107 Antiterrorism Fundamentals Flashcards

1
Q

Explain Anti terrorism

A

Security related program that falls under the overarching combating terrorism and force protection programs. The AT program is a collective, Proactive effort focused on the detection of terrorist attacks against DOD personnel , their families, Facilities, installations, and infrastructure critical to the mission as well as the preparation to defend against and planning for the response to the consequences of terrorist incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Interior guard

A

is detailed by a commander to preserve order, protect property, and enforce regulations within jurisdiction of his or her command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Commanding officer

A
  • The Responsibility of the CO for the security of the command is absolute
  • May delegate authority to subordinates for the execution of duties, but such delegation shall in no way relive the CO of the responsibility for the security of the command
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Interior Guard consist of

A
Commanding officer
Field officer of the day 
Officer of the Day
Commander of the guard
Corporal of the guard 
Main Guard sentries
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Field Officer of the day

A
  • Supervises entire interior Guard

- Receives orders from the CO only, and serves as the CO’s direct personal representative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Officer of the Day (OOD)

A
  • The OOD supervises the main guard
  • Charged with the execution of all orders from the CO which concern the security of the area within assigned jurisdiction
  • In case of alarm , acts immediately to protect life , Government property and Preserve order
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Commander of the guard

A
  • Ensures proper instruction, Discipline, and performance of duties of the main
  • Ensures all members of the main guard are correctly instructed in their orders and duties, and they are understood and executed properly
  • When alarm is sounded expeditiously forms the reserve, if necessary
  • Ensures the security of prisoners under charge of the guard
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sergeant of the Guard

A
  • Asist the Commander with ensuring proper instruction, discipline and performance of duties of the main guard
  • Ensures property under charge of the guard is cared for and accounted properly
  • Ensures guard house and its surrounding areas are maintained in proper police
  • Forms the guard whenever necessary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Corporal of the guard

A
  • Supervises Members of the guard assigned to that relief
  • Assigns sentries on that relief post
  • Forms the relief in sufficient time to accomplisht the following: Issue guard property, inspect appearance, Fitness for Duty, condition of arms, issue ammunition, and supervise loading of weapons
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Main Guard Sentries

A
  • All members of the guard will memorize, Understand, and comply with the General orders for sentries
  • Members of the guard are not on post will remain in the immediate vicinity of the guardhouse except when Granted permission to leave by the commander of the guard
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

General order 1

A

To take charge of this post and all Government property in view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

General order 2

A

To walk my post in a military manner, keeping always on the alert and observing everything that takes place within sight or hearing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

General order 3

A

To report all violations of orders i am instructed to enforce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

General order 4

A

To repeat all calls form post more distant from the guard house than my own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

General order 5

A

To quit my post only when properly relived

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

General order 6

A

To receive obey and pass on to the sentry who relives me all orders from the CO, OOD, Officers and NCOs of the guard only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

General order 7

A

To talk to no one except in the line of duty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

General order 8

A

To give alarm in case of fire or disorder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

General order 9

A

To call the corporal of the guard in any case not covered by instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

General order 10

A

To salute all officers and all colors and standards not cased

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

General order 11

A

To be especially watchful at night and when the time comes for challenging to challenge all persons on or near my post and allow no one to pass without proper authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Deadly force

A

Is the Efforts of an individual used against another to cause death, Substantial Risk of death, seriously bodily harm. Deadly force is justified only under conditions of necessity and may only be used when lesser means cannot be reasonably employyed or have failed and the risk of death or seriously bodily harm to innocent persons is not increased by its use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Inherent right to self defense

A

When there is reasonable belief that a person poses an imminent threat of death or serious bodily harm to DoD persons. Self defense includes defense of other DoD persons in the Vicinity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Defense to others

A

In defense of non DoD persons in the vicinity directly related to the assigned activity or mission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Assets Vital to National Security

A

When deadly force reasonably appears to be necessary to prevent the actual theft or sabotage assets vital to national security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Inherently dangerous property

A

When deadly force reasonably appears necessary to prevent the actual theft or sabotage of inherently dangerous property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

National critical infrastructure

A

when deadly force reasonably appears to be necessary to prevent the actual theft or sabotage or destruction of national critical infrastructure defined as president designated public utilities or similar critical infrastructure Vital to public health or safety the damage to which the president of the united states determines would create an imminent threat of death or serious bodily harm or injury

