Sunteți pe pagina 1din 2

TABLE OF CONTENTS

PAGE

EXECUTIVE SUMMARY .............................................................................................. vii

CHAPTER I
INTRODUCTION

· General Operational Context ..................................................................................... I-1


· Antiterrorism in the Context of Other Protection Efforts .......................................... I-2
· Overview of Antiterrorism Program .......................................................................... I-3
· Overview of Department of Defense Roles and Responsibilities ............................. I-3

CHAPTER II
TERRORIST THREAT

· Threat of Terrorism...................................................................................................II-1
· Terrorist Organizational Structures ..........................................................................II-1
· Lone Terrorist ...........................................................................................................II-3
· Identity Based Terrorism ..........................................................................................II-3
· State Affiliation ........................................................................................................II-7
· Terrorist Membership ...............................................................................................II-8
· Common Terrorist Tactics, Techniques, and Procedures .......................................II-10
· Terrorist Use of Asymmetrical Tactics...................................................................II-12
· Terrorism Against the Homeland ...........................................................................II-15

CHAPTER III
INTELLIGENCE

· Role of Intelligence................................................................................................. III-1


· Intelligence and Risk Management ........................................................................ III-3
· Intelligence Support ................................................................................................ III-4
· Antiterrorism Intelligence Roles and Responsibilities ........................................... III-8

CHAPTER IV
LEGAL CONSIDERATIONS

· General .................................................................................................................... IV-1


· Commander’s Authority ......................................................................................... IV-1
· Limits of Civil Support ........................................................................................... IV-1
· Authority for Handling Terrorist Incidents............................................................. IV-2
· United States Coast Guard ...................................................................................... IV-5

v
Table of Contents

CHAPTER V
ANTITERRORISM PROGRAMS

 Antiterrorism Program Overview ............................................................................ V-1


 Antiterrorism Plan Development ............................................................................. V-3
 Countering Terrorist Attack Planning ..................................................................... V-6

CHAPTER VI
TERRORIST INCIDENT RESPONSE

 General .................................................................................................................... VI-1


 Incident Management Planning .............................................................................. VI-1
 Initial Response ...................................................................................................... VI-2
 Initial Response to a Chemical, Biological, Radiological, or Nuclear Attack ....... VI-3
 Special Considerations............................................................................................ VI-4
 Considerations in the United States ........................................................................ VI-7

APPENDIX

A Antiterrorism Plan ..................................................................................... A-1


B Antiterrorism Checklist for Commanders and Antiterrorism Officers ......B-1
C Threat Information Organization Matrix....................................................C-1
D Preventive Measures and Considerations .................................................. D-1
E Risk Management Process ......................................................................... E-1
F References .................................................................................................. F-1
G Administrative Instructions ....................................................................... G-1

GLOSSARY

Part I Abbreviations and Acronyms .................................................................. GL-1


Part II Terms and Definitions ............................................................................. GL-5

FIGURE

I-1 Elements of Combating Terrorism .............................................................. I-2


I-2 Antiterrorism Relationship to Force Protection .......................................... I-4
I-3 Antiterrorism Enterprise Portal ................................................................... I-8
II-1 Terrorist State Affiliation ...........................................................................II-7
III-1 Sources of Intelligence ............................................................................. III-5
III-2 Information Requirements...................................................................... III-12
V-1 Department of Defense Threat Level and Force Protection Conditions ... V-5
V-2 Terrorist Attack Planning Cycle ................................................................ V-6
V-3 Surveillance Indicators ............................................................................ V-10
C-1 Installation Threat Information Organization Plan ....................................C-2
E-1 Notional Assessing Terrorist Threat Capability Threat/Priority Matrix .. E-13
E-2 Example Asset Risk Assessment Table ................................................... E-17
E-3 Example of Risk Assessment ................................................................... E-19

vi JP 3-07.2

S-ar putea să vă placă și