ATFP Flashcards
List some tactics used by terrorists
- Assassination
- Arson
- Bombing
- Kidnapping/ Hostage taking
- Hijacking
- Sabotage
- Piracy
- Seizure
- Raids or Ambushes
- Threats or Hoaxes
- Environmental Destruction
- Active Shooter
- Insider Threat
Describe 6 Phases of Terrorist Attack Methodology:
- Target options
- Selection surveillance
- Target selection
- Detailed surveillance
- Training and preparation
- Attack
Target Options
- Determine objective
- Self assessment
- Develop list of potential targets
Selection Surveillance
- Data gathered by watching potential targets
- Refine list of potential targets
Target Selection
- Watch for vulnerabilities
- weak defense/ security
Detailed Surveillance
- Detect routines
- procedures
- site-specific security measures
Training and Preparation
Sentries note the descriptions of suspected surveillance activity:
- Gender, height, weight, hair color, build, race, identifying marks.
- Clothing
- Equipment, camera, phone, or notebook
- Time of day
- Exact location of suspicious activity
- Detailed description of vehicle
Attack
Attacks can occur at installation, unit, exercise, port, ship, residence, facility or other sites.
What does FPCON stand for?
Force
Protection
CONdition
How FPCON Levels are there and what are they?
5 Normal Alpha Bravo Charlie Delta
FPCON Normal
- General global threat of possible terrorist activity
- Routine security posture
FPCON Alpha
-Increased general threat of possible terrorist activity -Must be able to maintain indefinitely
FPCON Bravo
- Increased or more predictable threat of terrorist activity
- Maintainable for weeks
- Not cause: undue hardship, affect operational capability, aggravate local authorities
FPCON Charlie
- When an incident occurs or intelligence is received indicating some form of terrorist action or targeting against personnel or facilities is likely
- Must be able to maintain for short period only
- Must not cause hardship and affect peacetime activities of the unit and its personnel
FPCON Delta
- Immediate area where a terrorist attack has occurred or when intelligence is received that terrorist action against a specific location or person is imminent
- Localized condition
- Not intended to be sustained
Discuss Critical and Vulnerability Assessments
Help planners determine:
- Which assets are critical to unit’s mission
- Which are most vulnerable to attack.
What is an Anti-Terrorism/Force Protection Plans?
Plan that documents specific measures to
- Establish and maintain an antiterrorism/ force protection program
- Ensuring readiness against terrorist attacks
What does ECP stand for?
Entry Control Point
Assessment Zone
- Around ECP
- Visual range of the base gate guard or Quarterdeck watch.
Warning Zone
- At ECP
- Physically separated area
- Where unknown and unauthorized personnel are inspected and identified.
Threat Zone
- The area past the post
- ECP standoff zone to the protected asset or area
Suicide Bomber Techniques Indicator:
- Surveillance, focusing on ECP
- Rehearsals in or around ECP
- Information about illicit access to facility blueprints
- Unseasonable, conspicuous, or bulky clothing
- Obvious or awkward attempts to blend into crowds
- Repeated/ nervous handling of clothing items
Interview Techniques
Used to determine hostile intent
Obstacles and Barriers
-Disrupt
-Channel
-Turn
-Block
Movement of personnel or vehicles
Constructed using Defense In Depth Principles.
What is the first thing you must do before conducting a Personnel/Detainee Search?
Apply handcuffs
What are the two most commonly used searches by NSF?
Standing
Prone
The standing search
Suspects do not appear Dangerous/ Violent/ Able to stand on own
The prone search
Suspects appear Dangerous/ Violent/ Drunk (unable to stand)
What are 3 steps in conducting a Vehicle Search?
- Evaluate information from driver/owner
- When was vehicle last operated; is it locked; who is the intended target, driver, or passenger?
- Check area for signs of tampering
Define Deadly Force:
Force that a person uses causing,
or that a person knows or should know would create a substantial risk of causing,
death or serious bodily harm
When is deadly force authorized?
- Self-defense and the Defense of others
- Assets involving National Security
- Assets NOT involving National Security but Inherently Dangerous to others
- Serious Offenses Against Persons
- Protecting Public Health or Safety
- Escape
What is the Deadly Force Triangle?
- Opportunity
- Capability
- Intent
What are the 6 steps in the Escalation of Force?
- Presence
- Verbal/Visual
- Soft Controls (Escorts or handcuffs)
- Hard Controls (Takedowns or OC spray)
- Non-lethal Weapons (Baton)
- Lethal Weapons
What is the purpose of SROE?
Establish fundamental policies and procedures
governing the actions
taken during all military operations
What is a Combatant?
Person engaged in hostilities against the United States.
What is a Lawful Combatant?
