Us Dod Anti Terrorism Handbook 2004 PDF
Us Dod Anti Terrorism Handbook 2004 PDF
Us Dod Anti Terrorism Handbook 2004 PDF
DoD O-2000.12-H
DEPARTMENT OF DEFENSE
DoD
ANTITERRORISM
HANDBOOK
9 February 2004
FOR
SPECIAL OPERATIONS/
LOW-INTENSITY CONFLICT
FOREWORD
This Handbook is reissued under the authority of DoD Directive 2000.12, “DoD
Antiterrorism (AT) Program,” August 18, 2003 (reference (a)). It provides procedures and
recommendations for reducing the risk and vulnerability of DoD personnel, their family
members, facilities, and assets from acts of terrorism.
DoD O-2000.12-H, “Protection of DoD Personnel and Activities Against Acts of
Terrorism and Political Turbulence,” February 1993 (reference (b)), is hereby canceled.
This Handbook applies to the Office of the Secretary of Defense, the Military
Departments, the Chairman of the Joint Chiefs of Staff, the Combatant Commands, the Office of
Inspector General of the Department of Defense, the Defense Agencies, DoD Field Activities
and all other organizational entities in the Department of Defense (hereafter referred to
collectively as “the DoD Components”). The term “Military Services,” as used herein, refers to
the Army, the Navy, the Air Force, the Marine Corps, and the Coast Guard (when operating as a
Military Service in the Navy). The term “Commanders,” as used herein refers to personnel
assigned to command positions at all levels and the heads of the Defense Agencies and Field
Activities.
This Handbook is effective immediately. All measures that protect DoD assets and
personnel from terrorist attack, whether or not they are specifically included in this Handbook,
should be implemented consistent with local requirements identified by senior military
commanders or civilian managers as appropriate. The Heads of the DoD Components may issue
supplementary instructions when necessary to provide for unique requirements within their
organizations.
Pursuant to subparagraph C3.2.1.2.1, DoD 5400.7-R, “DoD Freedom of Information Act
Program” (reference (c)), this Handbook is For Official Use Only. Release of this Handbook to
the public is subject to approval by the Assistant Secretary of Defense for Special Operations and
Low Intensity Conflict (SO/LIC). The National Disclosure Policy shall govern disclosure of this
document to foreign governments. Applicable portions of the Handbook may be released to
DoD family members and foreign nationals employed by the Department of Defense to provide
them with appropriate guidance on protection measures.
Submit recommended changes to this Handbook to:
Office of the Assistant Secretary of Defense
(Special Operations and Low-Intensity Conflict)
2500 Defense Pentagon, Room 5E368
Washington, DC 20301-2500
2
The DoD Components may obtain copies of this Handbook at the OASD (SO/LIC) and/or the
Joint Staff Deputy Director for Antiterrorism/Homeland Defense (DDAT/HD) Secure Internet
Protocol Network (SIPRNET) sites or via the Antiterrorism Enterprise Portal (ATEP):
//www.atep.smil.mil.
Thomas W. O’Connell
Page
Foreword 2
Table of Contents 4
Figures 11
Tables 12
References 13
C1.1. Introduction 16
C1.2. The DoD Antiterrorism Program 20
C1.3. DoD AT Policy and this Handbook 24
C1.4. Definitions 24
C1.5. Abbreviations and Acronyms 30
C3.1. Introduction 48
C3.2. Authority for Handling Terrorist Incidents 48
C4.1. Introduction 54
C4.2. Overview 54
C4.3. AT Risk Management Processes 54
C4.4. AT Risk Management Elements 55
C4.5. Mitigation Options 56
C4.6. AT Risk Management Process Application Guidelines 56
C6.1. Introduction 77
C6.2. Conducting the Criticality Assessment 77
C7.1. Introduction 80
C7.2. The Vulnerability Assessment Process 80
C7.3. Process Tools 81
C7.4. Vulnerability Matrix 82
C8.1. Introduction 83
C8.2. Risk Assessment Methodology 83
C8.3. Assessing Risk -- A Practical Exercise 84
C8.4. Risk Assessment 86
C8.5. Completing the Process -- Risk Management 87
C9.1. Introduction 89
C9.2. The AT Plan and the AT Program 89
C9.3. AT Plan Requirements 89
C9.4. AT Plan Development 91
C10.1. Introduction 94
C10.2. Force Protection Conditions (FPCONs) 94
5
TABLE OF CONTENTS—Continued
TABLE OF CONTENTS—Continued
CHAPTER 17 - TECHNOLOGY
TABLE OF CONTENTS—Continued
TABLE OF CONTENTS—Continued
C22.20. Security Comparisons Between Single and Multiple Family Residences 272
C22.21. Supplemental Residential Security Measures for High Risk Billets 276
(HRB) and High Risk Personnel (HRP)
CHAPTER 23 – BARRIERS
10
Figure Title
Page
C1.F1. U.S. Marine Headquarters Bombing, Beirut, Lebanon, 16
October 1983
C1.F2. Khobar Tower Complex Bombing, Dhahran, Saudi Arabia, 17
June 1996
C1.F3. U.S. Embassy Bombing, Nairobi, Kenya, August 1998 17
C1.F4. U.S. Embassy Bombing, Dar Es Salaam, Tanzania, August 1998 17
C1.F5. USS COLE bombing, Port of Aden, Yemen, October 2000 18
C1.F6. World Trade Center and Pentagon Attacks, September 2001 19
C1.F7. Sample Antiterrorism Organizational Concept 21
C2.F1. DoD Antiterrorism Coordinating Committee 47
C8.F1. Example of Risk Assessment 86
C9.F1. Sample Portion of a Pre-incident Action Set Matrix for FPCON 92
NORMAL
C12.F1. DoD Management of Terrorist Incident 121
C13.F1. Players Start a Tabletop Exercise 127
C13.F2. Security Forces Conduct a Drill 127
C13.F3. Observer/Controllers Discuss an Exercise with Player Personnel 128
C13.F4. Life Cycle of the AT Exercise Program 132
C16.F1. Interrelationship and Categories for Appropriate Resource Justification 150
C16.F2. Unfunded Requirements Submission Process 158
C18.F1. Antiterrorism Training Concept 165
C22.F1. A Layered Approach to Protection of DoD Assets 232
C22.F2. High-Security Example of the Layered Security Concept 233
C22.F3. Generic Pedestrian Access Control Point 251
C22.F4. Installation of a Sewer Pipe Slug 252
C22.F5. Waterside Terrorist Surveillance and Engagement Zones 262
C22.F6. Reception Area to Access Controlled Facility 265
C22.F7. Safehaven Concept Implemented in a High-Rise Office Building 268
C22.F8. Safehaven Concept Including Residence Hall Security Barrier 278
C23.F1. “Serpentine” Moving Vehicle Barrier 290
C24.F1. Understanding the Range of Threat Possibilities 301
C24.F2. Defense in Depth 302
C24.F3. Key Inputs to Security Engineering Design Criteria 303
C24.F4. Protective Measure Development 303
AP2.F1. Example MSHARPP Matrix 325
11
12
(a) DoD Directive 2000.12, “DoD Antiterrorism (AT) Program,” August 18, 2003
(b) DoD O-2000.12-H, “Protection of DoD Personnel and Activities Against Acts of Terrorism
and Political Turbulence,” February 1993 (hereby canceled)
(c) DoD 5400.7-R, “DoD Freedom of Information Act Program, ” 4 September, 1998
(d) Joint Publication 1-02, “Department of Defense Dictionary of Military and Associated
Terms,” June 5, 2003
(e) DoD Instruction 2000.16, “DoD Antiterrorism Standards,” June 14, 2001
(f) Section 1072(2) of Title 10, United States Code
(g) White House Report, “The National Strategy for Combating Terrorism,” February, 20031
(h) Presidential Decision Directive -39 (PDD-39), “U.S. Policy on Counterterrorism (U),” June
21, 19952
(i) Antiterrorism and Effective Death Penalty Act of 1996, Pub. L. No. 104-132, April 24,
1996
(j) Presidential Decision Directive -62 (PDD-62)3
(k) Section 129, Atomic Energy Act of 1954 as amended (public Law 83-703)4
(l) Section 304, 309, Nuclear Nonproliferation Act of 1978 (Public Law 95-242)5
(m) DoD Directive 5210.56, “Use of Deadly Force and the Carrying of Firearms by DoD
Personnel Engaged in Law Enforcement and Security Duties,” November 1, 2001
(n) DoD Directive 3025.15, “Military Assistance to Civil Authorities” February 18, 1997
(o) DoD Directive 5525.5, “DoD Cooperation with Civilian Law Enforcement Officials,”
January 15, 1986
(p) DoD Directive 5525.7, “Implementation of the Memorandum of Understanding between
the Department of Justice and Department of Defense relating to the Investigation and
Prosecution of Certain Crimes,” January 22, 1985
(q) Sections 4801-4805 of Title 22, United States Code6
(r) FM 3-100.12, “Risk Management - Multi-service Tactics, Techniques, and Procedures for
Risk Management,” February 15, 2001
(s) Executive Order 12333, “United States Intelligence Activities,” December 4, 1981
(t) DoD 5240.1-R, “Procedures Governing the Activities of DoD Intelligence Components
That Affect United States Persons,” December 1982
(u) DoD Directive 5200.27, “Acquisition Of Information Concerning Persons And
Organizations Not Affiliated With The Department Of Defense,” January 7, 1980
(v) Public Law 101-604, “Aviation Security Improvement Act of 1990”
(w) DoD Directive 5160.54 “Critical Asset Assurance Program (CAAP),” January 20 1998
(x) DoD “Antiterrorism Force Protection Installation Planning Template,” June 1, 1998
13
14
15
C1.1. INTRODUCTION
C1.1.1. Terrorism is “the calculated use of unlawful violence or threat of unlawful violence
to inculcate fear; intended to coerce or to intimidate governments or societies in the pursuit of
goals that are generally political, religious, or ideological” (JCS Pub 01-2 (reference (d)).
Department of Defense (DoD) personnel, facilities, and materiel, Symbols of the U.S.
Government, are identifiable targets for terrorists seeking to change U.S. policies at home or
abroad. DoD personnel are the largest contingent of U.S. representatives overseas.
C1.1.2. History has shown that DoD
personnel and facilities make lucrative targets Figure C1.F1. The U.S. Marine Headquarters in
Beirut, Lebanon, following a truck-bomb
for terrorist attack. The future predicts little explosion in late October 1983.
change. Attacks on DoD personnel and
facilities by individuals and organizations
operating outside the formal command and
control structure of national governments have
claimed many lives; the cost to the U.S.
Government is measured in millions of dollars.
C1.1.3. The destruction of the U.S. Marine
Headquarters at the Beirut International Airport
in October 1983 was the greatest loss of
American military personnel attributed to a
single terrorist act. Although there were many
lessons learned from this devastating attack,
several subsequent attacks have been
successfully carried out against the Department
of Defense and other U.S. Government
personnel at home and abroad.
16
C1.1.4. In June 25, 1996, terrorists struck again by bombing the Khobar Towers complex in
Dhahran, Saudi Arabia. This watershed event took the lives of 19 American service personnel
and injured more than 500. In the aftermath of Khobar Towers, extensive policy changes were
made, antiterrorism (AT) standards were developed, and training programs were formalized
laying the foundation for the Department of Defense's AT program that we have today.
Figure C1.F2. A massive bomb gutted Building 131 in the Khobar Towers Complex in
Dhahran, Saudi Arabia, on June 25, 1996, killing 19 U.S. Service members and
injuring hundreds of others.
Figure C1.F3. The aftermath of a Figure C1.F4. The U.S. Embassy bombing
vehicular bombing of the U.S. Embassy in Dar es Salaam, Tanzania occurred five
in Nairobi, Kenya, August 7, 1998. minutes after the attack in Nairobi, Kenya.
17
C1.1.5. On August 7, 1998, nearly simultaneous bomb explosions at the U.S. Embassies in
Nairobi, Kenya, and Dar es Salaam, Tanzania, resulted in significant loss of life. The two
explosions killed more than 300 people, including 12 U.S. Government employees and family
members, and injured more than 4,000 Kenyans, Tanzanians, and Americans. These attacks
brought attention to gaps in the physical security and construction standards in our U.S.
Embassies overseas. It also highlighted the improved capabilities of terrorists to plan for and
strike at two different targets simultaneously. As a result, the U.S. invested resources to reduce
the vulnerability of U.S. diplomatic missions around the world to terrorist attacks.
C1.1.6. On October 12, 2000, the USS COLE was attacked in the Port of Aden when an
explosive-laden boat detonated abeam her port side. This tragic event resulted in the death of 17
and wounding of 42 sailors.
18
Figure C1.F6. World Trade Center towers and the Pentagon moments after being struck
by hijacked airliners on September 11, 2001.
C1.1.7. The morning of September 11, 2001 marks the worst terrorist strike against the
United States to date. Within minutes of each other, three sky-jacked commercial airliners,
piloted by suicidal Islamic extremists, crashed into both towers of the World Trade Center in
New York City and the Pentagon in Washington DC. Although the exact number of casualties
as a result of the September 11 terrorist attacks shall never be known, 3044 people are presumed
dead.
C1.1.8. All these major attacks, as shown in Table C1.T1., demonstrate that terrorism
continues to evolve, striking at the gaps and seams in our AT defense. The Department of
Defense’s AT effort is outlined in DoD Directive 2000.12 and DoD Instruction 2000.16
(references (a) and (e)). Together with this Handbook, these three cornerstone documents form a
family of documents designed to provide commanders and antiterrorism officers (ATOs) at all
levels with guidance on AT policy, standards, tactics, techniques, and procedures. Service,
Combatant Command, DoD Agency and local directives complement cornerstone documents
and enhance AT programs at every echelon. The capstone for an echelon's AT program is the
sound leadership and judgment provided by that echelon's military commander or civilian
equivalent.
19
WTC
World Trade Oklahoma Khobar
Beirut East Africa USS COLE &
Center City Tow ers
Pentagon
Perceived Small Pierside
Sniper None None Small Bomb Truck Bomb
Threat Bomb Attack
Delivery
Truck Van Truck Truck Vans Boat Airplane
Method
C1.2.1.2. The AT program incorporates all defensive measures used to reduce the
vulnerability of individuals and property to terrorist acts to include limited response and
containment by local forces.
C1.2.1.3. It's essential to stress from the beginning that the effectiveness of any program
is directly impacted by a commander's emphasis of the importance of his or her program,
regardless of the level of command. The checklist found at Appendix 1 helps commanders and
ATOs in determining the effectiveness of their AT program.
20
AT Organization
Commander AT Officer
Advise the Commander
AT Committee
Develop strategy
Provide guidance, direction, and coordination
TWG
AT Working Groups Integrate Intel-OPS
Take action, provide input and feedback Assess threats
Generate or pass warning
C1.2.2. The figure above depicts a typical Antiterrorism organization at the installation
level, though the need for both an AT Committee and AT Working Groups depends on the size
and complexity of the facilities being protected. Regardless of size, every program needs a
proactive Threat Working Group (TWG). Terms such as Antiterrorism Committee (ATC) are
generic and differ from one theater to another, but their functions remain similar independent of
labels.
C1.2.3. ATC. The ATC meets at the Commander/Senior Executive level to: address policy
issues; make risk and other AT decisions; supervise and steer subordinate AT efforts; and review
the AT program.
C1.2.4. Antiterrorism Working Group (ATWG). The ATWG meets at the Action Officer
level to: develop and recommend policy; prepare planning documents; conduct criticality,
vulnerability, and risk assessments.
21
C1.2.5. TWG. The TWG consists of the ATO, Counterintelligence (CI) representative, Law
Enforcement representative, Information Operations representative and the Chemical, Biological,
Radiological, Nuclear and High Yield Explosive (CBRNE) representative. Larger installations
may include additional personnel as assigned by their commander. Installation commanders that
take an active role engaging local, state and federal law enforcement officials can obtain their
input for the installation’s TWG. In the United States and its territories, local installations must
obtain local terrorist threat information by querying the FBI through the installation’s law
enforcement liaison, local law enforcement, and other Federal Agencies. All members shall need
applicable security clearances and access (unlike the remainder of the ATC or ATWG). The
TWG meets periodically and/or as required to:
22
23
C1.3.3. This Handbook, where necessary, directs readers to additional references that
provide subject matter depth beyond the scope of this document. Additionally, Appendix 9
offers numerous website links for further reference.
C1.4. DEFINITIONS
C1.4.1. Reference (d) provides approved DoD terminology for general use by all DoD
components. The following definitions supplement reference (d) until updated.
C1.4.1.1. Antiterrorism (AT). Defensive measures used to reduce the vulnerability of
individuals and property to terrorist acts, to include limited response and containment by local
military and civilian forces.
C1.4.1.2. AT Officer (ATO). The installation, base, regional, facility, or deploying unit
AT advisor charged with managing the AT Program.
C1.4.1.3. AT Plan. The specific measures taken to establish and maintain an AT
Program.
C1.4.1.4. AT Planning. The process of developing specific guidance and execution-
oriented instructions for subordinates.
C1.4.1.5. AT Program. One of several security-related programs that fall under the
overarching Combating Terrorism (CbT) programs that is a collective, proactive effort focused
on the prevention and detection of terrorist attacks against DoD personnel, their families,
24
C1.4.1.8. AT Threat Assessment. The process used to conduct a threat analysis and
develop an evaluation of a potential terrorist threat. Also, it is a product of a threat analysis for a
particular unit, installation, or activity.
25
terrorist attack. Identifies areas of improvement to withstand, mitigate, or deter acts of violence
or terrorism.
C1.4.1.10.2. The process the commander uses to determine the susceptibility to
attack from the full range of threats to the security of personnel, family members, and facilities,
which provide a basis for determining antiterrorism measures that can protect personnel and
assets from terrorist attacks.
C1.4.1.11. Combating Terrorism (CbT). In the Department of Defense all actions,
including antiterrorism (defensive measures taken to reduce vulnerability to terrorist acts),
counterterrorism (offensive measures taken to prevent (preempt), deter (disrupt), and respond to
terrorism), terrorism consequence management (preparation for and response to the
consequences of a terrorist incident/event), and intelligence support (collection and
dissemination of terrorism-related information), taken to oppose terrorism throughout the entire
threat spectrum, including terrorist use of chemical, biological, radiological, nuclear materials, or
high-yield explosive (CBRNE) devices.
26
(e.g. industrial or infrastructure critical assets), domestic or foreign, whose disruption or loss
would render DoD critical assets ineffective or otherwise seriously disrupt DoD operations.
Critical assets include traditional “physical” facilities and equipment, non-physical assets (such
as software systems), or “assets” that are distributed in nature (such as command and control
networks, wide area networks or similar computer-based networks).
C1.4.1.16. Critical Infrastructure. Infrastructure deemed essential to DoD operations or
the functioning of a Critical Asset.
C1.4.1.17. Critical Infrastructure Protection. DoD program to identify and protect assets
critical to the Defense Transportation System. Loss of a critical asset would result in a failure to
support the mission of a combatant commander. Assets include worldwide DoD, commercial,
and civil physical and command, control, communications, computers, and intelligence
infrastructures.
C1.4.1.18. Defense Contractor. Any individual, firm, corporation, partnership,
association, or other legal non-Federal entity that enters into a contract directly with the
Department of Defense to furnish services, supplies, or both, including construction. Thus,
Defense contractors may include U.S. nationals, local citizens, or third country nationals.
Defense contractors do not include foreign governments or representatives of foreign
governments that are engaged in selling to the Department of Defense or a DoD Component or
foreign corporations wholly owned by foreign governments.
C1.4.1.19. Defense Criminal Investigative Organizations (DCIO). The U.S. Army
Criminal Investigation Command (USACIDC), the Naval Criminal Investigative Service
(NCIS), the Air Force Office of Special Investigations (AFOSI), and the Defense Criminal
Investigative Service (DCIS) are the four DoD law enforcement organizations that make up the
DCIOs. These agencies have law enforcement investigative responsibilities for federal felony
offenses committed against the DoD and its Military Branches and are all members of the
regional Joint Terrorism Task Forces (JTTF) and the National-JTTF.
C1.4.1.20. Duress System. A system that can covertly communicate a situation of duress
(hostile, hostage, security compromised) to a security control center, or to other personnel who
can notify a security control center.
C1.4.1.21. Emergency CbT-RIF Requirement. An unanticipated requirement created by
a combination of circumstances or the resulting state that requires immediate action to prevent,
deter, or respond to a terrorist act.
27
28
C1.4.1.33. Terrorist Group. Any element, regardless of size or espoused cause, that
commits unlawful acts of violence or threatens unlawful violence in pursuit of its political,
religious, or ideological objectives.
C1.4.1.34. Terrorist Threat Level. An intelligence threat assessment of the level of
terrorist threat faced by U.S. personnel and interests. The assessment is based on a continuous
intelligence analysis of a minimum of four elements: terrorist group operational capability,
intentions, activity, and operational environment. There are four threat levels: LOW,
MODERATE, SIGNIFICANT, and HIGH. Threat levels should not be confused with FPCONs.
Threat level assessments are provided to senior leaders to assist them determine the appropriate
local FPCON.
C1.4.1.35. Vulnerability.
C1.4.1.35.1. In antiterrorism, a situation or circumstance, if left unchanged, that may
result in the loss of life or damage to mission-essential resources.
C1.4.1.35.2. The susceptibility of a nation or military force to any action by any
means through which its war potential or combat effectiveness may be reduced or its shall to
fight diminished.
C1.4.1.35.3. The characteristics of a system that cause it to suffer a definite
degradation (incapability to perform the designated mission) as a result of having been subjected
to a certain level of effects in an unnatural (manmade) hostile environment.
C1.4.1.35.4. In information operations, a weakness in information system security
design, procedures, implementation, or internal controls that could be exploited to gain
unauthorized access to information or an information system.
29
30
31
32
33
System
C1.5.1.106. PS Physical Security
C1.5.1.107. PSD Protective Security Detail
34
35
36
C2. CHAPTER 2
U.S. GOVERNMENT POLICY, STRATEGY, AND ORGANIZATION
TO COMBAT TERRORISM
C2.1.1.5. Be victorious in the war against terror no matter how long it takes.
C2.1.2. Measures to CbT. To ensure that the United States is prepared to CbT in all its
forms, a number of measures have been directed. AT measures (defensive measures taken to
reduce vulnerability to terrorist acts) and counterterrorism (CT) measures (offensive measures
taken to prevent (preempt), deter (disrupt), and respond to terrorism). These include:
37
38
over time degrade, and ultimately destroy the terrorist organizations. The strategy has several
elements:
C2.2.1.1. The United States, with its ability to build partnerships and project power, shall
lead the fight against terrorist organizations of global reach.
C2.2.1.2. Strike terrorist groups constantly to ensure that terrorists have no place to hide,
to compress their scope, and reduce their capability.
C2.2.1.3. Adapt old alliances and create new partnerships to facilitate regional solutions
that further isolate the spread of terrorism.
C2.2.1.4. As the scope of terrorism becomes more localized, unorganized, and relegated
to the criminal domain, the United States shall rely upon and assist other states in eradicating
terrorism at its root.
C2.2.1.5. The United States shall constantly strive to enlist the support of the
international community, however the United States shall not hesitate to act alone, to exercise the
right of self defense, including acting preemptively against terrorists to prevent them from doing
harm to U.S. citizens.
C2.2.2. Enactment of the Antiterrorism and Effective Death Penalty Act of 1996 (reference
(i)) makes it much easier for the U.S. Government to assert extraterritorial jurisdiction and seek
extradition (by cooperation or coercive techniques) of alleged terrorists.
C2.2.3. The U.S. Government has implemented a “4D” Strategy (Defeat, Deny, Diminish
and Defend) to prosecute the Global War on Terrorism.
C2.2.3.1. The first goal “ Defeat Terrorists and their Organizations” entails defeating
terrorist organizations of global reach through the direct or indirect use of diplomatic, economic,
information, law enforcement, military, financial, intelligence, and other instruments of power.
The supporting objectives include:
C2.2.3.1.1. Defeat terrorists and their organizations.
C2.2.3.1.2. Identify terrorists and their organizations.
C2.2.3.1.3. Locate terrorists and their organizations.
C2.2.3.1.4. Destroy terrorists and their organizations.
C2.2.3.2. The second goal “Deny Sponsorship, Support, and Sanctuary to Terrorists”
focuses on the responsibilities of all States to fulfill their obligations to CbT both within their
39
borders and internationally. The United States shall target assistance to those States that are
willing to combat terrorism, but may not have the means. When States prove reluctant or
unwilling to meet their international obligations to deny support and sanctuary to terrorists, the
United States, in cooperation with friends and allies (or if necessary acting independently), shall
take appropriate steps to convince them to change their policies. The supporting objectives
include:
C2.2.3.2.1. End the State sponsorship of terrorism.
C2.2.3.2.2. Establish and maintain an international standard of accountability with
regard to combating terrorism.
C2.2.3.3.2. Win the war of ideas. Together with the international community, wage a
war of ideas to make clear that all acts of terrorism are illegitimate, to ensure that the conditions
and ideologies that promote terrorism do not find fertile ground in any nation, to diminish the
underlying conditions that terrorists seek to exploit in areas most at risk, and to kindle the hopes
and aspirations of those in societies ruled by the sponsors of terrorism.
40
C2.2.3.4. The fourth goal “Defend U.S. Citizens and Interests at Home and Abroad”
encompasses the nation’s collective efforts to defend the United States’ sovereignty, territory,
and its national interests, at home and abroad. This goal includes the physical and cyber
protection of the United States, its populace, property, and interests, as well as the protection of
its democratic principles. The supporting objectives include:
C2.2.3.4.1. Implement the National Strategy for Homeland Security.
C2.2.3.4.2. Attain domain awareness.
C2.2.3.4.3. Enhance measures to ensure the integrity, reliability, and availability of
critical physical and information-based infrastructures at home and abroad.
The U.S. Government has developed a formal structure to provide policy guidance and
programmatic coordination of efforts to combat terrorism both at home and abroad. As the DoD
Components may be required to provide support to other U.S. Government agencies, knowledge
of the institutional framework within which such support and cooperation must be provided shall
help commanders discharge their responsibilities effectively.
C2.3.1. The National Security Council (NSC) Policy Coordinating Committee (PCC) for
Counterterrorism and National Preparedness.
C2.3.1.1. The Assistant to the President for National Security Affairs chairs the NSC
PCC for Counterterrorism and National Preparedness. This PCC has a standing committee
consisting of representatives of the following agencies and departments:
C2.3.1.1.1. Department of State (DOS).
41
42
the U.S. Government considers exercising extraterritorial jurisdiction. The FBI also carries out
the following responsibilities:
C2.3.1.2.2.1.1. Maintains civilian counterterrorism capabilities, which can be
used in response to criminal or terrorist incidents within the United States, its territories, and its
possessions.
C2.3.1.2.2.1.2. Conducts assessments and evaluations of aviation security
measures and practices with the TSA.
C2.3.1.2.2.1.3. Collects, analyzes, and disseminates domestic terrorism threat
information and warning, and supports other intelligence collection and analysis organizations
responsible for international terrorism threat analysis.
C2.3.1.2.2.1.4. Provides scientific, technical, forensic, and investigative
assistance to other Federal and State agencies in investigating criminal acts that may be terrorist
in character.
C2.3.1.2.2.1.5. Provides technical assistance to foreign law enforcement and
prosecutorial agencies.
C2.3.1.2.2.1.6. Disseminates information to the general public regarding
terrorist threats within CONUS, U.S. territories, and U.S. possessions.
43
critical infrastructure, and coordinate responses for emergencies. Beside the five directorates,
several agencies are part of the DHS.
C2.3.1.2.3.1. The U.S.C.G. Generally responsible for security within U.S. ports
and navigable waterways and for the development and implementation of security standards
regarding terrorist attacks on maritime activities, including assaults on passenger ships, cargo
vessels, and navigation aids. It is the lead U.S. Government agency whenever terrorist incidents
affecting U.S. citizens on passenger or cargo vessels occur. In the event that a terrorist incident
occurs on a moored U.S. Navy ship within an U.S. non-Navy port, or a Navy port without
organic security forces, the Coast Guard shall form a security perimeter around the vessel both
on land and in the water. The U.S. Navy shall have responsibility for regaining control of the
ship and releasing hostages.
C2.3.1.2.3.2. The U.S. Secret Service. Involved in those aspects of the U.S.
Government’s efforts to combat terrorism related to the protection of the President, the Vice
President, members of their families, and other individuals for whom it provides security. It is
involved in the collection, analysis, and dissemination of information regarding potential terrorist
threats. It also participates in S & T projects related to personnel protection, explosive
detection, and other subjects of special interest.
C2.3.1.2.3.3. Bureau of Citizenship and Immigration Services. Provides
information to other Federal Agencies and departments on international movements of persons
who seek entry into the United States even though they may not be eligible for entry (for
example, ex-felons). It also provides information on those individuals who have previously been
denied entry into the United States, have previously been deported, or have previously been
thwarted in their attempts to enter or remain unlawfully in the United States.
C2.3.1.2.3.4. The U.S. Customs and Border Patrol. The U.S. Customs and
Border Patrol has multiple roles in the U.S. Government’s AT efforts. It shall:
44
45
References (a) and (e) are two primary documents that implement the DoD AT program.
Reference (a) establishes the Chairman of the Joint Chiefs of Staff as the principal military
advisor and focal point to the Secretary of Defense for all DoD AT issues. It also defines the AT
responsibilities of the Military Departments, the Commanders of the Combatant Commands, and
the Defense Agencies for DoD activities in their respective organizations. Reference (e)
provides further guidance and standards for the execution of reference (a). Specific roles and
responsibilities are prescribed in detail in these directives.
46
47
C3. CHAPTER 3
THE DoD ANTITERRORISM PROGRAM:
LAW AND REGULATION
C3.1. INTRODUCTION
The DoD AT program sets forth DoD policy to deter, defeat and respond vigorously to all
terrorist attacks. All terrorism acts are a potential threat to national security. The DoD AT
program conforms with international and domestic law, and is based upon DoD authority and
policy and is further implemented by policies issued by the Services and the Combatant
Commanders.
C3.2. AUTHORITY FOR HANDLING TERRORIST INCIDENTS
C3.2.1. Commander’s Responsibilities Inside The United States, Its Territories and
Possessions.
C3.2.1.1. Although the FBI has primary law enforcement responsibility for terrorist
incidents inside the United States (including its possessions and territories) and the DoD LECIC
has a significant role within departmental areas of jurisdiction, commanders are nevertheless
responsible for maintaining law and order on DoD installations and vessels. The Commanders'
AT plans should address the use of security forces to isolate, contain and neutralize a terrorist
incident within the capability of the commander’s resources. The DoD Commanders have the
inherent authority and obligation to defend their units and other U.S. units in the vicinity from
terrorist incidents wherever they occur. Terrorist incidents involving attacks on DoD personnel,
facilities, or assets are unlawful acts, which trigger the need to establish legal responsibility and
authority for three separate but related activities:
C3.2.1.1.1. Immediate response, containment, and resolution of an incident.
C3.2.1.1.2. Investigation of an incident for various purposes, to include prosecuting
alleged perpetrators.
C3.2.1.1.3. Prosecution of the alleged perpetrators.
C3.2.1.2. Table C3.T1. summarizes the responsibilities of the Department of Defense for
response, investigation, and prosecution of all terrorist incidents that may involve DoD
personnel, facilities, or assets.
48
DoD installation DoD military Initially DoD DoD Security FBI and DoD DOJ and DoD
or vessel within and/or civilian Military and/or Organizations, Criminal Office of Military
the United security forces civilian security Military Investigative Commissions for
States, its forces, with Emergency Task Force prosecuting military
territories and transition to FBI Service Team/ (CITF) for commission
possessions or civilian law Special military pursuant to
enforcement Reaction Team commission President’s Military
dependent on or FBI or other crimes Order of November
jurisdiction appropriate 13, 2001.
civilian law
enforcement
dependent on
jurisdiction
DoD Personnel Local law Local law Local law Local law Local state’s attorney
Off-Base (not on enforcement; enforcement; enforcement; enforcement for for prosecuting state or
installation or FBI (Military FBI FBI state or local local law violations;
vessel) within forces retain law violations; DOJ for prosecuting
the United their inherent FBI for Federal Federal law violations;
States, its right to self- law violations; and DoD Office of
territories and defense) and DoD CITF Military Commissions
possessions for military for prosecuting
commission military commission
crimes pursuant to President’s
Military Order of
November 13, 2001.
49
DoD installation U.S. military U.S. military Host Host Host Government
or vessel and/or civilian and/or civilian Government Government for for prosecuting
overseas security forces security forces security forces violation of host violation of host
and/or host and/or host supported by nation laws; laws; DOJ for
Government Government U.S. military in DOJ for prosecuting Federal
security forces in security forces in accordance with violations of law violations; and
accordance with accordance with SOFA U.S. law; and DoD Office of
SOFA SOFA DoD CITF for Military
military Commissions for
commission prosecuting military
crimes commission
pursuant to
President’s Military
Order of November
13, 2001.
50
C3.2.1.3. In the United States, installation and vessel commanders shall provide initial
and immediate response to any incident occurring on military installations or vessels to isolate
and contain the incident. The use of force within the United States, its territories and possessions
is governed by the DoD use of force policy contained in DoD Directive 5210.56 (reference (m)).
In the event of a terrorist incident, the installation or vessel commanders must notify appropriate
Federal or State civilian law enforcement authorities as soon as possible. This includes notifying
the DoD Criminal Investigative Task Force regarding acts of terrorism and war crimes
committed in the United States Central Command area of operations. Primary responsibility for
investigating many of the most serious crimes on U.S. Government property shall normally rest
with the DOJ.
C3.2.1.4. The Department of Defense may provide support to State and/or Federal law
enforcement agencies in response to civil disturbances or terrorist incidents occurring outside
DoD installations or vessels. Relevant regulations include DoD Directive 3025.15, DoD
Directive 5525.5, and DoD Directive 5525.7 (references (n), (o), and (p)).
C3.2.1.5. DoD installation commanders may request assistance from the FBI in resolving
an incident in those circumstances in which the FBI has superior tactical assets. Such assets
include regional Special Weapons and Tactics (SWAT) units or the Hostage Rescue Team. In
the event that FBI assistance is requested and provided, the FBI shall be the Primary Federal
Agency (PFA) for the purpose of concluding the incident. If requested and subject to OSD
approval, DoD commanders may provide support to the FBI. Military personnel, however, shall
always remain under the command and control of the military chain of command. If military
forces are employed during a tactical response to a terrorist incident, the military commander
retains command responsibility of those forces. In the event that FBI assistance is requested and
provided, the DoD installation commander should immediately expedite a request naming the
FBI as the PFA. Command relationships should be addressed as part of the request for
assistance.
C3.2.1.6. Attacks on DoD personnel or assets within the United States, its territories and
possessions outside DoD facilities or vessels are to be contained and resolved by state and
federal law enforcement. Limited exceptions to this rule may occur when incidents involve DoD
units outside a DoD installation or vessel and immediate action is necessary to protect DoD
personnel and property from immediate threat of injury before local law enforcement or the FBI
can respond.
51
C3.2.2. Commander’s Responsibilities Outside the United States, its Territories and
Possessions
C3.2.2.1. For foreign incidents, the installation or vessel commander’s responsibilities
are the same as for domestic incidents—with the added requirement to notify the cognizant U.S.
embassy. DOS notification is made at the geographic Combatant Commander level for incidents
on U.S. facilities or vessels outside the United States, its territories and possessions. The
commander is responsible to respond and contain the incident as quickly as possible in order to
protect DoD personnel and property from immediate threat of injury. The DOS has the primary
responsibility for dealing with terrorism involving Americans abroad. The installation or vessel
commander should also implement any provisions of the SOFA or other agreements between the
United States and the host Government relevant to the incident.
C3.2.2.2. The host Government may provide forces to further contain and resolve the
incident in accordance with its obligations under international law, the SOFA and other relevant
agreements. If the U.S. Government asserts a prosecutorial interest, such as extradition, the DOJ
shall assume lead agency responsibilities for liaison and coordination with host nation law
enforcement and prosecutorial agencies.
C3.2.2.3. The inherent right of self-defense, as reflected in the Standing Rules of
Engagement, still applies in situations off-base or off-vessel in foreign areas. If U.S. forces are
actually under attack, they retain the inherent right to respond with proportionate, necessary
force until the threat is neutralized. This is providing that the host nation is unwilling or unable
to respond to the threat in sufficient time or with appropriate means. The host Government
should take appropriate action to further contain and resolve the incident in accordance with its
obligations under international law as well as any applicable SOFA or other international
agreement. U.S. military assistance, if any, depends on the applicable SOFA and other
international agreements. Such assistance shall be coordinated through the U.S. Embassy.
Unless immediate action is necessary to protect DoD personnel and property from immediate
threat of injury, no U.S. military assistance may be provided to assist a host Government without
direction from the Department of Defense, and in coordination with the DOS. The degree of the
involvement of U.S. military forces depend on the following:
52
53
C4. CHAPTER 4
AT RISK MANAGEMENT FUNDAMENTALS
C4.1. INTRODUCTION
In AT, risk is viewed as the probability and severity of loss, linked to terrorist threats. Risk
management assists AT decision-makers in reducing or offsetting terrorist attack effects. The
risk management process is used by Commanders to identify, assess, and control risks arising
from operational factors and helps in making decisions that balance risk cost with mission
benefits. Commanders can use the risk management process information to determine which
assets require the most protection and where future expenditure is required to minimize risk of
attack, or lessen the severity of the outcome of such an attack. Risk management does not
replace sound decision making, nor does it remove risk altogether, or support a zero defect
mindset.
C4.2. OVERVIEW
It is beyond the scope of this Handbook to provide a consolidated multi-service process
addressing risk management background, principles, and application procedures. Users needing
in-depth risk management information should consult the “Risk Management Multi-service
Tactics, Techniques, and Procedures for Risk Management” (reference (r)), and/or applicable
Service/Combatant Command/Agency guidance. This Handbook does provide a better general
understanding of the risk management concept and process, as it relates to the AT mission.
Included in the AT risk management process chapters are specific procedures to help any
commander or ATO reduce or offset AT risks in order to enhance operational capabilities and
mission accomplishment, with minimal acceptable loss.
C4.3. AT RISK MANAGEMENT PROCESSES.
C4.3.1. The AT risk management process generally follows multi-service tactics, techniques,
and procedures for tactical level risk management in the planning and execution of operations.
The process has two levels of application: deliberate and crisis action. Available time to
complete the process is the basic factor that shall determine the level of application. Deliberate
AT risk management allows the application of the complete process when time is not critical.
Crisis AT risk management is conducted immediately previous to or after a terrorist attack, by
doing a mental or verbal review of the situation using the basic AT risk management process.
Key steps of the risk management process include:
54
C4.4.1. Threat Assessment (TA). The TA should identify the terrorist threat. For each
group that may be a threat, the assessment provides information on the group’s intent, capability,
and history as well as any specific targeting information that may be available. The TA process
is further discussed in Chapter 5.
C4.4.2. Criticality Assessment. This is done to determine which assets need to be protected.
The criticality assessment determines the importance of each asset, the effect of a terrorist attack
on the assets, and the recoverability of the asset from attack. The criticality assessment process
is further discussed in Chapter 6.
C4.4.3. VA. The VA evaluates and determines the vulnerability to a terrorist attack of an
installation, unit, exercise, port, ship, residence, facility, or other site. It assesses each asset and
identifies shortfalls or weaknesses that make the asset vulnerable, determines if existing
countermeasures are effective, and prioritizes these vulnerabilities. The VA process is further
discussed in Chapter 7.
C4.4.4. Risk Assessment. The Risk Assessment combines the criticality, threat, and
vulnerability rating given to each asset and unwanted event. It uses the theory that in order for
there to be risk, each one of the elements (Criticality, Threat, and Vulnerability) must be present
therefore Risk = Criticality x Threat x Vulnerability. Risk is based on the value of the asset in
relation to the threats and vulnerabilities associated with it. Risk is derived by combining the
55
relative impact of any loss or damage to an asset (Criticality) with the relative probability of an
unwanted event (Threat x Vulnerability).
C4.5. MITIGATION OPTIONS.
C4.5.1. To complete the risk analysis, mitigation options must be identified in order to
develop controls, make decisions, implement controls, supervise and review. Developing
controls and executing the remaining elements, are essential follow-through actions of the AT
risk management process. Commanders weigh risk versus benefits and make and/or implement
decisions to eliminate unacceptable levels of risk. After identifying and implementing additional
countermeasures or mitigation efforts, it is prudent to recalculate the risk.
C4.5.2. The cost and effectiveness of each countermeasure should be identified so that the
decision-maker can see the cost and benefit of each option. Acceptable risks should be
communicated to subordinates. Commanders and all individuals involved in the AT risk
management process then evaluate the effectiveness of applied controls and capture lessons
learned.
56
commander is properly advised of residual AT threats and risks that remain after implementing
all available controls.
C4.7.2. When more than one threat is identified (terrorists, enemy, environment, diseases,
etc.), the Overall Residual Risk must be determined. The residual risk of each threat shall have
different levels depending on the assessed threat probability and the severity of the outcome if it
were to happen.
C4.7.3. Overall residual risk should be determined based on the threat having the greatest
residual risk. Determining overall mission risk by averaging the risks of all threats is incorrect.
If the residual terrorist threat is high, the overall residual risk is high no matter how many
moderate or low risk threats are present in the other categories.
C4.7.4. The Chief of Staff, Executive Officer, or Deputy Director is usually assigned
responsibility for supervising the integration of risk management across the spectrum. As a
means of assessing and monitoring threats, commanders may establish an ATWG or Force
Protection Working Group (FPWG). The purpose of the ATWG/FPWG is to review threats,
identify vulnerabilities, recommend countermeasures, recommend FPCONs and positioning of
response forces, review tasks to components, monitor corrective actions, and direct special
studies (force protection assessment teams). In the absence of an ATWG/FPWG, the Chief of
Staff should at a minimum, integrate personnel and resources from the following areas/staff
sections to facilitate the AT risk management process.
C4.7.4.1. Personnel. Obtain personnel deployment flows; estimate casualty risks, project
casualty and replacement flows; determine controls for personnel related activities; and estimate
risks of employed local civilian labor.
C4.7.4.2. Intelligence. Monitor and report international threats; in conjunction with law
enforcement, develop regional and/or local TA s; and determine risk of loss of intelligence
assets.
57
C4.7.4.8. Special Staffs. Address AT risk management with the various special staff
offices (Medical, Legal, Public Affairs Office (PAO), and Safety) as required. In addition to the
above, DCIO elements and security organizations should be consulted for their role in
monitoring and reporting domestic threats to Defense resources and activities, and assisting in
the development of local threat assessments and a common operational picture.
58
C5. CHAPTER 5
AT THREAT ASSESSMENT
C5.1. INTRODUCTION AND OVERVIEW
The AT Risk Management process begins with an assessment of the terrorist threat to DoD
personnel and facilities. The AT Threat Assessment is used to identify the terrorist threats posed
to DoD assets and/or the threats that could be encountered in executing a mission. This Chapter
includes an overview of organizations that provide threat information or analysis to the DoD
Components. It then describes the analytical approach for assessing terrorist threats, the DoD
Threat Methodology, and concludes with a description of how the terrorist threat is assessed at
installation or unit level.
59
C5.2.2.2. The DIA provides a wide range of terrorism intelligence for DoD Components,
to include Indications and Warning (I&W), current intelligence, assessments, in-depth analysis,
and the maintenance of a counterterrorism database.
C5.2.3. Combatant Commands
C5.2.3.1. All Combatant Commands have their own supporting joint intelligence centers
and intelligence organizations. Each Combatant Commander, through his or her J-2 staff, draws
upon information and analysis resources of the DIA, the Services and other national agency
representatives, to include all U.S. Embassies in his or her area of responsibility (AOR). In
addition, the Combatant Commands collect, process, analyze and disseminate terrorism-related
intelligence using organic resources. The Combatant Commands all have their own watch
centers, which provide indications and warning support. The purpose is two-fold:
C5.2.3.1.1. To assist the Combatant Commander in providing for the security and
protection of forces under his or her control.
C5.2.3.1.2. To ensure the flow of information passing through Service lines of
communication within the area of the Combatant Commander responsibility is also brought to
the attention of the Combatant Commander and his or her staff and disseminated within the
Command as appropriate.
60
61
C5.2.5.2.2. Initiate and maintain liaison with the security forces or provost marshal
offices, local military criminal investigative offices, local intelligence field offices, security
offices, host nation agencies and other organizations, elements, and individuals as required.
C5.2.5.2.3. Develop and present terrorist threat awareness briefings to all personnel
within their commands in cooperation with the local intelligence field offices.
C5.2.5.2.4. Report all actual or suspected terrorist incidents or activities to their
immediate commander and/or supported activities, and DIA through established reporting
channels.
C5.2.5.3. Law Enforcement Staff Level Elements. Law enforcement elements of DoD
agencies and military commands carry out the following responsibilities:
C5.2.5.3.1. Initiate and maintain liaison with local intelligence field offices and
military criminal investigative organizations.
C5.2.5.3.2. Investigate criminal activities committed within their jurisdiction to
determine whether or not such activities may constitute a terrorist threat to DoD personnel,
facilities, materiel, or other U.S. interests.
C5.2.5.3.3. Report all actual or suspected terrorist incidents or activities to their
immediate commander and/or supported activities through established reporting channels.
C5.2.5.3.4. Maintain liaison with Federal, host nation, and local law enforcement
agencies; and civil and military combating terrorism agencies as appropriate.
C5.2.5.3.5. Gather and report information on domestic activities that pose a threat to
Defense resources, facilities, and activities.
C5.2.5.4. Installation, Facility, Activity, or Unit Security Officer. The foundation of the
threat reporting function demanded by the DoD AT Program rests on the shoulders of
installation, facility, activity, or unit security officers. These individuals may not be part of the
military intelligence community in a formal sense; however, their overall security and force
protection responsibilities place them in positions through which quantities of information of
potential interest or concern to the intelligence and law enforcement communities pass on a
recurring basis. These security officers:
C5.2.5.4.1. Report all known or suspected terrorist incidents or activities to their
immediate commander, supporting security or military police office, other supported activities,
local intelligence field office, and local military criminal investigation office.
62
C5.2.5.4.2. Conduct regular liaison visits with the supporting security or military
police office, intelligence field office, and local criminal investigation office.
C5.2.5.4.3. Assist in providing terrorist threat awareness training and briefings to all
personnel and family members as required by local situations.
63
C5.3.3.1.5. Political tracts, handbills, posters, flyers, and leaflets often distributed by
organizations committing, supporting, or opposing terrorist actions may reveal their objectives,
tactics, and possible targets. Such information is often placed into the public domain as part of a
campaign of terror.
C5.3.3.1.6. The worldwide web provides terrorists an outlet to spread propaganda,
recruit new members and aid in fundraising. In addition, the web provides a wealth of
information to include: training and training methods, weapons, and weapons usage. Only
specially trained counterintelligence personnel should access these sites. Terrorist organizations
have shown increased sophistication in the area of information warfare and casual visits to their
sites may inadvertently provide them intelligence information on who may be interested in their
activities and/or expose the untrained visitor to a computer hacker attack.
C5.3.3.2. Commercial data services may offer timely information about international or
military affairs that often include information regarding terrorist incidents. Such data services
often rely on foreign news media. Some data services maintain their own network of sources.
Information services are provided on subscription or fee-for-service basis.
C5.3.3.3. The DCIOs, military and civil law enforcement agencies collect criminal
information. Since terrorist acts are criminal acts, criminal information is a lucrative source for
terrorist intelligence. Local military criminal investigative offices maintain current information
in accordance with DoD regulations governing retention of criminal information. Such material
may assist managers and military commanders in the assessment of the local terrorist threat.
C5.3.3.4. Government information refers to materials collected, analyzed, and
disseminated under official auspices. It includes, but is not limited to, scientific and technical
reports, political and economic reports, crime and terrorism statistics, policy statements,
legislation, and official correspondence.
64
C5.3.3.4.3. Government information also includes data and analyses derived from
intelligence classified sources. Exchanges with local government agencies through for example,
“cooperative arrangements,” can also augment regional information.
C5.3.3.5. Local information can come from individual service members, civil servants,
family members, and individuals with regional knowledge such as college faculty or cultural
organizations. Local crime or neighborhood watch programs can also be valuable sources of
information and can serve as a means to keep individuals informed in dispersed and remote
areas.
C5.3.3.5.1. Local information is often of critical importance as it is collected and
passed through either law enforcement and/or intelligence channels to the national intelligence
organizations. It is frequently invaluable to analysts confirming news media or other open
source accounts of terrorist activities. It can provide early warning of potential terrorist activities,
allowing law enforcement and combating terrorism measures to be initiated in a timely manner
to thwart or minimize the effects of a terrorist attack.
C5.3.4.1. Terrorist threat information flows back and forth in the field, and among the
Combatant Commanders, the Services, and the DIA. At each level, it is integrated, fused, and
assessed in accordance with regulations and DoD Directives governing the security and
dissemination of intelligence and law enforcement information. Terrorist threat information and
analytical products are also disseminated from the national, DoD, Service, Agency, and
Combatant Commander levels to all echelons of command and individual Defense Agency
activities as appropriate.
65
C5.4.1.4. Issuance of a Terrorist Threat Level judgment is not, in and of itself, a formal
warning vehicle.
C5.4.2. Threat analysis is the process of compiling and examining all available information
to develop intelligence indicators of possible terrorist activities.
C5.4.3. The Department of Defense has identified several factors to identify the collection
and analysis of information from all sources concerning terrorist threat(s). These factors are
used in making terrorist threat analyses on a country-by-country basis.
C5.4.4. Methodology Factors
C5.4.4.1.1. Group Tactics focuses on the attack methods used by the group. What
type of attack has the group conducted in the past? Has the group conducted large or small-scale
bombings, kidnappings, assassinations, drive-by shootings, or other assaults? Has there been any
indication the group has any new capabilities? Has the group been notably unsuccessful in any
types of attacks?
66
C5.4.4.2. Intentions are the stated and/or the actual history of attacking U.S. interests.
C5.4.4.2.1. Recent Attacks. Has the group conducted a recent terrorist attack? Type
of attack? Weapons type? Were any pre-incident indicators noted? Was outside support used?
Did the group claim the attack?
C5.4.4.2.2. Anti-U.S. Ideology. Does the group have an anti-U.S. ideology? Is the
ideology stated publicly? What is the group’s main opposing points with the U.S.? What trigger
events could entice the group to act?
67
C5.4.4.2.3. Anti-Host Nation Ideology. Does the group have an anti-host nation
ideology? Does the group consider U.S. aid/support a hindrance to its goals? At what point
would the group consider attacking U.S. interests due to this support?
C5.4.4.2.4. Attacks in Other Countries. Has the group conducted terrorist attacks in
other countries? Where? What type of attack? What type of support network was in place?
C5.4.4.2.5. Response to Current International Events. Has the group ever responded
to an international event with a terrorist attack? What was the event? What type of response?
