military police mp 1002 area security

Upload: maugli1978

Post on 04-Jun-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Military Police MP 1002 Area Security

    1/72

    SUBCOURSE EDITION

    MP1002 C

    AREA SECURITY

  • 8/13/2019 Military Police MP 1002 Area Security

    2/72

    AREA SECURI TY

    Subcour se Number MP1002

    EDI TI ON C

    Uni t ed St at es Ar my Mi l i t ar y Pol i ce School

    For t Leonar d Wood, MO 65473- 8929

    5 Cr edi t Hour s

    Edi t i on Date: J anuar y 1996

    SUBCOURSE OVERVI EWWe desi gned t hi s subcour se to t each you t o i dent i f y the need f or secur i t yand t o i mpl ement appr opr i ate secur i t y measures t o count er t he t hr eat .

    Ther e ar e no prer equi si t es f or t hi s subcour se.

    Thi s subcour se r ef l ect s t he doct r i ne whi ch was cur r ent at t he t i me i t waspr epar ed. I n your own wor k si t uat i on, al ways ref er t o t he l at est of f i ci alpubl i cat i ons.

    Unl ess ot herwi se st ated, t he mascul i ne gender of si ngul ar pr onouns i s usedt o ref er t o bot h men and women.

    TERMI NAL LEARNI NG OBJ ECTI VE

    ACTI ON: You wi l l i dent i f y t he need f or secur i t y and t he secur i t y

    measures t o i mpl ement .

    CONDI TI ON: You wi l l have t hi s subcour se, paper and penci l .

    STANDARD: To demonst r at e compet ency of t hi s t ask you must achi eve ascore of 70 percent on t he f i nal subcour se exami nat i on.

    i MP1002

  • 8/13/2019 Military Police MP 1002 Area Security

    3/72

    TABLE OF CONTENTS

    Sect i on Page

    Subcour se Over vi ew . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i

    Lesson 1: Oper at i ons Secur i t y ( OPSEC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1- 1

    Pr act i ce Exer ci se . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1- 9

    Answer Key and Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1- 10

    Lesson 2: I dent i f y Personnel I D and Cont rol Procedures. . . . . . . . . . . . . . . . . 2- 1

    Pr act i ce Exer ci se . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2- 13

    Answer Key and Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2- 16

    Lesson 3: Det er mi ne Bomb Threat Cont i ngency Pl anni ng . . . . . . . . . . . . . . . . . . . 3- 1

    Pr act i ce Exer ci se . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3- 18

    Answer Key and Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3- 20

    Lesson 4: Empl oy I nt r usi on Detect i on Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . 4- 1

    Pr act i ce Exer ci se . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4- 14

    Answer Key and Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4- 16

    Appendi x: Bomb Thr eat Dat a. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A- 1Af t er Act i on Repor t . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B- 1Sear ch Checkl i st . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C- 1Det ect i on Gl ossar y. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D- 1

    MP1002 i i

  • 8/13/2019 Military Police MP 1002 Area Security

    4/72

    LESSON 1

    OPERATI ONS SECURI TY ( OPSEC)

    Cr i t i cal Task: 191- 386- 0009

    OVERVI EWLESSON DESCRI PTI ON:

    I n t hi s l esson you wi l l l earn t o def i ne OPSEC, det ermi ne OPSEC i n t hehost i l e i nt el l i gence t hr eat , and det er mi ne OPSEC gui del i nes and t r ai ni ng.

    TERMI NAL LEARNI NG OBJ ECTI VE:

    ACTI ON: Def i ne OPSEC, i t s gui del i nes, and t r ai ni ng r equi r ement s.

    CONDI TI ON: You wi l l have t hi s subcour se, paper and penci l .

    STANDARD: To demonst r at e compet ency of t hi s t ask you must achi eve ascore of 70 percent on t he f i nal subcour se exami nat i on.

    REFERENCES: The mater i al cont ai ned i n t hi s l esson was der i ved f r om t hef ol l owi ng publ i cat i ons: AR 530- 1 and FM 19- 30.

    I NTRODUCTI ON

    Oper at i on secur i t y hel ps to avoi d di scl osur e of sensi t i ve i nf or mat i on. Such

    dat a concer ns a uni t ' s mi ssi on, capabi l i t i es, r esear ch and devel opment . I tal so i ncl udes t r ai ni ng whi ch coul d pr event t he compr omi se of mi l i t ar yoper at i ons.

    1. Def i ni t i on of Oper at i ons Secur i t y ( OPSEC) .

    a. OPSEC ( whi ch i s cover ed by AR 530- 1, Fi g. 1- 1) i s t he pr ot ect i on ofmi l i t ar y oper at i ons and acti vi t i es. Such pr ot ecti on r esul t s f r om t hei dent i f i cat i on and f i nal el i mi nat i on or cont r ol of i nt el l i gence i ndi cat ors.We r ef er t o t hese i ndi cat or s as vul ner abi l i t i es. These ar e t hose ar eassuscept i bl e t o host i l e at t ack. Mi l i t ar y oper at i ons and acti vi t i es i ncl udepeacet i me and combat operat i ons. Al so i ncl uded are exerci ses and

    cont i ngency pl anni ng.

    b. OPSEC i s desi gned t o pr ot ect oper at i ons and act i vi t i es f r om bei ngcompr omi sed by any host i l e i nt el l i gence servi ce. A basi c OPSEC pr ogr amconsi st s of t he f ol l owi ng mai n ar eas:

    ( 1) Physi cal Secur i t y.

    1-1 MP1002

  • 8/13/2019 Military Police MP 1002 Area Security

    5/72

    ( 2) I nf or mat i on Secur i t y.

    ( 3) Si gnal Secur i t y.

    ( 4) Decept i on.

    FI GURE 1- 1. OPSEC

    c. An act i ve OPSEC pr ogr am cont i nual l y r at es each oper at i on.Eval uat i on i s based upon al l known i nt el l i gence col l ect i on met hods. Thi spr ogr am al so assesses vul nerabi l i t i es. Then measur es are begun t o r educe or

    negat e col l ect i on ef f or t s agai nst t hose ar eas.

    d. OPSEC i s t he concer n of COs, st af f s and per sons at al l l evel s ofcommand. Uni t s and i ndi vi dual s set up st eps necessar y f or good OPSEC. I norder t o do t hi s, t hese peopl e must t r ai n; t hey must be abl e t o use pr opert echni ques and pr ocedur es. OPSEC i s a par t of al l oper at i ons. Ani nef f ect i ve pr ogr am r esul t s when peopl e do not bel i eve OPSEC i s i mpor t ant .

    e. The r esul t of a good OPSEC pr ogr am i s f or ce secur i t y. Agai n, t hi sr equi r es an i nt egr ated ef f or t by everyone concer ned. OPSEC i s adapt ed t of i t t he oper at i ng t r ai t s, t echni ques and needs of each or gani zat i on. Eachuni t t akes t hose st eps necessary; t hese st eps shoul d pr ovi de secur i t y andr etai n t he el ement of sur pr i se. The goal of each uni t i s t o keep t he enemyf r om l ear ni ng what t he f r i endl y uni t i s goi ng t o do. The i nt el l i gencet hr eat t o US mi l i t ar y oper at i ons t oday i s gr eat , and i t cont i nues t o gr ow.Pot ent i al enemi es ar e dai l y worki ng t o gai n i nf ormat i on. They seek datar egar di ng our capabi l i t i es and l i mi t at i ons; t hey want t o know our i nt ent i onsand pl ans; t hey want data on our t act i cs and r eadi ness. The enemy f i ndscert ai n data val uabl e and expl oi t abl e. Exampl es ar e our communi cat i onspat t erns and st ereot yped

    MP1002 1- 2

  • 8/13/2019 Military Police MP 1002 Area Security

    6/72

    pr ocedur es. Al so, many t ypes of uncl assi f i ed i nf or mat i on ar e of val ue t ot hem. Many of t hese sour ces are of t en over l ooked as pot ent i al secur i t ybr eaches. OPSEC consi der at i ons must be f ul l y i nt egr at ed i nt o al l dai l ydut i es. Thi s shoul d be done i n addi t i on t o i nt egr at i on i nt o speci al hi ghl ysensi t i ve oper at i ons. OPSEC i s a command r esponsi bi l i t y.

    2. OPSEC and t he Host i l e I nt el l i gence Thr eat .

    a. The most ser i ous t hr eats t o t he secur i t y of Ar my operat i ons andact i vi t i es ar e host i l e i nt el l i gence ser vi ces and t hei r agent s. Cont i nuousemphasi s by t hese ser vi ces i s pl aced on col l ect i ng dat a. Such dat a, ofcour se, r el at es t o t he U. S. and al l i ed f or ces mi l i t ar y capabi l i t i es. I tal so concer ns r esear ch, devel opment , and i ndust r i al t echni ques.

    b. Ther e are means of pr ot ect i ng cl assi f i ed and/ or sensi t i vei nf or mat i on f r om unaut hor i zed di scl osur e: t he Ar my' s OPSEC act i vi t i es ar eused t o count er t hese t hr eat s. Those means ar e as f ol l ows:

    ( 1) Human I nt el l i gence ( HUMI NT) .

    ( 2) Si gnal I nt el l i gence ( SI GI NT) .

    ( 3) I mager y Thr eat Phot ogr aphi c I nt el l i gence ( PHOTI NT) / ( I MI NT) .

    ( 4) El ect r oni c War f ar e ( EW) .

    3. Human I nt el l i gence ( HUMI NT) .

    a. HUMI NT i s t he i nt el l i gence obt ai ned by usi ng peopl e t o gather i t emsof dat a. HUMI NT col l ect i on i nvol ves bot h over t and cover t oper at i ons.Exampl es of over t oper at i ons woul d i ncl ude dat a obt ai ned f r om publ i c r ecor dsand publ i cat i ons; cover t oper at i ons i ncl ude i nduci ng peopl e t o di scl ose

    i nf or mat i on. I t al so i ncl udes eavesdr oppi ng on conver sat i ons and/ orconduct i ng sur vei l l ance operat i ons. HUMI NT may i ncl ude sour ces as di ver seas f r i endl y t r oops who r eport i nf ormat i on about t he enemy. These t r oopsr epor t on i nt er r ogat i ons of pr i soner s, def ect or s, and r ef ugees; al so, t heyr epor t on count er i nt el l i gence sour ces. Tr oops wi l l i ncl ude st at ement s madeby of f i ci al s of f or ei gn count r i es and t hey wi l l r epor t on t er r or i stact i vi t i es. However , t he i ndi vi dual sol di er i s usual l y t he most i mpor t antHUMI NT sour ce.

    b. The enemy has many ways of col l ect i ng dat a, and any number of t hesemethods coul d be t argeted any t i me and i n var yi ng degr ees of i nt ensi t y. Wedo have pr ocedur es whi ch can deny or hamper t he enemy' s col l ect i on t hr eat .

    Thi s i s t r ue r egar dl ess of t he enemy' s met hods. The procedur es ar e notnecessar i l y new; t he US Ar my has used many of t hem bef ore. Al l pr ocedur eswhi ch keep the enemy f r om col l ect i ng dat a, gi vi ng hi m a t act i cal advant age,ar e gr ouped under OPSEC.

    4. Si gnal I nt el l i gence ( SI GI NT) . SI GI NT i s i nt el l i gence t hat i s obt ai nedby i nt er cept i ng el ect r oni c si gnal s. Thi s dat a i s gat her ed by i nt er cept i ng

    1-3 MP1002

  • 8/13/2019 Military Police MP 1002 Area Security

    7/72

    t el ecommuni cat i ons si gnal s; i t may al so be obt ai ned by i nt er cept i ngel ect r omagnet i c r adi at i ons.

    a. I nt er cept i on of el ect r oni c si gnal s. Exampl es ar e t he i nt er cept i onof t el ephone or r adi o conver sat i ons. Such act i on i s handl ed byCommuni cat i ons I nt el l i gence ( COMI NT) .

    b. I nt er cept i on of el ect r omagnet i c si gnal s. Such si gnal s ar e non- dat ar el at ed r adi at i ons. Radar si gnal s ar e an exampl e. Act i on r el at i ng t o suchi nt er cept i on i s cal l ed El ectr oni c I nt el l i gence ( ELI NT) .

