ࡱ>  KbjbjWW n55<pp !!!$>!>!>!P!*">!F{##pL$L$L$R-R-R-zzzzzzz^}z!.0-"R-..z L$L${o1o1o1. 8L$!L$zo1.zo1o1J=p\!UwL$o8/prBz{0F{rz 0UwUwH!w8R-Z-@o1-4 .R-R-R-zz0R-R-R-F{....R-R-R-R-R-R-R-R-R-p : Job Aid Physical Security Plan Template Map Reference Copy No.___________ Issuing Agency Place of Issue Date of Issue Physical Security Plan Purpose. State the plans purpose. Responsibilities. List the people who are responsible for physical security and what their specific responsibilities are related to the physical security of the installation or facility. Policies. Area Security. Define the areas, buildings, and other structures considered critical and establish priorities for their protection. CATEGORY I (Maximum Level Security). This level of security is required for an area containing a security interest or defense resources. Its compromise or loss would have an immediate effect on the defense potential or capability of the United States. CATEGORY I (maximum-level security)BLDG #PROTECTION CATEGORY II (Advanced Level Security). This level of security is required for an area containing a security interest or defense potential or capability of the United States. The total security effort for these areas should provide a high probability of detection and assessment or prevention of unauthorized penetration or approach to the items protected. CATEGORY II (advanced-level security)BLDG #PROTECTION CATEGORY III (Intermediate Level Security). This level of security is required for an area containing pilferable material or sensitive items that have an attraction for the intruder in addition to monetary value. These areas may contain equipment necessary for the continual functioning of the activities, but not necessarily a part of the immediate or near-term mission or defense capability. These areas should be provided physical protection through isolation, barrier systems, IDS-CCTV, and access control or a combination of these. The total security effort for these areas should provide a reasonable probability of detection and assessment or prevention of unauthorized penetration, approach, or removal of the items protected. CATEGORY III (intermediate-level security)BLDG #PROTECTION CATEGORY IV X (Basic Level Security). This level of security is established to protect pilferable items or for the principle purpose of providing administrative control, safety, or a buffer area of security restriction for areas of higher security category. The items within the area are essential to continue base operations and should be afforded additional security or consideration during increased FPCONs. CATEGORY IV (basic-level security)BLDG #PROTECTION CATEGORY V (basic-level security)BLDG #PROTECTION CATEGORY VI (basic-level security)BLDG #PROTECTION CATEGORY VII (basic-level security)BLDG #PROTECTION CATEGORY VIII (basic-level security)BLDG #PROTECTION CATEGORY IX (basic-level security)BLDG #PROTECTION CATEGORY X (basic-level security)BLDG #PROTECTION Access Control Measures. Define and establish restrictions on access and movement into critical areas. Categorize restrictions as to personnel, materials, and vehicles. Personnel access Establish controls pertinent to each area or structure Authority for access Criteria for access Unit personnel Visitors Maintenance personnel Contractor personnel National guard Emergency response teams (police, fire, ambulance, and so forth) Identification and control Description of the system to be used in each area. If a badge system is used, a complete description covering all aspects should be used in disseminating requirements for identification and control of