1 / 37

GUARD FORCE TRAINING

GUARD FORCE TRAINING. THE THREAT IS……. E V E R Y W H E R E. REFERENCE: 415 th BSB PMO SOP. AGENDA. INTRO SSG DETERMINE USE OF FORCE SSG CONTROL ENTRY SSG VEHICLE SEARCH SSG INDIVIDUAL SEARCH SSG RESPOND TO A BOMB THREAT SSG UNARMED DEFENSE OVERVIEW SSG

Download Presentation

GUARD FORCE TRAINING

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. GUARD FORCE TRAINING THE THREAT IS…….. E V E RY W H E R E REFERENCE: 415th BSB PMO SOP

  2. AGENDA • INTRO SSG • DETERMINE USE OF FORCE SSG • CONTROL ENTRY SSG • VEHICLE SEARCH SSG • INDIVIDUAL SEARCH SSG • RESPOND TO A BOMB THREAT SSG • UNARMED DEFENSE OVERVIEW SSG • WRITTEN TEST SSG • PE SSG

  3. NEUTRALIZE THE THREAT The single common factor that all successfully neutralized terrorists attacks have in common is a well trained, alert security force.

  4. Military Working Dogs A Show of Force Verbal Persuasion Presentation of Deadly Force Self-defense Techniques Military Police or HN Police Deadly Force QRF DECIDE USE OF FORCE

  5. CONTROL ENTRY CONTROL ENTRY ON TO A U.S. INSTALLATION OR SITE

  6. CONTROL ENTRY TASK This is optional Force Protection training; however, guard orders for those guards performing duties at access control points must contain detailed entry/access control procedures. CONDITIONS You are on AT/FP guard duty at an installation gate during a heightened Threat condition. You have written guard orders explaining personnel identification, the package control system, the vehicle control system, and you have the required equipment to implement them. You also have personnel with packages and/or vehicles who are attempting to enter or exit the area. STANDARDS 1. You must take the steps in performance measure 1 to allow only authorized persons and vehicles to enter or exit the area. 2. You must make a record of all persons and vehicles allowed entering or exiting. 3. You must take the steps in Performance Measures 1-5 to prevent the breakdown of security. 4. You must report security violations. 5. You must detain suspects according to performance measure 1.

  7. CONTROL ENTRY a. Any of the documents listed in c and d below may be used to gain access to installations not designated as restricted areas. Documents in e below will be used to control access to restricted areas. b. Documents without photographs may be used as access authorization; however, the bearer must still have a form of ID with a photograph (for example, a military ID card, passport). c. The following ID cards have photographs: (1) DD Form 2(RET), United States Uniformed Services Identification Card (Retired). (2) DD Form 2A(ACT) (Army), Active Duty Military ID Card.

  8. CONTROL ENTRY (3) DD Form 2A(RES), (4) DD Form 2AF(ACT) (Air Force), Active Duty ID Card. (5) DD Form 2MC(ACT) (Marine Corps), Active Duty Military ID Card. (6) DD Form 2N(ACT) (Navy), Active Duty Military ID Card. (7) DD Form 1173, Uniformed Services Identification and Privilege Card. This card is used for non-U.S. NATO Forces and for DOD civilians. It is valid only overseas. (8) DA Form 1602, Civilian Identification

  9. PERFORMANCE MEASURES 1.      Correctly identify personnel and their authority to enter or exit the area. a.       ID person and verify their identity with their ID card or badge. Make sure the photograph on the ID matches the person. b.      Examine the ID card for alteration or forgery. Seize forged, severely damaged, altered, or expired ID or installation-access documents; and, notify the Sergeant of the Guard and Military Police. Detain, with minimum force necessary, the person whom presented the ID card if possible until Military Police arrive. If it is not possible to detain the person, write down a good description of the individual and as much information as possible to assist Military Police and Host Nation police in locating and apprehending the individual. c.       Verify that the vehicle is authorized entry onto the installation IAW Guard Orders or Guard SOP. Match ID ID COND Match VEH & REG • Obtain a personal escort for persons who: • a.  Are not allowed access onto the installation. • (Note: The attached document lists the USAREUR or higher • level documentation that suffices for installation access). Use • AE Form 190-13H(G)-R or 190-13H(I)-R to document the • entrance of visitors to installations and activities requiring • controlled access. • b.  Have identified an escort who is authorized installation access. • The escort must stay with escorted persons from the time he or she • enters the installation until he or she departs. Escorts

