Counter Terrorism for Recruit Entry Level Training
Length of Seminar: 2 Days
Instructor: Eric Vandenburg and/or Michael Savallo
An introductory level course intended to equip the probationary police officer with rudimentary skills required to identify and deter potential terrorist activity, and when necessary, respond safely to a potential terrorist attack.
- Introduction to Terrorism
- Individual Behavioral Indicators
- The Mission of Law Enforcement
- Duties and Responsibilities of First & Secondary Responders
- Fraudulent Documents/Identity Theft
- Improvised Explosive Devices
- Suicide Attacks/Vehicle Borne Improvised Explosive Devices
- Security Checkpoints/ Vehicle Inspections
- Hazardous Materials
- Weapons of Mass Destruction
1. Introduction to Terrorism
This module of instruction provides an introduction to the methods utilized by a terrorist or a terrorist group, including the hierarchical structure, an introduction to the methods utilized for training, funding, and gathering intelligence, the operational phases of a terrorist attack, and the process of target selection.
- Define the term “Terrorism”.
- Define the objectives of terrorism.
- Discuss historic terrorist events that have affected law enforcement in the United States.
- State the terrorist’s mission.
- Explain the components of a terrorist cell and their functions.
- Explain the characteristics of a terrorist operation.
- Explain terrorist operational phases.
2. Individual Behavioral Indicators
This module of instruction provides an overview of the ideology, policies, procedures, and practices of a terrorist organization, based upon a document recovered by the Manchester, England Police Department entitled “The Military Series of the Declaration of Jihad.” This “al-Qaeda Manuscript” provides numerous behavioral indicators that may be indicative of terrorist activity.
- Identify the FBI “profile” of a terrorist, a domestic terrorist, and an international terrorist.
- Explain the significance of the recovery of “the military series” of the “Declaration of Jihad.”
- Identify behavioral indicators associated with a terrorist’s utilization of funds.
- Identify behavioral indicators associated with a terrorist’s utilization of fraudulent documents.
- Identify behavioral indicators associated with a terrorist’s selection of housing.
- Identify behavioral indicators associated with a terrorist’s method of communication.
- Identify behavioral indicators associated with a terrorist’s method of travel.
- Identify behavioral indicators associated with a terrorist’s method of gathering intelligence/ conducting surveillance.
3. The Mission of Law Enforcement
The role of policing has changed forever in the aftermath of the attacks of September 11, 2001. The focus of the lesson is on the importance of professional, aggressive enforcement, gathering and rapidly disseminating information and intelligence, and staying abreast of current events.
- State the mission of law enforcement.
- Explain how the mission has changed as a result of the terrorist attacks of September 11, 2001.
- List what law enforcement can do to disrupt terrorist activity.
- Identify examples of routine patrol and how they can impact terrorism.
- Identify critical infrastructure.
- Define Target Hardening.
- Explain your role when responding to a suspected terrorist act.
- Identify how to gather and report Intelligence with regard to reporting terrorist activity.
- Identify available resources when dealing with terrorist activity.
- Explain the Office of Homeland Security Color Alert System.
- Explain how cooperation between local and federal agencies has changed since the attacks of September 11, 2001.
4. Duties and Responsibilities of First and Secondary Responders
This section of instruction focuses upon the specific duties and responsibilities of law enforcement officers at the scene of a critical incident, including a terrorist attack which includes the suspected release of a Chemical Biological Radiological and Nuclear (CBRN) agent. The instruction addresses specific concerns such as resource coordination, the treatment of victims, vehicle staging and maneuverability, communications, and officer safety and survival.
- State the First Responder’s primary responsibility at a terrorist incident.
- Identify the four phases of a Critical Incident.
- Identify how the First Responder can assess a critical situation.
- State how the First Responder should communicate and coordinate at a Critical Incident.
- List the duties and responsibilities of Secondary Responders.
- Briefly explain symptoms associated with a possible Nuclear, Biological or Chemical agent attack.
5. Fraudulent Documents/Identity Theft
The “al-Qaeda Manuscript” specifically instructs that all terrorist cell members possess fraudulent documentation when conducting an operation. This section involves the examination of the Resident Alien/ Permanent Resident ID Cards, as well as, various state Driver’s Licenses, the Social Security Card, and Visas/Passports in an attempt to identify the security features associated with each.
- List general security features that can be used to identify documents as being either valid or fraudulent.
- Define holograms, ghost images and micro-printing.
- Define the changes in identification and documents security in a post September 11, 2001 society.
- Identify the differences in the legal status of Permanent Resident Aliens, Non-Immigrant Aliens, and Undocumented Aliens.
- Identify employment authorization documents and travel documents that aliens may possess.
- Define and explain the privileges and limitations associated with using an International Driving Permit.
- List general security features that can be used to identify passports as valid or fraudulent.
- List general security features found in Social Security Cards.
