NSF SENIOR SPECIALIST

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

State the purpose of Pre-Planned Responses (PPR)

Preplanned responses are developed, exercised, and evaluated actions and measures implemented to identify, track, assess, and neutralize terrorist attacks. This chapter sets forth specific guidance for commanders and planners to develop effective PPRs to counter terrorist threats.

Discuss the purpose and the requirements of the Standards Compliance Course

SCC was developed as a means by which CNIC ensures NCP, NSG and MAs meet the minimum training standards.

TTX

Table top exercises (TTX) are designed to elicit discussions and facilitate analysis of various situations or challenges in an informal, STRESS-FREE ENVIRONMENT. TTX participants examine and resolve problems based on existing operational plans with the goal of refining those plans for future testing and ultimately improved readiness. A TTX is most appropriate when determining if a plan will have the intended outcome.

ORM 5 step process (IAMIS)

IDENTIFY HAZARDS-ASSESS-MAKE RISK DECISIONS-IMPLEMENT CONTROLS-SUPERVISE

State who calls away a security alert

Quarterdeck: 1. Intercept and detain individual(s) (if possible). Utilize escalation of force as required. 2. Cease all evolutions (e.g., diving, fueling, and ordnance handling). 3. Call away the security alert:

Random Antiterrorism Measures

Random AT measures present a robust security posture from which a terrorist cannot easily discern patterns and routines that are vulnerable to attack. The goal of a RAM program is to DETER, DETECT, AND DISRUPT terrorist attacks.

Terrorism

The calculated use of unlawful violence or threat of unlawful violence to inculcate fear intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political religious, or ideological

to prevent unauthorized access to equipment

installations, material, and documents

Discuss the mindset of Watch Standers

Alert, well trained security forces successfully deter, detect, delay, deny, and defend against terrorist attacks. The following guidance ensures watch stander success

Describe the Unified Facilities Criteria Security Requirements

All new construction' shall comply with the requirements of this manual and approved Unified Facilities Criteria (UFC) publications. This requirement also applies to pertinent facility modifications to existing buildings, facilities, sites,etc. The ICO or designated representative shall review plans for new construction and facility modifications.

AT Executive Committee

An AT executive-level committee or similarly structured corporate body at the installation and separate facility level should meet at least semi-annually to develop and refine AT program guidance, policy, and standards; to act upon recommendations of the ATWG and TWG or similar forums; and to determine resource allocation priorities to mitigate or eliminate terrorism-related vulnerabilities.

Hostile Act

An attack or other use of force against the United States or U.S. forces, which includes force used directly to preclude or impede the mission and/or duties of U.S. forces and the recovery of U.S. personnel and vital U.S. government property. In certain circumstances, the use of force against U.S. nationals, their property, U.S. commercial assets, and/or other designated non-U.S. forces, foreign nationals, and their property is also a hostile act.

Hostile Force

Any civilian, paramilitary, or military force or terrorist(s), with or without national designation, that has committed a hostile act, exhibited hostile intent, or has been declared hostile by appropriate U.S. authority.

Reporting surveillance

Immediately report it to the chain of command so that civilian or military LE authorities can take appropriate action. All reporting should be in compliance with OPNAVINST F3100.6J and DODI 2000.26 (eGuardian reporting requirement). Surveillance-detection techniques must be specific in order to be effective. Observers must note the following information: 1. Detailed descriptions of suspicious personnel to include: a. Gender, height, weight, hair color, build, race, and identifying marks b. Clothing c. Equipment carried by suspicious personnel (e.g., a phone, camera, or notebook). 2. Time of day 3. Exact location of suspicious activity 4. Detailed description of vehicle

Discuss ashore and afloat interoperability

Installation security forces must have the ability to integrate and employ capabilities from afloat units in order to adequately protect all assets within the WRA. It is essential that any gaps or seams between shore and afloat security be identified and addressed quickly to develop an effective command and control structure. Any weakness in C2 will create vulnerabilities that can be readily exploited by adversaries. Afloat security leadership should meet with the ISO, or designated representative, to discuss respective capabilities and review governing policies and procedures to coordinate efforts and to efficiently employ assets across the waterfront. The installation may have an ATTWO/security supervisor who is responsible for overseeing all waterfront security operations. It is important that all waterfront watches be able to communicate directly with the installation COG, WSOC, and ATTWO in the event of a waterborne security threat or incident.

