25.02.2013 Views

AFI 11-2C-130v3 - BITS

AFI 11-2C-130v3 - BITS

AFI 11-2C-130v3 - BITS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>11</strong>2 <strong>AFI</strong><strong>11</strong>-<strong>2C</strong>-130V3 23 APRIL 2012<br />

Chapter 7<br />

AIRCRAFT SECURITY<br />

7.1. General. This chapter provides guidance on aircraft security and preventing and resisting<br />

aircraft piracy (hijacking) of the C-130 aircraft. <strong>AFI</strong> 13-207, Preventing and Resisting Aircraft<br />

Piracy (Hijacking), <strong>AFI</strong> 31-101, Integrated Defense (FOUO), and specific MAJCOM security<br />

publications contain additional guidance. Aircrews will not release information concerning<br />

hijacking attempts or identify armed aircrew members or missions to the public.<br />

7.2. Security. The C-130 is a ―Protection Level 3‖ resource. Aircraft security at non-United<br />

States military installations is the responsibility of the controlling agency.<br />

7.3. Integrated Defense. The following security procedures will implement <strong>AFI</strong> 31-101,<br />

requirements for C-130 aircraft:<br />

7.3.1. The aircraft will be parked in an established restricted area and afforded protection<br />

IAW <strong>AFI</strong> 31-101.<br />

7.3.2. When no permanent or established restricted area parking space is available, establish<br />

a temporary restricted area consisting of a raised rope barrier, and post with restricted area<br />

signs. Portable security lighting will be provided during the hours of darkness if sufficient<br />

permanent lighting is not available. Post security forces IAW <strong>AFI</strong> 31-101.<br />

7.3.3. At non-United States military installations, the PIC determines the adequacy of local<br />

security capabilities to provide aircraft security commensurate with this chapter. If he or she<br />

determines security to be inadequate, the aircraft will depart to a station where adequate<br />

security is available.<br />

7.3.4. The security force must be made aware of all visits to the aircraft. The security force<br />

POC must be identified to the PIC.<br />

7.3.5. Security support is a continual requirement and is not negated by the presence of<br />

aircrew or ground crewmembers. Security force support terminates only after the aircraft<br />

doors are closed and the aircraft taxis.<br />

7.3.6. Locking and Sealing. Lock or seal the aircraft during a ―Remain Over Night‖ (RON)<br />

on non-secure ramps (see paragraph 7.6).<br />

7.4. Standby Aircraft Security. Ensure aircraft hatches and doors are secure to show<br />

unauthorized entry. The PIC shall notify the C2 agency the aircraft is sealed and provide them a<br />

means to access the aircraft in an emergency. Annotate the forms with the time the aircraft was<br />

sealed. The C2 Senior Controller may grant access to a sealed aircraft, shall document time of<br />

entry and ensure it remains launch capable. The PIC or designated representative must be<br />

present if access to the aircraft is required and will ensure the aircraft is resealed. The aircrew<br />

pre-preflight portion will remain valid if performed by one aircrew, sealed, and flown by another<br />

aircrew. NOTE: WG/CCs should develop local procedures for documentation and management<br />

IAW TO 00-20-1 Aerospace Equipment Maintenance Inspection, Documentation, Policies, and<br />

Prodedures and MAJCOM Supplement.<br />

7.5. Enroute Security. The planning agency must coordinate with the execution agency to<br />

ensure adequate enroute security is available. The PIC will receive a threat assessment and

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!