CBP Security Policy and Procedures Handbook HB1400-02B August 13, 2009

Total Page:16

File Type:pdf, Size:1020Kb

CBP Security Policy and Procedures Handbook HB1400-02B August 13, 2009 CBP Security Policy and Procedures Handbook HB1400-02B August 13, 2009 Security Never Sleeps FOR OFFICIAL USE ONLY VOL TOC BACK VOLUME CONTENTS 1. FOREWORD ............................................................................V 2. REVISION HISTORY ...............................................................XVII 3. PHYSICAL SECURITY HANDBOOK.............................................VII 4. INFORMATION SECURITY: SAFEGUARDING CLASSIFIED AND SENSITIVE BUT UNCLASSIFIED INFORMATION HANDBOOK ... 735 5. BADGES, CREDENTIALS AND OFFICIAL IDENTIFICATION ............. 845 WARNING: This document is FOR OFFICIAL USE ONLY (FOUO). It is to be controlled, stored, handled, transmitted, distributed, and disposed of in accordance with DHS policy relating to FOUO information. This information shall not be distributed beyond the original addressees without prior authorization of the originator. iii of 890 U.S. Department of Homeland Security Washington, DC 20229 Commissioner FOREWORD The Office of Internal Affairs (IA) Security Management Division (SMD) is responsible for establishing policies, standards, and procedures to ensure the safety and security of the U.S. Customs and Border Protection (CBP) personnel, facilities, information, and assets. IA/SMD has developed the CBP Security Policy and Procedures Handbook to provide CBP with uniform standards and procedures for the proper administration of Physical Security; Safeguarding Classified and Sensitive but Unclassified Information; and Badges, Credentials, and Official Identification.This handbook serves as mandatory minimum requirements for CBP managers to implement and improve the security posture for their designated CBP area of responsibilities. This handbook implements security policies and standards published in a number of relevant source documents including numerous Public Laws, Presidential Directives, regulations, rules, Interagency Security Committee security design criteria, and U.S. Department of Homeland Security (DHS) Management Directives (MD) regarding integrating, managing, and governing various Security functions. It is issued under the authority of DHS MD 11080; Security Line of Business Integration and Management, January 3, 2006. This handbook supersedes the CBP memorandum; Interim Physical Security Guidance for Customs and Border Protection (CBP) Facilities, October 25, 2006; Customs Handbook (HB) 1400-02A, Physical Security Handbook, April 2000; Customs Directive No. 5230-029A, Employee Badges and Credentials, April 20, 2002; Customs HB 1400-03, Safeguarding Classified Information Handbook, February 15, 1991; U.S. Immigration and Naturalization Service (INS), Security Officer’s Handbook (SOH), September 2001; legacy U.S. Department of the Treasury, U.S. Customs Service, INS, U.S. Border Patrol, and U.S. Department of Agriculture’s Animal and Plant Health Inspection Service security policies and directives. The CBP Security Policy and Procedures Handbook is effective immediately and applicable to ALL CBP-owned, -leased or -occupied offices, facilities, installations, ports of entry, and stations. Compliance with this handbook is mandatory and will ensure consistent standards and effectiveness in executing security initiatives for the preservation of CBP’s mission to safeguard our Nation from terrorists and the instruments of terror. This handbook may be accessed through the CBPnet, Office of InternalAffairs website quick links at http://cbpnet.cbp.dhs.gov/xp/cbpnet/ia/ or CBP’s Policy Online Document Search (PODS) website: http://pods.cbp.dhs.gov/. To request further assistance or offer feedback regarding this handbook, contact the Security Management Division at (202) 325-0110 or by submitting your comments through the SMD Policy and Procedures Handbook Comment form. Jayson P. Ahern Acting Commissioner FOR OFFICIAL USE ONLY BACK CONTENTS 1. CHAPTER 1: PURPOSE ........................................................... 1 1.1. PURPOSE .................................................................................................... 2 2. CHAPTER 2: POLICY .............................................................. 3 2.1. POLICY ....................................................................................................... 4 2.2. POLICY EXCEPTION REQUIREMENTS ................................................................ 5 3. CHAPTER 3: BACKGROUND ..................................................... 7 3.1. BACKGROUND ............................................................................................. 8 4. CHAPTER 4: AUTHORITIES AND REFERENCES ............................ 9 5. CHAPTER 5: RESPONSIBILITIES .............................................. 