106
BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE MANUAL 31-201, VOLUME 4 17 NOVEMBER 2011 AIR FORCE MATERIEL COMMAND Supplement 4 JUNE 2014 Security HIGH-RISK RESPONSE COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY: Publications and forms are available on the e-Publishing website at www.e-publishing.af.mil for downloading or ordering. RELEASABILITY: There are no release restrictions on this publication. OPR: AFSFC/SFOP Supersedes: AFMAN 31-201V4, 20 Mar 2002; AFMAN 31-201V6, 17 May 2002 Certified by: AF/A7S (John A. Fedrigo, SES) Pages: 106 (AFMC) OPR: HQ AFMC/A7SO Certified by: HQ AFMC/A7S (Colonel Scott R. Farrar) Pages:27 This manual implements AFPD 31-2, Air Provost Operations. This Manual sets forth guidance regarding Security Forces (SF) standards and procedures of Air Force civilian and military personnel, including the Air Force Reserve and Air National Guard serving in SF roles. It applies to military, civilian and contract personnel as well as military personnel from other US military branches assigned or attached to Air Force units. This includes Air Force Reserve and Air National Guard units. Violations may result in administrative disciplinary action without regard to otherwise applicable criminal or civil sanctions for violations of related laws. This manual includes material developed by the Critical Incident Response Group, Federal Bureau of Investigations National Academy, Quantico, Virginia and is used with their permission. Records Disposition: Ensure that all records created as a result of processes prescribed in this publication are maintained in accordance with AFMAN 33-363, Management of Records, and disposed of in accordance with the Air Force Records Disposition Schedule (RDS) located at https://www.my.af.mil/afrims/afrims/afrims/rims.cfm. Refer recommended changes and

BY ORDER OF THE SECRETARY AIR FORCE MANUAL 31 …static.e-publishing.af.mil/production/1/afmc/publication/afman31... · publication are maintained in accordance with AFMAN 33-363,

  • Upload
    lybao

  • View
    217

  • Download
    0

Embed Size (px)

Citation preview

BY ORDER OF THE SECRETARY

OF THE AIR FORCE

AIR FORCE MANUAL 31-201, VOLUME 4

17 NOVEMBER 2011

AIR FORCE MATERIEL COMMAND

Supplement

4 JUNE 2014

Security

HIGH-RISK RESPONSE

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

ACCESSIBILITY: Publications and forms are available on the e-Publishing website at

www.e-publishing.af.mil for downloading or ordering.

RELEASABILITY: There are no release restrictions on this publication.

OPR: AFSFC/SFOP

Supersedes: AFMAN 31-201V4, 20 Mar 2002;

AFMAN 31-201V6, 17 May 2002

Certified by: AF/A7S

(John A. Fedrigo, SES)

Pages: 106

(AFMC)

OPR: HQ AFMC/A7SO

Certified by: HQ AFMC/A7S

(Colonel Scott R. Farrar)

Pages:27

This manual implements AFPD 31-2, Air Provost Operations. This Manual sets forth guidance

regarding Security Forces (SF) standards and procedures of Air Force civilian and military

personnel, including the Air Force Reserve and Air National Guard serving in SF roles. It applies

to military, civilian and contract personnel as well as military personnel from other US military

branches assigned or attached to Air Force units. This includes Air Force Reserve and Air

National Guard units. Violations may result in administrative disciplinary action without regard

to otherwise applicable criminal or civil sanctions for violations of related laws. This manual

includes material developed by the Critical Incident Response Group, Federal Bureau of

Investigations National Academy, Quantico, Virginia and is used with their permission.

Records Disposition: Ensure that all records created as a result of processes prescribed in this

publication are maintained in accordance with AFMAN 33-363, Management of Records, and

disposed of in accordance with the Air Force Records Disposition Schedule (RDS) located at

https://www.my.af.mil/afrims/afrims/afrims/rims.cfm. Refer recommended changes and

2 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

conflicts between this and other publications to HQ AFSFC/SFOP, 1517 Billy Mitchell Blvd,

Bldg 954, Lackland AFB, TX, 78236, on the AF Form 847, Recommendation for Change of

Publication. Field activities are not required to send implementing publications to the higher

headquarters functional OPR for review and coordination before publishing. The use of any

manufacturer name, trademark, commercial product, commodity, or service within this

publication does not imply endorsement by the Air Force.

(AFMC) This supplement implements AFMAN 31-201, Volume 4, High-Risk Response, 17

November 2011. It expands on the guidance in the Air Force Manual, delineates specific

responsibilities, and applies to AFMC controlled installations, complexes, plants, labs, sites, and

stand-alone facilities (hereafter referred to as installations), within AFMC to include all units

assigned and/or attached to AFMC, government-owned, contractor-operated (GOCOs) and

contractor-owned, contractor-operated (COCO) facilities in accordance with (IAW) binding

agreements or obligations with the Department of the Air Force. Tenants on AFMC installations

will participate in the host installation high risk response program as stated in the host/tenant

agreement. The terms “must,” “shall,” and “will” denote mandatory actions in this supplement.

IAW AFI 33-360, Publications and Forms Management, the authorities to waive wing/unit level

requirements are identified with a Tier ("T-0, T-1, T-2, T-3") number following the compliance

statement. Requests for waivers must come from the commanders (or civilian directors) of the

affected unit seeking relief from compliance through the command chain up to the appropriate

tier approval authority (i.e., Tier 0, 1, 2, 3) or publications approval authority if non-tiered. Send

comments and suggested improvements on AF Form 847, Recommendation for Change of

Publication, through unit force protection channels to HQ AFMC/A7S, Building 266, room

S126, 4225 Logistics Avenue, Wright-Patterson AFB OH 45433-5760. This manual does not

apply to the US Air Force Reserve or Air National Guard. The manual may be supplemented at

any level, but all supplements must be routed to HQ AFMC/A7S for coordination prior to

certification and approval. All waiver requests must be routed to the OPR for approval prior to

implementation. Ensure all records created as a result of processes prescribed in this publication

are maintained in accordance with (IAW) Air Force Manual (AFMAN) 33-363, Management of

Records, and disposed of IAW Air Force Records Information Management System (AFRIMS)

Records Disposition Schedule (RDS). This document is effective on publication.

SUMMARY OF CHANGES

This document is substantially revised and must be completely reviewed. Information from

the previous AFMAN 31-201, Volume 6, Civil Disturbance, 17 May 2002, has been

incorporated into this document. This document integrates Public Law 93-366, Homeland

Security Presidential Directive 5 (HSPD-5), Management of Domestic Incidents, and enables the

National Response Framework in the United States Air Force. Countering Threats (Chapter 2)

has been included and incorporates Active Shooter, Workplace Violence, and School Violence

response; Crisis Negotiation has been added (Chapter 5); Civil Disturbance has been added

(Chapter 8); Attachments 2, 3, 5 and 6 have been added.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 3

Chapter 1—SECURITY FORCES ROLE IN EMERGENCY MANAGEMENT

RESPONSE 7

1.1. Planning. ................................................................................................................ 7

1.2. Responsibilities. ..................................................................................................... 9

1.3. Phases of Incident Management. ........................................................................... 12

1.4. Security Forces Response. ..................................................................................... 12

1.5. Special Considerations for Response to HAZMAT or CBRNE incidents. ............ 14

1.6. Special Considerations for Criminal or Terrorist Use of CBRNE. ........................ 15

1.7. Exercises. ............................................................................................................... 16

1.8. Legal Considerations. ............................................................................................ 16

Chapter 2—COUNTERING THREATS 17

2.1. Definitions. ............................................................................................................ 17

2.2. Prevention. ............................................................................................................. 17

2.3. Reporting. .............................................................................................................. 18

2.4. Workplace Violence. ............................................................................................. 18

2.5. School Violence. .................................................................................................... 19

2.6. Active Shooter. ...................................................................................................... 21

2.6. (AFMC) Active Shooter. ....................................................................................... 21

Chapter 3—BARRICADED SUBJECTS 27

3.1. Initial Response. ..................................................................................................... 27

3.2. Containment of the Scene. ..................................................................................... 27

3.3. Establishing Jurisdiction and Command and Control. ........................................... 28

3.4. Negotiations. .......................................................................................................... 28

Chapter 4—DOMESTIC VIOLENCE AND ABUSE RESPONSE 29

4.1. Domestic Violence. ................................................................................................ 29

4.2. Security Forces Role in Domestic Violence. ......................................................... 29

4.3. Unit Commander’s Role in Domestic Violence. ................................................... 30

4.4. Family Advocacy Officer’s Role in Domestic Violence. ...................................... 30

4.5. BDOC/ECC Controller’s Role in Domestic Violence. .......................................... 30

4.6. Patrol Response. ..................................................................................................... 31

4.7. Differentiating Types of Disputes. ......................................................................... 33

4.8. Conducting the Interview. ...................................................................................... 34

4.9. Security Forces Actions. ........................................................................................ 34

4 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

Chapter 5—CRISIS NEGOTIATION 36

5.1. Overview. ............................................................................................................... 36

5.2. Types of Behavior. ................................................................................................. 36

5.3. Types of Hostage Takers. ...................................................................................... 36

5.4. Reasoning Behind the Taking of Hostages. ........................................................... 36

5.5. Types of Situations. ............................................................................................... 37

5.6. High Risk Indicators. ............................................................................................. 37

5.7. Philosophy of Crisis Negotiation. .......................................................................... 37

5.8. Response. ............................................................................................................... 38

5.9. Operations Section Chief. ...................................................................................... 39

5.10. Use of Tactical Teams. .......................................................................................... 39

5.11. Negotiation Teams. ................................................................................................ 39

5.12. Selecting Team Members. ..................................................................................... 40

5.13. Training Negotiation Teams. ................................................................................. 41

5.14. Resiliency. .............................................................................................................. 42

5.15. First Responder Negotiations. ................................................................................ 42

5.16. Guidelines. ............................................................................................................. 43

5.17. Suicide Intervention. .............................................................................................. 44

5.18. Training. ................................................................................................................. 46

Chapter 6—EMERGENCY SERVICES TEAM (EST) 47

6.1. Concept. ................................................................................................................. 47

6.2. Objective. ............................................................................................................... 48

6.3. Capability. .............................................................................................................. 48

6.4. Organization. .......................................................................................................... 48

6.5. Employment. .......................................................................................................... 49

6.6. Weapons. ................................................................................................................ 49

6.7. EST Training and Team Certification. ................................................................... 50

6.8. EST Relationship with CNT. ................................................................................. 51

6.9. MWD Team Use. ................................................................................................... 52

6.10. Emergency Medical Readiness. ............................................................................. 52

6.11. Information. ........................................................................................................... 52

6.12. Interagency Cooperation. ....................................................................................... 52

6.13. Exercises. ............................................................................................................... 52

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 5

6.14. Reporting Requirements. ....................................................................................... 52

Chapter 7—CIVIL DISTURBANCES 53

7.1. Introduction. ........................................................................................................... 53

7.2. Definition. .............................................................................................................. 53

7.3. Federal Intervention and Aid. ................................................................................ 53

7.4. Roles of the States. ................................................................................................. 54

7.5. Presidential Powers. ............................................................................................... 54

7.6. Causes. ................................................................................................................... 54

7.7. Locations. ............................................................................................................... 55

7.8. Role of Military Forces. ......................................................................................... 55

7.9. Levels of Disturbances. .......................................................................................... 56

7.10. The Participants ..................................................................................................... 57

7.11. Control Force Social Factors. ................................................................................ 58

7.12. Crowd Tactics. ....................................................................................................... 58

7.13. Civil Disturbance Training. ................................................................................... 60

7.14. Information Needs. ................................................................................................ 62

7.15. Threat Analysis. ..................................................................................................... 62

7.16. Operations .............................................................................................................. 63

Attachment 1—GLOSSARY OF REFERENCES AND SUPPORTING INFORMATION 67

Attachment 1—(AFMC) GLOSSARY OF REFERENCES AND SUPPORTING

INFORMATION 73

Attachment 2—CATEGORIES OF SUSPICIOUS ACTIVITY 75

Attachment 3—BEHAVIORAL THREAT INDICATORS 77

Attachment 4—SAMPLE MOA 82

Attachment 5—POSSIBLE SITUATIONS REGARDING ENFORCEMENT OF ORDER

WITHIN OR NEAR AIR FORCE INSTALLATIONS 84

Attachment 6—(Added-AFMC) COUNTERING THE INTERNAL THREAT OF

VIOLENCE AND THE ACTIVE SHOOTER 85

Attachment 7—(Added-AFMC) INSTALLATION AWARENESS TRAINING BRIEFING

EXAMPLE 90

Attachment 8—(Added-AFMC) OPORD PLAN EXAMPLE 91

Attachment 9—(Added-AFMC) ACTIVE SHOOTER RESPONSE EXERCISE PLAN 97

6 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

Attachment 10—(Added-AFMC) BRIEFING TEMPLATES AND LESSON PLANS 105

Attachment 11—(Added-AFMC) ACTIVE SHOOTER “LOCKDOWN” PROCEDURES 106

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 7

Chapter 1

SECURITY FORCES ROLE IN EMERGENCY MANAGEMENT RESPONSE

1.1. Planning. Security Forces cannot afford to wait until disaster strikes before taking action to

protect resources and personnel. Security Forces personnel must be able to initially respond and

cope with any situation that might occur. The Comprehensive Emergency Management Plan

(CEMP) 10-2, Major Accidents, Natural Disasters, Enemy CBRNE Attacks & Terrorist use of

CBRNE, outlines the necessary actions to cope with on and off base emergencies and disasters.

Because of the probability that Security Forces will be the first on scene, it is important that

Security Forces personnel become familiar with the terms, duties and responsibilities associated

with the Air Force Incident Management System (AFIMS).

1.1.1. AFI 10-2501, Air Force Emergency Management (EM) Program Planning and

Operations, and the CEMP 10-2 contain specific guidance on the categories of EM planning.

Security Forces must coordinate with the Defense Force Commander (DFC), EM office, and

installation Antiterrorism Officer (ATO) to ensure that the various installation plans are

mutually supportive and are consolidated to the greatest degree possible.

1.1.2. Plans must be coordinated through all tasked agencies and should be coordinated with

all units/agencies on the installation to eliminate redundancies in planning and operational

response capability. Special attention must be given to any memoranda of agreement or

mutual aid agreements with civil authorities to ensure roles are clearly defined.

1.1.3. Personnel and equipment accountability during an incident response is critical and

must be addressed in the planning stages. Security Forces will be responsible for personnel

accountability at the Entry Control Point (ECP) of an incident site and procedures must be

clearly defined in plans. Some additional Security Forces specific planning factors to

consider are:

1.1.3.1. Post changes and how they will be conducted to ensure a smooth transition

during prolonged incidents.

1.1.3.2. Possible Force Protection Condition (FPCON) manning increases.

1.1.3.3. Protection Level (PL) security mission impacts.

1.1.3.4. Identify Personal Protective Equipment (PPE) available and required to continue

the mission. Determine if Individual Protective Equipment (IPE) is available on the

installation and will it be effective based on the CBRNE/HAZMAT involved.

1.1.3.5. Determine how many Security Forces personnel may be involved and what their

equipment requirements are to conduct the mission.

1.1.3.6. Determine what Security Forces vehicles may be involved and if there will be

shortages within the unit or installation. Determine if the Logistics Readiness Squadron

(LRS) is able to support any additional vehicle requirements. Consider vehicle marking

and emergency equipment requirements, if feasible.

1.1.4. Military Working Dog (MWD) planning factors:

1.1.4.1. In some CBRNE/HAZMAT incidents, the MWD may succumb to the materials

or agents involved.

8 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

1.1.4.2. Before a MWD team processes through a Decontamination Corridor, pre-

planning and training must take place. Competent authority will follow guidelines set

forth in AFI 31-202, Military Working Dog Program and AFMAN 31-219, The USAF

Military Working Dog Program.

1.1.4.3. The MWD Kennel Master and trainer will schedule familiarization training with

the Fire and Emergency Service (FES) HAZMAT and/or Contamination Control Area

(CCA) decontamination teams for their MWD teams. This training will familiarize the

MWD with the sights, sounds and smells of the decontamination equipment, and learn

that FES and CCA personnel, dressed in fire bunker suits, PPE or IPE with full face

masks and air tanks do not present a threat to them.

1.1.4.4. Progressive training should include the handler decontaminating the MWD by

local decontamination processes including the MWD being soaped down, as if being

shampooed and rinsed off.

1.1.4.5. The Kennel Master must discuss with the installation FES HAZMAT Branch

Officer any possible MWD issues, i.e., decontamination equipment for MWD, control

poles or spare set of control equipment stored in HAZMAT vehicle or trailer.

1.1.4.6. In CBRNE High Threat Areas (HTA) and Medium Threat Areas (MTA), the

Kennel Master must plan for MWD safety when collective protective kennels are not

available.

1.1.4.7. MWD Team Decontamination: MWD Team decontamination procedures are

covered in FM 4-02.18.

1.1.5. Resiliency. To reinforce the Airman Resiliency program we must include the

philosophy throughout all phases of planning, response, and recovery operations. Effective

planning must include mentally preparing the base populace for the anticipated physical and

mental reactions during high risk and stressful situations. These skills will arm personnel

with solid coping techniques, which will assist them throughout the incident. Finally, by

building and implementing resiliency into the program from start to finish we will decrease

the impact these situations can have on our Airmen and reduce the overall recovery time. At

a minimum, training must be incorporated into all exercises where exposure to traumatic

stress, mass casualties, or high risk to first responders and emergency responders is

anticipated.

1.1.5.1. Instilling resiliency building opportunities in our training is critical to ensuring

our first responders have the mental toughness to anticipate, react, respond, and recover

from high stress situations.

1.1.5.2. Reinforcement and assessment of skills in reality based scenarios/exercises is

critical to building resiliency in our first responders.

1.1.5.2.1. When planning training, make your scenarios as realistic as safely possible.

Inclusion of trauma and chaos such as realistic simulated injuries and sound effects

effectively conditions our brains to deal with real-life situations.

1.1.5.2.2. Consider vigorous physical training for all first responders immediately

prior to the training scenario to simulate elevated heart rate and other physiological

impacts.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 9

1.1.5.2.3. The Trauma Stress Response (TSR) team can be activated by the Wing

Commander IAW AFI 44-153, Traumatic Stress Response. The TSR team will

provide TSR services to enhance resilience to potentially traumatic events. Exercising

the resiliency component of high-risk incidents is a critical part of assessing

readiness.

1.2. Responsibilities.

1.2.1. General EM responsibilities are outlined in AFI 10-2501 and AFI 31-201 and further

defined in installation-level plans.

1.2.2. The Initial Response Base (IRB) is the nearest military installation having a disaster

response capability, regardless of size, to a major accident involving DOD resources. The Air

Force IRB responds unless directed otherwise by the MAJCOM, theater, or Air Force

Service Watch Cell (AFSWC). Specific actions are included in AFI 10-2501 and AFMAN

10-2504, Air Force Incident Management Guidance for Major Accidents and Natural

Disasters.

1.2.3. Nuclear Weapons Incident. Installations must provide initial response to incidents

involving nuclear weapons and must control the scene until relieved by higher authority. For

Security Forces specific responsibilities for response to incidents involving nuclear weapons,

refer to DoD 3150.8-M, Nuclear Weapon Accident Response Procedures (NARP) and DOD

S-5210.41-M_AFMAN 31-108V1, (S) The Air Force Nuclear Weapons Security Manual

(U).

1.2.4. Emergency Operations Center (EOC). As the AFI 10-2501 designated Office of

Primary Responsibility (OPR) for Public Safety and Security, Security Forces play a critical

role in the Emergency Operations Center. The Security Forces EOC representative for on-

base accidents/incidents will:

1.2.4.1. Report as directed to the EOC and immediately conduct communications checks

with the Base Defense Operations Center (BDOC)/Emergency Communications Center

(ECC).

1.2.4.2. Obtain the plotted location of the cordon, ECP and staging area as directed by

the Incident Commander (IC).

1.2.4.3. Obtain the incident grid location from the BDOC/ECC.

1.2.4.4. Report possible hazards and required Personal Protective Equipment (PPE) to

responding Security Forces and inform BDOC/ECC via any communication means.

1.2.4.5. Monitor evacuation of affected buildings inside the cordon and report status to

the EOC Director.

1.2.5. The Security Forces EOC representative for off-base accidents/incidents will:

1.2.5.1. Identify the initial IC and inform initial security response unit(s) to report to the

IC, if not already accomplished.

1.2.5.2. Request assistance from civilian law enforcement agencies via locally developed

procedures.

1.2.5.3. Obtain the ECP grid coordinates and notify EOC to provide the information.

10 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

1.2.5.4. Coordinate required Security Forces follow-on units and monitor the following

actions:

1.2.5.4.1. Security Forces units report to convoy assembly area and check in as

described in the installation’s CEMP 10-2.

1.2.5.4.2. The Posting NCO checks security elements for equipment, maps, and

clothing.

1.2.5.4.3. The Posting NCO briefs all convoy drivers on road conditions and any

identified or potential threats.

1.2.5.4.4. The senior ranking Security Forces member designates a specific Security

Forces vehicle to lead the convoy.

1.2.5.4.5. Follow-on units make contact with the Security Forces units at the scene.

1.2.5.4.6. Follow-on units have materials to erect cordon perimeter.

1.2.5.4.7. Follow-on units have National Defense Area (NDA) signs as described in

AFI 31-101, Integrated Defense.

1.2.5.4.8. Participate in the preparation of the recovery plan.

1.2.5.4.9. Facilitate relocation of the ECP, if required by the IC.

1.2.6. BDOC/ECC Actions:

1.2.6.1. Plot incident site on map or installation common operating picture.

1.2.6.2. Dispatch first responders and emergency responders.

1.2.6.3. Maintain contact with the IC, first responders and emergency responders.

1.2.6.4. Accomplish appropriate checklist(s).

1.2.6.5. Keep Security Forces EOC representative up to date on incident site resource

requests.

1.2.6.6. Keep BDOC staff informed of the incident status.

1.2.7. Establishing Cordon and ECP Locations. Each incident site must be cordoned and an

ECP established. Some incidents will require an evacuation. The type of incident,

amount/type of materials involved, and weather conditions are some factors that will

influence the size of the cordon. The cordon size is determined by the IC and will be based

on the area affected by the incident and any requirement for additional resources within the

cordon area.

1.2.7.1. Cordon. A cordon surrounds the accident area where controls are established to

keep emergency responders safe and preclude unauthorized entry. Cordon sizes vary and

will be decided by the IC or be predetermined by local guidance. Cordons typically

consist of military personnel and/or physical barriers that keep personnel out of the area

affected by the incident. The goal of the cordon is prevent contamination and/or injury to

both the personnel manning the cordon and the personnel they are keeping from the

scene.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 11

1.2.7.2. The ECP location is established by the IC and initially located upwind or

crosswind if upwind is not available, on the perimeter of the cordon, within a 90-degree

arc on either side of the current surface wind.

1.2.7.2.1. The ECP must be clearly marked for easy recognition by responding

forces. At night, vehicle, flood or similar lights should illuminate the ECP.

1.2.7.2.2. The ECP may be relocated to enhance entry and exit control procedures.

1.2.7.2.3. When conditions (i.e. inclement weather) arise and relocation is not

feasible, personnel manning ECPs and cordon/traffic control points should shelter in

place or seek the closest cover/protection available.

1.2.8. Evacuation. If required, all nonessential personnel must be directed to evacuate the

accident scene in an upwind or crosswind direction towards a point designated by the IC.

1.2.8.1. Removal of aircraft, missiles and other equipment requiring specialized actions

is the responsibility of maintenance forces.

1.2.8.2. Personnel evacuating the area should remove equipment, vehicles and material

from the danger area.

1.2.8.3. Priorities for evacuation are:

1.2.8.3.1. Injured personnel.

1.2.8.3.2. Endangered personnel.

1.2.8.3.3. PL resources.

1.2.8.3.4. Equipment carrying hazardous material.

1.2.8.3.5. High-value or mission essential equipment.

1.2.8.3.6. Fatalities.

1.2.9. Release of Information. This term applies to public affairs material, of any

means/medium for mass communications that is prepared for distribution, to disseminate

facts or news to the public. It is also the act of disseminating information to the public.

Release of information also includes release of records through the Freedom of Information

Act (FOIA) as required by Title 5 United States Code, Section 552, and outlined in AF

Supplement to DoD 5400.7-R, DoD Freedom of Information Act Program. At an accident

scene or situation, Security Forces refer all questions to the Public Affairs Office.

1.2.9.1. Air Force Policy. Air Force policy is to keep the public informed, on a timely

basis, of unclassified information concerning Air Force activities, whether favorable or

unfavorable.

1.2.9.2. The Installation Public Affairs (PA) Officer will promptly release unclassified

information about Air Force accidents or mission aircraft. This must be released

promptly to news media representatives and recognized news gathering agencies.

Written FOIA requests must be processed through the installation FOIA manager as

outlined in AF Supplement to DoD Regulation 5400.7-R_AFMAN 33-302. Public

affairs will coordinate releases of information with the installation Staff Judge Advocate

(SJA).

12 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

1.2.10. Control of Photography. Refer to AFI 35-101, Public Affairs Policy and Procedures.

1.2.11. Responsibilities in Foreign Areas.

1.2.11.1. The Department of State, in cooperation with the Agency for International

Development, is responsible for determining US participation in conducting disaster

relief operations in overseas locations.

1.2.11.2. The Joint Chiefs of Staff have provided instructions regarding the use of

military resources in such operations to the commanders of unified commands for foreign

areas.

1.2.11.3. Air Force installation commanders in these areas must include guidance and

procedures necessary to ensure prompt and effective response to the requirements of the

unified command commander in their CEMP 10-2.

1.2.12. Civil Defense Warning and Notification System. Refer to AFMAN 10-2504, Air

Force Incident Management Guidance for Major Accidents and Natural Disasters, for

further information on this subject.

1.2.13. Important Considerations after an Incident.

1.2.13.1. Rescuing the injured.

1.2.13.2. Preventing further injury and loss of life.

1.2.13.3. Protecting property and investigative data of evidentiary value from loss or

damage.

1.2.13.4. Safeguarding any classified information within the vicinity.

1.2.13.5. Meeting the needs of informing the public. Meeting this requirement under the

chaotic conditions at an accident site calls for close cooperation and mutual

understanding between Security Forces, Public Affairs and the news media

representatives.

1.3. Phases of Incident Management. The Air Force Incident Management System (AFIMS)

incorporates the five phases of incident management: prevention, preparedness, response,

recovery, and mitigation. AFIMS provides the framework with which the installation Disaster

Response Force (DRF) responds to all EM incidents. DRF members will respond to an incident

per the installation’s CEMP 10-2. Refer to AFI 10-2501 and AFMAN 10-2502, Air Force

Incident Management System (AFIMS) Standards and Procedures, for definitions and tasks

assigned during each phase. The Federal Emergency Management Agency’s (FEMA’s) web site

at http://www.fema.gov/ has information on the National Incident Management System

(NIMS). FEMA also offers emergency management training on-line at

http://training.fema.gov/EMI/.

1.4. Security Forces Response. IAW AFI 10-2501, The Air Force will establish a single

integrated EM program to mitigate the effects of major accidents; natural disasters; conventional

attacks (including those using high-yield explosives); and terrorist use of CBRN materials on Air

Force personnel, resources, and operations. Reference AFI 10-2501, AFMAN 10-2502 and

AFMAN 10-2504 for further guidance and term definitions.

1.4.1. Major Accidents, Including Hazardous Materials (HAZMAT).

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 13

1.4.1.1. A major accident is an accident of such a magnitude as to warrant response by

the installation DRF. It differs from day-to-day emergencies and incidents that are

routinely handled by base agencies without the DRF.

1.4.1.2. Security Forces (SF) are Emergency Responders for HAZMAT events and

provide support to First Responders. SF personnel do not fill the traditional roles and

responsibilities of civilian law enforcement agencies during HAZMAT events and will

not investigate or operate in suspected warm or hot zones. SF will take no further action

beyond the following:

1.4.1.2.1. Initiating the alarm sequence by making the appropriate notifications.

1.4.1.2.2. Providing entry control point management.

1.4.1.2.3. Performing cordon security to support the IC.

1.4.1.2.4. Providing counter-attack to protect mission critical resources. SF

commanders must weigh the risk to forces by understanding the protective

capabilities of SF IPE and the environment the force will be expected to operate in

before committing an assault force. See AFTTP(I) 3-2.46, Multiservice Tactics,

Techniques, and Procedures for Nuclear, Biological, and Chemical (NBC)

Protection, for information on assessment of NBC filter performance as they relate to

protection against selected Toxic Industrial Chemicals.

1.4.2. Natural Disasters.

1.4.2.1. Natural disasters can create emergency conditions that vary widely in scope,

urgency and degree of damage and destruction. When planning for natural disasters that

could occur on or near the installation plan for the worst-case scenario. Specific natural

disasters will differ in scope and effects. Therefore, response, recovery and mitigation

actions will vary. A national-level response will be required to help Air Force

installations recover from extensive natural disasters.

1.4.2.2. Natural disasters include earthquakes, extreme heat or cold, floods and flash

floods, hurricanes or typhoons, landslides and mudflows, thunderstorms and lightning,

tornadoes, straight-line winds, cyclones, tsunamis, volcanoes, wild land fires, avalanches,

winter storms, and natural outbreaks of disease.

1.4.2.3. Installations use the ICC and EOC for C2 of resources when responding to and

recovering from natural disasters. When requested, MAJCOMs may choose to deploy all

or part of their DRF to support installations affected by a natural disaster.