    5. Si gnal Secur i t y ( SI GSEC) . Thi s i s an over al l t er m r ef er r i ng t ocommuni cat i ons secur i t y measures. Such measures ar e t aken t o deny enemycol l ect i on of dat a f r om COMI NT and ELI NT oper at i ons. By l i st eni ng t o ourel ect r oni c emi ssi ons, t he enemy gai ns i nf or mat i on. Thi s dat a r el at es to ourdi sposi t i ons, oper at i ons, et c. Such dat a can be f ed di r ect l y i nt o t hecol l ect i on syst em f or t hei r i nt el l i gence use. Al so, t hey gai n dat a aboutour el ect r oni c syst ems. They t hen use i t i n pl anni ng act i ons t o r educe ourcombat ef f ect i veness. They can accompl i sh t hei r pl ans by i nt er f er i ng wi t ht hose syst ems.

    6. Compromi si ng Emanat i ons. Dat a may al so be obt ai ned by t he enemyt hrough compr omi si ng emanat i ons. These are uni ntent i onal and may be dat ar el at ed or i nt el l i gence- bear i ng i mpul ses. These i mpul ses may be el ect r i cal ,magnet i c, or acoust i cal . They ar e emi t t ed by or come f r om any el ect r i cal l yr un, dat a- pr ocessi ng equi pment or f aci l i t y. Such i mpul ses r el at e t o t hepr epar at i on, t r ansmi ssi on, r ecei pt , st or age or r et r i eval of cl assi f i ed dat a.Exampl es ar e el ect r i c t ypewr i t ers and cr ypt o equi pment . Aut omat i c datapr ocessi ng equi pment i s another exampl e. Cont r ol of t hese emanat i ons( TEMPEST) i s a f ur t her count er t o t he SI GI NT thr eat .

    7. I mager y Thr eat . Some i nt el l i gence i s der i ved mai nl y f r om r adar ,

    i nf r ared, and photogr aphi c sensors car r i ed by overhead pl at f or ms. To assur et i mel i ness, i nt el l i gence gai ned f r om i mager y must be di ssemi nat ed t o COsel ect r oni cal l y. Thi s i s done as opposed t o sendi ng t hem phot ogr aphi cal l y.I magery can be t he most accur ate data f or t he pr oduct i on of i nt el l i gence,but i t i s l i mi t ed. Weat her , host i l e count er measur es, and of t en, l ack oft i mel i ness ar e l i mi t at i ons. Wi t hi n t he i nt el l i gence communi t y andt hr oughout t he mi l i t ary, i magery may al so be r ef er r ed t o as PHOTI NT. Thi si s an acronym f or phot ogr aphi c i nt el l i gence.

    8. El ect r oni c War f ar e ( EW) . The EW t hr eat consi st s of el ect r oni c war f ar esupport measures ( ESM) , and el ect r oni c count er measures ( ECM) . Act i ons ar et aken by ESM t o sear ch f or , i nt er cept , i dent i f y or l ocat e sour ces of

    r adi ated el ect r omagnet i c energy. Al l of t hese must have i mmedi ate t hr eatr ecogni t i on. J ammi ng and el ect r oni c decept i on i nvol ves ECM. Such act i onsare necessar y t o pr event or r educe t he use of t he el ect r omagnet i c spect r um.

    9. Mi l i t ar y Decept i on. Act i vi t i es ar e desi gned t o mi sl ead t he enemyr egar di ng f r i endl y i nt ent i ons. Thi s i s done by empl oyi ng vi sual , soni c,el ect r oni c, ol f act or y, or other means. The goal i s to mani pul at e, di st or t ,

    MP1002 1- 4

  • 8/13/2019 Military Police MP 1002 Area Security

    8/72

    Fal si f y, or deny evi dence of i nt ended or cur r ent oper at i ons or act i vi t i es.By so doi ng, t he enemy i s i nduced t o react i n a way pr ej udi ci al t o hi s besti nteres t .

    10. OPSEC Anal ysi s Pr ocedur es. The OPSEC anal ysi s pr ocedur es areaccompl i shed t hr ough f our st eps. The f i r st t wo ar e anal ysi s and sel ect i ngt he cor r ect pr ot ect i ve measure; t he second two ar e choosi ng count ermeasures

    and sur veys. These st eps cor r espond r espect i vel y t o t he pl anni ng,execut i on, and af t er - act i on of an oper at i on.

    a. Anal ysi s. Conduct i ng an OPSEC anal ysi s i s par t of t he nor mal st af fwork. Anal ysi s must be done i n pl anni ng each phase of an operat i on. Thr eet hi ngs have t o occur :

    ( 1) Est i mat i ng t he Host i l e I nt el l i gence Thr eat . Once t he S3 hasst at ed t he mi ssi on, est i mat i on i s done by t he S2. The S2 coordi nat es wi t ht he communi cat i ons- el ect r oni c of f i ces, support i ng Ar my Secur i t y Agency (ASA)el ement s, and ot her sour ces. Thei r ai m i s t o f i nd answer s t o t wo ver yi mpor t ant quest i ons: "What ar e t he enemy' s i nt el l i gence col l ect i oncapabi l i t i es?" "What ar e t he i nt el l i gence col l ect i on r esour ces of t he enemy

    CO di r ect l y opposi ng us?" The S2 wi l l t r y t o determi ne t he i mpact of t hoseenemy capabi l i t i es used i n the i mmedi at e ar ea.

    ( 2) Det er mi ni ng t he Sensi t i ve Aspect s of t he Oper at i on. Thi s t ask i sa j oi nt ef f ort of S3 and S2. They must answer t he quest i on: " I f known byt he enemy, what i nf ormat i on, i n what t i me f r ame, coul d compromi se t heoper at i on?" Some essent i al el ement s of f r i endl y i nf or mat i on ( EEFI ) ar e:

    ( a) The obj ect i ve.

    ( b) The uni t conduct i ng t he at t ack.

    ( c) Task or gani zat i on.

    ( d) The r eser ve l ocat i on and i t s composi t i on.

    ( e) The command post .

    ( f ) The mor al e of t he uni t .

    ( g) The uni t st r engt h.

    ( h) Logi st i cal pr obl ems.

    ( i ) The combat servi ce support act i vi t y, l ocat i on and movement .

    ( 3) Det er mi ni ng OPSEC Vul ner abi l i t i es. Thi s ef f or t i s a f unct i on oft he S3. He coordi nat es and r evi ews st af f act i ons necessar y t o accompl i sht he mi ssi on. He must answer t he quest i on: " I f known by t he enemy, whatst af f act i ons, i n what t i me f r ame, coul d pr ovi de EEFI ?"

    1-5 MP1002

  • 8/13/2019 Military Police MP 1002 Area Security

    9/72

  • 8/13/2019 Military Police MP 1002 Area Security

    10/72

    ( 2) I f t he OPSEC of an act i vi t y or agency i s t o be enhanced, a f i r stst ep shoul d be an OPSEC sur vey. Detai l ed i nst r uct i ons i n pl anni ng andconduct i ng surveys are f ound i n t he J CS bookl et , OPSEC Sur vey Pl anni ng Gui de( U) . An i ni t i al sur vey may i ndi cat e t he need f or f ur t her di agnost i cassi st ance. I f so, t hen speci al i zed count er i nt el l i gence ser vi ces shoul d beconsi dered. These servi ces i ncl ude pr ocedur e and pol i cy survey andpenet r at i on oper at i ons at sensi t i ve ar eas. Ser vi ces al so i ncl ude t echni cal

    sur veys, comput er sur veys or t he more compl et e OPSEC sur veys.

    11. OPSEC Trai ni ng.

    a. OPSEC t r ai ni ng i s conduct ed t o enabl e al l per sonnel ( 1) t o r ecogni zeOPSEC degr adi ng procedures, and ( 2) t o under st and gui dance whi ch has beeni ncl uded i n di r ect i ves t o enhance OPSEC. Al so, oper at i ons and act i vi t ypl anner s r ecei ve speci al t r ai ni ng. Thi s enabl es t hem t o avoi d t he i ncl usi onof OPSEC degr adi ng f act or s i n t he di r ect i ves gover ni ng t hei r oper at i ons.Such t r ai ni ng al so enabl es t hem t o i ncl ude as many OPSEC enhanci ng measur esas possi bl e.

    b. I ndoct r i nat i on br i ef i ngs ar e i nt ended t o i nt r oduce r ecent ar r i val s

    t o t he OPSEC concerns r el at ed t o t he mi ssi ons and operat i ng sur r oundi ngs oft hei r new commands. Al so, semi annual f ol l ow- on t r ai ni ng i s conduct ed. Thi sf ocuses on OPSEC concer ns r el at ed t o t he speci al t y ar ea or di sci pl i ne i nwhi ch t he member i s empl oyed. Gr oup semi nar s pr ove most wor t hwhi l e i nf ol l ow- on t r ai ni ng, because t hey al l ow member s of l i ke speci al t y ar eas t odi scuss OPSEC vul ner abi l i t i es. They ar e t hen abl e t o devi se measur es t oel i mi nat e or cont r ol t hose vul ner abi l i t i es.

    c. OPSEC t r ai ni ng shoul d be cont i nui ng and pr ogr essi ve. Thi s shoul d bet he case t hr oughout a servi ce member ' s car eer . To t hi s end, OPSEC t r ai ni ngwi l l i ncl ude the f ol l owi ng:

    ( 1) OPSEC i ndoct r i nat i on br i ef i ng shal l be gi ven t o al l per sonnel .Thi s shal l occur wi t hi n 60 days of ar r i val .

    ( 2) Fol l ow- up OPSEC t r ai ni ng shal l be conduct ed on at l east asemi annual basi s.

    ( 3) Speci al i zed t r ai ni ng i n OPSEC pl anni ng met hods shal l be gi ven.Al l pr i nci pal or i gi nat or s and consumer s of oper at i ons pl anni ng gui danceshoul d at t end.

    d. A commander i s r esponsi bl e f or what hi s uni t does or f ai l s t o do.Obvi ousl y, OPSEC i s no except i on. Wi t h pr oper t r ai ni ng and knowl edge of

    what OPSEC i s, t he sol di er wi l l pr event val uabl e i nf or mat i on f r om get t i ngi nt o t he wr ong hands. The ol d adage of " Loose Li ps Si nk Shi ps, " i s a ver yappropr i at e message when you are deal i ng wi t h OPSEC.

    1-7 MP1002

  • 8/13/2019 Military Police MP 1002 Area Security

    11/72

    THI S PAGE I NTENTI ONALLY LEFT BLANK

    MP1002 1- 8

  • 8/13/2019 Military Police MP 1002 Area Security

    12/72

    LESSON 1

    PRACTI CE EXERCI SE

    REQUI REMENT. The f ol l owi ng quest i ons are mul t i pl e choi ce. You are t osel ect t he one t hat i s cor r ect . I ndi cat e your choi ce by CI RCLI NG t he l et t erbesi de t he cor r ect choi ce di r ect l y on t he page. Thi s i s a sel f - gr aded

    l esson exer ci se. Do not l ook up t he cor r ect answer f r om t he l esson sol ut i onsheet unt i l you have f i ni shed. To do so wi l l endanger your abi l i t y t o l ear nt hi s mat er i al . Al so, your f i nal exami nat i on scor e wi l l t end t o be l owert han i f you had not f ol l owed t hi s r ecommendat i on.

    1. What i s t he t echni que used t o determi ne t he degr ee of secur i t y af f ordedt o a gi ven oper at i on or f unct i on?

    A. OPSEC program.B. SI GSEC.C. OPSEC sur vey.D. COMSEC.

    2. The t ask of det er mi ni ng t he sensi t i ve aspects of an operat i on ( OPSEC)i s t he j oi nt ef f or t of whi ch of t he f ol l owi ng?

    A. S3 and S2.B. S3 and S1.C. S2 and S1.D. S2 and S4.

    3. One of t he most i mpor t ant i t ems t o r emember concerni ng OPSEC t r ai ni ngi s t hat i t shoul d be whi ch of t he f ol l owi ng?

