Podcast
Questions and Answers
Since September 11, 2001, which of the following attack methods has NOT been attempted against an airport or airline? (Select all that apply)
Since September 11, 2001, which of the following attack methods has NOT been attempted against an airport or airline? (Select all that apply)
- Hijacking
- Bombing
- Cyber attack
- None of the above (correct)
Active resistance should be the immediate response to an active shooter incident.
Active resistance should be the immediate response to an active shooter incident.
False (B)
What should you NOT do during a hostage rescue attempt?
What should you NOT do during a hostage rescue attempt?
Try to assist hostage rescue team
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
From an antiterrorism perspective, espionage and security negligence are considered insider threats.
From an antiterrorism perspective, espionage and security negligence are considered insider threats.
Which of the following have NOT been targeted or plotted against by terrorists or violent individuals? (Select all that apply)
Which of the following have NOT been targeted or plotted against by terrorists or violent individuals? (Select all that apply)
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Force Protection Condition DELTA means that your base is at which one of the following?
Force Protection Condition DELTA means that your base is at which one of the following?
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
Electronic audio and video devices are never used by terrorists for surveillance purposes.
Electronic audio and video devices are never used by terrorists for surveillance purposes.
Surveillance can be performed through either stationary or mobile means.
Surveillance can be performed through either stationary or mobile means.
Internet acquaintances can pose a security threat and should be carefully monitored.
Internet acquaintances can pose a security threat and should be carefully monitored.
Everyone on an installation has shared responsibility for security.
Everyone on an installation has shared responsibility for security.
Which of the following is NOT an Antiterrorism Level I theme? (Select all that apply)
Which of the following is NOT an Antiterrorism Level I theme? (Select all that apply)
When possible, it is best to always travel with a cell phone.
When possible, it is best to always travel with a cell phone.
Select all factors that can help you avoid becoming the victim of a terrorist attack.
Select all factors that can help you avoid becoming the victim of a terrorist attack.
Early symptoms of a biological attack may appear the same as common illnesses.
Early symptoms of a biological attack may appear the same as common illnesses.
The initial moments of a hostage taking incident can be extremely dangerous.
The initial moments of a hostage taking incident can be extremely dangerous.
Room invasions are not a significant security issue for hotels located within the United States.
Room invasions are not a significant security issue for hotels located within the United States.
In an active shooter incident involving firearms, you should immediately lie on the ground.
In an active shooter incident involving firearms, you should immediately lie on the ground.
When possible, it is best to always travel with a cell phone.
When possible, it is best to always travel with a cell phone.
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
The initial moments of a hostage taking incident can be extremely dangerous.
The initial moments of a hostage taking incident can be extremely dangerous.
Room invasions are a significant security issue for hotels located in CONUS.
Room invasions are a significant security issue for hotels located in CONUS.
From the following choices, select the factor you should consider to understand the threat in your environment.
From the following choices, select the factor you should consider to understand the threat in your environment.
Select the factor that will NOT help you avoid becoming the victim of a terrorist attack.
Select the factor that will NOT help you avoid becoming the victim of a terrorist attack.
Force Protection Condition DELTA means that your base is at which one of the following?
Force Protection Condition DELTA means that your base is at which one of the following?
What is the most increased Force Protection Level for a base/installation?
What is the most increased Force Protection Level for a base/installation?
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.
Which of the following are NOT an Antiterrorism Level I theme? Select all that apply.
Which of the following are NOT an Antiterrorism Level I theme? Select all that apply.
What is NOT a terrorist method of surveillance?
What is NOT a terrorist method of surveillance?
Persons who have been given access to an installation can be counted on to be of no threat.
Persons who have been given access to an installation can be counted on to be of no threat.
Which one of the following is NOT an early indicator of a potential insider threat?
Which one of the following is NOT an early indicator of a potential insider threat?
Active resistance should be the immediate response to an active shooter incident.
Active resistance should be the immediate response to an active shooter incident.
What is NOT a physical security measure for your home?
What is NOT a physical security measure for your home?
Which of the following have NOT been targeted or plotted against by terrorists or violent individuals?
Which of the following have NOT been targeted or plotted against by terrorists or violent individuals?
The ticketing area is more secure than the area beyond the security check point.
