ATTP 3-39.32 (FM 3-19.30) Physical Security

Total Page:16

File Type:pdf, Size:1020Kb

ATTP 3-39.32 (FM 3-19.30) Physical Security ATTP 3-39.32 (FM 3-19.30) Physical Security August 2010 DISTRIBUTION RESTRICTION. Approved for public release; distribution is unlimited. Headquarters, Department of the Army This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil). *ATTP 3-39.32 (FM 3-19.30) Army Tactics, Techniques, and Procedures Headquarters No. 3-39.32 (FM 3-19.30) Department of the Army Washington, DC, 3 August 2010 Physical Security Contents Page PREFACE............................................................................................................... v INTRODUCTION .................................................................................................. vii Chapter 1 PHYSICAL SECURITY CHALLENGES ............................................................ 1-1 Physical Security and the Protection Warfighting Function ................................ 1-1 Forms of Protection ............................................................................................ 1-1 Principles of Protection ....................................................................................... 1-2 Protection Tasks and Systems ........................................................................... 1-3 Physical Security Officer ..................................................................................... 1-6 Chapter 2 PHYSICAL SECURITY PLANNING .................................................................. 2-1 Planning Process ................................................................................................ 2-1 Plan Development .............................................................................................. 2-1 Vulnerability Assessment ................................................................................... 2-2 Security Management System (Countermeasures) ........................................... 2-4 Physical Security Survey .................................................................................... 2-5 Physical Security Inspection ............................................................................... 2-6 Physical Security Systems ................................................................................. 2-7 Tactical-Environment Considerations ................................................................. 2-8 Protection Measures For Contractors ................................................................ 2-8 Chapter 3 SITE DESIGN APPROACH ............................................................................... 3-1 Initial Design Planning Considerations ............................................................... 3-1 Perimeter Security .............................................................................................. 3-2 Internal Security .................................................................................................. 3-7 Distribution Restriction: Approved for public release; distribution is unlimited. *This publication supersedes FM 3-19.30, 8 January 2001. i Contents Chapter 4 PROTECTIVE BARRIERS ................................................................................. 4-1 Barrier Emplacement Considerations ................................................................. 4-1 Vehicle Barriers ................................................................................................... 4-3 Earth-Filled Barriers ............................................................................................ 4-6 Fencing ............................................................................................................... 4-8 Interior Barriers ................................................................................................. 4-11 Inspection and Maintenance of Barriers and Security System Components.... 4-14 Chapter 5 SECURITY LIGHTING ........................................................................................ 5-1 Principles of Security Lighting ............................................................................. 5-1 Planning Considerations ..................................................................................... 5-2 Types of Lighting Units (Luminaires) .................................................................. 5-8 Maintenance ...................................................................................................... 5-13 Power Sources .................................................................................................. 5-13 Closed-Circuit Television and Camera Lighting Considerations ...................... 5-14 Chapter 6 ELECTRONIC SECURITY SYSTEM .................................................................. 6-1 Electronic Security System Characteristics ........................................................ 6-1 Access Control Systems ..................................................................................... 6-2 Intrusion Detection Systems ............................................................................... 6-4 Closed-Circuit Television Systems ................................................................... 6-10 Data-Transmission Media ................................................................................. 6-13 Security Control Center ..................................................................................... 6-14 Chapter 7 ACCESS CONTROL POINTS ............................................................................ 7-1 Policy and Technical Guidance ........................................................................... 7-1 Access Control Point Classifications, Functions, and Zones .............................. 7-2 Inspection Procedures ........................................................................................ 7-5 Chapter 8 KEY CONTROL AND LOCKING SYSTEMS SECURITY .................................. 8-1 Key and Lock Custodian and Alternate Custodian ............................................. 8-1 Key Register Use ................................................................................................ 8-3 Types of Locking Devices ................................................................................... 8-3 Installation and Maintenance of Locks and Keys ................................................ 8-9 Chapter 9 SECURITY FORCES .......................................................................................... 9-1 Authority and Jurisdiction .................................................................................... 9-1 Types of Security Forces .................................................................................... 