Volume 2 CDCs Flashcards

1
Q

When can USAF personnel use objectively reasonable force

A

While conducting authorized missions or official duties to obtain compliance from an individual or individuals to meet lawful objectives or mission requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four UTP areas

A

Position of advantage, response/action, threat assessment/decision making, evaluation/follow through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In what ways must the use of force be objectively reasonable

A

In intensity, duration, and magnitude upon totality of circumstances to counter threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the security forces reliability standard require of all security forces members

A

To be routinely monitored for reliability to perform security and law-enforcement duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What standard must the use of force meet

A

Objective reasonableness standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three main elements of action and assessment in application of force

A

Tools, tactics, and timing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the special considerations for the use of fire arms and deadly force

A

When feasible, order halt before discharging weapon. Use due regard for the safety of innocent bystanders when using deadly force. No warning shots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are command authority describing the circumstances and limitations needed so we can start or continue at military operations as known as

A

Rules of engagement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two distinct categories of our ROEs

A

Self-defense or mission accomplishment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is hostile intent

A

The imminent threat of force against US forces including threat of force to prelude or impede the missing and/or duties of US forces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is verbal communication done

A

With both the conscious and unconscious mind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the paralinguistic communications aspects

A

Tone, pitch, pace, and Modulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a challenge always based on

A

The assumption the person or persons are hostile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the third command when challenging individuals in vehicle

A

Command the driver to extend their hands outside the door and unlatch it using the outside door handle. Next, have the driver remove seatbelt and push the door open with left foot. Slowly step outside away from Sound of voice. Driver side door kept open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

After securing of occupants in the vehicle challenge, what is the next step

A

Approach vehicle if possible with MWD. Challenge any remaining suspects to surrender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When handcuffing an individual, why must you carefully analyze each situation to ensure you use the appropriate level of force

A

Courts consider Handcuffing a form of use of force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the last step prior to any movement of the individual from the apprehension area

A

Double lock the handcuffs for your and the suspects safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is intermediate use of force

A

The level of force necessary to compel a subject compliance and neither likely nor intend to cause death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does the defensive technique of framing allow security forces members to do, and how was it accomplished

A

It allows security forces to use defensive technique to position themselves from less to a more dominant stance. Create space by placing for arm or shin against body part

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

As a security forces member, when would you use the X step defensive technique, and what does it allow you to do

A

In close quarters in crowded areas to get space to travel direction/to create space.
X step - get subject of SF centerline
X step to post frame - subject resists x step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When do you use the stand up to base technique, and how do you perform it

A

When knocked To the ground, put support side foot heel to buttocks, Weapon side leg on the ground slightly bent. Weapon side hand on the ground, support side hand used as a shield. Weapon side hand and support side foot are used to raise hips of ground and kick with weapons side foot through suspects knee. Weapon side leg under body and recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How and why is the break contact from Mount technique done

A

Gain control of subjects arm against chest. Extend both arms and pin to chest. Drag weapon side foot over subjects knee and frame subjects hip with Shin. Control arms, 360 scan, and disengage to use other force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When and how is the arm trap and roll done

A

When in non-dominant position and subject is striking you. Bridge hips and cause suspect to post hands on ground. Head outside of posted hand and capture and collapse elbow. Bring centerline. Post your foot outside subjects leg and other centerline. Push off and bridge your hips while rolling subject over. Roll in direction of trapped leg and arm and Establish good guard posture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the purpose of submissions when it comes to security forces

A

Not as a use of force, but rather as a defense of technique and to train to identify its application in a life-threatening scenario

