Chapter 12 - Security Flashcards
Name the 5 major threats to security.
Espionage (spying)
Subversion
Sabotage
Terrorism
Organised crime
Name the two types of espionage
Legal spying
Illegal spying
Legal spying is usually carried out by who?
What are the three types of illegal spy?
Legal - by members of embassies who have diplomatic status - immune from criminal proceedings
1) ideological spy - spies against his own country because of the belief in the cause of the nation they are spying for.
2) mercenary spy - spy for money.
3) blackmailed spy - because being blackmailed
What is subversion?
Any activity calculated to undermine the fighting spirit, loyalty and discipline of service personnel. E.g. spreading of vicious rumours through the media or propaganda.
What is sabotage?
Acts intended to cause physical damage to assist a foreign power in furtherance of a political aim.
This is in the form of a non-conventional military attack on military or civilian installations.
E.g. tampering with water supply on a unit.
What is terrorism?
The systematic use of violence and intimidation for political gain.
Why is organised crime becoming a military security issue?
Local criminal organisations breaking into buildings and compounds, theft of IT equipment and other removable media and other items of value.
Name the three main aims of terrorist organisations.
1) to publicise their existence and cause
2) to coerce people into supporting them
3) to discredit authorities by provoking repressive counter-measures
Terrorist Groups
Irish Republican Terrorism (PIRA)
On the 28/7/05 the PIRA released a statement of a?
Threat level reduced from moderate (level 4) to?
Formal end to its armed campaign.
Low (level 5)
Al-Qaeda declaration in 1998 called on all Muslims to kill Americans and their allies.
Name the 5 main groups that follow this ideology
Al-Qaeda
Egyptian Islamic Jihad
Libyan Islamic Fighting Group
Al-Qaeda in Iraq
Islamic army of Eden
In the past service personnel have been attacked in a number of ways.
Give 7 examples
Attacks on buildings Under vehicle booby traps (UVBT) IEDs Close quarter attacks Suicide bombings CBRN Animal rights activists
Countermeasures
Who is responsible for security?
Everyone
Name the three main types of countermeasure security
Building security - check for IEDs at start of work, lock up securely.
Physical security - designed to safeguard personnel and prevent unauthorised access to equip, facilities, materials and documents.
Personal security - vetting of individuals, security clearance levels
What is operation ROUND UP?
If an intruder has gained access to the unit and Op ROUND UP is called, all personnel are to immediately go to nearest building on the unit where they will be asked for their ID card.
Remain in the building until Op ROUND UP is terminated.
What is Op WIDE-AWAKE?
A thorough check of all the buildings on the unit for suspected IEDs.
Normally implemented following Op ROUND UP and after extended leave periods (Christmas etc)
What are Counter Terrorist Response Levels?
Levels used by the MoD to convey earnings of possible terrorist attacks of a non-specific nature.
More specific warning system is provided by the _____ response level.
Which is used to warn of which two threats?
TESSERAL.
Terrorist use of small arms fire SAFIRE and Man Portable Air Defence Systems (MANPADs) against service aircraft.
Name the three counter terrorist response levels.
Normal - routine baseline protective security measures
Heightened - consideration of additional security countermeasures above NORMAL (sustainable indefinitely)
Exceptional - maximum security measures to minimalist vulnerabilities and risk (limited period only)
Protective markings
All military information has some intelligence value and therefore needs to be protected.
What is the classification system called?
How many categories are there?
Government Security Classification (GSC)
4
Name the 4 GSC levels and what colour folders they are contained in.
Top secret: info can cause exceptionally grave damage to security of the UK - dark red file.
Secret: can cause serious damage - pink file.
Official sensitive: could cause risk to individual safety or result in hem to Work, Defence or Government - no coloured file
Official: can be physically taken and worked on at home or in public and disposed of in normal waste - no coloured file
If you suspect a breach of security e.g. building being left open, loss of protective marked documents you must…
This includes your…
It is an offence to lose your…
Report it to an officer or NCO immediately
ID card (MOD 90)
MOD 90 and disciplinary action may be taken
The Official Secrets Act was formed in?
Name the 4 main offences under this act
1911
1) disclosure of official information
2) prohibited copying
3) prohibited place - peacetime = military and government establishments, war time other places can be prohibited
4) ‘need to know’ principle - personnel given only the information needed to complete their task. Regardless of security clearance only tell people what they need to know
Individual precautions:
Carry your __ at all times and if you lose it…
When away from work and not in uniform…
Lock your car, preferably in a garage and check your car regularly for…
When travelling do not… and make sure your belongings are
ID, report it immediately
Do not advertise your service connections
Suspicious objects
Wear uniform or use service kit bag, secured and can’t be tampered with
If you travel into work from off-base accommodation, make sure you…
Do not _____ regularly at the same ___ and ___ when meeting colleagues.
Do not ____ parties that are being held off base.
Vary your routes each day.
Congregate, time and place.
Advertise.