Vous êtes sur la page 1sur 307

MCI 02.

10b

MARINE CORPS INSTITUTE

TERRORISM AWARENESS
FOR MARINES

MARINE BARRACKS
WASHINGTON, D.C.
UNITED STATES MARINE CORPS
MARINE CORPS INSTITUTE
912 POOR STREET SE
WASHINGTON, DC 20391-5680
IN REPLY REFER TO:

02.10b
13 Aug 96

MCI 02.10b TERRORISM AWARENESS FOR MARINES

1. Purpose. MCI course 02.10b, Terrorism Awareness for Marines, has been published as part
of the Marine Corps program to combat terrorism.

2. Scope. MCI 02.10b addresses the basics of terrorism. This course provides procedures for
minimizing an individual's susceptibility to terrorist attack at work, at home, while traveling, and
on liberty. Also presented are effective measures Marines can use if taken hostage by a terrorist
group. These measures are in keeping with DOD amplifying instructions regarding the Code of
Conduct, but this course is not intended as a tactical unit guide for combating terrorism within a
low intensity conflict arena.

3. Applicability. This course is for instructional purposes only. It is applicable to all Marines,
regardless of grade or rank.

4. Recommendations. Comments and recommendations on the contents of this course are


invited and will aid in subsequent course revisions. Please complete the Course Evaluation
Questionaire located at the end of the text and return it to:

Director (CDD# 1)
Marine Corps Institute
Arlington, VA 22222-0001

R. A. CHRISTIE
Lieutenant Colonel, U.S. Marine Corps
Deputy Director
TERRORISM AWARENESS FOR MARINES

CONTENTS

Page

Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i

Student Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v

Study Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii

Study Unit 1 Terrorism: The Basics

Lesson 1 Background of Terrorism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1


Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9
Lesson 2 The Motives and Objectives of Terrorism . . . . . . . . . . . . . . . . . . . 1-11
Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-16
Unit Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-17

Study Unit 2 Terrorist Doctrine

Lesson 1 Terrorist Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1


Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-10
Lesson 2 Organization of Terrorist Groups . . . . . . . . . . . . . . . . . . . . . . . . . 2-15
Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-20
Unit Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-22

Study Unit 3 Terrorist Groups by Global Region

Lesson 1 Terrorist Groups of Europe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1


Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9
Lesson 2 Terrorist Groups of Asia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-14
Lesson 3 Terrorist Groups of the Middle East . . . . . . . . . . . . . . . . . . . . . . . 3-15
Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-23
Lesson 4 Terrorist Groups of the Americas . . . . . . . . . . . . . . . . . . . . . . . . . 3-25
Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-39
Unit Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-42

i
CONTENTS--cont'd

Page

Study Unit 4 Meet the Threat

Lesson 1 Is There a Terrorist Threat? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1


Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
Lesson 2 Evaluating the Threat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8
Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-14
Lesson 3 Assigning a Threat Level or Condition . . . . . . . . . . . . . . . . . . . . . 4-17
Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-24
Unit Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27

Study Unit 5 Prepare for Assignment to a Threat Region

Lesson 1 Appropriate Legal Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-1


Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-5
Lesson 2 Prepare Mentally for Assignment to a Threat Region . . . . . . . . . . 5-7
Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-15
Lesson 3 Prepare Physically for Assignment to a Threat Region . . . . . . . . . 5-18
Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-22
Unit Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-24

Study Unit 6 Countering the Threat--Part I

Lesson 1 Individual Protective Measures . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1


Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-19
Lesson 2 Daily Preventive Checks and Commuting Tips . . . . . . . . . . . . . . . 6-24
Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-42
Unit Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-49

Study Unit 7 Countering the Threat--Part II

Lesson 1 Peacetime Detention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1


Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-6
Lesson 2 The Hostage and the Code of Conduct . . . . . . . . . . . . . . . . . . . . . 7-9
Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-13
Unit Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-15

ii
CONTENTS--cont'd

Page

Study Unit 8 Antiterrorism Program

Lesson 1 United States Policy Concerning Terrorism . . . . . . . . . . . . . . . . . 8-1


Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-6
Lesson 2 Crisis Management and the Crisis Management Force . . . . . . . . . 8-8
Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-23
Unit Exercise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-28

Review Lesson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . R-1

Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

iii
STUDENT INFORMATION

TITLE &
NUMBER: TERRORISM AWARENESS FOR MARINES MCI 02.10b

STUDY
HOURS: 8

COURSE
MATERIALS: Text

REVIEW
AGENCY: Naval and Marine Corps Intelligence Training Center
Dam Neck, Virginia Beach, VA 22461-5575

RRC: 3 Reserve Retirement Credits

ACE: To be reviewed by the American Council on Education during 1997.

ASSISTANCE: For administrative assistance, have your training officer or NCO use the Unit
Activity Report (UAR) or MCI Hotline: DSN 288-4175 or commercial (202)
433-4175.

For assistance concerning course content matters, have your training officer or
NCO call the instructor at DSN 288-3604 or commercial (202) 433-3604.

v
STUDY GUIDE
BEGINNING Before you actually begin this course of study, read the Student
YOUR Information page. If you find any course materials missing, notify
COURSE your training officer or training NCO. If you have all the required
materials, you are ready to begin.

To begin your course of study, familiarize yourself with the


structure of the course text. One way to do this is to read the
Table of Contents. Notice the Table of Contents covers specific
areas of study and the order in which they are presented. You will
find the text divided into several study units and a review lesson.
Each study unit is composed of two or more lessons, lesson or unit
exercises, and exercise solutions and references.

LEAFING Leaf through the text and look at the figures and tables. Read a
THROUGH few lesson exercise items (questions) to get an idea of the type of
THE TEXT items in the course. If the course has additional study aids, such as
a handbook or a plotting board, familiarize yourself with them.

TURNING TO Turn to the first page of Study Unit 1. On this page you will find
THE FIRST an introduction to the study unit and generally the first study unit
STUDY UNIT lesson. Study unit lessons contain learning objectives, lesson text,
and exercises.

READING THE Learning objectives describe in concise terms what the successful
LEARNING learner, you, will be able to do as a result of the lesson text. Read
OBJECTIVES the objectives for each lesson and then read the lesson text. As
you read the lesson text, make notes on the points you feel are
important.

COMPLETING To determine your mastery of the learning objectives and text,


THE complete the exercises developed for you. Exercises may be within
EXERCISES in a lesson, at the end of a lesson, or at the end
of a study unit. Without referring to the text, complete the exercise
items and then check your responses against those provided.

CONTINUING Continue on to the next lesson, repeating the above process until
TO MARCH you have completed all lessons in the study unit. Follow the same
procedure for each study unit in the course.

viii
STUDY GUIDE, continued

SEEKING If you have problems with text or exercise items that you cannot
ASSISTANCE resolve, ask your training officer or training NCO for assistance.
If they cannot help you, request assistance from your MCI distance
training instructor by completing the Content Assistance Request
Form (CCAR) located at the back of the course.

THE When you finish all the study units, complete the review lesson
REVIEW exam located at the end of the course text. Try to complete the
LESSON review lesson exam without referring to the text. For those items
EXAM you are unsure of, restudy the text. When you finish the review
lesson exam and are satisfied with your responses, check your
responses against the answer key provided with your course
materials.

PREPARING To prepare for your final exam, you must review what you learned
FOR THE in the course. The following suggestions will help make the review
FINAL EXAM interesting and challenging.

CHALLENGE YOURSELF. Try to recall the entire learning


sequence without referring to the text. Can you do it? Now look
back at the text to see if you have left anything out. This review
should be interesting. Undoubtedly, you’ll find that you were not
able to recall everything. But with a little effort, you’ll be able to
recall a great deal of the information.

USE UNUSED MINUTES. Use your spare moments to review.


Read your notes or a part of a study unit, rework exercise items,
review again; you can do many of these things during the unused
minutes of every day.

APPLY WHAT YOU HAVE LEARNED. It is always best to use


the skill or knowledge you’ve learned as soon as possible. If it isn't
possible to actually use the skill or knowledge, at least try to
imagine a situation in which you would apply this learning. For
example, make up and solve your own problems. Or, better still,
make up and solve problems that use most of the elements of a
study unit.

ix
STUDY GUIDE, continued

USE THE “SHAKEDOWN CRUISE” TECHNIQUE. Ask a


fellow Marine to lend a hand by asking you questions about the
course. Give him a particular study unit and let him “fire away.”
This technique can be interesting and challenging for both of you!

MAKE REVIEWS FUN AND BENEFICIAL. Reviews are good


habits that enhance good learning. They don’t have to be long and
tedious. You may find that several short reviews are more
beneficial.

TACKLING THE When you complete your study of the course material and are
FINAL EXAM confident with the results attained on your review lesson(s), take
the sealed envelope marked "FINAL EXAM" to your unit training
NCO or training officer. Your training NCO or officer will
administer the final exam and return the exam and answer sheet to
MCI for grading. Before taking your final exam, read the
directions on the NEW (generic DP-37) answer sheet carefully and
complete all requested information.

COMPLETING The sooner you complete your course, the sooner you can better
YOUR yourself by applying what you’ve learned! HOWEVER--you do
COURSE have 12 months from the date of enrollment to complete this
course. You may be granted one 6-month extension if it’s
approved by your commanding officer. If you need an extension,
please complete the Student Request/Inquiry Form (MCI-R11)
located at the back of the course, and deliver it to your training
officer or training NCO.

GRADUATING! As a graduate of this distance training course and as a dedicated


Marine, your job performance skills will improve, benefiting you,
your unit, and the Marine Corps.

Semper Fi!

x
STUDY UNIT 1

TERRORISM: THE BASICS

Introduction. Terrorism is not new. In 50 B.C., Julius Caesar encouraged taking hostages
to ensure the obedience of conquered tribes. Terrorism came into widespread use during
the French Revolution. During the Reign of Terror, over 300,000 people were arbitrarily
arrested and 17,000 were executed without a trial. Terrorism is a fact of contemporary life.
Even though the occurrence may be sporadic, terrorism remains a serious and deadly
problem. As a Marine, you can reasonably expect to come into contact with terrorism or
the residual affects of a terrorist action. As the Marine Corps continues to operate in
diverse environments, the possibility of the individual Marine coming into contact with
terrorism and its influences become excellent. In this study unit, you will learn the definition
of terrorism as stated in FMFM 7-14, Combating Terrorism. You will also learn the
intermediate and long-term objectives of terrorism. Keep in mind we will take a
step-by-step approach in developing your knowledge of terrorism awareness. Let's begin!

Lesson 1. BACKGROUND OF TERRORISM

LEARNING OBJECTIVES

1. State the definition of terrorism as presented in FMFM 7-14, Combating Terrorism.

2. Define the term terrorist group.

3. Identify the three psychological categories of terrorists.

In this lesson, you will learn the meaning of terms that will establish the foundation you need to
help you in counteracting terrorism. As a Marine, you in many cases are more likely to witness or
experience terrorist acts. The following definitions will enable you to clearly understand the terms
associated with terrorist acts.

1101. Define Terms Associated with Terrorism

a. Terrorism. Terrorism is the calculated (unlawful) use of violence or threat of violence to


inculcate fear (by impressing upon the mind through frequent repetition or persistent urging);
intended to coerce or to intimidate governments or societies in the pursuit of goals that are
generally political, religious, or ideological. As Marines, this gives us a jumping off point as to
how we should view terrorists and terrorism. We apply it whether developing a simple awareness
of terrorism or in our counteractions against terrorists. See how well you remember the definition
of terrorism by performing the following challenge.

1-1
Try this challenge.

Write the definition of terrorism.

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

If your answer is the "calculated (unlawful) use of violence or threat of violence to inculcate fear;
intended to coerce or to intimidate governments or societies in the pursuit of goals that are
generally political, religious, or ideological" that is right. Congratulations! If your answer is
different, go back and study paragraph 1101.

b. Terrorist. A terrorist is one who advocates, creates, or practices the use of terror for a
means of coercion. When you hear the word terrorist, your concept of the word may vary. This
is not unnatural. The characteristics and traits of each terrorist may vary. There are terrorists
who are much closer than you may realize. What about those individuals who are here in the
United States? For example, the animal rights activists who intentionally throw blood on fur
coats while the owners are still wearing them or the "ecologically-minded" individual who drives
metal spikes into trees which are scheduled for harvest in an attempt to destroy the chainsaw
blades of the loggers. Are these individuals terrorists by the definition? It has been written that
one man's terrorist is another man's martyr. It all depends on the individual's or group's position
toward the government. The radical peace group illustrated in figure 1-1 may be viewed by one
group of people as terrorist while another group views them as concerned citizens.

Fig 1-1. A radical peace group.

1-2
Now, define terrorist in this challenge to make sure that you know the meaning.

Write the definition of a terrorist.

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

_____________________________________________________________________

If your answer is "a terrorist is one who advocates, creates, or practices the use of terror for a
means of coercion" you are correct; you may continue. If your answer is different, review
paragraph 1101 before continuing.

c. Terrorist Profile. Although it is difficult to generalize about a terrorist's character and


motivation, a profile has been developed. Typically, terrorists are intelligent, well-educated,
obsessed with initiating a change in the status quo, reared in middle class or affluent families, and
22 to 25 years old. The ability to develop a terrorist profile gives us a clearer image of the enemy
and dispels dangerous misconceptions.

d. Terrorist group. A terrorist group is an organization of like-minded individuals who use


terror as a means of influencing or intimidating others, governments, and societies with the intent
of bringing about the groups desired outcome. Although there has been no apparent worldwide
conspiracy, a trend toward cooperation has developed among terrorist groups. This includes
sharing resources, expertise and safe havens, and participating in joint operations. You will learn
more about terrorist groups later in the course.

Try the next challenge.

(Fill in the blank)

A terrorist group is an organization of _________________________ individuals who

use terror as a means of influencing or intimidating others, governments, and societies

with the intent of bringing about the group's desired outcome.

If your answer matches the one below, you are correct. You may continue. If not, review
paragraph 1101d before continuing.
1-3
"A terrorist group is an organization of like-minded individuals who use terror as a means of
influencing or intimidating others, governments, and societies with the intent of bringing about the
group's desired outcome."

(1) National terrorist. A national terrorist group is one that operates in and aspires to
political power within a single nation. An example of this type is the Red Brigade.
The Red Brigade is associated with Italy because that is where it operates most of the
time. This group received a lot of attention when it kidnapped Premier Aldo Moro
and Brigadier General Dozier. The Dozier incident was categorized as the beginning
of the fifth phase of Red Brigade operations, the move to target other than Italian
personnel or property. In December 1981, the Red Brigade themselves termed this
phase as the beginning of the struggle against the "imperialist war."

(2 Transnational terrorist. A transnational terrorist group is one that operates across


national borders. The Popular Front for the Liberation of Palestine (PFLP) is an
example of this type of group. An offshoot of the PLO, this group has operated all
over the world against what it terms "Zionism." The PLO began gaining notoriety in
the late 1960's after the Six Day War of 1967. After this war, the PLO and its
rejectionist arm, the PFLP, were the only forces in the Arab world able to carry the
war to the Israelis. They did this first by carrying out small scale raids into Israel and
they then turned to hijacking airliners. On September 5, 1976, the Italian police
arrested five members armed with two Soviet Strela (SA-7 Grail) surface-to-air
missiles. The terrorists had rented an apartment in a house on the flight path to Rome
International Airport and were planning to shoot down an Israeli EL AL airliner. As
you can see, the terrorists crossed many national boundaries.

(3) International terrorists. International terrorists are terrorist groups controlled by a


sovereign state and that represents that state's interests. This type of terrorist group
is similar to the transnational terrorist in that it crosses national borders. It is different
from transnational terrorists because it is controlled or directed by specific sovereign
governments. An example would be the Libyan hit teams. Colonel Qadhafi has used
"hit men" to assassinate his own citizens living in foreign countries who refuse to
come home to Libya. After the United States Navy shot down two Libyan SU-22
fighter aircraft over the Gulf of Sidra, concern mounted about the possibility that the
hit squads would attack a segment of U.S. political leadership. Another example is
the Hezbollah faction of the Islamic Jihad Organization (IJO) which is supported and
receives direction from the government of Iran.

(4) Government Affiliation. A terrorist group's selection of targets and tactics is also a
function of the group's governmental affiliation. In addition to being categorized by
its operational characteristics (national, transnational, and international), a terrorist
group is also categorized by government affiliation. This helps security planners
anticipate terrorist targets and the sophistication of a terrorist group's intelligence and
weaponry. Three general categories of government affiliation are as follows:

1-4
(a) Nonstate supported. A nonstate supported terrorist group operates
autonomously, receiving no significant support from any government.

(b) State Supported. A state supported terrorist group generally operates


independently but receives support from one or more governments.

(c) State Directed. A state directed terrorist group operates as an agent of a


government. In return, the government provides substantial intelligence,
logistics, and operational support to the terrorist group.

1102. Identify the Three Psychological Categories of Terrorists

Not all terrorist acts are committed by hard-core political terrorists; many are committed by
criminals seeking personal rather than political gain. Some individuals commit terrorist acts
because they are mentally ill. Persons or individuals who are responsible for terrorist acts
generally fall into one of three categories as defined by Frederick J. Hacker in his book titled
Crusaders, Criminals, and Crazies. To understand the categories, we should begin by defining
each of them.

a. Crusaders. Crusaders are ideologically inspired individuals or groups (political terrorists)


who want prestige and power for a collective goal or a higher cause. Many crusaders have
extensive prison records. Often, the indoctrination and training of new terrorists start while they
are still confined. The crusader type terrorist may also be mentally ill, suffering from an antisocial
personality or other forms of psychiatric disturbances. These people see membership in a
crusader group as an opportunity to engage in violent behavior. Some crusaders have a
pathological need for the support and identification provided by group membership. Figure 1-2
shows a group of crusader type terrorists.

Fig 1-2. A group of crusader type terrorists.

1-5
Terrorists of the crusader mentality are the type to carry out the following operations:

(1) Bombing. The tactic used most commonly by terrorists is bombing. The bomb is a
popular weapon because it is inexpensive and easy to produce, adaptable to a variety
of uses, and difficult to detect or trace after the incident. There are three factors to
consider when discussing bombing: delivery, activation, and usage.

(b) Assassination. Historically, terrorists have killed individuals for psychological


effect. Expect continued use of this type of operation due to its impact.

(c) Armed attacks. Military-type assaults against a specific target are carried out
by terrorist groups to promote fear or obtain equipment such as weapons.

(d) Kidnapping. Kidnapping is a preferred terrorist tactic. Kidnapping prominent


personnel can force a government to give in to terrorist demands. A
kidnapping could easily turn into a hostage barricade situation.

(e) Skyjacking. Skyjacking provides terrorists with hostages and draws media
attention. Aircraft theft provides terrorists with a tool for a possible kamikaze
attack.

(f) Violent demonstrations. Protests that turn violent promote fear in the civilian
population and cause the government to react.

(g) Property destruction. Often the purpose of a violent demonstration is to


destroy private or government property.

(h) Sabotage. Destruction of property or obstruction of government or commercial


operations.

b. Criminals. Criminals are used to garnish terrorist operational funds. While not considered a
terrorist act, criminal "fund raising" is essential for financing terrorist activity. Criminals use some
of the following methods to achieve their goals:

(1) Deception. Criminals use a variety of deceptive measures to obtain money from
innocent citizens. Selling stolen goods as new or using counterfeit credit cards are
examples of criminal deception.

(2) Diversion. Criminal groups sometimes create a disturbance in one area enabling them
to carry out illegal activities in another.

(3) Theft. Some criminal groups obtain their finances from outright stealing.

(d) Fraud. Cheating people out of their property is a common criminal tactic.

1-6
(e) Extortion. Selling property insurance is an often used criminal tactic. A group might
demand that a business buy insurance against property destruction. If the business
owner refuses, the criminals damage the property.

(f) Hijacking. The hijacking of vehicles for the purpose of selling or trading is a favorite
tactic of criminal groups.

(g) Corruption. Paying politicians to look the other way is a long standing criminal way
of doing business.

(h) Burglary. Breaking into buildings to steal provides a source of income while at the
same time creates fear in the neighborhood.

(i) Assault. Physical attacks against a single person or group of people is a means to
obtain money or property.

(j) Forgery. Criminal groups sometimes produce fake art or official documents to sell or
use in illegal activities.

(k) Drug sales. Selling drugs has always been a profitable business.

(l) Bombing.

c. Crazies. Crazies may be the most difficult of all terrorists to deal with. Many are impulsive
and unpredictable. Others are compulsive and plan their actions in great detail. Some crazies are
delusional, believing they are agents of God, or even God himself. The characteristics of these
individuals are of a wide range. However, many of them are persuasive and strong minded.
Crazies include the following personality types:

(1) Disoriented persons. People with mental disorders usually operate with little or no
normal organization except for those involved in a cult. Dedication, discipline, and
willingness to kill and die for the cause range from very high to low for the
disoriented person. The Unibomber is a good example of a disoriented person type
terrorist in the 1980s and 1990s. Disoriented persons may use some of the following
methods to carry out their plans:

(a) Bombing.

(b) Arson. Incendiary devices are cheap and easy to hide. Terrorists use arson to
draw a crowd, which in turn provides them with the opportunity to use
explosives or other weapons.

(c) Skyjacking.

1-7
(d) Hostage-taking. Hostage-taking is overt and designed to attract and hold
media attention. The terrorists' intended target is the audience affected by the
hostage's confinement, not the hostage.

(e) Multiple homicides. The random killing of strangers has become more
common in recent times. Recently, lone gunmen have entered fast food
restaurants and started shooting, killing several people.

(f) Sabotage.

(g) Fraud.

(2) Disgruntled employees. Disgruntled employees usually operate alone except for
organized labor strikes. They are usually motivated by an employment-related
problem such as being passed over for promotion. Although disgruntled employees
normally have little desire to kill, some do.

Some tactics used by disgruntled employees are

(a) Bombing.

(b) Sabotage.

(c) Theft.

(d) Intrusion. When unstable persons are fired, they sometimes enter a former
place of employment to cause damage.

(e) Property destruction. An unstable person wanting to get back at his former
boss may attempt to destroy his former boss's home or business.

(f) Vandalism. There have been cases of computer programmers inserting viruses
into computer systems after being laid off or fired.

Try this challenge.

List (in any order) the three psychological categories of terrorists.

a. ______________________ c. _____________________

b. ______________________

Your answers (in any order) should be crusaders, criminals, and crazies. If you answered
correctly, you may continue. If not, review paragraph 1102 before continuing.
1-8
All of the operations listed in this lesson have been used in the past and will be used by terrorists
in the future. Terrorist attacks may be a single operation or a combination, such as a bombing in
conjunction with an armed attack leading to the kidnapping of a government official.

You now have a basic understanding of the actions used by terrorists. You also know that
terrorists can be cataloged as being crusaders, criminals, or crazies. You have learned that each
category can be further broken down to better classify terrorists. For the remainder of this lesson,
you will obtain the knowledge necessary to build a strong background in terrorist operations.

Lesson Summary. During this lesson, you learned the definitions of terrorism, terrorist, and
terrorist group. You also learned to identify the three terrorist categories and to recognize the
characteristics of each. The next lesson addresses the basic motivations for terrorism, and the
intermediate and long term objectives of terrorism.

-----------------------------------------------------------------

Lesson Exercise: Complete items 1 through 4 by performing the action required. Check your
responses against those listed at the end of this lesson.

1. Define terrorism.

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

2. Define the term terrorist.

____________________________________________________________________

3. Define the term terrorist group.

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

1-9
4. State (in any order) the three psychological categories of terrorists.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

Lesson 1 Exercise Solutions

Reference

1. The calculated (unlawful) use of violence or threat of violence 1101


to inculcate fear; intended to coerce or to intimidate
governments or societies in the pursuit of goals that are
generally political, religious, or ideological.
2. An advocate or one who creates or practices the use of terror 1101
for the means of coercion.
3. An organization of like-minded individuals who use terror 1101
as a means of influencing or intimidating others, governments,
and societies with the intent of bringing about the group's
desired outcome.
4. (In any order)
Crusaders 1102
Criminals
Crazies

1-10
Lesson 2. THE MOTIVES AND OBJECTIVES OF TERRORISM

LEARNING OBJECTIVES

1. State the four motives for terrorism.

2. State the intermediate objectives of terrorism.

3. State the long-term objectives of terrorism.

1201. Identify the Four Motives for Terrorism

You, as a Marine, should ask yourself, "What motivates a terrorist?" Think about this question
for a moment. If your thoughts include any of the following reasons, you are on track. Terrorists
are motivated by political ideology, nationalism, religion, and special interests. Each form of
motivation is discussed in the paragraphs that follow.

a. Political ideologies. Political ideologies range from the far left to the far right. Politics of
the extreme left come in many forms. Marxists/Leninists believe in a revolution of urban
workers led by a group of revolutionary elite who will establish a communist state. Under the
Marxist/Leninist state there is no private ownership of property nor does it allow workers control
of production. Maoists also want a communist state, but they hope to achieve it by mobilizing the
peasants. On the right, fascists stress the importance of the state above the rights of the people.
A dictatorship of the far right is typically sustained by merging state and business leadership.
Belligerent nationalism also plays an important role in fascism and foreigners and minorities are
scorned.

b. Nationalism. Nationalism alone is a strong motivating ideology. People, mostly of the


same background, are bound together by the nationalistic urge to establish or regain a homeland.

Example: The Basque people of Spain and France share a common ethnic background.
They are motivated by a nationalistic urge to establish a homeland in the
Pyrenees mountains.

c. Religion. Religion has driven many of the violent acts in recorded history. Religion
motivated the Moslem Brotherhood, a fundamentalist Sunni group that murdered Anwar Sadat;
the Hezbollah or Party of God, a radical Shiite group that followed the Ayatollah Khomeini; and
the Ulster Defense League, a Protestant group based in Northern Ireland.

d. Special interests. There are many known special interest groups. In this country alone, the
number is increasing daily. Although many of the groups may have some valid arguments, their
approaches to expressing their concerns are not. As a result, such groups are labeled as terrorist
groups. Therefore, it is safe to say that special interest groups with legitimate causes may include
radical fringes.

1-11
People use terrorism to advance anti-abortion views, animal rights, and radical environmentalist
issues.

You are now ready for the challenge. Try it!

What are the motives for terrorism?

a. ___________________________ c. ____________________________

b. ___________________________ d. ____________________________

If your answers includes (in any order) political ideology, nationalism, religion, and special
interest, you are correct. Continue. If your answers are incorrect, review paragraphs 1201 before
continuing.

1202. Identify the Intermediate Objectives of Terrorism

Rarely does one act of terrorism achieve a group's long-term goals. Each act usually achieves a
specific goal. This goal may satisfy an immediate concern or may be a step in achieving a
long-range goal. It is your responsibility as a Marine to discern such activity. The following are
all intermediate objectives of terrorism; study them and remember their purposes.

a. Recognition. Terrorists seek to obtain worldwide, national, or local recognition for their
cause. This vital publicity advertises the movement, bringing national and international attention
to their grievances. It attracts money, international sponsorship, and recruits to their cause.

b. Overreaction by the government. This occurs when the government overreacts by making
special antiterrorist laws that allow searching without warrants, holding people in custody without
charges, or modifying the rules of evidence. People view these acts as violations of their rights,
creating an atmosphere more sympathetic to the terrorist.

c. Harassment, weakening, or embarrassment of government security forces. Calling in false


alarms, killing security personnel, and conducting sophisticated raids and ambushes reduce the
effectiveness of security forces and erode public confidence.

d. Theft or extortion of money or equipment. To support their causes, terrorists resort to theft
or extortion of money and equipment, especially weapons and ammunition, vital to their cause.
Major acts or a successful terrorist campaign can also attract foreign support.

e. Destruction. Often the public views the destruction of a building or disruption of lines of
communication as the final goal of terrorism. Just the opposite is true. By destroying facilities or
disrupting lines of communication the terrorist draws more attention to the cause.

1-12
f. Discourage foreign investment or assistance programs. If achieved, the target country's
economy can be affected. Unemployment rises; revenues fall. This results in a loss or prestige
and solvency leading to internal dissent.

g. Influence government decisions, legislation, or other decisions. The best example of this
objective is the bombing of the Marine Battalion Landing Team Headquarters in Beirut,
Lebanon. This October 1983 bombing forced the withdrawal of the Marines from Lebanon.
Another example is the Red Brigade's attempts to influence law enforcement and judicial process
in Italy. The Red Brigade killed public officials and judges known to be hard on terrorists. The
sole purpose of this intermediate objective is to influence government decisions, legislation, or
other decisions to support the cause of the terrorist.

h. Free prisoners. Freeing prisoners is a frequent demand of terrorists, especially airline


hijackers. Usually the demand is for the release of fellow terrorists who have been imprisoned or
are waiting trial.

i. Satisfy vengeance. The most brutal acts of terrorism are reserved for informants or other
traitors. The Irish Republican Army is very brutal when punishing its members. Vengeance may
also be of an international nature; such as the revenge sought by the Armenians against the Turks
for slaughtering Armenians during World War I. See figures 1-3 and 1-4.

Fig 1-3. Upper torso mutilation. Fig 1-4. Lower torso mutilation.

j. Turn the tide in a guerrilla warfare. Terrorism is an integral part of insurgency. In rural
areas, it is usually used to punish government supporters. In urban areas, it can also divert
government troops from the countryside where they are needed to fight guerrillas.

1-13
Try the next challenge.

In any order, list the ten intermediate objectives of terrorism.

a. ________________________________________________________________

b. ________________________________________________________________

c. ________________________________________________________________

d. ________________________________________________________________

e. ________________________________________________________________

f. ________________________________________________________________

g. ________________________________________________________________

h. ________________________________________________________________

i. ________________________________________________________________

j. ________________________________________________________________

If your list contains all of the intermediate objectives listed below, you are correct. Continue. If
not, review paragraph 1202 before continuing.

Intermediate objectives (in any order):

a. Recognition
b. Overreaction by the government
c. Harassment, weakening, or embarrassment of government security forces
d. Destruction
e. Theft or extortion of money or equipment
f. Discourage foreign investment or assistance programs
g. Influence government decisions, legislation, or other decisions
h. Free prisoners
i. Satisfy vengeance
j. Turn the tide in a guerrilla war

1-14
1203. Identify the Long-Term Objectives of Terrorism

All Marines are expected to be well versed in knowing exactly what the terrorist is working to
achieve. Therefore, you must be able to recognize the long-term objectives of terrorism.
Long-term objectives fit into at least one of the following categories: revolutionary,
sub-revolutionary, and establishment. Each is explained in the following text.

a. Revolutionary. The terrorist's goal is revolutionary when his intent is to help bring about
the complete overthrow of an incumbent government. The threat may come from within a
country, such as the Red Brigade in Italy, or from the outside such as the Popular Front for the
Liberation of Palestine (PFLP) with respect to the Israeli government. Some terrorists are
anarchists. Their purpose is to use violence to achieve world revolution and to eliminate all
governments.

b. Sub-revolutionary. The terrorist's goal is sub-revolutionary when it is intended only to


influence a government or other groups of people to change against their will. The sought after
changes are usually of a political, social, or economic nature. The Basque Fatherland and Liberty
(ETA) uses terrorism to cause the Spanish government to grant the Basque people an
autonomous country. Special interest groups such as radical environmentalists want to change
the government policy on specific issues. Their long-term goals also fit into the sub-revolutionary
category.

c. Establishment. When the use of terrorism is directly controlled or at least tolerated by a


particular state to attack enemies of the government, then the long-term goal is categorized as an
establishment. This use of terrorism can be directed at either foreign or domestic enemies.
Foreign targets are those that would be attacked by "hit squads" such as those sponsored by
Libyan dictator Mu'ammar Qadafi.

Try this challenge.

What are the three long-term objectives of terrorism?

a. _______________________ c. _______________________

b. _______________________

The correct answers include (in any order) a. revolutionary, b. sub-revolutionary, and c.
establishment. If your answers are the same, continue. If not, review paragraph 1203 before
continuing.

1-15
Lesson Summary. In this lesson, you learned the four motives of terrorism and the
intermediate and long-term objectives of terrorism. You also learned the purposes for the
motives and the description of each intermediate and long-term objective of terrorism. You just
finished the second lesson in this course. You know the intermediate objectives of terrorism.
These include recognition, government overreaction, harassment of government security forces,
theft or extortion, destruction of facilities or disruption of lines of communication, discouraging
foreign investment or assistance, influencing government decisions, freeing of prisoners, satisfy
vengeance, and turning the tide in a guerrilla war. Study Unit 2 will focus on building a working
knowledge of terrorist operations to include the operational structure of terrorist groups. This
lesson completes Study Unit 1.

-----------------------------------------------------------------

Lesson Exercise: Complete items 1 through 3 by performing the action required. Check your
responses against those listed at the end of this lesson.

1. List the four motives for terrorism.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

d. _______________________________________________________________

2. List five of the ten intermediate objectives of terrorism.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

d. _______________________________________________________________

e. _______________________________________________________________

3. What are the three long term objectives of terrorism?

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

1-16
Lesson 2 Exercise Solutions

Reference

1. Political ideology, nationalism, religion, and special interest 1201


2. In any order, five of the following: 1202
Recognition
Overreaction by the government
Harassment, weakening, or embarrassment of government
security forces
Destruction
Theft or extortion of money or equipment
Discourage foreign investment or assistance programs
Influence government decisions
Satisfy vengeance
Turn the tide in a guerrilla war
3. Revolutionary, sub-revolutionary, and establishment 1203

UNIT SUMMARY

In this study unit, you have established a base from which to work. You are able to define the
terms terrorism, terrorist, and terrorist group. You are able to identify the three terrorist
categories and you can identify the four motives for terrorism. You can identify intermediate and
long-term objectives and apply the purposes of each. In the next study unit, you learn about
concepts associated with terrorist operations. You are now ready for the unit exercise.

-----------------------------------------------------------------
--

Unit Exercise: Complete items 1 through 7 by performing the action required. Check your
responses against those listed at the end of this study unit.

1. Define terrorism.

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

1-17
2. Define the term terrorist.

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

3. Define the term terrorist group.

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

4. List (in any order) the three psychological categories of terrorists.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

5. List the four motives for terrorism.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

d. _______________________________________________________________

1-18
6. List the ten intermediate objectives of terrorism.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

d. _______________________________________________________________

e. _______________________________________________________________

f. _______________________________________________________________

g. _______________________________________________________________

h. _______________________________________________________________

i. _______________________________________________________________

j. _______________________________________________________________

7. What are the three long-term objectives of terrorism?

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

Study Unit 1 Exercise Solutions

Reference

1. The calculated (unlawful) use of violence or threat of 1101


violence to inculcate fear; intended to coerce or to
intimidate governments or societies in the pursuit of
goals that are generally political, religious, or ideological.
2. One who advocates, creates, or practices the use of terror 1101
for a means of coercion.
3. Is an organization of like-minded individuals who use terror 1101
as a means of influencing or intimidating others, governments,
and societies with the intent of bringing about the group's
desired outcome.

1-19
Study Unit 1 Exercise Solutions, continued

Reference

4. Crusaders 1102
Criminals 1102
Crazies 1102
5. Political ideology, nationalism, religion, and special interest 1201
6. (In any order) 1202
Recognition
Overreaction by the government
Harassment, weakening, or embarrassment of government
security forces
Destruction
Theft or extortion of money or equipment
Discourage foreign investment or assistance programs
Influence government decisions
Satisfy vengeance
Turn the tide in a guerrilla war
7. Revolutionary, sub-revolutionary, and establishment 1203

1-20
STUDY UNIT 2

TERRORIST DOCTRINE

Introduction. You witness a drive-by shooting. Could this be a terrorist action? Being
informed may save your life, a fellow Marine's life, or a dependent's life. Study Unit 1
provided you with a basic knowledge of terrorism, identified the meaning of terrorist
groups, and defined terrorist acts. In this study unit, you will learn what is considered a
terrorist operation, the organizational structure of terrorist groups, the most common
actions associated with terrorism, and the similar characteristics of personnel and facilities
that could be the focus of a terrorist operation. Finally, you will learn the categories in
which targets of terrorist operations are divided.

Lesson 1. TERRORIST OPERATIONS

LEARNING OBJECTIVES

1. Define the term terrorist operation.

2. List the different phases of a terrorist operation.

3. State the operations commonly associated with terrorism.

4. State the key characteristic of personnel subjected to terrorist operations.

5. State the different categories of terrorist targets.

2101. Define Terrorist Operation

Terrorist operations are, for the most part, well thought-out and executed. They are usually
carried out by specially trained and organized clandestine elements. Strict security techniques are
followed once a target is selected and team members are not brought together until the final
rehearsal phase just before departure to the target site. You will learn the details of each phase of
the operation later in the course. Now, concentrate on learning the definition of the term terrorist
operation. A terrorist operation is any criminal act carried out by a person or group to gain
attention for a cause by using terror-causing tactics or to raise capital or obtain equipment for
future operations.

2-1
Without looking back, try the challenge.

Define the term terrorist operation.

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

Your answer to the challenge should be a terrorist operation is any criminal act carried out by a
person or group to gain attention for a cause by using terror-causing tactics or to raise capital, or
obtain equipment for future operations. If your answer differs, review paragraph 2102 before
continuing.

2102. State the Five Phases of a Terrorist Operation

Since you have knowledge of the meaning of the term terrorist operation, you should now focus
on identifying and understanding the five phases of a terrorist operation. Study and remember the
five phases.

a. Pre-incident phase. Pre-incident activities by terrorist groups are meticulously planned.


They include reconnaissance missions, lengthy periods of training, and rehearsals. Plans are
conceived and prepared by command elements. You will learn more about command elements
later in the course. Target and area reconnaissance missions are conducted by small, special units.
It is often the case where the different elements of the group will work independent of the other
without knowing members of either team until just before the operation takes place.

b. Initiation phase. This is the movement to target phase. Movement to the target is covert.
Individual terrorists leave for the target singly or in pairs along separate routes. When necessary,
they use false passports and names. Weapons and other items are sent separately to prearranged
locations where they are given to terrorists involved in the operation. Countries sympathetic to
terrorist causes have allowed items to be carried in diplomatic pouches with agents taking them
from the embassy to a prearranged site. The initiation phase is when the actual action takes place.

c. Negotiation phase. When terrorists decide that a hostage/barricade or another similar event
is worthwhile, they may use the negotiation phase to gain publicity. Negotiations may include
certain specific demands that often require intergovernmental negotiations at the highest level.
There may be trade-offs, especially if the demands are more than the government is able to meet.
Note: If the terrorists do not take hostages or enter a barricade-scenario, this phase
does not occur.

2-2
d. Climax phase. The climax phase immediately follows the initiation phase if there is no
negotiation phase. The climax phase signals the end of the incident as far as the terrorists are
concerned.

e. Post-incident phase. During the post-incident phase, the terrorist members regroup,
critique, and criticize the operation. This is considered to be a very important part of the
operation. During this phase, the terrorists learn from and share their successes and failures. The
lessons learned are often shared with other crusader groups to improve their operational skills.

See how much of the information you retained by completing this challenge.

Your answers to the challenge should be

Matching: Match the terrorist operational phase in column 1 to the action in column 2.

___ 1. Pre-incident phase a. Terrorist members regroup, critique


___ 2. Initiation phase and criticize the operation.
___ 3. Negotiation phase b. Terrorists move to their targets.
___ 4. Climax phase c. Signals the end of the operation.
___ 5. Post-incident phase d. Terrorists decide that a hostage/barricade
or another similar event is a worthwhile
endeavor.
e. Activities include reconnaissance
missions, lengthy periods of training,
and rehearsals.

e 1. Pre-incident phase a. Terrorist members regroup, critique


b 2. Initiation phase and criticize the operation.
d 3. Negotiation phase b. Terrorists move to their targets.
c 4. Climax phase c. Signals the end of the operation.
a 5. Post-incident phase d. Terrorists decide that a hostage/barricade
or another similar event is a worthwhile
endeavor.
e. Activities include reconnaissance missions,
lengthy periods of training, and rehearsals.

If your answer differs, review paragraph 2102 before continuing.

2-3
2103. State the Operations Commonly Associated with Terrorism

Terrorist operations are the same type of criminal activity you witness daily on the news. Of
course not every story you hear is the result of terrorism, but by now you should be considering
terrorism as a possibility. As you have already learned, terrorist attacks are well planned and
rehearsed. All terrorist groups, no matter how they are categorized or what their goal may be,
carry out similar operations. All of the following are operations conducted by terrorists:

a. Bombing (explosives). Explosive devices are inexpensive and easy to make, and materials
are readily available. Modern explosive devices are smaller, contain greater destructive
capability, and are harder to detect. The April 1995 bombing of the Federal Building in
Oklahoma City is a good example of the ease with which explosive devices can be made and used.

b. Arson. Incendiary devices are cheap and easy to hide. Arson is a useful tactic against
public utilities, hotels, houses of government, and industrial centers. Terrorists use arson to draw
a crowd, which in turn provides terrorists with the opportunity to use explosives or other
weapons.

c. Vehicle theft. Stolen vehicles provide terrorists with a means of delivering explosives that
can and most likely will be traced back to the original car owner and not to the terrorist
organization.

d. Skyjacking and aircraft theft. Skyjacking provides terrorists with hostages and draws
media attention. An aircraft theft provides terrorists with a tool for conducting kamikaze attacks.
Aircraft mobility and distance make retaliation difficult.

e. Marjacking. Marjacking (also known as maritime theft) provides terrorists with a unique
method of intimidating international travelers. Due to a ship's size and ability to endure long
periods of isolation, marjacking presents a variety of benefits to terrorists and risks to legal
authorities. While occurrence of marjackings are infrequent, the possibility should not be
underestimated.

f. Ambush. A well-planned ambush provides terrorists with the opportunity to kidnap or


assassinate intended victims. An ambush allows terrorists to choose the time and place of the
attack. An ambush is easily planned if the victim uses the same daily route.

g. Kidnapping. Kidnapping is a preferred terrorist tactic. Kidnapping of prominent personnel


can force a government into acceding to terrorist demands to safeguard prisoner release.

h. Hostage-taking. Hostage-taking is overt and designed for maximum media coverage.


Threat on hostages' lives can be used to gain concessions from governments. The power in
hostage-taking is the life of the hostage. The terrorists' intended target is the audience
affected by the hostages' confinement, not the hostages.

2-4
i. International narcotics support. Drug activities finance some terrorist groups. Terrorist
groups may provide security for narcotics networks in return for financial support.

j. Robbery and extortion. In some environments, such as in South America, robbery and
extortion enhance other terrorist activities. These methods are unnecessary when terrorists
receive funding and support from sympathetic nations.

k. Psychological terror. Psychological terror alters behavioral characteristics of an individual,


group, or organization through the application of sophisticated techniques.

l. Nuclear, biological, and chemical (NBC) attack. NBC attacks have been almost
non-existent in the past. However, the use of chemical devices in the Japanese subway in the
summer of 1995 confirms the threat of a terrorist NBC attack cannot be dismissed. Always
consider the potential use of NBC when combating terrorism.

m. Assassination. Historically, terrorist have killed specific individuals for psychological


effect. Expect continued use of this tactic due to its impact.

n. Raids and/or attacks on facilities. Raids and/or armed attacks on facilities are usually
undertaken for one of three purposes: to gain access to radio or television broadcast capabilities
to make a statement, to demonstrate the government's inability to secure critical facilities, or
national symbols, or for logistical purposes, such as the robbery of a bank or armory.

o. Commercial and/or industrial sabotage. The objective in most sabotage is to demonstrate


how vulnerable society is to terrorists' actions. Industrialized nations are more vulnerable than
less developed societies. Utilities, communications, and transportation systems are so
interdependent that disruption of any one affects all of them and gains immediate public attention.

p. Hoaxes. Any terrorist group that has established credibility can employ a hoax with
considerable success. A threat against a person's life causes that person and those associated with
that individual to devote time and effort to security measures. A bomb threat can close a
commercial building, reduce operations, or delay an aircraft flight at no cost to the terrorist. False
alarms dull the analytical and operational efficiency of key security personnel, thus degrading
readiness.

q. Ecological terrorism. The increasing accessibility of sophisticated weapons and explosives


to terrorists has the potential to threaten or damage the environment. Use of large scale
incendiary explosive devices (IED) against a variety of targets such as hazardous waste storage
sites, nuclear power plants, and electrical controls for petroleum or water pumping facilities could
have far reaching effects well beyond those caused directly by an IED. An example of
"ecoterrorism" is reported in the U.S. Department of State's report, Significant Incidents of
Political Violence Against Americans, 1990, pg. 3. "In the 5 years since oil began flowing
through the Cano Limon-Covenas oil pipeline and related oil camps and pumping facilities, the
Colombian National Liberation Army (ELN) has bombed it nearly 140 times. This 490-mile long
pipeline is in Colombia and is owned by Ecopetrol of Colombia and a consortium of European

2-5
and American oil companies. As a result of terrorist attacks, some 640,000 barrels of oil have
been spilled. Damages and lost oil exports are estimated to be in the range of $500 million. In
addition to the economic damage caused by the ELN attacks, oil spills from sabotaged sections of
the line have caused severe ecological damage to numerous rivers and freshwater lakes."

Try the following challenges.

(Write your response in the space provided.)

