Black-5 Test 2 Flashcards
Types of Crowds
Demonstrators
Mobs
Riots
Demonstrators
Involve hundreds of thousands of people, many may be nonviolent and within their right to protest. Numbers can overwhelm the capabilities of law enforcement.
Mobs
A crowd whose members lose their concern for laws and authority and follow their leaders into unlawful and disruptive acts.
Riots
Noisy, violent, and uncontrolled public gatherings.
Goals of crowd control
Interim (immediate) Goal: disperse crowd
Short Term: Protection of vital assets
Long Term: Restoration of good order and discipline
Crowd control
Line Formation
Most common formation.
Offensive and defensive applications.
Crowd control
Echelon Formation
45 Degree angle.
Used to divert groups in either open or built-up areas and to move crowds away from buildings, fences, and walls.
Crowd Control
Wedge formation
Used to penetrate and split crowds.
Crowd Control
Diamond formation
used to enter a crowd and is the formation of choice for extraction teams.
Baton Handling
Parade Rest: baton in front parallel to ground
Port arms: Baton held diagonally across body
On Guard: Baton butt to hip with end of baton pointing at crowd.
Crowd control forward movement
unit assumes port arms position with batons in on guard position.
TL will order team to march in “mark time”
move front foot forward 10”
thrust baton forward
Crowd control movement to the rear
the order “Reverse…March”
lift rear foot 2” and move rearward 8”
concurrently baton will be thrust at crowd
balance shifted to rear foot
Crowd Control
Use of force to disperse crowd
Show of force is the primary tool in achieving interim goal.
Surveillance
A close watch over something or someone
Phases of Terrorist surveillance
- Target selection and Assessment phase: hard/soft targets.
2. Operational and attack phase
Forms of surveillance
Foot
Vehicle
Stationary: most common choice
Counter Surveillance
The ability to detect that something or someone is under surveillance. Hostile intentions not required.
Sentry responsibilities in detecting terrorist surveillance
Know your area. What is normal?
Receive a complete turn over brief
Maintain a log
Detection is the key to interrupting a terrorist operation
What to do if you suspect surveillance of self, installation, or ship?
Do not confront
Call supervisor; use chain of command
Make a complete report
Counter surveillance (get accurate description)
Terrorism
The calculated use of violence to instill fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological.
Counter Terrorism
Defensive measures used for combating terrorims and to reduce our vulnerability to terrorist acts. Antiterrorism is a part of a much broader concept known as “force protection”.
Force Protection
Security program designed to protect Military, civilian employees, family of, facilities, and equipment in all locations and situations.
Accomplished by: Physical security, OPSEC, Intel, counter intel…
Is absolute protection against terrorism possible?
No
Three Basic Terrorist Groups
Crusaders: Ideologically inspired individuals or groups
Criminals or professionals: personal gain
Emotionally or mentally disturbed “Crazies”: Enjoyment in their terrorist acts.
Terrorist Categories
Non-State supported: operates autonomously
State Supported: operates independently, but receives support from one or more governments.
State directed: Operates as an agent of a government
Terrorist Goals
Immediate Goals: Demonstrating power and threat capabilities. obtain recognition for their cause.
Long range goals: Cause dramatic changes in government. Outlasting and demoralizing superior military forces.
Terrorism Characteristics
- Promotes fear through intimidation
- They do not always equate tactical success with mission success
- Highly mobile
- operates covertly
Terrorist Group structure
Operational Cell
Intell Cell
Auxiliary Cell: admin logistics
Methods of terrorist operations
Violence, speed, and surprise characterize terrorist operations.
Four basic phases of every terrorist operation
- Pre-incident phase
- Initiation phase
- Climax phase and Negotiation phase
- Post-incident phase
OPNAV 5580/8
Telephonic Threat complaint
Individual protective measures (IPM)
preventive measures to reduce your susceptibility to terrorist tactics.
Soft Target
Predictable
Individual protective measures
Being a hard target is a mindset
ABC rule of radio transmission
Accuracy, Brevity, Clarity.
Microphone distance
2-3” from mouth
Primary means of communication
Base Station
Portable radio
OPNAV 5580/25
Communication Log: chronological log of all significant radio transmissions within a 24 hour period.
OPNAV 5580/19
Desk Journal: 24 hr chronological record of events. Comms log 5580/25 will be filed here.
Sentry: General Rules at all posts
- Watch for and report attempts at surveillance.
2. Challenge individuals on or near your post.
Immediate actions varies due to?
- Watch location
- Type of terrorist threat
- ROE
Shoot/Don’t shoot decisions
- ROE
- Knowledge of your weapon and your post.
- Authorized fields of fire.
- Protect yourself and others
- Be able to explain reasons for use of force.
- Log incident
What were harbor security boat patrol tactics developed for?
Non-Nuclear; low intensity conflicts.
Minimum boat requirements for a harbor security unit?
- Two fully equipped boats.
2. Command center located ashore or on a floating asset.
High profile patrol?
Overt patrol designed to ensure a visible deterrent to aggressor forces is prominent in the area.
Standoff Distance?
Closest approach to the asset that an intruding vessel will be allowed.
Perimeter
- The area that will be patrolled or actively surveyed.
2. Provides a multi-layer defense posture.
Boat operation tactics
Single
Two boat patrol
Combined Patrol
Suspect intruder approach
Approach from the quarter and up both sides
Force protection perimeter; Threat Zone?
Security boats will hail and warn away crafts in this area.
Patrol will use appropriate levels of force until the threat retreats outside threat zone.
Force protection perimeter; Warning Zone?
area around asset where access will be controlled and is established based on scope of activity expected.
Force protection perimeter; Assessment zone
- extends beyond warning zone.
2. area used to classify intruder as authorized, unauthorized, or unknown
Security boat manning?
- Coxswain
- bow hook
- engineer/stern hook
- at least two security force personnel.
DoD antiterrorism policy; two phases
Phase 1: Proactive Phase
Phase 2: Reactive Phase
Individual Protective Measures (IPM)
Preventive measures to reduce susceptibility to terrorist attack.
- Determining threat
- Don’t be a target/victim
- Don’t be a soft target.
- Have a “hard-target” mindset.
- protect your home
Terrorist surveillance has two phases?
- Target selection and assessment phase
2. Operational and attack phase