Has the group ever publicly denounced an international event involving the U.S.? Did they
threaten U.S. interests?
C5.4.4.3. Activity. A terrorist group’s activity in a country may not always be related to
operational planning or present a threat to U.S./host nation interests. Many groups use countries
as support bases and may not want to jeopardize their status by conducting a terrorist act there.
Analysts must determine the group’s activity by examining influencing elements and keeping in
mind that the situation is always fluid and subject to change. Some of the key elements in
evaluating activity are:
C5.4.4.3.1. Presence. Is a group present but inactive?
C5.4.4.3.2. Fund-raising and Safe Haven. Does the group use the country for fund
raising? What type of fund raising? How much money is generated? What is its intended use?
Is any of the money funneled to other locations or groups? Does the group use a country as a
safe haven?
C5.4.4.3.3. Suspected Surveillance, Threats, and Suspicious Incidents. Has the
group been known to conduct surveillance? Is the group proficient at surveillance? What does
the group do with the surveillance information? Has the group threatened DoD/U.S. interests?
How does the group conduct surveillance? Have there been any suspicious events that could be
linked to the group?
C5.4.4.3.4. Changes in Philosophy Impacting Targeting. Has the group shown any
signs of changing philosophies? Does the philosophical change include targets? Is the
Department of Defense affected?
C5.4.4.3.5. Level of Involvement with External Cells. How does the local leadership
interact with external leadership? How much contact is normal? Does the group have
connections with other cells? Do the cells train together? Do they share intelligence?
68
C5.4.4.3.6. Key Operative Movement. Has there been any noted movement of key
operatives? If so, from where to where? Was the movement covert? Was there any reaction
from other cells? What was the purpose of movement? Were code words used?
C5.4.4.3.7. Contingency Planning. Has any planning been noted? Who/what are the
targets? How were past plans executed? Who conducted the planning? Was outside help
used/requested? Did any attacks occur after planning was noted? How much time elapsed?
C5.4.4.3.8. Disruptions by U.S. or Host Nation Security Elements. Have U.S. or host
nation security forces disrupted any of the group’s activities? If host nation only, does the group
perceive U.S. involvement? What caused the disruption? What was uncovered by security?
How does it affect the group’s operational capability in country?
C5.4.4.3.9. Identification of Weapons Caches. Have weapons caches been
uncovered? What types of weapons? Are the weapons consistent with the group’s past weapons
usage? Who supplied the weapons?
C5.4.4.3.10. Cell Activity (Operational or Support). What type of activity does the
group mainly conduct in country? Operational? Support? Size of cells? Number of cells?
C5.4.4.3.11. Credible Indications of Targeting U.S. Assets. Is there any indication
the group is targeting U.S. assets? At what stage of the targeting process was the plan
uncovered? Timing? Specific target? Location?
C5.4.4.4. Operating Environment. How the overall environment, to include political and
security considerations, influences a terrorist group’s ability and motivation to conduct an attack.
Influencing factors include:
C5.4.4.4.1. DoD Presence. What is the DoD presence in the country? Size?
Location? Duration of stay? What are DoD personnel doing in country (training, support,
security, etc.)? What is the terrorist perception of DoD significance? How politically sensitive
is the DoD presence? What could entice the terrorists to attack DoD interests?
C5.4.4.4.2. External Influencing Factors. Is the host country at war? Could this
influence a terrorist group to attack? Is there active insurrection? Is the terrorist group involved
in the insurrection?
69
C5.4.4.4.3. Host Nation Security and Level of Cooperation. Can host nation security
(to include national law enforcement, paramilitary and military institutions) maintain social
order? How well are security forces trained to respond to terrorist incidents? Type of equipment
available for security forces? How are forces dispersed around the country? Does host nation
cooperate with U.S. authorities? Does host nation share information?
C5.4.4.4.4. Political Influences Affecting Motivation to Attack. What political
influences are affecting the group’s motivation to attack? Has host nation cracked down after
previous terrorist acts?
C5.5. TERRORIST THREAT LEVEL
C5.5.1. The Department of Defense uses four threat levels to define the degree to which
the environment is conducive to conducting terrorist operations in a specific country, region or
locale by using the factors and elements described above. The four threat levels are Negligible,
Low, Medium, High, and Critical.
C5.5.1.1. High. Anti-U.S. terrorists are operationally active and use large casualty
producing attacks as their preferred method of operation. There is a substantial DoD presence
and the Operating Environment favors the terrorist.
C5.5.1.2. Significant. Anti-U.S. terrorists are present and attack personnel as their
preferred method of operation or a group uses large casualty producing attacks as their preferred
method but has limited operational activity. The Operating Environment is neutral.
C5.5.1.3. Moderate. Terrorists are present but there are no indications of anti-U.S.
activity. The Operating Environment favors the Host Nation/U.S.
70
C5.6.3. Terrorism Threat Levels should not be confused with FPCONs. A FPCON is a
security posture promulgated by the commander in consideration of a variety of factors (e.g. a
terrorism threat assessment, terrorism threat levels, etc.). Terrorism Threat Levels should also not
be confused with the Threat Conditions associated with the National Homeland Security
Advisory System.
71
C5.7.2. The DoD Defense Indications and Warning System (DIWS) comprises a second,
independent system in which DoD members at any level may initiate unilateral threat warnings.
These are termed Defense Terrorism Warning Reports. Warnings within the DoD system
generally stay within the system and are primarily for use by the DoD Components. DoD
Terrorism Warning Reports are active for a maximum 30-day period with one 30-day extension
authorized.
C5.7.3. Basic Warning Report Procedures within the Department of Defense
C5.7.3.1. DIWS Terrorist Threat Warning Reports may be prepared and issued by any
member of the DIWS system. DIA is required to propose a National Intelligence Community
Alert or Advisory prior to issuing a unilateral DIWS Terrorism Warning Report.
C5.7.3.2. Individual DoD Components also have the right to independently notify their
members of impending threats. If a DoD Component intelligence activity receives information
that leads to an assessment of an imminent terrorist attack, it may exercise its right to issue a
unilateral warning to its units, installations, or personnel identified as targets for the attack. If
the DoD Component intelligence activity issues a unilateral warning, it must label threat
information disseminated as a unilateral judgment, and must inform DIA of its action.
C5.7.3.3. Warnings are issued when specificity of targeting and timing exist or when
analysts have determined that sufficient information indicates that U.S. personnel, facilities, or
interests, particularly those of the Department of Defense, are being targeted for attack.
Warnings need not be country-specific. A warning may cover an entire region or the world. The
key to a warning is recognition that the pre-incident indicators for an attack are present.
C5.7.3.4. DIWS Terrorism Warning Reports are specific products. When issued, they
perform a number of functions. They are unambiguous—it is clear to the recipients they are
being warned. Warnings are intended for distribution up, down, and laterally through the chain
of command—not just downward. Warnings of impending terrorist activity are likely to have
national implications and shall be provided routinely to decision-makers at the policy level of the
U.S. Government.
72
C5.7.4. No “Double Standard”. Following the terrorist bombing of Pan Am flight 103 over
Lockerbie, Scotland, on December 21, 1988, the U.S. Government adopted a policy of “No
Double Standard” (reference (v)). No terrorist threat warning shall be issued solely to U.S.
Government consumers IF the general public is included in, or can be construed to be part of,
terrorist targeting. Terrorist threat warnings may be issued exclusively within government
channels only when the threat is only to government targets. The DOS, overseas, is the sole
approving authority for releasing terrorist threat information to the public
C5.8. INSTALLATION LEVEL AT THREAT ASSESSMENT REQUIREMENTS AND
ACTIVITIES
C5.8.1. Commanders down to the installation or tenant level task the appropriate
organizations under their command to gather, analyze, and disseminate terrorism threat
information. When organic intelligence/counterintelligence/law enforcement assets are not
available, commanders should request support from higher authority. The full range of
intelligence, counterintelligence, and law enforcement capabilities shall be utilized in support of
distinct and separate threat assessment requirements: annual threat assessments and ongoing
assessment of the local threat.
C5.8.3. Threat Matrix. Preparation of the annual threat assessment requires careful analysis
of known local threats, together with estimates of relevant national and transnational threat
capabilities. Locally derived, open-source information regarding the availability of weapons and
component materials in the area is also necessary in developing the range of threats. Threat
analysts preparing the assessment should differentiate threats likely to be used inside the
perimeter from those more likely to be used outside the perimeter to aid in the VA and
development of countermeasures. The Threat Matrix unambiguously establishes the range of
specific threat capabilities that shall be used to analyze vulnerabilities and plan countermeasures.
73
The Threat Matrix is a planning tool which ensures that security and procedural countermeasures
are economically designed to counter specific threats or mitigate specific vulnerabilities, and that
the risk remaining is well understood by Commanders making risk acceptance decisions (see
table C5.T1.).
74
75
C5.8.4. Both installation and unit commanders shall assess the terrorist threat for probability
and severity of occurrence. Probability is the estimate of the likelihood that a threat shall cause
an impact on the mission or a hazard to the installation. Severity is an estimate of the threat in
terms of the degree of injury, property damage or other mission-impairing factors. By
combining estimates of severity and probability, an assessment of risk can be made for each
threat. A matrix may be used to assist in identifying the level of risk. The outcome of this
process is a prioritized list of threats. The highest priority threat is the one that poses the most
serious risk in terms of likelihood and severity. This list of prioritized threats shall be used to
evaluate the acceptability of certain risks and which risks for which to make decisions
concerning the employment of resources and other actions that reduce vulnerability. This
assessment should be recorded as a record/baseline and updated regularly as the threat changes.
If installation and unit commanders do not the resources to assess the threat for probability and
severity of occurrence, they should coordinate with their next higher echelon to assist with this
requirement.
C5.8.5. Unit commanders should also conduct a variation of the AT Annual Assessment
described above, but apply it to the conduct of their unit mission. Threats should be listed that
affect the unit as it conducts its mission. The output of this assessment is a list of terrorist threat
capabilities associated with each phase of the operation.
C5.8.6. In addition to preparing an annual threat assessment, Commanders must also
continuously assess local threat information so appropriate FPCON can be set. Commanders at
all levels shall forward up and down the chain of command all information pertaining to
suspected terrorist threats, or acts of terrorism involving DoD personnel or assets for which they
have AT responsibility. Threat information shall be used in the determination to raise or lower
the present Force Protection Condition. Continuous threat analysis also supports the warning of
suspected target facilities or personnel through the installation’s mass notification system when
the information relates threats of an immediate nature.
76
C6. CHAPTER 6
CRITICALITY ASSESSMENT
C6.1. INTRODUCTION
This Chapter describes the methodology commanders and civilian equivalents can use to
complete a Criticality Assessment. A critical asset, as defined by DoD Directive 5160.54
(reference (w)), is any facility, equipment, service or resource considered essential to DoD
operations in peace, crisis, and war and warranting measures and precautions to ensure their
continued efficient operation; protection from disruption, degradation or destruction; and timely
restoration. Both regulations and the commander’s priorities and intent determine critical assets.
Regulations cover items such as VIPs, ammunition storage areas, etc. The Commander’s intent
extends coverage to other items such as mission critical and high occupancy assets. Critical
assets can be people, property, equipment, activities and operations, information, facilities, and
materials.
C6.2. CONDUCTING THE CRITICALITY ASSESSMENT
C6.2.1. The Criticality Assessment identifies assets supporting DoD missions, units, or
activities and deemed critical by military commanders or civilian agency managers. For AT
purposes, the Criticality Assessment should include high-population facilities, which may not
necessarily be mission essential (recreational activities, theaters, or sports venues). It addresses
the impact of temporary or permanent loss of assets. It examines costs of recovery and
reconstitution including time, dollars, capability and infrastructure support.
C6.2.2. In military units deployed under the command of the Services or a Combatant
Command, the staff at each command echelon determines and prioritizes critical assets. The
Commander responsible for AT approves the prioritized list.
C6.2.2.1. The Criticality Assessment goals are:
C6.2.2.1.1. Identify installation’s/unit’s key assets.
C6.2.2.1.2. Determine whether critical functions can be duplicated under various
attack scenarios.
C6.2.2.1.3. Determine time required to duplicate key assets or infrastructures efforts
if temporarily or permanently lost.
77
78
redundancies. Even if a DoD asset is injured, damaged, or destroyed, it may have future value in
the accomplishment of other DoD missions or be of great symbolic value to the Department of
Defense, the U.S. Government, and the American people. Consideration should therefore be
given to the resources that must be expended to recover an asset and in some cases, repair it for
return to service with the Department of Defense in the future.
C6.2.6.4. Mission Functionality. Measures key positions, special facilities, specialized
equipment, etc., used to fulfill assigned missions.
C6.2.7. The purpose of a Criticality Assessment Matrix is to determine the criticality of each
asset, which shall also help to prioritize them. For each asset, the Assessment Team shall assign
values for each criteria based on a scale, such as one to ten. The Assessment Team must
determine what criteria to use. Table C6.T1. is an example of a Criticality Assessment Matrix.
Table C6.T1. Example Criticality Assessment Matrix
Asset Importance Effect Recover- Mission Etc.
Total
ability Functionality
Base
8 7 5 3 37
Exchange
Command
9 10 9 7 57
Post
C6.2.8. Once all asset values are tallied, they can be rank-ordered such that highest score is
"most critical" and lowest score is "least critical." However, it is important to emphasize that not
all assets in the matrix shall be "essential for mission accomplishment."
79
C7. CHAPTER 7
VULNERABILITY ASSESSMENTS (VA)
C7.1. INTRODUCTION
VA is the process the commander uses to determine the susceptibility of assets to attack from
threats identified by the AT TA. The VA answers the question “what kind of attack is the asset
most/least vulnerable to?” Reference (e) provides authoritative standards regarding both
installation and deploying unit Vulnerability Assessments. Vulnerabilities exist at every
installation as a result of the terrorist threat faced. Vulnerabilities are always there, no matter the
policies, procedures, structures and protective equipment. Although terrorist threats cannot be
controlled, they can be assessed and the vulnerability of assets to those threats can be mitigated.
Identifying and understanding vulnerabilities is important in determining how well an asset shall
be protected from loss. Vulnerabilities are also the component of overall risk over which the
commander has the most control and greatest influence. By reducing vulnerability, the potential
risk to an asset is also reduced.
C7.2. THE VULNERABILITY ASSESSMENT PROCESS.
C7.2.1. Installation or unit AT officers conduct a VA using key AT Working Group
members in a collaborative effort as the assessment team. Teams should include representation
from operations, security, intelligence, counterintelligence, law enforcement, communications,
fire department, engineers, medical services, housing, emergency planning and WMD planning
and response. The VA must comply with reference (e).
80
C7.3.1. The Department of Defense has created several tools to assist conducting
Vulnerability Assessments to include the Joint Staff Core Vulnerability Assessment Management
Program (CVAMP); Mission, Symbolism, History, Accessibility, Recognizability, Population,
and Proximity (MSHARPP) and Criticality, Accessibility, Recuperability, Vulnerability, Effect,
and Recognizability (CARVER) (see Appendix 2). The Defense Threat Reduction Agency
(DTRA) AT VA Team Guidelines are another excellent tool available for Local (Base)
Vulnerability Assessments. This is a comprehensive checklist that is directly linked to reference
(e) AT Standards and produces a product similar to a Joint Staff Integrated VA (JSIVA).
C7.3.2. Vulnerability Rating Example using “CARVER” criteria. CARVER (Appendix 2)
provides a sample of criteria that can be used for the Vulnerability Assessment. Although
criticality is covered in the CARVER method, it should not be used as a criterion for
vulnerability. Criticality is covered separately during the Criticality Assessment process
discussed extensively at Chapter 6.
C7.3.2.1 Accessibility. The ease with which an asset can be reached, either physically or
by standoff weapons. Consider all means of attacks found in the TA.
C7.3.2.2. Recuperability. A measure of time required to replace, repair or bypass the
destruction or damage inflicted on the target. Recoverability should also consider redundant
systems where not all redundancies are required for mission accomplishment. Such as having
five satellite radios but only two are required for mission accomplishment.
C7.3.2.3. Vulnerability. A measure of the ability of the threat to damage the target using
assets available to the threat. Consider type of construction and internal placement of assets.
C7.3.2.5. Recognizability. The degree to which a target can be recognized under varying
weather, light, and seasonal conditions without confusion with other targets or components.
Camouflage can reduce the vulnerability of an asset by making it harder to recognize.
81
Base
8 7 8 6 33
Exchange
Command
4 10 9 4 31
Post
82
C8. CHAPTER 8
RISK ASSESSMENT (RA)
C8.1. INTRODUCTION
As discussed in Chapter 4, the RA combines Criticality, Threat, and Vulnerability assessments in
order to provide a more complete picture of the risks to an asset or group of assets. This Chapter
describes the methodology commanders and civilian equivalents can use to assess risk.
C8.2. RA METHODOLOGY
C8.2.1. RA. The RA is a logical, step-by-step method, and shall require the participation of
the entire staff. In starting the RA process, commanders should examine three elements: threat,
criticality, and vulnerability.
C8.2.1.1. Threat. The threat is determined through a proper and thorough TA. The TA
should identify the likelihood and severity of the terrorist to inflict injury to a person or damage
to a facility or asset by considering terrorist capability, intent, and objectives. To enable
commanders to focus their analysis, the TA should also specify the type of weapon(s) or act(s)
the terrorist shall use to initiate the event (assassination, bomb, etc.).
C8.2.1.2. Asset Criticality. Critical assets are determined by both the term and the
measure of importance to the installation’s mission. Areas that encompass multiple critical
assets are referred to as critical areas. The criticality assessment provides information to
prioritize assets and allocate resources to special protective actions.
C8.2.1.3. Vulnerability. A thorough VA shall highlight the susceptibility of a person,
group, unit, facility, or asset to a damaging incident. VAs should also address the capabilities of
response elements to plan those activities that support the installation’s ability to either deter
and/or respond to terrorist threats and incidents. For example, a VA might reveal weaknesses in
an organization’s security systems, financial management processes, computer networks, or
unprotected key infrastructure such as water supplies, bridges, and tunnels.
C8.2.2. During the RA process, the commander must consider all of the aforementioned
elements, to make well-informed decisions when planning FPCON measure implementation, and
terrorist incident response measures. The RA and management process described here does not
dictate how to conduct the assessment, nor does it discuss how to identify deficiencies and
vulnerabilities. It outlines what type of information to collect and how to organize and display
83
that information for decision-making. If the installation does not have the resident expertise to
conduct an AT RA, consider using a JSIVA, and/or Combatant Commander or Service AT
assessment reports. Vulnerabilities and deficiencies gathered from these useful reports can be
plugged directly into the methodology outlined in this Chapter.
C8.2.3. Given the resource-constrained environment in which installations now operate,
installation commanders or their civilian equivalents require a method to assist them in making
resource allocation decisions to protect the installation from possible terrorist threats (FPCON
measure implementation and other mitigation efforts) and to most effectively respond should a
terrorist incident occur (response measures). Risk management is the process of identifying,
assessing, and controlling risks arising from operational factors and making decisions that
balance risk costs with mission benefits. The risk management process allows installation
commanders to use representative (operational) risk as one of the principal factors in their
decision-making process. In this context, representative risk shows the relative impact on an
installation’s assets, given a stated attack. Representative risk is NOT a prediction that a terrorist
incident shall occur.
C8.2.4. The example below shall focus on vulnerabilities of critical assets. This same
methodology can be applied to other areas of interest such as response capability. It is also
important to emphasize that this methodology is merely a tool to assist commanders and civilian
equivalents in assessing and managing risk.
84
CW 9 8 1 72
BW 9 8 1 72
C8.3.4. It is important to note that this rating system is not meant to be a precise science. It
is one method of quantifying a subjective decision, in order to generally prioritize areas in terms
of risk.
85
C8.4. RA.
C8.4.1. Table C8.T1. gives the final RA for each asset. The assets can be prioritized based
on the RA. The decision-maker is required to determine the maximum amount of risk that is
acceptable.
C8.4.2. The risk can also be represented graphically using The RA Graph, Figure C8.F1.
The graph shall combine the Criticality/Vulnerability/Attack Means (the x-axis) and the Threat
Probability (the y-axis) to represent the risk. The representative risk is an expression of the
relative impact on an asset or a planning and response element, given a stated attack means.
Representative risk does NOT attempt to forecast risk (e.g., assign predictability or likelihood).
86
C8.4.3. No standard methodology exists for establishing risk levels and their determination
shall vary from installation to installation, based on the commander’s judgment. Although this
process is subjective, commanders can focus their decision on where to establish the minimum
risk by considering the following questions:
C8.4.3.1. What is the installation’s mission? How important is that mission to overall
U.S. military objectives in the region? (Criticality Assessment)
C8.4.3.2. What resources are available for AT activities on the installation? (VA)
C8.4.3.3. Where are the nearest available resources that could augment the installation,
should an incident occur? Does the Commander have tasking authority for those resources?
(VA)
C8.5. COMPLETING THE PROCESS -- RISK MANAGEMENT
C8.5.1. The end products of the above process shall be the identification of areas and assets
that are vulnerable to the identified attack means and the development of associated assessment
tables. From the information developed from all assessments (criticality, threat, vulnerability,
and risk and the RA Graph), the Commander shall make a decision on how best to employ given
resources and force protection measures to deter, mitigate, or prepare for a terrorist incident. In
accordance with reference (e), installation commanders should document their risk management
methodology.
C8.5.2. There are several ways to reduce risk. The decision-maker does not easily control
two of those methods, reducing the threat and reducing the criticality. The one method that is
controllable is reducing the vulnerability of an asset.
C8.5.3. Looking at the above example and considering only the command post, it is apparent
that the highest risk is from a car/truck bomb. What are some ways of reducing the
vulnerability?
C8.5.3.1. Set up barriers to control traffic flow around the command post. The further
away a prospective car/truck bomb detonation, the less impact it will have on the intended target.
Another alternative is to control the traffic coming onto the installation. If several buildings exist
that require protection from car/truck bombs then cars and trucks can be searched more
thoroughly at the entrance to the facility. If bombs aren’t allowed to enter the facility, then the
risk is greatly reduced.
87
C8.5.3.2. Determine why it takes several hours to place the redundant command post in
full operation. This may only require a simple policy change or pre-positioning of equipment but
the result shall be less vulnerability due to redundancy.
C8.5.4. At the end of the RA and risk management process, the commander must engage and
concur with the entire assessment in order to focus the next steps in risk management process
(taking action).
C8.5.5. The use of CVAMP (appendix 2) shall assist commanders and ATOs in this effort.
88
C9. CHAPTER 9
INTRODUCTION TO THE AT PLANNING PROCESS
C9.1. INTRODUCTION
Protection of DoD personnel and assets from acts of terrorism is one of the most complex
challenges for all Commanders. Planning to confront this challenge requires a comprehensive,
integrated approach and a strong, clear vision of AT program requirements. AT planning is
critical to deterrence, detection, defense, and response to terrorist incidents. A plan shall be
written at the Combatant Commander, Service, and DoD Agency level, down to the installation
level for permanent operations or locations, and incorporated into operations orders for in-transit
units, temporary operations or exercises. This Chapter outlines the requirements of an AT plan
and presents a methodology for plan development.
C9.3.1. TA. The terrorism TA is the tool that commanders use to arrive at a judgment of
risk and consequences of terrorist attack. This assessment focuses on the full range of known or
estimated terrorist capabilities in the commander’s area of interest, including WMD. Annually,
commanders integrate threat information prepared by the intelligence and law enforcement
communities, technical information from security and engineering planners, and information
from other sources to prepare their assessments (see chapter 5).
C9.3.2. Criticality Assessment. The criticality assessment shall provide the Commander
with a prioritized list of assets based on the necessity for mission completion (see chapter 5).
89
Inputs from all organizations shall be required to determine what assets are required and how
many. The completed information may be compiled into a criticality matrix. This information is
then combined with the threat and vulnerability information to assess the AT risk.
C9.3.3. VA. This assessment provides a vulnerability-based analysis of an activity’s AT
program. A tool for the commander, the VA is the process to determine the susceptibility to
attack by the broad range of terrorist threats against personnel and assets. The result of the
assessment provides a basis for determining options to eliminate or mitigate vulnerabilities.
Commanders shall conduct a dedicated local VA at least annually, but there should be a means to
adjust the assessment as the threat changes (see chapter 7).
C9.3.4. Risk Assessment. Commanders conduct a RA to integrate threat, criticality and
vulnerability information in order to make conscious and informed decisions to commit
resources or enact policies and procedures that mitigate or define the risk (see chapter 8). RA
provides the commander with a clear picture of the current AT posture and identifies those areas
that need improvement. When conducting this assessment, Commanders shall consider the
threat, asset criticality, and vulnerability of facilities, programs, and systems, as well as
deterrence and response capabilities (see chapters 4 through 8).
C9.3.5. AT FPCON Measures. FPCONs AT measures are the actions taken at facilities to
deter and/or prevent a terrorist(s) from conducting an attack. FPCONs are the principal means
through which commanders (or DoD civilian equivalent) apply an operational decision to best
protect personnel or assets from terrorist attack. AT measures assimilate facilities, equipment,
trained personnel, and procedures into a comprehensive effort designed to provide optimal AT
protection to personnel and assets. The objective is to ensure an integrated approach to terrorist
threats. Well-designed AT measures direct actions that ensure threat detection, assessment,
delay, denial, and notification. AT measures should include provisions for the use of physical
structures, physical security equipment, chemical-biological-nuclear-radiological-explosive
detection and protection equipment, Random Antiterrorism Measures, response forces, and other
emergency measures (see chapter 10). AT measures should be scalable and proportional to
increases in the local threat and/or unit operational capability.
90
and the strategy that ties them together can also contribute to deterring terrorist attacks if our
adversaries recognize our ability to limit the effects of their attacks.
C9.3.7. Terrorist Consequence Management Measures. As detailed in chapters 11 and 12,
terrorist consequence management measures should include emergency response and disaster
planning and/or preparedness to recover from a terrorist attack, to include WMD. Although not
an element of AT, commanders shall include terrorist consequence management preparedness
and response measures as an adjunct to the organization’s AT plan. In addition, special
circumstances imposed by terrorist attacks utilizing WMD shall require immediate close
coordination with higher command and host nation, and/or Federal, State, and local authorities.
C9.3.8. Coverage for Off-Base Assets. In planning the coverage of off-base assets and
infrastructure selected for inclusion in the facility, installation, or activity AT program, include
notifications to the appropriate first responders, including law enforcement offices, and the
servicing FBI field office. This shall enable integration of the facility into their response and
contingency planning and provide a potential source to assist the facility in its own preparations
and response. As necessary, validate and monitor the scope and viability of the coverage. If the
asset is a cleared contractor facility (DoD 5220.22-M and 5220.22-R (references (y) and (z)),
provide for reporting to the servicing Defense Security Service (DSS) Industrial Security Field
Office (see reference (z)) of information that indicates classified information under facility
control is or could be at risk. Promptly notify the servicing DSS office of any security
requirements which the installation or activity intends that the cleared industrial facility
implement.
C9.4.3.1. Phase 1: Risk Assessment. Conduct the RA only after completing the
criticality, threat, and VAs. Any plan that does not start with these assessments shall be too
reactive, misdirect resources, and result in wasted efforts and resources.
C9.4.3.2. Phase 2: Build AT FPCON Measures Matrices, Terrorist Incident Response
Measures Matrices and Terrorist Consequence Management Measures Matrices. This phase
produces the heart of the AT plan and represents the “Concept of Operations” in the five-
paragraph operation order format. The end products of this phase shall be matrices of integrated
pre-incident action sets to implement each FPCON security measure at the five distinct FPCONs.
Each integrated action set shall identify who shall act, when they shall act, where they shall act,
what the action is and the resources to be used, and how these actions shall occur at the various
FPCONs. See Figure C9.F1 for an example.
Figure C9.F1. Sample portion of a pre-incident action set matrix for FPCON NORMAL.
92
There should be similar matrices for each type of terrorist incident response and consequence
management event. This section also contains detailed Physical Security measures. Physical
Security measures are an outcome of developing the AT FPCON and Terrorist Incident matrixes.
C9.4.3.3. Phase 3: Writing the AT Plan. The challenge for the ATO responsible for
writing the plan is to select a format that best suits the organization’s ability to understand the
plan, and to execute it quickly and decisively when required. While there is no mandated format,
it is recommended that organizations use the standard five-paragraph order outlined in JP 5-002
(reference (ab)). Sample installation AT plans are also provided in Appendix 4 and in reference
(x). Each level of organization shall necessarily produce an AT plan consistent with their
mission and responsibilities. For example, at the installation level, the AT plan shall have a very
tactical perspective and provide minute details for actions to be taken locally. A geographic
Combatant Commander’s plan, on the other hand, shall be at the operational level and shall
provide descriptive guidance rather than prescriptive solutions.
93
C10. CHAPTER 10
THE DoD FORCE PROTECTION CONDITION (FPCON) SYSTEM
C10.1. INTRODUCTION
C10.1.1. The FPCON System describes the progressive level of protective measures
implemented by all DoD Components in response to terrorist threats. It is the principal means
through which a military commander or DoD civilian exercising equivalent authority applies an
operational decision on how to best guard against the threat. These guidelines shall assist
commanders in reducing the effect of terrorist and other security threats to DoD units and
activities.
C10.1.2. Creating additional duties and/or watches, and heightening security enhance
Command’s personnel awareness and alert posture. These measures display the Command's
resolve to prepare for and counter the terrorist threat. These actions shall convey to anyone
observing the command’s activities that it is prepared and an undesirable target, and that the
terrorist(s) should look elsewhere for a vulnerable target.
C10.1.3. The DoD system is generally not applicable to DoD elements that the Chief of
Mission (COM) has security responsibility for and may have limited application to DoD
elements that are tenants on installations and facilities not controlled by U.S. military
commanders or DoD civilian exercising equivalent authority. Still, Commanders of U.S.
elements on non-U.S. installations can execute many FPCON measures that do not involve
installation level actions, at least to a limited degree. The terminology, definitions, and specific
recommended security measures are designed to facilitate interservice coordination and support
for the combating terrorism efforts of the DoD Components.
C10.2. FORCE PROTECTION CONDITIONS (FPCONs)
There are five FPCONs. Supporting measures for each condition are listed in Appendix 3. The
circumstances that apply and the purposes of each protective posture are as follows:
C10.2.1. FPCON NORMAL applies when a general global threat of possible terrorist
activity exists and warrants a routine security posture.
C10.2.2. FPCON ALPHA applies when there is an increased general threat of possible
terrorist activity against personnel or facilities, the nature and extent are unpredictable. ALPHA
measures must be capable of being maintained indefinitely.
94
C10.2.3. FPCON BRAVO applies when an increased or more predictable threat of terrorist
activity exists. Sustaining BRAVO measures for a prolonged period may affect operational
capability and relations with local authorities.
C10.2.4. FPCON CHARLIE applies when an incident occurs or intelligence is received
indicating some form of terrorist action or targeting against personnel or facilities is likely.
Prolonged implementation of CHARLIE measures may create hardship and affect the activities
of the unit and its personnel.
C10.2.5. FPCON DELTA applies in the immediate area where a terrorist attack has occurred
or when intelligence has been received that terrorist action against a specific location or person is
imminent. Normally, this FPCON is declared as a localized condition. FPCON DELTA
measures are not intended to be sustained for substantial periods.
C10.3. FPCON RESPONSIBILITIES
C10.3.1. Per references (a) and (e) Geographic Combatant Commanders shall ensure that
FPCONs are uniformly implemented and disseminated with their AOR.
C10.3.1.1. All military commanders and DoD civilians exercising equivalent authority
are responsible for ensuring that their subordinates fully understand FPCON declaration
procedures and FPCON measures.
C10.3.1.2. While there is no direct correlation between threat reporting and FPCONs,
such information assists Commanders in making prudent FPCON declarations. Existence of
threat reporting in and of itself should not be the only factor used in determining FPCONs.
FPCON declaration should be based on multiple factors that may include, but are not limited to,
threat, target vulnerability, criticality of assets, security resource availability, operational and
physiological impact, damage control, recovery procedures, international relations, and planned
U.S. Government actions that could trigger a terrorist response.
C10.3.2. The DoD FPCON system allows all military commanders and DoD civilians
exercising equivalent authority the flexibility and adaptability to develop and implement AT
measures that are more stringent than those mandated by higher authorities whenever FPCONs
are invoked. Each set of FPCON measures is the minimum that must be implemented when a
change in local threat warrants a change in FPCON or when higher authority directs an increase
in FPCON. Authorities directing implementation may augment their FPCON by adding
measures from higher FPCONs as necessary.
95
Implementation of FPCONs does not come without adverse effects on day-to-day operations; the
additional costs can be measured and described both quantitatively and qualitatively. The DoD
FPCON system acknowledges cost as a significant factor bearing on the selection and
maintenance of FPCONs. FPCONs ALPHA and BRAVO include measures that can be
sustained for extended periods, consistent with the terrorist threat.
96
C10.5.2.3. Helping to mask our capabilities to respond to, and defeat, terrorist attacks
through unannounced, unpredictable, and visible security measures.
97
C10.5.2.4. Increasing AT awareness for DoD personnel, their family members, visitors,
and neighbors.
C10.5.2.5. Providing additional training and increasing alertness of assigned security
personnel and other participants through mental stimulation by changing their routine.
C10.5.2.6. Validating the installation or facility's capability to execute individual
measures from higher FPCON.
98
If it is determined that certain FPCON measures are inappropriate for current operations, or for
proper threat mitigation, military commanders or DoD civilians exercising equivalent authority
may request a waiver. The first general/flag officer exercising Tactical Command (TACON) for
force protection or DoD civilian member of the senior executive service (SES) exercising
equivalent authority in the chain of command is the approval authority for waiver of specific
FPCON measures. Geographic combatant commanders, their deputies, or DoD civilians
exercising equivalent authority may delegate this authority below the general/flag officer level
on a case-by-case basis. Any senior military commander having TACON for force protection or
DoD civilian member of the SES exercising equivalent authority may withdraw first general/flag
officer or DoD civilian authority and retain this authority, at his or her discretion. Waiver
authority for specific FPCON measures directed by a higher echelon (above first general/flag
officer or DoD civilian member of the SES) rests with the military commander or DoD civilian
exercising equivalent authority directing their execution. Nothing in this waiver process is
intended to diminish the authority or responsibility of military commanders or DoD civilians
exercising equivalent authority, senior to the waiver authority, to exercise oversight of FPCON
and RAMs program execution.
C10.6.1. To ensure a consistent force protection posture is maintained, tenants on CONUS
installations and facilities shall coordinate waiver actions with the host installation before
submitting them to their chain of command.
99
C10.6.2. All waiver requests shall be directed to the waiver authority. Information copies
shall be sent to the Combatant Command's joint operations center, major/fleet command’s
operations center, service operations center, or DoD civilian operations center, as applicable.
C10.6.3. Approved waivers, to include mitigating measures or actions, must be forwarded to
service, combatant command, major command, fleet, or DoD civilian equivalent command-level
recipients within 24 hours.
100
C11. CHAPTER 11
CONSEQUENCE MANAGEMENT PLANNING
AND
TERRORIST USE OF WEAPONS OF MASS DESTRUCTION (WMD)
C11.1. INTRODUCTION
WMD are those weapons capable of a high order of destruction and/or of being used in such a
manner as to kill/injure large numbers of people. WMD can be any device, material, or
substance used in a manner, in a quantity or type, or under circumstances evidencing intent to
cause death or serious injury to persons or significant damage to property. WMDs can be
CBRNE devices. This Chapter provides an overview of the potential use of weapons of WMD
by terrorists and broad guidance for achieving reference (e) standards.
C11.2. TERRORIST USE OF WMD
C11.2.1. The threat of terrorist use of WMD poses great challenges for military
organizations. Previous concerns regarding WMD use focused on battlefield employment
against warned and protected military personnel. The threat has expanded in recent years as
many terrorist organizations have grown in sophistication and now have the ability to acquire
and employ WMD. Numerous groups and organizations have determined that acquiring and
using WMD may further their cause. Paramilitary groups, antigovernment organizations,
political splinter groups, religious cults, and terrorist organizations have all attempted to use
some type of WMD against U.S. interests or those of our allies.
C11.2.2. Recent events have demonstrated the reality of terrorist acquisition and
employment of all types of WMD. The ease with which these organizations obtained material
and technology to manufacture and disseminate WMD clearly shows that even small,
previously unknown groups can pose significant threats to DoD organizations. The
documented use of biological agents, toxins, chemical agents, and/or the efforts to obtain
radiological material serve to illustrate the growing concern over terrorist use of WMD.
C11.3. CONSIDERATIONS
C11.3.1. WMD Threat. WMD related events have increased in number and lethality in a
relatively short time. The probable use of this asymmetrical threat requires specific planning
on the part of not only combat forces, but peace time forces and noncombatants as well.
101
C11.3.2. WMD Planning Considerations. Existing military doctrine has expanded from
Chemical, Biological, and Radiological (CBR) terminology to include Nuclear and High-yield
Explosives (CBRNE). Planning factors for battlefield use of these weapons may have direct
application when planning for terrorist use of WMD. Table C11.T1. summarizes planning
considerations in existing joint doctrinal publications on the use of CBRNE weapons. Section
C11.6. addresses planning considerations for possible terrorist use of WMD.
C11.3.3. Chemical Agents. The traditional categories of chemical agents include blister
agents, nerve agents, blood agents, and choking/respiratory agents. These agents have been
studied extensively. Their physical properties, physiological effects to the human body,
treatment, and methods of employment are well documented in military doctrinal publications.
It is important to remember that most military planning concerns large-scale use of the weapons
against troops in a tactical environment. Threat from terrorist use may well be from the release of
relatively small quantities in highly populated areas where the potential for exposure is greatest.
Table C11.T2. lists some of the most common military chemical agents and their properties.
Army FM 3-11.9 (reference (ac)) provides more information on various Chemical and Biological
warfare agents.
102
C11.3.3.1. While much is known about these categories of chemical agents, terrorists are
also capable of using a wide variety of toxic industrial chemicals and toxic industrial agents.
Planning for this type of attack against unwarned, unprotected personnel presents great
challenges to DoD organizations. These toxic industrial chemicals (TICs) and toxic industrial
materials (TIMs) may exist in large quantities on/near military installations and provide potential
weapons of opportunity. Additionally, current detection equipment may not be able to
adequately warn of an incident or to properly identify the type of substance used. Medical
personnel may not be able to rapidly diagnosis or treat casualties. Decontamination and
contamination control procedures may not adequately address techniques to minimize and
mitigate the effects of the incident. To minimize the uncertainty of these situations, a thorough
assessment of the range of possible threat agents and potential vulnerabilities is essential.
C11.3.3.2. For any type of chemical agent attack, procedures must be in place to allow
for the rapid recognition and warning of the incident. Unlike biological agents, chemical agent
exposure generally results in the sudden onset of symptoms. Emergency responders should be
trained to recognize symptoms of chemical contamination. Emergency medical responders
should be trained to recognize and treat victims of toxic chemical exposure. Detection and
103
identification of the agent or agent properties will need to occur at the site and be conducted by
an appropriate first response team.
C11.3.4. Biological Agents. A major problem posed by biological weapons is the lack of
adequate quantities of responsive and sensitive biological detectors. If an area is not covered by
detectors , there shall be a significant lag-time between employment and on-set of symptoms.
Biological weapons may be more insidious than chemical weapons. Current biological detectors
are “detect to treat,” providing information on the type of agent after exposure. Research,
development, and acquisition (RDA) efforts are underway to develop and field “detect to warn”
detectors, but deployment of such devices shall not occur for several years. Once exposure has
occurred, most of the biological agents have an incubation period of one to seven days before the
onset of symptoms. Potential agents such as anthrax, cholera, plague, smallpox, tularemia, and
viral hemorrhagic fevers, such as Ebola virus, Lassa fever, and Yellow fever, have delayed
symptoms following initial exposure. The lag time from employment until detection has the
potential to allow for widespread contamination and the dispersion of affected personnel across a
very large area. Table C11.T3. shows some potential biological agents, their incubation periods,
and potential lethality.
C11.3.4.1. One method terrorists may use to spread biological agents is through dispersal
of the agent as an aerosolized spray containing bacteria, viruses, or spores. This method is hard
to detect and is effective in covering large areas with minimal amounts of agent and equipment.
Other methods of agent dispersal include introducing the agent into food and water sources or
releasing animals (vectors) that have been infected or are carrying the pathogenic organism.
Detection of attacks is usually delayed, allowing for significant dispersion of the agent and
greatly increased casualties. The following examples demonstrate how terrorists could disperse
104
biological agents using very common means that would be difficult to detect and attract little
attention from security personnel.
C11.3.4.1.1. Individuals posing as workers in utility uniforms spraying vegetation
along the perimeter fence line of an installation or headquarters. The sprayers could contain
biological agents that were being aerosolized by the commercial weed sprayers.
C11.3.4.1.2. A small boat passing through a port area on a slow meandering course.
A commercial generator and compressor could be concealed in the boat and disperse a
significant quantity of agent material over a large area.
C11.3.4.1.3. A small commercial aircraft with an advertising banner attached flying
repeatedly over an outdoor sporting event or over a housing area. The plane could easily conceal
a spray tank that was dispersing agent over a very large area.
C11.3.4.2. Two key factors limiting the effects of a potential biological agent attack are a
comprehensive vaccination policy and the active medical surveillance program. Vaccination
programs offer the best defense against agent exposure but are limited by a lack of vaccines for
all potential agents. To help compensate for this shortfall, it is important to involve medical
personnel in assessing the threat from indigenous diseases and establishing an active preventive
medicine program. In contrast to naturally occurring diseases in which incidence of the disease
increase slowly over a period of weeks or months, a deliberate biological attack shall peak in a
few days. Timely identification and communication of the attack is essential in treating and
controlling the disease and limiting the effect on personnel. An active medical surveillance
program is essential to this process.
C11.3.4.3. Preventive medicine services shall be in great demand upon the onset of an
attack. Demands for medical support and service shall likely exceed their availability.
Preventive medicine specialists shall be required to assist Commanders with identifying safe
food and water sources and in determining when to use treatment, immunization, and other
preventive measures. Preventive medicine personnel must be continually aware of the biological
threat in order to update their database on diseases, potential vectors, and the susceptibility of
troops to diseases.
C11.3.5. Toxins are a relatively new threat and pose a difficult problem in detecting an
attack. Toxins are chemical compounds, obtained from biological sources. Botulinum and ricin
are in the toxin category. As with biological agents, medical personnel must provide assistance
in identifying and treating personnel that are exposed to toxin agents. Toxins may be dispersed
105
by methods similar to those used for biological agents and are more rapid acting. Other than
immediate decontamination, there are no fielded first aid or treatment options for toxins;
casualties must be taken to a medical facility for diagnosis and treatment. Table C11.T4. lists
examples of toxins and the time frame from exposure to onset of symptoms.
C11.3.5.1. Toxins are non-volatile and tend to be more toxic than chemical agents. For
example, botulinum toxin is 15,000 times more lethal than nerve agent GB. Their volatility
means that they would not be a persistent battlefield threat and would not likely be spread by
secondary or person-to-person exposures.
C11.3.5.2. For toxins, both incapacitation and lethality must be considered. Several
toxins cause significant illness at levels much lower than the level required for lethality and are
militarily significant in their ability to incapacitate military force and civilian populations.
Recovery rates for exposed personnel tend to be slow, even when they are provided continuing
medical treatment.
C11.3.6. Radiological Materials. While it is unlikely that non state sponsored terrorists shall
develop nuclear weapons, they have shown that they can procure radioactive material. The most
likely source of this material is from industrial and medical applications. Nuclear research
facilities, nuclear reactors, medical research and treatment centers, and construction engineering
activities are all potential sources of radioactive material. Low-level radioactive material and
radioactive waste could be used to contaminate food and water sources as well as public areas
and facilities. Equipment to detect radiation is available to most units, but normally is not in
continuous use. Because low-level exposure to radiation does not have a noticeable immediate
effect, an attack may go undetected. An exception to this would be the use of an improvised
explosive device to spread radiation upon detonation. Radiation, regardless of its intensity, has
the potential to produce harmful effects on unprotected personnel and have significant
106
psychological impact. Effects may be the result of external exposure to a radioactive source or
inhalation or ingestion of radioactive particles.
C11.3.7. Recent events have forced a greater awareness of the vulnerability of U.S.
personnel and facilities to attack from terrorist elements, both in the US and abroad. The
suddenness and severity of the attacks has reinforced the need to anticipate and plan for the
threat and consequence of terrorist attacks against U.S. personnel. The remainder of this Chapter
addresses reference (e) standards to assist in the analysis, planning, crisis management, and
consequence management of the possible use of WMD by terrorist organizations.
C11.4. POTENTIAL THREAT OF TERRORIST USE OF WMD
C11.4.1. The potentially devastating effect of terrorist use of WMD mandates that
organizations conduct a thorough analysis of the threat in their areas of interest. Chapter 5
provides detailed discussions on guidelines and procedures to follow when conducting terrorist
threat estimates. The unique aspects of the terrorist threat to acquire and employ WMD should
be considered as a distinct element of the overall TA.
C11.4.2. The Combatant Commanders should ensure an integrated collection and analysis
program is established that draws detailed threat data from all available sources. Deployed
forces should also establish close relationships with diplomatic missions and supporting country
teams within their AOR; they are an excellent source of information on the political and
psychological background of local terrorist organizations.
C11.4.3. Collection plans should address the terrorist capability to acquire and use WMD.
This information should be part of the Commander’s Essential Elements of Information (EEI).
EEI should be integrated into subordinate elements’ collection plans and reviewed as new or
evolving threats emerge. The plan should consider terrorist threats from commercial, industrial
and medical source material as well as the traditional military nuclear, biological and chemical
weapons and agents.
C11.4.4. New or changing terrorist capability to acquire or deploy WMD must be rapidly
disseminated through command channels. Units should include procedures for immediate
reporting of changing terrorist threats or actual use of WMD. Notification should be sent
through chains of command, lines of authority, intelligence agencies and similar organizations.
As appropriate, it must also be passed to diplomatic missions or local U.S. authorities to assist
them in their preparation and response for a potential incident.
107
C11.6.1. DoD Instruction 2000.18 (reference (ad)) provides DoD guidance for the
establishment of a CBRNE preparedness program for emergency responders at all DoD
installations. DoD installation emergency responders must be prepared to respond to the effects
108
of a CBRNE incident to preserve life, prevent human suffering, mitigate the incident, and protect
critical assets and infrastructure. Reference (e) standards require commanders to “include
terrorist consequence management preparedness and response measures as an adjunct to the
installation AT Plan.” The planning must focus primarily on mitigating the effects of, and
immediate recovery from, a terrorist incident and address all factors included in emergency
response and disaster planning doctrine for the installation. To ensure completeness, plans
should address the nine weapons of mass destruction response functions (WMDRF), as discussed
later in this Chapter. As in all AT planning, the WMD portion of the AT plan should be a
product of a working group comprised of the representatives from the installation or unit
functional areas. More assistance for WMD planning can be found in the WMD Appendix to the
AT/FP Installation Planning Template or the Installation Antiterrorism Program and Planning
Tool, both produced by the Joint Staffs Deputy Directorate for Antiterrorism and Homeland
Defense, J3 DD AT/HD.
C11.6.2. According to reference (e), commanders must develop estimates for potential
terrorist use of WMD in their AOR. This forms the basis for all facts and assumptions that drive
the planning and preparation for any use of WMD by potential threat organizations.
C11.6.3. Likewise, reference (e) directs that Commanders must conduct a vulnerability
assessment for terrorist use of WMD. Identification of the most likely and vulnerable targets
enables more detailed planning, which drives organizations to improve security measures.
C11.6.4.1. Information and Planning. This area focuses on preparing the installation to
respond to a terrorist attack. In the event of a terrorist incident, the installation must coordinate
large contingencies of internal and external support organizations for an effective incident
response. The subtasks are MOUs/MOAs, command and control, emergency operations center,
and public information.
C11.6.4.1.1. MOUs/MOAs. During the “baselining” process, the Commander
identifies shortfalls in capability to detect, deter and respond to an incident. The shortfalls from
109
the response functions may be filled through MOAs/MOUs with local, State, and Federal
authorities or the host nation. Coordination with local authorities is essential when planning for
a WMD event. An attack on either the DoD facility or the local civilian populaces shall most
likely affect both communities. Thorough coordination between DoD organizations and local
officials provides a means to improve the response time and offers the opportunity to share
critical resources needed to mitigate the effects of an incident. MOUs/MOAs are discussed in
more detail in Chapter 3.
C11.6.4.1.2. Command and Control. Command and control is the process
Commanders use to plan, direct, coordinate, and control forces to ensure mission
accomplishment. The facility Commander has overall authority and direction over the WMD
incident through his on site incident commander, unless further delegated, or assumed by the
FBI. In the event the FBI assumes jurisdiction, the facility Commander retains control of
military assets. For off-facility CBRNE events in foreign countries, the DOS is designated as the
primary Federal Agency for foreign consequence management operations in support of foreign
governments.
110
C11.6.4.1.6. Training and Exercises. Training is the means to achieve the tactical
and technical proficiency that individuals, leaders, and units must have to enable them to
accomplish their missions. Training must focus on the techniques and procedures of integrated
response operations. Exercises should include all response functions, to include local, State,
Federal, or host nation resources, required to support AT and consequence management
operations. AT training should be incorporated into unit-level training plans and pre-deployment
exercises. Lessons learned must be documented (after action review (AARs)) and used to
develop training plans and assess the overall effectiveness of the AT plan.
C11.6.4.2. Communications. A crucial aspect of implementing the WMD plan is
establishing and controlling communications among the forces in the incident area, the EOC, and
the Incident Response Team (IRT). Communications personnel must be able to respond to
changing needs during the incident and be able to maintain, over a prolonged period, control of
all incoming and outgoing communications as well as the communications channels included in
the WMD plan. Use of appropriate secure emergency communication equipment is paramount to
successful management of the incident. Interoperability with all response entities, military or
civilian is necessary. Back up communication plans and equipment (layers of capability) should
be planned for and available if needed.
111
C11.6.4.5. Fire Fighting. Fire fighting response functions include detecting and
suppressing fires, effecting rescue, rendering life saving first aid, and providing water to
decontamination efforts.
C11.6.4.6. Health and Medical Services. Health and medical services should provide for
adequate public health and medical care following a WMD incident, both at the incident site and
in hospitals. The use of CBRNE weapons or systems may create large numbers of casualties in
short periods; compromise both the quality and quantity of health care delivered by posing a
serious contamination threat to medical personnel; constrain mobility and evacuation; and
contaminate the logistical supply base. These factors have the potential of severely degrading
health care delivery and require detailed planning.
112
113
114
C11.6.6. The matrix above is only an example. Each installation must prepare its own action
sets and coordination based on the installation’s Combatant Commander/Service/DoD Agency
specific requirements, structure, expertise, location and resources. Reference (aa) provides
greater details on the Response/Synchronization Matrix.
