Site hosted by Angelfire.com: Build your free website today!

TERRORISM 101

BACK TO THE BASICS

(or how to protect yourself and your family)

 

 

 

PREFACE

Events such as the bombing of the Air Force barracks in Dhahran and the pipe bombing at the Summer Olympics all bring home the fact that as Americans we are always at risk of being the target of terrorists at home and abroad. In light of this, the Air Intelligence Agency Security Office developed this handbook to assist you in understanding the terrorist threat and countermeasures you can take to minimize the threat.

The contents of this publication come from a variety of DoD sources. It is designed for you to carry with you and refer to as needed. This handbook provides guidance to help reduce your chances of becoming a target or the victim of terrorist actions. It outlines defensive countermeasures that can be used in the office, at home, or while traveling. We have provided guidance on survival techniques to be employed in terrorist-hostage situations.

 

 

 

CHAPTER ONE

TERRORISM 101: BACK TO THE BASICS

 

1-1. SOME BASIC DEFINITIONS:

TERRORISM: "The unlawful use of or threat of violence against individuals or property to coerce or intimidate governments or societies to achieve political, religious, or ideological objectives."

ANTITERRORISM: Includes those defensive measures that installations, units, and individuals take to reduce their vulnerability to terrorist attacks. Measures include personal awareness and personal protection techniques, crime prevention, and physical security programs to "harden" potential targets.

COUNTERTERRORISM: Counterterrorism includes the full range of offensive measures to prevent, deter, and respond to terrorism. Counterterrorism measures such as preemption, intervention, or retaliation with specialized forces operate under the direction of National Command Authorities (NCA).

 

1-2. THE THREAT:

Understanding terrorism requires an appreciation of the emotional impact that terrorist acts have on the terrorist target audience--people other that just the victims. The audience must know of the act in order to respond to it; therefore media coverage is imperative to terrorists wishing to excite public fear or to gain attention for their cause. The terrorist chooses his/her tactics based on their desire for attention.

The role that the terrorist group perceives itself as playing also determines its choice of tactics and selection of targets. Terrorism can be an element of an insurgency or revolutionary effort when employed with other military and political activities designed to gain autonomy or to replace the existing political system. Some political traditions that are violence-prone include the practice of terrorism as a standard technique to influence political behavior. Finally, terrorism can be a mere gesture used in isolation from any meaningful political effort. Terrorists frequently claim affiliation with some vague cause or obscure political philosophy to give their actions a veil of respectability.

A terrorist group's selection of targets and tactics is also influenced by its governmental affiliation. For years, security forces categorized terrorist groups according to their operational traditions--national, transnational, and international. Ease of international travel and the growing tendency toward cooperative efforts among terrorist groups have rendered these categories obsolete. Today, terrorist groups are categorized by government affiliation to help security planners anticipate terrorist targets and their sophistication of intelligence and weaponry. The three general terrorist group categories that have gained acceptance are:

NONSTATE SUPPORTED: A terrorist group that operates autonomously, receiving no significant support from any government. Italy's Red Brigades and the Basque Euskadi ta Askatasuna (ETA) are examples of nonstate supported groups.

STATE SUPPORTED: A terrorist group that generally operates independently, but receives support from one or more governments. The Popular Front for the Liberation of Palestine is just one example of a state sponsored terrorist group. Support may include training, sanctuaries, supplies, intelligence, and direct financial aid.

STATE DIRECTED: This terrorist group operates as an agent of the government. It receives intelligence, logistics, and operational support from that government. Libya, Iran, Iraq, and North Korea have been publicly identified as states that have furnished leadership and direction to terrorist groups. Libyan "hit teams" targeted against Libyan exiles are an example of state directed terrorist groups.

 

1-3. TERRORIST OBJECTIVES:

When terrorist strike, they do not usually do it for fun; they have a purpose in mind. Terrorist events can be categorized by their purpose or immediate objectives. Joint doctrine recognizes five types of terrorist objectives:

- Recognition - Provocation
- Coercion - Insurgency support
- Intimidation

Terrorists may pursue one, some, or all of these objectives. The terrorist organization may establish its objectives and strategy or the government supporting the terrorist organization may dictate them. In either case, the military planner must identify these objectives and strategies in order to defeat the terrorist organization and prevent it from attaining its goals.

Recognition

At the outset of a terrorist campaign, the objective of terrorist acts may be national or international recognition of a cause. The reasons for seeking recognition might also include attracting recruits, obtaining funds, or demonstrating strength.

Groups seeking recognition require events that have a high probability of attracting media attention. Specific incidents include the hijacking of an aircraft, the kidnapping of prominent people, the seizing of occupied buildings, or other hostage barricade situations. Once they gain attention, the terrorists may demand that political statements be disseminated.

Terrorist groups sometime use organizational names or labels designed to imply legitimacy or widespread support. For example, a tiny isolated group may use "front," "army," or "brigade" in its name to achieve this effect.

Coercion

Coercion is the attempt to force a desired behavior by individuals, groups, or governments. This objective calls for a strategy of very selective targeting that may rely on publicly announced bombings, destruction of property, and other acts that are initially less violent than the taking of human life. Contemporary examples include the bombing of corporate headquarters and banking facilities with little or no loss of life.

Intimidation

Intimidation differs from coercion. Intimidation attempts to prevent individuals or groups from acting; coercion attempts to force actions. Terrorists may use intimidation to reduce the effectiveness of security forces by making them afraid to act. Intimidation can discourage competent citizens from seeking or accepting positions within the government. The threat of violence can also keep the general public from taking part in important political activities such as voting. As in the case of coercion, terrorists use a strategy of selective targeting although they may intend the targets to look as though they were chosen indiscriminately.

Provocation

The specific objective of terrorist acts in this category is to provoke overreaction on the part of government forces. The strategy normally calls for attacking targets symbolic of the government (for example, the police, the military, and other officials). Attacks of this type demonstrate vulnerability to terrorist acts and contribute to a loss of confidence in the government's ability to provide security. More importantly, if the security forces resort to a heavy-handed response, the resulting oppression can create public sympathy, passive acceptance, or active support for an insurgent or terrorist group.

Insurgency Support

Terrorism in support of an insurgency is likely to include provocation, intimidation, coercion, and a quest for recognition. Terrorism can also aid an insurgency by causing the government to overextend itself in attempting to protect all possible targets. Other uses of terrorist skills in insurgencies include acquiring funds, coercing recruits, obtaining logistical support, and enforcing internal discipline.

Only by having a thorough understanding of terrorist objectives and tactics can we develop plans to mitigate terrorist incidents.

1-4. TERRORIST TACTICS:

Terrorist incidents may be classified according to the tactics terrorists use. There are many tactics, but generally each cell favors and specializes in the use of one or two. The tactics establish a distinct, identifying pattern of operation. Generally, techniques used to analyze criminal behaviors are also useful in analyzing terrorist behavior. The study of terrorist behavioral patterns can reveal much about a terrorist group. This information is helpful in implementing antiterrorism measures and conducting counterterrorism operations. A terrorist organization may use any or all of the tactics discussed below.

Assassination

Assassination is a euphemism for murder. The term generally applies to the killing of prominent persons and symbolic enemies as well as to defectors from the terrorist group.

Arson

Arson has the advantage of low risk to the perpetrator. It requires only a low level of technical knowledge and is easily disclaimed, if desired.

