CIVIL ENGINEER EXPEDITIONARY FORCE PROTECTION Afttp - 3 - 32.34 - v3
CIVIL ENGINEER EXPEDITIONARY FORCE PROTECTION Afttp - 3 - 32.34 - v3
CIVIL ENGINEER EXPEDITIONARY FORCE PROTECTION Afttp - 3 - 32.34 - v3
1 March 2016
CIVIL ENGINEER
EXPEDITIONARY FORCE
PROTECTION
BY ORDER OF THE
AIR FORCE TTP 3-32.34V3
SECRETARY OF THE AIR FORCE
1 March 2016
Operations
with (IAW) Air Force Manual (AFMAN) 33-363, Management of Records, and
disposed of IAW AF Records Disposition Schedule (RDS) located in the Air
Force Records Information Management System (AFRIMS). The use of the
name or mark of any specific manufacturer, commercial product, commodity, or
service in this publication does not imply endorsement by the AF.
Chapter 1
INTRODUCTION
1.1. Overview. Force Protection (FP) is critical to the Air Force’s ability to
perform its worldwide mission and is a top priority for commanders. It is a
fundamental principle of military operations as a way of ensuring survivability
of forces. Commanders at all levels are responsible for protecting Air Force
people and warfighting resources. However, all Airmen are also responsible for
FP and need to be prepared, trained, and equipped to protect and defend
operations and assets. This publication provides guidance to civil engineers (CE)
on implementing FP measures in the expeditionary environment. Many of the
references listed throughout this publication are For Official Use Only (FOUO)
publications. CE planners maintain copies of these publications and ensure they
are available throughout all phases of expeditionary operations.
1.2. Scope. The information in this AFTTP relates to tactics, techniques, and
procedures (TTPs) used by civil engineers in supporting precepts outlined in Air
Force Doctrine Annex (AFDA) 3-34, Engineer Operations. It also supports
implementation of Air Force Policy Directive (AFPD) 10-2, Readiness, and AFI
10-210, Prime BEEF Program.
1.4. Force Protection Doctrine. For much of its existence, the Air Force has
been able to rely on the US Army when necessary, for standoff security. In fact,
in 1985 the Chiefs of Staff of the Air Force and Army signed Joint Security
Agreement 8 which specified that the Army would provide ground defense
outside the perimeter of Air Force bases. However, several subsequent joint
exercises, as well as experience in Operations Desert Shield and Desert Storm,
showed this arrangement was impractical. The formal agreement remained in
effect until 2005, at which time Joint Publication 3-10, Joint Security
Operations in Theater, codified that the Air Force would defend its own air
bases.
1.4.1. Additionally, for most of the Cold War Air Force doctrine was primarily
based on the expectation that expeditionary bases would be located in a rear area
where the threat would be greatly reduced. In reality, during recent conflicts
(especially in Iraq and Afghanistan) many bases were located in urban areas and
the perimeter of the base represented the line of contact with the enemy.
1.4.2. Air Force Doctrine Annex (AFDA) 3-10, Force Protection, states that FP
is achieved through the successful execution of three related but distinct lines of
effort: integrated defense, emergency management, and the critical asset risk
management program (formerly known as the critical infrastructure program
[CIP]). These lines of effort are reviewed in the following paragraphs. The
purpose is to integrate these capabilities and achieve the desired FP effects of
detect, deter, preempt, negate, and mitigate. AFDA 3-10 also states that the
specific and pivotal role of civil engineers is to “design physical security
improvements, provide planning, training, and response capabilities to deal with
FP-related incidents, and provide explosive ordnance disposal capabilities.” It
describes three levels of FP threat (Table 1.1). Keep in mind that these threats
may not occur in any specific sequence or may not even appear to be related.
1.8.5. Mitigate. If actions to negate are unsuccessful employ the full range of
active and passive measures such as civil engineers supporting hardening and
sidewall protection to lessen the impact of terrorist events against DOD assets.
Normal–A general global threat of possible terrorist activity exists and warrants
a routine security posture. At a minimum, access control will be conducted at all
DOD installations and facilities.
Alpha–Increased general threat of possible terrorist activity against personnel or
facilities, the nature and extent of which are unpredictable, and circumstances do
not justify full implementation of FPCON BRAVO measures. However, it may
be necessary to implement certain measures from higher FPCON measures
resulting from intelligence received or as a deterrent. Measures taken under this
FPCON are capable of being maintained indefinitely.
Bravo–Increased or more predictable threat of terrorist activity exists.
Sustaining BRAVO measures for a prolonged period may affect operational
capability and military-civil relationships with local authorities.
Charlie–This condition applies when an incident occurs or intelligence is
received indicating some form of terrorist action or targeting against personnel
or facilities is likely. Prolonged implementation of CHARLIE measures may
create hardship and affect the activities of the unit and its personnel.