1.4.2.4. Commanders must be able to maintain the primary installation mission, save

lives, mitigate damage and restore mission-essential resources and infrastructure after a

natural disaster.

1.4.2.5. Base the level of response and actions on the magnitude of the disaster and

degree of damage.

1.4.3. Conventional attacks (including those using high-yield explosives); and terrorist use

of CBRN materials.

1.4.3.1. Recognize attack initiation and protect personnel, weapon systems, and material

from weapon effects.

14 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

1.4.3.2. Maintain airbase security and physical integrity.

1.5. Special Considerations for Response to HAZMAT or CBRNE incidents. When

responding to an emergency situation, Security Forces may accidentally come into contact with a

peacetime mishap involving a HAZMAT spill or a terrorist use of Chemical, Biological,

Radiological, Nuclear, or High-Yield Explosive (CBRNE) weapons, materials or agents. If

responding to a known HAZMAT or CBRNE incident, Security Forces personnel must proceed

cautiously to avoid becoming a victim of the incident and follow the directions of trained

HAZMAT responders.

1.5.1. Response to Contaminated Incident Site. An initial task within the emergency

responder missions is that the IC must establish control of the site to protect first responders

and keep out unauthorized personnel. The strategy is to establish three distinct zones: the

exclusion zone (Hot Zone), the contamination reduction zone (Warm Zone), and the support

zone (Cold Zone). Security Forces primary responsibility during initial response is to

establish, in concert with the IC, a cordon, Incident Command Post (ICP), ECP, and

Decontamination Corridor (DC). The BDOC/ECC will contact all affected posts and patrols

and FES and advise them to proceed to the Cold Zone ICP staging area.

1.5.2. If an incident occurs in a Protection Level (PL) 1-3 resource restricted area,

evacuation processes will have to be coordinated through the BDOC/ECC. Prior to

evacuating Restricted Areas, ICs must consider the totality of the incident to include threat to

life, availability of personal protective equipment and threat to PL 1-3 resources. This

decision will be made before evacuating or relieving contaminated Security Forces personnel

from their duty positions.

1.5.3. If decontamination is required follow the instructions of the IC and/or FES personnel.

The base Fire Chief (FC) will develop local decontamination procedures. The Defense Force

Commander (DFC) will work with the base FC to conduct cross functional training and

exercise process to determine the best solution for their installation.

1.5.4. Decontamination processes and equipment available will vary dependent on the

situation and hazard involved.

1.5.4.1. Security Forces performing day-to-day duties are armed with a variety of

weapons ranging from the handgun to heavy machineguns. These items are accountable

and require special handling, storage and/or destruction per AFI 31-101, Integrated

Defense. For more information on weapon decontamination processes, refer to AFMAN

31-229, USAF Weapons Handling Manual. NOTE: Equipment items that cannot be

decontaminated will be destroyed. This includes weapons and ammunition.

MAJCOM/A7S will establish procedures for the immediate replacement of contaminated

weapons and ammunition once it’s determined that they cannot be reissued based on the

type of contaminate. See AFMAN 23-220, Reports of Survey for Air Force Property, for

procedures for accountability of items being destroyed.

1.5.4.2. In a high risk response, Security Forces must work with the FBI and the

HAZMAT team to coordinate the collection of evidence. Only those SF members

properly trained and equipped to collect contaminated evidence will participate in the

handling of any contaminated evidence or material.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 15

1.5.4.2.1. The lead investigative agency may request that evidence is not

decontaminated before being bagged. See AFI 31-206, Security Investigations

Program, for evidence collection.

1.5.4.2.2. The chain of custody of evidence collected at HAZMAT or CBRNE

incidents must be part of the preplanning and execution.

1.5.4.3. Security Forces personnel will be medically examined and depending on the

situation or symptoms, transported to a Medical Treatment Facility (MTF).

1.6. Special Considerations for Criminal or Terrorist Use of CBRNE. As previously noted,

during all response actions, first responders must continually assess the situation and be alert for

indicators of terrorist or criminal intent or that the disaster may have been human-caused. If a

CBRNE incident is believed to have been human-caused, the following procedures apply.

1.6.1. Security Forces members may likely become victims based on their location at the

initiation of the incident or initial response to the incident scene. The decontamination

process will be the same as other HAZMAT incidents.

1.6.2. If evidence is found on someone that provides a reasonable belief that they were

responsible for the CBRNE incident, immediately apprehend and notify the BDOC/ECC and

IC. Example: While going through decontamination a person is found with a bag containing

a white powdery substance. Based on the person’s nervous behavior and the suspicious

powder in the bag the person should be apprehended and the bag set aside as

evidence. Decontamination of all personnel should occur prior to leaving the hazard zone.

1.6.2.1. Consideration must be taken on how to transport the suspect to the

Decontamination Corridor. The contaminated Security Forces unit will be responsible

for the suspect until released to AFOSI or FBI agents to limit further contamination

exposure to other Security Forces.

1.6.2.2. When the contaminated Security Forces members are moving or transporting the

suspect to the Decontamination Line, Security Forces flight leadership must plan to

transfer the suspect, after decontamination, over to a two-person decontaminated Security

Forces unit. Continual communication during decontamination and transfer is critical

and must be adequately planned for and exercised.

1.6.3. Suspect decontamination and handling procedures.

1.6.3.1. During the decontamination of a suspect, the safety of the first responder at the

Decontamination Line must be paramount. Officer safety and emergency responder

safety must be foremost in the minds of the Security Forces members. The agency

responsible for decontamination must be informed that a possible hostile suspect is being

processed.

1.6.3.2. The receiving “clean” unit will handcuff and search the decontaminated suspect

as he/she leaves the decontamination area. Handcuffing and searching of the suspect will

take place before the suspect is taken to the next stage.

1.6.3.3. Security Forces must coordinate with the lead Federal Investigative Agency (e.g.

AFOSI or FBI) as soon as possible; however, the transportation of a suspect who requires

medical attention to the nearest medical treatment facility takes priority.

16 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

1.6.3.3.1. If no coordination with the lead Federal Investigative Agency can be made,

Security Forces will be responsible for maintaining the custody and guarding any

suspect transported to medical treatment facilities until properly relived.

1.6.3.4. The transfer of the suspect to AFOSI or FBI will be properly documented IAW

established procedures.

1.7. Exercises. Installations must conduct exercises as outlined in the Integrated Defense Plan

(IDP), AT Plan (ATP) and CEMP 10-2. These plans must include functional exercises that

allow for coordinated responses between Fire Emergency Services personnel and Security

Forces. This will ensure first responders know how to work collaboratively during response to

real world and exercise scenarios. To the greatest extent possible, exercise scenarios should be

combined to meet the objectives of the installation IDP, ATP, and CEMP 10-2 while avoiding

redundancies.

1.8. Legal Considerations.

1.8.1. The provisions of this AFMAN direct Air Force personnel in their responses to high

risk incidents. The provisions apply largely to US-based installations. Any operations

conducted at an installation overseas may be subject to additional regulations and restrictions

depending on the Status of Forces Agreement or other bi-lateral agreements with the host

nation.

1.8.2. Any guidance in this AFMAN relating to riot control agents or other less than lethal

means do not provide authority to use such non-lethal measures in any area where US forces

are engaged in hostilities or contingency operation. Such use of non-lethal munitions is

authorized only as directed in the Rules of Engagement for the particular operation or

contingency.

1.8.3. Air Force operations in the US must comply with the Posse Commitatus Act, which

generally prohibits federal military personnel from conducting law enforcement activities off

of a military installation. During some civil disturbance scenarios, and other limited

circumstances, federal military forces may be permitted to conduct law enforcement

activities. The installation SJA must be consulted before Air Force personnel are employed

off of the installation to ensure the manner in which they are being used complies with

federal law and regulation.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 17

Chapter 2

COUNTERING THREATS

2.1. Definitions. The following definitions are provided for the purpose of clear communication

and to standardize titles and descriptions for operational planning and response purposes.

2.1.1. Insider Threat. The DoD defines an Insider Threat as “A disaffected individual(s)

within the force motivated to do violence against the force and the nation.”

2.1.2. Active Shooter. The DHS defines an Active Shooter as “An individual actively

engaged in killing or attempting to kill people in a confined and populated area; in most

cases, active shooters use firearms(s) and there is no pattern or method to their selection of

victims.”

2.1.3. Suspicious Activity. The DoD defines Suspicious Activity as “Observed behavior that

may be indicative of intelligence gathering or other preoperational planning related to a

terrorist or other security threat to DoD interests worldwide.” There are thirteen categories

of suspicious activity. These categories are clearly defined and can be found in Attachment

2.

2.1.4. Radicalization. The DHS defines Radicalization as “The process of adopting an

extremist belief system; including the willingness to use, support, or facilitate violence as a

method to effect societal change.”

2.1.5. Workplace Violence. The Occupational Safety and Health Association (OSHA)

defines Workplace Violence as “Any physical assault, threatening behavior, or verbal abuse

occurring in the work setting.”

2.1.6. School Violence. The Center for Disease Control (CDC) defines School violence “as a

subset of youth violence, which refers to harmful behaviors that may start early and continue

into young adulthood… It includes bullying, slapping, punching, weapon use, and rape. The

young person can be a victim, an offender, or a witness to the violence-or a combination of

these”.

2.2. Prevention. Prevention starts with the ability to detect potential threats. Numerous

documented case studies exist that indicated trends of behavior demonstrated prior to violent

actions taken by an Active Shooter or other insider threats. Attachment 3 standardizes these

indicators and facilitates training, detection, and reporting. These indicators are specific actions,

behaviors, or activities that correlate to the thirteen categories of suspicious activity and may

indicate an individual’s propensity for violence. Additionally, this list of indicators incorporates

indicators of workplace violence. It is imperative that the DFC, ATO or S2 educate the base

populace on these indicators through awareness briefings and effective community policing,

crime prevention and workplace violence prevention programs.

2.2.1. All reporting and response actions will be based on specific observed behaviors and

other indicators of possible threats (not because of someone’s race, ethnicity or religion).

2.2.2. The people most likely to recognize potential threat indicators are friends, coworkers,

and supervisors. The DFC, ATO, and S2 are charged with educating the base populace and

enabling airmen to report individuals exhibiting behavioral indicators that are possibly

18 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

indicative of violence, terrorist, or criminal activity. Educating our personnel to refer these

individuals for additional law enforcement intervention or assistance enhances the overall

integrated defense posture of an installation.

2.3. Reporting. Prevention through education and detection is critical, but proper reporting of

observed behaviors that may be indicative of violence, terrorist, or criminal activity enables law

enforcement officials to properly investigate and take appropriate action. As part of base

populace awareness training, the DFC, ATO, or S2 must educate the base populace on how to

properly report suspicious activity or behavior through appropriate law enforcement reporting

channels.

2.3.1. eGuardian. eGuardian has been designated as the system of record for all DoD law

enforcement agencies/activities. Security Forces shall coordinate with their local AFOSI

detachment to use the eGuardian system for reporting, storing, and sharing unclassified

Suspicious Activity Reports (SAR) dealing with information regarding a potential threat or

suspicious activity related to DoD personnel, facilities, or forces in transit.

2.3.1.1. No entry may be made in eGuardian based on a person's ethnicity, race, religion,

or lawful exercise of rights or privileges guaranteed by the law, unless reasonable

suspicion exists of a direct relationship between such information and a specific criminal

act or behavior that may pose a threat to DoD personnel, facilities, and forces in transit.

2.3.1.2. The following specific categories of information are not permitted to be entered

into eGuardian: classified information; information that divulges sensitive methods and

techniques; information derived in accordance with chapter 36 of title 50, U.S.C., also

known as "The Foreign Intelligence Surveillance Act" (Reference (t)); grand jury

information; Federal taxpayer information; sealed indictments; sealed court proceedings;

confidential human source and witness information; and any other information of which

the dissemination is prohibited by law.

2.3.1.3. The collection and retention of information on US citizens by non-intelligence

units within the Department of Defense is regulated and must comply with Department of

Defense Directive 5200.27, Acquisition of Information Concerning Persons and

Organizations not Affiliated with the Department of Defense.

2.3.1.4. (Added-AFMC) Security Forces leadership (or their designee) are encouraged

to obtain read-only access to eGuardian by contacting their local AFOSI Detachment.

2.4. Workplace Violence. At each installation, the key to identifying and preventing workplace

violence is to place emphasis on engaging the individual’s leadership and/or contacting Security

Forces or AFOSI regarding any concerns involving potential criminal conduct. Security Forces

is a key player in the Workplace Violence Program and the DFC must coordinate on any

installation plans concerning this program.

2.4.1. Planning. Successful workplace violence prevention programs are based on a strong

policy against violent behavior combined with effective training on understanding indicators

of violence and properly reporting concerns to the appropriate agency. AFI 44-154, Suicide

and Violence Prevention, Education, and Training, establishes policy and mandatory training

requirements for USAF personnel on detecting/reporting indicators of workplace violence.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 19

2.4.1.1. Per AFI 44-154 unit commanders will ensure all personnel complete a

mandatory suicide prevention and violence awareness education program.

2.4.1.2. Completion of the suicide prevention and violence awareness education program

training will be documented, and a tracking mechanism developed to ensure training is

accomplished.

2.4.1.3. When an individual demonstrates indicators, unit leadership must be made aware

to facilitate the appropriate response and support for the individual and the potential

target to prevent further escalation of the situation.

2.4.1.4. If Security Forces is contacted about personnel demonstrating indicators of

potential workplace violence, Mental Health professionals and the individual’s unit

leadership must be notified.

2.4.2. Response. If prevention fails, Security Forces must develop procedures for responding

to and resolving incidents of violence. A plan specific to workplace violence should be

included in the IDP as an attachment. Additional information concerning workplace violence

is available from the Office of Personnel Management at the following website:

http://www.opm.gov/employment_and_benefits/worklife/officialdocuments/handbooksg

uides/WorkplaceViolence/index.asp.

2.4.3. Resiliency. The TSR team will provide TSR services to enhance resilience to

potentially traumatic events.

2.4.4. Exercises. Installations should conduct an exercise that addresses response to an

incident of workplace violence annually. Tabletop exercises are sufficient for exercising the

partnership with local first responder agencies, but should not be used more than two years in

a row to meet participation needs. Exercising the resiliency component of high-risk incidents

is a critical part of assessing readiness. Exercises may be conducted in conjunction with other

annual exercise requirements. Lesson Learned from these exercises should be thoroughly

documented and reviewed and uploaded to the Air Force – Joint Lessons Learned

Information System (AF-JLLIS) at https://www.jllis.mil/USAF.

2.5. School Violence. In recent years, there have been several incidents of violence in schools

throughout the United States. Although incidents of this nature are rare, many Air Force

installations have either DoD or locally sponsored schools on the installation. As a result,

installation commanders must ensure proper planning and exercises are conducted. Close

coordination between base and school officials is essential to successfully concluding any

school-related incidents.

2.5.1. Planning. Security Forces must coordinate with school officials and become familiar

with school policies concerning incidents on school grounds at their installation. Each school

district has different policies and actions required based on incidents. If an installation

school has no policies in force, base officials, including Security Forces, should assist them

in establishing security and lock down procedures. Security Forces should inform school

officials on their response capabilities and procedures as well, so all parties involved are

comfortable with processes involved in response to school violence. MOAs must be

maintained to address procedures; all procedures will be codified in the IDP.

20 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

2.5.1.1. Jurisdiction. Local SJAs provide advice on the implications of installation

jurisdictional requirements for schools located on Air Force installations. Jurisdictional

requirements will necessitate different and varying responses by Security Forces and

could require support from local Law Enforcement Agencies (LEA).

2.5.1.2. Diagrams and Maps. Security Forces will have maps of school facilities and

grounds immediately available to assist in responses to violence.

2.5.1.3. Cordons. Security Forces and Fire Emergency Services will predetermine

cordons for response to eliminate confusion that may occur upon notification of an

incident at an installation school. Upon actual response to an incident, the cordon may be

adjusted to accommodate specific threats.

2.5.1.4. Encourage the use of Security Forces personnel that are already assigned duties

as instructors at the schools [e.g. Drug Abuse Resistance and Education (DARE)

instructors] to coordinate and exercise plans. These personnel already have a rapport

with the children and they are familiar with the layout of the school.

2.5.1.5. Coordinate with school officials (school liaison officer) for periodic

walkthroughs with an MWD to familiarize the canine and handlers with school facilities.

This also acquaints the faculty and students with this process.

2.5.1.6. Security Forces will coordinate with school officials prior to utilizing school

facilities for training. Active school facilities are best used during periods when school is

not in session (weekends, spring breaks, holidays, etc.). School officials have the final

say as to how their facilities are utilized.

2.5.2. Reporting and Response. School officials should immediately lock down the school

and notify Security Forces for immediate response to school incidents. The lock down

process is necessary to ensure the safety of their students and accountability of students and

personnel. School officials should report school violence incidents using the installation’s

emergency response telephone numbers or alarms, when available. Upon arrival, Security

Forces must immediately contain the situation and enclose the scene. Attempt to obtain

information on the subject’s location and accountability of all students and faculty.

2.5.3. Media. Media interest at scenes of school violence will be high. Ensure PA is

immediately involved in establishing a media reception plan and media center to assist with

information flow.

2.5.4. Parents. As mentioned earlier, parental requirements at the scene will be challenging.

The EOC Director and IC should select and establish an area for parents to respond to and

receive information. PA is responsible for all information flow; however, Airman and

Family Readiness Center, chaplains and medical personnel can assist with this. Give parents

appropriate information for the situation.

2.5.5. Resiliency. The TSR team will provide TSR services to enhance resilience to

potentially traumatic events.

2.5.6. Exercises. Installations that have on base schools, will conduct an exercise at least

annually to bring all tasked agencies together to practice responding to a violent incident in a

base school. It is recommended that an exercise occur during the school year so teachers and

students can get involved as well. Exercising the resiliency component of high-risk incidents

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 21

is a critical part of assessing readiness. Exercises may be conducted in conjunction with

other annual exercise requirements. Lesson Learned from these exercises should be

thoroughly documented and reviewed and uploaded to the Air Force – Joint Lessons Learned

Information System (AF-JLLIS) at https://www.jllis.mil/USAF.

2.6. Active Shooter. Active shooter incidents are incredibly dangerous and difficult because

there is no criminal objective (robbery, hostage taking) involved other than violence. Often, the

shooter has no regard for their life, and may be planning to die. These factors leave Security

Forces no other recourse but to locate and stop the shooter as quickly as possible. As a result,

installation commanders must ensure proper planning and exercises are conducted. Close

coordination between all tasked agencies and the base populace is essential to mitigate the threat

and minimize the loss of life in an Active Shooter incident.

2.6. (AFMC)Active Shooter. To ensure the proper active shooter response by each individual,

the installation should consider a centralized alerting system that is distinct and specific to active

shooter situations. If used, installation alerting tone will be followed by the giant voice

commanding all personnel to go into “LOCKDOWN” measures. If no alerting tone is used

installations will go straight to the voice command “LOCKDOWN.”

2.6.1. Planning. These types of incidents require preplanning and preparation in order to

conclude the incident as quickly and as safely as possible. There are many tasks that can be

considered but the following actions, at a minimum, must occur or be planned for

immediately:

2.6.1.1. Base Populace Education. In addition to awareness training on behavioral

indicators as described in paragraph 2.2 and Attachment 3, the DFC, ATO, and S2 must

ensure the base populace knows what actions to take upon notification that an Active

Shooter incident is occurring at their location or elsewhere on base. This awareness

training should be developed locally and contain a brief historical review of past

incidents, but primarily focus on what actions airmen and civilians should take to protect

themselves and assist responding forces. Special care should be taken to not divulge

specific tactics, techniques, or procedures of responding forces.

2.6.1.1.1. (Added-AFMC) Attachment 7 provides the minimum requirements and

shall be further refined IAW the Installation’s Active Shooter Plan for each particular

installation by the DFC and ATO (T-3). The briefing will include the General Risk

for Violence Indicators (Attachment 3), reporting requirements, relevant case studies,

and actions that the installation population must take in order to protect themselves

and assist responding security forces (T-2). The briefing is an annual requirement for

all military/DOD civilian employees assigned to AFMC installations. It is highly

encouraged that all installation contractors receive the same briefing. Attachment 10

provides Active Shooter “LOCKDOWN” Procedures for personnel to follow. Notes:

1. Ensure bargaining unit requirements for covered DOD civilian employees are

addressed locally prior to implementation. 2. This briefing can also be provided to

dependents and family members to further enhance community awareness.

2.6.1.2. Each installation must develop and maintain an operational plan for response to

active shooter incidents. This installation plan may be an element within an existing

plan, such as the IDP, AT Plan or the CEMP 10-2, or a separate plan, as directed by the

installation commander. These plans must incorporate all first responder agencies, to

22 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

include off-base support, and be as detailed as possible to reduce the amount of time

necessary to react, as response time is very crucial in this type of incident.

2.6.1.2.1. (Added-AFMC) The plan must include mass warning and notification

procedures, operational reporting requirements, law enforcement response actions,

“LOCKDOWN” measures, recovery actions, and resiliency support (T-1).

2.6.1.2.2. (Added-AFMC) All personnel assigned must be trained IAW the

installation’s plan covering Active Shooter scenarios (T-1).

2.6.1.3. Large Venues/Gathering Areas. Security Forces units must coordinate closely

with owner/operators of large occupancy venues on the installation to become

familiarized with those locations, both internally and externally.

2.6.1.4. Arming Considerations. Security Forces goal is to always maintain superior fire

power during response to high-risk incidents. If possible, every patrolman entering the

building should possess an additional weapon, such as a rifle, carbine, or shotgun, to

provide additional range capability to engage an Active Shooter. Do not delay response

waiting for additional weapons; the primary focus remains on locating and stopping the

Active Shooter as quickly as possible.

2.6.1.4.1. (Added-AFMC) In response to the threat of active shooters, AFMC

installations have the authority to specify arming of key personnel IAW AFI 31-

101_11.3. Integrated Defense, to increase the effectiveness of integrated defense.

2.6.1.5. Law Enforcement Training. To ensure standardization of Active Shooter

training, unit-level trainers will utilize the Active Shooter curriculum located in the

Electronic Tactics, Techniques, & Procedures Guides (eTTPGs) Library located on the

Air Force Security Forces Center website. The library is at

https://afsfmil.lackland.af.mil, on the left column, click ‘eTTPGs’.

2.6.1.6. Equipment Considerations. Equipment availability must be considered and

include:

2.6.1.6.1. Concealable body armor. Concealable body armor should be a matter of

routine use by all law enforcement and security patrols, as indicated by AFI 31-101,

Integrated Defense. In an active shooter event, heavier armor such as an Improved

Outer Tactical Vest (IOTV) with ceramic plates carried in the patrol vehicle could

provide a tactical advantage to the entry team. The responding patrol is required to

stop the threat immediately and donning additional armor shall not take more than a 1

to 2 minutes

2.6.1.6.2. Flashlights. Electrical power could be disrupted, possibly intentionally by

either the suspect or the responders, during the incident. Security Forces units are

highly recommended to incorporate into training the use/handling of a flashlight and a

weapon simultaneously.

2.6.1.6.3. Breaching equipment. This kind of equipment may be needed to force

entry to a secure building. These tools include a ballistic shield, single-person door

ram, Halligan tool, and bolt cutters. These tools should be contained in a man-

portable backpack so they can be carried by any of the responding teams. Each

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 23

Security Forces member should undergo thorough familiarization training on the

employment of these tools.

2.6.1.6.4. In addition to Security Forces standardized duty gear, consideration should

be given to add individual first aid kits (IFAK), felt tip markers, portable litters, and

Meals-Ready-to-Eat (MRE) or energy bars to Security Forces A-bags.

2.6.2. Response. The primary goal of Security Forces in response to an Active Shooter

incident is to eliminate the threat and minimize the loss of life. Each Security Forces

member must realize that the speed of their response will minimize casualties, but will likely

not prevent all loss of life. Unless otherwise directed by Base Defense Operations Center

(BDOC) or the Flight Sergeant, the Security Forces member must take immediate action to

eliminate any active threat to human life.

2.6.2.1. Security Forces need to have an accurate understanding of the tactical situation,

and a working plan to confront it. Because there is little time to develop an extensive

plan at the scene, patrolmen should mentally prepare and build an action plan in advance.

All actions should be in accordance with AFI 31-207, Arming and Use of Force by Air

Force Personnel.

2.6.2.1.1. Notify BDOC immediately of what teams are entering, what avenues of

approach are used, and their associated armament and equipment.

2.6.2.1.2. Upon arriving, if there is an active shooting in progress, do not verbalize

your intent to use force if it endangers yourself or others. Use lethal force IAW AFI

31-207.

2.6.2.1.3. If the suspect manages to barricade himself/herself in a manner that limits

physical/visual contact and is no longer an active threat, initiate EST or civilian

Special Reaction Team (SRT) response. Refer to Chapter 3 for specific guidance in

handling a barricaded subject.

2.6.2.2. The scene will be loud and chaotic. Terrified victims may be able to direct you

to the shooter and the sound of shooting may also assist in locating the shooter. The

shooter will be highly focused on violence.

2.6.2.3. A Security Forces member can use the chaos and the shooter’s diverted focus as

cover to move quietly to a position of advantage.

2.6.2.4. Incident Command. The initial incident command will come from the senior

Security Forces member on-scene until transferred to a certified/trained IC and the

AFIMS Incident Command System is established. At that time, the senior Security

Forces member on scene will assume the role of Operations Section Chief (OpsSC), as

outlined in AFMAN 10-2502, until properly relieved by higher Security Forces authority.

The IC will retain overall management of the entire incident and supporting functions.

2.6.2.4.1. The IC must establish a safe staging area for follow-on forces to include

FES, Emergency Medical Technicians (EMTs), and other on and off-base tasked

agencies.

2.6.2.4.2. The IC should have a pre-established code word that all responding units

will use if they locate an improvised explosive device (IED) or other deliberately

24 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

placed hazard at the incident scene. This code word must be incorporated into pre-

planning and exercises.

2.6.2.5. OpsSC Responsibilities. The OpsSC is responsible for the tactical operations at

the incident, to include knowing the number of responding patrols at the scene, team

compositions, roles and armament, team locations in facility/building, and up-to-date

suspect actions to brief follow-on forces and the IC. The senior on-scene Security Forces

representative will request assistance through the IC such as additional personnel,

obtaining affected facility schematics to properly track and coordinate the various teams

entering the building, or any other resources needed to mitigate the incident. This

information, plus other critical data, must be transmitted to and documented by BDOC,

ECC and/or EOC accordingly.

2.6.2.5.1. The OpsSC will coordinate through the IC a methodical and efficient plan

to clear the building or scene after any immediate threat is terminated. This is

necessary to ensure there are no IED or additional subjects prior to allowing

emergency responders in to tend to casualties.

2.6.2.5.2. Consider tracking evacuated personnel by their original location at the

incident scene. While not the primary focus, this will enable crime scene

reconstruction and assist investigators.

2.6.2.6. Team Composition/Additional Support. If the threat cannot be stopped by the

initial responding patrol(s), try to isolate and contain it, and await backup.

Backup/support should come in the form of specialized teams that have been specifically

trained (see para 4.6.1.5.) in the role of Entry Team, Contact Team, and Search/Rescue

Team. These teams should deploy in a manner that gets them to the shooter quickly, and

offers a tactical advantage. The following is a brief synopsis of each team’s capability

and role:

2.6.2.6.1. Entry Team. The primary role of the Entry Team is to immediately locate

and eliminate the threat and minimize the loss of life. All Security Forces personnel

should be trained to perform the role of Entry Team.

2.6.2.6.2. Contact Team. The Contact Team’s role is to limit the shooters movement,

prevent escape, communicate status to the OpsSC and/or IC, provide preliminary

assessment (dynamic intelligence), give victim locations and medical needs if time

permits, report explosives types and locations, offer descriptions and locations of

suspects, describe the shooter(s) weapons, and apprehend the suspect(s) if capable.

2.6.2.6.3. Search/Rescue Team. The Search/Rescue Team’s role is to recover

casualties by entering or approaching danger areas to locate victims, extract victims

to a safe area and relay medical information to the OpsSC, who will relay to the IC

and medical personnel. Prior to entry, the team must know where to direct the

uninjured and ambulatory (who can walk or run) in order to send them to a safe area.

In the case of multiple victims, the search/rescue team(s) may need to be expanded or

multiplied. Methodical control of the area around them must be emphasized by the

search/rescue team and a system of identifying and accounting for victims must be

put in place.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 25

2.6.2.7. Crime Scene Preservation. Once the incident site is secured, it and the

surrounding area becomes a crime scene. All first responders, including Fire and/or

Medical personnel, and all other individuals will have to be cleared by the IC before entry

into the secured incident site. Legal jurisdiction and any agreements with outside law

enforcement agencies will determine who has the responsibility to collect and store

evidence and which agency will take the lead investigative role. Contact the base SJA for

guidance. An active shooter incident will most likely include the formation of a Law

Enforcement Joint Operations Center (JOC) to integrate/house the multiple law

enforcement agencies involved in the investigation. The Air Force Office of Special

Investigations (AFOSI) SAIC (Special Agent in Charge) or the DFC will most likely be

the primary liaison within the JOC. At the scene, Security Forces will play an important

role in maintaining the installation mission of protecting Air Force property, resources,

and personnel.

2.6.3. Jurisdiction. Local SJAs provide advice on evidence collection and the implications

of jurisdictional requirements for facilities and open areas located on Air Force installations.

Jurisdictional requirements will necessitate different and varied responses by Security Forces

and other assisting law enforcement agencies.

