antiterrorism / force protection nwp 3-07.2
DESCRIPTION
HM1 OWENS. Antiterrorism / Force Protection NWP 3-07.2. This briefing is UNCLASSIFIED. Overview of Training. Definition of Terrorism Force Protection Defense Conditions Terrorism Threat Levels Phases of Terrorism Terrorists Tactics CT/CI Centers Navy AT/FP Program. Definition. - PowerPoint PPT PresentationTRANSCRIPT
Briefer’s Name
Date
This briefing is This briefing is UNCLASSIFIEDUNCLASSIFIED
Antiterrorism / Antiterrorism / Force ProtectionForce Protection NWP 3-07.2NWP 3-07.2
HM1 OWENSHM1 OWENS
Overview of TrainingOverview of Training
Definition of TerrorismDefinition of Terrorism Force ProtectionForce Protection Defense ConditionsDefense Conditions Terrorism Threat LevelsTerrorism Threat Levels Phases of TerrorismPhases of Terrorism Terrorists TacticsTerrorists Tactics CT/CI CentersCT/CI Centers Navy AT/FP Program Navy AT/FP Program
DefinitionDefinition
Department of Defense Definition of “Terrorism” Department of Defense Definition of “Terrorism” Calculated use of violence or threat of violence to instill fearCalculated use of violence or threat of violence to instill fear; ;
intended to coerce or to intimidate governments or societies in intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or the pursuit of goals that are generally political, religious, or ideological.ideological.
Combating Terrorism involves actions including:Combating Terrorism involves actions including:Antiterrorism– Antiterrorism– defensive measuresdefensive measuresCounterterrorism– Counterterrorism– offensive measuresoffensive measures
PURPOSEPURPOSE
Establish and maintain unit ATFP Establish and maintain unit ATFP programs that programs that deter, detect, defend, deter, detect, defend, mitigate and recover from the mitigate and recover from the consequencesconsequences of terrorist attacks via of terrorist attacks via implementation of coherent baseline implementation of coherent baseline security measures.security measures.
Defeat an attack by the activation of Defeat an attack by the activation of preplanned responses.preplanned responses.
Take required action to manage a crisis Take required action to manage a crisis and maintain/regain mission readiness.and maintain/regain mission readiness.
FORCE PROTECTION DEFINITIONFORCE PROTECTION DEFINITION
Security program designed to Security program designed to protect Service protect Service member, civilian employees, family members, member, civilian employees, family members, facilities, and equipment, in all locationsfacilities, and equipment, in all locations and and situation situation accomplishedaccomplished through through planned and planned and integrated application of combating terrorism, integrated application of combating terrorism, physical security, operations security, personal physical security, operations security, personal protective service, and supported by protective service, and supported by intelligence, counterintelligence, and other intelligence, counterintelligence, and other security programs.security programs.
Types of Monitoring Conditions/LevelsTypes of Monitoring Conditions/Levels
Type of Condition/
Level
What is being measure/determined
Controlling Authority
Range/Scale
FPCON
Indicates level of proactive measures to safeguard commands in a geographic area
Local area Commander
D,C,B,A,Normal
Terrorism Threat Level
Level of Terrorist threat within a given
country theater
CINC/DIA for global threat
High, Signicant, Moderate, Low
DEFCONUS Forces Alert
Posture
NCA/JCS in conjunction with CINCs
1,2,3,4,5
Terrorist Threat LevelTerrorist Threat Level
LowLowNo terrorist group is detected or the group activity is non-threatening No terrorist group is detected or the group activity is non-threatening
ModerateModerateTerrorists are present but there are no indications of anti-US activityTerrorists are present but there are no indications of anti-US activity
SignificantSignificantAnti-US terrorists are present and attack personnel as their preferred Anti-US terrorists are present and attack personnel as their preferred method of operation, or a group uses large casualty producing attacks as method of operation, or a group uses large casualty producing attacks as its preferred method but has limited operational activity its preferred method but has limited operational activity
HighHighAnti-US terrorists are operationally active and use large casualty producing Anti-US terrorists are operationally active and use large casualty producing attacks as their preferred method of operationattacks as their preferred method of operation
Force Protection Conditions (FPCON)Force Protection Conditions (FPCON)
FPCON ALPHA FPCON ALPHA – – when there is a general threat of possible terrorist when there is a general threat of possible terrorist activity against personnel and facilities and the nature and extent of activity against personnel and facilities and the nature and extent of which are unpredictable which are unpredictable
FPCON BRAVO FPCON BRAVO – when an increased and more predictable threat of – when an increased and more predictable threat of terrorist activity exists. This measure must be capable of being terrorist activity exists. This measure must be capable of being maintained for weeks without causing undue hardship, affecting maintained for weeks without causing undue hardship, affecting operational capability, and aggravating relations with local operational capability, and aggravating relations with local authoritiesauthorities
FPCON CHARLIE FPCON CHARLIE – – when an incident occurs or intelligence is when an incident occurs or intelligence is received indicating some form of terrorist action against personnel received indicating some form of terrorist action against personnel and facilities is imminentand facilities is imminent
FPCON DELTA FPCON DELTA – – applies in the immediate area where a terrorist applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that attack has occurred or when intelligence has been received that terrorist action against a specific location or person is likely. terrorist action against a specific location or person is likely.
