Antiterroism/Force Protection Flashcards

1
Q

Discuss tactics used by terrorists

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Assassination

A

Deliberate action to kill a prominent individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Arson

A

Low risk to the perpetrator, often used for symbolic attacks 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bombing

A

IED’s and suicide bombings are the most common 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Kidnapping/hostagetaking

A

Unlawful seizure of an individual. Usually result in someone being held hostage. 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hijacking

A

The forceful commandeering of a mode of conveyance. 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Seizure

A

Occupying or holding a prominent building or object of symbolic value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Raids/ambushes

A

A surprise attack with violent execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sabotage

A

A deliberate action to weaken an entity through destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threats/Hoaxes

A

Any terrorist group with credibility can create a hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Environmental destruction

A

An act that damages the environment.

Ex: dumping chemicals into water supply or food supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phases of terrorist attack methodology

A

Next

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Broad target selection

A

Terrorist examine details of a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Initial intel and surveillance

A

Mobile and fixed surveillance. (Follow the target, or observe in one spot)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Specific target selection

A

Terrorist will examine watch schedules, ECP procedures, volume of traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pre attack surveillance and planning

A

Use electronic means to assist in surveillance

17
Q

Attack rehearsal

A

Rehearse actions prior to the attack

18
Q

Actions on the objective

A

Attacks can occur on an installation, unit, exercise, or ship.

19
Q

Escape and exploration

A

Terrorist flee the scene

20
Q

Post attack surveillance and documentation

A

Terrorist watch from a safe distance

21
Q

FPCON Normal

A

Global threat of terrorist activity

22
Q

FPCON Alpha

A

Possible terrorist activity against personnel/facilities

23
Q

FPCON Bravo

A

More predictable threat of terrorist activity exists

24
Q

FPCON Charlie

A

Terrorist action is likely to occur

25
Q

FPCON Delta

A

Terrorist attack has occurred

26
Q

Criticality assessment

A

Identifies key assets and infrastructure that supports the DOD mission. Identifies the impact of loss of key assets.

27
Q

Vulnerability assessment

A

DOD, command, or unit level evaluation to determine the vulnerability of an attack

28
Q

Discuss the following in regards to ECP

A

Next

29
Q

Approach zone

A

Lies between the base boundary and access control zone

30
Q

Access zone

A

The main body of the ECP

31
Q

Response zone

A

End of the access zone going to the final barrier.

32
Q

Safety zone

A

Extends from passive and active barriers in all directions

33
Q

List techniques of a suicide bomber

A

Surveillance, rehearsal, bulky clothing, attempt to blend in, nervousness.

34
Q

What is the purpose of obstacles and barriers

A

Block movement of personnel/vehicles

35
Q

2 Types of searches

A

Standing and prone

36
Q

Standing search

A

Used on suspects who do not appear dangerous

37
Q

Prone search

A

Used on suspects who appear dangerous