwartz's performance has been outstanding," said the frigate's Executive Officer, Lt. Cmdr. J. T. McComb. "He's a hard by U. j.g . David S. Shea, USNR charger - a real asset to the ship and the Master-at-Arms commu­ Public Affairs Officer, USS BRUMBY (FF-1044) nity." (U.S. Navy photo)* 54 USS HUNLEY (AS-31)

MA1 named Sailor of the Year irst Class Master-at-Arms Frederick W. Turner was named change was the initiation of a minor offense program. There was Sailor of the Year aboard the submarine tender USS HUNLEY also a problem with the early chow line system at the time, so he F (AS-31). Turner attributes his selection to his involvement began a program to ensure eligible crewmembers would receive with the crew where he has worked to implement a one-on-one early chow privileges. relationship with shipmates. His biggest challenge however, was changing the image of ''I'm working to provide a customer service to support the HUNLEY's MAA force. Crewmembers serving on the force had crew," Turner said. He said there should be an open-door policy been regarding themselves as cops rather than as people provid­ in the Master-at-Arms (MAA) Office for anyone who has a problem. ing a service for the crew. Turner undertook the task of ensuring He stressed the problem doesn't even have to be UCMJ related. this attitude went away and that all members of the force were He also attributes his success to his desire to excel in the Navy, properly trained. Since then, he has seen many changes in the characterized by his application for the Limited Duty Officer (LOO) ship's attitude toward the MAA force and now he continuously Program to work as a physical security officer. " I feel I can be more receives applications from crewmembers who want to join. beneficial to the Navy as an officer," he said. "I feel making Sailor His own abilities aside, Turner credits his Chief Master-at­ of the Year should help me in my LOO efforts," he concluded. Arms for his selection. " The CMAA has supported me and she Turner strongly urges his shipmates to give the mostpossibre helped me become Sailor of the Year," he said and added that her to the Navy. He stresses that HUNLEY is a good command and one "selling" really boosted his chances. "I think all (sailors) should that does its best to help the crew excel. be lucky enough to have a good chief to (support them and) sell While working in the MAAoffice he has implemented many them to their chain of command," Turner noted. * changes. Turner had asked his detailerfor a challenging billet and was sent to the HUNLEY. This was his first shipboard command where men and women served onboard. He began making im­ Reported by J03 Merrilee Greer, USS HUNLEY (AS-31) provements to the MAA system almost immediately. His first

MA's qualify as Air Warfare Specialists :i

aster-at-Arms First Ciass William A Pi­ Mtard (1.) and Chief Master-at-Arms Ygnacio V. Flores com­ pleted qualifications as Air Warfare Specialists In November 1987 and were awarded their AW pins. Flores is the Pa­ trols Supervisor and Pitard isthe Physical Se­ curity Petty Officer aboard the aircraft car­ rier USS MIDWAY (CV- 41 ), homeported in Yokosuka, Japan. {Photo by PHAN W. W. French) *

