ANTITERRORISM TRAINING
TACTICS , TECHNIQUES AND PROCEDURES
KESHAV MAZUMDAR
Antiterrorism Officer
AT/Int Question Bank
ANTITERRORISM
By
definition, surveillance is the continuous or periodic act of observing by
surreptitious means a person, a place, or a thing for the purpose of gathering
information otherwise unavailable or impractical to obtain.
True
False
Not
enough information to make a decision
Surveillance
can also be defined as the secretive, continuous, and sometimes periodic
watching of persons, vehicles, and places or objects to obtain information
concerning activities and identities.
True
False
Not
enough information to make a decision
Appearance,
Poise, Resourcefulness, Alertness and Patience are traits that you need to know
about a:
A
Intelligence Officer
B
Police Officer
C
Surveillant
D
Terrorist
E
None of the Above
The
Answer is C
Initial
target selections, Gather information – surveillance, Final target selection,
Planning and rehearsal, Deployment, Transition to Attacker, Attack and escape
or suicide and Escape and exploit the Act are the steps of:
A
Surveillance
B
Tactical Response
C
War Games
D
Attack
E
Intelligence Recovery
The
following are initial required terrorist surveillance objectives?
Residence and work place, Transportation used, Routes traveled, Routines,
Security awareness, Characteristics of places visited, Protective systems,
Security Forces
True
False
Not
enough information to make a decision
From
translated terror training manuals when conducting surveillance on a potential target
after determining who the target person is additional information required
about the target is:
A
Entrance locations to home, Vehicle color, Vehicle Make, License Number.
B
If Subject utilizes personal protection, Is there an Alarm System, Is it
monitored.
C
Who does he associate with, What does he look like, What are his physical
features.
D
Are his protectors armed, Is his vehicle up armored, does protector conduct
IED check
Once
target is chosen the next level of surveillance is to determine:
A
Is the target news worthy, does the target pose a threat to Ala
B
Is the target married, How many children does he have, Relatives, exact
address.
C
Has the subject committed any acts disrespectful to Islam or Mohammad
D
Will the attack further the advancement of Jihad
When
surveillance subject utilizes public transportation information that needs to
be determined is:
A
How does he travel to the public transportation
B
Where does he get on and off.
C
Does the public transportation have surveillance cameras
D
Does his schedule put him on public transportation after dark
Surveillance
is normally conducted by the more experienced cell members.
A
True
B
False
C
Not enough information to make a decision
Islamic
Jihadist utilize their new recruits for operational attacks to minimize the
loss of seasoned experienced veteran in case of counter attack or heavy
opposition.
A
True
B
False
C
Not enough information to make a decision
Jihadist
surveillance teams are comprised of 18 to 24 year old Islamic males.
A
True
B
False
C
Not enough information to make a decision
Many
attack sites are chosen due to their Choke points or ambush sites of Bridges,
one way streets, Traffic circles, major intersections,.
A
True
B
False
C
Not enough information to make a decision
The
human mind can concentrate effectively on only one thing at a time. A
person's eye may see something and his mind may process the information, but unless
he is thinking about the information or something brings it to his attention,
his mind will filter out this information because it is not significant or
important to him at that time. An enhanced state of awareness is the key
to an effective protective posture in any high threat environment.
A
True
B
False
C
Not enough information to make a decision
Stationary
and fixed surveillance can be established from a vehicle, a hotel or a motel, a
house or an apartment, a warehouse, a café/restaurant, Concealed ground
position or by using a Ruse
A
True
B
False
C
Not enough information to make a decision
The
most common and preferred and used method of surveillance is;
A
Vehicle
B
Technical Electronic
C
CCTV
D
Static
E
Foot
The
terrorist conducting surveillance will utilize certain techniques you can use
to help you detect surveillance being employed against you, surveillance is
carried out by men that are following you.
A
True
B
False
C
Not enough information to make a decision
What
are the serious problems that exist for the surveillant?
A
Keeping eyes on the subject
B
Changing environments
C
Plausible Cause for actions
D
Dealing with internal conflict
E
All of the above
Common
errors made by surveillant’s
A
Avoiding eye contact
B
Using mirrors and window reflections
C
Reading newspaper and Peeking
D
Moving to slow
E
A and C
F
A, B, C, D.
Surveillance
personnel have an acute fear of being detected!
A
True
B
False
C
Not enough information to make a decision
You
should keep in mind that the people doing the surveillance will try to change
their appearance to make it more difficult for you to spot recurring
faces. They may put on or take off hats, eyeglasses, reversible jackets,
clip-on ties, or other simple things to break up the outline of their
appearance.
A
True
B
False
C
Not enough information to make a decision
The
surveillants will usually have a cover for being in the area and for doing what
they are doing. They may have work orders or use a ruse such as
being a meter reader or a polltaker. If you are suspicious of any
workmen in your area, pay particular attention to their shoes, watches an
jewelry.
A
True
B
False
C
Not enough information to make a decision
Passive
maneuvers are techniques that draw attention to you. These simple
maneuvers allow you to confirm, or at least get an indication, that someone may
be following you without blatantly confronting them. Remember, an overtly
compromised surveillant may commit a hostile act against you.
A
True
B
False
C
Not enough information to make a decision
If
you suspect that you are being followed the best action you can take is to turn
and confront the person following you so that you will have direct evidence of
the surveillance allowing for a stalking charge.