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
When and how is the Kimura from the guard accomplished
One subject is attempting to take weapon. Establish wrist control with weapons side hand. Support side arm up and over subjects arm and grab your weapon side wrist with thumbless grip. Turn torso and direction of wrist control of suspect. Weapon side leg over subjects lower back and hug trapped arm. Subjects hand up in 90° angle and Palm to the ground.
26
To ensure the safety of the patrol officer and for legal precautions, what is the first step you perform before placing a subject inside a vehicle for transport
Perform a search of the transporting vehicle prior
27
What information will you provide BDOC before transporting the suspect
Starting mileage, start time of transport, destination arrival time, and ending mileage
28
What factors must you consider before releasing an offender
Jurisdiction, if the offender is military or civilian, or if offender is juvenile
29
How is the first component of a proper stance obtain
Wide base: by standing with feet shoulder width apart
30
What is the second step in the employment of OC pepper spray
Hold unit close to upper chest and target suspects facial area. Discharge range of 6 to 8 feet
31
What is the fourth step in the employment of OC spray
Position upwind, avoid contaminated areas. Should notice disorientation, closing of eyes, loss of motor control, intense burning, difficulty breathing within 2 to 3 seconds
32
How long should you monitor the subject from the time the subject initial exposure to OC pepper spray
A minimum of one hour
33
What is the sixth step of function check on the X 26
Look for visible spark between the electrodes and listen for rapid spark rate
34
When using a grid map, what are the steps and finding a refined grid
Divide square into tenths, identified by numbers designated 1–9
35
Where are the four steps IRB will take when responding to an accident
1. Emergency measures provide federal present and humanitarian support 2. Save lives, secure site, safeguard classified material, contamination, and contain hazard 3. Remain in charge until DCG arrives or DOD agency for nukes 4. Maintain presence and support DCG
36
What do major accidents involve (nukes)
Involving DOD material or resulting from DOD activities
37
What are the phases of response to handle accident , disaster, and incident scenes
Notification, response, response force actions, withdrawal, and recovery
38
What is he AF philosophy on the lead agency concept
To comply with lead agency concept by yielding to civilian authorities like FBI when possible
39
Who determines the cordon size of an accident scene, and what is the cordon size based upon
Installation commander | Area affected and any requirement for additional resources within the cordon area
40
Where will the ECP initially be located
Upwind or crosswind
41
What are your options if a restricted area cannot be marked using elevated markers
Mark boundary with painted line 4-6in with bright color. Red-orange, fluorescent, reflective color
42
Who will staff an ECP if it needs to be established for convenience
The requesting agency with direct communication with BDOC
43
Why are vehicle searches conducted on specific vehicles
Due to information or investigation establishing probable cause
44
What determines the manner you search a vehicle
The size of the object
45
When can you conduct a protective frisk
During lawful stop when you reasonably believe a person is armed and presently dangerous to you or others
46
Where and how would you conduct a concentric circle search
Used in rooms, buildings, and small outdoor areas. Proceed in ever widening or ever narrowing circles clockwise fashion
47
Where and how would you conduct a strip and grid search
Used in large outdoor areas. Divide area into strips 4 ft wide and search one end and move back and forth. Upon completion additional strip search right to left
48
What is the best evidence rule
With written documents: the original is preferred over a copy
49
Why do we have to save all field notes or rough drafts
Jencks Act is a federal law dealing with evidence
50
What is the primary reason for hearsay rule
Is the right of both prosecution and defense to cross examine opposing witnesses under oath at trial
51
How and where do you mark evidence
Initials, date, and time of discovery. Place markings on a place least likely to affect appearance or monetary value
52
Who starts the chain of custody for evidence
The person who first receives or seizes the property
53
What article in UCMJ covers controlled substances
Article 112a
54
What is the role of SF member during a referral
To maintain order, secure the scene as necessary and stand by u til relieved or advised or further responsibility for the case
55
When is apprehension the best course of action
When there is a formal complaint: probable cause exists violating the UCMJ or local law. Or when the family member refuses to cooperate with you, first shirt, commander, or advocate officials
56
While working as a BDOC controller, what is the fourth step you must accomplish during all possible family violence situations
