Briefer’s Name Date This briefing is UNCLASSIFIED Antiterrorism / Force Protection NWP 3-07.2.

Slides:



Advertisements
Similar presentations
Building a Strategy for Combating Terrorism. “We have to fight terrorists as if there were no rules, and preserve our open society as if there were no.
Advertisements

ANTITERRORISM Terrorism has become a media event and, as such, a phenomenon of our time. Terrorist frequently claim affiliation with what types of causes?
Special Operations Center of Excellence
A Brief Overview of Emergency Management Office of Emergency Management April 2006 Prepared By: The Spartanburg County Office of Emergency Management.
SOF Core Operations and Activities
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
1 NGA Regional Bio-Terrorism Conference Boston, Massachusetts January 12-13, 2004.
Civilian Intelligence Organizations
JUNIOR SAILOR ADVANCEMENT WORKSHOP (JSAW) CTO1(SW) Germean Porter NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
1 Intelligence Community and Classified Information.
SEABEE COMBAT WARFARE NCF OFFICER SPECIFIC
Naval Organization Chapter 6 BMR
Tradition CIA FBI. Commissions US Commission on National Security in the 21 st Century (USCNS) Hart- Rudman Commission (see Phase 1 Report, p. 7) US Commission.
CTTSO Overview John Morgan, Deputy Director for Science and Technology, CTTSO September 2010.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
INTERNATIONAL SECURITY AND PEACE WAR FOR THE NEW WORLD ORDER AND WAR ON TERRORISM Arifah Raja Falency (I34014)
2. Intelligence Defining the Problem – Who are the threats? Sharing Information.
United States Department of Defense
Briefer’s Name Date This briefing is UNCLASSIFIED Antiterrorism / Force Protection NWP HM1 OWENS.
Citizenship Issues C.I.4 U.S. Domestic and Foreign Policy Students are able to: 4.2 Describe U.S. foreign policy. Students may indicate this by: – Defining.
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
EMERGING THREATS TO HUMAN SECURITY IN AFRICA
Australia’s National Security Apparatus Ms Vikki Templeman Director Strategic Assessments and Long Range Planning.
Antiterrorism. Learning Topics Introduction Identifying and selecting targets Regions Levels Vigilance Don’t be a target Responding and reporting Detection.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Navy Doctrine For Antiterrorism/Force Protection NWP (REV. A) YN1 Brockington anthonio.brockington.navy.mil.
Old and New Terrorism- patterns of terrorist activity Definition: "the calculated use of unlawful violence or threat of unlawful violence to inculcate.
Previous Slide TRADOC DCSINT Office of the Deputy Chief of Staff for Intelligence U.S. Army Training and Doctrine Command TRADOC DCSINT.
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
Air Force Doctrine Document 2-5.4: Public Affairs Operations.
Joint Training Challenges of Irregular Warfare/COIN and Full Spectrum Training Requirements Brief for WJTSC LtCol John Merna, J7/9-TJ 23 September.
ADVANCEMENT EXAM TRAINING YN1(SW) FANT NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.
TERRORISM. DEFINITION  The unlawful use of – or threatened use of – force of violence against individuals or property to coerce or intimidate governments.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Introduction to Homeland Security CHAPTER 1.
Navy Doctrine for ATFP NWP HM1 (SW/AW) Alburg.
Unclassified  1 Critical Infrastructure Protection Chuck Whitley EMS User’s Group June 9, 1999.
Specialization Investigation Terrorism.  As you know class, this is our last seminar. I enjoyed the term.  Seminar, Discussion, and Research Project.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
Ned Einsig III.  Domestic Intelligence & Security Service of the United States  Prime Federal Law Enforcement Organization  Jurisdiction on over 200.
The IC Today Chapter 3 ©2013, Taylor & Francis. Introduction The IC is a work in progress It has undergone a major reorganization – Adversaries that possess.
Homeland Security CJ355 Week 8 Police Tactical Preparation and Citizen’s Role in Homeland Security.
Chapter 17: Foreign Policy and National Defense Section 2.
 War  Guerrilla war  Terrorism  Coups d’état  Assassination  Economic/property damage  Sabotage  Riot Continuum 1.
November 19, 2002 – Congress passed the Homeland Security Act of 2002, creating a new cabinet-level agency DHS activated in early 2003 Original Mission.
CJ in the USA Copyright 2011 Curriculum Technology, LLC. All Rights Reserved.
DHS/ODP OVERVIEW The Department of Homeland Security (DHS), Office for Domestic Preparedness (ODP) implements programs designed to enhance the preparedness.
Homeland Security Grants. Presidential Decision Directive 1998 – PDD 62 –Fight against Terrorism a top national priority Counter Terrorism tools Improve.
CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT CHAPTER 5 NAVY RESEARCH AND DEVELOPMENT MODULE: NAVAL KNOWLEDGE UNIT 2: NAVAL OPERATIONS AND SUPPORT FUNCTIONS.
With the ARNG’s vital role in providing support for homeland defense and the war on terrorism, the nature and types of threats against us have become.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Chapter 16 Terrorism and National Security.
COSC 316 Final Presentation
Joint Force Headquarters-Michigan CCIRs and PIRs
California Cybersecurity Integration Center (Cal-CSIC)
What is terrorism? There is no agreed definition of terrorism internationally. The UK’s Terrorism Act 2000, defines terrorism as: The use or threat of.
Joint Force Headquarters-Michigan CCIRs and PIRs
Do Now: How would you define terrorism? Please give examples that demonstrate your definition.
[ 6.6 ] National Security.
Federal Protective Service
Operations Security (OPSEC)
FORCE PROTECTION.
Chapter 17: Foreign Policy and National Defense Section 2
Training at the Awareness Level Review
Prevention, Intelligence
Role of US Security and Intelligence Agencies
Small unit proficiency
Presentation transcript:

