BLOCK 2 Test 2 SF
Who is responsible for validating the EAL?
A SF supervisor
FPCON Normal
A general global threat of possible terrorist activity exists and warrants a routine security posture.
Force Protection Conditions (FPCONS)
A series of measures designed to increase the level of a unit's defense against terrorist attacks
Insider Threat
A trusted adversary who operates within an organization's boundaries.
Approved RABs
AF Form 1199 1-2 & A-D
Revolutionary
Dedicated to the overthrow of an established order and replacing it with a new political or social structure
What kind of searching speed is slow, deliberate and tightly controlled?
Deliberate (covert) speed
crime scene notes
Detailed scene description and condition of scene
management by objectives
Developing and issuing assignments, plans, procedures, and protocols to accomplish identified tasks
What kind of searching speed is used in an active shooter situation?
Direct to threat (dynamic) speed
4 Steps of OSINT
Discovery- collecting info Discrimination- filtering collected info Distillation - refining and filtering info again Dissemination - final product of info collected
Single Badge System
Easy to defeat
Goal of Integrated Defense
Employed to mitigate potential risks to DAF, joint and coalition operations within base boundary and base security zone to ensure mission accomplishment
Clear zones
Ensures any approach to barrier from outside or inside can be easily seen
AF FM 52
Evidence Tag
3 distinct zones CBRN
Exclusion zone (HOT ZONE) Contamination reduction zone (Warm zone) Support zone (cold zone)
T/F Weather conditions don't matter
False
MOPP LEVEL 0
Field gear is stored
Separatists
Goal of separating through independence, political autonomy, or religious freedom or domination
Major accident responses
Hazardous materials Aircraft Munitions Explosives Various modes of transportation
Terrorism Organizational Structure
Hierarchical Structure - specialization of functions in their subordinate cells (support, operations, intelligence) Networked Structure- distribution of authority and responsibility throughout an organization. To be effective, needs a unifying idea, concern, goal, or ideology
Temporary Barrier
High level of security for a short amount of time. Could be a rope.
modular organization
ICS organization may expand based on the incidents size and complexity
Entry Authority List (EAL)
Identifies whether or not an individual is available for unescorted or escorted entry, unescorted will get a temp badge and must be positively identified
Searching for person in a building
Identify point of entry Set up containment around structure May use MWD if applicable
Political
Ideologies concerned with the structure and organization of the forms of gov and communities
FPCON Charlie
Incident occurs or intelligence indicates likely threat
FPCON Alpha
Increased general threat of possible terrorist activity
FPCON Bravo
Increased or more predictable threat of terrorist activity exists
Open-Source Intelligence (OSINT)
Information that is readily available to the public and doesn't require any type of malicious activity to obtain.
Responsibility of IDP
Installation commanders have 120 days to approve of IDP
Signals Intelligence (SIGINT)
Intelligence derived from electronic signals and systems used by foreign targets, such as communications systems, radars, and weapons systems.
Imagery Intelligence (IMINT)
Intelligence that includes representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media. Can be derived from visual photography, radar sensors, infrared sensors, lasers, and electro-optics.
Examples of RAM
Irregular guard changes (time, number, location) Random inspections and searches of personnel and vehicles Security patrols varies in size, timing, and routes
Stop, check, pass
Is utilized when there is an immediate need to locate individuals who might be entering or exiting the installation. Ex: kidnapping burglary etc Effects both lanes
Fencing
Legal and physical demarcation of area perimeter
Boundaries
Mark the legal and physical limits of installations, restricted/controlled areas, free zones, and National defense areas. Can range from visual (painted red lines) to physical (fences)
Exchange badge system
Most secure method of limiting entry into a restricted area
vehicle barriers
Must be effective to stop active vehicle threats
PL-1 and 2 Restricted badges
Must never leave the restricted area
integrate systems
Objective is to degrade threat movement and assist counterattacks
What does SF do when they are proceeding to a scene?