2.6.4. Media. Media interest at scenes of an active shooter incident will be high. The IC,

through PA, is responsible for all public information flow. The Installation Commander or

IC must ensure the PA Officer is a key player in exercises and training, and in the event of an

actual incident, is immediately involved in establishing a media reception plan and media

center to assist with information flow.

2.6.5. Families. The EOC Director, through the Airman and Family Readiness Center

(A&FRC) should establish an area for families to gather at to receive information and consult

with Chaplains and other family support personnel. Like other agencies, the A&FRC must

be included in all installation planning efforts to ensure their rapid and efficient response to

an actual event. NOTE: This is a traumatic event for all involved. Lessons Learned have

demonstrated the need to cordon the affected area to prevent emotional family members and

friends from attempting to enter the incident scene.

2.6.6. Resiliency. Following an Active Shooter incident, it is essential that all Security

Forces members and Emergency Responders have access to a TSR Team. The installation

TSR Team should have Security Forces personnel assigned to it to provide responding

Security Forces incident personnel with peer support.

2.6.7. Exercises. Installations must conduct Active Shooter exercises annually IAW AFI 10-

2501. Exercising the resiliency component of high-risk incidents is a critical part of

assessing readiness. Exercises may be conducted in conjunction with other annual exercise

requirements. Lesson Learned from these exercises should be thoroughly documented and

reviewed and uploaded to the Air Force – Joint Lessons Learned Information System (AF-

JLLIS) at https://www.jllis.mil/USAF.

26 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

2.6.7.1. (Added-AFMC) AFIs require annual exercises, but not specifically Active

Shooter, AFMC installations will exercise the Active Shooter Plan semi-annually at

different locations on the installation (e.g., medical facilities, mass gathering locations,

club, etc.) (T-2). Exercises should involve off-installation agencies as available (see

Attachment 9). Active Shooter exercises should be consolidated with other exercises for

efficiency.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 27

Chapter 3

BARRICADED SUBJECTS

3.1. Initial Response. In high-risk situations that do not involve an Active Shooter, it is

important that Security Forces immediately contain or enclose the scene. On-duty Security

Forces personnel are likely to be the initial response element on scene. The first arriving unit

will establish command and control and assume the role of initial IC and initiate the Incident

Command System. The IC will maintain control of the situation until properly relieved of

command by a senior official/competent authority, based on parameters of the incident. Some

barricaded suspect cases involve hostage taking. Information regarding hostage situations is

described in further detail in Chapter 5.

3.1.1. Responding units must keep the BDOC/ECC informed of the following:

3.1.1.1. Arrival on scene.

3.1.1.2. Position.

3.1.1.3. Safe avenues of approach for other responding units.

3.1.1.4. Status of the situation.

3.1.2. To reduce risk, the patrolmen should take a covered position where they can best see

what is happening while preventing the suspect from escaping. Immediately evacuate all

nonessential personnel far enough away so they are in no danger of being taken hostage or hit

by a suspect’s fire. Do not allow volunteers or family members to start or become involved

in any negotiations.

3.2. Containment of the Scene.

3.2.1. Establish a cordon. The initial IC will direct the establishment of a 360-degree cordon

at the scene of a barricaded subject. This cordon will be established and maintained by

Security Forces, or designated augmentation forces, until the IC determines there is no longer

a need. The senior Security Forces member on scene does this by assigning Security Forces

personnel to establish inner and outer perimeters. How far these perimeters are established

from the scene depends on the scope, complexity, and location of the incident.

3.2.1.1. Outer perimeter. The outer perimeter is established to prevent people from

interfering with recovery operations and to keep innocent bystanders and onlookers from

being hurt. This perimeter should be established outside the maximum effective range of

any weapons the barricaded subject has, if Security Forces members can establish the

type/caliber of the weapon(s) involved. Direct all vehicles and pedestrians not involved

in response and recovery operations away from the threat area. Set up an ECP along the

outer perimeter in an area that is easily accessible to responding units. Send all personnel

who need to enter the area to the ECP.

3.2.1.2. Inner perimeter. Security Forces personnel normally establish the inner

perimeter to contain the immediate scene. The Emergency Services Team (EST), if

available, may replace on-duty Security Forces personnel posted on the inner perimeter if

deemed appropriate for use by the OpsSC and IC. Guidance governing establishing,

training, and utilizing EST can be found in Chapter 6. Security Forces can adjust the

28 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

inner perimeter as needed. Due to the dangers involved, strict control of the area must be

maintained. Only key personnel, such as EST, negotiation teams, and the senior

representatives from Security Forces, Fire Emergency Services, and Emergency Medical

Services, are allowed within the inner perimeter and only at the direction of the IC.

Security Forces, or EST if available, is responsible for searching and clearing the inner

perimeter. At this point, the installation commander could choose to have the lead

agency assume control of the situation.

3.3. Establishing Jurisdiction and Command and Control.

3.3.1. Role of Local Civilian Law Enforcement. The specific roles of state and local LEAs

must be part of pre-incident planning. The type of jurisdiction (exclusive, partial, concurrent

or proprietary) will dictate civil and military roles. Coordinate with the installation staff

judge advocate prior to employment of off base law enforcement.

3.3.1.1. Exclusive or Partial jurisdiction. For installations or portions of installations

under exclusive federal jurisdiction, the state and local LEAs have no jurisdiction or

authority, though they may seek or be asked to assist with security precautions and other

duties consistent with their respective interests (e.g., off-installation traffic control,

sealing the area).

3.3.1.2. Concurrent or proprietary jurisdiction. If an incident occurs in an area of

concurrent or proprietary jurisdiction, the status of the state and local LEAs is clearer, but

roles in responding to the incident remain uncertain and must be clearly defined in plans.

The installation commander exercises broad and ultimate authority to maintain law and

order on the installation, notwithstanding concurrent state jurisdiction. The installation

commander may also deny entry to or remove from the installation anyone who poses a

threat to good order and discipline. It is recommended that the installation commander

pursue memorandums of agreement (MOA) with local civilian law enforcement agencies

to define response strategies and division of responsibilities (Attachment 4). These

agreements must be exercised to validate their effectiveness and ensure the safety of the

installation’s personnel and resources.

3.4. Negotiations. The principle method for peacefully resolving a high-risk situation is

through the use of a negotiator. Each installation must have the services of a trained negotiator

available. Negotiators may be drawn from trained Security Forces, AFOSI, FBI, local civilian

LEAs, or even medical professionals. The source for the negotiator is determined by the

resources available in any given area and may be influenced by the incident itself. The source

for the negotiator capability must be determined in advance and available 24 hours a day for

immediate recall. A combination of sources may be used, i.e., AFOSI and Security Forces. For

further information concerning crisis negotiation, refer to Chapter 5.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 29

Chapter 4

DOMESTIC VIOLENCE AND ABUSE RESPONSE

4.1. Domestic Violence. Security Forces personnel must be prepared to encounter potentially

hostile incidents of domestic violence. Security Forces need to know how to diffuse these

incidents and regain control of the situation. Each year law enforcement personnel, including

Security Forces, are injured or killed responding to family violence calls.

4.1.1. Studies have shown that family violence calls are often repeat calls. When the initial

call is not effectively handled, it is likely the situation will reoccur and the patrolmen will be

called again. By learning how to recognize child abuse/neglect and spouse abuse and by

acquiring the skills necessary to act accordingly, Security Forces personnel can:

4.1.1.1. Reduce the likelihood of injury to the family member.

4.1.1.2. Provide protection to victims of family violence.

4.1.1.3. Avoid repeat calls.

4.1.2. Security Forces personnel have a critical role to play in restoring order and preventing

future incidents of family violence. They are trained to respond in an emergency and have

transportation and communication equipment immediately available. Security Forces also

have the authority to intervene and, if necessary, to detain or apprehend.

4.2. Security Forces Role in Domestic Violence. One of the missions of Security Forces is to

maintain law and order. To reestablish order and preserve the peace, Security Forces personnel

are required to respond to situations of domestic violence. The primary role in these situations is

to take immediate action to restore order and protect lives. In addition, the sponsor's unit

commander, first sergeant and the base family advocacy officer must be advised of all incidents

of family violence. AFOSI is responsible for investigating major offenses, including child abuse

and spousal abuse involving aggravated assault. The local AFOSI detachment must be notified

immediately of all child abuse or neglect allegations to assist in determining who the

investigating authority is. Security Forces routinely investigate minor incidents of child

abuse/neglect and spousal abuse. Incidents should be recorded on AF Form 3545, Incident

Report, and AF IMT 53, Security Forces Desk Blotter. When peace has been restored and the

appropriate authorities have been notified of the incident, the Security Forces member’s role has

ended, except where an offense has been committed and an apprehension will take place.

4.2.1. Attitude of Responding Security Forces. The attitude of the responding Security

Forces personnel, in many cases, will determine the attitude and cooperation of the family

members involved. Realize that people may be hostile or angry, frightened or abusive,

ashamed or uncooperative and they may view Security Forces personnel as intruders and

resent their presence. The Security Forces member’s approach should be calm, controlled

and concerned. Care should be taken to avoid sarcastic or critical remarks, an impolite tone

of voice or threatening or aggressive body positions. Hostility, indifference or aggression

may provoke further violence while a sensitive and tactful approach may restore order and

calm the situation.

4.2.2. Best Approach. In responding to a call, keep in mind that each situation is different

and must be treated individually. Meanings and attitudes might be read into words, facial

30 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

expression and body positions. The best approach is a calm and positive one. Responses

involving ongoing violent action or other aggressive actions by a suspect may require a more

proactive and forceful response.

4.3. Unit Commander’s Role in Domestic Violence. Unit commanders are responsible for the

actions of assigned personnel, both on and off duty. This responsibility includes the behavior of

both military sponsors and their military dependents. Security Forces personnel should

recognize this command responsibility and duty to inform the commander of incidents of family

violence involving their assigned unit personnel and their family members.

4.4. Family Advocacy Officer’s Role in Domestic Violence. The Family Advocacy Officer

functions as the central coordinator for the base Family Advocacy Program. Under the direction

of the director of base medical services or chief of hospital services, the Family Advocacy

Officer performs a number of family violence prevention and intervention services. For more

information on family advocacy see AFI 40-301, Family Advocacy.

4.5. BDOC/ECC Controller’s Role in Domestic Violence. In answering family violence calls,

controllers must have all available information on the families and situations. The controller has

the responsibility for obtaining as much information as possible from the individual making the

call while dispatching a patrol unit. When a call is received indicating the possibility that family

violence has occurred or is occurring, the controller will:

4.5.1. Obtain as much data as possible from the caller by asking who the involved parties

are, what has happened, if the altercation is not currently ongoing when did it occur, where

did it happen, where are the involved parties now, how the incident occurred, whether

weapons were involved or available, and if medical aid is required.

4.5.2. Asks the caller for the telephone number from which the call is being made. This

enables the controller to call the number back to check the validity of the call and determine

whether the situation has changed prior to the arrival of responding Security Forces patrols.

4.5.3. Relay information to Security Forces responding to the situation. If the controller is

unable to obtain a clear description of the situation, the responding unit(s) must be informed.

4.5.4. Check AF Form 1314, Firearms Registration, roster or local firearms roster/database.

4.5.5. Ensure that an appropriate patrol response has taken place, the controller will also

ensure follow-up actions and referrals to unit commanders through first sergeants, family

advocacy officer, and/or AFOSI has occurred. In cases where the reported abuse is not

currently ongoing, a patrol response may not be appropriate. In these instances, coordination

between the controller and their supervisory chain of command, the unit commander of the

military member involved, AFOSI and the family advocacy officer will determine the

appropriate response. If the incident has already occurred and is not currently in progress, it

may be more appropriate to dispatch a Security Forces Investigator or AFOSI to the incident

to investigate in accordance with AFI 31-206.

4.5.6. Contact AFOSI immediately to meet the dispatched patrol when notified by the base

hospital that a victim of a suspected child abuse incident is being treated.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 31

4.6. Patrol Response.

4.6.1. Arriving Safely. The responding patrol(s) must drive to the scene as quickly and

safely as possible. Patrols must comply with the standards set forth in AFI 31-201,

Attachment 2, USAF Security Forces Model Vehicle Operation Policy.

4.6.1.1. The responding patrol should formulate a plan before arrival to include

determining in advance who will be in charge, who will approach first, who will serve as

backup, etc.

4.6.1.2. Use discretion when approaching a house where a domestic disturbance is

occurring. Park Security Forces vehicles at least one (1) house away from the address of

the incident. Parking directly in front of the house in question may escalate the situation

or warn residents to conceal evidence of a crime. For the same reasons, flashing lights

and sirens should be turned off at least one block before arrival and there should be no

loud noises like slamming car doors or blaring radio communications.

4.6.2. Approaching the Scene. Security Forces personnel must use caution when

approaching the house of a domestic violence complaint.

4.6.2.1. Before approaching the house, Security Forces personnel should stop and listen.

Windows, doors, adjoining buildings or areas of possible concealment should be visually

checked for unusual movements or objects.

4.6.2.2. Security Forces must exercise caution if they decide to approach from the side or

back door instead of the front door, as they could be mistaken for prowlers and escalate a

situation.

4.6.2.3. If the approach is made at night and flashlights are used, they should not be

shined in windows. Avoid silhouetting other patrols; light discipline is essential.

4.6.3. Entry Procedures. Security Forces personnel should always be dispatched in pairs to

domestic violence calls and should always stand to one side of the door, never in front of it.

The second Security Forces member should be behind and to one side of the first, in position

to maintain visual contact with the inside of the residence and provide cover.

4.6.3.1. Before knocking, pause and listen at the door. Security Forces personnel may be

able to obtain information on the nature of the disturbance and whether or not it is violent

before announcing their presence.

4.6.3.2. Check screen doors before knocking to see whether they are locked. Locked

screen doors can create an unexpected barrier between the Security Forces member and

residents if immediate action is required.

4.6.3.3. Knock on the door in a calm non-aggressive manner or use the doorbell, ringing

only once each time. When knocking on the door, do not stand directly in front of the

door. It creates the “fatal funnel” effect and may put the Security Forces member at a

disadvantage.

4.6.3.4. Evaluate the risk of entry, even when invited to enter, and respond accordingly.

4.6.3.5. If there is no response at the door and the dwelling appears quiet, the address

should be verified with the BDOC/ECC controller. If the address is correct, the sides and

32 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

rear of the quarters should be checked for indications of the presence of the occupants.

Neighbors may also provide useful information.

4.6.4. Initial Contact with Residents. Depending on the situation Security Forces personnel

should display a calm, positive and helpful manner. Initial impressions will set the tone for

the interview.

4.6.4.1. When someone answers the door, Security Forces personnel should introduce

and identify themselves and state the reason for their presence.

4.6.4.2. If not invited into the dwelling, Security Forces personnel should request to

move the discussion inside. This will remove the situation from the view of the

neighbors and enable observation of:

4.6.4.2.1. Any injuries requiring treatment;

4.6.4.2.2. Location and number of the disputants;

4.6.4.2.3. Visible weapons and threatening moves;

4.6.4.2.4. Living conditions;

4.6.4.2.5. Emotional stage of dispute and emotional condition of disputants;

4.6.4.2.6. Impairment;

4.6.4.2.7. Children at risk;

4.6.4.2.8. Physical damage to property.

4.6.4.3. Separate the disputants as necessary and maintain visual contact with the other

Security Force members. If possible, keep disputants away from rooms and items that

can be dangerous to themselves or Security Forces members.

4.6.4.4. After providing for any necessary medical assistance and calming the situation,

obtain information on the family structure and background. Such information will give

important background and allow a "cooling off" period. Questions asked may include:

4.6.4.4.1. Names and whereabouts of the sponsor and family members;

4.6.4.4.2. Sponsor’s rank, (and any other military member’s) social security number

and unit;

4.6.4.4.3. Relationship and legal status of residents: i.e., nephew, uncle, boyfriend,

girlfriend, valid marriage, for example;

4.6.4.4.4. Length of residence in quarters and period assigned to installation;

4.6.4.4.5. Ages and relationships of children;

4.6.4.4.6. Whether military or civilian police have been required to respond to

previous incidents;

4.6.4.4.7. Whether the family has been to family advocacy office.

4.6.5. Visual Observation. Observing conditions inside the quarters while obtaining

background information may give ideas of the cause contributing to the situation. The

behavior of residents can provide important clues.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 33

4.6.5.1. Signs of fear, hate, depression and embarrassment can be detected in facial

expressions, eye movements and body positions.

4.6.5.2. Be alert for sudden movements and continual glances at closed doors, closets or

bureaus. Such actions may be the first indication the individual has a weapon available

or is attempting to conceal the presence of an injured family member or other evidence.

4.6.5.3. The condition of the home and appearance of the residents may provide clues to

family functioning. If the living conditions are unusual, unsafe or unhealthy, Security

Forces members may want to arrange for photographs of the scene and request response

of the military member’s first sergeant or commander.

4.7. Differentiating Types of Disputes.

4.7.1. Violent Disputes. When responding to a violent disturbance, Security Forces

personnel must immediately separate the disputants. If personnel being interviewed are a

suspect/subject ensure you read them their rights IAW Article 31, Uniform Code of Military

Justice (UCMJ) or the 5th Amendment United States Constitution. If medical attention is

required, it should be secured at once. AFOSI must be contacted if the assault resulted in

serious injuries.

4.7.1.1. Security Forces personnel must be vigilant about their personal safety as well as

that of disputants. In separating the persons involved, make a visual search for objects

that could be used as weapons. The disputants should never be allowed to come between

the Security Forces members. Disputants should never be left alone in another room and

should not be moved to the kitchen because of the availability of potential weapons. If

the disputants cannot be calmed, apprehension and removal to the BDOC may be

necessary. CAUTION: The victim may become hostile or violent when a spouse or

family member is apprehended, detained, or physically restrained.

4.7.1.2. Alcohol is involved to some extent in many situations of domestic violence.

Intoxicated people tend to be violent in disputes making it difficult to reason with them or

obtain factual information from them. The individual may have to be removed from the

scene until sober enough to be effectively interviewed.

4.7.1.3. A potential danger exists in persons who are unusually quiet and controlled in

highly emotional disputes. Such people may be near the breaking point and may become

violent and upset by an innocent gesture or remark.

4.7.1.4. During violent disputes, it may be beneficial to separate the parties out of sight

from each other. Only do this if it does not put Security Forces personnel or other

innocent bystanders at increased risk. Once they are separated and order is restored, the

parties may be interviewed.

4.7.2. Verbal Disputes. The difference between violent disputes and verbal disputes is that

in a verbal dispute, a physical assault has not occurred. The parties involved may be easier to

reason with and a prompt resolution to the dispute is more likely.

4.7.2.1. Remove the disputants to separate rooms if possible. Avoid leaving them alone

or in the kitchen or other areas that may provide them access to weapons.

4.7.2.2. Separating normally causes a distraction to the disputants. If Security Forces

personnel use a calm, firm and assured tone of voice, it may further distract the disputants

34 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

and better control the situation. Once they are separated and order is restored, the parties

may be interviewed.

4.7.3. Disputes Involving Children. In disputes where one disputant is a child or young

adult, there may be a feeling in the youth of resentment against authority figures. The youth

may assume that Security Forces will automatically side with the parents. Therefore, when

answering such a disturbance call, an attitude of concern and understanding for the child’s

version of the argument is important. The youth’s feelings, problems and thoughts should be

listened to and evaluated as carefully as those of the parents or other disputants. However,

take care not to interfere with parental rights regarding the children. If other children are

present, but not involved in the dispute, ask parents to remove them from the room.

4.8. Conducting the Interview.

4.8.1. The purpose of the interview is to:

4.8.1.1. Assess the immediate danger to family members and need for medical assistance

or protective custody;

4.8.1.2. Determine whether suspected abuse or neglect is occurring or has occurred;

4.8.1.3. Determine the appropriate response to the situation;

4.8.1.4. Identify the perpetrator if possible;

4.8.1.5. Protect the legal rights of suspects;

4.8.1.6. Identify victims and give them proper assistance.

4.8.2. Gathering Information. Separate personnel and conduct interviews. Each person

should be interviewed. If personnel being interviewed could be a suspect/subject, ensure you

read them their rights IAW Article 31 of the UCMJ for military members or the 5th

Amendment U.S. Constitution for civilians.

4.9. Security Forces Actions. Three actions may occur in domestic violence situations;

referral, temporary separation or apprehension. After order has been restored, one or more of

these actions is possible.

4.9.1. Referral. If the BDOC/ECC controller has not already done so, request notification of

the unit commander or first sergeant, AFOSI, and the family advocacy officer of the

situation, as appropriate.

4.9.2. Temporary Separation. Family members may be separated to ensure safety and

protection. For example, the first sergeant may suggest that a spouse temporarily leave the

quarters or a commander may order the separation by temporarily having the military

member stay in a dormitory or military lodging facility. If a child’s safety is threatened, take

appropriate action under state law, including contacting child protective services. AFOSI has

primary jurisdiction for serious child abuse or neglect involving infliction of serious bodily

harm. The Security Forces role in this instance is to provide whatever support is requested

by the hospital or commander.

4.9.3. Apprehension. Apprehension may be the most prudent course of action when:

4.9.3.1. There is a formal complaint;

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 35

4.9.3.2. Probable cause exists that a violation of the UCMJ or local law has occurred;

4.9.3.3. The family member refuses to cooperate with Security Forces, unit commander

or first sergeant or family advocacy officials.

4.9.3.4. If it becomes necessary to control someone who is not subject to the Uniform

Code of Military Justice they will be detained, rather than apprehended, until such time as

they can be handed over to local authorities.

4.9.4. Victim and Witness Assistance Program. Security Forces personnel investigating

crimes must ensure all victims and witnesses are provided a DD Form 2701, Initial

Information for Victims and Witnesses of Crime, to ensure victims/witnesses are aware of

their rights under the Victim and Witness Assistance Program. For more information, refer

to AFI 51-201, Administration of Military Justice and Department of Defense Instruction

(DoDI) 1030.02., Victim and Witness Assistance Procedures. NOTE: If suspected of

committing an offense, a party will require rights advisement, pursuant to Article 31 of the

UCMJ for military members or the 5th Amendment U.S. Constitution for civilians.

36 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

Chapter 5

CRISIS NEGOTIATION

5.1. Overview. A crisis overrides an individual’s normal psychological and biological coping

mechanisms. During crisis situations, people spontaneously turn to others for comfort, support,

understanding, and protection. A crisis does have the potential to disconnect individuals from

needed sources of support. The absence of support during a crisis represents the loss of the

primary human coping resource and often results in a subject’s illogical and highly emotional

behavior. All of these factors make crisis situations difficult to control and negotiators must first

have a fundamental understanding of crisis negotiation in order to reach successful resolution of

situations.

5.2. Types of Behavior. When responding to a crisis involving a hostage taker or barricaded

subject, negotiators normally experience one of two categories of behavior; instrumental or

expressive. Although these two distinctly different categories of behavior represent opposite

ends of a continuum, subjects may often exhibit elements of both types during an incident.

5.2.1. Instrumental Behavior. Instrumental behavior is characterized by substantive

demands and clearly recognizable objectives that, if attained, will benefit the subject.

5.2.2. Expressive Behavior. Expressive behavior is designed to communicate the subject’s

frustration, outrage, passion, despair, anger, or other feelings.

5.3. Types of Hostage Takers. Hostage takers usually fall into one of four major types;

mentally disturbed persons, criminals trapped during the commission of a crime, prisoners who

are revolting, or political terrorists attempting to produce social change through threat of or use

of violence.

5.3.1. Hostage taking, by the very nature of the act, forces the hostage taker into stereotyped

responses. The hostage becomes a pawn, caught between the hostage taker and authorities.

The hostage takers become violent, strive to control the situation and move the event toward

completion of their objective.

5.3.2. The hostage, by conduct, can enhance or diminish their chance of survival. The more

the hostage understands about their hostage taker, the better they will be able to predict the

hostage takers behavior and feel some degree of control. This can assist by diminishing the

hostages fear.

5.4. Reasoning Behind the Taking of Hostages. Hostage taking represents a unique bargain

struck over the value of human life. Whatever the immediate motivation, the basic purpose

remains the same. Hostage taking is a way of setting up a bargaining position to achieve an

otherwise unattainable objective.

5.4.1. A victim may be chosen because the hostage taker believes they can receive a large

ransom for the victim’s return or because they’re well-known, hold a significant job position,

or simply because of their affiliation with a country, state, or organization. A victim may

simply be hated by their captors and the captor may blame the victim directly for any

personal grievances.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 37

5.4.2. Most of the time, the hostage is just an innocent victim of circumstance who happened

to be in the wrong place at the wrong time.

5.5. Types of Situations. All crisis situations, regardless of motive, mental health, or criminal

history of the subject are either hostage or non-hostage situations. Understanding the difference

between the two is paramount to successful resolution of the situation.

5.5.1. Hostage Situations. Subjects demonstrate goal-oriented and purposeful behavior.

They hold another person or persons for the purpose of forcing fulfillment of substantive

demands upon a third party, usually law enforcement. Substantive demands include things

they cannot obtain for themselves, such as money, escape, and political or social change.

They use hostages as leverage to fulfill their demands.

5.5.2. Non-Hostage Situations. Subjects often act in an emotional, senseless, and self-

destructive manner and have no clear goals. Unable to control their emotions in response to

life’s many stressors, they are motivated by anger, rage, frustration, hurt, confusion, or

depression, and often exhibit purposeless, self-defeating behavior. They have no substantive

or escape demands or totally unrealistic demands that they have no reasonable expectation of

fulfilling. Disgruntled employees, jilted lovers, rejected spouses, aggrieved individuals,

idealistic fanatics, individuals with mental illness, and others with unfulfilled aspirations who

feel they have been wronged by others or events fall into this broad category. Non-Hostage

situations often result in Domestic Violence, Workplace Violence, or an Active Shooter

scenario.

5.6. High Risk Indicators. Law enforcement authorities should be familiar with a number of

high risk factors involving background characteristics and behavioral patterns of the subject so

appropriate actions may be taken. Law enforcement authorities should be especially wary of a

situation that involves a subject who has a history of similar incidents, or who has had previous

problems with the hostage(s). Particular attention should be given to whether there have been

previous restraining orders issued against the subject for incidents of child or spouse abuse.

5.6.1. Background Characteristics. Subjects with certain background characteristics have a

greater potential for being involved in a volatile incident.

5.6.1.1. Multiple Stressors

5.6.1.2. Home Environment Stresses Male Dominance

5.6.1.3. Similar Incidents and Problems with Victims

5.6.1.4. Lacks Family or Social Support System

5.6.2. Behavioral Patterns. Behavioral patterns may also give insight into the type of subject

involved in the situation. Types of behavior negotiators may encounter include:

5.6.2.1. Forcing Confrontation with Police

5.6.2.2. Threatening or Injuring Victim(s)

5.6.2.3. Verbalizing Intent to Commit Suicide

5.7. Philosophy of Crisis Negotiation. The philosophy of crisis negotiations includes self-

control, approach, empathy, and process. These four separate but interrelated steps have a

bearing on the outcome of successful negotiations.

38 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

5.7.1. Self-Control. The only aspect of a crisis situation we have absolute control of is our

own emotions. When confronted with a difficult subject, the first step is not to control the

subject’s behavior, but to control your own behavior.

5.7.2. Approach. Don’t confuse getting even with getting what you want. Work toward de-

escalation of the situation in order to lower tensions. Focus on the process of satisfying each

side’s needs, rather than the outcome, victory. The subject may be frustrated, angry, afraid,

confused, depressed, or demonstrating other emotions. Listening is most effective

concession you can make when negotiating. Show respect for the subject regardless of the

circumstances or situation.

5.7.3. Empathy. Empathy absorbs tension, and should be used to see through the eyes of the

subject. A calm controlled demeanor is more effective than a brilliant argument. Being

“right” is not the issue. The issue is making the attempt to correctly understand what the

subject is saying.

5.7.4. Actively listen to the subject and acknowledge their point of view. This does not

equate to agreeing with the subject. Attempt to find common ground and agree with the

subject whenever you can without conceding. Don’t argue with subjects. Attempt to create

a positive atmosphere. Remember that people don’t always say what they mean. Attempt to

identify their true meaning, and be aware the true meaning is often an unsatisfied need.

NOTE: Negotiators are not in the business of meeting demands, but rather they attempt to

satisfy each side’s needs.

5.8. Response. There are generally four choices for commanders at a hostage situation. The

first traditional confrontational response is to amass patrolmen and massive firepower and

assault. The second is to use selective sniper fire. The third is to use chemical agents. The

fourth is to contain the area and negotiate with a specially trained negotiator. The first three will

almost always result in injury.

5.8.1. If possible, progress from a lesser response option to increased force options as the

situation unfolds. If the threat to the victims is believed low, then high-risk tactical actions

are inadvisable and difficult to defend. If the threat to the victims is higher, then risk-

effective tactical action is easier to defend and should at least be considered. Finally, if the

threat to the victims is very high, then high-risk tactical action may be essential. It is

extremely difficult to return to negotiating after an assault takes place.

5.8.2. The linear approach, parallel application, and law enforcement attitudes play a

significant part in response options.

5.8.2.1. Linear Approach. The linear approach is a two-step approach. First, the

negotiator tries to talk the subject out. Second, assault teams use force to take the subject

out (if necessary). NOTE: Linear application of force almost always results in strong

resistance from the subject(s), and should only be used as a last resort.

