RESOURCE PROTECTION PROGRAM CONTROLLED AREA TRAINING - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

RESOURCE PROTECTION PROGRAM CONTROLLED AREA TRAINING

Description:

JACQUI IRELAND. LOCATED IN BUILDING 582 INVESTIGATIONS OFFICE, RAF ALCONBURY. TEL. 268 - 3062 ... Form 1109/Visitor Log and escorted by someone listed on EAL ... – PowerPoint PPT presentation

Number of Views:37
Avg rating:3.0/5.0
Slides: 17
Provided by: 501cswU
Category:

less

Transcript and Presenter's Notes

Title: RESOURCE PROTECTION PROGRAM CONTROLLED AREA TRAINING


1
RESOURCE PROTECTION PROGRAMCONTROLLED AREA
TRAINING


2
RESOURCE PROTECTION MANAGER
  • JACQUI IRELAND
  • LOCATED IN BUILDING 582 INVESTIGATIONS OFFICE,
    RAF ALCONBURY.
  • TEL. 268 - 3062

3
CONTROLLED AREA TRAINING
  • OVERVIEW
  • Governing Instructions
  • Definition of a Controlled Area
  • Entry into Your Controlled Area
  • Unauthorized Personnel in Your Area
  • Training Personnel in Your Area
  • Bomb Threat Emergency Egress Procedures
  • Emergency Response Procedures

4
CONTROLLED AREA TRAINING
  • GOVERNING INSTRUCTIONS
  • Governed by
  • AFI 31-101 AND ALCON 31-101
  • All controlled area monitors should be
    familiar with these instructions. A hard copy of
    each is found in the Resource Protection Managers
    Office

5
DEFINITION OF A CONTROLLED AREA?
  • CONTROLLED AREA?
  • The designation controlled area carries the
    same legal and moral restrictions as a physical
    barrier.
  • Unless physical barriers are specifically
    required, the actual control may depend entirely
    on the protection consciousness of the personnel
    in the designated area.

6
CONTROLLED AREA DESIGNATION?
  • CONTROLLED AREA DESIGNATION
  • Controlled Areas are approved in writing by the
    Installation Commander (routed through Chief,
    Security Forces)
  • Controlled area monitors must develop written
    OIs to regulate entry and internal circulation
    control covering
  • Entry during normal/contingency/emergency
    conditions
  • Bomb threat procedures
  • Internal Circulation Control Procedures
  • Training requirements and where training is to be
    documented
  • Any other points as designated by Installation
    Security Council (ISC)
  • Controlled areas will maintain a current letter
    designating a primary/alternate monitor. (unit
    monitors will train all other personnel working
    in the area)

7
ENTRY INTO YOUR CONTROLLED AREA
  • ENTRY CONTROL PROCEDURES
  • Keep entrances to a minimum
  • Owner/user control entry to their areas using a
    commander signed Entry Authority Listing (EAL)
    unless the installation commander specifically
    assigns entry control responsibility to another
    agency.
  • Support Techniques Personnel recognition, third
    party authentication, telephone verification,
    sign/countersign (for emergency entry), cipher
    locks, or any technique considered appropriate.
  • Sign visitors in using AF Form 1109/Visitor Log
    and escorted by someone listed on EAL
  • Post controlled area signs in conspicuous and
    proper places (all entry points and all sides of
    facility)
  • Challenge any person that at a specific time or
    place, appears questionable. Challenging
    procedures will include contacting a supervisor
    if there is any doubt as to the persons right to
    be in the area, and promptly requesting security
    forces assistance if a persons right to be in the
    area cannot be verified.

