GUARD FORCE TRAINING - PowerPoint PPT Presentation

About This Presentation
Title:

GUARD FORCE TRAINING

Description:

GUARD FORCE TRAINING THE THREAT IS .. E V E R Y W H E R E REFERENCE: 415th BSB PMO SOP THREATCON CHARLIE. Applies when an incident occurs or intelligence ... – PowerPoint PPT presentation

Number of Views:2413
Avg rating:3.0/5.0
Slides: 38
Provided by: Schm91
Category:

less

Transcript and Presenter's Notes

Title: GUARD FORCE TRAINING


1
GUARD FORCE TRAINING
THE THREAT IS..
E V E RY W H E R E
REFERENCE 415th BSB PMO SOP
2
AGENDA
  • INTRO SSG
  • DETERMINE USE OF FORCE SSG
  • CONTROL ENTRY SSG
  • VEHICLE SEARCH SSG
  • INDIVIDUAL SEARCH SSG
  • RESPOND TO A BOMB THREAT SSG
  • UNARMED DEFENSE OVERVIEW SSG
  • WRITTEN TEST SSG
  • PE SSG

3
NEUTRALIZE THE THREAT
The single common factor that all successfully
neutralized terrorists attacks have in common is
a well trained, alert security force.
4
DECIDE USE OF FORCE
5
CONTROL ENTRY
CONTROL ENTRY ON TO A U.S. INSTALLATION OR SITE
6
CONTROL ENTRY
TASK   This is optional Force Protection
training however, guard orders for those guards
performing duties at access control points must
contain detailed entry/access control
procedures.     CONDITIONS   You are on AT/FP
guard duty at an installation gate during a
heightened Threat condition. You have written
guard orders explaining personnel identification,
the package control system, the vehicle control
system, and you have the required equipment to
implement them. You also have personnel with
packages and/or vehicles who are attempting to
enter or exit the area.     STANDARDS   1. You
must take the steps in performance measure 1 to
allow only authorized persons and vehicles to
enter or exit the area.   2. You must make a
record of all persons and vehicles allowed
entering or exiting.   3. You must take the
steps in Performance Measures 1-5 to prevent the
breakdown of security.   4. You must report
security violations.   5. You must detain
suspects according to performance measure 1.
7
CONTROL ENTRY
a. Any of the documents listed in c and d below
may be used to gain access to installations not
designated as restricted areas. Documents in e
below will be used to control access to
restricted areas. b. Documents without
photographs may be used as access authorization
however, the bearer must still have a form of ID
with a photograph (for example, a military ID
card, passport). c. The following ID cards have
photographs (1) DD Form 2(RET), United States
Uniformed Services Identification Card
(Retired). (2) DD Form 2A(ACT) (Army), Active
Duty Military ID Card.
8
CONTROL ENTRY
(3) DD Form 2A(RES), (4) DD Form 2AF(ACT) (Air
Force), Active Duty ID Card. (5) DD Form
2MC(ACT) (Marine Corps), Active Duty Military ID
Card. (6) DD Form 2N(ACT) (Navy), Active Duty
Military ID Card. (7) DD Form 1173, Uniformed
Services Identification and Privilege Card. This
card is used for non-U.S. NATO Forces and for DOD
civilians. It is valid only overseas. (8) DA
Form 1602, Civilian Identification
9
PERFORMANCE MEASURES
1.      Correctly identify personnel and their
authority to enter or exit the
area.   a.       ID person and verify their
identity with their ID card or badge. Make
sure the photograph on the ID matches the person.
  b.      Examine the ID card for alteration or
forgery. Seize forged, severely damaged,
altered, or expired ID or installation-access
documents and, notify the Sergeant of the
Guard and Military Police. Detain, with
minimum force necessary, the person whom
presented the ID card if possible until Military
Police arrive. If it is not possible to
detain the person, write down a good
description of the individual and as much
information as possible to assist Military
Police and Host Nation police in locating and
apprehending the individual.   c.       Verify
that the vehicle is authorized entry onto the
installation IAW Guard Orders or Guard SOP.  
Match ID
ID COND
Match VEH REG
  • Obtain a personal escort for persons who
  • a.  Are not allowed access onto the installation.
  • (Note The attached document lists the
    USAREUR or higher
  • level documentation that suffices for
    installation access). Use
  • AE Form 190-13H(G)-R or 190-13H(I)-R to
    document the
  • entrance of visitors to installations and
    activities requiring
  • controlled access.
  •  
  • b.  Have identified an escort who is authorized
    installation access.
  • The escort must stay with escorted persons
    from the time he or she
  • enters the installation until he or she
    departs.

