Download presentation
Presentation is loading. Please wait.
Published byTabitha Houston Modified over 9 years ago
1
Briefer’s Name Date This briefing is UNCLASSIFIED Antiterrorism / Force Protection NWP 3-07.2 HM1 OWENS
2
Overview of Training Definition of Terrorism Definition of Terrorism Force Protection Force Protection Defense Conditions Defense Conditions Terrorism Threat Levels Terrorism Threat Levels Phases of Terrorism Phases of Terrorism Terrorists Tactics Terrorists Tactics CT/CI Centers CT/CI Centers Navy AT/FP Program Navy AT/FP Program
3
Definition Department of Defense Definition of “Terrorism” Department of Defense Definition of “Terrorism” Calculated use of violence or threat of violence to instill fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological. Calculated use of violence or threat of violence to instill fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological. Combating Terrorism involves actions including: Combating Terrorism involves actions including: Antiterrorism– defensive measures Antiterrorism– defensive measures Counterterrorism– offensive measures Counterterrorism– offensive measures
4
PURPOSE Establish and maintain unit ATFP programs that deter, detect, defend, mitigate and recover from the consequences of terrorist attacks via implementation of coherent baseline security measures. Establish and maintain unit ATFP programs that deter, detect, defend, mitigate and recover from the consequences of terrorist attacks via implementation of coherent baseline security measures. Defeat an attack by the activation of preplanned responses. Defeat an attack by the activation of preplanned responses. Take required action to manage a crisis and maintain/regain mission readiness. Take required action to manage a crisis and maintain/regain mission readiness.
5
FORCE PROTECTION DEFINITION Security program designed to protect Service member, civilian employees, family members, facilities, and equipment, in all locations and situation accomplished through planned and integrated application of combating terrorism, physical security, operations security, personal protective service, and supported by intelligence, counterintelligence, and other security programs. Security program designed to protect Service member, civilian employees, family members, facilities, and equipment, in all locations and situation accomplished through planned and integrated application of combating terrorism, physical security, operations security, personal protective service, and supported by intelligence, counterintelligence, and other security programs.
6
Types of Monitoring Conditions/Levels Type of Condition/ Level What is being measure/determined Controlling Authority Range/Scale FPCON Indicates level of proactive measures to safeguard commands in a geographic area Local area Commander D,C,B,A,Normal Terrorism Threat Level Level of Terrorist threat within a given country theater CINC/DIA for global threat High, Signicant, Moderate, Low DEFCON US Forces Alert Posture NCA/JCS in conjunction with CINCs 1,2,3,4,5
7
Terrorist Threat Level Low Low No terrorist group is detected or the group activity is non-threatening Moderate Moderate Terrorists are present but there are no indications of anti-US activity Significant Significant Anti-US terrorists are present and attack personnel as their preferred method of operation, or a group uses large casualty producing attacks as its preferred method but has limited operational activity High High Anti-US terrorists are operationally active and use large casualty producing attacks as their preferred method of operation
8
Force Protection Conditions (FPCON) FPCON ALPHA – when there is a general threat of possible terrorist activity against personnel and facilities and the nature and extent of which are unpredictable FPCON ALPHA – when there is a general threat of possible terrorist activity against personnel and facilities and the nature and extent of which are unpredictable FPCON BRAVO – when an increased and more predictable threat of terrorist activity exists. This measure must be capable of being maintained for weeks without causing undue hardship, affecting operational capability, and aggravating relations with local authorities FPCON BRAVO – when an increased and more predictable threat of terrorist activity exists. This measure must be capable of being maintained for weeks without causing undue hardship, affecting operational capability, and aggravating relations with local authorities FPCON CHARLIE – when an incident occurs or intelligence is received indicating some form of terrorist action against personnel and facilities is imminent FPCON CHARLIE – when an incident occurs or intelligence is received indicating some form of terrorist action against personnel and facilities is imminent FPCON DELTA – applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific location or person is likely. FPCON DELTA – applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific location or person is likely.
9
Defense Condition (DEFCON) DEFCON 5 DEFCON 5 Normal peacetime situation exists Normal peacetime situation exists DEFCON 4 DEFCON 4 Tensions exist which require greater military vigilance Tensions exist which require greater military vigilance DEFCON 3 DEFCON 3 Tensions exist which may have serious and adverse effects on U.S. interests Tensions exist which may have serious and adverse effects on U.S. interests DEFCON 2 DEFCON 2 Situations exist which are directly susceptible to foreign exploitation by hostile action or other situations exist which are susceptible to hostile exploitation, either which could seriously threaten US forces overseas, US allies, or areas vital to US national interests. DEFCON 1 DEFCON 1 International relations have deteriorated to such a degree that measures must be taken to achieve maximum readiness. Significant strategic and/or tactical indications of hostilities exist against US forces overseas, US allies, or the US or its possessions. War is imminent.
