Antiterrorism: Joint Publication 3-07.2
Antiterrorism: Joint Publication 3-07.2
Antiterrorism
24 November 2010
Intentionally Blank
PREFACE
1. Scope
This publication provides joint doctrine for planning, executing, and assessing joint
antiterrorism operations.
2. Purpose
This publication has been prepared under the direction of the Chairman of the Joint
Chiefs of Staff. It sets forth joint doctrine to govern the activities and performance of the
Armed Forces of the United States in joint operations and provides the doctrinal basis for
interagency coordination and for US military involvement in multinational operations. It
provides military guidance for the exercise of authority by combatant commanders and other
joint force commanders (JFCs) and prescribes joint doctrine for operations, education, and
training. It provides military guidance for use by the Armed Forces in preparing their
appropriate plans. It is not the intent of this publication to restrict the authority of the JFC
from organizing the force and executing the mission in a manner the JFC deems most
appropriate to ensure unity of effort in the accomplishment of the overall objective.
3. Application
a. Joint doctrine established in this publication applies to the Joint Staff, commanders of
combatant commands, subunified commands, joint task forces, subordinate components of
these commands, and the Services.
WILLIAM E. GORTNEY
VADM, USN
Director, Joint Staff
i
Preface
Intentionally Blank
ii JP 3-07.2
SUMMARY OF CHANGES
REVISION OF JOINT PUBLICATION 3-07.2
DATED 14 APRIL 2006
Updates the capabilities and functions of several intelligence and law enforcement
organizations, including resources for obtaining intelligence relevant to the
commander.
Removes five other appendixes with information that is better covered and more
up to date in other publications, to include: “Sample Barrier Plan,” “FPCON
system,” “Homeland Security Advisory System,” “CBRN Planning
Considerations,” and “JAT Program Manager's Guide.”
iii
Summary of Changes
Intentionally Blank
iv JP 3-07.2
TABLE OF CONTENTS
PAGE
CHAPTER I
INTRODUCTION
CHAPTER II
TERRORIST THREAT
· Threat of Terrorism...................................................................................................II-1
· Terrorist Organizational Structures ..........................................................................II-1
· Lone Terrorist ...........................................................................................................II-3
· Identity Based Terrorism ..........................................................................................II-3
· State Affiliation ........................................................................................................II-7
· Terrorist Membership ...............................................................................................II-8
· Common Terrorist Tactics, Techniques, and Procedures .......................................II-10
· Terrorist Use of Asymmetrical Tactics...................................................................II-12
· Terrorism Against the Homeland ...........................................................................II-15
CHAPTER III
INTELLIGENCE
CHAPTER IV
LEGAL CONSIDERATIONS
v
Table of Contents
CHAPTER V
ANTITERRORISM PROGRAMS
CHAPTER VI
TERRORIST INCIDENT RESPONSE
APPENDIX
GLOSSARY
FIGURE
vi JP 3-07.2
EXECUTIVE SUMMARY
COMMANDER’S OVERVIEW
Introduction
Terrorists pose a grave The National Strategy for Combating Terrorism outlines a
danger to the national strategic vision built around an international effort aimed
security and interests of the at the defeat of violent extremism which threatens the
United States at home and way of life for free and open societies and creation of a
abroad. global environment inhospitable to violent extremists and
their supporters. Although there is no universal definition
for terrorism, the Department of Defense (DOD) defines
it as the unlawful use of violence or threat of violence to
instill fear and coerce governments or societies.
Terrorism is often motivated by religious, political, or
other ideological beliefs and committed in the pursuit of
goals that are usually political.
The broader construct of Historically, combating terrorism (CbT) has been both a
combating terrorism (CbT) battle of arms and ideas—a fight against the terrorists and
is defined as actions, the ideology which drives terrorism. CbT remains an
including antiterrorism approach with both defensive and offensive components:
(AT) and counterterrorism, antiterrorism (AT)—defined as defensive measures used
taken to oppose terrorism to reduce the vulnerability of individuals and property
throughout the entire threat to terrorists acts, to include rapid containment by
spectrum. local military and civilian forces; and
counterterrorism—defined as actions taken directly
against terrorists networks and indirectly to influence
and render global and regional environments
inhospitable to terrorist networks.
vii
Executive Summary
viii JP 3-07.2
(HD), Defense Critical Infrastructure Program, and civil
support activities within DOD.
ix
Executive Summary
Terrorist Threat
Terrorists use violence or The current terrorist paradigm involves a broad spectrum
the threat of violence to of threats including traditional state-sponsored terrorism,
impact multiple audiences. networks of non-state actors, extremist groups, criminal
networks, and radicalized individuals acting alone. A
critical factor in understanding terrorism is the importance
of the emotional and psychological impact of terrorism.
There are two typical Newer groups tend to organize or adapt to the networked
organizational structures model, while others associated with political
used by terrorist groups: organizations prefer the more centralized control of the
hierarchical and networked. hierarchical structure to coordinate violent action with
political action. Most groups are composed of both
structures, continuously adapting as the strategic
environment dictates. Within either of those two larger
organizational structures, however, virtually all terrorist
groups organize as smaller cells at the tactical level.
x JP 3-07.2
Without a unifier, networks may take actions that are
counterproductive, and independent nodes may not
develop the necessary cohesiveness for success of the
network. General goals and targets are announced, and
individuals or cells with redundant capabilities are
expected to use flexibility and initiative to conduct the
necessary actions.
There are three basic types Chain. Each node links to the node next in sequence and
of network structures, communication between the nodes is by passing
depending on the ways in information along the line. This organization is typical
which elements (nodes) are among networks that have a common function such as
linked to other elements of smuggling goods and people or laundering money.
the structure: the chain,
hub (or spoke and wheel), Hub or Spoke and Wheel. Outer nodes communicate
and all-channel. with one central node, which may not be the leader or
decision maker for the network. A variation of the hub is
a wheel design where the outer nodes communicate with
one or two other outer nodes in addition to the hub. A
wheel configuration is common for a financial or
economic network.
As compared with a typical The lone terrorist’s tactics are conceived entirely on his
networked or hierarchical own without any direction from a terrorist commander.
terrorist organization, the Typically, the lone terrorist shares an ideological and
lone terrorist is often the sympathetic identification with an extremist organization
hardest to detect, which and its goals, and may have had some limited level of
presents a formidable direct affiliation in the past, but the lone terrorist does not
challenge for law communicate with any group as he fashions his political
enforcement (LE) and aims and commits acts of terrorism. Notably, it can be
intelligence agencies. difficult to distinguish between a lone terrorist aiming for
political results and another criminal, such as a serial
killer, who uses the same tactics.
xi
Executive Summary
Identity and intent are Some of the common identity and intent categories are:
linked closely to the
underlying ideology and the Ethnocentric. Groups of this persuasion see race or
corresponding strategic ethnicity as the defining characteristic of a society, and
goals. Political or religious therefore a basis of cohesion.
identity expressed in
ideology is often all- Nationalistic. Loyalty and devotion to a nation-state, and
encompassing and the national consciousness derived from placing one
determines the general nation’s culture and interests above those of other nations
parameters — the “why” or groups is the motivating factor behind these groups.
and “where” — of the
terrorist operations. Revolutionary. These groups are dedicated to the
overthrow of an established order and replacing it with a
new political or social structure.
xii JP 3-07.2
instances it is less relevant are often loosely defined, and can be applied to widely
when referring to different capabilities. International groups typically
international and operate in multiple countries, but retain a geographic
transnational terrorism. focus for their activities.
Typically, there are four Leaders provide direction and policy, approve goals and
different levels of objectives, and produce overarching guidance for
commitment within a operations.
terrorist organization:
passive supporters, active Cadre are the zealots of a terrorist organization who not
supporters, cadre, and only plan and conduct operations, but also manage
leadership. technology, intelligence, finance, logistics, information
operations (IO), and communications. Mid-level cadres
tend to be trainers and technicians such as bomb makers,
financiers, and surveillance experts. Low-level cadres
are the bombers and direct action terrorists for other
types of attacks.
xiii
Executive Summary
Terrorists employ a variety Their targets may be just as likely economic (tourists,
of tactics, techniques, and financial networks) or agricultural (livestock, crops), as
procedures—some small they are embassies or military forces. Their goal is not
scale, some large scale—to just to win favor for their causes, but to erode the
produce fear in their confidence, capability, and legitimacy of the government
intended audience. or societies they wish to coerce. The most common TTP
employed by terrorist groups are: assassination, arson,
bombing, kidnapping and hostage taking, hijacking,
seizure, raids and ambushes, sabotage, threats and hoaxes,
and environmental destruction.
Terrorists prefer to attack Using this approach, terrorists pick the time, place, and
their adversaries manner of the attack while avoiding direct contact with
asymmetrically by their targets. Asymmetric tactics routinely employed by
circumventing an terrorist adversaries include:
opponent’s strength and
exploiting his weaknesses. Denial and Deception - Dispersion and hiding in
complex terrain and urban environments degrade
situational awareness and complicate US intelligence and
targeting efforts
xiv JP 3-07.2
with improvised explosive devices and indirect fire
weapons. Standoff tactics permit the attack on a target
with enough intervening distance and time to allow for
escape from the engagement area and/or to avoid
immediate overwhelming return fire.
Securing the American The 1995 bombing of the Murrah Federal Building in
homeland is a challenge of Oklahoma City and the attacks of 9/11 highlight the threat
monumental scale and of terrorist acts within the US. Domestic terrorist groups,
complexity. transnational terrorist groups, and special interest
extremist groups continue to pose a threat to the peace
and stability of our Nation. Terrorists choose their targets
deliberately based on the weaknesses they observe in our
defenses and in our preparations. They can balance the
difficulty in successfully executing a particular attack
against the magnitude of loss it might cause. Terrorist
groups can infiltrate organizations, groups, or geographic
areas to wait, watch, and identify weaknesses and
opportunities while it is much more difficult for us to do
the same.
Intelligence
xv
Executive Summary
DOD-level AT intelligence DIA. The Director, DIA, under the Under Secretary of
roles and responsibilities. Defense for Intelligence, is responsible for establishing
and maintaining an international all-source terrorism
intelligence fusion center, Joint Intelligence Task Force-
Combating Terrorism (JITF-CT). The JITF-CT provides a
wide range of terrorism intelligence for DOD
components, to include indications and warnings, current
intelligence, assessments, in-depth analysis, DOD
terrorism threat assessments/levels, and the maintenance
of a combating terrorism database.
xvi JP 3-07.2
GCCs. The GCC, through the intelligence directorate of a
joint staff, joint intelligence operations center, command
counterintelligence coordinating authority, and
subordinate component commands’ CI and AT
organizations, and in consultation with DIA, CIA, US
country team, and applicable HN authorities, compiles
intelligence and CI information specific to the operational
area and issues intelligence and CI reports, advisories, and
assessments.
Legal Considerations
xvii
Executive Summary
Memorandum of Title 22, United States Code, Section 4802, directs the
understanding and Secretary of State (SECSTATE) to assume responsibility
memorandum of for the security of all US Government (USG) personnel
agreement. on official duty abroad, except those under the command
of GCCs and their accompanying dependents.
SECSTATE discharges these responsibilities through the
COMs. In December 1997, SecDef and SECSTATE
signed the MOU on Security of DOD Elements and
Personnel in Foreign Areas (also known as the “Universal
MOU”). The MOU is based on the principle of assigning
xviii JP 3-07.2
security responsibility to the party—GCC or COM—in
the most efficient and effective position to provide
security for DOD elements and personnel. The MOU
requires delineation of security responsibilities through
country-specific MOAs.
Antiterrorism Program
The minimum elements of Protection of DOD personnel and assets from acts of
an AT program are AT risk terrorism is one of the most complex challenges for
management, planning, commanders. AT programs consist of defensive measures
training and exercises, to reduce the vulnerability of individuals and property to
resource management, and terrorist acts, including rapid containment by local
a program review. military and civilian forces. An integrated and
comprehensive AT program (physical security,
construction standards, CBRN passive defense, OPSEC,
CI, biometrics and forensics exploitation, etc.) must be
developed, implemented, and updated in order to
effectively detect, defend, and respond to a terrorist
threat.
xix
Executive Summary
Antiterrorism plan AT plans should prepare for the most likely threats and
development. should maximize the use of existing plans and standing
operating procedures (SOPs). For instance, existing
procedures for fire response, operation center
management, disaster response, CBRN/hazardous
materials (HAZMAT) response, security operations, and
other related activities can be referenced in the document
and do not need to be reproduced.
Risk management process. TA, CA, and VA are used to produce an over-all risk
assessment. Use the final risk assessment as a guide to
risk mitigation priorities and establish a local baseline or
defense posture.
Training and exercises. AT plans are exercised annually and whenever possible
should be conducted in coordination with federal, local,
xx JP 3-07.2
state, tribal, or HN authorities and US embassies and
consulates.
Surveillance awareness. DOD personnel and their families must understand the
implications of hostile surveillance; to assume that it is
occurring, how to discretely detect or identify it, and what
to do if they suspect it. In fact, personnel are often able to
detect criminal or terrorist surveillance (i.e., targeting
themselves or their installations) as a result of enhanced
situational awareness orchestrated by aggressive AT
programs. They may even make themselves less desirable
targets by following the four fundamental principles of
surveillance awareness: stay informed, keep a low
profile, be unpredictable, and stay alert.
xxi
Executive Summary
xxii JP 3-07.2
DOD personnel and property; and, when appropriate,
conduct or support criminal investigations. Well
developed response measures can save lives, preserve
health and safety, protect and secure property, and
eliminate the hazard. A slow or uncoordinated response
may result in additional loss of life, further damage to the
installation, and the loss of public confidence in the
organization’s ability to respond to a terrorist incident.
The onset of a terrorist Detection may result from routine surveillance performed
incident begins with the by an installation or facility intrusion-detection system,
detection of an unlawful act guard or security force, or in the case of bioterrorism, an
of violence or the threat of unusual incidence of an infectious disease. Once detection
violence. of a terrorist act or incident has occurred, an initial
assessment must be conducted by the first responding LE
or security detachment.
Responses will vary The initial response force should immediately identify
according to the incident. and report the nature of the situation, isolate the incident,
and contain the situation until relieved by the reaction
force commander. Initial response force actions are
critical and all installations/ships must have trained
personnel who are aware of the threat and are capable of
reacting promptly 24 hours a day.
xxiii
Executive Summary
xxiv JP 3-07.2
Principal public affairs objectives of a terrorist incident
crisis management plan are to ensure accurate information
is provided to the public (including news media) and to
communicate a calm, measured, and reasonable reaction
to the ongoing event.
NIMS standard incident The incident command system, which defines the
management structures are operating characteristics, management components, and
based on four key structure of incident management organizations
organizational systems. throughout the life cycle of an incident.
CONCLUSION
xxv
Executive Summary
Intentionally Blank
xxvi JP 3-07.2
CHAPTER I
INTRODUCTION
John F. Kennedy
Address to the Graduating Class
US Naval Academy, 6 June 1962
a. Terrorists pose a grave danger to the national security and interests of the United
States at home and abroad. The National Strategy for Combating Terrorism outlines a
strategic vision built around an international effort aimed at the defeat of violent extremism
which threatens the way of life for free and open societies and creation of a global
environment inhospitable to violent extremists and their supporters. Additionally, some
traditional criminal activities, such as counterfeiting or illegal drug trafficking, may be
terrorist related if used to fund terrorist acts. Although there is no universal definition for
terrorism, the Department of Defense (DOD) defines it as the unlawful use of violence or
threat of violence to instill fear and coerce governments or societies. Terrorism is often
motivated by religious, political, or other ideological beliefs and committed in the
pursuit of goals that are usually political.
c. This publication does not expand upon CT. For more information on CbT and CT,
see Joint Publication (JP) 3-26, Counterterrorism. Specific policy, directive guidance,
standards, and procedures for the DOD AT program are contained in DOD Directive
I-1
Chapter I
Combating
Terrorism
Counterterrorism Antiterrorism
Supporting
Functions
Intelligence Support
Information Sharing
Incident
Management
I-2 JP 3-07.2
Introduction
c. Certain protection efforts, such as FP; COOP; critical infrastructure protection (CIP);
information assurance; chemical, biological, radiological, and nuclear (CBRN) defense;
readiness; and installation preparedness, are inherently connected to AT, though these
programs may also focus on, for example, criminal and conventional threats.
For information on WMD active defense, CBRN passive defense, and the relationship
between CbT and combating WMD, see JP 3-40, Combating Weapons of Mass Destruction,
and JP 3-11, Operations in Chemical, Biological, Radiological, and Nuclear (CBRN)
Environments.
For more information, see Chapter V, “Antiterrorism Programs,” and Appendix E, “Risk
Management Process.”
a. DOD Policy
I-3
Chapter I
ANTITERRORISM RELATIONSHIP TO
FORCE PROTECTION
(1) The DOD components, elements, and personnel shall be protected from terrorist
acts through a high priority, comprehensive AT program using an integrated systems
approach.
(2) Commanders at all levels have the responsibility and authority to enforce
appropriate security measures to ensure the protection of DOD elements and personnel
subject to their control, including deployed DOD contractors authorized to accompany the
force and other contractor personnel requiring access to military facilities, as referenced in
DODI 3020.41, Contractor Personnel Authorized to Accompany the US Armed Forces.
Commanders should ensure the AT awareness and readiness of all DOD elements and
personnel (including dependent family members) assigned or attached.
I-4 JP 3-07.2
Introduction
(5) All personnel on DOD-related travel shall comply with theater, country, and
special clearance requirements (DOD 4500.54E, DOD Foreign Clearance Program [FCP]),
before overseas travel. Contractors deploying with or otherwise providing support in a
theater of operations to the Armed Forces of the United States deployed outside the US
conducting contingency operations or other military operations shall comply with DODI
3020.41, Contractor Personnel Authorized to Accompany the US Armed Forces.
For further information on FP and security of contractors, see DODI 3020.41, Contractor
Personnel Authorized to Accompany the US Armed Forces, and JP 4-10, Operational
Contract Support.
(7) Compliance with the “no double standard” policy on dissemination of terrorist
threat information is maintained. (See Chapter III, “Intelligence.”)
b. DOD Responsibilities
For more information on HRP, refer to DODI O-2000.22, Designation and Physical
Protection of DOD High Risk Personnel (HRP).
(c) Monitor programs to reduce the vulnerability of DOD personnel and their
family members, facilities, and other DOD materiel to terrorist attack with the Chairman of
the Joint Chiefs of Staff (CJCS) and other DOD components.
(d) Provide policy and guidance for DCIP and oversee implementation of the
program.
I-5
Chapter I
(e) Ensure all assigned military, DOD civilians, DOD contractors, and their
family members receive applicable AT training and briefings pursuant to DODI 2000.16,
DOD Antiterrorism (AT) Standards. Ensure personnel traveling to a GCC’s AOR comply
with DODD 4500.54E, DOD Foreign Clearance Program (FCP). Ensure personnel are
aware of any Department of State (DOS) travel warnings and alerts in effect at the time of
travel.
(3) The Chairman of the Joint Chiefs of Staff has the following
responsibilities:
(a) Serve as the principal advisor to the Secretary of Defense (SecDef) for all
DOD AT issues.
(b) Prepare joint doctrine and assist the ASD(HD&ASA) in development and
maintenance of the AT program, standards and procedures. Review doctrine, policy,
standards, and procedures of the DOD components. Review, coordinate, and oversee AT
training for all DOD personnel (including their dependent family members) in conjunction
with DOD components.
(d) Assess the DOD components’ AT policies and programs for the protection
of DOD elements and personnel, including DOD-owned, leased, or managed infrastructure
and assets critical to mission accomplishment.
(e) Assess AT as an element of the overall force planning function of any force
deployment decision. Periodically reassess CCDR’s AT posture of deployed forces.
I-6 JP 3-07.2
Introduction
(h) Coordinate with the Under Secretary of Defense for Intelligence and the
ASD(HD&ASA) on sharing of terrorism intelligence and CI data and information on AT.
(l) Maintain the Antiterrorism Enterprise Portal (ATEP) (see Figure I-3).
(m) Review planned and on-going information operations (IO) and community
engagement programs for AT content and effectiveness.
(4) GCCs have overall AT responsibility within their AOR, except for those DOD
elements and personnel for whom a COM has security responsibility pursuant to law or a
memorandum of agreement (MOA). Accordingly, GCCs have the following responsibilities:
(a) Establish AT policies and programs for the protection of all DOD elements
not under the authority of COM within their AOR.
