Documente Academic
Documente Profesional
Documente Cultură
In-Transit Security
In-transit security subjects the movement of cargo to different, and
frequently, more demanding aspects of physical security. Cargoes may be
moved via port, rail, pipeline, or convoy. Regardless of the mode of
movement, commanders must aggressively apply the principles of physical
security to their protection. Security forces must be provided at the most
vulnerable areas of each cargo movement.
IN-PORT CARGO
10-1. Ports and harbors are prime targets for enemy and criminal activities.
Perimeter areas of these facilities are more vulnerable because of the
extensive distance and exposed beach or pier areas. Terminal areas may
include fully developed piers and warehouses or may be an unimproved beach
where logistics-over-the-shore (LOTS) or roll-on/roll-off (RORO) operations
are conducted.
10-2. If a Theater Army Area Command (TAACOM) MP unit must provide
security for cargo in a port, the main effort is to provide security from the
perimeter of the port outward. Security measures focus on aggressive
patrolling to detect, report and, if need be, combat enemy threats. Measures
may include—
• Conducting route and area reconnaissance patrols.
• Developing police intelligence in the area of operations (AO).
• Controlling traffic in the area surrounding the port.
• Conducting mounted or dismounted patrols (with MWDs, if available)
around the port’s perimeter.
• Establishing an access-control/ID section.
• Watching for diversions of supplies out of the port.
• Providing a response force to react to incidents inside the port’s
perimeter.
• Providing observation and early warning of threat ground and air
attacks.
10-3. When providing security for cargo, the focus is on providing a security
overwatch for the cargo as it moves from the port to the combat area. Inside a
port's perimeter, access to cargo is limited by—
• Operating random mounted or dismounted patrols (with MWDs, if
available).
• Using combined patrols as a response force for incidents inside the
perimeter.
this large security zone is not possible. In such cases, other measures (such as
boat patrols) must be increased to mitigate the possibility of attack.
10-9. A reaction zone extends from the high-water mark to a distance beyond
the maximum range of anticipated waterborne threats. Security forces will
stop and challenge intruders inside the reaction zone.
10-10. The keep-out zone is the zone closest to the protected assets. It extends
from the asset to the maximum range of anticipated threat weapons. Security
forces should prevent the entry of all unauthorized craft or vessels into this
zone. The tactical response force (in this case, a boat) may be used. In addition
to organic security, forces may be provided by HN or contracted personnel.
10-11. To keep the cargo secured while transferring from one transport
method to another, the traffic moving in and out of cargo-handling areas must
be controlled. MP forces can—
• Set up a single access-control point.
• Erect field-expedient barriers. Truck trailers or other large vehicles
can be used to constrict the traffic flow if permanent barriers are not in
place.
• Limit entry to mission-essential personnel, vehicles, and equipment (as
designated by the port authority).
10-12. A holding area should be provided if gates are used by vehicles other
than cargo vehicles. Cargo vehicles can pull into the holding area while they
are being checked. The holding area should be large enough to handle the
volume and size of traffic. A wooden deck or platform at, or slightly higher
than, the level of the truck bed can be used to facilitate checking. The platform
must be at least as long as the vehicle (such as an empty flatbed trailer). Such
a platform makes it quicker and easier to observe and check cargo.
10-13. Cargo is less likely to be diverted if a close watch is kept on cargo
documentation and container safety. Containerized cargo is less likely to be
stolen or sabotaged. However, containers must be watched closely as they are
filled and sealed. Cargo can be pilfered before the seal is applied. An unsealed
container can be moved to a stacking area; or someone may apply a false seal,
break the seal later, remove the cargo, and then apply a legitimate seal.
10-14. At access-control points—
• Inbound and outbound containers should be inspected. Signs of
damage or unserviceability should be observed.
• Containers must be inspected for the presence of seals or locks and
hinges. Their serviceability should also be checked.
• The document's transport number, container number, and seal number
should be checked to ensure that they match those numbers on the
transportation control-and-movement document. (Check the seals by
handling them, not simply by a visual check.)
• Containers with valid documents only should be allowed to pass
inbound or outbound through the control point.
RAIL CARGO
10-15. Because a train’s movement is determined directly by the condition of
the tracks, cargo moving by rail is particularly vulnerable to attack. The
destruction of switches, signals, or the track may be a delaying harassment; or
it could trigger a major catastrophe. Since railroads can be such high-value
targets, the commander may task MP or other US forces to provide on-board
security for critical cargo.
10-16. Most train crews consist of four or five people who control the train—
the engineer, a conductor, a fireman, a senior brakeman, and a brakeman or a
flagman. The conductor is the train commander unless a transportation
railway service officer is assigned to the train. The train commander is
responsible for the train’s operation and security. He makes all decisions
affecting the train. The security force ’s commander is responsible for the
cargo’s security. The train crew and the security force watch for and report any
discrepancies or interruptions to normal procedures at any time during the
movement. Information about the movement is usually sent along the
movement route by the chief dispatcher through a telephone circuit.
