DTM 09 012 c1
DTM 09 012 c1
DTM 09 012 c1
December 8, 2009
INTELLIGENCE Incorporating Change 1, September 30, 2010
Change 1, 09/30/2010 2
DTM 09-012, December 8, 2009
Attachments:
As stated
Change 1, 09/30/2010 3
DTM 09-012, December 8, 2009
DISTRIBUTION:
SECRETARIES OF THE MILITARY DEPARTMENTS
CHAIRMAN OF THE JOINT CHIEFS OF STAFF
UNDER SECRETARIES OF DEFENSE
DEPUTY CHIEF MANAGEMENT OFFICER
COMMANDERS OF THE COMBATANT COMMANDS
ASSISTANT SECRETARIES OF DEFENSE
GENERAL COUNSEL OF THE DEPARTMENT OF DEFENSE
DIRECTOR, OPERATIONAL TEST AND EVALUATION
DIRECTOR, COST ASSESSMENT AND PROGRAM EVALUATION
INSPECTOR GENERAL OF THE DEPARTMENT OF DEFENSE
ASSISTANTS TO THE SECRETARY OF DEFENSE
DIRECTOR, ADMINISTRATION AND MANAGEMENT
DIRECTOR, NET ASSESSMENT
DIRECTORS OF THE DEFENSE AGENCIES
DIRECTORS OF THE DoD FIELD ACTIVITIES
Change 1, 09/30/2010 4
DTM 09-012, December 8, 2009
ATTACHMENT 1
REFERENCES
(a) DoD Directive 5143.01, “Under Secretary of Defense for Intelligence (USD(I)),”
November 23, 2005
(b) Section 1069 of Public Law 110-181, “National Defense Authorization Act for
Fiscal Year 2008,” January 28, 2008
(c) DoD 5200.08-R, “Physical Security Program,” April 9, 2007
(d) DoD Instruction 5200.08, “Security of DoD Installations and Resources,”
December 10, 2005
(e) DoD Directive 5400.11, “DoD Privacy Program, May 8, 2007
(f) DoD 5400.11-R, “Department of Defense Privacy Program,” May 14, 2007
(g) DoD Instruction 5400.16, “DoD Privacy Act Assessment (PIA) Guidance,”
February 12, 2009
(h) DoD Instruction 5200.01, “DoD Information Security Program and Protection of
Sensitive Compartmented Information,” October 9, 2008
(i) DoD Directive 5200.27, “Acquisition of Information Concerning Persons and
Organizations not Affiliated with the Department of Defense,” January 7, 1980
(j) DoD Directive 5015.2, “DoD Records Management Program,” March 6, 2000
(k) DoD Directive 5230.20, “Visits and Assignments of Foreign Nationals,” June 22,
2005
(l) DoD Instruction 3224.03, “Physical Security Equipment (PSE) Research,
Development, Test, and Evaluation (RTD&E),” October 1, 2007
(m) DoD Instruction 1000.13, “Identification (ID) Cards for Members of the Uniformed
Services, Their Dependents, and Other Eligible Individuals,” December 5, 1997
(n) Federal Information Processing Standards Publication 201-1, “Personal Identity
Verification for Federal Employees and Contractors,” March 2006
(o) DoD Instruction 8510.01, “DoD Information Assurance Certification and
Accreditation Process (DIACAP),” November 28, 2007
5
Change 1, 09/30/2010 Attachment 1
DTM 09-012, December 8, 2009
ATTACHMENT 2
RESPONSIBILITIES
a. Establish a working group under the DoD Physical Security Review Board that
is chaired by the Physical Security Division Chief to address privacy, security, and
physical access control issues for the protection of personnel, information, resources, and
installations. The working group will:
(2) Establish physical security access control standards and other physical
access control related guidance consistent with policy and approved published standards
to support interoperability.
c. Coordinate with the Under Secretary of Defense for Policy (USD(P)) and the
Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L)) to
support the conduct of vulnerability and balanced survivability assessments of physical
access control programs, processes, and systems, as required.
