Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search
 
  
 


MIL-HDBK-1013/1A
frustration, discontent, or anger against the actions of other social or
political groups.  The primary objectives of both groups include destruction
3)
Terrorists.  Terrorists are ideologically, politically, or
issue-oriented.  They commonly work in small, well-organized groups or cells.
They are sophisticated, skilled with weapons and tools, and possess efficient
planning capability.  Terrorist objectives include death, destruction, theft,
and publicity.  Terrorist groups are identified based on their areas of
operation.  Those operating within the continental United States (CONUS) are
typically political extremists consisting primarily of ethnic and white
supremacy groups such as Macheteros (Puerto Rican) and Aryan Nations.  They
are considered intermediate-level threats.  Terrorist operations outside the
United States (OCONUS) are typically better organized and equipped, and their
attacks more severe.  Those operating in Europe, such as the Red Brigades,
are less violent and may be intermediate to advanced.  Groups operating in
the Middle East and North Ireland have shown paramilitary capabilities and
have used a broad range of military and improvised weapons.  They have
historically staged the most serious terrorist attacks, including suicidal
attacks.  They are frequently state-sponsored and include such organizations
as the Palestine Liberation Organization, the Islamic Jihad, and the Irish
Republican Army. These are maximum- or advanced-level threats.
4)
Subversives.  Subversives include aggressors from foreign
governments or from groups trying to overthrow the Government by force.  They
include saboteurs and spies (hostile intelligence agents at the advanced or
maximum levels as well as covert or overt agents at the low and intermediate
levels.)
Aggressor Tactics.
Aggressors can employ a wide range of
2.3.3.3
offensive tactics to achieve their goals.  Categorization of these tactics
allows facility planners to define threats in standardized terms usable by
facility designers in the development of design solutions to resist the
particular tools or weapons identified in Table 1.  The primary tactics
addressed in this manual follow.
1)
Forced Entry.  The aggressor enters a facility using forced
entry tools.  The aggressor uses the tools to create a man-passable opening
in the facility's walls, roof, windows, doors, or utility openings.  Small
arms may be used to overpower guards.  The aggressor's goal is to steal or
destroy assets, compromise information, or disrupt operations.
2)
Covert Entry.  The aggressor attempts to covertly enter a
facility or portion of a facility by false credentials, etc.  Objectives are
similar to the forced entry tactic above.
3)
Insider Compromise.  A person with authorized access to a
facility, such as an "insider," attempts to compromise a security system
and/or assets by taking advantage of that accessibility.
10








Western Governors University
 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business