Free Essay

Marines

In:

Submitted By honoursave7
Words 42908
Pages 172
MCI 0210D

MARINE CORPS INSTITUTE

TERRORISM AWARENESS
FOR MARINES

MARINE BARRACKS
WASHINGTON, DC

UNITED STATES MARINE CORPS
MARINE CORPS INSTITUTE
912 CHARLES POOR STREET SE
WASHINGTON NAVY YARD DC 20391-5680

IN REPLY REFER TO:

1550
26 Mar 2012
From: Director
To:
Marine Corps Institute Student
Subj: TERRORISM AWARENESS FOR MARINES (0210D)
1. Purpose. The subject course provides instruction on terrorism awareness for all Marines.
2. Scope. This course gives an overview on terrorism and provides guidance to individual
Marines on terrorism and its effects.
3. Applicability. This course is designed for the Marine, private through general officer, in all
MOSs.
4. Recommendations. Comments and recommendations on the contents of the course are invited and will aid in subsequent course revisions. Please complete the course evaluation questionnaire at the end of the final examination. Return the questionnaire and the examination booklet to your proctor.

M. S. REICHENBAUGH
By direction

(This page intentionally left blank.)

Table of Contents
Page
Contents ............................................................................................................................

i

Student Information ..........................................................................................................

iii

Study Guide ......................................................................................................................

v

Study Unit 1

Terrorism Basics ...........................................................................

1-1

Background of Terrorism..............................................................
Objectives of Terrorism ................................................................

1-3
1-11

Terrorist Doctrine..........................................................................

2-1

Operations .....................................................................................
Targets...........................................................................................
Organization of Terrorist Groups..................................................
Training .........................................................................................

2-3
2-17
2-27
2-35

Detecting Terrorist Surveillance ...................................................

3-1

Surveillance...................................................................................
Techniques Employed ...................................................................

3-3
3-13

Protective Measures for the Home and Office ..............................

4-1

Residential Security ......................................................................
Protective Measures Used in the Workplace ................................
Homeland Security Notifications ..................................................

4-3
4-17
4-27

Protective Measures While Traveling ...........................................

5-1

Traveling on Foot ..........................................................................
Traveling in a Vehicle...................................................................
Traveling by Air ............................................................................
Staying Safe in Hotels...................................................................

5-3
5-9
5-31
5-39

Lesson 1
Lesson 2
Study Unit 2
Lesson 1
Lesson 2
Lesson 3
Lesson 4
Study Unit 3
Lesson 1
Lesson 2
Study Unit 4
Lesson 1
Lesson 2
Lesson 3
Study Unit 5
Lesson 1
Lesson 2
Lesson 3
Lesson 4

Continued on next page

MCI Course 0210D

i

Table of Contents, Continued
Page
Study Unit 6
Lesson 1
Lesson 2
Lesson 3
Lesson 4

Hostage Survival ...........................................................................

6-1

Analyzing a Hostage Situation......................................................
Responsibilities of a Hostage ........................................................
Adjusting to a Hostage Situation ..................................................
Surviving a Hostage Situation ......................................................

6-3
6-9
6-15
6-25

Review Lesson Examination.............................................................................................

MCI Course 0210D

ii

R-1

Student Information
Number and
Title

MCI 0210D
TERRORISM AWARENESS FOR MARINES

Study Hours

6

Course
Materials

Text

Review Agency

Marine Barracks
Washington, DC

Reserve
Retirement
Credits (RRC)

2

ACE

Not applicable to civilian training/education

Assistance

For administrative assistance, have your training officer or NCO log on to the
MCI home page at www.mci.usmc.mil. Marines CONUS may call toll free
1-800-MCI-USMC. Marines worldwide may call commercial (202) 6857596 or DSN 325-7596.

MCI Course 0210D

iii

(This page intentionally left blank.)

MCI Course 0210D

iv

Study Guide
Congratulations

Congratulations on your enrollment in a distance education course from the
Distance Learning and Technologies Department (DLTD) of the Marine
Corps Institute (MCI). Since 1920, the Marine Corps Institute has been helping tens of thousands of hard-charging Marines, like you, improve their technical job performance skills through distance learning. By enrolling in this course, you have shown a desire to improve the skills you have and master new skills to enhance your job performance. The distance learning course you have chosen, MCI 0210D, Terrorism Awareness for Marines, provides instruction to all Marines. This course gives an overview of terrorism, explains anti-terrorism individual protective measures, and what to do if taken hostage.


YOU ARE PROPERLY MOTIVATED. You have made a positive decision to get training on your own. Self-motivation is perhaps the most important force in learning or achieving anything. Doing whatever is necessary to learn is motivation. You have it!



YOU SEEK TO IMPROVE YOURSELF. You are enrolled to improve those skills you already possess, and to learn new skills. When you improve yourself, you improve the Corps!



YOU HAVE THE INITIATIVE TO ACT. By acting on your own, you have shown you are a self-starter, willing to reach out for opportunities to learn and grow.



YOU ACCEPT CHALLENGES. You have self-confidence and believe in your ability to acquire knowledge and skills. You have the self-confidence to set goals and the ability to achieve them, enabling you to meet every challenge.



Your Personal
Characteristics

YOU ARE ABLE TO SET AND ACCOMPLISH PRACTICAL
GOALS. You are willing to commit time, effort, and the resources necessary to set and accomplish your goals. These professional traits will help you successfully complete this distance learning course.
Continued on next page

MCI Course 0210D

v

Study Guide, Continued
Beginning Your
Course

Before you actually begin this course of study, read the student information page. If you find any course materials missing, notify your training officer or training NCO. If you have all the required materials, you are ready to begin.
To begin your course of study, familiarize yourself with the structure of the course text. One way to do this is to read the table of contents. Notice the table of contents covers specific areas of study and the order in which they are presented. You will find the text divided into several study units. Each study unit is comprised of two or more lessons and lesson exercises.

Leafing
Through the
Text

Leaf through the text and look at the course. Read a few lesson exercise questions to get an idea of the type of material in the course. If the course has additional study aids, such as a handbook or plotting board, familiarize yourself with them.

The First Study
Unit

Turn to the first page of study unit 1. On this page, you will find an introduction to the study unit and generally the first study unit lesson. Study unit lessons contain learning objectives, lesson text, and exercises.

Reading the
Learning
Objectives

Learning objectives describe in concise terms what the successful learner, you, will be able to do as a result of mastering the content of the lesson text.
Read the objectives for each lesson and then read the lesson text. As you read the lesson text, make notes on the points you feel are important.

Completing the
Exercises

To determine your mastery of the learning objectives and text, complete the exercises developed for you. Exercises are located at the end of each lesson, and at the end of each study unit. Without referring to the text, complete the exercise questions and then check your responses against those provided.
Continued on next page

MCI Course 0210D

vi

Study Guide, Continued
Continuing to
March

Continue on to the next lesson, repeating the above process until you have completed all lessons in the study unit. Follow the same procedures for each study unit in the course.

Preparing for the Final Exam

To prepare for your final exam, you must review what you learned in the course. The following suggestions will help make the review interesting and challenging.  CHALLENGE YOURSELF. Try to recall the entire learning sequence without referring to the text. Can you do it? Now look back at the text to see if you have left anything out. This review should be interesting.
Undoubtedly, you’ll find you were not able to recall everything. But with a little effort, you’ll be able to recall a great deal of the information.
 USE UNUSED MINUTES. Use your spare moments to review. Read your notes or a part of a study unit, rework exercise items, review again; you can do many of these things during the unused minutes of every day.
 APPLY WHAT YOU HAVE LEARNED. It is always best to use the skill or knowledge you’ve learned as soon as possible. If it isn’t possible to actually use the skill or knowledge, at least try to imagine a situation in which you would apply this learning. For example make up and solve your own problems. Or, better still, make up and solve problems that use most of the elements of a study unit.
 USE THE “SHAKEDOWN CRUISE” TECHNIQUE. Ask another
Marine to lend a hand by asking you questions about the course. Choose a particular study unit and let your buddy “fire away.” This technique can be interesting and challenging for both of you!
 MAKE REVIEWS FUN AND BENEFICIAL. Reviews are good habits that enhance learning. They don’t have to be long and tedious. In fact, some learners find short reviews conducted more often prove more beneficial. Continued on next page

MCI Course 0210D

vii

Study Guide, Continued
Tackling the
Final Exam

When you have completed your study of the course material and are confident with the results attained on your Review Lesson Examination, you are ready to take the final examination. Your training NCO or officer will administer the final examination either online at www.mci.usmc.mil or by using Form
DP-37 (answer sheet) that is provided in the sealed envelope marked “FINAL
EXAM”. If you use Form DP-37 to take your final examination, your training
NCO or officer will return it to MCI for grading. Ensure you read all the directions carefully, whether online or on Form DP-37, before taking your final examination.

Completing
Your Course

The sooner you complete your course, the sooner you can better yourself by applying what you’ve learned! HOWEVER--you do have 2 years from the date of enrollment to complete this course.

Graduating!

As a graduate of this distance education course and as a dedicated Marine, your job performance skills will improve, benefiting you, your unit, and the
Marine Corps.

Semper Fidelis!

MCI Course 0210D

viii

STUDY UNIT 1
TERRORISM BASICS
Overview
Scope

September 11, 2001 is a day that will redefine history. The terrorist attacks that were launched on that day claimed victims from some 88 nations. For many countries, including the United States, the horrors of September 11 claimed the most lives of any terrorist incident in their history.
The attacks may have been conceived as a blow against America, but in reality they were attacks against all of humanity and civilization itself. The war we are waging will be a long struggle with many dimensions. The
United States has entered a new age of terrorism that targets both civilians and Armed Forces in a war with no rules and no clear ending. There has been a steady progression towards this point by such events as the







1983 Bombing of Marine Barracks, Beirut
1988 Bombing of Pan Am Flight 103
1995 Oklahoma City bombing
1996 Bombing of the Khobar towers
2000 Attack on the USS Cole
Attacks on multiple embassies throughout the world

Although the means and ends have evolved throughout history, the central elements of terrorism – fear, panic, violence, and disruption – have changed little. As the world enters the 21st century, terrorism remains a vexing problem. With training and an increase in knowledge and awareness of terrorist activities, perhaps these attacks can be prevented in the future.

In This Study
Unit

The following lessons are in this study unit.
Lesson
Background of Terrorism
Objectives of Terrorism

MCI Course 0210D

1-1

See Page
1-3
1-11

Study Unit 1

(This page intentionally left blank.)

MCI Course 0210D

1-2

Study Unit 1

LESSON 1
BACKGROUND OF TERRORISM
Introduction
Scope

As a Marine, you are more likely to witness or experience terrorist acts. In this lesson, you will learn multiple factors that will establish a foundation needed to help you counteract terrorism.

Learning
Objectives

Upon completion of this lesson, you should be able to



Identify the strategy of terrorists.



Identify the perspectives of terrorism.



In This Lesson

State the definition of terrorism.

Identify the different operational categories of terrorists.

The following topics are in this lesson:
Topic
Introduction
What is Terrorism?
Strategy
Perspectives
Types
Lesson 1 Exercise

MCI Course 0210D

1-3

See Page
1-3
1-4
1-5
1-6
1-7
1-8

Study Unit 1, Lesson 1

What is Terrorism?
Definition

Terrorism is defined as “the calculated use of unlawful violence or threat of unlawful violence to inculcate (instill) fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological.” The three key elements are violence, fear, and intimidation. An understanding of this definition will aid in developing an awareness of terrorism. U.S. Policy

The policy of the United States is summarized as follows:


All terrorist acts are criminal and intolerable. Whatever their motivation is, they should be condemned.



The United States will support all lawful measures to prevent terrorism and bring those responsible to justice.



No concessions will be made to terrorist extortion; to do so only invite more terrorist action.



When Americans are abducted overseas, the United States will look to the host government to exercise its responsibility to protect all persons within its territories, to include achieving the safe release of hostages.



The United States will maintain close and continuous contact with the host government during the incident and will continue to develop international cooperation to combat terrorism.

In this global campaign, the United States welcomes the help of any country or party that is genuinely prepared to work with us, but we will not relax our standards and we will continue to advance our fundamental interests in establishing a world of democracy, opportunity, and stability. This is a world in which terrorism cannot thrive.

MCI Course 0210D

1-4

Study Unit 1, Lesson 1

Strategy
Characteristics

A terrorist is one who advocates, creates, or practices the use of terror for a means of coercion. The characteristics and traits of each terrorist may vary and it is difficult to generalize about a terrorist’s profile; however, terrorists typically are intelligent, obsessed with initiating changes, reared in middle class or wealthy families, and are in their early to mid-twenties.

Planning For
Response

Terrorism is a criminal act that influences an audience beyond the immediate victim. The strategy of terrorists is to commit acts of violence that draw the attention of the local populace, the government, and the world to their cause.
A successful attack for a terrorist is one that gains the greatest publicity. A terrorist becomes more effective with a larger reaction from the public or government. Gaining
Publicity

MCI Course 0210D

A prime example of publicity occurred in 1983 when Middle Eastern terrorists bombed the Marine Battalion Landing Team Headquarters at the
Beirut International Airport. Their immediate victims were the 241 U.S. military personnel who were killed and over 100 others who were wounded.
Their true targets were the American people and the U.S. Congress. This one act of violence influenced the decision to withdraw the Marines from Beirut and was considered a terrorist success.

1-5

Study Unit 1, Lesson 1

Perspectives
View of
Incident

It is important to realize that there are different views when it comes to a terrorist incident. Those involved may all share a different view of what took place. There are three perspectives of a terrorist incident:




Terrorist’s perspective
Victim’s perspective
General public’s perspective

Terrorists will view their actions as heroic, and worthy of praise. The victim of course will see otherwise. The general public’s perspective is possible of being swayed in both directions.

Terrorist
Perception

A common phrase “one man’s terrorist is another man’s freedom fighter” is often the view a terrorist takes on and accepts. Terrorists do not see themselves as evil; they believe they are legitimate combatants, fighting for what they believe in, by whatever means possible.

Victim

A victim of a terrorist act sees the terrorist as a criminal with no regard for human life.

General Public

The general public’s view of a terrorist incident is the most unstable view of the three. Terrorists take great pains to portray a “Robin Hood” image in hopes of swaying the general public’s point of view toward their cause. If a terrorist group were to win the views of the people then their cause would be aided immensely.

Other Outlooks

George Washington served in the British Army before serving in the
Continental Army. British subjects viewed him as a traitor and colonists viewed him as a patriot. The same can be said concerning many areas of the world today. Elements that are perceived as menaces to our way of life can be viewed as saviors by others. It is important to take this into account when dealing with foreign cultures, and realize that not everyone thinks the same way. MCI Course 0210D

1-6

Study Unit 1, Lesson 1

Types
Operational
Categories

Terrorist groups fall under three operational categories:



Transnational terrorists – A group that operates across national borders.



Government
Affiliation

National terrorists – A group that operates in and aims to attain political power within a single nation.

International terrorists – A group that is controlled by a sovereign state and that represents the state’s interests.

A terrorist group’s selection of targets and tactics is also a function of the group’s governmental affiliation. Terrorist groups are categorized by their operational category and governmental affiliation. This enables security personnel and planners to anticipate terrorist targets and determine the sophistication of a terrorist group’s intelligence and weaponry.
Three categories of governmental affiliation are shown in the table below:
Non-State Supported
 Operates independently State Directed
 Operates as an agent of a government

 Receives no significant support from any government

Today’s Threat

State Supported
 Operates independently  Receive some support from one or more governments

 Government provides substantial intelligence, logistics and operational support Many areas of the world are experiencing great political, economic, and social unrest. The reasons for this unrest can be seen in conflicts with neighboring states, internal strife, dissatisfaction with governments in power, unconstrained population growth, declining resources, and ethnic and religious hatreds.
This unrest has spawned numerous groups that lack the means to have their grievances solved by their own governments through the normal political processes. Sometimes these groups resort to terrorism to achieve their aims.

MCI Course 0210D

1-7

Study Unit 1, Lesson 1

Lesson 1 Exercise
Directions

Complete items 1 through 6 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

Define terrorism.
______________________________________________________________
______________________________________________________________
______________________________________________________________

Item 2

The strategy of terrorists is to commit acts of violence that draws attention of the local populace, the _________, and the world to their cause.
a.
b.
c.
d.

Item 3

government children media church Name the three perspectives of a terrorist incident.
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________

Continued on next page

MCI Course 0210D

1-8

Study Unit 1, Lesson 1 Exercise

Lesson 1 Exercise, Continued
Item 4 Through
Item 6

Matching: For items 4 through 6, match the type of terrorist group in column
1 to its description in column 2. Place your responses in the spaces provided.
Column 1

Column 2

Terrorist Group

Description

____4.
____5.
____6.

a. A group that is controlled by a sovereign state and that represents the state’s interests
b. A group that operates in and aims to attain political power within a single nation
c. A group that operates across national borders
d. A group that operates solely in the local area

National Terrorists
Transnational Terrorists
International Terrorists

Continued on next page

MCI Course 0210D

1-9

Study Unit 1, Lesson 1 Exercise

Lesson 1 Exercise, Continued
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
1

2
3

4
5
6

MCI Course 0210D

Answer
Reference Page
The calculated use of unlawful
1-4
violence or threat of unlawful violence to inculcate fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological. a
1-5
1-6
 Terrorist’s perspective
 Victim’s perspective
 General Public’s perspective b 1-7 c 1-7 a 1-7

1-10

Study Unit 1, Lesson 1 Exercise

LESSON 2
OBJECTIVES OF TERRORISM
Introduction
Scope

Different terrorist groups are motivated by different reasons. Depending on the situation, the objectives may also vary. In this lesson, you will learn the different motives for terrorist attacks as well as the objectives terrorists hope to accomplish.

Learning
Objectives

Upon completion of this lesson, you should be able to



Identify immediate objectives of terrorism.



In This Lesson

Identify the motives for terrorism.

Identify long-term objectives of terrorism.

The following topics are in this lesson:
Topic
Introduction
Motives
Immediate
Long-Term
Lesson 2 Exercise

MCI Course 0210D

1-11

See Page
1-11
1-12
1-14
1-17
1-18

Study Unit 1, Lesson 2

Motives
Different
Motivation

Terrorists are constantly coming up with new ideas and methods to accomplish their goals. The motivation for these goals will fall within one of the following four categories:





Political
Ideologies

Political ideologies
Nationalism
Religion
Special interests

Political ideologies range from the far left to the far right. They consist of the two types of terrorists.



Left-wing terrorists
Right-wing terrorists

Left-Wing
Terrorists

Left-wing terrorists are out to destroy capitalism and replace it with a communist or socialist regime. Because they see most civilians as suffering from capitalist exploitation, left-wing terrorists sometimes have limited their use of violence to avoid hurting the victims they say they want to save. Leftwing terrorists sometimes focus instead on such tactics as kidnapping tycoons or bombing monuments.

Right-Wing
Terrorists

Right-wing terrorists are among the least organized terrorists, often associated with neo-Nazi street rioting in Western Europe, especially in the early 1980s.
These groups, often dominated by skinheads, seek to do away with liberal democratic governments and create fascist states in their place. Neo-fascist terrorists frequently attack immigrants and refugees from the developing world and are both racist and anti-Semitic.

Nationalism

Nationalism is the devotion to the interests or culture of a group of people or a nation. Typically, nationalists share a common ethnic background and wish to establish or regain a homeland.
Examples of nationalism were seen with the war in Iraq. Former regime officials, or former Ba’ath party members (mostly all Sunni Muslims), were behind the majority of insurgent attacks. They felt they stood the most to lose if a democratic government were established in Iraq. If Iraq evolves into a democratic Shiite ruled government, Sunnis felt they would have zero power in the decision-making process.
Continued on next page

MCI Course 0210D

1-12

Study Unit 1, Lesson 2

Motives, Continued
Religion

Religion has driven many of the violent acts in recorded history. Religious extremists often reject the authority of secular governments and view legal systems that are not based on their beliefs as illegitimate. They often view modernization efforts as corrupting influences on traditional culture. Two of the most influential religious terrorist groups in the past decades have been the Al Qaeda network in Afghanistan and the Hezbollah in Lebanon.

Al Qaeda

Al Qaeda has been responsible for some of the most notable terrorist attacks within the past 15 years. Their attacks have targeted Americans and other
Western interests, as well as Jewish and Muslim governments it deems corrupt. These attacks include






Hezbollah

The Hezbollah (meaning “party of God”) has been linked to a number of terrorist attacks against America, Israel, and other Western targets. These attacks include





Special Interest

MCI Course 0210D

2003 Car bombings in Riyadh, Saudi Arabia
2001 Hijacking attacks on the World Trade Center and Pentagon
2000 Bombing of USS Cole
1998 Bombing of U.S. Embassies in Kenya and Tanzania
1993 Links to bombing of World Trade Center

1994 Bombing of Jewish community center
1992 Bombing of Israeli embassy
1985 Hijacking of TWA flight 847
1983 Bombing of Marine Barracks Beirut, Lebanon

Special interest groups include people on the radical fringe of many legitimate causes such as antiabortion views, animal rights, and radical environmentalism. Although many of the groups may have some valid arguments, their approaches to expressing their concerns may not be. These groups believe that violence is morally justifiable to achieve their goals. As a result, such groups are labeled as terrorist groups.

1-13

Study Unit 1, Lesson 2

Immediate
Achievement

Rarely does one act of terrorism achieve a group’s long-term objectives.
Each act usually achieves a specific objective. This objective may satisfy an immediate concern or may be a step in achieving a long-term objective. The following are all immediate objectives of terrorism:











Recognition
Overreaction by the government
Harassment, weakening, or embarrassment of government security forces
Theft or extortion of money or equipment
Destruction
Discouraging foreign investment or assistance programs
Influencing government decisions
Freeing prisoners
Satisfying vengeance
Turning the tide in guerilla warfare

Recognition

Terrorists seek to obtain worldwide, national, or local recognition for their cause. This vital publicity advertises the movement, bringing national and international attention to their grievances. It attracts money, international sponsorship, and recruits to their cause.

Overreaction by the
Government

An overreaction to terrorist activities will usually lead the government to restrict the liberties of the local populace by instituting special anti-terrorist laws that allow searches without warrants, detention of citizens without charges, curfews, and travel restrictions. People view these acts as violations of their rights, creating an atmosphere more sympathetic to the terrorist.

Government
Security Forces

Calling in false alarms, killing security personnel, and conducting sophisticated raids and ambushes reduces and diminishes public confidence in the government’s ability to adequately protect them.
Continued on next page

MCI Course 0210D

1-14

Study Unit 1, Lesson 2

Immediate, Continued
Extortion of
Money

Successful terrorist operations bring the organization needed funds, equipment, and international support, especially weapons and ammunition essential to the cause.
The largest ransom ever paid for a single individual is $14.2 million. It was paid by the Exxon Corporation for the release of Victor Samuelson, a company executive who was working in Argentina in 1974. In 1975, a
German industrialist for the release of his two sons paid $60 million to the
Montonero Peronist Movement.

Destruction

Often the public views the destruction of a building or disruption of lines of communication as the final goal of terrorism; this is not the case. By destroying facilities or disrupting lines of communication, terrorists can isolate entire segments of the population, thereby hindering the government’s ability to control the violence. Once isolated, the terrorists can move into the area, spread propaganda, and serve as the sole support element to the isolated population. Discouraging
Foreign
Investments

Terrorist attacks against foreign businesses often end with the business pulling out and departing the host country for a safer area. When this occurs, thousands of local nationals instantly become unemployed causing tremendous strain upon the government to provide assistance; which in many cases it cannot. The local populace, with no means of feeding themselves or their families, become hostile towards the existing government, and become susceptible to recruitment by the terrorist organization.

Influencing
Government
Decisions

The sole purpose of this objective is to find a way to persuade a government or legislation to support the cause of the terrorist. There is little doubt that the bombing of the Marine Barracks in Beirut influenced our government to eventually withdraw the Marines.
In Italy, repeated assassinations of public officials by the “Red Brigades” have influenced law enforcement and judicial processes concerning terrorism.
Former President of El Salvador, Jose Duarte, softened his hard-line “no negotiation” stance when terrorists kidnapped his daughter in 1985.
Continued on next page

MCI Course 0210D

1-15

Study Unit 1, Lesson 2

Immediate, Continued
Freeing
Prisoners

Freeing prisoners is a frequent demand of terrorists, especially airline hijackers. Usually, the demand is for the release of fellow terrorists who have been imprisoned or are awaiting trial.
The three members of the “Black September” organization, who were convicted and jailed for their role in the murder of 11 Israeli athletes at the
1972 Munich Olympics, were released when their comrades skyjacked an aircraft. They spent only 30 days in jail for their crime.

Satisfying
Vengeance

The most brutal acts of terrorism are reserved for informants or other traitors.
Some terrorist groups can be extremely brutal when it comes to punishing its members. Mutilation, beheadings, and torture tactics are commonplace when achieving this immediate objective.
The Irish Republican Army uses a punishment known as “kneecapping” to serve as a lasting reminder to those who have been considered traitors.

Guerilla
Warfare

MCI Course 0210D

Terrorism is an integral part of insurgency. In rural areas, it is usually used to punish government supporters. In urban areas, it can also divert government troops from the countryside where they are needed to fight.

1-16

Study Unit 1, Lesson 2

Long-Term
Staying the
Course

As a Marine, you should be well-versed in observing what terrorists are hoping to accomplish. It is imperative that you are able to distinguish between immediate objectives and long-term objectives. Identifying immediate objectives will assist you in preventing long-term objectives.
Long-term objectives fit into at least one of the following categories:
1. Revolutionary
2. Sub-revolutionary
3. Establishment

Revolutionary

A terrorist’s objective is revolutionary when their intent is to help bring about the complete overthrow of an incumbent government. The threat may come from within a country, or from outside. Some terrorists are anarchists. Their purpose is to use violence to achieve world revolution and to eliminate all governments. SubRevolutionary

A terrorist’s objective is sub-revolutionary when it is intended only to influence a government or other groups of people to change against their will.
The sought after changes are usually of a political, social, or economic nature.
Special interest groups want to change the government policy on specific issues. Their long-term goals also fit into this category.

Establishment

MCI Course 0210D

A terrorist’s objective is categorized as an establishment when the use of terrorism is directly controlled or at least tolerated by a particular state to attack enemies of the government. This use of terrorism can be directed at either foreign or domestic enemies.

1-17

Study Unit 1, Lesson 2

Lesson 2 Exercise
Directions

Complete items 1 through 14 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

Name the four motives for terrorism.
1. __________________________________________________________
2. __________________________________________________________
3. __________________________________________________________
4. __________________________________________________________

Item 2 Through
Item 14

For items 2 through 14, place either an “I” for an immediate objective, or “L” for a long-term objective next to the item.
____2.
____3.
____4.
____5.
____6.
____7.
____8.

Recognition
Harassment
Overreaction
Destruction
Theft
Influence Governments
Discourage Assistance

____9.
____10.
____11.
____12.
____13.
____14.

Free Prisoners
Turn Tide in Guerilla War
Satisfy Vengeance
Revolution
Establishment
Sub-Revolutionary

Continued on next page

MCI Course 0210D

1-18

Study Unit 1, Lesson 2 Exercise

Lesson 2 Exercise, Continued
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
1






2
3
4
5
6
7
8
9
10
11
12
13
14

MCI Course 0210D

1-19

Answer
Political Ideologies
Nationalism
Religion
Special Interests
I
I
I
I
I
I
I
I
I
I
L
L
L

Reference Page
1-12

1-14
1-14
1-14
1-15
1-15
1-15
1-15
1-16
1-16
1-16
1-17
1-17
1-17

Study Unit 1, Lesson 2 Exercise

(This page intentionally left blank.)

MCI Course 0210D

1-20

Study Unit 1, Lesson 2 Exercise

STUDY UNIT 2
TERRORIST DOCTRINE
Overview
Scope

Terrorism is an indiscriminate crime that comes in varying forms of threats and violence.
Study Unit 1 provided you with a basic knowledge of terrorism, identifying the background, and the objectives of terrorism. In this study unit, you will learn 




What is considered a terrorist operation
The different types of terrorist targets
The organizational structure of a terrorist group
How terrorists train

After completing this study unit, you should be able to determine how a terrorist operates, and identify ways to establish yourself as a hard target.

In This Study
Unit

The following lessons are in this study unit:
Lesson
Operations
Targets
Organization of Terrorist Groups
Training

MCI Course 0210D

2-1

See Page
2-3
2-17
2-27
2-35

Study Unit 2

(This page intentionally left blank.)

MCI Course 0210D

2-2

Study Unit 2

LESSON 1
OPERATIONS
Introduction
Scope

Terrorist operations are usually well thought out and executed by specially trained and organized clandestine elements. Strict security techniques are followed once a target is selected, and team members are not brought together until the final rehearsal phase. In this lesson, you will learn the definition and details of each phase of a terrorist operation, and the types of operations commonly associated with terrorism.

