Quantcast Controlling personnel movement

Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search
 
  
 


MIL-HDBK-232A
Natural threats require unique interim protective measures like additional
guard forces.  Examples of natural threats are floods, storms, fog, high
winds, earthquakes, snow and ice, rock or mud slides, and forest fires.  Any
facility prone to these natural threats requires preplanned measurers that
will counteract the adverse impact of various natural threats.
40.2  Human security threats.  Human threats to physical security are the
result of a state of mind, attitude, weakness, or character inconsistency on
the part of one person or a group of persons.  Human threats include covert
or overt acts of commission or omission.  These threats are intended to
disrupt, destroy, or compromise the mission or activities of a facility.
Physical security measures are primarily designed to deter these threats.
Examples of human threats are sabotage, espionage, terrorism, human
intelligence (HUMINT), disaffection, disloyalty, and apathy of personnel.
50.  Planning.  Planning for the physical security of a facility must be
constant, practical, flexible to the, mission, and responsive to the needs of
the facility commander/director.
50.1  Objectives.  Effective physical security planning must be concerned
with, and be designed to, the probability that the most serious incident that
could be perpetrated against the facility will be perpetrated given the
critical nature of the information processed and stored there and the local
threat.  Planning must also take into account the personnel, material, and
equipment available.  Physical security measures should be implemented for
the continuity of all security operations.
60.  Controlling personnel movement.  Perimeter barriers, intrusion detection
devices, and protective lighting provide physical safeguards; however, these
alone are not enough.  A positive personnel movement control mechanism must
be designed and established to facilitate and expedite authorized entry.  It
must preclude unauthorized entry by those who may try to circumvent the
control mechanism.  Planning and designing personnel access control points
for controlling personnel movement through the various restricted areas is a
concern of the facility engineer and physical security specialist during the
facility design.  Personnel security clearances and identification procedures
are a concern once the facility is operational.
60.1  Restricted areas.  In restricted areas, entry is subject to special
control for security reasons.  Restricted areas improve security by providing
in-depth security measures.  These special controls increase efficiency by
providing degrees of security compatible with operational requirements.  The
use of restricted areas makes it possible to have security commensurate with
operational requirements.  Instead of establishing control measures for the
facility as a whole, varying degrees of increasing security provisions can be
provided by designating CONTROLLED, LIMITED, and EXCLUSION areas.  As a
result, interference with overall operations is reduced and operational
efficiency can be maintained in a less-encumbered manner.
NOTE:  The term RESTRICTED AREA is, in effect, a legal designation (Internal
Security Act of 1950), whereas the terms CONTROLLED, LIMITED, and EXCLUSION
are administrative subdivisions of the term that differentiate the degree of
restriction or control required to prevent a compromise of classified
information.
105





 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc.
6230 Stone Rd, Unit Q Port Richey, FL 34668

Phone For Parts Inquiries: (727) 493-0744
Google +