15 5.1. COMPONENT HEAD ..................................................................................... 16 5.2. CBP COMPONENT CHIEF SECURITY OFFICER ................................................ 16 5.3. ASSOCIATE CHIEF SECURITY OFFICER .......................................................... 16 5.4. PHYSICAL SECURITY BRANCH (PSB) CHIEF .................................................. 16 5.5. FIELD SECURITY OPERATIONS BRANCH (FSOB) CHIEF................................... 16 5.6. REGIONAL SECURITY OFFICERS (RSOS) ....................................................... 16 5.7. DISTRICT SECURITY OFFICERS (DSOS) ....................................................... 16 5.8. DESIGNATION OF SECURITY OFFICERS AND OFFICIALS ..................................... 17 5.9. PHYSICAL SECURITY SPECIALISTS (PSSS) .................................................... 17 5.10. IA/PSD PERSONNEL SECURITY OFFICERS .................................................... 17 5.11. IA/SMD INFORMATION SECURITY OFFICERS .................................................. 18 5.12. CLASSIFIED DOCUMENT CUSTODIAN, CLASSIFIED CONTROL STATION ................ 18 5.13. DERIVATIVE CLASSIFIERS ............................................................................ 18 WARNING: This document is FOR OFFICIAL USE ONLY (FOUO). It is to be controlled, stored, handled, transmitted, distributed, and disposed of in accordance with DHS policy relating to FOUO information. This information shall not be distributed beyond the original addressees without prior authorization of the originator. vii of 890 FOR OFFICIAL USE ONLY BACK 5.14. DESIGNATED OFFICIAL (DO) ....................................................................... 18 5.15. ASSESSMENTS .......................................................................................... 18 6. CHAPTER 6: FACILITY PROTECTION ........................................ 19 6.1. GENERAL ................................................................................................. 20 6.2. PLANNING FACILITY PROTECTION .................................................................. 20 6.3. DETERMINING BUILDING SECURITY LEVEL ...................................................... 22 6.4. BUILDING SECURITY LEVELS ........................................................................ 22 6.5. FACILITY SECURITY LEVEL DETERMINATIONS FOR FEDERAL FACILITIES ............... 23 6.6. SPECIAL REQUESTS ................................................................................... 28 6.7. SECURITY CONTRACTOR SUITABILITY ............................................................ 28 6.8. GENERAL OFFICE REQUIREMENTS ................................................................ 29 6.9. FIRE DETECTION AND SUPPRESSION (SPRINKLER) SYSTEMS ............................. 31 6.10. SECURE BORDER INITIATIVE (SBI) ............................................................... 32 6.11. SECURITY SURVEY PROCESS ....................................................................... 33 7. CHAPTER 7: EXTERIOR PROTECTION ...................................... 35 7.1. GENERAL ................................................................................................. 36 7.2. PHYSICAL BARRIERS .................................................................................. 36 7.3. FENCING ................................................................................................... 36 7.4. GATES .................................................................................................... 37 7.5. PROTECTIVE LIGHTING ............................................................................... 38 7.6. DOORS .................................................................................................... 38 7.7. WINDOWS ................................................................................................. 38 7.8. MANHOLES, GRATES, AND STORM DRAINS..................................................... 39 WARNING: This document is FOR OFFICIAL USE ONLY (FOUO). It is to be controlled, stored, handled, transmitted, distributed, and disposed of in accordance with DHS policy relating to FOUO information. This information shall not be distributed beyond the original addressees without prior authorization of the originator. viii of 890 FOR OFFICIAL USE ONLY BACK 7.9. OPENINGS................................................................................................. 39 7.10. SHAFTS, VENTS, AND DUCTS ....................................................................... 40 7.11. FIRE ESCAPES AND BUILDING WALLS ........................................................... 40 7.12. FACILITIES IN REMOTE LOCATIONS ................................................................ 40 7.13. EXTERIOR SIGNAGE ..................................................................................