Observe the area. Note suspicious people, vehicles leaving the scene
Restricted area badges (RAB)
Official documents used for controlling entry to restricted areas
MOPP level 2
Overgarment suits and boots, field gear, body armor
MOPP Level 1
Overgarment, field gear, and personal body armor is worn
MOPP level 3
Overgarment, over boots, field gear, body armor, protective mask
nationalistic
Placing one nations culture and interests above other nations
Installation emergency action plan
Plans identify procedures to be followed in the event of major accidents, natural disasters, attacks, and terrorists use of CBRN weapons or materials
Operations security indicators
Process of collecting, processing, analyzing and disseminating intelligence. 4 critical sources: Human, signals, image, and open source intelligence
ID coordination w other programs
Protection and defense of air bases requires efforts from: Integrated defense Emergency Management (EM) Anti-Terrorism (AT) Critical Asset Risk Management (CARM) Continuity of Operations (COOP) Force health protection Cyber security
Integrated defense plan
Provides an understanding of security requirements for all units involved in ID and describes how how commanders employ available ID forces, capabilities, and concepts to accomplish overall ID mission
Random Antiterrorism Measures (RAM)
Required in FPCON Alpha and Bravo. RAM's are the single most effective means to disrupt the terrorist planning cycle and deter an attack.
Crime Scene Sketch
Show location and distance. A rough sketch
SF Blotter
Significant events that occur during a shift
threat LEVEL 2
Small scale Irregular forces conducting unconventional warfare that can pose serious threats to military forces and civis Ex; AL QUEDA
lone terrorist
Tactics conceived entirely by themselves w/o any direction from a terrorist commander.
Domestic Terrorism
Terrorism that is carried out by people in their own country.
Religious
Terrorists see their objectives as divinely sanctioned, infallible and non-negotiable
Who is the defense force commander on AF bases?
The SF squadron commander
What does a RAB show?
The bearers photograph, signature
THREAT LEVEL 1
Threats include enemy agents and terrorists whose missions are espionage, sabotage, and subversion
Natural disaster responses
Tornadoes Hurricanes High winds Flooding Earthquake
T/F: you can go from deliberate to direct to threat
True
Zone/sector search
Used for large areas (football field), areas with a lot of evidence (shuttle crash), areas where evidence is at different levels (blood spatter). Format: divide area into zones or sectors and assign each person a sector. Horizontal and Vertical levels
Strip and Grid Search
Used in large outdoor areas. Conducted by dividing the area in strips 4 ft wide
concentric circles
Used inside buildings, rooms, SMALL outdoor areas
Item to Item Search
Used when there are several items of evidence in a room/building
AF Form 1109
Visitor Log
Emergency Action Plan
a plan an organization develops that contains step-by-step procedures for dealing with various emergency situations
Incident Command System (ICS)
a subset of the National Incident Management System (NIMS) designed specifically for management of multiple-casualty incidents.
Ethnocentric
believing in the superiority of one's own ethnic and cultural group, and having a corresponding disdain for all other groups
Common Terminology
Component of ICS, use standard terminology so every agency understands what's going on
Response phases
Actions -dist. tactical objectives and support. Lasts 12-24 hrs Prevention- actions taken to avoid or intervene Preparedness - a continuous process Response- immediate actions to save lives, protect property &meet basic needs Recovery- begins when emergency responders have completed their response Mitigation - reduce or eliminate risks to persons or property
Terrorism
Acts of violence designed to promote a specific ideology or agenda by creating panic among an enemy population
SF roles when arriving on scene....
Advise BDOC Request med and backup Detain suspects Protect the scene Record date, time, and weather conditions Remain alert
MOPP level 4
All is worn. Overgarments, over boots, protective mask, body armor, gloves
Human Intelligence (HUMINT)
Any information that can be gathered from human sources
Integrated Defense
Application of active and passive defense measures. Bridges the gap between peacetime and wartime actions
FPCON Delta
Applies in the immediate area where a terrorist attack has occurred or when intelligence is received that terrorist action against a specific location or person is imminent.
Search Techniques
Artificial lights Searching mirrors Door stops and wedges- wedge door if necessary Pie the corner - search one section at a time.
Common terrorists techniques
Assasination Arson Bombing Kidnapping Hijacking's Seizing Raids Sabotage Threats Environmental destruction
PL-3 Restricted areas
Badges may leave the restricted area Must take accountability at beginning and end of duty day
THREAT LEVEL 3
Capability of projecting combat power by air, land, or sea EX: China Russia
Incident Action Plan
Capturing and communicating overall incident priorities, objectives, strategies, tactics, and assignments
Do security forces collect evidence?
No. They protect evidence