(c) Exercise tactical control (TACON) for FP over all DOD elements and
personnel (including DOD dependents, except those under the security responsibility of a
COM) within the GCC’s AOR. TACON (for FP) applies to all DOD personnel assigned,
permanently or temporarily, transiting through, or performing exercises or training in the
GCC’s AOR. TACON (for FP) is in addition to a GCC’s normal exercise of operational
control over assigned forces.
(d) Periodically assess and review the AT programs of all assigned and
attached DOD components in their AOR. Assess the AT programs of all DOD components
performing in their AOR, except for elements and personnel for whom the COM accepts or
retains security responsibility (see Chapter IV, “Legal Considerations”). Component
commands may be delegated responsibility to conduct these assessments. Ensure AT
program reviews include a validation of the risk management methodology used to assess
I-7
Chapter I
LEGEND
asset criticality, terrorist threat, and vulnerabilities. AT program reviews shall also evaluate
installation and activity preparedness to respond to terrorist incidents (including CBRN
incidents), and the plans for responding to terrorist incidents and maintaining continuity of
essential military operations. Relocate forces as necessary and report to SecDef through
CJCS pertinent actions taken for protection.
(g) Upon arrival in their AOR, ensure all assigned military, DOD civilians,
DOD contractors, and their family members receive applicable AT training and briefings
pursuant to DODI 2000.16, DOD Antiterrorism (AT) Standards. Ensure personnel traveling
I-8 JP 3-07.2
Introduction
within or through their AOR comply with DODD 4500.54E, DOD Foreign Clearance
Program (FCP). Ensure personnel are aware of any DOS travel warnings and alerts in effect
at the time of travel. Provide information necessary to ensure that all DOD personnel
(including dependent family members) scheduled for permanent change of station to their
AOR receive required AT training and briefings (e.g., AOR updates) in compliance with
DODI 2000.16, DOD Antiterrorism (AT) Standards, before departing their previous
assignment. Identify and disseminate to deploying force providers specific AOR
predeployment training requirements that all personnel, including contractors authorized to
accompany the force, must complete before arrival in theater. All contingency contractor
personnel shall comply with applicable GCC and local commander FP policies.
(h) Identify, document, validate, prioritize, and submit to the Joint Staff the
resource requirements necessary to achieve the AT program objectives for each activity
under the GCC or for which that commander has responsibility. Work with the Joint Staff
and the Service component commands to ensure that resource requirements to implement the
AT programs are identified and programmed according to PPBE procedures.
(j) Assess the terrorist threat for the AOR according to DODD 2000.12, DOD
Antiterrorism (AT) Program, and provide threat assessment (TA) information to the DOD
components and the COMs in the AOR. Develop risk mitigation measures and maintain a
database of those measures and the issues that necessitated their implementation. On the
basis of the TA, identify and designate incumbents of HRBs and dependent family members
to receive AT resident training.
(k) Keep subordinate commanders informed of the nature and degree of the
threat. Ensure that commanders are prepared to respond to changes in threats and local
security circumstances. Ensure that the COMs are fully and currently informed of any threat
information relating to the security of those DOD elements and personnel under their
responsibility.
(l) Ensure compliance with the “no double standard” policy (see Chapter III,
“Intelligence”).
(o) Coordinate AT program issues with the functional CCDRs, the COMs, the
DOD agencies and field activities, and the Military Departments, as appropriate.
I-9
Chapter I
(r) Ensure that subordinate commanders establish screening and access control
policies and procedures for all personnel, to include contractor employees, requiring access
to DOD installations consistent with DOD 5200.08 and 5200.08-R. This requirement is
especially pertinent to contractors who have not been issued common access cards.
(a) Establish AT policies and programs for assigned DOD elements and
personnel including assessment and protection of facilities and appropriate level of AT
training and briefings. Coordinate programs with the appropriate GCC and, in coordination
with the GCC, the COM.
(b) Coordinate with the GCCs to ensure adequate AT measures are in place.
(c) Ensure that subordinate elements, which are tenant units on Military
Service installations, coordinate their AT programs and requirements with the host
installation commander. Differences shall be resolved through the applicable CCDR and the
Service component command chain of command.
(f) Identify, document, and submit to the Joint Staff the resource requirements
necessary to achieve AT program objectives for each activity under the combatant command
or for which the commander has responsibility. Work with the Service component
commands to ensure that resource requirements to implement the AT programs are identified
and programmed according to PPBE procedures.
(g) Develop their own CCDR-oriented AT strategic plan that details the vision,
mission, goals, and performance measures in support of the DOD and GCCs’ AT strategic
plans.
(6) Directors of other DOD agencies and components have the following
responsibilities:
I-10 JP 3-07.2
Introduction
(b) Utilize DODI 2000.16, DOD Antiterrorism (AT) Standards, for the AT
planning and execution for their headquarters (HQ) and all activities under their cognizance:
consider mission, characteristics of the activity, geographic location, threat level, and
FPCON. Establish prescriptive AT standards for installations and facilities not located on
US military installations. Coordinate with the applicable CCDR to ensure AT policies and
programs are in concert with the GCCs’ overall responsibility for the AOR.
(e) As part of the PPBE process, identify and document resource requirements
necessary to implement and maintain AT programs. Submit AT requirements to SecDef
with an information copy to CJCS and the appropriate combatant commanders. Include
resource requirements in program and budget submissions. For emergent or emergency AT
requirements that cannot be funded through other means, submit requests through the
appropriate CCDR to CJCS. Implement accounting procedures to enable precise reporting
of data submitted to Congress in the Congressional Budget Justification Book, including the
number and cost of personnel directly supporting the DOD’s AT program.
(f) Identify and designate incumbents of billets that are potentially high-risk
targets of terrorist attacks and dependent family members requiring AT resident training.
Ensure that AT resident training is provided to personnel assigned to HRBs and others, as
applicable.
(g) Ensure that current physical security technology and security requirements
are incorporated into all new contracts, where appropriate.
(h) Ensure AT protective features for facilities and installations are included in
the planning, design, and execution of military and minor construction projects to mitigate
vulnerabilities and terrorist threats (Unified Facilities Criteria [UFC] UFC 4-020-01; DOD
Security Engineering Facilities Planning Manual; UFC 4-010-01, DOD Minimum
Antiterrorism Standards for Buildings; UFC 4-022-01, Security Engineering: Entry Control
Facilities/Access Control Points; UFC 4-010-02, DOD Minimum Antiterrorism Standoff
Distances for Buildings; and UFC 4-021-01, Design and O&M: Mass Notification Systems).
(i) Develop an AT strategic plan that details the vision, mission, goals, and
performance measures in support of the DOD’s AT Strategic Plan.
I-11
Chapter I
c. Agency Leads. With respect to CT and other HD concerns, DOD is not the lead
agency, but has significant supporting roles in several areas. In HD missions (air, land, and
maritime missions), DOD will take the lead and be supported by other federal agencies.
Section 876 of Public Law 107-296, the Homeland Security Act of 2002, states: “Nothing in
this Act shall confer upon the Secretary [of Homeland Security] any authority to engage in
warfighting, the military defense of the United States, or other military activities, nor shall
anything in this Act limit the existing authority of DOD or the Armed Forces to engage in
warfighting, the military defense of the United States, or other military activities.”
For more information on operations in the homeland, see JP 3-27, Homeland Defense, and
JP 3-28, Civil Support.
I-12 JP 3-07.2
CHAPTER II
TERRORIST THREAT
Carlos Marighella
Minimanual of the Urban Guerrilla
1. Threat of Terrorism
This chapter provides a general overview of terrorism. The current terrorist paradigm
involves a broad spectrum of threats including traditional state-sponsored terrorism,
networks of non-state actors, extremist groups, criminal networks, and radicalized
individuals acting alone. A critical factor in understanding terrorism is the importance of the
emotional and psychological impact of terrorism. Terrorists use violence or the threat of
violence to impact multiple audiences. A clear understanding of the enemy remains
fundamental to ensuring the safety of US citizens at home and abroad from the threat of
terrorism.
II-1
Chapter II
Symbionese Liberation Army, and the New World Liberation Front. These organizations
had a clearly defined set of political, social, or economic objectives, and tailored aspects of
their organizations (such as a “political” wing or “social welfare” group) to facilitate their
success. The necessity to coordinate actions between various “fronts,” some political and
allegedly nonviolent, and the use of violence by terrorists and some insurgents, favored a
strong hierarchical structure. The benefits of hierarchies include greater efficiency due to
specialization and ability to coordinate actions toward a common goal.
(b) Terrorist groups are now increasingly part of a far broader but indistinct
system of networks than previously experienced. Rapid changes in leadership, whether
through generational transition, internal conflict, or as a response to enhanced security
operations, may signal significant adjustments to terrorist group organizational priorities and
its capabilities. A network structure may be a variation of several basic nodal concepts, a
node being an individual, a cell, another networked organization, or even a hierarchical
organization. A terrorist network may consist of parts of other organizations (even
governments), which are acting in ways that can be exploited to achieve the network’s
organizational goals. Networks need not be dependent on the latest information technology
to be effective. The organizational structure and the flow of information inside the
organization (i.e., their information management plan) are the defining aspects of networks.
While information technology can make networks more effective, low technology means
such as couriers also enable networks to operate effectively.
b. Basic Types of Networks. There are three basic types of network structures,
depending on the ways in which elements (nodes) are linked to other elements of the
structure: the chain, hub (or spoke and wheel), and all-channel. A terrorist group may also
employ a structure that combines elements of more than one network type. For example, a
transnational terrorist organization might use chain networks for its money-laundering
activities, tied to a hub network handling financial matters, tied, in turn, to an all-channel
leadership network to direct the use of the funds into the operational activities of a hub
network conducting pre-targeting surveillance and reconnaissance. An organizational
structure that may appear very complex during the initial assessments of terrorist groups may
II-2 JP 3-07.2
Terrorist Threat
be more understandable when viewed in the context of chain, hub, or all channel networks
variants or a combination of these structures.
(1) Chain. Each node links to the node next in sequence and communication
between the nodes is by passing information along the line. This organization is typical
among networks that have a common function such as smuggling goods and people or
laundering money.
(2) Hub or Spoke and Wheel. Outer nodes communicate with one central node,
which may not be the leader or decision maker for the network. A variation of the hub is a
wheel design where the outer nodes communicate with one or two other outer nodes in
addition to the hub. A wheel configuration is common for a financial or economic network.
(3) All-Channel. All nodes are connected to each other. The network is
organizationally “flat,” meaning there is no hierarchical command structure above it.
Command and control (C2) is distributed within the network. This is communication
intensive and can be a security problem if the linkages can be identified, reconstructed, and
exploited. However, the lack of an identifiable “head” confounds the targeting and
disrupting efforts normally effective against hierarchies.
3. Lone Terrorist
a. Identity and Intent Categories. Identity and intent are linked closely to the
underlying ideology and the corresponding strategic goals. Political or religious identity
expressed in ideology is often all-encompassing and determines the general parameters —
the “why” and “where” — of the terrorist operations. These factors determine the desired
end state and measures of success for terrorists. Operational tactics, techniques, and
procedures (TTP), specific targets, and timing are often constrained or limited by ideological
frameworks — this may not be the case for some apocalyptic religious ideologies or political
constructs. To make matters even more difficult many categories overlap, even when there
would seem to be inherent ideological conflict. Some of the common categories are:
(1) Ethnocentric. Groups of this persuasion see race or ethnicity as the defining
characteristic of a society, and therefore a basis of cohesion. These groups often desire their
II-3
Chapter II
full sovereignty making ethno-national terrorist groups among the most prevalent type of
terrorist organization.
(4) Separatist. Separatist groups are those with the goal of separation from
existing entities through independence, political autonomy, or religious freedom or
domination. The ideologies separatists subscribe to include social justice or equity, anti-
imperialism, as well as the resistance to conquest or occupation by a foreign power.
(1) Political. Political ideologies are concerned with the structure and organization
of the forms of government and communities. While observers outside terrorist
organizations may stress differences in political ideology, the activities of groups that are
diametrically opposed on the political spectrum are similar to each other in practice.
II-4 JP 3-07.2
Terrorist Threat
distribution of goods, and a society characterized by equal access to resources for all
individuals with an egalitarian method of compensation.
(2) Religious. All of the major world religions have extremists that have taken up
violence to further their perceived religious goals. Religiously motivated terrorists see their
ultimate objectives as divinely sanctioned, and therefore infallible and nonnegotiable.
(a) Religious motivations can also be tied to ethnic and nationalist identities,
such as Kashmiri separatists combining their desire to break away from India with the
religious conflict between Islam and Hinduism. The conflict in Northern Ireland also
provides an example of the mingling of religious identity with nationalist motivations. There
are frequently instances where groups with the same general goal, such as Kashmiri
independence, will engage in conflict over the nature of that goal (religious or secular
government).
(c) Numerous religious groups have either seen activists commit terrorism in
their name, or spawned cults professing adherence to the larger religion while following
II-5
Chapter II
unique interpretations of that particular religion’s dogma. Cults that adopt terrorism are
often apocalyptic in their worldview. These groups are dangerous, unpredictable, and
difficult to penetrate or deter. The Aum Shinrikyo sarin gas attack on the Tokyo Subway in
1995 illustrates the potential threat posed by such groups.
(3) Social. Often particular social policies or issues will be so contentious that they
will incite extremist behavior and terrorism. Frequently this is referred to as “single issue”
or “special interest” terrorism.
(2) International. Often describing the support and operational reach of a group,
this term and transnational are often loosely defined, and can be applied to widely different
capabilities. International groups typically operate in multiple countries, but retain a
geographic focus for their activities. For example, Hezbollah has cells worldwide and has
conducted operations in multiple countries, but is primarily concerned with events in
Lebanon and Israel. Note: An insurgency-linked terrorist group that routinely crosses an
international border to conduct attacks, and then flees to safe haven in a neighboring country,
is “international” in the strict sense of the word, but does not compare to groups that
habitually operate across regions and continents.
(3) Transnational. Transnational groups operate internationally, but are not tied to
a particular country, or even region. Al-Qaeda is transnational, being made up of many
nationalities, being based out of multiple countries simultaneously, and conducting
operations throughout the world. Their objectives affect dozens of countries with differing
political systems, religions, ethnic compositions, and national interests.
II-6 JP 3-07.2
Terrorist Threat
5. State Affiliation
b. While the three categories broadly indicate the degrees of sophistication that may be
expected, it is important to examine each terrorist group on its own terms. The vast funds
available to some narco-terrorists afford them the armaments and technology rivaling some
nation-states. Religious cults or organizations have features from all three of the listed
categories. They may be “non-state supported” (e.g., Japan’s Aum Shinrikyo cult or al-
Qaeda), “state supported” (e.g., extremist factions of Hamas who believe violence serves
their concept of religious servitude), or “state directed” (e.g., Hezbollah is both the “Party of
God” and a religious organization that employs violence in support of both religion and
politics).
Non-State
State Supported State Directed
Supported
II-7
Chapter II
from their cooperation with the terrorists. These opportunists and radicals include criminals,
organized crime, weapons proliferators, rogue states, and insurgent groups who are key
enablers to terrorists.
6. Terrorist Membership
(1) Leaders provide direction and policy, approve goals and objectives, and
produce overarching guidance for operations. Leaders may rise from within the ranks of an
organization or create their own organization.
(2) Cadre are the zealots of a terrorist organization who not only plan and conduct
operations, but also manage technology, intelligence, finance, logistics, IO, and
communications. Mid-level cadres tend to be trainers and technicians such as bomb makers,
financiers, and surveillance experts. Low-level cadres are the bombers and direct action
terrorists for other types of attacks.
(4) Passive supporters are typically individuals or groups that are sympathetic to
the announced goals and intentions of the terrorist organization, but are not committed
enough to take action. Passive supporters may interact with a front group that hides the overt
connection to the terrorist group, or passive supporters may intermingle with active
supporters without being aware of what their actual relationship is to the organization.
Sometimes fear of reprisal from terrorists compels passive support. Sympathizers can be
useful for political activities, fund-raising, and unwitting or coerced assistance in intelligence
gathering or other nonviolent activities.
b. Recruiting
(1) Terrorist groups recruit from populations that are sympathetic to their ideology
and objectives. Often legitimate organizations can serve as recruiting grounds for terrorists.
For example, militant Islamic recruiting has been linked to the schools (i.e., madrassas),
established by radical Islamist clerics.
II-8 JP 3-07.2
Terrorist Threat
operatives and as agents in place. Recruiters target groups that feel disenfranchised, such as
prisoners, the unemployed, the poor, and immigrants.
(3) Coercion. Through coercion, recruiters can gain operatives from diverse
backgrounds. Some groups will also use coercion and leverage to gain limited or one-time
cooperation from useful individuals. This cooperation can range anywhere from gaining
information to conducting a suicide bombing operation. Blackmail and intimidation (e.g.,
threats to family members) are the most common forms of coercion and are often directed at
personnel in government security and intelligence organizations.
II-9
Chapter II
network of training camps, and training material can be distributed in both hard copy or via
the Internet.
(3) Indirect transfer of information/knowledge occurs when one group carries out a
successful operation and is studied and emulated by others. The explosion of hijacking
operations in the 1970s, and the similar proliferation of hostage taking in the 1980s were the
result of terrorist groups observing and emulating successful techniques. The widespread
use of improvised explosive devices (IEDs), vehicle-borne IEDs (VBIEDs), and suicide
bombers are further examples of emulated successes.
Terrorists employ a variety of TTP—some small scale, some large scale—to produce
fear in their intended audience. Their targets may be just as likely economic (tourists,
financial networks) or agricultural (livestock, crops), as they are embassies or military forces.
Their goal is not just to win favor for their causes, but to erode the confidence, capability,
and legitimacy of the government or societies they wish to coerce. The term terrorism is
often used interchangeably with the term insurgency. Indeed, several of the tactics discussed
in this section may also be used in an insurgency. An insurgency involves the use of
subversion and violence by a group or movement that seeks to overthrow or force change of
a governing authority. Insurgents use a variety of tactics, including terrorism, guerrilla
warfare, and even conventional warfare. What typically distinguishes terrorism is that while
both terrorism and insurgency seek political aims, terrorism is always unlawful and
specifically intended to inculcate fear to achieve its aims. The most common TTP employed
by terrorist groups are discussed below.
b. Arson. Less dramatic than most tactics, arson has the advantage of low risk to the
perpetrator and requires only a low level of technical knowledge. It is most often used for
symbolic attacks and to create economic effects.
c. Bombing. The IED is the terrorist’s weapon of choice. IEDs can be inexpensive to
produce and, because of the various detonation techniques available, may be a low risk to the
perpetrator. Another common method of attack is suicide bombings. Advantages to these
tactics include their attention-getting capacity and the ability to control casualties through
time of detonation and placement of the device. Announcing responsibility for the bombing
or denying responsibility for the incident, should the action produce undesirable results,
II-10 JP 3-07.2
Terrorist Threat
generates media interest and may lead to increased coverage of a terrorist group’s
agenda/activities.
d. Kidnapping and Hostage Taking. Kidnapping is the unlawful seizure and captivity
of one or more individuals. Kidnappings usually result in the individual being held hostage
in order to extract specific demands, but may be for intelligence gathering or execution. A
successful kidnapping usually requires elaborate planning and logistics. Similarly, hostage
taking is the seizure of one or more individuals usually overtly, with the intent of gaining
advantage: publicity, ransom, political concessions, and release of prisoners. Targets of
terrorist related kidnappings and hostage taking are usually prominent individuals such as
high ranking foreign diplomats or officers; or of symbolic value such as government,
military, or law enforcement personnel; foreign businesspeople; or tourists. Because the
perpetrator may not be known for a long time, the risk to the perpetrator is less than in the
overt hostage situation. Hostages can also serve as human shields, increasing terrorists’
chances of success in carrying out a mission or to use in exchange for other government
detainees or prisoners. While dramatic, hostage and hostage barricade situations are risky for
the perpetrator. Killing of hostages may occur once the terrorist group believes that it has
fully exploited the media coverage from the situation.