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Serious offenses against persons

A

When deadly force reasonably appears to be necessary to prevent the commison of a serious offense , one that involves imminent threat of death or seriously bodily harm including the defense of other persons where deadly force is directed against a person threatening to commit the offense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Arrest or Apprehension

A

When deadly force reasonably appears to be necessary to arrest or apprehend when there is probable cause to beleive a person has commited a serious offense and there is an imminent threat of death or serious bodily harm to DoD personnel or others in the vicinity referred in subparagraphs 4.d(3) of this enclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Escape

A

When deadly force reasonably appears necessary to prevent the escape of prisoners provided there is probable cause to believe that such person has committed or attempted to commit a serious offense that is on that involves imminent threat of death or seriously bodily harm to DoD personnel or others in the vicinity

31
Q

Access

A

The ability and opportunity to obtain knowledge or possession of classified information

32
Q

Classification

A

The determination by an authorized official that official information requires in the interests of national security a specific degree of protection against unauthorized disclosure

33
Q

Compromise

A

An unauthorized disclosure of classified information to one or more person who do not possess a current valid security clearance. Compromise can be intentional or inadvertent

34
Q

Spillage

A

Occurs when data is placed on an information technology system possessing insufficient information security controls to protect the data as the required classification ie secrets information on an unclassified machine

35
Q

Classified information

A

Information that has been determined under Executive Order 12958 or any succesor order 12951 or the atomic energy act of 1954 to require protection against unauthorized disclosure

36
Q

Three levels of classification

A

Top Secret
Secret
Confidential

37
Q

Top secret

A

Classification level applied to information whose unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security. Ex includes information whose unauthorized release could result in armed hostilities against the U.S. or its allies

38
Q

Secret

A

Unauthorized disclosure could reasonably be expected to cause serious damage to the national security. EX includes info whos unauthorized release could result in the disruption of foreign relations significantly affecting the national security

39
Q

confidential

A

disclosure could reasonably be expected to cause damage to national security. Example icludes information whose unauthorized release could result in disclosure of ground air and naval forces

40
Q

Steps of OPSEC

A
Identify critical information
Conduct threat analysis
conduct Vulnerability analysis 
Conduct risk assessment
Apply countermeasures
41
Q

Identify critical information

A

Information about DoD activities, intentions , capabilities, or limitatioons that an adversary seeks in order to gain a military, political , diplomatic, economic , or technological advantage. such information if revealed to an adversary may prevent or degrade mission accomplishment cause loss of life or damage friendly resources

42
Q

Conduct Threat analysis

A

Threat information is necessary to develop appropriate countermeasures the threat analysis includes identyfing potential adversaries and their associated capabilities and intentions to collect analyze and exploit critical information and indicators

43
Q

Conduct Vulnerability analysis

A

An OPSEC vulnerability exists when the adversary is capable of collecting critical information or indicators analyzing it and then acting quickly enough to impact Friendly objectives. conducting exercises red teaming and analyzing operations can help identify vulnerabilities

44
Q

Conduct risk assessment

A

The risk assessment is the process of evaluating the risks to information based on susceptibility to intelligence collection and the anticipated severity of loss. it involves assessing the adversary’s ability to exploit vulnerabilities that would lead to the exposure of critical information and the potential impact it would have on the mission

45
Q

Apply Countermeasures

A

Countermeasures are designed to prevent an adversary from detecting critical information provide an alternative interpretation of critical information or indicators or deny the adversary’s collection system

46
Q

Methods used to collect information

A
Human intelligence (HUMINT)
-Signals intelligence (SIGNIT)
-Open source intelligence (OSINT)
Imagery Intelligence (IMINT)
Measurement and signatures intelligence (MASINIT)
47
Q

Human intelligence (HUMINT)

A

The collection of information from human sources the collection may be done openly such as interview of witnesses and suspects or it may be done through clandestine or covert means(espionage)

48
Q

Signals Intelligence

A

Refers to electronic transmissions that can be collected by ships, planes, ground sites, or satellites. communication s intelligence is a type of SIGINT and refers to the interception of communications between two parties

