How can we help?

You can also find more resources in our Help Center.

30 terms

IT2-26 BMR

NAVY DOCTRINE FOR ANTITERRORISM/FORCE PROTECTION
STUDY
PLAY
"This is the criime of maliciously setting fire to a building or the property of another person.
Arson
This type of terrorist activity is an overt seizure of one or more individuals with the intent of gaining publicity or other concessions in return for release of the hostages.
Hostage taking
This terrorist activity is usually a covert seizure of one or more specific persons in order to exact specific demands
Kidnapping
This type of terrorist activity involves a building or object that has value in the eyes of the audience.
Seizure
This terrorist activity is the destruction of property or obstruction of normal operations or treacherous action to defeat or hinder a cause or endeavor.
Sabotage
A ___ group's selection of targets and tactics is often a functioin of the group's affliiation,m level of training, organization, sophistication and opportunity
Terrorists
Terrorist ___ vary in sohistication according to the level of training the individual or group has received
Tactics
Terrorists ___ may include attractring publicity for a group's cause, demonstrting the group's power or the existing government's lack of power, extracting revenge or causing government overreaction.
Objectives
A critical factor in understanding terrorism is the ___impact of the terrorist act on an audience other than the victim
Emotional
___.A term generally applied to the killing of prominent persons and symbolic enemies as well as traitors who defect from the group.
Assassination
___. The bomb, or improvised explosive device (IED) is the terrorist's weapon of choice.
Bombings
___ have accounted for over one half or all recorded internationial terrorist attacks since 1938.
Bombings
This type of terrorist activity is sometimes employed as a means of escape, ___ is normally carried out to produce a spectacular hostage situation.
Hijacking
Terrorist threat levels do not address when a ___ attack will occur and do not specify a Force Protection conditioin status.
Terrorist
In "type" of warfare, actions are taken to achieve information superiority by affecting adversary information, information-based processes, information systems and computer based networks while leveraging and defending one's own information, information systems and computer based networks
Information Warfare
This type of activities on facilities are usually undertaken for one of three purposes: to gain access to radio or television broadcast capabilities in order to make a statement; to demonstrate the government's inability to secure critical facilities or national symbols; or to acquire resources.
Raids, Attacks
What are the intelligence's system for ariculating and categorizing the terrorist threat worldwide?
Threat levels
Under Terrorist Levels (Please name the DOD threat level assessment methodology)-The acquired, assessed or demonstrated level of capability to conduct terrorist attacks
Operational capability
Under Terrorist Levels (Please name the DOD threat level assessment methodology)-Actons indicative of preparations for specific terrorist operations.
Intentions
Under Terrorist Levels (please name the DOD threat level assessment methodology)- Recently demonstrated anti-US activity or stated or assessed intent to conduct such activity
Activity
Under Terrorist Levels (Please name the DOD threat level assessment methodology)- The circumstances of a the country under consideration
Operating environment
Under Terrorist Levels (Please name the 4 DOD threat levels)- No terrorist grouop is detected or the group activity is nonthreatening
Low
Under Terrorist Levels (please name the 4 DOD threat levels)- Terrorist groups are present but there is no indication of anti-U.S activity. The operating environment favors the host nation
Moderate
Under Terrorist Levels (Please name the 4 DOD threat levels)- An anti-U.S. terrorist group is operationally active and attacks personnel as their preferred method of operation, or a group uses large casualty production attacks as their preferred method and limited operational activity. The operating environment is neutral
Significant
Under Terrorist Levels (Please name the 4 DOD threat levels)-An anti-U.S. terrorist group is operationally active and uses large casualty producing attacks as their preferred method of operation. There is substantial DOD presence and the operation environment favors the terrorist.
High
Under Terrorist Force Protection Conditions, please name the Force Protection condition- Applies when a general threat of possible terrorist activity exists but warrants only a routine security posture.
Normal
Under Terrorist Force Protection Conditions, please name the Force Protection conditon- Declared when a general thereat of possible terrorist activity is directed toward installation, vessels or personnel, the nature of which are unpredictable and where circumstances do not justify full implementationi of FP condition BRAVO
ALPHA
Under Terrorist Force Protection Conditions, please name the Force Protection conditon- Declared when a increased threat and more predictable threat of terrorist activity exists.
BRAVO
Under Terrorist Force Protection Conditions, please name the Force Protection condition- Declared when an incident occurs or intelligence is received indicationg that some form of terrorist action against installations, vessels or personnel is imminent.
CHARLE
Under Terrorist Force Protection Conditons, please name the Force Protecdtion conditon- Declared when a terrorist attack has occured in the immediate area or intelligence indicates a terrorist action agianst a specific location or person is likely. Declared only as a localized warning
DELTA