9-2 Military Working Dogs ......................................................................................... 9-4 Organization and Employment of Security Forces ............................................. 9-5 Security Force Plans and Orders ........................................................................ 9-6 Security Force Training Requirements ............................................................... 9-6 Calculating Personnel Requirements .................................................................. 9-7 Chapter 10 PHYSICAL SECURITY FOR IN-TRANSIT FORCES ...................................... 10-1 Risk Management For Deploying Forces ......................................................... 10-1 Operations Security........................................................................................... 10-4 Unit Movement Roles and Responsibilities ...................................................... 10-5 In-Port Cargo ..................................................................................................... 10-6 Rail Cargo ......................................................................................................... 10-9 Air Movements ................................................................................................ 10-11 ii ATTP 3-39.32 3 August 2010 Contents Chapter 11 RESOURCE MANAGEMENT .......................................................................... 11-1 Generating Requirements ................................................................................ 11-1 Documenting Resource Requirements ............................................................ 11-1 Prioritizing Requirements ................................................................................. 11-5 Funding Sources .............................................................................................. 11-5 Unfunded Requirements Submission ............................................................... 11-6 Security Officer Resource Responsibilities ...................................................... 11-6 Appendix A SAMPLE PHYSICAL SECURITY PLAN ........................................................... A-1 Appendix B SELECTED REACHBACK CAPABILITIES ...................................................... B-1 Appendix C SAMPLE PHYSICAL SECURITY CHECKLIST ................................................ C-1 Appendix D BOMB THREATS ............................................................................................... D-1 Appendix E KEY CONTROL REGISTER AND INVENTORY FORM ................................... E-1 Appendix F SAMPLE KEY CONTROL AND LOCK SECURITY CHECKLIST .................... F-1 GLOSSARY .......................................................................................... Glossary-1 REFERENCES
Recommended publications
  • 68: Protest, Policing, and Urban Space by Hans Nicholas Sagan A
    Specters of '68: Protest, Policing, and Urban Space by Hans Nicholas Sagan A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Architecture in the Graduate Division of the University of California, Berkeley Committee in charge: Professor Galen Cranz, Chair Professer C. Greig Crysler Professor Richard Walker Summer 2015 Sagan Copyright page Sagan Abstract Specters of '68: Protest, Policing, and Urban Space by Hans Nicholas Sagan Doctor of Philosophy in Architecture University of California, Berkeley Professor Galen Cranz, Chair Political protest is an increasingly frequent occurrence in urban public space. During times of protest, the use of urban space transforms according to special regulatory circumstances and dictates. The reorganization of economic relationships under neoliberalism carries with it changes in the regulation of urban space. Environmental design is part of the toolkit of protest control. Existing literature on the interrelation of protest, policing, and urban space can be broken down into four general categories: radical politics, criminological, technocratic, and technical- professional. Each of these bodies of literature problematizes core ideas of crowds, space, and protest differently. This leads to entirely different philosophical and methodological approaches to protests from different parties and agencies. This paper approaches protest, policing, and urban space using a critical-theoretical methodology coupled with person-environment relations methods. This paper examines political protest at American Presidential National Conventions. Using genealogical-historical analysis and discourse analysis, this paper examines two historical protest event-sites to develop baselines for comparison: Chicago 1968 and Dallas 1984. Two contemporary protest event-sites are examined using direct observation and discourse analysis: Denver 2008 and St.
    [Show full text]
  • Unified Facilities Criteria (Ufc) Security Engineering
    UFC 4-022-03 14 June 2007 UNIFIED FACILITIES CRITERIA (UFC) SECURITY ENGINEERING: FENCES, GATES, AND GUARD FACILITIES DISTRIBUTION STATEMENT A; Approved for Public Release; Distribution unlimited UFC 4-022-03 14 June 2007 UNIFIED FACILITIES CRITERIA (UFC) SECURITY ENGINEERING: FENCES, GATES, AND GUARD FACILITIES Any copyrighted material included in this UFC is identified at its point of use. Use of the copyrighted material apart from this UFC must have the permission of the copyright holder. U.S. ARMY CORPS OF ENGINEERS NAVAL FACILITIES ENGINEERING COMMAND (Preparing Activity) AIR FORCE CIVIL ENGINEER SUPPORT AGENCY Record of Changes (changes are indicated by \1\ ... /1/) Change No. Date Location UFC 4-022-03 14 June 2007 FOREWORD The Unified Facilities Criteria (UFC) system is prescribed by MIL-STD 3007 and provides planning, design, construction, sustainment, restoration, and modernization criteria, and applies to the Military Departments, the Defense Agencies, and the DoD Field Activities in accordance with USD(AT&L) Memorandum dated 29 May 2002. UFC will be used for all DoD projects and work for other customers where appropriate. UFC are living documents and will be periodically reviewed, updated, and made available to users as part of the Services’ responsibility for providing technical criteria for military construction. Headquarters, U.S. Army Corps of Engineers (HQUSACE), Naval Facilities Engineering Command (NAVFAC), and Air Force Civil Engineer Support Agency (AFCESA) are responsible for administration of the UFC system. Defense agencies should contact the preparing service for document interpretation and improvements. Technical content of UFC is the responsibility of the cognizant DoD working group. Recommended changes with supporting rationale should be sent to the respective service proponent office by the following electronic form: Criteria Change Request (CCR).