10
TERRORIST IDEAOLOGY Politics Politics Nationalism Nationalism Religion Religion Special Interest Special Interest GOALS Recognition Recognition Elimination of Western Influence Elimination of Western Influence Harassment, Weakening or embarrassment of governments. Harassment, Weakening or embarrassment of governments. Attainment of money or equipment Attainment of money or equipment Destruction of facilities and disruption of communications Destruction of facilities and disruption of communications Satisfying vengeance Satisfying vengeance
11
TERRORIST CHARACTERISTICS Urban-Based: An urban environment offers access to transportation, money-laundering mechanisms, communications systems and international contacts who can provide required travel documentation. Urban-Based: An urban environment offers access to transportation, money-laundering mechanisms, communications systems and international contacts who can provide required travel documentation. Highly mobile: Terrorists typically move frequently among cities and countries, not only to facilitate the planning and execution of operations, but also in search of safe havens and like-minded support Highly mobile: Terrorists typically move frequently among cities and countries, not only to facilitate the planning and execution of operations, but also in search of safe havens and like-minded support
12
TERRORIST CHARACTERISTICS Well-Trained: In order to instill individual members with a strong desire for success, including a willingness to die for the cause, terrorist groups train and rehearse extensively. Emphasis is on physical conditioning, effective use of weapons and explosives, tactics and combat techniques, clandestine operations, psychological warfare and survival skills. Well-Trained: In order to instill individual members with a strong desire for success, including a willingness to die for the cause, terrorist groups train and rehearse extensively. Emphasis is on physical conditioning, effective use of weapons and explosives, tactics and combat techniques, clandestine operations, psychological warfare and survival skills. Covert: Although some groups have overt political contingents, the operational cells of most terrorist groups can operate in covert postures for extended periods. Covert: Although some groups have overt political contingents, the operational cells of most terrorist groups can operate in covert postures for extended periods.
13
Phases of Terrorism Terrorism six-step process Terrorism six-step process Phase One - Target Options Phase One - Target Options Phase Two - Selection Surveillance Phase Two - Selection Surveillance Phase Three - Target Selection Phase Three - Target Selection Phase Four - Detailed Surveillance Phase Four - Detailed Surveillance Phase Five - Training and Preparation Phase Five - Training and Preparation Phase Six - The Attack Phase Six - The Attack
14
ATTACK PREPARATIONS Target Options: Choosing a target typically starts with a self-assessment of the terrorist group’s capabilities, which will, in large part, define the methods of attack available to the group. Target Options: Choosing a target typically starts with a self-assessment of the terrorist group’s capabilities, which will, in large part, define the methods of attack available to the group. Selection Surveillance: Data gathered from watching potential targets will help the terrorist group refine the list of choices. A potential target may be de-selected because surveillance data proves the choice to be too difficult to effectively attack. Selection Surveillance: Data gathered from watching potential targets will help the terrorist group refine the list of choices. A potential target may be de-selected because surveillance data proves the choice to be too difficult to effectively attack. Target Selection: Once surveillance data results are assessed, terrorists are able to select their target or set of targets. The most likely targets are those that are vulnerable, undefended or with weak security. Target Selection: Once surveillance data results are assessed, terrorists are able to select their target or set of targets. The most likely targets are those that are vulnerable, undefended or with weak security.
15
ATTACK PREPARATIONS Detailed Surveillance: Terrorists often conduct further long-term, detailed surveillance of the chosen potential target(s), seeking to detect routines, procedures and site-specific security measures. Detailed Surveillance: Terrorists often conduct further long-term, detailed surveillance of the chosen potential target(s), seeking to detect routines, procedures and site-specific security measures. Training and preparation: Once the terrorists’ plan of attack has been developed, the attack team will be chosen and trained. Training and preparation: Once the terrorists’ plan of attack has been developed, the attack team will be chosen and trained. Attack: Terrorists wait for the right set of circumstances to attack, which can take months or even years. Attack: Terrorists wait for the right set of circumstances to attack, which can take months or even years.