Delta–Applies in the immediate area where a terrorist attack has occurred or
when intelligence has been received that terrorist action against a specific
location or person is imminent. Normally, this FPCON is declared as a localized
condition. FPCON DELTA measures are not intended to be sustained for an
extended duration.
describes the different threat levels and combination of factors used to determine
each threat level.
Training (within 180 days) until they are able to attend the AT Level II in-
residence course. For both ATOs and ATRs, Level II refresher training is
completed once every three years to maintain qualification.
Level III Pre-Command AT Training
Level III training provides prospective squadron, group, and wing commanders
and civilian equivalent positions at the O5/O6 level with requisite knowledge to
direct and supervise an AT Program. Group/Wing commanders receive the
training through Group/Wing commander pre-command courses. Follow on
training may be conducted at the installation-level as a refresher or supplement
to briefings offered in commander courses.
Level IV AT Executive Seminar
Level IV seminar provides DOD senior military and civilian executive
leadership with requisite knowledge to enable development of AT program
policies and facilitate oversight of AT programs at the operational and strategic
levels. Wing and group commanders and other command and staff officers in
the grades O-6 through O-8 and civilian equivalent/senior executive service
civilian employees may attend.
15
Chapter 2
2.3.1 Threat Assessment. The threat assessment is the process used to conduct
an analysis and develop an evaluation of a potential threat consistent with the
Integrated Defense Risk Management Process (IDRMP) outlined in AFI 31-101.
It identifies the full range of known or estimated threat capabilities, including
the use or threat of CBRN and EH. It is usually conducted by intelligence
personnel; however Air Force Office of Special Investigations (AFOSI) is the
AF agency responsible for preparing specific threat assessments. All available
information concerning enemy activities is analyzed to determine if personnel
and/or critical assets might be targeted. The analysis includes factors such as a
terrorist group’s capability, intentions, TTPs, history, probable course of action,
and targeting as well as the security environment within which friendly forces
operate. The DOD Antiterrorism Officer (ATO) Guide (FOUO) contains
guidance on conducting threat assessments. AFI 10-245 also contains limited
threat assessment guidance. Note: Civil engineer squadrons, through the
Emergency Management Working Group, develop and publish an All-Hazards
Threat Assessment as part of the All-Hazards Risk Management Process.
2.3.1.1. Identifying the Threat. Along with security forces, civil engineers
generally have primary responsibility for preparing a design basis threat (DBT),
18
which describes threats in specific terms. The DBT is established for each
installation to identify and evaluate the types of aggressors (i.e., terrorists,
saboteurs, spies, extremist protestors, criminals, etc.) and the types of weapons,
tools, and explosives likely to be used in an attack or an attempt to compromise
a military asset. It is a critical component for engineering projects and
renovations. The threat identification also includes tactics likely to be used, such
as stationary or moving vehicle bombs, airborne or waterborne contamination,
bomb delivery via mail or supply shipments, forced or covert entry, standoff or
ballistic weapons, visual surveillance, acoustic eavesdropping, and insider
compromise. Identifying the specific threat helps in determining asset
vulnerability. This information can then be used by civil engineers to develop
and implement protective measures to counter the specified threat.
2.3.1.2. Planning for the Threat. The threat level assigned to the country or
region where a unit may be deploying helps to plan protective measures
throughout all phases of deployments, including pre-deployment, initial
beddown, sustainment, and redeployment. Upon notification of deployment, unit
commanders immediately contact their servicing AFOSI detachment and request
a counterintelligence threat assessment. Again, civil engineers are familiar with
FP governing directives and can support operations by serving on the
installation planning team responsible for preparing the DBT. For DBT planning
purposes, Unified Facility Criteria (UFCs) 4-010-01, DOD Minimum
Antiterrorism Standards For Buildings; 4-020-01, DOD Security Engineering
Facility Planning Manual; and 4-010-02, DOD Minimum Antiterrorism Standoff
Distances for Buildings (FOUO), contain detailed information on expeditionary
site layout and protective measures designed to mitigate the effects of attacks on
expeditionary and temporary structures as well as permanent structures.
assessment, taking into consideration all of the factors mentioned above, and
produces a prioritized list of critical assets. Civil engineers are part of the
assessment team and provide significant input into this process, especially since
the assessments also examine reconstitution of infrastructure and base support.
Areas encompassing multiple critical assets are referred to as critical areas. AFI
10-245 and AFI 31-101 provide additional detailed information on conducting
criticality assessments.
that may reveal vulnerabilities. RAM also provides training and increases FP
awareness for site personnel by varying routine operations. It helps identify
which measures the installation’s infrastructure is more capable of sustaining
and those that unduly stress resources. Other FP measures not normally
associated with FPCONs (e.g., locally developed, site-specific) can also be
employed randomly to supplement the basic FPCON measures already in place.
