Professional Documents
Culture Documents
10b
TERRORISM AWARENESS
FOR MARINES
MARINE BARRACKS
WASHINGTON, D.C.
UNITED STATES MARINE CORPS
MARINE CORPS INSTITUTE
912 POOR STREET SE
WASHINGTON, DC 20391-5680
IN REPLY REFER TO:
02.10b
13 Aug 96
1. Purpose. MCI course 02.10b, Terrorism Awareness for Marines, has been published as part
of the Marine Corps program to combat terrorism.
2. Scope. MCI 02.10b addresses the basics of terrorism. This course provides procedures for
minimizing an individual's susceptibility to terrorist attack at work, at home, while traveling, and
on liberty. Also presented are effective measures Marines can use if taken hostage by a terrorist
group. These measures are in keeping with DOD amplifying instructions regarding the Code of
Conduct, but this course is not intended as a tactical unit guide for combating terrorism within a
low intensity conflict arena.
3. Applicability. This course is for instructional purposes only. It is applicable to all Marines,
regardless of grade or rank.
Director (CDD# 1)
Marine Corps Institute
Arlington, VA 22222-0001
R. A. CHRISTIE
Lieutenant Colonel, U.S. Marine Corps
Deputy Director
TERRORISM AWARENESS FOR MARINES
CONTENTS
Page
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i
Student Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
i
CONTENTS--cont'd
Page
ii
CONTENTS--cont'd
Page
Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
iii
STUDENT INFORMATION
TITLE &
NUMBER: TERRORISM AWARENESS FOR MARINES MCI 02.10b
STUDY
HOURS: 8
COURSE
MATERIALS: Text
REVIEW
AGENCY: Naval and Marine Corps Intelligence Training Center
Dam Neck, Virginia Beach, VA 22461-5575
ASSISTANCE: For administrative assistance, have your training officer or NCO use the Unit
Activity Report (UAR) or MCI Hotline: DSN 288-4175 or commercial (202)
433-4175.
For assistance concerning course content matters, have your training officer or
NCO call the instructor at DSN 288-3604 or commercial (202) 433-3604.
v
STUDY GUIDE
BEGINNING Before you actually begin this course of study, read the Student
YOUR Information page. If you find any course materials missing, notify
COURSE your training officer or training NCO. If you have all the required
materials, you are ready to begin.
LEAFING Leaf through the text and look at the figures and tables. Read a
THROUGH few lesson exercise items (questions) to get an idea of the type of
THE TEXT items in the course. If the course has additional study aids, such as
a handbook or a plotting board, familiarize yourself with them.
TURNING TO Turn to the first page of Study Unit 1. On this page you will find
THE FIRST an introduction to the study unit and generally the first study unit
STUDY UNIT lesson. Study unit lessons contain learning objectives, lesson text,
and exercises.
READING THE Learning objectives describe in concise terms what the successful
LEARNING learner, you, will be able to do as a result of the lesson text. Read
OBJECTIVES the objectives for each lesson and then read the lesson text. As
you read the lesson text, make notes on the points you feel are
important.
CONTINUING Continue on to the next lesson, repeating the above process until
TO MARCH you have completed all lessons in the study unit. Follow the same
procedure for each study unit in the course.
viii
STUDY GUIDE, continued
SEEKING If you have problems with text or exercise items that you cannot
ASSISTANCE resolve, ask your training officer or training NCO for assistance.
If they cannot help you, request assistance from your MCI distance
training instructor by completing the Content Assistance Request
Form (CCAR) located at the back of the course.
THE When you finish all the study units, complete the review lesson
REVIEW exam located at the end of the course text. Try to complete the
LESSON review lesson exam without referring to the text. For those items
EXAM you are unsure of, restudy the text. When you finish the review
lesson exam and are satisfied with your responses, check your
responses against the answer key provided with your course
materials.
PREPARING To prepare for your final exam, you must review what you learned
FOR THE in the course. The following suggestions will help make the review
FINAL EXAM interesting and challenging.
ix
STUDY GUIDE, continued
TACKLING THE When you complete your study of the course material and are
FINAL EXAM confident with the results attained on your review lesson(s), take
the sealed envelope marked "FINAL EXAM" to your unit training
NCO or training officer. Your training NCO or officer will
administer the final exam and return the exam and answer sheet to
MCI for grading. Before taking your final exam, read the
directions on the NEW (generic DP-37) answer sheet carefully and
complete all requested information.
COMPLETING The sooner you complete your course, the sooner you can better
YOUR yourself by applying what you’ve learned! HOWEVER--you do
COURSE have 12 months from the date of enrollment to complete this
course. You may be granted one 6-month extension if it’s
approved by your commanding officer. If you need an extension,
please complete the Student Request/Inquiry Form (MCI-R11)
located at the back of the course, and deliver it to your training
officer or training NCO.
Semper Fi!
x
STUDY UNIT 1
Introduction. Terrorism is not new. In 50 B.C., Julius Caesar encouraged taking hostages
to ensure the obedience of conquered tribes. Terrorism came into widespread use during
the French Revolution. During the Reign of Terror, over 300,000 people were arbitrarily
arrested and 17,000 were executed without a trial. Terrorism is a fact of contemporary life.
Even though the occurrence may be sporadic, terrorism remains a serious and deadly
problem. As a Marine, you can reasonably expect to come into contact with terrorism or
the residual affects of a terrorist action. As the Marine Corps continues to operate in
diverse environments, the possibility of the individual Marine coming into contact with
terrorism and its influences become excellent. In this study unit, you will learn the definition
of terrorism as stated in FMFM 7-14, Combating Terrorism. You will also learn the
intermediate and long-term objectives of terrorism. Keep in mind we will take a
step-by-step approach in developing your knowledge of terrorism awareness. Let's begin!
LEARNING OBJECTIVES
In this lesson, you will learn the meaning of terms that will establish the foundation you need to
help you in counteracting terrorism. As a Marine, you in many cases are more likely to witness or
experience terrorist acts. The following definitions will enable you to clearly understand the terms
associated with terrorist acts.
1-1
Try this challenge.
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
If your answer is the "calculated (unlawful) use of violence or threat of violence to inculcate fear;
intended to coerce or to intimidate governments or societies in the pursuit of goals that are
generally political, religious, or ideological" that is right. Congratulations! If your answer is
different, go back and study paragraph 1101.
b. Terrorist. A terrorist is one who advocates, creates, or practices the use of terror for a
means of coercion. When you hear the word terrorist, your concept of the word may vary. This
is not unnatural. The characteristics and traits of each terrorist may vary. There are terrorists
who are much closer than you may realize. What about those individuals who are here in the
United States? For example, the animal rights activists who intentionally throw blood on fur
coats while the owners are still wearing them or the "ecologically-minded" individual who drives
metal spikes into trees which are scheduled for harvest in an attempt to destroy the chainsaw
blades of the loggers. Are these individuals terrorists by the definition? It has been written that
one man's terrorist is another man's martyr. It all depends on the individual's or group's position
toward the government. The radical peace group illustrated in figure 1-1 may be viewed by one
group of people as terrorist while another group views them as concerned citizens.
1-2
Now, define terrorist in this challenge to make sure that you know the meaning.
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________
If your answer is "a terrorist is one who advocates, creates, or practices the use of terror for a
means of coercion" you are correct; you may continue. If your answer is different, review
paragraph 1101 before continuing.
If your answer matches the one below, you are correct. You may continue. If not, review
paragraph 1101d before continuing.
1-3
"A terrorist group is an organization of like-minded individuals who use terror as a means of
influencing or intimidating others, governments, and societies with the intent of bringing about the
group's desired outcome."
(1) National terrorist. A national terrorist group is one that operates in and aspires to
political power within a single nation. An example of this type is the Red Brigade.
The Red Brigade is associated with Italy because that is where it operates most of the
time. This group received a lot of attention when it kidnapped Premier Aldo Moro
and Brigadier General Dozier. The Dozier incident was categorized as the beginning
of the fifth phase of Red Brigade operations, the move to target other than Italian
personnel or property. In December 1981, the Red Brigade themselves termed this
phase as the beginning of the struggle against the "imperialist war."
(4) Government Affiliation. A terrorist group's selection of targets and tactics is also a
function of the group's governmental affiliation. In addition to being categorized by
its operational characteristics (national, transnational, and international), a terrorist
group is also categorized by government affiliation. This helps security planners
anticipate terrorist targets and the sophistication of a terrorist group's intelligence and
weaponry. Three general categories of government affiliation are as follows:
1-4
(a) Nonstate supported. A nonstate supported terrorist group operates
autonomously, receiving no significant support from any government.
Not all terrorist acts are committed by hard-core political terrorists; many are committed by
criminals seeking personal rather than political gain. Some individuals commit terrorist acts
because they are mentally ill. Persons or individuals who are responsible for terrorist acts
generally fall into one of three categories as defined by Frederick J. Hacker in his book titled
Crusaders, Criminals, and Crazies. To understand the categories, we should begin by defining
each of them.
1-5
Terrorists of the crusader mentality are the type to carry out the following operations:
(1) Bombing. The tactic used most commonly by terrorists is bombing. The bomb is a
popular weapon because it is inexpensive and easy to produce, adaptable to a variety
of uses, and difficult to detect or trace after the incident. There are three factors to
consider when discussing bombing: delivery, activation, and usage.
(c) Armed attacks. Military-type assaults against a specific target are carried out
by terrorist groups to promote fear or obtain equipment such as weapons.
(e) Skyjacking. Skyjacking provides terrorists with hostages and draws media
attention. Aircraft theft provides terrorists with a tool for a possible kamikaze
attack.
(f) Violent demonstrations. Protests that turn violent promote fear in the civilian
population and cause the government to react.
b. Criminals. Criminals are used to garnish terrorist operational funds. While not considered a
terrorist act, criminal "fund raising" is essential for financing terrorist activity. Criminals use some
of the following methods to achieve their goals:
(1) Deception. Criminals use a variety of deceptive measures to obtain money from
innocent citizens. Selling stolen goods as new or using counterfeit credit cards are
examples of criminal deception.
(2) Diversion. Criminal groups sometimes create a disturbance in one area enabling them
to carry out illegal activities in another.
(3) Theft. Some criminal groups obtain their finances from outright stealing.
(d) Fraud. Cheating people out of their property is a common criminal tactic.
1-6
(e) Extortion. Selling property insurance is an often used criminal tactic. A group might
demand that a business buy insurance against property destruction. If the business
owner refuses, the criminals damage the property.
(f) Hijacking. The hijacking of vehicles for the purpose of selling or trading is a favorite
tactic of criminal groups.
(g) Corruption. Paying politicians to look the other way is a long standing criminal way
of doing business.
(h) Burglary. Breaking into buildings to steal provides a source of income while at the
same time creates fear in the neighborhood.
(i) Assault. Physical attacks against a single person or group of people is a means to
obtain money or property.
(j) Forgery. Criminal groups sometimes produce fake art or official documents to sell or
use in illegal activities.
(k) Drug sales. Selling drugs has always been a profitable business.
(l) Bombing.
c. Crazies. Crazies may be the most difficult of all terrorists to deal with. Many are impulsive
and unpredictable. Others are compulsive and plan their actions in great detail. Some crazies are
delusional, believing they are agents of God, or even God himself. The characteristics of these
individuals are of a wide range. However, many of them are persuasive and strong minded.
Crazies include the following personality types:
(1) Disoriented persons. People with mental disorders usually operate with little or no
normal organization except for those involved in a cult. Dedication, discipline, and
willingness to kill and die for the cause range from very high to low for the
disoriented person. The Unibomber is a good example of a disoriented person type
terrorist in the 1980s and 1990s. Disoriented persons may use some of the following
methods to carry out their plans:
(a) Bombing.
(b) Arson. Incendiary devices are cheap and easy to hide. Terrorists use arson to
draw a crowd, which in turn provides them with the opportunity to use
explosives or other weapons.
(c) Skyjacking.
1-7
(d) Hostage-taking. Hostage-taking is overt and designed to attract and hold
media attention. The terrorists' intended target is the audience affected by the
hostage's confinement, not the hostage.
(e) Multiple homicides. The random killing of strangers has become more
common in recent times. Recently, lone gunmen have entered fast food
restaurants and started shooting, killing several people.
(f) Sabotage.
(g) Fraud.
(2) Disgruntled employees. Disgruntled employees usually operate alone except for
organized labor strikes. They are usually motivated by an employment-related
problem such as being passed over for promotion. Although disgruntled employees
normally have little desire to kill, some do.
(a) Bombing.
(b) Sabotage.
(c) Theft.
(d) Intrusion. When unstable persons are fired, they sometimes enter a former
place of employment to cause damage.
(e) Property destruction. An unstable person wanting to get back at his former
boss may attempt to destroy his former boss's home or business.
(f) Vandalism. There have been cases of computer programmers inserting viruses
into computer systems after being laid off or fired.
a. ______________________ c. _____________________
b. ______________________
Your answers (in any order) should be crusaders, criminals, and crazies. If you answered
correctly, you may continue. If not, review paragraph 1102 before continuing.
1-8
All of the operations listed in this lesson have been used in the past and will be used by terrorists
in the future. Terrorist attacks may be a single operation or a combination, such as a bombing in
conjunction with an armed attack leading to the kidnapping of a government official.
You now have a basic understanding of the actions used by terrorists. You also know that
terrorists can be cataloged as being crusaders, criminals, or crazies. You have learned that each
category can be further broken down to better classify terrorists. For the remainder of this lesson,
you will obtain the knowledge necessary to build a strong background in terrorist operations.
Lesson Summary. During this lesson, you learned the definitions of terrorism, terrorist, and
terrorist group. You also learned to identify the three terrorist categories and to recognize the
characteristics of each. The next lesson addresses the basic motivations for terrorism, and the
intermediate and long term objectives of terrorism.
-----------------------------------------------------------------
Lesson Exercise: Complete items 1 through 4 by performing the action required. Check your
responses against those listed at the end of this lesson.
1. Define terrorism.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
1-9
4. State (in any order) the three psychological categories of terrorists.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
Reference
1-10
Lesson 2. THE MOTIVES AND OBJECTIVES OF TERRORISM
LEARNING OBJECTIVES
You, as a Marine, should ask yourself, "What motivates a terrorist?" Think about this question
for a moment. If your thoughts include any of the following reasons, you are on track. Terrorists
are motivated by political ideology, nationalism, religion, and special interests. Each form of
motivation is discussed in the paragraphs that follow.
a. Political ideologies. Political ideologies range from the far left to the far right. Politics of
the extreme left come in many forms. Marxists/Leninists believe in a revolution of urban
workers led by a group of revolutionary elite who will establish a communist state. Under the
Marxist/Leninist state there is no private ownership of property nor does it allow workers control
of production. Maoists also want a communist state, but they hope to achieve it by mobilizing the
peasants. On the right, fascists stress the importance of the state above the rights of the people.
A dictatorship of the far right is typically sustained by merging state and business leadership.
Belligerent nationalism also plays an important role in fascism and foreigners and minorities are
scorned.
Example: The Basque people of Spain and France share a common ethnic background.
They are motivated by a nationalistic urge to establish a homeland in the
Pyrenees mountains.
c. Religion. Religion has driven many of the violent acts in recorded history. Religion
motivated the Moslem Brotherhood, a fundamentalist Sunni group that murdered Anwar Sadat;
the Hezbollah or Party of God, a radical Shiite group that followed the Ayatollah Khomeini; and
the Ulster Defense League, a Protestant group based in Northern Ireland.
d. Special interests. There are many known special interest groups. In this country alone, the
number is increasing daily. Although many of the groups may have some valid arguments, their
approaches to expressing their concerns are not. As a result, such groups are labeled as terrorist
groups. Therefore, it is safe to say that special interest groups with legitimate causes may include
radical fringes.
1-11
People use terrorism to advance anti-abortion views, animal rights, and radical environmentalist
issues.
a. ___________________________ c. ____________________________
b. ___________________________ d. ____________________________
If your answers includes (in any order) political ideology, nationalism, religion, and special
interest, you are correct. Continue. If your answers are incorrect, review paragraphs 1201 before
continuing.
Rarely does one act of terrorism achieve a group's long-term goals. Each act usually achieves a
specific goal. This goal may satisfy an immediate concern or may be a step in achieving a
long-range goal. It is your responsibility as a Marine to discern such activity. The following are
all intermediate objectives of terrorism; study them and remember their purposes.
a. Recognition. Terrorists seek to obtain worldwide, national, or local recognition for their
cause. This vital publicity advertises the movement, bringing national and international attention
to their grievances. It attracts money, international sponsorship, and recruits to their cause.
b. Overreaction by the government. This occurs when the government overreacts by making
special antiterrorist laws that allow searching without warrants, holding people in custody without
charges, or modifying the rules of evidence. People view these acts as violations of their rights,
creating an atmosphere more sympathetic to the terrorist.
d. Theft or extortion of money or equipment. To support their causes, terrorists resort to theft
or extortion of money and equipment, especially weapons and ammunition, vital to their cause.
Major acts or a successful terrorist campaign can also attract foreign support.
e. Destruction. Often the public views the destruction of a building or disruption of lines of
communication as the final goal of terrorism. Just the opposite is true. By destroying facilities or
disrupting lines of communication the terrorist draws more attention to the cause.
1-12
f. Discourage foreign investment or assistance programs. If achieved, the target country's
economy can be affected. Unemployment rises; revenues fall. This results in a loss or prestige
and solvency leading to internal dissent.
g. Influence government decisions, legislation, or other decisions. The best example of this
objective is the bombing of the Marine Battalion Landing Team Headquarters in Beirut,
Lebanon. This October 1983 bombing forced the withdrawal of the Marines from Lebanon.
Another example is the Red Brigade's attempts to influence law enforcement and judicial process
in Italy. The Red Brigade killed public officials and judges known to be hard on terrorists. The
sole purpose of this intermediate objective is to influence government decisions, legislation, or
other decisions to support the cause of the terrorist.
i. Satisfy vengeance. The most brutal acts of terrorism are reserved for informants or other
traitors. The Irish Republican Army is very brutal when punishing its members. Vengeance may
also be of an international nature; such as the revenge sought by the Armenians against the Turks
for slaughtering Armenians during World War I. See figures 1-3 and 1-4.
Fig 1-3. Upper torso mutilation. Fig 1-4. Lower torso mutilation.
j. Turn the tide in a guerrilla warfare. Terrorism is an integral part of insurgency. In rural
areas, it is usually used to punish government supporters. In urban areas, it can also divert
government troops from the countryside where they are needed to fight guerrillas.
1-13
Try the next challenge.
a. ________________________________________________________________
b. ________________________________________________________________
c. ________________________________________________________________
d. ________________________________________________________________
e. ________________________________________________________________
f. ________________________________________________________________
g. ________________________________________________________________
h. ________________________________________________________________
i. ________________________________________________________________
j. ________________________________________________________________
If your list contains all of the intermediate objectives listed below, you are correct. Continue. If
not, review paragraph 1202 before continuing.
a. Recognition
b. Overreaction by the government
c. Harassment, weakening, or embarrassment of government security forces
d. Destruction
e. Theft or extortion of money or equipment
f. Discourage foreign investment or assistance programs
g. Influence government decisions, legislation, or other decisions
h. Free prisoners
i. Satisfy vengeance
j. Turn the tide in a guerrilla war
1-14
1203. Identify the Long-Term Objectives of Terrorism
All Marines are expected to be well versed in knowing exactly what the terrorist is working to
achieve. Therefore, you must be able to recognize the long-term objectives of terrorism.
Long-term objectives fit into at least one of the following categories: revolutionary,
sub-revolutionary, and establishment. Each is explained in the following text.
a. Revolutionary. The terrorist's goal is revolutionary when his intent is to help bring about
the complete overthrow of an incumbent government. The threat may come from within a
country, such as the Red Brigade in Italy, or from the outside such as the Popular Front for the
Liberation of Palestine (PFLP) with respect to the Israeli government. Some terrorists are
anarchists. Their purpose is to use violence to achieve world revolution and to eliminate all
governments.
a. _______________________ c. _______________________
b. _______________________
The correct answers include (in any order) a. revolutionary, b. sub-revolutionary, and c.
establishment. If your answers are the same, continue. If not, review paragraph 1203 before
continuing.
1-15
Lesson Summary. In this lesson, you learned the four motives of terrorism and the
intermediate and long-term objectives of terrorism. You also learned the purposes for the
motives and the description of each intermediate and long-term objective of terrorism. You just
finished the second lesson in this course. You know the intermediate objectives of terrorism.
These include recognition, government overreaction, harassment of government security forces,
theft or extortion, destruction of facilities or disruption of lines of communication, discouraging
foreign investment or assistance, influencing government decisions, freeing of prisoners, satisfy
vengeance, and turning the tide in a guerrilla war. Study Unit 2 will focus on building a working
knowledge of terrorist operations to include the operational structure of terrorist groups. This
lesson completes Study Unit 1.
-----------------------------------------------------------------
Lesson Exercise: Complete items 1 through 3 by performing the action required. Check your
responses against those listed at the end of this lesson.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
d. _______________________________________________________________
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
d. _______________________________________________________________
e. _______________________________________________________________
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
1-16
Lesson 2 Exercise Solutions
Reference
UNIT SUMMARY
In this study unit, you have established a base from which to work. You are able to define the
terms terrorism, terrorist, and terrorist group. You are able to identify the three terrorist
categories and you can identify the four motives for terrorism. You can identify intermediate and
long-term objectives and apply the purposes of each. In the next study unit, you learn about
concepts associated with terrorist operations. You are now ready for the unit exercise.
-----------------------------------------------------------------
--
Unit Exercise: Complete items 1 through 7 by performing the action required. Check your
responses against those listed at the end of this study unit.
1. Define terrorism.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
1-17
2. Define the term terrorist.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
d. _______________________________________________________________
1-18
6. List the ten intermediate objectives of terrorism.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
d. _______________________________________________________________
e. _______________________________________________________________
f. _______________________________________________________________
g. _______________________________________________________________
h. _______________________________________________________________
i. _______________________________________________________________
j. _______________________________________________________________
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
Reference
1-19
Study Unit 1 Exercise Solutions, continued
Reference
4. Crusaders 1102
Criminals 1102
Crazies 1102
5. Political ideology, nationalism, religion, and special interest 1201
6. (In any order) 1202
Recognition
Overreaction by the government
Harassment, weakening, or embarrassment of government
security forces
Destruction
Theft or extortion of money or equipment
Discourage foreign investment or assistance programs
Influence government decisions
Satisfy vengeance
Turn the tide in a guerrilla war
7. Revolutionary, sub-revolutionary, and establishment 1203
1-20
STUDY UNIT 2
TERRORIST DOCTRINE
Introduction. You witness a drive-by shooting. Could this be a terrorist action? Being
informed may save your life, a fellow Marine's life, or a dependent's life. Study Unit 1
provided you with a basic knowledge of terrorism, identified the meaning of terrorist
groups, and defined terrorist acts. In this study unit, you will learn what is considered a
terrorist operation, the organizational structure of terrorist groups, the most common
actions associated with terrorism, and the similar characteristics of personnel and facilities
that could be the focus of a terrorist operation. Finally, you will learn the categories in
which targets of terrorist operations are divided.
LEARNING OBJECTIVES
Terrorist operations are, for the most part, well thought-out and executed. They are usually
carried out by specially trained and organized clandestine elements. Strict security techniques are
followed once a target is selected and team members are not brought together until the final
rehearsal phase just before departure to the target site. You will learn the details of each phase of
the operation later in the course. Now, concentrate on learning the definition of the term terrorist
operation. A terrorist operation is any criminal act carried out by a person or group to gain
attention for a cause by using terror-causing tactics or to raise capital or obtain equipment for
future operations.
2-1
Without looking back, try the challenge.
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
Your answer to the challenge should be a terrorist operation is any criminal act carried out by a
person or group to gain attention for a cause by using terror-causing tactics or to raise capital, or
obtain equipment for future operations. If your answer differs, review paragraph 2102 before
continuing.
Since you have knowledge of the meaning of the term terrorist operation, you should now focus
on identifying and understanding the five phases of a terrorist operation. Study and remember the
five phases.
b. Initiation phase. This is the movement to target phase. Movement to the target is covert.
Individual terrorists leave for the target singly or in pairs along separate routes. When necessary,
they use false passports and names. Weapons and other items are sent separately to prearranged
locations where they are given to terrorists involved in the operation. Countries sympathetic to
terrorist causes have allowed items to be carried in diplomatic pouches with agents taking them
from the embassy to a prearranged site. The initiation phase is when the actual action takes place.
c. Negotiation phase. When terrorists decide that a hostage/barricade or another similar event
is worthwhile, they may use the negotiation phase to gain publicity. Negotiations may include
certain specific demands that often require intergovernmental negotiations at the highest level.
There may be trade-offs, especially if the demands are more than the government is able to meet.
Note: If the terrorists do not take hostages or enter a barricade-scenario, this phase
does not occur.
2-2
d. Climax phase. The climax phase immediately follows the initiation phase if there is no
negotiation phase. The climax phase signals the end of the incident as far as the terrorists are
concerned.
e. Post-incident phase. During the post-incident phase, the terrorist members regroup,
critique, and criticize the operation. This is considered to be a very important part of the
operation. During this phase, the terrorists learn from and share their successes and failures. The
lessons learned are often shared with other crusader groups to improve their operational skills.
See how much of the information you retained by completing this challenge.
Matching: Match the terrorist operational phase in column 1 to the action in column 2.
2-3
2103. State the Operations Commonly Associated with Terrorism
Terrorist operations are the same type of criminal activity you witness daily on the news. Of
course not every story you hear is the result of terrorism, but by now you should be considering
terrorism as a possibility. As you have already learned, terrorist attacks are well planned and
rehearsed. All terrorist groups, no matter how they are categorized or what their goal may be,
carry out similar operations. All of the following are operations conducted by terrorists:
a. Bombing (explosives). Explosive devices are inexpensive and easy to make, and materials
are readily available. Modern explosive devices are smaller, contain greater destructive
capability, and are harder to detect. The April 1995 bombing of the Federal Building in
Oklahoma City is a good example of the ease with which explosive devices can be made and used.
b. Arson. Incendiary devices are cheap and easy to hide. Arson is a useful tactic against
public utilities, hotels, houses of government, and industrial centers. Terrorists use arson to draw
a crowd, which in turn provides terrorists with the opportunity to use explosives or other
weapons.
c. Vehicle theft. Stolen vehicles provide terrorists with a means of delivering explosives that
can and most likely will be traced back to the original car owner and not to the terrorist
organization.
d. Skyjacking and aircraft theft. Skyjacking provides terrorists with hostages and draws
media attention. An aircraft theft provides terrorists with a tool for conducting kamikaze attacks.
Aircraft mobility and distance make retaliation difficult.
e. Marjacking. Marjacking (also known as maritime theft) provides terrorists with a unique
method of intimidating international travelers. Due to a ship's size and ability to endure long
periods of isolation, marjacking presents a variety of benefits to terrorists and risks to legal
authorities. While occurrence of marjackings are infrequent, the possibility should not be
underestimated.
2-4
i. International narcotics support. Drug activities finance some terrorist groups. Terrorist
groups may provide security for narcotics networks in return for financial support.
j. Robbery and extortion. In some environments, such as in South America, robbery and
extortion enhance other terrorist activities. These methods are unnecessary when terrorists
receive funding and support from sympathetic nations.
l. Nuclear, biological, and chemical (NBC) attack. NBC attacks have been almost
non-existent in the past. However, the use of chemical devices in the Japanese subway in the
summer of 1995 confirms the threat of a terrorist NBC attack cannot be dismissed. Always
consider the potential use of NBC when combating terrorism.
n. Raids and/or attacks on facilities. Raids and/or armed attacks on facilities are usually
undertaken for one of three purposes: to gain access to radio or television broadcast capabilities
to make a statement, to demonstrate the government's inability to secure critical facilities, or
national symbols, or for logistical purposes, such as the robbery of a bank or armory.
p. Hoaxes. Any terrorist group that has established credibility can employ a hoax with
considerable success. A threat against a person's life causes that person and those associated with
that individual to devote time and effort to security measures. A bomb threat can close a
commercial building, reduce operations, or delay an aircraft flight at no cost to the terrorist. False
alarms dull the analytical and operational efficiency of key security personnel, thus degrading
readiness.
