Antiterrorism Officer (ATO) Level II MODULE 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

How do Present Day Terrorist Groups achieve their goals?

By intentionally planning, targeting, and executing their actions w/ the intent to cause casualties of innocent people

Recruitment

Terrorist Groups recruit from populations that are sympathetic to their ideology and objectives. Recruiting is accomplished using the following means - -capabilities: conducted on the basis of skills and qualifications rather than ideological characteristics (CBRN) -coercion: gain operatives from diverse backgrounds using blackmail and intimidation. can range from gaining information to conducting suicide bombing operations

Random Antiterrorism Measures (RAM)

Random employment of AT measures designed to portray a highly visible and robust security posture from which terrorists cannot easily discern these AT measure from any other security patterns/routine

FPCON

is a system of preventive measures used by DoD to mitigate hostile actions against DoD personnel, resources, facilities, and critical information - * does not include actions to defeat the enemy or protect against accidents

weapons ambush - magnetic bomb

more recent form of a weapons ambush is to attach a magnetic bomb to a car while in motion

weapons ambush - overrun attack

overrun attack = a form of weapons ambush; simple to execute victim has a discernible routine terrorists:- -acquire/follow victim's car -if in a car - pull out to pass -if on a motorcycle - approach between lanes of traffic -overrun car -fire at victim as they pass -drive away and escape

terrorist planning cycle

phase 1: broad target selection phase 2: intelligence gathering and surveillance phase 3: specific target selection phase 4: pre-attack surveillance & planning phase 5: attack rehearsal phase 6: actions on the objectives phase 7: escape

T or F

T: Education and employment opportunities influence membership of international terrorist groups. Members typically have higher levels of education and lower incomes

What term is used interchangeably with the term INSURGENCY?

Terrorism

planning and conducting assassinations

similarities between all assassinations include - victim's actions or routines are predictable -victims tend to disregard sensitive indicators, information received, and threats posed by terrorists in the target environment

Terrorist perspective

- Actions are neither evil neither unlawful - Violent destruction, maiming and killing innocent people is necessary and morally justified - The end justifies the violent means

Higher FPCONS can cause delays/inconveniences-

- Detailed vehicle inspections - 100% ID checks - Gate closures - Use of barriers - Extra guard duty for troops

Threat Levels

- High - Significant - Moderate - Low **Not to be confused w/ those given the National Terrorism Advisory System (NTAS), Department of State, or FBI, as each analysis

Ex of RAM:

- Irregular guard changes - Roving security patrols - Surprise and varying types of inspections and searches of personnel and vehicles

Non-State Supported Terrorist Groups

-usually insurgent movements that operate w/ virtually no external support mechanism - generally pose the most serious threat to the stability of established governments ex: New People's Army (NPA) and Sendero Luminoso are some of most dangerous of all contemporary insurgent movements

kidnapping

=unlawful seizure and detainment of a person, usually held for ransom primary purpose - -making money -generating publicity for extended period of time -releasing jailed group members -causing economic stress w/in country by forcing large businesses to cut back on number of personnel assigned to country - generating less revenue for state -forcing government into granting concessions

What is Terrorism motivated by?

- Religious - Political - Ideological beliefs and committed in the pursuit of goals that are usually political

Victim perspective

- Terrorist acts as criminal and immoral - No legitimacy in the injury or death of innocent people

FPCON based on multiple factors that may include but are not limited to -

- Terrorist threat - Target Vulnerabilities - Critically of assets - Security resources available

Advantages of implementing RAM

- Thwarting terrorist planning by varying security routines - Increasing AT awareness for DoD personnel, dependents, visitors, and neighbors - Increasing alertness among law enforcement, security, base or facility personnel - Validating capability to execute measures from higher FPCONs

Cell Structure

-Cells at the tactical level are the building blocks -primary reasons for compartmental structure of cell is security: difficult to penetrate entire organization, and compromise or loss of one cell does not compromise other cells and personnel cannot divulge sensitive information if the cells don't know about each other

