PHYSICAL SECURITY PROGRAM. April 9, Incorporating Change 1, May 27, 2009 UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE (USD(I))
|
|
|
- Emerald McDaniel
- 10 years ago
- Views:
Transcription
1 DoD R PHYSICAL SECURITY PROGRAM April 9, 2007 Incorporating Change 1, May 27, 2009 UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE (USD(I))
2 FOREWORD This Regulation is issued under the authority of DoD Instruction , Security of DoD Installations and Resources, December 10, It implements the policies and minimum standards for the physical security of DoD installations and resources. DoD R, Physical Security Program, May 1991, is hereby canceled. This Regulation applies to the Office of the Secretary of Defense, the Military Departments, the Chairman of the Joint Chiefs of Staff, the Combatant Commands, the Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field Activities, and all other organizational entities in the Department of Defense (hereafter referred to collectively as the DoD Components ). This Regulation is effective immediately and is mandatory for the DoD Components. Send recommended changes to this Regulation to the following address: Director of Security Deputy Under Secretary of Defense (CI&S) Office of the Under Secretary of Defense for Intelligence Room 3A666, Pentagon 5000 Defense Pentagon Washington, D.C The DoD Components, other Federal agencies, and the public may download this Regulation from the Washington Headquarters Services Directives web page at Approved for public release; distribution unlimited. Robert Andrews Acting Under Secretary of Defense for Intelligence
3 TABLE OF CONTENTS Foreword Table of Contents... 3 References... 5 Definitions... 7 CHAPTER 1. - GENERAL INFORMATION...10 C1.1. Purpose...10 C1.2. Applicability and Scope...10 C1.3. Objectives...11 CHAPTER 2. - POLICY OBJECTIVES...12 C2.1. Physical Security Program...12 C2.2. Responsibilities...13 C2.3. Security System Performance Goal...14 C2.4. Physical Security/Antiterrorism Integration...15 C2.5. Physical Security Planning, System Acquisition, Construction and Leasing Standards...15 CHAPTER 3. - INSTALLATION ACCESS AND EMERGENCY PLANNING 16 C3.1. General...16 C3.2. Procedures...16 C3.3. Installation Access...17 C3.4. Emergency Planning...18 CHAPTER 4. - SECURITY OF WEAPON SYSTEMS AND PLATFORMS...20 C4.1. General...20 C4.2. Procedures...20 CHAPTER 5. - PROTECTION OF BULK PETROLEUM PRODUCTS...21 C5.1. General...21 C5.2. Procedures...21 C5.3. Security Planning and Liaison
4 CHAPTER 6. - SECURITY OF COMMUNICATIONS SYSTEMS...22 C6.1. General...22 C6.2. Procedures...22 C6.3. Responsibilities...23 C6.4. Mobile Communications Systems...23 CHAPTER 7. - SECURITY OF CONTROLLED INVENTORY ITEMS...25 C7.1. General...25 C7.2. Procedures...25 C7.3. Responsibilities...25 C7.4. Controlled Items Security
5 REFERENCES (a) Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms, as amended (b) DoD Instruction , "Security of DoD Installations and Resources," December 10, 2005 (c) DoD R, "DoD Information Security Program," January 1997 (d) Director, Central Intelligence Directive 6/9, "Physical Security Standards for Sensitive Compartmented Information Facilities (SCIFs)," November 18, 2002 (e) DoD Directive O , "Security Policy for Protecting Nuclear Weapons," (f) November 1, 2004 DoD Instruction , "Minimum Security Standards for Safeguarding Chemical Agents," March 12, 2007 (g) DoD Directive , "Security of Nuclear Reactors and Special Nuclear Materials," April 6, 1990 (h) DoD Manual M, "Physical Security of Sensitive Conventional Arms, Ammunition and Explosives," August 12, 2000 (i) DoD Directive , "Special Access Program (SAP) Policy," January 5, 2006 (j) DoD Instruction , Security of DoD Personnel at U.S. Missions Abroad, October 15, 1996 (k) Chapter 169, Section 2859, Title 10, United States Code (l) DoD Directive , "Physical Security Equipment (PSE): Assignment of Responsibility for Research, Development, Testing, Evaluation, Production, Procurement, Deployment and Support," February 17, 1989 (m) DoD Instruction , DoD Antiterrorism (AT) Standards, October 02, 2006 (n) DoD Directive , "DoD Anti-Terrorism (AT) Program," August 18, 2003 (o) UFC , Unified Facilities Criteria, DoD Minimum Antiterrorism Standards for Buildings, October 8, 2003 (p) Under Secretary of Defense, Acquisition, Technology and Logistics Memorandum, Department of Defense Unified Facilities Criteria, dated May 29, 2002 (q) Military Standard-3007F, "Standard Practice for Unified Facilities Criteria and Unified Facilities Guide Specification, December 13, 2006 (r) (s) (t) Federal Information Processing Standards (FIPS) 201-1, Personal Identity Verification (PIV) of Federal Employees and Contractors, March 01, 2006 Homeland Security Presidential Directive-12 (HSPD-12), Policy for a Common Identification Standard for Federal Employees and Contractors, August 27, 2004 DoD Directive , DoD Personnel Identity Protection (PIP) Program, July 19, 2004 (u) DoD R-Part II, Defense Transportation Regulation, November 2004 (v) DoD Directive , Defense Critical Infrastructure Program (DCIP), August 19, 2005 (w) Title 21, Code of Federal Regulation, Parts through (x) Public Law , "Comprehensive Drug Abuse Prevention and Control Act of 1970" (y) Military Standard A, "DoD Requirement for a Logistic Support Analysis Record," March 17,
6 (z) DoD Regulation R-1, "Storage and Materials Handling," September 15, 1979 (aa) DLA Joint Regulation , "Safeguarding of DLA Sensitive Inventory Items, Controlled Substances, and Pilferable Items of Supply," February 1,
7 DL1. DEFINITIONS For the purposes of this Regulation, terms are defined below and in Joint Publication 1-02 (Reference (a)). DL1.1. Antiterrorism. See Reference (a). DL1.2. Capability. Facilitating method to implement a course of action. (A capability may or may not be accompanied by an intention). DL1.3. Controlled Area. A controlled space extending upward and outward from a specified point. This area is typically designated by a commander or director, wherein sensitive information or operations occur and requires limitations of access. DL1.4. Critical Communications Facility. A communications facility that is essential to the continuity of operations of the President or Secretary of Defense during national emergencies, and other nodal points or elements designated as crucial to mission accomplishment. DL1.5. Counterintelligence. See Reference (a). DL1.6. Electronic Security Systems (ESS). That part of physical security concerned with the safeguarding of personnel and property by use of electronic systems. These systems include, but are not limited to, intrusion detection systems (IDS), automated entry control systems (AECS), and video assessment systems. DL1.7. Installations. Real DoD properties including bases, stations, forts (including National Guard and Federal Reserve Centers), depots, arsenals, plants (both contractor and Government operated), hospitals, terminals, and other special mission facilities, as well as those used primarily for military purposes. DL1.8. National Defense Area (NDA). See Reference (a). DL1.9. Personnel Identity Management and Protection. A business process that validates, authenticates and secures an individual s identity. The process includes: identity vetting; a binding of the identity to an identity protection and management system through the issuance of a DoD credential; the linkage of the Personal Identity Verification (PIV) credential to the individual through the use of uniquely identifying characteristics and a personal identification number; and digital authentication of the identification credential linkage to the individual. DL1.10. Physical Security. See Reference (a) DL1.11. Resources. Personnel and/or materials provided as a means of support (does not refer to monetary source for purposes of this guidance). 7