A
True
B
False
C
Not enough information to make a decision
There
may come a time, for whatever reason, when you suspect the presence of
operational elements who are about to engage in imminent attack, rather than
surveillance personnel who are gathering information. No one can make
this distinction for you; it is your decision. It may be more of a
feeling rather than actual knowledge. Certainly, if you believe your life
is in jeopardy, the time for subtlety has passed you should:
A
Immediately take cover
B
Call for help
C
Seek advice from the FBI
D
Move quickly and with purpose
Continual
or two sightings of suspected surveillance at separate times, places suggest
that surveillance is probable;
A
True
B
False
C
Not enough information to make a decision
Correct
tradecraft for determining if you are under surveillance is to start by keeping
a Surveillance detection journal.
A
True
B
False
C
Not enough information to make a decision
If
surveillance is detected you should stay calm and don’t panic, don’t force a
confrontation or tip your hand, go to a safe area if you feel threatened and
report to the proper authorities:
A
True
B
False
C
Not enough information to make a decision
Attackers
will be looking for a site that will give them predictability of the victim,
control of the victim, hide or disguise plausibility and escape routes.
A
True
B
False
C
Not enough information to make a decision
Analysis
of attack data shows us that over 35% of attacks happen near the residence.
A
True
B
False
C
Not enough information to make a decision
DEATH
is the way terrorist tell you that you’ve passed their selection process!
A
True
B
False
C
Not enough information to make a decision
The
complete awareness by an individual of his/her surroundings, achieved through
maximum.
A
True
B
False
C
Not enough information to make a decision
High
risk individual must.
A
Practice continual awareness.
B
Replace casual observation with study of detail.
C
Become familiar with descriptive terms concerning:
D
People, vehicles, colors, clothing, and hair styles.
E
A and D
F
A, B, C, D,
When
observing people there are how many general characteristics to oberve?
A
3
B
4
C
5
D
6
Hostage
taking is a way of setting up a bargaining position to achieve an otherwise
unattainable objective.
A
True
B
False
C
Not enough information to make a decision
|
A victim may be chosen
because of his value to someone. One government will not negotiate with
terrorists. This does not diminish the victim's value to his family,
his employer, or himself. There are numerous examples in which ransom
demands have been met by private efforts. This may free the hostage but
unfortunately further promulgates the act.
A True
B False
C Not enough
information to make a decision
A victim may Not be chosen
because he is prominent, because of his job position, because of his status,
or simply because he is an American.
A True
B False
C Not enough
information to make a decision
A hostage situation is pending
with various aggressive movements.
A True
B False
C Not enough
information to make a decision
A victim may be hated by his
captors. The terrorist organization may blame him directly for any setbacks
it has suffered or may foresee disaster in the near future due to this
individual's work.
A True
B False
C Not enough
information to make a decision
Because of their desire for
publicity, terrorists do not kidnap a victim and then not tell anyone.
The higher the status of the victim, the more publicity the event will
solicit.
A True
B False
C Not enough
information to make a decision
The victim may be seen as a
source of trouble. In Colombia the terrorist groups M19 and the Armed
Revolutionary Forces of Colombia (FARC), which make more than $100 million
each year from cocaine, could look at the special agents of the U.S. Drug
Enforcement Administration from this point of view.
A True
B False
C Not enough
information to make a decision
Most of the time, the hostage is
just an innocent victim of circumstances who happened to be in the wrong
place at the wrong time.
A True
B False
C Not enough
information to make a decision
|
|
All classification by category of
hostage takers is an artificial matter. We categorize hostage takers
merely to provide guidelines. The real identity of the terrorist can
only be examined in the context of his relationships to the people, the
organization, places, ideas, and the historical context with which he is
associated. The question one must ask when examining any terrorist
action is, "Does the ideology support the actual beliefs of a group, or
is it merely a tool used to justify their actions?" Symbionese
Liberation Army (SLA) leader Donald DeFreeze used Marxism as a cover label
for criminal actions.
A True
B False
C Not enough
information to make a decision
|
|
Terrorist organizations are
usually stratified. At the top of a pyramid like structure, single,
urban, bright, and dedicated idealists can be found. Often this layer
of terrorists comes from professions such as medicine and law. The
lower down the ranks of a terrorist organization one looks, the greater the
diversity of personality styles one sees: the disillusioned, the
mentally ill, the sociopaths recruited from prisons, and the ideologically
motivated. There are also those who are monetarily motivated, the
"mercenary"-style terrorists, and those seeking some form of personal
revenge. Almost all terrorist organizations form a cross section of the
population from which they emerge. The group performing the hostage
taking will in turn be a representative slice of the organization. This
slice performs its operations in support of the larger organization's
long-range goals.
A True
B False
C Not enough
information to make a decision
|
|
|
|
Two categories of hostage takers
that pose a major threat to U.S. government representatives are political
extremists and religious fanatics.
|
|
|
|
|
A
True
B
False
C
Not enough information to make a decision
|
|
|
Political extremists. These
hostage takers often operate within a military like structure. This
control factor may hold violence within planned limits. Still, within
the group there may be one or more terrorists whose propensity for cruelty
makes them more dangerous. While they may be held in check by their
group leadership, it is important to identify them early in the event and spend
extra effort to avoid a confrontation. The average age of most
political terrorists ranges between 19 and 35. Political extremists
generally only take hostages when they have some control over the general
terrain where the event will take place or when a friendly or neutral country
may provide shelter. Hostage taking by this group of terrorists can be
viewed as a barometer of political extremism in a geographic area.
A True
B False
C Not enough
information to make a decision
|
|
|
|
|
Religious fanatics. These
hostage takers generally fit one of three categories. They are usually
either a member of a recognized religion or a radical offshoot of that
religion, a member of a cult, or a religious loner. Religious fanatics
share a common, unshakable belief in the righteousness of their cause and the
appropriateness of their actions. With the exception of the loner,
religious fanatics have a charismatic leader and preach. The death wish
is strong in many religious fanatics.
