slide1 n.
Skip this Video
Loading SlideShow in 5 Seconds..
Download Presentation

play fullscreen
1 / 16
Download Presentation
Download Presentation


- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript


    2. 2

    3. 3 CONTROLLED AREA TRAINING OVERVIEW Governing Instructions Definition of a Controlled Area Entry into Your Controlled Area Unauthorized Personnel in Your Area Training Personnel in Your Area Bomb Threat & Emergency Egress Procedures Emergency Response Procedures

    4. 4 CONTROLLED AREA TRAINING GOVERNING INSTRUCTIONS Governed by: AFI 31-101 AND ALCON 31-101 All controlled area monitors should be familiar with these instructions. A hard copy of each is found in the Resource Protection Managers Office

    5. 5 DEFINITION OF A CONTROLLED AREA? CONTROLLED AREA? The designation controlled area carries the same legal and moral restrictions as a physical barrier. Unless physical barriers are specifically required, the actual control may depend entirely on the protection consciousness of the personnel in the designated area.

    6. 6 CONTROLLED AREA DESIGNATION? CONTROLLED AREA DESIGNATION Controlled Areas are approved in writing by the Installation Commander (routed through Chief, Security Forces) Controlled area monitors must develop written OIs to regulate entry and internal circulation control covering: Entry during normal/contingency/emergency conditions Bomb threat procedures Internal Circulation Control Procedures Training requirements and where training is to be documented Any other points as designated by Installation Security Council (ISC) Controlled areas will maintain a current letter designating a primary/alternate monitor. (unit monitors will train all other personnel working in the area)

    7. 7 ENTRY INTO YOUR CONTROLLED AREA ENTRY CONTROL PROCEDURES Keep entrances to a minimum Owner/user control entry to their areas using a commander signed Entry Authority Listing (EAL) unless the installation commander specifically assigns entry control responsibility to another agency. Support Techniques: Personnel recognition, third party authentication, telephone verification, sign/countersign (for emergency entry), cipher locks, or any technique considered appropriate. Sign visitors in using AF Form 1109/Visitor Log and escorted by someone listed on EAL Post controlled area signs in conspicuous and proper places (all entry points and all sides of facility) Challenge any person that at a specific time or place, appears questionable. Challenging procedures will include contacting a supervisor if there is any doubt as to the persons right to be in the area, and promptly requesting security forces assistance if a persons right to be in the area cannot be verified.

    8. 8 HOW TO CONTROL ENTRY HOW TO CONTROL ENTRY An individual approaches your controlled area and requests entry; Do you recognize this person by name? Does this person have valid DOD/AF credentials? Did you receive prior notification of the individual needing to access your area? If not, call appropriate agency to verify their need to enter If so, check the individuals identification credentials Sign the person in on an AF Form 1109 Maintain observation of the individual(s) until they depart the area

    9. 9 UNAUTHORIZED INDIVIDUAL? UNAUTHORIZED INDIVIDUAL? Challenge any individual you do not recognize, appears suspicious and/or refuses to depart the area Immediately call Security Forces at 2400 For exercises contact Security Forces at 2400 Cease all operations and secure all classified material until the perpetrator is removed by Security Forces

    10. 10 TRAINING TRAINING PERSONNEL The RPM will train all primary controlled area monitors initially, then annually. Primary monitors will in-turn train all personnel who work within the controlled area annually and initially when new personnel commence working in the controlled area. This training should be documented using the training confirmation supplied and maintained in your Resource Protection Folder with a copy forwarded to 423 SFS/S3OR.

    11. 11 BOMB THREAT & EMERGENCY EGRESS PROCEDURES BOMB THREAT PROCEDURES Suspicious Package: DO NOT TOUCH! Attempt to immediately find the owner. If the owner cannot be found notify the SFCC by dialling 2400 and provide description of the package and exact location. Immediately evacuate the facility and have everyone meet in a designated area. Make sure everyone in the area is familiar with your local bomb threat procedures. Make sure procedures are in place for emergency egress from your area which may include duress words, routes of escape, meeting points etc.

    12. 12 BOMB THREAT PROCEDURES BOMB THREAT PROCEDURES VIA PHONE: Use the AF Form 440/Bomb Threat Aid (placed next to all phones) Attempt to ask all questions on the 440 to the caller Annotate all detailed information on the 440 including time/date of call, callers sex, accent and approximate age Lastly do not hang up the phone

    13. 13 EMERGENCY ENTRY PROCEDURES EMERGENCY ENTRY PROCEDURES Only allow entry to emergency response personnel if aware of an actual emergency within the area (secure all classified materials) If possible, monitor emergency response personnel while in the area Retrieve the name, unit, and duty phone of the senior emergency response official after all clear has been sounded (for any future follow-up concerns) Lastly, conduct an inventory of all controlled resources upon termination of the emergency response

    14. 14 INTRUSION DETECTION EQUIPMENT (IDE) INTRUSION DETECTION EQUIPMENT The owner/user must test the IDE with the Security Forces quarterly and annotate the test on the alarm test record kept in the Resource Protection Folder. The CAFB Form 51, Entry Authority List (EAL) will be kept continuously updated of any personnel changes and forwarded to 423 SFS/SFOR. During an IDE failure the owner/user will maintain 24 hour security by posting a guard in the area until the alarm system is fixed. Alarm Authentication Letters, held at SFCC must be updated every 180 days or when personnel changes occur.

    15. 15 AND FINALLY! Conclusion Always use personal recognition, DOD/AF credentials, telephone verification, and/or prior notification to allow visitors escorted entry into the controlled area If you find an unauthorized person(s) in your area, immediately attempt to remove them and report the incident to Security Forces by dialing 2400 Dont be fooled by tool belts, uniforms, ID cards etcif in doubt, call the appropriate agency before allowing entry If you can not verify an individuals need to enter your controlled area, DONT let them in.

    16. 16 QUESTIONS? ANY QUESTIONS CONTACT JACQUI IRELAND 423 RESOURCE PROTECTION MANAGER 268 3062 Please now complete and return the training confirmation slip included with this presentation to Jacqui Ireland SFS/S3OR