vehicle. Once activated, the TMF continues to contain the incident, unless otherwise directed by the
EOC. The main counterterrorism objectives during a hijacking/skyjacking are to contain the situation.
They either negotiate with the terrorists or terminate the incident through a successful assault. If you
have aircraft at your installation, your TMF and special reaction teams should rehearse assaults on
aircraft to be familiar with this type of operation. However, it may be best to allow a highly trained and
specialized team, such as an FBI or host nation force, to make the assault. Use the military police SRT
to make the assault only as a last-ditch effort.
5.
Kidnapping.
In most cases of kidnapping, you will not be aware that it has occurred until the terrorists have the
victim safely secured elsewhere. The immediate response is to dispatch MP patrols to provide
protection for other possible targets. This includes members of the victim's family. Activate the CMT.
The CMT can materially aid the commander in dealing with the kidnapping. They can help coordinate
military support, make reports to higher headquarters, develop news releases, and recommend
possible courses of action (the TMF may be placed on alert if the commander feels there is a need).
During a kidnapping, the TMF is not normally committed.
USACIDC personnel will investigate the scene of the abduction. The SRT is ready to activate if the
victim or terrorists are located on the installation. At this point, the hostage negotiation team assumes
an active role. They can be dedicated directly to the EOC and are responsible for direct
6.
Hostage/Barricade Situation.
The worst possible scenario you could be confronted with is a prolonged hostage/barricade situation. If
you have a prolonged event, do you continue normal operations on the rest of the installation? Which
assets should be committed to managing the incident, and how will that affect other operations?
Assuming the Army maintains control over the incident and decides to commit higher level special
reaction forces; where would they land; how would they be transported to the incident site; and how
would they assume control or effect the passage of lines? Remember, the military always remains in
control of its troops. The jurisdiction for the incident may be assumed by another agency or by the host
nation, but the installation continues its security. This includes its inner- and outer-perimeter security
mission, gate security missions, and similar security functions for an ongoing terrorist mission. The
installation EOC/CMT/TMF continues to function, even after handoff of jurisdiction has taken place.
7.
Terrorists use incendiary devices to commit arson. This is often done during an organized civil
disturbance (throwing a fire bomb), or against a targeted building. They also use such devices to
destroy vehicles. As with bombs, they often use time delay mechanisms to allow themselves time to
leave the
MP2001
3-30