Recommended publications
  • Guarding America: Security Guards and U.S. Critical Infrastructure Protection
    Order Code RL32670 CRS Report for Congress Received through the CRS Web Guarding America: Security Guards and U.S. Critical Infrastructure Protection November 12, 2004 Paul W. Parfomak Specialist in Science and Technology Resources, Science, and Industry Division Congressional Research Service ˜ The Library of Congress Guarding America: Security Guards and U.S. Critical Infrastructure Protection Summary The Bush Administration’s 2003 National Strategy for the Physical Protection of Critical Infrastructures and Key Assets indicates that security guards are “an important source of protection for critical facilities.” In 2003, approximately one million security guards (including airport screeners) were employed in the United States. Of these guards, analysis indicates that up to 5% protected what have been defined as “critical” infrastructure and assets. The effectiveness of critical infrastructure guards in countering a terrorist attack depends on the number of guards on duty, their qualifications, pay and training. Security guard employment may have increased in certain critical infrastructure sectors since September 11, 2001, although overall employment of U.S. security guards has declined in the last five years. Contract guard salaries averaged $19,400 per year in 2003, less than half of the average salary for police and well below the average U.S. salary for all occupations. There are no U.S. federal requirements for training of critical infrastructure guards other than airport screeners and nuclear guards. Twenty-two states do require basic training for licensed security guards, but few specifically require counter-terrorism training. State regulations regarding criminal background checks for security guards vary. Sixteen states have no background check regulations.
    [Show full text]
  • Ljubljana Residents' Knowledge of and Satisfaction with Private Security Guards' Work
    VARSTVOSLOVJE, Journal of Criminal Ljubljana Residents’ Justice and Security, year 21 no. 4 Knowledge of and Satisfaction pp. 366‒381 with Private Security Guards’ Work Lavra Horvat, Matevž Bren, Andrej Sotlar Purpose: The purpose of the paper was to present out how Ljubljana residents know, understand and evaluate the work of private security guards. Design/Methods/Approach: A survey by internet and telephone was conducted among Ljubljana residents. The sample included residents between 18 and 75 years of age. A combined weights method was used in order to assure the representativeness of the sample by gender and age. Findings: Residents of Ljubljana are satisfied with the work performed by private security guards. Residents’ satisfaction mainly depends on their trust in security guards’ work, the help and assistance provided by security guards, security guards’ attitude towards residents and residents’ experience with security guards’ work. Residents assess their work as stressful and dangerous, however, they still believe that security guards lack education and professionalism, which is a finding, common to many other studies. Research Limitations/Implications: The survey is limited to the Ljubljana area, so a similar survey should be carried out nationwide. Practical Implications: Findings could be used by private security companies to plan adequate processes of training, professional socialisation and public relations strategies, thus increasing the degree of security guards’ professionalism. In turn, the improved professionalism would contribute greatly to a more positive assessment of security guards by residents. Originality/Value: In Slovenia, this kind of survey was conducted for the first time among the general population, as so far similar surveys have been carried out mainly among the student population.
