103 Navy Antiterrorism Fundamentals Flashcards

1
Q

Chairman of the Joint Chiefs of Staff (CJCS) approved program standardizing the military services identification of, and recommended responses to, terrorist threats and terrorist acts against U.S. personnel and facilities.

A

FPCON levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the goal of the RAM program?

A

To deter, detect, and disrupt terrorist attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 Defense in Depth zones?

A

Assessment Zone
Warning Zone
Threat Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why do terrorists use surveillance?

A

To assess capabilities of security systems, judge effectiveness of security measures, and identify security weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the (7) steps of a terrorist attack planning cycle?

A
  1. Target Selection
  2. Surveillance
  3. Final Selection
  4. Tactical Level Planning
  5. Final Surveillance
  6. Deployment
  7. Attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Terrorist surveillance-detection activities

A
  1. Multiple sightings of the same suspicious person, vehicle, or activity, separated by time, distance, or direction.
  2. Individuals staying at bus/train stops for extended periods while buses/trains arrive and depart.
  3. Individuals engaging in long conversations on pay or cell phones.
  4. Individuals ordering food at a restaurant and leaving before the food arrives or ordering without eating.
  5. Joggers standing and stretching for an inordinate amount of time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some preplanned surveillance-detection countermeasures

A

Installing mechanical devices such as security cameras, motion sensors;
Varying modes of watch-stander behavior, employing RAMS;
Employing physical barriers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Common terrorist tactics

A
  1. Assassination
  2. Arson
  3. Bombing
  4. Hostage Taking
  5. Kidnapping
  6. Hijacking or Skyjacking
  7. Seizure
  8. Raids/Attacks on Facilities
  9. Sabotage
  10. Weapons of Mass Destruction (WMD)
  11. Information Warfare (IW)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Definition of Terrorism

A

the calculated use of unlawful violence or threat of unlawful violence to inculcate fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Definition of Hostile Act

A

attack or other use of force against the U.S. or U.S. forces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Definiton of Hostile Intent

A

threat of imminent use of force against the U.S. or U.S. forces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Definition of Hostile Force

A

any civilian, paramilitary, or military force or terrorist(s), with or without national designation, that has committed a hostile act, exhibited hostile intent, or has been declared hostile by appropriate U.S. authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Terrorism Motivational Categories

A
  1. Separatist
  2. Ethnocentric
  3. Nationalistic
  4. Revolutionary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FPCON Normal

A

applies when a general threat of possible terrorist activity exists but warrants only routine security posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FPCON Alpha

A

when general threat of possible terrorist activity is directed towards installations, vessels, or personnel, the nature of and extent of which are unpredictable and circumstances do not justify full implementation of FPCON Bravo measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

FPCON Bravo

A

when an increased and more predictable threat of terrorist activity exists.

17
Q

FPCON Charlie

A

when an incident occurs or intelligence is received indicating that some form of terrorist action against installations, vessels, or personnel is imminent.

*Implementation of the FPCON for more than a short period will probably create hardship and affect the peacetime activities of the unit and its personnel

18
Q

FPCON Delta

A

declared when a terrorist attack has occurred in the immediate area or intelligence indicates a terrorist action against a specific location or person is likely

19
Q

Purpose of PPR’s

A

to identify, track, assess, and neutralize terrorist attacks

20
Q

Active Threat

A

active shooter scenarios are extremely dangerous and difficult because there is no criminal objective involved other than mass murder

21
Q

Aircraft Threat

A

Collateral damage big risk

22
Q

Armed/Barricaded/Hostage Incidents

A

when responding to this crisis, negotiators normally experience one of two categories of behavior: instrumental or expressive.

23
Q

Instrumental behavior

A

characterized by substantive demands and clearly recognizable objectives that, if attained, will benefit the subject

24
Q

Expressive behavior

A

designed to communicate the subject’s frustration, outrage, passion, despair, anger, or other feelings

25
Four major types of Hostage Takers
1. Mentally disturbed 2. Criminals trapped during commission of a crime 3. Prisoners who are revolting 4. Political terrorists
26
ECP Threat
primary focus is the ability to detect and defend against attack by a terrorist/vehicle with IED/VBIED
27
Man-Portable Air Defense System Threat
Potential damage and loss of life resulting from employment of MANPADS is greater than from a sniper or mortar threat
28
Protests, Demonstration, and Rallies
if protesters approach ECP, watch standers should perform the following procedures: 1. Upon initial gathering, notify PATSUP 2. Prepare to secure ECP by closing gates or activating barrier systems 3. Maintain the flow of friendly personnel through ECP 4. Do not take actions that would escalate situation 5. Request reinforcements as required 6. Verbally warn protestors to remain away from post 7. If protesters physically attack: use authorized force to prevent access, apprehend aggressors and remove from area, secure ECP, assist civilian authorities, maintain positive access control 8. Photograph participants
29
What are the reasons why Rail-Borne Improvised Explosive Device is an attractive form of attack for terrorists
1. The IED is easily transportable 2. The size of the IED can be large and is not limited to what a person can carry 3. A rail car is an inconspicuous delivery vehicle 4. An IED can be easily hidden within a rail car
30
Complex Coordinated Terrorist Attack (CCTA)
acts of terrorism that involve synchronized and independent team(s) at multiple locations, sequentially or in close succession, initiated with little or no warning, and employing one or more weapon system that are intended to result in large numbers of casualties
31
USS Cole Attack
October 12, 2000 - al-Qaeda claimed responsibility for small boat attack in Yemen. Killed 17 sailors and wounding 39
32
Small-boat asymmetric-warfare methods
include directly attacking enemy ships, harassing and interdicting commercial shipping, engaging in international piracy, smuggling operations, and conducting surveillance
33
Most likely standoff threats
Snipers, mortars, RPGs, and MANPADS
34
Contributing factors that lead to identify as suspicious package
- Unusual smells - Oily stains - Protruding wires - Excessive postage - No return address - package out of place with surrounding area - strange noises coming from package