The ticketing area is more secure than the area beyond the security check point.
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.
Which one of these is NOT a physical security feature you should check when inspecting your hotel room?
Which one of these is NOT a physical security feature you should check when inspecting your hotel room?
What should you NOT do during a hostage rescue attempt?
What should you NOT do during a hostage rescue attempt?
Early symptoms of a biological attack may appear the same as common illnesses.
Early symptoms of a biological attack may appear the same as common illnesses.
Security is a team effort.
Security is a team effort.
Surveillance can be performed through either stationary or mobile means.
Surveillance can be performed through either stationary or mobile means.
Terrorists usually avoid tourist locations since they are not DOD-related.
Terrorists usually avoid tourist locations since they are not DOD-related.
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.
When possible, it is best to always travel with a cell phone.
When possible, it is best to always travel with a cell phone.
Room invasions are a significant security issue for hotels located in CONUS.
Room invasions are a significant security issue for hotels located in CONUS.
The initial moments of a hostage-taking incident can be extremely dangerous.
The initial moments of a hostage-taking incident can be extremely dangerous.
IEDs may come in many forms and may be camouflaged to blend in to the surrounding environment.
IEDs may come in many forms and may be camouflaged to blend in to the surrounding environment.
If you identify a possible surveillance attempt you should try to handle the situation yourself.
If you identify a possible surveillance attempt you should try to handle the situation yourself.
From an antiterrorism perspective, espionage and security negligence are considered insider threats.
From an antiterrorism perspective, espionage and security negligence are considered insider threats.
Which one of these does NOT pose a risk to security at a government facility?
Which one of these does NOT pose a risk to security at a government facility?
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.
Select all factors that are ways in which you might become the victim of a terrorist attack.
Select all factors that are ways in which you might become the victim of a terrorist attack.
Electronic audio and video devices are never used by terrorists for surveillance purposes.
Electronic audio and video devices are never used by terrorists for surveillance purposes.
From a security perspective, the best rooms are directly next to emergency exits.
From a security perspective, the best rooms are directly next to emergency exits.
Which of the following is NOT a recommended response to an active shooter incident?
Which of the following is NOT a recommended response to an active shooter incident?
Which of the following is NOT a useful vehicle feature from a security perspective?
Which of the following is NOT a useful vehicle feature from a security perspective?
True or False: The ticketing area is more secure than the area beyond the security check point.
True or False: The ticketing area is more secure than the area beyond the security check point.
True or False: Internet acquaintances can pose a security threat and should be carefully monitored.
True or False: Internet acquaintances can pose a security threat and should be carefully monitored.
True or False: Terrorists usually avoid tourist locations since they are not DOD-related.
True or False: Terrorists usually avoid tourist locations since they are not DOD-related.
Flashcards
Terrorist Threat Assessment
Terrorist Threat Assessment
Evaluating the sophistication, activity, violence, predictability, and local awareness of terrorist groups.
Risk Factors for Victimization
Risk Factors for Victimization
Factors increasing the chance of being a victim of a terrorist attack, including predictability, location, opportunity, and association.
FPCON DELTA
FPCON DELTA
Highest level of security measures for a base or installation.
FPCON Levels
FPCON Levels
Signup and view all the flashcards
National Terrorism Advisory System
National Terrorism Advisory System
Signup and view all the flashcards
Antiterrorism Themes
Antiterrorism Themes
Signup and view all the flashcards
Surveillance Methods
Surveillance Methods
Signup and view all the flashcards
Insider Threats
Insider Threats
Signup and view all the flashcards
Insider Threat Indicators
Insider Threat Indicators
Signup and view all the flashcards
Active Shooter Response
Active Shooter Response
Signup and view all the flashcards
Hostage Rescue Response
Hostage Rescue Response
Signup and view all the flashcards
Biological Attacks
Biological Attacks
Signup and view all the flashcards
Security Collaboration
Security Collaboration
Signup and view all the flashcards
Vehicle Security
Vehicle Security
Signup and view all the flashcards
Home Security
Home Security
Signup and view all the flashcards
Hotel Security
Hotel Security
Signup and view all the flashcards
Hotel Security Concerns
Hotel Security Concerns
Signup and view all the flashcards
Risk Mitigation
Risk Mitigation
Signup and view all the flashcards
Insider Threat Recognition
Insider Threat Recognition
Signup and view all the flashcards
IED Awareness
IED Awareness
Signup and view all the flashcards
Broad Security Concerns
Broad Security Concerns
Signup and view all the flashcards
Internet Acquaintances
Internet Acquaintances
Signup and view all the flashcards
Shared Security Responsibility
Shared Security Responsibility
Signup and view all the flashcards
Antiterrorism Level I Themes
Antiterrorism Level I Themes
Signup and view all the flashcards
Travel Safety
Travel Safety
Signup and view all the flashcards
Skyjacking Response
Skyjacking Response
Signup and view all the flashcards
Study Notes
Antiterrorism Awareness Training Key Concepts
- Understanding terrorist threats involves assessing the sophistication, activity level, violence, predictability, and local awareness regarding terrorist groups.