8 DL1.12. Restricted Area. An area (land, sea or air) in which there are special restrictive measures employed to prevent or minimize incursions and/or interference, where special security measures are employed to prevent unauthorized entry. Restricted areas may be of different types depending on the nature and varying degree of importance of the security interest, or other matter contained therein. Restricted areas must be authorized by the installation/activity commander/director, properly posted, and shall employ physical security measures. Additionally, Controlled Areas may be established adjacent to Restricted Areas for verification and authentication of personnel. DL1.13. Risk. A measure of consequence of peril, hazard or loss, which is incurred from a capable aggressor or the environment (the presence of a threat and unmitigated vulnerability). DL1.14. Risk Assessment. A defined process used to fuse the procedures of analyzing threat, risks, and vulnerabilities, into a cohesive, actionable product. DL1.15. Risk Management. Process and resultant risk of systematically identifying, assessing and controlling risks. Commanders/Directors are required to identify critical assets and their subsequent protection requirements, including future expenditures required for the protection requirements. DL1.16. Survivability. The ability to withstand or repel attack, or other hostile action, to the extent that essential functions can continue or be resumed after onset of hostile action. DL1.17. Security-in-Depth. A determination by the senior agency official that a facility s security program consists of layered and complimentary security controls sufficient to deter, detect, and document unauthorized entry and movement within the facility. Examples include the use of perimeter fences, employee and visitor access controls, use of an intrusion detection system, random guard patrols throughout the facility during non-working and working hours, and closed circuit video monitoring or other safeguards that mitigate the vulnerability of unalarmed storage areas and security storage cabinets during non-working hours. DL1.18. Threat. The perceived imminence of intended aggression by a capable entity to harm a nation, a government or its instrumentalities, such as intelligence, programs, operations, people, installations, or facilities. DL1.19. Threat Analysis. The continual process of compiling and examining all available information concerning the capability, activity, and intention of potential aggressors, which supports the deployment and degree of countermeasure requirements to address the perceived threat. DL1.20. Threat Assessment. A resultant product of the defined process used to conduct a threat analysis and develop an evaluation of a potential threat. Also, it is the product of a threat analysis for a particular unit, installation, or activity. DL Vulnerability. A situation or circumstance, which left unchanged, may result in the degradation, loss of life, or damage to mission-essential resources. 8
9 DL1.22. Vulnerability Assessment. The comprehensive evaluation of an installation, facility, or activity to determine preparedness to deter, withstand, and /or recover from the full range of adversarial capabilities based on the threat assessment, compliance with protection standards, and risk management. 9
10 C1. CHAPTER 1 GENERAL INFORMATION C1.1. PURPOSE In accordance with the requirements of DoD Instruction , (Reference (b)), this Regulation implements DoD policies and minimum standards for the physical protection of DoD personnel, installations, operations, and related resources. C1.2. APPLICABILITY AND SCOPE C This Regulation addresses the physical security of personnel, installations, facilities, operations, and related resources of DoD Components. In overseas areas, Combatant Commanders (COCOMs) may deviate from the policies in this Regulation where local conditions, treaties, agreements, and other arrangements with foreign governments and allied forces require. C This Regulation provides minimum standards for the protection of resources normally found on installations and unique resources on the installation. Separate guidance shall be referred to for: C Classified Information; DoD R, (Reference (c)). C Sensitive Compartmented Information Facilities; DCID 6/9, (Reference (d)). C Security Policy for Protecting Nuclear Weapons; DoD Directive , (Reference (e)). C Security of DoD Chemical Agents; DoD Instruction , (Reference (f)). C Nuclear Reactors and Materials; DoD Directive , (Reference (g)). C Physical Security Arms, Ammunition and Explosives; DoD Manual M, (Reference (h)). C Special Access Program; DoD Directive , (Reference (i)). C Security of DoD Personnel assigned to U.S. Missions Abroad; DoD Instruction , (Reference (j)). C During transition to war and following commencement of hostilities, COCOMs may prescribe procedures that modify specific provisions of this Regulation as local threat and risk conditions require. However, security operations and procedures must ensure the effective protection of Government assets. Under these conditions, COCOMs may delegate that authority to unit or installation commanders. 10 CHAPTER 1
11 C Nothing in this Regulation abrogates the authority or responsibility of commanders to apply more stringent security standards required by other DoD Issuances during emergencies, increased threat level or high risk determinations, or as the commander/director deems necessary. C1.3. OBJECTIVES The objectives of this Regulation are to: C Implement general policy for the security of personnel, installations, military operations, and certain additional assets. C Provide security guidance and general procedures that are realistic, harmonized with other security disciplines, and provide the necessary flexibility for commanders to protect personnel, installations, projects, operations, and related resources against capable threats from terrorists, criminal activity, and other subversive or illegal activity. C Reduce the loss, theft, diversion of, or damage to DoD assets through the use of advanced technologies; thereby enhancing overall security, while ensuring that warfighting capability is maintained. C Standardize personal identification and authentication to DoD installations and facilities, including interoperability with other Federal entities, utilizing the DoD PIV credential (Common Access Card (CAC)) as the universal authority of individual authenticity, consistent with applicable law. The DoD PIV credential will provide the HSPD-12 mandated level of identity assurance and government-wide recognition. 11 CHAPTER 1