Bombing

The improvised explosive device (IED) is the contemporary terrorist's weapon of choice. It is inexpensive to produce and terrorists use it frequently. Due to the various detonation techniques available, the IED poses a low risk to the trained terrorist. Other advantages include its attention-getting capacity and the terrorist's ability to control casualties through time of detonation and placement of the device. In recent years, approximately one-half of all recorded terrorist incidents worldwide used IEDs.

Hijacking

Hijacking produces a spectacular hostage situation. Although terrorists have hijacked trains, buses, and ships, aircraft offers them greater mobility and worldwide media attention. Terrorists may also use hijacking as a means for escape.

Hostage-taking

This usually is an overt seizure of one or more people to gain publicity, concessions, or ransom in return for the release of the hostage or hostages. While dramatic, hostage situations are risky for the terrorist in an unfriendly environment. A comparison of the seizure of the Iranian Embassy in London in 1981 with the seizure of the US Embassy in Tehran in 1979 demonstrates how environment can affect the outcome of hostage situations. In the former incident, a hostile environment, only one terrorist survived; in the latter, a friendly environment, all the hostage-takers survived.

 

 

Kidnapping

While similar to hostage-taking, kidnapping has significant differences. Kidnapping is usually a covert action and the perpetrators may not make themselves known for some time. While hostage-takers seek immediate publicity for their terrorist acts, news media attention to kidnapping is usually less intense since the event may extend over a prolonged period. Because of the time involved, a successful kidnapping requires elaborate planning and logistics, although the risk to the terrorist is less than in a hostage situation.

Maiming

Maiming creates fear and causes pain, but is not as negative to the terrorist's image as killing a hostage.

Raids

Armed attacks on facilities usually have one of three purposes: to gain access to radio or television broadcast facilities (to make a public statement); to demonstrate the government's inability to guarantee the security of critical facilities; or to acquire money and material (for example, by means of bank or armory robberies).

Seizure

Seizure usually involves the capture of a building or object that has value for the target audience. Publicity is the principle objective. The risk to the terrorist is high because security forces have time to react to the attack. They may opt to use force to resolve the incident since few or no innocent lives may be at risk.

Sabotage

The objective in most sabotage incidents is to demonstrate how vulnerable society is to the terrorist's actions. In the more developed countries, utilities, communications, and transportation systems are so interdependent that a serious disruption of one effects all and gains immediate public attention. Sabotage of industrial, commercial, or military facilities is one means of showing the vulnerability of the target while simultaneously making a statement or political or monetary demand.

Hoaxes

Any terrorist group can successfully employ a hoax. A threat against a person's life causes him and those around him to devote more time and effort to security measures. A bomb threat can close down a commercial building, empty a theater, or disrupt a transportation system at no cost to the terrorist. The longer-term effects of "false alarms" on the security forces are more dangerous than the temporary disruption of the hoax. Repeated threats that do not materialize dull the analytical and operational effectiveness of security personnel.

 

Use of NBC Weapons

Although a nuclear device is beyond the reach of all but the most sophisticated state-sponsored terrorist groups, a chemical or biological weapon is not. The technology is simple and the cost per casualty is extremely low. This makes such weapons ideal for those with little or no regard for the consequences of their act. Fear of alienation from peer and support populations probably inhibits their use, but this restraint could disappear as competition for headlines increases. There is a potential for terrorist use of chemical and biological weapons as substitutes for conventional explosives in many situations. The potential for mass destruction and the great fear that most people have of chemical and biological weapons could be attractive to a group wishing to make the world take notice. The 20 Mar 95 chemical gas attack of a Tokyo subway by the Japanese religious cult, Aum Shinrikyo, provides us with a glaring example of the impact of NBC weapons. Twelve people were killed and 5,500 were injured.

 

1-5. ORGANIZATIONAL STRUCTURE:

Terrorist groups develop organizational structures appropriate for the environments in which they operate. Since terrorists usually work in a hostile environment, security is one of their primary concerns. As a result, the organizational structure of terrorist groups is normally cellular. Each cell is relatively isolated. This type of organization protects members of the group. In the event of defection or capture, no one member can identify more than a few others. Some groups may organize multifunctional cells that combine several skills into one tactical unit; others create separate, specialized cells that come together for an operation on an ad hoc basis.

Larger terrorist groups normally have a central command and control element with one or more subordinate elements. Geographical boundaries frequently are the basis for these elements (for example, Italy's Red Brigades). These regional commands direct the actions of operational and support cells in their area of responsibility. Smaller groups may have a single command element that directly controls all cells regardless of their locations.

Terrorist groups are structurally similar to rudimentary military organizations. A few - the Irish Republican Army (IRA) and some factions of the PLO, for example -- are disciplined enough to function along clear lines of authority and command. However, in others, group dynamics, egos, and philosophical differences override organizational principles. Because of these internal differences, members may take actions not consistent with their stated objectives. These internal conflicts cause terrorist groups to splinter into new factions. Splintering complicates the security forces' intelligence efforts. The commonly used deception technique of claiming credit for an action in the name of a previously unknown terrorist group adds to the problem.

In general, terrorist organizations, especially those with little or no access to government resources, need a support structure. A typical terrorist organization consists of functionally organized operational members as outlined above, plus two categories of supporters. Imagine the structure of a terrorist organization to be like a pyramid.

 

Leadership

Leadership is at the top of the pyramid. It defines policy and directs actions. Leadership is intensely committed and may include charismatic figures. If the group is state supported or directed, the leadership usually includes one or more members who have been trained and educated by the sponsoring state.

Cadre

Just below the leadership in the pyramid structure are the cadres. The cadres are the most active members, the men and women who carry out the actual attacks and train others. While many of the cadre are deeply committed to the cause, its membership may include "professional" terrorists who are not necessarily ideologically motivated.

Active supporters

Next in the terrorist organizational food chain are the active supporters. Active supporters are people who do not actually commit the violent acts of terrorism. However, they assist the terrorists by providing money, information, legal and medical services, "safe houses," and forged or stolen documents. Active supporters frequently agree ideologically with some or all of the group's goals, but are ambivalent about the use of violence. There are also some unstable thrill-seekers who join these groups simply to be a part of a forbidden organization. Most terrorist groups recruit cadre from the ranks of their active support element since these people have proven their loyalty and their skills.

Passive supporters

At the base of the pyramid are the passive supporters. Passive supporters are more difficult to define and identify. Most of them are sympathetic to the terrorist's cause, but either will not or cannot assume an active role. Some passive supporters are involved by intimidation or blackmail. Passive support may be unwitting; for example, contributions to "charitable" causes or other uses. The terrorist relies on passive supporters for financial aid, public displays of support, and minor logistical support.

CHAPTER TWO

PROTECTIVE MEASURES

 

2-1. GENERAL:

No person is immune to the threat of terrorism. Any representative of the US government is a possible object of terrorist activity. Generally, the terrorist is most successful when an individual is lax or otherwise vulnerable. Alert and trained individuals prepared for possible terrorists acts can minimize the likelihood of terrorist activity. For this reason, every individual must develop a security-conscious attitude.

 

2-2. GUIDANCE:

A. All personnel must understand the threat, the protection plan, their role in that plan, and what to do in an emergency.

B. All personnel are required to be briefed on AFI 31-210 (Anti-terrorism briefing) before departing for DoD high threat or potential high threat areas.