Check AF form 1314, Fire arms registration, or local fire arms database and inform the patrols of residence possible ownership of fire arms and type
57
What should you do before interviewing suspects
Read them their rights/protect their rights
58
What is the responsibility of an SF member at a sexual assault/rape
To preserve all evidence of the assault
59
What is a simple assault
And attempt or offer with unlawful force or violence to do bodily harm to another whether or not the times or offer is consummated
60
What is aggravated assault
And assault with a dangerous weapon or object likely to cause death or grievous bodily harm
61
What are the four phases of the judicial process
Response, investigation, prosecution, confinement
62
What is the first goal in the VWAP
Immediate and permanent termination of the harmful act
63
How are impromptu gathering developed
Informally and done by word-of-mouth. One person to another or group
64
When does an emergency disbursal occur
When people evacuate an area Because of an unexpected crisis such as fire, explosion, bomb threat , or terrorist acts of
65
What additional element does a sighting crowd have from a casual crowd
An event
66
What are the characteristics of a riot baton
Length is 26- 42 inches Made of hickory Does not shatter or break 1 1/4 in in diameter
67
Where are the primary target areas for a baton
Foot/shin Inside and outside of thigh Lower abdominal region Forearm/upper arm
68
What our final target areas for baton
Front and back of head, neck and throat, upper chest, xiphoid process
69
For where our control force formations used
To disburse, contain, or blpick a crowd
70
Where are the offense of an defense of applications of the line formation
Offensive – lone is used to push or drive crowd straight back across open area Defensive – line is used to hold the crowd or deny access to area
71
How is force protection achieved
Through the successful execution of integrated defense, emergency management, and the critical infrastructure program
72
What are the two central areas of change of perspective required in the shift to ID
1. Resource-based defense posture to risk based defense posture 2. Compliance based operations to Effects based operations
73
What FP effect should be developed to identify the presence of an object or event of possible military interest, whether a threat or a hazard
Detect
74
What are the three types of control authority that reside in every organization in the Armed Forces
TACON tactical, 0PCON operational, ADCON administrative
75
What does TACON provide
Sufficient authority for controlling and directing the application of force or tactical use of combat support assets within the assigned a mission or task
76
What type of fencing is authorized for use in a restricted area
Type A
77
For what are elevated barriers used
To identify restricted areas located on the flightline
78
What are the five basic lighting system is used for restricted areas
Entry point, boundary, special purpose non-nuclear, area lighting and very near infrared, combination
79
Where are SRT is required
At all installations supporting PL one, two, or three resources
80
What will the RAB issuing authority do if the owner of a lost badge is not located within two weeks
Destroy the badge
81
What must be done before a RAB is lanimated
Mark the badge with a locally devised authentication feature before
82
As in EC, what actions do you take in the event in individual passes back a wrong counter sign when requesting entry into a Restricted area
Take the information as a sign of duress or hostile nature
83
What are primary duties of a sentry
Maintain surveillance over assigned areas, reacting in reporting any unauthorized entry or personnel found in the area
84
When does CIS control entry into aircrafts
When aircraft is carrying specific PL1 assets
85
How are deviations from establish security criteria categorized
Technical, temporary, or permanent deviations
86
How often must be approving authority review all permanent security deviations
Only once and don’t need expiration date
87
What form must be used to document security deviations
AF form 116, request for deviation from security criteria
88
What does the nuclear roadmap contain
Comprehensive action plans describing the actions required to restore public trust and ensure a credible nuclear deterrence
89
What does the nuclear roadmap aim to identify
Common actions that must be standardized to ensure safe, secure, and reliable nuclear operations
90
What do the nuclear weapon security program concepts mandate
That the security system stops an intruder before unauthorized access to a weapon can be achieved
91
What is a nuclear weapon incident
And unexpected event involving the release or potential release of nuclear material caused by adversary actions and in this way different from nuclear related material
92
For what is the NDA used, and who must designate and mark the NDA boundary
It’s used for to safeguard classified defense information and protect DoD equipment and material outside the confines of a military installation, but within the territory of the US. The senior DOD representative at the scene marks the boundary
93
Who will develop local procedures for MMB use and Maintenance