Law Enforcement

LE operations support good order and discipline on Navy commands around the world. The NSF will operate with restraint and authority, within reasonable standards, and with a minimum use of force, making the NSF ideally suited as a response" force for any situation. CO is responsible for the good order and discipline of the command. must have standardized policies and procedures to enforce the law, maintain good order and discipline, investigate offenses, safeguard the rights of all persons, and provide service to the community

Discuss the Master-at-Arms rating in relation to 01APR1893

MA WAS 1 OUT OF 8 RATINGS FOR A CHIEF

Discuss the role and responsibility of the Master-at-Arms as it pertains to the 1865 Navy regulations

Master-at-Arms will be the Chief Petty Officer of the ship in which he shall serve. All orders from him in regard to the police of the vessel, the preservation of order, and obedience to regulations, must be obeyed by all petty officers and others of the crew. But he shall have no right to succession in command, and shall exercise no authority in matters not specified above.

Discuss the causes of a security alert

Preplanned responses are not all-inclusive. These actions are initial actions only. Navy security force members must use critical thinking skills, training, and judgment based on the totality of the circumstances to make decisions in potential life-threatening situations in order to minimize casualties and collateral damage

AAR

Properly planned, executed and assessed exercises, whether solely ATTT-related or part of a larger integrated installation exercise, help articulate, revise and improve requirements, thereby increasing NSF readiness through continuous process improvement. An effective ATTT that enforces thorough hot wash standards and after-action reporting (AAR) procedures following all drills and exercises will also ensure the real-world executability of the installation AT Plan, NSF standard operating procedures (SOP) and PPRs.

Discuss the roles and responsibilities of CNIC N3

Provide direction and oversight to region and installation Navy Security Force (NSF) personnel. Provide unified and consistent policy, procedures, standards of service and practices for effective and efficient management of the CNIC Ashore Protection Program. Ensure regions and installations have the ability to defend against acts of terrorism and criminal activity and are prepared to support all-hazard responses. Establish and maintain training requirements that support the certification of NSF through assessments, assist visits and a final inspection process.

Region Assessment (RASS)

Region staff will conduct a mid-cycle operationally-focused Assessment to determine the installations readiness to certify. Region assessors will review the IP developed during CART, NSF unit training plans and NSF watch bills in order to assess watch stander and watch team proficiency with evolutions and drills

Probability

The likelihood that given exposure to a hazard, a potential consequence mishap will occur.

Hostile Intent

The threat of imminent use of force against the United States or U.S. forces, which includes the threat of imminent use of force that would preclude or impede the mission and/or duties of U.S. forces, including the recovery of U.S. personnel or vital U.S. government property. In certain circumstances, hostile intent is the threat of imminent use of force against U.S. nationals, their property, U.S. commercial assets, and/or designated non-U.S. forces, foreign nationals, and their property.

Threat-Hoax Threat or Hoax

Threats and hoaxes can dull the effectiveness of preventive or countermeasures when a targeted individual or population loses situational awareness of an actual terrorist target or disperses finite assets against many possible threats. At the less lethal end of the spectrum, hoaxes can simply be METHODS TO ANNOY AND WEAR DOWN SECURITY FORCES AND KEEP THE POPULATION CONSTANTLY AGITATED.

original rating badge of a Petty Officer 1st Class MA

Title: Chevron of "Master-at-Arms" First Class U.S. Navy Uniform Regulations, 1886 Caption: Chevron of "Master-at-Arms" First Class showing three stripes and an arch of three stripes with a five-pointed star under the eagle. Plate XIV- Figure 1. of U.S. Navy Uniform Regulations, 1886. Description: Uniforms: Uniform Regulations color Catalog #: NH 123329

Discuss the integration of NR NSF with the Installation and the resourcing of NR NSF

NR NSF commands are established with the intent to augment additional NSF manning requirements resulting from prolonged increased FPCONs per reference

State the Reaction Force Configuration and each member's responsibilities

1. Point man (P) lead/assess 2. Team member (TM) backup/ extra duties 3. Team leader (TL) direction/coms 4. TM 5. Assistant TL rear sec/ 6. Rear security. 6/

Antiterrorism/Force Protection Warfare Development Center

(ATFPWDC) took shape and led efforts that formed the baseline for the more advanced training of today.

