1 / 24

Antiterrorism / Force Protection NWP 3-07.2

HM1 OWENS. Antiterrorism / Force Protection NWP 3-07.2. This briefing is UNCLASSIFIED. Overview of Training. Definition of Terrorism Force Protection Defense Conditions Terrorism Threat Levels Phases of Terrorism Terrorists Tactics CT/CI Centers Navy AT/FP Program. Definition.

feivel
Download Presentation

Antiterrorism / Force Protection NWP 3-07.2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. HM1 OWENS Antiterrorism / Force ProtectionNWP 3-07.2 This briefing is UNCLASSIFIED

  2. Overview of Training • Definition of Terrorism • Force Protection • Defense Conditions • Terrorism Threat Levels • Phases of Terrorism • Terrorists Tactics • CT/CI Centers • Navy AT/FP Program

  3. Definition • Department of Defense Definition of “Terrorism” • Calculated use of violence or threat of violence to instill fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological. • Combating Terrorism involves actions including: • Antiterrorism– defensive measures • Counterterrorism– offensive measures

  4. PURPOSE • Establish and maintain unit ATFP programs that deter, detect, defend, mitigate and recover from the consequences of terrorist attacks via implementation of coherent baseline security measures. • Defeat an attack by the activation of preplanned responses. • Take required action to manage a crisis and maintain/regain mission readiness.

  5. FORCE PROTECTION DEFINITION • Security program designed to protect Service member, civilian employees, family members, facilities, and equipment, in all locations and situation accomplished through planned and integrated application of combating terrorism, physical security, operations security, personal protective service, and supported by intelligence, counterintelligence, and other security programs.

  6. Types of Monitoring Conditions/Levels

  7. Terrorist Threat Level • Low No terrorist group is detected or the group activity is non-threatening • Moderate Terrorists are present but there are no indications of anti-US activity • Significant Anti-US terrorists are present and attack personnel as their preferred method of operation, or a group uses large casualty producing attacks as its preferred method but has limited operational activity • High Anti-US terrorists are operationally active and use large casualty producing attacks as their preferred method of operation

  8. Force Protection Conditions (FPCON) • FPCON ALPHA – when there is a general threat of possible terrorist activity against personnel and facilities and the nature and extent of which are unpredictable • FPCON BRAVO – when an increased and more predictable threat of terrorist activity exists. This measure must be capable of being maintained for weeks without causing undue hardship, affecting operational capability, and aggravating relations with local authorities • FPCON CHARLIE – when an incident occurs or intelligence is received indicating some form of terrorist action against personnel and facilities is imminent • FPCON DELTA – applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that terrorist action against a specific location or person is likely.

  9. Defense Condition (DEFCON) • DEFCON 5 Normal peacetime situation exists • DEFCON 4 Tensions exist which require greater military vigilance • DEFCON 3 Tensions exist which may have serious and adverse effects on U.S. interests • DEFCON 2 Situations exist which are directly susceptible to foreign exploitation by hostile action or other situations exist which are susceptible to hostile exploitation, either which could seriously threaten US forces overseas, US allies, or areas vital to US national interests. • DEFCON 1 International relations have deteriorated to such a degree that measures must be taken to achieve maximum readiness. Significant strategic and/or tactical indications of hostilities exist against US forces overseas, US allies, or the US or its possessions. War is imminent.

  10. TERRORIST IDEAOLOGY GOALS Recognition Elimination of Western Influence Harassment, Weakening or embarrassment of governments. Attainment of money or equipment Destruction of facilities and disruption of communications Satisfying vengeance • Politics • Nationalism • Religion • Special Interest

  11. TERRORIST CHARACTERISTICS • Urban-Based: An urban environment offers access to transportation, money-laundering mechanisms, communications systems and international contacts who can provide required travel documentation. • Highly mobile: Terrorists typically move frequently among cities and countries, not only to facilitate the planning and execution of operations, but also in search of safe havens and like-minded support

  12. TERRORIST CHARACTERISTICS • Well-Trained: In order to instill individual members with a strong desire for success, including a willingness to die for the cause, terrorist groups train and rehearse extensively. Emphasis is on physical conditioning, effective use of weapons and explosives, tactics and combat techniques, clandestine operations, psychological warfare and survival skills. • Covert: Although some groups have overt political contingents, the operational cells of most terrorist groups can operate in covert postures for extended periods.