115
C12. CHAPTER 12
TERRORIST INCIDENT RESPONSE MANAGEMENT
C12.1. INTRODUCTION
C12.1.1. Terrorist Incident Response Management is a sequence of command, staff and first
responder actions to respond to a terrorist incident or other unique event and restore AT
capability. The primary objective of Terrorist Incident Response Management is to limit the
effects and number of casualties resulting from a terrorist attack. Commanders develop response
measures to save lives, preserve health and safety, secure and eliminate the hazard, protect
property, prevent further damage to the installation and maintain public confidence in the
installation’s ability to respond to a terrorist incident.
C12.1.3. This Chapter addresses management of a terrorist incident. The focus of incident
management is on the organic assets of an installation, ship, or base and the ability to cope with
the situation using organic assets until outside assistance arrives. Reference (e) requires all
commanders to prepare installation-wide terrorist incident response measures and include them
in the AT plan. The terrorist incident response measures should include procedures for
determining the nature and scope of incidence response; procedures for coordinating security,
fire, and medical first responders; and steps to reconstitute the installation’s ability to perform
AT measures.
C12.1.4. There are an unlimited number of potential terrorist incidents requiring a response.
Developing separate courses of action for each is an unrealistic task. To prepare for the most
probable, or likely threats, AT Plans should address (at an absolute minimum) each potential
threat identified through the TA Process.
116
C12.3.1. Onset of a Terrorist Incident: The onset of a terrorist incident begins with the
detection of an unlawful act of violence or threatened violence. Detection may result from
routine surveillance performed by an installation or facility intrusion detection system, guard or
security force, or aware DoD-affiliated persons. Once detection of a criminal act occurs, first
responding security or law enforcement personnel must perform an initial assessment.
C12.3.2. Initial Response Force
C12.3.2.1. On-duty Security Forces/Military Police patrols or guard personnel usually
provide initial response to a terrorist attack. The initial response force is usually under the
control of the on-scene senior officer or noncommissioned officer assuming responsibility. At
facilities controlled by the Defense Agencies, the initial response force may be under the control
of a senior civilian security or DoD law enforcement official. Once the initial response force has
responded to the incident and determined the circumstances, the installation Commander should
activate required forces and begin notification procedures for military and civilian authorities.
C12.3.2.2. The initial response force should immediately identify and report the nature
of the situation, isolate the incident, and contain the situation until relieved by the reaction force
commander. Initial response force actions are critical. Each shift of the daily security force must
117
have trained personnel who are aware of the threat and are capable of reacting promptly to any
new development.
C12.3.2.3. For example, if the attack is a bombing, ambush, assassination, or
firebombing, the terrorists may escape before additional forces arrive. In these cases, the initial
response force should provide medical aid, seal off the crime scene, and secure other potential
targets in case the initial attack was a diversionary tactic. If the event is a hostage/barricade
situation, the initial response force should seal off and isolate the incident scene to ensure no one
enters or leaves the area. The initial response force must also be prepared to locate witnesses and
direct them to a safe location for debriefing. For foreign incidents, the initial response force
must also be prepared to interface with host nation police or military forces that may also be
responding to the incident.
C12.3.3. Installation/Base Commander
118
C12.3.5. Confirmation
C12.3.5.1. Since jurisdiction depends on whether the incident is terrorist related, it is
important for the response force to identify the type of incident as quickly as possible. If the FBI
or host nation assumes control, then the response force must be prepared to coordinate the
operational handover and assist as needed.
C12.3.5.2. The initial or specialized response forces may be required to provide outer
perimeter security as well as be prepared to manage the entire event. They must also be prepared
to turn over responsibility for resolving the incident to host government security forces if
overseas or the FBI if within the United States and in the event that the FBI seeks to exercise
jurisdiction over the containment and resolution phases of the incident. These installation/base
forces must always prepare for the most resource-demanding contingency. This level of
readiness requires considerable sustainment training.
119
C12.4.2. Phase II: Augmentation of Initial Response Force. Phase II is the augmentation of
the initial response force by additional law enforcement/security personnel and/or a specially
trained response force, such as Special Reaction Team (SRT)/Emergency Service Team (EST),
FBI hostage rescue teams, or host nation tactical units. On many installations, the initial
response force and the augmentation force are essentially the same. This phase begins when the
EOC is activated. During this phase, either the FBI or the host nation may assume control
jurisdiction over the incident. If that occurs, installation forces must be ready to support the
operation. The installation specially trained response force must be ready for employment in this
phase of the operation. In any country that a terrorist incident against an American facility/unit
occurs, the DOS and the U.S. Embassy shall play the key role in coordinating the U.S.
Government and host country response to such an incident.
C12.4.3. Phase III: Commitment of Counter-Terrorist Resources. Phase III is the
commitment of a specialized the FBI, the Department of Defense, or host nation counter-terrorist
force. In this phase steps are taken to terminate the incident. Incident termination may be the
result of successful negotiations, assault, or other actions including the surrender of the terrorists.
Because identifying the terrorists, as opposed to the hostages, may be difficult, it is important
that the capturing forces handle and secure all initial captives as possible terrorists.
C12.4.4. Response Sequence. Figure C12.F1. shows a typical response sequence to a
terrorist incident. It addresses the straightforward case within the exclusive jurisdiction of the
United States, its territories, and its possessions; where the DoD Components perform all three
phases of terrorist incident crisis management—initial response, containment, and crisis
resolution. Also, it shows the process to those instances overseas, where SOFA permits the DoD
Components to manage terrorist crises on their own authority. The following section addresses
those situations in which host Governments or the FBI assume responsibility for managing the
containment and resolution phases of a terrorist incident.
120
Terrorist Incident
DoD Police/MP/MA
Security Forces
Commander/Manager Provide Inner and
Activates EOC Outer Perimeter
Mission-Essential Personnel
Arrive at Designated Location
Force Actions
Response Force Isolates Considered
and Reports Intelligence
FBI or Host
FBI Nation Assumes
SAC Retains SAC determines Counterterrorism Control
YES Authority Required Assets Assets Arrive
C12.5.1. It is customary and usual for military commanders and civilian managers to assume
responsibility for initial response, containment, and resolution of criminal incidents that occur on
DoD facilities within the United States, its territories, and its possessions. The FBI has lead
agency responsibilities for investigation and prosecution of alleged violations of U.S. Code that
occur on DoD installations or within DoD facilities. It also has the responsibility for
121
C12.6.1. Installations have the requirement for an immediate response capability to ensure
critical mission continuity and save lives during a CBRNE incident and to mitigate the situation
(see reference (ad)). National-level responders may not be immediately accessible or available
to respond to an installation’s needs. Therefore, each installation must plan for the worst-case
scenario by tailoring its response for each functional area, based on its organic resources and
available local support through MOAs/MOUs. The situation may dictate that the installation not
only conducts the initial response, but also sustains response operations.
C12.6.2. In the event of a terrorist CBRNE incident, the commander should direct the
following complementary sets of actions:
C12.6.2.1. Activate the installation’s initial response elements and local MOAs/MOUs.
C12.6.2.2. Initiate the DoD notification process; and
C12.6.2.3. Request resources to augment the installation’s response capabilities.
C12.6.3. Installation commanders are responsible for ensuring their first responders have
a plan and are equipped, trained, and exercised on the plan for responding to an incident
involving CBRNE.
C12.6.4. Installations are required to have incident management plans. One effective way to
develop these plans is by the use of WMDRFs. As detailed in Chapter 11, the WMDRFs parallel
the national-level FEMA Emergency Support Functions (ESFs) to the greatest degree possible.
This parallelism shall ensure that if there is a need for Federal assistance, incoming support can
easily transition into the appropriate functional areas on the installation. The Installation
Antiterrorism Program and Planning Tool (IPPT) uses the WMDRFs to systematically address
each of the installation response functional areas. From these Response Measures, the
122
installation planners should create installation specific action sets or implementation instructions.
These action sets should include who, what, when, where, and how the lead staff element shall
carry out the response measure. Once planners have carefully prepared discrete actions sets, it is
recommended they be placed in a response matrix.
C12.6.5. Terrorist CBRNE incidents, or threats of terrorist CBRNE acts, may overwhelm an
installation’s minimum capability to adequately detect, assess, or contain the threat. The
Department of Defense, like most other local, State, or Federal entities, has neither the authority
nor the expertise to respond unilaterally to all aspects of terrorist CBRNE threats or acts. The
tenets of the National Response Plan shall help an installation develop its response based on
crisis and consequence management.
C12.7. SPECIAL CONSIDERATIONS DURING CRISIS RESPONSE
123
incidents, civilian detainees may be processed according to the SOFA, diplomatic note
(DIPNOTE) or other agreements with that particular country. The Staff Judge Advocate (SJA)
should be consulted prior to releasing any individual to Host Nation authorities. In coordination
with the SJA, an after-action report should be prepared within 7 working days after termination
of the event.
C12.7.4. Reports. Reporting to higher headquarters is an important element in any special
threat or terrorist situation. Each Service and command have a reporting procedure that requires
a timely report of the incident to higher military authorities. The crisis management plan should
dictate required reports and timelines for notification. An after-action report should be prepared
within seven working days after termination of the event. This should include all staff journals
and other documentation to include detailed information concerning disposition of evidence and
captured individuals. The SJA and law enforcement personnel should ensure this report is in
sufficient detail to meet prosecution requirements.
C12.7.5. PA. Principal PA objectives of a terrorist incident crisis management plan are to
ensure accurate information is provided to the public (including news media) and to
communicate a calm, measured and reasonable reaction to the ongoing event.
C12.7.5.1. PA programs should attempt to:
C12.7.5.1.1. Identify terrorist activities, as criminal acts not worthy of public
support.
C12.7.5.1.2. Reiterate U.S. policy on terrorism that identifies all terrorist acts as
criminal acts, mandates no concessions to terrorists, refuses to pay ransom, and isolates those
nations identified as encouraging, supporting or directing terrorism; and
C12.7.5.3. When U.S. military security or combating terrorism forces are employed, the
Department of Defense provides a spokesman for dealing only with security or combating
terrorism forces military operational matters.
124
C12.7.5.4. The DOS coordinates PA during terrorist incidents overseas. The DOS may
delegate the PA responsibility to a designated DoD representative.
C12.7.5.5. The OASD (PA) is the single point of contact for all PA aspects of U.S.
military CbT actions. While there is no mandatory requirement to release information,
installation commanders are advised to exercise prudent judgment on such matters and
coordinate actions through PA channels, to OASD (PA).
C12.7.5.6. When the EOC is activated, it should include the activities of the PAO and
media center. The media center should be located in a separate location away from the EOC.
The PAO shall prepare media releases and conduct briefings at the media center during the
incident. The PAO shall use information obtained from EOC activities. PA shall coordinate
with EOC personnel, and clear all information with the commander, prior to release. The PAO
must be fully knowledgeable of the situation as it develops. The media representatives should
not have direct access to hostages, hostage takers, communications nets, or anyone directly
involved in a terrorist incident unless the PAO has cleared such contact with the EOC. DoD
experience with media representatives has shown that bringing them in early under reasonable
conditions and restrictions commensurate with the risk and gravity of the event, providing them
thorough briefings, maintains DoD credibility and preserves freedom of information. Refer to
Chapter 19 for additional PA guidance.
C12.7.6. Immediate Post-Incident Actions. During the immediate post-incident phase,
medical and psychological attention, along with other support services, should be given to all
personnel involved in the operation, including captured terrorists. A final briefing should be
given to media personnel; however, they should not be permitted to visit the incident site.
Because of the criminal nature of the terrorist event, the site must be secured until the crime
scene investigation is completed by the appropriate investigative agency. It is also imperative to
record every action that occurred during the incident.
125
C13. CHAPTER 13
EXERCISING THE ANTITERRORISM PLAN
C13.1. INTRODUCTION
C13.1.1. Preparing for AT exercises is an important task that requires dedication and
planning. Exercises are conducted to give leaders, staffs and personnel realistic experiences to
better accomplish their wartime or special mission tasks. Realistic exercises allow personnel to
be placed in fluid environments where critical decision making is practiced to broaden
experience base and to identify areas or plans that need improvement. Reference (e) directs that
Commanders at all levels shall conduct field and staff training to exercise AT plans, at least
annually. Additionally, the standard requires the following portions be exercised, at a minimum;
AT Physical Security measures, Terrorist Incident Response measures, and Terrorist
Consequence Management measures. Exercising AT plans is an important part of an AT
Program as it provides the following benefits:
C13.1.3. Provides the organization with a means to document and measure operational
readiness.
C13.1.9. Provides a means to identify and prioritize needed force protection resources.
126
C13.2.1. AT exercises are similar in planning, preparation, execution and evaluation to other
training events and exercises conducted by our services at the unit/installation level. These types
of exercises include Tabletop, Drills, and Full-Scale exercises and generally increase in level of
involvement and cost.
C13.2.2. Tabletop Exercises. Also known as Figure C13.F1. Players start a tabletop exercise.
a rock drill, this type of AT exercise involves
the key leaders and staff officers of an
organization or installation gathered in one
room or area. It is a scenario driven discussion
led by a facilitator and can be used to exercise
specific portions of an AT plan or the entire
plan itself. This type of exercise, depending on
the scenario, can be one hour or last a full day.
A tabletop exercise should be used when an AT
plan is new, as refresher training, or to
familiarize new leaders with the AT plan.
C13.2.3. Drills. Drills are collective training Figure C13.F2. Security Forces conduct a drill.
and validate specific portions of a plan. These also can last anywhere from 1 to 8 hours, or even
longer, if necessary.
127
128
C13.3.2.3. Observer/Controllers (O/C). O/Cs are key players during exercises and
should be identified and trained prior to the event. O/Cs should be able to move about freely
during an exercise, to ensure participants stay focused on the scenario, abide by the exercise
rules, and assist in meeting the exercise objectives. In playing the role of the white hat, O/Cs
shall be in an excellent position to capture lessons learned and facilitate the AAR process.
C13.3.4. Scenario Development. The operations officer and intelligence officer need to
work together to develop a realistic scenario which shall set the conditions to achieve the training
objectives. The threat scenario must be realistic and pertinent to the local threat assessment.
Participation of the local law enforcement community is essential. DoD and civilian law
enforcement can make significant contributions to scenario and threat development. Ensuring
valuable AT injects are developed is probably the most important task for the identified action
officer during the planning phase so that the training audience experiences a fluid operation
requiring key AT staffing and decisions by leaders. The current threat assessment should be
utilized to develop a realistic scenario. For full-scale exercises, commands should consider a
Red Team to fill the role of a terrorist organization. Identifying the Red Team early is also
critically important so that they can properly prepare and train for the event.
129
C13.3.4.2. Once the vision for the exercise has been established, making it happen is the
next step. This requires a great deal of logistics and administrative coordination and is essential
to the success of the exercise. The staging of the event may require resources not normally on-
hand or may require initiative to acquire. Arrangements for rooms, vehicles for O/C and key
leaders, along with other white hat requirements need to be locked in. Staging of events and the
logistics associated with a "terrorist act" need to be considered and planned for. Visual/audio
support, access control to key O/C areas, and the control cell set up should be arranged. Finally,
it is important to plan for basic items such as food, water and latrine facilities for players and
O/Cs. All of these requirements should be tasked to subordinate organizations or staff.
C13.3.5. The scenario should be articulated into a well-written exercise directive, with
identified purposes of clear, focused tasks with pre-defined evaluation criteria. The directive
shall be the foundation of the exercise and must be produced far enough in advance for units to
digest, plan and train to ensure the exercise is worthwhile.
C13.3.6. Once the scenario and directive have been developed, planners should create an
exercise manual. It should contain the schedule, the scope, objectives, inject
timeline/implementation schedule, ground rules and Rules of Engagement (ROE). It should also
contain scenario materials, contact information for key leaders and participants, the exercise
directive that task organizations and units, and any other forms and records needed. Injects and
some scenario materials should not be available to player units or the exercise shall lose realism.
As such, portions of this manual should become close hold documents, available only to key
leaders, planners, and white hat O/Cs.
C13.3.7. Preparation for the exercise is completed when the staff prepares sufficient copies
of exercise manuals and briefing material needed to conduct the exercise.
130
C13.4.1. Exercises shall have many players. The Exercise Coordinator who is the head O/C,
the other O/Cs, player units, and role players or Red Teams are key players. The Exercise
Coordinator has overall responsibility for running the exercise and monitors the pace of events
according to the scenario. The O/Cs observe individuals, and unit or staff players to ensure
objectives are being met and to assess player responses to the scenario to compare against
expected responses and the pre-defined evaluation criteria. The O/Cs should also assist in
tracking AAR comments.
C13.4.2. Before the exercise starts several briefings need to occur to get everyone's head in
the game. Players need to be briefed on the scope of the exercise the rules for the exercise,
safety and the roles of the controllers. Control cells need to be briefed and trained to run injects
by message, phone, simulators, or other pre-determined means. Finally, role players need to
understand when their roles start, end and the purpose of their role-playing event.
C13.4.3. Once the briefings are accomplished, it is time to start the exercise. The injects
should be initiated according to the timeline and monitored by the Exercise Controller. He shall
need assistance in keeping track of time so players are continually challenged. The planned
timeline may need to be slowed down or even sped up, as necessary, to keep the players
constantly involved and engaged. A real AT event shall be extremely engaging and the exercise
should attempt to simulate those conditions. The AT exercise ends when all injects have
occurred, player units have accomplished responses, and the training objectives have been met.
C13.5.1. The evaluation phase actually begins concurrently with the exercise. O/Cs and
players should continually be noting and tracking AAR comments for consideration later. After
the exercise, each echelon should conduct its own "hotwash" to capture lessons learned and AAR
comments. If the exercise lasts more than one day it is usually a good idea to have a hotwash at
the end of each day.
131
C13.5.3. The Exercise Controller is responsible to collect all O/C input for the exercise
AAR. The AAR is where significant execution shortcomings of the exercise and scenario should
be identified, discussed, and a concept plan of action to fix each item developed.
C13.5.4. A formal AAR should be held with all key leaders and staff present to review the
issues developed for discussion. Participants should be encouraged to speak freely at this
discussion to gather the best ideas that shall remedy identified shortcomings. Resource shortages
should be identified, as well as procedural problems.
C13.5.5. Once the formal AAR is complete, the exercise staff officer should prepare a
written AAR, complete with milestones and suspense dates to complete required retraining,
revision of the AT plan, and resource acquisitions.
C13.5.6. This exercise process shall yield great benefits. Exercises are part of the AT
program life cycle depicted below. They assist in improving the AT plan, in acquiring resources,
reviewing a program and increasing awareness. Arguably, conducting an exercise is the best
way to enhance installation or organization AT programs and plans throughout the life cycle.
Figure C13.F4. portrays the AT program life cycle. Figure C13.F4. Life Cycle of the AT Exercise
Program.
Acquire
resources
Task Org Change? Exercise Plan
Threat Changed?
Doctrinal Change?
Modify Plan
- CO Ownership
- AT Committee HHQ VA
-AT Working Group
Review - Training
Acquire
Program
resources
Modify Plan
Modify Plan
(Fine Tune) Exercise Plan (Minor)
132
C14. CHAPTER 14
ANTITERRORISM ASSESSMENTS
C14.1. INTRODUCTION
Global terrorism has become a high profile concern within the DoD since the Khobar Towers
terrorist bombing in 1996. The September 11, 2001 terrorist attacks on the World Trade Center
and the Pentagon indicate that U.S. national security and our military forces are increasingly
vulnerable to the transnational threat of terrorism. People, mission-related facilities, and the
support infrastructure are all at risk.
C14.1.2. VA help determine the vulnerability of a facility to a terrorist attack and identifies
areas of improvement to withstand, mitigate or deter the attack.
C14.1.3. This Chapter describes the three types of assessments available to the installation
commander:
C14.2. JSIVAS
C14.2.1. The Chairman of the Joint Chiefs of Staff, as the principal military advisor to the
Secretary of Defense for AT issues, is tasked to assess the DoD Component policies and
programs. To accomplish this task, the Chairman of the Joint Chiefs of Staff executes the JSIVA
program through the DD AT/HD Division.
C14.2.2. The Combatant Commanders and Services are required by reference (a) to assess
their installations and AT programs to reference (e) standards. Combatant Commanders and
Services can request JSIVAs to meet their assessment responsibilities. DD AT/HD allocates
133
C14.2.3. JSIVA teams provide independent assessments to assist the Commanders in meeting
AT responsibilities. JSIVA teams identify installation vulnerabilities and present options
(procedural and programmatic) for the Commanders to mitigate those vulnerabilities. The
ultimate goal of a JSIVA is to assist commanders in enhancing the AT programs.
C14.2.4. In response to USS COLE and Government Accounting Office (GAO) report
findings, the scope of the JSIVA process shall be expanded to include higher headquarters,
strategic sea and airports, and the Joint Chiefs of Staff exercises.
C14.3.2. To provide essential visibility, commanders shall prioritize, track, and report
vulnerabilities identified during vulnerability assessments to the next general officer/flag officer
or equivalent. Note that Higher Headquarters Vulnerability Assessments satisfy the annual
requirement for a Local Vulnerability Assessment.
134
C14.5.1.1. AT Plans and Programs. The assessment shall examine the installation AT
program and its ability to accomplish appropriate standards contained in reference (e) and those
established by the appropriate Combatant Command, Service, or DoD Agency.
135
C14.5.1.5. VAs for Terrorist Use of WMD. The assessment shall assess the vulnerability
of installations, facilities, and personnel within their AOR to terrorist use of WMD, to include
the potential use of CBRNE.
C14.5.1.5.1. The assessment shall examine written plans and/or programs in the areas
of counterintelligence, law enforcement liaison, intelligence support, security and post-incident
response (the ability of the activity to respond to a terrorist incident, especially a mass casualty
event, to include a disease outbreak caused by terrorist use of biological weapons).
C14.5.1.5.2. The assessment shall focus on the most probable terrorist threat for the
facility and appropriate countermeasures. In cases where no identified threat exists, units shall
be assessed on their ability to implement AT measures under increasing FPCONs in response to
an increase in the Terrorist Threat Level or terrorist threat warning.
C14.5.1.5.4. Host Nation, Local Community, Inter-Service, and Tenant Support. The
assessment shall examine the level and adequacy of support available to the activity from the
136
C14.5.1.5.4.1. The assessment shall determine the status of formal and informal
agreements with supporting organizations via MOU or MOA, Inter-Service Support Agreements,
Host Tenant Support Agreements, or other models.
C14.5.1.6.2. Based on site specific factors such as Terrorism Threat Level, terrorist
characteristics, geography and security environment, assessment teams may be augmented by
personnel with expertise in the areas of linguistics; chemical, biological, radiological weapons
effects; AT technology; Explosive Ordnance Disposal; special warfare; communications;
information assurance or operations; and other specialties as determined by the Combatant
137
138
C15. CHAPTER 15
ANTITERRORISM (AT) PROGRAM REVIEW
C15.1. INTRODUCTION
C15.1.2. It is not the purpose of this Chapter to supplant the guidance provided by
appropriate OSD/Chairman of the Joint Chiefs of Staff/Service/Combatant Commanders
directives, but to complement them by illuminating the grand strategy that should govern the
development of installation AT Programs.
C15.1.3.1. All the elements and assessments of the Risk Management process.
C15.1.3.2. Planning.
139
C15.2.1. TA Standards. Reference (e) standards, as highlighted below, provide guidance for
conducting a threat assessment. Although multiple standards are identified, they each contribute
to the overall TA process. Chapter 5, “Terrorist Threat Assessment,” provides a detailed
discussion of recommended processes to conduct Terrorist Threat Assessments.
C15.3.1.2. ATOs.
140
C15.4. PLANNING
C15.4.1. Planning Standards. Reference (e) provides guidance for the development of AT-
related plans. Some standards deal with the specifics of plan writing, while others address
FPCON issues. FPCONs are actually a derivative of the Operations and Intelligence fusion
process. The following highlighted standards affect the AT planning process:
C15.4.2. Planning Integration. The J-34 Installation Planning Tool, particularly Part III,
provides an integrated approach to fulfilling the requirements of the above standards.
C15.5. TRAINING
C15.5.1. Training Standards. Reference (e) provides guidance for the conduct of AT-related
training to include eligibility, course content for training levels I through IV, and requirements
for High Risk Personnel. The individual standards are:
141
C15.5.1.5. Training for High Risk Personnel and High Risk Billets.
C15.5.2. Filling In the Gaps. The DoD AT Standards give a reasonably complete picture of
training requirements. The following discussion provides further analysis of the training process
and the selection of a training source.
C15.5.3. Analyze Training Requirements. Training is absolutely vital to the success of any
AT program. The requirements for Level I and II training are fairly straightforward. In AT,
success rests on the foundation of awareness. However, some supporting skills, such as how to
conduct an assessment, constitute a hidden set of necessary training. ATOs must take an
exacting look at the current inventory of skills, determine which are needed and develop a
strategy to close the gap.
C15.5.4. Leverage AT Training and Expertise. The most obvious source of Level II trained
personnel is your Service school. However, other options can be found in the toolbox. Cost and
availability figure most heavily in selecting the supplier for each category. Quite often,
organizations like the Interagency OPSEC Support Staff shall conduct MTTs at your location to
train large numbers of individuals at a relatively low cost.
C15.6. EXERCISES
C15.6.1. Exercise Standards. Commanders at all levels are required to exercise their AT
plans at least annually.
142
C15.6.5. Joint Exercises/Operations. Nearly all combat operations, now and in the future,
shall be joint operations. Unless our forces practice AT procedures during joint operations to
resolve interoperability issues, soft spots shall be created. Since terrorists specialize in
asymmetric attacks, failure to conduct joint AT exercises is a high-risk proposition.
Chapter 16, “Resource Requirements and Funding Sources,” provides a detailed description of
the minimum essential elements of generating resource requirements for AT Programs. AT
Program reviews shall include an assessment of the following:
143
VAs support the AT program review by identifying shortfalls in the program itself. Areas to
focus the assessment should include, but not be limited to, the following:
144
C16. CHAPTER 16
RESOURCE REQUIREMENTS AND FUNDING SOURCES
C16.1. OVERVIEW
C16.1.1. From the perspective of many terrorists, there is little difference between
installations or activities owned, operated, and manned by DoD civilian personnel, military
personnel, or contractor personnel. The goal of an AT program is to protect military service
members, the DoD civilian workforce, family members, facilities, and other vital mission-related
assets from terrorists. In order for an AT program to obtain this goal, it is essential to ensure
resources are available to execute the AT plan and achieve the four over-arching objectives to
deter, detect, defend, and respond. However, generating resource requirements and acquiring
additional resources to mitigate identified vulnerabilities is an important step in the solution to
reducing risk. It is imperative to continue to educate and increase AT awareness; engage with
the local community for assistance and information; follow, implement, and improve existing
security tactics, techniques and procedures; and maximize protective benefits from existing
resources. The AT plan must be complete and effective, a TA conducted, critical assets
identified, and a higher Headquarters VA conducted assessing current AT plan/program
effectiveness for these critical assets against identified threats. Once threat, asset, vulnerability,
and AT effectiveness information is gathered, data needs to be analyzed, and the likelihood of
the threat and the nature and scope of potential harm to all assets (people and facilities) assessed.
This analysis lays the foundation for resource determination and risk management.
C16.1.2. Once resources are determined to be necessary and an unacceptable level of risk
exists, it is important to ensure appropriate resources (manpower, operations, and equipment) are
available to execute the AT plan and achieve the four objectives mentioned above. However,
before activities/installations/units can successfully compete and acquire these resources,
requirements must be documented, well defined, prioritized, and clearly articulated. Once AT
requirements have been established and appropriately documented, there are two principal
avenues to obtain funding for required resources. The first is the DoD PPBE process. The
second source of funding is through the Combating Terrorism Readiness Initiatives Fund (CbT
RIF) designed to quickly provide funds to the Combatant Commanders for the purpose of
emergency or emergent high-priority CbT requirements.
145
146
147
requirements. The numbers also allow Joint Staff, OSD, and the Services to track the history of
the initial request back to the beginning of the requirement from year to year. Once the control
number is established, it should not change and should stay with the project until the project is
funded. The control number shall consist of four parts: code letter(s) to identify the Combatant
Commander and Component, the fiscal year (last two digits of the year) the requirement was
initially identified, and a sequence number. For example, the control number P-A-02-0001 is a
PACOM (P) Army (A) requirement identified in fiscal year 2002 (02) for FY04 and is project #1
(0001).
C16.3.2.2. Service/Agency. The Service/Agency responsible for funding the
requirement.
C16.3.2.7.1. Equipment. Identify the resource requirement and the description and
name with specific quantities and unit price if applicable. For more information regarding
appropriate technology refer to the Chapter on technology.
148
C16.3.2.8. Type IVA/Date. Identify how the requirement was identified and
recommended (JSIVA, Service VA, Combatant Commander VA, MACOM/MAJCOM VA, self
assessment, AT plan development, exercise), and the date (month/year) the assessment was
conducted. If the requirement is for additional manpower, include how the manpower position
was validated.
149
C16.3.2.9.1. Threat. Both the threat level (High, Significant, Moderate, and Low)
and specific threat (e.g. chemical/ biological/ radiological/ nuclear or improvised explosive
device (IED)) should be described for the location/ unit requesting the resource. This shall give
the chain of command insight (based upon intelligence information) into the anticipated
terrorist’s operational capability, intentions, activity, and operating environment and an
understanding of the magnitude of the threat.
150
C16.3.2.11. Program and Budget Execution Review. Services’ Program and Budget
Execution Review and the President’s Budget typically include a CbT exhibit that identifies
funding the Services have dedicated toward CbT. Service components shall forward a copy of
151
C16.3.2.11.5. Law Enforcement (all personnel and operating costs associated with
law enforcement).
C16.3.2.12. Integrated Priority List (IPL). The IPL is the principal mechanism by which
the combatant commanders communicate their views to the Secretary of Defense on the
adequacy of the defense program. This newly revised and streamlined process is designed to
bolster ongoing efforts to improve capabilities-based planning. The Combatant Commander’s
IPL now focuses on a succinct statement of key capability gaps that could hinder the
performance of assigned missions. The focus of the IPL is expressed in terms of the capability
required – not on a specific programmatic solution. The IPL uses the framework established by
the Joint Staff for the Functional Capability Boards as described in CJCSI 3170.01C (reference
(ag)). For each item on the Combatant Commander’s IPL he has to answer four basic questions:
152
C16.3.2.13. Appropriation. The appropriation type must meet reference (af) guidelines
and should be according to reference (ah) for MILCON projects. The activity/installation/unit
resource/financial manager should determine the correct appropriation. Annotate the type of
appropriation required that is associated with the funding and requirement: procurement,
operations and maintenance (O&M), military construction (MILCON), or military pay. A
requirement may have more than one appropriation type, for example if maintenance costs are
associated with equipment purchase. The item to be purchased may require procurement funding
and O&M funding to maintain the cost of the item in the future.
C16.3.2.14. Funding Requirement ($) by Fiscal Year (FY). The installation or unit
resource/ financial manager should be involved along with the contracting and engineering staffs
to determine the correct funding requirements. Annotate the funding requirement for each year
in a dollar figure (dollars in thousands) for both the procurement of the item and the associated
maintenance costs in the out years. Replacement and shelf life issues should be taken into
consideration and annotated for future planning purposes.
C16.3.2.15. CbT RIF. If a CbT RIF request (See section C16.5.) has been submitted by
the Combatant Commander to the Joint Staff per CJCSI 5261.01B,(reference (ai)), annotate this
and the FY the request was submitted. CbT RIF is managed by the Joint Staff and is used to
fund the Combatant Commander’s (not Services or Agencies) emergency or emergent high-
priority requirements in the year of execution. If a CbT RIF request has been submitted,
indicating an emergent request, then an additional request for funding should be submitted to
submitted to capture the follow-on costs.
153
154
C16.4.1. Once requirements are generated and documented it is essential to analyze the
justification data (threat, asset criticality, current program effectiveness, vulnerabilities, and
commander’s risk) and prioritize requirements focusing on the most critical and important needs
first. Resources required to mitigate a major or a high risk situation should be given priority.
Emphasis should be placed on acquiring resources to deter, detect, and defend, preventing the
terrorist and threat from entering an area of significant importance. In addition, resources
requirements necessary to meet minimal security requirements and to adhere to DoD or Service
directives, standards, instructions, or regulations; should be given priority.
C16.4.2. To assist in the prioritization of resources, requirements should be placed into the
following three categories of importance: 1 High Priority, 2 Medium Priority, and 3 Low
Priority. (refer to Table C16.T2). It is recommended activities/installations/units employ
working groups and councils to assist in this endeavor. This shall ensure working groups and
councils responsible for making overarching decisions and recommendations to Commanders are
aware of all the requirements, their significance, and the risks involved. In addition, it is not
necessary for each criterion to be met within a specific category for the requirement to be
identified as either 1 High, 2 Medium, or 3 Low. However, a majority of the criterion in the
following table should be met.
155
C16.5.1. A realistic and affordable fiscal year budget and procurement strategy should be
developed that captures all life-cycle costs (manpower needs, logistics/maintenance, replacement
costs). The AT officer and the RM/FM/Comptroller should be working closely from the
beginning to address these requirements. The AT officer is the expert responsible for
156
C16.5.2.1. The first option is to leverage the PPBE process to compete for funding.
Unfortunately, this doesn’t address the need to fund requirements today, but to fund
requirements in a minimum of two years from the year of execution. It is important to understand
and use the PPBE process to obtain funding (information on the PPBE process can be found in
Management Initiative Decision 913 (reference (aj)). However, this process does not guarantee
that you shall receive funding. Adequately articulating and justifying requirements is crucial.
Without thorough and proper justification, it is almost certain requirements shall not be
addressed nor considered for funding. These requirements must compete with other higher HQ
Service responsibilities and priorities. Even with well-documented justification it does not
necessarily guarantee funding shall be provided because of this competition for limited funding;
however, the unit’s chances to effectively compete are substantially improved. In addition to
properly documenting requirements, it is critical that requirements/funding information is
provided on time and in the format requested. If this is not accomplished, then it appears the
organization requesting the additional funding does not consider this a priority and therefore
does not need the funding as much as another organization willing to do what it takes and
follows directions.
C16.5.2.2. The second source of funding is through the CbT RIF. The purpose of the
CbT RIF is to fund emergency and emergent high-priority combating terrorism requirements in
the year of execution. The Joint Staff, DD AT/HD is the steward for this fund. CbT RIF
157
C16.5.2.3. CbT RIF requests can only be submitted by the Combatant Commanders for
their geographic area, AOR or for assigned forces. The Combatant Commanders must validate
and forward CbT RIF requests for O&M and procurement funds to the Joint Staff, DD AT/HD in
accordance with CbT RIF submission, approval, and reporting procedures in reference (ai). The
use of CVAMP (appendix (2)) is required for submission of CbT RIF requests to the Joint Staff.
C
o UFR OOSSDD - -I IPPLLs s
CCoonnt itni ngge ennc cyy
m
OOppe er raat itoi onns s
p
o JJSS - -r re ec coommmme enndd f of or rPPOOMMs s
U FR
MMOOUU/ M
/ MOOAA n
e U FR S e r v ic e
HHoos ts tNNaatitioonn
n PO M s
t
O S D P O M /B u d g et
R e v ie w s
I n s t a lla ti o n /U n it H ig h er H Q
F u n d in g S o u r c es F u n d in g S o u r c es P D M /P B D
158
C16.6.2.1. The Combatant Commander staffs are responsible for consolidating UFRs
and including them in the Combatant Commander’s IPLs submitted to OSD in October through
November. OSD and the Services provide guidance during the PPBE process. The Combatant
Commander is also required to forward consolidated Component UFRs to the JS so they can
coordinate and make priority recommendations to the Services (~ Nov–Dec) in preparation for
the Services’ next PPBE cycle. Combatant Commander staffs are also responsible for
forwarding the Combatant Commander approved emergent or emergency UFRs to the JS to
compete for CbT RIF funding.
C16.6.2.2. Service AT staffs shall assess and prioritize the well-documented UFRs
provided by their Components and recommended by the Joint Staff. It is important that Services
receive the appropriate mandated documentation using the specified format (refer to table
C16.T1), so they can adequately champion and defend their Component’s AT requirements
throughout the Services corporate PPBE process. Services should ensure that funding requests
are not duplicated through the two avenues (PPBE process and CbT RIF).
C16.6.3. OSD shall review the budgets proposed by the Services to meet AT objectives
during the Program and Budget Execution Review (~ Jun–DEC). Unresolved issues and critical
requirements may result in OSD program and funding direction to the Services and Agencies via
a Program Decision Memorandum (PDM) and/or Program Budget Decision (PBD).
159
C16.7.1. Once designated as a member of the AT staff or as the single AT POC, the POC
becomes the expert within the organization in generating, prioritizing, and appropriately
documenting AT requirements. AT should be the primary duty of the designated person. If this
is not feasible, service headquarters should request funding to hire civilian personnel to properly
fill this requirement as per subparagraph C16.3.2.7.2.
C16.7.3. Once the requirements are documented, the information needs to be articulated and
justified to the installation AT working groups, budget personnel, installation councils, and
commander. These personnel should be involved in an appropriate risk assessment and
determination as to whether funding should be provided within existing organizational funds;
addressed through alternative means (e.g. sharing resources, procedural changes); requested
through the chain of command as an unfunded requirement; or to do nothing and accept the risk.
C16.7.4. Work continuously with the programming, resourcing, and budgeting personnel to
justify requirements and assist in determining the best source of funding and the associated data
call timeline. Always expect a quick suspense with regard to funding and have requirements
appropriately documented and available to never miss a suspense. Continuously forward AT
requirements through the chain of command regardless of funding availability and always
follow-up and track requirements status.
160
C17. CHAPTER 17
TECHNOLOGY
C17.1. OVERVIEW
As the terrorist threat becomes more sophisticated, Tactics, Techniques and Procedures (TTPs)
shall be hard pressed to be the only means to counter the threat. Technology can and should be
used to augment sound TTPs in support of the program. Technology can also be a valuable tool
for increasing the effectiveness of personnel while decreasing manpower requirements. The
Department of Defense has several organizations that can assist in identifying an acceptable
solution to a known requirement.
C17.2. TECHNOLOGY
C17.2.1. Quite often when identifying AT requirements, Commanders do not know what
technological solutions are available to fulfill AT resource shortfalls. There are organizations
that can aid the Commander in identifying technology to satisfy these requirements: The
Physical Security Equipment Action Group (PSEAG), the Technical Support Working Group
(TSWG), and the Joint Non-Lethal Weapons Directorate (JNLWD). These organizations are
separately funded to provide COTS, rapid prototyping, and research and development and/or
evaluation of solutions for units in the field. They can provide information and research on
technology and equipment evaluated and deemed suitable for your purpose. Additionally, they
can provide field assessments to assist in identifying the optimal solutions to meet your
requirements.
C17.2.2. The PSEAG objective under reference (ak) is to select or design, evaluate, and
acquire the most efficient and productive security equipment at the most reasonable cost to
ensure the effective protection of DoD resources, including personnel, classified information,
material, and readiness. This Handbook established Service responsibilities in regards to
management, operation, and support functions, including the responsibility for programming,
budgeting, funding, and publication of standards, military specifications, design, and
performance criteria for research and engineering. Listed in Table C17.T1. are Service
responsibilities by category and the respective points of contact.
161
C17.2.2.1. In order to better achieve the PSEAG objective, the COTS Working Group
(CWG) was established to provide direct assistance and oversee the evaluation and integration of
COTS equipment to support deployed forces. The CWG, chaired and operated on a daily basis
by the Physical Security Branch of the DTRA in Alexandria, VA, consists of representatives
from the four Services, DD AT/HD, DTRA, and advisory members from outside agencies.
Commands may contact the CWG directly to receive Antiterrorism COTS equipment
information or guidance, and discuss potential solutions directly with a working group
representative. The toll free phone number is 1-800-811-7590 or DSN 221-0556.
162
163
C17.2.4. JNLWD provides the most current and accurate information available on relative
aspects of non-lethal technologies to the Services and other government activities requiring the
use of restrained measures in the performance of their mission. They can provide
recommendations regarding the application of Non-Lethal technologies on a global basis through
a life-cycle perspective; including research, development, production, and deployment of those
technologies. The JNLWD website is located at www.jnlwd.usmc.mil.
164
C18. CHAPTER 18
ANTITERRORISM TRAINING FOR DOD PERSONNEL
C18.1. INTRODUCTION
The key to an effective AT program is to develop an awareness that is both sustained and
reinforced from initial entry to termination of DoD service. DoD personnel must be aware of
basic personal protective measures against terrorism, specific threats for the area they shall
operate in or transit, and specialized training which their duty or position requires. References
(a) and (e) direct the Services to incorporate and conduct antiterrorism training at all levels. The
intent of this Chapter is to describe the general framework of the antiterrorism training program
for all DoD Components.
C18.2.1. The Chairman of the Joint Chiefs of Staff in consultation with the Commanders of
the Combatant Commands, the Office of the Secretary of Defense, and the Military Departments,
established requirements and minimum standards for antiterrorism training. These standards
address personnel responsible for managing AT programs and training requirements for
individuals, commanders, senior executive officers, high risk personnel and those assigned to
high risk billets, and units preparing to deploy. Reference (e) outlines the minimum training
standards and discusses specific training requirements.
165
C18.2.2.3. The Level I Awareness training requirement should not be confused with
Area of Responsibility (AOR) specific training. Awareness training is conducted annually. For
individuals traveling outside CONUS, in addition to completing the annual awareness training,
they must also receive an AOR-specific update (see C18.4) within three months of travel.
C18.2.3. Level II Antiterrorism Officer Training. Each installation and/or deploying unit
(e.g., battalion, squadron, ship) must have at least one assigned ATO. Personnel identified as
unit ATOs are responsible for managing the AT program, advising the commander on AT issues,
and providing Level I Awareness Training. To help prepare individuals for ATO duty,
166
C18.2.3.1. Service-approved Level II ATO Training courses are listed in Table C18.T1.
(not an all-inclusive list, users should check with their Service for the latest offerings). Several
of these courses offer Mobile Training Teams.
Units should use this training resource to satisfy individual and unit pre-deployment training
requirements when timeliness or quota availability does not permit personnel from their units to
participate in resident training programs. Component provided training taking place outside of
these courses should continue to meet reference (e) training standards.
167
168
169
C18.2.3.2.3. Component directed modules serve to round out the minimum required
training. Examples include introductions to AT, physical security and security design
requirements, technology updates, first responder and emergency responder roles, consequence
management, interagency roles, hostile intent decision making, issues relating to specific
functional areas i.e. (e.g., legal, PAO), case studies, and component areas of interest.
C18.2.4. Level III Pre-command AT Training. Level III training for commanders shall be
conducted at the O-5 and O-6 level by the Services in conjunction with pre-command training.
The focus of this training shall be on the responsibilities discussed in the pertinent DoD 2000
series publications, Service publications, and associated joint doctrine.
C18.2.5. Chair Joint Chiefs of Staff Level IV Antiterrorism Executive Seminar. Executive
level seminars conducted by the Joint Staff and tailored for an O-6 to O-8 audience. The focus
of this training is to provide current updates, briefings, and discussion topics pertinent to an AT
program. The training shall include, but not be limited to, AT simulations and war games. Level
IV Seminars are held three times a year. The Combatant Commanders, Services, and DoD
Agencies are responsible for nominating attendees. Individuals wanting to attend can make their
desires known by forwarding a request through their respective Combatant
Commander/Service/Agency channel.
C18.2.6. The Commanders should identify and assess the antiterrorism education and
training status of the following categories of personnel to ensure that individuals are adequately
trained to be reasonably protected against terrorist acts and to perform their assigned tasks:
170
ATOs shall be assigned in writing at each installation or base, as well as deploying organization
(e.g., battalion, squadron, ship). The ATO shall be responsible for ensuring that each person
within the unit is trained and fully aware of terrorist attack potential and methods to reduce the
risk and mitigate effects should an attack occur.
C18.4.1. Geographic Combatant Commanders are responsible for protecting all personnel
within their AOR except those for whom the COM has security responsibility. All DoD
personnel and/or personnel under DoD sponsorship shall complete the prescribed AT awareness
training within one year and specific AOR training within three months (refer to paragraph
C18.2.2) prior to OCONUS travel. The Geographic Combatant Commanders shall make AOR-
specific antiterrorism protection information available to military departments, supporting
Combatant Commanders, and DoD components for this training. This can be accomplished
through any means available to include messages, electronic bulletin board systems, Wide-
World-Web pages, file transfers, or other appropriate communications.
C18.4.1.1. ATOs shall work with commanders and representatives from geographic
Combatant Commands to develop training materials that address AOR-specific issues. Among
topics to be addressed are the following:
C18.4.1.1.1. Specific terrorist groups, their history, tactics and techniques, and
methods of operation.
171
C18.4.1.2. Commanders receiving individuals and units not properly trained shall report
the deficiency through the chain of command or line of authority.
C18.5.1. The Combatant Commanders have substantial AT responsibility for DoD personnel
in their AORs assigned to high-risk billets (HRB) or high-risk positions. High Risk Personnel
(HRP) assigned to high-risk positions become eligible for advanced AT training. In some
instances, the training may be extended to include family members.
C18.5.3. Training for High Risk Billets and High Risk Personnel
172
C18.5.3.3. Executives should also attend the appropriate Regional Orientation Course
(Middle East, Asia/Pacific, Latin America, or Africa) offered at the U.S. Air Force Special
Operations School, Hurlburt Field, Florida.
C18.5.3.4. Executives whose duties shall require frequent vehicle operation should
attend an appropriate evasive driving course. Information on current course offerings may be
obtained by contacting the Service representative to the DoD Antiterrorism Coordinating
Committee or the Combating Terrorism Branch in the Office of the Assistant Secretary of
Defense for Special Operations and Low Intensity Conflict (OASD (SO/LIC)).
C18.5.4.1. Executives en route to potential physical threat risk shall attend one of the
following courses:
173
C19. CHAPTER 19
PUBLIC AFFAIRS
C19.1. INTRODUCTION
C19.1.1. A major goal of terrorist groups is to capture the attention of the news media.
During and immediately following a terrorist incident involving DoD personnel or occurring on
a Defense Department facility, the PAO becomes the conduit between DoD and the media. This
chapter discusses the PAO’s responsibilities and how they support the Commander’s AT
Program. The PAO role becomes highly valuable to a Commander after a terrorist attack.
Following list of PAO activities highlight his value during a critical time.
C19.1.1.1. Maintain the flow of authoritative information between the authorities and the
media.
C19.2.1. Risks. Many aspects of CbT operations are inherently sensitive and may involve
various risks to DoD personnel or their dependents that may be heightened by the release of
information to the public. These risks include, but are not limited to:
C19.2.1.1. Personal safety of law enforcement and intelligence personnel involved in
terrorism investigations, analyses, or other related activities.
174
C19.2.2. Teamwork. Most terrorist incidents shall trigger cooperative efforts among military
and civil authorities, including the FBI, the DoS, other Federal agencies and departments, state
and municipal law enforcement agencies, and host government activities if the event should
occur overseas. Rarely shall a single agency and/or organization be able to take full credit for
the termination of an event and the successful restoration of public order. By their nature, DoD
combating terrorism and counter-terrorism efforts triggered by a terrorist incident shall rarely be
unilateral. They almost always shall be in support of U.S. law enforcement agencies or
cooperating host national military, police or security forces.
175
176
C19.4.2.2. Spokespersons shall discuss only information within their personal purview
and expertise. No classified information shall be discussed.
C19.4.2.3. Spokespersons shall not discuss or interpret overall DoD policy regarding
armed forces support of the U.S. Government's Counter-terrorism policy (use of force against
terrorist groups, their state supporters, or those states that direct attacks by terrorist groups
against U.S. interests).
C19.4.2.4. Responses given during the press conference shall meet operational security
requirements.
C19.4.2.5. Spokespersons shall not answer questions on hypothetical situations. They
shall not comment on matters pertaining to other U.S. Federal organizations and/or agencies
and/or the military, policy or security forces of other nations.
C19.4.2.7.5. Whether intelligence led to the seizure (the only exception is if the
agency that provided the intelligence decided the information may be released).
C19.3.4.7.6. Names of DoD casualties, subject to release upon notification of next of
kin and PA authorization.
177
C19.4.3. Training Versus Operations. OASD (PA) understands that media may be interested
in covering training involving the DoD of Defense and other agencies to get an idea of the type
of support the DoD is providing. OASD (PA) has no objection to this type of coverage as long
as thorough coordination has been completed with other agencies and foreign governments
where foreign personnel are involved, and operational security considerations have been
addressed.
C19.5. SENSITIVE ISSUES
Speaking With One Voice. Speaking with one voice has become even more critical for the DoD.
DoD spokespersons talking or writing about terrorism must not only be consistent within the
DoD, but also must be consistent with the stated goals and objectives of other agencies
supporting the nation's combating terrorism effort. If various agencies appear to be at odds or
making conflicting statements, the public perception shall be one of confusion and
misunderstanding that shall subject all participants to criticism of what is supposed to be a
"coordinated federal effort." Terrorist acts are by definition criminal acts. Drug-related
activities such as money laundering, smuggling, gunrunning, assassination, kidnapping, and
extortion, often associated with terrorist incidents, are also criminal acts. The Department of
Defense plays a strong role in supporting the application of Federal jurisdiction in criminal
courts around the world to bring perpetrators of unlawful acts against American citizens to
justice, but it does not act alone.
C19.6. INTERNAL INFORMATION
DoD efforts in combating terrorism operations shall be of great interest to our internal audiences
as well as the general public. The internal use of descriptions, photographs and videotape of
these operations has the potential of gaining public attention. This material must be subjected to
the same guidance with respect to review and release as other material intended for release
outside the Department of Defense. Other information collected during and immediately after a
terrorist incident for internal DoD use (including witness interviews, crime scene photographs
recordings of communications or other electronic signals) should also be reviewed by
representatives of the U.S. Attorney having jurisdiction over the incident to ensure that no
information which might be deemed evidence in a court become tainted or is released within the
Department of Defense or to others.
178
C19.7.1.3. Terrorist incidents require practiced public affairs skill. The right of the
public to know the scope and magnitude of terrorist attacks involving DoD personnel, facilities,
or materiel must be balanced by the need to safeguard information of military or security
significance. The ability of U.S. and host government authorities to resolve a terrorist incident
should not be compromised, nor should the rights to privacy of terrorist incident victims be
unilaterally overridden by public affairs activities.
C19.7.1.4. All DoD activities strive to fulfill the Department of Defense’s goal of
providing as much information to the public about DoD activities as possible, consistent with the
requirements of OPSEC, technology security, and information security. The Department of
Defense’s approach to the provision of information on its AT efforts is no different.
C19.7.1.5. DoD PAOs have a special, prominent role to play in the DoD AT program.
All DoD installations, facilities, organizations, and commands should have an ongoing program
intended to reduce its risk and vulnerability to terrorist attack. A PA annex should be developed
in support of an installation AT plan.