Sentryss Spring/Summer 1988 o.ef ending

by J02 John S. Verrico NSIC Public Affairs Assistant against n 28 June 1988, Capt. Wil­ liam E. Nordeen, Defense 0 and Naval Attache to Athens, Greece, was assassinated. A remote-controlled car bomb, planted terrorism on the street near his home in Athens, was detonated as he drove past. The Reducing American Greek terrorist group, Revolutionary Organization 17 November, took 'credit' for the assassination. vulnerability Could terrorist incidents like Part 5 in a series this latest one be prevented? There is no way to be 100% sure, but certain steps can be taken to reduce the vul­ nerability of Americans abroad. Personal security measures for traveling While traveling between loca­ tions, control over personal security becomes limited. People are mostvul­ Steps you can take to protect yourself while mtransit, nerable traveling from place to place, and to reduce risk of surveillance and especially to and from work be­ cause ofthe predictability. Some basic precautions can help prevent you from tion itself will also be successful. remote areas. becoming predictable and help reduce However, the plots are most vulner­ Know your route and be alert to your vulnerability. able during this stage. If surveillance your location even if you are a passen­ Varying your daily pattern as is discovered, intended victims can ger. You should be familiar with the much as possible, such as leaving and take measures to protect themselves, location of police stations, hospitals, returning at different times and using and the plan can be ruined. and military, government and other alternate routes, can be your greatesl Make a practice of visually public facilities alonglhe route and be asset. Consider traveling with escorts scanning the street before you depart aware of"safe areas" that maybe used such as driving with a neighbor or car­ any building, checking the area for in an emergency. pooling with co-workers. parked cars with passengers and be Normally the existence of sur­ Park your vehicle in a safe, well­ alert for surveillance. If possible, use veillance means that you are not in lit area, off street if possible, and al­ different doors or gates when depart­ immediate danger of being attacked. ways lock it, no matter where it is ing and entering your home or office. If you believe you are being followed, located. Keep the trunk locked, too. You should be constantly alert to road take the following actions. Before entering a vehicle, ex­ conditions and surroundings, and be First of all, do not reveal to amine it for any foreign objects inside alert for possible surveillance by car, those following you that you suspect or underneath, and check the exterior motorcycle or even bicycle. Prior to them. Avoid stopping or taking other for any evidence of attempted entry. exiting your vehicle, check the sur­ actions that may force a confronta­ When you have to park in public rounding area for suspicious individu­ tion. If you have communications in areas, don't leave uniforms, govern­ als. When in doubt, drive away. your vehicle, notify authorities that ment parking passes, or other items When driving, always fasten you are under surveillance and try to which indicate government affiliation, your seat belt, keep your doors locked observe any identifying data without exposed in the car. and do not open the windows more drawing undue attention. Surveillance is the key to suc­ than a few inches. Never pick up hitch­ If you feel you are in danger, cessful terrorist operations. Terror­ hikers and be cautious when assisting immediately drive to the nearest "safe ism has a success rate of over 90% in other motorists who appear to be in area." Do not drive home. If you terms of accomplishingc the intended distress. cannot locate a suitable "safe area" tasks. Statistics show that if the sur­ Select well-traveled streets as and still feel endangered, take evasive veillance stage is fruitful, the opera- much as possible, and avoid trips to driving actions. 56 - .

Bypass suspicious road block­ key only and do not permit entry to the through security checkpoints to se­ ades by driving on the shoulder or trunk unless you are present. cure areas to await your flight. Use through a ditch. Be alert for, and give Keep a low profile. Drive ve- military flights when practical. wide berth to, cars or trucks parked hiclesthatarecommontothelocaleto For those who like to walk or along the road, particularly if there are avoid undue attention. jog for recreation, the following sug- several people nearby, and be alert for You can guard against the es- gestions are made. Do not walk or jog slow-moving vehicles. They could be tablishment of traveling routines by alone -- go with people you know and attempts to slow your car. Maintain varying modes of travel as well as trust. Vary your routes and routines. adequate distance between your car routes and times. If possible, use Wear clothing similar to that worn by and other vehicles preceding you to public transportation as an additional the local populace, avoiding those avoid being blocked, and never pull all method of varying your routine, but marked "USA", "US NA VY", or with the way up to the car in front of you at keep the following precautionary any other design that would identify a traffic light or stop sign. techniques in mind. you as American. In some countries Another step you can take is If you are a frequent taxi user, jogging identifies you as an American, continuously honking your horn, as do not always patronize the same - and is discouraged. this may be an occasion where you stand. Ifyou are suspicious of any taxi When staying at private hotels, may want to draw attention to your­ driver, wave him off and hail another. do not use your rank or title. Don't see self. Whenever possible, select the route to unfamiliar visitors in a hotel room or Most important of all is to be your destination and do not permit the private suite. Do not accept visitors sure to report all suspected surveil­ driver to deviate from your choice. except by appointment, and know the lances immediately to appropriate Travel on commercial vehicles nature of their business prior to seeing security officials. with a companion whenever possible. them. Some other things to keep in If you take a bus or subway, board Avoid sidewalk cafes. In res- mind include keeping your vehicle in a from a well illuminated and busy stop taurants, request a table away from high state of maintenance at all times. and sit in a crowded section of the the entrance and windows, and pref­ You should keep the gas tank at least vehicle. erably near a wall to limit directions of half-full. Install appropriate mirrors, For air travel, arrive at the air­ potential attack. locks and other devices on vehicles to port early and, ifpossible, pick up your By taking some of these basic enhance security and safety. Separate tickets there. A void loitering in public precautions, you can make yourself a your ignition key from all other keys. sections of the airport as most terror­ difficult 'target' for terrorists, and If it is necessary to leave keys with ist incidents occur in public waiting most-likely, they will move on to find parking attendants, leave the ignition areas of airports. Proceed quickly someone more predictable. * '\