49
Q

Open source intelligence OSINT

A

Refers to a broad array of information and sources that are generally available including information obtained from the media (newspapers radio television) professional and academic records and public data

50
Q

Imagery intelligence IMINT

A

Intelligence Derived from the exploitation of imagery collected by visual photography, infrared, lasers multi spectral and radar these sensors produce images of objects optically electronically or digitally on film electronic display devices or other media

51
Q

Measurement and signatures intelligence

A

Relatively little known collection discipline that concerns weapons capabilities and industrial activities. MASINT includes the advanced processing and use of data gathered from overhead airborne IMINT and SIGINT collection systems

52
Q

Insider Threat

A

is a person with authorized access who uses that access wittingly or unwittingly to harm national security interest or national security through unauthorized disclosure data modification espionage terrorism or kinetic actions resulting in loss or degradation of resources or capabilities

53
Q

Three ways to identify an insider threat

A

Information Collection
Information Transmittal
Additional suspicious Behaviors

54
Q

Information collection

A
  • Keeping classified materials in an unauthorized location
  • Attempting to access sensitive information without authorization
  • Obtaining access to sensitive information inconsistent with present duty requirements
55
Q

Information transmittal

A
  • Using an unclassified medium to transmit classified materials
  • Discussing classified materials on a non secure telephone-
  • Removing Classification markings from documents
56
Q

Additional suspicious behaviors

A
  • Repeated or unrequired work outside of normal duty hours
  • Sudden reversal of financial situation or a sudden repayment of large debts or loans
  • Attempting to conceal foreign travel
57
Q

Terrorism

A

Unlawful use or threatened us of violence to force or intimidate governments of societies to achieve political, religious , or ideological objectives

58
Q

Terrorist Motivations

A

Terrorist are motivated by religion, prestige, power, political change, and material gain. terrorist believe that they are righteous and act in the name of the people

59
Q

Perspectives of terrorism

A

Terrorism can be a cheap low risk highly effecgibe way for weak nations individuals or groups to challenge stronger nations or groups and achieve objectives beyond their own abiliies

60
Q

Terrorist long range goals

A
  • Topple governments
  • influence top level decisions
  • Gain recognition for their cause
61
Q

terrorist short range Goals

A
  • Reducing government credibility
  • Obtaining funds and equipment
  • Disrupting Communications
  • Demonstrating power
  • Delaying the political process
  • Reducing the government economy
  • Influencing elections
  • Freeing prisoners
  • Demoralizing and discrediting the security force
  • intimidating a particular group
  • Causing a government to overreact
  • Gain recognition for their causes
62
Q

Force protection condition FPCONN

A

FPCON is a standardized DoD identification system for recommended preventive actions and responses to terrorist threats against U.S. personnel and facilities. The system is the principal means for a commander to apply an operational decision on how to protect against terrorism and facilitates coordination among DoD Components and support for antiterrorism activities.

63
Q

FPCONN Normal

A

Applies when a general global threat of possible terrorist activity exists and warrants a routine security posture. At a minimum, access control will be conducted at all DoD installations and facilities. Actions taken at this level include, but are not limited to:
 Secure and randomly inspect buildings, rooms, and storage areas not in regular use.
 Conduct random security spot checks of vehicles and persons entering facilities under the jurisdiction of the United States.
 Limit access points for vehicles and personnel commensurate with a reasonable flow of traffic.
 Identify defense critical assets and high occupancy buildings

64
Q

FPCONN ALPHA

A

Applies when there is an increased general threat of possible terrorist activity against personnel or facilities, and the nature and extent of the threat are unpredictable. ALPHA measures must be capable of being maintained indefinitely. Actions taken at this level include, but are not limited to:
 Continue, or introduce, all measures of the previous FPCON level.
 Personnel with access to building and area evacuation plans must be available at all times. Plans should be in place to execute access control procedures. Key personnel required to implement security plans should be on-call and readily available.
 Initiate food and water risk management procedures, brief personnel on food and water security procedures, and report any unusual activities.
 Test mass notification system.