179
Components are present the measures taken to reduce their risk and vulnerability to terrorist
attack. They are “pollsters,” pulsing and reporting back to the DoD Components, the concerns
and fears of the community generated by DoD presence or DoD activities in their communities
and the risks of terrorist attack that may ensue.
C19.7.2.2. The challenge facing PAOs from the terrorist threat is great. To succeed in
their mission, PAOs exercise constant vigilance and sensitivity to the needs of their audiences.
They also remember that the terrorists themselves are a part of that audience. In making
information available to the news media, PAOs delicately balance the legitimate information
requirements of their DoD and civilian audiences against the intelligence requirements of the
terrorists. PAOs constantly coordinate with other members of the installation, activity,
organization, or command staff.
C19.7.2.3. Membership in the Force Protection Working Group. The PAO is an
important, although often overlooked, member of the unit/installation antiterrorism program.
During a terrorist incident, the PAO serves an important function in providing information to
local authorities as well as the media, thereby allowing the Commander and ATO to focus on the
incident at hand. Therefore, it is important that the Commander ensure his PAO be
knowledgeable about the AT Program and AT Plan, and to participate in AT Program
development and implementation.
C19.7.2.4. Establishment of an Incident Information Center. In the event of a terrorist
incident, the PAO should establish an Incident Information Center. The purpose of the Incident
Information Center is to provide a single location where news media can meet with the PAO to
attain information about the incident. The Incident Information Center should be located where
media access can be controlled, for example, in close proximity to an access control point. The
Incident Information Center should not be collocated with the EOC.
C19.7.2.5. Terrorism Awareness. Individual terrorism awareness is an important element
in overall antiterrorism readiness. DoD personnel and family members should have a general
knowledge of the terrorist threat, know how to reduce their vulnerability to terrorists, and be
knowledgeable of FPCONs. An AT involved PAO can significantly enhance the installation AT
awareness training program by using the various mass notification means available to educate
personnel, including newspapers, newsletters and flyers, closed circuit television, and billboards.
Also, as individuals are "inconvenienced" by the effects of increased security measures such as
base access restrictions, vehicle searches, and commissary and/or exchange closures, the PAO
can reduce personnel frustration and tension by keeping them informed of AT measures and
180
rationale. The PAO's terrorism awareness efforts can also have considerable terrorist deterrence
value. Terrorists shall be able to gain access to the various unclassified notification means
intended for DoD personnel. If this information convinces the terrorist that the installation is a
"hard target" he might look elsewhere.
C19.7.2.6. Training and Exercise Participation. A comprehensive AT training and
exercise program is essential to AT readiness. The PAO's responsibilities in a catastrophic
incident shall be significant and require the ability to effectively communicate with the
Commander, the Operations Center personnel, the media, and the local authorities. Planned,
command approved media questions and answers can significantly enhance the PAO's ability to
train for and respond to terrorist incidents. The PAO shall also be responsible for maintaining
control over medial personnel at the Incident Information Center. Therefore, the facility
Commander should include the PAO participation in the development of terrorism scenarios and
participate in all phases of this program.
181
C20. CHAPTER 20
SPECIAL CONSIDERATIONS
C20.1. OVERVIEW
C20.1.1. Discussion of efforts by the Department of Defense to combat terrorism would be
incomplete without reviewing AT DoD contractor issues and website vulnerabilities.
C20.1.2. DoD contractors provide many critical and essential services to U.S. forces. As
noncombatants, DoD contractors are entitled to certain protections under international law.
Further, commanders may be required to provide AT training and resources as specified in terms
of their contract.
C20.1.3. Website vulnerabilities are an increasing concern for DoD personnel. With the
global reach of the World Wide Web, or Internet, it is imperative that safeguards be implemented
to protect information posted on U.S. Government websites.
C20.2. DoD CONTRACTORS
182
U.S. facility overseas or in close proximity of our forces shall receive incidentally the benefits of
measures undertaken to protect our own forces.
C20.2.2. All U.S. contractors are expected to comply with all applicable laws, including
international law, affecting the contractor and/or contract. Unless addressed otherwise by
international agreement, contractor personnel are subject to the law of the nation in which they
are located to include all local taxes, immigration requirements, customs formalities and duties,
environmental rules, bond or insurance requirements, work permits, and transportation or safety
codes. In addition, contractors who violate U.S. Federal law while accompanying the Armed
Forces overseas can be removed to the U.S. for Federal prosecution under the Military
Extraterritorial Jurisdiction Act (Public Law 106-523, November 22, 2000 (reference (ar)).
During a period of declared war, contractor personnel accompanying the armed forces are
subject to the criminal jurisdiction of the military and the Uniform Code of Military Justice.
C20.2.3. When contractor personnel are employed in support of the Department of Defense,
the Department of Defense shall provide or make available, under the terms and conditions as
specified in the contract, AT training commensurate with that provided to DoD civilian
personnel to the extent authorized by U.S. and host nation law.
C20.2.4. As a general rule, the Commanders should not issue firearms to contractor
personnel, nor should they be allowed to carry personally owned weapons. After consultation
with host nation authorities, the Combatant Commanders may deviate from this rule in the most
unusual circumstances (e.g., protection from criminals or animals if no military personnel are
present to provide protection).
C20.2.5. The Commanders should not issue contracted personnel military garments unless
there is a compelling reason to do so. Care should be taken to ensure contracted personnel are
clearly distinguishable at a distance from military personnel through the use of distinctly colored
patches, armbands, or headgear.
183
C20.3.2. The worldwide connection of computer local-area and wide-area networks, such as
the Non-Secure Internet Protocol Router Network (NIPRNET), offers easy access to defense
information from anywhere in the world. Separation between the NIPRNET and the World-
Wide-Web is ambiguous, and occasionally these networks may be indistinguishable to web page
administrators. Web pages intended for internal DoD use should not be made available on the
NIPRNET without appropriate access control, as this information is likely to be accessible to
non-DoD or unauthorized users.
C20.3.4. Evaluations of activity information provided on the NIPRNET and DoD websites
that are publicly accessible, should follow current OPSEC procedures:
C20.3.4.1. Identify information access points (such as NIPRNET or the Internet) and
evaluate their importance to activity operations.
184
C20.3.4.3. Determine the threat, and assume that any potential adversary has access and
knows how to search the net.
C20.3.4.4. Determine the vulnerabilities and evaluate how protected are the web pages.
Remember that the hacker is generally the information security threat; the search engine and
browser are generally the OPSEC threat.
C20.3.4.5. Assess the risk and determine what protection should be applied to minimize
potential loss of critical information and what is the impact on operations and operations support.
C20.3.4.6. Apply protection, which combines information security and OPSEC tools to
minimize information loss and vulnerability.
C20.3.5. When applying the OPSEC process to information posted to web sites, the activity
shall also need to evaluate subject data with regard to the time factor. Information gathering in
the past was a manpower and resource intensive process, dependent on various types of overt and
clandestine means. Collection, compilation, analysis and dissemination of information could
take days, weeks, or months. Today, a single user can connect to the Internet and, using various
search engines, browsers, and certain aggregation methods, develop a composite of information
that surpasses traditional knowledge levels. In essence, geography is no longer a factor in
information retrieval; time becomes the dominant factor.
C20.3.6. The user must determine the value of information with regard to time. Certain data,
such as unit history, emblems, and command affiliation, shall have less time criticality than
deployment orders for exercises or real-world operations. The value of information may also
flex over time. For example, the specifics of post-deployment preparation should not be posted
to a publicly accessible web site prior to the deployment. But once in theater, unit types, number
of personnel, and equipment shall be public knowledge over time, decreasing the sensitivity as
redeployment dates and unit withdrawal specifics are planned. This shall require units to
actively scrutinize their web pages for time-sensitive data.
185
C20.4.1. All RAs and antiterrorism plans referred to in this publication are exempt from
licensing in accordance with reference (as).
C20.4.2. All DD Forms and all checklists referred to in this publication are exempt from
licensing in accordance with reference (as).
186
C21. CHAPTER 21
INDIVIDUAL PROTECTIVE MEASURES
C21.1. INTRODUCTION
Security against terrorism is the responsibility of every DoD civilian and uniformed member.
There are some basic measures high-risk personnel and/or any DoD civilian and uniformed
member can take to make them less vulnerable, commonly referred to as a "hard target," and
reduce the probability of becoming a victim of a terrorist incident. This Chapter shall outline
general individual protective concepts and conclude with a discussion on Protective Service
Operations. For more comprehensive and specific guidance, consult applicable Service,
Combatant Commander, or Agencies.
C21.2.1. Personnel associated with the U.S. Government are often targets for terrorist
activity. The Heads of the DoD Components have two major AT responsibilities:
C21.2.1.1. Provide as much security for personnel under their authority and control (to
include family members) as is consistent with threat, risk, vulnerability, and criticality assigned
roles, missions, and resources.
C21.2.1.2. Provide awareness information and educational materials to assist service
members, DoD civilians, contractor personnel and their family members in reducing their
individual risk and vulnerability to terrorist attack.
C21.2.2. ATOs or commanders or others designated by the Heads of Defense Agencies, the
Military Services, the Combatant Commands, the Commanders of military installations, and the
Commanders at all echelons, should ensure AT personnel protection is part of their AT Plan.
C21.3. PERSONAL PROTECTION MEASURES FOR DOD PERSONNEL
C21.3.1. One of the most important individual protective measures DoD-affiliated persons
can take is to develop personal habits and practices that frustrate terrorist attempts to determine
their nationality, their professions, their individual job responsibilities, their association with the
Department of Defense and their overall importance to the Department of Defense. Three basics
rules frame personnel protective measures for DoD personnel, DoD contractors, and family
members:
187
C21.3.1.1. Maintain a Low Profile. DoD personnel, DoD contractors, and their family
members should dress and behave in public in a manner consistent with local customs. Items
that are distinctively American should not be worn or displayed outside American compounds
unless necessary to accomplish official business.
C21.3.1.2. Be Unpredictable. Most persons and organizations fall into habits or routine
behaviors. Work begins and ends at the same time every day; meals are eaten in the same
cafeteria; exercise takes place at the same time and at the same location every day; and
individuals follow the same route to and from the office every day. Terrorists normally plan
their actions carefully. They shall observe the potential target's routines in order to decrease their
risks and increase the probability of success. The ability to be unpredictable increases the risks
to terrorists and severely decreases the chances of their success. Reduced probability of success
in kidnapping or killing a target makes that target far less desirable.
C21.3.1.3. Even though DoD personnel, DoD contractors, and their family members may
do everything recommended above and elsewhere in this Handbook, they may still be threatened
by or become victimized by a terrorist act. Be alert for anything suspicious, abnormal, or out of
place.
C21.3.2. General Considerations. The following are general practices that shall aid in
reducing the likelihood of being a victim of a terrorist attack.
C21.3.2.1. Office Security.
C21.3.2.1.1. Establish and support an effective security program for the office.
C21.3.2.1.3. Ensure that all persons working in an office are trained to be alert for
suspicious activities, persons or objects.
C21.3.2.1.4. Arrange office interiors so that strange or foreign objects left in the
room shall be immediately recognized. As an example, remove obvious obstructions behind
which or within which IEDs could be concealed such as draperies, closed waste baskets,
unsecured desks and filing cabinets, and planters.
C21.3.2.1.5. Provide for security systems on exterior doors and windows.
188
C21.3.2.1.6. Ensure installation and facility access control procedures are rigorously
observed.
C21.3.2.1.7. Use an identification badge system containing a photograph. Photo
badge systems facilitate security by making it easy to identify employees, visitors, maintenance
personnel, and facilities management/security personnel. Badges should be renewed
periodically; the badge systems should be modified every 2 or 3 years to preclude use of altered,
expired or stolen badges.
C21.3.2.1.8. Locate desks in a way that persons entering the office or suite can be
observed.
C21.3.2.1.9. Identify offices by room number, color, or object name, and not by rank,
title, or name of incumbent. In other words, identify rooms by room 545, the gold room, the
Berlin room, the maple room, and not by titles such as the General's office, the Assistant
Attaché’s office, or the S-2's office.
C21.3.2.1.10. Do not use nameplates on offices and parking places.
C21.3.2.1.11. Telephone and Mail Procedures.
C21.3.2.1.11.1. Consider not using rank or title should not be used when
answering telephones.
189
C21.3.2.1.12.2. Doors from the visitor access area to executive offices or other
restricted areas of a facility should be locked from within; there should be only one visitor
entrance and exit to a restricted access or exclusion area.
C21.3.2.1.12.3. Have a receptionist clear all visitors before they enter inner
offices.
C21.3.2.1.12.4. Permit workmen or visitors access to restricted areas or exclusion
areas only with escort and only with proper identification; confirm work to be accomplished
prior to admitting workmen to restricted areas of the facility.
C21.3.2.1.12.5. When possible, limit publicity in public waiting areas to
information that does not identify personnel by name, position, or office location.
C21.3.2.1.12.6. Do not post unit rosters, manning boards, or photo boards where
they can be viewed by visitors or local contractors providing cleaning services, food and
beverage services, delivery of office supplies, removal of trash or waste, care of plants, etc.
C21.3.2.1.12.7. Restrict use of message boards, sign in-out boards, and other
visual communications to general statements of availability; do not publicly list local travel
itineraries or phone numbers where visitors have easy, unrestricted access to such information.
When using sign-out logs, be sure to keep the log in a secure location known only to those using
it, thereby restricting public access.
190
C21.3.2.1.13.4. Office doors should be locked when vacant for any lengthy
period, at night and on weekends. The security office and the incumbent should retain keys to
the office.
C21.3.2.1.13.5. Papers, correspondence, communications materials, and other
documents should not be left unattended overnight. A clean desk policy facilitates improved
security as it makes it difficult to hide intelligence collection devices or improvised explosive
devices in occupied offices at the close of a working day.
C21.3.2.1.13.6. Monitor maintenance activity and janitorial services in key
offices. Consider shredding unclassified documents, particularly in high threat areas. Sifting
through garbage cans and recycling bins that may prove helpful to terrorists in operational
planning can gather a wealth of information.
191
C21.3.2.1.14.7. Do not accept packages from strangers until satisfied with the
individual's identity and the nature of the parcel.
192
C21.3.2.1.17.7. Vary routes to and from social events held at a central facility;
use different entrances and exits.
C21.3.2.1.17.8. Minimize appearances in uniform or formal attire.
C21.3.2.1.17.9. Decline invitations to appear in publicity photos; if photos are
taken, discourage publication of names associated with persons appearing in the photo.
C21.3.2.1.17.10. Participate in recreational activities within the American
compound or at a DoD installation whenever possible; try to select playing fields or recreational
areas in secured installations or within easy reach of such installations if it is thought that
terrorist activity is particularly likely.
C21.4. FAMILY MEMBERS OF DOD AFFILIATED PERSONS.
C21.4.1. All DoD affiliated family members should be knowledgeable about basic AT
personal security measures. DoD personnel should cultivate an interest in and attract
participation from all family members in the security effort. This should include a
predetermined plan for responding to potential criminal or terrorist acts. The following general
guidance shall assist personnel in reducing the AT threat. The three basic rules apply; keep a
low profile, be unpredictable, and be alert. In addition, avoid unnecessary publicity and
photographs that identify individual family members or which associate family members and
DoD personnel. Appendices 10 and 11 offer additional suggestions for family and household
security.
C21.4.2. General Guidance. Develop a family oriented antiterrorism awareness, education,
and training plan as part of preparing for each new assignment. Preparation should begin prior to
departure for a new assignment. All family members should try to learn about the customs,
193
culture, history, and geography of the area that the DoD member has been assigned. Family
members on travel orders accompanying a service member overseas shall receive Level I AT
Awareness Training as part of their pre-departure requirements. Furthermore, DoD personnel
and their family members are encouraged to receive Level I AT Awareness Training prior to any
unofficial OCONUS travel, such as going on leave or vacation. The standard DoD Level 1 brief
is probably not appropriate for children under 8-10 year old and an alternative method of training
could be the online program offered by the National Crime Prevention Council at
www.mcgruff.org.
C21.4.2.1. Do not use nameplates or uniquely American symbols on the exterior of
residences occupied by DoD personnel overseas.
C21.4.2.2. Do not use name plates on parking places; avoid parking private or
government vehicles in the same location day after day.
C21.4.2.3. All mail delivered to the residence should be carefully examined; any mail or
packages from senders who cannot be immediately identified should be set aside for further
evaluation by the DoD member.
C21.4.2.4. Never leave house or trunk keys with your ignition key while your car is
being serviced.
C21.4.2.5. Do not "hide" keys or give them to very young children.
194
C21.4.3. Overcome Routines. Vary routes, arrival, and departure times to and from school,
after school activities, day care, religious school, music lessons, and other regularly occurring
family member activities.
C21.4.4. Maintain a Low Profile. DoD personnel should explain the risks and benefits of
high profile, high visibility lifestyles to their family members. It is sometimes very difficult for
many families to go from being highly visible members of a community to being nearly
invisible. Visibility is often especially important to adolescents and non-working spouses of
DoD personnel. The differences and distinctions among participation in community events such
as school plays, sports, and social clubs as opposed to high profile participation should be
discussed. DoD personnel should explain to their family members the benefits and risks
associated with high profile, highly visible lifestyles in certain environments.
C21.4.5. Family "Operations Security" Procedures. The purpose of operations security is to
frustrate adversary collection of information about one's activities. Family "operations security"
measures seek to frustrate efforts by terrorists to identify the nationality, the specific name, the
functions, and the patterns of behavior of DoD-affiliated persons and their family members. The
following measures are only a small number of examples of steps that should be implemented to
make it harder for terrorists to learn the nationality, specific identity, position, and
responsibilities of DoD personnel, as well as the day-to-day activities of DoD families.
C21.4.5.1. Do not place your name on exterior walls of residences.
C21.4.5.2. Do not answer your telephone with your name and rank; children and
domestic employees should be instructed not to identify the name, title, or affiliation of the
occupants, when answering the telephone. All family members should answer the telephone
politely but should provide no information as to the name of the occupants until the identity of
the caller has been established. Further, family members should treat all telephone conversations
as though a third party was monitoring them. Children should be taught not to tell strangers over
the phone if their parents or other adults are in the house. A simple “they can’t come to the
phone right now” should be adequate for any possible inquires.
C21.4.5.3. Do not list your telephone number and address in local directories.
C21.4.5.4. Create the appearance that the house is occupied by using timers to control
lights and radios while you are away.
C21.4.5.5. Personally destroy all envelopes and other items that reflect personal
information.
195
C21.4.5.6. Close draperies during periods of darkness. Draperies should be opaque and
made of heavy material.
C21.4.5.7. Don't let your trash become a source of information.
C21.4.6. Be Alert to Changes. All DoD personnel and their family members should be
attentive to their security environment and changes that may occur in it. Family members should
be instructed to be alert for surveillance attempts, suspicious persons or activities, and report
them to the proper authorities.
C21.4.6.1. Watch for unexplained absences of local citizens as an early warning of
possible terrorist actions.
C21.4.6.2. Avoid public disputes or confrontations. Report any trouble to the proper
authorities.
C21.4.6.3. Do not unnecessarily divulge your home address, phone number, or family
information.
C21.4.7. Potential Threats. The following steps should be implemented when appropriate:
C21.4.7.1. Any unusual occurrence such as anonymous phone calls or threats should be
reported immediately.
C21.4.7.2. Children should be on guard against any approach or interrogation by
strangers; efforts by strangers to pick up children, engage them in long conversations about their
home life or find out what their parents do for a living should be reported to law enforcement and
intelligence activities immediately.
C21.4.7.3. Never accept unexpected package deliveries.
C21.4.7.4. Examine all mail carefully and look for signs that an improvised explosive or
incendiary device has been received.
C21.4.7.5. Report frequent wrong numbers or nuisance telephone calls to the Telephone
Company and the police. Someone may be attempting to determine the presence of family
members.
196
C21.4.7.7. Do not automatically open your door to strangers; use the peephole and
always check credentials.
C21.4.7.8. Be wary of talking to or admitting polltakers and salespersons to your home.
Terrorists are known to have gathered substantial information relative to their victims using these
ruses.
C21.4.7.9. Be alert to peddlers and all strangers.
C21.4.7.10. Be alert to public utility crews or other workmen who request access to your
residence. Check identities. If there is any doubt, refuse them admittance.
C21.4.7.11. Report the presence of strangers in the neighborhood to military law
enforcement or military intelligence activities as soon as their presence is detected.
C21.4.7.12. Watch for strange cars cruising or parked frequently in the area, particularly
if one or more occupants remain in the car for extended periods. Make a note of occupants,
license numbers and province designators of suspicious vehicles.
C21.4.7.13. If you come home and suspect that an unauthorized person is inside, do not
go in to investigate and do not call out to the possible intruder. Contact the police or your
security patrol.
C21.4.7.14. Do not accept unsolicited packages. All mail should be routed through
normal office channels.
C21.4.8. Be Prepared for Unexpected Events. Instruct family members of the Department of
Defense on steps they should take to deal with unexpected events. It is good practice to get into
the habit of “checking in” to let your friends and family know were you are or when to expect
your return.
C21.4.8.1. Telephone systems overseas can be quite different from those in CONUS
therefore family members should know and understand how to use the local phone system.
Always carry enough currency to make a telephone call.
C21.4.8.2. Family members should know the locations of civilian police, military police,
hospitals, Government Agencies, the U.S. Embassy, and other safe locations where refuge or
assistance can be acquired. Always carry identification showing your blood type and any special
medical conditions.
197
C21.4.8.3. Learn key phrases in the native language such as "I need a policeman," "Take
me to a doctor," "Where is the hospital?" and "Where is the police station?"
C21.4.8.4. Develop a family duress code so family members can warn each other when
they are in danger.
C21.4.8.5. Develop emergency procedures and practice them.
C21.4.8.6. Maintain emergency telephone numbers for all family members.
C21.4.9. Kidnapping and Hostage Issues. DoD-affiliated persons and their families should
discuss steps to be taken if a member is kidnapped or otherwise becomes the victim of a terrorist
attack. Families should understand the U.S. Government makes every effort to affect the rapid,
safe release of any U.S. citizen held hostage. The importance of family cooperation in such a
situation should be stressed.
C21.4.10. Special Guidance for Children. Parents have special responsibilities when
providing personal security instruction for children. There are several children oriented or
children specific measures that can be taken to reduce the risk of terrorist attack against them:
C21.4.10.1. Never leave young children alone or unattended. Be certain when they are
left, they are in the care of a trustworthy person.
C21.4.10.2. Instruct children to keep doors and windows locked, and never to admit
strangers.
C21.4.10.3. Try to locate children's room(s) in a part of the residence that is not easily
accessible from the outside.
C21.4.10.4. Make sure that outside doors and windows leading to children's rooms are
kept locked, especially in the evening.
C21.4.10.5. Keep the doors to your children's rooms open so that unusual noises can be
heard.
C21.4.10.6. Teach children how to contact the police or a neighbor in an emergency;
also teach them how to contact DoD security or intelligence activities nearby; teach them how to
contact the U.S. Embassy if overseas.
C21.4.10.7. Know where your children are all the time.
C21.4.10.8. Advise school officials that children are not to be released to strangers under
any circumstances.
198
C21.5.1. Appendix 6 provides in transit forces AT guidelines that when applied to official
travel can decrease the likelihood of a terrorist attack on DoD personnel and their family
members in transit. Additional AT measures provided in appendixes 12 through 14 are intended
to reinforce the general philosophy underlying personal protective measures during both official
and recreational travel.
199
C21.5.2. The number of specific measures individuals and groups can take to implement this
general approach to personal security while traveling is limited only by the imagination and
creativity of the travelers.
C21.5.3. Readers are encouraged to expand the list of measures listed below, as well as to
consider the specific circumstances under which a proposed measure might diminish, not
increase the security of DoD personnel and their family members in travel status.
C21.5.4. General Travel Security Suggestions.
C21.5.4.1. The global distribution of DoD personnel, facilities, and contractors ordains
much international and long haul domestic travel for DoD personnel. Even local travel may pose
security risks. The following are some general comments that apply to all official travel.
Additional travel security tips can be found in Appendices 12 through 14.
C21.5.4.2. Do not assume that acts of terrorism "can't happen to me." A common thread
among accounts of individuals held hostage by Hizballah terrorists in Lebanon after their release
was their own cavalier attitude towards warnings issued by the U.S. State Department and other
governments' foreign ministries regarding travel to Lebanon.
C21.5.4.3. Realize the impact of security on your travel itinerary. Consider the security
implications of destination, routing, and timing of travel and allow extra time for investigating,
planning, and using alternative, more secure itineraries. Allow extra time between connections,
if any, to allow for security inspections at airports, ports of entry, and other inspection points.
C21.5.4.4. Avoid routine schedules. Avoid following travel routines used by others
when planning a trip or executing a plan assembled by others. Select unusual departure and
arrival sites; schedule personal time and business activities at odd hours, during evenings, or on
weekends. Be particularly sensitive to the possibility of surveillance. Arrival and departure
times, as well routes taken to and from work/home, should be varied as often as possible.
Different vehicles should be used to make targeting more difficult. For official business,
consideration should be given to using unmarked Government vehicles where available.
200
C21.5.4.5. Travel in groups when possible where appropriate. Isolated travelers make
easy targets; small groups provide a sufficient number of eyes and ears to be alert to local
security matters.
C21.5.4.6. Avoid wearing military clothing. Wearing military uniforms during periods
of travel and recreation could attract unwanted attention. Even wearing "military style" clothing
may arouse more attention than desired.
C21.5.4.7. Carry identification. When asked for identification give only the information
requested. Never surrender your entire wallet or purse or leave your wallet and/or purse
unattended. Carry identification that gives your blood type, as well as any special medical
condition or medication requirement.
C21.5.4.8. Carry extra medication, eyeglasses, and other medical necessities. If you take
any medication regularly, take at least one week's extra supply with you. If you wear glasses,
take an extra pair along. Keep all medication in its original container for customs inspections. If
your medication is a narcotic, make sure you have a letter from your doctor in your possession.
Carry all necessary medication with you in your purse or briefcase; do not put it in checked
luggage.
C21.5.5. Travel Arrangements. The process of making travel arrangements can provide
terrorists copious quantities of information about travelers, their authorities and responsibilities,
their importance to the Department of Defense and the U.S. Government, and their personal
tastes in matters of lifestyle. Such information is of incalculable value for purposes of targeting.
The steps outlined below are intended to deny access to such information by terrorists. Other
measures may be equally helpful in preserving the anonymity of DoD travelers, thereby
complicating detection, identification, and targeting of such personnel for terrorist acts.
C21.5.5.1. If available, consider using U.S. Transportation Command/Air Mobility
Command flights or military contract carriers.
C21.5.5.2. Try to arrange international travel through American military air terminals if
possible.
C21.5.5.3. Avoid travel through high threat areas, if possible.
C21.5.5.4. Travel under a properly coordinated and authorized assumed name.
C21.5.5.5. Consistent with financial regulations, adjust travel reservations to foil terrorist
targeting based on data stored in travel reservation computers.
201
C21.5.5.10. Do not use luggage that clearly labels its owner as a DoD civilian employee
or military member. Examples include B-4 bags, duffel bags, and sea bags.
C21.5.5.11. Remove destination and baggage claim tags from luggage, as well as decals,
stickers, and other markings that unambiguously identify the luggage as having been through the
United States (i.e., U.S. Custom’s stickers).
C21.5.5.12. Use baggage identification tags that require some manipulation before the
name of the bag owner are visible. Try to use baggage tags that allow airline officials and
customs inspectors to identify the owner of the bag by name, but otherwise do not provide
information on the owner's address or country of origin.
C21.5.5.13. Do not include controversial or inflammatory reading material in carry-on
bags or checked luggage on international travel.
C21.5.6. Additional Information Sources for Air Travel security.
C21.5.6.1. TSA Security Bulletins. The Department of Defense complies fully with the
U.S. Government policy of "no double standard" with respect to warnings of terrorist attack.
The Department of Defense shall disseminate all TSA security information in a manner that is
consistent with this policy. If TSA security information deals with threats to DoD personnel
only, then such information shall be disseminated in accordance with the DoD Component
procedures. If TSA security information includes the general traveling public as well as U.S.
Government or DoD passengers on international air carriers, then the Department of Defense
shall release only that information cleared by the DoS for international terrorism information and
the FBI for domestic terrorism information.
202
C21.5.6.2. DoS. The DoS monitors security conditions in countries with U.S. Embassies
and Consulates. It provides a wide variety of security-related information and advice upon
request. It is the releasing authority for all unclassified and unlimited distribution information on
international terrorism. DoD-affiliated personnel seeking the most current public information on
international terrorist threat concerns may call the Department of State in Washington, DC,
Commercial, (202) 647-5226 or at http://www.travel.state.gov/ to obtain the most recent
unclassified unlimited information regarding the international terrorist threat and international
travel.
C21.5.7. Vehicle Travel Tips. DoD personnel make millions of trips each year by
automobile. Most occur without any incident. Automobile trips have become so integrated with
official business it is easy to dismiss use of vehicles as much more dangerous than a walk down a
corridor from one office to another.
C21.5.7.1. Indiscriminate use of automobiles for the conduct of official business can be a
major weakness in personal security efforts. As in the foregoing discussion of travel
arrangements, consider steps to be taken to reinforce efforts of DoD personnel and their family
members to make identification of DoD personnel difficult. It is essential to make determination
of the prominence or importance of individuals by direct observation difficult, and to reduce the
vulnerability of DoD personnel to successful attack while they are traveling between a security
facility and their homes or a secure transfer point for a change in travel mode.
C21.5.7.2. Appendixes 12 and 13 contain several tips on reducing terrorist risk while
operating a motor vehicle.
C21.5.8. Rail Travel. Rail schedules and routes are highly regular and predictable; they
afford terrorists multiple opportunities to board and leave the train without arousing suspicion.
Rail travel is strongly discouraged in high-risk areas. If rail travel is necessary, the general
precautions outlined above for air travel are equally appropriate. In addition, the following
measures should be implemented.
C21.5.8.1. Avoid travel through high-risk areas; leave the train and switch to foreign flag
airlines if necessary to avoid such areas.
C21.5.8.2. Select a window seat in the middle section of open coach (U.S. style) rail
cars; select a compartment towards the middle of a rail car in multi-compartment European rail
cars; avoid taking seats near passageways between two rail cars if at all possible.
203
C21.5.9. Travel at Sea. Although DoD personnel and their family members do not
frequently use ferries, transoceanic passenger liners, or cruise ships for official travel, there are
many international waterways for which these modes of travel are appropriate for recreational
travel. Unfortunately, there have been several instances of terrorist attacks on international
passenger travel. The purpose of personal security precautions at sea remains unchanged. In
addition to the travel precautions appropriate for flying outlined above, some additional
precautions should be considered.
C21.5.9.1. Select ferry lines, cruise lines, or transoceanic passenger lines noted for good
safety and public health records.
C21.5.9.2. Avoid travel through high-risk areas; avoid sailing on vessels that make port
calls in high-risk areas.
C21.5.10. Hotel Procedures. It becomes readily apparent that AT security precautions taken
by DoD personnel and their family members at home have direct counterparts when staying in
hotels, motels, or guest quarters on U.S. military installations. The approach taken, from site
selection, to installation of additional AT security precautions, to family "operations security"
measures are quite similar. The list of measures that follows is long, but by no means
exhaustive. DoD travelers should use their own imagination and develop additional measures
that address the goals of antiterrorism measures spelled out above.
C21.5.10.1. Stay at DoD facilities while on TDY/TAD whenever possible.
C21.5.10.2. Consider staying in trusted hotels that don’t have distinctively American
names or predominantly American guests.
C21.5.10.3. Consistent with financial regulations, adjust hotel reservations and use an
assumed or modified name to confuse terrorist targeting.
C21.5.10.4. Avoid taking street-level rooms, terrace level rooms with direct access to
hotel grounds, or stairwells. If possible, stay in a room located between the fourth and tenth
floors. When checking into guest quarters and hotels, avoid taking a street-level room if at all
possible. Similarly, seek out alternatives to terrace, veranda, or other rooms which open directly
on to areas which can be easily accessed from other rooms, common areas of the hotel, the street,
or walkways along seawalls, beaches, lakes, etc. Use elevators in buildings rather than risk
attack in stairwells, but know stairwell locations to use as alternative exits and/or entrances and
in the case of fire or power outage. When in elevator, stand near the control panel; if threatened,
push the alarm button.
204
C21.5.10.5. Retain control over all luggage upon arrival in a hotel lobby. After arriving
at a hotel, the family should promptly move all luggage inside. However, it is again
recommended that the family never let the luggage out of their sight. This shall ensure that no
explosive device has been added to a bag and timed to detonate later in the family's room.
C21.5.10.6. When in a hotel, note all escape routes. Shortly after arriving in a strange
hotel or other public place, try to find out the locations of fire escapes, emergency exits, fire
alarms and fire extinguishers that you may need in an emergency.
C21.5.10.7. Vary your pattern of entering and leaving your hotel. Alternate entrances
and exists to the building should be used if they are available to avoid setting an identifiable
pattern of coming and going.
C21.5.10.8. Do not discuss travel plans over hotel phones.
C21.5.10.9. Use extra caution in hotel lobbies and other public places where bombs may
be placed. Public lavatories have been favorite sites for terrorists to hide bombs in the past. Use
of public rest rooms should be avoided to the maximum extent possible. Discovery of objects
such as shopping bags, briefcases, boxes and items wrapped in newspaper which have been left
unattended or which look out of place, should be reported to someone in authority. Exposed
wires or noise, such as a hum or ticking should also cause an object to be considered suspect.
DO NOT TOUCH SUSPECT OBJECTS. Notify authorities.
C21.5.10.10. Bellboys and other strangers in hotel lobbies should not be asked directions
for specific places you intend to go. Preserve anonymity and camouflage the nature of your
business travel. Ask directions from local police or from U.S. military personnel, if possible, not
hotel staff or other guests.
C21.5.10.12. Discourage efforts to enter your room while you are gone by preserving a
"lived in" look in your room. Leave a light and radio or television on in your room when you go
out. This shall give the appearance that the room is occupied. A light shall also make it easier
for you to see what or who is in the room when you return. Keep your hotel room key with you
at all times as well. This, too, shall make it more difficult to determine when the room is
occupied and when the room is vacant. Never use the “Clean Room” sign, as it also announces
you are probably not in the room.
205
C21.5.10.13. Keep your room neat. Neatness shall make it hard for things to be placed
in your room without your knowledge. Luggage, briefcases and packages that appear to have
been moved or otherwise disturbed should be treated with caution. A light dusting of talcum
powder can be spread on the surface of suitcases, a dresser, or a desk just before you leave the
room. A package that appears to have been opened and resealed should not be touched. Report
such things promptly to military or civilian police.
C21.5.10.14. Hallways should be checked before exiting from an elevator or your room,
for out of place objects or for persons who seem to be loitering. The management should be
asked to remove any boxes, trash cans or other receptacles near your room which may be used to
hide a bomb, or which might get in your way in case of a fire or other emergency evacuation.
C21.5.10.15. Packages should not be delivered to your room. Purchases should be
picked up in person and wrapped in your presence. Suspicious deliveries to your room should be
refused and the article removed from the building until it can be checked out. Doors should not
be opened for strangers or to accept an unexpected delivery.
C21.5.10.16. Unexpected mail left for you at the desk or slipped under the door of your
room should be viewed with suspicion. Mail, packages, or other articles with any of the
characteristics listed in Table C21.T1. should be treated as potential improvised explosive
devices.
C21.5.10.17. Suspect letters or packages should be isolated. They should not be put in
water, because this could weaken wrappings allowing mechanical devices to operate (or
otherwise cause detonation) if the letter or package is in fact a bomb. DO NOT OPEN OR
TAMPER WITH THE SUSPECT ITEM IN ANY WAY. Notify military or civilian authorities
and follow their advice.
206
Postage cancellation stamp does not Presence of peculiar odor of shoe polish,
match location of return address. almonds or marzipan.
Rigid envelope. Restricting markings, such as "Personal,"
Excessive securing materials, such as tape "Confidential," and so forth.
or string.
C21.6.2. Reference (e) establishes two standards directly pertaining to “Training for High
Risk Personnel and High Risk Billets” and “Executive Protection and High Risk Personnel
Security.”
C21.6.3. Protective Service Operations entail the protection of dignitaries and other high-
risk personnel in the Combatant Commander’s area of responsibility where significant threat
exists. Those threats include assaults, kidnappings, assassinations, and attempts to embarrass the
U.S. Government. This chapter is intended to supplement and consolidate information provided
in other sections of this Handbook, with a focus on the mission of executive protection. Other
sections of this Handbook should serve as the primary reference for many of the concepts
discussed here. For purposes of this chapter, the term "executive" applies to all persons
requiring additional security protection because they are assigned to High Risk Billets or have
been designated as High Risk Personnel.
C21.6.4. The specific supplemental security measures that may be furnished to executives
are subject to a wide range of legal and policy constraints. U.S. law establishes stringent
requirements that must be met before certain security measures may be implemented. DoD
207
Component regulations, instructions, and legal opinions may further constrain implementation of
the executive protective measures described in this Handbook. SOFAs and MOU between the
U.S. Government and a foreign government shall also limit use of supplemental security
measures. The U.S. Government contracted use of land or buildings for use by the Department
of Defense may also limit application of certain security techniques. All of these constraints
should be carefully considered when conducting security surveys, developing plans, and
implementing additional security measures to protect executives.
C21.7. EXECUTIVE PROTECTION GOALS
C21.7.1. In the discussion that follows, several measures are outlined which can afford DoD
executives additional protection against terrorist acts. The primary purpose underlying these
measures is to:
C21.7.1.1. Delay at a Distance. Increase the time that elapses between the detection of
an imminent terrorist attack and the actual onset of an attack to permit the arrival of response
forces or the successful evacuation of executives.
C21.7.1.2. Delay to Permit Flight. Increase the amount of time that elapses between the
onset of an attack and terrorist access to executives to permit the arrival of response forces or the
successful evacuation of executives under attack.
C21.7.2. Each supplemental security measure should be applied judiciously. There is a clear
trade-off between increasing the level of executive office and residence AT measures and the
need to preserve the anonymity of executives to avoid activity that may point to the executive’s
prominence or criticality.
C21.7.3. Supplemental AT measures can be expensive. The expense should be measured
not just in terms of dollars, but also in terms of changes to organizational routine. Therefore, two
primary questions must be addressed prior to the implementation of potentially bold, disruptive,
and expensive supplemental security enhancements.
C21.7.3.1. What are the most cost-effective means of enhancing the security of
executives at risk? How many changes in organizational routines and personal behavior shall
208
have to be made in order for security measures to be effective in reducing the vulnerability of
executives and the risk of terrorist attacks?
C21.7.3.2. What are the anticipated costs of additional security measures in terms of
dollars, organizational functionality, and mission capability?
C21.7.4. The security enhancements described in this Handbook shall be even more
effective if the executives and their families take full advantage of the enhancements and
reinforce the security measures. If executives do not change their behavior to accommodate
additional security and protective measures, then their behavior can effectively defeat the
purpose of the additional protection.
C21.7.5. Security measures can be enhanced to deter almost any terrorist threat. However,
there may be a point where it is no longer economical to add layer upon layer of protective
measures to deter a threat that is capable of overwhelming available protective measures. When
facing a well-armed and capable terrorist threat, additional security measures coupled with an
alternative security posture may provide the greatest deterrence to a terrorist attack.
C21.8.1.1. A thorough physical security survey serves as the foundation for a strong
executive protection program. Physical security surveys of the offices and residences of DoD
elements and personnel attached to U.S. Embassies should be performed by the DoS. Cognizant
physical security and facilities engineering staffs should perform surveys of other DoD facilities.
C21.8.1.2. The optimal approach to a physical security site survey is from the viewpoint
of a potential terrorist. The survey should examine avenues of approach to the installation,
facility, or residence; points of access to the executive offices or residences; and how attacks on
offices, residences, or other frequently used facilities could be mounted.
C21.8.1.3. A Technical TA is the next step in evaluating the need for supplemental
executive AT measures.
C21.8.1.3.1. A Technical TA provides a thorough and detailed assessment of the
weapons and tactics terrorists might use to attack the structure where DoD executives work and
209
reside. In order to enhance executive AT measures, security engineers and architects need
technical threat data or assessments containing the following information.
210
211
C21.8.2.1.1.3. Increase and extend IDS from the within the installation or facility
perimeter to the installation perimeter, allowing IDS to collection additional data in order to
classify and identify an intrusion before response force arrives at scene or track of the intruder.
C21.8.2.1.1.4. Increase the number of surveillance and duress detection systems
within the executive office area as well as approaches to the office area.
C21.8.2.1.2. Increase Threat Delay Time between perimeter and executive office
building.
C21.8.2.1.2.1. Install vehicle barriers and realign roadways to eliminate straight,
level stretches of road in excess of 50 meters in length.
C21.8.2.1.3. Increase Delay Time between the entrance to the building housing
executives and the executive office area.
C21.8.2.1.3.1. Consider the addition of fire doors, access control points, dead-end
corridors, and mid-corridor physical barriers to complicate access to executive office areas.
C21.8.2.1.3.2. Consider the addition of security devices which when activated
disrupt the ability of intruders to retain their thought processes. These types of security devices
212
include flashing strobe lights, fog generators, noise generators, sirens, and fire extinguishing
systems.
C21.8.2.1.4. Increase Delay Time and make access more difficult within the
executive office structure.
C21.8.2.1.4.1. Replace standard doors and doorframes in areas leading to
executive offices with high security doors and doorframes.
C21.8.2.1.4.2. Install high security grating; wire mesh, or other materials to bar
access to executive’s office area through utility tunnels or conduits.
C21.8.2.1.4.3. Strengthen walls, floors, and ceilings against improvised explosive
devices, small arms fire, incendiary devices, and powered hand tools by substituting steel plate,
concrete filled, steel reinforced cinder blocks, or other ballistic resistant materials for plaster/lath
or wallboard room dividers.
C21.8.2.1.4.4. Add steel plates or other ballistic materials in crawl spaces above
dropped ceilings; extend walls separating executive office area from other portions of an office
building to prevent unobserved and undetected access to space of dropped ceilings.
C21.8.2.1.5. Increase hold time to contain penetrators.
C21.8.2.1.5.1. Add positive action controls to facility and doors and gates to
ensure the gates and doors default to a closed and locked condition unless manually released.
C21.8.2.1.5.2. Add positive action controls to access control areas such that
persons inside an access control area can neither advance nor withdraw without affirmative
action by a security officer posted outside the access control area.
213
214
C21.8.2.1.9.2. The executive should travel to and from the function with an
escort.
C21.8.2.1.9.3. The executive’s travel route should be chosen carefully to avoid
potential hazard areas.
C21.8.2.1.9.4. The executive’s planned attendance at official functions should not
be publicized if at all possible.
C21.8.2.1.9.5. An attempt should be made for the executive to sit away from both
public areas and windows.
C21.8.2.1.10.4. When using a taxi service, the executive should vary the Taxi
Company. The executive should ensure that the identification photo on the taxi license matches
the driver. If the executive is uneasy for any reason, the executive should simply take another
taxi.
215
C21.8.2.1.10.11. Executives should always park vehicles in parking areas that are
either locked or watched and never park overnight on the street. Before entering vehicles,
executives should check for signs of tampering.
216
C21.8.2.1.10.17. Executives should take the following actions if they are attacked
and a roadblock is encountered:
C21.8.2.1.10.17.1. Use the shoulder or curb (hit at a 30- to 45-degree angle)
to go around the roadblock.
C21.8.2.1.10.17.2. If needed, ram the terrorist blocking vehicle in a non-
engine area, at 45-degree angle, in low gear, and at a constant moderate speed. The main
purpose of ramming the vehicle is to knock the blocking vehicle out of the way. In all cases, the
executive’s vehicle should not stop and the executive's vehicle should never be boxed in with a
loss of maneuverability. Whenever an executive’s vehicle veers away from a terrorist vehicle,
the executive’s vehicle is placed in an adverse position and it presents a better target to gunfire.
C21.8.2.1.11. Interurban, national, and international travel security practices and
procedures.
C21.8.2.1.11.1. Executive airline seats should be booked at the last moment. If
possible, the executive’s seats should be booked using an alias.
C21.8.2.1.11.2. The use of an executive’s rank or title should be restricted.
C21.8.2.1.11.3. Executives should not allow unknown visitors into their hotel
room or suite.
C21.8.2.1.11.4. Executives should keep their staff and family members advised
on their itinerary and subsequent changes to the itinerary. Executives should strictly restrict their
itinerary information to only those individuals who require this information as a part of their
official duties.
C21.8.3. Residential. The residential environment may provide executives a more limited
degree of AT security. Executive residences are often located in more secluded areas of the
installation or off the installation in the local economy and therefore may appear to present a
“softer target” to terrorists. AT measures, guards, security checkpoints, household staff, aides,
and/or secretaries can assist in insulating the executives from potential threats. An executive's
entire lifestyle should be included in security surveys used to assess the need for supplemental
AT security measures. The executive's residence and transportation between the residence and
the office should also be examined for vulnerabilities.
217
C21.8.3.3.1.1. Ensure all door locks and window clasps are working.
218
C21.8.3.3.1.2. Ensure that all doors and windows are properly secured to their
frames and the frames are properly anchored to the residential structure.
C21.8.3.3.1.3. Consider locking the driveway gates with a security lock to
deter/delay entry.
C21.8.3.3.1.4. Consider installing a through-door viewing device or visitor
intercom.
219
backup communication channels between the intrusion detection system and a surveillance
assessment and/or response dispatch center.
C21.8.3.3.4. Increase the durability and survivability of the residence to terrorist
attack.
C21.8.3.3.4.1. Consider fitting windows with either Venetian blinds or thick
curtains to reduce the visibility of activities within the residence and to reduce hazards of flying
glass in the event of nearby explosions or gunfire.
C21.8.3.3.4.2. Install backup power systems for security devices, to include:
surveillance systems, communication systems, and access control systems.
220
C21.8.3.3.5.10. Executives should be alert for the unusual, such as the movement
of household furniture or the identification of unusual wires.
C21.8.3.3.5.11. The executive should consider the installation of a panic alarm
bell on the exterior of the residence, with the placement of annunciator switches on every level
of the residence.
C21.8.3.3.5.12. The area surrounding the executive’s residence should be cleared
of dense foliage or shrubbery.
C21.8.3.3.6.2. Executives should ensure their hosts are aware of the executive’s
need for security and that the host establishes appropriate security measures.
C21.8.3.3.6.3. Executives should have their personal staff assist a civilian host if
required.
C21.8.3.3.6.4. Executives should arrange for visitors to be subject to adequate
security control.
C21.8.3.3.6.5. Executives or their staff should screen the invitation lists, if
possible.
221
C21.8.3.3.6.6. Executives should vary the times of their athletic activities, such
as golfing, jogging, etc.
C21.8.4. Transportation. Executives are most often at their peak accessibility to terrorists
when they are in transit in official or privately owned vehicles. This section recommends steps
to reduce the vulnerability of executives while in transit. Implementation of measures to
enhance the transportation security of DoD executives must be in full compliance with U.S. laws
and DoD directives.
C21.8.4.1.2. The phrase, “highly unusual circumstances which present a clear and
present danger”, is understood to mean that the perceived danger is:
222
[it is expected] that home-to-work transportation would be provided only for those employees
who are essential to the operation of the Government.
C21.8.4.2. Statutory Authorities and Limitations.
223
C21.8.4.3.2.2. LAVs are less than fully armored vehicles (normally armored after
purchase) intended to protect occupants from terrorist attacks using medium velocity small arms
projectiles and at least some types of improvised explosive devices. LAVs are used to protect
high-risk personnel who require protection but are not authorized the use of an HAV.
C21.8.4.3.3. Each of the Departments and some Defense Agencies (DIA, NSA, and
PFPA) manage a portion of the DoD Non-Tactical Heavy Armored Vehicle Program. Each of
these components has issued supplementary mandatory guidance on processing of requests for,
as well as allocation and use of, these scarce assets.
C21.8.4.3.4. HAVs are complex systems requiring specialized maintenance and
operation. As a general rule, HAVs shall be assigned to DoD personnel with a driver who has
been properly trained in the operation and maintenance of the vehicle. The operator is not a
chauffeur; he or she is an integral part of a supplemental security package provided by the
Department of Defense to meet its obligations to protect its key assets. HAVs are only justified
where highly unusual circumstances present a clear and present danger to the health and safety of
a nominated protectee, or compelling operational considerations make such transportation
essential for the conduct of official business.
C21.8.4.3.5. LAVs may also be provided by the U.S. Government to DoD executives
where "highly unusual circumstances present a clear and present danger to the health and safety
of a nominated protectee or compelling operational considerations" warrant their use. This
category of non-tactical armored vehicle features "add-on" or “kit” armoring. While a less
complex armoring system than those used in heavy NTAVs, "light" NTAVs afford substantial
protection to occupants against a wide variety of threats. New developments in after-
manufacture armoring kits for vehicles are occurring at a rapid pace, increasing the number of
vehicle manufacturers and models for which "other NTAV" modifications are suitable.
C21.8.4.3.6. The use of Privately Owned Vehicles (POVs) by High Risk Personnel is
not recommended during periods of high risk. Armored non-tactical vehicles shall be used when
available. High Risk Personnel and their protective details should take the appropriate measures
identified in appendixes 12 and 13.
224
C21.10.3. General Security Concept. Protective Security Details provide high levels of
security to an executive (protectee) by establishing a series of protective cordons around the
executive. The establishment of defense in depth often means that the innermost protective layer
is in close contact with the protectee at all hours of the day and night.
C21.10.4. Maintenance of Low Profiles. PSDs are trained in the art of maintaining low
profiles. Not only are they concerned about the visibility of the protectee, they are also
concerned about their ability to blend the protectees into the surrounding environment. The
security of a protectee is severely damaged when the presence of the PSD is obvious and
detectable, when all other measures to blend the protectee into the local environment have been
successful.
C21.10.5. PSDs shall strive to limit the publication of the protectee’s travel routes and
means of transportation. If the protectee’s travel routes and means of travel must be published,
the PSD may suggest editorial changes to the itinerary scheduled for public release in order to
limit details of the protectee’s travel. For example, routes to and from announced appointments
usually do not need to be released to the public.
225
226
C21.10.6.5. PSD members are highly trained security specialists. While in the company
of protectees, PSD members must be fully alert (no alcoholic drinks and/or drugs and
medications), accommodating and helpful. Protectees should remember, however, that the PSD
member’s primary duty is the executive’s protection, not to perform errands or to accomplish
personal services for the executive. PSD members performing valet or other chores cannot
effectively protect the executives.
C21.11.1. The previous sections focused on supplemental security measures used to address
terrorist threats to executives or High Risk Billets and High Risk Personnel.
C21.11.2. Various methods and measures have been discussed to provide incremental
security over and above the base level of security provided to all DoD personnel assigned to an
installation, facility, activity, or a unit. The decision to allocate protective resources to enhance
the security of DoD executives must be applied systematically to provide executive protection in
the office, residence or while the executive is in-transit.