d. Coordinate with the USD(AT&L) and the Under Secretary of Defense for
Personnel and Readiness (USD(P&R)):
6
Change 1, 09/30/2010 Attachment 2
DTM 09-012, December 8, 2009
a. Coordinate with the USD(I) to establish and provide an interface to the Foreign
Visitor System – Confirmation Module (FVS-CM) to provide information on and
confirm foreign visitor authorizations to visit DoD locations including research,
development, test, and evaluation (RDT&E) sites, all DoD Components, DoD contractor
sites, and other sensitive DoD facilities, pursuant to DoDD 5230.20 (Reference (k)).
b. Coordinate with the USD(I) for changes to credentials that impact or require
changes to physical security programs.
6. HEADS OF THE DoD COMPONENTS. The Heads of the DoD Components shall:
a. Coordinate with the USD(I) on the security of DoD installations and resources
in accordance with Reference (a), (c), and (d).
ATTACHMENT 3
2. PROOFING AND VETTING. The access control standards shall include identity
proofing; determining the fitness of an individual requesting and/or requiring access to
DoD facilities; and vetting.
(b) DoD Military Personnel. National Agency Check with Law and
Credit or OPM Tier II standards, when implemented.
9
Change 1, 09/30/2010 Attachment 3
DTM 09-012, December 8, 2009
(1) Persons requesting access shall provide justification and/or purpose for
access to DoD facilities.
(3) The local commander and/or director shall determine the recurring
requirement and frequency for additional checks of non-Federal Government and
non-DoD-issued card holders based upon local security requirements using Government
authoritative databases only as prescribed herein.
4. The FVS-CM.
(6) Installation personnel will issue the appropriate card and/or pass, as
authorized.
(1) Where electronic PACSs are not appropriate due to limited access
control or mission requirements, a physical and visual inspection of cards as authorized in
this DTM shall be conducted by security forces and/or guards at physical entry and/or
access control points. This inspection includes:
(b) Comparison and visual review of the card for unique topology
and security design requirements. The visual check of the card will include verifying
authenticity by checking the anti-counterfeit and/or fraud protection measures embedded
in the credential.
c. Other considerations for controlling access include, but are not limited to:
vouching for any vehicle occupants. The number of personnel a Trusted Traveler is
allowed to vouch for and/or sponsor at any one time will be determined by the local
installation commander or their designated representative.
(2) Members identified as Trusted Travelers are responsible for the actions
of all occupants for whom they vouch and for meeting all security requirements for escort
as established by the Service or installation commander.
a. In order to meet the DoD goal of enhancing security for DoD installations,
personnel, information, and resources, PACSs and their components shall:
(1) Query government authoritative data sources for the vetting of persons
requiring access.
(1) Shall be reviewed for their capability to support legacy PACSs and
components.
(5) Shall provide the capability to report and to receive information for
revoked, lost, or stolen identification cards, debarments, restricted persons, and other
information pertaining to the security and protection of DoD installations, persons, and
resources.
(6) Shall provide capability to check Federal PIV and DoD-issued cards to
verify their authenticity and for electronic authentication against physical access control
lists in the PACS database.
(8) Shall provide capability to store an updated access control list every 12
hours (or dependent on local requirements), which can be accessed offline by authorized
security personnel during losses of communication to PACS databases.
(9) Shall read contact and contactless technology IAW the Federal
Information Processing Standards Publication 201-1 (Reference (n)). Contactless
technology will be the primary technology used, as it provides for more rapid throughput
and supports less wear and tear on the reader and the card.
(10) Shall provide capability to take, store, and forward to guard stations a
facial image and/or digital photograph obtained during registration to perform visual
match of the person presenting the credential, card, or pass.
(11) Shall comply with the requirements of DoDI 8510.01 (Reference (o))
regarding certification and accreditation.
(14) May provide capability to match the biometric presented (i.e., facial
image, and fingerprint) to the individual and to the vetted claimed identity in the PACS.
(15) May provide keypad for personal identification number (PIN) usage
or for additional levels of security.
