Antiterrorism Flashcards
Who is the security officer
LT Coon
Who is the DLCPO
MACM Mello
Define the use of deadly force. (verbatim)
Force that a person uses causing, or that a person knows or should know would create a substantial risk of causing, death, serious bodily harm, or injury.
Describe force protection conditions (fpcons)
Fpcon system describes the progressive level of protective measures implemented by all DoD components in response to terrorist threats. Principle means to applie an operational decision on how to best guard against the threat
Describe PLANS
Used to provide guidance, policy, and detailed execution for sustained AT/FP operations. Plans should incorporate all critical infrastructure, assets and areas, operational capabilities, and personnel
Describe random antiterrorism measures (RAM)
Required in FPCON alpha and bravo.
RAM’s are the single most effective means to disrupt the terrorist planning cycle and deter an attack.
Describe defense in depth
Layers of overlapping defensive measures and contingency plans. Designed to thwart attack and bolster defensive measures.
Give examples of defense in depth
Entry control points, contact, cover, and rovers
Give characteristics of terrorist operations
Seek to intimidate Militarily weaker Urban based Highly mobile Well trained Covert Simple
Give objectives of terrorist operations
Recognition
Elimination of western influence in a region
Free prisoners
Satisfy vengeance
What are the three categories of terrorist organizations
Chain networks
Hub and star
All-channel
Describe chain networks
Each cell links to the node next In sequence. Coms between the nodes is by passing info along the line.
Common among networks that smuggle goods and people or launder money.
Describe hub and star
Cell coms with one central element. The central cell need not be the leader or decision maker for the network. Outer nodes may communicate with a few outer cells in edition to the hub. Common among financial or economic networks.
Describe an all-channel
All nodes are connected to Each other. Indicating there is no hierarchical command structure above it. Command and control is distributed within the network. Communication intensive and can be a security problem if the linkages can be identified or tracked.
Where are the phases of terrorist operations.
Broad target selection Intel and surveillance Specific target selection Pre-attack surveillance and planning Attack rehearsal Actions at the objective Escape and exploitation