12 C2. CHAPTER 2 POLICY OBJECTIVES C2.1. PHYSICAL SECURITY PROGRAM C The physical security program is that part of security concerned with active and passive measures designed to prevent unauthorized access to personnel, equipment, installations, information, and to safeguard them against espionage, sabotage, terrorism, damage, and criminal activity. Physical security is a primary command responsibility. C Physical security programs are designed for prevention and provide the means to counter threats when preventive measures are ignored or bypassed. Physical security threats include, but are not limited to: C Foreign intelligence services. C Foreign military and paramilitary forces. C Terrorists and saboteurs. C Criminals. C Protest groups. C Disaffected persons. C Physical security planning includes: C Using biometric, electronic and/or mechanical technological security systems to mitigate both vulnerability to the threat and reduce reliance on fixed security forces. C Implementing physical security programs to form the basis of integrated defense plans, which builds physical security into contingency, mobilization, antiterrorism, and wartime plans, and tests of physical security procedures and measures during the exercise of these plans. C Coordinating physical security with operations security, law enforcement, information security, personnel security, communications security, automated information security, counterintelligence and antiterrorism programs to provide an integrated and coherent effort. This effort consists of understanding the threat, reviewing the vulnerabilities, and identifying priorities. Risks can therefore be managed as to their criticality to the mission and physical security program requirements confidently submitted to the Plans, Programming, Budgeting, and Execution System (PPBES) process. 12 CHAPTER 2
13 C Training security forces and owner or user personnel at facilities or sites in defense against, and response to, unauthorized penetrations. C Creating and sustaining physical security awareness training for all personnel. C Physical security employs physical protective and security procedural measures in combination with active or passive systems, technologies, devices, and security personnel used to protect assets from possible threats. These measures include: C Security forces and owner or user personnel. C Military working dogs. C Physical barriers, facility hardening, and active delay or denial systems. C Secure locking systems, containers, and vaults. C Electronic security systems (e.g., IDS, radio frequency detectors, electronic emissions detectors). C Assessment or surveillance systems (e.g., closed-circuit television, thermal imagers, millimeter wave, radar). C Protective lighting (e.g., visible, IR). C Credential technologies, access control devices, biometrics, materiel or asset tagging systems, and contraband detection equipment. C2.2. RESPONSIBILITIES The Heads of the DoD Components shall designate a program manager to oversee the physical security program. The oversight function includes: C Developing standard policies and procedures to supplement the provisions of this Regulation to meet specific needs, including joint supplementation, when possible. C Maintaining liaison with the antiterrorism, counterintelligence, and law enforcement entities to coordinate and integrate seamless awareness, reporting, and First Responder programs to provide practical, expedient and credible flow of critical information. C Formalizing security procedures for joint response to adverse or terrorist incidents. 13 CHAPTER 2
14 C Conducting specific physical security threat assessments and update them annually or as needed (see Chapter 169, section 2859, title 10, United States Code (Reference (k))). C Establishing and coordinating requirements for the acquisition of physical security equipment and establish procedures to identify requirements for related research as described in DoD Directive , (Reference (l)). C Developing training, qualification, and suitability requirements for dedicated security forces (including contract security forces where employed, security technicians, and physical security specialists). C2.3. SECURITY SYSTEM PERFORMANCE GOAL C The goal of the security system for an installation, area, facility, or asset is to employ Security-in-Depth: to preclude or reduce the potential for sabotage, theft, trespass, terrorism, espionage, or other criminal activity. To achieve this goal, a security system provides the capability to deter, detect, identify, track, assess, record, communicate, delay, and respond to unauthorized access activities. C Each security system component has a function and related measures that provide an integrated capability for: C Deterrence as an immediate indication of deliberate attempts, security probing, and warning for inadvertent or mistaken intention; C Detect, identify and track, through human, animal, or electronic means, and alert security personnel to possible threats and attempts at unauthorized entry at or shortly after time of occurrence; C Assessment, through use of video subsystems, patrols, or fixed posts, assists in localizing and determining the size and intention of an unauthorized intrusion or activity; C Communications, secure and diverse, used for command and control, that provide countermeasures that contribute to prevention and containment of sabotage, theft, or other criminal activity; C Delay, through the use of active and passive security measures, including a full range of barriers, impeding intruders in their efforts to reach their objective; and C Response will provide the use of designated, trained and properly equipped security forces. The responsive forces must also have assessed the situational requirements through the detection and delay, accounting for sufficient warning and protection to the asset, until the response force can be expected to arrive at the scene. 14 CHAPTER 2
15 C2.4. PHYSICAL SECURITY/ANTITERRORISM INTEGRATION Threat level guidance and Force Protection Conditions are designed to enhance the baseline physical security requirements at DoD installations and facilities, due to heightened terrorist threat or action. The antiterrorism security measures are employed as a whole, or in part (as directed by the commander/director), at installations and facilities. These procedures are found in DoD Instruction , (Reference (m)) and DoD Directive , (Reference (n)). C2.5. PHYSICAL SECURITY PLANNING, SYSTEM ACQUISITION, CONSTRUCTION, AND LEASING STANDARDS C Heads of the DoD Components shall establish procedures for physical security planning, construction, and acquisition of facilities or buildings as appropriate and in accordance with UFC , Unified Facilities Criteria, (Reference (o)). Unified Facilities Criteria (UFC) instruction provides protective design planning, construction, sustainment, restoration, and modernization criteria for installations and leased facilities, and applies to the Military Departments, the Defense Agencies, and the DoD Field Activities in accordance with Undersecretary of Defense, Acquisition, Transportation and Logistics Memorandum dated May 29, 2002, (Reference (p)). UFC instructions are distributed only in electronic media and are effective upon issuance. The UFC system is found on the world-wide web. The UFC system is prescribed by Military Standard 3007F, (Reference (q)). C Federal Information Processing Standards (FIPS) 201-1, Personal Identity Verification (PIV) of Federal Employees and Contractors, March 01, 2006, (Reference (r)) provides guidance for the acquisition of Federal PIV credentials and supporting equipment, when fulfilling the requirements for Federal standards of identity and access control. Further information directing the acquisition of a Federal credential is found in Chapter 3. C DoD Components securing existing access doors with high security padlocks and hasps may continue their use, in accordance with Reference (h). However, new construction or planned upgrades to access doors for Category I and II Arms, Ammunition & Explosives (AA&E) areas shall require the installation of the Internal Locking Device, see Reference (h). 15 CHAPTER 2