2-5
and American oil companies. As a result of terrorist attacks, some 640,000 barrels of oil have
been spilled. Damages and lost oil exports are estimated to be in the range of $500 million. In
addition to the economic damage caused by the ELN attacks, oil spills from sabotaged sections of
the line have caused severe ecological damage to numerous rivers and freshwater lakes."
1. List (in any order) 9 of the 17 operations commonly associated with terrorism.
a. _________________________________________________________
b. _________________________________________________________
c. _________________________________________________________
d. _________________________________________________________
e. _________________________________________________________
f. _________________________________________________________
g. _________________________________________________________
h. _________________________________________________________
i. _________________________________________________________
______________________________________________________________
______________________________________________________________
2-6
(Fill in the blank)
______________________________________________________________
_____________________________________________________________
_____________________________________________________________
5. What countermeasure can you take to avoid becoming the intended target of an
ambush?
_____________________________________________________________
Your answers_____________________________________________________________
to the challenges should be
1. Any nine of the following (in any order) bombing; arson; vehicle theft; skyjacking and
aircraft theft; marjacking; ambush; kidnapping; hostage-taking; international narcotics
support; robbery and extortion; psychological terror; nuclear; biological; and chemical
(NBC) attack; assassination; raids and/or attacks on facilities; commercial and/or industrial
sabotage; hoaxes; and ecological terrorism.
2. The terrorists' intended target is the audience affected by the hostage's confinement, not the
hostage.
3. Bombing
4. Terrorist groups may provide security for narcotics networks in return for financial support.
5. Vary your travel routes.
If you answered any of the challenges incorrectly, review paragraph 2103 before continuing.
As you can see, terrorists have available many different types of operations to achieve their
intended goal. Now that you know the different operations, you should know the key
weaknesses or characteristics that are historically present in all terrorist targets. This information
will assist you in preparing your personal countermeasures against terrorism.
2-7
Interviews of many people who were once held hostage showed that all had experienced the key
characteristic of personnel subject to terrorist operation. Being an "easy target" is the key
characteristic shared by every individual who was the intended victim of a terrorist operation. An
easy target is one that displays any or all of the following characteristics:
c. Unaware. Intended victims are complacent, are not security-conscious, and do not take
individual protective measures.
1. What is the key characteristic of personnel who have been the target of a terrorist
operation?
______________________________________________________________
2. In the text you learned that there are three possible characteristics an easy target
may have. What are the three possible characteristics?
a. _________________________________________________________
b. _________________________________________________________
c. _________________________________________________________
Your answers to these challenges should be 1. easy target and 2. accessible, predictable, and
unaware. If your answers are different, review paragraph 2104 before continuing.
You are now ready to categorize different facilities and installations. This information is intended
to broaden your understanding and to stimulate your thinking on reasons a terrorist would attack
a facility.
2-8
2105. State the Different Categories of Terrorist Targets
Often, when you read reports of terrorist attacks, the reports list targets by categories. Within
each category there are a number of different installations or facility types. By knowing what is
contained in each category, you will become efficient in deciding if your installation, base, or
place of employment may be considered for attack by terrorists. The different categories are
a. Engineering and energy systems. Engineering and energy systems include the following:
d. Human. Under the category of human are those targets that historically are targeted more
than any other. Just because you may not fall under one of the groups listed in this category,
there is always the possibility that you could be an innocent bystander at the time of an attack.
The following are recognized by the United States as falling under the human category when
considering terrorist targets:
2-9
(1) Embassy and government employees
(2) Corporate executives
(3) Police
(4) Dependents of the above
a. ______________________________________________________________
b. ______________________________________________________________
c. ______________________________________________________________
d. ______________________________________________________________
Your answers to this challenge (in any order) should be engineering and energy systems,
communication and supplies, transportation, and human. If you answered differently, review
paragraph 2105 before continuing.
Lesson Summary. You now know the meaning of terrorism and can identify the acts. You also
learned the meaning of terrorist operation, can identify the five phases of a terrorist operation,
and what operations are commonly associated with terrorists and terrorism. Further, you learned
the key characteristic of individuals subject to terrorist attacks and considered as being "easy
targets." Finally, you have learned the target categories for terrorist operations which include
engineering and energy systems, communication and supplies, transportation, and human. In the
next lesson, you will learn the structure of typical, smaller, and medium-sized terrorist groups and
the functions of the different cells within a group. Before continuing, complete the lesson
exercise.
-----------------------------------------------------------------
Lesson Exercise: Complete items 1 through 18 by performing the action required. Check
your responses against those listed at the end of this lesson.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
2-10
Matching: For items 2 through 6, match the operational phase of a terrorist
operation in column 1 to the appropriate action in column 2.
Column 1 Column 2
Phase Action
7. List (in any order) 9 of the 17 operations commonly associated with terrorism.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
d. _______________________________________________________________
e. _______________________________________________________________
f. _______________________________________________________________
g. _______________________________________________________________
h. _______________________________________________________________
i. _______________________________________________________________
. ____________________________________________________________________
2-11
Matching: For items 9 through 13 match the terrorist operation in Column 1 with the
statement in Column 2 that best describes the terrorist operation.
Column 1 Column 2
Operation Statement
____________________________________________________________________
____________________________________________________________________
15. What countermeasure can you take to avoid becoming the intended target of an
ambush?
____________________________________________________________________
____________________________________________________________________
16. What is the key characteristic of personnel who have been the target of a terrorist
operation?
____________________________________________________________________
2-12
17. List (in any order) the three characteristics of an "easy target."
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
18. List (in any order) the four categories of targets of terrorist attack.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
d. _______________________________________________________________
Reference
2-13
Lesson 1 Exercise Solutions, continued
Reference
2-14
Lesson 2. ORGANIZATION OF TERRORIST GROUPS
LEARNING OBJECTIVES
The way a terrorist group is organized is determined by its need for security and the number of
people in the group. Generally, the larger groups are less secure and more prone to infiltration by
law enforcement organizations. Small terrorist groups can maintain a high degree of security
because of the membership size, but usually have limited operational capabilities. Figure 2-1
illustrates the typical smaller terrorist group.
The building block on which all terrorist groups are traditionally formed is the operational and
clandestine cell (O&C). The O&C cell allows the group to organize the members of one
particular cell with those from another cell where the members are unacquainted. All cells except
for those of large terrorist groups operate in secrecy. The number of cells and overall structure
are influenced by the degree of popular support in the area where the group operates. Both large
and small terrorist groups are organized in a similar manner. The larger group will normally have
more O&C cells. In the Middle East, where popular support exists, large groups often conduct
open meetings. Figure 2-2 illustrates the structure of a typical medium-sized terrorist group.
2-15
Fig 2-2. Organization of a typical medium to large terrorist organization.
a. Command cell. The command cell is responsible for the structure and security of the
terrorist organization. All terrorist plans are carried out according to plans laid out by the
command cell.
Your answers to the challenge should include (in this order) structure, security, plans, and
command. If your answers are different, review the preceding paragraph before continuing.
b. Operational & clandestine cell. The O&C cell is the action arm of the group and contains
the cadre of the group. In sophisticated groups, this cell may be highly specialized. In new or less
sophisticated groups, O&C cells may perform many jobs. The O&C cell is usually made up of
three to five terrorists. Under the control of the O&C cell are the reconnaissance cell, the assault
cell, the support cell, and the intelligence cell.
2-16
Try this challenge.
What function does the operational cell perform within the structure of the terrorist group?
The operational cell
Your answer to the challenge should be "a." If you answered differently review the preceding
paragraph before continuing.
(1) Reconnaissance cell. The reconnaissance (recon) cell provides pre-strike, eyes-on
information about the intended target. Information includes the target's home layout,
type of vehicles, routes to and from work, and any other personal or professional
information necessary to access the target.
(2) Assault cell. The assault cell is the actual "hit" men for the group that actually carries
out the mission. The assault cell is further broken down into a command team, an
assault team, and a security team.
What is the function of the reconnaissance team? The reconnaissance team provides
2-17
Your answer to this challenge should be "d." If you answered differently, review the preceding
paragraph before continuing.
What is the function of the assault team of the operational cell? It provides
Your answer to this challenge should be "c." If you answered differently, review the preceding
paragraph before continuing.
(a) Command team. The command team provides leadership and ensures discipline
is maintained throughout training and the actual assault. The command team
provides on-site command and control.
(b) Assault team. The assault team carries out the operation, whether the assault is
a bombing, a kidnapping, or any of the other actions discussed in lesson one of
this study unit.
(c) Security team. The security team provides security for the assault team's
training site. A security team may be in the background when an operation is
taking place to ensure nothing prevents the assault team from successfully
completing the mission.
List (in any order) the three sub-teams of the assault element.
a. ______________________________________________________________
b. ______________________________________________________________
c. ______________________________________________________________
2-18
Your answers to the challenge (in any order) should include the command team, the assault team,
and the security team. If you answered differently, review the preceding paragraph before
continuing.
(3) Support cell. The support cell is also known as the auxiliary cell. This cell is often
larger and less compartmentalized than the other cells in the group. The support cell
is responsible for fundraising, gathering sympathizers, screening recruits, and
distributing propaganda.
What is the function of the support cell within the operational cell? It provides
Your answer to the challenge should be "a." If you answered differently, review the preceding
paragraph before continuing.
(4) Intelligence cell. The intelligence cell collects and processes information on
potential targets and develops specific intelligence relevant to targeted facilities,
installations, and personnel including their security. The intelligence cell is highly
compartmentalized and follows very strict security procedures.
2-19
You guessed it! Try this challenge.
What is the function of the intelligence cell within the operational cell of a terrorist
group? It provides
Your answer to the challenge should be "c." If your answer is different, review the preceding
paragraph before continuing.
Lesson Summary. You now know the basic structure for small and medium-sized terrorist
groups. You have learned that terrorist groups have a command or leadership cell and an
operational cell. All groups except for the small, disjointed groups will have within the
operational cell a reconnaissance team, an assault team, and a security team. In lesson 3 you will
learn about the most common terrorist operations. Lesson 3 also will address the characteristics
common to all targets of terrorist attacks. Before you begin lesson 3, complete the lesson
exercise.
-----------------------------------------------------------------
Lesson Exercise: Complete items 1 through 7 by performing the action required. Check your
responses against those provided at the end of this lesson.
2-20
For items 2 through 4, circle the letter of the correct response.
2. What function does the operational cell perform within the structure of the terrorist
group?
4. What is the function of the assault team of the operational cell? It provides
5. List (in any order) the three sub-teams of the assault element.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
2-21
Complete items 6 and 7 by circling the letter of the correct response.
6. What is the function of the support cell within the operational cell? It provides
7. What is the function of the intelligence cell within the operational cell of a terrorist
group? It provides
Reference
UNIT SUMMARY
This study unit familiarized you with the internal structure of terrorist groups and the function of
each cell of a terrorist group. You also learned what operations are commonly associated with
terrorists and terrorism, the key characteristic of a terrorist target, and the categories of terrorist
target groups for reporting purposes. In the next study unit, you will learn about terrorist groups
as they relate to a global region. Now, complete the unit exercise for this study unit.
2-22
Unit Exercise: Complete items 1 through 25 by performing the action required. Check your
answers against those listed at the end of this study unit
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
Column 1 Column 2
Phase Action
2-23
Complete item 7 through 8 by performing the action required.
7. List (in any order) 9 of the 17 operations commonly associated with terrorism.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
d. _______________________________________________________________
e. _______________________________________________________________
f. _______________________________________________________________
g. _______________________________________________________________
h. _______________________________________________________________
i. _______________________________________________________________
____________________________________________________________________
____________________________________________________________________
2-24
Matching: For items 9 through 13, match the terrorist operation in Column 1 with
the statement in Column 2 that best describes the terrorist operation.
Column 1 Column 2
Operation Statement
14. State the reason why terrorist would support international narcotics.
____________________________________________________________________
____________________________________________________________________
15. What countermeasure can you take to avoid becoming the intended target of an
ambush?
____________________________________________________________________
____________________________________________________________________
16. What is the key characteristic of personnel who have been the target of a terrorist
operation?
____________________________________________________________________
2-25
17. List (in any order) the three characteristics of an "easy target."
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
18. List (in any order) the four categories of targets for terrorist attack.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
d. _______________________________________________________________
20. What function does the operational cell perform within the structure of the terrorist
group?
2-26
22. What is the function of the assault team of the operational cell?
23. List (in any order) the three sub-teams of the assault element.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
24. What is the function of the support cell within the operational cell? It provides
25. What is the function of the intelligence cell within the operational cell of a terrorist
group? It provides
2-27
Study Unit 2 Exercise Solutions
Reference
2-28
Study Unit 2 Exercise Solutions, continued
Reference
2-29
STUDY UNIT 3
Introduction. On any single day, acts of terrorism take place around the world for a variety
of reasons. Whether the terrorist style themselves as crusaders, criminals, or crazies, what
marks them as terrorists is that they direct their violence against noncombatants with the
goal of terrorizing a wider audience than their immediate victims, thereby attempting to gain
influence over the larger audience. In this study unit, you will learn what terrorist groups
operate in which global region. Keep in mind the groups will be identified with the region
in which they originated and not necessarily with the region where most of their actions take
place.
LEARNING OBJECTIVES
3101. Identify the Armenian Secret Army for the Liberation of Armenia (ASALA) Group
b. Headquarters. Unknown
c. Area of operation. The ASALA operates worldwide. Being a transnational group the
ASALA conducts operations wherever they feel their cause can be best served. In the past,
support for the ASALA has come from the Palestinian radical group Abu Nidal Organization,
Kurdish separatist groups, and Syria.
e. Objectives/target audience. The ASALA uses revolutionary violence to force an end to the
"exploitation, repression, and terror of Turkish colonialism" and the "imperialism" of the North
Atlantic Treaty Organization and Zionism. Turkish representatives, institutions, and those who
support Turkey are prime targets of the ASALA anywhere in the world. Figure 3-1 shows the
area claimed by Armenian terrorists.
3-1
Fig 3-1. Historic area claimed by Armenian terrorists.
3-2
Fig 3-2. ETA bombing that destroyed a shop
and killed nine people.
a. Membership. The FP-25 has six-to-ten hard-core members and 100-200 sympathizers
operating in Portugal.
b. Headquarters. The cities of Lisbon, Oporto, and Barcelos Portugal are considered to be
FP-25 headquarters.
c. Area of operation. The FP-25 has conducted its operations in Portugal since 1980 where it
claims to be a worker's organization dedicated to a struggle against exploitation, misery, and
repression, as well as to the violent overthrow of the Portuguese Government.
d. Other names. The FP-25 is also known as the Forces Populares 25 de Abril (original
language), the Autonomous Revolutionary Group (GAR), and the Armed Revolutionary
Organization (OAR).
e. Objectives/target audience. The stated goals of the FP-25 are "to use armed force against
imperialism" and lead a "worker's assault on bourgeois power." Political objectives include the
violent overthrow of the Portuguese government and the establishment of a Marxist state,
demonstrating violent opposition to U.S. and NATO presence in Portugal, and conducting attacks
in Portugal in support of other European terrorist groups.
3-3
3104. Identify the Provisional Irish Republican Army (PIRA) Group
c. Area of operation. The PIRA primarily operates in Northern Ireland and occasionally in
England and continental Europe.
d. Other names. Another name associated with the PIRA is "Provos." This is a slang term
used by law enforcement agencies in England.
a. Membership. The Red Army Faction (RAF) has an estimated membership of 20-30
hard-core members. This number tends to fluctuate based on the capture of members, but the
RAF has a disturbing trend to resurface with renewed and vicious attacks. Due to RAF's
relatively large support base, it will probably continue to be a serious threat.
b. Headquarters. The RAF operates within the Federal Republic of Germany (FRG).
d. Other names. Other names by which the RAF is known as include: Baader Meinhof Gang,
Baader Meinhof Group, and Rote Armee Fraktion (original language).
3-4
Try this challenge.
Matching: For items 1 through 6, match the terrorist group in column 1 to the
country/region in which it operates in column 2. Place your response in the spaces
provided.
Column 1 Column 2
__ 1. Armenian Secret Army for the a. Basque province of Spain and France
Liberation of Armenia (ASALA) b. Ireland
__ 2. Red Army Faction (RAF) c. Italy
__ 3. Provisional Irish Republican d. Portugal
Army (PIRA) e. Worldwide
__ 4. Popular Forces 25 April (FP-25) f. Germany
__ 5. Basque Fatherland and Liberty
(ETA)
e 1. Armenian Secret Army for the a. Basque province of Spain and France
Liberation of Armenia (ASALA) b. Ireland
f 2. Red Army Faction (RAF) c. Italy
b 3. Provisional Irish Republican d. Portugal
Army (PIRA) e. Worldwide
d 4. Popular Forces 25 April (FP-25) f. Germany
a 5. Basque Fatherland and Liberty
(ETA)
If your answers match, continue. If you answered differently, review paragraphs 3101 through
3105 before continuing.
3-5
3106. Identify the Red Brigade (BR) Group
a. Membership. The hard-core membership of the Red Brigade (BR) is estimated at between
50 and 75 terrorists. The BR organizational structure is believed to be highly cellular and strictly
compartmentalized, helping to ensure security and independent action by the various units. Two
separate factions appear to have developed within the BR since 1984. One faction, the
Militarists or the Fighting Communist Party (PCC) constitutes the majority and usually follows a
strict Leninist view that only violent terrorist acts can pave the way for revolution. The other
faction, the Movementalists or Union of Fighting Communists (UCC) is the minority or splinter
group that does not believe a revolution is possible until the proletariat has been sufficiently
politicized to support revolutionary action.
c. Area of operation. The BR operates in Italy. Members have been arrested in France, which
appears to be a safe haven for the BR.
a. Membership. The estimated membership of the Revolutionary Cells (RZ) is 100 terrorists.
The RZ has occasionally been linked with the Red Army Faction. The RZ believes in a
decentralized form of terrorism directed at targets within the immediate vicinity of each cell. To
achieve maximum security, its cells are typically composed of less than 10 members with minimal
contact between cells.
d. Other names. In the original language, the RZ is known as Revolutinaere Zellen and Rote
Zora.
3-6
3108. Identify the Revolutionary Organization 17 November Group
a. Membership. Little is known about the Revolutionary Popular Struggle (ELA) including
the number of members. What is known is that the ELA is an extreme leftist group that
developed out of the opposition to the military junta that ruled Greece from 1967 to 1974. The
ELA has declared its opposition to "imperialist domination, exploitation, and oppression." The
ELA is strongly anti-United States and seeks the removal of United States military forces from
Greece.
c. Area of operation. The area of operation for the ELA is Athens where it has carried out a
series of relatively unsophisticated bombings against the Greek Government and economic targets
including U.S. interests.
d. Other names. In the native language the ELA is known as Epanastikos Laikos Agonas.
3-7
Try this challenge.
Matching: For items 1 through 4, match the country in column 1 with the terrorist group
which operate in that country in column 2. Place your answer in the space provided.
Column 1 Column 2
If your answers to the challenge is different, review paragraphs 3106 through 3109 before
continuing.
Lesson Summary. You now know the terrorist groups that are most commonly associated with
terrorist activities in Europe. You know which groups are known to operate in which
countries, and you now have a base from which to further your knowledge of each group. In the
next lesson, you will learn about the groups that are most active or most commonly known in
Asia. You are now ready for the lesson exercise.
3-8
Lesson Exercise: Complete items 1 through 9 by performing the action required. Check your
responses against those listed at the end of this lesson.
Matching: For items 1 through 9, match the terrorist group in column 1 to the
country/region in which it operates in column 2. Place your response in the space
provided.
Column 1 Column 2
Column 1 Column 2
Reference
1. a. 3101
2. f. 3105
3. c. 3104
4. b. 3103
5. e. 3102
6. a. 3106
7. b. or c. 3108
8. d. 3107
3-9
Lesson 2. TERRORIST GROUPS OF ASIA
LEARNING OBJECTIVE
In the last lesson you learned about the terrorist groups which are organic to Europe. In this
lesson you will learn about terrorist groups of Asia. In the past, attacks against United States
citizens and interests in Asia have not been prevalent, but recent attacks in Asia appear to be
indiscriminate and could very easily include United States citizens and/or interests. The actions of
these terrorists groups outside of their region of origin are something you should be concerned
about.
b. Headquarters. The Chukaku-Ha operates primarily in Japan. The group focuses its attacks
on Japanese Government buildings, the national railway system, and it has claimed responsibility
for a number of attacks against United States facilities.
c. Area of operation. The primary area of operation for the Chukaku-Ha is mainland Japan.
d. Other names. Other names associated with the Chakaku-Ha include: Middle Core or
Nucleus Faction.
a. Membership. The estimated membership of the Japanese Red Army is 25. Sympathizers
are estimated at approximately 100 Japanese.
b. Headquarters. Although the Red Army is considered to be an Asian terrorist group its
headquarters is in Lebanon, where the group finds supporters and a safehaven.
c. Area of operation. The Japanese Red Army has a broad area of operation. Operations tend to
be focused in Western Europe, the Middle East, and Asia. In the past the JRA has conducted
terrorist actions on behalf of Palestinian terrorist groups.
3-10
d. Other names. The JRA is also known as the Nippon Sekigun or the Nihon Sekigun.
e. Objectives/target audience. The primary goal of the JRA is to support the worldwide
Marxist-Leninist revolution by conducting acts of terrorism. Other JRA objectives are to serve as
a uniting force for leftist anarchist organizations in Japan, to oppose Japanese imperialism, and to
establish a People's Republic of Japan. The Japanese people are the desired audience.
a. Membership. The Liberation Tigers of Tamil Eelam (LTTE) has an estimated membership
of 2,000 who are considered active.
c. Area of operation. The LTTE operates within Sri Lanka with the intent of causing the
creation of a separate Tamil state in the northern and eastern provinces of Sri Lanka.
d. Other names. The LTTE is also known as the Tigers and the Tamil Tigers.
e. Objectives/target audience. The LTTE's objectives are to eliminate moderate Tamils and
other Tamil militant groups that compete with the LTTE for influence and power within the
Sri Lankin Tamil community and to focus international attention on the plight of the Tamils living
in Sri Lanka, concentrating especially on human rights issues.
3-11
(Fill in the blank)
Your answers should be 1. Chukaku-Ha, 2. Red Army, 3. Liberation Tigers of Tamil Eelam. If
so, continue. If your answers are different, review paragraphs 3201 through 3203 before
continuing.
d. Other names. There are no other known names for the Dal Khalsa.
e. Objectives/target audience. The Dal Khalsa's terrorist actions have been focused on
creating an independent Sikh state in the Punjab. To accomplish its mission, the group targets
the Indian Government, the Sikh moderate community, and Hindus in general.
To see how much you remember of what you have just learned try this challenge.
3-12
3205. Identify the Dashmesh Regiment Group
a. Membership. It is estimated that there are 200 members in the Dashmesh Regiment.
c. Area of operation. The Dashmesh Regiment operates throughout India, especially in Punjab
and Haryana, and to some extent worldwide.
Your answer should be the Dashmesh Regiment. If not, review paragraph 3205 before
continuing.
Lesson Summary. This lesson provided you with the knowledge needed to identify particular
terrorist groups which originate in Asia. It also provided you with basic background knowledge
on each terrorist group discussed. In the next lesson you will learn about those terrorist groups
originating in the Middle East. Before continuing with the next lesson, complete the lesson
exercise.
3-13
Lesson Exercise: Complete items 1 through 5 by performing the action required. Check your
responses against those listed at the end of the lesson.
attacks on Japanese Government buildings, the national railway system, and it has
the intent of causing the creation of a separate Tamil state in the northern and eastern
headquarters is not known, analysts believe the central headquarters is located in the
Reference
1. Chukaku-Ha 3201
2. Red Army 3202
3. Liberation Tigers of Tamil Eelam 3203
4. Dal Khalsa 3204
5. Dashmesh Regiment 3205
3-14
Lesson 3. TERRORIST GROUPS OF THE MIDDLE EAST
LEARNING OBJECTIVE
The terrorist groups of Asia are obscure; the opposite is true of the groups associated with the
Middle East. As a collective organization, these groups have held the attention of the world and
continue to play a significant part in the media spotlight if not directly, then indirectly by
supporting other terrorist groups around the world.
a. Membership. The estimated membership of the Abu Nidal Organization (ANO) is 500
individuals.
b. Headquarters. Previously the ANO was headquartered in Syria and Iraq. Most recently
Libya is the group's headquarters.
c. Area of operation. The area of operation is worldwide, which is why this group is
considered by the world as "dangerous." Support from Syria and Iraq in the past and current
support from Libya allows the ANO the financial flexibility to conduct terrorist operations
wherever they feel their cause can be served. In addition to outside sponsors, the ANO conducts
self-sustaining economic operations.
d. Other names. The ANO is also known as Fatah-the Revolutionary Council (FRC), Black
June Organization (BJO), Arab Revolutionary Brigades (ARB), Revolutionary Organization of
Socialist Muslims (ROSM), Black September Organization (BSO).
3-15
3302. Identify the Arab Organization of 15 May Group
a. Membership. There is no solid number as to the correct number of members in the Arab
Organization of 15 May. Analysts have only identified the group's membership to be "very small."
The group was formed during a split within the Popular Front for the Liberation of Palestine in
the late 1970's.
c. Area of operation. The area of operation for the Arab Organization of 15 May is Western
Europe. The 15 May frequently target undefended public places, in particular airports and airlines
because of their international visibility. The group favors using highly sophisticated explosives in
their attacks.
3303. Identify the Democratic Front for the Liberation of Palestine (DFLP) Group
a. Membership. The membership of the Democratic Front for the Liberation of Palestine
(DFLP) is estimated at 500. The DFLP believes that the Palestinian national goal cannot be
achieved without a revolution of the working class; elite members of the movement should not be
separated from the masses, and the lower classes first should be educated in true socialism to
carry on the battle.
c. Area of operation. The DFLP operate in Lebanon and Israel. Typical attacks are minor
bombings, grenade attacks, and operations to seize hostages and attempt to negotiate the return
of Israeli-held Palestinian prisoners.
d. Other names. The DFLP is also known as the Popular Democratic Front for the Liberation
of Palestine (PDFLP).
3-16
3304. Identify the Fatah Group
b. Headquarters. The symbolic international headquarters for the Fatah group is Tunis,
Tunisia. Overt and covert offices are operated by the Fatah.
c. Area of operation. The Fatah operates worldwide and is known as an international terrorist
group. The majority of the Fatah's operational efforts are focused primarily against Israeli targets
in Israel, Lebanon, and the occupied territories.
d. Other names. In the past the Fatah group has used names such as Black September
Organization, al-Asifa, Force 17, and the Hawri group. The word Fatah is a reverse spelling of an
acronym for Harakat al-Tahrir al Filistini, which means "Palestinian Liberation Movement" in
Arabic.
a. Membership. The Hezbollah has approximately 3,000 full-time members, with as many as
500 directly involved in terrorist activities.
b. Headquarters. The headquarters for the Hezballah is West Beirut and Bekka Valley,
Lebanon.
c. Areas of operation. The areas of operation for the Hezballah are the Middle East and
Europe.
d. Other names. The Hezballah is also known as the Islamic Jihad, the Party of God, the
Revolutionary Justice Organization, and the Organization of the Oppressed.
3-17
Try these challenges.
group is its ability to operate worldwide. Support from Syria and Iraq in the
past and current support from Libya allows the __________ ________
they feel their cause can be served. In addition to outside sponsors, the
operations.
their attacks.
3-18
(Fill in the blanks)
attacks are minor bombings, grenade attacks, and options to seize hostages and
focused primarily against Israel targets in Israel, Lebanon, and occupied territories.
5. The areas of operation for the _______________ are the Middle East and Europe.
Your answers should include the following: 1. Abu Nidal Organization, Abu Nidal Organization,
Abu Nidal Organization, 2. Arab Organization of 15 May, Arab Organization of 15 May, 3.
Democratic Front for the Liberation of Palestine, 4. Fatah, Fatah, and 5. Hezballah. If you
answered correctly, continue. If your answers are different, review paragraphs 3301 through
3305 before continuing.
