Document

advertisement
DeCA Security 101
By Miguel Torres, Security Programs Manager
What we will cover






Authority for DeCA’s Security Program
Source of Authority
Crime Threats
Terrorism Threats
Security Basics
Issue Hunt
SOURCES OF SECURITY
REQUIREMENTS
Authority to Create a Security Program

DoD 5105.55, Defense Commissary
Agency

Established the DeCA as a DoD Agency

Delegated authority to the DeCA Director to:
 Designate Position Sensitivity for each position within
the Agency; and
 Promulgate the necessary security regulations for the
protection of property and places under the jurisdiction
of the Director, DeCA
DeCA SECURITY PROGRAMS MANAGED BY HS
FORCE PROTECTION
LOSS PREVENTION
ADMINISTRATIVE SECURITY
Antiterrorism (AT)
AT Construction Criteria
AT Planning
AT Training and Exercises
AT Resource Application
AT Program Reviews
Force Protection Condition
Measures
Risk Management
Traveler Security
Counter Intelligence (CI)
Collect & Analyze Threat
Information
Disseminate Threat Information
Critical Infrastructure Protection (CIP)
Infrastructure & Asset Identification
Infrastructure & Asset Prioritization
CIP Threat Dissemination
Chemical, Biological, Radiological,
Nuclear, and high yield Explosives
(CBRNE)
CBRNE Awareness Training
Sheltering Plan
Food Security/Food Defense
Crime Prevention
Crime Prevention Through
Environmental Design (CPTED)
Fraud Prevention
Identity Theft Prevention
Personal Crime Prevention
Physical Security
Access Control
Bomb Threat Management
Closed Circuit Television
(CCTV)
Intrusion Detection Systems
(IDS)
Key, Lock & Seal Control
Security Lighting
Retail Security
Antirobbery Procedures
Counterfeit Currency
Employee Theft
Funds Protection
Internal Controls
Shoplifting Procedures
Information Security
Access & Dissemination
Accountability
Classification Management
Disposal & Destruction of Classified
Emergency Planning
Information Security Training
Safekeeping & Storage
Security Deviations & Compromise
Transmission of Classified Material
Operations Security (OPSEC)
Essential Elements of Critical
Information
Personnel Security
Background Investigations
Continual Monitorship Program
Contractor Adjudications
Foreign Travel Briefings
Security Clearances
Security Education & Motivation
Training
MISCELLANIOUS
DeCA Interest Reports (DIReps)
Contractor Verification System
(CVS)
Why do you kneed to know security?






As a Store Director, you are responsible for your
store!
It protects your people (patrons, employees, etc.)!
It protects your inventory!
It protects your store’s reputation!
It instills confidence in your customers (improves
sales)!
It protects you from personal liability!
Crime Threats

WORKPLACE VIOLENCE





Murder
Kidnapping
Rape
Assault
Product Tampering



Vandalism
Arson
Harassment (Verbal,
Stalking, etc.)
Crime Threats
Theft (Includes Burglary and Robbery)
v
v
v
v
v
v
v
Merchandise
Funds
Equipment
Supplies
Information
Identity
Time
COMMISSARY TERRORISM THREATS
KIDNAPPING
ASSASSINATIONS
HIJACKING
THEFT
CHEMICAL/
BIOLOGICAL
ROBBERIES
BOMBINGS
“There is no better terrorist target than a DoD
Dependent School, Exchange or Commissary . . .”
BGen. James Dozier
November 3, 1983
Commissary Vulnerabilities
Robberies, burglaries, product diversions
and van hijackings to help finance terrorist
operations. (NPA, Philippines 1975 – 1989)
Assassination and kidnapping of senior
officers or their spouses that may be
shopping or otherwise present within a
commissary.
Random acts of violence such as drive-by
shootings and bombings aimed at
disrupting the quality of life, inciting fear and
publicity. (Ankara Turkey; Ramstein AB, Germany)
Commissary Vulnerabilities, Cont.
Intentional contamination of food products
with chemical or biological agents.
Use of DeCA bound delivery vehicles,
shipping containers or other transportation/
shipping mediums to smuggle contraband,
weapons, or explosives across international
boundaries or onto military installations.
(CDC delivery,
Turkish Boarder, 1993)
Commissary Vulnerabilities, Cont.
As collateral damage resulting from an attack
or event on a host installation.
Use of DeCA affiliation to gain sponsorship
onto otherwise secure military installations for
nefarious activities (to commit espionage,
crime, terrorism, etc).
FOR OFFICIAL USE ONLY
Mitigating Threats



Anticipate the threat.
Plan for the threat.
Construct/Renovate for the threat.