  10. PERFORMANCE MEASURES 3. Check authorization for entry of vehicles.   a.       Keep a log of all vehicles entering the installation that require escort. Use AE Form 190-13H(G)-R or 190-13H(I)-R to document the entrance of visitors to installations and activities requiring controlled access. b.      Obtain escorts for commercial and personal vehicles entering the area that do not have authorization for unescorted installation accesses. Vehicles must be escorted throughout the movement within the area. 4. Prevent introduction of weapons, explosives, or other harmful materials. a.       Controls package. When ordered (or directed in Guard Orders) search all packages brought onto the installation. b.      Search vehicles authorized to enter before allowing them to enter. There are two types of searches performed, cursory and detailed. (1)    Cursory Search. Visually scan the interior of the vehicle for other occupants, explosive devices, and/or weapons. (2)    Detailed Searches are addressed in the POI titled, “Conduct a Detailed Vehicle Search.” Log VEH Escort TRKS Packages Search: Cursory vs. Detailed

  11. PERFORMANCE MEASURES What If? Notify Detain MP Bomb Threat Drill Spot Report 5. Take action upon discovery of a security violation. a. Immediately notify the Sergeant of the Guard and the Military Police. b. Detain suspect(s) for Military Police, if possible. c. Assist Military Police as requested. d. If the suspect has a possible explosive device in his vehicle or package, assist Military Police with “Respond to a Bomb Threat” performance measures. e. Provide a detailed written report.

  12. VEHICLE SEARCH

  13. Good afternoon smiley face, we are doing a vehicle search. Can I see your ID, drivers license, and registration? I will be right back. OK, Sir can I get the other occupants to move over to the area marked with a cone and remain there will we search. Sir, can you open your glove box, hood, truck and remove and open any boxes or bags you have inside the car? INITIAL CONTACT Search Cover Man Man Observe actions of occupants and be prepared to execute force. 1. State your purpose 2. Ask for ID, DL, & Registration 3. Verify Reg vs Tags 4. Have all other occupants move to a position 5 m away under observation. 5. Have Driver open glove box, hood, trunk and remove / open any boxes / bags

  14. Cover Man 6 4 3&5 2 1 Start 7 VISUALIZE ZONES • Start in the same place every time • Work bottom to top • Have the driver lead and open items • Watch your gear • Physically check, don’t count on the mirror • Develop code words for team

  15. Mr. Smiley you and your party are being detained until the SOG and the military police arrive • 1. Call SOG, request MPs • Do I need to search IND • Shut down station • Evac 300 meters WHAT IF DRILL Yeah, MAJ T… I thought about what you said and SGM Young is kinna cute! Cover man Search man Contact man or NCOIC

  16. INDIVIDUAL SEARCHES STANDING WALL PRONE

  17. STANDING • LOW THREAT • MINIMUM 2 GUARDS (3 for demonstrator ) • STEPS: • Position Cover ( No words spoken ) • Position Individual • Position Searcher • Conduct Search • COACHING POINTS: • Same Sex • Line of Fire • Control Balance • What if? • Divide Body • Systematic • Crunch • Don’t be shy

  18. WALL • MEDIUM THREAT • MINIMUM 2 GUARDS • STEPS: • Position Cover ( No words spoken ) • Position Individual • Position Searcher • Conduct Search • COACHING POINTS: • Same Sex • Line of Fire • Control Balance • What if? • Divide Body • Systematic • Crunch • Don’t be shy

  19. PRONE • HIGH THREAT • MINIMUM 2 GUARDS • STEPS: • Position Cover ( No words spoken ) • Position Individual • Position Searcher • Conduct Search • COACHING POINTS: • Same Sex • Line of Fire • Control Balance • What if? • Divide Body • Systematic • Crunch • Don’t be shy

  20. RESPOND TO BOMB THREAT

  21. BOMB THREAT Why Bombs Bombs are ideal weapons because they can be designed to give terrorists opportunities to escape from the scene of their crimes. Facts Terrorists have frequently used home-made explosive devices (Improvised Explosive Devices or IEDs) in carrying out their attacks against personnel, facilities, and assets.

  22. BOMB THREAT Placing a bomb on an installation normally requires that the bomb be transported to the scene, usually by means of a motor vehicle. The history of terrorist bombing attacks in Europe firmly indicates that the potential of an attack still remains. In those instances where attacks were successfully neutralized, it was the result of alert, well-trained security forces. Search this? #@%* no.

  23. BOMB THREAT TASK To provide procedures for safely and rapidly responding to bomb threats, ensuring the safety of USAREUR personnel and facilities. CONDITIONS While performing roving AT/FP guard duties, you think there is a bomb in a parcel lying at next to the Headquarters building. Your primary duty is to protect and assist the members of the installation community. You will always obey the orders of the senior Military Police on site. STANDARDS You must perform the steps in Performance Measures 1-9 to secure and clear the area without detonating the bomb.