    [Show full text]
  • Construction Guidelines for Wildlife Fencing and Associated Escape and Lateral Access Control Measures
    CONSTRUCTION GUIDELINES FOR WILDLIFE FENCING AND ASSOCIATED ESCAPE AND LATERAL ACCESS CONTROL MEASURES Requested by: American Association of State Highway and Transportation Officials (AASHTO) Standing Committee on the Environment Prepared by: Marcel P. Huijser, Angela V. Kociolek, Tiffany D.H. Allen, Patrick McGowen Western Transportation Institute – Montana State University PO Box 174250 Bozeman, MT 59717-4250 Patricia C. Cramer 264 E 100 North, Logan, Utah 84321 Marie Venner Lakewood, CO 80232 April 2015 The information contained in this report was prepared as part of NCHRP Project 25-25, Task 84, National Cooperative Highway Research Program, Transportation Research Board. SPECIAL NOTE: This report IS NOT an official publication of the National Cooperative Highway Research Program, Transportation Research Board, National Research Council, or The National Academies. Wildlife Fencing and Associated Measures Disclaimer DISCLAIMER DISCLAIMER STATEMENT The opinions and conclusions expressed or implied are those of the research agency that performed the research and are not necessarily those of the Transportation Research Board or its sponsors. The information contained in this document was taken directly from the submission of the author(s). This document is not a report of the Transportation Research Board or of the National Research Council. ACKNOWLEDGEMENTS This study was requested by the American Association of State Highway and Transportation Officials (AASHTO), and conducted as part of the National Cooperative Highway Research Program (NCHRP) Project 25-25 Task 84. The NCHRP is supported by annual voluntary contributions from the state Departments of Transportation. Project 25-25 is intended to fund quick response studies on behalf of the AASHTO Standing Committee on the Environment.
    [Show full text]
  • Designing Physical Security Monitoring for Water Quality Surveillance and Response Systems
    United States Environmental Protection Agency Designing Physical Security Monitoring For Water Quality Surveillance and Response Systems Office of Water (AWBERC, MS 140) EPA 817-B-17-001 September 2017 Disclaimer The Water Security Division of the Office of Ground Water and Drinking Water has reviewed and approved this document for publication. This document does not impose legally binding requirements on any party. The information in this document is intended solely to recommend or suggest and does not imply any requirements. Neither the U.S. Government nor any of its employees, contractors or their employees make any warranty, expressed or implied, or assumes any legal liability or responsibility for any third party’s use of any information, product or process discussed in this document, or represents that its use by such party would not infringe on privately owned rights. Mention of trade names or commercial products does not constitute endorsement or recommendation for use. Version History: The 2019 version is the second release of the document, originally published in September 2017. This release includes updated component names (Enhanced Security Monitoring was changed to Physical Security Monitoring and Consequence Management was changed to Water Contamination Response), an updated version of Figure 1.1 that reflects the component name changes and includes the Advanced Metering Infrastructure component, an updated Glossary, updated target capabilities, and updated links to external resources. “Enhanced” was replaced with “Physical” in this document to avoid any implication of a baseline standard, and better describe the type of security. Questions concerning this document should be addressed to [email protected] or the following contacts: Nelson Mix U.S.
