• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back

Target Options

Once a terrorist or terrorist group decides to conduct an attack they begin the process of TARGET SELECTION

Selection Surveillance

Each potential target will receive some degree of LIGHT SURVEILLANCE to DETERMINE acceptability for further consideration.

Target Selection

Based on Phase 2 surveillance, terrorist SELECTS TARGET or SET of TARGETS

Detailed Surveillance

DETAILED, and often LONG TERM. conducted againsted chosen target. Surveillance will reveal routines, procedures, and security measures so that VULERNABILITIES can be identified and planned against

Training and Preparation

Attack plan is Developed


Attack team assembled and trained


Logistics preparations made

The Attack

Once phase 5 is accomplished, terrorists wait for the right set of circumstances to make their attack.


Five Phases of Terrorist Attack Methodology

1. Target Operations


2. Selection Surveillance


3. Target Selection


4. Detailed Surveillance


5. The Attack

List and discuss (3) tactics used by terrorists

1. bombing 2. Hostage Taking


3. Kidnapping 4. Hijacking / Skyjacking


5. Seizure 6. Raids or Attacks


7. Sabotage 8. Weapons Mass Dest(WMD)


9. Information Warfare (IW)

Define an ECP

ENTRY CONTROL POINT


1st point of contact for those seeking access.


Most Critical part of defense


Include access points, piers, flight lines, and other restricted areas.


*It's here that potential terrorists are detected and neutralized.

Criticality is assessed by these 3 components..

1. Importance to the mission


2. Effect (if crippled or lost)


3. Recoverability

Vulnerability of an area is determined by these 3 components...

1. Construction


2. Accessibility


3. Recognizability

General Reqs for ATFP training:


LEVEL 1 Awareness training

Individual security and awareness and Antiterrorism training are essential elements of an overall AT program. Each individual must share this responsibility by ensuring proper degree of alertness and employment of personal protection measures.

General Reqs for ATFP training:


LEVEL 2 Antiterrorism Officer Training (ATO)

Each installation / deploying unit must have at least one assigned ATO.


ATO's are responsible for managing AT program, advising commander on AT issues, and providing Level 1 Awareness Training.