Defense Condition (DEFCON)Defense Condition (DEFCON) DEFCON 5DEFCON 5
Normal peacetime situation existsNormal peacetime situation exists
DEFCON 4DEFCON 4 Tensions exist which require greater military vigilance Tensions exist which require greater military vigilance
DEFCON 3DEFCON 3 Tensions exist which may have serious and adverse effects on U.S. Tensions exist which may have serious and adverse effects on U.S. interests interests
DEFCON 2DEFCON 2Situations exist which are directly susceptible to foreign exploitation by Situations exist which are directly susceptible to foreign exploitation by hostile action or other situations exist which are susceptible to hostile hostile action or other situations exist which are susceptible to hostile exploitation, either which could seriously threaten US forces overseas, US exploitation, either which could seriously threaten US forces overseas, US allies, or areas vital to US national interests.allies, or areas vital to US national interests.
DEFCON 1DEFCON 1International relations have deteriorated to such a degree that measures International relations have deteriorated to such a degree that measures must be taken to achieve maximum readiness. Significant strategic and/or must be taken to achieve maximum readiness. Significant strategic and/or tactical indications of hostilities exist against US forces overseas, US allies, tactical indications of hostilities exist against US forces overseas, US allies, or the US or its possessions. War is imminent. or the US or its possessions. War is imminent.
TERRORISTTERRORIST
IDEAOLOGYIDEAOLOGY
PoliticsPoliticsNationalismNationalismReligionReligionSpecial InterestSpecial Interest
GOALSGOALS
RecognitionRecognitionElimination of Western Elimination of Western
InfluenceInfluenceHarassment, Harassment,
Weakening or Weakening or embarrassment of embarrassment of governments.governments.
Attainment of money Attainment of money or equipmentor equipment
Destruction of facilities Destruction of facilities and disruption of and disruption of communicationscommunications
Satisfying vengeanceSatisfying vengeance
TERRORIST CHARACTERISTICSTERRORIST CHARACTERISTICS
Urban-Based: Urban-Based: An urban environment offers An urban environment offers access to transportation, money-laundering access to transportation, money-laundering mechanisms, communications systems and mechanisms, communications systems and international contacts who can provide required international contacts who can provide required travel documentation.travel documentation.
Highly mobile: Highly mobile: Terrorists typically move Terrorists typically move frequently among cities and countries, not only frequently among cities and countries, not only to facilitate the planning and execution of to facilitate the planning and execution of operations, but also in search of safe havens operations, but also in search of safe havens and like-minded supportand like-minded support
TERRORIST CHARACTERISTICSTERRORIST CHARACTERISTICS
Well-Trained: Well-Trained: In order to instill individual In order to instill individual members with a strong desire for success, members with a strong desire for success, including a willingness to die for the cause, including a willingness to die for the cause, terrorist groups train and rehearse extensively. terrorist groups train and rehearse extensively. Emphasis is on physical conditioning, effective Emphasis is on physical conditioning, effective use of weapons and explosives, tactics and use of weapons and explosives, tactics and combat techniques, clandestine operations, combat techniques, clandestine operations, psychological warfare and survival skills.psychological warfare and survival skills.