    A. Cont i nui ng and pr ogr essi ve t hr oughout a ser vi ce member' s career .

    B. Conduct ed once and t hen f orgot t en.C. Conduct ed at l east ever y 3 year s.D. None of t he above.

    4. A pr ogr am used t o deny i nf ormat i on t o t he enemy i s cal l ed whi ch of t hef ol l owi ng?

    A. HUMI NT.B. OPSEC.C. SI GI NT.D. REMS.

    5. The most i mport ant sour ce of i nf ormat i on dur i ng war t i me i s usual l ywhi ch of t he f ol l owi ng?

    A. Sol di er s.B. Ref ugees.C. Enemy equi pment .D. Ai r pl anes.

    1-9 MP1002

  • 8/13/2019 Military Police MP 1002 Area Security

    13/72

    LESSON 1

    PRACTI CE EXERCI SE

    ANSWER KEY AND FEEDBACK

    I t em Cor rect Answer and Feedback

    1. C. OPSEC Sur veyAn OPSEC survey. . . ( page 1- 6, para 10d( 1) )

    2. A. S3 and S2.Det er mi ne t he. . . ( page 1- 5, par a 10a( 2) )

    3. A. Cont i nui ng and pr ogr essi ve t hr oughout a ser vi ce. . .OPSEC t r ai ni ng shoul d. . . ( page 1- 7, par a 11c)

    4. B. OPSECOPSEC i s desi gned. . . ( page 1- 1, para 1b)

    5. A. Sol di er s.However , t he i ndi vi dual . . . ( page 1- 3, par a 3a)

    MP1002 1- 10

  • 8/13/2019 Military Police MP 1002 Area Security

    14/72

    LESSON 2

    I DENTI FY PERSONNEL I D AND CONTROL PROCEDURES

    Cr i t i cal Task: 191- 386- 0006

    OVERVI EWLESSON DESCRI PTI ON:

    I n t hi s l esson you wi l l l ear n t o i dent i f y and i mpl ement met hods of per sonneli dent i f i cat i on and cont r ol pr ocedur es.

    TERMI NAL LEARNI NG OBJ ECTI VE:

    ACTI ON: I dent i f y met hods of per sonnel i dent i f i cat i on and cont r ol .

    CONDI TI ON: You wi l l have t hi s subcour se, paper , and penci l .

    STANDARD: To demonst r at e compet ency of t hi s t ask you must achi eve ami ni mum scor e of 70 percent on t he subcour se exami nat i on.

    REFERENCES: The mater i al cont ai ned i n t hi s l esson was der i ved f r om t hef ol l owi ng publ i cat i ons: FM 19- 30, AR 600- 8- 14, AR 380- 67, andAR 50- 5.

    I NTRODUCTI ON

    Per i met er bar r i er s and pr ot ect i ve l i ght i ng ar e physi cal secur i t ysaf eguards, but t hese al one ar e not enough. Secur i t y personnel dai l y seet housands of persons and pr opert y i t ems. These move t hr ough secur i t ydef enses al l t he t i me. Ther e must be cont r ol of anyt hi ng movi ng on and of fpost and r est r i ct ed ar eas. Such cont r ol i s cr i t i cal . Sever al el ement s addt o t he ef f ect i veness of any secur i t y syst em. Some of t hese el ement s ar eent r y cont r ol r ost er s, per sonal r ecogni t i on and I D badges and car ds. Ot herel ement s ar e badge exchange procedures and per sonnel escor t s. The bestcont r ol occur s when t he syst em uses al l t hese el ement s. Si mpl e, wor kabl e I Dand cont r ol pr ocedur es shoul d be used. Thi s wi l l make i t possi bl e t o r eachgoal s wi t hout i mpedi ng ef f i ci ent post oper at i ons. Any good secur i t y syst emshoul d be wel l organi zed and run: a personnel I D and movement cont r ol syst em

    pr ovi des not onl y a means of i dent i f yi ng t hose aut hor i zed t o ent er or l eavean area but al so pr ovi des a means of det ect i ng unaut hor i zed persons who t r yt o ent er. These goal s are achi eved by t he f ol l owi ng pr ocedur es:

    o Det ermi ne who has a need t o be i n t he area.o Li mi t ent r y t o t hose persons who have a r i ght and need to be

    t her e.2-1 MP1002

  • 8/13/2019 Military Police MP 1002 Area Security

    15/72

    o Set up pr ocedur es f or posi t i ve I D of per sons wi t hi n, and ofper sons aut hor i zed ent r y i nt o, ar eas.

    o I ssue speci al passes or badges t o per sonnel aut hor i zed ent r y i nt or est r i cted ar eas.

    o Use ent r y cont r ol r ost er s.o Use i dent i f i cat i on codes.o Use duress codes.

    An addi t i onal pur pose of cont r ol i s t o pr event ent r y of har mf ul devi ces,mat er i al , or component s. I t al so l i mi t s t hef t or compr omi se of mat er i el orr ecorded i nf ormat i on. A personnel I D and movement cont r ol syst em i s theCO' s most ef f ect i ve t ool i n a physi cal secur i t y pr ogr am.

    1. Means of I dent i f i cat i on and Cont r ol of Per sonnel .

    a. Scr eeni ng of Empl oyees. Scr eeni ng of j ob appl i cant s and empl oyees

    i s i mpor t ant i n peacet i me, and i t i s vi t al i n t i me of a nat i onal emer gency.Scr eeni ng pol i ci es shoul d be i n st andar d per sonnel pol i ci es f or peacet i meand f or t i mes of emergency.

    b. Per sonnel Secur i t y Quest i onnai r e. A per sonnel secur i t yquest i onnai r e i s vi t al i n t he i nvest i gat i on of appl i cant s and empl oyees.

    The quest i onnai r e shoul d be checked f or compl et eness . Dr op obvi ousl yundesi r abl e appl i cant s f r om f ur t her consi der at i on. A car ef ul i nvest i gat i onshoul d assure t hat t he empl oyee' s charact er and associ at i ons ar e accept abl e.

    c. Sour ces f or Dat a. Cer t ai n sour ces may be of ai d i n get t i ngempl oyment i nvest i gat i ve dat a. A l i st of t hese sour ces f ol l ows.

    ( 1) St at e and l ocal pol i ce.

    ( 2) For mer empl oyers.

    ( 3) Ref er ences ( i ncl udi ng those not f ur ni shed by appl i cant orempl oyee) .

    ( 4) Publ i c r ecor ds.

    ( 5) Cr edi t agenci es.

    ( 6) School s ( al l l evel s) .

    d. You may need t o r equest data f r om any of t he above sour ces. I f so,i nsur e you pr oper l y i dent i f y t he appl i cant or empl oyee. You shoul d be awar eof t he ant i scr eeni ng pr ohi bi t i on. Thi s i s cover ed under t he Fai r Empl oymentPr act i ces Act ( FEPA) i n some st at es. Pr i vacy Act r est r i ct i ons may al soappl y.

    MP1002 2- 2

  • 8/13/2019 Military Police MP 1002 Area Security

    16/72

    2. Per sonnel Cl ear ances.

    a. AR 380- 67 out l i nes t he pol i cy and general pr ocedur e concer ni ngsecur i t y cl ear ances t o DA personnel . These cl ear ances gr ant access t ocl assi f i ed def ense i nf or mat i on.

    b. The nat i onal per sonnel secur i t y pr ogr am has one mai n pur pose. That

    i s t o i dent i f y per sons wi t h bel i ef s or char act er danger ous t o nat i onalsecur i t y. I t pr ovi des f or a deni al of , or r emoval f r om, posi t i ons of t r ust .Undesi r abl es i n posi t i on of t r ust coul d har m nat i onal i nt er est s. Posi t i veeval uat i on of al l per sons must be made. Such assessment must occur bef oret hey ar e ent r ust ed wi t h sensi t i ve dat a.

    c. Af t er t he requi r ed cl ear ance, t he post CO i ssues a wr i t t en or der .I n i t , he st at es t hat a pass or badge be i ssued f or ent r y t o t he appr opr i at earea. The pass or badge wi l l NOT i ndi cat e by word, col or , or code t hesecur i t y cl ear ance gr ant ed. No ot her document ver i f yi ng a cl ear ance i si ssued t o a person. One shoul d underst and t hat a cl ear ance shows t hat he i san accept abl e r i sk: t hi s has been determi ned by backgr ound i nvest i gat i onsand nat i onal agency checks ( NAC) . I t does not show t hat t here i s no r i sk at

    al l . The "need t o know" must st i l l be t he cont r ol l i ng f act or .

    3. I dent i f i cat i on Syst em.

    a. Set up an I D and cont r ol syst em at each post or f aci l i t y. Thi spr ovi des a means of i dent i f yi ng al l mi l i t ar y, ci vi l i an empl oyees, andvi si t or s. The syst em pr ovi des f or t he use of I D car ds or badges. These ai di n t he cont r ol of movement of per sonnel i nt o, wi t hi n, and out of speci f i edar eas. The st andar d I D car d i s DD For m 2A ( mi l i t ar y) or DA For m 1602( ci vi l i an empl oyee) . Ei t her may be used f or ent r y t o ar eas whi ch ar ebasi cal l y admi ni st r at i ve i n nat ur e. However , t he post CO must appr ove t hi s.

    These I D car ds may be used i n ar eas wi t h no secur i t y i nt er est . Per sons

    needi ng ent r y t o r est r i ct ed ar eas shoul d be i ssued a speci al secur i t y I Dcar d or badge. These are shown i n AR 600- 8- 14. The I D card or badge shoul dbe desi gned as si mpl y as possi bl e. Yet , t hey shoul d st i l l pr ovi de f or aworkabl e and adequat e cont r ol of per sonnel movement .

    b. Use the f ol l owi ng gui del i nes i n your pass or badge cont r ol syst em:

    ( 1) Desi gnat e ar eas where passes and badges are needed.

    ( 2) Descr i be pass or badge i n use; descr i be t he aut hor i zat i on andl i mi t at i ons pl aced upon t he hol der .

    ( 3) Det ai l pr ocedur es at t i mes of ent r y and exi t , i ncl udi ngnonoper at i onal hour s.

    ( 4) Descr i be wher e, when, and how a pass or badge shoul d be worn.

    ( 5) Set up st eps t o be f ol l owed i n case of l oss or damage to a passor badge.

    2-3 MP1002

  • 8/13/2019 Military Police MP 1002 Area Security

    17/72

    ( 6) Set up st eps f or t he di sposi t i on of I D medi a. Thi s need mayoccur on t ermi nat i on of empl oyment and act i ons as a r esul t of secur i t yi nvest i gat i on and f l aggi ng act i ons.

    4. Pur pose and Scope.

    a. A per sonnel I D syst em i s est abl i shed f or secur i t y reasons t o

    accompl i sh t he f ol l owi ng:

    ( 1) Pr ovi de f or t he cont r ol l ed ent r y of per sonnel i nt o post s andf aci l i t i es.

    ( 2) Pr ovi de a pr act i cal syst em of posi t i ve I D of per sonnel wi t haut hor i zed ent r y t o r est r i ct ed ar eas.

    ( 3) Ai d t he cont r ol of and ci r cul at i on of per sonnel i nt o, wi t hi n, andout of r est r i cted ar eas.

    ( 4) Pr ovi de a vi si bl e means of easi l y seei ng any l i mi t at i ons ofpersonnel movement or access wi t hi n r est r i ct ed areas.

    b. Secur i t y I D cards and badges ar e i ssued where a syst em of per sonnelI D and cont r ol i s needed. They ar e used i n addi t i on t o t hat cont r olpr ovi ded by t he st andard I D card. Secur i t y car ds and badges wi l l be usedbef or e movement i nt o, wi t hi n, and out of speci f i ed post s. Speci f i edact i vi t i es or r est r i ct ed ar eas wi l l al so be cover ed by thi s syst em.Secur i t y I D badges i n a l i mi t ed area shoul d undergo r ei ssue when t he l ossf act or r eaches 5 per cent .

    5. Respons i bi l i t i es .

    a. Maj or COs and/ or heads of Ar my st af f agenci es deci de t he use of

    secur i t y I D car ds or badges. They deci de al so on wi t hdr awal or r ei ssue ofcar ds and badges.

    b. Maj or COs and heads of Ar my st af f agenci es are r esponsi bl e f orprocur ement ( except f or DD or DA f orms) of t hese car ds and badges.Preparat i on, i ssue, and use of compl et ed I D car ds and badges ar e al so t her esponsi bi l i t y of t hese per sons. They ar e t o enf or ce t hei r pol i cy on t heuse of such cards and badges as a secur i t y measure. Such r esponsi bi l i t y maybe del egat ed t o COs where appr opr i ate.

    c. Maj or COs and heads of Ar my st af f agenci es must handl e necessar ybudget i ng and f undi ng f or I D cards and badges. The onl y except i ons ar e t he

    DD and DA f or ms. Such r esponsi bi l i t y may be del egat ed t o COs wher eappr opr i at e.

    d. Maj or COs and heads of Ar my st af f agenci es may add ot her secur i t yf eat ur es to t he desi gn of I D cards or badges. However , t hey must meet t hespeci f i c secur i t y r equi r ement s i n AR 640- 3.

    MP1002 2- 4

  • 8/13/2019 Military Police MP 1002 Area Security

    18/72

    6. Speci f i cat i ons.

    a. Secur i t y cards and badges may be photogr aphi c or non- photogr aphi c;t hey may be l ami nated, embossed, seal ed, or otherwi se j oi ned t o achi eve t hedesi r ed l evel of t amper r esi st ance r equi r ed by t he i nst al l at i on or act i vi t yconcer ned. They wi l l meet or exceed t he speci f i cat i ons l i st ed bel ow:

    ( 1) Must i dent i f y the name of t he i nst al l at i on or act i vi t y f or whi cht he car d or badge i s val i d.

