17
Security of Ammunition Depots MA17 Slide 1

Security of Ammunition Depots MA17 Slide 1. Why Security? Risk Assessment process Physical security systems built in Perimeter security Access

Embed Size (px)

Citation preview

Page 1: Security of Ammunition Depots MA17 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access

Security of Ammunition Depots

MA17 Slide 1

Page 2: Security of Ammunition Depots MA17 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access

Why Security?

Risk Assessment process Physical security systems built in Perimeter security Access controlled at all times Authorised personnel only Trusted, security cleared staff Accompany temporary staff

MA17 Slide 2

Page 3: Security of Ammunition Depots MA17 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access

Security Risk Assessment

Financial value of the contents in a facility Active hazards and frequency

• (eg leakages through espionage, theft or diversion)

Passive hazards and frequency • (eg floods, earthquakes, fires, etc)

Attractiveness indicators for active hazards Vulnerability to espionage, theft or diversion Vulnerability to sabotage or terrorist attack

MA17 Slide 3

Page 4: Security of Ammunition Depots MA17 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access

Attractive to Criminal and Terrorist Organisations (ACTO)

ACTO Item Potential Terrorist Use

MANPADS - Attacks on civil aviation

Detonators - Initiation of Improvised Explosive Devices (IEDs) - Usually strictly controlled on civilian explosives market

Bulk Explosive - Used as main charge for IEDs - More powerful than home-made or commercial explosives

Man-Portable Anti-Tank Missiles - Attacks on VIP vehicles

Hand Grenades - Concealable weapon that can be used in confined spaces

Small Arms Ammunition - Close quarter assassinations

MA17 Slide 4

Page 5: Security of Ammunition Depots MA17 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access

Security Plan

MA17 Slide 5

Page 6: Security of Ammunition Depots MA17 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access

Access Control

Keys Combination Locks Entry into storage areas

MA17 Slide 6

Page 7: Security of Ammunition Depots MA17 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access

Keys

MA17 Slide 7

Page 8: Security of Ammunition Depots MA17 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access

Combination Locks

MA17 Slide 8

Page 9: Security of Ammunition Depots MA17 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access

Entry into Storage Areas

MA17 Slide 9

Page 10: Security of Ammunition Depots MA17 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access

Locks, Doors, Windows and Grills

MA17 Slide 10

Page 11: Security of Ammunition Depots MA17 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access

Locks, Doors, Windows and Grills

MA17 Slide 11

Page 12: Security of Ammunition Depots MA17 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access

Locks, Doors, Windows and Grills

MA17 Slide 12

Page 13: Security of Ammunition Depots MA17 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access

Staff Vetting

Attributes of Staff:

• Not have criminal convictions and be unlikely to possess criminal tendencies

• Be trained effectively• Be likely to remain loyal, well motivated and

appropriately rewarded

MA17 Slide 13

Page 14: Security of Ammunition Depots MA17 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access

Staff Vetting

Elements of Vetting:

• Confirming an individual’s identity • Looking at associations that may cause a conflict of

interest• Determining vulnerabilities in an individual’s life

through which improper pressure could be applied

MA17 Slide 14

Page 15: Security of Ammunition Depots MA17 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access

Diversion Risk

MA17 Slide 15

Page 16: Security of Ammunition Depots MA17 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access

Worked Example

Remember – we are trying to reduce risk

to tolerable and ALARP

StartStart

Definition of intended use and reasonably

foreseen misuse

Definition of intended use and reasonably

foreseen misuse

Hazard IdentificationHazard Identification

Risk EstimationRisk Estimation

Risk EvaluationRisk Evaluation

Is tolerable risk

achieved?

Is tolerable risk

achieved?

StopStop

Risk Reduction

Risk Reduction

Ris

k A

naly

sis

Ris

k A

sses

smen

t

YESNO

MA17 Slide 16

Page 17: Security of Ammunition Depots MA17 Slide 1. Why Security?  Risk Assessment process  Physical security systems built in  Perimeter security  Access

Questions?

MA17 Slide 17