C. Personnel traveling to high threat areas must avoid routine in what they do. Unpredictability is the order of the day. Mode of transportation and dress should be varied, as well as routes of travel and times of movements to and from work and around the city.

D. There are four areas of consideration which military personnel should be aware of while traveling to combat terrorist exploitation:

1. HUMINT - Terrorist attempts to use people to gather information about military capabilities. Intentions can be countered by adhering to physical and information security practices. HUMINT collecting can include seemingly unimportant bar or restaurant conversation concerning operations or the release of telephone numbers and addresses of key personnel.

2. PHOTINT - Terrorist attempts to gather information through photography or surveillance procedures. Established patterns provide information to a terrorist. To counter this threat, eliminate routines and/or when possible use deception to mask an established pattern.

3. SIGINT - Terrorist attempts to intercept communication signals. To counter this activity, classified material must be discussed on secure lines only.

 

 

 

4. OPSEC - Counter actions used to deny terrorists information. These activities include employing physical, personnel, and operational security to deny first-hand knowledge about potential targets.

 

2-3. THREAT ANALYSIS:

A. A threat analysis may reveal security weaknesses in the functioning of day-to-day operations and help uncover and isolate these weaknesses so that steps can be taken to keep a potential threat from becoming a reality.

B. A threat analysis may also identify people who are vulnerable to terrorist attack. Prevention of such attacks depends on the planning and use of personal protective measures. The most important measure is educating vulnerable persons to recognize the threat and act to reduce it.

C. Police Security Capability. Embassy security personnel should be able to provide an assessment of the police protection available to personnel in a given area. The general appearance of Host Nation police security personnel you note on the street can provide some indication of the police protection available to you. One factor worthy of consideration, however, is the attitude of the government and the populace toward other nationals, particularly Americans. A strong anti-American attitude could be cause for you to have diminished faith in local police responsiveness.

D. The level of crime or terrorist activity throughout a community is not uniform. Street crimes can be expected to occur in areas that are used as residences for lower income families where conditions include crowding and congestion. The overall crime rate can be expected to be high in downtown or commercial areas as well as isolated areas. It is recommended that these areas be avoided.

E. In most cases, apartments and motels are generally preferred for dwelling when security is a primary consideration. Dwellings above the first floor are more difficult to get to, usually have only one entrance, and have some degree of anonymity for the resident. Thus, they present a more difficult target for the terrorist or burglar and are less expensive to modify with security measures. Rooms below the eighth floor offer greater fire safety protection.

 

2-4. SPECIAL PRECAUTIONS FOR INDIVIDUALS:

A thorough awareness and appreciation of the terrorist threat coupled with the judicious application of basic common sense countermeasures will greatly reduce an individual's chances of becoming a terrorist victim. Since a terrorist kidnapping could succeed despite the best preventive measures, it is necessary to address the "worst case" scenario entailing a successful terrorist gambit using this method of operation.

 

 

The key to surviving a terrorist kidnap or hostage situation rests in large part with the victim -- for, from the moment of capture until he/she has been located in a safehouse with his guards, he/she is in total isolation. Even later, the hostage needs to rely heavily on instinct and personal decision. Therefore, the following chapter on survival techniques is extremely important.

Here are a few common-sense suggestions for self-protection:

A. OVERCOME ROUTINES

1. Vary your route to and from work, and the time you arrive and leave.

2. Exercise on a varying schedule, utilizing different routes and distances. It is best not to exercise alone.

3. Avoid routines (time and location) for shopping, lunch, etc. Routine schedules are easy to follow. Be particularly sensitive to the possibility of surveillance. Arrival and departure times, as well as routes taken to and from work/home, should be varied as often as possible. Different vehicles should be used to make targeting more difficult. For official business, consideration should be given to using unmarked Government vehicles where available.

4. Do not divulge family or personal information to strangers. Use discretion in revealing personal plans during conversations.

5. Enter and exit buildings through different doors, if possible.

B. MAINTAIN A LOW PROFILE

1. Avoid wearing military uniforms. During periods of travel and recreation, wearing military uniforms could attract unwanted attention.

2. Dress and behave in public in a manner consistent with local customs. Clothes, automobiles, and other outward vestiges of nationality should not contrast vividly with those of the country to which you are assigned or in which you are traveling. Clothing should not give the impression of wealth or importance.

3. Items that are distinctively American should not be worn or displayed outside American compounds unless necessary to accomplish official business. Examples of such items include:

a. Cowboy hats, cowboy boots, western belt.

b. Clothing adorned with American flags or other national symbols (Statue of Liberty), city, or commercial logos.

 

 

c. Suitcases, backpacks, brief cases, attaché cases, or shopping bags with stickers, decals, or other distinctively American symbols.

d. Tattoos, patches, military duffel bags, or military style clothing, with or without unit or American identification markings.

e. Show respect for local customs.

f. Shun publicity.

g. Do not flash large sums of money, expensive jewelry, or luxury items.

C. BE SENSITIVE TO, AND CHANGES IN, THE SECURITY ATMOSPHERE

1. Be alert for surveillance attempts or suspicious persons or activities and report them to the proper authorities.

2. Watch for unexplained absences of local citizens as an early warning of possible terrorist actions.

3. Avoid public disputes or confrontations. Report any trouble to the proper authorities.

4. Do not unnecessarily divulge your home address, phone number, or family information.

D. BE PREPARED FOR UNEXPECTED EVENTS

1. Get into the habit of "checking in" to let friends and family know where you are or when to expect you.

2. Know what to do in emergencies. Memorize emergency telephone numbers and know how to use the local telephone system. Always carry local currency "telephone change" or a phone card.

3. Know the locations of civilian police, military police, government agencies, the U.S. Embassy, and other safe locations where you can find refuge or assistance.

4. Know certain key phrases in the local language. Such phrases include "I need a policeman", "Take me to a doctor", "Where is the hospital?," and "Where is the police station?" If such phrases are difficult to learn or time is too short, have someone write them down on small file cards. A 3 x 5 card can contain several phrases written out phonetically that can be read to summon assistance; alternatively, they can be written down so that a person in need of assistance can merely show a card to someone competent in a local language, thereby summoning help.

5. Set up simple signal systems that can alert family members or associates that there is a danger. Do not share this information with anyone not involved in your signal system.

6. Carry identification showing your blood type and any special medical conditions. When asked for identification, give only the information requested. Never surrender your entire wallet or purse or leave your wallet/purse unattended. Keep a minimum of a one week supply of essential medication on hand at all times.

7. Keep your personal affairs in good order. Keep wills current, have powers of attorney drawn up, take measures to ensure family financial security, and develop a plan for family actions in the event you are taken hostage.

8. Do not carry sensitive or potentially embarrassing items.

9. Avoid going out alone. When going out for any reason, avoid going alone--there is usually safety in numbers. However, avoid forming groups of three or more in public to deny an attractive target-of-opportunity.

10. Avoid shortcuts when walking. Walk only on well lighted, heavily traveled streets whenever possible. Avoid shortcuts through alleys. Walk in the middle of the sidewalk. If, while walking, you are threatened by the occupants of a car, run in the direction opposite to that which the car is traveling to seek help. If approached by a suspicious looking person on foot, cross the street or change direction.

11. Avoid street level rooms and stairwells. When checking into guest quarters and hotels, attempt to avoid taking a street-level room. In buildings, use elevators rather than risk attack in stairwells. Stand near the elevator control panel; if threatened, push the alarm button.