II-11
Chapter II
i. Threats or Hoaxes. Any terrorist group that has established credibility can employ a
hoax with considerable success. A credible threat causes time and effort to be devoted to
increased security measures. A bomb threat can close a commercial building, empty a
theater, or delay an aircraft flight at no cost to the terrorist. Threats may also be used by
terrorists to probe and observe security procedures. Repetitive or an inordinate number of
false alarms may dull the analytical and operational efficiency of key security personnel, thus
degrading readiness. For more discussion, see Chapter III, “Intelligence.”
j. Environmental Destruction. Although this tactic has not been widely used, the
increasing accessibility of sophisticated weapons to terrorists has the potential to threaten
damage to the environment. For example, possible tactics may include the intentional
dumping of hazardous chemicals into the public water supply, poisoning or destroying a
nation’s food supplies through introduction of exotic plants or animals, destroying oil fields,
or attacking an oil tanker to cause ecological harm. The use of exotic insects, animals, or
plants to poison or damage the food supply or ecosystem is a potential low-cost weapon.
II-12 JP 3-07.2
Terrorist Threat
(1) Dispersing and Hiding. Dispersion and hiding in complex terrain and urban
environments degrade situational awareness and complicate US intelligence and targeting
efforts. Urban areas offer excellent cover and concealment from US ground and airpower
because building interiors and subterranean areas are hidden from airborne observation and
vertical obstructions hinder line of sight to ground targets.
(3) Ruse. Terrorists also use police cars, taxis, and ambulances to move couriers,
fighters, and ammunition. Terrorist forces have used civilian vehicles configured as VBIEDs
as “technicals” to maneuver and fight, and as supply and transport vehicles. In one example,
enemy forces reconfigured a white van into a VBIED with red crescents painted on the front
and sides (similar to impersonating an American Red Cross vehicle), which was later
detonated near a local hotel.
b. Human Shields
(1) In their attacks, terrorists deliberately use civilians as human shields. This
tactic forces friendly forces to adopt more stringent rules of engagement (ROE).
(4) Attack targets from residential areas. Terrorists have launched attacks from
residential areas in order to invite return fire into civilian homes.
(1) In general, terrorists avoid or desire to limit their direct fire engagements with
heavy armored vehicles and prefer to conduct “standoff” attacks with IEDs and indirect fire
weapons. Standoff tactics permit the attack on a target with enough intervening distance and
II-13
Chapter II
time to allow for escape from the engagement area and/or to avoid immediate overwhelming
return fire.
(2) “Shoot and Scoot” Tactics. Mortars and rockets are the primary weapons of
choice used by terrorists for applying “shoot and scoot” tactics in urban terrain. Attackers
have mounted mortars in truck beds and inside of automobiles by cutting holes in the roofs
of the car to fire the weapon. Attackers fire a few rounds from these systems before
“scooting” to a new location. Terrorists also leave these systems behind for capture after
firing to avoid counterbattery fire. Sometimes the equipment left behind is rigged with
bombs or is targeted by another indirect firing system to engage unsuspecting coalition units
who have captured the equipment.
(3) Stand-off Weaponry. Mortars, rockets, and their ammunition are available
worldwide, are relatively easy to maintain, and are easy to employ. They are easy to hide,
have high rates of fire, and can quickly relocate. Mortars do not require large firing areas,
and they are ideal for urban attacks as their arcing trajectory can clear high buildings.
Rockets require more planning and more set-up time, but they increase attacker survivability
and deliver a larger warhead.
(4) Attacking local government officials and civilians. This tactic avoids the
strength of American military forces and concentrates on the various levels of the public
servants and innocent civilians. Such attacks undermine the government’s efforts to
maintain stability and attempt to intimidate other individuals from supporting or assisting the
government. In the case of attacks on the civilians, the murders can be filmed and
distributed as mentioned below.
(7) Suicide-bomber attacks. Suicide bombers are favored for their ability to
precisely control the time and place of the explosion. Suicide bombers are the delivery
vehicles and triggering devices for the explosives they are transporting with the added
benefit of demoralizing the opponent by proving the extreme commitment to their cause.
Many suicide bomb attacks use VBIEDs. Multiple VBIEDs have also been employed, with
the first vehicle explosion designed to open a breach into a hardened facility or perimeter
barrier, and a second bomb to penetrate through the opening to attack the target.
II-14 JP 3-07.2
Terrorist Threat
(1) Spreading rumors on the “street.” Rumors have always been a powerful
force. News from the marketplaces and cafes has always been used to offset official
information. Terrorists plant many rumors and initiate disinformation to discredit
information from partner nations and the United States Government (USG). For example,
after a terrorist bombing, bystanders will often wave chunks of metal at film crews and claim
they are shrapnel from US missiles and bombs. Rumors in Operation IRAQI FREEDOM
(OIF), which took months to disprove, included the distribution of disease-laden toys by
coalition soldiers to Iraqi children and the harvesting of human organs by US soldiers for
sale on the Internet.
(3) Posting video on the Internet. Terrorists can use the Internet to disseminate
their message as quickly as events happen. An immediate press release from a Web site is
not only cheap but offers direct control over the content of the message. Sites are managed
to manipulate images in support of the terrorists and to create special effects or deception.
Video footage of terrorist successes are used for recruitment and to sustain morale.
Multimedia sites display manufactured evidence of USG and allied “atrocities and war
crimes” to turn domestic and international opinion against the USG.
(4) Ensuring media access. Terrorists use sympathetic media to reinforce their IO
plan. Some media companies repeatedly display images of casualties, massive collateral
damage, and the accusation that coalition forces use excessive force.
b. Terrorists choose their targets deliberately based on the weaknesses they observe in
our defenses and in our preparations. They can balance the difficulty in successfully
executing a particular attack against the magnitude of loss it might cause. They can monitor
our media and listen to our policymakers as our Nation discusses how to protect itself and
adjust their plans accordingly. Where we insulate ourselves from one form of attack, they
II-15
Chapter II
can shift and focus on another exposed vulnerability. We must defend ourselves against a
wide range of means and asymmetric methods of attack. Terrorists continue to employ
conventional means of attack, while at the same time gaining expertise in less traditional
means, such as attacks on computer, banking, and utility systems.
See JP 3-27, Homeland Defense, and JP 3-28, Civil Support, for guidance in the conduct of
HD operations.
II-16 JP 3-07.2
CHAPTER III
INTELLIGENCE
“The struggle against international terrorism places new and difficult demands on
the US Intelligence Community. Acquiring information about the composition,
location, capabilities, plans, and ambitions of terrorist groups is an enormous
challenge for intelligence agencies; meeting this challenge requires different skills
than were needed to keep informed about the capabilities and intentions of
Communist governments.”
1. Role of Intelligence
III-1
Chapter III
(4) The DNI’s Open Source Center coordinates and integrates open-source
intelligence into IC products.
(5) The Federal Bureau of Investigation (FBI) leads IC efforts on the prevention
of domestic terrorism.
(6) The Central Intelligence Agency (CIA) deals primarily with HUMINT
collection, all-source analysis, and the production of political, economic, and biographic
intelligence.
For additional information on the IC, refer to JP 2-0, Joint Intelligence, and JP 2-01, Joint
and National Intelligence Support to Military Operations.
III-2 JP 3-07.2
Intelligence
a. Risk Management. Commanders must determine which assets require the most
protection and where future expenditures are required to minimize risk of attack or lessen the
severity of the outcome of an attack. This requires an RA. An RA is determined by
combining a TA, VA, and criticality assessment (CA) in order to provide a commander with
a more complete picture of the risks facing an asset or group of assets. The TA is based on a
threat analysis of the full range of enemy capabilities and intentions; it is a continual process
of compiling and examining all available information concerning potential terrorist activities
by terrorist groups or individuals that could target the DOD components, elements, and
personnel. A VA is an evaluation to determine the vulnerability to a terrorist attack against
an installation, unit, exercise, port, ship, residence, facility, or other site. A CA identifies
key assets and infrastructure that are deemed mission critical; it addresses the impact of
temporary or permanent loss capability to include costs of recovery and reconstitution.
When conducting an RA, the commander and staff must carefully exercise judgment in
estimating both the existing terrorist threat and the need for changes in AT measures.
III-3
Chapter III
intelligence analysis, to include determining extant capabilities and their most likely and
dangerous courses of action. AT requires additional proactive efforts that integrate the
traditional LE measures with intelligence analysis. AT officers and analysts may want to
maintain a threat information organization plan that systematically outlines threats and threat
indicators.
3. Intelligence Support
III-4 JP 3-07.2
Intelligence
SOURCES OF INTELLIGENCE
Open-Source Intelligence
Intelligence Information
III-5
Chapter III
procedures limit the ability of the enemy to remain anonymous and hide among the civilian
population. This data can be used to locate and track terrorist and support networks.
(2) Law Enforcement Information. Both military and civil law enforcement
agencies (local, state, and federal) have access to criminal records. Because terrorist acts are
often prosecuted as criminal acts, both in the US and overseas, criminal records can be an
important source of intelligence. Because the collection, retention, and dissemination of
criminal records are regulated, DOD utilizes established LE liaison channels. LE liaisons
have the ability to provide DOD organizations with relevant information from criminal
records while preserving the evidentiary value of that information. Local military criminal
investigative offices of the US Army Criminal Investigations Command (USACIDC), Naval
Criminal Investigative Service (NCIS), Air Force Office of Special Investigations (AFOSI),
and Headquarters, US Marine Corps, Criminal Investigations Division, maintain current
information that may assist in determining the local terrorist threat. Similarly, the DOD’s
Biometrics Task Force maintains robust information sharing relationships with the FBI and
DHS to support biometric identification and screening operations. Personnel responsible for
AT and LE personnel should maintain close contact and share information as appropriate.
See DODD 5200.27, Acquisition of Information Concerning Persons and Organizations not
Affiliated with the Department of Defense, on proper handling of this information.
(3) Strategic Intelligence. The NCTC serves as the central, shared knowledge
bank for terrorism information. The NCTC also provides all-source AT intelligence support,
develops AT-supportive information technology systems, establishes interagency
connectivity and architectures, provides access to AT intelligence, and integrates and
disseminates AT intelligence and information. The DIA’s JITF-CT is the DOD primary
III-6 JP 3-07.2
Intelligence
point of contact for the NCTC and the mission manager for combating terrorism issues. The
FBI has a National Joint Terrorism Task Force (NJTTF) which includes numerous agencies,
spanning the fields of intelligence, public safety, and federal, state, local, and tribal LE. The
NJTTF collects, analyzes, and funnels terrorism information and intelligence from and to the
regional joint terrorism task forces (JTTFs). The DOD is represented on the NJTTF and
many of the state and local JTTFs have Service representation from nearby military
installations. Service intelligence and CI production organizations that compile
comprehensive intelligence and CI from these agencies for distribution on a need-to-know
basis throughout the Services include the Army Counterintelligence Center, NCIS, Marine
Corps Intelligence Activity, and AFOSI. For combatant commands, the director of
intelligence or J-2 is responsible for supporting the combatant commander and operational
and planning staffs and for obtaining, developing, and providing the necessary intelligence
products and support required for planning and execution of assigned combatant command
missions. Combatant command J-2 responsibilities also include analysis, collection
management, and interagency coordination. In addition, the combatant command J-2 must
develop intelligence policies and plans and support theater and component intelligence and
collection requirements and priorities.
(4) Information from Local, State, and Federal Personnel. Other valuable
sources of information are the individual Service member, civil servant, family member, and
individuals with regional knowledge such as college faculty or members of cultural
organizations. Local crime or neighborhood watch programs can also be valuable sources of
information and can serve as a means to keep individuals informed. Intelligence exchanges
with local government agencies through cooperative arrangements can also augment regional
information.
(6) DOD has formed partnerships with the FBI, DHS, DOS, and the broader IC to
leverage the considerable identity holdings of the USG. Information sharing among the
DOD’s Automated Biometric Identification System, the FBI’s Integrated Automated
Fingerprint Identification System, and programs run by DOS and DHS significantly improve
our ability to identify and apprehend known or suspected terrorists seeking to gain access to
overseas USG facilities and to maintain effective installation access control and defense in
depth for the terrorist threat against bases and facilities in the United States. As these
partnerships expand to our foreign partners, the ability of the biometrics enterprise to support
a broad array of CT, AT, and intelligence missions at the strategic, operational, and tactical
III-7
Chapter III
levels will expand significantly. Properly harnessed, these proven capabilities are one of the
most powerful tools available for preventing terrorist attacks.
(1) DIA. The Director, DIA, under the Under Secretary of Defense for
Intelligence, is responsible for establishing and maintaining an international all-source
terrorism intelligence fusion center, JITF-CT. The JITF-CT provides a wide range of
terrorism intelligence for DOD components, to include indications and warnings, current
intelligence, assessments, in-depth analysis, DOD terrorism threat assessments/levels, and
the maintenance of a CTBD.
(2) GCCs. The GCC, through the J-2, joint intelligence operations center,
command counterintelligence coordinating authority, and subordinate component
commands’ CI and AT organizations, and in consultation with DIA, CIA, US country team,
and applicable HN authorities, compiles intelligence and CI information specific to the
operational area and issues intelligence and CI reports, advisories, and assessments. This
network is the backbone for communicating intelligence and CI information, advisories, and
warning of terrorist threats throughout the region. GCCs may also set terrorism threat levels
for specific personnel, family members, DOD contractors in accordance with DODI 3020.41,
Contractor Personnel Authorized to Accompany the US Armed Forces units, installations, or
geographic regions in countries within the GCC’s AOR, using the definitions and criteria
established by the Director, DIA.
(3) Services. DODD 2000.12, DOD Antiterrorism (AT) Program, tasks the
Secretaries of the Military Departments to ensure Service component commands have the
capability to collect, receive, evaluate, analyze, and disseminate all relevant data on terrorist
activities, trends, and indicators of imminent attack, and to develop the capability to fuse
suspicious activity reports from military security, LE, and CI organizations with national-
level ISR collection activities. Each Military Department is responsible for the following:
III-8 JP 3-07.2
Intelligence
Commanders also shall inform the DOS/US embassy(ies) or the DHS of any
changes to force protection condition (FPCON) levels or the security posture that
significantly affects the host nation/US public. When FPCONs are changed based
upon received threat information, both the threat information and notice of the
changed FPCON shall be passed up the chain of command to the lowest level
that has direct liaison with the DOS/US embassy(ies) (or for noncombatant
command assigned forces, the USDR [SDO/DATT]) or the DHS. Coordination and
cooperation with the DOS/US embassy or the DHS in these cases is NOT a
request for concurrence. Rather, it is informing the chief of mission (COM) or
Secretary of Homeland Security of the DOD response to a given terrorist threat.
Although the COM or Secretary of Homeland Security may not agree with the
commander’s assessment, the ultimate responsibility for protection of DOD
elements and personnel rests with the commanders in the chain of command. In
areas outside the purview of the DHS, the DOS is responsible to determine
whether to release the threat information to US citizens abroad and to deal with
the sensitivities of the host nation(s). In the areas under the purview of the DHS,
the Secretary of Homeland Security is responsible to determine whether to
release the threat information to the US public.
III-9
Chapter III
(d) Investigate terrorist incidents with the FBI or HN authorities looking for
intelligence, CI, and FP-relevant information.
(f) Conduct liaison with representatives from federal, state, local agencies
(county, tribal, city), and if applicable HN agencies to exchange information on terrorists.
(b) LE, military police, and security personnel staff elements will be
responsible for the following:
2. Initiate and maintain liaison with local CI offices and military criminal
investigative offices.
3. Maintain liaison with federal, HN, and local LE agencies or other civil
and military AT agencies as appropriate and as provided in Service or agency regulations.
III-10 JP 3-07.2
Intelligence
(c) Installation, base, ship, unit, and port security officers will be responsible
for the following:
(d) Services, DOD agencies, and installations should submit suspicious activity
reports through their chain of command.
III-11
Chapter III
INFORMATION REQUIREMENTS
III-12 JP 3-07.2
CHAPTER IV
LEGAL CONSIDERATIONS
“To effectively detain, interrogate, and prosecute terrorists, we need durable legal
approaches consistent with our security and our values…we will bring terrorists to
justice.”
1. General
2. Commander’s Authority
Commanders have both the inherent authority and the responsibility to enforce security
measures and to protect persons and property under their control. Commanders should
consult with their legal advisors regularly when establishing their AT programs.
a. General. DOD is the lead agency for conducting overseas HD operations. However,
against internal threats (e.g., domestic terrorism), DOD may be in support of DOJ or DHS
and may conduct civil support operations for declared emergencies.
c. Although statutory exceptions allow the use of military forces in some contexts,
prior to committing forces commanders shall consult with their judge advocates and refer to
applicable DOD and Service directives.
IV-1
Chapter IV
For more information on legal considerations during civil support operations, see JP 3-28,
Civil Support, and JP 3-41, Chemical, Biological, Radiological, and Nuclear (CBRN)
Consequence Management.
a. Commanders’ Responsibilities Inside the United States and its Territories and
Possessions
(1) Although the FBI has primary LE responsibility for investigating terrorist
incidents inside the US (including its possessions and territories) and the DOD LE and IC
have a significant role within their departmental areas of jurisdiction, commanders remain
responsible for maintaining law and order on DOD installations and vessels. The
commanders’ AT plans should address the use of security personnel to isolate, contain, and
neutralize a terrorist incident within the capability of the commander’s resources. Terrorist
attacks or incidents involving DOD personnel, facilities, or assets trigger the need for four
separate but related activities:
(2) In the United States, installation and vessel commanders shall provide initial
and immediate response to any incident occurring on military installations or vessels to
isolate and contain the incident. This includes notifying the military criminal investigative
organization and DOD Criminal Investigative Task Force regarding acts of terrorism and war
crimes. Primary responsibility for investigating many of the most serious crimes on USG
property shall normally rest with the DOJ, except for US military installations, on which the
local commander retains primary responsibility.
For further information regarding use of force by DOD personnel, refer to CJCSI 3121.01B,
Standing Rules of Engagement/Standing Rules for the Use of Force for US Forces. For
further information regarding the arming of DOD security and LE personnel, refer to
DODD 5210.56, Use of Deadly Force and the Carrying of Firearms by DOD Personnel
Engaged in Law Enforcement and Security Duties.
(3) DOD may, under appropriate circumstances, provide support to state and/or
federal LE agencies in response to civil disturbances or terrorist incidents occurring outside
DOD installations or vessels. In addition to certain restrictions on direct DOD support to law
enforcement, commanders should also be mindful of applicable restrictions and DOD
guidance regarding the use of DOD intelligence components and nonintelligence
components to support civil authorities in domestic activities. Relevant references include
IV-2 JP 3-07.2
Legal Considerations
DODD 3025.12, Military Assistance for Civil Disturbance (MACDIS); DODD 3025.15,
Military Assistance to Civil Authorities; DODD 5200.27, Acquisition of Information
Concerning Persons and Organizations not Affiliated with the Department of Defense;
DODD 5240.1, DOD Intelligence Activities; DODD 5525.5, DOD Cooperation with Civilian
Law Enforcement Officials; DODD 5525.07, Implementation of the Memorandum of
Understanding Between the Department of Justice and the Department of Defense Relating
to the Investigation and Prosecution of Certain Crimes; and JP 3-28, Civil Support.
(4) In the event the FBI assumes jurisdiction, the DOJ shall be the primary federal
agency for the purpose of concluding the incident. If requested under pertinent statutes, the
Attorney General may request SecDef approval for DOD commanders to provide support to
the FBI. Military personnel, however, shall always remain under the C2 of the military chain
of command. If military forces are employed during a tactical response to a terrorist
incident, the military commander retains command responsibility of those forces. Command
relationships and coordination of rules for the use of force (RUF) should be addressed as part
of the request for assistance.
(5) Attacks on DOD personnel or assets within the United States and its territories
and possessions that are not on DOD facilities or vessels are to be contained and resolved by
state and federal LE. Limited exceptions to this rule may occur when incidents involve DOD
units outside a DOD installation or vessel and immediate action is necessary to protect DOD
personnel and property from immediate threat of injury before local LE or the FBI can
respond. It is important to note that commanders should consult their legal advisors, HN
authorities, and all international agreements and US regulations before implementing any
course of action off the installation.
For more information on RUF in a domestic environment during civil support, see CJCSI
3121.01B, Standing Rules of Engagement/Standing Rules for the Use of Force for US
Forces, and JP 3-28, Civil Support.
b. Commander’s Responsibilities Outside the United States and its Territories and
Possessions
(1) Although DOS has the primary responsibility for dealing with terrorism
involving Americans abroad, DOD commanders have the inherent right and obligation to
defend their units and other US units in the vicinity from terrorist incidents wherever they
occur, with the additional requirement to notify the cognizant GCC for further reporting to
DOS. The commander is responsible for incident response and containment in order to
protect DOD personnel and property from immediate threat of injury. DOS has the primary
responsibility for coordinating the political and diplomatic response to terrorism involving
Americans abroad. The installation or vessel commander should also implement any
provisions of the SOFA or other agreements between the US and the host government
relevant to the incident.