1. List (in any order) 9 of the 17 operations commonly associated with terrorism.

a. _________________________________________________________

b. _________________________________________________________

c. _________________________________________________________

d. _________________________________________________________

e. _________________________________________________________

f. _________________________________________________________

g. _________________________________________________________

h. _________________________________________________________

i. _________________________________________________________

(Fill in the blank)

2. Who is the intended target in hostage-taking?

______________________________________________________________

______________________________________________________________

2-6
(Fill in the blank)

3. "Modern explosive devices are smaller, contain greater destructive capability,


and are harder to detect." This statement best describes which terrorist operation?

______________________________________________________________

(Fill in the blank)

4. State the reason why terrorists would support international narcotics.

_____________________________________________________________

_____________________________________________________________

(Fill in the blank)

5. What countermeasure can you take to avoid becoming the intended target of an
ambush?

_____________________________________________________________

Your answers_____________________________________________________________
to the challenges should be

1. Any nine of the following (in any order) bombing; arson; vehicle theft; skyjacking and
aircraft theft; marjacking; ambush; kidnapping; hostage-taking; international narcotics
support; robbery and extortion; psychological terror; nuclear; biological; and chemical
(NBC) attack; assassination; raids and/or attacks on facilities; commercial and/or industrial
sabotage; hoaxes; and ecological terrorism.
2. The terrorists' intended target is the audience affected by the hostage's confinement, not the
hostage.
3. Bombing
4. Terrorist groups may provide security for narcotics networks in return for financial support.
5. Vary your travel routes.

If you answered any of the challenges incorrectly, review paragraph 2103 before continuing.
As you can see, terrorists have available many different types of operations to achieve their
intended goal. Now that you know the different operations, you should know the key
weaknesses or characteristics that are historically present in all terrorist targets. This information
will assist you in preparing your personal countermeasures against terrorism.

2-7
Interviews of many people who were once held hostage showed that all had experienced the key
characteristic of personnel subject to terrorist operation. Being an "easy target" is the key
characteristic shared by every individual who was the intended victim of a terrorist operation. An
easy target is one that displays any or all of the following characteristics:

a. Accessible. Easy access.

b. Predictable. Intended victims are predictable because of routines or patterns.

c. Unaware. Intended victims are complacent, are not security-conscious, and do not take
individual protective measures.

Try the next two challenges.

Complete items 1 and 2 by performing the action required.

1. What is the key characteristic of personnel who have been the target of a terrorist
operation?

______________________________________________________________

2. In the text you learned that there are three possible characteristics an easy target
may have. What are the three possible characteristics?

a. _________________________________________________________

b. _________________________________________________________

c. _________________________________________________________

Your answers to these challenges should be 1. easy target and 2. accessible, predictable, and
unaware. If your answers are different, review paragraph 2104 before continuing.
You are now ready to categorize different facilities and installations. This information is intended
to broaden your understanding and to stimulate your thinking on reasons a terrorist would attack
a facility.

2-8
2105. State the Different Categories of Terrorist Targets

Often, when you read reports of terrorist attacks, the reports list targets by categories. Within
each category there are a number of different installations or facility types. By knowing what is
contained in each category, you will become efficient in deciding if your installation, base, or
place of employment may be considered for attack by terrorists. The different categories are

a. Engineering and energy systems. Engineering and energy systems include the following:

(1) Hydroelectric plants


(2) Offshore oil rigs
(3) Nuclear facility sites
(4) Gas pipelines
(5) Electric power lines

b. Communication and supplies. Communication and supplies include the following:

(1) Communication lines and facilities


(2) Chemical storage sites
(3) Dock facilities
(4) Equipment warehouses
(5) Computer facilities
(6) Weapon storage sites, both conventional and special weapons

c. Transportation. Transportation includes the following:

(1) Rail lines and cars


(2) Bus depots
(3) Airports and aircraft
(4) Trucking facilities
(5) Shipyards

d. Human. Under the category of human are those targets that historically are targeted more
than any other. Just because you may not fall under one of the groups listed in this category,
there is always the possibility that you could be an innocent bystander at the time of an attack.
The following are recognized by the United States as falling under the human category when
considering terrorist targets:

2-9
(1) Embassy and government employees
(2) Corporate executives
(3) Police
(4) Dependents of the above

Try this challenge.

List (in any order) the four categories of terrorist targets.

a. ______________________________________________________________

b. ______________________________________________________________

c. ______________________________________________________________

d. ______________________________________________________________

Your answers to this challenge (in any order) should be engineering and energy systems,
communication and supplies, transportation, and human. If you answered differently, review
paragraph 2105 before continuing.

Lesson Summary. You now know the meaning of terrorism and can identify the acts. You also
learned the meaning of terrorist operation, can identify the five phases of a terrorist operation,
and what operations are commonly associated with terrorists and terrorism. Further, you learned
the key characteristic of individuals subject to terrorist attacks and considered as being "easy
targets." Finally, you have learned the target categories for terrorist operations which include
engineering and energy systems, communication and supplies, transportation, and human. In the
next lesson, you will learn the structure of typical, smaller, and medium-sized terrorist groups and
the functions of the different cells within a group. Before continuing, complete the lesson
exercise.

-----------------------------------------------------------------

Lesson Exercise: Complete items 1 through 18 by performing the action required. Check
your responses against those listed at the end of this lesson.

1. Define the term terrorist operation.

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

2-10
Matching: For items 2 through 6, match the operational phase of a terrorist
operation in column 1 to the appropriate action in column 2.

Column 1 Column 2

Phase Action

___ 2. Pre-incident phase a. Terrorist members regroup, critique


___ 3. Initiation phase and criticize the operation.
___ 4. Negotiation phase b. Terrorists move to their targets.
___ 5. Climax phase c. Signals the end of the operation.
___ 6. Post-incident phase d. Terrorists decide that a hostage-barricade
or another similar event is a worthwhile
endeavor.
e. Activities include reconnaissance missions,
lengthy periods of training, and rehearsals.

7. List (in any order) 9 of the 17 operations commonly associated with terrorism.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

d. _______________________________________________________________

e. _______________________________________________________________

f. _______________________________________________________________

g. _______________________________________________________________

h. _______________________________________________________________

i. _______________________________________________________________

8. Who is the intended target in hostage-taking?

. ____________________________________________________________________

2-11
Matching: For items 9 through 13 match the terrorist operation in Column 1 with the
statement in Column 2 that best describes the terrorist operation.

Column 1 Column 2

Operation Statement

___ 9. Bombing a. Popular because it is inexpensive and easy


___ 10. Assassination to produce, adaptable to a variety of uses,
___ 11. Armed attacks and difficult to detect or trace after the
___ 12. Kidnapping incident.
___ 13. Skyjacking b. The abducting of prominent personnel can
force a government to give in to terrorist
demands.
c. Military assault carried out against a
specific target to promote fear or obtain
equipment such as weapons.
d. Selected individuals are killed for the
psychological impact.
e. Provides terrorist with hostages, draws
media attention, and gives terrorists a tool
for possible kamikaze attack.

14. Give the reason a terrorist would support international narcotics.

____________________________________________________________________

____________________________________________________________________

15. What countermeasure can you take to avoid becoming the intended target of an
ambush?

____________________________________________________________________

____________________________________________________________________

16. What is the key characteristic of personnel who have been the target of a terrorist
operation?

____________________________________________________________________

2-12
17. List (in any order) the three characteristics of an "easy target."

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

18. List (in any order) the four categories of targets of terrorist attack.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

d. _______________________________________________________________

Lesson 1 Exercise Solutions

Reference

1. Any criminal act carried out by a person or 2101


group to gain attention for a cause by using
terror-causing tactics, to raise capital, or to
obtain equipment for future operations.
2. e. 2102
3. b. 2102
4. d. 2102
5. c. 2102
6. a. 2102
7. Any nine of the following: bombing; arson; vehicle theft; 2103
skyjacking and aircraft theft; marjacking; ambush;
kidnapping; hostage-taking; international narcotics support;
robbery and extortion; psychological terror; nuclear, biological,
and chemical (NBC) attack; assassination; raids and/or attacks
on facilities; commercial and/or industrial sabotage; hoaxes;
and ecological terrorism.
8. The terrorists' intended target is the audience affected by the 2103
hostage's confinement, not the hostage.
9. a. 2103
10. d. 2103
11. c. 2103
12. b. 2103
13. e. 2103

2-13
Lesson 1 Exercise Solutions, continued

Reference

14. Terrorist groups may provide security for narcotics 2103


networks in return for financial support
15. Vary your travel routes. 2103
16. Easy target 2104
17. accessible, predictable, unaware 2104
18. engineering and energy systems, communication and supplies, 2105
transportation, human.

2-14
Lesson 2. ORGANIZATION OF TERRORIST GROUPS

LEARNING OBJECTIVES

1. Identify the different cells of a terrorist group.

2. State the role(s) or function(s) of a cell within the terrorist group.

2201. Identify the Different Cells of a Terrorist Organization

The way a terrorist group is organized is determined by its need for security and the number of
people in the group. Generally, the larger groups are less secure and more prone to infiltration by
law enforcement organizations. Small terrorist groups can maintain a high degree of security
because of the membership size, but usually have limited operational capabilities. Figure 2-1
illustrates the typical smaller terrorist group.

Fig 2-1. Structure of a small terrorist organization or an O&C


within a larger terrorist organization.

The building block on which all terrorist groups are traditionally formed is the operational and
clandestine cell (O&C). The O&C cell allows the group to organize the members of one
particular cell with those from another cell where the members are unacquainted. All cells except
for those of large terrorist groups operate in secrecy. The number of cells and overall structure
are influenced by the degree of popular support in the area where the group operates. Both large
and small terrorist groups are organized in a similar manner. The larger group will normally have
more O&C cells. In the Middle East, where popular support exists, large groups often conduct
open meetings. Figure 2-2 illustrates the structure of a typical medium-sized terrorist group.

2-15
Fig 2-2. Organization of a typical medium to large terrorist organization.

a. Command cell. The command cell is responsible for the structure and security of the
terrorist organization. All terrorist plans are carried out according to plans laid out by the
command cell.

Try this challenge.

(Fill in the blanks)

The command cell is responsible for the ___________________ and

_____________________ of the terrorist organization. All terrorist plans are carried

out according to ______________ laid out by the ___________________ cell.

Your answers to the challenge should include (in this order) structure, security, plans, and
command. If your answers are different, review the preceding paragraph before continuing.

b. Operational & clandestine cell. The O&C cell is the action arm of the group and contains
the cadre of the group. In sophisticated groups, this cell may be highly specialized. In new or less
sophisticated groups, O&C cells may perform many jobs. The O&C cell is usually made up of
three to five terrorists. Under the control of the O&C cell are the reconnaissance cell, the assault
cell, the support cell, and the intelligence cell.

2-16
Try this challenge.

(Circle the letter of the correct response)

What function does the operational cell perform within the structure of the terrorist group?
The operational cell

a. provides the plans for the group's operations.


b. is the action arm of the terrorist group.
c. is the largest cell in the group due to its fund-raising responsibilities.
d. is the action arm of the group and contains the group's cadre.

Your answer to the challenge should be "a." If you answered differently review the preceding
paragraph before continuing.

(1) Reconnaissance cell. The reconnaissance (recon) cell provides pre-strike, eyes-on
information about the intended target. Information includes the target's home layout,
type of vehicles, routes to and from work, and any other personal or professional
information necessary to access the target.

(2) Assault cell. The assault cell is the actual "hit" men for the group that actually carries
out the mission. The assault cell is further broken down into a command team, an
assault team, and a security team.

Try this challenge.

(Circle the letter of the correct response)

What is the function of the reconnaissance team? The reconnaissance team provides

a. protective covering fire during the operation.


b. "hit" men for the operational cell during a terrorist attack.
c. escape route information for the assault team.
d. pre-strike, eyes-on information about the intended target.

2-17
Your answer to this challenge should be "d." If you answered differently, review the preceding
paragraph before continuing.

Now, try answering this challenge.

(Circle the letter of the correct response)

What is the function of the assault team of the operational cell? It provides

a. pre-strike information on intended targets.


b. protective, covering fire for the reconnaissance team.
c. the "hit" men for the operational cell during the operation.
d. the logistical support for the operational cell.

Your answer to this challenge should be "c." If you answered differently, review the preceding
paragraph before continuing.

(a) Command team. The command team provides leadership and ensures discipline
is maintained throughout training and the actual assault. The command team
provides on-site command and control.

(b) Assault team. The assault team carries out the operation, whether the assault is
a bombing, a kidnapping, or any of the other actions discussed in lesson one of
this study unit.

(c) Security team. The security team provides security for the assault team's
training site. A security team may be in the background when an operation is
taking place to ensure nothing prevents the assault team from successfully
completing the mission.

Try this challenge.

List (in any order) the three sub-teams of the assault element.

a. ______________________________________________________________

b. ______________________________________________________________

c. ______________________________________________________________

2-18
Your answers to the challenge (in any order) should include the command team, the assault team,
and the security team. If you answered differently, review the preceding paragraph before
continuing.

(3) Support cell. The support cell is also known as the auxiliary cell. This cell is often
larger and less compartmentalized than the other cells in the group. The support cell
is responsible for fundraising, gathering sympathizers, screening recruits, and
distributing propaganda.

Try this challenge.

(Circle the letter of the correct response)

What is the function of the support cell within the operational cell? It provides

a. the logistical support, such as fund-raising, gathering sympathizers, screening


recruits and distributing propaganda for the operational cell.
b. protective, covering fire for the reconnaissance team.
c. pre-strike, eyes-on information about the intended target.
d. the terrorist group with the action arm of the group and contains the group's cadre.

Your answer to the challenge should be "a." If you answered differently, review the preceding
paragraph before continuing.

(4) Intelligence cell. The intelligence cell collects and processes information on
potential targets and develops specific intelligence relevant to targeted facilities,
installations, and personnel including their security. The intelligence cell is highly
compartmentalized and follows very strict security procedures.

2-19
You guessed it! Try this challenge.

(Circle the letter of the correct response)

What is the function of the intelligence cell within the operational cell of a terrorist
group? It provides

a. pre-strike, eyes-on information about the intended target


b. the logistical support to the operational cell.
c. collection and processing services to the operational cell on potential targets and
develops specific intelligence relevant to targeted facilities, installations, and
personnel including their security.
d. the "hit" men for the operational cell during the operation.

Your answer to the challenge should be "c." If your answer is different, review the preceding
paragraph before continuing.

Lesson Summary. You now know the basic structure for small and medium-sized terrorist
groups. You have learned that terrorist groups have a command or leadership cell and an
operational cell. All groups except for the small, disjointed groups will have within the
operational cell a reconnaissance team, an assault team, and a security team. In lesson 3 you will
learn about the most common terrorist operations. Lesson 3 also will address the characteristics
common to all targets of terrorist attacks. Before you begin lesson 3, complete the lesson
exercise.

-----------------------------------------------------------------

Lesson Exercise: Complete items 1 through 7 by performing the action required. Check your
responses against those provided at the end of this lesson.

For item 1 fill in the blanks.

1. The command cell is responsible for the ___________________ and

_____________________ of the terrorist organization. All terrorist plans are carried

out according to ______________ laid out by the ___________________ cell.

2-20
For items 2 through 4, circle the letter of the correct response.

2. What function does the operational cell perform within the structure of the terrorist
group?

a. Provides the plans for the group's operations


b. The action arm of the terrorist group
c. The largest cell in the group due to its fundraising responsibilities
d. The action arm of the group and contains the group's cadre

3. What is the function of the reconnaissance team? It provides

a. protective covering fire during the operation.


b. "hit" men for the operational cell during a terrorist attack.
c. escape route information for the assault team.
d. pre-strike, eyes-on information about the intended target

4. What is the function of the assault team of the operational cell? It provides

a. pre-strike information on intended targets.


b. protective, covering fire for the reconnaissance team.
c. the "hit" men for the operational cell during the operation.
d. the logistical support for the operational cell.

Complete item 5 by performing the action required.

5. List (in any order) the three sub-teams of the assault element.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

2-21
Complete items 6 and 7 by circling the letter of the correct response.

6. What is the function of the support cell within the operational cell? It provides

a. the logistical support, such as fund-raising, gathering sympathizers, screening


recruits and distributing propaganda for the operational cell.
b. protective, covering fire for the reconnaissance team.
c. pre-strike, eyes-on information about the intended target.
d. the terrorist group with the action arm of the group and contains the group's
cadre.

7. What is the function of the intelligence cell within the operational cell of a terrorist
group? It provides

a. pre-strike, eyes-on information about the intended target.


b. the logistical support to the operational cell.
c. collection and processing services to the operational cell on potential targets
and develops specific intelligence relevant to targeted facilities,
installations, and personnel including their security.
d. the "hit" men for the operational cell during the operation.

Lesson 2 Exercise Solutions

Reference

1. (In this order) structure, security, plans, command 2201


2. d. 2201
3. d. 2201
4. c. 2201
5. (In any order) command team, assault team, security team 2201
6. a. 2201
7. c. 2201

UNIT SUMMARY

This study unit familiarized you with the internal structure of terrorist groups and the function of
each cell of a terrorist group. You also learned what operations are commonly associated with
terrorists and terrorism, the key characteristic of a terrorist target, and the categories of terrorist
target groups for reporting purposes. In the next study unit, you will learn about terrorist groups
as they relate to a global region. Now, complete the unit exercise for this study unit.

2-22
Unit Exercise: Complete items 1 through 25 by performing the action required. Check your
answers against those listed at the end of this study unit

1. Define the term terrorist operation.

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

Matching: For items 2 through 6, match the operational phase of a terrorist


operation in column 1 to the appropriate action in column 2.

Column 1 Column 2

Phase Action

___ 2. Pre-incident phase a. Terrorist members regroups, critique


___ 3. Intiation phase and criticize the operation.
___ 4. Negotation phase b. Terrorists move to their targets.
___ 5. Climax phase c. Signals the end of the operation.
___ 6. Post-incident phase d. Terrorists decide that a hostage-barracade
or other similar event is a worthwhile
endeavor.
e. Activities include reconnaissance missions,
lengthy periods of training, and rehearsals.

2-23
Complete item 7 through 8 by performing the action required.

7. List (in any order) 9 of the 17 operations commonly associated with terrorism.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

d. _______________________________________________________________

e. _______________________________________________________________

f. _______________________________________________________________

g. _______________________________________________________________

h. _______________________________________________________________

i. _______________________________________________________________

8. Who is the intended target in hostage-taking?

____________________________________________________________________

____________________________________________________________________

2-24
Matching: For items 9 through 13, match the terrorist operation in Column 1 with
the statement in Column 2 that best describes the terrorist operation.

Column 1 Column 2

Operation Statement

____ 9. Bombing a. Popular because it is inexpensive and easy


____ 10. Assassination to produce, adaptable to a variety of uses,
____ 11. Armed attacks and difficult to detect or trace after the
____ 12. Kidnapping incident.
____ 13. Skyjacking b. The abducting of prominent personnel can
force a government to give in to terrorist
demands.
c. Military assault carried out against a
specific target to promote fear or obtain
equipment such as weapons.
d. Selected individuals are killed for the
psychological impact.
e. Provides terrorist with hostages, draws
media attention, and a tool for possible
kamikaze attack.

14. State the reason why terrorist would support international narcotics.

____________________________________________________________________

____________________________________________________________________

15. What countermeasure can you take to avoid becoming the intended target of an
ambush?

____________________________________________________________________

____________________________________________________________________

16. What is the key characteristic of personnel who have been the target of a terrorist
operation?

____________________________________________________________________

2-25
17. List (in any order) the three characteristics of an "easy target."

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

18. List (in any order) the four categories of targets for terrorist attack.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

d. _______________________________________________________________

For item 19, fill in the blanks.

19. The command cell is responsible for the ___________________ and

_____________________ of the terrorist organization. All terrorist plans are carried

out according to ______________ laid out by the ___________________ cell.

For item 20 through 21, circle your response.

20. What function does the operational cell perform within the structure of the terrorist
group?

a. Provides the plans for the group's operations.


b. The action arm of the terrorist group.
c. The largest cell in the group due to its fundraising responsibilities.
d. The action arm of the group and contains the group's cadre.

21. What is the function of the reconnaissance team? It provides

a. protective covering fire during the operation.


b. "hit" men for the operational cell during a terrorist attack.
c. escape route information for the assault team.
d. pre-strike, eyes-on information about the intended target.

2-26
22. What is the function of the assault team of the operational cell?

a. Provides pre-strike information on intended targets.


b. Provides protective, covering fire for the reconnaissance team.
c. Provides the "hit" men for the operational cell during the operation.
d. Provides the logistical support for the operational cell.

Complete item 23 by performing the action required.

23. List (in any order) the three sub-teams of the assault element.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

Complete items 24 and 25 by circling the letter of the correct response.

24. What is the function of the support cell within the operational cell? It provides

a. the logistical support, such as fund-raising, gathering sympathizers,


screening recruits and distributing propaganda for the operational cell.
b. protective, covering fire for the reconnaissance team.
c. pre-strike, eyes-on information about the intended target.
d. the terrorist group with the action arm of the group and contains the group's
cadre.

25. What is the function of the intelligence cell within the operational cell of a terrorist
group? It provides

a. pre-strike, eyes-on information about the intended target.


b. the logistical support to the operational cell.
c. collection and processing services to the operational cell on potential targets
and develops specific intelligence relevant to targeted facilities, installations,
and personnel including their security.
d. the "hit" men for the operational cell during the operation.

2-27
Study Unit 2 Exercise Solutions

Reference

1. Any criminal act carried out by a person or 2101


group to gain attention for a cause by using
terror-causing tactics or to raise capital,
or obtain equipment for future operations.
2. e. 2102
3. b. 2102
4. d. 2102
5. c. 2102
6. a. 2102
7. Any nine of the following and in any order: 2103
bombing; arson; vehicle theft; skyjacking
and aircraft theft; marjacking; ambush;
kidnapping, hostage-taking, international narcotics
support; robbery and extortion; psychological terror;
nuclear; biological; and chemical (NBC) attack;
assassination; raids and/or attacks on facilities;
commercial and/or industrial sabotage; hoaxes;
and ecological terrorism.
8. The terrorists' intended target is the audience 2103
affected by the hostage's confinement, not the hostage.
9. a. 2103
10. d. 2103
11. c. 2103
12. b. 2103
13. e. 2103
14. Terrorist groups may provide security for narcotics 2103
networks in return for financial support
15. Vary your travel routes. 2103
16. Easy target 2104
17. (In any order) accessible, predictable, unaware 2104
18. (In any order) 2105
Engineering and energy systems
Communication and supplies
Transportation
Human
19. (In this order) structure, security, plans, and 2201
command
20. d. 2201
21. d. 2201
22. c. 2201

2-28
Study Unit 2 Exercise Solutions, continued

Reference

23. (In any order) command team, assault team, 2201


security team
24. a. 2201
25. c. 2201

2-29
STUDY UNIT 3

TERRORIST GROUPS BY GLOBAL REGION

Introduction. On any single day, acts of terrorism take place around the world for a variety
of reasons. Whether the terrorist style themselves as crusaders, criminals, or crazies, what
marks them as terrorists is that they direct their violence against noncombatants with the
goal of terrorizing a wider audience than their immediate victims, thereby attempting to gain
influence over the larger audience. In this study unit, you will learn what terrorist groups
operate in which global region. Keep in mind the groups will be identified with the region
in which they originated and not necessarily with the region where most of their actions take
place.

Lesson 1. TERRORIST GROUPS OF EUROPE

LEARNING OBJECTIVES

Identify terrorist groups organic to Europe.

3101. Identify the Armenian Secret Army for the Liberation of Armenia (ASALA) Group

a. Membership. The actual number ASALA members is not known.

b. Headquarters. Unknown

c. Area of operation. The ASALA operates worldwide. Being a transnational group the
ASALA conducts operations wherever they feel their cause can be best served. In the past,
support for the ASALA has come from the Palestinian radical group Abu Nidal Organization,
Kurdish separatist groups, and Syria.

d. Other names. ASALA-Revolutionary Movement (ASALA-RM), ASALA-Militant


(ASALA-M).

e. Objectives/target audience. The ASALA uses revolutionary violence to force an end to the
"exploitation, repression, and terror of Turkish colonialism" and the "imperialism" of the North
Atlantic Treaty Organization and Zionism. Turkish representatives, institutions, and those who
support Turkey are prime targets of the ASALA anywhere in the world. Figure 3-1 shows the
area claimed by Armenian terrorists.

3-1
Fig 3-1. Historic area claimed by Armenian terrorists.

3102. Identify the Basque Fatherland and Liberty (ETA) Group

a. Membership. Approximately 200 active members.

b. Headquarters. Basques provinces of Spain: Vizcaya, Alava, Guipuzcoa, Navarra, and


Basque provinces of France.

c. Area of operation. The Basque Fatherland operates in Spain and France.

d. Other names. Euzkadi ta Askatasuna (original language).

e. Objectives/target Audience. The ETA's goals are to establish an independent Basque


nation through terrorism against Spanish interests to pressure the Government of Spain into
making desired concessions. To assist in reaching the aforementioned goal, the ETA continually
attempts to create an economic crisis in the Basque provinces by terrorizing businesses in the
region. The ETA regularly targets Spanish Government officials, members of the military and
security forces, and moderate Basques for assassination. In addition, the group has carried out
numerous bombings against government facilities and economic targets, including seasonal
campaigns against tourist resorts. Funding for ETA operations are generated through
kidnappings, armed robberies, and extortion of "revolutionary taxes." Millions of dollars have
been obtained by the ETA through these means. Figure 3-2 is an example of ETA activity.

3-2
Fig 3-2. ETA bombing that destroyed a shop
and killed nine people.

3103. Identify the Popular Forces 25 April (FP-25) Group

a. Membership. The FP-25 has six-to-ten hard-core members and 100-200 sympathizers
operating in Portugal.

b. Headquarters. The cities of Lisbon, Oporto, and Barcelos Portugal are considered to be
FP-25 headquarters.

c. Area of operation. The FP-25 has conducted its operations in Portugal since 1980 where it
claims to be a worker's organization dedicated to a struggle against exploitation, misery, and
repression, as well as to the violent overthrow of the Portuguese Government.

d. Other names. The FP-25 is also known as the Forces Populares 25 de Abril (original
language), the Autonomous Revolutionary Group (GAR), and the Armed Revolutionary
Organization (OAR).

e. Objectives/target audience. The stated goals of the FP-25 are "to use armed force against
imperialism" and lead a "worker's assault on bourgeois power." Political objectives include the
violent overthrow of the Portuguese government and the establishment of a Marxist state,
demonstrating violent opposition to U.S. and NATO presence in Portugal, and conducting attacks
in Portugal in support of other European terrorist groups.

3-3
3104. Identify the Provisional Irish Republican Army (PIRA) Group

a. Membership. It is estimated that the PIRA has a hard-core membership of 200-400. An


unknown number of sympathizers exist in Northern Ireland and the United States.

b. Headquarters. Northern Ireland, Irish Republic

c. Area of operation. The PIRA primarily operates in Northern Ireland and occasionally in
England and continental Europe.

d. Other names. Another name associated with the PIRA is "Provos." This is a slang term
used by law enforcement agencies in England.

e. Objectives/target audience. PIRA terrorism is designed to move the people of Northern


Ireland and Britain to pressure the British Government to withdraw from Northern Ireland and let
the Catholic and Protestant Irish settle the conflict without British interference. The political
objective of the PIRA includes the establishing of a unified Ireland under a socialist Government
and the undermining of British support for Northern Ireland's remaining in the United Kingdom
through a campaign of attrition and terrorism. The target audience is the international Irish
community to solicit support of the PIRA.

3105. Identify the Red Army Faction (RAF) Group

a. Membership. The Red Army Faction (RAF) has an estimated membership of 20-30
hard-core members. This number tends to fluctuate based on the capture of members, but the
RAF has a disturbing trend to resurface with renewed and vicious attacks. Due to RAF's
relatively large support base, it will probably continue to be a serious threat.

b. Headquarters. The RAF operates within the Federal Republic of Germany (FRG).

c. Area of operation. The RAF primarily operates within the FRG.

d. Other names. Other names by which the RAF is known as include: Baader Meinhof Gang,
Baader Meinhof Group, and Rote Armee Fraktion (original language).

e. Objectives/target audience. The primary goal of the RAF is to destroy Western


capitalism through terrorism, helping to precipitate a worldwide Marxist revolution. Secondary
goals are to use terrorism to destroy FRG-U.S. solidarity, especially by attacking American
military targets in West Germany using specific acts of terrorism to try to force authorities to
release imprisoned RAF members. The RAF has received support from Middle East terrorist
groups to assist them with their cause. The RAF maintains contacts with French, Dutch, Belgian,
Danish, Swiss, Irish, Italian, Spanish and American groups.

3-4
Try this challenge.

Matching: For items 1 through 6, match the terrorist group in column 1 to the
country/region in which it operates in column 2. Place your response in the spaces
provided.

Column 1 Column 2

__ 1. Armenian Secret Army for the a. Basque province of Spain and France
Liberation of Armenia (ASALA) b. Ireland
__ 2. Red Army Faction (RAF) c. Italy
__ 3. Provisional Irish Republican d. Portugal
Army (PIRA) e. Worldwide
__ 4. Popular Forces 25 April (FP-25) f. Germany
__ 5. Basque Fatherland and Liberty
(ETA)

Your answers should be

e 1. Armenian Secret Army for the a. Basque province of Spain and France
Liberation of Armenia (ASALA) b. Ireland
f 2. Red Army Faction (RAF) c. Italy
b 3. Provisional Irish Republican d. Portugal
Army (PIRA) e. Worldwide
d 4. Popular Forces 25 April (FP-25) f. Germany
a 5. Basque Fatherland and Liberty
(ETA)

If your answers match, continue. If you answered differently, review paragraphs 3101 through
3105 before continuing.

3-5
3106. Identify the Red Brigade (BR) Group

a. Membership. The hard-core membership of the Red Brigade (BR) is estimated at between
50 and 75 terrorists. The BR organizational structure is believed to be highly cellular and strictly
compartmentalized, helping to ensure security and independent action by the various units. Two
separate factions appear to have developed within the BR since 1984. One faction, the
Militarists or the Fighting Communist Party (PCC) constitutes the majority and usually follows a
strict Leninist view that only violent terrorist acts can pave the way for revolution. The other
faction, the Movementalists or Union of Fighting Communists (UCC) is the minority or splinter
group that does not believe a revolution is possible until the proletariat has been sufficiently
politicized to support revolutionary action.

b. Headquarters. The BR is headquartered in Rome, Naples, Genoa, Milan, and Tuscany


region of central Italy.

c. Area of operation. The BR operates in Italy. Members have been arrested in France, which
appears to be a safe haven for the BR.

d. Other names. Brigate Rosse (original language).

e. Objectives/target audience. The political objectives of the BR include the following: to


destroy the Government of Italy through revolutionary action, to oppose the presence of NATO
by creating fear among NATO personnel stationed in Italy, and carry out a campaign of
destruction directed at "imperialist multinational cooperation."

3107. Identify the Revolutionary Cells (RZ) Group

a. Membership. The estimated membership of the Revolutionary Cells (RZ) is 100 terrorists.
The RZ has occasionally been linked with the Red Army Faction. The RZ believes in a
decentralized form of terrorism directed at targets within the immediate vicinity of each cell. To
achieve maximum security, its cells are typically composed of less than 10 members with minimal
contact between cells.

b. Headquarters. West Berlin and Frankfurt.

c. Area of operation. The RZ operates in Germany.

d. Other names. In the original language, the RZ is known as Revolutinaere Zellen and Rote
Zora.

e. Objectives/target audience. The primary objective of the RZ is to conduct "urban


guerrilla" terrorist activity in support of "anti-fascism," "anti-imperialism," "anti-Zionism," and
"anti-militarism." Other objectives include pressuring U.S. forces in Germany through terrorist
attacks that create fear and suspicion and to destroy the "West German-style" system with
terrorism.

3-6
3108. Identify the Revolutionary Organization 17 November Group

a. Membership. Estimated membership is 20-25 terrorists.

b. Headquarters. The Revolutionary Organization's headquarters is believed to be in Athens,


Greece.

c. Area of operation. Athens, Greece.

d. Other names. In the original language the Revolutionary Organization 17 November is


known as Espanastaiki Organosi 17 Noemvri.

e. Objectives/target audience. The Revolutionary Organization 17 November's objectives are


to force Greece out of NATO and to end the U.S. military presence in Greece and to oppose
imperialism and capitalism. These objectives are sought by the use of terrorism employing
ambush-style assassinations using two to three-member teams. Victims are usually attacked near
their homes or offices.

3109. Identify the Revolutionary Popular Struggle (ELA) Group

a. Membership. Little is known about the Revolutionary Popular Struggle (ELA) including
the number of members. What is known is that the ELA is an extreme leftist group that
developed out of the opposition to the military junta that ruled Greece from 1967 to 1974. The
ELA has declared its opposition to "imperialist domination, exploitation, and oppression." The
ELA is strongly anti-United States and seeks the removal of United States military forces from
Greece.

b. Headquarters. The ELA is headquartered in Athens, Greece.

c. Area of operation. The area of operation for the ELA is Athens where it has carried out a
series of relatively unsophisticated bombings against the Greek Government and economic targets
including U.S. interests.

d. Other names. In the native language the ELA is known as Epanastikos Laikos Agonas.

e. Objectives/target audience. Forcing Greece out of NATO and eliminating the


United States military presence in Greece are the two primary objectives of the ELA. To support
this and bring about revolution the ELA has vowed to strike against "fascism and imperialism."

3-7
Try this challenge.

Matching: For items 1 through 4, match the country in column 1 with the terrorist group
which operate in that country in column 2. Place your answer in the space provided.

Column 1 Column 2

___ 1. Italy a. Revolutionary Organization 17


___ 2. Greece November
___ 3. Germany b. Revolutionary Popular
Struggle (ELA)
c. Revolutionary Cells (RZ)
d. Red Brigade (BR)

Your answers should be

d 1. Italy a. Revolutionary Organization 17


a or b 2. Greece November
c 3. Germany b. Revolutionary Popular
Struggle (ELA)
c. Revolutionary Cells (RZ)
d. Red Brigade (BR)

If your answers to the challenge is different, review paragraphs 3106 through 3109 before
continuing.

Lesson Summary. You now know the terrorist groups that are most commonly associated with
terrorist activities in Europe. You know which groups are known to operate in which
countries, and you now have a base from which to further your knowledge of each group. In the
next lesson, you will learn about the groups that are most active or most commonly known in
Asia. You are now ready for the lesson exercise.

3-8
Lesson Exercise: Complete items 1 through 9 by performing the action required. Check your
responses against those listed at the end of this lesson.

Matching: For items 1 through 9, match the terrorist group in column 1 to the
country/region in which it operates in column 2. Place your response in the space
provided.

Column 1 Column 2

Terrorist Group Region or country

___ 1. Armenian Secret Army for the a. Worldwide


Liberation of Armenia (ASALA) b. Portugal
___ 2. Red Army Faction (RAF) c. Ireland
___ 3. Provisional Irish Republican d. Italy
Army (PIRA) e. Basque province of Spain and France
___ 4. Popular Forces 25 April (FP-25) f. Germany
___ 5. Basque Fatherland and Liberty
(ETA)

Column 1 Column 2

___ 6. Italy a. Red Brigade


___ 7. Greece b. Revolutionary Organization
___ 8. Germany 17 November
c. Revolutionary Popular
Struggle (ELA)
d. Revolutionary Cells (RZ)
e. Popular Forces 25 April (FP-25)

Lesson 1 Exercise Solutions

Reference

1. a. 3101
2. f. 3105
3. c. 3104
4. b. 3103
5. e. 3102
6. a. 3106
7. b. or c. 3108
8. d. 3107

3-9
Lesson 2. TERRORIST GROUPS OF ASIA

LEARNING OBJECTIVE

Identify terrorist groups organic to Asia.

In the last lesson you learned about the terrorist groups which are organic to Europe. In this
lesson you will learn about terrorist groups of Asia. In the past, attacks against United States
citizens and interests in Asia have not been prevalent, but recent attacks in Asia appear to be
indiscriminate and could very easily include United States citizens and/or interests. The actions of
these terrorists groups outside of their region of origin are something you should be concerned
about.

3201. Identify the Chukaku-Ha Group

a. Membership. Terrorism analyst estimate the membership of the Chukaku-Ha to be 3,000


with 200 being dedicated terrorists. Chukaku-Ha operatives are secretive, avoiding public
gatherings or demonstrations. Contacts with those outside of the group are severely restricted.

b. Headquarters. The Chukaku-Ha operates primarily in Japan. The group focuses its attacks
on Japanese Government buildings, the national railway system, and it has claimed responsibility
for a number of attacks against United States facilities.

c. Area of operation. The primary area of operation for the Chukaku-Ha is mainland Japan.

d. Other names. Other names associated with the Chakaku-Ha include: Middle Core or
Nucleus Faction.

e. Objectives/target audience. The objective of the Chakaku-Ha which represents the


greatest threat to you as a Marine is to terminate the United States-Japan Security Treaty and
remove United States forces from Japan. Other objectives include: Abolishing the current
constitutional form of government and abolishing Japan's monarchy.

3202. Identify the Japanese Red Army (JRA) Group

a. Membership. The estimated membership of the Japanese Red Army is 25. Sympathizers
are estimated at approximately 100 Japanese.

b. Headquarters. Although the Red Army is considered to be an Asian terrorist group its
headquarters is in Lebanon, where the group finds supporters and a safehaven.

c. Area of operation. The Japanese Red Army has a broad area of operation. Operations tend to
be focused in Western Europe, the Middle East, and Asia. In the past the JRA has conducted
terrorist actions on behalf of Palestinian terrorist groups.

3-10
d. Other names. The JRA is also known as the Nippon Sekigun or the Nihon Sekigun.

e. Objectives/target audience. The primary goal of the JRA is to support the worldwide
Marxist-Leninist revolution by conducting acts of terrorism. Other JRA objectives are to serve as
a uniting force for leftist anarchist organizations in Japan, to oppose Japanese imperialism, and to
establish a People's Republic of Japan. The Japanese people are the desired audience.

3203. Identify the Liberation Tigers of Tamil Eelam (LTTE) Group

a. Membership. The Liberation Tigers of Tamil Eelam (LTTE) has an estimated membership
of 2,000 who are considered active.

b. Headquarters. Jaffian Peninsula, Sri Lanka

c. Area of operation. The LTTE operates within Sri Lanka with the intent of causing the
creation of a separate Tamil state in the northern and eastern provinces of Sri Lanka.

d. Other names. The LTTE is also known as the Tigers and the Tamil Tigers.

e. Objectives/target audience. The LTTE's objectives are to eliminate moderate Tamils and
other Tamil militant groups that compete with the LTTE for influence and power within the
Sri Lankin Tamil community and to focus international attention on the plight of the Tamils living
in Sri Lanka, concentrating especially on human rights issues.

Try the following three challenges.

(Fill in the blank)

1. The __________________ operates primarily in Japan. The group focuses its


attacks on Japanese Government buildings and the national railway system, and it has
claimed responsibility for a number of attacks against United States facilities.

(Fill in the blank)

2. Although the _________________ is considered to be an Asian terrorist group, its


headquarters is in Lebanon, where it finds supporters and a safe haven.

3-11
(Fill in the blank)

3. The _______________________________________ operates within Sri Lanka


with the intent of causing the creation of a separate Tamil state in northern and
eastern provinces of Sri Lanka.

Your answers should be 1. Chukaku-Ha, 2. Red Army, 3. Liberation Tigers of Tamil Eelam. If
so, continue. If your answers are different, review paragraphs 3201 through 3203 before
continuing.

3204. Identify the Dal Khalsa Group

a. Membership. The membership of the Dal Khalsa is estimated at 200 individuals.

b. Headquarters. The headquarters of the Dal Khalsa is in Punjab Providence of India.

c. Area of operation. The Dal Khalsa operate solely in India.

d. Other names. There are no other known names for the Dal Khalsa.

e. Objectives/target audience. The Dal Khalsa's terrorist actions have been focused on
creating an independent Sikh state in the Punjab. To accomplish its mission, the group targets
the Indian Government, the Sikh moderate community, and Hindus in general.

To see how much you remember of what you have just learned try this challenge.

(Fill in the blank)

1. The ____________________________ operate solely in India.

Your answer should be Dal Khalsa. If it isn't, review paragraph 3204.

3-12
3205. Identify the Dashmesh Regiment Group

a. Membership. It is estimated that there are 200 members in the Dashmesh Regiment.

b. Headquarters. Although the exact location of the Dashmesh Regiment's headquarters is


not known, analysts believe the central headquarters is located in the Punjab Providence of India.

c. Area of operation. The Dashmesh Regiment operates throughout India, especially in Punjab
and Haryana, and to some extent worldwide.

d. Other names. The Dashmesh Regiment has no other known names.

e. Objectives/target audience. The Dashmesh Regiment's objective is to establish Khalistan as


an autonomous Sikh state. To accomplish its goal, the group targets Indian Government officials,
moderate Sikhs, and Hindu residents of the Punjab.

Time for another challenge.

(Fill in the blank)

Although the exact location of the _____________________________________

headquarters is not known, analyst believe the central headquarters to be located

in the Punjab Providence of India.

Your answer should be the Dashmesh Regiment. If not, review paragraph 3205 before
continuing.

Lesson Summary. This lesson provided you with the knowledge needed to identify particular
terrorist groups which originate in Asia. It also provided you with basic background knowledge
on each terrorist group discussed. In the next lesson you will learn about those terrorist groups
originating in the Middle East. Before continuing with the next lesson, complete the lesson
exercise.

3-13
Lesson Exercise: Complete items 1 through 5 by performing the action required. Check your
responses against those listed at the end of the lesson.

1. The __________________ operates primarily in Japan. The group focuses its

attacks on Japanese Government buildings, the national railway system, and it has

claimed responsibility for a number of attacks against United States facilities.

2. Although the ____________________ is considered to be an Asian terrorist

group its headquarters is in Lebanon where it finds supporters and a safehaven.

3. The _____________________________________ operates within Sri Lanka with

the intent of causing the creation of a separate Tamil state in the northern and eastern

provinces of Sri Lanka.

4. The ____________________________ operate solely in India.

5. Although the exact location of the ____________________ _______________

headquarters is not known, analysts believe the central headquarters is located in the

Punjab Providence of India.

Lesson 3 Exercise Solutions

Reference

1. Chukaku-Ha 3201
2. Red Army 3202
3. Liberation Tigers of Tamil Eelam 3203
4. Dal Khalsa 3204
5. Dashmesh Regiment 3205

3-14
Lesson 3. TERRORIST GROUPS OF THE MIDDLE EAST

LEARNING OBJECTIVE

Identify terrorist groups organic to the Middle East.

The terrorist groups of Asia are obscure; the opposite is true of the groups associated with the
Middle East. As a collective organization, these groups have held the attention of the world and
continue to play a significant part in the media spotlight if not directly, then indirectly by
supporting other terrorist groups around the world.

3301. Identify the Abu Nidal Organization (ANO) Group

a. Membership. The estimated membership of the Abu Nidal Organization (ANO) is 500
individuals.

b. Headquarters. Previously the ANO was headquartered in Syria and Iraq. Most recently
Libya is the group's headquarters.

c. Area of operation. The area of operation is worldwide, which is why this group is
considered by the world as "dangerous." Support from Syria and Iraq in the past and current
support from Libya allows the ANO the financial flexibility to conduct terrorist operations
wherever they feel their cause can be served. In addition to outside sponsors, the ANO conducts
self-sustaining economic operations.

d. Other names. The ANO is also known as Fatah-the Revolutionary Council (FRC), Black
June Organization (BJO), Arab Revolutionary Brigades (ARB), Revolutionary Organization of
Socialist Muslims (ROSM), Black September Organization (BSO).

e. Objectives/target audience. The ANO's political objectives are to undermine efforts to


negotiate an Israeli-Palestinian peace by attacking Israeli targets in Europe and the Middle East,
to threaten or attack "reactionary" regimes in Egypt, Jordan, Kuwait, Saudi Arabia, and the Gulf
Shaykhdoms, to affirm the Arab commitment to the destruction of Israel, and to intimidate those
nations currently holding Abu Nidal operatives in prison into releasing them.

3-15
3302. Identify the Arab Organization of 15 May Group

a. Membership. There is no solid number as to the correct number of members in the Arab
Organization of 15 May. Analysts have only identified the group's membership to be "very small."
The group was formed during a split within the Popular Front for the Liberation of Palestine in
the late 1970's.

b. Headquarters. The headquarters of the Arab Organization of 15 May is not known.

c. Area of operation. The area of operation for the Arab Organization of 15 May is Western
Europe. The 15 May frequently target undefended public places, in particular airports and airlines
because of their international visibility. The group favors using highly sophisticated explosives in
their attacks.

d. Other names. The Arab Organization of 15 May is also known as 15 May.

e. Objectives/target audience. The political objectives of 15 May include the destruction of


Israel and the intimidation of moderate Palestinians and other Arabs who favor a negotiated
settlement of the Palestinian issue.

