This Physical Security Handbook is an all-inclusive reference manual for all departments and agencies on physical security. You will discover how the military and government tackle physical security threats, such as; criminals; guerrillas; terrorism; war, as well as natural calamities and man-made disasters. An excellent reference for anyone who wants to get acquainted with plans and systems devised to sustain Homeland Security.
-----------------------------------------------------
This Handbook is a military issued publication detailing best-practices when formulating and*implementing*physical security plans. All sections and practices detailed in this handbook are extremely relevant and effective for the home-reader.

Physical security is a primary-leader task and an inherent part of all operations to protect soldiers, family members, civilians, and resources. This function directly supports the Army’s universal task list.

The approach to developing protective measures for assets should be based on a systematic process resulting in an integrated protective system. The protective system focuses on protecting specific assets against well-defined threats to acceptable levels of protection. Charts and schematics are provided for better comprehension.

The comprehensive chapter on "Design Approach" provides a summary of the basic approaches to protecting assets against threats (the design strategies). Understanding these strategies is critical to being an effective team member in developing protective systems.

Protective barriers are used to define the physical limits of an installation, activity, or area. Barriers restrict, channel, or impede access and are fully integrated to form a continuous obstacle around the installation.

Security lighting allows security personnel to maintain visual-assessment capability during darkness.

An access-control system must be established and maintained to preclude unauthorized entry. Effective access-control procedures prevent the introduction of harmful devices,*material, and components.

Locks are the most acceptable and widely used security devices for protecting facilities, classified materials, and property. Locks must never be considered as a stand-alone method of security.

The security force for an installation or a facility provides the enforcement element in the physical-security program. This force consists of personnel specifically organized, trained, and equipped to protect the command’s physical-security interests.

In-transit security subjects the movement of cargo to different, and frequently, more demanding aspects of physical security. Cargoes may be moved via port, rail, pipeline, or convoy.

Inspections and surveys are valuable tools to a commander’s physical security program. These tools collectively measure and identify the readiness of a commander’s physical-security program.

This manual is a must read for both military personnel and civilians. Don't feel put off by the formal tone of this publication - the knowledge and practices detailed are second to none.

Contents of this essential guide includes:
  • Chapter 1 PHYSICAL-SECURITY CHALLENGES
    • Overview
    • Automated Information Systems
    • OPSEC and the Threat
  • Chapter 2 THE SYSTEMS APPROACH
    • Protective Systems
    • Systems Development
    • The Integrated Protective System
    • Security Threats
  • Chapter 3 DESIGN APPROACH
    • Design Strategies
    • Protective Measures
    • Vehicle Bombs
    • Exterior Attack
    • Standoff Weapons
    • Ballistics
    • Forced Entry
    • Covert Entry and Insider Compromise
    • Surveillance and Eavesdropping
    • Mail and Supply Bombs
    • Chemical and Biological Contamination
  • Chapter 4 PROTECTIVE BARRIERS
    • Overview
    • Fencing
    • Utility Openings
    • Other Perimeter Barriers
    • Security Towers
    • Installation Entrances
    • Warning Signs
    • Other Signs
    • Installation Perimeter Roads and Clear Zones
    • Arms-Facility Structural Standards
  • Chapter 5 PHYSICAL-SECURITY LIGHTING
    • Overview
    • Commander’s Responsibility
    • Planning Considerations
    • Principles of Security Lighting
    • Types of Lighting
    • Wiring Systems
    • Maintenance
  • Chapter 6 ELECTRONIC SECURITY SYSTEMS
    • Overview
    • ESS Design Considerations
    • Interior ESS Considerations
    • Exterior ESS Considerations
    • ESS Alarm-Annunciation System
    • ESS Software
    • Interior Intrusion-Detection Sensors
    • Exterior Intrusion-Detection Sensors
    • Electronic Entry Control
    • Application Guidelines
    • Performance Criteria
    • Data Transmission
    • CCTV for Alarm Assessment and Surveillance
  • Chapter 7 ACCESS CONTROL
    • Designated Restricted Areas
    • Employee Screening
    • Identification System
    • Duress Code
    • Access-Control Rosters
    • Methods of Control
    • Security Controls of Packages, Personal Property, and Vehicles
    • Tactical-Environment Considerations
  • Chapter 8 LOCK AND KEY SYSTEMS
    • Installation and Maintenance
    • Types of Locking Devices
  • Chapter 9 SECURITY FORCES
    • Types of Security Forces
    • Authority and Jurisdiction
    • Personnel Selection
    • Security Clearance
    • Organization and Employment of Forces
    • Headquarters and Shelters
    • Execution of Security Activities
    • Training Requirements
    • Supervision
    • Uniforms
    • Vehicles
    • Firearms
    • Communications
    • Miscellaneous Equipment
    • Military Working Dogs
    • Summary
  • Chapter 10 IN-TRANSIT SECURITY
    • In-Port Cargo
    • Rail Cargo
    • Pipeline Cargo
    • Convoy Movement
  • Chapter 11 INSPECTIONS AND SURVEYS
    • Inspections
    • Surveys
  • Appendix A METRIC CONVERSION CHART
  • Appendix B SAMPLE INSTALLATION CRIME-PREVENTION HANDBOOK
    • Section I — Installation Crime-Prevention Programs
      • Crime-Prevention Working Groups
      • Crime-Prevention Officers
      • Crime-Prevention Program Development
      • Training
      • Civilian Crime-Prevention Organizations
    • Section II — Criminal Analysis
      • Sources of Information
      • Individual Criminal Analysis
      • Criminal-Analysis Procedures
      • Criminal-Analysis Summary
    • Section III — Command and Law-Enforcement Countermeasures
      • Crime Hot Lines
      • Crime Prevention Through Environmental Design
      • Specialized Patrol Tactics and Surveillance
      • Publicity Campaigns
      • Residential-Security Surveys
      • Juvenile Crime Prevention
      • Fraud
      • Internal Theft
      • Pilferage
      • Section IV — Army Property at the Local Level
      • Motor Vehicles
      • Consumer Outlets
      • Arson
      • Section V — Community Crime-Prevention Programs
      • Neighborhood Watch Program
      • Operation ID
      • Neighborhood Walks
      • Vigilantism
      • Mobile Patrols
      • Project Lock
    • Section VI — Evaluation
      • Crime-Prevention Programs
      • Crime Rates
      • Measures of Effectiveness
      • Internal Measures
  • Appendix C INTELLIGENCE, COUNTERINTELLIGENCE, AND THREAT
    • Analysis
    • Information Sources
    • Responsibilities of US Government Lead Agencies
    • Information Requirements
    • Threat Analysis and Assessment
    • Determination of the Threat Level
  • Appendix D CRISIS-MANAGEMENT PLAN
  • Appendix E OFFICE SECURITY MEASURES
    • Physical-Security Survey
    • Security-Engineering Assessment
    • Technical Assessment of Responses
    • Physical-Security Enhancement Measures
  • Appendix F PHYSICAL-SECURITY PLAN
    • Annexes
    • Tactical-Environment Considerations
  • Appendix G PERSONAL-PROTECTION MEASURES
    • Personal Protection
    • Working Environment
    • Home Environment
  • Appendix H BOMBS
    • General
    • Concealing Bombs
    • Damage and Casualty Mechanisms
    • Telephonic Threats
    • Evacuation Drills
    • Searching for a Suspected IED
  • Appendix I
  • Appendix J
  • Appendix K
  • GLOSSARY
  • BIBLIOGRAPHY
  • INDEX
подробнее...