ADVANCEMENT EXAM TRAINING YN1(SW) FANT NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.

Slides:



Advertisements
Similar presentations
Terrorism Preparedness. Terrorism Terrorist Pre-Strike Preparation Terrorist Pre-Strike Preparation-Remote-Targeting: Internet and public documents -Surveillance.
Advertisements

Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
ANTITERRORISM Terrorism has become a media event and, as such, a phenomenon of our time. Terrorist frequently claim affiliation with what types of causes?
Special Operations Center of Excellence
4 4Raise your hand when you want to give an answer. The judge must call on you before you answer. 4 4You have 5 seconds to answer from the time you.
UNIT PHYSICAL SECURITY PLAN
Chapter 13 Crimes Against the State Joel Samaha, 9th Ed.
United States Army Chemical School 84 th Chemical Battalion TERRORISM.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
JUNIOR SAILOR ADVANCEMENT WORKSHOP (JSAW) CTO1(SW) Germean Porter NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Army Doctrine Publication (ADP) 3-37; and Army
Workshop Summary ISPS Drills & Exercises Workshop Port Moresby 2006.
 Before you attempt the question given to you as an assignment … you must take note of the following information: ◦ A primary goal of terrorism is to.
Force Protection. **Definition of terrorism “the unlawful use or threatened use of force or violence against individuals or property to coerce,
IAEA International Atomic Energy Agency International Cooperation in Nuclear Security David Ek Office of Nuclear Security.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Campaign Planning Process Step 3B – System Center of Gravity Analysis
A Secure Frontline September 25, 2003
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
Briefer’s Name Date This briefing is UNCLASSIFIED Antiterrorism / Force Protection NWP HM1 OWENS.
Port Security Safeguarding ISPS Drills & Exercises Workshop
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
IAFS 1000 Terrorism. Dinner See evite Paper Presentations Dec min. talk, 6 min. Q&A Clearly and concisely summarize: –Argument –Evidence (analysis.
EMERGING THREATS TO HUMAN SECURITY IN AFRICA
Terrorism.
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
Antiterrorism. Learning Topics Introduction Identifying and selecting targets Regions Levels Vigilance Don’t be a target Responding and reporting Detection.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Navy Doctrine For Antiterrorism/Force Protection NWP (REV. A) YN1 Brockington anthonio.brockington.navy.mil.
5/159 TH AVN REG THE COST OF FREEDOM IS HIGH BUT SOME PEOPLE WILL SELL US OUT FOR NOTHING!! FITZ.
Old and New Terrorism- patterns of terrorist activity Definition: "the calculated use of unlawful violence or threat of unlawful violence to inculcate.
Terrorism. Learning Topics Introduction Terrorism/Acts of war History of Terrorism Elements of Terrorism Types Media’s Role Objectives Tactics.
FORCE PROTECTION Operations SGT Artemis O’Conan Operations Center.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
10 th Military Police Company,10th Mountain Division, Fort Drum, NY 10 th MILITARY POLICE COMPANY FORCE PROTECTION.
Navy Doctrine for ATFP NWP HM1 (SW/AW) Alburg.
Integrated Protective Concepts.  This presentation provides a very brief overview of key points of personal security  Each of these key points requires.
Briefer’s Name Date This briefing is UNCLASSIFIED Antiterrorism / Force Protection NWP
Bronx Engineering & Technology Academy AIM: What is Terrorism? Do Now: Define Terrorism Terrorism.
IAFS 1000 Terrorism.
A Military Guide to Terrorism in the Twenty-First Century
AT HOTELS  Do not give room number to strangers.  Choose an inside hotel room.  Sleep away from street side windows.  Leave lights on when room is.
Viol_oh5/02/00 1 Building A Safe Workplace: Preventing Workplace Violence Employee Training Cooperatively Developed By and The Commonwealth of Pennsylvania.
1 Book Cover Here Chapter 23 TERRORISM AND URBAN DISORDER Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014,
Homeland Security CJ355 Week 8 Police Tactical Preparation and Citizen’s Role in Homeland Security.
3-MINUTE READ THE PREVENT DUTY. What is it and what does it mean for me? This 3-Minute Read summarises the DfE’s document: ‘The Prevent duty: Departmental.
 War  Guerrilla war  Terrorism  Coups d’état  Assassination  Economic/property damage  Sabotage  Riot Continuum 1.
DHS/ODP OVERVIEW The Department of Homeland Security (DHS), Office for Domestic Preparedness (ODP) implements programs designed to enhance the preparedness.
Prevent Duty Briefing.
Threat into Risk: A Challenge for Security Guidance AusRAIL 2006 Tony Beard Office of Transport Security Department of Transport and Regional Services.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
With the ARNG’s vital role in providing support for homeland defense and the war on terrorism, the nature and types of threats against us have become.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Chapter 16 Terrorism and National Security.
Disaster and Emergency Management
Disaster Preparedness
What is terrorism? There is no agreed definition of terrorism internationally. The UK’s Terrorism Act 2000, defines terrorism as: The use or threat of.
Terrorism.
Do Now: How would you define terrorism? Please give examples that demonstrate your definition.
Each unit brings a specific capability to the overall mission.
Operations Security (OPSEC)
FORCE PROTECTION.
Terrorism.
Prevention, Intelligence
Presentation transcript:

ADVANCEMENT EXAM TRAINING YN1(SW) FANT NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION

Objectives Purpose Definition Characteristics Tactics Preparation Threat Levels Threat Conditions Assessment Defense in Depth Security while Traveling

Establish and maintain unit ATFP programs that deter, detect, defend, mitigate and recover from the consequences of terrorist attacks via implementation of coherent baseline security measures. Defeat an attack by the activation of preplanned responses. Take required action to manage a crisis and maintain/regain mission readiness. Purpose

Terrorism The calculated use of unlawful violence or threat of unlawful violence to inculcate fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious or ideological. Definition

Antiterrorism (AT) Defensive measures used to reduce the vulnerability of individuals and property to terrorist acts, to include limited response and containment by local military forces. Definition

Force Protection (FP) Security program designed to protect Service member, civilian employees, family members, facilities, and equipment, in all locations and situation, accomplished through planned and integrated application of combating terrorism, physical security, operations security, personal protective service, and supported by intelligence, counterintelligence, and other security programs. Definition

Physical Security That part of security concerned with physical measures designed to safeguard personnel; to prevent unauthorized access to equipment, installations, material and documents; and to safeguard them against espionage, sabotage, damage, and theft.

Terrorist Ideology –Politics –Nationalism –Religion –Special Interest Goals –Recognition –Elimination of Western Influence –Harassment, Weakening or embarrassment of governments. –Attainment of money or equipment –Destruction of facilities and disruption of communications –Satisfying vengeance

Terrorist Characteristics Urban-Based: An urban environment offers access to transportation, money-laundering mechanisms, communications systems and international contacts who can provide required travel documentation. Highly mobile: Terrorists typically move frequently among cities and countries, not only to facilitate the planning and execution of operations, but also in search of safe havens and like-minded support

Terrorist Characteristics Well-Trained: In order to instill individual members with a strong desire for success, including a willingness to die for the cause, terrorist groups train and rehearse extensively. Emphasis is on physical conditioning, effective use of weapons and explosives, tactics and combat techniques, clandestine operations, psychological warfare and survival skills. Covert: Although some groups have overt political contingents, the operational cells of most terrorist groups can operate in covert postures for extended periods.

Assassination Arson Bombing Hostage taking Hijacking or Skyjacking Raids or attacks at facilities Kidnapping Seizure Weapons of mass destruction Sabotage Information Warfare Terrorist Tactics

Attack Preparations Target Options: Choosing a target typically starts with a self- assessment of the terrorist group’s capabilities, which will, in large part, define the methods of attack available to the group. Selection Surveillance: Data gathered from watching potential targets will help the terrorist group refine the list of choices. A potential target may be de-selected because surveillance data proves the choice to be too difficult to effectively attack. Target Selection: Once surveillance data results are assessed, terrorists are able to select their target or set of targets. The most likely targets are those that are vulnerable, undefended or with weak security.

Attack Preparations Detailed Surveillance: Terrorists often conduct further long-term, detailed surveillance of the chosen potential target(s), seeking to detect routines, procedures and site-specific security measures. Training and preparation: Once the terrorists’ plan of attack has been developed, the attack team will be chosen and trained. Attack: Terrorists wait for the right set of circumstances to attack, which can take months or even years.

Terrorist Threat Levels Low: No terrorist group is detected Moderate: Terrorist groups are present but there is no indication of anti-U.S. activity Significant: An anti-U.S. terrorist group is operationally active and their preferred method of operation is to attack personnel; or the terrorist group’s preferred method of operation is to execute large casualty. High: An anti-U.S. terrorist group is operationally active and uses large casualty producing attacks as their preferred method of operation.

Terrorist FP Conditions Normal Charlie Alpha Bravo Delta

Risk Assessment Operational Risk Management Criticality Assessment Vulnerability Assessment Planning Assessment Response Element Assessment Vulnerability Assessment Management Program

Defense in Depth Defense in depth is the central concept in the Navy’s strategy toward defending against terrorism. It involves a series of redundant measures, varying actions and multiple layers of defense. Defense in depth gains its strength from the layering of defenses that prevents the defeat of one antiterrorism measure from allowing a terrorist attack to succeed. This combination will present a more challenging target to potential terrorist and increase the probability of defeating an attack.

Defense in Depth Assessment Stand-Off Warning Threat

Defense in Depth Where do the threats come from? Airborne Landside Subsurface Seaward

Security while Traveling Airport Terminals Hotels All the time Bomb incidents

Security at All Times Vary eating establishments. Alternate shopping locations. Do not establish any sort of pattern! Avoid crowded areas. Be especially alert exiting bars, restaurants, etc. Know how to use the local phone system and carry “telephone change”. Know emergency phone numbers for police, ambulance, and hospital. Know location of the US Embassy and other safe locations where you can find refuge or assistance.

Any Questions????