Military Police Risk Analysis For Unclassified Army Resources-Books Pdf

Military Police Risk Analysis for Unclassified Army Resources
06 Dec 2019 | 49 views | 1 downloads | 31 Pages | 688.70 KB

Share Pdf : Military Police Risk Analysis For Unclassified Army Resources

Download and Preview : Military Police Risk Analysis For Unclassified Army Resources

Report CopyRight/DMCA Form For : Military Police Risk Analysis For Unclassified Army Resources



Transcription

SUMMARY of CHANGE, DA PAM 190 51, Risk Analysis for Unclassified Army Resources. This major revision dated 27 June 2019, o Changes the publication title from Risk Analysis for Army Property to Risk Analysis for Unclassified Army. Resources cover, o Updates DA Form 7278 Risk Level Worksheet para 1 7b. o Adds risk analysis for arms ammunition and explosives tables 1 1 and 2 1. o Adds arms ammunition and explosives relative value of arms ammunition and explosives resources table 2 10. o Adjust sum of likelihood rating factors table 3 18. o Provides analysis factors for new resource categories in AR 190 51 including U S Army Corps of Engineers Civil. Works project resources throughout, Headquarters Department of the Army. Department of the Army, Washington DC Pamphlet 190 51.
27 June 2019, Military Police, Risk Analysis for Unclassified Army Resources. analysis can be used to determine the mini field operating agency in the grade of colo. mum level of protection needed to safe nel or the civilian equivalent Activities. guard resources adequately and economi may request a waiver to this regulation by. cally The level of security adopted will be providing justification that includes a full. based upon physical security measures and analysis of the expected benefits and must. procedures contained in AR 190 11 or AR include formal review by the activity s sen. 190 51 ior legal officer All waiver requests will be. endorsed by the commander or senior, Applicability This pamphlet applies to. leader of the requesting activity and for, the Regular Army the Army National. warded through their higher headquarters to, Guard Army National Guard of the United. the policy proponent Refer to AR 25 30, States and the U S Army Reserve unless.
for specific, otherwise stated It also applies to U S. Army contractors using or handling sensi Suggested improvements Users are. tive or nonsensitive unclassified U S Army invited to send comments and suggested. resources This publication applies during improvements on DA Form 2028 Recom. History This publication is a major revi partial and full mobilization and during mended Changes to Publications and Blank. sion contingency operations Forms to Headquarters Department of the. Army Office of the Provost Marshal Gen, Summary This pamphlet presents a risk Proponent and exception authority. eral DAPM MPO PS 2800 Army Pen, analysis method designed to assist com The proponent of this pamphlet is the Prov. tagon Washington DC 20310 2800, manders in meeting local needs and en ost Marshal General The proponent has the. hancing security using available resources authority to approve exceptions or waivers Distribution This pamphlet is available. by use of the U S Army Security Manage to this regulation that are consistent with in electronic media only and is intended for. ment System Countermeasures software controlling law and regulations The propo the Regular Army the Army National. or DA Form 7278 The results of the risk nent may delegate this approval authority Guard Army National Guard of the United. in writing to a division chief within the pro States and the U S Army Reserve. ponent agency or its direct reporting unit or, Contents Listed by paragraph and page number.
Risk Analysis page 1, Introduction page 1, Purpose 1 1 page 1. References and forms 1 2 page 1, Explanation of abbreviations and terms 1 3 page 1. How to use this pamphlet 1 4 page 1, Section II, Risk Analysis page 1. Purpose of risk analysis 1 5 page 1, Risk 1 6 page 1. Risk analysis procedure 1 7 page 2, Recourse Value Determination page 4.
This pamphlet supersedes DA Pam 190 51 dated 30 September 1993. DA PAM 190 51 22 May 2019 i, UNCLASSIFIED, Contents Continued. Measurement of resource value 2 1 page 4, Evaluation procedure 2 2 page 4. Value rating factors 2 3 page 5, Establishing resource value rating 2 4 page 11. Likelihood Determination page 11, Measurement of likelihood 3 1 page 11. Evaluation procedure 3 2 page 11, Likelihood rating factors 3 3 page 14.
Establishing likelihood rating 3 4 page 19, Appendixes. A References page 20, Table List, Table 1 1 Resource categories page 2. Table 1 2 Risk level matrix page 3, Table 2 1 Resource value rating factor table applicability page 5. Table 2 2 Criticality to Army s mission page 5, Table 2 3 Criticality to user s mission page 6. Table 2 4 Resource replaceability page 6, Table 2 5 Relative value of aircraft page 7.
