Antiterroism/Force Protection Flashcards

1
Q

Discuss tactics used by terrorists

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Assassination

A

Deliberate action to kill a prominent individual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Arson

A

Low risk to the perpetrator, often used for symbolic attacks 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bombing

A

IED’s and suicide bombings are the most common 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Kidnapping/hostagetaking

A

Unlawful seizure of an individual. Usually result in someone being held hostage. 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hijacking

A

The forceful commandeering of a mode of conveyance. 

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Seizure

A

Occupying or holding a prominent building or object of symbolic value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Raids/ambushes

A

A surprise attack with violent execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Sabotage

A

A deliberate action to weaken an entity through destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threats/Hoaxes

A

Any terrorist group with credibility can create a hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Environmental destruction

A

An act that damages the environment.

Ex: dumping chemicals into water supply or food supply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Phases of terrorist attack methodology

A

Next

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Broad target selection

A

Terrorist examine details of a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Initial intel and surveillance

A

Mobile and fixed surveillance. (Follow the target, or observe in one spot)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Specific target selection

A

Terrorist will examine watch schedules, ECP procedures, volume of traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pre attack surveillance and planning

A

Use electronic means to assist in surveillance

17
Q

Attack rehearsal

A

Rehearse actions prior to the attack

18
Q

Actions on the objective

A

Attacks can occur on an installation, unit, exercise, or ship.

19
Q

Escape and exploration

A

Terrorist flee the scene

20
Q

Post attack surveillance and documentation

A

Terrorist watch from a safe distance

21
Q

FPCON Normal

A

Global threat of terrorist activity

22
Q

FPCON Alpha

A

Possible terrorist activity against personnel/facilities

23
Q

FPCON Bravo

A

More predictable threat of terrorist activity exists

24
Q

FPCON Charlie

A

Terrorist action is likely to occur

25
FPCON Delta
Terrorist attack has occurred
26
Criticality assessment
Identifies key assets and infrastructure that supports the DOD mission. Identifies the impact of loss of key assets.
27
Vulnerability assessment
DOD, command, or unit level evaluation to determine the vulnerability of an attack
28
Discuss the following in regards to ECP
Next
29
Approach zone
Lies between the base boundary and access control zone
30
Access zone
The main body of the ECP
31
Response zone
End of the access zone going to the final barrier.
32
Safety zone
Extends from passive and active barriers in all directions
33
List techniques of a suicide bomber
Surveillance, rehearsal, bulky clothing, attempt to blend in, nervousness.
34
What is the purpose of obstacles and barriers
Block movement of personnel/vehicles
35
2 Types of searches
Standing and prone
36
Standing search
Used on suspects who do not appear dangerous
37
Prone search
Used on suspects who appear dangerous