D

Physical Security and Force Protection Program

Physical Security and Force Protection Program (COMDTINST M5530.1C)

Commandant Change Note 5530 (August 10, 2016)

  • Purpose: Publishes changes to the Physical Security and Force Protection Manual, COMDTINST M5530.1C.

  • Action: Compliance required by all Coast Guard unit commanders, commanding officers, officers-in-charge, deputy/assistant commandants, and chiefs of headquarters staff elements.

  • Internet Release: Not authorized.

  • Directives Affected: Updates the Physical Security and Force Protection Manual, COMDTINST M5530.1C.

  • Disclaimer: Guidance is not a substitute for legal requirements and provides operational guidance only, not legally-binding requirements.

  • Major Changes:

    • Implementation of requirements for construction and operation of Classified Work Spaces (CWS) and Open Storage Facilities (CWS-OSF) for protecting classified national security information.

    • Strengthening of Information Systems Protection.

    • Summary of Electronic Security Systems; provides an Electronic Security System Standards Technical Specifications Handbook.

    • Removal of the Technical Security Program.

    • Removal of Privately Owned Vehicle (POV) Registration Program and Access Control.

  • Impact Assessment: No personnel, training, or funding increases were generated.

  • Environmental Considerations: Categorically excluded from further environmental analysis under USCG CE #33.

  • Distribution: No paper distribution; electronic version on CGPortal.

  • Procedure: Instructions for removing and replacing specific sections in a paper library.

  • Records Management: No further records scheduling requirements.

  • Forms/Reports: Forms available on USCG Electronic Forms.

  • Request for Changes: Via the chain of command to HQS-DG-lst-DCMS-34@uscg.mil.

Commandant Notice 5530 (March 25, 2004)

  • Purpose: Publishes changes to the Physical Security and Force Protection Program, COMDTINST M5530.1C.

  • Action: Compliance required by Area and District commanders, commanders of maintenance and logistics commands, commanding officers of headquarters units, assistant commandants for directorates, Chief Counsel, and special staff offices at Headquarters.

  • Internet release is not authorized.

  • Summary of Changes: Clarification to assist with implementation of the CG Privately Owned Vehicle (POV) Registration Program and Facility Access Control.

Commandant Instruction M5530.1C (December 17, 2001)

  • Purpose: Provides internal guidance for implementing physical security and force protection policies, standards, and procedures.

  • Action: Compliance required by Area and district commanders, commanders of maintenance and logistics commands, commanding officers of headquarter units, assistant commandants for directorates, Chief Counsel and special staff offices at Headquarters

  • Directives Affected: Supersedes COMDTINST M5530.1B (March 3, 1999).

  • Discussion: This manual governs the Physical Security and Force Protection Program; it includes substantive changes.

    • Applicability to Persons: Applies to all Coast Guard personnel (military and civilian), personnel from other agencies engaged in security activities, and contractor personnel providing security services.

    • Physical security of arms, ammunition, and explosives (AA&E) is extremely important and shall be given priority when implementing the requirements of this manual.

    • Internal Use Only: This manual does not create any right or benefit enforceable at law by a party against the United States.

    • Policy Conflict: Statutes or regulations take precedence, and Commandant (G-CFI) shall be advised of any apparent conflict.

  • Changes: Will be issued as Commandant Notices; time-sensitive amendments by ALCOAST.

  • Request for Changes: Suggestions for improvement are welcome; submit the Publication Change Request (PCR) form through the chain of command and cognizant Security Manager.

  • Forms Availability: Information for obtaining forms identified for use in this manual may be obtained by the following methods:

    • SF 700: Security Container Information Form

    • SF 701: Activity Security Checklist

    • SF702: Security Container Check Sheet

    • CG3308A: Certificate of Compliance - Private Motor Vehicle Registration

    • CG4801: Coast Guard Registration Decal

Chapter 1: Introduction to and Management of the Physical Security Program

  • General: This chapter establishes policy and guidance for managing the Physical Security and Force Protection Program. The commanding officer is ultimately responsible for the security of his or her command, and every individual in the Coast Guard is directly responsible for supporting the overall Coast Guard Security Program and command initiatives to improve their security posture.

