107 Antiterrorism Fundamentals Flashcards
Explain Anti terrorism
Security related program that falls under the overarching combating terrorism and force protection programs. The AT program is a collective, Proactive effort focused on the detection of terrorist attacks against DOD personnel , their families, Facilities, installations, and infrastructure critical to the mission as well as the preparation to defend against and planning for the response to the consequences of terrorist incidents.
Interior guard
is detailed by a commander to preserve order, protect property, and enforce regulations within jurisdiction of his or her command.
Commanding officer
- The Responsibility of the CO for the security of the command is absolute
- May delegate authority to subordinates for the execution of duties, but such delegation shall in no way relive the CO of the responsibility for the security of the command
Interior Guard consist of
Commanding officer Field officer of the day Officer of the Day Commander of the guard Corporal of the guard Main Guard sentries
Field Officer of the day
- Supervises entire interior Guard
- Receives orders from the CO only, and serves as the CO’s direct personal representative
Officer of the Day (OOD)
- The OOD supervises the main guard
- Charged with the execution of all orders from the CO which concern the security of the area within assigned jurisdiction
- In case of alarm , acts immediately to protect life , Government property and Preserve order
Commander of the guard
- Ensures proper instruction, Discipline, and performance of duties of the main
- Ensures all members of the main guard are correctly instructed in their orders and duties, and they are understood and executed properly
- When alarm is sounded expeditiously forms the reserve, if necessary
- Ensures the security of prisoners under charge of the guard
Sergeant of the Guard
- Asist the Commander with ensuring proper instruction, discipline and performance of duties of the main guard
- Ensures property under charge of the guard is cared for and accounted properly
- Ensures guard house and its surrounding areas are maintained in proper police
- Forms the guard whenever necessary
Corporal of the guard
- Supervises Members of the guard assigned to that relief
- Assigns sentries on that relief post
- Forms the relief in sufficient time to accomplisht the following: Issue guard property, inspect appearance, Fitness for Duty, condition of arms, issue ammunition, and supervise loading of weapons
Main Guard Sentries
- All members of the guard will memorize, Understand, and comply with the General orders for sentries
- Members of the guard are not on post will remain in the immediate vicinity of the guardhouse except when Granted permission to leave by the commander of the guard
General order 1
To take charge of this post and all Government property in view
General order 2
To walk my post in a military manner, keeping always on the alert and observing everything that takes place within sight or hearing
General order 3
To report all violations of orders i am instructed to enforce
General order 4
To repeat all calls form post more distant from the guard house than my own
General order 5
To quit my post only when properly relived
General order 6
To receive obey and pass on to the sentry who relives me all orders from the CO, OOD, Officers and NCOs of the guard only
General order 7
To talk to no one except in the line of duty
General order 8
To give alarm in case of fire or disorder
General order 9
To call the corporal of the guard in any case not covered by instructions
General order 10
To salute all officers and all colors and standards not cased
General order 11
To be especially watchful at night and when the time comes for challenging to challenge all persons on or near my post and allow no one to pass without proper authority
Deadly force
Is the Efforts of an individual used against another to cause death, Substantial Risk of death, seriously bodily harm. Deadly force is justified only under conditions of necessity and may only be used when lesser means cannot be reasonably employyed or have failed and the risk of death or seriously bodily harm to innocent persons is not increased by its use
Inherent right to self defense
When there is reasonable belief that a person poses an imminent threat of death or serious bodily harm to DoD persons. Self defense includes defense of other DoD persons in the Vicinity
Defense to others
In defense of non DoD persons in the vicinity directly related to the assigned activity or mission
Assets Vital to National Security
When deadly force reasonably appears to be necessary to prevent the actual theft or sabotage assets vital to national security
Inherently dangerous property
When deadly force reasonably appears necessary to prevent the actual theft or sabotage of inherently dangerous property
National critical infrastructure
when deadly force reasonably appears to be necessary to prevent the actual theft or sabotage or destruction of national critical infrastructure defined as president designated public utilities or similar critical infrastructure Vital to public health or safety the damage to which the president of the united states determines would create an imminent threat of death or serious bodily harm or injury
