Podcast
Questions and Answers
Since September 11, 2001, which of the following attack methods has NOT been attempted against an airport or airline? (Select all that apply)
Since September 11, 2001, which of the following attack methods has NOT been attempted against an airport or airline? (Select all that apply)
Active resistance should be the immediate response to an active shooter incident.
Active resistance should be the immediate response to an active shooter incident.
False
What should you NOT do during a hostage rescue attempt?
What should you NOT do during a hostage rescue attempt?
Try to assist hostage rescue team
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
Signup and view all the answers
From an antiterrorism perspective, espionage and security negligence are considered insider threats.
From an antiterrorism perspective, espionage and security negligence are considered insider threats.
Signup and view all the answers
Which of the following have NOT been targeted or plotted against by terrorists or violent individuals? (Select all that apply)
Which of the following have NOT been targeted or plotted against by terrorists or violent individuals? (Select all that apply)
Signup and view all the answers
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Signup and view all the answers
Force Protection Condition DELTA means that your base is at which one of the following?
Force Protection Condition DELTA means that your base is at which one of the following?
Signup and view all the answers
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
Signup and view all the answers
Electronic audio and video devices are never used by terrorists for surveillance purposes.
Electronic audio and video devices are never used by terrorists for surveillance purposes.
Signup and view all the answers
Surveillance can be performed through either stationary or mobile means.
Surveillance can be performed through either stationary or mobile means.
Signup and view all the answers
Internet acquaintances can pose a security threat and should be carefully monitored.
Internet acquaintances can pose a security threat and should be carefully monitored.
Signup and view all the answers
Everyone on an installation has shared responsibility for security.
Everyone on an installation has shared responsibility for security.
Signup and view all the answers
Which of the following is NOT an Antiterrorism Level I theme? (Select all that apply)
Which of the following is NOT an Antiterrorism Level I theme? (Select all that apply)
Signup and view all the answers
When possible, it is best to always travel with a cell phone.
When possible, it is best to always travel with a cell phone.
Signup and view all the answers
Select all factors that can help you avoid becoming the victim of a terrorist attack.
Select all factors that can help you avoid becoming the victim of a terrorist attack.
Signup and view all the answers
Early symptoms of a biological attack may appear the same as common illnesses.
Early symptoms of a biological attack may appear the same as common illnesses.
Signup and view all the answers
The initial moments of a hostage taking incident can be extremely dangerous.
The initial moments of a hostage taking incident can be extremely dangerous.
Signup and view all the answers
Room invasions are not a significant security issue for hotels located within the United States.
Room invasions are not a significant security issue for hotels located within the United States.
Signup and view all the answers
In an active shooter incident involving firearms, you should immediately lie on the ground.
In an active shooter incident involving firearms, you should immediately lie on the ground.
Signup and view all the answers
When possible, it is best to always travel with a cell phone.
When possible, it is best to always travel with a cell phone.
Signup and view all the answers
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
Signup and view all the answers
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Signup and view all the answers
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
Signup and view all the answers
The initial moments of a hostage taking incident can be extremely dangerous.
The initial moments of a hostage taking incident can be extremely dangerous.
Signup and view all the answers
Room invasions are a significant security issue for hotels located in CONUS.
Room invasions are a significant security issue for hotels located in CONUS.
Signup and view all the answers
From the following choices, select the factor you should consider to understand the threat in your environment.
From the following choices, select the factor you should consider to understand the threat in your environment.
Signup and view all the answers
Select the factor that will NOT help you avoid becoming the victim of a terrorist attack.
Select the factor that will NOT help you avoid becoming the victim of a terrorist attack.
Signup and view all the answers
Force Protection Condition DELTA means that your base is at which one of the following?
Force Protection Condition DELTA means that your base is at which one of the following?
Signup and view all the answers
What is the most increased Force Protection Level for a base/installation?
What is the most increased Force Protection Level for a base/installation?
Signup and view all the answers
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
Signup and view all the answers
Which of the following are NOT an Antiterrorism Level I theme? Select all that apply.
