1727 words (4.9 double-spaced pages)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
This term paper is about Al Udeid Air Installation and Security Program. The information that will be covered in the document consists of; Introduction to Al Udeid Military Instillation, Force Protection Conditions and Determining Assets Protection Levels, Al Udeid Installation Security Concept and Regional Threats, Installation Security Forces and the Conclusion. After reading this term paper the reader will have a better understanding about military operating procedures and protecting military assets form terrorist incidents.
Introduction to Al Udeid Military Instillation
Al Udeid Air Base is a Military Installation located in the country of Qatar, and is considered geographically the heart of the Middle East. Al Udeid's mission is to provide Air and ground support for the War on Terrorism, as well as insuring global reach for US and Coalition Forces. Al Udeid is a diverse installation consisting of all branches of the US Military, British, Australian, Korean Forces, and Civilian Elements. Even with vast military diversity this installation is first and foremost an airport and is one of the largest in the region. The runway and surrounding tarmacs are adequate enough to support the largest aircraft both military and civilian. Although, the assortment and numbers are classified this installation has an adage "if it burns jet fuel, kicks ass, or moves troops. It's here!" It is estimated that either a military or commercial aircraft takes off or lands ever three minutes and operations are conducted twenty four hours a day and 365 days a year. Al Udeid's passenger terminal is like any other airport and routinely conducts search and screaming procedures of aircraft, passenger, and cargo.
Force Protection Conditions and Determining Asset Protection Levels
In addition to a normal operating military installation, this installation adheres to all Force Conditions Levels (FPCON'S) as well as integrates the Asset Protection Concept. These installation security programs must be executed with precision and all assets must be protected at all coasts. However, given that statement one must realize that not all assets are held with the same prestige. At deployed locations the Force Protection program is used in conjunction with Asset Protection Level procedures to provide the best protection possible for valued resources. Protection levels can change during periods of increased tension. For Example, FPCON Normal is the lowest protection level but, as unforeseen event increases security forces will amplify the FPCON LEVEL, FPCON DELTA being the highest. Virtually all contingencies cause security forces to increase readiness by implementing on of the four following FPCONS Levels;
FPCON NORMAL describes a situation of no current terrorist activity. The only security forces needed are enough to stop the everyday criminal, most likely civilian police forces.
FPCON ALPHA describes a situation where there is a small and general terrorist activity that is not predictable. However, agencies will inform personnel that there is a possible threat and standard security procedure review is conducted.
FPCON BRAVO describes a situation with somewhat predictable terrorist threat. Security measures taken by agency personnel may affect the activities of local law enforcement and the general public.
FPCON CHARLIE describes a situation when an instance occurs or when intelligence reports that there is terrorist activity imminent. Increased security by agencies are likely to cause problems for civilian law enforcement and the public, as people looking for access to agency facilities may be denied.
FPCON DELTA describes a situation when a terrorist attack is taking place or has just occurred. When applied for long periods of time, FPCON DELTA can cause hardships for civilian police and the public, as heightened agency security can impede their everyday duties. FPCON DELTA usually occurs only in the areas that are most vulnerable to or have been attacked.
Each base must use the FPCON actions designed to cope with events anticipated at that installation. For instance, a State Side or (CONUS) installation would not normally be required to develop an Asset Protection appendix for hostile air or major ground attack. However an over-seas or (OCONOS) base where the threat posed in a Host Nation is greater, that base must evaluate and implement Asset Protection Levels. Determining Asset protection levels provide the basis for programming security manpower and equipment. All military assets are designated with one of the four assigned protection levels. For example, certain systems, such as nuclear weapons and presidential support aircraft is always Protection Level 1(PL1) at the direction of authorities above the Air Force, conversely, the less important the resource the lower designation. Protection levels can change during periods of increased tension. For Example, as systems reach a heightened state of readiness like non-alert aircraft being placed on alert, their relative political and military importance increases and they may assume a higher protection level.
Protection Level 1 Resources
Assign PL1 to military installation resources for which the loss, theft, destruction, misuse of compromise would result in grate harm to the strategic capability of the United States. PL1 resources consist of Nuclear Weapons, Weapon Delivery Systems, Communications, Arial Space Aircraft, or systems that insure the ability to successfully execute contingency plans. This level of security must result in the greatest possible deterrence against hostile acts. Failing deterrence, security measures will provide maximum means to achieve detection, interception, and defeat of a hostile force before it is able to seize, damage, or destroy resources.