This car-bomb killed an American sailor and four Italian nationals, wounded 17 other Italians, and destroyed the USO, a popularliberty "hang­ out" for fleet sailors in Naples, Italy, on 14 April 1988. The bomb was detonated on the street in front of the USO .. (U.S. Navy photo)

Sentry Spring/Summer 1988 57 CPO serves unique proba lion Sailor sentenced to 1 year for DUI manslaughter

hen USS SARATOGA service hours for the Navy, trying to about how his life was ruined by neared her homeport of save the lives of his fellow sailors. He drunken driving, it will have a more W Naval Station Mayport last will meet incoming ships and talk profound effect, he said. November, ChiefPetty Officer Joseph about what drinking and driving has The Navy has agreed to retain E. Stuckey was flown aboard to join done to his life. Stuckey on active duty as a chief petty the crew for the final few days of their "The most dangerous time for a officer until he completes 20years. He cruise. sailor right now is not in the Persian was lucky. At the time ofhis arrest, he But instead ofwearing his Navy Gulf," said Assistant State Attorney happened to fie a profile the State khakis, Stuckey wore prison grays. (Florida) Wayne Ellis. "It's the two Attorney was trying to fill. Ellis was He wasn't going aboard to weeks after the ship docks." looking for several types of articulate order subordinates around, he was Chief Warrant Officer Marcus professionals, busted for DUI, who going to be an example of what can Garrett, director of the Navy Alcohol would be willing to talk to other people happen to sailors who drink and drive. and Drug Safety Program, said that about what happened to them. One of On 9 November 1987, Stuckey each time a major ship docks in May­ the profiles was a sailor who had been pleaded guilty to vehicular man­ port, an average of two to three sailors successful in the Navy. Ellis wanted a slaughter while driving under the in­ die in alcohol-related traffic acci­ sailor who could talk to other sailors fluence of alcohol (DUI) and DUI dents. According to Garrett, the last about the perils of drunken driving. resulting in serious injury. The six times that SARATOGA returned Stuckey fit the bill. charges stemmed from a 6 June 1987 from lengthy deployments, at least As an additional part of his accident in which Stuckey ran into the one crewman has been killed. sentence, Stuckey will also be respon­ rear of a jeep, killing 26-year-old Normally, when ships come in sible for Christina's financial well­ Deborah P. Norman and injuring her from a deployment, Florida Highway being until she is 18. He will pay 1 1/2-year-old daughter, Christina. Patrol personnel go aboard and lec­ $400.00 per month for child support Both were thrown from their jeep. ture on drunken driving. Stuckey and take out a $10,000.00 life insur­ Mrs. Norman died instantly and believes he might succeed where the ance policy on himself, naming her as Christina suffered injuries, including a policemen have failed. the beneficiary. * broken jaw, but she has recovered. "You have to remember that A Circuit Judge sentenced . when you've been at sea for six to eight Parts of this article were paraphrased months, your mind is not with the from an article by Derek L. Kinner, Stuckey, to one year in prison, to be Staff Writer, The F1orida Times-Un­ followed by 15 years of a unique pro­ (police), it's back at home with your ion, Jacksonville, Florida, November bation. Stuckey, who is currently serv­ family," said Stuckey, who has a wife 10, 1987. ing his sentence on the work-release and daughter. Whensailors see one of program, will serve 250 community their own in a prison uniform talking