Civil engineer operations can increase RAM visibility and effectiveness in
confusing enemy surveillance attempts and planning. A list of baseline FPCON
measures can be found in AFI 10-245. These measures are exercised regularly
and associated plans are adjusted to correct any inadequacies.
21
Chapter 3
3.2. Force Protection Plan. The FP plan consists of specific anti-threat and
antiterrorism measures developed to protect personnel, facilities, and critical
22
assets to include, but not limited to, threat assessments, threat levels,
vulnerability assessments, criticality assessments, risk assessments, and FPCON
measures. Important factors in planning force protection in deployed
environments include the availability of existing facilities, the types of structures
in which people live and work, existing natural and manmade features, types and
quantities of indigenous construction materials, available real estate, and layout
of utilities and other base infrastructure.
3.2.3. The FP Plan itself is not an end state. The plan is a living document
constantly reviewed and revised as threats, resource requirements, and
innovations cause changes in FP tactics. Civil engineers are prepared to offer
observations and innovations that counter and mitigate terrorist threats and
increase force protection.
3.4. Site Selection. Civil engineers participate in the pre-site survey and learn as
much as possible about the region. Selecting a site suitable to beddown the
expected population, weapon systems, support equipment, and other assets are
considered along with the need for standoff.
3.4.3. Upon arrival to the deployed site, develop a list of equipment, tools, and
materials needed to immediately implement protective measures.
FP elements to consider during site selection and site layout and can be used as a
quick reference checklist; this list is not all-inclusive. While conducting site
selection and site layout functions, use available geographical information
system (GIS) tools to enhance survivability efforts and ensure minimum AT
standards are met. Every deployment is unique and therefore presents unique
challenges. The following paragraphs highlight some important site layout
planning factors.
3.5.3. Provide Effective Road Layout. Although roads are often designed to
minimize travel time from one place to another, caution is taken when planning
roads. Roads that provide straight line access to key facilities and other critical
assets allow a vehicle to gain the speed necessary to breach protective barriers or
crash through facilities. Roads are generally designed to limit the maximum
speed a vehicle can attain before the driver loses control or draws attention from
security personnel. Designing sharp curves or using barriers to create a
serpentine layout that force drivers to negotiate a series of sharp turns can limit
vehicle approach speed. Vehicle operators attempting to leave the road in order
25
to gain speed towards a potential target increase the chance of early detection
and response. Roads approaching key facilities are made parallel to the facilities
versus a perpendicular approach. Barriers, trees, and other obstacles can reduce
a driver’s ability to leave roads or to have a direct path to the facility from the
road.
3.6. Unified Facilities Criteria. This section focuses on UFCs which prescribe
FP standards for new, existing, temporary, and expeditionary structures. These
publications can be located at the Whole Building Design Guide website at
http://dod.wbdg.org and may also be downloaded from the US Army Corps of
Engineers (USACE) Protective Design Center (PDC) website at
https://pdc.usace.army.mil.
3.6.1. Standards. Minimum DOD AT standards for new and existing inhabited
facilities and expeditionary and temporary structures are outlined in UFC 4-010-
01. These standards are intended to minimize the possibility of mass casualties
in facilities where no known terrorist activity currently exists. Graphic Training
Aid (GTA) 90-01-011, Joint Forward Operations Base (JFOB) Protection
Handbook, provides standards for expeditionary structures where a terrorist
threat exists. Since it would be cost-prohibitive to design facilities that address
every conceivable threat, the standards are designed to provide an appropriate
level of protection for all personnel at a reasonable cost. Each DOD component
may set more stringent AT building standards to meet the specific threats in its
AOR. Air Forces Central, Air Forces Southern, United States Air Forces in
Europe, and Pacific Air Forces have supplemental instructions regarding FP
construction standards. Contact the theater-level A4C planner for more
information. Refer to UFC 4-020-01 when developing cost estimates for
expeditionary construction and where more stringent local standards apply for
detailed descriptions of the levels of protection.
Selecting levels of protection for all key and critical assets involves a tradeoff
for acceptable levels of risk. UFC 4-010-01 defines the different standards for
new and existing buildings and expeditionary or temporary structures, and
contains qualitative descriptions of potential damage to buildings and structures
at different levels of protection. Detailed quantitative descriptions of the levels
of protection can be found in UFC 4-020-02FA, Security Engineering: Concept
Design (FOUO).
3.6.3. Standoff Distances. The primary objective of design and site layout
strategy is to keep potential threats as far away from personnel and critical assets
27
as possible. Due to the type of construction, standoff distances differ for new or
existing buildings and expeditionary or temporary structures.
3.6.3.1. New and Existing Buildings. Standoff distances for new and existing
buildings are defined in Table B-1 and illustrated in Figures B-1 through B-4 of
UFC 4-010-01. The standards were developed for a wide range of
conventionally constructed buildings. Distances listed under the “Minimum
Standoff Distance” column of Table B-1 are provided except where not possible.
