Documente Academic
Documente Profesional
Documente Cultură
SMFM 19-14
ACCESS CONTROL TO CRITICAL SITES
AND INSTALLATIONS
APRIL 2009
SMFM 19-14
TABLE OF CONTENTS
PAGE
TABLE OF CONTENTS
PREFACE
iv
CHAPTER 1
Para 1-1
Para 1-2
Para 1-3
Para 1-4
Para 1-5
Para 1-6
Para 1-7
Para 1-8
CHAPTER 2
Section I
Para 2-1
Para 2-2
Para 2-3
Para 2-4
Para 2-5
Section II
Para 2-6
Para 2-7
Para 2-8
Para 2-9
Para 2-10
1-1
General
Considerations
Identification System
Mechanized Automated Systems
Card/Badge Specifications
Visitor Identification and Control
Enforcement Measures
Security Controls of Packages, Personal Property, and Vehicles
1-1
1-3
1-3
1-5
1-6
1-6
1-7
1-8
CHAPTER 3
Para 3-1
Para 3-2
Para 3-3
Para 3-4
Para 3-5
Para 3-6
Para 3-7
Para 3-8
Para 3-9
ACCESS CONTROL
2-1
2-1
2-1
2-1
2-2
2-2
2-3
2-5
2-5
2-5
2-6
2-8
2-8
3-1
General
Inspection Procedures
Identification Documents
Photograph Identification Checks
Personal Access Control Procedures
Contract Worker/Vendor Access Control Procedures
General
Vehicle Inspections
Objectives of Vehicle Inspections
3-1
3-1
3-1
3-2
3-2
3-3
3-6
3-6
3-6
SMFM 19-14
PAGE
Para 3-10
Para 3-11
Para 3-12
Para 3-13
3-7
3-8
3-9
3-14
4-1
4-1
4-2
5-1
5-1
5-2
5-3
5-3
5-4
5-4
5-9
6-1
General
Airfields
Rail Yards
Pedestrian Gates
Special Events
6-1
6-1
6-1
6-2
6-3
INSTALLATION ENTRANCES
7-1
General
Perimeter Entrances
Entry Control Stations
Warning Signs
Other Signs
Installation Perimeter Roads and Clear Zones
Methods of Control
7-1
7-1
7-1
7-2
7-2
7-3
7-4
APPENDIX - A
A-1
APPENDIX B
RULES OF ENGAGEMENT
B-1
CHAPTER 4
Para 4-1
Para 4-2
CHAPTER 5
Para 5-1
Para 5-2
Para 5-3
Para 5-4
Para 5-5
Para 5-6
Para 5-7
CHAPTER 6
Para 6-1
Para 6-2
Para 6-3
Para 6-4
Para 6-5
CHAPTER 7
Para 7-1
Para 7-2
Para 7-3
Para 7-4
Para 7-5
Para 7-6
Para 7-7
ii
SMFM 19-14
PAGE
Para B-1
Para B-2
Para B-3
Para B-4
Para B-5
Para B-6
Para B-7
APPENDIX C
Para C-1
Para C-2
Para C-3
Para C-4
Para C-5
Para C-6
APPENDIX - D
Section I
Para D-1
Section II
Para D-2
Para D-3
Para D-4
General
Purpose of Rules of Engagement
Drafting Considerations
Elements of Self Defense
Characteristics of Effective Rules of Engagement
Standing Rules of Engagement
Interpret, Draft, Disseminate, and Train Method
B-1
B-1
B-1
B-2
B-3
B-3
B-3
C-1
General
Force Protection Condition NORMAL
Force Protection Condition ALPHA
Force Protection Condition BRAVO
Force Protection Condition CHARLIE
Force Protection Condition DELTA
C-1
C-1
C-1
C-2
C-4
C-6
D-1
Blast Mitigation
Introduction and Technical Definitions
Barriers
Intended Use and Context
Natural Material and Cosmetic Barriers
Fabricated Barriers
D-1
D-1
D-3
D-3
D-4
D-5
iii
SMFM 19-14
PREFACE
This manual provides installation commanders with the basic information necessary for effective
access control to their installations and facilities. It does not discuss the technical issues involved
with standards and designs. This manual provides commanders with inspection procedures at an
access control point. Additionally, this manual equips operators (which include military police
and sentinels of augmenting units) with the various vehicle and facility inspection criteria and
measures necessary to conduct an effective access control point.
The intent of this manual is to establish a standardized doctrine of tactics, techniques, and
procedures. The actions and standards in this manual will apply to all units of the National
Guard.
The proponent for this manual is Headquarters, National Guard Military Schools. Submit
changes for improving this publication on SM Form 2028 (Recommended Changes to
Publications and Blank Forms) and forward it to Headquarters, National Guard Military Schools;
Attention: Commander, Directorate of Training; Khasm Al An, Riyadh 11173, Kingdom of Saudi
Arabia.
iv
SMFM 19-14
CHAPTER 1
ACCESS CONTROL
1-1.
designating and establishing restricted areas. A restricted area is any area that is
subject to special restrictions or controls for security reasons. This does not include
areas over which aircraft flight is restricted.
b.
1-1
SMFM 19-14
c.
1.
2.
3.
2.
3.
4.
1-2
SMFM 19-14
RESTRICTED AREA
THIS INSTALLATION HAS BEEN DECLARED A RESTRICTED AREA BY AUTHORITY
OF (TITLE, COMMANDING GENERAL OR COMMANDING OFFICER) IN
ACCORDANCE WITH THE PROVISIONS OF THE DIRECTIVE ISSUED BY THE
COMMANDING GENERAL NATIONAL GUARD.
ALL PERSONS AND VEHICLES ENTERING HEREIN ARE LIABLE TO SEARCH.
PHOTOGRAPHING OR MAKING NOTES, DRAWINGS, MAPS, OR GRAPHIC
REPRESENTATIVES OF THIS AREA OR ITS ACTIVITIES ARE PROHIBITED UNLESS
SPECIFICALLY AUTHORIZED BY THE COMMANDER. ANY SUCH MATERIAL FOUND
1-3.
A survey and analysis of the installation, its missions, and its security interests.
This can determine immediate and anticipated needs that require protection.
Anticipated needs are determined from plans for the future.
b.
The size and nature of the security interest being protected. Safes may provide
adequate protection for classified documents and small items; however, large items
may have to be placed within guarded enclosures.
c.
Some security interests are more sensitive to compromise than others. Brief
observation or a simple act by an untrained person may constitute a compromise in
some cases. In others, detailed study and planned action by an expert may be
required.
d.
All security interests should be evaluated according to their importance. This may
be indicated by a security classification such as confidential, secret, or top secret.
e.
Parking areas for privately owned vehicles are established outside of restricted
areas. Vehicle entrances must be kept at a minimum for safe and efficient control.
f.
Physical protective measures (such as fences, gates, and window bars) must be
installed.
1-3
SMFM 19-14
a.
Standard identification cards are generally acceptable for access into areas that are
unrestricted and have no security interest. Personnel requiring access to restricted
areas should be issued a security identification card or badge as prescribed by
established policy.
b.
The cards/badges design must be simple and provide for adequate control of
personnel. A security identification card/badge system must be established for
restricted areas with 30 or more employees per shift. Commanders may (at their
discretion) authorize a card/badge system in restricted areas for less than 30 people.
c.
2.
The single card or badge system. This system reflects permission to enter
specific areas by the badge depicting specific letters, numbers, or particular
colors. This system lends to comparatively loose control and is not
recommended for high-security areas. Permission to enter specific areas does
not always go with the need to know. Because the identification cards/badges
frequently remain in the bearers possession while off duty, it affords the
opportunity for alteration or duplication.
3.
The card or badge exchange systems. In this system, two cards/badges contain
identical photographs. Each card/badge has a different background color, or
one card/badge has an overprint. One card/badge is presented at the entrance
to a specific area and exchanged for the second card/badge, which is worn or
carried while in that area. Individual possession of the second card/badge
occurs only while the bearer is in the area for which it was issued. When
leaving the area, the second card/badge is returned and maintained in the
security area. This method provides a greater degree of security and decreases
the possibility of forgery, alteration, or duplication of the card/badge.
4.
The multiple card or badge system. This system provides the greatest degree
of security. Instead of having specific markings on the cards/badges denoting
permission to enter various restricted areas, the multiple card/badge system
makes an exchange at the entrance to each security area. The card/badge
information is identical and allows for comparisons. Exchange cards/badges
1-4
SMFM 19-14
are maintained at each area only for individuals who have access to the
specific area.
1-4.
These systems can control the flow of personnel entering and exiting a complex.
Included in these systems are:
b.
c.
Specialized mechanical systems are ideal for highly sensitive situations because
they use a controlled process in a controlled environment to establish the required
database and accuracy. One innovative technique applied to identification and
admittance procedures involves dimension comparisons. The dimension of a
person's full hand is compared to previously stored data to determine entry
authorization. Other specialized machine readers can scan a single fingerprint or an
eye retina and provide positive identification of anyone attempting entry.
d.
e.
