Antiterrorism Point of Instruction

CalebLinMBA 1,302 views 37 slides Apr 18, 2016
Slide 1
Slide 1 of 37
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37

About This Presentation

No description available for this slideshow.


Slide Content

CPT Caleb Lin, Area Support Group – Qatar Force Protection Officer. [email protected] 1LT Timothy Brincks, Area Support Group – Qatar Antiterrorism Officer. [email protected] Antiterrorism In Operations “ Deter, Deny, Defend, and Defeat” This briefing is UNCLASSIFIED

AGENDA Antiterrorism Relevance Program Overview Supervisors Employees Terrorist Planning Cycle Fundamentals of Surveillance Operational Responses to Terrorism Tactical Responses to Terrorism Active Shooter Response

INSTRUCTION OVERVIEW MANAGEMENT/SUPERVISORS (Operational Response) Threat Assessments and Current Protection Assessment Design-Basis Threat What are you defending against? Countermeasure Implementation Screening Procedures Barrier Plan Perimeter Walls/Fencing Random Antiterrorism Measures Activity Reporting Clearly-defined Suspicious Activity Checklists Establish Reporting Channels and Equipment Establish a Centralized Training Program Management-level Employees

EMPLOYEES (Tactical Response) Awareness Training Annual Training Weapons Qualification Threat Response and Procedures Suspicious Activity Access Procedures Suspicious Packages Active Shooter Response INSTRUCTION OVERVIEW

WHY ANTITERRORISM The Hanson Family United Airlines Flight 175 Why is ANTITERRORISM Relevant? Terrorism affects everyone DEFINITION : Terrorism is the unlawful use of violence or threat of violence to instill fear and coerce governments or societies in pursuit of political goals. Key to understanding the terrorist threat Terrorists must perceive you, your association or your location as a target Exploiting predictability in patterns of behavior Antiterrorism employs situation-based measures to lower your vulnerability Utilizes proper responses to threat action

Terrorist Planning Cycle

TERRORIST PLANNING CYCLE INTERVENTION OPPORTUNITIES

TERRORIST PLANNING CYCLE Intelligence and Surveillance Efforts can occur quickly or over years Desired information include guard forces, physical layout, personnel routines, and standard operating procedures Overt or covert means What You Can Do Observe Report Deter

TERRORIST PLANNING CYCLE Pre-Attack Surveillance and Planning Repeated returns to site to gain additional information and confirm previous details Dry rehearsals Soft targets with high-payoff are the most lucrative targets What You Can Do Observe Report Deter

TERRORIST PLANNING CYCLE Actions on Objective Terrorists possess the initiative Security personnel placed on the defensive What You Can Do React Minimize effects of attack

REVIEW What are the 7 Stages of the Terrorist Planning Cycle? 1. Broad Target Selection 2. Intelligence and Surveillance 3. Specific Target Selection 4. Pre-attack Surveillance and Planning 5. Attack Rehearsal 6. Actions on the Objective 7. Escape and Exploitation

Operational Responses to Terrorism

MANAGEMENT Threat Assessment Identify Threats to Housing Area or Stand-alone Facility Level I and Level II Attacks VBIED Small-arms Attack

MANAGEMENT Countermeasure Implementation VBIED / Ram Barrier Plan Active Barriers Passive Barriers Small-arms Attack Entry Control Point Standoff Ballistic Windows Cover and Concealment Insider Threat Behavioral Indicators Psychiatric Exams Avoid Predictable Security Patterns Random Antiterrorism Measures

MANAGEMENT Establishing Rules of Engagement and Use of Force Step 1: Establish hostile acts. An attack or use of force against security forces that impedes your mission / duties. Step 2: Establish hostile intent. The threat of imminent use of force to commit a hostile act. Step 3: You may use force, including deadly force to protect Yourself, fellow employees and innocent bystanders Detainees in your custody Theft of firearms, ammunition and explosives Nothing should limit the inherent authority and obligation to take necessary actions to defend yourself, fellow employees and innocent bystanders Step 4: Establish Escalation of Force (next slide) Step 5: Detainees: You may stop, detain, search, and disarm persons as required to protect your facility and employees. Establish turnover procedures for detainees to the proper authorities.

MANAGEMENT Escalation of Force Less-lethal vs. Deadly Force

MANAGEMENT Random Antiterrorism Measures Monday Tuesday Wednesday Thursday Friday Saturday EXAMPLE Random Vehicle Inspections ID checks ID checks Increase walking patrols Close Gate and emplace barriers Random Vehicle Inspections

MANAGEMENT Activity Reporting Chain of Reporting Define Suspicious Activity People drawing or measuring buildings Strangers asking questions about security forces or security procedures A briefcase, suitcase, backpack or package left behind Cars or trucks left in No Parking zones in front of important buildings Intruders found in secure areas A person wearing clothes that are too big and bulky and/or too hot for the weather Chemical smells or fumes Unsure? Report! SECURITY PATROLS FIRST-LINE SUPERVISOR INTEL ASSETS

Tactical Responses to Terrorism

AWARENESS TRAINING PURPOSE OF AWARENESS TRAINING AT THE TACTICAL LEVEL Prevent terrorist attacks by observing indicators and vulnerabilities in the protection posture Must be centralized at the supervisor or management level Drug Activity Petty Crime Violent Crime Escalation of Violence (not all inclusive; not necessarily sequential Association with Violent Groups Suicide / Murder Violent Extremist/Terrorist Activity