3303. Identify the Democratic Front for the Liberation of Palestine (DFLP) Group

a. Membership. The membership of the Democratic Front for the Liberation of Palestine
(DFLP) is estimated at 500. The DFLP believes that the Palestinian national goal cannot be
achieved without a revolution of the working class; elite members of the movement should not be
separated from the masses, and the lower classes first should be educated in true socialism to
carry on the battle.

b. Headquarters. Previously the DFLP's headquarters was in Syria. Presently the


headquarters location is unknown.

c. Area of operation. The DFLP operate in Lebanon and Israel. Typical attacks are minor
bombings, grenade attacks, and operations to seize hostages and attempt to negotiate the return
of Israeli-held Palestinian prisoners.

d. Other names. The DFLP is also known as the Popular Democratic Front for the Liberation
of Palestine (PDFLP).

e. Objectives/target audience. Political objectives of the DFLP are to seek revolutionary


change in the Arab world, especially in the conservative monarchies, as a precursor to the
achievement of Palestinian objectives, and to advocate an international stance that places the
Palestinian struggle within a general world context of liberation in Africa, Asia, and Latin
America.

3-16
3304. Identify the Fatah Group

a. Membership. The membership of this worldwide terrorist organization is 6,000 in Lebanon


and another 5,000 scattered throughout the world.

b. Headquarters. The symbolic international headquarters for the Fatah group is Tunis,
Tunisia. Overt and covert offices are operated by the Fatah.

c. Area of operation. The Fatah operates worldwide and is known as an international terrorist
group. The majority of the Fatah's operational efforts are focused primarily against Israeli targets
in Israel, Lebanon, and the occupied territories.

d. Other names. In the past the Fatah group has used names such as Black September
Organization, al-Asifa, Force 17, and the Hawri group. The word Fatah is a reverse spelling of an
acronym for Harakat al-Tahrir al Filistini, which means "Palestinian Liberation Movement" in
Arabic.

e. Objective/target audience. The Fatah's political objective is to seek the establishment of an


independent, secular Palestinian state.

3305. Identify the Hezballah (Islamic Jihad) Group

a. Membership. The Hezbollah has approximately 3,000 full-time members, with as many as
500 directly involved in terrorist activities.

b. Headquarters. The headquarters for the Hezballah is West Beirut and Bekka Valley,
Lebanon.

c. Areas of operation. The areas of operation for the Hezballah are the Middle East and
Europe.

d. Other names. The Hezballah is also known as the Islamic Jihad, the Party of God, the
Revolutionary Justice Organization, and the Organization of the Oppressed.

e. Objectives/target audience. The objectives of the Hezballah are to establish a


revolutionary Shi'a Islamic state in Lebanon, eliminate non-Islamic influences, and become
institutionalized as Lebanon's principal Islamic movement.

3-17
Try these challenges.

(Fill in the blanks)

1. What makes the __________ ________ ______________ such a dangerous

group is its ability to operate worldwide. Support from Syria and Iraq in the

past and current support from Libya allows the __________ ________

______________ the financial flexibility to conduct terrorist operations wherever

they feel their cause can be served. In addition to outside sponsors, the

__________ ________ ______________ conducts self-sustaining economic

operations.

(Fill in the blanks)

2. The area of operation for _______________ _________________ ___ _________

is Western Europe. The _______________ ______________ ____ __________

frequently target undefended places, in particular airports and airlines because of

their international visibility. The group favors highly sophisticated explosives in

their attacks.

3-18
(Fill in the blanks)

3. The _____________________________ _______________________________

___________________ ______________ operates in Lebanon and Israel. Typical

attacks are minor bombings, grenade attacks, and options to seize hostages and

attempt to negotiate the return of Israeli-held Palestinian prisoners.

(Fill in the blanks)

4. The ________________ operates worldwide and is known as an international

terrorist group. The majority of the ________________ operational efforts are

focused primarily against Israel targets in Israel, Lebanon, and occupied territories.

(Fill in the blank)

5. The areas of operation for the _______________ are the Middle East and Europe.

Your answers should include the following: 1. Abu Nidal Organization, Abu Nidal Organization,
Abu Nidal Organization, 2. Arab Organization of 15 May, Arab Organization of 15 May, 3.
Democratic Front for the Liberation of Palestine, 4. Fatah, Fatah, and 5. Hezballah. If you
answered correctly, continue. If your answers are different, review paragraphs 3301 through
3305 before continuing.

3-19
3306. Identify the Lebanese Armed Revolutionary Faction (LARF) Group

a. Membership. The estimated membership of the Lebanese Armed Revolutionary Faction


(LARF) is 25 individuals.

b. Headquarters. The headquarters for the LARF is in Northern Lebanon.

c. Areas of operations. The LARF operate in Western Europe and in Lebanon.

d. Other names. The LARF is known as FARL in France.

e. Objectives/target audience. The objectives of the LARF are to establish a


Marxist-Leninist state in Lebanon and to demonstrate "anti-Zionist" solidarity with the Palestinian
movement by attacking Israeli interests, primarily in France.

3307. Identify the Organization of the Armed Arab Struggle (OAAS) Group

a. Membership. Analysts on terrorism classify the number of individuals associated with the
Organization of the Armed Arab Struggle (OAAS) as being very small.

b. Headquarters. The actual location of the headquarters is uncertain. Analysts believe the
OAAS headquarters is in Syria or Libya.

c. Areas of operations. The OAAS operates in Western Europe and the Middle East.

d. Other names. The OAAS is also known as Carlos Apparat.

e. Objectives/target audience. OAAS objectives are to conduct terrorism in support of general


Arab revolutionary movements and to conduct terrorism against West European nations in
retaliation for "anti-Arab" Middle East policies practiced by other nations.

3308. Identify the Palestine Liberation Front (PLF) Group

a. Membership. Among the three different factions of the Palestine Liberation Front (PLF)
there are 300 members.

b. Headquarters. The three factions of the PLF are the: 1. Tal'at Yaqub in Syria,
2. Abu al Abbas in Iraq, and 3. Abd al Fatah Ghanem in Libya.

c. Areas of operations. Taken as a group, the three factions of the PLF operate in Lebanon,
Israel, and Europe.

3-20
d. Other names. The PLF is also known as the Front for the Liberation of Palestine (FLP).

e. Objectives/target audience. The primary goal of all three PLF factions is the dismantling of
the current state of Israel by terrorizing Israel through direct attacks on Israeli soil and
establishing an independent Palestinian state in place of Israel.

3309. Identify the Popular Front for the Liberation of Palestine (PFLP) Group

a. Membership. Analysts estimate that the Popular Front for the Liberation of Palestine
(PFLP) has 1,000 members.

b. Headquarters. The previous headquarters of the PFLP was Syria.

c. Area of operations. The PFLP operates in both Europe and the Middle East.

d. Other names. There are no other names associated with the PFLP.

e. Objectives/target audience. The PFLP objectives include to liberate Palestine with "armed
struggle" and "oppose all efforts at a negotiated settlement of the Israeli-Palestinian issue."

3310. Identify the Sa'iqa Group

a. Membership. The Sa'iqa has an estimated 2,000 members.

b. Headquarters. The headquarters for the Sa'iqa is in Syria.

c. Areas of operations. The Sa'iqa operates in both the Middle East and Europe.

d. Other names. Other names for the Sa'iqa are the Thunderbolt, and the Eagles of the
Palestinian Revolution.

e. Objectives/target audiences. The objectives of the Sa'iqa include: Providing a mechanism


for Syria to control and influence the Palestinian movement, eliminating Israel and replacing it
with a pro-Syrian Palestinian state, and establishing a pro-Syrian Palestinian Army.

3-21
Check to see how much you remember by completing the following challenges.

(Fill in the blank)

1. The headquarters for the _________________ ____________ ____________

_____________ is in Northern Lebanon.

(Fill in the blank)

2. The actual location of the headquarters is uncertain. Analysts believe the

____________ _____________ ______________ ___________________

headquarters is in Syria or Libya.

(Fill in the blank)

3. The previous headquarters of the __________________ _______________

______________________ _____________________ was Syria.

(Fill in the blank)

4. The three factions of the ___________________ ____________________

_________________________________ and the headquarters are: 1. Tal'at

Yaqub in Syria, 2. Abu al Abbas in Iraq, and 3. Abd at Fatah Ghanem in Libya.

3-22
(Fill in the blank)

5. The headquarters for the ______________________________ is in Syria.

Your answers should be as follows: 1. Lebanese Armed Revolutionary Faction or LARF, 2.


Organization of the Armed Arab Struggle or OAAS, 3. Popular Front for the Liberation of
Palestine or PFLP, 4. Palestine Liberation Front or PLF, 5. Sa'iqa. If your answers are correct,
continue. If you answered differently, review paragraphs 3306 through 3310 before continuing.

Lesson Summary. This lesson provided you with the knowledge you need to know to identify
terrorist groups associated with the Middle East. You also have a basic knowledge of these
groups from which you can build on when or if you are stationed or operating in one of the
regions discussed in this lesson.

-----------------------------------------------------------------

Lesson Exercise: Complete items 1 through 5 by performing the action required. Check your
responses against those listed at the end of this lesson.

1. The headquarters for the __________________ ___________ _____________

_____________ is in Northern Lebanon.

2. The actual location of the headquarters is uncertain. Analysts believe the

_________________ _________________ _______________ _____________

headquarters is in Syria or Libya.

3. The previous headquarters of the ___________________ ________________

_______________________ ____________________ was Syria.

4. The three factions of the _____________________ _______________ __________


and their headquarters are: 1. Tal'at Yaqub in Syria, 2. Abu al Abbas in Iraq, and 3.
Abd al Fatah Ghanem in Libya.

5. The headquarters for the ___________________ is in Syria.

3-23
Lesson 3 Exercise Solutions

Reference

1. Lebanese Armed Revolutionary Faction or LARF 3306


2. Organization of the Armed Arab Struggle or OAAS 3307
3. Popular Front for the Liberation of Palestine or PFLP 3309
4. Palestine Liberation Front or PLF 3308
5. Sa'iqa 3310

3-24
Lesson 4. TERRORIST GROUPS OF THE AMERICAS

LEARNING OBJECTIVES

Identify terrorist groups organic to the Americas.

Recent events such as the Oklahoma City Federal Building bombing are stark reminders that no
one is exempt from becoming a victim of a terrorist attack. In this lesson you will learn about the
terrorist groups organic to the Americas. The focus of this study unit is to build your terrorist
awareness for assignment outside the U.S. Therefore, terrorist groups organic to and operate
only in the United States have been omitted. Information on these groups is available from state
and local law enforcement agencies.

3401. Identify the Alfaro Lives, Damn It! (AVC) Group

a. Membership. The estimated membership of the terrorist group Alfaro Lives, Damn It!
(AVC) is estimated to have a membership of between 200 and 300 individuals. The group's
unique name is drawn the Ecuadorian national hero, Eloy Alfaro, a revolutionary leader and the
president of Ecuador in the early 1900s.

b. Headquarters. The location of the AVC's headquarters is not known.

c. Area of operations. The area of operation for the AVC is Ecuador, primarily in the urban
areas of Quito and Guayaquil.

d. Other names. The AVC is known as "Alfaro Vive, Carajo!" in the native language.

e. Objectives/target audience. The AVC favors social "reform" and opposes "oligarchy and
imperialism." In support of this objective, the AVC creates opposition to the current government,
especially among the rural poor. A secondary objective is to force the withdrawal of United
States and other foreign interests from Ecuador.

3402. Identify the Bandera Roja (Red Flag - GBR) Group

a. Membership. It is estimated that the armed wing of the Bandera Roja (Red Flag-GBR) has
50 active members.

b. Headquarters. The location of the GBR's headquarters is not known.

c. Area of operations. The GBR operates in Eastern Venezuela and along the
Venezuela-Colombia border.

d. Other names. The GBR's armed wing's name in the original language is Frente Americo
Silva (Americo Silva Front-FAS).

3-25
e. Objectives/target audience. Originally the GBR's primary objective was to begin a
Marxist-Leninist program of rural revolution, but contrary to this goal, they rejected the
Venezuelan constitutional left, including the Venezuelan Communist Party and the Movement of
the Revolutionary Left. The present political agenda appears to be establishing a "dictatorship of
the proletariat in Venezuela by means of an armed struggle." The GBR shuns the leftist elements
that have accepted legal status and are seeking elections as means of obtaining political power.

3403. Identify the Cinchoneros Popular Liberation Movement (MPL) Group

a. Membership. The estimated membership of the Cinchoneros Popular Liberation Movement


(MPL) is under 200 individuals. The MPL is the armed wing of the People's Revolutionary Union
(URP), which is itself a splinter group of the Honduras Communist Party.

b. Headquarters. The headquarters of the MPL is in Tegucigalpa, Honduras.

Note: A large portion of the leadership is in exile.

c. Area of operations. The MPL primarily operates in Honduras and is urban-based,


operating out of Tegucigalpa and San Pedro Sula. The MPL apparently funds itself by
kidnapping businessmen and robbing banks. Cuba has been known to provide support in the way
of training, arms, logistics, and political support.

d. Other names. The MPL name in the original language is Movimiento Popular de
Liberacion.

e. Objectives/target audience. The MPL fancy themselves as Marxist-Leninist and


anti-United States. The MPL seeks to overthrow the Government of Honduras, who the MPL
believe defends alleged United States "imperialist Monopolies."

3404. Identify the Claira Elizabeth Ramirez Front (CERF) Group

a. Membership. The total membership of the Claira Elizabeth Ramirez Front (CERF) is
between 10 and 20 terrorists.

b. Headquarters. The Headquarters of the CERF is San Salvador, El Salvador.

c. Area of operations. The CERF operates in San Salvador. This group has shown a high
interest in United States targets in San Salvador. The Salvadoran Government launched a
successful counterterrorist campaign against the CERF. Activities since then tend to be
recruitment and political organizing efforts on university campuses and in the nation's unions.

3-26
d. Other names. In the original language, the CERF is known as Frente Clara Elizabeth
Ramirez. At times the CERF refers to itself by the name of its parent organization, the Popular
Liberation Front (FPL), even though the FPL has ostracized the CERF.

e. Objectives/target audience. The CERF's objectives are to conduct high-visibility acts of


urban terrorism that will undercut government efforts to end political violence and will erode
public support for the government. To achieve this, the CERF targets United States citizens in El
Salvador who are involved in supporting the Salvadoran Government.

3405. Identify the Farabundo Marti National Liberation Front (FMLN) Group

a. Membership. The estimated membership of the Farabundo Marti National Liberation Front
(FMLN) is 7,500 individuals. The membership of the FMLN is supported by Nicaragua, Cuba,
Vietnam, and various "solidarity" and "fundraising" groups throughout Latin America, North
America, Europe.

b. Headquarters. There are various locations within El Salvador that are considered
headquarters of the FMLN, with other key offices being located in Managua, Nicaragua.

c. Area of operations. The FMLN operates primarily inside El Salvador with some limited
operations inside Honduras. FMLN members are routinely trained at camps in Nicaragua and
Cuba. Most of the foriegn-supplied weapons used by FMLN elements are United States arms that
were lost during the Vietnam War and later filtered through Communist channels into Nicaragua.
Additional weapons and ammunition have been captured from the Salvadoran Army and security
forces in raids and ambushes on units and on supply facilities.

d. Other name. In the original language, the FMLN is known as Frente Farabundo Marti de
Liberacion Nacional (FMLN).

e. Objectives/target audience. The FMLN has two primary objectives they wish to achieve
through the use of terrorism. The first is to create and sustain war of attrition against the elected
Government of El Salvador to cause its destruction and replacement by a leftist, pro-Cuban,
anti-United States state. The second is to frustrate United States' support of the Salvadoran
Government and stimulate domestic U. S. opposition to policies through periodic attacks on
American military personnel in El Salvador.

3-27
Try these challenges to see how much you remember.

(Fill in the blank)

1. The area of operation for the _______________ ___________ ____________

______ is Ecuador, primarily in the urban areas of Quito and Guayaquil.

(Fill in the blank)

2. The ______________ ________________ _____________ operates in Eastern

Venezuela and along the Venezuela-Columbia border.

(Fill in the blank)

3. The ________________________ _________________ __________________

primarily operates in Honduras and are urban-based, operating out of Tegucigalpa

and San Pedro Sula.

(Fill in the blank)

4. The ________________ _________________ ____________ _______________

operates in San Salvador. This group has shown a high interest in the United

States targets in Salvador.

3-28
(Fill in the blank)

5. The _______________ _____________ ________________ ___________

_________________ operates primarily inside El Salvador with some limited

operations inside Honduras. Members of FMLN are routinely trained at camps in

Nicaragua and Cuba.

Your answers should be as follows: 1. Alfaro Lives, Damn It! (AVC), 2. Bandera Roja (Red
Flag-GBR), 3. Cinchoneros Popular Liberation Movement (MPL), 4. Claira Elizabeth Ramirez
Front (CERF), 5. Farabundo Marti National Liberation Front (FMLN). If you answered
correctly, continue. If you answered differently, review paragraphs 3401 through 3405 before
continuing.

3406. Identify the Guatemalan National Revolutionary Unity (URNG) Group

a. Membership. The URNG is made up of an estimated 1,500 guerrillas from a loose coalition
of three major insurgent groups: the Revolutionary Organization of the People in Arms (ORPA),
the Guerrilla Army of the Poor (EGP), and the Rebel Armed Forces (FAR).

b. Headquarters. The URNG has delegations in Mexico City, Havana, and Managua.

c. Area of operations. The URNG operates in rural Guatemala with the OPRA in the
southwest, the EGP operates mainly in the northwest highlands, and the FAR in the extreme
north. Figure 3-3 depicts the operating areas of the guerrilla groups that form the rough coalition
of the URNG.

3-29
Fig 3-3. Operating areas of the URNG.

d. Other names. The political arm of the URNG is known as the Guatemalan Committee for
Patriotic Unity (CGUP). The URNG sometimes claims operations in the name of any of its
individual component groups.

e. Objectives/target audience. The objectives of the URNG are to unify the guerrillas and
revolutionary front organizations into a broad coalition to achieve the unity necessary to launch a
"people's revolutionary war," and to defeat the "power of the national and foreign wealth and
install a patriotic, revolutionary, and democratic people's army."

3407. Identify the Lorenzo Zelaya Popular Revolutionary Forces (FPR-LZ) Group

a. Membership. There are an estimated 150 to 300 members in the FPR-LZ. They are
supported by the Farabundo Marti National Liberation Front (El Salvador). It is possible that
training is provided by Nicaragua and Cuba.

b. Headquarters. There are two known headquarters for the FPR-LZ: Tegucigalpa and San
Pedro Sula, Honduras.

c. Area of operations. Just as Teguigalpa and San Pedro Sula are the headquarters, they are
also the two primary urban operational areas of the FPR-LZ. The northern and central rural
areas of Honduras are also FPR-LZ operational areas.

d. Other names. In the original language, the FPR-LZ is known as Fuerzas Populares
Revolucionarias Lorenzo Zelaya. The group may also operate under the names of Froylan
Turcios Command or the Bayardo Paguada Movement.

3-30
e. Objectives/target audiences. The FPR-LZ's objectives are to carry out war on United States
"imperialism" and its allies in Honduras including the United States Embassy and Peace Corps
buildings, U.S. military personnel, and U.S. companies, and to carry out terrorist activities against
Latin American embassies.

3408. Identify the 19th April Movement (M-19) Group

a. Membership. The 19th April Movement (M-19) is estimated to have 1,000 members. The
membership is supported by Nicaragua, Cuba, and to a certain extent, Libya. This group
envisions itself as an army.

b. Headquarters. The M-19 is headquartered at Cali, Colombia.

c. Area of operations. The M-19 operates along what they consider to be two "fronts" in
Colombia. The first is the Southern Front in the Putumayo Province. The second is a Western
Front in Caldas, Cauca, Valla del Cauca, Quindio, and Tolima Provinces in Colombia.

Note: In Colombia, "provinces" are known as "departments."

d. Other names. In the original language, M-19 is known as the Movimiento 19 de Abril.

e. Objective/target audience. The two primary objectives of the M-19 are to claim a populist
orientation, emphasizing a struggle by the people against the Colombian "bourgeoisie" and
American "imperialism," and to extort funds from narcotic producers and on occasion to
cooperate with narcotic dealers in areas or ventures of mutual interest.

3409. Identify the Macheteros (Machete Wielders) Group

a. Membership. The actual number of Macheteros is not known. The group itself is tightly
organized and extremely violent. The Macheteros are fiercely dedicated to total Puerto Rican
independence. The stated position of the group is they have declared "war" on the United States.

b. Headquarters. There are many pieces missing to the Machetero puzzle, including the
location of its headquarters.

c. Area of operations. The Macheteros group operates in Puerto Rico. Primary targets of this
group are the United States military in Puerto Rico and the Puerto Rican police.

d. Other names. The Machete Wielders are known in the original language as Ejertico Popular
de Boricua (EPB), the English translation of which is Boricua Popular Army.

e. Objectives/target audience. The Macheteros' objectives are to wage war against "U.S.
colonialist imperialism" and to create public support for the creation of a separate Puerto Rican
state.

3-31
3410. Identify the Manuel Rodriquez Patriotic Front (FPMR) Group

a. Membership. The Manuel Rodriquez Patriotic Front (FPMR) has an estimated 500 to
1,000 members. The group is closely related to the Chilean Communist Party and has links to
Cuba and other communist countries, especially for training and weapon supply.

b. Headquarters. The FPMR's headquarters is in Santiago, Chile. Santiago has the dubious
distinction of being the group's primary urban operating area.

c. Area of operations. The FPMR primarily operates in the urban areas of Chile. Often, the
group uses the mass media in its campaigns and sometimes seizes a radio station to broadcast its
propaganda.

d. Other names. In the original language of Chile, the FPMR is known as Frente Patriotico
Manuel Rodriguez.

e. Objectives/target audience. The FPMR's acts of terrorism are designed to provoke greater
government repression and thereby create anti-government sentiment and strongly influence, if
not actually lead, a subsequent government toward leftist, anti-U.S. policies. The FPMR also
seeks to pressure United States interests to leave Chile through periodic attacks on business or
government facilities.

Try this challenge and the ones that follow to test how much you remember.

(Fill in the blank)

1. The _____________________________ ________________ ____________

__________ operates in rural Guatemala, with the OPRA in the southwest, the

EGP mainly in the northwest highlands, and the FAR in the extreme north.

3-32
(Fill in the blank)

2. There are two known headquarters for the __________________ __________

_______________________ ________________ _______________________:

Tegucigalpa and San Pedro Sula, Honduras.

(Fill in the blank)

3. The _________________ _________________ _______________ operates along

what they consider two "fronts" in Colombia.

(Fill in the blank)

4. The __________________________________ operates in Puerto Rico.

(Fill in the blank)

5. The _________________ ________________ ___________ __________

primarily operates in the urban areas of Chile.

Your answers should be as follows: 1. Guatemalan National Revolutionary Unity (URNG), 2.


Lorenzo Zelaya Popular Revolutionary Forces (FPR-LZ), 3. 19th April Movement (M-19),
4. Macheteros, 5. Manuel Rodriquez Patriotic Front (FPMR). If you answered correctly,
continue. If your answers are different, review paragraphs 3406 through 3410 before continuing.

3-33
3411. Identify the Movement of the Revolutionary Front (MIR) Group

a. Membership. The estimated membership of the MIR is 500. The original members of this
group were leftist college students who later made a concerted shift to the views of Fidel Castro.

b. Headquarters. The MIR's primary headquarters is in Havanna, Cuba and it also maintains
one in Santiago, Chile.

c. Area of operations. The MIR carries out their terrorist actions in Chile. To help finance its
terrorist operations, the MIR has relied increasingly on bank robberies.

d. Other names. In the original language, the MIR is known as Movimiento de la Izquierda
Revolucionaria.

e. Objectives/target audience. The MIR's objectives are to provoke the government to take
repressive measures that will alienate the general public and to establish a Marxist state in Chile.

3412. Identify the National Liberation Army (ELN) Group

a. Membership. Terrorism analysts estimate the membership of the National Liberation Army
(ELN) to be less than 1,000.

b. Headquarters. The headquarters of the ELN is in Colombia.

c. Area of operations. The ELN operates primarily in the northern and northeastern parts of
Colombia near the Venezuelan border expanding into the central region.

d. Other names. The ELN is known as Ejercito de Libercion Nacional in the original
language.

e. Objectives/target audience. The ELN is Pro-Castro, anti-American, and anti-capitalist. The


group seeks "the conquest of power for the popular classes" along with nationalization,
expropriations, and agrarian reform.

3413. Identify the Popular Liberation Army (EPL) Group

a. Membership. The membership of the Popular Liberation Army (EPL) is estimated to be


between 600 and 800.

b. Headquarters. The EPL's headquarters is in Colombia.

c. Area of operations. The EPL operates primarily in the Antioquia and Cordoba Provinces of
Colombia.

3-34
Note: In Colombia "provinces" are known as "departments." Departments are called
provinces in this course for you convenience and ease in relating to familiar
information.

d. Other names. In the original language, the EPL is known as Ejercito Popular de Libercion.

e. Objectives/target audience. The objective of the EPL are to conduct a war of liberation
directed specifically at the Colombian bourgeoisie.

3414. Identify the Revolutionary Armed Forces of Columbia (FARC) Group

a. Membership. The Revolutionary Armed Forces of Columbia (FARC) has between 4,000
and 5,000 armed guerrillas in 35-40 fronts. The organization's leadership is middle-and
upper-class intellectuals while other members tend to be from the peasant population. This group
is probably the largest, best-trained and equipped, and most effective insurgent organization in
Columbia and in South America.

b. Headquarters. The FARC headquarters is in La Uribe, in the Meta Province.

c. Area of operations. The FARC operates in Colombia. This group, more than any other
terrorist group in Colombia, has a close relationship to the narcotics traffickers in Colombia. The
relationship seems strongest where the coca production and FARC operational strongholds
overlap. Money received from providing protection for the traffickers supplement FARC
revenues from kidnappings, extortion, and robberies.

d. Other names. In the original language, the FARC is known as Fuerzas Armadas
Revolucionarias de Colombia.

e. Objectives/target audience. The FARC, along with its political front, the Patriotic Union
(UP), has these objectives: Overthrow the established order in Colombia and replace it with a
leftist and anti-American regime, create a "broad anti-monopoly and anti-imperialist front" and
unite left-wing parties and organizations into a political movement, and force U. S. and other
"imperialist" interests out of Colombia.

3415. Identify the Ricardo Franco Front (RFF) Group

a. Membership. The estimated membership of the Ricardo Franco Front (RFF) is 100
individuals.

b. Headquarters. The headquarters of the RFF is in the Valla del Cauca Province of
Colombia.

c. Area of operations. Primarily, the RFF operates in Bogata as well as parts of southwest
Colombia.

3-35
d. Other names. In the original language, the RFF is known as Frente Ricardo Franco.

e. Objectives/target audience. The RFF's objectives are to overthrow the established order
and form a "people's government, and oppose the United States' involvement in Colombia. In
keeping with the second objective the RFF has demonstrated the strongest anti-American
sentiments of the Colombian guerrilla groups, frequently targeting U.S. officials and commercial
installations.

3416. Identify the Shining Path (SL) Group

a. Membership. The estimated membership of the Shining Path (SL) is between 4,000 and
5,000 members.

b. Headquarters. The headquarters of the SL is Ayacucho Province of Peru.

Note: In Peru "provinces" are known as "departments."

c. Area of operations. The SL operates primarily in Peru. This group is organized to conduct
simultaneous urban terrorism and rural guerrilla warfare. Particularly gruesome assassinations are
a hallmark of the SL. Victims are ritually mutilated, and the corpses are left on public display.
This practice of mutilation is in part a reflection of an Indian belief that an unmutilated victim's
spirit can reveal its killer and it also magnifies the terror effect of the killings. The indoctrination
program of the SL is an aggressive one. Its recruiting frequently targets 12- to 15-year-olds who
can be molded into highly motivated, even fanatical activists.

d. Other names. In the original language, the Shining Path is known as Sendero Luminoso.

e. Objectives/target audience. The objectives of the Shining Path are to stimulate a "peasant
armed struggle" that will lead to overthrow of the current constitutional government and install a
leftist, ethnic Indian state in the year 2000 and to attack U.S. and other "imperialist" targets in an
effort to eliminate foreign influence in Peru, embarrass the Peruvian Government, and force it to
take repressive measures.

3417. Identify the Tupac Amaru Revolutionary Movement (MRTA) Group

a. Membership. The estimated membership of the Tupac Amaru Revolutionary Movement


(MRTA) is between 100 and 200 members.

b. Headquarters. The location of the MRTA headquarters is not known.

c. Area of operations. The MRTA operate primarily in Lima, Peru.

d. Other names. In the original language, the MRTA is known as Movimiento Revolucionario
Tupac Amaru.

3-36
e. Objective/target audience. The objectives of the MRTA are to conduct "armed
propaganda" to destabilize the Peruvian Government, force U. S. Government and business
activities out of Peru, and create an image of MRTA as the Peruvian militant group aligned with
the Marxist international revolutionary movement and its proponents in contrast with the
xenophobic Shining Path Terrorist group.

Try these challenges!

(Fill in the blank)

1. The ________________________ __________________

____________________ carries out their terrorist actions in Chile.

(Fill in the blank)

2. The ________________ ________________ _______________________ ELN

primarily operates in the Northeastern parts of Columbia, near the Venezuelan

border, expanding into the central region.

(Fill in the blank)

3. The _________________ _____________ ___________________ primarily

operates in the Antioquia and Cordoba Provinces of Columbia.

3-37
(Fill in the blank)

4. The _________________ ___________________ ___________________

______________ operates in Columbia. This group, more than any other terrorist

group has a close relationship to the Narcotic traffickers in Colombia.

(Fill in the blank)

5. Primarily the __________________ _________________ ______________

operates in Bogota, as well as parts of southwest Columbia.

(Fill in the blank)

6. The ________________ __________________ operates primarily in Peru.

(Fill in the blank)

7. The ____________________ _________________ ____________________

__________________ MRTA operates primarily in Lima, Peru.

3-38
Your answers should be as follows: 1. Movement of the Revolutionary Front (MIR), 2.
National Liberation Army (ELN), 3. Popular Liberation Army (EPL), 4. Revolutionary Armed
Forces of Columbia (FARC), 5. Ricardo Franco Front (RFF), 6. Shining Path (SL), and Tupac
Amaru Revolutionary Movement (MRTA). If you answered correctly, continue. If you answered
differently, review paragraphs 3411 through 3417 before continuing.

Lesson Summary. This lesson provided you with the knowledge necessary to identify those
terrorist groups that are organic to the Americas. You also have enough background knowledge
on each group to give you a starting point for further research should you find yourself stationed
in the region.

-----------------------------------------------------------------

Lesson Exercise Complete items 1 through 17 by performing the action required. Check your
responses against those provided at the end of this lesson.

1. The area of operation for the ________ ________ ________ ___________

____ is Ecuador, primarily in the urban areas of Quito and Guayaquil.

2. The __________________ ______________ ___________ operates in Eastern

Venezuela and along the Venezuela-Colombia border.

3. The ______________________ _______________ _____________

______________ primarily operates in Honduras and are urban-based, operating

out of Tegucigalpa and San Pedro Sula.

4. The __________________ ________________ ____________ _____________

operates in San Salvador. This group has shown a high interest in United States

targets in San Salvador.

5. The ________________ _____________ ______________ __________

_____________ operates primarily inside El Salvador with some limited operations

inside Honduras. FMLN members are routinely trained at camps in Nicaragua and

Cuba.

3-39
6. The _________________________ ________________ ____________

__________ operates in rural Guatemala, with the OPRA in the southwest, the EGP

mainly in the northwest highlands, and the FAR in the extreme north.

7. There are two known headquarters for the ___________________ _____________

_______________________ ____________________ __________________ of

Tegucigalpa and San Pedro Sula, Honduras.

8. The ____________________ ________________ _____________operates along

what they consider two "fronts" in Colombia.

9. The ______________________ operates in Puerto Rico.

10. The _________________ ____________ ___________ __________________

primarily operates in the urban areas of Chile.

11. The ________________________ __________________ ____________________

carries out their terrorist actions in Chile.

12. The____________________ __________________ _____________ELN

operates primarily in the northern and northeastern parts of Colombia, near the

Venezuelan border expanding into the central region.

13. The _______________________ __________________ _________________

operates primarily in the Antioquia and Cordoba Provinces of Colombia.

14. The _________________ ___________________ ___________________

__________________ operates in Colombia. This group, more than any other

terrorist group in Colombia, has a close relationship to the narcotics traffickers in

Colombia.

3-40
15. The ___________________ ________________ ________________

operates primarily in Bogota, as well as parts of southwest Colombia.

16. The _____________________ _________________ operates primarily in Peru.

17. The ____________________ __________________ _________________

____________ MRTA operates primarily in Lima, Peru.

Lesson 4 Exercise Solutions

Reference

1. Alfaro Lives, Damn It! (AVC) 3401


2. Bandera Roja (Red Flag-GBR) 3402
3. Cinchoneros Popular Liberation Movement (MPL) 3403
4. Claira Elizabeth Ramirez Front (CERF) 3404
5. Farabundo Marti National Liberation Front (FMLN) 3405
6. Guatemalan National Revolutionary Unity (URNG) 3406
7. Lorenzo Zelaya Popular Revolutionary Forces (FPR-LZ) 3407
8. 19th April Movement (M-19) 3408
9. Macheteros (Machete Wielders) 3409
10. Manuel Rodriquez Patriotic Front (FPMR) 3410
11. Movement of the Revolutionary Front (MIR) 3411
12. National Liberation Army (ELN) 3412
13. Popular Liberation Army (EPL) 3413
14. Revolutionary Armed Forces of Columbia (FARC) 3414
15. Ricardo Franco Front (RFF) 3415
16. Shining Path (SL) 3416
17. Tupac Amaru Revolutionary Movement (MRTA) 3417

UNIT SUMMARY

This study unit provided you with a brief introduction to the different terrorist groups organic to
specific geographical regions. In particular, you were introduced to the terrorist groups
associated with Europe, Asia, the Middle East, and the Americas. In Study Unit 4, you will learn
how to further your awareness of terrorism by being introduced to the official sources of
information available to you concerning a terrorist threat, the steps you should take to determine
the existing/extended threat, and how to establish a personnel threat level or condition for a
country or region. Before starting Study Unit 4, complete the unit exercise for Study Unit 3.

3-41
Unit Exercise: Complete items 1 through 36 by performing the required action. Check your
responses against those located at the end of this study unit.

Matching: For items 1 through 5, match the terrorist group in column 1 to the
country/region in which it operates in column 2. Place your responses in the spaces
provided.

Column 1 Column 2

Terrorist group Country/region

___ 1. Armenian Secret Army for the a. Worldwide


Liberation of Armenia (ASALA) b. Portugal
___ 2. Red Army Faction (RAF) c. Ireland
___ 3. Provisional Irish Republican d. Italy
Army (PIRA) e. Basque provinces of Spain and France
___ 4. Popular Forces 25 April (FP-25) f. Germany
___ 5. Basque Fatherland and Liberty
(ETA)

Matching: For items 6 through 9, match the country in column 1 with the terrorist
group which operate in that country in column 2. Place your responses in the spaces
provided.

Column 1 Column 2

Country/region Terrorist group

___ 6. Italy a. Red Brigade


___ 7. Greece b. Revolutionary Organization
___ 8. Greece 17 November
___ 9. Germany c. Revolutionary Popular
Struggle (ELA)
d. Revolutionary Cells (RZ)
e. Popular Forces 25 April (FP-25)

Complete items 10 through 36 by performing the action required.

10. The __________________ operates primarily in Japan. The group focuses its

attacks on Japanese Government buildings, the national railway system, and it has

claimed responsibility for a number of attacks against United States facilities.

3-42
11. Although the ____________________ is considered to be an Asian terrorist

group its headquarters is in Lebanon where it finds supporters and a safe haven.

12. The _____________________________________ operates within Sri Lanka with

the intent of causing the creation of a separate Tamil state in the northern and

eastern provinces of Sri Lanka.

13. The ____________________________ operates solely in India.

14. Although the exact location of the ____________________ _______________

headquarters is not known, analysts believe the central headquarters to be located

in the Punjab Providence of India.

15. The headquarters for the __________________ ___________ _____________

_____________ is in Northern Lebanon.

16. The actual location of the headquarters is uncertain. Analysts believe the

_________________ _________________ _______________ ___________

headquarters is in Syria or Libya.

17. The previous headquarters of the ___________________ ________________

_______________________ ____________________ was Syria.

18. The three factions of the _____________________ _______________ __________

and their headquarters are: 1. Tal'at Yaqub in Syria, 2. Abu al Abbas in Iraq, and 3.

Abd al Fatah Ghanem in Libya.

19. The headquarters for the ___________________ is in Syria.

20. The area of operation for the _______________ ____________ __________

__________ is Ecuador, primarily in the urban areas of Quito and Guayaquil.

3-43
21. The __________________ ______________ ___________ operates in Eastern

Venezuela and along the Venezuela-Colombia border.

22. The ______________________ _______________ _____________

______________ operates primarily in Honduras and are urban-based, operating

out of Tegucigalpa and San Pedro Sula.

23. The __________________ ________________ ____________ _____________

operates in San Salvador. This group has shown a high interest in United States

targets in San Salvador.

24. The ________________ _____________ ______________ __________

_____________ operates primarily inside El Salvador with some limited operations

inside Honduras. FMLN members are routinely trained at camps in Nicaragua and

Cuba.

25. The _________________________ ________________ ____________

__________ operates in rural Guatemala, with the OPRA in the southwest, the EGP

mainly in the northwest highlands, and the FAR in the extreme north.

26. There are two known headquarters for the ___________________ _____________

_______________________ ____________________ __________________

Tegucigalpa and San Pedro Sula, Honduras.

27. The ____________________ ________________ _____________ operate along

what they consider two "fronts" in Colombia.

28. The ______________________ operates in Puerto Rico.

29. The _________________ ____________ ___________ __________________

primarily operates in the urban areas of Chile.

3-44
30. The ________________________ __________________ ____________________

carries out their terrorist actions in Chile.

31. The ____________________ __________________ _____________ ELN

operate primarily in the northern and northeastern parts of Colombia, near the

Venezuelan border; expanding into the central region.

32. The _______________________ __________________ _________________

operates primarily in the Antioquia and Cordoba Provinces of Colombia.

33. The _________________ ___________________ ___________________

_______________ operates in Colombia. This group, more

than any other terrorist group in Colombia, has a close relationship to the

narcotics traffickers in Colombia.

34. The ___________________ ________________ ________________

operates primarily in Bogota as well as parts of southwest Colombia.

35. The _____________________ _________________ operates primarily in Peru.

36. The ____________________ __________________ _________________

____________ MRTA operates primarily in Lima, Peru.

3-45
Study Unit 3 Exercise Solutions

Reference

1. a. 3101
2. f. 3105
3. c. 3104
4. b. 3103
5. e. 3102
6. a. 3106
7. b. 3108
8. c. 3109
9. d. 3107
10. Chukaku-Ha 3201
11. Red Army 3202
12. Liberation Tigers of Tamil Eelam 3203
13. Dal Khalsa 3204
14. Dashmesh Regiment's 3205
15. Lebanese Armed Revolutionary Faction or LARF 3306
16. Organization of the Armed Arab Struggle or OAAS 3307
17. Popular Front for the Liberation of Palestine or PFLP 3309
18. Palestine Liberation Front or PLF 3308
19. Sa'iqa 3310
20. Alfaro Lives, Damn It! (AVC) 3401
21. Bandera Roja (Red Flag-GBR) 3402
22. Cinchoneros Popular Liberation Movement (MPL) 3403
23. Claira Elizabeth Ramirez Front (CERF) 3404
24. Farabundo Marti National Liberation Front (FMLN) 3405
25. Guatemalan National Revolutionary Unity (URNG) 3406
26. Lorenzo Zelaya Popular Revolutionary Forces (FPR-LZ) 3407
27. 19th April Movement (M-19) 3408
28. Macheteros (Machete Wielders) 3409
29. Manuel Rodriquez Patriotic Front (FPMR) 3410
30. Movement of the Revolutionary Front (MIR) 3411
31. National Liberation Army (ELN) 3412
32. Popular Liberation Army (EPL) 3413
33. Revolutionary Armed Forces of Columbia (FARC) 3414
34. Ricardo Franco Front (RFF) 3415
35. Shinng Path (SL) 3416
36. Tupac Amaru Revolutionary Movement (MRTA) 3417

3-46
STUDY UNIT 4

MEET THE THREAT

Introduction. You now are able to define terrorism, you are capable of identifying known
terrorist groups, and you know where they operate; but how do you determine whether or
not you are in a threat region? More importantly, what can you do to improve your odds if
you are in a threat region? This study unit will introduce you to the official sources of
information available to you concerning terrorist threats, the steps you should take to
determine the existing/extended threat, and the method you can use to establish a personal
threat level or condition for a country or region.

Lesson 1. IS THERE A TERRORIST THREAT?

LEARNING OBJECTIVES:

1. Identify and define regions subject to travel advisory or restriction and agencies
responsible for releasing terrorist threat warnings.

2. Identify agencies that release travel advisories.

3. Identify the type of information released by the Naval Anti-Terrorism Alert Center.

4. Identify how Travel Security Advisories are disseminated within the Marine Corps.

4101. Determine Whether a Region is the Subject of a Travel Advisory or Travel


Restriction

To determine whether a region is the subject of a travel advisory or travel restriction, you as a
Marine must become knowledgeable of the meanings of and differences among the terms used to
inform you of a certain status. To begin, you should know the source or sources of information.
In determining if a region is the subject of a travel advisory or travel restriction, you must focus
on two factors. Those factors are the sources of a travel warning and the types of warnings.
First, focus on the sources of a travel warning.

a. Sources of a travel warning. A travel warning is a formal announcement of current hazards


associated with travel abroad. Such a warning is disseminated by various United States
Government agencies; among them is the Department of State. Within the Naval Services, the
Naval Anti-Terrorism Alert Center (NAVATAC) and similar offices disseminate general and
specific information regarding the terrorist threat. You must concern yourself with two of the
several types of travel warnings. They are the travel advisory and the travel restriction. Study
these two terms, their definitions, and purposes.

4-1
(1) Travel advisory. A travel advisory is a formal recognition that an upsurge in crime,
political or social unrest, guerrilla warfare, or terrorism has been observed within a
country. Travelers to or through that country should increase security awareness and
apply appropriate preventive measures. A list of general preventive measures and
specific limitations regarding travel to, through, and within each subject country is
provided in the body of the advisory.

(2) Travel restriction. A travel restriction is a formal recognition that existing conditions
of crime, political or social unrest, guerrilla warfare, or terrorism in the country
warrant a strict limitation/avoidance of travel to, through, and within the subject
country. Explanatory notes are provided in the body of each restriction.

Try the challenge.

Define the term travel advisory.

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

You are correct if your response is "a travel advisory is a formal recognition that an upsurge in
crime, political or social unrest, guerrilla warfare, or terrorism has been observed within a
country." You may continue. If you answered differently, review paragraph 4101 before
continuing.

4-2
Try the next challenge.

(Fill in the blanks)

A travel restriction is a _______________________________ recognition that existing

conditions of crime, political, or social unrest, guerrilla warfare, or

_____________________ in the country warrant a _______________________

limitation (or avoidance) of travel to, through, and within the subject country. Explanatory

notes are provided in the body of each restriction.

Your answers should be formal, terrorism, strict. If you answered correctly, continue. If your
answer is different, review paragraph 4101 before continuing.

b. Types of travel warnings. Several of the reports or studies disseminated in classified or


unclassified message form restate or incorporate newly disseminated travel warnings. The most
readily available messages are

(1) Travel security advisory (TSA). The TSA is a standard administrative message
issued quarterly as an ALMAR from the Commandant. A TSA might also
incorporate changes to previous advisories concerning high or potential physical
threat countries, proscribed travel and special notice countries, or high risk airports.
The TSA provides the following information:

(a) Countries that are currently considered high physical threat countries by the
Department of Defense. In other words, these countries are considered to have
a critical threat level, especially for permanently assigned and resident U.S.
personnel.

(b) Countries that currently present a potential physical threat (medium threat
level).

(c) Countries that are currently under proscribed travel.

(d) Special notice countries. The TSA lists special notice travel restrictions for
specific countries under the heading Special Notice Countries. An example
appears on the next page.

4-3
Example: Special Notice Countries.

Lebanon: U.S. passports considered invalid.

Iraq: U.S. persons are subject to prolonged interview by the People's Bureau of
Tourism.

(e) Countries that have High Risk Airports (HRA).

(f) Foreign cities reported by the Department of State (DoS) and other agencies to
have high levels of crime against property or persons, sometimes violent and
occasionally involving armed individuals or gangs.

(g) Select countries that are the subjects of Department of State Travel Warnings.
A DoS Travel Warning identifies

1. The type of warning, either an advisory or a restriction on travel.

2. The problem that caused the issuance of the warning, such as war
conditions, rebel insurgency, violent demonstrations, or political unrest.

3. Additional information, such as where U.S. passports are invalid, where


travel to the interior is restricted or where there are financial restrictions.

4. The date the warning was issued.

Note: A TSA is not limited to the terrorism threat alone; it will also include
information concerning the crime level in foreign countries and cities. You
should, at the very least, read the two most recent TSAs in your unit's ALMAR
file as part of your preparation for your overseas assignment. If your
dependents are accompanying you overseas, share the information with them.