The commercial security market has a wide range of mechanized and automated
hardware and software systems. Automated equipment is chosen only after
considering the security needs and the environment in which it operates. These
considerations include whether the equipment is outdoors or indoors, the
temperature range, and weather conditions. Assessment of security needs and the
use of planning, programming, and budgeting procedures greatly assist a security
manager in improving the security posture.
1-5
SMFM 19-14
1-5.
1-6.
Approval for visitors should be obtained at least 24 hours in advance (if possible).
Where appropriate, the installation should prepare an agenda for the visitor and
designate an escort officer.
b.
2.
(b)
(c)
(d)
The identification and control mechanisms for visitors must be in place. They
may include the following:
(a)
(b)
1-6
SMFM 19-14
3.
1-7.
(c)
(d)
(b)
2.
3.
4.
5.
1-7
SMFM 19-14
badge will be worn in a conspicuous position to expedite inspection and
recognition from a distance.
6.
Designing entry and exit control points of restricted areas to force personnel to
pass in a single file in front of security personnel. In some instances, the use
of turnstiles may be advisable to assist in maintaining positive control.
7.
Providing lighting at control points. The lighting must illuminate the area to
enable security personnel to compare the bearer with the identification
card/badge.
8.
9.
(a)
(b)
Property controls are not limited to packages carried openly, but they include the
control of anything that could be used to conceal property or material. Personnel
should not be routinely searched except in unusual situations. Searches must be
performed according to the local policy.
1-8
SMFM 19-14
b.
All privately owned vehicles on the installation should be registered with the
military police. Security personnel should assign a temporary decal or other
temporary identification tag to visitors vehicles to permit ready recognition.
c.
When authorized vehicles enter or exit a restricted area, they undergo a systematic
search, including but not limited to the following areas:
d.
Vehicles interior.
Engine compartment.
External air breathers.
Top of the vehicle.
Battery compartment.
Cargo compartment.
Undercarriage.
The movement of trucks and railroad cars into and out of restricted areas should be
supervised and inspected. Truck and railroad entrances are controlled by locked
gates when not in use and are manned by security personnel when unlocked. The
identification cards/badges are issued to operators to ensure proper identification
and registration for access to specific loading and unloading areas.
1.
2.
Incoming trucks and railroad cars must be assigned escorts before they are
permitted to enter designated limited or exclusion areas. Commanders should
establish published procedures to control the movement of trucks and railroad
cars that enter designated restricted areas to discharge or pick up cargo
(escorts will be provided when necessary).
3.
The best control is provided when all of these elements are incorporated into
access-control procedures. Simple, understandable, and workable access
control procedures are used to achieve security objectives without impeding
operations. When properly organized and administered, access-control
procedures provide a method of positively identifying personnel who have the
need to enter or leave an area.
1-9
SMFM 19-14
1-10
SMFM 19-14
CHAPTER 2
ACCESS CONTROL POINTS
Section I
Introduction to the Access Control Point
2-1.
GENERAL. The perimeter security and access control systems form the first line of
defense for National Guard installations.
a.
b.
The security elements that comprise the perimeter security system include:
2-2.
Standoff.
Physical barriers.
Access control.
Entry control points.
Security lighting.
Hardened fighting positions/towers/overwatch.
Intrusion detection and surveillance systems.
Security forces.
2-1
SMFM 19-14
Use
Classification
Operational
Hours
Force Protection
Condition
Considerations
Primary
24/7 Open
continuously
Secondary
Regular hours,
closed at times
Limited Use
Potentially closed at or
above Force Protection
Condition Charlie
Closed at most times
Pedestrian Access
Potentially closed at or
above Force Protection
Condition Charlie
Preferred Operation
ACCESS CONTROL POINT FUNCTIONS. An access control point can have many
functions. Not all functions are required at every access control point. Functions for each
access control point are based on the installations mission, antiterrorism plan, access
control point use classification, and land area. Functions may change to meet the
demands of higher force protection condition levels. The basic functions associated with
an access control point are:
2-4.
Processing visitors.
Vehicle identification checks.
Personnel identification checks.
Privately owned vehicle inspections.
Commercial/large vehicle inspections.
A large installation may designate one access control point for truck inspection and
commercial vehicle access only. Not requiring support for all functions at each
access control point will reduce the infrastructure requirements. Additionally, when
designating the functions for all access control points at an installation, give
consideration to the requirements to support oversized, atypical vehicles such as
those frequently encountered during construction operations or during mobilization
of military vehicles and equipment. These atypical vehicles should be supported by
at least one limited use or primary/secondary access control point, which may
require modifications such as wider lanes, limiting the use of channelization
islands, or limiting potential obstructions.
2-2
SMFM 19-14
b.
2-5.
When possible separate truck and passenger vehicle traffic. For traffic lanes that
require speed management to delay a high performance passenger vehicle, exclude
truck traffic from these lanes. The effectiveness of most speed management
techniques for passenger vehicles decreases when trucks must use the same lanes.
Also, search requirements differ significantly for trucks and passenger vehicles.
Consider separate search facilities for those types of traffic to avoid congestion and
improve efficiency of search guards during higher force protection conditions.
b.
Planning. The following groups should be involved in the planning and design of
an access control point:
1.
2.
3.
4.
Communications officers.
5.
Safety officers.
6.
User demand. Site selection for a new access control point starts with an
extensive evaluation of the anticipated demand for access to the installation,
an analysis of traffic origin and destination, and an analysis of the capability
of the surrounding road network to tie in to the access control point, including
its capacity to handle additional traffic. Analyses of traffic patterns at
installation entry points should include the local department of transportation,
since any traffic changes will likely have some effect or impact on civilian
traffic patterns.
2.
Existing terrain and available space. The existing terrain can have a significant
impact on the suitability of a potential access control point site. Flat terrain is
generally preferred. a gentle rise in elevation up to the gatehouse allows for a
clear view of arriving vehicles, which helps entry control personnel monitor
potential threats. Access control point spatial requirements vary depending on
the type, the traffic demand, and the security measures necessary. The
installation should have a corridor (tract of land for the access control point) at
2-3
SMFM 19-14
least 43 meters wide for collector streets 2,000 to 8,000 vehicles per day and
55 meters wide for arterial streets 8,000 25,000 vehicles per day. These
corridors should have a dedicated right-of-way protected from encroachment
by buildings, trees, and other objects. This will provide a safe, clear roadway
and accommodate future expansion. Space must also be available for the other
access control point elements.
3.
4.
Compatible land use. Do not locate access control points near restricted/clear
zones, protection-level resources, and identified vulnerable assets. Locate
access control points away from housing, school, and commercial areas, both
on and off installation, to avoid interference with pedestrians, parked cars, and
driveways.
5.
Location. Give special attention to the requirements for parking and roadway
projects, which are necessary even if the project is not associated with a
building renovation, modification, repair, or restoration.
2-4
SMFM 19-14
Section II
Organization and Operation of an Access Control Point
2-6.
ACCESS CONTROL POINT ZONES. An access control point can be subdivided into
four zones, each encompassing specific functions and operations. Beginning at the
installation property boundary, the zones include the approach zone, access control zone,
response zone, and the safety zone. Specific components are used within each zone to
conduct the necessary operations. The location of each zone of the access control point is
illustrated in Figure 2-1.
APPROACH ZONE. The approach zone lies between the installation boundary and the
access control zone. It is the interface between the off-facility road network and the
facility, and the area all vehicles must traverse before reaching the actual checkpoint.
a.
Design Elements. The approach zone should include design elements to support the
following functions and operations:
Reduce the speed of incoming vehicles to, or below, the design speed of the
access control point.
Perform sorting of traffic by vehicle type, e.g. Sorting trucks or visitors into
the proper lane before reaching the inspection area or checkpoint.
Provide adequate stacking distance for vehicles waiting for entry, especially
during times of peak demand, to ensure minimal impact on traffic approaching
the installation and on traffic safety operations of adjacent public highways.
Provide the first opportunity to identify potential threat vehicles, including
those attempting entry through the outbound lanes of traffic.
2-5
SMFM 19-14
Roadway layout and traffic control devices such as signs, variable message
systems, signals, and lane control markings should be utilized to perform these
functions. Drivers should be notified of the upcoming access control point, the
proper speed to travel, and proper lane to utilize.
b.
2-8.
Size of the Approach Zone. The length of the approach zone is based on available
land, distance required for queuing and performing traffic sorting, and the space
required to create additional lanes of traffic without queuing excessively onto
adjacent public highways. The design should also support measures that may be
needed during higher force protection condition levels, the use of random
antiterrorism measures at lower force protection condition levels, and the
temporary placement of traffic barriers as specified in the installation antiterrorism
plan to constrain and slow traffic. Space may also be required to support traffic
calming techniques to mitigate high-speed threats.