Terrorist Tactics

-Incidents: incidents of terrorism can be rogue by a lone individual or sanctioned activities of a large organization -Flexible: terrorists use flexible array of means and material to accomplish assigned missions and seek to identify vulnerabilities that can be attacked -Adaptive: terrorists are adaptive and learn from tactical success and failure. adjusts to techniques to conditions to achieve an objective -Defensive: terrorist tactics include defensive actions to defeat an enemy attack, gain time, economize capabilities and develop conditions favorable for operations. Some defensive actions include dispersion and hiding, using human shields, exploiting sensitive infrastructure and conducting information operations -Offensive: attack is the primary type of offensive operation. terrorists use a broad range of technology from low-tech to high-tech and they adapt their tactics in an attempt to remain elusive

Terrorist Goals

-Obtain Recognition - common short-term goal for terrorist groups, specifically publicity gained from a terrorist act focuses national and international attention to a group's cause and/or grievances --> $, sponsorship, recruitment of new members -Cause an Overreaction - measures include- special antiterrorist laws that allow searches w/o warrants, detention of citizens w/o chargers, curfews, travel restrictions. hope is that the public views the institution of these measures as violation of their rights -Weaken Security Forces - to reduce effectiveness of a state's defenses and erode public confidence includes calling false alarms, assassinating security personnel, conducting sophisticated raids and ambushes -Obtain Money and Equipment - acts of terrorism are executed in order to steal or extort money and equipment especially weapons and ammunition essential to the terrorist group's struggle -Create a Chaotic Atmosphere - these acts briefly isolate entire segments of the population from government influence, making them susceptible to terrorist intimidation and propaganda -Discourage Foreign Investments - to negatively affect the country's economy. it is characteristic of leftist movements worldwide to use foreign investors and corporations as symbols of capitalist oppression and imperialism -Influence Government - to influence government decisions, legislation or elections -Release of Prisoners - frequent demand made by terrorists -Satisfy Vengeance - most brutal acts of terrorism are often reserved for informants or other traitors to the cause. "kneecapping" is a favorite tool used by IRA security personnel

Terrorist Cells

-Operational Cell-determines operational objectives, participants, target, timing, and attack method -Intelligence Cell- combines intelligence and security; collects, analyzes and disseminates target-specific information and provides OPSEC -Support Cell- fulfills requirements (recruitment, personnel support, media, financing education, logistics and communications) -Cadre-are the heart of the organization; trained to execute the attack or place the bombs

Ideological Categories Social

-Particular social policies or issues may be so contentious that they incite extremist behavior and terrorism. this type of terrorism is frequently referred to as single-issue or special interest terrorism -social terrorist seek to change a specific policy or behavior and attempt to force their beliefs on the general population -one of most radical and violent social terrorist groups in the U.S. involves antiabortion or "pro-life" activities

Ideological Categories: Religious Affiliation

-Religiously motivated terrorist see their ultimate objective as divinely sanctioned and therefore infallible and nonnegotiable. Religious motivations can be tied to ethnic and nationalist identities such as conflict in Northern or Kashmiri or India conflict. Religiously inspired terrorism is on rise ex: Al Queda/ISIS/ISIL

Political Ideologies include

-Right wing: associated w/ reactionary or conservative side of political spectrum. intent is to replace existing forms of government. often associated w/ fascism or neo-Nazism -Left wing: associated w/ revolutionary socialism or variants of communism. Left-wing rhetoric can often move toward anarchistic thought. Associated w/ Maoist or Marxist-Leninst ideologies -Anarchist: they're antiauthority or antigovernment and strongly support individual liberty. promote small communities as highest form of political organization

Terrorist Groups are labeled by their:

-State Affiliation -Identity and Intent Categories -Ideological Categories (Political/Religious Affiliation, Social policies/special interest terrorism) -Geographic Categories

Terrorist Group Affiliation Include

-State-Directed = Primarily supported by a country/state -State-Supported = Generally operates independently, but receives substantial outside support -Non-state supported = Usually insurgent movements that operate w/ virtually no external support mechanism and generally pose the most serious threat to the stability of established governments -Lone Terrorist (AKA Lone Wolf) = Tactics are conceived entirely on their own w/o any direction from a terrorist commander

Recruitment of Teens and Young People

-Typical recruitment age 18-29, but as young as 15 -one of the most effective recruiting tools is direct messaging thru social media which is very difficult to track -"Don't be a Puppet: Pull Back the Curtain on Violent Extremism" utilizes an interactive website w/ materials to teach teens how to recognize and become resistant to self-radicalization and possible recruitment

