AR 190-13 the Army Physical Security Program

Total Page:16

File Type:pdf, Size:1020Kb

AR 190-13 the Army Physical Security Program Army Regulation 190–13 Military Police The Army Physical Security Program Headquarters Department of the Army Washington, DC 30 September 1993 Unclassified SUMMARY of CHANGE AR 190–13 The Army Physical Security Program This revision- o Consolidates AR 190-13 and AR 15-15, Department of the Army Physical Security Review Board (DAPSRB), and incorporates policy on the purpose, function, composition of the DAPSRB (chap 7). o Addresses command responsibility for a crime prevention program (para 2-2). o Revises DA Form 4261 and DA Form 4261-1 (Physical Security Inspector Identification Card) (paras 3-1 and 3-2). o Redesignates site surveys as security engineering surveys. Modifies Physical Security Equipment Management Program objectives (para 2-14). o Identifies the establishment, purpose, functions, and composition of the Department of the Army (DA) Physical Security Equipment Action Group (PSEAG) (para 4-4). o Redesignates the Product Manager for Physical Security Equipment (PM-PSE) to the Physical Security Equipment Manager, Physical Security Equipment Management Office (PSEMO) (para 4-5). o Adds an outline of the establishment and specific functions of the Physical Security Equipment Working Group (para 4-6). o Addresses intrusion detection systems (IDS) by: revising the priority for installation of IDS based on the level of security needed (para 4-9); discussing planning for IDS (para 4-15); establishing new priorities and priority codes for the IDS (table 4-1). o Outlines security force procedures, inspections, and security patrol plans (chap 8). o Authorizes exact replication of any Department of the Army and Department of Defense forms that are prescribed in this regulation and are generated by the automated Military Police Management Information System in place of the official printed version of the forms (app A). Headquarters *Army Regulation 190–13 Department of the Army Washington, DC 30 September 1993 Effective 30 October 1993 Military Police The Army Physical Security Program Physical Security Review Board, and the De- of AR 11–2. It contains internal control pro- p a r t m e n t o f t h e A r m y P h y s i c a l S e c u r i t y visions, but does not contain a checklist for Equipment Action Group. It provides general c o n d u c t i n g i n t e r n a l c o n t r o l r e v i e w s . T h i s g u i d a n c e c o n c e r n i n g r e q u i r e m e n t s f o r a n d c h e c k l i s t i s c o n t a i n e d i n D A C i r c u l a r use of physical security equipment; the ap- 11–89–2. pointment of physical security officers and i n s p e c t o r s ; p h y s i c a l s e c u r i t y c r e d e n t i a l s , Supplementation. Supplementation of this i d e n t i f i c a t i o n c a r d s a n d b a d g e s ; r e s t r i c t e d r e g u l a t i o n a n d e s t a b l i s h m e n t o f c o m m a n d areas; and security forces. and local forms is prohibited without prior Applicability. This regulation applies to all approval from HQDA(DAMO–ODL–S), 400 units of the Active Army, the Army National A R M Y P E N T A G O N , W A S H , D C Guard, the U.S. Army Reserve, and the Re- 20310–0400. serve Officers’ Training Corps when in Fed- e r a l S e r v i c e t h a t c o n t r o l , m o v e , s t o r e , Interim changes. Interim changes to this m a i n t a i n , o r s e c u r e A r m y m a t e r i e l , e q u i p - regulation are not official unless they are au- ment, and personal property unless exempted thenticated by the Administrative Assistant to History. This UPDATE printing publishes a by other regulations. This publication applies the Secretary of the Army. Users will destroy r e v i s i o