Level I Antiterrorism Awareness Training
63 Questions
119 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Since September 11, 2001, which of the following attack methods has NOT been attempted against an airport or airline? (Select all that apply)

  • Hijacking
  • Bombing
  • Cyber attack
  • None of the above (correct)

Active resistance should be the immediate response to an active shooter incident.

False (B)

What should you NOT do during a hostage rescue attempt?

Try to assist hostage rescue team

Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.

<p>True (A)</p> Signup and view all the answers

From an antiterrorism perspective, espionage and security negligence are considered insider threats.

<p>True (A)</p> Signup and view all the answers

Which of the following have NOT been targeted or plotted against by terrorists or violent individuals? (Select all that apply)

<p>None of the above (D)</p> Signup and view all the answers

Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.

<p>True (A)</p> Signup and view all the answers

Force Protection Condition DELTA means that your base is at which one of the following?

<p>The most increased level of protection</p> Signup and view all the answers

Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.

<p>True (A)</p> Signup and view all the answers

Electronic audio and video devices are never used by terrorists for surveillance purposes.

<p>False (B)</p> Signup and view all the answers

Surveillance can be performed through either stationary or mobile means.

<p>True (A)</p> Signup and view all the answers

Internet acquaintances can pose a security threat and should be carefully monitored.

<p>True (A)</p> Signup and view all the answers

Everyone on an installation has shared responsibility for security.

<p>True (A)</p> Signup and view all the answers

Which of the following is NOT an Antiterrorism Level I theme? (Select all that apply)

<p>Counter-surveillance (A), Collections (B)</p> Signup and view all the answers

When possible, it is best to always travel with a cell phone.

<p>True (A)</p> Signup and view all the answers

Select all factors that can help you avoid becoming the victim of a terrorist attack.

<p>All of the above (D)</p> Signup and view all the answers

Early symptoms of a biological attack may appear the same as common illnesses.

<p>True (A)</p> Signup and view all the answers

The initial moments of a hostage taking incident can be extremely dangerous.

<p>True (A)</p> Signup and view all the answers

Room invasions are not a significant security issue for hotels located within the United States.

<p>False (B)</p> Signup and view all the answers

In an active shooter incident involving firearms, you should immediately lie on the ground.

<p>False (B)</p> Signup and view all the answers

When possible, it is best to always travel with a cell phone.

<p>True (A)</p> Signup and view all the answers

In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.

<p>False (B)</p> Signup and view all the answers

Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.

<p>True (A)</p> Signup and view all the answers

Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.

<p>True (A)</p> Signup and view all the answers

The initial moments of a hostage taking incident can be extremely dangerous.

<p>True (A)</p> Signup and view all the answers

Room invasions are a significant security issue for hotels located in CONUS.

<p>True (A)</p> Signup and view all the answers

From the following choices, select the factor you should consider to understand the threat in your environment.

<p>All are correct (A)</p> Signup and view all the answers

Select the factor that will NOT help you avoid becoming the victim of a terrorist attack.

<p>Predictability (A)</p> Signup and view all the answers

Force Protection Condition DELTA means that your base is at which one of the following?

<p>The most increased level of protection (B)</p> Signup and view all the answers

What is the most increased Force Protection Level for a base/installation?

<p>Delta</p> Signup and view all the answers

Alerts from the National Terrorism Advisory System apply only to the United States and its possessions.

<p>True (A)</p> Signup and view all the answers

Which of the following are NOT an Antiterrorism Level I theme? Select all that apply.

<p>Counter-surveillance (C), Collections (E)</p> Signup and view all the answers

What is NOT a terrorist method of surveillance?

<p>Breaking and entering to steal valuables (B)</p> Signup and view all the answers

Persons who have been given access to an installation can be counted on to be of no threat.

<p>False (B)</p> Signup and view all the answers

Which one of the following is NOT an early indicator of a potential insider threat?

<p>A reasonable disagreement with a US Government policy (B)</p> Signup and view all the answers

Active resistance should be the immediate response to an active shooter incident.

<p>False (B)</p> Signup and view all the answers

What is NOT a physical security measure for your home?

<p>Hiding a key outside to ensure family members can get in if they lose their keys (C)</p> Signup and view all the answers

Which of the following have NOT been targeted or plotted against by terrorists or violent individuals?

<p>None of the above (D)</p> Signup and view all the answers

The ticketing area is more secure than the area beyond the security check point.

<p>False (B)</p> Signup and view all the answers

Keeping a well-maintained vehicle is considered a 'best practice' from both a security and safety perspective.

<p>True (A)</p> Signup and view all the answers

Which one of these is NOT a physical security feature you should check when inspecting your hotel room?