12. Never leave keys in coat pockets. If keys to your residence are lost, have the locks changed.

 

2.5 SPECIAL PRECAUTIONS FOR WOMEN:

The following suggestions pertain primarily to actions taken to prevent criminal activity; however, these actions cumulatively will also make it more difficult for a terrorist to attack. When followed, they increase the atmosphere and fabric of security:

A. WHEN SHOPPING. Never leave your purse unattended in a shopping cart or on a counter. Don't flash large amounts of money. Check credit cards periodically; immediately report any loss. Maintain a record of all account numbers and addresses of the companies to permit a quick reporting of lost cards, thus limiting liability. After making large purchases, check to see if you are being followed in or after leaving the store.

 

 

 

 

B. WHEN DRIVING. Look inside before getting into your car -- an assailant may be waiting for you. Keep your car's gas tank full. Keep the windows rolled up and the doors locked. Park in a well lighted area near your destination. If followed, blow your horn repeatedly to attract attention and drive directly to a safe location. If the car breaks down, raise the hood and trunk and remain inside with doors locked and windows rolled up until police arrive. Ask anyone who offers assistance to call the police. Don't pick up hitch-hikers. At night drive only on well lighted streets if at all possible, even if it means going out of your way.

C. WHEN IN AN OFFICE BUILDING. If working, keep your purse locked in desk or file cabinet. When working late, notify the building security officer before leaving the office so he/she will know when to expect you in the lobby. Report suspicious persons or actions in your building to the security officer or supervisor.

D. IF ATTACKED. Scream as loud as you can. Strike back fast...and aim for the vital spots: gouge eyes with thumbs, scratch with fingernails; scratch across the face with a key or fingernail file, bash temple, nose, and Adam's apple with any object possible; jab knee into groin; stomp down on instep -- kick shins; grab fingers and bend back sharply; and poke umbrella, comb, fist, or elbow into midriff. Report the incident as soon as possible. At work, notify the security officer in your building or the local police as appropriate. At home, report the incident to the local police. Try to give a good description of an attacker to include color of hair and eyes, build, scars or tattoos, height, weight, and complexion. It is important that you report all incidents - failure to report may result in an attack on another person.

CHAPTER THREE

SURVIVAL AS A HOSTAGE

 

3-1. GENERAL:

This section has been prepared to allow personnel who may be a potential kidnap victim, not only overseas but even in the United States, to focus on the hostage situation. It is not an exaggeration to state that the twentieth century is without doubt an era of killing, terrorism and devastation, blemished by a breakdown of moral fiber, both nationally and internationally. This breakdown can and does manifest its effects in the lives of individuals. It has been said that the harrowing experience of being kidnapped is one of the most traumatic episodes one can encounter. Even though the period of captivity may be short, it may be more difficult than a convict's lengthy incarceration. A hostage has little or no control over his/her right to live; they are completely at the mercy of their captors.

During the moment of capture, the victim must make an instantaneous decision whether to resist. It is dangerous to resist, but for a number of reasons there are circumstances in which it is more risky to be captured. The initial moment in a capture is the most dangerous time because the captors are tense and their adrenaline is flowing. In these circumstances, the assailants may commit unintentional violence at the slightest provocation. The victim may consider it necessary to reassure his captors that he/she is not trying to escape. Remember that the assailants meticulously planned and executed the operation to apprehend the hostage. The initiative, timing, location, and circumstances of the incident favor the kidnappers. The manpower and fire power brought to bear on the incident leave one with very little opportunity for escape.

 

3-2. HOSTAGE REACTIONS:

Some general guiding principles for kidnap victims evolved from the study of over two dozen political kidnappings in Latin America and the Middle East. Regardless of who the victim is or where he is taken, he will nearly always respond predictably. He/she will experience a feeling of helplessness and uselessness. There will be an overwhelming fear of death. The victim will be shocked, disoriented, and experience paralyzing fear. Depending on his/her character and preparation, the victim will compose himself/herself within an hour or so after the abduction. The victim begins to appreciate his/her predicament and assess their chances of survival. A victim can be further fortified with an awareness of his/her innate capacity for survival and psychological preparation for kidnapping. As a hostage the victim should expect threats of violence and death.

3-3. CAPTIVITY:

Preparation for the kidnap-imprisonment environment is possible. The hostage will probably find himself in an isolated condition, a basement or other restricted area which is cutoff from daylight. The terrorist will usually remove the victim's wristwatch and employ other methods to make the victim lose track of time and become disoriented.

Timing under conditions of captivity causes the victim to be susceptible to three psychological hazards: claustrophobia, loss of sense of time, and isolation, a total break off of any contact with society. The hostage finds that darkness and confinement are standard living conditions of the urban terrorist prison. The victim must be able to combat feelings of depression, adjust to living alone, and off-set the demoralizing realization that their only human contacts may be hostile for a long time.

There is no Geneva Convention to protect hostages in today's terrorist prone world. The austere and even inhumane conditions encountered in a "people's prison" are intended to transform the hostage into a cooperative and malleable prisoner. Another reason for the harsh atmosphere of detention is due to the terrorists ineptitude.

It can hardly be said that there are positive factors in a kidnap situation, but the hostage can and should look for any improving possibilities. Personnel must survey their conditions and find a formula to deal with their predicament and reduce the terrorists' hostility. As has been demonstrated in cases of prisoners of war in Southeast Asia, a hostage's belief in God and his/her religion can bring spiritual and physical buoyancy and consolation to carry them through the nightmarish situation.

The hostage should not carry anything on their person which could prove to be embarrassing to themselves or the United States. It is important for the visitor to keep his body and mind active. This may be accomplished by isometric exercises, exercising in place, or utilizing the imagination and ingenuity. The hostage should ask for medicine to alleviate symptoms and should not be reluctant to accept what is provided.

 

3-4. HOSTAGE PLANNING:

Personnel can do certain things to prepare themselves for the rigors of captivity, which in turn will provide for a degree of peace of mind. A preplanned course of action will tend to reduce the anxiety of family members. It is, therefore, essential to have a will and place one's personal life in order. Arrangements should be made to liquidate stocks, bonds, or mutual funds to provide a cash account to family members. Insurance policies should be readily available and family members should be aware of the contact for survivor assistance. Also, a power of attorney should already be established.

Personnel should not carry classified material. They should keep family photographs in their wallet, as this has proven to be psychologically uplifting.

 

 

 

 

 

 

 

 

3-5. HOSTAGE RELEASE:

The positive ending for the hostage, of course, is when he/she is released and returned to the outside world. Usually the terrorists release their hostages to the mass media or on a empty street. The reentry is a difficult experience. Hostages have no idea about what has happened since the abduction, except what the captor has told them. They are still suffering from the shock of the experience and are in no condition to face the news media. When responding to media questions, personnel should confine themselves to saying how glad they are to be free and state that they were a prisoner and did not enjoy the experience.

CHAPTER FOUR

OFFICE SECURITY TIPS

 

4-1. GENERAL PRACTICES:

1. Establish and support an effective security program for the office.

2. Discourage use of office facilities to store objects of value unless essential for the mission or function of the activity (such items include petty cash boxes, firearms, personal stereos, binoculars, negotiable securities, original artwork of potential commercial interest, etc.).