C21.11.3. Additional security measures implemented to protect executives in their offices or
residences must be extended to official functions conducted. The security measures must also be
extended to the executive’s private life and depending upon the nature of the threat, the lives of
their family members as well.
C21.11.4. The decision to provide executives domicile-to-duty transportation should be
accompanied by additional security protection at the executives’ residence, office, and official
business and social functions. In view of the total costs of security measured in dollars, time,
inconvenience to protected persons, their staffs, colleagues, and families, it may be prudent to
radically alter living and working arrangements than to try to augment security in a piecemeal
manner. For example, it might be prudent to house high-risk personnel within a DoD installation
rather than to try to secure a detached, private residence at substantial distance from the
operations base of a response force.
C21.11.5. The key to successful executive protection is to ensure the level of protection
afforded, by AT measures, operational procedures in the office and at home, and protective
security details, is constant. The level of protection must be matched to the threat, and must be
sustainable.
227
228
C22. CHAPTER 22
PHYSICAL SECURITY
C22.1. INTRODUCTION
C22.1.1. The physical security systems installed in and around DoD installations and
facilities form the physical backbone of DoD AT efforts. The facilities, equipment, and
personnel making up the installation security force are the first lines of defense against terrorist
attack. DoD installation civilian managers and military commanders should develop an
integrated physical security system in order to achieve the necessary levels of protection of DoD
assets. The physical security system is built on the foundation that baseline security and
preparedness posture is established based on the local threat, site-specific vulnerabilities,
identification of critical assets, and employment of available resources. Further, these systems
are scalable and proportional to increases in the local threat and/or unit operational capability.
Physical security systems should be designed employing a layered “defense in depth” concept.
The application of physical security systems and measures play an integral role in establishing a
baseline security and preparedness posture in support of AT operations. This chapter provides
an over-arching physical security concept. The AT officer should consult with Services',
Combatant Commanders', and the Heads of the DoD Components’ physical security and AT
program guidance when developing a unit physical security system.
C22.1.2. DoD FPCON measures, RAM, and other AT measures are implemented based on
the current threat, and vulnerability and criticality assessments. Such assessments are used to
identify potential terrorist threats and vulnerabilities that may be exploited by terrorists, prioritize
critical resources, and support the Commander’s risk management decisions.
C22.1.3. The Installation Commander is responsible for incorporating physical security
systems into the AT plan. Where there are multiple units located at an installation, the
Installation Commander is responsible for coordinating unit physical security plans into the AT
plan. Physical Security measures should integrate facilities, equipment, trained personnel, and
procedures into a coordinated, synchronized effort to provide maximum AT protection. As a
minimum and as applicable, Physical Security measures should address the following.
C22.1.3.1. The DoD FPCON System.
C22.1.3.2. RAM.
C22.1.3.3. Physical Security Measures for an Installation.
229
C22.2.1. Policy. DoD 5200.8-R and DoD Directive 5200.8 (references (au) and (av))
prescribes standards and policy relating to the physical protection of military installations and
assets of the Department of Defense.
C22.2.2. Policy Goals. The goal of a security system is to deploy security resources to
eliminate or mitigate the potential for terrorism.
C22.2.3. Physical security system major components include:
C22.2.3.1. Integrated electronic systems.
230
C22.2.4.5. IDS.
C22.2.4.6. Access or surveillance systems such as closed-circuit television or thermal
imaging systems.
C22.3.1. Reference (au) emphasizes the need to think of physical security as a system that
provides defense in depth. In some cases, defense in depth can be obtained by constructing
“islands” of extreme or high security within a “sea” of moderate security. This concept is also
referred to as “enclaving.”
C22.3.2. Figure C22.F1. illustrates the general, layered defense approach to the
implementation of a physical security system. The DoD assets to be protected are located within
an innermost ring of security. Additional layers of security are provided at increasing distances
from the asset to be protected. The number of layers, the components that comprise them, and
their resistance to penetration depend on the threat and the importance of the asset to be
protected.
231
Inner Securit y
Zone
Out er
Securit y Zone DoD
Prot
Protect
ected
ed
Asset
Asset((s)s)
Perimet er
Barrier
C22.3.3. Figure C22.F2. illustrates the concept of layered security with integrated physical
security system components contributing to the security of a DoD asset. An outer perimeter is
established and clearly marked. Just inside the outer perimeter is an outer security zone. Within
this zone are surveillance systems to monitor activities within the zone and beyond the perimeter.
Access control points have been constructed to control access from outside the perimeter to the
outer security zone. A response force is positioned in the outer security zone to respond to
intrusions or other security matters within the outer security zone and at the perimeter boundary
if necessary.
232
DoD
Asset
Surveillance Systems
Response Forces
C22.3.4. Figure C22.F2. illustrates a generic physical security system configuration that
might be used to protect Level A assets (as defined by reference (au)) against advanced or
maximum physical security threat levels. This configuration represents the typical case—
integration of multiple technical and human physical security system components. It represents a
physical security system that can provide high resistance to penetration and delay attackers long
enough to permit a response force to arrive in time to apprehend or detain the perpetrators and
recover assets and restore them to their secured status.
C22.3.5. Figure C22.F2. also depicts key security system components and an approach to
integrating these elements into a physical security system. These components should detect
threats; identify, classify, and assess intrusions; and delay intrusions long enough to permit
response forces to arrive and complete containment and/or apprehension. If all else fails, these
233
security systems should delay intruders until overwhelming force arrives to rescue or recover the
asset.
C22.3.6. The concept of a layered defense also includes protection from threats launched
against DoD assets from any direction. Threats could come from below or above, and/or through
perimeter fences, walls, or other barriers. Underground parking garages in office buildings, high-
rise apartments, and hotels can harbor terrorists, as can large utility service structures such as
tunnels, culverts, canals, or spillways. Ceilings or roofs can be penetrated and must also be
protected. Even wide-open spaces on a large installation can represent potential danger for
terrorists equipped with hang gliders, ultra-light aircraft, parachutes, or even helicopters.
C22.4. PHYSICAL SECURITY SYSTEM FUNCTIONAL REQUIREMENTS
For a physical security system to protect DoD assets, certain security functions must be
performed.
C22.4.1. Threat Detection. As a rule, the earlier the detection of threats and the longer the
range that they are detected, the greater the opportunities are to protect DoD assets and minimize
the impact of terrorist acts against DoD personnel, materiel, and facilities. A wide variety of
systems can be used to detect the presence of activity at a distance from the facility. Several
factors can influence surveillance system performance.
C22.4.1.1. Seasonal and/or ambient weather conditions.
C22.4.1.2. The type of background against which surveillance systems are attempting to
operate can also affect their sensitivity. Systems that rely on motion for cues to activity work
well in rural environments; these same systems suffer data overload in an urban environment and
cease to be very useful in short order.
C22.4.1.3. Environmental and/or geographical considerations regarding where the
systems are placed. Systems can be placed making use of key terrain (hills, ditches, roads) or on
fixed man-made barriers (fences, walls, barriers).
C22.4.1.4. The number and variety of systems based on where the detection of the threat
is to occur.
C22.4.1.5. If the geography and siting of an installation does not permit detection of a
threat at its periphery, as is the case when DoD facilities occupy only a portion of a commercial
office building, then threat detection must occur at close quarters to the protected DoD asset.
Under such circumstances, multiple IDS, based on different detection principles, can be
234
employed to provide threat detection and additional information needed for classification and
assessment as discussed below.
C22.4.2. Threat Annunciation. The threat detected by the security system must be reported
to a central location from where security forces can be dispatched. Responding security forces
assess the on-scene situation and, if necessary, the on-scene commander can classify and/or
request additional assistance. This capability should have redundancy.
C22.4.3. Threat Classification and Assessment. The presence of a threat is usually detected
as a result of an alarm. Surveillance systems, including but not limited to visual surveillance
systems and IDS, transmit data to an information-processing center where detection data is
assessed. The purpose of such assessments is to determine whether the alarm is real or false, and
if the intrusion is hostile or benign. Often, security personnel use Closed Circuit Television
(CCTV) to assist them in their assessment role. CCTVs can also be slaved to the IDS. When a
sensor alarm is activated on a slaved system, a CCTV camera is immediately focused on that
area for the security guard assessing the IDS. IDS can help classify intruders, but rarely can they
do so without human intervention and direct observation of the intruder via CCTV, a night-
viewing device, an imaging infrared device, the human eyeball, or human interrogation.
C22.4.4.2. Delay has three purposes: facilitate definitive threat classification and
assessment; facilitate response by physical security response forces; and facilitate evacuation of
protected DoD assets if evacuation is the most appropriate, cost-effective AT remedy.
C22.4.4.3. Delay of potential threats can be essential in making definitive threat
classifications and assessments, and allows the response force an opportunity to take up
defensive positions to protect DoD assets, defend facilities and personnel, counterattack, and
conclude an incident with arrest and apprehension of the perpetrators.
C22.4.5. Threat Response. Response to threats begins immediately upon detection and is
designed to:
235
C22.4.5.1. Stop further intrusion by the threat at the greatest distance possible from
protected assets.
C22.4.5.2. Slow the rate of advance toward the protected asset as much as possible.
C22.5.1.1. Permit more economical and efficient use of security personnel through the
employment of mobile responding security forces instead of fixed guard posts or patrols.
C22.5.1.5. Enhance the security force capability to detect and defeat intruders.
C22.5.1.6. Provide the earliest practical warning to security forces of any attempted
penetration of protected areas.
C22.5.2. Types of IDSs. There are four types of IDS: local alarm, central station, police
connection, and proprietary station.
C22.5.2.1. Local Alarm. In this system, the protective circuits and alarm devices
activate a visible or audible signal in the immediate vicinity of the detected intrusion, usually on
the exterior of the building. The alarm transmission or communication lines do not leave the
building. Response is by local security forces that may be in the area when the alarm is sounded;
otherwise, the security force shall know of the alarm only if a passerby reports it or if it is found
during routine checks. The disadvantage of this system is that intruders know exactly when the
alarm is activated and can easily elude capture. A local alarm system should be used only when
guards are able to respond in a timely manner.
236
C22.5.2.2. Central Station. In this type of system, the operation of alarm devices and
electrical circuits is automatically signaled to, recorded, maintained, and supervised from a
central station owned and managed by a commercial firm with guards and operators in
attendance at all times. These personnel monitor the signals and provide the response force to
any unauthorized entry into the protected area. Connection of alarm equipment to the central
station is usually over leased telephone company lines.
C22.5.2.3. Police Connection. In this type of system, the alarm devices and electrical
circuits are connected via leased telephone company lines to a monitoring unit located in nearby
civilian police stations. An agreement with the local police department must be arranged prior to
establishment of this type of system.
C22.5.2.4. Proprietary Station. This system is similar to a central station operation,
except that the IDS monitoring or recording equipment for all IDS at the installation is located
within a constantly staffed security force communications center maintained and owned by the
government installation. The installation security force responds to all IDS activations.
Connection of the alarm sensor equipment to the security force central monitoring station is
normally over leased telephone company lines or by separate cable owned and installed by the
installation. A computerized IDS must be safeguarded against tampering.
C22.5.3. IDS Sensors.
C22.5.3.1. IDSs have several components, including sensors, data transmission
subsystems, display and assessment subsystems, power subsystems, communications
subsystems, and maintenance systems. IDS sensors are divided primarily into two groups—
exterior sensors and interior sensors—depending on their environmental capability.
C22.5.3.2. Exterior sensors are those that function in an outside environment. These
sensors and their associated processing equipment are weatherproofed and are less sensitive than
interior sensors to changes in climatic conditions. Exterior sensors are used for early detection of
intruders before they reach a protected structure. They are designed to provide fairly uniform
protection coverage in outdoor areas. Exterior sensors are used to establish an intrusion
detection line along fences, walls, and water or other land boundaries surrounding a protected
structure.
C22.5.3.2.1. Perimeter sensors are exterior sensors normally installed on fences,
walls, or gates. They detect different types of fence movement from an intruder climbing,
237
cutting, lifting up, or otherwise violating the fence. They can also be used within structures to
establish inner security zones or to monitor movement within a large, open structure.
C22.5.3.2.2. Line sensors are exterior sensors that form an extended boundary
through which intrusion can be detected upon a break in or interference with the sensor line, an
object passing through a magnetic field, or a change in the pattern in an electronic field.
C22.5.3.2.3. There are various types of exterior sensors:
238
C22.5.3.4.2. Volumetric sensors are interior sensors designed to react to the motion
of an intruder. They may be based on infrared, seismic, acoustic, or sensing technologies.
C22.5.3.4.3. Duress switches similar to those used in banks set off an alarm at the
touch of a button. They allow individuals to communicate situations of duress to forces that can
render assistance. Both fixed and portable switches can be used in this application. Fixed duress
switches are normally wired to the IDS duress circuit and are permanently mounted for
activation of the duress alarm when needed. Portable hand duress switches electronically
transmit to a receiver that is wired to the IDS duress circuit. Upon activation of a switch button,
the small, wireless transmitter sends a radio signal to the receiver, triggering a duress alarm.
Transmitters are designed to be either carried or mounted in suitable locations.
C22.5.3.5. Table C22.T1. lists several types of interior intrusion-detection sensors, the
purposes for which such sensors are appropriate, the principles by which each sensor operates,
common false alarm causes, and appropriate applications.
Interior capacitance Proximity Used in conjunction with Relatively free of false File cabinets, safes,
sensors metal objects such as files. alarms; protected items metal grates or
The metal becomes part of must be kept clean and screens, hardware or
the tuned circuit and any mounted off the floor machinery.
change in the capacity of on blocks.
the tuned circuit (e.g., a
body touching the object)
causes an alarm.
Vibration sensors Point Sensors are mounted Vibrations caused by Storage areas, vault-
protection within or upon walls to large machinery, HVAC like rooms; controlled
detect (via vibration) equipment, thunder or access areas.
forced entry. heavy wind.
239
Door and window Entry and Recessed and surface- Normally low Interior and exterior
sensors, balanced point mounted sensor establishes susceptibility to false doors; windows;
magnetic switch protection an electromagnetic contact alarm. Poor installation overhead doors.
between the fixed frame or maintenance can lead
and the movable door or to reduced effectiveness
window unit. or bypass.
Foil Entry and Surface-mounted on glass. Poor installation, old All windows and glass
point Intrusion by breaking glass varnish breaks down, doors.
protection breaks contact and cleaners break foil,
activates alarm. corrosives on
connectors.
Glass breakage Entry and Surface-mounted on glass. Some products can be All windows and glass
detectors point Uses ultrasonic signal activated by window doors.
protection generated by glass vibration.
breakage to signal an
alarm.
Switch mats Point Pressure-sensitive floor Low false-alarm In front of safes, files,
protection mats activated by potential. Moisture and cash registers; in
intruder’s body weight. could cause short doorways and
circuit. stairwells; under
windows; under
carpeting; in executive
or other offices.
240
Ultrasonic sensors Space Emits inaudible sound Areas containing Rooms with unbroken
protection waves that are sensed by a rotating or moving line of sight. Large
receiver. Intruder alters machinery; escaping air objects such as stacks
wave pattern, activating an or steam; large glass of boxes or furniture
alarm. windows or thin walls can create shaded
that can vibrate; radio areas on the side away
transmitters; magnetic from the transceiver.
fields from generators;
motors or fluttering
drapes.
Microwave sensors Space Transmits an Areas containing small Long corridors, aisles,
protection electromagnetic field into openings that can allow or totally enclosed
the area to be protected. escape of microwave areas, or areas in
Intruder motion activates energy to outside areas; which a sensor can be
alarm. fluorescent lights; directed away from
heavy machinery; wall windows and thin
vibration; thin walls or walls in well-
glass; radiated or constructed buildings.
conducted electro- Protection not affected
magnetism. by air currents or
temperature
differential. Good for
large spaces.
241
Passive infrared Space Combination of heat Objects in a room Rooms or areas with
sensors protection generated by a body plus heated by sunlight high air turbulence, all
motion of the body through windows; space interior spaces. Sensor
activates the sensor. heaters; rodents and should be mounted so
other animals; passive that direct sunlight is
infrared sensors have not in the sensor’s
high resistance to false direct field of view.
alarms
Sonic (audio) Space Fills the area with sound May be activated by Interior spaces where
sensors—active protection waves. Disruption of these extraneous sounds from stay-behinds are a
waves by an intruder outside the protected threat or where items
activates the alarm. area; objects that can in the area may be in
move, such as fans or different locations
equipment; sound from day to day, such
waves can be disturbing as warehouses or
to persons. shipping in adjacent
areas.
Remote audio Space Uses leased telephone line Extraneous noise Provides a means to
(listen-in)—passive protection and microphone to provide (passing vehicles, verify other intrusion
remote listening to detect machinery, and noise in systems prior to
intruder movement. adjacent areas) response.
However, federal wiretap mistakenly classified as
statute may be implicated an intrusion.
if it picks up
conversations.
C22.5.3.6. Data or signal transmission subsystems link sensors with control and
monitoring consoles. The transmission medium is used to send control signals and data to and
from all sensors, control points, and annunciator panels. These subsystems may be hardwired
landlines, radio-frequency links, fiber-optic cables, or any combination thereof. Most recently,
transmission of data-encrypted alarm signals via satellite has been developed and is now
available commercially.
242
C22.5.3.7. Annunciator, control, and display subsystems provide equipment for central
operational control and monitoring of the IDS. Through this equipment, security force personnel
are instantly alerted to the status of any protected area. These subsystems should be located in a
restricted area and closed off from public view. Alarmed spaces should be designated by zones
to facilitate identification of penetrated areas, assessments of vulnerability resulting from
intrusions, and dispatch of response forces in a timely manner.
C22.5.3.8. The primary power source plays a vital role in the selection process. A
planner must ensure that an IDS is capable of operation on the power (frequency and voltage)
that is available. Within the United States, 60 Hz (cycles) and 110 V alternating current is the
standard. Outside the United States, frequencies may be 50 Hz or 60 Hz and voltages can range
from 110 V to 440 V, in any combination.
C22.5.3.9. In many overseas areas, line voltages can fluctuate widely and voltages for a
240 V system can drop to 180 V, then surge to near 300 V. Where this occurs, surge arrestors
and line conditioners shall be required to protect the IDS equipment. If the system selected is not
capable of operating on available power, then some means of converting the power to a usable
form must be provided. Sufficient power must be available to operate the equipment in each
area to be protected as well as to operate the control-monitoring station. The power required by
each item of equipment must be included in determining the total system load.
C22.5.3.10. Many sensors and display units operate on direct current. When these units
are used, it is necessary to provide sufficient direct current rectifiers at each location to convert
locally available alternating current to the direct current required by the sensors and display
units. Many of today’s control units and sensors use microprocessors to accomplish their
function. Although powerful in performance, they are susceptible to damage from electrical
transients such as surges or spikes that result from interference or noise on the power line. This
vulnerability can be reduced through the incorporation of surge protectors or lightning arrestors
in the design.
C22.5.3.11. Emergency backup power provides protection to the IDS even when the
primary power fails or is cut off. It is crucial that an alternative power source be provided to
support the IDS. If there is an uninterrupted power supply available, then connecting the IDS to
it should be a prime consideration. Most systems contain a backup battery that is continuously
trickle-charged by the primary power system. An 8-hour battery backup is mandatory.
However, if the primary power is subject to being out for longer periods, a 16- or 24-hour
243
244
frequency modulation of information. The most effective line security is provided by encrypted
data transmission.
C22.5.4.3. Physical Protection of System Components. Wiring should be protected from
exposure to physical damage and manipulation. Use of conduit or metallic tubing is
recommended. Tamper detection devices should be installed on all junction boxes.
C22.5.4.4. Environmental Influences. IDS components are commonly exposed to
environmental influences, both natural and manmade, that can have an adverse effect on system
operation. Protection from electromagnetic interference can be provided by means of proper
shields, grounding, conduit, and physical separation. Other factors, including high humidity,
saltwater-laden atmosphere, dust, temperatures, and animal and insect pests, should also be
evaluated during system design to assure a system best suited to local conditions.
C22.5.5. IDS Maintenance. Maintenance and testing of systems is essential. Service and
manufacture warrantees should be consulted for specific maintenance and testing requirements.
C22.6. LIGHTING SYSTEMS
C22.6.1. Protective lighting should enable guard force personnel to observe activities around
or inside an installation without disclosing their presence. Adequate lighting for all approaches
to an installation not only discourages attempted unauthorized entry but also reveals persons
within the area. However, lighting should not be used alone. It should supplement other
measures such as fixed security posts or patrols, fences, and alarms.
C22.6.1.1. Protective Lighting Approaches. Good protective lighting is achieved by
adequate, even light upon bordering areas, glaring light in the eyes of the intruder, and relatively
little light on security patrol routes. In addition to seeing long distances, security forces must be
able to see low contrasts, such as indistinct outlines of silhouettes, and must be able to spot an
intruder who may be exposed to view for only a few seconds. Higher levels of brightness
improve all of these abilities.
C22.6.1.2. In planning protective lighting, high-brightness contrast between intruder and
background should be the first consideration. The volume and intensity of lighting shall vary
with the surfaces to be illuminated. Dark, dirty surfaces, or surfaces painted with camouflage
paint require more illumination than installations and buildings with clean concrete, light brick,
or glass surfaces. Rough, uneven terrain with dense underbrush requires more illumination to
achieve a constant level of brightness than do manicured lawns.
245
C22.6.2.4. Motion Activated Lighting. Modern activated lighting can be very effective
in deterring intruders and drawing to an area where as intruder has tripped a motion activated
light.
246
247
C22.7.1.2. They are an essential element in the IDS. Typically, they are responsible for
making an on-the-spot assessment of initial alarms. Their judgment shall figure prominently in
installation responses.
C22.7.1.3. They are usually the initial response force, local augmentation forces, and
regional/national special capability response forces. Therefore they are responsible for initial
incident control and containment, as well as augmentation and more specialized functions in the
event of a terrorist incident.
C22.7.2. Security forces are an essential element of the physical security system. Services,
Combatant Commanders, and agencies promulgate extensive criteria for selection and
employment of security forces and should be consulted for specific guidance.
C22.8. PARKING
C22.8.1. As a rule, parking should be restricted to the areas that provide the least security
risks to DoD personnel.
C22.8.2. If possible, a visitor parking facility should be established outside the installation
perimeter. If space does not permit this, visitor parking should be restricted to an area as close to
the main installation gate as possible, without endangering the gate security personnel and others
awaiting access. Pedestrian screening should be conducted between the visitor parking area and
other sections of the installation if possible.
C22.8.3. All parking within the perimeter walls should be restricted to employees, with
spaces limited to an area as far from the building as possible. Parking for patrons and visitors,
except for pre-designated VIP visitors, should be restricted to outside of the perimeter wall. If
248
possible, parking on streets directly adjacent to buildings, especially those housing highly valued
assets should be forbidden. There should be no underground parking areas in building
basements or ground-level parking under building overhangs. Such space should be converted to
secured storage; monitored employee, staff, or dependent recreational areas; or additional office
space if possible.
C22.8.4. When parking areas are established, security of visitors as well as DoD personnel
should be considered:
C22.8.4.1. Avoid extremely remote parking for visitors.
C22.8.4.2. Install an emergency communication system (intercom, telephones, etc.) at
readily identified, well-lit, CCTV-monitored locations to permit direct contact with the security
department.
C22.8.4.3. Provide parking lots with CCTV cameras capable of displaying and
videotaping lot activity on a monitor in the security control center. Lighting must be of an
adequate level and direction to support cameras while giving consideration to energy efficiency
and local environmental concerns.
C22.8.4.4. Channel pedestrians toward a pedestrian access control checkpoint or
installation facility or building access control point.
C22.8.4.5. Fences; Jersey barriers; low, thorny hedges; and other barriers may be used to
guide pedestrians and maintain control over their movements.
C22.8.5. Although in-building or underground parking is strongly discouraged, there are
circumstances in which there is no alternative. The following recommendations are made to
enhance the security of building occupants.
C22.8.5.1. A complete vehicle control system should be provided for those buildings in
which the parking garage is part of the building itself.
C22.8.5.2. Nondescript vehicle identification should be provided that must be displayed
before entering the garage; CCTV surveillance should be provided for employee safety and
building security.
C22.8.5.3. Access from the garage or parking structure into the building should be
limited, secure, and well lit, and have no places of concealment.
249
C22.8.5.4. Elevators, stairs, and connecting bridges serving the garage or parking
structure should discharge into a staffed or fully monitored area. Convex mirrors should be
mounted outside the garage elevators to reflect the area adjacent to the door openings.
C22.9. PEDESTRIAN ACCESS CONTROLS
C22.9.1. Access control is primarily directed at decreasing exposure to criminal activity.
Criminal opportunity can be reduced through design of a facility that restricts persons from areas
where they do not belong. Access to an installation, a group of buildings, or a single building
can be designed to facilitate surveillance, control, and segregation of traffic by function.
Depending on the functions to be accomplished by the occupants, access points can be designed
either to be closed during non-duty hours, or to be subject to surveillance and control for
all-hours entry.
250
Protected Facility
Ballistic-resistant doors
Interview
and search
room
CCTV monitors
0 0 0
Electrically operated door locks
Duress alarm
Ballistic-resistant glass
251
C22.10.3. Under some circumstances, it may be necessary to insert a large sleeve composed
of multiple sections of pipe each no more than 10 inches in diameter into large storm sewer
culverts or tunnels. This approach is illustrated in Figure C22.F4 and should be employed to
block all other penetrations through the perimeter barrier that are large enough for a person to
crawl through (that is, more than 10 inches in diameter) but cannot be sealed closed for any
reason. All such penetrations should be equipped with intrusion detection sensors or placed
under surveillance.
4 feet to 6 feet
C22.11.1. The physical security system’s initial task is to detect the presence of threats to
DoD personnel and materiel protected within the facility. A wide range of surveillance options
should be considered based on the following.
252
C22.11.2. Technology offers physical security system planners a wide range of sensors and
phenomenology from which external surveillance systems can be assembled. Table C22.T2.
indicates that surveillance systems readily available to local military installation commanders
capable of providing detailed visual images are somewhat less abundant than systems that detect
the presence of a target but may not be able to report back the full particulars on the detected
target. As the target of surveillance moves closer to the facility, it becomes possible to use
guards with binoculars, CCTV or other electro-optical systems, or imaging infrared systems to
detect the presence of terrorist threats.
Beyond the
Perimeter
(detection range: • • • •
1000s of yards)
At the Perimeter
Barrier
(detection range: • • • • • • •
less than ten
yards)
253
C22.11.3. Electromagnetic energy sensor systems use radar to detect aircraft, sonar to detect
water vehicles and swimmers, and laser radar to detect humans or vehicles. These systems can
report surveillance targets in digital or analog formats. Such reports usually require additional
interpretation by operators. Visual surveillance systems report data in image or photographic
form, requiring less interpretation by surveillance system operators before surveillance
information is assessed as threatening or benign. Visual surveillance systems are usually more
limited in detection range than electromagnetic sensors. Many visual surveillance systems are
passive devices. Their use does not require the emission of energy, which could alert an intruder
to the presence of surveillance systems. Visual surveillance systems have performance
limitations, due in part to ambient weather conditions, which may require use of additional
passive sensors. Such systems report information in a form that may necessitate more complex
analysis before the detection of an intrusion can be classified as a threat.
C22.11.4. Surveillance system monitors need to be given information or decision rules, that
they can use to interpret data, provided by all surveillance systems in use.
C22.11.5. Table C22.T3. indicates some of the surveillance problems that installation guards
and security officials routinely confront. External surveillance may detect the presence of
general activity hostile to DoD assets; it may also detect the presence of activity or targets at,
near, or beyond the perimeter barrier, which behave in a peculiar manner. For the most part,
however, it seems unlikely that external surveillance shall detect the presence of terrorists in the
vicinity without further assistance and guidance from the subset of the intelligence,
counterintelligence, and law enforcement communities.
Detect presence of criminal activity Attempts at unauthorized entry to Notify guard forces; contact local
directed at installation installation; tampering with locks, law enforcement agencies IAW
security devices at infrequently liaison arrangements and SOFA
used gates provisions if overseas
Detect civil disturbances Sudden changes in social behavior Notify guard force; contact
in indigenous population Embassy if overseas
254
aviation over-flights
Detect vehicle bomb threat Vehicle approaching facility at high Notify guard force and activate
speed; sudden evacuation of area vehicle barriers; notify Operations
around facility by indigenous or Command; notify Intelligence
population and Counterintelligence
C22.11.6. Table C22.T3. also suggests that even with additional preparation and guidance,
the guard at the gate or a centralized CCTV monitoring station conducting external surveillance
shall have a difficult time detecting a terrorist threat beyond the installation perimeter. Detection
can be enhanced if the terrorists undertake an overt act such as clearing windows in the upper
stories of buildings across the street from a DoD facility.
C22.11.7. On the other hand, it is clear that if external surveillance detects the presence of
the threat at the perimeter barrier and is able to maintain contact with the threat, then
classification of the threat and preparing an immediate response if the perimeter is penetrated are
both easier and quicker.
C22.11.8. Surveillance systems that combine detection systems registering the presence of a
threat as well as detection systems that permit direct visual monitoring of the threat provide
considerable information to installation threat-assessment personnel. Multiple sensors arrayed in
a grid pattern from the perimeter barrier stretching in toward the center of the facility can provide
the security force with information necessary to classify and characterize the threat without
forcing the guard force to leave secure positions. Surveillance systems often have a lower life
cycle cost. They can be hardened against the elements to a substantial degree. It is not
surprising to see more DoD Components placing greater emphasis on IDS and other technical
surveillance systems to meet their physical security system protection requirements. The
advantages of technical surveillance are lost, however, unless IDS and other systems remain in
top-notch repair.
C22.12. AIRFIELD COMBATING TERRORISM SECURITY CONSIDERATIONS
C22.12.1. Airfields represent special security challenges because of the unique character of
the facilities and the DoD assets that they support. All of the foregoing discussion applies to
255
airfields. Airfield security planners may also wish to consider the establishment of multiple
internal security perimeters, hardening of selected buildings against terrorist attack, hardening of
petroleum storage, aircrew facilities, maintenance facilities, and other facilities collocated on the
installation. Security planners are fully aware of DoD regulations and instructions, Service
regulations and instructions, and Combatant Commander requirements for enhanced physical
security protection for many types of munitions stored at DoD airfields.
C22.12.2. In securing structures and facilities, however, it is important to examine runways
and taxiways with great care. These are not merely slabs of asphalt and concrete poured on the
ground; they are intricate, complex architectural structures containing all the building elements
normally associated with complex high-rise office or apartment buildings. Runways and
taxiways are crisscrossed with electrical, water, and sewer lines. Often there are petroleum, oil,
and lubricants distribution systems buried adjacent to, if not underneath, portions of runway and
taxiway structures. Constructing 2- to 3-mile-long stretches of pavement often requires
substantial reconfiguration of the local topography, creating the need for extensive drainage and
storm water management systems.
C22.12.3. Therefore, airfields abound with utility penetrations not often seen in urban office
building environments.
C22.12.4. Airfields are often adjacent to areas with substantial wildlife activity. Exterior
intrusion alarm systems are prone to provide much data on movement that is regarded as false—
that is, non-human. Exterior intrusion alarms applied without great care to airfield perimeter
security barriers can actually degrade security by desensitizing security personnel responsible for
classification and assessment of threat information reported. High false-alarm rates triggered by
roaming wildlife can lull guards and IDS monitors into a false sense of security.
C22.12.5. Use of multiple phenomenology intrusion sensors is essential to the effective
management of limited security personnel resources at airfields. Use of line detectors, motion
detectors mounted on fences, and seismic or acoustic sensors sown in patterns are critical.
Multiple- phenomenology IDS can permit alert center personnel to classify and identify an
intrusion by looking at reports from each type of sensor. Subtle differences are reported between
human and animal interactions among different types of sensors. By laying out multiple sensors
across a wide area, the differences between human and animal activity can be magnified,
allowing alert center personnel to determine whether the intrusion is human or animal as well as
the intruder’s direction and rate of advance. This information can be used to determine whether
256
the security force must be dispatched, to what point it should go, and how quickly it must arrive
at the designated interception point.
C22.12.6. Another unique aspect of airfield security is the nature of the activity and the type
of assets to be found there. Aircraft generally are most vulnerable to mechanical problems,
human error, or ground-to-air attack during landings and takeoff. The requirement to maintain
lift at low speeds generally restricts aircraft operation to a fairly narrow corridor within a few
degrees of the direction of the airfield runways. The performance envelope of aircraft also
restricts the volume of airspace in which an aircraft can operate within a few miles of an airfield.
C22.12.7. The introduction of sophisticated electronic systems to support aircraft takeoffs
and landings in all weather and visibility conditions has added vulnerabilities to airfield
activities. Attacks on airfield electronics could be devastating.
257
C22.13.2. Air Mobility Command (AMC) maintains a worldwide database in their secure
web site with current intelligence and operations information that can assist commanders in
making prudent decisions pertaining to a MANPAD threat. The AMC Intelligence Combined
Risk Assessment database offers both automated risk assessments known as the Virtual Threat
Assessor program and formal TWG virtual RA. Both products offer such items as airfield
information, terrorist, medical, military, information operations, and other threat information,
along with archived briefings and open source information.
C22.13.3. Airfield security and local area assessments should be conducted to identify the
areas of vulnerability to a MANPAD threat (in terms of possible launch sites) to include the
airfield arrival and departure corridors as well as potentially vulnerable ground targets such as
parked aircraft or ground vehicle motor pools. A thorough assessment could include security
force, intelligence, counterintelligence, and operational personnel as well as local/host nation
authorities.
C22.13.3.1. The DIA missile and space intelligence center has flight path threat analysis
simulation (FPTAS) software in their secure web site that allows the local commander to
quantify the areas of greatest MANPAD threat. FPTAS uses aircraft performance, flight path
data, missile characteristics, and digital terrain elevation data to generate maps depicting areas
from which MANPADs could engage U.S. and allied aircraft. Commanders have used these
maps to identify flight paths with minimum exposure to the MANPAD threat and have adjusted
take-off/landing patterns to limit aircraft exposure and utilize areas readily secured by ground
troops.
C22.13.3.2. Criteria to identify possible MANPAD launch sites include but are not
limited to:
C22.13.3.2.1. Cover and concealment – the ability of an object to provide protection
for the terrorist from return fire and prevent detection by security force personnel.
C22.13.3.2.2. Line of sight providing unobstructed view of the target.
C22.13.3.2.3. Exposure time – the amount of time the intended target is vulnerable
from an operational attack.
C22.13.3.2.4. Distances to target and target recognition for the terrorist to positively
identify the intended target.
258
C22.13.4.1.3. Ensuring tight airfield access control procedures are in place for
airfield operations. Consider dispersal of parked aircraft to reduce damage from a MANPAD or
rocket propelled grenade attack.
C22.13.4.1.4. Developing and exercising contingency plans for responding to an
incident of a MANPAD threat. Rapid reaction plans shall facilitate the immediate capture of a
259
terrorist team, even post attack, to deter/prevent future attacks and ease concern for air travel
safety by the public at large.
C22.13.4.2. The following are points to consider in developing AT plans to reduce
aircraft in flight susceptibility due to the MANPAD threat.
C22.13.4.2.1. Establishing airfield specific procedures for the use of aircrew tactical
countermeasures and/or tactics. Development and dissemination may require coordination with
local/host nation authorities. Ensure aircrew awareness of possible effects of MANPAD on their
aircraft. Ensure aircrews and flight operations are tied into the AMC intelligence combined risk
assessment database to obtain current information on airfield security assessments.
C22.13.4.2.2. Varying arrival and departure times of aircraft. Stagger the arrival
times of normal scheduled missions to make arrival, departure, and ground times harder to
predict for the terrorist.
C22.13.4.2.3. Randomly changing approach and departure routes as a deterrent (in
accordance with current TSA guidelines).
C22.13.4.2.4. Limiting or discontinue use of landing lights within identified threat
zones to reduce heat producing/targeting options.
C22.13.4.2.5. In high threat areas or when intelligence has indicated a high alert
status, coordinating and developing plans for engine running offloads to minimize ground time.
C22.14. WATERSIDE SECURITY
260
C22.14.3.1. The quantity of materiel in transit to and from port areas is enormous. The
quantities are so large that it is physically impossible to inspect each container or bulk cargo
shipment for weapons, explosives, or other terrorist contraband.
C22.14.3.2. Port facilities are notoriously accessible from the waterside of the facility.
Hence, waterside security must include the establishment of a security perimeter at the water’s
edge to detect presence of terrorist threats. The security perimeter must be extended into the
water if terrorists are assessed as having the capability to launch attacks using standoff weapons
from boats or other craft.
C22.14.4. External surveillance must monitor traffic on the surface of the water adjacent to
the facility, extending from the barrier to a range exceeding that of identified terrorist threats. As
illustrated by Figure C22.F5., the outer limit of the surveillance area extends well beyond the
estimated outer range of terrorist waterborne weapons. A security zone is established within the
surveillance area extending from the high-water mark to a distance at least 1,000 meters from
shore if possible. In some port areas, the security zone shall be constrained, while in other areas
the security zone may be extended farther, especially if the terrorist threat includes longer-range
standoff weapons such as man-portable antitank missiles. Within the security zone exists a
reaction zone. Here aggressive actions may be undertaken to isolate, delay, and resolve potential
threats to DoD assets from waterside terrorist action.
C22.14.5. Figure C22.F5. shows security zones inscribed around a land-based facility. The
principle can be extended to one or more warships at anchor; security zones may also be declared
around navigation aids mounted on structures in shallow water, as is the case for airfield
navigation aids in bays or rivers.
C22.14.6. Specific recommendations on implementation of waterside security measures are
described in Appendix 17.
C22.14.7. It should be emphasized that DoD facilities bordering bodies of water should
include waterside protective measures as part of the facility physical security plan, even if there
are no active waterside commercial, military, or recreational facilities at the facility or
installation. Appendix 17 provides measures for DoD facilities adjacent to bodies of water.
261
C22.15. STRATEGIC SEA AND AIR PORT, SEA AND AIR PORT, AND DEPLOYED
LOCATIONS
C22.15.1. The physical security of locations off military installations presents unique
challenges that often, at best, can only be mitigated and never eliminated. Though these
locations are not under the direct control of the Commander/agency head, adequate physical
Waterside
Surveillance
Area
Land Area Not
Controlled by DoD
Terrorist Threat
Weapon Range Protected DoD
Assets
Threat Zone
Warning
Zone
Assessment
Zone
security can be achieved through active liaison with local officials and/or host nation authorities.
As discussed extensively throughout this manual, it is essential to develop a local threat
assessment, identify vulnerabilities, prioritize critical assets, complete a risk analysis, and
develop an AT plan. Care should be taken to go through this process for each location forces
shall be embarking/debarking, transiting through, and deploying to.
262
C22.17.1. Access controls are intended to increase the amount of time needed to go from
one area of a facility to another, to allow security personnel to sound alarms and take immediate
protective actions in the event of attack. Some access control systems can both delay attackers in
reaching protected areas and inhibit egress from a facility. These systems aid in containing and
resolving the incident as well as aid in the apprehension of the perpetrators. Figure C22.F6.
illustrates one approach to controlling access to a secure area within a building. Depending on
the threat, the asset to be protected, and the availability of protection and security resources,
access control points as illustrated can be established in a series. The greater the value of the
263
protected asset, the larger the number of checkpoints that must be passed before access is
granted.
C22.17.1.1. Figure C22.F6. illustrates several important features of a secure area access
control point. A CCTV camera provides surveillance of the initial entryway. The door to the
entryway is hardened and provides two minutes of delay against penetration. The waiting area is
hardened, and is subject to surveillance by a guard. The guard is protected from the waiting area
by ballistic-resistant glass and an electrically controlled ballistic- resistant door. The guard also
has a hidden duress alarm.
264
CCTV
Monitor
Ballistic-
Resistant
00000
Door
Ballistic-Resistant Glass
with Card Pass Tray
Convex
Mirror
CCTV
Camera
C22.17.1.2. The access control checkpoint can screen employees and visitors and can
complicate entry; however, visitors and employees shall have legitimate business activities to
conduct within the secure area. Therefore, additional procedural safeguards must be
incorporated into the physical security system to prevent theft of valuable items or information,
as well as to protect individuals in the secure area against direct assault or explosive devices left
behind by authorized visitors.
265
C22.17.2. Access Control Procedures. The systems approach to physical security includes
an assessment of day-to-day operations within the secured area. In order to maintain adequate
security throughout a DoD installation, within a facility, within an activity, and within an
organization without unduly interfering with day-to-day work, it is necessary to permit personnel
to move about. On the other hand, the physical security system has a responsibility to ensure
that protected assets remain protected throughout the regular workday. Accordingly, the
following measures can be implemented to maintain positive control over access to protected
DoD assets.
C22.17.2.1. A Pass-and-Badge System. Where the area is large or where the number of
personnel exceeds a number that can be recognized personally by the guard or persons charged
with security responsibility for the area, a pass-and-badge identification system should be used.
Security badges shall be used primarily for access control. Badges should contain a picture of
the individual who has authorized access, and it may contain additional information about the
individual, communicated through such things as badge borders, color, and photograph
background color. Information that should not be printed on the badge includes the home
address, the specific work location address and telephone number, security information, and, in
some areas, information identifying the badge holder as a DoD or U.S. Government employee.
C22.17.2.2. An Access List System. Admission of personnel to very high-security areas
should be granted only to persons who are positively identified. One approach is to prepare
access lists containing the names of those individuals specifically authorized access to a facility.
Access lists should be maintained under stringent control of an individual who is formally
designated by the commanding officer or manager of the facility. That person should be
responsible for updating and confirming the need for access on a regular, frequent basis.
Admission of persons other than those on the authorized access list should be approved by the
commanding officer, manager, or designated representative. Access lists should always be
controlled carefully and never displayed to the public. If a computerized access list system is
used, the computer files used to generate such a list must be safeguarded against tampering.
C22.17.2.3. An Exchange Pass System. The exchange pass identification system may be
employed in highly sensitive areas to ensure stringent access control. It involves exchanging one
or more identification media (such as badges or passes) for another separate type of identifier
(such as badges or passes). This system is particularly useful where visitors must gain access to a
high-security facility. The process of exchanging passes is a personal one, permitting security
266
personnel an opportunity to examine all personnel both upon entering and upon exiting the
secured facility.
C22.17.2.4. An Escort System. Escorting is a method to control visiting personnel
within a secured facility. The escort must remain with the visitor at all times while within the
restricted areas. If local written policy determines that an individual does not require an escort
within the area, the individual must meet all the entry requirements for unescorted access.
Escorts may be civilian or military personnel employed by or attached to the visited activity, and
shall normally be from the office of the person being visited. A major objective in escorting
visitors around a facility is to ensure that all material brought into the facility by the visitor is left
with someone who can open and examine the contents and that visitors leave no packages or
other materials behind on their departure.
C22.18. SAFEHAVENS
C22.18.1. The innermost layer of protection within a physical security system is the
safehaven(s). Safehavens are not intended to withstand a disciplined, paramilitary attack
featuring explosives and heavy weapons. Such structures generally should be expected to
provide a minimum of 15 minutes of protection against a predetermined level of attack using
hand attack tools or small arms.
C22.18.2. The safehaven should be designed such that it requires more time to penetrate by
attackers than it takes for the response force to reach the protected area. Consider equipping the
safehaven with minimal food, water, and medical supplies. Consult Service, Combatant
Commander, or DoD Agency AT construction guidance for complete details on constructing a
safehaven. Figure C22.F7. represents a sample safehaven layout.
267
like the security of a DoD installation or facility. A layered defense or defense in depth, as
discussed earlier in this Chapter, should be prepared.
Covert mounted
CCTV
Safe haven
door system
Forced entry– and
bullet-resistant
windows
SAFE HAVEN
Receptionist
Executive
assistant’s
office
Covert mounted
CCTV
Access control
system
C22.19.2. Many senior military officers and DoD officials (referred to below as
"executives") because of their specific assignments or positions of visibility and terrorist threat
conditions, are designated High Risk Persons (HRP). Additional security measures for HRP are
discussed in Chapter 21.
268
269
C22.19.3.3. DoD personnel assigned to Defense Attaché Offices can contact the
Embassy's Regional Security Office prior to overseas deployment for detailed information on
high and low crime areas. The Defense Attaché's Office should also be able to obtain such
information to assist personnel being assigned overseas on TDY/TAD status who may require
residential housing in lieu of hotel-type accommodations.
C22.19.3.4. Other DoD affiliated personnel may obtain information by contacting the
Country Desk in the Department of State, Washington, D.C. 20520 or on the WorldWide Web at
http:\\www.state.gov.
C22.19.3.5. Utilities Service and Protection. Explore the reliability of local utility
service in order to determine whether or not emergency or backup power and utility service shall
be required. The availability and reliability of utilities in any given location should be a primary
factor in the selection of a residential site. Reliability of utilities should be determined and in
cases were they are erratic, acquisition and use of backup systems should be assumed.
Disruption of utility service, particularly electricity and telephone, would facilitate unauthorized
access to a residence by an intruder.
270
C22.19.3.6. Fire Protection. Consider the availability and effectiveness of local fire
protection services in each neighborhood being investigated for potential residence. The
proximity of prospective residences to and the effectiveness of the fire protection services are a
major consideration in residential site selection. The availability of water or other substances to
fight a fire should be determined. The locations of fire hydrants or other water sources and
means by which they can be accessed and brought to the residence by its occupants before the
arrival of the local fire brigade should be considered.
C22.19.3.7. Physical Environment Considerations.
C22.19.3.8.2. Sufficient street width to allow two cars to pass, even if vehicles are
parked on both sides of the roadway.
C22.19.3.8.3. Sufficient neighborhood night lighting.
271
272
the event of an emergency and loss of communications, neighbors can often be relied upon to
provide assistance. At the very least, they can call the police if American occupants of
apartments cannot.
C22.20.3. The advantages of an apartment, however, are often offset by a variety of
disadvantages that should be considered when selecting a residence.
C22.20.3.1. Normally, apartments have a limited number of accesses. Most commonly,
there is a main entrance through a lobby that leads to a bank of elevators or an internal stairwell.
The lobbies, elevators, and stairwells many times are not secured and are areas where robberies
often occur. Secondary entrances are often found leading from parking areas that may be located
below ground level or to the rear of the apartment. Stairwells are often poorly lit and rarely
secured.
C22.20.3.2. Common areas such as laundry rooms, meeting rooms, storage rooms and
parking garages, which provide access to apartment areas, are usually not secured and could
provide access to criminals or terrorists.
C22.20.3.3. Because many families share the same building, strangers have access to the
building, and it is difficult to challenge their presence.
C22.20.3.4. Many newer apartments have been built of fire resistant materials reducing
the threat of fire. However, this has eliminated the need for fire escapes as well, and limiting
routes the occupant can take in the event of an emergency retreat from the apartment. On the
other hand, the presence of a fire escape provides an alternate means of access for the intruder.
273
274
C22.20.6.1. The apartment should possess a good solid door and the doorframe should
be well constructed. Most residential security hardware that is suitable for single-family
dwellings is also suitable for apartments. Most essential of these is a 190-degree optical viewer
and a strong secondary deadbolt lock. In the absence of a fire escape, there are a variety of
devices sold commercially that shall facilitate exiting an apartment from a window. The devices
include rope or chain ladders, and mechanical rope slings that provide a controlled descent to the
ground.
C22.20.6.2. Additional security measures employed in single-family residences
described below can be added to apartments as well if necessary.
275
rail, board-on-board, decorative wire mesh, decorative walls constructed of masonry or stone can
serve the same purpose.
C22.20.7.2. Ensure all perimeter barrier penetrations greater than 10 inches in diameter
are secured. The perimeter barrier should be designed and constructed such all barrier
penetrations in excess of 10 inches in diameter can be closed, locked, gated, or otherwise secured
against human penetration. The mechanisms used to secure such penetrations should be
comparable in their resistance to penetration as the perimeter barrier itself.
C22.20.7.3. Increase the resistance of doors, windows and exterior walls to penetration.
C22.20.8. Common Security Enhancements for Residences.
C22.21.2. Enhanced Protective Measures for HRP Residences. Consider the following:
276
277
CCTV
Monitor
SAFEHAVEN
Bedroom Bedroom
Bathroom
Bathroom
Bedroom Bedroom
Secondary Security
Wall
Living Room Area
278
C23. CHAPTER 23
BARRIERS
C23.1. INTRODUCTION
C23.1.1. Barriers are an integral part of all physical security systems. They are used at the
perimeter of DoD installations to perform several functions such as establishing boundaries and
deterring and intimidating individuals from attempting unlawful or unauthorized entry. Barriers
become platforms on which more sophisticated sensors can be placed to aid in threat detection
and classification. Some barriers at the perimeter of DoD installations help shield activities
within the installation from immediate, direct observation.
C23.1.2. Barriers are also used at the perimeter of DoD installations to facilitate pedestrian
and vehicle ingress and egress control. Barrier use channels traffic through designated access
control points, where pedestrians, vessels, and vehicles can be monitored and searched for
contraband, explosives, or other threats as circumstances warrant.
C23.1.3. Barriers are used within individual buildings on DoD installations for similar
purposes. In addition, use of high-security doors, window glazing, and walls can provide
building occupants with protection against ballistic penetrations, small arms fire, bomb
fragments, and broken glass.
C23.1.4. Table C23.T1. presents a list of both natural and manmade barriers of potential
interest to security program planners.
Isolate Activity or Discourage Mountains or hills, jungle, dense Walls, fences berms, canals, moats
Visitors growth, desert
Impede Pedestrian Passage Rivers, swamps, natural terrain Fences and walls with or without
features doors or gates
279
Impede Vehicle Passage Rivers, swamps, natural terrain Fences, walls, Jersey bounce
features barriers, specially designed vehicle
barriers, aircraft arresting cable
Prevent External Visual Forests, natural terrain features Berms, earthworks, walls, solid
Observation fences, masonry block screens,
translucent glass blocks,
polycarbonate sheets, shutters,
awnings, draperies
C23.2.1.3. Perimeter protection systems can assume a wide range of forms, in addition to
fences and walls. Waterways, forestations, ditches, berms, barricades, vehicle barriers (active
and passive), difficult approaches or exit routes, and lighting systems are often used effectively
in perimeter barrier systems. An IDS should be considered for the exterior perimeter to provide
the earliest possible notification and identification of an intrusion.
280
C23.2.2.2.4. Cause an intruder to make an overt action that shall demonstrate intent
to penetrate the protected area.
C23.2.2.2.5. Serve as a ballistic shield against small arms fire, deny visual
observation of activities being conducted within the enclosed area, and add an increased
deterrence to scaling.
281
C23.2.2.5.2. Walls should be built in a location such that vehicles cannot park
immediately adjacent to them, thereby affording potential intruders a platform from which to
mount an attack.
