Protecting Air Force Security Systems Flashcards
(87 cards)
How is force protection achieved?
Through the successful execution of three related but distinct lines of effort; integrated defense, emergency management and critical infrastructure program
What are the two central areas of change of perspective required in the shift to ID?
First is from resource-based defense poster to a risk based defense pastor second is from compliance base operations to effects base operations
What FP effect should be developed to identify the presence of an object or event if possible military interest ,whether a threat or hazard?
Detect
What are the 3 types of control authority that reside in every organization in the Armed Forces?
Administrative(AFCON), Operational(OPCON), and Tactical(TACON)
What does TACON provide?
Sufficient authority for controlling and directing the application of force or tactical use of combat support assets within the assigned mission or task
What type of fencing is authorized for use in a restricted area?
Type A
For what are elevated barriers used?
To identify restricted areas located on the flight line
What are the 5 basic lighting systems used for restricted areas?
- Entry point
- boundary
- special purpose
- area lighting and very near infrared
- combination
What type of warning signs is acceptable in areas with widespread illiteracy?
Danger or warning signs
Where are SRTs required?
At all installations supporting PL 1,2 or 3 resources
Where can ESRTs operate?
Inside or outside of the restricted area in which they are assigned
What will the RAB issuing authority do if the owner of a lost badge is not located within two weeks?
Destroy the badge
What must be done before a RAB is laminated?
Mark the badge with a locally devised authenticated feature
When using the exchange badge system, what is the ECs next step after confirming an individual is authorized access into a restricted area?
Compares the 1199B with the 1199A maintained within the EC
As an EC what action do you take in the event an individual passes back a wrong countersign when requesting entry into a restricted area?
Take as a sign of duress or hostile nature, can put them at an disadvantage and removing them from restricted area, consider separating individuals as well
What are primary duties of a sentry?
To maintain surveillance over assigned areas, reacting and reporting any unauthorized entry or personnel found in the area
When does a CIS control entry into aircrafts?
When the aircraft is carrying specific PL 1 assets
How are deviations from established security criteria categorized?
Technical, temporary, or permanent deviations and must be applicable to physical security facilities, plans, procedures, equipment, and monitoring standards
How often must the approving authority review all permanent security deviations?
Every year
What form must be used to document security deviations?
AF form 116, request for deviation from security criteria
What does the nuclear roadmap contain?
It contains comprehensive action plans describing the actions required to restore public trust and ensure a credible nuclear deterrence
What does the nuclear roadmap aim to identify?
Common actions that must be standardized to ensure safe, secure and reliable nuclear operations
What is the nuclear weapons security standard?
Is the denial of unauthorized access to nuclear weapons; preventing loss of custody; and preventing to the maximum extent possible radiological contamination caused by unauthorized acts
For what purpose is the nuclear weapons security program design?
- Deny unauthorized access to nuclear weapons
- prevent damage or sabotage to nuclear weapons
- prevent loss of custody of nuclear weapons
- prevent unauthorized nuclear detonation
- prevent to the maximum extent possible radiological contamination caused by unauthorized acts or damage
- ensure weapons are operationally available to the president of the US