n o f t h i s p u b l i c a t i o n . B e c a u s e t h e during partial and full mobilization. interim changes on their expiration dates un- s t r u c t u r e o f t h e e n t i r e r e v i s e d t e x t h a s b e e n P r o p o n e n t a n d e x c e p t i o n a u t h o r i t y . less sooner superseded or rescinded. r e o r g a n i z e d , n o a t t e m p t h a s b e e n m a d e t o The proponent of this regulation is the Dep- highlight changes from the earlier regulation uty Chief of Staff for Operations and Plans. Suggested Improvements. Users are in- dated 20 June 1985. The Deputy Chief of Staff for Operations and vited to send comments and suggested im- S u m m a r y . T h i s r e g u l a t i o n i m p l e m e n t s Plans has the authority to approve exceptions p r o v e m e n t s o n D A F o r m 2 0 2 8 DOD 5200.8–R, Physical Security Program, to this regulation that are consistent with con- (Recommended Changes to Publications and and DODD 3224.3, Physical Security Equip- trolling law and regulation. The Deputy Chief B l a n k F o r m s ) d i r e c t l y t o m e n t ( P S E ) : A s s i g n m e n t o f R e s p o n s i b i l i t y of Staff for Operations and Plans may dele- HQDA(DAMO–ODL–S), 400 ARMY PEN- for Research, Development, Testing, Evalua- gate this authority in writing to a division TAGON, WASH, DC 20310–0400. tion, Production, Procurement, Deployment, chief within the proponent agency who holds and Support and consolidates two regulations a grade of colonel or the civilian equivalent. Distribution. Distribution of this publica- pertaining to physical security: AR 190–13 T h e a p p r o v a l a u t h o r i t y w i l l c o o r d i n a t e a l l tion is made in accordance with the require- and AR 15–5. It prescribes policies, proce- questions regarding the scope of authority to ments on DA Form 12–09–E, block 2568, dures, and guidance to plan and implement approve exceptions with HQDA(DAJA–AL), intended for command levels A, B, C, D, and the Department of the Army Physical Secu- WASH, DC 20310–0200. E for the Active Army and Army National rity Program, to include the functions and A r m y m a n a g e m e n t c o n t r o l p r o c e s s . Guard and the U.S. Army Reserve. membership of the Department of the Army This regulation is subject to the requirements Contents (Listed by paragraph and page number) Deputy Chief of Staff for Operations and Plans (DCSOPS) • 1–6, page 1 Chapter 1 Deputy Chief of Staff for Logistics (DCSLOG) • 1–7, page 1 General, page 1 Deputy Chief of Staff for Personnel (DCSPER) • 1–8, page 1 Deputy Chief of Staff for Intelligence (DCSINT) • 1–9, page 1 Section I The Inspector General • 1–10, page 1 Introduction, page 1 The Surgeon General • 1–11, page 1 Purpose • 1–1, page 1 The Auditor General • 1–12, page 1 References • 1–2, page 1 Headquarters, USACE • 1–13, page 1 Explanation of abbreviations and terms • 1–3, page 1 Chief of Engineers (COE) • 1–14, page 2 The Chief, Army Reserve • 1–15, page 2 Section II The Chief, National Guard Bureau • 1–16, page 2 Responsibilities, page 1 The CG, TRADOC • 1–17, page 2 Assistant Secretary of the Army (Installations, Logistics and CG, AMC • 1–18, page 2 Environment) (ASA(I,L&E)) • 1–4, page 1 CG, U.S. Army Information Systems Command (USAISC) • 1–19, Assistant Secretary of the Army (Research, Development, and page 3 Acquisition) (ASA(RDA)) • 1–5, page 1 *This regulation supersedes AR 15–15, 8 February 1977, and AR 190–13, 20 June 1985. AR 190–13 • 30 September 1993 i Unclassified Contents—Continued Directors and supervisors of HQDA Staff agencies, commanders of Control and storage of security identification cards and badges field operating agencies (FOAs) not on military installations, and • 5–3, page 20 commanders of USAR and ARNG facilities • 1–20, page 3 Replacement of security identification cards and badges • 5–4, Commanders of major Army commands (MACOMs) • 1–21, page 20 page 3 The military commander in the chain of command • 1–22, page 3 Chapter 6 Commanders of installation or activities • 1–23, page 3 Restricted Areas, page 20 Commanders of host and tenant activities • 1–24, page 4 General • 6–1, page 20 The PM or physical security officer • 1–25, page 4 Authority (summarized) • 6–2, page 20 Installation engineer or master planner • 1–26, page 4 Designation of restricted areas • 6–3, page 21 Exemptions • 1–27, page 4 Posting of restricted areas • 6–4, page 21 National defense areas • 6–5, page 21 Chapter 2 Restricted area violation procedures • 6–6, page 21 Department of the Army Physical Security Program, page 4 General • 2–1, page 4 Chapter 7 Crime prevention • 2–2, page 5 Department of the Army Physical Security Review Board, Physical security program design • 2–3, page 5 page 21 Physical security program factor assessment • 2–4, page 5 General • 7–1, page 21 Physical security planning considerations • 2–5, page 5 Function of the DAPSRB • 7–2, page 22 Coordination • 2–6, page 6 Composition • 7–3, page 22 Contingency plans • 2–7, page 6 Direction and control • 7–4, page 22 Security threat assessment • 2–8, page 6 Correspondence • 7–5, page 22 Physical security plan format • 2–9, page 6 DA Form 2806–R (Physical Security Survey Report) Chapter 8 (RCSCSGA–1672) • 2–10, page 6 Security Forces, page 22 DA Form 2806–1–R (Physical Security Inspection Report) General • 8–1, page 22 (RCSCSGPA–1671) • 2–11, page 7 Guard procedures • 8–2, page 22 Reports of action taken • 2–12, page 7 Inspections and guard checks • 8–3, page 22 Reports classification • 2–13, page 8 Security patrol plans • 8–4, page 22 Security engineering surveys • 2–14, page 8 Appendixes Chapter 3 A.
Recommended publications
  • Designing Physical Security Monitoring for Water Quality Surveillance and Response Systems
    United States Environmental Protection Agency Designing Physical Security Monitoring For Water Quality Surveillance and Response Systems Office of Water (AWBERC, MS 140) EPA 817-B-17-001 September 2017 Disclaimer The Water Security Division of the Office of Ground Water and Drinking Water has reviewed and approved this document for publication. This document does not impose legally binding requirements on any party. The information in this document is intended solely to recommend or suggest and does not imply any requirements. Neither the U.S. Government nor any of its employees, contractors or their employees make any warranty, expressed or implied, or assumes any legal liability or responsibility for any third party’s use of any information, product or process discussed in this document, or represents that its use by such party would not infringe on privately owned rights. Mention of trade names or commercial products does not constitute endorsement or recommendation for use. Version History: The 2019 version is the second release of the document, originally published in September 2017. This release includes updated component names (Enhanced Security Monitoring was changed to Physical Security Monitoring and Consequence Management was changed to Water Contamination Response), an updated version of Figure 1.1 that reflects the component name changes and includes the Advanced Metering Infrastructure component, an updated Glossary, updated target capabilities, and updated links to external resources. “Enhanced” was replaced with “Physical” in this document to avoid any implication of a baseline standard, and better describe the type of security. Questions concerning this document should be addressed to [email protected] or the following contacts: Nelson Mix U.S.