Lone Terrorist (Lone Wolf)

-an emerging tactic of throwing or spraying harmful liquids, known as chemical spray and splash (CSSA) in the faces or vicinity of intended targets ex: orlando nightclub shooting,

common terrorist acts

-bombings -arson -armed assaults -ramming attacks -armed drones -additive manufacturing 3D printing -assassinations hijackings/skyjackings -kidnappings -hostage barricades -seizure -sabotage -threats or hoaxes -environmental destruction -man-portable, air defense system -chemical, biological radiological, and nuclear weapons

Internal Training

-clandestinely at cell level by members of group in target country -in safe houses, similar to squad or fire team training used by US military

additive manufacturing/3D printing

-could also benefit adversaries, violent extremists and even street criminals -groups could produce weapons for use or sale, replicate sophisticated weapons systems -print lethal drones and produce jamming devices to disrupt intelligence collection -susceptible to sabotage by hackers who could introduce flawed instructions or algorithms into mission-critical parts of airplanes -may allow countries under international sanctions to produce complex items domestically, mitigating the economic impact of sanctions

terrorist operations - offensive

-designed on the offensive -utilized a hit-and-run technique -create impression group larger and more efficient -avoid activities that would put them in a defensive

Terrorist Identity and intent categories include:

-ethnocentric= ace/ethnicity is the defining characteristic of a society -nationalistic= loyalty and devotion to a nation-state is the motivating factor -revolutionary= dedicated to the overthrow of an established order -separatist= goal is separation from existing entities thru political autonomy

Training for Terrorist Groups

-external -internal -oriented to group's mission, physical characteristics and security of operational area

suicide bomber

-have increased in the last 20 years -motivated from w/in the conflict are or outside it -vest or belt is preferred popular because they're - -physically and psychologically impacting to society -inexpensive -difficult to stop -highly lethal and difficult to trace 0covered by media and gain instant notoriety

training camp locations

-iran -irag -libya -yemen -north korea -cuba -afghanistan -pakistan -syria -sudan

terrorist operations - impact

-major impact on everyone's lives -tax dollars are used to finance initiatives to harden existing US embassies and military installations, as well as US government building -impact of terrorism is evident in the airline industry. the difficulties people experience when traveling, especially thru a major airport, is a direct result of terrorist threat

phase 1- broad target selection

-nvolves collecting information on potential targets using available resources -collectors may be core members, sympathizers, or people providing information w/o knowledge of the intended purpose -stories from newspaper and other media that provide background information -internet research that provides data (pictures, blueprints, videos) -potential targets are screened based on intended ojectives and assessed areas (symbolic value, critical infrastructure point, high-profile)

characteristics of terrorist operations

-operational planning -security measures -weapons used during an attack

bombings

-provide a relatively low risk of injury to the terrorists -inexpensive to build and use -excellent method for a small, weak organization to attack a stronger opponent purpose of a bombing is to - -make the headlines, -create fear -destroy people or property bombing targets may be symbolic or practical, such as a government aircraft or diplomatic installation

seizure

-seizure involves occupying and holding a prominent building or object of symbolic value -since security personnel have time to plan and react, there is considerable risk to the terrorist -force is most likely used to resolve the incident if few or no innocent lives are involved

security measures - surveillance

-surveillance personnel do not take part in any physical attack part of operation -Surveillance personnel spend great ideal of time in and around victim and/or target location -time and money invested invested in surveillance personnel; the planners do not want to take chance that the surveillance personnel might be killed or captured during the operation

bombings/decoys

-terrorist detonate the first bomb to lure first responders and onlookers to the blast area -after a sufficient amount of time passes, a 2nd device detonates in the general location of the first to injure or kill first responders -a decoy bombing has the potential for creating a more devastating event

security measures - multiple targets

-terrorist select multiple targets as potential locations for the actual operation since the primary target is not typically selected the last possible moment -multiple targets may be hit simultaneously w/o individual teams knowing about the other operations. in this situation one attack team serves as diversion for the other, thereby increasing the possibility of having a successful operation

weapons

-terrorist use weapons ranging from old and obsolete to modern state-of-the-art, including weapons of mass destruction (WMD) -weapons of choice, for a given operation, is determined by whether the weapon is - -is easily accessible -is concealable -has enough firepower -is easy to use