  • Responsibilities: The DCMS-34 manages and oversees the overall United States Coast Guard Security Program and monitor and evaluate Information Systems Security and Communications Security.

  • Qualifications and Assignment of Security Personnel: The district SECMGR shall provide support to district units and HQ units geographically located within a district. The area or district SECMGR shall also monitor and oversee all elements of the Coast Guard Security Program.

  • Duties and Responsibilities: District SECMGRs will monitor and oversee HQ units geographically located within their district, and provide advice and guidance when required, to ensure the critical infrastructure of the Coast Guard is adequately protected. The CSO shall promulgate and implement additional security measures for the protection of Coast Guard personnel, assets, and information throughout the unit.

  • Waivers and Exceptions: Blanket waivers from physical security requirements are not authorized. Requests for waivers and extensions shall identify compensatory security measures currently in effect or planned.

  • Physical Security Plans: In order to achieve adequate protection for a unit, a written Physical Security Plan, with an AT/FP annex, shall be developed and shall use security in depth to protect critical assets.

Chapter 2: Physical Protection Measures

  • General: Good security planning works from the inside out (Security In Depth). Start at the point where the critical assets are stored or where the highest level of protection is required.

  • Designation of Restricted Areas: Different areas and tasks involve different degrees of security depending upon the purpose, nature of the work performed within, and information and/or materials concerned.

    • Different types of restricted areas are established: exclusion area, limited area and controlled area.

  • Physical Barriers: Control, deny, impede, delay, and discourage access to restricted and non-restricted areas by unauthorized persons. Physical barriers shall be established around all restricted areas.

  • Fences: Should meet a given standard (fabric, ties, height, post, reinforcement, ground clearance, culvert consideration, placement). In some instances, the temporary nature of a restricted area does not justify the construction of permanent perimeter barriers (temporary barriers).

  • Clear Zones: An unobstructed area shall be maintained on both sides of and between permanent physical barriers of restricted and non-restricted areas.

  • Gates: Number and location shall be consistent with efficient operations and inspection.

  • Doors, Windows, Skylights and Other Openings: They should also have secured coverings depending on size.

  • Protective Lighting: Provide adequate illumination or compensatory measures to discourage or detect illegal attempts to enter restricted areas and to reveal the presence of unauthorized persons within such areas.

    • Types include: continuous, standby, movable, and emergency.

  • Intrusion Detection Systems (IDS): Security support measures that are designed to detect and announce intrusions or attempted intrusions. The system shall report the detection of an intruder, the failure of any critical component of the system, and any attempt to circumvent or defeat the system.

  • Key and Lock Control: Physical security is primarily maintained through the use of locks and locking devices both during and after normal working hours. Without strict control of keys and proper hardware, locks provide nothing more than a false sense of security and put unit assets and personnel at risk.
    *Grand Master Keys should be protected as high value government property ( SF-700).
    *Operating keys to security areas should not be removed from the premise.
    Master Key System consists of several levels, each of which can open the levels below it. Proper planning is a must.The loss of either key requires the rekeying of every lock in its system.

  • Loss of Keys: In the event of lost, misplaced or stolen keys, all locks that the key could operate must be replaced or rekeyed immediately.

  • Security Containers: Containers should be located in a locked room where reasonable security measures can be effectively implemented. If visible to the exterior of the facility where host installation police or security patrols pass, the container shall be illuminated.

  • Combinations to must be changed.SF 700, Form, shall be used to record combinations.

  • Control: visitor's bill shall be promulgated and include, as a minimum, procedures for identifying visitors, the purpose of their visit, and the control of movement on the unit.

  • Visitors - Report shall be forwarded to DCMS-34, via the cognizant SECMGR.

  • Computer and Network Physical Security: Physical protection of hardware, media, and other Information Systems (IS) resources is an integral part of overall organization security.

Chapter 3: Physical Security of Arms, Ammunition and Explosives (AA&E)

  • Purpose: Establishes uniform policies and standards for the physical security protection of sensitive conventional AA&E during their life cycle.