(2) The host government may provide forces to further contain and resolve the
incident in accordance with its obligations under international law, the SOFA, and other
relevant agreements. If the USG asserts a prosecutorial interest, DOJ, in coordination with
IV-3
Chapter IV
DOS, shall assume lead agency responsibilities for liaison and coordination with HN LE and
prosecutorial agencies.
(1) Title 22, United States Code (USC), Section 4802, directs the Secretary of State
(SECSTATE) to assume responsibility for the security of all USG personnel on official duty
abroad, except those under the command of GCCs and their accompanying dependents.
SECSTATE discharges these responsibilities through the COMs. In December 1997,
SecDef and SECSTATE signed the MOU on Security of DOD Elements and Personnel in
Foreign Areas (also known as the “Universal MOU”). The MOU is based on the principle of
assigning security responsibility to the party—GCC or COM—in the most efficient and
effective position to provide security for DOD elements and personnel. The MOU requires
delineation of security responsibilities through country-specific MOAs.
(2) Once security responsibility has been agreed upon through the Universal
MOU/MOA process, the COM and/or GCC (and designated AT planning and response
elements) may enter into Mutual Assistance Agreements with HN authorities. These
IV-4 JP 3-07.2
Legal Considerations
MOA/MOUs augment the installation’s organic capabilities and/or are activated when a
situation exceeds the installation’s inherent capabilities, fulfilling surge requirements needed
to respond to a terrorist incident. Therefore, each installation must prepare for the worst-case
scenario by planning responses based on organic resources and local support available
through MOA/MOUs. These MOA/MOUs must be a coordinated effort between the many
AT planning and response elements of the installation.
(3) Installation specific MOA/MOUs and other special arrangements improve the
resources and/or forces available to support any AT plan. These MOA/MOUs may include,
but are not limited to, HN and US military police forces; fire and emergency services;
medical services, federal, state, and local agencies; special operations forces; engineers;
CBRN units; and explosive ordnance disposal (EOD). Often through agreements with HN
authorities, MOAs are adapted to grant the US installation commander responsibility within
(or inside) the installation boundary, with the HN having responsibility outside this
boundary. The wide dispersal of work areas, housing, support (medical, child care,
exchange, morale, welfare, and recreation), and utility nodes (power grids, water plants) may
require US responsibility for certain fixed-site security outside the installation boundary.
Although the installation commander may not have security responsibility “outside the
wire,” the commander still maintains a security interest. The installation commander must
include exterior terrain, avenues of approach, threat capabilities (possession of stand-off
weapons such as man-portable air defense system or mortars), hazardous material storage in
proximity to the US forces, and HN security processes when developing security plans for
the installation, regardless of who provides exterior defense.
(4) In 2003, an MOU between DOS and DOD established force protection
detachments (FPDs). The primary mission of an FPD is to support the in-transit force
protection requirements according to priorities established by the GCCs when military
criminal investigative and CI organizations are not present. FPD activities include, but are
not limited to, preparing TAs and informational documents, coordinating with foreign LE
and security officials, producing AT surveys, assessing route and travel threats, briefing
antiterrorist and CI threats, assisting in investigations and operations, assisting in protective
service operations, and serving as a point of contact in embassies for DOD CI and LE
organizations.
For further information, see DODI 5240.22, Counterintelligence to Force Protection and
Memorandum of Understanding (MOU) Between the Department of State, Bureau of
Diplomatic Security and the DOD Counterintelligence Field Activity Regarding Force
Protection Detachments, 9 May 2003.
The United States Coast Guard (USCG) is the lead or primary agency for maritime
homeland security (HS). As such, the USCG operates at all times as both an Armed Force of
the United States (Title 14, USC, Section 1), and a law enforcement agency (Title 14, USC,
Section 89). The Coast Guard’s HS mission is to protect the US maritime domain and the
US Marine Transportation System and deny their use and exploitation by terrorists as a
means for attacks on US territory, population, and maritime critical infrastructure.
IV-5
Chapter IV
Additionally, the USCG will prepare for and, in the event of attack, conduct emergency
response operations. When directed, as the supported or supporting commander, the USCG
will conduct military HD operations in its traditional role as a Military Service.
IV-6 JP 3-07.2
CHAPTER V
ANTITERRORISM PROGRAMS
“Al-Qaeda still plots and plans, especially in the border region between
Afghanistan and Pakistan. It is the epicenter of global Islamic extremism, the
origin of the 9/11 attacks and, should we be hit again, I am convinced the planning,
training, and financing, as well as leadership, will emanate from there. That’s why
we are so focused on it. That’s why we believe this mission is in our vital national-
security interest and those of our allies and friends, and that’s why we are grateful
for the contributions of the other nations committed to the fight.”
a. Protection of DOD personnel and assets from acts of terrorism is one of the most
complex challenges for commanders. AT programs consist of defensive measures to reduce
the vulnerability of individuals and property to terrorist acts, including rapid containment by
local military and civilian forces. An integrated and comprehensive AT program (physical
security, construction standards, CBRN passive defense, OPSEC, CI, biometrics and
forensics exploitation, etc.) must be developed, implemented, and updated in order to
effectively detect, defend, and respond to a terrorist threat.
DODD 2000.12, DOD Antiterrorism (AT) Program, and DODI 2000.16, DOD Antiterrorism
(AT) Standards, provide the specific requirements for these program elements.
V-1
Chapter V
V-2 JP 3-07.2
Antiterrorism Programs
(4) Resource Management. The PPBE process is the resource mechanism for
identification of baseline and supplemental needs. Unfunded requirements to support a
commander’s mission (e.g., priority emergent requirements) can be submitted via the CCIF
process.
AT plans should prepare for the most likely threats and should maximize the use of
existing plans and SOPs. For instance, existing procedures for fire response, operation
center management, disaster response, CBRN/hazardous materials (HAZMAT) response,
security operations, and other related activities can be referenced in the document and do not
need to be reproduced. The goal is to have a useable document that provides reference to
needed information.
(1) Security measures, which improve situational awareness and present a robust
FP posture, may serve to inhibit terrorist surveillance and deter targeting efforts. These
measures can include:
(c) Active searches (including x-ray machines and explosive detection devices)
of vehicles and persons at entry points.
(e) Barriers, roadblocks, and entry mazes to increase standoff and improve
security personnel reaction time during an attack.
V-3
Chapter V
(h) Biometric and forensic data to screen personnel for identity and base
access.
More detailed information is available in the Joint Forward Operations Base (JFOB)
Survivability and Protective Construction Handbook, and the Joint Entry Control Point and
Escalation of Force Procedures (JEEP) Handbook.
b. Risk Management Process. As discussed above, the TA, CA, and VA are used to
produce an over-all risk assessment. Use the final risk assessment as a guide to risk
mitigation priorities and establish a local baseline or defense posture.
(3) Coverage for off-base assets including infrastructure, facilities, housing, and
activities.
V-4 JP 3-07.2
Antiterrorism Programs
(4) FPCON measures (see Figure V-1), which allow the commander to apply an
operational decision to best protect personnel or assets from terrorist attack.
e. Training and Exercises. AT plans are exercised annually and whenever possible
should be conducted in coordination with federal, local, state, tribal, or HN authorities and
US embassies and consulates.
Figure V-1. Department of Defense Threat Level and Force Protection Conditions
V-5
Chapter V
g. Program Review. The program review evaluates the effectiveness and adequacy of
the commander’s AT program. The evaluation includes an assessment of the degree to
which the program complies with the standards in DODI 2000.16, DOD Antiterrorism (AT)
Standards and other higher HQ guidance. Additionally, the program review shall assess the
risk management process implemented by the commander and the installation’s ability to
respond to a CBRN event. The AT program review can be conducted in conjunction with
the local or higher HQ VA.
Effective AT programs aim to detect, disrupt, and potentially defeat terrorist attack
planning in order to ensure the safety of personnel and resources. To achieve this, AT plans
should examine terrorist methods of surveillance, information gathering, and attack planning
to determine the extent of training and resources needed to address the threat. In addition,
AT plans must identify the most effective way to train personnel to counter terrorist attack
planning with basic surveillance awareness procedures. This also requires identifying
necessary surveillance detection requirements and promulgating incident reporting
procedures. Most important, AT programs need to focus on building strong relationships
with various LE and CI agencies. Indeed, this is a critical step in increasing the flow of
information to neutralize the threat.
V-6 JP 3-07.2
Antiterrorism Programs
aim to prevent or disrupt attacks by focusing on the initial stages in the terrorist attack
planning process, where terrorists conduct initial surveillance and select targets for
exploitation and suitability for attack. Terrorists examine security procedures, such as
personnel and guard-force shift changes, access control procedures, frequency of roving
security patrols, and the citizenship/nationalities of the guard forces. They also monitor
installations or facilities to determine types of locks, access control devices, presence of
closed-circuit security cameras, and the use of canine forces (military working dogs).
Surveillance allows terrorists to assess gaps in physical security as well as identify patterns
in standard operations procedures, including reaction times to emergencies, which can be
used to plan for subsequent attacks against heavily fortified areas or emergency responders.
When terrorists assess personnel in particular, they seek to identify vulnerabilities in human
patterns such as modes and times of travel, frequently traveled routes, and the target’s overall
security awareness. Five techniques in the methodology that contributes to the terrorist
attack planning cycle are fixed (static) surveillance, mobile surveillance, technical
surveillance, casual questioning (elicitation), and probing.
(5) Probing. Terrorists may overtly approach secured areas carrying mock attack
devices to determine firsthand the effectiveness of a facility’s or installation’s security
V-7
Chapter V
procedures and to gauge the vigilance and reaction of the security personnel. They may also
conduct routine activities to desensitize security personnel or to produce false alarms to dull
the effectiveness of security personnel. Examples of probing include:
(a) Threats delivered via phone, email, or mail meant to elicit a security
response.
(b) Using some type of ruse to gain access or entry (e.g. approaching security
checkpoints to ask for directions).
(e) Noticeably watching and recording security reaction drills and procedures.
b. Surveillance Awareness. DOD personnel and their families must understand the
implications of hostile surveillance; to assume that it is occurring, how to discretely detect or
identify it, and what to do if they suspect it. In fact, personnel are often able to detect
criminal or terrorist surveillance (i.e., targeting themselves or their installations) as a result of
enhanced situational awareness orchestrated by aggressive AT programs. They may even
make themselves less desirable targets by following the four fundamental principles of
surveillance awareness: stay informed, keep a low profile, be unpredictable, and stay alert.
(1) Stay informed. This requires knowing the primary threats and terrorist
elements operating in the immediate area. Commanders are responsible for keeping DOD
personnel and their families informed of any changes in the local threat. More importantly,
Service men and woman have a personal responsibility to increase their own situational
awareness on the local threat and the operating environment. Certainly, it helps to know
one’s neighbors (and their vehicles), the local vendors, and others who routinely operate near
one’s home or place of work.
(2) Keep a low profile. Terrorists may find it harder to monitor someone who
blends in with the local population. Low-key appearance and behavior may force terrorists
to work harder to identify a target, either forcing them to get closer to their target or moving
on to another one. As the terrorist gets closer, it also becomes easier for a potential target to
detect the surveillance. To be sure, any effort by DOD personnel to aggressively elude or
“ditch” the terrorist will only reduce the opportunity to detect the terrorist. Thus, one should
maintain a normal demeanor and report what they see (see paragraph e, “Incident
Reporting”).
V-8 JP 3-07.2
Antiterrorism Programs
to avoid selecting alternate travel routes that transit sparsely-populated, less-secure, or dense-
traffic areas. In other words, do not change routes for the sake of changing routes.
(4) Stay alert. DOD personnel and their families need to know what to look for.
Generally speaking, terrorists may look like they are trying to accomplish some “cover” task,
but they will likely be paying more attention to their target, thus allowing themselves to be
identified by an individual who has good situational awareness. Even more revealing is
when a surveillance operative appears more than once in the vicinity of their target or
behaves in a way that responds to what their target does. This is referred to as “correlation”
and is considered one of the strongest indicators of hostile surveillance. (See Figure V -3 for
a list of surveillance indicators).
(1) Route Analysis for Key Personnel. This involves noting areas along a travel
route where terrorist are more likely to conduct surveillance, profile a potential target, or
launch an attack. An example of this is areas where routes crisscross or overlap (including
the beginning and end of a route which rarely changes), or where a route “channels” a target.
(2) Likely Terrorist Attack or Surveillance Sites. This entails determining the
best locations for terrorist attacks and surveillance locations for profiling fixed or mobile
targets. Potential surveillance and attack sites typically have the following characteristics:
the site is routinely frequented by a mobile target at predictable times; has limited security or
police presence; offers cover or camouflage for a hostile surveillance or attack team; offers a
means to effectively control or limit the target’s movement to ensure success during the
attack; and has a variety of good escape routes for the terrorist operatives.
V-9
Chapter V
SURVEILLANCE INDICATORS
8. Nervous behavior
Staring or quickly looking away from individuals or vehicles
Fidgeting or appearing uneasy
Excessive perspiration
Note: Skilled surveillance detection by ordinary DOD personnel involves formal training;
however, the basic awareness techniques listed above should suffice for understanding
suspicious behavior and evaluating daily routines. It is important to emphasize that DOD
personnel and their families should avoid confrontations with suspicious individuals
whenever possible and allow security and LE professionals to take action. It is never
prudent to draw attention to oneself, or to try to outrun or aggressively avoid surveillance,
unless there is a threat of injury or death.
V-10 JP 3-07.2
Antiterrorism Programs
V-11
Chapter V
Intentionally Blank
V-12 JP 3-07.2
CHAPTER VI
TERRORIST INCIDENT RESPONSE
“One of the greatest dangers we continue to face is the toxic mix of rogue nations;
terrorist groups; and nuclear, chemical, or biological weapons.”
1. General
a. At a minimum, AT plans should prepare for the most probable or likely threats as
identified through the TA process and maximize the use of existing plans and SOPs. For
instance, existing procedures for fire response, operation center management, disaster
response, CBRN/HAZMAT response, security operations, and other related activities can be
referenced in the document and do not need to be reproduced.
VI-1
Chapter VI
3. Initial Response
a. Onset of a Terrorist Incident. The onset of a terrorist incident begins with the
detection of an unlawful act of violence or the threat of violence. Detection may result from
routine surveillance performed by an installation or facility intrusion-detection system, guard
or security force, or in the case of bioterrorism, an unusual incidence of an infectious disease.
Once detection of a terrorist act or incident has occurred, an initial assessment must be
conducted by the first responding LE or security detachment.
(2) The initial response force should immediately identify and report the nature of
the situation, isolate the incident, and contain the situation until relieved by the reaction force
commander. Initial response force actions are critical and all installations/ships must have
trained personnel who are aware of the threat and are capable of reacting promptly 24 hours
a day.
(3) Responses will vary according to the incident. For example, if terrorists escape
before additional forces arrive, the initial response force should provide medical aid, seal off
the scene, and secure other potential targets in case the initial attack was a diversionary
tactic. If the event is a hostage/barricade situation, the initial response force should seal off
and isolate the incident scene to ensure no one enters or leaves the area. The initial response
force must also be prepared to locate witnesses and direct them to a safe location for
debriefing and interface with local LE or emergency service personnel, HN police, or
military forces responding to the incident in accordance with existing MOAs and/or SOFAs.
VI-2 JP 3-07.2
Terrorist Incident Response
The installation/base commander, depending upon established SOPs should activate the
installation’s EOC. Additionally, the commander should notify specialized response forces,
and immediately report the incident to the appropriate superior military command EOC,
military investigative agency, FBI, civilian authorities, and if a foreign incident, to HN
authorities and the US embassy as required.
(1) The EOC coordinates information and resources to support a terrorist incident
response. EOCs should include the following core functions: coordination; communications;
resource dispatch and tracking; and information collection, analysis and dissemination.
EOCs may also support multi-agency coordination and joint information activities. Include
in the EOC SOPs how communications are established immediately with the initial response
force at the incident site and how specially trained operational response forces preparing to
take over or augment the initial response force and other critical participants are incorporated
into the EOC planning decisions.
For additional information on EOC organization, see National Response Framework and
DODI 6055.17, DOD Installation Emergency Management (IEM) Program.
(2) EOC emergency support function personnel should utilize available subject
matter experts. For CBRN incidents, the DTRA operations center (OC) provides emergency
responders and warfighters with continuous information on CBRN threats through on-line
assistance, including hazard analysis and prediction modeling, and provides a wide-band
infrastructure for user support. The DTRA OC can dispatch other DTRA resources as
required. DTRA also provides AT program training via a mobile training team. The
following Web sites are also sources of technical information useful for incident response
planning: www.fped7.org; www.tswg.gov; and www.fema.gov.
VI-3
Chapter VI
b. In the event of a terrorist CBRN incident, the commander should direct the following
complementary sets of actions:
(2) Activate the installation’s initial response elements and local MOAs/MOUs.
5. Special Considerations
b. Evidence. Although the primary goal is ending a terrorist incident without injury,
another goal is the successful prosecution of terrorists. Witness testimony, photographic
evidence, and other evidence, are important in achieving a successful prosecution.
Maintaining the continuous chain of custody on evidence obtained during an incident
VI-4 JP 3-07.2
Terrorist Incident Response
requires documenting the location, control, and possession of the evidence from the time
custody is established until presenting the evidence in court. Failure to maintain the chain of
custody or contamination of the scene can result in exclusion of the evidence. Indeed, all
steps should be taken to allow qualified LE personnel to collect evidence. Types of evidence
for which the chain must be established include:
(2) Physical evidence, including any item(s) used by the terrorists. AT plans must
include preplanning for contaminated evidence preservation, collection, storage, and chain of
custody procedures.
(4) Demand notes or other messages recorded by written, audio, or video means
prepared by the terrorists.
(5) Sample collection, including samples collected at the scene taken during initial
and follow-on response.
d. Reports. Each Service and command has a reporting procedure that requires a
timely report of the incident to higher military authorities. The crisis management plan
should dictate required reports and timelines for notification. This should include all staff
journals and other documentation to include detailed information concerning disposition of
evidence and captured individuals. The SJA and LE personnel should ensure reports are
submitted to higher HQ in sufficient detail to meet prosecution requirements.
(a) Disseminate information to inform people about the incident and support
damage control/mitigation.
VI-5
Chapter VI
(2) DOJ has the lead PA responsibility for all incidents occurring on US territory if
the FBI assumes jurisdiction for resolving the incident. The Office of the Assistant Secretary
of Defense (Public Affairs) (OASD(PA)) supports DOJ in providing specific PA support.
(3) When US military forces are employed, DOD provides a spokesperson for
addressing military operational matters.
(4) DOS coordinates PA during terrorist incidents overseas. DOS may delegate the
PA responsibility to a designated DOD representative.
(5) The OASD(PA) is the single point of contact for all PA aspects of US military
AT actions. While there is no mandatory requirement to release information, installation
commanders are advised to exercise prudent judgment on such matters and coordinate
actions through PA channels to OASD(PA).
VI-6 JP 3-07.2
Terrorist Incident Response
action reports or lessons learned should be shared with other units and defense components.
As outlined in Chapter II, “Terrorist Threat,” terrorists continue to refine their tactics and
actively conduct surveillance to identify vulnerabilities in friendly TTP. After action reports,
whether for real incidents or exercises, are one mechanism for improving friendly
capabilities and remaining ahead of the terrorist.
(1) The NRF specifies how the resources of the USG will work in concert with
state, local, and tribal governments and the private sector to respond to incidents of national
significance. The NRF is predicated on NIMS and together, they provide a nationwide
template for working together to prevent or respond to threats and incidents regardless of
cause, size, or complexity.
(2) The NRF establishes a comprehensive approach to enhance the ability of the
US to manage domestic incidents. The plan incorporates best practices and procedures from
incident management disciplines—HD, emergency management, LE, firefighting, public
works, public health, responder and recovery worker health and safety, emergency medical
services, and the private sector — and integrates them into a unified structure. It forms the
basis of how the USG coordinates with state, local, and tribal governments and the private
sector during incidents. The NRF (available on the FEMA Web site) establishes protocols
to help:
(a) Save lives and protect the health and safety of the public, responders, and
recovery workers.
VI-7
Chapter VI
(b) Improve coordination and cooperation between public and private entities
in a variety of domestic incident management activities.
(b) Common standards for planning, training and exercising, and personnel
qualification.