ACCESS CONTROL ZONE. The access control zone is the main body of the access
control point and includes guard facilities and traffic management equipment used by the
security forces. The design of the access control zone should be flexible enough to ensure
the infrastructure can support future inspection demands, access control equipment, and
technologies. When designing the access control zone, consider the requirements to
process the following types of vehicles depending on the intended functions of the access
control point:
a.
b.
2-6
SMFM 19-14
passes as personnel are leaving the installation. If a vehicle is denied entry during
identification checks, the access control zone must have room for that vehicle to be
re-directed to exit the installation. Traffic arms can be used to control traffic when a
vehicle is being rejected from the access control point (Figure 2-2).
c.
Tandem Processing. Installations may use tandem processing, with two or more
security personnel posted to each lane of traffic, to increase the throughput of an
access control point. It has been estimated that tandem processing may improve
capacity by up to 50 percent per lane (traffic engineering and highway safety
bulletin: gates revisited). This additional capacity may be critical during increased
force protection condition levels or during the use of random antiterrorism
measures. Therefore, design access control zones to support tandem processing.
d.
e.
Where the automated system is known, design the access control zone to provide
the necessary infrastructure to support the system. If the exact type of automated
equipment and procedures used for vehicle or personnel identification is unknown,
provide a flexible layout and electrical power infrastructure to support the future
installation of an automated system with limited disruption to operations of the
access control point.
2-7
SMFM 19-14
2-9.
RESPONSE ZONE. The response zone is the area extending from the end of the access
control zone to the final denial barrier. This zone defines the end of the access control
point. Design the response zone so that the security forces have time to react to a threat,
operate the final denial barriers, and close the access control point if necessary.
2-10. SAFETY ZONE. A terrorist vehicle could explode inside the contained area of the
access control point. Consider the effects an explosion may have on nearby personnel,
buildings, or assets. The safety zone extends from the passive and active barriers in all
directions to protect installation personnel from an explosion at the vehicle barricade.
Determine the acceptable standoff distance or safety zone by the expected weight of the
explosive charge and the facility or asset to be protected. Another consideration in the
development of the safety zone is any exclusion zones, which may be required to
minimize radiation exposure from x-ray, gamma ray, or similar inspection equipment.
2-8
SMFM 19-14
CHAPTER 3
ACCESS CONTROL POINT INSPECTIONS
3-1.
GENERAL. Installation commanders are responsible for protecting the personnel and
property under their jurisdiction and for maintaining order on the installation. A key part
of that responsibility is the requirement to emplace procedures for inspecting persons and
their property and vehicles at entry and exit points of the installation. In this manual, the
term inspection is used to describe a physical security measure. An inspection is
different from a search in that an inspection is not based on reasonable suspicion or
probable cause. An access control point inspection is the examination of a vehicle or a
hand carried item without the justification for a search.
3-2.
3-3.
a.
b.
All personnel entering a National Guard installation should have at least one form
of official photo identification. Normally, all visitors are required to sign in and
receive a temporary pass to enter the installation. Local policy describes the
procedure for issuing temporary passes.
3-1
SMFM 19-14
3-4.
3-5.
Expiration date.
Modifications or discrepancies.
Physical characteristics against the persons physical appearance.
Holograms, where appropriate.
That the card is not damaged, coming apart, or showing signs of tampering or
alteration.
a.
b.
3-2
SMFM 19-14
work location address and telephone number, security information, or information
identifying the badge holder as a National Guard soldier.
3-6.
c.
d.
b.
Background investigation.
Control.
Contracted worker/vendor uniforms.
Control officer.
Parking.
Packages.
3-3
SMFM 19-14
c.
Control. A pass and badge system coupled with an escort system is the most
effective way to control contracted workers/vendors. A pass-and-badge system
serves to identify and restrict access to certain areas of an installation. Badges can
be color-coded to identify the level of escort/supervision required. At the minimum,
a pass-and-badge system should include the following information on all contracted
workers/vendors:
d.
Does the contracted worker/vendor have any mental or physical problems that
could cause injury to other person(s)?
Does the contracted worker/vendor have a large family whose needs exceed
his financial capabilities?
Photo.
Name.
Duty.
Title.
Badge number.
Expiration date.
Some unique marking which can be used to help detect counterfeit badges Colorcoded badges work best at installations that are divided into zones or sectors. The
color of these badges should identify the specific zone or activity to which
contracted workers/vendors are restricted, such as the dining facility. Badges
should also identify whether or not a contracted worker/vendor has access to more
than one zone. When a contracted worker/vendor is outside of his assigned area, he
must be escorted. Contracted workers/vendors should also be controlled by use of
an access control list that names those contracted workers/vendors authorized
access to the installation. The access control list is most effective when used in
conjunction with the pass-and-badge system described above. If photo
identification are not available, security personnel at the access control point to the
installation should have a photograph book of authorized contracted
workers/vendors. Sample procedures for controlling contracted workers/vendors
access onto an installation are listed below:
SMFM 19-14
e.
f.
g.
Parking. Installations that contract their support services should stipulate that
workers will be transported to the site. If contracted workers/vendors are not
transported to the site, off-site parking should be available. Off-site parking areas
should be placed far enough away from the installation and access control point
that protective standoff is maintained.
h.
i.
3-5
SMFM 19-14
3-7
GENERAL. Vehicle search covers a very broad field, from bicycles to cars and large
trucks. This section concentrates on the most common, the car, but the principles
involved embrace all forms of transport. All personnel involved in operations designed to
regulate the movement of members of the civilian community must be thoroughly
conversant with their duties and responsibilities. Soldiers must be able to work quickly
and methodically to prevent delay and disruption to legitimate traffic and avoid
unnecessary damage to vehicles and property.
3-8.
3-9.
a.
The presence of millions of vehicles on the road can make the inspection of
vehicles at vehicle checkpoints can appear a daunting task. Vehicle inspections
should not rely on chance. It must be backed up by an efficient, intelligence system,
which targets specific vehicles and enables information to be quickly verified. This
involves close liaison with police records, vehicle registration authorities, and so
forth. The alertness and intuition of the policeman or soldier on the spot can achieve
much. He should be aware of the general characteristics of the construction of a
vehicle and signs which may indicate that a vehicle is suspect.
b.
Gate personnel have an important role to play in the inspection of vehicles where
there is a high probability that explosives or other contraband may be present.
However, the routine inspection of vehicles is a task that any member of the
National Guard may be called upon to perform.
To find contraband resources while they are in transit, to deter the movement of
contraband, and to identify and intercept any items which may pose a threat to
National Guard personnel. These are referred to as general vehicle inspections and
will be conducted in conjunction with a access control point.
b.
To protect potential targets from booby traps placed on their vehicles. These are
referred to as defensive vehicle inspections.
3-6
SMFM 19-14
3-10. AVOIDANCE OF INSPECTION POINTS. Suspicious persons will try to avoid being
inspected and may be working in liaison with others.
a.
Be on the alert for infiltrators seeking to bypass the access control point or deceive
the on duty personnel by using any of the following means:
b.
Getting out of the vehicle and walking past the vehicle checkpoint.
Pedestrians should be watched.
Scouting. One vehicle signaling to another should be watched; for example,
by using brakes and flashing headlights and vehicle to vehicle radio or cellular
telephones.
Creating a distraction. If an incident or disturbance occurs at the access
control point, caution should be used. (Disturbances cause congestion, thus
encouraging more vehicles to be let through without being searched.)
Being courteous or overly polite.
Acting suspicious. The faces of the passengers and drivers should be observed
and noted whether they are relaxed, tense, or nervous.
Driving cars with scanning radios tuned to National Guard or police
frequencies.
Driving cars with windows open on a cold day. They may be trying to disperse
the smell of explosives.
Stolen Car Test. When checking a suspect vehicle, the following stolen car test
should be applied:
3-7
SMFM 19-14
3-11. CONDUCT OF GENERAL VEHICLE SEARCHES. As with all actions on, the
action on a find will be dictated by the situation, intelligence, and the law. The search
advisor must outline a detailed list of actions on a find, and ensure that all search team
members are fully aware of the procedure to be taken.
a.
b.
Conduct of Initial Checks. The main purpose of the initial check is to select
vehicles for a more detailed examination, but personnel carrying out checks at the
entrance to barracks and installations must be aware of the threat from large
vehicle-mounted bombs. An initial check is carried out without the occupants
dismounting from the vehicle, although the driver may be asked to open the hood
and trunk. The check should be conducted at the barrier.
1.
The conduct of the initial check will depend on the number of troops
available. The barrier commander and cover man, or the vehicle checkpoint
commander with two searchers and a number of escorts, may undertake the
initial check. The initial check should take up to 3 minutes. A possible
breakdown of the task is as follows:
(a)
3-8
SMFM 19-14
(b)
The searchers:
(c)
2.
It may not be possible to search all vehicles passing through the vehicle
checkpoint. Therefore, it is essential that procedures and selection criteria be
developed that will assist members of the vehicle checkpoint in identifying
those vehicles which are most likely to present a threat. In assessing which
vehicles should be subjected to a more detailed search, the vehicle checkpoint
commander should consider the following:
3.