  • Discussion: The likelihood that thefts and unaccountable losses of AA&E will jeopardize the safety of personnel and cause damage/destruction demands that personnel judiciously comply with this chapter and apply sufficient personnel and funds to assure the development and maintenance of an adequate security posture. Compliance shall be an integral part of the overall unit Physical Security Plan.
    *All AE&E personnel should be screened for reliability and inventory kept on said AE&E.
    *The design and application of an IDS for AA&E protection is related to the risk category of the AA&E being stored, the location of the storage structures and the hardness of the structures.

  • Accountability: Ordnance Manual establishes accountability and inventory requirements, including procedures for reporting missing, lost or stolen AA&E.

  • Access Control: Removeal should be premitted with sufficient personnel and the vehicle or transport they are to be carried in is identified.

  • Key Control: The AA&E key control officer shall be designated in writing by the commanding officer.
    Completed AA&E key control registers shall be maintained and 24 hour positive control of said keys. Each command will maintain a complete register of keys, both issued and non-issued, by which to account for and conduct inventories from.

  • Intrusion Detection Systems (IDS): Security telephone systems should be installed between alarm control centers and alarmed zones to provide for controlled entry by authorized personnel during working hours and as an additional mode for communications during non-working hours.

  • Security and Police Forces: A security and police force response to IDS alarms shall have an objective response time must take into account the safety of unit personnel

  • Fencing:The requirement for fencing of AA&E storage areas shall be determined on an individual case by case basis, by the criteria herein and by site surveys

  • Lighting:Protective lighting shall be provided at all exterior doors of AA&E storage areas. Exterior lights shall be positioned so that identification may be made of personnel requesting entry while not impairing the vision of the occupant of the area.

  • Arms Storage Requirements: Weapon must be stored only in dedicated AE&E locations in GSA approved contrainers. Units not able to meet the requirements may store their AA&E at sites owned or managed by other government agencies or local police departments, subject to a receipt for the items. Coast Guard owned weapons and ammunition may be stored in private residences, subject to these provisions: should be stored out of plain sight, preferably in a locked interior closet or cabinet.

    • Ammunition and Explosives (A&E) Storage Requirements.Ready service ammunition shall be stored in either an armory, a Class 5 GSA approved weapons container within a weapons space or in approved magazines.

  • Armory Construction Specifications. Walls shall consist of 8 inches of concrete or Ceiling of 6 reinforced concrete or Doors be constructed of 1 3/4 inch solid wood or laminated wood with 12 gauge steel plate on the outside face & high security locking system with S&G 831B padlock and Hinges shall be located on the inside of the space.

  • Shipboard Doors/Hatches need appropriate Lighting.

Chapter 4: Classified Work Spaces and Open Storage\n

  • Provides requirements for construction, certification, and operation of CWS and OSF.

  • Classified Workspaces must be designated as Exclusion restricted area.
    *Spaces be properly constructed, subject to certification and inspection.
    *The approval to construct a CWS requires a “Construction/Implementation Plan”
    *Wall sound ratings should be 45 or higher on STC rating scale and those near high volume amplified sound devices 50 or higher on the STC rating scale.
    *One door use (entrance and exit) to a CSW is required.

  • All access systems should fail in the locked position.

  • In order for there to be no fire threat the only fire system authorized is Halon.

Chapter 5: Antiterrorism/Force Protection

  • Purpose: Establishes uniform procedures and measures for use in responding to progressive levels of terrorist threats to Coast Guard units ashore and afloat.

  • Responsibilities: DCMS-34 is the program manager for Antiterrorism/Force Protection (AT/FP). Area commanders shall direct an area-wide FPCON, and may declare a higher FPCON within their AOR. Each command is also directed to provide ATFP or FPCON briefs on a yearly, regular basis.

  • Threat Analysis and Assessment Factors: Threat analysis is a continual process of compiling and examining all available information concerning potential terrorist activities. Factors need to be analyzed for the liklihood of potential threat to be valid. (existence, intentions, security environment etc.)