Learning
Objectives

Upon completion of this lesson, you should be able to



Identify the phases of a terrorist operation.



In This Lesson

Define a terrorist operation.

Identify common terrorist operations.

The following topics are in this lesson:
Topic
Introduction
What is a Terrorist Operation?
Phases
Types
Lesson 1 Exercise

MCI Course 0210D

2-3

See Page
2-3
2-4
2-5
2-7
2-13

Study Unit 2, Lesson 1

What is a Terrorist Operation?
Definition

A terrorist operation is defined as any criminal act carried out by a person or group to gain attention for a cause, by using terror-causing tactics to raise capital or obtain equipment for future operations.

Copycat

It is always important to determine the types of operations terrorist groups normally use. When a terrorist group successfully employs a certain method of operation, the group will likely reuse it in the future.
When other terrorist groups identify an effective operation, they may copy the techniques employed and use them for their own operations.
A prime example of “copycat” techniques is the recent string of anthrax scares throughout the United States. Aside from a small number of genuine anthrax contaminations, there have been thousands of hoaxes in the form of talcum powder or sugar being mailed in suspicious looking packages to national and local leaders. Once other terrorists realized they did not need the real thing to achieve the desired outcome, they jumped on the bandwagon in attempt to disrupt the lives of others.

MCI Course 0210D

2-4

Study Unit 2, Lesson 1

Phases
Five Phases

Terrorist operations are broken down into five phases:
1.
2.
3.
4.
5.

Pre-incident
Initiation
Negotiation
Climax
Post-incident

Understanding each of these phases will assist you in detecting and ultimately preventing terrorist operations.

Pre-Incident

During this phase, activities by terrorist groups are meticulously conceived and prepared by command elements. You will learn more about command elements later in the course. Activities include reconnaissance missions, lengthy periods of training, and rehearsals. Small, special units conduct target and area reconnaissance missions. Different elements of the group will work independent of the other without knowing members of either team, until just before the operation takes place.

Initiation

This is the movement to target phase, and when the actual action takes place.
Movement to the target is covert. Individual terrorists leave for the target singly or in pairs along separate routes. When necessary, they use false passports and names. Weapons and other items are sent separately to prearranged locations where they are given to terrorists involved in the operation. Countries sympathetic to terrorist causes have allowed items to be carried in diplomatic pouches with agents taking them from the embassy to a prearranged site.

Negotiation

When terrorists decide that a hostage/barricade or another similar event is worthwhile, they may use the negotiation phase to gain publicity.
Negotiations may include certain specific demands that often require intergovernmental negotiations at the highest level. There may be trade-offs, especially if the demands are more than the government is able to meet.
Note: If the terrorists do not take hostages or enter a barricade-scenario, this phase does not occur.
Continued on next page

MCI Course 0210D

2-5

Study Unit 2, Lesson 1

Phases, Continued
Climax

The climax phase immediately follows the initiation phase if there is no negotiation phase. The climax phase signals the end of the incident as far as the terrorists are concerned. The terrorists retreat from the incident and attempt to return to a staging point to begin the post incident phase.

Post-Incident

During the post-incident phase, the terrorist members regroup, critique, and criticize the operation. This is considered to be a very important part of the operation. During this phase, the terrorists learn from and share their successes and failures. The lessons learned are often shared with other groups to improve their operational skills.

MCI Course 0210D

2-6

Study Unit 2, Lesson 1

Types
Commonly
Associated
Operations

Terrorist operations consist of the same types of criminal activities you see daily on the news. Not every incident is the result of terrorism, but the possibility should never be discounted. As you know, terrorist attacks are well planned and rehearsed. All terrorists groups, no matter how they are categorized or what their goal may be, carry out similar operations. The following are operations conducted by terrorists:










Bombings

Bombings
Arson and fire bombings
Vehicle theft
Skyjacking and aircraft theft
Marjacking
Ambush
Kidnapping
Hostage-taking
International narcotics support  Robbery and extortion
 Psychological terror
 Nuclear, biological, and chemical attack  Assassination
 Raids or attacks on facilities
 Commercial or industrial sabotage
 Hoaxes
 Ecological terrorism
 Cyberterrorism

Bombings are the most common type of terrorist operation. Typically, improvised explosive devices (IED) are inexpensive and easy to make.
Modern devices are getting smaller and harder to detect, yet they continue to increase in destructive capabilities. Terrorists can also use materials readily available to the average consumer to construct a bomb.
During Operations Iraqi Freedom and Enduring Freedom, IED attacks were the most effective against coalition forces.

Arson and Fire
Bombings

Incendiary devices are cheap and easy to hide. Arson and fire bombings are easily conducted by terrorist groups that may not be as well organized, equipped, or trained as a major terrorist organization. Arsons or fire bombings against utilities, hotels, government buildings or industrial centers are common tactics used by terrorists to portray an image that the ruling government is incapable of maintaining order.
Continued on next page

MCI Course 0210D

2-7

Study Unit 2, Lesson 1

Types, Continued
Vehicle Theft

Stolen vehicles provide terrorists with a means of delivering explosives that can and most likely will be traced back to the original car owner and not to the terrorist organization.

Skyjacking and
Aircraft Theft

Skyjacking provides terrorists with hostages and draws media attention. An aircraft theft provides terrorists with a tool for conducting kamikaze attacks.
Aircraft mobility and distance make retaliation difficult. Skyjacking also provides an opportunity for terrorists to relocate the aircraft to a country that supports their cause.
Note: On 11 September 2001, commercial airplanes were skyjacked to gain control of the aircraft. The terrorists’ intent was not to create a hostage situation, but to ensure the passengers did not interfere with their desire to crash the aircraft into their intended targets.

Images of 9/11
Attacks

The below graphics depict the horrific attacks on the World Trade Center
Towers in New York City, and at the Pentagon in Washington D.C.
World Trade Center

Pentagon

Continued on next page
MCI Course 0210D

2-8

Study Unit 2, Lesson 1

Types, Continued
Marjacking

Marjacking (also known as maritime theft) provides terrorists with a unique method of intimidating international travelers. Due to a ship’s size and ability to endure long periods of isolation, marjacking presents a variety of benefits to terrorists and risks to legal authorities. While occurrences of marjackings are infrequent, the possibility should not be underestimated.

Ambush

A well-planned ambush provides terrorists with the opportunity to kidnap or assassinate intended victims. An ambush allows terrorists to choose the time and place of the attack. An ambush is easily planned if the victim uses the same routes daily.

Kidnapping

Kidnapping has become a preferred terrorist tactic. Although kidnapping is one of the most difficult acts for a terrorist group to accomplish, if successful, it can gain terrorists money, help release jailed comrades, and provide publicity for an extended period of time.

Hostage-Taking

Hostage-taking involves the seizure of a facility or location and the taking of hostages. Unlike a kidnapping, hostage-taking provokes a confrontation with authorities. It forces authorities to either make dramatic decisions or to comply with the terrorists’ demands. Hostage-taking is overt and designed to attract and hold media attention. The terrorists’ intended target is the audience emotional impact by the hostage’s confinement, not the hostage himself. International
Narcotics
Support

Drug activities are a major financial source for some terrorist groups.
Providing security for narcotics networks in exchange for financial support is a common occurrence.

Robbery and
Extortion

Robbery and extortion is another source of fund raising for terrorist operations. These methods are unnecessary when terrorists receive funding and support from nations sympathetic to their cause.
Continued on next page

MCI Course 0210D

2-9

Study Unit 2, Lesson 1

Types, Continued
Psychological
Terror

Psychological terror alters behavioral characteristics of an individual, group, or organization through the application of sophisticated techniques.

Nuclear,
Biological, and
Chemical
Attack

Nuclear, biological and chemical (NBC) attacks have been almost nonexistent in the past. Due to the extremely high number of casualties that NBC weapons produce, they are also referred to as weapons of mass destruction
(WMD). The increase in development of WMD also increases the potential for terrorist groups to gain access to WMD. It is believed that in the future, terrorists will have greater access to WMD due to unstable nations failing to safeguard their stockpiles from accidental losses, illicit sales, or outright theft or seizure.
Determined terrorist groups can also gain access to WMD through covert independent research efforts or by hiring technically skilled professionals to construct them. Although an explosive nuclear device is believed to be beyond the scope or capabilities of most terrorist groups, chemical, biological or radiological dispersion weapons that use nuclear contaminants are not.

Examples

One example of a terrorist group gaining access to NBC occurred on 20
March 1995, when a Japanese religious cult, known as “Supreme Truth,” chemically attacked citizens in the Tokyo subway system. Use of the nerve agent Sarin resulted in 12 deaths and 5,500 hospitalizations.
Another example occurred in October of 2001 when several letters were mailed to selected U.S. Government and media individuals. The letters contained the biological agent anthrax.
Fear of these biological agents can create as much terrorist value as their actual employment.

Assassination

Assassination is the killing of a selected victim, usually by bombings or small arms. Historically, terrorists have killed specific individuals for a psychological effect.
Continued on next page

MCI Course 0210D

2-10

Study Unit 2, Lesson 1

Types, Continued
Raids or
Attacks on
Facilities

Raids or attacks on facilities are usually undertaken for one of three purposes:


To gain access to radio or television broadcast capabilities to make a statement 

To demonstrate the government’s inability to secure critical facilities or national symbols



For logistical purposes, such as robbery of a bank or armory

Commercial or
Industrial
Sabotage

The objective of most sabotage operations is to demonstrate how vulnerable society is to terrorists’ actions. Industrialized nations are more vulnerable than less developed societies. Utilities, communications, and transportation systems are so interdependent that disruption of any one affects all of them and gains immediate public attention.

Hoaxes

Any terrorist group that has established credibility can employ a hoax with considerable success. A threat against a person’s life causes that person and those associated with that individual to devote time and effort to security measures. A bomb threat can close a commercial building, reduce operations, or delay an aircraft flight at no cost to the terrorist. These types of threats also can increase threat conditions on military installations causing delays and confusion at entry and exit points.
False alarms dull the analytical and operational efficiency of key security personnel, thus degrading readiness.

Ecological
Terrorism

The increasing accessibility of sophisticated weapons and explosives to terrorists has the potential to threaten or damage the environment. Use of large scale IEDs against a variety of targets such as hazardous waste storage sites, nuclear power plants, and electrical controls for petroleum or water pumping facilities, could have far reaching effects well beyond those caused directly by an IED.
Continued on next page

MCI Course 0210D

2-11

Study Unit 2, Lesson 1

Types, Continued
Ecological
Terrorism, continued This tactic proved extremely effective during Operation Iraqi Freedom when insurgents continually attacked oil fields and power plants in hopes of disrupting the rebuilding efforts of the coalition forces. The insurgents attempted to destroy not only the economy in Iraq, but also the image of coalition forces with the Iraqi citizens.

Cyberterrorism

Cyberterrorism is a new, increasing form of terrorism that targets computer networks. Cyberterrorism allows terrorists to conduct their operations with little or no risk to themselves. It also provides terrorists an opportunity to disrupt or destroy networks and computers. The result is interruption of key government or business-related activities. Although this type of terrorism lacks a high profile compared to other attacks, its impact is just as destructive.

MCI Course 0210D

2-12

Study Unit 2, Lesson 1

Lesson 1 Exercise
Directions

Complete items 1 through 16 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

Write the definition of a terrorist operation.
______________________________________________________________
______________________________________________________________
______________________________________________________________

Item 2 Through
Item 6

Matching: For items 2 though 6, match the phase of terrorist operations in column 1 to its description in column 2. Place your responses in the spaces provided. Column 1

Column 2

Phase of Terrorist Operations

Description

___2.
___3.
___4.
___5.
___6.

a. Terrorist members regroup, critique and criticize the operation. b. Terrorists move to their targets.
c. Signals the end of the operation, terrorists retreat.
d. Terrorists decide that a hostage/barricade or another event is a worthwhile endeavor to gain publicity or obtain a demand. e. Activities include reconnaissance missions, lengthy periods of training, and rehearsals.

Pre-incident
Initiation
Negotiation
Climax
Post-incident

Continued on next page

MCI Course 0210D

2-13

Study Unit 2, Lesson 1 Exercise

Lesson 1 Exercise, Continued
Item 7 Through
Item 16

For items 7 through 16, identify the operations commonly associated with terrorism by placing either a Y for yes if the operation is associated with terrorism, or N if the operation is not.
___7.
___8.
___9.
___10.
___11.

Burglary
Kidnapping
Skyjacking
Surveillance
International narcotics support ___ 12.
___ 13.
___ 14.
___ 15.
___ 16.

Intimidation
Beatings/maiming
Bombing
Arson
Genocide

Continued on next page

MCI Course 0210D

2-14

Study Unit 2, Lesson 1 Exercise

Lesson 1 Exercise, Continued
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
1

2
3
4
5
6
7
8
9
10
11
12
13
14
15
16

MCI Course 0210D

Answer
Any criminal act carried out by a person or group to gain attention for a cause by using terror-causing tactics or to raise capital or obtain equipment for future operations. e b d c a
N
Y
Y
N
Y
N
N
Y
Y
N

2-15

Reference Page
2-4

2-5
2-5
2-5
2-6
2-6
2-9
2-9
2-8
2-7 through 2-12
2-9
2-9
2-7 through 2-12
2-7
2-7
2-7 through 2-12

Study Unit 2, Lesson 1 Exercise

(This page intentionally left blank.)

MCI Course 0210D

2-16

Study Unit 2, Lesson 1 Exercise

LESSON 2
TARGETS
Introduction
Scope

Terrorists prefer a soft target, or one that involves little risk and a high probability of success. In this lesson, you will learn the different categories of terrorist targets and ways to establish yourself as a hard target.

Learning
Objectives

Upon completion of this lesson, you should be able to


Identify different categories of terrorist targets.



Identify key characteristics of soft targets.

 Identify key characteristics of hard targets.
 Identify ways to establish yourself as a hard target.

In This Lesson

The following topics are in this lesson:
Topic
Introduction
Categories
Soft Targets
Hard Targets
Lesson 2 Exercise

MCI Course 0210D

2-17

See Page
2-17
2-18
2-20
2-21
2-24

Study Unit 2, Lesson 2

Categories
Different
Targets

Terrorist targets are broken down into four basic categories. Within each category, there are a number of different installations or facility types.
Knowing what is contained in each category will make you more efficient in deciding if your installation, base, or place of employment may be considered for a terrorist attack. The different categories are





Engineering and Energy
Systems

Engineering and energy systems are vital to the survival of economies. If these structures are attacked, the host government takes on the added pressure of providing relief for those affected. These systems include






Communication and Supplies

Engineering and energy systems
Communication and supplies
Transportation
Human

Hydroelectric plants
Offshore oil rigs
Nuclear facility sites
Gas pipelines
Electric power lines

Communication and supply lines can be extremely effective targets for terrorists. Interrupting these can damage progression throughout societies.
This category includes







Communication lines and facilities
Chemical storage sites
Dock facilities
Equipment warehouses
Computer facilities
Weapon storage sites, both conventional and special weapons
Continued on next page

MCI Course 0210D

2-18

Study Unit 2, Lesson 2

Categories, Continued
Transportation

In recent years, transportation has been the category of choice for terrorist attacks. Terrorists use vehicles and aircraft as methods for delivering bombs and inflicting mass casualties. Public transportation is also a prime source for mass casualties. This category includes







Human

Under this category are the individuals that are historically targeted more often than any other. Although you may not fall under one of the groups listed in this category, there is always the possibility that you could be an innocent bystander at the time of an attack. This category includes





Becoming A
Victim

Vehicles
Rail lines
Bus depots
Airports and aircraft
Trucking facilities
Shipyards

Embassy and government employees
Corporate executives
Police
Dependents of the above

You can become a victim of terrorism in any of the following ways:


Victim by location – Being at a certain location when an attack occurs, or a victim of circumstance.



Victim by association – Associating with a person who has been previously selected as a target.



Target of opportunity – Presenting yourself as a target, thereby allowing the terrorists to capitalize on that opportunity.

Increasingly, U.S. citizens are becoming popular terrorist targets as they travel and conduct business throughout the world.

MCI Course 0210D

2-19

Study Unit 2, Lesson 2

Soft Targets
Determination

Terrorists evaluate a target’s security profile, predictability, and value. The target’s value is determined by its importance and possible benefits gained.
Once a target has been evaluated, the target is labeled in the terrorist’s mind as either a soft or hard target.

Characteristics

The following characteristics establish individuals as a soft target:


Unarmed – The victim is not armed or simply displays a lack of willingness to use his/her weapon.



Minimal chance of confrontation with police – The victim’s travel patterns or routines do not take him near police or fire stations, hospitals, friendly embassies, or other safe haven locations.



Accessible – The victim is easy to get to because he/she works in an area with minimum security, travels to high-risk areas alone, or does not consider security measures a major concern. They make it easy for strangers to access their private information (phone numbers, addresses, schedules), often from social media sites.



Predictable – The victim is predictable because he/she follows set routines or patterns.



Unaware – The victim is complacent, not security conscious, and uses no individual protective measures.

MCI Course 0210D

2-20

Study Unit 2, Lesson 2

Hard Targets
Characteristics

The following characteristics establish individuals as a hard target:


Armed – The target is armed with a weapon that is in good working condition and readily accessible. The target is proficient in the use of the weapon and will not hesitate to use it.



Hardened/Escort vehicles – The target’s vehicle is equipped with armor, bullet-resistant glass, alarms, and a two-way radio. The person driving the vehicle will not hesitate to use it as a weapon. When possible, the target makes sure an escort vehicle accompanies him/her with a trained driver and crew.



Hardened residence – The residence has a layered defense. The target’s residential security includes armed guards, roving patrols in the neighborhood, high walls or fences, anti-intrusion devices, lights, watchdogs, etc.



Heightened awareness – The target continually uses and adjusts the level of individual protective measures and does not become complacent.
Always show a constant state of alertness.



Unpredictable – The target avoids routines and varies daily events.
Determines different routes to be taken, times of departure and return, and dining establishments. Being unpredictable causes the terrorist to perceive the target as a hard target.

A terrorist will not attack a hard target unless there are specific orders to do so. In most cases, an easier target will be selected.

Avoid Routine

One of the best ways to establish yourself as a hard target is to avoid forming routines in your daily life.


Routines at home – Picking up the newspaper or mail, walking and feeding the dog, warming up the car, turning lights on or off as you leave or enter your residence. These are all routines commonly practiced at your residence. Attempt to vary these habits on a daily basis. For example, pick your mail up at a different time; when you leave, leave different lights on in different rooms to confuse would-be attackers as to your whereabouts.
Continued on next page

MCI Course 0210D

2-21

Study Unit 2, Lesson 2

Hard Targets, Continued
Avoid Routine, continued 

Routines at work – Constantly traveling the same route to and from work, arriving and departing at a set time, parking in the same spots, going to the same place for lunch, these are all examples of routines we set at work. As a service member, some of these routines may be hard to avoid; however, you must do your best to add variations throughout the work week.

Other Routines



When overseas, Americans like to visit restaurants, bars, and clubs that serve American style food or that has inexpensive prices. They may also patronize an establishment because other Americans go there. Always be extremely cautious in foreign countries and research the threat in the vicinities you frequent.



Military personnel tend to form routines in physical fitness training, such as having set times and places to work out, or follow the same routes when running. Do what you can to vary your workout regimen. Run different routes, utilize the morning, afternoon, and evenings for workout sessions. 

Many people affected by human nature, will stop to render aid at a roadside emergency. Some countries even require by law that you stop and render assistance. If you happen to come across a roadside emergency, assess the situation. If time permits, contact the proper authorities and wait for help to arrive. If the situation appears to be a matter of life or death, make a rational decision, and then if you decide to provide help or assistance, use as much caution as possible.
Continued on next page

MCI Course 0210D

2-22

Study Unit 2, Lesson 2

Hard Targets, Continued
Other
Considerations

Becoming a hard target also takes into account another consideration; what and how much value can the terrorists expect to gain from attacking you?


Importance – How important are you? What publicity will the terrorists gain for their cause?



Terror generated – How much terror will be generated as a result of the attack? 

Ransom – Can the terrorists receive a ransom for you?



Free comrades – If the terrorists take you hostage, will the demands for the release of their comrades be met?



Safe escort – Can the terrorists obtain safe passage? If all else fails, or in addition to their other demands, the terrorists will demand safe passage to an area of their choice.

Whether you become a hard target or a soft target is entirely up to you. Try to create an amount of risk and work so high, with the probability of success so low, that the terrorists will leave you alone and select another target.

MCI Course 0210D

2-23

Study Unit 2, Lesson 2

Lesson 2 Exercise
Directions

Complete items 1 through 4 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

The different categories of terrorist targets include ________________, communication and supplies, transportation, and humans.
a.
b.
c.
d.

Item 2

weapons sites factories engineering and energy systems military headquarters

What are three characteristics of a soft target?
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________

Item 3

What are three characteristics of a hard target?
______________________________________________________________
______________________________________________________________
______________________________________________________________

Item 4

What is one of the best ways to establish yourself as a hard target?
_____________________________________________________________
_____________________________________________________________
Continued on next page

MCI Course 0210D

2-24

Study Unit 2, Lesson 2 Exercise

Lesson 2 Exercise, Continued
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
1
2

Answer c Any three of the following: Reference Page
2-18
2-20




3

Unarmed
Minimal chance of confrontation with police  Accessible
 Predictable
 Unaware
Any three of the following: 2-21




4

MCI Course 0210D

Armed
Hardened/Escort
vehicles
 Hardened residence
 Heightened awareness  Unpredictable
One of the best ways to establish yourself as a hard target is to avoid forming routines in your daily life.

2-25

2-21

Study Unit 2, Lesson 2 Exercise

(This page intentionally left blank.)

MCI Course 0210D

2-26

Study Unit 2, Lesson 2 Exercise

LESSON 3
ORGANIZATION OF TERRORIST GROUPS
Introduction
Scope

Regardless of the final objective, terrorist organizations act on the same principles. In this lesson, you will learn how terrorist groups are organized as well as the common characteristics associated with terrorist groups.

Learning
Objectives

Upon completion of this lesson, you should be able to



Identify common characteristics terrorist groups share.



In This Lesson

Identify the role(s) or function(s) of each cell within a terrorist group.

Identify the structure of a terrorist group.

The following topics are in this lesson:
Topic
Introduction
Analysis
Common Characteristics
Lesson 3 Exercise

MCI Course 0210D

2-27

See Page
2-27
2-28
2-31
2-32

Study Unit 2, Lesson 3

Analysis
Structure

Due to the clandestine nature of terrorist groups, a great deal is unknown about their internal organization. Many groups today have adopted the cellular structure brought about by the Tupamoro Organization that was active in Uruguay in the early 1970s. In this organization, the basic operational unit of the terrorist group was known as a cell. The number and size of the cells will depend on the following factors:




Function of the cell
Security measures employed by the government
Sophistication of the group

Function of the
Cell

Terrorist cells are task organized for specific missions. A cell whose purpose is solely to construct explosive devices may only consist of one or two specifically trained individuals. They do not plant the devices they construct nor do they determine targets or participate in any other function of the organization. Conversely, a group that is planning a kidnapping will require a large number of cells with different missions, all supporting the final objective. Sometimes cells have no knowledge of the operation of any other element in the group. The size of the cell will vary depending on the operation; however, a working figure of 3 to 5 people per cell is normally used. Security
Measures
Employed by the
Government

When governments employ strict security measures, this becomes a factor when determining the size of the terrorist cell. Strict measures usually require the terrorist organization to operate with smaller, easier to control cells. It is much more difficult to track down and break a small cell with a decentralized command and control than a group with a large and often cumbersome centralized command and control.

Sophistication of the Group

The level of experience that a group has perpetrating terrorist acts will increase its level of sophistication. A more sophisticated terrorist group will have an intricate clandestine communication system in place. This minimizes the need for face-to-face communication, and enhances the covert nature of their intended operation. A less sophisticated or experienced group will not have such a communication system in place; however, over time these systems are sure to develop.
Continued on next page

MCI Course 0210D

2-28

Study Unit 2, Lesson 3

Analysis, Continued
Category of
Cells Within a
Terrorist
Group

Whether large or small, terrorist groups are all composed of the following cells: 






Command cell
Operational and clandestine cell
Intelligence cell
Support cell
Reconnaissance cell
Assault cell

Each of these cells performs its own specific role or function based on the mission of the terrorist group.

Command Cell

The command cell provides the command and control element and oversees all decisions of the terrorist group. The command cell is responsible for the structure and security of the terrorist group. All plans are carried out according to the plans and orders laid out by this cell.

Operational and Clandestine
Cell

The Operational and Clandestine (O&C) cell is the building block for which all groups are formed. This cell is the action arm of the terrorist group. In sophisticated groups, this cell may be highly specialized. In new or less sophisticated groups, the O&C cell may have to conduct a wider range of activities. Under the control of the O&C cell are the intelligence cell, the support cell, the reconnaissance cell, and the assault cell.

Intelligence
Cell

The intelligence cell collects and processes information on potential targets and develops specific intelligence relevant to targeted facilities, installations, and personnel including their security. This information is given to the group leaders for operational planning. The intelligence cell is highly compartmentalized and follows very strict security procedures. Because of the important role these persons play in the organization, they are often protected from exposure during an actual operation. Members of the intelligence cell often possess a greater knowledge of the inner workings and structure of the organization.
Continued on next page

MCI Course 0210D

2-29

Study Unit 2, Lesson 3

Analysis, Continued
Support Cell

The support cell is also known as the auxiliary cell. The support cell is responsible for fundraising, gathering sympathizers, screening recruits, and distributing propaganda. This cell usually performs logistical functions for the group. It is often made up of professionals, such as doctors, lawyers, bankers, and others who may be dedicated to the ideals of the movement, but not to the extent that they are willing to sacrifice their professional status.

Reconnaissance
Cell

The reconnaissance cell provides pre-strike, eyes-on information about the intended target. Information such as the target’s home layout, types of vehicles, route studies, and any other personal or professional information necessary to access the target. This cell works hand in hand with the intelligence cell in building operational plans.

Assault Cell

The assault cell is the cell that actually carries out the mission. The assault cell is further broken down into three teams:


Command team – Provides leadership and ensures discipline is maintained throughout training and the actual assault. This team provides on-site command and control.



Assault team – The assault team carries out the operation.



Security team – The security team provides security for the assault team’s training site. A security team may be in the background when an operation is taking place, to ensure nothing prevents the assault team from successfully completing the mission.

Hierarchy of a
Terrorist
Group

Command
Cell
Operational &
Clandestine Cell

Intelligence
Cell

Support
Cell

Reconnaissance
Cell

Command
Team

MCI Course 0210D

2-30

Assault
Cell

Assault
Team

Security
Team

Study Unit 2, Lesson 3

Common Characteristics
General
Terrorist
Group

Regardless of the final objective, terrorist groups all have certain common characteristics. Terrorist groups


Promote fear – Terrorist groups seek to intimidate populations by promoting and spreading fear.



Are militarily weaker – Even though some groups have achieved a high level of sophistication and are heavily armed, they remain weaker than the governments they fight. This means that they must resort to hit-and-run, guerilla tactics and will be reluctant to take up a static defensive posture against a stronger enemy unless they possess a “bargaining chip” such as hostages. When a group loses militarily, it also loses the image of invincibility and power it strives to foster. They are offensive by nature, not defensive.



Do not equate tactical success with mission success – Although the terrorist group may suffer personnel losses or fail to achieve it’s desired result in the execution of an operation, it may still be considered a success if it achieves favorable publicity for the cause.



Are usually urban based and highly mobile – Being urban based affords the terrorists all the benefits of modern society; communication, mass transportation, money laundering, and international contacts who may have access to documents needed to travel frequently to other cities and countries in search of safe havens and support.



Usually operate covertly – Although some large organizations have overt politically oriented members, most are of a clandestine nature, which enhances their flexibility and effectiveness. This can also become a problem. Terrorist operatives are required to remain underground for extended periods, while at the same time operating an intricate support and operation system. Sometimes this will lead to mistakes on the part of terrorists allowing evasive action to be taken by the intended target, and sometimes leads to the capture of the group.

MCI Course 0210D

2-31

Study Unit 2, Lesson 3

Lesson 3 Exercise
Directions

Complete items 1 through 9 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

The ________________ cell collects and processes information on potential targets and develops specific intelligence relevant to targeted facilities, installations, and personnel including their security.

Item 2

The ________________ cell is responsible for fundraising, gathering sympathizers, screening recruits, and distributing propaganda.