(2) Anti-Terrorism Alert Center Summary (ATACSum). ATACSums are issued weekly
by the Navy Anti-Terrorist Alert Center. They provide a relatively detailed terrorism
threat assessment by geographic region, addressing the threat in each country within
the region. Each ATACSum evaluates the extent of the threat to personnel who are

(a) Assigned in the region

(b) Transient, such as sailors and Marines on a port visit

(c) Stopping, that is, interrupting international travel on planes, trains, or ships to
resume travel by another mode according to a predetermined travel schedule

4-4
Review as many ATACSums as you can before your overseas travel. They are an
invaluable asset for determining the extent of the terrorist threat and they will help
you decide what protective measures to adopt while traveling to, through, or residing
in the country. An ATACSum can be classified or unclassified.

Note: Correspond with your new command before you report. Ask your sponsor to
provide information regarding the threat, protective measures recommended by
the command, and any other items that may interest you or your dependents.
Write or call your new command if you do not hear from your sponsor.

Try the challenge.

List the three principal sources used in determining whether a country or region is subject
to a travel advisory or travel restriction.

a. ____________________________ c. ____________________________

b. ____________________________

Your answers should be to review Travel Security Advisories (as ALMARs), to review
ATACSum, and to correspond with the command you are reporting to. If your answers are
correct, continue. If you answered differently, review paragraph 1201 before continuing.

Lesson Summary. In this lesson, you learned the Department of State and the Naval
Anti-Terrorism Alert Center are the two primary sources for travel warnings. You also know the
three principal sources available to Marines for gathering information on the terrorist threat or the
level of crime are a Travel Security Advisory (ALMAR), ATACSums, and correspondence with
your command. In the next lesson, you will learn to evaluate the threat.

4-5
Lesson Exercise: Complete items 1 through 3 by performing the actions required. Check your
responses against those listed at the end of this lesson.

1. Define the term travel advisory.

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

2. A travel restriction is a _______________________________ recognition that

existing conditions of crime, political, or social unrest, guerrilla warfare, or

___________________ in the country warrant a ______________________

limitation (or avoidance) of travel to, through, and within the subject country.

Explanatory notes are provided in the body of each restriction.

3. List (in any order) the three principal sources you must use to determine whether a
country or region is subject to a travel advisory or travel restriction.

a. __________________________________________________________________

b. __________________________________________________________________

c. __________________________________________________________________

4-6
Lesson 1 Exercise Solutions
Reference

1. A travel advisory is a formal recognition that an upsurge in 4101


crime, political or social unrest, guerrilla warfare, or terrorism
has been observed within a country.
2. formal, terrorism, and strict 4101
3. (In any order) 4101
a. Travel Security Advisory (TSA)
b. ATACSums
c. Correspondence with the command

4-7
Lesson 2. EVALUATING THE THREAT

LEARNING OBJECTIVES

1. Identify and evaluate the existing threat.

2. Identify and evaluate the extended threat.

Now that you have established a basic familiarity with information that will help you in a possible
threat environment, you should begin obtaining more detailed information. You will use your
research skills at a local library or you may request information through your local Intelligence
Section (S-2), through your unit's Administrative Section (S-1), or with the assistance of your
new unit, through the Provost Marshal's Office (PMO).

4201. Determine Items to Research

As soon as you receive orders, you should begin gathering information about the region and the
country or countries you will be visiting. You should gain some familiarity with the area and the
differing social conditions that you and your accompanying dependents will encounter. Take time
to learn something about where you are going. The following are good sources for current
information:

1. Library
2. Newspapers
3. Magazines
4. Message traffic
5. Electronic bulletin boards
6. Even a tourist's guide, such as Fodor's, will provide useful information.

List (in any order) three of the six sources you should use in your personnel
research to become familiar with your host country's potential terrorist or criminal threat.

a. _______________________ c. _____________________

b. _______________________

Try the challenge.

If your answers (in any order) are any three of the following: newspapers, magazines, electronic
bulletin boards, tourist's guide books, or unit message traffic, you are correct. You may continue.
If your answers are different, review paragraph 4201 before continuing.

4-8
Now that you have established the sources of information that you will need in researching your
destination, you must now focus on the items that you should concern yourself with in
preparing for your tour of duty. You should focus on the following:

1. The country's location, size, and population


2. The local culture
3. The form of government
4. Major and minor exports
5. Principal cities
6. Principal trade and political allies
7. Languages and principal topographic features

Your command, according to Marine Corps Order (MCO) 3302.1B, must provide an appropriate
threat and travel security briefing to all personnel who are departing the United States for
overseas locations. Armed with this fundamental knowledge from the command briefing and
through your research, you should then give serious consideration to the potential for crime and
terrorism in that country to identify and put into practice appropriate protective measures. So,
you now know where to look for the information and that your command will provide assistance
in your search.

Try the challenge.

List (in any order) four of the seven items you should include in your research when
preparing for a tour of duty outside the USA.

a. ____________________________________________________________

b. ____________________________________________________________

c. ____________________________________________________________

d. ____________________________________________________________

Your answers should be any four of the following (in any order):

Country's location, size, and population


The local culture
The form of government
Major and minor exports
Principal cities
Principal trade and political allies
Languages and principal topographic features
4-9
If your answer is correct, continue. If you answered differently, review paragraph 4201 before
continuing.

4202. Determine the Existing Threat

Remember, you are the new person in the area and you should always keep this in mind as you
research. During your research, you should attempt to find as much information about the threat
as you can. Consider obtaining information about the following:

a. Identify existing terrorist groups. Are there any known terrorist, or "terrorism-using"
groups in the region? Which factions of the society that have acquired or demonstrated terrorist
capabilities? Are they well-organized, well-equipped, and well-led? The threat of terrorism is
greater in direct relationship with these factors. Which groups have used terrorism historically (in
the past)?

b. Determine the extent of popular support for the group(s). This will help you identify areas
within the country or region in which it may not be safe to travel. Over a period of time, popular
support for a terrorist group may decrease, particularly if the group becomes more isolated or if
its actions become more criminal in nature.

c. Determine if a specific nationality is targeted. What nationality does the group prefer to
target, if any? This is especially important if the terrorist groups in your area are trying to
overthrow the existing government which is supported by the United States. Find out which
groups have demonstrated a history of terrorism, especially against the United States and United
States interests in general or against United States installations or persons in particular.
Researching the history of these groups allows you to gain insight to the dynamics of their
operation and may help identify probable targets.

d. Determine the preferred method(s) of operation. What operating method does the group
prefer? What types of weapons, tactics, and methods does it favor?

4-10
Try the challenge.

Can you, without looking back, list the four topic areas discussed in evaluating the
existing threat? Write your answer in the spaces provided below.

a. ______________________________________________________________

______________________________________________________________

b. ______________________________________________________________

______________________________________________________________

c. ______________________________________________________________

______________________________________________________________

d. ______________________________________________________________

______________________________________________________________

Your answers (in any order) should be the following: a. Identify existing terrorist groups. b.
Determine the extent of popular support for the group(s). c. Determine if there is a specific
nationality targeted. d. Determine the preferred method(s) of operation. If your answers are
correct, continue. If you answered is differently, review paragraph 4202 before continuing.

4203. Evaluate the Extended Threat

You have learned to determine the threat using the four principal steps. You must use those steps
and the information that you have gathered to evaluate the extended threat. To do so, you must
gather enough information to

a. Obtain a record of the history of civil unrest. Gather any information that will indicate
unrest; including demonstrations, protest marches, rioting, clashes between ethnic groups, labor
strikes, etc.

Note: Also, research police or military reactions to these disturbances.

b. Obtain a record of developing conditions. Note developing sociopolitical conditions that


could kindle civil unrest. Pay special attention to the following:

4-11
(1) Political, social, or ethnic dissension; the people's concerns broadcast into the
political arena.

(2) Increasing activism in political spheres at colleges and universities.

(3) Formation of radical groups, branches of recognized subversive groups, or secret


societies.

(4) Social or ethnic grievances that take on political overtones; this is frequently
evidenced by

(a) The appearance of anti-government (local or U.S.) posters, leaflets, or


the appearance of an anti-establishment underground press.

(b) Organizing of meetings, rallies, marches and demonstrations; the actual cause
of such protests is overshadowed by political rhetoric heard there.

(c) Anti-government or anti-U.S. agitation: Inflammatory speeches accusing the


local or U.S. Government of being the source of the problem.

(d) An increasing degree of police or military reaction to the unrest; possible


overreaction.

(e) Increasing recruiting by known front groups for terrorism-using and terrorist
organizations, as well as by usually nonviolent radical organizations.

c. Assign a threat condition based on the nature of the extended threat. (See lesson three for
more information.)

4-12
Try the next challenge.

(Complete the statement)

The three steps (in any order) you must perform to evaluate the extended threat are

a. ______________________________________________________________

______________________________________________________________

b. ______________________________________________________________

______________________________________________________________

c. ______________________________________________________________

______________________________________________________________

Your answers (in this order) should be the following: a. obtain a record of the history of civil
unrest, b. obtain a record of developing conditions, and c. assign a threat condition based on the
nature of the extended threat. If your answers match, continue. If your answer is different,
review paragraph 4203 before continuing.

Lesson Summary. In this lesson, you have learned about the sources of information you must use
to assist you in building your knowledge of a country or region focusing on the terrorist/criminal
threat. In the next lesson, you will learn about the threat level or condition system and how you
can set a personal threat condition for yourself to use in conjunction with your personal terrorism
counteraction plan.

4-13
Lesson Exercise: Complete items 1 through 4 by performing the action required. Check your
responses against those listed at the end of this lesson.

1. List (in any order) three of the six sources you should use in your personal research to
become familiar with your host country in regards to terrorist or criminal threat.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

2. List (in any order) four of the seven items you should research when preparing for a
tour of duty outside of the U.S.A.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

d. _______________________________________________________________

3. List (in any order) the four topic areas in evaluating the existing threat.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

c. _______________________________________________________________

_______________________________________________________________

d. _______________________________________________________________

_______________________________________________________________

4-14
4. List the three steps you must take to evaluate the extended threat.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

c. _______________________________________________________________

_______________________________________________________________

Lesson 2 Exercise Solutions


Reference

1. (In any order) 4201


Library
Newspapers
Magazines
Unit message traffic
Electronic bulletin boards
Tourist's guide books
2. (In any order) 4201
The country's location, size and population
The local culture
The form of government there
Major and minor exports
Principal cities
Principal trade and political allies
Languages and principal topographic features
3. (In any order) 4202
Identify existing terrorist and terrorism-using
groups operating in that country
Identify whether factions of the society
have acquired (have been assessed),
or have demonstrated terrorist capabilities
Determine whether those groups have a
history of terrorism actions; especially actions
directed against the United States and United States'
interests in general, and actions against United States'
facilities, or United States' personnel in particular
Determine whether those groups are currently active

4-15
Lesson 2 Exercise Solutions, continued
Reference

4. a. Perform research to obtain a record or history of civil 4203


unrest; demonstrations, protest marches, rioting, and
clashes between ethnic groups, including the nature of
police or military reaction to the unrest.
b. Make note of developing sociopolitical conditions
that could kindle political violence (civil unrest).
c. Assign an informal low, medium, or high classification
based on the nature of the extended threat.

4-16
Lesson 3. ASSIGNING A THREAT LEVEL OR CONDITION

LEARNING OBJECTIVE

1. Identify the basic THREATCONs within the threat condition system.

2. Assign a threat level or threat condition to the country or region.

3. Identify security measures for THREATCONs (Alpha through Delta).

Note: The threat system discussed in this lesson is a description of the progressive
levels of the threat to United States military facilities and personnel as it is
published in MCO 5500.13.

4301. Identify the Basic THREATCONs Within the Threat Condition System

The THREATCON system is designed to standardize security measures so that inter-service


coordination and support of anti-terrorism activities are simplified. Your overseas command will
reduce, increase, or cancel declared THREATCONs as demanded by changes in the terrorist
threat. As a Marine, you must know the description of each THREATCON. The following table
will identify and describe each basic threat that you must know.

4-17
Table 4-1. Basic THREATCONs

Threat Condition Description

NORMAL No known threat indicated.

ALPHA Indicates a general threat of possible terrorist


activity against installations and personnel.
The exact nature and extent are unpredictable,
and circumstances do not justify full
implementation of THREATCON BRAVO.
Implementation of selected THREATCON
BRAVO measures as a result of intelligence
or as a deterrent may be necessary.

BRAVO Indicates an increased and more predictable


threat of terrorist action.

CHARLIE Indicates that an incident has occurred or that


intelligence has been received indicating that
some form of terrorist action is imminent.

DELTA Indicates that a terrorist attack has occurred


or that intelligence indicates that a terrorist
action against a specific location is likely.
Normally, this THREATCON is declared as
a localized warning.

Note: There is no direct relationship between the threat condition that may be
announced in an ATAC Summary, Travel Security Advisory, or Travel
Restriction and the THREATCONs discussed above.

4-18
Try the challenge.

Matching: For items 1 through 5, match the Threat Condition description in column 1 to
the Threat Condition in column 2. Place your responses in the spaces provided.

Column 1 Column 2

Description Threat Condition

___ 1. NORMAL a. Indicates that an incident has occurred,


___ 2. ALPHA or that intelligence has been received
___ 3. BRAVO indicating that some form or terrorist
___ 4. CHARLIE action is imminent.
___ 5. DELTA b. Indicates an increased and more
predictable threat of terrorist action.
c. Indicates that a terrorist attack has
occurred or that intelligence indicates
that a terrorist action against a specific
location is likely. Normally, this
THREATCON is declared as a
localized warning.
d. Indicates a general threat of possible
terrorist activity against an installation or
personnel. The exact nature and extent
are unpredictable, and circumstances do
not justify full implementation of
THREATCON BRAVO.
Implementation of selected
THREATCON BRAVO measures as a
result of intelligence or as a deterrent
may be necessary.
e. No known threat is indicated.

Your answers should be the following: 1. e, 2. d, 3. b, 4. a, and 5. c. If your answers are


correct, continue. If your answer is different, review paragraph 4301 before continuing.

4-19
4302. Reacting to THREATCONs.

How you react to a THREATCON may vary. It depends on the security measures required to
take for a specific THREATCON. The security measures that must be implemented in
THREATCONs ALPHA through DELTA are fully described in appendix D, FMFM 7-14
Combating Terrorism. Table 4-2 provides a partial, simplified list of preventive measures that are
implemented under threat conditions ALPHA through DELTA. You may reference FMFM 7-14
if you desire additional information concerning security measures. For this lesson, however, focus
your attention on those identified in Table 4-2.

4-20
Table 4-2. Partial List of Security Measure for Threat Conditions

ALPHA Be suspicious of and inquisitive of strangers.

Secure buildings, rooms, and storage areas


that are not in regular use.

Limit access to installations and residences.

BRAVO Advise dependents of the general situation;


warn personnel of potential forms of terrorist
attack.

Frequently inspect buildings, rooms, and


storage areas that are not in regular use.

Examine mail for letter or parcel bombs;


advise dependents to examine home
deliveries.

Increase surveillance of schools, messes,


clubs, and residences.

Keep vehicles locked; inspect the interior and


CHARLIE exterior of vehicles before entering or driving.

Strictly enforce control of access to


DELTA installations and residences.

Implement positive identification of all


personnel.

Search all suitcases, briefcases, packages, etc.,


brought into the installation.

Take only absolutely necessary journeys and


visits.

4-21
Try the challenge.

(Circle the letter of the correct response.)

Which group of the following security measures is enforced when a Bravo


THREATCON is set?

a. Strictly enforce control of access to installations and residences. Implement


positive identification of all personnel. Search all suitcases, briefcases, packages,
etc. that are brought into the installation.

b. Be inquisitive and suspicious of strangers. Secure buildings, rooms, and storage


areas that are not in regular use. Limit access to installations and residences.

c. Take only absolutely necessary journeys and visits.

d. Advise dependents of general situation, warn personnel of potential forms of


terrorist attack. Frequently inspect buildings, rooms, and storage areas that are
not in regular use. Examine mail for letter or parcel bombs; advise dependents to
examine home deliveries. Increase surveillance of schools, messes, clubs, and
residences. Keep vehicles locked; inspect the interior and exterior of vehicles
before entering or driving.

Your answer should be "d." If you answered correctly, continue. If you answered differently,
review paragraph 4302 before continuing.

4303. Assign a Threat Condition

As a Marine, you may be required to assign a THREATCON. If this happens, you must focus on
what is needed for the safety of those under your charge. When assigning the THREATCON,
you must focus only on the facts that you receive from a higher echelon. The initial information
that you receive may not require strict security measures. However, as the threat increases you
must make accommodation by imposing stricter security measures. The precautions will apply to
both workplaces and residences. As a part of your counteraction program, you should consider
implementing an informal threat condition that parallels the THREATCON system. Table 4-3
provides a comparison of a formal threat classification system and the threat levels.

4-22
Table 4-3. Threat conditions and threat levels

Threat Condition Classification Threat Level

THREATCON NORMAL Low

THREATCON ALPHA Low

THREATCON BRAVO Medium

THREATCON CHARLIE High

THREATCON DELTA Very High

Try the challenge.

Situation: You have received orders to CENTCOM in Naples, Italy. You know from
your research that a revolutionary urban guerrilla group, known as the Red Brotherhood,
has a long history of terrorist actions against isolated police and military posts and
personnel in and around Naples. They have recently published a pamphlet calling for a
general demonstration against the United States for its involvement in peacekeeping
operations in Somalia. The last ATACSum indicated that surveillance activity of
Marine Barracks, Naples has been detected. The ATACSum assessed a low/medium
threat condition to permanently assigned U.S. personnel in Naples, and a low/low
condition to transient U.S. personnel. A TSA (medium threat) has been issued. Based
on this information and using table 4-3, answer the following.

1. Based on the information, you would set a threat level of

________________________________________________________________

2. Based on the information, you could reasonably expect the THREATCON at

Marine Barracks, Naples to be _______________________________________

4-23
Your answers should be a. Medium and b. BRAVO. If your answer is correct, continue. If you
answered differently, review paragraph 4303 before continuing.

Lesson Summary. In this lesson, you learned to identify the basic THREATCONs within the
threat condition system; to identify security measures for the basic THREATCONs (ALPHA

----------------------------------------------------------------

Lesson Exercise: Complete items 1 through 8 by performing the action required. Check your
responses against those listed at the end of this lesson.

Matching: For items 1 through 5, match the Threat Condition description in Column
1 to the Threat Condition in Column 2. Place your responses in the spaces provided.

Column 1 Column 2

Description Threat Condition

___ 1. NORMAL a. Indicates that an incident has occurred,


___ 2. ALPHA or that intelligence has been received
___ 3. BRAVO indicating that some form or terrorist
___ 4. CHARLIE action is imminent.
___ 5. DELTA b. Indicates an increased and more
predictable threat of terrorist action.
c. Indicates that a terrorist attack has
occurred or that intelligence indicates that
a terrorist action against a specific location
is likely. Normally, this THREATCON is
declared as a localized warning.
d. Indicates a general threat of possible
terrorist activity against an installation or
personnel. The exact nature and extent are
unpredictable, and circumstances do not
justify full implementation of
THREATCON BRAVO. Implementation
of selected THREATCON BRAVO
measures as a result of intelligence or as a
deterrent may be necessary
e. No known threat is indicated.

4-24
Complete item 6 by circling the letter of the correct response.

6. Which group of the following security measures are enforced when a BRAVO
THREATCON is set?

a. Strictly enforce control of access to installations and residences.


Implement positive identification of all personnel. Search all suitcases,
briefcases, packages, etc. that are brought into the installation.

b. Be inquisitive and suspicious of strangers. Secure buildings, rooms, and


storage areas that are not in regular use. Limit access to installations and
residences.

c. Take only absolutely necessary journeys and visits.

d. Advise dependents of general situation, warn personnel of potential forms of


terrorist attack. Frequently inspect buildings, rooms, and storage areas that are
not in regular use. Examine mail for letter or parcel bombs; advise dependents
to examine home deliveries. Increase surveillance of schools, messes, clubs,
and residences. Keep vehicles locked; inspect the interior and exterior of
vehicles before entering or driving.

Based on the information provided in the following situation, complete item 7 by circling the letter
of the correct response.

Situation: You have received orders to CENTCOM in Naples, Italy. You know from
your research that a revolutionary urban guerrilla group, known as the Red
Brotherhood has a long history of terrorism actions against isolated police and
military stations and personnel in and around Naples. They have recently
published a pamphlet calling for a general demonstration against the United
States for its involvement in peacekeeping operations in Somalia. The last
ATACSUM which addressed the region indicated that surveillance activity (by
an unknown individual) of Marine Barracks, Naples has been detected. The
ATACSUM assessed a low/medium threat condition to permanently assigned
U.S. personnel in Naples, and a low/low condition to transient U.S. personnel.
A TSA (medium threat) has been issued. Based on this information, and using
the charts provided in paragraph 4303, answer the following.

7. What threat level would you assign?

a. None c. Medium
b. Low d. High

4-25
8. Which THREATCON should the Barracks Commander declare?

a. ALPHA c. CHARLIE
b. BRAVO d. DELTA

Lesson 3 Exercise Solutions:

Reference

1. e. 4301
2. d. 4301
3. b. 4301
4. c. 4301
5. a. 4301
6. a. 4302
7. c. 4303
8. a. 4303

UNIT SUMMARY

In this study unit you learned about those agencies that release terrorism threat warnings and
travel advisories. You were able to identify types of information released by the Navy
Anti-Terrorism Alert Center, and how Travel Security Advisories are disseminated within the
Marine Corps. You are also able to use the information when evaluating existing and extended
threats. You have learned the sources needed to determine travel warnings. You know the
meanings of a travel warning and a travel restriction. You can identify those documents used to
announce travel warnings and restrictions. You have also learned to identify basic
THREATCONs within the threat conditions system. You can also identify THREATCONs
(ALPHA through DELTA). This study unit has also taught you to assign personnel threat levels
or threat conditions to a country or region. In the next study unit, you will learn to prepare for
assignment to a threat region. You are now ready for the unit exercise.

4-26
Unit Exercise: Complete items 1 through 8 by performing the action required. Check your
responses against those listed at the end of this study unit.

A ___________ ___________ is a formal recognition that an upsurge in crime,

political or social unrest, guerrilla warfare, or terrorism has been observed within the

country. Travelers to or through that country should increase security awareness and

apply appropriate preventive measures. A list of general preventive measures and

specific limitations regarding travel to, through, and within each subject country is

provided in the body of the ____________.

2. A travel restriction is a _______________________________ recognition that

existing conditions of crime, political, or social unrest, guerrilla warfare, or

_____________________ in the country warrant a _______________________

limitation (or avoidance) of travel to, through, and within the subject country.

Explanatory notes are provided in the body of each restriction.

3. What are the three principal sources used in determining whether a country or region
is subject to a travel advisory or travel restriction?

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

4. List (in any order) three of the six sources you should use in your personal research to
become familiar with your host country in regards to terrorist or criminal threat.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

4-27
5. List (in any order) four of the seven items you should include in your research of a
country or region.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

d. _______________________________________________________________

6. List (in any order) the four topic areas in evaluating the existing threat.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

c. _______________________________________________________________

_______________________________________________________________

d. _______________________________________________________________

_______________________________________________________________

7. List (in any order) the three steps you must take to evaluate the extended threat.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

c. _______________________________________________________________

_______________________________________________________________

4-28
8. Situation: You have received orders to CENTCOM in Naples, Italy. You know
from your research that a revolutionary urban guerrilla group, known as the Red
Brotherhood has a long history of terrorism actions against isolated police and
military stations and personnel in and around Naples. They have recently published a
pamphlet calling for a general demonstration against the United States for its
involvement in peacekeeping operations in Somalia. The last ATACSUM that
addressed the region indicated that surveillance activity (by unknown
individual/individuals) of Marine Barracks, Naples has been detected. The
ATACSUM assessed a low/medium threat condition to permanently assigned U.S.
personnel in Naples, and a low/low condition to transient U.S. personnel. A TSA
(medium threat) has been issued.

Based on this information you would set a threat level of ____________________.

Matching: Complete items 9 through 13 by matching THREATCON in Column 1


with the correct THREATCON description in Column 2. Place your response in
the spaces provided.

Column 1 Column 2

THREATCON THREATCON description

___ 9. NORMAL a. Indicates that an incident has occurred, or


___ 10. ALPHA that intelligence has been received
___ 11. BRAVO indicating that some form of terrorist
___ 12. CHARLIE action is imminent.
___ 13. DELTA b. Indicates an increased and more predictable
threat of terrorist action.
c. Indicates that a terrorist attack has
occurred or that intelligence indicates that a
terrorist action against a specific location is
likely. Normally, this THREATCON is
declared as a localized warning.
d. Indicates a general threat of possible
terrorist activity against an installation or
personnel. The exact nature and extent are
unpredictable, and circumstances do not
justify full implementation of
THREATCON BRAVO. Implementation
of selected THREATCON BRAVO
measures as a result of intelligence or as a
deterrent may be necessary.
e. No known threat is indicated.

4-29
For item 14, circle the letter of the correct response.

14. Which of the following security measure(s) is/are enforced when a THREATCON
BRAVO is set?

a. Strictly enforce control of access to installations and residences.


Implement positive identification of all personnel. Search all suitcases,
briefcases, packages brought into the installation.

b. Be inquisitive and suspicious of strangers. Secure buildings, rooms, and


storage areas not in regular use. Limit access to installations and residences.

c. Take only absolutely necessary journeys and visits.

d. Advise dependents of general situation, warn personnel of potential forms of


terrorist attack. Frequently inspect buildings, rooms, and storage areas not in
regular use. Examine mail for letter or parcel bombs; advise dependents to
examine home deliveries. Increase surveillance of schools, messes, clubs, and
residences. Keep vehicles locked; inspect the interior and exterior of vehicles
before entering or driving.

Study Unit 4 Exercise Solutions

Reference

1. (In this order) travel advisory, advisory 4101


2. (In this order) formal, terrorism, strict 4101
3. (In this order) 4101
Travel Security Advisory (ALMAR)
ATACSums
Correspondence with the command
4. (Any three and in any order) 4201
Library
Newspapers
Magazines
Unit message traffic
Electronic bulletin boards
Tourist's guide books

4-30
Study Unit 4 Exercise Solutions, continued

Reference

5. (Any four and in any order) 4201


The country's location, size, and population
The local culture
The form of government
Major and minor exports
Principal cities
Principal trade and political allies
Languages and principal topographic features
6. (In any order) 4202
Identify existing terrorist and terrorism-using groups operating
in that country.
Identify whether factions of the society have acquired
(have been assessed) or have demonstrated terrorist capabilities.
Determine whether those groups have a history of terrorist
actions; especially actions directed against the United States
and United States' interests in general, and actions against
United States' facilities, or United States' personnel in particular.
Determine whether those groups are currently active.
7. (In any order) 4203
Perform research to obtain a record or history of civil unrest;
demonstrations, protest marches, rioting, and clashes between
ethnic groups, including the nature of police or military reaction
to the unrest.
Make note of developing sociopolitical conditions that could
kindle political violence (civil unrest).
Assign an informal low, medium, or high classification based
on the nature of the extended threat.
8. Medium 4301
9. e. 4301
10. d. 4301
11. b. 4301
12. a. 4301
13. c. 4302
14. d. 4303

4-31
STUDY UNIT 5

PREPARE FOR ASSIGNMENT TO A THREAT REGION

Introduction. So far, you learned what mental skills and knowledge you should have for
assignment in a threat region involving a terrorist threat. In this study unit, you will learn
what steps you must take to become physically prepared for such an assignment. If you
are a member of a unit that is currently part of a Unit Deployment Program (UDP), some
of what you will be assigned to learn is managed by the unit administrative section.
Although the following information is applicable in other scenarios, you should consider it
within the context that you could become a hostage as a result of a terrorist act.

Lesson 1. APPROPRIATE LEGAL DOCUMENTS

LEARNING OBJECTIVES

1. Given a scenario, identify the appropriate personal legal documents you must possess
and terms you must recognize before assignment to a threat region.

2. Define the term "power of attorney."

5101. Identify a "Will"

a. Definition. A will is a legal statement describing your wishes concerning the distribution of
your property assets after your death.

b. Importance. Every Marine should have a current will that legally specifies the
distribution of his or her assets in case of death. This is true regardless of how much or little you
own. If you are married, it is especially important for both you and your spouse to each have a
will. Whatever expense and bother you incur for the preparation of even a simple will could be
very worthwhile and perhaps even pay large dividends when it is time to settle your estate. A will
that clearly states your wishes could save your loved ones the trouble and cost of repeated court
trips and legal costs.

c. Preparation. Since a will is a legal document, you can often do more harm than good by
preparing one yourself without the benefit of legal guidance. Many Marine Corps Base Legal
Offices offer assistance at no cost for the preparation of wills. If you decide to have your will
prepared by someone outside the Marine Corps legal services, you should select a qualified lawyer
to help you draft your will.

The next step is for you to choose an executor (male) or executrix (female). This is the person
who will "execute" or carry out the provisions of your will when you die. It is not wise to select
your executor/executrix based on sentiment. Remember, the person you select is going to decide
your affairs after you are deceased.

5-1
To help you decide, imagine that right now you are not able to handle your affairs because of a
serious medical problem. Ask yourself, "Who do I want to step in and take charge for me?" The
executor/executrix should be someone you trust and someone who has agreed to administer your
will. Have the person you select confer with your lawyer for a complete explanation of an
executor's/executrix's responsibilities and for answers to any questions.

d. Safeguarding. The original will should be located and arrangements made so your
executor/executrix will have access to your will upon your death. A sound approach is to have a
lawyer hold the will and then notify the executor/executrix when he/she is needed.

Note: Most people appoint their spouse as the executor/executrix. This is not always
the wisest choice. You must keep in mind that your spouse will probably have
many other problems to take care of when you die.

Try the following three challenges.

(Circle the letter of the correct response.)


1. Define the term "will."
a. A legal statement describing your wishes regarding the distribution of your
property assets after your death
b. A document stating your wishes
c. A legal document describing your property assets
d. A legal document describing your family's wishes concerning distribution of
your property assets after your death

(Complete the statement by circling the letter of the correct response.)


2. Since a will is a legal document,
a. you should only seek legal assistance if you have a large amount of assets.
b. you should not distribute it to your executor/executrix.
c. you can often do more harm than good by preparing one yourself
without the benefit of legal guidance.
d. you should not use a lawyer who is your friend or a friend of your family.

5-2
(Complete the statement by circling the letter of the correct response.)
3. The executor/executrix of your will is the person who
a. assists you in drafting the will.
b. assists the lawyer with the typing and distribution of your will.
c. will execute or carry out the directives of your will when you die.
d. will execute or carry out the directives of your power of attorney.

Your answers to these challenges should be as follows: 1. a., 2. c., and 3. c. If your answers are
correct, great! Continue with the lesson. If you answered differently, review paragraph 5101
before continuing.

5102. Identify "Power of Attorney"

a. Definition. A power of attorney is a written document transferring your legal authority to


another person in the terms that you set forth.

b. Purpose. There are times in life when legal complications arise. During these times it is
very inconvenient or perhaps impossible for you to be there. A power of attorney allows an
individual to act as your trusted agent, or in legal terms, as your "attorney-in-fact" in the event
you are unable to be present for a legal transaction.

c. Types. The amount of power you want your attorney-in-fact to have determines the type of
power of attorney you will have drawn up. There are two types of power of attorney.

(1) General. Gives broad power and authority.

(2) Special (or limited). Gives power confined to the specific act(s) described, or for the
specific time frame indicated.

d. Preparation. It is highly recommended that a power of attorney document be prepared for


you by an attorney or a legal assistance officer. The power of attorney should be prepared for a
limited amount of time. The power of attorney should not extend for a long-term period.
Remember, the person named as your attorney-in-fact legally represents you and his or her actions
bind and obligate you legally.

e. Safeguarding. Safeguard the actual power of attorney document as carefully as you would
a will. The original should be held by the attorney-in-fact.

5-3
Try these challenges.

(Circle the letter of the correct response.)

1. Define the term "power of attorney."


a. A legal document describing your property assets
b. A written document transferring your legal authority to another person in
terms that you set forth
c. A legal document describing your family's wishes concerning distribution
of your property assets after your death
d. A written document giving your attorney exclusive power over your estate

(Circle the letter of the correct response.)

2. The two types of power of attorney are


a. liberal and conservative.
b. single-party and multi-party.
c. general and special.
d. financial and estate.

Your answers to the challenges should be as follows: 1. b. and 2. c. If you answered correctly,
excellent! Now continue. If you answered differently, reread paragraph 5102 before continuing.

Lesson Summary. In this lesson, you learned which legal documents you should have drawn up
prior to assignment to a country where the threat of terrorism exists. Now you know that a will is
a legal document that makes known your wishes regarding distribution of your estate after your
death. You also now know that a power of attorney gives your attorney-in-fact the legal right to
act on your behalf during your absence. In the next lesson, you will learn what you should do to
become mentally prepared for assignment in a threat region. However, before continuing to the
next lesson, complete the following lesson exercise.

5-4
Lesson Exercise: Complete items 1 through 5 by circling the letter of the correct response.
Check your answers against those provided.

1. Define the term "will."

a. A legal statement describing your wishes regarding the distribution of your


property assets after your death
b. A document stating your wishes
c. A legal document describing your property assets
d. A legal document describing your family's wishes regarding distribution of
your property assets after your death

2. Since a will is a legal document, you

a. should only seek legal assistance if you have a large amount of assets.
b. should not distribute it to your executor/executrix.
c. can often do more harm than good by preparing one yourself without the
benefit of legal guidance.
d. should not use a lawyer who is a friend or friend of your family.

3. The executor/executrix of your will is the person who

a. assists you in drafting the will.


b. assists the lawyer with the typing and distribution of your will.
c. will execute or carry out the directives of your will when you die.
d. will execute or carry out the directives of your power of attorney.

4. Define the term "power of attorney."

a. A legal document describing your property assets


b. A written document transferring your legal authority to another person in the
terms you set forth
c. A legal document describing your family's wishes regarding distribution of
your property assets after your death
d. A written document giving your attorney exclusive power over your estate

5. The two types of power of attorney are

a. liberal and conservative.


b. single-party and multi-party.
c. general and special.
d. financial and estate.

5-5
Lesson 1 Exercise Solutions

Reference

1. a. 5101
2. c. 5101
3. c. 5101
4. b. 5102
5. c. 5102

5-6
Lesson 2. PREPARE MENTALLY FOR ASSIGNMENT TO A THREAT REGION

LEARNING OBJECTIVES

1. Identify sources of material for researching a country.

2. Identify steps to take when preparing mentally for assignment to a threat region.

In this lesson, you will learn where to go and what to research as you continue to prepare yourself
mentally for assignment to a threat region. Researching and learning as much as you can about
the country to which you have been assigned is very beneficial. Being familiar with the country's
customs and people will make you confident and aware once you are in the country. You have
already learned what to look for when researching the threat of a region. Now, you will learn
what information you should focus on to develop a mental picture of the country, including its
people, the language, the economy, and the culture. In many instances, you will find that research
in one area will spill over into another. Conducting adequate research in all areas will allow you
to combine the pieces for a better picture of the region and any possible terrorist threat.

5201. Identify Sources of Research Material

Knowledge is the key. Your current unit's intelligence (Intel.) section (S-2) is a good place to
start your research. They may even have reports already prepared that you could use. Most
intelligence shops have the U.S. State Department's "Background Notes." These are brief country
studies covering most of the world. Upon request, your S-2 representative can contact the local
Naval Criminal Investigative Service (NCIS) office and set up a brief for you, and possibly for
your dependents, on the terrorist threat for the area to which you have been assigned. Another
source of general information is the local library.

Try the challenge.

(Circle the letter of the correct response.)

Three sources for information about the country to which you have been assigned are

a. your administration section, the S-2, and movies.


b. NCIS, the S-2, and the Department of Justice.
c. your S-2, NCIS, and the local library.
d. your S-2, NCIS, and the Department of Justice.

Your answer should be "c." If you answered correctly, good! Continue with the lesson. If your
answer is different, review paragraph 5201 before continuing.

5-7
5202. Identify the Culture of the Country/Region

Your research into the culture of a country or region gives you insight about what to expect once
you get there. Your knowledge of the culture of your assigned country will give you some idea
about how you will be treated and how you should act as a Marine in that country. Okinawa is a
good example of how the changing culture, resulting from the changing economy, in an assigned
country can affect a Marine's life. In the late 1980's, Marines assigned to Okinawa were extended
many privileges by the Okinawans due to the relationship between the Japanese yen and the
American dollar. During the 1980's, the yen was weak against the American dollar so the average
Marine was considered fairly wealthy. However, in the 1990's, the reverse occurred. The dollar
is now weak against the yen. As a result, many Marines assigned to Okinawa are no longer
extended the preferential treatment enjoyed during the 1980's. To some, the changing relationship
between the dollar and the yen is a small concern in the big picture of life, but for Marines
assigned to Okinawa this has been very significant. Both economically, and more importantly,
culturally, the Marine in Okinawa felt a big impact.

At a minimum, your research into the country or region should include the following areas.

a. History. The more you know about the history of a country, the better off you are. The
history of a country influences how its people live and how they view foreigners. That means
you! Learn the country's history and you have an advantage which you can use to foster
friendships with the locals.

"Those who do not study history are doomed to repeat it."


--Anonymous
This, in turn, can be used to strengthen your terrorism counteraction plan. You might ask, "How
are these related?" Well, from your research, you know that in many countries the people believe
friendships to be extremely important, even sacred. They would rather suffer hardships than
cause something unfortunate to happen to a friend. Such an understanding of the local people will
give you a better idea about how to evaluate information you may receive. For instance, let's
suppose you are living in a country with this value about friendship in its culture. You took the
time to learn the country's history, so you have been able to develop some friendships with the
local people. Let's say one of your friends from the local population comes to you with
information about the community you live in. He tells you about something happening that could
be detrimental to your health. Based on the knowledge and insight you gained from your
research, you would be wise to listen to him.

Your research of history should include the following topics:

(1) Personalities. Research those individuals who were significant in the early
development of the country, including rulers, presidents, heroes, and political figures.

(2) Religion. Research religion. It often plays a significant role in history and can be a
catalyst for terrorism.

5-8
(3) Political parties. Research their impact on the country.

(4) Wars.

(5) Revolutions. Research for revolting groups that did not win. This could indicate
possible terrorist activity in the country.

b. Society. Research about the present day society will confirm what you learned during your
historical research and will allow you to build on it. You will be able to collect much of your
information from periodicals. Periodicals will provide the most up-to-date information about the
society today. Areas of particular importance include the following:

(1) Class/caste. Class/caste systems have in the past proven to be sources of conflict.
Typically, the people of lower classes/castes revolt against the more privileged.

(2) Politics. Research politics as they apply presently to the country and internationally.

(3) Religion. Research whether the religion of today is the same as in the past. Often it
may be the same religion, but a different sect or order.

(4) Customs/traditions. These include actions and ways that have been carried on from
one generation to the next and have become part of the culture. Knowing these can
ultimately assist you in avoiding terrorist situations.

(5) Economy. The economy of the country may be strong internationally, but the
people of the country may suffer due to foreign ownership of industries. Profit from
such industries does not always filter back into the country's economy. Sometimes
the opposite may be true. The country's economy flourishes because industries are
locally owned and operated, and the capital from the sale of products is returned to
the country's economy. Money is a strong incentive for terrorism.

(6) Ideology. This is the study of ideas of an individual or a group of individuals. It


includes, but is not limited to, the following: beliefs, religion, customs, prejudices,
individual experiences, and the nature and source of their ideas. This is probably the
most difficult area to research because of its complexity. You are looking for
information about how and what the people of the country think and, in particular,
what do they think of the United States and U.S. citizens in their country.

c. Geography. The physical shape of the country's geography may not be as important to you
as the boundaries which separate the country from its neighbors. Often, the manmade boundaries
of a country are reason enough for a terrorist presence, particularly when there are people who
see themselves as having being wronged by, or weaker than, or subordinate to those who control
the land.

5-9
Try the following challenges to refresh your memory on what you have learned.

(Circle the letter of the correct response)

1. When researching the culture of a country, you should look at these categories:
a. politics, society, and religion.
b. history, society, and geography.
c. religion, economy, and agriculture.
d. customs and traditions, history, and geography.

(Circle the letter of the correct response)

2. What is the benefit of researching the country where you have been assigned?
a. It affords you the opportunity to visit all of the more interesting sights
once you are in the country.
b. It makes you an authority on the country.
c. It causes you to worry about what might happen once you are in the
country.
d. It allows you to develop confidence and become familiar with the country's

(Circle the letter of the correct response)

3. What areas should you consider when researching a country's history?


a. Personalities, religion, political parties, wars, and revolutions
b. Ideology, economy, and revolutions
c. Personalities, religion, political parties, and ideology
d. Class/caste system, economy, religion, and revolutions

(Circle the letter of the correct response)

4. What areas should you consider when researching a country's society?


a. Personalities, religion, political parties, wars, and revolutions
b. Ideology, economy, and revolutions
c. Personalities, religion, political parties, and ideology
d. Class/caste system, politics, religion, customs/traditions, economy, and
ideology

5-10
Your answers should be as follows: 1. b., 2. d., 3. a., and 4. d. If you answered correctly,
continue with the lesson. If you answered differently, review paragraph 5202 before continuing.

5203. Identify Linguistic Skills

History has shown that when a foreigner is able to converse with the natives in the native
language, tensions are lowered. Face it, you may not be able to hide the fact that your skin or hair
is different, but you can do something about the language barrier. Although many Marines have
successfully completed uneventful tours in foreign lands without knowing the native language, it
is always a good idea to learn the language of the country where you are stationed.
If you are able to communicate with the local people in their own language, you are less likely to
become a victim of terrorist acts. By knowing the language, you will better understand what is
happening around you. This state of being is better known as "situational awareness." If you are
taken hostage, you will have a significant advantage if you can speak the language of your
captors. For the purposes of this course, two types of language are spoken in any country:
official (formal) and native.

a. Official language. The official language of any country is that which is spoken by the
formally educated and is used in writing. In the United States, this is referred to it as proper
English. If you are serious about learning the language, focus on the official language first. Once
you have a good understanding of the official language, you will naturally pick up dialects and the
native language. Many libraries have self-paced language tapes available to help you learn a new
language.

b. Native language. The native language is the language of the common man and is sometimes
referred to as slang. In most countries, this is the form of language you will hear most often and
is usually easier to learn because it is the language of the streets. In many cases, the native
language changes as the culture changes. If you and/or your dependents must live out in the
community with the local people, knowing the native form of the language will help you become
part of the community. Being part of the community helps build a bond between you and the
local people, which leads to acceptance of you and/or your dependents.

Try the following challenges.

(Circle the letter of the correct response.)

1. When researching in preparation for assignment to a threat region, you should


learn some of the language used by the host country. Usually, there are two
forms of the same language. They are

a. jive and lingo.


b. English and Spanish.
c. official and native.
d. written and spoken.

5-11
(Circle the letter of the correct response.)

2. The official language of a country is that which is used by

a. the lower class/caste of the country and also what is used in writing.
b. the whole country but is not used in writing.
c. diplomats of the country only when they are dealing with U.S. citizens.
d. the formally educated and also what is used in writing.

(Circle the letter of the correct response.)

3. The native language of a country is

a. the language of the common man.


b. used by the lower class/caste of the country and is also used in writing.
c. used by the country's diplomats only when they are dealing with U.S.
citizens.
d. the language of the formally educated and is also used in writing.

(Fill in the blank)

4. Before you arrive in the country of your duty assignment, you should learn the

____________________________ language of the country.

Your answers to the challenges should be as follows: 1. c., 2. d., 3. a., and 4. official. If you
answered all of the challenges correctly, great! Continue with the lesson. If any of your answers
are different, review paragraph 5203 before continuing.

5204. Identify Education of Dependents

Sometimes Marines become so involved in preparing for a deployment or assignment they forget
to consider their dependents. Your dependents, whether accompanying you or remaining behind,
require your consideration and as much information as you can provide them. If your dependents
are remaining in the United States, they will need an understanding and appreciation of the
circumstances and possible difficulties you may encounter in your new assignment.
This is especially true if you have been assigned to an area with an active terrorist threat. You
should provide your dependents the same information you receive. This information may come
5-12
from your unit or from other organizations outside your chain of command. At a minimum,
provide the following information to your dependents:

a. History of the country or region. Your dependents need to have the same background
information about the country as you have. However, you may receive information in briefings or
lectures that are classified. Of course, classified information should not be shared with your
dependents and others who do not have the appropriate security clearances.

b. The society of the country. Remember, information that interests you will probably interest
your dependents as well. For instance, both you and your accompanying dependents will want to
know the customs of your assigned country concerning treatment of children and women in the
society. Depending upon your assignment, it may prove very important for you and your
dependents to know the social rules governing such things as behavior and dress while in public.

c. Geography of the country. Your dependents should be educated about the geography of
the country. In particular, they should understand the boundaries of their newly assigned country.
This includes the roles, locations, and the types of boundaries--manmade, ethnic, and cultural.

d. Living conditions of the country. Your dependents should be briefed about the living
conditions for both the native population and for other Americans living in the country. This will
give them an idea of what to expect. They will be made aware of preparations they need to make
for life in this new environment. All this will help them adjust to unfamiliar conditions.

e. Linguistic abilities. Encourage your dependents to learn the fundamentals of the official
language of your newly assigned country. Explain to your dependents that it will be easier for
them to fit in and feel "at home" if they learn to communicate with the citizens of your host
country. Point out to your dependents that if they first learn a good, solid base of the official
language, once inside the country they will more easily pick up the native language.