Table 2 6 Relative value of vehicles page 7, Table 2 7 Relative value of petroleum oils and lubricants page 7. Table 2 8 Relative value of other resources page 7. Table 2 9 Relative value of controlled cryptographic items page 8. Table 2 10 Relative Value of arms ammunition and explosives page 8. Table 2 11 U S Army Corps of Engineers page 9, Table 2 12 U S Army Corps of Engineers page 9. Table 2 13 U S Army Corps of Engineers page 9, Table 2 14 U S Army Corps of Engineers page 9. Table 2 15 U S Army Corps of Engineers page 9, Table 2 16 U S Army Corps of Engineers page 10. Table 2 17 U S Army Corps of Engineers page 10, Table 2 18 U S Army Corps of Engineers page 10.
Table 2 19 Resource replaceability for U S Army Corps of Engineers Civil Works project resource page 10. Table 2 20 Resource value rating page 11, Table 3 1 Potential aggressors selection table page 12. Table 3 2 Potential likelihood rating factor table page 13. Table 3 3 Likelihood rating factors page 14, Table 3 4 Usefulness for resources with cash value page 14. Table 3 5 Usefulness for resources with direct application to aggressor s goals page 14. Table 3 6 Usefulness for resources with publicity value page 15. Table 3 7 Resource availability page 15, Table 3 8 Local incidents in the past page 15. Table 3 9 Nearby incidents in the past page 15, Table 3 10 Potential for future incidents page 16. Table 3 11 Accessibility of aircraft and vehicles page 16. Table 3 12 Accessibility of petroleum oils and lubricants and resources in outside storage areas page 17. Table 3 13 Accessibility of other arms ammunition and explosives inside facilities page 17. Table 3 14 Accessibility of resources subject to destruction death or injury page 17. Table 3 15 Effectiveness of law enforcement page 17. Table 3 16 Deterrence for aircraft vehicles petroleum oils and lubricants and resources in outside storage page 18. Table 3 17 Deterrence for resources stored inside facilities page 18. ii DA PAM 190 51 22 May 2019, Contents Continued, Table 3 18 Likelihood rating page 19.
Figure List, Figure 1 1 Resource value determination page 4. DA PAM 190 51 22 May 2019 iii, Risk Analysis, Introduction. 1 1 Purpose, This pamphlet provides guidance for conducting risk analysis for the Army resources listed within The risk analysis pro. cedure supports the local commander in meeting the responsibility of protecting resources against criminal and terrorist. threats in a cost effective manner It is designed to help security specialists carry out their responsibilities in support of the. local commander It also provides a basis for developing the information required by engineers to provide comprehensive. protection for resources based on security engineering principles. 1 2 References and forms, See appendix A, 1 3 Explanation of abbreviations and terms. See the glossary, 1 4 How to use this pamphlet, a Establish risk levels for each resource requiring protection Refer to the instructions in section II of this chapter and.
the risk factor evaluation tables in chapters 2 and 3 to evaluate risk levels. b Refer to AR 190 51 for other resources to determine the appropriate minimum levels of security to implement for. the resource to be protected based on the risk level for that resource. Section II, Risk Analysis, 1 5 Purpose of risk analysis. Not all Army resources at all locations require the same degree of protection Protection of resources must be based on a. realistic assessment of the risks associated with the criminal and terrorist threats likely to be directed at the resources in. their actual locations Performing risk analysis for resources allows commanders to establish resource protection appropri. ate for their value and the likelihood of an attempt to compromise them The risk analysis allows the commander to prior. itize resources so that physical security resources can be applied in the most efficient and cost effective manner possible. The commander should ensure insider threat is included in the threat analysis Risk analysis also provides the supporting. facilities engineering organization with the information required to develop design criteria for construction or equipment. installation to provide comprehensive security for a resource. Risk indicates both the impact of the compromise of a resource and the potential for it being compromised Risk is asso. ciated with individual resources and with different types of aggressors. a Resources Risk concerns resources rather than facilities Facilities are not normally the targets of aggressors and. they should not be the focus of security Facilities contain security elements for the benefit of resources housed within the. facility Security should be based upon protecting the resources in the facilities The risk analysis procedure in this pam. phlet applies to all of the resource types listed in AR 190 51 and AR 190 11 where it is noted that risk analysis is required. It can also be applied to resource types that are not listed but which may warrant protection. b Components of risk Risk is composed of the two factors of resource value and likelihood of aggressor activity. 