    ( 2) Must show t he name of t he per son t o whom i ssued. Vi si t or cardsand badges may show "VI SI TOR" i n pl ace of name.

    ( 3) Cards and badges must cont ai n a card or badge ser i al number orsequence number t o ai d cont r ol and account abi l i t y.

    ( 4) Car ds and badges wi l l show an expi r at i on date.

    ( 5) Car ds and badges wi l l i dent i f y t he ar eas f or whi ch t he car d orbadge i s val i d.

    ( 6) Ar ea desi gnat i on may be vi sual l y shown on t he card or badge or i tmay be coded by mechani cal , el ect r oni c, magnet i c, or some ot her met hodsui t abl e t o t he desi r ed l evel of secur i t y.

    ( 7) Al l non- st andardi zed cards and badges pr oposi ng t he use ofmechani cal el ect r oni c, or ot her t echnol ogi cal r eader s t o det er mi ne accessaut hori zat i on wi l l be appr oved by t he MACOM bef ore use.

    b. The desi gn of t he secur i t y I D car ds and badges must meet or exceedt he f ol l owi ng cr i t er i a:

    ( 1) When a phot ogr aph i s used, i t shoul d measur e 1- i nch wi de and1 5/ 16 i nches i n hei ght . The phot ogr aph woul d el i mi nate t he necessi t y t ost at e descri pt i ve dat a.

    ( 2) Physi cal f eat ur es whi ch ai d i n i dent i f i cat i on may be l i st ed. Forexampl e, hei ght , wei ght , col or hai r , eyes, sex, dat e of bi r t h, andf i ngerpr i nt s .

    ( 3) The car d or badge may show t he name, gr ade, t i t l e, and si gnatur eof t he aut hor i z i ng of f i ci al .

    ( 4) I f t he card or badge has paper el ement s, t he paper may be

    uni quel y const r uct ed, may port r ay a uni que desi gn or di st i nct i ve wat er markor ot her f eat ur es t hat make dupl i cat i on or al t er at i on di f f i cul t .

    ( 5) The car d or badge may cont ai n desi gn f eat ur es di f f i cul t t odupl i cat e such as vi si bl e cross t hr eads or wi r es, f l uor escent i nks, and sof or t h.

    2-5 MP1002

  • 8/13/2019 Military Police MP 1002 Area Security

    19/72

    7. Cl assi f i cat i on, St or age, and Cont r ol .

    a. Cont r ol pr ocedur es shoul d be set up. Thi s shoul d cover t he i ssue,t ur n- i n, r ecover y, or expi r at i on of secur i t y I D car ds and badges.

    b. The engr aved pl ates and al l pr i nt ed or coded component el ement s oft he I D car d or badge assembl y shoul d be handl ed as i f t hey were

    "CONFI DENTI AL. " They shoul d be st ored, saf eguarded, and account ed f or asr equi r ed by AR 380- 5. The source of I D cards and badges shoul d becont r ol l ed. Thi s wi l l pr event use by unaut hor i zed per sons.

    c. Somet i mes car ds or badges are damaged. These may come f r omdi scharged or t r ansf er r ed per sons, or t hose whose empl oyment has been ended.

    These car ds or badges shoul d be t r eat ed as "CONFI DENTI AL. " They shoul d bedest r oyed i n accor dance wi t h AR 380- 5 and other l i ke r egul at i ons. Lostbadges shoul d at once be i nval i dat ed.

    d. I mmedi at el y i nvest i gat e t he event s sur r oundi ng a l ost badge. I tshoul d be det ermi ned i f t he syst emhas been compr omi sed.

    e. Secur i t y cl ear ances wi l l not be recor ded on I D car ds or badges.

    f . Somet i mes, I D cards or badges ar e l ost t hr ough car el essness ornegl i gence. I f so, COs shoul d pr ovi de f or di sci pl i nar y act i ons.

    8. Methods of Cont r ol .

    a. Use of Escor t s. The t i me wi l l come when a person' s name i s not ont he ent r y cont r ol r ost er at a r est r i ct ed ar ea or post . When t hi s occur s, hemust be escor t ed f r om t he ent r ance t o hi s dest i nat i on. Per sons l i st ed ont he ent r y cont r ol r ost er may be admi t t ed wi t hout escor t . Thi s depends uponl ocal pol i cy. Escor t per sonnel may be MPs, ci vi l i an guar ds, or

    r epr esent at i ves of t he per son vi si t ed. Car ef ul l y sel ect escor t per sonnel .Thi s wi l l i nsur e t hei r abi l i t y t o proper l y perf or m escor t t asks .

    b. Per sonal Recogni t i on Syst em. Thi s i s t he surest method ofest abl i shi ng posi t i ve I D. Thi s syst em shoul d be used wi t h an ent r y cont r olr ost er. The t wo wi l l be used t o admi t and cont r ol t he movement of uni t orpost per sonnel wi t hi n a r est r i ct ed ar ea. Thi s syst em i s used when t he ar eaempl oys l ess t han 30 per sons per shi f t , and they are per sonal l y known t o t heguar ds. Al so, t hese shoul d be persons who are subj ect t o a l ow r at e oft ur nover .

    c. Ent r y Cont r ol Rost er . Admi ssi on of uni t or post per sonnel t o

    r est r i ct ed ar eas shoul d be gr ant ed onl y t o those who ar e posi t i vel yi dent i f i ed. Thei r names shoul d appear on a pr oper l y aut hent i cat ed ent r ycont r ol r ost er . They must be persons aut hor i zed by competent aut hori t y t oent er . These r ost er s shoul d be kept at ent r y cont r ol poi nt s t o assur eposi t i ve cont r ol . They shoul d be kept cur r ent , ver i f i ed and aut hent i cat ed.

    They shoul d be account ed f or by a person desi gnat ed by t he CO. Admi ss i on ofpersons not on t he r ost er shoul d be f i r st appr oved by t he uni t or post CO.

    MP1002 2- 6

  • 8/13/2019 Military Police MP 1002 Area Security

    20/72

    Hi s desi gnated r epr esent at i ve may al so gi ve appr oval . Such per sons wi l l beescor t ed or super vi sed at al l t i mes whi l e i n r est r i ct ed ar eas. Ent r ycont r ol r ost er s sent t o a hi gher or l ower l evel must be secur ed i n t r ansi t .

    They must al so be ver i f i ed and authent i cat ed upon r ecei pt .

    9. Badge I dent i f i cat i on System.

    a. A secur i t y I D car d or badge syst em shoul d be est abl i shed t o admi tand cont r ol movement of ever yone admi t t ed t o r est r i ct ed areas. Thr ee of t hemost commonl y used syst ems ar e t he si ngl e card or badge; car d or badgeexchange; and mul t i pl e car ds or badges. These syst ems may r equi r e car dsbei ng carr i ed on t he per son or car ds or badges bei ng wor n on out er cl othi ng.

    Ther e ar e advant ages and di sadvant ages of each t ype syst em. Secur i t yper sonnel must be aware of bot h.

    ( 1) Si ngl e Car d or Badge Syst em. Wi t h t hi s syst em, per mi ssi on t oent er di f f er ent ar eas i s shown on t he car d by l et t er s, numer al s, or col or s.For i nst ance, bl ue may be t he backgr ound col or of t he car d cur r ent l y usedf or gener al admi t t ance. Per mi ssi on t o ent er speci f i c ar eas of hi gherr est r i ct i on may be desi gnated by speci f i ed symbol s or col or s. These are

    over pr i nt ed on t he car d or badge. Thi s syst em gi ves compar at i vel y l oosecont r ol and i s not r ecommended f or secur i t y areas. Per mi ssi on t o ent er doesnot necessar i l y mean t hat one has t he "need t o know. " Cards and badgesof t en r emai n i n t he bear er ' s possessi on dur i ng of f dut y or of f post hour s.

    Thi s i ncr eases t he oppor t uni t y f or al t er at i on or dupl i cat i on.

    ( 2) Card or Badge Exchange Syst em. Thi s i s a syst em of t wo cards orbadges. Each cont ai ns i dent i cal phot ogr aphs, but each has di f f er entbackgr ound col or s, or an overpr i nt on one of t he t wo. One t ype i s pr esent edat t he ent r ance and exchanged f or t he ot her . Thi s second t ype i s car r i ed orwor n whi l e i n t he ar ea. I t i s i dent i cal i n ever y way t o t he f i r st wi t h oneexcept i on. Addi t i onal symbol s or col or s have been added whi ch gr ant f ur t her

    admi t t ance. The pol aroi d camera wi t h a speci al adapt er can make up t o f ourpr i nt s of one pi ct ur e. Thi s met hod pr ovi des ext r a secur i t y by havi ng bot hphot ogr aphs i dent i cal . I n t hi s t ype of syst em, t he second badge or car d i skept i n t he secur i t y ar ea and never l eaves. Thi s decr eases t he possi bi l i t yof f orger y or al t erat i on.

    ( 3) Mul t i pl e Card or Badge Syst em. Thi s i s a f ur t her devel opment oft he exchange syst em expl ai ned i n paragr aph (2) above wi t h one except i on.

    The car d or badge does not have speci f i c mar ki ngs denot i ng permi ssi on t oent er var i ous rest r i ct ed ar eas. I nst ead, an exchange i s made at t heent r ance of each secur i t y ar ea wi t hi n t he post . Exchange car ds or badgesare kept at each ar ea onl y f or t hose persons who have the appr opr i ate car d

    or badge. By vi r t ue of t he l ocal i zed and cont r ol l ed exchange r equi r ement s,t hi s i s t he most secur e and ef f ect i ve syst em.

    b. I n some cases a syst em of per sonnel I D and cont r ol ot her t hanper sonal r ecogni t i on i s i n ef f ect . Then, al l per sons ar e r equi r ed t o weart he I D badge. I t shoul d be wor n i n a vi si bl e pl ace on t he uni f or m; t hel ocat i on wi l l

    2-7 MP1002

  • 8/13/2019 Military Police MP 1002 Area Security

    21/72

    be pr escr i bed by t he CO concer ned. Per sons shoul d be t ol d t hat t he secur i t yI D badge wi l l not be shown of f post .

    10. Enf orcement Measur es.

    a. The most vul ner abl e l i nk i n any I D syst em i s i t s enf or cement . Poorperf ormance of dut y by t he secur i t y pol i ce i n compari ng t he bear er wi t h t hecar d or badge may dest r oy t he best syst em. Posi t i ve enf orcement measur es

    shoul d be pr escr i bed. These wi l l i nsur e ef f ect i ve oper at i on of t he I D andcont r ol syst em.

    b. Choose secur i t y per sons f or dut y at ent r ance cont r ol poi nt scar ef ul l y. Sel ect t hem f or thei r al er t ness, qui ck per cept i on, t act, andgood j udgment .

    c. Formal i zed st andard pr ocedur es are a must f or conduct i ng guard mountand post i ng. Such st eps ar e al so necessar y f or r el i ef of secur i t y per sons.Frequent i nspect i on of per sons on post ( conduct ed at i r r egul ar t i mes) i sef f ect i ve. Thi s pr event s t he post i ng of unqual i f i ed per sonnel and poor dut yperf ormance.

    d. Est abl i sh a uni f or m met hod of handl i ng or wear i ng I D car ds orbadges. I f car r i ed on t he person, t he car d must be r emoved f r om t he wal l etor ot her cont ai ner and handed t o secur i t y pol i ce. A badge shoul d be worn i na vi si bl e posi t i on. Thi s wi l l speed i nspecti on and r ecogni t i on f r om adi st ance.

    e. Ent r ances and exi t s of r est r i ct ed ar eas shoul d be ar r anged i n acert ai n way. Per sons shoul d be f orced by t hi s ar r angement t o pass i n asi ngl e f i l e i n f r ont of t he secur i t y pol i ce. Tur nst i l es may be used t o hel pmai nt ai n posi t i ve cont r ol of ent r ances and exi t s.

    f . Ar t i f i c i al l i ght i ng at cont rol poi nt s shoul d i l l umi nat e personnel

    comi ng and goi ng. I t shoul d be br i ght enough t o enabl e t he secur i t y pol i cet o compar e and i dent i f y t he bearer wi t h the car d or badge.

    g. Card and badge racks or cont ai ners used at cont r ol poi nt s shoul d beavai l abl e onl y t o secur i t y per sons.

