Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
36 Cards in this Set
- Front
- Back
- 3rd side (hint)
Duties of the interior guard |
Preserve order Protect property Enforce regulations |
PoPpEr |
|
General Order 1 |
To take charge of this post and all government property in view |
|
|
General Order 2 |
To walk my post in a military manner, keeping always on the alert and observing everything that takes place within sight or hearing |
|
|
General Order 3 |
To report all violations or orders I am instructed to enforce |
|
|
General order 4 |
To repeat all calls from posts more distance from the guardhouse than my own |
|
|
General order 5 |
To quit my post only when properly relieved |
|
|
General order 6 |
To receive, obey, and pass on to the sentry who relieves me all orders from the commanding officer, officer of the day, and officers and noncommissioned officers of the guard only |
|
|
General Order 7 |
To talk to no one except in the line of duty |
|
|
General order 8 |
To give the alarm in case of fire or disorder |
|
|
General Order 9 |
To call the corporal of the guard in any case not covered by instructions |
|
|
General order 10 |
To salute all officers and all colors and standards not cased |
|
|
General order 11 |
To be especially watchful at night and during the time of challenging, to challenge all persons on or near my post, and to allow no one to pass without proper authority |
|
|
Interior Guard Chain of Command |
Commanding officer Field officer of the day Officer of the day Commander of the guard Sergeant of the guard Corporal of the guard |
|
|
Deadly force |
Efforts of an individual used against another to cause death, substantial risk of death, or serious bodily harm |
|
|
6 Conditions for us of deadly force |
Defend Yourself Defend property not involving national security Defend property inherently dangerous to others Prevent crimes against people Apprehend Individuals Establish and/or maintain lawful order |
|
|
Terrorism |
Unlawful use or threatened use of violence to force or to intimidate governments or societies to achieve political, religious, or ideological objectives |
|
|
Perspectives of terrorism |
Cheap, low-risk, highly effective way for weak nations or groups to challenge stronger nations or groups and achieve ojectives |
|
|
Long range goals of terrorism |
Topple Governments, Influence top level decisions, gain recognition for their cause |
GIT |
|
Short rage goals of terrorism |
Reduce government credibility, obtain guns and equipment, disrupt communications, reduce economy, influence elections, gain recognition |
Rodrig |
|
What motivates terrorists |
Material gain, religion, poet, prestige, political gain |
Mr ppp |
|
Terrorist operations |
Operate in small secret groups with little integration and tight central control held by few individuals |
|
|
THREATCON |
System designed to standardize security measures to that inter-service coordination and support of anti-terrorism activities are simplified |
|
|
THREATCON Alpha |
General threat of possible terrorism activity |
|
|
THREATCON Bravo |
Increased and more predictable threat of terrorist action |
|
|
THREATCON Charlie |
An Incident has occurred or some form of terrorist acting is imminent |
|
|
THREATCON Delta |
A terrorist attack has occurred or an action against a specific location is likely |
|
|
Protect your self from terrorist attacks |
Maintain a Low profile Be Unpredictable Remain Vigilant Protect your Vihicle |
LUVV |
|
Access |
Ability and oportunity to obtain knowledge or posses classified info |
|
|
Classification |
Determination of a Specific degree of protection against unauthorized disclosure |
|
|
Compromise |
Unauthorized disclosure of classified information |
|
|
Information |
Any official knowledge that can be communicated under the control of the US |
|
|
Top Secret |
Information whose unauthorized disclosure could cause exceptionally grave damage to national security |
|
|
Secret |
Information who’s unauthorized disclosure could cause serious damage to national security |
|
|
Confidential |
Information who’s unauthorized disclosure could cause damage to national security |
|
|
Unsecured classified material |
Protect material from further compromise and notify the custodian or security manager immediately |
|
|
Methods used to collect information |
Observe Activities Eavesdrop on electronic communications Read news releases Listen to careless talk Obtain classified documents |
LOREO |