Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.

Slides:



Advertisements
Similar presentations
Thai delegation Presentation at 4 th ARF seminar on Cyber-terrorism
Advertisements

Homeland Defense is a National Imperative. Definitions Homeland Defense- – Joint Publication JP 3-27 states that Homeland Defense is our nation’s first.
© 2012 Delmar, Cengage Learning Section V Getting the Job Done… Through Others Chapter 13 Deploying Law Enforcement Resources and Improving Productivity.
Chapter 13 Crimes Against the State Joel Samaha, 9th Ed.
1 Rules for the Use of Force in Military Law Enforcement and Security Duties.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
JUNIOR SAILOR ADVANCEMENT WORKSHOP (JSAW) CTO1(SW) Germean Porter NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Leslie W Kennedy Director RUTGERS Newark. Sponsored by the Rutgers School of Criminal Justice, Center for Global Change and Governance, College of Nursing.
iWATCH Army Training for Contractors “See Something -- Say Something”
What is Terrorism? Terrorism - The use or threatened use of violence for the purpose of creating fear in order to achieve a political, economic, religious,
Submitted by: Abhashree Pradhan CA (1)
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
IDENTIFYING THREATS IN A GLOBAL MARKETPLACE Ira S. Somerson, BCFE, CPP Loss Management Consultants, Inc. Institute for Global Management Studies And Temple.
INTERNATIONAL SECURITY AND PEACE WAR FOR THE NEW WORLD ORDER AND WAR ON TERRORISM Arifah Raja Falency (I34014)
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
Cyber-Attack On Department Of Defense. Overview Washington has reported that there has been a widespread attack on Defense Department computers that may.
9 Terrorism as Organized Crime.
Briefer’s Name Date This briefing is UNCLASSIFIED Antiterrorism / Force Protection NWP HM1 OWENS.
911 PST Overview 1 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 Ethics,
Terrorism. What is going on? Brief timeline of major events of terrorism Definition of terrorism Why do terrorists commit terrorism acts? How do governments.
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
EMERGING THREATS TO HUMAN SECURITY IN AFRICA
Terrorism. What is Terrorism? Terrorism is a criminal act that influences an audience beyond the immediate victim. The strategy of terrorists is to commit.
GIA – ARMED ISLAMIC GROUP OF ALGERIA Natalie Fiestas Katty Elfi Goga.
FORCE PROTECTION Operations SGT Artemis O’Conan Operations Center.
ADVANCEMENT EXAM TRAINING YN1(SW) FANT NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.
TERRORISM. DEFINITION  The unlawful use of – or threatened use of – force of violence against individuals or property to coerce or intimidate governments.
Defense Institute of International Legal Studies
Navy Doctrine for ATFP NWP HM1 (SW/AW) Alburg.
Chapter Six: Types of Modern Terrorism. Cyberterrorism.
CJ 499 Unit 9. International Crime and What is it ?
Briefer’s Name Date This briefing is UNCLASSIFIED Antiterrorism / Force Protection NWP
Counterterrorism: Aum Shinrikyo Initial Response Intelligence Weapons Laws.
Specialization Investigation Terrorism.  As you know class, this is our last seminar. I enjoyed the term.  Seminar, Discussion, and Research Project.
Civil Liability and Policing Challenges.  Any questions about anything before we begin?  Unit 7: Seminar, Discussion, Quiz, and Unit 7 Project Chapters.
Understanding the Threats of and Defenses Against Cyber Warfare.
AIRPORT SECURITY TECHNOLOGY V/S TERRORISM.
AT HOTELS  Do not give room number to strangers.  Choose an inside hotel room.  Sleep away from street side windows.  Leave lights on when room is.
Group 1 FBI, CIA, and Homeland Security. Intoduction Original meaning of Encryption is “secrete writing” The purpose: To secure electronic commerce and.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
1 Book Cover Here Chapter 23 TERRORISM AND URBAN DISORDER Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014,
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
Homeland Security CJ355 Week 8 Police Tactical Preparation and Citizen’s Role in Homeland Security.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
 War  Guerrilla war  Terrorism  Coups d’état  Assassination  Economic/property damage  Sabotage  Riot Continuum 1.
Disaster and Emergency Management Security Services.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
With the ARNG’s vital role in providing support for homeland defense and the war on terrorism, the nature and types of threats against us have become.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Disaster and Emergency Management
Joint Force Headquarters-Michigan CCIRs and PIRs
Threats to World Security Chapter 33 Section 3.
Disaster Preparedness
Joint Force Headquarters-Michigan CCIRs and PIRs
Cyber Crimes Chunlian QU 9/18/2018.
Do Now: How would you define terrorism? Please give examples that demonstrate your definition.
Prevent Matching Card Game
Federal Protective Service
Disaster and Emergency Management
Chapter 13 Globalization and Terrorism: Our Small World
FORCE PROTECTION.
Unit 1 Emergency Procedures.
Preparing for a Terrorist Attack Indian Point Energy Center
TERRORISM Terrorism—the planned threat or use of violence, often against the civilian population, to achieve political or social ends, to intimidate opponents,
Criminal Investigations
FACILITY TARGET HARDENING
Presentation transcript:

Force Protection

What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate hostile actions in specific areas or against a specific population.

Who is the target? All military units in the United States. When force protection condition is applied it is to raise the level of awareness and thereby protect our country

Force Protection Condition(FPCON) Force Protection Condition (FPCON) is a terrorist threat system overseen by the Department of Defense directive, and describes the measures security agencies need to take in response to various levels of terrorist threats against military facilities

Purpose of FPCON FPCON is used to determine the minimum security a certain area will have

Normal FPCON NORMAL describes a situation of no current terrorist activity. The only security forces needed are enough to stop the everyday criminal, similar to civilian police forces

Alpha FPCON ALPHA describes a situation where there is a small and general terrorist activity that is not predictable. Agencies will inform personnel that there is a possible threat and a standard security procedure review is conducted

Bravo FPCON BRAVO describes a situation with somewhat predictable terrorist threat. Security measures taken by agency personnel may affect the activities of local law enforcement and the general public

Charlie FPCON CHARLIE describes a situation when a global terrorist attack has occurred or when intelligence reports that there is local terrorist activity imminent.

Delta FPCON DELTA describes a situation when a terrorist attack is taking place or has just occurred in the immediate area. FPCON Delta usually occurs only in the areas that are most vulnerable to or have been attacked.

Types of Threats Bio Terrorism – the release of germs or viruses, such as anthrax Chemical Terrorism – the release of poisonous chemicals Cyber Terrorism – the electronic attack on critical computer infrastructure Nuclear Terrorism – the use of nuclear materials in a terrorist attack, either a nuclear bomb or a "dirty bomb" (highly radioactive chemicals spread by an ordinary explosive) Eco Terrorism - the use of acts of violence, sabotage, vandalism, property damage and intimidation committed in the name of environmentalism Religious Terrorism - terrorism motivated by religion

Conclusion Pay attention to the level of threat at your base Keep a look out for anything suspicious that might be related to that threat Make sure you are able to provide more than one idea for any of the elevated threat levels Be familiar with the FPCON instruction specific to your command

Resources Force Protection Agency DoD Antiterrorism Standards pdf