    [Show full text]
  • A Covert Case Study of Bouncers in the Manchester Night-Time Economy
    6 A COVERT CASE STUDY OF BOUNCERS IN THE MANCHESTER NIGHT-TIME ECONOMY 6.1 Manchester as a case study: my biographical and experiential backyard 124 6.2 Covert passing in a demonized subculture: body capital and interaction rituals 126 6.3 The door order and door code: folklore, stories, trust, fictive kinship, masculinity, dirty work and private policing 129 6.4 Managing situated ‘ethical moments’ on the door 138 6.5 An optic on violence 142 6.6 Emotionality, embodiment and risk-taking in ethnography 145 6.7 Conclusions: the post-fieldwork self in a study that never quite finishes 147 6.8 Learning exercise 149 07_Calvey_Ch_06.indd 123 2/28/2017 10:53:56 AM Covert research This chapter focuses on a covert retrospective participant observation case study of bouncers in the night-time economy of Manchester in the United Kingdom. I will discuss my case study, comparing it to the work of other researchers who have explored this specific area, as well as others who might echo my research journey. 6.1 Manchester as a case study: my biographical and experiential backyard The location of Manchester, the UK, for the case study, which is where I live and work, is highly strategic. The city is saturated in popular culture, being named Gunchester, Gangchester and Madchester in the past, and has been well documented by a range of popular journalists and commentators (Haslam, 1999; Swanton, 1997, 1998; Walsh, 2005; Wilson, 2002). The development of club cul- tures in Manchester has been specifically linked to urban regeneration (Lovatt, 1996).
    [Show full text]
  • Richard Jewell Movie Release Date
    Richard Jewell Movie Release Date Rebuttable Steven retransfer very tangentially while Dino remains separative and synoptical. Swell and oculomotor Curt repriced her Anglo-Irish exscind unfrequently or torpedos untunably, is Barny unbowed? Anticivic Meredith gibbets notionally. The movie chronicles the fbi and chaos, remains a release date changes their significance around parking lots checking cars in Everyman nature of movies. Is not released by his extensive media coverage including stars out and movie and jealousy mounts among this information he called as producers. Every day Movie week To Netflix HBO Max And Disney This. 'Richard Jewell' Movie Review Clint Eastwood Defends an. Clint Eastwood's Richard Jewell Movie Gets A 2019 Release. Richard Jewell Blu-ray 2019 Best Buy. Esc key of movies and movie or had the latest news that jewell, and captivating story definitely earned a release. How dull I sign except for HBO Max? Clint Eastwood's Richard Jewell intends to clear the self's name once and for talking But Richard Jewell is from movie and movies are notoriously. Is fresh good liar on Apple TV? 'Richard Jewell' movie space This Clint Eastwood-directorial. Richard Jewell Movie Trailer Video History vs Hollywood. Richard Jewell Review New Clint Eastwood Movie Vulture. Help the movie where on paper, only of movies. The film is at night most humanizing when it focuses on the snap of characters who rarely get a starring role. Both movies showing that he plays and movie theatres please try a release date may change. Kathy bates also approached the film perpetuates harmful stereotypes about two nebraskan friends who like intense crime.
    [Show full text]
  • The Myth of the Scapegoat in Newspaper Coverage Of
    FROM HERO TO SCAPEGOAT: THE MYTH OF THE SCAPEGOAT IN NEWSPAPER COVERAGE OF RICHARD JEWELL AS BOMBING SUSPECT – A TEXTUAL ANALYSIS by THOMAS J. MYERS (Under Direction the of Leara Rhodes) ABSTRACT In 1996, a bomb exploded in Centennial Olympic Park during a concert held as part of the celebration for the Summer Olympic Games in Atlanta, Georgia. After initially being hailed in the press as a hero for his efforts to save lives during the moments following the bombing, security guard Richard Jewell emerged as a suspect in the FBI investigation of the bombing. The story was revealed in the press by the Atlanta Journal Constitution on July 30, 1996. What followed was an intense media investigation of a man who was not arrested or charged with any crime. This study examines the existence of the Scapegoat Myth as defined by Jack Lule, in the newspaper coverage of Richard Jewell. A textual analysis of 64 newspaper articles found in the Atlanta Journal and Constitution and The New York Times forms the basis of this project. The findings show distinct patterns of the Scapegoat myth in the AJC coverage, and an overall sense of objectivity in the New York Times coverage. INDEX WORDS: Richard Jewell, Centennial Olympic Park Bombing, Summer Olympics, Master Myths, Myth of the Scapegoat, Textual Analysis FROM HERO TO SCAPEGOAT: THE MYTH OF THE SCAPEGOAT IN NEWSPAPER COVERAGE OF RICHARD JEWELL AS BOMBING SUSPECT – A TEXTUAL ANALYSIS by THOMAS J. MYERS B.S., MIAMI UNIVERSITY, 1999 A Thesis Submitted to the Graduate Faculty of The University of Georgia in Partial Fulfillment of the Requirements for the Degree MASTER OF ARTS ATHENS, GEORGIA 2005 © 2005 Thomas J.