Threat Working Group (TWG)

-Develop intelligence and information sharing relationships to improve security for the installation and the military community at large. -Meets at least quarterly.

Defense in Depth

Assessment Zone. The outermost defense zone - Warning Zone. Security forces must classify contacts in the warning zone as either threats or nonthreats- Threat Zone. The threat zone is the innermost layer of defense in depth

Hot Wash

NSF related exercises coordinated by the ATTT and led by the ATO help improve NSF readiness and validate the installation response plans by utilizing the NWTS process. Properly planned, executed and assessed exercises, whether solely ATTT-related or part of a larger integrated installation exercise, help articulate, revise and improve requirements, thereby increasing NSF readiness through continuous process improvement. An effective ATTT that enforces thorough hot wash standards and after-action reporting (AAR) procedures following all drills and exercises will also ensure the real-world executability of the installation AT Plan, NSF standard operating procedures (SOP) and PPRs.

Describe the Terrorist Planning Cycle

Target selection. Surveillance. Final Selection. Planning. Final Surveillance. Deployment. Attack.

Describe terrorist tactics and its relation to their objective

Terrorism can be used as either an overt or a covert aspect of a political movement engaged in a power struggle within an existing political system. Terrorists frequently claim affiliation with causes or political organizations to give their actions a claim to respectability.

Physical Security

That part of security concerned with physical measures designed to safeguard personnel

Antiterrorism Plan

Using an integrated approach to operational planning, the AT planning process supports the development of standing (baseline) AT protection plans and event-driven, operationally specific contingency plans. Baseline plans provide the guidance, policy, and detailed execution required for sustained AT operations. These plans incorporate operational consistencies relative to the physical protection of afloat and ashore critical infrastructure, personnel, operational capabilities, restricted areas, ship systems/tenant activities, and security force training

Discuss the roles and responsibilities of a Watch Commander

Watch Commander. Responsible for supervising all watch section responsibilities, to include patrol, sentries, harbor security, and the armory and reaction force.

Exposure

considers the frequency, length of time, and percentage of people or assets subjected to a hazard.

Unit Level Training

occur continuously. During the assessment phase, installation and headquarters training and assessment teams will pay particular attention to evolutions (standard operating procedures (SOP) and PPRs) and drills (NSOXPs).

original pay grade requirements for Navy Police

petty officer first class through master chief petty officer.

and to safeguard them against espionage

sabotage, damage, and theft.

Installation Commanding Officer

(1)Report to the assigned region commander for all operational matters relating to FP. (2) Perform and coordinate all Navy Security Program requirements within the installation's AOR. Tenant activities are not authorized to establish a separate armed security or LE force without approval from CNO (N4) via the ICO, region commander, and NCC (3) Establish an installation Navy security program, including the development of a comprehensive FP plan that incorporates AT, PS, LE, EM, and DCI. The FP plan shall be coordinated with tenant activities and homeported ships to facilitate coordination, cooperation, and response. Each plan will be reviewed, updated, and exercised as required, but at a minimum annually. (4) Installation exercises for AT, LE, or EM, will actively involve tenant commands and inport homeported ships, to the extent possible, from the initial planning process, through the exercise and to documentation of lessons learned.

Region Commander

(1)Report to their respective NCC for operational matters relating to the Navy Security Program. (2) Report to CNIC for administrative matters relating to the Navy Security Program and resourcing. (3) Establish and manage a regional security program, including the development of plans, taking into consideration AT, PS, LE, emergency management (EM), and defense critical infrastructure (DCI). Plans will be reviewed and updated as required, but at a minimum annually. (4) Evaluate the execution and effectiveness of the installation Navy security program and AT plans within their region to ensure compliance with this instruction and higher headquarters directives. (5) Re-deploy installation NSF personnel within the region as needed to assist with a crisis event.

