Force Protection - PowerPoint PPT Presentation

About This Presentation
Title:

Force Protection

Description:

Force Protection **Definition of terrorism the unlawful use or threatened use of force or violence against individuals or property to coerce, or intimidate ... – PowerPoint PPT presentation

Number of Views:324
Avg rating:3.0/5.0
Slides: 37
Provided by: Prefer583
Category:
Tags: force | protection

less

Transcript and Presenter's Notes

Title: Force Protection


1
Force Protection
2
(No Transcript)
3
(No Transcript)
4
(No Transcript)
5
(No Transcript)
6
Definition of terrorism
  • the unlawful use or threatened use of force or
    violence against individuals or property to
    coerce, or intimidate governments or societies,
    often to achieve political, religious, or
    ideological objectives.

7
(No Transcript)
8
(No Transcript)
9
Common Characteristics of Terrorist Groups
  • They seek to intimidate a population by promoting
    fear
  • They are militarily weak
  • They do not equate tactical success with mission
    success
  • They are usually urban based
  • They are highly mobile
  • They operate covertly

10
Short Range Goals of Terrorist Acts
  • Obtain Worldwide, National, or Local Recognition
    for Their Cause
  • Cause the Governments to Overreact
  • Harass, Weaken, or Embarrass Government Security
    Forces
  • Obtain Money and Equipment
  • Destroy Facilities or Disrupt Lines of
    Communications

11
  • Discourage Foreign Investments or Assistance
    Programs
  • Influence Government Decisions, Legislation, or
    Elections
  • Free Prisoners
  • Satisfy Vengeance
  • Turn the Tide in a Guerrilla War

12
Internal Organization of Terrorist Groups
  • Operational Cell-- The action arm of the group.
    In sophisticated groups, these cells may be
    highly specialized with bombers, assassins, or
    personnel performing other specific functions.
    In new or less sophisticated groups, operational
    cells may perform many jobs, including
    intelligence and support. These groups usually
    consist of three to five people.

13
Intelligence Cell
  • This cell collects information on potential
    targets. It is highly compartmentalized and
    follows very strict security. This means that
    members of the cell may know only the other
    members of their cell. They may not know who
    they take their orders from (receiving orders at
    drop points) or who is in other cells. The size
    of these cells vary greatly

14
Auxiliary Cell
  • Auxiliary Cells usually perform support functions
    such as raising funds, screening recruits, and
    distributing propaganda. They are often larger
    and less strictly compartmentalized than other
    cells. They can consist entirely of terrorist
    sympathizers and supprters other than the cadre

15
Two Characteristics of Terrorist Training
  • Internal Training- This is usually conducted
    secretly by members of the group within the
    target country.
  • External Training- This is conducted by
    non-group members, often outside the target
    country. Most known international training
    camps are located in the Middle East with Libya
    boasting more than 70.

16
Training Program
  • Individual Physical and Mental Conditioning
  • Weapons and Explosives
  • Political Indoctrination
  • General Tactics and Combat Techniques
  • Intelligence Collecting
  • Psychological Warfare
  • Survival
  • Communications

17
Anti-Terrorism Measures
  • Anti-terrorism is the preventive stage of
    terrorism. These measures are intended to harden
    potential targets and to develop procedures to
    detect planned terrorist actions before they take
    place, thereby reducing the probability of a
    terrorist event
  • Prevention is always the best posture!

18
  • Criminal Information / Intelligence
  • Threat Assessment
  • Crime Prevention
  • Operational Security
  • Personnel Protection
  • Physical Security

19
Crisis Management Planning
  • Who will make decisions and have final authority
    for the team as a whole
  • Who will be members of the team and what will
    their responsibilities be
  • The missions of the military police, the
    augmentation forces, and the installation staff
  • Specialized training of hostage negotiators and
    special reaction teams
  • Contingency plans

20
Counter-Terrorism Measures
  • Counter-terrorism measures are taken in response
    to terrorist incident, including direct contact
    with a terrorist force to end the incident with
    minimum loss of life and property.
  • Responding to a terrorist incident requires
    special capabilities and considerations
  • The incident must be identified as a terrorist
    event

21
  • Preparation for multiple incidents or
    diversionary tactics
  • Establishment of communication
  • Use of think-tank teams
  • Preparation for prolonged incidents
  • Management of the media
  • Preparation of an after-action report

22
Personal Protective Measures
  • Your attitude towards security is most important.
    You can lessen your chances as well as those of
    your family members of becoming a terrorist
    target by taking some precautions

23
At All times!!!!!!
  • Encourage security awareness
  • Be alert for surveillance attempts
  • Vary personal routines
  • Let people know where you are and when youll be
    home
  • Know how to use the local phone system and have
    extra change and cash on hand
  • Have emergency response numbers on hand

24
  • Know the location of government buildings and the
    American Embassy
  • Avoid public disputes
  • Know certain phrases to get help!!!
  • Set up an emergency signal system for your family
  • Carry some sort of ID with blood type
  • Keep one weeks worth of Medication on you at all
    times
  • Keep a low profile

25
  • Do not unnecessarily divulge your home address or
    phone number
  • Watch for unexplained absences of local citizens
  • Maintain your personal affairs in good order
  • Do not carry sensitive or potentially
    embarrassing items on you

26
At Home
  • Have a clear view of approaches to your home
  • Install strong doors
  • Change locks when you move in or lose a key
  • Install windows that are hard to access
  • Never leave extra keys with anyone except family
  • Have adequate lighting

27
While Traveling
  • Vary times and routes
  • Be alert for suspicious-looking vehicles
  • Drive with your widows and doors locked
  • Travel with a group of people
  • Do not pick up hitchhikers
  • Keep your gas tank filled at least half full

28
In Hotels
  • Keep your room key on you at all times
  • Know the location of emergency exits
  • Do not admit strangers into your room
  • Know how to locate security guards
  • Be observant for suspicious persons
  • Keep your room orderly to enable you to notice
    tampering

29
Air Travel Security
  • Use military aircraft when possible
  • Avoid high risk areas
  • Do not use rank on tickets
  • Ensure to take a window seat
  • Travel in civilian attire
  • Travel with civilian luggage

30
Phases of a Terrorist Incident
  • There are FIVE basic phases of every terrorist
    operation, they are as follows

31
Pre-Incident Phase
  • During this phase the terrorist meticulously
    plans the operation. They may conduct
    reconnaissance missions, lengthy periods of
    training, and rehearsals.
  • If a primary target is unavailable, or the risk
    is perceived as too great, an alternative target
    is selected.

32
Initiation Phase
  • This is the start of the operation, when the
    terrorists move to their target in a covert
    manner.
  • Perpetrators leave for the target singly or in
    pairs
  • Weapons and explosives are pre-staged
  • The point of no return unless a mission abort is
    given

33
Negotiations Phase
  • The negotiation phase is characterized by the
    terrorists demands, deadlines, talks, and
    tradeoffs. The terrorist will prolong this phase
    as long as possible to get the maximum amount of
    news coverage and publicity possible.
  • One demand will always be present during this
    phase.

34
Climax Phase
  • This has no set time schedule, but it may follow
    the initiation phase if there is no negotiable
    item involved, such as an hostage. Security is
    at its peak during this phase, and law
    enforcement radio frequencies and civilian media
    are monitored closely

35
Post-Incident Phase
  • This is an extremely important phase for the
    terrorists. During this phase, the terrorists
    regroup, discuss, and critique the operation.
  • During this phase, they learn from their
    successes and failures.
  • In the absence of a negotiation phase, the
    terrorist exploit the media during the
    post-incident phase.

36
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com