5. Sabotage Terrorist groups may use various
sabotage methods to harass and demoralize
personnel. Some of those methods include fires,
explosive devices, mechanical devices, chemicals,
psychological abuse, and unauthorized entries into
computers.
TERRORIST THREAT TYPES
Terrorist threats are divided into the following
six categories:
1. Threat Type One. One or more outsiders
(nongovernment persons) who seek access to a
base or restricted area or asset to perform an
unauthorized act such as vandalism or theft
2. Threat Type Two. An individual or group,
authorized access to a base or restricted area or
asset, seeking to steal or remove an item of
government property from the installation
3. Threat Type Three. A disgruntled
employee seeking to perform an act of sabotage,
data tampering, or wrongful destruction or other-
wise destroy government property or impair
mission accomplishment
4. Threat Type Four. An individual (outsider)
or group seeking to make a political statement
(antimilitary, antidefense, antinuclear, and so
forth) by causing adverse publicity, usually
nonviolent in nature, to embarrass the military
service
5. Threat Type Five. An individual (outsider)
terrorist, in philosophy and action, seeking access
to a naval installation to commit an act of violence
(sabotage, bombing, hostage abduction, murder,
arson, or theft of sensitive matter including
nuclear weapons, conventional arms, ammunition
and explosives, and so forth)
6. Threat Type Six. A 2-to-12 person group
of well-armed, well-trained dedicated terrorists
seeking access to a naval installation to commit
an act of violence (sabotage, bombing, hostage
abduction, murder, arson, or theft of sensitive
matter including nuclear weapons, conventional
arms, ammunition, explosives, and so forth)
Commanding officers must have contingency
plans to counter the six threat types. The following
table summarizes the more sensitive areas and
the threat types that must be included in a
commanding officers contingency plan.
Under Normal Conditions
Commanding Officers Must
Have Ability To Counter
AREAS
Bases
Shipyards
Aviation (as an example,
flight lines)
Waterfronts
Nuclear Weapons
Storage
Communications
Facilities
Intelligence
Collection/Sensitive
Communication Sites
Conventional Arms,
Ammunition and Ex-
plosives Storage Sites
Bulk Petroleum, Oil,
and Lubricants (POL)
(ground fuels, POL
war reserve, etc. )
Nuclear Weapons
Conventional Munitions
Small Arms (Armories)
Supply items
Funds and Negotiable
instruments
Drugs, Drug Abuse
Items
Precious Metals
Classified Information/
Material
Automatic Data Pro-
cessing (ADP) Facilities
Aviation
1
1
1
1
1
1
1
Treat- Types
2
3
4
5
6
2
3
4
5
2
3
4
5
2
3
4
5
2
3
4
5
6
2
3
4
5
2
3
4
5
2
3
4
5
6
2
3
4
5
2
3
4
5
6
2
3
4
5
2
3
4
5
2
3
4
5
2
3
2
3
4
2
3
2
3
4
2
3
4
2
3
4
5
THREAT CONDITIONS
Indications and warnings of terrorist activity
against naval installations and personnel will
8-2
1
1
1
1
1
1
1
1
1
1
1