3. Ensure that all persons working in an office are trained to be alert for suspicious activities, persons or objects.

4. Arrange office interiors so that strange or foreign objects left in the room will be immediately recognized; e.g., remove obvious obstructions behind which or within which improvised explosive devices could be concealed, such as draperies, closed waste baskets, unsecured desks and filing cabinets, and planters.

5. Provide for security systems on exterior doors and windows.

6. Ensure that access control procedures are rigorously observed at all times for access to:

a. The installation.

b. Buildings within an installation.

c. Restricted and/or exclusion areas within a building.

7. Use an identification badge system containing a photograph.

8. Locate desks in a way that persons entering the office or suite can be observed.

9. Identify offices by room number, color, or object name, and not by rank, title, or name of incumbent (room 545, the gold room, the Berlin room; not the General's office, the Assistant Attaché's office, etc.).

10. Do not use name plates on offices and parking places.

 

 

 

 

 

4-2. SPECIFIC OFFICE PROCEDURES:

1. Telephone and Mail Procedures

a. Rank or title should not be used when answering telephones.

b. When taking telephone messages, do not reveal the whereabouts or activities of the person being sought unless the caller is personally known to the individual taking the message.

c. Collect telephone messages in unmarked folders; do not leave exposed for observers to identify caller names and phone numbers, persons called, and messages left.

d. Observe caution when opening mail. In particular, be on the lookout for letters or packages that might contain improvised explosive devices.

2. General Working Procedures

a. Avoid carrying attaché cases, brief cases, or other courier bags unless absolutely necessary.

b. Do not carry items that bear markings that identify the owner by rank or title, even within the office environment.

c. Avoid working alone late at night and on days when the remainder of the staff is absent.

d. If late night work is necessary, work in conference rooms or internal offices where observation from the outside of the building is not possible.

e. Office doors should be locked when vacant for any lengthy period, at night and on weekends.

f. Papers, correspondence, communications materials, and other documents should not be left unattended overnight.

g. Maintenance activity and janitorial services in key offices, production, maintenance, or other installation areas should be performed under the supervision of security personnel.

h. Removal of property, materiel, or information stored on any media from the facility should be prohibited without proper written authorization.

i. Consider prohibiting the importation of property, materiel, or information stored on any media into the facility unless such items have been properly inspected.

 

 

j. Offices not in use should be locked to prohibit unauthorized access or the storage of material that could be used to hide improvised explosive devices or intelligence collection devices.

 

k. Use of vehicles or vehicle markings that make it possible to readily identify the vehicle and its occupants as U.S. Government or DoD contractor personnel should be minimized.

1. All personnel should have access to some sort of duress alarm to announce and warn of terrorist attack.

m. Secretaries and guard posts should be equipped with covert duress alarms which can be used to alert backup forces, summon assistance, or otherwise alert critical personnel for the need to take special actions to avoid a terrorist incident.

n. Placement of office furnishings directly in front of exterior windows is to be avoided if at all possible.

 

4-3. TIPS FOR EXECUTIVE ASSISTANTS:

The following recommendations are suggested for the consideration of executive assistants, administrative assistants, and secretaries assigned to senior military officers or senior DoD officials who may be the target of terrorist attack. These measures may be valuable aids to preserving the security of the principal; in addition, adoption of these measures may assure assistants they are not likely to become collateral casualties in an attack on the principal for whom they work.

1. Request installation of physical barriers such as electromagnetic operated doors to separate offices of senior executives from other offices.

2. Request installation of a silent trouble alarm button, with a signal terminating in the Security Department, or at another secretary's desk, some distance away to ensure that in the event of an emergency it will be possible for someone other than the executive to summon assistance.

3. Do not admit visitors into the executive area unless they have been positively screened in advance or are known from previous visits.

4. Unknown callers should not be informed of the whereabouts of the executive, his or her home address, or telephone number.

5. A fire extinguisher, first-aid kit, and oxygen bottle should be stored in the office area.

6. When receiving a threatening call, including a bomb threat, extortion threat, or from a mentally disturbed individual, remain calm and listen carefully.

7. Do not accept packages from strangers until satisfied with the individual's identity and the nature of the parcel.

8. Travel itineraries for all personnel should be kept absolutely private. Distribution should be limited strictly to persons with a need to know.

9. Daily schedules for senior officers and civilian officials should be distributed on a limited basis and should contain only that information needed by each recipient.

CHAPTER FIVE

FAMILY SECURITY QUESTIONS

 

5-1. INTRODUCTION:

The following are questions that can be asked to help identify practices that may increase the likelihood that a DoD person or family member will become a victim of a kidnapping or other terrorist act.

 

5-2. HEAD OF HOUSEHOLD: (Note: 1-3 are bad ideas, while 4-6 are good ideas)

1. Is your telephone number and address in local directories?

2. Do you, your family members, or your domestic employees answer your telephone with your name and rank?

3. Do you have your name on the exterior of your residence?

4 Have you had a security check run on all domestic employees? If overseas, did you ask the Embassy to screen prospective employees' records? Did you contact the local military police and/or counterintelligence office or local police to obtain pre-employment screening assistance?

5. Have you maintained a file on each household employee including the full name, address, description, date and place of birth, current photograph, and a full set of fingerprints?

6. Have outside fuse boxes and/or circuit breakers been modified so that they can be locked at all times unless access is specifically required?

 

5-3. FAMILY:

1. Have you adopted a family security program including duress codes and alarms, crime watch practices, and conscious efforts to avoid patterns in daily activities?

2. Have all family members learned emergency telephone numbers? Have they been able to memorize them? Do all family members know how to summon police in the local language? Do they carry 3 X 5 note cards with instructions on how to work local telephones and ask for assistance?

 

 

 

3. Have emergency numbers been posted near each telephone? Do these listings give away the nature of the family's assignment (Ambassador's home phone should not be listed, etc.)? Have all family members been given a sanitized list of phone numbers they can carry with them at all times?

4. Do you have a system for keeping family members informed about each other's whereabouts at all times? Have you included a family duress or trouble signal as part of your family check-in system?

5. Have you removed all symbols or signs from the outside of your residence indicating nationality, rank or grade, title, and name?

6. Have you unnecessarily disseminated personal, family, or travel plans to casual acquaintances or domestic employees who do not need to know your personal schedule on an hourly or daily basis?

7. Have you learned and practiced emergency phrases in the local language such as "I need a policeman, a doctor, help, etc."? Have you written these down in transliteration as well as in the native language so you could show a 3 X 5 card to obtain assistance?

8. Do you and your family members know how to work local pay telephones? Does each family member carry a small quantity of money necessary and sufficient to operate local pay telephones at all times?

9. Are residence doors and windows locked? Have additional security devices been added to door and window locks to increase resistance to intrusion and penetration?

10. Do you and your family members close draperies during periods of darkness? Are the draperies made of opaque, heavy material that provide maximum privacy (and can reduce the distribution of glass shards in the event windows are broken)?

11. Have you considered obtaining a dog for protection of your house and grounds? Have you considered geese as an alternative guard animal, if commonly used for that purpose in your locale?

12. Have you or your family members left a spare key in the mailbox or in a similar insecure place?

13. Are tools used by the family, particularly ladders, under lock?

14. Do you have a private place to leave notes for family members or do you tack notes on the door for family, friends, criminals, and terrorists to read?

15. Have you developed a response plan for yourself and family members in the event that an unauthorized person is suspected to be inside your home upon your return? Does your plan emphasize the need to contact the police or the security office immediately and discourage personal investigation of the possible intrusion?