personnel conducting business on the installation. Application of the system: Unit personnel Visitors to restricted areas Visitors to administrative areas Vendors, tradesman, and so forth Contractor personnel Maintenance or support personnel Fail-safe procedures during power outages Material control Incoming Requirements for admission of material and supplies Search and inspection of material for possible sabotage hazards Special controls on delivery of supplies or personal shipments in restricted areas Outgoing Documentation required. Controls Classified shipment not involving nuclear/chemical material. Nuclear/chemical material Controls on movement of warheads/chemicals on the installation. Controls on shipments or movement of training warheads/chemicals. Controls on pickup or delivery of warheads/chemicals outside the installation Vehicle control Policy on search of military and POVs. (See component Access Control regulation for search procedures.) Parking regulations Controls for entrance into restricted and administrative areas Military vehicles Privately Owned Vehicles (POVs) Emergency vehicles Vehicle registration Security aids. Indicate the manner in which the following security aids will be implemented on the installation. Protective barriers Definition Fences Clear zones Signs Types Posting Gates Location in perimeter Hours of operation Security requirements Lock security Barrier plan for each gate Protective lighting system Use and control Inspection Action taken in case of commercial power failure Action taken in case of failure of alternate power source Emergency lighting system Stationary Portable IDSs Security classification Inspection Use and monitoring Actions to be taken in case of alarm conditions Maintenance Alarm logs or registers Tamper-proof provisions Monitor panel locations Communications Locations Use Tests Authentication procedures Security forces. General instructions that would apply to all security force personnel (fixed and mobile). Detailed instructions such as special orders and SOP information should be attached as annexes. Security force facets include: Composition and organization of the force. Tour of duty. Essential posts and routes. Weapons and equipment. Training. Use of MWD teams. Method of challenging with signs and countersigns. Alert forces: Composition Mission Weapons and equipment Location Deployment concept Contingency plans. Required actions in response to various emergency situations. Detailed plans for situations (counterterrorism, bomb threats, hostage negotiations, disaster, fire, and so forth) should be attached as annexes. Individual actions. Alert force actions. Security force actions. Use of air surveillance. Coordinating instructions. Matters that require coordination with other military and civil agencies such as: Adjacent installations or units State and local agencies Local county/city police Sheriff's Office State Police (Troops A, B, etc.) Federal Agencies Federal Bureau of Investigation U.S. Marshal U.S. Forestry Service Drug Enforcement Administration Immigration and Naturalization Service Similar host country agencies NOTE: The coordination/interaction allows for an exchange of intelligence information on security measures being used, contingency plans, and any other information to enhance local security. On an installation, the host activity shall assume responsibility for coordinating physical security efforts of all tenants, regardless of the components represented, as outlined in the support agreements and the host-activity security plan. Applicable provisions shall be included in, or be an