Security Surveys and Inspections

download Security Surveys and Inspections

of 30

Transcript of Security Surveys and Inspections

  • SECURITY SURVEYS AND INSPECTIONS

  • SCOPE OF PRESENTATIONDefinition of TermsComparison of Security Survey and Security InspectionsAuthority for Conducting Surveys & Inspections.The Security Survey.Report of Security SurveyTechnical Security SurveysThe Security InspectionSummary

  • DEFINITION OF TERMSSecurity Survey - is a counterintelligence service to assist commanders in determining the security measures required to protect key installations from possible sabotage, espionage, subversion, and unauthorized disclosure of, or access to, classified defense information or material contained therein.Security Inspection - is a counterintelligence service performed to determine compliance with established security policies and procedures.

  • Comparison between Security Survey & Security InspectionsSecurity Survey:A counterintelligence function.Complete, detailed study of existing security measures.Conducted to determine the level of security required consistent with the mission.Security Inspection:A counterintelligence function.Complete or limited check of the security policies of an organization.Conducted to determine the degree of compliance with directed security procedures.

  • Authority for Conducting Surveys and InspectionsRequested by an installation or activity commander or directed by higher headquarters.The commander's request.By direction.Information copy of directive sent to organization to be surveyed.Command preparation.Command responsible for establishing own security.

  • Conduct of Security SurveyWhen requested or directed.Activation of an organization or installation.Reactivation of an organization or installation.Substantial change in the mission, number of person, structures, or real estate of the installation.Indications of laxity in a security program.When no record exists of a prior survey having been conducted.

  • Preliminary Planning by Survey AgentAppointment for initial briefing.Selection of Survey Team Personnel.The agent-in-charge.Local agency checks.Counterintelligence unit file checks.Check List.

  • Appointment for Initial BriefingFacilitated through the security officer of the installation.Contact made by telephone, correspon-dence, or personal visit to the installation.

  • Selection of Survey Team PersonnelSpecialist in security.Must have a good knowledge of security regulations.Must have a working knowledge in the fields of:LocksElectronicsPhotographyanti-intrusion devices.

  • The Agent-In-ChargeEmbodies all the characteristics of an experienced security survey agent.Keeps free of routing duties during the survey in order to devote full time to proper supervision of survey teams.

  • Local Agency ChecksCheck of available law enforcement and intelligence agencies.Determine identity of personnel or groups having adverse effects on the security of the surveyed installation.

  • Counterintelligence Unit File ChecksReports of prior surveys.Reports of prior inspections.Reports of security violations and complaint investigations.Information concerning the area surrounding the installation.Equipment and logistical support.

  • CHECKLISTGeneral TypeSpecific typeThe initial briefingRole of the installation's Security OfficerEscort personnelPreliminary exterior checkPreliminary interior checkHistory of the unitAnalyzing existing securityFinal briefing

  • The Initial BriefingTime and place previously established.Attendance of commander, staff, and other designated personnel.To be presented to the counterintelligence unit commander or his representative.Purpose and conduct of survey explained.Questions by installation personnel resolved.

  • Role of the Installation's Security OfficerThe commander's coordinator.Survey schedule established by SO and agent.Coordinates appointments with key personnel.

  • Analyzing Existing SecurityPhysical securityPerimeter barriersGuards and guard systemsPersonnel identification and controlVehicular identification and controlAnti-intrusion alarm systemUtilities

  • Analyzing Existing SecuritySecurity of PersonnelData concerning key personnelClearance programSecurity education programAbsentee rate, and labor turn-overMorale

  • Analyzing Existing SecuritySecurity of InformationClassification of defense informationReceipting, storage, internal distribution, preparation, marking, reproduction, regrading, transmission, normal destruction, emergency destruction & evacuation of classified material.

  • The Final BriefingOral report to the commanderResults of survey explainedRecommendation offered and discussedThe interim recommendations rendered and implemented during the survey are also discussed.

  • Report of Security SurveyA.Body of report may be arranged in following format.1. Introduction2. Authority for the survey3. Date and hours survey conducted4. Identification of the surveying agent(s)5. Identification of the installation commander's representative.B.Name and Mission of Installation/Activity1. Designation of surveyed unit.2. Description of the mission.3. Surveyed unit's command and intelligence relationship to the major command.

  • C.Physical security1. Perimeter barriers2. Guards and guard systems3. Personnel identification and control4. Vehicular identification and control5. Anti-intrusion alarm system6. Fire fighting facilities7. Communication facilities8. UtilitiesD.Security of personnel1. Data concerning key personnel2. Clearance program3. Security education program4. Absentee rate and labor turn-over5. Morale

  • E.Security of information1. Classification of defense information, receipting, storage, internal distribution, destruction, emergency destruction and evacuation of classified material.2.Recommendationa. Written concise, positive manner b. There should be several basis for recommendations. (1)Facts developed during the survey. (2)Current established security measures. (3)There should be competent interpretation of established security measures. (4)Common sense approach to security problems.

  • 3. Agent is not limited to the number of recommendations.4.Exhibitsa. Utilized to support the basic report of survey.b. Especially useful when technical terminology must be included in the report.

  • Technical Security SurveysRequested by installation or activity commander or directed by higher headquarters.Scope of the technical surveyInspected to insure that offices, conference rooms, war rooms, and other similar locations where classified information is discussed, are free to monitoring systems.Searches for unauthorized modifications of equipment normally present in the area.Searches for clandestine technical penetration equipment and an examination to detect the presence of devices which may allow an unauthorized transmission or recording of any conversation or surveillance of any activity occurring within the area under search.

  • Report of Technical SurveyReport may be arranged in two general sections.Identification of surveyed unit, identification of technical survey personnel, authority for conducting survey and dates conducted.Factors. Situational and technical, which limit or affects the result of the technical survey, recommendation for necessary corrective action.

  • THE SECURITY INSPECTIONConducted on a recurring schedule or as a follow-up to a security survey.Preliminary planning method of conduct essentially the same as those required for security surveys.May or may not be personal contact between the installation to be inspected and an official of the counterintelligence unit.A security inspection does not normally include the history, mission, or establishment of the unit's sensitivity.Check list of deficiencies observed during previous inspection prepared.

  • Scope of Security InspectionCheck of all entrances and exists.Check of guards and duty personnel.Check for possibility of unauthorized access to installation.Check of clearance records.Check of receipting and handling of classified material.Check for possibility of unauthorized storage of classified material.

  • Types of Security InspectionAnnounced.PurposeNormally conducted on a recurring schedule.Unannounced.PurposeNormally conducted during non-duty hours period.Penetration.PurposeScope must include all facts of security inspection or limited to penetration mission.All three types can be utilized as a separate or in sequence.

  • Summary of PresentationDefinition of TermsComparison of Security Survey and Security InspectionsAuthority for Conducting Surveys & Inspections.The Security Survey.Report of Security SurveyTechnical Security SurveysThe Security InspectionSummary