16. Do you or family members automatically open the residence door to strangers? Do you or your family members use a peephole or Closed Circuit TV monitor to identify callers? Do you request to see and verify credentials from utility, service, or other persons seeking to enter your residence?

17. Do you or your family members admit poll-takers and salespersons to your home? Are you aware of the presence of peddlers and all strangers in your neighborhood? Are your family members equally aware? (Terrorists are known to have gathered substantial information relative to their victims using these ruses.)

18. Have you and your family members reported frequent wrong numbers or nuisance telephone calls to the telephone company and the police? Have you considered that someone may be attempting to determine the presence of family members?

19. Have you reported the presence of strangers in the neighborhood? Does it appear that someone or some group may be trying to gain an intimate knowledge of your family's habits?

20. Do you and your family members watch for strange cars cruising or parked frequently in the area, particularly if one or more occupants remain in the car for extended periods? Have you made a note of occupants, license numbers, and province designators of suspicious vehicles?

21. Do you discuss family activities with strangers?

22. Do you discuss family plans over the telephone?

23. Do you discuss detailed family or office plans over the telephone with people you do not personally know or know well?

24. Do you mail letters concerning family travel plans from your house or office? Are you sure that no one is intercepting your outbound mail, opening it, and then resealing it for delivery after collecting desired information enclosed in it?

25. Have you or family members accepted delivery of unordered or suspicious packages or letters?

26. Have you personally destroyed all envelopes and other items which reflect your name and rank?

27. Have you limited publicity concerning yourself and your family that may appear in local news media?

28. Do you and your family members shop on a set schedule? Do you and your family members always shop at the same stores? Do you and your family members always use the same routes to the office, to shopping, to school, and to after school activities?

 

29. Do you have a coordinated family emergency plan? Have you ensured that all family members know who to contact if they suspect another family member is in danger? Have you reviewed protective measures with all family members?

 

30. Have you made sure that each family member is prepared to evacuate the area quickly in the event of an emergency? Do you know where all critical documents such as passports, visas, immunization and other medical records are kept? Are these current, and can you or other family members extract them from their secure storage place on very short notice?

31. Do you find yourself in disputes with citizens of the host country over traffic, commercial transactions, or other subjects? Have you or your family members precipitated any incidents involving host-country nationals?

32. Do you create the appearance that the house is occupied by using timers to control light and radios while you and your family are away?

 

5.4 CHILDREN:

1. Have school officials been advised that children are not to be released to strangers under any circumstances?

2. Have the children been instructed not only to refuse rides from strangers, but also to stay out of reach if a stranger in a car approaches them?

3. Have you located the children's rooms in a part of the residence that is not easily accessible from the outside?

4. Do you keep the door to your children's rooms open so that your can hear any unusual noises?

5. Do you ever leave your children at home alone or unattended?

6. Are you sure that the person with whom you leave your children is responsible and trustworthy?

7. Are you sure that outside doors and windows leading into the children's rooms are kept locked, especially in the evening?

8. Have you taught your children the following?

a. Never let strangers into your house.

b. Avoid strangers and never accept rides from anyone that he or she does not know.

c. Refuse gifts from strangers.

d. Never leave home without telling an adult where and with whom you are going.

e. How to call the police.

f. To call the police if ever you are away and they see a stranger around the house.

g. Where possible, walk on main thoroughfares.

h. Tell you if he or she notices a stranger hanging around your neighborhood.

i. Play in established community playgrounds rather than in isolated areas.

j. Give a false name if ever asked their's by a stranger.

 

5-5. SCHOOLS:

Have you asked schools attended by your children to:

1. Not give out any information on your children to anyone unless you specifically authorize them to do so in advance? Avoid any kind of publicity in which students are named or their pictures are shown?

2. Not release a student to someone other than his or her parents without first receiving authorization from a parent?

3. Allow children to call parents on the telephone in the presence of school officials before allowing an authorized release to actually occur? (This practice provides protection against a kidnapper who calls and claims to be the child's parent.)

4. Report to the police if any strangers are seen loitering around the school or talking to students? If such strangers are in a car, the teacher should note its make, color, model, and tag number and pass this information on to the police.

5. Have teachers closely supervise outside play periods?

 

5-6. NEIGHBORS:

1. Have you met your neighbors? Have you gotten them interested in maintaining and improving neighborhood security?

2. Have you exchanged telephone numbers?

3. Have you established some sort of system for alerting one another to trouble in neighborhood?

5-7. STRANGERS:

1. Have all family members been warned to keep strangers from entering the residence?

2. Have all family members and domestic employees been instructed on the requirement that maintenance work is to be performed only on a scheduled basis unless a clear emergency exists? Do you have procedures established on how to be contacted in the event that a utility emergency occurs and maintenance personnel must enter your residence? Do your family members and domestic employees know how to verify the identity of maintenance personnel?

3. Have you and your family discussed the kind of assistance you can offer to a person who comes to your door claiming to be the victim of an automobile accident, a mechanical breakdown, or some other kind of accident? Have you explained to your family that they can offer to call the police, the fire department, or an ambulance, but under no circumstances should they allow the victim into the residence?

CHAPTER SIX

TRAVEL PRECAUTIONS

 

6-1. INTRODUCTION:

Statistics indicate that terrorist actions are most often perpetrated against victims during periods of movement. Traveling from home to work and return provides the move vulnerable time for a potential victim. This vulnerability comes from a number of factors that decrease the risks to the terrorist. The victim can more easily be identified, can be taken by surprise, can be attacked under conditions most favorable to the terrorist when the victim tends to be isolated from known surroundings. The following tips are provided to decrease your vulnerability during travel.

6-2. VEHICLE TRAVEL TIPS:

1. Vary the routes and the times that you frequently travel.

2. Use an inconspicuous vehicle that has no special identifying license plates or stickers.

3. Do a complete walk-around inspection of the vehicle before beginning travel.

4. Lock doors, gas tanks, and storage areas at all times.

5. Ensure that all keys are accounted for regularly.

6. Park in secured areas whenever possible.

7. Remain alert and "aware" at all times while driving.

8. Never pick up hitchhikers.

9. Know the locations of safe havens.

 

6-3. PERSONAL VEHICLE INSPECTION TIPS:

An extremely important aspect of personal security is the need for regular vehicle inspections. Many terrorist actions are accomplished by placing bombs in individual vehicles. This provides the terrorist less risk and increases the chance of "hitting" the appropriate target. The following are some relatively simply steps that every driver of every DoD Privately Operated Vehicle can take to reduce the likelihood of being hurt by a terrorist act centered around a personal automobile.

 

 

1. Every time you use your automobile, you should make a precautionary inspection. Bomb emplacement by terrorists is often rudimentary or hastily done, thereby providing the opportunity for easy detection. Make a habit of checking the vehicle and the surrounding area before entering and starting the vehicle.

a. Check interior of the vehicle for intruders or suspicious items.

b. Check electronic tampering device, if installed. A cheaper option is to use transparent tape on the hood, trunk, and doors to alert you to any tampering.

c. Check underneath the car and in the fender wells for any foreign objects, loose wires, etc. Examine tires for stress marks and any evidence of tampering.

e. Check wheel lug nuts.

f. Check exterior for any fingerprints, smudges, or other signs of tampering.

