160 likes | 574 Views
2. RESOURCE PROTECTION MANAGER. JACQUI IRELANDLOCATED IN BUILDING 582
E N D
1. 1 RESOURCE PROTECTION PROGRAMCONTROLLED AREA TRAINING
2. 2
3. 3 CONTROLLED AREA TRAINING OVERVIEW
Governing Instructions
Definition of a Controlled Area
Entry into Your Controlled Area
Unauthorized Personnel in Your Area
Training Personnel in Your Area
Bomb Threat & Emergency Egress Procedures
Emergency Response Procedures
4. 4 CONTROLLED AREA TRAINING GOVERNING INSTRUCTIONS
Governed by:
AFI 31-101 AND ALCON 31-101
All controlled area monitors should be familiar with these instructions. A hard copy of each is found in the Resource Protection Managers Office
5. 5 DEFINITION OF A CONTROLLED AREA? CONTROLLED AREA?
The designation “controlled area” carries the same legal and moral restrictions as a physical barrier.
Unless physical barriers are specifically required, the actual control may depend entirely on the protection consciousness of the personnel in the designated area.
6. 6 CONTROLLED AREA DESIGNATION? CONTROLLED AREA DESIGNATION
Controlled Areas are approved in writing by the Installation Commander (routed through Chief, Security Forces)
Controlled area monitors must develop written OI’s to regulate entry and internal circulation control covering:
Entry during normal/contingency/emergency conditions
Bomb threat procedures
Internal Circulation Control Procedures
Training requirements and where training is to be documented
Any other points as designated by Installation Security Council (ISC)
Controlled areas will maintain a current letter designating a primary/alternate monitor. (unit monitors will train all other personnel working in the area)
7. 7 ENTRY INTO YOUR CONTROLLED AREA ENTRY CONTROL PROCEDURES
Keep entrances to a minimum
Owner/user control entry to their areas using a commander signed Entry Authority Listing (EAL) unless the installation commander specifically assigns entry control responsibility to another agency.
Support Techniques: Personnel recognition, third party authentication, telephone verification, sign/countersign (for emergency entry), cipher locks, or any technique considered appropriate.
Sign visitors in using AF Form 1109/Visitor Log and escorted by someone listed on EAL
Post controlled area signs in conspicuous and proper places (all entry points and all sides of facility)
Challenge any person that at a specific time or place, appears questionable. Challenging procedures will include contacting a supervisor if there is any doubt as to the persons right to be in the area, and promptly requesting security forces assistance if a persons right to be in the area cannot be verified.
8. 8 HOW TO CONTROL ENTRY HOW TO CONTROL ENTRY
An individual approaches your controlled area and requests entry;
Do you recognize this person by name?
Does this person have valid DOD/AF credentials?
Did you receive prior notification of the individual needing to access your area?
If not, call appropriate agency to verify their need to enter
If so, check the individual’s identification credentials
Sign the person in on an AF Form 1109
Maintain observation of the individual(s) until they depart the
area
9. 9 UNAUTHORIZED INDIVIDUAL? UNAUTHORIZED INDIVIDUAL?
Challenge any individual you do not recognize, appears suspicious and/or refuses to depart the area
Immediately call Security Forces at 2400
For exercises contact Security Forces at 2400
Cease all operations and secure all classified material until the perpetrator is removed by Security Forces
10. 10 TRAINING TRAINING PERSONNEL
The RPM will train all primary controlled area monitors initially, then annually.
Primary monitors will in-turn train all personnel who work within the controlled area annually and initially when new personnel commence working in the controlled area.
This training should be documented using the training confirmation supplied and maintained in your Resource Protection Folder with a copy forwarded to 423 SFS/S3OR.
11. 11 BOMB THREAT & EMERGENCY EGRESS PROCEDURES BOMB THREAT PROCEDURES
Suspicious Package:
DO NOT TOUCH!
Attempt to immediately find the owner.
If the owner cannot be found notify the SFCC by dialling 2400 and provide description of the package and exact location.
Immediately evacuate the facility and have everyone meet in a designated area.
Make sure everyone in the area is familiar with your local bomb threat procedures.
Make sure procedures are in place for emergency egress from your area which may include duress words, routes of escape, meeting points etc.
12. 12 BOMB THREAT PROCEDURES BOMB THREAT PROCEDURES
VIA PHONE:
Use the AF Form 440/Bomb Threat Aid (placed next to all phones)
Attempt to ask all questions on the 440 to the caller
Annotate all detailed information on the 440 including time/date of call, caller’s sex, accent and approximate age
Lastly do not hang up the phone
13. 13 EMERGENCY ENTRY PROCEDURES EMERGENCY ENTRY PROCEDURES
Only allow entry to emergency response personnel if aware of an actual emergency within the area (secure all classified materials)
If possible, monitor emergency response personnel while in the area
Retrieve the name, unit, and duty phone of the senior emergency response official after “all clear” has been sounded (for any future follow-up concerns)
Lastly, conduct an inventory of all controlled resources upon termination of the emergency response
14. 14 INTRUSION DETECTION EQUIPMENT (IDE) INTRUSION DETECTION EQUIPMENT
The owner/user must test the IDE with the Security Forces quarterly and annotate the test on the alarm test record kept in the Resource Protection Folder.
The CAFB Form 51, Entry Authority List (EAL) will be kept continuously updated of any personnel changes and forwarded to 423 SFS/SFOR.
During an IDE failure the owner/user will maintain 24 hour security by posting a guard in the area until the alarm system is fixed.
Alarm Authentication Letters, held at SFCC must be updated every 180 days or when personnel changes occur.
15. 15 AND FINALLY! Conclusion
Always use personal recognition, DOD/AF credentials, telephone verification, and/or prior notification to allow visitors escorted entry into the controlled area
If you find an unauthorized person(s) in your area, immediately attempt to remove them and report the incident to Security Forces by dialing 2400
Don’t be fooled by tool belts, uniforms, ID cards etc…if in doubt, call the appropriate agency before allowing entry
If you can not verify an individual’s need to enter your controlled area, DON’T let them in.
16. 16 QUESTIONS? ANY QUESTIONS
CONTACT JACQUI IRELAND
423 RESOURCE PROTECTION MANAGER
268 – 3062
Please now complete and return the training confirmation slip included with this presentation to Jacqui Ireland SFS/S3OR