To find out how much you remember, try these challenges.

(Circle the letter of the correct response.)

1. What five areas should your dependents know prior to assignment to a terrorist
threat region?

a. Religion, society, culture, linguistics, and living conditions


b. Geography of the country, living conditions of the country, economy,
linguistics, and religion
c. History of the country or region, the society of the country, living conditions
of the country, geography, and linguistics
d. Official language, native language, religion, society, and culture
5-13
(Circle the letter of the correct response.)

2. While educating your dependents about the society of your assigned country, you
should pay particular attention to

a. how children and women are treated.


b. the current monetary exchange rate.
c. how to ask for travel directions in the native language.
d. distinguishing the different ethnic and cultural boundaries of a country.

(Circle the letter of the correct response.)

3. When educating your dependents about the living conditions in a country, be sure
to tell them

a. how to ask for travel directions in the native language.


b. how the native population and other Americans in the country live.
c. about the current monetary exchange rate.
d. how to distinguish between the different ethnic and cultural boundaries of
the country.

Your answers to the challenges should be as follows: 1. c., 2. a., and 3. b. If your answers are
correct, good! Continue with the lesson. If you answered differently, review paragraph 5203
before continuing.

Lesson Summary. Now you know how to conduct the necessary research to become mentally
prepared for assignment to another country, particularly if that country has a terrorism threat.
You know where to go to start your research and which agencies will assist you. You also know
the type of information to research for both yourself and for your dependents. Before continuing,
complete the following lesson exercise.

5-14
Lesson Exercise: Complete items 1 through 12 by performing the action required. Check your
responses against those listed at the end of this lesson.

For items 1 through 8, circle the letter of the correct response.

1. Which of the following lists three sources of information about the country to which
you have been assigned?

a. Your administration section, the S-2, and movies


b. NCIS, the S-2, and the Department of Justice
c. Your S-2, NCIS, and the local library
d. Your S-2, NCIS, and the Department of Justice

2. Which of the following should you look at when you research the culture of another
country?

a. Politics, society, and religion


b. History, society, and geography
c. Religion, economy, and agriculture
d. Customs and traditions, history, and geography

3. What areas should you look at when researching a country's history?

a. Personalities, religion, political parties, wars, and revolutions


b. Ideology, economy, and revolutions
c. Personalities, religion, political parties, and ideology
d. Class/caste system, economy, religion, and revolution

4. What areas should you look at when researching a country's society?

a. Personalities, religion, political parties, wars, and revolutions


b. Ideology, economy, and revolutions
c. Personalities, religion, political parties, and ideology
d. Class/caste system, politics, religion, customs and traditions, economy, and
ideology

5. What is the benefit of researching the country to which you have been assigned?

a. It affords you the opportunity to visit all of the more interesting sights once you
are in the country.
b. It makes you an authority on the country.
c. It causes you to worry about what might happen once you are in the country.
d. It allows you to develop confidence and become familiar with the country's
customs and its people, allowing you to become confident and more aware once
you are in the country.

5-15
6. When researching in preparation for assignment to a threat region, you should learn
some of the language used by the host country. Usually, there are two forms of the
same language. They are

a. jive and lingo.


b. English and Spanish.
c. official and native.
d. written and spoken.

7. The official language of a country is that which is used by

a. the lower class/caste of the country and also what is used in writing.
b. the whole country but is not used in writing.
c. diplomats of the country only when they are dealing with U.S. citizens.
d. the formally educated and also what is used in writing.

8. The native language of a country is

a. the language of the common man.


b. used by the lower class/caste of the country and is also used in writing.
c. used by the country's diplomats only when they are dealing with U.S. citizens.
d. the language of the formally educated and is also used in writing.

For item 9, fill in the blank.

9. Before you arrive in the country of your duty assignment, you should learn the

____________________________ language of the country.

For items 10 through 12, circle the letter of the correct response.

10. What five areas should your dependents know prior to assignment to a terrorist threat
region?

a. Religion, society, culture, linguistics, and living conditions


b. Geography of the country, living conditions of the country, economy,
linguistics, and religion
c. History of the country or region, the society of the country, living conditions of
the country, and linguistics
d. Official language, native language, religion, society, and culture

5-16
11. While educating your dependents about the society of your assigned country, you
should pay particular attention to

a. how children and women are treated.


b. the current monetary exchange rate.
c. how to ask for travel directions in the native language.
d. distinguishing the different ethnic and cultural boundaries of a country.

12. When educating your dependents about the living conditions in a country, be sure to
tell them

a. how to ask for travel directions in the native language.


b. how the inhabitants and other Americans in the country live.
c. about the current monetary exchange rate.
d. how to distinguish between the different ethnic and cultural boundaries of the
country.

Lesson 2 Exercise Solutions

Reference

1. c. 5201
2. b. 5202
3. a. 5202
4. d. 5202
5. d. 5202
6. c. 5203
7. d. 5203
8. a. 5203
9. official 5203
10. c. 5204
11. a. 5204
12. b. 5204

5-17
Lesson 3. PREPARE PHYSICALLY FOR ASSIGNMENT TO A THREAT REGION

LEARNING OBJECTIVE

Identify appropriate actions when preparing physically for assignment to a threat region.

In this lesson, you will learn to prepare physically for assignment to a threat region. This includes
physical fitness preparation, preparing appropriate civilian clothing, preparing personal items, and
medical preparedness.

5301. Identify Personal Physical Fitness

It should go without saying that you should be in good shape prior to arriving in your assigned
country. Keep in mind that there is the possibility you could become a hostage. History has
shown that physically fit individuals taken hostage survived the ordeal better than others. They
were physically prepared for hardship. Once captive, they continued physical exercise to stay
alert and ease the stress associated with captivity.

Consider the following recommendations when developing a personal physical fitness program.

a. Anaerobic conditioning. Anaerobic conditioning includes exercises to increase speed,


flexibility, and agility. All of these are essential to total fitness. Anaerobic exercises stress
development of muscle, offering little or no cardiovascular development. A number of books are
available to help you develop your fitness program. Your unit's operations office (S-3) should
have a copy of Marine Physical Readiness Training for Combat (FMFRP 0-1B), which you can
use to develop a program. The key is research, plan, and then implement the plan. Figure 5-1 is a
sample conditioning program from FMFRP 0-1B.

5-18
Fig 5-1. Sample of a conditioning program from FMFRP 0-1B.

Progressive resistance training is technically anaerobic in nature. Progressive resistance training is


usually equated with weight training, but resistance training can also be accomplished with
isometric exercises, partner resistance exercises, and similar exercises that are related to
cardiovascular conditioning.

5-19
b. Aerobic Conditioning. Aerobic conditioning involves exercises that build cardiovascular
endurance. Swimming, long distance running, and rope jumping are all forms of aerobic
conditioning. You may have the strength and the speed, but if you don't have the endurance, you
are only halfway to being physically fit.

Note: Even with a good program, becoming physically fit will take time. Do not let a
lack of time prevent you from starting your physical fitness program. Once you
have started, do not become discouraged if it takes time to develop and
maintain fitness.

Try these challenges.

(Circle the letter of the correct response)

1. What two areas of physical fitness should you develop and strengthen before
arriving in your assigned country?

a. Running and swimming


b. Meditation and retrospection
c. Mental conditioning and aerobic conditioning
d. Anaerobic conditioning training and aerobic training

(Circle the letter of the correct response)

2. Even though progressive resistance training is considered anaerobic conditioning,


it is useful because

a. it can be employed in a large selection of methods and this results in a variety


of exercises.
b. the limited scope of its employment makes development of a fitness program
easy.
c. weights have a restrictive use.
d. the Marine Corps accepts it.

Your answers to these challenges should be as follows: 1. d., and 2. a. If you answered correctly,
great! Continue with the lesson. If you answered differently, review paragraph 5301 before
continuing.

5-20
5302. Identify Appropriate Clothing

By applying the material you have gathered during your research, you should have a very good
idea of how you and your dependents should dress while in your assigned country. Keep the
following three basic considerations in mind as you leave the United States and go to your foreign
duty assignment.

a. Conservative clothing. Dressing conservatively will go a long way in helping you and your
dependents fit into the new environment of your host country. You should show pride in yourself
and in your country by dressing distinctively, but not flamboyantly. This is especially true when
you are on leave or liberty. You must remember that in some countries the focus is not on the
individual, but rather on the group. In those countries, it is more valued to fit in and be a member
of the group, a part of the whole. Often, in the United States, the opposite is true; standing out
as an individual is valued. You may see this difference in the way the people of your host country
dress. If it is a country that values group membership over the distinction of the individual, you
will see very little variation in the clothing of the native population. So, of course, if you dress in
your host country like you do in the United States, you will definitely be the center of attention,
which in this case means you will stick out like a sore thumb. Although being the center of
attention may be a positive thing in the United States, it goes against the custom and culture of
many countries that value the group over the individual. Your goal is to blend in with the local
population. You do not want to stand out. So, save your American finery for base during liberty
hours. Out in town, blend in as well as you can. Even with appropriate clothing choices, you will
stand out somewhat because certain things like mannerisms and language will clearly indicate to
others that you are a U.S. Marine or U.S citizen.

Here are some recommendations for preparing your wardrobe.

(1) Hats. While on liberty in a country, wear a conservative hat. Unless a large
percentage of the native population is wearing hats with logos of American sports
teams, cowboy hats, or other uniquely American-style hats, your best bet is not to
wear one of these.

(2) Shirts. As with the hats, unless the native population is wearing shirts with logos on
them, especially logos associated with the U.S., then you should not wear these
either. Do not wear shirts that depict vulgarity or obscenities. If the message on your
shirt could possibly be viewed by the native population as offensive, do not wear it.

(3) Belt buckles. In very few countries do the native people wear large belt buckles.
Usually large belt buckles are associated with Americans. In fact, if you wear a large
belt buckle, especially a highly visible one, you might as well wear a neon sign
flashing "American." As a representative of your country living and traveling in a
hostage threat region, are you sure you want to wear a large belt buckle?

5-21
As a general rule, your clothing should be conservative, present a positive image, and blend in
with the native population. Once you arrive in your host country, talk with Marines who have
time on station and follow their advice. Experience is the best teacher.

Try this challenge.

(Circle the letter of the correct response)

As a general rule, the way you dress when assigned to a country with a terrorist threat
should be

a. bold and loud.


b. comfortable and distinctively American.
c. conservative, present a positive image, and blend in with the native
population.
d. exactly the same as the population of your host country.

Your answer should be "c." If you answered correctly, continue with the lesson. If your answer
is different, review paragraph 5302 before continuing.

Lesson Summary. You now know that physical fitness is an important part of preparing for
assignment to a threat region. You have learned that anaerobic and aerobic conditioning are key
element in the development of physical fitness. Furthermore, you learned that by dressing
conservatively and presenting a positive image are techniques you can employ to blend in with the
populace of the country. Before continuing, complete the lesson exercise.

-----------------------------------------------------------------

Lesson Exercise: Complete items 1 through 3 by performing the action required. Check your
responses against those listed at the end of this lesson.

Complete items 1 through 3 by circling the letter of the correct response.

1. What two areas of physical fitness should you develop and strengthen before arriving
in your assigned country?

a. Running and swimming


b. Meditation and levitation
c. Mental conditioning and aerobic conditioning
d. Anaerobic conditioning training and aerobic training

5-22
2. Even though progressive resistance training is considered anaerobic conditioning,
it is useful because

a. it can be employed in a large selection of methods and this results in a variety of


exercises.
b. the limited scope of its employment makes development of a fitness program
easy.
c. weights have a restrictive use.
d. the Marine Corps accepts it.

3. As a general rule, the way you dress when assigned to a country with a terrorist threat
should be

a. bold and loud.


b. comfortable and distinctively American.
c. conservative, present a positive image, and blend in with the native population.
d. exactly the same as the population of the host country.

Lesson 3 Exercise Solutions

Reference

1. d. 5301
2. a. 5301
3. c. 5302

UNIT SUMMARY

In this study unit, you learned to prepare for assignment in a threat region. Now you know the
legal documents you should prepare. You know that having a personal will drawn up is important
to ensure your personal estate is settled according to your wishes upon your death. You know
that a power of attorney gives a trusted individual chosen by you the power to legally act on your
behalf in your absence. In addition to preparing physical documents, you must also prepare
mentally before arriving in a threat region. To do this, you now know where to start your
research and what information to look for, including the information your accompanying
dependents should have prior to their arrival in the host country. You also know how to prepare
your clothing, especially liberty attire, for your assignment in a threat region. You want to dress
for success. In this case, success means avoiding becoming a victim of a terrorist act.
In other words, you want to dress to survive. You learned that your clothing should be
conservative, present a positive image, and allow you to blend in with the native population.
In Study Unit 6, you will learn procedures to counteract a terrorist threat.

5-23
Unit Exercise: Complete items 1 through 20 by performing the action required. Check your
responses against those located at the end of this study unit.

For item 1 through 13, circle the letter of the correct response.

1. Define the term "will."

a. A legal statement describing your wishes concerning the distribution of your


property assets after your death
b. A document stating your wishes
c. A legal document describing your property assets
d. A legal document describing your family's wishes concerning distribution of
your property assets after your death

2. Since a will is a legal document, you

a. should only seek legal assistance if you have a large amount of assets.
b. should not distribute it to your executor/executrix.
c. can often do more harm than good by preparing one yourself without the
benefit of legal guidance.
d. should not use a lawyer who is your friend or a friend of your family.

3. The executor/executrix of your will is the person who

a. assists you in drafting the will.


b. assists the lawyer with the typing and distribution of your will.
c. will execute or carry out the directives of your will when you die.
d. will execute or carry out the directives of your power of attorney.

4. Define the term "power of attorney."

a. A legal document describing your property assets


b. A written document transferring your legal authority to another person in
terms that you set forth
c. A legal document describing you family's wishes concerning distribution of
your property assets after your death
d. A written document giving your attorney exclusive power over your estate

5. The two types of power of attorney are

a. liberal and conservative.


b. single-party and multi-party.
c. general and special.
d. financial and estate.

5-24
6. Three sources for information about the country to which you have been assigned are

a. your administration section, the S-2, and movies.


b. NCIS, the S-2, and the Department of Justice.
c. your S-2, NCIS, and the local library.
d. your S-2, NCIS, and the Department of Justice.

7. When researching the culture of a country, you should look at these categories:

a. politics, society, and religion.


b. history, society, and geography.
c. religion, economy, and agriculture.
d. customs and traditions, history, and geography.

8. What is the benefit of researching the country where you are being assigned?

a. It affords you the opportunity to visit all of the more interesting sights
once you are in the country.
b. It makes you an authority on the country.
c. It causes you to worry about what might happen once you are in the country.
d. It allows you to develop confidence and become familiar with the country's
customs and its people, allowing you to be confident and more aware once you
are in the country.

9. What areas should you consider when researching a country's history?

a. Personalities, religion, political parties, wars, and revolutions


b. Ideology, economy, and revolutions
c. Personalities, religion, political parties, and ideologies
d. Class/caste system, economy, religion, and revolution

10. What areas should you consider when researching a country's society?

a. Personalities, religion, political parties, wars, and revolutions


b. Ideology, economy, and revolutions
c. Personalities, religion, political parties, and ideology
d. Class/caste system, politics, religion, customs/traditions, economy, and
ideologies

5-25
11. When researching in preparation for assignment to a threat region, you should learn
some of the language used by the host country. Usually there are two forms of the
same language. They are

a. jive and lingo.


b. English and Spanish.
c. official and native.
d. written and spoken.

12. The official language of a country is that which is used by

a. the lower class/caste of the country and also what is used in writing.
b. the whole country, but is not used in writing.
c. diplomats of the country only when they are dealing with U.S. citizens.
d. the formally educated and also what is used in writing.

13. The native language of a country is

a. the language of the common man.


b. used by the lower class/caste of the country and is also used in writing.
c. used by diplomats of the country only when they are dealing with U.S.
citizens.
d. the language of the formally educated and is also used in writing.

For item 14, fill in the blank.

14. Before you arrive in the country of your duty assignment, you should learn the

____________________________ language of the country.

For items 15 through 20, circle the letter of the correct response.

15. What five areas should your dependents know prior to assignment to a terrorist threat
region?

a. Religion, society, culture, linguistics, and living conditions


b. Geography of the country, living conditions of the country, economy,
linguistics, and religion
c. History of the country or region, the society of the country, living conditions of
the country, and linguistics
d. Official language, native language, religion, society, and culture

5-26
16. While educating your dependents about the society of your assigned country, you
should pay particular attention to

a. how children and women are treated.


b. the current monetary exchange rate.
c. how to ask for travel directions in the native language.
d. distinguishing the different ethnic and cultural boundaries of a country.

17. When educating your dependents about the living conditions in a country, be sure to
tell them

a. how to ask for travel directions in the native language.


b. how the native population and other Americans in the country live.
c. them about the current monetary exchange rate.
d. how to distinguish between the different ethnic and cultural boundaries of the
country.

18. What two areas of physical fitness should you develop and strengthen before arriving
in your assigned country?

a. Running, swimming, and climbing


b. Meditation, levitation, and retrospection
c. Mental conditioning, progressive resistance training, and aerobic
conditioning
d. Anaerobic conditioning, progressive resistance training, and aerobic
training

19. Even though progressive resistance training is considered anaerobic conditioning,


it is useful because

a. it can be employed in a large selection of methods and this results in a variety of


exercises.
b. the limited scope of its employment makes development of a fitness program
easy.
c. weights have a restrictive use.
d. the Marine Corps accepts it.

20. As a general rule, the way you dress when assigned to a country with a terrorist
threat should be

a. bold and loud.


b. comfortable and distinctively American.
c. conservative, present a positive image, and blend in with the native population.
d. exactly the same as the population of your host country.

5-27
Study Unit 5 Exercise Solutions

Reference

1. a. 5101
2. c. 5101
3. c. 5101
4. b. 5102
5. c. 5102
6. c. 5201
7. b. 5201
8. a. 5201
9. d. 5201
10. d. 5201
11. c. 5202
12. d. 5202
13. a. 5202
14. official 5202
15. c. 5203
16. a. 5203
17. b. 5203
18. d. 5301
19. a. 5301
20. c. 5302

5-28
STUDY UNIT 6

COUNTERING THE THREAT--PART I

Introduction. Your overseas assignment will take you to a country that has sociopolitical
and legal environments differing from those you have experienced in the United States.
With only a limited introduction to your host country, you may have to make hasty
decisions that will have an effect on your entire tour. In Study Unit 5, you learned the
safety and security procedures to use when traveling to a threat region. In this study unit,
you will learn protective measures that you and/or your family should practice when
stationed in a threat region.

Lesson 1. INDIVIDUAL PROTECTIVE MEASURES

LEARNING OBJECTIVES

1. Given a scenario involving visiting or being stationed in an area with a terrorist threat
and a list of security measures, state those measures you would use in selecting living
quarters.

2. Given a scenario involving your being stationed in an area with a terrorist threat and a
list of security measures, state those measures you would use in hardening your
personal residence.

Studies have shown that by simply avoiding routines and varying when, where, and how you do
daily tasks will reduce your chances of becoming a victim. In the last lesson, you learned safety
and security procedures you should use when traveling to a threat region. In this lesson, you will
learn safety and security measures that you should use when selecting a residence in a threat
region. In addition, you will learn those measures to consider for strengthening your personal
residence against possible criminal/terrorist actions.

6101. Select Living Quarters

At least half of your time is spent in and around your residence. Almost everything you do from
day to day starts or ends in the vicinity of your home. Thus, there are a number of aspects to
consider when selecting the location of your residence. In any case, you should obtain preliminary
information from reliable individuals who are familiar with the area and know which
neighborhoods are secure. Usually, this information can be obtained from the Unit Security
Officer, the Embassy Administrative Officer, the local housing office, or Marine personnel
currently assigned to the area. In some instances, you will have no choice of the quarters in which
you will live. You may be assigned specific quarters occupied by your predecessor, or that have
been designated, based on rank or position. In other instances, the quarters may be government
owned, or someone in the unit may have previously arranged a rental or lease to save you time in
getting settled. In any event, you should begin your consideration of residential security by
learning all you can about the neighborhood.

6-1
a. Neighborhood check. If quarters have not been pre-selected for you, determine through
your office or through the unit where potential quarters can be found. The best way to become
familiar with a neighborhood is on foot. Walking around enables you to get a good view of the
entire neighborhood. Pay particular attention to

(1) The streets including their width, whether paved or unpaved, maintenance, number of
vehicles parked on the street, and vehicular traffic patterns

(2) Sidewalks, lighting, and pedestrian traffic patterns

(3) Parks and recreational areas

(4) The existence of public or commercial enterprises intermingled with residential


dwellings

(5) Fire hydrants and police call boxes

The types of residences in the area will give you some idea of the income level of the
neighborhood. Families with similar income levels frequently share similar lifestyles and this
enhances rapport among neighbors. Note the overall security precautions that people are taking
in that neighborhood. Barred windows security fences, extensive lighting, large dogs, and guards
(particularly during the day) may be indicators of a high crime level in the area. As you conduct
your neighborhood check, try to keep a mental image of the neighborhood in relation to the rest
of the city or town. An area map is of considerable benefit. Once you have looked at the
neighborhood, you should consider its proximity to police and fire-fighting facilities, hospitals,
shopping facilities, and your place of work. Familiarize yourself with the routes to all locations
that you will frequent to ensure that you will be able to cope with any emergency that may arise.

b. Crime level. The level of crime or terrorist activity throughout a community is not uniform.
Street crimes can be expected to occur in areas that are used as residences for lower income
families where conditions include crowding and congestion. The overall crime rate can be
expected to be high in downtown or commercial areas as well as in isolated areas. It is
recommended that you avoid these areas. Personnel in your unit should be aware of local crime
levels in the various areas of the community; if not, the unit security officer should have the
information or be able to obtain it from local police or higher headquarters counterintelligence
representatives.

c. Police security capabilities. Unit security personnel should be able to provide an assessment
of police protection available to you in a given area. Your observations of police patrol activity
made during your neighborhood check, or the absence of such patrols, provides a good indication
of the degree of police protection available. Police who take pride in their appearance and the
appearance of their vehicles and who make themselves visible to the public in the performance of
their duties can usually be relied upon to provide dependable police coverage throughout the
community.

6-2
One factor worthy of consideration is the attitude of the government and the populace toward
other nationals, particularly Americans. A strong anti-American attitude should cause you to have
diminished faith in effective local police response.

d. Utilities services and protection. The reliability of utilities service in any given location
should be a primary factor in the selection of a residence. In many under-developed countries,
electricity, running water, indoor plumbing, and telephone service are either unavailable,
unreliable, or in the process of just being provided. The reliability of utilities should be
determined, and in cases where they are determined to be inadequate, you should consider using a
backup system. Disruption of utility services (particularly electricity and telephone) would
facilitate an intruder's ability to gain access to your residence. Consider then, the locations of
terminal boxes and wiring. If they are outside of the house or outside of perimeter fencing and
readily available to an intruder, you should consider security precautions, backup systems, or
another residence.

e. Fire protection. A variety of factors must be considered in determining the degree of fire
protection you may need in a particular residential area. Primary among those factors is the
construction of the residence itself. You should determine if the materials used in construction
are easily combustible, the dependability of the electrical wiring and fixtures, and how many and
what type of exits there are in case of fire. Smoke detectors and fire extinguishers may be
necessary items, as well as some means of getting out of upper story windows. The proximity
and effectiveness of the fire department is a major consideration. You should determine the
availability of water or other substances to fight a fire. You should note the locations of fire
hydrants or other water sources.

f. Environmental considerations. You can avoid potential losses/damages as a result of theft


or terrorist attack through good security practices. Other losses such as environmentally caused
hazards are difficult to prevent. Determine from unit personnel who have been in the area for
some time if the area in which you are planning to live is subject to any of the various weather
conditions that could cause damage or isolate you (such as wind or dust storms, typhoons,
tornadoes, or severe rain storms). Other non-weather related factors to be considered include
flooding from rivers or lakes, landslides, or earthquakes. Whenever possible, avoid locating in
areas that are prone to natural disasters. However, when this is not possible, plan to take
necessary precautions to prevent loss or injury from potential disasters. Your plans should
include emergency rations, lighting, power, communications, and any other system that could be
disrupted as a result of an environmental disaster.

g. Access routes. Consider available access routes. Ask yourself these questions. Are there
access routes in the vicinity of your residence and where is the greatest danger to your exits? An
examination of statistics of kidnapping and assassinations has shown that the vast majority occur
close to the residence when the victim is leaving or returning home. It is essential that access
routes to and from your residence provide sufficient alternatives that you can avoid ambush or
attacks. Having the ability to leave or enter your home from at least two points will significantly
compound the problem of planning an ambush. In most cases, this variable will force the
terrorists to select an easier target. Some considerations should include the following:

6-3
(1) Clear delineation of street or roadway.

(2) Sufficient width to allow two cars to pass, even if vehicles are parked on both sides of
the roadway.

(3) Sufficient lighting at night.

(4) Unobstructed view of the road from your residence. The most important of all
considerations when reflecting on access routes is to select a residential location that
will not lock you into predictable patterns. Specifically, it is essential to avoid
locating on a dead-end or one-way street. Locations such as these provide the
terrorist with the ideal opportunity for an ambush that would be almost impossible for
you to avoid.

(h) Parking. In selecting your residence, consideration must be given to securing your
personal property. Included in the personal property to be protected are your various means of
transportation. Bicycles, motorcycles, mopeds, and other two-wheeled vehicles are usually
relatively easy to secure. Often they will fit into a storage shed, or they can be locked close to the
residence where they can be observed. The family car, and in some cases, official vehicles that
have been approved for transportation between home and office, present another problem.
Ideally, a garage that can be locked is the most suitable means of securing your vehicles when not
in use. Often; however, this luxury will not be available to you. Carports and driveways within a
fenced or guarded area will normally suffice. At the least, some means of parking off the street
must be considered.

6-4
Check to see how much you remember by completing this challenge.

List (in any order) the eight security considerations for selecting a residence.

a. _____________________________________________________________

b. _____________________________________________________________

c. _____________________________________________________________

d. _____________________________________________________________

e. _____________________________________________________________

f. _____________________________________________________________

g. _____________________________________________________________

h. _____________________________________________________________

Your answers should include the following: neighborhood check, crime level, police security
capabilities, utilities services and protection, fire protection, environmental considerations, access
routes, and parking. If your answer to the challenge is correct, continue. If your answers are
different, review paragraph 6101 before continuing.

6102. Identify Security Measures for Personal Residences

As stated earlier, over half of your time is spent in or around your residence. Based on this fact
alone, you can reasonably conclude that you should make your residence as secure as possible, or
at the very minimum, as secure as is allowed. The physical deterrents that are addressed may not
be practical for all circumstances; however, they are included for your benefit should you need
them. The following deterrents will provide for your safety when properly used.

a. Locks. The first line of defense in building or improving on physical security of a structure
is through the use of locks or locking devices. Locks are delaying devices that are designed for
perimeter security. Intruders cannot take the risk of creating loud noises in an attempt to defeat
or break locks, nor can they afford the time needed to pick or decode them.

6-5
b. Doors. Door security is only as good as the construction of the door and frame. The
following are four types of doors:

(1) Flush wood doors

(a) Hollow-core. These doors are made of two sheets of thin veneer overlaying
hollow cardboard strips.

(b) Solid-core. These doors are made of two sheets of wood veneer overlapping a
solid wooden core.

(2) Stile and rail (panel wood doors)

Note: Solid core doors provide a substantial security advantage over hollow core
doors.

(3) Metal doors. Metal doors are superior to wood.

Note: It is practically a given that you will not be able to replace the door of your
residence with a metal door.

(4) Sliding glass doors. These doors provide easy access to a residence but pose a
complex security problem. To secure sliding glass doors you must first consider them
as extremely large windows. Just like windows, they are designed with little or no
consideration for security. Many factors affect our ability to secure this type of
entrance. It is not enough to prevent them from being moved horizontally, you must
secure them vertically as well. The channel in which the door rides provides wide
tolerances and facilitates the vertical lifting of the door out of its channel. You may
overcome this by inserting sheet metal screws into the upper channel and allowing
them to protrude far enough to prevent the door from being lifted out of the channel.
The easiest method to ensure the door cannot be opened from the outside is to drill a
small hole through the channel and the frame and insert a pin or nail to prevent the
door from being opened. Figure 6-1 illustrates this upgrade.

6-6
Fig 6-1. Locking and anti-lift devices for sliding glass doors.

Try the following challenges to see how much of the information you remember concerning the
types of doors.

(Fill in the blank)

1. Solid-core doors provide a _______________________________ security

advantage over hollow-core doors.

(Fill in the blank)

2. From the security viewpoint, metal doors are _____________________ to wood

doors.

(Fill in the blanks)

3. Sliding glass doors are extremely large _______________ and pose

__________________ security problems.

6-7
(Fill in the blanks)

4. The simplest measures to prevent a sliding glass door from being lifted out of

its channel is to drill a hole through the __________________ and the

______________. Insert a pin or nail to prevent the door from being opened.

Your answers to the challenges should be as follows: 1. substantial, 2. superior, 3. windows


and complex, and 4. channel and frame. If you answered the challenges correctly, continue. If
you answered differently, review paragraph 6102 before continuing.

Now that you have been introduced to the four types of doors and how to secure a sliding glass
door, you should focus your attention on how to secure other types of doors. To secure an
existing door, you should concentrate on the following:

(5) Striker plates. A secure lock is only as good as the striker plate it engages. A close
fit between the lock and the striker plate reduces door movement when the door is
closed. Figure 6-2 illustrates the striker plate fit on the door frame. If the striker
plate is not securely affixed to a sturdy door frame, it is easily forced apart.

Fig 6-2. Fit of the striker plate.

6-8
(6) Hinges. The security value of the hinge is often overlooked. A well-secured hinge
prevents forcing a door out of its frame. If you consider upgrading you should also
consider whether the hinge is on the inside or the outside of the door. If the hinge
pins are on the outside of the door they can be removed and the door removed from
the frame. There are a number of ways to overcome this. One is to weld the hinge
pins at both ends or in the middle while they are still in the hinge. This procedure is
effective, but permanent. Another way is to drill a small hole through the hinge and
hinge pin while they are together and inserting a small finishing nail flush with the
surface of the hinge. Another method requires you to insert two large screws into the
door or the jamb, leaving the heads exposed to fit into corresponding holes in the
jamb or door when the door is shut. Figure 6-3 illustrates the exposed screw
upgrade.

Fig 6-3. Exposed screw upgrade.

Check how much you remember by doing these challenges.

(Fill in the blanks)

1. A close fit between the lock and the ___________________ _____________

reduces door movement when the door is closed.

6-9
(Fill in the blank)

2. One method of securing hinges is to weld the ends. This method is effective, but

_____________________________.

(Fill in the blank)

3. Another technique for securing door hinges is to drill a small hole through the

hinge and into the pin and _______________________________ a second pin

or small nail flush with the hinge surface.

(Fill in the blank)

4. Another technique for securing door hinges requires inserting two large screws

in the door (or jamb) and leaving the screw head exposed 1/2 inch. Drill a

________________ hole on the opposite side so the screw head fits into the

hole when the door is shut.

Your answers to the challenges should be as follows: 1. striker plate, 2. permanent, 3. insert,
and 4. corresponding. If your answers are correct, continue. If you answered any of the
challenges differently, review paragraph 6102 before continuing.

c. Windows. Windows pose more security problems than doors in that they are designed with
little or no thought of security. Intruders avoid breaking glass because of the noise that it causes
and the potential injury that they may incur. That leaves the intruder no choice but to defeat the
windows locking device. The following are several security measures you can employ to upgrade
window security.

6-10
(1) Sash and frame pin. The simplest measure to upgrade window security is to drill one
or more holes through the sash and frame and insert a pin or nail to prevent the
window from being opened. Figure 6-4 illustrates the sash and frame pin technique.

Fig 6-4. Sash and frame pin technique for upgrading window security.

(2) Key-operated locks. Key-operated locks are of two types. The first is installed as a
part of the window and replaces the standard window lock. The second type secures
to frame, blocking the raising or sliding of the window.

Note: Key-operated locks pose a safety hazard should the window be needed for
escape in an emergency.

(3) Steel bars, mesh, or grillwork. The use of this type of upgrade is usually of a more
permanent type with the bars, mesh, or grillwork being permanently fixed to the
structure. Steel bars, mesh, or grillwork, although the most secure, are expensive and
may prevent emergency exit.

6-11
Try the challenge.

List (in any order) the three recommended methods for upgrading the security of
windows.

a. ______________________________________________________________

b. ______________________________________________________________

c. ______________________________________________________________

Your answers (in any order) should be sash and frame pin, key-operated locks, and steel bars,
mesh or grillwork. If your answers are correct, continue. If your answer is different, review
paragraph 6101 before continuing.

d. Lighting. Using lighting as a type of security is most effective. Most intruders will do
anything they can to escape visual detection. Therefore, they will choose to strike at a time when
the residence appears vacant and preferably dark. Outdoor lighting can be a major deterrent
against intrusion. Properly used it discourages criminal activity and increases observability. The
following are considerations you should make when upgrading the security of your residence:

(1) Coverage and evenness of lighting. Coverage and evenness of lighting are important
elements of protective lighting. It is entirely possible in some residential settings that
existing street lights, along with one or two porch lights will provide sufficient
illumination. Usually, additional lighting is required to provide good coverage. The
type of lighting to be used, the locations of the lighting, and the wattage will be
dictated by the type of residence in which you live, the amount of masking by trees
and shrubbery, and other security lighting in the area.

(2) Consistency with other residences. The use of security lighting should be consistent
with other houses in the area. While good lighting is a deterrent to intruders,
lighting in excess of that elsewhere in the vicinity would make your residence stand
out and highlight your presence.

6-12
Try the challenge.

List the two considerations for the use of lighting as a security measure for a residence.

a. ______________________________________________________________

b. ______________________________________________________________

Your answers should be (in any order) coverage and evenness of lighting and consistency with
other residences. If your answers are correct, continue. If you answered differently, review
paragraph 6102 before continuing.

e. Alarms. In areas abroad where forced entry of a residence is commonplace or where an


active terrorist threat is present, consideration should be given to the use of a residential alarm
system. Alarm systems consist of the sensors (contact switches, panic switches, pressure mats,
ultrasonic detectors, etc.), a control panel that monitors the sensors and transmits any
non-programmed stimuli such as an opened door, or breaking glass, to an alarm device. The
alarm device can be a bell, siren, or flashing light, and usually is a local alarm which sounds or
flashes within the home being protected. A remote reporter can make the intrusion known in
another location by means of a telephone dialer or a wired connection to a police department, an
alarm company's central station, an answering service, or the home of a friend. Any alarm system
that you consider should have the following features:

(1) The system should be capable of operating on the local AC electrical current and have
a rechargeable battery backup.

(2) The system should be relatively easy to install and troubleshoot. Many local
electricians may not be capable of installing or repairing a complex system.

(3) The system should have a time delay feature to allow the occupant to arm or disarm
the system without activating the alarm.

(4) The alarm system should have a closed circuit capability for the perimeter contact
switches. This provides line security if the line is cut and will put the system into an
alarm condition.

(5) The system should be capable of being wired for a panic switch.

(6) The system should have an adjustable reset/rearm feature.

6-13
Note: In some circumstances you will not have a choice as to whether you will or will
not have an alarm. Alarms are included in this lesson to give you as many
options as possible when developing your countermeasures plan.

Try these challenges.

1. List (in any order) two security measures used to improve the security of your
residence.

a. _________________________________________________________

b. _________________________________________________________

2. State the circumstances in which the use of an alarm is recommended.

____________________________________________________________

____________________________________________________________

____________________________________________________________

____________________________________________________________

(Circle the letter of the correct response)

3. Choose the feature not recommended for consideration when selecting an alarm
system. The system should

a. be capable of operating on the local AC electrical current and have a


rechargeable battery backup.
b. be relatively easy to install and troubleshoot.
c. should not have the ability to be wired with a panic switch.
d. have a time delay feature to allow the occupant to arm or disarm the system
without activating the alarm.
e. have an adjustable reset/rearm feature.

6-14
Your answers should be as follows: 1. lighting and alarms, 2. (Words to the effect of) "In areas
abroad where forced entry of a residence is commonplace or where an active terrorist threat is
present, consideration should be given to the use of a residential alarm system," and 3. "c." If all
of your answers are correct, you may continue. If you answered any of the challenges differently,
review paragraph 6102 before continuing.

6103. Identify Dogs as a Means of Enhancing the Security of Your Residence

A variety of animals have been used in the past as living alarms and security protection systems.
Geese, ducks, and monkeys can be depended on to make a noise when disturbed, but the most
commonly used animal has been the dog.

a. Alertness. The dog's greatest security asset is its alertness. The dog's senses are far more
developed than those of man. For example a dog's sense of smell is one hundred times greater
than that of a human; therefore a dog can discriminate between odors more effectively than a
human. A trained dog can detect an intruder's scent in excess of 250 yards. A dog's ability to
hear surpasses a human's in both range and pitch. The dog's upper frequency limits are twice that
of man. A dog's sense of sight and touch are for the most part no greater than that of a human.
The general consensus is that a dog's vision is weaker than man's. However, dogs are more
sensitive to movement despite other visual failings.

b. Audible alarm. The dog's sensitive and discriminating senses of smell and hearing enable it
to quickly detect a stranger who is not normally present in the residential area, and a
well-trained dog will normally bark when approached by an intruder. Based on this, the dog can
be considered an "audible alarm" system.

c. Canine considerations. If you do not own a dog but plan on getting one only to provide
security, there are several factors you should consider.

(1) If you are not an animal lover, you should consider an alternative means of
security. Dogs thrive on affection and respond best to direction and training when
they are aware of that affection from the owner. A dog that receives no petting or
praise and that is not permitted to associate with the owner's family may be prone to
incessant barking or howling.

(2) In selecting your dog, consider smaller, non-shedding dogs for apartments or houses
where the dog will be kept inside.

(3) Dogs require plenty of water (fit for human consumption) and a well-balanced diet.
Discourage others from feeding your dog and train it not to accept food from anyone
except members of the family.

(4) Dogs need ample exercise. Your dog should have free run of your yard. If it does
not have the run of the yard, it should be taken out on a leash for a walk at least daily.

6-15
(5) A warning sign on your fence, both in English and the language of the country, to
"Beware of dog" will discourage unwanted visitors such as salesmen, peddlers, or
beggars.

See how much you remember. Try the following challenges.

(Circle the letter of the correct response)

1. What is a dog's greatest security asset?

a. Size c. Aggressiveness
b. Speed d. Alertness

(Circle the letter of the correct response)

2. Why should a dog be considered an "audible alarm?" A dog can be trained

a. to bark whenever anyone enters the residential area.


b. not to bark.
c. to attack voluntarily.
d. to bark only when an intruder enters the residential area.

Your answers to the challenges should be as follows: 1. d and 2. d. If you answered differently,
review paragraph 6103 before continuing.

6104. State Special Security Considerations for Children

a. Education. Children are an easy target for terrorists because of the inherent trust most
children have in people. Although our society has, in the past few years, stressed the importance
of parents training their children not to trust or even talk to strangers, there are certain security
measures you can take to further ensure your child's safety and prevent him or her from being
used in a terrorist operation.

Note: Although what you will learn has been designed with a terrorist threat in mind,
the security information will serve in many situations to protect a child from
becoming the victim of a criminal act.

(1) Advise. Advise children to

6-16
(a) Avoid isolated streets and play areas.

(b) Travel and play in groups.

(c) Never answer a stranger's questions.

(d) Keep family members informed of their whereabouts.

(e) Immediately report all attempts to question, annoy, or molest them.

(f) Note all information possible about unusual incidents.

(2) Check. Ensure school officials will release your children only to responsible
known members of the family or verified designees.

(3) Consider.

(a) Not permitting children to ride public transportation unaccompanied.

(b) Having children escorted to and from school if possible.

(c) Never leaving young children at home unattended.

(d) Requesting your local provost marshal conduct a home security survey or
obtain a home security checklist from the military police.

Try these challenges.

1. List (in any order) three of the six security measures a child should be advised of.

a. _________________________________________________________

_________________________________________________________

b. _________________________________________________________

_________________________________________________________

c. _________________________________________________________

_________________________________________________________

6-17
(Circle the letter of the correct response)

2. What should you ensure school officials do in providing security for your
children?

a. Provide a clean and healthy learning environment


b. Ensure prompt and timely dismissal at the end of the school day
c. Release your children only to responsible known members of the family or
verified designees
d. Release your children only to family members who have your written
authorization

Your answers to the challenges should be as follows: 1. (Any three of the following in any order)
Avoid isolated streets and play areas, Travel and play in groups, Never answer a stranger's
questions, Keep family members informed of their whereabouts, Report immediately all attempts
to question, annoy, or molest them, and note all information possible about unusual incidents, 2.
c, and 3. b. If your answers are correct, continue. If any of your answers are different, review
paragraph 6104 before continuing.

Lesson Summary. In this lesson, you have learned to select a residence in a terrorist threat
environment and to improve or harden the security of your residence. You now know special
considerations you should take to ensure the security of children in a threat environment. In the
next lesson, you will learn procedures you must use to maintain a low profile, traveling tips, auto
safety tips as they relate to terrorist countermeasures, and personal protection measures. In
addition, you will learn security procedures to be used in the workplace. Complete the lesson
exercise before continuing with Lesson 2.

6-18
Lesson Exercise: Complete items 1 through 18 by performing the action required. Check your
responses against those listed at the end of this lesson.

1. List (in any order) the eight security considerations for selecting a residence.

a. ____________________________________________________________

b. ____________________________________________________________

c. ____________________________________________________________

d. ____________________________________________________________

e. ____________________________________________________________

f. ____________________________________________________________

g. ____________________________________________________________

h. ____________________________________________________________

For items 2 through 9 fill in the blanks with the correct responses.

2. Solid-core doors provide a _______________________________ security

advantage over hollow-core doors.

3. From the security standpoint, solid doors are _____________________ to wood

doors.

4. Sliding glass doors are actually extremely large _______________ and provide

__________________ security problems.

5. A close fit between the lock and the ___________________ _____________

reduces door movement when the door is closed.

6. One method of securing hinges is to weld the ends. This method is effective, but

______________________________.

6-19
7. Another technique for securing door hinges is to drill a small hole through the

hinge and into the pin and ________________________________ a second pin or

small nail flush with the hinge surface.

8. Another technique for securing door hinges requires inserting two large screws in the

door (or jamb) and leaving the screw head exposed 1/2 inch. Drill a

_________________________ hole on the opposite side so the screw head fits

into the hole when the door is shut.

9. The simplest measure to prevent a sliding glass door from being lifted out of its

channel is to drill a hole through the __________________ and the

______________. Insert a pin or nail to prevent the door from being opened.

10. List (in any order) the three methods of upgrading the security of windows.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

11. List (in any order) two things you should consider concerning additional lighting
when improving the security of your residence.

a. _______________________________________________________________

b. _______________________________________________________________

12. List (in any order) two security measures you should use to improve the
security of your home.

a. _______________________________________________________________

b. _______________________________________________________________

6-20
13. List (in any order) the circumstances in which the use of an alarm is recommended.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

For items 14 through 16 circle the letter that corresponds to the correct response.

14. Choose the feature that is not recommended for consideration when choosing an
alarm system. The system should

a. be capable of operating on the local AC electrical current and have a


rechargeable battery backup.
b. be relatively easy to install and troubleshoot.
c. should not have the ability to be wired with a panic switch.
d. have a time delay feature to allow the occupant to arm or disarm the system
without activating the alarm.
e. have an adjustable reset/rearm feature.

15. What is a dog's greatest security asset?

a. Size c. Aggressiveness
b. Speed d. Alertness

16. Why should a dog be considered an "audible alarm?" A dog can be trained

a. to bark whenever anyone enters the residential area.


b. not to bark.
c. to attack voluntarily.
d. to bark only when an intruder enters the residential area.

6-21
17. List (in any order) three of the six security measures a child should be advised of.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

c. _______________________________________________________________

_______________________________________________________________

For item 18, circle the letter that corresponds to the correct response.

18. What should you ensure school officials do in providing security for your children?

a. Provide a clean and healthy learning environment


b. Ensure prompt and timely dismissal at the end of the school day
c. Release your children only to responsible known members of the family or
verified designees
d. Release your children only to family members who have your written
authorization

6-22
Lesson 1 Exercise Solutions

Reference

1. (In any order) 6101


Neighborhood check
Crime level
Police security capabilities
Utilities services and protection
Fire protection
Environmental considerations
Access routes
Parking
2. substantial 6102
3. superior 6102
4 windows, complex 6102
5. striker plate 6102
6. permanent 6102
7. inserting 6102
8. matching 6102
9. channel, frame 6102
10. (In any order) 6102
sash and frame pin
key-operated locks
steel bars, mesh or grillwork
11. coverage and evenness of lighting 6102
12. (in any order) 6102
lighting and alarms
consistency with other residences
13. Words to the effect of: In areas abroad where 6103
forced entry of a residence is commonplace or where
an active terrorist threat is present, consider using a
residential alarm system.
14. c. 6102
15. d. 6103
16. d. 6103
17. Any three of the following in any order): 6104
Avoid isolated streets and play areas.
Travel and play in groups.
Never answer a stranger's question.
Keep family members informed of your whereabouts.
Immediately report all attempts to question, annoy, or molest you.
Note all information possible about unusual incidents.
18. c. 6104

6-23
Lesson 2. DAILY PREVENTIVE CHECKS AND COMMUTING TIPS

LEARNING OBJECTIVES

1. List five of the nine steps a Marine must use to maintain a low profile.

2. List five of the eight travel precautions a Marine must use when traveling to a threat
area.

3. Recognize six of the twelve auto safety tips a Marine must use.

4. List five of the nine personal protection measures that must be used in a threat region.

5. Identify the four security procedures a Marine must use in the workplace.

In this lesson, you will learn the necessities of keeping a low profile when in a possible terrorist
threat region. You will learn what travel tips to use when traveling to a terrorist threat region,
auto safety tips, personal protective measures, and security procedures for use in the workplace.