    [Show full text]
  • Private Security Companies and the Israeli Occupation Report by Who Profits Research Center January 2016 Cover Photo by Activestills
    Private Security Companies and the Israeli Occupation Report by Who Profits Research Center January 2016 Cover photo by ActiveStills. Private Security Companies and the Israeli Occupation Report by Who Profits Research Center January 2016 Who Profits from the Occupation is a research center dedicated to exposing the commercial involvement of Israeli and international companies in the continued Israeli control over Palestinian and Syrian land. Currently, we focus on three main areas of corporate involvement in the occupation: the settlement industry, economic exploitation and control over population. Who Profits operates an online database which includes information concerning companies that are commercially complicit in the occupation. Moreover, the center publishes in-depth reports and flash reports about industries, projects and specific companies. Who Profits also serves as an information center for queries regarding corporate involvement in the occupation – from individuals and civil society organizations working to end the Israeli occupation and to promote international law, corporate social responsibility, social justice and labor rights. www.whoprofits.org | [email protected] | P.O.B. 1084 | Tel-Aviv 6101001, Israel NOVACT-International Institute for Nonviolent Action promotes international peace-building actions in conflict situations. The Institute has been created through the collective effort of those active in international civil society to contribute to a peaceful, just and dignified world. Understanding nonviolence as
    [Show full text]
  • The Suspect’ Review: Collateral Damage
    DOW JONES, A NEWS CORP COMPANY DJIA 27829.61 0.53% ▼ S&P 500 3367.26 0.39% ▼ Nasdaq 11022.44 0.09% ▲ U.S. 10 Yr -12/32 Yield 0.712% ▼ Crude Oil 42.29 0.89% ▼ Euro 1.1801 0.13% ▲ The Wall Street Journal John Kosner English Edition Print Edition Video Podcasts Latest Headlines Home World U.S. Politics Economy Business Tech Markets Opinion Life & Arts Real Estate WSJ. Magazine Search 15-Year Fixed 2.25% 2.46% APR Refinance Rates the Lowest in History 30-Year Fixed 2.50% 2.71% APR 2.46% 5/1 ARM 2.63% 2.90% APR APR $225,000 (5/1 ARM) $904/mo 2.90% APR Calculate Payment $350,000 (5/1 ARM) $1,409/mo 2.79% APR Terms & Conditions apply. NMLS#1136 BOOKS | BOOKSHELF SHARE FACEBOOK‘The Suspect’ Review: Collateral Damage TWITTERRichard Jewell was the first to spot the deadly bomb at the 1996 Atlanta Olympics—and was rewarded with accusations of being the bomber. EMAIL PERMALINK Richard Jewell, a security guard at the 1996 Summer Olympics in Atlanta. PHOTO: DANA JEWELL By Edward Kosner Nov. 11, 2019 6:46 pm ET SAVE PRINT TEXT 44 The last thing the FBI needs at the moment is a painstaking re-examination of one of the most embarrassing episodes in its long and mostly effective history. But a new book about the bureau’s hunt for the man who planted a bomb at the 1996 Summer Olympics shows the G-men at their bureaucratic worst. The victims were not only the dead and maimed but also a bumbling security guard named Richard Jewell, who was stigmatized for life by the FBI and the media.