ATTACHMENT 4
b. Permanent resident card or Alien Registration Receipt Card (INS Form I-551).
m. For persons under the age of 18 who are unable to present a document listed in
paragraphs 2.a. through m. of this attachment:
(4) TWIC.
GLOSSARY
These terms and their definitions are for the purpose of this DTM.
access control list. A list containing (at a minimum) the names of individuals authorized
access and their subsequent authorities of sponsorship (e.g., privileges, times and/or dates
for access, unescorted or escorted designation). In an electronic PACS, these items are
logically stored in the PACS database.
access credential. A physical artifact issued by the Federal, State, or local government
that attests to one’s right to credit or authority. The access credential contains and/or
depicts characteristics, authorizations, and privileges for physical access and internal
security controls.
biographic information. Facts of, or relating to, a person that asserts and/or supports the
establishment of their identity. The identity of U.S. citizens is asserted by their social
security number and given name. Other biographic information may include, but is not
limited to, identifying marks such as tattoos, birthmarks, etc.
controlled area. A controlled space extending upward and outward from a specified
point. Installations are generally considered controlled areas for the purposes of national
defense. Commanders and/or directors may further designate controlled areas within an
installation based upon geographic attributes and unit dispersal. Controlled areas
generally designate areas wherein sensitive operations occur or controlled unclassified
and sensitive information is stored and access is limited to specific persons.
DoD issued card. Cards (other than the DoD CAC) authorized by Reference (m) of this
DTM.
escorted individuals. Persons who require access, without determination of fitness, who
must be accompanied by a sponsor with authorization to escort the individual. The escort
requirement is mandated for the duration of the individual’s visitation period.
Federal PIV. A physical artifact issued by the Federal Government to an individual that
contains a photograph, cryptographic keys, and a digitized fingerprint representation so
that the claimed identity of the card holder can be verified by another person (human
readable and verifiable) or a computer system readable and verifiable. This card is
conformant with the standards prescribed in Reference (n).
fitness. Level of character and conduct determined necessary for the basis of access
control decisions.
physical access control. The process of physically controlling personnel and vehicular
entry to installations, facilities, and resources. Access will be either unescorted or
escorted.
physical electronic security system interoperability. The ability of two or more systems
or components to exchange information or electronic data and to use the information that
has been exchanged.
physical security. That part of security concerned with active and passive measures
designed to prevent unauthorized access to personnel, equipment, installations, and
information, and to safeguard them against espionage, sabotage, terrorism, damage, and
criminal activity. Designed for prevention and provides the means to counter threats
when preventive measures are ignored or bypassed.
PII. Information that can be used to distinguish or trace an individual’s identity, such as
their name, social security number, date and place of birth, mother’s maiden name, and
biometric records, including any other personal information which is linked or linkable to
a specific individual.
restricted access area. An area (land, sea, or air) in which there are special restrictive
measures employed to prevent or minimize incursions and/or interference, where special
security measures are employed to prevent unauthorized entry and/or movement.
Restricted areas are designated and authorized by the installation and/or activity
commander and/or director, properly posted, and employ multiple physical security
measures.
screening. The physical process of reviewing a person’s presented biographic and other
identifiable information, as appropriate, to determine their authenticity, authorization, and
credential verification against a government data source through authorized and secure
channels at anytime during the person’s period of physical access eligibility. This
assessment identifies derogatory actions that can be determined as disqualifying issues
for current or continuing physical access eligibility standards and requirements for the
resource, asset, or installation.
Trusted Traveler. A procedure that allows for uniformed service members and spouses,
DoD employees, and retired uniformed service members and spouses to vouch for
occupants in their immediate vehicle, provided the Trusted Traveler vehicle operator
possess a valid identification card and has a clear NCIC check. Trusted Travelers are
entirely responsible for the actions of all occupants in their vehicle and for meeting all
local security requirements for escort as established by requirements of the installation
commander. Additional implementation guidance will be incorporated into physical
security policy.
unescorted individuals. Personnel who have been identity proofed and favorably vetted
in accordance with this DTM are eligible for unescorted access within the installation;
but are, however, still subject to any controlled or restricted area limitations, as
appropriate.