Custom Search
|
|
|
||
MIL-HDBK-1013/1A
o
Thermal Tools. Oxyacetylene, electric arc, or oxygen-fed
cutting torch; oxygen lance; power lance; burning bar; and rocket torch.
o
Explosives. Bulk TNT or plastic explosive either by itself or
in combination with a tamper or flyer plate driven by the explosive to create
a hole in a barrier.
The threat severity level applicable to a given facility depends on
the assets in the facility and the relative technical skill, objectives, and
motivation of potential threats. This level is established as part of the
planning process (described in Section 2). Barrier penetration time data are
provided for each threat severity level in par. 5.4 for the minimum
prescribed construction, in par. 5.5 for new construction, and in par. 5.6
for retrofit construction.
5.2.2
Covert Entry. The covert entry threat attempts to enter a facility
or portion of a facility using false credentials, etc. Objectives are
similar to the forced entry tactic above. The aggressor may also attempt to
compromise an intrusion detection and entry control system using stealth or
saturation and deception to carry weapons or explosives into the facility.
The four basic threat severity levels are:
o
Low Level - Personnel.
o
Medium Level - Personnel and contraband.
o
High Level - Personnel, arms, contraband.
o
Very High Level - Personnel, explosives, arms, contraband.
5.3
Integrated Security System Elements for the Building
5.3.1
Overview. The security elements associated with the building to
ensure the effectiveness of an integrated security system design are: (1)
barrier layout and construction to delay the intruder; (2) access control at
points of entry to protect against covert entry threats; (3) intrusion
detection sensors and alarms to detect an attack on or within the facility,
and/or unauthorized insiders after hours; (4) CCTV to assess whether an alarm
is actually a threat; and (5) guards to respond to the location of a real
threat. All these elements are equally important. None of them can be
eliminated or compromised if an effective security system is to be achieved.
Also, without detection, the response force would not be alerted. In
addition, the delay offered by the building components must provide
sufficient time after detection for threat assessment and guard force
response. The following provides a brief overview of each of these critical
system elements referencing appropriate sources for their proper selection.
The focus here is on how these various system elements complement and support
the barrier design, which is the main subject of this handbook and which is
addressed in detail in pars. 5.4, 5.5, and 5.6.
94
|
||