(1) NIMS standard incident management structures are based on four key
organizational systems:
VI-8 JP 3-07.2
Terrorist Incident Response
events to HAZMAT spills to acts of terrorism and has become the standard for on-scene
management.
(d) Public information systems, which include the processes, procedures, and
systems for communicating timely and accurate information to the public during emergency
situations.
VI-9
Chapter VI
Intentionally Blank
VI-10 JP 3-07.2
APPENDIX A
ANTITERROISM PLAN
1. Overview
b. This format enables the integration of existing programs such as law enforcement,
physical security, AT, OPSEC, information security, high-risk personnel protection, and
other installation efforts. AT measures should be integrated into all plans.
c. Although this sample is patterned after the military operation order, it applies to
managers of DOD agencies and field activities as they develop plans to protect personnel,
activities, and material under their control.
2. Sample Format
Note: All annexes referenced in the Sample Format below refer to annexes in JOPES.
Installation/Operation Name
Location
Date/Time Group
Maps/Charts. (List all applicable maps or charts. Include enough data to ensure personnel are
using the correct year/edition/version of the subject material.)
Time Zone. (Enter the time zone of the installation. Indicate the number of hours to calculate
[plus/minus] ZULU time.)
A-1
Appendix A
1. SITUATION
a. General. This plan applies to all personnel assigned or attached to the installation.
(Describe the political/military environment in sufficient detail for subordinate commanders,
staffs, and units to understand their role in the installation AT operations.)
c. Friendly. (The forces available [both military and civilian] to respond to a terrorist
attack. Include the next higher headquarters and adjacent installations, and any
units/organizations that are not under installation command, but may be required to respond
to such an incident. These units/organizations may include HN and US military police
forces, fire and emergency services, medical, and federal/state and local agencies, special
operations forces, engineers, CBRN units, and EOD. Include MOAs/MOUs and any other
special arrangements that will improve forces available to support the plan. If in the US and
its territories, the DOJ, FBI is responsible for coordinating all federal agencies and DOD
forces assisting in the resolution of a terrorist incident. If outside the US and its territories,
the DOS is the lead agency. This information can be included in a separate annex[s]. See
Annex A [Task Organization] and Annex J [Command Relationships].)
(1) The installation is vulnerable to theft, pilferage, sabotage, and other threats. The
installation is also vulnerable to conventional and unconventional attack, including WMD.
(2) An act of terrorism involving WMD can produce major consequences that will
overwhelm almost immediately the capabilities of the installation.
(3) Security personnel, both military and civilian, may be insufficient to provide
total protection of all installation resources; therefore, the principal owner or user of a
facility, resource, or personnel must develop adequate unit awareness and safeguard
measures.
A-2 JP 3-07.2
Antiterrorism Plan
(4) No single unit on the installation possesses the expertise to act unilaterally in
response to attacks.
(5) If protective equipment is not available, responders will not put their own lives
at risk.
(6) Local, nonmilitary response forces will arrive within (time) of notification.
(7) Units specializing in CBRN response will arrive on-site within (number of
hours based on installation location) of notification.
(8) The HN is supportive of US policies and will fulfill surge requirements needed
to respond to a CBRN incident in accordance with MOAs/MOUs.
f. Intelligence. (The person, staff, or unit responsible for intelligence collection and
dissemination. The installation commander must have a system in place to access classified
current intelligence. This can be included in Annex B [Intelligence].) (National-level
agencies, combatant commanders, and intelligence systems provide theater or country threat
levels and threat assessments. In the US and its territories, local installations must obtain the
local terrorist threat information by querying the FBI through the installation’s law
enforcement liaison, local law enforcement, or other federal agencies.) Obtain these
assessments, as they will serve as a baseline for the installation’s tailored assessment. The
installation should have a process in place for developing the installation’s tailored threat
assessment or “local threat picture.” The installation’s tailored threat assessment should be
continuously evaluated, updated, and disseminated, as appropriate, and as directed by the
installation commander. The commander should determine the frequency and the means of
dissemination of the installation’s tailored AT product. Note: Commanders cannot change
the threat level, which is set and maintained by DIA, although they can declare higher
FPCONs than the baseline.
2. MISSION. (A clear, concise statement of the command’s mission and the AT purpose or
goal statement supporting the mission. The primary purpose of the AT plan is to safeguard
personnel, property, and resources during normal operations. It is also designed to detect and
deter a terrorist threat, enhance security and AT awareness, and assign AT responsibilities
for installation personnel.)
3. EXECUTION
a. Commander’s Intent. (Commander’s vision on how he/she sees the execution of the
unit’s AT program.)
b. Concept of Operations. (How the overall AT operation should progress. This plan
stresses deterrence of terrorist incidents through preventive and response measures common
to all combatant commands and Services. During day-to-day operations, the installation
should stress continuous AT planning and passive, defensive operations. This paragraph
should provide subordinates sufficient guidance to act if contact or communications with the
installation chain of command is lost or disrupted.)
A-3
Appendix A
(2) In post-incident planning, the installation should focus on its response and
reconstitution responsibilities upon notification of a terrorist incident and the procedures for
obtaining technical assistance/augmentation if the incident exceeds the installation’s organic
capabilities. National-level responders (FEMA, Red Cross, and FBI) may not be immediately
accessible or available to respond to an installation’s needs. Therefore each installation must
plan for the worst-case scenario by planning its response based on its organic resources and
available local support through MOA/MOUs.
(3) The situation may dictate that the installation not only conduct the initial
response but also sustained response operations. Many installations do not have onboard
CBRN officers or response elements. This paragraph will include specific implementation
instructions for all operational areas and the manner in which these actions must be
coordinated. The implementation instructions can be put in the form of action sets and
displayed in the form of a synchronization matrix (Post-Incident Action Set Synchronization
Matrix). The synchronization matrix format clearly describes relationships between
activities, units, supporting functions, and key events which must be carefully synchronized
to minimize loss of life and to contain the effects of a terrorist incident.
c. Tasks. (The specific tasks for each subordinate unit or element listed in the Task
Organization paragraph. Key members of the installation have responsibilities that are AT
and/or CBRN specific. The commander should ensure that a specific individual/unit/element
within the installation is responsible for each action identified in this plan. Each
individual/unit/element must know the tasks and responsibilities, what these responsibilities
entail, and how these will be implemented. While the tasks and responsibilities for each AT
planning and response element will be delineated in the pre- and post-incident action set
matrices, it is recommended that the installation commander identify/designate the primary
lead for each element and enter that information in this paragraph.)
A-4 JP 3-07.2
Antiterrorism Plan
(1) AT Planning and Response. This template outlines AT planning and response
elements on the installation required to respond to a terrorist/CBRN incident. Initial and
sustained response to an attack must be a coordinated effort between the many AT planning
and response elements of the installation, based on the installation’s organic capabilities. As
the situation exceeds the installation’s capabilities, it must activate MOAs/MOUs with the
local/state/federal agencies (US and its territories) or HN (outside the US and its territories).
For the purposes of this plan, an installation’s capability is divided into AT planning and
response elements.
(2) Procedural
(b) Physical Security to include Lighting, Barriers, Access Control. See Tab B
(Physical Security) to Appendix 15 (Force Protection) to Annex C (Operations).
A-5
Appendix A
(e) Technology.
(a) Antiterrorism.
(Operations).
(c) Special Threat Situations.
A-6 JP 3-07.2
Antiterrorism Plan
d. Succession of Command
//SIGNATURE//
Commanding General/Officer
Signature Block
ANNEXES: (Should provide amplifying instructions on specific aspects of the plan. Each
ANNEX can be subdivided into APPENDICES, TABS, and ENCLOSURES as required to
provide amplifying instructions. Further, some of these supporting documents may be
established in other unit operating orders/procedures, and referenced as required.)
A-7
Appendix A
Intentionally Blank
A-8 JP 3-07.2
APPENDIX B
ANTITERRORISM CHECKLIST FOR COMMANDERS AND
ANTITERRORISM OFFICERS
Antiterrorism Checklist—Commanders
Assuming Command:
• Does unit have an AT program and security posture appropriate for mission and potential threat?
• AT officer appointed?
• AT working group (ATWG) designated?
• DIA and/or FBI threat assessment current?
• Vulnerability assessment current?
• AT plan complete?
• Program review within past 12 months?
• AT plan exercised within past 12 months?
• AT level I training current?
• Have you reviewed DODI 2000.16 and appropriate combatant commander/Service AT guidance?
–Is combatant commander/Service AT guidance implemented?
Organize for AT:
• Does unit have adequate focus on AT?
• Is unit ATO school trained?
• Are right functions represented in ATWG?
• Is ATWG active? Meeting minutes? Accomplishments?
• Next meeting? Next action?
Threat Assessment:
• Do threat assessments provided by DIA and/or FBI and/or the local threat assessment process?
• Identify specific terrorist capabilities, weapons, and tactics (to include CBRN).
• Provide the necessary information for the commander to help tailor force protection conditions.
• Have a review mechanism to provide up to date information.
• Is unit aware of current and potential threats (conventional and CBRN)?
• DIA and/or FBI (CONUS) assessed threat level for area?
• Combatant commander-assigned higher local threat level?
• Formal intelligence assessment on hand and current?
• Relationship with supporting Intel activity?
• Is counterintelligence or law enforcement support needed?
• Local information considered?
• Local information network established?
• Aggressive list of threat options identified?
Vulnerability Assessment (VA):
• Do vulnerability assessments and the vulnerability process include?
• The range of terrorist threat identified in the threat assessment.
• Recommendations for procedural enhancements and resource requirements.
• Provided complete inventory of assets and areas.
• Prioritization of assets/areas on criticality.
• Catalog of known vulnerabilities.
• Provide for annual revisions.
• Has unit evaluated the vulnerability of all assets to potential threats to support risk management
decisions?
• When was the last vulnerability assessment?
• Did last VA reveal significant vulnerabilities?
B-1
Appendix B
B-2 JP 3-07.2
Antiterrorism Checklist for Commanders and Antiterrorism Officers
investments?
• Status of CCIF or program change proposal requirements in the program/budget process?
• AT and security factors adequately weighed in acquisition and use of facilities (both temporary and
permanent)?
• Current facilities conform to DOD and component AT military construction (MILCON) standards?
• Do structural engineers and security personnel work together to incorporate AT consideration in
building design and review?
• Are DOD AT Standards for buildings incorporated into new constructions?
• How is technology being used to enhance security and human performance?
• What technologies have been identified as recommended/required for higher threat levels/FPCONs?
• Is the AT officer a member of the resource management committee?
AT Training:
•Are personnel receiving the appropriate levels of AT training to include?
• Level I-IV training.
• High risk personnel.
• AOR specific training prior to deployment.
• A system to track and document training.
• Is individual awareness of terrorism threat sufficient for threat environment/mission?
• Annual level I training current?
• AOR updates current and briefed?
• Special local individual protective measures briefed and used?
Program Review:
• Is AT program comprehensive, current, and effective?
• Can unit do mission under FPCONs in use?
• Are critical FPCONs compromised for unit morale or convenience?
• Is AT a routine element of daily mission planning and execution?
• Are operational patterns varied?
• Is OPSEC included in mission planning?
• Does unit continually monitor threat and corresponding security posture?
• Does unit monitor and control access of visitors and employees in sensitive areas?
• Has threat level changed since last VA?
• Is threat assessment current and valid?
• Are RAMs having desired effect on unit awareness, readiness, and deterrence?
MOU/MOA:
• Is unit conforming to and employing MOU/MOA for local support?
• Does unit or any detached personnel fall under the Department of State for force protection?
• Are DOS’s force protection instructions on hand for those individuals?
• Identified organizations with jurisdiction for law enforcement, health, safety, and welfare of assigned
service members on and off duty?
• Unit conforming to jurisdictional agreements in these areas (SOFA, interagency)?
• Identified local community organizations with shared security interests (police, federal law
enforcement, hospitals, and public health)?
• Mutual aid agreements in place with local community to leverage shared interests?
• Mutual aid agreements been reviewed by higher HQ?
• Mutual aid agreements executable (liability, jurisdiction, capabilities)?
Mitigate WMD Effects:
• Has unit prepared for WMD attack?
• Does AT plan consider terrorist use of WMD?
• What are AT plan assumptions concerning the worst case threat options?
• Procedures for detection of unconventional CBRN attacks?
• Unit training include awareness of indicators of unconventional attacks?
• Do all personnel have individual protective equipment available?
• Are collective protective systems available?
• What CBRN detection equipment is available?
• What decontamination equipment is available?
• Are decontamination procedures established?
B-3
Appendix B
• Are decontamination waste disposal procedures established in accordance with HN, federal, state, or
local laws and regulations?
Off-Installation Housing:
• Are personnel housed off-installation adequately secured?
• Service members in moderate, significant, and high threat areas receive instruction and supervision in
residential security measures?
• In such areas, do unit AT response plans include current residence location information for all unit
members residing off installation?
• In such areas, do units coordinate with local law enforcement authorities for protection of unit
members residing off-installation (MOUs/MOAs/SOFAs)?
• Incident response plans include measures for off-installation personnel (personnel warning system)?
Rules of Engagement (ROE)/Rules for the Use of Force (RUF):
• Does unit have correct ROE/RUF guidance for the mission and environment?
• Do plan/current procedures provide enough “stand-off” to determine hostile intent and make proper
decision to use force?
• Are service members trained for making ROE/RUF decisions in realistic situations?
• ROE/threat scenarios adequate and rigorous?
• Is unit prepared to apply ROE/RUF for threat scenarios?
B-4 JP 3-07.2
Antiterrorism Checklist for Commanders and Antiterrorism Officers
• Does the unit use the DOD threat level methodology (Low, Moderate, Significant, High) in their local
threat assessments?
Threat Information Collection and Analysis
• Has the commander tasked the appropriate organization under their command to gather, analyze, and
disseminate terrorism threat information?
• Are personnel in the command encouraged and trained to report information on individuals, events, or
situations that could pose a threat to the security of DOD personnel, families, facilities, and resources?
• Does the command have procedures to receive and process defense terrorism warning reports and/or
higher headquarters threat message?
Threat Information Flow
• Does the command forward all information pertaining to suspected terrorist threats, or acts of terrorism
involving DOD personnel or assets for which they have AT responsibility up and down the chain of
command?
• Does the command ensure there is intelligence sharing between all organizations?
• Does the command provide tailored threat information for transiting units?
Potential Threat of Terrorist Use of Weapons of Mass Destruction (WMD)
• Does the command have the procedures to process immediately through the chain of command reports of
significant information obtained identifying organizations with WMD capability in their AOR?
• Is an estimate of terrorist potential use of WMD indicated in the local threat assessment?
Adjustment of Force Protection Conditions
• Does the command have a process, based on terrorism threat information and/or guidance from higher
headquarters, to raise or lower FPCONs?
FPCON Measures Implementation: This standard does not apply to facility AT plans.
FPCON Measures
• Has the command developed site-specific measures or actions for each FPCON which supplement
measures/actions enumerated for each FPCON?
• Does the command have procedures to set and transition between FPCONs?
• Does the command have procedures to establish a lower FPCON than Higher Headquarters?
• Are site-specific AT measures, linked to FPCONs classified as a minimum, CONFIDENTIAL?
• Site-specific AT measures separated from the AT plan can remain FOR OFFICIAL USE ONLY.
• Do FPCONs permit sufficient time and space to determine hostile intent IAW standing ROE?
• Has the command established procedures to expedite MOU/MOA assistance/response during elevated
FPCONs?
Comprehensive AT plan
• Does the command have a signed AT plan?
• Is the plan site-specific and address the following key elements?
• Terrorism threat assessment (including WMD).
• Vulnerability assessment.
• Risk assessment.
• AT physical security measures.
• Terrorism incident response measures.
• Measures to manage the consequences of AT incidents.
• Does the installation incorporate AT planning into operations orders for temporary operations or
exercises?
Terrorism Threat Assessment
• Does the command have an annually updated terrorism threat assessment?
• Does the threat assessment consider the following during the assessment process:
• Capabilities of the terrorist threat.
• Vulnerability of the facilities.
• Criticality of the facilities.
• Is the threat assessment used as the basis and justification for recommendations on AT enhancements,
program/budget requests and establishment of FPCONs?
• Does the command use a risk assessment to integrate threat and vulnerability assessment information in
order to make an informed decision to commit resources and/or enact policies and procedures to mitigate
the threat or define the risk?
B-5
Appendix B
B-6 JP 3-07.2
Antiterrorism Checklist for Commanders and Antiterrorism Officers
standards?
• Does the installation ensure Service family members traveling beyond CONUS on official business
receive Level I training (i.e., PCS move)?
AOR-Specific Training Requirements for all Department of Defense Personnel
• Does the command ensure all individuals traveling outside CONUS for either permanent or temporary
duty complete Level I AT awareness training?
• Has the command provided combatant commander approved AOR specific AT protection information to
individuals traveling outside CONUS within three months prior to travel?
• Does the command ensure intra-theater transiting units receive detailed threat information covering travel
routes and sites that will be visited by the unit?
Level II Antiterrorism Officer (ATO) Training
• Does the installation and/or each deployed unit have at least one Level II trained ATO assigned?
• Have 0-5/0-6 commanders received Level III training prior to assumption of command?
Training for High-Risk Personnel and High-Risk Billets
• Has the command identified high-risk billets and high-risk personnel to higher headquarters annually?
• Have personnel designated as “personnel at high-risk to terrorist attack” and “personnel assigned to high-
risk billets” received appropriate AT training?
Vulnerability Assessments of Installations
• Has a local vulnerability assessment been conducted within the past year?
• Did the vulnerability assessment identify vulnerabilities and means to eliminate or mitigation them?
• Did the vulnerability assessment identify options for enhanced protection of DOD personnel and assets?
• Does the AT vulnerability assessment assess the following functional areas at a minimum:
• AT plans and programs.
• Counterintelligence, law enforcement, liaison, and intelligence support.
• AT physical security measures.
• Vulnerability to a threat and terrorist incident response measures.
• Vulnerability assessment for terrorist use of WMD.
• Availability of resources to support plans as written.
• Frequency and extent to which plans have been exercised.
• Level and adequacy of support from the host nation, local community, and where appropriate, inter-
Service and tenant organizations to enhance force protection measures or respond to a terrorist
incident.
• Status of formal and informal agreements to support AT functions.
• Does the vulnerability assessment team contain expertise in order to meet the intent of providing
comprehensive assessments?
• Is there a process to track and identify vulnerabilities through the chain of command?
Predeployment AT Vulnerability Assessment
• Has a predeployment AT vulnerability assessment been conducted for units prior to deployment?
• Have appropriate AT measures been implemented to reduce risk and vulnerability?
• Has the command received onboard and/or advance-site assessments prior to and during visits to higher-
threat areas of significant or high threat Levels or where a geographically specific terrorism threat warning
report is in effect?
• Has the command requested funds from CCIF for emergent AT requirements prior to movement of
forces?
• Has the command explored the use of commercial-off-the-shelf or government-off-the-shelf products to
meet near-term AT protection requirements?
Construction Considerations
• Do DOD components adopt and adhere to common criteria and minimum construction (i.e., new
construction, renovation, or rehabilitation) standards to mitigate AT vulnerabilities and terrorist attacks?
Facility and Site Evaluation and/or Selection Criteria
• Has the command developed a prioritized list of AT factors for site selection for facilities, either currently
occupied or under consideration for occupancy by DOD personnel? AT factors should include, but not
limited to, screening from direct fire weapons, building separation, perimeter standoff, window treatments,
protection of entrances and exits, parking lots and roadways, standoff zone delineation, security lighting,
external storage areas, mechanical and utility systems.
B-7
Appendix B
• Has the command used these factors to determine if facilities can adequately protect occupants against
terrorism attack?
AT Guidance for Off-Installation Housing
• Does the command have procedures to ensure DOD personnel assigned to moderate, significant, and high
terrorism threat Level areas, who are not provided on-installation or other government quarters, are
furnished guidance on the selection of private residence to mitigate risk of terrorist attack?
• Does the command have procedures to conduct physical security reviews of off-installation residences for
permanently and temporary-duty DOD personnel in significant or high threat Level areas?
• Based on these physical security reviews, does the command have procedures to provide AT
recommendations to residents and facility owners?
• As appropriate, does the command have procedures to recommend to appropriate authorities the
construction or lease of housing on an installation or safer area?
• Does the command have procedures to complete residential security reviews prior to personnel entering
into formal contract negotiations for the lease or purchase of off-installation housing in significant or high
threat areas?
• Does the command have procedures to include coverage of private residential housing in AT plans where
private residential housing must be used in moderate, significant, or high threat level areas?