3 Different perspectives to any terrorist event:

1) Terrorist perspective 2) Victim perspective 3) General public perspective

3 types of Network Structures

1. Chain -each node links to the node next in sequence, typical when have a common function like smuggling 2. Hub or Spoke and Wheel -outer nodes communication w/ one central node, a variation is the wheel design where outer nodes communicate w/ one or two other outer nodes plus the central node 3. All-Channel -all nodes are connected to each other. network is organizationally "flat" command and control is distributed and can be communication intensive

armed assault

2 types - -ambushes - sudden attack from concealed position on previously defined target -explosive ambush & weapons ambush -purpose is to kidnap or kill the victims -raids - surprise attacks by a small armed force on a previously defined target purpose: - gain access to radio/television broadcast capabilities in order to make a statement -fulfill logistical requirements such as bank robberies for $ -expose a government's inability to secure a personnel, or critical facilities

Organization of a Terrorist Group

2 typical structures: 1) Hierarchal: well-defined vertical chain of command -information flows up and down and not horizontally -traditional and common of larger well-established groups w/ greater specialization of functions 2) networked

ramming attack

3 common characteristics among these attacks - - targeting of public venues or mass gatherings -use of secondary weapons -lack of observable indicators immediately before the attack mitigating strategies - 1. planning and preparation -establish liaison -conduct threat, vulnerability and risk assessments 2. personnel -maintain security force -conduct incident training 3. access control and barriers -establish standoff zones -evaluate the need for physical barriers 4.monitoring, surveillance, and inspection program -evaluate, design, and implement a monitoring, surveillance, and regularly review appropriate physical security -deploy security forces to inspect for signs of security issues 5. communication and notification

Assassination

= to murder by sudden and/or secret attack, often for political reasons assassination victims are - symbolic targets, such as political figures, or government representatives -vengeance targets, such as police officers, or military poersonnel

operational planning

5 information-gathering techniques - -fixed (static surveillance) -mobile surveillance -technical surveillance -casual questioning (elicitation) -probing -terrorist cannot failure -terrorists rehearse operation in environment mirroring target location

hijacking

= forceful seizure of surface vehicle, its passengers, and/or cargo purpose- -disrupting economy -embarrassing the government -gaining concessions from the targeted government -gaining popular support

skyjacking

= involves an aircraft, to create a mobile hostage barricade. may enable the terrorists to conduct negotiations in a country sympathetic to their casue

State-Directed Terrorist Group

Activities are conducted @ the direction of the controlling state. Group may be an element of the state's security organization ex: As-Sa'iqa operates out of Lebanon and is a military unit of the PLO

Terrorist Group Def

Any organization that uses terrorism in a systematic way to achieve its goal

FPCON Normal

Applies at all times as a general threat of terrorist attacks, hostile acts, or other security threats always exist in the world

FPCON Alpha

Applies to a non-specific threat of a terrorist attack or hostile act directed against DoD elements and personnel - Enhanced capabilities are implemented to deter and detect these non-specific threats, and other security threats targeting DoD elemtnts and personnel -CC's mus be able to sustain ALPHA measures indefinitely

FPCON Delta

Applies when a terrorist attack or hostile act has occurred or is anticipated against specific installations or operating areas CC's focus on implementing capabilities in response to and containment of these attacks, and to support recovery efforts in emergency managements plans - Should be maintained on a limited basis and only be declared as long as the necessary response capabilities are required

FPCON Charlie

Applies when a terrorist/hostile incident occurs w/in the area of interest (AOI) or intelligence is received indicating a hostile act or some form of terrorist action or targeting against DoD elements, personnel, or facilities is likely. - CC's implement mandatory and supplemental FPCON measures designed to apply delay and deny effects against these attacks -CHARLIE Measures must be sustained throughout the entirety of the threat

FPCON Bravo

Applies when an increased or more predictable threat of terrorist activity - Bravo measures must be capable of being maintained indefinitely and will likely affect missions and base support operations during prolonged implementation

Geographic Categories

Include: -Domestic/indigenous: "home grown" operate w/in against home country -International: operate in multiple countries, retain geographic focus -Transnational: operate internationally, not tied to a country