3-19
3306. Identify the Lebanese Armed Revolutionary Faction (LARF) Group
3307. Identify the Organization of the Armed Arab Struggle (OAAS) Group
a. Membership. Analysts on terrorism classify the number of individuals associated with the
Organization of the Armed Arab Struggle (OAAS) as being very small.
b. Headquarters. The actual location of the headquarters is uncertain. Analysts believe the
OAAS headquarters is in Syria or Libya.
c. Areas of operations. The OAAS operates in Western Europe and the Middle East.
a. Membership. Among the three different factions of the Palestine Liberation Front (PLF)
there are 300 members.
b. Headquarters. The three factions of the PLF are the: 1. Tal'at Yaqub in Syria,
2. Abu al Abbas in Iraq, and 3. Abd al Fatah Ghanem in Libya.
c. Areas of operations. Taken as a group, the three factions of the PLF operate in Lebanon,
Israel, and Europe.
3-20
d. Other names. The PLF is also known as the Front for the Liberation of Palestine (FLP).
e. Objectives/target audience. The primary goal of all three PLF factions is the dismantling of
the current state of Israel by terrorizing Israel through direct attacks on Israeli soil and
establishing an independent Palestinian state in place of Israel.
3309. Identify the Popular Front for the Liberation of Palestine (PFLP) Group
a. Membership. Analysts estimate that the Popular Front for the Liberation of Palestine
(PFLP) has 1,000 members.
c. Area of operations. The PFLP operates in both Europe and the Middle East.
d. Other names. There are no other names associated with the PFLP.
e. Objectives/target audience. The PFLP objectives include to liberate Palestine with "armed
struggle" and "oppose all efforts at a negotiated settlement of the Israeli-Palestinian issue."
c. Areas of operations. The Sa'iqa operates in both the Middle East and Europe.
d. Other names. Other names for the Sa'iqa are the Thunderbolt, and the Eagles of the
Palestinian Revolution.
3-21
Check to see how much you remember by completing the following challenges.
Yaqub in Syria, 2. Abu al Abbas in Iraq, and 3. Abd at Fatah Ghanem in Libya.
3-22
(Fill in the blank)
Lesson Summary. This lesson provided you with the knowledge you need to know to identify
terrorist groups associated with the Middle East. You also have a basic knowledge of these
groups from which you can build on when or if you are stationed or operating in one of the
regions discussed in this lesson.
-----------------------------------------------------------------
Lesson Exercise: Complete items 1 through 5 by performing the action required. Check your
responses against those listed at the end of this lesson.
3-23
Lesson 3 Exercise Solutions
Reference
3-24
Lesson 4. TERRORIST GROUPS OF THE AMERICAS
LEARNING OBJECTIVES
Recent events such as the Oklahoma City Federal Building bombing are stark reminders that no
one is exempt from becoming a victim of a terrorist attack. In this lesson you will learn about the
terrorist groups organic to the Americas. The focus of this study unit is to build your terrorist
awareness for assignment outside the U.S. Therefore, terrorist groups organic to and operate
only in the United States have been omitted. Information on these groups is available from state
and local law enforcement agencies.
a. Membership. The estimated membership of the terrorist group Alfaro Lives, Damn It!
(AVC) is estimated to have a membership of between 200 and 300 individuals. The group's
unique name is drawn the Ecuadorian national hero, Eloy Alfaro, a revolutionary leader and the
president of Ecuador in the early 1900s.
c. Area of operations. The area of operation for the AVC is Ecuador, primarily in the urban
areas of Quito and Guayaquil.
d. Other names. The AVC is known as "Alfaro Vive, Carajo!" in the native language.
e. Objectives/target audience. The AVC favors social "reform" and opposes "oligarchy and
imperialism." In support of this objective, the AVC creates opposition to the current government,
especially among the rural poor. A secondary objective is to force the withdrawal of United
States and other foreign interests from Ecuador.
a. Membership. It is estimated that the armed wing of the Bandera Roja (Red Flag-GBR) has
50 active members.
c. Area of operations. The GBR operates in Eastern Venezuela and along the
Venezuela-Colombia border.
d. Other names. The GBR's armed wing's name in the original language is Frente Americo
Silva (Americo Silva Front-FAS).
3-25
e. Objectives/target audience. Originally the GBR's primary objective was to begin a
Marxist-Leninist program of rural revolution, but contrary to this goal, they rejected the
Venezuelan constitutional left, including the Venezuelan Communist Party and the Movement of
the Revolutionary Left. The present political agenda appears to be establishing a "dictatorship of
the proletariat in Venezuela by means of an armed struggle." The GBR shuns the leftist elements
that have accepted legal status and are seeking elections as means of obtaining political power.
d. Other names. The MPL name in the original language is Movimiento Popular de
Liberacion.
a. Membership. The total membership of the Claira Elizabeth Ramirez Front (CERF) is
between 10 and 20 terrorists.
c. Area of operations. The CERF operates in San Salvador. This group has shown a high
interest in United States targets in San Salvador. The Salvadoran Government launched a
successful counterterrorist campaign against the CERF. Activities since then tend to be
recruitment and political organizing efforts on university campuses and in the nation's unions.
3-26
d. Other names. In the original language, the CERF is known as Frente Clara Elizabeth
Ramirez. At times the CERF refers to itself by the name of its parent organization, the Popular
Liberation Front (FPL), even though the FPL has ostracized the CERF.
3405. Identify the Farabundo Marti National Liberation Front (FMLN) Group
a. Membership. The estimated membership of the Farabundo Marti National Liberation Front
(FMLN) is 7,500 individuals. The membership of the FMLN is supported by Nicaragua, Cuba,
Vietnam, and various "solidarity" and "fundraising" groups throughout Latin America, North
America, Europe.
b. Headquarters. There are various locations within El Salvador that are considered
headquarters of the FMLN, with other key offices being located in Managua, Nicaragua.
c. Area of operations. The FMLN operates primarily inside El Salvador with some limited
operations inside Honduras. FMLN members are routinely trained at camps in Nicaragua and
Cuba. Most of the foriegn-supplied weapons used by FMLN elements are United States arms that
were lost during the Vietnam War and later filtered through Communist channels into Nicaragua.
Additional weapons and ammunition have been captured from the Salvadoran Army and security
forces in raids and ambushes on units and on supply facilities.
d. Other name. In the original language, the FMLN is known as Frente Farabundo Marti de
Liberacion Nacional (FMLN).
e. Objectives/target audience. The FMLN has two primary objectives they wish to achieve
through the use of terrorism. The first is to create and sustain war of attrition against the elected
Government of El Salvador to cause its destruction and replacement by a leftist, pro-Cuban,
anti-United States state. The second is to frustrate United States' support of the Salvadoran
Government and stimulate domestic U. S. opposition to policies through periodic attacks on
American military personnel in El Salvador.
3-27
Try these challenges to see how much you remember.
operates in San Salvador. This group has shown a high interest in the United
3-28
(Fill in the blank)
Your answers should be as follows: 1. Alfaro Lives, Damn It! (AVC), 2. Bandera Roja (Red
Flag-GBR), 3. Cinchoneros Popular Liberation Movement (MPL), 4. Claira Elizabeth Ramirez
Front (CERF), 5. Farabundo Marti National Liberation Front (FMLN). If you answered
correctly, continue. If you answered differently, review paragraphs 3401 through 3405 before
continuing.
a. Membership. The URNG is made up of an estimated 1,500 guerrillas from a loose coalition
of three major insurgent groups: the Revolutionary Organization of the People in Arms (ORPA),
the Guerrilla Army of the Poor (EGP), and the Rebel Armed Forces (FAR).
b. Headquarters. The URNG has delegations in Mexico City, Havana, and Managua.
c. Area of operations. The URNG operates in rural Guatemala with the OPRA in the
southwest, the EGP operates mainly in the northwest highlands, and the FAR in the extreme
north. Figure 3-3 depicts the operating areas of the guerrilla groups that form the rough coalition
of the URNG.
3-29
Fig 3-3. Operating areas of the URNG.
d. Other names. The political arm of the URNG is known as the Guatemalan Committee for
Patriotic Unity (CGUP). The URNG sometimes claims operations in the name of any of its
individual component groups.
e. Objectives/target audience. The objectives of the URNG are to unify the guerrillas and
revolutionary front organizations into a broad coalition to achieve the unity necessary to launch a
"people's revolutionary war," and to defeat the "power of the national and foreign wealth and
install a patriotic, revolutionary, and democratic people's army."
3407. Identify the Lorenzo Zelaya Popular Revolutionary Forces (FPR-LZ) Group
a. Membership. There are an estimated 150 to 300 members in the FPR-LZ. They are
supported by the Farabundo Marti National Liberation Front (El Salvador). It is possible that
training is provided by Nicaragua and Cuba.
b. Headquarters. There are two known headquarters for the FPR-LZ: Tegucigalpa and San
Pedro Sula, Honduras.
c. Area of operations. Just as Teguigalpa and San Pedro Sula are the headquarters, they are
also the two primary urban operational areas of the FPR-LZ. The northern and central rural
areas of Honduras are also FPR-LZ operational areas.
d. Other names. In the original language, the FPR-LZ is known as Fuerzas Populares
Revolucionarias Lorenzo Zelaya. The group may also operate under the names of Froylan
Turcios Command or the Bayardo Paguada Movement.
3-30
e. Objectives/target audiences. The FPR-LZ's objectives are to carry out war on United States
"imperialism" and its allies in Honduras including the United States Embassy and Peace Corps
buildings, U.S. military personnel, and U.S. companies, and to carry out terrorist activities against
Latin American embassies.
a. Membership. The 19th April Movement (M-19) is estimated to have 1,000 members. The
membership is supported by Nicaragua, Cuba, and to a certain extent, Libya. This group
envisions itself as an army.
c. Area of operations. The M-19 operates along what they consider to be two "fronts" in
Colombia. The first is the Southern Front in the Putumayo Province. The second is a Western
Front in Caldas, Cauca, Valla del Cauca, Quindio, and Tolima Provinces in Colombia.
d. Other names. In the original language, M-19 is known as the Movimiento 19 de Abril.
e. Objective/target audience. The two primary objectives of the M-19 are to claim a populist
orientation, emphasizing a struggle by the people against the Colombian "bourgeoisie" and
American "imperialism," and to extort funds from narcotic producers and on occasion to
cooperate with narcotic dealers in areas or ventures of mutual interest.
a. Membership. The actual number of Macheteros is not known. The group itself is tightly
organized and extremely violent. The Macheteros are fiercely dedicated to total Puerto Rican
independence. The stated position of the group is they have declared "war" on the United States.
b. Headquarters. There are many pieces missing to the Machetero puzzle, including the
location of its headquarters.
c. Area of operations. The Macheteros group operates in Puerto Rico. Primary targets of this
group are the United States military in Puerto Rico and the Puerto Rican police.
d. Other names. The Machete Wielders are known in the original language as Ejertico Popular
de Boricua (EPB), the English translation of which is Boricua Popular Army.
e. Objectives/target audience. The Macheteros' objectives are to wage war against "U.S.
colonialist imperialism" and to create public support for the creation of a separate Puerto Rican
state.
3-31
3410. Identify the Manuel Rodriquez Patriotic Front (FPMR) Group
a. Membership. The Manuel Rodriquez Patriotic Front (FPMR) has an estimated 500 to
1,000 members. The group is closely related to the Chilean Communist Party and has links to
Cuba and other communist countries, especially for training and weapon supply.
b. Headquarters. The FPMR's headquarters is in Santiago, Chile. Santiago has the dubious
distinction of being the group's primary urban operating area.
c. Area of operations. The FPMR primarily operates in the urban areas of Chile. Often, the
group uses the mass media in its campaigns and sometimes seizes a radio station to broadcast its
propaganda.
d. Other names. In the original language of Chile, the FPMR is known as Frente Patriotico
Manuel Rodriguez.
e. Objectives/target audience. The FPMR's acts of terrorism are designed to provoke greater
government repression and thereby create anti-government sentiment and strongly influence, if
not actually lead, a subsequent government toward leftist, anti-U.S. policies. The FPMR also
seeks to pressure United States interests to leave Chile through periodic attacks on business or
government facilities.
Try this challenge and the ones that follow to test how much you remember.
__________ operates in rural Guatemala, with the OPRA in the southwest, the
EGP mainly in the northwest highlands, and the FAR in the extreme north.
3-32
(Fill in the blank)
3-33
3411. Identify the Movement of the Revolutionary Front (MIR) Group
a. Membership. The estimated membership of the MIR is 500. The original members of this
group were leftist college students who later made a concerted shift to the views of Fidel Castro.
b. Headquarters. The MIR's primary headquarters is in Havanna, Cuba and it also maintains
one in Santiago, Chile.
c. Area of operations. The MIR carries out their terrorist actions in Chile. To help finance its
terrorist operations, the MIR has relied increasingly on bank robberies.
d. Other names. In the original language, the MIR is known as Movimiento de la Izquierda
Revolucionaria.
e. Objectives/target audience. The MIR's objectives are to provoke the government to take
repressive measures that will alienate the general public and to establish a Marxist state in Chile.
a. Membership. Terrorism analysts estimate the membership of the National Liberation Army
(ELN) to be less than 1,000.
c. Area of operations. The ELN operates primarily in the northern and northeastern parts of
Colombia near the Venezuelan border expanding into the central region.
d. Other names. The ELN is known as Ejercito de Libercion Nacional in the original
language.
c. Area of operations. The EPL operates primarily in the Antioquia and Cordoba Provinces of
Colombia.
3-34
Note: In Colombia "provinces" are known as "departments." Departments are called
provinces in this course for you convenience and ease in relating to familiar
information.
d. Other names. In the original language, the EPL is known as Ejercito Popular de Libercion.
e. Objectives/target audience. The objective of the EPL are to conduct a war of liberation
directed specifically at the Colombian bourgeoisie.
a. Membership. The Revolutionary Armed Forces of Columbia (FARC) has between 4,000
and 5,000 armed guerrillas in 35-40 fronts. The organization's leadership is middle-and
upper-class intellectuals while other members tend to be from the peasant population. This group
is probably the largest, best-trained and equipped, and most effective insurgent organization in
Columbia and in South America.
c. Area of operations. The FARC operates in Colombia. This group, more than any other
terrorist group in Colombia, has a close relationship to the narcotics traffickers in Colombia. The
relationship seems strongest where the coca production and FARC operational strongholds
overlap. Money received from providing protection for the traffickers supplement FARC
revenues from kidnappings, extortion, and robberies.
d. Other names. In the original language, the FARC is known as Fuerzas Armadas
Revolucionarias de Colombia.
e. Objectives/target audience. The FARC, along with its political front, the Patriotic Union
(UP), has these objectives: Overthrow the established order in Colombia and replace it with a
leftist and anti-American regime, create a "broad anti-monopoly and anti-imperialist front" and
unite left-wing parties and organizations into a political movement, and force U. S. and other
"imperialist" interests out of Colombia.
a. Membership. The estimated membership of the Ricardo Franco Front (RFF) is 100
individuals.
b. Headquarters. The headquarters of the RFF is in the Valla del Cauca Province of
Colombia.
c. Area of operations. Primarily, the RFF operates in Bogata as well as parts of southwest
Colombia.
3-35
d. Other names. In the original language, the RFF is known as Frente Ricardo Franco.
e. Objectives/target audience. The RFF's objectives are to overthrow the established order
and form a "people's government, and oppose the United States' involvement in Colombia. In
keeping with the second objective the RFF has demonstrated the strongest anti-American
sentiments of the Colombian guerrilla groups, frequently targeting U.S. officials and commercial
installations.
a. Membership. The estimated membership of the Shining Path (SL) is between 4,000 and
5,000 members.
c. Area of operations. The SL operates primarily in Peru. This group is organized to conduct
simultaneous urban terrorism and rural guerrilla warfare. Particularly gruesome assassinations are
a hallmark of the SL. Victims are ritually mutilated, and the corpses are left on public display.
This practice of mutilation is in part a reflection of an Indian belief that an unmutilated victim's
spirit can reveal its killer and it also magnifies the terror effect of the killings. The indoctrination
program of the SL is an aggressive one. Its recruiting frequently targets 12- to 15-year-olds who
can be molded into highly motivated, even fanatical activists.
d. Other names. In the original language, the Shining Path is known as Sendero Luminoso.
e. Objectives/target audience. The objectives of the Shining Path are to stimulate a "peasant
armed struggle" that will lead to overthrow of the current constitutional government and install a
leftist, ethnic Indian state in the year 2000 and to attack U.S. and other "imperialist" targets in an
effort to eliminate foreign influence in Peru, embarrass the Peruvian Government, and force it to
take repressive measures.
d. Other names. In the original language, the MRTA is known as Movimiento Revolucionario
Tupac Amaru.
3-36
e. Objective/target audience. The objectives of the MRTA are to conduct "armed
propaganda" to destabilize the Peruvian Government, force U. S. Government and business
activities out of Peru, and create an image of MRTA as the Peruvian militant group aligned with
the Marxist international revolutionary movement and its proponents in contrast with the
xenophobic Shining Path Terrorist group.
3-37
(Fill in the blank)
______________ operates in Columbia. This group, more than any other terrorist
3-38
Your answers should be as follows: 1. Movement of the Revolutionary Front (MIR), 2.
National Liberation Army (ELN), 3. Popular Liberation Army (EPL), 4. Revolutionary Armed
Forces of Columbia (FARC), 5. Ricardo Franco Front (RFF), 6. Shining Path (SL), and Tupac
Amaru Revolutionary Movement (MRTA). If you answered correctly, continue. If you answered
differently, review paragraphs 3411 through 3417 before continuing.
Lesson Summary. This lesson provided you with the knowledge necessary to identify those
terrorist groups that are organic to the Americas. You also have enough background knowledge
on each group to give you a starting point for further research should you find yourself stationed
in the region.
-----------------------------------------------------------------
Lesson Exercise Complete items 1 through 17 by performing the action required. Check your
responses against those provided at the end of this lesson.
operates in San Salvador. This group has shown a high interest in United States
inside Honduras. FMLN members are routinely trained at camps in Nicaragua and
Cuba.
3-39
6. The _________________________ ________________ ____________
__________ operates in rural Guatemala, with the OPRA in the southwest, the EGP
mainly in the northwest highlands, and the FAR in the extreme north.
operates primarily in the northern and northeastern parts of Colombia, near the
Colombia.
3-40
15. The ___________________ ________________ ________________
Reference
UNIT SUMMARY
This study unit provided you with a brief introduction to the different terrorist groups organic to
specific geographical regions. In particular, you were introduced to the terrorist groups
associated with Europe, Asia, the Middle East, and the Americas. In Study Unit 4, you will learn
how to further your awareness of terrorism by being introduced to the official sources of
information available to you concerning a terrorist threat, the steps you should take to determine
the existing/extended threat, and how to establish a personnel threat level or condition for a
country or region. Before starting Study Unit 4, complete the unit exercise for Study Unit 3.
3-41
Unit Exercise: Complete items 1 through 36 by performing the required action. Check your
responses against those located at the end of this study unit.
Matching: For items 1 through 5, match the terrorist group in column 1 to the
country/region in which it operates in column 2. Place your responses in the spaces
provided.
Column 1 Column 2
Matching: For items 6 through 9, match the country in column 1 with the terrorist
group which operate in that country in column 2. Place your responses in the spaces
provided.
Column 1 Column 2
10. The __________________ operates primarily in Japan. The group focuses its
attacks on Japanese Government buildings, the national railway system, and it has
3-42
11. Although the ____________________ is considered to be an Asian terrorist
group its headquarters is in Lebanon where it finds supporters and a safe haven.
the intent of causing the creation of a separate Tamil state in the northern and
16. The actual location of the headquarters is uncertain. Analysts believe the
and their headquarters are: 1. Tal'at Yaqub in Syria, 2. Abu al Abbas in Iraq, and 3.
3-43
21. The __________________ ______________ ___________ operates in Eastern
operates in San Salvador. This group has shown a high interest in United States
inside Honduras. FMLN members are routinely trained at camps in Nicaragua and
Cuba.
__________ operates in rural Guatemala, with the OPRA in the southwest, the EGP
mainly in the northwest highlands, and the FAR in the extreme north.
26. There are two known headquarters for the ___________________ _____________
3-44
30. The ________________________ __________________ ____________________
operate primarily in the northern and northeastern parts of Colombia, near the
than any other terrorist group in Colombia, has a close relationship to the
3-45
Study Unit 3 Exercise Solutions
Reference
1. a. 3101
2. f. 3105
3. c. 3104
4. b. 3103
5. e. 3102
6. a. 3106
7. b. 3108
8. c. 3109
9. d. 3107
10. Chukaku-Ha 3201
11. Red Army 3202
12. Liberation Tigers of Tamil Eelam 3203
13. Dal Khalsa 3204
14. Dashmesh Regiment's 3205
15. Lebanese Armed Revolutionary Faction or LARF 3306
16. Organization of the Armed Arab Struggle or OAAS 3307
17. Popular Front for the Liberation of Palestine or PFLP 3309
18. Palestine Liberation Front or PLF 3308
19. Sa'iqa 3310
20. Alfaro Lives, Damn It! (AVC) 3401
21. Bandera Roja (Red Flag-GBR) 3402
22. Cinchoneros Popular Liberation Movement (MPL) 3403
23. Claira Elizabeth Ramirez Front (CERF) 3404
24. Farabundo Marti National Liberation Front (FMLN) 3405
25. Guatemalan National Revolutionary Unity (URNG) 3406
26. Lorenzo Zelaya Popular Revolutionary Forces (FPR-LZ) 3407
27. 19th April Movement (M-19) 3408
28. Macheteros (Machete Wielders) 3409
29. Manuel Rodriquez Patriotic Front (FPMR) 3410
30. Movement of the Revolutionary Front (MIR) 3411
31. National Liberation Army (ELN) 3412
32. Popular Liberation Army (EPL) 3413
33. Revolutionary Armed Forces of Columbia (FARC) 3414
34. Ricardo Franco Front (RFF) 3415
35. Shinng Path (SL) 3416
36. Tupac Amaru Revolutionary Movement (MRTA) 3417
3-46
STUDY UNIT 4
Introduction. You now are able to define terrorism, you are capable of identifying known
terrorist groups, and you know where they operate; but how do you determine whether or
not you are in a threat region? More importantly, what can you do to improve your odds if
you are in a threat region? This study unit will introduce you to the official sources of
information available to you concerning terrorist threats, the steps you should take to
determine the existing/extended threat, and the method you can use to establish a personal
threat level or condition for a country or region.
LEARNING OBJECTIVES:
1. Identify and define regions subject to travel advisory or restriction and agencies
responsible for releasing terrorist threat warnings.
3. Identify the type of information released by the Naval Anti-Terrorism Alert Center.
4. Identify how Travel Security Advisories are disseminated within the Marine Corps.
To determine whether a region is the subject of a travel advisory or travel restriction, you as a
Marine must become knowledgeable of the meanings of and differences among the terms used to
inform you of a certain status. To begin, you should know the source or sources of information.
In determining if a region is the subject of a travel advisory or travel restriction, you must focus
on two factors. Those factors are the sources of a travel warning and the types of warnings.
First, focus on the sources of a travel warning.
4-1
(1) Travel advisory. A travel advisory is a formal recognition that an upsurge in crime,
political or social unrest, guerrilla warfare, or terrorism has been observed within a
country. Travelers to or through that country should increase security awareness and
apply appropriate preventive measures. A list of general preventive measures and
specific limitations regarding travel to, through, and within each subject country is
provided in the body of the advisory.
(2) Travel restriction. A travel restriction is a formal recognition that existing conditions
of crime, political or social unrest, guerrilla warfare, or terrorism in the country
warrant a strict limitation/avoidance of travel to, through, and within the subject
country. Explanatory notes are provided in the body of each restriction.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
You are correct if your response is "a travel advisory is a formal recognition that an upsurge in
crime, political or social unrest, guerrilla warfare, or terrorism has been observed within a
country." You may continue. If you answered differently, review paragraph 4101 before
continuing.
4-2
Try the next challenge.
limitation (or avoidance) of travel to, through, and within the subject country. Explanatory
Your answers should be formal, terrorism, strict. If you answered correctly, continue. If your
answer is different, review paragraph 4101 before continuing.
(1) Travel security advisory (TSA). The TSA is a standard administrative message
issued quarterly as an ALMAR from the Commandant. A TSA might also
incorporate changes to previous advisories concerning high or potential physical
threat countries, proscribed travel and special notice countries, or high risk airports.
The TSA provides the following information:
(a) Countries that are currently considered high physical threat countries by the
Department of Defense. In other words, these countries are considered to have
a critical threat level, especially for permanently assigned and resident U.S.
personnel.
(b) Countries that currently present a potential physical threat (medium threat
level).
(d) Special notice countries. The TSA lists special notice travel restrictions for
specific countries under the heading Special Notice Countries. An example
appears on the next page.
4-3
Example: Special Notice Countries.
Iraq: U.S. persons are subject to prolonged interview by the People's Bureau of
Tourism.
(f) Foreign cities reported by the Department of State (DoS) and other agencies to
have high levels of crime against property or persons, sometimes violent and
occasionally involving armed individuals or gangs.
(g) Select countries that are the subjects of Department of State Travel Warnings.
A DoS Travel Warning identifies
2. The problem that caused the issuance of the warning, such as war
conditions, rebel insurgency, violent demonstrations, or political unrest.
Note: A TSA is not limited to the terrorism threat alone; it will also include
information concerning the crime level in foreign countries and cities. You
should, at the very least, read the two most recent TSAs in your unit's ALMAR
file as part of your preparation for your overseas assignment. If your
dependents are accompanying you overseas, share the information with them.
(2) Anti-Terrorism Alert Center Summary (ATACSum). ATACSums are issued weekly
by the Navy Anti-Terrorist Alert Center. They provide a relatively detailed terrorism
threat assessment by geographic region, addressing the threat in each country within
the region. Each ATACSum evaluates the extent of the threat to personnel who are
(c) Stopping, that is, interrupting international travel on planes, trains, or ships to
resume travel by another mode according to a predetermined travel schedule
4-4
Review as many ATACSums as you can before your overseas travel. They are an
invaluable asset for determining the extent of the terrorist threat and they will help
you decide what protective measures to adopt while traveling to, through, or residing
in the country. An ATACSum can be classified or unclassified.
Note: Correspond with your new command before you report. Ask your sponsor to
provide information regarding the threat, protective measures recommended by
the command, and any other items that may interest you or your dependents.
Write or call your new command if you do not hear from your sponsor.
List the three principal sources used in determining whether a country or region is subject
to a travel advisory or travel restriction.
a. ____________________________ c. ____________________________
b. ____________________________
Your answers should be to review Travel Security Advisories (as ALMARs), to review
ATACSum, and to correspond with the command you are reporting to. If your answers are
correct, continue. If you answered differently, review paragraph 1201 before continuing.
Lesson Summary. In this lesson, you learned the Department of State and the Naval
Anti-Terrorism Alert Center are the two primary sources for travel warnings. You also know the
three principal sources available to Marines for gathering information on the terrorist threat or the
level of crime are a Travel Security Advisory (ALMAR), ATACSums, and correspondence with
your command. In the next lesson, you will learn to evaluate the threat.
4-5
Lesson Exercise: Complete items 1 through 3 by performing the actions required. Check your
responses against those listed at the end of this lesson.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
limitation (or avoidance) of travel to, through, and within the subject country.
3. List (in any order) the three principal sources you must use to determine whether a
country or region is subject to a travel advisory or travel restriction.
a. __________________________________________________________________
b. __________________________________________________________________
c. __________________________________________________________________
4-6
Lesson 1 Exercise Solutions
Reference
4-7
Lesson 2. EVALUATING THE THREAT
LEARNING OBJECTIVES
Now that you have established a basic familiarity with information that will help you in a possible
threat environment, you should begin obtaining more detailed information. You will use your
research skills at a local library or you may request information through your local Intelligence
Section (S-2), through your unit's Administrative Section (S-1), or with the assistance of your
new unit, through the Provost Marshal's Office (PMO).
As soon as you receive orders, you should begin gathering information about the region and the
country or countries you will be visiting. You should gain some familiarity with the area and the
differing social conditions that you and your accompanying dependents will encounter. Take time
to learn something about where you are going. The following are good sources for current
information:
1. Library
2. Newspapers
3. Magazines
4. Message traffic
5. Electronic bulletin boards
6. Even a tourist's guide, such as Fodor's, will provide useful information.
List (in any order) three of the six sources you should use in your personnel
research to become familiar with your host country's potential terrorist or criminal threat.
a. _______________________ c. _____________________
b. _______________________
If your answers (in any order) are any three of the following: newspapers, magazines, electronic
bulletin boards, tourist's guide books, or unit message traffic, you are correct. You may continue.