appendix to, the support agreement. A formal agreement will contain definite assignment of physical security responsibility for the items stored. The agreement should address: Maximum quantities to be stored Physical safeguards to be used Frequency of and responsibility for physical inventories or reconciliations Reporting of losses for investigation Lock and key control The unit that has overall responsibility NOTE: Procedures for authorization and identification of individuals to receipt for and physically take custody of XXXX (installation/unit/facility name) property. The purpose of such coordination is protection in depth. Authority, jurisdiction, and responsibility must be set forth in a manner that ensures protection and avoids duplication of effort. Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX A. REFERENCES This annex provides a list of DoD or Component-specific directives, regulations, instructions, manuals, etc. that apply to the physical security of the installation or facility. Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX B. INSTALLATION THREAT STATEMENT This annex provides current intelligence pertaining to terrorist, criminal, civil disturbance, and other threats to the security of personnel and property at the installation or facility. Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX C. Terrorist Counteraction Plan This annex provides the immediate response by the local community and installation collectively, in the event of a terrorist attack. This is normally a joint document, which allocates critical resources, and outlines each agency duties and responsibilities. Additionally, routine exercises are performed to for readiness and evaluation. Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX D. BOMB THREAT PLAN This annex provides a bomb threat plan, including as a minimum, guidance for: Control of the operation Evacuation Search Finding the bomb or suspected bomb Disposal Detonation and damage control Control of publicity After-action report  SHAPE \* MERGEFORMAT  Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX E. INSTALLATION CLOSURE PLAN This annex addresses an installation closure plan, which identifies contingency road closings and restriction of movement within specific areas of the installation. The inclusion of this annex must be coordinated with local and state law enforcement activities. NOTE: Typically the PSP is coordinated with federal agencies which support the installation. However, signed agreements normally are in the form of Memorandums of Agreement or Understanding. Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX F. NATURAL DISASTER PLAN This annex is comprised of a natural-disaster plan that has been coordinated with natural disaster plans of local jurisdictions. At a minimum, the natural disaster plan should provide guidance for: Control of the operation Evacuation Communications Control of publicity An after-action report Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX G. CIVIL DISTURBANCE PLAN This annex consists of the civil disturbance plan and is formulated by the commander based on local threats. (For example, commanders of chemical facilities should anticipate the need to develop crowd control procedures to handle anti-chemical demonstrations.) Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX H. WORK-STOPPAGE PLAN This annex identifies a work-stoppage plan. This is a requirement for conducting a physical security survey to determine the impact of a decrease in the installations work force. A work-stoppage plan includes additional physical security considerations regarding the activity involved (such as modified or alternate staffing considerations) and the area directly surrounding critical infrastructures and critical assets. This annex should include provisions for increased access and entry controls measures if the situation warrants. Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX I. RESOURCE PLAN This annex addresses a resource plan to meet the minimum essential physical security needs (equipment, money, and personnel, etc.) for the installation or activity. Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX J. COMMUNICATION PLAN This annex identifies all the specific communication systems or networks used at the installation and the infrastructure to support command and control. Typically system configurations, and geographical location of significant equipment is identified in detail. The communications plan should address all communication requirements such as; encryption, line monitoring, shared networks, wireless, cellular, mobile radio, loss of communication, call signs, brevity codes, and routine maintenance actions. Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX K. Intrusion Detection Systems (IDS) This annex outlines procedures and policies for the effective and economical operation of government owned Intrusion Detection System (IDS) on the installation. This annex normally include test and certification plans, maintenance, alarm rates (false/nuisance), emergency contacts, types of sensors, accessing and arming structures. Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX L. High Risk Personnel (HRP) Security This annex outlines procedures for providing minimal level security for HRP residing and working on the installation or facility and for visiting dignitaries. HRP are those who are more likely to be terrorist or criminal targets because of their grade, assignment, symbolic value, vulnerabilities, location, or specific threat. Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX M. Motor Pool Security This annex outlines how motor pools will be protected including rules for Privately Owned Vehicle (POV) storage, fuel tankers, and contractor vehicles. Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX N. CONTINGENCY PLANS This annex identifies a contingency plan to be used in situations where the commander determines an increase in physical security measures and procedures are necessary. In most instances, it will be necessary to increase security for AA&E and other sensitive property, assets, and facilities during periods of natural disasters, natural emergencies, or increased threat from terrorists or criminal elements. Other contingencies that may require an increase in physical security measures and procedures include hostage negotiations, protective services, and special reaction teams. These provisions should be designed for early detection of an attempted intrusion, theft, or interruption of normal security conditions. Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX O, POST ORDERS This annex outlines the post orders that establish roles and responsibilities at individual posts at an installation or activity. Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX P, DESIGNATED RESTRICTED AREAS This annex includes a listing of all designated restricted/controlled areas on the installation or facility. Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX Q, INSTALLATION MISSION ESSENTIAL OR VULNERABLE AREAS (MEVAs) This annex includes a list of all mission essential vulnerable areas (MEVAs) on the installation or facility. Map Reference Copy No.