Escorts
10
PERFORMANCE MEASURES
3. Check authorization for entry of
vehicles.   a.       Keep a log of all
vehicles entering the installation that
require escort. Use AE Form 190-13H(G)-R or
190-13H(I)-R to document the entrance of
visitors to installations and activities
requiring controlled access.   b.      Obtain
escorts for commercial and personal vehicles
entering the area that do not have authorization
for unescorted installation accesses.
Vehicles must be escorted throughout the
movement within the area.   4. Prevent
introduction of weapons, explosives, or other
harmful materials.   a.       Controls package.
When ordered (or directed in Guard Orders)
search all packages brought onto the
installation.   b.      Search vehicles
authorized to enter before allowing them to
enter. There are two types of searches
performed, cursory and detailed.   (1)   
Cursory Search. Visually scan the interior of
the vehicle for other occupants,
explosive devices, and/or
weapons.   (2)    Detailed Searches are addressed
in the POI titled, Conduct a
Detailed Vehicle Search.
Log VEH
Escort TRKS
Packages
Search Cursory vs. Detailed
11
PERFORMANCE MEASURES
What If? Notify Detain MP Bomb Threat Drill Spot
Report
5. Take action upon discovery of a security
violation.   a. Immediately notify the
Sergeant of the Guard and the Military
Police.   b. Detain suspect(s) for Military
Police, if possible.   c. Assist Military
Police as requested.   d. If the suspect has a
possible explosive device in his vehicle or
package, assist Military Police with Respond
to a Bomb Threat performance measures.  
e. Provide a detailed written report.
12
VEHICLE SEARCH
13
INITIAL CONTACT
Search Cover Man Man
Observe actions of occupants and be prepared to
execute force.
1. State your purpose 2. Ask for ID, DL,
Registration 3. Verify Reg vs Tags 4. Have all
other occupants move to a position 5 m away under
observation. 5. Have Driver open glove box,
hood, trunk and remove / open any boxes / bags
14
Cover Man
VISUALIZE ZONES
  • Start in the same place every time
  • Work bottom to top
  • Have the driver lead and open items
  • Watch your gear
  • Physically check, dont count on the mirror
  • Develop code words for team

15
WHAT IF DRILL
Yeah, MAJ T I thought about what you said and
SGM Young is kinna cute!
Cover man
Search man
Contact man or NCOIC
16
INDIVIDUAL SEARCHES
STANDING
WALL
PRONE
17
STANDING
  • LOW THREAT
  • MINIMUM 2 GUARDS (3 for demonstrator )
  • STEPS
  • Position Cover ( No words spoken )
  • Position Individual
  • Position Searcher
  • Conduct Search
  • COACHING POINTS
  • Same Sex
  • Line of Fire
  • Control Balance
  • What if?
  • Divide Body
  • Systematic
  • Crunch
  • Dont be shy

18
WALL
  • MEDIUM THREAT
  • MINIMUM 2 GUARDS
  • STEPS
  • Position Cover ( No words spoken )
  • Position Individual
  • Position Searcher
  • Conduct Search
  • COACHING POINTS
  • Same Sex
  • Line of Fire
  • Control Balance
  • What if?
  • Divide Body
  • Systematic
  • Crunch
  • Dont be shy

19
PRONE
  • HIGH THREAT
  • MINIMUM 2 GUARDS
  • STEPS
  • Position Cover ( No words spoken )
  • Position Individual
  • Position Searcher
  • Conduct Search
  • COACHING POINTS
  • Same Sex
  • Line of Fire
  • Control Balance
  • What if?
  • Divide Body
  • Systematic
  • Crunch
  • Dont be shy

20
RESPOND TO BOMB THREAT
21
BOMB THREAT
Why Bombs Bombs are ideal weapons because they
can be designed to give terrorists opportunities
to escape from the scene of their
crimes. Facts Terrorists have frequently used
home-made explosive devices (Improvised
Explosive Devices or IEDs) in carrying out their
attacks against personnel, facilities, and
assets.
22
BOMB THREAT
Placing a bomb on an installation normally
requires that the bomb be transported to the
scene, usually by means of a motor vehicle. The
history of terrorist bombing attacks in Europe
firmly indicates that the potential of an attack
still remains. In those instances where attacks
were successfully neutralized, it was the result
of alert, well-trained security forces.
Search this? _at_ no.
23
BOMB THREAT
TASK To provide procedures for safely and
rapidly responding to bomb threats, ensuring the
safety of USAREUR personnel and
facilities. CONDITIONS While performing roving
AT/FP guard duties, you think there is a bomb in
a parcel lying at next to the Headquarters
building. Your primary duty is to protect and
assist the members of the installation community.
You will always obey the orders of the senior
Military Police on site. STANDARDS You must
perform the steps in Performance Measures 1-9 to
secure and clear the area without detonating the
bomb.
24
SPECIAL ATTENTION ITEMS
a. Fire Extinguishers b. Propane Cylinders c.
Luggage d. Gym bags e. Items taped or
strapped to the vehicle
25
BOMB THREAT (VEH)
When firearms, explosives, or other harmful
materials are found in the search, take the
following actions 1. Suspend all activity at
the search site and close the access point. 2.
Reroute traffic and evacuate 300 meters, or as
far as practical, and take position behind any
type of hard cover. 3. Notify the Sergeant of
the Guard, Military Police, and Host Nation
police, if appropriate (non-U.S. citizen). 4.
Upon arrival of Military Police, assist as
requested.
26
BOMB THREAT (BLDG)
  • Upon arriving at the location of the suspicious
    parcel, there are four general rules to be
    followed
  • Remain alert for additional or secondary
    explosive devices in the immediate
    area,especially if the existence of a bomb threat
    evacuation assembly area has been highly
    publicized.
  • Advise the Sergeant of the Guard that you have
    arrived and of any help needed to secure the
    area.
  • Do not use a radio/cell phone within 50 meters
    of the threatened area to avoid detonating the
    bomb.
  • Exhibit behavior that is calm, firm, and
    professional. (Others will react to your
    behavior. A professional demeanor can prevent
    general panic.)