If your answers are different, review paragraph 4201 before continuing.
4-8
Now that you have established the sources of information that you will need in researching your
destination, you must now focus on the items that you should concern yourself with in
preparing for your tour of duty. You should focus on the following:
Your command, according to Marine Corps Order (MCO) 3302.1B, must provide an appropriate
threat and travel security briefing to all personnel who are departing the United States for
overseas locations. Armed with this fundamental knowledge from the command briefing and
through your research, you should then give serious consideration to the potential for crime and
terrorism in that country to identify and put into practice appropriate protective measures. So,
you now know where to look for the information and that your command will provide assistance
in your search.
List (in any order) four of the seven items you should include in your research when
preparing for a tour of duty outside the USA.
a. ____________________________________________________________
b. ____________________________________________________________
c. ____________________________________________________________
d. ____________________________________________________________
Your answers should be any four of the following (in any order):
Remember, you are the new person in the area and you should always keep this in mind as you
research. During your research, you should attempt to find as much information about the threat
as you can. Consider obtaining information about the following:
a. Identify existing terrorist groups. Are there any known terrorist, or "terrorism-using"
groups in the region? Which factions of the society that have acquired or demonstrated terrorist
capabilities? Are they well-organized, well-equipped, and well-led? The threat of terrorism is
greater in direct relationship with these factors. Which groups have used terrorism historically (in
the past)?
b. Determine the extent of popular support for the group(s). This will help you identify areas
within the country or region in which it may not be safe to travel. Over a period of time, popular
support for a terrorist group may decrease, particularly if the group becomes more isolated or if
its actions become more criminal in nature.
c. Determine if a specific nationality is targeted. What nationality does the group prefer to
target, if any? This is especially important if the terrorist groups in your area are trying to
overthrow the existing government which is supported by the United States. Find out which
groups have demonstrated a history of terrorism, especially against the United States and United
States interests in general or against United States installations or persons in particular.
Researching the history of these groups allows you to gain insight to the dynamics of their
operation and may help identify probable targets.
d. Determine the preferred method(s) of operation. What operating method does the group
prefer? What types of weapons, tactics, and methods does it favor?
4-10
Try the challenge.
Can you, without looking back, list the four topic areas discussed in evaluating the
existing threat? Write your answer in the spaces provided below.
a. ______________________________________________________________
______________________________________________________________
b. ______________________________________________________________
______________________________________________________________
c. ______________________________________________________________
______________________________________________________________
d. ______________________________________________________________
______________________________________________________________
Your answers (in any order) should be the following: a. Identify existing terrorist groups. b.
Determine the extent of popular support for the group(s). c. Determine if there is a specific
nationality targeted. d. Determine the preferred method(s) of operation. If your answers are
correct, continue. If you answered is differently, review paragraph 4202 before continuing.
You have learned to determine the threat using the four principal steps. You must use those steps
and the information that you have gathered to evaluate the extended threat. To do so, you must
gather enough information to
a. Obtain a record of the history of civil unrest. Gather any information that will indicate
unrest; including demonstrations, protest marches, rioting, clashes between ethnic groups, labor
strikes, etc.
4-11
(1) Political, social, or ethnic dissension; the people's concerns broadcast into the
political arena.
(4) Social or ethnic grievances that take on political overtones; this is frequently
evidenced by
(b) Organizing of meetings, rallies, marches and demonstrations; the actual cause
of such protests is overshadowed by political rhetoric heard there.
(e) Increasing recruiting by known front groups for terrorism-using and terrorist
organizations, as well as by usually nonviolent radical organizations.
c. Assign a threat condition based on the nature of the extended threat. (See lesson three for
more information.)
4-12
Try the next challenge.
The three steps (in any order) you must perform to evaluate the extended threat are
a. ______________________________________________________________
______________________________________________________________
b. ______________________________________________________________
______________________________________________________________
c. ______________________________________________________________
______________________________________________________________
Your answers (in this order) should be the following: a. obtain a record of the history of civil
unrest, b. obtain a record of developing conditions, and c. assign a threat condition based on the
nature of the extended threat. If your answers match, continue. If your answer is different,
review paragraph 4203 before continuing.
Lesson Summary. In this lesson, you have learned about the sources of information you must use
to assist you in building your knowledge of a country or region focusing on the terrorist/criminal
threat. In the next lesson, you will learn about the threat level or condition system and how you
can set a personal threat condition for yourself to use in conjunction with your personal terrorism
counteraction plan.
4-13
Lesson Exercise: Complete items 1 through 4 by performing the action required. Check your
responses against those listed at the end of this lesson.
1. List (in any order) three of the six sources you should use in your personal research to
become familiar with your host country in regards to terrorist or criminal threat.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
2. List (in any order) four of the seven items you should research when preparing for a
tour of duty outside of the U.S.A.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
d. _______________________________________________________________
3. List (in any order) the four topic areas in evaluating the existing threat.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
c. _______________________________________________________________
_______________________________________________________________
d. _______________________________________________________________
_______________________________________________________________
4-14
4. List the three steps you must take to evaluate the extended threat.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
c. _______________________________________________________________
_______________________________________________________________
4-15
Lesson 2 Exercise Solutions, continued
Reference
4-16
Lesson 3. ASSIGNING A THREAT LEVEL OR CONDITION
LEARNING OBJECTIVE
Note: The threat system discussed in this lesson is a description of the progressive
levels of the threat to United States military facilities and personnel as it is
published in MCO 5500.13.
4301. Identify the Basic THREATCONs Within the Threat Condition System
4-17
Table 4-1. Basic THREATCONs
Note: There is no direct relationship between the threat condition that may be
announced in an ATAC Summary, Travel Security Advisory, or Travel
Restriction and the THREATCONs discussed above.
4-18
Try the challenge.
Matching: For items 1 through 5, match the Threat Condition description in column 1 to
the Threat Condition in column 2. Place your responses in the spaces provided.
Column 1 Column 2
4-19
4302. Reacting to THREATCONs.
How you react to a THREATCON may vary. It depends on the security measures required to
take for a specific THREATCON. The security measures that must be implemented in
THREATCONs ALPHA through DELTA are fully described in appendix D, FMFM 7-14
Combating Terrorism. Table 4-2 provides a partial, simplified list of preventive measures that are
implemented under threat conditions ALPHA through DELTA. You may reference FMFM 7-14
if you desire additional information concerning security measures. For this lesson, however, focus
your attention on those identified in Table 4-2.
4-20
Table 4-2. Partial List of Security Measure for Threat Conditions
4-21
Try the challenge.
Your answer should be "d." If you answered correctly, continue. If you answered differently,
review paragraph 4302 before continuing.
As a Marine, you may be required to assign a THREATCON. If this happens, you must focus on
what is needed for the safety of those under your charge. When assigning the THREATCON,
you must focus only on the facts that you receive from a higher echelon. The initial information
that you receive may not require strict security measures. However, as the threat increases you
must make accommodation by imposing stricter security measures. The precautions will apply to
both workplaces and residences. As a part of your counteraction program, you should consider
implementing an informal threat condition that parallels the THREATCON system. Table 4-3
provides a comparison of a formal threat classification system and the threat levels.
4-22
Table 4-3. Threat conditions and threat levels
Situation: You have received orders to CENTCOM in Naples, Italy. You know from
your research that a revolutionary urban guerrilla group, known as the Red Brotherhood,
has a long history of terrorist actions against isolated police and military posts and
personnel in and around Naples. They have recently published a pamphlet calling for a
general demonstration against the United States for its involvement in peacekeeping
operations in Somalia. The last ATACSum indicated that surveillance activity of
Marine Barracks, Naples has been detected. The ATACSum assessed a low/medium
threat condition to permanently assigned U.S. personnel in Naples, and a low/low
condition to transient U.S. personnel. A TSA (medium threat) has been issued. Based
on this information and using table 4-3, answer the following.
________________________________________________________________
4-23
Your answers should be a. Medium and b. BRAVO. If your answer is correct, continue. If you
answered differently, review paragraph 4303 before continuing.
Lesson Summary. In this lesson, you learned to identify the basic THREATCONs within the
threat condition system; to identify security measures for the basic THREATCONs (ALPHA
----------------------------------------------------------------
Lesson Exercise: Complete items 1 through 8 by performing the action required. Check your
responses against those listed at the end of this lesson.
Matching: For items 1 through 5, match the Threat Condition description in Column
1 to the Threat Condition in Column 2. Place your responses in the spaces provided.
Column 1 Column 2
4-24
Complete item 6 by circling the letter of the correct response.
6. Which group of the following security measures are enforced when a BRAVO
THREATCON is set?
Based on the information provided in the following situation, complete item 7 by circling the letter
of the correct response.
Situation: You have received orders to CENTCOM in Naples, Italy. You know from
your research that a revolutionary urban guerrilla group, known as the Red
Brotherhood has a long history of terrorism actions against isolated police and
military stations and personnel in and around Naples. They have recently
published a pamphlet calling for a general demonstration against the United
States for its involvement in peacekeeping operations in Somalia. The last
ATACSUM which addressed the region indicated that surveillance activity (by
an unknown individual) of Marine Barracks, Naples has been detected. The
ATACSUM assessed a low/medium threat condition to permanently assigned
U.S. personnel in Naples, and a low/low condition to transient U.S. personnel.
A TSA (medium threat) has been issued. Based on this information, and using
the charts provided in paragraph 4303, answer the following.
a. None c. Medium
b. Low d. High
4-25
8. Which THREATCON should the Barracks Commander declare?
a. ALPHA c. CHARLIE
b. BRAVO d. DELTA
Reference
1. e. 4301
2. d. 4301
3. b. 4301
4. c. 4301
5. a. 4301
6. a. 4302
7. c. 4303
8. a. 4303
UNIT SUMMARY
In this study unit you learned about those agencies that release terrorism threat warnings and
travel advisories. You were able to identify types of information released by the Navy
Anti-Terrorism Alert Center, and how Travel Security Advisories are disseminated within the
Marine Corps. You are also able to use the information when evaluating existing and extended
threats. You have learned the sources needed to determine travel warnings. You know the
meanings of a travel warning and a travel restriction. You can identify those documents used to
announce travel warnings and restrictions. You have also learned to identify basic
THREATCONs within the threat conditions system. You can also identify THREATCONs
(ALPHA through DELTA). This study unit has also taught you to assign personnel threat levels
or threat conditions to a country or region. In the next study unit, you will learn to prepare for
assignment to a threat region. You are now ready for the unit exercise.
4-26
Unit Exercise: Complete items 1 through 8 by performing the action required. Check your
responses against those listed at the end of this study unit.
political or social unrest, guerrilla warfare, or terrorism has been observed within the
country. Travelers to or through that country should increase security awareness and
specific limitations regarding travel to, through, and within each subject country is
limitation (or avoidance) of travel to, through, and within the subject country.
3. What are the three principal sources used in determining whether a country or region
is subject to a travel advisory or travel restriction?
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
4. List (in any order) three of the six sources you should use in your personal research to
become familiar with your host country in regards to terrorist or criminal threat.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
4-27
5. List (in any order) four of the seven items you should include in your research of a
country or region.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
d. _______________________________________________________________
6. List (in any order) the four topic areas in evaluating the existing threat.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
c. _______________________________________________________________
_______________________________________________________________
d. _______________________________________________________________
_______________________________________________________________
7. List (in any order) the three steps you must take to evaluate the extended threat.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
c. _______________________________________________________________
_______________________________________________________________
4-28
8. Situation: You have received orders to CENTCOM in Naples, Italy. You know
from your research that a revolutionary urban guerrilla group, known as the Red
Brotherhood has a long history of terrorism actions against isolated police and
military stations and personnel in and around Naples. They have recently published a
pamphlet calling for a general demonstration against the United States for its
involvement in peacekeeping operations in Somalia. The last ATACSUM that
addressed the region indicated that surveillance activity (by unknown
individual/individuals) of Marine Barracks, Naples has been detected. The
ATACSUM assessed a low/medium threat condition to permanently assigned U.S.
personnel in Naples, and a low/low condition to transient U.S. personnel. A TSA
(medium threat) has been issued.
Column 1 Column 2
4-29
For item 14, circle the letter of the correct response.
14. Which of the following security measure(s) is/are enforced when a THREATCON
BRAVO is set?
Reference
4-30
Study Unit 4 Exercise Solutions, continued
Reference
4-31
STUDY UNIT 5
Introduction. So far, you learned what mental skills and knowledge you should have for
assignment in a threat region involving a terrorist threat. In this study unit, you will learn
what steps you must take to become physically prepared for such an assignment. If you
are a member of a unit that is currently part of a Unit Deployment Program (UDP), some
of what you will be assigned to learn is managed by the unit administrative section.
Although the following information is applicable in other scenarios, you should consider it
within the context that you could become a hostage as a result of a terrorist act.
LEARNING OBJECTIVES
1. Given a scenario, identify the appropriate personal legal documents you must possess
and terms you must recognize before assignment to a threat region.
a. Definition. A will is a legal statement describing your wishes concerning the distribution of
your property assets after your death.
b. Importance. Every Marine should have a current will that legally specifies the
distribution of his or her assets in case of death. This is true regardless of how much or little you
own. If you are married, it is especially important for both you and your spouse to each have a
will. Whatever expense and bother you incur for the preparation of even a simple will could be
very worthwhile and perhaps even pay large dividends when it is time to settle your estate. A will
that clearly states your wishes could save your loved ones the trouble and cost of repeated court
trips and legal costs.
c. Preparation. Since a will is a legal document, you can often do more harm than good by
preparing one yourself without the benefit of legal guidance. Many Marine Corps Base Legal
Offices offer assistance at no cost for the preparation of wills. If you decide to have your will
prepared by someone outside the Marine Corps legal services, you should select a qualified lawyer
to help you draft your will.
The next step is for you to choose an executor (male) or executrix (female). This is the person
who will "execute" or carry out the provisions of your will when you die. It is not wise to select
your executor/executrix based on sentiment. Remember, the person you select is going to decide
your affairs after you are deceased.
5-1
To help you decide, imagine that right now you are not able to handle your affairs because of a
serious medical problem. Ask yourself, "Who do I want to step in and take charge for me?" The
executor/executrix should be someone you trust and someone who has agreed to administer your
will. Have the person you select confer with your lawyer for a complete explanation of an
executor's/executrix's responsibilities and for answers to any questions.
d. Safeguarding. The original will should be located and arrangements made so your
executor/executrix will have access to your will upon your death. A sound approach is to have a
lawyer hold the will and then notify the executor/executrix when he/she is needed.
Note: Most people appoint their spouse as the executor/executrix. This is not always
the wisest choice. You must keep in mind that your spouse will probably have
many other problems to take care of when you die.
5-2
(Complete the statement by circling the letter of the correct response.)
3. The executor/executrix of your will is the person who
a. assists you in drafting the will.
b. assists the lawyer with the typing and distribution of your will.
c. will execute or carry out the directives of your will when you die.
d. will execute or carry out the directives of your power of attorney.
Your answers to these challenges should be as follows: 1. a., 2. c., and 3. c. If your answers are
correct, great! Continue with the lesson. If you answered differently, review paragraph 5101
before continuing.
b. Purpose. There are times in life when legal complications arise. During these times it is
very inconvenient or perhaps impossible for you to be there. A power of attorney allows an
individual to act as your trusted agent, or in legal terms, as your "attorney-in-fact" in the event
you are unable to be present for a legal transaction.
c. Types. The amount of power you want your attorney-in-fact to have determines the type of
power of attorney you will have drawn up. There are two types of power of attorney.
(2) Special (or limited). Gives power confined to the specific act(s) described, or for the
specific time frame indicated.
e. Safeguarding. Safeguard the actual power of attorney document as carefully as you would
a will. The original should be held by the attorney-in-fact.
5-3
Try these challenges.
Your answers to the challenges should be as follows: 1. b. and 2. c. If you answered correctly,
excellent! Now continue. If you answered differently, reread paragraph 5102 before continuing.
Lesson Summary. In this lesson, you learned which legal documents you should have drawn up
prior to assignment to a country where the threat of terrorism exists. Now you know that a will is
a legal document that makes known your wishes regarding distribution of your estate after your
death. You also now know that a power of attorney gives your attorney-in-fact the legal right to
act on your behalf during your absence. In the next lesson, you will learn what you should do to
become mentally prepared for assignment in a threat region. However, before continuing to the
next lesson, complete the following lesson exercise.
5-4
Lesson Exercise: Complete items 1 through 5 by circling the letter of the correct response.
Check your answers against those provided.
a. should only seek legal assistance if you have a large amount of assets.
b. should not distribute it to your executor/executrix.
c. can often do more harm than good by preparing one yourself without the
benefit of legal guidance.
d. should not use a lawyer who is a friend or friend of your family.
5-5
Lesson 1 Exercise Solutions
Reference
1. a. 5101
2. c. 5101
3. c. 5101
4. b. 5102
5. c. 5102
5-6
Lesson 2. PREPARE MENTALLY FOR ASSIGNMENT TO A THREAT REGION
LEARNING OBJECTIVES
2. Identify steps to take when preparing mentally for assignment to a threat region.
In this lesson, you will learn where to go and what to research as you continue to prepare yourself
mentally for assignment to a threat region. Researching and learning as much as you can about
the country to which you have been assigned is very beneficial. Being familiar with the country's
customs and people will make you confident and aware once you are in the country. You have
already learned what to look for when researching the threat of a region. Now, you will learn
what information you should focus on to develop a mental picture of the country, including its
people, the language, the economy, and the culture. In many instances, you will find that research
in one area will spill over into another. Conducting adequate research in all areas will allow you
to combine the pieces for a better picture of the region and any possible terrorist threat.
Knowledge is the key. Your current unit's intelligence (Intel.) section (S-2) is a good place to
start your research. They may even have reports already prepared that you could use. Most
intelligence shops have the U.S. State Department's "Background Notes." These are brief country
studies covering most of the world. Upon request, your S-2 representative can contact the local
Naval Criminal Investigative Service (NCIS) office and set up a brief for you, and possibly for
your dependents, on the terrorist threat for the area to which you have been assigned. Another
source of general information is the local library.
Three sources for information about the country to which you have been assigned are
Your answer should be "c." If you answered correctly, good! Continue with the lesson. If your
answer is different, review paragraph 5201 before continuing.
5-7
5202. Identify the Culture of the Country/Region
Your research into the culture of a country or region gives you insight about what to expect once
you get there. Your knowledge of the culture of your assigned country will give you some idea
about how you will be treated and how you should act as a Marine in that country. Okinawa is a
good example of how the changing culture, resulting from the changing economy, in an assigned
country can affect a Marine's life. In the late 1980's, Marines assigned to Okinawa were extended
many privileges by the Okinawans due to the relationship between the Japanese yen and the
American dollar. During the 1980's, the yen was weak against the American dollar so the average
Marine was considered fairly wealthy. However, in the 1990's, the reverse occurred. The dollar
is now weak against the yen. As a result, many Marines assigned to Okinawa are no longer
extended the preferential treatment enjoyed during the 1980's. To some, the changing relationship
between the dollar and the yen is a small concern in the big picture of life, but for Marines
assigned to Okinawa this has been very significant. Both economically, and more importantly,
culturally, the Marine in Okinawa felt a big impact.
At a minimum, your research into the country or region should include the following areas.
a. History. The more you know about the history of a country, the better off you are. The
history of a country influences how its people live and how they view foreigners. That means
you! Learn the country's history and you have an advantage which you can use to foster
friendships with the locals.
(1) Personalities. Research those individuals who were significant in the early
development of the country, including rulers, presidents, heroes, and political figures.
(2) Religion. Research religion. It often plays a significant role in history and can be a
catalyst for terrorism.
5-8
(3) Political parties. Research their impact on the country.
(4) Wars.
(5) Revolutions. Research for revolting groups that did not win. This could indicate
possible terrorist activity in the country.
b. Society. Research about the present day society will confirm what you learned during your
historical research and will allow you to build on it. You will be able to collect much of your
information from periodicals. Periodicals will provide the most up-to-date information about the
society today. Areas of particular importance include the following:
(1) Class/caste. Class/caste systems have in the past proven to be sources of conflict.
Typically, the people of lower classes/castes revolt against the more privileged.
(2) Politics. Research politics as they apply presently to the country and internationally.
(3) Religion. Research whether the religion of today is the same as in the past. Often it
may be the same religion, but a different sect or order.
(4) Customs/traditions. These include actions and ways that have been carried on from
one generation to the next and have become part of the culture. Knowing these can
ultimately assist you in avoiding terrorist situations.
(5) Economy. The economy of the country may be strong internationally, but the
people of the country may suffer due to foreign ownership of industries. Profit from
such industries does not always filter back into the country's economy. Sometimes
the opposite may be true. The country's economy flourishes because industries are
locally owned and operated, and the capital from the sale of products is returned to
the country's economy. Money is a strong incentive for terrorism.
c. Geography. The physical shape of the country's geography may not be as important to you
as the boundaries which separate the country from its neighbors. Often, the manmade boundaries
of a country are reason enough for a terrorist presence, particularly when there are people who
see themselves as having being wronged by, or weaker than, or subordinate to those who control
the land.
5-9
Try the following challenges to refresh your memory on what you have learned.
1. When researching the culture of a country, you should look at these categories:
a. politics, society, and religion.
b. history, society, and geography.
c. religion, economy, and agriculture.
d. customs and traditions, history, and geography.
2. What is the benefit of researching the country where you have been assigned?
a. It affords you the opportunity to visit all of the more interesting sights
once you are in the country.
b. It makes you an authority on the country.
c. It causes you to worry about what might happen once you are in the
country.
d. It allows you to develop confidence and become familiar with the country's
5-10
Your answers should be as follows: 1. b., 2. d., 3. a., and 4. d. If you answered correctly,
continue with the lesson. If you answered differently, review paragraph 5202 before continuing.
History has shown that when a foreigner is able to converse with the natives in the native
language, tensions are lowered. Face it, you may not be able to hide the fact that your skin or hair
is different, but you can do something about the language barrier. Although many Marines have
successfully completed uneventful tours in foreign lands without knowing the native language, it
is always a good idea to learn the language of the country where you are stationed.
If you are able to communicate with the local people in their own language, you are less likely to
become a victim of terrorist acts. By knowing the language, you will better understand what is
happening around you. This state of being is better known as "situational awareness." If you are
taken hostage, you will have a significant advantage if you can speak the language of your
captors. For the purposes of this course, two types of language are spoken in any country:
official (formal) and native.
a. Official language. The official language of any country is that which is spoken by the
formally educated and is used in writing. In the United States, this is referred to it as proper
English. If you are serious about learning the language, focus on the official language first. Once
you have a good understanding of the official language, you will naturally pick up dialects and the
native language. Many libraries have self-paced language tapes available to help you learn a new
language.
b. Native language. The native language is the language of the common man and is sometimes
referred to as slang. In most countries, this is the form of language you will hear most often and
is usually easier to learn because it is the language of the streets. In many cases, the native
language changes as the culture changes. If you and/or your dependents must live out in the
community with the local people, knowing the native form of the language will help you become
part of the community. Being part of the community helps build a bond between you and the
local people, which leads to acceptance of you and/or your dependents.
5-11
(Circle the letter of the correct response.)
a. the lower class/caste of the country and also what is used in writing.
b. the whole country but is not used in writing.
c. diplomats of the country only when they are dealing with U.S. citizens.
d. the formally educated and also what is used in writing.
4. Before you arrive in the country of your duty assignment, you should learn the
Your answers to the challenges should be as follows: 1. c., 2. d., 3. a., and 4. official. If you
answered all of the challenges correctly, great! Continue with the lesson. If any of your answers
are different, review paragraph 5203 before continuing.
Sometimes Marines become so involved in preparing for a deployment or assignment they forget
to consider their dependents. Your dependents, whether accompanying you or remaining behind,
require your consideration and as much information as you can provide them. If your dependents
are remaining in the United States, they will need an understanding and appreciation of the
circumstances and possible difficulties you may encounter in your new assignment.
This is especially true if you have been assigned to an area with an active terrorist threat. You
should provide your dependents the same information you receive. This information may come
5-12
from your unit or from other organizations outside your chain of command. At a minimum,
provide the following information to your dependents:
a. History of the country or region. Your dependents need to have the same background
information about the country as you have. However, you may receive information in briefings or
lectures that are classified. Of course, classified information should not be shared with your
dependents and others who do not have the appropriate security clearances.
b. The society of the country. Remember, information that interests you will probably interest
your dependents as well. For instance, both you and your accompanying dependents will want to
know the customs of your assigned country concerning treatment of children and women in the
society. Depending upon your assignment, it may prove very important for you and your
dependents to know the social rules governing such things as behavior and dress while in public.
c. Geography of the country. Your dependents should be educated about the geography of
the country. In particular, they should understand the boundaries of their newly assigned country.
This includes the roles, locations, and the types of boundaries--manmade, ethnic, and cultural.
d. Living conditions of the country. Your dependents should be briefed about the living
conditions for both the native population and for other Americans living in the country. This will
give them an idea of what to expect. They will be made aware of preparations they need to make
for life in this new environment. All this will help them adjust to unfamiliar conditions.
e. Linguistic abilities. Encourage your dependents to learn the fundamentals of the official
language of your newly assigned country. Explain to your dependents that it will be easier for
them to fit in and feel "at home" if they learn to communicate with the citizens of your host
country. Point out to your dependents that if they first learn a good, solid base of the official
language, once inside the country they will more easily pick up the native language.
1. What five areas should your dependents know prior to assignment to a terrorist
threat region?
2. While educating your dependents about the society of your assigned country, you
should pay particular attention to
3. When educating your dependents about the living conditions in a country, be sure
to tell them
Your answers to the challenges should be as follows: 1. c., 2. a., and 3. b. If your answers are
correct, good! Continue with the lesson. If you answered differently, review paragraph 5203
before continuing.
Lesson Summary. Now you know how to conduct the necessary research to become mentally
prepared for assignment to another country, particularly if that country has a terrorism threat.
You know where to go to start your research and which agencies will assist you. You also know
the type of information to research for both yourself and for your dependents. Before continuing,
complete the following lesson exercise.
5-14
Lesson Exercise: Complete items 1 through 12 by performing the action required. Check your
responses against those listed at the end of this lesson.
1. Which of the following lists three sources of information about the country to which
you have been assigned?
2. Which of the following should you look at when you research the culture of another
country?
5. What is the benefit of researching the country to which you have been assigned?
a. It affords you the opportunity to visit all of the more interesting sights once you
are in the country.
b. It makes you an authority on the country.
c. It causes you to worry about what might happen once you are in the country.
d. It allows you to develop confidence and become familiar with the country's
customs and its people, allowing you to become confident and more aware once
you are in the country.
5-15
6. When researching in preparation for assignment to a threat region, you should learn
some of the language used by the host country. Usually, there are two forms of the
same language. They are
a. the lower class/caste of the country and also what is used in writing.
b. the whole country but is not used in writing.
c. diplomats of the country only when they are dealing with U.S. citizens.
d. the formally educated and also what is used in writing.
9. Before you arrive in the country of your duty assignment, you should learn the
For items 10 through 12, circle the letter of the correct response.
10. What five areas should your dependents know prior to assignment to a terrorist threat
region?
5-16
11. While educating your dependents about the society of your assigned country, you
should pay particular attention to
12. When educating your dependents about the living conditions in a country, be sure to
tell them
Reference
1. c. 5201
2. b. 5202
3. a. 5202
4. d. 5202
5. d. 5202
6. c. 5203
7. d. 5203
8. a. 5203
9. official 5203
10. c. 5204
11. a. 5204
12. b. 5204
5-17
Lesson 3. PREPARE PHYSICALLY FOR ASSIGNMENT TO A THREAT REGION
LEARNING OBJECTIVE
Identify appropriate actions when preparing physically for assignment to a threat region.
In this lesson, you will learn to prepare physically for assignment to a threat region. This includes
physical fitness preparation, preparing appropriate civilian clothing, preparing personal items, and
medical preparedness.
