Terrorism & Antiterrorism Flashcards
Calculated use of violence or threat of violence to instill fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological.
Terrorism
Defensive measures used for combating terrorism and to reduce our vulnerability to terrorist acts. Part of a much broader concept known as “force protection.”
Antiterrorism
Security program designed to protect soldiers, sailors, civilian employees, family, facilities, equipment, etc. in all locations and situations.
Force Protection
Accomplished through planned and integrated application of combating terrorism, physical security, operations security (OPSEC), person protective services, supported by intelligence, counterintelligence, and other security agencies.
Force Protection
True or False? Absolute protection against terrorism is possible.
False
Operate in small groups called “cells.” Cells work independent of each other to minimize damage.
Terrorist Organizations
True or False? Terrorist organization’s members are highly trained and use modern military techniques.
True
Three basic terrorist groups are:
(1) Crusaders
(2) Criminal or professionals
(3) Emotionally or mentally disturbed; sometimes referred to as “crazies”
Basic terrorist group that are ideologically inspired individuals or groups.
Crusaders
Basic terrorist group that commit terrorist acts for personal gain rather than ideology.
Criminals or professionals
Basic terrorist group that often derive some level of enjoyment in their terrorist acts.
Emotionally/Mentally disturbed; “crazies”
Three general categories of terrorist groups:
(1) Non-state supported
(2) State supported
(3) State directed
General category of terrorist group that operates autonomously, receiving no significant support from any government.
Non-state supported
General category of terrorist group that generally operates independently but receives support from one or more governments.
State supported
General category of terrorist group that operates as an agent of a government, receiving substantial intelligence, logistic, and operational support from the sponsoring government.
State directed
Terrorist Organization’s Immediate Goals:
- Demonstrate power and threat capabilities.
- Obtain worldwide, national, or local recognition
- Gain political power to influence elections, free prisoners, obtain money and equipment.
Terrorist Organization’s Long-Range Goals:
- Cause dramatic changes in government.
- Turn flow of events favorably for their side during civil/guerrilla warfare.
- Outlasting and demoralizing superior military forces.
Terrorist Organization’s Characteristics:
- Promotes fear through intimidation.
- Military weaker.
- Do not equate tactical success with mission success.
- Highly mobile and constantly operates covertly.
Three types of cells in a well organized terrorist group:
(1) Operational
(2) Intelligence
(3) Auxiliary
Type of cell that is composed of terrorists who comprise action arm of the group.
Operational
Type of cell that collects information on potential targets.
Intelligence
Type of cell that is usually used to perform support functions such as raising funds, screening recruits, or distributing propaganda.
Auxiliary
Paramilitary in nature, oriented to the mission, physical characteristics of the area of operations, and security environment in operational area.
Terrorist training programs
Conducted at the cellular level by member(s) of the group within the target country, usually in clandestine fashion.
Internal training
Non group member(s) outside the operational area conduct the training.
External training
Methods of Terrorist Operations
- Violence, speed, and surprise
- Meticulously planned
- Rehearse operation under conditions as close to the operational environment as possible.
Four basic phases of every terrorist operation:
(1) Pre-incident phase
(2) Initiation phase
(3) Climax phase
(4) Post-incident phase
Phase of terrorist operation where terrorist leaders decide what type of operation to be conducted and what they want to gain from the conduct of the operation.
Pre-incident phase
Phase of terrorist operation in which is the start of the operation and marks the physical move to commence the operation.
Initiation phase
Phase of terrorist operation in which is the high point of the terrorist actions. If no negotiations are involved, the fourth phase follows.
Climax phase
Phase of terrorist operation where terrorists re-group and discuss the operation to determine what went well of what went wrong with the operation.
Post-incident phase
Special phase that is characterized by negotiable terrorist’s demands, deadlines, talks, and trade offs.
Negotiation phase
Common method that is generally used for the killing of prominent persons and symbolic enemies as well as traitors who defect from the group.
Assassination
Common method that is the contemporary terrorist’s tactic of choice. (IED’s.)
Bombing
Common method that is a covert action wherein the perpetrators may not be known for some time. Requires elaborate planning and logistics.
Kidnapping
Common method that is an overt seizure of one or more individuals with the intent of gaining publicity or other concessions in return for release.
Hostage taking
Common method normally carried out to produce a spectacular hostage situation.
Hijacking/Skyjacking
Common method usually undertaken for one of three purposes: to gain access to radio or TV broadcast capabilities to make a statement; to demonstrate government’s inability to secure critical facilities, or national symbols; or for logistical purposes (money, arms, etc.)
Raids and/or attacks on facilities
Suspicious packages/objects:
(1) Establish cordon & evacuate all personnel.
(2) No radio transmissions. If needed, accomplish at minimum distance of 50 feet.
(3) No one touch the package/object.
(4) In event of package/object in doorway that is the only entry/exit, take shelter as far away as possible and do not exit.
(5) Describe object (location, size, color, unusual appearance, visible wires, etc.)
(6) Do not alter environment.
(7) All info compiled and passed to EOD team. Be observant.
Bomb recognition indicators:
- Excessive postage.
- Incorrect titles; titles but no names.
- Misspellings of common words.
- Oily stains or discolorations.
- No return address, excessive weight, rigid envelope
- Lopsided or uneven envelope.
- Protruding wires or tin foil, visual distraction.
- Foreign mail, air mail, any special delivery.
- Delivery, restrictive markings such as confidential, personal, etc.
- Handwritten or poorly typed address
- Excessive security material, such as masking tape, string, etc.
Bomb Threat via phone call
- OPNAV 5580/8 Telephone Threat Complaint will help you assist person in identifying caller, location of the bomb, and time of explosion.
Containing area around an incident and prevent unnecessary entry. Also allows level of control of what is going on inside the incident area.
Perimeter control
Represents an integrated, comprehensive approach within combat commands and the military services to counter terrorist threat to installations, bases, facilities, equipment, and personnel.
Anti-terrorism program
Proactive Phase
(1) Threat analysis
(2) Prevention
(3) Criticality/vulnerability assessment
(4) Authority and jurisdiction study
(5) Planning for reactive phase
Reactive Phase
Crisis management, reducing the impact of an incident after is has occurred.
Defined as the secretive, continuous, or periodic watching of persons, vehicles, and places or objects to obtain info.
Surveillance
Objective of Terrorist Surveillance
Gather all the info possible concerning a particular target so that the data can be assimilated into a precise plan of action.
Terrorist Surveillance has two phases:
(1) Target selection and assessment phase
(2) Operational and attack phase
Different forms of surveillance:
Foot, vehicle, and stationary
Most common form of surveillance
Stationary
Preventive measures to reduce your susceptibility to terrorist tactics.
Individual Protective Measures (IPM)