A True
B False
C Not enough
information to make a decision
The lone religious fanatic, while
not often encountered, could present the gravest threat. He will be
even more detached from reality and less rational than the one belonging to a
group. This religious fanatic claims to be operating on direct divine
orders. Because of that, he is probably the most dangerous and the
least susceptible to reason.
A True
B False
C Not enough
information to make a decision
What is another category of hostage
takers?
A
Fleeing criminal,
B
The wronged person
C
Mentally disturbed person.
D
All of the Above
Answer is D
|
|
Once establishing a good rapport
with the hostage taker, the hostage should utilize hostage negotiation techniques
to assist in their release.
A True
B False
C Not enough
information to make a decision
|
|
The hostage should make every
attempt to establish rapport with the terrorists.
A True
B False
C Not enough
information to make a decisio
|
|
Members of the armed forces must
always consider themselves to be potential hostage victims, if for no other
reason than for publicity. Before they arrive at a high-risk area, they
should consider personal contingency planning.
A True
B False
C Not enough
information to make a decision
|
There is no reason for a
potential hostage to take any personal actions to prepare himself for
becoming a hostage as the Government or Military will take responsibility for
anything that he may need.
A True
B False
C Not enough
information to make a decisio
|
|
|
|
|
|
To lessen the trauma on both
himself and his family, the potential hostage should maintain his family and
personal affairs in good order. He should keep his will current, draw
up appropriate powers of attorney, and take measures to ensure family
financial security.
A True
B False
C Not enough
information to make a decision
The potential hostage should
discuss plans and instructions with his family in the event he is
abducted. He may have a packet made up containing instructions for his
family, money, airline tickets, credit cards, insurance policies, and the
name of the person to contact for survivor assistance, with instructions to
open the packet in the event he is taken hostage.
A True
B False
C Not enough
information to make a decision
|
|
Briefcase contents. The
potential hostage should not carry classified documents or other sensitive or
potentially embarrassing items in his briefcase or on his person. If
taken hostage, he should be prepared to explain phone numbers, addresses,
names, and other items carried at the time of capture.
A True
B False
C Not enough
information to make a decision
During captivity, he should Not
try to convince his captors that they have kidnapped the wrong.
A True
B False
C Not enough
information to make a decision
|
|
Medicine. The potential
hostage should carry a week's supply of any essential medication when
traveling or when stationed in a high-risk area.
A True
B False
C Not enough
information to make a decision
|
|
The hostage should always try to
escape at the time of capture
A True
B False
C Not enough
information to make a decision
If you plan in advance to
escape you should have a plan in your mind and practice your plan.
A True
B False
C Not enough
information to make a decision
The initial moment in a capture
is the most dangerous time because the captors are tense and their adrenaline
is flowing. The victim may reassure his captors that he is not trying
to escape.
A True
B False
C Not enough
information to make a decision
The hostage should keep in mind
that the assailant has meticulously planned and executed the hostage
operation. The initiative, the time, the location, and the
circumstances of the incident--all favor the kidnappers. The manpower
and firepower brought to bear on the incident leave little opportunity for
escape.
|
A
True
B
False
C
Not enough information to make a decision
As
a hostage you need to maintain a positive mental attitude to avoid depression
and lethargy.
A
True
B
False
C
Not enough information to make a decision
|
The Stockholm syndrome seems to
be an automatic, unconscious, emotional response to the trauma of becoming a
victim. The physical and psychological stress induced by the hostage
situation causes the hostage to react in a manner totally against his normal
beliefs, values, and ethics.
A True
B False
C Not enough
information to make a decision
|
|
The Stockholm Syndrome phenomenon
only affects the hostage, it seems to be born in the high-stress environment
of a siege room. An emotional bond forms and leads to the development of a
philosophy: "It's us against them.
A True
B False
C Not enough
information to make a decision
|
ERM
Ch. 463 Home Made Explosives
- Which of
the following is NOT an example of a homemade explosive?
- Ammonium
Nitrate Mixtures
- Chlorate/Perchlorate
Mixtures
- Syntax
Peroxide Mixtures
- Triacetone
Triperoxide
ANSWER:
c.
- Which of
the following is NOT a chemical component?
- Ammonium
Nitrate
- Cellulose
Acetate
- Hexamine
- Nitric
Acid
ANSWER:
b.
- Binders
are materials that are used to hold certain explosive mixtures together.
Which of the following is NOT an example of such a material?
- Carnauba
Wax
- Duct Tape
- Grease
- Vaseline
ANSWER:
b.
- In order
to readily enable you to determine if you are dealing with a homemade
explosive(s) lab, it is imperative you memorize the hard & fast rules
of what to look for.
- True
- False
ANSWER:
b.
- If, in a
suspected explosives lab, you notice finer, more granular product in the
presence of Pyrex or scientific glassware, filters, acid-resistant skin
protection & ice water baths, which of the following should be
furthered reviewed for information?
- Ammonium
Nitrate
- Black
Powder
- Chlorate/Perchlorate
Mixtures
- Urea
Nitrate
ANSWER:
d.
- Below are
examples of equipment that would suggest safety measures are being
implemented. Select the item that doesn’t reflect this:
- Impermeable
Gloves
- Dust
Masks
- Protective
Eyewear
- Blenders
ANSWER:
d.
- If you
notice predominantly liquid components in a suspected lab, along with
scientific glassware, safety glasses, acid-resistant skin protection etc.