2. You may wish to consider the following suggestions in an effort to "harden" your vehicle:

a. Lock the hood with an additional lock and ensure that the factory latch is located inside.

b. Have oversized mirrors installed.

c. Utilize a locking gas cap.

d. Put two bolts through the exhaust pipe, perpendicular to one another. This prevents the insertion of explosive devices in the tail pipe.

e. Use steel-belted radial tires.

f. Install an intrusion alarm system and an extra battery.

g. In high-threat areas, it may be appropriate to:

i. Install car armor.

ii. Have an interior escape latch on the trunk.

iii. Use fog lights.

iv. Install bullet-resistant glass.

 

6-4. TRAVEL ARRANGEMENTS:

1. If available, consider using military air or MAC military contract carriers.

2. Avoid travel through high threat areas, if possible.

3. Do not discuss military affiliations with strangers.

4. Consider using a tourist passport.

5. Consider placing official passports and related documents, such as military ID, travel orders, leave papers, club cards, and billeting receipts in your luggage.

 

6-5. DEFENSIVE FLYING:

1. It is best to obtain aircraft seating in the non-conspicuous "gray area" in the center portion of the aircraft, from approximately the fourth row from the front to the fourth row from the back. Whenever possible, get seating next to a window. This seating arrangement decreases the access that a hijacker would have to you.

2. Travel in conservative civilian clothing.

3. Do not wear distinctive military clothing, such as military shoes, organizational shirts and/or jackets, or sunglasses.

4. Arrive at the airport early and watch for suspicious activity.

5. Do not linger near the ticket counters, security areas, or luggage check-in. Go directly to the secured boarding area.

6. Beware of unattended luggage.

 

6-6. SECURITY TIPS FOR HOTELS AND MOTELS:

1. Stay at DoD facilities while on TDY, whenever possible.

2. Avoid staying in hotels with distinctively American names or predominantly American guests.

3. Make reservations in two or more hotels and use an assumed or modified name.

4. Avoid taking street-level rooms, terrace-level rooms with direct access to hotel grounds, or stairwells.

5. Retain control over all luggage upon arrival in a hotel lobby.

6. When in a hotel, note all escape routes.

7. Vary your pattern of entering and leaving your hotel.

8. Do not discuss travel plans over hotel phones.

9. Use extra caution in hotel lobbies and other public places where bombs may be placed.

10. Bellboys and other strangers in hotel lobbies should not be asked directions for specific places you intend to go.

11. Do not conduct official business or meet casual acquaintances in your temporary living quarters; do not divulge the location of your quarters.

12. Discourage efforts to enter your room while you are gone by preserving a "lived-in" look in your room.

13. Keep your room neat.

14. Hallways should be checked before exiting from an elevator or your room for out of place objects or for persons who seem to be loitering.

15. Packages should not be delivered to your room.

16. Unexpected mail left for you at the desk or slipped under the door of your room should be viewed with suspicion.

APPENDIX A

LETTER AND PACKAGE BOMB RECOGNITION CHECKLIST

A. INTRODUCTION:

The following information is useful in detecting the presence of letter or package bombs sent through U.S. and international mails. While by no means complete or foolproof, letters and packages exhibiting the characteristics below should be viewed with extreme caution.

B. RECOGNITION CHART:

WEIGHT

STAMPS

   

_____ Weight unevenly distributed

_____ Excessive postage

   

_____ Heavier than usual for its size

POSTMARK

   

_____ Heavier than usual for its postal class

_____ Foreign

   

THICKNESS

_____ From an unusual city or town

   

_____ For medium size envelopes, the

thickness of a small book

WRITING

 

_____ Foreign writing style

_____ Not uniform, or has bulges

 
 

_____ Misspelled words

_____ For large envelopes, bulkiness an inch

or more in thickness

ADDRESS

   

ENVELOPE

_____ No return address

   

_____ Peculiar odor

_____ Poorly typed or handwritten address

   

_____ Inner sealed enclosure

_____ Title for the recipient incorrect

   

_____ Excessive sealing material

_____ Addressed to a high-ranking recipient

by name, title, or department

_____ Oil stains

 

_____ Wires, string or foil sticking out or

attached

_____ Marked "Private" or "Personal"

RIGIDITY

   
 

_____ Greater than normal, particularly along

its center length

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This page left intentionally blank.

APPENDIX B

HOUSEHOLD SECURITY CHECKLIST

 

A. EXTERIOR Yes No

1. If you have a fence or tight hedge, have you evaluated it as a _____ _____ defense against intrusion?

2. Is your fence or wall in good repair? _____ _____

3. Are the gates solid and in good repair? _____ _____

4. Are the gates properly locked during the day and at night? _____ _____

5. Do you check regularly to see that your gates are locked? ____ _____

6. Have you eliminated trees, poles, ladders, boxes, etc., that

might help an intruder to scale the fence, wall or hedge? _____ _____

7. Have you removed shrubbery near your gate, garage, or

front door that could conceal an intruder? _____ _____

8. Do you have lights to illuminate all sides of your residence,

garage area, patio, etc.? _____ _____

9. Do you leave your lights on during hours of darkness? _____ _____

10. Do you check regularly to see that the lights are working? _____ _____

11. If you have a guard, does his post properly position him to

have the best possible view of your grounds and residence? _____ _____

12. Does your guard patrol your grounds during the hours of

darkness? _____ _____

13. Has your guard been given verbal or written instructions and

does he understand them? _____ _____

 

 

A. EXTERIOR (continued) Yes No

14. Do you have dogs or other pets that will sound an alarm if

they spot an intruder? _____ _____

B. INTERIOR Yes No


1. Are your perimeter doors of metal or solid wood? _____ _____

2. Are the door frames of good solid construction? _____ _____

3. Do you have an interview grill or optical viewer in your

main entrance door? _____ _____

4. Do you use the interview grill or optical viewer? _____ _____

5. Are your perimeter doors properly secured with good
heavy duty dead bolt lock? _____ _____

6. Are the locks in good working order? _____ _____

7. Can any of your door locks be bypassed by breaking the glass

or a panel of light wood? _____ _____

8. Have you permanently secured all unused doors? _____ _____

9. Are your windows protected by solid steel bars or

ornamental or some other type of shutters? _____ _____

10. Do you close all shutters at night and when leaving your

residence for extended periods of time? _____ _____

11. Are unused windows permanently closed and secured? _____ _____

12. Are your windows locked when they are shut? _____ _____

13. Are you as careful of second floor or basement windows as

you are of those on the ground floor? _____ _____

B. INTERIOR (continued) Yes No

14. Have you secured sliding glass doors with a broom handle

or good patio door lock? _____ _____

15. If your residence has a skylight, roof latch, or roof doors are

they properly secured? _____ _____

16. Does your residence have an alarm system? _____ _____

17. Have you briefed your family and servants on good security

procedures? _____ _____

18. Do you know the phone number of the police security force

that services your neighborhood? _____ _____

C. GENERAL Yes No

1. Are you and your family alert in your observations of persons

who may have you under surveillance, or who may be casing your

house in preparation for a burglary or other crime? _____ _____

2. Have you verified the references of your servants and have

you submitted their names for security checks? _____ _____

3. Have you told your family and servants what to do if they

discover an intruder breaking in or already in the house? _____ _____

4. Have you restricted the number house keys? _____ _____

5. Do you know where all your house keys are? _____ _____

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This page left intentionally blank.