The UFC further states that lesser standoff distances may be allowed where
required level of protection can be shown through analysis or can be achieved
through building hardening or other mitigating construction or retrofit. The
applicable explosive weights indicated in the table may be obtained from UFC
4-010-02.
Chapter 4
PHYSICAL SECURITY
4.3. Perimeter Security. One of the most important FP tasks during the initial
stages of deployment and beddown is establishing perimeter security. Working
with security forces, civil engineers help establish a continuous physical barrier
30
which clearly defines the physical limits of the site, to prevent unauthorized
access. Figure 4.1 illustrates key aspects of perimeter security. This involves
constructing fences, placing concertina wire, installing perimeter lighting,
constructing berms and ditches, placing barriers, and assisting with the
installation of security cameras. Also key is ensuring backup power source is
available in the event systems requiring power are disrupted by intentional or
unintentional damage. In addition, clear zones beyond the perimeter are kept
free of weeds, rubbish, or other material capable of offering concealment or
assistance to an intruder attempting to penetrate perimeter security. Also, secure
utility ducts, drainage culverts, concrete trenches, and storm drains originating
from outside the perimeter by using screens and grates. Locks can be installed
on manhole covers. Intrusion detection sensors may be used along with
surveillance equipment to provide greater security. The next few paragraphs
discuss how physical security may be employed in the expeditionary
environment.
4.3.1.2. Types of Barriers. There are many barrier designs that can be used for
a variety of purposes (e.g., pedestrians, vehicles, weapons, etc.) and various
types of structures and natural features that may be used as barriers (e.g., trees,
mountains, water, wood, concrete, etc.). Barriers are categorized as either active
(containing moving parts) or passive (non-moving parts). It is important not to
confuse the different types of barriers available with the purpose for which the
barrier is being used or can be used. For example, some barriers may be used to
mitigate the effects of blast and/or fragmentation in the event of an attack and
may sometimes be referred to as blast or fragmentation barriers. These are
passive-type barriers. A variety of passive barriers may be found in the
expeditionary environment (e.g., Bitburg barrier, Jersey barrier, Alaska barrier,
32
4.3.1.2.2. Passive Barriers. Passive barriers have no moving parts and are
designed to absorb energy upon impact and transfer that energy into the
foundation. Examples include portable or permanent concrete structures,
concrete bollards, posts, guardrails, ditches, and reinforced fences. Passive
barriers along the perimeter or interior fence line are designed to allow little or
no penetration, especially if the available standoff distance is limited. Passive
barriers are commonly found in the expeditionary environment, particularly if
the contingency operation is of a limited duration. Figure 4.8 through Figure
4.13 shows examples of passive barriers that may be used in the expeditionary
environment. For additional details on different types of barriers, refer to Air
Force Handbook (AFH) 10-222, Volume 14, Guide to Fighting Positions,
Shelters, Obstacles, and Revetments; and the JFOB Protection Handbook. The
JFOB handbook may be accessed on the United States Army Central Army
Registry (CAR) website. To obtain a copy of the handbook from the CAR
website requires a Common Access Card at the following link.
35
https://rdl.train.army.mil/catalog/go/100.ATSC/0BEF6011-E36F-4F1E-
8965-5DB0931D9010-1300684489163.
4.3.2. Perimeter Fences. Fences are used to define the boundary of a site or
structure, direct and control the flow of traffic, and establish clear zones. They
37
are also used in conjunction with security lighting, IDSs, closed circuit
television, and other means of integrating security. Chain link fences are
antipersonnel barriers. They are cost-effective, usually readily available, and
provide a moderate degree of protection. Chain link fences are more effective if
reinforced with cable or topped with outriggers and concertina wire, razor wire,
or multiple strands of barbed wire, as shown in Figure 4.14. Since most fences
can be easily penetrated by a moving vehicle, they are not considered vehicle
barriers and can resist impact only if reinforced by barriers capable of absorbing
the impact of moving vehicles. For additional details on security fencing,
reference Military Handbook (MIL-HDBK)-1013/10, Design Guidelines for
Security Fencing, Gates, Barriers, and Guard Facilities; and UFC 4-022-03,
Security Fences and Gates.
4.3.3. Utility Openings. Large utility openings, such as drainage pipes, culverts,
vents, and ducts can provide an intruder with a means of entry or exit across a
site’s perimeter without triggering an alarm. These types of openings can also be
used to conceal weapons or plant explosives. For these reasons, the number of
culverts and other drainage pipes crossing a site’s perimeter are minimized. The
DOD defines man-passable openings as having a minimum of 96 square inches
with the least dimension equal to or greater than 6 inches can be protected by
securely fastened, welded bar grilles shown in Figure 4.15. AF criteria specify
that the minimum opening is 6.4” inches. As an alternative, these structures can
be composed of multiple pipes with diameters of 10 inches or less. Multiple
pipes of this diameter may also be placed and secured in the inflow end of a
drainage culvert to prevent intrusion into the area. If grilles or pipes are installed
38
Site
4.3.4.2. Layout. The main ECF is subdivided into zones and allow enough
queue space to prevent obstructing traffic on main roads by vehicles waiting to
enter the site as shown in Figure 4.17. ECF zones consist of an approach zone,
access zone, response zone, and safety zone. The approach zone is located at the
interface between public roads and the site. Access zones comprise the main
portion of the ECF. This is where guard facilities and vehicle inspection areas
are located. Response zones extend beyond access zones to the final barrier or
entry point. This is usually where security forces sets up an overwatch tower as
a final denial point for vehicles attempting to gain unauthorized entry.