___________ Issuing Headquarters Place of Issue Date of Issue ANNEX R, Maps of THE INSTALLATION OR FACILITY This annex includes the maps and map keys for the installation or facility. GLOSSARY This annex spells out any acronyms used in this physical security plan.     FOR TRAINING PURPOSES ONLY Center for Development of Security Excellence February 2013  PAGE \* MERGEFORMAT 25 of  NUMPAGES \* Arabic \* MERGEFORMAT 25 FOR TRAINING PURPOSES ONLY Center for Development of Security Excellence February 2013  PAGE \* MERGEFORMAT 1 of  NUMPAGES \* Arabic \* MERGEFORMAT 1 FOR TRAINING PURPOSES ONLY Center for Development of Security Excellence February 2013  PAGE \* MERGEFORMAT 26 of  NUMPAGES \* Arabic \* MERGEFORMAT 26 CHECK LIST WHEN YOU RECEIVE A BOMB THREAT Time and Date Reported___________________________________________ How Reported___________________________________________________ Exact Words of Caller_____________________________________________ Questions to Ask: 1. When is bomb going to explode? __________________________________ 2. Where is bomb right now? _______________________________________ 3. What kind of bomb is it? _________________________________________ 4. What does it look like? __________________________________________ 5. Why did you place the bomb?_____________________________________ 6. From where are you calling? _____________________________________ 7. Description of Callers Voice: _____________________________________ Male ___Female ___Young ____Middle Age _____Old _______Accent ______ Tone of Voice ____________________________________________________ Background Noise ________________________________________________ Is Voice Familiar _________? If so, who did it sound like? ________________ Other characteristics ______________________________________________ Time Caller Hung Up ________ Remarks _________________________ Immediately notify your supervisor, then the police desk sergeant. Keep this list with you. )P^_m|}s  ) *  & 7 8 9 : ܴxj]j]VIh-_hHOJQJ^J h.hHhJhHOJQJ^JhJhH5OJQJ^JhhHOJQJ^JhhH5OJQJ^Jh(6OJQJ^Jht#hHOJQJ^JhHOJQJ^Jh.hHOJQJ^Jh.hHOJQJ\^JhH5OJQJ\^Jh.hH5OJQJ\^JhB*phhU*hHB*ph )P_n|}t u   & F7$8$H$gd8  & F phh7$8$H$^hgd8 7$8$H$gda@7$8$H$^`gd6 7$8$H$^gd6 d^gd6 7$8$H$gd6h&d0P0gdU*gdc    & - 8 $ $Ifa$gdJ h^gda@ & F7$8$H$gd8 7$8$H$gda@8 9 : ; N@0$ $Ifa$gd:h $7$8$H$Ifgd:hkd$$Ifs4F-O'""8  0    4+4 sapytSs; < = > ? @ hZJ= $Ifgd:h$ $Ifa$gd:h $7$8$H$Ifgd:hkd$$IfsF-O'""8 0    4+4 saytJ $Ifgd: < = > ? @ A B V W i 󹮹󹣹zkdVH *hhHOJQJ^J *hH%hHOJQJ^J hC#JhHhDhHOJQJ^JaJh-hH5OJQJ^JhDhH5OJQJ^Jh-hHOJQJ^JhH5OJQJ^Jh5OJQJ^Jh.hH5OJQJ^J *h-hHOJQJ^JhHOJQJ^Jh-_hHOJQJ^J h.hHh.hHOJQJ^J@ A B udddTTT$ $Ifa$gdD hP^gda@kd$$IfsF-O'""8 0    4+4 saytJ NA1A$ $Ifa$gd:h $Ifgd:hkd1$$Ifs4F-O7""H  0     4+4 sapytSs uhXh$ $Ifa$gd:h $Ifgd:hkd$$$IfsF-O7""H 0     4+4 saytJ uffYIII$ $Ifa$gdD ^gda@ !^gda@kd$$IfsF-O7""H 0     4+4 saytJ    78ŷŷqc *hH%hHOJQJ^J *hH%hH5OJQJ^Jh0#4hHOJQJ^JhhNhHOJQJ^JhphHOJQJ^JhDhHOJQJ^JaJh-hH5OJQJ^JhDhH5OJQJ^JhH5OJQJ^Jh.hH5OJQJ^Jh.hHOJQJ^J h.hH!  NAAA $Ifgd:hkdb$$IfsF-"   0    4+4 sapytD    uhhh $Ifgd:hkdV$$IfsF-"  0    4+4 saytJuhWWGGG$ $Ifa$gdD hP^gda@ ^gda@kd$$IfsF-"  0    4+4 saytJL;+$ $Ifa$gd:h L$If]Lgd:hkd$$Ifs4F-7" H  0     4+4 sapytDhWG$ $Ifa$gd:h L$If]Lgd:hkd$$IfsF-7" H 0     4+4 saytJ $Ifgd:h!"#&'*+,-8PVWabcdefghijklmyȺȯȺȯwwȺȯhD;hHOJQJ^JhSshHOJQJ^JaJh-hH5OJQJ^JhSshH5OJQJ^JhH5OJQJ^Jh.hH5OJQJ^Jh.hHOJQJ^JhHOJQJ^J h.hHhVhHOJQJ^JhGmxhHOJQJ^J*"uhhXXX$ $Ifa$gdSs ^gda@kd*$$IfsF-7" H 0     4+4 saytJ"#$%I8($ $Ifa$gd:h L$If]Lgd:hkd$$Ifs44F-7" H  0     4+4 saf4pytSs%&'()*hWG$ $Ifa$gd:h L$If]Lgd:hkd $$IfsF-7" H 0     4+4 saytJ $Ifgd:h*+,-PWbuhhXXX$ $Ifa$gdSs ^gda@kde $$IfsF-7" H 0     4+4 saytJbcdefL?