6201. Identify the Nine Steps to Maintain a Low Profile

Generally speaking, it is a good idea to blend in with the populace when you are in a foreign
country. This becomes even more of a necessity when you are stationed in a terrorist threat
region. As part of your terrorist countermeasure plan you must apply the following steps to
maintain a low profile:

a. Blend into surroundings. Attempt to blend into your surroundings. As Marines, our
customs and habits tend to give us away. Some of our behavior, which may be accepted in the
United States, will not go over well in other countries. For example, Americans when traveling
overseas have tendency to be boisterous and high-spirited, drawing attention to themselves. With
the increased terrorist threat, it is important that we learn to blend in with our surroundings like a
chameleon. As unofficial "ambassadors" for our country, we do not need to be labeled as "ugly
Americans," another reason to be quiet and discrete and to avoid being loud or obnoxious.

b. Avoid showing off material wealth. Marines using U.S. currency can help terrorists to
identify those Marines as Americans. So, exchange your money into the local currency.

c. Drive an inconspicuous vehicle. Try to use the type of car that is common to the area.
Avoid special license plates, rank or courtesy designations, and luxury cars.

d. Unmarked parking space, vary parking. Changing parking spots at the work place and at
your residence can mean the difference between freedom or captivity in a people's prison, or even
as drastic as life or death. A little walking to get to your place of employment is not going to kill
you, while parking in the same spot every day might.

6-24
e. Do not place your name on vehicle or residence. There is no sense in making a terrorist's
job any easier by telling him who you are.

f. Unlisted phone number. Maintain an unlisted phone number and do not give it out
indiscriminately.

g. Avoid publicity. Once again, if you are highlighted in a crowd or identified as an American,
it makes the terrorist's job much easier. If you are already in the public eye and there is a terrorist
incident involving you, media coverage may be at a higher level, giving the terrorist free and
increased publicity.

h. Restrict personal information. Personal information about your home, car, family, security
efforts, and other activities should be known only by your immediate family, friends, and security
personnel and then only on a need-to-know basis.

i. Avoid establishing daily routines. BEING UNPREDICTABLE IS YOUR BEST


DEFENSE.

The low profile steps are not difficult, they just require you to tone down what you do. Before
continuing, try this challenge.

List (in any order) five of the nine steps to maintain a low profile.

a. ________________________________________________________________

________________________________________________________________

b. ________________________________________________________________

________________________________________________________________

c. ________________________________________________________________

________________________________________________________________

d. ________________________________________________________________

________________________________________________________________

e. ________________________________________________________________

________________________________________________________________

6-25
Your answers to the challenge should be as follows: (any five of the following, in any order)
blend into surroundings, avoid showing off material wealth, drive an inconspicuous vehicle, use an
unmarked parking space, vary parking, do not place your name on vehicle or residence, use an
unlisted phone number, avoid publicity, restrict personal information, avoid establishing daily
routines. If you named any of the five and in any order, continue. If you answered differently,
review paragraph 6201 before continuing.

6202. Identify Eight Traveling Precautions

While traveling, there are eight precautions you should use to help you and your family avoid
possible terrorist attack. Your understanding and practice of the following can minimize the
likelihood that terrorist attacks can successfully be carried out against you or your family.

a. Avoid routines while traveling. The best way to prevent becoming a target of a terrorist
attack is to be unpredictable. As you learned earlier in the course, terrorists usually make
reconnaissance missions before hitting a target. By varying when, where, and how you travel, the
job of establishing a good time and place for an attack becomes very difficult for a terrorist.

b. Gain knowledge of the language. Learn as much of the language as you can. Learn how
to state your name, rank, and serial number, to state that you are an American citizen, or to ask
for a representative from the United States Embassy, a doctor, or for other assistance.

c. Travel in groups. When possible, travel in groups. There is safety in numbers.

d. Avoid dangerous situations. Avoid isolated roads, danger areas, civil disturbances, and
crowds.

e. Be alert and aware. Be alert and aware of anyone who appears to be following you.

Warning: If you are being followed, do not antagonize the individual; quickly move to
a safe haven and report the incident when it is safe to do so.

f. Keep emergency numbers handy. Keep emergency numbers handy and always have exact
change for a phone call--an emergency call may not be free in other countries. In some countries,
calling may be difficult due to the limited availability of telephones.

g. Keep your command and family constantly aware of your location. Ensure they know your
arrival and departure from all locations should an emergency arise.

h. Ensure all of your personal matters are in order. Whenever you travel overseas or in a high
threat area, ensure that all your personnel matters are in order (for example, wills, insurance,
power of attorney, etc.). This will not prevent a terrorist attack, but if one does occur, it will
ensure that your family is taken care of, giving you one less worry while you are being held
captive.

6-26
Try the following challenge.

List (in any order) five of the eight travel security precautions.

a. _____________________________________________________________

_____________________________________________________________

b. _____________________________________________________________

_____________________________________________________________

c. _____________________________________________________________

_____________________________________________________________

d. _____________________________________________________________

_____________________________________________________________

e. _____________________________________________________________

_____________________________________________________________

Your answers should be as follows: (any five of the following, in any order) avoid routines while
traveling, have a working knowledge of the language, travel in groups, avoid dangerous
situations, be alert and aware, keep emergency numbers handy, keep your command and family
constantly aware of your location, ensure all of your personal matters are in order. If you named
any five and in any order, continue. If you answered differently, review paragraph 6202 before
continuing.

6203. Identify Twelve Auto Safety Tips

History has shown that the majority of terrorist assassination or kidnapping attacks have taken
place while victims were in a travel status. Marines will be most vulnerable when entering or
leaving quarters or their place of work. Drivers are usually preoccupied with driving, talking to
passengers, or listening to the radio. They are often not alert to any indications of trouble but it is
during these periods that drivers should be most alert for signs of surveillance or possible attack.
Varying the time and route of your travel are two important measures you should take to protect
yourself against terrorist attack while in a transient status. Where possible, use different doors or
gates when departing or leaving the home or office. If a secured parking area is not available, you
should vary or rotate your parking places. Persons assigned government vehicles should trade off
with other people in the office to avoid using the same car every day. Doing

6-27
this will confuse any terrorist who may be trying to target a particular individual. The following
are twelve auto safety tips:

a. Always keep your vehicle in good mechanical condition and your gas tank at least half full.

b. Always check over your car before getting in (detailed search techniques are outlined in
figures 6-5 through 6-12).

c. Drive with car doors locked and windows closed. Secure your car when it is unattended.

d. Never pick up hitchhikers or strangers.

e. Memorize the location of safe havens along your regular routes. Police and fire stations, or
any busy place are excellent havens.

f. Do not stop for accidents or other problems you may witness or encounter. Terrorists will
take advantage of your instinctive reaction as a Marine to help others. To avoid this danger, you
may want to drive away to a phone and call for assistance.

g. If you are involved in a minor accident and feel there is imminent danger to you or your
passengers, drive away, assess the damage at a public location, and report the accident from there.

h. Always use your seatbelts.

i. On multi-lane highways, drive in the center lane to make it more difficult to force your car
to the curb.

j. If you face a suspicious blockade, avoid it by driving in the opposite direction. Be prepared
to escape by going around the obstacle or by ramming it.

k. Avoid driving close behind other vehicles or in any situation where you can be "boxed in."

l. If you must leave your car keys with an attendant, leave only the ignition key.

Fig 6-5. Two-man search. Fig 6-6. Divide car into sections.

6-28
Fig 6-7. Front inspection. Fig 6-8. Side inspection.

Fig 6-9. Rear inspection. Fig 6-10. Underside inspection.

Fig 6-11. Engine compartment inspection. Fig 6-12. Passenger compartment inspection.

6-29
Try the challenge.

(Multiple choice)

For each statement below, circle "a" if it is an auto safety tip and "b" if it is not.

1. Keep emergency numbers handy.

a. Auto safety tip b. Not an auto safety tip

2. Always keep your vehicle in good mechanical condition and your gas tank at least
half full.

a. Auto safety tip b. Not an auto safety tip

3. Always check your car before getting in.

a. Auto safety tip b. Not an auto safety tip

4. Travel in groups.

a. Auto safety tip b. Not an auto safety tip

5. Drive with car doors locked, windows closed and secure your car when unattended.

a. Auto safety tip b. Not an auto safety tip

6. Never pick up hitchhikers or strangers.

a. Auto safety tip b. Not an auto safety tip

7. Memorize the location of safe havens along your regular routes.

a. Auto safety tip b. Not an auto safety tip

8. If you are involved in a minor accident and feel there is imminent danger to you or
your passengers, drive away and assess the damage at a public location

a. Auto safety tip b. Not an auto safety tip

9. On multi-lane highways, drive in the center lane to make it more difficult to force
your car to the curb.

a. Auto safety tip b. Not an auto safety tip

6-30
Your answers should be as follows: 1. b, 2. a, 3. a, 4. b, 5. a, 6. a, 7. a, 8. a, and 9. a. If
your answers to the challenge are correct, continue. If you answered differently, review
paragraph 6203 before continuing.

6204. Identify Personal Protection Measures

The special protective measures you and your family take should be based on the threat. You
should understand that all the precautions below may be exaggerated for certain situations. To
establish the degree that they apply to you, contact your unit security officer for an evaluation of
the threat each time you move, travel, or change assignments. Too much security is better than
too little.

a. Avoid public transportation. Avoid using public transportation when possible; however,
buses and trains are preferable to taxis.

b. Travel with unmarked luggage. Luggage should not have markings linking you to the U.S.
Government or specifically identifying you as an American.

c. Stay in reputable hotels.

d. Avoid hotel paging. There is no reason for you to walk into a terrorist trap or to announce
your presence. An alternative is to have the hotel take a message and leave you a written notice
of the call.

e. Use hotel rooms on the second floor or higher. Do not stay in hotel rooms located on the
first floor or that are accessible from outside and do not go any higher than can be reached by
emergency rescue equipment.

f. Avoid elevators. Avoid riding in elevators. By riding in an elevator you confine yourself to
going up or down and leave yourself open to an easy attack by terrorists.

g. Make reservations in two or more hotels. When making your hotel reservations make them
in two or more hotels and use a modified name--do not use your rank.

h. Note hotel escape routes.

i. Do not discuss travel plans. Do not discuss travel plans over a hotel telephone. Most
hotels have their own switchboards which make monitoring calls fairly easy.

The reality of the threat is clear. As symbols of the U.S. Government, you and your family are
potential targets for terrorism. The important thing to remember is that you are only as vulnerable
as you allow yourself to be. While there is no absolute protection against terrorism, reasonable
safeguards, commensurate with the identified threat to you, can be taken to reduce the likelihood
of attack.

6-31
Try this challenge.

List (in any order) five of the nine personal protection measures that must be used when
traveling in a threat region.

a. ______________________________________________________________

______________________________________________________________

b. ______________________________________________________________

______________________________________________________________

c. ______________________________________________________________

______________________________________________________________

d. ______________________________________________________________

______________________________________________________________

e. ______________________________________________________________

______________________________________________________________

Your answers should be any five of the following (in any order): avoid public transportation,
travel with unmarked luggage, stay in reputable hotels, avoid hotel paging, make reservations in
two or more hotels, identify hotel escape routes, do not discuss travel plans. If you named any
five, in any order, continue. If your answer is different, review paragraph 6204 before continuing.

6205. Identify Security Procedures in the Workplace

Day-to-day activities within an office can help establish an environment in which it is more or less
difficult for terrorists to gain the knowledge they need to successfully attack personnel. The
following steps should be taken to make intelligence collection and targeting by terrorist more
difficult, forcing them to spend more time collecting information. This in turn causes them to
spend more time exposed and visible for detection by counterintelligence/law enforcement efforts.

6-32
a. Telephone and mail procedures. The amount of potentially damaging information that can
be passed or received through the telephone or the mail system is considerable. Terrorists will not
hesitate to use either of these forms of communication against you or those in your office. As a
Marine you must adhere to the following procedures for the telephone and mail:

(1) Rank or title should not be used when answering telephones.

(2) When taking telephone messages, do not reveal the whereabouts or activities of the
person being sought unless you personally know the caller.

(3) Collect telephone messages in unmarked folders; do not leave them exposed for
observers to identify caller names and phone numbers, persons called, and messages
left.

(4) Observe caution when opening mail. In particular, be on the lookout for letters or
packages that might contain explosive devices. Figure 6-13 illustrates indicators of a
possible letter or package bomb.

Fig 6-13. Letters or packages suspected of containing explosives.

6-33
b. Visitor control procedures.

(1) Access to the office area should be strictly limited; during periods of increased threat,
access to additional offices, shops, laboratories, and other areas within the installation
should be controlled.

(2) Doors from the visitor access area to executive offices or other restricted areas of a
facility should be locked from within; there should be only one visitor entrance and
exit to a restricted access or exclusion area.

(3) A receptionist should clear all visitors before they enter inner offices.

(4) Permit workmen or visitors access to restricted areas or exclusion areas only with
escort and only with proper identification; confirm work to be done before admitting
workmen to restricted areas of the facility.

(5) Limit publicity in public waiting areas to information that does not identify
personnel by name, position, or office location.

(6) Do not post unit rosters, manning boards, or photo boards where they can be viewed
by visitors or local contractors providing cleaning services, food and beverage
services, delivery of office supplies, removal of trash or waste, care of plants, etc.

(7) Restrict use of message boards, sign in-out boards, and other visual communications
to general statements of availability; do not list publicly local travel itineraries or
phone numbers where visitors have easy, unrestricted access to such information.

Try the following challenges to see if you remember the office security procedures described.

(Circle the letter of the correct response)

1. Limit publicity in public waiting areas to information that does not identify
personnel by name, rank, or office location.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

6-34
(Circle the letter of the correct response)

2. Collect telephone messages in unmarked folders; do not leave exposed for


observers to identify caller names and phone numbers, persons called, and
messages left.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

(Circle the letter of the correct response)

3. Do not post unit rosters, manning boards, or photo boards where they can be
viewed by visitors.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

(Circle the letter of the correct response)

4. When taking phone calls, do not reveal the whereabouts or activities of the person
being sought unless the you know the caller personally.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

Your answers to the challenges should be as follows: 1. b, 2. a, 3. b, 4. a. If you answered


correctly, continue. If you answered differently, review paragraph 6205 before continuing.

6-35
c. General working procedures. The following procedures are actually an extension of the
procedures associated with security for the workplace.

(1) Avoid carrying attaché cases, brief cases, or other courier bags unless absolutely
necessary. Brief cases and attaché cases have become symbols of power and
prominence in many cultures. Individuals carrying such items are often assumed to be
very important persons. Use satchels, bags or other locally obtained book bags
instead.

(2) Do not carry items that bear markings that identify the owner by rank or title, even
within the office environment. Coffee mugs labeled "Top, Intel, or The Lt." may be
seen in use by a visitor sent to gather intelligence to aid in targeting.

(3) Avoid working alone late at night and on days when the remainder of the office is
absent.

(4) If late night work is necessary, work in conference rooms or internal offices where
observation from the outside of the building is not possible. Persons working at night
should turn lights on and off in several offices before going to their offices to disguise
the purpose of their activities to outside observers.

(5) Office doors should be locked when offices are vacant for any lengthy period, at
night, and on weekends.

(6) Papers, correspondence, communications materials, and other documents should not
be left unattended overnight.

Note: A clean desk policy facilitates improved security since it makes it difficult to
hide intelligence collection devices or improvised explosive devices in occupied
offices at the close of a working day.

(7) Maintenance activity and janitorial services in key offices, production, maintenance or
other installation areas should be performed under the supervision of security
personnel.

(8) Removal of property, material, or information stored on any media from the facility
should be prohibited without proper written authority.

(9) Restrict the importation of property, material, or information stored on any media to
the facility unless such items have been properly inspected.

Note: Inspection of boxes, briefcases, handbags, and other containers should focus on
explosive devices, firearms, incendiary devices and accelerants, and information
collection devices.

6-36
(10) Offices not in use should be locked to prohibit unauthorized access or the storage of
material that could be used to hide improvised explosive devices or intelligence
collection devices.

(11) Use of vehicles or markings that make it possible to readily identify a vehicle and its
occupants as U.S. Government or Department of Defense personnel should be
minimized.

(12) All personnel should have access to some sort of duress alarm to enunciate and warn
of terrorist attack.

(13) Placement of office furnishings directly in front of exterior windows is to be avoided


if at all possible.

d. Special procedures for executive assistants. Many critical personnel will have assistants
assigned to their offices to provide additional clerical and professional support. Assistants can be
significant security assets if properly trained, and can represent the difference between a
successful or unsuccessful terrorist attack. The following suggestions are intended to be a guide
for assistants who may find themselves performing personnel security as a collateral duty.

(1) Request installation of physical barriers such as electro-magnetically operated doors


to separate offices of senior executives from other offices.

(2) Request the installation of a silent trouble alarm button, with a signal terminating in
the security department, the Military Police shack, or at another desk some distance
away to ensure that in the event of an emergency, it will be possible for someone
other than the executive to summon assistance.

(3) Do not admit visitors into the executive area unless they have been positively
screened in advance or are known from a previous visit.

Note: If the visitors arrive without appointments, they should not be admitted until
satisfactory identification and valid reasons for the visit have been established.

(4) Unknown callers should not be informed of the whereabouts of the executive, his/her
home address, or telephone number.

(5) A fire extinguisher, first aid kit, and oxygen bottle should be stored in the office area.

(6) When receiving a threatening call, including a bomb threat, extortion threat, or from a
mentally disturbed individual, remain calm and listen carefully. Figure 6-14 is one
example of a threat card to be used when you receive a threatening call.

6-37
Fig 6-14. Bomb threat/threatening call card.

(7) Do not accept packages from strangers until you are satisfied with the individual's
identity and the nature of the parcel.

(8) Travel itineraries for all personnel should be kept absolutely private. Distribution
should be limited strictly to those with a need to know.
6-38
(9) Daily schedules for senior officers and civilian officials should be distributed on a
limited basis and should contain only the information needed by each recipient.

Try these challenges to see if you remember the office security procedures described.

(Circle the letter of the correct response)

1. A clean desk policy facilitates improved security since makes it difficult to hide
intelligence collection devices or improvised explosive devices in occupied offices at
the close of the working day.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

(Circle the letter of the correct response)

2. A fire extinguisher, first-aid kit, and oxygen bottle should be stored in the office
area.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

(Circle the letter of the correct response)

3. Placement of office furnishings directly in front of exterior windows is to be


avoided if at all possible.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

6-39
(Circle the letter of the correct response)

4. Do not admit visitors into the executive area unless they have been positively
screened in advance.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

(Circle the letter of the correct response)

5. Avoid carrying attaché cases, brief cases, or other courier bags unless absolutely
necessary.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

(Circle the letter of the correct response)

6. Do not carry items that bear markings that identify the owner by rank or title,
even within the office environment.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

6-40
(Circle the letter of the correct response)

7. Do not accept packages from strangers until satisfied with the individual's identity
and the nature of the parcel.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

Your answers should be as follows: 1. c, 2. d, 3. c, 4. d, 5. c, 6. c, and 7. d. If all of your


answers to the challenges are correct, continue. If your answers are different, review paragraph
6205c and d before continuing.

Lesson Summary. In this lesson, you learned the nine steps you must take to maintain a low
profile. You learned eight traveling tips to assist you in guarding against a terrorist attack while
traveling, and you learned twelve auto safety tips that you should use to avoid becoming a victim
of a terrorist attack. You now know what personal protection measures to use while traveling
and you know the four security procedures and the tips associated with each of the procedures to
safeguard your place of work. Before continuing, complete the lesson exercise.

6-41
Lesson Exercise: Complete items 1 through 23 by performing the action required. Check your
responses those listed at the end of this lesson.

1. List (in any order) five of the nine steps to maintain a low profile.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

c. _______________________________________________________________

_______________________________________________________________

d. _______________________________________________________________

_______________________________________________________________

e. _______________________________________________________________

_______________________________________________________________

6-42
2. List (in any order) five of the eight travel security precautions.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

c. _______________________________________________________________

_______________________________________________________________

d. _______________________________________________________________

_______________________________________________________________

e. _______________________________________________________________

_______________________________________________________________

For each statement in items 3 through 11, circle "a" if it is an auto safety tip and "b" if it is not.

3. Keep emergency numbers handy.

a. Auto safety tip b. Not an auto safety tip

4. Always keep your vehicle in good mechanical condition and your gas tank at least
half full.

a. Auto safety tip b. Not an auto safety tip

5. Always check over your car before getting inside.

a. Auto safety tip b. Not an auto safety tip

6. Travel in groups.

a. Auto safety tip b. Not an auto safety tip

7. Drive with car doors locked, windows closed, and secure your car when unattended.

a. Auto safety tip b. Not an auto safety tip

6-43
8. Never pick up hitchhikers or strangers.

a. Auto safety tip b. Not an auto safety tip

9. Memorize the location of safe havens along your regular routes.

a. Auto safety tip b. Not an auto safety tip

10. If you are involved in a minor accident, and feel there is imminent danger to you
or your passengers, drive away and assess the damage at a public location.
Then report the accident.

a. Auto safety tip b. Not an auto safety tip

11. On multi-lane highways, drive in the center lane to make it more difficult to force
your car to the curb.

a. Auto safety tip b. Not an auto safety tip

12. List (in any order) five of the nine personal protection measures that must be used
when traveling in a threat region.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

c. _______________________________________________________________

_______________________________________________________________

d. _______________________________________________________________

_______________________________________________________________

e. _______________________________________________________________

_______________________________________________________________

6-44
For items 13 through 23, identify the office security procedure described by circling the letter of
the correct response.

13. Limit publicity in public waiting areas to information that does not identify
personnel by name, rank, or office location.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

14. Collect telephone messages in unmarked folders; do not leave exposed for
observers to identify caller names and phone numbers, persons called, and
messages left.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

15. Do not post unit rosters, manning boards, or photo boards where they can be
viewed by visitors.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

16 When taking phone calls, do not reveal the whereabouts or activities of the person
being sought unless you personally know the caller.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

17. A clean desk policy facilitates improved security since it makes it difficult to hide
intelligence collection devices or improvised explosive devices in occupied offices at
the close of the working day.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

6-45
18. A fire extinguisher, first-aid kit, and oxygen bottle should be stored in the office
area.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

19. Placement of office furnishings directly in front of exterior windows is to be avoided


if at all possible.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

20. Do not admit visitors into the executive area unless they have been positively
screened in advance.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

21. Avoid carrying attaché cases, brief cases, or other courier bags unless absolutely
necessary.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

22. Do not carry items that bear markings that identify the owner by rank or title,
even within the office environment.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

6-46
23. Do not accept packages from strangers until satisfied with the individual's
identity and the nature of the parcel.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

Lesson 2 Exercise Solutions

Reference

1. (Any five and in any order) 6201


Blend into surroundings
Avoid showing off material wealth
Drive an inconspicuous vehicle
Use unmarked parking space
Vary parking locations
Do not place name on vehicle or residence
Use unlisted phone number
Avoid publicity
Restrict personal information only to immediate family, friends
and security personnel
Avoid establishing daily routines
2. (Any five and in any order) 6202
Avoid routines while traveling
Acquire a working knowledge of the language
Travel in groups
Avoid dangerous situations
Be alert and aware
Keep emergency numbers handy
Keep your command and family constantly aware of your location
Ensure that all of your personal matters are in order
3. b. 6203
4. a. 6203
5. a. 6203
6. b. 6203
7. a. 6203
8. a. 6203
9. a. 6203
10. a. 6203
11. a. 6203

6-47
Lesson 2 Exercise Solutions, continued

Reference

12. (Any five and in any order) 6204


Avoid public transportation
Travel with unmarked luggage
Stay in reputable hotels
Avoid hotel paging
Make reservation in two or more hotels
Note hotel escape routes
Do not discuss travel plans
13. b. 6205
14. a. 6205
15. b. 6205
16. a. 6205
17. c. 6205
18. d. 6205
19. c. 6205
20 d. 6205
21. c. 6205
22. c. 6205
23. d. 6205

UNIT SUMMARY

In this study unit, you learned what measures and procedures you should take to safeguard
yourself and your family from becoming the target of terrorism. You learned how to select a
residence and then upgrade its security if necessary. You know the steps to take in maintaining a
low profile to decrease your possibility of becoming a target. You now know what travel tips to
use while traveling in a threat region, auto safety tips to take, and personal protection measures
you must use. You can identify the four security procedures for the workplace and the measures
you should take within each procedure. In Study Unit 7, you will learn what your responsibilities
a Marine are should you become a hostage. You will learn the three types of detention, factors
that will assist you in maintaining your bearing, and pointers you should follow while detained by
terrorists. Before starting the next study unit, complete the unit exercise.

6-48
Unit Exercise: Complete items 1 through 41 by performing the required action. Check your
responses against those listed at the end of this study unit.

1. List (in any order) the eight security considerations for selecting a residence.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

d. _______________________________________________________________

e. _______________________________________________________________

f. _______________________________________________________________

g. _______________________________________________________________

h. _______________________________________________________________

For items 2 through 9, fill in the blanks with the correct answer.

2. Solid-core doors provide a _______________________________ security

advantage over hollow-core doors.

3. With regards to security, metal doors are _____________________ to wood doors.

4. Sliding glass doors are actually extremely large _______________ and provide

__________________ security problems.

5. A close fit between the lock and the ___________________ _____________

reduces door movement when the door is closed.

6. One method of securing hinges is to weld the ends. This method is effective, but

______________________________.

6-49
7. One technique for securing door hinges is to drill a small hole through the hinge and

into the pin and ________________________________ a second pin or small nail

flush with the hinge surface.

8. Another technique for securing door hinges requires inserting two large screws in the

door (or jamb) and leaving the screw head exposed 1/2 inch. Drill a

_________________________ hole on the opposite side so that the screw head fits

into the hole when the door is shut.

9. The simplest measures to prevent a sliding glass door from being lifted out of its

channel is to drill a hole through the __________________ and the

______________. Insert a pin or nail to prevent the door from being opened.

10. List (in any order) the three methods of upgrading the security of windows.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

11. List (in any order) two security measures you should use to improve the security of
your home.

a. _______________________________________________________________

b. _______________________________________________________________

12. List (in any order) two considerations you should make concerning additional lighting
when improving the security of your residence.

a. _______________________________________________________________

b. _______________________________________________________________

6-50
13. Describe the circumstances in which the use of an alarm is recommended.

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

For items 14 through 16, circle the letter that corresponds to the correct answer.

14. Choose the feature that is not recommended for consideration when choosing an
alarm system.

a. The system should be capable of operating on the local AC electrical current


and have a rechargeable battery backup.
b. The system should be relatively easy to install and troubleshoot.
c. The system should not have the ability to be wired with a panic switch.
d. The system should have a time delay feature to allow the occupant to arm or
disarm the system without activating the alarm.
e. The system should have an adjustable reset/rearm feature.

15. What is a dog's greatest security asset?

a. Size c. Aggressiveness
b. Speed d. Alertness

16. Why should a dog be considered an "audible alarm?" A dog can be trained

a. to bark whenever anyone enters the residential area.


b. not to bark.
c. to attack voluntarily.
d. to bark only when an intruder enters the residential area.

6-51
17. List (in any order) three of the six security measures a child should be advised of.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

c. _______________________________________________________________

_______________________________________________________________

For item 18, circle the letter which corresponds to the correct answer.

18. What should you ensure school officials do in providing security for your children?

a. Provide a clean and healthy learning environment.


b. Ensure prompt and timely dismissal at the end of the school day.
c. Release your children only to responsible known members of the family or
verified designees.
d. Release your children only to family members who have written permission.

6-52
19. List (in any order) five of the nine steps to maintain a low profile.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

c. _______________________________________________________________

_______________________________________________________________

d. _______________________________________________________________

_______________________________________________________________

e. _______________________________________________________________

_______________________________________________________________

20. List (in any order) five of the eight travel security precautions.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

c. _______________________________________________________________

_______________________________________________________________

d. _______________________________________________________________

_______________________________________________________________

e. _______________________________________________________________

_______________________________________________________________

6-53
For items 21 through 30, circle "a" if the statement is an auto safety tip and "b" if it is not.

21. Keep emergency numbers handy.

a. Auto safety tip b. Not an auto safety tip

22. Always keep your vehicle in good mechanical condition and your gas tank at least half
full.

a. Auto safety tip b. Not an auto safety tip

23. Always check your car before getting in.

a. Auto safety tip b. Not an auto safety tip

24. Travel in groups.

a. Auto safety tip b. Not an auto safety tip

25. Drive with car doors locked, windows closed, and secure your car when unattended.

a. Auto safety tip b. Not an auto safety tip

26. Never pick up hitch hikers or strangers.

a. Auto safety tip b. Not an auto safety tip

27. Memorize the location of safe havens along your regular routes.

a. Auto safety tip b. Not an auto safety tip

28. If you are involved in a minor accident and feel there is imminent danger to you or
your passengers, drive away and assess the damage at a public location. Then report
the accident.

a. Auto safety tip b. Not an auto safety tip

29. On multi-lane highways, drive in the center lane to make it more difficult to force
your car to the curb.

a. Auto safety tip b. Not an auto safety tip

6-54
30. List (in any order) five of the nine personal protection measures that must be used
when traveling in a threat region.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

c. _______________________________________________________________

_______________________________________________________________

d. _______________________________________________________________

_______________________________________________________________

e. _______________________________________________________________

_______________________________________________________________

For items 31 through 41, identify the office security procedure described by circling the correct
letter.

31. Limit publicity in public waiting areas to information that does not identify
personnel by name, rank, or office location.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

32. Collect telephone messages in unmarked folders; do not leave exposed for
observers to identify caller names and phone numbers, persons called, and
messages left.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

6-55
33. Do not post unit rosters, manning boards, or photo boards where they can be
viewed by visitors.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

34. When taking phone calls, do not reveal the whereabouts or activities of the person
being sought unless you know the person calling.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

35. A clean desk policy facilitates improved security as it makes it difficult to hide
intelligence collection devices or explosive devices in occupied offices at the close of
the working day.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

36. A fire extinguisher, first-aid kit, and oxygen bottle should be stored in the office
area.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

37. Placement of office furnishings directly in front of exterior windows is to be avoided


if at all possible.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

6-56
38. Do not admit visitors into the executive area unless they have been positively
screened in advance.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

39. Avoid carrying attaché cases, brief cases, or other courier bags unless absolutely
necessary.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

40. Do not carry items that bear markings that identify the owner by rank or title,
even within the office environment.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

41. Do not accept packages from strangers until satisfied with the individual's
identity and the nature of the parcel.

a. Telephone and mail procedure


b. Visitor control procedure
c. General working procedure
d. Special procedures for executive assistants

6-57
Study Unit 6 Exercise Solutions

Reference

1. (In any order) 6101


Neighborhood check
Crime level
Police security capabilities
Utilities services and protection
Fire protection
Environmental considerations
Access routes
Parking
2. Substantial 6102
3. Superior 6102
4 Windows, complex 6102
5. Striker plate 6102
6. Permanent 6102
7. Inserting 6102
8. Matching 6102
9. Channel, frame 6102
10. (In any order) 6102
Sash and Frame Pin
Key-operated locks
Steel bars, mesh or grillwork
11. (In any order) 6102
Lighting
Alarms
12. (In any order) 6102
Coverage and evenness of lighting
Consistency with other residences
13. Words to the effect of, "In areas abroad where 6102
forced entry of a residence is commonplace or
where an active terrorist threat is present,
consideration should be given to the use of a
residential alarm system."
14. c. 6102
15. d. 6103
16. d. 6103

6-58
Study Unit 6 Exercise Solutions, continued

Reference

17. (Any three and in any order) 6104


Avoid isolated streets and play areas
Travel and play in groups
Never answer a stranger's question
Keep family members informed of their whereabouts
Immediately report all attempts to question, annoy,
or molest them note all information possible about
unusual incidents
18. c. 6104
19. (Any five and in any order) 6201
Blend into surroundings
Avoid showing off material wealth
Drive an inconspicuous vehicle
Unmarked parking space
Vary parking, do not place name on vehicle or residence
Used unlisted phone number
Avoid publicity
Release personal information known only to immediate
family, friends and security personnel
Avoid establishing daily routines
20. (Any five in any order) 6202
Avoid routines while traveling
Working knowledge of the language
Travel in groups
Avoid dangerous situations
Be alert and aware
Keep emergency numbers handy
Keep your command and family constantly aware of your
location
Ensure all of your personal matters are in order
Avoid hotel paging
21. b. 6203
22. a. 6203
23. a. 6203
24 b. 6203
25. a. 6203
26. a. 6203
27. a. 6203
28. a. 6203
29. a. 6203

6-59
Study Unit 6 Exercise Solutions

Reference

30. (Any five and in any order) 6204


Avoid elevators
Avoid public transportation
Travel with unmarked luggage
Stay in reputable hotels
Make reservations in two or more hotels
Note hotel escape routes
Use hotel rooms on second floor or higher
Do not discuss travel plans.
31. b. 6205
32. a. 6205
33. b. 6205
34. a. 6205
35. c. 6205
36. d. 6205
37. c. 6205
38 d. 6205
39. c. 6205
40. c. 6205
41. d. 6205

6-60
STUDY UNIT 7

COUNTERING THE THREAT--PART II

Introduction. Throughout this course you have learned how to avoid becoming a
victim/hostage of a terrorist attack. Sometimes, events unfold in ways that are beyond your
control. Regardless of all of your positive actions and reactions, you suddenly become a
hostage. What will you do now? In this study unit you will learn the three types of
peacetime detention. You will learn your responsibilities in relation to the Code of Conduct
and how to survive during a personal hostage situation.

Lesson 1. PEACETIME DETENTION

LEARNING OBJECTIVES

1. Identify the three types of peacetime detentions.

2. Apply the three types of peacetime detention to any given situation.

Peacetime detention refers to being held against one's will during a time when armed conflict does
not exist or armed conflict does exist but the United States is not directly involved. Based on this
definition, if you are taken hostage and there is no armed conflict involving the United States, you
are considered a peacetime detention case. Peacetime detention brings with it requirements
associated with the Code of Conduct which differ slightly from the requirements of wartime
detention or being a prisoner of war (POW). There are three general types of hostile peacetime
detention that you should know.

7101. Identify and Define Hostile Government Detention

Hostile government detention involves a hostile government's (one whose relations with the
United States is tense) legally detaining a U.S. citizen/serviceman for violation(s) of its laws. For
example, a Marine may be detained in a given country for an unintentional act, such as crossing
the country's borders, due to negligence, which may be a civil or criminal offense under the
country's laws. Persons in this status are properly called detainees (see figure 7-1).

Fig 7-1. Peacetime detention.


7-1
Although dated, the following incident is an example of a hostile government detention.
In 1979, a Marine on leave took a train from Hamburg, Federal Republic of Germany (then West
Germany) to northern Italy. At one point, the train entered the former German Democratic
Republic (East Germany). The Marine was taken from the train, held for questioning, and later
released just in time to return to his unit before his leave expired.

Try these challenges.

1. Define the term peacetime detention.

______________________________________________________________

______________________________________________________________

______________________________________________________________

______________________________________________________________

______________________________________________________________

2. Define the term hostile government detention.

______________________________________________________________

______________________________________________________________

______________________________________________________________

______________________________________________________________

______________________________________________________________

Your answers should be in words similar to the following: 1. Peacetime detention refers to being
held against one's will during a time when armed conflict does not exist, or armed conflict does
exist but the United States is not directly involved, and 2. Hostile government detention involves
a hostile government's (one whose relations with the United States is tense) legally detaining a
U.S. citizen/serviceman for violation(s) of its laws. If your answers to both challenges are
correct, you may continue. If your answers are different, review paragraph 7101 before
continuing.

7-2
7102. Identify and Define Hostile Government-Sponsored Terrorist Detention

Hostile government-sponsored terrorist detention refers to the detention of U.S. citizens by


terrorists who are sponsored by the government of the country in which the U.S. citizens are
being held. Persons held under such circumstances are referred to as hostages, not detainees.
Their capture and continued detention are violations of international law! These individuals are
normally held for the purpose of propaganda or to coerce the United States to take some action
desired by the terrorists (see figure 7-2). The following incident is an example of a hostile
government-sponsored terrorist detention.

Fig 7-2. Terrorist group detention.

On November 5, 1979, the American Embassy in Iran was seized with the Iranian
government's support. After 444 days, on January 1981, fifty-two hostages including Marines
were finally released.

Try this challenge.

Define the term "hostile government-sponsored terrorist detention ."

___________________________________________________________________

___________________________________________________________________

___________________________________________________________________

7-3
Your answer should be similar to, "hostile government-sponsored terrorist detention refers to the
detention of U.S. citizens by terrorists who are sponsored by the government of the country in
which the U.S. citizens are being held." If your answer is correct, continue. If you answered
differently, review paragraph 7102 before continuing.

7103. Identify and Define Independent Terrorist Group Detention

Independent terrorist group detention is the detention of U.S. citizens by terrorists who are not
sponsored by a hostile government. Captives of independent terrorists groups are also referred to
as hostages, not detainees. United States citizens are illegally held by the independent terrorist
group. As with hostile government-sponsored terrorist detention, their capture and continued
detention are violations of international law! These individuals are normally held for the
purpose of propaganda or to coerce the United States to take some action desired by the
terrorists. The following incident is an example of an independent terrorist group detention.

On 14 June 1985, Trans World Airlines (TWA) flight 847 was hijacked with 153 persons aboard.
During the first few days of the hijacking, 123 hostages were released and one sailor was
murdered by the Amal Militia. Twenty-nine passengers, including five sailors, were held hostage
in Beirut, Lebanon. The Amal Militia negotiated with Syrian President Hafez Assad and on 30
June 1985, following 17 days of captivity, the hostages were released.

Try the next five challenges.

1. State the meaning of independent terrorist group detention.

______________________________________________________________

______________________________________________________________

______________________________________________________________

______________________________________________________________

______________________________________________________________

7-4
(Circle the letter of the correct response)

2. A United States citizen may have committed a criminal or civil offense in a country
with a hostile government. The citizen's detention is considered to be

a. hostile government detention.


b. hostile government sponsored-terrorist detention.
c. independent terrorist group detention.

(Circle the letter of the correct response)

3. Missionaries who are U.S. citizens are working in the rural areas of Peru. They
are taken hostage by the independent terrorist group the Shining Path. Their
detention is considered to be

a. hostile government detention.


b. hostile government sponsored-terrorist detention.
c. independent terrorist group detention.

(Circle the letter of the correct response)

4. United States citizens are held captive by terrorists in Libya. The Libyan
government has a record of supporting this particular terrorist group. The detention
of the U.S. citizens is considered to be

a. hostile government detention.


b. hostile government sponsored-terrorist detention.
c. independent terrorist group detention.

7-5
(Circle the letter of the correct response)

5. While on mechanized patrol in Kuwait, your squad inadvertently crosses into Iraq.
The Iraqis detain you for four days until Embassy officials in Kuwait can arrange for
your release. Your detention is considered to be

a. hostile government detention.


b. hostile government sponsored-terrorist detention.
c. independent terrorist group detention.

Your answers to the five challenges should be as follows: 1. (In the same or similar words)
Detention of U.S. citizens by terrorist who are not sponsored by a hostile government. 2. a, 3.
c, 4. b, 5. a. If you answered all five challenges correctly, you may continue. If you answered
differently, review this lesson before continuing.

Lesson Summary. In this lesson, you learned the definition of peacetime detention and how it
could apply to you. You now know that the three types of peacetime detention are hostile
government detention, hostile government-sponsored terrorist detention, and independent
terrorist group detention. In the next lesson, you will learn to apply the Code of Conduct should
you become either a detainee or hostage. Before proceeding to the next lesson, complete the
lesson exercise.

-----------------------------------------------------------------

Exercise: Complete items 1 through 8 by performing the action required. Check your
responses against those listed at the end of this lesson.

1. Define the term peacetime detention.

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

7-6
2. Define the term hostile government detention.

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

3. Define the term hostile government-sponsored detention.

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

4. Define the term independent terrorist group detention.

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

For items 5 through 8, circle the letter of the type of detention that best corresponds to the
statement.

5. A citizen may have committed a criminal or civil offense.

a. Hostile government detention


b. Hostile government sponsored-terrorist detention
c. Independent terrorist group detention

6. Missionaries who are U.S. citizens are working in the rural areas of Peru. They are
taken hostage by the independent terrorist group the Shining Path.

a. Hostile government detention


b. Hostile government sponsored-terrorist detention
c. Independent terrorist group detention

7-7
7. While on mechanized patrol in Kuwait, your squad inadvertently crosses into Iraq.
The Iraqis detain you for four days until Embassy officials in Kuwait can arrange for
your release.

a. Hostile government detention


b. Hostile government sponsored-terrorist detention
c. Independent terrorist group detention

8. United States citizens are held captive by terrorists in Libya. The Libyan
government has a record of supporting this particular terrorist group.

a. Hostile government detention


b. Hostile government sponsored-terrorist detention
c. Independent terrorist group detention

Lesson 1 Exercise Solutions

Reference

1. (Words similar to) Peacetime detention refers to being held 7101


against one's will during a time when armed conflict does
not exist or armed conflict does exist but the United States is
not directly involved.
2. (Words similar to) Hostile government detention involves a 7101
hostile government legally detaining a U.S. citizen/serviceman
for violation(s) of its laws.
3. (Words similar to) Detention of U.S. citizens by terrorists who 7102
are sponsored by the government of the country in which the
U.S. citizens are being held.
4. (Words similar to) Detention of U.S. citizens by terrorists who 7103
are not sponsored by a hostile government.
5. a. 7101
6. a. 7101
7. c. 7102
8. b. 7103

7-8
Lesson 2. THE HOSTAGE AND THE CODE OF CONDUCT

LEARNING OBJECTIVES

1. List three responsibilities of a Marine in regard to the Code of Conduct.

2. State the primary goal of a hostage as it pertains to the Code of Conduct.

3. List three factors that will assist hostages in maintaining their bearing.

4. List three pointers a Marine should follow while detained by a terrorist group.

7201. Code of Conduct and Your Responsibilities

U.S. Marines, whether detainees or hostages, can rest assured the United States Government will
make every good faith effort to obtain their earliest release. The captive's key to survival with
honor and resisting exploitation are faith in one's country and its way of life, faith in fellow
detainees or hostages, and faith in one's self. One must assume, on the other hand, that the
destruction of such faith is the goal of all captors. The captors are determined to maximize their
gains from a detention or hostage situation.

Try this challenge.

List (in any order) the three required responsibilities you must maintain if you should
become a detainee or hostage.

a. ______________________________________________________________

______________________________________________________________

b. ______________________________________________________________

______________________________________________________________

c. ______________________________________________________________

______________________________________________________________

Your answers (in any order) should be as follows: a. Faith in one' s country and its way of life, b.
Faith in fellow detainees or hostages, c. Faith in one's self. If your answer is correct, continue.
If you answered differently, review paragraph 7201 before continuing.

7-9
7202. Recognize the Goal of a Hostage

Every reasonable step must be taken by Marines to prevent exploitation of themselves and the
U.S. Government. If exploitation cannot be prevented completely, every step must be taken to
limit exploitation as much as possible. In a sense, detained Marines often are catalysts for their
own release based upon their ability to become unattractive sources of exploitation. For example,
a Marine who resists successfully may expect the terrorists to lose interest in further exploitation
attempts. Detainees or hostages very often must make their own judgments as to which actions
will increase their chances of returning home with honor and dignity. Marines who can say that
they have done their utmost in a detention or hostage situation to resist exploitation uphold the
Department of Defense policy, the founding principles of the United States, and the highest
traditions of the Marine Corps.

Try this challenge.

State the primary goal of a hostage as it pertains to the Code of Conduct.

___________________________________________________________________

Your answer should be resist exploitation. If your answer is correct, continue. If you answered
differently, review paragraph 7202 before continuing.

7203. Maintain Personal Bearing and Common Courtesy

Regardless of the type of detention or hostage situation, or the harshness of treatment, Marines
will maintain their personal bearing. They should make every effort to remain calm, courteous,
and project personal dignity. This is particularly important during the process of capture and in
the early stages of internment when the terrorist may be uncertain of his control over his hostages.
Discourteous or arrogant behavior seldom serves the long-term interest of a detainee or hostage.
Additionally, it often results in unnecessary punishment which serves no useful purpose. Such
behavior, in some situations, can jeopardize survival and severely complicate efforts to gain
release of the detainee or Marine held hostage.

7-10
Try this challenge.