Briefer’s Name Date This briefing is UNCLASSIFIED Antiterrorism / Force Protection NWP

Overview Definition of Terrorism Definition of Terrorism Force Protection Force Protection Defense Conditions Defense Conditions Terrorism Threat Levels Terrorism Threat Levels Phases of Terrorism Phases of Terrorism Terrorists Tactics Terrorists Tactics CT/CI Centers CT/CI Centers Navy AT/FP Program Navy AT/FP Program

Definition Department of Defense Definition of “Terrorism” Department of Defense Definition of “Terrorism” The calculated use of violence or threat of violence to instill fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological. The calculated use of violence or threat of violence to instill fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological. Combating Terrorism involves actions including: Combating Terrorism involves actions including: Antiterrorism– defensive measures Antiterrorism– defensive measures Counterterrorism– offensive measures Counterterrorism– offensive measures

Types of Monitoring Conditions/Levels Type of Condition/ Level What is being measure/determined Controlling AuthorityRange/Scale FPCON Indicates level of proactive measures to safeguard commands in a geographic area Local area Commander D,C,B,A,Normal Terrorism Threat Level Level of Terrorist threat within a given country theater CINC/DIA for global threat High, Signicant, Moderate, Low DEFCONUS Forces Alert Posture NCA/JCS in conjunction with CINCs 1,2,3,4,5

Force Protection Conditions (FPCON) FPCON ALPHA – when there is a general threat of possible terrorist activity against personnel and facilities and the nature and extent of which are unpredictable FPCON ALPHA – when there is a general threat of possible terrorist activity against personnel and facilities and the nature and extent of which are unpredictable FPCON BRAVO – when an increased and more predictable threat of terrorist activity exists. This measure must be capable of being maintained for weeks without causing undue hardship, affecting operational capability, and aggravating relations with local authorities FPCON BRAVO – when an increased and more predictable threat of terrorist activity exists. This measure must be capable of being maintained for weeks without causing undue hardship, affecting operational capability, and aggravating relations with local authorities FPCON CHARLIE – when an incident occurs or intelligence is received indicating some form of terrorist action against personnel and facilities is imminent FPCON CHARLIE – when an incident occurs or intelligence is received indicating some form of terrorist action against personnel and facilities is imminent FPCON DELTA – applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific location or person is likely. FPCON DELTA – applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific location or person is likely.