    [Show full text]
  • Standards for Building Materials, Equipment and Systems Used in Detention and Correctional Facilities
    NATIONAL INSTITUTE OF STANDARDS & TECHNOLOGY Research Information Center Gaithersburg, MD 20890 PUBLICATIONS NBSIR 87-3687 Standards for Building Materials, Equipment and Systems Used in Detention and Correctional Facilities Robert D. Dikkers Belinda C. Reeder U.S. DEPARTMENT OF COMMERCE National Bureau of Standards National Engineering Laboratory Center for Building Technology Building Environment Division Gaithersburg, MD 20899 November 1987 Prepared for: -QC ment of Justice 100 ititute of Corrections i, DC 20534 . U56 87-3687 1987 C . 2 Research Information Center National Bureau of Standards Gaithersburg, Maryland NBSIR 87-3687 20899 STANDARDS FOR BUILDING MATERIALS, EQUIPMENT AND SYSTEMS USED IN u - DETENTION AND CORRECTIONAL FACILITIES Robert D. Dikkers Belinda C. Reeder U.S. DEPARTMENT OF COMMERCE National Bureau of Standards National Engineering Laboratory Center for Building Technology Building Environment Division Gaithersburg, MD 20899 November 1987 Prepared for: U.S. Department of Justice National Institute of Corrections Washington, DC 20534 U.S. DEPARTMENT OF COMMERCE, C. William Verity, Secretary NATIONAL BUREAU OF STANDARDS, Ernest Ambler, Director TABLE OF CONTENTS Page Preface . vi Acknowledgements vii Executive Summary ix I . INTRODUCTION 1 A. Background , 1 B. Objectives and Scope of NBS Study 3 II. FACILITY DESIGN AND CONSTRUCTION 6 A. Facility Development Process 6 1 . Needs Assessment ........................................ 6 2 . Master Plan 6 3 . Mission Statement . 6 4. Architectural Program 7 5. Schematic Design and Design Development 7 6 . Construction 9 B. Security Levels 10 C . ACA S tandar ds 13 . III MATERIALS , EQUIPMENT AND SYSTEMS .... 14 A. Introduction 14 B. Performance Problems 15 C. Available Standards/Guide Specifications 20 iii TABLE OF CONTENTS (continued) 5 Page D« Perimeter Systems 21 1 .
    [Show full text]
  • Physical Access Control Systems (PACS) Customer Ordering Guide
    Physical Access Control Systems (PACS) Customer Ordering Guide Revised January 2017 1 Physical Access Control Systems (PACS) Customer Ordering Guide Table of Contents Purpose ...................................................................................................................3 Background .............................................................................................................3 Recent Policy Announcements ...............................................................................4 What is PACS? .......................................................................................................5 As an end-user agency, where do I start and what steps are involved? ................. 7 Where do I purchase PACS Solutions from GSA? ..............................................10 How do I purchase a PACS Solution using GSA eBuy? .....................................11 Frequently Asked Questions (FAQs) ...................................................................12 GSA Points of Contact for PACS .........................................................................15 Reference Documents ...........................................................................................16 Sample Statement of Work (SOW) ......................................................................18 2 Physical Access Control Systems (PACS) Customer Ordering Guide Purpose The purpose of this document is to create a comprehensive ordering guide that assists ordering agencies, particularly contracting officers, to
    [Show full text]
  • Proceedings of the Ninth Annual Alaska Conference on Placer Mining
    PROCEEDINGS OF THE NINTH ANNUAL ALASKA CONFERENCE ON PLACER MINING 'PLACER MINING - JOBS FOR ALASKA" MARCH 18-25. 1987 Compiled by Mary Albanese and Bruce Campbell Prom cover: Tlra Colomdo Creek mammoth skull being wmpped In 0 plaallc jacket in prepamrlon lor rhbment lo the LiAF Jlureurn. Photo rourtrJv Uniuerrity 01 Alarka Mureum. SPONSORED BY Placer Miners of Alaska Alaska Miners Association Alaska Women in Mining - Mining Advocacy Council ORGANIZING COMMITTEE Gail Ackles,,...... ................... Circle Mining District Mary Albanese.. .......................Alaska DivlsFon of Geological and Geophysical Surveys Lela Bouton ...........................Koyukuk Mining District Roger Burggraf ........................Fairbanks Mining District Jeff Burton ...........................Tanana Valley Community College Bruce Campbell ........................Special Technical Assistant Karen Clautice ........................ Alaska Division of Geological and Geophysical Surveys Judy Geraghty livengood- good-Toovaa Mining District Kathy Gaff........... .................Alaeka Miners Association Charles Green .........................Alaska Division of Mnerals and Forest Products Brent Aamil ...........................University of Alaska Jim Madonna ........................... University of Alaska Rose Rybachek .........................Alaska Miners Association Rosalyn Stowell ....................... Alaska Women in Mining Mary-Lou Teal., ....................... Alaska Women in Mining Dan Walsh...... .......................University of Alaska,