27
Vehicle/Package
Isolate the area as much as is possible. Cordon
suspicious objects to a distance of at least 300
meters and cordon suspicious vehicles to a
distance of at least 300 meters. Ensure no one
enters the cordoned area. Do not allow anyone
other than on-duty Military Police, CID, the
search team, and the responding EOD team into the
area.
300 meters
300 meters
28
BUILDING
If the threatened building is occupied and the
occupants have not been notified, advise the
supervisor or building coordinator of the
building to have everyone leave the building and
move to an assembly area selected based on the
following criteria Assembly areas should be
at least 300 meters, and not less than 100
meters, from the likely target or building, if at
all possible. Locate assembly areas in areas
where there is little chance of an IED being
hidden. Open spaces are best. Avoid car parking
areas because IEDs can be easily hidden in
vehicles. CALL VS PACKAGE
29
EVACUATION
Select multiple assembly areas If possible
reduce concentration of key personnel Assist
Military Police in notifying supervisors of
nearby buildings Do not search for the
bomb Remain on the scene until released by the
Military Police or the Sergeant of the Guard.
Never touch the device
30
PERFORMANCE MEASURES
Notify Advise Isolate Perimeter Dont
Search Remain
  • 1. Immediately notify the Sergeant of the Guard
    to contact MPs
  •  
  • Upon arrival at location of a suspicious package
    advise the
  • Sergeant of the Guard that you have arrived on
    scene,
  • notify him/her of any help needed to secure the
    area.
  •  
  • Do not use a radio within 50 meters of area.
  •  
  • Is calm, firm, and professional.
  •  
  • 3. Isolate the area until MPs arrive.
  • 4.  Notify surrounding building supervisors to
    evacuate
  • everyone from their building to a safe area at
    least 100 meters
  • from the suspected bomb's location.
  •  
  • 5.  Do not search, touch, or allow anyone else to
    search for the
  • bomb other than building supervisors, EOD or MP
    personnel.
  •  
  • 6.  Remain on the scene until released by the MP
    or the

31
UNARMED SELF DEFENSE
  • Distance wins
  • Protect weapon
  • Turtle Attack
  • Front Choke
  • Rear Choke
  • Front Grab / Push

32
Threat Conditions
THREATCON ALPHA. Applies when there is a
general threat of possible threat activity
against personnel and/or installations, the
nature and extent of which is unpredictable, and
circumstances do not justify full implementation
of THREATCON BRAVO measures. However, it may be
necessary to implement certain measures from
higher THREATCONs resulting from intelligence
received or as a deterrent. Commands must be
capable of maintaining THREATCON ALPHA measures
indefinitely, with only limited impact on normal
operations.
33
Threat Conditions
THREATCON BRAVO. Applies when an increased or
more predictable threat exists. Commanders must
be capable of maintaining the measures of this
THREATCON for several weeks without causing undue
hardship to personnel, substantially affecting
operational capabilities, or aggravating
relations with local authorities and members of
the local civilian or host nation community.
34
Threat Conditions
THREATCON CHARLIE. Applies when an incident
occurs or intelligence indicates some form of
threat action against personnel and/or facilities
is imminent. Implementation of THREATCON CHARLIE
measures for more than a short period probably
will create hardships for personnel and affect
the peacetime activities of units and personnel.
35
Threat Conditions
THREATCON DELTA. Implementation applies in the
immediate area where a threat attack has occurred
or when intelligence indicates terrorist action
against a specific location is likely.
Implementation of THREATCON DELTA normally occurs
for only limited periods of time over specific,
localized areas. Commands cannot sustain
THREATCON DELTA for extended periods without
causing significant hardships for personnel and
substantial reductions in capability to perform
normal peacetime missions.
36
WHAT ARE YOUR QUESTIONS?
MP
37
WRITTEN TEST
There are no second chances!
Write a Comment
User Comments (0)
About PowerShow.com