Members of regular armed forces (uniformed)
What is a Noncombatant?
Members who do not take direct part in hostilities:
- Medical Personnel
- Chaplains
What is LOAC?
Laws of Armed Conflict
What are violations of LOAC?
- Offenses against POW (Killing, Torture, Inhumane treatment)
- Offenses against civilians (Killing, Rape, Torture, etc.)
- Offenses against Sick and Wounded
- Denial of quarter and offenses against combatants who have laid down their arms and surrendered
- Offenses against the survivors of ships and aircraft
- Wanton destruction of cities, towns, and villages
- Deliberate attack upon Medical Facilities
What are the fire control commands?
- Open Fire
- Cease Fire
- Check Fire
What do you do when a fire control command is spoken?
Repeat as it is received.
What steps can be taken to defend against “detailed surveillance”
Effective counter surveillance program
What is the purpose of an “effective counter surveillance program?”
- Detect patterns of detailed surveillance
- Alert of impending attack
The attack team is selected and chosen when
After completion of the attack plan
What is the size of the terrorist attack team?
Minimal effective number to ensure secrecy
What do terrorist wait for and how long will they wait
- Right set of circumstances
- Months or years
While waiting to attack, what actions will terrorists take if there is a change in targets routine or level of security?
- Change attack profile
- Plan will be changed or scrapped
List of the tactics used by terrorists
- Assassination
- arson
- bombing
- hostage taking
- kidnapping
- hijacking or skyjacking
- seizure of important building or assets
- raids or attacks on facilities
- sabotage
- employment of WMD
- information warfare
Criticality and vulnerability assessment.
- Determine most mission critical assets
- Which are most vulnerable to attack
Planning and Response elements assessment.
Planners analyze strengths and weaknesses of major antiterrorism planning and response elements
AT plans should do what two things?
- Prepare for most likely threats
- Maximize existing plans and SOPs
How should AT plan utilize existing plans and SOPs?
Referencing them, not restating
All AT measures should be what two things?
- Scalable
- Proportional to increases in local threat/ unit operational capability
AT measures should include what?
- Random antiterrorism measures (RAMs)
- Provisions for use of physical structures
- Physical security equipment
- CBRN detection and protection equipment
- Response forces
- Other emergency response measures
In regards to ATFP, what does RAM stand for?
Random Anti-terrorism Measures
What four zones should an ECP consider?
- APPROACH ZONE: traffic speed/vehicle type/ maneuver limited
- ACCESS CONTROL ZONE: personnel/ vehicle credentials established, vehicles inspected
- RESPONSE ZONE: provides reaction time for ECP personnel
- FINAL DENIAL BARRIER: entry or exit requires positive action
Which zone of an ECP should be screened to protect from surveillance by enemy forces
Access Control Zone
What two things are a major threat to an ECP?
- SVEST
- VBIED
Why are suicide bombers favored by terrorist?
Control time and place of detonation
What types of interviewing techniques, or question, should an ECP sentry ask?
- Neutral
- Relaxing
- Control or symptomatic
- ‘polygraph like questions”
What is the purpose of obstacles and barriers?
Slow down or disrupt vehicles and personnel approaching area
Examples of things used to construct barriers
- electronic barriers
- trenches
- masonry barriers
- concrete filled oil drums
- vehicles
What type of formation should barriers be placed in and why
Zigzag or maze like Forces vehicles to - slow down - make sharp turns - exposes driver to capture or direct fire
What two things should a suspect be searched for?
- Weapons
- Evidence
What should be done prior to transporting apprehended suspects?
Search them
What step should be taken before any search is conducted on a suspect?
handcuffs
What is the main difference between a bomb on a vehicle and a bomb in a building?
- building bomb has a timer
- vehicle bomb - triggering device
What is the intention behind vehicles based devices?
Designed to kill rather than harass
How long does a vehicle bomb take to place and how long can a search take
- 15-30 seconds to place
- hours to find
General order 1
Take charge of this post, and all government property in view
General order 2
To walk my post in a military manner, observing everything that takes place within sight or hearing
General order 3
To report all violations of orders I am instructed to enforce
General order 4
To repeat all calls from posts more distant from the guard house than my own
General order 5
To quit my post only when properly relieved
General order 6
To receive, obey, and pass onto the sentry who relieves me all orders of the Commanding Officer, Command Duty Officer, Officer of the Deck, and all Officers and Petty Officers of the watch only
General order 7
To talk to no one except in the line of duty
General order 8
To give the alarm in case of fire or disorder
General order 9
To call the Officer of the Deck in any case no covered by instructions
General order 10
To salute all officers and all colors and standards not cased
General order 11
To be especially watchful at night, and during the times for challenging.
To challenge all persons on or near my post and to allow no one to pass without proper authority