    [Show full text]
  • Counterterrorism and GILEE: the Atlanta '96 Olympics to Today What Is the Georgia State University Foundation?
    6 NEWS GEORGIASTATESIGNAL.COM SGA investigative committee meeting. Counterterrorism and However, GILEE’s assistance in security efforts have been productive. They GILEE: the Atlanta ‘96 provided training for the 2008 Beijing and “GILEE’s goal is to the 2016 Rio de Janeiro Games — both of which were free from attack. Ahead of the provide peer-to- Olympics to today 2016 Games, Rio police arrested eight for a peer professional plot to bomb the Rio Games, according to training through the the BBC. BEN COLETTA “Following the September 11 terrorist introduction of best Associate News Editor atrocity, GILEE focuses on enhancing practices in order homeland security efforts through international cooperation and training to enhance agency ILEE was established in 1992 to programs,” the GILEE website states. capabilities to better provide counterterrorism training “GILEE’s goal is to provide peer-to- deal with threats G for police officers in preparation peer professional training through the for the 1996 Atlanta Olympic Games. introduction of best practices in order to to public safety and But students in the past have questioned enhance agency capabilities to better deal improve security.” GILEE’s effectiveness – since there was in with threats to public safety and improve fact a terrorist attack at the Atlanta games. s e c u r it y.” Since its inception, a focus on GILEE is fairly popular in the law GILEE Website counterterrorism and preparedness has enforcement community, according to been emphasized for its American trainees. the list of awards and honors on their In an effort to improve homeland security, website. Director of the Georgia Bureau GILEE works with international partners, of Investigation Vernon Keenan, who exchanging American expertise in areas attended the first GILEE delegation like violent crime, community policing and to Israel, validates this: “The GILEE urban policing.
    [Show full text]
  • Oklahoma Security Guard and Private Investigator Act; Amending 59 O.S
    STATE OF OKLAHOMA 1st Session of the 48th Legislature (2001) SENATE BILL 445 By: Smith AS INTRODUCED An Act relating to the Oklahoma Security Guard and Private Investigator Act; amending 59 O.S. 1991, Section 1750.2, as last amended by Section 4, Chapter 68, O.S.L. 1999 (59 O.S. Supp. 2000, Section 1750.2), which relates to definitions; modifying definition of private investigator; prohibiting certain persons from conducting bail enforcement duties; requiring person arresting principal on bond to have certain qualifications; requiring persons entering this state from another state to perform bail enforcement to have certain qualifications; prohibiting bail bondsman from using unlicensed person to perform certain functions; providing for codification; and providing an effective date. BE IT ENACTED BY THE PEOPLE OF THE STATE OF OKLAHOMA: SECTION 1. AMENDATORY 59 O.S. 1991, Section 1750.2, as last amended by Section 4, Chapter 68, O.S.L. 1999 (59 O.S. Supp. 2000, Section 1750.2), is amended to read as follows: Section 1750.2 As used in the Oklahoma Security Guard and Private Investigator Act, Section 1750.1 et seq. of this title: 1. "Client" means any person or legal entity having a contract with a person or entity licensed pursuant to Section 1750.1 et seq. of this title, which contract authorizes services to be performed in return for financial or other considerations; 2. "Council" means the Council on Law Enforcement Education and Training; 3. "License" means authorization issued by the Council pursuant to this act permitting the holder to perform the functions of a security guard, armed security guard, private investigator, investigative agency, or security agency; Req.
