Download presentation
Presentation is loading. Please wait.
Published byHomer Sparks Modified over 9 years ago
1
Briefer’s Name Date This briefing is UNCLASSIFIED Antiterrorism / Force Protection NWP 3-07.2
2
Overview Definition of Terrorism Definition of Terrorism Force Protection Force Protection Defense Conditions Defense Conditions Terrorism Threat Levels Terrorism Threat Levels Phases of Terrorism Phases of Terrorism Terrorists Tactics Terrorists Tactics CT/CI Centers CT/CI Centers Navy AT/FP Program Navy AT/FP Program
3
Definition Department of Defense Definition of “Terrorism” Department of Defense Definition of “Terrorism” The calculated use of violence or threat of violence to instill fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological. The calculated use of violence or threat of violence to instill fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological. Combating Terrorism involves actions including: Combating Terrorism involves actions including: Antiterrorism– defensive measures Antiterrorism– defensive measures Counterterrorism– offensive measures Counterterrorism– offensive measures
4
Types of Monitoring Conditions/Levels Type of Condition/ Level What is being measure/determined Controlling AuthorityRange/Scale FPCON Indicates level of proactive measures to safeguard commands in a geographic area Local area Commander D,C,B,A,Normal Terrorism Threat Level Level of Terrorist threat within a given country theater CINC/DIA for global threat High, Signicant, Moderate, Low DEFCONUS Forces Alert Posture NCA/JCS in conjunction with CINCs 1,2,3,4,5
5
Force Protection Conditions (FPCON) FPCON ALPHA – when there is a general threat of possible terrorist activity against personnel and facilities and the nature and extent of which are unpredictable FPCON ALPHA – when there is a general threat of possible terrorist activity against personnel and facilities and the nature and extent of which are unpredictable FPCON BRAVO – when an increased and more predictable threat of terrorist activity exists. This measure must be capable of being maintained for weeks without causing undue hardship, affecting operational capability, and aggravating relations with local authorities FPCON BRAVO – when an increased and more predictable threat of terrorist activity exists. This measure must be capable of being maintained for weeks without causing undue hardship, affecting operational capability, and aggravating relations with local authorities FPCON CHARLIE – when an incident occurs or intelligence is received indicating some form of terrorist action against personnel and facilities is imminent FPCON CHARLIE – when an incident occurs or intelligence is received indicating some form of terrorist action against personnel and facilities is imminent FPCON DELTA – applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific location or person is likely. FPCON DELTA – applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific location or person is likely.
6
Terrorist Threat Level Low Low No terrorist group is detected or the group activity is non-threatening Moderate Moderate Terrorists are present but there are no indications of anti-US activity Significant Significant Anti-US terrorists are present and attack personnel as their preferred method of operation, or a group uses large casualty producing attacks as its preferred method but has limited operational activity High High Anti-US terrorists are operationally active and use large casualty producing attacks as their preferred method of operation
7
Defense Condition (DEFCON) DEFCON 5 DEFCON 5 Normal peacetime situation exists Normal peacetime situation exists DEFCON 4 DEFCON 4 Tensions exist which require greater military vigilance Tensions exist which require greater military vigilance DEFCON 3 DEFCON 3 Tensions exist which may have serious and adverse effects on U.S. interests Tensions exist which may have serious and adverse effects on U.S. interests DEFCON 2 DEFCON 2 Situations exist which are directly susceptible to foreign exploitation by hostile action or other situations exist which are susceptible to hostile exploitation, either which could seriously threaten US forces overseas, US allies, or areas vital to US national interests. DEFCON 1 DEFCON 1 International relations have deteriorated to such a degree that measures must be taken to achieve maximum readiness. Significant strategic and/or tactical indications of hostilities exist against US forces overseas, US allies, or the US or its possessions. War is imminent.
