Study sets, textbooks, questions
Upgrade to remove ads
Terms in this set (51)
Which of the basic terrorist organizational structure is characterized by
distributed authority, redundant key functions, and a cell structure that allows anonymity of the individuals
operating throughout the organizational spectrum?
Difficult to identify and presenting a formidable challenge to law enforcement and intelligence agencies, this type of terrorist shares ideology and goals with a terrorist organization, but does not communicate with any group as
fashions his political aims and commits acts of terrorism.
Anarchists, socialists, and neo-Nazis represent which terrorist ideological category?
What are the three types of state affiliation defined in joint doctrine?
____________ _____________ are typically individuals or groups that are sympathetic to the announced goals and intentions of the terrorist organization, but are not committed enough to take action.
What is the objective of most incidents of sabotage?
The objective in most sabotage incidents is to
*demonstrate how vulnerable
society and its critical infrastructure* are to terrorist actions and the inability of the
government to stop terrorism.
Mortars and rockets are examples of ______-______ weapons. They are easy to hide, have high rates of fire, and can quickly relocate.
The unlawful use of violence or threat of violence, often motivated by religious,
political, or other ideological beliefs, to instill fear and coerce governments or societies in
pursuit of goals that are usually political.
used to reduce the vulnerability of individuals and property
to terrorist acts, to include rapid containment by local military and civilian forces. Also
The _________ __________ _______________ is the primary U.S. government organization responsible for integrating and analyzing all intelligence possessed or acquired pertaining to terrorism, with the exception of purely domestic terrorism.
The National Counter-terrorism Center (NCTC)
The __________ __________ ____________ leads intelligence community efforts on the prevention of domestic terrorism.
Federal Bureau of Investigation (FBI)
Which assessment identifies key assets and infrastructure that are deemed mission critical, assessing the impact of temporary or permanent loos capability to include costs of recovery and reconstitution?
Well-developed ______________ ________ _________ ____________ products and analysis help identify facts and assumptions about the installation, relevant terrain, and the threat.
Intelligence Preparation of the Battlespace (IPB)
List the sources of "all-source intelligence" which from the basis of the AT program.
OSINT; local, state, and federal LE information; national-level intelligence;
information shared through liaison with foreign governments; biometrics, forensics, and
technical exploitation data
What policy requires that intelligence information affecting the public must be disseminated as widely possible, and without preference to the military.
No Double Standard Policy
The criminal investigative service, tasked within the Navy to collect and evaluate criminal information and disseminate terrorist-related information to supported installation and activity commanders, is call the ________ ___________ ___________ _____________.
Naval Criminal Investigative Service (NCIS)
The department of defense has developed factors to assist leaders and staff with threat analysis that are conducted country by country. These four methodology factors are:
of an incident.
with appropriate civilian LE authorities.
of an incident for various purposes, to include protection of
the crime scene.
of the alleged perpetrators.
Antiterrorism Officers shall, at least ________, assist in the preparation of a terrorism threat assessment for those personnel and assets for which they have AT responsibilities.
The ________ ________ tool uses available sources of information to identify and prioritize current threats so that the commander or civilian equivalent can start a counter-planning process and the focus of reallocate resources based on the likeliness of occurrence and severity of the threat.
Probability and Severity
Summarize the threat assessment requirement for units (ships, squadron, submarine, tenant, etc.) prescribed in DoD ATO guide (Nov, 2012) Paragraph 3-40:
3-40. In addition to assisting in the preparation of an annual threat assessment, ATOs also continuously assess local threat information so appropriate FPCON can be set. ATOs forward up and down the chain of command all information pertaining to suspected terrorist threats, or acts of terrorism involving DoD personnel or assets for which they have AT responsibility. Threat information is used in the determination to raise or lower the present Force Protection Condition. Continuous threat analysis also supports the warning of suspected target facilities or personnel through the installation's mass notification system when the information relates threats of an immediate nature.
The essential Risk Management process components include:
a. Assessing the terrorist threat
b. Determining the criticality of assets
c. ID the vulnerabilities of facilities, programs and systems to terrorist attacks
all of the above
Match the assessment in the left column with the correct description in the right column:
1. TA- Identifies the potential terrorist actions
2. CA- Determine the susceptibility of assets to attack
3. VA- Identify and prioritize all assets to attack
4. RA- A combination that provides a more complete
picture of risks to an asset or group of assets
The ______ ________ ________ requires careful analysis of known local threats, together with estimates of relevant national and transitional threat capabilities.
Annual Threat Assessment
List the goals of criticality assessments
a. Important asset chart
c. Criticality assessment matrix
d. Criticality Prioritized Tool
Risk management is the purpose is the process of _________, ______________ and __________ risks from operational factors and making decisions that balance risk costs with mission benefits.
identifying, assessing, and controlling
There are several ways to reduce risk. The decision-maker does not easily control two of those methods, reducing the threat and reducing criticality. The one method that is controllable is reducing the __________ of an asset.
