ESWS > SECURITY ESWS STUDY GUIDE > Flashcards
SECURITY ESWS STUDY GUIDE Flashcards
SECO
LT FOGEL
ADMIN
OS2 MICHAEL
EM3 LUCAS
CMAA / DIVO
MACM DSMUKE
OPS LCPO
MAC ADEPOJU
URINALYSIS PROGRAM
ABH1 SMITH
DEPARTMENTAL
LPO
MA1 BRYANT
W/C
SEC 1
OS2 WILSON
W/C
SEC 3
MA2 CHANDLER
W/C
SEC 2
AT2 WEAVER
W/C
SEC 4
MR2 THOMPSON
TRAINING
MA2 MARTINEZ
AT/FP
MA2 RAMOS
SUPPLY
MA2 SANTIAGO
INVESTIGATIONS
MA1 BRANT
MA2 CAEZZA
ARMORY
MA2 ARNETT
Deadly Force
Force that a person uses causing, or that a person knows or should know would create a substantial risk of causing, death or serious bodily harm. Deadly Force is justified only under conditions of extreme necessity and as a last resort, when all lesser means have failed, or cannot be reasonably employed.
The seven justifications of deadly force:
- Inherent Right of Self-Defense.
- Defense of Others.
- Assets Vital to National Security.
- Inherently Dangerous Property.
- National Critical Infrastructure.
- Serious Offenses Against Persons.
- Arrest or Apprehension.
- Escape.
Force Protection Conditions
Are a series of measures designed to increase the level of a unit’s defense against terrorist attacks.
ATFP PLAN
The ATFP plan defines the spectrum of measures, qualifications, responses and tactics necessary to counter and manage terrorist incidents. ATFP plans are dynamic and one plan may not fit all situations; commanders adapt and implement plans to meet changing circumstances.
Random Antiterrorism Measures (RAMS)
Random, multiple security measures that when activated, serve to disguise the actual security procedures in effect; RAMS deny the terrorist surveillance team the opportunity to accurately predict security actions. RAMS strictly vary the time frame and/or location for a given measure.
Each act of terrorism is designed to accomplish something specific as part of and overall
Strategy. Immediate or short-term goals usually include one or more of the following:
- Recognition
- Elimination of Western Influence
- Harassment, weakening or embarrassment of governments
- Attainment of money or equipment
- Destruction of facilities and disruption of communications
- Discouraging foreign investors
- Influence in government decisions
- Freedom of prisoners
- Satisfying vengeance
Phase I (TERRORIST OPERATIONS): Broad Target Selection
- This phase is the collection of information on a number of potential targets. This phase also includes open source and general information collection. Some features of this type of collection are:
Phase II (TERRORIST OPERATIONS): Intelligence Gathering and Surveillance
Targets showing vulnerabilities may receive additional attention and priority of effort. This priority establishes the requirement to gather additional information on a target’s patterns over time. This phase may be very short or can span years. The type of surveillance employed depends on the target type. Elements of information typically gathered include:
Practices/Procedures/Routines – For facilities this includes scheduled deliveries, work shift changes, identification procedures and other observable routines. For individuals, it can include regularly scheduled errands such as laundry pick up days or car parking locations.
Residence and Workplace – This category applies primarily to the physical layout and individual activities at the two places the target typically spends the most time.
Transportation/Routes of Travel – For individuals, this is the mode of transport and common routes to any regular destination such as house, work, gym, and school. For facilities, it addresses ingress and egress points, types of vehicles allowed on the grounds, or availability of transportation into the target site.
Security Measures – This is one of the most important areas of information for attack site selection, since intent is to bypass and avoid security measures and be able to strike the target during any period.
Phase III (TERRORIST OPERATIONS): Specific Target Selection
Selection of a target for actual operational planning considers some of the following factors:
Does successes affect a larger audience than the immediate victim(s)?
Will the target attract high profile media attention?
Does successes make the desired statement to the correct target audience(s)?
Is the effect consistent with objectives of the group?
Does the target provide an advantage to the group by demonstrating its capabilities?
What are the costs versus benefits of conducting the operation?
Phase IV (TERRORIST OPORATIONS): Pre-Attack Surveillance and Planning
Members of the actual operational cells begin to appear during this phase. This phase gathers information on the target’s current patterns, usually days to weeks. The attack team confirms information gathered from previous surveillance and reconnaissance activities. The areas of concern are essentially the same as in Phase II but with greater focus based on known or perceived vulnerabilities. The information gained is then used to:
Conduct security studies.
Conduct detailed preparatory operations.
Recruit specialized operatives (if needed).
Procure a base of operations in the target area (safe houses, caches, etc.).
Design and test escape routes.
Decide on type of weapon or attack.
Phase V (TERRORIST OPERATIONS): Rehearsals
As with conventional military operations, rehearsals are conducted to improve the odds of success, confirm planning assumptions, and develop contingencies. Terrorists also rehearse to test security reactions to particular attack profiles. Terrorists use both their own operatives and unsuspecting people to test target reactions. Typical rehearsals include:
Equipment and weapons training and performance.
Staging for final preparatory checks.
Deployment into target area.
Actions on the objective.