    11. Cust odi al Responsi bi l i t i es. A cust odi an must be named t o accompl i shcont r ol pr ocedur es. Basi c cont r ol must i ncl ude i ssue, t ur n- i n, r ecover y,and expi r at i on of badges or cards. The degr ee of compr omi se t ol erabl e i nt he I D syst em i s i n di r ect pr opor t i on t o t he degr ee of secur i t y requi r ed ori ndi cat ed. The f ol l owi ng cont r ol s ar e r ecommended f or t he card and badgesyst em:

    a. Mai nt ai n an accur at e wr i t t en r ecor d or l og. Li st , by ser i al number ,al l cards and badges on hand. I ncl ude t o whom t hese were i ssued, andwhether cards and badges ar e l ost and/ or dest r oyed.

    b. Have cust odi an aut hent i cat e r ecords and l ogs.

    c. Have commi ssi oned of f i cer per f or m a per i odi c i nvent or y of r ecor ds.

    MP1002 2- 8

  • 8/13/2019 Military Police MP 1002 Area Security

    22/72

    d. I nval i dat e l ost car ds and badges.

    e. Post cur r ent l i st s of l ost or i nval i dat ed passes and badges at ent r ycont r ol poi nt s.

    f . Set up cont r ol s t o enabl e secur i t y per sons on dut y t o det er mi ne t henumber of personnel wi t hi n t he ar ea at any t i me. Secur i t y shoul d be abl e t o

    make t hi s deter mi nat i on pr ompt l y and accur atel y.

    g. Est abl i sh t he t wo- man r ul e where needed.

    h. Set up pr ocedur es t o cont r ol movement of vi si t or s t o secur i t y ar eas.A vi si t or cont r ol r ecor d shoul d be mai nt ai ned, and i t shoul d be l ocat edwher e posi t i ve cont r ol s can be exer ci sed.

    12. Two- Per son Rul e.

    a. The t wo- per son r ul e i s an addi t i onal secur i t y measur e. I t i nsur est hat no one person wi l l have access t o nucl ear or chemi cal weapons. Ther ul e r equi r es t he pr esence of at l east t wo aut hor i zed per sons. Each can

    det ect i ncor r ect or unaut hor i zed pr ocedur es wi t h r espect t o t he task t o bedone. Each i s f ami l i ar wi t h appl i cabl e saf et y and secur i t y r equi r ement s.Al so, each per son wi l l be pr esent dur i ng any oper at i on t hat af f or ds accesst o sensi t i ve weapons.

    b. There ar e ot her areas wher e the t wo- per son concept can be used i nphysi cal secur i t y. These ar eas i ncl ude t he f ol l owi ng:

    ( 1) Those ar eas where i nt ent i onal or uni nt ent i onal damage t oequi pment , machi nery, or mater i al must be pr event ed.

    ( 2) Ar eas where uncont r ol l ed access t o f unds must be pr event ed.

    ( 3) Ar eas wher e uncontr ol l ed access t o arms and ammuni t i on must bepr event ed.

    ( 4) Ar eas wher e uncont r ol l ed del i ver y or r ecei pt of mat er i al s must bepr event ed.

    13. Vi si t or Cont r ol Pr ocedur es.

    a. A vi si t or i s any per son not l i st ed on t he ent r y cont r ol r ost er f ort hat ar ea. "Any per son" i ncl udes post per sonnel .

    b. Precaut i ons agai nst t hef t , espi onage, and sabot age r equi r e speci alt r eat ment . Thi s i ncl udes screeni ng, i dent i f i cat i on and cont r ol of vi si t or s.Vi si t or s t o post s ar e gener al l y i n t he f ol l owi ng cat egor i es:

    ( 1) Persons wi t h whom every post must have deal i ngs. Such woul doccur i n connect i on wi t h t he conduct of i t s busi ness. Exampl es arer epr esent at i ves of suppl i er s and cust omer s, l i censor s or l i censees,i nsur ance

    2-9 MP1002

  • 8/13/2019 Military Police MP 1002 Area Security

    23/72

    i nspect or s or adj ust er s, gover nment i nspect or s at nat i onal , st at e, and l ocall evel s, ser vi ce i ndust r y repr esent at i ves, cont r act or s, empl oyees, et c.

    ( 2) Somet i mes i ndi vi dual s or gr oups j ust want t o vi si t a post , andt hei r pur pose i s not essent i al t o oper at i ons. Such vi si t s may be desi r ed bybusi ness, educat i onal , t echni cal , or sci ent i f i c gr oups. Per sons or gr oupswi shi ng t o f ur t her t hei r par t i cul ar i nt er est may al so r equest ent r y.

    ( 3) I ndi vi dual s or gr oups are of t en sponsored by gover nment agenci es.Request s f or vi si t s by f or ei gn nat i onal s shoul d be pr ocessed i n accor dancewi t h AR 380- 25.

    ( 4) Some i ndi vi dual s and gr oups t he government general l y encour ages.Thi s i s because of t he cont r i but i ons t hey make t o economi c and t echni calpr ogr ess. The gr oups al so ai d def ense pr oduct i on i n t he US and/ or i nf r i endl y nat i ons.

    ( 5) Gui ded t our s vi si t sel ect ed por t i ons of post s i n t he i nt er est ofpubl i c rel at i ons.

    c. The gover nment t r i es t o excl ude f r om t he US cer t ai n f or ei gnnat i onal s. These are t hose whose backgr ounds i ndi cat e t hey mi ght engage i nespi onage or sabotage. The gover nment excl udes t hem t hr ough vi sa,i mmi gr at i on, nat ur al i zat i on and r el at ed pr ocedur es. A f or ei gn nat i onali ssued an ent r ance vi sa or admi t t ed t o t he US shoul d not be consi dered f r eeof secur i t y pr obl ems.

    d. Ar r angement s f or t he I D and cont r ol of vi si t or s may i ncl ude t hef ol l owi ng:

    ( 1) Posi t i ve ways of est abl i shi ng t he aut hor i t y f or admi t t i ngvi si t or s. Li mi t at i ons r el at i ve t o ent r y shoul d be est abl i shed.

    ( 2) Posi t i ve I D of vi si t or s by per sonal r ecogni t i on, vi si t or per mi t ,or ot her cr edent i al s. The empl oyer , super vi sor , or of f i ce i n char ge shoul dbe cont act ed. They can det er mi ne t he val i di t y of t he vi si t .

    ( 3) Avai l abi l i t y and use of vi si t or r egi st r at i on f or ms and r ecor ds.These provi de a r ecor d of i dent i t y of t he vi si t or . Such l ogs al so r ecor dt he t i me and dur at i on of t he vi si t , and ot her i mpor t ant cont r ol dat a.

    ( 4) Avai l abi l i t y and use of vi si t or cards or badges. These shoul d benumbered ser i al l y. They shoul d i ndi cate as much of t he f ol l owi ngi nf or mat i on as possi bl e.

    ( a) Bear er ' s name, or vi si t or .

    ( b) Ar ea or ar eas t o whi ch ent r y i s aut hor i zed.

    ( c) Escor t r equi r ement s, i f any.

    ( d) Expi r at i on dat e.

    MP1002 2- 10

  • 8/13/2019 Military Police MP 1002 Area Security

    24/72

    ( 5) Pr ocedur es whi ch wi l l i nsur e suppor t i ng per sonal I D pl us checki ngof vi si t or car ds or badges at r est r i ct ed ar ea ent r ances.

    ( 6) Procedur es f or escor t i ng vi si t or s t hr ough ar eas wher e anuncont r ol l ed per son coul d acqui r e unaut hor i zed dat a. For ei gn nat i onalvi si t or s shoul d be escor t ed at al l t i mes.

    ( 7) Cont r ol s whi ch wi l l r ecover vi si t or car ds or badges onexpi r at i on, or when no l onger r equi r ed.

    ( 8) Twent y- f our hour s advance approval when possi bl e. Where needed,t he post shoul d pr epar e a schedul e f or t he vi si t , and t he post shoul ddesi gnat e an escor t of f i cer .

    e. Enf or cement of t he I D and cont r ol syst em r est s wi t h post secur i t yper sons. I t i s a must t hat t hey have t he f ul l cooper at i on of empl oyees.

    These shoul d be educat ed, and t hey shoul d be encour aged t o assume t hi sr esponsi bi l i t y. They shoul d al so be i nst r uct ed t o consi der eachuni dent i f i ed or i mpr oper l y i dent i f i ed per son as a t r espasser . I n somer est r i ct ed ar eas passes ar e l i mi t ed t o cer t ai n zones. I n t hese cases,

    empl oyees shoul d repor t movement of per son to unauthor i zed zones.

    14. Cont r ol Movement of Empl oyees Af t er Hour s. A syst em shoul d be kept f ort he cont r ol of per sonnel af t er hour s. The guar d f or ce can t hen r ecor d t hei rdepar t ur e t i me. Of t en, per sons may have val i d r easons f or s t ayi ng l at er .

    The person, however , may be i nvol ved wi t h some i l l egal act not r eadi l yapparent . By r ecor di ng t he name, depart ur e t i me, and badge number, i favai l abl e, a permanent r ecor d can be est abl i shed. The person coul d bequest i oned at a l ater t i me i f anyt hi ng happened on t he post dur i ng t he t i met hey r emai ned l at e. No person shoul d be al l owed admi t t ance t o r e- ent er ar est r i ct ed or sensi t i ve ar ea wi t hout proper aut hor i zat i on. Thi s can be or alor wr i t t en. Of f i ci al l y desi gnat ed per sons of t he post gr ant t hi s

    aut hor i zat i on.

    15. Speci al Saf eguar ds.

    a. Si gns/ Count ersi gns and Code Words. Si gn/ count ersi gn syst ems andcode words may be used i n cer t ai n secur i t y ar eas. Proper saf eguards must beest abl i shed t o ensur e const ant checki ng and t est i ng of t he syst ems. Thi swi l l assur e i mmedi ate change when t he si gn/ count ersi gn or code word i scompr omi sed. Somet i mes more cont r ol s are r equi r ed. I f so, t he secur i t ymanagement syst em or secur i t y pol i ce or der s shoul d pr ovi de i nst r uct i ons.

    b. Dur ess Code. Thi s i s a word or phr ase whi ch can be f i t t ed i nt o

    normal conver sat i on. I t i s used when guar ds or other personnel are f or cedt o vouch f or unaut hor i zed per sons. The ai m of t hese per sons i s t o gai nent r y t o a secur i t y area. When such a syst em i s used, you must ensurei mmedi ate suppor t ; any secur i t y person gi vi ng or r ecei vi ng t he si gnal mustr ecei ve pr ompt ai d. The dur ess code shoul d be si mpl e, and i t must bechanged of t en t o l essen t he chances of i t s compr omi se.

    2-11 MP1002

  • 8/13/2019 Military Police MP 1002 Area Security

    25/72

    16. Phot ogr aphs. Photogr aphs are somet i mes t aken wi t hi n a r est r i ct ed area.I f so, t he photogr apher shoul d be cl ear ed f or access, and he shoul d beescor t ed at al l t i mes. Act ual t aki ng of phot ogr aphs shoul d be under t hesuper vi si on of i nt el l i gence or pr ot ect i ve per sonnel . Thi s wi l l ensur e t hatcl assi f i ed dat a does not acci dent al l y appear i n t he pi ct ur es. Each negat i veshoul d be secur ed unt i l i t s f i r st pr i nt has been car ef ul l y exami ned.Exami ner s shoul d be par t i cul ar l y al er t t o backgr ounds. Smal l par t s of a

    pi ct ur e mi ght r eveal cl assi f i ed dat a i f enl ar ged.

    17. Cont r act or Empl oyee. Cont r actors usual l y know t hei r key personnel .However , i t of t en happens t hat most of t he empl oyees ar e shor t t i mel aborer s. They are unknown t o t hei r empl oyer . On a const r uct i on j ob al ar ge number of men wi l l be i nvol ved over a per i od of t i me. I t i s t henadvi sabl e t o f ence of f t he const r uct i on ar ea f r om t he r est of t he post .Wher e the cont r act wor k i s i nf r equent and f or shor t per i ods of t i me,secur i t y may be more economi cal . Each case wi l l have t o be consi deredseparatel y. A deci si on shoul d be made based on t he physi cal l ayout and t hesensi t i vi t y of t he post . I t i s advi sabl e t o make l ocal backgr ound checks oncont r act or per sonnel .