It is not necessary for the full sequence to be completed on all vehicles. The
parts applied should vary from vehicle to vehicle, to keep an enemy guessing.
It should be stopped once the integrity of the vehicle, passengers, and contents
are assured.
4.
When the initial check is complete, the vehicle should be allowed to proceed
unless suspicion remains about the vehicle and its occupants, or it has been
selected at random for further search. In such circumstances, the vehicle
should be retained for a primary search.
Ask the occupants to get out of the vehicle and stand clear of the vehicle.
Guard all occupants.
Ensure that the driver observes the search operation.
3-9
SMFM 19-14
Remove all loose objects from the trunk and interior of the car.
NOTE
If an explosive-vapor detector is employed, use it before the occupants get out of the vehicle.
The explosive-vapor detector is used through a small opening, with all the other doors and
windows closed.
The threat and prevailing circumstances will determine whether the driver or the searcher
removes the items from the vehicle.
b.
The vehicle checkpoint commander will arrange for all vehicle occupants to be
searched and checked while the vehicle search takes place.
c.
While the driver and occupants are being questioned, the searchers:
d.
Carry out the person search before asking any questions about identity.
Determine implications regarding the search of individuals before the
deployment of the search teams.
Conduct an identity check on all vehicle occupants. If questioning is
necessary, do it individually.
Allow the specialized search dog, if available, to search the vehicle. Use the
search dog on the advice of its handler.
Search the engine compartment (under the hood).
Search the trunk of the vehicle.
Search the exterior of the vehicle, starting at the front (one searcher on each
side) and finishing at the front of the vehicle.
Search the underneath of the vehicle.
Check the inside of the vehicle, starting at the rear, with one searcher on each
side, and finishing at the front of the vehicle.
During the search of the vehicle and the questioning of its occupants, vehicle
checkpoint personnel should:
Watch for the driver, who has to search his pockets for his drivers license,
and upon finding it, tries to read it before handing it to you. It may not be his,
and the real license, if he has one, could still be concealed somewhere else in
the car or on his person.
Watch for a sudden movement that is not consistent with getting out of a
vehicle, such as reaching for an object.
Watch for covert signals between vehicle occupants.
Watch for delaying tactics.
Check the registration papers, and confirm that the driver is the owner of the
vehicle or has authority to use that vehicle.
3-10
SMFM 19-14
Check the license plates. Ensure that they are the same on the front and rear of
the vehicle and that they correspond to the registration papers for the vehicle.
Ask the driver:
For registration details; for example, the expiration date and the
ownership.
Where he has come from.
Where he is going.
Why he is in the area (depending upon circumstances).
NOTE
If the car is full of smoke or smells of perfume, determine why. It could be to cover the smell of
explosives.
e.
The procedure above is a guide only. The actual conduct of the search will depend
on the time, the size of vehicle, the intelligence, and the current situation.
f.
All sedan-type vehicles are broken into five basic areas. Large box sections or
double skin areas to which access can be obtained with minimum modification
should be checked. Also, check for the smell of fresh glue, paint, cannabis, and so
forth, and if the vehicle is towing a trailer or boat. Points to remember when
searching these areas are listed below. Possible hide locations on a sedan-type
vehicle are shown in Figure 3-1.
3-11
SMFM 19-14
1.
2.
Trunk. This includes the load space of station wagons, hatchbacks, and so
forth. Stand back and look at the contents before searching. Always remember
to:
3.
Check the battery for signs of additional electrical wiring that may be
wired to a device within the vehicle. Check under the battery tray.
Look at the oil filter, and check for signs of recent installation or
modification. (It is possible to modify the oil filter internally to bypass
the engine oil, leaving the filter bowl hollow).
Look inside the radiator filter neck, expansion tanks, and windshield
washer fluid bottle.
Check for possible suspension of small objects. Be extremely careful
when removing the radiator cap as boiling water may gush out under
pressure.
Check around and under all structural members and engine parts for the
possible attachment of objects. Check the heater, ventilation motor,
ventilation hoses and vents, and air filter.
Look under the hood. Check inside the holes in the structural hood
brace attached to the hood.
Check for any sound-deadening material under the hood or heat shield.
3-12
SMFM 19-14
Check behind all the lights (head lights, side lights, and rear lights).
Check behind the bumpers and fenders.
Check wheels and hubs. Check the tire pressure. Bleed a small amount
of air from the tires. Smell it for unusual odors.
Check under the wheel wells. Check for tampering of the bolts on the
mud deflectors.
Check the front and rear panels and spoilers.
Remove the fuel cap, and examine the inside of the pipe for possible
suspension of objects. Ensure that the level of gas or diesel match the
fuel gauge reading.
Check the bodywork and roof for signs of adaptation. Check for signs
of welding or new under-seal and if it is soft.
Determine if the shape of the inside of the wing conforms to the outside.
4.
Underneath. When looking underneath the car, check for signs of modification
work to the bottom of the radiator, engine sump, oil sump, exhaust muffler,
fuel tank, and the entire chassis and framework. The appearance of unusual
welds, soldering, or painting could indicate a possible false bottom. Check the
entire chassis framework and the body sills. Check for drain holes in seals.
Ensure that the fuel tank matches the vehicle (such as age).
5.
Roof linings. Gain access by removing the door sealing strips or, if
sunroof-fitted, by removing the trim. Check the sun visors. Check the
front, rear, and center window and door pillars.
Door panels. Wind windows down first to make sure there is nothing
obstructing the mechanism. Ensure that they can be searched without
removing the trim. Avoid damage to spring clips, and so forth.
Rear side panels (2-door vehicles). Remove and check through the
trunk.
Back seats. Remove the back seat rest and cushion (some spring in,
some are bolted in). With the back seat removed, look up into the rear
area behind the seat back and car structure.
Front seats. Check underneath, and up inside the padding.
Dashboard area. Check to see if the battery is disconnected. Check
behind the dashboard panels. Check the inside of the ventilation and
heating ducts. Check the radio and speakers. Remove the ashtray, then
check the contents and the space inside the holder. Check behind,
above, and inside the glove box compartment. Check the center tunnel
console.
Front foot wells. Remove the panels to allow access to the wing space,
door seals, and so forth.
3-13
SMFM 19-14
g.
Floor. Remove the carpets and the mats (they should not be stuck
down). Check for signs of false floors (welding, mastic, and so forth).
Check the bungholes.
Gear shift compartment. Ensure that there are no obstructions.
Three screwdrivers: one straight, one cross tip head, and one electrician.
One flashlight.
One telescope handle with a complete set of assorted mirrors.
One endoscope.
One adjustable wrench.
b.
It may involve dismantling parts of the vehicle and take many hours. However, the
legal time limit for which the vehicle or its occupants may be detained must not be
exceeded. Assistance may be required from a trained vehicle mechanic. Once it has
been decided that a vehicle is to be subjected to a secondary search, the following
procedure is suggested:
1.
Preferably, the driver drives the vehicle, under escort, to the search location. If
the driver refuses, he is arrested under normal arrest procedure and a suitably
qualified policeman or soldier drives the vehicle. Take care to avoid any
forensic contamination of the vehicle and to maintain continuity of evidence.
For a military operation, a soldier other than the arresting soldier remains with
the vehicle until it is released into the custody of the driver or civilian police
to maintain continuity of evidence.
2.
After the arrest procedure, the driver is taken back to his vehicle under escort.
He may watch the search.
3.
4.
He is offered the opportunity to sign the search report before the vehicle is
returned to him.
3-14
SMFM 19-14
CHAPTER 4
FORCE PROTECTION CONDITIONS AND
SECURITY MEASURES
4-1.
Table 4-1 shows the force protection conditions applications and descriptions, and
provides guidance on the expected capabilities and impacts associated with the
force protection conditions levels.
FORCE
PROTECTION
CONDITIONS
APPLICATION
DESCRIPTION
NORMAL
ALPHA
BRAVO
CHARLIE
DELTA
4-1
SMFM 19-14
Therefore, an access control point designed in accordance with this guidance
should be capable of supporting the security measures employed during Force
Protection Conditions NORMAL, ALPHA, and BRAVO, including any
random antiterrorism measures employed in accordance with the installation
antiterrorism plan. For shorter durations, the access control point should be
designed to support operations at Force Protection Conditions CHARLIE and
DELTA, which includes 100 percent vehicle inspections. At Force Protection
Conditions CHARLIE and DELTA, traffic congestion is expected and can be
relieved by authorizing entry to mission-essential personnel only. Other methods of
reducing traffic congestion at higher level force protection conditions involve the
use of procedural rather than design elements and are not covered here.
4-2.
The level of identification and inspection at the entry control facility will vary
depending on the force protection conditions and the use of random antiterrorism
measures. The random antiterrorism measures will be identified in the installation
antiterrorism plan. Each installation will have an antiterrorism officer, who
maintains the antiterrorism plan.
b.