It should go without saying that you should be in good shape prior to arriving in your assigned
country. Keep in mind that there is the possibility you could become a hostage. History has
shown that physically fit individuals taken hostage survived the ordeal better than others. They
were physically prepared for hardship. Once captive, they continued physical exercise to stay
alert and ease the stress associated with captivity.
Consider the following recommendations when developing a personal physical fitness program.
5-18
Fig 5-1. Sample of a conditioning program from FMFRP 0-1B.
5-19
b. Aerobic Conditioning. Aerobic conditioning involves exercises that build cardiovascular
endurance. Swimming, long distance running, and rope jumping are all forms of aerobic
conditioning. You may have the strength and the speed, but if you don't have the endurance, you
are only halfway to being physically fit.
Note: Even with a good program, becoming physically fit will take time. Do not let a
lack of time prevent you from starting your physical fitness program. Once you
have started, do not become discouraged if it takes time to develop and
maintain fitness.
1. What two areas of physical fitness should you develop and strengthen before
arriving in your assigned country?
Your answers to these challenges should be as follows: 1. d., and 2. a. If you answered correctly,
great! Continue with the lesson. If you answered differently, review paragraph 5301 before
continuing.
5-20
5302. Identify Appropriate Clothing
By applying the material you have gathered during your research, you should have a very good
idea of how you and your dependents should dress while in your assigned country. Keep the
following three basic considerations in mind as you leave the United States and go to your foreign
duty assignment.
a. Conservative clothing. Dressing conservatively will go a long way in helping you and your
dependents fit into the new environment of your host country. You should show pride in yourself
and in your country by dressing distinctively, but not flamboyantly. This is especially true when
you are on leave or liberty. You must remember that in some countries the focus is not on the
individual, but rather on the group. In those countries, it is more valued to fit in and be a member
of the group, a part of the whole. Often, in the United States, the opposite is true; standing out
as an individual is valued. You may see this difference in the way the people of your host country
dress. If it is a country that values group membership over the distinction of the individual, you
will see very little variation in the clothing of the native population. So, of course, if you dress in
your host country like you do in the United States, you will definitely be the center of attention,
which in this case means you will stick out like a sore thumb. Although being the center of
attention may be a positive thing in the United States, it goes against the custom and culture of
many countries that value the group over the individual. Your goal is to blend in with the local
population. You do not want to stand out. So, save your American finery for base during liberty
hours. Out in town, blend in as well as you can. Even with appropriate clothing choices, you will
stand out somewhat because certain things like mannerisms and language will clearly indicate to
others that you are a U.S. Marine or U.S citizen.
(1) Hats. While on liberty in a country, wear a conservative hat. Unless a large
percentage of the native population is wearing hats with logos of American sports
teams, cowboy hats, or other uniquely American-style hats, your best bet is not to
wear one of these.
(2) Shirts. As with the hats, unless the native population is wearing shirts with logos on
them, especially logos associated with the U.S., then you should not wear these
either. Do not wear shirts that depict vulgarity or obscenities. If the message on your
shirt could possibly be viewed by the native population as offensive, do not wear it.
(3) Belt buckles. In very few countries do the native people wear large belt buckles.
Usually large belt buckles are associated with Americans. In fact, if you wear a large
belt buckle, especially a highly visible one, you might as well wear a neon sign
flashing "American." As a representative of your country living and traveling in a
hostage threat region, are you sure you want to wear a large belt buckle?
5-21
As a general rule, your clothing should be conservative, present a positive image, and blend in
with the native population. Once you arrive in your host country, talk with Marines who have
time on station and follow their advice. Experience is the best teacher.
As a general rule, the way you dress when assigned to a country with a terrorist threat
should be
Your answer should be "c." If you answered correctly, continue with the lesson. If your answer
is different, review paragraph 5302 before continuing.
Lesson Summary. You now know that physical fitness is an important part of preparing for
assignment to a threat region. You have learned that anaerobic and aerobic conditioning are key
element in the development of physical fitness. Furthermore, you learned that by dressing
conservatively and presenting a positive image are techniques you can employ to blend in with the
populace of the country. Before continuing, complete the lesson exercise.
-----------------------------------------------------------------
Lesson Exercise: Complete items 1 through 3 by performing the action required. Check your
responses against those listed at the end of this lesson.
1. What two areas of physical fitness should you develop and strengthen before arriving
in your assigned country?
5-22
2. Even though progressive resistance training is considered anaerobic conditioning,
it is useful because
3. As a general rule, the way you dress when assigned to a country with a terrorist threat
should be
Reference
1. d. 5301
2. a. 5301
3. c. 5302
UNIT SUMMARY
In this study unit, you learned to prepare for assignment in a threat region. Now you know the
legal documents you should prepare. You know that having a personal will drawn up is important
to ensure your personal estate is settled according to your wishes upon your death. You know
that a power of attorney gives a trusted individual chosen by you the power to legally act on your
behalf in your absence. In addition to preparing physical documents, you must also prepare
mentally before arriving in a threat region. To do this, you now know where to start your
research and what information to look for, including the information your accompanying
dependents should have prior to their arrival in the host country. You also know how to prepare
your clothing, especially liberty attire, for your assignment in a threat region. You want to dress
for success. In this case, success means avoiding becoming a victim of a terrorist act.
In other words, you want to dress to survive. You learned that your clothing should be
conservative, present a positive image, and allow you to blend in with the native population.
In Study Unit 6, you will learn procedures to counteract a terrorist threat.
5-23
Unit Exercise: Complete items 1 through 20 by performing the action required. Check your
responses against those located at the end of this study unit.
For item 1 through 13, circle the letter of the correct response.
a. should only seek legal assistance if you have a large amount of assets.
b. should not distribute it to your executor/executrix.
c. can often do more harm than good by preparing one yourself without the
benefit of legal guidance.
d. should not use a lawyer who is your friend or a friend of your family.
5-24
6. Three sources for information about the country to which you have been assigned are
7. When researching the culture of a country, you should look at these categories:
8. What is the benefit of researching the country where you are being assigned?
a. It affords you the opportunity to visit all of the more interesting sights
once you are in the country.
b. It makes you an authority on the country.
c. It causes you to worry about what might happen once you are in the country.
d. It allows you to develop confidence and become familiar with the country's
customs and its people, allowing you to be confident and more aware once you
are in the country.
10. What areas should you consider when researching a country's society?
5-25
11. When researching in preparation for assignment to a threat region, you should learn
some of the language used by the host country. Usually there are two forms of the
same language. They are
a. the lower class/caste of the country and also what is used in writing.
b. the whole country, but is not used in writing.
c. diplomats of the country only when they are dealing with U.S. citizens.
d. the formally educated and also what is used in writing.
14. Before you arrive in the country of your duty assignment, you should learn the
For items 15 through 20, circle the letter of the correct response.
15. What five areas should your dependents know prior to assignment to a terrorist threat
region?
5-26
16. While educating your dependents about the society of your assigned country, you
should pay particular attention to
17. When educating your dependents about the living conditions in a country, be sure to
tell them
18. What two areas of physical fitness should you develop and strengthen before arriving
in your assigned country?
20. As a general rule, the way you dress when assigned to a country with a terrorist
threat should be
5-27
Study Unit 5 Exercise Solutions
Reference
1. a. 5101
2. c. 5101
3. c. 5101
4. b. 5102
5. c. 5102
6. c. 5201
7. b. 5201
8. a. 5201
9. d. 5201
10. d. 5201
11. c. 5202
12. d. 5202
13. a. 5202
14. official 5202
15. c. 5203
16. a. 5203
17. b. 5203
18. d. 5301
19. a. 5301
20. c. 5302
5-28
STUDY UNIT 6
Introduction. Your overseas assignment will take you to a country that has sociopolitical
and legal environments differing from those you have experienced in the United States.
With only a limited introduction to your host country, you may have to make hasty
decisions that will have an effect on your entire tour. In Study Unit 5, you learned the
safety and security procedures to use when traveling to a threat region. In this study unit,
you will learn protective measures that you and/or your family should practice when
stationed in a threat region.
LEARNING OBJECTIVES
1. Given a scenario involving visiting or being stationed in an area with a terrorist threat
and a list of security measures, state those measures you would use in selecting living
quarters.
2. Given a scenario involving your being stationed in an area with a terrorist threat and a
list of security measures, state those measures you would use in hardening your
personal residence.
Studies have shown that by simply avoiding routines and varying when, where, and how you do
daily tasks will reduce your chances of becoming a victim. In the last lesson, you learned safety
and security procedures you should use when traveling to a threat region. In this lesson, you will
learn safety and security measures that you should use when selecting a residence in a threat
region. In addition, you will learn those measures to consider for strengthening your personal
residence against possible criminal/terrorist actions.
At least half of your time is spent in and around your residence. Almost everything you do from
day to day starts or ends in the vicinity of your home. Thus, there are a number of aspects to
consider when selecting the location of your residence. In any case, you should obtain preliminary
information from reliable individuals who are familiar with the area and know which
neighborhoods are secure. Usually, this information can be obtained from the Unit Security
Officer, the Embassy Administrative Officer, the local housing office, or Marine personnel
currently assigned to the area. In some instances, you will have no choice of the quarters in which
you will live. You may be assigned specific quarters occupied by your predecessor, or that have
been designated, based on rank or position. In other instances, the quarters may be government
owned, or someone in the unit may have previously arranged a rental or lease to save you time in
getting settled. In any event, you should begin your consideration of residential security by
learning all you can about the neighborhood.
6-1
a. Neighborhood check. If quarters have not been pre-selected for you, determine through
your office or through the unit where potential quarters can be found. The best way to become
familiar with a neighborhood is on foot. Walking around enables you to get a good view of the
entire neighborhood. Pay particular attention to
(1) The streets including their width, whether paved or unpaved, maintenance, number of
vehicles parked on the street, and vehicular traffic patterns
The types of residences in the area will give you some idea of the income level of the
neighborhood. Families with similar income levels frequently share similar lifestyles and this
enhances rapport among neighbors. Note the overall security precautions that people are taking
in that neighborhood. Barred windows security fences, extensive lighting, large dogs, and guards
(particularly during the day) may be indicators of a high crime level in the area. As you conduct
your neighborhood check, try to keep a mental image of the neighborhood in relation to the rest
of the city or town. An area map is of considerable benefit. Once you have looked at the
neighborhood, you should consider its proximity to police and fire-fighting facilities, hospitals,
shopping facilities, and your place of work. Familiarize yourself with the routes to all locations
that you will frequent to ensure that you will be able to cope with any emergency that may arise.
b. Crime level. The level of crime or terrorist activity throughout a community is not uniform.
Street crimes can be expected to occur in areas that are used as residences for lower income
families where conditions include crowding and congestion. The overall crime rate can be
expected to be high in downtown or commercial areas as well as in isolated areas. It is
recommended that you avoid these areas. Personnel in your unit should be aware of local crime
levels in the various areas of the community; if not, the unit security officer should have the
information or be able to obtain it from local police or higher headquarters counterintelligence
representatives.
c. Police security capabilities. Unit security personnel should be able to provide an assessment
of police protection available to you in a given area. Your observations of police patrol activity
made during your neighborhood check, or the absence of such patrols, provides a good indication
of the degree of police protection available. Police who take pride in their appearance and the
appearance of their vehicles and who make themselves visible to the public in the performance of
their duties can usually be relied upon to provide dependable police coverage throughout the
community.
6-2
One factor worthy of consideration is the attitude of the government and the populace toward
other nationals, particularly Americans. A strong anti-American attitude should cause you to have
diminished faith in effective local police response.
d. Utilities services and protection. The reliability of utilities service in any given location
should be a primary factor in the selection of a residence. In many under-developed countries,
electricity, running water, indoor plumbing, and telephone service are either unavailable,
unreliable, or in the process of just being provided. The reliability of utilities should be
determined, and in cases where they are determined to be inadequate, you should consider using a
backup system. Disruption of utility services (particularly electricity and telephone) would
facilitate an intruder's ability to gain access to your residence. Consider then, the locations of
terminal boxes and wiring. If they are outside of the house or outside of perimeter fencing and
readily available to an intruder, you should consider security precautions, backup systems, or
another residence.
e. Fire protection. A variety of factors must be considered in determining the degree of fire
protection you may need in a particular residential area. Primary among those factors is the
construction of the residence itself. You should determine if the materials used in construction
are easily combustible, the dependability of the electrical wiring and fixtures, and how many and
what type of exits there are in case of fire. Smoke detectors and fire extinguishers may be
necessary items, as well as some means of getting out of upper story windows. The proximity
and effectiveness of the fire department is a major consideration. You should determine the
availability of water or other substances to fight a fire. You should note the locations of fire
hydrants or other water sources.
g. Access routes. Consider available access routes. Ask yourself these questions. Are there
access routes in the vicinity of your residence and where is the greatest danger to your exits? An
examination of statistics of kidnapping and assassinations has shown that the vast majority occur
close to the residence when the victim is leaving or returning home. It is essential that access
routes to and from your residence provide sufficient alternatives that you can avoid ambush or
attacks. Having the ability to leave or enter your home from at least two points will significantly
compound the problem of planning an ambush. In most cases, this variable will force the
terrorists to select an easier target. Some considerations should include the following:
6-3
(1) Clear delineation of street or roadway.
(2) Sufficient width to allow two cars to pass, even if vehicles are parked on both sides of
the roadway.
(4) Unobstructed view of the road from your residence. The most important of all
considerations when reflecting on access routes is to select a residential location that
will not lock you into predictable patterns. Specifically, it is essential to avoid
locating on a dead-end or one-way street. Locations such as these provide the
terrorist with the ideal opportunity for an ambush that would be almost impossible for
you to avoid.
(h) Parking. In selecting your residence, consideration must be given to securing your
personal property. Included in the personal property to be protected are your various means of
transportation. Bicycles, motorcycles, mopeds, and other two-wheeled vehicles are usually
relatively easy to secure. Often they will fit into a storage shed, or they can be locked close to the
residence where they can be observed. The family car, and in some cases, official vehicles that
have been approved for transportation between home and office, present another problem.
Ideally, a garage that can be locked is the most suitable means of securing your vehicles when not
in use. Often; however, this luxury will not be available to you. Carports and driveways within a
fenced or guarded area will normally suffice. At the least, some means of parking off the street
must be considered.
6-4
Check to see how much you remember by completing this challenge.
List (in any order) the eight security considerations for selecting a residence.
a. _____________________________________________________________
b. _____________________________________________________________
c. _____________________________________________________________
d. _____________________________________________________________
e. _____________________________________________________________
f. _____________________________________________________________
g. _____________________________________________________________
h. _____________________________________________________________
Your answers should include the following: neighborhood check, crime level, police security
capabilities, utilities services and protection, fire protection, environmental considerations, access
routes, and parking. If your answer to the challenge is correct, continue. If your answers are
different, review paragraph 6101 before continuing.
As stated earlier, over half of your time is spent in or around your residence. Based on this fact
alone, you can reasonably conclude that you should make your residence as secure as possible, or
at the very minimum, as secure as is allowed. The physical deterrents that are addressed may not
be practical for all circumstances; however, they are included for your benefit should you need
them. The following deterrents will provide for your safety when properly used.
a. Locks. The first line of defense in building or improving on physical security of a structure
is through the use of locks or locking devices. Locks are delaying devices that are designed for
perimeter security. Intruders cannot take the risk of creating loud noises in an attempt to defeat
or break locks, nor can they afford the time needed to pick or decode them.
6-5
b. Doors. Door security is only as good as the construction of the door and frame. The
following are four types of doors:
(a) Hollow-core. These doors are made of two sheets of thin veneer overlaying
hollow cardboard strips.
(b) Solid-core. These doors are made of two sheets of wood veneer overlapping a
solid wooden core.
Note: Solid core doors provide a substantial security advantage over hollow core
doors.
Note: It is practically a given that you will not be able to replace the door of your
residence with a metal door.
(4) Sliding glass doors. These doors provide easy access to a residence but pose a
complex security problem. To secure sliding glass doors you must first consider them
as extremely large windows. Just like windows, they are designed with little or no
consideration for security. Many factors affect our ability to secure this type of
entrance. It is not enough to prevent them from being moved horizontally, you must
secure them vertically as well. The channel in which the door rides provides wide
tolerances and facilitates the vertical lifting of the door out of its channel. You may
overcome this by inserting sheet metal screws into the upper channel and allowing
them to protrude far enough to prevent the door from being lifted out of the channel.
The easiest method to ensure the door cannot be opened from the outside is to drill a
small hole through the channel and the frame and insert a pin or nail to prevent the
door from being opened. Figure 6-1 illustrates this upgrade.
6-6
Fig 6-1. Locking and anti-lift devices for sliding glass doors.
Try the following challenges to see how much of the information you remember concerning the
types of doors.
doors.
6-7
(Fill in the blanks)
4. The simplest measures to prevent a sliding glass door from being lifted out of
______________. Insert a pin or nail to prevent the door from being opened.
Now that you have been introduced to the four types of doors and how to secure a sliding glass
door, you should focus your attention on how to secure other types of doors. To secure an
existing door, you should concentrate on the following:
(5) Striker plates. A secure lock is only as good as the striker plate it engages. A close
fit between the lock and the striker plate reduces door movement when the door is
closed. Figure 6-2 illustrates the striker plate fit on the door frame. If the striker
plate is not securely affixed to a sturdy door frame, it is easily forced apart.
6-8
(6) Hinges. The security value of the hinge is often overlooked. A well-secured hinge
prevents forcing a door out of its frame. If you consider upgrading you should also
consider whether the hinge is on the inside or the outside of the door. If the hinge
pins are on the outside of the door they can be removed and the door removed from
the frame. There are a number of ways to overcome this. One is to weld the hinge
pins at both ends or in the middle while they are still in the hinge. This procedure is
effective, but permanent. Another way is to drill a small hole through the hinge and
hinge pin while they are together and inserting a small finishing nail flush with the
surface of the hinge. Another method requires you to insert two large screws into the
door or the jamb, leaving the heads exposed to fit into corresponding holes in the
jamb or door when the door is shut. Figure 6-3 illustrates the exposed screw
upgrade.
6-9
(Fill in the blank)
2. One method of securing hinges is to weld the ends. This method is effective, but
_____________________________.
3. Another technique for securing door hinges is to drill a small hole through the
4. Another technique for securing door hinges requires inserting two large screws
in the door (or jamb) and leaving the screw head exposed 1/2 inch. Drill a
________________ hole on the opposite side so the screw head fits into the
Your answers to the challenges should be as follows: 1. striker plate, 2. permanent, 3. insert,
and 4. corresponding. If your answers are correct, continue. If you answered any of the
challenges differently, review paragraph 6102 before continuing.
c. Windows. Windows pose more security problems than doors in that they are designed with
little or no thought of security. Intruders avoid breaking glass because of the noise that it causes
and the potential injury that they may incur. That leaves the intruder no choice but to defeat the
windows locking device. The following are several security measures you can employ to upgrade
window security.
6-10
(1) Sash and frame pin. The simplest measure to upgrade window security is to drill one
or more holes through the sash and frame and insert a pin or nail to prevent the
window from being opened. Figure 6-4 illustrates the sash and frame pin technique.
Fig 6-4. Sash and frame pin technique for upgrading window security.
(2) Key-operated locks. Key-operated locks are of two types. The first is installed as a
part of the window and replaces the standard window lock. The second type secures
to frame, blocking the raising or sliding of the window.
Note: Key-operated locks pose a safety hazard should the window be needed for
escape in an emergency.
(3) Steel bars, mesh, or grillwork. The use of this type of upgrade is usually of a more
permanent type with the bars, mesh, or grillwork being permanently fixed to the
structure. Steel bars, mesh, or grillwork, although the most secure, are expensive and
may prevent emergency exit.
6-11
Try the challenge.
List (in any order) the three recommended methods for upgrading the security of
windows.
a. ______________________________________________________________
b. ______________________________________________________________
c. ______________________________________________________________
Your answers (in any order) should be sash and frame pin, key-operated locks, and steel bars,
mesh or grillwork. If your answers are correct, continue. If your answer is different, review
paragraph 6101 before continuing.
d. Lighting. Using lighting as a type of security is most effective. Most intruders will do
anything they can to escape visual detection. Therefore, they will choose to strike at a time when
the residence appears vacant and preferably dark. Outdoor lighting can be a major deterrent
against intrusion. Properly used it discourages criminal activity and increases observability. The
following are considerations you should make when upgrading the security of your residence:
(1) Coverage and evenness of lighting. Coverage and evenness of lighting are important
elements of protective lighting. It is entirely possible in some residential settings that
existing street lights, along with one or two porch lights will provide sufficient
illumination. Usually, additional lighting is required to provide good coverage. The
type of lighting to be used, the locations of the lighting, and the wattage will be
dictated by the type of residence in which you live, the amount of masking by trees
and shrubbery, and other security lighting in the area.
(2) Consistency with other residences. The use of security lighting should be consistent
with other houses in the area. While good lighting is a deterrent to intruders,
lighting in excess of that elsewhere in the vicinity would make your residence stand
out and highlight your presence.
6-12
Try the challenge.
List the two considerations for the use of lighting as a security measure for a residence.
a. ______________________________________________________________
b. ______________________________________________________________
Your answers should be (in any order) coverage and evenness of lighting and consistency with
other residences. If your answers are correct, continue. If you answered differently, review
paragraph 6102 before continuing.
(1) The system should be capable of operating on the local AC electrical current and have
a rechargeable battery backup.
(2) The system should be relatively easy to install and troubleshoot. Many local
electricians may not be capable of installing or repairing a complex system.
(3) The system should have a time delay feature to allow the occupant to arm or disarm
the system without activating the alarm.
(4) The alarm system should have a closed circuit capability for the perimeter contact
switches. This provides line security if the line is cut and will put the system into an
alarm condition.
(5) The system should be capable of being wired for a panic switch.
6-13
Note: In some circumstances you will not have a choice as to whether you will or will
not have an alarm. Alarms are included in this lesson to give you as many
options as possible when developing your countermeasures plan.
1. List (in any order) two security measures used to improve the security of your
residence.
a. _________________________________________________________
b. _________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
____________________________________________________________
3. Choose the feature not recommended for consideration when selecting an alarm
system. The system should
6-14
Your answers should be as follows: 1. lighting and alarms, 2. (Words to the effect of) "In areas
abroad where forced entry of a residence is commonplace or where an active terrorist threat is
present, consideration should be given to the use of a residential alarm system," and 3. "c." If all
of your answers are correct, you may continue. If you answered any of the challenges differently,
review paragraph 6102 before continuing.
A variety of animals have been used in the past as living alarms and security protection systems.
Geese, ducks, and monkeys can be depended on to make a noise when disturbed, but the most
commonly used animal has been the dog.
a. Alertness. The dog's greatest security asset is its alertness. The dog's senses are far more
developed than those of man. For example a dog's sense of smell is one hundred times greater
than that of a human; therefore a dog can discriminate between odors more effectively than a
human. A trained dog can detect an intruder's scent in excess of 250 yards. A dog's ability to
hear surpasses a human's in both range and pitch. The dog's upper frequency limits are twice that
of man. A dog's sense of sight and touch are for the most part no greater than that of a human.
The general consensus is that a dog's vision is weaker than man's. However, dogs are more
sensitive to movement despite other visual failings.
b. Audible alarm. The dog's sensitive and discriminating senses of smell and hearing enable it
to quickly detect a stranger who is not normally present in the residential area, and a
well-trained dog will normally bark when approached by an intruder. Based on this, the dog can
be considered an "audible alarm" system.
c. Canine considerations. If you do not own a dog but plan on getting one only to provide
security, there are several factors you should consider.
(1) If you are not an animal lover, you should consider an alternative means of
security. Dogs thrive on affection and respond best to direction and training when
they are aware of that affection from the owner. A dog that receives no petting or
praise and that is not permitted to associate with the owner's family may be prone to
incessant barking or howling.
(2) In selecting your dog, consider smaller, non-shedding dogs for apartments or houses
where the dog will be kept inside.
(3) Dogs require plenty of water (fit for human consumption) and a well-balanced diet.
Discourage others from feeding your dog and train it not to accept food from anyone
except members of the family.
(4) Dogs need ample exercise. Your dog should have free run of your yard. If it does
not have the run of the yard, it should be taken out on a leash for a walk at least daily.
6-15
(5) A warning sign on your fence, both in English and the language of the country, to
"Beware of dog" will discourage unwanted visitors such as salesmen, peddlers, or
beggars.
a. Size c. Aggressiveness
b. Speed d. Alertness
Your answers to the challenges should be as follows: 1. d and 2. d. If you answered differently,
review paragraph 6103 before continuing.
a. Education. Children are an easy target for terrorists because of the inherent trust most
children have in people. Although our society has, in the past few years, stressed the importance
of parents training their children not to trust or even talk to strangers, there are certain security
measures you can take to further ensure your child's safety and prevent him or her from being
used in a terrorist operation.
Note: Although what you will learn has been designed with a terrorist threat in mind,
the security information will serve in many situations to protect a child from
becoming the victim of a criminal act.
6-16
(a) Avoid isolated streets and play areas.
(2) Check. Ensure school officials will release your children only to responsible
known members of the family or verified designees.
(3) Consider.
(d) Requesting your local provost marshal conduct a home security survey or
obtain a home security checklist from the military police.
1. List (in any order) three of the six security measures a child should be advised of.
a. _________________________________________________________
_________________________________________________________
b. _________________________________________________________
_________________________________________________________
c. _________________________________________________________
_________________________________________________________
6-17
(Circle the letter of the correct response)
2. What should you ensure school officials do in providing security for your
children?
Your answers to the challenges should be as follows: 1. (Any three of the following in any order)
Avoid isolated streets and play areas, Travel and play in groups, Never answer a stranger's
questions, Keep family members informed of their whereabouts, Report immediately all attempts
to question, annoy, or molest them, and note all information possible about unusual incidents, 2.
c, and 3. b. If your answers are correct, continue. If any of your answers are different, review
paragraph 6104 before continuing.
Lesson Summary. In this lesson, you have learned to select a residence in a terrorist threat
environment and to improve or harden the security of your residence. You now know special
considerations you should take to ensure the security of children in a threat environment. In the
next lesson, you will learn procedures you must use to maintain a low profile, traveling tips, auto
safety tips as they relate to terrorist countermeasures, and personal protection measures. In
addition, you will learn security procedures to be used in the workplace. Complete the lesson
exercise before continuing with Lesson 2.
6-18
Lesson Exercise: Complete items 1 through 18 by performing the action required. Check your
responses against those listed at the end of this lesson.
1. List (in any order) the eight security considerations for selecting a residence.
a. ____________________________________________________________
b. ____________________________________________________________
c. ____________________________________________________________
d. ____________________________________________________________
e. ____________________________________________________________
f. ____________________________________________________________
g. ____________________________________________________________
h. ____________________________________________________________
For items 2 through 9 fill in the blanks with the correct responses.
doors.
4. Sliding glass doors are actually extremely large _______________ and provide
6. One method of securing hinges is to weld the ends. This method is effective, but
______________________________.
6-19
7. Another technique for securing door hinges is to drill a small hole through the
8. Another technique for securing door hinges requires inserting two large screws in the
door (or jamb) and leaving the screw head exposed 1/2 inch. Drill a
9. The simplest measure to prevent a sliding glass door from being lifted out of its
______________. Insert a pin or nail to prevent the door from being opened.
10. List (in any order) the three methods of upgrading the security of windows.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
11. List (in any order) two things you should consider concerning additional lighting
when improving the security of your residence.
a. _______________________________________________________________
b. _______________________________________________________________
12. List (in any order) two security measures you should use to improve the
security of your home.
a. _______________________________________________________________
b. _______________________________________________________________
6-20
13. List (in any order) the circumstances in which the use of an alarm is recommended.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
For items 14 through 16 circle the letter that corresponds to the correct response.
14. Choose the feature that is not recommended for consideration when choosing an
alarm system. The system should
a. Size c. Aggressiveness
b. Speed d. Alertness
16. Why should a dog be considered an "audible alarm?" A dog can be trained
6-21
17. List (in any order) three of the six security measures a child should be advised of.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
c. _______________________________________________________________
_______________________________________________________________
For item 18, circle the letter that corresponds to the correct response.