16 C3. CHAPTER 3 INSTALLATION ACCESS AND EMERGENCY PLANNING C3.1. GENERAL This chapter implements general procedures that meet minimum Federal standards for controlling entry onto and exiting from military installations and the facilities within military installations. Access control is an integral and interoperable part of DoD installation physical security programs. Each installation commander/facility director must clearly define, consistent with DoD policy, the access control measures (tailored to local conditions) required to safeguard personnel, facilities, protect capabilities, and accomplish the mission. C3.2. PROCEDURES DoD Components shall develop, establish and maintain uniform policies that support interoperable procedures to control access to installations and facilities, including: C Implementing DoD Antiterrorism Standards and DoD Antiterrorism Program (References (m) and (n)), which provide the definitive guidance to the COCOMs and subordinate commanders as to implementation of specific security measures (e.g., inspecting persons, property and/or vehicles) based upon the level of threat. Employment of the measures demonstrates Security-in-Depth through a layered security effort to identify, diminish, and/or eliminate the threat. C Developing appropriate operational concepts or security standards to meet the performance goal of section C2.3. of this publication. Therefore, where appropriate, security system levels shall be included in security planning documents to assure minimum security standards. C Using random antiterrorism measures within existing security operations to reduce patterns, change schedules, and visibly increase the security profile of an installation. This enhances the possible detection of violation(s) and reduces the effectiveness of pre-operational surveillance by hostile elements and/or unauthorized personnel. C Designating restricted or controlled areas to safeguard property or resources for which the commander is responsible (area designations such as restricted and controlled shall be directed appropriately by the responsible commander to safeguard mission essential property or material). C Enforcing the removal of, or denying access to, persons who threaten security, order, and the discipline of the installation. 16 CHAPTER 3
17 C Reviewing all access control procedures (such as inspecting an individual and their possessions while on the installation) for legal sufficiency by the appropriate General Counsel or Legal Advisor to the DoD Component prior to issuance. C3.3. INSTALLATION ACCESS C Homeland Security Presidential Directive-12 (HSPD-12), (Reference (s)), mandates policy for a common identification standard for all Federal employees and contractors. The Federal Information Processing Standard (FIPS 201-1), (Reference (r)), provides standards for the identity verification, issuance, and use of the common identity standard. The DoD Federal PIV credential, the CAC, will provide a level of identity assurance and a method of authentication. Consistent with applicable law, Tthe CAC shall be the principal identity credential for supporting interoperable access to installations, facilities, buildings, and controlled spaces. The credential will provide for a consistent, government-wide, identification and authentication approach to facility and information security, and increase confidence in the overall security posture. The CAC, upon presentation at perimeter security locations, shall be accepted for perimeter screening purposes. Specific implementation standards directed by HSPD-12/FIPS are: C The development and implementation of a mandatory, government-wide standard for secure and reliable forms of identification, shall be issued to Federal employees and contractors as identified in DoD Directive , (Reference (t)). C A National Agency Check with Inquiries (NACI) or equivalent national security clearance (e.g. National Agency Check with Local Agency Checks including Credit Check (NACLC)) is required for permanent issuance of the credential. The credential may be issued upon favorable return of the FBI fingerprint check, pending final favorable completion of the NACI/equivalent, based on a commander/director risk management decision. An individual holding a valid national security clearance shall not require an additional submission of the NACI/equivalent. C Credentials issued to individuals without a completed NACI/equivalent will be electronically distinguishable from those credentials revealing a completed NACI/equivalent. C Occasional visitors to Federal facilities will continue using a locally established, temporary issue, visitor identification system. C The Defense Biometric Identification System (DBIDS) card shall be issued and authorized for routine, physical access, to a single DoD installation or facility. The DBIDS card renders a source of identity and verification of affiliation with the Department of Defense, and is a proven physical access system in accordance with Reference (r). The DBIDS card, while not an interagency PIV credential, shall have a standard vetting requirement. A National Agency Check (NAC) or equivalent national security clearance is required for permanent issuance of the DBIDS credential. The credential may be issued upon favorable return of the FBI fingerprint check, pending final favorable completion of the NAC, based on a commander/director risk 17 CHAPTER 3
18 management decision. An individual holding a valid national security clearance shall not require an additional submission of the NAC. C Upon full implementation of the CAC, the standard DoD PIV access control credential and the DBIDS credential, eliminate all other non-fips compliant badges and associated equipment used for physical access (see Reference (r)). Existing legacy Physical Access Systems (PAS) will continue to operate until upgraded or replaced with compliant systems. Operating maintenance costs to existing PAS must be balanced and justified against use of such funds toward transition to HSPD-12/FIPS compliant systems. While the granting of access privileges remains a local business operation decision, it must function in concert with the Federal PIV policy and procedures. The CAC, as a controlled item, shall not be utilized in temporary badge issuance exchanges. Use of a badge (such as an intelligence community badge) as an identifying badge vice an access credential, is not prohibited in restricted areas by FIPS or this regulation. C3.4. EMERGENCY PLANNING C The DoD Components shall require commanders to plan for increasing vigilance and restricting access at installations during: C National emergencies. C Disasters. C Terrorist threat conditions or increased Force Protection Conditions (see Reference (m) for further information). C Significant criminal activities. C Civil disturbances. C Other contingencies that would seriously affect the ability of installation personnel to perform their mission. C Planning should include: C Establishing an installation/facility force protection working group that defines coordination and procedures for installation/facility emergency planning; C Coordinating with local, state, Federal, or host-country officials to maintain integrity of restricted access to the installation and reduce the effect on surrounding civilian communities; C Establishing of a system for positive identification of personnel and equipment authorized to enter and exit the installation; 18 CHAPTER 3
19 C Maintaining adequate physical barriers that will be installed to control access to the installation; C Pre-designating personnel, equipment, and other resources to enforce restricted access and respond to incidents; and C Exercising contingency plans to validate their effectiveness. 19 CHAPTER 3
