24.11.2012 Views

MIL-HDBK-1013/1A Design Guidelines for Physical Security of ...

MIL-HDBK-1013/1A Design Guidelines for Physical Security of ...

MIL-HDBK-1013/1A Design Guidelines for Physical Security of ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>MIL</strong>-<strong>HDBK</strong>-<strong>1013</strong>/<strong>1A</strong><br />

appropriate to the assessed threat. In addition, the use <strong>of</strong> fencing to<br />

enclose military installations or to enclose and separate areas within a<br />

military installation should be limited to those conditions requiring<br />

physical security or protection <strong>of</strong> life, except as stipulated <strong>for</strong> family<br />

housing.<br />

2.3 Establishing the <strong>Security</strong> System <strong>Design</strong> Threat<br />

2.3.1 Overview. The "design threat" comprises the specific types <strong>of</strong><br />

attacks and their relative severity levels which could be directed at the<br />

facility and assets during its life cycle. Based on historical patterns and<br />

trends, the general categories, characteristics, and relative severity levels<br />

<strong>of</strong> attacks shown in Table 1 have been compiled <strong>for</strong> use in this handbook.<br />

Which <strong>of</strong> these apply to the facility being designed depends on the types <strong>of</strong><br />

hostile aggressors in the area <strong>of</strong> the facility and their objectives. The<br />

following outlines the major factors one must consider in the selection <strong>of</strong> a<br />

proper design threat.<br />

2.3.2 <strong>Design</strong> Threat. A clear distinction must be maintained between what<br />

is meant by a "design threat" (as shown in Table 1) and a threat "estimate."<br />

As used here a design threat is inherently concerned with the broad range <strong>of</strong><br />

attack possibilities over the life cycle <strong>of</strong> the facility. A threat estimate<br />

is a more focused prediction <strong>of</strong> the immediately probable. Threat estimates<br />

are essentially short-term predictions <strong>of</strong> the likelihood <strong>of</strong> particular<br />

threats based on recent "intelligence" in<strong>for</strong>mation. They are relatively<br />

important to operational security personnel, particularly security guard<br />

commanders, because they relate to the desired state <strong>of</strong> readiness. Threat<br />

estimates are particularly important in situations where physical security<br />

has not previously been designed into a facility. If physical security has<br />

been properly implemented into a facility to meet an appropriate design<br />

threat, threat estimates are presumed included within the design threat<br />

selected.<br />

The choice <strong>of</strong> design threat must be based upon the assets being<br />

protected. There is as much potential <strong>for</strong> diseconomies by selecting a design<br />

threat that is too severe as there is <strong>for</strong> selecting one that is much too low.<br />

Choice <strong>of</strong> any design threat, particularly a severe one, will almost always<br />

influence the actual threat experience because the threat will respond to the<br />

physical security design, appropriately, in the personnel, equipment,<br />

tactics, and timing selected.<br />

7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!