5.8.2.2. Parallel Application. Parallel application is the use of negotiations and tactics in

synchronization. Tactics don’t simply follow failed negotiations; rather the proper use of

tactics encourages negotiations. Weigh the benefits of reaching agreement through

negotiations with the risk of disagreement potentially leading to tactical intervention. An

appropriate limited display of tactical power is not the same as an overtly threatening use

of that power. The goal remains to bring subjects to the table, not to their knees.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 39

5.8.2.3. Law Enforcement Attitudes. Law enforcement authorities should be aware of

how their attitudes can affect the outcome of crisis situations.

5.8.2.3.1. Emotion. Keep your emotions under control regardless of what transpires

during the situation.

5.8.2.3.2. Haste. Don’t make snap decisions or attempt to push the subject to agree

to resolution.

5.8.2.3.3. Rigidity. Refusing to listen and negotiate does not aid in peaceful

resolution.

5.8.2.3.4. Creativity. Creativity is a strength. Use things subjects say to create

opportunities to seek peaceful resolution.

5.8.2.3.5. Flexibility. Flexibility is a strength. Being flexible and negotiating with

the subject establishes rapport and trust, and aids in peaceful resolution.

5.8.2.3.6. Patience. Do not develop preconceived ideas that you must do something

to resolve the situation. Showing patience and having restraint is not a sign of

weakness, and can contribute to peaceful resolution of situations.

5.9. Operations . The Operations Section Chief (OSC) must understand that the choices they

make during any situation not only involve them, but also the Incident Commander (IC), and

may be scrutinized both in a court of law and the court of public opinion. When making

decisions, the OpsSC should use a three-part action criterion: 1) is the contemplated action

necessary 2), is the contemplated action risk-effective, and 3) is the contemplated action

acceptable in a particular situation? OpsSCs should be prepared to answer why they took action

when they did and whether they fully explored and attempted to implement less risky alternatives

first. OpsSCs should coordinate with SJA, as needed.

5.9.1. Tactical Intervention. Loss of life is most likely to occur during tactical intervention.

Therefore, before initiating any tactical action, the OpsSC must carefully consider the current

threat to hostages/victims and risks tactical officers face.

5.9.2. Unified Strategy. The OpsSC must bring all key component leaders together and

ensure all parties understand the type of situation and its accompanying dynamics. All

component leaders must understand and support the strategy once it is developed.

5.9.3. OpsSC or IC as Negotiators. OpsSCs and ICs must not act as negotiators during a

situation. They do not have the time to dedicate to negotiations. Their focus must remain on

the operation in its totality and must not be diverted.

5.10. Use of Tactical Teams. The use of deadly force is the last option. When dealing with

“expressive” subjects, teams should keep a low profile to create a non-threatening environment

to assist in returning the subject to a normal functioning level. When dealing with

“instrumental” subjects, teams should make subjects aware of their presence in an effort to

promote agreement.

5.11. Negotiation Teams. Crisis negotiation is one of law enforcement’s most effective tools

and constitutes a highly refined law enforcement discipline. The successful resolution of

countless hostages, barricaded subjects, attempted suicides, and kidnapping cases throughout the

world repeatedly has demonstrated the value of negotiating. These successful cases, as well as

40 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

those that resulted in the loss of fellow patrolmen and hostages, have shown the need for careful

deliberation in the selection and training of crisis negotiation team members. From a safety and

liability aspect, law enforcement authorities must understand how to select, organize, and train

crisis negotiation teams.

5.12. Selecting Team Members. Certain skills and expertise make more successful negotiators

and result in more peaceful resolutions in shorter time frames.

5.12.1. Negotiation Team Leaders. Negotiation team leaders must be experienced,

knowledgeable, and articulate supervisors or senior personnel. They should be well trained

in the most current procedures for establishing and maintaining negotiations. They must

understand how to devise a flexible negotiation strategy based on the incident and be capable

of effectively articulating this strategy to the OpsSC and IC. In addition to overseeing actual

negotiations, team leaders are responsible for training team members and recruiting new

team members. Team leaders serve as principal advisors to the OpsSC.

5.12.2. Negotiators. Negotiators should be volunteers and in excellent mental and physical

health. The best criminal investigators tend to be the best crisis negotiators. They have had

contact with a wide variety of people in diverse circumstances. Negotiators must have the

time to participate in training and be available for call-outs regardless of other duties and

responsibilities. Following are desirable personality traits for negotiators:

5.12.2.1. Possess emotional maturity.

5.12.2.2. Good listeners and possess excellent interviewing skills.

5.12.2.3. A person who can easily establish credibility with others.

5.12.2.4. Have the ability to use logical arguments to convince others that their

viewpoint is rational and reasonable.

5.12.2.5. Able to communicate with persons from all socioeconomic classes.

5.12.2.6. Have practical intelligence, common sense, and are streetwise.

5.12.2.7. Have the ability to cope with uncertainty and be willing to accept responsibility

with no authority.

5.12.2.8. Have total commitment to their job (negotiations).

5.12.2.9. Understand they will have to assist in planning an assault to rescue hostages if

negotiations are not going well and lives are in imminent danger.

5.12.3. Negotiation Team Composition. A minimum of three negotiators is recommended

for each incident. One team member acts as primary negotiator and engages the subject in

dialogue. The second team member acts as a coach, or secondary negotiator, and assists the

primary negotiator with choosing a specific dialogue and communication techniques. The

third team member acts as team leader and assists in formulating the overall negotiation

strategy, and interfaces with other response elements as they arrive. It is recommended that

units have more than three negotiators available for incidents. If units are unable to source

negotiators from within, it is recommended they establish an MOU/MOA with outside

agencies.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 41

5.12.4. Negotiation Team Duties. Experience has revealed that a properly staffed

negotiation team can more thoroughly assess an incident and generate better strategies.

Teams must efficiently perform vital functions such as coaching the primary negotiator

talking with the subject, maintaining situation boards, keeping a log, and communicating

with the on-scene commander, command post and tactical team. The following serves to

identify recommended positions, locations, and duties of a negotiation team during a

significant or protracted event. This is only a guide and may be tailored to meet the needs of

a specific situation. NOTE: Only trained and certified negotiators should occupy the

positions of team leader, primary negotiator, and coach. Other positions may be filled with

investigators, other law enforcement personnel, or support personnel.

5.12.4.1. Negotiation Team Leader (Coordinator)

5.12.4.2. Assistant Negotiation Team Leader

5.12.4.3. Command Post Liaison

5.12.4.4. Primary Negotiator

5.12.4.5. Coach (Secondary Negotiator)

5.12.4.6. Recorder

5.12.4.7. Intelligence

5.12.4.8. Behavioral Profiler

5.12.4.9. Tactical Liaison

5.13. Training Negotiation Teams. Once a team is selected and assigned responsibilities, you

must determine the type of training team members need. Training should consist of basic skills

training, advanced and special skills training, team leader training, and regular team and

individual skills maintenance training. NOTE: The FBI conducts courses at many locations

throughout the United States at no cost to participating agencies. Training coordinators in FBI

field offices arrange these courses by request. In addition, the Federal Law Enforcement

Training Center in Glynco, Georgia, also offers training courses.

5.13.1. Basic Skills Training. All negotiators should attend a 40-hour basic crisis

negotiation course. The basic course should include extensive training in crisis intervention,

suicide assessment and intervention, and knowledge of how to work the various positions on

the team, and how to interact with tactical teams.

5.13.2. Advanced and Special Skills Training. Experienced team members can use

advanced and specialized training to build on basic crisis intervention techniques. This

training should include handling manipulative subjects, reframing techniques to put a

different spin on negative thoughts and perceptions of hostile subjects, and use of guided

discovery-questioning techniques to augment basic problem solving techniques.

5.13.3. Team Leader Training. Team leader training should include further training and

practice in risk assessment, legal considerations, procedures for handling protracted

incidents, effects of alcohol and other drugs, kidnap/extortion negotiations, role of the media,

and use of third-party intermediaries and mental health professionals.

42 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

5.13.4. Regular Team and Individual Skills Maintenance Training. Negotiation team

members should periodically conduct in-house refresher training of the items covered in

basic skills, advanced and special skills, and team leader training that they have been

formally trained on.

5.14. Resiliency. The TSR team will provide TSR services to enhance resilience to potentially

traumatic events. Following any negotiation, it is essential that all team members have access to

a TSR Team.

5.15. First Responder Negotiations. The first 15 to 45 minutes are the most dangerous time in

a crisis situation excluding a rescue attempt. Therefore, the most crucial moments of the

situation are in the hands of the first Security Forces member on-scene. Although the first

Security Forces member on-scene should not begin negotiations, it may be appropriate to initiate

contact with the subject in order to gain intelligence. Further, subjects may initiate an on-going

dialogue with the first Security Forces member on-scene on their own.

5.15.1. Stabilize and Contain the Situation. In the first few minutes of a crisis situation, the

subject’s anxiety may overpower rational thought processes. The subject is now more likely

to act on impulse or out of desperation. Your first action should be to ensure your own safety

and approach the area cautiously. Then you should attempt to isolate, contain, and evaluate

the situation, provide an initial report, and request assistance.

5.15.1.1. Reduce Likelihood of Further Violence. Your next actions should be to reduce

the likelihood of further violence. Begin to clear the area of innocent bystanders if you

can do so safely without exposing yourself to other dangers. The best alternative is to

evacuate the area along routes out of sight of the subject. This should be accomplished

nonverbally with hand and arm signals if at all possible. If it is not possible to evacuate

pedestrians out of sight of the subject, an alternative may be to tell the subject clearly

what you want to do and get the subject to agree to allow the pedestrians to leave. Every

effort should be made to evacuate pedestrians to a single location to assist in accounting

for all pedestrians and have them available for witness interviews.

5.15.1.2. Calm the Subject. The first few statements between you and the subject may

set the tone for the next few hours. Start with giving the subject your name and let them

know that you are a law enforcement officer. Reassure the subject that things are under

control outside and that you don’t want anyone including the subject to be injured.

5.15.1.3. Avoid Eliciting Demands. Seemingly innocent questions may give the subject

an opportunity to make demands on you. For example, a question such as, “What’s going

on in there?” may result in an answer like, “I have this clerk in here with a gun to her

head and I’ll shoot her if you’re not gone in five minutes.” If you become engaged in an

ongoing conversation with subjects, you should make every effort to avoid bargaining

and making concessions. Your best option is to continue to calm and reassure the subject

that no one is going to attempt to harm him/her and that you don’t want the subject or any

hostages harmed. If the subject should make demands, let the subject know that you

can’t make that decision but that law enforcement authorities who can assist the subject

are on their way to the scene. If the two of you establish some sort of rapport, the

negotiation team may have you continue to act as the primary negotiator with their

support and guidance.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 43

5.15.1.4. Gather Information. Listening carefully to the subject may allow you to

determine the sex, race, ethnic group, age range of the subject, or other pertinent

information. Be prepared to pass any information to negotiators upon their arrival at the

scene.

5.16. Guidelines. Once you have isolated and contained the situation as best you can, use the

following guidelines when dealing with subjects pending the arrival of the hostage negotiation

team.

5.16.1. Keep a Log. The negotiation and tactical teams will be looking to you for

information upon their arrival at the scene. Accordingly, keep a log of everything that

transpires even if you have little or no contact with the subject. Record all communications

with the subject along with your initial observations and impressions. Note exact words of

the subject and your exact response if possible.

5.16.2. Allow the Subject to Speak. Be a good listener and let the subject talk. Listening to

the subject may provide some hint or indication of their willingness to surrender. Avoid

dominating the conversation.

5.16.3. Avoid Giving Orders.

5.16.4. Play Down Past Events.

5.16.5. Don’t Offer the Subject Anything.

5.16.6. Avoid Directing Attention to the Victims.

5.16.7. Be as Honest as Possible. The majority of situations are resolved through straight-

forward honest dialogue. The first task is to establish rapport and trust.

5.16.8. If Unsure What’s Intended, Ask. Don’t try to interpret an unclear statement. Simply

ask what is meant if unsure.

5.16.9. Never Dismiss Any Request as Trivial.

5.16.10. Never Say “No.”

5.16.11. Soften Demands.

5.16.12. Never Set Deadlines. Never set a deadline on yourself and try not to accept a

deadline from a subject. Never tell a subject something will be done within a specific time.

For example, “I’ll have you some coffee in 10 minutes.”

5.16.13. Don’t Make Alternate Suggestions.

5.16.14. Don’t Introduce Outsiders. Never allow a non-law enforcement person (wife,

minister, friend, etc.) to enter into an ongoing hostage situation unless the OpsSC and IC

approve it.

5.16.15. Don’t Allow Exchanges. Do not allow any exchange of hostages, and especially

don’t exchange yourself for a hostage.

5.16.16. Ask About Suicide. Ask subjects directly if they are considering suicide if you

sense they may be considering it based on their comments. If a subject isn’t considering

suicide, you won’t push them over the edge or put the idea in their head. If a subject is

considering suicide, they may realize you can understand how they feel. This could be the

44 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

first step in establishing rapport and trust eventually resulting in subjects abandoning

weapons and surrendering.

5.16.17. Never Negotiate Face-to-Face. Negotiating face-to-face is unnecessarily risking

your own life. Further, if a subject threatens your life, other law enforcement officers may

have to expose themselves in order to assist you. Finally, if the subject is considering

suicide, they may use an assault on you to provoke other patrolmen into taking their life

(suicide by cop).

5.16.18. Plan Surrenders. The subject may decide to surrender prior to the arrival of the

negotiation team and surrender plans are critical since you have an armed subject preparing

to move from a barricaded position to your control. You must decide whether the hostages

or the subject exit first and there are advantages and disadvantages to both. In any case, you

should avoid taking a weapon directly from a subject. Instead, arrange for the subject to

leave any weapons in a safe place prior to taking control of them.

5.17. Suicide Intervention. One of the most pressing considerations in dealing with a

barricaded subject, whether hostages are present or not, is the possibility the subject might

commit suicide. Unfortunately, many incidents conclude with the subject committing suicide

even when a successful resolution seems near. Negotiators or first responders may be called on

to attempt resolution of these situations, and suicide intervention can be more difficult than other

situations.

5.17.1. Why Suicide. Subjects may choose suicide or exhibit suicidal behavior because of

hostility toward others, traumatic life events, lack of social support, alcohol abuse,

depression, or a feeling of hopelessness.

5.17.2. Crisis State. A subject who is suicidal is in a state of crisis. An event has occurred

and the subject’s normal coping mechanisms have failed to resolve the situation. The subject

is behaving at an intense emotional level rather than a rational level in response to the

situation.

5.17.3. Understanding Suicide. It is crucial that negotiators understand what suicide is, and

are aware of myths and assumptions prior to attempting to resolve a suicidal situation.

Negotiators should be familiar with AFI 44-154, Suicide and Violence Prevention Education

and Training, and AFPAM 44-160, The Air Force Suicide Prevention Program.

5.17.4. Suicide Methods. Suicidal subjects often have a detailed plan as to how they intend

to commit suicide. Determining the subject’s intended method may enable negotiators to

disrupt the plan and prevent the suicide. Negotiators must remain alert to any indications of

the subject’s preferred method of suicide. In this regard, negotiators need to determine

whether the subject possesses the means of suicide such as firearms, explosive devices,

medications, or cutting instruments, or if they intend to be killed by engaging law

enforcement with lethal force, forcing the patrolmen to use deadly force against them to kill

them (suicide by cop).

5.17.4.1. Negotiators and responding patrols should be aware that suicidal individuals

may seek to destroy themselves because of depression, desperation, or a need to punish

society for the wrongs they feel it has committed against them.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 45

5.17.4.2. Subjects may not view death at their own hands as a socially acceptable method

of death because of their individual social standards. Therefore, they may confront law

enforcement authorities in a manner they know will require the use of deadly force. They

believe this will allow society to perceive them as a victim of others instead of a victim of

themselves.

5.17.4.3. Although the following information is not all inclusive, the presence of one or

more of these indicators may help identify a subject who is considering suicide by cop.

Where a combination of these indicators are present, law enforcement authorities should

consider them as evidence of a possible suicide by cop scenario especially if the subject

confronts them in a manner that could bring about his own death.

5.17.4.3.1. Subject has initiated a hostage or barricade situation and they refuse to

negotiate with law enforcement authorities.

5.17.4.3.2. Subject has just killed a significant other in their life, especially if the

victim was a child or the subject’s mother.

5.17.4.3.3. Subject demands that law enforcement authorities kill them.

5.17.4.3.4. Subject sets a deadline for law enforcement authorities to kill them.

5.17.4.3.5. Subject has recently learned they have a life threatening illness or disease.

5.17.4.3.6. Subject indicates an elaborate plan for their death, one that has taken both

thought and preparation.

5.17.4.3.7. Subject says they will only surrender in person to the officer in charge,

e.g., the police chief or an officer with substantial rank and influence.

5.17.4.3.8. Subject indicates they want to go out “in a big way.”

5.17.4.3.9. Subject presents no demands that include escape or freedom.

5.17.4.3.10. Subject provides law enforcement authorities with a verbal will.

5.17.4.3.11. Subject appears to be looking for a manly or macho way to die.

5.17.4.3.12. Subject has recently given away money or personal possessions.

5.17.4.3.13. Subject has a criminal record indicating past assaults.

5.17.4.3.14. Subject has recently experienced one or more traumatic events in their

life that affects their family or career.

5.17.4.3.15. Subject expresses feelings of hopelessness and helplessness.

5.17.5. Negotiation Strategy. The purpose of intervention is to defuse intense emotions and

return the subject to a normal functioning level. To accomplish this, negotiators must ask

about suicide, buy time, establish rapport, communicate empathy, and gain information.

Ultimately, your goal is to influence the subjects thinking in an attempt to return the subject

to a normal functioning level where they will decide not to commit suicide. Negotiators

should offer helpful suggestions and try to point out possible solutions to the subject’s

problems. However, negotiators should refrain from offering guaranteed solutions because

these solutions have the potential to fail. Always try to help subjects face reality through

discussions of the possible impact on the subject’s family and friends.

46 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

5.17.6. Impact on Negotiators. The impact on negotiators of losing a suicidal subject can be

severe. Negotiators consider the death of a hostage as being the direct responsibility of the

subject, whereas, the loss of a suicidal subject may cause the negotiator to blame themselves.

Negotiators often ask themselves what they did wrong or what else they could have said or

done to prevent the subject from committing suicide. Supervisors should assess the

negotiator to see if they need to seek attention from Mental Health.

5.18. Training. Units must incorporate first responder training as described in the Air Force

Emergency Response Operation Command and Control course into their annual training plans.

Units and flights need to coordinate training with the designated Incident Commander on the

installation, usually the Fire Department. In most crisis situations, subjects either verbalize or

otherwise demonstrate their concerns regarding possible armed intervention. First responder

training should concentrate on improving patrolmen’s verbal and communication skills. The

way a first responder verbally conducts themselves has a significant bearing on their ability to

deal effectively and successfully with a wide variety of situations to include crisis situations.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 47

Chapter 6

EMERGENCY SERVICES TEAM (EST)

6.1. Concept. The basic premise of an EST is to have a tactical team of highly motivated and

well conditioned SF members that are specially trained and equipped to function in a high-risk

environment as a more effective and safer employment option than a larger group of SF without

the specialized training. The formation/establishment of an EST is optional; however, each AF

installation must have some type of emergency tactical response capability.

6.1.1. MOA for Tactical Support. Installation Commanders may utilize civilian law

enforcement support in lieu of establishing an EST, with supporting Crisis Negotiations

Team (CNT), on their installation. This will be done through an MOA. A sample MOA can

be found in Attachment 4 of this instruction. All MOAs will include the following

information as conditions that must be agreed upon by both parties:

6.1.1.1. Command and Control. The Installation Commander or DFC, if delegated, has

tactical control (TACON) of the civilian agency team members when employed on the

installation. The civilian agencies’ leadership will maintain operational control (OPCON) of

their team members and act as the liaison officer to the IC regarding tactical employment of

his/her personnel. The Installation Commander will have final authority for any changes in

tactical employment throughout the operation as well as when/if the EST/tactical team

executes high risk operations.

6.1.1.2. Authority/Jurisdiction. Prior to establishing an MOA with local law

enforcement agencies, consultation with the installation SJA is necessary to determine if

the civilian agency can operate on the installation. Consultation is also required with the

SJA when the installation is located outside of the US to determine, among other matters,

if the agreement is considered an international agreement within the meaning of AFI 51-

701, Negotiating, Concluding, Reporting, and Maintaining International Agreements.”

Additionally, the MOA must be routed through the appropriate channels (e.g. Wing

Plans, Integrated Defense Council, Installation Antiterrorism Working Group, etc. as

determined by the Installation Commander) before entering into the agreement.

6.1.1.3. Certification. The local law enforcement agency must ensure their SRT or

equivalent designated tactical team meets state certification and training standards prior

to the DFC allowing employment on USAF installations. If there is no official state

certification, the agency must meet the standards established by the National Tactical

Officers Association (NTOA) in SWAT Standards for Law Enforcement Agencies, Sep

2008, posted on their website: https://www.ntoa.org/massemail/swatstandards.pdf.

There are separate standards for permanent tactical teams and part-time tactical teams.

NOTE: NTOA standards are not a certification, rather a training standard the agency

must meet.

6.1.1.4. Training. MOAs with local law enforcement agencies must include guidance on

their participation with mandatory recurring combined training on the installation.

Training will take place with the local law enforcement agencies, the assigned SF unit,

applicable FES personnel, and any certified ICs. At a minimum this training must occur

semi-annually, not to exceed 180 days, with or without the participation of the local law

48 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

enforcement agencies. Additionally, a combined exercise must be conducted annually

IAW AFI-10-2501, and will not exceed 365 days. This exercise will include, SF

personnel, FES personnel, certified IC personnel, and if possible the local law

enforcement agencies with whom MOA’s have been signed. Exercises will be evaluated

by the Wing Exercise Evaluation Team (EET). A senior representative from the local

law enforcement agency will be invited to be part of the evaluation team. Documentation

of all training and exercises will be maintained by SFMQ and the EST Officer-in-Charge

(OIC) or Noncommissioned Officer-in-charge (NCOIC). NOTE: If the Wing EET does

not possess a SF expert, SFMQ personnel should augment in the evaluation of the

exercise.

6.1.2. The DFC is responsible for organizing, training and equipping the EST to meet

mission objectives. A trained and certified IC will assume the role as the IC and the DFC or

senior SF representative will assume the role of Operations Section Chief for EST

employment operations.

6.2. Objective. The AF’s primary objective in dealing with high-risk incidents is to prevent or

minimize the loss of life and resources by containment, negotiation and yielding to other federal

lead agencies. Consistent with the lead agency concept, during high-risk situation the USAF can

yield to the FBI or FAA, as required. When a designated lead agency assumes control of a high-

risk situation on an Air Force installation, the Installation Commander must be prepared to

provide EST support if requested, either by organic resources or through an MOA with another

civilian police agency.

6.2.1. EST provides the Installation Commander with a viable option to restore good order

and discipline during high-risk incidents. Effective employment of EST can result in

achieving the desired incident outcome and mitigate potential losses due to hostile forces or

other criminal adversaries. EST’s primary goal is the preservation of life and keeping USAF

assets and resources out of the control of criminal and terrorist “elements”.

6.3. Capability. Each installation must plan and exercise capabilities to respond to and resolve

a variety of high-risk incidents including, but not limited to: hostage incidents, sniper attacks,

DV protection support, aircraft hijacking, drug investigation/“buy-bust” apprehension support,

acts of terrorism and barricaded suspect incidents. The EST concept is designed to provide

support via pre-selected and highly trained personnel ready to respond as an effective team to

these high-risk incidents in the most effective way possible. Installation ESTs will alleviate

command and control problems that may be encountered when using local law enforcement

agencies as the high-risk incident response force. Establishing organic assets or an MOA

ensures USAF installations will not be unprepared to resolve high-risk incidents by relying on

the assumption the FBI or FAA will respond in a timely manner or be available to respond to a

given high-risk incident. EST concept success is predicated on the voluntary participation of

highly motivated, well trained and properly equipped personnel.

6.4. Organization. The number of personnel assigned to an EST is determined by: geographic

location of the installation, host wing mission, size of the SF unit, local criminal and terrorist

threat, wing FPCON requirements and other localized antiterrorism and force protection

requirements. Assigned primary and alternate personnel should equal the number necessary to

ensure 24-hour recall/response capability and will be determined by the DFC.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 49

6.4.1. Team composition should entail the following critical positions: OIC/NCOIC, Trainer,

Entry Team, Apprehension/Extraction Team and Marksman/Observer Team. The minimum

team requirement for building entry is eleven (11) personnel: six (6) to enter, four (4) to

secure the inner perimeter and an OIC/NCOIC working with the Operations Section Chief to

provide tactical advice. The DFC can augment minimum personnel requirements or establish

additional requirements based on the installation’s local criminal and terrorist threat

environment.

6.4.2. The EST is a police services activity that reports directly to the DFC. The DFC is

responsible for team training, coordination and advising the IC on EST employment. The

EST OIC/NCOIC is responsible for staffing, rehearsals/training and general leadership of the

EST. Additionally, he/she is responsible for maintenance of recall rosters, equipment

inventories, applicable quick reaction checklists and other documentation that may be

beneficial during response operations.

6.5. Employment. Employ the EST as required to resolve high-risk or potentially violent

incidents. The DFC or designated representative should consider the following:

6.5.1. Negotiations should be the first option for peaceful resolution of high-risk incidents.

The IC or Operations Section Chief will direct employment of the EST to secure the incident

in lieu of other alternatives (i.e. continued negotiation when it has proven ineffective), but the

DFC is ultimately responsible for executing the operation and must maintain functional

control of the EST.

6.5.2. EST should not be staged in open areas in conjunction with non-violent civil

disturbances, protest demonstrations and/or special events such as air shows and open house

events. Crowd control should be conducted by other SF members. The EST should be

staged well out of sight in a designated area during these events to respond if high-risk

incidents evolve.

6.6. Weapons. If using a military EST team, their authorized EST weapons include the

carbine/rifle, handgun/pistol, grenade launcher and the shotgun. Unapproved modifications are

not authorized. Reference AFMAN 31-222, Use of Force Manual, for authorized nonlethal

weapons/munitions.

6.6.1. EST members will carry a primary and secondary weapon. The pistol will normally

be the secondary weapon, but is not limited to this role.

6.6.1.1. The entry element should carry the carbine or rifle and be configured to

accommodate employment of nonlethal munitions.

6.6.2. EST designated marksman (DM)/observer teams should be armed with the rifle

(currently authorized SF carbine or rifle, e.g. M-4 or M16A2) equipped with an Advanced

Combat Optic Gunsight (ACOG) or an approved variable power scope. Individuals who

have completed the Advanced Designated Marksman (ADM) AFQC or the Sharpshooter

AFQC and whose qualification is current, may perform EST DM duties utilizing the

currently authorized AF Sharpshooter or ADM rifle if available. Units will not be authorized

these rifles for EST use alone. NOTE: Specific Sharpshooter, ADM and EST DM

qualification training is required to employ personnel in these roles. Refer to AFI 36-2226,

Combat Arms Program, for qualification training requirements. The EST DM will not

50 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

normally be employed at target distances beyond 200 meters, with the optimal range in urban

environments being 100 meters.

6.7. EST Training and Team Certification. National training standards required for

SWAT/EST personnel are published by the National Tactical Officer Association (NTOA).

These minimum standards must be completed successfully and documented on a localized AF

Form 1098, Special Task Certification and Recurring Training prior to the individual being

certified as an EST member. Regular sustainment training IAW NTOA guidelines as a Fulltime

or Collateral team member must be successfully completed to maintain certification. Failure to

sustain training will result in decertification. Remedial training must be conducted before the

member may be employed in a tactical environment. Formal EST training must be obtained

through either the United States Army SRT Phase I course or another training course that meets

the national training standards IAW NTOA guidelines. Qualified marksman/observer team

personnel should complete the SRT Phase II course or the CPEC in addition to Phase I. The US

Army operates the SRT courses at Fort Leonard Wood, MO, as well as, offers a Mobile Training

Team capability. More information on SRT is available on the US Army Military Police School

web site at: http://www.wood.army.mil/usamps/. NOTE: SRT Phase II, CPEC and ADM

graduates meet requirements for marksman/observer teams as well. The CPEC and ADM are

taught at the SF Regional Training Center at Fort Bliss, TX.

6.7.1. Tactics, Techniques and Procedures (TTPs). EST TTPs are consistent with the

consolidated DoD standards adopted by the US Army and the US Marine Corps military

police for their SRTs, which provide a tactical police/force protection capability for each

respective service. Technical guidance regarding EST TTPs is provided in Army Field

Manual (FM) 3-19.11, Special Reaction Teams, and will be used by the Air Force as the

tactical reference for EST employment for high risk situations. The minimum training

standards must be completed by at least one EST member, preferably the NCOIC, who will

then be certified to train the additional EST members. The ultimate goal, however, should be

for each EST member to attend the SRT course or equivalent.

6.7.2. Training. The goal in preparing teams is to provide a disciplined, professional

response force rather than an unorganized operation assembled only when high risk situations

occur. DFCs who establish an EST should seek initial training for all team members. The

preferred course is the US Army SRT either in residence or through a Mobile Training Team

(MTT). The two week SRT course (L5AZ3P071 0S2A, PDS Code 051) is held

approximately every month, but has a maximum of 30 students per class and only a small

percentage of those are allocated to the AF. SRT MTTs must be requested through the

parent MAJCOM/A7S to the Headquarters, Department of the Army, G3 DAMO-ODO

Provost Marshal. MTTs allow units to maintain team integrity and continuity and are much

more cost effective than sending team members through the resident courses piecemeal.