Which of these following would you review information on?
- Ammonium
Nitrate
- EGDN
- HMTD
- Urea
Nitrate
- All of
the above
ANSWER:
b.
- One
example of an Ammonium Nitrate Mixture would be:
- Ammonium
Nitrate & Confectionery Icing
- Ammonium
Nitrate & Coffee
- Ammonium
Nitrate & Vegetable Oil
- Ammonium
Nitrate & Citric Acid
ANSWER:
a.
- One
hazard of Ammonium Nitrate is that it can be explosive in hot, confined
areas.
- True
- False
ANSWER:
a.
- Black
Powder can appear in the following hues:
- Gray
- Dark Blue
- Black
- Both a.
& c.
- All of
the above
ANSWER:
d.
- Some
commercial uses of Black Powder are:
- Fuses
- Pyrotechnics
- Gunpowder
- Both a.
& c.
- All of
the above
ANSWER:
e.
- Potassium
Nitrate can be found in which of the following:
- Shampoo
- Cooking
oil
- Food
Preservatives
- Anti-bacterial
Hand Soap
ANSWER:
c.
- A key
identifier of Chlorate / Perchlorate Mixtures is:
- A sugary
sweet odor
- That it
is odorless
- A dead
fish smell
- A fuel
odor
ANSWER:
b.
- One of
the chemical components found in Chlorate / Perchlorate Mixtures is:
- Petroleum
Jelly
- Ethylene
Glycol
- Nitric
Acid
- Sulfuric
Acid
ANSWER:
a.
- Key
identifiers of Ethylene Glycol Dinitrate (EGDN) are that it is an oily,
viscous liquid that can range from colorless to dark yellow and is
odorless.
- True
- False
ANSWER:
a.
- Colorless
to white product found with solids settled at the bottom of a container
and stored in a refrigerator or freezer may be:
- Ammonium
Nitrate Mixtures
- Clorate /
Perchlorate Mixtures
- Hexamethylene
Triperoxide Diamene (HMTD)
- Methyl
Ethyl Ketone Peroxide (MEKP)
ANSWER:
c.
- If found,
Hexamethylene Triperoxide Diamene (HMTD), should be stored near metals to
ensure stability of the product.
- True
- False
ANSWER:
b.
- Hexamethylene
Triperoxide Diamene (HMTD), can be made by combining chemical components
found in such items as:
- Nail
polish remover, bleaching agent, nitric acid
- Paint
remover, hair products, sulfuric acid
- Hair
products, cumin, racing car fuel
- Camp
stove fuel tablets, hair products, water softener
ANSWER:
d.
- Select
the key identifiers for Hydrogen Peroxide Mixtures.
- Liquid or
semi liquid gel, mixture color varies with additives, slightly pungent
caustic odor
- Liquid or
semi liquid gel, colorless to white, odorless
- Oily,
viscous liquid, colorless to dark yellow, odorless
- Powdery
substance, finer than flour, gray or black in color, dead fish odor
ANSWER:
a.
- Methyl
Ethyl Ketone Peroxide (MEKP) is also known as:
- Ethylene
Dinitrate
- Hexamine
- Luberisol
DDM
- Mother of
Satan
ANSWER:
c.
- Hazards
of Methyl Ethyl Ketone Peroxide (MEKP) are:
- Extremely
sensitive to impact, friction, static spark & heat; should not be near
metals
- Extremely
sensitive to impact, friction, static spark & heat; should not be near
sulfuric acid
- Large
quantities can self-heat and ignite if in sunlight or elevated room
temperatures
- Large
quantities can become unstable and ignite if kept in cooler room
temperatures
ANSWER:
b.
- Some key
identifiers for Triacetone Triperoxide (TATP) are:
- Flour
like appearance, solids settle on top of the container, fruity or vinegar
smell
- Sugar
like appearance, solids settle at the bottom of the container, fruity or
vinegar smell
- Crystals,
colorless to white in appearance, solids settle at the bottom of the
container, odorless
- Sugar
like appearance, solids settle at the bottom of the container, odorless
ANSWER:
b.
- The
chemical components that make up Triacetone Triperoxide (TATP) are:
- Acetone,
Acid, Hydrogen Peroxide
- Methyl
Ethyl Ketone, Acid, Hydrogen Peroxide
- Acetone,
Nitromethane, Hydrogen Peroxide
- Hydrogen
Peroxide, Acetone, Ethanol
ANSWER:
a.
- One of
the commercial uses for Triacetone Triperoxide (TATP) is:
- Blasting
Agent (also know as ANFO)
- Dynamite
- Flash
powders: Fireworks
- None
known
ANSWER:
d.
- Urea
Nitrate is also known as:
- Acidogen
Nitrate
- Gunpowder
- Luberisol
DDM
- Mother of
Satan
- None of
the above
ANSWER:
a.
- Urea
Nitrate is unique in that additives will not alter the physical appearance
of its color.
- True
- False
ANSWER:
b.
- Commercial
uses for Urea Nitrate include:
- Blasting
Agent (also know as ANFO)
- Dynamite
- Hydroponics
- None
known
- Both a.
& c.
ANSWER:
d
- Urea is
found in:
- Cumin
- Fertilizer
- Hair
products
- Nail
polish remover
ANSWER:
b.
- Equipment
used for the purpose of mixing Urea Nitrate is:
- Blenders,
grinders, distillers, ice bath
- Glassware,
distillers, blenders, filters
- Glassware,
mixers, ice bath, filters
- Grinders,
mixers, plastic containers, filters
ANSWER:
c.
- The
chemical components that make up Urea Nitrate are such that the mixture
requires refrigeration.