    [Show full text]
  • Cast-In-Place Concrete Barriers
    rev. May 14, 2018 Cast-In-Place Concrete Barriers April 23, 2013 NOTE: Reinforcing steel in each of these barrier may vary and have been omitted from the drawings for clarity, only the Ontario Tall Wall was successfully crash tested as a unreinforced section. TEST LEVEL NAME/MANUFACTURER ILLUSTRATION PROFILE GEOMETRIC DIMENSIONS CHARACTERISTICS AASHTO NCHRP 350 MASH New Jersey Safety-Shape Barrier TL-3 TL-3 32" Tall 32" Tall The New Jersey Barrier was the most widely used safety shape concrete barrier prior to the introduction of the F-shape. As shown, the "break-point" between the 55 deg and 84 deg slope is 13 inches above the pavement, including the 3 inch vertical reveal. The flatter lower slope is intended to lift the vehicle which TL-4 TL-4 http://tf13.org/Guides/hardwareGuide/index.php?a absorbs some energy, and allows vehicles impacting at shallow angles to be 32" Tall 36" Tall X ction=view&hardware=111 redirected with little sheet metal damage; however, it can cause significant instability to vehicles impacting at high speeds and angles. Elligibility Letter TL-5 TL-5 B-64 - Feb 14, 2000 (NCHRP 350) 42" Tall 42" Tall NCHRP Project 22-14(03)(MASH TL3) NCHRP 20-07(395) (MASH TL4 & TL5) F-shape Barrier TL-3 TL-3 The F-shape has the same basic geometry as the New Jersey barrier, but the http://tf13.org/Guides/hardwareGuide/index.php?a 32" Tall 32" Tall "break-point" between the lower and upper slopes is 10 inches above the ction=view&hardware=109 pavement.
    [Show full text]
  • Structural Design Guidelines
    Engineering Department Structural Design Guidelines Last Updated: 04/01/2017 Reviewed/Released 2018 v1.1 Engineering Department Manual Structural - TOC TABLE OF CONTENTS 1.0 OVERVIEW ............................................................................................ 1 2.0 TECHNICAL AND CODE STANDARDS/REGULATIONS .................................. 2 2.1 AVAILABLE STRUCTURAL TECHNICAL CODES AND STANDARDS ............................................... 2 2.1.1 BUILDINGS (1) ........................................................................................................... 2 2.1.2 BRIDGES (2) .............................................................................................................. 2 2.1.3 FEMA (SEISMIC) (3) .................................................................................................. 2 2.1.4 HELIPORT (4) ............................................................................................................ 2 2.1.5 PORTS (5) ................................................................................................................. 2 2.1.6 RAIL (6) .................................................................................................................... 2 2.2 AMERICAN SOCIETY FOR TESTING MATERIALS (ASTM) (7) ........................................................ 2 2.3 FACTORY MUTUAL INSURANCE COMPANY (FMRC) (8) .............................................................. 2 2.4 AMERICAN CONCRETE INSTITUTE (ACI) (9) ..............................................................................
    [Show full text]
  • POETRY OFFERINGS from David W. Mitchell
    1 POETRY OFFERINGS from David W. Mitchell 2 Photography of David Mitchell by Ken Roberts Cover photography by Jeremiah Trilli Line drawing by Summer Breeze Published by Motherbird Books Silver City, New Mexico motherbird.com © David W. Mitchell 2008 3 Index A Dark Hole In Time . 8 A Gift . 9 A Lovely Day for Borscht Fish . 10 A Modern Carollette for Dodgson . 11 Abroad Among the Limbless . 12 Adagio in Zzzzz Minor . 13 Afternoon of a Biblioparadisiac . 14 Ah Dylan, Dylan . 15 An Olympian Lesson . 16 Apostatic Succession . 17 Ballad of Saint Louis, the Unfrocked Cardinal 18 Belle Ardoise I, The . 20 Blatissimus . 21 Blue Writer, The . 22 Carmel I . 23 Carmel II . 25 Chelsea . 27 Compass Rose and the Gypsy Will . 28 Compendium Humanum . 29 Concertina in F-Stop Major . 31 Critique . 32 Cursive Reclaimed . 33 Cutting Corners I; Cutting Corners II . 34 Departure of Roses, The . 35 Diasporulation . 36 Disappearance . 37 Drizzle . 38 Doubling Duplicity . 39 Eleven Red-Haired Men . 40 Encampment, The . 41 Epitaph for Floyd . 42 Fangs . 43 Father Time Contemplates Mass . 44 4 Fingersongs- I . 45 For Edna, and John, and All . 46 For Jessica and the Williams . 47 For Mimi Farina: Bread and Roses . 51 From A to Z and Back Again . 52 Goulashification . 53 Heard On the Concertina Wire . 54 Helicocochoidal Figmentation. 55 Hexing the Circle . 56 Hillock and the Holly, The . 57 How I knew What to Do . 59 In Praise of Thumbs . 60 In Praise of Thumbs II . 61 In the Mailstrom . 63 In Sacramental Jeans . 64 Infinite Regress of Dawn, The .