Covert: Covert: Although some groups have overt Although some groups have overt political contingents, the operational cells of political contingents, the operational cells of most terrorist groups can operate in covert most terrorist groups can operate in covert postures for extended periods.postures for extended periods.
Phases of TerrorismPhases of Terrorism
Terrorism six-step process Terrorism six-step process
Phase One Phase One - - Target OptionsTarget OptionsPhase Two Phase Two - - Selection SurveillanceSelection SurveillancePhase Three Phase Three - - Target SelectionTarget SelectionPhase Four Phase Four - - Detailed SurveillanceDetailed SurveillancePhase Five Phase Five - - Training and PreparationTraining and PreparationPhase Six Phase Six - - The AttackThe Attack
ATTACK PREPARATIONSATTACK PREPARATIONS
Target Options: Target Options: Choosing a target typically starts with a Choosing a target typically starts with a self-assessment of the terrorist group’s capabilities, self-assessment of the terrorist group’s capabilities, which will, in large part, define the methods of attack which will, in large part, define the methods of attack available to the group. available to the group.
Selection SurveillanceSelection Surveillance: Data gathered from watching : Data gathered from watching potential targets will help the terrorist group refine the potential targets will help the terrorist group refine the list of choices. A potential target may be de-selected list of choices. A potential target may be de-selected because surveillance data proves the choice to be too because surveillance data proves the choice to be too difficult to effectively attack.difficult to effectively attack.
Target SelectionTarget Selection: Once surveillance data results are : Once surveillance data results are assessed, terrorists are able to select their target or set assessed, terrorists are able to select their target or set of targets. The most likely targets are those that are of targets. The most likely targets are those that are vulnerable, undefended or with weak security.vulnerable, undefended or with weak security.
ATTACK PREPARATIONSATTACK PREPARATIONS
Detailed Surveillance: Detailed Surveillance: Terrorists often conduct Terrorists often conduct further long-term, detailed surveillance of the further long-term, detailed surveillance of the chosen potential target(s), seeking to detect chosen potential target(s), seeking to detect routines, procedures and site-specific security routines, procedures and site-specific security measures.measures.
Training and preparation: Training and preparation: Once the terrorists’ Once the terrorists’ plan of attack has been developed, the attack plan of attack has been developed, the attack team will be chosen and trained.team will be chosen and trained.
Attack: Attack: Terrorists wait for the right set of Terrorists wait for the right set of circumstances to attack, which can take months circumstances to attack, which can take months or even years.or even years.
Terrorists TacticsTerrorists Tactics
Common Terrorists TacticsCommon Terrorists TacticsAssassinationAssassinationArsonArsonBombingBombingHostage TakingHostage TakingKidnappingKidnappingHijacking or SkyjackingHijacking or SkyjackingSeizureSeizureRaids or Attacks On FacilitiesRaids or Attacks On FacilitiesSabotageSabotageWeapons of Mass Destruction (WMD)Weapons of Mass Destruction (WMD)Information Warfare (IW)Information Warfare (IW)
Tasking The Intelligence CommunityTasking The Intelligence Community
DOD Intelligence Centers
Navy Intelligence Assets
Regional Intelligence
Centers
Unit
National Intelligence Community
Intelligence Products
Priority Intelligence Requirements/Reques
ts For Information
National CT/CI CentersNational CT/CI Centers
Director of Central Intelligence, Counterterrorism Center Director of Central Intelligence, Counterterrorism Center (CTC)(CTC)Lead center in U.S. to fight against terrorism Lead center in U.S. to fight against terrorism
Interagency Intelligence Committee on Terrorism (IICT)Interagency Intelligence Committee on Terrorism (IICT)Forum for coordination and cooperation on CT issuesForum for coordination and cooperation on CT issues
Bureau of Intelligence and Research (INR)Bureau of Intelligence and Research (INR)Primarily serve U.S. diplomatic corps; ensure intelligence Primarily serve U.S. diplomatic corps; ensure intelligence
activities are consistent with U.S. foreign policyactivities are consistent with U.S. foreign policy Federal Bureau of Investigation (FBI) Federal Bureau of Investigation (FBI)