Terrorist Threat Level Low Low No terrorist group is detected or the group activity is non-threatening Moderate Moderate Terrorists are present but there are no indications of anti-US activity Significant Significant Anti-US terrorists are present and attack personnel as their preferred method of operation, or a group uses large casualty producing attacks as its preferred method but has limited operational activity High High Anti-US terrorists are operationally active and use large casualty producing attacks as their preferred method of operation

Defense Condition (DEFCON) DEFCON 5 DEFCON 5 Normal peacetime situation exists Normal peacetime situation exists DEFCON 4 DEFCON 4 Tensions exist which require greater military vigilance Tensions exist which require greater military vigilance DEFCON 3 DEFCON 3 Tensions exist which may have serious and adverse effects on U.S. interests Tensions exist which may have serious and adverse effects on U.S. interests DEFCON 2 DEFCON 2 Situations exist which are directly susceptible to foreign exploitation by hostile action or other situations exist which are susceptible to hostile exploitation, either which could seriously threaten US forces overseas, US allies, or areas vital to US national interests. DEFCON 1 DEFCON 1 International relations have deteriorated to such a degree that measures must be taken to achieve maximum readiness. Significant strategic and/or tactical indications of hostilities exist against US forces overseas, US allies, or the US or its possessions. War is imminent.

Phases of Terrorism Terrorism six-step process Terrorism six-step process Phase One - Target Options Phase One - Target Options Phase Two - Selection Surveillance Phase Two - Selection Surveillance Phase Three - Target Selection Phase Three - Target Selection Phase Four - Detailed Surveillance Phase Four - Detailed Surveillance Phase Five - Training and Preparation Phase Five - Training and Preparation Phase Six - The Attack Phase Six - The Attack

Terrorists Tactics Common Terrorists Tactics Common Terrorists Tactics Assassination Assassination Arson Arson Bombing Bombing Hostage Taking Hostage Taking Kidnapping Kidnapping Hijacking or Skyjacking Hijacking or Skyjacking Seizure Seizure Raids or Attacks On Facilities Raids or Attacks On Facilities Sabotage Sabotage Weapons of Mass Destruction (WMD) Weapons of Mass Destruction (WMD) Information Warfare (IW) Information Warfare (IW)

Tasking The Intelligence Community DOD Intelligence Centers Navy Intelligence Assets Regional Intelligence Centers Unit National Intelligence Community Intelligence Products Priority Intelligence Requirements/Reques ts For Information

National CT/CI Centers Director of Central Intelligence, Counterterrorism Center (CTC) Director of Central Intelligence, Counterterrorism Center (CTC) Lead center in U.S. to fight against terrorism Lead center in U.S. to fight against terrorism Interagency Intelligence Committee on Terrorism (IICT) Interagency Intelligence Committee on Terrorism (IICT) Forum for coordination and cooperation on CT issues Forum for coordination and cooperation on CT issues Bureau of Intelligence and Research (INR) Bureau of Intelligence and Research (INR) Primarily serve U.S. diplomatic corps; ensure intelligence activities are consistent with U.S. foreign policy Primarily serve U.S. diplomatic corps; ensure intelligence activities are consistent with U.S. foreign policy Federal Bureau of Investigation (FBI) Federal Bureau of Investigation (FBI) Responsible for detecting and counteracting foreign intelligence activities that affects U.S. national security Responsible for detecting and counteracting foreign intelligence activities that affects U.S. national security

DOD CT/CI Centers Defense Intelligence Agency (DIA) Office of Counterterrorism, Threat Warning Center (TWC) Defense Intelligence Agency (DIA) Office of Counterterrorism, Threat Warning Center (TWC) TWC is the coordinating office for DIA on terrorism TWC is the coordinating office for DIA on terrorism

