SlideShare a Scribd company logo
1 of 13
Force Protection
What is Force Protection?
 Force protection (FP) is a term used by the US
military to describe preventive measures taken
to mitigate hostile actions in specific areas or
against a specific population.

Who is the target?
 All military units in the United States. When
force protection condition is applied it is to raise
the level of awareness and thereby protect our
country
Force Protection
Condition(FPCON)
 Force Protection Condition (FPCON) is
a terrorist threat system overseen by
the Department of Defense directive, and
describes the measures security agencies need
to take in response to various levels of terrorist
threats against military facilities
Purpose of FPCON
 FPCON is used to determine the minimum
security a certain area will have
Normal
 FPCON NORMAL describes a situation of no
current terrorist activity. The only security forces
needed are enough to stop the everyday criminal,
similar to civilian police forces
Alpha
 FPCON ALPHA describes a situation where
there is a small and general terrorist activity
that is not predictable. Agencies will inform
personnel that there is a possible threat and a
standard security procedure review is conducted
Bravo
 FPCON BRAVO describes a situation with
somewhat predictable terrorist threat. Security
measures taken by agency personnel may affect
the activities of local law enforcement and the
general public
Charlie
 FPCON CHARLIE describes a situation when a
global terrorist attack has occurred or when
intelligence reports that there is local terrorist
activity imminent.
Delta
 FPCON DELTA describes a situation when a
terrorist attack is taking place or has just occurred
in the immediate area. FPCON Delta usually
occurs only in the areas that are most vulnerable
to or have been attacked.
Types of Threats
 Bio Terrorism – the release of germs or viruses, such
as anthrax
 Chemical Terrorism – the release of poisonous
chemicals
 Cyber Terrorism – the electronic attack on critical
computer infrastructure
 Nuclear Terrorism – the use of nuclear materials in a
terrorist attack, either a nuclear bomb or a "dirty
bomb" (highly radioactive chemicals spread by an
ordinary explosive)
 Eco Terrorism - the use of acts of violence,
sabotage, vandalism, property damage and
intimidation committed in the name of
environmentalism
Conclusion
 Pay attention to the level of threat at your base
 Keep a look out for anything suspicious that might
be related to that threat
 Make sure you are able to provide more than one
idea for any of the elevated threat levels
 Be familiar with the FPCON instruction specific to
your command
Resources
 Force Protection Agency
 http://www.pfpa.mil/
 DoD Antiterrorism Standards
 http://www.dtic.mil/whs/directives/corres/pdf/2000
16p.pdf

More Related Content

Recently uploaded

What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
srcw2322l101
 
zidauu _business communication.pptx /pdf
zidauu _business  communication.pptx /pdfzidauu _business  communication.pptx /pdf
zidauu _business communication.pptx /pdf
zukhrafshabbir
 
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot ReportFuture of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Dubai Multi Commodity Centre
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
seri bangash
 

Recently uploaded (20)

Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.
 
Revolutionizing Industries: The Power of Carbon Components
Revolutionizing Industries: The Power of Carbon ComponentsRevolutionizing Industries: The Power of Carbon Components
Revolutionizing Industries: The Power of Carbon Components
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
 
Engagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed GuideEngagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed Guide
 
Toyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsToyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & Transformations
 
zidauu _business communication.pptx /pdf
zidauu _business  communication.pptx /pdfzidauu _business  communication.pptx /pdf
zidauu _business communication.pptx /pdf
 
FEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service LightningFEXLE- Salesforce Field Service Lightning
FEXLE- Salesforce Field Service Lightning
 
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptxUnveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
Unveiling the Dynamic Gemini_ Personality Traits and Sign Dates.pptx
 
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot ReportFuture of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
 
Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)
 
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptxBlinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
 
How to Maintain Healthy Life style.pptx
How to Maintain  Healthy Life style.pptxHow to Maintain  Healthy Life style.pptx
How to Maintain Healthy Life style.pptx
 
Constitution of Company Article of Association
Constitution of Company Article of AssociationConstitution of Company Article of Association
Constitution of Company Article of Association
 
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by AccionSeries A Fundraising Guide (Investing Individuals Improving Our World) by Accion
Series A Fundraising Guide (Investing Individuals Improving Our World) by Accion
 