    18. Ut i l i t y and Mai nt enance Per sonnel . No gr oup of occupat i ons has beenused as wel l and as of t en as a cover f or unaut hor i zed ent r y as t hi s one.Cor r ect cl ot hi ng, a t ool box, and a bi t of t echni cal knowl edge ar e t he onl yr equi r ement s. These peopl e can pose as t el ephone r epai r men, el ect r i ci ans orpl umber s. They can pose as busi ness machi ne mai nt enance peopl e. Cl eani ngpersons f or gover nment of f i ces and bui l di ngs make excel l ent cover s f orespi onage and sabotage. Cur r ent espi onage cases have r evol ved around t hi st ype of cover - up. Legi t i mat e empl oyees of publ i c ut i l i t i es and somecommerci al ser vi ce compani es usual l y car r y company I D. They shoul d,however , not be admi t t ed t o a r est r i ct ed area wi t hout at l east a t el ephonecheck. Thi s can be made t o t hei r home of f i ce t o est abl i sh t hei raut hent i ci t y. Al so, t hese per sons shoul d not be admi t t ed wi t hout a check

    wi t h t he person who r equest ed t hei r ser vi ce. Movement wi t hi n t he postshoul d be subj ect t o t he same pass and escor t pr ocedur es as prescr i bed f orot her vi si t or s. Such woul d be t he case dur i ng dut y or of f dut y hour s.

    MP1002 2- 12

  • 8/13/2019 Military Police MP 1002 Area Security

    26/72

    LESSON 2

    PRACTI CE EXERCI SE

    REQUI REMENT: The f ol l owi ng quest i ons ar e mul t i pl e choi ce. You ar e t o sel ectt he one t hat i s cor r ect . I ndi cat e your choi ce by CI RCLI NG t he l et t er besi det he cor r ect choi ce di r ect l y on t he page. Thi s i s a sel f - gr aded l esson

    exer ci se. Do not l ook up t he cor r ect answer f r om t he l esson sol ut i on sheetunt i l you have f i ni shed. To do so wi l l endanger your abi l i t y t o l ear n t hi smat er i al . Al so, your f i nal exami nat i on scor e wi l l t end t o be l ower t han i fyou had not f ol l owed t hi s r ecommendat i on.

    1. When an empl oyee i s gr ant ed a cl ear ance, i t i s an i ndi cat i on t hat t heempl oyee i s whi ch of t he f ol l owi ng?

    A. To be al l owed access t o al l TOP SECRET mater i al .B. Absol ut el y l oyal t o t he count r y.C. An accept abl e secur i t y r i sk.D. No l onger a secur i t y r i sk.

    2. What i s a pr oper procedur e f or t aki ng publ i ci t y phot ogr aphs on t hei nst al l at i on?

    A. Al l ow unr est r i ct ed pr ocessi ng and pr i nt i ng of f i l ms.B. Requi r e r e- exami nat i ons of t he negat i ves by secur i t y personnel every

    t i me more pr i nt s ar e made.C. Requi r e secur i t y or i nt el l i gence per sonnel t o super vi se phot ogr aphy

    t o avoi d r eveal i ng cl assi f i ed dat a.D. Al l ow phot ogr apher s unr est r i ct ed pi ct ur e taki ng i n or der t o pr omot e

    publ i c rel at i ons.

    3. The t wo- per son r ul e i s an addi t i onal secur i t y measur e. What i s i t

    desi gned t o do?

    A. Ensure you have someone to tal k t o whi l e worki ng.B. Ensur e t hat no one per son wi l l have access t o nucl ear or chemi cal

    weapons.C. Ensur e t hat you wi l l not go t o sl eep whi l e on t he j ob.D. Al l of t he above ar e cor r ect .

    4. Ar ea K has 50 empl oyees; Ar ea L, 43 empl oyees; Ar ea M, 28 empl oyees;and Ar ea Z, 21 empl oyees. The personnel r ecogni t i on syst em coul d pr oper l ybe used i n whi ch ar eas?

    A. M and Z onl y.B. L and Z onl y.C. K and M onl y.D. Z onl y.

    2-13 MP1002

  • 8/13/2019 Military Police MP 1002 Area Security

    27/72

    5. What i s the most vul nerabl e l i nk i n any badge syst em?

    A. Thef t of a badge by an out si der .B. Enf or cement of t he syst em by ent r y cont r ol per sonnel .C. Loss of a badge by an empl oyee.D. Mut i l at i on of a badge by anyone.

    6. Whi ch of t he f ol l owi ng BEST descr i bes t he pur pose of an I D and cont r olsyst em?

    A. Li mi t onl y ci vi l i an personnel who are cl ear ed, have a need t o know,and are empl oyed i n t he ar ea.

    B. Li mi t ent r y t o al l vehi cl es, except emer gency vehi cl es such aspol i ce car s, ambul ances, and f i r et r ucks.

    C. Assure a check of badges of al l empl oyees i s made and al l vi ol at i onsar e r epor t ed.

    D. Assure a means of posi t i ve I D of al l personnel who ar e aut hor i zedent r y to an ar ea.

    7. Secur i t y I D cards and badges shoul d be t amperpr oof . They wi l l meet t he

    r equi r ement s of :

    A. AR 380- 13.B. AR 200- 16.C. AR 640- 3.D. AR 380- 25.

    8. Whi ch of t he f ol l owi ng i s a pr oper act i on t o t ake i n set t i ng up a badgecont r ol syst em?

    A. Have each act i vi t y on t he post r esponsi bl e f or maki ng and i ssui ngi t s badges.

    B. Prepar e onl y one badge f or each person so a dupl i cat e wi l l not be i nexi st ence.

    C. Pl ace a secur i t y cl assi f i cat i on on ci vi l i an badges t o assur ehandl i ng as a cl assi f i ed document .

    D. Est abl i sh cent r al i zed cont r ol of badges.

    9. I D badges f or vi si t or s must cont ai n, at l east , name of act i vi t y f orwhi ch i t ' s val i d, a ser i al number and si gnat ur e of val i dat i ng of f i ci al .

    These badges must al so cont ai n what el se?

    A. A l et t er , symbol , or col or t o i ndi cat e access aut hor i zed.B. A phot ogr aph and vi si t or ' s si gnat ur e.

    C. Escor t r equi r ement s and photogr aph.D. Let t er , symbol , or col or t o i ndi cat e access aut hor i zed, andexpi r at i on dat e.

    MP1002 2- 14

  • 8/13/2019 Military Police MP 1002 Area Security

    28/72

    10. Ent r ances and exi t s of r est r i ct ed areas shoul d be arr anged so comi ngand goi ng personnel are f orced t o do whi ch of t he f ol l owi ng?

    A. Pass i n s i ngl e f i l e i n f r ont of t he securi t y pol i ce.B. Show t hei r badges t o t he secur i t y pol i ce.C. Pass i n f r ont of t he guar d t wo at a t i me.D. Al l of t he above ar e cor r ect .

    11. Af t er t he r equi r ed cl earance and wr i t t en order of t he post CO, a passor badge i s i ssued f or ent r y t o t he appr opr i at e area. The pass or badgewi l l NOT i ndi cat e whi ch of t he f ol l owi ng?

    A. Age, r ace, or bi r t hday.B. Sex, age, or bi r t hday.C. I ndi cat e by wor d, col or , or code t he secur i t y cl ear ance gr ant ed.D. None of t he above i s cor r ect .

    2-15 MP1002

  • 8/13/2019 Military Police MP 1002 Area Security

    29/72

    LESSON 2

    PRACTI CE EXERCI SE

    ANSWER KEY AND FEEDBACK

    I t em Cor rect Answer and Feedback1. C. An accept abl e secur i t y r i sk.

    One shoul d under st and. . . ( page 2- 3, para 2c)

    2. C. Requi r e secur i t y or i nt el l i gence per sonnel t o super vi se. . .Act ual t aki ng of . . . ( page 2- 12, par a 16)

    3. B. Ensur e t hat no si ngl e per son wi l l have access t o nucl ear . . .I t ensur es t hat . . . ( page 2- 9, par a 12a)

    4. A. M and Z onl y.Thi s syst em i s used. . . ( page 2- 6, para 8b)

    5. B. Enf or cement of t he syst em by ent r y cont r ol . . .The most vul nerabl e. . . ( page 2- 8, para 10a)

    6. D. Assur e a means of posi t i ve I D f or al l per sonnel . . .Pr ovi de a pr act i cal . . . ( page 2- 4, par a 4a( 2) )

    7. C. AR 640- 3.However , t hey must . . . ( page 2- 4, para 5d)

    8. D. Est abl i sh cent r al i zed cont r ol of badges.Cont r ol pr ocedur es. . . ( page 2- 6, par a 7a)

    9. D. Let t er , symbol , or col or t o i ndi cat e access. . .I dent i f y the post . . . ( page 2- 5, par a 6a( 4) and ( 8) )

    10. A. Pass i n si ngl e f i l e i n f r ont of t hePer sons shoul d be. . . ( page 2- 9, par a 10e)

    11. C. I ndi cat e by wor d, col or , or code t he secur i t y. . .Secur i t y cl ear ances wi l l . . . ( page 2- 6, par a 7e)

    MP1002 2- 16

  • 8/13/2019 Military Police MP 1002 Area Security

    30/72

    LESSON 3

    DETERMI NE BOMB THREAT CONTI NGENCY PLANNI NG

    Cr i t i cal Task: 191- 386- 0012

    OVERVI EWLESSON DESCRI PTI ON:

    I n t hi s l esson you wi l l l ear n t o super vi se pl anni ng, expect at i on, andsecur i ng phases r egardi ng bomb t hr eat s.

    TERMI NAL LEARNI NG OBJ ECTI VE:

    ACTI ON: Supervi se pl anni ng, expect at i on, and secur i ng phases of bombt hr eat s.

    CONDI TI ONS: You wi l l have t hi s subcour se, paper and penci l .

    STANDARDS: To demonst r at e compet ency of t hi s t ask you must achi eve ami ni mum scor e of 70 per cent on t he f i nal subcour seexami nat i on.

    REFERENCES: The mater i al cont ai ned i n t hi s l esson was der i ved f r om t hef ol l owi ng publ i cat i ons: FM 19- 30, FC 19- 106, and TC 19- 5.

    I NTRODUCTI ON

    Bomb t hr eat s pr esent seri ous pot ent i al danger t o an act i vi t y or post .

    The mot i ves, t ar gets and bombers, t hemsel ves, ar e di ver si f i ed. Due t o t hi sf act , bomb t hr eat pl anni ng and t r ai ni ng i s an i mpor t ant par t of any physi calsecur i t y pr ogr am. Physi cal secur i t y per sonnel must devel op an awareness oft he ser i ous nat ur e of bomb t hr eat s; t hey must underst and pr epl anni ngconsi derat i ons and how t o pr epare a bomb t hreat pl an. They must underst andact i ons t o t ake dur i ng an af t er r ecei pt of a t hr eat . They must al sounder st and t he var i ous r esponsi bi l i t i es r el at i ve t o bomb t hr eat s. Yourof f i ce t el ephone r i ngs and t he voi ce on t he ot her end says. . . "A bomb i sgoi ng t o expl ode. . et c. , et c. . . " Woul d you know how t o r espond? As t hephysi cal secur i t y of f i cer , once you ar e not i f i ed of such a cal l , woul d youknow what t o do? Cont i ngency pl anni ng and t r ai ni ng woul d pr epare you f orhandl i ng t he i nci dent .

    1. Def i ni t i ons .

    a. Bomb. A bomb, when detonat ed or i gni t ed, i s a devi ce t hat can causedamage t o mat eri al and i nj ur y or deat h t o per sonnel . Bombs ar e cl assi f i edas expl osi ves or i ncendi ary. An expl osi ve bomb causes damage byf r agment at i on,

    3-1 MP1002

  • 8/13/2019 Military Police MP 1002 Area Security

    31/72

    heat , and bl ast wave. The heat pr oduced of t en causes a secondary i ncendi aryef f ect . An i ncendi ar y bomb gener at es f i r e- pr oduci ng heat ; i t does not causea l ar ge expl osi on when i gni t ed.

    b. Bombi ng. A bombi ng occur s when an expl osi ve bomb det onat es, or ani ncendi ar y bomb i gni t es.

    c. Bomb Thr eat . A bomb t hreat i s a message del i vered by any means; i twi l l warn or cl ai m t he pr esence of one or more bombs. A bomb t hr eat may, ormay not , speci f y t he l ocat i on of a bomb; i t may, or may not , cont ai n anul t i mat um r el at ed t o t he det onat i on/ i gni t i on or conceal ment of t he bomb.

    d. Bomb I nci dent . Thi s i s any event i nvol vi ng t he det onat i on ori gni t i on of a bomb. I t can al so be t he di scover y of a bomb, or t heexecut i on of a bomb t hr eat .

    e. Bomb- I nci dent - Prevent i ve Measures. These are measures t aken t or educe t he pr oduct i on and pl acement of bombs. Measures ar e al so meant t or educe t he di sr upt i ve ef f ect of bomb t hr eat s.

    f . Bomb Thr eat Pl an. Thi s i s a compl et e pl an whi ch assi gnsr esponsi bi l i t i es and speci f i c act i ons t o be taken when a bomb t hr eat orbombi ng occur s.