/?$ $Ifa$gd:h $Ifgd:hkd $$Ifs4F-7" H  0     4+4 sapytSsfghijuhXh$ $Ifa$gd:h $Ifgd:hkd $$IfsF-7" H 0     4+4 saytJjklmuddTTT$ $Ifa$gdSs hP^gda@kd $$IfsF-7" H 0     4+4 saytJN=1( $Ifgd:h $$Ifa$gd:h L$If]Lgdlkd9 $$IfsF-_! p  02    4+4 sapytSs$%&()*ȺwjjjjȺw߭jhThHOJQJ^JhSshHOJQJ^JaJh-hH5OJQJ^JhSshH5OJQJ^JhH5OJQJ^Jh.hHOJQJ^Jh.hH5OJQJ^JhhNhHOJQJ^JhHOJQJ^J h.hHhuhHOJQJ^Jh"hHOJQJ^J%udXK $Ifgd:h $$Ifa$gd:h L$If]Lgdlkd-$$IfsF-_! p02    4+4 saytJuddTTT$ $Ifa$gdSs hP^gda@kd$$IfsF-_! p02    4+4 saytJL;/ $$Ifa$gd:h L$If]Lgd:hkdk$$Ifs4F-_! p  02    4+4 sapytSshWK $$Ifa$gd:h L$If]Lgd:hkdb$$IfsF-_! p02    4+4 saytJ $Ifgd:h%uddTTT$ $Ifa$gdSs hP^gda@kd$$IfsF-_! p02    4+4 saytJ%&'(L7* $Ifgd:h Ld$If]L^dgd:hkd$$Ifs4F-" $  0    4+4 sapytSs()*+,scV $Ifgd:h$ $Ifa$gd:h Ld$If]L^dgd:hvkd$$Ifs0-" 04+4 saytJ*+,-./9QWXbcdghklt(^_LM,-6Ƹuݫݫhhh[ӫӫ[ӫhahHOJQJ^JhXzhHOJQJ^JhSshHOJQJ^JaJh-hH5OJQJ^JhSshH5OJQJ^JhH5OJQJ^Jh.hHOJQJ^Jh.hH5OJQJ^JhhNhHOJQJ^JhHOJQJ^J h.hHhThHOJQJ^Jh-VhH5OJQJ^J#,-./QXcuddTTT$ $Ifa$gdSs hP^gda@kd($$IfsF-" $ 0    4+4 saytJcdefL;+$ $Ifa$gd:h L$If]Lgd:hkd$$Ifs4F-" $  0    4+4 sapytSsfghijkhWG$ $Ifa$gd:h L$If]Lgd:hkd$$IfsF-" $ 0    4+4 sayt% $Ifgd:hklm(_umWNC6 & F7$8$H$gd8 & Fdgd8 7$8$H$gda@ & F phh7$8$H$^hgd8 dgda@kd]$$IfsF-" $ 0    4+4 sayt%_t62M\y & F @ 2 2 d^2 `gd8 & F7$8$H$gd8 & F7$8$H$gd8  & F @ 2 2 d^2 `gd8 & F7$8$H$gd8 -6j'd~NO_ & F 7$8$H$gd8 gdhN & F7$8$H$gd8 & F7$8$H$gd8 & F7$8$H$gd8 & F7$8$H$gd8 & Fdgd8 7$8$H$gda@6P&'d~MNO^_t23<>WXbckn-.<=jl}A`)opq& ' S T H!M!U!V!o!!!h&hHOJQJ^Jh]hHOJQJ^JhhNhHOJQJ^JhwhHOJQJ^JhahHOJQJ^JhHOJQJ^Jh.hHOJQJ^JB,L_tu %-3 & F7$8$H$gd8 $ & F7$8$H$gd8 & F7$8$H$gd8 & Fdgd8 7$8$H$gda@ & F phh7$8$H$^hgd8 p7$8$H$^pgdw & F7$8$H$gd8 3I\r=>Xcmns & Fd7$8$H$gd8 & F 7$8$H$gd8 87$8$H$^8gda@ & F7$8$H$gd8 & Fdgd8 7$8$H$^gdw & F 7$8$H$gd8 s-.=GKQkla & F7$8$H$gd8 87$8$H$^8`gda@ & F 7$8$H$gd8 & Fdgd8 8d7$8$H$^8gd] & F7$8$H$gd8 *6>T]pqT h } !  h7$8$H$^`hgda@ 8d^8gdB2 & F7$8$H$gd8 & Fdgd8 7$8$H$^gda@ & F7$8$H$gd8 & F7$8$H$gd8 !=!V!o!!!!!!!"A"_"`"$$%:%%%% p7$8$H$^pgd 9^gdB2 7$8$H$^gdB2 7$8$H$gdB2 & F7$8$H$gd8 & F7$8$H$gd8 & F7$8$H$gd8 !!!!!!A"^"_"`"%9%%%%%U'''''''''''y(z(((((((())p))))˻vi󡑮vvvhH5OJQJ\^Jh|GhHOJQJ^J *hJhHOJQJ^Jh.hH5>*OJQJ^Jhq5>*OJQJ^JhH5>*OJQJ^Jh.hH5OJQJ\^JhB2hHOJQJ^JhHhJhHOJQJ^JhHOJQJ^Jh.hHOJQJ^J)%%%T'}'''''''x(y((((((((gda@ 7$8$H$gdcKG 7$8$H$gda@gdcKG 7$8$H$gdU*7$8$H$^`gdU*gdU* 7$8$H$^gdB2^gdB2p^pgd 9())))***=*>*+++++,,V,o,z,,,,, & F7$8$H$gd8 7$8$H$gdsIgda@7$8$H$^`gda@ 7$8$H$gda@)****=*>*Q*R*?+A+s+++++,,,,,,,,,Ŵ㪝yl_UHUlUhThHOJQJ^JhHOJQJ^Jh|GhHOJQJ^Jh]\hHOJQJ^JhH5>*OJQJ^Jhq5>*OJQJ^Jhx`OJQJ^Jh|GhsIOJQJ^JhsIOJQJ^J!huhH5;>*OJQJ^Jhq5;>*OJQJ^Jh.hH5>*OJQJ^Jh.hHOJQJ^Jh.hH5OJQJ\^J,,,-;-P-_-m-n---..X/Y////////0gd*+ 7$8$H$gd*+gda@7$8$H$^`gda@ 7$8$H$gdK & F7$8$H$gd8 ,, -------m-n-v---..W/Y/Z//////0000000X1Y1a1x1y1z12ƶxƶxm`hO,hHOJQJ^JhH5OJQJ^J h*+hHh*+hHOJQJ^Jh.hH5>*OJQJ^Jhq5>*OJQJ^Jh.hHOJQJ^Jh.hH5OJQJ\^JhH5OJQJ\^JhHOJQJ^Jjh:'Ujh:'UmHnHuh:'jh:'U%000000000&1;1J1X1Y1y1z122222 7$8$H$gdO, 7$8$H$^gda@7$8$H$^`gda@ 7$8$H$gda@gda@gd*+ & F7$8$H$gd8 7$8$H$gd*+222222255k5l5t55556*6,6-666666677778xnanTnhx`homOJQJ^JhomhomOJQJ^JhomOJQJ^Jhx`hHOJQJ^JhH5OJQJ\^JhO,hHOJQJ^JhH5>*OJQJ^JhH6OJQJ]^JhhHOJQJ^Jh.hH5>*OJQJ^Jhq5>*OJQJ^Jh.hH5OJQJ\^Jh.hHOJQJ^J22222595N5]5k5l555*6+6,6U6j6y6666 7$8$H$gdO,7$8$H$^`gda@gd%zN 7$8$H$gd 7$8$H$gda@gda@ 7$8$H$^gda@6688888888(9)9w:x::::::;;I<J< gda@7$8$H$^`gda@ 7$8$H$^gda@ 7$8$H$gda@ 7$8$H$gdO,gda@8*82838J88888889'9(9)9-949<999999v:x:y::::;;;;.;²¤{{{{n¤cUch.hHOJQJ\^JhHOJQJ\^JhH5OJQJ\^JhHOJQJ^JhuhH;OJQJ^J!huhH5;>*OJQJ^Jhq5;>*OJQJ^Jh.hH5OJQJ\^Jh.hHOJQJ^Jh.hH6OJQJ]^JhO,hHOJQJ^JhomOJQJ^Jh*.OJQJ^J!.;v;;J<K<<<<<<[=\=]=========>)>*>>ɻɎvfYLfv>>>hhHOJQJ\^Jhq5>*OJQJ^JhH5>*OJQJ^Jh.hH5>*OJQJ^Jh.hHOJQJ^JhH5OJQJ^Jh4hHOJQJ\^JhuhH;OJQJ^J!huhH5;>*OJQJ^Jhq5;>*OJQJ^Jh.hH5OJQJ\^JhH5OJQJ\^JhHOJQJ\^Jh.hHOJQJ\^JJ<s<<<<<<[=\========@@@@@@A 7$8$H$gdgda@7$8$H$^`gda@ 7$8$H$^gda@ 7$8$H$gda@>>>>J?K???