Antiterrorism Protection Plans (AFLOAT)

AT protection plans dictate the commander's specific measures to protect critical assets, capabilities, infrastructure, and personnel. The development and implementation of AT protection plans are FPCON levelbased, capabilities-based, and threat-driven, and represent a decentralized approach that affords the local commander maximum autonomy.

RISK

Acceptable Risk. The portion of identified risk that is allowed to persist during the mission or task. Residual Risk. Risk remaining after controls have been identified and selected Unacceptable Risk. The risk when measured versus the benefit or value of the mission or task that cannot be tolerated and must be eliminated or controlled.

Force Protection

Actions taken to prevent or mitigate hostile actions against DoD personnel (including family members), resources, facilities, and critical information

Describe the following zones used in Defense in Depth (afloat)

Assessment - visual range of the base gate guard, pier watch, or quarterdeck watch. Within the assessment zone, active and passive security measures are employed to identify, detect, classify, and assess possible threats. Known and authorized personnel are segregated, channelized separately, and allowed to proceed. Personnel who are unknown or unauthorized are channeled into the warning zone for further inspections, while prevented access to the critical asset. Warning - IDs and access lists are checked and the purpose of visits is confirmed. Commensurate with the current threat situation, personnel and packages are inspected using explosive detection devices (e.g., EDD teams, EXPRAY Kits, Ahura First Defenders, etc.) as available. The warning zone contains a standoff zone past the ECP where the cover sentry, manning a CSW from a covered position, engages a person who has gained unauthorized entry. Threat - The area past the post-ECP standoff zone to the protected asset or area is the threat zone. No unauthorized personnel are allowed in this area. Watch standers shall clearly understand authorized UOF in the threat zone

Explain what NCIS Security Training

Assistance, and Assessment Teams can provide to an Installation , manages the STAAT Program which provides on-site assistance, training, and advice to Naval activities worldwide (ashore/afloat) in various PS, LE and AT disciplines. Mission requirements or tasks from ashore and afloat Navy components or others will be presented at the STAAT Biannual Regional Scheduling Conference.

Surveillance

Before initiating an attack, terrorists conduct months or years of meticulous planning to maximize the likelihood of success. Terrorists gather exhaustive operational knowledge of a target through surveillance. assess capabilities of security systems, judge effectiveness of security measures, and identify security weaknesses.

CART

CART is primarily an administrative program assessment with an operational component designed to evaluate post checks, evolutions and drills during the weeklong event. CART is led by CNIC (N3) and is used as the basis to determine if the NSF is ready to conduct unit level training during the high operational tempo (OPTEMPO) of daily force protection operations. The CART assessment team will also certify the ATTT readiness to train and assess the installation NSF.

NWTS

CITADEL SHIELD (CS) is the annual capstone AT event in the execution phase of the Navy Warfare Training System (NWTS). CITADEL SHIELD is a key event in the CNIC shore response plan (SRP) and will engage other primary mission area

Discuss the proper phraseology used to initiate/secure from a security alert

Call away the security alert: ***Three Whistle Blasts*** "SECURITY ALERT, SECURITY ALERT, AWAY THE SECURITY REACTION FORCE AND BACKUP REACTION FORCE. REACTION FORCES MUSTER AT (PRIMARY/SECONDARY) ISSUE POINT. ALL HANDS NOT INVOLVED STAND FAST. REASON FOR SECURITY ALERT IS ACTIVE SHOOTER AT (LOCATION). INTRUDER IS (NAME/DESCRIPTION/ARMED WITH/DIRECTION OF TRAVEL)" Note: Pass twice prior to taps, and four times between taps and reveille.

Discuss how terrorists choose the target

Collection is gathered from diverse sources. Collectors may be core members of the terrorist cell, sympathizers, or people providing information without knowledge of the intended purpose. This phase also includes open source and general information collection. Some features of this type of collection are: Stories from newspapers and other media provide background information. Internet research provides data such as texts, pictures, blue prints, and video information. Potential targets are screened based on the intended objective and assesses areas such as symbolic value, critical infrastructure points of failure, expected number of mass casualties, and potential to generate high profile media attention.

risk assessment code (RAC)