Item 3 Through
Item 8

For items 3 through 8, identify the six cells of a terrorist group by filling in the chart below.
3)_________
Cell

4)______________
Cell

5)__________
Cell

Item 9

6)_________
Cell

7)______________
Cell

8)_________
Cell

Name three of the five common characteristics of terrorist groups.
____________________________________________________________
____________________________________________________________
____________________________________________________________
Continued on next page

MCI Course 0210D

2-32

Study Unit 2, Lesson 3 Exercise

Lesson 3 Exercise, Continued
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
1
2
3
4
5
6
7
8
9

MCI Course 0210D

Answer
Intelligence
Support
Command
Operational &
Clandestine
Intelligence
Support
Reconnaissance
Assault
 Promote fear
 Are militarily weaker  Do not equate tactical success with mission success  Are usually urban based and highly mobile  Usually operate covertly 2-33

Reference Page
2-29
2-30
2-30
2-30
2-30
2-30
2-30
2-30
2-31

Study Unit 2, Lesson 3 Exercise

(This page intentionally left blank.)

MCI Course 0210D

2-34

Study Unit 2, Lesson 3 Exercise

LESSON 4
TRAINING
Introduction
Scope

Terrorist operations are paramilitary in nature so it is not surprising that there are many similarities in the training of terrorists and in the training of Special
Operations Forces of the United States. In this lesson, you will learn the different types of terrorist training as well as the aspects of a terrorist training program. Learning
Objectives

Upon completion of this lesson, you should be able to
 Identify the difference between internal and external training.
 Identify the aspects of a terrorist training program.

In This Lesson

The following topics are in this lesson:
Topic
Introduction
Types
Program
Lesson 4 Exercise

MCI Course 0210D

2-35

See Page
2-35
2-36
2-37
2-39

Study Unit 2, Lesson 4

Types
Orientation

Terrorist training missions, being paramilitary in nature, are oriented to the mission, area of operation, and the security environment in which the operation will take place. Most of the training is standardized. Historically, works such as the “Mini-manual for the Urban Guerilla,” by Brazilian terrorist Carlos Marighella, and the writings of revolutionary leaders Mao
Tse-tung, Che Guevara, and Fidel Castro are used as instructional texts and indoctrination material. Discipline is strictly enforced and trainees are closely monitored for signs of weakness in their ability or ideological commitment.
There are two types of training available to terrorists:



Internal training
External training

Internal

Internal training is conducted at the cellular level by members of the group within the target country usually in a clandestine fashion. Internal training is similar to squad or fire team level training in the U.S. military in that one person possesses a particular expertise and trains the remainder of the unit locally. If secure areas are available, permanent facilities will be constructed.
If no secure environment can be found within the operational area, training will be conducted in safe-houses and in a clandestine manner.

External

Non-group members outside of the operational area conduct external training.
External training can take on two different forms.


First − The operatives may travel abroad, individually or in small groups, to training camps or other permanent installations for their training. Once the training has been completed, the terrorists will return to their home territory to put their training into practice.



Second − An operational element from a terrorist group travels intact, as a unit to the external training area in another country. This training is designed for a specific operation, an airport attack for example, and is conducted in mock-ups of the actual attack site. From the training location, the terrorists deploy directly to the operational area to conduct the act.

MCI Course 0210D

2-36

Study Unit 2, Lesson 4

Program
Typical
Training

As stated earlier, terrorist training is similar to the types of training the United
States Special Operations Forces receive. Terrorists are known to capitalize on the open nature of our society and our willingness to publish potentially damaging material. Material such as the “Anarchists Cook Book,” “Poor
Man’s James Bond,” and versions of special forces operation manuals are examples of damaging material. This material instruct individuals on how to build bombs, how to counterfeit money, perform different types of fraud, and so on. If anyone can order these books through open sources, we must assume that terrorists have also bought and used them. A typical training regimen consists of the following items:





Physical and Mental
Conditioning
Weapons and Explosives
Training
Political Indoctrination
General/Specific Tactics and
Combat Training






Tradecraft
Psychological Warfare
Survival
Communications

Physical and
Mental
Conditioning

Physical conditioning is used to ensure that the terrorist is able to withstand the rigors of anticipated activity to complete the mission. Mental conditioning is used to put the terrorist in the proper mindset when placed in stressful situations or even to resist interrogations if captured.

Weapons and
Explosives
Training

Weapons’ training is a basic factor for all terrorists. Terrorists need to know how to employ a variety of weapons in a split second. Employment of conventional and improvised explosives has become a method of choice for terrorist attacks.

Political
Indoctrination

This is intended to plant or reinforce the ideals of the group within the individual member. Basic seminars on ideology and advanced theoretical classes for the leadership can be expected.

General/Specific
Tactics and
Combat
Training

General tactics and combat techniques learned from military manuals enhance the effectiveness of the group. A group planning on conducting a hostage barricade will certainly want to know how to employ their weapons effectively, what techniques the authorities may use against them, and how they can best counteract those techniques. Continued on next page

MCI Course 0210D

2-37

Study Unit 2, Lesson 4

Program, Continued
Tradecraft

Tradecraft training teaches the terrorist to do things such as emplacing or recovering caches or perhaps opening someone’s mail, photographing the contents and reseal-ing the envelope without the recipient knowing it has been tampered with. Covert entry into a victim’s home or office, as well as wire-tapping may also be learned.

Psychological
Warfare

Psychological warfare enables the terrorist to select his exact audience.
Learning how to deal with different types of people will aid in the effectiveness of the operation. Terrorists develop ways to instill fear in groups of people and elicit sympathy from others.

Survival

Survival is not always associated with hardships that must be endured in deep jungles or searing desert heat. It also pertains to operations within towns or villages within the targeted country. Terrorists may have points of contact and safe-havens in the local populace and not stand out and risk compromise.

Communication

Communication is the cornerstone of any good operation. Terrorists need to know how to utilize various methods of communications, from the basic telephone, to the internet, even satellites, and other means of communication.

MCI Course 0210D

2-38

Study Unit 2, Lesson 4

Lesson 4 Exercise
Directions

Complete items 1 through 4 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

What is the difference between internal and external terrorist training?
_____________________________________________________________
_____________________________________________________________
_____________________________________________________________

Item 2

Terrorists are placed through mental _______________ training to resist interrogations if captured.

Item 3

Emplacing or recovering caches or perhaps opening someone’s mail is known as ___________________ training.

Item 4

Communication is the _________________ of any good terrorist operation.
Continued on next page

MCI Course 0210D

2-39

Study Unit 2, Lesson 4 Exercise

Lesson 4 Exercise
Answers

The table below provides the answers to the exercise items. If you have any questions about the items, refer to the reference page.
Item Number
1

2
3
4

MCI Course 0210D

Answer
Internal training is conducted within the country by the terrorist unit. External training is conducted in another country by non-group members. conditioning tradecraft cornerstone 2-40

Reference Page
2-36

2-37
2-38
2-38

Study Unit 2, Lesson 4 Exercise

STUDY UNIT 3
DETECTING TERRORIST SURVEILLANCE
Overview
Scope

Terrorist attacks are normally meticulously planned, allowing for the greatest chance of success and safe escape for the terrorists.
Study Unit 2 taught how terrorists operate, the importance of establishing yourself as a hard target, and determining ways to avoid becoming a victim of a terrorist attack. Equally important is being able to detect terrorist surveillance. The faster you can detect possible surveillance, the easier it is to prevent an attack. In this study unit, you will learn how to detect terrorist surveillance In This Study
Unit

The following lessons are in this study unit:
Lesson
Surveillance
Techniques Employed

MCI Course 0210D

3-1

See Page
3-3
3-13

Study Unit 3

(This page intentionally left blank.)

MCI Course 0210D

3-2

Study Unit 3

LESSON 1
SURVEILLANCE
Introduction
Scope

Reducing your vulnerability and enhancing personal security is vital to your efforts to deter terrorist attacks. In most cases, the target that terrorists select to attack is based on lengthy surveillance. In this lesson, you will learn what surveillance is, the different methods of surveillance and how those methods are employed.

Learning
Objectives

Upon completion of this lesson, you should be able to
 Identify the definition of surveillance.
 Identify different methods of surveillance.
 Identify the most difficult type of surveillance method to employ.
 Identify the phases of surveillance.

In This Lesson

The following topics are in this lesson:
Topic
Introduction
What is Surveillance?
Methods
Phases
Lesson 1 Exercise

MCI Course 0210D

3-3

See Page
3-3
3-4
3-6
3-10
3-11

Study Unit 3, Lesson 1

What is Surveillance?
Definition

Surveillance is the continuous or periodic act of observing, usually by surreptitious means, a person, a place, or an object for the purpose of obtaining information, otherwise unavailable or impractical to obtain.
Surveillance is more than just the simple act of following or trailing someone.
Through surveillance, terrorists hope to learn about your habits and assess where and when you are most vulnerable.

Objective

Simply put, the objective of surveillance is to gather all information possible on a particular subject so that the data can be utilized in a plan of action. This greatly enhances the likelihood of a successful operation.

General Items

Overall there are general items of information that terrorists hope to gather during surveillance, preferably information on the subject’s





Residence or worksite
Mode of transportation
Routes to and from work
Routine behavior






General security awareness
Places frequented
Types of protective measures used
Security forces in the area

Residence or
Worksite

Statistics show that most terrorist attacks occur near the residence or worksite.
Therefore, it is very difficult for the subject to remain unpredictable near these locations. Terrorists need to gather as much information as possible for them to be intimately familiar with the areas surrounding these locations.
Planning will be quite different if the subject resides in a rural area rather than an urban area. Terrorist must take into account all the variables that are likely to affect their tactical planning.

Mode of
Transportation

The majority of terrorist attacks directed against Americans involve automobiles. This makes it essential for terrorist surveillants to obtain as much information as possible about a subject’s mode of transportation. Use of a privately-owned vehicle, car pools, chauffeured vehicles, or public transportation will all have different effects on the terrorist’s tactical planning.
Continued on next page

MCI Course 0210D

3-4

Study Unit 3, Lesson 1

What is Surveillance?, Continued
Routes To and
From Work

An in-depth knowledge of routes the subject uses to travel to and from work or to other static locations that the subject frequents on a recurring basis is very helpful to a terrorist. The planning will be quite different if the subject uses rural or isolated routes rather than on major highways and urban areas.

Routine
Behavior

The aspect of the subject’s everyday routine will have the strongest impact on whether or not the subject will become a target. Without a doubt, the more predictable the subject is, the easier it will be for the terrorists to accomplish their operation.

General
Security
Awareness

The subject’s general security awareness is of prime importance to the terrorists. If the subject continues to be unaware of a threat or even denies it exists, the terrorist’s planning will be that much simpler.

Places
Frequented

Information about places the subject frequently visits will come into play when determining the method of surveillance that will be used. This information is also necessary to figure out possible disguises or the type of ruse that may be needed to accomplish the mission.

Types of
Protective
Measures Used

The type of protective measures used is absolutely critical information for the terrorists’ planning. This includes information on security systems employed at the subject’s residence and at the workplace (guards, roving patrols, closedcircuit TV, dogs, etc.).

Security Forces in the Area

The location, reaction time, and type of police or security forces that could respond to an attack on the subject are of vital importance to the terrorist.
This will affect the entire planning process to include weapons used, defense tactics, escape routes, and time hacks. If security is extremely high, the terrorists will not take the risk.

MCI Course 0210D

3-5

Study Unit 3, Lesson 1

Methods
Multiple

There are multiple methods of surveillance used by terrorists. Whether it is stationary or moving, eavesdropping, monitoring, and even searching through garbage and personal effects, a terrorist is constantly trying to collect as much information as possible. Becoming more familiar with the techniques used for surveillance, you can become more efficient in detecting surveillance at an early stage.

Common

Stationary or fixed surveillance is the most common method employed by the terrorist organization. Many terrorist attacks take place near the residence of the intended target because that is the part of the daily routine that is the least varied. People are more vulnerable in the mornings when departing for work, and departure times are more predictable than evening arrivals.

Fixed

Hotel rooms, apartments, houses, offices, and businesses – Although these are seldom easy to acquire, fixed locations provide the surveillants the best defense against detection. However, acquisition of a fixed location usually leaves a paper trail to the terrorist.

Stationary

Vans, utility vehicles, and automobiles – Terrorist organizations will use stationary vehicles to conduct their surveillance. Vans with windows that allow outside observation make good surveillance platforms. When vans are used, more than likely there will be some sort of business logo attached to provide a reason for being in the area.

Utilizing Ruses

When conducting surveillance, terrorists must have a plausible reason for being in the area. This ruse or cover for action is only limited to the imagination of the terrorist. Commonly used ruses include:
 Person having automobile problems  Salesperson
 Priest





Individuals walking a dog/pushing a baby carriage
Utility/Construction worker
Police officer

Women or children are often used to give the greater appearance of innocence. Continued on next page

MCI Course 0210D

3-6

Study Unit 3, Lesson 1

Methods, Continued
Moving

En route or moving surveillance is the most difficult type of surveillance to conduct. To accomplish this type of surveillance, the terrorist must place individuals or vehicles close to the subject, while the subject is moving.
Moving surveillance can be accomplished on foot or in a vehicle.

Foot

One or more individuals may undertake foot surveillance. Surveillants must remain relatively close to the subject. This makes one-person surveillance fairly easy to detect. Surveillance by two or more people is more complicated to accomplish, and although it provides greater flexibility, it also requires more training. The organization of a foot team usually requires at least three but no more than eight operators, with five or six being ideal.

Vehicle

Vehicle surveillance is more commonly used against Americans than foot surveillance primarily because as Americans, we are more likely to travel by vehicle than on foot. Like foot surveillance, one or more vehicles may undertake vehicle surveillance. Vehicle surveillance requires a high degree of sophistication and training.


At a minimum in one-person surveillance, the person in the vehicle must have a tape recorder.



If no recorder is available, then two people are required in each vehicle; one to drive, the other to act as an observer/recorder.



Five or six vehicles are ideal with two or more operators in each vehicle.



The vehicles used are generally common to the area and have no distinguishing marks.



Additionally, if more than one vehicle is employed, radio communications among the vehicles are mandatory.
Continued on next page

MCI Course 0210D

3-7

Study Unit 3, Lesson 1

Methods, Continued
Leading

In leading surveillance, the surveillants travel in front of the subject while the observer watches for turns. When the subject turns, the observer makes a note of the turn. The next time the subject is surveyed, the surveillants make a turn where the subject previously made the turn. Over a period of time, the surveillants will discover the entire route.

Progressive

The following two methods are used to conduct progressive surveillance:
1. In the first method, individuals are placed at key intersections along the probable route of the subject. When the subject turns, it is noted, and the positions of the surveillants are adjusted on subsequent occasions. This method, while more secure from the surveillants’ point of view, is time consuming and very manpower intensive.
2. The other progressive surveillance method is more commonly used. In this method, the surveillants follow the subject in a vehicle. When the subject turns, it is noted. On the next occasion, the surveillants pick up the subject where the turn previously occurred.
Both methods will eventually uncover the entire route, but they also maintain a minimal chance of compromise. That is why it is important to vary your routes on a regular basis.

Technology

With the advances in technology, terrorists have readily available to them numerous devices to assist their surveillance efforts. These include, but are not limited to






Cameras (still and video)
Vehicle tracking devices (LoJack)
Listening/recording devices
Computers
GPS systems

These devices can be used to assist in identifying a prospective target and recording his/her movements. They may also be used to record the security procedures employed by the subject.
Continued on next page

MCI Course 0210D

3-8

Study Unit 3, Lesson 1

Methods, Continued
What to Expect

In a terrorist environment, you can expect to have a combination of all the surveillance techniques employed against you. Stationary surveillance at your residence, vehicular surveillance while you are moving, and electronic surveillance recording all of your activity.

MCI Course 0210D

3-9

Study Unit 3, Lesson 1

Phases
Target
Assessment/
Selection

The first phase in terrorist surveillance is known as the Target Assessment/
Selection phase. During this phase the terrorist group will compile a list of potential targets based on the group’s objectives and capabilities. The group will then determine who is the most vulnerable to attack, and when. If the list of potential targets is large, the group may have to resort to outside assistance to obtain the information the group needs to make the final target selection.
This phase of surveillance is the weakest link in the operational planning primarily because of two factors:




Attack/
Operational

The amount of information needed to make a proper assessment of the potential targets requires the surveillance to continue for a substantial period of time.
The necessity for the terrorist group to go outside the cadre for assistance in obtaining the necessary information usually results in newer, less experienced surveillance personnel. They may or may not know the reason for the surveillance, and are usually selected for their ability to pass a police inspection.

The second phase in terrorist surveillance is known as the Attack/
Operational phase. This phase begins after the target is selected. The routines and patterns are already known so surveillance is now reduced. At this point, the most experienced members of the terrorist organization normally conduct the surveillance. Detection now becomes extremely difficult and may have no influence on the outcome of the operation.

MCI Course 0210D

3-10

Study Unit 3, Lesson 1

Lesson 1 Exercise
Directions

Complete items 1 through 4 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

What is the definition of surveillance?
______________________________________________________________
______________________________________________________________
______________________________________________________________

Item 2

What are three methods of surveillance?
______________________________________________________________
______________________________________________________________
______________________________________________________________

Item 3

What is the most difficult type of surveillance to employ?
______________________________________________________________

Item 4

What are the phases of surveillance?
______________________________________________________________
______________________________________________________________

MCI Course 0210D

3-11

Study Unit 3, Lesson 1 Exercise

Lesson 1 Exercise, Continued
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
1

2

3
4

MCI Course 0210D

Answer
The continuous or periodic act of observing, usually by surreptitious means, a person, a place, or an object for the purpose of obtaining information otherwise unavailable or impractical to obtain.
Choose any three of the following: Fixed
Stationary
Utilizing Ruses
Moving
Foot
Vehicle
Leading
Progressive
Technology
Moving
 Target
Assessment/Selection
 Attack/Operational

3-12

Reference Page
3-4

3-6/
3-7

3-7
3-10

Study Unit 3, Lesson 1 Exercise

LESSON 2
TECHNIQUES EMPLOYED
Introduction
Scope

Detecting terrorist surveillance in the early stages of planning is crucial to negating terrorist attacks. In this lesson, you will learn the different techniques employed to detect terrorist surveillance.

Learning
Objectives

Upon completion of this lesson, you should be able to



Identify methods used to detect moving surveillance.



Identify the rules to help you remember to maintain a high sense of awareness and assist you in detecting surveillance.



Identify the ways to train yourself in making accurate observations.



In This Lesson

Identify tools used to detect stationary surveillance.

Identify the important characteristics to make accurate descriptions.

The following topics are in this lesson:
Topic
Introduction
Detecting
Observation
Description
Lesson 2 Exercise

MCI Course 0210D

3-13

See Page
3-13
3-14
3-19
3-20
3-22

Study Unit 3, Lesson 2

Detecting
Stationary

When attempting to detect surveillance from a stationary location, you must keep in mind that terrorist surveillance personnel will do everything in their power to blend in with their surroundings to protect their anonymity.
The first thing you must do to detect stationary surveillance is to become intimately familiar with your surroundings. Figure out what normal behavior is in your area so that you can recognize anything that may be out of the ordinary. An excellent aid to assist you in becoming familiar with your surrounding is a neighborhood pattern analysis.

Pattern
Analysis

A neighborhood pattern analysis is simply a sketch map of your neighborhood detailing such things as








Types of vehicles used by your neighbors
Times and places they park
Knowledge about vehicle license plates
Service vehicles and personnel normally in the neighborhood, and what times they are usually present
Locations of manhole covers, telephone, and power mains
Presence, times, and locations of venders
Any other information you feel is pertinent in becoming familiar with your surroundings

If you maintain an accurate pattern analysis, it will be easier for you to recognize anything suspicious.

Moving

To detect moving surveillance, it is necessary to increase your awareness to the point where attention to detail becomes an integral part of your daily activities. Several rules to remember can help you maintain a heightened sense of awareness and assist you in detecting surveillance.
Continued on next page

MCI Course 0210D

3-14

Study Unit 3, Lesson 2

Detecting, Continued
Rules to
Remember

The following are rules to remember to assist you in detecting surveillance:


Never assume that your surveillants are men. Terrorism is not a phenomenon of only the male gender, nor are terrorists recognizable by any features that only they would display. They could very easily be women or children



Do not assume that the surveillants will be behind you. The surveillants could be deployed in front or across from you. They may also be posted above you using windows and rooftops.



Force anyone attempting to keep you under surveillance to make a statement. Cause them to react in such a way that you can observe their response to actions you take, thereby identifying themselves as surveillants. Untrained or, for that matter, experienced surveillance personnel have an acute fear of being detected. This is a natural fear that you may be able to exploit.



Employ passive maneuvers. Passive maneuvers are techniques that do not draw attention to you. These simple maneuvers allow you to confirm, or at least get an indication, that someone may be watching you without confronting them. Remember that an overtly compromised surveillant may commit a hostile act towards you.
Continued on next page

MCI Course 0210D

3-15

Study Unit 3, Lesson 2

Detecting, Continued
Common
Passive
Maneuvers

The following are common passive maneuvers used on foot or while driving: When on foot…
Retrace your course (often called a reverse 180). This is an effective way to get glimpses of people around you.
Stairs and escalators are excellent for this purpose, as is shopping from the rear to the front of a store. If you retrace your course a few times, you should begin to spot the same faces, indicating that you are probably under surveillance. Change your pace. Normally people walk at a steady pace. If you alternate in walking slowly and rapidly, you force anyone conducting surveillance to adjust his or her pace accordingly.
As you alter your pace, observe who else around you is altering their pace.

While driving…
Alternately slow down and speed up.

 Make a U-turn where it is safe to do so.
 Stop on the shoulder of the road just beyond a curve or hilltop.  Circle the block using a series of right-hand turns.
 Go through a traffic light just as it is turning red.

Remember, you are trying to force the surveillants to make a statement.
While taking these actions, watch for people who are taken by surprise, react inappropriately, suddenly change direction, or give a signal to someone else.
Because of the surveillants’ fear of discovery, normally they will not look directly at you, but they may do so if they are surprised or unaware that you are observing them.
Continued on next page

MCI Course 0210D

3-16

Study Unit 3, Lesson 2

Detecting, Continued
Route Survey

Become intimately familiar with the routes that you will travel. Conduct a thorough route survey for each route taken. At a minimum these surveys should include the following:
Survey List
Route Description
Road Surface/
Condition
Effects of
Weather
Construction
Traffic Patterns
Chokepoints

Potential Danger
Areas
Safe Areas
(Locations where you can go in the event of danger)

Description Notes
The starting point, the finishing point, the general direction, and the total distance.
Whether the road is concrete, gravel, dirt, or excessive potholes Any changes that will affect or alter driving time.
The starting and ending points of the construction.
Any alterations to the route must be noted.
The driving times at different times of the day.
 Traffic control points
 Traffic circles
 Toll booths
 Narrow bridges
 One way streets
 Entrance and exit ramps
Public gathering areas, Universities/schools, Political headquarters, Poverty areas
 U.S. or other allied diplomatic facilities
 Military facilities
 Police/fire stations
 Church/mosque/Sites of worship
 Hospitals
Continued on next page

MCI Course 0210D

3-17

Study Unit 3, Lesson 2

Detecting, Continued
Indicators

The following are some vehicle indicators of possible surveillance to be aware of:








Remain parked in the same spot for an extended period of time.
Start and stop at the same time you do.
Pass and park.
Drive too fast or too slow for traffic conditions.
Pause in a traffic circle until you pass or exit.
Appear broken down.
Have altered or obstructed license plates.

If possible, maintain a daily log of activities. Record anything that seems out of the ordinary or suspicious throughout your day. If you determine that there are any reoccurring suspicious people, vehicles, or situations along different routes, ensure that the proper authorities are notified and an investigation is started. If you feel you are under surveillance, never confront the surveillant. If you feel threatened, immediately go to a safe area. As soon as possible, make a complete and detailed report.

MCI Course 0210D

3-18

Study Unit 3, Lesson 2

Observation
Definition

Observation can be defined as “the complete awareness by an individual of his surrounding, achieved through maximum employment of the senses.” To become an expert observer, one must recognize and recall any object or situation accurately, fully, and clearly.

Perception

Our ability to perceive depends on our ability, experience, and training in relation to our environment. Perception is a means to see and understand. As an example, before you bought your car, you probably did not see many of that kind of car on the road, but, after purchasing it, you saw quite a few.
Why? Because you were consciously looking for them.
Accurate observation requires the mental effort necessary to recognize, analyze, and relate the essential parts of our surroundings and to interpret the patterns present. The problem is that we usually perceive or comprehend only that which interests us or is capable of being understood with minimum effort. A person untrained in observation usually perceives another person as a whole and not as a grouping of particular physical characteristics. We meet people everyday, but these meetings do nothing to enhance our ability to describe features of a person. You must purposely practice and train your mind to develop this skill.

Training

To train yourself to make accurate observations, you must


Practice continual and complete awareness and alertness.



Replace casual observation of general items with study and observation of details. 

Train yourself to estimate accurately the passage of time, speed of moving objects, and distances.



Be familiar with descriptive terms pertaining to colors and shades of colors, makes and models of vehicles, and terms that describe clothing and physical characteristics of people indigenous to the area.



Be able to visualize what takes place in our presence.

Remember, the crucial part to observation is not to remember every face and every scene, but concentrate on retention of details that will most likely affect the operation.

MCI Course 0210D

3-19

Study Unit 3, Lesson 2

Description
Definition

Description can be defined as the technique of factually reporting one’s own observations of an experience. The purpose of a description is to present an accurate picture, in words, of an experience.
An accurate but incomplete description is much better than a complete but inaccurate one. While descriptions should be as complete as possible so they can be used by others who have never seen the subject of the description, time and circumstances do not always permit completing the long form description. Assembling

At a minimum, the following items should be included in an accurate description: Item
Distinguishing characteristics
Almost everyone possesses some distinguishing or outstanding physical characteristic. This becomes the most important part of a person’s description. Some examples are:
General characteristics – Six general characteristics are used in the description of individuals
Changeable characteristics –
Those aspects of a person’s appearance that can be readily changed to affect a disguise:

Description
Body scars and marks, walk, voice, and dress

Sex, race, age, height, weight, and build Hair style/color, glasses/eye color and clothes

Continued on next page

MCI Course 0210D

3-20

Study Unit 3, Lesson 2

Description, Continued
Vehicle

When describing a vehicle, use the same basic format used (shown below) to describe people.





Honing Your
Skills

Distinguishing characteristics – Dents or scratches
General characteristics – Make and type of vehicle
Changeable characteristics – License plate number
Permanent details – Four-door, two-door or hatchback

It is important for each individual to increase his/her powers of observation and then describe or “paint” that word picture based on those observations.
With these skills, detecting surveillance and preventing terrorist attacks will become much easier. The following are a couple of exercises that can assist you in sharpening your skills:


Conduct your route survey. After conducting the survey, have another individual drive your route while you are blindfolded. While en route, describe where you are based on your perceptions.



Have someone place articles in a small box, arranging them in a particular pattern. Look at the contents for a short period of time, then close the box and describe what you saw. Determine in what relationship were the items in the box to each other. As your proficiency improves, add or subtract items and decrease the amount of time used to observe the open box. MCI Course 0210D

3-21

Study Unit 3, Lesson 2

Lesson 2 Exercise
Directions

Complete items 1 through 5 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

What is a good aid to assist you in detecting stationary surveillance?
______________________________________________________________

Item 2

To detect moving surveillance, it is necessary to increase your awareness to the point where _______________________ becomes an integral part of your daily activities.

Item 3

What are the four rules that assist you in detecting surveillance?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

Item 4

State three of the five ways to train yourself to make accurate observations.
______________________________________________________________
______________________________________________________________
______________________________________________________________
Continued on next page

MCI Course 0210D

3-22

Study Unit 3, Lesson 2 Exercise

Lesson 2 Exercise, Continued
Item 5

What are the three types of characteristics that should be included in an accurate description?
______________________________________________________________
______________________________________________________________
______________________________________________________________
Continued on next page

MCI Course 0210D

3-23

Study Unit 3, Lesson 2 Exercise

Lesson 2 Exercise, Continued
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
1
2
3

Answer
Neighborhood pattern analysis Attention to detail
Never assume your surveillants are men.

Reference Page
3-14
3-14
3-15

Do not assume the surveillants will be behind you. Force anyone attempting to keep you under surveillance to make a statement. Employ passive maneuvers. Continued on next page

MCI Course 0210D

3-24

Study Unit 3, Lesson 2 Exercise

Lesson 2 Exercise, Continued
Answers,
continued

Item Number
4

Answer
Any three of the following:

Reference Page
3-19

Practice continual and complete awareness and alertness. Replace casual observation of general items with study and observation of details.
Train yourself to estimate accurately the passage of time, speed of moving objects, and distances.
Be familiar with descriptive terms pertaining to colors and shades of colors, makes and models of vehicles, and terms that describe clothing and physical characteristics of people indigenous to the area.

5

MCI Course 0210D

Be able to visualize what takes place in our presence.
Distinguishing
characteristics
General characteristics
Changeable characteristics

3-25

3-20

Study Unit 3, Lesson 2 Exercise

(This page intentionally left blank.)

