4Authority to Create a Security Program DoD , Defense Commissary AgencyEstablished the DeCA as a DoD AgencyDelegated authority to the DeCA Director to:Designate Position Sensitivity for each position within the Agency; andPromulgate the necessary security regulations for the protection of property and places under the jurisdiction of the Director, DeCA
5DeCA SECURITY PROGRAMS MANAGED BY HS ADMINISTRATIVE SECURITY FORCE PROTECTIONLOSS PREVENTIONADMINISTRATIVE SECURITYAntiterrorism (AT)AT Construction CriteriaAT PlanningAT Training and ExercisesAT Resource ApplicationAT Program ReviewsForce Protection Condition MeasuresRisk ManagementTraveler SecurityCounter Intelligence (CI)Collect & Analyze Threat InformationDisseminate Threat InformationCritical Infrastructure Protection (CIP)Infrastructure & Asset IdentificationInfrastructure & Asset PrioritizationCIP Threat DisseminationChemical, Biological, Radiological, Nuclear, and high yield Explosives (CBRNE)CBRNE Awareness TrainingSheltering PlanFood Security/Food DefenseCrime PreventionCrime Prevention Through Environmental Design (CPTED)Fraud PreventionIdentity Theft PreventionPersonal Crime PreventionPhysical SecurityAccess ControlBomb Threat ManagementClosed Circuit Television (CCTV)Intrusion Detection Systems (IDS)Key, Lock & Seal ControlSecurity LightingRetail SecurityAntirobbery ProceduresCounterfeit CurrencyEmployee TheftFunds ProtectionInternal ControlsShoplifting ProceduresInformation SecurityAccess & DisseminationAccountabilityClassification ManagementDisposal & Destruction of ClassifiedEmergency PlanningInformation Security TrainingSafekeeping & StorageSecurity Deviations & CompromiseTransmission of Classified MaterialOperations Security (OPSEC)Essential Elements of Critical InformationPersonnel SecurityBackground InvestigationsContinual Monitorship ProgramContractor AdjudicationsForeign Travel BriefingsSecurity ClearancesSecurity Education & Motivation TrainingMISCELLANIOUSDeCA Interest Reports (DIReps)Contractor Verification System (CVS)
6Why do you kneed to know security? As a Store Director, you are responsible for your store!It protects your people (patrons, employees, etc.)!It protects your inventory!It protects your store’s reputation!It instills confidence in your customers (improves sales)!It protects you from personal liability!
10“There is no better terrorist target than a DoD Dependent School, Exchange or Commissary . . .” BGen. James DozierNovember 3, 1983
11Commissary Vulnerabilities Robberies, burglaries, product diversions and van hijackings to help finance terrorist operations. (NPA, Philippines 1975 – 1989)Assassination and kidnapping of senior officers or their spouses that may be shopping or otherwise present within a commissary.Random acts of violence such as drive-by shootings and bombings aimed at disrupting the quality of life, inciting fear and publicity. (Ankara Turkey; Ramstein AB, Germany)
12Commissary Vulnerabilities, Cont. Intentional contamination of food products with chemical or biological agents.Use of DeCA bound delivery vehicles, shipping containers or other transportation/ shipping mediums to smuggle contraband, weapons, or explosives across international boundaries or onto military installations. (CDC delivery, Turkish Boarder, 1993)
13Commissary Vulnerabilities, Cont. As collateral damage resulting from an attack or event on a host installation.Use of DeCA affiliation to gain sponsorship onto otherwise secure military installations for nefarious activities (to commit espionage, crime, terrorism, etc).
15Mitigating Threats Anticipate the threat. Plan for the threat. Construct/Renovate for the threat.Crime prevention through environmental design (CPTED)DoD Minimum Antiterrorism Standards for BuildingsTrain/Exercise for the threat.
16Physical Security Basics PURPOSE. Physical security is primarily directed at the prevention of losses resulting from forced or unauthorized entry.The degree of protection required varies depending upon location, structural design of the facility, value of commissary resources, and periods when the premises are unmanned or unguarded.
29Personnel Security Program Because you never quite know who your going to get!
30DeCA Security Programs Personnel SecurityYour first opportunity to protect your accountability from employee theft!If they stole at their last employer,what makes you think theywon’t steal from you??
31Background Investigations National Agency Check with Inquiries (NACI)MINIMUM investigation for ALL Civil Service Employees working within DoD.Criminal History CheckFBI Fingerprint CheckCredit CheckReference/Former Employer/Education Checks
32~85% of all losses are due to theft ~48% is cased by employees and other store workers~33% is caused by shoplifters
33According to the National Crime Prevention Institute: 10% of store workers & patrons will never steal regardless of the temptation.$
3410% of employees and patrons will steal without regard for the security controls in place.
35The key to good security is knowing that: 80% of store workers & patrons will not steal from you unless:They think they wont get caught.They rationalize that “DeCA owes them.”They “need” the money/merchandise.They feel they’re being treated unfairly.They perceive “Everyone's doing it.”
36How does theft happen? Lax internal controls. Feeling of “It can’t happen to me!”Bypassing internal controls for “convenience.”Theft is a crime of opportunity!
38Physical Security Accessible Openings Access Control Protective LightingOpening and Closing ProceduresVendor Stocker ControlVendor ControlVisitor ControlContractor ControlKey, Lock and Seal ControlCargo Vehicles
39ACCESSIBLE OPENINGS. An accessible opening is any window, door, vent, etc., which could be used to gain entry into a facility.
40Physical Security Element Access Control Problems Identified Doors left open and unmonitoredBadges not used/controlledBadges not securedID’s issued to unauthorized PersonsAlarmed door IDS warning signs not used
41External Entrance Doors Intent – All entrance/exit to a Commissary Facility is monitored and controlled.After hours, Commissary Employee MUST authorize/monitor entry/exit of ALL!Double-Cylinder Locking DevicePanic Hardware on designated fire exitsIntrusion Detection System
44Physical Security Element Key & Lock Control Problems Identified Keys passed from person to personKeys left in locksSupervisors key left unsecuredPadlocks left with hasp openSecurity hardware easily removed with wrench or screwdriver
45Some strategies to reduce losses Keep high pilferage items in “Sensitive Storage.”Keep the backup storage are “clean.”Locate high pilferage items in the store in an area in which they can be “seen.”Look for vulnerabilities.Understand why people steal.Spot check receivers.Be concerned.