Command and Regional CT/CI Centers Joint Forces Intelligence Command (JFIC) – Located in Norfolk, VA Joint Forces Intelligence Command (JFIC) – Located in Norfolk, VA Joint Analysis Center USEUCOM (JAC) – Located in Molesworth, UK Joint Analysis Center USEUCOM (JAC) – Located in Molesworth, UK Joint Intelligence Operations Center USCENTCOM (JIOCCENT) – Located in Tampa, Florida Joint Intelligence Operations Center USCENTCOM (JIOCCENT) – Located in Tampa, Florida Joint Intelligence Operations Center USPACOM (JIOCPAC) – Located in Pearl Harbor, Hawaii Joint Intelligence Operations Center USPACOM (JIOCPAC) – Located in Pearl Harbor, Hawaii

Service Sponsored CT/CI Centers Naval Criminal Investigation Service (NCIS) – has primary investigative and counterintelligence jurisdiction for the Navy Naval Criminal Investigation Service (NCIS) – has primary investigative and counterintelligence jurisdiction for the Navy NCIS has an AT/FP program that collects and analyzes information about possible threats and advises commanders on how to best defend against them NCIS has an AT/FP program that collects and analyzes information about possible threats and advises commanders on how to best defend against them Navy Antiterrorist Alert Center (ATAC) – is the centerpiece for of the Navy’s efforts to counter terrorist threats, located in Washington D.C. Navy Antiterrorist Alert Center (ATAC) – is the centerpiece for of the Navy’s efforts to counter terrorist threats, located in Washington D.C. Army Counterintelligence Center (ACIC) – provides timely, accurate, and effective counterintelligence and terrorism analysis support to the Army Army Counterintelligence Center (ACIC) – provides timely, accurate, and effective counterintelligence and terrorism analysis support to the Army Air Force Office of Special Investigation (AFOSI) – counters the threat to Air Force security posed by hostile intelligence services and terrorist groups Air Force Office of Special Investigation (AFOSI) – counters the threat to Air Force security posed by hostile intelligence services and terrorist groups

CT/CI Organizations Command and Regional Centers Service Centers National Counterterrorism Center / IICT Federal Bureau of Investigation Bureau of Intelligence Research Defense Intelligence Agency JIOCCENT JIOCPAC JFIC JAC ACIC NCIS AFOSI

BLUE DART There is a need to inform threatened units in a timely manner There is a need to inform threatened units in a timely manner BLUE DART messaged are disseminated when intelligence indicates that a specific, imminent, and credible terrorists threat exists BLUE DART messaged are disseminated when intelligence indicates that a specific, imminent, and credible terrorists threat exists  Require acknowledgment by immediate message by all action addressees, acknowledged by immediate precedence

Consequence Management Phase One – Impacts and Consequences: Potential impacts and consequences of an incident focusing on worst case scenarios for a particular facility or unit Phase One – Impacts and Consequences: Potential impacts and consequences of an incident focusing on worst case scenarios for a particular facility or unit Example = Multi-level building with severe damage or collapse, trapped personnel Example = Multi-level building with severe damage or collapse, trapped personnel Phase two – Resources Required: Resources required to respond to consequence and impacts of Phase One; where requirements exceed resources, mitigating actions are taken Phase two – Resources Required: Resources required to respond to consequence and impacts of Phase One; where requirements exceed resources, mitigating actions are taken Example = Resources needed to rescue trapped personnel in collapsed building; using non-DOD assets Example = Resources needed to rescue trapped personnel in collapsed building; using non-DOD assets Phase Three – Training and Exercise: Once a consequence management plan has been developed, personnel must be trained and the plan must be practiced Phase Three – Training and Exercise: Once a consequence management plan has been developed, personnel must be trained and the plan must be practiced

Navy AT/FP Program The Navy AT/FP program: The Navy AT/FP program: Purpose is to ensure Navy forces remain mission capable at all times Purpose is to ensure Navy forces remain mission capable at all times Focuses on preventing terrorist attacks on Navy assets and personnel through education and training Focuses on preventing terrorist attacks on Navy assets and personnel through education and training Combating terrorism is the responsibility of every individual in the Navy Combating terrorism is the responsibility of every individual in the Navy

Questions? This briefed was prepared with information derived from: NWP This briefed was prepared with information derived from: NWP