1 / 36

Force Protection

Force Protection. **Definition of terrorism. “the unlawful use or threatened use of force or violence against individuals or property to coerce, or intimidate governments or societies, often to achieve political, religious, or ideological objectives.”.

kieu
Download Presentation

Force Protection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Force Protection

  2. **Definition of terrorism • “the unlawful use or threatened use of force or violence against individuals or property to coerce, or intimidate governments or societies, often to achieve political, religious, or ideological objectives.”

  3. **Common Characteristics of Terrorist Groups • They seek to intimidate a population by promoting fear • They are militarily weak • They do not equate tactical success with mission success • They are usually urban based • They are highly mobile • They operate covertly

  4. **Short Range Goals of Terrorist Acts • Obtain Worldwide, National, or Local Recognition for Their Cause • Cause the Governments to Overreact • Harass, Weaken, or Embarrass Government Security Forces • Obtain Money and Equipment • Destroy Facilities or Disrupt Lines of Communications

  5. Discourage Foreign Investments or Assistance Programs • Influence Government Decisions, Legislation, or Elections • Free Prisoners • Satisfy Vengeance • Turn the Tide in a Guerrilla War

  6. **Internal Organization of Terrorist Groups • Operational Cell-- The action arm of the group. In sophisticated groups, these cells may be highly specialized with bombers, assassins, or personnel performing other specific functions. In new or less sophisticated groups, operational cells may perform many jobs, including intelligence and support. These groups usually consist of three to five people.

  7. Intelligence Cell • This cell collects information on potential targets. It is highly compartmentalized and follows very strict security. This means that members of the cell may know only the other members of their cell. They may not know who they take their orders from (receiving orders at drop points) or who is in other cells. The size of these cells vary greatly

  8. Auxiliary Cell • Auxiliary Cells usually perform support functions such as raising funds, screening recruits, and distributing propaganda. They are often larger and less strictly compartmentalized than other cells. They can consist entirely of terrorist sympathizers and supprters other than the cadre

  9. Two Characteristics of Terrorist Training • Internal Training- This is usually conducted secretly by members of the group within the target country. • External Training- This is conducted by non-group members, often outside the target country. **Most known international training camps are located in the Middle East with Libya boasting more than 70.

  10. Training Program • Individual Physical and Mental Conditioning • Weapons and Explosives • Political Indoctrination • General Tactics and Combat Techniques • Intelligence Collecting • Psychological Warfare • Survival • Communications

  11. Anti-Terrorism Measures • Anti-terrorism is the preventive stage of terrorism. These measures are intended to harden potential targets and to develop procedures to detect planned terrorist actions before they take place, thereby reducing the probability of a terrorist event • Prevention is always the best posture!

  12. Criminal Information / Intelligence • Threat Assessment • Crime Prevention • Operational Security • Personnel Protection • Physical Security

  13. Crisis Management Planning • Who will make decisions and have final authority for the team as a whole • Who will be members of the team and what will their responsibilities be • The missions of the military police, the augmentation forces, and the installation staff • Specialized training of hostage negotiators and special reaction teams • Contingency plans

  14. Counter-Terrorism Measures • Counter-terrorism measures are taken in response to terrorist incident, including direct contact with a terrorist force to end the incident with minimum loss of life and property. • Responding to a terrorist incident requires special capabilities and considerations • **The incident must be identified as a terrorist event

  15. Preparation for multiple incidents or diversionary tactics • Establishment of communication • Use of think-tank teams • Preparation for prolonged incidents • Management of the media • Preparation of an after-action report

  16. Personal Protective Measures • Your attitude towards security is most important. You can lessen your chances as well as those of your family members of becoming a terrorist target by taking some precautions

  17. At All times!!!!!! • Encourage security awareness • Be alert for surveillance attempts • Vary personal routines • Let people know where you are and when you’ll be home • Know how to use the local phone system and have extra change and cash on hand • Have emergency response numbers on hand

  18. Know the location of government buildings and the American Embassy • Avoid public disputes • Know certain phrases to get help!!! • Set up an emergency signal system for your family • Carry some sort of ID with blood type • Keep one weeks worth of Medication on you at all times • Keep a low profile

  19. Do not unnecessarily divulge your home address or phone number • Watch for unexplained absences of local citizens • Maintain your personal affairs in good order • Do not carry sensitive or potentially embarrassing items on you

  20. At Home • Have a clear view of approaches to your home • Install strong doors • Change locks when you move in or lose a key • Install windows that are hard to access • Never leave extra keys with anyone except family • Have adequate lighting

  21. While Traveling • Vary times and routes • Be alert for suspicious-looking vehicles • Drive with your widows and doors locked • Travel with a group of people • Do not pick up hitchhikers • Keep your gas tank filled at least half full

  22. In Hotels • Keep your room key on you at all times • Know the location of emergency exits • Do not admit strangers into your room • Know how to locate security guards • Be observant for suspicious persons • Keep your room orderly to enable you to notice tampering

  23. Air Travel Security • Use military aircraft when possible • Avoid high risk areas • Do not use rank on tickets • Ensure to take a window seat • Travel in civilian attire • Travel with civilian luggage

  24. **Phases of a Terrorist Incident • There are FIVE basic phases of every terrorist operation, they are as follows:

  25. Pre-Incident Phase • During this phase the terrorist meticulously plans the operation. They may conduct reconnaissance missions, lengthy periods of training, and rehearsals. • If a primary target is unavailable, or the risk is perceived as too great, an alternative target is selected.

  26. Initiation Phase • This is the start of the operation, when the terrorists move to their target in a covert manner. • Perpetrators leave for the target singly or in pairs • Weapons and explosives are pre-staged • The point of no return unless a mission abort is given

  27. Negotiations Phase • The negotiation phase is characterized by the terrorist’s demands, deadlines, talks, and tradeoffs. The terrorist will prolong this phase as long as possible to get the maximum amount of news coverage and publicity possible. • One demand will always be present during this phase.

  28. Climax Phase • This has no set time schedule, but it may follow the initiation phase if there is no negotiable item involved, such as an hostage. Security is at its peak during this phase, and law enforcement radio frequencies and civilian media are monitored closely

  29. Post-Incident Phase • This is an extremely important phase for the terrorists. During this phase, the terrorists regroup, discuss, and critique the operation. • During this phase, they learn from their successes and failures. • In the absence of a negotiation phase, the terrorist exploit the media during the post-incident phase.

More Related