    [Show full text]
  • HIPAA Security Standards: Physical Safeguards
    Security SERIES HIPAA Security 3 Security Standards: Physical Safeguards Topics What is the Security Series? 1. The security series of papers will provide guidance from the Centers for Security 101 for Medicare & Medicaid Services (CMS) on the rule titled “Security Standards Covered Entities for the Protection of Electronic Protected Health Information,” found at 45 CFR Part 160 and Part 164, Subparts A and C. This rule, commonly known 2. as the Security Rule, was adopted to implement provisions of the Health Security Standards Insurance Portability and Accountability Act of 1996 (HIPAA). The series - Administrative will contain seven papers, each focused on a specific topic related to the Safeguards Security Rule. The papers, which cover the topics listed to the left, are designed to give HIPAA covered entities 3. insight into the Security Rule, and Compliance Deadlines assistance with implementation of the No later than April 20, 2005 Security for all covered entities except Standards security standards. This series aims to small health plans which have - Physical explain specific requirements, the thought Safeguards until no later than April 20, process behind those requirements, and 2006. 4. possible ways to address the provisions. Security Standards - Technical CMS recommends that covered entities read the first paper in this series, Safeguards “Security 101 for Covered Entities” before reading the other papers. The first paper clarifies important Security Rule concepts that will help covered entities as they plan for implementation. This third paper in the series is 5. devoted to the standards for Physical Safeguards and their implementation Security Standards - Organizational, specifications and assumes the reader has a basic understanding of the Policies and Security Rule.
    [Show full text]
  • How to Manage Physical Security Risk
    How to Manage Physical Security Risk Table of Contents Introduction ........................................................................................................................................................3 What Is Physical Security Exactly? ...........................................................................................................4 Components of Physical Security ..............................................................................................................5 The Importance Of Physical Security ......................................................................................................5 How Physical Security Helps To Ensure Digital Safety ...................................................................7 The Most Common Physical Security Threats ....................................................................................9 How To Mitigate Physical Security Threats ...................................................................................... 10 Top Tips To Maintain Physical Security At Your Workplace .................................................... 12 Final Words....................................................................................................................................................... 14 Introduction Digital security has become the watchword of the day. As we step into the new decade, the world is visibly dependent on IT infrastructure for carrying out everyday business operations. Be it monetary transactions or information exchange,
    [Show full text]
  • Cyber Security and Cloud Video Surveillance
    CYBER SECURITY WHITE PAPER Page 1 of 14 Cyber Security and Cloud Video Surveillance Eagle Eye Networks | 4611 Bee Caves Rd, #200 | Austin, TX 78746 www.een.com | +1-512-473-0500 | [email protected] CYBER SECURITY WHITE PAPER Page 2 of 14 This paper explains why video surveillance system security can and should be more fully addressed within the industry, so that cyber security is not left as a problem for installers or customers to solve. Eagle Eye Networks is a leader in this respect, mitigating security concerns from the point of product research, development and deployment. Introduction Figure 1. Timeline: escalating cyber attacks on security video cameras and DVRs. Today’s networked video surveillance systems are vulnerable in many ways, and their cameras have been weaponiZed by hackers to create massive Distributed Denial of Service (DDoS) attacks on targeted systems. Figure 1 presents a timeline of recent cyber attacks and threats affecting Internet-connected security cameras and digital video recorders (DVRs). Securing today’s networked video systems can be a complex and difficult technical challenge. However, especially for small and medium siZe businesses, it doesn’t have to be that way. Video systems and equipment can be purpose-built to constitute a pre- hardened and more easily securable system, in contrast to the current installed base of networked video technology. In September of 2016, a large French web-hosting provider reported a record-breaking 1-terabit-per- second DDoS attack against their web servers, unleashed by a collection of more than 145 thousand hacked Internet-connected video cameras and digital video recorders.