20 C4. CHAPTER 4 SECURITY OF WEAPON SYSTEMS AND PLATFORMS C4.1. GENERAL This chapter establishes procedures and responsibilities for security of weapon systems, including platforms, such as armored fighting vehicles, fixed- and rotary-wing aircraft, and ships in port. C4.2. PROCEDURES C Commanders are responsible for the security of assigned or transient weapon systems while these systems are resident on their installations. Commanders shall develop security plans to meet this responsibility. C Each DoD Component Head shall issue instructions governing the security of its weapon systems. The priority for security placed on similar systems or platforms within each DoD Component's inventory may vary due to differences in: C Mission. C Location and vulnerability. C Operational readiness. C Value, classification, and replacement costs. C Before operations, the cognizant DoD Component should request special security support from the host installation, if necessary, as far in advance as possible. Economic and logistical considerations dictate that every reasonable effort be made by the host installation to provide the necessary security without resorting to external support from the cognizant DoD Component. The cognizant DoD Component should provide materiel and personnel for extraordinary security measures (extraordinary security measures are those that require heavy expenditures of funds, equipment, or manpower; or unique or unusual technology) to the host installation. C Security considerations for transportation and storage of AA&E (weapons systems) are described in DoD R-Part II (Reference (u)). Requirements for securing devices (such as locks and seals) used in transit of AA&E are described in Reference (h). 20 CHAPTER 4
21 C5. CHAPTER 5 PROTECTION OF BULK PETROLEUM PRODUCTS C5.1. GENERAL This chapter prescribes general procedures for security of Government-owned, Governmentoperated (GOGO) and Government-owned, Contractor-operated (GOCO) fuel support points, pipeline pumping stations, and piers. C5.2. PROCEDURES C Commanders or Directors of GOGO and GOCO fuel support points, pipeline pumping stations, and piers shall designate and post these facilities as Controlled Areas. C When this entity is designated as part of the Defense Critical Infrastructure Program, security planning and protection shall be done in accordance with DoD Directive (Reference (v)). C Access to Controlled Area facilities shall be controlled and only authorized personnel shall be permitted to enter. Commanders shall determine the means required to enforce access control (i.e., security forces, barriers, lighting, and security credentials) based on the considerations in Chapter 3. C Security force personnel shall be equipped with a primary and an alternate means of communications to alert other military or civilian law enforcement agencies, as appropriate, in event of an intrusion, fire, or other emergency. C5.3. SECURITY PLANNING AND LIAISON Commanders shall protect their fuel facilities by: C Establishing liaison and coordinate and exercise contingency plans and inspection requirements with the nearest U.S. military installation to provide manpower and equipment resources to the facility in the event of emergencies and increased threat conditions. C Establishing liaison with supporting local, State, and Federal law enforcement agencies and host-nation officials; and support agreements, if appropriate. 21 CHAPTER 5
22 C6. CHAPTER 6 SECURITY OF COMMUNICATIONS SYSTEMS C6.1. GENERAL C This chapter describes concepts for physical security of communications facilities located on and off military installations, to include mobile systems. Specific security support for facilities that require special security measures shall be coordinated between the concerned Components. C Because of the difference in location, physical layout and equipment, security considerations must be thoroughly assessed for each communications system. The physical security program shall be tailored to that particular facility or system. C6.2. PROCEDURES C The protection provided to DoD communication facilities and systems shall be sufficient to maintain continuity of operations of critical users and the facilities they support. These include nuclear weapon delivery units and storage facilities, main operating bases (for allied air forces), and primary command and control elements. The determinations on strategic importance, both to the United States and its allies, shall be based upon whether or not each mobile system or facility that processes, transmits, or receives, telecommunications traffic is deemed as a defense critical infrastructure capability or crucial by the President. C Communications systems play a major role in support of each DoD Component's mission, providing operational communications in both peacetime and wartime. These are attractive targets due to limited staffing, isolated location, and mission. Therefore, security for these systems must be an important part of each command's physical security program. C The DoD Component must review the host installation's implementation of physical security measures during inspections, oversight, and staff visits. C Access shall be controlled at all communications facilities and only authorized personnel shall be allowed to enter. Facilities should be designated and posted as a minimum, a Controlled Area, as directed. C Depending on regional conditions, commanders should consider locating enough weapons and ammunition at communications facilities to arm designated, on-site personnel. If arms are stored at the facilities, appropriate security measures and procedures shall be employed in accordance with Reference (h). C Existing essential structures should be hardened against attacks in accordance with the guidance provided in paragraph C.2.5. This includes large antenna support legs, antenna 22 CHAPTER 6
23 horns, operations buildings and cable trays. Future construction programs for communications facilities should include appropriate hardening of essential structures. C When this entity is designated as part of the Defense Critical Infrastructure Program, security planning and concerns shall be done in accordance with Reference (v). C6.3. RESPONSIBILITIES C The Heads of the DoD Components shall coordinate with each COCOM to identify critical communications facilities and mobile systems. Communications capabilities deemed as defense critical infrastructure shall be coordinated with the Office of the Assistant Secretary of Defense for Homeland Defense/America s Security Affairs.. C DoD Components shall direct that each designated subordinate commander or facility director develop a security plan for each communications facility and mobile system under their command. The plan shall include emergency security actions and procedures for emergency destruction of sensitive equipment and classified information (Reference (c)). The plan may be an annex to an existing host installation security plan; only the applicable parts of the total plan shall be distributed to personnel at the facility or mobile system. C The owning DoD Component shall arrange for security of off-installation facilities and mobile systems with the closest U.S. military installation. This includes contingency plans for manpower and equipment resources during emergencies. These arrangements can be made by establishing a formal agreement, such as an inter-service support agreement. Whether the facilities or mobile systems are located on or off the installation, installation commanders are responsible for security of these assets as part of the host support. C Operations, maintenance, and communications personnel at the facility or mobile system are the most important factor in security. DoD Components shall implement a training program so that assigned personnel understand their day-to-day security responsibilities, are familiar with the vulnerabilities of the facility, and are prepared to implement emergency security actions. The training program shall include: C Security procedures and personal protection skills for assigned personnel. C The use of weapons and communications equipment for protecting the facility or mobile system. C Awareness of local threats, postulated threats and Force Protection Conditions. C Components may issue additional instructions governing security of the communications facilities. 23 CHAPTER 6