65
Q

FPCON BRAVO

A

Applies when an increased or more predictable threat of terrorist activity exists. Sustaining BRAVO measures for a prolonged period may affect operational capability and military-civil relationships with local authorities. Actions taken at this level include, but are not limited to:
 Fully implement all measures of lower FPCON levels.
 Enforce control of entry onto facilities containing U.S. infrastructure critical to mission accomplishment, lucrative targets, or high-profile locations; and randomly search vehicles entering these areas. Particular scrutiny should be given to vehicles that are capable of concealing a large IED (e.g., cargo vans, delivery vehicles) sufficient to cause catastrophic damage to property or loss of life.
 Randomly inspect commercial deliveries. Advise family members to check home deliveries.
 Increase security measures and guard presence or initiate increased patrols and surveillance of DoD housing areas, schools, messes, on-base clubs, military treatment facilities, and similar high-occupancy targets to improve deterrence and defense.

66
Q

FPCON CHARLIE

A

Applies when an incident occurs or intelligence is received indicating some form of terrorist action or targeting against personnel or facilities is likely. Prolonged implementation of CHARLIE measures may create hardship and affect the activities of the unit and its personnel. Actions taken at this level include, but are not limited to:
 Fully implement all measures of lower FPCON levels.
 Recall additional required personnel. Ensure armed augmentation security personnel are aware of current rules of engagement and any applicable Status of Forces Agreements (SOFA). Review types of weapons and ammunition issued to augmentation personnel.
 Limit access points in order to enforce entry control. Randomly search vehicles.
 Increase patrolling of the installation/facility/unit including waterside perimeters, if appropriate. Be prepared to assist local authorities in searching for threatening actions and persons outside the perimeter.

67
Q

FPCON DELTA

A

Applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific location or person is imminent. This FPCON is usually declared as a localized condition. FPCON DELTA measures are not intended to be sustained for an extended duration. Actions taken at this level include, but are not limited to:
 Fully implement all measures of lower FPCON levels.
 Search all personally carried items (e.g., suitcases, briefcases, packages, backpacks) brought into the installation or facility.
 Restrict all non-essential movement.
 Begin continuous monitoring for chemical, biological, and radiological contamination.

68
Q

Methods to reduce visibility to adversaries

A

-Social Media
-Workplace Guidance
-Maintain a low profile
-Be unpredictable
-Remain Vigilant
Protect your automobile

69
Q

Social media

A

 Refrain from posting mission/personally identifiable information onto social media webpages.
 Always set privacy settings to allow only friends to view.
 Turn off location services.
 All affiliation requests should be verified for credentials prior to accepting.
 Avoid opening email messages from unknown or unreliable sources.
 Practice Operational Security at all times.

70
Q

Workplace Guidance

A

 Remove CAC when leaving the workspace.
 Ensure personally identifiable information (PII) is secured.
 Refrain from sending emails with PII. Apply proper encryption if it is absolutely necessary.
 Properly mark all media with appropriate classification level.
 Report all suspicious persons loitering near your office or in unauthorized areas.
 Watch for unfamiliar vehicles cruising or parked frequently in the area, particularly if one or more occupants remain in the vehicle for extended periods.
 Report any suspicious videotaping/photography or unusual accommodation requests

71
Q

Maintain a Low profile

A

 Ensure that your dress, conduct, and mannerisms do not attract attention.
 Make an effort to blend into the local environment.
 Avoid publicity.
 Do not go out in big groups.
 Stay away from civil disturbances and demonstrations.

72
Q

Be Unpredictable

A

 Avoid establishing a pattern and vary the route and the time you leave and return home during your daily routine.
 Vary your style of dress.
 Avoid deserted streets or country roads.
 Avoid traveling alone.
 Let people close to you know where you are going and what you will be doing.

73
Q

Remain Vigilant

A

Watch for anything suspicious or out of place.
 Seek knowledge of the local situation and be aware of your surroundings.
 Do not give out personal information over the telephone.
 Preselect a secure area in which you can take refuge if you are being followed.
 Report any incident of being followed to the military police and to your command security officer.

74
Q

Protect your automobile

A

Park in well-lighted areas with multiple exits - Avoid leaving the vehicle unattended and in the open.
 Lock the doors, the trunk, and the gas cap when leaving the vehicle.
 Upon returning to the vehicle, search it before operating (or driving).
 Check the exterior of the vehicle for packages left under the vehicle, ground disturbed around the vehicle, or loose wiring, string, or tape.
 Check the interior of the vehicle for objects out of place, or anything out of the ordinary.