Random antiterrorism measures can include, but are not limited to:
4-2
SMFM 19-14
CHAPTER 5
INSTALLATION SECURITY AND RESPONSE FORCE
CAPABILITIES
5-1.
On installations the commander determines the degree of law and order needed to
support order and discipline. The senior law enforcement officer accomplishes this
mission in part by:
1.
Advising the commander on the means and methods needed to achieve the
commanders needs.
2.
3.
4.
5.
6.
7.
8.
Ensuring that military police provide protection and assistance to the military
community.
9.
10. Setting the example in community relations that reflect and enhance the
military police image.
11. Establishing command and control procedures to effectively manage military
police resources and provide law enforcement when and where needed.
5-1
SMFM 19-14
b.
5-2.
The senior law enforcement officer evaluates current operations and projects
future courses of action.
2.
3.
4.
He ensures that plans are coordinated with staff sections and subordinate
commands.
5.
6.
He ensures that the commanders get the military police support they need.
7.
Ensures that military police show mutual respect and maintain a professional,
working relationship when working with local civilian police. Civilian police
are normally led and directed by persons with many years of experience in
dealing with people and law enforcement.
8.
Establishes policies to guide military police when dealing with civilian police.
For example, sometimes direct telephone lines for liaison are established
between a military police station and a civil police station. Arrangements may
be made for the use of the civil police radios, but use ordinarily is limited to
emergencies or special situations, and care is taken not to overload the civil
police networks.
5-2
SMFM 19-14
5-3.
Connectivity with the local community also facilitates interoperability with local
incident response agencies and organizations. As a part of the commanders longrange strategy, he may only need to fill a gap in response capability until the
installation receives the requisite resources to fill the need without outside help.
The key is that once a required need has been identified, it must be accounted for in
some manner.
b.
Normally, emergency responders are integrated through the installation and are, in
fact, the first layer of security for the installation. Increases in military police
patrols provide the most seamless increase in security posture on an installation,
because the additional capabilities are integrated directly into its day-to-day
operations. Emergency responders on most installations include:
5-4.
Military police.
Guards.
Fire department.
Emergency medical services personnel.
Explosive ordnance disposal personnel.
Firing Positions. Firing positions must be established at all entry control points.
The purpose and intent of firing positions is two-fold. First they are designed to
provide overwhelming force against anyone attempting to penetrate the installation
perimeter. Second, they are designed as a deterrent in preventing breeches to the
installation. Firing positions must provide a clear and unobstructed view of the
entry control point with left and right firing boundaries or fields of fire. Positions
5-3
SMFM 19-14
must be camouflaged so that they are not easily detected form onlookers and
should be capable of relocating if necessary.
b.
Personnel and Equipment. Personnel manning firing positions must be fully trained
and qualified to safely operate the weapon systems that are in place. They must
also be well versed on the rules of engagement and use of force policies. There
must be sufficient ammunition at the firing position to sustain a reasonable amount
of time until replacements or reinforcements arrive. The position must have two
forms of communication with the entry control point and the emergency operations
center. This includes land lines and wireless communication devices such as
telephones and radios.
5-5.
CLASSES OF ORDERS. Two types of orders direct a guard on post: general orders and
special orders. General orders outline the fundamental responsibilities of a guard while
special orders instruct him in the performance of his duties while on a particular post.
General orders for both the interior and exterior guards must be supplemented by
realistic, detailed, and mission-oriented special orders carefully tailored for the specific
post and situation from the viewpoint of security and sentry effectiveness and protection.
The special orders for each post must be reviewed frequently to insure they do not
become obsolete. A special order may be added to a guard post for a length of time to
cover a certain situation and deleted at the end of a specific time, or on a specific event.
5-6.
GENERAL ORDERS. All interior guards are required to memorize, understand, and
comply with the following general orders.
a.
The guard is responsible for everything that occurs within the limits of his
post while he is on duty. He is also responsible for all equipment and properly
located within the limits of his post. The exact limits of his post are defined by
special orders. The special orders should also include every place a guard
must go to perform his duties.
2.
3.
The guard apprehends all suspicious persons and all persons involved in a
disorder occurring on or near his post provided he does not have to leave his
post to do so. When apprehending persons, the guard will use only necessary
force to overcome any resistance. Apprehension of persons should be included
in special orders or guard instructions. All persons apprehended are turned
over to the commander of the relief.
5-4
SMFM 19-14
b.
4.
All persons, regardless of their rank, are required to respect members of the
guard in the performance of their duties.
5.
A guard will remain on his post and continue to perform all duties required on
that post until proper authority to relieve him.
6.
If a guard requires relief because of illness or any other reason, he will notify
the commander of the relief and wait until he is replaced by another guard or
has permission from the proper authorities to leave his post.
7.
If a guard is not relieved at the expiration of his tour of duty, he does not
abandon his post. He will contact the commander of the relief for instructions.
8.
Guards leave their posts for meals as specifically directed by the commanding
officer. Normally, this is accomplished by arranging for early and late meals
for guards going on and off post.
9.
A guard will familiarize himself with the special orders for his post prior to
being posted. The guard will obey, execute, and enforce all special orders
pertaining to his post.
NOTE
The commander of the relief is responsible for insuring that all guards understand their
special instructions before being posted.
2.
In addition to his special orders, a guard is responsible to obey and carry out
any orders or instructions from the commanding officer, field officer of the
day, and officers and noncommissioned officers of the guard. No other
persons are authorized to give a guard orders or instructions. Any special
instructions for a guard must be issued through a guards chain of command.
3.
Guards on post will pass instructions to their relief when appropriate. The
information is also given to the commander of the relief. For example, a guard
is on duty at an ammunition holding area and discovers a hole in the fence
during his tour of duty. Upon finding the hole, the commander of the relief is
5-5
SMFM 19-14
notified. The guard will pass this information to his relief so that special
attention can be paid to that portion of the fence until the fence is repaired.
4.
The guard will perform his duties in a military manner and serve as an
example to others.
5.
The guard is courteous to all persons. He will talk to no one except in the line
of duty. When persons make proper inquiries of a guard. He answers them in a
courteous manner.
6.
7.
(b)
(c)
The sentinels primary mission is to guard his post. Requiring salutes places the guard in a
vulnerable position. The sentinel will; however, display all other military courtesy and respect
while in conversation with an officer.
8.
A guard talking with an officer does not interrupt the conversation to salute
another officer. If the other officer salutes a senior officer; however, the guard
also salutes.
9.
5-6
SMFM 19-14
(b)
After challenging, a guard will remain in the challenge position until the
individual challenged is allowed to pass, will depart, or is turned over to
the commander of relief.
(c)
(d)
5-7
SMFM 19-14
NOTE
A visual check of an individuals identification card is considered the best means of
identification when in doubt.
(e)
Commanding officer.
Field officer of the day.
Officer of the day.
Officers of the guard.
Officers.
Patrols.
Reliefs.
Noncommissioned officers of the guards in order of rank.
Friends.
(4) If a person or group has been advanced and is talking with the
guard, the guard halts any other person or group that may
approach, but advances no one until the person or group with
whom he is talking leaves. He then advances the senior of the
remaining group.
(5) A guard must always be alert and never surprised. He never
permits two persons or groups to advance to his post at the same
time.
(6) Confusing or misleading answers to a guards challenge are not
acceptable. The answer FRIEND; however, is not considered
misleading and is the usual answer of an inspecting officer or
patrol when they do not wish to reveal their official capacity.
10. During his tour of duty a guard is required to execute orders of no one but the
commanding officer, field officer of the day, officer of the day, and officers of
the guard; however, any officer may investigate apparent violations of
5-8
SMFM 19-14
regulations by members of the guard. In the event of an inspecting officer, or
any other person in the military service, finding an irresponsible guard on
post, it is his duty to notify the commander of the guard or a
noncommissioned officer of the guard and stay on the post until a qualified
guard is posted.
11. A guard surrenders his weapon to, and only on order of, a person from whom
he lawfully receives orders while on post. The persons should not order a
guard to surrender his weapon for inspection or any other purpose unless an
emergency exists.
c.
5-7.
A guard reports all violations of his special orders to the commander of the
relief. He apprehends the offender, if necessary.
2.
A guard reports all emergencies that occur on or near his post. The guard will
take whatever action is prescribed by his special orders or guard instructions.
Anytime the guard is in doubt as to what action to take, or is not covered in
his special orders, he will call the commander of the relief for instructions or
assistance.
3.
In case of fire, occurring on or near his post, the guard calls, FIRE, (identify
the post) POST NUMBER (ONE). He gives the alarm or insures one has
been given. If possible, he extinguishes the fire. He helps direct the fire
fighting apparatus to the fire. He notifies the guardhouse of his actions as soon
as possible.
4.
A guard reports any disorder occurring on or near his post. He takes police
action as prescribed in his special orders or guard instructions. If assistance is
required, he calls, THE GUARD, (identify the post) POST NUMBER
(ONE).
5.
If the danger is great, he fires his weapon into the air three times in rapid
succession before calling. When instructed to do so, guards give warning of
air, chemical, and other attacks. Guards should receive special training if they
are to act as chemical sentinels while on post.