    2. The Bomber .

    a. Psychol ogy. Devel opi ng a psychol ogi cal pr of i l e of per sons capabl eof such ant i - soci al behavi or i s near l y i mpossi bl e, si nce bomber s have comef r om al l wal ks of l i f e. Al so, t hey have come f r om var i ous age gr oups anddi f f er i ng economi c and soci al backgr ounds. Many bomber s are known t o bederanged and/ or have charact er di sorder s.

    b. Technol ogy.

    ( 1) The popul ar i dea of a bomb i s a bl ack spher e t he si ze of abowl i ng bal l , equi pped wi t h a sput t er i ng f use. Thi s i s not l i kel y t o beencount er ed i n sabot age by expl osi on. An expl osi ve bomb i t sel f i s t he uni tof dest r uct i on and i t i s not dependent upon out si de ai d as i s an i ncendi ar ybomb. Because of t hese t r ai t s, an expl osi ve bomb i s nor mal l y l ar ger t han ani ncendi ar y bomb. However , t he same i ngenui t y of di sgui se i s appl i cabl e.Fi ve st i cks of dynami t e t aped t ogether and equi pped wi t h a bl ast i ng capwoul d make a capabl e bomb, but upon si ght , t hi s woul d cause suspi ci on andconcer n. The same f i ve st i cks of dynami t e st uf f ed i n a sui t case wi t h a dr ycel l bat t er y and a cl ockwor k del ay devi ce woul d be j ust as dest r uct i ve, but

    i t woul d not at t r act at t ent i on. A l ump of pl ast i c expl osi ve coat ed wi t h ami xt ur e of shel l ac and coal dust woul d be unnot i ced i n a l oad of coal . Thepossi bl e combi nat i ons of expl osi ve, act i vat or , del ay devi ce, and out si decont ai ner are many.

    ( a) Most hi gh school chemi st r y cour ses provi de enough knowl edge t oenabl e a person t o make a bomb.

    MP1002 3- 2

  • 8/13/2019 Military Police MP 1002 Area Security

    32/72

    ( b) Common househol d i t ems r eadi l y avai l abl e may be t r eat ed andassembl ed as an ef f ect i ve expl osi ve devi ce. Ot her i t ems f or maki ng bombsar e used wi del y i n mi ni ng, agr i cul t ur e, and some i ndust r y. Al so, t hey ar enot har d to pr oduce.

    ( 2) Common Expl osi ves. Bombs ar e cl assi f i ed accordi ng t o t he t i me i tt akes common expl osi ves t o bur n or det onat e. They are ei t her l ow expl osi ves

    or hi gh expl osi ves. The sl ower act i ng l ow expl osi ves have a pushi ng ef f ecti n act i on, wher eas hi gh expl osi ves have a shat t er i ng ef f ect .

    ( a) Low Expl osi ves.

    1. Bl ack powder i s t he ol dest known expl osi ve, but i t s use hasdecl i ned. Thi s i s due t o t he devel opment of mor e ef f i ci ent expl osi ves.Bl ack powder i s gr anul ar , and t he si ze of t he gr ai ns var i es f or di f f er entuses. I n appear ance, i t i s shi ny bl ack, and i n bur ni ng gi ves of f a heavywhi t e smoke. I t bur ns f r eel y i n t he open ai r , and i t must be conf i ned f oran expl osi ve ef f ect . I t i s used i n pi pe bombs and ot her i mpr ovi sed devi ces.

    2. Smokel ess powder i s not a powder , and i t i s onl y smokel ess

    i n compar i son t o bl ack powder . I t i s made by t r eat i ng pl ant f i ber s ( cot t onor wood) wi t h ni t r i c and sul f ur i c aci ds t o f or m ni t r ocel l ul ose. I t may beused i n pi pe bombs and si mi l ar devi ces i n the same way as bl ack powder .General l y, t hi s powder has a more power f ul ef f ect .

    ( b) Hi gh Expl osi ves.

    1. Ni t r ogl ycer i n i s an oi l y, col or l ess l i qui d t hat expl odesvi ol ent l y. However , due t o i t s sensi t i vi t y t o shock, i t i s not wi del y usedi n i t s l i qui d st at e. When combi ned wi t h ot her mat er i al s, i t l oses i t ssensi t i vi t y. I t i s made i nt o dynami t e and pl ast i c expl osi ves.

    2. Dynami t e i s t he most wi del y used commerci al expl osi ve. ( I nt he mi l i t ar y i t may be cl assi f i ed as a l ow expl osi ve. ) Basi cal l y, i t i sni t r ogl ycer i n absor bed i n a por ous or absor bent mat er i al , such as sawdust .

    The percent age of ni t r ogl ycer i n var i es, and ot her i ngr edi ents ar e added t of i t t he i nt ended use. I t i s packed i n st i cks, usual l y r ound, and cover edwi t h paraf f i n i mpr egnated paper. The st r engt h i s mar ked on t he out si de oft he wr apper . A bl ast i ng cap detonat or i s necessar y t o cause an expl osi on.Somet i mes dynami t e i s st or ed i n one posi t i on f or a l ong per i od, however . I ft hi s i s t he case, t he ni t r ogl ycer i n t ends t o seep t o t he l ower si de andbecomes sensi t i ve. Dynami t e i s conveni ent , avai l abl e, and ef f ect i ve. Thesequal i t i es make i t a f avor i t e expl osi ve f or t he sabot eur . The hi gh vel oci t yof i t s expl osi on makes i t unnecessary t o conf i ne i t t o make an ef f ect i ve

    bomb.

    3. Tr i ni t r ot ol uene (TNT) i s a yel l ow sol i d, usual l y f or medi nt o bl ocks of var i ous si zes. I t i s i nsensi t i ve t o shock, easy t o handl e,and has power f ul expl osi ve pr oper t i es. Because of t hi s, TNT i s excel l entf or sabotage pur poses.

    MP1002 3- 3

  • 8/13/2019 Military Police MP 1002 Area Security

    33/72

    4. Ni t r ost ar ch i s al so a good expl osi ve f or sabot age f or t hesame r easons as TNT. I t i s sl i ght l y l ess power f ul t han TNT, but i t i s mor esensi t i ve t o f l ame, f r i cti on, and i mpact.

    5. Composi t i ons C3 and C4 ar e yel l ow and whi t e respect i vel y,and are odorous and pl ast i c. They have about t he same sensi t i vi t y as TNT,but t hey are more powerf ul .

    ( 3) I ni t i at i ng Devi ces. Ther e ar e t wo gener al t ypes of i ni t i at i ngdevi ces. One i s t hat whi ch pr oduces f l ames ( f or use wi t h l ow expl osi ves) .

    The ot her i s t hat whi ch detonat es ( f or use wi t h hi gh expl osi ves) .

    ( a) Fl ame- Produci ng Devi ces.

    1. A saf ety f use consi st s of a powder cor e wr apped i n paper orcl ot h f i ber . I t i s usual l y wat er pr oof ed. I t i s t he medi um t hr ough whi chf l ame i s conveyed f or t he di r ect or i ndi r ect f i r i ng of a l ow expl osi ve. Anexampl e of di r ect f i r i ng i s bl ack powder . An exampl e of i ndi r ect f i r i ng i st he i gni t i on of a bl ast i ng cap t o det onat e dynami t e.

    2. A mi ner' s squi b i s a t hi n paper t ube of powder seal ed atone end wi t h a wax pl ug; t he ot her end cont ai ns a f use or wi ck. The waxpl ug i s pi nched of f at t he t i me t he squi b i s used. The f use bur ns sl owl y,and when i t r eaches t he powder , a f l ame shoot s out t he open end.

    3. An el ect r i c squi b consi st s of an al umi num t ube one and one-hal f i nches l ong wi t h l eg wi r es pr ot r udi ng f r om one end. When an el ect r i ccur r ent i s appl i ed t o t he l eg wi r es, t he f i r i ng el ement f l ashes. I t t henr upt ur es t he tube and sends an i nt ense f l ame i nt o t he expl osi ve.

    ( b) Det onat i ng Devi ces.

    1. A bl ast i ng cap ( nonel ect r i c) i s a smal l t ube cl osed at oneend and l oaded wi t h a charge of an expl osi ve. I t can be det onated by t hespi t or spar ks f r om a saf et y f use. Bl ast i ng caps ar e sensi t i ve t o shock,f r i ct i on, and heat , and t hey are danger ous when not pr oper l y handl ed. Foruse, a l engt h of saf et y f use i s i nser t ed i n t he open end.

    2. El ect r i c bl ast i ng caps are si mi l ar i n appear ance tononel ect r i c caps, except t hat t hey ar e f i r ed by el ect r i c cur r ent . They havet he same sensi t i vi t y as nonel ect r i c caps, and gr eat car e must be used i nst or i ng and handl i ng t hem. They come i n var i ous numer i cal l y desi gnatedsi zes; Number 8 i s t he one i n common use.

    3. Detonat i ng f use or cor d i s a f use whi ch has an expl osi vecor e. I t r equi r es a bl ast i ng cap t o det onat e, and t he ext r eme vi ol ence oft he act i on i s enough t o det onat e a hi gh expl osi ve i n cont act wi t h i t . I t i susual l y wr apped ar ound or t aped t o t he charge t o be detonated. I t i s usedf or t he si mul t aneous f i r i ng of a number of shot s at some di st ance apart .

    MP1002 3- 4

  • 8/13/2019 Military Police MP 1002 Area Security

    34/72

    3. Bombi ng Target s. Target s chosen by bomber s may be r andoml y orcar ef ul l y sel ect ed. The psychol ogi cal makeup, al ong wi t h t he mot i vat i on f orbombi ngs, ar e i nt er r el at i ng f act or s i n det er mi ni ng t ar get s. Any number off act or s may i sol at e t ar get sel ect i on. These f act or s i ncl ude hat r ed,per cei ved unf ai r t r eat ment , exci t ement , and anar chy. A l i st of pot ent i albombi ng t ar get s t o be consi der ed by secur i t y per sonnel f ol l ows. The l i st i snot l i mi t ed t o t hese, however :

    a. Resi dent s.

    b. Commerci al oper at i ons.

    c. Vehi cl es.

    d. School s.

    e. Publ i c saf et y bui l di ngs.

    f . Persons.

    g. Publ i c bui l di ngs.

    h. Mi l i t ary i nstal l at i ons and act i vi t i es .

    i . Publ i c communi cat i ons f aci l i t i es.

    j . Publ i c ut i l i t i es.

    4. Bombi ng Mot i ves. Bomb cases of hi st or i cal i mpor t ance have general l ybeen pol i t i cal l y mot i vat ed. However , i t woul d be a mi st ake t o over l ook t heot her possi bl e mot i ves. When devi si ng prevent i ve measur es and bomb t hr eatpl ans, r emember t wo t hi ngs. Ther e are t wo basi c cat egori es of mot i ves f or

    bomb pl acement and t hr eat s: nonpol i t i cal and pol i t i cal .

    a. Per sonal ani mosi t y i s of t en t he mot i ve behi nd many bombi ngi nci dent s. The quest f or vengeance r esul t s f or m bei ng f i r ed, per cei vedi nj ust i ces, har assment or ot her psychol ogi cal di sor der s. Any of t hese maybe under l yi ng f act or s.

    b. Mal i ci ous dest r uct i on may account f or t he si mpl e desi r e f or power orexci t ement . Vengeance as wel l as ot her f actors shoul d al so be consi dered.

    c. Labor di sput es of t en ar ouse at t acks f r om ei t her or bot h si des. Suchat t acks ser ve as a means of pr essure i n maki ng gai ns i n l abor cont r act

    negot i at i ons. At t acks ar e ai med at st r i ke br eaker s. They ar e al so ai med atnon- uni on l abor er s as wel l as uni on and company of f i ci al s.

    d. Monet ary gai n, more commonl y known as ext ort i on, i s t he mot i ve f orbombi ngs of l arge compani es or r i ch busi nessmen.

    3-5 MP1002

  • 8/13/2019 Military Police MP 1002 Area Security

    35/72

    e. Pol i t i cal bombi ngs i n r ecent decades have pr esent ed t he most ser i oust hr eat t o soci et y.

