Security Operations Protocols
40 Questions
0 Views

Security Operations Protocols

Created by
@SpiritualIodine

Questions and Answers

What is the minimum number of armed IECs required to operate the Santa Rosa Gate?

  • Two (correct)
  • Four
  • One
  • Three
  • At which gate is a portable duress button not required to be worn by IECs?

  • Route 9 Gate (correct)
  • Santa Rosa Gate
  • Northwest Field Gate (correct)
  • Arc Light Gate
  • During what situation is outbound traffic typically monitored by IECs?

  • Routine inspections
  • Vehicle breakdowns
  • At all times
  • Emergency situations (correct)
  • What must drivers ensure regarding child restraint systems at AAFB?

    <p>They are used in accordance with vehicle design</p> Signup and view all the answers

    What action should IECs take regarding loitering near their posts?

    <p>Prohibit loitering entirely</p> Signup and view all the answers

    How often is the Northwest Field Gate operated?

    <p>24 hours daily</p> Signup and view all the answers

    What should an IEC do during a joint changeover with off-going personnel?

    <p>Ensure cleanliness of the facility</p> Signup and view all the answers

    What is the main responsibility of IECs regarding incoming traffic?

    <p>Control inbound and monitor outbound traffic</p> Signup and view all the answers

    What should be accomplished after the offender is escorted from the installation?

    <p>An AFJIS report detailing the circumstances</p> Signup and view all the answers

    If a military subject refuses consent for a search, who should be contacted for potential authorization?

    <p>The Staff Judge Advocate (SJA)</p> Signup and view all the answers

    Which action must be taken immediately after obtaining verbal authorization for a blood test?

    <p>Complete AF Form 1176 in writing</p> Signup and view all the answers

    What should be completed prior to questioning a subject?

    <p>A notice of rights according to Article 31</p> Signup and view all the answers

    What is the first step if a subject consents to a blood sample for alcohol testing?

    <p>Request consent using AF Form 1364</p> Signup and view all the answers

    How should incidents occurring on base be documented before the subject is released?

    <p>By filling out an SFAR Form 13</p> Signup and view all the answers

    If the breathalyzers are inoperative, what should be requested from the subject?

    <p>Consent for a blood sample</p> Signup and view all the answers

    Which form must be followed up in writing after obtaining verbal authorization for a search?

    <p>AF Form 1176</p> Signup and view all the answers

    What is the primary responsibility of an SF member outside the facility during an active shooter situation?

    <p>Search each person leaving the facility for weapons</p> Signup and view all the answers

    Which type of information should be relayed to BDOC and other responding patrols?

    <p>Types of known weapons and sounds of gunfire</p> Signup and view all the answers

    What is the purpose of the secondary sweep conducted by SF after the initial threat is neutralized?

    <p>To search for secondary threats and assess casualties</p> Signup and view all the answers

    In a scenario where the shooter cannot be immediately located, what should the patrolman consider doing?

    <p>Waiting for follow-on responders to develop a tactical plan</p> Signup and view all the answers

    What should SF first responders do if the situation transitions into a hostage situation?

    <p>Isolate and contain the scene while contacting negotiators</p> Signup and view all the answers

    What is the role of BDOC in an active shooter response?

    <p>To coordinate with law enforcement and manage the situation</p> Signup and view all the answers

    Why might the search and clear process within the facility be considered tedious?

    <p>It involves multiple agencies working together methodically</p> Signup and view all the answers

    What is a key factor to consider when the shooter transitions to a barricaded situation?

    <p>First responders need to isolate the area and contain the threat</p> Signup and view all the answers

    What should be done before leaving behind a ram during an operation?

    <p>Breach the exterior door.</p> Signup and view all the answers

    Who is responsible for managing public information flow during an active shooter incident?

    <p>The Incident Commander</p> Signup and view all the answers

    Why is it essential for Security Forces members to have access to a CISM Team after a major incident?

    <p>To provide emotional and peer support.</p> Signup and view all the answers

    What is defined as an examination of a person, place, or thing to discover criminal intent?

    <p>Search</p> Signup and view all the answers

    What is the mandatory procedure for checking ID Cards when DBIDS is non-operational?

    <p>IEC personnel will check the front and back of all ID Cards.</p> Signup and view all the answers

    What may happen to Security Forces members conducting illegal searches?

    <p>They may face prosecution or civil action.</p> Signup and view all the answers

    Who must authenticate installation access letters during duty hours?