C23.2.2.5.3. Additional toppings on walls should be considered. These include
concertina wire, picket fences, multiple-strand razor or barbed wire, and other devices to inhibit
efforts to vault or go over the top of the wall.
C23.2.2.5.4. Bollards or other barricades can be used to establish permanent or
temporary barriers to control vehicle access while allowing pedestrian traffic to flow freely.
C23.2.2.6. Fences are frequently used to establish boundaries between a perimeter of an
installation and its surrounding area. Fences, particularly at military facilities, are typically
standard metal chain-link fences. Barbed wire and field fencing are often found at major
installations and overseas, as well as wood fences.
C23.2.2.7. Chain link or woven metal mesh fences can be used to establish an outer
perimeter. Chain link fences are excellent platforms on which to mount surveillance systems and
intrusion detection devices.
C23.2.2.8. Chain link or woven metal mesh fences can be stiffened and made somewhat
more resistant to penetration by vehicles through several techniques. Vertical support posts can
be installed at 4-foot intervals instead of 8- or 9-foot intervals; aircraft arresting cables can be
installed parallel to the ground at 6 inches and then 30 inches above the ground. These
techniques can increase the resistance to vehicle penetration offered by such fences, thereby
adding to the delay in penetration.
C23.2.2.9. Chain link fences can be topped with concertina wire, razor wire, or multiple
strands of barbed wire. Such toppings can be useful in adding to the psychological barrier effect
of a fence, but are not likely to increase substantially the amount of delay in penetration to the
facility.
C23.2.2.10. The use of picket fences, especially those made of metal, are discouraged
because fence components can become a significant hazard from flying debris. Their negative
blast characteristics may exceed their positive physical deterrence value.
282
property line. Unless hedges are thick and covered with thorns or pointed leaves, they can be
easily breached. Once breached, they can provide some degree of cover from exterior
observation. The main disadvantages of hedges are the time required to grow them to sufficient
size, especially if a portion dies, and their continuing requirement for periodic maintenance.
They are more suitable for residences than office buildings. However, hedges can be used in
either situation when appropriate.
C23.2.3.2. Portable Fencing.
C23.2.3.2.1. Portable fencing can be used as a temporary perimeter to establish
psychological barriers and to channel pedestrian and vehicle movement.
C23.2.3.2.2. Several portable fencing materials are available. Among the materials
available on the commercial market are the following.
C23.2.3.2.2.1. Plastic netting.
C23.2.3.2.2.2. Rolled wooden slat or support wire fencing (snow fencing).
283
C23.2.4.4. Under some circumstances, use of expedient perimeters can delay pedestrian
threats by changing the configuration of an approach to a building. Erecting “trip wire” barriers
in front of doors to be secured after hours or installing water-filled oil drums in a random pattern
along a vehicle or pedestrian approach to a building can disorient or impede an intruder who has
284
been unable to make last-moment observations on changes to the approaches to the targeted DoD
asset.
C23.2.4.5. Vehicles in all sizes and configurations can also be used as expedient barriers.
Parked bumper-to-bumper, vehicles provide an effective barrier to personnel engaged in routine
activity. Most people shall not attempt to vault a line of vehicles parked such that their bumpers
touch, nor shall they usually attempt to pass underneath such a line. Large construction-type
vehicles or armored vehicles can be very effective as supplemental barriers behind gates to
installations or facilities. Vehicles parked randomly on open, straight expanses of road, aircraft
taxiways, or runways can interfere with unauthorized use of those facilities.
C23.3. VEHICLE BARRIERS.
C23.3.1. Vehicle Barriers Systems. In recent years, all agencies and departments of the U.S.
Government have taken active measures to restrict the ability of explosive-carrying vehicles to
reach buildings housing Government personnel. The destruction of the Khobar Towers Complex
in Dhahran, Saudi Arabia, in 1996, as well as the bombing of the U.S. embassies in Nairobi,
Kenya, and Dar es Salaam, Tanzania, in 1998, effectively sensitized the Department of Defense
to the need for vehicle barriers to hold potential threats away from critical structures. The DOS is
responsible for the approval of vehicle barriers and maintains a database of approved barriers.
Vehicle barriers are available in several different systems the following are several types of
systems.
C23.3.1.1. Active Barrier Systems. Barrier systems are considered active if they require
action by personnel or equipment to permit entry. Systems that move solid masses, beams,
gates, tire shredders, and fences, and those that create pits or ramps, are active barriers. Vehicles
(trucks, bulldozers, etc.) are active barriers if used in that mode in the access control system.
C23.3.1.2. Passive Barrier Systems. Barrier systems are passive if their effectiveness
relies on their bulk or mass and they have no moving parts. Such systems typically rely on
weight to prevent entry into a restricted area. Sandbags, highway medians (Jersey barriers),
angled posts, tires, and guardrails are examples of passive barrier systems.
C23.3.1.3. Fixed Barrier Systems. Barrier systems are fixed if they are permanently
installed or if heavy equipment is required to move or dismantle the barriers. Hydraulically
operated rotation or retracting systems, pits, and concrete or steel barriers are examples. Fixed
barrier systems can be either active or passive.
285
C23.3.1.4. Movable Barrier Systems may be transferred from place to place. They may
require heavy equipment or personnel to assist in the transfer. Highway medians, sandbags
(large numbers), 55-gallon drums (filled), or vehicles are typical examples.
C23.3.1.5. Portable Barrier Systems are used as temporary barriers. A movable system
can be used, but may take more time, money, and effort than desired. Examples of portable
barriers are ropes, chains, cables, vehicles, or tire-puncture systems.
C23.3.1.6. Expedient Barrier Systems comprise one or more articles or vehicles normally
used for other purposes that have been pressed into use on a temporary or interim basis.
Examples of expedient barrier systems are the use of heavy earth-moving or engineering
equipment, armored personnel carriers, or tanks as perimeter gates or perimeter gate barriers.
C23.3.2. Vehicle Barrier Design Considerations.
286
manufacturer? Once installed, vehicle barriers should be well-marked and pedestrian traffic
channeled away from unsafe areas.
C23.3.2.4. Reliability. Many vehicle barrier systems have not been in production long
enough to have developed a reliability history. Some systems are placed in environments not
envisioned by the manufacturer, while others have developed problems not anticipated by either
the manufacturer or the user. Many manufacturers indicate a remarkable willingness to resolve
problems and work effectively with users. Backup generators or manual operating provisions are
available. Spare parts and supplies also should be maintained on hand to facilitate rapid return of
the barriers to full operation.
C23.3.2.5. Maintainability. Many manufacturers provide aesthetics, diagrams,
maintenance schedules, and procedures for their systems. They should also have spare parts
available to keep barriers in nearly continuous operation. Manufacturers should be asked for
maintainability requirements in the form of training, operation, and maintenance manuals. If
these requirements are not available, the agency that purchases the vehicle barrier must develop
maintenance instructions for the user. In addition, for periods of vehicle barrier maintenance, the
user should consider providing alternate traffic routes.
C23.3.2.6. Cost. Traffic in restricted or sensitive areas should be minimized and the
number of entryways limited. Reducing traffic flow and the number of entryways may provide
increased security and lowered costs for the vehicle barrier system. Installation costs, that may
be excessive and the cost of operating the system should be addressed during the barrier
selection process. Complexity and lack of standardized components can incur higher costs for
maintenance and create long, costly downtime periods. Reliability, availability, and
maintainability data on the system also affect costs.
C23.3.2.7. Active Barrier Operations. A barrier is active if it requires action by personnel
or equipment to operate. It should allow for continuous operation with minimal maintenance and
downtime, so that it may be employed during normal and emergency conditions. Emergency
procedures must be available to operate the barrier in case of system breakdown or power failure.
Selection of a normally open or closed option should be evaluated in light of experienced or
expected traffic. Evaluate system failure modes to ensure that the barrier fails in either the open
or closed position, as dictated by security and operation considerations. Barrier employment
criteria should be linked to use of force and/or rules of engagement training for security
personnel.
287
C23.3.2.8. Clear Zones. Barriers installed in clear zones must be designed so that they
shall not provide terrorists with a protective hiding place or shield.
C23.3.2.9. Operating Environment. The environment of the facility must be considered
when selecting vehicle barrier or barrier options. Hinges, hydraulics, or surfaces with critical
tolerances may require heaters to resist freezing temperatures and ice buildup, or they may
require protection from dirt and debris. If options that protect against environmental conditions
are not available, the system may become inoperative.
288
C23.3.3.3. Avoid expending large amounts of funding for soft protection of the
installation perimeter. It is generally more cost-effective to provide heavy protection of
individual buildings or zones within the perimeter.
C23.3.3.4. Avoid providing perimeter vehicle barriers that are not patrolled or frequently
observed. Most types can be overcome quickly with simple tools or ramps.
C23.3.3.5. Avoid placing guard posts next to barriers.
C23.3.3.6. If separate barriers are used for exits and entrances, avoid controlling only the
entrance while leaving the exit barrier open. Require positive control for the exit also.
C23.3.3.7. Avoid a long, straightaway road to a crash-resistant barrier system. Where
this cannot be avoided, provide a passive-type barrier maze to slow traffic prior to arrival at the
vehicle barrier. Figure C23.F1. illustrates a moving vehicle, serpentine barrier system used to
slow vehicle speed.
289
• “S” curves
• 90 degree bends
• Traffic circles
• Speed bumps
• Serpentines
Ref: TM 5-853-2
44
As previously discussed, vehicle barriers should be placed outside the installation perimeter or
outside an installation interior perimeter. The following discussion addresses vehicle access to
an installation or facility once the vehicle is past the vehicle barriers described above.
C23.4.1. Installation Vehicle Access Control Measures.
290
Where possible, a tertiary gate can be planned for contingencies. Depending on the size and
nature of the facility, a gate for emergency vehicular and pedestrian egress should be installed
outside the perimeter to increase the setback of the buildings. In either case, design and
placement of bollards or other anti-vehicular devices should be considered in the early planning
stages.
C23.4.1.2. Protect all vehicle access points against reverse entry and ramming attacks.
All entry-exit points should be secured with a heavy-duty sliding steel, iron, or heavily braced
chain-link gate equipped with a heavy locking device. Approaches to all vehicle exit points
should be aligned such that high-speed approach from outside the perimeter is not possible. The
goal of such realignment is to ensure to the maximum degree possible that intruders cannot
simply enter the facility by going against the flow of exiting vehicle traffic. Passive vehicle
barriers described above can be incorporated into the road and pedestrian access designs to
accomplish this goal.
C23.4.1.3. All entry-exit points should be constructed with protection against a ramming
vehicle attack. Passive vehicle barriers described above can be incorporated in ingress-egress
designs to make ramming attacks difficult. Vehicle perimeter penetration gates can also be
designed to be highly resistant to ramming attack. Additional vehicle barriers can be installed
behind the gates to provide defense in depth against such attack.
C23.4.1.4. All gates not in use and under direct supervision should be locked; it should
be verified that only security personnel could operate the locks. Emergency gates should be
securely locked and randomly checked during each shift. Security personnel should physically
lock and re-lock all gates or other penetrations secured with locks to verify that the locks in use
belong to the security department and not some other activity on the installation or would-be
intruders. Any lock found inoperable by the security personnel should be removed immediately
and a security department lock substituted in its place. Control over keys is essential.
C23.4.1.5. Storage lanes, protected guard positions, and hard points for security guard
booths should be included on plans for revised vehicle access to permit multiple vehicle
inspections for explosives, weapons, or contraband outside the installation perimeter.
C23.4.1.5.1. Some of the measures implemented at DoD facilities in response to
terrorist threat may result in significant traffic congestion at vehicle entry gates. Such congestion
can be reduced if storage lanes can be included in installation access alignments. During periods
of rigorous vehicle inspection, security personnel can inspect vehicles and their occupants in
291
groups. Vehicles waiting their turn for inspection can be held in storage lanes adjacent to the
installation. This approach to vehicle inspection and installation access shall ease traffic
congestion for those not seeking access to the DoD installation. It shall also place vehicles and
their operators waiting inspection in an area where they can be monitored for indications of
potentially threatening behavior.
C23.4.1.5.2. Be sure that vehicle barriers, storage lanes, security booth tie down
points, and protected positions for backup security forces are considered as an integrated security
package. Doing so shall ensure that vehicle barriers do not obstruct fields of vision or fields of
fire for the backup security forces responsible for protecting guards conducting vehicle
inspections.
C23.4.2. Vehicle Access Control Systems.
C23.4.2.1. Primary entrances to a facility should have a booth for security personnel
during peak traffic periods and automated systems for remote operations during other periods. A
vehicle search bay exterior to the access control gate and configured to inhibit damage from
explosive laden vehicles is optimal.
C23.4.2.2. The following capabilities are recommended for vehicle access control
systems.
C23.4.2.2.1. Electrically operated gates to be activated by security personnel at either
the booth or security control center or by a badge reader located in a convenient place for a
driver.
C23.4.2.2.2. CCTV with the capability of displaying the full-facial features of a
driver and vehicle characteristics on a monitor at the security control center.
C23.4.2.2.3. An intercom system located in a convenient place for a driver to
communicate with the gatehouse and security control center.
C23.4.2.2.4. Bollards or other elements to protect the security booth and gates
against a car crash.
C23.4.2.2.5. Sensors to activate the gate, to detect vehicles approaching and
departing the gate, to activate a CCTV monitor displaying the gate, and to sound an audio alert in
the security control center.
C23.4.2.2.6. Lighting to illuminate the gate area and approaches to a higher level
than surrounding areas.
292
293
C23.5.3. Windows. Windows of various sizes and configurations are required in the walls
of most structures for the passage of light, ventilation, and observation. Windows are always
significant weak points in an individual facility protection system because of their low
penetration resistance. Further, window glazing represents significant flying debris hazards
from an explosive blast. Special precautions should be taken to harden windows from both
penetration and blast.
C23.5.4. Utility Access. A careful inspection of the structure’s exterior must be made to
locate any utility openings. In conventional building designs, utility openings, manholes,
tunnels, air-conditioning ducts, filters, or equipment access panels can provide a vulnerable
entrance route with no significant delay. If such openings cannot be eliminated, their delay times
must be increased. Security screens or grates can be installed over utility access openings. The
294
techniques described to secure a window or skylight using bars, grates, or mesh can be used to
restrict access to a structure via utility penetrations.
C23.5.5. Duress Alarms. Duress alarms are devices that can be activated manually in the
event of an unauthorized penetration attempt. An audible alarm can be sounded locally in an
attempt to frighten off the intruder. A silent alarm can also be sent to the organization’s security
center or other location where the alarm would summon immediate assistance. Duress alarms
can be placed in inconspicuous locations and can even be disguised as common office objects or
home decorations. Duress alarms can also be incorporated into home or office furnishings.
C23.5.6. Communication Systems. Telephones are needed at all times, and secure means of
communication are essential between a secured area and its dedicated response force.
Telephones in many parts of the world are unavailable, unreliable, and, as in many CONUS
locations, exposed and vulnerable to terrorist attacks. The security planner often has little
knowledge and no control over where or how the telephone lines are routed or whether they are
even minimally secured. Telephone systems required for security and safety of executive
personnel must use secure dedicated lines. Where this is not possible, a secure radio
communication link must be established. Portable, handheld radios can assure backup
communication when other communication links are severed.
C23.5.7. IDS
As discussed earlier in this Chapter, incorporation of IDS into the overall physical security
system shall help to mitigate the vulnerabilities identified above.
C23.6. INTERIOR BARRIERS.
C23.6.1. Barriers may be used within the interior of facilities to accomplish the same
functions as are performed by an installation's access barriers. Interior barriers establish
boundaries or lines of demarcation of different activities (and differing levels of security) within
a facility. They deter and intimidate individuals from attempting unauthorized entry. As in the
case of installation-level barriers, they are platforms on which intrusion detection sensors or
surveillance systems can be mounted. Barriers may be used within a facility to channel
pedestrian and service vehicle traffic.
C23.6.2. Barriers are used within individual buildings on DoD installations for similar
purposes. In addition, use of high-security doors, window glazing, and walls can provide
building occupants with protection against ballistic penetrations such as small-arms fire, bomb
fragments, and broken glass.
295
296
engineering organizations or DTRA should be held before embarking on any detailed physical
security construction to ensure that the materials and techniques selected shall in fact meet the
stated security requirement.
Barrier Function
5. 3/4” drywall, full height, studs P/T P/T P/T P/T P/T
16” apart
297
Barrier Function
P = permanent construction
T = temporary construction
A minus sign after the letter means that the material and construction techniques used in erecting a barrier for this
purpose may not provide satisfactory security enhancements or may not be especially durable. Use of glass, acrylic, or
polycarbonate materials to provide a visual screen requires use of translucent variants of these.
Powered vehicles used within buildings can do significant damage to all perimeter or interior barriers, especially at
corners and corridor intersections.
298
Barrier Function
1. Plastic sheeting • • •
3. Plywood sheets • • • • •
4. Acrylic panels • • • •
5. Polycarbonate panels
6. Safety tape • •
7. Rope • •
8. Chains • • •
15. Sandbags • • •
C23.6.4.4. New materials for increasing the penetration resistance of walls, structures,
and glazing have been entering the market regularly in recent years. The materials included in
this section are only examples; the state of the art is evolving rapidly. The security engineering
branches of Service’s civil engineering organizations and DNA have expertise available on
299
request. Consultations with these experts shall ensure selection of optimum materials to meet
requirements for security, economy, and efficient construction.
C23.7. INSPECTION AND MAINTENANCE OF BARRIERS AND SECURITY SYSTEM
COMPONENTS
C23.7.1. Barriers should be checked at least weekly for defects that would facilitate
unauthorized entry, and report such defects to supervisory personnel. Inspections should look
for the following maintenance problems that can have adverse implications for security.
C23.7.1.1. Damaged areas (cuts in fabric, broken posts).
C23.7.1.2. Deterioration (corrosion).
C23.7.1.3. Erosion of soil beneath the barrier.
C23.7.1.5. Growth in the clear zones that would afford cover for possible intruders.
C23.7.1.6. Obstructions that would afford concealment or aid entry or exit for an
intruder.
C23.7.1.7. Evidence of illegal or improper intrusion or attempted intrusion.
300
C24. CHAPTER 24
MILITARY CONSTRUCTION
C24.1. INTRODUCTION.
C24.1.1. The events of September 11, 2001
serve as a harsh reminder that terrorist attacks can Figure C24.F1. Understanding the
Range of Threat Possibilities.
impact anyone, at any time, at any location, and
may take many forms. An understanding of the
range of threat possibilities; especially type of
aggressor, tactics, and associated weapons, tools, or
explosives; is essential to design appropriate
protective measures. For many reasons, DoD
personnel are at increasing risk of harm from
terrorism. While terrorists have many options
available to them, they frequently use explosive
devices when they target large numbers of DoD
personnel.
Many buildings DoD personnel utilize daily are inadequate to protect against such attacks. In
order to mitigate this risk, DoD decision-makers can no longer continue to invest scarce
resources in inadequate buildings that DoD personnel occupy, regardless of the threat
environment. With an AT mindset, DoD personnel can determine appropriate measures for
every aspect of daily operations, especially installation and building planning.
C24.2.1. General. Security relates to specific measures taken by the DoD Components,
activities, or installations to protect themselves against all acts designed to impair its
effectiveness. Whether security protective measures are to be employed before, during and/or
after a terrorist incident, each one must be identified, resourced, and put in place prior to an
301
incident. Specific security measures provide wide-ranging capabilities such as deter, detect,
assess, communicate, deny/delay, defend, mitigate, respond, and restore. Sample active and
passive security measures may utilize security forces, military working dogs, barriers,
surveillance, IDS, lighting, badges, and security locking systems.
C24.2.2. Physical Security. Physical security focuses on physical measures and procedures
designed to safeguard assets from likely aggressors. Assets generally describe land/geography,
buildings, modes of transport (ground, air, and sea), personnel, and smaller objects (packages,
suitcases, equipment, etc.). Key physical security tasks DoD personnel can perform to reduce or
mitigate potential harm caused by aggressors include assess (ability to identify friend/foe as far
away as possible), control access (keep foe from harming assets and facilitate friendly access),
move assets (disperse/centralize/combination to enhance survivability), and provide protection
(personal protective equipment, hardened buildings/vehicles, weapons and forces). For example,
access control involves key operational concepts including defense in depth, as shown in figure
C24.F2 desired degree of control, inspection/search procedures, enforcement, restricted area
identification and RAM. Figure C24.F2. Defense in depth.
1. Troop Concentrations
2. Troop and Civilian Concentrations
3. Civilian Concentrations
4. Mission Essential Locations
5. Mission Essential Locations
302
303
C24.2.4.1. Planning Teams. Effective planning teams possess the following qualities:
C24.2.4.1.1. Obtain the Right Information. Know how and where to obtain the right
information to facilitate planning.
C24.2.4.1.2. Involve Others. Ensure the right people are involved in the planning
process and clarify all roles and responsibilities.
C24.2.4.1.3. Focus Time and Energy. Focus the planning effort and related
activities. Identifies key strategies, assumptions and information needs while identifying
existing and emerging requirements.
C24.2.4.1.4. Formalize Decisions. Facilitate the development and execution of
supporting operational plans, procedures and reports. Trains and exercises all aspects of the
plan.
C24.2.4.1.5. Obtain Support. Identify, obtain and sustain necessary resources.
C24.2.4.1.6. Coordinate, Integrate, and Synchronize all Related Efforts. Leverage
ongoing efforts to optimize effectiveness and efficiency.
304
305
door designs must treat glazing, frames, connections, and the structural components to which
they are attached as an integrated system. Laminated glass and other glass technology
advancements can be designed to reduce flying glass injuries. Hazardous fragments may also
include secondary debris such as those from concrete barriers and site furnishings.
C24.2.5.4. Provide Effective Building Layout (Architectural Design). Effective design
of building layout and orientation can significantly reduce opportunities for terrorists to target
building occupants or injure large numbers of people in the event of an attack.
C24.2.5.5. Limit Airborne Contamination (Electrical and Mechanical Design). Effective
design of heating, ventilation, and air conditioning systems can significantly reduce the potential
for chemical, biological, and radiological agents being distributed throughout buildings should
they be used. Only a fully functioning collective-protection shelter can provide total protection.
Systems should be turned off to reduce or eliminate contaminants from spreading if detected.
C24.2.5.6. Provide Mass Notification (General Design). Providing a timely means to
notify building occupants of threats and what should be done in response to those threats reduces
the risk of mass casualties. This strategy can be implemented using fairly low-tech, well-
practiced procedures. However, in practice this strategy is extremely difficult for most
installations and buildings to achieve.
C24.2.5.7. Facilitate Future Upgrades (General Design). Many of the provisions of these
standards facilitate opportunities to upgrade building protective measures in the future if the
threat environment changes.
C24.2.6. Assumptions. All plans are based on key assumptions that must be identified,
made explicit, and understood if the personnel required to execute them are to recognize when
the changing threat environment or realities at a particular location differ. Emerging information
that challenges the baseline assumptions upon which protective measures are based must be
reviewed to ensure updated information is appropriately addressed. Several general assumption
categories are listed below:
C24.2.6.1. Threat. As shown in figure C24.F1. the likely type of aggressor, tactics, and
associated weapons (direct and indirect fire), tools, or explosives must be known and updated as
necessary. Terrorist activities may cross the entire spectrum of aggressors, tactics and weapons,
that security engineering routinely considers.
306
307
appropriate standoff, DoD personnel shall be highly vulnerable to terrorist attack. Further
definitions of DoD building categories can be found in reference (aw).
C24.2.6.5. Adequate Standoff Distances. The ability to maintain an adequate distance
between a potential location for an explosive detonation and the closest point on the exterior of
any inhabited building is a key measure designed to safeguard personnel inside the buildings
from terrorist attacks. Specific minimum standoff distances were developed to provide
survivable structures for a wide range of conventional buildings and expeditionary/temporary
structures. These buildings range from tents and wood framed buildings to reinforced concrete
buildings. Reference (aw) illustrates specific AT construction standard standoff requirements
within a controlled perimeter, in the absence of a controlled perimeter, and for expeditionary and
temporary structures. UFC 4-010-02 (reference (ax)) contains minimum standoff distances.
C24.2.7. Policies and Procedures. Policies and procedures are a critical adjunct to any
construction standard. Unless indicated otherwise, it is usually assumed that there are means to
control access to controlled perimeters, underground parking, and other locations where vehicle
access should to be limited. It may be further assumed that unusual packages or containers or
improperly parked vehicles shall be recognized as potential terrorist threats and appropriate
reactive measures shall be implemented to reduce the potential for casualties. Finally, it may be
assumed that policies and procedures shall be developed to support these and other related issues
and that those policies and procedures shall be incorporated into antiterrorism plans, training,
and exercises.
C24.2.8. Training. Although key to success, it may not be safe to assume that key security
and facility personnel shall receive training in security engineering, antiterrorism, and related
areas. There are many sources for training, such as the Security Engineering Working Group
website, www.sewg.nwo.usace.army.mil, or this Handbook. Several assumptions related to
training include: that all DoD personnel have been trained in basic antiterrorism awareness in
according to reference (e), that they are able to recognize potential threats, and that they know
the proper courses of action should they detect a potential threat.
C24.2.9. Design Codes. While it is not easy to deconflict every requirement that exists, a
key assumption is that any provision in DoD or local AT construction standards shall be
coordinated with all other applicable building and design codes and Federal building policies.
Nothing in those standards should be interpreted to supercede the provisions of any other
applicable building or design code. Where other codes mandate more stringent requirements it is
assumed that the provisions of those codes shall be followed. Depending on the age, existing
308
buildings do not likely meet all current design codes, but must do so when being renovated.
Design code standards work in tandem with force protection standards to greatly enhance
protection of building occupants.
C24.2.10. DoD AT Construction Standard Development. Refer to reference (aw), for
detailed information. Also, refer to Combatant Commander, Service and local command
guidance for unique, site-specific standards.
C24.2.11. Intent. DoD Minimum AT Building Standards were developed to identify
appropriate and enforceable measures that would minimize the possibility of mass casualties
resulting from possible terrorist attacks targeting buildings or portions of buildings owned,
leased, privatized, or otherwise occupied, managed, or controlled by or for the Department of
Defense. These standards provide a baseline level of protection in buildings much like a sturdier
car frame and safety glass enhances protection in a moving car, and are generally least costly to
incorporate before construction. While complete protection against all potential threats for every
inhabited building and occupant may be cost prohibitive, a level of protection can be provided
for all DoD personnel at a reasonable cost.
C24.2.12. Execution. The intent of these standards can be achieved through prudent, master
planning, real estate acquisition, and refined construction practices. The master planning
implications of these standards are not intended to be resolved overnight. They should be
considered to be a blueprint for facilities and installations that shall be implemented over decades
as those facilities and installations evolve. With adequate standoff, it is generally possible to
utilize conventional building construction, supplemented with other minimum requirements
(such as laminated glass). Where site specific issues and constraints or mitigation requires
protective measures required beyond the DoD standards, those standards shall be incorporated
according to their implementing directives, but not to the exclusion of the DoD standards. While
many standard provisions facilitate opportunities to upgrade building protective measures in a
higher threat environment, they must be in place prior to the initiation of a terrorist attack. These
standards assume no specified terrorist threat, but provide limited protection against all threats.
C24.2.13. Specific Construction Protective Measures. While there are many ways to
organize the variety of possible construction protective measures available to specific
installations, one way to do so generally aligns with the seven previously discussed construction
design strategies. The specific measures and other construction considerations described in
Appendix 17 generally fall within the four groupings of site planning, structural design,
architectural design, and electrical and mechanical design. Other construction terms such as
309
landscape design, parking security, interior design, fire protection engineering, and electronic
security are generally addressed within these same four groupings. Also refer to Appendix 18, to
highlight specific structural and infrastructure engineer considerations and questions to help
direct installation leaders to implement options or actions.
310
AP1. APPENDIX 1
AT CHECKLIST FOR
COMMANDERS AND AT OFFICERS
AP1.1. INTRODUCTION
Protection of DoD assets is an inherent obligation of management and military commanders.
The following checklist is a self-assessment, management tool that can be used by the
commanders, agency manager, and/or unit AT Officer to assess the status of his/her AT program.
This checklist is structured around the AT Standards outlined in reference (e). Not all the
standards are applicable to all levels of command; therefore, Combatant Commander and Service
AT guidance should be used where applicable.
AP1.1.1. Questions for commanders/managers to evaluate AT program adequacy:
311
312
313
314
315
14 Comprehensive AT plan
Does the command have a signed AT Plan?
Is the plan site-specific and address the following key elements?
• Terrorism Threat Assessment (including WMD).
• Vulnerability Assessment (see Standard 26).
• Risk Assessment
• AT Physical Security measures.
• Terrorism Incident Response measures.
• Terrorism Consequence Management measures.
• Does the installation incorporate AT planning into operations orders for temporary operations or
exercises?
15 Terrorism Threat Assessment
Does the command have an annually updated terrorism threat assessment?
Does the threat assessment consider the following during the assessment process:
• Capabilities of the terrorist threat.
• Vulnerability of the facilities.
• Criticality of the facilities.
Is the threat assessment used as the basis and justification for recommendations on AT
enhancements, program/budget requests and establishment of FPCONs?
Does the command use a risk assessment to integrate threat and vulnerability assessment information
in order to make an informed decision to commit resources and/or enact policies and procedures to
mitigate the threat or define the risk?
Does the risk assessment analyze the following elements?
• Terrorist Threat.
• Criticality of the Assets.
• Vulnerability of facilities, programs, and systems to terrorist threats.
• The ability to conduct activities to deter terrorist incidents, employ countermeasures, mitigate the
effects of a terrorist incident, and recover from a terrorist incident.
316
317
318
319
AP2. APPENDIX 2
SUGGESTED VA METHODOLOGIES
AP2.1. INTRODUCTION
Facility Commanders are encouraged to use a RA tool that is simple yet has some quantifiable
logic to help in decision making. Assessment teams shall use the methodology to determine
terrorist options against specific targets and use them as examples of protection strategies
discussed in this Handbook. The suggested tools offered below have their strengths and their
weaknesses -- as with all tools, there is a right tool for the job at hand. As an example,
CARVER is not specifically tailored for AT assessments, although it can be used. Likewise,
MSHARPP is a targeting analysis tool geared more closely to assessing personnel
vulnerabilities. Assessment team members should be cognizant of potential gaps when choosing
one methodology over another. The use of the Joint Staff CVAMP shall assist commanders and
ATOs in managing their command’s vulnerabilities and associated funding requirements.
AP2.2. MSHARPP.
AP2.2.1. The purpose of the MSHARPP matrix is to analyze likely terrorist targets.
Consideration is given to the local threat, likely means of attack available to the enemy, and
variables affecting the disposition (e.g., “attractiveness” to enemy, potential psychological effect
on community, etc.) of potential targets. This document provides an example of how to use
MSHARPP.
AP2.2.2. After developing a list of potential targets, use the MSHARPP selection factors to
assist in further refining your assessment by associating a weapon/tactic to a potential target to
determine the efficiency, effectiveness and plausibility of the method of attack and to identify
vulnerabilities related to the target. After the MSHARPP values for each target or component
are assigned, the sum of the values indicate the highest value target (for a particular mode of
attack) within the limits of the enemy’s known capabilities.
AP2.2.3. Mission. Mission focuses mainly on the threat to the situations, activities,
capabilities, and resources on an installation that are vulnerable to a terrorist attack. The mission
components consist of the equipment, information, facilities, and/or operations or activities that
are necessary to accomplish the installation’s mission.
AP2.2.3.1. When assessing points in this area, determine whether or not an attack on
mission components shall cause degradation by assessing the Component’s:
320
AP2.2.3.2.1. ONE. Destroying or disrupting this asset would have no effect on the
ability of the installation to accomplish its mission.
AP2.2.3.2.2. TWO. The installation could continue to carry out its mission if this
asset were attacked, albeit with some degradation in effectiveness.
AP2.2.3.2.3. THREE. Half of the mission capability remains if the asset were
successfully attacked.
AP2.2.3.2.4. FOUR. Ability to carry out a primary mission of the installation would
be significantly impaired if this asset were successfully attacked.
AP2.2.3.2.5. FIVE. Installation cannot continue to carry out its mission until the
attacked asset is restored.
AP2.2.4. Symbolism. Consider whether the target represents, or is perceived by the enemy
to represent, a symbol of a targeted group (e.g., symbolic of U.S. military, Christianity,
government, authority, etc.). Assess points in this area based upon the symbolic value of the
target to the enemy.
AP2.2.4.1. Symbolism criteria scale.
AP2.2.4.1.1. High profile, direct symbol of target group or ideology, asset is
perceived to be vital to the mission of the installation.
AP2.2.4.1.2. Low profile, direct symbol of target group or ideology.
AP2.2.4.1.3. Low profile and/or obscure symbol of target group or ideology.
321
AP2.2.5. History. Do terrorist groups have a history of attacking this type of target? While
you must consider terrorist trends worldwide, focus on local targeting history and capabilities.
AP2.2.5.1. Symbolism criteria scale.
AP2.2.6. Accessibility. A target is accessible when an operational element can reach the
target with sufficient personnel and equipment to accomplish its mission. A target can be
accessible even if it requires the assistance of knowledgeable insiders. This assessment entails
identifying and studying critical paths that the operational element must take to achieve its
objectives, and measuring those things that aid or impede access. The enemy must not only be
able to reach the target but must also remain there for an extended period.
AP2.2.6.1. The four basic stages to consider, when assessing accessibility are:
AP2.2.6.1.1. Infiltration from the staging base to the target area.
AP2.2.6.1.2. Movement from the point of entry to the target or objective.
322
323
AP2.2.8.3.2. Relatively large numbers of people, but not in close proximity (i.e.,
spread out and hard to reach in a single attack), contains known target group, but rarely in large
concentrations, population has no special segment necessary for mission accomplishment.
AP2.2.8.3.3. Sparsely populated; prone to having small groups or individuals, little
target value based on demographics of occupants
AP2.2.9. Proximity. Is the potential target located near other personnel, facilities, or
resources that, because of their intrinsic value or “protected” status and a fear of collateral
damage, afford it some form of protection? (e.g., near national monuments, protected/religious
symbols, etc., that the enemy holds in high regard).
AP2.2.9.1. It is important to consider whether the target is in close proximity to other
likely targets. Just as the risk of unwanted collateral damage may decrease the chances of attack;
a “target-rich” environment may increase the chances of attack.
AP2.2.9.2. Proximity criteria scale.
AP2.2.9.2.1. Target is isolated; no chance of unwanted collateral damage to
protected symbols or personnel.
AP2.2.9.2.2. Target is in close enough proximity to place protected personnel,
facilities, etc., at risk of injury or damage, but not destruction.
AP2.2.9.2.3. Target is in close proximity; serious injury/ damage or death/total
destruction of protected personnel/facilities likely.
324
AP2.3. CARVER.
AP2.3.1. The CARVER matrix is used by Special Forces and commandos to target enemy
infrastructure including public works facilities such as bridges and power plants. It is believed
that our enemies – overt and covert – employ a similar method to target our facilities. They all,
though, seek soft, unprotected targets.
AP2.3.2. CARVER is a very useful tool for determining that your critical assets might
indeed offer an enemy a good or soft target. If you employ the very same CARVER analysis to
every asset, it shall yield a good estimate as to the attractiveness of those assets to an enemy.
Specifically Commanders shall then know which "targets" require hardening or otherwise
increased protection.
AP2.3.3. CARVER is an acronym, with each letter representing the following:
AP2.3.3.1. Criticality. The importance of a system, subsystem, complex, or component.
A target is critical when its destruction or damage has a significant impact on the output of the
targeted system, subsystem, or complex, and at the highest level, on the unit's ability to make
war or perform essential functions. Criticality depends on several factors:
AP2.3.3.1.1. How rapidly shall the impact of asset destruction affect the unit's
essential functions.
AP2.3.3.1.2. What percentage of output and essential functions is curtailed by asset
damage.
AP2.3.3.1.3. Is there an existence of substitutes for the output product or service
325
AP2.3.3.1.4. What is the number of assets and their position in the system or
complex flow diagram
AP2.3.3.1.5. Criticality asks the question: How critical is the facility to your mission
accomplishment?
AP2.3.3.2. Accessibility. The ease that an asset can be reached, either physically or by
standoff weapons. An asset is accessible when a terrorist element can physically infiltrate the
asset, or the asset can be hit by direct or indirect fire. As a reminder, assets can be people,
places, or things. The use of standoff weapons should always be considered when evaluating
accessibility. Survivability of the attacker is usually most related to a target’s accessibility.
Accessibility asks the question: How easily can an enemy get access to, or have their weapons
reach the asset?
AP2.3.3.3. Recuperability. A measure of time required to replace, repair or bypass, the
destruction or damage inflicted on the target. Recuperability varies with the sources and ages of
targeted components and with the availability of spare parts. The existence of economic
embargoes and the technical resources of the installation shall influence recuperability.
Recuperability asks the question: How long would it take you to repair or replace the asset?
AP2.3.3.4. Vulnerability. A measure of the ability of the terrorist to damage the target
using available assets (people and material). A target (asset) is vulnerable if the terrorist has the
means and expertise to successfully attack it. Vulnerability depends on:
326
asks the question: What is the effect on the local population, be it terror or demoralization, and
associated mission degradation?
AP2.3.3.6. Recognizability. The degree that a target can be recognized under varying
weather, light, and seasonal conditions without confusion with other targets or components.
AP2.3.3.6.1. Factors that influence recognizability include the size and complexity of
the target, the existence of distinctive target signatures, and the technical sophistication and
training of the terrorists.
AP2.3.3.6.2. Recognizability asks the question: Can the enemy recognize the target
for what it truly is and its importance?
AP2.3.4. Target selection requires detailed intelligence and thorough planning, and is based
on the CARVER factors identified above. The CARVER Matrix, as shown in Table AP2.T1, is
a decision tool for rating the relative desirability of potential targets and for wisely allocating
attack resources. Two rules of thumb apply for completing the matrix:
AP2.3.4.1. For strategic level analysis, list systems and subsystems.
AP2.3.4.2. For tactical level analysis list complexes or components of subsystems and
complexes. Keep in mind that the scale can be adjusted, such as one to ten or 10 to 100,
provided that consistency is observed.
Potential
C A R V E R TOTAL
Targets
Commissary 5 7 10 7 8 10 47
327
Criticality: Rating
Output halt in over one week and less than 25% curtailment 1
Accessibility:
Recuperability:
1 month or more 10
Up to 1 month 8
Up to 1 week 6
Up to 1 day 4
4 hours or less
328
To charges of 10 to 30 pounds 5
To charges of 30 to 50 pounds 3
No effect, or neutral 5
Very negative public reaction, reprisals against friendlies likely, or high domestic uprising
1
potential.
Note: On the tactical level, effect on population is often neutral. That is, the effect is the same
for all components within a complex. There are conspicuous exceptions, such as reactor
components in nuclear sites. If all components within a complex are neutral, the entire "E"
column can be removed from the matrix.
Recognizability:
The complex or component is recognizable day or night, rain or shine, without confusion with
10
other complexes or components.
The complex or component may be difficult to recognize at night or in bad weather or might be
5
confused with other complexes and components.
The complex or component is difficult to recognize under any condition and is easily confused
1
with other complexes and components.
329
AP2.3.6. The following are basic mitigation tips to address four of the six CARVER
Components.
AP2.3.6.2. Reduce accessibility. Reduce access both, physical and cyber, as applicable;
use barriers, other barricades, carefully controlled pedestrian and vehicle movement and/or
access and parking; and use fences, remote motion sensors, and remote video surveillance.
AP2.3.6.4. Reduce recognizability. Delete location and purpose of facility from all base
maps and remove building signs that describe function or give title of unit in facility. Instruct
telephone operators to not give out number or existence of facility. Use plant cover, including
trees and bushes, to partially conceal facility, particularly from roads.
AP2.3.2.1. Commander. Capability to read and/or write with comment and retains sole
release authority to higher headquarters on all vulnerability assessments, vulnerabilities, and
funding requests.
AP2.3.2.3. Resource Manager. Capability to read and/or write to all funding requests.
331
AP2.3.2.6. Users should contact their local/and or next higher headquarters CVAMP
administrators to establish their roles within CVAMP.
332
AP3. APPENDIX 3
DoD FPCON SYSTEM
AP3.1.1.2.1. Airfield specific measures are for installations and facilities with a
permanently functioning airfield. Installations and facilities with an emergency helicopter pad
should review and implement any applicable airfield specific measures when they anticipate air
operations.
AP3.1.1.2.2. Due to their specific security requirements, DoD ship’s measures are
listed separately in section AP3.2. Those measures applying solely to USN combatant ships are
further identified throughout the paragraph. Shipboard guidelines are specially tailored to assist
commanding officers and ship masters in reducing the effect of terrorist and other security
threats to DoD combatant and non-combatant vessels, to include U.S. Army and Military Sealift
ships worldwide. They provide direction to maximize security for the ship based on current
threat conditions consistent with performance of assigned missions and routine functions.
333
AP3.1.2.1. Measure NORMAL 1. Secure and randomly inspect buildings, rooms, and
storage areas not in regular use.
AP3.1.2.2. Measure NORMAL 2. Conduct random security spot checks of vehicles and
persons entering facilities under the jurisdiction of the United States.
AP3.1.2.3. Measure NORMAL 3. Limit access points for vehicles and personnel
commensurate with a reasonable flow of traffic.
AP3.1.3. FPCON ALPHA Measures.
AP3.1.3.1. Measure ALPHA 1. Continue, or introduce, all measures in previous
FPCON.
AP3.1.3.2. Measure ALPHA 2. At regular intervals, inform personnel and family
members of the general situation. Ensure personnel arriving for duty are briefed on the threat.
Also, remind them to be alert for and report suspicious activities, such as the presence of
unfamiliar personnel and vehicles, suspicious parcels, and possible surveillance attempts.
AP3.1.3.3. Measure ALPHA 3. The duty officer or personnel with access to building
plans as well as the plans for area evacuations must be available at all times. Plans should be in
place to execute access control procedures. Key personnel required to implement security plans
should be on-call and readily available.
334
AP3.1.3.4. Measure ALPHA 4. Increase security spot checks of vehicles and persons
entering installations under the jurisdiction of the United States.
AP3.1.3.5. Measure ALPHA 5. Initiate food and water Operational Risk Management
(ORM) procedures, brief personnel on food and water security procedures, and report any
unusual activities.
AP3.1.3.6. Measure ALPHA 6. Test mass notification system.
AP3.1.3.7. Measure ALPHA 7. Review all plans, identify resource requirements, and be
prepared to implement higher FPCONs.
AP3.1.3.8. Measure ALPHA 8. Review and, if necessary, implement security measures
for high-risk personnel.
335
AP3.1.4.5. Measure BRAVO 5. At the beginning and end of each workday, as well as at
random intervals, inspect the interior and exterior of buildings in regular use for suspicious
packages.
AP3.1.4.6. Measure BRAVO 6. Implement mail-screening procedures to identify
suspicious letters and parcels.
AP3.1.4.7. Measure BRAVO 7. Randomly inspect commercial deliveries. Advise
family members to check home deliveries.
AP3.1.4.8. Measure BRAVO 8. Randomly inspect food and water for evidence of
tampering/contamination before use by DoD personnel. Inspections should include delivery
vehicles and storage area/containers.
AP3.1.4.9. Measure BRAVO 9. Increase security/guard presence or patrol/surveillance
of DoD housing areas, schools, messes, on-base clubs, and similar high-occupancy targets to
improve deterrence and defense, and to build confidence among staff and family members.
AP3.1.4.11. Measure BRAVO 11. Inform local security committees of actions being
taken.
AP3.1.4.12. Measure BRAVO 12. Verify identity of visitors and randomly inspect their
suitcases, parcels, and other containers.
AP3.1.4.13. Measure BRAVO 13. Conduct random patrols to check vehicles, people,
and buildings.
AP3.1.4.14. Measure BRAVO 14. As necessary, implement additional security
measures for high-risk personnel.
AP3.1.4.15. Measure BRAVO 15. Place personnel required for implementing AT plans
on call; commanders should exercise discretion in approving absences.
AP3.1.4.16. Measure BRAVO 16. Identify and brief personnel who may augment guard
forces. Review specific rules of engagement including the use of deadly force.
336
AP3.1.4.19. Measure BRAVO 19. (airfield specific) As appropriate, erect barriers and
man and establish checkpoints at entrances to airfields. Ensure identity of all individuals
entering the airfield (flightline and support facilities) -- no exceptions. Randomly inspect
vehicles, briefcases and packages entering the airfield.
AP3.1.4.20. Measure BRAVO 20. (airfield specific) Coordinate plans to safeguard
aircraft departure and approach flight paths with local authorities. Be prepared to activate
contingency plans and issue detailed air traffic control procedures. As appropriate, take actions
to mitigate threat of surface-to-air missiles or standoff weapons that can be delivered from
beyond the airfield perimeter.
AP3.1.5. FPCON CHARLIE Measures.
AP3.1.5.1. Measure CHARLIE 1. Continue, or introduce, all measures in previous
FPCON.
AP3.1.5.2. Measure CHARLIE 2. Recall additional required personnel. Ensure armed
augmentation security personnel are aware of current rules of engagement and SOFAs. Review
types of weapons and ammunition issued to augmentation security personnel; heightened threats
may require employment of different weapons capabilities.
AP3.1.5.3. Measure CHARLIE 3. Be prepared to react to requests for assistance, from
both local authorities and other installations in the region.
AP3.1.5.4. Measure CHARLIE 4. Limit access points to strictly enforce entry.
Randomly search vehicles.
337
responsible for DoD water supplies or when water is provided by local (non-DoD) sources or
agencies).
AP3.1.5.7. Measure CHARLIE 7. Increase standoff from sensitive buildings based on
threat. Implement barrier plan to hinder vehicle borne attack.
AP3.1.5.14. Measure CHARLIE 14. Consider escorting children to and from DoD
schools (among options to consider are escorting school buses, recommending parents escort
children to/from school, etc.).
338
actions to take for aircraft diversions into and out of an attacked airfield. Consider augmenting
fire-fighting details.
AP3.1.6. FPCON DELTA Measures.
AP3.1.6.10. Measure DELTA 10. (airfield specific) Cease all flying except for
specifically authorized operational sorties. Be prepared to deploy light aircraft and/or helicopters
for surveillance tasks or to move internal security forces. Implement, if necessary, appropriate
flying countermeasures.
AP3.1.6.11. Measure DELTA 11. (airfield specific) As appropriate, airfields should
prepare to accept aircraft diverted from other stations.
AP3.1.6.12. Measure DELTA 12. If permitted, close public and military roads and
facilities. If applicable, close military roads allowing access to the airfield.
339
AP3.2.1.3. The duty of the security watch is to safeguard the ship and the ship’s
company from sabotage, terrorism, civil disturbance, danger, or compromise. The Officer of the
Deck (OOD) or equivalent is directly responsible to the Command Duty Officer (CDO) or
equivalent, for posting all security watches/sentries and shall ascertain that personnel on watch
are familiar with and proficient in their duties. All watch standers bearing arms shall be properly
qualified.
AP3.2.1.5.2. All hands shall be alert for attempts to board the ship at locations other
than the brows, sea ladders, or normal access areas.
AP3.2.1.5.3. Where hostile or subversive elements exist, all hands shall be alert for
floating mines or attempts to attach limpet mines to the ship.
AP3.2.1.5.4. Any person who desires to visit the ship shall be denied access until
cleared by the OOD.
340
AP3.2.1.6.2. The appropriate senior commander shall issue security requirements for
all ships.
AP3.2.1.6.3. Brief crew on threat, security precautions, recall procedures, and ship’s
Self Defense Force (SDF) duties.
AP3.2.1.6.4. Muster security forces, brief threat specifics, review rules of
engagement or use of force policies, security assignments, and responsibilities.
AP3.2.1.6.5. Brief beach guards and shore patrols on threats and review special
procedures applicable to the specific port visit including pier and/or fleet landing security and
access control procedures.
AP3.2.1.6.6. When operating under FPCON BRAVO, in non-Navy ports, or a threat
to a specific ship is received use, a Military Working Dog and divers to conduct a search of the
pier prior to the ship’s arrival when available.
AP3.2.1.6.7. If a suspicious item is found, notify the appropriate Explosive Ordnance
Disposal unit. Once cleared, shore security elements shall maintain security until relieved by
ship’s personnel.
AP3.2.1.7. FPCON NORMAL should include ship specific measures a Commander
deems necessary when establishing a baseline posture.
AP3.2.2. FPCON NORMAL.
AP3.2.2.1. Measure NORMAL 1. Brief crew on the port specific threat, the security/AT
plan, and security precautions to be taken while ashore. Ensure all hands are knowledgeable of
various FPCON requirements and that they understand their role in implementation of measures.
341
AP3.2.3.5. Measure ALPHA 5. Regulate shipboard lighting to best meet the threat
environment.
AP3.2.3.6. Measure ALPHA 6. When in a non-U.S. Government controlled port, rig
hawsepipe covers and rat guards on lines, cables and hoses. Consider using an anchor collar.
342
AP3.2.4.5. Measure BRAVO 5. Consistent with the local rules, regulations, and/or the
SOFA: USN combatant ships post additional armed watches as necessary; and non-combatant
ships post additional watches (armed at the Master’s discretion) as necessary. Local threat,
environment and fields of fire should be considered when selecting weapons.
AP3.2.4.6. Measure BRAVO 6. Post signs in local language specifying visiting and
loitering restrictions clearly.
AP3.2.4.7. Measure BRAVO 7. When in a non-U.S. Government controlled port,
identify and randomly inspect authorized watercraft, such as workboats, ferries and
commercially rented liberty launches, daily.
AP3.2.4.8. Measure BRAVO 8. When in a non-U.S. Government controlled port, direct
liberty boats to make a security tour around the ship upon departing from and arriving at the ship,
with particular focus on the waterline and under pilings when berthed at a pier.
343
AP3.2.4.9. Measure BRAVO 9. Inspect all visitors’ hand carried items, and packages
before allowing them aboard. Where available, use baggage scanners and walk through or hand
held metal detectors to screen visitors and their packages prior to boarding the ship.
AP3.2.4.10. Measure BRAVO 10. Implement measures to keep unauthorized craft away
from the ship. Authorized craft should be carefully controlled. Coordinate with host nation’s
husbanding agent/local port authority, as necessary, and request their assistance in controlling
unauthorized craft.
AP3.2.4.11. Measure BRAVO 11. Raise accommodation ladders, etc, when not in use.
Clear ship of all unnecessary stages, camels, barges, oil donuts, and lines.
AP3.2.4.12. Measure BRAVO 12. Review liberty policy in light of the threat and revise
it, as necessary to maintain safety and security of ship and crew.
AP3.2.4.13. Measure BRAVO 13. USN combatant ships conduct division quarters at
foul weather parade. All DoD ships avoid conducting activities that shall gather large number of
crewmembers at the weatherdecks. Where possible, relocate such activities inside the skin of the
ship.