MCI Course 0210D

3-26

Study Unit 3, Lesson 2 Exercise

STUDY UNIT 4
PROTECTIVE MEASURES FOR THE HOME AND OFFICE
Overview
Scope

To maintain a posture of a hard target, it is important to increase the security and awareness measures in the places where most of your time is spent – your personal residence and place of work.
Study Unit 3 taught you what surveillance is and how to detect it. The majority of surveillance is going to be conducted at places easy to access the intended target. Throughout this study unit, you will learn ways to increase the security of your residence and your place of work.

In This Study
Unit

The following lessons are in this study unit:
Lesson
Residential Security
Protective Measures Used in the Workplace
Homeland Security Notifications

MCI Course 0210D

4-1

See Page
4-3
4-17
4-27

Study Unit 4

(This page intentionally left blank.)

MCI Course 0210D

4-2

Study Unit 4

LESSON 1
RESIDENTIAL SECURITY
Introduction
Scope

For most people, over half of their time during the day is spent in or around their residence. Based on this, you should make your residence as secure as possible. In this lesson, you will learn measures that should be taken to ensure residential security.

Learning
Objectives

Upon completion of this lesson, you should be able to



Identify methods used to enhance physical security of the residence.



Identify personal security and safety measures.



In This Lesson

Identify the precautions to take when selecting a residential site.

Identify how to create the appearance of occupancy when you are away from the residence.

The following topics are in this lesson:
Topic
Introduction
Selecting a Residence
Securing the Exterior
Securing the Interior
Safety Considerations
Servants
Lesson 1 Exercise

MCI Course 0210D

4-3

See Page
4-3
4-4
4-6
4-8
4-11
4-13
4-14

Study Unit 4, Lesson 1

Selecting a Residence
Choosing a Site

When selecting a site for your residence, there are many things to consider.
Safety, different routes, neighborhood patterns, even your landlord and neighbors must be considered. It is best to look at things from a terrorist’s viewpoint. If you were to attack someone, who or what would be your easiest target? When possible, compare all available options before deciding on a place. Options for
Housing

The following are options to consider when determining where to live:
 On-base or off-base housing are typically the safest for military personnel.
 A single family home might be the least desirable. This will require a high degree of security, and thereby give you a high profile. Living in an area where there are other Americans or friendly foreign nationals might provide a higher degree of safety without causing a great deal of attention focused on you.
 Apartments can offer the benefit of close neighbors and limited entries and exits, but they also offer easy access to the lobby and building.
 If possible, avoid homes that have limited routes of ingress and egress.
Avoid homes on dead-end streets or cul-de-sacs. Selecting a residence that has several roads nearby will offer you more escape routes in the event of an attack.
 Investigate your prospective landlord and neighbors. Avoid renting from anyone that has ties to terrorists or who are sympathetic to their cause.
Continued on next page

MCI Course 0210D

4-4

Study Unit 4, Lesson 1

Selecting a Residence, Continued
Examine the
Neighborhood

When determining if a neighborhood is a safe environment to live in, you want to consider the following aspects:
 How reliable are the police and rescue systems? Not only do you have to think about the reliability, but the proximity of these facilities. Are these facilities close to your home? The distance can work both ways for you.
If you are in close proximity to a police station, this could deter a terrorist from attacking due to fear of a quick response. On the other hand, these facilities may be targets themselves and your home may be dangerously close to the actual targets.
 Are there any late-night establishments in the area? If an attack were to take place, could you gather your family and proceed to a safe public place? Terrorists may be deterred by the possibility of innocent civilians or indigenous persons getting injured.
 What is the attitude of the neighborhood toward the terrorist movement and towards the United States? This is especially important in foreign nations.  Is there anything else that might affect the safety of your home and family? Possibly a neighborhood watch program or security patrols.

MCI Course 0210D

4-5

Study Unit 4, Lesson 1

Securing the Exterior
Introduction

There are many options available to you when it comes to increasing security on the exterior of your residence. You must understand that there are very few security systems that will keep you completely safe. They will provide you with more time and warning in the event of an attack, and more importantly, they may motivate the terrorists to attack a less security conscious target. Let us look at some of your options.

High Walls and
Fences

Walls and fences will limit the view of your residence, preventing terrorists from having easy access to surveillance. These barriers may also protect you from drive-by attacks. If the laws allow, consider placing barbed wire or broken glass on the tops of the wall. All items such as tree branches, poles, and trash cans, should be removed so they can not be used as a tool to gain access to your residence. All gates should be sturdy, in good working condition, and locked when not in use.

Trees and
Shrubs

Tall trees and shrubs serve as a screen to anyone trying to observe the grounds of the residence. Shrubbery inside the perimeter should be trimmed so intruders cannot be concealed.

Dogs

The size of the dog is of little importance. Trained guard dogs may cause fear in many intruders; however, an animal will pose little problem to a determined professional. Use a dog primarily as an alarm. A loud and alert dog is much more effective than an intimidating dog.

Warning Signs

Signs on your fence and house advertising the presence of an alarm system or a dog, may cause terrorists to choose another target.

Lighting

Exterior lighting is one of the most effective deterrents to entry. Security lighting should be designed to expose low-contrast targets that may be visible for only a few seconds. Lighting should be installed so that the loss of one lamp will not leave an area totally dark.
Continued on next page

MCI Course 0210D

4-6

Study Unit 4, Lesson 1

Securing the Exterior, Continued
Night
Watchmen

MCI Course 0210D

If you happen to hire a security guard or elect a neighborhood watch representative, make sure to check their backgrounds extensively before hiring them. If guards are employed, try to avoid 12-hour shifts. Studies have shown that tours in excess of 8 hours degrade effectiveness. Training of these individuals is paramount. Ensure they have successfully completed any required protection training, are trained to handle emergencies, and are in strict compliance with local laws concerning weapons handling. Guards should always be warned against flashing weapons in an unprofessional manner. 4-7

Study Unit 4, Lesson 1

Securing the Interior
Introduction

Never restrict security measures to just the exterior of your residence. There are a multitude of options to increase the interior of your residence as well.
Discussed below are considerations for extra protection.

Doors

Consider the strength of each door when it is opened and when it is closed. If possible, a steel door without windows would be the best choice. It is recommended that you change the existing locks in your new residence unless you can positively determine that you have the only available keys. At a minimum, each door should




Be equipped with heavy duty hinges
Have one dead bolt lock
Have a push button lock on the doorknob, allowing you to activate the lock quickly if an emergency occurs.

When secured, evaluate the effort required to force entry.
Windows

Windows should always be properly secured. They are likely to be the weakest link in your home security. Mylar film coating should be considered for all surfaces. This will prevent the shattering of glass and reinforce the strength of the windows. For the most part, intruders will avoid breaking glass unless absolutely necessary. This leaves the intruder no choice but to defeat the windows locking device. The following methods can be used to upgrade window security:


Sash and frame pin – This method involves the drilling of a hole through the sash and frame and inserting a pin or nail to prevent the window from opening. 

Key locks – A key lock can either be installed as a part of the window by replacing the standard window lock, or it can be used to secure the frame, blocking the raising or sliding of the window.



Steel bars, mesh, or grillwork – This method is more of a permanent measure. The installation of bars, mesh, or grillwork are the most secure, however, they can be very expensive to install.

Note: Keep in mind that these measures may enhance security, but can also become a hazard should the window be needed for escape in an emergency. Continued on next page

MCI Course 0210D

4-8

Study Unit 4, Lesson 1

Securing the Interior, Continued
Alarms

An alarm system should be considered for doors, windows, and other possible entry points into the house. An effective alarm system should



Be equipped with an emergency panic button.



Have external horns, sirens, and bells loud enough to alert the neighbors.



Have a bright flashing light mounted so that emergency personnel can easily observe it.



Have audio and visual indicators inside the residence to awaken or notify the residents. (Exceptions include duress systems (silent alarms) which should be connected to a police station or private security station.)



Cameras,
Optical
Viewers, and
Intercoms

Allow ingress and egress to all primary entrances through the use of timing devices.

Be checked periodically to ensure against tampering or loss of power.

If cameras and closed circuit TV (CCTV) are available, use them. If not, consider using dummy CCTV cameras as a deterrent.
Using optical viewers (peepholes) and intercoms will allow you to identify who is outside your door without exposing you directly to the person.
Always exercise care when using an optical viewer. When your eye is placed close to the viewer, the light behind you is blocked, and the attacker may suspect that you are in front of the door. At this point, the attacker can shoot through the door, or possibly detonate an explosive device. Instead of standing in front of the door, approach it from the side. Raise a book in front of the viewer and ask who is at the door. Exercise the same precautions with an intercom system. Run the intercom wires so that the speaker boxes are placed on opposite sides of the door. If the terrorist shoots through the intercom box on his side of the doorway, you will not get hit.
Continued on next page

MCI Course 0210D

4-9

Study Unit 4, Lesson 1

Securing the Interior, Continued
Weapons

MCI Course 0210D

If guns are kept inside the residence, they should be loaded and kept in a safe place. They must be accessible to those who need them, without endangering children or those untrained in their use. If it is inadvisable to keep a gun in the house because of laws or personal reasons, consider using a stun gun, mace, or clubs. Ensure you are proficient in the use of whatever weapons you use. What is more important is making sure you have the proper mindset. If you are not willing to use the weapon to save the lives of yourself or those you love, then the weapon will become a danger to you. If you are unwilling to use the weapon, do not pick it up.

4-10

Study Unit 4, Lesson 1

Safety Considerations
Education

In addition to having the proper equipment necessary to increase the security of your residence, it is also very important to educate yourself and your family members to be aware about personal security and safety measures.
You should cultivate interest and participation from all family members.
There are certain behavioral aspects concerning family members that you should take into account:


Know where your family members are at all times. In the event of an attack, you will be in a better frame of mind to deal with the situation.



Have your dependents vary their routines or patterns. Just as you would do yourself in efforts to maintain status as a hard target, ensure your family members are varying their everyday activities.



Brief all family members on their roles and responsibilities when it comes to protective measures. Terrorists often use family members as a means to get to their intended target. A better understanding of how to react will increase the chances of survival for your family members.

Escape Routes

Always establish a primary and an alternate escape route out of your residence leading to a rally point. Rehearse these routes at various times of the day, tracking the different amounts of time and hazards along the way. If you live on the second floor or higher levels, plan secure ways to exit.
Portable ladders and ropes are useful in these cases.

Safe Havens

In the event of any attack, establish a safe haven you can go to until reinforcements arrive. Safe havens should have more than one entrance and exit, with the openings being strong and locking systems sturdy. Stock the room with emergency items such as water, food, flashlights, candles, blankets, first aid supplies, required medicines, weapons, and ammunition.
There should also be a communication system and the ability to contact security forces and activate any exterior alarms from inside the room. Ensure the room has a fire extinguisher and proper ventilation in case a fire was to break out.
Continued on next page

MCI Course 0210D

4-11

Study Unit 4, Lesson 1

Safety Considerations, Continued
Communication

Each phone should post emergency telephone numbers, such as the police, fire department, and rescue services. Always be cautious of phone conversations and be aware that the phone could be tapped. Be sure to locate a public phone or a neighbor’s phone near the house, and advise your family members of its location for emergency use. If you happen to get suspicious calls, try to record the conversations and ensure the proper authorities are notified.

Two Way

If your home is equipped with a two-way radio, each member of the family must know how to use it. Children should be taught how to use the radio, as it is often ignored in serious incidents and could possibly signal a warning.

Emergency
Contact System

An emergency contact system should be established so that help can be rushed to your location should an attack occur. Select a system that will allow direct contact with the response force, your office, and your neighbors.
The system should consist of a primary duress system (radio/phone), an alternate system (horn/siren), and a covert system (silent alarms). In the event of an attack, activate as many systems as possible to ensure your call for help gets out.
Always test your communication systems frequently, ensuring everything works properly.

Create the
Appearance of
Occupancy

If you are away from your residence for extended periods of time, there are multiple things you can do to create the appearance of someone occupying your home:








MCI Course 0210D

Ask neighbors to place garbage in your garbage can.
Arrange for someone to pick up your mail/newspaper daily.
Set timers on lights and other appliances to turn on and off at different times. Arrange for lawn services to continue on a regular basis.
Turn down the telephone ringer and the answering machine.
Park your vehicle in a safe and secure place. If no place is available, consider loaning the vehicle to a friend. This measure may prevent terrorists from planting a device on your vehicle while you are away.
Inform the local police/guards and neighbors (if trustworthy), that you will be away from your residence.

4-12

Study Unit 4, Lesson 1

Servants
Hiring
Considerations

There are many precautions that must be taken if you are considering to hire servants, especially in a foreign nation. Often times, servants will be provided for you at the discretion of the host nation. These are the individuals you should be most cautious about.
Servants should not be hired unless they have undergone an extensive background check performed by the appropriate investigating agency, the
American Embassy, or military police.

Valuable
Sources

Servants can either be a vulnerability or a contributor to the security effort. If they are trustworthy, you can incorporate them as a positive asset in security.
If your servants are indigenous to the area, they may be able to provide indepth knowledge as to what is unusual or suspicious that you might not notice. Another set of ears and eyes to keep track of what is going on.
However, if the wrong servants are hired, they can be releasing valuable information and have access to critical areas of your home.

Visitors

Servants should be thoroughly briefed on the matters of visitors. When answering the door, instruct servants not to admit strangers, such as repairmen, police officers, or others without specific approval. Doors should not be opened or unlocked until visitors have been properly identified. If necessary, contact the visitor’s office using a number obtained from a telephone directory. If the visit is legitimate, the visitor will not mind the inconvenience. Always brief servants on visitors expected time of arrival and purpose of visit so that only the proper parties are admitted.

Telephone
Security

Many servants are trained to answer the telephone with the family name.
Brief your servants against this procedure and inform them not to give any information over the phone until the caller has been identified.

Mail Security

Instruct servants not to accept any suspicious mail at home. If possible, have your mail, especially packages, routed through the embassy. The mail staff is specially trained to recognize suspicious packages. If an unexpected package arrives, have the deliverer open the package at a safe distance away from your residence, but at a point where you can still observe.

MCI Course 0210D

4-13

Study Unit 4, Lesson 1

Lesson 1 Exercise
Directions

Complete items 1 through 6 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

What are the four things to consider when determining if a neighborhood is right for you?
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
4. ___________________________________________________________

Item 2

Name four methods used when it comes to increasing security on the exterior of your residence.
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
4. ___________________________________________________________

Item 3

At a minimum, what should every door in your residence be equipped with?
1. ___________________________________________________________
2. ___________________________________________________________

Item 4

Identify three methods used to increase the strength of your windows.
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
Continued on next page

MCI Course 0210D

4-14

Study Unit 4, Lesson 1 Exercise

Lesson 1 Exercise, Continued
Item 5

Always establish a/an _______________ and a/an _______________ escape route out of your residence leading to a rally point.

Item 6

Name three methods used to create an appearance of occupancy when you are away from your residence.
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
Continued on next page

MCI Course 0210D

4-15

Study Unit 4, Lesson 1 Exercise

Lesson 1 Exercise, Continued
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
1

2

3

4

5
6

Answer
1. How reliable are the police and rescue systems? 2. Are there any late-night establishments in the area?
3. What is the attitude of the neighborhood toward the terrorist movement and towards the United States?
4. Is there anything else that might affect the safety of your home and family?
Any four of the following:
1. High walls/fences
2. Trees and shrubs
3. Dogs
4. Warning Signs
5. Lighting
6. Night watchmen/security patrols
1. Be equipped with heavy duty hinges
2. Have one dead bolt lock
3. Have a push button lock on the doorknob
1. Sash and frame pin
2. Key locks
3. Steel bars, mesh, or grillwork primary, alternate
Any three of the following:

Reference Page
4-5

4-6/4-7

4-8

4-8

4-11
4-12

1. Ask neighbors to place garbage in your garbage can.
2. Arrange for someone to pick up your mail/newspaper daily.
3. Set timers on lights and other appliances to turn on and off at different times.
4. Turn down the telephone ringer, and the answering machine.
5. Park your vehicle in a safe and secure place. 6. Inform the local police/guards, neighbors that you will be away from your residence. MCI Course 0210D

4-16

Study Unit 4, Lesson 1 Exercise

LESSON 2
PROTECTIVE MEASURES USED IN THE WORKPLACE
Introduction
Scope

As stated earlier, a majority of your time is spent in your residence. Another large chunk of time is spent at the workplace. It is vital that you do not discount the office as a terrorist target.

Learning
Objectives

Upon completion of this lesson, you should be able to



In This Lesson

Identify the five countermeasures that make intelligence collection and targeting difficult.
Identify characteristics used to handle suspicious packages.

The following topics are in this lesson:
Topic
Introduction
Office Security
Suspicious Packages
Lesson 2 Exercise

MCI Course 0210D

4-17

See Page
4-17
4-18
4-21
4-24

Study Unit 4, Lesson 2

Office Security
Responsibility

Recently there has been an increase in the number of U.S. facilities and embassies being targeted for terrorist attacks. The overall security of the building may be someone else’s responsibility, but you are a vital link in that security. Always identify and report suspicious activity, vehicles, and personnel. You are not only protecting yourself but others as well.

Countermeasures

Day to day activities within an office can help establish an environment in which it is more or less difficult for terrorists to gain the knowledge they need to successfully attack personnel. The following countermeasures should be taken to make intelligence collection and targeting by terrorists more difficult, forcing them to spend more time collecting information. This in turn causes them to spend more time exposed and visible for detection:






Visitor Control
Procedures

Visitor control procedures
General working procedures
Arrangement of the office space
Contingency plans for emergencies
Mail handling procedures

Access to the office should be strictly limited. During periods of increased threat, access to additional offices, shops, laboratories, and other areas within the installation should be controlled. Use the following procedures for visitor control: 

There should only be one visitor entrance and exit to restricted areas.



A receptionist should clear all visitors before they enter inner offices.



Only permit workmen or visitors access into restricted areas with an escort and proper identification. Always confirm the work to be done before admitting them into the facility.



Do not post unit rosters or manning/photo boards where they can be viewed by visitors or local contractors who provide cleaning services, food and beverage services, and delivery of office supplies, etc.



Restrict the use of message and sign in-out boards to general statements of availability. Do not list publicly local travel itineraries or phone numbers where visitors have easy access to such information.
Continued on next page

MCI Course 0210D

4-18

Study Unit 4, Lesson 2

Office Security, Continued
General
Working
Procedures

In order for an office to function smoothly, it is important to have a set of official procedures in place that identifies the health and safety issues that may arise from the jobs and tasks that make up a system of work. Use the following procedures for general working:


Avoid carrying attaché cases, brief cases, or other courier bags unless absolutely necessary. These cases have become symbols of power and prominence in many cultures. Individuals carrying such items are often assumed to be important. Use satchels or book bags instead.



Do not carry items that bear markings that identify the owner by rank or title, even within the office environment. A visitor sent to gather intelligence on potential targets may see coffee mugs labeled “Top,”
“Intel,” or “The LT” in use, thus aiding his effort.



Avoid working alone late at night or on days when the remainder of the office is absent. If late night work is necessary, work in conference rooms or internal offices where observation from the outside of the building is not possible.



Offices should be locked when vacant for any lengthy period of time.
Also lock all unoccupied utility areas and rest rooms. This will prevent anyone from hiding or placing a bomb in these areas.



Maintain a clean desk policy throughout the office. This facilitates easier observation of objects out of place or removed.



Have contingency plans for emergencies. Update the plans regularly and brief all personnel on their roles and responsibilities. Do not display evacuation routes in public areas. When conducting drills, do your best to avoid setting a pattern. Use different rally points. If the terrorists recognize that you use the same rally point every time, they can easily call in a threat to the office, wait until a crowd of employees gathers at the rally point, and detonate an explosive at that point.



Unknown callers should not be privy to any unnecessary information. If you happen to receive a threatening call, such as a bomb or extortion threat, remain calm and listen carefully. A copy of a bomb threat checklist on the following page is a good reference tool to have available by all phones in the event someone receives a threatening phone call.
Continued on next page

MCI Course 0210D

4-19

Study Unit 4, Lesson 2

Office Security, Continued
The following is an example of the Bomb Threat Checklist.
Bomb Threat
Checklist

Rank:

MCI Course 0210D

4-20

Study Unit 4, Lesson 2

Suspicious Packages
Handling

Designate an area and a specially trained person to handle incoming mail and packages. Set aside an area to store unusual deliveries until the Explosive
Ordnance Disposal (EOD) can be notified. The holding area should not be a closet or a safe, as this increases the effectiveness of the explosive by increasing its pressure. If possible, use a large drum filled with sawdust or similar material. Mail representatives should be trained in bomb-detection techniques. What to Look
For

Always observe caution when handling mail. In particular, be on the lookout for letters or packages that exhibit the following characteristics:


Unknown or strange postmark – The mail may be postmarked from a strange or unknown place, usually outside your normal channels of correspondence. 

No return address – Leaving the return address off of the mail may be an attempt by the terrorists to reduce the amount of evidence on an envelope.
Also, rather than using a return address that may be determined erroneous by postal authorities, the terrorists may leave the information off, hoping to avoid suspicion.



Excessive amount of postage – It is risky to ask a mail clerk to weigh a letter bomb to determine the amount of postage. It is safer for the terrorist to add additional postage rather than risk being caught with a bomb.



Abnormal size or shape – The mail may have an abnormal, excessive, or unusual size because of the construction of the firing device and other bomb parts inside.



Protruding strings or wires – String or wires may protrude from or be attached to the item. The bomb maker may have constructed the device in a sloppy manner causing unsecured wires to work loose. Another reason for an exposed wire is that it may be an arming wire that the courier did not remove, fearing the device would detonate.



Misspelled words – Misspellings on a letter or package could occur because the writer is simply not familiar with military ranks or unit designations. Continued on next page

MCI Course 0210D

4-21

Study Unit 4, Lesson 2

Suspicious Packages, Continued
Inconsistency between the return address and postmark – For example, the return address may indicate a place in California, whereas the postmark may prove the package was actually mailed from France.
Foreign/bad handwriting – Handwriting that is foreign or illegible may indicate that the bomber is from another country.



Odd smell – The item may have an odd smell, such as shoe polish, or substances such as marzipan (a sweet almond paste used to mask the smell). Heavily perfumed packages or letters may also indicate the presence of a device.



Unusual/unbalanced weight – The package may be unusually heavy or light for its size. A normal letter weighs about 1-2 ounces; a letter bomb is more likely to weigh around 4-6 ounces. The package may be unusually light if it contains a firing device, a power source, and an explosive rather than the contents listed on the exterior of the package, such as books or other materials.



Springiness – Springiness may result if the bomb has a pressure releasetype switch. The wires used in the device may also cause the springiness.



Inflexibility – If the contents have been mounted on material to prevent their shifting while traveling through the mail system, the letter may be inflexible. 

Devices





What to Look
For, continued

Grease marks or stains – Marks or stains, such as those caused by potato chips or french fries, may show on the outside because many explosives sweat or exude the oil used in their manufacture, such as motor oil (used with Semtex –H explosives) or vegetable oil (used with C-4 explosives).

The characteristics listed above are very helpful in identifying dangerous packages. There are a number of manufactured devices designed to detect abnormalities within envelopes, as well as x-ray and other machines used for scanning suspicious packages. These devices provide accurate detection, and increased search efficiency.
Continued on next page

MCI Course 0210D

4-22

Study Unit 4, Lesson 2

Suspicious Packages, Continued
Examples of
Suspicious
Packages

The following image depicts the possible features of a suspicious package:

Examples of
Suspicious
Envelopes

The following images are actual envelopes that were mailed out containing
Anthrax:
Badly written / No return address

Badly written/
Possible oil stain

MCI Course 0210D

4-23

Study Unit 4, Lesson 2

Lesson 2 Exercise
Directions

Complete items 1 through 3 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

List the five countermeasures taken to make intelligence collection and targeting by terrorists more difficult.
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
4. ___________________________________________________________
5. ___________________________________________________________

Item 2

Which general working procedure facilitates easier observation of objects that are out of place or removed?
______________________________________________________________
______________________________________________________________

Item 3

List six characteristics to look for in a suspicious package.
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
4. ___________________________________________________________
5. ___________________________________________________________
6. ___________________________________________________________
Continued on next page

MCI Course 0210D

4-24

Study Unit 4, Lesson 2 Exercise

Lesson 2 Exercise, Continued
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
Answer
1
1. Visitor control procedures
2. General working procedures
3. Arrangement of the office space
4. Contingency plans for emergencies
5. Mail handling procedures
2
Maintaining a clean desk policy.
3
Any six of the following:

Reference Page
4-18

4-19
4-21/
4-22

1.
2.
3.
4.
5.
6.
7.

Unknown or strange postmark
No return address
Excessive amount of postage
Abnormal size or shape
Protruding strings or wires
Misspelled words
Inconsistency between the return address and postmark
8. Foreign/bad handwriting
9. Odd smell
10. Unusual/unbalanced weight
11. Springiness
12. Inflexibility
13. Grease marks or stains

MCI Course 0210D

4-25

Study Unit 4, Lesson 2 Exercise

(This page intentionally left blank.)

MCI Course 0210D

4-26

Study Unit 4, Lesson 2 Exercise

LESSON 3
HOMELAND SECURITY NOTIFICATIONS
Introduction
Scope

The National Terrorism Advisory System (NTAS), is a national system that is used to communicate information about terrorist threats to the United States.
It allows the Federal Government to effectively pass on information to the
American public as it pertains to specific terrorist threats.
It is important as Marines and citizens that we understand how this system works and what we can do to help.

Learning
Objectives

Upon completion of this lesson, you should be able to



Identify an Elevated Threat Alert as it pertains to the National Terrorism
Alert System (NTAS).



In This Lesson

Identify an Imminent Threat Alert as it pertains to the National Terrorism
Alert System (NTAS).

Identify the Sunset Provision as it pertains to the National Terrorism Alert
System (NTAS).

The following topics are in this lesson:
Topic
Introduction
National Terrorism Advisory System (NTAS)
NTAS Alerts
How You Can Help
Lesson 3 Exercise

MCI Course 0210D

4-27

See Page
4-27
4-28
4-29
4-30
4-32

Study Unit 4, Lesson 3

National Terrorism Advisory System (NTAS)
Introduction

The NTAS is based on the premise that Americans all share responsibility for the nation’s security, and should always be aware of the heightened risk of terrorist attack in the United States and what they should do
Once intelligence has been received and reviewed, the Secretary of Homeland
Security will decide, in coordination with other Federal entities, whether an
NTAS Alert should be issued. NTAS Alerts will only be issued when credible information is available.

Terrorism
Information

Terrorism information and intelligence is based on the collection, analysis and reporting of a range of sources and methods. While intelligence may indicate that a threat is credible, specific details may still not be known.
Americans should continue to stay informed and vigilant throughout the duration of an NTAS Alert.
Continued on next page

MCI Course 0210D

4-28

Study Unit 4, Lesson 3

NTAS Alerts
Threat Alerts

These alerts will include a clear statement that there is an imminent threat or elevated threat. Using available information, the alerts will provide a concise summary of the potential threat, information about actions being taken to ensure public safety, and recommended steps that individuals, communities, businesses and governments can take to help prevent, mitigate or respond to the threat.
The NTAS Alerts will be based on the nature of the threat. In some cases, alerts will be sent directly to law enforcement or affected areas of the private sector, while in others, alerts will be issued more broadly to the American people through both official and media channels.

Imminent
Threat

Warns of a credible, specific, and impending terrorist threat against the United
States.

Elevated
Threat Alert

Warns of a credible terrorist threat against the United States.

Sunset
Provision

NTAS Alerts contain a sunset provision indicating a specific date when the alert expires - there will not be a constant NTAS Alert or blanket warning that there is an overarching threat. If threat information changes for an alert, the Secretary of Homeland Security may announce an updated NTAS Alert. All changes, including the announcement that cancels an NTAS Alert, will be distributed the same way as the original alert.
An individual threat alert is issued for a specific time period and then automatically expires. It may be extended if new information becomes available or the threat evolves.

MCI Course 0210D

4-29

Study Unit 4, Lesson 3

How You Can Help
If You See
Something, Say
Something™

Citizens should report suspicious activity to their local law enforcement authorities. The “If You See Something, Say Something™” campaign across the United States encourages all citizens to be vigilant for indicators of potential terrorist activity, and to follow NTAS Alerts for information about threats in specific places or for individuals exhibiting certain types of suspicious activity. Visit www.dhs.gov/ifyouseesomethingsaysomething to learn more about the campaign

Alert
Announcements

NTAS Alerts will be issued through state, local and tribal partners, the news media and directly to the public via the following channels:








Sample Alerts

Via the official DHS NTAS webpage – http://www.dhs.gov/alerts
Via email signup at – http://www.dhs.gov/alerts
Via social media
Facebook – http://facebook.com/NTASAlerts
Twitter – http://www.twitter.com/NTASAlerts
Via data feeds, web widgets and graphics http://www.dhs.gov/alerts The public can also expect to see alerts in places, both public and private, such as transit hubs, airports and government buildings
NTAS Alerts apply only to threats in the United States and its possessions.
The Department of State issues security advisory information for U.S. citizens overseas or traveling in foreign countries. If you are travelling abroad ensure that you check the Department of State website or check with your S-2 office to see if there are any threats to U.S. citizens.
Continued on next page

MCI Course 0210D

4-30

Study Unit 4, Lesson 3

How You Can Help, Continued
Sample Alerts, continued MCI Course 0210D

An example of a sample alert is shown below:

4-31

Study Unit 4, Lesson 3

Lesson 3 Exercise
Directions

Complete items 1 through 3 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

What is the definition of an imminent threat?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

Item 2

What is the definition of an elevated threat?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

Item 3

What is the sunset provision?
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________

MCI Course 0210D

4-32

Study Unit 4, Lesson 3 Exercise

Lesson 3 Exercise, Continued
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
Answer
1
Warns of a credible, specific, and impending terrorist threat against the
United States
2
Warns of a credible terrorist threat against the United States
3
An individual threat alert that is issued for a specific time period and then automatically expires. It may be extended if new information becomes available or the threat evolves.