- Factors that do not assist in avoiding victimization include predictability; location, opportunity, and association are significant risk factors.
Force Protection
- Force Protection Condition (FPCON) DELTA indicates the highest level of security measures implemented at a base or installation.
- The system classifies security conditions from Alpha (least) to Delta (most).
National Terrorism Advisory System
- Alerts issued from this system are exclusive to the United States and its possessions.
Antiterrorism Themes
- Key themes include reporting and responding to threats and anticipating potential risks.
- Collections and counter-surveillance do not constitute Antiterrorism Level I themes.
Surveillance Methods
- Common terrorist methods for surveillance consist of technical and stationary surveillance, casual questioning, while breaking and entering for theft is not utilized as a method of surveillance.
Insider Threats
- Individuals with access to installations can still pose threats, highlighting the need for vigilance.
- Indicators of an insider threat may include abnormal behaviors and the presence of unauthorized weapons.
Responding to Threats
- In active shooter situations, lying down is not the immediate correct response; hiding or barricading is preferred.
- During a hostage rescue, individuals should remain calm and low, not attempt to assist team members, and follow their instructions.
Biological Attacks
- Symptoms from biological attacks may mimic common illnesses; awareness is critical.
Collaboration in Security
- Security is a collective responsibility shared by everyone on an installation.
Vehicle and Home Safety
- Best practices for vehicle security include maintaining a reliable vehicle; Wi-Fi capability and air bags are not crucial security features.
- Home security can be improved through changing locks, securing windows, and outdoor lighting enhancements. Hiding keys outside compromises security.
Hotel and Travel Security
- Key security features in hotels do not include lockboxes or safes; one should inspect solid doors and functioning locks upon arrival.
- Room invasions are a notable security concern in domestic hotels.
Risk Mitigation
- Avoid handling potential surveillance situations personally; report suspicions to authorities.
- Recognizing signs of instability can assist in early identification of insider threats.
General Security Awareness
- IEDs may be disguised and can appear inconspicuous; thus, constant environmental awareness is necessary.
- Security concerns extend to various locations, including tourist sites, not strictly military-related sites.### Antiterrorism Scenario Training Key Points
- Internet acquaintances can present security risks and should be monitored.
- Shared responsibility for security falls on everyone within an installation.
- Antiterrorism Level I themes exclude "Collections" and "Counter-surveillance."
- It is advisable to travel with a cell phone for safety and accessibility.
- Factors to avoid becoming a victim of a terrorist attack include opportunity, location, and association.
- Early symptoms of biological attacks may resemble common diseases, highlighting the importance of vigilance.
- Hostage situations are particularly dangerous during the initial moments of the incident.
- Room invasions represent a significant security concern for hotels in the United States.
- In an active shooter scenario, lying on the ground is not recommended as an immediate response.
- Immediate attempts to subdue hijackers during a skyjacking are advised against.
- Maintaining a vehicle properly is essential for both security and safety environments.
- Home security enhancements can be made with self-help measures such as changing locks, securing windows, and improving outdoor lighting.
- Room invasions are a serious security issue for hotels located within the Continental United States (CONUS).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on key factors in understanding environmental threats related to terrorism. This flashcard quiz covers the sophistication, activity, and predictability of terrorist groups as outlined in the Introduction to Antiterrorism. Challenge yourself and deepen your awareness of these critical issues.