107 - Antiterrorism / Force Protection Flashcards
List tactics used by terrorists
- Assassination
- Arson
- Bombing
- Hostage Taking
- Kidnapping
- Hijacking
- Seizure
- Raids or Attacks on Facilities
- Sabatoge
- WMD
- IW
Describe the phases of terrorist attack methodology
- Target Options
- Selection Surveillance
- Target Selection
- Detailed Surveillance
- Training and Preparation
- The Attack
FPCON Normal
General threat possible. Warrants routine security posture
FPCON A
General threat of possible terrorist activity is directed at installations, vessels, personnel; nature and extent are unpredictable.
FPCON B
Increased or more predictable threat
FPCON C
Incident occurs or imminent; cannot be maintained long term
FPCON D
Incident has occurred. Normally declared as a localized warning.
Understand Criticality and Vulnerability Assessments
Criticality and vulnerability (C/V) assessments help planners determine which assets are critical to a unit’s mission and which are most vulnerable to attack. The results of these assessments also help commanders decide which assets to protect and to what level.