IT2-26 BMR

Created by zultie 

Upgrade to
remove ads

30 terms · NAVY DOCTRINE FOR ANTITERRORISM/FORCE PROTECTION

"This is the criime of maliciously setting fire to a building or the property of another person.

Arson

This type of terrorist activity is an overt seizure of one or more individuals with the intent of gaining publicity or other concessions in return for release of the hostages.

Hostage taking

This terrorist activity is usually a covert seizure of one or more specific persons in order to exact specific demands

Kidnapping

This type of terrorist activity involves a building or object that has value in the eyes of the audience.

Seizure

This terrorist activity is the destruction of property or obstruction of normal operations or treacherous action to defeat or hinder a cause or endeavor.

Sabotage

A ___ group's selection of targets and tactics is often a functioin of the group's affliiation,m level of training, organization, sophistication and opportunity

Terrorists

Terrorist ___ vary in sohistication according to the level of training the individual or group has received

Tactics

Terrorists ___ may include attractring publicity for a group's cause, demonstrting the group's power or the existing government's lack of power, extracting revenge or causing government overreaction.

Objectives

A critical factor in understanding terrorism is the ___impact of the terrorist act on an audience other than the victim

Emotional

___.A term generally applied to the killing of prominent persons and symbolic enemies as well as traitors who defect from the group.

Assassination

___. The bomb, or improvised explosive device (IED) is the terrorist's weapon of choice.

Bombings

___ have accounted for over one half or all recorded internationial terrorist attacks since 1938.

Bombings

This type of terrorist activity is sometimes employed as a means of escape, ___ is normally carried out to produce a spectacular hostage situation.

Hijacking

Terrorist threat levels do not address when a ___ attack will occur and do not specify a Force Protection conditioin status.

Terrorist

In "type" of warfare, actions are taken to achieve information superiority by affecting adversary information, information-based processes, information systems and computer based networks while leveraging and defending one's own information, information systems and computer based networks

Information Warfare

This type of activities on facilities are usually undertaken for one of three purposes: to gain access to radio or television broadcast capabilities in order to make a statement; to demonstrate the government's inability to secure critical facilities or national symbols; or to acquire resources.

Raids, Attacks

What are the intelligence's system for ariculating and categorizing the terrorist threat worldwide?

Threat levels

Under Terrorist Levels (Please name the DOD threat level assessment methodology)-The acquired, assessed or demonstrated level of capability to conduct terrorist attacks

Operational capability

Under Terrorist Levels (Please name the DOD threat level assessment methodology)-Actons indicative of preparations for specific terrorist operations.

Intentions

Under Terrorist Levels (please name the DOD threat level assessment methodology)- Recently demonstrated anti-US activity or stated or assessed intent to conduct such activity

Activity

Under Terrorist Levels (Please name the DOD threat level assessment methodology)- The circumstances of a the country under consideration

Operating environment

Under Terrorist Levels (Please name the 4 DOD threat levels)- No terrorist grouop is detected or the group activity is nonthreatening

Low

Under Terrorist Levels (please name the 4 DOD threat levels)- Terrorist groups are present but there is no indication of anti-U.S activity. The operating environment favors the host nation

Moderate

Under Terrorist Levels (Please name the 4 DOD threat levels)- An anti-U.S. terrorist group is operationally active and attacks personnel as their preferred method of operation, or a group uses large casualty production attacks as their preferred method and limited operational activity. The operating environment is neutral

Significant

Under Terrorist Levels (Please name the 4 DOD threat levels)-An anti-U.S. terrorist group is operationally active and uses large casualty producing attacks as their preferred method of operation. There is substantial DOD presence and the operation environment favors the terrorist.

High

Under Terrorist Force Protection Conditions, please name the Force Protection condition- Applies when a general threat of possible terrorist activity exists but warrants only a routine security posture.

Normal

Under Terrorist Force Protection Conditions, please name the Force Protection conditon- Declared when a general thereat of possible terrorist activity is directed toward installation, vessels or personnel, the nature of which are unpredictable and where circumstances do not justify full implementationi of FP condition BRAVO

ALPHA

Under Terrorist Force Protection Conditions, please name the Force Protection conditon- Declared when a increased threat and more predictable threat of terrorist activity exists.

BRAVO

Under Terrorist Force Protection Conditions, please name the Force Protection condition- Declared when an incident occurs or intelligence is received indicationg that some form of terrorist action against installations, vessels or personnel is imminent.

CHARLE

Under Terrorist Force Protection Conditons, please name the Force Protecdtion conditon- Declared when a terrorist attack has occured in the immediate area or intelligence indicates a terrorist action agianst a specific location or person is likely. Declared only as a localized warning

DELTA

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

NEW! Voice Recording

Click the mic to start.

Create Set