Responsible for detecting and counteracting foreign Responsible for detecting and counteracting foreign intelligence activities that affects U.S. national security intelligence activities that affects U.S. national security
DOD CT/CI CentersDOD CT/CI Centers
Defense Intelligence Agency (DIA) Office of Counterterrorism, Defense Intelligence Agency (DIA) Office of Counterterrorism, Threat Warning Center (TWC) Threat Warning Center (TWC) TWC is the coordinating office for DIA on terrorismTWC is the coordinating office for DIA on terrorism
Service Sponsored CT/CI Centers Service Sponsored CT/CI Centers
Naval Criminal Investigation Service (NCIS) – has primary Naval Criminal Investigation Service (NCIS) – has primary investigative and counterintelligence jurisdiction for the Navyinvestigative and counterintelligence jurisdiction for the NavyNCIS has an AT/FP program that collects and analyzes NCIS has an AT/FP program that collects and analyzes
information about possible threats and advises commanders on information about possible threats and advises commanders on how to best defend against them how to best defend against them
Navy Antiterrorist Alert Center (ATAC) – is the centerpiece for of the Navy Antiterrorist Alert Center (ATAC) – is the centerpiece for of the Navy’s efforts to counter terrorist threats, located in Washington Navy’s efforts to counter terrorist threats, located in Washington D.C. D.C.
Army Counterintelligence Center (ACIC) – provides timely, accurate, Army Counterintelligence Center (ACIC) – provides timely, accurate, and effective counterintelligence and terrorism analysis support to and effective counterintelligence and terrorism analysis support to the Armythe Army
Air Force Office of Special Investigation (AFOSI) – counters the Air Force Office of Special Investigation (AFOSI) – counters the threat to Air Force security posed by hostile intelligence services threat to Air Force security posed by hostile intelligence services and terrorist groups and terrorist groups
BLUE DARTBLUE DART
There is a need to inform threatened units There is a need to inform threatened units in a timely manner in a timely manner BLUE DART messaged are disseminated BLUE DART messaged are disseminated
when intelligence indicates that a when intelligence indicates that a specific, imminent, and credible terrorists specific, imminent, and credible terrorists threat existsthreat exists Require acknowledgment by immediate Require acknowledgment by immediate
message by all action addressees, message by all action addressees, acknowledged by immediate acknowledged by immediate precedence precedence
Consequence Management Consequence Management
Phase One Phase One – Impacts and Consequences: Potential impacts – Impacts and Consequences: Potential impacts and consequences of an incident focusing on worst case and consequences of an incident focusing on worst case scenarios for a particular facility or unitscenarios for a particular facility or unitExample = Multi-level building with severe damage or Example = Multi-level building with severe damage or
collapse, trapped personnel collapse, trapped personnel Phase two Phase two – Resources Required: Resources required to – Resources Required: Resources required to
respond to consequence and impacts of Phase One; where respond to consequence and impacts of Phase One; where requirements exceed resources, mitigating actions are takenrequirements exceed resources, mitigating actions are takenExample = Resources needed to rescue trapped personnel Example = Resources needed to rescue trapped personnel
in collapsed building; using non-DOD assetsin collapsed building; using non-DOD assets Phase Three Phase Three – Training and Exercise: Once a consequence – Training and Exercise: Once a consequence
management plan has been developed, personnel must be management plan has been developed, personnel must be trained and the plan must be practiced trained and the plan must be practiced
Navy AT/FP ProgramNavy AT/FP Program
The Navy AT/FP program:The Navy AT/FP program:Purpose is to ensure Navy forces remain mission capable Purpose is to ensure Navy forces remain mission capable
at all timesat all timesFocuses on preventing terrorist attacks on Navy assets and Focuses on preventing terrorist attacks on Navy assets and
personnel through education and trainingpersonnel through education and trainingCombating terrorism is the responsibility of every Combating terrorism is the responsibility of every
individual in the Navyindividual in the Navy
Questions?Questions?
This briefed was prepared with information derived from: This briefed was prepared with information derived from: NWP 3-07.2NWP 3-07.2