Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
91 Cards in this Set
- Front
- Back
Terrorist ____ vary in sophistication according to the level of training the individual or group has received
|
tactics
|
|
Under Terrorist Force Protection Conditions, please name the Force Protection condition- Declared when a general threat of possible terrorist activity is directed toward installation, vessels or personnel, the nature of which are unpredictable and where circumstances do not justify full implementation of FP condition BRAVO
|
ALPHA
|
|
Under terrorist attack methodology- (please enter what phase is discussed in the statement) Once a terrorist or terrorist group decides to conduct an attack they begin the process of target selection.
|
The following answers are acceptable:
• Target Operations • Phase One- Target Operations |
|
Under Terrorist Levels- Terrorist groups are present but there is no indication of anti-U.S. activty. The operating environment favors the host nation. What level is described?
|
Moderate
|
|
Under Terrorist Levels - No terrorist group is detected or the group activity is nonthreatening. What level is described?
|
Low
|
|
This type of terrorist activity involves a building or object that has value in the eyes of the audience.
• [A] hostage taking • [B] seizure • [C] raids • [D] kidnapping |
[B] seizure
|
|
A ___ group's selection of targets and tactics is often a function of the group's affiliation, level of training, organization, sophistication and opportunity
|
terrorists
|
|
A critical factor in understanding terrorism is the ______ impact of the terrorist act on an audience other than the victim
|
emotion
|
|
This type of terrorist activity is sometimes employed as a means of escape, is normally carried out to produce a spectacular hostage situation.
|
hijacking
|
|
This type of activities on facilities are usually undertaken for one of three purposes: to gain access to radion or television broadcast capabilities in order to make a statement; to demonstrate the government's inability to secure critical facilities or national symbols; or to acquire resources.
|
The following answers are acceptable:
• Raids • Attacks |
|
Under Terrorist Levels -An anti-U.S. terrorist group is operationally active and uses large casualty producing attacks as their preferred method of operation. There is substantial DOD presence and the operation environment favors the terrorist. What level is decribed?
|
High
|
|
This" is the crime of maliciously setting fire to a building or the property of another person.
• [A] Bombing • [B] Arson • [C] raids • [D] weapons of mass destruction |
• [B] Arson (correct answer)
|
|
Under Terrorist Force Protection Conditions, please name the Force Protection condition- Declared when a terroist attack has occured in the immediate area or intelligence indicates a terrorist action against a specific location or person is likely. Declared only as a localized warning
|
DELTA
|
|
Under terrorist attack methodology- Once a terrorist or terrorist group decides to conduct an attack they begin the process of target selection.
|
The following answers are acceptable:
• Target Operations • Phase One- Target Operations |
|
Under terrorist attack methodology- Detailed and often long term, surveillance is then conducted against the chosen potential target(s)
|
The following answers are acceptable:
• Detailed Surveillance • Phase Four- Detailed Surveillance |
|
This terrorist activity is usually a covert seizure of one or more specific persons in order to exact specific demands (1 pt)
• [A] Hostage • [B] Hijacking • [C] skyjacking • [D] kidnapping |
• [D] kidnapping
|
|
Terrorist threat levels do not address when a ____ attack will occur and do not specify a Force Protection condition status.
|
terrorist
|
|
This type of terrorist activity is an overt seizure of one or more indivduals with the intent of gaining publicity or other concessions in return for release of the hostages. (1 pt)
• [A] Hostage taking • [B] Hijacking • [C] Skyjacking • [D] Seizure |
• [A] Hostage taking
|
|
Under terrorist attack methodology- The attack plan will be developed, the attack team assembled and trained and logistics preparation made. What method is discussed?
|
The following answers are acceptable:
• Traing and Preparation • Phase five - Training and Preparation |
|
Under Terrorist Force Protection Conditions, please name the Force Protection condition- Applies when a general threat of possible terrorist activy exists but warrants only a routine secuirity posture.
|
NORMAL
|
|
What is a BLUE DART message?