8
HOW TO CONTROL ENTRY
  • HOW TO CONTROL ENTRY
  • An individual approaches your controlled area and
    requests entry
  • Do you recognize this person by name?
  • Does this person have valid DOD/AF credentials?
  • Did you receive prior notification of the
    individual needing to access your area?
  • If not, call appropriate agency to verify their
    need to enter
  • If so, check the individuals identification
    credentials
  • Sign the person in on an AF Form 1109
  • Maintain observation of the individual(s) until
    they depart the
  • area

9
UNAUTHORIZED INDIVIDUAL?
  • UNAUTHORIZED INDIVIDUAL?
  • Challenge any individual you do not recognize,
    appears suspicious and/or refuses to depart the
    area
  • Immediately call Security Forces at 2400
  • For exercises contact Security Forces at 2400
  • Cease all operations and secure all classified
    material until the perpetrator is removed by
    Security Forces

10
TRAINING
  • TRAINING PERSONNEL
  • The RPM will train all primary controlled area
    monitors initially, then annually.
  • Primary monitors will in-turn train all personnel
    who work within the controlled area annually and
    initially when new personnel commence working in
    the controlled area.
  • This training should be documented using the
    training confirmation supplied and maintained in
    your Resource Protection Folder with a copy
    forwarded to 423 SFS/S3OR.

11
BOMB THREAT EMERGENCY EGRESS PROCEDURES
  • BOMB THREAT PROCEDURES
  • Suspicious Package
  • DO NOT TOUCH!
  • Attempt to immediately find the owner.
  • If the owner cannot be found notify the SFCC by
    dialling 2400 and provide description of the
    package and exact location.
  • Immediately evacuate the facility and have
    everyone meet in a designated area.
  • Make sure everyone in the area is familiar with
    your local bomb threat procedures.
  • Make sure procedures are in place for emergency
    egress from your area which may include duress
    words, routes of escape, meeting points etc.

12
BOMB THREAT PROCEDURES
  • BOMB THREAT PROCEDURES
  • VIA PHONE
  • Use the AF Form 440/Bomb Threat Aid (placed next
    to all phones)
  • Attempt to ask all questions on the 440 to the
    caller
  • Annotate all detailed information on the 440
    including time/date of call, callers sex, accent
    and approximate age
  • Lastly do not hang up the phone

13
EMERGENCY ENTRY PROCEDURES
  • EMERGENCY ENTRY PROCEDURES
  • Only allow entry to emergency response personnel
    if aware of an actual emergency within the area
    (secure all classified materials)
  • If possible, monitor emergency response personnel
    while in the area
  • Retrieve the name, unit, and duty phone of the
    senior emergency response official after all
    clear has been sounded (for any future follow-up
    concerns)
  • Lastly, conduct an inventory of all controlled
    resources upon termination of the emergency
    response

14
INTRUSION DETECTION EQUIPMENT (IDE)
  • INTRUSION DETECTION EQUIPMENT
  • The owner/user must test the IDE with the
    Security Forces quarterly and annotate the test
    on the alarm test record kept in the Resource
    Protection Folder.
  • The CAFB Form 51, Entry Authority List (EAL) will
    be kept continuously updated of any personnel
    changes and forwarded to 423 SFS/SFOR.
  • During an IDE failure the owner/user will
    maintain 24 hour security by posting a guard in
    the area until the alarm system is fixed.
  • Alarm Authentication Letters, held at SFCC must
    be updated every 180 days or when personnel
    changes occur.

15
AND FINALLY!
  • Conclusion
  • Always use personal recognition, DOD/AF
    credentials, telephone verification, and/or prior
    notification to allow visitors escorted entry
    into the controlled area
  • If you find an unauthorized person(s) in your
    area, immediately attempt to remove them and
    report the incident to Security Forces by dialing
    2400
  • Dont be fooled by tool belts, uniforms, ID cards
    etcif in doubt, call the appropriate agency
    before allowing entry
  • If you can not verify an individuals need to
    enter your controlled area, DONT let them in.

16
QUESTIONS?
  • ANY QUESTIONS
  • CONTACT JACQUI IRELAND
  • 423 RESOURCE PROTECTION MANAGER
  • 268 3062
  • Please now complete and return the training
    confirmation slip included with this presentation
    to Jacqui Ireland SFS/S3OR
Write a Comment
User Comments (0)
About PowerShow.com