SPECIAL ORDERS. Special orders are established by the commanding officer and
differ for various posts depending upon the nature of the area being guarded.
a.
5-9
SMFM 19-14
b.
1.
Realism. Special orders are designed for a particular post, since two posts on
an installation are seldom identical. The orders for each post are devised to
provide increased protection for the sentinel concerned by locating him behind
natural or artificial obstacles that make surprise difficult. This calls for
flexible and imaginative planning when drawing up special orders. For
example: Ammunition dump security at a critical installation would be more
elaborate and tactically oriented than security of a motor pool.
2.
Clarity. Special orders should be stated in plain language that can be clearly
understood by the guard on post. The commander of the relief clarifies any
doubt as to their meaning before posting a guard.
The commanding officer is responsible for keeping the special orders up to date
and publishes any changes immediately. Copies of special orders are continuously
and conspicuously posted in the guardhouse for reference. A copy of the special
orders may be posted on a fixed post or the guard may be required to carry a copy
of the special orders with him while on duty. The special orders for each guard post
should explain (or diagram) the post location, boundaries, and any particular orders
for the post, including those conditions under which force will be used. Any special
orders received by a guard before going on guard and while on post are passed on
to the guard who relieves him. These additional orders may be written or oral.
5-10
SMFM 19-14
CHAPTER 6
SPECIAL CONSIDERATIONS FOR ACCESS CONTROL
POINTS
6-1.
GENERAL. National Guard installations share many similarities, with each other.
Depending on the location of the installation and the mission of the local National Guard
units, each will present diverse security and access control challenges to the installation
commanders. On some installations, only military members require access to the
installation, while others share roadways with nearby civilian communities. While many
installations do not operate pedestrian gates, some installations could not function
without them. These gates often serve as access control points and require special
considerations. Another unique access control consideration is associated with the
conduct of special events on an installation. These events pose special challenges and
vulnerabilities.
6-2.
AIRFIELDS. Installation commanders rely on the perimeter access control points for
validating the authenticity of a persons identification on an installation. This validation
process must overlap to an installation airfield.
6-3.
a.
b.
RAIL YARDS. Installation commanders are responsible for securing railways within the
installation boundary and securing off-post railway sections when they are used for
military purposes. The latter is inherent in the commanders in-transit cargo
responsibilities.
a.
6-1
SMFM 19-14
NOTE
Never divulge the embarkation or debarkation times or the load of a train except to those who
have a need to know. Movement by rail is difficult to conceal and is manpower-intensive.
b.
c.
6-4.
b.
Pedestrian gates must be located so that access controllers have a complete view of
them. A pedestrian should never have the opportunity to appear at an access control
point without the controller being able to observe him from the onset. Access
controllers for pedestrian gates should have no other duties but that of the gate. The
same security and comfort considerations provided to access controllers at
6-2
SMFM 19-14
vehicular access control points must be provided to access controllers at pedestrian
gates.
6-5.
SPECIAL EVENTS. Special events on military installations often raise the overall
installation threat level. Events demonstrating national pride, such as National Day, Hajj
Janidriha, all pose unique challenges. Law and order planners can expect large
concentrations of people attending the events and a substantial increase in traffic flow and
parking requirements. Additional law enforcement, force protection, and antiterrorism
measures are necessary to counter additional vulnerabilities associated with large crowds
on an installation. Local access control point plans should address these issues and the
effects on the surrounding community.
6-3
SMFM 19-14
6-4
SMFM 19-14
CHAPTER 7
INSTALLATION ENTRANCES
7-1.
7-2.
7-3.
a.
When gates are not operational during nonduty hours, they should be securely
locked, illuminated during hours of darkness, and inspected periodically by a
roving patrol. Additionally, warning signs should be used to warn drivers when
gates are closed.
b.
Doors and windows on buildings that form a part of the perimeter should be
locked, lighted, and inspected.
b.
Entry-control stations that are manned 24 hours each day should have interior and
exterior lighting, interior heating and air conditioning (where appropriate), and a
sufficient glassed area to afford adequate observation for personnel inside.
1.
7-1
SMFM 19-14
2.
3.
The size and coloring of a sign, its letters, and the interval of posting must be
appropriate to each situation.
4.
7-4.
7-5.
Warning signs should be installed along the limited areas physical barriers and at
each entry point where they can be seen readily and understood by anyone
approaching the perimeter.
b.
In areas where Arabic is one of two or more languages commonly spoken, warning
signs must contain the Arabic warning in addition to an English translated warning.
The wording on the signs will denote warning of a restricted area.
c.
The signs should be posted at intervals of no more than 30 meters. They must not
be mounted on fences equipped with intrusion-detection equipment. Additionally,
the warning signs prescribed should be posted at all entrances to limited,
controlled, and exclusion areas.
OTHER SIGNS. Signs setting forth the conditions of entry to an installation or area
should be plainly posted at all principal entrances. The signs should be legible under
normal conditions at a distance not less than 15 meters from the point of entry.
a.
Such signs should inform the entrant of the provisions (search of the person, the
vehicle, packages, and so forth) or prohibitions (such as against cameras, matches,
and lighters and entry for reasons other than official business) that may be
prescribed by the installation commander.
7-2
SMFM 19-14
b.
7-6.
Signs or notices legibly setting forth the designation of restricted areas and
provisions of entry should be plainly posted at all entrances and at other points
along the perimeter line as necessary.
Clear zones should be maintained on both sides of the perimeter barrier to provide
an unobstructed view of the barrier and the ground adjacent to it. Roads within the
clear zone should be as close to the perimeter barrier as possible without interfering
with it. The roads should be constructed to allow effective road barriers to deter
motor movement of unauthorized personnel during mobilization periods.
b.
Clear zones should be kept clear of weeds, rubbish, or other material capable of
offering concealment or assistance to an intruder attempting to breach the barrier.
1.
A clear zone of 6 meters or more should exist between the perimeter barrier
and exterior structures, parking areas, and natural or manmade features.
2.
When possible, a clear zone of 15 meters or more should exist between the
perimeter barrier and structures within the protected area, except when a
buildings wall constitutes part of the perimeter barrier.
3.
Ammunition supply points will have clear zones 4 meters outside of the
ammunition supply point and 9 meters inside, and the vegetation will not
exceed 20 centimeters (10 centimeters for high-threat and highly controlled
areas.
4.
(b)
7-3
SMFM 19-14
(2) Such an installation is usually established in a sparsely inhabited
area. Its comparative isolation and the depth of the installation give
reasonable perimeter protection. Under these circumstances, it is
usually sufficient to post warning signs or notices, reduce access
roads to a minimum, and periodically patrol the area between the
outer perimeter and the conventionally protected vital area of the
installation.
(3) An alternative to erecting new or replacing old chain-link fence
involving an entire installation perimeter is to relocate or isolate
the sensitive area or item by:
7-7.
a.
b.
c.
Escorts. Escorts are chosen because of their ability to accomplish tasks effectively
and properly. They possess knowledge of the area being visited. Escorts may be
guard-force personnel, but they are normally personnel from the area being visited.
Local regulations and policy determine if a visitor requires an escort while in the
restricted area. Personnel on the access list may be admitted to restricted areas
without an escort.
b.
2.
7-4
SMFM 19-14
3.
(a)
(b)
(c)
(d)
The two-person rule is limited to the creativity of the senior law enforcement
officer and the physical-security manager. They should explore every aspect
of physical security operations in which the two-person rule would provide
additional security and assurance and include all appropriate
recommendations and provisions of the physical-security plan. An electronicentry control system may be used to enforce the two-person rule. The system
can be programmed to deny access until two authorized people have
successfully entered codes or swiped cards.
7-5
SMFM 19-14
7-6
SMFM 19-14
APPENDIX A
VEHICLE INSPECTION HOT SPOTS
This appendix shows vehicle inspection hot spots that access controllers may encounter on
various vehicle types. A hot spot is an area on a vehicle where a device or contraband could be
hidden. These areas require special attention during inspections (Figures A-1 through A-14).
A-1
SMFM 19-14
A-2
SMFM 19-14
A-3
SMFM 19-14
A-4
SMFM 19-14
A-5
SMFM 19-14
A-6
SMFM 19-14
A-7
SMFM 19-14
A-8
SMFM 19-14
APPENDIX B
RULES OF ENGAGEMENT
B-1.
GENERAL. Rules of engagement are directives issued by military authority that outline
the circumstances and limitations under which the National Guard will start and/or
continue combat engagement with other forces encountered. Rules of engagement specify
when, where, against whom, and how units can use force. The National Guard may use
rules of engagement to control the use of force across the range of operations. The
aggressiveness that is important in wartime must be tempered with restraint in the
ambiguous environment of internal security operations.
B-2.
B-3.
a.
b.
