Antiterrorism Flashcards
Force Protection Conditions (FPCONS)
The FPCON level program is a Chairman of the Joint Chiefs of Staff-approved program
standardizing the military Services’ identification of, and recommended responses to, terrorist threats and terrorist acts against United States (U.S.) personnel and facilities. It facilitates inter- service coordination and support for AT activities. The FPCON level system is a progressive system designed to shape the AT operational environment in terms of threat integration, resource allocation, and operational continuity. Designed to be proactive in application, the FPCON level process allows commanders to implement graduated measures across systems, resulting in an appropriate security posture. DODI O-2000.16, Volume 2, Department of Defense Antiterrorism (AT) Program Implementation: Department of Defense Force Protection Condition (FPCON) System, delineates implementation of specific DOD mandatory measures at each FPCON level for afloat and ashore commands. Geographic combatant commander (GCC) supplemental measures to be implemented at each FPCON level for afloat and ashore commands are delineated in respective GCC instructions and/or directives. When a change in FPCON is directed (increased or decreased), voice and message attainment reports will be made via tactical control (TACON) for the FP chain of command. Afloat units will make reports to their immediate superior in command (ISIC) and briefs the installation commanding officer (ICO). The ICO will typically make reports to the regional commander via the regional operations center (ROC). The designated supervisor will brief security/AT watch standers on any changes to the FPCON and include additional threat information or modifications to prescribed measures. Watch standers will report completion of directed changes to the antiterrorism tactical watch officer (ATTWO) or the designated supervisor (i.e., watch commander (WC)). The CO or designated representative is responsible for understanding the reporting requirement and informing the chain of command
a progressive system designed to shape the AT operational environment in terms of threat integration, resource allocation, and operational continuity?
FPCON level
What zone add structure to defense in depth?
Assessment Zone and
Threat Zone
Terrorists gather exhaustive operational knowledge of a target through _______, but they can also exploit targets of opportunity.
Surveillance
Vessels must be classified as either a threat or nonthreat before entering this zone.
Threat Zone
Terrorists will often conduct detailed preoperational planning and surveillance prior to executing an act of terrorism. Which of the following represent typical steps of a terrorist attack planning cycle in order?
Target Selection, Surveillance, Final Selection, Tactical Level Planning, Final Surveillance, Deployment, Attack.
All surveillance reporting should be in compliance with…
OPNAVINST F3100.6J and DODI 2000.26 (eGuardian reporting requirement).
_______ have accounted for over one-half of all recorded international terrorist attacks since 1983.
Bombings
An action taken against a prominent individual for a specific reason.
Kidnapping
Terrorism is primarily a _________ act that communicates through violence or the threat of violence.
Psychological
Terrorist strategies will be aimed at publicly causing damage to symbols or inspiring fear. Timing, __________, and method of attacks accommodate mass media dissemination and optimize current news impact.
Location
On October 12, 2000, what U.S. Naval vessel, assigned to the U.S. Fifth Fleet, was the target of a small-boat attack in the Port of Aden, Yemen.
USS Cole
What type of device is considered to be much more lethal than a PBIED due to the greater payload
VBIED
An _______________ is defined as any inadvertent leaving of personal property in a common area during routine business where there is no evidence of any suspicious activity or observable malicious intent.
Unattended package
Seeing race as the defining characteristic of a society and a basis of cohesion.
Ethnocentric
Force Protection Conditions
Chairman of the Joint Chiefs of Staff-approved program standardizing the identification and recommended responses to terrorist threats/acts against US personnel and facilities.
Facilitates inter-service coordination and support for AT activities.
Designed to be proactive in application, the FPCON level process allows commanders to implement graduated measures across systems, resulting in an appropriate security posture.
When a change in FPCON is directed, voice and message reports will be made via TACON for the FP CoC. Afloat units will make reports to their ISIC and briefs the installation commanding officer (ICO). The ICO will typically make reports to the regional commander via the regional operations center (ROC). The designated supervisor will brief security/AT watch standers on any changes to the FPCON and include additional threat information or modifications to prescribed measures. Watch standers will report completion of directed changes to the ATTWO or the designated supervisor (i.e., watch commander (WC)). The CO or designated representative is responsible for understanding the reporting requirement and informing the chain of command.