Overwatch towers are hardened firing positions that provide coverage for
vehicle entry, exit, and search areas. The safety zones include all techniques
(fences, barriers, etc.) used to maintain an acceptable standoff distance between
the ECF and critical assets. Vehicles approaching the site are channeled through
a maze of barriers that force drivers to decrease their rate of speed. Vehicles are
40
channeled into search pits to allow security personnel to search for and detect
explosives. Search pits are separated from local traffic by security fences and
vehicle barriers and located outside the minimum prescribed standoff distance.
Civil engineers work closely with security and intelligence personnel in
designing and siting vehicle search pits. Separate points of access to the site are
established for commercial trucks and delivery vehicles, outside the standoff
distance, where they can be searched prior to gaining access. Detailed guidance
for constructing ECFs can be found in UFC 4-022-01, Security Engineering:
Entry Control Facilities/Access Control Points.
41
4.3.4.3. ECF Barriers. ECF barriers are designed to maintain control. They
address the counter-mobility aspect of FP (preventing unauthorized vehicles
42
from entering the site) and are set up to channel vehicles and pedestrians into or
away from certain areas. The ECF is the point at which vehicles are either
cleared or rejected from accessing the site and are strictly controlled. ECF
barriers define boundaries and provide security personnel with a visual
assessment of a driver’s intent as a vehicle passes through certain zones and
reacts to barriers employed to control path, speed, and direction. CE places
barriers along main roads leading to the site from public roads, to establish an
approach zone and throughout the rest of the ECF to maintain control during the
clearing process. Barriers are anchored to the surface and/or cabled together
(Figure 4.18) to provide increased resistance to penetration attempts. To slow
speeds of approaching vehicles, place barriers in a manner that produces a
serpentine path that drivers negotiate to reach the entry point. Desired speeds
can be controlled by placing barriers at certain distances apart. For example, to
allow a maximum speed of 15 mph, place barriers 30 feet apart in an alternating
pattern as depicted in Figure 4.19. Creating 90-degree turns also forces drivers
to reduce speeds. A vehicle leaving these paths draws attention and alerts
security personnel of a possible attempt to evade clearance procedures and gain
unauthorized access to the site.
4.3.5. Berms and Ditches. Berms and ditches can be constructed around the site
perimeter to slow or prevent vehicles from penetrating the restricted boundary as
illustrated in Figure 4.20. Triangular ditches and hillside cuts are relatively easy
to construct and are very effective against a wide range of vehicles. Side hill
cuts are variations of the triangular ditch adapted to side hill locations and have
the same advantages and limitations. A trapezoidal ditch requires more
construction time but is more effective in stopping a vehicle. With this type of
construction, a vehicle can be trapped when the front end falls into the ditch and
the undercarriage is hung up on the leading edge of the ditch. For additional
information on constructing berms and ditches, reference AFH 10-222, Volume
14.
44
Lighting for People, Property, and Public Spaces: and UFC 4-021-02,
Electronic Security Systems and AFI 31-101.
4.4.2.4. Windows. Windows are usually the weakest part of a structure. Glass
fragments caused by blasts may result in significant injuries. Although
expeditionary structures usually do not contain glass windows, host-nation
facilities occupied by US forces may in fact contain glass windows. When
possible, windows can be covered using plywood or other protective material. If
not possible, other methods may be used to reduce hazards from broken glass.
Installation of fragment-retention film (Figure 4.30) is a plastic (polyester) sheet
of film adhered to the glass with special adhesive. This modification helps keep
glass fragments together preventing them from causing severe injury and possibly
death. Heavy drapes or a “catcher bar” (metal bar installed across the window)
may help prevent large piece(s) of glass being held together by the retention film
from flying through the room and causing blunt trauma injury. Engineering
Technical Letter (ETL) 1110-3-501, Windows Retrofit Using Fragment Retention
Film with Catcher Bar System, contains details on retrofitting windows using
fragment retention film. A trained engineer analyzes several factors (i.e., potential
charge weight, standoff distance, size of glass pane, thickness and type of
window glass, attachment of the pane to the window frame, and attachment of the
frame to the structure) to determine if windows can be properly retrofitted.