18. What should you ensure school officials do in providing security for your children?
6-22
Lesson 1 Exercise Solutions
Reference
6-23
Lesson 2. DAILY PREVENTIVE CHECKS AND COMMUTING TIPS
LEARNING OBJECTIVES
1. List five of the nine steps a Marine must use to maintain a low profile.
2. List five of the eight travel precautions a Marine must use when traveling to a threat
area.
3. Recognize six of the twelve auto safety tips a Marine must use.
4. List five of the nine personal protection measures that must be used in a threat region.
5. Identify the four security procedures a Marine must use in the workplace.
In this lesson, you will learn the necessities of keeping a low profile when in a possible terrorist
threat region. You will learn what travel tips to use when traveling to a terrorist threat region,
auto safety tips, personal protective measures, and security procedures for use in the workplace.
Generally speaking, it is a good idea to blend in with the populace when you are in a foreign
country. This becomes even more of a necessity when you are stationed in a terrorist threat
region. As part of your terrorist countermeasure plan you must apply the following steps to
maintain a low profile:
a. Blend into surroundings. Attempt to blend into your surroundings. As Marines, our
customs and habits tend to give us away. Some of our behavior, which may be accepted in the
United States, will not go over well in other countries. For example, Americans when traveling
overseas have tendency to be boisterous and high-spirited, drawing attention to themselves. With
the increased terrorist threat, it is important that we learn to blend in with our surroundings like a
chameleon. As unofficial "ambassadors" for our country, we do not need to be labeled as "ugly
Americans," another reason to be quiet and discrete and to avoid being loud or obnoxious.
b. Avoid showing off material wealth. Marines using U.S. currency can help terrorists to
identify those Marines as Americans. So, exchange your money into the local currency.
c. Drive an inconspicuous vehicle. Try to use the type of car that is common to the area.
Avoid special license plates, rank or courtesy designations, and luxury cars.
d. Unmarked parking space, vary parking. Changing parking spots at the work place and at
your residence can mean the difference between freedom or captivity in a people's prison, or even
as drastic as life or death. A little walking to get to your place of employment is not going to kill
you, while parking in the same spot every day might.
6-24
e. Do not place your name on vehicle or residence. There is no sense in making a terrorist's
job any easier by telling him who you are.
f. Unlisted phone number. Maintain an unlisted phone number and do not give it out
indiscriminately.
g. Avoid publicity. Once again, if you are highlighted in a crowd or identified as an American,
it makes the terrorist's job much easier. If you are already in the public eye and there is a terrorist
incident involving you, media coverage may be at a higher level, giving the terrorist free and
increased publicity.
h. Restrict personal information. Personal information about your home, car, family, security
efforts, and other activities should be known only by your immediate family, friends, and security
personnel and then only on a need-to-know basis.
The low profile steps are not difficult, they just require you to tone down what you do. Before
continuing, try this challenge.
List (in any order) five of the nine steps to maintain a low profile.
a. ________________________________________________________________
________________________________________________________________
b. ________________________________________________________________
________________________________________________________________
c. ________________________________________________________________
________________________________________________________________
d. ________________________________________________________________
________________________________________________________________
e. ________________________________________________________________
________________________________________________________________
6-25
Your answers to the challenge should be as follows: (any five of the following, in any order)
blend into surroundings, avoid showing off material wealth, drive an inconspicuous vehicle, use an
unmarked parking space, vary parking, do not place your name on vehicle or residence, use an
unlisted phone number, avoid publicity, restrict personal information, avoid establishing daily
routines. If you named any of the five and in any order, continue. If you answered differently,
review paragraph 6201 before continuing.
While traveling, there are eight precautions you should use to help you and your family avoid
possible terrorist attack. Your understanding and practice of the following can minimize the
likelihood that terrorist attacks can successfully be carried out against you or your family.
a. Avoid routines while traveling. The best way to prevent becoming a target of a terrorist
attack is to be unpredictable. As you learned earlier in the course, terrorists usually make
reconnaissance missions before hitting a target. By varying when, where, and how you travel, the
job of establishing a good time and place for an attack becomes very difficult for a terrorist.
b. Gain knowledge of the language. Learn as much of the language as you can. Learn how
to state your name, rank, and serial number, to state that you are an American citizen, or to ask
for a representative from the United States Embassy, a doctor, or for other assistance.
d. Avoid dangerous situations. Avoid isolated roads, danger areas, civil disturbances, and
crowds.
e. Be alert and aware. Be alert and aware of anyone who appears to be following you.
Warning: If you are being followed, do not antagonize the individual; quickly move to
a safe haven and report the incident when it is safe to do so.
f. Keep emergency numbers handy. Keep emergency numbers handy and always have exact
change for a phone call--an emergency call may not be free in other countries. In some countries,
calling may be difficult due to the limited availability of telephones.
g. Keep your command and family constantly aware of your location. Ensure they know your
arrival and departure from all locations should an emergency arise.
h. Ensure all of your personal matters are in order. Whenever you travel overseas or in a high
threat area, ensure that all your personnel matters are in order (for example, wills, insurance,
power of attorney, etc.). This will not prevent a terrorist attack, but if one does occur, it will
ensure that your family is taken care of, giving you one less worry while you are being held
captive.
6-26
Try the following challenge.
List (in any order) five of the eight travel security precautions.
a. _____________________________________________________________
_____________________________________________________________
b. _____________________________________________________________
_____________________________________________________________
c. _____________________________________________________________
_____________________________________________________________
d. _____________________________________________________________
_____________________________________________________________
e. _____________________________________________________________
_____________________________________________________________
Your answers should be as follows: (any five of the following, in any order) avoid routines while
traveling, have a working knowledge of the language, travel in groups, avoid dangerous
situations, be alert and aware, keep emergency numbers handy, keep your command and family
constantly aware of your location, ensure all of your personal matters are in order. If you named
any five and in any order, continue. If you answered differently, review paragraph 6202 before
continuing.
History has shown that the majority of terrorist assassination or kidnapping attacks have taken
place while victims were in a travel status. Marines will be most vulnerable when entering or
leaving quarters or their place of work. Drivers are usually preoccupied with driving, talking to
passengers, or listening to the radio. They are often not alert to any indications of trouble but it is
during these periods that drivers should be most alert for signs of surveillance or possible attack.
Varying the time and route of your travel are two important measures you should take to protect
yourself against terrorist attack while in a transient status. Where possible, use different doors or
gates when departing or leaving the home or office. If a secured parking area is not available, you
should vary or rotate your parking places. Persons assigned government vehicles should trade off
with other people in the office to avoid using the same car every day. Doing
6-27
this will confuse any terrorist who may be trying to target a particular individual. The following
are twelve auto safety tips:
a. Always keep your vehicle in good mechanical condition and your gas tank at least half full.
b. Always check over your car before getting in (detailed search techniques are outlined in
figures 6-5 through 6-12).
c. Drive with car doors locked and windows closed. Secure your car when it is unattended.
e. Memorize the location of safe havens along your regular routes. Police and fire stations, or
any busy place are excellent havens.
f. Do not stop for accidents or other problems you may witness or encounter. Terrorists will
take advantage of your instinctive reaction as a Marine to help others. To avoid this danger, you
may want to drive away to a phone and call for assistance.
g. If you are involved in a minor accident and feel there is imminent danger to you or your
passengers, drive away, assess the damage at a public location, and report the accident from there.
i. On multi-lane highways, drive in the center lane to make it more difficult to force your car
to the curb.
j. If you face a suspicious blockade, avoid it by driving in the opposite direction. Be prepared
to escape by going around the obstacle or by ramming it.
k. Avoid driving close behind other vehicles or in any situation where you can be "boxed in."
l. If you must leave your car keys with an attendant, leave only the ignition key.
Fig 6-5. Two-man search. Fig 6-6. Divide car into sections.
6-28
Fig 6-7. Front inspection. Fig 6-8. Side inspection.
Fig 6-11. Engine compartment inspection. Fig 6-12. Passenger compartment inspection.
6-29
Try the challenge.
(Multiple choice)
For each statement below, circle "a" if it is an auto safety tip and "b" if it is not.
2. Always keep your vehicle in good mechanical condition and your gas tank at least
half full.
4. Travel in groups.
5. Drive with car doors locked, windows closed and secure your car when unattended.
8. If you are involved in a minor accident and feel there is imminent danger to you or
your passengers, drive away and assess the damage at a public location
9. On multi-lane highways, drive in the center lane to make it more difficult to force
your car to the curb.
6-30
Your answers should be as follows: 1. b, 2. a, 3. a, 4. b, 5. a, 6. a, 7. a, 8. a, and 9. a. If
your answers to the challenge are correct, continue. If you answered differently, review
paragraph 6203 before continuing.
The special protective measures you and your family take should be based on the threat. You
should understand that all the precautions below may be exaggerated for certain situations. To
establish the degree that they apply to you, contact your unit security officer for an evaluation of
the threat each time you move, travel, or change assignments. Too much security is better than
too little.
a. Avoid public transportation. Avoid using public transportation when possible; however,
buses and trains are preferable to taxis.
b. Travel with unmarked luggage. Luggage should not have markings linking you to the U.S.
Government or specifically identifying you as an American.
d. Avoid hotel paging. There is no reason for you to walk into a terrorist trap or to announce
your presence. An alternative is to have the hotel take a message and leave you a written notice
of the call.
e. Use hotel rooms on the second floor or higher. Do not stay in hotel rooms located on the
first floor or that are accessible from outside and do not go any higher than can be reached by
emergency rescue equipment.
f. Avoid elevators. Avoid riding in elevators. By riding in an elevator you confine yourself to
going up or down and leave yourself open to an easy attack by terrorists.
g. Make reservations in two or more hotels. When making your hotel reservations make them
in two or more hotels and use a modified name--do not use your rank.
i. Do not discuss travel plans. Do not discuss travel plans over a hotel telephone. Most
hotels have their own switchboards which make monitoring calls fairly easy.
The reality of the threat is clear. As symbols of the U.S. Government, you and your family are
potential targets for terrorism. The important thing to remember is that you are only as vulnerable
as you allow yourself to be. While there is no absolute protection against terrorism, reasonable
safeguards, commensurate with the identified threat to you, can be taken to reduce the likelihood
of attack.
6-31
Try this challenge.
List (in any order) five of the nine personal protection measures that must be used when
traveling in a threat region.
a. ______________________________________________________________
______________________________________________________________
b. ______________________________________________________________
______________________________________________________________
c. ______________________________________________________________
______________________________________________________________
d. ______________________________________________________________
______________________________________________________________
e. ______________________________________________________________
______________________________________________________________
Your answers should be any five of the following (in any order): avoid public transportation,
travel with unmarked luggage, stay in reputable hotels, avoid hotel paging, make reservations in
two or more hotels, identify hotel escape routes, do not discuss travel plans. If you named any
five, in any order, continue. If your answer is different, review paragraph 6204 before continuing.
Day-to-day activities within an office can help establish an environment in which it is more or less
difficult for terrorists to gain the knowledge they need to successfully attack personnel. The
following steps should be taken to make intelligence collection and targeting by terrorist more
difficult, forcing them to spend more time collecting information. This in turn causes them to
spend more time exposed and visible for detection by counterintelligence/law enforcement efforts.
6-32
a. Telephone and mail procedures. The amount of potentially damaging information that can
be passed or received through the telephone or the mail system is considerable. Terrorists will not
hesitate to use either of these forms of communication against you or those in your office. As a
Marine you must adhere to the following procedures for the telephone and mail:
(2) When taking telephone messages, do not reveal the whereabouts or activities of the
person being sought unless you personally know the caller.
(3) Collect telephone messages in unmarked folders; do not leave them exposed for
observers to identify caller names and phone numbers, persons called, and messages
left.
(4) Observe caution when opening mail. In particular, be on the lookout for letters or
packages that might contain explosive devices. Figure 6-13 illustrates indicators of a
possible letter or package bomb.
6-33
b. Visitor control procedures.
(1) Access to the office area should be strictly limited; during periods of increased threat,
access to additional offices, shops, laboratories, and other areas within the installation
should be controlled.
(2) Doors from the visitor access area to executive offices or other restricted areas of a
facility should be locked from within; there should be only one visitor entrance and
exit to a restricted access or exclusion area.
(3) A receptionist should clear all visitors before they enter inner offices.
(4) Permit workmen or visitors access to restricted areas or exclusion areas only with
escort and only with proper identification; confirm work to be done before admitting
workmen to restricted areas of the facility.
(5) Limit publicity in public waiting areas to information that does not identify
personnel by name, position, or office location.
(6) Do not post unit rosters, manning boards, or photo boards where they can be viewed
by visitors or local contractors providing cleaning services, food and beverage
services, delivery of office supplies, removal of trash or waste, care of plants, etc.
(7) Restrict use of message boards, sign in-out boards, and other visual communications
to general statements of availability; do not list publicly local travel itineraries or
phone numbers where visitors have easy, unrestricted access to such information.
Try the following challenges to see if you remember the office security procedures described.
1. Limit publicity in public waiting areas to information that does not identify
personnel by name, rank, or office location.
6-34
(Circle the letter of the correct response)
3. Do not post unit rosters, manning boards, or photo boards where they can be
viewed by visitors.
4. When taking phone calls, do not reveal the whereabouts or activities of the person
being sought unless the you know the caller personally.
6-35
c. General working procedures. The following procedures are actually an extension of the
procedures associated with security for the workplace.
(1) Avoid carrying attaché cases, brief cases, or other courier bags unless absolutely
necessary. Brief cases and attaché cases have become symbols of power and
prominence in many cultures. Individuals carrying such items are often assumed to be
very important persons. Use satchels, bags or other locally obtained book bags
instead.
(2) Do not carry items that bear markings that identify the owner by rank or title, even
within the office environment. Coffee mugs labeled "Top, Intel, or The Lt." may be
seen in use by a visitor sent to gather intelligence to aid in targeting.
(3) Avoid working alone late at night and on days when the remainder of the office is
absent.
(4) If late night work is necessary, work in conference rooms or internal offices where
observation from the outside of the building is not possible. Persons working at night
should turn lights on and off in several offices before going to their offices to disguise
the purpose of their activities to outside observers.
(5) Office doors should be locked when offices are vacant for any lengthy period, at
night, and on weekends.
(6) Papers, correspondence, communications materials, and other documents should not
be left unattended overnight.
Note: A clean desk policy facilitates improved security since it makes it difficult to
hide intelligence collection devices or improvised explosive devices in occupied
offices at the close of a working day.
(7) Maintenance activity and janitorial services in key offices, production, maintenance or
other installation areas should be performed under the supervision of security
personnel.
(8) Removal of property, material, or information stored on any media from the facility
should be prohibited without proper written authority.
(9) Restrict the importation of property, material, or information stored on any media to
the facility unless such items have been properly inspected.
Note: Inspection of boxes, briefcases, handbags, and other containers should focus on
explosive devices, firearms, incendiary devices and accelerants, and information
collection devices.
6-36
(10) Offices not in use should be locked to prohibit unauthorized access or the storage of
material that could be used to hide improvised explosive devices or intelligence
collection devices.
(11) Use of vehicles or markings that make it possible to readily identify a vehicle and its
occupants as U.S. Government or Department of Defense personnel should be
minimized.
(12) All personnel should have access to some sort of duress alarm to enunciate and warn
of terrorist attack.
d. Special procedures for executive assistants. Many critical personnel will have assistants
assigned to their offices to provide additional clerical and professional support. Assistants can be
significant security assets if properly trained, and can represent the difference between a
successful or unsuccessful terrorist attack. The following suggestions are intended to be a guide
for assistants who may find themselves performing personnel security as a collateral duty.
(2) Request the installation of a silent trouble alarm button, with a signal terminating in
the security department, the Military Police shack, or at another desk some distance
away to ensure that in the event of an emergency, it will be possible for someone
other than the executive to summon assistance.
(3) Do not admit visitors into the executive area unless they have been positively
screened in advance or are known from a previous visit.
Note: If the visitors arrive without appointments, they should not be admitted until
satisfactory identification and valid reasons for the visit have been established.
(4) Unknown callers should not be informed of the whereabouts of the executive, his/her
home address, or telephone number.
(5) A fire extinguisher, first aid kit, and oxygen bottle should be stored in the office area.
(6) When receiving a threatening call, including a bomb threat, extortion threat, or from a
mentally disturbed individual, remain calm and listen carefully. Figure 6-14 is one
example of a threat card to be used when you receive a threatening call.
6-37
Fig 6-14. Bomb threat/threatening call card.
(7) Do not accept packages from strangers until you are satisfied with the individual's
identity and the nature of the parcel.
(8) Travel itineraries for all personnel should be kept absolutely private. Distribution
should be limited strictly to those with a need to know.
6-38
(9) Daily schedules for senior officers and civilian officials should be distributed on a
limited basis and should contain only the information needed by each recipient.
Try these challenges to see if you remember the office security procedures described.
1. A clean desk policy facilitates improved security since makes it difficult to hide
intelligence collection devices or improvised explosive devices in occupied offices at
the close of the working day.
2. A fire extinguisher, first-aid kit, and oxygen bottle should be stored in the office
area.
6-39
(Circle the letter of the correct response)
4. Do not admit visitors into the executive area unless they have been positively
screened in advance.
5. Avoid carrying attaché cases, brief cases, or other courier bags unless absolutely
necessary.
6. Do not carry items that bear markings that identify the owner by rank or title,
even within the office environment.
6-40
(Circle the letter of the correct response)
7. Do not accept packages from strangers until satisfied with the individual's identity
and the nature of the parcel.
Lesson Summary. In this lesson, you learned the nine steps you must take to maintain a low
profile. You learned eight traveling tips to assist you in guarding against a terrorist attack while
traveling, and you learned twelve auto safety tips that you should use to avoid becoming a victim
of a terrorist attack. You now know what personal protection measures to use while traveling
and you know the four security procedures and the tips associated with each of the procedures to
safeguard your place of work. Before continuing, complete the lesson exercise.
6-41
Lesson Exercise: Complete items 1 through 23 by performing the action required. Check your
responses those listed at the end of this lesson.
1. List (in any order) five of the nine steps to maintain a low profile.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
c. _______________________________________________________________
_______________________________________________________________
d. _______________________________________________________________
_______________________________________________________________
e. _______________________________________________________________
_______________________________________________________________
6-42
2. List (in any order) five of the eight travel security precautions.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
c. _______________________________________________________________
_______________________________________________________________
d. _______________________________________________________________
_______________________________________________________________
e. _______________________________________________________________
_______________________________________________________________
For each statement in items 3 through 11, circle "a" if it is an auto safety tip and "b" if it is not.
4. Always keep your vehicle in good mechanical condition and your gas tank at least
half full.
6. Travel in groups.
7. Drive with car doors locked, windows closed, and secure your car when unattended.
6-43
8. Never pick up hitchhikers or strangers.
10. If you are involved in a minor accident, and feel there is imminent danger to you
or your passengers, drive away and assess the damage at a public location.
Then report the accident.
11. On multi-lane highways, drive in the center lane to make it more difficult to force
your car to the curb.
12. List (in any order) five of the nine personal protection measures that must be used
when traveling in a threat region.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
c. _______________________________________________________________
_______________________________________________________________
d. _______________________________________________________________
_______________________________________________________________
e. _______________________________________________________________
_______________________________________________________________
6-44
For items 13 through 23, identify the office security procedure described by circling the letter of
the correct response.
13. Limit publicity in public waiting areas to information that does not identify
personnel by name, rank, or office location.
14. Collect telephone messages in unmarked folders; do not leave exposed for
observers to identify caller names and phone numbers, persons called, and
messages left.
15. Do not post unit rosters, manning boards, or photo boards where they can be
viewed by visitors.
16 When taking phone calls, do not reveal the whereabouts or activities of the person
being sought unless you personally know the caller.
17. A clean desk policy facilitates improved security since it makes it difficult to hide
intelligence collection devices or improvised explosive devices in occupied offices at
the close of the working day.
6-45
18. A fire extinguisher, first-aid kit, and oxygen bottle should be stored in the office
area.
20. Do not admit visitors into the executive area unless they have been positively
screened in advance.
21. Avoid carrying attaché cases, brief cases, or other courier bags unless absolutely
necessary.
22. Do not carry items that bear markings that identify the owner by rank or title,
even within the office environment.
6-46
23. Do not accept packages from strangers until satisfied with the individual's
identity and the nature of the parcel.
Reference
6-47
Lesson 2 Exercise Solutions, continued
Reference
UNIT SUMMARY
In this study unit, you learned what measures and procedures you should take to safeguard
yourself and your family from becoming the target of terrorism. You learned how to select a
residence and then upgrade its security if necessary. You know the steps to take in maintaining a
low profile to decrease your possibility of becoming a target. You now know what travel tips to
use while traveling in a threat region, auto safety tips to take, and personal protection measures
you must use. You can identify the four security procedures for the workplace and the measures
you should take within each procedure. In Study Unit 7, you will learn what your responsibilities
a Marine are should you become a hostage. You will learn the three types of detention, factors
that will assist you in maintaining your bearing, and pointers you should follow while detained by
terrorists. Before starting the next study unit, complete the unit exercise.
6-48
Unit Exercise: Complete items 1 through 41 by performing the required action. Check your
responses against those listed at the end of this study unit.
1. List (in any order) the eight security considerations for selecting a residence.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
d. _______________________________________________________________
e. _______________________________________________________________
f. _______________________________________________________________
g. _______________________________________________________________
h. _______________________________________________________________
For items 2 through 9, fill in the blanks with the correct answer.
4. Sliding glass doors are actually extremely large _______________ and provide
6. One method of securing hinges is to weld the ends. This method is effective, but
______________________________.
6-49
7. One technique for securing door hinges is to drill a small hole through the hinge and
8. Another technique for securing door hinges requires inserting two large screws in the
door (or jamb) and leaving the screw head exposed 1/2 inch. Drill a
_________________________ hole on the opposite side so that the screw head fits
9. The simplest measures to prevent a sliding glass door from being lifted out of its
______________. Insert a pin or nail to prevent the door from being opened.
10. List (in any order) the three methods of upgrading the security of windows.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
11. List (in any order) two security measures you should use to improve the security of
your home.
a. _______________________________________________________________
b. _______________________________________________________________
12. List (in any order) two considerations you should make concerning additional lighting
when improving the security of your residence.
a. _______________________________________________________________
b. _______________________________________________________________
6-50
13. Describe the circumstances in which the use of an alarm is recommended.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
For items 14 through 16, circle the letter that corresponds to the correct answer.
14. Choose the feature that is not recommended for consideration when choosing an
alarm system.
a. Size c. Aggressiveness
b. Speed d. Alertness
16. Why should a dog be considered an "audible alarm?" A dog can be trained
6-51
17. List (in any order) three of the six security measures a child should be advised of.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
c. _______________________________________________________________
_______________________________________________________________
For item 18, circle the letter which corresponds to the correct answer.
18. What should you ensure school officials do in providing security for your children?
6-52
19. List (in any order) five of the nine steps to maintain a low profile.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
c. _______________________________________________________________
_______________________________________________________________
d. _______________________________________________________________
_______________________________________________________________
e. _______________________________________________________________
_______________________________________________________________
20. List (in any order) five of the eight travel security precautions.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
c. _______________________________________________________________
_______________________________________________________________
d. _______________________________________________________________
_______________________________________________________________
e. _______________________________________________________________
_______________________________________________________________
6-53
For items 21 through 30, circle "a" if the statement is an auto safety tip and "b" if it is not.
22. Always keep your vehicle in good mechanical condition and your gas tank at least half
full.
25. Drive with car doors locked, windows closed, and secure your car when unattended.
27. Memorize the location of safe havens along your regular routes.
28. If you are involved in a minor accident and feel there is imminent danger to you or
your passengers, drive away and assess the damage at a public location. Then report
the accident.
29. On multi-lane highways, drive in the center lane to make it more difficult to force
your car to the curb.
6-54
30. List (in any order) five of the nine personal protection measures that must be used
when traveling in a threat region.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
c. _______________________________________________________________
_______________________________________________________________
d. _______________________________________________________________
_______________________________________________________________
e. _______________________________________________________________
_______________________________________________________________
For items 31 through 41, identify the office security procedure described by circling the correct
letter.
31. Limit publicity in public waiting areas to information that does not identify
personnel by name, rank, or office location.
32. Collect telephone messages in unmarked folders; do not leave exposed for
observers to identify caller names and phone numbers, persons called, and
messages left.
6-55
33. Do not post unit rosters, manning boards, or photo boards where they can be
viewed by visitors.
34. When taking phone calls, do not reveal the whereabouts or activities of the person
being sought unless you know the person calling.
35. A clean desk policy facilitates improved security as it makes it difficult to hide
intelligence collection devices or explosive devices in occupied offices at the close of
the working day.
36. A fire extinguisher, first-aid kit, and oxygen bottle should be stored in the office
area.
6-56
38. Do not admit visitors into the executive area unless they have been positively
screened in advance.
39. Avoid carrying attaché cases, brief cases, or other courier bags unless absolutely
necessary.
40. Do not carry items that bear markings that identify the owner by rank or title,
even within the office environment.
41. Do not accept packages from strangers until satisfied with the individual's
identity and the nature of the parcel.
6-57
Study Unit 6 Exercise Solutions
Reference
6-58
Study Unit 6 Exercise Solutions, continued
Reference
6-59
Study Unit 6 Exercise Solutions
Reference
6-60
STUDY UNIT 7
Introduction. Throughout this course you have learned how to avoid becoming a
victim/hostage of a terrorist attack. Sometimes, events unfold in ways that are beyond your
control. Regardless of all of your positive actions and reactions, you suddenly become a
hostage. What will you do now? In this study unit you will learn the three types of
peacetime detention. You will learn your responsibilities in relation to the Code of Conduct
and how to survive during a personal hostage situation.
LEARNING OBJECTIVES
Peacetime detention refers to being held against one's will during a time when armed conflict does
not exist or armed conflict does exist but the United States is not directly involved. Based on this
definition, if you are taken hostage and there is no armed conflict involving the United States, you
are considered a peacetime detention case. Peacetime detention brings with it requirements
associated with the Code of Conduct which differ slightly from the requirements of wartime
detention or being a prisoner of war (POW). There are three general types of hostile peacetime
detention that you should know.
Hostile government detention involves a hostile government's (one whose relations with the
United States is tense) legally detaining a U.S. citizen/serviceman for violation(s) of its laws. For
example, a Marine may be detained in a given country for an unintentional act, such as crossing
the country's borders, due to negligence, which may be a civil or criminal offense under the
country's laws. Persons in this status are properly called detainees (see figure 7-1).
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
Your answers should be in words similar to the following: 1. Peacetime detention refers to being
held against one's will during a time when armed conflict does not exist, or armed conflict does
exist but the United States is not directly involved, and 2. Hostile government detention involves
a hostile government's (one whose relations with the United States is tense) legally detaining a
U.S. citizen/serviceman for violation(s) of its laws. If your answers to both challenges are
correct, you may continue. If your answers are different, review paragraph 7101 before
continuing.
7-2
7102. Identify and Define Hostile Government-Sponsored Terrorist Detention
On November 5, 1979, the American Embassy in Iran was seized with the Iranian
government's support. After 444 days, on January 1981, fifty-two hostages including Marines
were finally released.
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
7-3
Your answer should be similar to, "hostile government-sponsored terrorist detention refers to the
detention of U.S. citizens by terrorists who are sponsored by the government of the country in
which the U.S. citizens are being held." If your answer is correct, continue. If you answered
differently, review paragraph 7102 before continuing.
Independent terrorist group detention is the detention of U.S. citizens by terrorists who are not
sponsored by a hostile government. Captives of independent terrorists groups are also referred to
as hostages, not detainees. United States citizens are illegally held by the independent terrorist
group. As with hostile government-sponsored terrorist detention, their capture and continued
detention are violations of international law! These individuals are normally held for the
purpose of propaganda or to coerce the United States to take some action desired by the
terrorists. The following incident is an example of an independent terrorist group detention.
On 14 June 1985, Trans World Airlines (TWA) flight 847 was hijacked with 153 persons aboard.
During the first few days of the hijacking, 123 hostages were released and one sailor was
murdered by the Amal Militia. Twenty-nine passengers, including five sailors, were held hostage
in Beirut, Lebanon. The Amal Militia negotiated with Syrian President Hafez Assad and on 30
June 1985, following 17 days of captivity, the hostages were released.