1 Resource value This risk factor indicates the value or importance of the resource to its user and to the Army The. risk level increases with increasing resource value in this risk analysis model Chapter 3 addresses resource value in more. 2 Likelihood This factor indicates the attractiveness of the resource to the aggressor and the likelihood that an ag. gressor will attempt to compromise the resource based on its attractiveness Risk increases with increasing likelihood of. aggression Chapter3 addresses likelihood in more detail. DA PAM 190 51 22 May 2019 1, c Aggressors The risk analysis procedure in this pamphlet considers criminals protesters and terrorists as potential. aggressors against Army resources A risk analysis must consider each potential aggressor category likely to be interested. in a resource separately The different aggressor categories and the different groups of aggressors within each category are. necessary for developing the threat definition used by security specialists and engineers to compensate for or design for. comprehensive security for resources In the threat analysis developed from elements of this risk analysis different tactics. weapons tools and explosives are assigned to each aggressor type Risk levels are established only for the broad categories. of criminals and terrorists in this risk analysis For this analysis protesters are divided into vandals activists and extremist. protesters which are incorporated into the categories of criminals and terrorists defined below. 1 Criminals Criminals are divided into unsophisticated criminals sophisticated criminals and organized criminal. groups for this analysis Vandals activists are included under the category of criminals. 2 Terrorists For this analysis terrorists are divided into those based in the continental United States based outside. the continental United States and state sponsored terrorists also based outside the continental United States Extremist. protesters and active shooters are also included under the category of terrorists. 3 Spies and Saboteurs Planning against these types of aggressors is not included because planning for the other. aggressor types is sufficient, 4 Insider threat The threat that an insider will use his or her access wittingly or unwittingly to do harm to the. security of the United States This threat can include damage to the United States through espionage terrorism active. shooter unauthorized disclosure of national security information or through loss or degradation of departmental resources. or capabilities, 1 7 Risk analysis procedure, The following procedure will be applied to all Army resources being considered for protection including those in existing. facilities and those in facilities yet to be constructed or under major renovation. a The risk analysis for resources to be located in new or renovated facilities will be performed during the planning. stages of the projects Including required security features during initial facility planning will result in long term cost. savings and improved security system integration, b Consult with operations and intelligence personnel operation security personnel the provost marshal or director of.
emergency services the facility engineer local State and Federal law enforcement as necessary and the users of the. resources being analyzed as necessary in performing this analysis. 1 Step 1 Identify the unit or organization owning the resource and the area in which the resource is located Enter. this information in the spaces provided on DA Form 7278 Risk Level Worksheet. 2 Step 2 Identify the resource for which the analysis is being performed Enter the category of the resource from. table 1 1 and enter a brief description to further identify it If the identified resource does not fall with. manders in meeting local needs and en hancing security using available resources by use of the U S Army Security Manage ment System Countermeasures software or DA Form 7278 The results of the risk analysis can be used to determine the mini mum level of protection needed to safe guard resources adequately and economi cally The level of