Antiterrorism Plan
Baseline plans provide the guidance, policy, and detailed execution required for sustained AT operations. These plans incorporate operational consistencies relative to the physical protection of afloat and ashore critical infrastructure, personnel, operational capabilities, restricted areas, ship systems/tenant activities, and security force training.
Each installation and unit shall develop standing plans to provide a baseline level of security and procedures to increase security postures.
Random Antiterrorism Measures
present a robust security posture from which a terrorist cannot easily discern patterns and routines that are vulnerable to attack.
The goal of a RAM program is to deter, detect, and disrupt terrorist attacks. The effectiveness of a RAM program, to instill uncertainty of success in the minds of would-be terrorists, is measured by how formidable, unpredictable, and ambiguous the installation or ship appears.
Defense in Depth
Assessment Zone
Warning Zone
Threat Zone
Assessment Zone
The outermost defense zone, which typically does not have boundaries. Security forces detect and identify contacts as they approach or pass near the protected asset or area.
Warning Zone
Security forces must classify contacts as either threats or nonthreats. In this zone, security forces initially interact with contacts to determine hostile intent and provide a physical presence to control access to a restricted area. Standard operating procedures must clearly define methods and steps that can be used to determine hostile intent so watch standers can avoid ambiguity and hesitation.
Threat Zone
innermost layer of defense in depth. All personnel, vehicles, and vessels must be classified as either a threat or nonthreat before entering this zone. To neutralize threats, the threat zone must be organized to bring maximum destructive fire, via CSWs or other weapons, to bear on targets while minimizing the risk of fratricide and damage to assets.
Surveillance
Before initiating an attack, terrorists conduct months or years of meticulous planning to maximize the likelihood of success.
Terrorists gather exhaustive operational knowledge of a target through surveillance. Terrorists use surveillance to assess capabilities of security systems, judge effectiveness of security measures, and identify security weaknesses. They closely examine all details of a target, including watch schedules, entry control procedures, periodicity of roving patrols, volume of traffic, citizenship of security guards, and the presence of defensive weapons.
Terrorist Surveillance Techniques
Terrorists will often conduct detailed preoperational planning and surveillance prior to executing an act of terrorism. The following represent typical steps of a terrorist attack planning cycle:
Target Selection
Surveillance
Final Selection
Tactical Level Planning
Final Surveillance
Deployment
Attack
Target Selection
Initiates the operational cycle timeline. A target or groups of targets are selected
Surveillance
Potential targets are placed under surveillance to assess risk, vulnerability, and probability of success.
Final Selection
Surveillance assessment data is evaluated and analyzed to further refine the target selection and method of attack.
Tactical Level Planning
Specific TTP for the attack are determined including logistics, materials, and methods. The target is clearly defined and vulnerabilities are identified.
Final Surveillance
Additional surveillance is conducted to validate previously collected data and to familiarize the terrorists with the attack plan.
Deployment
When personnel and resources are in place, the terrorist element will deploy to the selected site for tactical execution of the plan.
Attack
The type of attack (close in or standoff) as well as the specific timing is predicated on a number of variables including the specific TTP being employed by the terrorist cell.
Detecting surveillance
Personnel, especially sentries and watch standers, must become familiar with their surroundings and normal unit operating procedures. Armed with heightened awareness, personnel must be able to detect the slightest changes which may be indicators of surveillance activity.
Terrorist surveillance-detection activities include the following
-Multiple sightings of the same suspicious person, vehicle, or activity, separated by time, distance, or direction.
-Individuals staying at bus/train stops for extended periods while buses/trains arrive and depart.
-Individuals engaging in long conversations on pay or cellular telephones.
-Individuals ordering food at a restaurant and leaving before the food arrives or ordering without eating.
-Joggers standing and stretching for an inordinate amount of time.
-Individuals sitting in a parked car for an extended period of time.
