問題一覧
1
Intelligence gathered by means of interpersonal contact
human intelligence
2
The process of tasking, collecting, intelligence is called intelligence cycle
operations security indicators
3
Involves collecting foreign intelligence from communications and information systems and providing it to customers
signals intelligence (signit)
4
OSINT 4 steps
discovery, discrimination, distillation, dissemination
5
Bridges a gap between peacetime and wartime actions to protect the force
integrated defense ID
6
Employed to mitigate potential risks to DAF
concept of integrated defense ID
7
Threats include, but are not limited to terrorist or criminals
ID considerations
8
ID does not stand alone to protect personnel and recources
coordination with other programs
9
Compared with a typical network or hierarchical terrorist orginization
lone terrorist
10
home grown terrorists
domestic or indigenous
11
Come from assigned or attached personnel
insider threat
12
Defined as preventive measures to mitigate hostile actions against DOD personnel
force protection
13
Codifies installation defense efforts among responsible internal/external agencies to ensure all aspects of ID
intergrated defense plan
14
Requires security plans for each asset with a PL designation
IDP requirments
15
Those plans dealing with events that could possibly occur at an installation
contingency plans
16
Detection screens using security patrols
increased readiness procedures
17
A standardized approach to the command
incident command system ICS
18
Mechanism to identify requirments
comprehensive resource management
19
Established when no single organization has the authority to manage an incident on its own
unified command
20
Utilize locally produced quick reaction checklist
SF
21
Designated to reduce or eliminate risks to persons or property
mitigatation
22
Should be maintained on both sides of the barrier
clear zones
23
Used for either large buildings or large outdoor area searches
zone and sector seizure
24
Takes steps to document everything abt the scene as you originally found it
security forces role to preserve evidence
25
Maintained at controlled or restricted areas used to register visitors prior to entry
AF form 1109
26
Used on a temporary basis for granting unescorted entry in conjunction with home base
entry authority
27
Must identify wether or not an individual is authorized unescorted entry or require escort
EAL requirments
28
A SF supervisor will be responsible for validating the EAL
authentication procedures
29
Maintain the integrity of areas containing operational recourses
implementing entry and circulation control procedures for restricted areas
30
The most secure method of limiting entry into a restricted area
exchange badge system
31
Identifies units and personnel specifically tasked with ID responsibilities
ID force contributors
32
Describe the support and operational reach of a group
international
33
Operate internationally but are not tied to a particular country or even region
transnational
34
Has advantage of low risk to the perpetrator and requires only a low level of technical knowledge
arson
35
An individual based and operating primarily within the territorial jurisdiction of the United States
domestic violence extremest
36
The ICS orginization may expand based on the incidents size and complexity
modular orginization
37
Allows diverse incident management
common terminology
38
Used in buildings rooms and small outdoor areas
concentric circle
39
Used in large outdoor areas and conducted by devising the area into strips
strip and grid search
40
Search the area ahead of the team one section at a time
pie the corners
41
Hot zone
exclusive zone
42
Warm zone
contamination reduction zone
43
Cold zone
support zone