5gSentry Spring/Summer 1988 COMMENTARY

Tips for prospective LDOs and CWOs by Lt. Cmdr. Jerry L.oPorto viewers should tell it like it is. If a candidate is ready for Physical Security and Law Enforcement Officer, CINCPACFLT selection then say so, if not, equally say so. Phrases like "I irst of all let me take the opportunity to personally think" or "I believe with a little time... ," are not positive. congratulate and welcome into our community Rank and designator of interview board members must be F those people that were selected for Limited Duty entered on the interview form. LDO/CWO members are Officer (LDO) and Chief Warrant Officer (CWO). Sitting required, or the CO must state why they are not available on the selection board was quite an experience. After in the endorsement. reviewing so many applications, I was both impressed and Commandini: Officer's endorsement: The CO's depressed. endorsement is critical and must contain specifics as to why On the positive side, many records were very impres­ applicant is better than the competition. If the CO doesn't sive. Both the applicant and the command had taken the want the candidate selected, then the application should time to properly document and prepare good packages. not be submitted. Comments such as "sharpest chief petty These records were enjoyable to review. Sustained supe­ officer I have come across in twenty five years" or "candi­ rior performance, coupled with vast experience, superla­ date is the number one chief out of20 at this command," are tive comments from the commanding officer and well­ very helpful. The CO should read the interview sheets written appraiser comments said a lot. before writing the endorsement and the two should be in On the other hand, some individuals had no business agreement. Finally, the CO's endorsement should not be submitting applications. They wasted their time, their signed 'by direction' or 'acting.' command's time, the interviewers' time, and the selection List of past duty stations and assignments: Take board's time. Many applicants submitted poorly docu­ the time and effort to detail and describe your duties fully. mented packages, had very little or no security or law Use the horizontal format. A variely of types of duty and enforcement experience, had poor performance marks, assignments, e.g., sea, shore, staff, security, law enforce­ weak endorsements from the command and no indications ment, are important for a well-rounded career pattern. from the appraisers that the individual was really ready to Education and Correspondence courses: All off­ become an LDO or CWO. These individuals should not duty education certainly helps,including formal colleges have applied. and schools, and correspondence courses. In addition to This article is an effort to explain to future appli­ professional courses relating to security and law enforce­ cants, security officers, interviewers and commanding offi­ ment, other Navy courses are helpful. Don't concentrate cers some major factors to consider when submitting only on law enforcement, security or other "job related" packages for LDO or CWO. Actual board procedures can courses. Courses from other services are also good. Be not be discussed but the following suggestions are offerred. consistent in submitting correspondence courses, don't The Application: Don't wait until the last moment cram at the last minute. Off-duty education should be to start putting your package together. 'Thick' applications within reasonable limits. Continuous full-time schooling get no extra points. Organize the extra material. Do not raises doubts about your ability to do your Navy job. include what is on your microfiche, unless it is specifically Extra-curricular activities: Participate in some­ required. Go the extra distance. All special qualifications thingjob-related, e.g., neighborhood crime watch or crime such as ES\vS, CDO, Criminal Investigator, Instructor, prevention programs for the community are good. Active etc. are considered. If your GCT/ ARI is below average, membership in professional organizations such as the you can counter them with education. Low scores com­ International Association of Chiefs of Police, are good and bined with no off-duty education are not favorable. Para­ show a desire to stay abreast with our community. graph 12 letsyou talk to the board. Use it to explain unusual Finally, review your microfiche, double check your entries in your record, broken service, bad evaluation, past records for neatness and accuracy, and don't give up. medical problem, etc. But don't ramble; use bullets and Continue to strive for perfection. Don't accept being facts. Ensure your package is neat, accurate, complete and second best. Get involved in writing security plans and in proper order. directives, prove to your command that you are "Head and Interview Board and Appr.iisal Sheets: Present a Shoulders" ahead of your contemporaries. positive image at your interview board. This includes I will be happy to discuss the LDO/CWO security grooming and uniform appearance. Stay abreast on cur­ program with anyone in our community. Feel free to give rent military, Navy and professional issues. Interviewers' me a call at Autovon: 474-6785 or Commercial: (808) 474- comments which are wealt or average don't go far. Inter- 6785/6790. "Good Luck" *

SentryS9 Spring/Summer 1988 KEEP AN EAGLE EYE ON

ANNOUNCING THE

~svital Security to the success of the missio...... Awareness Poster Contest Grand Prize -- 2-MAN RAFT with oars

Submit original ideas and/or artwork to: CNO (OP-09N2) Security Awareness Poster Contest 8621 Georgia Ave. Silver Spring, Md 2091 O Deadline: 31 December 1988

Posters will become property of the Department of the Navy and, when published, will become public domain. Participants will get some small recogni- tion and will be helping the Department of the Navy Security Awareness Program. Refer questions about the contest to Jim McFlroy at AV: 291-5969 or Comm: (301) 427-5969.

Have you checked. the security classification guide?? ~,.,,...~ ...... ,., -- ·-- (800) •445· 7343 HOTLINE for espionage