Fort Detrick will execute an aggressive AT Program to protect its personnel, their families, facilities, and materiel resources against terrorist attack. Threat information fusion will drive AT measures and course of action. During the pre-incident phase we will deter attack by establishing a layered defense; one that maintains access control at the perimeter, implements baseline AT physical security measures as FPCON levels escalate, and establishes security for identified critical assets.


Essential to this defense approach will be the implementation of access control procedures into each critical asset and adoption of DoD AT Construction Standards such as stand-off distances and hardening practices. Emphasis during this phase will be on threat information gathering and analysis, developing detailed, integrated and supporting AT plans, and training and exercising installation plans. If an attack occurs, our efforts during the incident phase will focus on executing incident response procedures designed to mitigate and contain the attack.


The post-incident phase will concentrate on implementing consequence management procedures to restore normal operations at quickly and efficiently as possible.


The desired end state is a comprehensive AT program that effectively:

(1) saves lives and prevents human injury

(2) minimizes mission degradation, and

(3) protects government property.






August is Antiterrorism Awareness Month. Terrorism is an enduring, persistent, worldwide threat to Army forces. Extremist ideologies and separatist movements continue to have an anti-western and anti-U.S. orientation which threatens our Nation, and our Army must sustain a strongdefensive posture to prevent terrorist acts and protect Army critical assets (people, critical infrastructure and sensitive information). Complacency (if present) provides the enemy with a critical intangible of war - opportunity.

The Army understands the security challenges and threat opportunity and is fully capable of managing complacency when and where necessary. Antiterrorism provides the defensive element of the Army combating terrorism program. Effective antiterrorism measures integrate a multitude of security programs which ensure protection of our people, information, infrastructure, installations, facilities, and forces.

As the Army restores balance and builds essential capacity for the future, four Army imperatives frame the work ahead: sustain, prepare, reset and transform. These imperatives cut across our entire force. As such, effective antiterrorism plans, information management, counter-measures, training, education, awareness, and resources must integrate holistically to support the Army imperatives.

Be aware and report concerns. NOTE: If you believe an act of terrorism is imminent, call 9-1-1! Being aware and reporting your concerns can help identify and prevent threats to our national security and local  community. There are some thingseveryone can do to help prevent terrorism:

  1. Be observant and attentive.
  2. Remember details about people, places, conversations and vehicles.
  3. Report your concerns to authorities -- installation military police, local police, or Army CID Crime Tips:


Trust your instincts. If it doesn't look right, sound right or smell right, report it.

Countering Terrorism

Countering Terrorism

Countering terrorism requires your help. Only you know who or what belongs - or doesn't belong in your building, neighborhood, or work center. The simple act of recognizing suspicious behavior and reporting it to authorities could thwart terrorist attacks and save lives. Please help by being alert for and reporting any of the following:



Someone recording or monitoring activities using cameras (either still or video), note taking, drawing diagrams, annotating on or creating maps, and using binoculars or other vision-enhancing devices. An element of this activity could also include mapping out routes and determining the timing of traffic lights and flow.



People attempting to get information. These attempts may be made by mail, fax, telephone, e-mail or in person and may seem like totally innocent questions about what you do and where you work.


Tests of security:

Any attempt to measure reaction times and actions by police. A test of security can be disguised as a simple mistake such as a vehicle approaching a security barrier and then turning around or an attempt to circumvent access control procedures in order to assess strengths and weaknesses of police and equipment.


Acquiring supplies:

Purchasing or stealing police and military uniforms, emergency responder type vehicles (such as police cars and ambulances), building passes and other identification media or the equipment to manufacture them.


Dry run or practice:

People or vehicles appear to have been purposely placed in a particular position or area. This is especially true when planning a kidnapping, but it also pertains to bombings.


Actual deployment of people and assets:

People and supplies getting into position to conduct an attack. This is the last chance to alert authorities before the attack occurs.


Suspicious persons out of place:

People who don't seem to belong or fit in the surrounding environment, especially if involved in any of the above listed activities.

Closing Tab

OPSEC Awareness Training

USAG Operations Security (OPSEC) Training for Contractors

Requirement: To ensure USAG Operations Security (OPSEC) program is in compliance with AR 530-1. All Departments of the Army Personnel active component, reserve component, DA civilians, and DOD contractors are required to complete mandatory OPSEC training on an annual basis.


Click Here for OPSEC Awareness Training



Closing Tab

Threat Level Definitions

Threat Level Definitions


FPCON: Current Fort Detrick Force Protection Condition



Applies when a general global threat of possible terrorist activity exists and warrants a routine security posture.



Applies when there is an increased general threat of possible terrorist activity against personnel or facilities, the nature and extent of which are unpredictable.



Applies when an increased or more predictable threat of terrorist activity exists.



Applies when an incident occurs or when intelligence is received indicating some form of terrorist action or targeting against personnel or facilities is likely.



Applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that, terrorist action against a specific location or person is imminent.

Closing Tab

National Terrorism Advisory System

National Terrorism Advisory System (NTAS)



NTAS Alerts 

Imminent Threat Alert

Warns of a credible, specific, and impending terrorist threat against the United States ArmyStates.    

Elevated Threat Alert       

Warns of a credible terrorist threat against the United States.


After reviewing the available information, the Secretary of Homeland Security will decide, in coordination with other Federal entities, whether an NTAS Alert should be issued.


NTAS Alerts will only be issued when credible information is available.


These alerts will include a clear statement that there is an imminent threat or elevated threat. Using available information, the alerts will provide a concise summary of the potential threat, information about actions being taken to ensure public safety, and recommended steps that individuals, communities, businesses and governments can take to help prevent, mitigate or respond to the threat.


The NTAS Alerts will be based on the nature of the threat: in some cases, alerts will be sent directly to law enforcement or affected areas of the private sector, while in others, alerts will be issued more broadly to the American people through both official and media channels.

Closing Tab