MAJCOM’s
94
What forms the cornerstone of the threat planning for nuclear security systems
Countering assessed and projected adversary capabilities
95
Why are vulnerability assessments conducted a nuclear weapons operating locations
To determine the facilities vulnerability to sabotage, standoff attack, theft, loss, seizure, or unauthorized access by both external and internal threats
96
How is a missile complex comprised
A 3–4 squadron areas containing five missile alert facilities providing housing for deployed security forces members and services teams and LFs which house ICBM nuclear resource
97
What are nuclear weapons protected by when stored within a locked weapons security vault
A WS3 system providing significant access delay and denial
98
What requirements must perimeter boundary fence meet
Two boundary fences separated by not less than 30 feet or not more than 150 feet. 9–46 m
99
When will steel body steel shackle padlocks meeting the requirements of federal specifications FF-P-2827 be used in a restricted area
To secure frequently used perimeter gates, manhole covers large enough to fit a person and penetrate fence, access panels, culvert gratings, and alarm junctions
100
What does a clear zone using to find system consist of
An area extending 30 feet outside the outer fence, the entire area between fences and an area extending 30 feet inside inner-fence
101
What does basic configuration of the ECF include
A hardened gate house that provides protection for security forces personnel from small arms fire, a personnel entry gate, inspection equipment, and vehicle entrapment area
102
Who will determine the appropriate number of persons permitted inside an exclusion area
The SVA
103
Who are permitted unescorted entry into exclusion areas
Only personnel certified through nuclear weapons PRP, or the host national equivalent at WS3 installations
104
What is the primary function of the three person SRT
To provide back up to the two person ART for security responses
105
Who receives the A and B combinations when penetrating the LF
A: SF B: Maintenance
106
What are the duties of the security system operators
Operate electronic security systems and equipment employment to secure nuclear weapons. Dispatch security forces to alarms and make a initial notifications. Exercise command and control over assigned forces. Control entry to structures. Alert shelters and individuals
107
What are the minimum standards for PAS – IIDS
Point Sensors on all door openings and a motion detection zone that includes the top of the vault, as it is the sole access point to a limited/exclusion areas regardless of the avenue of approach
108
What must a CO cover as a minimum during a personal interview
Ensure each person selected and retained for performing duties associated with nuclear weapons/components/control system/equipment is emotionally stable and physically capable and demonstrated reliability and professional competence
109
What are the two types of PRP decertification
Temporary and permanent
110
What is NSI
Nuclear surety inspection. Inspect units capability to safely and reliably receive, store, secure, assemble, transport, maintain, load, mate, lock/unlock, test, render safe and employ nuke systems
111
What is an LNSI
Limited nuclear surety inspection. Assess sustain performance of nuclear surety while minimizing the inspection footprint on a unit operation
112
What is an NWIT
Nuclear weapons technical inspections. Compliance inspections and are conducted to evaluate a unit ability to manage nuclear resources while complying with all nuclear surety standards
113
What is the definition of custodial agent
An individual acting on behalf of the custodian and maintaining control of access to US nuclear weapons and maintaining control of weapons prior to release
114
What are NC2 materials
Nuclear command and control materials. Materials and devices used in the coding and authentication processing and communication medium necessary to transmit release, execution, or termination orders: and nuclear weapons targeting types of media content in nuclear weapons targeting data
115
What is the definition of use control
The positive measures that allow the authorized use and prevent or delay unauthorized use of nuclear weapons
116
The philosophy of community policing focuses on what three components
Partnership, prevention, and problem-solving
117
How should formal problem-solving processes be implemented
By using specific task forces comprised Of stakeholders from agencies, community or business groups, and concerned individuals on and off the installation
118
What is your role in crime prevention and resources protection program
Of an educational, technical, and supportive resource, an enabler or catalyst rather than A doer
119
What is operation crime stop
A prompt an accurate means of reporting imminent crime situations or criminal acts
120
What is the first information you should provide the desk sergeant during vehicle pursuit
Direction of travel
121
What is one of the most important points to remember when using emergency equipment
It does not justify unsafe driving
122
After deciding to stop a vehicle what is the last piece of information you should provide BDOC