24 C6.4. MOBILE COMMUNICATIONS SYSTEMS In accordance with Chapter 2, a security operational concept or standard shall be developed for mobile systems to describe the minimum level of security for the system in the expected operational environment. 24 CHAPTER 6
25 C7. CHAPTER 7 SECURITY OF CONTROLLED INVENTORY ITEMS C7.1. GENERAL C This chapter implements security policy and procedures for safeguarding controlled inventory items, including prescribed drugs and controlled substances, as identified in Title 21, Code of Federal Regulation, Parts through , (Reference (w)), Public Law , (Reference (x)) and precious metals. C DoD materiel assigned a code indicating the security classification and/or security risk or pilferage controls for storage and transportation pursuant to Military Standard A, (Reference (y)) shall be afforded special attention, as in DoD Regulation R-1, (Reference (z)). Controlled Inventory Item Codes (CIIC) are found in DLA Joint Regulation , (Reference (aa)). C7.2. PROCEDURES C The security of controlled inventory items is of special concern to the Department of Defense. Consequently, these items shall have characteristics so that they can be identified, accounted for, secured, or segregated to maintain their protection and integrity. C DoD Components shall pay special attention to the safeguarding of inventory items by judiciously implementing and monitoring physical security measures. This shall include analysis of loss rates through inventories, reports of surveys, and criminal incident reports to establish whether repetitive losses indicate criminal or negligent activity. C These requirements apply to stocks at depot, base, and installation supply level. Small unit or individual supplies below the base or installation level shall be afforded protection, as determined by the commander. C7.3. RESPONSIBILITIES C The Heads of the DoD Components shall: C Establish physical security measures to protect inventory items at depot, base, and installation level. C Monitor the effective implementation of security requirements through scheduled inspections of and staff or oversight visits to affected activities. 25 CHAPTER 7
26 C Provide that adequate safety and health considerations are incorporated into the construction of a security area for controlled inventory items. C Establish functioning security measures to reduce the incentive and opportunity for theft. C7.4. CONTROLLED ITEMS SECURITY C Commanders will provide storage facilities and procedures for operations to adequately safeguard controlled inventory items. C Security requirements for inventory items in storage: C General security requirements for classified, sensitive, and pilferable items are found in Reference (x). C Specialized storage requirements for arms, ammunition, and explosives are found in Reference (h). C Additional guidance for the secure storage of sensitive inventory items, controlled substances, and pilferable items are found in Reference (aa). 26 CHAPTER 7
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
2. APPLICABILITY AND SCOPE
Department of Defense DIRECTIVE NUMBER 1000.25 July 19, 2004 Certified Current as of April 23, 2007 USD(P&R) SUBJECT: DoD Personnel Identity Protection (PIP) Program References: (a) DoD Directive 1000.22,
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5205.16 September 30, 2014 USD(I) SUBJECT: The DoD Insider Threat Program References: See Enclosure 1 1. PURPOSE. In accordance with sections 113 and 131 through
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:
U.S. DoD Physical Security Market
U.S. DoD Physical Security Market Technologies Used for DoD Applications June 2011 Table of Contents Executive Summary 7 Introduction 8 Definitions and Scope 9-11 Percentage of FY 2010 Total Budget Request
Science/Safeguards and Security. Funding Profile by Subprogram
Safeguards and Security Safeguards and Security Funding Profile by Subprogram (dollars in thousands) Protective Forces 35,059 37,147 Security Systems 11,896 10,435 Information Security 4,655 4,595 Cyber
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference
E X E C U T I V E O F F I CE O F T H E P R E S I D EN T
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 THE DIRECTOR M-05-24 August 5, 2005 MEMORANDUM FOR THE HEADS OF ALL DEPARTMENTS AND AGENCIES FROM: SUBJECT: Joshua
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5105.77 October 30, 2015 DCMO SUBJECT: National Guard Bureau (NGB) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority vested in the Secretary of Defense
Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings
Security-in-Depth Physical Security Webinar Host: Danny Jennings Physical Security Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military; over
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5105.64 January 10, 2013 DA&M SUBJECT: Defense Contract Management Agency (DCMA) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority vested in the Secretary
~ Final Credentialing Standards for Issuing Personal Identity Verification Cards under HSPD-12
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT Washington, DC 20415 The Director July 31, 2008 MEMORANDUM FOR HEADS OF DEPARTMENTS AND AGENCIES FROM: SUBJECT: LINDA M. SPRINGER DIRECTOR ~ Final Credentialing
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8523.01 April 22, 2008 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) References: (a) DoD Directive C-5200.5, Communications Security (COMSEC) (U),
SYRACUSE CITY SCHOOL DISTRICT
SYRACUSE CITY SCHOOL DISTRICT EMERGENCY OPERATIONS PLAN Sharon L. Contreras, Superintendent of Schools Effective Date: September 2014 1 Table of Contents Contents Section I. Introduction:... 4 1.1 Purpose...
Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System
Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES
REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES Definitions 1. In these requirements: C-NLOPB means the Canada-Newfoundland and Labrador Offshore Petroleum Board; Chief Safety Officer means
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.44 November 5, 2012 DoD CIO/USD(AT&L) SUBJECT: Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) References: See Enclosure
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION SUBJECT: National Defense Intelligence College University (NDIC NIU) NUMBER 3305.01 December 22, 2006 Incorporating Change 1, February 9, 2011 USD(I) References: (a) DoD
Department of Defense INSTRUCTION. Reference: (a) DoD Directive 3020.26, Defense Continuity Programs (DCP), September 8, 2004January 9, 2009
Department of Defense INSTRUCTION SUBJECT: Defense Continuity Plan Development NUMBER 3020.42 February 17, 2006 Certified current as of April 27, 2011 Reference: (a) DoD Directive 3020.26, Defense Continuity
This directive applies to all DHS organizational elements with access to information designated Sensitive Compartmented Information.
