In-depth look at ISACS 05.20 Stockpile Management: Weapons Photo: MAG.

Slides:



Advertisements
Similar presentations
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Advertisements

Module N° 7 – SSP training programme
Security and Stockpile
Environmentally sound management of ship recycling- simple or complex? Roy Watkinson Department for Environment, Food and Rural Affairs UK Promoting Sustainable.
A Joint Code of Practice Objectives and Summary Presentation
Major Accident Prevention Policy (MAPP) and Safety Management System (SMS) in the Context of the Seveso II Directive.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Pakistan Nuclear Regulatory Authority
Environmental Management System (EMS)
In-depth look at ISACS Marking and Recordkeeping.
Temporary storage Sven Hagemann GRS. Types of temporary storage 1.Storage of commodity mercury  Dealer, wholesaler, governmental stocks 2.Storage of.
UNIT PHYSICAL SECURITY PLAN
Addressing safety and security while delivering an effective microbiology service Brian I. Duerden & Sam Gillanders Inspector of Microbiology and Infection.
1 Introduction to Security Chapter 15 Institutional Security.
Baltimore City Public Schools EMERGENCY MANAGEMENT RESPONSE PLAN DEVELOPMENT KAREN WEBBER-NDOUR, EXECUTIVE DIRECTOR OFFICE OF STUDENT SUPPORT AND SAFETY.
BRC Storage & Distribution Safety and Quality Management System Training Guide
Lecture 8. Quality Assurance/Quality Control The Islamic University of Gaza- Environmental Engineering Department Environmental Measurements (EENV 4244)
In-depth look at ISACS Tracing illicit small arms and light weapons.
ONR Presentation to NuLeAF Tanya MacLeod. Responsibilities Prime responsibility for the assessment and management of Flood and Coastal Risk on site rests.
Regulatory Body MODIFIED Day 8 – Lecture 3.
Quality Assurance/Quality Control Policy
World Health Organization
In-depth look at ISACS Border controls and law enforcement cooperation.
Control environment and control activities. Day II Session III and IV.
1 Perimeter Security System. 2 Performance Objectives 1. List the four key duty posts of the Perimeter Security System. 2. Explain the purpose of perimeter.
BRC Food Safety Quality Management System Training Guide
Session No. 3 ICAO Safety Management Standards ICAO SMS Framework
World Health Organization
SALW Control, Security & Development Overview Introduction DDR and SALW Control International agreements SALW Control measures Guiding principles.
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
Technical Meeting on Evaluation Methodology for Nuclear Power Infrastructure Development December, 2008 Nuclear Safety in Infrastructure Building.
1 European Conference on Training Strategies Kieran Cox -NSAI Education & Promotion-
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
Module 5: Assuring the Quality of HIV Rapid Testing
INITIAL OSHA & DOT TRAINING MODULE 10 Security. INITIAL OSHA & DOT TRAINING Module 10 – Security Introduction The Transportation Security Administration.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Introduction to Risk Management C7 Slide 1. The Concept of Safety  ‘Safety’ refers to the reduction of risk to a tolerable level  Risk = Likelihood.
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 4 – 1 Transaction Processing and the Internal Control.
Risk Assessment. Risk As defined by Kaplan and Garrick, risk analysis consists of answering three specific questions: what can happen? what is the chance.
The United Nations Regional Centre for Peace, Disarmament and Development in Latin America and the Caribbean Ensuring proper integration of small arms.
ZHRC/HTI Financial Management Training Session 9: Stores and Supplies Management.
Hazardous Materials Company Anti-Terrorism Tips. Overview This presentation is designed to inform companies of the appropriate steps that should be taken.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
International Legislation AT02 Slide 1. UN Firearms Protocol AT02 Slide 2.
Chapter 6 Enhancing Security Through Procedural Controls.
Main Requirements on Different Stages of the Licensing Process for New Nuclear Facilities Module 4.5/1 Design Geoff Vaughan University of Central Lancashire,
Organization and Implementation of a National Regulatory Program for the Control of Radiation Sources Regulatory Authority.
Control of Explosive Facilities MA8 Slide 1. Operational Procedures Personnel to be Suitably Qualified and Experienced Conditions of employment Security.
Security of Ammunition Depots
Import and Export of Ammunition AT04 Slide 1. Terminology  Transfer  Authorisation AT04 Slide 2.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
© Plan Plan’s Security Framework – A Refresher. © Plan Understanding Ourselves Values - Child Rights, Impartial, Neutral, Sensitive Mandate - Child Centred,
MINE SAFETY MANAGEMENT PLAN. DIRECTORATE GENERAL OF MINES SAFETY DGMS n It is recommended that mines be required to put in place Mine Safety Management.
Tracing Requirements AT06 Slide 1. Identification of Ammunition  Essential information Type Calibre Model Lot and Batch Number AT06 Slide 2.
Agreement concerning the adoption of uniform conditions for periodical technical inspections of wheeled vehicles and the reciprocal recognition of such.
Visit us at E mail: Tele:
Scientific data storage: How are computers involved in the following?
Appropriate record of compliance with customs requirements Satisfactory system of managing commercial and, where appropriate, transport.
1 Export Control of Dual-Use Items and Arms: Industry Outreach Sofia, May, 2006 POLAND’S EXPERIENCES INDUSTRY OUTREACH and PERSONNEL TRAINING JACEK.
Storage, Labeling, Controlled Medications Guidance Training CFR § (b)(2)(3)(d)(e) F431.
Abfallbewertung Bundesabfallwirtschaftsplan Andreas Moser t Tel: Establishment of inspection plans: The role of.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
UNDERSTANDING ISO 9001:2008.
Module Planned exposure situations Public exposure (GSR Part 3)
Safety and Security of Radiation Sources
International Workshop on National Registers of Radiation Sources
Oman Experience on Telecommunications Emergency Plan
Security Management Definition: security is a proactive measure taken protect , prevent and safeguard both human material resources. Objectives of security.
OSU Controlled Substances Training Module for Researchers
Presentation transcript:

In-depth look at ISACS Stockpile Management: Weapons Photo: MAG

United Nations framework In the UN Programme of Action, all UN Member States commit: “To ensure […] that the armed forces, police or any other body authorized to hold small arms and light weapons establish adequate and detailed standards and procedures relating to the management and security of their stocks of these weapons.” Section II, Paragraph 17

United Nations framework In the UN Programme of Action, all UN Member States commit: “To regularly review […] the stocks of [SALW] held by armed forces, police and other authorized bodies and to ensure that such stocks declared by competent national authorities to be surplus to requirements are clearly identified, that programmes for the responsible disposal, preferably through destruction, of such stocks are established and implemented and that such stocks are adequately safeguarded until disposal” Section II, Paragraph 18

United Nations framework In the UN Firearms Protocol, all States Parties are required to: “take appropriate measures […] To require the security of firearms, their parts and components and ammunition at the time of manufacture, import, export and transit through its territory” Article 11 [For the complete UN framework on stockpile management, see Clause 4 of ISACS – “Stockpile Management: Weapons”]

 Objective To prevent the diversion of SALW from government and other stocks to unauthorised end-users  Desired outcomes States have clearly identified and defined stockpile composition Stockpiles are situated in secure locations Stockpile facilities carry out risk assessments Stockpiles are physically secure (Depot and Unit Storage) Procedures are in place to account for inventory and report losses Surplus weapons are identified and disposed of Weapons are transported safely & securely Module overview

Stockpile composition The national stockpile should comprise function-specific stockpiles, including  Operational weapons  Operational replacement weapons  Reservist Weapons  Training Weapons  Experimental weapons  Weapons awaiting disposal

Stockpile locations  Should usually be located close to where they are needed  Guidance on centralised vs. decentralised stockpiles  Stockpile location determinants Risk assessment Requirements for access Security response time Local planning & environmental issues Local infrastructure Number of security personnel required

Stockpile risk assessment  Risk assessments of all facilities shall be carried out  A risk assessment should determine Physical threats to the local population The financial value of the facility & its contents Active and passive hazards Likelihood of an internal or external attack Vulnerability to espionage, theft, loss Vulnerability to sabotage or terrorist attack

Stockpile risk assessment  Safety reduction of risk to a tolerable level  Risk Likelihood x Consequence  Tolerable risk risk that is acceptable in a given context  Goal  Risk is “as low as reasonably practicable” – ALARP

Physical Security (Depot) Detailed section providing guidance – inter alia – on: Principles and aims of physical security Physical security systems Regulations and SOPs Security plans Staff vetting and selection Access control Physical security infrastructure (buildings & structures) Perimeter security

Physical Security Principles PS systems are derived from an effective stockpile risk assessment Weapons are stored separately from ammunition Hazardous weapons (e.g. MANPADS) are disassembled and essential components stored in different locations (unless required for current operational needs) Perimeter security infrastructure is in place

Physical Security Principles Access is controlled at all times Access is restricted to authorized personnel only Only authorized personnel with security clearance work within the facility All personnel receive appropriate training Temporary personnel are accompanied at all times

Staff vetting & selection Requirements: No criminal record Security vetting (before and during service) Training (at commencement & during service) Fair wage

Key management Keys to weapons storage areas stored separately from other keys Secured at all times Accessible only to authorized personnel who require access to weapons Regularly updated roster of key custodians Number of keys kept to a minumum… … but no master (skeleton) keys

Physical security infrastructure Buildings and structures Walls and ceilings Doors and gates Windows Locks and padlocks Weapons racks Intrusion detection systems

Perimeter security Fencing (Class 1-4) Clear zones (4m inside, 10m outside fence) Drainage structures (block access) Perimeter llumination Perimeter Intrusion detection systems (PIDS) Visual surveillance Patrols & dogs

Weapons Accounting Guidance on effective inventory management: Separation of powers (checks & balances) Accurate local weapons account Forensic records (IBIS & IBIN) Safe and efficient storage management System for issue and receipt of weapons System or regular / periodic stock checks Mechanism for reporting and investigating thefts & losses

Determination of Surplus Stocks SURPLUS: Functioning SALW in the national stockpile that are no longer required by the armed services of the State in order to ensure internal and external security Planning criteria should determine equipment needs Parameters for equipping security forces Calculation of weapons requirements (Annex B matrix)

Transport of Weapons General Requirements Risk assessment Prohibit transport by suspect companies, personnel, routes Weapons separate from ammunition Locks, seals & verification Guidance on safe & secure transport by road, sea, rail & air Related documentation

Annexes Annex A Model for a Security Plan Annex B Weapon requirement calculation matrix (to assist with the determination of surplus stocks)