107 Security Fundamentals Flashcards
How many General Orders are there?
11
General Order 1
The take charge of this post and all government property in view.
General Order 2
To walk my post in a military manner, keeping always on the alert and observing everything that takes place within sight or view.
General Order 3
To report all violations of orders I am instruction to enforce.
General Order 4
To repeat all calls from post more distant from the guardhouse than my own.
General Order 5
To quit my post only when properly relieved.
General Order 6
To receive, obey, and pass on to the sentry who relieves me all orders from the commanding officer, officer of the day, and officers and noncommissioned officers of the guard only.
General Order 7
To talk to no one except in the line of duty.
General Order 8
To give the alarm in case of fire or disorder.
General Order 9
To call the corporal of the guard in any case not covered by instructions.
General Order 10
To salute all officers and all colors and standards not cased.
General Order 11
To be especially watchful at night and during the time for challenging, to challenge all persons on or near my post, and to allow no one to pass without proper authority.
Who is the interior guard chain of command?
Commanding Officer
Commander of the Guard
Sergeant of the Guard
Corporal of the Guard
What is Deadly Force?
The efforts of an individual used against another to cause death, substantial risk of death, or serious bodily harm.
What are the six conditions that justify the use of deadly force?
- Defend yourself
- Defend property not involving national security
- Defend property not involving National security but inherently dangerous to other
- Prevent crimes against people
- Apprehend individuals
- Establish and/or maintain lawful order
Terrorism is…
The unlawful use or threatened use of violence to force or intimidate governments or societies to achieve political, religious, or ideological.
Perspectives of terrorism
Terrorism is cheap, low risk, highly effective way for weak nations, individuals, or groups to challenge stronger nations or groups and achieve objectives beyond their own abilities.
Long range goals of terrorism
- Topple governments influence
- Top level decisions,
- Gain recognition for their cause.
Short range goals of terrorism
Focus on gaining recognition Reducing government credibility Obtaining funds and equipment Disrupting communications Demonstrating power Delaying political progress Influencing elections Intimidating a particular group
What motivates terrorism?
Terrorists are motivated by religion, prestige, power, political change and material gain.
How do terrorist operations operate?
In small secret groups with little interaction and tight central control held by a few individuals.
What is THREATCON system is designed to?
Standardize security measures so that inter-service coordination and support of anti-terrorism activities are simplified.
How many THREATCON conditions are there?
4
THREATCON ALPHA
A general threat of possible terrorist activity against installations and personnel.
THREATCON BRAVO
An increased and more predictable threat of terrorist action.
THREATCON CHARLIE
An incident has occurred or that intelligence has been received indicating that some form of terrorist action is imminent.
THREATCON DELTA
A terrorist attack has occurred or that intelligence indicates that a terrorist action against a specific location is likely.
What THREATCON is declared as a localized warning?
Delta
How many conditions are there to be able to use deadly force?
6
What are some common rules to protect you from terrorist attack?
- Park in well-lighted area w/multiple exits
- Lock attended vehicles
- Avoid traveling alone
- Be sensitive to the possibility of surveillance
- Keep a low profile and avoid calling attention to yourself
- Report unusual activities to local security officials
What are some common rules to protect you from terrorist attack?
- Park in well-lighted area w/multiple exits
- Lock attended vehicles
- Avoid traveling alone
- Be sensitive to the possibility of surveillance
- Keep a low profile and avoid calling attention to yourself
- Report unusual activities to local security officials
How do you protect yourself from terrorist attacks?
Maintain a low profile
Be unpredictable
Remain vigilant
Protect your automobile
Maintain a low profile
Ensure that your dress conduct and mannerisms do not attract attention.
Make an effort to blend into the local environment.
Avoid publicity.
Do not go out in big groups.
Stay away from civil disturbances and demonstrations.
Be unpredictable
Vary your route and the time you leave and return home during your daily routine.
Vary your style of dress.
Avoid deserted streets or country roads.
Avoid traveling alone.
Remain vigilant
Watch for anything suspicious or out of place.
Do not give out personal information over the phone.
Preselect a secure area in which you can take refuge if you are being followed.
Report any incident of being followed to the military police and to your command duty officer.
Protect your automobile
Avoid leaving the vehicle unattended and in the open.
Lock the doors, the trunk and the gas cap when leaving the vehicle.
Upon returning to the vehicle, search it before operating (or driving)
Check the exterior of the vehicle for packages left under the vehicle, ground disturbed around the vehicle, loose wiring, string or tape, check the interior vehicle for objects out of place, or anything out of the ordinary.
Define Access
The ability and opportunity to obtain knowledge or possession of classified information.
Define Classification
The determination by an authorized official that official information requires, in the interests of national security, a specific degree of protections against unauthorized disclosure.
Define Compromise
An unauthorized disclosure of classified information to one or more persons who do not possess a current valid security clearance.
Define information
Any official knowledge that can be communicated or documentary material, regardless of its physical form or characteristics
What are the three levels of security classifications?
Top Secret
Secret
Confidential
Top secret security classification is…
The classification level applied to information whose unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security.
Secret security classification is…
The classification level applied to information whose unauthorized disclosure could reasonably be expected to cause serious damage to the national security.
Confidential security classification is…
The classification level applied to the information whose unauthorized disclosure could reasonably be expected to cause damage to the national security.
Examples of Top Secret information are…
- The disclosure of complex cryptographic and communication intelligence systems.
- A disruption of foreign relations vitally affecting the national security.
- The compromise of vital national defense plane.
Examples of Security information are…
- The disclosure of significant military plans or intelligence operations.
- The disclosure of scientifically or technological developments relating to national security.
- The significant impairment of a program or policy directly related to national security.
Examples of Confidential information are…
- Disclosure of ground, air and naval forces
- Disclosure of performance characteristics such as design, test and production data of U.S. munition and weapons systems.
What should be done upon finding unsecured classified material?
Protect it from further compromise and notify the custodian or security manager immediately.
What methods do foreign agents use in collecting information?
- Observe and photograph activities.
- Eavesdrop on electronic communications
- Read new releases
- Listen to careless talk
- Obtain classified documents
What are the three duties of the interior guard?
Preserve Order
Protect Property
Enforce regulations