    [Show full text]
  • Standards for Building Materials, Equipment and Systems Used in Detention and Correctional Facilities
    NATIONAL INSTITUTE OF STANDARDS & TECHNOLOGY Research Information Center Gaithersburg, MD 20890 PUBLICATIONS NBSIR 87-3687 Standards for Building Materials, Equipment and Systems Used in Detention and Correctional Facilities Robert D. Dikkers Belinda C. Reeder U.S. DEPARTMENT OF COMMERCE National Bureau of Standards National Engineering Laboratory Center for Building Technology Building Environment Division Gaithersburg, MD 20899 November 1987 Prepared for: -QC ment of Justice 100 ititute of Corrections i, DC 20534 . U56 87-3687 1987 C . 2 Research Information Center National Bureau of Standards Gaithersburg, Maryland NBSIR 87-3687 20899 STANDARDS FOR BUILDING MATERIALS, EQUIPMENT AND SYSTEMS USED IN u - DETENTION AND CORRECTIONAL FACILITIES Robert D. Dikkers Belinda C. Reeder U.S. DEPARTMENT OF COMMERCE National Bureau of Standards National Engineering Laboratory Center for Building Technology Building Environment Division Gaithersburg, MD 20899 November 1987 Prepared for: U.S. Department of Justice National Institute of Corrections Washington, DC 20534 U.S. DEPARTMENT OF COMMERCE, C. William Verity, Secretary NATIONAL BUREAU OF STANDARDS, Ernest Ambler, Director TABLE OF CONTENTS Page Preface . vi Acknowledgements vii Executive Summary ix I . INTRODUCTION 1 A. Background , 1 B. Objectives and Scope of NBS Study 3 II. FACILITY DESIGN AND CONSTRUCTION 6 A. Facility Development Process 6 1 . Needs Assessment ........................................ 6 2 . Master Plan 6 3 . Mission Statement . 6 4. Architectural Program 7 5. Schematic Design and Design Development 7 6 . Construction 9 B. Security Levels 10 C . ACA S tandar ds 13 . III MATERIALS , EQUIPMENT AND SYSTEMS .... 14 A. Introduction 14 B. Performance Problems 15 C. Available Standards/Guide Specifications 20 iii TABLE OF CONTENTS (continued) 5 Page D« Perimeter Systems 21 1 .