  24. SPECIAL ATTENTION ITEMS a. Fire Extinguishers b. Propane Cylinders c. Luggage d. Gym bags e. Items taped or strapped to the vehicle

  25. BOMB THREAT (VEH) When firearms, explosives, or other harmful materials are found in the search, take the following actions: 1. Suspend all activity at the search site and close the access point. 2. Reroute traffic and evacuate 300 meters, or as far as practical, and take position behind any type of hard cover. 3. Notify the Sergeant of the Guard, Military Police, and Host Nation police, if appropriate (non-U.S. citizen). 4. Upon arrival of Military Police, assist as requested.

  26. BOMB THREAT (BLDG) • Upon arriving at the location of the suspicious parcel, there are four general rules to be followed: • Remain alert for additional or secondary explosive devices in the immediate area,especially if the existence of a bomb threat evacuation assembly area has been highly publicized. • Advise the Sergeant of the Guard that you have arrived and of any help needed to secure the area. • Do not use a radio/cell phone within 50 meters of the threatened area to avoid detonating the bomb. • Exhibit behavior that is calm, firm, and professional. (Others will react to your behavior. A professional demeanor can prevent general panic.)

  27. Vehicle/Package Isolate the area as much as is possible. Cordon suspicious objects to a distance of at least 300 meters and cordon suspicious vehicles to a distance of at least 300 meters. Ensure no one enters the cordoned area. Do not allow anyone other than on-duty Military Police, CID, the search team, and the responding EOD team into the area. 300 meters 300 meters

  28. BUILDING If the threatened building is occupied and the occupants have not been notified, advise the supervisor or building coordinator of the building to have everyone leave the building and move to an assembly area selected based on the following criteria: Assembly areas should be at least 300 meters, and not less than 100 meters, from the likely target or building, if at all possible. Locate assembly areas in areas where there is little chance of an IED being hidden. Open spaces are best. Avoid car parking areas because IEDs can be easily hidden in vehicles. CALL VS PACKAGE…………

  29. EVACUATION Select multiple assembly areas If possible reduce concentration of key personnel Assist Military Police in notifying supervisors of nearby buildings Do not search for the bomb Remain on the scene until released by the Military Police or the Sergeant of the Guard. Never touch the device

  30. PERFORMANCE MEASURES Notify Advise Isolate Perimeter Don’t Search Remain • 1. Immediately notify the Sergeant of the Guard to contact MPs • Upon arrival at location of a suspicious package advise the • Sergeant of the Guard that you have arrived on scene, • notify him/her of any help needed to secure the area. • Do not use a radio within 50 meters of area. • Is calm, firm, and professional. • 3. Isolate the area until MPs arrive. • 4.  Notify surrounding building supervisors to evacuate • everyone from their building to a safe area at least 100 meters • from the suspected bomb's location. • 5.  Do not search, touch, or allow anyone else to search for the • bomb other than building supervisors, EOD or MP personnel. • 6.  Remain on the scene until released by the MP or the • Sergeant of the Guard.

  31. UNARMED SELF DEFENSE • Distance wins • Protect weapon • Turtle Attack • Front Choke • Rear Choke • Front Grab / Push

  32. Threat Conditions THREATCON ALPHA.Applies when there is a general threat of possible threat activity against personnel and/or installations, the nature and extent of which is unpredictable, and circumstances do not justify full implementation of THREATCON BRAVO measures. However, it may be necessary to implement certain measures from higher THREATCONs resulting from intelligence received or as a deterrent.Commands must be capable of maintaining THREATCON ALPHA measures indefinitely, with only limited impact on normal operations.

  33. Threat Conditions THREATCON BRAVO.Applies when an increased or more predictable threat exists.Commanders must be capable of maintaining the measures of this THREATCON for several weeks without causing undue hardship to personnel, substantially affecting operational capabilities, or aggravating relations with local authorities and members of the local civilian or host nation community.

  34. Threat Conditions THREATCON CHARLIE.Applies when an incident occurs or intelligence indicates some form of threat action against personnel and/or facilities is imminent. Implementation of THREATCON CHARLIE measures for more than a short period probably will create hardships for personnel and affect the peacetime activities of units and personnel.

  35. Threat Conditions THREATCON DELTA. Implementation applies in the immediate area where a threat attack has occurred or when intelligence indicates terrorist action against a specific location is likely. Implementation of THREATCON DELTA normally occurs for only limited periods of time over specific, localized areas. Commands cannot sustain THREATCON DELTA for extended periods without causing significant hardships for personnel and substantial reductions in capability to perform normal peacetime missions.

  36. WHAT ARE YOUR QUESTIONS? MP

  37. WRITTEN TEST There are no second chances!

More Related