The VA answers the question:
What kind of attack is the asset most/least vulnerable to?
b. What is the greatest threat?
c. What asset is at the most risk?
d. Where resources should be directed?
The end-state of the VA process is the identification of ____________ or ___________ that render critical assets, areas, or special events vulnerable to a range of known or feasible terrorist capabilities.
physical characteristics or procedures
The vulnerability tool "CARVER" considers what factors to determine asset vulnerability?
(T or F) An asset that is very vulnerable to attack will also have the highest risk.
ATOs pursue AT resource requests when the resulting risk is deemed too great, and elevate the ________ using PPBE Process and DoD Methodology for documenting and prioritizing AT resource requests.
2. (T or F) ATOs should become the expert within the organization in generating, prioritizing and appropriately documenting AT requirements.
When should ATOs work with programming, resourcing, and budgeting personnel to justify requirements and assist in determining the best source of funding and the associated data call timeline.
A vulnerability identified in a Combatant Commander Imitative Fund (CCIF) funding request must also be identified and recorded in the ________ ________ _________ _______ ________ (_______).
Program as articulated in reference d. (CVAMP)
(T or F) Funding for emergent vulnerabilities is available from the Chairman, Joint Chief of Staff Combatting Terrorism Readiness Initiative Fund (CbT RIF).
(T or F) CCIF requests must be limited to one page to meet submission format guidelines.
Comprehensive AT program reviews are conducted at least ________ by all commanders to establish AT programs.
A comprehensive AT program review is conducted whenever there are significant changes in _________, ________, or _______.
threat, vulnerabilities, or asset criticality.
Subordinate commands undergo an external AT program review at least once every _____ years.
List the 6 integrated steps
1. Mission analysis
2. COA development
3. COA wargaming
4. COA comparison and selection
5 AT plan development
Following the receipt of the mission from higher headquarters (HHQ) step 1 (mission analysis) is undertaken to produce a clear ________ _________ following the review of the common tactical picture, current intelligence, and guideline from higher headquarters.
b. Command guidance
c. Operations order
d. Training Plan
______ tasks are those not specifically stated in the order, but must be accomplished to fulfill any part of the mission.
(T or F) A COA is a detailed potential solution to an assigned mission (e.g. port visit or defining ECPs).
SMEAC is an acronym for the parts of the standard five paragraph operations order. Name the paragraphs.
Administration and logistics,
Command and signal
(Tor F) The regional operations center has an emergency management requirement to operate on a 24/7 basis and to be staffed during working hours.
False "has no"
The mission of the ROC is to support the __________ ___________ during emergencies by providing strategic coordination.
a. Lieutenant Governor
b. Commanding Officer
d. Security Officer
The EOC is responsible for coordination and liaison with ________, __________, _________, and/or ________ response and recovery assets.
Local, Other Service, and/or private response
According to CNI INST 3440.17, "The regional operation center is a NIMS Complaint multi-agency coordination system utilizing the incident /unified command systems organizational structure." What does NIMS stand for? _________ ____________ ___________ ____________ National Incident Management System
National Incident Management System (NIMS)
2. Regions and installations discharge their emergency management responsibilities by taking five interrelated actions: ____________, ___________, ___________, ___________, __________.
preparedness, prevention, mitigation, response, and recovery.
(T or F) According to the JP 3-07.2, existing procedures for fire response, operation center management, disaster response, CBRN/HAZMAT response, security operations, and other related activities must be reproduced verbatim in antiterrorism plan annexes.
(can be referenced in the document and do not need to be reproduced.)
List at least three preparedness efforts described in the NIMS and listed in JP 3-07.2:
(a) Planning, training, and exercises.
(b) Personnel qualification and certification standards.
(c) Equipment acquisition and certification standards.
(d) Publication management processes and activities.
(e) Mutual aid agreements.
(f) Emergency management assistance compacts.
Other sets by this creator
Practice Test summary answers
JIST OF ALL MODULE ANSWERS
(o)(o) BOOBIE TRAPS (o)(o)
Recommended textbook solutions
Service Management: Operations, Strategy, and Information Technology
James Fitzsimmons, Mona Fitzsimmons
Service Management: Operations, Strategy, and Information Technology
James Fitzsimmons, Mona Fitzsimmons
Information Technology Project Management: Providing Measurable Organizational Value
Jack T. Marchewka
Operations Management: Sustainability and Supply Chain Management
Barry Render, Chuck Munson, Jay Heizer
Other Quizlet sets
Neuro II Hearing and the Auditory System Set
human factors in construction final exam