CHAPTER 8SECURITY REQUIREMENTSLEARNING OBJECTIVESUpon completion of this chapter, you should be able to do the following:1. List the different types of terrorism methods.3. Explain various types of safeguards againstterrorism.2. List the six categories of terrorist threats.Terrorism is the use of tactics by smallgroups to create overwhelming fear, panic, orterror through the use of deadly force. Actsof terrorism are usually directed against specificor general targets in the general populationand government. Generally, the goal of terroristicacts is to disrupt or destroy the bonds of trustand credibility between a government and itspeople. Sometimes the goals are to discreditor damage a group to achieve specific politicalaims.Terrorism throughout the world is increasingeach year. In 1980, the Federal Bureau ofInvestigation (FBI) classified terrorism as itsthird-ranking domestic bureau priority. Actsof terrorism directed at naval activities orinstallations have the potential to destroycritical facilities and to injure or kill keypersonnel. They can also impair or delay missionaccomplishment or cause incalculable damagepolitically through adverse publicity and publicperceptions.The complexity of terrorism requires that you,as a second class petty officer, have a goodunderstanding of terrorism. You must have theknowledge needed to protect yourself and to trainyour subordinates to protect themselves. Thischapter will provide you with information onterrorism methods, threat conditions, andsafeguards against terrorism.TERRORISM METHODSThe record of terrorist activities directed atmilitary activities in the past shows that terroristsmight use the following methods:1. Bombing —Bombing may be used todestroy equipment, cause fires, create casualties,and so forth. The bombs used may be of anydegree of sophistication. Depending on bomb sizeand placement, the impact may range from aminor to a major crisis.2. Ambush—Rapid ambush attacks are usedby individuals or small groups to assassinateindividuals, eliminate groups of naval personnel,or destroy or steal assets in remote locations.3. Armed Attack —An armed attack, usuallywith one or more diversionary actions, is carriedout by small groups against key personnel orcritical assets on an installation. The objective isto disrupt the mission of the installation and tocreate adverse publicity. Normally, terroristsinvolved in this type of action take hostages onlyif their attackers try to prevent their escape.4. Hostage Seizures —A terrorist group mayseize a specific hostage or a number of hostagesfor ransom, media attention, coercion, or politicalbargaining purposes. The group may make anarmed attack to seize critical assets (ships,submarines, aircraft, and so forth) manned withpersonnel. The terrorist group can then use theassets and personnel as leverage to bargain forpublicity and political advantage.8-1
Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business