@@@@AAAA-A8A=AAAAAAAAABB*B+BBBBBBB#C%C0C1C7C8CCCCCɼɼɼuuhH5;>*OJQJ^Jh0hHOJQJ\^JhzhHOJQJ\^JhH5>*OJQJ^Jh.hH5>*OJQJ^Jh.hHOJQJ^Jh.hH5OJQJ\^JhH5OJQJ\^JhhHOJQJ\^JhHOJQJ\^J.AAAAAAAABBBBBBB$C%CCCCC7$8$H$^`gdVdgdVdgd%zNgda@7$8$H$^`gda@dgdXdgdzdgda@CCCCDDlDmDnDoDxDDDDDDDDDDDDD  !P1gdU*gd%, 7$8$H$gda@gdgda@7$8$H$^`gdVCCCCDDD!D7D@DDDIDkDlDmDoDwDxDzDDDDDDDDDDDDDµxµplplplpleaXhH5OJQJhNA hU*hHh4 jh4 Uh.hH5>*OJQJ^J$hH6CJOJQJaJmHnHuhbhH5>*OJQJ^JhHOJQJ^JhhHOJQJ^JhH5>*OJQJ^J!hXhH5;>*OJQJ^JhH5;>*OJQJ^J!huhH5;>*OJQJ^JDDDEE"E&E'E(E)E@EAECEDEHEIEnEoEqErEsEǹǓǓxtx^F5 hU*hHCJOJQJ^JaJ.jhMCJOJQJU^JaJmHnHu+h<2~h<2~CJOJQJ^JaJmHnHuhMjhMU%h<2~CJOJQJ^JaJmHnHu)jhVhHCJOJQJU^JaJ hQhHCJOJQJ^JaJhJ|3CJOJQJ^JaJ hVhHCJOJQJ^JaJ#h}7)hH6CJOJQJ^JaJhHOJQJ *hHB*OJQJphDDEsEtEEEFFFF5FcFFFFFF,G-GmGnGgdU*$a$gdU*  !P1gdU*$ !H$(dRa$gdU*$ !H$Pa$gdU*sEtEEEEEEEEEEEEEEEEEFFFF˺skgkQ9.jhMCJOJQJU^JaJmHnHu+h<2~h<2~CJOJQJ^JaJmHnHuhMjhMU%h<2~CJOJQJ^JaJmHnHu)jhVhHCJOJQJU^JaJ hQhHCJOJQJ^JaJhJ|3CJOJQJ^JaJ hVhHCJOJQJ^JaJ#h}7)hH6CJOJQJ^JaJhHOJQJ *hHB*OJQJphhH5OJQJhNAFFFFF3F4F5FcFdFqFrFsFFFFFFFFFFųld`dJ+h<2~h<2~CJOJQJ^JaJmHnHuhMjhMU%h<2~CJOJQJ^JaJmHnHu)jhVhHCJOJQJU^JaJhJ|3CJOJQJ^JaJ hVhHCJOJQJ^JaJ#h}7)hH6CJOJQJ^JaJhHOJQJ *hHB*OJQJphhH5OJQJ hU*hHhNA hU*hHCJOJQJ^JaJFFFFFFFG+GXGmGGGG H0HPHI$IIIkJJJJ6K7KKKXKYK[KKKKKKK¸¸¸¸¸¸¸¸¸¸¸¸¸¸ϸhHOJQJ^Jh.hHOJQJ^Jh4 hNA hU*hHCJOJQJ^JaJ.jhMCJOJQJU^JaJmHnHu$nGGGGG H HPHQHHHHH%I&IlImIIIIIAJBJJJJJKKYKgdU*YKZKKKKK 7$8$H$gda@gdU*5 01h:pU*/ =!"#b$% 5 01h:p#/ =!"#b$% $$If!vh#v"#v#v8 :V s4  0,5"558 4+4 sapytSs$$If!vh#v"#v#v8 :V s05"558 4+4 saytJ$$If!vh#v"#v#v8 :V s05"558 4+4 saytJ$$If!vh#v"#v#vH :V s4  0 ,5"55H 4+4 sapytSs$$If!vh#v"#v#vH :V s0 5"55H 4+4 saytJ$$If!vh#v"#v#vH :V s0 5"55H 4+4 saytJ$$If!vh#v #v#v :V s  0,5 55 4+4 sapytD$$If!vh#v #v#v :V s05 55 4+4 saytJ$$If!vh#v #v#v :V s05 55 4+4 saytJ$$If!vh#v #v#vH :V s4  0 ,5 55H 4+4 sapytD$$If!vh#v #v#vH :V s0 5 55H 4+4 saytJ$$If!vh#v #v#vH :V s0 5 55H 4+4 saytJ$$If!vh#v #v#vH :V s44  0 ,5 55H 4+4 saf4pytSs$$If!vh#v #v#vH :V s0 5 55H 4+4 saytJ$$If!vh#v #v#vH :V s0 5 55H 4+4 saytJ$$If!vh#v #v#vH :V s4  0 ,5 55H 4+4 sapytSs$$If!vh#v #v#vH :V s0 5 55H 4+4 saytJ$$If!vh#v #v#vH :V s0 5 55H 4+4 saytJ$$If!vh#v #v#vp:V s  02,5 55p4+4 sapytSs$$If!vh#v #v#vp:V s025 55p4+4 saytJ$$If!vh#v #v#vp:V s025 55p4+4 saytJ$$If!vh#v #v#vp:V s4  02,5 55p4+4 sapytSs$$If!vh#v #v#vp:V s025 55p4+4 saytJ$$If!vh#v #v#vp:V s025 55p4+4 saytJ$$If!vh#v #v#v$ :V s4  0,5 55$ 4+4 sapytSs$$If!vh#v #v:V s05 54+4 saytJ$$If!vh#v #v#v$ :V s05 55$ 4+4 saytJ$$If!vh#v #v#v$ :V s4  0,5 55$ 4+4 sapytSs$$If!vh#v #v#v$ :V s05 55$ 4+4 sayt%$$If!vh#v #v#v$ :V s05 55$ 4+4 sayt%Dd!"D  3 @@"?f< >666666666vvvvvvvvv6666>66666666666666666666666666666666666666666666666hH66666666666666666666666666666666666666666666666666666666666666666062 0@P`p28 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~OJQJ_HmH nH sH tH @`@ cNormalOJQJ_HmH sH tH V@V c Heading 1$xx@&B* CJ0OJQJaJ0phT8@8 a@0 Heading 2$@&CJH@H %, Heading 3 d @&CJOJQJaJ<@< a@ Heading 4$@&5CJDA D Default Paragraph FontRi@R 0 Table Normal4 l4a (k ( 0No List JoJ cHeading 1 CharB* CJ0OJQJphT@o@ a@0Heading 2 Char CJOJQJ@o@ %,Heading 3 Char CJOJQJDo!D a@Heading 4 Char5CJOJQJ4@24 c0Header !:oA: c0 Header Char CJOJQJ4 @R4 c0Footer !:oa: c0 Footer Char CJOJQJHOrH c Overview Text d (OJQJHoH cOverview Text Char CJOJQJPOP c Heading 0 $B*CJ$OJQJaJ$ph9sJoJ cHeading 0 CharB*CJ$OJQJph9sROR cHeading 2 Alternate 1CJaJXOX cHeading 2 Alternate 2B* CJ$aJ$phTbob cHeading 2 Alternate 1 CharB*CJOJQJph9sbob cHeading 2 Alternate 2 CharB* CJ$OJQJphTTOT  1Table Bullet 1  Fd B*OJQJphPoP 1Table Bullet 1 CharB*OJQJphPOP "%, Challenges!d B*CJOJQJaJphLo!L !