Fort Detrick
Anti-Terrorism/Force Protection Office

Phone: 301-619-3446
DSN 343-3446

810 Schreider Street
Fort Detrick, Md. 21702

Hours: 0800-1630, M-F


Fort Detrick will execute an aggressive AT Program to protect it's personnel, their families, facilities, and materiel resources against terrorist attack. Threat information fusion will drive AT measures and course of action. During the pre-incident phase we will deter attack by establishing a layered defense; one that maintains access control at the perimeter, implements baseline AT physical security measures as FPCON levels escalate, and establishes security for identified critical assets. Essential to this defense approach will be the implementation of access control procedures into each critical asset and adoption of DoD AT Construction Standards such as stand-off distances and hardening practices. Emphasis during this phase will be on threat information gathering and analysis, developing detailed, integrated and supporting AT plans, and training and exercising installation plans. If an attack occurs, our efforts during the incident phase will focus on executing incident response precedures designed to mitigate and contain the attack. The post-incident phase will concentrate on implementing consequence management procedures to restore normal operations at quickly and efficiently as possible. The desired end state is a comprehensive AT program that effectively (1) saves lives and prevents human injury, (2) minimizes mission degradation, and (3) protects government property.

Countering Terrorism

Countering terrorism requires your help. Only you know who or what belongs - or doesn't belong in your building, neighborhood, or work center. The simple act of recognizing suspicious behavior and reporting it to authorities could thwart terrorist attacks and save lives. Please help by being alert for and reporting any of the following:

Someone recording or monitoring activities using cameras (either still or video), note taking, drawing diagrams, annotating on or creating maps, and using binoculars or other vision-enhancing devices. An element of this activity could also include mapping out routes and determining the timing of traffic lights and flow.

People attempting to get information. These attempts may be made by mail, fax, telephone, e-mail or in person and may seem like totally innocent questions about what you do and where you work.

Tests of security:
Any attempt to measure reaction times and actions by police. A test of security can be disguised as a simple mistake such as a vehicle approaching a security barrier and then turning around or an attempt to circumvent access control procedures in order to assess strengths and weaknesses of police and equipment.

Acquiring supplies:
Purchasing or stealing police and military uniforms, emergency responder type vehicles (such as police cars and ambulances), building passes and other identification media or the equipment to manufacture them.

Dry run or practice:
People or vehicles appear to have been purposely placed in a particular position or area. This is especially true when planning a kidnapping, but it also pertains to bombings.

Actual deployment of people and assets:
People and supplies getting into position to conduct an attack. This is the last chance to alert authorities before the attack occurs.

Suspicious persons out of place:
People who don't seem to belong or fit in the surrounding environment, especially if involved in any of the above listed activities.

USAG Operations Security (OPSEC) Training for Contractors

Requirement: To ensure USAG Operations Security (OPSEC) program is in compliance with AR 530-1. All Departments of the Army Personnel active component, reserve component, DA civilians, and DOD contractors are required to complete mandatory OPSEC training on an annual basis.

Training Briefing


Threat Level Definitions

FPCON: Current Fort Detrick Force Protection Condition


Applies when a general global threat of possible terrorist activity exists and warrants a routine security posture.


Applies when there is an increased general threat of possible terrorist activity against personnel or facilities, the nature and extent of which are unpredictable.


Applies when an increased or more predictable threat of terrorist activity exists.


Applies when an incident occurs or when intelligence is received indicating some form of terrorist action or targeting against personnel or facilities is likely.


Applies in the immediate area where a terrorist attack has occurred or when intelligence has been received that, terrorist action against a specific location or person is imminent.

National Terrorism Advisory System (NTAS)

National Terrorism Advisory System (NTAS)

NTAS Alerts

Imminent Threat Alert
Warns of a credible, specific, and impending terrorist threat against the United States.

Elevated Threat Alert
Warns of a credible terrorist threat against the United States.

After reviewing the available information, the Secretary of Homeland Security will decide, in coordination with other Federal entities, whether an NTAS Alert should be issued.

NTAS Alerts will only be issued when credible information is available.

These alerts will include a clear statement that there is an imminent threat or elevatedthreat. Using available information, the alerts will provide a concise summary of the potential threat, information about actions being taken to ensure public safety, and recommended steps that individuals, communities, businesses and governments can take to help prevent, mitigate or respond to the threat.

The NTAS Alerts will be based on the nature of the threat: in some cases, alerts will be sent directly to law enforcement or affected areas of the private sector, while in others, alerts will be issued more broadly to the American people through both official and media channels.

Site Helpers


Force Protection Level


National Threat Advisory

Related Sites


Fort Detrick Sexual Assault Hotline: 240-674-2802

Link to U.S. Army SHARP Program

Shoulder to Shoulder - Finding Strength and Hope Together

iSALUTE - Report Counterintelligence Information

Customer Evaluation:

ICE Logo