<p>Lockbox or safe (B)</p> Signup and view all the answers

What should you NOT do during a hostage rescue attempt?

<p>Try to assist hostage rescue team (B)</p> Signup and view all the answers

Early symptoms of a biological attack may appear the same as common illnesses.

<p>True (A)</p> Signup and view all the answers

Security is a team effort.

<p>True (A)</p> Signup and view all the answers

Surveillance can be performed through either stationary or mobile means.

<p>True (A)</p> Signup and view all the answers

Terrorists usually avoid tourist locations since they are not DOD-related.

<p>False (B)</p> Signup and view all the answers

In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.

<p>False (B)</p> Signup and view all the answers

When possible, it is best to always travel with a cell phone.

<p>True (A)</p> Signup and view all the answers

Room invasions are a significant security issue for hotels located in CONUS.

<p>True (A)</p> Signup and view all the answers

The initial moments of a hostage-taking incident can be extremely dangerous.

<p>True (A)</p> Signup and view all the answers

IEDs may come in many forms and may be camouflaged to blend in to the surrounding environment.

<p>True (A)</p> Signup and view all the answers

If you identify a possible surveillance attempt you should try to handle the situation yourself.

<p>False (B)</p> Signup and view all the answers

From an antiterrorism perspective, espionage and security negligence are considered insider threats.

<p>True (A)</p> Signup and view all the answers

Which one of these does NOT pose a risk to security at a government facility?

<p>A person expressing boredom with the US mission (A)</p> Signup and view all the answers

Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting.

<p>True (A)</p> Signup and view all the answers

Select all factors that are ways in which you might become the victim of a terrorist attack.

<p>Association (A), Opportunity (B), Location (C), Predictability (D)</p> Signup and view all the answers

Electronic audio and video devices are never used by terrorists for surveillance purposes.

<p>False (B)</p> Signup and view all the answers

From a security perspective, the best rooms are directly next to emergency exits.

<p>False (B)</p> Signup and view all the answers

Which of the following is NOT a recommended response to an active shooter incident?

<p>Provide instructions to arriving emergency response personnel (A)</p> Signup and view all the answers

Which of the following is NOT a useful vehicle feature from a security perspective?

<p>Wi-Fi capable (B), Air Bags (F)</p> Signup and view all the answers

True or False: The ticketing area is more secure than the area beyond the security check point.

<p>False (B)</p> Signup and view all the answers

True or False: Internet acquaintances can pose a security threat and should be carefully monitored.

<p>True (A)</p> Signup and view all the answers

True or False: Terrorists usually avoid tourist locations since they are not DOD-related.

<p>False (B)</p> Signup and view all the answers

Flashcards

Terrorist Threat Assessment

Evaluating the sophistication, activity, violence, predictability, and local awareness of terrorist groups.

Risk Factors for Victimization

Factors increasing the chance of being a victim of a terrorist attack, including predictability, location, opportunity, and association.

FPCON DELTA

Highest level of security measures for a base or installation.

FPCON Levels

Security levels classified from Alpha (lowest) to Delta (highest).

Signup and view all the flashcards

National Terrorism Advisory System

System that issues alerts for the U.S. and its possessions.

Signup and view all the flashcards

Antiterrorism Themes

Key concepts including reporting threats, responding to threats, and anticipating risks.

Signup and view all the flashcards

Surveillance Methods

Methods terrorists use to observe, such as technical, stationary, and casual questioning.

Signup and view all the flashcards

Insider Threats

Threats posed by individuals with access to installations.

Signup and view all the flashcards

Insider Threat Indicators

Abnormal behaviors and unauthorized weapons.

Signup and view all the flashcards

Active Shooter Response

Hide or barricade, do not lie down.

Signup and view all the flashcards

Hostage Rescue Response

Remain calm, low, follow instructions, and do not assist others.

Signup and view all the flashcards

Biological Attacks

Attacks using biological agents, symptoms may mimic common illnesses.

Signup and view all the flashcards

Security Collaboration

Security is a shared responsibility of everyone at the installation.

Signup and view all the flashcards

Vehicle Security

Maintaining a reliable vehicle; focus on overall maintenance, not specific features.

Signup and view all the flashcards

Home Security

Change locks, secure windows, improve outdoor lighting, to improve security.

Signup and view all the flashcards

Hotel Security

Inspect doors and locks for hotel rooms.

Signup and view all the flashcards

Hotel Security Concerns

Room invasions are a prevalent security concern.

Signup and view all the flashcards

Risk Mitigation

Report suspicious situations to authorities rather than handling them personally.