AP3.2.4.14. Measure BRAVO 14. Ensure an up-to-date list of bilingual personnel for
area of operations is readily available. Maintain warning tape, in both the local language and
English, is in bridge/pilot house/quarterdeck, for use on the ship’s announcing system to warn
small craft to remain clear.
AP3.2.4.15. Measure BRAVO 15. If not already armed, arm the quarterdeck/gangway
or mate on watch.
AP3.2.4.16. Measure BRAVO 16. If not already armed, consider arming the sounding
and security patrol.
AP3.2.4.17. Measure BRAVO 17. Review procedures for expedient issue of firearms
and ammunition to the shipboard self-defense force (SSDF)/reaction force and other members of
the crew, as deemed necessary by the commanding officer/master.
AP3.2.4.18. Measure BRAVO 18. Instruct watches to conduct frequent, random
searches of pier to include pilings and access points.
AP3.2.4.19. Measure BRAVO 19. Conduct visual inspections of the ship’s hull and
ship’s boats at intermittent intervals and immediately before it is put to sea using both landside
personnel and waterside patrols.
344
AP3.2.4.20. Measure BRAVO 20. Hoist ships boats aboard when not in use.
AP3.2.4.21. Measure BRAVO 21. Terminate all public visits. In U.S. Government
controlled ports, host visits (family, friends, small groups sponsored by the ship) may continue at
the commanding officer’s/master’s discretion.
AP3.2.4.22. Measure BRAVO 22. After working hours, reduce entry points to ship’s
interior by securing infrequently used entrances. Safety requirements must be considered.
AP3.2.4.23. Measure BRAVO 23. In non-U.S. Government controlled ports, use only
one brow/gangway to access ship (remove any excess brows/gangways). CV(N)s and other large
decks may use two as required, when included in an approved AT Plan specific to that port visit.
AP3.2.4.24. Measure BRAVO 24. In non-U.S. Government controlled ports, maintain
capability to get underway on short notice or as specified by standard operating procedures.
AP3.2.4.25. Measure BRAVO 25. In non-U.S. Government controlled ports, consider
layout of fire hoses. Brief designated crew personnel on procedures for repelling boards, small
boats and ultra-light aircraft.
AP3.2.4.26. Measure BRAVO 26. Where applicable obstruct possible helicopter landing
areas.
AP3.2.4.27. Measure BRAVO 27. Where possible, monitor local communications (ship
to ship, TV, radio, police scanners, etc).
AP3.2.4.28. Measure BRAVO 28. As appropriate, inform local authorities of actions
being taken as FPCON increases.
AP3.2.4.29. Measure BRAVO 29. (USN combatant ship specific) If the threat situation
warrants, deploy picket boats to conduct patrols in the immediate vicinity of the ship. Brief boat
crews and arm with appropriate weapons considering threat, the local environment, and fields of
fire.
AP3.2.5. FPCON CHARLIE Measures.
AP3.2.5.1. Measure CHARLIE 1. Continue or introduce all measures in previous
FPCON.
AP3.2.5.2. Measure CHARLIE 2. Consider setting Material Condition Zebra (secure all
access doors and hatches), main deck and below.
AP3.2.5.3. Measure CHARLIE 3. Cancel liberty. Execute emergency recall.
345
AP3.2.5.6. Measure CHARLIE 6. Coordinate with host nation husbanding agent and/or
local port authorities to establish small boat exclusion zone around ship.
AP3.2.5.7. Measure CHARLIE 7. (USN combatant ship specific) Deploy the SSDF to
protect command structure and augment posted watches. Station the SSDF in positions that
provide 360 degrees coverage of the ship.
AP3.2.5.8. Measure CHARLIE 8. Energize radar and or sonar, rotate screws and cycle
ruder(s) at frequent and irregular intervals, as needed to assist in deterring, detecting or thwarting
attacks.
AP3.2.5.9. Measure CHARLIE 9. Consider manning repair locker(s). Be prepared to
man one repair locker on short notice. Ensure adequate lines of communications are established
with damage control central.
AP3.2.5.10. Measure CHARLIE 10. (USN combatant ship specific) If available and
feasible, consider use of airborne assets as an observation/force protection platform.
AP3.2.5.11. Measure CHARLIE 11. If a threat of swimmer attack exists, activate an
anti-swimmer watch.
AP3.2.5.12. Measure CHARLIE 12. In non-U.S. Government controlled ports and if
unable to get underway, consider requesting armed security augmentation from area Combatant
Commander.
346
AP4. APPENDIX 4
SAMPLE INSTALLATION ANTITERRORISM PLAN FORMAT
AP4.1. OVERVIEW
AP4.1.1. The format outlined below is offered as one means of developing an AT plan. It is
optimized for a base or installation, but can be adapted for other facilities and deployed units. It
is meant to help the AT officer structure the AT plan in a comprehensive and organized manner.
The format is patterned after the standard five-paragraph military operations order (Situation-
Mission-Execution-Administration and Logistics-Command and Signal).
AP4.1.2. This format enables the synchronization of existing programs such as Law
Enforcement, Physical Security, AT, OPSEC, INFOSEC, High-Risk Personnel protection and
other installation efforts. AT Plans should be integrated into all plans and separate annexes.
Remember that staff interaction is a crucial element of developing a realistic, executable plan.
AP4.1.3. Although this sample is patterned after the military operations order, it is
applicable to managers of OSD Agencies as they develop plans to protect personnel, activities,
and material under their control.
AP4.1.4. This sample uses supporting Annexes, Appendices, Tabs, and Enclosures to
provide amplifying instructions as required. This method shortens the length of the basic plan
(which should be read by all personnel outlined in the plan), and provides organization, structure,
and scalability.
347
Installation/Operation Name
Location
Date/Time Group
Task Organization. [Include all agencies/personnel (base and civilian) responsible to implement the plan. Include
as a separate Annex. See Annex A (Task Organization).]
Maps/Charts: [List all applicable maps or charts. Include enough data to ensure personnel are using the correct
year/edition/version of the subject material.]
Time Zone: [Enter the time zone of the installation. Indicate the number of hours to calculate (plus/minus) ZULU
time.]
Ref: [Enter the compilation of pertinent publications, references, MOU/MOA/MAA. This list may be included in a
separate Annex. See Annex Q (References).]
1. SITUATION
a. General. [This plan applies to all personnel assigned or attached to the installation. [Describe the
political/military environment in sufficient detail for subordinate commanders, staffs, and units to understand their
role in the installation AT operations.]
b. Enemy. [The enemy is any adversary capable of threatening the installation’s personnel, facilities, and
equipment. [ENTER the general threat of terrorism to this installation including the intentions and capabilities,
identification, composition, disposition, location, and estimated strengths of hostile forces. Include the general
threat of terrorist use of WMD against this installation. This information should remain unclassified when possible.
See paragraph 1f, Intelligence, on identifying specific threats.] This information may be included as a separate
Annex. See Annex B (Intelligence).]
c. Friendly. [ENTER the forces available (both military and civilian) to respond to a terrorist WMD attack.
Include the next higher headquarters and adjacent installations, and any units/organizations that are not under
installation command, but may be required to respond to such an incident. These units/organizations may include
Host Nation (HN) and US military police forces, fire and emergency services, medical, and federal/state and local
agencies, special operations forces, engineers, detection (radiological, nuclear, biological, and chemical)
decontamination or smoke units, and explosive ordnance disposal (EOD). Include MOAs/MOUs and any other
special arrangements that will improve forces available to support the plan. If in the U.S. and its territories, the
Department of Justice, Federal Bureau of Investigation (FBI) is responsible for coordinating all Federal agencies and
DoD forces assisting in the resolution of a terrorist incident. If outside the U.S. and its territories, the Department of
State (DOS) is the lead agency. This information can be included in a separate Annex(s). See Annex A (Task
Organization) and Annex J (Command Relationships).]
e. Assumptions. (List planning/execution assumptions) [ENTER all critical assumptions used as a basis for
this plan. Assumptions are those factors unlikely to change during the implementation of the AT plan and that must
addressed in order to continue to plan. They can range from the installation’s troop strength to addressing the local
political/social environment. Examples follow:
348
(2) An act of terrorism involving WMD can produce major consequences that will overwhelm almost
immediately the capabilities of the installation.
(3) Security personnel, both military and civilian, may be insufficient to provide total protection of all
installation resources; therefore, the principal owner or user of a facility, resource, or personnel must develop
adequate unit awareness and safeguard measures.
(4) No single unit on the installation possesses the expertise to act unilaterally in response to WMD attacks.
(5) If protective equipment is not available, responders will not put their own lives at risk.
(6) Local, non-military response forces will arrive within [time] of notification.
(7) Units specializing in WMD response will arrive on-site within [number of hours based on installation
location] of notification.
(8) The HN is supportive of U.S. policies, and will fulfill surge requirements needed to respond to a WMD
incident IAW MOAs/MOUs.]
f. Intelligence. [ENTER the person, staff, or unit responsible for intelligence collection and dissemination.
The installation commander must have a system in place to access current intelligence. This can be included in
Annex B (Intelligence).] [National-level agencies, Combatant Commanders, and intelligence systems provide
theater or country threat levels and threat assessments. In the U.S. and its territories, local installations must obtain
the local terrorist threat information by querying the FBI through the installation’s law enforcement liaison, local
law enforcement, or other federal agencies.]Obtain these assessments, as they will serve as a baseline for the
installation’s tailored assessment. The installation should have a process in place for developing the installation’s
tailored threat assessment or “local threat picture.” The installation’s tailored threat assessment should be
continuously evaluated, updated, and disseminated, as appropriate, and as directed by the installation commander.
The commander should determine the frequency and the means of dissemination of the installation’s tailored AT
product. Note: Commanders cannot change the threat level, which is developed at the national-level although they
can declare higher FPCONs than the baseline.
2. MISSION. [ENTER a clear, concise statement of the command’s mission and the AT purpose or goal statement
supporting the mission. The primary purpose of the AT plan is to safeguard personnel, property, and resources
during normal operations. It is also designed to deter a terrorist threat, enhance security and AT awareness, and to
assign AT responsibilities for installation personnel.]
3. EXECUTION
a. Commander’s Intent. (Commander’s vision on how he/she sees the execution of the unit’s AT program.
Refer to Service planning doctrine for assistance.)
b. Concept of Operations. [ENTER how the overall AT operation should progress. This plan stresses
deterrence of terrorist incidents through preventive and response measures common to all combatant commands and
Services. During day-to-day operations, the installation should stress continuous AT planning and passive,
defensive operations. This paragraph should provide subordinates sufficient guidance to act if contact or
communications with the installation chain of command is lost or disrupted.
(1) The installation’s AT Concept of Operations should be phased in relation to pre-incident actions and
post-incident actions. AT planning and execution requires that staff elements work with a much greater degree of
cohesiveness and unity of mission than that required during the conduct of normal base sustainment operations. The
349
(2) In Post-Incident planning, the installation should focus on its response and reconstitution
responsibilities upon notification of a terrorist incident and the procedures for obtaining technical
assistance/augmentation if the incident exceeds the installation’s organic capabilities. National-level responders
(Federal Emergency Management Agency (FEMA), Red Cross, and Federal Bureau of Investigation (FBI)) may not
be immediately accessible or available to respond to an installation’s needs. Therefore each installation must plan
for the worst-case scenario, by planning its response based on its organic resources and available local support
through MOA/MOUs.
(3) The situation may dictate that the installation not only conduct the initial response but also sustained
response operations. Many installations do not have onboard WMD officers or response elements. This paragraph
will include specific implementation instructions for all functional areas of responsibility and the manner in which
these actions must be coordinated. The implementation instructions can be put in the form of actions sets and
displayed in the form of a synchronization matrix (Post-Incident Action Set Synchronization Matrix). The
synchronization matrix format clearly describes relationships between activities, units, supporting functions, and key
events which must be carefully synchronized to minimize loss of life and to contain the effects of a terrorist incident.
c. Tasks. [ENTER the specific tasks for each subordinate unit or element listed in the Task Organization
paragraph. Key members of the installation have responsibilities that are AT and/or WMD specific. The
commander should ensure that a specific individual/unit/element within the installation is responsible for each action
identified in this plan. Each individual/unit/element must know the tasks and responsibilities, what these
responsibilities entail, and how these will be implemented. While the tasks and responsibilities for each AT
planning and response Element will be delineated in the Pre- and Post-incident Action Set Matrices, it is
recommended that the installation commander identify/designate the primary lead for each element and enter that
information in this paragraph.]
d. Coordinating Instructions. [This paragraph should include AT specific coordinating instructions and
subparagraphs, as the commander deems appropriate. In addition, this section of the AT plan outlines aspects of the
installation’s AT posture that require particular attention to guarantee the most effective and efficient
implementation of the AT plan. For the purposes of this plan, there are five basic coordinating instructions: 1) AT
planning and response elements; 2) Procedural; 3) Security Posture; 4) Threat Specific Responsibilities; and 5)
Special Installation Areas. The reader will be directed to specific Annexes that will provide amplifying instructions
on these topics. The sections listed below are representative, and may not be all-inclusive.
(1) AT Planning and Response. For instructional purposes, this template outlines AT planning and
response elements on the installation required to respond to a terrorist/WMD incident. Initial and sustained response
to an attack must be a coordinated effort between the many AT planning and response elements of the installation,
based on the installation’s organic capabilities. As the situation exceeds the installation’s capabilities, it must
activate MOAs/MOUs with the local/State/ Federal agencies (U.S. and its territories) or HN (outside the U.S. and its
territories). For the purposes of this plan, an installation’s capability is divided into AT planning and response
elements. These tailored, installation-level elements parallel the national-level FEMA ESFs and the JSIVA
evaluation criteria to the greatest degree possible.
350
(2) Procedural
(c) Installation Training & Exercises. See Annex N (AT Program Review, Training & Exercises).
(g) AT Program Review (See Annex N (AT Program Review, Training & Exercises).
(h) Higher Headquarters Vulnerability Assessments. See Annex N (AT Program Review, Training &
Exercises).
(b) Physical Security to include Lighting, Barriers, Access Control. See Appendix 6 to Annex C
Operations).
351
(g) Critical Systems Continuity of Operations (optional). See Appendix 13 to Annex C (Operations).
(h) Other
(f) Other
(e) Other
4. ADMINISTRATION AND LOGISTICS. [ENTER the administrative and logistics requirements to support the
AT plan, which should include enough information to make clear the basic concept for planned logistics support.
Ensure the staff conducts logistical planning for both pre- and post-incident measures addressing the following:
locations of consolidated WMD defense equipment; expedient decontamination supplies; Individual Protective
Equipment exchange points; special contamination control requirements; retrograde contamination monitoring sites;
WMD equipment/supply controlled supply rates and pre-stockage points; and procedures for chemical defense
equipment “push” packages. Specific logistics and administrative requirements will emerge throughout the planning
process outlined in the Concept of Operations, specifically when developing the action sets. These requirements
should be incorporated into this paragraph. Finally, include fiscal instructions on how to support AT operations.
5. COMMAND AND SIGNAL. [ENTER instructions for command and operation of communications-electronics
equipment. Identify the primary and alternate locations of the command post and emergency operations center.
Enter the installation’s chain of command. Highlight any deviation from that chain of command that must occur as
a result of a WMD incident. The chain of command may change based on the deployment of a Joint Task Force or a
National Command Authority-directed mission. Identify the location of any technical support elements that could
be called upon in the event of a terrorist WMD incident and the means to contact each. Recommend the installation
352
d. Succession of Command
//SIGNATURE//
Commanding General/Officer
Signature Block
ANNEXES: (Should provide amplifying instructions on specific aspects of the plan. Each ANNEX can be sub-
divided into APPENDICES, TABS, and ENCLOSURES as required to provide amplifying instructions. Further,
some of these supporting documents may be established in other unit operating orders/procedures, and referenced as
required.)
ANNEX A - Task Organization [ENTER key AT organization composition i.e., AT Working Group, Crisis
Management Team, Emergency Operations Center, First Response Elements, etc.]
ANNEX B – Intelligence [ENTER the agency(s) responsible for intelligence and specific instructions. In the U.S.
and its territories, commanders must obtain the local terrorist threat information by querying the FBI through the
installation’s law enforcement liaison, local law enforcement or other federal agencies]
ANNEX C – Operations [This is the most IMPORTANT part of the plan]. Annex C and supporting Appendices
will provide specific instructions for all the various AT operations. All other Annexes/Appendices support the
implementation of Annex C.
353
Appendix 1 – Incident Planning and Response [ENTER how the various agencies (military/civilian) and
resources will be integrated to respond to the operations outlined below. These instructions should be generic
enough to apply across the operational spectrum. Specific instructions for each operation will be detailed in the
appropriate Annex/Appendix/Enclosure.]
Appendix 2 – Antiterrorism
Appendix 5 – Weapons of Mass Destruction (CBRNE) & HAZMAT [ENTER the specific procedures planning,
training, and response to WMD (CBRNE) incidents. Care should be taken to integrate existing plans for response to
HAZMAT incidents to avoid duplication. Include “baseline” preparedness.]
Tab A – Installation Barrier Plan [ENTER procedures and pictorial representation of barrier plan.]
Tab B – Installation Curtailment Plan
Tab C – Construction Considerations
Tab D – Facility and Site Evaluation and/or Selection
Tab E – AT Guidance for Off-Installation Housing
354
Appendix 12 – Emergency Operations Center (EOC) Operations [ENTER procedure for the activation &
operations of the EOC.]
Appendix 13 – Critical Systems Continuity of Operations Plans (Optional) [ENTER those systems that are
essential to mission execution and infrastructure support of the installation i.e., utilities systems, computer networks,
etc. This document outlines how the installation will continue to operate if one or more critical systems are
disrupted or fails and how the systems will be restored.]
Appendix 14 - Emergency Mass Notification Procedures [ENTER the specific means and procedures for
conducting a mass notification. Also covered should be the procedures/means for contacting key personnel and
agencies.
Appendix 15 – Exploit Technology Advances [ENTER the process and procedures for developing and
employing new technology. Identify who is responsible and what should be accomplished.]
Appendix 16 – Higher Headquarters Vulnerability Assessments [ENTER procedures for conducting higher
headquarters vulnerability assessments.
Appendix 1 – Priority of Work [ENTER the priority of employing scarce logistical resource.]
355
ANNEX E – Fiscal (Specific fiscal instructions on how to support AT operations from pre-incident through post-
incident)
ANNEX F – Tenant Commanders (Specific instructions on how tenant commands/agencies support AT operations)
Appendix 1 – List of Landing Zones (Used for emergency medical evacuations or equipment/personnel staging
areas.)
ANNEX H – Legal [ENTER the jurisdictional limits of the installation’s commander and key staff. Although the
Department of Justice, Federal Bureau of Investigation (FBI), has primary law enforcement responsibility for
terrorist incidents in the United States, the installation commander is responsible for maintaining law and order on
the installation. For OCONUS incidents, the installation commander must notify the HN and the geographic
combatant commander; the geographic combatant commander will notify the Department of State (DOS). Once a
task force or other than installation support arrives on the installation, the agencies fall under the direct supervision
of the local Incident Commander. In all cases, command of military elements remains within military channels.
The installation should establish HN agreements to address the use of installation security forces, other military
forces, and host-nation resources that clearly delineate jurisdictional limits. The agreements will likely evolve into
the installation having responsibility “inside the wire or installation perimeter” and the HN having responsibility
“outside the wire or installation perimeter”. There may be exceptions due to the wide dispersal of work and housing
areas, utilities, and other installation support mechanisms that may require the installation to be responsible for
certain areas outside of the installation perimeter.]
annex J – Command Relationships (Provides specific guidance on command relationships and military/civilian
interoperability issues during incident command and control).
356
Appendix 1 – AT Organizational Charts [Crisis Management Team, AT Working Group, First Responder
Elements, Incident Command Organization (include civilian and other external agencies).]
Appendix 2 - Procedures for Operating with Civilian Emergency Medical Service and Hospitals
Appendix 3 – Exercises
ANNEX O – Personnel Services [ENTER administrative and personnel procedures required to support the plan i.e.,
civilian overtime, post-traumatic stress syndrome counseling.]
ANNEX P – Reports [ENTER all the procedures for report submissions & report format.]
ANNEX Q – References [ENTER all supporting reference materials, publication, regulations etc.]
ANNEX R – Distribution [ENTER the list of agencies to receive this plan. Cover plan classification, handling and
declassification procedures.]
357
AP5. APPENDIX 5
TERRORIST INCIDENT RESPONSE MEASURES CHECKLIST
AP5.1. INTRODUCTION
The antiterrorism success of each unit operating within a Combatant Command shall depend on
the degree and seriousness of the crisis management planning. The following checklist identifies
items that should be considered for inclusion into the crisis management plan prepared for each
unit, activity, installation, or organization as appropriate.
Intelligence
Does the plan allow for the intelligence-gathering process (e.g., collection,
evaluation, and dissemination of information) to aid in the identification of the
local threat?
Does the plan consider restrictions placed on the collection and storage of
information?
Does the plan indicate an awareness of sources of information for the
intelligence-gathering effort (e.g., military intelligence, federal agencies,
state/local authorities)?
Does the plan allow for liaison and coordination of information (e.g.,
establishing a threat committee)?
Threat Analysis
Does the plan identify the local threat (immediate and long-term)?
Does the plan identify other threats (e.g., national and international groups
who have targeted or might target US installations)?
Does the installation incorporate factors of the installation vulnerability
determining system when assessing the threat? Does it address:
Geography of the area concerned.
Law enforcement resources.
Population factors.
Communications capabilities.
Does the plan establish a priority of identified weaknesses and vulnerabilities?
Security Countermeasures
Does the plan have specified FPCONs and recommended actions/measures?
Do security countermeasures include a combination of physical operations and
sound-blanketing security measures?
358
359
Have the EOC and media center been activated together within the last
quarter? If not provide date of the last activation.
Does the EOC have SOPs covering communications and reports to higher
headquarters?
Reaction Force Training
Has the reaction force been formed, equipped (including CBRNE equipment)
and mission-specific trained (e.g., building entry and search techniques,
vehicle assault operations, anti-sniper techniques, equipment)?
Has the force been briefed on laws and policies governing the use of force and
the use of deadly force in the protection of DoD personnel, facilities, and
materiel?
Has the force been trained and exercised under realistic conditions?
Has corrective action been applied to shortcomings/deficiencies?
Has the reaction force been tested quarterly (alert procedures, response time,
overall preparedness)?
Has responsibility been fixed for the negotiation team? Has the negotiation
team been trained and exercised under realistic conditions?
General Observations
Was the plan developed as a coordinated staff effort?
Does the plan outline reporting requirements (e.g., logs, journals, after-action
report)?
Does the plan address controlled presence of the media?
Does the plan include communications procedures and communications nets?
Does the plan consider the possible need for interpreters?
Does the plan consider the need for a list of personnel with various foreign
backgrounds to provide cultural intelligence on foreign subjects and victims,
as well as to assist with any negotiation efforts?
Does the plan provide for and identify units that shall augment military police
assets?
Does the plan delineate specific tasking(s) for each member of the operations
center?
Does the plan provide for a response for each phase of antiterrorism activity
(e.g., initial response, negotiation, assault)?
Does the plan designate service support requirements (e.g., engineer, aviation,
medical, communications, etc.)?
Does the plan make provisions for notification of nuclear assessment teams
and the nuclear accident/incident control officer?
Does the plan provide for explosive ordnance disposal (EOD) support?
360
361
AP6. APPENDIX 6
AT MEASURES FOR IN-TRANSIT FORCES
AP6.1. INTRODUCTION
Numerous DoD elements, personnel and assets constantly transit, or are deployed outside of U.S.
controlled areas. These elements, commonly referred to as in-transit forces, confront unique
vulnerabilities due to their “in-transit” status. This appendix provides guidance for Commanders
and ATOs to enhance the AT posture of in-transit forces transiting, or deployed to/from their
AOR.
AP6.2. AT ASSESSMENTS
AP6.2.1. Reference (e) requires Commanders with AT responsibility for a transiting force
complete a pre-deployment AT VA. The VA should include movement routes that may be used
by transiting DoD forces, ships and aircraft. Transiting forces include all DoD ships, aircraft,
units and elements that could present lucrative and/or vulnerable terrorist targets.
AP6.2.1.2. The AT Assessment should also be within a timeframe that provides the
Commander with current situational information. Previous and periodic assessments of many
locations shall be available to Commanders. These assessments may satisfy many pre-
deployment requirements and provide data that can be updated and/or validated to alleviate the
need for an additional assessment, or reduce the scope of the assessment if warranted.
AP6.2.2. The AT Assessment should provide deploying Commanders a baseline to
implement appropriate AT measures to reduce risk and vulnerability.
AP6.2.2.1. If warranted, Commanders faced with emergent AT requirements prior to
movement of forces should submit CbT RIF requests through established channels (see chapter
16) to procure necessary materials or equipment for required AT measures.
AP6.2.2.2. Equipment and technology can significantly enhance AT posture for all DoD
forces (see chapter 17), and in particular the security posture of transiting units against terrorist
threats. The Component Commanders should research and identify AT equipment and/or
362
AP6.3.1. A security document should be prepared for each deployment. This document can
be in various formats (Plan, SOP, or LOI) according to the existing AT threat, the deployment
size and/or its complexity. While not to the detail of an installation AT Plan, it should address
the following areas as applicable.
363
364
Transiting Aircraft
Category "A" Airfield Based on Threat/Vulnerability More stringent security
Category "B" Airfield Assessments and TWG required at CAT "B"
review, Security Planning locations
Package for aircrew
TDY Groups/Individuals
General/Flag Officer Engage in planning process as HRP itineraries FOUO
defined in OPORD or classified
06 and below Follow FCG procedures, and
*** Less than 50 Combatant Command Travel
Policy - Review Threat
Information & conduct Risk
Assessment
AP6.3.3. For events, activities or travel involving less than 50 personnel, a detailed written
AT plan is usually inappropriate. Factoring AT into each phase of planning is still required, but
the documented results may be as simple as a 5 Para OPORD, or just a wallet-sized card listing
key POCs and contact numbers at the visited location. Table AP6.T3. provides a Planning Guide
365
for Small Groups designed to help the Commander prepare a plan for individual and/or small
group travels.
Table AP6.T3. AT Planning Process for Individual & Small Group Travel (less than 50)
AT Planning Process for Individual & Small Group Travel (less than 50)
PART I. OBJECTIVE: DETERMINE THE THREAT
3. Determine if Combatant Commander has placed any restrictions on DOD travel to the area.
4. Determine the country’s existing Threat Levels for the Foreign Intelligence Threat, Terrorism
Threat, Political Violence, Crime, and Health Protection/Risk.
5. Obtain any additional threat information about a given country from the Combatant Commander’s intelligence
organization (i.e. graphic picture of potential threats).
PART II. OBJECTIVE: DETERMINE MISSION CRITICALITY AND VULNERABILITIES
ADMINISTRATIVE: ______
OPERATIONAL: ______
ESSENTIAL/CRITICAL: ______
7. Determine Foreign Clearance Guide (FCG) requirements/constraints. The following key elements of information
for planning purposes can be extracted:
366
* To find local maps, there are a variety of tools on the NIPRNET. For example, go to <MAPQUEST.COM> and
select <MAPS>; then the appropriate country. On the SIPRNET, go to <Geography & Maps> and select one of
search engines available, such as Raster Roam.
** To find previous Vulnerability Assessments, query the POC at the TDY location.
*** The Operating Environment is one factor in the Terrorist Threat methodology and should be contained in the
DIA/JAC Threat Assessments. See PART I, above. Also query the POC at the TDY location.
PART III. OBJECTIVE: CONDUCT MISSION RISK ASSESSMENT AND MITIGATING MEASURES TO
REDUCE THE RISK
9. Contrast the results of Threat and Vulnerability Assessment data. Make a reasonable, subjective judgment of the
level of Risk associated with the mission, AND based on the criticality of the mission, determine if the level of Risk
is acceptable.
10. Consider introducing the following mitigating measures to reduce the level of Risk:
At TDY Location:
367
* These measures normally are only associated with High Risk Personnel who warrant protective services support.
** These measures would only be authorized for critical missions in extremely hazardous locations with the
approval of both Combatant Commander and the COM.
PART IV. OBJECTIVE: FINALIZE ARRANGEMENTS FOR TDY AND BUILD A PLAN BASED ON THE
FOLLOWING KEY ELEMENTS. Documentation could amount to nothing more than wallets size cards with
contact numbers if a clear understanding of procedures is established.
11. Make final Risk assessment and "Go" – "No Go" decision based on introduction of mitigating measures in
PART III.
12. Confirm that all travelers have documented evidence of Level I AT training within the time limits prescribed.
13. Increase the situational awareness of all travelers by reviewing results of PARTS I, II and III, above, prior to
mission execution.
14. Ensure all travelers have key contact numbers and understand all ground rules and AT procedures for the
mission. Wallet size cards may suffice.
15. If appropriate, identify divert locations for the mission and alternate local POC information. Ensure
communications capability exists to notify home office and primary POC if mission must be diverted.
16. Initiate notifications/requests IAW the FCG. Message request must follow exact format specified, and include a
request for Country/Theater Clearance granting authority to identify precisely and explicitly who (Combatant
Commander or COM) has responsibility and TACON for force protection of all travelers. Include as the last
paragraphs in the message any additional AT measures instituted and results of risk assessment if required or
appropriate. Explicitly state that Level I AT training has or shall be completed prior to mission execution.
17. Once all travel clearances have been obtained, continue to update itineraries with local AT POCs and clearance
granting authorities. Conduct ongoing mission analysis and risk assessment until execution and completion of
mission.
NOTE: Mitigating measures to reduce Risk are not limited to those listed in PART III, above, and application of
additional innovative measures to enhance security are encouraged. Authority to grant travel clearance to some
areas is severely restricted and may require forwarding the travel proposal to the appropriate Combatant Commander
for review/approval.
368
AP6.3.4. A detailed and complete example of an AT security plan in OPORD format can be
found in the Force Protection section of EUCOM’s secure SIPRNET web site.
AP6.4. COORDINATING INSTRUCTIONS
369
AP7. APPENDIX 7
TERRORIST SURVEILLANCE DETECTION
AP7.1. INTRODUCTION
AP7.1.1. This appendix provides guidance for Commanders and ATOs to stress the
importance of overt terrorist surveillance detection efforts by military police forces to deter
terrorist surveillance activities.
AP7.1.2. The recent increase in reporting of suspicious individuals conducting surveillance
of U.S. military and civilian sites in the United States and overseas indicates possible pre-
operational targeting by terrorists and merits attention by Commanders at all levels. The
persistent stream of reports necessitates Commanders and security planners to understand the
purpose of terrorist surveillance, know what terrorists look for, and know how they conduct
surveillance operations. With this basic knowledge, Commanders can then implement protective
countermeasures, comply with DoD standardized reporting procedures, and in the end deter,
detect, disrupt, and defend against future terrorist attacks.
370
AP7.2.2.2. Terrorists conduct fixed or static surveillance from one location to observe a
target, whether a person, building, facility, or installation. Fixed surveillance often requires the
use of an observation point to maintain constant, discreet observation of a specific location.
Terrorists establish observation posts in houses, apartments, offices, stores, or on the street. A
mobile surveillance unit, such as a parked car or van, can also serve as an observation post.
Terrorists often park outside a building, facility, or installation to observe routines of security
and personnel coming and going. Terrorists also use various modes of transportation to include
buses, trains or boats or move by foot to approach and observe installations.
AP7.2.3. Protective Countermeasures.
AP7.2.3.1. The incorporation of visible security cameras, motion sensors, working dog
teams, random roving security patrols (varying size, timing, and routes), irregular guard changes,
and active searches (including x-ray machines and explosive detection devices) of vehicles and
persons at entry points shall improve a facilities’ situational awareness and present a robust force
protection posture that dramatically inhibits terrorist surveillance efforts.
AP7.2.3.2. The emplacement of barriers, roadblocks, and entry mazes that are covered
by alert security forces shall provide additional deterrence as these measures increase standoff
and improve security force reaction time in the event of an attack.
371
circumstances or trends, Commanders and senior law enforcement officials in coordination with
intelligence experts through installation threat working groups may determine the need for more
specialized covert countersurveillance measures to assure installation protection.
AP7.2.4.2. For surveillance detection efforts to achieve positive results, military
police/security forces should immediately report incidents of surveillance and suspicious
activities by providing detailed descriptions of the people, the times of day, the locations, the
vehicles involved, and the circumstances of the sightings to their respective criminal
investigative services or counterintelligence elements for incorporation into reports such as
U.S.A.F. TALON or the NCIS Suspicious Incident Report. The incident reports are important
pieces of information that over time combined with other similar sightings allow investigators to
assess the level of threat against a specific facility, installation, or geographic region.
AP7.2.4.3. The emphasis of surveillance detection is on indicators and warnings of
terrorist surveillance activities. Surveillance detection efforts should focus on recording, then
reporting incidents similar to the following:
AP7.2.4.3.6. Joggers who stand and stretch for an inordinate amount of time.
AP7.2.4.3.7. Individuals sitting in a parked car for an extended period of time.
AP7.2.4.3.8. Individuals who don’t fit into the surrounding environment by wearing
improper attire for the location (or season).
AP7.2.4.3.9. Individuals drawing pictures and/or taking notes in an area not normally
of interest to a standard tourist or showing interest in or photographing security cameras, guard
locations, or noticeably watching security reaction drills and procedures.
372
AP7.2.5.2. For those occasions when the indicators of terrorist surveillance continue
despite well executed overt security countermeasures the objectives should be to provide detailed
reports of the indicators of surveillance to the appropriate law enforcement agency or
intelligence activity. As reports of suspicious activity increase and the trends clearly indicate
pre-operational terrorist surveillance, it may be necessary for installation Commanders in
coordination with senior law enforcement and intelligence officials to implement more
sophisticated, uniquely tailored countersurveillance solutions and assets to investigate the
circumstances.
373
374
AP8. APPENDIX 8
ANTITERRORISM (AT) SECURITY CONSIDERATIONS FOR THE
CONTRACTING PROCESS
AP8.1. INTRODUCTION
AP8.1.1. Contracting for support services is a normal, ever expanding function of providing
essential logistical services within the Department of Defense. Contracting for services present
AT security challenges (which if not addressed) could create seams and gaps in a unit’s overall
security profile. The Federal Acquisition Regulations (FAR) (reference (ay)) is the principle
guidance used to establish Federal Government contracts and provides explicit directions for
contract requirements, award, execution, and evaluation. At OCONUS locations, SOFA, MOA,
and other documents shall prescribe guidance for the contracting process with regard to host
nation service providers. ATOs should work closely with the contracting officer and the legal
officer to ensure AT security considerations are properly and legally incorporated into the
contracting process. Each Combatant Commander should consider developing AOR and/or
country specific, AT security guidance for the contract process based on their individual threat
concerns and agreements with host nations.
AP8.1.2. Reference (aw) does not specifically prohibit or prescribe AT security
considerations for contracts. It is the responsibility of the commander to incorporate AT security
considerations into the contracting process. This appendix shall offer an AT process that can be
used to incorporate AT security considerations into the contracting process. It also suggests
specific AT security measures that can be employed.
AP8.2. INCORPORATING AT SECURITY CONSIDERATIONS INTO THE
CONTRACTING PROCESS
AP8.2.1. Commanders are responsible for ensuring AT security measures are included into
the contracting process. Each commander should develop area specific, AT security guidance
and incorporate the same into their AT program. This Commander’s guidance forms the core
AT security criteria that shall be applied to all contracts as a baseline. Contract AT security
considerations should be considered during the commander’s AT risk assessment process. This
process results in the acceptance of a level of AT risk and parameters; or in the investment of
additional AT security costs.
375
AP8.2.2. The ATO and the contracting officer are responsible for ensuring the application of
the Commander’s guidance. This ensures AT security measures are included into the statement
of work (SOW) and if applicable, the DD Form 254, }Contract Security Classification
Specification.” It is the contracting officer’s responsibility to ensure the contract is prepared
IAW appropriate contracting regulations/guidance. It is important to include the AT working
group and host nation representatives as required throughout this process. Listed below is a step-
by-step process for considering AT security into contracts. Table AP8.T1 also outlines the
process for incorporating AT security considerations into the logistics contract process.
AP8.2.2.1. Determine the Contract Requirement. The unit requiring the contract service
is responsible for identifying the specific contract requirement. The unit shall work with the
contracting officer to ensure the framework of the contract/scope of work is properly
constructed. This is done within the Department of Defense, Service, Combatant Commander,
FAR, and contracting guidance. It is at this step that the unit should determine how essential this
contract service is to mission accomplishment. Are there alternative means to providing the
contract service without mission degradation? It is important to determine the scope of the
contract, who shall execute the contract, what unit (s) shall be affected by it, when it shall be
executed (timeframe), where it shall be executed, and what the area/building access requirements
are. The concern during this step is to determine the specific logistics requirement (s), not
determining AT security considerations.
AP8.2.2.2. Conduct AT RA. The unit shall conduct an AT risk management process
using locally prepared AT assessments (Threat, Criticality, Vulnerability, and Risk). The use of
these products shall help the unit in assessing and identifying the potential AT risks associated
with the contract and the incorporation of specific AT security countermeasures. Part of this
process is to consider alternative means of fulfilling the contract requirement as a means to
mitigate or eliminate risks. The ATO shall assist in the AT risk management process; ensuring
local security measures are leveraged and/or modified against risks/vulnerabilities associated
with the contract.
376
AP8.2.2.3. Determine AT Security Requirements. During this step, the ATO shall assist
the unit in the development of specific AT security measures. AT security measures should be
based on an AT RA and reflect the Commander’s overall AT risk management strategy. There
should be a balance between effective security measures and cost-benefit. The unit and the ATO
should apply the Commander’s AT security considerations during this step. The ATO should
craft AT security strategies that complement the existing security profile of the location from a
normal security posture through advanced readiness postures. Flexibility should be incorporated
into the contract to allow for random schedules, access and/or search requirements, and changes
in the local threat. For example, contractor personnel may be directed to enter the location
through certain access points where they can best be identified and searched. Contractor
personnel may be prohibited from certain portions of the location and during advanced readiness
postures. Contract services may be curtailed or more closely supervised.
377
Table AP8.T2 below identifies some of the specific AT security measures that should be
considered for the logistics contract process.
AP8.2.2.4. Build Contract. This step involves combining the logistics requirement (s)
with the AT security measure (s) into a written contract. As a minimum, the contract should be
staffed through the AT Working Group, the legal officer, and the Commander. This is the
Commander’s formal endorsement that the AT security measures are satisfactory and he or she
has accepted the AT risk.
AP8.2.2.5. Award/Execute Contract. The unit should consider including contract
security requirements as part of their unit’s AT Plan to ensure proper coordination and
synchronization with other AT activities. Once the contract is awarded, those security
requirements become binding and should be in place. Any contractor personnel screening
requirements should be met prior to starting the contract. The contracting officer and the unit
should notify the ATO prior to the contract services starting so he can ensure all required AT
security measures are in place.
AP8.2.2.6. Contract Review. The unit should establish procedures to periodically review
the effectiveness of the contract, both in terms of services rendered and AT security measures in
place. Contract reviews should all be the day-to-day inspection/evaluation of services rendered,
periodic inspection of access controls to ensure control procedures are not being abused, and a
formal annual review process to renew or cancel the contract. A contract review should also be
done if the local threat changes and/or there is a requirement to modify and renegotiate the terms
of the contract.
378
Contractor Screening - Pre-approved, reputable companies vetted through contracting office, Chief
of Mission, DoD.
- Badge systems.
- Have large vehicles arrive empty before entering location i.e., trash trucks.
379
Special Security - Include contract services as part of the local risk analysis/management
Concerns process.
- Consider time and space factors to allow determination of hostile intent into
AT security measures.
- Identify and monitor food, water, and petroleum distribution points (on and
off location).
- Determine what risks still remain after all AT security measures are
applied...acceptance of risk.
380
381
AP9. APPENDIX 9
IMPORTANT INTERNET LINKS
382
GOVERNMENT
CDC -- Center for Disease Control, Public Health
http://www.bt.cdc.gov/
Emergency Preparedness and Response
CIA -- Central Intelligence Agency http://www.odci.gov/
DHS – Department of Homeland Security http://www.dhs.gov/
DHS Emergencies and Disasters http://www.dhs.gov/dhspublic/theme_home2.jsp/
DOJ -- Department of Justice http://www.usdoj.gov/
Federal Bureau of Investigation http://www.fbi.gov/
DOS -- Department of State http://www.state.gov/
Office of the Coordinator for Counterterrorism http://www.state.gov/s/ct/
Bureau of Diplomatic Security http://www.ds.state.gov/index.htm/
Travel Warnings and Consular Information Sheets http://travel.state.gov/travel_warnings.html/
Response to Terrorism http://usinfo.state.gov/topical/pol/terror/
EPA -- Environmental Protection Agency http://www.epa.gov/
Chemical Emergency Preparedness Office http://www.epa.gov/ceppo/
FEMA -- Federal Emergency Management Agency http://www.fema.gov/
Federal Response Plan http://www.fema.gov/rrr/frp/
Disaster Preparedness (Fact Sheets) http://www.fema.gov/library/factshts.shtm/
Treasury Department http://www.treas.gov/
Office of Foreign Assets Control http://www.treas.gov/offices/enforcement/ofac/
http://www.ulib.iupui.edu/subjectareas/gov/
Abbreviations and Acronyms of the U.S. Government
docs_abbrev.html/
REFERENCES
Acronym Finder http://www.acronymfinder.com/
Army Acronyms http://www.army.mil/aps/97/acro.htm/
http://www.odci.gov/cia/publications/factbook/
CIA Factbook
index.html/
http://www.odci.gov/cia/publications/factbook/docs/
CIA Maps
refmaps.html/
Dictionary.com http://dictionary.com/
DoD Dictionary of Military Terms http://www.dtic.mil/doctrine/jel/doddict/index.html/
FirstGov http://firstgov.gov/
GovSpot http://www.govspot.com/
http://www.dtic.mil/doctrine/jel/doddict/
Joint Acronyms and Abbreviations
acronym_index.html/
http://www.globemaster.de/html/dictionary.html/
US Armed Forces Abbreviations
383
TECHNOLOGY
Military
Defense Technical Information Center http://www.dtic.mil/
DoD Joint Non-Lethal Program Office http://www.jnlwd.usmc.mil/
U.S. Air Force, Electronic System Center, Force
http://esc.hanscom.af.mil/default.asp/
Protection
U.S. Army Corps of Engineers – Protective Design
https://pdmcx.pecp1.now.usace.army.mil/index2.html/
Center
U.S. Army Program Manager, Physical Security
http://www.pmpse.org/
Equipment
SPAWAR Charleston http://sscc.spawar.navy.mil/
Government
Extranet for Security Professionals http://isp.hpc.org/
National Institute of Standards and Technology http://www.nist.gov/
National Institute of Standards and Technology -
http://csrc.nist.gov/
Computer Resource
National Institute of Standards and Technology Rainbow
http://csrc.ncsl.nist.gov/secpubs/rainbow/
Series
Technical Support Working Group http://www.tswg.gov/
Commercial
American Society for Industrial Security http://www.asisonline.org/
CardTech/SecurTech http://www.ct-ctst.com/
Delta Scientific http://www.deltascientific.com/
National Institute of Justice http://www.nlectc.org/
Security Products Magazine http://www.secprodonline.com/
Terrorism Research Center http://www.terrorism.com/
384
AP10. APPENDIX 10
FAMILY SECURITY QUESTIONS
AP10.1. INTRODUCTION
The following are questions that can be asked to help identify practices that may increase the
likelihood that a DoD person or dependent shall become a victim of a kidnapping or other
terrorist act.
AP10.2. HEAD OF HOUSEHOLD
AP10.2.1. Is your telephone number and address in local directories?
AP10.2.2. Do you, your family members, or your domestic employees answer your
telephone with your name and rank?
AP10.2.3. Have you had a security check run on all domestic employees? If overseas, did
you check with the MILGROUP and/or Embassy Regional Security Officer to see if they have
any program to help screen prospective employees' records? If not, contact the local military
police/counterintelligence office or local police to obtain pre-employment screening assistance.
AP10.2.4. Have you maintained a file on each household employee including the full name,
address, description, date and place of birth, current photograph and a full set of fingerprints (if
allowed, host nation laws may prohibit the collection of some data on local nationals, i.e.
fingerprints)?
AP10.2.5. Have outside fuse boxes/circuit breakers been modified so they can be locked at
all times unless access is specifically required?
AP10.3. FAMILY
AP10.3.1. Have you adopted a family security program including duress codes and alarms,
crime watch practices, and conscious efforts to avoid patterns in daily activities?
AP10.3.2. Have all family members learned emergency telephone numbers? Have they been
able to memorize them? Do all family members know how to summon police in the local
language? Are they aware or do they carry instructions in wallet cards on how to work local
telephones and ask for assistance?
AP10.3.3. Have emergency numbers been posted near each telephone? Do these listings
give away the nature of the family's assignment (Ambassador's home phone should not be listed,
385
etc.) Have all family members been given a sanitized list of phone numbers they can carry with
them at all times?
AP10.3.4. Do you have a system for keeping family members informed about each other’s
whereabouts at all times? Have you included a family duress or trouble signal as part of your
family check-in system?
AP10.3.5. Have you removed all symbols or signs from the outside of your residence
indicating nationality, rank or grade, title, and name?
AP10.3.6. Have you unnecessarily disseminated personal, family, and travel plans to casual
acquaintances or domestic employees who do not need to know your personal schedule on an
hourly or daily basis?
AP10.3.7. Have you learned and practiced emergency phrases in the local language such as
"I need a policeman, a doctor, help, etc."? Have you written these down in transliteration as well
as in the native language so you could show a 3 x 5 card to obtain assistance?
AP10.3.8. Do you and your family members know how to work local pay telephones? Does
each family member carry a small quantity of money or phone cards necessary and sufficient to
operate local pay telephones at all times? Alternatively, do family members carry cell phones?
AP10.3.9. Are residence doors and windows locked? Have additional security devices been
added to door and window locks to increase resistance to intrusion and penetration?
AP10.3.10. Do you and your family members close draperies during periods of darkness?
Are the draperies made of opaque, heavy material that provides maximum privacy (and can
reduce the distribution of glass shards in the event windows are broken).
AP10.3.11. Have you considered obtaining a dog for protection of your house and grounds?
AP10.3.12. Do you avoid leaving a spare key in the mailbox or in a similar insecure place?
AP10.3.13. Are tools used by the family, particularly ladders, under lock?
AP10.3.14. Do you have a private place to leave notes for family members or do you tack
notes on the door for family, friends, criminals, and terrorists to read?
AP10.3.15. Have you developed a response plan for yourself and family members in the
event that an unauthorized person is suspected to be inside your home upon your return? Does
your plan emphasize the need to contact the police or the security office immediately and
discourage personal investigation of the possible intrusion?
386
AP10.3.16. Do you or family members automatically open the residence door to strangers?
Do you or your family members use a peephole or CCTC monitor to identify callers? Do you
request to see and verify credentials from utility, service, or other persons seeking to enter your
residence?
AP10.3.17. Do you or your family members admit polltakers and salespersons to your
home? Are you aware of the presence of peddlers and all strangers in your neighborhood? Are
your family members equally aware? (Terrorists are known to have gathered substantial
information relative to their victims using these deceptions.)
AP10.3.18. Have you and your family members reported frequent wrong numbers or
nuisance telephone calls to the telephone company and the police? Have you considered that
someone may be attempting to determine the presence of family members?
AP10.3.19. Have you reported the presence of strangers in the neighborhood? Does it
appear that someone or some group may be trying to gain an intimate knowledge of your
family's habits?
AP10.3.20. Do you and your family members watch for strange cars cruising or parked
frequently in the area, particularly if one or more occupants remain in the car for extended
periods? Have you made a note of occupants, license numbers and province designators of
suspicious vehicles?
AP10.3.21. Do you discuss family activities with strangers?
AP10.3.22. Do you discuss family plans over the telephone?
AP10.3.23. Do you discuss detailed family or office plans over the telephone with people
you do not personally know or know well?
AP10.3.24. Do you mail letters concerning family travel plans from your house or office?
Are you sure that no one is intercepting your outbound mail, opening it, and then resealing it for
delivery after collecting desired information enclosed in it?
AP10.3.25. Have you or family members accepted delivery of unordered or suspicious
packages or letters?
AP10.3.26. Do you destroy all envelopes papers and other items that reflect your name,
rank, SSN and other sensitive information?
387
AP10.3.27. Have you limited publicity concerning yourself and your family, which may
appear in local news media?
AP10.3.28. Do you and your family shop on a set schedule? Do you and your family
members always shop at the same stores? Do you and your family members always use the
same routes to the office, to shopping, to school, and to after school activities?
AP10.3.29. Do you have a coordinated family emergency plan? Have you ensured that all
family members know who to contact if they suspect another family member is in danger? Have
you reviewed protective measures with all family members?
AP10.3.30. Have you made sure that each family member is prepared to evacuate the area
quickly in the event of an emergency? Do you know where all critical documents such as
passports, visas, shot and other medical records are kept? Are these current, and can you or other
family members extract them from their secure storage place on very short notice?
AP10.3.31. Do you find yourself in disputes with citizens of the host country over traffic,
commercial transactions, or other subjects? Have you or your family members precipitated any
incidents involving host country nationals?
AP10.4. CHILDREN
AP10.4.1. Have the children been instructed not only to refuse rides from strangers, but also
to stay out of reach if a stranger in a car approaches them?
AP10.4.2. Have you located the children's rooms in a part of the residence that is not easily
accessible from the outside?
AP10.4.5. Are you sure that outside doors and windows leading into the children's rooms are
kept locked, especially in the evening?
AP10.4.6. Have you taught your children the following?
AP10.4.6.1. Never let strangers into your house.
AP10.4.6.2. Avoid strangers and never accept rides from anyone that he/she does not
know.
388
AP10.5.1.1. Not give out any information on your students to anyone unless you
specifically authorize them to do so in advance? To avoid any kind of publicity in which
students are named or their pictures are shown.
AP10.5.1.2. Not to release a student to someone other than his/her parents without first
receiving authorization from a parent.
AP10.5.1.3. To allow children to talk to a parent on the telephone in the presence of
school officials before allowing an authorized release to actually occur. (This practice provides
protection against a kidnapper who calls and claims to be the child's parent.)
AP10.5.1.4. To report to the police if any strangers are seen loitering around the school
or talking to students. If such strangers are in a car, the teacher should note its make, color,
model, and tag number and pass this information on to the police.
AP10.5.1.5. To have teachers closely supervise outside play periods.
389
AP10.6. NEIGHBORS
AP10.6.1. Have you met your neighbors? Have you gotten them interested in maintaining
and improving neighborhood security?
AP10.7.1. Have all family members and domestic employees been instructed on the
requirement that maintenance work is to be performed only when scheduled by a parent unless a
clear emergency exists? Do you have procedures established on how to be contacted in the event
that a utility emergency occurs and maintenance personnel must enter your residence? Do your
family members and domestic employees know how to verify the identity of maintenance
personnel?