  • Levels of Threat: The new terrorism threat levels defined below were developed to reduce uncertainty and misinterpretation at the operational level by clearly describing the terrorist threat (High, Significant, Moderate & Low).

  • Antiterrorism Force Protection Training: All commands shall have an AT/FP training program (Levels I through IV).

  • Terrorist Force Protection Condition (FPCON) Definitions: The selected measures should be implemented immediately. FPCONS have the following associated conditional meanings: FPCON NORMAL,FPCON ALPHA,FPCON BRAVO,FPCON CHARLIE & FPCON DELTA).

Chapter 6: Funds Facilities and Storage

  • This chapter applies to the protection of all appropriated, nonappropriated and all other Government funds or negotiable instruments under Coast Guard control. The term “Funds” Storage means $2,000,00 or more must be in a 20 gauge steel security repository during non-operating hours.

  • A Security from GSA with 1R Combolocks Must be installed where $10,000 dollars may be stored for an extended period of time.
    *For all locations. Combinations to these locks should be changed: (a)Upon Receipt, (b) Anually, (c) when access is no longer required by an individual). (d) or if they are compromise, do not delegate responsibility must be CO or his/her designees only.
    *Commands will maintain a listing and inspection of all exterior lighting being performed by the appropriate personnel

  • Commands will initiate proper inspection by the monitoring station and by security of said systems to evaluate time response value with the response force enlisted.

Chapter 7 Information Systems Protection

A. General. This policy addresses the physical security requirements for Coast Guard Information Systems (IS), data or video, including components and Coast Guard owned stand-alone computers and similar devices. The Office of Security Policy and Management (DCMS-34) and the Chief Information Officer (CIO) (CG-6) developed this policy. This applies to all new construction, re-certification, change of ownership and major renovations. These requirements must be met upon publication of this change.
Unclassified Information System Protection:
A. The compromise of any USCG IS could result in adverse affects on United States national interests or the conduct of federal programs. Protection of equipment from damage or physical intrusion by unauthorized individual(s) is the primary objective. This is accomplished by construction methods and scaling physical access to systems/hardware/components.
B. Cabling for unclassified IS shall be protected from pilferage and intrusion when not installed in a protected space
Classified Information Systems (CIS):
A. These systems require spaces designated as Classified Work Spaces (CWS) and therefore shall carry the designation of “Exclusion” for restricted areas and associated protection measures.
B. Protective Distribution Systems (PDS) systems shall be protected using security in depth.
C. Coast Guard Owned Portable Computer and Telephonic Devices. Coast Guard owned portable information devices must be protected against intrusion and pilferage. It is the responsibility of the person to which the device is assigned to provide that protection.
R:The CSO shall:

  1. Ensure the implementation of these directives.

  2. The ISSO shall support this security process by direct interaction with the CSO and cognizant SM.

Chapter 8: Electronic Security Systems

  • To provide early warning of an intruder the ESS is used.. An standardized system of hardware and software elements are operated by trained security personnel.This system is configured to provide one or more layers of detection around an asset. Each layer is made up of a series of contiguous detection zones designed to isolate the asset and to control the entry and exit of authorized personnel and materials.
    Manufacturer specifications usually do not discuss environmental or nuisance alarms that can be caused by climatic conditions (such as wind or rain) or by the intrusion of animals (including birds). The alarm annunciation is valid because the sensor’s thresholds have been exceeded; however, the alarm does not represent a valid penetration attempt.

  • Purpose: Establishes uniform procedures and measures for use in responding to progressive levels of terrorist threats to Coast Guard units ashore and afloat.

  • Responsibilities: DCMS-34 is the program manager for (AT/FP).

Chapter 9 Loss/Crimes Prevention

DCMS-34 and his designees, or that of their designees, is responsible for the implementation of the Loss/Crime Prevention Program, and the establishment, administration and coordination of all physical security measures to safeguard personnel and prevent unauthorized access to equipment, materials and documents.
Any command which observes loss of property greater than &500 dollars in value will notify CGIS 72 later, or 24hours has applicable.