List some tactics used by terrorists
Describe 6 Phases of Terrorist Attack Methodology:
Target Options
Selection Surveillance
- Refine list of potential targets
Target Selection
- weak defense/ security
Detailed Surveillance
Training and Preparation
Sentries note the descriptions of suspected surveillance activity:
Attack
Attacks can occur at installation, unit, exercise, port, ship, residence, facility or other sites.
What does FPCON stand for?
Force
Protection
CONdition
How FPCON Levels are there and what are they?
5 Normal Alpha Bravo Charlie Delta
FPCON Normal
- Routine security posture
FPCON Alpha
-Increased general threat of possible terrorist activity -Must be able to maintain indefinitely
FPCON Bravo
FPCON Charlie
FPCON Delta
Discuss Critical and Vulnerability Assessments
Help planners determine:
What is an Anti-Terrorism/Force Protection Plans?
Plan that documents specific measures to
What does ECP stand for?
Entry Control Point
Assessment Zone
- Visual range of the base gate guard or Quarterdeck watch.
Warning Zone
Threat Zone
- ECP standoff zone to the protected asset or area
Suicide Bomber Techniques Indicator:
Interview Techniques
Used to determine hostile intent
Obstacles and Barriers
-Disrupt
-Channel
-Turn
-Block
Movement of personnel or vehicles
Constructed using Defense In Depth Principles.