-Individuals wearing improper attire for the location (or season) and not fitting into the
surrounding environment.
-Individuals drawing pictures/taking notes or photographs in an area not normally of interest to a standard tourist; showing interest in security cameras and guard locations; or noticeably watching security reaction drills and procedures.
-Individuals exhibiting unusual behavior (e.g., staring at or quickly looking away from individuals or vehicles as they enter or leave designated facilities or parking areas).
-False phone threats.
-Individuals approaching security checkpoints to ask for directions or innocently attempting to smuggle nonlethal contraband through checkpoints in order to determine the effectiveness of search procedures and to gauge the alertness and reaction of security personnel.
-Vehicle breakdowns on or near base or gates.
-Vehicles with an excessive number of antennas (possibly indicating two-way radios).
-Personnel or vehicles performing evasive movements.
-A dirty vehicle with a clean license plate or vice versa, indicating a recent change.
Reporting surveillance
Personnel detecting or suspecting surveillance of assets or areas should immediately report it to the chain of command so that civilian or military LE authorities can take appropriate actions. Sentries or watch standers should have the ability to note descriptions and details of any suspected surveillance activity.
Observers must note the following information:
1. Detailed descriptions of suspicious personnel to include:
a. Gender, height, weight, hair color, build, race, and identifying marks b. Clothing
c. Equipment carried by suspicious personnel (e.g., a phone, camera, or
notebook).
2. Time of day
3. Exact location of suspicious activity
4. Detailed description of vehicle.
Surveillance-detection Countermeasures
Preplanned surveillance-detection countermeasures to deter terrorist activities include installing mechanical devices, varying modes of watch-stander behavior, and employing physical barriers. Effective countermeasures specifically include the following:
1. Installing and displaying visible security cameras and motion sensors 2. Employing RAMs to include:
a. Roving security patrols with varying size, timing, and routes b. Sentry watch rotations.
c. Active searches (including X-ray machines and explosive detection
devices) of vehicles and personnel at ECPs.
d. MWD/EDD teams at ECPs.
3. Emplacing barriers, roadblocks, and entry mazes.
4. Visibly displaying CSW and sentries
5. Properly equipping sentries with NVDs, binoculars, thermal imagers, and other gear to enhance surveillance detection.
6. Ensuring sentries receive training in detecting surveillance activities.
7. Establishing sentry posts to ensure all potential surveillance locations can be observed.
8. Ensuring a camera is readily available for surveillance detection.
Surveillance-detection measures assist personnel with consistently maintaining a vigilant stance. By proactively watching for suspicious activity, observers have the highest chance of deterring terrorist attacks before they become a reality.
TERRORIST TACTICS
Terrorist tactics vary in sophistication according to the level of training the individual or group has received. The objectives and sophistication of the terrorist group will dictate, to some degree, the tactics used. Terrorist objectives may include attracting publicity for a group’s cause, demonstrating the group’s power or the existing government’s lack of power, exacting revenge, or causing government overreaction. Regardless of the tactics or objectives, terrorists seek to identify and exploit vulnerabilities or seams in security. A critical factor in understanding terrorism is the emotional impact of the terrorist act on an audience other than the victim. The terrorist of today will exploit information operations (IO) against the United States as much as the media will allow. News media coverage is important to terrorists who are attempting to incite public fear or gain attention for their cause. Another determinant of tactics and target selection is the role the terrorist group perceives itself as playing. Terrorism can be used as either an overt or a covert aspect of a political movement engaged in a power struggle within an existing political system. Terrorists frequently claim affiliation with causes or political organizations to give their actions a claim to respectability. Terrorist tactics are criminal violations that require expert criminal investigation with a goal toward prosecution.
Common terrorist tactics include:
- Assassination.
- Arson.
- Bombing.
- Hostage Taking.
- Kidnapping.
- Hijacking or Skyjacking.
- Seizure.
- Raids or Attacks on Facilities.
- Sabotage.
- Weapons of Mass Destruction.
- Information Warfare (IW).
Assassination
A term generally applied to the killing of prominent persons and symbolic enemies as well as traitors who defect from the group.