Combine the severity with the probability to determine

State who gives the authorization to secure from a security alert

Command Duty Officer: 1. Proceed to the combat information center (CIC), radio, or damage control (DC) central. 2. Man COMMS. 3. Gather the description of the subject, last known location, direction of movement, etc. (Lack of initial information should not cause a delay in making an entry to locate and neutralize the suspect(s).) 4. Consider raising the FPCON. 5. Contact NCIS, HN, and local support services if necessary. 6. Make voice reports to the immediate superior in command (ISIC) and numbered fleet commander. 7. Consolidate all the intelligence material for further transfer to NCIS, the local authorities, and/or the HN liaison officer. 8. Once the threat is neutralized, obtain a muster of all ship personnel, contractors, riders, etc. 9. Secure from the security alert, only when the threat has been neutralized and no other threats have been identified.

CPX

Command post exercises (CPX)/Functional Exercises are simulated interactive exercises that are designed to test strategic planning capability and the organization's operational plans across multiple functions and functional areas. A well designed CPX will test a response to a situation/incident in a time-pressured, realistic simulation without impacting operations or the need to stage/move resources.

Antiterrorism Threat Working Group

Commanders (or civilian equivalent) and AT officers use the ATWG to oversee the implementation of the AT plan and tasks, develop and refine AT guidance, and address emergent or emergency AT issues. The ATWG and threat dissemination protocols are particularly effective for commanders whose responsibility extends to include installations, facilities, or base clusters as a means to convene units from across multiple disciplines.

Discuss the purpose and function of DHART

Data Housing and Reporting Tool, created and designed in support of the NSF community throughout CNIC to maintain up to date training data enterprise wide. DHART is the ONLY training repository authorized for CNIC NSF to document and track all training and qualifications. Scheduling. Portability. Reporting.

Antiterrorism

Defensive measures used to reduce the vulnerability of individuals and property to terrorist acts, to include limited response and containment by local military and civilian forces. AT measures are taken to detect, deter, defend, defeat and mitigate acts of terror.

How often are Training records for all NSF personnel reviewed and how long are they maintained

Establishing an annual comprehensive installation NSF training plan, from the installation's initial SA through FEP/Certification. Maintaining three years of records for comprehensive program reviews, completed training and unit level training required to support mission effectiveness. Verifying completion of training and ensure training is correctly documented in DHART. Conduct spot checks to verify objective quality evidence (OQE) exists for documented training. The SO will conduct spot checks on 10 percent of all NSF training records on a quarterly basis.

Evolutions

Evolutions (Blocking and Tackling) are those functions the security department conducts on a routine basis, which must be exercised to preserve the NSF skills necessary to discharge their duties. Examples of some evolutions are: (1) ECP turnaround procedures. (2) Clearing Barrel Procedures. (3) Final Denial Barrier Operations. (4) Accident Investigations.

FEP

FEP is an operational assessment of the NSF in an EVALUATION mode and is the culminating event in the NSF assessment cycle. The FEP will include watch teams demonstrating proficiency in NSOXPs with one of the events resulting in a cascading integrated drill to evaluate operational readiness between the EOC, ICP and tactical NSF response assets

Discuss shipboard Navy Security Force FPCON requirements

FPCON requirements: (a) ATTWO. (b) Topside Sentry - Rover. (c) Topside Sentry - Fixed. (d) Chief of the Guard (COG). (e) Contact Sentry. (f) Cover Sentry (foot of pier or at ship's brow). (g) Vehicle Inspection Team. (h) Picket Boat. (i) Waterfront Fighting Position.

FTX

Field training exercises (FTX) are large scale events with the goal of evaluating an entire organization's operational and response capability and all associated systems. The FTX is designed to simulate a real-world environment as closely as possible in which all resources, leadership and strategic assets are used to validate each supporting agency's performance capabilities. The exercise should closely resemble the high stress environment and simulate actual response conditions an installation would face in a large scale incident

NSOXP

Navy security operations exercise program. comprised of drills designed to develop watch stander proficiency and assess personnel knowledge, abilities, and equipment use

NR 6495

Newly selected 6495 ENS, Limited Duty Officer are termed XO understudy and assigned to an NR NSF unit. REGCOMs have the authority to reassign NR NSF personnel within the region as needed

Counter Terrorism

Offensive measures taken to prevent, deter, and respond to terrorism.