Every effort should be made to qualify EST members. Installation DFCs may seek initial

and continuing training through the local law enforcement, FBI training programs, or private

tactical schools as long as the basic standards in paragraph 6.1.1.3. are met.

6.7.2.1. All training must be documented in the individual’s Air Force Training Record

(AFTR) Section III. A copy of the documentation of training will be maintained by EST

OIC/NCOIC.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 51

6.7.3. Sustainment. Recurring training frequencies will be conducted IAW NTOA

guidelines dependent upon member participation (i.e., Fulltime or Collateral). The DFC is

responsible for team proficiency and sustainment training. The perishable nature of

individual and collective skills necessary to perform effectively in the high risk environment

requires allocation of optimum training time for EST members. Proficiency training must be

continual and include realistic scenarios. ESTs must incorporate and utilize Standard

Operating Procedures (SOP) battle drills and immediate action drills during training and

rehearsal. Heavy emphasis must be placed on physical conditioning and teamwork drills to

develop necessary skills and build individual and team confidence in stressful situations.

Training sessions must be structured around a triad of 60% tactics, 20% marksmanship, and

20% physical conditioning. Following an initial training program/course, each EST member

must meet continuation training standards established per applicable local Operating

Instructions (OIs). EST DM/observers must meet the qualification standards outlined in AFI

36-2226 and AFMAN 36-2227, Volume 1, Combat Arms Training Programs, Individual

Weapons. Units must develop local training programs for EST DM to augment qualification

training and are encouraged to conduct more frequent live-fire sustainment training. Refer to

AFCAT 21-209, Volume 1, Ground Munitions, Table 2.22, 2.37 and 2.38 for authorized

EST, sharpshooter and designated marksman training munitions support requirements.

6.7.4. Other Training Topics.

6.7.4.1. Integration of crisis negotiations, Emergency Medical Service (EMS), Explosive

Ordnance Disposal (EOD) and AFOSI/ Security Forces Investigations (S2I) capabilities

to include management, analysis and support for EST operations/response.

6.7.4.2. Designated marksman/observer observation and recording skills and command

and control mechanisms.

6.7.4.3. Performance oriented team leader/member skills.

6.7.4.4. Advanced physical fitness to include approved defensive tactics per AFMAN

31-222. At a minimum, all EST members must meet USAF fitness standards and

establishing a higher physical standard for team members is recommended.

6.7.4.5. Individual and small group training activities/exercises.

6.7.4.6. Reading building schematics. This will assist in the familiarization of local

systems used by CE and how to obtain a specific plan quickly.

6.7.4.7. Training should be realistic and based on local threats and conditions. Practical

training conducted to rehearse contingency plans will enhance EST effectiveness during

actual high risk situations.

6.8. EST Relationship with CNT. EST members do not participate in or influence

negotiations. They should, however, pass on-scene information to the CNT regarding the

evolving situation regardless of type. In turn, the CNT can provide information to the EST. If

the EST is ordered to assault, the CNT may provide assistance by indirectly distracting the

subject through continued contact. EST team leaders should attempt to employ AFOSI and S2I

to gather additional information on criminal elements during contingency responses. Close

coordination with these organizations is essential to effective EST employment across the

spectrum of force protection contingencies. Information sharing between EST and CNT should

52 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

be managed through the BDOC. If possible, the principal negotiator should not know when the

assault order has been given. Inadvertent disclosure could jeopardize the operation.

6.9. MWD Team Use. Employment of the MWD is most effective when searching for a

possible subject/suspect(s) within a facility or concealed in an outdoor environment. If MWDs

are used, the team must also be included in regular EST training. Immediately follow any MWD

entry with EST entry to conduct a search and secure the area. The MWD handler will control

and direct the tactical movement of the MWD and the EST leader will control and direct the

tactical movement of the EST.

6.10. Emergency Medical Readiness. Planning for any high-risk situation or tactical mission

should include first-aid and buddy care. Ideally, the team should include a member(s) dedicated

and trained as emergency medical technicians (EMTs). EST members should train for medical

contingencies on a regular basis. If the EST doesn’t have a dedicated EMT, training and exercise

scenarios should include EMS personnel, when possible. It is essential for installation

contingency planning to include careful coordination between installation EMS, CNT, FES,

EOD and SF to ensure participants understand the mission requirements of one another. This

will help clarify expectations of additional responding agencies.

6.11. Information. EST operations are dependent on the timely availability/delivery of reliable

information. Training and exercise scenarios should include the collection and use of operational

information. ESTs should seek assistance from S2I, AFOSI, and/or wing intelligence as needed

and authorized.

6.12. Interagency Cooperation. In addition to mandatory exercises and training events, ESTs

should meet and train with counterparts from other federal, state and local agencies (MOA with

FBI, FAA and local law enforcement) whenever possible. The shared experience of actual or

exercise response operations are mutually beneficial and may increase mission success.

6.13. Exercises. Rehearsing the EST in conjunction with supporting base agencies is essential.

This is best achieved through a robust base exercise and evaluation program.

6.13.1. Joint agency exercises test command and control arrangements outlined in MOAs

and operation plans. They also provide a means to assess the installation’s ability to provide

timely criminal intelligence, demonstrate team capabilities to the IC, build team confidence,

and inter/intra-agency teamwork while affording the opportunity to refine EST TTPs.

6.13.2. Scenarios should be consistent with the local threat and should include situations

dealing with workplace violence, hostage incidents, barricaded subjects, terrorist attacks,

hijackings, school violence and counter-sniper operations.

6.14. Reporting Requirements. Report all initial and updated information on Force

Protection/Suspicious Activity events to the Command Post. Command Post will ensure events

meeting OPREP-3 (Ref AFI 10-206, Operational Reporting) reporting channels are submitted as

required. The DFC will submit SF lessons learned reports within 60 days of an EST (or local

civilian SWAT) response through the AF Joint Lessons Learned Information System (AF JLLIS)

to the respective MAJCOM. The MAJCOM will in turn forward a copy of the report to HQ

AFSFC/SFOP within 90 days of the incident.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 53

Chapter 7

CIVIL DISTURBANCES

7.1. Introduction. Civil disturbances present unique challenges to the armed forces. The roles

and missions of the armed forces inherently make the DoD a likely target for civil disturbances

both at home and abroad. The disturbances may range from peaceful demonstrations and rallies

outside a main gate to full scale riots that include burning and looting government property

inside the perimeter fence (see Attachment 5). The information, technology and weapon systems

entrusted to our care require absolute protection. The challenge arises in dealing with civil

disturbance situations. Attempting to understand, predict and control crowd behavior is a highly

technical field that requires specialized training. Complicating this challenge is the fact that

most of the specialized training is not common to any of our everyday missions and is extremely

perishable. Army Field Manual (FM) 19-15, Civil Disturbances, can provide the reader with

additional information on the topic.

7.2. Definition. Civil disturbances arise from acts of civil disobedience. These acts occur most

often when participants in mass acts of civil disobedience become antagonistic towards authority

and authorities must struggle to take the initiative from an unruly crowd. In the extreme, civil

disturbances include acts of criminal terrorism. Civil disturbances, in any form, are prejudicial

to public law and order. The installation commander is responsible for maintaining law and

order on the military installation. Installation commanders respond to disturbances using

installation resources. Violence and disorder by any individual or group of individuals will not

be tolerated. Installation commanders must be prepared to counter a disorder if preventative

measures fail. This preparation should consist of the following elements:

7.2.1. Know the statutory and directive authority on which control actions rest.

7.2.2. Maintain accurate operational information.

7.2.3. Ensure all personnel assigned civil disturbance related tasks are adequately trained.

7.2.4. Ensure personnel are properly equipped to handle civil disturbances.

7.2.5. Develop plans that are flexible enough to ensure available manpower and equipment

is used to the best advantage when violence occurs.

7.3. Federal Intervention and Aid. The US Constitution and US Code (USC) empower the

President to direct federal intervention in civil disturbances as listed below. However, other than

in extreme emergency situations, only the President or SECDEF may authorize federal troops to

intervene. The installation SJA should always be consulted before using forces in any of these

capacities.

7.3.1. Respond to state requests for aid in restoring order.

7.3.2. Enforce the laws of the United States.

7.3.3. Protect the civil rights of citizens.

7.3.4. Protect federal property and functions.

54 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

7.4. Roles of the States. Under the Constitution, each state is responsible for protecting life and

property within its boundaries. State and local governments use their civil forces to maintain law

and order and quell civil disturbances.

7.5. Presidential Powers. The Constitution and federal statutes authorize the President to direct

the use of armed federal troops within the 50 states, District of Columbia, Puerto Rico and US

possessions and territories and their political subdivisions. The President also has the power to

federalize the National Guard of any state to suppress rebellion and enforce laws.

7.5.1. Law. The President can also employ federal troops to ensure the execution of US law

when a state opposes or obstructs US law or impedes the course of justice under those laws.

The President can employ armed federal troops to suppress insurrection, domestic violence,

unlawful assemblies and conspiracy. The key is, if such acts deprive the people of their

constitutional rights or privileges and a state’s civil authorities cannot or will not provide

adequate protection, then employment of federal troops is authorized.

7.5.2. Property. The President may also choose to use armed federal troops to protect

federal property and functions when the need for protection exists and local civil authorities

cannot or will not give adequate protection. The US has a right to protect all federal property

and functions regardless of their location.

7.5.3. Limits. While federal law authorizes domestic use of military force to suppress

violence or insurrection, the Constitution and federal law provide certain restrictions. Under

the Posse Comitatus Act neither active nor reserve personnel (USC, Title 10) may execute

the law in place of duly appointed law enforcement officials without specific presidential or

congressional approval and direction. The Posse Comitatus Act does not apply to the

National Guard (USC, Title 32) until those personnel have been federalized.

7.6. Causes. Civil disturbances may arise from a number of causes. Most often they arise from

political grievances, social unrest, terrorist acts or foreign influences. A single cause may trigger

the event or it may arise from a combination of causes.

7.6.1. Political Grievances. Demonstrations of political grievances range from simple

protests on specific issues to full-scale civil disobedience. Many forms of political protest,

while disruptive, are not unlawful. These protests may be spontaneous, but most often are

planned events. Often political protesters coordinate with local authorities. Most protesters

are law-abiding citizens and intend for their protests to be nonviolent. Violence occurs

mainly when control forces must try to contain a protest or arrest protesters involved in civil

disobedience. The presence of agitators increases the chance of violence. Agitators want to

provoke the control force into overreacting, which will embarrass the authorities. Violence

and overreaction by the control force can also gain media and public sympathy for the

protesters.

7.6.2. Social Unrest. Urban conflicts and community unrest arise from highly emotional

socio-economic issues. Economically deprived inner-city residents may perceive themselves

as being treated unjustly or ignored by the people in power. When tension is high, it takes

only a minor incident or a rumor of an injustice to ignite a civil disturbance. This is

particularly true if community relations with the local police are part of the problem.

7.6.3. Terrorist Acts/Foreign Influences. Many disaffected groups seek to embarrass the

government. Disturbances may be a cover for terrorism. Often an overriding goal is to cause

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 55

an overreaction by authorities with the intent to gain sympathy from the general population.

Foreign nations may employ surrogates. These surrogates create activities that promote the

sponsor-state’s interests. Agents of the foreign nations may be part of the disturbances and

can be in key leadership positions. If the agents can get the targeted government to

overreact, then the repression serves to further expand support for the foreign influence.

7.7. Locations. Civil disturbances usually occur at places symbolic of a grievance, near the

cause of the grievance or close at hand to an aggrieved crowd. Examples of such places are

nuclear weapons facilities or power plants, in urban areas, at refugee camps or at government

facilities. Nuclear weapons facilities and power plants are subject to demonstrations by anti-

nuclear activists. These activists demonstrate at places they know or believe develop, build,

transport or store nuclear weapons, weapons-grade (nuclear) material or their components.

7.7.1. Government Facilities. US government facilities such as recruiting offices, federally

leased buildings, Reserve Officer Training Corps (ROTC) buildings and federal courthouses

can also be the targets of demonstrations. A group may target a government facility simply

because they attach a symbolic value to it or perceive a connection between it and the policy

they are protesting. This is especially true of anti-war and anti-nuclear protest groups. They

may choose a facility because they see it as the source of their grievance. Likewise, they

may target a facility because people working there are seen as having the power to address

the group’s grievance.

7.7.2. Refugee Camps. Refugee and resettlement camps can become the focus of a civil

disturbance. Large numbers of refugees attempting to enter the US in mass are often placed

temporarily in refugee camps until they can be resettled. These camps can either be in the

US, a US-controlled area like Guantanamo Bay or in friendly allied nations. Regardless of

the location, resettlement can be a slow and difficult process. The boredom, frustration and

uncertainty refugees experience in these camps can create tensions that may erupt into

violence. Agitators may infiltrate refugee camps to exploit these tensions in ways to

embarrass and/or force the US into action.

7.7.3. Other Demonstration Sites. Demonstrations at US government facilities are not

limited to those in the US. US facilities in foreign nations can be locations of civil

disturbances. DoD installations, US embassies and US consulates in foreign nations are

favorite targets of demonstrators. DoD installations in foreign nations are often scenes of

protest against US foreign policy. The actual installation and its mission may or may not be

the true target. Often the installation is just a highly visible symbol of the US government.

7.8. Role of Military Forces. The preservation of law and order in the civilian community is

the responsibility of state and local governments and law enforcement authorities. The

preservation of law and order on the federal property of a military installation is the

responsibility of the installation commander and military law enforcement authorities.

7.8.1. Scope. Within the Air Force, the Security Forces act as the primary control force for

civil disturbances that occur on Air Force installations. Under certain circumstances,

Security Forces personnel may also act as the control force for civil disturbances that occur

in the local community, if called upon by competent authority. Additionally, Security Forces

may act as the control forces for any migrant or refugee operations when directed by

command authorities. Requests for military support to civilian law enforcement officials in

connection with civil disturbances will be addressed in accordance with AFI 10-802, Military

56 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

Support to Civil Authorities, Department of Defense Directive (DoDD) 3025.12, Military

Assistance for Civil Disturbances, and DoDD 3025.18 Defense Support of Civil Authorities.

7.8.2. Responsibilities. Regardless of the nature of the disturbance, Security Forces

personnel must display fair and impartial treatment during all contacts with the civilian

population and any other participants in any civil disturbance. In all cases, personnel must

adhere to the principle of minimum force as outlined in AFI 31-207, Arming and Use of

Force by Air Force Personnel. Whenever possible, have civilian police apprehend, process,

and detain civil law violators. Security forces perform these functions only when necessary

and only to the minimum extent required. Return these functions to civil authorities as soon

as possible. As the disturbance subsides, the commander should take steps to restore control

to civil authorities. The control force gradually reduces the number and scope of its

operations and should begin removing equipment from the area. Caution is required. Past

experience has shown that rapid and complete withdrawal of military forces creates a

dangerous vacuum. The vacuum often causes the disturbance to flare up since protesters

believe civil authorities cannot maintain control. The security forces goal should be a phased

return of control to civil authorities.

7.9. Levels of Disturbances. In most cases, crowd behavior escalates through many stages

before violence erupts. When personnel can recognize key aspects of each stage, they have the

best chance to control or disperse the crowd before it gets violent. The most recognizable stages

are listed below with essential components of each stage identified.

7.9.1. Periods of Increased Tension. There are many indications that a base or community is

in a period of increased tension as far as human relations are concerned. Identifiers marking

this phase may appear as increased polarization in living, dining and work areas. Graffiti on

walls or overheard conversations may indicate periods of increased tension. The biggest

mistake at this stage is an overreaction to these situations by civil or military authorities.

Block watch or community meetings are solid avenues to reduce tensions, air grievances and

establish understanding.

7.9.2. Scattered Minor Incidents of Violence. This phase may include incidents of

harassment between individual members of opposing groups. Increase first-line supervision

and community policing in high-incident areas to avoid escalation.

7.9.3. Group-Oriented Violence. Roaming, unorganized groups bent on either destruction of

property or assaults on people begin to show up with greater frequency and in larger groups.

Leaders of these groups intentionally defy orders and authority. This is the first level of

actual disturbance requiring direct police action. Riot control forces should assemble early in

this phase, deploy to the scene and employ necessary measures (including force) to maintain

order. Attempt to isolate and/or apprehend leaders and agitators. Use command action to

stabilize the situation without force, if possible.

7.9.4. Full Riot Phase. Riots include widespread destruction of property, total defiance of

authority, open mob action and serious breaches of the peace. This level could result in

serious injury or death to innocent persons. At this time, a full civil disturbance operation

should already be in force and the mission becomes one of mob dispersal and restoration of

order as rapidly as possible. It is best to apprehend individuals after the mob is broken into

small groups.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 57

7.9.5. Summary. These levels of confrontation do not necessarily occur in order. Any phase

could occur at any time and more than one phase could occur at the same time at different

locations on the base or in the local community. A peaceful, orderly demonstration outside

one gate could occur while others demonstrating for the same cause could be uncooperative

and violating the law at a different gate.

7.10. The Participants

7.10.1. The Environment. A civil disturbance occurs only in a particular environment--that

environment is a fusing of cause, place and willing confrontational participants. Civil

disturbance participants come from all backgrounds. Participants cover the broad spectrum

from the far right to the far left. Participants may be members of special interest groups,

disgruntled or unemployed persons. They may be environmentalists, anti-nuclear agitators,

anti-abortion activists or foreign and domestic opponents of US policy. They come from all

age groups and from all socioeconomic classes. Civil disturbance participants may be

curious onlookers who have become swept away by the excitement of an event or

demonstrators or counter demonstrators who have become emotional about their cause.

Whoever they are, they have become subject to the social and psychological factors that can

turn a large gathering of people into a disruptive, disorderly mob. Understanding these

factors can help reduce disturbances and permit restoration of order with a minimum of

force.

7.10.2. The Human Factor. The basic human element sparking a disturbance is the presence

of a crowd. There are almost as many types of crowds as there are reasons for people to

assemble. There are casual crowds like those that assemble for a football game or gathers at

an accident. Persons in such a crowd probably have no common bonds other than the

enjoyment of the game or curiosity about the accident. There are “planned” crowds that

assemble at the call of a leader to accomplish a goal. Members of a planned crowd have

common bonds of interest and purpose.

7.10.3. Impact of Social Factors on a Crowd. The presence or absence of social factors like

leadership, moral beliefs and social uniformity affect crowd behavior. Psychological factors

also impact crowd behaviors. Typically a crowd only does those things that the majority of

its members want to do. However, the emotional stimulus and protection of being in a crowd

(anonymity) can lead to a violent synergy that individuals typically avoid. This dynamic,

coupled with the fact that a crowd is open to manipulation, is what makes a crowd

particularly volatile and a threat to public order.

7.10.3.1. Leadership. Crowd situations are ripe with confusion and uncertainty.

Members seek direction. The first person to give orders in an authoritative manner is

likely to be followed. A skillful manipulator can channel the energy of a crowd toward

violence or calmness. In riot situations, target the group leadership at the early stages for

apprehension. Leaderless crowds are much easier to disperse.

7.10.4. Emotional Contagion. Emotional contagion, a high state of excitement, provides the

crowd psychological unity. Although temporary, this unity or contagion may be the only

momentum a crowd needs to turn to mob action. Mob behavior is highly emotional, often

unreasonable and always potentially violent.

58 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

7.10.5. Panic. Panic prompts unreasoning and frantic efforts in seeking safety. It is

extremely contagious, spreads rapidly and endangers everyone in the area of the panicked

crowd. Common panic scenarios include perceptions like:

7.10.5.1. Danger is so close at hand that the only action is to flee.

7.10.5.2. Escape routes are limited, blocked or have just been opened. Very often this

form of panic causes people to stampede. The onslaught of a fleeing human mass may

result in people being crushed, smothered or trampled.

7.10.5.3. Riot control agents have been used; crowd members cannot disperse quickly

and therefore believe their lives are at risk.

7.10.6. These scenarios point to a critical concept in crowd control operations: Unless the

mission is to contain and capture, always provide a number of open, easily identifiable

escape routes that a crowd may access at any time.

7.11. Control Force Social Factors.

7.11.1. It is critical to remember that control force members are also susceptible to crowd

behaviors--particularly panic. Do not allow control force members to develop a feeling of

anonymity. Helpful measures include:

7.11.1.1. Leadership elements must know their people’s names and use them at every

opportunity.

7.11.1.2. Personnel with questionable emotional stability or strong prejudices

(particularly against the crowd being controlled) should not participate in operations.

7.11.1.3. Do not dehumanize or depersonalize the crowd. It is easier to harm or fight an

idea than a person. Fair and impartial performance of control force duties is imperative.

7.11.1.4. Maintain a gender, ethnic and racial balance to offset the perception of a

disturbance being an “us” versus “them” situation. Mob leaders often count on sympathy

generated from the appearance of an overwhelming military force “attacking” old people,

women and children.

7.11.2. Rigorous training, effective supervision and immediate corrective action of control

force members are an absolute requirement during civil disturbance operations. The

fundamental fact is all members of a control force are accountable for all of their actions.

7.12. Crowd Tactics. In civil disturbance situations, crowd tactics run the full spectrum.

Typically, the more organized a demonstration is, the more likely personnel will confront well-

planned tactics. Keep in mind the underlying purpose for most tactics is to make the authorities,

including the control force, look bad. The perception of a heavy-handed response may add

support to the protest, escalate demonstrator acts (more violence) or serve to justify (in the minds

of the crowd) outright acts of terrorism. This is why each and every member of the control force

must maintain a calm, professional demeanor--regardless of the tactics.

7.12.1. Nonviolent Tactics.

7.12.1.1. Nonviolent tactics may range from name-calling to building barricades.

Demonstrators may converse with the control force members to distract, dissuade or gain

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 59

their sympathy. Do not respond to verbal barrages. “Civil disobedience” is the most

common nonviolent tactic. Examples include:

7.12.1.1.1. Trespassing--requiring control force apprehensions. Dissidents often

view being apprehended as a “victory” and stage tactics to force mass apprehensions

in an attempt to saturate the support functions behind control force units.

7.12.1.1.2. Passive resistance--blocking entrances, driveways, and offices--and then

going limp, thus requiring control force members to carry protesters away.

7.12.1.1.3. Chaining, handcuffing or tying themselves together and/or to an object

associated with the authorities (e.g. an aircraft, door, fence, or building).

7.12.1.2. Sometimes women, children and the elderly are placed in the front ranks.

Consider this real-world example: Mob planners prearranged media coverage. Their

plan was to use only female demonstrators in acts of civil disobedience. An astute

installation commander deployed only female Security Forces and augmentees in blues,

with no weapons or utility belts. The Security Forces women effectively worked in pairs

to carry away the passive female demonstrators who had staged a sit-in across the main

gate thoroughfare. The image of Battle Dress Uniform-riot-clad Security Forces males

removing these protesters never materialized. Result: The media blitz turned against the

protesters--commending the restraint and professionalism displayed by the United States

Air Force! Again, adapt a firm but impartial demeanor when and if personnel must

apprehend protesters.

7.12.1.3. Another common tactic (mentioned above) is to attempt to overwhelm the

system by staging groups for mass apprehensions. Consider how best to process

violators:

7.12.1.3.1. In mass, all receive the same process.

7.12.1.3.2. Selectively--process and turn over to civil authorities the leaders, agitators

and repeat offenders while all others receive a debarment/expulsion letter.

7.12.1.3.3. Hold, identify and turn over to civil authorities.

7.12.1.3.4. The processing procedures will vary depending on each situation.

Preplanning for this phase of the contingency among civil authorities, the installation

commander, judge advocate and Security Forces is critical.

7.12.2. Violent Tactics.

7.12.2.1. A violent mob is potentially one of the most dangerous threats Security Forces

will ever face. Violent mobs are notorious for firebombing, brick throwing and breaking

into and entering secured facilities. Here are some less known, but just as deadly, tactics

and weapons:

7.12.2.1.1. Balloons filled with paint to use as “bombs” on aircraft, buildings or

control force members.

7.12.2.1.2. Bolt cutters to cut through fences.

7.12.2.1.3. Clubs disguised to look like protest signs.

60 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

7.12.2.1.4. Lead pipes wrapped in newspaper to use as clubs or be thrown as deadly

missiles.

7.12.2.1.5. Firecrackers dipped in glue and covered with BBs or small nails to use as

miniature shrapnel grenades.

7.12.2.1.6. Plywood shields and motorcycle helmets to protect against riot batons.

7.12.2.1.7. Goggles to protect against smoke and gas.

7.12.2.1.8. Ropes, chains, and grappling hooks to pull down fences. Mattresses,

furniture pads or heavy blankets to lie on top of barbed wire during breaching

(trespass) movements.

7.12.2.1.9. Firearms, explosives and vehicle assaults (using vehicles to crash a gate,

etc.) are the most extreme forms of crowd violence.

7.12.2.2. Control force members disrupt a mob’s desired activity which makes the

control force the mob’s most immediate target and threat. Controlled, measured

responses will ultimately subdue any crowd. Control force members who get out of hand

will only fuel and potentially escalate violence.

7.13. Civil Disturbance Training. Crowd control situations, particularly those with a potential

for violence, are best handled by a combination of planning and training. It is too late to train

once a crisis begins. As discussed earlier, given the out-of-mission role, coupled with the

specialization required for civil disturbance operations, just-in-time (JIT) training may be the

most effective and efficient course of action, if time allows. Lessons learned from several civil

disturbance operations praised this training methodology. Solid training, both JIT and annual

sustainment, remains the best avenue to prepare security forces for any contingency. Accurate

information is the basis for appropriate training. Unit-level trainers should utilize the

Confrontation Management curriculum located in the eTTPG Library located on the Air Force

Security Forces Center website. The library is at https://afsfmil.lackland.af.mil, on the left

column, click ‘eTTPGs’.

7.13.1. Generic Unit Training. Because we cannot train for every specific civil disturbance,

Security Forces should conduct some generic training which can cover different situations.

Critical to any security forces operation is fitness for duty consideration. DFCs must

accurately plan, organize and equip personnel who will deploy, whether to the front gate or

around the world. Two absolutes, regardless of the mission, are:

7.13.1.1. Appropriate selection and training for deployment teams are critical to proper

mission preparation.

7.13.1.2. Tailoring of the deployed UTCs logistics detail for the specific deployment to

ensure the proper equipment is taken to complete the mission. In the near future,

capability kits will be completed and propositioned at various locations to assist with

these types of deployments.

7.13.2. Domestic Civil Disturbance Training.

7.13.2.1. Selection of the control force should draw on the unit’s most stable personnel.

Training should always emphasize tactics designed to present a disciplined show of force.

Design training to examine the degrees of force to use and priority of each. Every control

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 61

force member must realize they are responsible for their actions while performing civil

disturbance duties. Following the guidelines that established in AFI 31-207, Arming and

Use of Force by Air Force Personnel, is critical to the outcome of any situation. Much of

the training conducted for Security Forces has direct application in the realm of civil

disturbance operations. Continually teaching and evaluating these topics should provide

positive benefits when, and if, Security Forces employ troops in civil disturbance

missions:

7.13.2.1.1. Arming and use of force.

7.13.2.1.2. Unarmed self-defense.

7.13.2.1.3. Use of riot control agents and munitions.

7.13.2.1.4. Human relations and stress management.

7.13.2.1.5. Dealing with panic.

7.13.2.1.6. Weapons retention for the M-9, M-4 and M-870.

7.13.2.2. Specialized civil disturbance topics ideal for JIT training include:

7.13.2.2.1. Civil disturbance mission orientation and intelligence briefing.

7.13.2.2.2. Crowd control tactics.

7.13.2.2.3. Formations and movements.

7.13.2.2.4. Use of the baton and other nonlethal weapons.

7.13.2.2.5. (Rapid) Flexi-cuffing.

7.13.2.2.6. The military working dog (MWD) in a civil disturbance environment.

7.13.2.2.7. Transporting large numbers of apprehended personnel.

7.13.2.2.8. Processing large numbers of apprehended personnel. NOTE: The above

list is not all-inclusive; therefore, commanders must adapt training to the local

environment.

7.13.3. Foreign Civil Disturbance Training. Clearly, a foreign civil disturbance mission

requires more specialized JIT training in addition to the above-listed topics. Often an in-

place country team will conduct this training. These missions require an especially stable,

properly selected control force. Experience shows tours beyond 120 days induce

considerable stress--even for the best prepared. Third world nations rife with poverty,

disease and different customs add to an already stressful environment. Again, training

should always emphasize a disciplined show of force, subject to the government,

organization or individual in charge (e.g., UN, US State Department, US ambassador).

Additional JIT training topics include:

7.13.3.1. Intelligence briefing.

7.13.3.2. SJA briefing.

7.13.3.2.1. Cultural orientation--we need to overcome cultural barriers by learning

about the nation/ culture we’re deployed to and make efforts to share our culture with

them. Often, simple things are overlooked.

62 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

7.13.3.2.2. Morale strategies for US personnel and dissidents (particularly useful in

migrant, internment and relocation camps).

7.13.3.2.3. . Rumor control plan--for BOTH the control force and dissidents.

7.13.3.2.4. . Control forces escape, evasion, recovery and reconstitution plans--

should mob violence get out of hand or become life threatening to the control force.

7.14. Information Needs. Regardless of the home station or deployment location, accurate and

timely information is the key to developing effective civil disturbance training plans. Process

raw data and feed it up the chain of command. Analyze information and flow it back down the

chain to those who need it the most--control force members. The information focus must assess

the social, economic and political climate of the area and determine the likelihood of active

participation or support from the local populace. Federal law has strict limitations on the armed

forces collecting, storing or disseminating personal data on US citizens. The control force

commander should coordinate with civil and military attorneys throughout any operation.