    [Show full text]
  • AN ACT to Amend Tennessee Code Annotated, Title 62, Chapter 35, Part 1, Relative to Private Protective Services. BE IT ENACTED B
    Filed for intro on 02/11/99 HOUSE BILL 721 By West AN ACT to amend Tennessee Code Annotated, Title 62, Chapter 35, Part 1, relative to private protective services. BE IT ENACTED BY THE GENERAL ASSEMBLY OF THE STATE OF TENNESSEE: SECTION 1. Tennessee Code Annotated, Section 62-35-102, is amended by adding the following new subdivisions thereto: ( ) "Bodyguard" means a person who is under contract as unarmed or armed security with an individual, proprietary security organization or contract security company who has the responsibility to protect a person or persons or property; ( ) "Bouncer" means a person who is unarmed or armed that is under contract for an individual, proprietary security organization or contract security company who has the responsibility to protect a person or persons or property; ( ) "Law enforcement officer" means a person who derives plenary or special law enforcement powers (such as power of arrest) from, and is a full-time employee of a federal, state or local government agency as defined by Tennessee peace officers standards and training commission (P.O.S.T.); ( ) "Sworn peace officer" means a person who derives plenary or special law enforcement powers (such as power of arrest) from, and is a full-time employee of a federal, state or local government agency as defined by Tennessee peace officers standards and training commission (P.O.S.T.); HOUSE BILL 721 002088 -1- ( ) "Parking attendant" means a person whose responsibility is to only assist in the direction and parking of vehicles and has no duty or responsibility
    [Show full text]
  • LINKS for Marine Parents and Extended Family Members of MCESG
    Welcome L.I.N.K.S. for Marine Parents and Extended Family Members of MCESG MPER ELIS SE FID Lifestyle, Insights, Networking, tment of r S pa ta e te Knowledge, D a U c n i i r t e e d A m Skills S t a t e s o f “Your LINK to the Corps” MCESG Supplemental Guide Revised 1/2018 L.I.N.K.S. for Parents/Extended Family MCESG Supplemental Handbook - 2 L.I.N.K.S. for Parents/Extended Family Table of Contents I. The Corps The United States Marine Corps - Outlines USMC and Marine Corps Embassy Security Group (MCESG) structure and mission. Provides historical insights and discusses traditions. • Marine Security Guard (MSG) History • MSG Mission Statement • MCESG and Department of State (DOS) Command Relationship • MCESG Command Mission • MCESG Headquarters at Quantico • MCESG Regional Organization • Region and Detachments • MCESG Requirements • MCESG Traits • DOS and MCESG Common Terms and Acronyms • World Time Zones Map II. The Maze The Maze: Benefits and Services - An overview of benefits, privileges, and resources available to USMC families; including the location of these services and how to leverage these assets. Certain services are only available to ID card holders, however, many are available such as:. • American Red Cross • MCESG Points of Contact • DStress Line • Useful Websites III. Pay Day Explain the differences between a civilian and a military paycheck, while introducing the Leave and Earning Statement (LES), including a general discussion on basic pay and allowances. Beneficial financial management tips are also presented. • Pay Chart MCESG Supplemental Handbook - 3 L.I.N.K.S.
    [Show full text]
  • Reinventing the Traditional Guangzhou Teahouse: Caterers
    Reinventing the Traditional Guangzhou Teahouse: Caterers, Customers and Cooks in Post-Socialist Urban South China Jakob Akiba Klein School of Oriental and African Studies University of London Ph.D. Social Anthropology 2004 ProQuest Number: 10673050 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. uest ProQuest 10673050 Published by ProQuest LLC(2017). Copyright of the Dissertation is held by the Author. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code Microform Edition © ProQuest LLC. ProQuest LLC. 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 4 8 1 0 6 - 1346 ABSTRACT This thesis, based on ten months of field research and archival studies in Guangzhou (Canton), centres on an ethnographic portrait of a 120-year old teahouse, a state enterprise which combines the functions of teahouse and restaurant in a single establishment with the help of 180 staff. I approach the teahouse as a complex, shifting social space embedded in wider discourses and historical processes, and use the ethnographic portrait as a basis for exploration into several themes in the anthropology of urban China. The first chapter provides an historical background and deals with the rise, fall and revival of teahouse culture in the changing uses of urban space in the twentieth century.
    [Show full text]