Related Books

H TEL DES VENTES DE COULOMMIERS

H TEL DES VENTES DE COULOMMIERS

BENTLEY TURBO R 1994 BENTLEY S3 BMW 520 E12 750 IAL V12 E32 BMW S rie 840 E31 CADILLAC Coup 1961 S rie 62 CITROEN Traction 11BL 1955 CITROEN 2 CV AZ 1964 CITROEN CX Prestige et GTI BX GTI CORVETTE Stingray V8 Big Block 454 Cabriolet 1973 DAIMLER XJ40 VIPER RT10 FIAT Coup 2300 Sport Abarth1964 JAGUAR Type E Cabriolet et coup V12 2 2 JAGUAR XJS V12 Coup et Cabriolet

Constructing refugeeness Exploring mediated discourses

Constructing refugeeness Exploring mediated discourses

Refugees welcome Exploring mediated discourses of hospitality and refugee representation in New Zealand Natalie Slade n slade massey ac nz Overview Introduction Research outline Refugee representation and the media New Zealand media analysis Conclusion References 2 Introduction World facing biggest refugee crisis since WWII UNHCR 2016 Myth and misinformation

Exploring discourses of decarbonisation The social

Exploring discourses of decarbonisation The social

discourse and thematic analysis to explore low carbon housing discourse investigating the policy media expert and public representations in turn Rooted in Ecological modernisation low carbon housing discourse is shown to adopt a techno economic approach to reducing carbon emissions from housing an approach

LINEAMIENTOS DE OPERACI N DEL SISTEMA NACIONAL DE

LINEAMIENTOS DE OPERACI N DEL SISTEMA NACIONAL DE

las academias locales estatales y nacional de los componentes de formaci n b sica proped utica y profesional campos disciplinares y sectores a fin de homogeneizar y sistematizar su operaci n y con ello elevar la calidad acad mica de la instituci n en el marco de la Reforma Integral de la Educaci n Media Superior LINEAMIENTOS DE OPERACI N DEL SISTEMA NACIONAL DE ACADEMIAS C digo

Manual de Academias de la d g b SETSE

Manual de Academias de la d g b SETSE

El Manual de Academias orienta y regula el ejercicio del trabajo colegiado con un esp ritu de b squeda de in finitud enel quehacer educativo que implica concebir a la ense anza no como el findel sistema sino como un instrumento complejo perfectible y privilegiado que provoque nuevos aprendizajes en los actores del proceso con el finde promover el desarrollo de competencias docentes a

ACADEMIAS DE DOCENTES

ACADEMIAS DE DOCENTES

Evaluaci n de la operaci n de Academias Nacionales y Estatales Elaborar instrumentos de evaluaci n Sistematizar y analizar la informaci n Realizar propuesta de mejora Gracias por su asistencia y atenci n Rebeca Gonz lez Hern ndez subdir academica dgcft sems gob mx Olga Nelly Gonz lez Cruz depto curricularydocente dgcft sems gob mx Divisi n del Norte 2786 Col Parque San

Reglamento de academias Conalep

Reglamento de academias Conalep

REGLAMENTO DE ACADEMIAS DEL SISTEMA CONALEP 2015 A o del General simo Jos Mar a Morelos y Pav n Direcci n General Secretar a Acad mica Versi n Actualizada al 18 de marzo de 2015 revisi n n mero 00 2 de 24 Calle 16 de Septiembre No 147 Nte Col L zaro C rdenas Metepec Estado de M xico CP 52148 Tel fono 01 722 2 71 08 00 Ext 2791 Fax 2794 M A Candita Victoria Gil

REUNI N NACIONAL DE ACADEMIAS

REUNI N NACIONAL DE ACADEMIAS

NACIONAL DE ACADEMIAS 2015 Direcci n General de Centros de Formaci n para el Trabajo Lineamientos para el funcionamiento de las Academias de Docentes de la DGCFT Octubre 2015 Sustituye Gu a T cnica Normativa para la Planeaci n Integraci n Operaci n y Seguimiento de las Academias Nacionales Estatales o Regionales y de Plantel Noviembre 1998 OBJETIVO Establecer los

THE POWER OF DISCOURSE AND THE DISCOURSE OF POWER

THE POWER OF DISCOURSE AND THE DISCOURSE OF POWER

PURSUING PEACE THROUGH DISCOURSE INTERVENTION Michael Karlberg Abstract Western liberal discourses of power and the social practices associated with them are proving inadequate to the task of creating a peaceful just and sustainable social order Having recognized this progressive scholars and social reformers have begun articulating alternative discourses of power along with alternative

The diciplinay powe of pedicie algoihm a Focaldian pepecie

The diciplinay powe of pedicie algoihm a Focaldian pepecie

The disciplinary power of predictive algorithms a Foucauldian perspective 321 1 3 In Discipline and Punish thisprocessofnormationhasthe followingmeaning

TO THE INDIVIDUAL ORGANIZATION ADDRESSED grades 3 8 and

TO THE INDIVIDUAL ORGANIZATION ADDRESSED grades 3 8 and

TO THE INDIVIDUAL ORGANIZATION ADDRESSED On behalf of the Texas Education Agency T EA Texas private schools which throughout this correspondence also include home schools may participate on a voluntary basis in the secure spring 2019 state assessments These assessments include State of Texas Assessments of Academic Readiness STAAR grades 3 8 and end of course E O C