Terrorists frequently emulate military organizations as they develop, plan, train, and carry out terrorist attacks against DOD assets. Terrorists have a critical need for information regarding the whereabouts, habits, working environments, home environments, and other potential points of leverage against their targets. The three intelligence-collection methods used by terrorists against potential targets are human intelligence (HUMINT), photographic intelligence (PHOTINT), and signal intelligence (SIGINT).
- Vary your route to and from work and your arrival and departure times.
- Vary your exercise schedule, using different routes and distances. It is best not to exercise alone.
- Do not divulge family or personal information to strangers.
- Enter and exit buildings through different doors, if possible.
- Avoid other routines.
- Dress and behave in public in a manner consistent with local customs. Items that are distinctively American should not be worn or displayed outside American compounds.
- Reduce visibility in the local community.
- Avoid flashing large sums of money, expensive jewelry, or luxury items.
- Avoid public disputes or confrontations, and report any trouble to the proper authorities.
- Ensure that personal information (home address, phone number, or family information) is not divulged.
- Get into the habit of checking in with friends and family.
- Know how to use the local phone system.
- Know the locations of civilian police, military police, government agencies, and the US embassy.
- Know certain key phrases in the local language.
- Set up simple signal systems that can alert family members or associates that danger is present.
- Carry ID showing your blood type and any special medical conditions.
- Keep personal affairs in good order.
- Avoid carrying sensitive or potentially embarrassing items.
G-5. The working environment is not immune from attempted acts by criminals or terrorists. DOD installations in CONUS and OCONUS usually provide a level of basic security comparable or superior to the basic level of security provided in the surrounding community. The following are general practices that can help reduce the likelihood of a terrorist attack:
- Establish and support an effective security program.
- Discourage the use of office facilities to store objects of significant intrinsic value unless it is mission essential.
- Train personnel to be alert for suspicious activities, persons, or objects.
- Arrange office interiors so that strange or foreign objects left in the room will be recognized immediately.
- Provide for security systems on exterior doors and windows.
- Ensure that access-control procedures are rigorously observed at all times for access to
- Use an ID badge system containing a photograph.
- Identify offices by room number, color, or object name and not by rank, title, or the name of the incumbent.
- Avoid using nameplates on offices and parking places.
- Telephone and mail procedures:
- When answering the telephone, avoid using ranks or titles.
- When taking telephone messages, do not reveal the whereabouts or activities of the person being sought.
- When leaving telephone messages, place them in unmarked folders; do not leave them exposed for observers to identify caller names and phone numbers, persons called, and messages left.
- When opening mail, use a checklist to help identify letter bombs or packaged IEDs.
- Visitor-control procedures:
- Place strict limitations on access to the executive office area.
- Lock doors (from the inside) from the visitor-access area to executive offices or other restricted areas of a facility.
- Ensure that receptionists clear all visitors before they enter inner offices.
- Permit workmen or visitors access to restricted areas or exclusion areas under escort and only with proper ID. Confirm the work to be done before admitting workmen to restricted areas of the facility.
- Limit publicity in public waiting areas to information that does not identify personnel by name, position, or office location.
- Avoid posting unit rosters, manning boards, or photo boards where visitors or local contractors can view them.
- Restrict the use of message boards, sign-in/-out boards, and other visual communications to general statements of availability.
- General working procedures:
- Avoid carrying attaché cases, briefcases, or other courier bags unless necessary.
- Avoid carrying items with markings that identify the owner by rank or title, even within the office environment.
- Avoid working alone late at night and on days when the remainder of the staff is absent.
- Ensure that office doors are locked when the office is vacant for any lengthy period, at night, and on weekends. If late-night work is necessary, work in conference rooms or internal offices where outside observation is not possible.
- Ensure that the security office retains the office keys.
- Ensure that papers, correspondence, communications materials, and other documents are not left unattended overnight.
- Ensure that maintenance activity and janitorial services in key offices, production offices, or maintenance facilities are performed under the supervision of security personnel.
- Prohibit the removal of property, material, or information stored on any media from the facility without proper written authorization.
- Consider prohibiting the importation of property, material, or information stored on any media into the facility unless such items have been properly inspected.
- Lock offices not in use to prohibit unauthorized access of stored material that could be used to hide IEDs or intelligence-collection devices.
- Minimize the use of vehicles or vehicle markings that make it possible to readily identify the vehicle and its occupants as US-government or DOD-contractor personnel.
- Ensure that all personnel have access to some sort of duress alarm to annunciate and warn of a terrorist attack.
- Ensure that secretaries and guard posts are equipped with covert duress alarms that can be used to alert backup forces.
- Avoid placing office furnishings directly in front of exterior windows.
G-7. The following suggestions are intended to be a guide for secretaries and executive assistants who may find themselves performing personnel-security duties as collateral duty. Executive assistants and security personnel should regularly train and exercise procedures used in case they must evacuate mission-critical personnel to safe havens.
- Request the installation of physical barriers (such as electromagnetically operated doors) to separate offices of senior executives from other offices.
- Request the installation of a silent trouble-alarm button with a signal terminating in the security department.
- Admit visitors into the executive area when they are positively screened in advance or are personally recognized.
- Do not inform unknown callers of an executive's whereabouts, home address, or telephone number.
- Store a fire extinguisher, a first aid kit, and an oxygen bottle in the office area.
- Remain calm and listen carefully when receiving a threatening call.
- Do not accept packages from strangers until satisfied with the individual's identity and the nature of the parcel.
- Keep travel itineraries for all personnel confidential.
- Distribute daily schedules for senior officers and civilian officials on a limited basis.
G-8. The following discussion is intended to assist personnel in formulating plans to obtain housing outside US government compounds or DOD facilities. Personnel assigned to government housing may also find the antiterrorism and security tips presented below helpful in reducing the threat of violence and loss of property.
- Varying routines in their daily activities.
- Blending in with the local environment.
- Avoiding unnecessary publicity and photographs that identify individual family members.
- Being alert to individuals, parked or abandoned vehicles, unusual utility work, or gatherings of people inconsistent with the residential environment.
- Do not use nameplates or uniquely American symbols on the exterior of residences occupied by DOD personnel overseas.
- Do not use nameplates on parking places, and avoid parking private or government vehicles in the same location day after day.
- Ensure that all family members answer the telephone politely but that they provide no information as to the name of the occupants until the caller's identity has been established.
- Treat all telephone conversations as though anyone who wanted to listen in was doing so.
- Examine carefully all mail delivered to the residence.
- Respond to formal social invitations in person (where possible) or by direct telephone contact.
- Be attentive to the security environment of social gatherings.
- Avoid the development of patterns with respect to time of arrival or departure at social events.
- Avoid prolonged presence at social functions where there is a high concentration of persons thought to be terrorist targets.
- Refrain from excessive use of alcohol at social functions; remain clearheaded and unimpaired.
- Vary routes to and from social events held at a central facility.
- Minimize appearances in uniform or formal attire.
- Decline invitations to appear in publicity photos.
- Participate in recreational activities within the American compound or at a DOD installation whenever possible.
|Join the GlobalSecurity.org mailing list|