ANNEX C

CHECKLIST FOR DEFENSIVE FLYING

 

A. INTRODUCTION:

Air travel, particularly through high risk airports or countries, poses security problems different from those of ground transportation. Here are some simple precautions that can reduce the hazards of a terrorist assault.

 

B. MAKING TRAVEL ARRANGEMENTS:

1. _____ Use office symbols on orders or leave authorizations if the word description denotes a high or sensitive position.

2. _____ Get a threat briefing from the appropriate counterintelligence or security organization prior to travel to a high risk area.

3. _____ Use military air, MAC military contract, or U.S. flag carriers.

4. _____ Avoid scheduling through high-risk areas; use foreign flag airlines and/or indirect routes to avoid high risk airports.

5. _____ Do not use rank or military address on tickets, travel documents, or hotel reservations.

6. _____ Select window seat; they offer more protection since aisle seats are closer to the hijackers' movements up and down the aisle.

7. _____ Rear seats also offer more protection since they are farther from the center of hostile action, which is often near the cockpit.

8. _____ Seats at an emergency exit may provide an opportunity to escape.

9. _____ Avoid off-base hotels, use government quarters or "safe" hotels.

 

C. PERSONAL IDENTIFICATION:

1. _____ Do not discuss your military affiliation with anyone.

2. _____ You must have proper identification to show airline and immigration officials.

3. _____ Consider use of a tourist passport, if you have one, with necessary visas, providing it is allowed by the country you are visiting.

4. _____ If you use a tourist passport, consider placing your official passport, military ID, travel orders and related documents in your checked luggage, not in your wallet or briefcase.

5. _____ If you must carry these documents on your person, select a hiding place on board the aircraft to "ditch" them in case of a hijacking.

6. _____ Do not carry classified documents unless they are ABSOLUTELY mission-essential.

D. LUGGAGE:

1. _____ Use plain, civilian luggage; avoid military-looking bags, B-4 bags, duffel bags, etc.

2. _____ Remove all military patches, logos, or decals from your luggage and briefcase.

3. _____ Ensure luggage tags do not show your rank or military address.

4. _____ Do not carry official papers in your briefcase.

E. CLOTHING:

1. _____ Travel in conservative civilian clothing when using commercial transportation or when traveling military airlift if you are to connect with a flight at a commercial terminal in a high-risk area.

2. _____ Do not wear distinct military items such a organizational shirts, caps, or military issue shoes or glasses.

3. _____ Do not wear U.S. identified items such as cowboy hats or boots, baseball caps, American logo T-shirts, jackets, or sweatshirts.

4. _____ Wear a long-sleeved shirt or bandage if you have a visible U.S. affiliated tattoo.

 

F. PRECAUTIONS AT THE AIRPORT:

1. _____ Arrive early; watch for suspicious activity.

2. _____ Look for nervous passengers who maintain eye contact with others from a distance. Observe what people are carrying. Note behavior not consistent with that of others in the area.

3. _____ No matter where you are in the terminal, identify objects suitable for cover in the event of attack. Pillars, trash cans, luggage, large planters, counters, and furniture can provide protection.

4. _____ Do not linger near open public areas. Quickly transit insecure ticket counters, waiting rooms, commercial shops, and restaurants.

5. _____ Avoid processing with known target groups.

6. _____ Avoid secluded areas that provide concealment for attackers.

7. _____ Be aware of unattended baggage anywhere in the terminal.

8. _____ Observe the baggage claim area from a distance. Do not retrieve your bags until the crowd clears. Proceed to customs lines at the edge of the crowd.

9. _____ Report suspicious activity to airport security personnel.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This page left intentionally blank.

ANNEX D

GROUND TRANSPORTATION CHECKLIST

 

A. INTRODUCTION:

Criminal and terrorist acts against individuals usually occur outside the home and after the

individual's habits have been established. Typically, the most predictable habit is the route of

travel from home to duty station or to commonly frequented local facilities.

B. VEHICLES:

1. _____ Select a plain car, minimize the "rich American" look.

2. _____ Consider not using a government car that announces ownership.

3. _____ Safeguard keys.

4. Auto maintenance:

a. _____ Keep vehicle in good repair. You do not want it to fail when you need it most.

b. _____ Keep gas tank full or nearly full at all times.

c. _____ Ensure tires have sufficient tread.

C. PARKING:

1. _____ Park in well lighted areas.

2. _____ Always lock your car, even when it is outside your home.

3. _____ Do not leave it on the street overnight, if possible.

4. _____ Never get out without checking for suspicious persons. If in doubt, drive away.

5. _____ Leave only the ignition key with parking attendants.

6. _____ Do not allow entry to the trunk, unless you are there to watch.

7. _____ Never leave garage doors open or unlocked.

8. _____ Use a remote garage door opener if available. Enter and exit your car in the security of the closed garage.

D. ON THE ROAD:

1. _____ Before leaving buildings to get into your vehicle, check the surrounding area to determine if anything of a suspicious nature exists. Before leaving your vehicle, look around carefully to be confident you are not headed directly into a threatening situation.

2. _____ Before entering vehicles, check for suspicious objects on and underneath the seats.

3. _____ Guard against the establishment of routines by varying times, routes, and modes of travel.

4. _____ Travel with companions or in convoy when possible.

5. _____ Avoid isolated roads and dark alleys.

6. _____ Know locations of safe havens along routes of routine travel.

7. _____ Habitually ride with seat belts buckled, doors locked, and windows closed.

8. _____ Do not allow your vehicle to be boxed in; maintain a minimum 8-foot interval between your vehicle and the vehicle in front. Avoid the inner lanes.

9. _____ Be alert while driving or riding.

10. _____ Know how to react if surveillance is suspected or confirmed.

a. _____ Circle the block for confirmation of surveillance.

b. _____ Do not stop or take other actions that could lead to confrontation.

c. _____ Do not drive home.

d. _____ Get description of car and its occupants.

e. _____ Go to nearest safe haven. Report incident to the nearest DoD counterintelligence, security, or law enforcement organization.

11. _____ Recognize events that can signal the start of an attack, such as:

a. _____ Cyclist falling in front of your car.

b. _____ Flagman or workman stopping your car.

c. _____ Fake police or government checkpoint.

d. _____ Disabled vehicle or accident victims on the road.

e. _____ Unusual detours.

f. _____ An accident in which your car is struck.

g. _____ Cars or pedestrian traffic that box you in.

h. _____ Sudden activity or gunfire.

12. _____ Know what to do if under attack in a vehicle.

a. _____ Without subjecting yourself, passengers, or pedestrians to harm, try to draw attention to your car by sounding the horn.

b. _____ Put another vehicle between you and your pursuer.

c. _____ Execute an immediate turn and escape, jump curb at 30-45 degree angle, 35 mph maximum.

d. _____ Ram blocking vehicle if necessary.

e. _____ Go to the closest safe haven.

f. _____ Report the incident to the nearest DoD counterintelligence, law enforcement, or security organization.

E. COMMERCIAL BUSES, TRAINS, AND TAXIS:

1. _____ Vary mode of commercial transportation.

2. _____ Select busy stops.

3. _____ Do not always use the same taxi company.

4. _____ Do not let someone you do not know direct you to a specific cab.

5. _____ Ensure the taxi is licensed and has safety equipment (seat belts at minimum).

6. _____ Ensure that the picture on the license matches the driver's face.

7. _____ Try to travel with a companion.

8. _____ If possible, specify the route you want the taxi to follow.