Protective film in the expeditionary environment is a last resort. As stated earlier,
it is preferable to cover windows with plywood or other protective material.
54
4.4.3. Revetments. Revetments are simply walls used to reduce the effects of
blast or fragmentation on facilities and equipment resulting from near miss
rockets, artillery, and mortars. They are used to protect parked aircraft or other
high-value resources. These structures are also referred to as fragmentation or
blast walls. Revetments may be constructed of different materials and
configured in multiple ways for multiple purposes as shown in Figure 4.33.
Engineers identify revetment requirements through their servicing logistics
function and theater CE staff. Refer to AFH 10-222, Volume 14 for construction
56
4.4.5.1. Electrical Power. Power plants (Figure 4.35) are one of the most
critical assets in the expeditionary environment. Protect power plant resources
with revetments, barriers, concertina or barbed wire (entanglements),
camouflage, and berming. Depending upon the population and size of the
installation, power plant dispersal (having two or more plants established and
interconnected) may be an option to ensure some degree of power generation
redundancy after an attack. Also, power distribution cables are buried 12-18
inches and spaced at least 6 inches apart. Position mobile electrical power
generators near critical facilities and assets they support and harden them against
attack. For details on power plant installation, see AFH 10-222, Volume 5,
Guide to Contingency Electrical Power System Installation.
58
4.4.5.2. Water Production and Supply. Water sources, water purification and
distribution equipment, and water supplies are kept under constant surveillance
and tested frequently for contamination. Water transfer pipes may be tapped
under pressure providing aggressors the opportunity to introduce contaminants
into the water supply. Civil engineers work closely with Bioenvironmental
Engineering, Public Health, and Safety personnel to ensure water supplies are
protected from intentional or unintentional contamination. Water sources are
guarded, water production equipment reveted, and water lines buried at the first
opportunity (Figure 4.36). Roving patrols establish surveillance points to alert
personnel to the possibility of tampering. An emergency response plan is
developed in the event the water supply is contaminated. The plan includes a
map indicating the location of all potential water sources, water production
equipment, water storage areas, and alternative approaches to supplying safe
water (e.g., boiling, special treatment, alternative water supply points,
procedures for having bottled water brought in from other sources, etc.). For
further specific guidance on CE responsibilities related to FP of water sources
and establishing and maintaining a potable water production capability refer to
AFMAN 10-246, Food and Water Protection Program; Air Force Pamphlet
(AFPAM) 10-219, Volume 5, Bare Base Conceptual Planning; and AFMAN
48-138_IP, Sanitary Control and Surveillance of Field Water Supplies.
59
4.4.7. Contract Support. Once hostilities subside and initial beddown phase
moves towards sustainment, contract support is available to implement and
sustain base support operations (Figure 4.38). This capability allows military
forces to focus more exclusively on achieving military objectives. The Air Force
Contract Augmentation Program (AFCAP) is a contingency contract vehicle
established as a force multiplier option to augment CE and services capabilities
during worldwide contingency planning and deployment operations. AFCAP
may provide construction support at overseas locations and can support recovery
operations after natural disasters, accidents, or terrorist attacks. The Navy’s
Global Contingency Construction and Global Contingency Services contracts
are designed to provide worldwide construction and engineering services in
response to natural disasters, military conflicts, humanitarian assistance, and a
wide range of military operations unrelated to conflicts. The US Army Materiel
Command (USAMC) support contract, Logistics Contract Augmentation
Program or LOGCAP, provides engineering, construction, and general logistic
services. USAMC is supported by USACE for engineering and construction
contract management and by the Defense Contract Management Agency for
logistic services contract administration. Contact the Major Command Civil
Engineer or Air Force Civil Engineer Center for contract support assistance.
61
Chapter 5
INTEGRATED DEFENSE
5.1. Overview. Integrated Defense (ID) is the integration of active and passive,
offensive and defensive capabilities, to mitigate potential risks and defeat
adversary threats to AF operations. ID employs a number of capabilities in a
variety of ways to produce desired effects in the base defense battle space. This
includes the base boundary, base security zone, and the base perimeter. This
strategy leverages assigned resources against adaptive threats to protect
resources and personnel. This chapter outlines actions civil engineers take to
support effective application of the ID concept.
5.2. Integrated Defense Concept. One of the most vital capabilities a base has
to counter threats, especially in an expeditionary environment, is the ability to
apply an ID concept (Figure 5.1). Civil engineers are trained to be familiar with
the FP terminology that describes the defense battlespace of the base, both
inside and outside the wire. AFH 31-109, Integrated Defense in Expeditionary
Environments, describes the base perimeter as basically the fenced area of the
base. It shows the physical and legal demarcation of the installation, that only
authorized personnel may occupy, and is usually made obvious to the general
public so inadvertent penetration is avoided. The base boundary (BB) is the line
that delineates the surface area of the base for the purpose of facilitating
coordination and deconfliction of operations between adjacent (and usually
friendly) units. It includes key terrain that is secured through active control by
security forces or coordination with host nation forces. The base security zone
(BSZ) is an AF unique term used to describe the area outside the base perimeter
from which base personnel, resources, or aircraft approaching/departing the base
may be vulnerable to standoff threats (e.g. mortars, rockets, and man portable
aerial defense systems).