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
7-4
(Circle the letter of the correct response)
2. A United States citizen may have committed a criminal or civil offense in a country
with a hostile government. The citizen's detention is considered to be
3. Missionaries who are U.S. citizens are working in the rural areas of Peru. They
are taken hostage by the independent terrorist group the Shining Path. Their
detention is considered to be
4. United States citizens are held captive by terrorists in Libya. The Libyan
government has a record of supporting this particular terrorist group. The detention
of the U.S. citizens is considered to be
7-5
(Circle the letter of the correct response)
5. While on mechanized patrol in Kuwait, your squad inadvertently crosses into Iraq.
The Iraqis detain you for four days until Embassy officials in Kuwait can arrange for
your release. Your detention is considered to be
Your answers to the five challenges should be as follows: 1. (In the same or similar words)
Detention of U.S. citizens by terrorist who are not sponsored by a hostile government. 2. a, 3.
c, 4. b, 5. a. If you answered all five challenges correctly, you may continue. If you answered
differently, review this lesson before continuing.
Lesson Summary. In this lesson, you learned the definition of peacetime detention and how it
could apply to you. You now know that the three types of peacetime detention are hostile
government detention, hostile government-sponsored terrorist detention, and independent
terrorist group detention. In the next lesson, you will learn to apply the Code of Conduct should
you become either a detainee or hostage. Before proceeding to the next lesson, complete the
lesson exercise.
-----------------------------------------------------------------
Exercise: Complete items 1 through 8 by performing the action required. Check your
responses against those listed at the end of this lesson.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
7-6
2. Define the term hostile government detention.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
For items 5 through 8, circle the letter of the type of detention that best corresponds to the
statement.
6. Missionaries who are U.S. citizens are working in the rural areas of Peru. They are
taken hostage by the independent terrorist group the Shining Path.
7-7
7. While on mechanized patrol in Kuwait, your squad inadvertently crosses into Iraq.
The Iraqis detain you for four days until Embassy officials in Kuwait can arrange for
your release.
8. United States citizens are held captive by terrorists in Libya. The Libyan
government has a record of supporting this particular terrorist group.
Reference
7-8
Lesson 2. THE HOSTAGE AND THE CODE OF CONDUCT
LEARNING OBJECTIVES
3. List three factors that will assist hostages in maintaining their bearing.
4. List three pointers a Marine should follow while detained by a terrorist group.
U.S. Marines, whether detainees or hostages, can rest assured the United States Government will
make every good faith effort to obtain their earliest release. The captive's key to survival with
honor and resisting exploitation are faith in one's country and its way of life, faith in fellow
detainees or hostages, and faith in one's self. One must assume, on the other hand, that the
destruction of such faith is the goal of all captors. The captors are determined to maximize their
gains from a detention or hostage situation.
List (in any order) the three required responsibilities you must maintain if you should
become a detainee or hostage.
a. ______________________________________________________________
______________________________________________________________
b. ______________________________________________________________
______________________________________________________________
c. ______________________________________________________________
______________________________________________________________
Your answers (in any order) should be as follows: a. Faith in one' s country and its way of life, b.
Faith in fellow detainees or hostages, c. Faith in one's self. If your answer is correct, continue.
If you answered differently, review paragraph 7201 before continuing.
7-9
7202. Recognize the Goal of a Hostage
Every reasonable step must be taken by Marines to prevent exploitation of themselves and the
U.S. Government. If exploitation cannot be prevented completely, every step must be taken to
limit exploitation as much as possible. In a sense, detained Marines often are catalysts for their
own release based upon their ability to become unattractive sources of exploitation. For example,
a Marine who resists successfully may expect the terrorists to lose interest in further exploitation
attempts. Detainees or hostages very often must make their own judgments as to which actions
will increase their chances of returning home with honor and dignity. Marines who can say that
they have done their utmost in a detention or hostage situation to resist exploitation uphold the
Department of Defense policy, the founding principles of the United States, and the highest
traditions of the Marine Corps.
___________________________________________________________________
Your answer should be resist exploitation. If your answer is correct, continue. If you answered
differently, review paragraph 7202 before continuing.
Regardless of the type of detention or hostage situation, or the harshness of treatment, Marines
will maintain their personal bearing. They should make every effort to remain calm, courteous,
and project personal dignity. This is particularly important during the process of capture and in
the early stages of internment when the terrorist may be uncertain of his control over his hostages.
Discourteous or arrogant behavior seldom serves the long-term interest of a detainee or hostage.
Additionally, it often results in unnecessary punishment which serves no useful purpose. Such
behavior, in some situations, can jeopardize survival and severely complicate efforts to gain
release of the detainee or Marine held hostage.
7-10
Try this challenge.
List (in any order) three factors that will assist personnel in maintaining their military
bearing while they are detained or held hostage.
a. ______________________________________________________________
b. ______________________________________________________________
c. ______________________________________________________________
Your answers should be (in the same or similar words) as follows: a. Remain calm, b. Be
courteous, c. Project personal dignity. If your answer matches or is similar, continue. If you
answered differently, review paragraph 7203 before continuing.
Capture by terrorists is generally the least predictable and structured form of peacetime captivity.
The terrorist qualifies as an international criminal. The possible forms of captivity vary from
spontaneous hijacking to carefully planned kidnapping. In such captivities, hostages play a
greater role in determining their own fate since the terrorists normally expect nor receive rewards
for providing good treatment or releasing victims unharmed. If Marines are uncertain whether
their captors are genuine terrorists or surrogates of a government, they should assume that they
are terrorists. The following guidance will assist you while you are a hostage.
7-11
b. Surviving. Surviving in some terrorist detentions may depend on hostages conveying a
personal dignity and sincerity to the captors. Therefore, hostages may discuss inconsequential
topics such as sports, family, and clothing to convey to the terrorists the hostages' personal
dignity and human qualities. Hostages must make every effort to avoid embarrassing the United
States and/or the host government. The purpose of this dialogue is for the hostage to become a
"person" in the terrorist's eyes, rather than a mere symbol of a government. Such a dialogue
should also strengthen the hostage's determination to survive and resist. The hostages should
listen actively to the terrorist's feelings about his or her cause to enhance their image as a "person"
to the terrorist. On the other hand, a Marine should never pander, praise, participate in, or debate
the terrorist's cause.
c. Release. Marines held hostage by terrorists should accept release unless doing so requires
them to compromise their honor or cause damage to the U.S. Government or its allies. Marines
must keep faith with their fellow hostages and conduct themselves according to the guidelines
established by the Code of Conduct. Hostages and kidnap victims who consider escape to be
their only hope are authorized to make such attempts. Each situation will be different and the
hostage must weigh carefully every aspect of a decision to attempt an escape.
List (in any order) the three pointers a Marine should follow while detained by a terrorist
group.
a. ______________________________________________________________
______________________________________________________________
b. ______________________________________________________________
______________________________________________________________
c. ______________________________________________________________
______________________________________________________________
Your answers should be (the same or similar words) as follows: a. During capture, remain calm
and courteous, b. Convey a personal dignity and apparent sincerity to the captor, c. Accept
release unless doing so would compromise your honor or cause damage to the U.S. Government
or its allies. If your answers are correct, continue. If you answered differently, review paragraph
7204 before continuing.
7-12
Lesson Summary. In this lesson, you have learned the responsibilities a Marine has when he/she
is a detainee or hostage regarding the Code of Conduct. You now know what your goal must be
when held hostage and you know what guidelines you should follow while in captivity. Before
continuing, complete the lesson exercise.
-----------------------------------------------------------------
Lesson Exercise: Complete items 1 through 4 by performing the action required. Check your
responses against those listed at the end of this lesson.
1. List (in any order) the three responsibilities you must maintain if you should become a
detainee or hostage.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
c. _______________________________________________________________
_______________________________________________________________
____________________________________________________________________
____________________________________________________________________
3. List (in any order) three factors that will assist personnel in maintaining their military
bearing while they are detained or held hostage.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
c. _______________________________________________________________
_______________________________________________________________
7-13
4. List (in any order) the three pointers a Marine should follow while detained by a
terrorist group.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
c. _______________________________________________________________
_______________________________________________________________
Reference
UNIT SUMMARY
In this unit, you learned what constitutes peacetime detention and the three types of peacetime
detention. You learned your responsibilities regarding the Code of Conduct. You now know
your main goal as a detainee or hostage is to resist exploitation by your captors. You know to
remain calm and courteous, convey personal dignity and apparent sincerity to your captors, and to
accept release if it is honorable and causes no damage to the United States or its allies. In Study
Unit 8, you will learn the United States' policy concerning terrorism and you will learn the
purpose of the United States' Trilevel Anti-Terrorism Program. You will also gain a basic
understanding of the four basic components of an operational level antiterrorism program. Before
continuing, complete the unit exercise.
7-14
Unit Exercise: Complete items 1 through 11 by performing the action required. Check your
responses against those listed at the end of this study unit.
For items 1 through 7, choose the correct answer by circling the appropriate letter.
a. holding a person against his/her will during a time when armed conflict does not
exist, or armed conflict does exist but the United States is not directly involved.
b. a hostile government's legally detaining a U.S. citizen/serviceman for
violation(s) of its laws.
c. the holding of U.S. citizens by terrorists who are sponsored by the government
of the country in which the U.S. citizen is being held.
d. a hostile government's legally detaining a U.S citizen
a. the holding of U.S. citizens by terrorists who are not sponsored by a hostile
government.
b. the holding of U.S. citizens by terrorists who are sponsored by the
government of the country in which the U.S. citizens are being held.
c. a hostile government's legally detaining a U.S. citizen/serviceman for
violation(s) of its laws.
d. holding a person against his/her will during a time when armed conflict does not
exist, or armed conflict does exist but the United States is not directly involved.
a. the holding of U.S. citizens by terrorists who are not sponsored by a hostile
government.
b. involves the holding of U.S. citizens by terrorists who are sponsored by the
government of the country in which the U.S. citizen is being held.
c. a hostile government legally detaining a U.S. citizen/serviceman for violation(s)
of its laws.
d. holding a person against his/her will during a time when armed conflict does not
exist, or armed conflict does exist but the United States is not directly involved.
7-15
4. Independent terrorist group detention involves the holding of
5. Missionaries who are U.S. citizens are working in the rural areas of Peru. They are
taken hostage by the independent terrorist group the Shining Path. What type of
detention does this action represent?
6. United States citizens are held captive by terrorists in Libya. The Libyan
government has a record of supporting this particular terrorist group. What type of
detention does this action represent?
7. While on mechanized patrol in Kuwait your squad inadvertently crosses into Iraq.
The Iraqis detain you for four days until Embassy officials in Kuwait can arrange for
your release. What type of detention does this action represent?
7-16
8. List (in any order) three responsibilities of a Marine regarding the Code of Conduct.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
c. _______________________________________________________________
_______________________________________________________________
____________________________________________________________________
10. List (in any order) three factors that will assist personnel in maintaining their military
bearing while they are detained or held hostage.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
11. List (in any order) the three pointers that a Marine should follow while detained by a
terrorist group.
a. _______________________________________________________________
_______________________________________________________________
b. _______________________________________________________________
_______________________________________________________________
c. _______________________________________________________________
_______________________________________________________________
7-17
Study Unit 7 Exercise Solutions
Reference
1. a. 7101
2. c. 7101
3. b. 7102
4. a. 7103
5. a. 7101
6. a. 7101
7. c. 7102
8. (in any order) 7203
Faith in one's country and its way of life
Faith in fellow detainees or hostages
Faith in one's self
9. Resist exploitation 7202
10. (in any order)
Remain calm 7203
Be courteous
Project personal dignity
1 1. (in any order)
During a capture, remain calm and courteous 7204
Convey a personal dignity and apparent sincerity to the captor
Should accept release unless doing so would compromise your
honor or cause damage to the U.S. Government or its allies
7-18
STUDY UNIT 8
ANTITERRORISM PROGRAM
Introduction. In this study unit, you will learn the United States' policy concerning
terrorism. You will learn who has jurisdictional authority when a terrorist action takes
place as well as the function and employment of the Crisis Management Team (CMT) and
the Threat Management Force (TMF).
LEARNING OBJECTIVES
The United States has made clear its policy regarding terrorism. That policy is as follows:
- All terrorist actions, whatever their motivation, are criminal and intolerable, and
should be condemned.
- All lawful measures to prevent such acts and bring to justice those who commit them
will be taken.
- The United States will not bargain or make any concession to terrorist blackmail. To
do so would invite further demands.
- When Americans are abducted overseas, the United States will continue to cultivate
international cooperation to combat terrorism and secure a safe release of the
hostages.
Although the policy seems simple, there are many variables that are considered before the United
States takes the necessary action. History has shown that the policy takes many months to be
fully instituted and completely carried out.
8-1
Try the challenge.
a. All terrorist actions are religious in nature and will be handled by the respective
country in which the action occurs. All measures to prevent such acts and to judge
those who commit them will be taken. The U.S. will bargain or make any
concessions to terrorists. When Americans are abducted overseas, the United
States will continue to cultivate international cooperation to combat terrorism.
b. All terrorist actions, whatever their motivation, are acts of insanity and intolerable
and should be condemned. All measures to prevent such acts and bring to justice
those who commit them will be taken. The U.S. will not bargain or make any
concession to terrorist blackmail. To do so would invite further demands. When
Americans are abducted overseas, the United States will continue to cultivate
international cooperation to combat terrorism and secure the safe release of the
hostages.
c. All terrorist actions are criminal and intolerable, whatever their motivation, and
should be condemned. All lawful measures to prevent such acts and bring to justice
those who commit them will be taken. The U.S. will not bargain or make any
concession to terrorist blackmail. To do so would invite further demands.
When Americans are abducted overseas, the United States will continue to cultivate
international cooperation to combat terrorism and secure a safe release of the
hostages.
d. All terrorists are criminally insane and intolerable. All lawful measures to prevent
terrorists from committing terrorist acts and to bring to justice those who assist
terrorists will be taken. The U.S. Federal Bureau of Investigation will not bargain
with or make any concessions to terrorist blackmail. To do so would invite further
demands. When American servicemen are abducted overseas, the United States
will continue to cultivate international cooperation to combat terrorism and secure
a safe release of hostages.
8-2
Your answer should be "c." If you answered correctly, continue. If your answer is different,
review paragraph 8101 before continuing.
8-3
Define the concept of the trilevel antiterrorism program.
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
Your answer should be, "it capitalizes on the in-place organizational structure of existing agencies
and uses the assigned responsibilities and capabilities of these agencies within a clearly defined
command and control structure to combat terrorism." If you answered correctly, continue. If
your answer is different, review paragraph 8102 before continuing.
The first level of the trilevel concept is the development of national command and policy
procedures. This development is the responsibility of the National Security Council under the
direction of the President. The second level is the establishment of coordination and control.
This is the province of eight Federal agencies, including the Department of Defense (DoD). The
third level is the operational level. This level addresses the responsibilities of the 29 Federal
agencies that comprise the working group on terrorism. At the operational level, the program
includes four basic components:
a. Deterrence. Using international initiatives and diplomacy to discourage the state support of
terrorism and build a broad consensus that terrorist acts are intolerable under international law
regardless of the cause they are used to further.
b. Prevention. Undertaking protection and security efforts by the public and the private sector
to discourage terrorist acts.
8-4
Try the next challenge.
Select the four basic components at the operational level of the trilevel antiterrorism
program.
Your answer should be "b." If you answered correctly, continue. If your answer is different,
review paragraph 8103 before continuing.
Lesson Summary. In this lesson, you learned the United States' policy concerning terrorism. You
now know that the trilevel antiterrorism program is the U.S. Government's concept on how an
antiterrorism program should be structured and conducted. Under the trilevel antiterrorism
program you know that there are three levels, national command and policy, coordination and
control, operations. Under the operations level of the trilevel antiterrorism program, the four
basic components are deterrence, prevention, reaction, and prediction. In the next lesson you will
learn about the Crisis Management Team and the Threat Management Force. You will also learn
about their purposes and functions. Before continuing to the next lesson, complete the following
lesson exercise.
8-5
Lesson Exercise: Complete items 1 through 3 by performing the action required. Check your
responses against those listed at the end of this lesson.
a. All terrorist actions are religious in nature and will be handled by the
respective country in which the action occurs. All measures to prevent such
acts and to judge those who commit them will be taken. The U.S. will bargain
or make any concessions to terrorists. When Americans are abducted overseas,
the United States will continue to cultivate international cooperation to combat
terrorism.
b. All terrorist actions, whatever their motivation, are acts of insanity and
intolerable, and should be condemned. All measures to prevent such acts and
bring to justice those who commit them will be taken. The U.S. will not
bargain or make any concession to terrorist blackmail. To do so would invite
further demands. When Americans are abducted overseas, the United States
will continue to cultivate international cooperation to combat terrorism and
secure the safe release of the hostages.
c. All terrorist actions, whatever their motivation, are criminal and intolerable, and
should be condemned. All lawful measures to prevent such acts and bring to
justice those who commit them will be taken. The U.S. will not bargain or
make any concession to terrorist blackmail. To do so would invite further
demands. When Americans are abducted overseas, the United States will
continue to cultivate international cooperation to combat terrorism and secure a
safe release of the hostages.
d. All terrorists are criminally insane and intolerable. All lawful measures to
prevent terrorists from committing terrorist acts and to bring to justice those
who assist terrorists will be taken. The U.S. Federal Bureau of Investigation
will not bargain with or make any concessions to terrorist blackmail. To do so
would invite further demands. When American servicemen are abducted
overseas, the United States will continue to cultivate international cooperation
to combat terrorism and secure a safe release of hostages.
8-6
2. Define the concept of the trilevel antiterrorism program.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
3. Select the four basic components at the operational level of the trilevel antiterrorism
program.
Reference
1. c. 8101
2. It capitalizes on the in-place organizational structure of existing 8102
agencies and uses assigned responsibilities and capabilities of
these agencies within a clearly defined command and control
structure to combat terrorism.
3. b. 8103
8-7
Lesson 2. CRISIS MANAGEMENT AND THE CRISIS MANAGEMENT FORCE
LEARNING OBJECTIVES
1. Define and describe the function and organizational structure of the Crisis
Management Team (CMT).
2. Define and describe the function and organizational structure of the Threat
Management Force (TMF).
3. Define and describe the function and organizational structure of the Special Reaction
Team (SRT).
4. Define and describe the function and organizational structure of the Negotiation
Team.
5. Define and describe the function and organization of the inner-perimeter element.
6. Define and describe the function and organization of the outer-perimeter element.
In this lesson, you will learn about the functions and organizational structures of the Crisis
Management Team, the Threat Management Force, the Special Response Team, and the inner-
and outer-perimeter elements. You will also learn what happens during the three response phases
when a terrorist incident occurs.
8201. Define and Describe the Function and Organizational Structure of the Crisis
Management Team (CMT)
Note: Within the continental United States, the installation commander, CMT
commander, and the Provost Marshall work closely with the Federal Bureau of
Investigation (FBI). Because the FBI has jurisdictional control within the
United States, there may be conflict between who is in charge when an terrorist
incident occurs within the jurisdictional control of the base commander.
8-8
In foreign countries, the Status of Forces Agreement with the host nation
establishes who has jurisdiction over on-base terrorist incidents. The local Staff
Judge Advocate can assist in determining authority and jurisdiction. In both
instances, decisions and agreements must be joint in nature between the CMT
commander and the FBI or host nation.
As you can see, this can lead to a large number of people gathering during a very stressful time.
For this reason, it is recommended that only key personnel be used by the CMT. Their supporting
staffs can stand-by in their spaces to do research or perform assigned task associated with
terrorist incidents. The complete crisis management organization is depicted in figure 8-2.
8-9
Fig 8-2. Crisis management organization.
1. Define and describe the function of the Crisis Management Team. The CMT is a
staff team specializing in
8-10
(Circle the letter of the correct response)
a. the threat Management Force, the SRTs, the negotiation teams, and the inner-
and outer-perimeter teams.
b. higher headquarters, the State Department or host nation representative, and
the FBI.
c. the staff sections of the S-1/G-1, S-3/G-3, the special reaction teams, the
hostage negotiation teams, and the inner- and outer-perimeter elements.
d. the S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local
NCIS office.
Your answers should be 1. b and 2. d. If you answered correctly, continue. If either of your
answers are different, review paragraph 8201 before continuing.
8202. Define and Describe the Function and Organizational Structure of the Threat
Management Force (TMF)
The activities and structure of the Threat Management Force (TMF) is discussed in the following
paragraphs.
a. Function. The TMF is the tactical element of the CMT and provides on-site security once a
terrorist incident has occurred.
Try the challenge to help you to remember the function of the TMF.
a. tactical support to the CMT and on site security after a terrorist incident has
occurred.
b. a staff team specializing in counterterrorism situations. The team advises the
commander and the EOC on all aspects of the incident.
c. the means necessary to communicate with the FBI or host-nation counterterrorism
forces.
d. the logistical support for the CMT.
8-11
Your answer should be "a." If you answered correctly, continue. If you answered differently
review paragraph 8202 before continuing.
b. Organizational structure. The TMF is divided into three teams; Special Reaction Team
(SRT), the hostage negotiation team and the third team is split into the inner- and outer-perimeter
elements. The organization of the TMF is depicted in figure 8-3.
a. a special reaction team(s) (SRT), a hostage negotiation team, and a third team
which is split into the inner- and outer-perimeter elements.
b. S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local NCIS
office.
c. higher headquarters, the State Department or host nation representative, and the
FBI.
d. an Explosive Ordnance Disposal squad and the Naval Criminal Investigative
Service representative.
Your answer should be "a." If you answered correctly, continue. If your answer is different,
review paragraph 8202 before continuing.
8-12
8203. Define and Describe the Function and Organizational Structure of the Special
Reaction Team (SRT)
a. Function. The SRT, because of its extensive training in combat in built-up areas,
marksmanship, rappelling, physical training, first aid, and use of specialized equipment, is
designed to neutralize or apprehend a barricaded offender with a minimum of danger to hostages,
team members, or others. When ordered to, each team should be able to:
a. To advise the commander and the EOC on all aspects of the incident.
b. To neutralize or apprehend a barricaded offender with a minimum of danger to
hostages, team members, or others.
c. To advise the EOC on all aspects of the operation.
d. To neutralize offenders without prejudice.
8-13
Your answer should be "b." If you answered correctly, continue. If you answered differently,
review paragraph 8203 before continuing.
b. Organizational structure and responsibilities . The SRTs are made up of five-man teams.
Each team consists of a team leader, special reaction team scout, special reaction team marksman,
a special reaction team observer, and a special reaction team defense man. The responsibilities of
each team member are discussed below.
(1) Team leader. The team leader is responsible for locating and directing counterfire
against targets, creating a plan of attack, and supervising its execution. He is usually
armed with a sidearm and an additional weapon as may be necessary. The team
leader may also carry the teams radio, binoculars, and other mission related
equipment.
(2) Special reaction team scout. The SRT scout leads the team to the objective by
conducting a reconnaissance of the approach and withdrawal routes, building
entrances, and rooftops, and by removing obstacles such as locked doors. After
completing the scouting mission, the scout may be assigned a defensive or security
role for the team or be designated to participate in the assault. The scout is armed
with a sidearm and a semiautomatic rifle or shotgun. He will carry any equipment
necessary to lead the team to the objective, such as a pry bar, manhole hook or bolt
cutters.
(3) Special reaction team marksman. The SRT marksman is trained and deployed so that
if the need arises he can control the situation with a few well placed shots at the
command of the team leader. The marksman is armed with a side arm and a high
powered rifle with a telescopic sight. The marksman also carries any specialized
equipment designated by the team leader.
(4) Special reaction team observer. The SRT observer acts as the team recorder,
recording events preceding and following the threat neutralization for inclusion in the
team after-action report. The observer is armed with a sidearm and a semiautomatic
rifle. He carries a pair of binoculars for observation and fire direction and other
equipment as required.
(5) Special reaction team defense man. The SRT defense man protects the team from
ambush during the approach, covers the team's withdrawal, and assists and protects
the scout during reconnaissance. Additionally, the defense man provides close-range
assault fire against barricaded offenders or a hardened position. The defense man is
armed with a sidearm and a semiautomatic rifle or a shotgun. He also carries such
needed equipment as rappelling ropes, harnesses, or demolitions.
8-14
Try the next challenge.
Your answer should be "c." If you answered correctly, continue. If you answered differently,
review paragraph 8203 before continuing.
8204. Define and Describe the Function and Organizational Structure of the Negotiation
Team
a. Function. The negotiation team interacts with the terrorists on order from the TMF
commander. Members of the negotiation team must be able to establish rapport with the
terrorists. Establishing rapport will permit the negotiators to defer decisions and still maintain
rapport when demands are delayed or refused. Negotiators are not decision makers. By not
being decision makers the negotiators, are established as neutrals who appear able to consider
equally the interests of the terrorists and the interest of society. The negotiators should strive to
- Accept the terrorists' views neutrally, expressing neither approval nor disapproval
8-15
Try this challenge.
a. interacts with the terrorists on order from the TMF commander. Members of the
negotiation team must be able to establish rapport with the terrorists.
b. advises the commander and the EOC on all aspects of the incident.
c. advises the EOC on all aspects of counterintelligence.
d. interacts with the SRT by providing reconnaissance assets.
Your answer should be "a." If you answered correctly, continue. If you answered differently,
review paragraph 8204 before continuing.
(1) Officer-in-charge.
(2) Primary hostage negotiator. This person is formally trained in hostage negotiation.
(3) Backup hostage negotiator. Also formally trained in hostage negotiation, the backup
hostage negotiator is employed when the primary is no longer able to continue with
the negotiations.
(4) Criminal Investigative Division (CID) or Military Police (MP) investigator. Due to
the fact that all terrorist acts are considered criminal in nature, the military law
enforcement community will be represented.
(5) Linguist. A linguist who is trained and or fluent in the language of the region must be
present.
Note: Ideally, the entire negotiation team would be at least conversationally fluent in
the language of the region.
8-16
All members of the negotiation team should be mentally mature and emotionally stable with the
absence of negative personality traits such as an overbearing or antagonistic attitude. They should
be good listeners, experienced in communication techniques, sincere and have the ability to be
flexible. Additionally, members of the negotiation team should be physically fit allowing them to
better cope with the demands and stress associated with a hostage negotiation situation.
Your answer should be "b." If you answered correctly, continue. If you answered differently,
review paragraph 8204 before continuing.
8205. Define and Describe the Function and the Organizational Structure of the
Inner-Perimeter Element
a. Function. The inner-perimeter element is responsible for physically controlling the area
immediately around the scene. It has the closest tactical contact with the terrorists. This element
contains the situation and relays intelligence on activity at the scene to the TMF commander. A
special reaction team, or teams could be assigned this mission and could be augmented by other
trained military police or security personnel.
8-17
Try the following challenge.
Your answer should be "d." If you answered correctly, continue. If you answered differently,
review paragraph 8205 before continuing.
b. Organizational structure. The inner-perimeter element is under the control of the TMF
commander. A typical inner-perimeter element is comprised of the following:
(2) Non-commissioned officer in charge (NCOIC). The NCOIC reports directly to the
inner-perimeter OIC or to the TMF commander in the OIC's absence.
8-18
Try the challenge.
Your answer should be "a." If you answered correctly, continue. If your answer is different,
review paragraph 8205 before continuing.
8206. Define and Describe the Function and Organizational Structure of the
Outer-Perimeter Element
(2) Evacuation. The outer-perimeter element may be employed in evacuating and sealing
off housing and troop billeting areas.
(3) Access control. The outer-perimeter element may be employed to control access to
the incident area and the installation.
(4) Guards. The outer-perimeter element may be posted as guards for all critical and
restricted areas outside the incident area.
8-19
Try the challenge.
Your answer should be "c." If your answer is correct, continue. If your answer is different,
review paragraph 8206 before continuing.
a. 1 or 2 to 1
b. 2 or 3 to 1
c. 3 or 4 to 1
d. 4 or 5 to 1
Your answer should be "d." If you answered correctly, continue. If your answer is different
review paragraph 8206 before continuing.
