Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

38 Cards in this Set

  • Front
  • Back
Duties of interior guard
Preserve order
Protect property
Enforce regulations within the jurisdiction of command
General Order 1
To take charge of this post and all government property in view.
General Order 2
To walk my post in a military manner, keeping always on alert and observing everything that takes place within sight or hearing.
Gerneral Order 3
To report all violations of orders I am instructed to enforce.
General Order 4
To repeat all calls from posts more distant from the guardhouse than my own.
General Order 5
To quit my post only when properly relieved.
General Order 6
To receive, obey and pass on to the sentry who relieves me all orders from the commanding officer, officer of the day, and officers and noncommissioned officers of the guard only.
General Order 7
To talk to no one except in the line of duty.
General Order 8
To give the alarm in case of fire or disorder.
General Order 9
To call the corporal of the guard in any case not covered by instructions.
General Order 10
To salute all officers and colors and standars not cased.
General Order 11
To be especially watchful at night and during the time for challenging, to challenge all persons on or near my post, and to allow no one to pass without proper authority.
Interior guard chain of command
Commanding Officer
Commander of the guard
Sergeant of the guard
Corporal of the guard
Deadly Force
The efforts of an individual used against another to cause death, substantial risk of death, or serious bodily harm.
Six conditions that justify the use of deadly force
Defend yourself - To prevent military law enforcement or security personnel who reasonably believe themselves to be in imminent danger of death or serious bodily harm.
Defend property not involving national security -To prevent the threatened theft, damage, or espionage aimed at property or information, which though not vital to the national security is of substantial importance to the national security. To prevent the actual theft, damage, or espionage aimed at property or information, which though not vital to the national security is of substantial importance to the national security.
Defend property not involving national security but inherently dangerous to others -
To prevent the actual theft or sabotage of property, such as operable weapons or ammunition, which is inherently dangerous to others.
Prevent crimes against people - To prevent or to interrupt the commission of a serious offense observed by the sentry, which threatens death or serious bodily harm to other persons. Such offenses include, but are not limited to, murder, rape, or armed robbery.
Apprehend individuals - To apprehend or to prevent the escape of a person reasonably believed to have committed an offense involving national security, or to prevent the escape of a designated prisoner.
Establish and/or maintain lawful order when it has been directed by the lawful order of a superior authority
The unlawful use or threatened use of violence to force or to intimidate governments or societies to achieve political,religious, or ideological objectives.
Perspectives of terrorism
Terrorism is a cheap, low-risk, highly effective way for weak nations, individuals, or groups to challenge stronger nations orgroups and achieve objectives beyond their own abilities.
Long range goals of terrorism
Terrorists have sought to topple governments, influence top level decisions, and gain recognition for their cause
Short range goals of terrorism
Focus on gaining recognition, reducing government credibility, obtaining funds and equipment, disrupting communications, demonstrating power, delaying the political process, reducing the government’s economy, influencing elections, freeing prisoners, demoralizing and discrediting the security force, intimidating a particular group, and causing a government to overreact.
What motivates terroristsm
Terrorists are motivated by religion, prestige, power, political change, and material gain. .Terrorists believe that they are an elite society and act in the name of the people.
Terrorist operations
Terrorists operate in small secret groups with little interaction and tight central control held by a few individuals. Each group may have smaller functional units that have command, intelligence, support, and tactical responsibilities. Each unit may have only two to six persons. Terrorists operate with the good will and support of sympathetic foreign governments. Terrorist groups share resources, expertise, and safe havens. Tactics and methods of operation may vary from group-to-group, but they all seek to achieve their objectives through fear, intimidation, and force
Designed to standardize security measures so that inter-service coordination and support of anti-terrorism activities are simplified. Your overseas command will reduce, increase, or cancel declared THREATCONs as demanded by changes in the terrorist threat.
A general threat of possible terrorist activity against installations and personnel. The exact nature and extent are unpredictable, and circumstances do not justify full implementation of THREATCON BRAVO. Implication of selected THREATCON BRAVO measures as a result of intelligence or as a deterrent may be necessary
An increased and more predictable threat of terrorist action.
An incident has occurred or that intelligence has been received indicating that some form of terrorist action is imminent.
- A terrorist attack has occurred or that intelligence indicates that a terrorist action against a specific location is likely. Normally, this THREATCON is declared as a localized warning.
Steps in reacting to a terrorist threat/attack
There are no purely preventive measures that can ensure 100 percent protection against terrorism; however, as Marines we must apply all known measures to protect us from attack.
The following are some common rules to protect you from terrorist attack.
- Vary transportation methods, routes, and times.
- Park in well-lighted areas with multiple exits.
- Lock unattended vehicles.
- Report unusual activities to local security officials.
- Avoid traveling alone.
- Travel only on busy, well-traveled thoroughfares whenever possible.
- Take proper security precautions at home during travel.
- Attend periodic threat awareness briefings and hostage survival training.
- Avoid establishing a pattern of attendance at certain events, locations, etc.
- Keep a low profile and avoid calling attention to yourself.
- Seek knowledge of the local situation and be aware of your surroundings.
- Be sensitive to the possibility of surveillance
Ways to protect yourself from terrorist attacks
Maintain a low profile.
- Ensure that your dress, conduct, and mannerisms do not attract attention.
- Make an effort to blend into the local environment.
- Avoid publicity.
- Do not go out in big groups.
- Stay away from civil disturbances and demonstrations.