63
5.2.1. Actions and Effects. Essential actions and effects of the ID concept are
those deemed critical to successful planning, programing, and combat support
operations execution. Successful ID effects depend on the prevailing threat, the
operating environment, friendly forces available, rules of engagement, and other
factors that characterize the battlespace. ID is planned and executed based upon
the estimated threat (or combination of threats) and operating environment, and
is approved by the Installation Commander.
5.3.1. Anticipation. Anticipating the enemy is the critical first step Anticipation
involves determining options, intentions, and actions an adversary might take, to
intelligently prepare the operational environment in order to respond. Civil
engineers employ and implement FP measures during site layout and site
buildup based on the threat identified by the intelligence community; not just
threats in general.
clear view of all areas on the site and the surrounding clear zone, see Table 5.2.
In addition, routine checks of critical equipment such as power and water
production equipment, storage and distribution equipment, and the like are
conducted to quickly uncover any evidence of tampering.
5.3.5. Warn. Warn friendly forces of adversary activity primarily through the
IDS and EWS. Additional systems such as mass notification, radio, public
address, commander’s access channels, voice, hand and arm signals, cellular
telephones, instant messenger, short message system texting, etc., also provide
warning.
66
5.3.7. Delay. Forcing a delay in an adversary's actions increases the risks for the
adversary and provides security personnel time to react and respond. Tactical
guidance states that delay cannot be achieved unless there is depth to ID. The
obstacles and elements of security are employed in layers, forcing the adversary
to breach several layers of defense (active and passive) to reach a certain target
as shown in Table 5.3. The concept of defense in depth does not rely on a single
failure point, but rather employs different types of defenses and redundancies to
ensure a nearly impenetrable perimeter. Early identification of a threat increases
the capability to quickly make a determination of intent and neutralize the threat
by applying multiple defensive measures. An example of layered defense would
be the ECF zone concept covered in Chapter 4. The ECF is laid out in zones,
where security personnel perform different functions. As vehicles move through
the zones (approach, access, response, etc.), certain security measures are taken.
An attempt to breach the ECF would be immediately noticeable and would give
security personnel time to detect and react to the attempt and employ a range of
measures to stop the vehicle, using the appropriate level of force up to and
including deadly force if necessary in the response zone. Civil engineers work
closely with intelligence and security personnel to determine how best to
establish a layered defense and employ the techniques covered in Chapter 3 and
Chapter 4.
5.3.9. Recover. After an enemy withdraws or has been defeated recovery from
adversarial events is applied through effective command and control, and
executing the installation emergency management plan 10-2. The installation
commander directs consolidation and reorganization actions to include
reestablishing security and communication; providing first aid and medical
evacuation of wounded; damaged obstacle repair; and redistribution of supplies
and materials.
Attachment 1
References
AF—Air Force
AFCAP—Air Force Contract Augmentation Program
AFCEC—Air Force Civil Engineer Center
AFDA—Air Force Doctrine Annex
AFH—Air Force Handbook
AFI—Air Force Instruction
AFIMS—Air Force Incident Management System
AFMAN—Air Force Manual
AFOSI—Air Force Office of Special Investigations
AFPAM—Air Force Pamphlet
AFPD—Air Force Policy Directive
AFRIMS—Air Force Records Information Management System
AOR—Area of Responsibility
AT—Antiterrorism
ATO—Antiterrorism Officer
ATR—Antiterrorism Representative
CARM—Critical Asset Risk Management Program
CBRNE—Chemical, Biological, Radiological, Nuclear, and High-Yield
Explosives
CCDR—Combatant Commander
CCMD—Combatant Command
CE—Civil Engineer
CIP—Critical Infrastructure Program
DBT—Design Basis Threat
DIA—Defense Intelligence Agency
DOD—Department of Defense
71
Terms
excludes industrial, maintenance, and storage facilities, except for more densely
populated portions of those buildings, such as administrative areas. The
inhabited building designation also applies to expeditionary and temporary
structures with similar population densities. (UFC 4-010-01)
Integrated Defense—The integration of multidisciplinary active and passive,
offensive and defensive capabilities, employed to mitigate potential risks and
defeat adversary threats to AF operations. (AFI 31-101)
Intelligence—1.) The product resulting from the collection, processing,
integration, evaluation, analysis and interpretation of available information
concerning foreign countries or areas. 2). The information and knowledge about
an adversary obtained through observation, investigation, analysis, or
understanding. (AFI 10-245 & AFI 31-101)
Internal Security—Measures used to protect personnel or assets located on the
interior of the base.
