ATFP Flashcards
List some tactics used by terrorists
- Assassination
- Arson
- Bombing
- Kidnapping/ Hostage taking
- Hijacking
- Sabotage
- Piracy
- Seizure
- Raids or Ambushes
- Threats or Hoaxes
- Environmental Destruction
- Active Shooter
- Insider Threat
Describe 6 Phases of Terrorist Attack Methodology:
- Target options
- Selection surveillance
- Target selection
- Detailed surveillance
- Training and preparation
- Attack
Target Options
- Determine objective
- Self assessment
- Develop list of potential targets
Selection Surveillance
- Data gathered by watching potential targets
- Refine list of potential targets
Target Selection
- Watch for vulnerabilities
- weak defense/ security
Detailed Surveillance
- Detect routines
- procedures
- site-specific security measures
Training and Preparation
Sentries note the descriptions of suspected surveillance activity:
- Gender, height, weight, hair color, build, race, identifying marks.
- Clothing
- Equipment, camera, phone, or notebook
- Time of day
- Exact location of suspicious activity
- Detailed description of vehicle
Attack
Attacks can occur at installation, unit, exercise, port, ship, residence, facility or other sites.
What does FPCON stand for?
Force
Protection
CONdition
How FPCON Levels are there and what are they?
5 Normal Alpha Bravo Charlie Delta
FPCON Normal
- General global threat of possible terrorist activity
- Routine security posture
FPCON Alpha
-Increased general threat of possible terrorist activity -Must be able to maintain indefinitely
FPCON Bravo
- Increased or more predictable threat of terrorist activity
- Maintainable for weeks
- Not cause: undue hardship, affect operational capability, aggravate local authorities
FPCON Charlie
- When an incident occurs or intelligence is received indicating some form of terrorist action or targeting against personnel or facilities is likely
- Must be able to maintain for short period only
- Must not cause hardship and affect peacetime activities of the unit and its personnel
FPCON Delta
- Immediate area where a terrorist attack has occurred or when intelligence is received that terrorist action against a specific location or person is imminent
- Localized condition
- Not intended to be sustained
Discuss Critical and Vulnerability Assessments
Help planners determine:
- Which assets are critical to unit’s mission
- Which are most vulnerable to attack.
What is an Anti-Terrorism/Force Protection Plans?
Plan that documents specific measures to
- Establish and maintain an antiterrorism/ force protection program
- Ensuring readiness against terrorist attacks
What does ECP stand for?
Entry Control Point
Assessment Zone
- Around ECP
- Visual range of the base gate guard or Quarterdeck watch.
Warning Zone
- At ECP
- Physically separated area
- Where unknown and unauthorized personnel are inspected and identified.
Threat Zone
- The area past the post
- ECP standoff zone to the protected asset or area
Suicide Bomber Techniques Indicator:
- Surveillance, focusing on ECP
- Rehearsals in or around ECP
- Information about illicit access to facility blueprints
- Unseasonable, conspicuous, or bulky clothing
- Obvious or awkward attempts to blend into crowds
- Repeated/ nervous handling of clothing items
Interview Techniques
Used to determine hostile intent
Obstacles and Barriers
-Disrupt
-Channel
-Turn
-Block
Movement of personnel or vehicles
Constructed using Defense In Depth Principles.
What is the first thing you must do before conducting a Personnel/Detainee Search?
Apply handcuffs
What are the two most commonly used searches by NSF?
Standing
Prone
The standing search
Suspects do not appear Dangerous/ Violent/ Able to stand on own
The prone search
Suspects appear Dangerous/ Violent/ Drunk (unable to stand)
What are 3 steps in conducting a Vehicle Search?
- Evaluate information from driver/owner
- When was vehicle last operated; is it locked; who is the intended target, driver, or passenger?
- Check area for signs of tampering
Define Deadly Force:
Force that a person uses causing,
or that a person knows or should know would create a substantial risk of causing,
death or serious bodily harm
When is deadly force authorized?
- Self-defense and the Defense of others
- Assets involving National Security
- Assets NOT involving National Security but Inherently Dangerous to others
- Serious Offenses Against Persons
- Protecting Public Health or Safety
- Escape
What is the Deadly Force Triangle?
- Opportunity
- Capability
- Intent