Crime prevention through environmental design
(CPTED)
DoD Minimum Antiterrorism Standards for
Buildings
Train/Exercise for the threat.
Physical Security Basics

PURPOSE. Physical security is primarily
directed at the prevention of losses resulting
from forced or unauthorized entry.

The degree of protection required varies
depending upon location, structural design of
the facility, value of commissary resources,
and periods when the premises are
unmanned or unguarded.
“Security-in-Depth”
Fort Anywhere
Commissary
Off Base “Civilian” Police
Commissary
Fence line
Commissary
Gate Guards
Commissary
Law Enforcement/MP
Patrols
Commissary
Security Patrols
Commissary
Military Working Dogs
Commissary
With All that Security,
Why Do We Have
Losses?
The Insider Threat
Personnel Security Program
Personnel Security Program
Because you never quite
know who your going to
get!
DeCA Security Programs
Personnel Security
Your first opportunity to protect your
accountability from employee theft!
If they stole at their last employer,
what makes you think they
won’t steal from you??
Background Investigations

National Agency Check with Inquiries (NACI)

MINIMUM investigation for ALL Civil Service
Employees working within DoD.




Criminal History Check
FBI Fingerprint Check
Credit Check
Reference/Former Employer/Education Checks

~85% of all losses are due to theft


~48% is cased by employees and other store
workers
~33% is caused by shoplifters
According to the National Crime
Prevention Institute:
10% of store
workers & patrons
will never steal
regardless of the
temptation.
$
10% of employees and patrons
will steal without regard for the
security controls in place.
The key to good security is
knowing that:

80% of store workers & patrons will not
steal from you unless:





They think they wont get caught.
They rationalize that “DeCA owes them.”
They “need” the money/merchandise.
They feel they’re being treated unfairly.
They perceive “Everyone's doing it.”
How does theft happen?




Lax internal controls.
Feeling of “It can’t happen to me!”
Bypassing internal controls for
“convenience.”
Theft is a crime of opportunity!
DeCA Physical Security Programs Include
Physical Security
Access Control
 Anti-Robbery
 CCTV
 Funds Protection
 Internal Security
 Key & Lock Control

Shoplifting Prevention
 Security Lighting

Commissary
Physical Security





Accessible Openings
Access Control
Protective Lighting
Opening and Closing
Procedures
Vendor Stocker
Control





Vendor Control
Visitor Control
Contractor Control
Key, Lock and Seal
Control
Cargo Vehicles

ACCESSIBLE OPENINGS. An accessible
opening is any window, door, vent, etc., which
could be used to gain entry into a facility.
Physical Security
Element

Access Control
Problems Identified





Doors left open and
unmonitored
Badges not used/controlled
Badges not secured
ID’s issued to unauthorized
Persons
Alarmed door IDS warning
signs not used

External Entrance Doors
Intent – All entrance/exit to a Commissary Facility
is monitored and controlled.
After hours, Commissary Employee MUST
authorize/monitor entry/exit of ALL!
 Double-Cylinder Locking Device
 Panic Hardware on designated fire exits
 Intrusion Detection System
Panic Hardware
Element

Internal Security
Problems Identified

Personal Property






Backup storage area
Processing areas
Food & drink not
controlled
Grazing
Sweethearting
Spot-checks
Physical Security
Element

Key & Lock Control
Problems Identified





Keys passed from person to
person
Keys left in locks
Supervisors key left unsecured
Padlocks left with hasp open
Security hardware easily
removed with wrench or
screwdriver
Some strategies to reduce losses



Keep high pilferage
items in “Sensitive
Storage.”
Keep the backup
storage are “clean.”
Locate high pilferage
items in the store in an
area in which they can
be “seen.”




Look for vulnerabilities.
Understand why
people steal.
Spot check receivers.
Be concerned.
Issue Hunt
Sensitive Storage
Area
Sales Floor
Twist on key
rings defeats
purpose of
Electronic
Key boxes
Pin Number Entry Easily
Compromised
Keys left unsecured in door
Call me or any of
our security
specialist if you
need help!
Contact Information








Miguel Torres
Cell Phone 210 382 0893
Fax 210 221 4680
DSN 471 4680
DeCA WEST Security Back Up Staff
Mr. Tony Taylor
Office 916 569 4829
Mr. James Grant
Office 916 569 4820
Download