|
Time sesnitive incident notification message. iniciated by Navy antiterrorist alert center
|
|
What does ATAC stand for?
|
Navy antiterrorist alert center
|
|
Who is a member of a political party who rebels against established leadership?
|
insurgent
|
|
Who is required to take Level 1 Antiterrorism training?
|
all DOD personnel, DOD employed contractors, and dependents age 14 and above
|
|
What does RAM stand for?
|
Random antiterrorism measures
|
|
What does SOFA stand for?
|
Status of Forces Agreement
|
|
what is the new name for THREATCON?
|
Terrorist force protection condition
|
|
What does FAST stand for?
|
Fleet antiterrorism security team
|
|
What does SWDG stand for?
|
surface warfare development group
|
|
What is the Navy's goal of AT/FP program?
|
deter, deny, and defeat terrorism
|
|
What phase of target selection deals with final target selection?
|
Phase III: Target Selection
|
|
What phase of target selection populates possible targets for the terrorists to hit?
|
Phase I: Target Options
|
|
What phase of target selection is suseptible to countermeasures and detection by use of Random antiterrorism measures?
|
Phase IV: Detailed surveillance
|
|
What does SETL stand for?
|
security environment threat list
|
|
What are the terrorist threat levels?
|
1. Low
2. moderate 3. significant 4. high |
|
What is the first lines of defence in AT/FP?
|
Intelligence and counterintelligence
|
|
what are the phases in consiquence management planning?
|
Phase I: impacts and consequences
Phase II: resources required Phase III: training and exercise |
|
What Navy Doctrine is for Antiterrorism/Force Protection?
|
NWP 3-07.2
|
|
The calculated use of unlawful violence or threat of unlawful violence to inculate fear is ____.
|
Terrorism
|
|
To reduce the vulnerability of individuals and property, to include limited response and containment by local military and civilian forces is ___.
|
Antiterrorism
|
|
OFFENSIVE measures taken to prevent, deter, and respond to terrorism is ____.
|
Counterterrorism
|
|
Counterterrorism programs are addressed in where?
|
National Security Decision Directives, National Security Directives, contingency plans, and other classified documents.
|
|
A security program to protect SERVICE members, civilian employees, family members, facilities, and equipment is
|
Force Protection
|
|
____ involves projecting a VISIBLE ability to defeat a terrorist attack.
|
Deterrence
|
|
Combating terrorism is the responsibility of _____.
|
Every individual in the Navy
|
|
Long-range objectives of terrorism are ____.
|
Revolutionary, sub-revolutionary, establishment
|
|
Mechanisms used to label terrorist groups are ____.
|
State directed, state supported, non state supported
|
|
What is the basic operational unit of the terrorist group?
|
Cell
|
|
What are the three typical cells found in terrorist groups?
|
Operational cell, intelligence cell, auxiliary cell
|
|
T or F. Cells are kept separated during planning and rehearsals.
|
True
|
|
T or F. Multiple operations/targets usually are hit with individual teams knowledge?
|
False
|
|
T or F. Surveillance personnel will some time take part in attacks?
|
False
|
|
T or F. Terrorist attacks are targeted at the weak or undefenced to ensure high chances of success and publicity?
|
True
|
|
What is the most common and readily assembled device?
|
Pipe bombs
|
|
Besides assassination, arson, bombing, hostage taking, what are other types of terrorist attack?
|
Hijacking or skyjacking, seizure, raids or attacks on facilities, sabotage, weapons of mass destruction, information warfare.
|
|
USS Cole and Kobar Towers are examples of ____ attack?
|
Bombing
|
|
What are the six-step process encompassing target selection, training and preparation before an attack?
|
Target option, selection surveillance, target selection, detailed surveillance, training and preparation, the attack
|
|
Target selection is at phase ____?
|
3
|
|
Phase 2 is ____?
|
Selection surveillance
|
|
What is the first phase?
|
Target option
|
|
When there is a possible terrorist activity against personnel and installations, what FP condition should be applied?