MCI Course 0210D

4-33

Reference Page
4-29

4-29
4-29

Study Unit 4, Lesson 3 Exercise

(This page intentionally left blank.)

MCI Course 0210D

4-34

Study Unit 4, Lesson 3 Exercise

STUDY UNIT 5
PROTECTIVE MEASURES WHILE TRAVELING
Overview
Scope

In Study Unit 4, you were taught methods to increase security at your residence as well as your office. These are the places where most of your time is spent. However, often individuals let their guard down while traveling and become an easy target for terrorists.
This study unit will teach you protective measures to be used while you travel, whether you are on foot, in the air, driving your vehicle, or staying in hotels. There are many precautions to be taken while away from home to remain a hard target.

In This Study
Unit

The following lessons are in this study unit:
Lesson
Traveling on Foot
Traveling in a Vehicle
Traveling by Air
Staying Safe in Hotels

MCI Course 0210D

5-1

See Page
5-3
5-9
5-31
5-39

Study Unit 5

(This page intentionally left blank.)

MCI Course 0210D

5-2

Study Unit 5

LESSON 1
TRAVELING ON FOOT
Introduction
Scope

Pedestrians are extremely vulnerable to assaults at all times. In this lesson, you will learn protective measures that will minimize your vulnerability to an attack. Learning
Objectives

Upon completion of this lesson, you should be able to



Define a phrase card.



In This Lesson

Identify aspects of a crisis response plan.

Identify individual protective measures for pedestrians.

The following topics are in this lesson:
Topic
Introduction
Developing a Crisis Response Plan
Protective Measures
Lesson 1 Exercise

MCI Course 0210D

5-3

See Page
5-3
5-4
5-5
5-7

Study Unit 5, Lesson 1

Developing a Crisis Response Plan
Get Briefed

Before you develop a plan for responding to a crisis, ensure you receive a detailed briefing from the force protection officer or your intelligence section on the cities and areas you plan to visit. The briefing should include the known threat in the area, the safest routes to use, safe havens, areas to avoid, points of contact, and anything else pertaining to the mission and your safety.

Routes

A good response plan establishes alternate routes from each starting point to each destination. Make sure at least one person you work with or someone in your family is aware of these routes and the approximate time it takes you to travel these routes.

Language

If you are not familiar with the language, ensure you have a phrase card with common greetings and methods of asking for assistance in the local language.
Being able to communicate in a time of crisis may determine whether you survive or not.

Phones

Know how to use the public phone system and carry the proper currency with you to make a phone call. Calling cards can be used in many countries also.
Learn the names and phone numbers of persons to contact at your destination.
Learn emergency numbers.

Safe Havens

Know where safe havens are such as police and fire stations, military posts, embassies, and checkpoints that you can get to if need be.

Emergencies

Know how to contact emergency personnel and where the nearest medical facilities are located.

MCI Course 0210D

5-4

Study Unit 5, Lesson 1

Protective Measures
Train Yourself

As with other types of protective measures, while traveling you want to avoid routines and use more than one route if possible. When traveling as a pedestrian, there are multiple protective measures you can train yourself to use to reduce the vulnerability of being attacked. These measures include the following: 






Remain on the main roads.
Walk facing traffic.
Maintain a cautious attitude.
Apply surveillance detection methods.
Walk in well-lighted areas.
Walk with others.

Remain on the
Main Roads

Always travel on the main thoroughfares and stay alert to the events occurring around you. If you are not familiar with the city, do not wander off until you become more comfortable with the area. In some areas, it is never a good idea to wander off regardless of your comfort level.

Walk Facing
Traffic

Train yourself to walk facing traffic. If terrorists try to attack you, they will either have to approach you as you are looking at them or attack you with traffic passing between you and them. When walking along a sidewalk, stay toward the center so that it will be more difficult for someone to push you into traffic. This will also give you a better chance of spotting someone hiding between cars or waiting in an alley.

Maintaining a
Cautious
Attitude

If you have to stop, make sure you stop with your back facing a wall. When crossing an intersection, try to cross with groups and be very alert to approaching vehicles. A keen sense of awareness will always be your best defense. Applying
Surveillance
Detection
Methods

If you feel you are being targeted, apply the surveillance detection methods you were taught in Study Unit 3. Use reflective surfaces such as windows or mirrors to see persons who may be following you. A route that goes from high-density to low-density will aid you in identifying surveillance. You can easily spot a person who moves with you.
Continued on next page

MCI Course 0210D

5-5

Study Unit 5, Lesson 1

Protective Measures, Continued
Walking in
Well-Lighted
Areas

Attempt to walk in areas that are well lit. This not only allows you to see better, it also allows others to see you in the case of an attack.

Walking with
Others

Walk in areas where there are other pedestrians present, but avoid large crowds of people. Demonstrations, whether hostile or not, provide for easy targeting by terrorists. Mass casualties with little effort equates to success for a terrorist.
Avoid areas where noise will drown out your calls for assistance. You may have to alter your route if dangerous conditions are present.

MCI Course 0210D

5-6

Study Unit 5, Lesson 1

Lesson 1 Exercise
Directions

Complete items 1 through 3 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

What two sources can you use to receive a detailed briefing on the areas you plan to visit?
1.
2.

Item 2

________________________________________________________
________________________________________________________

What is a phrase card?
______________________________________________________________
______________________________________________________________
______________________________________________________________

Item 3

What are the six measures used to reduce the vulnerability of being attacked as a pedestrian?
1.

________________________________________________________

2.

________________________________________________________

3.

________________________________________________________

4.

________________________________________________________

5.

________________________________________________________

6.

________________________________________________________
Continued on next page

MCI Course 0210D

5-7

Study Unit 5, Lesson 1 Exercise

Lesson 1 Exercise
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
1
2

3

MCI Course 0210D

Answer
1. Force Protection Officer
2. Intelligence Section
A phrase card contains common phrases and greetings in the language used by the country you are in.
1. Remain on the main roads.
2. Walk facing traffic.
3. Maintain a cautious attitude.
4. Apply surveillance detection methods. 5. Walk in well-lighted areas.
6. Walk with others.

5-8

Reference Page
5-4
5-4

5-5

Study Unit 5, Lesson 1 Exercise

LESSON 2
TRAVELING IN A VEHICLE
Introduction
Scope

Terrorists frequently attack individuals in their vehicles by means of an ambush or by planting explosive devices on the vehicle. In this lesson, you will learn individual protective measures to be used when traveling by automobile. You will also learn how to conduct an effective search of a vehicle. Learning
Objectives

Upon completion of this lesson, you should be able to



Identify acceptable tire ratings.



Identify basic rules for employing drivers/chauffeurs.



Identify the reason for driving in the left lane.



Identify the length of time that it should take to conduct an effective vehicle bomb search.



In This Lesson

Identify ways to upgrade the security of your vehicle.

Identify the signs that indicate a vehicle has been tampered with.

The following topics are in this lesson:
Topic
Introduction
Securing Your Vehicle
Chauffeurs and Drivers
Driving Precautions
Searching a Vehicle
Lesson 2 Exercise

MCI Course 0210D

5-9

See Page
5-9
5-10
5-12
5-13
5-15
5-27

Study Unit 5, Lesson 2

Securing Your Vehicle
Vehicle
Specifications

There are many elements to consider when you are trying to keep your vehicle as secure as possible. Some elements include the following:


Look at the car itself. Make sure you are driving an innocuous vehicle. This will make it difficult for terrorists to identify you and will also make it more difficult for a surveillance team to locate and follow your vehicle.



Equip the vehicle to handle a crisis situation. Ensure you check the entire vehicle over for weaknesses. The following are ways to upgrade security of your vehicle.
Equipment
Armor

Tires

Horsepower
Mirrors

Radios

Specifications
You can purchase a fully armored vehicle from manufacturer for a cost ranging from $80,000 - $200,000.
These vehicles are capable of sustaining an attack from large caliber rifles and heavy weapons. If that price tag is a little too steep, you can also equip your own vehicle with
200 pounds of armor for around $800 - $1000. This will provide considerable protection from handguns and small explosives. Tires are an important yet often neglected item. When selecting tires, choose a radial tire instead of a bias ply.
Choose a tire that can sustain high temperatures and that will maintain excellent traction in the area and climate in which you will be traveling. Tires that are not rated for high temperatures may blow out at high speeds. The system of rating tire quality uses the letters A, B, and C to indicate temperature and traction of the tire. The ONLY acceptable rating is A. The system for rating the speed of a tire is the letter S, H, or V, which are all acceptable. You also want to consider the tread life, self-sealing capabilities, and the terrain they will be required to function on.
Ensure that the vehicle has an engine with sufficient power to quickly accelerate out of a crisis situation.
Install oversized outside mirrors on both sides of the vehicle. This will allow for better vision on the sides of the vehicle.
Install a two-way communication system in the vehicle.
Continued on next page

MCI Course 0210D

5-10

Study Unit 5, Lesson 2

Securing Your Vehicle, Continued
Vehicle
Specifications, continued Equipment
Tinted
windows

Alarms

Miscellaneous

Specifications
Tinted windows make it difficult for someone on the outside to look into the interior of the vehicle. However, be aware that tinted windows make it more difficult for you to perform a car bomb search.
There are many types of alarms on the market that are affordable to everyone. These devices can be circumvented; however, as a deterrent, they will help.
Other items you can use include installing an interior trunk latch, first aid and survival kits, and fire extinguishers.

Notes: Always keep the gas tank at least one-half full.
Control your keys at all times. When leaving your car with an attendant or mechanic, leave only the ignition/valet key. Be conscious of house keys, office keys, etc.
Always keep your car in good mechanical repair.

MCI Course 0210D

5-11

Study Unit 5, Lesson 2

Chauffeurs and Drivers
Evaluate Your
Driver

If you are planning on hiring a driver, ensure the driver has the training needed to meet your demands. Advanced driving schools will teach drivers techniques vital to surviving a crisis situation.


The driver should remain alert at all times and focus his full attention on operating the vehicle. When a crisis develops, the decisions of the driver will directly affect the lives of the passengers.



The driver should be trained to respond to any situation. His primary responsibility is to drive the vehicle. Until the vehicle is brought to a halt the driver should not be concerned with using a weapon, a radio, or any other device. 

While driving, the driver should visualize two or three blocks ahead. He should

constantly be thinking of scenarios during the entire drive.
Basic Rules for
Employing
Chauffeurs

If chauffeurs are to be used, check out the prospects with the embassy or association they are affiliated with. There are four basic rules to follow when employing chauffeurs:
Rules
Have the chauffeur remain with the vehicle at all times.
Prearrange a signal with the chauffeur showing that it is safe to enter. (Such as the chauffeur taking off his hat or placing a pack of cigarettes on the dash).
Never give your itinerary or exact travel information to the chauffeur. Never enter the vehicle with a substitute driver until you have checked his credentials with the appropriate authority.

MCI Course 0210D

Explanation
If the chauffeur is not at the vehicle when you approach, do not enter it.
Be aware of the great potential for this method to fail if the terrorists have managed to blackmail the chauffeur or coerce him to their side.

Be extremely cautious about giving out schedules.
Give the chauffeur a general idea of when to show up;
e.g., 0600, even though you do not plan on leaving until
0630 or 0700. Inform the chauffeur of your destinations after the car has been started and you are on your way.
During a crisis, will the chauffeur be more concerned with saving his own life or yours?
Determine whether your driving capabilities are as good or better than your chauffeur’s. If they are, dismiss him, and take responsibility of your life into your hands.

5-12

Study Unit 5, Lesson 2

Driving Precautions
CONUS

While driving throughout the United States there are general precautions you should always take.
Precaution

Explanation

Stay mentally alert at This is not the time to review reports or to eat all times especially as breakfast. The driver will be occupied with a passenger. operating the vehicle. Use the extra set of eyes to spot unusual activity.
Constantly vary your Try to have at least three different routes to and from routes and routines. work to home.
Drive in the far left
This will not allow your vehicle to be forced to the lane when feasible. curb. At traffic lights and stop signs, stay in a lane that will allow maneuverability out of a crisis situation. Allow at least 8-10 feet between your vehicle and the one in front of you.
Drive with the doors Do not allow someone to pull you from a vehicle locked. and attack you because the doors were unlocked.
Always fasten your seatbelt.
Consider swapping
Do not borrow an easy target’s car or a vehicle that cars with a friend or will draw excess attention to you. co-worker to confuse terrorists. Consider carpooling. Carpools offer safety in numbers and confuse the terrorists as to which car you are using. However, should the terrorists attack, carpools offer a larger and possibly more valuable target. It is also more difficult to vary the routines of persons who are dependent on one vehicle for transportation.
Continued on next page

MCI Course 0210D

5-13

Study Unit 5, Lesson 2

Driving Precautions, Continued
OCONUS

In addition to the precautions on the previous page, if you are driving in a foreign country you must take extra precautions:
Precaution

Be aware of ruses.

If the police halt you, do not get out of the car. Watch for persons carrying packages or bottles that may be thrown at your vehicle. Explanation

Terrorists will use schemes such as fake roadblocks or staged traffic accidents in order to get you to stop your vehicle. If a roadblock is set up, quickly determine if the roadblock is official. Take notice of the uniforms and vehicles being used. If they are not official, the chances are the roadblock is a ploy.
If you suspect a ploy, leave the scene and drive directly to the United States embassy or military base. At no time should you allow yourself to be boxed in without the possibility of escape. Report the incident and any involvement you had to the police as soon as possible.
Keep your engine running and roll down the window just enough to allow voice communication and the passing of documents. Stay alert for unusual actions. Should the situation warrant a sudden exit, proceed to the embassy or military base and immediately report it.
In foreign countries, Molotov cocktails are often used to disable a vehicle. To lessen the damage, keep your windows closed at all times. Bottles will often bounce off a vehicle without breaking. If your vehicle is hit by a firebomb that does not disable it or penetrates the interior, keep the vehicle moving and allow the flames to burn out. If the vehicle is disabled, wait 8-10 seconds for the flames to subside and exit the vehicle.

Employ any other techniques that might prevent a terrorist from choosing you as a target.

MCI Course 0210D

5-14

Study Unit 5, Lesson 2

Searching a Vehicle
Bomb Search

A large number of terrorist attacks take place in or around a vehicle, typically by some sort of explosive device. Bombs are easy to make and plant on unattended vehicles. It is imperative for you to learn how to search a vehicle for tampering and to recognize danger signs. By routinely inspecting your vehicle, you give the impression of being a hard target. If terrorists try to place a bomb in or on your vehicle, they will have to conceal it very well, thus adding unwanted time to their operation.

Recommended
Time

An efficient bomb search should take 5 to 15 minutes. If it takes longer, most people will find excuses not to conduct a search. If possible, a two-man buddy team is preferred for the search. The team will decrease the amount of time needed for the search and will also increase the effectiveness of the search. Familiarity with every part of your vehicle is paramount to an efficient search.

What to Look
For

While searching, look for telltale signs of tampering: pieces of tape, discarded wires, grease marks, or foreign materials on or around the vehicle.
To quickly recognize the signs of tampering, allow a layer of dust to settle on the outside of the vehicle. This will aid you in seeing handprints, or signs of disturbance around the vehicle.

Conduct a
Search

To conduct the search, you will need some basic tools: a small mirror mounted on a telescoping handle and a flashlight. The tools are shown in the graphic below.

Continued on next page
MCI Course 0210D

5-15

Study Unit 5, Lesson 2

Searching a Vehicle, Continued
Conduct a
Search,
continued

The steps for searching a vehicle are listed in the table below:

Step
1

Action
In the graphic below, observe the vehicle and the area immediately surrounding it (about 10 to 15 meters) for signs of tampering and bomb litter.

Improvised explosive devices may either be victim actuated or command detonated. If you sense that something is wrong or that the vehicle is not the way you left it, leave the vehicle and call the authorities. If authorities find a device, explosive ordnance disposal (EOD) personnel will be called in. An
EOD team can conduct a thorough search that takes about two to three hours to complete. It will probably take you a few days to put your vehicle back together after the team is through. This alone should motivate you to present yourself as a hard target. Your life or the lives of your loved ones are a high price to pay for complacency or laziness.
Continued on next page

MCI Course 0210D

5-16

Study Unit 5, Lesson 2

Searching a Vehicle, Continued
Conduct a
Search,
continued

Step
2

3
4
5

Action
Once you have completed your perimeter search, move to the front of the vehicle and visually divide it in half, lengthwise.

Continue the search in either direction.
Inspect the grill for wires or any material placed behind it.
Look closely into the hood area, and check for signs of forced entry. Continued on next page

MCI Course 0210D

5-17

Study Unit 5, Lesson 2

Searching a Vehicle, Continued
Conduct a
Search,
continued

Step
6

7
8

Action
Using a mirror, look underneath and behind the front bumper.

Move to the side of the vehicle and observe the bottom of the tires where they make contact with the ground.
Look for any pressure devices placed behind or in front of the tires.
Continued on next page

MCI Course 0210D

5-18

Study Unit 5, Lesson 2

Searching a Vehicle, Continued
Conduct a
Search,
continued

Step
9

Action
Inspect the underside of the wheel well for a bomb. Many times, magnets are used to attach devices to the underside of the wheel well. 10
11

Inspect behind the top of the tire and the coil springs.
Continue moving around the side of the vehicle while inspecting the side, the underside, rear tires, and rear wheel well.
Continued on next page

MCI Course 0210D

5-19

Study Unit 5, Lesson 2

Searching a Vehicle, Continued
Conduct
a Search, continued Step
12
13
14

15

Action
Examine the windows and the weather stripping for any signs of forced entry.
Check to see if the paint or molding shows any signs of a coat hanger or a slim-jim being used to unlock the vehicle.
Look inside the vehicle for hidden intruders or obvious signs of intrusion. Inspect the gas cap for tampering. This should be the first time you touch the vehicle during the search. Be extremely cautious opening up the cap cover.
Continued on next page

MCI Course 0210D

5-20

Study Unit 5, Lesson 2

Searching a Vehicle, Continued
Conduct a
Search,
continued

Step
16

Action
Next, inspect the rear of the vehicle. Check the trunk for signs of forced entry.

17

Check the opening of the exhaust pipe for signs of a device. Make an extra effort to check the bottom and sides of the gas tank as well. Continue to the unsearched side of the vehicle, and follow the same procedures listed above.
As you inspect the side and rear of the vehicle, also examine the entire exhaust pipe, the muffler, and the drive shaft for devices.
When you return to the front of the vehicle, inspect the other side of the front grill and the bumper.
You are now ready to actually enter the vehicle.

18
19
20
21

Continued on next page

MCI Course 0210D

5-21

Study Unit 5, Lesson 2

Searching a Vehicle, Continued
Inspect the
Interior

The following are steps for entering the vehicle and inspecting the interior.
Step
1

2

Action
First, check the door locks. If the vehicle was locked when you left it and unlocked when you returned, do not get inside. Look inside and visually inspect the vehicle, do not lean on or touch the vehicle until you see nothing is wrong. Closely inspect the door, look for wires or objects attached to the door from the inside.
Next, open the door slightly. Using your mirror and flashlight, continue to inspect the seam until the door is open completely.

Continued on next page

MCI Course 0210D

5-22

Study Unit 5, Lesson 2

Searching a Vehicle, Continued
Inspect the
Interior,
continued

Step
3

Action
Inspect the rearview mirror and headrests to ensure they have not been interfered with. Also inspect the sun visors. Whenever you leave the vehicle, make sure the visors are in the down position so that no device can be emplaced and hidden from your view during inspection. 4

To aid in your searching efforts, leave the glove compartment open and empty, as well as ashtrays. Limit the availability of hiding spots for a terrorist to place a bomb.

Continued on next page
MCI Course 0210D

5-23

Study Unit 5, Lesson 2

Searching a Vehicle, Continued
Inspect the
Interior,
continued

Step
5

Action
Next, look underneath the steering column and dashboard. You more than likely will not be able to identify every wire, but you should know the general features and what appears to be out of place. If possible, tape or flex band as many wires together as you can. 6

Use the same procedures for opening the other doors, and inspect the rear seat. Keep your vehicle interior clean and free of debris to limit the ease of hiding a device in your vehicle.
Continued on next page

MCI Course 0210D

5-24

Study Unit 5, Lesson 2

Searching a Vehicle, Continued
Inspect the
Interior,
continued

Step
7
8

9
10

11

Action
Your next step will be to inspect under the hood of the vehicle.
Most late model vehicles have a hood release in the interior.
Before you actually release the hood, have a second person hold down or apply some sort of weight to the hood to prevent it from snapping upward before the second latch engages. This jolt is often enough to trigger a tremor switch or allow a pressure-release trigger to fire.
Once the hood is released, slowly raise it and check the seam just as you did with the doors.
Look for anything unusual in the engine compartment.

Concentrate on the battery, clutch, accelerator, air filter, spark plugs, distributor, and the firewall.
Continued on next page

MCI Course 0210D

5-25

Study Unit 5, Lesson 2

Searching a Vehicle, Continued
Inspect the
Interior,
continued

Step
12
13
14
15

16
17
18
19
20

Completion

MCI Course 0210D

Action
Before opening the trunk, inspect the seam.
Hold the trunk down as you turn the key to prevent an initial spring. Crouch down so that you can look into the trunk and see any wires or IEDs.
Follow the same procedures you did for the hood, open the trunk.
Many vehicles have deep wells by the rear quarter panels that make excellent spaces for IEDs.
You must also carefully inspect the spare tire area.
Check the partition separating the trunk from the rear passenger seat. After the trunk is cleared, your inspection is complete.
Once you feel the vehicle is safe, you can start the vehicle.
Let it run for two minutes before you proceed.

The vehicle search has been tried and tested in training and in real-world scenarios. While the search may not turn up a device, it may be an effective deterrent to the potential bomber or terrorist surveilling you.

5-26

Study Unit 5, Lesson 2

Lesson 2 Exercise
Directions

Complete items 1 through 6 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

List three ways to upgrade the security of your vehicle.
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________

Item 2

What are the acceptable ratings for tires when it comes to temperature, traction, and speed?
______________________________________________________________
______________________________________________________________
______________________________________________________________

Item 3

What are the four basic rules to follow when employing chauffeurs?
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
4. ___________________________________________________________

Item 4

Why should you drive in the far left lane of traffic?
______________________________________________________________
______________________________________________________________
Continued on next page

MCI Course 0210D

5-27

Study Unit 5, Lesson 2 Exercise

Lesson 2 Exercise, Continued
Item 5

How long should an efficient vehicle bomb search take?
______________________________________________________________

Item 6

When conducting a vehicle search, what telltale signs of tampering are you looking for?
______________________________________________________________
______________________________________________________________
______________________________________________________________
Continued on next page

MCI Course 0210D

5-28

Study Unit 5, Lesson 2 Exercise

Lesson 2 Exercise, Continued
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
1

2

3

4
5
6

MCI Course 0210D

Answer
Any three of the following:

Reference Page
5-10

1. Armor
2. Tires
3. Horsepower
4. Mirrors
5. Radios
6. Tinted windows
7. Alarms
Temperature = A
Traction = A
Speed = S, H, V
1. Have the chauffeur remain with the vehicle at all times.
2. Prearrange a signal with the chauffeur showing that it is safe to enter.
3. Never give your itinerary or exact travel information to the chauffeur. 4. Never enter the vehicle with a substitute driver until you have checked his credentials.
Does not allow your vehicle to be forced to the curb.
5 to 15 minutes
Pieces of tape, discarded wires, grease marks, or foreign materials on or around the vehicle

5-29

5-10

5-12

5-13
5-15
5-15

Study Unit 5, Lesson 2 Exercise

(This page intentionally left blank.)

MCI Course 0210D

5-30

Study Unit 5, Lesson 2 Exercise

LESSON 3
TRAVELING BY AIR
Introduction
Scope

The attacks on September 11, 2001 completely changed the spectrum of terrorist incidents involving aircraft. Terrorists skyjacked commercial planes with a plan to use them as massive flying bombs. After this attack, airport security regulations have stiffened immensely making the airways a safer option to travel; however, the threat still remains as terrorists devise more ways to interrupt the lives of the innocent.
In this lesson, you will learn protective measures to be taken when traveling by air.

Learning
Objectives

Upon completion of this lesson, you should be able to



Identify individual protective measures to be used when traveling by air.



In This Lesson

Identify the preferred seats to sit in on an aircraft.

Identify actions to take when being rescued during a skyjacking.

The following topics are in this lesson:
Topic
Introduction
Ticketing Procedures
Individual Protective Measures
Skyjacking
Lesson 3 Exercise

MCI Course 0210D

5-31

See Page
5-31
5-32
5-33
5-34
5-36

Study Unit 5, Lesson 3

Ticketing Procedures
Purchasing
Your Ticket

Purchase your airline ticket through a travel agency or online rather than at a ticket counter. If possible, select your seat and get your boarding pass from the agency. Airline ticket counters offer a wide selection of targets to a terrorist group that is unable to breach the security of an airline itself. Plan your arrival at the airport to allow quick movement through the processing lines. Once at the airport, spend as little time as possible in unsecured areas.
Check your luggage in at the curb, if possible, and move through the security checkpoint right away.

Choosing Your
Itinerary

We as military members often times have little control over our travel itinerary, but we should avoid flying on an airline or flight route that has been targeted by terrorists. Studying the history of the local terrorist groups along your route will aid in your efforts. Select an airline that has a sound security record. The stricter the security the less likely a terrorist will be able to pull off a successful airline attack. Do not select an airline that has scheduled stops in high-risk areas.

Seat Selection

When choosing your seat, select one in an area not readily accessible to a terrorist, preferably a window seat positioned in the middle rear of the aircraft. The seat should also be close to an emergency exit. Terrorists will position themselves where they have the best advantage to control the situation; historically this has been in the front or rear of the aircraft. The graphic below indicates the areas where and where not to sit.

MCI Course 0210D

5-32

Study Unit 5, Lesson 3

Individual Protective Measures
Stay Alert

Always watch for any suspicious or unusual activities. Look for nervous travelers that maintain eye contact with others from a distance. Observe what people are carrying.
Note: Observe behavior not consistent with that of others in the area. If you become suspicious or if you see anything unusual, evacuate the area, and then report the incident. If you are already on board, attempt to notify the flight attendant discretely so he/she can notify the pilot.
Such precautionary action may save your life and the lives of those around you.

Watch What
You Say

Remember that anything you say or do may be used against you. Do not associate with other passengers or conduct yourself in a manner that will identify you as a Marine. If terrorists are surveilling the area, you could be picked as a target. If another passenger recalls your identity and essential facts about you, he might use that knowledge to lessen his own pain and discomfort during an interrogation.

Avoid Symbols

When traveling, avoid carrying luggage or briefcases with identifying symbols on it (e.g. eagle, globe and anchors, Semper FI stickers, nametapes).
Whenever possible, avoid traveling in uniform. Terrorists will obviously realize the exploitation value of an American service member in uniform and are likely to take advantage of you.

Keep Track of
Luggage

Be extremely observant of personal carry-on luggage. Thefts of briefcases and laptop cases are increasing throughout airports worldwide. Never leave your luggage unattended. This provides an opportunity for a terrorist to place an unwanted object or device in your bag. As much as possible, do not pack anything you cannot afford to lose. Make copies of all-important documents and carry the copy.

MCI Course 0210D

5-33

Study Unit 5, Lesson 3

Skyjacking
Reaction

Historically, the takeover of a plane occurs 15 to 60 minutes into the flight. If a skyjacking takes place, remain in your seat with your seatbelt fastened. At the first opportunity, place your important documents and any military identification in a secure hiding place, one of the best being inside the airsickness bag. Placing articles inside a magazine or under the seat is not the most effective method of concealing them, but these should be considered if caught unprepared.
Be aware that all skyjackers may not reveal themselves at the same time. A lone skyjacker may be used to draw out security personnel for neutralization by other skyjackers. Discretely observe your captors and memorize their physical descriptions. Include voice patterns and language distinctions, as well as clothing and unique physical characteristics.
When asked to produce identification, show civilian identification (tourist passport/driver’s license). Never volunteer information about your involvement with the military, but do not lie if directly asked about it. If questioned about your job or travel plans, give a civilian equivalency and innocent circumstances that led to your being on the plane. At this point, no false statements should have been made. If confronted with evidence of DoD employment, provide minimal information.