Which of the following are NOT an Antiterrorism Level I theme? Select all that apply.
Signup and view all the answers
What is NOT a terrorist method of surveillance?
What is NOT a terrorist method of surveillance?
Signup and view all the answers
Persons who have been given access to an installation can be counted on to be of no threat.
Persons who have been given access to an installation can be counted on to be of no threat.
Signup and view all the answers
Which one of the following is NOT an early indicator of a potential insider threat?
Which one of the following is NOT an early indicator of a potential insider threat?
Signup and view all the answers
Active resistance should be the immediate response to an active shooter incident.
Active resistance should be the immediate response to an active shooter incident.
Signup and view all the answers
What is NOT a physical security measure for your home?
What is NOT a physical security measure for your home?
Signup and view all the answers
Which of the following have NOT been targeted or plotted against by terrorists or violent individuals?
Which of the following have NOT been targeted or plotted against by terrorists or violent individuals?
Signup and view all the answers
The ticketing area is more secure than the area beyond the security check point.
The ticketing area is more secure than the area beyond the security check point.
Signup and view all the answers
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Signup and view all the answers
Which one of these is NOT a physical security feature you should check when inspecting your hotel room?
Which one of these is NOT a physical security feature you should check when inspecting your hotel room?
Signup and view all the answers
What should you NOT do during a hostage rescue attempt?
What should you NOT do during a hostage rescue attempt?
Signup and view all the answers
Early symptoms of a biological attack may appear the same as common illnesses.
Early symptoms of a biological attack may appear the same as common illnesses.
Signup and view all the answers
Security is a team effort.
Security is a team effort.
Signup and view all the answers
Surveillance can be performed through either stationary or mobile means.
Surveillance can be performed through either stationary or mobile means.
Signup and view all the answers
Terrorists usually avoid tourist locations since they are not DOD-related.
Terrorists usually avoid tourist locations since they are not DOD-related.
Signup and view all the answers
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
Signup and view all the answers
When possible, it is best to always travel with a cell phone.
When possible, it is best to always travel with a cell phone.
Signup and view all the answers
Room invasions are a significant security issue for hotels located in CONUS.
Room invasions are a significant security issue for hotels located in CONUS.
Signup and view all the answers
The initial moments of a hostage-taking incident can be extremely dangerous.
The initial moments of a hostage-taking incident can be extremely dangerous.
Signup and view all the answers
IEDs may come in many forms and may be camouflaged to blend in to the surrounding environment.
IEDs may come in many forms and may be camouflaged to blend in to the surrounding environment.
Signup and view all the answers
If you identify a possible surveillance attempt you should try to handle the situation yourself.
If you identify a possible surveillance attempt you should try to handle the situation yourself.
Signup and view all the answers
From an antiterrorism perspective, espionage and security negligence are considered insider threats.
From an antiterrorism perspective, espionage and security negligence are considered insider threats.
Signup and view all the answers
Which one of these does NOT pose a risk to security at a government facility?
Which one of these does NOT pose a risk to security at a government facility?
Signup and view all the answers
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
Signup and view all the answers
Select all factors that are ways in which you might become the victim of a terrorist attack.
Select all factors that are ways in which you might become the victim of a terrorist attack.
Signup and view all the answers
Electronic audio and video devices are never used by terrorists for surveillance purposes.
Electronic audio and video devices are never used by terrorists for surveillance purposes.
Signup and view all the answers
From a security perspective, the best rooms are directly next to emergency exits.
From a security perspective, the best rooms are directly next to emergency exits.
Signup and view all the answers
Which of the following is NOT a recommended response to an active shooter incident?
Which of the following is NOT a recommended response to an active shooter incident?
Signup and view all the answers
Which of the following is NOT a useful vehicle feature from a security perspective?
Which of the following is NOT a useful vehicle feature from a security perspective?
Signup and view all the answers
True or False: The ticketing area is more secure than the area beyond the security check point.