10-17. A four- to six-person security force is usually enough to secure railway
shipments of sensitive freight, but additional security forces may be needed
for moving critical cargo. In addition to a military security force, the shipper
or loading agency may send specially trained personnel with highly sensitive
cargo. The number of MP in a train security force depends on the—
• Sensitivity of the freight.
• Priority of need for the freight.
• Terrain over which the train will pass.
• Length of the train.
• Duration of the trip.
• Degree of threat.
10-18. Security forces prepare and maintain a record (by car number) of
guarded cars in the train. Security forces can ride in—
• A specific car that requires protection.
• The caboose.
• A security-force car. (If only one security car is used, it should be near
the center of the train; if more than one is used, cars should be spaced
to provide the best protection for the train.)
10-19. The security force on a train must keep a constant check on car doors,
seals, wires, and locks to detect tampering. The following instances must be
noted and reported immediately:
• Irregularities in procedures.
• The presence or actions of unauthorized persons.
• Deficiencies or incidents that occur.
10-20. When planning rail-cargo security, the time schedule for the rail
movement must be obtained. A map reconnaissance of the route should be
provided, detailing bridges and tunnels that are especially vulnerable.
10-27. If the security force is relieved by another security force while en route,
a joint inspection of the cars is conducted. The relief force signs the record
being kept on the guarded cars. Consignees assume responsibility for the
security of loaded freight cars at the time they arrive at their destination.
When the trip is complete, the receiver or his agent will inspect the cars. The
security force obtains a receipt for the cars, which is then attached to the trip
report. The trip report should include—
• Dates and times the trip started and ended.
• Any additional information required by the local SOP or command
directive.
• Recommendations for correcting deficiencies or for improving future
security on trains.
10-28. Because unloading points are highly vulnerable to pilferage and
sabotage, cars should be unloaded as soon as possible to reduce the
opportunity for loss. MP forces are normally not available for the security of
freight in railway yards. For more information regarding rail cargo, see FM
55-20.
PIPELINE CARGO
10-29. Pipeline systems are widely used in a theater of operation to transport
bulk petroleum products or other liquids. Such systems are open to a number
of security threats from the point of entry to the point of final delivery.
Pipeline systems are composed of storage and dispersing facilities, pump
stations, and extended pipelines. They also include discharging facilities for
tankers at ports or other water terminals.
10-30. The type and extent of risk to a pipeline varies with the level of conflict
in the AO. In a communications zone, the chief hazard is likely to be pilferage.
Pipelines can be tapped by loosening the flange bolts that join sections of pipe
or by cutting holes in the hose line. The risk rises if gasoline is scarce and
expensive on the civilian market. Sabotage is a security hazard during all
levels of conflict. It is committed by any method such as simply opening pipe
flanges, cutting a hose line, or setting fires and causing explosions to destroy
portions of the line.
10-31. In areas of conflict, the likelihood of sabotage and interdiction
increases. Pipeline systems are vulnerable to air attacks, especially
aboveground sections of the pipeline, pump stations, and storage facilities.
10-32. Security forces should be deployed in the best manner to provide
coverage to the most vulnerable portions of the pipeline that are at the
greatest risk to enemy, terrorist, partisan, and ground attack. Patrols should
be set up to screen isolated areas and remote pumping stations. Sensors
should also be considered, along with aerial security. Security patrols will—
• Detect, report, and respond to attacks on or sabotages of the pipeline.
• Monitor critical parts of the pipeline on a routine but random basis.
• Monitor ground sensors and other intrusion-detection devices. These
are often used at pump stations and elsewhere along the pipeline to
detect and identify threats to the system.
CONVOY MOVEMENT
10-34. As convoy movements are tactical in nature and are discussed in detail
in FM 19-4, they will be briefly discussed here. When moving by convoy,
consideration should be made for the following:
• Congested traffic areas.
• Travel during night hours when traffic is reduced rather than travel
during daylight hours when traffic congestion is heaviest.
• National holidays. Traffic may be three times heavier than on a normal
day. Also, if you are moving a convoy overseas on a national holiday, the
HN people may not be receptive to your action and the result may be
unwanted reactions on their part.
• The use of a marked HN police vehicle in conjunction with the convoy.
The HN people are more receptive to an activity when it is represented
by one of their own. Additionally, the HN police may be able to diffuse a
potential crisis.
• Security of the convoy. Security of the convoy is foremost important
both during movement and stops. During extended or overnight stops,
special consideration must be given to securing the loaded vehicles.