770 likes | 787 Views
Understand the authority and sources for DeCA's security program, including crime and terrorism threats, workplace violence risks, and how to mitigate these threats through physical security basics and personnel security programs.
E N D
DeCA Security 101 By Miguel Torres, Security Programs Manager
What we will cover • Authority for DeCA’s Security Program • Source of Authority • Crime Threats • Terrorism Threats • Security Basics • Issue Hunt
SOURCES OF SECURITY REQUIREMENTS
Authority to Create a Security Program • DoD 5105.55, Defense Commissary Agency • Established the DeCA as a DoD Agency • Delegated authority to the DeCA Director to: • Designate Position Sensitivity for each position within the Agency; and • Promulgate the necessary security regulations for the protection of property and places under the jurisdiction of the Director, DeCA
Why do you kneed to know security? • As a Store Director, you are responsible for your store! • It protects your people (patrons, employees, etc.)! • It protects your inventory! • It protects your store’s reputation! • It instills confidence in your customers (improves sales)! • It protects you from personal liability!
WORKPLACE VIOLENCE Murder Kidnapping Rape Assault Product Tampering Vandalism Arson Harassment (Verbal, Stalking, etc.) Crime Threats
Crime Threats • Theft (Includes Burglary and Robbery) • Merchandise • Funds • Equipment • Supplies • Information • Identity • Time
COMMISSARY TERRORISM THREATS ASSASSINATIONS KIDNAPPING HIJACKING THEFT ROBBERIES CHEMICAL/ BIOLOGICAL BOMBINGS
“There is no better terrorist target than a DoD Dependent School, Exchange or Commissary . . .” BGen. James Dozier November 3, 1983
Commissary Vulnerabilities • Robberies, burglaries, product diversions and van hijackings to help finance terrorist operations. (NPA, Philippines 1975 – 1989) • Assassination and kidnapping of senior officers or their spouses that may be shopping or otherwise present within a commissary. • Random acts of violence such as drive-by shootings and bombings aimed at disrupting the quality of life, inciting fear and publicity. (Ankara Turkey; Ramstein AB, Germany)
Commissary Vulnerabilities, Cont. • Intentional contamination of food products with chemical or biological agents. • Use of DeCA bound delivery vehicles, shipping containers or other transportation/ shipping mediums to smuggle contraband, weapons, or explosives across international boundaries or onto military installations. (CDC delivery, Turkish Boarder, 1993)
Commissary Vulnerabilities, Cont. • As collateral damage resulting from an attack or event on a host installation. • Use of DeCA affiliation to gain sponsorship onto otherwise secure military installations for nefarious activities (to commit espionage, crime, terrorism, etc).
Mitigating Threats • Anticipate the threat. • Plan for the threat. • Construct/Renovate for the threat. • Crime prevention through environmental design (CPTED) • DoD Minimum Antiterrorism Standards for Buildings • Train/Exercise for the threat.
Physical Security Basics • PURPOSE. Physical security is primarily directed at the prevention of losses resulting from forced or unauthorized entry. • The degree of protection required varies depending upon location, structural design of the facility, value of commissary resources, and periods when the premises are unmanned or unguarded.
Personnel Security Program Because you never quite know who your going to get!
DeCA Security Programs • Personnel Security • Your first opportunity to protect your accountability from employee theft! • If they stole at their last employer, • what makes you think they • won’t steal from you??
Background Investigations • National Agency Check with Inquiries (NACI) • MINIMUM investigation for ALL Civil Service Employees working within DoD. • Criminal History Check • FBI Fingerprint Check • Credit Check • Reference/Former Employer/Education Checks
~85% of all losses are due to theft • ~48% is cased by employees and other store workers • ~33% is caused by shoplifters
According to the National Crime Prevention Institute: 10% of store workers & patrons will never steal regardless of the temptation. $
10% of employees and patrons will steal without regard for the security controls in place.
The key to good security is knowing that: • 80% of store workers & patrons will not steal from you unless: • They think they wont get caught. • They rationalize that “DeCA owes them.” • They “need” the money/merchandise. • They feel they’re being treated unfairly. • They perceive “Everyone's doing it.”
How does theft happen? • Lax internal controls. • Feeling of “It can’t happen to me!” • Bypassing internal controls for “convenience.” • Theft is a crime of opportunity!
Physical Security Access Control Anti-Robbery CCTV Funds Protection Internal Security Key & Lock Control Shoplifting Prevention Security Lighting Commissary DeCA Physical Security Programs Include
Accessible Openings Access Control Protective Lighting Opening and Closing Procedures Vendor Stocker Control Vendor Control Visitor Control Contractor Control Key, Lock and Seal Control Cargo Vehicles Physical Security
ACCESSIBLE OPENINGS. An accessible opening is any window, door, vent, etc., which could be used to gain entry into a facility.
Element Access Control Problems Identified Doors left open and unmonitored Badges not used/controlled Badges not secured ID’s issued to unauthorized Persons Alarmed door IDS warning signs not used Physical Security
External Entrance Doors Intent – All entrance/exit to a Commissary Facility is monitored and controlled. After hours, Commissary Employee MUST authorize/monitor entry/exit of ALL! • Double-Cylinder Locking Device • Panic Hardware on designated fire exits • Intrusion Detection System
Element • Internal Security Problems Identified • Personal Property • Backup storage area • Processing areas • Food & drink not controlled • Grazing • Sweethearting • Spot-checks
Physical Security Element • Key & Lock Control Problems Identified • Keys passed from person to person • Keys left in locks • Supervisors key left unsecured • Padlocks left with hasp open • Security hardware easily removed with wrench or screwdriver
Keep high pilferage items in “Sensitive Storage.” Keep the backup storage are “clean.” Locate high pilferage items in the store in an area in which they can be “seen.” Look for vulnerabilities. Understand why people steal. Spot check receivers. Be concerned. Some strategies to reduce losses
Sensitive Storage Area Sales Floor