7.15. Threat Analysis. Threat information is the most vital information force planners have

when determining appropriate countermeasures. Threat information constantly changes and

must be reviewed on a consistent basis. Procedures need to be established for gathering,

analyzing, and disseminating this information in a timely fashion, both up and down the chain of

command, this will help determine the appropriate countermeasures and guard against

overreaction. Three kinds of information produce a threat analysis:

7.15.1. Intelligence and criminal. Provide information on the goals, methods of operation,

techniques, strategies, tactics and targets of individuals or groups.

7.15.2. Threat. This information identifies and defines individuals and groups.

7.15.3. Vulnerability. This information focuses on security weaknesses and high-risk targets

(e.g. military installations, utility plants, dams or dike works). To assess the vulnerability of

the installation, consider:

7.15.3.1. Installation and surrounding community characteristics that would make an

attractive target for terrorists or civil disturbance (e.g., nuclear mission, research and

development facilities, antiterrorism units, unique training missions).

7.15.3.2. Status of training. Readiness can be a powerful deterrent.

7.15.3.3. Communications availability/vulnerability.

7.15.3.4. Nonmilitary law enforcement resources.

7.15.3.5. Time and distance from other US military installations that could provide

support.

7.15.3.6. Time and distance from urban areas. Large urban areas offer choice targets;

ease of infiltration, concealment and escape; and large concentrations of ethnic

populations that may be sympathetic to a particular cause.

7.15.3.7. Geographic region and proximity to foreign borders.

7.15.3.8. Access to the installation or community--power grids, fuel depots and

pipelines.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 63

7.15.3.9. Population density of the installation or community.

7.15.3.10. Terrain.

7.15.3.11. Weather.

7.16. Operations

7.16.1. Restore Order. Security Forces must isolate any civil disturbance threatening

military order and prevent the disturbance from spreading. Security Forces protect people,

facilities and services. Mob demonstrators usually view control force members as defenders

of the “status quo” and thereby consider them targets. Above all, the control force mission is

to provide disciplined restraint to maintain law and order. The nature of control force

operations can vary greatly. Adopt operational strategies from AFH 31-305, Security Police

Deployment Planning Handbook. Use this manual to prepare specific mission plans.

7.16.2. Isolate the Disturbance.

7.16.2.1. The initial control task is to isolate the crowd and seal off the disturbance area.

Once isolated, time becomes the commander’s ally. To achieve this end, initiate

measures to:

7.16.2.1.1. Prevent disorder from spreading to unaffected areas.

7.16.2.1.2. Move uninvolved people from the area immediately.

7.16.2.1.3. Prevent unauthorized people from entering the disturbance area.

7.16.2.1.4. Apprehend disturbance leaders/agitators.

7.16.2.2. Once the four control measures above are in place, allow the crowd to disperse

peacefully. Isolate the affected area much the same as we do restricted areas: use signs,

barriers and mobile patrols. Apprehend individuals in the mob who refuse to leave

immediately and remove them from the area so they cannot reorganize or rekindle the

crowd into an unruly mob.

7.16.3. Protect Targets. In most civil disturbance missions, Security Forces will be assigned

to protect “targets” from the crowd. Targets include people and facilities. Adapt procedures

from AFI 31-101, Integrated Defense and DOD S-5210.41-M_AFMAN 31-108V1, Nuclear

Weapon Security Manual: The Air Force Nuclear Weapon Security Manual, to fulfill this

aspect of the mission.

7.16.4. Crowd Control.

7.16.4.1. The control force uses carefully selected tactics and wisely committed

resources to exert control over disorderly crowds. Installation/operation commanders

have four basic options available to them. Their order can be to monitor, disperse,

contain or block the crowd. Implement these options alone or in combination. Variables

that might influence the tactic(s) applied include:

7.16.4.1.1. Severity of the disturbance.

7.16.4.1.2. Public opinion.

7.16.4.1.3. Current policies.

7.16.4.1.4. Crowd demographics (mood, intent, composition and activity).

64 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

7.16.4.1.5. Capabilities and preparedness of control forces.

7.16.4.1.6. Immediate and long-term benefits of control force action.

7.16.4.1.7. Weather, terrain and time of day.

7.16.4.2. Monitor.

7.16.4.2.1. Monitoring does not antagonize peaceful gatherings and is appropriate

when more decisive action is inappropriate. Monitoring is particularly useful in large,

non-violent demonstrations. This is also an ideal stage to meet demonstration leaders,

determine their intent and gain their cooperation. Contact with the leadership may be

the only control measure needed, persuading leaders to police (literally) their own

gathering. Planned demonstrations usually require coordination of the following

options:

7.16.4.2.1.1. Formal issuance of permits to march or demonstrate.

7.16.4.2.1.2. Planned starting point, route and rally point(s) for the

demonstration.

7.16.4.2.1.3. Time schedule.

7.16.4.2.1.4. The need to marshal/escort the demonstration and which

organization will provide personnel to serve as marshals.

7.16.4.2.1.5. Violence, litter and property damage prevention.

7.16.4.2.1.6. Personnel safety.

7.16.4.2.2. Assigning a member of the control force to photograph faces of crowd

members is an extremely effective part of monitoring. When individuals in crowds

realize they are being photographed, Security Forces neutralize the anonymity that

adds to their brazenness. Crowd members need to see the photographer. The

photographer needs to be in uniform. There should be no doubt in anyone’s mind that

individuals in the crowd are being photographed (still or video) by the control force.

Ensure the safety of the photographer. Should the mob turn violent, photographic

evidence can be remarkably beneficial.

7.16.4.3. Disperse.

7.16.4.3.1. The control force may disperse the crowd. Key to any dispersal operation

is control and orderliness. An uncontrolled, fragmented crowd may actually spread

violence and damage. Clearly inform the crowd of the requirement to disperse. Detail

authorized egress routes. Maintain (likely) target countermeasures. Apprehend any

small groups that resist or loiter in the area after dispersal. A hierarchy of dispersal

options includes:

7.16.4.3.1.1. Violent, destructive confrontations. Format: Top (first resort) to

bottom (last resort):

7.16.4.3.1.1.1. Monitor, release/read a proclamation “this may display a show

of force.”

7.16.4.3.1.1.2. Increase four-person and MWD patrols.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 65

7.16.4.3.1.1.3. Employ crowd control formations.

7.16.4.3.1.1.4. Implement riot tactics.

7.16.4.3.1.1.5. Employ water cannon.

7.16.4.3.1.1.6. Employ chemical agents.

7.16.4.3.1.1.7. Employ lethal force.

7.16.4.3.2. Peaceful demonstrations. Adapt this hierarchy to specific situations.

7.16.4.4. Contain. Containment is a suitable option for keeping disorder from spreading

and when the commander directs apprehensions. Vehicles, which are under the control

of the on-scene commander, may be an excellent force multiplier. Used jointly with

dismounted troops, the 33-ton crash (fire) trucks are a ready resource (known to be

resoundingly successful) and have a tremendous psychological impact on mobs. Lights,

sirens and public address systems on law enforcement vehicles—used judiciously--can

aid containment efforts. When using vehicles in a containment operation, establishment

of a mobile command post is recommended.

7.16.5. Block. Blocking may be necessary to protect specific targets in the path of an

advancing crowd (e.g., keeping an unruly mob off the flight line to protect aircraft).

Control force members on line or in vehicles are common barricades. Depending on the

severity of the violence or threat, erect concertina wire, earthen-filled barrels or jersey

barriers to counter higher level threats like speeding vehicles or mass breaches.

7.16.6. Serious Threats. Control forces may encounter high-level threats that pose grave

danger to all persons in the area. These threats include hostage/barricade situations, snipers,

bomb threats and fires. Immediate-action responses must be in place so control forces can

minimize the tragedy caused by these events. Air Force security forces shall adapt the

guidance from AFI 31-101 and DoD S-5210.41-M to effectively deal with serious threats.

Fires offer unique challenges beyond the capabilities of most military control forces. The

specialization required of firefighters precludes control forces from direct engagement.

Control force members can help by remaining vigilant to the threat and reporting fires

immediately. At a fire scene, military control force members may:

7.16.6.1. Establish a protective cordon around the firefighters' area of operations. The

cordon should provide security for firefighters (sniper suppression) as well as hydrant and

hose security.

7.16.6.2. Maintain observation posts (i.e. tall buildings) to prevent sniping, watch for

other fires and coordinate the approach of responding units. Ensure Security Forces

thoroughly coordinate posting control force members on top of buildings to preclude

others from mistaking them as snipers.

7.16.6.3. Establish crowd and traffic control.

7.16.7. Riot Control Formations and Maneuvers. Information and training material on

specific riot control techniques can be found in the Electronic Tactics, Techniques, &

Procedures Guides (e-TTPGs) Library located on the Air Force Security Forces Center’s web

site. The library is at https://afsfmil.lackland.af.mil in the middle column under e-TTPGs.

66 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

Select “Confrontation Management” under the Nonlethal Weapons Section. A detailed study

guide, lesson plan, and task performance checklist are available.

LOREN M. RENO, Lt General, USAF

DCS/Logistics, Installations and Mission Support

(AFMC)

TERRY G. EDWARDS, SES

Director of Communications, Installations and

Mission Support

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 67

Attachment 1

GLOSSARY OF REFERENCES AND SUPPORTING INFORMATION

References

AFPD 31-2, Air Provost Operations. 10 Apr 2009

AFCAT 21-209 V 1, Ground Munitions, 9 Nov 2007

AFMAN 33-363, Management of Records, 1 March 2008

AFMAN 10-2502, Air Force Incident Management System (AFIMS) Standards and Procedures,

25 September 2009

AFMAN 10-2504, Air Force Incident Management Guidance for Major Accidents and Natural

Disasters, 1 December 2009

AFH 31-305, Security Forces Deployment Planning Handbook, 26 February 2003

AFI 10-802, Military Support to Civil Authorities, 19 April 2002

AFI 10-2501, Air Force Emergency Management (EM) Program Planning and Operations, 24

January 2007

AFI 31-101, Integrated Defense, 8 October 2009

AFI 31-201, Security Forces Standards and Procedures, 30 March 2009

AFI 31-202, Military Working Dog Program, 16 May 2009

AFI 31-206, Security Forces Investigations Program, 16 September 2009

AFI 13-207, Preventing and Resisting Aircraft Piracy (Hijacking), 21 June 2010

AFI 31-207, Arming and Use of Force by Air Force Personnel, 29 January 2009

AFI 35-101, Public Affairs Responsibilities and Management, 18 August 2010

AFI 36-2226, Combat Arms Program, 24 February 2009

AFI 40-301, Family Advocacy, 30 November 2009

AFI 44-153, Traumatic Stress Response, 31 March 2006

AFI 44-154, Suicide and Violence Prevention, Education, and Training, 2 January 2003

AFI 51-201, Administration of Military Justice, 21 Dec 2007

AFI 51-701, Negotiating, Concluding, Reporting, and Maintaining International Agreements, 6

May 1994

AFI 71-101 Volume 1, Criminal Investigations, 1 December 1999

AFMAN 23-220, Reports Of Survey for Air Force Property, 01 Jul 1996

AFMAN 31-219, The USAF Military Working Dog Program, 20 June 2009

AFMAN 31-222, Use of Force Manual, 18 February 2009

AFMAN 31-229, USAF Weapons Handling Manual, 12 May 2004

68 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

AFMAN 36-2227, Volume 1, Combat Arms Training Programs, Individual Weapons, 21 May

2004

AFPAM 44-160, The Air Force Suicide Prevention Program, 1 Apr 2001

AFTTP (I) 3-2.46, Nuclear, Biological, And Chemical (NBC) Protection, (2003)

FM 3-19.11, Special Reaction Teams, 13 May 2005

FM 4-02.18, Veterinary Services Tactics, Techniques and Procedures, 30 December 2004

FM 3-19.15, Civil Disturbances, 18 April 2005

DoDD 3025.12, Military Assistance for Civil Disturbances, 4 February 1994

DoDD 3025.18, Defense Support of Civil Authorities, 29 December 2010

DoD 3150.8-M, Nuclear Weapon Accident Response Procedures (NARP), 22 February 2005

DoDI 5200.08, Security of DOD Installations and Resources, 10 December 2005

DoD S-5210.41-M_AFMAN 31-108V1, (S) Nuclear Weapon Security Manual (U): The Air

Force Nuclear Weapon Security Manual, 1 February 2010.

DoD 0-2000-12-H, DoD Anti-Terrorism Handbook, 1 February 2004

DoDD 5200.27, Acquisition of Information Concerning Persons and Organizations Not

Affiliated with the Department of Defense. 7 January 1980

DoDD 5210.56, Use of Deadly Force and the Carrying of Firearms by DoD personnel Engage

in Law Enforcement and Security Duties, 1 April 2011

DoD 5400.7-R_AFMAN 33-302, DoD Freedom of Information Act Program, 21 October 2010

DoDD 5525.5, DoD Cooperation with Civilian Law Enforcement Officials, 15 January 1986

DoDD 7730.47, Defense Incident-Based Reporting System (DIBRS), 15 Oct 1996

DoDI 1030.02, Victim and Witness Assistance Procedures, 4 Jun 2004

DoDI 5525.07, Implementation of Memorandum of Understanding Between the Department of

Justice and the Department of Defense Relating to the Investigative and Prosecution of Certain

Crimes, 18 June 2007

FM 3-19.15, Civil Disturbance Operations, April 2005

5 USC §552: Public information; agency rules, opinions, orders, records, and proceedings

18 U.S.C. § 1385: Use of Army and Air Force as posse comitatus

50 U.S.C. Chapter 36 — FOREIGN INTELLIGENCE SURVEILLANCE

Homeland Security Presidential Directive-5, 28 February 2003

Air Transportation Security Act of 1974; Public Law 93-366.

CEMP 10-2, Major Accidents, Natural Disasters, Enemy CBRNE Attacks & Terrorist Use of

CBRNE

Adopted Forms

AF 53, Security Forces Desk Blotter, 1 Dec 2000

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 69

AF Form 1098, Special Task Certification and Recurring Training, 1 Apr 1985

AF Form 1109, Visitor Register Log, 1 May 1999

AF Form 1314, Firearms Registration, 19 Oct 2005

AF Form 3545, Incident Report, 11 May 2005

AF Form 847, Recommendation for Change of Publication, 22 Sep 2009

DD Form 2701, Initial Information for Victims and Witnesses of a Crime, May 2004

Abbreviations and Acronyms

ACOG—Advanced Combat Optic Gunsight

ADM—Advanced Designated Marksman

AFB—Air Force Base

AFI—Air Force Instruction

AFCESA—Air Force Civil Engineering Support Agency

AFIMS—Air Force Incident Management System

AF—JLLIS-Air Force – Joint Lessons Learned Information System

AFMAN—Air Force Manual

AFOSI—Air Force Office of Special Investigations

AFRIMS—Air Force Records Information Management System

AFSFC—Air Force Security Forces Center

AFSWC—Air Force Service Watch Cell

AT—Antiterrorism

ATO—Antiterrorism Officer

ATP—Antiterrorism Plan

BDOC/ECC—Base Defense Operations Center/Emergency Communication Center

CBRNE—Chemical, Biological, Radiological, Nuclear, or High-Yield Explosive

CCA—Contamination Control Area

CDC—Center for Dieses Control

CEMP—Comprehensive Emergency Management Plan

CISD—Critical Incident Stress Debriefing

CINC—Commander in Chief

CNT—Crisis Negotiation Team

CPEC—Close Precision Engagement Course

DARE—Drug Abuse Resistance and Education

70 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

DC—Decontamination Corridor

DCG—Disaster Control Group

DFC—Defense Force Commander

DHS—Department of Homeland Security

DL—Decontamination Line

DM—Designated Marksman

DoD—Department of Defense

DoJ—Department of Justice

DoS—Department of State

DRF—Disaster Response Force

ECP—Entry Control Point

EM—Emergency Management

EOC—Emergency Operations Center

EOD—Explosive Ordnance Disposal

ESF—Emergency Support Function

EST—Emergency Services Team

eTTPGs—Electronic Tactics, Techniques, & Procedures Guides

FAA—Federal Aviation Administration

FBI—Federal Bureau of Investigations

FC—Fire Chief

FEMA——Federal Emergency Management Agency

FES—Fire and Emergency Services

FOIA—Freedom of Information Act

FPCON—Force Protection Condition

HAZMAT—Hazardous Material

HE—High Explosive

HNT—Hostage Negotiation Team

HSPD—Homeland Security Presidential Directive

HTA—High Threat Areas

IC—Incident Commander

ICC—Installation Control Center

ICP—Incident Command Post

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 71

IDP—Integrated Defense Plan

IFAK—Individual First Aid Kits

IOTV—Improved Outer Tactical Vest

IPE—Individual Protective Equipment

IRB—Initial Response Base

JOC—Joint Operations Center

LEA—Law Enforcement Agency

LRS—Logistics Readiness Squadron

MAJCOM—Major Command

MOA—Memorandum of Agreement

MRE—Meals-Ready-to-Eat

MTA—Medium Threat Areas

MTF—Medical Treatment Facility

MTT—Mobile Training Team

MWD—Military Working Dog

NARP—Nuclear Weapon Accident Response Procedures

NBC—Nuclear, Biological, and Chemical

NCO—Non-Commissioned Officer

NCOIC—Non-Commissioned Officer in Charge

NDA—National Defense Area

NIMS—National Incident Management System

OPCON—Operational Control

OpsSC—Operations Section Chief

OPR—Office of Primary Responsibility

OSC—On-scene commander

PA—Public Affairs

PAO—Public Affairs Officer

PL—Protection Level

PPE—Personal Protective Equipment

RDS—Records Disposition Schedule

ROTC—Reserve Officer Training Corps

RTF—Response Task Force

72 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

SAC—Special Agent in Charge

SAR—Suspicious Activity Reports

SF—Security Forces

SFLEO—Senior Federal Law Enforcement Official

SRT—Special Reaction Team

SJA—Staff Judge Advocate

SWAT—Special Weapons and Tactics

TACON—Tactical Control

TSR—Trauma Stress Response

TTP—Tactics, Techniques, and Procedures

USC—United States Code

UTC—Unit Type Code

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 73

Attachment 1 (AFMC)

GLOSSARY OF REFERENCES AND SUPPORTING INFORMATION

References

AFMAN 10-100, Airman’s Manual, 01 March 2009

AFPD 31-1, Integrated Defense, 28 October 2011

AFI 10-2501, Air Force Emergency Management Planning and Operations, 24 Jan 07

AFI 31-117, Arming and Use of Force, 29 June 2012

AFI 35-104, Media Operations, 22 January 2010

AFI 35-109, Visual Information, 12 March 2010

AFI31-207_AFMCSUP_I, Arming and Use of Force, 6 August 2010

AFTTP 3-4.6, Active Shooter, 14 November 2012

HAF/A7S issued ―Interim Guidance for Active Shooter Scenarios, 21 January 2010

Secretary of the Air Force Tactical Doctrine – Air Force Tactics, Techniques, and Procedures 3-

4.6 Active Shooter, 14 November 2012

Department of Defense Independent Review, "Protecting the Force: Lessons from Fort Hood,"

January 2010

Secretary of Defense Message, Interim Recommendations of the Ft. Hood Follow-on Review, 12

April 2010

Secretary of Defense Message, DoD Force Protection Responsibilities, 18 August 2010

DTM 09-001, ―DOD Force Protection Threat Information, 19 June 2009

18 U.S.C. § 930: US Code - Section 930: Possession of firearms and dangerous weapons in

Federal facilities

IEMP 10-2, Major Accidents, Natural Disasters, Enemy CBRNE Attacks & Use of CBRNE

NYPD Active Shooter: Recommendations and Analysis for Risk Mitigation. 2012 Edition

Adopted Forms

AF Form 847, Recommendation for Change of Publication, 22 September 2009

Abbreviations and Acronyms

C2 —Command and Control

METT-TC —Mission, Enemy, Terrain, Troops available, Time, and Civilian considerations

OPORD —Operations Order

74 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

SALUTE – Size, Activity, Location, Uniform, Time, Equipment

WIT —Wing Inspection Team

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 75

Attachment 2

CATEGORIES OF SUSPICIOUS ACTIVITY

A2.1. ACQUISITION OF EXPERTISE. Unjustified attempts to obtain or conduct specialized

training in security concepts, military weapons or tactics, or other unusual capabilities such as

specialized transport or handling capabilities that would cause a reasonable person to perceive a

threat to DoD personnel, facilities, or forces in transit.

A2.2. BREACH OR ATTEMPTED INTRUSION. Unauthorized entry or attempted entry into a

restricted area or protected site; impersonation of authorized personnel (e.g., police, security, or

janitorial personnel).

A2.3. ELICITING INFORMATION. Suspicious questioning of personnel by any means about

particular DoD structures, functions, personnel, or procedures at the facility or infrastructure.

A2.4. EXPESSED OR IMPLIED THREAT. A threat to DoD personnel or threatened damage to

or compromise of a DoD facility or infrastructure.

A2.5. FLYOVER OR LANDING. Suspicious overflight of or landing near a DoD facility or

infrastructure by any type of flying vehicle (e.g., airplane, helicopter, unmanned aerial vehicle,

hang glider).

A2.6. MATERIALS ACQUISITION OR STORAGE. Acquisition of unusual quantities of

precursor material (e.g., cell phones, pagers, fuel, and timers); unauthorized or unlicensed

individual or group attempts to obtain precursor chemicals, agents, or toxic materials; or rental of

storage units for the purpose of storing precursor material, chemicals, or apparatuses for mixing

chemicals.

A2.7. MISREPRESENTATION. Misusing or presenting false insignia, documents, or

identification or engaging in any other activity to misrepresent one's affiliation.

A2.8. RECRUITING. Building operations teams and developing contacts, or collecting

personnel data, banking data, or travel data under circumstances that would cause a reasonable

person to perceive a threat to DoD personnel, facilities, or forces in transit.

A2.9. SABOTAGE, TAMPERING, OR VANDALISM. Damaging, manipulating, or defacing

part of a DoD facility, infrastructure, or protected site. Acts of vandalism committed by DoD

civilian employees, military members, or their dependents should not be reported as suspicious

activity unless those acts relate to a pattern of criminal activity or otherwise would cause a

reasonable person to perceive a threat to DoD personnel, facilities, or forces in transit.

A2.10. SURVEILLANCE. Monitoring the activity of DoD personnel, facilities, processes, or

systems, including showing unusual interest in a facility, infrastructure, or personnel (e.g.,

observation through binoculars, taking notes, drawing maps or diagrams of the facility, and

taking pictures or video of a facility, infrastructure, personnel, or the surrounding environment)

under circumstances that would cause a reasonable person to perceive a threat to DoD personnel,

facilities, or forces in transit.

A2.11. TESTING OF SECURITY. A challenge to or a series of interactions with DoD

installations, vessels, personnel, or systems that could reveal physical, personnel, or cyber

security capabilities or vulnerabilities.

76 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

A2.12. THEFT, LOSS, OR DIVERSION. Theft or loss associated with a DoD facility or

infrastructure (e.g., of badges, uniforms, identification cards, emergency vehicles, technology, or

documents, whether classified or unclassified) that are proprietary to the facility, or a diversion

of attention from a DoD facility or infrastructure that is related to a theft or loss associated with

that facility.

A2.13. WEAPONS DISCOVERY. Discovery of weapons or explosives, as defined in section

930 of title 18, U.S.C. (Reference (n)). The discovery of personal weapons legally owned by

DoD civilian employees, military members, or their dependents should not be reported as

suspicious activity if the discovery is solely the result of the owner's failure to properly store or

secure the weapon(s).

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 77

Attachment 3

BEHAVIORAL THREAT INDICATORS

A3.1. Foreword. This list is a compilation of behavioral threat indicators derived from multiple

credible open source documents from various DoD, DoS, DoJ, State and University studies or

directives. NOTE: Not all indicators are independently actionable, but when put to together or

demonstrated in conjunction with one another, they could indicate a threat.

A3.2. Overt Indicators - Preparations/Activities.

A3.2.1. Indicators that May Demonstrate Intent.

A3.2.1.1. Talk knowingly about a future terrorist event, as though the person has inside

information about what is going to happen.

A3.2.1.2. Statement of intent to commit or threatening to commit a terrorist act, whether

serious or supposedly as a “joke,” and regardless of whether or not you think the person

intends to carry out the action.

A3.2.1.3. Deliberate probing of security responses, such as deliberately causing a false

alarm, faked accidental entry to an unauthorized area, or other suspicious activity

designed to test security responses without prior authorization.

A3.2.1.4. Statements of support for suicide bombers who have attacked the United States

or U.S. personnel or interests abroad.

A3.2.1.5. Expressing sympathy for violence promoting organizations.

A3.2.1.6. Advocating violence, the threat of violence, or use of force to achieve goals

that are political, religious or ideological in nature.

A3.2.1.7. Advocating support for international terrorist organizations or objectives.

A3.2.1.8. A threat to DoD personnel or threatened damage to or compromise of a DoD

facility or infrastructure.

A3.2.1.9. Knowing membership in, or attempt to conceal membership in, any group

which: (1) advocates the use of force or violence to cause political change within the

U.S., (2) has been identified as a front group for foreign interests, or (3) advocates loyalty

to a foreign interest over loyalty to the U.S.

A3.2.1.10. Statements disparaging the United States in favor of an alternative system.

A3.2.1.11. Statements that the U.S. Government is trying to destroy or suppress people

of a particular race, religion, or ethnicity (for example, statements that the U.S.

Government is engaging in a crusade against a faith or destroying the purity of a culture

or race).

A3.2.1.12. Distribution of extremist publications or posting information on the Internet,

including e-mail and on-line discussions, which supports or encourages violence or other

illegal activity. Frequent viewing of web sites that promote extremist or violent activity

(unless this is part of one’s job or academic study).

78 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

A3.2.1.13. Advocating or participating in violence against any individual based on their

race, creed, color, sexual orientation, religion, or national origin.

A3.2.1.14. Statements of support for violence against U.S. military forces either at home

or deployed abroad.

A3.2.1.15. For U.S. military personnel only: Any action that advises, counsels, urges, or

in any manner causes or attempts to cause insubordination, disloyalty, mutiny, or refusal

of duty by any member of the armed forces of the United States.

A3.2.1.16. Expressing outrage against U.S. military operations.

A3.2.1.17. Seeking spiritual sanctioning for unlawful violence.

A3.2.2. Indicators that May Demonstrate Opportunity.

A3.2.2.1. Providing financial or other material support to a terrorist organization or to

someone suspected of being a terrorist.

A3.2.2.2. Family ties to known or suspected international terrorist or terrorist supporters.

A3.2.3. Indicators that May Demonstrate Capability.

A3.2.3.1. Statements about having a bomb or biological or chemical weapon, about

having or getting the materials to make such a device, or about learning how to make or

use any such device—when this is unrelated to the person’s job duties.

A3.2.3.2. Suspicious overflight of and/or landing near a DoD facility or infrastructure by

any type of (unauthorized) flying vehicle (e.g., airplane, helicopter, unmanned aerial

vehicle, hang glider).

A3.3. Covert Indicators - Subversive Activities

A3.3.1. Elicitation and Data Collection.

A3.3.1.1. Suspicious questioning of personnel by any means about particular DoD

structures, functions, personnel, or procedures at the facility or infrastructure.

A3.3.1.2. Monitoring the activity of DoD personnel, facilities, processes, or systems,

including showing unusual interest in a facility, infrastructure, or personnel (e.g.,

observation through binoculars, taking notes, drawing maps or diagrams of the facility,

and taking pictures or video of a facility, infrastructure, personnel, or the surrounding

environment) under circumstances that would cause a reasonable person to perceive a

threat to DoD personnel, facilities, or forces in transit.

A3.3.1.3. Collection of unclassified information that might be useful to someone

planning a terrorist attack, e.g., pipeline locations, airport control procedures, building

plans, etc. when this is unrelated to the person’s job or other known interests.

A3.3.1.4. Inappropriate, Unusual, or Excessive Interest in Classified Information

(outside current assignment or without the “need to know”).

A3.3.1.5. Mishandling of Classified Information to include revelations to unauthorized

personnel, leaks to media, unauthorized contact with media, unauthorized removals,

collecting or storing outside of approved facilities, lax security protocols.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 79

A3.3.1.6. Misuse of computers/technology to include accessing databases without

authorization, unauthorized searching or browsing through computer libraries, or

unauthorized destruction of information or agency computer files (e.g. deleting data).

A3.3.1.7. Unexplained or excessive copying of files—particularly blueprints of buildings

or systems such as security and fire suppression.

A3.3.2. Acquisition of Expertise.

A3.3.2.1. Unjustified attempts to obtain or conduct specialized training in security

concepts, military weapons or tactics, or other unusual capabilities such as specialized

transport or handling capabilities.

A3.3.3. Acquisition of Material/Resources.

A3.3.3.1. Acquisition of unusual quantities of precursor material (e.g., cell phones,

pagers, fuel, and timers); unauthorized or unlicensed individual or group attempts to

obtain precursor chemicals, agents, or toxic materials; and/or rental of storage units for

the purpose of storing precursor material, chemicals, or apparatuses for mixing

chemicals.

A3.3.3.2. Recruiting or building operations teams and contacts, personnel data, banking

data, or travel data under circumstances that would cause a reasonable person to perceive

a threat to DoD personnel, facilities, or forces in transit.