• In moderate, significant, or high threat areas, does the command incorporate family members and
dependent vulnerabilities into antiterrorism assessment, mitigation, and reporting tools for:
• Facilities used by DOD employees and their dependents.
• Transportation services and routes used by DOD employees and their dependents.
Executive Protection and High Risk Personnel Security
• Has the command annually reviewed and revalidated the protective services for executives?
• Has the command taken necessary measures to provide appropriate protective services for designated
individuals in high-risk billets and high-risk personnel?
• Does the command review needs for supplemental security within 30 days of a change in the terrorism
threat level?
Miscellaneous Issues
• Does the command have technology to access critical terrorism intelligence e.g., SIPRNET?
• Has the 0-6 through 0-8 commander been to Level IV training?
B-8 JP 3-07.2
APPENDIX C
THREAT INFORMATION ORGANIZATION MATRIX
1. Introduction
The following matrix (see Figure C-1) is provided as a tool that could be used to
categorize, organize, and analyze threat information relevant to an antiterrorism program. It
is similar to an intelligence collection plan, but is intended for use on installations. If an
intelligence collection plan is already active on the installation or base, the ATO should
endeavor to have AT efforts integrated with ongoing efforts.
2. Organization Matrix
a. The basic premise of this organization matrix is that there are several key questions
(PIRs) that the command needs to answer in order to keep the installation better protected or
aware of potentially developing terrorist activity. These PIRs have supporting components
or related questions (IRs). Individual indicators suggest when the IR is active. The
indicators are then divided into their core elements (specific information requirements
[SIRs]) that installation staff members or coordination agencies need to report or record.
Similarly, for a given incident, such as a stolen identification card, that information can be
traced back to a bigger question and suggest that someone is conducting surveillance on the
base or nearby base.
b. The SIRs should be given to the staff members who would likely observe or see the
types of information suggested. For instance, gate guards should be given the SIRs to report
unauthorized access attempts (item 1.32a) (Column D row 28), but the installation
information technology office would be responsible for reporting computer viruses,
unauthorized attempts to access the network, etc. (items 1.16a, 1.16b). The organization
plan also assists the ATO in explaining to coordinating agencies exactly what information is
expected.
d. DOD intelligence oversight regulations and guidance remain in effect for all CONUS
collection, analysis, and reporting on terrorist threats or suspicious activities. Similarly, AT
threat analysis and reporting shall be conducted in accordance with the same intelligence
oversight guidance.
C-1
C-2
Appendix C
INSTALLATION THREAT INFORMATION ORGANIZATION PLAN
Collection Collection Agencies
Loc LEA #1
Loc LEA #2
Loc LEA #3
Near Base
Date
HHQ INT
DOIM/IT
Date Info No
St LEA
TWG
CST
Specific Information Info Longer
ATF
LET
FBI
HS
CI
PIR IR Indicators Requirements Needed Needed Remarks
I
PIR #1 Installation
1. What local, Always Never X X X X X X X X X X X X X X X X Reporting
regional, or requirements
international 1. LEC 111-111-1111
organizations pose a 2. IOC 111-111-1111
potential threat to 3. CID 111-111-1111
XXXX or the 4. MI 111-111-1111
surrounding 5. OIS 111-111-1111
community? 6. FBI 111-111-1111
(After hrs 111-111-
1111)
1.1. What means do Always Never X X X X X X X X X X X X X X X X
these organizations
have to conduct attacks
against XXXX and the
surrounding
community?
1.11. Information on purchase or 1.11a. Report unusual purchase Always Never
theft of material to make or theft of explosives, weapons,
improvised devices ammunition, HAZMAT, fertilizers,
chemicals, etc.
1.12. Information on purchase of 1.12a. Report unusual purchase Always Never
large quantity of weapons or theft or theft of vehicles capable of
of weapons being configured with explosives
or WMD
1.13. Information on suspicious 1.13a. Report vehicles modified Always Never
car, truck, van activity to handle heavier loads
1.14. Information on suspicious 1.14a. Report loss or theft of Always Never
activity dealing with military IDs, government vehicles or license
DOD decals, or other XXXX plates
special access passes
1.14b. Report purchase or theft of
vehicles with DOD decals
1.14c. Report loss or theft of
military IDs or special access
JP 3-07.2
passes
Figure C-1. Installation Threat Information Organization Plan
INSTALLATION THREAT INFORMATION ORGANIZATION PLAN
Collection Collection Agencies
Loc LEA #1
Loc LEA #2
Loc LEA #3
Near Base
Date
HHQ INT
DOIM/IT
Date Info No
St LEA
TWG
CST
Specific Information Info Longer
ATF
LET
FBI
HS
CI
PIR IR Indicators Requirements Needed Needed Remarks
I
PIR #1 Installation
1.15. Information on unusual 1.15a. Report unusual flight
airborne activity on/vicinity XXXX patterns of helicopters, single-
engine aircraft, parachute/gliders,
or parafoils
1.15b. Report theft of airborne
platforms
1.16. Information on attempts to 1.16a. Report any attempt to
attack or access XXXX computer access XXXX computer network
network or reports of stolen or misused
passwords
1.16b. Report any ADP viruses
immediately
1.16c. Report any suspicious
telephone calls or e-mails.
1.2. What historical Always Never
patterns of attack has
this group employed?
Appendix C
INSTALLATION THREAT INFORMATION ORGANIZATION PLAN
Collection Collection Agencies
Loc LEA #1
Loc LEA #2
Loc LEA #3
Near Base
Date
HHQ INT
DOIM/IT
Date Info No
St LEA
TWG
CST
Specific Information Info Longer
ATF
LET
FBI
HS
CI
PIR IR Indicators Requirements Needed Needed Remarks
I
PIR #1 Installation
1.3. What are the Always Never
recent activities of this
organization?
1.31. Information on possible 1.31a. Report all suspicious Always Never
surveillance of XXXX questions about XXXX or vicinity
1.32. Information on possible 1.32a. Report all unauthorized Always Never
unauthorized attempts to access attempts to access XXXX
XXXX
1.33. Queries about XXXX 1.33a. Report all suspicious Always Never
security measures telephone calls or e-mails
1.34. Requests for information on 1.34a. Report all questions about
XXXX activities, missions, sensitive locations
memoranda of agreement,
memoranda of understanding
1.35. Active dissident or terrorist 1.35a. Report all questions about
groups recruiting vicinity XXXX working relationships with local,
state, federal law enforcement
agencies
1.36. Active dissident or terrorist 1.36a. Report all suspicious
groups fund-raising vicinity XXXX requests for job employment
vicinity XXXX
1.37. Active dissident or terrorist 1.37a. Report all suspicious fund-
groups training vicinity XXX raising operations vicinity XXXX
1.37b. Report all suspicious
recruiting or training operations
vicinity XXXX
1.37c. Report what these groups
collect against
1.38. Recent arrests in vicinity 1.38a. Report any suspicious
XXXX individuals arrested or detained
vicinity XXXX
Figure C-1. Installation Threat Information Organization Plan (cont.)
JP 3-07.2
INSTALLATION THREAT INFORMATION ORGANIZATION PLAN
Collection Collection Agencies
Loc LEA #1
Loc LEA #2
Loc LEA #3
Near Base
Date
HHQ INT
DOIM/IT
Date Info No
St LEA
TWG
CST
Specific Information Info Longer
ATF
LET
FBI
HS
CI
PIR IR Indicators Requirements Needed Needed Remarks
I
PIR #1 Installation
1.4. What adjustments Always Never
has this organization
made in response to
changes in XXXX threat
conditions and force
protection conditions?
1.41. Information on new 1.41a. Report all suspicious Always Never
methods dissident groups or questions about XXXX or vicinity
terrorist organizations are using
to obtain information, surveil,
recruit, fund-raise, or acquire
weapons or equipment
1.42. Information on possible 1.42a. Report all unauthorized Always Never
surveillance of XXXX attempts to access XXXX
1.43. Information on possible 1.43a. Report all suspicious Always Never
unauthorized attempts to access telephone calls or e-mails
Appendix C
INSTALLATION THREAT INFORMATION ORGANIZATION PLAN
Collection Collection Agencies
Loc LEA #1
Loc LEA #2
Loc LEA #3
Near Base
Date
HHQ INT
DOIM/IT
Date Info No
St LEA
TWG
CST
Specific Information Info Longer
ATF
LET
FBI
HS
CI
PIR IR Indicators Requirements Needed Needed Remarks
I
PIR #2 Installation
2.1. Have there been
any suspicious
surveillance activities
on XXXX or against
assigned personnel?
2.11. Incidents of individuals 2.11a. Report incidents of
videotaping, photographing, or individuals videotaping,
sketching XXXX photographing, or sketching
installation elements
2.12. Incidents of unauthorized 2.12a. Report turnarounds at
individuals attempting to access gates
XXXX
2.12b. Report loss or theft of
military IDs or special access
passes
2.13. Incidents of XXXX 2.13a. Report any suspicious
personnel being surveilled by incidents in which base personnel
suspicious personnel suspect they were being
surveilled
2.14. Unusual attempts to obtain 2.14a. Report any attempts to
military uniforms, DOD decals, obtain military uniforms or
military IDs, or equipment in equipment
vicinity XXXX
2.2. Have there been
any thefts or unusual
circumstances involving
the loss of personal ID
cards, vehicle
registrations,
government license
plates, or government
vehicles?
2.21. Incidents of stolen or lost 2.21a. Report loss or theft of
personal ID cards government vehicles or license
JP 3-07.2
plates
Figure C-1. Installation Threat Information Organization Plan (cont.)
INSTALLATION THREAT INFORMATION ORGANIZATION PLAN
Collection Collection Agencies
Loc LEA #1
Loc LEA #2
Loc LEA #3
Near Base
Date
HHQ INT
DOIM/IT
Date Info No
St LEA
TWG
CST
Specific Information Info Longer
ATF
LET
FBI
HS
CI
PIR IR Indicators Requirements Needed Needed Remarks
I
PIR #2 Installation
2.22. Incidents of stolen or lost 2.22a. Report purchase or theft of
DOD decals or special access vehicles with DOD decals
passes for XXXX
2.23. Incidents of stolen or lost 2.23a. Report loss or theft of
government license plates military IDs or special access
passes
2.24. Incidents of stolen 2.24a. Report all unauthorized
government vehicles attempts to access XXXX
2.25. Increase in vehicle break- 2.25a. Report all attempts at
ins or car theft vicinity XXXX vehicle break-ins or car theft
vicinity XXXX
2.26. Queries of unauthorized 2.26a. Report all suspicious
personnel attempting to obtain requests for employment in
XXXX access passes vicinity XXXX
2.3. Have there been
Appendix C
INSTALLATION THREAT INFORMATION ORGANIZATION PLAN
Collection Collection Agencies
Loc LEA #1
Loc LEA #2
Loc LEA #3
Near Base
Date
HHQ INT
DOIM/IT
Date Info No
St LEA
TWG
CST
Specific Information Info Longer
ATF
LET
FBI
HS
CI
PIR IR Indicators Requirements Needed Needed Remarks
I
PIR #2 Installation
2.34. Attempts by unauthorized 2.34a. Report loss or theft of
individuals to observe military government vehicles or license
training sites where weapons are plates
used
2.4. Have there been
any perimeter
violations, security
breaches, unauthorized
intrusions, or
unauthorized overflights
of XXXX?
2.41. Incidents of physical signs 2.41a. Report loss or theft of
of intrusion on XXXX government vehicles or license
plates
2.42. Incidents of unauthorized 2.42a. Report on purchase or
personnel attempting to access theft of vehicles with DOD decals
XXXX
2.43. Incidents of unauthorized 2.43a. Report loss or theft of
attempts to access XXXX military IDs or special access
passes, refused entries, or
turnarounds at gate
2.5. Have there been
receipts of any
suspicious shipments of
mail, packaged freight,
truck inventory,
containerized ship
cargo, or special
equipment?
2.51. Increase in receipt of 2.51a. Report any suspicious
suspicious packages nationwide mail, packages, or cargo received
on/vicinity XXXX
JP 3-07.2
Loc LEA #1
Loc LEA #2
Loc LEA #3
Near Base
Date
HHQ INT
DOIM/IT
Date Info No
St LEA
TWG
CST
Specific Information Info Longer
ATF
LET
FBI
HS
CI
PIR IR Indicators Requirements Needed Needed Remarks
I
PIR #2 Installation
2.52. Increased reporting of 2.52a. Report unusual purchase
potential threats to XXXX mail or or theft of explosives, weapons,
cargo shipments, especially by ammunition, HAZMAT, fertilizers,
telephone or e-mail chemicals, etc.
2.53. Increase in stolen delivery, 2.53a. Report unusual purchase
cargo, commercial trucks or theft of vehicles capable of
nationwide; focus on vicinity being configured with explosives
XXXX
2.53b. Report vehicles modified
to handle heavier loads
2.6 Have there been
any thefts from
surrounding community
of commercial or
private aircraft,
commercial or private
helicopters, commercial
vehicles, tanker trucks
Appendix C
INSTALLATION THREAT INFORMATION ORGANIZATION PLAN
Collection Collection Agencies
Loc LEA #1
Loc LEA #2
Loc LEA #3
Near Base
Date
HHQ INT
DOIM/IT
Date Info No
St LEA
TWG
CST
Specific Information Info Longer
ATF
LET
FBI
HS
CI
PIR IR Indicators Requirements Needed Needed Remarks
I
PIR #2 Installation
2.64. Incidents of suspicious 2.64a. Report all suspicious
individuals trying to gain attempts to gain employment with
employment at businesses that transportation industry in local
have access to aircraft, area
commercial vehicles, tanker
trucks, watercraft
PIR #3 Installation
3. What events are
taking place on XXXX
or in the surrounding
community that may
provide opportunity
for threat or attack?
3.1. What major
sporting, cultural,
industrial, political,
military, or other
symbolic events will
take place at XXXX or
in the community within
the next 30 days that
may trigger the
targeting interests of
threat organizations?
3.11. Unusual number of queries 3.11a. Report any unusual
concerning events taking place questions about events taking
on/vicinity XXXX place on/vicinity XXXX
3.12. Increased number of 3.12a. Report increase in threat
reports nationally about threat to reporting nationwide concerning
major sporting, cultural, major sporting, cultural, industrial,
industrial, political, military, or political, military, or symbolic
other symbolic events events
3.13. Incidents of unauthorized 3.13a. Report all suspicious
individuals attempting to gain questions about XXXX or vicinity
JP 3-07.2
Loc LEA #1
Loc LEA #2
Loc LEA #3
Near Base
Date
HHQ INT
DOIM/IT
Date Info No
St LEA
TWG
CST
Specific Information Info Longer
ATF
LET
FBI
HS
CI
PIR IR Indicators Requirements Needed Needed Remarks
I
PIR #3 Installation
3.14. Incidents of individuals 3.14a. Report all suspicious
making queries about security telephone calls or e-mails
measures pertaining to events
on/vicinity XXXX
3.15. Incidents of suspicious 3.15a. Report suspicious
individuals attempting to gain attempts to gain employment at
employment to support specific special events
events on/vicinity XXXX
3.2. What movements
of HAZMAT take place
on XXXX or in the
community that may
trigger the targeting
interests of threat
organizations?
Appendix C
INSTALLATION THREAT INFORMATION ORGANIZATION PLAN
Collection Collection Agencies
Loc LEA #1
Loc LEA #2
Loc LEA #3
Near Base
Date
HHQ INT
DOIM/IT
Date Info No
St LEA
TWG
CST
Specific Information Info Longer
ATF
LET
FBI
HS
CI
PIR IR Indicators Requirements Needed Needed Remarks
I
PIR #4 Installation
4. Do indicators exist
of a possible incident
at XXXX or the
surrounding
community involving
nuclear, biological, or
chemical weapons?
4.1. Do threat
organizations have the
means to conduct a
CBRN attack or a
HAZMAT attack at
XXXX or in the
surrounding
community?
4.11. Incidents of stolen CBRN 4.11a. Report stolen CBRN
material nationally and material in vicinity XXXX
specifically in vicinity XXXX
4.12. Incidents of unusual 4.12a. Report excessive or
purchase of explosives, unusual purchases of potential
weapons, ammunition, HAZMAT, CBRN material
fertilizers, chemicals, precursors,
etc.
4.13. Incidents of unusual 4.13a. Report purchases of
purchase or theft of vehicles protective or lab equipment for
capable of being configured with agent handling
explosives or adapted for agent
dissemination
4.14. Incidents of individuals 4.14a. Report suspicious queries
making queries about security about the capability of CBRN
measures pertaining to CBRN- materials
related measures on/vicinity
XXXX
4.15. Incidents of individuals 4.15a. Report queries about the
making queries about security security of chemicals used to
JP 3-07.2
Loc LEA #1
Loc LEA #2
Loc LEA #3
Near Base
Date
HHQ INT
DOIM/IT
Date Info No
St LEA
TWG
CST
Specific Information Info Longer
ATF
LET
FBI
HS
CI
PIR IR Indicators Requirements Needed Needed Remarks
I
PIR #4 Installation
4.16. Increased reporting of 4.16a. Report unauthorized
terrorist organization’s ability and individuals attempting to gain
threat to CBRN material in the access to XXXX
US
4.17. Treatment of unusual 4.17a. Report all medical cases
illnesses or symptoms seeking treatment for unusual
illnesses or symptoms
4.18. Purchase of CBRN 4.18a. Report purchases or
antidotes attempted purchases of CBRN
antidotes
4.18b. Report any excess
purchases of bleach
4.19. Incidents of unusual odors 4.19a. Report all cases of
or HAZMAT signs unusual odors or the appearance
of HAZMAT signs
4.19b. Report cases of
unexplained animal deaths or
lack of insect or plant life
Appendix C
INSTALLATION THREAT INFORMATION ORGANIZATION PLAN
Collection Collection Agencies
Loc LEA #1
Loc LEA #2
Loc LEA #3
Date
Near Base
HHQ INT
DOIM/IT
Date Info No
St LEA
TWG
CST
Specific Information Info Longer
ATF
LET
FBI
HS
CI
PIR IR Indicators Requirements Needed Needed Remarks
I
PIR #4 Installation
4.34. Incidents of unusual 4.34a. Report thefts or purchases
purchases of CBRN protective of CBRN protective gear
gear
4.4. Where are
HAZMAT stored,
transported, or used in
bulk on XXXX or in the
surrounding
community, which could
create mass
casualties?
4.41. Chemical or manufacturing 4.41a. Report all suspicious
industries, water treatment, activity at these locations or with
waste treatment facilities their transportation assets
4.41b. Report what chemicals
and quantities are stored at these
locations
4.41c. Report how these facilities
store, receive, or ship chemicals
4.41d. Report suspicious
incidents related to storage or
shipment of chemicals
Legend
ADP automated data processing ID identification
ATF Alcohol, Tobacco, and Firearms IR information requirement
CBRN chemical, biological, radiological, and nuclear LEA law enforcement agency
CI counterintelligence LET law enforcement team
CID Criminal Intelligence Division Loc local
CST civil support team MI military intelligence
DOD Department of Defense NCIS Naval Criminal Investigation Service
DOIM/IT Department of Information Management/Information Technology OSI Office of Special Investigations
FBI Federal Bureau of Investigation PIR priority information requirement
HAZMAT hazardous materials St state
HHQ INT higher headquarters intelligence TWG threat working group
HS homeland security WMD weapons of mass destruction
I installation
JP 3-07.2
Preventive and protective security measures should be taken by military units and
individual Service members to protect themselves and their ability to accomplish their
mission during mobilization, deployment, employment, sustainment, rotation, and
redeployment operations. Additionally, rest and recuperation (R&R) facilities and other
facilities not located in a traditional military installation also require close consideration.
These facilities are frequently vulnerable due to their location and generally easy access.