    ( 1) Ter r or i st s use bombi ngs as a t ool t o cal l at t ent i on t o andpubl i ci ze t hei r cause. They do so t o show t he weakness or hel pl essness ofgovernment s. They may do so t o ext or t money, suppl i es, or t he f r eei ng ofpol i t i cal pr i soner s. Bombi ng gover nment of f i ces dest r oys r ecor ds andi nt er r upt s nor mal oper at i ons.

    ( 2) Pol i t i cal bombi ngs ar e psychol ogi cal t ool s.

    f . Ci vi l r i ght s di sput es al l over t he US si nce t he ear l y si xt i esr esul t ed i n bombi ng at t acks. These at t acks t ook pl ace on school s, chur ches,r esi dent s, and pr omi nent per sons.

    5. Bomb Thr eat Pl anni ng Consi der at i ons.

    a. Prevent i ve Measures. As st ated bef ore, t here are many mot i ves andt echni ques used i n bombi ngs. Prevent i ve measures, t hen, must pr ovi de usef ulgui dance i n a cr i si s and cover a var i et y of cases. The per son r esponsi bl e

    f or t he bomb t hr eat pl an must consi der t he t hr ee t hi ngs needed f or asuccessf ul bombi ng:

    ( a) Abi l i t y t o make and det onat e an expl osi ve devi ce.

    ( b) Access t o r aw mat er i al s or expl osi ves.

    ( c) Oppor t uni t y t o pl ace t he bomb at t he desi r ed t ar get .

    Speci al at t ent i on must be gi ven t o ( c) , because t hi s i s t he one ar ea i nwhi ch a l aw enf orci ng or gani zat i on has t he best chance t o di scour age a bombi nci dent . Enough pr event i ve measur es and physi cal secur i t y pr ecaut i ons mustbe est abl i shed. Then, t he opport uni t y t o obt ai n expl osi ves and pl ace bombs

    wi l l be r educed. Al so, a good bomb t hr eat pl an and a wel l - r ehear sedpr ocedur e f or handl i ng t hem and i nci dent s wi l l r educe t he chances of a bombbei ng detonated. See Appendi x A f or a sampl e f ormat t o be di st r i but ed andused t o r ecor d val uabl e i nf or mat i on r el at i ng t o bomb t hr eat cal l s. Thi sdocument at i on may pr ovi de cl ues and ot her usef ul dat a f or secur i t yper sonnel .

    b. Physi cal Secur i t y Measur es. FM 19- 30 pr esent s a di scussi on ofphysi cal secur i t y measures. These measures may be used t o l i mi t t he chanceof t hi s or gani zat i on or f aci l i t y exper i enci ng a bomb t hr eat . Such measur esi ncl ude but ar e not l i mi t ed t o t he f ol l owi ng:

    ( 1) Havi ng a workabl e personnel I D and cont r ol syst em.

    ( 2) Havi ng a package and mater i al cont r ol syst em.

    ( 3) Mai nt ai ni ng st r i ct cont r ol of l ocks and keys.

    ( 4) Havi ng enough per i meter bar r i er and l i ght i ng syst ems.

    MP1002 3- 6

  • 8/13/2019 Military Police MP 1002 Area Security

    36/72

    ( 5) Locki ng door s t o boi l er r ooms, basement s, and ut i l i t y cl oset swhen not i n use.

    ( 6) El i mi nat i ng pl aces i n whi ch to hi de a bomb by good housekeepi nghabi t s. Accumul ated t r ash and di scar ded mat er i al s are exampl es of suchpl aces.

    ( 7) Trai ni ng empl oyees t o r epor t st r ange peopl e or packages.

    c. Communi cat i ons Channel s. Est abl i sh channel s so t hat Feder al andl ocal l aw enf orcement agenci es can send i nf ormat i on about possi bl e thr eat st o your f aci l i t y. Local l aw enf or cement agenci es wi l l have access t o t hel at est dat a f r om t he FBI .

    d. Support Or gani zat i ons. I ncl ude t he support i ng Expl osi ve Or dnanceDi sposal ( EOD) Detachment and t he l ocal f i r e depar t ment . Both of t hesegr oups wi l l pr ovi de hel p i n devel opi ng bomb t hr eat procedur es. However,dur i ng a bomb t hr eat , t he dut i es and r esponsi bi l i t i es of each ar e l i mi t ed byr egul at i on. The person pr epar i ng t he bomb- t hr eat pl an shoul d know t hesel i mi t at i ons.

    e. Emergency Operat i ons Cent er ( EOC) . The EOC shoul d have access t obot h r adi o and t el ephone communi cat i ons. They wi l l use t hese when a bombt hr eat i s r ecei ved. The EOC may be t he pr ovost mar shal ' s of f i ce but , t hi sof f i ce may al so be a pr i me t arget f or a bomb t hr eat . Theref or e, anal t ernate EOC shoul d be sel ect ed. Per sons i n t he EOC shoul d have t heaut hor i t y to deci de on act i ons t o be t aken dur i ng a t hr eat .

    f . I nspecti ons. I nspect bui l di ngs on a r egul ar basi s. Thi s wi l lr educe t he possi bi l i t y of a bomb bei ng pl aced, and i t wi l l al so l essen t het i me r equi r ed f or t he sear ch af t er a t hr eat has been r ecei ved. I nspect i onswi l l r eveal hi di ng pl aces f or bombs, possi bl e t ar get s, and bui l di ng

    weaknesses. The i nspect or wi l l become so f ami l i ar wi t h hi s ar ea t hat heshoul d not i ce any new or st r ange i t em i mmedi atel y. The i nspect or shoul d bet he supervi sor i n hi s ar ea or a member of a pr edesi gnated sear ch team.

    g. Repor t i ng Syst em. Peopl e must know whom t o not i f y, and how, i n caseof a bomb t hreat . Communi cat i on met hods and procedur es must be deter mi nedbef or e, not af t er , a bomb t hr eat i s r ecei ved. Tel ephones, whi st l es, andbul l horns are very i mport ant t o communi cat i ons dur i ng sear ches because oft he possi bi l i t y of det onat i ng an el ect r i c bl ast i ng cap by r adi ot r ansmi ssi on. Radi os t r ansmi ssi ons shoul d not be used wi t hi n 150 f eet oft he t hr eat ened ar ea. Thi s i ncl udes t he smal l hand r adi os used by pol i ce andsecur i t y per sons. ( Al so si r ens on emer gency vehi cl es may not be used. )

    h. Search Teams. Ther e are t hree groups of per sons who may ser ve asmembers of t he sear ch t eams. They are bui l di ng supervi sors, bui l di ngoccupant s, and speci al sear ch t eams. The t r ai ned sear ch t eams ar e t he mostef f ect i ve. Thi s i s especi al l y t r ue when t hey ar e combi ned wi t h a br i efsear ch by occupant s bef ore evacuat i on.

    3-7 MP1002

  • 8/13/2019 Military Police MP 1002 Area Security

    37/72

    6. Prepar i ng t he Bomb Thr eat Pl an.

    a. The mai n goal of a bomb t hr eat pl an i s t o mi ni mi ze i nj ur y t opersonnel , damage t o pr opert y, and t o avoi d di sr upt i ng operat i ons. Anothergoal of a bomb t hr eat pl an i s t o t ake t hose st eps whi ch wi l l i mpr ove chancesof cat chi ng t he of f ender s. Bomb t hr eat pl ans are al so bomb i nci dentprevent i ve measur es, because bomb t hreat pl ans r educe damage and di sr upt i on.

    They al so ai d i n cat chi ng of f ender s. As a mi ni mum, t he bomb t hreat pl anshoul d pr ovi de gui dance f or t he act i vi t i es l i st ed bel ow:

    ( 1) Cont r ol of t he oper at i on.

    ( 2) Evacuat i on.

    ( 3) Sear ch.

    ( 4) Fi ndi ng t he bomb or suspect ed bomb.

    ( 5) Di sposal .

    ( 6) Detonat i on and damage cont r ol .

    ( 7) Cont rol of publ i c i t y.

    ( 8) Af t er- act i on r eport .

    b. I n set t i ng up t hese oper at i ons, t he per son or gr oup r esponsi bl e f ora par t i cul ar j ob shoul d be appoi nt ed, not i f i ed, and wel l - t r ai ned andr ehear sed i n act i ons t o be t aken. The person pr epar i ng t he bomb t hr eat pl anshoul d ask and answer quest i ons about each ar ea of operat i on.

    ( 1) Cont r ol of t he Oper at i on.

    ( a) Who wi l l be i n char ge of t he i nci dent ? I n t he Ar my t hi s i s acommand deci si on. The CO or hi s desi gnat ed r epr esent at i ve i s i n charge. Hei s t he Bomb Scene Of f i cer , and he shoul d have al l avai l abl e t r ai ni ng i n t hi ssubj ect ar ea.

    ( b) Wher e wi l l t he command cent er be l ocat ed? To whom and howwi l l t he t hr eat be r epor t ed? Thi s shoul d be deci ded by each uni t so t hateveryone wi l l know wher e t o repor t and how t o l ocat e t he CO or Bomb SceneOf f i cer .

    ( c) How wi l l cr i t i cal deci si ons be made? These shoul d be made by

    t he CO or hi s Bomb Scene Of f i cer .

    ( d) Who wi l l man t he cont r ol cent er? Deci si ons shoul d be made byt he CO or Bomb Scene Of f i cer , communi cat i ons per sonnel , engi neer , or publ i caf f ai r s of f i cer .

    MP1002 3- 8

  • 8/13/2019 Military Police MP 1002 Area Security

    38/72

    ( 2) Evacuat i on. Movi ng a l arge number of peopl e under emergencycondi t i ons i s danger ous unl ess absol ut e cont r ol i s mai nt ai ned. Sopar t i cul ar at t ent i on shoul d be gi ven t o pl anni ng evacuat i on pr ocedur es. Atf i r st t hought , i mmedi at e and t ot al evacuat i on woul d seem t o be the bestr esponse t o any bomb t hr eat ; however , t here ar e si gni f i cant economi c andsaf et y f act ors t hat may wei gh agai nst t he evacuat i on. Even where evacuat i oni s possi bl e and want ed, t he pr ocess may not be as si mpl e as i t mi ght appear .

    ( 3) Sear ch.

    ( a) Who sear ches? Except i n t he r arest cases, EOD and MPs wi l lNOT be used t o search f or r epor t ed expl osi ve devi ces i n barr acks, communi t yar eas, bui l di ngs, and of f i ces. Rat her , such sear ches wi l l be done bydesi gnat ed per sons f ami l i ar wi t h t he ar ea and i t s cont ent s. I f an unusuali t em i s f ound, EOD i s t o neut r al i ze and evacuat e t he devi ce f or di sposal .MPs ar e t o be used ar ound t he t hr eat ened area t o cont r ol t r af f i c, and t heyar e used t o pr ovi de ot her r egul at or y ser vi ces. ( The pr ecedi ng i s apar aphr ase of a cur r ent TRADOC l et t er whi ch i s st i l l i n ef f ect . ) Ther ef or e,i n t he Ar my, t he occupant s of t he bui l di ng wi l l per f or m t he sear ch al ongwi t h desi gnat ed sear ch t eams.

    ( b) What wi l l be sear ched? Occupant s wi l l sear ch t hei r own workarea and r ooms. I n addi t i on t o t hi s, sear ch t eams shoul d be assi gned t osear ch publ i c ar eas, r est r ooms, and cl oset s. Keys shoul d be avai l abl e t osearcher s so t hat ever y area can be r eached. A compl et e search must bemade, si nce one or more bombs coul d exi st .

    ( c) When do you st op t he sear ch? Do so af t er t he ent i r e f aci l i t yhas been searched. Remember t hat t he di scover y of one devi ce shoul d notnecessar i l y cause t he sear ch to be st opped; t here coul d be more t han onebomb.

    ( 4) Act i ons Requi r ed When a Bomb or Suspect ed Bomb i s Found.

    ( a) Any suspect ed i ncendi ary devi ce or bomb shoul d not be t ouchedor handl ed i n any way by t he sear ch uni t . The person i n charge shoul dcont act s MPs. They wi l l t hen not i f y t he near est mi l i t ar y EOD Det achment .Peopl e have been di sf i gur ed and ki l l ed by t r yi ng to handl e bombs f or whi cht hey ar e not equi pped or t r ai ned t o do.

    ( b) EOD per sonnel wi l l at t empt " r ender saf e" procedur es.

    ( c) I n case of an act ual bombi ng, al l persons are warned not t omove t he debr i s. I t wi l l be sear ched by gover nment aut hor i t i es f or cl ues,and al l f or ei gn evi dence wi l l be r emoved f or sci ent i f i c anal ysi s.

    ( 5) Di sposal . How wi l l suspect ed bom