Be unpredictable.
- Vary your route and the time you leave and return home during your daily routine.
- Vary your style of dress.
- Avoid deserted streets or country roads.
-. Avoid traveling alone.
- Let people close to you know where you are going and what you will be doing

Remain vigilant.
- Watch for anything suspicious or out of place.
- Do not give out personal information over the telephone.
- Preselect a secure area in which you can take refuge if you are being followed.
- Report any incident of being followed to the military police and to your command duty officer.

Protect your automobile.
- Avoid leaving the vehicle unattended and in the open.
- Lock the doors, the trunk, and the gas cap when leaving the vehicle.
- Upon returning to the vehicle, search it before operating (or driving).
Check the exterior of the vehicle for; packages left under the vehicle, ground disturbed around the vehicle, loose wiring, string, or tape, check the interior of the vehicle for, objects out of place, or anything out of the ordinary
The ability and opportunity to obtain knowledge or possession of classified information.
The determination by an authorized official that official information requires, in the interests of national security, a specific degree of protection against unauthorized disclosure
An unauthorized disclosure of classified information to one or more persons who do not possess a current valid security clearance.
Any official knowledge that can be communicated or documentary material, regardless of its physical form or characteristics, that is owned by, produced by or for, or is under the control of the U.S. Government. ‘Control” means the authority of the agency that originates information, or its successor in function, to regulate access to the information.
Security Classifications
Information that requires protection against unauthorized disclosure in the interest of national security shall be classified at the Top Secret, Secret, or Confidential levels. Except as otherwise provided by statute, no other terms shall be used to identify U.S. classified information. Terms such as ‘For official Use Only” (FOUO)or ‘Secret Sensitive” (SS) shall not be used for the identification of U.S. classified information.
Top Secret
The classification level applied to information whose unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security. Examples include information whose unauthorized release could result in armed hostilities against the U.S. or its allies; a disruption of foreign relations vitally affecting the national security; the compromise of vital national defense plane; the disclosure of complex cryptographic and communication intelligence systems; the disclosure of sensitive intelligence operations; and the disclosure of significant scientific or technological developments vital to national security.
the classification level applied to information whose unauthorized disclosure could reasonably be expected to cause serious damage to the national security. Examples include information whose unauthorized release could result in the disruption of foreign relations significantly affecting the national security; the significant impairment of a program or policy directly related to the national security; the disclosure of significant military plans or intelligence operations; and The disclosure of scientific or technological developments relating to national security.
The classification level applied to information whose unauthorized disclosure could reasonably be expected to cause damage to the national security. Examples include information whose unauthorized release could result in disclosure of ground, air, and naval forces (e.g., force levels and force dispositions) ; or disclosure of performance characteristics, such as design, test, and production data of U.S. munitions and weapon systems
From further compromise and notify the custodian or security manager immediately.
Methods that foreign agents use in collecting information
Observe and photograph activities.
Eavesdrop on electronic communications.
Read news releases.
Listen to careless talk.
Obtain classified documents