107 - Antiterrorism/Force Protection Flashcards

1
Q

What are the steps in conducting Vehicle Search?

A
  • look for devices designed to kill
  • evaluate and secure as much information as possible from the driver/owner (any threats, evidence of tempering, suspicious noises, unfamiliar objects)
  • Find out when the vehicle was last operated; whether it is locked; and who may be the next person in the vehicle (who is the intended target, driver, or passenger?)
  • Check the area around the vehicle for signed of tempering (marks on the ground, bits of tape, wire insulation, etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Discuss Critical & Vulnerability Assessment.

A

Criticality and Vulnerability (C/V)assessments help planners determine which assists are critical to a unit’s mission and which are most vulnerable to attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is FPCON Alpha?

A

Increased general threat of possible terrorist activity. Alpha measures must be capable of being maintained indefinitely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In regards to Entry Control Point (ECP), what is THREAT ZONE?

A
  • the area past the post

- ECP stand off zone to the protected asset or area is the threat zone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How many FPCON levels are there?

A

Five:

  • Normal
  • Alpha
  • Bravo
  • Charlie
  • Delta
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In regards to Entry Control Point (ECP), what is WARNING ZONE?

A
  • at an ECP
  • physically separated area closer to the critical asset than the Assessment Zone, where unknown and unauthorized personnel is inspected and identified.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is FPCON Bravo?

A

Increased or more predictable threat of terrorist activity exists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the “Target Options” phase of Terrorist Attack Methodology.

A

Terrorists closely examine all details of a target, including watch schedules, entry control procedures periodicity of rowing patrols, and volume of traffic, citizenship of security guards, and the presence of defensive weapons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List some tactics used by terrorists:

A
  • assassination
  • arson
  • bombing
  • kidnapping & hostage taking
  • Hijacking
  • Sabotage
  • Piracy
  • Seizure
  • Raids or Ambushes
  • Threats or Hoaxes
  • Environmental destruction
  • Active Shooter
  • Insider Threat
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an Anti-Terrorism/Force Protection Plan?

A

A plan that documents the specific measures taken to establish and maintain and anti-terrorism/force protection program, ensuring readiness against terrorist attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the “Target Selection” phase of Terrorist Attack Methodology.

A

Watch schedules entry controls procedures periodicity of rowing patrols and volume of traffic, citizenship of security guards, and the presence of defensive weapons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the phases of Terrorist Attack Methodology?

A
  • Target Options
  • Selection Surveillance
  • Target Selection
  • Detailed Surveillance
  • Training and Preparation
  • Attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the “Training and Preparation” phase of Terrorist Attack Methodology.

A
  • sentries or watch standers should have the ability to note the descriptions and details of any suspected surveillance activity. Detailed descriptions of suspicious personnel to include:
    1. Gender, height, weight, hair color, built, race, identifying marks.
    2. Clothing
    3. Equipment, camera, phone, notebook
    4. Time of day
    5. Exact location of suspicious activity
    6. Detailed description of vehicle
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe the “Detailed Surveillance” phase of Terrorist Attack Methodology.

A
  • Multiple surveillance of the same person, vehicle or activity, separated by time/distance/direction.
  • Individuals who sit in a parked car for an extended periods of time.
  • Individuals wearing improper attire and does not fit into surrounding environment
  • Exhibiting unusual behavior such as starring, taking notes or pictures.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In regards to Entry Control Point (ECP), what is SUICIDE BOMBER TECHNIQUES INDICATOR?

A
  1. Surveillance focusing on ECP
  2. Rehearsals around ECP
  3. Info about purchase of access to facility blueprints
  4. Conspicuous clothing
  5. Obvious/awkward attempt to blend in
  6. Repeated/Nervous handling of clothing items
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 2 most common types of search used by NSF?

A
  • standing

- prone

17
Q

What is FPCON Normal?

A

General global threat of possible terrorist activity exists and warrants a routine security posture.

18
Q

What is the first thing you MUST do before conducting a personnel/detainee search?

A

apply handcuffs

19
Q

What does ECP stand for?

A

Entry Control Point

20
Q

In regards to Entry Control Point (ECP), what is ASSESSMENT ZONE?

A
  • around an ECP

- includes the visual range of the base gate guard or QD watch

21
Q

Describe the “Attack” phase of Terrorist Attack Methodology.

A

Attacks can occur in an installation, unit, exercise, port, ship, residence, facility or other sites.

22
Q

What is FPCON Charlie?

A

Incident occurs or intelligence is received indicating some form of terrorist action or targeting against personnel or facilities is likely.

23
Q

Describe the “Selection Surveillance” phase of Terrorist Attack Methodology.

A
  • Mobile and fixed personnel and devices.
  • Mobile surveillance means following targets to discern their patterns and routines.
  • Fixed Surveillance occurs when both terrorist personnel and devices stay in one spot to observe that target.
24
Q

What is FPCON Delta?

A
  • Applies in the immediate area where a TERRORIST ATTACK has occurred or when intelligence is received that terrorist action against a specific location or person is imminent.
  • This is normally declared as a localized condition.
  • FPCON Delta is normally not intended to be sustained for long periods of time.