List (in any order) three factors that will assist personnel in maintaining their military
bearing while they are detained or held hostage.

a. ______________________________________________________________

b. ______________________________________________________________

c. ______________________________________________________________

Your answers should be (in the same or similar words) as follows: a. Remain calm, b. Be
courteous, c. Project personal dignity. If your answer matches or is similar, continue. If you
answered differently, review paragraph 7203 before continuing.

7204. Implement Guidance for Captivity by Terrorists.

Capture by terrorists is generally the least predictable and structured form of peacetime captivity.
The terrorist qualifies as an international criminal. The possible forms of captivity vary from
spontaneous hijacking to carefully planned kidnapping. In such captivities, hostages play a
greater role in determining their own fate since the terrorists normally expect nor receive rewards
for providing good treatment or releasing victims unharmed. If Marines are uncertain whether
their captors are genuine terrorists or surrogates of a government, they should assume that they
are terrorists. The following guidance will assist you while you are a hostage.

a. Traveling. If assigned in or traveling through areas of known terrorist activity, Marines


must exercise prudent counterterrorism measures to reduce their vulnerability to capture. Unless
it is feasible to escape, remain calm and courteous during the process of capture and initial
internment. Most casualties occur during this phase.

7-11
b. Surviving. Surviving in some terrorist detentions may depend on hostages conveying a
personal dignity and sincerity to the captors. Therefore, hostages may discuss inconsequential
topics such as sports, family, and clothing to convey to the terrorists the hostages' personal
dignity and human qualities. Hostages must make every effort to avoid embarrassing the United
States and/or the host government. The purpose of this dialogue is for the hostage to become a
"person" in the terrorist's eyes, rather than a mere symbol of a government. Such a dialogue
should also strengthen the hostage's determination to survive and resist. The hostages should
listen actively to the terrorist's feelings about his or her cause to enhance their image as a "person"
to the terrorist. On the other hand, a Marine should never pander, praise, participate in, or debate
the terrorist's cause.

c. Release. Marines held hostage by terrorists should accept release unless doing so requires
them to compromise their honor or cause damage to the U.S. Government or its allies. Marines
must keep faith with their fellow hostages and conduct themselves according to the guidelines
established by the Code of Conduct. Hostages and kidnap victims who consider escape to be
their only hope are authorized to make such attempts. Each situation will be different and the
hostage must weigh carefully every aspect of a decision to attempt an escape.

Try this challenge.

List (in any order) the three pointers a Marine should follow while detained by a terrorist
group.

a. ______________________________________________________________

______________________________________________________________

b. ______________________________________________________________

______________________________________________________________

c. ______________________________________________________________

______________________________________________________________

Your answers should be (the same or similar words) as follows: a. During capture, remain calm
and courteous, b. Convey a personal dignity and apparent sincerity to the captor, c. Accept
release unless doing so would compromise your honor or cause damage to the U.S. Government
or its allies. If your answers are correct, continue. If you answered differently, review paragraph
7204 before continuing.

7-12
Lesson Summary. In this lesson, you have learned the responsibilities a Marine has when he/she
is a detainee or hostage regarding the Code of Conduct. You now know what your goal must be
when held hostage and you know what guidelines you should follow while in captivity. Before
continuing, complete the lesson exercise.

-----------------------------------------------------------------

Lesson Exercise: Complete items 1 through 4 by performing the action required. Check your
responses against those listed at the end of this lesson.

1. List (in any order) the three responsibilities you must maintain if you should become a
detainee or hostage.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

c. _______________________________________________________________

_______________________________________________________________

2. State the primary goal of a hostage as it pertains to the Code of Conduct.

____________________________________________________________________

____________________________________________________________________

3. List (in any order) three factors that will assist personnel in maintaining their military
bearing while they are detained or held hostage.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

c. _______________________________________________________________

_______________________________________________________________

7-13
4. List (in any order) the three pointers a Marine should follow while detained by a
terrorist group.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

c. _______________________________________________________________

_______________________________________________________________

Lesson 2 Exercise Solutions

Reference

1. (in any order)


Faith in one's country and its way of life 7201
Faith in fellow detainees or hostages 7201
Faith in one's self 7201
2. Resist exploitation 7202
3. (in any order)
Remain calm 7203
Be courteous 7203
Project personal dignity 7203
4. (in any order)
During a capture remain calm and courteous 7204
Convey a personal dignity and apparent sincerity to the captor 7204
Accept release unless doing so would compromise your 7204
honor or cause damage to the U.S. Government or its allies

UNIT SUMMARY

In this unit, you learned what constitutes peacetime detention and the three types of peacetime
detention. You learned your responsibilities regarding the Code of Conduct. You now know
your main goal as a detainee or hostage is to resist exploitation by your captors. You know to
remain calm and courteous, convey personal dignity and apparent sincerity to your captors, and to
accept release if it is honorable and causes no damage to the United States or its allies. In Study
Unit 8, you will learn the United States' policy concerning terrorism and you will learn the
purpose of the United States' Trilevel Anti-Terrorism Program. You will also gain a basic
understanding of the four basic components of an operational level antiterrorism program. Before
continuing, complete the unit exercise.

7-14
Unit Exercise: Complete items 1 through 11 by performing the action required. Check your
responses against those listed at the end of this study unit.

For items 1 through 7, choose the correct answer by circling the appropriate letter.

1. Peacetime detention involves

a. holding a person against his/her will during a time when armed conflict does not
exist, or armed conflict does exist but the United States is not directly involved.
b. a hostile government's legally detaining a U.S. citizen/serviceman for
violation(s) of its laws.
c. the holding of U.S. citizens by terrorists who are sponsored by the government
of the country in which the U.S. citizen is being held.
d. a hostile government's legally detaining a U.S citizen

2. Hostile government detention involves

a. the holding of U.S. citizens by terrorists who are not sponsored by a hostile
government.
b. the holding of U.S. citizens by terrorists who are sponsored by the
government of the country in which the U.S. citizens are being held.
c. a hostile government's legally detaining a U.S. citizen/serviceman for
violation(s) of its laws.
d. holding a person against his/her will during a time when armed conflict does not
exist, or armed conflict does exist but the United States is not directly involved.

3. Hostile government-sponsored terrorist detention involves

a. the holding of U.S. citizens by terrorists who are not sponsored by a hostile
government.
b. involves the holding of U.S. citizens by terrorists who are sponsored by the
government of the country in which the U.S. citizen is being held.
c. a hostile government legally detaining a U.S. citizen/serviceman for violation(s)
of its laws.
d. holding a person against his/her will during a time when armed conflict does not
exist, or armed conflict does exist but the United States is not directly involved.

7-15
4. Independent terrorist group detention involves the holding of

a. U.S. citizens by terrorists who are not sponsored by a hostile government.


b. U.S. citizens by terrorists who are sponsored by the government of the country
in which the U.S. citizen is being held.
c. a hostile government's legally detaining a U.S. citizen/serviceman for
violation(s) of its laws.
d. a person against his/her will during a time when armed conflict does not exist or
armed conflict does exist but the United States is not directly involved.

5. Missionaries who are U.S. citizens are working in the rural areas of Peru. They are
taken hostage by the independent terrorist group the Shining Path. What type of
detention does this action represent?

a. Hostile government detention


b. Hostile government sponsored-terrorist detention
c. Independent terrorist group detention

6. United States citizens are held captive by terrorists in Libya. The Libyan
government has a record of supporting this particular terrorist group. What type of
detention does this action represent?

a. Hostile government detention


b. Hostile government sponsored-terrorist detention
c. Independent terrorist group detention

7. While on mechanized patrol in Kuwait your squad inadvertently crosses into Iraq.
The Iraqis detain you for four days until Embassy officials in Kuwait can arrange for
your release. What type of detention does this action represent?

a. Hostile government detention


b. Hostile government sponsored-terrorist detention
c. Independent terrorist group detention

7-16
8. List (in any order) three responsibilities of a Marine regarding the Code of Conduct.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

c. _______________________________________________________________

_______________________________________________________________

9. State the primary goal of a hostage as it pertains to the Code of Conduct.

____________________________________________________________________

10. List (in any order) three factors that will assist personnel in maintaining their military
bearing while they are detained or held hostage.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

11. List (in any order) the three pointers that a Marine should follow while detained by a
terrorist group.

a. _______________________________________________________________

_______________________________________________________________

b. _______________________________________________________________

_______________________________________________________________

c. _______________________________________________________________

_______________________________________________________________

7-17
Study Unit 7 Exercise Solutions

Reference

1. a. 7101
2. c. 7101
3. b. 7102
4. a. 7103
5. a. 7101
6. a. 7101
7. c. 7102
8. (in any order) 7203
Faith in one's country and its way of life
Faith in fellow detainees or hostages
Faith in one's self
9. Resist exploitation 7202
10. (in any order)
Remain calm 7203
Be courteous
Project personal dignity
1 1. (in any order)
During a capture, remain calm and courteous 7204
Convey a personal dignity and apparent sincerity to the captor
Should accept release unless doing so would compromise your
honor or cause damage to the U.S. Government or its allies

7-18
STUDY UNIT 8

ANTITERRORISM PROGRAM

Introduction. In this study unit, you will learn the United States' policy concerning
terrorism. You will learn who has jurisdictional authority when a terrorist action takes
place as well as the function and employment of the Crisis Management Team (CMT) and
the Threat Management Force (TMF).

Lesson 1. UNITED STATES POLICY CONCERNING TERRORISM

LEARNING OBJECTIVES

1. Define the United States policy concerning terrorism.

2. Define the concept of the trilevel antiterrorism program.

3. Identify the four basic components of the anititerrorism program.

8101. Define the United States' Policy Concerning Terrorism

The United States has made clear its policy regarding terrorism. That policy is as follows:

- All terrorist actions, whatever their motivation, are criminal and intolerable, and
should be condemned.

- All lawful measures to prevent such acts and bring to justice those who commit them
will be taken.

- The United States will not bargain or make any concession to terrorist blackmail. To
do so would invite further demands.

- When Americans are abducted overseas, the United States will continue to cultivate
international cooperation to combat terrorism and secure a safe release of the
hostages.

Although the policy seems simple, there are many variables that are considered before the United
States takes the necessary action. History has shown that the policy takes many months to be
fully instituted and completely carried out.

8-1
Try the challenge.

(Circle the letter of the correct response)

The United States policy concerning terrorism is as follows:

a. All terrorist actions are religious in nature and will be handled by the respective
country in which the action occurs. All measures to prevent such acts and to judge
those who commit them will be taken. The U.S. will bargain or make any
concessions to terrorists. When Americans are abducted overseas, the United
States will continue to cultivate international cooperation to combat terrorism.

b. All terrorist actions, whatever their motivation, are acts of insanity and intolerable
and should be condemned. All measures to prevent such acts and bring to justice
those who commit them will be taken. The U.S. will not bargain or make any
concession to terrorist blackmail. To do so would invite further demands. When
Americans are abducted overseas, the United States will continue to cultivate
international cooperation to combat terrorism and secure the safe release of the
hostages.

c. All terrorist actions are criminal and intolerable, whatever their motivation, and
should be condemned. All lawful measures to prevent such acts and bring to justice
those who commit them will be taken. The U.S. will not bargain or make any
concession to terrorist blackmail. To do so would invite further demands.
When Americans are abducted overseas, the United States will continue to cultivate
international cooperation to combat terrorism and secure a safe release of the
hostages.

d. All terrorists are criminally insane and intolerable. All lawful measures to prevent
terrorists from committing terrorist acts and to bring to justice those who assist
terrorists will be taken. The U.S. Federal Bureau of Investigation will not bargain
with or make any concessions to terrorist blackmail. To do so would invite further
demands. When American servicemen are abducted overseas, the United States
will continue to cultivate international cooperation to combat terrorism and secure
a safe release of hostages.

8-2
Your answer should be "c." If you answered correctly, continue. If your answer is different,
review paragraph 8101 before continuing.

8102. Defining the Concept of the Trilevel Antiterrorism Program

The U.S. government's concept of antiterrorism is the trilevel antiterrorism program. It


capitalizes on the in-place organizational structure of existing agencies and uses the assigned
responsibilities and capabilities of these agencies within a clearly defined command and control
structure to combat terrorism. Figure 8-1 shows the trilevel antiterrorism program.

Fig 8-1. U.S. Government antiterrorism program.

8-3
Define the concept of the trilevel antiterrorism program.

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

__________________________________________________________________

Your answer should be, "it capitalizes on the in-place organizational structure of existing agencies
and uses the assigned responsibilities and capabilities of these agencies within a clearly defined
command and control structure to combat terrorism." If you answered correctly, continue. If
your answer is different, review paragraph 8102 before continuing.

8103. Identify the Operational Components of the Trilevel Antiterrorism Program

The first level of the trilevel concept is the development of national command and policy
procedures. This development is the responsibility of the National Security Council under the
direction of the President. The second level is the establishment of coordination and control.
This is the province of eight Federal agencies, including the Department of Defense (DoD). The
third level is the operational level. This level addresses the responsibilities of the 29 Federal
agencies that comprise the working group on terrorism. At the operational level, the program
includes four basic components:

a. Deterrence. Using international initiatives and diplomacy to discourage the state support of
terrorism and build a broad consensus that terrorist acts are intolerable under international law
regardless of the cause they are used to further.

b. Prevention. Undertaking protection and security efforts by the public and the private sector
to discourage terrorist acts.

c. Reaction. Mounting counterterrorism operations in response to specific major acts of


terrorism.

d. Prediction. Conducting intelligence and counterintelligence efforts in continuous support of


the other three program components.

8-4
Try the next challenge.

(Circle the letter of the correct response)

Select the four basic components at the operational level of the trilevel antiterrorism
program.

a. Intelligence, integration, reaction and prediction


b. Deterrence, prevention, reaction and prediction
c. Deterrence, integration, reaction, and prediction
d. Deterrence, prevention, reaction, and conclusion

Your answer should be "b." If you answered correctly, continue. If your answer is different,
review paragraph 8103 before continuing.

Lesson Summary. In this lesson, you learned the United States' policy concerning terrorism. You
now know that the trilevel antiterrorism program is the U.S. Government's concept on how an
antiterrorism program should be structured and conducted. Under the trilevel antiterrorism
program you know that there are three levels, national command and policy, coordination and
control, operations. Under the operations level of the trilevel antiterrorism program, the four
basic components are deterrence, prevention, reaction, and prediction. In the next lesson you will
learn about the Crisis Management Team and the Threat Management Force. You will also learn
about their purposes and functions. Before continuing to the next lesson, complete the following
lesson exercise.

8-5
Lesson Exercise: Complete items 1 through 3 by performing the action required. Check your
responses against those listed at the end of this lesson.

For item 1, circle the letter of the correct response.

1. The United States' policy concerning terrorism is as follows:

a. All terrorist actions are religious in nature and will be handled by the
respective country in which the action occurs. All measures to prevent such
acts and to judge those who commit them will be taken. The U.S. will bargain
or make any concessions to terrorists. When Americans are abducted overseas,
the United States will continue to cultivate international cooperation to combat
terrorism.

b. All terrorist actions, whatever their motivation, are acts of insanity and
intolerable, and should be condemned. All measures to prevent such acts and
bring to justice those who commit them will be taken. The U.S. will not
bargain or make any concession to terrorist blackmail. To do so would invite
further demands. When Americans are abducted overseas, the United States
will continue to cultivate international cooperation to combat terrorism and
secure the safe release of the hostages.

c. All terrorist actions, whatever their motivation, are criminal and intolerable, and
should be condemned. All lawful measures to prevent such acts and bring to
justice those who commit them will be taken. The U.S. will not bargain or
make any concession to terrorist blackmail. To do so would invite further
demands. When Americans are abducted overseas, the United States will
continue to cultivate international cooperation to combat terrorism and secure a
safe release of the hostages.

d. All terrorists are criminally insane and intolerable. All lawful measures to
prevent terrorists from committing terrorist acts and to bring to justice those
who assist terrorists will be taken. The U.S. Federal Bureau of Investigation
will not bargain with or make any concessions to terrorist blackmail. To do so
would invite further demands. When American servicemen are abducted
overseas, the United States will continue to cultivate international cooperation
to combat terrorism and secure a safe release of hostages.

8-6
2. Define the concept of the trilevel antiterrorism program.

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

For item 3 circle the letter of the correct response.

3. Select the four basic components at the operational level of the trilevel antiterrorism
program.

a. Intelligence, integration, reaction and prediction


b. Deterrence, prevention, reaction and prediction
c. Deterrence, integration, reaction, and prediction
d. Deterrence, prevention, reaction, and conclusion

Lesson 1 Exercise Solutions

Reference

1. c. 8101
2. It capitalizes on the in-place organizational structure of existing 8102
agencies and uses assigned responsibilities and capabilities of
these agencies within a clearly defined command and control
structure to combat terrorism.
3. b. 8103

8-7
Lesson 2. CRISIS MANAGEMENT AND THE CRISIS MANAGEMENT FORCE

LEARNING OBJECTIVES

1. Define and describe the function and organizational structure of the Crisis
Management Team (CMT).

2. Define and describe the function and organizational structure of the Threat
Management Force (TMF).

3. Define and describe the function and organizational structure of the Special Reaction
Team (SRT).

4. Define and describe the function and organizational structure of the Negotiation
Team.

5. Define and describe the function and organization of the inner-perimeter element.

6. Define and describe the function and organization of the outer-perimeter element.

7. Identify the various phases of a terrorist incident response.

In this lesson, you will learn about the functions and organizational structures of the Crisis
Management Team, the Threat Management Force, the Special Response Team, and the inner-
and outer-perimeter elements. You will also learn what happens during the three response phases
when a terrorist incident occurs.

8201. Define and Describe the Function and Organizational Structure of the Crisis
Management Team (CMT)

a. Function. The Crisis Management Team (CMT) is a staff team specializing in


counterterrorism situations. The team advises the commander and the EOC on all aspects of the
incident. All members should receive continuous intelligence input on the terrorist threat in the
area. This will allow them to be effective if an incident does occur.

Note: Within the continental United States, the installation commander, CMT
commander, and the Provost Marshall work closely with the Federal Bureau of
Investigation (FBI). Because the FBI has jurisdictional control within the
United States, there may be conflict between who is in charge when an terrorist
incident occurs within the jurisdictional control of the base commander.

8-8
In foreign countries, the Status of Forces Agreement with the host nation
establishes who has jurisdiction over on-base terrorist incidents. The local Staff
Judge Advocate can assist in determining authority and jurisdiction. In both
instances, decisions and agreements must be joint in nature between the CMT
commander and the FBI or host nation.

b. Organizational structure. The CMT is comprised of representatives of various staff sections.


The representatives advise the CMT commander, usually the senior installation commander or his
designate, in their areas of expertise and support the Threat Management Force (TMF) as
directed by the CMT commander. The CMT may include representatives from the following:

(1) Personnel/legal (S-1/G-1, SJA)

(2) Military intelligence (S-2/G-2)

(3) Operations (S-3/G-3)

(4) Logistics (S-4/G-4)

(5) Special staff sections:

Provost Marshall Communications


Public Affairs Medical
Motor Transportation Chaplain
Base Maintenance

(6) Explosive Ordnance Disposal (EOD)

(7) Local Naval Criminal Investigative Service (NCIS) office

(8) Civilian authorities/representatives

(9) State and local police

(10) Legal representatives such as the district attorney

As you can see, this can lead to a large number of people gathering during a very stressful time.
For this reason, it is recommended that only key personnel be used by the CMT. Their supporting
staffs can stand-by in their spaces to do research or perform assigned task associated with
terrorist incidents. The complete crisis management organization is depicted in figure 8-2.

8-9
Fig 8-2. Crisis management organization.

Try these challenges.

(Circle the letter of the correct answer)

1. Define and describe the function of the Crisis Management Team. The CMT is a
staff team specializing in

a. the determination of crises.


b. counterterrorism situations. The team advises the commander and the FOC
on all aspects of the incident.
c. counterintelligence situations.
d. world conflicts. The team advises the commander and the EOC on all

8-10
(Circle the letter of the correct response)

2. The CMT organization consists of

a. the threat Management Force, the SRTs, the negotiation teams, and the inner-
and outer-perimeter teams.
b. higher headquarters, the State Department or host nation representative, and
the FBI.
c. the staff sections of the S-1/G-1, S-3/G-3, the special reaction teams, the
hostage negotiation teams, and the inner- and outer-perimeter elements.
d. the S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local
NCIS office.

Your answers should be 1. b and 2. d. If you answered correctly, continue. If either of your
answers are different, review paragraph 8201 before continuing.

8202. Define and Describe the Function and Organizational Structure of the Threat
Management Force (TMF)

The activities and structure of the Threat Management Force (TMF) is discussed in the following
paragraphs.

a. Function. The TMF is the tactical element of the CMT and provides on-site security once a
terrorist incident has occurred.

Try the challenge to help you to remember the function of the TMF.

(Circle the letter of the correct response)

What is the function of the TMF? It provides

a. tactical support to the CMT and on site security after a terrorist incident has
occurred.
b. a staff team specializing in counterterrorism situations. The team advises the
commander and the EOC on all aspects of the incident.
c. the means necessary to communicate with the FBI or host-nation counterterrorism
forces.
d. the logistical support for the CMT.

8-11
Your answer should be "a." If you answered correctly, continue. If you answered differently
review paragraph 8202 before continuing.

b. Organizational structure. The TMF is divided into three teams; Special Reaction Team
(SRT), the hostage negotiation team and the third team is split into the inner- and outer-perimeter
elements. The organization of the TMF is depicted in figure 8-3.

Fig 8-3. Organization of the threat management force.

Try the challenge.

(Circle the letter of the correct response)

The TMF is comprised of

a. a special reaction team(s) (SRT), a hostage negotiation team, and a third team
which is split into the inner- and outer-perimeter elements.
b. S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local NCIS
office.
c. higher headquarters, the State Department or host nation representative, and the
FBI.
d. an Explosive Ordnance Disposal squad and the Naval Criminal Investigative
Service representative.

Your answer should be "a." If you answered correctly, continue. If your answer is different,
review paragraph 8202 before continuing.

8-12
8203. Define and Describe the Function and Organizational Structure of the Special
Reaction Team (SRT)

a. Function. The SRT, because of its extensive training in combat in built-up areas,
marksmanship, rappelling, physical training, first aid, and use of specialized equipment, is
designed to neutralize or apprehend a barricaded offender with a minimum of danger to hostages,
team members, or others. When ordered to, each team should be able to:

(1) Evacuate innocents

(2) Rescue hostages

(3) Apprehend terrorists/criminals

(4) Attack with riot-control agents

(5) Provide fire by selected marksmen (counter-sniper)

(6) Assault the terrorist position by

(a) Scaling or rappelling buildings or obstacles

(b) Using helicopters or armored vehicles

(c) Directing full fire power on the terrorist's position

Try the challenge.

(Circle the letter of the correct response)

What is the function of the SRT?

a. To advise the commander and the EOC on all aspects of the incident.
b. To neutralize or apprehend a barricaded offender with a minimum of danger to
hostages, team members, or others.
c. To advise the EOC on all aspects of the operation.
d. To neutralize offenders without prejudice.

8-13
Your answer should be "b." If you answered correctly, continue. If you answered differently,
review paragraph 8203 before continuing.

b. Organizational structure and responsibilities . The SRTs are made up of five-man teams.
Each team consists of a team leader, special reaction team scout, special reaction team marksman,
a special reaction team observer, and a special reaction team defense man. The responsibilities of
each team member are discussed below.

(1) Team leader. The team leader is responsible for locating and directing counterfire
against targets, creating a plan of attack, and supervising its execution. He is usually
armed with a sidearm and an additional weapon as may be necessary. The team
leader may also carry the teams radio, binoculars, and other mission related
equipment.

(2) Special reaction team scout. The SRT scout leads the team to the objective by
conducting a reconnaissance of the approach and withdrawal routes, building
entrances, and rooftops, and by removing obstacles such as locked doors. After
completing the scouting mission, the scout may be assigned a defensive or security
role for the team or be designated to participate in the assault. The scout is armed
with a sidearm and a semiautomatic rifle or shotgun. He will carry any equipment
necessary to lead the team to the objective, such as a pry bar, manhole hook or bolt
cutters.

(3) Special reaction team marksman. The SRT marksman is trained and deployed so that
if the need arises he can control the situation with a few well placed shots at the
command of the team leader. The marksman is armed with a side arm and a high
powered rifle with a telescopic sight. The marksman also carries any specialized
equipment designated by the team leader.

(4) Special reaction team observer. The SRT observer acts as the team recorder,
recording events preceding and following the threat neutralization for inclusion in the
team after-action report. The observer is armed with a sidearm and a semiautomatic
rifle. He carries a pair of binoculars for observation and fire direction and other
equipment as required.

(5) Special reaction team defense man. The SRT defense man protects the team from
ambush during the approach, covers the team's withdrawal, and assists and protects
the scout during reconnaissance. Additionally, the defense man provides close-range
assault fire against barricaded offenders or a hardened position. The defense man is
armed with a sidearm and a semiautomatic rifle or a shotgun. He also carries such
needed equipment as rappelling ropes, harnesses, or demolitions.

8-14
Try the next challenge.

(Circle the letter of the correct response)

A special reaction team is comprised of a

a. team leader and two marksmen.


b. scout, a marksman and, a defense man.
c. team leader, a scout, a marksman, an observer, and a defense man.
d. team leader, a scout, a marksman, an observer, a defense man, and a negotiator.

Your answer should be "c." If you answered correctly, continue. If you answered differently,
review paragraph 8203 before continuing.

8204. Define and Describe the Function and Organizational Structure of the Negotiation
Team

a. Function. The negotiation team interacts with the terrorists on order from the TMF
commander. Members of the negotiation team must be able to establish rapport with the
terrorists. Establishing rapport will permit the negotiators to defer decisions and still maintain
rapport when demands are delayed or refused. Negotiators are not decision makers. By not
being decision makers the negotiators, are established as neutrals who appear able to consider
equally the interests of the terrorists and the interest of society. The negotiators should strive to

- Be mediators, not arbitrators

- Allow terrorists to set the pace, mood, and topic of conversation

- Accept the terrorists' views neutrally, expressing neither approval nor disapproval

- Keep the terrorists talking

8-15
Try this challenge.

(Circle the letter of the correct response)

What is the function of the negotiation team? The team

a. interacts with the terrorists on order from the TMF commander. Members of the
negotiation team must be able to establish rapport with the terrorists.
b. advises the commander and the EOC on all aspects of the incident.
c. advises the EOC on all aspects of counterintelligence.
d. interacts with the SRT by providing reconnaissance assets.

Your answer should be "a." If you answered correctly, continue. If you answered differently,
review paragraph 8204 before continuing.

b. Organizational structure. A typical negotiation team would be made up of the following


personnel:

(1) Officer-in-charge.

(2) Primary hostage negotiator. This person is formally trained in hostage negotiation.

(3) Backup hostage negotiator. Also formally trained in hostage negotiation, the backup
hostage negotiator is employed when the primary is no longer able to continue with
the negotiations.

(4) Criminal Investigative Division (CID) or Military Police (MP) investigator. Due to
the fact that all terrorist acts are considered criminal in nature, the military law
enforcement community will be represented.

(5) Linguist. A linguist who is trained and or fluent in the language of the region must be
present.

Note: Ideally, the entire negotiation team would be at least conversationally fluent in
the language of the region.

8-16
All members of the negotiation team should be mentally mature and emotionally stable with the
absence of negative personality traits such as an overbearing or antagonistic attitude. They should
be good listeners, experienced in communication techniques, sincere and have the ability to be
flexible. Additionally, members of the negotiation team should be physically fit allowing them to
better cope with the demands and stress associated with a hostage negotiation situation.

Try this challenge.

(Circle the letter of the correct response)

A negotiation team is comprised of

a. a team leader, a scout, a marksman, an observer, and a defense man.


b. an officer-in-charge, a primary hostage negotiator, a backup hostage negotiator,
Criminal Investigative Division or Military Police investigator, linguist.
c. the S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local NCIS
office.
d. an officer in charge, an observer, and a primary hostage negotiator.

Your answer should be "b." If you answered correctly, continue. If you answered differently,
review paragraph 8204 before continuing.

8205. Define and Describe the Function and the Organizational Structure of the
Inner-Perimeter Element

a. Function. The inner-perimeter element is responsible for physically controlling the area
immediately around the scene. It has the closest tactical contact with the terrorists. This element
contains the situation and relays intelligence on activity at the scene to the TMF commander. A
special reaction team, or teams could be assigned this mission and could be augmented by other
trained military police or security personnel.

8-17
Try the following challenge.

(Circle the letter of the correct response)

What is the function of the inner-perimeter element?

a. Advises the EOC on all aspects of the operation.


b. Neutralizes offenders without prejudice.
c. Interacts with the terrorists on order from the TMF commander. Members of the
negotiation team must be able to establish rapport with the terrorists.
d. Physically controls the area immediately around the scene. The inner-perimeter
element has the closest tactical contact with the terrorists. This element contains the
situation and relays intelligence on activity at the scene to the TMF commander.

Your answer should be "d." If you answered correctly, continue. If you answered differently,
review paragraph 8205 before continuing.

b. Organizational structure. The inner-perimeter element is under the control of the TMF
commander. A typical inner-perimeter element is comprised of the following:

(1) Officer-in-charge. The officer-in-charge reports directly to the TMF commander.

(2) Non-commissioned officer in charge (NCOIC). The NCOIC reports directly to the
inner-perimeter OIC or to the TMF commander in the OIC's absence.

(3) Special reaction team.

(4) Explosive ordnance disposal support unit.

(5) Photographic element. Photographs can identify terrorists or hostages. The


photographic capability of the inner-perimeter element could be an experienced MP
investigator or CID agent. The person would be trained in criminal investigation
photography.

8-18
Try the challenge.

(Circle the letter of the correct response)

An inner-perimeter element is comprised of

a. an officer-in-charge, non-commissioned officer in charge (NCOIC), a special reaction


team, explosive ordnance disposal support, and a photographic capability.
b. an officer-in-charge, a primary hostage negotiator, a backup hostage negotiator,
Criminal Investigative Division or Military Police investigator, linguist.
c. the S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local
NCIS office.
d. an officer-in-charge, an observer, and a primary hostage negotiator.

Your answer should be "a." If you answered correctly, continue. If your answer is different,
review paragraph 8205 before continuing.

8206. Define and Describe the Function and Organizational Structure of the
Outer-Perimeter Element

a. Function. The outer-perimeter element can be tasked with a variety of missions in


association with a terrorist incident.

(1) Outside-perimeter security. The outer-perimeter security element may be used to


establish and maintain the area outside of the perimeter of the incident scene.

(2) Evacuation. The outer-perimeter element may be employed in evacuating and sealing
off housing and troop billeting areas.

(3) Access control. The outer-perimeter element may be employed to control access to
the incident area and the installation.

(4) Guards. The outer-perimeter element may be posted as guards for all critical and
restricted areas outside the incident area.

(5) Augmentation. The outer-perimeter element may be used to augment the


installation's law enforcement mission.

8-19
Try the challenge.

(Circle the letter of the correct response)

What function does an outer-perimeter element provide?

a. Neutralizes or apprehends a barricaded offender with a minimum of danger to


hostages, team members, or others.
b. Interacts with the terrorists on order from the TMF commander. Members of the
negotiation team must be able to establish rapport with the terrorists.
c. Outside-perimeter security, evacuation, access control, guards, and augmentation.
d. Responsible for physically controlling the area immediately around the scene. It has
the closest tactical contact with the terrorists. This element contains the situation and
relays intelligence on activity at the scene to the TMF commander.

Your answer should be "c." If your answer is correct, continue. If your answer is different,
review paragraph 8206 before continuing.

b. Organizational structure. The outer-perimeter element has either an officer or a


non-commissioned officer who is directly responsible to the TMF commander in charge. The
on-site commander sets the size of the outer-perimeter security team to fit the needs of the
installation. On smaller installations, the outer-perimeter may be made up of military police
augmented by troops on a 4 or 5 to 1 ratio.

Try the challenge.

(Circle the letter of the correct response)

The outer-perimeter is comprised of an officer or a non-commissioned officer-in-charge


and a troop to MP ratio of no greater than ____________________.

a. 1 or 2 to 1
b. 2 or 3 to 1
c. 3 or 4 to 1
d. 4 or 5 to 1

Your answer should be "d." If you answered correctly, continue. If your answer is different
review paragraph 8206 before continuing.

8-20
8207. Responding to an Incident

Once a terrorist incident occurs, the response to it will depend greatly on where it took place. If
the incident happens outside of the jurisdictional boundaries of the U.S. and is also off base, the
incident will be handled by civilian authorities. If the incident occurs on base; however, the base
commander has the initial response authority. In most cases of incidents occurring on a U.S.
base, the initial response to a terrorist incident is made by the military police patrols on duty at
that time. They are considered the initial response force. They isolate the incident and contain
the situation until relieved by the inner-perimeter element. The actions of the initial response
force, as directed by the officer or NCO, depend on the terrorists' tactics. Depending on the
installation procedures, the CMT will be activated. The CMT will go through the proper channels
to notify HQMC and the FBI when the incident occurs within the continental U.S. (CONUS).
Outside of the continental U.S. (OCONUS), the appropriate command operation center, the
Department of State, and the host nation are notified. Details of each response phase are
provided below.

a. Phase I. Phase I is commitment of local available resources. This includes the regular
military police patrols and available backup units. These units should be prepared to secure and
contain the scene until the beginning of Phase II.

b. Phase II. Phase II is enhancement of the initial response force by the TMF, FBI crisis
management teams, or host-nation tactical units. This phase begins when the EOC is notified and
the CMT is activated. It is during this phase that the FBI or host nation may assume control over
the incident. If this occurs, installation forces should be ready to support the FBI/host nation
operation. Remember, within CONUS the FBI has discretionary authority to assume jurisdiction;
the host country has that authority OCONUS.

c. Phase III. Phase III is commitment of Department of Defense or the host-nation


counterterrorism force. This is the phase in which steps are taken to terminate the incident.
Incident termination may be the result of successful negotiations, assault, or other actions,
including the surrender of the terrorists. Also the terrorists may decide to exercise the extreme
option of killing the hostages and committing suicide.

Try these challenges.

(Circle the letter of the correct response)

1. During Phase I of responding to a terrorist incident

a. Department of Defense or host nation counterterrorism forces are committed.


b. local available forces are committed.
c. FBI crisis management teams, or host-nation tactical units are committed.
d. steps are taken to terminate the incident.

8-21
(Circle the letter of the correct response)

2. During Phase II of responding to a terrorist incident

a. Department of Defense or host nation counterterrorism forces are committed.


b. local available forces are committed.
c. FBI crisis management teams, or host-nation tactical units are committed.
d. steps are taken to terminate the incident.

(Circle the letter of the correct response)

3. During Phase III of responding to a terrorist incident

a. Department of Defense or host nation counterterrorism forces are committed.


b. local available forces are committed.
c. FBI crisis management teams, or host-nation tactical units are committed.
d. FBI or the host nation may assume control over the incident.

Your answers should be the following: 1. b, 2. c , 3. a. If you answered all challenges


correctly, continue. If any of your answers are different, review paragraph 8207 before
continuing.

Lesson Summary. In this lesson, you have learned the function and organizational structures of
the Crisis Management Team, the Threat Management Force, the Special Response Team, the
inner-perimeter element, and the outer-perimeter element. You also have knowledge of what
happens during the three response phases when a terrorist incident occurs. Before continuing,
complete the lesson exercise.

8-22
Lesson Exercise: Complete items 1 through 15 by performing the action required. Check your
responses against those listed at the end of this lesson.

For items 1 through 15, circle the letter of the correct response.

1. What is the function of the Crisis Management Team? The CMT is a staff team
specializing in

a. the determination of crises.


b. counterterrorism situations. The team advises the commander and the EOC on
all aspects of the incident.
c. counterintelligence situations. The team advises the EOC on all aspects of
counterintelligence.
d. world conflicts. The team advises the commander and the EOC on all aspects
of conflicts.

2. The organization of the CMT consists of

a. the Threat Management Force, the SRTs, the negotiation teams, and the inner-
and outer-perimeter teams.
b. higher headquarters, the State Department or host nation representative, and
the FBI.
c. the staff sections of the S-1/G-1, S-3/G-3, the special reaction teams, the
hostage negotiation teams, and the inner- and outer-perimeter elements.
d. S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local NCIS
office.

3. What is the function of the TMF? It provides

a. tactical support to the CMT and provides on site security after a terrorist
incident has occurred.
b. a staff team specializing in counterterrorism situations. The team advises the
commander and the EOC on all aspects of the incident.
c. the means necessary to communicate with the FBI or host-nation
counterterrorism forces.
d. the logistical support for the CMT.

8-23
4. The TMF is comprised of

a. a Special Reaction Team(s) (SRT), a hostage negotiation team, and a third team
that is split into the inner- and outer-perimeter elements.
b. S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local NCIS
office.
c. higher headquarters, the State Department or host nation representative, and
the FBI.
d. an Explosive Ordnance Disposal squad and the Naval Criminal Investigative
Service representative.

5. What is the function of the SRT?

a. Advise the commander and the EOC on all aspects of the incident.
b. Neutralize or apprehend a barricaded offender with a minimum of danger to
hostages, team members, or others.
c. Advise the EOC on all aspects of the operation.
d. Neutralize offenders without prejudice.

6. A Special Reaction Team is comprised of a

a. team leader and 2 marksmen.


b. scout, a marksman, and a defense man.
c. team leader, a scout, a marksman, an observer, and a defense man.
d. team leader a scout, a marksman, and observer, a defense man, and a
negotiator.

7. What is the function of the negotiation team? It

a. interacts with the terrorists on order from the TMF commander. Members of
the negotiation team must be able to establish rapport with the terrorists.
b. advises the commander and the EOC on all aspects of the incident.
c. advises the EOC on all aspects of counterintelligence.
d. interacts with the SRT by providing reconnaissance assets.

8. A negotiation team is comprised of

a. a team leader, a scout, a marksman, an observer, and a defense man.


b. an officer-in-charge, a primary hostage negotiator, a backup hostage negotiator,
Criminal Investigative Division or Military Police investigator, and a linguist.
c. the S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local
NCIS office.
d. an officer-in-charge, an observer, and a primary hostage negotiator.

8-24
9. What is the function of the inner-perimeter element? It

a. advises the EOC on all aspects of the operation.


b. neutralizes offenders without prejudice.
c. interacts with the terrorists on order from the TMF commander. Members of
the negotiation team must be able to establish rapport with the terrorists.
d. is responsible for physically controlling the area immediately around the scene.
It has the closest tactical contact with the terrorists. This element contains the
situation and relays intelligence on activity at the scene to the TMF commander.

10. An inner-perimeter element is comprised of

a. an officer-in-charge, non-commissioned officer in charge (NCOIC), a Special


Reaction Team, Explosive Ordnance disposal support, and
photographic capability.
b. an officer-in-charge, a primary hostage negotiator, a backup hostage negotiator,
Criminal Investigative Division or Military Police investigator, and a linguist.
c. the S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local
NCIS office.
d. an officer-in-charge, an observer, and a primary hostage negotiator.

11. What function does an outer-perimeter element provide? It

a. neutralizes or apprehends a barricaded offender with a minimum of danger


to hostages, team members, or others.
b. interacts with the terrorists on order from the TMF commander. Members
of the negotiation team must be able to establish rapport with the terrorists.
c. provides outside-perimeter security, evacuation, access control, guards, and
augmentation.
d. is responsible for physically controlling the area immediately around the scene.
It has the closest tactical contact with the terrorists. This element contains the
situation and relays intelligence on activity at the scene to the TMF commander.

12. The outer-perimeter is comprised of an officer or a noncommissioned


officer-in-charge and a troop to MP ratio of no greater than

a. 1 or 2 to 1.
b. 2 or 3 to 1.
c. 3 or 4 to 1.
d. 4 or 5 to 1.

8-25
13. During Phase I of responding to a terrorist incident,

a. Department of Defense or host nation counterterrorism forces are committed.


b. local available forces are committed.
c. FBI crisis management teams or host-nation tactical units are committed.
d. steps are taken to terminate the incident.

14. During Phase II of responding to a terrorist incident

a. Department of Defense or host nation counterterrorism forces are committed.


b. local available forces are committed.
c. FBI crisis management teams or host-nation tactical units are committed.
d. steps are taken to terminate the incident.

15. During Phase III of responding to a terrorist incident

a. Department of Defense or host nation counterterrorism forces are committed.


b. local available forces are committed.
c. FBI crisis management teams or host-nation tactical units are committed.
d. FBI or the host nation may assume control over the incident.

Lesson 2 Exercise Solutions

Reference

1. b. 8201
2. d. 8201
3. a. 8202
4. a. 8202
5. b. 8203
6. c. 8203
7. a. 8204
8. b. 8204
9. d. 8205
10. a. 8205
11. c. 8206
12. d. 8206
13. b. 8207
14. c. 8207
15. a. 8207

8-26
UNIT SUMMARY

In this study unit, you learned the United States' policy concerning terrorism. You know the U.S.
has a trilevel antiterrorism program and the four main operational components of the trilevel
program are deterrence, prevention, reaction, and prediction. You know the composition of a
basic terrorism response organization for an installation. You know the functions of and
organization for the Crisis Management Team, the Threat Management Force, the Special
Reaction Team, the negotiation team, and the inner- and outer-perimeter teams. You have
learned about the various phases of response to a terrorist incident. Complete the unit exercise
before continuing on to the review lesson. Congratulations!

8-27
Unit Exercise: Complete items 1 through 18 by performing the action required. Check your
responses against those listed at the end of this study unit.

For item 1, circle the letter of the correct response.

1. The United States' policy concerning terrorism is as follows:

a. All terrorist actions are religious in nature and will be handled by the respective
country in which the action occurs. All measures to prevent such acts and to judge
those who commit them will be taken. The U.S. will bargain or make any
concessions to terrorists. When Americans are abducted overseas, the United States
will continue to cultivate international cooperation to combat terrorism.

b. All terrorist actions are acts of insanity and intolerable, whatever their motivation, and
should be condemned. All measures to prevent such acts and bring to justice those
who commit them will be taken. The U.S. will not bargain or make any concession to
terrorist blackmail. To do so would invite further demands. When Americans are
abducted overseas, the United States will continue to cultivate international
cooperation to combat terrorism and secure the safe release of the hostages.

c. All terrorist actions are criminal and intolerable, whatever the motivation, and should
be condemned. All lawful measures to prevent such acts and bring to justice those
who commit them will be taken. The U.S. will not bargain or make any concession to
terrorist blackmail. To do so would invite further demands. When Americans are
abducted overseas, the United States will continue to cultivate international
cooperation to combat terrorism and secure a safe release of the hostages.

d. All terrorists are criminally insane and intolerable. All lawful measures to prevent
terrorists from committing terrorist acts and to bring to justice those who assist
terrorists will be taken. The U.S. Federal Bureau of Investigation will not bargain
with or make any concessions to terrorist blackmail. To do so would invite further
demands. When American servicemen are abducted overseas, the United States will
continue to cultivate international cooperation to combat terrorism and secure a safe
release of hostages.

8-28
2. Define the concept of the trilevel antiterrorism program.

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

____________________________________________________________________

3. List the four basic components at the operational level of the trilevel antiterrorism
program.

a. _______________________________________________________________

b. _______________________________________________________________

c. _______________________________________________________________

d. _______________________________________________________________

For items 4 through 18, circle the letter of the correct response.

4. What is the function of the Crisis Management Team? The CMT is a staff team
specializing in

a. the determination of crises.


b. counterterrorism situations. The team advises the commander and the EOC on
all aspects of the incident.
c. counterintelligence situations. The team advises the EOC on all aspects of
counterintelligence.
d. world conflicts. The team advises the commander and the EOC on all aspects
of the conflict.

5. The organization of the CMT consists of

a. the Threat Management Force, the SRTs, the negotiation teams, and the inner-
and outer-perimeter teams.
b. higher headquarters, the State Department or host nation representative, and
the FBI.
c. the staff sections of the S-1/G-1, S-3/G-3, the Special Reaction Teams, the
hostage negotiation teams, and the inner- and outer-perimeter elements.
d. S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local NCIS
office.

8-29
6. What is the function of the TMF? It provides

a. tactical support to the CMT and provides on site security after a terrorist
incident has occurred.
b. a staff team specializing in counterterrorism situations. The team advises the
commander and the EOC on all aspects of the incident.
c. the means necessary to communicate with the FBI or host-nation
counterterrorism forces.
d. the logistical support for the CMT.

7. The TMF is comprised of

a. a Special Reaction Team (s) (SRT), a hostage negotiation team, and a third
team that is split into the inner- and outer-perimeter elements.
b. S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local NCIS
office.
c. higher headquarters, the State Department or host nation representative, and
the FBI.
d. an Explosive Ordnance Disposal squad and the Naval Criminal Investigative
Service representative.

8. What is the function of the SRT? It

a. advises the commander and the EOC on all aspects of the incident.
b. neutralizes or apprehends a barricaded offender with a minimum of danger to
hostages, team members, or others.
c. advises the EOC on all aspects of the operation.
d. neutralizes offenders without prejudice.

9. A Special Reaction Team is comprised of a

a. team leader and 2 marksmen.


b. scout, a marksman, and a defense man.
c. team leader, a scout, a marksman, an observer, and a defense man.
d. team leader, a scout, a marksman, and observer, a defense man, and a
negotiator.