    [Show full text]
  • Physical Security Models, Philosophies, and Context
    Journal of International Information Management Volume 10 Issue 2 Article 9 2001 Physical security models, philosophies, and context Karen A. Forcht James Madison University S. E. Kruck James Madison University Follow this and additional works at: https://scholarworks.lib.csusb.edu/jiim Part of the Management Information Systems Commons Recommended Citation Forcht, Karen A. and Kruck, S. E. (2001) "Physical security models, philosophies, and context," Journal of International Information Management: Vol. 10 : Iss. 2 , Article 9. Available at: https://scholarworks.lib.csusb.edu/jiim/vol10/iss2/9 This Article is brought to you for free and open access by CSUSB ScholarWorks. It has been accepted for inclusion in Journal of International Information Management by an authorized editor of CSUSB ScholarWorks. For more information, please contact [email protected]. Forcht and Kruck: Physical security models, philosophies, and context Physical Security Journal of International Information Manasement Physical security models, philosophies, and context Karen A. Forcht S. E. Krnck James Madison University ABSTRACT This paper presents physical security of a computer facility within the context of a corpo­ rate environment. The context is established from several different perspectives. It first presents physical security philosophies and illustrates the philosophies via the Onion and Garlic Mod­ els. It defines a process for identifying and describing transition strategies between security levels. Once the models are defined, a Macro View of physical security is presented. This view discusses physical security goals and critical factors such as budget, monitoring and redun­ dancy. With this context established, the Micro View is presented. Its focus is on information technology (IT) facilities that protect centralized or clustered IT resources.
    [Show full text]
  • Type E High Explosives
    G03-01 Type E High Explosives Classification and Authorization General and Detailed Requirements for Type E Explosives March 2015 Explosives Regulatory Division 1 Table of Contents 1. Introduction ........................................................................................................................ 1 1.1 Scope ....................................................................................................................... 1 1.2 Approvals - Authorization of explosives .................................................................... 3 1.3 Regulation of use ...................................................................................................... 3 1.4 Required documentation ........................................................................................... 3 1.5 Continuing authorization ........................................................................................... 3 2. Request for authorization .................................................................................................. 4 2.1 List of articles ............................................................................................................ 4 2.2 Mandatory documentation ........................................................................................ 4 2.2.1 Additional mandatory documentation specific to bulk explosives used for commercial blasting ...................................................................................... 4 2.2.2 Additional mandatory documentation specific to packaged
    [Show full text]
  • Responding to IT Security Audits: Improving Data Security Practices
    For more information please visit the Privacy Technical Assistance Center: https://studentprivacy.ed.gov Responding to IT Security Audits: Improving Data Security Practices Overview The U.S. Department of Education established the Privacy Technical Assistance Center (PTAC) as a “one- stop” resource for education stakeholders to learn about data privacy, confidentiality, and security practices related to student-level longitudinal data systems. PTAC provides timely information and updated guidance on privacy, confidentiality, and security practices through a variety of resources, including training materials and opportunities to receive direct assistance with privacy, security, and confidentiality of longitudinal data systems. More PTAC information is available on https://studentprivacy.ed.gov. Purpose Information Technology (IT) audits can help organizations identify critical gaps in data security and reduce the threat of security compromises. This issue brief explains what audits are and how they can be used to improve data security. It also provides recommended steps for developing an effective audit response plan, which is a detailed, point-by-point plan for addressing security concerns uncovered by an audit. Recommendations relate to collaborating with auditors to confirm understanding of an audit report, prioritizing audit findings, and determining corrective actions and implementation schedules. The recommendations included in this brief are intended to help educational organizations maximize the value of IT audits and improve data security. Examples of appropriate responses to audit findings are included in the appendix. What is an IT security audit and how can it benefit an education organization? An IT security audit is an assessment of an information system’s security architecture and processes, as well as all related policies and procedures for managing data in a secure manner.