Department of Homeland Security Management Directives System MD Number: 11043 Issue Date: 09/17/2004 SENSITIVE COMPARTMENTED INFORMATION PROGRAM MANAGEMENT I. Purpose This directive establishes Department
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5144.02 November 21, 2014 DCMO SUBJECT: DoD Chief Information Officer (DoD CIO) References: See Enclosure 1. PURPOSE. Under the authority vested in the Secretary
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 2311.01E May 9, 2006 Incorporating Change 1, November 15, 2010 Certified Current as of February 22, 2011 GC, DoD SUBJECT: DoD Law of War Program References: (a) DoD
Department of Veterans Affairs VA Directive 0710 PERSONNEL SECURITY AND SUITABILITY PROGRAM
Department of Veterans Affairs VA Directive 0710 Washington, DC 20420 Transmittal Sheet June 4, 2010 PERSONNEL SECURITY AND SUITABILITY PROGRAM 1. REASON FOR ISSUE: To revise Department of Veterans Affairs
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5105.36 February 28, 2002 Certified Current as of November 21, 2003 SUBJECT: Defense Contract Audit Agency (DCAA) DA&M References: (a) Title 10, United States Code
Security Guidelines for. Agricultural distributors
Security Guidelines for Agricultural distributors SECURITY GUIDELINES FOR AGRICULTURAL DISTRIBUTORS As a result of global uncertainties the security of agricultural retail facilities has taken on a whole
Subject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
Safeguards and Security
Safeguards and Security Overview The Safeguards and Security (S&S) program mission is to support Departmental research at Office of Science (SC) laboratories by ensuring appropriate levels of protection
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5015.02 February 24, 2015 DoD CIO SUBJECT: DoD Records Management Program References: See Enclosure 1 1. PURPOSE. This instruction reissues DoD Directive (DoDD)
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
COMPLIANCE WITH THIS PUBLICATION IS MANDATORY
BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE MISSION DIRECTIVE 39 7 MAY 2015 AIR FORCE OFFICE OF SPECIAL INVESTIGATIONS COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY: Publications
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 4140.25 June 25, 2015 USD(AT&L) SUBJECT: DoD Management Policy for Energy Commodities and Related Services References: See Enclosure 1 1. PURPOSE. This instruction:
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1322.24 October 6, 2011 ASD(HA) SUBJECT: Reference: Medical Readiness Training (a) DoD Directive 5124.02, Under Secretary of Defense for Personnel and Readiness
Department of Defense DIRECTIVE. SUBJECT: Assistant Secretary of Defense for Public Affairs (ASD(PA))
Department of Defense DIRECTIVE NUMBER 5122.05 September 5, 2008 DA&M SUBJECT: Assistant Secretary of Defense for Public Affairs (ASD(PA)) References: See Enclosure 1 1. PURPOSE. This Directive: a. Reissues
POSITION CLASSIFICATION STANDARD FOR SECURITY ADMINISTRATION SERIES, GS-0080
POSITION CLASSIFICATION STANDARD FOR SECURITY ADMINISTRATION SERIES, GS-0080 Table of Contents SERIES DEFINITION... 2 EXCLUSIONS... 2 OCCUPATIONAL INFORMATION... 3 Nature of Security Work... 6 Personnel
SUBJECT: Directive-Type Memorandum (DTM) 09-012, Interim Policy Guidance for DoD Physical Access Control
UNDER SECRETARY OF DEFENSE 5000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-5000 INTELLIGENCE December 8, 2009 Incorporating Change 5, Effective March 3, 2015 MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Directive-Type
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5105.68 December 5, 2013 DA&M SUBJECT: Pentagon Force Protection Agency (PFPA) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority vested in the Secretary
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5132.13 January 9, 2009 USD(P) SUBJECT: Staffing of Security Cooperation Organizations (SCOs) and the Selection and Training of Security Cooperation Personnel References:
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION
OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION CONTRACTOR SECURITY OF THE SOCIAL SECURITY ADMINISTRATION S HOMELAND SECURITY PRESIDENTIAL DIRECTIVE 12 CREDENTIALS June 2012 A-14-11-11106
Standards for Security Categorization of Federal Information and Information Systems
FIPS PUB 199 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Standards for Security Categorization of Federal Information and Information Systems Computer Security Division Information Technology
The Army Physical Security Program
Army Regulation 190 13 Military Police The Army Physical Security Program Distribution Restriction Statement. This publication contains technical or operational information that is for official Government
UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS
UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS 1 DIPLOMATIC SECURITY PROTECTS The Bureau of Diplomatic Security is the security and law enforcement arm of
December 17, 2003 Homeland Security Presidential Directive/Hspd-7
For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,
28 CFR Ch. I (7 1 11 Edition)
0.75 the interpretation of Executive Order 10501 of November 5, 1953, as amended, and of regulations issued thereunder in accordance with section 11 of that order; and the interpretation of Executive Order
Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: [email protected]
Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: [email protected] Nuclear Security Background While security of the nuclear facilities and materials the NRC regulates has always been a
DEFENSE LOGISTICS AGENCY
DLAM 5200.08 DEFENSE LOGISTICS AGENCY AMERICA S COMBAT LOGISTICS SUPPORT AGENCY DEFENSE LOGISTICS AGENCY PHYSICAL SECURITY PROGRAM 1 Issue Date: December 2, 2011 OPR: DLA Installation Support, Security
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
Public Law 113 283 113th Congress An Act
PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1000.13 January 23, 2014 USD(P&R) SUBJECT: Identification (ID) Cards for Members of the Uniformed Services, Their Dependents, and Other Eligible Individuals References:
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 6400.04E June 27, 2013 Incorporating Change 1, Effective October 18, 2013 USD(P&R) SUBJECT: DoD Veterinary Public and Animal Health Services References: See Enclosure
SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon
This document is scheduled to be published in the Federal Register on 02/11/2016 and available online at http://federalregister.gov/a/2016-02788, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
Guidelines on the Use of Armed Security Services from Private Security Companies Annex A - Statement of Works
UNITED NATIONS SECURITY MANAGEMENT SYSTEM Security Management Operations Manual Guidelines on the Use of Armed Security Services from Private Security Companies Annex A - Statement of Works These guidelines
Ten Tips for Completing a Site Security Plan
TRANSPORTATION LOGISTICS PETROCHEMICal Commercial Industrial Retail Federal Systems Banking Ten Tips for Completing a Site Security Plan Introduction The Chemical Facility Anti-Terrorism Standards (CFATS)
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 6200.02 February 27, 2008 SUBJECT: Application of Food and Drug Administration (FDA) Rules to Department of Defense Force Health Protection Programs USD(P&R) References:
Physical Security. Unclassified. Army Regulation 190 16 *OPNAVINST 5530.15A *AFR 207-4 *MCO 5500.13A *DLAR 5710.4. Military Police
Army Regulation 190 16 *OPNAVINST 5530.15A *AFR 207-4 *MCO 5500.13A *DLAR 5710.4 Military Police Physical Security Headquarters Departments of the Army Washington, DC 31 May 1991 Unclassified SUMMARY of
Homeland Security Presidential Directive/HSPD-5 1
For Immediate Release Office of the Press Secretary February 28, 2003 Homeland Security Presidential Directive/HSPD-5 1 Subject: Management of Domestic Incidents Purpose (1) To enhance the ability of the
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5000.01 May 12, 2003 Certified Current as of November 20, 2007 SUBJECT: The Defense Acquisition System USD(AT&L) References: (a) DoD Directive 5000.1, The Defense
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
DEPARTMENT OF HOMELAND SECURITY
DEPARTMENT OF HOMELAND SECURITY Since 2001, the Administration: Funded over 5,700 new Border Patrol agents, and acquired nearly 7,800 new detention beds; Provided nearly $37.5 billion to State, local,
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION SUBJECT: DoD Personnel Security Program (PSP) References: See Enclosure 1 NUMBER 5200.02 March 21, 2014 Incorporating Change 1, Effective September 9, 2014 USD(I) 1. PURPOSE.