Fundamentals of Surveillance

SURVEILLANCE DETECTION FUNDAMENTALS Surveillance on Individuals Residential security measures Modes of travel Routes and times of travel Typical Behavior Surveillance on Facility or Assets General security posture Security standard operating procedures Information on security force shift rotations Physical security weaknesses Reaction times to emergencies

SURVEILLANCE DETECTION FUNDAMENTALS Signs of Surveillance People loitering in or coming back to the same general area without a legitimate reason People that appear preoccupied with a specific building or area, to include taking pictures, making notes, or drawing sketches Certain civilian vehicles that seem to appear repeatedly Electronic audio and video devices in unusual places or that are not DoD/G4S/security property Singapore Plot Surveillance Video: https :// www.youtube.com/watch?v=WgGrh-oQ9kI

SURVEILLANCE DETECTION FUNDAMENTALS Tools used in Surveillance Cell phones Security information on the internet Casual questioning

SURVEILLANCE DETECTION FUNDAMENTALS Scenario 1 You are on shift and notice a man on the sidewalk outside the compound taking pictures of the entry control point with his cell phone. You know this activity is unusual and that you should make note of the activities. What do you do? Select the Correct Response Wait until he finishes his activities then follow him. Do nothing, he’s just a tourist. Note the man’s description and immediately provide this information to unit security or management.

SURVEILLANCE DETECTION FUNDAMENTALS Scenario 2 While conducting a walking patrol you overhear a conversation between a man and a woman. The woman is asking questions such as how many security patrols are on shift at one time, how many tenants are affiliated with the US, what type of work the tenants perform. What do you do? Select the Correct Response Note the woman’s description and continue back to the office and immediately report the incident to unit security or management. Approach the woman and answer the questions with misleading information. Do nothing, it is just a casual conversation.

Insider Threat

INSIDER THREAT Common Causes of Insider Threats Motivated by perceived injustices upon oneself or against a group Desire to further a political or religious agenda The need for excitement Insider threats can consist of: Terrorist attacks Mental instability Espionage Negligance Preconditions include: Opportunity Motive Ability to overcome inhibitions Trigger Point Aaron Alexis, Washington Naval Yard Shooter

INSIDER THREAT Pre-Attack Indicators Aggression towards co-workers Presence of unauthorized weapons Associations with known extremist groups Distribution of propaganda materials in support of extremist position Repeated violation of policies Mental Indicators Abnormal mood swings or depression, withdrawn behavior, decrease in hygiene and/or paranoia Abuse of alcohol or drugs Talk of suicide Intense anxiety in social situations ALERT security personnel if these indicators exist!

Active Shooter Response Fundamentals

ACTIVE SHOOTER RESPONSE INCIDENTS An average of 11.4 annually 70.0% occurred in commerce/business or educational environment Shootings in 40 of 50 states and District of Columbia 60.0% of the incidents ended before law enforcement arrival Total Victims: 1,043 Single-shooter prevalent WHY IS ACTIVE SHOOTER RESPONSE TRAINING IMPORTANT?

ACTIVE SHOOTER RESPONSE INCIDENTS Virginia Polytechnic Institute and State University Blacksburg, Virginia 2007 Fort Hood Soldier Readiness Processing Center Fort Hood, Texas 2009. Sandy Hook Elementary School Newtown, Connecticut 2012 Cinemark Century 16 Theater, Aurora, Colorado 2012

ACTIVE SHOOTER INCIDENT FBI RUN, HIDE, FIGHT Video Initiative ( Surviving an Active Shooter ): https :// www.youtube.com/watch?v=5VcSwejU2D0

ACTIVE SHOOTER RESPONSE IDENTIFY Location Number of shooters Type of Weapons utilized CALL FOR BACKUP Call 999 for assistance Upon arrival of second security member, engage the shooter(s) NEUTRALIZE Neutralize the threat FIRST Provide assistance to injured bystanders Encourage those capable to RUN, HIDE, FIGHT RECOGNIZE SIGNS FOR HIGH RISK BEHAVIOR Increase use of alcohol or drugs Unexplained increase in absenteeism Depression or withdrawal from social circles Increase in severe mood swings and noticeably unstable or emotional responses Increasingly talks about personal problems or problems at home Increase in unsolicited comments about violence, firearms, or violent crimes

ACTIVE SHOOTER BYSTANDER RESPONSE EVACUATE Have an exit route plan in mind Leave belongings behind Keep your hands visible HIDE Hide in an area out of the Active Shooter’s view Lock doors and block entry to your hiding place TAKE ACTION As a last resort Only when your life is in imminent danger Attempt to incapacitate the Active Shooter WHEN POLICE ARRIVE (non-law enforcement entities Obey all Police instructions Keep hands visible at all times Do not stop to ask officers for help or direction while evacuating

Questions “We need to win everyday, the terrorist only needs to win once.”

REFERENCES AR 525-13 , Antiterrorism 11 September 2008 Burnishing the Steel, Department of Defense Antiterrorism Strategic Initiative Phase III 2013-2016 FBI Officer of Partner Engagement, A Study of Active Shooter Incidents in the United States Between 2000 and 2013 iWatch , Office of the Provost Marshal General ** For AT level 1 awareness training (CAC and non-CAC ID holders) visit http://jko.jten.mil/
Tags