Policy. Rules of engagement reflect the political will of the civilian leadership of
the National Guard. Additionally, developing and training rules of engagement to
multinational allies is an inherently political process, which may require
coordination with other government agencies. An example of a policy-driven rule
is the prohibition of first use of riot control agents without express orders.
c.
B-1
SMFM 19-14
b.
c.
Kingdom level
ELEMENTS OF SELF DEFENSE. Nothing in the rules of engagement can limit the
inherent authority and obligation to use all necessary means available and take all
appropriate action in self-defense of an individual or a member of the National Guard. In
all situations, soldiers and commanders use force based on necessity and proportionality:
a.
b.
SMFM 19-14
to diffuse the threat. However, graduated response includes the ability to quickly
escalate to the level of force required to accomplish the mission. For further
information on graduated response, refer to SMFM 19-15.
B-5.
b.
c.
d.
B-6.
B-7.
Interpret. The office of the legal affairs and general department is instrumental in
interpreting rules of engagement. This may require constant situational
understanding by the office of the legal affairs and general department made
possible through his presence at command posts as required.
B-3
SMFM 19-14
b.
Draft. In some operations, rules of engagement are top-driven, meaning that the
higher echelon commander establishes rules of engagement that must be
disseminated verbatim to all lower echelons. In contrast, top-fed rules of
engagement are established for the immediately subordinate echelon. This allows
the rules of engagement to be tailored to the particular units situation. When the
rules are top-fed, commanders and staffs down to brigade level draft rules of
engagement for their commands. Figure B-2 contains some of the areas considered
in drafting rules of engagement and rules of interaction.
Rules of Engagement Considerations
International law.
Operational concerns (mission requirements).
Commanders intent.
Threat.
Tactics and weapons organic to the force.
Legal requirement (laws of the Kingdom).
Kingdom policy (considering United Nations resolutions and international agreements).
6.
B-4
SMFM 19-14
c.
d.
In modern operations, a single solders action can change not only the tactical,
but the strategic and political setting as well. It is vital that commanders
disseminate and train rules of engagement to the lowest levels. Reinforce rules
of engagement in all training opportunities to train soldiers how to apply the
basic rules of self-defense. Individual and unit preparation for specific
missions must incorporate training that challenges soldiers to apply missionspecific rules of engagement.
2.
3.
B-5
SMFM 19-14
4.
(b)
Anticipate attack. Use force if, but only if, there is clear indicators of
hostile intent.
(c)
(d)
Protect with deadly force only human life. Protect with deadly force
only human life and property designated by the commander. Do not go
beyond deadly force when protecting other property.
B-6
SMFM 19-14
APPENDIX C
FORCE PROTECTION CONDITIONS
C-1.
GENERAL. The five force protection condition levels that National Guard installations
respond to are NORMAL, ALPHA, BRAVO, CHARLIE, and DELTA. The
conditions characteristic to each level are described below.
C-2.
C-3.
b.
2.
3.
4.
Security Measure 2. The duty officer or personnel with access to building plans and
area evacuation plans must be available at all times. Key personnel should be able
to seal off an area immediately. Key personnel required to implement security
plans should be on call and readily available. Ensure that law enforcement and
security agencies have immediate access to building floor plans and emergency
evacuation plans for high-risk targets.
C-1
SMFM 19-14
C-4.
c.
Security Measure 3. Secure buildings, rooms, and storage areas not in regular use.
Maintain a list of secured facilities and areas at installation, directorate, or activity
level.
d.
e.
Security Measure 5. Reduce the number of access points for vehicles and personnel
to minimum levels, consistent with the requirement to maintain a reasonable flow
of traffic.
f.
Security Measure 6. As a deterrent, randomly apply Security Measures 14, 15, 17,
or 18 from Force Protection Condition BRAVO, either individually or in
combination with each other.
g.
Security Measure 7. Review all operations plans and orders and standard operating
procedures that pertain to the implementation of Force Protection Conditions
BRAVO through DELTA.
h.
i.
Security Measure 9. Increase liaison with local police, intelligence, and security
agencies to monitor the threat to National Guard personnel, installations, and
facilities. Notify local police agencies concerning Force Protection Condition
BRAVO measures that, if implemented, could impact on their operations in the
local community.
j.
C-2
SMFM 19-14
b.
Security Measure 12. Keep all personnel on call who are involved in implementing
antiterrorism contingency plans.
c.
Security Measure 13. Review the provisions of all operations plans and orders and
standard operating procedures associated with the implementation of Force
Protection Condition CHARLIE.
d.
Security Measure 14. Move automobiles and objects, such as trash containers and
crates, away from high-risk targets and mission essential vulnerable areas to a
distance based upon countering the assessed threat. If the configuration of the
facility or area precludes implementation of this measure, take appropriate
compensatory measures according to local plans (for example, frequent inspection
by explosive detector dog teams, centralized parking, or controlled access to
parking areas).
e.
Security Measure 15. Secure and regularly inspect all buildings, rooms, and storage
areas not in regular use.
f.
Security Measure 16. At the beginning and end of each workday and at frequent
intervals, inspect the interior and exterior of buildings in regular use for suspicious
activity or packages, signs of tampering, and indications of unauthorized entry.
g.
Security Measure 17. Implement screening procedures for all incoming official
mail to identify possible explosive or incendiary devices or other dangerous
material. If available, use trained explosive detector dog teams to inspect
suspicious items and conduct periodic screening of mail. Encourage soldiers,
civilian employees, and family members to inspect their personal mail, report
suspicious items to local law enforcement agencies, and refrain from handling such
items until they are cleared by the appropriate authority.
h.
Security Measure 18. Inspect all deliveries to facilities, stores, libraries, schools,
and other locally designated common-use facilities to identify explosive or
incendiary devices. Use trained explosive detector dog teams for inspections, when
available, if intelligence is received or a specific threat has been addressed.
Encourage family members to report suspicious packages to local law enforcement
agencies and refrain from handling them until they are cleared by the appropriate
authority.
i.
Security Measure 19. Increase both overt and covert security force surveillance of
facilities, libraries, schools, mosques, and high-risk targets to improve deterrence
and build confidence among staff and family members.
j.
Security Measure 20. Inform soldiers, civilian employees, and family members of
the general threat situation to stop rumors and prevent unnecessary alarm.
Periodically update all personnel as the situation changes.
C-3
SMFM 19-14
C-5.
k.
Security Measure 21. Brief representatives of all units and activities on the
installation concerning the threat and security measures implemented in response to
the threat. Implement procedures to provide periodic updates for these unit and
activity representatives.
l.
Security Measure 22. Verify the identity of all personnel entering the installation,
high-risk targets, and other sensitive activities specified in local plans (inspect
identification cards or grant access based on visual recognition). Visually inspect
the interior of all vehicles and the exterior of all suitcases, briefcases, packages,
and other containers. Increase the frequency of detailed vehicle inspections (for
example, trunk, undercarriage, and glove boxes) and the frequency of inspections
of suitcases, briefcases, and other containers.
m.
Security Measure 23. Increase the frequency of random identity checks (inspection
of identification cards, security badges, and vehicle registration documents)
conducted by security force patrols on the installation.
n.
o.
p.
Security Measure 26. Brief all law enforcement personnel, guards, and security
augmentation force personnel concerning the threat and policies governing the use
of force/rules of engagement. Repeat this briefing on a periodic basis.
q.
Security Measure 27. Increase liaison with local police, intelligence, and security
agencies to monitor the threat to national guard personnel, installations, and
facilities. Notify local police agencies concerning Force Protection Condition
CHARLIE and DELTA measures that, if implemented, could impact on their
operations in the local community.
r.
s.
C-4
SMFM 19-14
security measures from Force Protection Condition NORMAL, ALPHA, and
BRAVO, Security Measures 3040 will be implemented. Implementation of
CHARLIE security measures for more than a short period probably will create hardship
and affect the peacetime activities of the unit and its personnel. When in Force Protection
Condition CHARLIE, implement the following measures:
a.
Security Measure 30. Continue all Force Protection Condition ALPHA and
BRAVO security measures or introduce those that have not already been
implemented.
b.
Security Measure 31. Keep all personnel who are responsible for implementing
antiterrorism plans at their place of duty.
c.
Security Measure 32. Reduce installation and high-risk target access points to the
absolute minimum necessary for continued operation.
d.
Security Measure 33. Verify the identity of all personnel entering National Guard
installations, facilities, and activities (to include housing areas, schools, and other
facilities that are not located on installations). Inspect identification cards, security
badges, or other forms of personal identification. Visually inspect the interior of all
vehicles and the exterior of all suitcases, briefcases, and other containers. Increase
the frequency of detailed vehicle inspections (such as the trunk, undercarriage, and
glove boxes) and the frequency of inspection of suitcases, briefcases, and other
containers.
e.
Security Measure 34. Remove all vehicles parked within or near mission essential
vulnerable areas and high-risk targets specified in local plans to a distance based
upon countering the assessed threat. Implement centralized parking and shuttle bus
service, where required.
f.
Security Measure 35. Issue weapons to all law enforcement personnel, security
guards, and guard force augmentation personnel, if not already implemented.