  13. Phases of Terrorism • Terrorism six-step process • Phase One - Target Options • Phase Two - Selection Surveillance • Phase Three - Target Selection • Phase Four - Detailed Surveillance • Phase Five - Training and Preparation • Phase Six - The Attack

  14. ATTACK PREPARATIONS • Target Options: Choosing a target typically starts with a self-assessment of the terrorist group’s capabilities, which will, in large part, define the methods of attack available to the group. • Selection Surveillance: Data gathered from watching potential targets will help the terrorist group refine the list of choices. A potential target may be de-selected because surveillance data proves the choice to be too difficult to effectively attack. • Target Selection: Once surveillance data results are assessed, terrorists are able to select their target or set of targets. The most likely targets are those that are vulnerable, undefended or with weak security.

  15. ATTACK PREPARATIONS • Detailed Surveillance: Terrorists often conduct further long-term, detailed surveillance of the chosen potential target(s), seeking to detect routines, procedures and site-specific security measures. • Training and preparation: Once the terrorists’ plan of attack has been developed, the attack team will be chosen and trained. • Attack: Terrorists wait for the right set of circumstances to attack, which can take months or even years.

  16. Terrorists Tactics • Common Terrorists Tactics • Assassination • Arson • Bombing • Hostage Taking • Kidnapping • Hijacking or Skyjacking • Seizure • Raids or Attacks On Facilities • Sabotage • Weapons of Mass Destruction (WMD) • Information Warfare (IW)

  17. Tasking The Intelligence Community National Intelligence Community DOD Intelligence Centers Navy Intelligence Assets Regional Intelligence Centers Priority Intelligence Requirements/Requests For Information Unit Intelligence Products

  18. National CT/CI Centers • Director of Central Intelligence, Counterterrorism Center (CTC) • Lead center in U.S. to fight against terrorism • Interagency Intelligence Committee on Terrorism (IICT) • Forum for coordination and cooperation on CT issues • Bureau of Intelligence and Research (INR) • Primarily serve U.S. diplomatic corps; ensure intelligence activities are consistent with U.S. foreign policy • Federal Bureau of Investigation (FBI) • Responsible for detecting and counteracting foreign intelligence activities that affects U.S. national security

  19. DOD CT/CI Centers • Defense Intelligence Agency (DIA) Office of Counterterrorism, Threat Warning Center (TWC) • TWC is the coordinating office for DIA on terrorism

  20. Service Sponsored CT/CI Centers • Naval Criminal Investigation Service (NCIS) – has primary investigative and counterintelligence jurisdiction for the Navy • NCIS has an AT/FP program that collects and analyzes information about possible threats and advises commanders on how to best defend against them • Navy Antiterrorist Alert Center (ATAC) – is the centerpiece for of the Navy’s efforts to counter terrorist threats, located in Washington D.C. • Army Counterintelligence Center (ACIC) – provides timely, accurate, and effective counterintelligence and terrorism analysis support to the Army • Air Force Office of Special Investigation (AFOSI) – counters the threat to Air Force security posed by hostile intelligence services and terrorist groups

  21. BLUE DART • There is a need to inform threatened units in a timely manner • BLUE DART messaged are disseminated when intelligence indicates that a specific, imminent, and credible terrorists threat exists • Require acknowledgment by immediate message by all action addressees, acknowledged by immediate precedence

  22. Consequence Management • Phase One – Impacts and Consequences: Potential impacts and consequences of an incident focusing on worst case scenarios for a particular facility or unit • Example = Multi-level building with severe damage or collapse, trapped personnel • Phase two – Resources Required: Resources required to respond to consequence and impacts of Phase One; where requirements exceed resources, mitigating actions are taken • Example = Resources needed to rescue trapped personnel in collapsed building; using non-DOD assets • Phase Three – Training and Exercise: Once a consequence management plan has been developed, personnel must be trained and the plan must be practiced

  23. Navy AT/FP Program • The Navy AT/FP program: • Purpose is to ensure Navy forces remain mission capable at all times • Focuses on preventing terrorist attacks on Navy assets and personnel through education and training • Combating terrorism is the responsibility of every individual in the Navy

  24. Questions? • This briefed was prepared with information derived from: NWP 3-07.2

More Related