Level of Protection—The degree to which an asset is protected against injury or
damage. This would include personnel and equipment. Levels of protection can
be defined as low, medium, or high. For a low level of protection, the structure
would be near collapse, a medium level of protection would result in a damaged
but repairable structure, and a high level of protection would cause superficial
damage to the structure. Selecting the level of protection means trading-off an
acceptable level of risk.
Mass Notification System—A system that provides real-time information to all
building occupants or personnel in the immediate vicinity of the building during
emergency situations.
Obscuration Screen—A physical structure or some other element used to block
the line of sight to a potential target.
Passive Defense—Measures taken to reduce the probability of and to minimize
the effects of damage caused by hostile action without the intention of taking the
initiative. See also active defense. (JP 1-02)
Perimeter Security—Elements that form the first line of defense for an
installation. Elements include standoff, physical barriers, access control, entry
control points, security lighting, hardened fighting positions and overwatch
towers, intrusion detection and surveillance systems, and security forces.
Physical Security—That part of security concerned with physical measures
designed to safeguard personnel; to prevent unauthorized access to equipment,
76
Attachment 2
A2.1. Site Selection. It may not be possible to select sites that meet all
requirements needed to implement effective force protection measures;
nevertheless, a list of considerations can be developed and used during the site
selection process. Keep the following force protection considerations in mind
when selecting beddown sites:
A2.1.1. Consider the threat throughout the entire site selection process.
A2.1.5. Select beddown areas that are away from public roads and uncontrolled
areas.
A2.1.6. Avoid areas where terrain features provide adversaries with too many
vantage points.
A2.1.12. Consider adjacent land use and direct lines of sight or access to the site.
A2.1.13. Consider the need to modify terrain outside the established perimeter to
provide clear zones and eliminate potential hiding places.
A2.1.14. Consider support needed from the local area (i.e., utilities, sanitation,
indigenous materials, equipment, etc.) and how this impacts force protection
efforts.
A2.1.15. Consider site elevation to deny advantage for potential aggressors (i.e.,
lines of sight, targeting opportunities, etc.).
A2.1.18. Consider the need to establish separate ECPs for delivery vehicles.
A2.1.19. Consider the need for vehicle queue space and search pits.
A2.1.20. Consider the need to disperse key facilities and critical assets.
A2.1.23. Consider the need to orient facilities to avoid direct line of sight from
the perimeter.
81
A2.1.24. Consider the need to position high-value facilities and assets near the
center of the site.
A2.2. Site Layout. Key elements to consider during site layout include standoff
distances, layered security, number and location of ECPs, redundant utilities,
protection of all key assets, ammunition storage, hazardous material and
hazardous waste storage, and protective shelters throughout the site. Maintain
maps that indicate, in detail, where every asset will be placed and where all
protective construction (i.e., revetments, bunkers, etc.) will take place. Also
consider the following elements during site layout.
A2.2.1. Use the threat assessment when determining how best to site facilities in
relation to existing roads and the controlled perimeter.
A2.2.6. Consider terrain, elevation, and available space when siting the ECF.
Include space for approach zones, access zones, and response zones, queue
space; parking space, and space for vehicle search pits. Use AFH 10-2401 and
UFC 4-022-01 as guidance for ECF layout.
A.2.2.7. Clear dense vegetation around the perimeter that may be used by
adversaries to camouflage or conceal themselves while conducting surveillance,
attempting to gain access to the site, or targeting priority assets.
82
A2.2.10. Avoid siting structures and critical equipment in areas where terrain
offers vantage points from which adversaries might target facilities and other
critical assets.
A2.2.11. Site key facilities and critical assets towards the center of the site to
attain maximum standoff distance from the perimeter.
A2.2.12. Provide redundant utility systems and bury all utility lines.
A2.2.13. If the threat warrants, disperse facilities and key assets to reduce the
possibility of collateral damage to multiple assets from a single attack.
A2.2.14. If key assets can be better protected if clustered and FP resources are
available to increase their level of protection, consider this option.
A2.2.15. Orient facilities in a manner that reduces a direct line of sight from
outside the perimeter and in a manner that limits the amount of damage from a
blast (the end of a facility faces the area of the potential blast versus the sides
facing the area of the potential blast).
A2.2.18. Site facilities that receive bulk deliveries and other structures more
vulnerable to an attack (e.g., industrial areas, hazardous waste/hazardous storage
areas, refuse collection areas, etc.) in areas away from the main inhabited
portion of the site. These areas still need to be secured.
83
A2.2.20. Ensure parking areas are constructed to provide the minimum standoff
distance from facilities as determined by DOD standards or the CCDR.
A2.2.21. Select areas for siting trash containers at least 10m/33ft away from
facilities and other key assets.
A2.2.23. Site MNS components in areas so that voice notification may be heard
throughout the entire site.