Describe terrorism motivational categories

Separatist - reach for a goal of separation from existing entities through independence, political autonomy, or religious freedom or domination. Ethnocentric - see race as the defining characteristic of a society and a basis of cohesion. Nationalistic - The loyalty and devotion to a nation and the national consciousness place one nation's culture and interests above those of other nations or groups is the motivating facto behind these groups. Revolutionary - These groups are dedicated to the overthrow of an established order and replacing governance with a new political or social structure.

Discuss the violations of the UCMJ which require submission of fingerprints.

Service members who are investigated for all offenses punishable by imprisonment listed in the punitive articles of Chapter 47 of Title 10, U.S.C., also known and referred to in this issuance as the "Uniform Code of Military Justice (UCMJ)," or elsewhere in the U.S.C. Civilians investigated by DCIOs and other DoD LEA with civilian arrest authority for U.S.C. offenses punishable by imprisonment

SitMan

Situation manuals (SitMans) are provided for discussion-based exercises (TTX) as the core documentation that provides the textual background for a facilitated exercise. The SitMan supports the scenario narrative and serves as the primary reference material for all participants conducting or involved with the TTX.

Terrorist Surveillance Techniques

Target Selection. Initiates the operational cycle timeline. 1. A target or groups of targets are selected. 2. Surveillance. Potential targets are placed under surveillance to assess risk, vulnerability and probability of success. 3. Final Selection. Surveillance assessment data is evaluated and analyzed to further refine the target selection and method of attack. 4. Tactical Level Planning. Specific TTP for the attack are determined including logistics, materials, and methods. The target is clearly defined and vulnerabilities are identified. 5. Final Surveillance. Additional surveillance is conducted to validate previously collected data and to familiarize the terrorists with the attack plan. 6. Deployment. When personnel and resources are in place, the terrorist element will deploy to the selected site for tactical execution of the plan. 7. Attack. The type of attack (close in or standoff) as well as the specific timing is predicated on a number of variables including the specific TTP being employed by the terrorist cell.

Describe the Operational Intent of terrorism

Terrorism is primarily a psychological act that communicates through violence or the threat of violence. Terrorist strategies will be aimed at publicly causing damage to symbols or inspiring fear. Timing, location, and method of attacks accommodate mass media dissemination and optimize current news impact. goal of manipulating popular perceptions, and will achieve this by controlling or dictating media coverage

Describe the categories of Terrorism and terrorist organizations

Terrorist Affiliation: Categorizing terrorist groups by their affiliation with governments provides indications of their means for intelligence, operations, and access to types of weapons. U.S. joint doctrine identifies three affiliations: NON-STATE SUPPORTED, STATE SUPPORTED, AND STATEDIRECTED TERRORIST GROUPS NON-STATE SUPPORTED

Discuss the PQS requalification process for NSF PQS

Upon reassignment or transfer, the NSF member is required to re-qualify on all PQS watchstations for duty at the new command. The level and depth of the requalification is at the discretion of the SO, but at a minimum, all 300 level line items relative to that installation will be completed per Figure 3-1 below. Re-qualification includes the completion of: a. A written test. b. An oral board. c. PQS watchstation requirements for those areas specific to the new location (e.g., air field, controlled industrial area (CIA), waterfronts, etc.) d. Demonstration of knowledge, skills and abilities through practical exercise. NOTE: All PQS re-qualification's must be annotated in DHART with the new qualification date, despite the manner in which re-qualified, as outlined above.

Detecting surveillance

Watching for persons observing personnel, ships, and installations. Personnel, especially sentries and watch standers, must become familiar with their surroundings and normal unit operating procedures. Armed with heightened awareness, personnel must be able to detect the slightest changes which may be indicators of surveillance activity. 1. Multiple sightings of the same suspicious person, vehicle, or activity, separated by time, distance, or direction. 2. Individuals staying at bus/train stops for extended periods while buses/trains arrive and depart. 3. Individuals engaging in long conversations on pay or cellular telephones. 4. Individuals ordering food at a restaurant and leaving before the food arrives or ordering without eating. 5. Joggers standing and stretching for an inordinate amount of time. 6. Individuals sitting in a parked car for an extended period of time. 7. Individuals wearing improper attire for the location (or season) and not fitting into the surrounding environment. 8. Individuals drawing pictures/taking notes or photographs in an area not normally of

Discuss the Navy's Crime Prevention Program

a specialized organization within the physical security division. This branch anticipates, recognizes, and appraises the crime risk and recommends action to remove or reduce it. Crime prevention is a proactive method to reduce criminal opportunities, protect potential victims, and prevent property loss.