Signup and view all the flashcards

Insider Threat Recognition

Recognizing signs of instability can help identify insider threats early.

Signup and view all the flashcards

IED Awareness

Improvised Explosive Devices (IEDs) can be disguised; pay attention to your surroundings.

Signup and view all the flashcards

Broad Security Concerns

Security concerns are applicable to various locations, not restricted to military settings.

Signup and view all the flashcards

Internet Acquaintances

Internet acquaintances may pose security risks; exercise caution and monitor interactions.

Signup and view all the flashcards

Shared Security Responsibility

Everyone on an installation has a role in security.

Signup and view all the flashcards

Antiterrorism Level I Themes

Excludes 'Collections' and 'Counter-surveillance.'

Signup and view all the flashcards

Travel Safety

Having a cell phone is advisable for safety and communication.

Signup and view all the flashcards

Skyjacking Response

Avoid immediate attempts to subdue hijackers.

Signup and view all the flashcards

Study Notes

Antiterrorism Awareness Training Key Concepts

  • Understanding terrorist threats involves assessing the sophistication, activity level, violence, predictability, and local awareness regarding terrorist groups.
  • Factors that do not assist in avoiding victimization include predictability; location, opportunity, and association are significant risk factors.

Force Protection

  • Force Protection Condition (FPCON) DELTA indicates the highest level of security measures implemented at a base or installation.
  • The system classifies security conditions from Alpha (least) to Delta (most).

National Terrorism Advisory System

  • Alerts issued from this system are exclusive to the United States and its possessions.

Antiterrorism Themes

  • Key themes include reporting and responding to threats and anticipating potential risks.
  • Collections and counter-surveillance do not constitute Antiterrorism Level I themes.

Surveillance Methods

  • Common terrorist methods for surveillance consist of technical and stationary surveillance, casual questioning, while breaking and entering for theft is not utilized as a method of surveillance.

Insider Threats

  • Individuals with access to installations can still pose threats, highlighting the need for vigilance.
  • Indicators of an insider threat may include abnormal behaviors and the presence of unauthorized weapons.

Responding to Threats

  • In active shooter situations, lying down is not the immediate correct response; hiding or barricading is preferred.
  • During a hostage rescue, individuals should remain calm and low, not attempt to assist team members, and follow their instructions.

Biological Attacks

  • Symptoms from biological attacks may mimic common illnesses; awareness is critical.

Collaboration in Security

  • Security is a collective responsibility shared by everyone on an installation.

Vehicle and Home Safety

  • Best practices for vehicle security include maintaining a reliable vehicle; Wi-Fi capability and air bags are not crucial security features.
  • Home security can be improved through changing locks, securing windows, and outdoor lighting enhancements. Hiding keys outside compromises security.

Hotel and Travel Security

  • Key security features in hotels do not include lockboxes or safes; one should inspect solid doors and functioning locks upon arrival.
  • Room invasions are a notable security concern in domestic hotels.

Risk Mitigation

  • Avoid handling potential surveillance situations personally; report suspicions to authorities.
  • Recognizing signs of instability can assist in early identification of insider threats.

General Security Awareness

  • IEDs may be disguised and can appear inconspicuous; thus, constant environmental awareness is necessary.
  • Security concerns extend to various locations, including tourist sites, not strictly military-related sites.### Antiterrorism Scenario Training Key Points
  • Internet acquaintances can present security risks and should be monitored.
  • Shared responsibility for security falls on everyone within an installation.
  • Antiterrorism Level I themes exclude "Collections" and "Counter-surveillance."
  • It is advisable to travel with a cell phone for safety and accessibility.
  • Factors to avoid becoming a victim of a terrorist attack include opportunity, location, and association.
  • Early symptoms of biological attacks may resemble common diseases, highlighting the importance of vigilance.
  • Hostage situations are particularly dangerous during the initial moments of the incident.
  • Room invasions represent a significant security concern for hotels in the United States.
  • In an active shooter scenario, lying on the ground is not recommended as an immediate response.
  • Immediate attempts to subdue hijackers during a skyjacking are advised against.
  • Maintaining a vehicle properly is essential for both security and safety environments.
  • Home security enhancements can be made with self-help measures such as changing locks, securing windows, and improving outdoor lighting.
  • Room invasions are a serious security issue for hotels located within the Continental United States (CONUS).

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on key factors in understanding environmental threats related to terrorism. This flashcard quiz covers the sophistication, activity, and predictability of terrorist groups as outlined in the Introduction to Antiterrorism. Challenge yourself and deepen your awareness of these critical issues.

More Like This

Use Quizgecko on...
Browser
Browser