Protection Level 2 Resources
Assign PL2 to military installation resources for which the loss, theft, destruction, misuse of compromise would result in significant harm to the strategic capability of the United States. PL2 resources consist of Non-Nuclear Weapons, Expensive, few in numbers, or one of a kind systems, vital computer facilities and equipment, and Intelligence-gathering systems critical to military operational capabilities. This level of security must result in significant deterrence against hostile acts. Failing deterrence, this level of security will ensure a significant probability of detecting, intercepting, and defeating a hostile force before it is able to seize damage or destroy resources.
Protection Level 3 Resources
Assign PL3 to military installation rescores for which the loss, theft, destruction, misuse, or compromise would damage US war-fighting capability. PL3 resources consist of weapons systems not on alert but that can be readied for alert status, non-launch-critical or non-unique space launch systems and equipment and intelligence-gathering systems not critical to military operational capabilities.
Protection Level 4 Resources
Assign PL4 to military installation rescores which do not meet the definitions of PL1, 2, or 3 resources as discussed in the preceding paragraph, but for which the loss, theft, destruction, misuse, or compromise would adversely affect the operational capability of this military installation. PL4 resources are contained in controlled areas with owner/user being primarily responsible for security. PL4 resources consist of Warehouses storing aircraft or weapons systems spare parts, Fuels, liquid and gaseous oxygen, pharmacies and pharmaceutical supplies.
Al Udeid Installation Security Concept and Regional Threats
The Installation Security Program (ISP) is designed to deter enemy and criminal elements from conducting hostile operations, destruction of military assets, and conducting espionage against US Military and Coalition Forces. The ISP is an integrated process that implements security operations that present hostile persons or groups with unacceptable risks and penalties if they attempt to breach the security system. While it is theoretically impossible to devise an infallible security system, this installations security system is capable of sustaining a large attack both from air and ground. In addition to a typical airport security program this installation is faced with all the same threat however; the threat is compounded by Terries Groups, Political Activist, criminals, and Intelligence Agents. To better understand each inherent threat they are defined below;
Terrorist Groups are trained individuals in a paramilitary force that commit violent acts for political gain. Such groups use destruction and fear to impose their laws and religious beliefs onto others.
Political Activist and Demonstrators are usually individuals seeking publicity for their activities which could include penetration of restricted areas, malicious destruction or sabotage to achieve their goal.
Criminals are usually persons whose goal is profit and use selective lethal or non-lethal violence in the execution of their operation.
Intelligence Agents are usually military or foreign government personnel involved in surveillance and intelligence gathering missions. Intelligence agents normally avoid violence or any other act that may compromise their identity or mission.
The Installation Security Program is designed not only to combat Terrorist groups but, any threat that may target AL Udeid Air Installation or nearby communities. This could include the preplanned, indiscriminate use of chemical, biological, radiological, nuclear, or high-yield explosive (CBRNE) weapons to create casualties, inflict damage or destruction, create chaos (threatening calls/letters), or otherwise disrupt mission operations. CBRNE could be used directly against the installation or against civil, government, economic, population, or social centers that could impact military operations.
Installation Security Forces
Installation Security Forces consist primarily of US Air Force active duty, Air Reserve, and Air National Guard security forces personnel and when needed, Augmentees. Augmentees are personnel identified and considered by their command as highly responsible and completely reliable for security duty. Security Forces must detect unusual occurrences, delay and deny the entry of unauthorized individuals to resources, initiate an immediate alarm, provide appropriate armed response, discriminate between hostile acts and other occurrences, and initiate proper Force Protection Conditions (FPCON's) and contingency actions when required.
Installation Security Forces have unique security duties that include; Security badge issue, visitor-control, guarding/enforcing flight line entry-control point's (ECP), protecting Air and Space resources, and to combating local threats. Installation Security Force has the authority to publish and enforce regulations for safeguarding personnel, facilities, and property. Security Force personal is required to detain, and identify violator attempting to gain access, breach security or sabotage any military asset. During Day to Day Operations Security forces provide installation security by forming concentric rings or sectors of security at each installation. The more important the protected resource and the closer to it one gets, the smaller the circle and grater the security. On the other hand, the less important the resource and the farther away from it one gets, the larger the circle and the fewer the security forces.
The security of Al Udeid Military Installation rests in the hands of Security Forces, Passenger Terminal workers, and all that are assigned to this deployed location. Without, the help of theses exceptionally trained individuals this Installations Security Program would certainly be a soft target for terrorist activities. Unquestionably, this installation is a pillar in the War on Terror and without its sound security pro
How to Cite this Page
"Airport Security." 123HelpMe.com. 21 Dec 2014