Serious offenses against persons
When deadly force reasonably appears to be necessary to prevent the commison of a serious offense , one that involves imminent threat of death or seriously bodily harm including the defense of other persons where deadly force is directed against a person threatening to commit the offense
Arrest or Apprehension
When deadly force reasonably appears to be necessary to arrest or apprehend when there is probable cause to beleive a person has commited a serious offense and there is an imminent threat of death or serious bodily harm to DoD personnel or others in the vicinity referred in subparagraphs 4.d(3) of this enclosure
Escape
When deadly force reasonably appears necessary to prevent the escape of prisoners provided there is probable cause to believe that such person has committed or attempted to commit a serious offense that is on that involves imminent threat of death or seriously bodily harm to DoD personnel or others in the vicinity
Access
The ability and opportunity to obtain knowledge or possession of classified information
Classification
The determination by an authorized official that official information requires in the interests of national security a specific degree of protection against unauthorized disclosure
Compromise
An unauthorized disclosure of classified information to one or more person who do not possess a current valid security clearance. Compromise can be intentional or inadvertent
Spillage
Occurs when data is placed on an information technology system possessing insufficient information security controls to protect the data as the required classification ie secrets information on an unclassified machine
Classified information
Information that has been determined under Executive Order 12958 or any succesor order 12951 or the atomic energy act of 1954 to require protection against unauthorized disclosure
Three levels of classification
Top Secret
Secret
Confidential
Top secret
Classification level applied to information whose unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security. Ex includes information whose unauthorized release could result in armed hostilities against the U.S. or its allies
Secret
Unauthorized disclosure could reasonably be expected to cause serious damage to the national security. EX includes info whos unauthorized release could result in the disruption of foreign relations significantly affecting the national security
confidential
disclosure could reasonably be expected to cause damage to national security. Example icludes information whose unauthorized release could result in disclosure of ground air and naval forces
Steps of OPSEC
Identify critical information Conduct threat analysis conduct Vulnerability analysis Conduct risk assessment Apply countermeasures
Identify critical information
Information about DoD activities, intentions , capabilities, or limitatioons that an adversary seeks in order to gain a military, political , diplomatic, economic , or technological advantage. such information if revealed to an adversary may prevent or degrade mission accomplishment cause loss of life or damage friendly resources
Conduct Threat analysis
Threat information is necessary to develop appropriate countermeasures the threat analysis includes identyfing potential adversaries and their associated capabilities and intentions to collect analyze and exploit critical information and indicators
Conduct Vulnerability analysis
An OPSEC vulnerability exists when the adversary is capable of collecting critical information or indicators analyzing it and then acting quickly enough to impact Friendly objectives. conducting exercises red teaming and analyzing operations can help identify vulnerabilities
Conduct risk assessment
The risk assessment is the process of evaluating the risks to information based on susceptibility to intelligence collection and the anticipated severity of loss. it involves assessing the adversary’s ability to exploit vulnerabilities that would lead to the exposure of critical information and the potential impact it would have on the mission
Apply Countermeasures
Countermeasures are designed to prevent an adversary from detecting critical information provide an alternative interpretation of critical information or indicators or deny the adversary’s collection system
Methods used to collect information
Human intelligence (HUMINT) -Signals intelligence (SIGNIT) -Open source intelligence (OSINT) Imagery Intelligence (IMINT) Measurement and signatures intelligence (MASINIT)
Human intelligence (HUMINT)
The collection of information from human sources the collection may be done openly such as interview of witnesses and suspects or it may be done through clandestine or covert means(espionage)
Signals Intelligence
Refers to electronic transmissions that can be collected by ships, planes, ground sites, or satellites. communication s intelligence is a type of SIGINT and refers to the interception of communications between two parties