AP10.7.2. Have you and your family discussed the kind of assistance you can offer to a
person who comes to your door claiming to be the victim of an automobile accident, a
mechanical breakdown, or some other kind of accident? Have you explained to your family they
can offer to call the police, the fire department, or an ambulance, but under no circumstances
should they allow the victim into the residence?
390
AP11. APPENDIX 11
HOUSEHOLD SECURITY CHECKLIST
AP11.1. INTRODUCTION
AP11.1.1. This generic household checklist should be used to evaluate current and
prospective residences when a locally specific checklist is not available. Prospective renters
should attempt to negotiate security upgrades as part of the lease contract when and where
appropriate. This could reduce costs to the DoD member by amortizing costs over period of the
lease.
AP11.2. EXTERIOR HOUSEHOLD SECURITY LIST Yes No
AP11.2.1. If you have a fence or tight hedge, have you evaluated it as _____ _____
AP11.2.3. Are the gates solid and in good repair? _____ _____
AP11.2.4. Are the gates properly locked during the day and at night? _____ _____
AP11.2.5. Do you check regularly to see that your gates are locked? _____ _____
AP11.2.6. Have you eliminated trees, poles, ladders, boxes, etc., that _____ _____
AP11.2.10. Do you check regularly to see that the lights are working? _____ _____
AP11.2.11. If you have a guard, does his post properly position him to _____ _____
391
AP11.2.13. Has your guard been given verbal or written instructions, _____ _____
does he understand them?
AP11.2.14. Do you have dogs or other pets that will sound an alarm if _____ _____
AP11.3.3. Do you have an interview grill or optical viewer in your _____ _____
main entrance door?
AP11.3.4. Do you use the interview grill or optical viewer? _____ _____
AP11.3.5. Are your perimeter doors properly secured with good _____ _____
heavy duty dead bolt locks?
AP11.3.6. Are the locks in good working order? _____ _____
AP11.3.7. Can any of your door locks be by bypassed by breaking the _____ _____
glass or a panel of light wood?
AP11.3.8. Have you permanently secured all unused doors? _____ _____
AP11.3.9. Are your windows protected by solid steel bars, _____ _____
ornamental or some other type of shutters?
AP11.3.10. Do you close all shutters at night and when leaving your _____ _____
AP11.3.12. Are your windows locked when they are shut? _____ _____
AP11.3.13. Are you as careful of second floor, or basement windows _____ _____
as you are of those on the ground floor?
392
AP11.3.14. Have you secured sliding glass doors with a broom handle _____ _____
"charlie bar," or good patio door lock?
AP11.3.15. If your residence has a skylight, roof latch, or roof doors, _____ _____
393
AP12. APPENDIX 12
GROUND TRANSPORTATION SECURITY TIPS
AP12.1. INTRODUCTION
Criminal and terrorist acts against individuals usually occur outside the home and after the
individual's habits have been established. Typically, most predictable habit is the route of travel
from home to duty station or to commonly frequented local facilities.
AP12.2. VEHICLES
AP12.2.1. ____ Select a plain car, minimize the "rich American" look.
AP12.2.2. ____ Consider not using a government car that announces ownership.
AP12.2.3. ____ Safeguard keys.
AP12.2.4. ____ Consider carrying a cell phone in your vehicle.
AP12.2.5. ____ Auto maintenance (when turning in a vehicle for maintenance, leave only
the required keys):
AP12.2.5.1. ____ Keep vehicle in good repair. You don't want it to fail when you need
it most.
AP12.2.5.2. ____ Keep gas tank at least 1/2 full at all times.
AP12.2.5.3. ____ Ensure tires have sufficient tread.
AP12.3. PARKING
AP12.3.2. ____ Always lock your car...even when it's outside your house.
AP12.3.3. ____ Don't leave your car on the street overnight, if possible.
AP12.3.4. ____ Never get out without checking for suspicious persons. If in doubt, drive
away.
AP12.3.5. ____ Avoid leaving keys with valet or parking attendants. If you must, leave only
necessary vehicles keys.
AP12.3.6. ____ Don't allow entry to the trunk unless you're there to watch.
AP12.3.7. ____ Never leave garage doors open or unlocked.
394
AP12.3.8. ____ Use a remote garage door opener if available. Enter and exit your car in the
security of the closed garage.
AP12.4. ON THE ROAD
AP12.4.1. ____ Before leaving buildings to get into your vehicle, check the surrounding
area to determine if anything of a suspicious nature exists. Before leaving your vehicle, look
around carefully to be confident you are not headed directly into a threatening situation.
AP12.4.2. ____ Before entering vehicles, check for suspicious objects on the seats. You
may also look underneath the seats. Look for wires, tape or anything unusual.
AP12.4.3. ____ Guard against the establishment of routines by varying times, routes, and
modes of travel. Avoid late night travel.
AP12.4.4. ____ Travel with companions or in convoy when possible.
AP12.4.5. ____ Avoid isolated roads and dark alleys when possible.
AP12.4.6. ____ Know locations of safe havens along routes of routine travel.
AP12.4.7. ____ Habitually ride with seatbelts buckled, doors locked, and windows closed.
AP12.4.8. ____ Do not allow your vehicle to be boxed in; maintain a minimum 8-foot
interval between your vehicle and the vehicle in front; avoid the inner lanes.
AP12.4.9. ____ Be alert while driving or riding.
395
AP12.4.12.3. ____ Execute immediate turn and escape; jump curb at 30-45-degree
angle, 35 mph maximum.
AP12.5.2. ____ Select busy stops. Avoid standing in a group while waiting.
AP12.5.3. ____ Don't always use the same taxi company.
AP12.5.4. ____ Don't let someone you don't know direct you to a specific cab.
AP12.5.5. ____ Ensure taxi is licensed and has safety equipment (seat belts at minimum).
AP12.5.6. ____ Ensure face of driver and picture on license are the same.
396
AP13. APPENDIX 13
PERSONAL VEHICLE TIPS AND DRIVING SECURITY CHECKLIST
AP13.1. INTRODUCTION
An extremely important aspect of personal security is the need for regular vehicle inspections.
Many terrorist actions are accomplished by placing bombs in individual vehicles. This provides
the terrorist less risk and increases the chance of "hitting" the appropriate target. The following
are some relatively simply steps that every driver can take to reduce the likelihood of being hurt
by a terrorist act centered on a personal automobile.
AP13.2. VEHICLE INSPECTION TIPS
AP13.2.1. Every time you use your automobile, you should make a precautionary inspection.
Bomb emplacement by terrorists is often rudimentary or hastily done, thereby providing the
opportunity for easy detection. Make a habit of checking the vehicle and the surrounding area
before entering and starting the vehicle.
397
The following items are suggested procedures to be used in operating personal and government
motor vehicles in areas where terrorist activity is a concern. While adhering to these practices
shall not necessarily prevent a terrorist incident, continual practice and attention to detail
demanded by the procedures below shall enable many potential victims to escape to safety.
AP13.3.1. Keep the gasoline tank of your vehicle full or near full.
AP13.3.2. Keep the vehicle locked at all times. Do not park on the street at night. Vehicles
in locked garages should also be kept locked. Use parking lots with attendants and where the
vehicle can be kept locked. Lock unattended vehicles. No matter how short the time.
AP13.3.3. Check up and down the street before moving out of a house and/or building into
your vehicle.
AP13.3.4. While approaching a vehicle, check its outside for evidence of tampering. Look
for wires, strings, or objects attached to or hanging from vehicle.
AP13.3.5. Do not touch any unusual items protruding from the vehicle, call immediately for
assistance.
AP13.3.6. Before entering the vehicle, check the floor (front and rear) to make certain the
vehicle is not occupied.
AP13.3.7. As you drive away from the curb, be immediately alert for surveillance of your
vehicle. Look for multiple vehicle surveillance, as most attacks on vehicles have included two or
more vehicles.
AP13.3.8. Stay alert and be prepared to take evasive actions. Keep noise level within
vehicle low. Eliminate loud playing of the radio or unnecessary conversation.
398
AP13.3.9. Keep the vehicle locked while driving and the windows closed. If open, keep
them rolled to within two inches of the top. This practice prevents objects from being thrown
into your vehicle.
AP13.3.10. When possible, drive in the lane nearest the center of the roadway. This practice
puts attackers at a disadvantage, avoid being boxed in. Stay in the left lane where it is difficult
for pursuing vehicles to run your vehicle off the road on multi-lane highways.
AP13.3.11. If you encounter a roadblock manned by uniformed police or military personnel,
you should stop and remain seated inside your vehicle. If asked for identification, roll the
window down enough to pass your identification to the officer. Do not unlock the doors.
AP13.3.12. Avoid suspicious roadblocks. Do not stop. Turn and go back or turn a corner to
leave the area as quickly as possible.
AP13.3.13. A good driver is constantly aware of possible routes of escape or evasion while
behind the steering wheel.
AP13.3.14. In the event of a firefight between local authorities and terrorists, get down and
stay low. Unless you are in the direct line of fire, it is suggested that you do not move.
Experience has shown that often times anything that moves gets shot.
399
AP14. APPENDIX 14
AIR TRAVEL SECURITY TIPS
AP14.1. INTRODUCTION
Air travel, particularly through high-risk airports or countries, poses security problems different
from those of ground transportation. Here are some simple precautions that can reduce
vulnerabilities of a terrorist assault.
AP14.2. MAKING TRAVEL ARRANGEMENTS
AP14.2.1. Use office symbols on orders or leave authorizations if the word description
denotes a high or sensitive position.
AP14.2.2. Get an AOR specific threat briefing from your security officer, antiterrorism
officer, or the appropriate counter-intelligence or security organization prior to overseas. This
briefing is required prior to travel overseas and must occur within three months of travel
according to reference (e).
AP14.2.3. Before traveling, consult the DoD Foreign Clearance Guide (available at
www.fcg.pentagon.mil) (reference (az)) to ensure you know and can meet all requirements for
travel to a particular country.
AP14.2.4. Use military air, USTRANSCOM/AMC military contract, or U.S. flag carriers if
available and consistent with mission requirements.
AP14.2.5. Avoid scheduling through high-risk areas. If necessary, use foreign flag airlines
and/or indirect routes to avoid high-risk airports.
AP14.2.6. Don't use rank or military address on tickets, travel documents, or hotel
reservations.
AP14.2.7. Seats in the center of the aircraft tend to offer the greatest protection since they
are farther from the usual center of hostile action, which is most often near the cockpit or
terrorists at the rear of the aircraft.
400
AP14.4.1. Use plain, civilian luggage; avoid military looking bags, B-4 bags, duffel bags,
etc.
AP14.4.2. Remove all military patches, logos, or decals from your luggage and briefcase.
AP14.4.3. Ensure luggage tags don't show your rank or military address.
AP14.4.4. Don't carry official papers in your briefcase.
AP14.5. CLOTHING
AP14.5.1. Travel in conservative civilian clothing when using commercial transportation or
when traveling military airlift if you have to connect with a flight at a commercial terminal in a
high-risk area.
AP14.5.2. Don't wear distinct military items such as organizational shirts, caps, or military
issue shoes or glasses.
AP14.5.3. Don't wear U.S. identified items such as cowboy hats or boots, baseball caps,
American logo T-shirts, jackets, or sweatshirts.
AP14.5.4. Wear a long-sleeved shirt or bandage if your have a visible U.S. affiliated tattoo.
401
AP14.6.2. Look for nervous passengers who maintain eye contact with others from a
distance. Observe what people are carrying. Note behavior not consistent with that of others in
the area.
AP14.6.3. No matter where you are in the terminal, identify objects suitable for cover in the
event of attack. Pillars, trash cans, luggage, large planters, counters, and furniture can provide
protection.
AP14.6.4. Don't linger near open public areas. Proceed through security checkpoints as
soon as possible in order to be in a more secure area.
AP14.6.5. Be extremely observant of personal carry-on luggage. Thefts of briefcases
designed for laptop computers are increasing at airports worldwide. Likewise, luggage not
properly guarded provides an opportunity for a terrorist to place an unwanted object or device in
your carry-on bag. As much as possible, do not pack anything you cannot afford to lose; if the
documents are important, make a copy and carry the copy.
AP14.6.6. Avoid secluded areas that provide concealment for attackers.
AP14.6.7. Be aware of unattended baggage anywhere in the terminal.
AP14.6.8. Observe the baggage claim area from a distance. Do not retrieve your bags until
the crowd clears. Proceed to customs lines at the edge of the crowd.
AP14.7.3. If you see grenades, seek immediate cover, lay flat on the floor, feet and knees
tightly together with soles toward the grenade. In this position, your shoes, feet, and legs protect
the rest of your body. Shrapnel shall rise in a cone from the point of detonation, passing over
your body.
402
AP14.7.4. Place arms and elbows next to your ribcage to protect your lungs, heart, and chest.
Cover your ears and head with your hands to protect neck, arteries, ears, and skull.
AP14.7.5. The responding security personnel shall not be able to distinguish you from
attackers. Do not attempt to assist them in any way. Lay still until told to get up.
AP14.8. AIRPLANE HIJACKINGS
AP14.8.1. Determining the best response in a hostage situation is a critical judgment call.
Passengers need to remain extremely alert and rational to try to understand the intentions of the
hijackers. Sitting quietly may be prudent in most circumstances, but it is conceivable the
situation may require actions to prevent hijackers from taking control of the aircraft. In all
situations, it is important for individuals to remain alert to unexpected events, think clearly, and
act responsibly. If hijackers are flying the plane, a suicide attack with the aircraft is highly
probable, and a coordinated attack by the passengers may be appropriate.
AP14.8.3. Be aware that all hijackers may not reveal themselves at the same time. A lone
hijacker may be used to draw out security personnel for neutralization by other hijackers.
AP14.8.4. Surrender your tourist passport in response to a general demand for identification.
AP14.8.5. Don't offer any information; confirm your military status if directly confronted
with the fact. Be prepared to explain that you always travel on your personal passport and that
no deceit was intended.
AP14.8.6. Discreetly dispose of any military or U.S. affiliated documents.
AP14.8.7. Don't draw attention to yourself with sudden body movements, verbal remarks, or
hostile looks.
AP14.8.8. Prepare yourself for possible verbal and physical abuse, and lack of food, drink,
and sanitary conditions.
AP14.8.9. If permitted, read, sleep, or write to occupy your time.
AP14.8.10. Discreetly observe your captors and memorize their physical descriptions.
Include voice patterns and language distinctions, as well as clothing and unique physical
characteristics. Observe how heavily they’re armed.
403
AP14.8.12. Be aware there may be Federal authorities, such as Air Marshals, on the aircraft
that may be best suited to take action.
AP14.8.13. Cooperate with any rescue attempt. Remain still and follow instructions of
rescuers. If possible, lie on the floor until told to rise.
404
AP15. APPENDIX 15
USE OF PROTECTIVE SECURITY DETAILS (PSDs)
AP15.1. INTRODUCTION
AP15.1.1. The use of PSDs is a policy decision. There are pros and cons to their use. The
employment of large numbers of PSD members to protect a few senior officers or DoD officials
may deter all but the most determined terrorist attack. On the other hand, the use of one or two
PSD members may attract attention to the protected person that might otherwise not be given to
that individual.
AP15.1.2. DoD personnel can be their own bodyguards if they follow the self-protection
strategy outlined in this Handbook. Supplemented by a chauffeur trained in defensive driving
and other security techniques, DoD executives should be relatively safe in most situations.
AP15.1.3. In high crisis situations, in areas where kidnapping is rampant, and during period
of direct threats, use of PSDs for high-risk personnel should be strongly considered.
AP15.1.4. It is critical that members of PSDs be thoroughly trained to do their job. PSD
training is intensive and cannot be done overnight, nor can individuals who have been trained
retain levels of proficiency in driving, firearms, and close combat without continuous training.
The PSD members must be physically and mentally fit so that their bodies and minds shall
respond positively in crisis situations.
AP15.1.5. Since PSD members must both protect protectees and be their companions in
personal and professional situations they must be particularly honest and discrete.
AP15.1.6. The training of bodyguards should begin by defining their role -- both as a
technical aid to the executive they serve and as an individual who can direct the executive they
protect to self-help. In an attack, PSD members may be killed or incapacitated. In their
protective roles, PSD members should be constantly teaching protectees to protect themselves, to
avoid attack, to respond to an attack, and to conduct themselves properly if captured.
AP15.2. PSD MEMBER TRAINING OBJECTIVES
AP15.2.1.2. Assassinations/executions.
405
406
AP15.3.1.2.5. Executive.
AP15.3.1.2.5.1. Residence.
AP15.3.1.2.5.2. Movement.
AP15.3.1.2.5.3. Work.
AP15.3.1.2.5.4. Social functions.
AP15.3.1.2.5.5. Recreation.
AP15.3.1.2.6. Family.
AP15.3.1.2.6.1. Residence.
AP15.3.1.2.6.2. Movement.
AP15.3.1.2.6.3. Shopping and/or school.
AP15.3.1.2.6.4. Social functions.
AP15.3.1.2.6.5. Recreation.
AP15.4. PSD MEMBERS AND THEIR RESPONSIBILITIES
AP15.4.1. Relationship to Executive PSD members may be asked to perform a wide variety
of tasks in the context of providing additional security protection to senior officers and DoD
officials. Protective services may be provided from the following positions or functions:
407
AP15.4.1.2. As driver.
AP15.4.1.3. As all around bodyguard.
AP15.4.2. Discipline.
AP15.4.2.1. Conduct.
AP15.4.2.1.1. PSD members must be skilled in negotiation with protectees, their
families, their colleagues, and their acquaintances over the proper balance between security
considerations on the one hand, and family, social, and business activities on the other. They
must retain their composure at all times, even if protectees and those around them do not,
especially over matters of appropriate security arrangements for home, official business away
from the office, and recreational activities.
AP15.4.2.1.2. PSD members must also be skilled in remaining focused on the need
for protection, regardless of the behaviors or personal practices of protectees. In addition, PSD
members shall have an opportunity to observe senior officers, DoD officials, and their families in
close, personal situations. As there are often significant differences between public and private
personalities, PSD members may be placed in positions where their ideals, personal values,
expectations, and preferences differ significantly from the person or people they are protecting.
AP15.4.2.1.3. PSD members must be prepared to perform other duties as may be
required to preserve their anonymity on the one hand, and the anonymity of the protectee on the
other. If a protectee is scheduled to attend a meeting for which a secretary might be used to take
notes, a member of the PSD team may be assigned the task of note taking, thereby keeping the
size of the protectee's entourage small. By performing secretarial duties in connection with a
PSD assignment, the PSD member does not reveal his or her special training to outside
observers. In addition, he or she does not reveal U.S. Government concerns about the risk or
vulnerability of the protected person to a terrorist attack.
AP15.4.2.2. Appearance.
AP15.4.2.2.1. PSD members must appear to be part of their protectees entourage.
They must "fit in" with the protectee’s functions, roles, and lifestyles. As noted above, they may
be asked to perform other duties not directly related to security in order to disguise their primary
security duties.
408
AP15.4.2.2.2. PSD members should dress, groom, and act as part of the protectee’s
environment. Consider longer hairstyles, functional jewelry, low-key manicures, and even
civilian attire for PSD members assigned to senior DoD officials. Consider more mature
members of PSD details for assignment to senior officers as "aides" or "assistants" as well as
younger members of PSDs as drivers and couriers.
AP15.4.2.3. Organizational Security Plans and Contingencies.
AP15.4.2.3.1. PSD members need to be kept informed of physical security and
personnel security arrangements as they develop and change. It is essential that PSDs know the
location of response forces and backup response forces, the communications links to reach such
forces, communication links with local, municipal, and host country security resources (as
necessary). PSD members should be given detailed information on the location of safe havens,
pre-surveyed evacuation sites, pre-surveyed evacuation routes, and identified backup or
alternatives.
AP15.4.2.4. Tools and Techniques. PSD members bring a wide range of "tools" and
“techniques” to their responsibilities of protecting senior officers and DoD officials. At the same
time, protectees and their organizations need to be sensitive to some of the requirements or
special considerations that PSDs may have in order to carry out their assignments. The
following are some, but perhaps not all, of the considerations PSDs and host organizations need
to examine.
AP15.4.2.4.1. At fixed post.
409
AP15.4.2.4.3.1.4. Glass.
AP15.4.2.4.3.1.5. Concealed weapons.
AP15.4.2.4.3.1.6. Armor.
410
AP15.4.2.4.3.1.7. Lights.
AP15.4.2.4.3.1.8. Noise and/or sirens.
AP15.4.2.4.3.1.9. Communications.
AP15.4.3.4.3.2.12. Photography
AP15.5. WHAT PSD MEMBERS MUST TEACH PROTECTEES
AP15.5.1. PSD members and their protectees must jointly develop routines to detect,
classify, assess, and respond to threats to the protectees security. The following issues must be
addressed and plans jointly developed and practiced.
AP15.5.1.1. Duress signals.
AP15.5.1.2. Call-in.
AP15.5.1.3. Carrying duress notes written on money.
411
412
AP16. APPENDIX 16
PHYSICAL SECURITY EVALUATION GUIDE (DD FORM 2637)
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
AP17. APPENDIX 17
WATERSIDE PHYSICAL SECURITY MEASURES AND EVALUATION
GUIDE
AP17.1. INTRODUCTION
AP17.1.1. DoD facilities and installations located adjacent to bodies of water such as ports,
airfields, R&D facilities, and training areas face all of the terrorist threats as land-locked
facilities or installations. In addition, they must be defended against waterside assault.
AP17.1.2. Measures discussed in this appendix are intended to address the following types of
terrorist threats and potential consequences below.
Ships, boats, shore facilities and Depends on the target selected by the
Swimmers
harbor facilities. terrorists.
439
AP17.1.3. This Appendix also builds on the concept of a physical security system
intended to protect a broad range of DoD assets as listed in table AP17.T2.
440
• Airfields
AP17.1.4. Terrorist attacks from the waterside of DoD facilities are not fundamentally
different than terrorist attacks from the landside of an installation or facility. The waterborne
terrorist attack poses some difficult challenges for the physical security system designed to
protect the DoD asset from attack. In the following section the physical security system
functions are reviewed, and some of the differences between waterborne and landside terrorist
attacks are identified and discussed.
AP17.2. SECURITY SYSTEM FUNCTIONS
AP17.2.1. Security system functions performed in the protection of a landlocked DoD
installation or facility must also be performed when the installation has an interface with a body
of water or is itself surrounded by water. Threat detection, classification and identification,
response, delay, and incident resolution must be performed.
AP17.2.2. The medium of water presents unique challenges and some opportunities for the
physical security system. The principal problem in protecting DoD assets from terrorist attacks
from the water is detecting, classifying, and responding to the threat. Detection is often difficult
because it is difficult to establish security perimeters and keep legitimate users from wandering
into the security zone by accident. Classification of an intrusion as hostile is difficult because
there are a myriad of legitimate reasons that might account for the presence of craft or persons in
a declared security zone such as mechanical failure, disorientation, wind or current drift, or even
illness.
AP17.2.3. The medium of water makes stressful demands on physical resources and
equipment used to build a physical security system. As shall be discussed in greater detail
below, many of the techniques used to erect barriers, detect and classify intrusions, and respond
to intrusions at landlocked installations or facilities are not feasible on the waterside of a DoD
441
installation. On the other hand, some surveillance systems that do not work particularly well at
land locked installations may be applied with good success on the waterside of DoD
installations, facilities, or assets afloat.
AP17.2.4. Table AP17.T3. below identifies some of the special concerns related to security
system functions and each of the threats identified above. In the section that follows, the
discussion shall identify waterside physical security system components, the integration of the
components into a physical security system, and the operation of the physical security system in
response to various threats identified above.
Security System
Threat Type Security System Challenge
Function
442
Security System
Threat Type Security System Challenge
Function
443
Security System
Threat Type Security System Challenge
Function
means.
AP17.3.1. Barriers. Barriers on the waterside of a DoD installation, facility, or asset afloat
perform many basic functions performed on land, such as: establish boundary; isolate activity
and discourage visitors; and impede passage by boat or swimmer.
AP17.3.1.1. Some of the functions performed by barriers on the landside of a DoD
installation cannot be readily performed on the waterside. Barriers on the waterside to obscure
activities on land are difficult to erect on the water. They can be installed at the land/water
interface or at the mean high-water mark. Similarly, intrusion detection devices cannot be easily
installed on most barriers used to establish boundaries of a DoD installation or facility when
those boundaries extend several hundred meters to more than 1000 meters into the water. Some
intrusion detection devices can be mounted on fixed installations that extend into the water such
as wharves or piers or navigation aid platforms.
AP17.3.1.2. The fact that the barriers have to work on the surface and beneath the
surface against a wide variety of threats without harming benign intrusions complicates the
design and implementation of barriers.
444
AP17.3.2. Boundaries.
AP17.3.2.1. Several devices can be used to establish boundaries separating the DoD
installation, facility, or asset from the surrounding or bordering waters. Among the devices that
can be used to establish a boundary are the following:
AP17.3.2.1.1. Buoys or floats.
AP17.3.2.1.2. Nets (where allowed).
AP17.3.2.1.3. Anchored or pile mounted navigation aids and signaling devices.
AP17.3.2.1.4. Log booms, blue barrels, 55-gallon drums, Dunlops.
AP17.3.2.1.5. Barges.
AP17.3.2.1.6. Gig-boats, whaleboats, and other small workboats at anchor.
AP17.3.2.1.7. Roving patrols by security boats.
AP17.3.2.2. Once boundaries are established, they can be used to provide areas of
operation for floating security patrols as well as Contact and Escort (C & E) services and
Tactical Reaction activities.
AP17.3.2.3. It must be emphasized that rules of navigation allow for inadvertent and
innocent penetration of certain types of barriers, as may occur with small craft engine failure, sail
boats, and in some waters, “weekend” sailors whose enthusiasm for water sports exceeds their
navigational and operational skill. Unlike fences around DoD installations, penetration of
floating or fixed perimeter barriers on the waterside of a DoD installation or facility cannot
immediately be assumed to be hostile.
AP17.3.3. Isolate Activity and Restrict Access.
AP17.3.3.1. Some of the barriers noted above can be used to restrict waterside access to
DoD installations. For example, use of floating nets (where allowed), especially those made of
wire mesh and anchored to the floor of the body of water, can be used to deny access to swimmer
delivery vehicles, small commercial-type submarines, or divers. Barges can be used to create a
physical barrier of considerable penetration resistance to small craft. The barges should be
secured bow to stern with the lead and aft barges being secured to the pier or landside mooring
point. The primary purpose for deploying a barrier of this type is to absorb a large portion of the
blast from an explosive laden vessel that has managed to elude initial defenses.
445
AP17.3.3.2. Use of patrol boats is probably the most effective means of isolating a DoD
activity and discouraging uninvited visits from benign or curious intruders. Effective use of
patrol boats require the establishment of a perimeter, surveillance of activity beyond the
perimeter to identify potential intrusions, and dispatch of C& E boats to the intruder at some
distance away from an inner zone (Reaction Zone) which is the range of weapons thought to be
in the hands of terrorists. As a general rule, it is recommended that boats be allowed no closer
than 500 meters to a DoD asset being protected from terrorist attack.
AP17.3.4. Impede Passage.
AP17.3.4.1. Several of the barriers described above can be used to slow or impede
access to DoD facilities by boats or swimmers. Nets (where allowed) are among the best barriers
for this purpose. Well-marked partially submerged objects can also be used; there are legal
implications regarding the emplacement of barriers, which constitute a hazard to navigation;
such devices should be employed only after exhaustive consultations with appropriate legal
authorities.
AP17.3.4.2. Again, patrol activity by C & E boats or Tactical Reaction Boats can be very
effective.
Patrols by boats. Shore patrols Patrols by boat. Shore patrols, observers equipped with
seeking evidence of swimmers night vision devices on shore and lookouts with night
having been inserted from vision devices posted aboard ships. Acoustic underwater
nearby shore positions. sensors.
Swimmers
Acoustic underwater sensors.
446
AP17.3.7. Response.
AP17.3.7.1. Establishment of Security Zones.
at least 1000 meters from the nearest DoD asset; in some port areas this large security zone is not
possible, and a smaller security zone must be adopted.
AP17.3.7.1.2. Within the security zone, extending from the high water mark to a
distance beyond the maximum range of anticipated waterborne threats is a reaction zone. Within
this zone, security forces shall stop and challenge intruders, taking all actions necessary to stop a
potential threat.
AP17.3.7.1.3. The zone closest to protected assets extended from the asset to the
maximum range of anticipated threat weapons (hundreds of yards for small arms and rocket
propelled grenades to several thousand yards for man-portable anti-tank weapons) is a “keep-
out” zone. Security forces should endeavor to prevent the entry of hostile craft or vessels into
this zone; local defenses may be engaged if hostile craft or vessels enter this zone. Techniques
described below may be used to disrupt swimmer attacks within this zone.
448
¾ Body armor
AP17.3.7.2.7. Boats and craft employed as tactical response boats may also be
equipped with crew-serve weapons i.e., machine guns or other similar armaments as appropriate.
449
AP17.4.1.1.1. Designate Sectors. Divide the water approaches to the asset into
sectors utilizing sector boundary lines that converge at the asset. Each sector should be lettered.
AP17.4.1.1.2. Number of Sectors Required. Normally no more than 4 sectors are
necessary in the inner perimeter. The number of sectors within the Security Zone need not
necessarily coincide exactly with those in the reaction zone. It may vary accordingly with the
number of small boats available for patrol.
AP17.4.1.1.3. Patrol Areas. Small boats should patrol the outer boundary of the zone
within the sector to which they are assigned.
AP17.4.1.1.4. Patrol Boat Designations. The patrol boats should be referred to using
a basic numbering system (i.e., Boat 1, Boat 2, etc.). Randomly changing call signs is not
tactically necessary and shall only confuse crews conducting tactical operations. Most security
zone enforcement is conducted with one or two small boats patrolling the perimeter. The
techniques for patrolling a security zone are as follows:
AP17.4.1.1.4.1. One-Boat Security Zone. In one-boat security zone enforcement,
the security boat shall maintain a position near the centerline of the zone at the outer boundary.
450
This position allows maximum visibility for observing the established security zone and for
warning local vessel traffic.
AP17.4.1.1.4.2. Two-Boat Security Zone. In two-boat security zone
enforcement, the zone should be divided into two halves with each security boat maintaining a
position near the centerline of their assigned half at the outer boundary. If either boat must leave
their assigned position, the second security boat should move to the centerline of the whole zone
at the outer boundary as in one-boat enforcement. The second boat should return to its original
assigned position only after the previously engaged security boat has returned to its original
assigned position.
AP17.4.1.1.5. Intercept Procedures. If the security boat leaves its position to
intercept an incoming vessel, to escort a vessel transiting the zone, or to inform a vessel without
VHF-FM radio communications of security zone restrictions, the coxswain should return to the
centerline position as soon as possible to allow for full monitoring of the zone.
AP17.4.1.1.6. Maneuvering. If safe and practical, all turns should be made to the
outside of the zone so that the boat crew never has its back toward the outer boundary of the
zone and can maintain surveillance of the zone boundaries.
AP17.4.1.1.7. Moving Security Zone. In a moving security zone (protected asset
underway), a two-boat minimum is recommended. Additional security vessels may be used if
the threat indicates a need.
AP17.4.1.1.7.1. Position. The first boat, preferably the largest assigned, shall
maintain a position directly forward of the protected asset. The second boat, preferably the
fastest assigned, shall take position directly aft. Additional security vessels, if and when needed,
shall support fore and aft security vessels by deploying on the asset's port and starboard beam.
AP17.4.1.1.7.2. Duties. The first boat leads the moving zone through visual
presence (flashing blue light/official U.S. Coast Guard markings) and communications with
compliant vessels. The second boat is responsible for intercepting any vessels attempting to
enter or interfere with the moving security zone. The second boat shall maintain 360° visual and
radar lookout at all times.
451
AP17.4.2.1.1. Screen Vessel Responsibilities. The vessel patrolling the sector being
penetrated, in the outer most zone (i.e., the reaction zone for two-boat operations, the security
zone for three boat operations) shall intercept the incoming vessel at the outer boundary of the
security zone, directly on a line between it and the asset. The intercepting vessel (known as the
screen vessel) is charged with the responsibility of determining if the incoming vessel is hostile
or not (this process shall be discussed later). If the incoming vessel is determined to be hostile,
the screen vessel shall then "clear" the "field of fire" by turning at a 90 degree angle to the course
452
of the incoming vessel. This turn shall always be to the outside of the assigned sector, away
from the center line, so as not to cross into the field of fire and to deliver supporting fire if
necessary (the direction of turn may be changed if on scene conditions and zone configuration so
dictate).
AP17.4.2.1.2. Screen Vessel Tactics. These tactics have been developed around the
realization that the command decision to designate an intruder as hostile and to use appropriate
force to neutralize the threat shall be extremely difficult, and the evaluation time is likely to be
limited to 1 to 2 minutes.
AP17.4.2.1.3. Screen Vessel Movements. The approach to the inbound vessel by the
screen vessel should initially be "head on" utilizing siren, blue light, radio/loud hailer, and
flood/spot light (into the cabin). As the incoming vessel turns to avoid a head on situation the
screen vessel should turn in the same direction on a parallel course, staying between the inbound
vessel and the protected asset. The screen vessel should "herd" the incoming vessel out of the
security zone. Never allow the potential aggressor a clear line of progression to the asset; this is
another method of screening out the innocent boater and a further step in the identification of the
intruder vessel as having hostile intent. The obvious actions of a fully marked and identified
U.S. Coast Guard boat or similar host-nation vessel if overseas with blue light, weapons at the
ready, and siren/loud-hailer/radio calls in the blocking of an incoming vessel's track-line is a
positive indication of Coast Guard/host nation enforcement or interdiction action. If the
aggressor evades the screen and proceeds toward the asset, the screen vessel must immediately
communicate with the command center and clear the TRB's field of fire in the manner previously
discussed. If so directed by the command center, if there is a clear field of fire, and if a warning
(both loud-hailer and radio) has been given, the screen vessel may take the hostile inbound vessel
under fire in support of the TRB.
AP17.4.2.2. TRB Response to Intrusion.
AP17.4.2.2.1. Initial Reaction. While the screen vessel is maneuvering, the TRB
patrolling the reaction zone shall be stationed directly on a line between the aggressor and the
asset at the outer boundary of the reaction zone. This shall provide a stationary weapons
platform for directing fire on the hostile vessel should the command center direct. Once the
screen vessel is clear, the TRB may take the aggressor under fire, if necessary and approved by
the command center. If any degree of doubt exists as to the status of the intruder, he can be kept
under observation of the TRB and fired upon if hostile intent is confirmed. Keep in mind, that at
453
this point the potential aggressor has been well screened and been given ample warning. If the
screen vessel must break off, hostile intent by the inbound vessel is likely.
AP17.4.2.2.2. TRB Response Techniques. Once the screen vessel has initiated
contact with an inbound vessel, the designated TRB shall assume a station along the reaction
zone boundary directly between the screen vessel's/inbound vessel's location and the asset.
AP17.4.2.2.3. TRB Aspect. The aspect that the TRB assumes in relation to the
incoming vessel shall vary depending upon the type of small boat used (i.e., head on for small
utility boat, broadside for larger utility boat or patrol boat). The important factor is that the small
boat's weapons (usually M-60's) must be able to cover the incoming vessel wherever it
maneuvers.
AP17.4.2.2.4. TRB Movements. Once in position, the TRB should come dead-in-
the-water (DIW) and maneuver only to maintain a position between the incoming vessel and the
asset. This is simplified by the fact that larger course changes by the incoming vessel can be
compensated for by relatively small movements along the zone boundary. Attempting to bring
the aggressor under fire from a moving platform is not recommended. Experience and testing
have shown that accurate weapons fire is extremely difficult from a moving small boat.
AP17.4.2.2.5. Command TRB Response. A single boat (if available) shall be
retained in close proximity to the protected asset. This boat (Command TRB) shall be held in
reserve to engage follow-on aggressors in a sector already engaged with aggressors and to
perform other Command TRB functions as may become necessary.
AP17.4.2.3. Night Operations. Night operations vary from daylight operations in the
method of locating and identifying potential aggressors. Unless sufficient boats are available to
allow patrolling of the entire boundary of the security zone, the movement of the screen vessels
must be controlled by a central command radar system (e.g., ship's radar). Due to the limitations
of small boat radar, the screen vessels should be directed by an established command center to
intercept approaching vessels. Observation posts should be employed along the shoreline at
strategic locations to prevent aggressors from making contact along the shoreline. All screen
vessels should be equipped with parachute illumination flares for use during hostile activity to
illuminate aggressors. Night vision devices should also be used to assist in visually acquiring
incoming vessels.
AP17.4.2.4. Swimmer Deterrence and Countermeasures. The threat to vessels,
waterfront facilities, port complexes, bridges, and other assets in the maritime environment from
454
hostile swimmers is a viable one. Swimmers present a method by which aggressors may conduct
a wide range of terrorist and/or LIC operations without the use of complex hardware. It is
important that while committing resources to surface craft and waterside threats, the underwater
threat is not forgotten.
AP17.4.2.4.1. General Swimmer Capabilities. The nominal speed for a swimmer,
depending on distance and equipment carried, is 1 knot. Even a minor current shall cause the
swimmer to limit his attack direction. Swimmers shall take advantage of currents to reach their
targets. This should be taken into consideration when orienting a defense. However, if
intelligence indicates that hostilities are sophisticated enough to have swimmer delivery vehicles
or swimmer propulsion units, a 360° defense (including under pier areas) should be maintained.
AP17.4.2.4.2. Swimmer Countermeasures. Security patrols in support of swimmer
defense should be conducted as follows:
AP17.4.2.4.2.1. Waterside Patrols. The alert port security patrol is an important
element in defending against a swimmer attack. Properly equipped, the port security patrol
offers the most sophisticated detection, classification, and neutralization capability yet
developed. They can operate in daylight or darkness, are capable of kill or capture (depending
on the ROE) and can alert others to a swimmer threat. Patrol effectiveness is determined by
location, equipment, understanding of the threat, and alertness. Port security personnel should
patrol in darkened areas, shielded from artificial lighting and as far forward in the area of threat
as possible to eliminate background noise and other detection obstructions. When applicable and
available, binoculars, night vision devices, and/or thermal imagers should be utilized to assist in
detection. Anything that appears to be moving toward the protected asset should be treated as a
possible attack. Drifting debris is often used to camouflage a swimmer or mine and should be
immediately investigated.
AP17.4.2.4.2.2. Waterside Patrols. If there is an identified swimmer threat, boats
should be assigned to the swimmer defense mission. They should patrol likely launch points for
both surface craft and all-terrain vehicles delivering hostile swimmers. The random presence of
a vessel with turning screws and an alert crew is a respectable deterrent to unsophisticated divers.
If the threat is high and believed to be from accomplished divers, the boats assigned to swimmer
defense should drag heavy lines with attached grapple hooks or large fishing hooks. The area or
district commander may only authorize the use of draglines for swimmer defense within
CONUS.
455
456
contingency, and may be modified for local use as necessary. Although the following guide
addresses Port Security, the analytical techniques and security issues identified are equally
applicable to DoD installations and facilities that are adjacent to water areas including rivers,
lakes, bays, or similar bodies of water but have no significant port facilities. As used in this
questionnaire, Port refers to waterside security areas.
457
458
459
460
461
462
463
464
465
466
AP18. APPENDIX 18
SPECIFIC CONSTRUCTION PROTECTIVE MEASURES
467
AP18.2.1.2. Vantage Points. Vantage points are natural or man-made positions from
which potential aggressors can observe and target people or other assets in and around a
building. Identify vantage points outside the control of personnel in the targeted building and
either eliminate them or provide means to avoid exposure to them. Means to avoid exposure
may include actions such as reorienting the building or shielding people or assets in and around
the building using such measures as reflective glazing, walls, privacy fencing, or vegetation.
AP18.2.1.3. Visitor Populations. Activities with large visitor populations provide
opportunities for potential aggressors to get near buildings with minimal controls and therefore
limit opportunities for early detection. Maximize separation distance between inhabited
buildings and areas with large non-DoD visitor populations.
AP18.2.1.4. Commercial Transportation Nodes. Avoid sites for inhabited buildings that
are close to railroads, ports, airfields, and major road networks. Where any of these
transportation nodes are in the vicinity of existing buildings, provide adequate standoff distances
from inhabited buildings required to controlled perimeters. Where those standoff distances are
not available and since moving things (such as existing railroads) may be difficult and
prohibitively expensive, ensure that there are procedures in place to prohibit trains or other
similar transportation vessels from stopping in the vicinity of inhabited structures.
AP18.2.1.5. Unobstructed space. Aggressors will not generally place assets in areas near
buildings where their explosive devices could be visually detected by building occupants
observing the area around the building. Obstructions within 10 meters (33 feet) of buildings
should not be permitted that allow for concealment from observation of explosive devices 150
mm (six inches) or greater in height. This does not preclude the placement of site furnishings or
plantings around buildings. It only requires conditions such that any explosive devices placed in
that space would be observable by building occupants. Unobstructed space also addresses
electrical and mechanical equipment, and equipment enclosures to eliminate opportunities for
placement and concealment of explosive devices.
AP18.2.2. Vehicle Considerations.
AP18.2.2.1. Vehicle Access. The first line of defense in limiting opportunities for
aggressors to get vehicles close to DoD buildings is at vehicle access points at the controlled
perimeter, to parking areas, and at drive-up/drop-off points. Keep the number of access points to
the minimum necessary for operational or life safety purposes. That will limit the number of
468
points at which access may have to be controlled with barriers and/or personnel in increased
threat environments or if the threat increases in the future.
AP18.2.2.2. High-Speed Vehicle Approaches. The energy of a moving vehicle increases
with the square of its velocity; therefore; minimizing a vehicle’s speed allows vehicle barriers to
be lighter and less expensive should vehicle barriers ever become necessary. To facilitate
reductions in vehicle speeds in the future, ensure there are no unobstructed vehicle approaches
perpendicular to perimeters at the required parking and roadway standoff distances.
469
AP18.3.3. Structural Isolation. Where there are areas of buildings that do not meet the
criteria for inhabited buildings, design the superstructures of those areas to be structurally
independent from the inhabited area. This will minimize the possibility that collapse of the
uninhabited areas of the building will affect the stability of the superstructure of the inhabited
470
portion of the building. Alternatively, verify through analysis that collapse of uninhabited
portions of the building will not result in collapse of any portion of the building.
AP18.3.4. Building Overhangs. Avoid building overhangs with inhabited spaces above
them where people could gain access to the area underneath the overhang. Where such
overhangs must be used, measures should be incorporated into the design for new buildings or
mitigating measures should be incorporated into existing buildings to achieve an equivalent level
of protection so that roadways and/or parking areas are not under overhangs, that floors beneath
inhabited areas will not breach from the detonation underneath the overhang, and that all
structural elements within and adjacent to the overhang will not suffer progressive collapse.
AP18.4. ARCHITECTURAL DESIGN
There are many aspects of building layout and other architectural design issues that significantly
enhance building occupant’ safety and security with little increase in cost and should be fully
explored and leveraged for all inhabited buildings.
AP18.4.1. Windows and Glazed Doors. To minimize hazards from flying glass fragments,
glazing and window frames are key components for all inhabited buildings. Windows and
frames should work as a system to ensure that their hazard mitigation is effective and apply even
if adequate standoff distances are met. Specific measures are available to further mitigate
glazing and window frames hazards where standoff distances are not met. Additionally,
whenever window or door glazing is being replaced in existing inhabited buildings as part of a
planned renovation, it should meet the same guidelines.
AP18.4.2. Building Access. The areas outside of installations are commonly not under the
direct control of the installations. People entering and exiting the buildings are vulnerable to
being fired upon from vantage points (discussed in site planning) outside the installations
AP18.4.2.1. Main Entrance. To mitigate those vulnerabilities in new buildings ensure
that the main entrance to the building does not face an installation perimeter or other
uncontrolled vantage points with direct lines of sight to the entrance. For existing inhabited
buildings where the main entrance faces an installation perimeter either use a different entrance
as the main entrance or screen that entrance to limit the ability of potential aggressors to target
people entering and leaving the building.
AP18.4.2.2. Exterior Doors. For all new and existing buildings, ensure that all exterior
doors into inhabited areas open outwards. By doing so the doors will seat into the doorframes in
471
response to an explosive blast, increasing the likelihood that the doors will not enter the
buildings as hazardous debris.
AP18.4.3. Internal Circulation. Design circulation within buildings to provide visual
detection and monitoring of unauthorized personnel approaching controlled areas or occupied
spaces.
AP18.4.4. Asset Location. To minimize exposure to visual detection, monitoring, direct
blast effects and potential impacts from hazardous glass fragments and other potential debris,
consider placement of key personnel, critical assets, to minimize risk.
AP18.4.4.1. Critical assets and mission critical or high-risk personnel. Locate away
from the building exterior.
AP18.4.4.3. Room layout. In rooms adjacent to the exterior of the building position
personnel and critical equipment to minimize exposure to direct blast effects and potential
impacts from hazardous glass fragments and other potential debris.
AP18.4.4.4. External hallways. Because doors can become hazardous debris during
explosive blast events, because doors designed to resist blast effects are expensive, and because
external hallways have large numbers of doors leading into inhabited areas, avoid exterior
hallway configurations for inhabited structures.
472
AP18.4.5. Roof access. For all inhabited buildings, control access to roofs to minimize the
possibility of aggressors placing explosives or chemical, biological, or radiological agents there
or otherwise threatening building occupants or critical infrastructure. For new buildings
eliminate all external roof access by providing access from internal stairways or ladders, such as
in mechanical rooms. For existing buildings eliminate external access where possible, or secure
external ladders or stairways with locked cages or similar mechanisms.
AP18.4.6. Overhead mounted architectural features. For all buildings, ensure that all
suspended ceiling systems and other overhead mounted architectural features are mounted to
minimize the likelihood that they will fall and injure building occupants. For example, in the
DoD AT construction standards, all such systems will be mounted such that they resist forces of
0.5 times the component weight in any direction and 1.5 times the component weight in the
downward direction. But this standard does not preclude the need to design architectural feature
mountings for forces required by other criteria such as seismic standards.
AP18.4.7. Minimize secondary debris. Eliminate un-revetted concrete barriers and site
furnishings in the vicinity of inhabited structures that are accessible to vehicle traffic. Revet
exposed concrete surfaces with 1 meter (3 feet) of soil to prevent fragmentation hazards in the
event of an explosion.
AP18.5. ELECTRICAL AND MECHANICAL DESIGN
Electrical and mechanical design standards address limiting damage to critical infrastructure,
protecting building occupants against chemical, biological, and radiological threats, and
notification of building occupants of threats or hazards.
AP18.5.1. HVAC.
AP18.5.1.1. Air intakes. Air intakes to HVAC systems that are designed to move air
throughout a building that are at ground level provide an opportunity for aggressors to easily
place contaminants that could be drawn into the building. For all new inhabited buildings locate
all air intakes at least 3 meters (10-ft) above the ground and is recommended for existing
inhabited buildings.
AP18.5.1.2. Emergency air distribution shutoff. All buildings should provide an
emergency shutoff switch in the HVAC control system that can immediately shut down air
distribution throughout the building. The switch (or switches) should be located to be easily
accessible by building occupants. Providing such a capability will allow building occupants to
limit the distribution of airborne contaminants that may be introduced into the building.
473
AP18.5.2. Utility distribution and installation. Utility systems can suffer significant damage
when subjected to the shock of an explosion. Some of these utilities may be critical to safely
evacuating personnel from the building or their destruction could cause damage that is
disproportionate to other building damage resulting from an explosion. Where possible, route
critical or fragile utilities such that they are not on exterior walls or on walls shared with
mailrooms to minimize the possibility of the above hazards. Where redundant utilities are
required in accordance with other requirements or criteria, ensure that the redundant utilities are
not collocated or do not run in the same chases. This minimizes the possibility that both sets of
utilities will be adversely affected by a single event.
AP18.5.3. Equipment bracing. Mount all overhead utilities and other fixtures to minimize
the likelihood that they will fall and injure building occupants. For example, DoD AT
construction standards require all equipment mountings to be designed to resist forces of 0.5
times the equipment weight in any direction and 1.5 times the equipment weight in the
downward direction. But they do not preclude the need to design equipment mountings for
forces required by other criteria such as seismic standards.
AP18.5.4. Under building access. To limit opportunities for aggressors placing explosives
underneath buildings ensure that access to crawl spaces, utility tunnels, and other means of under
building access is controlled.
AP18.5.5. Mass notification. All inhabited buildings should have a timely means to notify
occupants of threats and instruct them what to do in response to those threats. The capability
enables real-time information to be provided to building occupants or personnel in the immediate
vicinity of the building during emergency situations. The information relayed should be specific
enough to discriminate appropriate response actions. Any system, procedure, or combination
thereof that provides this capability will be acceptable.
474
AP19. APPENDIX 19
MAIL HANDLING SUSPICIOUS PACKAGES
AP19.1. INTRODUCTION
AP19.2.1. The following are typical indicators that highlight suspicious envelopes and
parcels.
AP19.2.1.1. Unknown or strange postmark. The mail may be postmarked from a strange
or unknown place, usually outside your normal channels of correspondence.
AP19.2.1.2. Lack of return address. This may be an attempt by the terrorist to reduce the
amount of evidence on an envelope or to avoid suspicion by using what could be determined to
be an erroneous address.
AP19.2.1.3. Excessive amount of postage. It is risky to ask a mail clerk to weigh a letter
bomb for the exact amount of postage. Postal personnel normally know what to look for and
may be able to determine that the package contains a bomb. Therefore, it is safer for the terrorist
to add additional postage rather than risk being caught with the bomb.
AP19.2.1.5. Protruding strings, aluminum foil, or wires. Strings or wires may protrude
from or be attached to the item. The bomb maker may have constructed the device in a sloppy
manner, causing unsecured wires to work loose. The more likely reason for an exposed wire is
that it is an arming wire that the courier did not remove, fearing it would detonate
instantaneously.
475
476
AP19.3.2. Commanders should be aware that individual protective masks are commercially
available which provide a significant level of protection against inhalation of certain biological
agents. High Efficiency Particulate Air filter masks are relatively inexpensive, available, and
effective. Discretionary use is advisable to mitigate risk of exposure.
AP19.3.3. Personnel should be instructed on the location, security procedures, and process
for disabling building ventilation systems.
477
AP19.4.1.2.6. If at home, dial the local emergency number, such as "9-1-1," and
report the incident to local police. If at work, report the incident to local police, chain of
command personnel, and the building security manager. If warranted, contact the local FBI field
office.
AP19.4.1.2.7. Make a list of all people who were in the room or area when the
suspicious envelope or package was recognized. Public health authorities and law enforcement
officials may need this information for follow-up advice and investigations.
AP19.4.1.3. For an envelope or package containing powder or other contaminant that
spills out onto a surface:
AP19.4.1.3.1. Avoid inhalation of the contaminant. Don respiratory protection if
available.
478
479
480