Firearms

If you are authorized to carry a firearm, place it in your checked baggage.
Chances are highly unlikely that you would be successful in an attempt to overtake the terrorists. Drastic actions on your part could cause the terrorists to kill you, passengers, and the crew. In the event of a firefight, a window or critical juncture of the aircraft may be hit, creating an emergency situation from which escape would be extremely difficult. If you have a weapon when the takeover begins, hide it, as well as the holster.
Continued on next page

MCI Course 0210D

5-34

Study Unit 5, Lesson 3

Skyjacking, Continued
Rescue

During a skyjacking, the plane will most likely land somewhere. At this time, authorities may initiate a rescue attempt. Statistically, rescue attempts are the most dangerous time for passengers. Take these actions into account when you are being rescued:




Avoid any movement – Movement attracts attention from the terrorists as well as the rescue forces.



Do not attempt to help – Under no circumstances should you attempt to help unless specifically asked to do so by the rescue force. The noise and confusion will make it difficult for the rescuers to distinguish between friend and foe. Generally, anyone making a violent gesture or carrying a gun will probably be shot or forcefully dealt with.



Listen closely to commands – The rescuers may be speaking in languages that you do not understand. Listen closely and pay strict attention to any gestures they give you.



Expect to be handled roughly – In order for the rescuers to remain safe they must treat everyone as a threat. Remain calm and understand the reason for the harsh treatment. Be prepared to be separated from your family while you and they are searched.



MCI Course 0210D

Find cover − At the first indication of a rescue attempt, use all available cover around you. If you are in your seat, assume the classic crash position (arms into your sides/head on your knees). Pick your feet up so that no rounds or fragments will strike your legs, and keep your eyes on the closest terrorist watching to make sure he does not try to kill you.

Preplan an escape route – If the plane happens to catch fire or if the rescue attempt is unusually slow you must depart the plane or else risk being killed. Use the nearest exit, and move carefully to the ground. Once on the ground, move away from the aircraft from either the tail or nose of the aircraft in a manner that the terrorists do not have a clear shot of you.
Raise your hands in the air and shout, “Don’t shoot! I am a passenger!”
You do not want to be mistaken for an escaping terrorist.

5-35

Study Unit 5, Lesson 3

Lesson 3 Exercise
Directions

Complete items 1 through 3 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

Where is the preferred place to sit on an aircraft?
______________________________________________________________
______________________________________________________________

Item 2

What are the four protective measures to remember when traveling by air?
1. ________________________________________________________
2. ________________________________________________________
3. ________________________________________________________
4. ________________________________________________________

Item 3

What actions should be taken in the event of a skyjacking rescue attempt?
1. ________________________________________________________
2. ________________________________________________________
3. ________________________________________________________
4. ________________________________________________________
5. ________________________________________________________
6. ________________________________________________________
Continued on next page

MCI Course 0210D

5-36

Study Unit 5, Lesson 3 Exercise

Lesson 3 Exercise, Continued
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
Answer
1
A window seat positioned in the middle rear of the aircraft. Also close to an emergency exit.
2
1. Stay alert.
2. Watch what you say.
3. Avoid symbols.
4. Keep track of luggage.
3
1. Find cover.
2. Avoid any movement.
3. Do not attempt to help.
4. Listen closely to commands.
5. Expect to be handled roughly.
6. Preplan an escape route.

MCI Course 0210D

5-37

Reference Page
5-32

5-33

5-35

Study Unit 5, Lesson 3 Exercise

(This page intentionally left blank.)

MCI Course 0210D

5-38

Study Unit 5, Lesson 3 Exercise

LESSON 4
STAYING SAFE IN HOTELS
Introduction
Scope

While traveling for extended periods of time, staying in a hotel is more than likely unavoidable. Hotels create a difficult security problem, but there are precautions you can always take to maintain a safe posture. In this lesson, you will learn what these measures are.

Learning
Objectives

Upon completion of this lesson, you should be able to



Identify guidelines when asking for a room at a hotel.



In This Lesson

Identify examples of security measures that hotels can employ.

Identify actions for responding to a hotel page.

The following topics are in this lesson:
Topic
Introduction
Choosing the Right Hotel
Securing Your Room
Lesson 4 Exercise

MCI Course 0210D

5-39

See Page
5-39
5-40
5-41
5-42

Study Unit 5, Lesson 4

Choosing the Right Hotel
Options

Depending on where you are traveling, consider the following options when deciding which hotel you should stay:



If these facilities are not available, choose a hotel that employs security measures. Find out if the hotel has security guards, and if employed, what their level of expertise is. Familiarize yourself with their uniforms and equipment. Also know the proper procedures for obtaining their services.
The use of cameras to monitor hallways and elevators, and visitor control procedures are also signs of a security-conscious establishment.



If you are traveling overseas, be sure to check with the embassy staff and find out if they have a certain hotel that they have a good rapport with.



Choose the
Right Room

Whenever possible, use an on-base or DoD facility. They generally offer better security and are better equipped to deal with a terrorist attack.

Avoid hotels that are in a bad area of town. Saving a few dollars a night is not worth putting yourself in jeopardy.

After you find a hotel, ensure you get the right room. Listed are some things to consider when looking for a hotel.




Do not reserve specific rooms. If a hotel room has been reserved for you prior to checking in, request another room. Do not give your room number to strangers.



MCI Course 0210D

Avoid street level rooms. Ask for a room between the second and eighth floors. This puts you high enough to avoid easy access from the outside, bomb attacks, and drive by shootings, yet still low enough for local fire equipment to reach you in case of an emergency.

Change rooms occasionally. If staying in the same hotel for an extended period of time, change your room and floor occasionally so that any effort to conduct operations or surveillance against you will require more time and resources.

5-40

Study Unit 5, Lesson 4

Securing Your Room
Staying Inside

While in your room, keep the door locked and use the security chain. If you feel the threat is extremely high, you can enhance the existing locking system.
There are a number of portable locks on the market that will provide substantial protection.
Place the DO NOT DISTURB sign on the door and do not admit any strangers to your room, and refuse all unexpected deliveries.

Leaving the
Room

Remember the following guidelines when leaving your room:




Lock your doors and windows when you exit the room. Also consider securing any valuables in the hotel safe.



Keep your room key with you at all times.



When entering or exiting rooms, halls, lobbies, or public areas, be alert for anyone loitering or carrying objects that could conceal weapons. Avoid loitering in lobbies or public areas such as rest rooms. Terrorists favor these locations for placing bombs.



Change your routine when leaving the room. Use different hotel entrances, elevators, and stairwells.



MCI Course 0210D

Leave the lights, television or radio on when you are out of the room to give the impression that someone is still there.



Hotel Paging

Make sure to keep everything in a neat and orderly fashion. Leave shower curtains and closets open whenever you leave the room. This will help you recognize evidence of tampering or strange, out of place objects.

Know the location of emergency exits and equipment. Become familiar with the emergency plans.

Hotel paging is an easy way for a terrorist to gain a positive identification of his target. It can be used as a baiting tool for an attack. If you are ever paged over the hotel’s public address system, do not respond. If you are expecting a visitor, enter the lobby, without identifying yourself to the desk clerk. Look around for your party and check to see if the caller was whom you are waiting for. If you do not see anyone you recognize, call the front desk first and inquire about the paging.

5-41

Study Unit 5, Lesson 4

Lesson 4 Exercise
Directions

Complete items 1 through 3 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

List three examples of security measures hotels can employ.
1. ________________________________________________________
2. ________________________________________________________
3. ________________________________________________________

Item 2

When obtaining a hotel room, what floor should you ask for? Why?
______________________________________________________________
______________________________________________________________
______________________________________________________________

Item 3

What should you do in the event you receive a hotel page?
______________________________________________________________
______________________________________________________________
______________________________________________________________
Continued on next page

MCI Course 0210D

5-42

Study Unit 5, Lesson 4 Exercise

Lesson 4 Exercise, Continued
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
Answer
1
1. Security guard
2. Cameras to monitor activity
3. Visitor control procedures
2
A room between the 2nd and 8th floors.
This puts you high enough to avoid easy access and low enough for local fire equipment to reach you.
3
Do not respond to the page. If you are expecting a visitor, enter the lobby, without identifying yourself to the desk clerk. Look around for your party and check to see if the caller was whom you are waiting for. If you do not see anyone you recognize, call the front desk first and inquire about the paging.

MCI Course 0210D

5-43

Reference Page
5-40

5-40

5-41

Study Unit 5, Lesson 4 Exercise

(This page intentionally left blank.)

MCI Course 0210D

5-44

Study Unit 5, Lesson 4 Exercise

STUDY UNIT 6
HOSTAGE SURVIVAL
Overview
Scope

Throughout this course, you have learned how to avoid becoming a victim of a terrorist attack. Sometimes, events unfold in ways that are beyond your control. Regardless of your actions, you suddenly become a hostage. In this study unit, you will learn the different types of detention, the different types of hostage takers, and your responsibilities as a hostage in relation to the
Code of Conduct, how to adjust to being in captivity, and how to survive during a hostage situation.

In This Study
Unit

The following lessons are in this study unit:
Lesson
Analyzing a Hostage Situation
Responsibilities of a Hostage
Adjusting to a Hostage Situation
Surviving a Hostage Situation

MCI Course 0210D

6-1

See Page
6-3
6-9
6-15
6-25

Study Unit 6

(This page intentionally left blank.)

MCI Course 0210D

6-2

Study Unit 6

LESSON 1
ANALYZING A HOSTAGE SITUATION
Introduction
Scope

The chances of you being taken hostage are extremely remote. Should it happen, your knowledge and personal conduct could influence your treatment and chance of survival in captivity. In this lesson, you will learn about the different types of detention and the different categories of hostage takers.

Learning
Objectives

Upon completion of this lesson, you should be able to



Identify the difference between a hostage and a detainee.



Identify categories of hostage takers that pose a threat to the United
States.



In This Lesson

Identify the three types of hostile peacetime detention.

Identify sub-categories of religious extremists.

The following topics are in this lesson:
Topic
Introduction
Detention
Identifying the Threat
Lesson 1 Exercise

MCI Course 0210D

6-3

See Page
6-3
6-4
6-5
6-7

Study Unit 6, Lesson 1

Detention
Peacetime

Peacetime detention refers to being held against your will during a time when armed conflict does not exist or the United States is not directly involved.
Peacetime detention brings with it requirements associated with the Code of
Conduct, which differ slightly from the requirements of being a prisoner of war. There are three general types of hostile peacetime detention:




Hostile government
Hostile government-sponsored terrorist
Independent terrorist group

Hostile
Government

Hostile government detention involves a hostile government (one whose relationship with the United States is tense) legally detaining a U.S. citizen or service member for violation(s) of its laws. For example, a Marine may be detained in a given country for an unintentional act, such as crossing the country’s borders not knowing it may be a civil or criminal offense under the country’s laws. Persons in this status are properly called detainees.

Hostile
GovernmentSponsored
Terrorist

Hostile government-sponsored terrorist detention refers to the detention of
U.S. personnel by terrorists who are sponsored by the government of the country in which the personnel are being held. Persons held under such circumstances are referred to as hostages, not detainees. Their capture and continued detention are violations of international law. These individuals are normally held for the purpose of propaganda or to coerce the United States to take some action desired by the terrorists.

Independent
Terrorist
Group

Independent terrorist group detention is the detention of U.S. personnel by terrorists who are not sponsored by a hostile government. Captives of independent terrorist groups are also known as hostages. Their capture and detention is also a violation of international law. The intent again is to use these captured personnel for propaganda purposes or to coerce the United
States to take some action desired by the terrorists.

MCI Course 0210D

6-4

Study Unit 6, Lesson 1

Identifying the Threat
Classification

Classifying hostage takers by certain categories is merely to provide a guideline. The real identity of the terrorist can only be examined in the context of his relationships to the people, the organization, places, and ideas with which he is associated. Almost all terrorist organizations are made up from a cross section of the population from which they emerge. Young and impressionable, mentally ill, monetarily or ideologically motivated are all examples of individuals you are likely to encounter. The group performing the hostage taking will in turn be a representative slice of the organization.
This slice performs its operations in support of the larger organization’s longrange goals.
The two categories that pose the most likely threat to U.S. personnel are



Political
Extremists

Political extremists
Religious extremists

Political extremists represent the most danger to military personnel because of their political ideology and our value as symbolic targets. These hostage takers often operate within a military like structure. This control factor may hold violence within planned limits, however, within the group there may be one or more terrorists whose propensity for cruelty makes them more dangerous. They may be held in check by their group leadership, but it is important to identify these individuals early in the event and spend extra effort to avoid a confrontation.


The average age of most political terrorists ranges between 19 and 35.
This youth factor heightens their fanaticism; blinds them to reasonable thinking; and insulates them to appeals based on morals, decency, or fear of their own safety.



While political extremists are often prepared to die for their cause, they are not necessarily suicidal. When the chances for success in the operation dwindle, their primary concern often changes towards escape.



Political extremists generally only take hostages when they have some control over the general terrain where the event takes place.
Continued on next page

MCI Course 0210D

6-5

Study Unit 6, Lesson 1

Identifying the Threat, Continued
Religious
Extremists

These hostage takers generally fit one of three subcategories:




Member of a radical offshoot of a recognized religion
Member of a cult
Religious loner

Recognized
Religion

Religious extremists share a common, unshakeable belief in the righteousness of their cause and their actions. They feel that whatever actions they take, in the eyes of God, these actions are good. These radicals usually have a charismatic leader who preaches a form of exclusivity by which only the select can enter heaven. If you are not a member of the sect, you are an enemy. If they perceive hostility toward their religion by the hostage, they may react with violence. Feeling superior because of their beliefs, they may be inflexible and express a preference for death. Their conduct is often irrational and extremely defensive.

Cults

Cults are religions without political power. Cults do not present as significant a threat as more conventional and widely known religious extremist groups, but they do contain the potential for violent confrontations and hostage takings. Religious Loner

While these individuals are not often encountered, they could present the gravest threat. These individuals are more detached from reality and less rational than the ones belonging to a group. A religious loner believes himself to be operating on direct divine orders, making him the most dangerous and least susceptible to reason.

Strategy

There are specific strategies, as well as some general rules of behavior, a hostage should consider if he/she can identify the category of his/her hostage taker. 



MCI Course 0210D

Determine the area of particular sensitivity, such as politics or religion, and avoid conversation in these subjects. If confronted, become an active listener, and adapt to, rather than adopt, the hostage taker’s value system.
Religious hostage takers are very touchy and defensive about their religion; do not make assumptions about it that will upset the terrorist.

6-6

Study Unit 6, Lesson 1

Lesson 1 Exercise
Directions

Complete items 1 through 4 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

What are the three types of hostile peacetime detention?
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________

Item 2

What are persons held under an independent terrorist group known as?
______________________________________________________________

Item 3

What are the two categories of hostage takers that pose the most likely threat to U.S. personnel?
1. ___________________________________________________________
2. ___________________________________________________________

Item 4

What are the three subcategories of religious extremists?
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
Continued on next page

MCI Course 0210D

6-7

Study Unit 6, Lesson 1 Exercise

Lesson 1 Exercise, Continued
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
1

2
3
4

Answer
 Hostile government
 Hostile government sponsored terrorist  Independent terrorist group
Hostages






MCI Course 0210D

Reference Page
6-4

6-4

Political extremists
Religious extremists
Member of a radical offshoot of a recognized religion
Member of a cult
Religious loner

6-8

6-5
6-6

Study Unit 6, Lesson 1 Exercise

LESSON 2
RESPONSIBILITIES OF A HOSTAGE
Introduction
Scope

Whether detained during a peacetime situation or taken hostage by a terrorist group, as an individual in the military you are expected to conduct yourself according to the guidance set forth by the Department of Defense (DoD). The guidance provided in this lesson will help military personnel survive detention or captivity situations. This does not constitute a means for judgment or replace the UCMJ as a vehicle for enforcement of proper conduct. Although DoD guidance is exactly the same as the Code of Conduct in some areas, the guidance applies only during operations other than war.
For wartime incidents, always rely on the Code of Conduct and the Geneva
Convention for guidance.

Learning
Objectives

Upon completion of this lesson, you should be able to



In This Lesson

Identify the Department of Defense instruction that provides guidance on authorized conduct for a hostage.
Identify the only information that detainees should provide to their captors. The following topics are in this lesson:
Topic
Introduction
Directives and Guidelines
Required Information
Lesson 2 Exercise

MCI Course 0210D

6-9

See Page
6-9
6-10
6-11
6-12

Study Unit 6, Lesson 2

Directives and Guidelines
Department of
Defense

DoD Instruction 1300.21 provides guidance to assist U.S. military personnel in captivity or hostile detention during operations other than war. This policy gives guidance on the conduct of U.S. military personnel isolated from U.S. control and applies at all times. Military personnel finding themselves isolated from U.S. control are required to do everything in their power to follow DoD policy. The DoD policy in this situation is to survive with honor.

Military
Bearing

DoD Instruction 1300.21 emphasizes that regardless of the type of detention or captivity, or harshness of treatment, U.S. military personnel shall maintain their military bearing. Make every effort to remain calm and courteous and to project personal dignity. This is particularly important during the early stages of internment when the captors may be uncertain of their control over the captives. Unruly behavior seldom serves the long-term interest of the hostage. It often results in unnecessary punishment that serves no useful purpose. Foreign Laws

While in custody in a foreign country, remember the civil laws of that country apply. Detainees shall maintain their military bearing and should avoid aggressive, combative, or illegal behavior. Any behavior otherwise may complicate the situation and make any effort to negotiate a rapid release more difficult. Propaganda

Hostages should make reasonable efforts to avoid signing confessions, making propaganda broadcasts, or conducting news interviews, which would embarrass the U.S. or host governments. Propaganda has been successfully avoided by presenting logical reasons. The threat of death for noncompliance will always take precedence. Do not mistake pride for inappropriate resistance. If forced to sign or make a statement, attempt to degrade the propaganda and provide the minimum cooperation.

Photos

If photographs are being taken, do not attempt to hide your face. This will provide for positive identification should the photos be released.

MCI Course 0210D

6-10

Study Unit 6, Lesson 2

Required Information
Geneva
Convention

Since the detainers’ goals may be maximum political exploitation, U.S. military personnel must be extremely cautious of the captors in everything they say or do. Detainees should only provide the following:






Name
Rank
Social security number
Date of birth
Innocent account of circumstances leading to detention

Further discussion should be limited to and revolve around health and welfare matters, conditions of their fellow detainees, and going home.

Group
Detention

In-group detention or hostage situations, military detainees should organize to the fullest extent possible, in a military manner under the senior military member present and eligible to command.
Every effort should be made to establish and sustain communications with other detainees or hostages. Military members should encourage civilians being held with them to participate in the military organization and accept the authority of the senior military member.

Release

MCI Course 0210D

Detainees are not likely to earn their release by cooperation. The military member may gain release by doing his or her best to resist exploitation, thereby reducing his or her value to a detainer, and thus prompting a hostile group to negotiate seriously. You should not refuse to accept release unless doing so requires you to compromise your honor or cause damage to the U.S. government or its allies.

6-11

Study Unit 6, Lesson 2

Lesson 2 Exercise
Directions

Complete items 1 and 2 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

Which DoD instruction provides guidance on authorized conduct for a hostage? ______________________________________________________________

Item 2

Name four things a detainee should provide to their captors.
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
______________________________________________________________
Continued on next page

MCI Course 0210D

6-12

Study Unit 6, Lesson 2 Exercise

Lesson 2 Exercise, Continued
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
1
2

MCI Course 0210D

Answer
 DoD Instruction 1300.21
Any four of the following:
 Name
 Rank
 Social security number
 Date of birth
 Innocent circumstances leading up to detention

6-13

Reference Page
6-10
6-11

Study Unit 6, Lesson 2 Exercise

(This page intentionally left blank.)

MCI Course 0210D

6-14

Study Unit 6, Lesson 2 Exercise

LESSON 3
ADJUSTING TO A HOSTAGE SITUATION
Introduction
Scope

As a hostage, you must adapt to captivity. You must forget about any mistakes you may have made up to this point and concentrate on and accent the positive. In this lesson, you will learn ways to adapt to your surroundings as well as methods used to combat stress in order to maintain a positive mental attitude.

Learning
Objectives

Upon completion of this lesson, you should be able to



Identify the different types of isolation.



Identify ways to exert control to influence reactions and limit harmful stress. 

In This Lesson

Identify activities to overcome boredom.

Identify the most common defense mechanisms hostages use in order to survive. The following topics are in this lesson:
Topic
Introduction
Physical Adjustments
Psychological Adjustments
Lesson 3 Exercise

MCI Course 0210D

6-15

See Page
6-15
6-16
6-18
6-22

Study Unit 6, Lesson 3

Physical Adjustments
Living
Conditions

One of the best ways to measure what living conditions may be like in a captive situation in a foreign country is to look at the living conditions of the local people on the lowest level of subsistence. A hostage may be maintained on an even lower level. The types of living conditions vary from incident to incident. Hostages may be held for days on a bus, airliner, or train where heat and lack of adequate water, food, and toilet facilities can be almost unbearable. In some situations the hostages are locked in separate rooms, or may be in the same room with other hostages blindfolded, gagged, and tied up. During the seizure of an office or residence, hostages may find themselves in familiar, comfortable surroundings in which they work or live.
Kidnap victims are frequently forced to live in makeshift prisons in attics or basements or in remote hideouts. The cells of these prisons are usually quite small and in some cases prevent the hostage from standing up or moving around. Sleeping and toilet facilities may be scarce, consisting of a cot or mattress and a bucket or can for body waste. Toilet facilities may not be provided at all, forcing the hostage to foul his living space and himself.

Appearance

It is essential to maintain a good appearance as much as possible under the existing conditions. If the hostage is unable to wash his/her clothing over extended periods of time, such measures as brushing off dust, straightening clothes, tucking in shirttails, and smoothing out wrinkles are necessary to help improve overall appearance.

Hygiene

Hostages should bathe whenever possible. If this is not possible, try to keep your hands and face clean. Keep your hair and any facial hair well groomed.
Always keep your fingernails clean. One of the most prevalent health-care problems that occur during extended periods of captivity is that of oral hygiene. If a toothbrush is not available, attempt to fabricate one by materials available to you. Emphasis should be placed on massaging the gums.

Fitness
Program

Develop and maintain a daily physical fitness program. Exercise may be difficult due to cramped space or physical restraints on the arms and legs. If possible, run in place, do push-ups and crunches. Ensure your caloric expenditure does not exceed your caloric intake. Staying physically fit might be the deciding factor should an escape opportunity present itself.
Continued on next page

MCI Course 0210D

6-16

Study Unit 6, Lesson 3

Physical Adjustments, Continued
Illness

MCI Course 0210D

A side effect of captivity for some hostages is weight loss. Although this loss may be considerable, it generally does not cause health problems. Weight loss may occur even with adequate food supply, since captives often lose their appetite. In some cases hostages may suffer gastrointestinal upset, nausea, vomiting, diarrhea or constipation. Although these symptoms may be debilitating, they usually are not life threatening. Since the terrorists are primarily concerned with keeping their hostages alive and well, do not hesitate to complain and ask for medication. Terrorists want their hostages alive and are not likely to take chances by providing the wrong medicine. In a number of cases, terrorists have provided medical care for hostages who were suffering from illness or injury.

6-17

Study Unit 6, Lesson 3

Psychological Adjustments
Positive
Attitude

One of the most important aspects of sustaining dignity is to maintain a positive attitude. You should mingle and converse with other captives if allowed. Try to assist others who need help and assume the role of a leader if senior. Maintain an optimistic attitude that will allow you to confront the problems and stress of captivity and deal with them accordingly. Smile often, it will tend to rub off on other hostages.
In contrast to this, a hostage who has given up and has no interaction with others and is only concerned with his own well-being, will certainly stand out in a negative way. The pessimist or introvert will find these times much more difficult. His ability to maintain dignity and self-respect will be weakened, even though self-respect and dignity may be the keys to retaining status as a human being in the eyes of the terrorists.

Fear

Terrorists use fear to control, intimidate, and wear down the hostages and the negotiators. They may induce fear by loading and unloading weapons in the presence of the hostages, displaying excessive fits of anger, resorting to physical abuse, and staging mock executions. The fear of death is the greatest during the first few hours of captivity. As the initial fear subsides, the victim may begin to feel he owes his life to his captor. As additional time passes, feelings of fear may be transferred from the terrorist to the authorities.

Time

The passage of time without rescue or release can be depressing, but it does work to the hostage’s advantage. The longer a hostage is held in captivity, the greater the chance of survival. Time is a factor in the development of the
Stockholm syndrome (discussed further in Lesson 4) and in rapport-building efforts. You should avoid setting anticipated release dates or allowing your captor to establish these milestones for you. You are setting yourself up for an emotional fall if you think you will be home by the holidays or on a specified date and those expectations are not met.

Boredom

Boredom is the one companion a hostage will have in captivity. You must aggressively face the challenge of captivity by engaging in creative mental and physical activities. As stated earlier in Lesson 3, you should develop a daily physical fitness program. You should also engage in creative mental activities, such as reading, writing, or daydreaming. Ask for reading and writing materials and request permission to listen to a radio or watch television. Such requests may be granted.
Continued on next page

MCI Course 0210D

6-18

Study Unit 6, Lesson 3

Psychological Adjustments, Continued
Boredom,
continued

Other ways to keep active are to use deliberate and slow methods for simple tasks such as, taking your time while brushing your teeth, taking an hour to make the bed, or studying the activities of ants coming in and out of the cell.
Imagine different members of your family and friends coming to visit with you for a day, or walk through a church service in your head. There are countless activities you can take part in or imagine to keep you busy.

Isolation

Social isolation or solitary confinement is when the captive is completely denied interpersonal contact. Perceptual isolation, or the denial or overuse of one of the senses to deny the hostage outside stimuli, also creates social isolation. Headphones, blindfolds, and small enclosures may be used to accomplish this goal. During isolation, the hostage must rely completely on mental activities to adjust to and overcome adversity. The hostage will have less opportunity to communicate with other hostages and will have to concentrate his efforts and take advantage of every opportunity.
Communication with others helps a person experience a sense of worth, which defeats the feeling of being alone.

Combating
Stress

Stress is a condition that occurs when a person faces a threatening or unfamiliar situation. Not all stress is bad. A certain level of stress is necessary for optimal performance. Stress causes bodily changes that may help an individual overcome challenges and danger. Too much stress is extremely detrimental to your mind and body. A person’s physical condition affects his/her ability to handle stress. An individual’s response to stress also depends on whether he/she feels in control of the situation. Difficult situations may cause little stress if a person can predict, overcome, and understand what is going on.
Continued on next page

MCI Course 0210D

6-19

Study Unit 6, Lesson 3

Psychological Adjustments, Continued
Limiting Stress

Listed in the table below are several ways of exerting control to influence our physiological reaction and limit harmful stress.
Example
Maintain your confidence. Maintain your physical condition. Take care of any family matters. Maintain sleep discipline.
Practice recreation.

Maintain a daily schedule. Keep your sense of humor. Maintain a positive mental attitude.
Talk yourself through a situation. Maintain your religious values. Learn or devise methods to communicate.

Practice some form of meditation. Explanation
Maintain confidence in your ability to survive with honor with your fellow hostages, maintain confidence in your country’s ability and desire to end your captivity, and maintain faith in your family and religion.
Develop a program of exercise on the first day of your captivity. Eat what you are given, no matter how strange or unusual it may seem.
Fix what would cause you to worry prior to be captured, accept what you cannot change because of captivity.
Avoid sleeping too much.
Be inventive; reading, writing, radio or television usage, and interaction with other hostages in a positive sense can provide opportunities for periods of recreation.
Keep yourself occupied and have a purpose each day.
Plan a schedule for each day and attempt to stick to it.
Give nicknames to your captors; make jokes about your situation. The most deadly aspect of long-term captivity is the mental exhaustion and depression that set in. You must constantly, vigorously oppose these feelings.
Verbally talk aloud to yourself. Calm yourself down during a stressful situation.
Religious values will always provide you with a source of strength.
Devise a code to use with fellow captives. A knocking system or letter/number codes are simple but effective methods to use and at the same time do not allow your captors to know what you are discussing.
If possible, find a quiet environment and shift your mind’s focus from the situation at hand.
Continued on next page

MCI Course 0210D

6-20

Study Unit 6, Lesson 3

Psychological Adjustments, Continued
Defense
Mechanisms

When a hostage experiences a great deal of stress, his mind seeks a means of survival. One avenue it may take is the use of defense mechanisms. These are essential unconscious psychological adjustments made in the presence of danger. Three of the most common defense mechanisms are




Denial
Regression
Identification

Denial

Denial occurs when the mind is overloaded by a traumatic experience. The mind responds as if the incident were not happening. It may be verbally expressed by phrases like “Oh no! Not me!” “This must be a dream!” or
“This is not happening!” An example of denial can be compared with the unexpected death of a loved one. Frequently, hostages gradually accept their situation, but find a safety valve in the thought that their fate is not fixed.
They view the situation as temporary, convinced that someone will come to their rescue.