    [Show full text]
  • Physical Access Control Systems (PACS) Customer Ordering Guide
    Physical Access Control Systems (PACS) Customer Ordering Guide Revised January 2017 1 Physical Access Control Systems (PACS) Customer Ordering Guide Table of Contents Purpose ...................................................................................................................3 Background .............................................................................................................3 Recent Policy Announcements ...............................................................................4 What is PACS? .......................................................................................................5 As an end-user agency, where do I start and what steps are involved? ................. 7 Where do I purchase PACS Solutions from GSA? ..............................................10 How do I purchase a PACS Solution using GSA eBuy? .....................................11 Frequently Asked Questions (FAQs) ...................................................................12 GSA Points of Contact for PACS .........................................................................15 Reference Documents ...........................................................................................16 Sample Statement of Work (SOW) ......................................................................18 2 Physical Access Control Systems (PACS) Customer Ordering Guide Purpose The purpose of this document is to create a comprehensive ordering guide that assists ordering agencies, particularly contracting officers, to
    [Show full text]
  • Georgia Department of Transportation
    Updated 10-23-19 Georgia Department of Transportation Page 1 NPE Status Report --- Listed Alphabetically by Company Name NPE# Manufacturer Product Name / Description Estimated Time Contact Info Fee Status / Progress for Lab/Field Paid Report Evaluation 1107-3 3M Company "3M Scotch-Weld HoldFast 70" -- Complete -- Accepted 7910-1 3M Company 3M Brand Galvinizing -- Complete -- No Status 8002-1 3M Company / Traffic Control Devices Dept. Loop Sealant -- Complete -- No Status 0704-3 A.W.Cook Cement Products, Inc. "Cook Brand Rapid Cure Repair" - Rapid setting -- Complete -- Withdrawn/No Action cement/sand grout. 9512-5 ABT, Inc. PolyDrain (Surface Drainage System) -- Complete -- No Application 7809-1 Acme Highway Products Corp. Fiberglass Dowel Bars -- Complete -- No Status 7707-1 Acme Highway Products Corp. Acmaseal -- Complete -- No Status 0307-4 ACO Polymer Products, Inc. "FG200 Fiberglass" 8" internal, Heavy duty -- Complete -- No Application fiberglass trench drain. 0307-3 ACO Polymer Products, Inc. "K100S Trench Drain" 4" Internal, Polymer -- Complete -- No Application Concrete Trench. 0307-2 ACO Polymer Products, Inc. "S300K Powerdrain" 12" internal, Polymer -- Complete -- No Application Concrete Trench. 0307-1 ACO Polymer Products, Inc. "S100K Powerdrain" 4" internal, Polymer -- Complete -- Accepted Concrete Trench. 1302-1 Active Minerals International, LLC "ACTI-GEL 208" Nov-13 Complete No application 9601-1 ADDCO Manufacturing The Signal DTS-2000 (Construction work zone -- Complete -- No Application sign) 9510-1 ADS N-12 (Smooth Lined
    [Show full text]
  • HIPAA Security Standards: Physical Safeguards
    Security SERIES HIPAA Security 3 Security Standards: Physical Safeguards Topics What is the Security Series? 1. The security series of papers will provide guidance from the Centers for Security 101 for Medicare & Medicaid Services (CMS) on the rule titled “Security Standards Covered Entities for the Protection of Electronic Protected Health Information,” found at 45 CFR Part 160 and Part 164, Subparts A and C. This rule, commonly known 2. as the Security Rule, was adopted to implement provisions of the Health Security Standards Insurance Portability and Accountability Act of 1996 (HIPAA). The series - Administrative will contain seven papers, each focused on a specific topic related to the Safeguards Security Rule. The papers, which cover the topics listed to the left, are designed to give HIPAA covered entities 3. insight into the Security Rule, and Compliance Deadlines assistance with implementation of the No later than April 20, 2005 Security for all covered entities except Standards security standards. This series aims to small health plans which have - Physical explain specific requirements, the thought Safeguards until no later than April 20, process behind those requirements, and 2006. 4. possible ways to address the provisions. Security Standards - Technical CMS recommends that covered entities read the first paper in this series, Safeguards “Security 101 for Covered Entities” before reading the other papers. The first paper clarifies important Security Rule concepts that will help covered entities as they plan for implementation. This third paper in the series is 5. devoted to the standards for Physical Safeguards and their implementation Security Standards - Organizational, specifications and assumes the reader has a basic understanding of the Policies and Security Rule.
    [Show full text]
  • How to Manage Physical Security Risk
    How to Manage Physical Security Risk Table of Contents Introduction ........................................................................................................................................................3 What Is Physical Security Exactly? ...........................................................................................................4 Components of Physical Security ..............................................................................................................5 The Importance Of Physical Security ......................................................................................................5 How Physical Security Helps To Ensure Digital Safety ...................................................................7 The Most Common Physical Security Threats ....................................................................................9 How To Mitigate Physical Security Threats ...................................................................................... 10 Top Tips To Maintain Physical Security At Your Workplace .................................................... 12 Final Words....................................................................................................................................................... 14 Introduction Digital security has become the watchword of the day. As we step into the new decade, the world is visibly dependent on IT infrastructure for carrying out everyday business operations. Be it monetary transactions or information exchange,
    [Show full text]