8-20
8207. Responding to an Incident
Once a terrorist incident occurs, the response to it will depend greatly on where it took place. If
the incident happens outside of the jurisdictional boundaries of the U.S. and is also off base, the
incident will be handled by civilian authorities. If the incident occurs on base; however, the base
commander has the initial response authority. In most cases of incidents occurring on a U.S.
base, the initial response to a terrorist incident is made by the military police patrols on duty at
that time. They are considered the initial response force. They isolate the incident and contain
the situation until relieved by the inner-perimeter element. The actions of the initial response
force, as directed by the officer or NCO, depend on the terrorists' tactics. Depending on the
installation procedures, the CMT will be activated. The CMT will go through the proper channels
to notify HQMC and the FBI when the incident occurs within the continental U.S. (CONUS).
Outside of the continental U.S. (OCONUS), the appropriate command operation center, the
Department of State, and the host nation are notified. Details of each response phase are
provided below.
a. Phase I. Phase I is commitment of local available resources. This includes the regular
military police patrols and available backup units. These units should be prepared to secure and
contain the scene until the beginning of Phase II.
b. Phase II. Phase II is enhancement of the initial response force by the TMF, FBI crisis
management teams, or host-nation tactical units. This phase begins when the EOC is notified and
the CMT is activated. It is during this phase that the FBI or host nation may assume control over
the incident. If this occurs, installation forces should be ready to support the FBI/host nation
operation. Remember, within CONUS the FBI has discretionary authority to assume jurisdiction;
the host country has that authority OCONUS.
8-21
(Circle the letter of the correct response)
Lesson Summary. In this lesson, you have learned the function and organizational structures of
the Crisis Management Team, the Threat Management Force, the Special Response Team, the
inner-perimeter element, and the outer-perimeter element. You also have knowledge of what
happens during the three response phases when a terrorist incident occurs. Before continuing,
complete the lesson exercise.
8-22
Lesson Exercise: Complete items 1 through 15 by performing the action required. Check your
responses against those listed at the end of this lesson.
For items 1 through 15, circle the letter of the correct response.
1. What is the function of the Crisis Management Team? The CMT is a staff team
specializing in
a. the Threat Management Force, the SRTs, the negotiation teams, and the inner-
and outer-perimeter teams.
b. higher headquarters, the State Department or host nation representative, and
the FBI.
c. the staff sections of the S-1/G-1, S-3/G-3, the special reaction teams, the
hostage negotiation teams, and the inner- and outer-perimeter elements.
d. S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local NCIS
office.
a. tactical support to the CMT and provides on site security after a terrorist
incident has occurred.
b. a staff team specializing in counterterrorism situations. The team advises the
commander and the EOC on all aspects of the incident.
c. the means necessary to communicate with the FBI or host-nation
counterterrorism forces.
d. the logistical support for the CMT.
8-23
4. The TMF is comprised of
a. a Special Reaction Team(s) (SRT), a hostage negotiation team, and a third team
that is split into the inner- and outer-perimeter elements.
b. S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local NCIS
office.
c. higher headquarters, the State Department or host nation representative, and
the FBI.
d. an Explosive Ordnance Disposal squad and the Naval Criminal Investigative
Service representative.
a. Advise the commander and the EOC on all aspects of the incident.
b. Neutralize or apprehend a barricaded offender with a minimum of danger to
hostages, team members, or others.
c. Advise the EOC on all aspects of the operation.
d. Neutralize offenders without prejudice.
a. interacts with the terrorists on order from the TMF commander. Members of
the negotiation team must be able to establish rapport with the terrorists.
b. advises the commander and the EOC on all aspects of the incident.
c. advises the EOC on all aspects of counterintelligence.
d. interacts with the SRT by providing reconnaissance assets.
8-24
9. What is the function of the inner-perimeter element? It
a. 1 or 2 to 1.
b. 2 or 3 to 1.
c. 3 or 4 to 1.
d. 4 or 5 to 1.
8-25
13. During Phase I of responding to a terrorist incident,
Reference
1. b. 8201
2. d. 8201
3. a. 8202
4. a. 8202
5. b. 8203
6. c. 8203
7. a. 8204
8. b. 8204
9. d. 8205
10. a. 8205
11. c. 8206
12. d. 8206
13. b. 8207
14. c. 8207
15. a. 8207
8-26
UNIT SUMMARY
In this study unit, you learned the United States' policy concerning terrorism. You know the U.S.
has a trilevel antiterrorism program and the four main operational components of the trilevel
program are deterrence, prevention, reaction, and prediction. You know the composition of a
basic terrorism response organization for an installation. You know the functions of and
organization for the Crisis Management Team, the Threat Management Force, the Special
Reaction Team, the negotiation team, and the inner- and outer-perimeter teams. You have
learned about the various phases of response to a terrorist incident. Complete the unit exercise
before continuing on to the review lesson. Congratulations!
8-27
Unit Exercise: Complete items 1 through 18 by performing the action required. Check your
responses against those listed at the end of this study unit.
a. All terrorist actions are religious in nature and will be handled by the respective
country in which the action occurs. All measures to prevent such acts and to judge
those who commit them will be taken. The U.S. will bargain or make any
concessions to terrorists. When Americans are abducted overseas, the United States
will continue to cultivate international cooperation to combat terrorism.
b. All terrorist actions are acts of insanity and intolerable, whatever their motivation, and
should be condemned. All measures to prevent such acts and bring to justice those
who commit them will be taken. The U.S. will not bargain or make any concession to
terrorist blackmail. To do so would invite further demands. When Americans are
abducted overseas, the United States will continue to cultivate international
cooperation to combat terrorism and secure the safe release of the hostages.
c. All terrorist actions are criminal and intolerable, whatever the motivation, and should
be condemned. All lawful measures to prevent such acts and bring to justice those
who commit them will be taken. The U.S. will not bargain or make any concession to
terrorist blackmail. To do so would invite further demands. When Americans are
abducted overseas, the United States will continue to cultivate international
cooperation to combat terrorism and secure a safe release of the hostages.
d. All terrorists are criminally insane and intolerable. All lawful measures to prevent
terrorists from committing terrorist acts and to bring to justice those who assist
terrorists will be taken. The U.S. Federal Bureau of Investigation will not bargain
with or make any concessions to terrorist blackmail. To do so would invite further
demands. When American servicemen are abducted overseas, the United States will
continue to cultivate international cooperation to combat terrorism and secure a safe
release of hostages.
8-28
2. Define the concept of the trilevel antiterrorism program.
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
____________________________________________________________________
3. List the four basic components at the operational level of the trilevel antiterrorism
program.
a. _______________________________________________________________
b. _______________________________________________________________
c. _______________________________________________________________
d. _______________________________________________________________
For items 4 through 18, circle the letter of the correct response.
4. What is the function of the Crisis Management Team? The CMT is a staff team
specializing in
a. the Threat Management Force, the SRTs, the negotiation teams, and the inner-
and outer-perimeter teams.
b. higher headquarters, the State Department or host nation representative, and
the FBI.
c. the staff sections of the S-1/G-1, S-3/G-3, the Special Reaction Teams, the
hostage negotiation teams, and the inner- and outer-perimeter elements.
d. S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local NCIS
office.
8-29
6. What is the function of the TMF? It provides
a. tactical support to the CMT and provides on site security after a terrorist
incident has occurred.
b. a staff team specializing in counterterrorism situations. The team advises the
commander and the EOC on all aspects of the incident.
c. the means necessary to communicate with the FBI or host-nation
counterterrorism forces.
d. the logistical support for the CMT.
a. a Special Reaction Team (s) (SRT), a hostage negotiation team, and a third
team that is split into the inner- and outer-perimeter elements.
b. S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local NCIS
office.
c. higher headquarters, the State Department or host nation representative, and
the FBI.
d. an Explosive Ordnance Disposal squad and the Naval Criminal Investigative
Service representative.
a. advises the commander and the EOC on all aspects of the incident.
b. neutralizes or apprehends a barricaded offender with a minimum of danger to
hostages, team members, or others.
c. advises the EOC on all aspects of the operation.
d. neutralizes offenders without prejudice.
a. interacts with the terrorists on order from the TMF commander. Members of
the negotiation team must be able to establish rapport with the terrorists.
b. advises the commander and the EOC on all aspects of the incident.
c. advises the EOC on all aspects of counterintelligence.
d. interacts with the SRT by providing reconnaissance assets.
8-30
11. A negotiation team is comprised of
8-31
15. The outer-perimeter is comprised of an officer or a noncommissioned
officer-in-charge and a troop to MP ratio of no greater than
a. 1 or 2 to 1.
b. 2 or 3 to 1.
c. 3 or 4 to 1.
d. 4 or 5 to 1.
8-32
Study Unit 8 Exercise Solutions
Reference
1. c. 8101
2. It is used to capitalize on the in-place organizational 8102
structure of existing agencies and to utilize the
assigned responsibilities and capabilities of these
agencies within a clearly defined command and control
structure to combat terrorism.
3. deterrence, prevention, reaction, and prediction 8103
4. b. 8201
5. d. 8201
6. a. 8202
7. a. 8202
8. b. 8203
9. c. 8203
10. a. 8204
11. b. 8204
12. d. 8205
13. a. 8205
14. c. 8206
15. d. 8206
16. b. 8207
17. c. 8207
18. a. 8207
8-33
TERRORISM AWARENESS FOR MARINES
INSTRUCTIONS: The purpose of the review lesson is to prepare you for your final
examination. We recommend that you try to complete your review lesson without referring to the
text, but for those items (questions) you are unsure of, restudy the text. When you have finished
your review lesson and are satisfied with your responses, check your responses against the
answers provided at the end of this review lesson examination.
Select the ONE answer which BEST completes the statement or answers the item. For
multiple-choice items, circle your response. For matching items, place the letter of your response
in the space provided.
a. One who advocates or one who creates an environment of economic growth with
the intent of influencing others careers.
b. One who advocates, creates, or practices the use of terror for a means of coercion.
c. One who advocates or one who creates or practices crime for the means of personal
gain.
d. An advocate or one who creates or practices crime for the advancement of a
particular race or group of people.
R-1
3. A terrorist group is an organization of
R-2
8. Select the correct definition for the term terrorist operation.
a. Any criminal act carried out by a person or group to gain attention for a cause to
raise capital or to obtain equipment for future operations by using terror-causing
tactics
b. Highly complex goal oriented operations designed specifically to impact
or affect world politics
c. Goal oriented operations designed specifically to affect world politics
d. Simple covert operations designed to gain attention and promote a certain
ideological cause
9. Select the phase during which the terrorists decide that a hostage-barricade or other
similar event is a worthwhile endeavor.
a. Climax phase
b. Pre-incident phase
c. Post-Incident phase
d. Negotiation phase
e. Initiation phase
1. Burglary 8. Bombing
2. Kidnapping 9. Arson
3. Hijacking 10. Genocide
4. Surveillance 11. Assassination
5. International narcotics support 12. Armed assault
6. Intimidation 13. Hostage-taking
7. Beatings/maiming 14. Anarchy
a. 1, 2, 3, 4, 5, 6, 7, 8 c. 2, 3, 7, 8, 9, 11, 12, 13
b. 1, 3, 4, 5, 6, 7, 8, 9 d. 5, 6, 7, 8, 9, 12, 13, 14
R-3
11. Select the key characteristic of personnel who have been the target of a terrorist
operation. The personnel
13. From the list below, select the four categories into which targets of terrorist attacks are
divided.
a. 1, 5, 6, 8 c. 2, 4, 5, 7
b. 2, 3, 4, 7 d. 2, 5, 8, 10
R-4
17. The assault element of a terrorist organization is responsible for
18. What are the three teams that comprise the assault element?
19. The security team of an assault element is responsible for security for the
20. The support cell of the terrorist organization is also known as the auxiliary cell. The
support cell is responsible for providing
a. the terrorist organization with the action arm of the organization including the
organization's cadre.
b. protective, covering fire for the reconnaissance team.
c. eyes-on information concerning the intended target.
d. logistical support such as fund-raising, gathering sympathizers, and distributing
propaganda.
R-5
22. Select those terrorist groups organic to Europe from the list below.
1. Chukaku-Ha
2. Abu Nidal Organization (ANO)
3. Armenian Secret Army for the Liberation of Armenia
4. Bandera Roja (Red Flag-GBR)
5. Basque Fatherland and Liberty (ETA)
6. Popular Forces 25 April (FP-25)
7. Lorenzo Zelaya Popular Revolutionary Forces (FPR-LZ)
8. Macheteros (Machete Wielders)
9. Movement of the Revolutionary Left (MIR)
10. Provisional Irish Republican Army (PIRA)
11. Red Army Faction (RAF)
12. Red Brigades (BR)
13. Revolutionary Cells (RZ)
14. Revolutionary Organization 17 November
15. Revolutionary Popular Struggle (ELA)
23. Select those terrorist groups organic to Asia from the list below.
R-6
24. Select those terrorist groups organic to the Middle East from the list below.
R-7
25. Select those terrorist groups organic to the Americas from the list below.
26. What are the three principal sources used in determining whether a country or region is
subject to a travel advisory or travel restriction?
R-8
27. When you receive word of being assigned to duty in a foreign country, there are certain
areas you should focus on to build personal knowledge of the country. What are they?
a. 1, 2, 3, 4, 6 c. 2, 4, 5, 7, 11
b. 2, 3, 8, 9 d. 4, 6, 8, 11, 12
28. Select the four principal steps in evaluating the existing threat from the list below.
a. 1, 3, 4, 7 c. 3, 6, 7, 8
b. 3, 5, 7, 8 d. 5, 6, 7, 8
29. Select the three steps in evaluating the extended terrorist threat.
a. 1, 3, 6 c. 2, 4, 5
b. 1, 2, 5 d. 3, 4, 6
R-9
Matching: For items 30 through 34, match the threat condition in Column 1 to its
description in Column 2.
Column 1 Column 2
R-10
For items 35 through 38, use the numbered security measures listed below.
35. Which security measures are enforced when an ALPHA THREATCON is set?
a. 1 through 3 c. 1 through 9
b. 1 through 5 d. 1 through 10 and 12
36. Which security measures are enforced when a BRAVO THREATCON is set?
a. 1 through 8 c. 1 through 10
b. 1 through 3 and 5 through 8 d. 1 through 3 and 5 through 9
37. Which security measures are enforced when a CHARLIE THREATCON is set?
38. Which security measures are enforced when a DELTA THREATCON is set?
R-11
39. What personal legal document(s) should you prepare when you learn that you are being
assigned to a threat region,
a. Power of attorney
b. Will
c. Will, power of attorney, and dependent certification
d. Will and power of attorney
41. When preparing mentally for assignment to a threat region, what three sources of
information can you use?
42. What is the benefit of researching your newly-assigned country when preparing mentally
for assignment to a threat area? It
43. Part of preparing mentally is researching the culture of a country. According to what you
have learned, what should you focus on as a starting point?
44. What should you focus on when researching a country's or region's history?
R-12
45. What should you focus on when researching a country's or region's society?
46. As you prepare for assignment into a threat region, you will at least check to see what
language is spoken. What is considered to be the "native" language?
47. What are the five areas associated with the country or region that dependents should
become knowledgeable of when they are accompanying you to a threat region?
48. What are the two types of physical conditioning you should consider when preparing
yourself physically for assignment to a threat region?
49. What should you use as a general rule concerning your civilian attire when preparing
yourself for assignment to a region with a terrorist threat?
R-13
50. Select the eight security considerations for selecting a residence.
51. Which door is considered superior when upgrading the physical security of a residence?
52. An effective way of ensuring the hinges cannot be removed from a door is to drill a small
hole through the hinge and into the pin and ___________________ a second pin or small
nail flush with the hinge surface.
a. add c. remove
b. insert d. refit
53. The simplest measures to prevent a sliding glass door from being lifted out of its channel is
to drill a hole through the _______________ and the _________________. Insert a pin
or nail to prevent the door from being opened.
R-14
54. What are two major considerations when using lighting to improve security of a
residency?
55. There are nine steps in maintaining a low profile. What are five of the steps?
a. Blend into surroundings, avoid showing off material wealth, use an unlisted phone
number, avoid publicity, and avoid establishing daily routines.
c. Blend into surroundings, use an unlisted phone number, avoid changing your style
of dress, avoid giving personal information to security personnel, and use a marked
parking space.
d. Blend into surroundings, place name on vehicles and residence, avoid showing off
material wealth, avoid establishing routines, and avoid publicity
R-15
57. What are six of the twelve auto safety tips?
a. Keep vehicle in good mechanical condition, check car before getting in, stop for
accidents or other problems, always use your seatbelt, memorize the locations of
safehavens, drive with doors locked.
b. Leave only your ignition key with attendants, keep your vehicle in good
mechanical condition, drive with car doors locked and windows closed, avoid
driving closely behind other vehicles where you could be boxed in, use the center
lane to avoid being forced to the curb, memorize the location of safe houses.
c. Keep gas tank at least one-quarter full, check car over before getting in, never pick
up hitchhikers or strangers, leave all your car keys with the attendant, always use
your seatbelt, do not stop for accidents or other problems.
d. Always check over your vehicle before entering, drive with doors locked and
windows closed, stop for all accidents or problems, always use your seat belts, on
multi-lane highways drive in the right lane to avoid high speed carjackings, avoid
suspicious road blocks by driving in the opposite direction. Be prepared to escape
by going around the obstacle or by ramming it.
58. When traveling in a threat region, you should employ certain personal security measures.
From the list below, select those that are personal protection measures.
a. 1, 2, 4, 6, 13 c. 3, 4, 9, 10, 11
b. 2, 3, 6, 10, 12 d. 4, 5, 10, 11, 13
R-16
Items 59 through 62 are about security procedures in the workplace. Select the category that
each group of procedures belongs in.
59. Keeping a fire extinguisher, first-aid kit, and oxygen bottle in the office are some of the
recommendations considered under
60. A clean desk policy facilitates improved security since it makes it difficult to hide
intelligence collecting devices or improvised explosive devices in occupied offices at the
close of the working day. This is one of the recommendations considered under
61. Not carrying items with markings that identify the owner by rank or title or even having
them in the office environment is a recommendation under
62. Not accepting packages from strangers until you are satisfied with the individual's identity
and the nature of the parcel is one of the recommendations under
a. 1, 3, 5 c. 2, 4, 6
b. 1, 2, 5 d. 3, 4, 6
R-17
For items 64 through 67, select the type of detention that best corresponds to the statement.
64. A U.S. citizen is detained for having committed a criminal offense while stationed in a
hostile country.
65. A Marine, while patrolling an urban area on a United Nations sponsored peace-keeping
mission, is taken by members of an independent terrorist group.
66. While conducting humanitarian services in conjunction with a NATO operation in Bosnia,
a Marine is taken hostage by a state-sponsored terrorist group.
67. While on mechanized patrol in Kuwait, your squad inadvertently crosses into Iraq. The
Iraqis detain you and the rest of the patrol for four days.
R-18
68. What are the three responsibilities of a Marine regarding being a hostage/detainee and the
Code of Conduct?
69. What is the primary goal of a hostage with regards to the Code of Conduct?
a. Resisting exploitation
b. Keeping faith in the United States
c. Resisting interrogation
d. Keeping faith with one's fellow detainees/hostages
70. What are the three factors that will assist personnel in maintaining their bearing as
detainees or hostages?
a. 1, 3, 7 c. 2, 3, 7
b. 2, 4, 6 d. 2, 4, 7
R-19
72. Select the statement that defines the United States' policy concerning terrorism.
a. All terrorist actions are religious in nature and will be handled by the respective
country in which the action occurs. All measures to prevent such acts and to judge
those who committed them will be taken. The U.S. will bargain or make any
concessions to terrorist blackmail. When Americans are abducted overseas, the
United States will continue to cultivate international cooperation to combat
terrorism.
b. All terrorists are criminally insane and intolerable. All lawful measures to prevent
terrorists from committing terrorist acts and to bring to justice those who assist
terrorists will be taken. The U.S. Federal Bureau of Investigation will not bargain
with or make any concessions to terrorist blackmail. To do so would invite further
demands. When American servicemen are abducted overseas, the United States
will continue to cultivate international cooperation to combat terrorism and secure a
safe release of hostages.
c. All terrorist actions, whatever their motivation, are acts of insanity and intolerable
and should be condemned. All measures to prevent such acts and bring to justice
those who commit them will be taken. The U.S. will not bargain or make any
concession to terrorist blackmail. To do so would invite further demands. When
Americans are abducted overseas, the United States will continue to cultivate
international cooperation to combat terrorism and secure the safe release of the
hostages.
d. All terrorist actions, whatever their motivation, are criminal and intolerable and
should be condemned. All lawful measures to prevent such acts and bring to justice
those who commit them will be taken. The U.S. will not bargain or make any
concession to terrorist blackmail. To do so would invite further demands. When
Americans are abducted overseas, the United States will continue to cultivate
international cooperation to combat terrorism and secure a safe release of the
hostages.
R-20
73. Select the statement that best defines the concept of the Trilevel Antiterrorism Program.
It is used to capitalize on the in-place organizational structure of existing agencies
a. within the Marine Corps and to use the assigned responsibilities and capabilities of
these agencies within a clearly defined command and control structure to combat
terrorism.
c. and to use the assigned responsibilities and capabilities of these agencies within a
clearly defined command and control structure to combat terrorism.
74. The four basic components of the Ttrilevel Antiterrorism Program at the operational level
are:
75. Select the statement that best defines the function of the Crisis Management Team.
R-21
76. The Crisis Management Team consists of
a. S/G-1, S/G-2, S/G-3, S/G-4, special staff sections, EOD, and the local NCIS office.
b. the staff sections of the S-1/G-1, S-3/G-3; the special reaction teams, the hostage
negotiation teams, and the inner- and outer-perimeter elements.
c. the threat management force, the SRTs, the negotiation teams, and the inner- and
outer-perimeter teams.
d. higher headquarters, the State Department or host nation representative, and the
FBI.
R-22
80. The Special Reaction Team is comprised of
a. interact with the terrorists on order from the TMF commander. The team must be
able to establish rapport with the terrorists.
b. physically control the area immediately around the scene. This team has the closest
tactical contact with the terrorists.
c. advise the EOC on all aspects of counterintelligence.
d. interact with the SRT by providing reconnaissance assets.
a. physically controlling the area immediately around the scene. It has the closest
tactical contact with the terrorists. This element contains the situation and relays
intelligence on activity at the scene to the TMF commander.
b. interacting with the terrorists on order from the TMF commander. Members of the
element must be able to establish rapport with the terrorists.
c. advising the EOC on all aspects of the operation.
d. neutralizing offenders without prejudice.
R-23
85. The mission of the outer-perimeter element is
a. 4 or 5 to 1 c. 2 or 3 to 1
b. 3 or 4 to 1 d. 1 or 2 to 1
For items 87 through 89 select the event that occurs during the indicated response phase of a
terrorist attack/incident.
87. Phase I
88. Phase II
R-24
Review Lesson Solutions
Reference
1. d. 1101
2. b. 1101
3. a. 1101
4. b. 1102
5. d 1201
6. b. 1202
7. d. 1203
8. a. 2101
9 d. 2102
10. c. 2103
11. a. 2104
12. a. 2104
13. d. 2105
14. d. 2201
15. a. 2201
16. d. 2201
17. b. 2201
18. c. 2201
19. a. 2201
20. d. 2201
21. d. 2201
22. d. 3101-3109
23. c. 3201-3205
24. a. 3301-3310
25. c. 3401-3417
26. a. 4101
27. c. 4201
28. b. 4202
29. a. 4203
30. e. 4301
31. d. 4301
32. b. 4301
33. a. 4301
34. c. 4301
35. a. 4302
36. b. 4302
37. c. 4302
38. d. 4302
39. d. 5101-5102
R-25
Review Lesson Solutions, continued
Reference
40. c. 5102
41. a. 5201
42. d. 5202
43. c. 5202
44. c. 5202
45. d. 5202
46. a. 5203
47. c. 5204
48. b. 5301
49. c. 5302
50. a. 6101
51. c. 6102
52. b. 6102
53. d. 6102
54. a. 6102
55. a. 6201
56. d. 6202
57. b. 6203
58. d. 6204
59. d. 6205
60. c. 6205
61. c. 6205
62. d. 6205
63. b. 7101-7103
64. c. 7101
65. d. 7103
66. b. 7102
67. c. 7101
68. b. 7201
69. a. 7202
70. d. 7203
71. b. 7204
72. d. 8101
73. c. 8102
74. c. 8103
75. d. 8201
76. a. 8201
77. d. 8202
78. d. 8202
R-26
Review Lesson Solutions, continued
Reference
79. c. 8203
80. a. 8203
81. a. 8204
82. c. 8204
83. a. 8205
84. a. 8205
85. b. 8206
86. a. 8206
87. b. 8207
88. d. 8207
89. a 8207
R-27
BIBLIOGRAPHY
SOURCE MATERIALS
MCI-RELATED COURSES
Directions:
This questionnaire is extremely important to the Marine Corps Institute. The course you have just
completed has undergone extensive development and revision. As an integral part of the
continued success of this course, YOUR HELP IS NEEDED. By completing this questionnaire,
your responses may result in a need to review the course.
Please take five minutes, complete the questionnaire and return it to MCI in the self-addressed
envelop provided with your course materials. Additional comment sheets may be attached to this
questionnaire. If you want to be contacted by the course instructor, please provide your name,
rank, and phone number. Regardless of whether you want to be contacted or not, please enter
your primary military occupational speciality (MOS).
1. How long did it take you to complete this course including the review lesson examination?
___ Less than three hours If more than fifteen hours
___ Three to six hours enter number of hours
___ Seven to ten hours here: ______
___ Eleven to fourteen hours
2. Were the learning objectives stated at the beginning of each lesson clear?
(Circle your response)
a. Yes b. No
If you circled "NO" please list below the study unit and lesson number
for those unclear objectives.
MARINE CORPS INSTITUTE
COURSE EVALUATION QUESTIONNAIRE
3. Did the figures, that is illustrations, photographs, tables, charts, etc., clearly support
the information/text within the lesson? (Circle your response)
a. Yes b. No
If you circled "NO" please list the figure or table number(s) below.
______ ______ ______ ______ ______ ______ ______ ______
4. Did the exercise at the end of a lesson or study unit test your skills and knowledge
gained by studying the lesson? (Circle your response)
a. Yes b. No
If "NO" please list the exercise question/item number, the lesson number,
and the study unit number below. (Attach additional sheet, if necessary)
5. When you read the lesson the first time, did it make sense to you? (Circle your
response)
a. Yes b. No
If "NO" please list the lesson number and/or paragraph number below.
______ ______ ______ ______ ______ ______ ______ ______
6. Would you recommend that a revision be made to any portion of this course? (Circle
your response)
a. Yes b. No
Use this form for questions you have about this course. Write out your question(s) and refer to
the study unit, lesson exercise item, or the review lesson exam item you are having a problem
with. Before mailing, fold the form and staple it so that MCI's address is showing. Additional
sheets may be attached to this side of the form. Your question(s) will be answered promptly by
the Distance Training Instructor responsible for this course.
TELEPHONE NUMBER
YOUR QUESTION:
INSTRUCTOR'S RESPONSE:
MARINE CORPS INSTITUTE--STUDENT REQUEST/INQUIRY-MCI - R-11 (3/96)
MCI 02.10b
TERRORISM AWARENESS FOR MARINES DATE:
_______________
RANK FIRST NAME MI. LAST NAME MOS RUC SOCIAL SECURITY NO.
MILITARY ADDRESS (INCLUDE ZIP CODE) (Reservists may use civilian address)
FROM: TO:
CHANGE NAME: NAME:
RANK: RANK:
SSN: SSN:
RUC: RUC:
(Students are only eligible for one extension prior to (Students are only eligible for reenrollment once and
their Course Completion Date (CDD)) only after their CDD. If already reenrolled and
disenrolled, a new enrollment must be requested)
AUTHORITY: Title 5, USC, Sec. 301. Use of your Social Security Number is authorized by Executive Order 9397 of 22 Nov 43.
PRINCIPAL PURPOSE: The Student Request/Inquiry is used to transmit information concerning student participation in MCI courses.
ROUTINE USES: This information is used by MCI personnel to research student inquiries. In some cases information contained therein is used to
update individual student records maintained by the Marine Corps Institute.
MANDATORY OR VOLUNTARY DISCLOSURE AND EFFECT ON INDIVIDUAL NOT PROVIDING INFORMATION: Disclosure is
voluntary. Failure to provide information may result in the provision of incomplete service to your inquiry. Failure to provide your Social Security
Number will delay the processing of your request/inquiry .