High Threat Level

Indicates that anti-U.S terrorists are operationally active and use large casualty producing attacks as their preferred method of operation - Substantial DoD presence and the operating environment favors the terrorist

Significant Threat Level

Indicates that anti-US terrorists are present and attack personnel as their preferred method of operation or a group uses large casualty producing attacks as their preferred method but has limited operational activity - operating environment is neutral

Low Threat Level

Indicates that no group is detected or the group activity is non-threatening

Moderate Threat Level

Indicates that terrorists are present but there are no indications of anti-US activity - operating environment favors the host nation

State-Supported Terrorist Group

Is willing to accept support form any source as long as it's not linked to specific directions

Recruitment of Women

Motivating Factors - -suicide terrorism is viewed as a way to gain redemption and restore honor -economic and social dependence on men cause women to never learn skills that would allow them to be independent --> terrorist groups will promise to provide for a woman's family if they execute a suicide attack -lack of security on thwarting female suicide attacks due to existing social, cultural, and religious restrictions on gender interactions resulting in weakened security measures toward women

Training Programs

Normal Training course includes programs in - -physical fitness -weapons and explosives -political indoctrination -general tactics and combat techniques -tradecrafts -psychological warfare -survival -communications

Terrorist Levels of Commitment

Terrorist Organization: -leaders = provide direction/guidance, provide roles and objectives ->senior leaders: fully committed charismatic representatives ->operational leaders: control areas/terrorist networks -Cadre- active members, plan/conduct operations, manage intelligence, finance, logistics and communications -Active Supporters- participate in political fundraising and information activites. fully aware of their relationship, but do not commit violent acts -Passive Supporters: sympathetic to goals, not committed enough to take action

General public perspective

Terrorists understands that if the Gen Pub's perspective is favorable, it can cause pressure on a gov or group to alter their behavior to one that may meet terrorist objectives

DoD Definition of Terrorism

The unlawful use of violence or threat of violence to instill fear and coerce governments or societies

DoD Threat Methodology

Used to assess the terrorist threat to personnel, facilities, materiel, and US interests.

terrorist operations

considered - -dynamic in nature b/c they become instantaneous media events ="simple" b/c they're easy to command, control and support - these considerations serve to enhance lanning as well as the operation's final execution

arson

arson = a malicious act using fire or an incendiary agent to damage, sabotage, or destroy property -low risk to the perpetrator since it is hard to prove guilt due to lack of trace evidence left at the scene -requires low level of technical knowledge and the goal is to cause physical and psychological damage -used for symbolic attacks and to cause economic effects

explosive ambush

bomb may be - -planted along route the victim travels -placed in vehicle parked alongside the road -planted in victim's residence or office area, using a ruse to gain entry

External Training

conducted by non-group members outside operational area- -operatives travel abroad and return to put training into practice -operatives travel intact to another country and depart directly to the operational area to conduct attack

sabotage

deliberate action aimed at weakening another entity thru subversion, obstruction, disruption and/or destruction -objective is to demonstrate the vulnerability of the critical infrastructure and the ability of the government to stop terrorism -utilities, communications, and transportation systems are so interdependent that a serious disruption to any affects all of them and attracts immediate public and media attention

phase 4- pre-attack surveillance & planning

during this phase members if the operational cells begin to appear and information is gathered on the target's current patterns over an extended period. the information gathered is used to: -conduct security studies -conduct detailed preparatory operations -recruit specialized operatives (as need) -procedure a base of operations in the target area (safe house, cache) -select transportation means -determine a weapon or attack

phase 5 - attack rehearsal

during this phase rehearsals are conducted to improve the odds of success, confirm planning assumptions, and develop contingency plans. typical rehearsals include - -equipment checks and weapons training -staging for final preparatory checks -deployment into the target area -actions on the objectives -escape routes rehearsals have taken place at unpopulated weapons ranges, paintball facilities, and on the grounds near terrorists' residences

phase 3- specific target selection

during this phase the target is selected for detailed operational planning taking into consideration the following factors - -will the target attract high-profile media attention? -does the target provide an advantage to the group by demonstrating its capabilities? wh -what are the chances of success? -does the target have exploitable weaknesses according to the current security status? -is the security status going to change between decision and execution? -does success make the desired statement to the correct target audiences? -what are the cost versus the benefits of conducting the operation? -is the effect consistent w/ group objectives? -does success affect a larger audience than the immediate victims?

