Tag Security | AskTOP.net – Leader Development for Army Professionals

Security

Here is a list of everything we have published about Security

Security Manager’s Standard Operating Procedures

This SOP was published to provide guidance for Brigade unit Security Managers to follow in establishing and maintaining an effective security program.  It provides a handy resource document to guide Security Managers and Commanders.  This SOP is to be used in …Read More

Article by

Corps Support Command Badge SOP

This SOP states sll personnel entering COSCOM Headquarters, are required to wear a badge as identification and for force protection.  During an increase in threat level for III Corps and Fort Hood, the badge policy allows security forces to control …Read More

Article by

Physical Security SOP

The purpose of this plan provides measures designed to safeguard personnel, to prevent unauthorized access to equipment, facilities, materials and documents and to safeguard them against espionage, sabotage, damage and theft.  This SOP applies to all assigned and attached personnel …Read More

Article by
Army Counseling Software - Include over 250 Army Counseling Examples
Battlefield Deception Guide - From Alexander the Great to Norman Schwarzkopf

Inventories of Weapons and Sensitive Items SOP

This SOP will establish the general policy for accountability of weapons and sensitive items on a monthly basis, that are not on hand at the owning unit.  For the purpose of this SOP a “unit” is defined as an element …Read More

Article by

Intrusion Detection System (Physical Security) SOP

The purpose of the SOP is to establish and outline policies and procedures for operation, testing and maintenance of the Intrusion Detection System for the Arms Room. This SOP applies to only authorized personnel with access to enter Arms Room. …Read More

Article by

Global Command And Control System-Army Remote Terminal Site Security SOP

The purpose of this SOP is to establish responsibilities, procedures, and use of FORSCOM Global Command and Control System (GCCS) safeguards in order to protect GCCS hardware, software, information, and data from denial of use, damage/destruction, unauthorized disclosure, unauthorized modification, …Read More

Article by
The comprehensive guide to the Military Decision Making Process (MDMP)
Wear it Right! Army Uniform Tool

Brigade Communication Security SOP

This s Brigade Communication Security (COMSEC) External Standing Operating Procedures. It is to provide hand receipt holders guidance, operating procedures and methods to safeguard all COMSEC material.  The commander’s responsibility is to ensure that these procedures are adhered to and …Read More

Article by

AR 380-86 Classification of Former Chemical Warfare, Chemical and Biological Defense, and Nuclear, Biological, and Chemical Contamination Survivability Information

This regulation: a. Provides guidance for classification of U.S. Army former chemical warfare materiel, chemical and biological defense, and nuclear, biological, and chemical contamination survivability information. b. Concerns research, development, testing, and evaluation, and the procurement of chemical and biological …Read More

Article by

AR 380-67 Personnel Security Program

This regulation implements the DOD and Department of the Army Personnel Security Program and takes precedence over all other departmental issuances affecting these programs. It contains the policies and procedures for access to classified information and assignment in a sensitive …Read More

Article by

AR 380-6 Laser Guidance Systems Security Classification Guide

This regulation: a. It prescribes Department of the Army responsibilities, policies, and criteria governing the security classification of information pertaining to laser guidance systems. b. It regulation covers devices that use laser energy for the following purposes: (1) Determining range …Read More

Article by

AR 380-53 Communications Security Monitoring

This regulation sets forth policies, responsibilities, and procedures for conducting communications security monitoring, information operations Red Team activities, and Computer Defense Association Program activities within the Army and in support of Joint and combined operations and activities. The principles of …Read More

Article by

AR 380-5 Department of the Army Information Security Program

This regulation establishes the policy for the classification, downgrading, declassification, transmission, transportation, and safeguarding of information requiring protection in the interests of national security. It primarily pertains to classified national security information, now known as classified information, but also addresses …Read More

Article by