Ensure that all personnel have been briefed concerning the policies governing the
use of force/rules of engagement, particularly the criteria for the use of deadly
force. Ensure that ammunition is available for immediate issue (for those personnel
not already issued ammunition) and that supervisory personnel are familiar with
the policies governing the issuance of ammunition.
g.
Security Measure 36. Increase security patrol activity to the maximum level
sustainable. Weight the effort toward high-risk targets.
h.
Security Measure 37. Position guard force personnel in the vicinity of all high-risk
targets and mission essential vulnerable areas. In areas where necessary, position
additional security personnel in the vicinity of otherwise unprotected housing
areas, schools, hospitals, and other soft targets. Request additional security
augmentation particularly in unprotected areas when needed.
C-5
SMFM 19-14
C-6.
i.
Security Measure 38. Erect barriers required to control the direction of traffic flow
and to protect facilities vulnerable to a bomb attack by parked or moving vehicles.
j.
Security Measure 39. Consult local authorities about closing public (and military)
roads and facilities that might make sites more vulnerable to terrorist attacks.
k.
b.
Security Measure 42. Augment guard forces to ensure absolute control over access
to the installation, mission essential vulnerable areas, and high-risk targets.
c.
Security Measure 43. Identify the owners of all vehicles already on the installation.
In those cases where the presence of a vehicle cannot be explained (owner is not
present and has no obvious military affiliation), inspect the vehicle for explosive or
incendiary devices or other dangerous items and remove the vehicle from the
vicinity of high-risk targets as soon as possible. Commanders may take unilateral
action off post only in circumstances where there is a reasonable basis to believe
that death, grievous bodily harm, or significant property damage will otherwise
occur.
d.
Security Measure 44. Inspect all vehicles entering the installation, facility, or
activity. Inspections should include cargo storage areas, the undercarriage, glove
box(es), and any other area where explosive or incendiary devices or other
dangerous items could be concealed. Briefcases, suitcases, boxes, and other
containers in vehicles should also be inspected.
e.
Security Measure 45. Limit access to installations, facilities, and activities to those
personnel with a legitimate and verifiable need to enter.
C-6
SMFM 19-14
f.
g.
Security Measure 47. Take measures to control access to all areas under the
jurisdiction of the National Guard command or agency.
h.
i.
Security Measure 49. Cancel or delay all administrative movement that is not
mission-essential.
j.
Security Measure 50. Request that local authorities close public roads and facilities
in the vicinity of military installations, facilities, and activities that might facilitate
the execution of a terrorist attack.
k.
C-7
SMFM 19-14
C-8
SMFM 19-14
APPENDIX D
BLAST MITIGATION AND BARRIERS
Section I
Blast Mitigation
D-1.
2.
3.
4.
Blast. The force of the explosion as it is transmitted through the air (blast) can
cause injury to personnel in the open. It can pick up and translate ground
debris, and can fail and collapse structures, generating numerous injuries and
deaths. These hazards are considered in the sitting, barrier, and retrofit
recommendations presented in this section.
b.
Breach. Occurs when brittle materials like concrete are destroyed by very intense
and local overpressure, resulting in a hole.
c.
Spall. When fragments are dislodged at high velocities from the backside of a
brittle material like concrete.
d.
D-1
SMFM 19-14
entry control point structures and, building debris that results from the blast wave
blowing out windows and walls.
e.
Primary fragments are parts, pieces, and fragments of the truck and bomb that are
thrown outward from the detonation at high velocity. Primary fragments are
generally the most lethal projectiles from a bomb detonation.
f.
Far field conditions generally refer to relatively low overpressures found at greater
distances from the detonation point.
g.
Near field refers to the area immediately surrounding a detonation in which blast
and fragment damage will be extensive.
h.
i.
Blast Barriers are employed near the large vehicle bomb (at the access control
point) and can attenuate blast in their shadow to levels acceptable for hardened
structures. Blast barriers do not reduce blast damage significantly for conventional
and expeditionary structures, and are ineffective for mitigating blast effects.
j.
Fragment Barriers (Figure D-1) are employed close to the large vehicle bomb (at
the access control point) and in the far field adjacent to occupied positions.
Fragment barriers provide protection from impacting primary and secondary
debris. These barriers should not be employed with the intent to mitigate blast.
D-2
SMFM 19-14
Section II
Barriers
D-2.
b.
c.
d.
Countermobility.
2.
3.
4.
5.
Countermobility.
2.
3.
4.
Fragment Mitigation.
2.
May also be used behind Jersey and Bitburg Barriers to reduce or eliminate
secondary debris hazard associated with spalling concrete.
3.
2.
Could be used to mitigate fragment damage in the near field depending on the
threat level.
3.
D-3
SMFM 19-14
e.
f.
D-3.
2.
Countermobility.
2.
May also be used for fragment mitigation in the near field if implemented
correctly.
3.
4.
b.
Water. The effectiveness of bodies of water used as barriers to moving vehicles has
not been quantified, but their value in slowing vehicles and as a deterrent is
obvious. Water that is deep enough to submerge the exhaust pipes of vehicles will
provide an effective barrier. Lesser depths may only slow vehicles. For example,
cars and light trucks will be limited to speeds of approximately 40 kilometers per
hour by large bodies of water only 15 centimeters deep. Bodies of water 91
centimeters deep would act as barriers to moving vehicles. If the body of water
floor is uneven or contains several deep trenches, the effectiveness as a barrier
increases significantly.
D-4
SMFM 19-14
c.
D-4.
Terrain. Terrain features such as ditches, berms, hills, or large rocks may provide
effective barriers to vehicles. Rocks or groups of rocks that have a collective mass
equal to approximately twice that of the threatening vehicle make effective
barriers. To be effective, rock ditches, and berms must span the approach route to
block it. Those of lesser extent or such features of a size too small to stop a vehicle
can be used as obstacles to slow vehicle approaches. In designing terrain obstacles,
circuitous, off-road approach routes are far more effective than direct routes. As an
example, the use of inclines can slow vehicle approaches by limiting their ability to
accelerate.
Concrete Barrier (Jersey Barrier). Barriers can be erected from either precast
tongue and groove sections or cast in place with special concrete-forming
equipment. These barriers can be used around a fixed site as a perimeter vehicle
barrier. Barriers can also be arranged to direct and slow traffic flow into a site. This
gives the security personnel at the gate more time to react to a potential threat.
b.
c.
Chain Link Gate Reinforcement. Wire ropes are fastened to gates and anchored on
either side of the gate. For a relatively weak gate, the reinforcement transfers the
force of a vehicle impact to a more substantial anchor system. It can be used on
many different gate applications.
d.
Cable Barrier. Cable is fastened to each post with U-clamps at a height of 100
centimeters and is periodically anchored. The cable is typically 2 cm diameter or
larger aircraft cable mounted between chain link fabric and upright posts. The
barrier prevents light vehicles from crashing through a standard chain link fence.
One disadvantage is that the cable can be covertly cut when installed along the
outermost perimeter.
e.
Drum and Cable Barrier. Standard 208 liter drums are filled with dirt, rock or
concrete-weighing about 400 to 550 kilograms-attached by a 2 centimeter aircraft
cable to another drum or fixed object. Requires minimal setup time and expense.
This can be a cost-effective application since empty storage drums, dirt and rock
are readily available.
f.
Dragnet. This consists of a chain link "net" assembly with arresting cables attached
to an energy absorber that is attached to the anchor system. In the open position,
the dragnet is suspended above the access road. When a vehicle hits the dragnet in
the closed (dropped) position, the energy form the impact is transferred through the
arresting cables to an energy absorber that brings the vehicle to a controlled stop.
D-5
SMFM 19-14
g.
Bollard. A bollard is a post made of concrete, stainless steel, aluminum, cast iron,
or other durable material, that creates an aboveground obstacle. Bollards can be
fixed or retractable. At the high end, bollards are constructed to completely stop
most vehicles.
h.
Removable Nuisance Barrier. An 8 centimeter pipe driven into the ground and
fastened with 0.65 centimeter coil chain, is used to channel traffic and create
marked isolation zones around sensitive areas, equipment, and buildings. It can be
set up and removed quickly and easily.
i.
j.
Traffic Control Island with Vehicle Barriers. Standard guard post, with two
automatic gates, a custom base, platform curb assembly with three pass-throughs,
and 16 barrier posts provide protection for security personnel stationed at vehicle
entrance.
k.
l.
Hydraulic Barricade. Upon major impact, the lifting mechanism absorbs the shock.
In emergency situations, a steel barricade closes off vehicle access in just one
second.
m.
Electronic Barrier Gate. Chain link gates and turnstiles used for vehicle and
personnel entrances, electronic barrier gates may be activated by remote switch,
numerical code, or card reader.
n.
o.
D-6
SMFM 19-14
more likely to maintain control of their vehicle. These devices are most effective
against light vehicles with standard 2 centimeter thick rubber tires.
D-7
SMFM 19-14
D-8