1 / 77

DeCA Security 101 By Miguel Torres, Security Programs Manager

DeCA Security 101 By Miguel Torres, Security Programs Manager. What we will cover. Authority for DeCA’s Security Program Source of Authority Crime Threats Terrorism Threats Security Basics Issue Hunt. SOURCES OF SECURITY REQUIREMENTS. Authority to Create a Security Program.

kerib
Download Presentation

DeCA Security 101 By Miguel Torres, Security Programs Manager

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DeCA Security 101 By Miguel Torres, Security Programs Manager

  2. What we will cover • Authority for DeCA’s Security Program • Source of Authority • Crime Threats • Terrorism Threats • Security Basics • Issue Hunt

  3. SOURCES OF SECURITY REQUIREMENTS

  4. Authority to Create a Security Program • DoD 5105.55, Defense Commissary Agency • Established the DeCA as a DoD Agency • Delegated authority to the DeCA Director to: • Designate Position Sensitivity for each position within the Agency; and • Promulgate the necessary security regulations for the protection of property and places under the jurisdiction of the Director, DeCA

  5. Why do you kneed to know security? • As a Store Director, you are responsible for your store! • It protects your people (patrons, employees, etc.)! • It protects your inventory! • It protects your store’s reputation! • It instills confidence in your customers (improves sales)! • It protects you from personal liability!

  6. WORKPLACE VIOLENCE Murder Kidnapping Rape Assault Product Tampering Vandalism Arson Harassment (Verbal, Stalking, etc.) Crime Threats

  7. Crime Threats • Theft (Includes Burglary and Robbery) • Merchandise • Funds • Equipment • Supplies • Information • Identity • Time

  8. COMMISSARY TERRORISM THREATS ASSASSINATIONS KIDNAPPING HIJACKING THEFT ROBBERIES CHEMICAL/ BIOLOGICAL BOMBINGS

  9. “There is no better terrorist target than a DoD Dependent School, Exchange or Commissary . . .” BGen. James Dozier November 3, 1983

  10. Commissary Vulnerabilities • Robberies, burglaries, product diversions and van hijackings to help finance terrorist operations. (NPA, Philippines 1975 – 1989) • Assassination and kidnapping of senior officers or their spouses that may be shopping or otherwise present within a commissary. • Random acts of violence such as drive-by shootings and bombings aimed at disrupting the quality of life, inciting fear and publicity. (Ankara Turkey; Ramstein AB, Germany)

  11. Commissary Vulnerabilities, Cont. • Intentional contamination of food products with chemical or biological agents. • Use of DeCA bound delivery vehicles, shipping containers or other transportation/ shipping mediums to smuggle contraband, weapons, or explosives across international boundaries or onto military installations. (CDC delivery, Turkish Boarder, 1993)

  12. Commissary Vulnerabilities, Cont. • As collateral damage resulting from an attack or event on a host installation. • Use of DeCA affiliation to gain sponsorship onto otherwise secure military installations for nefarious activities (to commit espionage, crime, terrorism, etc).

  13. FOR OFFICIAL USE ONLY

  14. Mitigating Threats • Anticipate the threat. • Plan for the threat. • Construct/Renovate for the threat. • Crime prevention through environmental design (CPTED) • DoD Minimum Antiterrorism Standards for Buildings • Train/Exercise for the threat.

  15. Physical Security Basics • PURPOSE.  Physical security is primarily directed at the prevention of losses resulting from forced or unauthorized entry. • The degree of protection required varies depending upon location, structural design of the facility, value of commissary resources, and periods when the premises are unmanned or unguarded.

  16. “Security-in-Depth”

  17. Fort Anywhere

  18. Off Base “Civilian” Police

  19. Fence line

  20. Gate Guards

  21. Law Enforcement/MP Patrols

  22. Security Patrols

  23. Military Working Dogs

  24. With All that Security, Why Do We Have Losses?

  25. The Insider Threat

  26. Personnel Security Program

  27. Personnel Security Program Because you never quite know who your going to get!

  28. DeCA Security Programs • Personnel Security • Your first opportunity to protect your accountability from employee theft! • If they stole at their last employer, • what makes you think they • won’t steal from you??

  29. Background Investigations • National Agency Check with Inquiries (NACI) • MINIMUM investigation for ALL Civil Service Employees working within DoD. • Criminal History Check • FBI Fingerprint Check • Credit Check • Reference/Former Employer/Education Checks

  30. ~85% of all losses are due to theft • ~48% is cased by employees and other store workers • ~33% is caused by shoplifters

  31. According to the National Crime Prevention Institute: 10% of store workers & patrons will never steal regardless of the temptation. $

  32. 10% of employees and patrons will steal without regard for the security controls in place.

  33. The key to good security is knowing that: • 80% of store workers & patrons will not steal from you unless: • They think they wont get caught. • They rationalize that “DeCA owes them.” • They “need” the money/merchandise. • They feel they’re being treated unfairly. • They perceive “Everyone's doing it.”

  34. How does theft happen? • Lax internal controls. • Feeling of “It can’t happen to me!” • Bypassing internal controls for “convenience.” • Theft is a crime of opportunity!

  35. Physical Security Access Control Anti-Robbery CCTV Funds Protection Internal Security Key & Lock Control Shoplifting Prevention Security Lighting Commissary DeCA Physical Security Programs Include

  36. Accessible Openings Access Control Protective Lighting Opening and Closing Procedures Vendor Stocker Control Vendor Control Visitor Control Contractor Control Key, Lock and Seal Control Cargo Vehicles Physical Security

  37. ACCESSIBLE OPENINGS.  An accessible opening is any window, door, vent, etc., which could be used to gain entry into a facility.

  38. Element Access Control Problems Identified Doors left open and unmonitored Badges not used/controlled Badges not secured ID’s issued to unauthorized Persons Alarmed door IDS warning signs not used Physical Security

  39. External Entrance Doors Intent – All entrance/exit to a Commissary Facility is monitored and controlled. After hours, Commissary Employee MUST authorize/monitor entry/exit of ALL! • Double-Cylinder Locking Device • Panic Hardware on designated fire exits • Intrusion Detection System

  40. Panic Hardware

  41. Element • Internal Security Problems Identified • Personal Property • Backup storage area • Processing areas • Food & drink not controlled • Grazing • Sweethearting • Spot-checks

  42. Physical Security Element • Key & Lock Control Problems Identified • Keys passed from person to person • Keys left in locks • Supervisors key left unsecured • Padlocks left with hasp open • Security hardware easily removed with wrench or screwdriver

  43. Keep high pilferage items in “Sensitive Storage.” Keep the backup storage are “clean.” Locate high pilferage items in the store in an area in which they can be “seen.” Look for vulnerabilities. Understand why people steal. Spot check receivers. Be concerned. Some strategies to reduce losses

  44. Issue Hunt

  45. Sensitive Storage Area Sales Floor

  46. Twist on key rings defeats purpose of Electronic Key boxes

More Related