107 - Antiterrorism/Force Protection Flashcards
What are the steps in conducting Vehicle Search?
- look for devices designed to kill
- evaluate and secure as much information as possible from the driver/owner (any threats, evidence of tempering, suspicious noises, unfamiliar objects)
- Find out when the vehicle was last operated; whether it is locked; and who may be the next person in the vehicle (who is the intended target, driver, or passenger?)
- Check the area around the vehicle for signed of tempering (marks on the ground, bits of tape, wire insulation, etc.)
Discuss Critical & Vulnerability Assessment.
Criticality and Vulnerability (C/V)assessments help planners determine which assists are critical to a unit’s mission and which are most vulnerable to attack.
What is FPCON Alpha?
Increased general threat of possible terrorist activity. Alpha measures must be capable of being maintained indefinitely.
In regards to Entry Control Point (ECP), what is THREAT ZONE?
- the area past the post
- ECP stand off zone to the protected asset or area is the threat zone.
How many FPCON levels are there?
Five:
- Normal
- Alpha
- Bravo
- Charlie
- Delta
In regards to Entry Control Point (ECP), what is WARNING ZONE?
- at an ECP
- physically separated area closer to the critical asset than the Assessment Zone, where unknown and unauthorized personnel is inspected and identified.
What is FPCON Bravo?
Increased or more predictable threat of terrorist activity exists.
Describe the “Target Options” phase of Terrorist Attack Methodology.
Terrorists closely examine all details of a target, including watch schedules, entry control procedures periodicity of rowing patrols, and volume of traffic, citizenship of security guards, and the presence of defensive weapons.
List some tactics used by terrorists:
- assassination
- arson
- bombing
- kidnapping & hostage taking
- Hijacking
- Sabotage
- Piracy
- Seizure
- Raids or Ambushes
- Threats or Hoaxes
- Environmental destruction
- Active Shooter
- Insider Threat
What is an Anti-Terrorism/Force Protection Plan?
A plan that documents the specific measures taken to establish and maintain and anti-terrorism/force protection program, ensuring readiness against terrorist attacks.
Describe the “Target Selection” phase of Terrorist Attack Methodology.
Watch schedules entry controls procedures periodicity of rowing patrols and volume of traffic, citizenship of security guards, and the presence of defensive weapons.
What are the phases of Terrorist Attack Methodology?
- Target Options
- Selection Surveillance
- Target Selection
- Detailed Surveillance
- Training and Preparation
- Attack
Describe the “Training and Preparation” phase of Terrorist Attack Methodology.
- sentries or watch standers should have the ability to note the descriptions and details of any suspected surveillance activity. Detailed descriptions of suspicious personnel to include:
1. Gender, height, weight, hair color, built, race, identifying marks.
2. Clothing
3. Equipment, camera, phone, notebook
4. Time of day
5. Exact location of suspicious activity
6. Detailed description of vehicle
Describe the “Detailed Surveillance” phase of Terrorist Attack Methodology.
- Multiple surveillance of the same person, vehicle or activity, separated by time/distance/direction.
- Individuals who sit in a parked car for an extended periods of time.
- Individuals wearing improper attire and does not fit into surrounding environment
- Exhibiting unusual behavior such as starring, taking notes or pictures.
In regards to Entry Control Point (ECP), what is SUICIDE BOMBER TECHNIQUES INDICATOR?
- Surveillance focusing on ECP
- Rehearsals around ECP
- Info about purchase of access to facility blueprints
- Conspicuous clothing
- Obvious/awkward attempt to blend in
- Repeated/Nervous handling of clothing items