    <p>S3L personnel.</p> Signup and view all the answers

    What is the primary purpose of a seizure in law enforcement?

    <p>To take items believed to be evidence of a crime</p> Signup and view all the answers

    Which personnel are responsible for authenticating special event Entry Authority Lists?

    <p>VCC personnel.</p> Signup and view all the answers

    What should be the first step when establishing a media reception plan during an incident?

    <p>Involve the PAO immediately.</p> Signup and view all the answers

    What must individuals do when requesting after-hours access to the installation?

    <p>Present their access tracking number to the posted sentry.</p> Signup and view all the answers

    Which of the following best describes an illegal search?

    <p>A search performed without appropriate cause or warrant</p> Signup and view all the answers

    Which of the following is true about Entry Authority Lists (EALs)?

    <p>Entry Authority Lists apply only to restricted areas.</p> Signup and view all the answers

    When are restricted area letters authenticated during off-duty hours?

    <p>By an E-5/GS-7 or above.</p> Signup and view all the answers

    Where is the authenticated copy of the restricted area letter is sent to after duty hours?

    <p>It is sent to S5R during off-duty hours.</p> Signup and view all the answers

    What is the primary function of the Defense Biometric Identification System (DBIDS)?

    <p>To enhance military law enforcement and ensure safe access.</p> Signup and view all the answers

    Study Notes

    Gate Operations

    • Santa Rosa Gate: Operated by two armed IECs; closing time can be adjusted based on the situation, managed by the Flight Sergeant.
    • Northwest Field Gate: Staffed by two armed IECs, operational 24/7.
    • Route 9 Gate: Operational based solely on specific situations affecting the North Gate.

    Duty Requirements for IECs

    • Conduct joint changeover with outgoing personnel to ensure facility cleanliness and equipment serviceability.
    • Perform communication and duress checks, using distinct systems based on the gate in use.
    • Control inbound traffic and monitor outbound traffic, remaining knowledgeable about gate protocols.
    • Outbound traffic control is limited to emergencies or inspections; monitor for suspicious activity.
    • Prohibit loitering and private phone conversations while directing traffic.
    • Enforce motor vehicle safety regulations, including seatbelt use and child restraints.
    • Ensure compliance with safety procedures for motorcycles and scooters according to traffic regulations.
    • Implement and maintain the Defense Biometric Identification System (DBIDS) for secure access control.

    Defense Biometric Identification System (DBIDS)

    • Enhances military law enforcement capabilities for community safety through electronic ID credential checks.
    • Mandatory use of DBIDS; if it’s non-operational, manual ID checks are required against a barment roster.

    Entry Authority Lists (EALs)

    • Only personnel on authenticated EALs are permitted access to non-restricted areas.
    • Authentication process involves signatures from specified levels of authority, with specific protocols for weekends and special events.
    • Off-duty access requests follow a defined tracking protocol, with guidelines for civilian escorts if needed.

    Incident Response Protocols

    • Detain civilians according to legal guidelines and document all circumstances accurately.
    • Military personnel may need to seek search authorization under probable cause circumstances and must follow up in writing.
    • Consent-based testing is allowed for alcohol presence, with clear procedural steps for blood or breath tests.
    • SF should issue formal notifications during releases from custody for on-base incidents.

    Active Shooter Situation Protocols

    • Responding patrolmen must relay detailed information regarding threats to BDOC and other responders.
    • Include specifics like the number of shooters, types of weapons, and any immediate threats observed.
    • After an immediate threat is neutralized, conduct thorough searches of facilities for secondary threats.
    • Transition from threat response to victim rescue and medical aid as circumstances allow.
    • In hostage situations, SF must isolate and contain the scene and coordinate with hostage negotiators.

    Media and Support Considerations

    • High media interest during active shooter incidents necessitates organized public information management led by the Incident Commander.
    • Access to a Critical Incident Stress Management (CISM) team is essential for supporting personnel involved in traumatic responses.

    Search and Seizure Protocols

    • Searches are conducted to find evidence of a crime within jurisdictional limitations.
    • SF personnel must be aware that illegal searches can lead to personal liability and inadmissible evidence in court.
    • Seizures involve the authority to take items believed to be related to criminal activity.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers the operational protocols for various security gates, including the Santa Rosa Gate and Northwest Field Gate. It focuses on the staffing requirements, shift changes, and additional procedures necessary during critical situations. Test your knowledge of security operations management and duty expectations.

    Use Quizgecko on...
    Browser
    Browser