Regression

Regression results in a behavior adjustment in which the mind unconsciously selects a behavior that has been used successfully in the past when confronted with total dependency. For example, as children we were totally dependent on a primary care giver for psychological and physiological needs. In a hostage situation, the hostage taker assumes the role of primary care giver.

Identification

Identification with the hostage taker occurs on the unconscious level. The mind seeks to avoid wrath or punishment by emulating behaviors and adapting to the hostage taker’s values. For example, a young recruit identifies with his drill instructor. Identification initially is to avoid punishment, but eventually changes to the adoption of the instructor’s standards and values.

Coping

Coping is an ongoing, active process used to meet the task requirements of adapting to a relatively difficult situation. Coping involves innovative rather than routine behaviors. It differs from defense mechanisms in that it is not restricted to unconscious psychological mechanisms, but also involves conscious, deliberate behavior as well. Coping, if used properly, is a good device for employing rapport-building techniques. It does have a drawback in that many people, including terrorist, do not like to be patronized.

MCI Course 0210D

6-21

Study Unit 6, Lesson 3

Lesson 3 Exercise
Directions

Complete items 1 through 4 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

Name two activities used to overcome boredom.
1. ___________________________________________________________
2. ___________________________________________________________

Item 2

What is the difference between social isolation and perceptual isolation?
______________________________________________________________
______________________________________________________________
______________________________________________________________

Item 3

Name five ways to exert control to influence reactions and limit harmful stress. 1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
4. ___________________________________________________________
5. ___________________________________________________________

Item 4

What are the most common defense mechanisms hostages use to survive?
______________________________________________________________
______________________________________________________________
______________________________________________________________
Continued on next page

MCI Course 0210D

6-22

Study Unit 6, Lesson 3 Exercise

Lesson 3 Exercise, Continued
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
Answer
1
Any two of the following:

2

3

4

MCI Course 0210D

Reference Page
6-18
6-19

1. Develop a physical fitness program 2. Read
3. Write
4. Daydream
5. Keep active
Social isolation is when the captive is completely denied interpersonal contact. Perceptual isolation is the denial or overuse of one of the senses to deny the hostage outside stimuli.
Any five of the following:
1. Maintain your confidence
2. Maintain you physical condition
3. Take care of family matters
4. Maintain sleep discipline
5. Practice recreation
6. Maintain a daily schedule
7. Keep your sense of humor
8. Maintain a positive mental attitude
9. Talk yourself through a situation
10. Maintain your religious values
11. Learn or devise methods to communicate 12. Practice some form of meditation
1. Denial
2. Regression
3. Identification

6-23

6-19

6-19
6-20

6-21

Study Unit 6, Lesson 3 Exercise

(This page intentionally left blank.)

MCI Course 0210D

6-24

Study Unit 6, Lesson 3 Exercise

LESSON 4
SURVIVING A HOSTAGE SITUATION
Introduction
Scope

If you end up in a hostage situation, there are many things you can do to help aid your survival effort. Actions you take during captivity, relationships you may build with your captors and other hostages, and even timing all play vital roles in your survival. In this lesson, you will learn when and how to resist, the effects of the Stockholm Syndrome, and the best options concerning escapes. Learning
Objectives

Upon completion of this lesson, you should be able to



Identify the Stockholm Syndrome.



Identify experiences commonly associated with victims of the Stockholm
Syndrome.



Identify methods used to establish rapport with your captors.



Identify the elements of information necessary for an effective escape plan. 

Identify the safest response during a rescue attempt.


In This Lesson

Identify the methods used to resist interrogation.

Identify the U.S. policy towards terrorist abductions.

The following topics are in this lesson:
Topic
Introduction
Resisting
Stockholm Syndrome
Establishing Rapport
Planning an Escape
Rescue and Release
Lesson 4 Exercise

MCI Course 0210D

6-25

See Page
6-25
6-26
6-28
6-30
6-32
6-33
6-35

Study Unit 6, Lesson 4

Resisting
Moment of
Capture

At the moment of capture, you have to make an instantaneous decision whether to resist or surrender. It is dangerous to resist; but, there are circumstances in which it is more risky to be captured. The initial moment in a capture is the most dangerous time because the captors are tense and their adrenaline is flowing. The assailants may commit unintentional violence with the slightest provocation. Innocent acts such as reaching for identification or raising a hand to scratch, may be wrongly interpreted and precipitate a deadly response. If the terrorists are well armed and determined, an escape at this moment is an unrealistic goal. You should keep in mind that the terrorist has meticulously planned and executed the hostage operation. The initiative, time, location, and the circumstance of the incident all favor the terrorists.
The manpower and firepower brought to bear on the incident leave little opportunity for escape. Now that you have surrendered, you must begin to resist, but do so the right way.

Struggling

Even though terrorists may use blindfolds, gags, drugs, and weapons at the time of abduction, you should keep in mind the fact that the terrorists want you alive. Do not be alarmed or resist excessively. Struggling with the captors will likely result in even more severe measures by the captors.
Terrorists may use drugs on you to physically control you, put you to sleep, or keep you pacified. “Truth serum” drugs have an effect similar to that of alcohol. Since you have no choice in drug application, do not physically resist. Terrorists may use blindfolds or hoods to prevent you from knowing where you are being taken or to prevent you from identifying them. Do not remove the blindfold, even if an opportunity to do so should arise, as this could leave the terrorists no alternative but to kill you.

Stay Alert

Always stay alert even if you are blindfolded and gagged during a transport.
If you are deprived of certain senses, use your other senses to obtain information and help control your fear and panic. Occupy your mind by noting sounds, direction of movement, passage of time, and terrorist conversation. Any information you can acquire could be useful for later reference. Another consideration is to find surfaces where you can leave full fingerprints on to assist law enforcement authorities in your recovery.
Continued on next page

MCI Course 0210D

6-26

Study Unit 6, Lesson 4

Resisting, Continued
Being
Interrogated

The most important time to resist your captors is during interrogations. If you consistently make it harder for your captors to pull information out of you, the more likely they are to move on to someone else. The following are simple methods to use while being interrogated:
What to do

Explanation

Protect sensitive information. This is your number one priority when being interrogated. Never give up sensitive information unless threatened to the point of death. If you need to make up a story to protect sensitive information, take a simple, plausible position you can remember and talk intelligently about, and stick to it.
Be polite and keep your temper at all times. Do not lose control of your emotions and escalate the situation to the point of extreme danger.
Talk freely about nonessential matters, but be guarded when conversations turn to matters of substance. Remember that a common interrogation technique is the “good guy” and “bad guy” approach. Do not let the “good guy” coax you into giving up information.
Remember to resist questioning at all times.
Hold out information to the point where you feel unsafe to continue, and then divulge the minimum amount possible. After you satisfy the terrorists momentarily, begin resisting again. Continue this cycle as often as possible.

Maintain your bearing.

Give short answers.

Do not be fooled by a friendly approach.

Resist every time.

Remember, your goal is to survive with honor through the incident. If there comes a time when you feel your life is in danger, but the information you hold could endanger the lives of others if given up, you must decide which path you want to take.

MCI Course 0210D

6-27

Study Unit 6, Lesson 4

Stockholm Syndrome
Definition

The stress induced when taken hostage has a significant psychological impact and may lead the hostage to alter his behavior. An unexpected behavior displayed by a hostage is that of aligning himself with the hostage taker. This unusual phenomenon has been termed the “Stockholm Syndrome.”

Background

The Stockholm Syndrome first came about as a result of a bank robbery that turned into a hostage-barricade situation in Sweden in 1973. The takeover of the bank in Stockholm lasted for 131 hours, and permanently affected the lives of four young hostages. A 32-year-old prison escapee and his 26-yearold former cellmate held three females and one male, ranging in ages from 21 to 31, in an 11 x 47 foot carpeted bank vault. During their captivity, a startling discovery was made. Contrary to what had been expected, the victims feared the police more than they feared their captors. Media attention was attracted when hostage statements such as “The robbers are protecting us from the police” were released. A scientific investigation after the event as to why the hostages felt emotionally indebted to the bank robbers led to the discovery of the phenomenon.

Effects

The Stockholm Syndrome seems to be an automatic, probably unconscious, emotional response to the trauma of becoming a victim. The physical and psychological stress induced by the hostage situation causes the hostage to react in a manner totally against his normal beliefs, values, and ethics.
This phenomenon, can affect both the hostage and the hostage taker. In the high stress environment, an emotional bond forms and leads to the development of an “it is us against them” philosophy.

Reactions

The Stockholm Syndrome produces a variety of responses. At the minimal level of response, the victim sees the event through the perspective of his captor. At a higher level, the victim respects and recognizes the terrorist for his gallant efforts. Responses have ranged from hostage apathy to actual participation by the hostage in terrorist activity. Other responses include losing touch with reality, impeding efforts of the rescue forces and negotiation teams, and suffering long-term emotional instability.
Any member of the armed services who provides assistance to the hostage taker may be seen as a collaborator. Such action could be punishable under the Uniform Code of Military Justice.
Continued on next page

MCI Course 0210D

6-28

Study Unit 6, Lesson 4

Stockholm Syndrome, Continued
Positive Aspect

While the negative aspects of the Stockholm Syndrome have been pointed out, there is also a positive aspect. The hostage is not the only one susceptible to the Stockholm Syndrome. The hostage holder can also be affected, which could contribute to the enhanced survivability of the hostage.

Common
Experiences

Victims of the syndrome share common experiences. These experiences include: 



Positive contact
Sensing and identifying with the human qualities of the captors
Willingness to tolerate situations beyond the logical limits

Positive
Contact

Positive contact with the captors is generated by a lack of negative experiences. It appears that positive contact is reinforced to a greater degree if there were negative experiences (beatings, rapes, and murder) early in the event, followed by positive contact.

Sensing and
Identifying with the Human
Qualities of the
Captors

The hostages may relate to their captors. The terrorists may talk about their own mental and physical suffering, their perceptions of being victims of circumstance rather than aggressors. The hostages may then transfer anger from the hostage takers to the society or the situation that created the dilemma in which they are now victims. The hostages may feel the terrorists are entitled to their protection and care, possibly even their help and support.

Willingness to
Tolerate
Situations
Beyond the
Logical Limits

The third common experience of victims deals with preconceived levels of tolerance and expectations of actions. Before a situation develops, most individuals anticipate a limit to the extent they will allow themselves to be pushed or abused. That extent is the logical limit. The need to survive is strong, hostages rationalize an extension of their preconceived limits far beyond what they expected.

MCI Course 0210D

6-29

Study Unit 6, Lesson 4

Establishing Rapport
Make the
Effort

The hostages should make every attempt to establish rapport with the terrorists. This might be the deciding factor that saves his or her life when it comes time for the terrorists to carry out their threat of execution if their demands are not met.

Conversation

In a hostage situation, small talk is better than no talk, but you must be careful with what you talk about and focus your efforts to establishing yourself as a human and not a faceless symbol. Hostages may want to discuss topics with no substance to convey their human qualities and build rapport. Hostages should also do the following:


Introduce commonalities – Discuss family, clothes, sports, hygiene, and food. Anything that you may have in common with your captors.



Use your name – Use your name as often as possible in order to give yourself a sense of identity.



Introduce benign topics at critical times – Talking about positive topics could reduce tension.



Avoid being singled out – Do not become argumentative or combative with your captors. This will make it easier for them to punish you.



Avoid escalating tensions – Do not discuss religion, weapons, killing, or punishment, etc.



Show photographs – If you have pictures of your family or friends, show them to your captors.



Show an interest – If the terrorists want to talk about their cause, show an interest even if you are not sincere. Explain that you may not agree with the captors, but you are interested in their point of view.
Continued on next page

MCI Course 0210D

6-30

Study Unit 6, Lesson 4

Establishing Rapport, Continued
Conversation

You must accept the hostage takers for who they are according to their beliefs. This is a common courtesy. You should accept your captor’s culture in a gracious manner, yet not degrade your own. Disregard the political or religious differences between you and your captors and search for the common ground between yourself and them.
One of the strongest indicators of accepting an individual’s culture is to learn his language. As a start, you should learn short phrases in the captor’s language. While increasing your knowledge of the language, work on other cultural behaviors that may please your captor and reinforce the feeling that you accept and understand their culture.
Always eat the food. Many Americans are afraid to eat the common dishes of other countries simply because they do not look or smell appetizing. Nothing could be more disrespectful than refusing to eat the same food that the terrorist himself may be eating.

MCI Course 0210D

6-31

Study Unit 6, Lesson 4

Planning an Escape
Last Resort

Although escape is considered a last resort, it may be necessary if conditions deteriorate to the point that the risks associated with escape are less than the risk of remaining captive. These risks include




Elements

Torture
Death of hostages due to treatment by the detainers
Credible threat of death or torture of the hostages by the detainers

Hostages and kidnap victims should begin planning for an escape as soon as possible after coming under the control of terrorists to improve the chances of escape, should an attempt be required. Planning should include the passive collection of information on the following elements:



Surrounding areas – Keep track of the conditions that could have an impact on an escape attempt. Once you escape from the compound what are your options? Are there means of cover? Will you have to deal with the local populace?



MCI Course 0210D

Strengths and weaknesses of the facility – Locate the weak points in the facility that would be best for escape. Note areas to stay clear of due to heavy traffic or difficult barriers.



Making the
Decision

The captors – Find out as much information as possible about your captors. Schedule rotations, rank structure, weapons, total numbers, etc.

Items and materials used for support – Locate any tools, maps, food, etc. that may be useful in an escape attempt.

The decision to escape should be based on the careful consideration of the unique circumstances of the terrorist situation. Make an assessment of the current hostage conditions, potential for success, risk of violence during the escape attempt, and the potential reprisals if recaptured. Once you have determined the best course of action, it is time to make a decision and stick to it. 6-32

Study Unit 6, Lesson 4

Rescue and Release
Rescue
Attempts

During a rescue attempt, both the hostage and the rescue force are in extreme danger. Most hostages who die are killed during rescue attempts. You must be especially alert, cautious, and obedient to instructions if an attempt is imminent or occurring. Often times the first hostage execution will serve as a green light for rescue forces.
Your safest response is to drop to the floor immediately, lie as flat as possible, do not move, do not say anything, and do not attempt to pick up a weapon or help the rescuers. Rescue forces have no idea whether you are friend or foe.
Any movement you make could result in injury or death to you or your fellow hostages. After the rescue forces have restored order, the hostages may be handled roughly. Be prepared to be handcuffed, searched, and possibly gagged and/or blindfolded until everyone is positively identified. This is a common procedure for the rescue forces that must separate the hostages from the terrorists. Some of the terrorists may have thrown away their weapons and masks in an attempt to disguise themselves as hostages.

Release

Statistically the odds favor the hostages being released. The moment of release, like the moment of capture, is dangerous. The terrorists are losing their bargaining chip. The rules are simple:



Aftermath

Pay close attention to the instructions the terrorists are giving when the release is taking place.
Do not panic or attempt to run.

Mentally you must now begin to prepare yourself for the aftermath of a hostage ordeal. You will be debriefed by government and military personnel, remember to cooperate fully with them, especially if others are still being held. Once you are released from captivity, write down everything you can remember about the incident:






Location of guards
Description and placement of weapons
Explosives
Explosives
Any other information that might be valuable to the authorities
Continued on next page

MCI Course 0210D

6-33

Study Unit 6, Lesson 4

Rescue and Release, Continued
Aftermath,
continued

Keep in mind that although the information you provide the authorities with might seem insignificant, it could aid in the release or rescue of other hostages who remain in captivity or assist in bringing the captors to trial.
Media may be the first challenge encountered after the release or rescue.
They will want an interview immediately, and you will be in no condition to provide intelligent, accurate responses. Ask for an official military media spokesperson, such as a public affairs officer (PAO). This individual will provide guidance and act as a media buffer. If you are confronted by the media and choose to respond without a PAO, say nothing that might be harmful to your fellow hostages who are still in captivity. Keep your comments as short as possible and limit them to statements such as “I am thankful to be home” or “…alive” or “…out of captivity.” You must say nothing that is sympathetic to the terrorist cause or that might gain support for them. Emotional
Turmoil

Many victims experience a feeling of guilt for not having conducted themselves in a heroic manner. A hostage may suffer defeats in captivity, and once released, may need professional help to sort through the feelings and emotions. Hostages may also emerge from the ordeal with hostile feelings toward their government. They may feel that their government should have been more active in their release. Remember that a government’s unwillingness to make concessions to terrorists discourages future acts of terrorism and sends a message to all terrorists worldwide. When governments have paid ransoms for captives of terrorists, these payments have been used by terrorists to increase their status and capability to continue terrorist acts. It does not mean that your life had no value.

U.S. Policy

MCI Course 0210D

It is the policy of the United States when Americans are abducted overseas, the United States will cultivate international cooperation to combat terrorism and secure the safe release of the hostages. The United States will not bargain or make any concessions to terrorist blackmail.

6-34

Study Unit 6, Lesson 4

Lesson 4 Exercise
Directions

Complete items 1 through 7 by performing the action required. Check your answers against those listed at the end of this lesson.

Item 1

What are the methods used to resist your captors during interrogation?
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
4. ___________________________________________________________
5. ___________________________________________________________

Item 2

What is the definition of the Stockholm Syndrome?
______________________________________________________________
______________________________________________________________
______________________________________________________________

Item 3

What are common experiences associated with victims of the Stockholm
Syndrome?
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
Continued on next page

MCI Course 0210D

6-35

Study Unit 6, Lesson 4 Exercise

Lesson 4 Exercise, Continued
Item 4

List five methods used to establish rapport with your captors.
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
4. ___________________________________________________________
5. ___________________________________________________________

Item 5

What are the elements of information that should be included when planning an escape?
1. ___________________________________________________________
2. ___________________________________________________________
3. ___________________________________________________________
4. ___________________________________________________________

Item 6

What is the safest response during a rescue attempt?
______________________________________________________________
______________________________________________________________

Item 7

What is the U.S. policy towards terrorist abductions?
______________________________________________________________
______________________________________________________________
Continued on next page

MCI Course 0210D

6-36

Study Unit 6, Lesson 4 Exercise

Lesson 4 Exercise, Continued
Answers

The table below provides the answers to the exercise items. If you have any questions about these items, refer to the reference page.
Item Number
1

2

3

4

5

6

7

MCI Course 0210D

Answer
Protect sensitive information
Maintain your bearing
Give short answers
Do not be fooled by a friendly approach 5. Resist every time
An unexpected behavior displayed by a hostage aligning himself with the hostage taker. 1. Positive contact
2. Sensing and identifying with the human qualities of the captors
3. Willingness to tolerate situations beyond the logical limits
Any five of the following:
1.
2.
3.
4.

1.
2.
3.
4.
5.
6.
7.
1.
2.

Introduce commonalities
Use your name
Introduce benign topics at critical times
Avoid being singled out
Avoid escalating tensions
Show photographs
Show an interest
The captors
Strengths and weaknesses of the facility 3. Surrounding areas
4. Items and materials used for support
Drop to the floor immediately, lie as flat as possible, do not move, do not say anything, and do not attempt to pick up a weapon or help the rescuers.
It is the policy of the United States that when Americans are abducted overseas, the United States will cultivate international cooperation to combat terrorism and secure the safe release of the hostages. The United States will not bargain or make any concessions to terrorist blackmail.

6-37

Reference Page
6-27

6-28

6-29

6-30

6-32

6-33

6-34

Study Unit 6, Lesson 4 Exercise

(This page intentionally left blank.)

MCI Course 0210D

6-38

Study Unit 6, Lesson 4 Exercise

REVIEW LESSON EXAMINATION
Review Lesson
Introduction

The purpose of the review lesson examination is to prepare you for your final examination. We recommend that you try to complete your review lesson examination without referring to the text, but for those items (questions) you are unsure of, restudy the text. When you finish your review lesson and are satisfied with your responses, check your responses against the answers provided at the end of this review lesson examination.

Directions

Select the ONE answer that BEST completes the statement or that answers the Item. For multiple choice Items, circle your response. For matching items, place the letter of your response in the space provided.

Item 1

Terrorism is defined as “the calculated use of _____________ or threat of
____________ to inculcate (instill) fear and is intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological.”
a.
b.
c.
d.

Item 2

unlawful violence; torture unlawful violence; unlawful violence terror; terror force; violence

Committing acts of violence that draw attention to the local populace, the government, and the ________ to their cause is the strategy of a terrorist.
a.
b.
c.
d.

media church world children Continued on next page

MCI Course 0210D

R-1

Review Lesson Examination

Review Lesson, Continued
Item 3

The victim, the general public, and the _________ are the three perspectives of terrorism.
a.
b.
c.
d.

Item 4

What are the three operational categories of terrorist groups?
a.
b.
c.
d.

Item 5

Indigenous, trans-local, and out of area
Active, non-active, and clandestine
National, transnational, and international
Violent, non-violent, and passive

Nationalism, religion, and __________ are motivation for terrorists’ goals.
a.
b.
c.
d.

Item 6

terrorist government media family violence economical invocation of fear political ideologies

Influencing government decisions is an example of a/an ____________ objective. a.
b.
c.
d.

immediate long-term temporary short-term Continued on next page

MCI Course 0210D

R-2

Review Lesson Examination

Review Lesson, Continued
Item 7

Three categories of long-term goals of terrorism include _____________, revolutionary, and sub-revolutionary.
a.
b.
c.
d.

Item 8

The definition of a terrorist operation is any criminal act carried out by a person or group to gain __________ for a cause by using terror-causing acts to raise capital or obtain equipment for future operations.
a.
b.
c.
d.

Item 9

funds affiliations attention support When terrorists decide that a hostage/barricade or another similar event is worthwhile, they may use which phase to gain publicity?
a.
b.
c.
d.

Item 10

recognition establishment destruction vengeance Negotiation
Climax
Post-Incident
Initiation

Which is considered the most common type of terrorist operation?
a.
b.
c.
d.

Arsons
Hijackings
Hoaxes
Bombings
Continued on next page

MCI Course 0210D

R-3

Review Lesson Examination

Review Lesson, Continued
Item 11

The different categories of terrorist targets include ___________________, communication and supplies, engineering and energy systems, and humans.
a.
b.
c.
d.

Item 12

A characteristic that establishes an individual as a soft target is someone who is a.
b.
c.
d.

Item 13

weapons sites transportation factories military headquarters

aware. stationary. inaccessible. predictable. Three key characteristics of a hard target are
a. hardened vehicles, minimal chance of confrontation with police, and unaware. b. hardened residence, unpredictable, and armed.
c. accessible, unpredictable, and armed.
d. hardened vehicles, unaware, and unpredictable.

Item 14

What is the best way to establish yourself as a hard target?
a.
b.
c.
d.

Avoid forming routines in your daily life.
Form routines in your daily life.
Employ self-defense measures.
Establish yourself as an easily recognizable figure in the local community.
Continued on next page

MCI Course 0210D

R-4

Review Lesson Examination

Review Lesson, Continued
Item 15

What are the three factors in determining the structure of a terrorist group?
a. Function of the cell, security measures employed by the government, and operational level of the group
b. Function of the cell, security measures employed by the government, and the sophistication of the group
c. Security measures employed by the government, sophistication of the group, and operational level of the group
d. Sophistication of the group, operational level of the group, and organizational level of the group

Item 16

What cell is the building block from which all groups are formed?
a.
b.
c.
d.

Item 17

What is a common characteristic shared by terrorist groups?
a.
b.
c.
d.

Item 18

Intelligence
Command
Operational and clandestine
Support

Non-mobile
Strategic success
Militarily strong
Promote fear

Internal training is conducted at the ______________________ level by members of the group within the target country, usually in a clandestine fashion. a.
b.
c.
d.

national local cellular secular Continued on next page

MCI Course 0210D

R-5

Review Lesson Examination

Review Lesson, Continued
Item 19

What are some of the aspects of terrorist training programs?
a. Political indoctrination, weapons and explosive training, physical and mental conditioning, and human relations
b. Political indoctrination, communications, survival, and human relations
c. Communications, survival, psychological warfare, and tradecraft
d. Survival, weapons and explosive training, tradecraft, and human relations

Item 20

What is the continuous or periodic act of observing, usually by surreptitious means, a person, a place, or an object for the purpose of obtaining information? a.
b.
c.
d.

Item 21

Surveillance
Observation
Spying
Scouting

What are the different methods of surveillance?
a. Fixed, stationary, ruses, moving, foot, vehicle, leading, progressive, and technology b. Fixed, stationary, armored, moving, foot, vehicle, leading, progressive, and technology
c. Stationary, ruses, moving, foot, vehicle, mounted, leading, progressive, and technology
d. Fixed, mounted, ruses, moving, foot, vehicle, leading, progressive, and technology Item 22

What is the most difficult method of surveillance to conduct?
a.
b.
c.
d.

Enroute or moving
Foot
Progressive
Leading
Continued on next page

MCI Course 0210D

R-6

Review Lesson Examination

Review Lesson, Continued
Item 23

The second phase in terrorist surveillance is known as the
_________________ phase.
a.
b.
c.
d.

Item 24

What will assist you in detecting stationary surveillance?
a.
b.
c.
d.

Item 25

Area analysis
Cityscape analysis
Neighborhood pattern analysis
Landmark analysis

What is one method that can be used to detect moving surveillance?
a.
b.
c.
d.

Item 26

target selection assessment attack/operational reconnaissance Neighborhood pattern analysis
Awareness checks
Passive maneuvers
Active maneuvers

Do not assume that the surveillance will be behind you, force anyone attempting to keep you under surveillance to make a statement,
______________________________, and employing passive maneuvers are rules to remember in order to maintain a high sense of awareness.
a.
b.
c.
d.

always travel with another person never assume that your surveillants are men stop occasionally to observe the area move in short, direct routes
Continued on next page

MCI Course 0210D

R-7

Review Lesson Examination

Review Lesson, Continued
Item 27

What is the crucial part to making accurate observations?
a.
b.
c.
d.

Item 28

What are characteristics required to make accurate descriptions?
a.
b.
c.
d.

Item 29

Permanent, general, and changeable
Specific, facial, and changeable
Distinguishing, permanent, and changeable
Distinguishing, general, and changeable

Which of the following is a precaution to consider when selecting a residential site?
a.
b.
c.
d.

Item 30

Remembering everything
Concentration on every scene
Retention of details
Visualizing

Safety
Pets
Community services
Taxi availability

What are high walls and fences, trees and shrubs, dogs, warning signs, night watchmen, and lighting examples of?
a.
b.
c.
d.

Precautions for the selection of a residence
Electronic security
Personal security and safety measures
Exterior security
Continued on next page

MCI Course 0210D

R-8

Review Lesson Examination

Review Lesson, Continued
Item 31

What are some of the safety measures for your residence?
a. Escape routes, safe havens, communication, and defensive options
b. Education, movement routes, lines of communication, and subsequent positions c. Defensive positions, lines of communication, alternate positions, and safe havens d. Education, escape routes, safe havens, and communication

Item 32

Asking neighbors to place garbage in your garbage can, making arrangements for someone to pick up your mail/newspaper daily, ____________________, turning down your telephone ringer and answering machine are examples ways to create an appearance of occupancy while you are away for extended periods. a.
b.
c.
d.

Item 33

parking your automobile on the street leaving your interior lights on the entire time you are gone leaving television set or radio on arranging for lawn services to continue regularly

What are the five countermeasures that make intelligence collection and targeting difficult?
a. Visitor control procedures, general working procedures, arrangement of the office space, contingency plans for emergencies, and mail handling procedures b. Visitor control procedures, working procedures, arrangement of the office space, contingency plans for alternate work locations, and mail handling procedures c. Visitor control procedures, working procedures, arrangement of the office space, emergency control procedures, and mail handling procedures
d. Emergency control procedures, normal working procedures, varied daily routine, contingency plans for emergencies, and mail handling procedures
Continued on next page

MCI Course 0210D

R-9

Review Lesson Examination

Review Lesson, Continued
Item 34

What are some of the measures used to handle/identify suspicious packages?
a. No return address, excessive amount of postage, abnormal size or shape, protruding strings or wires, grease marks or stains, springiness, or a U.S. postmark b. Inflexibility, no return address, excessive amount of postage, abnormal size or shape, protruding strings or wires, grease marks or stains, and springiness c. Strange postmark, no return address, excessive amount of postage, abnormal size or shape, packaging, protruding strings or wires, grease marks or stains, and springiness
d. Strange postmark, no return address, excessive amount of postage, abnormal size or shape, protruding strings or wires, grease marks or stains, springiness, and balanced weight

Item 35

Select the answer that best describes the definition of an imminent threat.
a. Warns of a credible, specific, and impending terrorist threat against the
United States.
b. Warns of a credible terrorist threat against the United States.
c. An individual threat alert that is issued for a specific time period and then automatically expires.
d. An individual threat alert that is issued if new information becomes available or the threat evolves.