16
Terrorists Tactics Common Terrorists Tactics Common Terrorists Tactics Assassination Assassination Arson Arson Bombing Bombing Hostage Taking Hostage Taking Kidnapping Kidnapping Hijacking or Skyjacking Hijacking or Skyjacking Seizure Seizure Raids or Attacks On Facilities Raids or Attacks On Facilities Sabotage Sabotage Weapons of Mass Destruction (WMD) Weapons of Mass Destruction (WMD) Information Warfare (IW) Information Warfare (IW)
17
Tasking The Intelligence Community DOD Intelligence Centers Navy Intelligence Assets Regional Intelligence Centers Unit National Intelligence Community Intelligence Products Priority Intelligence Requirements/Reques ts For Information
18
National CT/CI Centers Director of Central Intelligence, Counterterrorism Center (CTC) Director of Central Intelligence, Counterterrorism Center (CTC) Lead center in U.S. to fight against terrorism Lead center in U.S. to fight against terrorism Interagency Intelligence Committee on Terrorism (IICT) Interagency Intelligence Committee on Terrorism (IICT) Forum for coordination and cooperation on CT issues Forum for coordination and cooperation on CT issues Bureau of Intelligence and Research (INR) Bureau of Intelligence and Research (INR) Primarily serve U.S. diplomatic corps; ensure intelligence activities are consistent with U.S. foreign policy Primarily serve U.S. diplomatic corps; ensure intelligence activities are consistent with U.S. foreign policy Federal Bureau of Investigation (FBI) Federal Bureau of Investigation (FBI) Responsible for detecting and counteracting foreign intelligence activities that affects U.S. national security Responsible for detecting and counteracting foreign intelligence activities that affects U.S. national security
19
DOD CT/CI Centers Defense Intelligence Agency (DIA) Office of Counterterrorism, Threat Warning Center (TWC) Defense Intelligence Agency (DIA) Office of Counterterrorism, Threat Warning Center (TWC) TWC is the coordinating office for DIA on terrorism TWC is the coordinating office for DIA on terrorism
20
Command and Regional CT/CI Centers Joint Forces Intelligence Command (JFIC) – Located in Norfolk, VA Joint Forces Intelligence Command (JFIC) – Located in Norfolk, VA Joint Analysis Center USEUCOM (JAC) – Located in Molesworth, UK Joint Analysis Center USEUCOM (JAC) – Located in Molesworth, UK Joint Intelligence Operations Center USCENTCOM (JIOCCENT) – Located in Tampa, Florida Joint Intelligence Operations Center USCENTCOM (JIOCCENT) – Located in Tampa, Florida Joint Intelligence Operations Center USPACOM (JIOCPAC) – Located in Pearl Harbor, Hawaii Joint Intelligence Operations Center USPACOM (JIOCPAC) – Located in Pearl Harbor, Hawaii
21
Service Sponsored CT/CI Centers Naval Criminal Investigation Service (NCIS) – has primary investigative and counterintelligence jurisdiction for the Navy Naval Criminal Investigation Service (NCIS) – has primary investigative and counterintelligence jurisdiction for the Navy NCIS has an AT/FP program that collects and analyzes information about possible threats and advises commanders on how to best defend against them NCIS has an AT/FP program that collects and analyzes information about possible threats and advises commanders on how to best defend against them Navy Antiterrorist Alert Center (ATAC) – is the centerpiece for of the Navy’s efforts to counter terrorist threats, located in Washington D.C. Navy Antiterrorist Alert Center (ATAC) – is the centerpiece for of the Navy’s efforts to counter terrorist threats, located in Washington D.C. Army Counterintelligence Center (ACIC) – provides timely, accurate, and effective counterintelligence and terrorism analysis support to the Army Army Counterintelligence Center (ACIC) – provides timely, accurate, and effective counterintelligence and terrorism analysis support to the Army Air Force Office of Special Investigation (AFOSI) – counters the threat to Air Force security posed by hostile intelligence services and terrorist groups Air Force Office of Special Investigation (AFOSI) – counters the threat to Air Force security posed by hostile intelligence services and terrorist groups
22
BLUE DART There is a need to inform threatened units in a timely manner There is a need to inform threatened units in a timely manner BLUE DART messaged are disseminated when intelligence indicates that a specific, imminent, and credible terrorists threat exists BLUE DART messaged are disseminated when intelligence indicates that a specific, imminent, and credible terrorists threat exists Require acknowledgment by immediate message by all action addressees, acknowledged by immediate precedence
23
Consequence Management Phase One – Impacts and Consequences: Potential impacts and consequences of an incident focusing on worst case scenarios for a particular facility or unit Phase One – Impacts and Consequences: Potential impacts and consequences of an incident focusing on worst case scenarios for a particular facility or unit Example = Multi-level building with severe damage or collapse, trapped personnel Example = Multi-level building with severe damage or collapse, trapped personnel Phase two – Resources Required: Resources required to respond to consequence and impacts of Phase One; where requirements exceed resources, mitigating actions are taken Phase two – Resources Required: Resources required to respond to consequence and impacts of Phase One; where requirements exceed resources, mitigating actions are taken Example = Resources needed to rescue trapped personnel in collapsed building; using non-DOD assets Example = Resources needed to rescue trapped personnel in collapsed building; using non-DOD assets Phase Three – Training and Exercise: Once a consequence management plan has been developed, personnel must be trained and the plan must be practiced Phase Three – Training and Exercise: Once a consequence management plan has been developed, personnel must be trained and the plan must be practiced
24
Navy AT/FP Program The Navy AT/FP program: The Navy AT/FP program: Purpose is to ensure Navy forces remain mission capable at all times Purpose is to ensure Navy forces remain mission capable at all times Focuses on preventing terrorist attacks on Navy assets and personnel through education and training Focuses on preventing terrorist attacks on Navy assets and personnel through education and training Combating terrorism is the responsibility of every individual in the Navy Combating terrorism is the responsibility of every individual in the Navy
25
Questions? This briefed was prepared with information derived from: NWP 3-07.2 This briefed was prepared with information derived from: NWP 3-07.2
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.