Antiterrorism Flashcards
(95 cards)
Force Protection Conditions (FPCONS)
The FPCON level program is a Chairman of the Joint Chiefs of Staff-approved program
standardizing the military Services’ identification of, and recommended responses to, terrorist threats and terrorist acts against United States (U.S.) personnel and facilities. It facilitates inter- service coordination and support for AT activities. The FPCON level system is a progressive system designed to shape the AT operational environment in terms of threat integration, resource allocation, and operational continuity. Designed to be proactive in application, the FPCON level process allows commanders to implement graduated measures across systems, resulting in an appropriate security posture. DODI O-2000.16, Volume 2, Department of Defense Antiterrorism (AT) Program Implementation: Department of Defense Force Protection Condition (FPCON) System, delineates implementation of specific DOD mandatory measures at each FPCON level for afloat and ashore commands. Geographic combatant commander (GCC) supplemental measures to be implemented at each FPCON level for afloat and ashore commands are delineated in respective GCC instructions and/or directives. When a change in FPCON is directed (increased or decreased), voice and message attainment reports will be made via tactical control (TACON) for the FP chain of command. Afloat units will make reports to their immediate superior in command (ISIC) and briefs the installation commanding officer (ICO). The ICO will typically make reports to the regional commander via the regional operations center (ROC). The designated supervisor will brief security/AT watch standers on any changes to the FPCON and include additional threat information or modifications to prescribed measures. Watch standers will report completion of directed changes to the antiterrorism tactical watch officer (ATTWO) or the designated supervisor (i.e., watch commander (WC)). The CO or designated representative is responsible for understanding the reporting requirement and informing the chain of command
a progressive system designed to shape the AT operational environment in terms of threat integration, resource allocation, and operational continuity?
FPCON level
What zone add structure to defense in depth?
Assessment Zone and
Threat Zone
Terrorists gather exhaustive operational knowledge of a target through _______, but they can also exploit targets of opportunity.
Surveillance
Vessels must be classified as either a threat or nonthreat before entering this zone.
Threat Zone
Terrorists will often conduct detailed preoperational planning and surveillance prior to executing an act of terrorism. Which of the following represent typical steps of a terrorist attack planning cycle in order?
Target Selection, Surveillance, Final Selection, Tactical Level Planning, Final Surveillance, Deployment, Attack.
All surveillance reporting should be in compliance with…
OPNAVINST F3100.6J and DODI 2000.26 (eGuardian reporting requirement).
_______ have accounted for over one-half of all recorded international terrorist attacks since 1983.
Bombings
An action taken against a prominent individual for a specific reason.
Kidnapping
Terrorism is primarily a _________ act that communicates through violence or the threat of violence.
Psychological
Terrorist strategies will be aimed at publicly causing damage to symbols or inspiring fear. Timing, __________, and method of attacks accommodate mass media dissemination and optimize current news impact.
Location
On October 12, 2000, what U.S. Naval vessel, assigned to the U.S. Fifth Fleet, was the target of a small-boat attack in the Port of Aden, Yemen.
USS Cole
What type of device is considered to be much more lethal than a PBIED due to the greater payload
VBIED
An _______________ is defined as any inadvertent leaving of personal property in a common area during routine business where there is no evidence of any suspicious activity or observable malicious intent.
Unattended package
Seeing race as the defining characteristic of a society and a basis of cohesion.
Ethnocentric
Force Protection Conditions
Chairman of the Joint Chiefs of Staff-approved program standardizing the identification and recommended responses to terrorist threats/acts against US personnel and facilities.
Facilitates inter-service coordination and support for AT activities.
Designed to be proactive in application, the FPCON level process allows commanders to implement graduated measures across systems, resulting in an appropriate security posture.
When a change in FPCON is directed, voice and message reports will be made via TACON for the FP CoC. Afloat units will make reports to their ISIC and briefs the installation commanding officer (ICO). The ICO will typically make reports to the regional commander via the regional operations center (ROC). The designated supervisor will brief security/AT watch standers on any changes to the FPCON and include additional threat information or modifications to prescribed measures. Watch standers will report completion of directed changes to the ATTWO or the designated supervisor (i.e., watch commander (WC)). The CO or designated representative is responsible for understanding the reporting requirement and informing the chain of command.
Antiterrorism Plan
Baseline plans provide the guidance, policy, and detailed execution required for sustained AT operations. These plans incorporate operational consistencies relative to the physical protection of afloat and ashore critical infrastructure, personnel, operational capabilities, restricted areas, ship systems/tenant activities, and security force training.
Each installation and unit shall develop standing plans to provide a baseline level of security and procedures to increase security postures.
Random Antiterrorism Measures
present a robust security posture from which a terrorist cannot easily discern patterns and routines that are vulnerable to attack.
The goal of a RAM program is to deter, detect, and disrupt terrorist attacks. The effectiveness of a RAM program, to instill uncertainty of success in the minds of would-be terrorists, is measured by how formidable, unpredictable, and ambiguous the installation or ship appears.
Defense in Depth
Assessment Zone
Warning Zone
Threat Zone
Assessment Zone
The outermost defense zone, which typically does not have boundaries. Security forces detect and identify contacts as they approach or pass near the protected asset or area.
Warning Zone
Security forces must classify contacts as either threats or nonthreats. In this zone, security forces initially interact with contacts to determine hostile intent and provide a physical presence to control access to a restricted area. Standard operating procedures must clearly define methods and steps that can be used to determine hostile intent so watch standers can avoid ambiguity and hesitation.
Threat Zone
innermost layer of defense in depth. All personnel, vehicles, and vessels must be classified as either a threat or nonthreat before entering this zone. To neutralize threats, the threat zone must be organized to bring maximum destructive fire, via CSWs or other weapons, to bear on targets while minimizing the risk of fratricide and damage to assets.
Surveillance
Before initiating an attack, terrorists conduct months or years of meticulous planning to maximize the likelihood of success.
Terrorists gather exhaustive operational knowledge of a target through surveillance. Terrorists use surveillance to assess capabilities of security systems, judge effectiveness of security measures, and identify security weaknesses. They closely examine all details of a target, including watch schedules, entry control procedures, periodicity of roving patrols, volume of traffic, citizenship of security guards, and the presence of defensive weapons.
Terrorist Surveillance Techniques
Terrorists will often conduct detailed preoperational planning and surveillance prior to executing an act of terrorism. The following represent typical steps of a terrorist attack planning cycle:
Target Selection
Surveillance
Final Selection
Tactical Level Planning
Final Surveillance
Deployment
Attack