Custom Search
 
  

 

APPLICATION OF DECALS IN OVERSEAS AREAS

Certain overseas activities and other locations where terrorist activity is acute and ongoing may be exempt from the provisions of this requirement and OPNAVINST 5560.10 and OPNAVINST 11200.5. Stronger emphasis should be placed on positive identification and control of vehicles and occupants entering installations and activities exempt from the requirement to display vehicle decals. At small activities, the use of vehicle access lists could be employed to provide positive vehicle identification. The use of portable decals displayed on the windshield of vehicles is discouraged because of potential theft and illegal use of these decals. Personal recognition continues to be the best method of identification and should be used whenever possible. Those activities meeting this criteria and desiring to be exempt must obtain an exception to the requirement, according to paragraph 0116 in OPNAVINST 5530.14.

VISITOR CONTROL

Vehicles requiring only temporary access may be issued locally produced temporary vehicle passes. A large card displayed on the sun visor or windshield may be used as a temporary pass.

A temporary pass may be printed in several colors that can be changed periodically to detect unauthorized use. In addition to identification information, the following warning should be included:

Acceptance of this pass constitutes your consent to inspection of this vehicle and occupants therein by security force personnel when entering, aboard, or leaving this station. Visitors aboard this installation are guests of the commanding officer and, as such, should conduct themselves in accordance with the limited conditions under which the invitation is extended. Political activities, pamphleteering, speeches, demonstrations, placard/banner displays, or other similar conduct will not be permitted without prior written permission of the commanding officer. Persons violating these conditions will have their invitations withdrawn, be removed from the installation, and are subject to prosecution.

Commercial vehicles may be authorized entry by permanent registration or visitor control methods. In addition to the normal administrative inspection procedures, additional precautions should be taken to prevent the introduction or removal of unauthorized material or personnel.

HONORING OF VEHICLE IDENTIFICATION

Since military, retired military personnel, and certain civil service employees will generally have personal or official requirements to enter nearby military activities in their private automobiles, the honoring of DOD vehicle identification media issued by other activities is allowed, according to OPNAVINST 5560.10.

SPECIAL PRECAUTIONS

Personnel responsible for the accomplishment or implementation of personnel and vehicle control procedures should at all times be watchful for the unauthorized introduction to or removal from the installation of government property, especially weapons, ammunition, and explosive materials. This surveillance should encompass all personnel and means of transportation, including government, private, and commercial vehicles, aircraft, railcars, and ships.

INTRUSION DETECTION SYSTEMS

LEARNING OBJECTIVES: State the purpose of Intrusion Detection Systems (IDSs). Identify 6 advantages of IDSs and list 10 factors to consider when these systems are employed. Describe four types of IDSs.

Intrusion Detection Systems (IDSs) are an essential element of any in-depth physical security program. IDSs consist of sensors capable of detecting one or more types of phenomena, signal media, annunciators, and energy sources for signaling the entry or attempted entry into the area protected by the system. The design, implementation, and operation of the IDS should contribute to the overall physical security posture and the attainment of security objectives. IDSs are designed to detect, not prevent, actual or attempted penetrations. Therefore, IDSs are useless unless supported by near-real-time assessment systems and prompt security force response when the systems are activated.

The advantages of IDSs include the following:

. Permit more economical and efficient use of security personnel through the employment of mobile responding security forces instead of fixed guard posts and/or patrols

. Provide additional controls at critical areas or points

. Substitute for other physical security measures that cannot be used because of safety regulations, operational requirements, building layout, cost, or similar reasons

. Provide insurance against human error 

. Enhance the security force capability to detect and defeat intruders

. Provide the earliest practical warning to security forces of any attempted penetration of protected areas

IDS EMPLOYMENT FACTORS

The following factors should be considered in determining the feasibility and necessity of installing IDS equipment:

l Mission

l Criticality

l Threat

l Geographic location of the installation or facility and location of facilities to be protected within each activity or installation

l Accessibility to intruders

l Availability of other forms of protection

l Life cycle cost of the system

l Construction of the building or facility

l Hours of operation

l Availability of a security force and expected response time to an alarm condition

TYPES OF INTRUSION DETECTION SYSTEMS

There are basically four types of IDSs: the local alarm; central station; police connection; and proprietary. Each of these systems will be discussed in turn.

Local Alarm

In the local alarm system, the protective circuits and alarm devices actuate a visible or audible signal in the immediate vicinity, usually on the exterior of the building. The alarm transmission/communication lines do not leave the building. Response is by local security forces that may be in the area when the alarm is sounded. Otherwise, the security force will only know of the alarm if it is reported by a passerby or found during routine checks. The disadvantage of this system is that intruders know exactly when the alarm is activated and can easily elude capture. This system should be used only when guards can respond in a timely manner.

Central Station

In the central station system, the operation of alarm devices and electrical circuits are automatically signaled to, recorded in, maintained and supervised from a central station owned and managed by a commercial firm with guards and operators in attendance at all times. These personnel monitor the signals and provide the response force to any unauthorized entry into the protected area. Connection of alarm equipment to the central station is usually over leased telephone company lines. The provisions of paragraph 0809c in OPNAVINST 5530.14 apply.

Police Connection

In the police connection system, the alarm devices and electrical circuits are connected via leased telephone company lines to a monitoring unit located in nearby civilian police stations. An agreement with the local police department must be arranged before establishment of this type of system. The provisions of paragraph 0809c in OPNAVINST 5530.14 apply.

Proprietary

The proprietary IDS is the prescribed IDS for all naval activities and installations. This system is quite similar to a central station operation except that the IDS monitoring/recording equipment for all IDSs at the installation is located within a constantly manned security force communications center maintained and owned by the government installation. The installation security force responds to all IDS activations. Connection of the alarm sensor equipment to the security force central monitoring station is normally over leased telephone company lines or by separate cable owned and installed by the installation. If a computerized IDS is used, it must be safeguarded against tampering.







Western Governors University
 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business