• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/18

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

18 Cards in this Set

  • Front
  • Back
What does force protection do?
Protecting the Force.
Reduces risk by detecting adversary actions.
Enables us to limit the adverse effects of deception and surprise.
Can limit or distort the adversaries assessment of friendly capabilities and intentions.
Naval intelligence provides the information needed to conduct successful deception measures against the adversary.
Intelligence can reduce the likelihood of fratricide by helping to clear the fog of war
What is THREATCON?
THREATCONs describe the progressive level of a terrorist threat to all US military facilities and personnel under DODD 2000.12, “DoD Combating Terrorism Program.”
What is the purpose of the THREATCON system?
to provide accessibility to, and easy dissemination of, appropriate information.
Once a THREATCON is declared when are the selected security measures implemented?
immediately
What is THREATCON Alpha
applies when there is a general threat of possible terrorist activity against personnel and facilities, the nature and extent of which are unpredictable, and circumstances do not justify full implementation of THREATCON BRAVO measures. However, it may be necessary to implement certain measures from higher THREATCONs either resulting from intelligence received or as a deterrent. The measures in this THREATCON must be capable of being maintained indefinitely
What is THREATCON Bravo?
applies when an increased and more predictable threat of terrorist activity exists. The measures in this THREATCON must be capable of being maintained for weeks without causing undue hardship, affecting operational capability, and aggravating relations with local authorities.
What is THREATCON Charlie?
applies when an incident occurs or intelligence is received indicating that some form of terrorist action against personnel and facilities is imminent. Implementation of measures in this THREATCON for more than a short period probably will create hardship and affect the peacetime activities of the unit and its personnel.
What is THREATCON Delta?
applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific location or person is likely. Normally, this THREATCON is declared as a localized condition.
What is deadly force?
The efforts of an individual used against another to cause death, substantial risk of death, or serious bodily harm
What are the conditions that justify the use of deadly force?
Defend yourself 
Defend property involving national security-
Defend property not involving national security but inherently dangerous to others 
Prevent crimes against people 
Apprehend individuals 
Establish and/or maintain lawful order
List the force levels, from lowest to highest (deadly force).
Verbal persuasion
Show of force
Unarmed self-defense techniques
Chemical aerosol irritant, if available
Riot club, if available
Working dogs, if available
Deadly force
Who has an inherent responsibility for the security of their personnel, equipment, and facilities
Commanders
Who are ultimately responsible for the security of their assigned rear areas?
component commander and  the MAGTF commander
In the rear area, security objectives include what?
Preventing or minimizing disruption of support operations.
Protecting personnel, supplies, equipment, and facilities.
Protecting LOCs.
Preventing or minimizing disruption of command and control.
Defeating,  containing,  or  neutralizing  any  threat  in the rear area.
What are active security measures?
include  organizing  for defensive operations, coordinating reconnaissance and surveillance, providing security to convoys, positioning air defense units in the rear area, establishing liaison with fire support organizations, employing close air support, establishing reaction forces, developing defensive plans and positioning assets in support of them, patrolling, and training in defensive skills.
What are the 2 types of measures commanders inact?
active and inactive
What are passive security measures?
include  camouflage, dispersion, and cover. Security operations in the rear area require detailed planning and aggressive execution.  
Name some types of security operations.
Populace and resource control operations.
Enemy prisoner of war operations.
Noncombatant evacuation operations.
Civilian control operations.
Area damage control operations.
Combat operations