Podcast
Questions and Answers
In an active shooter incident involving firearms you should immediately lie on the ground.
In an active shooter incident involving firearms you should immediately lie on the ground.
False
Which one of these is a possible indicator of a suspicious letter or package?
Which one of these is a possible indicator of a suspicious letter or package?
Security is a team effort.
Security is a team effort.
True
The initial moments of a hostage taking incident can be extremely dangerous.
The initial moments of a hostage taking incident can be extremely dangerous.
Signup and view all the answers
Everyone on an installation has shared responsibility for security.
Everyone on an installation has shared responsibility for security.
Signup and view all the answers
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
Signup and view all the answers
From a security perspective, the best rooms are directly next to emergency exits.
From a security perspective, the best rooms are directly next to emergency exits.
Signup and view all the answers
Surveillance can be performed through either stationary or mobile means.
Surveillance can be performed through either stationary or mobile means.
Signup and view all the answers
If you identify a possible surveillance attempt you should try to handle the situation yourself.
If you identify a possible surveillance attempt you should try to handle the situation yourself.
Signup and view all the answers
Reasons for acquiring hostages include publicity, use as a bargaining chip while executing other crimes, the forcing of political concessions, and ransom.
Reasons for acquiring hostages include publicity, use as a bargaining chip while executing other crimes, the forcing of political concessions, and ransom.
Signup and view all the answers
From the following choices, select the factors you should consider to understand the threat in your environment.
From the following choices, select the factors you should consider to understand the threat in your environment.
Signup and view all the answers
Which one of the following is NOT an early indicator of a potential insider threat?
Which one of the following is NOT an early indicator of a potential insider threat?
Signup and view all the answers
Room invasions are a significant security issue for hotels located in CONUS.
Room invasions are a significant security issue for hotels located in CONUS.
Signup and view all the answers
Electronic audio and video devices are never used by terrorists for surveillance purposes.
Electronic audio and video devices are never used by terrorists for surveillance purposes.
Signup and view all the answers
When possible, it is best to always travel with a cell phone.
When possible, it is best to always travel with a cell phone.
Signup and view all the answers
Force Protection Condition DELTA means that your base is at which one of the following?
Force Protection Condition DELTA means that your base is at which one of the following?
Signup and view all the answers
Active resistance should be the immediate response to an active shooter incident.
Active resistance should be the immediate response to an active shooter incident.
Signup and view all the answers
IEDs may come in many forms and may be camouflaged to blend into the surrounding environment.
IEDs may come in many forms and may be camouflaged to blend into the surrounding environment.
Signup and view all the answers
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
Signup and view all the answers
Terrorists usually avoid tourist locations since they are not DOD-related.
Terrorists usually avoid tourist locations since they are not DOD-related.
Signup and view all the answers
State Department Travel Warnings should be consulted prior to taking trips across the US-Mexican border.
State Department Travel Warnings should be consulted prior to taking trips across the US-Mexican border.
Signup and view all the answers
Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident.
Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident.
Signup and view all the answers
Select all factors that are ways in which you might become the victim of a terrorist attack.
Select all factors that are ways in which you might become the victim of a terrorist attack.
Signup and view all the answers
The ticketing area is more secure than the area beyond the security check point.
The ticketing area is more secure than the area beyond the security check point.
Signup and view all the answers
Which one of these does NOT pose a risk to security at a government facility?
Which one of these does NOT pose a risk to security at a government facility?
Signup and view all the answers
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Signup and view all the answers
Internet acquaintances can pose a security threat and should be carefully monitored.
Internet acquaintances can pose a security threat and should be carefully monitored.
Signup and view all the answers
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
Signup and view all the answers
Study Notes
Active Shooter and Security Protocols
- Do not immediately lie on the ground during an active shooter incident.
- Security is a collective responsibility; all individuals share this duty.
- The initial moments of a hostage situation are highly dangerous, requiring caution.
Indicators of Threats
- Misspellings in letters or packages can indicate suspicious activities.
- Possible insider threat signs do not include reasonable disagreements with U.S. government policies.
- Key factors for assessing threats include the predictability, violent nature, tactics, and sophistication of terrorist groups.
Emergency Response and Situational Awareness
- Do not attempt to subdue air hijackers during a skyjacking incident; maintain composure.
- The best room locations are not necessarily near emergency exits; this could compromise safety.
- If potential surveillance is noticed, do not confront the situation alone.
Hostage Situations and Risks
- Reasons for hostage-taking may involve publicity, political leverage, ransom, and bargaining.
- Rooms' invasions are a significant concern for hotels in the country.
Use of Technology and Personal Safety
- Electronic devices are commonly utilized by terrorists for surveillance; they can blend into the environment.
- Mobile phones are valuable travel companions for communication and safety.
Security Levels and Vulnerabilities
- Force Protection Condition DELTA indicates the highest security level.
- IEDs are versatile and often camouflaged; vigilance is necessary.
- Home security measures, like changing locks and improving outdoor lighting, enhance personal safety.
Travel Safety and Threat Awareness
- Tourist locations are not exempt from terrorist attacks; they are often targeted.
- Always check State Department Travel Warnings before traveling, especially to border areas.
- Understanding indicators of unstable individuals helps in detecting potential insider threats.
Victim Vulnerability Factors
- Factors increasing victimization risk in terrorist attacks include opportunity, predictability, location, and association with high-risk groups.
Miscellaneous Security Considerations
- The security of the ticketing area is less than that beyond security checkpoints.
- Expressing boredom with U.S. missions does not present an inherent security risk.
- Maintaining a well-kept vehicle is beneficial for ensuring both security and safety.
- Internet acquaintances pose potential security threats and should be monitored closely.
National Alerts
- Alerts from the National Terrorism Advisory System are applicable solely to the United States and its territories.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge with these flashcards designed for the Anti Terrorism Level I training. Each card presents a scenario or question related to security awareness and threat detection. Prepare yourself for critical thinking in high-pressure situations.