- List general security features found in miscellaneous documents.
- Discuss “Fantasy” documents.
- Identify countries from which foreign citizens may enter the United States without a visa and briefly explain why visas are not required.
- Identify and apply basic fraud detection techniques to distinguish past and current immigration documents.
- List the elements or segments of the face used to detect the validity of a photo compared to an actual person.
- List the methods of photo comparison.
- Discuss terrorist’s procurement and use of identification.
- Define Identity Theft
6. Improvised Explosive Devices
This module of instruction provides an introduction to the methods employed in an attack utilizing a conventional explosive device, procedures to employ when responding to a report of a suspected explosive device, and a visual presentation introducing the officer to the common appearance of the various types of conventional explosives, including Ammonium Nitrate, Semtex/C4, dynamite, and TNT.
- Explain why bombs are used by terrorists.
- Identify the steps that are specific in nature to bombings.
- Explain the procedures to follow upon notification or discovery of a suspicious package.
- Explain how a bomb works.
- Explain how a bomb causes damage and discuss post blast effects/injuries.
- List the procedures to follow regarding a bomb threat.
- Identify various types and components of explosives.
- List guidelines to follow at a post explosion bomb scene.
- Explain general search guidelines for bomb scenes.
- Identify the keys to self-preservation.
- Identify injuries sustained at a bomb scene.
7. Suicide Attacks/ Vehicle-Borne Improvised Explosive Devices
This module of instruction provides an examination of behavioral indicators and methodologies associated with the phenomenon of suicide attacks, including self-sacrificing attackers, suicide bombers, and Vehicle Borne Improvised Explosive Devices. Deals with the principals associated with VBIEDs and the methods and tactics utilized to screen vehicles and address operational procedural safety issues.
- Identify types of suicide attack.
- Identify stages in the evolution of a suicide attacker.
- Identify methods utilized for the delivery of an improvised explosive device (IED) by a suicide attacker.
- Describe the evolution and spread of pedestrian borne suicide bombings.
- Identify the hierarchical/organizational structures that support a suicide attack.
- Describe the strategic benefits associated with carrying out a suicide attack.
- Identify the visual behavioral indicators associated with a pedestrian-borne/suicide bomber.
- Identify the components utilized to construct a suicide bomber’s IED.
- Identify the individual behavioral indicators associated with a vehicle-borne suicide attack.
- Identify the vehicular indicators associated with a vehicle-borne suicide attack.
- Identify the policy regarding the identification of and response to a suicide attacker
- Identify effects caused by the detonation of an IED.
- Identify types of injury caused by the detonation of an IED.
8. Security Checkpoints/ Vehicle Inspections
This module of instruction examines principals associated with Vehicle Borne Improvised Explosive Devices, the methods and tactics utilized to screen vehicles and address operational procedural safety issues. The lesson provides an introduction to the tactics and procedures associated with vehicle security checkpoints and an intensive inspection of a vehicle or truck.
- List and explain what to look for when performing a general vehicle inspection.
- Explain the purpose of an interview.
- List the typical questions that can be asked during an interview.
- Identify indicators from an interview.
- Identify fight/flight physical and auditory manifestations.
- Explain what to be aware of when doing an undercarriage search of a vehicle.
- Explain what to be aware of when doing an exterior search of a vehicle.
- Explain what to be aware of when doing an interior search of a vehicle.
- List the four general rules to avoid injury.
9. Hazardous Materials
This module of instruction provides an introduction to methods required for positive resolution of emergency hazardous material incidents, including container/vehicle placard identification, personal protective equipment, and methods of containment.
- Describe what hazardous materials are and the risks associated with them in an incident.
- Recognize the potential outcomes associated with an emergency that is created when hazardous materials are present.
- Recognize the presence of hazardous materials in an emergency.
- Identify the hazardous materials, if possible.
- Apply the role of the “First Responders at the Awareness Level” in the Department’s emergency response plan which includes site security and controls and the U.S. Department of Transportation’s Emergency Response Guidebook.
- Assess the need for additional resources and the importance of making proper notifications.
10. Weapons of Mass Destruction
This module of instruction provides an introduction to Chemical/Biological/Radiological Nuclear (CBRN) agents/devices, including an examination of the types of terrorist groups that would utilize such agents, the methods of agent dissemination, the identification of symptoms that result in mass casualty patterns, and a definition of responsibilities of the First and Secondary Responder at the scene of a suspected release of a CBRN agent.
- Identify Weapons of Mass Destruction (WMD).
- List and define Nuclear/Radiological Weapons used by terrorists.
- Define the term “Dirty Bomb”.
- Define the limitations of the use of Biological-Chemical materials.
- Identify various “Dissemination devices”.
- Define the classes of Biological agents.
- List and describe various Biological weapons used by terrorists.
- List and describe various Chemical weapons used by terrorists.
- Identify possible targeted locations of terrorist attacks.