- True
- False
ANSWER:
b.
- One of
the key identifiers of Acetone is that is has a sweet flowery or perfume
like odor, much like nail polish remover.
- True
- False
ANSWER:
a.
- Large
quantities of Acetone may be kept in:
- Large
wooden kegs 5 to 55 gallons
- Large
plastic drums from 10 to 50 gallons
- Large
metal cans or drums from 5 to 55 gallons
- Large
quantities cannot be stored; may self-heat & ignite
ANSWER:
c.
- Acetone
vapors can cause drowsiness, dizziness, and numbness in hands and feet.
- True
- False
ANSWER:
a.
- Acetone
is readily accessible to anyone, through the purchase of products sold at:
- Beauty
supply stores
- Chemical
supply stores
- Drug
stores
- Both a.
& c.
- All of
the above
ANSWER:
e.
ERM Ch. 466 Bomb Threat
Management
- A bomb
threat could be a warning or simply a hoax. If upon search you locate a
suspicious package or “bomb” and you’re certain it is a hoax, (or a training
exercise), then you can safely pick up the package/bomb, bring it in,
& advise your superior that you safely located the item.
- True
- False
ANSWER:
b.
- If a bomb
threat is received and search reveals nothing out of the ordinary, you can
safely conclude that the call was simply a hoax & relax your guard –
business as usual.
- True
- False
ANSWER:
b.
- Types of
bombers are broken down into 3 different categories – suicidal, amateur
& professional.
- True
- False
ANSWER:
b.
- Of the
various types of categorized bombers, the least worrisome is the amateur
bomber.
- True
- False
ANSWER:
b.
- Bombers
are generally referred to as falling under what main categories:
- Amateur
- Professional
- Psychopathic
- Suicidal
- a., b.
& d.
- All of
the above
ANSWER:
f.
- Examples
of typical motivators for bombers would be:
- Emotional
release / revenge
- Ideological
/ recognition
- Experimental
/ vandalism
- Both a.
& b.
- All of
the above
ANSWER:
e.
- Bomb
threats would normally be handled:
- Internally
by a company CEO, or kept within the confines of a household
- EMS
- Local Law
Enforcement or Private Security
- By the
person who received the call
- All of
the above
ANSWER:
c.
- There are
general guidelines for the handling of a bomb threat scenario. If you know
of a bomb threat, or are the receiver of a bomb threat you should be sure
to:
- Try to
obtain answers to a checklist questions as quickly as possible so you can
pass the information on to authorities
- Ensure to
show emotion to the caller as a means of humanizing the situation
- Ensure
that you do not ask the caller if they placed the bomb
- Ask the
caller when the bomb is going to explode
- All of
the above
ANSWER:
d.
- Showing
emotion over the phone when you are the receiver of a bomb threat can
humanize the situation, and 50% of the time could thwart the intended
plot.
- True
- False
ANSWER:
b.
- Which of
the following question(s) should not be asked if you are the receiver of a
bomb threat call?
- When is
the bomb going to explode?
- Where is
it located now?
- What kind
of a bomb is it & what does it look like?
- Did you
place the bomb?
- Both b.
& c.
- All should
the above should be asked
ANSWER:
f.
- If you
are the receiver of a bomb threat call, ensure that you concentrate on
obtaining answers to the general guideline questions & don’t become
distracted or unfocused in the task by background noise during the call.
- True
- False
ANSWER:
b.
- In
additional to obtaining answers to the checklist of questions you should
have if you are the recipient of a bomb threat call, you should also be
sure to try and determine:
- Race
- Sex
- Age
- Background
Noise
- Choice
a., b. & c.
- All of
the above
ANSWER:
f.
- Everyone
that could potentially be assigned the task of conducting a search for a
bomb or suspicious package, should, if they happen upon either of these:
- Ensure
they well versed in the handling of varied bombs types
- Ensure
they are properly geared up in a bomb suit prior to conducting the search
- Leave the
handling of such items to EOD or bomb personnel only
- Both b.
& c.
ANSWER:
c.
- When
faced with a bomb threat, there are decision-making guidelines that should
be considered. Some examples are:
- Race of
the caller?
- Age of
the caller?
- Sex of
the caller?
- All of
the above
- None of
the above
ANSWER:
e.
- When
faced with a bomb threat, there are certain decision-making guidelines that
should be considered. Some examples are:
- How tight
is the security at the target?
- What is
the targets’ previous experience?
- What is
the current climate for terrorist or radical activity?
- All of
the above
- None of
the above
ANSWER:
d.
- The
intended “target” of a bomb threat is generally the biggest unknown.
- True
- False
ANSWER:
b.
- The
intended time to detonate is generally the biggest unknown for a bomb
threat.
- True
- False
ANSWER:
a.
- Not
knowing when a bomb is set to detonate, is of particularly less concern
to:
- Those in
the surrounding perimeter of the bomb
- Those in
the immediate area of the bomb itself
- Those in
Law Enforcement
- All of
the above
ANSWER:
b.
- Standard
operating procedures for bomb threat management should include who will
notify facility personnel & how they will be notified.
- True
- False
ANSWER:
a.
- History
has taught us that they are several common placement locations for bombs
to be set. Which of the following is not a common location?
- Behind
bushes
- Outside
stairs
- Lobby
Areas
- Restrooms,
especially Men’s
ANSWER:
d.
- Some
xamples of planning issues that could hinder action to deal with bomb
threats would be:
- Time
& Money
- Training
& effort spent on planning
- Current
information; intelligence
- Both a.
& b.
- All of
the above
ANSWER:
e.