Service personnel are at risk of lowering their guard while using these R&R facilities. The
installation, ship, unit, or port AT plan provides the mechanism to ensure readiness against
terrorist attacks while the unit performs its tactical mission during deployments. Air shows,
or similar events, should receive special consideration and be covered under specific AT
plans or contingencies. The ATO should review special events and prepare
recommendations or specific AT supplemental plans for the installation commander. The
degree of the protection required depends on the threat in a given location. Commanders
must constantly evaluate security against the terrorist threat in order to effectively evaluate
security requirements. This responsibility cannot be ignored.
a. Design basis threat (DBT) is the threat against which an asset must be protected and
upon which the protective system’s design is based. It is the baseline type and size of threat
that buildings or other structures are designed to withstand. The DBT includes the tactics
aggressors will use against the asset and the tools, weapons, and explosives employed in
these tactics. DBT is defined in Technical Manual (TM) 5-853, Security Engineering, and
the Military Handbook 1013/12. It is also included in UFC 4-010-01, DOD Minimum
Antiterrorism Standards for Buildings and UFC 4-020-01, DOD Security Engineering
Facilities Planning Manual contains a flow chart and other information to support
development of a DBT for facility planners.
b. The DBT is used by engineering and facilities personnel to protect personnel and
mission infrastructure with proper design. It is important that the “threat used as a basis of
design” be a steady state threat and realistic. This value is used as the beginning input to the
design loads which the building structure will have to support or withstand during the life of
the building. The DBT is also used by security personnel manning entry control points to
develop search procedures to prevent the on-base DBT from being exceeded.
c. Installations can determine the DBT by identifying the highest threat severity and
tactic that they will likely face. The threat working group can develop a threat matrix from
the analysis of the threat assessment. The threat matrix, when properly completed, will
identify the installation’s DBT for all identified threats and hazards. Additionally, the
combatant command’s enhanced threats and hazards assessment for the Defense Critical
Infrastructure Program can assist in developing the DBT from an all-hazards perspective.
The installation commander must at a minimum, implement the higher headquarters directed
D-1
Appendix D
DBT. If higher HQ guidance does not provide a DBT, the installation should establish and
incorporate a DBT for use by security engineers and security forces.
e. The off-base threat to facilities along and outside the controlled perimeter is different
from the threat posed to facilities inside a controlled perimeter. Whenever possible,
commanders should adopt the off-base DBT in the design of protective systems for existing
facilities and in the construction or renovation of new facilities if these facilities are
vulnerable to off-base threats. Of note, the on-base DBT needs to take into consideration the
ability to mitigate threats at access control point and circumstances where on-base facilities
are located close enough to off-base areas where vehicles may be located (e.g., off-base
parking lot next to the perimeter).
During joint and multinational operations, US units and bases in the joint security area
(JSA) are still vulnerable to terrorist attacks. The same procedures identified in the
preceding paragraphs apply. Commanders will be advised by the joint security coordinator
(JSC) of potential terrorist threats, and subordinate commands will report any terrorist
activity to the JSC. Units passing through the JSA are still required to maintain AT
measures commensurate with the JSC’s guidance. Specific TTP for operations in the JSA
are contained in JP 3-10, Joint Security Operations in Theater.
4. Preventive Measures
D-2 JP 3-07.2
Preventive Measures and Considerations
Fences, entrance gates, and obstacles should be illuminated to provide easy observation.
Obstacles must be covered by observation and fire.
b. Entry Control Points (ECPs). ECP design should consider four zones: an approach
zone where traffic speed and maneuver is limited and vehicle type (passenger, friendly,
commercial) is established; the access control zone where personnel and vehicle credentials
are established and vehicle inspections occur (this area should be screened to protect from
surveillance by enemy forces); the response zone, which provides adequate reaction time for
ECP personnel; and a final denial barrier that requires positive action to allow entry or exit
from a compound. ECP design should also attempt to maximize response time by
determining identity of threats as early as possible and minimize risk to personnel seeking
entrance to the installation.
5. Establish Defense
Measures taken to establish the defense must be continually reviewed and progressively
updated to counter the changing threat and add an element of unpredictability to the
terrorist’s calculation. Defensive measures include the following:
d. Maintain, when possible, secure radio or landline communications with the military
police, security guards, and reaction force(s).
D-3
Appendix D
f. Guard Duties. Guard duties are detailed in general and special orders and standard
operating procedures. Special orders should address as a minimum the following:
(4) Specific ROE or use of force policy which includes all available weapons for
escalation of force.
(8) Steps necessary to obtain police, reaction force(s), fire department, and
ambulance.
a. Road Movement. Road movements are always vulnerable to terrorist attacks in high
risk areas. Road reconnaissance should be conducted periodically to identify high-threat
areas. If possible, alternate forms of transportation (e.g., helicopters) should be used. If road
movement is required:
(1) Confirm that drivers have received appropriate antiterrorism training for the
vehicles and conditions in which they will be operating.
(5) Do not stop for dead or dying animals in/beside the road.
D-4 JP 3-07.2
Preventive Measures and Considerations
(7) Avoid traveling at night unless tactical advantage can be gained through use of
night vision devices. Additional precautions should be considered if travel is required during
periods of agitation (e.g., religious or political holidays).
(8) When possible, keep a low profile (use vehicles that do not stand out).
(11) Avoid dangerous areas (e.g. ambush sites, areas known for violence).
b. Vehicle Protection. Consider the following precautions when using tactical and
some types of commercial vehicles, such as trucks, in a high-risk area:
(3) If carrying personnel, sandbag the vehicle bed as well as the driver’s
compartment.
(5) Fold windshield in driver’s compartment and fit high-wire cutter. Lower side
windows (unless windows provide ballistic protection) to prepare to use weapon through
window.
(7) Passengers riding in truck bed face outboard and are assigned sectors of
observation and fire.
(8) Rig chicken wire or chain link screens on front bumper frame to deflect rocks,
bottles, firebombs, and grenades.
(9) Carry pioneer tools (fire extinguishers in particular), a line with grappling hook
to clear obstacles, and tow bars for disabled vehicles.
D-5
Appendix D
(10) When the threat of hostile fire is constant, plan for the use of vehicles with
additional armored protection.
(4) Develop deception plans to conceal or change movement timing and route.
(7) Convoy escort composition depends on available forces. Vehicles used should
be appropriately hardened and possess the necessary weapons systems and other equipment
to address the threat. Aircraft, including helicopters, attack and close air-support, and
unmanned aerial vehicles (UAVs), can also be used as air escorts, if available. Escorts
should be organized into an advance guard, main body escort, and reaction or strike group.
Planning considerations are as follows:
(d) Identify disposition of advance guard, main body escort, and reaction or
strike group.
(f) Determine rendezvous time at assembly area, departure time of first and last
vehicle, and expected arrival of first and last vehicle at destination.
D-6 JP 3-07.2
Preventive Measures and Considerations
(2) Search for explosives or possible hijackers before departure and after every halt
(military working dogs [MWDs] are particularly suited for this mission).
(5) Place armed security personnel on duty throughout the train, including engine
room and trail car.
(8) Provide air cover (e.g., AC-130, helicopter gun ships, UAV).
(9) Maintain communications within the train and with outside agencies.
e. Sea Movement. Sea movement, especially aboard military vessels, may provide a
false sense of security. Sea operations are certainly more secure than urban patrols;
however, ships transiting through restricted or congested waterways such as straits, harbors,
or anchored off hostile coastlines are visible and high-risk targets. Crews of ships need to
evaluate each new port and determine possible terrorist actions and ship’s force
counteractions (such as using fire and steam hoses and other nonlethal weapons to repel or
deter attackers). Crew members must be aware of HNS and responsibilities while in port or
anchored in foreign national waters. The ship’s captain is solely responsible for the ship and
all those embarked. As a minimum, the captain:
(1) Establishes methods of embarkation and debarkation and patrol activities for all
personnel.
(2) Identifies vital areas of the ship (for example, engine room, weapons storage,
command and control bridge), and assigns security guards.
D-7
Appendix D
(5) Ensures all personnel involved are trained through exercises or drills.
f. Air Movement. For the most part, while a unit is being transported by air it is under
the purview of the Air Force or air movement control personnel. Troop commanders and Air
Force personnel coordinate duties and responsibilities for their mutual defense. Personnel
must remain vigilant and leaders must provide adequate security. Unit security personnel
coordinate with airfield security personnel, assist departures and arrivals at airfields while en
route, and determine weapons and ammunition policies. Special considerations include the
following topics:
(1) Road transport security when driving to and from airfields is critical. Keep
arrival arrangements low profile. Do not pre-position road transport at the airport for
extended periods before arrival.
(3) All personnel (air crews and transported unit) must be cautioned concerning the
transportation of souvenirs and other personal items that could be containers for explosives.
g. Patrolling. Units outside the United States may be called upon to conduct patrols in
urban or rural environments. These patrols will normally be planned and executed in
conjunction with HN authorities and should be coordinated with the representatives of the
appropriate SJA office and be in accordance with any applicable basing, status-of-forces, or
other agreements. Depending on applicable agreements and regulations or other policy,
patrols may be authorized to support police operations, expand the area of influence, gather
information, police nightclubs and restaurants, detain individuals as required, conduct hasty
searches, and erect hasty roadblocks. Patrols must understand the ROE. Patrolling units
should avoid patterns by varying times and routes, using different exit and entry points at the
base, doubling back on a route, and using vehicles to drop off and collect patrols and change
areas. Base sentries or guards, other vehicle patrols, helicopters, OPs, HN assets, and
reaction forces provide additional support.
D-8 JP 3-07.2
Preventive Measures and Considerations
h. Roadblocks. There are two types of checkpoints: deliberate and hasty. Deliberate
checkpoints are permanent or semi-permanent roadblocks/control points used on borders,
outskirts of cities, or the edge of controlled areas. Use deliberate roadblocks to check
identification and as a deterrent. Use hasty roadblocks to spot check, with or without prior
intelligence. Hasty roadblocks use the element of surprise. Their maximum effectiveness is
reached within the first half hour of being positioned. Hasty roadblocks can consist of two
vehicles placed diagonally across a road, a coil of barbed wire, or other portable obstacles.
Checkpoints must not unnecessarily disrupt the travel of innocent civilians. Personnel
manning roadblocks must know their jobs thoroughly, be polite and considerate, act quickly
and methodically, use the minimum force required for the threat, and promptly relinquish
suspects to civil police authorities. General principles considered in establishing roadblocks
are concealment, security, construction and layout, manning, equipment, communications,
and legal issues. Unless combined posts (HN and US personnel) are used, language training
will be a key planning factor in employing roadblocks.
i. Observation Posts. OPs are critical. OPs provide prolonged observation of areas,
people, or buildings. OPs allow observation of an area for possible terrorist activity (avenues
of approach); observation of a particular building or street; ability to photograph persons or
activities; ability to observe activity before, during, or after a security force operation (e.g.,
house search); and ability to provide covering fire for patrols. Special factors apply to OPs
located in urban areas. The OP party and reaction force must know the procedure, ROE,
escape routes, emergency withdrawal procedures, rallying point, casualty evacuation, and
password. Cover the occupation and withdrawal of an OP by conducting normal operations
(e.g., house searches, roadblocks, patrols to leave people behind), flooding an area with
patrols to disguise movement, using civilian vehicles and clothes (when authorized), and
using deception. Any compromise of an OP location should be immediately reported.
l. Bomb Explosion or Discovery. The initial terrorist bomb may not be the end of the
incident. The initial bomb may be designed to draw forces into an area as targets for a
shooting ambush or another explosion. It is imperative to detail personnel or units to search
the area for secondary devices. Upon discovery of a bomb or upon entering a bomb site,
D-9
Appendix D
response forces should proceed with extreme caution and contact the EOD team
immediately. Explosive detection MWDs, EOD, or other available detection methods should
be utilized to sweep areas surrounding suspected explosive devices or incident sites for
secondary devices.
D-10 JP 3-07.2
APPENDIX E
RISK MANAGEMENT PROCESS
1. Criticality Assessment
(1) The CA identifies assets supporting DOD missions, units, or activities which
are deemed critical by military commanders or civilian agency managers. For AT purposes,
the criticality assessment should include high-population facilities which may not necessarily
be mission essential (recreational activities, theaters, or sports venues). It addresses the
impact of temporary or permanent loss of assets. It examines costs of recovery and
reconstitution including time, dollars, capability, and infrastructure support.
(2) In military units deployed under the command of the Services or a combatant
command, the staff at each command echelon determines and prioritizes critical assets. The
commander responsible for AT approves the prioritized list. The criticality assessment goals
are to determine:
(b) Critical functions and the extent they can be replicated under various
attack scenarios.
E-1
Appendix E
methodologies, both have design limitations and are best used only as an adjunct to the risk
management process. DOD Manual 3020.45-V1, Defense Critical Infrastructure Program
(DCIP) (DOD Mission-Based Critical Asset Identification Process [CAIP]), provides
comprehensive procedures for a defense critical infrastructure identification process using a
mission-focused process.
(4) The purpose of the criticality assessment process is to identify, classify, and
prioritize all assets on an installation. Assets can include personnel, equipment, stockpiles,
buildings, or transportation systems that are deemed critical as defined by DODD 3020.40,
Defense Critical Infrastructure Program. Assets can be classified as MEVAs, high risk
targets, HRP, higher headquarters, incident response and recovery, supporting foundational
infrastructure networks, high demand, and low density. For example, a telephone switching
facility located off base may be essential to communications if alternative systems are not
identified. There may also be assets on the installation which are not critical to the direct
operation of the installation, but are critical to DOD.
For more information on high risk billets and HRP, see DODI O-2000.22, Designation and
Physical Protection of DOD High Risk Personnel (HRP).
(5) It may also be useful to link identified threat attack means to a specific time
period or location. For example, a terrorist group operating in the proximity of the
installation may typically target areas, such as schools or the commissary and/or exchange
that contain a large number of people at certain times.
(6) When determining asset criticality, use of the following criteria shall assist in
standardizing the process.
(a) Importance. Measures the value of the area or assets located in the area,
considering their function, inherent nature, and monetary value.
(c) Recoverability. Measures the time required for the function occurring at
that area to be restored, considering the availability of resources, parts, expertise and
manpower, and redundancies. Even if a DOD asset is injured, damaged, or destroyed, it may
have future value in the accomplishment of other DOD missions or be of great symbolic
value to DOD, the US Government, and the American people. Consideration should
therefore be given to the resources that must be expended to recover an asset and in some
cases, repair it for return to service with DOD in the future.
E-2 JP 3-07.2
Risk Management Process
(1) Installation commanders are encouraged to use a risk assessment tool that is
simple yet has some quantifiable logic to help in decision making. Assessment teams shall
use the methodology to determine terrorist options against specific targets and use them as
examples of protection strategies discussed in this appendix. The suggested tools each have
their strengths and weaknesses with regard to their applicability to a particular threat
situation. Use the tool most appropriate to your particular environment. As an example,
while CARVER is not specifically tailored for AT assessments, it can be adapted. Likewise,
MSHARPP is a targeting analysis tool geared more closely to assessing personnel
vulnerabilities. Assessment team members should be cognizant of potential gaps when
choosing one methodology over another. The use of the Joint Staff CVAMP shall assist
commanders and ATOs in managing their command’s vulnerabilities and associated funding
requirements.
(2) MSHARPP
(a) The purpose of the MSHARPP matrix is to analyze likely terrorist targets.
Consideration is given to the local threat, likely means of attack available to the enemy, and
variables affecting the disposition (e.g., “attractiveness” to enemy, potential psychological
effects on community) of potential targets. This section provides an example of how to use
MSHARPP.
(b) After developing a list of potential targets, use the MSHARPP selection
factors to assist in further refining your assessment by associating a weapon/tactic to a
potential target to determine the efficiency, effectiveness, and plausibility of the method of
attack and to identify vulnerabilities related to the target. After the MSHARPP values for
each target or component are assigned, the sum of the values indicates the highest value
target (for a particular mode of attack) within the limits of the enemy’s known capabilities.
(c) Mission. Mission focuses mainly on the threat to the situations, activities,
capabilities, and resources on an installation that are vulnerable to a terrorist attack. The
mission components consist of the equipment, information, facilities, and/or operations or
activities that are necessary to accomplish the installation’s mission.
E-3
Appendix E
e. FIVE. Installation cannot continue to carry out its mission until the
attacked asset is restored.
(e) History. Do terrorist groups have a history of attacking this type of target?
While you must consider terrorist trends worldwide, focus on local targeting history and
capabilities. History criteria scale:
E-4 JP 3-07.2
Risk Management Process
5. FIVE. Favored target, recent attacks within the local geographic area,
credible threat against this type of asset.
E-5
Appendix E
(i) Proximity. Is the potential target located near other personnel, facilities, or
resources that, because of their intrinsic value or “protected” status and a fear of collateral
damage, afford it some form of protection? (e.g., near national monuments,
protected/religious symbols that the enemy holds in high regard).
E-6 JP 3-07.2
Risk Management Process
(3) CARVER
a. How rapidly shall the impact of asset destruction affect the unit’s
essential functions?
E-7
Appendix E
(c) Target selection requires detailed intelligence and thorough planning, and is
based on the CARVER factors identified above. The CARVER matrix is a decision tool for
rating the relative desirability of potential targets and for wisely allocating attack resources.
Two rules of thumb apply for completing the matrix:
(d) After completing the matrix for all assets, total the scores and then rank
order those totals to prioritize vulnerabilities.
(e) The following are basic mitigation tips to address four of the six CARVER
components:
E-8 JP 3-07.2
Risk Management Process
physically or operationally; have a tested and viable COOP plan; and have a fall-back site for
conducting the same mission from another location.
(2) Once all asset values are tallied, they can be rank-ordered such that highest
score is “most critical” and lowest score is “least critical.” However, it is important to
emphasize that not all assets in the matrix shall be “essential for mission accomplishment.”
(3) It is important to note that situational changes can affect the criticality of an
asset (e.g., different phases of an operation). Also, the loss of assets with a certain capability
may increase the criticality of those remaining in an operation.
(4) Another important item to note is that the DCIP provides for the assignment of
Tier levels (1 through 3) but does not prioritize assets within these tiers. By definition, the
loss or degradation of these assets has been determined by the mission owner (frequently at
the combatant-command level) to cause mission failure or degradation at the strategic or
operational level. Thus commanders must ensure appropriate levels of protection are
provided to these assets regardless of any local criticality determination.
2. Threat Assessment
The TA system is vital for communicating terrorism threat warnings. Specific warning
information—time, date, place, those involved, and method of attack—is rarely voluntarily
provided by terrorists. Careful threat analysis is required to detect and correctly evaluate
pre-incident indicators of a terrorist attack so timely warning messages can be issued. Threat
analysis provides the intelligence officer with information upon which to base warnings.
Threat information for AT programs is diverse and includes foreign intelligence, open source
E-9
Appendix E
materials, domestic criminal information, and information from federal, state, and local
governments. A standardized format for the dynamic threat assessment (DTA) has been
promulgated by the Office of the Undersecretary of Defense, Counterintelligence and
Security that should be used when preparing local TAs. The Defense Threat Assessment
Tool, developed by the Joint Counterintelligence Training Academy provides guidance on
completing the DTA. Terrorist threat warnings for DOD use two mechanisms: IC warning
products (alerts, advisories, assessments, and memorandums) and defense terrorism warning
reports (DTWRs) and defense terrorism awareness message (DTAM). The interagency
intelligence committee on counterterrorism (IICT) is authorized to provide national-level
terrorism warnings to USG organizations and customers. An IICT alert warns of a credible,
specific, imminent terrorist threat against US personnel, facilities, or interests. Information
in an alert must be specific and credible enough to permit implementation of local security
measures. It expires in 30 days without extension. An IICT advisory warns of a credible
terrorist threat to US personnel, facilities, or interests, with information which is general in
both timing and target, or details significant trends and developments in terrorism which may
lead to an increased threat situation. It expires in 45 days but may have one extension. An
IICT assessment serves multiple functions: may disseminate warnings of credible but non-
specific threat information, or may provide in-depth analysis on a specific terrorism topic
trend or development for decision-making and policy audience as appropriate. These
assessments do not expire. An IICT memorandum is a short form assessment. The DOD
defense indications and warning system is an independent system in which DOD members at
any level may initiate unilateral threat warnings. These are the DTWR and the DTAM.
Warnings within DOD system generally stay within the system and are primarily for use by
DOD components. A DTWR addresses a terrorist group being operationally active and
specifically targeting US interests, specific, credible information of attack timing and targets,
maximum classification is SECRET/NOFORN, coordinated with the combatant commands
when time allows, signed by the J-2 and is active for 30 days with one 30 day extension. A
DTAM summarizes recent credible threat reporting concerning DOD or US interests, general
in timing and/or target information, maximum classification is SECRET/NOFORN,
coordinated with the combatant commands and signed by the J-2 with no expiration date. It
can/should be updated.
(1) Commanders down to the installation or tenant level task the appropriate
organizations under their command to gather, analyze, and disseminate terrorism threat
information or receive these services from the CI organization assigned to support them.