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
Unleash Data Power with EnFuse Solutions' Comprehensive Data Management Servi...
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
 
Hyundai capital 2024 1q Earnings release
Hyundai capital 2024 1q Earnings releaseHyundai capital 2024 1q Earnings release
Hyundai capital 2024 1q Earnings release
 
LinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxLinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptx
 
Stages of Startup Funding - An Explainer
Stages of Startup Funding - An ExplainerStages of Startup Funding - An Explainer
Stages of Startup Funding - An Explainer
 
Unveiling Gemini: Traits and Personality of the Twins
Unveiling Gemini: Traits and Personality of the TwinsUnveiling Gemini: Traits and Personality of the Twins
Unveiling Gemini: Traits and Personality of the Twins
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

16_force_protection.pptx

  • 2. What is Force Protection?  Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate hostile actions in specific areas or against a specific population. 
  • 3. Who is the target?  All military units in the United States. When force protection condition is applied it is to raise the level of awareness and thereby protect our country
  • 4. Force Protection Condition(FPCON)  Force Protection Condition (FPCON) is a terrorist threat system overseen by the Department of Defense directive, and describes the measures security agencies need to take in response to various levels of terrorist threats against military facilities
  • 5. Purpose of FPCON  FPCON is used to determine the minimum security a certain area will have
  • 6. Normal  FPCON NORMAL describes a situation of no current terrorist activity. The only security forces needed are enough to stop the everyday criminal, similar to civilian police forces
  • 7. Alpha  FPCON ALPHA describes a situation where there is a small and general terrorist activity that is not predictable. Agencies will inform personnel that there is a possible threat and a standard security procedure review is conducted
  • 8. Bravo  FPCON BRAVO describes a situation with somewhat predictable terrorist threat. Security measures taken by agency personnel may affect the activities of local law enforcement and the general public
  • 9. Charlie  FPCON CHARLIE describes a situation when a global terrorist attack has occurred or when intelligence reports that there is local terrorist activity imminent.
  • 10. Delta  FPCON DELTA describes a situation when a terrorist attack is taking place or has just occurred in the immediate area. FPCON Delta usually occurs only in the areas that are most vulnerable to or have been attacked.
  • 11. Types of Threats  Bio Terrorism – the release of germs or viruses, such as anthrax  Chemical Terrorism – the release of poisonous chemicals  Cyber Terrorism – the electronic attack on critical computer infrastructure  Nuclear Terrorism – the use of nuclear materials in a terrorist attack, either a nuclear bomb or a "dirty bomb" (highly radioactive chemicals spread by an ordinary explosive)  Eco Terrorism - the use of acts of violence, sabotage, vandalism, property damage and intimidation committed in the name of environmentalism
  • 12. Conclusion  Pay attention to the level of threat at your base  Keep a look out for anything suspicious that might be related to that threat  Make sure you are able to provide more than one idea for any of the elevated threat levels  Be familiar with the FPCON instruction specific to your command
  • 13. Resources  Force Protection Agency  http://www.pfpa.mil/  DoD Antiterrorism Standards  http://www.dtic.mil/whs/directives/corres/pdf/2000 16p.pdf

Editor's Notes

  1. PCC. III-K
  2. This is usually for Department of Defense personnel (including, but not limited to, family members and chaplains), resources, facilities, and critical information. 
  3. As opposed to DEFCON, which assesses the amount of military forces needed to be deployed in a situation with a certain likelihood of attack against the civilian population
  4. This security can be as simple as requiring proper credentials to get inside a building and can become as stringent as inspecting every single vehicle to pass through a gate.
  5. http://www.dtic.mil/whs/directives/corres/pdf/200016p.pdf An FPCON level may also be designated as "+", meaning the facility shall institute extra security measures beyond those specified for the FPCON Level. Generally this is used to provide an extra layer of security for FPCON Alpha. 
  6. One example is the September 11, 2001 Attacks. (Army or Air Force Bases are Restricted to only Military Personnel) The key significant differences between FPCON Charlie, and FPCON Delta, is that FPCON Delta references a specific, known threat, whereas FPCON Charlie is used to prepare for imminent threats of a general, non-targeted nature. FPCON Charlie can also be maintained for a significant length of time, several weeks, while FPCON Delta is generally only maintainable for several days.