Request back up if you feel necessary
123
What is the second step he should take when approaching a vehicle during a traffic stop
Approach from left side of vehicle unless the situation dictates approach from right it’s acceptable due to officer safety
124
What does a complete accident report include
Field sketch, scale diagram, and accident narrative
125
What is the first and most important step in directing traffic
Selecting a site
126
What are the standard whistle signals
Long blast – stop Two short blasts – go Several short blasts – attention
127
What is the most significant factor about the Doppler principle
The frequency change happens only when there is relative motion between objects
128
What are the three clues when administering the horizontal gaze nystagmus test
Lack of smooth pursuit, distinct sustained nystagmus at maximum deviation, and set of nystagmus prior to 45° angle
129
What is the first step when conducting the horizontal gaze nystagmus test
If suspects wearing eyeglasses, have them remove it
130
What is the six step in the heel to toe verbal instructions
When I tell you to start, take nine Heel to toe steps, turn, and take heel to toe steps back
131
What are the two stages of the one leg stand SFST
Instruction and balance/counting stages
132
What must you advise a suspect of prior to using any alcohol or chemical detection equipment
The implied consent policy
133
What does the term close base mean
Only authorized personnel are allowed to enter
134
How many copies of the AF form 75 are you required to prepare
2
135
What must you ensure the visitor reads and signs on the reverse side of the AF form 75
The warning and the visitor advisory
136
How many copies of the AF FM1109 are prepared
1
137
How many days is the completed visitor registration logs maintained
90 calendar days from the last entry made
138
Into how many sections is the AF form 1168 divided
6
139
For what is the Air Force form 1176 used
To obtain authorization for search and seizure
140
What made the responsible commander allow if a situation warrants immediate searching
May give verbal authority only after a probable cause briefing has been done
141
Where and how do you complete the probable cause statement
On the reverse side of Air Force form 1176 or bond sheet of paper. Write/type statement outlining reason security forces member believe potential evidence is at a particular place
142
Who completes the Air Force form 1315
Security forces members who completed traffic management and collision investigation course and are conducting a major traffic investigation
143
What information do you include in the “occupant, not driver/operator, section”. Of the Air Force form 1315
Name and address of occupants in each vehicle. Not the driver
144
What can be used to document the consent for search and seizure and must be included if an Air Force form 1364 is not available
Document consent on plain piece of paper, and have individual sign. Include date, time, person or people, and places to be searched
145
What two congressional acts affected the amount of data required to be collected for crime reporting
The victims rights and restitution act of 1990. The Brady hand gun violence prevention act
146
How many pages make up the Air Force form 3545 if it is generated by SFMIS
6 or more
147
What information is included in section 2 of Air Force form 3545
Details as the UCMJ articles violated and whether the incident was a result of some form of bias
148
What information is included in section 7 of Air Force form 3545
Describes who receives the report and any witnesses notified using DD form 2701
149
What is Air Force form 3907 used for
To record routine contact between security forces members and members of the public
150
How many copies of the Air Force form 3907 are prepared
1
151
Who are DD form 1408s issued to
Those who commit either a moving or not moving traffic offense. Military
152
Which copy of the DD form two 1408 is used by security forces members to record pertinent information
Second yellow copy
153
To whom would you issue a DD form 1805
Issue to civilians who commit a moving or not moving traffic offense
154
Which copy of the DD form 1805 is issued to the violator
The third copy manila card stock
155
Who completes the DD form 1920
The apprehending security forces member
156
How many copies of the DD form 2708 are prepared
2
157
Which copy of the DD form 2708 is maintained in the case file
The original form
158
What is the primary vehicle for identifying observations and potential lesson
After action report (AAR)
159
The after action report is submitted within how many days from the event it refers
30
160
Add a minimum, during deployed operations, how many after action reports are submitted, and what are their timelines
Two. 45 days into the deployment and 15 days prior to the end of the deployment
161
What incidents require after action reports
Terrorist acts, shooting incidents, security incidents, military corrections incidents, CATM incidents, and miscellaneous incidence of educational value
162
What does writing I n the active voice force you to do
To write percise information, lessens the report length, and answers questions