8
Phases of Terrorism Terrorism six-step process Terrorism six-step process Phase One - Target Options Phase One - Target Options Phase Two - Selection Surveillance Phase Two - Selection Surveillance Phase Three - Target Selection Phase Three - Target Selection Phase Four - Detailed Surveillance Phase Four - Detailed Surveillance Phase Five - Training and Preparation Phase Five - Training and Preparation Phase Six - The Attack Phase Six - The Attack
9
Terrorists Tactics Common Terrorists Tactics Common Terrorists Tactics Assassination Assassination Arson Arson Bombing Bombing Hostage Taking Hostage Taking Kidnapping Kidnapping Hijacking or Skyjacking Hijacking or Skyjacking Seizure Seizure Raids or Attacks On Facilities Raids or Attacks On Facilities Sabotage Sabotage Weapons of Mass Destruction (WMD) Weapons of Mass Destruction (WMD) Information Warfare (IW) Information Warfare (IW)
10
Tasking The Intelligence Community DOD Intelligence Centers Navy Intelligence Assets Regional Intelligence Centers Unit National Intelligence Community Intelligence Products Priority Intelligence Requirements/Reques ts For Information
11
National CT/CI Centers Director of Central Intelligence, Counterterrorism Center (CTC) Director of Central Intelligence, Counterterrorism Center (CTC) Lead center in U.S. to fight against terrorism Lead center in U.S. to fight against terrorism Interagency Intelligence Committee on Terrorism (IICT) Interagency Intelligence Committee on Terrorism (IICT) Forum for coordination and cooperation on CT issues Forum for coordination and cooperation on CT issues Bureau of Intelligence and Research (INR) Bureau of Intelligence and Research (INR) Primarily serve U.S. diplomatic corps; ensure intelligence activities are consistent with U.S. foreign policy Primarily serve U.S. diplomatic corps; ensure intelligence activities are consistent with U.S. foreign policy Federal Bureau of Investigation (FBI) Federal Bureau of Investigation (FBI) Responsible for detecting and counteracting foreign intelligence activities that affects U.S. national security Responsible for detecting and counteracting foreign intelligence activities that affects U.S. national security
12
DOD CT/CI Centers Defense Intelligence Agency (DIA) Office of Counterterrorism, Threat Warning Center (TWC) Defense Intelligence Agency (DIA) Office of Counterterrorism, Threat Warning Center (TWC) TWC is the coordinating office for DIA on terrorism TWC is the coordinating office for DIA on terrorism
13
Command and Regional CT/CI Centers Joint Forces Intelligence Command (JFIC) – Located in Norfolk, VA Joint Forces Intelligence Command (JFIC) – Located in Norfolk, VA Joint Analysis Center USEUCOM (JAC) – Located in Molesworth, UK Joint Analysis Center USEUCOM (JAC) – Located in Molesworth, UK Joint Intelligence Operations Center USCENTCOM (JIOCCENT) – Located in Tampa, Florida Joint Intelligence Operations Center USCENTCOM (JIOCCENT) – Located in Tampa, Florida Joint Intelligence Operations Center USPACOM (JIOCPAC) – Located in Pearl Harbor, Hawaii Joint Intelligence Operations Center USPACOM (JIOCPAC) – Located in Pearl Harbor, Hawaii
14
Service Sponsored CT/CI Centers Naval Criminal Investigation Service (NCIS) – has primary investigative and counterintelligence jurisdiction for the Navy Naval Criminal Investigation Service (NCIS) – has primary investigative and counterintelligence jurisdiction for the Navy NCIS has an AT/FP program that collects and analyzes information about possible threats and advises commanders on how to best defend against them NCIS has an AT/FP program that collects and analyzes information about possible threats and advises commanders on how to best defend against them Navy Antiterrorist Alert Center (ATAC) – is the centerpiece for of the Navy’s efforts to counter terrorist threats, located in Washington D.C. Navy Antiterrorist Alert Center (ATAC) – is the centerpiece for of the Navy’s efforts to counter terrorist threats, located in Washington D.C. Army Counterintelligence Center (ACIC) – provides timely, accurate, and effective counterintelligence and terrorism analysis support to the Army Army Counterintelligence Center (ACIC) – provides timely, accurate, and effective counterintelligence and terrorism analysis support to the Army Air Force Office of Special Investigation (AFOSI) – counters the threat to Air Force security posed by hostile intelligence services and terrorist groups Air Force Office of Special Investigation (AFOSI) – counters the threat to Air Force security posed by hostile intelligence services and terrorist groups
15
CT/CI Organizations Command and Regional Centers Service Centers National Counterterrorism Center / IICT Federal Bureau of Investigation Bureau of Intelligence Research Defense Intelligence Agency JIOCCENT JIOCPAC JFIC JAC ACIC NCIS AFOSI
16
BLUE DART There is a need to inform threatened units in a timely manner There is a need to inform threatened units in a timely manner BLUE DART messaged are disseminated when intelligence indicates that a specific, imminent, and credible terrorists threat exists BLUE DART messaged are disseminated when intelligence indicates that a specific, imminent, and credible terrorists threat exists Require acknowledgment by immediate message by all action addressees, acknowledged by immediate precedence
17
Consequence Management Phase One – Impacts and Consequences: Potential impacts and consequences of an incident focusing on worst case scenarios for a particular facility or unit Phase One – Impacts and Consequences: Potential impacts and consequences of an incident focusing on worst case scenarios for a particular facility or unit Example = Multi-level building with severe damage or collapse, trapped personnel Example = Multi-level building with severe damage or collapse, trapped personnel Phase two – Resources Required: Resources required to respond to consequence and impacts of Phase One; where requirements exceed resources, mitigating actions are taken Phase two – Resources Required: Resources required to respond to consequence and impacts of Phase One; where requirements exceed resources, mitigating actions are taken Example = Resources needed to rescue trapped personnel in collapsed building; using non-DOD assets Example = Resources needed to rescue trapped personnel in collapsed building; using non-DOD assets Phase Three – Training and Exercise: Once a consequence management plan has been developed, personnel must be trained and the plan must be practiced Phase Three – Training and Exercise: Once a consequence management plan has been developed, personnel must be trained and the plan must be practiced
18
Navy AT/FP Program The Navy AT/FP program: The Navy AT/FP program: Purpose is to ensure Navy forces remain mission capable at all times Purpose is to ensure Navy forces remain mission capable at all times Focuses on preventing terrorist attacks on Navy assets and personnel through education and training Focuses on preventing terrorist attacks on Navy assets and personnel through education and training Combating terrorism is the responsibility of every individual in the Navy Combating terrorism is the responsibility of every individual in the Navy
19
Questions? This briefed was prepared with information derived from: NWP 3-07.2 This briefed was prepared with information derived from: NWP 3-07.2
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.