FM 3-19.30 Physical Security(1).pdf
(
3161 KB
)
Pobierz
240607932 UNPDF
FM 3-19.30
(Formerly FM 19-30)
Headquarters, Department of the Army
DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited.
FM 3-19.30
*FM 3-19.30
(FM 19-30)
Field Manual
No. 3-19.30
Headquarters
Department of the Army
Washington, DC, 8 January 2001
PHYSICAL SECURITY
Contents
Page
PREFACE
.....................................................................................................................vi
Chapter 1 PHYSICAL-SECURITY CHALLENGES
.................................................................... 1-1
Overview .................................................................................................................... 1-1
Automated Information Systems............................................................................... 1-1
OPSEC and the Threat ............................................................................................ 1-3
Chapter 2 THE SYSTEMS APPROACH
................................................................................... 2-1
Protective Systems ................................................................................................... 2-1
Systems Development .............................................................................................. 2-2
The Integrated Protective System ............................................................................. 2-5
Security Threats ........................................................................................................ 2-6
Chapter 3 DESIGN APPROACH
................................................................................................ 3-1
Design Strategies...................................................................................................... 3-1
Protective Measures ................................................................................................. 3-1
Vehicle Bombs ........................................................................................................... 3-2
Exterior Attack......................................................................................................... 3-10
Standoff Weapons .................................................................................................. 3-13
Ballistics .................................................................................................................. 3-16
Forced Entry............................................................................................................. 3-17
Covert Entry and Insider Compromise..................................................................... 3-19
Surveillance and Eavesdropping ............................................................................. 3-20
Mail and Supply Bombs ........................................................................................... 3-22
Chemical and Biological Contamination .................................................................. 3-24
Chapter 4 PROTECTIVE BARRIERS
........................................................................................ 4-1
Overview .................................................................................................................... 4-1
Fencing .................................................................................................................... 4-2
Utility Openings ......................................................................................................... 4-5
Other Perimeter Barriers........................................................................................... 4-5
Security Towers ......................................................................................................... 4-5
Installation Entrances................................................................................................. 4-6
Warning Signs............................................................................................................ 4-8
Other Signs ................................................................................................................ 4-8
Installation Perimeter Roads and Clear Zones .......................................................... 4-8
Arms-Facility Structural Standards ............................................................................ 4-9
Distribution Restriction: Approved for public release; distribution is unlimited.
*This publication supersedes FM 19-30, 1 March 1979.
FM 3-19.30
Page
Chapter 5
PHYSICAL-SECURITY LIGHTING
......................................................................... 5-1
Overview .................................................................................................................. 5-1
Commander’s Responsibility.................................................................................... 5-1
Planning Considerations .......................................................................................... 5-2
Principles of Security Lighting .................................................................................. 5-3
Types of Lighting ...................................................................................................... 5-4
Wiring Systems ........................................................................................................ 5-5
Maintenance............................................................................................................. 5-6
Chapter 6
ELECTRONIC SECURITY SYSTEMS
.................................................................... 6-1
Overview .................................................................................................................. 6-1
ESS Design Considerations ..................................................................................... 6-2
Interior ESS Considerations ..................................................................................... 6-7
Exterior ESS Considerations.................................................................................... 6-8
ESS Alarm-Annunciation System........................................................................... 6-12
ESS Software ......................................................................................................... 6-17
Interior Intrusion-Detection Sensors....................................................................... 6-18
Exterior Intrusion-Detection Sensors ..................................................................... 6-29
Electronic Entry Control ......................................................................................... 6-39
Application Guidelines............................................................................................ 6-42
Performance Criteria .............................................................................................. 6-43
Data Transmission ................................................................................................. 6-44
CCTV for Alarm Assessment and Surveillance...................................................... 6-45
Chapter 7
ACCESS CONTROL
............................................................................................... 7-1
Designated Restricted Areas ................................................................................... 7-1
Employee Screening ................................................................................................ 7-4
Identification System ................................................................................................ 7-4
Duress Code .......................................................................................................... 7-10
Access-Control Rosters ......................................................................................... 7-10
Methods of Control................................................................................................. 7-10
Security Controls of Packages, Personal Property, and Vehicles.......................... 7-11
Tactical-Environment Considerations .................................................................... 7-12
Chapter 8
LOCK AND KEY SYSTEMS
.................................................................................... 8-1
Installation and Maintenance ................................................................................... 8-1
Types of Locking Devices ........................................................................................ 8-1
Chapter 9
SECURITY FORCES
............................................................................................... 9-1
Types of Security Forces ......................................................................................... 9-1
Authority and Jurisdiction ......................................................................................... 9-2
Personnel Selection ................................................................................................. 9-3
Security Clearance................................................................................................... 9-3
Organization and Employment of Forces ................................................................. 9-4
Headquarters and Shelters ...................................................................................... 9-4
Execution of Security Activities ................................................................................ 9-5
Training Requirements............................................................................................. 9-6
Supervision .............................................................................................................. 9-7
Uniforms................................................................................................................... 9-8
Vehicles.................................................................................................................... 9-9
Firearms ................................................................................................................... 9-9
ii
FM 3-19.30
Page
Communications ...................................................................................................... 9-9
Miscellaneous Equipment ........................................................................................ 9-9
Military Working Dogs ............................................................................................ 9-10