|
FP condition Alpha
|
|
What are the actions of FP condition Alpha?
|
Secure buildings, increase security spot checks and limit access point.
|
|
When an increased and more PREDICTABLE threat of terrorist activity exists, FP Condition elevates to ___.
|
FP conditon Bravo
|
|
At FP condition Bravo all vehicles and objects have to move at least ____ meters from buildings.
|
2
|
|
What criteria sets FP condition Charlie?
|
An incident occurs or intelligence is received indicating terrorist action is imminent
|
|
What are actions of FP condition Charlie?
|
Minimum limit access points, randomly search vehicles, centralized parking of vehicles
|
|
What is the highest alert of FP condition?
|
FP condition Delta
|
|
T or F. FP condition Delta applies after a terrorist attack has occurred in the immediate area?
|
True
|
|
T or F. FP condition Delta applies when intelligence has been received that terrorist action against a specific location is likely?
|
True
|
|
Search all vehicles, all suitcases, positive identify all personnel, close public and military roads and facilities are actions of ____?
|
FP condition Delta
|
|
What manual is for combating terrorism?
|
DoD O 2000.12-H DOD Anti-Terrorism Handbook
|
|
Intelligence products are feed from where to where?
|
National Intelligence Community, DOD Intelligence Centers, Navy Intelligence Assets, Regional Intelligence Centers
|
|
The assimilation of data that has been gathered, but not fully correlated, analyzed or interpreted, is ___?
|
Information
|
|
Product resulting from the collection, exploitation, processing, integration, analysis, evaluation, and interpretation of available information, is ____?
|
Intelligence
|
|
Who provides intelligence products be used in the command's AT/FP plan?
|
Counterterrorism/Counterintelligence centers
|
|
Who is responsible for detecting and counteracting foreign intelligence activities gathering information that adversely affects U.S. NATIONAL security interests?
|
FBI
|
|
Who produces assessments of the actual or potential terrorist threat targeted against U.S.MILITARY interest throughout the world?
|
DIA
|
|
Who has primary investigative and conterintelligence jurisdiction within the Department of of the Navy?
|
NCIS
|
|
Who maintains a constant watch to analyze various information and intelligence for possible terrorist threats against NAVY and MARINE CORPS commands?
|
ATAC (Navy Antiterrorist Alert Center)
|
|
What is Navy's principal vehicle for disseminating terrorism warnings to Navy and Marine Corps commands?
|
ATAC spot message
|
|
What is raw intelligence, normally based on fragmentary information about fast breaking events and may contain substantial inaccuracies or uncertainties that must be resolved through subsequent report and analysis?
|
Blue Dart
|
|
Unit self defense or individual self defense is the inherent right to use all necessary means available and take all appropriate actions to defend ONESELF and U.S. forces in one's vicinity?
|
Individual self defense
|
|
What are elements of self defense?
|
Necessity and proportionality
|
|
In order to warrant the use of deadly force, a potential threat must possess: ____.
|
The apparent means, the imminent ability, the apparent intent to commit a hostile act
|
|
Antiterrorism Officer has responsibilities of: ___.
|
Creats and executes AT/FP programs, prepares AT/FP plans, manages AT/FP re-sources, conducts antiterrorism training
|
|
Consequence management planning is a ____ process.
|
3-step: impacts and consequences, resources required, training and exercising
|
|
What are the levels of AT training?
|
Level I-individual, Level II-Unit FPO/ATTO, Level III-PCO/XO leadership, Level IV-Senior executive
|
|
Level I individual personnel protection awarenes training includes ____.
|
Threat levels/FP conditions, IED, JS Guide 5260, IPM wallet card, local specific threat information
|
|
Level II unit antiterrorism officer training includes ____.
|
Terrorism, terrorist operations, terrorist surveillance, individual protective measures, hostage survival.
|
|
Level III commander anterrorism training includes ____.
|
O-5 and O-6, unit, squadron, group commanders, pre-command training
|
|
Level IV executive level commander training includes ____.
|
O6-O8, National Defense University
|