SOLID CURTAIN

annual USFF force protection exercise and the means by which USFF assesses Navy AT program command and control (C2) capabilities and evaluates the readiness and effectiveness of fleet and Region AT programs throughout the U.S. Northern Command (USNORTHCOM) AOR. Exercise scenarios stimulate command level decision making and lead to the actual escalation of FPCON levels for all Navy commands in the USNORTHCOM AOR. During SC, C2 processes and procedures will be evaluated to identify gaps and seams within the AT program C2 architecture and, in particular, ashore/ afloat integration. NOTE: Both CITADEL SHIELD and SOLID CURTAIN are CONUS-only.

CITADEL PACIFIC

annual capstone AT event in the execution phase of NWTS. It is the means by which PACFLT and CNIC exercise and assess Navy AT C2 capabilities and valuate the readiness and effectiveness of each numbered fleet, Region and installation AT program throughout the United States Pacific Command (PACOM) AOR

Severity

assessment of the potential consequence that can or could occur as a result of a hazard and is defined by the degree of injury, illness, property or environmental damage, loss of asset (time, money, personnel), or effect on the mission or task. When analyzing risk, it is based on the worst credible outcome

physical controls

controls take the form of barriers to guard against a hazard, such as: PPE, fences, or special oversight personnel.

concept of ORM

decision-making tool used by personnel at all levels to increase effectiveness by identifying, assessing, and managing risks. By reducing the potential for loss, the probability of a successful mission is increased

Center for Security Forces

established in July of 2004. Learning center within the Naval Education and Training Command (NETC).

official start of the MA rating

first established in 1794. The rating was then disestablished in 1921. Master-at-Arms rating is one of the original eight Chief Petty Officer ratings. reestablished on 01AUG1973

CITADEL PROTECT

fully integrated ashore and afloat exercise conducted in a training environment that closely approximates the real-world operational environment that address systemic vulnerabilities identified in USFF AT program reviews and assessments of post real-world events.

Installation Self-Assessment

installation conducts an administrative and operational assessment of its NSF to determine shortfalls in NSF core capabilities and gaps in defense readiness reporting system - Navy (DRRS-N) readiness. The unit self-identifies deficiencies utilizing assessment check sheets and works both internally and with the REGCOM staff to solve deficiencies and prepare for a successful CART. SA results will be reported annually to the respective REGCOM, including status of readiness for CART and any plans/mitigations required to sustain NSF readiness.

Surveillance-detection Countermeasures

installing mechanical devices, varying modes of watch-stander behavior, and employing physical barriers. Effective countermeasures specifically include the following: 1. Installing and displaying visible security cameras and motion sensors 2. Employing RAMs to include: a. Roving security patrols with varying size, timing, and routes b. Sentry watch rotations c. Active searches (including X-ray machines and explosive detection devices) of vehicles and personnel at ECPs d. MWD/EDD teams at ECPs. 3. Emplacing barriers, roadblocks, and entry mazes 4. Visibly displaying CSW and sentries 5. Properly equipping sentries with NVDs, binoculars, thermal imagers, and other gear to enhance surveillance detection 6. Ensuring sentries receive training in detecting surveillance activities 7. Establishing sentry posts to ensure all potential surveillance locations can be observed 8. Ensuring a camera is readily available for surveillance detection. Surveillance-detection measures assist personnel with consistently maintaining a vigilant stance. By proactively watching for suspicious activity, observers have the highest chance of deterring terrorist attacks before they become a reality.