10. What is the function of the negotiation team? It

a. interacts with the terrorists on order from the TMF commander. Members of
the negotiation team must be able to establish rapport with the terrorists.
b. advises the commander and the EOC on all aspects of the incident.
c. advises the EOC on all aspects of counterintelligence.
d. interacts with the SRT by providing reconnaissance assets.

8-30
11. A negotiation team is comprised of

a. a team leader, a scout, a marksman, an observer, and a defense man.


b. an officer-in-charge, a primary hostage negotiator, a backup hostage negotiator,
Criminal Investigative Division or Military Police investigator, and a linguist.
c. the S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local
NCIS office.
d. an office-in-charge, an observer, and a primary hostage negotiator.

12. What is the function of the inner-perimeter element?

a. Advises the EOC on all aspects of the operation.


b. Neutralizes offenders without prejudice.
c. Interacts with the terrorists on order from the TMF commander. Members of
the negotiation team must be able to establish rapport with the terrorists.
d. Physically controls the area immediately around the scene. It has the closest
tactical contact with the terrorists. This element contains the situation and
relays intelligence on activity at the scene to the TMF commander.

13. An inner-perimeter element is comprised of

a. an officer-in-charge, a non-commissioned officer (NCO)-in-charge (NCOIC), a


Special Reaction Team, Explosive Ordnance Disposal support, and a
photographic capability.
b. an officer-in-charge, a primary hostage negotiator, a backup hostage negotiator,
Criminal Investigative Division or Military Police investigator, and a linguist.
c. the S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local
NCIS office.
d. an officer-in-charge, an observer, and a primary hostage negotiator.

14. What function does a outer-perimeter element provide? It

a. neutralizes or apprehends a barricaded offender with a minimum of danger to


hostages, team members, or others.
b. interacts with the terrorists on order from the TMF commander. Members of
the negotiation team must be able to establish rapport with the terrorists.
c. provides outside-perimeter security, evacuation, access control, guards, and
augmentation.
d. is responsible for physically controlling the area immediately around the scene.
It has the closest tactical contact with the terrorists. This element contains the
situation and relays intelligence on activity at the scene to the TMF commander.

8-31
15. The outer-perimeter is comprised of an officer or a noncommissioned
officer-in-charge and a troop to MP ratio of no greater than

a. 1 or 2 to 1.
b. 2 or 3 to 1.
c. 3 or 4 to 1.
d. 4 or 5 to 1.

16. During Phase I of responding to a terrorist incident,

a. Department of Defense or host nation counterterrorism forces are committed.


b. local available forces are committed.
c. FBI crisis management teams or host-nation tactical units are committed.
d. steps are taken to terminate the incident.

17. During Phase II of responding to a terrorist incident,

a. Department of Defense or host nation counterterrorism forces are committed.


b. local available forces are committed.
c. FBI crisis management teams or host-nation tactical units are committed.
d. steps are taken to terminate the incident.

18. During Phase III of responding to a terrorist incident,

a. Department of Defense or host nation counterterrorism forces are committed.


b. local available forces are committed.
c. FBI crisis management teams or host-nation tactical units are committed.
d. FBI or the host nation may assume control over the incident.

8-32
Study Unit 8 Exercise Solutions

Reference

1. c. 8101
2. It is used to capitalize on the in-place organizational 8102
structure of existing agencies and to utilize the
assigned responsibilities and capabilities of these
agencies within a clearly defined command and control
structure to combat terrorism.
3. deterrence, prevention, reaction, and prediction 8103
4. b. 8201
5. d. 8201
6. a. 8202
7. a. 8202
8. b. 8203
9. c. 8203
10. a. 8204
11. b. 8204
12. d. 8205
13. a. 8205
14. c. 8206
15. d. 8206
16. b. 8207
17. c. 8207
18. a. 8207

8-33
TERRORISM AWARENESS FOR MARINES

REVIEW LESSON EXAMINATION

INSTRUCTIONS: The purpose of the review lesson is to prepare you for your final
examination. We recommend that you try to complete your review lesson without referring to the
text, but for those items (questions) you are unsure of, restudy the text. When you have finished
your review lesson and are satisfied with your responses, check your responses against the
answers provided at the end of this review lesson examination.

Select the ONE answer which BEST completes the statement or answers the item. For
multiple-choice items, circle your response. For matching items, place the letter of your response
in the space provided.

1. Select the correct definition of terrorism.

a. The instilling of fear, or application of terror.


b. The instilling of fear through violence or threats of violence.
c. The instilling of fear in individuals through the use, or threatened use, of violence.
d. The unlawful use or threatened use of force or violence against individuals, or
property to coerce or intimidate governments or societies often to achieve political,
religious, or ideological objectives.

2. Select the correct definition of the term terrorist.

a. One who advocates or one who creates an environment of economic growth with
the intent of influencing others careers.
b. One who advocates, creates, or practices the use of terror for a means of coercion.
c. One who advocates or one who creates or practices crime for the means of personal
gain.
d. An advocate or one who creates or practices crime for the advancement of a
particular race or group of people.

R-1
3. A terrorist group is an organization of

a. like-minded individuals who use terrorism as the means of influencing or


intimidating others, governments, and societies with the intent of bringing about the
group's desired outcome.
b. like-minded individuals who band together to control a specific region.
c. individuals who band together to meet common goals.
d. like-minded individuals who use terrorism to gain as much public recognition for
their organization as possible.

4. What are the three psychological categories of terrorists?

a. Hard-core, aggressive, passive c. Political, religious, secular


b. Criminals, crusaders, crazies d. Leftist, rightist, mass

5. The four motives for terrorism are

a. Criminal, mental, religious, and political


b. Crusaders, criminals, crazies, and special interest groups
c. Political, ideology, nationalism, and special interest
d. Political ideology, nationalism, religion, special interest

6. What are five of the ten intermediate goals of terrorism?

a. Recognition, harassment, religious, ideological, and theft or extortion of money or


equipment
b. Recognition, destruction, overreaction by the government; harassment, weakening,
or embarrassment of government forces; theft or extortion of money or equipment
c. Recognition, criminal, religious, overreaction by the government, weakening or
embarrassment of government security forces
d. Criminal, political, ideological, religious, financial

7. The three long-term objectives of terrorism are

a. financial gain, political prowess, and social recognition.


b. financial independence, sub-revolutionary, and establishment.
c. religion, revolution, and establishment.
d. revolutionary, sub-revolutionary, and establishment.

R-2
8. Select the correct definition for the term terrorist operation.

a. Any criminal act carried out by a person or group to gain attention for a cause to
raise capital or to obtain equipment for future operations by using terror-causing
tactics
b. Highly complex goal oriented operations designed specifically to impact
or affect world politics
c. Goal oriented operations designed specifically to affect world politics
d. Simple covert operations designed to gain attention and promote a certain
ideological cause

9. Select the phase during which the terrorists decide that a hostage-barricade or other
similar event is a worthwhile endeavor.

a. Climax phase
b. Pre-incident phase
c. Post-Incident phase
d. Negotiation phase
e. Initiation phase

10. Select those operations commonly associated with terrorism.

1. Burglary 8. Bombing
2. Kidnapping 9. Arson
3. Hijacking 10. Genocide
4. Surveillance 11. Assassination
5. International narcotics support 12. Armed assault
6. Intimidation 13. Hostage-taking
7. Beatings/maiming 14. Anarchy

a. 1, 2, 3, 4, 5, 6, 7, 8 c. 2, 3, 7, 8, 9, 11, 12, 13
b. 1, 3, 4, 5, 6, 7, 8, 9 d. 5, 6, 7, 8, 9, 12, 13, 14

R-3
11. Select the key characteristic of personnel who have been the target of a terrorist
operation. The personnel

a. were easy targets. c. were undefended targets.


b. were all U.S. citizens d. failed to believe it could happen to them.

12. What are the three characteristics of easy targets?

a. Accessible, predictable, and unaware


b. Inaccessible, unpredictable and aware
c. Moveable, easy accessible, and dependent on outside resources
d. Immovable, impregnable, and self-sufficient

13. From the list below, select the four categories into which targets of terrorist attacks are
divided.

1. Medical systems 6. Welfare and educational systems


2. Engineering and energy systems 7. Industrial and processing systems
3. Agricultural systems 8. Transportation systems
4. Environmental systems 9. Facilities
5. Communications and supply 10. Human
systems

a. 1, 5, 6, 8 c. 2, 4, 5, 7
b. 2, 3, 4, 7 d. 2, 5, 8, 10

14. The command cell of a terrorist organization is responsible for

a. protective covering fire. c. eyes-on information on the intended target.


b. fund-raising. d. structure and security.

15. The operational cell of a terrorist organization is responsible for

a. being the action arm of the group.


b. providing protective covering fire.
c. fund-raising.
d. structure and security.

16. The reconnaissance team of a terrorist organization is responsible for

a. fund-raising. c. providing protective covering fire.


b. structure and security. d. eyes-on information on the intended target.

R-4
17. The assault element of a terrorist organization is responsible for

a. pre-strike information on the intended victim.


b. providing "hit" men during the operation.
c. protective covering fire for the reconnaissance team.
d. logical support.

18. What are the three teams that comprise the assault element?

a. Command element, reconnaissance team, and security team


b. Command team, assault team, and logistical support team
c. Command team, assault team, and security team
d. Command element, assault team, and reconnaissance team

19. The security team of an assault element is responsible for security for the

a. assault team's training site.


b. fund-raising operations.
c. reconnaissance team.
d. command element.

20. The support cell of the terrorist organization is also known as the auxiliary cell. The
support cell is responsible for providing

a. the terrorist organization with the action arm of the organization including the
organization's cadre.
b. protective, covering fire for the reconnaissance team.
c. eyes-on information concerning the intended target.
d. logistical support such as fund-raising, gathering sympathizers, and distributing
propaganda.

21. The intelligence cell of a terrorist organization is responsible for providing

a. pre-strike, eyes-on information about the intended target.


b. the "hit" men for the operational cell during the actual operation.
c. logistical support to the operational cell
d. collection and processing services on potential targets to the operational cell and
developing specific intelligence relevant to the target.

R-5
22. Select those terrorist groups organic to Europe from the list below.

1. Chukaku-Ha
2. Abu Nidal Organization (ANO)
3. Armenian Secret Army for the Liberation of Armenia
4. Bandera Roja (Red Flag-GBR)
5. Basque Fatherland and Liberty (ETA)
6. Popular Forces 25 April (FP-25)
7. Lorenzo Zelaya Popular Revolutionary Forces (FPR-LZ)
8. Macheteros (Machete Wielders)
9. Movement of the Revolutionary Left (MIR)
10. Provisional Irish Republican Army (PIRA)
11. Red Army Faction (RAF)
12. Red Brigades (BR)
13. Revolutionary Cells (RZ)
14. Revolutionary Organization 17 November
15. Revolutionary Popular Struggle (ELA)

a. 1, 3, 7, 8, 10, 11, 12, 13, 15


b. 2, 4, 5, 6, 9, 10, 11, 12
c. 2, 8, 9, 10, 11, 12, 13, 14
d. 3, 5, 6, 10, 11, 12, 13, 14, 15

23. Select those terrorist groups organic to Asia from the list below.

1. Red Army Faction (RAF)


2. Green Peace
3. Japanese Red Army
4. Sihks
5. Dashmesh Regiment
6. 19th of April Movement (M-19)
7. Red Brigades (RB)
8. Chukaku-Ha
9. Tupac Amuru Revolutionary Movement (MRTA)
10. Shining Path (SL)
11. Movement of the Revolutionary Left (MIR)
12. Liberation Tigers of Tamil Eelam (LTTE)
13. Dal Khalsa
14. Sa'qai

a. 2, 3, 8, 13, 14, 15 c. 3, 5, 9, 13, 14


b. 1, 2, 4, 5, 6, 7, 8, 9, 12 d. 1, 3, 8, 9, 10, 15

R-6
24. Select those terrorist groups organic to the Middle East from the list below.

1. Abu Nidal Organization (ANO)


2. Liberation Tigers of Tamil Eelam (LTTE)
3. Sihks
4. Arab Organization of 15 May
5. Fatah
6. Democratic Front for the Liberation of Palestine (DFLP)
7. Dal Khalsa
8. Dashmesh Regiment
9. Hezballah (Islamic Jihad)
10. 19th of April Movement (M-19)
11. Tupac Amuru Revolutionary Faction (MRTA)
12. Lebanese Armed Revolutionary Faction (LARF)
13. Organization of the Armed Revolutionary Faction (OAAS)
14. National Liberation Army (ELN)
15. Palestine Liberation Front (PLF)
16. Popular Front for the Liberation of Palestine (PFLP)
17. Farabundo Marti National Liberation Front (FMLN)
18. Green Peace
19. Sa'iqa
20. Chukaku-Ha
21. New People's Army (NPA)

a. 1, 4, 5, 6, 9, 12, 15, 16, 19


b. 1, 7, 8, 10, 11, 13, 14, 15, 20
c. 3, 4, 6, 9, 11, 12, 15, 16, 17, 21
d. 3, 4, 7, 8, 9, 10, 17

R-7
25. Select those terrorist groups organic to the Americas from the list below.

1. Revolutionary Popular Struggle (ELA)


2. Revolutionary Organization 17 November
3. Alfaro Lives, Damn It! (AVC)
4. Green Peace
5. Bandera Roja (Red Flag-GBR)
6. Cinchoneros Popular Liberation Movement (MPL)
7. Revolutionary Cells (RZ)
8. Clara Elizabeth Ramirez Front (CERF)
9. Faraboundo Marti National Liberation Front (FMLN)
10. Popular Forces 25 April (FP-25)
11. New People's Army (NPA)
12. 19th of April Movement (M-19)
13. Guatemalan National Revolutionary Forces (URNG)
14. Lorenzo Zelaya Popular Revolutionary Unity (FRP-LZ)
15. Macheteros (Machete Wielders)
16. Manuel Rodriguez Patriotic Front (FPMR)
17. Movement of the Revolutionary Left (MIR)
18. National Liberation Army (ELN)
19. Popular Liberation Army (EPL)
20. Revolutionary Armed Forces of Columbia (FARC)
21. Ricardo Franco Front (RFF)
22. Shining Path (SL)
23. Tupac Amaru Revolutionary Movement (MRTA)

a. 1, 2, 4, 6, 7, 9, 10, 11, 13, 14, 16, 17, 19, 20, 21


b. 3, 4, 5, 6, 7, 8, 9, 11, 12, 13, 16, 17, 18, 20, 21, 22
c. 3, 5, 6, 8, 9, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23
d. 7, 10, 11, 12, 19, 22

26. What are the three principal sources used in determining whether a country or region is
subject to a travel advisory or travel restriction?

a. Travel Security Advisory, ALMAR, NAVTACSum, and correspondence with the


command to which you are being assigned
b. DoS Background Notes, CNN, and your fellow Marines
c. TC-19, FMFM 7-14, and FMFRP 7-14A
d. Newspapers, magazines, and other periodicals

R-8
27. When you receive word of being assigned to duty in a foreign country, there are certain
areas you should focus on to build personal knowledge of the country. What are they?

1. Flora and fauna 7. Country's location, size,


2. Local culture and population
3. Local food 8. Celebrities
4. Form of government 9. Principal trade allies
5. Principal cities 10. Principal political allies
6. Major and minor exports 11. Language of the country
12. Topographical/geographical features

a. 1, 2, 3, 4, 6 c. 2, 4, 5, 7, 11
b. 2, 3, 8, 9 d. 4, 6, 8, 11, 12

28. Select the four principal steps in evaluating the existing threat from the list below.

1. Identify the country's location, size, and population.


2. Identify the culture of the country.
3. Identify the existing terrorist and terrorism using groups operating in the country.
4. Determine the requirement for special liberty attire.
5. Determine the extent of popular support.
6. Determine the size of military forces in the country.
7. Determine if there is a specific nationality targeted.
8. Determine preferred method of terrorist operation.

a. 1, 3, 4, 7 c. 3, 6, 7, 8
b. 3, 5, 7, 8 d. 5, 6, 7, 8

29. Select the three steps in evaluating the extended terrorist threat.

1. Obtain a record of developing conditions.


2. Obtain a record of military action.
3. Obtain a record of the history of civil unrest.
4. Assign a classification to your findings.
5. Assign a threat level based on the nature of the extended threat.
6. Assign a threat condition based on the nature of the extended threat.

a. 1, 3, 6 c. 2, 4, 5
b. 1, 2, 5 d. 3, 4, 6

R-9
Matching: For items 30 through 34, match the threat condition in Column 1 to its
description in Column 2.

Column 1 Column 2

Threat Condition Threat Condition Discretion

____ 30. NORMAL a. Indicates that an incident has occurred,


____ 31. ALPHA or that intelligence has been received
____ 32. BRAVO indicating that some form of terrorist
____ 33. CHARLIE action is imminent.
____ 34. DELTA b. Indicates an increased and more predictable
threat of terrorist action.
c. Indicates that a terrorist attack has occurred
or that intelligence indicates that a terrorist
action against a specific location is likely.
Normally, this THREATCON is declared
as a localized warning.
d. Indicates a general threat of possible
terrorist activity against an installation or
personnel. The exact nature and extent are
unpredictable, and circumstances do not
justify full implementation of
THREATCON BRAVO. Implementation
of selected THREATCON BRAVO
measures as a result of intelligence or as a
deterrent may be necessary.
e. No known threat is indicated.

R-10
For items 35 through 38, use the numbered security measures listed below.

1. Be suspicious and inquisitive of strangers.


2. Secure buildings, rooms, and storage areas that are not in regular use.
3. Limit access to installations and residences.
4. Strictly enforce control of access to installations and residences.
5. Advise dependents of the general situation.
6. Frequently inspect buildings and rooms that are not in regular use.
7. Examine mail for letter or parcel bombs; advise dependents to examine home
deliveries.
8. Increase surveillance of schools, messes, clubs, and residences.
9. Keep vehicles locked; inspect interior and exterior of vehicles before entering or
driving.
10. Implement positive identification of all personnel.
11. Search all suitcases, briefcases, packages brought into an installation or your
residence.
12. Take only absolutely necessary journeys and make only essential visits.

35. Which security measures are enforced when an ALPHA THREATCON is set?

a. 1 through 3 c. 1 through 9
b. 1 through 5 d. 1 through 10 and 12

36. Which security measures are enforced when a BRAVO THREATCON is set?

a. 1 through 8 c. 1 through 10
b. 1 through 3 and 5 through 8 d. 1 through 3 and 5 through 9

37. Which security measures are enforced when a CHARLIE THREATCON is set?

a. 1 through 7 c. 1 through 3 and 5 through 9


b. 1 through 9 d. 1 through 12

38. Which security measures are enforced when a DELTA THREATCON is set?

a. 1 through 3 and 5 through 10 c. 1 through 11


b. 1 through 10 d. 1 through 12

R-11
39. What personal legal document(s) should you prepare when you learn that you are being
assigned to a threat region,

a. Power of attorney
b. Will
c. Will, power of attorney, and dependent certification
d. Will and power of attorney

40. What are the two types of power of attorney?

a. Liberal and conservative c. General and special


b. Single-party and multi-party d. Financial and estate

41. When preparing mentally for assignment to a threat region, what three sources of
information can you use?

a. Intelligence section, NCIS office, and the local library


b. Administration section, the S-2, and movies
c. NCIS, the S-2, and the Department of Justice
d. NCIS office, the S-2, and the State Department

42. What is the benefit of researching your newly-assigned country when preparing mentally
for assignment to a threat area? It

a. allows you more time to visit the interesting sights


b. makes you an authority on the country.
c. causes you to be apprehensive about being stationed in a foreign country.
d. causes you to develop confidence and familiarizes you with the country.

43. Part of preparing mentally is researching the culture of a country. According to what you
have learned, what should you focus on as a starting point?

a. Politics, society, and religion


b. Customs, history, and geography
c. History, society, and geography
d. Religion, economy, and agriculture

44. What should you focus on when researching a country's or region's history?

a. Ideologies, economy, and revolutions


b. Personalities, religion, and revolutions
c. Personalities, religion, political parties, wars, and revolutions
d. Class/caste system, economy, religion, political parties, and ideologies

R-12
45. What should you focus on when researching a country's or region's society?

a. Personalities, religion, political parties, wars, and revolutions


b. Ideologies, economy, and revolutions
c. Personalities, religion, political parties, and ideologies
d. Class/caste system, politics, religion, customs/traditions, economy, and ideologies

46. As you prepare for assignment into a threat region, you will at least check to see what
language is spoken. What is considered to be the "native" language?

a. The language of the common man


b. The language of the lower class/caste of the country and what is used in writing
c. The language used by diplomats of the country when dealing with Americans
d. The language of the formally educated and what is used in writing

47. What are the five areas associated with the country or region that dependents should
become knowledgeable of when they are accompanying you to a threat region?

a. Religion, society, culture, language, and living conditions


b. Geography, living conditions, economy, language, and religion
c. History, society, living conditions, geography, and language
d. Official language, native language, religion, society, and culture.

48. What are the two types of physical conditioning you should consider when preparing
yourself physically for assignment to a threat region?

a. Meditation and retrospection


b. Anaerobic and aerobic
c. Anaerobic and progressive resistance training
d. Running and swimming

49. What should you use as a general rule concerning your civilian attire when preparing
yourself for assignment to a region with a terrorist threat?

a. Comfortable and distinctively American


b. Bold and loud
c. Conservative, presenting a positive image and blending with the populace
d. Dress exactly as the region's populace does

R-13
50. Select the eight security considerations for selecting a residence.

a. Neighborhood check c. Neighborhood check


Crime level Pollution levels
Police security capabilities Parks
Utility services and protection Utility services
Fire protection Fire stations
Environmental considerations Shopping areas
Access routes Access routes
Parking Parking

b. Neighborhood check d. Neighbors


Lighting Crime level
Police security capabilities Police
Garbage collection Garbage collection
Fire protection Fire protection
Environmental considerations Environmental considerations
Access routes Access routes
Parking Parking

51. Which door is considered superior when upgrading the physical security of a residence?

a. Flush wood door c. Metal door


b. Panel wood door d. Sliding glass door

52. An effective way of ensuring the hinges cannot be removed from a door is to drill a small
hole through the hinge and into the pin and ___________________ a second pin or small
nail flush with the hinge surface.

a. add c. remove
b. insert d. refit

53. The simplest measures to prevent a sliding glass door from being lifted out of its channel is
to drill a hole through the _______________ and the _________________. Insert a pin
or nail to prevent the door from being opened.

a. interior pane, exterior pane c. track, wall


b. track , floor d. channel, frame

R-14
54. What are two major considerations when using lighting to improve security of a
residency?

a. Coverage and evenness and consistency with other residences


b. Coverage of entrances and cost of installation
c. Coverage and blending with landscape
d. Concentration of lighting and consistency with other residences

55. There are nine steps in maintaining a low profile. What are five of the steps?

a. Blend into surroundings, avoid showing off material wealth, use an unlisted phone
number, avoid publicity, and avoid establishing daily routines.

b. Blend into surroundings, drive a conspicuous vehicle, use an unmarked parking


space, establish routines, and avoid publicity

c. Blend into surroundings, use an unlisted phone number, avoid changing your style
of dress, avoid giving personal information to security personnel, and use a marked
parking space.

d. Blend into surroundings, place name on vehicles and residence, avoid showing off
material wealth, avoid establishing routines, and avoid publicity

56. What are five of the eight travel security precautions?

a. Avoid routines while traveling c. Avoid routines while traveling


Avoid groups Travel in groups
Avoid civil disturbances Establish traveling routines
Ensure all personal matters are Ensure all personal matters
in order are in order
Keep emergency numbers handy Keep emergency numbers handy

b. Have a working knowledge of d. Avoid routines while traveling


the language Be alert and aware
Avoid groups Keep emergency numbers handy
Do not inform relatives of your Have a working knowledge of the
location language
Ensure all of your family Travel in groups
matters are in order
Travel in groups

R-15
57. What are six of the twelve auto safety tips?

a. Keep vehicle in good mechanical condition, check car before getting in, stop for
accidents or other problems, always use your seatbelt, memorize the locations of
safehavens, drive with doors locked.

b. Leave only your ignition key with attendants, keep your vehicle in good
mechanical condition, drive with car doors locked and windows closed, avoid
driving closely behind other vehicles where you could be boxed in, use the center
lane to avoid being forced to the curb, memorize the location of safe houses.

c. Keep gas tank at least one-quarter full, check car over before getting in, never pick
up hitchhikers or strangers, leave all your car keys with the attendant, always use
your seatbelt, do not stop for accidents or other problems.

d. Always check over your vehicle before entering, drive with doors locked and
windows closed, stop for all accidents or problems, always use your seat belts, on
multi-lane highways drive in the right lane to avoid high speed carjackings, avoid
suspicious road blocks by driving in the opposite direction. Be prepared to escape
by going around the obstacle or by ramming it.

58. When traveling in a threat region, you should employ certain personal security measures.
From the list below, select those that are personal protection measures.

1. Avoid public transportation.


2. Drive with car doors locked and windows closed.
3. Never pick up hitch hikers or strangers.
4. Travel with unmarked luggage.
5. Stay in reputable hotels.
6. Avoid hotel paging.
7. Memorize the location of safe havens along your regular routes. Police and fire
stations, and any busy places are excellent havens.
8. If you must leave your keys with an attendant, leave only the ignition key.
9. Use hotel rooms on the second floor or higher.
10. Avoid elevators.
11. Make reservations in two or more hotels.
12. Know hotel escape routes.
13. Do not discuss travel plans.

a. 1, 2, 4, 6, 13 c. 3, 4, 9, 10, 11
b. 2, 3, 6, 10, 12 d. 4, 5, 10, 11, 13

R-16
Items 59 through 62 are about security procedures in the workplace. Select the category that
each group of procedures belongs in.

59. Keeping a fire extinguisher, first-aid kit, and oxygen bottle in the office are some of the
recommendations considered under

a. telephone and mail procedures. c. general working procedures.


b. visitor control procedures. d. special procedures for executive assistants.

60. A clean desk policy facilitates improved security since it makes it difficult to hide
intelligence collecting devices or improvised explosive devices in occupied offices at the
close of the working day. This is one of the recommendations considered under

a. telephone and mail procedures. c. general working procedures.


b. visitor control procedures. d. special procedures for executive assistants.

61. Not carrying items with markings that identify the owner by rank or title or even having
them in the office environment is a recommendation under

a. telephone and mail procedures. c. general working procedures.


b. visitor control procedures. d. special procedures for executive assistants.

62. Not accepting packages from strangers until you are satisfied with the individual's identity
and the nature of the parcel is one of the recommendations under

a. telephone and mail procedures. c. general working procedures.


b. visitor control procedures. d. special procedures for executive assistants.

63. Select the three types of peacetime detention.

1. Hostile government-sponsored 4. Prisoner of war


terrorist detention 5. Independent terrorist group detention
2. Hostile government detention 6. Joint U.S. and host nation international
3. U.S. detention detention

a. 1, 3, 5 c. 2, 4, 6
b. 1, 2, 5 d. 3, 4, 6

R-17
For items 64 through 67, select the type of detention that best corresponds to the statement.

64. A U.S. citizen is detained for having committed a criminal offense while stationed in a
hostile country.

a. Joint U.S. and host nation international detention


b. Hostile government sponsored-terrorist detention
c. Hostile government detention
d. Independent terrorist group detention

65. A Marine, while patrolling an urban area on a United Nations sponsored peace-keeping
mission, is taken by members of an independent terrorist group.

a. Joint U.S. and host nation international detention


b. Hostile government sponsored-terrorist detention
c. Prisoner of war
d. Independent terrorist group detention

66. While conducting humanitarian services in conjunction with a NATO operation in Bosnia,
a Marine is taken hostage by a state-sponsored terrorist group.

a. Joint U.S. and host nation international detention


b. Hostile government sponsored-terrorist detention
c. Hostile government detention
d. Independent terrorist group detention

67. While on mechanized patrol in Kuwait, your squad inadvertently crosses into Iraq. The
Iraqis detain you and the rest of the patrol for four days.

a. Joint U.S. and host nation international detention


b. Hostile government sponsored-terrorist detention
c. Hostile government detention
d. Independent terrorist group detention

R-18
68. What are the three responsibilities of a Marine regarding being a hostage/detainee and the
Code of Conduct?

a. Faith in the United Nations c. Faith in the United States


Faith in one's captors Faith in one's captors
Faith in one's self Faith in fellow detainees or hostages
b. Faith in the United States d. Faith in the United States
Faith in fellow detainees or Faith in one's captors
hostages Faith in one's self
Faith in one's self

69. What is the primary goal of a hostage with regards to the Code of Conduct?

a. Resisting exploitation
b. Keeping faith in the United States
c. Resisting interrogation
d. Keeping faith with one's fellow detainees/hostages

70. What are the three factors that will assist personnel in maintaining their bearing as
detainees or hostages?

a. Remain calm c. Remain passive


Cooperate with captors Be courteous
Project personal dignity Project a sense of arrogance

b. Remain aggressive d. Remain calm


Maintain a belligerent attitude Be courteous
Project a sense of arrogance Project personal dignity

Refer to the following list when answering item 71.

1. During a capture, be aggressive


2. During a capture, remain calm and courteous
3. Convey a personal dignity and apparent disregard for the captors
4. Convey a personal dignity and apparent sincerity to the captor
5. Accept release
6. Accept release unless doing so would compromise your honor or cause damage to
the U.S. government or its allies
7. Do not accept release without being liberated by hostage rescue units of the U.S or
the host nation

71. Select three pointers a Marine should employ as a terrorist hostage.

a. 1, 3, 7 c. 2, 3, 7
b. 2, 4, 6 d. 2, 4, 7

R-19
72. Select the statement that defines the United States' policy concerning terrorism.

a. All terrorist actions are religious in nature and will be handled by the respective
country in which the action occurs. All measures to prevent such acts and to judge
those who committed them will be taken. The U.S. will bargain or make any
concessions to terrorist blackmail. When Americans are abducted overseas, the
United States will continue to cultivate international cooperation to combat
terrorism.

b. All terrorists are criminally insane and intolerable. All lawful measures to prevent
terrorists from committing terrorist acts and to bring to justice those who assist
terrorists will be taken. The U.S. Federal Bureau of Investigation will not bargain
with or make any concessions to terrorist blackmail. To do so would invite further
demands. When American servicemen are abducted overseas, the United States
will continue to cultivate international cooperation to combat terrorism and secure a
safe release of hostages.

c. All terrorist actions, whatever their motivation, are acts of insanity and intolerable
and should be condemned. All measures to prevent such acts and bring to justice
those who commit them will be taken. The U.S. will not bargain or make any
concession to terrorist blackmail. To do so would invite further demands. When
Americans are abducted overseas, the United States will continue to cultivate
international cooperation to combat terrorism and secure the safe release of the
hostages.

d. All terrorist actions, whatever their motivation, are criminal and intolerable and
should be condemned. All lawful measures to prevent such acts and bring to justice
those who commit them will be taken. The U.S. will not bargain or make any
concession to terrorist blackmail. To do so would invite further demands. When
Americans are abducted overseas, the United States will continue to cultivate
international cooperation to combat terrorism and secure a safe release of the
hostages.

R-20
73. Select the statement that best defines the concept of the Trilevel Antiterrorism Program.
It is used to capitalize on the in-place organizational structure of existing agencies

a. within the Marine Corps and to use the assigned responsibilities and capabilities of
these agencies within a clearly defined command and control structure to combat
terrorism.

b. and to use Department of Defense Antiterrorism forces within a clearly defined


command and control structure to combat terrorism.

c. and to use the assigned responsibilities and capabilities of these agencies within a
clearly defined command and control structure to combat terrorism.

d. within the Federal Bureau of Investigation and to utilized the assigned


responsibilities and capabilities of these agencies within a clearly defined command
and control structure to combat terrorism.

74. The four basic components of the Ttrilevel Antiterrorism Program at the operational level
are:

a. Defensive, protection, action, and intelligence


b. U. S. Marine Corps, U. S. Navy, U. S. Army, and U. S. Air Force
c. Deterrence, prevention, reaction, and prediction
d. Federal Bureau of Investigation, U. S. State Department, Naval Criminal
Investigative Service, U. S. Navy Terrorism Alert Center

75. Select the statement that best defines the function of the Crisis Management Team.

a. The CMT is a staff team specializing in the determination of crises.


b. The CMT is a staff team specializing in world conflicts. The team advises the
commander and the EOC on all aspects of the conflict.
c. The CMT is a staff team specializing in counterintelligence situations. The team
advises the EOC on all aspects of counterintelligence.
d. The CMT is a staff team specializing in counterterrorism situations. The team
advises the commander and the EOC on all aspects of the incident.

R-21
76. The Crisis Management Team consists of

a. S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local NCIS office.
b. the staff sections of the S-1/G-1, S-3/G-3; the special reaction teams, the hostage
negotiation teams, and the inner- and outer-perimeter elements.
c. the threat management force, the SRTs, the negotiation teams, and the inner- and
outer-perimeter teams.
d. higher headquarters, the State Department or host nation representative, and the
FBI.

77. The function of the Threat Management Force is to provide

a. the means necessary to communicate with the FBI or host-nation counterterrorism


forces.
b. a staff team specializing in counterterrorism situations. The team advises the
commander on all aspects of the incident.
c. logistical support for the CMT.
d. tactical support to the CMT and on-site security after a terrorist incident has
occurred.

78. The TMF is comprised of

a. an Explosive Ordnance Disposal squad and a representative on the Naval Criminal


Investigative Service.
b. a representative from the S/G-1, S/G-2, S/G-3, and S/G-4; a representative from
the Explosive Ordnance Disposal Squad, and a representative of the local NCIS
office.
c. higher headquarters, the State Department or host nation representative, and a
representative of the Federal Bureau of investigation.
d. a special reaction team(s), a hostage negotiation team, and inner and
outer-perimeter elements.

79. The function of the Special Reaction Team is to

a. advise the EOC on all aspects of the operation.


b. advise the commander and the EOC on all aspects of the incident.
c. neutralize or apprehend a barricaded offender with a minimum of danger to
hostages, team members, or others.
d. neutralize offenders without prejudice.

R-22
80. The Special Reaction Team is comprised of

a. a team leader, a scout, a marksman, an observer, and a defense man.


b. a team leader, a scout, a marksman, an observer, a defense man, and a negotiator.
c.. a team leader and two marksmen.
d. a scout, a marksman, and a defense man.

81. The function of the negotiation team is to

a. interact with the terrorists on order from the TMF commander. The team must be
able to establish rapport with the terrorists.
b. physically control the area immediately around the scene. This team has the closest
tactical contact with the terrorists.
c. advise the EOC on all aspects of counterintelligence.
d. interact with the SRT by providing reconnaissance assets.

82. The negotiation team is comprised of

a. a team leader, a scout, a marksman, an observer, and a defense man.


b. the S/G-1, S/G-2, S/G-3, S/G-4; special staff sections; EOD; and the local NCIS
office.
c. an officer-in-charge, a primary hostage negotiator, a backup hostage negotiator,
Criminal Investigative Division or Military Police investigator, and a linguist.
d. an officer-in-charge, an observer, and a primary hostage negotiator.

83. The inner-perimeter element is responsible for

a. physically controlling the area immediately around the scene. It has the closest
tactical contact with the terrorists. This element contains the situation and relays
intelligence on activity at the scene to the TMF commander.
b. interacting with the terrorists on order from the TMF commander. Members of the
element must be able to establish rapport with the terrorists.
c. advising the EOC on all aspects of the operation.
d. neutralizing offenders without prejudice.

84. The inner-perimeter team is comprised of

a. an officer-in-charge, non-commissioned officer-in-charge (NCOIC), a special


reaction team, explosive ordnance disposal support, and photographic capability.
b. an officer-in-charge, a primary hostage negotiator, a backup hostage negotiator, a
Criminal Investigative Division or Military Police investigator, and a linguist.
c. the S/G-1, S/G-2, S/G-3, and S/G-4; special staff sections, EOD, and the local
NCIS office.
d. an officer-in-charge, an observer, and a primary hostage negotiator.

R-23
85. The mission of the outer-perimeter element is

a. to neutralize or apprehend a barricaded offender with a minimum of danger to


hostages, team members, or others.
b. to provide outside-perimeter security, evacuation, access control, guards, and
augmentation.
c. to interact with the terrorists on order from the TMF commander. Members of this
element must be able to establish rapport with the terrorists.
d. to physically control the area immediately around the scene. This element has the
closest tactical contact with the terrorists.

86. The outer-perimeter element is comprised of an officer, a NCOIC and a mixture of


military police and troops. The ratio of Marines to military police should be no greater
than

a. 4 or 5 to 1 c. 2 or 3 to 1
b. 3 or 4 to 1 d. 1 or 2 to 1

For items 87 through 89 select the event that occurs during the indicated response phase of a
terrorist attack/incident.

87. Phase I

a. FBI crisis management teams, or host-nation tactical units are committed.


b. Local available forces are committed.
c. Department of Defense or host nation counterterrorism forces are committed.
d. Steps are taken to terminate the incident.

88. Phase II

a. Local available forces are committed.


b. Steps are taken to terminate the incident.
c. Department of Defense or host nation counterterrorism forces are committed.
d. FBI crisis management teams or host-nation tactical units are committed.

89. Phase III

a. Department of Defense or host nation counterterrorism forces are committed.


b. FBI crisis management teams or host-nation tactical units are committed.
c. FBI or the host nation may assume control over the incident.
d. Local available forces are committed.

LAST PAGE OF THE REVIEW LESSON

R-24
Review Lesson Solutions

Reference

1. d. 1101
2. b. 1101
3. a. 1101
4. b. 1102
5. d 1201
6. b. 1202
7. d. 1203
8. a. 2101
9 d. 2102
10. c. 2103
11. a. 2104
12. a. 2104
13. d. 2105
14. d. 2201
15. a. 2201
16. d. 2201
17. b. 2201
18. c. 2201
19. a. 2201
20. d. 2201
21. d. 2201
22. d. 3101-3109
23. c. 3201-3205
24. a. 3301-3310
25. c. 3401-3417
26. a. 4101
27. c. 4201
28. b. 4202
29. a. 4203
30. e. 4301
31. d. 4301
32. b. 4301
33. a. 4301
34. c. 4301
35. a. 4302
36. b. 4302
37. c. 4302
38. d. 4302
39. d. 5101-5102

R-25
Review Lesson Solutions, continued

Reference

40. c. 5102
41. a. 5201
42. d. 5202
43. c. 5202
44. c. 5202
45. d. 5202
46. a. 5203
47. c. 5204
48. b. 5301
49. c. 5302
50. a. 6101
51. c. 6102
52. b. 6102
53. d. 6102
54. a. 6102
55. a. 6201
56. d. 6202
57. b. 6203
58. d. 6204
59. d. 6205
60. c. 6205
61. c. 6205
62. d. 6205
63. b. 7101-7103
64. c. 7101
65. d. 7103
66. b. 7102
67. c. 7101
68. b. 7201
69. a. 7202
70. d. 7203
71. b. 7204
72. d. 8101
73. c. 8102
74. c. 8103
75. d. 8201
76. a. 8201
77. d. 8202
78. d. 8202

R-26
Review Lesson Solutions, continued

Reference

79. c. 8203
80. a. 8203
81. a. 8204
82. c. 8204
83. a. 8205
84. a. 8205
85. b. 8206
86. a. 8206
87. b. 8207
88. d. 8207
89. a 8207

R-27
BIBLIOGRAPHY

SOURCE MATERIALS

DoD 2000.12H Protection of Personnel Against Terrorist Acts


DOS-2630-48-82 Handbook on Terrorism, Security, and Survival
FM 100-37 Terrorism Counteraction
FMFM 7-14 Combatting Terrorism
FMFRP 7-14A The Individual's Guide for Understanding and Surviving Terrorism
TC 19-16 Countering Terrorism on U.S. Army Installations

MCI-RELATED COURSES

02.01 Intelligence Brief: Southwest Asia


02.8b Introduction to Combat Intelligence
MARINE CORPS INSTITUTE
COURSE EVALUATION QUESTIONNAIRE

MCI 02.10b TERRORISM AWARENESS FOR MARINES

Directions:

This questionnaire is extremely important to the Marine Corps Institute. The course you have just
completed has undergone extensive development and revision. As an integral part of the
continued success of this course, YOUR HELP IS NEEDED. By completing this questionnaire,
your responses may result in a need to review the course.

Please take five minutes, complete the questionnaire and return it to MCI in the self-addressed
envelop provided with your course materials. Additional comment sheets may be attached to this
questionnaire. If you want to be contacted by the course instructor, please provide your name,
rank, and phone number. Regardless of whether you want to be contacted or not, please enter
your primary military occupational speciality (MOS).

Information About YOU:

Name (Optional) Rank MOS

Telephone Number (Optional)

DSN Commercial (Area Code)

Information About the COURSE:

1. How long did it take you to complete this course including the review lesson examination?
___ Less than three hours If more than fifteen hours
___ Three to six hours enter number of hours
___ Seven to ten hours here: ______
___ Eleven to fourteen hours

2. Were the learning objectives stated at the beginning of each lesson clear?
(Circle your response)

a. Yes b. No

If you circled "NO" please list below the study unit and lesson number
for those unclear objectives.
MARINE CORPS INSTITUTE
COURSE EVALUATION QUESTIONNAIRE

Information About the COURSE (continued):

3. Did the figures, that is illustrations, photographs, tables, charts, etc., clearly support
the information/text within the lesson? (Circle your response)

a. Yes b. No

If you circled "NO" please list the figure or table number(s) below.
______ ______ ______ ______ ______ ______ ______ ______

4. Did the exercise at the end of a lesson or study unit test your skills and knowledge
gained by studying the lesson? (Circle your response)

a. Yes b. No

If "NO" please list the exercise question/item number, the lesson number,
and the study unit number below. (Attach additional sheet, if necessary)

Question Number Lesson Number Study Unit Number


______ ______ ______

5. When you read the lesson the first time, did it make sense to you? (Circle your
response)

a. Yes b. No

If "NO" please list the lesson number and/or paragraph number below.
______ ______ ______ ______ ______ ______ ______ ______

6. Would you recommend that a revision be made to any portion of this course? (Circle
your response)

a. Yes b. No

If "YES", is your recommendation based on (check all that apply):

___ Outdated procedures or process. Enter Study Unit Nos. ____


___ Outdated equipment or material. Enter Study Unit Nos. ____
___ Information not accurate. Enter Study Unit Nos. ____
___ Other (Please describe)

7. Comments: Please attach separate sheet.


MARINE CORPS INSTITUTE
COURSE CONTENT ASSISTANCE REQUEST
MCI 02.10b TERRORISM AWARENESS FOR MARINES

Use this form for questions you have about this course. Write out your question(s) and refer to
the study unit, lesson exercise item, or the review lesson exam item you are having a problem
with. Before mailing, fold the form and staple it so that MCI's address is showing. Additional
sheets may be attached to this side of the form. Your question(s) will be answered promptly by
the Distance Training Instructor responsible for this course.

NAME RANK MOS

COMPLETE MILITARY ADDRESS (INCLUDING RUC IF KNOWN)

TELEPHONE NUMBER

DSN COMMERCIAL (Area Code)

YOUR QUESTION:

INSTRUCTOR'S RESPONSE:
MARINE CORPS INSTITUTE--STUDENT REQUEST/INQUIRY-MCI - R-11 (3/96)

MCI 02.10b
TERRORISM AWARENESS FOR MARINES DATE:
_______________

SECTION 1. STUDENT IDENTIFICATION

INSTRUCTIONS: Print or type clearly:


(Section 1. Information is needed by MCI to act/respond to input provided in Section 2.)

SECTION 2. STUDENT REQUEST/INQUIRY

RANK FIRST NAME MI. LAST NAME MOS RUC SOCIAL SECURITY NO.

MILITARY ADDRESS (INCLUDE ZIP CODE) (Reservists may use civilian address)

FROM: TO:
CHANGE NAME: NAME:
RANK: RANK:
SSN: SSN:
RUC: RUC:

The following materials are needed:


Final Exam Overdue:
Lessons: Lesson sent to MCI on ___________
Manual:
Answer Sheets: Missing Diploma or Completion Certificate:
The course or program was completed
Others: (day) ________ (month) ________ (year) ________

Exam sent to MCI on ____________

Request Extension _____ Request Reenrollment _____

(Students are only eligible for one extension prior to (Students are only eligible for reenrollment once and
their Course Completion Date (CDD)) only after their CDD. If already reenrolled and
disenrolled, a new enrollment must be requested)

Request New Enrollment ______ OTHER Requested Action:

INSTRUCTIONS: Complete only those sections requiring an action/response from MCI.

AUTHORITY: Title 5, USC, Sec. 301. Use of your Social Security Number is authorized by Executive Order 9397 of 22 Nov 43.
PRINCIPAL PURPOSE: The Student Request/Inquiry is used to transmit information concerning student participation in MCI courses.
ROUTINE USES: This information is used by MCI personnel to research student inquiries. In some cases information contained therein is used to
update individual student records maintained by the Marine Corps Institute.
MANDATORY OR VOLUNTARY DISCLOSURE AND EFFECT ON INDIVIDUAL NOT PROVIDING INFORMATION: Disclosure is
voluntary. Failure to provide information may result in the provision of incomplete service to your inquiry. Failure to provide your Social Security
Number will delay the processing of your request/inquiry .

Vous aimerez peut-être aussi