Open source intelligence OSINT
Refers to a broad array of information and sources that are generally available including information obtained from the media (newspapers radio television) professional and academic records and public data
Imagery intelligence IMINT
Intelligence Derived from the exploitation of imagery collected by visual photography, infrared, lasers multi spectral and radar these sensors produce images of objects optically electronically or digitally on film electronic display devices or other media
Measurement and signatures intelligence
Relatively little known collection discipline that concerns weapons capabilities and industrial activities. MASINT includes the advanced processing and use of data gathered from overhead airborne IMINT and SIGINT collection systems
Insider Threat
is a person with authorized access who uses that access wittingly or unwittingly to harm national security interest or national security through unauthorized disclosure data modification espionage terrorism or kinetic actions resulting in loss or degradation of resources or capabilities
Three ways to identify an insider threat
Information Collection
Information Transmittal
Additional suspicious Behaviors
Information collection
- Keeping classified materials in an unauthorized location
- Attempting to access sensitive information without authorization
- Obtaining access to sensitive information inconsistent with present duty requirements
Information transmittal
- Using an unclassified medium to transmit classified materials
- Discussing classified materials on a non secure telephone-
- Removing Classification markings from documents
Additional suspicious behaviors
- Repeated or unrequired work outside of normal duty hours
- Sudden reversal of financial situation or a sudden repayment of large debts or loans
- Attempting to conceal foreign travel
Terrorism
Unlawful use or threatened us of violence to force or intimidate governments of societies to achieve political, religious , or ideological objectives
Terrorist Motivations
Terrorist are motivated by religion, prestige, power, political change, and material gain. terrorist believe that they are righteous and act in the name of the people
Perspectives of terrorism
Terrorism can be a cheap low risk highly effecgibe way for weak nations individuals or groups to challenge stronger nations or groups and achieve objectives beyond their own abiliies
Terrorist long range goals
- Topple governments
- influence top level decisions
- Gain recognition for their cause
terrorist short range Goals
- Reducing government credibility
- Obtaining funds and equipment
- Disrupting Communications
- Demonstrating power
- Delaying the political process
- Reducing the government economy
- Influencing elections
- Freeing prisoners
- Demoralizing and discrediting the security force
- intimidating a particular group
- Causing a government to overreact
- Gain recognition for their causes
Force protection condition FPCONN
FPCON is a standardized DoD identification system for recommended preventive actions and responses to terrorist threats against U.S. personnel and facilities. The system is the principal means for a commander to apply an operational decision on how to protect against terrorism and facilitates coordination among DoD Components and support for antiterrorism activities.
FPCONN Normal
Applies when a general global threat of possible terrorist activity exists and warrants a routine security posture. At a minimum, access control will be conducted at all DoD installations and facilities. Actions taken at this level include, but are not limited to:
Secure and randomly inspect buildings, rooms, and storage areas not in regular use.
Conduct random security spot checks of vehicles and persons entering facilities under the jurisdiction of the United States.
Limit access points for vehicles and personnel commensurate with a reasonable flow of traffic.
Identify defense critical assets and high occupancy buildings
FPCONN ALPHA
Applies when there is an increased general threat of possible terrorist activity against personnel or facilities, and the nature and extent of the threat are unpredictable. ALPHA measures must be capable of being maintained indefinitely. Actions taken at this level include, but are not limited to:
Continue, or introduce, all measures of the previous FPCON level.
Personnel with access to building and area evacuation plans must be available at all times. Plans should be in place to execute access control procedures. Key personnel required to implement security plans should be on-call and readily available.
Initiate food and water risk management procedures, brief personnel on food and water security procedures, and report any unusual activities.
Test mass notification system.
FPCON BRAVO
Applies when an increased or more predictable threat of terrorist activity exists. Sustaining BRAVO measures for a prolonged period may affect operational capability and military-civil relationships with local authorities. Actions taken at this level include, but are not limited to:
Fully implement all measures of lower FPCON levels.