Item 36

What is the definition of an elevated threat?
a. An individual threat alert that is issued if new information becomes available. b. An individual threat alert that is issued for a specific time period and then automatically expires.
c. A credible, specific, and impending terrorist threat against the United
States.
d. A credible terrorist threat against the United States.
Continued on next page

MCI Course 0210D

R-10

Review Lesson Examination

Review Lesson, Continued
Item 37

What is the sunset provision?
a. An individual threat alert that is issued if new information becomes available. b. A credible, specific, and impending terrorist threat against the United
States.
c. A credible terrorist threat against the United States.
d. An individual threat alert that is issued for a specific time period and then automatically expires. It may be extended if new information becomes available or the threat evolves.

Item 38

Getting briefed, routes, language, phones, safe havens, and ____________ are all aspects of a crisis response plan.
a.
b.
c.
d.

Item 39

What is the purpose of a phrase card?
a.
b.
c.
d.

Item 40

training transportation reacts emergencies Provides colorful phrases so you appear to be one of the locals
Serves as a step action table in crisis situations
Contains emergency points of contact in the native language
Provides assistance with common greetings and methods of asking for assistance in the local language

Remaining on roads, __________________, maintaining a cautious attitude, apply surveillance detection methods, walking in well-lit areas, and walking with others are all individual protective measures for pedestrians.
a.
b.
c.
d.

walking with traffic walking while facing traffic using a sidewalk during heavy vehicular traffic never walking in heavy traffic areas
Continued on next page

MCI Course 0210D

R-11

Review Lesson Examination

Review Lesson, Continued
Item 41

What is an acceptable security upgrade to your vehicle?
a.
b.
c.
d.

Item 42

What is an acceptable tire rating?
a.
b.
c.
d.

Item 43

Oversize mirrors
Low profile tires
B rated tires
XM satellite radio

A
B
C
D

What is a basic rule for employing chauffeurs?
a. Give the chauffeur your itinerary in order to maintain a strict timeline.
b. Do not permit the chauffeur to remain in the vehicle while parked. This would draw unneeded attention.
c. Substitute drivers are encouraged so as not to show predictability.
d. Prearrange a signal with the chauffer showing that it is safe to enter.

Item 44

What is the reason for driving in the left lane?
a. Average speed in the left lane is faster than the other lanes. The greater speed will permit you to become less of a target.
b. This will allow a greater speed and prevent other vehicles from pulling along side. c. The left lane is wider and allows for increased maneuverability out of a crisis situation. d. This will not allow you to be forced to the curb and will allow maneuverability out of a crisis situation.

Item 45

How much time should be expended to conduct an effective vehicle search?
a. 5 to 15 minutes
b. 5 to 10 minutes
c. 10 to 15 minutes
d. 10 to 20 minutes
Continued on next page

MCI Course 0210D

R-12

Review Lesson Examination

Review Lesson, Continued
Item 46

What are some signs that would indicate a vehicle has been tampered with?
a. Pieces of tape, discarded wires, grease marks, or foreign materials on or around the vehicle
b. Tape protruding from underneath the vehicle, excess wire, POL products on the ground, and scratches around the door or hood
c. Vehicle moved, steering wheel positioned different from when left, electrical system operating improperly, or foreign materials on or around the vehicle
d. Vehicle appears to be moved, foreign materials in or around the vehicle, objects inside the vehicle moved, and tape protruding out from underneath the vehicle

Item 47

The preferred sitting location while traveling on an aircraft is the
a.
b.
c.
d.

Item 48

Some individual protective measures used when traveling are stay alert, watch what you say, ___________, and keep track of your luggage.
a.
b.
c.
d.

Item 49

aisle seat, middle front of the aircraft. window seat, middle front of the aircraft. aisle seat, middle rear of the aircraft. window seat, middle rear of the aircraft.

avoid sleeping avoid symbols dress down carry limited identification

What is an action you should take when being rescued during a skyjacking?
a.
b.
c.
d.

Assist the rescuers.
Avoid any movement.
Resist the attackers.
Announce military immunity.
Continued on next page

MCI Course 0210D

R-13

Review Lesson Examination

Review Lesson, Continued
Item 50

Security guards, cameras to monitor activity, and visitor control procedures are all examples of what?
a.
b.
c.
d.

Item 51

Security mandated by NATO
Security measures hotels can employ
Minimum accepted security for U.S. citizens
Items terrorists look for in a hotel

What are some guidelines to use when asking for a hotel room?
a. Avoid upper level rooms, reserve a specific room that you are familiar with, and change hotels occasionally.
b. Avoid street level rooms, reserve a specific room that you are familiar with, and change hotels occasionally.
c. Avoid street level rooms, do not reserve a specific room, and maintain the same room.
d. Avoid street level rooms, do not reserve a specific room, and change rooms occasionally.

Item 52

When receiving an unexpected page in a hotel, what is the proper way to respond? a.
b.
c.
d.

Item 53

Go to the main desk.
Call down to the front desk.
Go to a concealed spot in the lobby in order to observe the page.
Do not respond.

What are the three types of hostile peacetime detention?
a. Peacetime government, hostile government-sponsored terrorist, and independent terrorist group
b. Peacetime government, hostile government-non-sponsored terrorist, and independent terrorist group
c. Hostile government, peacetime government-sponsored terrorist, and coalition terrorist group
d. Hostile government, hostile government-sponsored terrorist, and independent terrorist group
Continued on next page

MCI Course 0210D

R-14

Review Lesson Examination

Review Lesson, Continued
Item 54

A person being held under government-sponsored terrorist detention referred to as a
a.
b.
c.
d.

Item 55

The two categories of hostage takers that pose the most likely threat to the
United States are
a.
b.
c.
d.

Item 56

detainee criminal hostage prisoner government sponsored and independent terrorists. cults and independent terrorists. political and independent terrorists. political and religious extremists.

What are the three subcategories of religious extremists?
a. Religious loner, cult member, and evangelist
b. Members of a radical offshoot of a recognized religion, members of a cult, and a religious loner
c. Members of a radical offshoot of a recognized religion, religious loner, and left wing religion members
d. Religious loner, cult member, and violent passives

Item 57

Department of Defense (DoD) instruction1300.21 provides guidance on authorized _________ of a hostage.
a.
b.
c.
d.

treatment entry conduct punishment Continued on next page

MCI Course 0210D

R-15

Review Lesson Examination

Review Lesson, Continued
Item 58

If you become a detainee, what is the only information you should provide to your captor?
a. Name, rank, social security number, date of birth, and innocent circumstances leading to detention
b. Name, rank, branch of service, security number, religion, and circumstances leading to detention
c. Name, rank, social security number, date of rank, and circumstances leading to detention
d. Name, service, social security number, date of birth, and innocent circumstances leading to detention

Item 59

While in captivity, engaging in daily physical fitness activity, reading, writing or daydreaming are all ways to overcome
a.
b.
c.
d.

Item 60

The two types of isolation are
a.
b.
c.
d.

Item 61

stress. boredom. religious persecution. isolation. active and passive. eventual and passive. social and eventual. social and perceptual.

Identify ways to exert control to influence reactions and limit harmful stress.
a.
b.
c.
d.

Maintain confidence and physical condition.
Chat with your captors.
Attempt to establish a relationship with other hostages.
Begin practicing a new religion or teachings.
Continued on next page

MCI Course 0210D

R-16

Review Lesson Examination

Review Lesson, Continued
Item 62

The three most common defense mechanisms hostages use survive are
a.
b.
c.
d.

Item 63

In addition to protecting sensitive information, maintaining your bearing, and not be fooled by a friendly approach, what are some other methods used to resist interrogation?
a.
b.
c.
d.

Item 64

Give detailed answers and resist every time.
Give confusing answers and resist as needed.
Give short answers and resist as needed.
Give short answers and resist every time

What syndrome is sensing and identifying with human qualities of your captors? a.
b.
c.
d.

Item 65

denial, acceptance, and identification. acceptance, compassion, and identification. denial, regression, and identification. regression, compassion, and a feeling of mortality.

Helsinki
Berlin
Stockholm
Holland

Some common experiences associated with victims of Stockholm Syndrome include a. positive contact, sensing and identifying with the human qualities of the captors, and turning against other hostages.
b. positive contact, sensing and identifying with the human qualities of the captors, and willingness to tolerate situations beyond the logical limits.
c. negative contact, isolation, and abuse beyond what the human body can tolerate. d. negative and positive contact, isolation, and abuse beyond what the human body can tolerate.
Continued on next page

MCI Course 0210D

R-17

Review Lesson Examination

Review Lesson, Continued
Item 66

What are some recommended methods that can be used to establish rapport with your captors?
a. Introduce benign topics at critical times, use your name, appear uninterested, and escalate tensions
b. Introduce benign topics at critical times, appear to be uninterested, use a fictitious name, and avoid escalating tensions.
c. Introduce commonalities, use a similar name as the captor, appear to be interested, and introduce related topics.
d. Introduce commonalities, use your name, show photographs, and show an interest. Item 67

To make an effective escape plan, what elements of information are necessary for you to know?
a. Fellow hostages, strengths and weaknesses of the facility, immediate area, and items or materials used for support
b. Fellow hostages, strengths and weaknesses of the facility, surrounding area, and items or materials used for support
c. Captors, strengths and weaknesses of the facility, immediate area, and items or materials used for support
d. Captors, strengths and weaknesses of the facility, surrounding area, and items or materials used for support

Item 68

What is your safest response during a rescue attempt?
a. Drop to the floor immediately, lie as flat as possible, do not move, do not say anything, and do not attempt to pick up a weapon or help the rescuers.
b. Standup and announce that you are a “United States citizen,” and do not attempt to pick up a weapon or help the rescuers.
c. Drop to the floor immediately, lie as flat as possible, crawl to the nearest exit, and assist the rescuers as needed.
d. Standup and announce that you are a “United States citizen,” attempt to assist the rescuers as needed.
Continued on next page

MCI Course 0210D

R-18

Review Lesson Examination

Review Lesson, Continued
Item 69

What is the U.S. policy towards terrorist abductions?
a. Concessions can be made for government officials only. Military, DoD, and private citizens will not be bargained for.
b. The United States will only bargain with terrorists in order to gain more information on the terrorist cell.
c. The United States will not bargain or make any concessions to terrorist blackmail. d. Concessions will only be made for non-combatants. Military and DoD employees will not be bargained for.

MCI Course 0210D

R-19

Review Lesson Examination

Review Lesson, Continued
Answers

The table below lists the answers to the review lesson examination items. If you have questions about these items, refer to the reference page.
Item Number

Answer

Reference Page

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33

b c a c d a b c a d b d b a b c d c c a a a c c c b c d a d d d a

1-4
1-5
1-6
1-7
1-12
1-14
1-15
2-4
2-5
2-7
2-18
2-20
2-21
2-22
2-28
2-29
2-31
2-36
2-37
3-4
3-6
3-7
3-10
3-14
3-15
3-15
3-18
3-19
4-4
4-6
4-1
4-12
4-18
Continued on next page

MCI Course 0210D

R-20

Review Lesson Examination

Review Lesson, Continued
Answers,
continued

Item Number

Answer

Reference Page

34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65

b a d d d d b a a d d a a d b b b d d d c d b c a b d a c d c b 4-21
4-28
4-28
4-28
5-4
5-4
5-5
5-10
5-10
5-12
5-13
5-15
5-15
5-30
5-31
5-31
5-38
5-38
5-39
6-4
6-4
6-5
6-6
6-10
6-11
6-18
6-19
6-19
6-21
6-27
6-28
6-28
Continued on next page

MCI Course 0210D

R-21

Review Lesson Examination

Review Lesson, Continued
Answers,
continued

Item Number

Reference Page

66
67
68
69

MCI Course 0210D

Answer d d a c

6-30
6-32
6-33
6-34

R-22

Review Lesson Examination

Similar Documents

Premium Essay

Marines

...the Marine Corps Once this semester is over I will be leaving for Marine boot camp in Parris Island, South Carolina. There are many reasons of why this decision is made by myself and many other Americans across the nation. The Corps provides many valuable benefits and is a great experience for young men and women and can lead to many job opportunities in the future. Pride is a word generated as soon as you become an athlete or even put in effort to your school, work when you are young. In today’s society some American’s strive to do something that is bigger than them the Marine Corps assists in providing that. The pride of belonging to the Marines is something great and that can never be taken away from an individual who has been apart of this great fighting force. They say “Once a Marine, always a Marine” unlike a lot of other branches of military. When someone retires from the air force for example they usually just tell people “I was in the military.” Also in no way, shape, or form am I saying the Marines are above everyone else, it’s great to be in the service, and protect your country, that was just an example of what I have heard from past veterans. The Marines provide the toughest, most intense boot camp out of all of the different branches, the twelve and a half week transformation brings out a whole new warrior and ultimately a better person than what you were before. When you get out of boot camp you feel as if you are on top of the world is what past marines have...

Words: 1038 - Pages: 5

Premium Essay

Marines

...MBA 623 United States Marine Corps The organization we chose for our project is the United States Marine Corps. We believe this branch of service can benefit greatly with the help of organizational behavior concepts. We will mainly be focusing on the relationship between the recruiter and the poolee (person soon to be enlisting). The process of enlisting can be long and tedious and there are a lot of details that should not be overlooked. When a civilian enters the recruiter’s office and they both meet for the first time, it is one of the most important moments. This is where the civilian feels out the recruiter and the recruiter feels out the civilian and shapes the psychological contract. When the psychological contract is beginning to form in this case it is important for both parties to gain each other’s trust in order for the relationship to flourish. Most recruiters are very truthful and will not violate the contract, but a lot of the recruiters just want to get that extra number to ship out. The recruiter will say and offer things to the poolees that are false and misleading. This process can also work the other way also; the poolee could be lying to the recruiter and mislead him as well. Some other problems that exist are cultural issues, such as, language and non-verbal gestures. It is important for both parties to be relaxed and ask questions. During the initial interview and throughout the process it is important for both parties to utilize active listening...

Words: 1835 - Pages: 8

Free Essay

Marine Mammals

...Marine Mammal Conservation Sharon Herzog COM/172-Elements of University Composition and Communications II July 28, 2013 Timothy Toole Marine Mammal Conservation There are 29 marine mammals on the endangered and threatened list produced by the National Oceanic and Atmospheric Administration. The US Fisheries and Wildlife foundation also have a list that includes certain seals, sea otters, and polar bears. There are many threats to marine mammals. These threats include dangers posed by humans and the environment. There are laws in place to help protect marine mammals from further dangers. Captivity has brought forth much controversy as to dangers it may pose to marine mammals. Marine mammal habitat conservation may be the only answer to protecting marine mammal life. There are five characteristic that an animal must possess to be classified as a mammal. These characteristics include being warm-blooded, having hair or fur, having the ability to breathe air through lungs, the ability to bear live young, and the ability to nurse their young with milk produced by mammary glands (The Marine Mammal Center, 2013). Marine mammals also have a thick layer of fat called blubber that they rely on to keep them warm in the water. They have the ability to store up extra oxygen to aid them in staying under water for extended periods of time. Marine mammals spend a lot of time swimming, their bodies are streamlined to help them swim faster. One of the...

Words: 1397 - Pages: 6

Free Essay

Marine Mammals

...Marine-mammal facilities are part of a billion-dollar industry built on the suffering of intelligent, social beings who are denied everything that is natural and important to them. Sadly, marine parks open their doors every summer to visitors who watch dolphins, beluga whales, and orcas perform their majestic tricks; they’re amazing, stunning, and very “enjoyable”… However, it might only seem fun to you, the marine animals who are performing the tricks themselves have to disagree, but, the question is, do you know the truth behind all this “joyful fun”? Marine animals in captivity is wrong. It needs to stop if it only means pain and abuse for our entertainments’ sake. I have many convincing reasons to support my opinion, including how captivity causes many health problems in marine mammals, these helpless creatures suffer from boredom, most of these poor innocent creatures face abusive treatment by their caretakers, thus shortening their life span by quite a lot, and marine mammals breed very poorly in captivity with very high infant death rates. So keep an open mind and choose to spend your money on family activities this summer that do not contribute to animal suffering. For starters, many wonder first where they all come from, or more importantly how they capture them. Dolphins are sometimes purposely injured by the capture teams to force the rest of their pod to stay behind into the trap, due to that dolphins never leave behind sick or injured friends or family members. But...

Words: 1221 - Pages: 5

Premium Essay

Marine Biologist

...When I go to college and i want to start my studies to be a Marine Biologist. A marine biologist is a person who likes to study marine animals and sea life like whales, dolphins, crabs, all the way to microorganisms on plankton and the water. They work in private labs and i think that that sounds really cools and for it too be a career that sounds even cooler. I have always wanted to work with sea life or wanted to be a vet but then i realized that vet’s are always on call and can not ever have a break so i thought that that being a marine biologist was a good job to research for my paper and i have always loved the ocean and the beach and going with my family to the beach so I think that Marine Biology will be the right job for me because i get to live by the ocean and on a beach and i can finally live in a beach house. This is how i plan on becoming a marine biologist. After...

Words: 1000 - Pages: 4

Premium Essay

Marine Students

...Sciences Vol. 2, No. 1, 2015 ISSN 2313-7797 MARINE TRANSPORTATION AND MARINE ENGINEERING STUDENTS’ ATTITUDE ON CLASSROOM SOCIAL ENVIRONMENT Edwin M. Agena Lyceum of the Philippines University - Batangas PHILIPPINES Brian L. Tiongson Lyceum of the Philippines University - Batangas PHILIPPINES Bienvenido Arevalo Lyceum of the Philippines University - Batangas PHILIPPINES Myrna C. Clemeno Lyceum of the Philippines University - Batangas PHILIPPINES Geronimo Dolor Lyceum of the Philippines University - Batangas PHILIPPINES Jake M. Laguador Lyceum of the Philippines University - Batangas PHILIPPINES ABSTRACT Social interaction of the students within the classroom involves the teachers and their classmates where teaching and learning activities are being facilitated which need to be improved and addressed some factors that may somehow influence the learning process of the Marine Transportation and Marine Engineering Students in one private Asian university. This study aimed to determine the difference on the attitude between Marine Transportation and Marine Engineering students towards the classroom social environment in terms of teachers as to character, subject mastery and teaching strategy; as well as in terms of their interpersonal relationships with other students. Descriptive type of research was utilized in the study. Results showed that the Marine Transportation and Marine Engineering students have positive attitude towards...

Words: 4729 - Pages: 19

Premium Essay

Pensacola Marines

...CIVIES Esprit de Corps of AMS-2 Marines By the students of AMS-2 Aircraft Maintenance Squadron 2, NAS Pensacola has had a rough past, a restricted present, and an unprecedented future. Over a year ago, before Pensacola’s restriction was put into place, the Marine-Students took place in multiple dishonorable actions, and caused many problems both on and off base. In an effort to stop these mistakes and prevent them, a restriction was placed across all of MATSG-21. Now over a year later, this restriction appears to be rather successful, with far less Marines getting into trouble. However we disagree with this, as many Marines continue to get into trouble, and we see the Marines here having no incentive or motivation to improve or correct this. We believe that by authorizing a status for the “excellent” Marines to have an upgraded liberty policy, the Marines in Pensacola will have an incentive to be that “excellent” Marine, do they right thing, stay out of trouble, and do well in class. In the status, that we will call “Condition 3,” Marines could achieve something similar to the Navy’s “Phase 4”. The sailors in our classes all have big plans of staying out of trouble and maintaining grades because they have incentives. They are motivated because if they do well they get better liberty and even promoted. While on the Marines side of the class, at least in I strand, they have no motivation other than maybe get top of class and get a positive entry into their records. It...

Words: 1798 - Pages: 8

Free Essay

Marine Biomes

...Marine Biomes Shonda Morton October 20, 2013 SCI/230 Paula Roberts A marine biome is a large aquatic zone that takes up almost 75% of Earth’s surface, has a salt concentration around 3%, and is distinguished from other biomes by its physical environment. According to Campbell Essential Biology with Physiology, (2010), the habitats of a marine biome varies depending on the level of the sea that it exists (pp.382). The layers or “zones” that make up the marine biome consist of the pelagic realm, the intertidal zone, the photic zone, the aphotic zone, and the benthic realm. The pelagic realm is the part of the marine biome that includes all open water. (Dickey, Reece, & Simon, 2010) explains “the intertidal zone is the part where the ocean surface meets land, or fresh water (pp.383).” The level of the marine biome is home to sedentary organisms such as algae, mussels, and barnacles. The photic zone was named mainly because of the fact that light is available for photosynthesis, and known as the upper or shallow layer of the marine biome. In Campbell Essential Biology with Physiology, (2010), the aphotic zone is the layer of the marine biome where the light levels are too low to support photosynthesis (pp.380). The benthic realm which exists in all aquatic biomes is the area of the seafloor, made up of sand, and organic and inorganic sediments. There are many organisms that exist in a marine biome, and each one exists at different levels...

Words: 1043 - Pages: 5

Free Essay

Marine Conservation

...Discuss one management practice for sustainability and conservation of natural resources in that ecosystem The protection of marine species and ecosystems in oceans and seas worldwide is marine conservation. Marine conservation involves the protection and restoration of species, populations and habitats while mitigating human activities such as overfishing, habitat destruction, pollution, whaling and other issues that affect marine life and habitats. The goal of marine conservation is accomplished by enforcing and creating laws, such as the Endangered Species Act and Marine Mammal Protection Act. It is also done by establishing marine protected areas, studying populations through conducting stock assessments and mitigating human activities with the goal of restoring populations. A recent practice that has become popular in marine conservation is the use of Marine Conservation Agreements (MCAs). Through recent years of research, Non-Governmental Organizations (NGOs) have realized that the creation of formal protected areas may not be adequate enough to protect ocean and coastal biodiversity, particularly in areas where rights have already been contracted to specific owners and users. In order to address this, NGOs have increased their usage of MCAs to complement other marine and coastal protection efforts. Marine Conservation Agreements consist of any formal or informal understanding in which one or more parties commit to delivering explicit economic incentives in exchange...

Words: 443 - Pages: 2

Free Essay

Evergreen Marine Corp

...1.0 Introduction Evergreen Marine Corporation (EMC) was established on September 1, 1968 (evergreen-marine, 2008). The founder, Dr. Yun-Fa Chang, started the business as a secondhand general cargo ship but he expanded the business to provide his customers with a scheduled marine logistics and transportation services. In 1984, EMC made a remarkable move with a two-way Round-the-World container service (evergreen-marine, 2008). Today, Evergreen provides transport services across the lands of Asia, the Americas, Australia, the Middle East and the Mediterranean. Consequently, EMC had successfully built a strong network across the globe via an advanced IT platform and exhibition logistics with value added services. 2.0 Type of services that EMC provide Coincidently, EMC is the fourth-largest containerized-freight shipping company, serving the east coast of Asia and the west coast of North America, with over 150 container ships (evergreen-marine, 2008). Its main transportation modes are ships, thus shipping is its main activity. In between, EMC is the pioneer in reefer container service, shipping perishable products across the world. ‘Moreover, Evergreen also provides services such as, freight forwarding, construction of containers, customs brokerage, warehousing, distribution and many more’ (commerce, 2011). ‘In 1992, Evergreen Group expanded its service range to the skies by launching airline EVA Air to the market’ (pancanal, 2002). EVA's planes reflected the technology...

Words: 1379 - Pages: 6

Premium Essay

Marine Conservation Essay

...Marine conservation From Wikipedia, the free encyclopedia Coral reefs have a great amount of biodiversity. Marine conservation, also known as marine resources conservation, is the protection and preservation of ecosystems in oceans and seas. Marine conservation focuses on limiting human-caused damage to marine ecosystems, and on restoring damaged marine ecosystems. Marine conservation also focuses on preserving vulnerable marine species. Contents 1 Overview 2 Coral reefs 3 Human impact 4 Techniques 5 Technology and halfway technology 6 Laws and treaties 7 Organizations and education 8 References 8.1 Notes 8.2 Bibliography 9 External links Overview Marine conservation is the study of conserving physical and biological marine resources and ecosystem functions. This is a relatively new discipline. Marine conservationists rely on a combination of scientific principles derived from marine biology, oceanography, and fisheries science, as well as on human factors such as demand for marine resources and marine law, economics and policy in order to determine how to best protect and conserve marine species and ecosystems. Marine conservation can be seen as subdiscipline of conservation biology. Coral reefs Coral reefs are the epicenter for immense amounts of biodiversity, and are a key player in the survival of an entire ecosystem. They provide various marine animals with food, protection, and shelter which...

Words: 1457 - Pages: 6

Free Essay

Marine Biology Career

...Harry Opfar Research Essay Viability of Marine Biology as a Major When deciding on a major for my college education, I had to find a field both in demand and it had to be a field I would like to spend the rest of my life in. I have always had a love of the animals in sea and several years ago had an opportunity to go to Sea World in San Diego. Recalling this trip and the recollection of seeing the dolphins and whales perform actually helped me make the decision to pursue a career in Marine Biology as a marine biologist. That brought me to the essence of this essay. How much education is required and does the marine biology field offer ample job opportunities and is there plenty of growth for future jobs? Also need to look at where those jobs are available, where I might have to move to. So I will first look at the education needed and the marine biology programs. I will then evaluate the job market now and in the future of this niche field. I will also exam the pay within this field and find out how the pay is derived as my research has shown that much of the money in this field of study originates different sources than a regular paycheck. There are several aspects to getting an education in marine biology. One need to look at the classes required and what schools are available, as well as where the best schools are located. A person majoring in the marine biology field needs to plan on taking many different types of animal biology and physiology classes. ...

Words: 1486 - Pages: 6

Free Essay

Marine Fungi; a Review

...Marine Mycology: An Overview of Pathogens, and Secondary Metabolites Introduction and History The golden age of marine mycology occurred from 1960-1990 with the research and discovery of most of the roughly 500 species of obligate marine fungi. Much of said research was conducted from 1980-2000; this 30 year period saw the report of nearly half of the marine fungal species currently known (Jones et al. 2009; Jones, 2011). That being said, marine fungi are vastly understudied and under rated in comparison to marine plants, animals, and other microorganisms; frequently they are omitted or only briefly referenced in marine biodiversity and ecology text books (Jones and Pang, 2012). The cladistics of marine fungi is currently in a state of flux, with new taxa being discovered as molecular techniques such as DNA and RNA analysis via polymerase chain reactions, and gel electrophoresis are implemented (Ald et al 2005). Even though fungus-like organisms such as oomycetes are not fungi, marine mycologists often study them as they perform similar functions, and until recently most had been classified as fungi based on their morphological similarities (Jones, 2011). These fungus-like organisms are eukaryotic, heterotrophic, zoospores, have chitin containing cell walls, and similar life cycles to fungi (Neuhauser et al. 2012). Conventionally terrestrial or freshwater species are also included in the marine fungal group as facultative species; this is due to their active ecological...

Words: 4679 - Pages: 19

Premium Essay

Marine Corps Progression

...The United States Marine Corps is known as the world’s best fighting force. To be more specific, the Marine Corps is an expeditionary force. They are designed to be capable of assaulting foreign shores and establishing a beachhead.1 The Marine Corps is highly centered on the man on the ground, meaning every role in the Marine Corps exists to support the infantry. Over the entire course of the Marine’s illustrious history, their main operational goal has changed little, but the way they carry out those operational goals has changed in numerous ways designed to make the Marine Corps a more effective fighting force. It can be argued that the largest innovation in the way that the Marine Corps wages w ar is the development of Marine Corps aviation....

Words: 450 - Pages: 2

Free Essay

Always a Marine Code of Ethics

...Always A Marine Code Of Ethics ETH/316: Ethics and Social Responsibility John Shand July 29, 2013 I have decided to create a company called Always A Marine Inc. which sole mission is to help Marines who have either retired or been separated from the Marine Corps find employment after their military career. My reasoning for starting this company is after hearing so many stories from Marines I have known explain how hard it can be applying some of their skills learned in the Marine Corps in the civilian business world. I have created the following Code of Ethics for my business to focus on my company’s ethics and social responsibility. Code of Ethics 1. Customer Respect. • Every company will survive or die with how a person deals with public relations. Customers are the heart and soul of the life of a business. Without their revenue coming in then you have no company. 2. Lead By Example. • A good Manager or owner should lead by example never ask your employees to do something you will not do yourself. Do not be afraid to get into the job with them. Many think they should lead as a dictator. This type of behavior will not be tolerated in this company. 3. Understanding • Understand your employee’s needs. Do not shut them out. A company goes further when you have Employees you are loyal to you and not disgruntled 4. Sexual Harassment • Zero tolerance for Sexual Harassment. Sexual Harassment has more than just...

Words: 434 - Pages: 2