ebook img

The Individual's Guide for Understanding and Surviving Terrorism MCRP 3-02E PDF

138 Pages·2001·1.573 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview The Individual's Guide for Understanding and Surviving Terrorism MCRP 3-02E

Description:
Marine Corps Reference Publication (MCRP) 3-02E, The Individual’s Guide for Understanding and Surviving Terrorism, provides guidance to individual Marines (private through general officer) and their dependents on terrorism and its effects.This reference publication gives an overview of terrorism, explains antiterrorism individual protective measures, and what to do if taken hostage.Table of ContentsChapter 1. OverviewTerrorism Defined. . 1-1Strategy. . 1-2Perspectives . . 1-3Today’s Threat .. 1-3Types of Terrorist Incidents . . 1-4Bombings .. 1-5Kidnappings and Hostage-Takings . . 1-6Armed Attacks and Assassinations . . 1-6Arsons and Firebombings.. 1-6Hijackings and Skyjackings . . 1-7Other Types of Terrorist Incidents . . 1-7Intentions of Terrorist Groups. . 1-9General Characteristics of Terrorist Groups . . 1-10Crime Prevention Measures . . 1-11Chapter 2. Protection Through AwarenessTypes of Targets . . 2-1Soft Targets . . 2-1Hard Targets .. 2-1Identification of the Threat .. 2-2Visibility . . 2-4Identified as an American. . 2-5Identified as Someone of Importance .. 2-7Identified as a Target of Opportunity . . 2-11Family Members . . 2-14Special Precautions for Children . . 2-15Home Physical Security . . 2-17General . . 2-17Residential Physical Security . . 2-18Telephones .. 2-19Letter Bombs and Biological Mailings. . 2-20Vehicle Bomb Search . . 2-22Travel. . 2-22Detecting Surveillance . . 2-30Types of Surveillance . . 2-31Surveillance Indicators . . 2-32Attack Recognition .. 2-33Abnormal Situations . . 2-33Escape, Evade or Confront . . 2-34Incident Reaction. . 2-35Bombs. . 2-35Armed Attack or Assassination . . 2-36Arsons and Firebombings. . 2-36Hijackings, Skyjackings, and Kidnappings . . 2-37Additional Individual Aids .. 2-37Chapter 3. Hostage SurvivalThe Hostage . . 3-1The Hostage-Takers . . 3-2Political Extremist . . 3-3Fleeing Criminal. . 3-3Wronged Person . . 3-3Religious Extremist . . 3-4Mentally Disturbed. . 3-4Personal Contingency Planning . . 3-5Department of Defense Directive 1300.7 ..3-7Escape or Surrender .. 3-8Intimidation and Control. .3-9Stabilization . . 3-10Situational Awareness . . 3-11Confrontations . . 3-11Defense Mechanisms . . 3-12Denial . . 3-13Regression . . 3-13Identification . . 3-13The Stockholm Syndrome. . 3-14Positive Contact . . 3-16Human Qualities of the Hostage-Takers . . 3-16Tolerance . . 3-16Coping With Captivity .. 3-16Living Conditions. . 3-17Dignity and Self-Respect . . 3-17Fear . . 3-18Physical and Mental Fitness . . 3-18Establishing Rapport.. 3-19Exploitation of Hostages . . 3-21Releases and Rescue Attempts .. 3-21Releases . . 3-22Rescue Attempts . . 3-22After the Release.. 3-23AppendicesA. Vehicle Bomb Search .. A-1B. Joint Staff Guide 5260 .. B-1C. Antiterrorism Individual Protective Measures (Card) . . C-1D. Antiterrorism Individual Protective MeasuresWhen Traveling (Card) .. D-1E. Acronyms and Abbreviations.. E-1F. References and Related Publications . . F-1
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.