True or False: The ticketing area is more secure than the area beyond the security check point.
Signup and view all the answers
True or False: Internet acquaintances can pose a security threat and should be carefully monitored.
True or False: Internet acquaintances can pose a security threat and should be carefully monitored.
Signup and view all the answers
True or False: Terrorists usually avoid tourist locations since they are not DOD-related.
True or False: Terrorists usually avoid tourist locations since they are not DOD-related.
Signup and view all the answers
Study Notes
Antiterrorism Awareness Training Key Concepts
- Understanding terrorist threats involves assessing the sophistication, activity level, violence, predictability, and local awareness regarding terrorist groups.
- Factors that do not assist in avoiding victimization include predictability; location, opportunity, and association are significant risk factors.
Force Protection
- Force Protection Condition (FPCON) DELTA indicates the highest level of security measures implemented at a base or installation.
- The system classifies security conditions from Alpha (least) to Delta (most).
National Terrorism Advisory System
- Alerts issued from this system are exclusive to the United States and its possessions.
Antiterrorism Themes
- Key themes include reporting and responding to threats and anticipating potential risks.
- Collections and counter-surveillance do not constitute Antiterrorism Level I themes.
Surveillance Methods
- Common terrorist methods for surveillance consist of technical and stationary surveillance, casual questioning, while breaking and entering for theft is not utilized as a method of surveillance.
Insider Threats
- Individuals with access to installations can still pose threats, highlighting the need for vigilance.
- Indicators of an insider threat may include abnormal behaviors and the presence of unauthorized weapons.
Responding to Threats
- In active shooter situations, lying down is not the immediate correct response; hiding or barricading is preferred.
- During a hostage rescue, individuals should remain calm and low, not attempt to assist team members, and follow their instructions.
Biological Attacks
- Symptoms from biological attacks may mimic common illnesses; awareness is critical.
Collaboration in Security
- Security is a collective responsibility shared by everyone on an installation.
Vehicle and Home Safety
- Best practices for vehicle security include maintaining a reliable vehicle; Wi-Fi capability and air bags are not crucial security features.
- Home security can be improved through changing locks, securing windows, and outdoor lighting enhancements. Hiding keys outside compromises security.
Hotel and Travel Security
- Key security features in hotels do not include lockboxes or safes; one should inspect solid doors and functioning locks upon arrival.
- Room invasions are a notable security concern in domestic hotels.
Risk Mitigation
- Avoid handling potential surveillance situations personally; report suspicions to authorities.
- Recognizing signs of instability can assist in early identification of insider threats.
General Security Awareness
- IEDs may be disguised and can appear inconspicuous; thus, constant environmental awareness is necessary.
- Security concerns extend to various locations, including tourist sites, not strictly military-related sites.### Antiterrorism Scenario Training Key Points
- Internet acquaintances can present security risks and should be monitored.
- Shared responsibility for security falls on everyone within an installation.
- Antiterrorism Level I themes exclude "Collections" and "Counter-surveillance."
- It is advisable to travel with a cell phone for safety and accessibility.
- Factors to avoid becoming a victim of a terrorist attack include opportunity, location, and association.
- Early symptoms of biological attacks may resemble common diseases, highlighting the importance of vigilance.
- Hostage situations are particularly dangerous during the initial moments of the incident.
- Room invasions represent a significant security concern for hotels in the United States.
- In an active shooter scenario, lying on the ground is not recommended as an immediate response.
- Immediate attempts to subdue hijackers during a skyjacking are advised against.
- Maintaining a vehicle properly is essential for both security and safety environments.
- Home security enhancements can be made with self-help measures such as changing locks, securing windows, and improving outdoor lighting.
- Room invasions are a serious security issue for hotels located within the Continental United States (CONUS).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on key factors in understanding environmental threats related to terrorism. This flashcard quiz covers the sophistication, activity, and predictability of terrorist groups as outlined in the Introduction to Antiterrorism. Challenge yourself and deepen your awareness of these critical issues.