When organic intelligence/counterintelligence/law enforcement assets are not available,
commanders should request support from higher authority. The full range of intelligence,
CI, and LE capabilities shall be utilized in support of distinct and separate TA requirements:
annual TAs and ongoing assessment of the local threat.
E-10 JP 3-07.2
Risk Management Process
the installation or its personnel. Even in the absence of a current known threat group, an
assessment is a necessary input to the required annual VA and for planning physical and
procedural countermeasures. Annual TAs should include all likely or feasible including
WMD.
(a) Threat Levels. Threat levels are determined based on the presence of a
combination of factors. Terrorist threat levels do not address when a terrorist attack
will occur and do not specify a FPCON status. Issuance of a terrorist threat level
judgment is not a warning notice. Formal terrorism warning notices are issued separately.
There are four terrorist threat levels:
(3) Threat Matrix. Although not required, one tool that may assist in the
preparation of the TA and AT plan is the threat matrix. Preparation of the annual TA
requires careful analysis of known local threats, together with estimates of relevant national
and transnational threat capabilities. Locally derived, open-source information regarding the
availability of weapons and component materials in the area is also necessary in developing
the range of threats. Threat analysts preparing the assessment should differentiate threats
likely to be used inside the perimeter from those more likely to be used outside the perimeter
to aid in the VA and development of countermeasures. The threat matrix unambiguously
establishes the range of specific threat capabilities that shall be used to analyze
vulnerabilities and plan countermeasures. The threat matrix is a planning tool which ensures
that security and procedural countermeasures are economically designed to counter specific
threats or mitigate specific vulnerabilities, and that the risk remaining is well understood by
commanders making risk acceptance decisions.
(4) Both installation and unit commanders shall assess the terrorist threat for
probability and severity of occurrence (capability and intent). Probability is the estimate of
the likelihood that a threat shall cause an impact on the mission or a hazard to the
installation. Severity is an estimate of the threat in terms of the degree of injury, property
damage, or other mission-impairing factors. By combining estimates of severity and
probability, an assessment of risk can be made for each threat. A matrix may be used to
assist in identifying the level of risk. The outcome of this process is a prioritized list of
threats. The highest priority threat is the one that poses the most serious risk (capability and
E-11
Appendix E
intent) in terms of likelihood and severity. This list of prioritized threats shall be used to
evaluate the acceptability of certain risks and which risks for which to make decisions
concerning the employment of resources and other actions that reduce vulnerability. This
assessment should be recorded as a record/baseline and updated regularly as the threat
changes. Services and combatant commanders may develop separate, more complete
methodologies for assessment. If installation and unit commanders do not have the resources
to assess the threat for probability and severity of occurrence, they should coordinate with
their next higher echelon to assist with this requirement.
3. Vulnerability Assessment
E-12 JP 3-07.2
Risk Management Process
a. Assessing Vulnerability
E-13
Appendix E
(3) The DOD VA Benchmarks are another excellent tool available for local (base)
VAs. This is a comprehensive benchmark that is directly linked to DODI 2000.16, DOD
Antiterrorism Standards, and produces a product similar to a JSIVA. Other resources can
assist commanders in AT planning and risk management and can be accessed on ATEP on
Army Knowledge Online/Defense Knowledge Online.
E-14 JP 3-07.2
Risk Management Process
(b) Registration for CVAMP is initiated from a link on CVAMP’s Login Page
that is accessible via the SECRET Internet Protocol Router Network (SIPRNET). The
registrant must have a valid SIPRNET email address in order to successfully register for
CVAMP. During the registration process, system administrators in the registrant’s chain-of-
command are notified of the registration request. The system administrators grant access to
CVAMP and assign CVAMP roles and functions to users based on their needs/requirements.
To allow for flexibility, administrators can assign multiple roles to a user. Each role sets
specific user permissions within the system. Besides SIPRNET access, minimal additional
equipment is required to use CVAMP. System operation is hierarchical and process driven,
and incorporates drop-down menus that assist data entry (e.g., create, review, modify) and
program administration. Initial CVAMP-related roles and their permissions are:
E-15
Appendix E
4. Risk Assessment
(1) The RA is a logical, step-by-step method, and shall require the participation of
the entire staff. In starting the RA process, commanders should examine three elements:
threat, criticality, and vulnerability.
(a) Threat. The threat is determined through a proper and thorough TA. The
TA should identify the likelihood and severity of the terrorist to inflict injury to a person or
damage to a facility or asset by considering terrorist capability, intent, and objectives. To
enable commanders to focus their analysis, the TA should also specify the type of weapon(s)
or act(s) the terrorist shall use to initiate the event (assassination, bomb, etc.).
(b) Asset Criticality. Critical assets are determined by both the term and the
measure of importance to the installation’s mission. Areas that encompass multiple critical
assets are referred to as critical areas. The criticality assessment provides information to
prioritize assets and allocate resources to special protective actions.
(2) During the RA process, the commander must consider all of the aforementioned
elements to make well-informed decisions when planning FPCON measure implementation
and terrorist incident response measures. The RA and management process described here
does not dictate how to conduct the assessment, nor does it discuss how to identify
deficiencies and vulnerabilities. It outlines what type of information to collect and how to
organize and display that information for decision making. If the installation does not have
the resident expertise to conduct an AT RA, consider using a JSIVA, and/or combatant
commander or Service AT assessment reports. Vulnerabilities and deficiencies gathered
from these useful reports can be plugged directly into the methodology outlined in this
appendix.
E-16 JP 3-07.2
Risk Management Process
respond should a terrorist incident occur (response measures). Risk management is the
process of identifying, assessing, and controlling risks arising from operational factors and
making decisions that balance risk costs with mission benefits. The risk management
process allows installation commanders to use representative (operational) risk as one of the
principal factors in their decision-making process. In this context, representative risk shows
the relative impact on an installation’s assets, given a stated attack. Representative risk is
NOT a prediction that a terrorist incident shall occur.
(4) The example below shall focus on vulnerabilities of critical assets. This same
methodology can be applied to other areas of interest such as response capability. It is also
important to emphasize that this methodology is merely a tool to assist commanders and
civilian equivalents in assessing and managing risk.
(1) This example presumes that a commander has completed the threat, criticality,
and VAs. The process begins by creating an asset RA table. In addition to isolated assets,
areas can be assessed in terms of the criticality of the assets located within it and its
vulnerability to specific threats. The installation assessment team shall rate each asset for
every type of threat identified in the TA.
(a) Attack Means. Method by which the asset would be attacked. Different
groups may present several different attack methods based on what weapons they possess
and the methods they use. Sample attack means include small arms fire, car/truck bomb,
CBRN weapons, etc. Use the information from Chapter V, “Antiterrorism Programs.”
E-17
Appendix E
necessary to carry out the mission, criticality is a 9 out of 10. The vulnerability is a 1 from
small arms fire because small arms are unlikely to penetrate 12 inches of concrete and no
windows exist to shoot into. The vulnerability from a car/truck bomb is higher because there
is no traffic flow control around the building. The CBRN attack means are both high
vulnerabilities because the ventilation system is unfiltered.
(4) It is important to note that this rating system is not meant to be a precise
science. It is one method of quantifying a subjective decision in order to generally prioritize
areas in terms of risk.
c. Risk Assessment
(1) Figure E-1 gives the final RA for each asset. The assets can be prioritized
based on the RA. The decision maker is required to determine the maximum amount of risk
that is acceptable.
(2) The risk can also be represented graphically using the RA graph, Figure E-3.
The graph shall combine the Criticality/Vulnerability/Attack Means (the x-axis) and the
Threat Probability (the y-axis) to represent the risk. The representative risk is an expression
of the relative impact on an asset or a planning and response element, given a stated attack
means. Representative risk does NOT attempt to forecast risk (e.g., assign predictability or
likelihood).
(3) No standard methodology exists for establishing risk levels and their
determination shall vary from installation to installation, based on the commander’s
judgment. Although this process is subjective, commanders can focus their decision on
where to establish the minimum risk by considering the following questions:
(b) What resources are available for AT activities on the installation? (VA)
(c) Where are the nearest available resources that could augment the
installation, should an incident occur? Does the commander have tasking authority for those
resources? (VA)
(1) The end products of the above process shall be the identification of areas and
assets that present the most risk to the identified attack means and the development of
associated assessment tables. From the information developed from all assessments
(criticality, threat, vulnerability, and risk and the RA graph), the commander shall make a
decision on how best to employ given resources and force protection measures to deter,
mitigate, or prepare for a terrorist incident. Installation commanders should document their
risk management methodology.
E-18 JP 3-07.2
Risk Management Process
*SAF
*C/TB
*CBRN
1
1 100
Criticality and Vulnerablity (C x V)
LEGEND
C/TB car/truck bomb SAF small arms fire
CBRN chemical, biological, radiological, and
nuclear weapons
(2) There are several ways to reduce risk. The decision maker does not easily
control two of those methods, reducing the threat and reducing the criticality. The one
method that is controllable is reducing the vulnerability of an asset.
(3) Looking at the above example and considering only the command post, it is
apparent that the highest risk is from a car/truck bomb. What are some ways of reducing the
vulnerability?
(a) Set up barriers to control traffic flow around the command post. The
further away a prospective car/truck bomb detonation, the less impact it will have on the
intended target. Another alternative is to control the traffic coming onto the installation. If
several buildings exist that require protection from car/truck bombs, then cars and trucks can
E-19
Appendix E
be searched more thoroughly at the entrance to the facility. If bombs aren’t allowed to enter
the facility, then the risk is greatly reduced.
(b) Determine why it takes several hours to place the redundant command post
in full operation. This may only require a simple policy change or pre-positioning of
equipment, but the result shall be less vulnerability due to redundancy.
(4) At the end of the RA and risk management process the commander must engage
and concur with the entire assessment in order to focus the next steps in risk management
process (taking action).
(5) CVAMP shall be employed to recover vulnerability and risk assessment data
and related resource requirements or requests.
e. Intelligence. (The person, staff, or unit responsible for intelligence collection and
dissemination. The installation commander must have a system in place to access current
intelligence. This can be included in Annex B [Intelligence].) (National-level agencies,
combatant commands, and Service intelligence elements provide theater or country threat
levels and threat assessments. In the US and its territories, local installations must obtain the
local terrorist threat information by querying the FBI through the installation’s law
enforcement liaison, local law enforcement, or other federal agencies.) Obtain these
assessments, as they will serve as a baseline for the installation’s tailored assessment. The
installation should have a process in place for developing the installation’s tailored threat
assessment or “local threat picture.” The installation’s tailored threat assessment should be
continuously evaluated, updated, and disseminated, as appropriate, and as directed by the
installation commander. The commander should determine the frequency and the means of
dissemination of the installation’s tailored AT product. Note: Commanders cannot change
the threat level, which are established by DIA, but the GCC may set terrorism threat levels
for specific personnel, family members, units, installations, or geographic regions in
countries within the AOR, using the definition and criteria established by DIA.
E-20 JP 3-07.2
APPENDIX F
REFERENCES
1. General
b. Presidential Military Order of November 13, 2001, Detention, Treatment, and Trial
of Certain Non-Citizens in the War Against Terrorism.
c. Public Law 107–314—Dec. 2, 2002, Bob Stump National Defense Authorization Act
for Fiscal Year 2003.
i. National Strategy for the Physical Protection of Critical Infrastructure and Key
Assets, February 2003.
j. National Military Strategic Plan for the War on Terrorism, February 2006.
p. Laura Clark and William E. Algaier, Surveillance Detection: The Art of Prevention,
(St. Louis: Cradle Press, 2007).
F-1
Appendix F
q. Col Shannon D. Jurrens, USAF, “Slashing the Enemy’s Achilles Heel: Using
Surveillance Detection to Prevent Terrorist Attacks,” The Guardian, Winter 2010, Volume
12, Issue 3.
2. DOD Publications
F-2 JP 3-07.2
References
3. CJSC Publications
a. CJCSI 3121.01B, Standing Rules of Engagement/Standing Rules for the Use of Force
for US Forces.
f. Chairman of the Joint Chiefs of Staff Manual 3122.03B Joint Operation Planning
and Execution System Volume II, Planning Formats.
F-3
Appendix F
u. JP 3-26, Counterterrorism.
F-4 JP 3-07.2
APPENDIX G
ADMINISTRATIVE INSTRUCTIONS
1. User Comments
Users in the field are highly encouraged to submit comments on this publication to:
Commander, United States Joint Forces Command, Joint Warfighting Center, ATTN:
Doctrine and Education Group, 116 Lake View Parkway, Suffolk, VA 23435-2697. These
comments should address content (accuracy, usefulness, consistency, and organization),
writing, and appearance.
2. Authorship
The lead agent and Joint Staff doctrine sponsor for this publication is the Director for
Operations (J-3).
3. Supersession
4. Change Recommendations
b. When a Joint Staff directorate submits a proposal to the Chairman of the Joint Chiefs
of Staff that would change source document information reflected in this publication, that
directorate will include a proposed change to this publication as an enclosure to its proposal.
The Military Services and other organizations are requested to notify the Joint Staff/J-7 when
changes to source documents reflected in this publication are initiated.
c. Record of Changes:
G-1
Appendix G
5. Distribution of Publications
a. The Joint Staff will not print copies of electronic joint publications for distribution.
Electronic versions are available at www.dtic.mil/doctrine (NIPRNET), or
http://nmcc20a.nmcc.smil.mil/dj9j7ead/doctrine/ (SIPRNET).
b. Only approved joint publications and joint test publications are releasable outside the
combatant commands, Services, and Joint Staff. Release of any classified joint publication
to foreign governments or foreign nationals must be requested through the local embassy
(Defense Attaché Office) to DIA, Defense Foreign Liaison/IE-3, 200 MacDill Blvd., Bolling
AFB, Washington, DC 20340-5100.
c. CD-ROM. Upon request of a JDDC member, the Joint Staff J-7 will produce and
deliver one CD-ROM with current joint publications.
G-2 JP 3-07.2
GLOSSARY
PART I—ABBREVIATIONS AND ACRONYMS
GL-1
Glossary
IC intelligence community
IICT Interagency Intelligence Committee on Counterterrorism
ICS incident command system
IED improvised explosive device
IO information operations
IPB intelligence preparation of the battlespace
IR information requirement
IRA Provisional Irish Republican Army
ISR intelligence, surveillance, and reconnaissance
GL-2 JP 3-07.2
Glossary
LE law enforcement
PA public affairs
PAO public affairs officer
PIR priority intelligence requirement
PPBE Planning, Programming, Budgeting, and Execution
GL-3
Glossary
TA threat assessment
TACON tactical control
TTP tactics, techniques, and procedures
VA vulnerability assessment
VBIED vehicle-borne improvised explosive device
GL-4 JP 3-07.2
PART II—TERMS AND DEFINITIONS
Unless otherwise annotated, this publication is the proponent for all terms and definitions
found in the glossary. Upon approval, JP 1-02, Department of Defense Dictionary of
Military and Associated Terms, will reflect this publication as the source document for these
terms and definitions.
advance guard. Detachment sent ahead of the main force to ensure its uninterrupted advance;
to protect the main body against surprise; to facilitate the advance by removing obstacles
and repairing roads and bridges; and to cover the deployment of the main body if it is
committed to action. (Approved for incorporation into JP 1-02 with JP 3-07.2 as the
source JP.)
antiterrorism. Defensive measures used to reduce the vulnerability of individuals and property
to terrorist acts, to include rapid containment by local military and civilian forces. Also
called AT. (Approved for incorporation into JP 1-02.)
counterterrorism. Actions taken directly against terrorist networks and indirectly to influence
and render global and regional environments inhospitable to terrorist networks. Also
called CT. (JP 1-02. SOURCE: JP 3-26)
critical asset. A specific entity that is of such extraordinary importance that its incapacitation
or destruction would have a very serious, debilitating effect on the ability of a nation to
continue to function effectively. (JP 1-02. SOURCE: JP 3-07.2)
criticality assessment. An assessment that identifies key assets and infrastructure that support
Department of Defense missions, units, or activities and are deemed mission critical by
military commanders or civilian agency managers. It addresses the impact of temporary or
permanent loss of key assets or infrastructures to the installation or a unit’s ability to
perform its mission. It examines costs of recovery and reconstitution including time,
dollars, capability, and infrastructure support. (JP 1-02. SOURCE: JP 3-07.2)
design basis threat. The threat against which an asset must be protected and upon which the
protective system’s design is based. It is the baseline type and size of threat that buildings
or other structures are designed to withstand. The design basis threat includes the tactics
GL-5
Glossary
aggressors will use against the asset and the tools, weapons, and explosives employed in
these tactics. Also called DBT. (JP 1-02. SOURCE: JP 3-07.2)
force protection. Preventive measures taken to mitigate hostile actions against Department of
Defense personnel (to include family members), resources, facilities, and critical
information. Force protection does not include actions to defeat the enemy or protect
against accidents, weather, or disease. Also called FP. (JP 1-02. SOURCE: JP 3-0)
force protection condition. A Chairman of the Joint Chiefs of Staff-approved standard for
identification of and recommended responses to terrorist threats against US personnel and
facilities. Also called FPCON. (Approved for incorporation into JP 1-02.)
high-risk personnel. Personnel who, by their grade, assignment, symbolic value, or relative
isolation, are likely to be attractive or accessible terrorist targets. Also called HRP.
(JP 1-02. SOURCE: JP 3-07.2)
initial response force. The first unit, usually military police, on the scene of a terrorist
incident. (JP 1-02. SOURCE: JP 3-07.2)
insurgency. The organized use of subversion and violence by a group or movement that seeks
to overthrow or force change of a governing authority. Insurgency can also refer to the
group itself. (JP 1-02. SOURCE: JP 3-24)
operations center. The facility or location on an installation, base, or facility used by the
commander to command, control, and coordinate all operational activities. Also called
OC. (JP 1-02. SOURCE: JP 3-07.2)
GL-6 JP 3-07.2
Glossary
prevention. In space usage, measures to preclude an adversary's hostile use of United States or
third-party space systems and services. Prevention can include diplomatic, economic, and
political measures. (Approved for incorporation into JP 1-02 with JP 3-14 as the source
JP.)
risk assessment. The identification and assessment of hazards (first two steps of risk
management process). Also called RA. (Approved for incorporation into JP 1-02 with JP
3-07.2 as the source JP.)
risk management. The process of identifying, assessing, and controlling risks arising from
operational factors and making decisions that balance risk cost with mission benefits. Also
called RM. (JP 1-02. SOURCE: JP 2-0)
terrorism. The unlawful use of violence or threat of violence to instill fear and coerce
governments or societies. Terrorism is often motivated by religious, political, or other
ideological beliefs and committed in the pursuit of goals that are usually political.
(Approved for incorporation into JP 1-02.)
GL-7
Glossary
terrorist threat level. An intelligence threat assessment of the level of terrorist threat faced by
US personnel and interests in a foreign country. The assessment is based on a continuous
intelligence analysis of a minimum of five elements: terrorist group existence, capability,
history, trends, and targeting. There are four threat levels: LOW, MODERATE,
SIGNIFICANT, and HIGH. Threat levels should not be confused with force protection
conditions. Threat level assessments are provided to senior leaders to assist them in
determining the appropriate local force protection condition. (The Department of State
also makes threat assessments, which may differ from those determined by Department of
Defense.) (Approved for incorporation into JP 1-02.)
threat analysis. In antiterrorism, a continual process of compiling and examining all available
information concerning potential terrorist activities by terrorist groups which could target a
facility. A threat analysis will review the factors of a terrorist group’s existence, capability,
intentions, history, and targeting, as well as the security environment within which friendly
forces operate. Threat analysis is an essential step in identifying probability of terrorist
attack and results in a threat assessment. (JP 1-02. SOURCE: JP 3-07.2)
threat assessment. In antiterrorism, examining the capabilities, intentions, and activities, past
and present, of terrorist organizations as well as the security environment within which
friendly forces operate to determine the level of threat. Also called TA. (Approved for
inclusion in JP 1-02.)
threat and vulnerability assessment. In antiterrorism, the pairing of a facility’s threat analysis
and vulnerability analysis. (JP 1-02. SOURCE: JP 3-07.2)
GL-8 JP 3-07.2
JOINT DOCTRINE PUBLICATIONS HIERARCHY
JP 1
JOINT
DOCTRINE
All joint publications are organized into a comprehensive hierarchy as shown in the chart above. Joint Publication
(JP) 3-07.2 is in the Operations series of joint doctrine publications. The diagram below illustrates an overview of
the development process:
ENHANCED
JOINT JOINT
WARFIGHTING DOCTRINE
CAPABILITY PUBLICATION
Approval Development