- There are
two evacuation options – evacuation or no evacuation.
- True
- False
ANSWER:
b.
- There are
three evacuation options – evacuation, partial evacuation or no evacuation.
- True
- False
ANSWER:
a.
- Evacuation
procedure processes should include:
- A primary
evacuation route
- A
secondary evacuation route
- Assembly
areas – both primary & secondary
- Windows
& doors should be left open
- a., b.
& c.
- All of the
above
ANSWER:
f.
- Unlike
fire drill / evacuation procedures where “floor wardens” are assigned, in
the case of a bomb threat time is of the essence and therefore no such
“wardens” or leaders are necessary.
- True
- False
ANSWER:
b.
- Some key
responsibilities of Evacuation Leaders during a bomb threat evacuation
are:
- To ensure
all window & doors are left open
- To know
the primary & secondary evacuation routes, as well as the primary and
secondary assembly areas
- Provide accountability
for all persons in their evacuation zones
- To screen
the evacuation routes for secondary devices
- a., b.
and d.
- b., c.
& d.
ANSWER:
f.
- In order
to maximize everyone’s safety, where the bomb is located (i.e. briefcase,
van, large truck), should determine whether or not the distance for the
evacuation assembly area(s) should be widened in case of detonation.
- True
- False
ANSWER:
a.
- In the
case of evacuation and a known location of a potential bomb, the following
distance for evacuation safety should be:
Small
box -
985 feet or 300 meters
Briefcase
- 1123 feet or 342 meters
Small
car - 1500
feet or 457 meters
Large
car - 1750
feet or 534 meters
Van
- 2750 feet or 838 meters
Large
Truck - 5000 feet or 1534 meters
- True
- False
ANSWER:
b.
- With
regards to evacuation scene safety, there are several guidelines that
should be adhered to. Which of the following is NOT a recommended
guideline?
- Avoid
puddles of liquid
- Wear PPE
- Stay down
wind/hill if possible
- Do not
move suspicious objects
ANSWER:
c.
- With
regards to Establishing Security & Control, in the event that a bomb
has detonated, it is important to be empathetic to the victims and
evacuees. One way to demonstrate this is by waiting a min. of 24 hours
prior to establishing a perimeter, setting up a command post etc., as this
will only add to the stress of those around.
- True
- False
ANSWER:
b.
- If a
blast has occurred, some general guidelines to follow in regards to
general scene response include:
- Establish
a perimeter, which may be up to a 900-foot radius around the blast crater
- Establish
a command post
- Safety
sweep the area immediately surrounding the command post & within the perimeter
for secondary devices
- Both b.
& c.
- All of
the above
ANSWER:
e.
- When
exercising scene safety, it is important to:
- Request
add’l resources & personnel to mitigate identified hazards
- Use tools
and PPE appropriate to the tasks being dealt with
- Mark
hazard areas clearly and designate safety zones to receive victims &
evacuees
- Both a.
& b.
- All of
the above
ANSWER:
e.
- An
example of an additional resource to request when dealing with a site
where a blast has occurred is:
- Bomb
technicians
- Building
inspectors
- Representatives
from utility companies such as gas, water, electric
- Both a.
& c.
- All of
the above
ANSWER:
e.
- One of
the most important aspects when it comes to scene safety is to allow full
access to the scene – the more eyes the better!
- True
- False
ANSWER:
b.
- With
regards to scene safety control, it is important to keep track of your
people. You should have full knowledge of not only the number of people at
the scene, but also be further aware of the number of individuals working
in hazards, as well as non-hazard areas.
- True
- False
ANSWER:
a.
- If a
blast occurs, time is of the essence to deal with evacuating individuals
from the blast area as well as dealing with victims that have been injured.
Which of the following is NOT a priority at this time?
- Initiate
rescues of severely injured and/or trapped individuals
- Preform
triage
- Remove
fatalities
- Treat
life-threatening injuries
- Evacuate
ambulatory victims
ANSWER:
c.
- There are
jurisdictional rights that take precedence for certain agencies, against
which a bomb threat may be received directly or indirectly; because of the
umbrella under which certain properties may fall. These specific agencies
are:
- BATF
- FBI
- Postal
Service
- Both a.
& b.
- All of
the above
ANSWER:
e.
- FBI has
jurisdiction in situations involving:
- Bomb
threats or offenses against property leased, used, or owned by the US
Gov’t
- Bomb
threats or offenses against property leased, used, or owned by the Treasury
Dept.
- Bomb
threats or offenses against property leased, used, or owned by Postal
Service
- Both a.
& b.
- All of
the above
ANSWER:
a.
- BATF has
jurisdiction in situations involving:
- Bomb
threats or offenses against property leased, used, or owned by the US
Gov’t
- Bomb
threats or offenses against property leased, used, or owned by the
Treasury Dept.
- Bomb
threats or offenses against property leased, used, or owned by Postal
Service
- None of
the above
ANSWER:
b.
- Postal
Service has jurisdiction in situations involving:
- Bomb
threats or offenses against property leased, used, or owned by the US
Gov’t
- Bomb
threats or offenses against property leased, used, or owned by the Treasury
Dept.
- Bomb
threats or offenses against property leased, used, or owned by Postal
Service
- Both b.
& c.
ANSWER:
c.
- A first
responder called in to assist with a bomb threat scenario is likely to be
requested to assist at the following type of scene:
- Pre-detonation
- Post-detonation
- Searches
- Continuing
incident
- All of
the above
ANSWER:
e.
- In the
case of possession of explosives while in or on the properties leased,
used, or owned by all three of the following agencies, BATF, FBI or Postal
Service, jurisdiction falls solely under the BATF.