A3.3.3.3. Theft or loss associated with a DoD facility or infrastructure (e.g., of badges,

uniforms, identification cards, emergency vehicles, technology, or documents, whether

classified or unclassified) that are proprietary to the facility, and/or a diversion of

attention from a DoD facility or infrastructure that is related to a theft or loss associated

with that facility.

A3.3.3.4. Handling, storing, or tracking hazardous materials in a manner that puts these

materials at risk.

A3.3.4. Misrepresentation.

A3.3.4.1. Misusing or presenting false insignia, documents, or identification or engaging

in any other activity to misrepresent one’s affiliation.

A3.3.5. Criminal/Suspicious Activity.

A3.3.5.1. Damaging, manipulating, or defacing part of a DoD facility, infrastructure, or

protected site. Acts of vandalism committed by DoD civilian employees, military

members, or their dependents should not be reported as suspicious activity unless those

acts relate to a pattern of criminal activity or otherwise would cause a reasonable person

to perceive a threat to DoD personnel, facilities, or forces in transit.

A3.3.5.2. Ominous, specific threats.

A3.3.5.3. Association with any of the following criminal precursors to terrorist activities:

front businesses & charities, counterfeit money, counterfeit goods, narcotics, smuggling

& import/export violations, robbery/theft, fraud (credit card, benefits, food stamps, etc),

phone scams, bribery, immigration & identity crimes, or incitement to commit terrorist

acts.

80 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

A3.3.6. Foreign Contact.

A3.3.6.1. Unreported contact with foreign intelligence services, governments,

organizations, or unreported contact with unauthorized foreign personnel seeking

classified information.

A3.3.6.2. Unreported personal foreign travel.

A3.4. General Risk for Violence Indicators.

A3.4.1. This list is a compilation of indicators derived from multiple sources that may

indicate a higher risk for violence. If an individual demonstrates these indicators, this

information should be shared up the chain of command and the commander or first sergeant

should consider all the information to decide whether the individual should be referred to the

appropriate helping agencies on base for further screening and/or evaluation by medical

authorities. If the individual is demonstrating an immediate threat of violence, contact the

appropriate law enforcement agencies. NOTE: Not all indicators are independently

actionable, but when put to together or demonstrated in conjunction with one another, could

indicate a threat.

A3.4.1.1. Past conflicts (especially if violence was involved) with coworkers.

A3.4.1.2. Tendency to blame others for problems.

A3.4.1.3. Defensive or hostile attitude, increasing belligerence, or outbursts of anger.

A3.4.1.4. A history of frequent job changes.

A3.4.1.5. Hypersensitivity to criticism.

A3.4.1.6. Recent acquisition/fascination with weapons.

A3.4.1.7. Apparent obsession with a supervisor or coworker or employee grievance.

A3.4.1.8. Preoccupation with violent themes.

A3.4.1.9. Interest in recently publicized violent events.

A3.4.1.10. Extreme disorganization.

A3.4.1.11. Increased use of alcohol and/or illegal drugs.

A3.4.1.12. Noticeable decrease in attention to appearance and hygiene.

A3.4.1.13. Resistance and overreaction to changes in policy and procedures.

A3.4.1.14. Repeated violations of policies.

A3.4.1.15. Increased severe mood swings.

A3.4.1.16. Noticeably unstable, emotional responses.

A3.4.1.17. Explosive outbursts of anger or rage without provocation.

A3.4.1.18. Suicidal; comments about “putting things in order.”

A3.4.1.19. Behavior which is suspect of paranoia, (“everybody is against me”).

A3.4.1.20. Increasingly talks of problems at home.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 81

A3.4.1.21. Escalation/introduction of domestic problems into the workplace; talk of

severe financial problems.

A3.4.1.22. Talk of previous incidents of violence.

A3.4.1.23. Empathy with individuals committing violence.

A3.4.1.24. Increase in unsolicited comments about firearms, dangerous weapons, or

violent crimes.

A3.4.1.25. Patterns of inaccurate statements or making excuses for irregular behaviors.

A3.4.1.26. Excessive tardiness or absences - Beyond simply missing work; an employee

may also reduce his or her workday by leaving early, departing the work site without

authorization, or presenting numerous excuses for otherwise shortening the workday.

A3.4.1.27. Increased need for supervision; reduced productivity; inconsistent work

patterns.

A3.4.1.28. Blames others for problems in life or work; suspicious, holds grudges.

A3.4.1.29. Unwelcome obsessive romantic attention.

A3.4.1.30. Unshakable depression as exhibited by low energy, little enthusiasm or

despair.

A3.4.1.31. Recently has withdrawn from normal activities, family, friends, co-workers;

is isolated or a loner.

A3.4.1.32. Feels wronged, humiliated, degraded; wants revenge.

A3.4.1.33. Morally superior, self-righteous / feels entitled to special rights and that rules

don't apply to him/her.

A3.4.1.34. Demonstrating desperation over professional or personal problems.

A3.4.1.35. Believes to have no choices or options for action except violence.

A3.4.1.36. A history of drug or alcohol abuse.

A3.4.1.37. Past convictions for violent crime.

82 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

Attachment 4

SAMPLE MOA

Memorandum of Agreement Between Local County Sheriff’s Office (or Local Police

Department) and the XXX Security Forces Squadron

1. PURPOSE: The purpose of this agreement is to outline responsibilities, and define major

actions required to support confrontation management and emergency services situations

occurring on XXX Air Force Base.

2. AUTHORITY: DoDI 5200.08 and 31-101, XAFB (Installation Security Plan)

3. GENERAL:

a. SCOPE: This provides guidance and outlines tasking necessary to maintain an acceptable

level of security for the XXX AFB community and resources. During the implementation of

Force Protection Conditions (FPCON) and security contingencies, the Local County Sheriff’s

Office may be asked to render support in the form of personnel and emergency services.

b. ASSUMPTIONS: Neighboring military installation will be contacted and may render limited

aid under emergency situations. The use of the XXX County Sheriff’s Office is understood to be

only a contingency measures until a federal agency can respond to handle the emergency

situation.

c. FRIENDLY FORCES: The XXX Wing Commander will be in operational control of all

forces unless relieved by a Federal agency (FBI, ATF, U.S. Marshals, etc.). There is no legal

impediment to civilian law enforcement providing assistance where required; however local law

enforcement officers are deployed in support of, not in place of, Security Forces or other federal

agencies. Local law enforcement will be relieved when appropriate federal resources are in

place.

4. RESPONSIBILITIES: Local County Sheriff’s Office – Phone (000) 000-0000, will be

notified by a member of the XXX Security Forces Squadron with a request for assistance. The

Local County Sheriff’s Office will provide an estimated time of arrival to a designated safe

staging area for the incident. The Local County Sheriff’s Office will respond to the incident as

soon as possible. The XXX Security Forces Squadron and Local County Sheriff’s Office will

conduct an exercise of this agreement annually.

a. OPERATIONAL ASSISTANCE: The Local County Sheriff’s Office may be requested to

provide law enforcement assistance for a crowd confrontation team, civil disturbances, law

enforcement emergencies, large protest demonstrations, aircraft disasters, boating or watercraft

disasters, fires, hurricanes, tornadoes or other weather related crisis, sporting events, concerts,

parades, escapes from detention facilities, and incidents requiring utilization of specialized units

capable of responding within two hours to assist with public disturbances beyond control of

XXX Security Forces Squadron.

b. SPECIAL WEAPONS AND TACTICS TEAM: The Local County Sheriff’s Office will

be asked to provide S.W.A.T. capabilities with Support vehicle as quickly as circumstances

permit for serious situations beyond XXX Security Forces Squadron capabilities involving

armed intervention.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 83

5. COMMAND AND CONTROL: Due to federal requirements, the XXX ABW/CC or their

designated on-scene commander must exercise control over the actions of the S.W.A.T. team.

Specifically, before any use of force by the team, the Air Force on-scene commander must grant

permission.

6. AGREEMENT AND ADMINISTRATION: This MOA becomes effective immediately on

signature by all parties. It will be reviewed annually. It may be revised, cancelled, or rescinded

in total on 60-day written notification by either party.

7. LIABILITY: This MOA will address liability issues specific to the installation and the

jurisdiction it lies within.

_________________________ ____________________________

Signature Block Signature Block

Sheriff of Local County --or-- Wing Commander

Chief of Police, Local Municipality

NOTE: Add Wing Commander Signature Block if required. Separate MOU/MOA must be

established with each agency SECURITY FORCES enters into agreement with.

84 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

Attachment 5

POSSIBLE SITUATIONS REGARDING ENFORCEMENT OF ORDER WITHIN OR

NEAR AIR FORCE INSTALLATIONS

Table A5.1. Possible Situations Regarding Enforcement of Order Within or Near Air

Force Installations

Possible Situation Action

1. Notice of impending or actual

demonstration.

Notify HQ USAF via Installation Command Post IAW

AF or OSD directions. Coordinate with local United

States Attorney and other appropriate civil authorities.

Review and write installation anti demonstration plans.

Notify MAJCOM/A7S.

2. Peaceful demonstration outside perimeter of

installation without interference to USAF

mission.

Ignore demonstrators while being alert to any change in

status.

3. Demonstrators interfere with base operation

to a minor degree, by obstructing traffic

moving on- and off-base.

Use alternate means of access. If necessary ask civil

authorities to remove the obstruction. NOTE:

Commanders are reminded that request for USAF

assistance by civil authorities should be routed through

the appropriate command channels for approval before

any action is taken.

4. Demonstrators cause serious interference

with base operations and endanger USAF

personnel or property.

SF should request assistance from civil authorities. If

necessary, contact higher headquarters for instructions

on the use of USAF resources. To protect USAF

personnel and property, use the absolute minimum

degree of force to restore order.

5. Demonstrators gain access to the installation

proper.

Detain, issue a letter of Debarment IAW AFI 31-201,

Chapter 5, Attachment 13, and escort them off-base. If

necessary, ask local United States Marshals for

assistance since they have the power of Federal arrest

on United States government property.

6. After being ejected, demonstrators return or

attempt to force their way into the installation.

SF should ask local federal and civil authorities to

control the demonstrators. If this control is beyond their

capability, the commander uses whatever means

possible to protect government personnel and property.

The guiding principle here should be a minimum

application of a force consistent with the restoration of

order.

NOTE: The guidance provided will be modified on a country by country basis in the overseas

commands. International pact or bilateral agreements will provide local policy and guidance to handle

civil disturbances and demonstrations.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 85

Attachment 6 (Added-AFMC)

COUNTERING THE INTERNAL THREAT OF VIOLENCE AND THE ACTIVE

SHOOTER

Figure A6.1. (Added) Countering the Internal Threat of Violence and the Active Shooter

Preface

The recent incidents such as the DC Navy Yard, Fort Hood, and the Aurora, CO shootings have

exhibited how an active shooter could harm DOD members through direct violence. They are

dynamic in that they are difficult to predict and prevent. Access to firearms combined with

unpredictability, pose legitimate threats to personnel safety and the AFMC mission. Much like

the response to the terrorist attacks of September 11, 2001, we need to revise how we train,

respond and prevent active shooter incidents following the recent succession of events. While

active shooters are included in the scope of terrorism, it is distinctive because the assailant may

suffer from an adjustment disorder rather than attempting to impose a sociopolitical ideology. An

active shooter can be any affiliated military, DOD civilian employee or non-affiliated civilian at

any given time or place. It is important that we assume a pro-active posture in order to preserve

the safety of personnel, resources, and infrastructure.

This Countering the Internal Threat of Violence and the Active Shooter guidance covers a

spectrum of violent acts within our installations, while stressing identification of the behavioral

indicators, which typically precede those violent acts. This is critical, as identification of

behavioral indicators can result in intervention before the actor has the opportunity to carry out

their act of violence. The DOD review of the Fort Hood incident and the subsequent Air Force

Follow-on Review recognized that identifying internal threats requires a new concept for the

operating environment:

― Develop a credible process for identifying individuals who pose a potential threat to themselves

or others, providing time-critical information to the right people, employing appropriate force

protection measures, and planning for and responding to incidents…Force protection measures

must now also consider internal threats—disaffected individuals within the force motivated to

violence against the force and the nation.

1. INTRODUCTION. This attachment provides guidance on countering the Active Shooter,

especially for those potential events where the actor is a member of our Air Force community

with advanced knowledge of operations and procedures. This guidance outlines four interdependent

aspects, which must be pursued diligently to ensure success: prevention, response, recovery, and

resiliency (recovery is already extensively discussed in other existing plans and AFIs, so it is not

discussed in-depth here). Prevention is dependent upon the awareness training for installation

personnel, which focuses on recognizing the threat/risk indicators (Attachment 3) and reporting

observed threat behaviors. To fully enable the “Every Airman is a Sensor” concept and to ensure

all Airmen are able to detect and report observed threat behaviors, each Airman must be able to

recognize and assess behavioral indicators that may indicate a developing threat. This guidance

is provided pending future DOD and AF instructions/policy guidance. Success in these interim

efforts will require the development of localized installation populace awareness training, policy,

procedures, and implementation strategies. This guidance must be used in conjunction with the

HAF/A7S issued ―Interim Guidance for Active Shooter Scenarios memorandum, dated 21 Jan

10, the Secretary of the Air Force’s Tactical Doctrine-Air Force Tactics, Techniques, and

86 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

Procedures 3-4.6 Active Shooter, dated 14 Nov 12, and the Secretary of Defense message

―Addressing Terrorist-Associated Insider Threats to the DOD and Violence Within the

Workplace, dated 26 Aug 10, in order to form a comprehensive installation approach to counter

the active shooter threat.

2. OPERATIONS. Active shooters prefer to attack soft targets where they can expect to meet

minimal resistance. Commanders are encouraged to take a proactive approach by reviewing and

modifying as necessary, deterrent and response procedures and capabilities to combat active

shooter methods. It is difficult to quantify the effectiveness of a deterrent without a reliable

control; however, we strive to show effectiveness by continued non-incidences at AFMC

installations. According to some media reporting, the July 2012 Aurora, CO shooting suspect

chose to victimize the Century Aurora Cinema because the movie theater did not have armed

guards or allow concealed weapons. It should be noted that the Century Aurora Cinema was 20

minutes from his home, while there were two other movie theaters within walking distance.

However, the closer theaters did not restrict concealed carry patrons. The Aurora shooting

suspect was reluctant to endure personal harm. This is exemplified by the fact that he was

covered in military battle personal protective equipment and he was caught fleeing the scene by

authorities. On AFMC installations the law enforcement arm are Security Forces (SF), AFOSI,

and Department of Air Force Guards/Police. SF have already implemented random antiterrorism

measures, such as walk through of high population facilities (with exception to schools, religious

centers, and hospitals in accordance with AFI 31-101 Integrated Defense). However, there is

limited operational manpower, which decreases the probability that SF will be in the right place

at the right time. In response to the threat of active shooters, Installation Defense Councils,

through their respective installation commanders, have the authority to specify arming of key

personnel (SF staff personnel or other base personnel as warranted) IAW AFI 31-101, para 1.5.,

Integrated Defense, to increase the effectiveness of integrated defense.

3. PREVENTION. Early detection is critical to preventing potential threats. Numerous

documented case studies show that the warning signs were apparent. Prior to incidents, assailants

exhibited some eccentric behavior which was either undetected or ignored. These threat behavior

indicators can be overt, such as statements of support for, or associations with, any radical

organizations that promote disdain for democratic elected governments, an outward hatred for

others, and disregard for one’s own wellbeing. Knowing these behavioral indicators and

promptly reporting observed threat behaviors to the chain of command are absolutely critical to

preventing these acts of violence. Attachment 3 includes the list of behavioral threat indicators

for self-radicalized ideologues (e.g., MAJ Hassan at Fort Hood) and general risk for violence

indicators (e.g., Fairchild AFB shooter). Both of these potential threats can be equally

dangerous, but their warning signs may often differ. Additionally, their motivations often differ,

with the self-radicalized ideologue driven by belief in a purpose beyond them, while the

disaffected/mentally maladjusted person is often motivated by a perceived injustice against

themselves personally. These threat/risk indicators should be given priority in the installation’s

education and training program for prevention of violence. The people most likely to recognize

the threat/risk indicators are friends, subordinates, coworkers, and supervisors. It is essential to

encourage each Airman to act and report individuals exhibiting these behavioral indicators of

possible violent activity. Installations will establish anonymous methods of communicating

these indicators. By educating our personnel on how to refer these individuals for law

enforcement intervention or assistance, we enhance the overall integrated defense posture of our

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 87

installations. Finally, efforts should be taken to develop installation cultures where sharing

concerns about a friend or co- worker’s behaviors with the chain of command is appreciated as

being a good wingman. NOTE: This guidance focuses on what the installation community can

do to prevent an act of violence and is not intended to address spiritual, emotional, or medical

assistance efforts directed at the individual who poses the threat.

3.1. AWARENESS TRAINING. Educate installation personnel on the behavioral indicators

contained in Attachment 3 enable them to quickly and accurately report suspicious activity.

Commander’s Calls, installation-wide briefings, and the installation newspaper are excellent

venues for conducting training and sustaining awareness. Attachment 7 provides an example

briefing which should be further refined for each particular installation by the Defense Force

Commander in conjunction with the Installation Antiterrorism Officer (ATO). The briefing will

include the threat/risk indicators, reporting requirements, relevant case studies, and actions that

the installation population needs to take in order to protect themselves and assist responding

security forces. The briefing is an annual requirement for all military and civilian employees

assigned to AFMC installations.

Notes:

1. Ensure bargaining unit requirements for covered civilian employees are addressed locally

prior to implementation.

2. This briefing can also be provided to dependents and family members to further enhance

community awareness.

3. If available, Mental Health should provide training on the behavioral indicators.

3.2. REPORTING. Everyone on the installation should be prepared and encouraged to report

any observed suspicious activity, to include the threat/risk indicators, to appropriate law

enforcement agencies. Oftentimes, this will be done at the front line supervisor level, with the

information being reported up their chain of command to the unit commander who then contacts

SF, AFOSI for on-base matter or other law enforcement agencies for off-base matters. This is

appropriate as long as reporting is done in a timely manner. Threats to installation security are

most vulnerable in the planning stages. The timely passage of information increases the

likelihood an event will be prevented or interrupted before becoming operational. Personnel

must be familiar with local reporting requirements and utilize existing resources such as 911, the

installation Eagle Eyes program, and Crime Stop lines in addition to routine numbers for on and

off-installation law enforcement agencies to quickly report suspicious activity. The SALUTE

format is a simple and enduring reporting framework which helps ensure all relevant information

is reported regardless of stress levels. The SALUTE format is further discussed in the briefing at

Attachment 7 and in AFPAM 10-100, Airman’s Manual. (Note: Ensure military and civilians are

locally trained on SALUTE procedures, as the acronym is documented in Joint Publication 1-02,

Department of Defense Dictionary of Military and Associated Terms). When a commander

receives information that one of their subordinates has demonstrated indicators such as those in

Attachment 3, the commander should consult with their local legal office first regarding release

restrictions or they may notify law enforcement first, depending on their assessment of the threat

level and necessity for immediate action. This information sharing fills a critical void that

currently exists in our force protection information sharing process. Commanders are essential to

this process, due to the inherent responsibilities of command as well as their proximity to both

their Airmen and the outside agencies which can assist. Also, supervisors, first sergeants,

88 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

chaplains, and other helping agencies play a key role in the process. Without this exchange of

information, law enforcement agencies cannot proactively defend the force against potential

Active Shooter threats. For instance, in the 1996 shooting in installation housing at Andrews

AFB, multiple people knew the threat posed by the shooter, but they did not share the

information. Another service purposefully moved the victim into Andrews’ installation housing

for her own protection, but never notified Security Forces. Off-installation law enforcement

authorities had interactions with the shooter prior, where he repeatedly told officers of his desire

to kill the victim and himself. That information went unshared. Finally, mental health

professionals knew of the shooter’s behaviors and his repeated failures to attend mental health

appointments, but they also failed to share the information. As a result, the shooter killed his

spouse and himself and wounded one SF, despite a wealth of information known by others that

could have prevented this tragedy.

4. RESPONSE. In addition to our best prevention efforts, we must be ready to respond—

immediately and decisively. Speed and decisiveness are the two critical elements of the response

phase to an Active Shooter event. Immediately respond to the location and neutralize the threat.

Security Forces units should table-top and exercise Active Shooter scenarios frequently so

Airmen are better able to instinctively respond. Responders will be forced to make split second

decisions while lives are in immediate danger. They must be decisive when making those life

changing decisions.

To counter this threat, each installation must have a plan to respond to an active shooter type

scenario. This plan may be included in an existing plan such as the Integrated Defense Plan and

the Antiterrorism Plan (see template at Attachment 8). This plan must include mass warning and

notification procedures, operational reporting requirements, law enforcement response actions,

lockdown measures, recovery actions, and resiliency support. All personnel assigned must be

trained in accordance with the Installation’s active shooter plan. The plan will be exercised semi-

annually and should involve off-installation agencies as available (see template at Attachment 9).

Leaders should tailor the plan and exercises based on their expertise and local knowledge.

Security Forces TTPs will be IAW with the HAF/A7S issued “Interim Guidance for Active

Shooter Scenarios” until publication of the revised AFMAN 31-201, Volume 4, High Risk

Response. At a minimum, response training for all first responders will include:

- Entry and movement techniques

- Application of immediate and decisive lethal force

- Historical review of Active Shooter case studies

- Psychological profile of an Active Shooter

- Resiliency

For access to the AFMC standardized TTP lesson plans and associated training presentations for

Security Forces response to an Active Shooter threat, contact HQ AFMC/A7SO at DSN 787-

6224.

Briefing templates and lesson plans for the first responder training requirements listed above can

be found at Attachment 10. Units are encouraged to add to these presentations and localize the

briefings.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 89

5. RECOVERY. Recovery actions must be fully-integrated into the installation's operational

plan for response to an active shooter. To effectively recover from a mass-casualty event such as

an active shooter, it is critical that all first responders synchronize their plans and actions. As

addressed in the Department of Defense Independent Review, "Protecting the Force: Lessons

from Fort Hood," January 2010, "These stove-piped requirements are implanted within

Installation Emergency Management functional area policies such as: fire, antiterrorism, CBRNE,

medical, religious support, and casualty affairs." These recovery planning requirements must be

identified, consolidated, synchronized and effectively codified in the installation's operational

plan for response to an active shooter. Special attention must be given to any Mutual Aid

Agreements and/or Memorandums of Agreement/Understanding that may require support from

off-base agencies. These agreements must be reviewed annually and updated to ensure relevancy

and currency. Installation recovery actions must be exercised semi-annually and include all on-

base and off-base (as applicable) responding agencies. An exercise plan template can be found at

Attachment 9. Installations are encouraged to localize this exercise plan as needed.

6. RESILIENCY. During awareness training, prepare the installation populace for the

anticipated physical, mental, spiritual, and social reactions associated with traumatic acts of

violence. These skills will provide personnel with coping techniques, which will assist them

through the event and post-event. A resilient installation populace increases the likelihood of a

successful resolution to an act of violence, a faster return to full mission capability for the

installation, and a better future quality of life for those involved.

In many ways, being resilient is about being fit—mentally, physically, spiritually, and socially.

Leaders should strive to keep their Airmen fit in all areas. Whether a personal injury is physical,

mental, or combination, a resilient Airman or family member is more likely to successfully

recover if they are fit in all four areas.

A resiliency training template is located at Attachment 10. Other resources are also available,

such as On Combat and On Killing by Dave Grossman, courses available through local law

enforcement agencies, and expertise from on-installation agencies.

90 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

Attachment 7 (Added-AFMC)

INSTALLATION AWARENESS TRAINING BRIEFING EXAMPLE

Figure A7.1. (Added) Installation Awareness Training Briefing Example

Due to the size of the file, the Installation Awareness briefing templates can be found on the

HQ AFMC A6/7 EIM at:

https://cs.eis.afmc.af.mil/sites/AT-

FP/AT%20Reference%20Documents/Forms/AllItems.aspx?RootFolder=%2fsites%2fAT%2dFP

%2fAT%20Reference%20Documents%2fActive%20Shooter%20CONOPS%5fAFMC&

Or by contacting HQ AFMC/A7SO at DSN 787-3127, (937)257-3127 or DSN 787-8837,

(937)257-8837 for access to the EIM site or forwarding of a copy by CD.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 91

Attachment 8 (Added-AFMC)

OPORD PLAN EXAMPLE

Figure A8.1. (Added) OPORD Plan Example

The following Operations Order (OPORD) Plan is an “EXAMPLE ONLY” and can be changed,

updated or configured for your installation, as warranted.(Insert Installation Designation Here)

Active Shooter Operations Order (Rapid Deployment)

MEMORANDUM FOR ALL

PERSONNEL FROM: XX XXX/CC

SUBJECT: Active Shooter (Rapid Deployment) on XXX AFB or military interests.

1. Forwarded is the XX XXX Operations Order (OPORD) for the Active Shooter.

2. This OPORD is effective for planning upon receipt.

3. The office of primary responsibility for this OPORD is XX SFS/CC.

XXXXX X XXXXX, XXX, USAF

Commander, XXth

XXTH (Insert Installation Designation Here) XXX AFB, XX

01 XXX 10

(Insert Installation Designation Here) OPORD xx-xxx

1. SITUATION: Active Shooter on XXX AFB or other Military Interests.

a. Enemy Forces. An active shooter is defined as "An individual actively engaged in killing or

attempting to kill people in a confined and populated area; in most cases, active shooters use

firearms(s) and there is no pattern or method to their selection of victims.”

1) Characteristics of an Active Shooter:

a) Desire to kill/seriously injure without concern for his/her safety

b) Normally has pre-designated victims

c) Engages additional victims while searching for pre-designated victims

d) Shooter will not flee when law enforcement enters building

e) Typically will not stop until apprehended, disabled or killed

b. Friendly Forces. XX SFS is tasked with Base Defense functions for XXX AFB. XX SFS

will respond to all active shooter incidents regardless of location or jurisdiction for XXX AFB.

XX SFS patrols will be followed by XX (Local PD) in areas of proprietary jurisdiction or as

dictated by memorandum of agreement/understanding. Proprietary jurisdiction for active shooter

purposes will be limited to XXX (Identify areas). XX (Local PD) will assume command in these

areas as the situation dictates.

92 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

1) Follow-on FF. XXth Civil Engineering Fire Department, XXth Medical Group, Air Force

Office of Special Investigations (AFOSI), XX (Local PD), Emergency Services Team (EST),

and Explosive Ordnance Disposal (EOD) Support as required.

c. Environment.

1) Terrain: (Localize) Most likely an urban/commercial environment with occupied buildings

and parking lots with vehicles. Varying terrain conditions may be present.

2) Weather: (Localize) During the summer months, May – October, you can expect very

humid/high temperatures with the possibility of thunderstorms mixed with rain and lightning

with the possibility of severe weather such as tornado activity. During the winter months,

November – April, you can expect extremely cold temperatures with the possibility of ice and

snow on frozen surfaces.

3) Civil Considerations: Large rapidly gathering crowds consisting of civilian news media

personnel, spectators, and family members attempting to get to the scene to obtain information

concerning family members.

d. Assumptions

1) Command and Control (C2) on-scene will be hindered by the chaos, speed of events.

2) Victims will hinder response actions (i.e. walking wounded, scared)

3) There will be multiple casualties

4) 1-2 shooter(s)/single location

5) Shooter will likely have DOD affiliation

6) Shooter is not concerned with personal safety

7) Event will occur in highly populated area

8) Heightened media and public interest will occur.

2. MISSION: XX Security Forces (SF), all available except PL 1 dedicated Patrols, will

immediately respond, intervene, and stop an active shooter on XXX AFB in order to prevent

further injury or loss of life and reestablish a secure environment.

3. EXECUTION: Commander’s Intent: You will immediately and decisively respond to any

Active Shooter situation involving XXX AFB to neutralize the hostile activity and minimize the

number of victims.

a. Operations. SF will maneuver rapidly to the general location of the incident by any means

available (vehicles, on foot, etc.). The SF Flight Chief/CC will immediately take control of the

radio net and proceed to the location and assume initial Incident Command (IC). The ECC or

Base Defense Operations Center (BDOC) if not co-located, will establish communications with

the Fire Department and Medical response elements and provide an initial safe staging location.

Responding personnel will enter the area IAW installation SOPs. The first SF on-scene will

maintain tactical command and direct additional on-scene forces until the Flight Chief/CC

arrives. This individual(s) will quickly and decisively apply the appropriate level of force to any

hostilities using proper judgment and minimize civilian casualties. (It is highly recommended

the first on-scene SF immediately attempt to neutralize the threat in order to prevent further

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 93

casualties). Once the SF Flight Chief or higher arrives, he/she will maintain IC position

(exterior), while SF individual(s) assault objective. The SF IC will ensure they link up with Fire

Chief at safe distance to coordinate follow on/recovery operations. Additional follow-on SF

personnel will be utilized for (interior/exterior) containment and Rescue Teams will be utilized

per direction of the IC. Execution is broken into two distinct phases:

b. Response. Incident response initiates with the first report of an active shooter. This phase of

operations will focus solely on containment, neutralizing the enemy, and staging for triage.

Incident response usually only lasts between 10 to 15 minutes but is not solely based upon time.

All FF efforts during this phase will focus on stopping the shooter from injuring innocents.

Initial IC will be the senior SF member on scene.