Summary ................................................................................................................ 9-10
Chapter 10 IN-TRANSIT SECURITY
........................................................................................ 10-1
In-Port Cargo.......................................................................................................... 10-1
Rail Cargo .............................................................................................................. 10-4
Pipeline Cargo........................................................................................................ 10-6
Convoy Movement ................................................................................................. 10-7
Chapter 11 INSPECTIONS AND SURVEYS
............................................................................ 11-1
Inspections ............................................................................................................. 11-1
Surveys .................................................................................................................. 11-2
Appendix A METRIC CONVERSION CHART
........................................................................... A-1
Appendix B SAMPLE INSTALLATION CRIME-PREVENTION HANDBOOK
........................... B-1
Section I — Installation Crime-Prevention Programs
.........................................B-1
Crime-Prevention Working Groups ......................................................................... B-1
Crime-Prevention Officers ...................................................................................... B-2
Crime-Prevention Program Development ................................................................B-2
Training ....................................................................................................................B-5
Civilian Crime-Prevention Organizations..................................................................B-5
Section II — Criminal Analysis
.............................................................................B-5
Sources of Information .............................................................................................B-6
Individual Criminal Analysis .................................................................................... B-9
Criminal-Analysis Procedures ............................................................................... B-15
Criminal-Analysis Summary .................................................................................. B-17
Section III — Command and Law-Enforcement Countermeasures
................ B-17
Crime Hot Lines .................................................................................................... B-17
Crime Prevention Through Environmental Design ................................................ B-18
Specialized Patrol Tactics and Surveillance ..........................................................B-25
Publicity Campaigns...............................................................................................B-30
Residential-Security Surveys .................................................................................B-31
Juvenile Crime Prevention .....................................................................................B-34
Fraud ......................................................................................................................B-47
Internal Theft ..........................................................................................................B-52
Pilferage .................................................................................................................B-53
Section IV — Army Property at the Local Level
................................................B-61
Motor Vehicles .......................................................................................................B-61
Consumer Outlets ..................................................................................................B-63
Arson ......................................................................................................................B-66
Section V — Community Crime-Prevention Programs
.....................................B-67
Neighborhood Watch Program...............................................................................B-67
Operation ID ...........................................................................................................B-71
Neighborhood Walks ..............................................................................................B-74
Vigilantism ..............................................................................................................B-75
Mobile Patrols ........................................................................................................B-76
Project Lock ...........................................................................................................B-76
Section VI — Evaluation
......................................................................................B-79
iii
FM 3-19.30
Page
Crime-Prevention Programs...................................................................................B-79
Crime Rates ...........................................................................................................B-83
Measures of Effectiveness .....................................................................................B-84
Internal Measures ..................................................................................................B-85
Appendix C INTELLIGENCE, COUNTERINTELLIGENCE, AND THREAT ANALYSIS
............C-1
Information Sources .................................................................................................C-1
Responsibilities of US Government Lead Agencies.................................................C-2
Information Requirements........................................................................................C-4
Threat Analysis and Assessment .............................................................................C-5
Determination of the Threat Level............................................................................C-6
Appendix D CRISIS-MANAGEMENT PLAN
...............................................................................D-1
Appendix E OFFICE SECURITY MEASURES
...........................................................................E-1
Physical-Security Survey .........................................................................................E-1
Security-Engineering Assessment ...........................................................................E-1
Technical Assessment of Responses ......................................................................E-2
Physical-Security Enhancement Measures..............................................................E-2
Appendix F PHYSICAL-SECURITY PLAN
................................................................................ F-1
Annexes .................................................................................................................. F-6
Tactical-Environment Considerations ...................................................................... F-7
Appendix G PERSONAL-PROTECTION MEASURES
............................................................. G-1
Personal Protection ................................................................................................. G-1
Working Environment .............................................................................................. G-2
Home Environment ................................................................................................. G-4
Appendix H BOMBS
....................................................................................................................H-1
General ....................................................................................................................H-1
Concealing Bombs ...................................................................................................H-1
Damage and Casualty Mechanisms ........................................................................H-1
Telephonic Threats ..................................................................................................H-3
Evacuation Drills ......................................................................................................H-3
Searching for a Suspected IED................................................................................H-6
Appendix I EXECUTIVE PROTECTION
..................................................................................... I-1
Supplemental Security Measures ............................................................................. I-1
Executive Protection Goals ....................................................................................... I-1
Residential Security Measures.................................................................................. I-2
Transportation Measures .......................................................................................... I-4
Individual Protective Measures ................................................................................. I-7
Combating-Terrorism Training for Executives......................................................... I-10
Travel to Potential Physical-Threat Risk Areas ....................................................... I-10
Protective Security Details ...................................................................................... I-10
Executive-Protection System Integration ................................................................ I-12
Appendix J RESOURCE MANAGEMENT
.................................................................................. J-1
Funding Programs.................................................................................................... J-1
iv
Plik z chomika:
zbyszko_ns
Inne pliki z tego folderu:
Antiarmor Weapons Subcourse IN0546(2).pdf
(2249 KB)
Antiarmor Weapons Subcourse IN0546(1).pdf
(2249 KB)
AMCP 706-180 - Explosive Behavior(1).pdf
(31816 KB)
AMCP 706-179 Explosive Trains (1965)[clean](1).pdf
(5232 KB)
AMCP 706-177 - Explosives Data(1).pdf
(19752 KB)
Inne foldery tego chomika:
- KSIĄŻKI KONTROWERSYJNE-ZAKAZANE + hasło zakazane
▶PHOTOSHOP MAGIA
► Filmiki przyrodnicze - obieżyświat
► Jak szybko uzyskać dużą ilość punktów na Chomikuj.pl
►Kurs Prawa Jazdy -Egzaminy
Zgłoś jeśli
naruszono regulamin