- True
- False
ANSWER:
b.
- In the
case of possession of explosives while in or on the properties leased,
used, or owned by all three of the following agencies, BATF, FBI or Postal
Service, jurisdiction falls solely under the FBI.
- True
- False
ANSWER:
b.
- Pre-detonation
scenes may include:
- Bomb
threats
- Suspicious
items
- Confirmed
devices
- Both b.
& c.
- All of
the above
ANSWER:
e.
- The main
concerns with regards to establishing scene security when a device or a
suspicious item has been found are:
- Deny
access to the scene
- Establish
an evacuation distance
- Establish
a hard perimeter & begin evacuations
- All of
the above
- None of
the above
ANSWER:
d.
- No matter
which type of incident occurs, things such as time (until detonation
occurs), distance (evacuation distances), & shielding are universal
things to consider. When it comes to distance, the most important thing to
remember is time is of the essence therefore calculating the closest,
safety distance to steer evacuees to is the most ideal.
- True
- False
ANSWER:
b.
- When a
suspicious item or bomb is found, the most important thing to do
immediately is to quickly move the suspicious item or bomb far away from
people. It is much faster to move an item/bomb than it is to move a group
of people.
- True
- False
ANSWER:
b.
- When
evacuating individuals from a device that may or may not have detonated,
it is important to move them quickly to safe areas. Again, time is of the
essence, therefore the speed and distance at which you people is more
important than hesitating and delaying the haste in which you move by
worrying about secondary devices that may or may not be present.
- True
- False
ANSWER:
b.
- Once a
suspicious item has been identified as a confirmed device, the device may
then be handled or moved by:
- Building
maintenance
- Law
Enforcement / Private Security
- First
responders
- Bomb
technicians
- All of
the above
ANSWER:
e.
- Once a
suspicious item has been identified as a confirmed device, shielding from
the device must take place. The most important thing to remember here is:
- More is
always better – as much distance away the better
- Structural
differences (brick vs. cinder block vs. wood)
- The size
/ type of the device
- Both a.
& b.
- All of
the above
ANSWER:
d.
- Safety of
the public & of the bomb tech is always of utmost importance when
dealing with a device. Also import to consider is the “safety” of the
evidence. Two examples of this are, counter-charges & contamination.
- True
- False
ANSWER:
a.
- Post-detonation
scenes will vary depending on the type of device used. A very small
homemade device may cause little to no structural damage, whereas larger
devices can cause major structural damage and mass confusion. Regardless
of the damage caused, one must always keep in mind that rescue, recovery
& fire suppression efforts will need room to do their job.
- True
- False
ANSWER:
a.
- While
rescue, recovery & fire suppression efforts are underway, there is a
possibility that these efforts may alter the scene and contaminate
evidence to the point that it is altered or destroyed. At all costs, it is
most important to preserve the evidence above all else.
- True
- False
ANSWER:
b.
ERM
Ch. 467 Basic Search Techniques
- When
conducting an interior search of a room for suspicious packages or
explosives, you should:
- Start in
the center of the room and work a 360 degree radius
- Visually
inspect the room from the doorway
- Visually
inspect the room via CCTV
- Enter the
room, run the walls inspecting every possible hiding location & work
your way into the center of the room
ANSWER:
d.
- Normally,
during a bomb threat, the following personnel will be in control:
- The
Building Management
- Person
taking the call
- The
Building Maintenance Supervisor
- Local Law
Enforcement or Private Security
ANSWER:
d.
- If you
receive a bomb threat over the phone you should:
- Hang up
- Panic
& threaten the caller with Law Enforcement
- Stay calm
& show no emotion
- Pass the
phone to a Manager
- Have a
co-worker call 911
- Both c.
& e.
ANSWER:
f.
- If you
receive a bomb threat over the phone you should ask the following:
- What kind
of bomb is it?
- When is
it going to explode?
- Where is
the bomb now?
- How is it
going to explode?
- All of
the above
- None of
the above
ANSWER:
e.
- As the
call taker of a bomb threat you should be:
- Noting
the weather
- Noting
the callers voice characteristics
- Noting
any background noise
- Relaying
the information to another co-worker
- Both b.
& c.
ANSWER:
e.
- Suspicious
items should only be handled by bomb technicians and/or EOD personnel
- True
- False
- Not
enough information to answer
ANSWER:
b.
- When
evaluating & making decisions associated to a bomb threat one needs to
consider:
- Current
climate for terrorist or radical activity
- If this
is normal activity in the geographical area and should just be ignored /
dismissed
- How tight
is security in the area
- Both a.
& c.
ANSWER:
d.
- When
disseminating the information of a bomb threat one should consider the
following:
- Who will
notify personnel?
- How will
they be notified?
- How much
information to disseminate?
- Both a.
& b.
ANSWER:
d.
- Historically
we know that the following are common bomb placement locations:
- On
rooftops
- In
restrooms (especially women’s)
- Behind
bushes
- Both b.
& c.
- None of
the above
ANSWER:
d.
- In the
event of a bomb threat who should be assigned to search and inspect each
individual office?
- An EOD
specialist
- A team of
bomb technicians
- Each
office should be inspected by the personnel that work in that office then
report their finding(s) to a Supervisor
- Security
personnel should inspect & search each individual office
ANSWER:
c.
- During a
bomb threat search teams must be able to:
- Speak
several different languages
- Be able
to describe suspicious packages and/or objects
- Be able
to guide the EOD Team to the suspicious package or object
- None of
the above
- Both b.
& c.
ANSWER:
e.