    [Show full text]
  • Commercial High Explosives
    EXPLOSIVES 390 CHIMIA 2004, 58, No. 6 Chimia 58 (2004) 390–393 © Schweizerische Chemische Gesellschaft ISSN 0009–4293 Commercial High Explosives Otto Ringgenberg* and Jörg Mathieua Abstract: Non-military explosives are used mainly for mining and tunnel construction, for building demolition and for various special uses such as setting off avalanches and for seismic investigations. Common to all explosives is their heterogeneous structure, the great work capacity (blast effect) and the advantage that the detonation releas- es only small amounts of poisonous explosion gases. Modern explosives for tunnel construction can be pumped and are capable of exploding only on site, by the addition or chemical generation of microbubbles. With the intro- duction of electronic detonators, explosive technology entered a new era. These detonators are very safe and pre- cise, and it is possible to program up to 1600 detonators in one blasting operation. Keywords: Blast effect · Detonator · Explosive plating · Explosives · Tagging 1. Introduction itary explosives, exhibit a strong propulsive oil as the combustible component. effect (work capacity or blast effect), but These cost-effective explosives have at- In contrast to military explosives, which are only a restricted ability to accelerate metals tained world-wide importance because they mostly based on uniform molecules, explo- (brisance). are easy to produce and very safe to handle, sives for non-military use are composed of even as freeflowing loose materials. Their oxidising, reducing, sensitising,
    [Show full text]
  • Double Click on the Seminar Number to Jump to Th
    Papers Published in the Proceedings of the International Pyrotechnics Seminars (double click on the Seminar number to jump to that location) 1 Estes Park, Colorado, USA 1968 2 Snowmass-at-Aspen Colorado, USA 1970 3 Colorado Springs, Colorado, USA 1972 4 Steamboat Village, Colorado, USA 1974 5 Vail, Colorado, USA 1976 6 Estes Park, Colorado, USA 1978 7 Vail, Colorado, USA 1980 8 Steamboat Springs, Colorado, USA 1982 9 Colorado Springs, Colorado, USA 1984 10 Karlsruhe, Germany 1985 11 Vail, Colorado, USA 1986 12 Juan les Pins, France 1987 13 Grand Junction, Colorado, USA 1988 14 Jersey, Channel Islands, UK 1989 15 Boulder, Colorado, USA 1990 16 Jönköping, Sweden 1991 17 Beijing, China 1991 18 Breckenridge, Colorado, USA 1992 19 Christchurch, New Zealand 1994 20 Colorado Springs, Colorado, USA 1994 21 Moscow, Russia 1995 22 Fort Collins, Colorado, USA 1996 23 Tsukuba, Japan 1997 24 Monterey, California, USA 1998 25 Brest, France 1999 26 Nanjing, Jiangsu, P.R.. China 1999 27 Grand Junction, Colorado, USA 2000 28 Adelaide, Australia 2001 29 Westminster, Colorado, USA 2002 30 Saint Malo, France 2003 31 Fort Collins, Colorado, USA 2004 32 Karlsruhe, Germany 2005 33 Fort Collins, Colorado, USA 2006 34 Beaune, France 2007 35 Fort Collins, Colorado, USA 2008 36 Rotterdam, The Netherlands 2009 37 Reims, France 2011 38 Denver, Colorado, USA 2012 39 Valencia, Spain 2013 1st Seminar 1968 index Estes Park, Colorado, USA page 1 Pyro research areas for further exploratory development. Hamrick J T 1 2 Colored smoke signals: castable compositions. Lane G A and Janowiak E 25 M 3 Ignition and output characteristics of pyrotechnics for electro-explosive 39 device applications.
    [Show full text]