1) On demand, all SF forces not dedicated to PL 1 assets will be immediately available for a

mobile response to the situation. Under ideal conditions the initial contact team will consist of a

4- person SF fire team configuration using cover and concealment typically found in an urban

setting. Two-person SF teams may be introduced into the environment until the 4-person SF fire

team configuration is achieved. (It is highly recommended the first on-scene SF immediately

attempt to neutralize the threat in order to prevent further casualties). Quickly assemble a 2 or 4

person fire team at the designated quick rally point and move to contact. Responders must have

a firm grasp of the situation and a circumstance, however preventing further loss of life is the

main priority and speed is essential and cannot be compromised. The longer it takes to move to

contact = more victims.

a) BDOC or ECC SF personnel will notify all available SF members

b) SF personnel will coordinate with ECC for response with Fire and Medical (safe rally point)

c) BDOC or ECC SF personnel will notify command post. Include instructions for affected area

and base lockdown recommendations. Command post will notify Installation Commander

and/or EOC/CAT Director and initiate mass-notification processes and initiate other operational

plans as dictated by the circumstances of the event.

d) BDOC or ECC SF personnel will direct closure of Inbound traffic lanes/Leave outbound open

e) BDOC or ECC SF personnel will notify and recall EST (if applicable)

f) Notify and recall EOD and Military Working Dog (MWD) teams. (2) Delayed entry can be

considered if the shooter is visible, passive, and compliant with instruction. Proper use of force

will be observed even if the situation is tense, and the responding personnel will de-escalate their

use of force as necessary. If the shooter is apprehended, sequester the subject and immediately

contact AFOSI. Do not question the subject or read the subject his or her Article 31 rights (Fifth

Amendment rights for civilians). Ensure you document and provide all spontaneous utterances

to the AFOSI

2) Response to an active shooter takes precedence over all other response options (with

exception of PL 1/2 Covered Wagon situations). Personnel assigned to PL 1 security will remain

at their primary duty location, and will not be dispatched to active shooter scenarios.

3) In the unlikely event that an active shooter event occurs at more than one location, the senior

SF will determine response actions based on available units/resources. Response priority should

go to the location where the most loss of life may occur.

94 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

4) The Fire Chief will respond as directed by ECC, in normal response vehicle by an approved

route to the initial rally point (IRP) and meet up with the SF IC. ECC will provide this IRP

location to the Fire Chief. At this point, IC is transferred to the Fire Chief, and tactical control is

maintained by senior SF

5) All other Fire and Medical personnel will be directed by ECC to the initial safe staging

location as established by the IC. The IC and senior SF will call for these additional forces as

needed to treat wounded.

6) ECC will coordinate initial response for emergency service response and in coordination with

the IC and senior SF establish an IRP for them to utilize. The IC and senior SF will pair up for

the duration of Recovery Operations. This location will be provided to the IC via ECC upon

initial notification.

7) Upon notification, any available SF member (except PL 1 posts) with means (i.e. a vehicle, or

by running if location is short distance away) will maneuver to the designated IRP and notify

ECC upon arrival.

8) BDOC or ECC SF personnel will maintain situational awareness and attempt to plot all

information, and keep track of what units are available and where they are positioned. They will

provide this information to the IC as requested.

9) The IC will be responsible for accountability/control of all personnel in the affected area; this

includes accountability of both injured and uninjured personnel.

10) The EOC/CAT will initiate accountability processes through Unit Control Centers (UCC).

11) The BDOC or ECC SF personnel will initiate Operational Reporting to the command post

who will report the incident in accordance with AFI 10-206, Operational Reporting, to higher

headquarters.

12) Procedures to handle media and public interest must be addressed. The IC and ECC will

promptly notify the host installation Public Affairs office to address media and public interest in

the incident. Public Affairs will adhere to crisis communications procedures outlined in AFI 35-

104, Media Operations.

13) The decision to switch to recovery operations will be made collaboratively by the EOC and

IC based upon situations on the ground. If the shooter cannot be located and shooting has not

occurred for a reasonable period of time, Rescue Teams will be utilized to clear area and seek out

and treat and remove the wounded. SF will clear the area and provide protection/cover to

fire/medical personnel that are seeking, treating, and removing wounded personnel. This

procedure will be utilized until area is deemed safe or the shooter is neutralized. IC will

maintain control of all medical response personnel and have them staged at safe distance as

needed to operate under his/her direction for treating wounded and assembling Rescue Teams.

The senior SF makes final determination on allowing rescue teams entry into affected area if the

shooter is still at large. (Note: Treatment of wounded by rescue teams may occur during this

portion of response but will not be FF Main Effort until recovery operations begin).

c. Recovery Operations. Once the shooter is neutralized, the focus shifts to full scale recovery

operations. Recovery Operations will be handled according to XX (Insert base mass casualty

plan reference). However, the lead investigative agency will be the final authority for entry

control to the crime scene area(s). AFOSI or the FBI will obtain jurisdiction of the crime scene.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 95

Crime scene contamination needs consideration but will not be the primary focus while wounded

are being treated and evacuated. The senior SF will maintain tactical control throughout

Recovery Operations and pay particular attention to screening witnesses to ensure site security is

maintained and no other threats are present.

d. Tasks to Units

1) The initial patrol will be responsible for assuming initial IC responsibilities, but this will not

prevent them from taking immediate action to neutralize the shooter.

2) Follow-on patrols will report to this initial IC, until the Flight Commander, Flight Chief or

other flight leadership assumes IC responsibilities.

3) All further tactical dispatch responsibilities will rest with this IC.

4) The IC will maintain command and control of all units until the termination of the situation,

or relief by higher SF squadron leadership.

5) The IC or senior SF will determine, based upon the scenario, the specific needs for

containment once the Entry Team(s) is moving to contact. Mission, Enemy, Terrain, Troops

available, Time, and Civilian considerations (METT-TC) will dictate appropriate use of follow-

on SF. Some SF patrols should be used to cut-off movement around hostile area--ever shrinking

the killer’s operating environment. A cordon should not be established during initial response if

it delays the Entry Team in any manner. Speed and movement to contact are the primary focus.

A cordon may be established as follow on forces arrive at the senior SF’s discretion. A cordon is

also critical during the recovery phase after the area is deemed safe.

6) Fire and medical personnel will report to the IC.

7) Fire and medical personnel may be required to enter a building to evacuate wounded prior to

the shooter being neutralized. If deemed amenable, they will be provided a safe ingress and

egress by the senior SF and IC.

8) Local authorities as outlined in MOU/As.

e. Coordinating Instructions

1) This order goes into effect immediately upon notification of an Active Shooter situation to

ECC.

2) Commander’s critical information requirements:

a) Status of situation, such as dead, injured, missing (DIM) report, location of incident, size of

population present, description of shooter, weapons involved.

b) Any situation that is negatively impacting response.

c) Any impediment to the mission or critical resources, particularly PL 1.

d) Any arrival of media.

3) Force will be used IAW AFI 31-117.

4. SERVICE/SUPPORT:

a. (Reference existing MASCAS plan or copy information from existing plan and insert here)

96 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

5. COMMAND & SIGNAL:

a. Command: Fire and Emergency Services will be the IC throughout, while Security Forces

owns tactical C2 throughout. The senior SF will coordinate with the IC on medical or evacuation

issues.

b. Signal: All radio traffic pertaining to active shooter events will be coordinated through the

ECC until the initial IC takes control of the net. After taking control of the net, ECC will only

reassume control when the IC terminates and clears the net, or upon receipt of a Covered Wagon

or other event concerning PL 1 resources.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 97

Attachment 9 (Added-AFMC)

ACTIVE SHOOTER RESPONSE EXERCISE PLAN

Figure A9.1. (Added) Active Shooter Response Exercise Plan

AIR FORCE MATERIEL COMMAND

This exercise plan is intended to be flexible to adapt to varying levels of installation support and

participation. Commanders have the prerogative to adjust this plan as necessary to meet local

installation capabilities and mission needs.

Table of Contents

1. Planning. This type of training must be conducted with as much realism as possible.

Installation Commanders are encouraged to facilitate this exercise plan with as much base wide

participation as practical to include conducting associated training and exercises at various times

of the day and night, during both work-days and weekends, as well as during periods of

inclement weather to more closely replicate potential real-world operating scenarios. Consider

closing or limiting base activities to the greatest degree possible during these exercise scenarios.

Coordination with civil authorities may be necessary and must be considered.

1.1. By creating a realistic training and exercise environment, individuals and teams will be

able to closely simulate the high stress environment that is anticipated during an Active Shooter

scenario. This directly translates to a higher probability of success in response and fewer

casualties.

1.2. Utilize dye-marking munitions, paint ball or similar capabilities to conduct the tactical

response portion of training and exercises. While not always practical for base wide exercises

where the safety of role players and independent observers is a concern, consideration should be

given to conduct this style of training on elements of the response in a separate and safe

designated training area. Apply Operational Risk Management principles prior to incorporating

these capabilities into training.

1.3. Quality training and exercising should simulate the stress of the situation and be as realistic

as possible.

2. Establishing the Exercise Environment.

2.1. Cordon off the exercise play area. This cordon should only have one entry control point

and all personnel processing into and out of the exercise play area must do so through this entry

control point. There must be three distinct zones.

2.1.1. Unsafe Zone. This is the area outside the cordon. This is where all live ammunition,

real- world weapons, etc. are kept to ensure they are not introduced into the play area.

2.1.2. Safe Zone. This is the area within the cordon where the actual training takes place. This

area must be sterile and nobody can enter this area without a safety inspection. If using dye-

marking munitions, Airsoft, or paintball, all personnel must be equipped with proper safety gear

prior to entering this area. All personnel must be re-inspected when re-entering the Safe Zone

after departing.

2.1.3. E x e r c i s e Staging Area. This is the area where all training related weapons,

munitions, and equipment are maintained and segregated. This area must be free from the impact

98 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

area of marking cartridges, Airsoft, or paintball rounds.

2.2. Ensure all on-duty armed forces, as well as the general base populace, are aware of the

exercise conditions, locations, and safety rules. This will ensure a real world response is not

initiated to the exercise play area and reduce potential false alarms or “concerned citizen” calls to

law enforcement.

2.3. Utilize service weapons with dye marker conversion kits and/or inert training weapons for

training and exercise weapons. If inert training weapons are not available, and service weapons

without conversion kits are utilized ensure supervisors or Wing Inspection Team (WIT) members

thoroughly inspect and clear all weapons to ensure they are safe prior to entering the exercise

play area. You can also consider using service weapons with blank munitions and blank

adapters. If blank munitions are utilized, ensure blue tape is used to mark the weapon and

magazine. CAUTION: All appropriate weapons clearing procedures must be followed and

adhered to pre-exercise, trans-exercise, and post-exercise in accordance with AFMAN 31-229,

USAF Weapons Handling Manual. Specific weapons safety monitors should be identified prior

to exercise initiation.

3. Conducting Exercises. All exercises should be broken down into two distinct phases. The

first phase is focused on specifically targeting smaller elements of the overall response to an

Active Shooter. This phase is referred to as “Battle Drills” and should be trained, exercised, and

evaluated at the functional level. The second phase is focused on integrating all functional area

response elements and should be trained, exercised, and evaluated at the installation level. This

phase is referred to as the “Scenario”.

3.1. Battle Drills. Each functional area should conduct Battle Drills prior to any installation

wide scenario. Examples of battle drills include C2 table-top exercises, Security Forces building

entry and clearing, Medical triage, Fire and Emergency Services (FES) timed response, off-base

agency telephonic notification procedures, recall procedures, etc. Each functional area must

assess the skill set and capability they are tasked to bring to the response and train, exercise, and

evaluate those areas independent of the installation wide scenario.

3.2. Scenario. Scenarios replicate actual situations and put first responders in a realistic

environment that they will likely face. Scenarios are generally more time consuming, difficult to

set up and orchestrate, and require more control to guarantee participant safety. WIT should

manage the scenario, but must closely coordinate with the Incident Commander and all functional

areas to ensure all areas are adequately evaluated. It is strongly recommended that key functional

representatives from Security Forces, AFOSI, Fire and Emergency Services, Medical, and the

installation command post augment the WIT to provide functional expertise to the evaluation.

4. Required Support. The following requirements are typical to facilitate a realistic training

environment. WIT can adjust and adapt required support to accommodate their specific exercise

plan.

4.1. Ballistic helmets.

4.2. Concealable body armor (for on-duty Security Forces).

4.3. Individual body armor (for all follow-on responding forces).

4.4. Service weapons. Properly cleared and marked with blue tape to indicate they are safe to

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 99

enter the exercise play area.

4.5. Optional. Airsoft weapons/munitions for use by all exercise first responders and opposing

forces. Airsoft weapons/munitions are commercial-off-the-shelf training solutions to create a

more realistic training environment. Use of Airsoft weapons/munitions or dye-marking/paintball

cartridges will result in additional safety requirements. If this equipment is used, the following

additional safety considerations must be made:

4.5.1. All personnel in the exercise play area, to include observers and evaluators must be

equipped with full-body clothing coverage (no exposed skin), protective gloves, protective safety

mask and neck protector, and groin protection. These weapons are capable of propelling small

plastic projectiles at speeds of greater than 400 feet per second. Contact with exposed skin at

close ranges can result in penetration and/or cutting or bruising.

4.5.2. The benefits of Airsoft/dye-marking/paintball weapons are the obvious realism it

provides as well as mentally reinforcing sound cover and concealment tactics through pain

feedback.

4.6. Portable stereo or sound system. Used to simulate the chaotic environment; this system

can be used to broadcast screaming, gunfire, sirens, alarm sounding, etc. Used effectively, this

can dramatically add to the realism of the exercise environment.

4.7. Facility. The facility should match the scenario. For example, a school, auditorium, or

theater could be used to simulate an Active Shooter scenario in a mass-gathering area, while a

small office on the second or third floor of a squadron facility could be used for an Active

Shooter scenario in the workplace.

4.8. Optional: Video cameras. Should be strategically placed throughout the scenario to capture

information for after-action review and lessons learned.

4.9. Optional: Strobe lights. Strobe lights have been proven effective to add stress to the

exercise environment and distract/disorient first responders.

4.10. Manpower Requirements. The following breakout is provided for reference only. The

WIT should feel free to adjust these manpower requirements as necessary to facilitate a realistic

training environment.

4.10.1. Role players.

4.10.1.1. Personnel escaping the building, contributing to stress, or distracting first responders

(8-12 personnel).

4.10.1.2. Victims with realistic injuries which include visible blood and wounds (5-7

personnel).

4.10.1.3. Scared, potential victims hiding in the facility (10-15 personnel).

4.10.1.4. Opposing Forces/Active Shooter (1-2 personnel. The key is unpredictability in the

scenario. Vary the number of opposing forces).

4.10.2. Wing Inspection Team (WIT). All WIT members are responsible for inspecting the

training area, training weapons, and participants prior to the exercise initiation. All WIT have the

authority and discretion to terminate the exercise at any time due to safety infractions.

4.10.2.1. WIT Interior Observer/Controllers (2-3 personnel. Recommend one each from SF,

100 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

Fire and Emergency Services (FES), and Medical at a minimum). These personnel will be

responsible for weapons safety in the Unsafe Zone, controlling role players, ensuring all

participants have proper personal protective equipment, terminating scenarios, and authorizing

removal of safety gear upon deeming the area.

4.10.2.2. WIT Exterior Observer/Controller (2-3 personnel. Recommend one each from SF,

FES, and Medical at a minimum). These personnel are responsible for controlling access to the

Exercise Staging area and Unsafe zone, conducting personal safety checks, and providing safety

briefings to participants.

4.10.2.3. Optional: Video Manager or Cameraman (1-2 personnel).

5. Additional Considerations. WIT must ensure that water and medical support is available for

all exercise Scenarios. WIT must also ensure that a standardized exercise safety message is

established and known by all participants that will immediately terminate all exercise actions

when broadcast over the radio network or spoken verbally at anytime during the exercise.

6. Exercise Scenario Set-up and Execution. For inside scenarios, a facility with numerous

hallways and rooms is essential. The facility should have a design that allows for several

different configurations and facilitates numerous “kill zones” and “fatal funnels”. It should also

provide a few locations for the opposing force (aka Active Shooter) to take their “last stand”.

Note: You must make sure each of your scenarios are “winnable”. If responding forces do

everything correct, they must receive positive feedback and results. Failures must be addressed

as learning opportunities.

6.1. Setup tables, chairs, and other obstacles throughout the facility. Some can be turned over or

sporadically placed to simulate the chaotic environment of people fleeing for safety or

barricading themselves in a safe room.

6.2. Communications for WIT. Preferably use a different frequency from first responders while

maintaining the capability to monitor the actions of first responders. Consider using earpieces for

WIT to maintain private communications and eliminate the opportunity for exercise participants

to hear details of the scenario.

6.3. Conduct Battle Drills or dry runs with all role players. Exercise lead(s) will brief role

players to NOT deviate from the exercise scenario. Utilize a ““practice” first responder to assess

your exercise timelines. Knowing the amount of time that each exercise evolution takes will

allow EET to pre-determine how many evolutions can be conducted within a given exercise

training period.

6.4. All first responders should undergo a 5-10 minute physical fitness routine such as running

in place, push-ups, or jumping jacks to simulate an elevated heart rate immediately prior to

exercise initiation. This will replicate the physiological and psychological stress that they would

encounter during a real world response.

6.5. Example Scenario #1.

6.5.1. Place role players in predetermined positions and provide them with a specific script to

follow. Ensure the scene is chaotic and challenges first responders to think and discriminate

friend from foe throughout the response.

6.5.2. Turn on building alarms, broadcast screaming and gunfire through the radio or sound

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 101

system, and turn on emergency response sirens.

6.5.3. Call in to ECC the following (or similar) exercise initiation statement: “EXERCISE,

EXERCISE, EXERCISE. THIS IS WIT WITH AN EXERCISE INITIATION MESSAGE.”

SHOTS FIRED AT XXXX

(Add Location). ESCAPING PERSONNEL

INDICATE A CO-WORKER, WHO RECENTLY RECEIVED NOTIFICATION THAT HE

WOULD BE MEDICALLY BOARDED DUE TO LINGERING EFFECTS FROM HIS LAST

DEPLOYMENT, JUST PULLED OUT A HANDGUN AND SHOT HIS SUPERVISOR AND

THEN STATED “IF I’M GOING, THEY ARE ALL GOING.‖ NUMEROUS GUNSHOTS

HAVE BEEN HEARD COMING FROM THE FACILITY. THE INDIVIDUAL IS

REPORTEDLY WEARING XXXX. THE LAST KNOWN LOCATION OF THE SHOOTER

WAS IN THE HALLWAY HEADING TO THE COMMANDER’S OFFICE.”‖

6.6. Example Scenario #2.

6.6.1. Place role players in predetermined positions and provide them with a specific script to

follow. Ensure the scene is chaotic and challenges first responders to think and discriminate

friend from foe throughout the response.

6.6.2. Turn on building alarms, broadcast screaming and gunfire through the radio or sound

system, and turn on emergency response sirens.

6.6.3. Call in to ECC the following (or similar) exercise initiation statement: “EXERCISE,

EXERCISE, EXERCISE. THIS IS WIT WITH AN EXERCISE INITIATION MESSAGE.

(Utilize a role player from the base hospital or clinic to call this in). (** CRYING

HYSTERICALLY**) WHILE I WAS ON DUTY AT THE CLINIC, I HEARD AN

ARGUMENT THAT STARTED IN PRIMARY CARE. THE NEXT THING I KNOW A GUY

WITH A BIG GUN STARTED SHOOTING PEOPLE IN THE WAITING ROOM. THERE IS

BLOOD EVERYWHERE AND PEOPLE RUNNING EVERYWHERE! I THINK HE WAS

WEARING ABUS. HURRY…PEOPLE ARE DYING!”

6.7. Example Scenario #3.

6.7.1. Place role players in predetermined positions and provide them with a specific script to

follow. Ensure the scene is chaotic and challenges first responders to think and discriminate

friend from foe throughout the response.

6.7.2. Turn on building alarms, broadcast screaming and gunfire through the radio or sound

system, and turn on emergency response sirens.

6.7.3. Call in to ECC the following (or similar) exercise initiation statement: “EXERCISE,

EXERCISE, EXERCISE. THIS IS WIT WITH AN EXERCISE INITIATION MESSAGE.

REPORTS OF SHOTS FIRED AT THE SCHOOL. A 911 CALL HAS BEEN RECEIVED

AND THE CALLER INDICATED THAT A STUDENT, WHO WAS RECENTLY

SUSPENDED FOR BRINGING EXTREMIST LITERATURE AND POSSIBLE BOMB-

MAKING MATERIALS TO SCHOOL, HAS JUST ENTERED THE CAFETERIA AND

BEGAN SHOOTING STUDENTS AND TEACHERS. THE GUNMAN IS OUTSIDE THE

CAFETERIA DOORS AND IS SHOOTING ANYONE THAT ATTEMPTS TO LEAVE OR

RENDER AID.”

102 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

6.8. Example Scenario #4.

6.8.1. Place role players in place and provide them with a specific script to follow. Ensure the

scene is chaotic and challenges first responders to think and discriminate friend from foe

throughout the response.

6.8.2. Turn on building alarms, broadcast screaming and gunfire through the radio or sound

system, and turn on emergency response sirens.

6.8.3. Call in to ECC the following (or similar) exercise initiation statement: “EXERCISE,

EXERCISE, EXERCISE. THIS IS WIT WITH AN EXERCISE INITIATION MESSAGE. AN

UNKNOWN GUNMAN ENTERED THE BASE EXCHANGE AND OPENED FIRE ON

PATRONS WITH A SHOTGUN AND SEVERAL HANDGUNS. THE GUNMAN STATED

THEY HAVE A BOMB STRAPPED TO THEIR BODY AND WILL USE IT IF ANYONE

ATTEMPTS TO STOP THEM. THE GUNMAN IS DRESSED IN XXXX AND WAS LAST

REPORTED SEEN WALKING FROM THE FRONT DOORS OF THE BASE EXCHANGE

OUT INTO THE PARKING LOT. SHOTS CAN STILL BE HEARD RINGING OUT IN THE

PARKING LOT.”

7. Exercise Evaluation. Each exercise must first and foremost be evaluated on overall mission

accomplishment. The primary mission of first responders during an Active Shooter scenario is to

immediately locate and eliminate the threat(s) while mitigating any further loss of life. Only

secondary consideration should be given to functional area TTPs. Remember, as WIT, you must

make sure each of your Scenarios is “winnable”. If responding forces do everything correct,

they must receive positive feedback and results. Utilize the following as a guide for evaluating

the overall exercise (Localize as necessary):

7.1. Did first responders react and respond in accordance with their agency specific TTPs?

7.2. Did the installation implement its operational plan as outlined in the Installation

Emergency Management Plan or Integrated Defense Plan?

7.3. Was Incident Command properly transitioned throughout the exercise in accordance with

Emergency Management directives and local plans?

7.4. Were all on- and off-base support agencies properly notified and was the overall response

effectively coordinated by the Incident Commander? (Consider further assessing MOU/MOA

effectiveness as locally applicable).

7.5. Were communications between all responding agencies effective?

7.6. Were base notification and alerting systems, if utilized effectively employed to notify all

personnel of the threat (i.e. Giant Voice)?

7.7. Specific Response Actions.

7.7.1. Did the initial response element immediately assess the scene and enter the environment

to eliminate any active threat regardless of team composition or equipment?

7.7.2. Did the response element contain the scene?

7.7.3. Did the response element establish a safe area to account for personnel?

7.7.4. Did the response element establish a triage area?

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 103

7.7.5. Did SF assume initial Incident Command and relinquish overall Incident Command to

FES upon arrival?

7.7.6. Were rescue teams effectively utilized to clear the entire area prior to deeming it safe and

entering into Recovery Operations?

7.7.7. Did the senior SF maintain C2 of tactical operations throughout the scenario?

7.7.8. Did the Incident Commander maintain C2 of responding medical personnel and stage

them in a safe area until the affected area is deemed safe?

8. Anticipated Learning Points

8.1. Fighting the instinct to find cover and concealment. The inability to get to traditional cover

will create mental difficulties for first responders and potentially hinder their initial response

actions. Responding forces are simply not used to quickly rushing to the sound of gunfire while

treating cover and concealment as a secondary consideration. Repetition and Battle Drills will

greatly improve this reaction and the comfort zone of the first responders.

8.2. Fighting the instinct to immediately assist wounded personnel. The primary responsibility

of the initial response element is to bypass the wounded and eliminate the threat. This counters

much of our military training. Again, repetition and Battle Drills will establish the mental

preparedness to deal with this type of environment. This applies to responding medical personnel

as well when challenged with standing by until the area is deemed safe or All Clear by the

Operations Section Chief and Incident Commander.

8.3. Identification of targets. Chaotic close-quarters engagement is one of the most challenging

scenarios for first responders. It is difficult to discern friendly forces from opposing forces. First

responders must be trained to recognize behavioral signs that distinguish Active Shooters from

friendly personnel. Specifically, hands kill. Watch hands and react accordingly. While not

intended, responding forces must be mentally ready to deal with the possibility of innocent

bystanders being caught up in the middle of a fire fight or active shooting engagement.

8.4. Fighting the Win or Lose mentality. Reinforce to first responders that killing or being killed

isn’t the only measure of success. Speed and decisiveness are the primary drivers of success and

the limiting of innocent loss of life is the primary measurement of success. If a slow, methodical

response results in successful termination of the Active Shooter, but an additional 15 innocent

personnel were killed due to the slow action of responding forces, was it a success?

8.5. Repetition establishes confidence. With each evolution of training and exercising,

confidence and cooperation will increase. The initial evolution WILL be chaotic and likely less

effective than desired. At a minimum, the WIT should be prepared to conduct at least three

evolutions of an exercise during a given session. Failure to do this can reinforce bad behaviors or

practices and potentially degrade the installation’s overall response capability.

8.6. Do not assume that off-base support will be provided as expected. Exercise it. Often,

MOAs and MOUs, when exercised, will reveal shortfalls or even added benefits that weren’t

previously considered.

8.7. Equipment. Through each exercise evolution, observe and record equipment requirements.

Were breaching kits needed? Were FES and Medical equipment adequate to the task? Was

104 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

friendly armament adequate? Use this opportunity to determine if your installation is properly

equipped and prepared to respond to the varying conditions an Active Shooter presents.

9. Lessons Learned. It is essential that all exercises are conducted and recorded with the intent

to learn from previous lessons, both real world and exercise based. In order to do that, WIT must

capture lessons learned from every exercise and upload them to JLLIS. Take care to properly

safeguard the specific Tactics, Techniques, and Procedures of responding forces. Where

appropriate, restrict access to these details.

AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014 105

Attachment 10 (Added-AFMC)

BRIEFING TEMPLATES AND LESSON PLANS

Figure A10.1. (Added) Briefing Templates and Lesson Plans

Note: Installations are encouraged to add to these presentations and localize these briefings.

Historical Review of Active Shooter Case Studies, Psychological Profile of an Active

Shooter, Resiliency and Response to Active Shooter Threat briefings are located at the HQ

AFMC A6/7 EIS site:

https://cs.eis.afmc.af.mil/sites/AT-

FP/AT%20Reference%20Documents/Forms/AllItems.aspx?RootFolder=%2fsites%2fAT%2dFP

%2fAT%20Reference%20Documents%2fActive%20Shooter%20CONOPS%5fAFMC&

Security Forces Response to an Active Shooter. Due to the Law Enforcement Sensitive nature of these TTPs great care must be taken to ensure this information is not released outside of law enforcement channels. For access to the AFMC standardized TTP lesson plans and associated training presentations for Security Forces Response to an Active Shooter, contact AFMC/A7SO at DSN 787-6224/9872/3127.

This Countering the Internal Threat of Violence and the Active Shooter guidance covers the

entire spectrum of violent acts within our installations, while stressing identification of the

behavioral indicators which typically precede those violent acts. This is critical, as identification

of behavioral indicators can result in intervention before the actor has the opportunity to carry out

their act of violence. The Department of Defense (DOD) review of the Fort Hood incident and

the subsequent Air Force Follow-on Review recognized that identifying internal threats requires a

new concept for the operating environment.

106 AFMAN31-201V4_AFMCSUP_I 4 JUNE 2014

Attachment 11 (Added-AFMC)

ACTIVE SHOOTER “LOCKDOWN” PROCEDURES

Figure A11.1. (Added) Active Shooter “Lockdown” Procedures

Immediate actions:

1. Move quickly away from the threat, if able.

2. Shout/echo the order “LOCKDOWN, LOCKDOWN, LOCKDOWN”.

3. Relocate from hallways or other common areas to a secure location.

4. Turn off lights and barricade doors with available items (desks, bookcases, file cabinets, etc.)

5. Take cover inside the secured area or lie flat on the floor.

6. Stay clear of doors and windows and silence cellular telephones or other similar devices.

7. If outside the affected area, find cover and stay there. DO NOT ATTEMPT TO ENTER

THE AFFECTED AREA FOR ANY REASON.

8. If you cannot find a secure location, either play dead or attempt to overpower the shooter*.

(*Personnel should only attempt to overpower the shooter as a last resort, using the minimum

force necessary to subdue the threat up to the use of deadly force.)

Once in a secure area:

9. Contact the Emergency Control Center (ECC) at XXX-XXXX and provide the following

information:

Your name, location (building/room number) and contact number.

Number of friendly personnel at your location and their status (wounded, dead, etc).

Type/number of weapons (handgun, rifle, shotgun, automatic weapon, etc).

Description or identity (if known) of shooter.

Direction of travel and /or location of shooter (if known)

10. Attempt to rescue other personnel/treat injured. (This is only to be attempted if it can be

done without endangering yourself or others in the attempt. If there is any doubt, do not attempt

this action).

Once SF units have control of the area:

11. Remain calm and follow all directions/commands from Security Forces personnel

12. Always keep hands visible.

13. Do not attempt to grab or make any quick movements towards responding units.