Marine Corps Infantry Officer Course

Force Protection and Antiterrorism

Student Handout

Purpose. The intent of this class is to provide a framework and knowledge base to develop and employ security measures to protect your force against terrorists and other aggressors.

1. Definitions

a. Force protection. A security program designed to protect Marines, civilian employees, family members, and facilities and equipment in all locations and situations. This process is accomplished through planning and integrated application of combating terrorism, physical security, operations security, and personal protective services. The force protection plan must be developed concurrently with the commander's estimate process.

b. Antiterrorism. Measures that installations, units, and individuals take to reduce the probability of their falling victim to a terrorist act. These operations include collecting and disseminating timely threat information, conducting terrorism-awareness training, and implementing defensive measures. Protective plans and procedures must reflect the specific threat in the area of operation. A reasonable balance between desired protection, mission requirements, and availability of resources must be achieved.

2. Threat. There are essentially four categories of unconventional threats that one must understand and plan against; specifically during operations other than war. Marines historically expend substantial effort defending their positions against an attack from conventional forces, but not against unconventional threats. This is a vulnerability that has often been exploited by our enemies. We must be prepared to operate simultaneously across the spectrum of conflict. (FM 5-114)

a. Protesters. Categorized as either vandals, activists, or extremists. Protesters are politically or issue oriented, and act out of frustration, discontent, or anger. Their primary objectives include destroying material and property and gaining publicity. Vandals and activists are unsophisticated and cause relatively superficial damage. Extremist groups are moderately sophisticated and tend to cause more destruction to property and material.

b. Terrorists. Organized groups that use terrorism in a systematic manner to achieve its goals are classified as terrorists. They are oriented on an ideology, a political cause, or an issue. Terrorists are sophisticated and possess an efficient planning capability. Terrorism and terrorists are covered in greater detail in B0213 (Introduction to Terrorism) and B0216 (Combating Terrorism).

c. Subversives. Classified into two groups: saboteurs and spies. Saboteurs include guerrillas, commandos and other unconventional forces. They can range from unskilled fighters to highly sophisticated and skilled personnel that employ meticulous planning. They often target mission critical personnel, equipment, or operations. Spies can range from unskilled observers to highly skilled agents. They target military information and attempt to avoid detection. In some cases they use the activities of other groups to remain covert.

d. Criminals. Criminals range from unsophisticated to organized criminal groups. They are usually interested in targets that pose little risk. Some criminals are highly skilled in the use of weapons and tools to target high value items or large quantities of supplies. Targets of organized criminal groups can involve large quantities of money, drugs, arms, ammunition, explosives, and/or equipment.

3. Common Techniques. Threat personnel and groups employ a wide range of techniques to achieve their objectives. The following description is a list of frequently used techniques that will assist planners in developing force protection plans.

a. Moving vehicle bomb. The moving vehicle bomb is a suicidal attack where an explosive-laden vehicle is driven into a facility or area and detonated. The goal is to damage or destroy a facility and to kill personnel.

b. Stationary vehicle bomb. This type of bomb can be detonated by time delay or command detonated. There are several employment methods: the vehicle(s) is driven to a preselected location and abandoned; the explosive device placed in unsuspecting person's car; or someone is coerced into delivering a vehicle bomb. The objective is the same as the moving vehicle bomb.

c. Exterior attack. Attack at close range using clubs, rocks, improvised incendiary devices, hand grenades or hand placed bombs. The goal is to inflict destruction and to kill personnel.

d. Standoff attack. Used to damage a facility or equipment, and injure and kill personnel. Attacks may include the use of military or improvised direct fire weapons, such as antitank weapons and mortars.

e. Ballistic attack. Used to kill or injure personnel using small arms at varying distances (e.g., snipers).

f. Forced entry. Used to steal or destroy assets, compromise information, or disrupt operations. Using small arms and explosive devices, the aggressors enter through existing entrances or create their own.