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) 2. Name of IT System: Defense Biometric Identification System (DBIDS)
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) (Use N/A where appropriate) 1. DoD Component: Defense Manpower Data Center (DMDC) 2. Name of IT System: Defense Biometric Identification System (DBIDS) 3. Budget
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3115.12 August 24, 2010 USD(I) SUBJECT: Open Source Intelligence (OSINT) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes policy, assigns
Rail Carrier Security Criteria
Rail Carrier Security Criteria Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing that rail carriers
The National Security Act of 1947 July 26, 1947
The National Security Act of 1947 July 26, 1947 Public Law 253, 80th Congress; Chapter 343, 1st Session; S. 758. AN ACT To promote the national security by providing for a Secretary of Defense; for a National
National Infrastructure Protection Center
National Infrastructure Protection Center Risk Management: An Essential Guide to Protecting Critical Assets November 2002 Summary As organizations increase security measures and attempt to identify vulnerabilities
Court Security Guidelines
July 3, 2002 Court Security Guidelines Michigan State Court Administrative Office TABLE OF CONTENTS Introduction and Application of Guidelines....................................... 2 SECTION 1 Administrative
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
MAJOR PROJECTS CONSTRUCTION SAFETY STANDARD HS-09 Revision 0
MAJOR PROJECTS CONSTRUCTION SAFETY SECURITY MANAGEMENT PROGRAM STANDARD HS-09 Document Owner(s) Tom Munro Project/Organization Role Supervisor, Major Projects Safety & Security (Canada) Version Control:
UNDER SECRETARY OF DEFENSE 5000 DEFENSE PENTAGON WASHINGTON, DC 20301-5000
UNDER SECRETARY OF DEFENSE 5000 DEFENSE PENTAGON WASHINGTON, DC 20301-5000 INTELLIGENCE July 8, 2013 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF STAFF UNDER SECRETARIES
Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise
Department of Defense DIRECTIVE SUBJECT: Management of the Department of Defense Information Enterprise References: See Enclosure 1 NUMBER 8000.01 February 10, 2009 ASD(NII)/DoD CIO 1. PURPOSE. This Directive:
THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems
Army Regulation 525 15 Military Operations Software Reprogramming Policy for Electronic Warfare and Target Sensing Systems Headquarters Department of the Army Washington, DC 23 July 2010 UNCLASSIFIED SUMMARY
AIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended)
for the AIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended) Contact Point Lisa S. Dean Privacy Officer Transportation Security Administration (571) 227-3947
Risk Management Handbook
Risk Management Handbook 1999 Introduction Risk management is the process of selecting and implementing countermeasures to achieve an acceptable level of risk at an acceptable cost. The analytical risk
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Conducting Security System Site Surveys
Conducting Security System Site Surveys Written By: Harold C. Gillens, PSP, CFC, CHS-III Quintech Security Consultants, Inc. 102 Sangaree Park Court Suite 4 Summerville, SC 29483 CONDUCTING SECURITY SYSTEM
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE
PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE U.S. Department of Justice Office of the Inspector General Audit Division Audit Report 05-32 July 2005 PROCESSING CLASSIFIED
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1322.19 March 14, 2013 USD(P&R) SUBJECT: Voluntary Education Programs in Overseas Areas References: See Enclosure 1. 1. PURPOSE. This instruction: a. Reissues DoD
LAWRENCE COUNTY, KENTUCKY EMERGENCY OPERATIONS PLAN ESF-13
LAWRENCE COUNTY, KENTUCKY EMERGENCY OPERATIONS PLAN LAW ENFORCEMENT AND SECURITY ESF-13 Coordinates and organizes law enforcement and security resources in preparing for, responding to and recovering from
WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM
BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective: January 14, 2016 Releasability:
Department of Defense INSTRUCTION. 1. PURPOSE. In accordance with DoD Directive (DoDD) 5124.02 (Reference (a)), this Instruction:
Department of Defense INSTRUCTION NUMBER 6430.02 August 17, 2011 USD(P&R) SUBJECT: Defense Medical Materiel Program References: See Enclosure 1 1. PURPOSE. In accordance with DoD Directive (DoDD) 5124.02
A Risk Assessment Methodology (RAM) for Physical Security
A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to
United States Department of the Interior
United States Department of the Interior NATIONAL PARK SERVICE 1849 C Street, N.W. Washington D.C. 20240 IN REPLY REFER TO: DIRECTOR'S ORDER #55: INCIDENT MANAGEMENT PROGRAM Effective Date: Sunset Date:
Global Supply Chain Security Recommendations
Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 6490.04 March 4, 2013 USD(P&R) SUBJECT: Mental Health Evaluations of Members of the Military Services References: See Enclosure 1 1. PURPOSE. In accordance with
LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: 01-9019.00-0001 OVERVIEW
TASK DESCRIPTION: LESSON SEVEN CAMPAIGN PLANNING FOR MILITARY OPERATIONS OTHER THAN WAR MQS MANUAL TASKS: 01-9019.00-0001 OVERVIEW Learn the differences between planning for a campaign in war and planning
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5118.05 April 20, 2012 DA&M SUBJECT: Defense Finance and Accounting Service (DFAS) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority vested in the
One Hundred Twelfth Congress of the United States of America
S. 3454 One Hundred Twelfth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday, the third day of January, two thousand and twelve An Act
25 May 2016 TECHNICIAN POSITION VACANCY ANNOUNCEMENT #16-067. POSITION: Security Officer (D2243000) (GS-0018-12) EXCEPTED POSITION
DEPARTMENT OF DEFENSE, VETERANS AND EMERGENCY MANAGEMENT Military Bureau Joint Force Headquarters, Maine National Guard Camp Keyes, Augusta, Maine 04333-0033 25 May 2016 TECHNICIAN POSITION VACANCY ANNOUNCEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
