ATTP 3-39.32 (FM 3-19.30) Physical Security

ATTP 3-39.32 (FM 3-19.30) Physical Security

ATTP 3-39.32 (FM 3-19.30) Physical Security August 2010 DISTRIBUTION RESTRICTION. Approved for public release; distribution is unlimited. Headquarters, Department of the Army This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil). *ATTP 3-39.32 (FM 3-19.30) Army Tactics, Techniques, and Procedures Headquarters No. 3-39.32 (FM 3-19.30) Department of the Army Washington, DC, 3 August 2010 Physical Security Contents Page PREFACE............................................................................................................... v INTRODUCTION .................................................................................................. vii Chapter 1 PHYSICAL SECURITY CHALLENGES ............................................................ 1-1 Physical Security and the Protection Warfighting Function ................................ 1-1 Forms of Protection ............................................................................................ 1-1 Principles of Protection ....................................................................................... 1-2 Protection Tasks and Systems ........................................................................... 1-3 Physical Security Officer ..................................................................................... 1-6 Chapter 2 PHYSICAL SECURITY PLANNING .................................................................. 2-1 Planning Process ................................................................................................ 2-1 Plan Development .............................................................................................. 2-1 Vulnerability Assessment ................................................................................... 2-2 Security Management System (Countermeasures) ........................................... 2-4 Physical Security Survey .................................................................................... 2-5 Physical Security Inspection ............................................................................... 2-6 Physical Security Systems ................................................................................. 2-7 Tactical-Environment Considerations ................................................................. 2-8 Protection Measures For Contractors ................................................................ 2-8 Chapter 3 SITE DESIGN APPROACH ............................................................................... 3-1 Initial Design Planning Considerations ............................................................... 3-1 Perimeter Security .............................................................................................. 3-2 Internal Security .................................................................................................. 3-7 Distribution Restriction: Approved for public release; distribution is unlimited. *This publication supersedes FM 3-19.30, 8 January 2001. i Contents Chapter 4 PROTECTIVE BARRIERS ................................................................................. 4-1 Barrier Emplacement Considerations ................................................................. 4-1 Vehicle Barriers ................................................................................................... 4-3 Earth-Filled Barriers ............................................................................................ 4-6 Fencing ............................................................................................................... 4-8 Interior Barriers ................................................................................................. 4-11 Inspection and Maintenance of Barriers and Security System Components.... 4-14 Chapter 5 SECURITY LIGHTING ........................................................................................ 5-1 Principles of Security Lighting ............................................................................. 5-1 Planning Considerations ..................................................................................... 5-2 Types of Lighting Units (Luminaires) .................................................................. 5-8 Maintenance ...................................................................................................... 5-13 Power Sources .................................................................................................. 5-13 Closed-Circuit Television and Camera Lighting Considerations ...................... 5-14 Chapter 6 ELECTRONIC SECURITY SYSTEM .................................................................. 6-1 Electronic Security System Characteristics ........................................................ 6-1 Access Control Systems ..................................................................................... 6-2 Intrusion Detection Systems ............................................................................... 6-4 Closed-Circuit Television Systems ................................................................... 6-10 Data-Transmission Media ................................................................................. 6-13 Security Control Center ..................................................................................... 6-14 Chapter 7 ACCESS CONTROL POINTS ............................................................................ 7-1 Policy and Technical Guidance ........................................................................... 7-1 Access Control Point Classifications, Functions, and Zones .............................. 7-2 Inspection Procedures ........................................................................................ 7-5 Chapter 8 KEY CONTROL AND LOCKING SYSTEMS SECURITY .................................. 8-1 Key and Lock Custodian and Alternate Custodian ............................................. 8-1 Key Register Use ................................................................................................ 8-3 Types of Locking Devices ................................................................................... 8-3 Installation and Maintenance of Locks and Keys ................................................ 8-9 Chapter 9 SECURITY FORCES .......................................................................................... 9-1 Authority and Jurisdiction .................................................................................... 9-1 Types of Security Forces .................................................................................... 9-2 Military Working Dogs ......................................................................................... 9-4 Organization and Employment of Security Forces ............................................. 9-5 Security Force Plans and Orders ........................................................................ 9-6 Security Force Training Requirements ............................................................... 9-6 Calculating Personnel Requirements .................................................................. 9-7 Chapter 10 PHYSICAL SECURITY FOR IN-TRANSIT FORCES ...................................... 10-1 Risk Management For Deploying Forces ......................................................... 10-1 Operations Security........................................................................................... 10-4 Unit Movement Roles and Responsibilities ...................................................... 10-5 In-Port Cargo ..................................................................................................... 10-6 Rail Cargo ......................................................................................................... 10-9 Air Movements ................................................................................................ 10-11 ii ATTP 3-39.32 3 August 2010 Contents Chapter 11 RESOURCE MANAGEMENT .......................................................................... 11-1 Generating Requirements ................................................................................ 11-1 Documenting Resource Requirements ............................................................ 11-1 Prioritizing Requirements ................................................................................. 11-5 Funding Sources .............................................................................................. 11-5 Unfunded Requirements Submission ............................................................... 11-6 Security Officer Resource Responsibilities ...................................................... 11-6 Appendix A SAMPLE PHYSICAL SECURITY PLAN ........................................................... A-1 Appendix B SELECTED REACHBACK CAPABILITIES ...................................................... B-1 Appendix C SAMPLE PHYSICAL SECURITY CHECKLIST ................................................ C-1 Appendix D BOMB THREATS ............................................................................................... D-1 Appendix E KEY CONTROL REGISTER AND INVENTORY FORM ................................... E-1 Appendix F SAMPLE KEY CONTROL AND LOCK SECURITY CHECKLIST .................... F-1 GLOSSARY .......................................................................................... Glossary-1 REFERENCES

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    162 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us