g. Covert entry and insider compromise. Similar objective as the forced entry, but makes a covert entry by using false credentials or coercing a worker with legitimate access to gain entry to the area.

h. Visual surveillance. Used by an enemy employing ocular and photographic devices to monitor and record information about the facility, unit, and personnel activities.

i. Electronic/acoustical eavesdropping. An enemy monitors electronic activities from computers, communications, and related equipment. Uses listening devices to monitor activities and/or by close proximity listens to conversations and activities to gain information.

j. Mail bomb. Used to kill or injure personnel. Small bombs or incendiary devices are incorporated into packages or supplies delivered to the targeted individual or facility.

k. Waterborne contamination. Used by an enemy to kill a large quantity of personnel. Chemical, biological, or other agents are used to contaminate the water supply.

4. Common Weapons. Threat forces and personnel use various weapons, explosives, and tools to attain their goals. Listed below are common weapons used by potential unconventional threat forces.

a. Incendiary devices
b. Firearms
c. Antitank guided missiles (ATGM)/mortars
d. Biological and chemical agents
e. Improvised explosive device (IED)
f. Hand grenades
g. Rocks, bricks, clubs, knives, machetes, etc.

5. Planning Considerations. Balance the attack probability, the consequences of inadequate protection, and the risk level. You have an obligation to protect US forces and equipment. You must also establish priority of protection to local assets, infrastructure, and the local populace. Planning considerations are listed below:

a. Define the threat and attack probability. {This must be a continuous process}

b. Constraints and restrictions. Evaluate these in relation to rules of engagement (ROE) and host nation requirements.

c. Protection required. Determine levels of protection against different types of attack.

d. Assets available. Evaluate assets available to construct and develop protective devices and plans.

e. Counter threats. Design protective measures to counter likely threat techniques.

6. Personal Protective Measures. Keep potential threat forces or personnel off balance; do not set up identifiable routines. Examples: patrol times, guard post/relief, check point locations, etc. Establish an information collection plan that is continuous in order to meet the changing threat environment and to provide sufficient time to establish counter measures.

a. Do not stand out as an obvious leader; be inconspicuous.

b. Control access to key personnel areas.

c. Escort visitors.

d. Be situationally aware (SA); assume you are under surveillance.

e. Know location of personnel at all times.

7. Operational Security Measures

a. Limit access to operational plans to essential personnel.

b. Guard all information, such as personnel and unit locations, strengths, activities against compromise.

c. Control access to critical areas to only those personnel on a need-to-know basis.

d. Control and account for all operational materials such as orders, maps, overlays, and plans.

e. Adhere to strict access and accountability procedures.

8. Physical Security Measures

a. Passive security measures

(1) Establish a counter surveillance plan.

(2) Physically control access to vital areas.

(3) Illuminate approaches to area or maximize use of NVDs.

(4) Randomly change activities in order to avoid a routine.

(5) Reduce potential weapons effectiveness by hardening positions. Construct protective screens.

b. Active security measures

(1) Compliment passive measures with foot and mobile patrols to enforce regulations such as curfews, and to control access to restricted areas.

(2) Conduct personnel and vehicle checkpoints.

(3) Apprehend any insurgent or suspicious personnel.

(4) Conduct search and seizure of suspected buildings, vehicles, and personnel.

(5) Establish a reaction force to deal with rapidly changing situations.

9. Summary. The commander has a responsibility to protect his force against conventional and unconventional threats. This class outlines measures that can be established to protect or reduce the effectiveness against an unconventional attack. We must be capable of operating across the full spectrum of conflict without losing focus on our mission.

The MOUT Homepage Hot Links:

HOMECONCEPTSDOCTRINE
OPERATIONS 1OPERATIONS 2 TECHNOLOGY
COMMERCIALRESEARCHISSUES
BOOKSTORE SIGN GUESTBOOK VIEW GUESTBOOK
UNITS/IMAGESDEDICATIONE-MAIL

Visitor since 23 February 1998

This page hosted by Get your own Free Home Page