%,Challenges CharB*CJOJQJphTO2T $wV Scenario Text#d a$CJOJQJaJHoAH #wVScenario Text Char CJOJQJ2B@R2 &a@0 Body Text%CJ@oa@ %a@0Body Text Char CJOJQJ.)q. a@0 Page Number<P< )a@0 Body Text 2 (dx@o@ (a@0Body Text 2 CharOJQJ>'`> a@0Comment ReferenceCJ4@4 ,a@0 Comment Text+BoB +a@0Comment Text CharOJQJ@j@@ .a@0Comment Subject-5\LoL -a@0Comment Subject Char 5OJQJD@D 0a@0 Balloon Text/CJOJQJaJFoF /a@0Balloon Text Char CJOJQJr@r a@0 Table Grid7:V101OJQJLC@"L 3a@0Body Text Indent 2x^hCJaJNo1N 2a@0Body Text Indent Char CJOJQJVR@BV 5a@0Body Text Indent 24dx^hCJaJRoQR 4a@0Body Text Indent 2 Char CJOJQJ8Z@b8 7a@0 Plain Text6OJQJ>oq> 6a@0Plain Text CharOJQJD@D a@0List Paragraph8^CJaJJ^@J a@0 Normal (Web)9dd[$\$CJaJBOaB ;1 Table Text:d  OJQJaJBoB :1Table Text Char CJOJQJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭V$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3N)cbJ uV4(Tn 7_?m-ٛ{UBwznʜ"Z xJZp; {/<P;,)''KQk5qpN8KGbe Sd̛\17 pa>SR! 3K4'+rzQ TTIIvt]Kc⫲K#v5+|D~O@%\w_nN[L9KqgVhn R!y+Un;*&/HrT >>\ t=.Tġ S; Z~!P9giCڧ!# B,;X=ۻ,I2UWV9$lk=Aj;{AP79|s*Y;̠[MCۿhf]o{oY=1kyVV5E8Vk+֜\80X4D)!!?*|fv u"xA@T_q64)kڬuV7 t '%;i9s9x,ڎ-45xd8?ǘd/Y|t &LILJ`& -Gt/PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!0C)theme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] Co<C7 VVVVVX: *6!),28.;>CDsEFFK&+06?GNTWY[^_adeghi 8 ; @  "%*bfj%(,cfk_3s!%(,026J<ACDnGYKK'()*,-./12345789:;<=>@ABCDEFHIJKLMOPQRSUVXZ\]`bcfjk$ %%C_g $&+QS!!!T # @H 0(  .(    F@?"Text Box 2S" ?PK!8[Content_Types].xmlAN0EH%N@%邴K@`dOdlyLhoDX3'AL:*/@X*eRp208J妾)G,R}Q)=HiҺ0BL):T뢸WQDY;d]6O&8* VCLj"󃒝 yJ.;[wIC_ :{IOA !>Ø4 p;fɑ3׶Vc.ӵn(&poPK!8! _rels/.relsj0 }qN/k؊c[F232zQLZ%R6zPT]( LJ[ۑ̱j,Z˫fLV:*f"N.]m@= 7LuP[i?T;GI4Ew=}3b9`5YCƵkρؖ9#ۄo~e?zrPK!f%\zdrs/e2oDoc.xmlTێ }@gvX묶qRU^~b@bo{dݗ003sff$:pVNqE5jW#bDj+Y~uݛgՒqD7n7e8+mcmG<.a$NgI-3VS֣/#~p?7 Cn>6۰&kR,14?d &/:AvWTwnAyll[bxq\&`p"BuzJp7.Gi!W-Q;~k[Nd/OG@G {vtP ХsgB*."K30QE" scu¦Z)O.!!elTȊcpsv]I$(>Ǹҭd,EWىkbOTAn(b=_I֓|Zד*6ۢ~SVu+e+*zn4C4,g1%yBGa;@A8="~#iQ#Ya}O,H~PEa!/fp( Pە~oصiԱҷFDq) )X.Z)ؿ<ެAN|RmuyQb=ө` T8R'aGrd18uROxfsk*I2iqpH=2}jslfnAD2 TAHM&O RPK-!8[Content_Types].xmlPK-!8! /_rels/.relsPK-!f%\z.drs/e2oDoc.xmlPK-!Badrs/downrev.xmlPK B S  ?%C!"t9:;<=>CCB*urn:schemas-microsoft-com:office:smarttagscountry-region9*urn:schemas-microsoft-com:office:smarttagsplace mOYis$%<<<<<<<<<<(=D=H=r====>r>>>>>>CC<<(=D=H=r====>r>>>>>CCC$%<<(=D=H=r====>r>>>>C$%;;;<<<<<<<<<<<<(=D=H=r====>r>>>>>>CC n ( "hs8\ :` ?ޢnIޢnfe:ޢnrqH "d,45sIJD6H4mHUPRu*.8 z{`%/S a@G_-_N`u%1z^)(|G(6l]I,B2~$,=>,AVbVFJ#1\-5;Mcl@ZTTb~tkuU(IeS K 0jw 9Ss&Pt#Bl)!]\h*+:h:'`3pQXfpJ'i<<@Cp@Unknown G*Ax Times New Roman5Symbol3. *Cx Arial7.@Calibri5.  Impact5. .[`)Tahoma?= *Cx Courier New;WingdingsA$BCambria Math"1h^w+#g 3n 3n!b0<<NHP $PmH2!xx lC:\Users\cynthia.morris\Documents\cynthia working\Templates\_handouts\Case Studies\CDSE_ILT_cs_template2.dotPhysical Security Plan Template1DSS Center for Development of Security ExcellenceRoberts, Lindsey, CTR, DSS                         Oh+'0 , P\ |   Physical Security Plan Template4DSS Center for Development of Security ExcellenceCDSE_ILT_cs_template2Roberts, Lindsey, CTR, DSS4Microsoft Office Word@F#@b<@Zh8 3՜.+,0 hp   Microsoftn<  Physical Security Plan Template Title  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklnopqrstuvwxz{|}~Root Entry Fo8Data m1TableyjWordDocumentnSummaryInformation(DocumentSummaryInformation8CompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q