CITADEL SHIELD

is the annual capstone AT event in the execution phase of the Navy Warfare Training System (NWTS). CITADEL SHIELD is a key event in the CNIC shore response plan (SRP) and will engage other primary mission areas

British Navy "sheriffs of the sea:"

keeping the swords, pistols, carbines and muskets in good working order as well as ensuring that the bandoliers were filled with fresh powder before combat. Besides being chiefs of police at sea, the sea corporals, as they were called in the British Navy, had to be qualified in close order fighting under arms and able to train seamen in hand-to hand combat.

Force Protection Conditions (FPCONS)

level program is a Chairman of the Joint Chiefs of Staff-approved program standardizing the military Services' identification of, and recommended responses to, terrorist threats and terrorist acts against United States (U.S.) personnel and facilities

Discuss the procedures in detecting, Identifying, and detaining a suspected impaired driver

necessary to support prevention and assistance programs that help keep persons from harming themselves or others. Measures will include use of breath analyzers and other safety tools for detection and deterrence of impaired driving. See SECNAVINST 5300.29 (series), Alcohol Abuse, Drug Abuse and Operating Motor Vehicles, for further guidance. Breath-testing devices must be listed on the National Highway Traffic Safety Administration (NHTSA) conforming products list published in the Federal Register and shall meet current standards approved by the state or HN. Blood and urine tests may be necessary in the event of refusal of a breath test or inability to provide breath. Standardized field sobriety tests. appropriate blood alcohol content level for intoxication will be based on state requirements. For installations in host nations, the applicable blood alcohol content limit is the blood alcohol content limit specified in the UCMJ or such lower limit as the SecDef may by regulation prescribe. Each command will develop RRP regarding driver refusal to be tested under implied consent laws. A person being tested does not have the right to have an attorney present before stating whether he or she will submit to a test or during the actual test.

Time Critical Risk Management

point of commencing or during execution of a mission or task, at the time critical level. A - Assess the situation B - Balance resources C - Communicate to others D - Do and Debrief the event

Discuss the roles and responsibilities of the ATTT Leader

primary purpose of the ATO is to maintain an updated, signed, validated AT plan and to advise the SO and CO in all matters related to AT. The ATO is responsible for having a signed and executable AT plan at all times and serves as the ATTT leader in exercising the command's AT Plan. The SO may assign another person to assist with the ATTT leader duties as necessary, but the ATO remains the ATTT Leader with overall responsibility.

Discuss the purpose of the Auxiliary Security Force (ASF) and what is required for their activation

purpose of ASF is to augment an installation's NSF during increased FPCONs/other contingencies for periods of at least 30 days. ASF members are provided to the installation's security force from tenant commands ASF members are prohibited from performing LE functions. If an installation's tenant commands do not have the capability to support the installation's requirements, then alternative means such as Inter-Service Support Agreement, Memorandums of Understanding or Memorandum of Agreement with other services, host nation or local authorities must be used to provide ASF capabilities

Active shooter

scenarios are extremely dangerous and difficult because there is no criminal objective

RELIANT (Followed by Region-specific name)

series of CPX events, where Regions are either the sponsor or a participant in a non-CNIC sponsored exercise.

Integrated Training

the EOC must be activated. all events must be assessed and forces from two or more mission areas will participate. The unit conducts training with other departments tenants and outside organizations. The XO (ITT leader) and ITO (ITT coordinator) work closely with the ATO/security training leadership (ATTT leader), and members of the ITT, to ensure NSF requirements are incorporated in integrated installation training planning.

Root Cause

underlying cause that was not in turn a result of more important underlying causes.

change in FPCON

voice and message attainment reports will be made via tactical control (TACON) for the FP chain of command. Afloat units will make reports to their immediate superior in command (ISIC) and briefs the installation commanding officer (ICO). The ICO will typically make reports to the regional commander via the regional operations center (ROC).


Kaugnay na mga set ng pag-aaral

Accounting Cornett Auburn Exam 3 TB

View Set

11.1.1 Final Exam Pt 1: Multiple Choice

View Set

EAQ Quiz 3 Medication Administration

View Set

MedSurg Chapter 21 Respiratory Care Modalities

View Set

51. Conversation phrases Hola Qué tal Qué hay de nuevo

View Set

Real Interest Rate determination (Exam 3)

View Set

Math 2130 Unit 2 Exam Study Guide

View Set

Networking Cisco Netacad Ch2 Practice Test

View Set