phase 7 - escape

escape plans are usually well rehearsed and well executed. the exception is a suicide operation, however, even in this there are usually support personnel and handlers who must escape or evade response force personnel. post-attack the operation will be properly publicized to achieve the intended effect

man-portable, air defense system

have been used in major conflicts as a means to provide ground forces w/ the capability to reduce the threat of enemy aircraft -1994 assassination of Rwandan and Burundian president when their plane

security measures

include - -employing principles of compartmentalization -choosing multiple targets -preventing surveillance personnel from participating in attack

environmental destruction

increasing accessibility of sophisticated weapons has the potential to cause damage to the environment -tactics include - -intentional dumping of hazardous chemicals into the public water supply -poisoning or destroying a nation's food supplies thru introduction of exotic plants/animals -destroying oil field or attacking an oil tanker

hostage barricade

involves seizing facility, taking all persons inside hostage -differs from kidnapping - kidnappers hide their victims, in a hostage barricade kidnapper uses victims as human shields

weapons ambush

involves use of - -small arms fire -suitcase-sized wire guided missiles -truck mounted mortars -shoulder fired rockets

planning and executing bombings

step 1: select the target - the target is select4ed based on the group's capability step 2: surveil the target - surveillance personnel will not normally seem out of place. they observe the victim or the target location to discover routines adn the level of security. they also determine what items may be brought into the targeted site w/o raising any suspicions step 3: conduct rehearsals and dry runs - briefcases or other containers used for holding bombs may be left in an area under observation by another terrorist. the time it takes for someone to notice something unusual or to alert the security forces tells the terrorists approximately how much delay they can use for the timer step 4: gather materials & build bomb -for sophisticated operations terrorists groups normally have a specially trained bomb maker in the organization step 5: plant the bomb - the bomb maker is almost never responsible for placing the bomb in the target location. the bomb is too valuable to the terrorist group to risk losing to the authorities or to an accidental detonation step 6: leave the target location - most cases, terrorists will leave the target location unless it's a suicide bomber step 7: exploit the attack - important to note that if the public is extremely outraged by bombing or if the terrorists operational and/or political objectives are hampered, the terrorists can den y their involvement, blame the act on another group or remain quiet

threats or hoaxes

terrorist groups w/ established credibility can employ a hoax w/ considerable success -a credible threat causes time and effort to be devoted to increased security measures and may be used by terrorists to observe security procedures -a bomb threat can close a commercial building, empty a theater, or delay a flight at no cost to the terrorist -repetitive or large numbers of false alarms dull the analytical and operational efficiency aof key personnel, thus degrading readiness

CBRN Use

terrorists can introduce CBRN material into the air or a facility via external or internal release

phase 2- intelligence gathering and surveillance

this phase can be short or span many years. information typically gathered includes - -practices, procedures, and routines such as scheduled deliveries, work schedules, identification procedures, and observable routines -residences and workplaces to include the physical layout activities at both locations -transportation and travel routes to include the mode of transport, common travel routes, ingress and egress points, vehicles on the grounds, and public transportation -security measures such as security around the target, presence, reaction time of security forces, hardened structures and barriers, screening procedures and emergency response drill procedures. adversaries plan to bypass or avoid security measures; therefore, this is one of the most important areas to consider

armed drones

use of drones has pushed the U.S. military to implement countermeasures, such as electronic jamming

phase 6- actions on the objectives

when terrorist reach this phase, the odds favor a successful attack. the attacker has the advantage of initiative which provides them with - -surprise -choice of time, place, and conditions of attack -employment of diversions and secondary or follow-up attack employment of security and support positions to neutralize reaction forces and security measures


Conjuntos de estudio relacionados

Civil liberties and Civil rights

View Set

CH 52, 53, 54, & 55 Take Home Exam

View Set

Beaufort 6 contact 8 Uitdrukkingen

View Set

Chapter 35: The Infant and Family

View Set

NSG 252 Exam 3, Intercranial, inflammation, mobility

View Set