Enforce control of entry onto facilities containing U.S. infrastructure critical to mission accomplishment, lucrative targets, or high-profile locations; and randomly search vehicles entering these areas. Particular scrutiny should be given to vehicles that are capable of concealing a large IED (e.g., cargo vans, delivery vehicles) sufficient to cause catastrophic damage to property or loss of life.
Randomly inspect commercial deliveries. Advise family members to check home deliveries.
Increase security measures and guard presence or initiate increased patrols and surveillance of DoD housing areas, schools, messes, on-base clubs, military treatment facilities, and similar high-occupancy targets to improve deterrence and defense.
FPCON CHARLIE
Applies when an incident occurs or intelligence is received indicating some form of terrorist action or targeting against personnel or facilities is likely. Prolonged implementation of CHARLIE measures may create hardship and affect the activities of the unit and its personnel. Actions taken at this level include, but are not limited to:
Fully implement all measures of lower FPCON levels.
Recall additional required personnel. Ensure armed augmentation security personnel are aware of current rules of engagement and any applicable Status of Forces Agreements (SOFA). Review types of weapons and ammunition issued to augmentation personnel.
Limit access points in order to enforce entry control. Randomly search vehicles.
Increase patrolling of the installation/facility/unit including waterside perimeters, if appropriate. Be prepared to assist local authorities in searching for threatening actions and persons outside the perimeter.
FPCON DELTA
Applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific location or person is imminent. This FPCON is usually declared as a localized condition. FPCON DELTA measures are not intended to be sustained for an extended duration. Actions taken at this level include, but are not limited to:
Fully implement all measures of lower FPCON levels.
Search all personally carried items (e.g., suitcases, briefcases, packages, backpacks) brought into the installation or facility.
Restrict all non-essential movement.
Begin continuous monitoring for chemical, biological, and radiological contamination.
Methods to reduce visibility to adversaries
-Social Media
-Workplace Guidance
-Maintain a low profile
-Be unpredictable
-Remain Vigilant
Protect your automobile
Social media
Refrain from posting mission/personally identifiable information onto social media webpages.
Always set privacy settings to allow only friends to view.
Turn off location services.
All affiliation requests should be verified for credentials prior to accepting.
Avoid opening email messages from unknown or unreliable sources.
Practice Operational Security at all times.
Workplace Guidance
Remove CAC when leaving the workspace.
Ensure personally identifiable information (PII) is secured.
Refrain from sending emails with PII. Apply proper encryption if it is absolutely necessary.
Properly mark all media with appropriate classification level.
Report all suspicious persons loitering near your office or in unauthorized areas.
Watch for unfamiliar vehicles cruising or parked frequently in the area, particularly if one or more occupants remain in the vehicle for extended periods.
Report any suspicious videotaping/photography or unusual accommodation requests
Maintain a Low profile
Ensure that your dress, conduct, and mannerisms do not attract attention.
Make an effort to blend into the local environment.
Avoid publicity.
Do not go out in big groups.
Stay away from civil disturbances and demonstrations.
Be Unpredictable
Avoid establishing a pattern and vary the route and the time you leave and return home during your daily routine.
Vary your style of dress.
Avoid deserted streets or country roads.
Avoid traveling alone.
Let people close to you know where you are going and what you will be doing.
Remain Vigilant
Watch for anything suspicious or out of place.
Seek knowledge of the local situation and be aware of your surroundings.
Do not give out personal information over the telephone.
Preselect a secure area in which you can take refuge if you are being followed.
Report any incident of being followed to the military police and to your command security officer.
Protect your automobile
Park in well-lighted areas with multiple exits - Avoid leaving the vehicle unattended and in the open.
Lock the doors, the trunk, and the gas cap when leaving the vehicle.
Upon returning to the vehicle, search it before operating (or driving).
Check the exterior of the vehicle for packages left under the vehicle, ground disturbed around the vehicle, or loose wiring, string, or tape.
Check the interior of the vehicle for objects out of place, or anything out of the ordinary.