VOLUME 2
Base defense operations center (BDOC).
Point of insertion.
Base perimeter.
Resource.
Defeating level I threats, and disrupting or delaying level II threats in the tactical area of responsibility (TAOR) surrounding the air base.
Defeating level II threats, and disrupting or delaying level IV threats in the TAOR surrounding the air base.
Stalling level I threats, and disrupting or delaying level II threats in the TAOR surrounding the air base.
Defeating level II threats, and disrupting or delaying level I threats in the TAOR surrounding the air base.
S1 and S3.
S2 and S4.
S2 and S3.
S3 and S4.
The operations officer and staff.
Supply noncommissioned officer.
First sergeant or section commander.
Intelligence officers and security forces investigators.
By rank and function.
By function and location.
By service component or function.
By service component and location.
Lead host nation forces in defending and securing the rear area.
Sustain the campaign and major operations of the joint force.
Disaster relief operations.
Humanitarian operations.
Determine which other countries support their beliefs.
Ensure state funding would continue to finance cause.
Destroy as much property as possible in a short period.
Persuade US and/or foreign governments to change their policies.
Non-state-supported.
State-supported.
Stated-directed.
State-organized.
Group leader, intelligence officer, explosive specialist, and weapons specialist.
Hard-core leadership, active cadre, active support, and passive support.
Hard-core cadre, submissive support, inactive leaders, and low support.
Intelligence officer, inactive leaders, and active cadre.
16–24.
21–28.
23–30.
25–32.
Before execution of attack.
Just before departing for the target sight.
One week prior to scheduled attack execution.
Never; terrorist team members do not conduct rehearsals.
Arson.
Bombing.
Hijacking.
Assassination.
State Department intelligence assessments, threat levels, and threat conditions (THREATCON).
Force protection conditions (FPCON), assessment factors, and threat levels.
Intelligence gathering, threat level, and THREATCONs.
Criminal threat, FPCONs, and the CARVER matrix.
Activity.
Intentions.
Operational capability.
Operating environment.
Communication security (COMSEC).
Computer security (COMPUSEC).
Information security (INFOSEC).
Operations security (OPSEC).
Support the OPSEC noncommissioned officer-in-charge (NCOIC) by ensuring the command or organization actively practices OPSEC.
Support the wing commander by ensuring the command or organization has an OPSEC program.
Support the commander by ensuring the command or organization actively practices OPSEC.
Prevent our communications from falling into the wrong hands.
At the earliest possible moment.
Only after the subordinate commanders have been notified.
Only after the review and approval from higher-head quarters commanders.
Never; commanders and planners should not have to identify any critical information.
I.
II.
III.
IV.
Partisans.
Terrorists.
Sympathizers.
Agent activity.
IV.
III.
II.
I.
I.
II.
III.
IV.
Force protection (FP) working.
Anti-terrorism working.
Physical security.
Threat working.
Annual process.
Bi-annual process.
Monthly process.
Continual process.
Risk.
Threat.
Vulnerability.
Anti-terrorism.
The classified protection plan.
Protecting sensitive information.
The offensive force protection plan.
The defensive force protection plan.
Wait!
Here's an interesting quiz for you.