Escape routes.
Tests in the target area will be conducted to confirm:
Target information gathered to date.
Target pattern of activities.
Physical layout of target or operations area.
Security force reactions such as state of alert, timing response, equipment and routes.
Phase VI (TERRORIST OPERATIONS): Actions on the Objective
Once terrorists reach this stage of their operation, the odds favor a successful attack against the target. Terrorists conducting planned operations possess important tactical advantages. Since they are the attacker, they possess all the advantages of initiative and provide:
Use of Surprise.
Choice of time, place, and conditions of attack.
Employment of diversions and secondary or follow-up attacks.
Employment of security and support positions to neutralize target reaction forces and security measures. Because of the extensive preparation through surveillance and reconnaissance, enemy security measures will be planned for and neutralized.
Phase VII (TERRORIST OPERATION): Escape and Exploitation
Escape plans are usually well rehearsed and executed. The exception is a suicide operation where the impact is enhanced by the willingness to die in achieving the attack.
Exploitation is the primary objective of the operation. The operation must be properly publicized to achieve an intended effect. Media control measures and prepared statements are examples of preparations to effectively exploit a successful operation. These will be timed to take advantage of media cycles for the selected target audiences.
Terrorist Threat Types
- Threat or Hoax
- Arson
- Sabotage
- Bombing
- Kidnapping
- Hostage Taking
- Hijack/Seizure
- Raid or Ambush
- Assassination
- Aircraft Threats
- Maritime Threats
- Suicide Tactics
Terrorism
The calculated use of unlawful violence or threat of unlawful violence to inculcate fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological.
Counter Terrorism
Offensive measures taken to prevent, deter, and respond to terrorism.
How Terrorist identify and chose their victim/target
Does success affect a larger audience than the immediate victim(s)?
Will the target attract high profile media attention?
Does success make the desired statement to the correct target audience(s)?
Is the effect consistent with objectives of the group?
Does the target provide an advantage to the group by demonstrating its capabilities?
What are the costs versus benefits of conducting the operation?
Ideology Influences
Groups with secular ideologies and nonreligious goals will often attempt highly selective and discriminate acts of violence to achieve a specific political aim. The intention is to avoid a backlash that might damage the organization’s acceptability and maintain the appearance of a rational group that has legitimate grievances.
FPCON
The force protection condition (FPCON) system describes the progressive level of protective measures implemented by all DOD components in response to terrorist threats.
FPCON Normal
Applies when a general global threat of possible terrorist activity exists and warrants a routine security posture.
FPCON Alpha
Applies when there is an increased general threat of possible terrorist activity against personnel or facilities, the nature and extent of which are unpredictable. Alpha measures must be capable of being maintained indefinitely.
FPCON Bravo
Applies when an increased or more predictable threat of terrorist activity exists. Sustaining Bravo measures for a prolonged period may affect operational capability and relations with local authorities.
FPCON Charlie
Applies when an incident occurs or intelligence is received indicating some form of terrorist action or targeting against personnel or facilities is likely. Prolonged implementation of Charlie measures may create hardship and affect the activities of the unit and its personnel.
FPCON Delta
Applies in the immediate area where a terrorist attack has occurred or when intelligence is received that terrorist action against a specific location or person is imminent. This FPCON is normally declared as a localized condition. FPCON Delta measures are not intended to be sustained for substantial periods.
Security Alert
A Security Alert is an emergency inside the lifelines that requires an immediate response to protect REAGAN’s internal security. During a Security Alert only the following personnel may move about the ship: CO, XO, CDO, Department Heads, SSDF, and IET personnel responding to a casualty. Duty section personnel are allowed to transit only to the mess decks. ALL OTHERS MUST STAND FAST!
A Security Alert shall be called away under the following circumstances:
a. An intruder is known or suspected to be aboard.
b . Boarders or swimmers are detected and suspected of making an intrusion attempt.
c..A ship in the vicinity of REAGAN’s berth goes to security alert.
d. Security watch standers or personnel returning to the ship are suspected of being under duress.
e. Activation of installed security alarms on the following spaces without prior notification: SSES, Radio, Armory, Forward, Disbursing, or other alarmed spaces.
f. Call for assistance by a guard or security watch.
g. Failure by Sounding and Security or roving patrols to report to the OOD in person within 60 minutes of last report.
h. Any unscheduled loss of shore power (as determined by command and control). If the loss of power is obviously due to non-threat circumstances (i.e. weather), a security alert may hinder recovery efforts and is not required.
i. Any unauthorized use of the 1MC, including directing the movement of the CDO, and Duty GM (i.e. “CO, Quarterdeck”).
j. Any station calling the Quarterdeck and conveying the Duress Code (“requesting the presence” of designated covert security alert proword).
k. When ordered by higher authority
l. Any situation which command and control reasonably believes would threaten the physical security of the command or its personnel.
m. Any shipboard casualties (i.e. fire, flooding, etc) that the CDO or OOD feels may be a diversionary tactic to gain access to the ship.
n. Discovery of any Level II or Level III space left open or unattended as designated by Enclosure (2) of this instruction.
o. Any crewmember who states “I am not under duress.”