- When
assigning members to a “search team” during a bomb threat you should only
select those that volunteer:
- True
- False
- Not
enough information to answer
ANSWER:
a.
- When
conducting a search of a scene & areas secondary to the scene it is
important to consider the possibility of additional devices, booby-traps,
bulk explosives & dangerous chemicals:
- True
- False
- Not
enough information to answer
ANSWER:
a.
- When
conducting vehicle search techniques, they can be broken down into the
following:
- Detonated
devices
- Suspected
devices
- Interior
devices
- Exterior
devices
- Both a.
& b.
ANSWER:
e.
- When
conducting vehicle searches for suspicious car bombs, the vehicle should
be searched systematically & with the use of a diagram:
- True
- False
- Not
enough information to answer
ANSWER:
a.
- Individuals
conducting searches for explosives should be able to conduct them:
- Slow
& methodical
- Deliberate
& hasty
- As
quickly & safely as possible
- Communicate
findings to EOD Team
ANSWER:
b.
- There are
two types of bomb threat searches – deliberate or hasty:
- True
- False
- Not
enough information to answer
ANSWER:
a.
- When a
bomb threat search team decides to do a hasty search, as opposed to a
deliberate search, it is usually:
- After a
bomb threat has been received
- Conducted
prior to the opening of a specific area
- After an
explosive has detonated
- Both a.
& b.
ANSWER:
d.
- In the
event of a bomb threat a deliberate search can be defined as:
- Very
quick, cursory search
- Very time
consuming
- Very
methodical - room by room, & floor by floor
- An EOD
search
- Both b.
& c.
ANSWER:
e.
- One of
the most important things to remember when conducting a bomb threat search
is to always:
- Have an
EOD specialist on the phone
- Wear the
proper protective gear
- Be alert
- None of
the above
ANSWER:
c.
- When
conducting a search during a bomb threat, one may deploy a “bomb dog” to
aid in the search; however, bomb dogs do have limitations
- True
- False
- Not
enough information to answer
ANSWER:
True
- While
conducting a search during a bomb threat, whether it’s a deliberate
search, or a hasty search, the person conducting the search should:
- Concentrate
on the room/area
- Put
themselves in the mindset of the bomber, i.e. placement / greatest effect
- Place
themselves in the mindset of the potential victim(s)
- None of
the above
ANSWER:
b.
- When
organizing a search team to conduct a deliberate search during a bomb
threat, normally the team should consist of:
- Four
people
- Two
people
- Two
people & an EOD specialist
- Three
people; one to take notes
ANSWER:
b.
- During a
bomb threat when the team is conducting a room search they should ensure
to do the following:
- Put one
person in charge
- Divide
the room in half
- Have
radio communication between the parties
- Use hand
signals to communicate
- None of
the above
- Both a.
& b.
ANSWER:
f.
- When
conducting a proper room search during a bomb threat, the person
conducting the search should search what area first?
- Top of
head to ceiling
- Waist to
top of head
- Floor to
waist
- Any
obvious objects in the room
ANSWER:
c.
- In the
event that a bomb threat is received, a search team should have the
following equipment at the ready:
- Proper
bomb suit
- Flashlight,
mirror, laser pointer
- Hazmat
suit
- Communication
devices
ANSWER:
b.
- When a
search team enters into their area of responsibility for search, they
should ensure to:
- Quickly
scan the room
- Close
their eyes & listen for a minute
- Develop a
systematic search plan
- Both b.
& c.
- Both a.
& b.
ANSWER:
b.
- During
the first room search of a bomb threat, the
search team(s) will do the following:
- Stand
back-to-back, work around the outer walls, & search from waist to top
of head level until both meet at the back of the room
- Stand
back-to-back, work around the outer walls, & search from floor to
waist level until both meet at the back of the room
- Stand
back-to-back, work around the outer walls, & search from the top of
the head to ceiling level until both meet at the back of the room
- None of
the above
ANSWER:
b.
- When a
bomb threat has been received and a third room search is being conducted,
the team conducting the search will stand back to back, work around the
outer walls, & search from head to ceiling level until both meet at
the back of the room
- True
- False
ANSWER:
a.
- During a
bomb search, and when conducting an exterior search the following should
be included:
- Trash
cans
- Bushes
- Windowsills
- Vehicles
- None of
the above
- All of
the above
ANSWER:
f.
- In the
event of a bomb threat, it is a good practice to have floor plans &
search diagrams at the ready.
- True
- False
ANSWER:
a.
ERM
Ch. 468 Terrorism Threat AT Officer Training
- The
following is DOD’s definition of terrorism:
“The
calculated use of violence or threat of violence to inculcate fear; intended to
coerce or intimidate governments or societies in the pursuit of goals that are
generally political, religious, or ideological.”
- True
- False
ANSWER:
a.
- When
looking at a geographical area, what factors must you consider when
determining the threat?
- Are there
any terrorist groups in that geographical area?
- Are they
violent?
- What
tactics, weapons, & types of attacks are they know for?
- How do
they operate?
- How
active are they?
- All of
the above
ANSWER:
f.
- When
conducting a terrorism threat assessment one must include a terrorist
profile. A typical terrorist profile is: male, 20’s, single, urban, well
educated and middle to upper class.
- True
- False
- Not
enough information to answer
ANSWER:
a.
- During a
possible terrorism threat which of the following are possible terrorist
tactics?
- Beheadings
- Bombings
- Sieges
& occupations
- Kidnapping
- None of
the above
- All of
the above
ANSWER:
f.
- In the
target selection phase of a terrorism threat, what needs to be considered?
- Target of
opportunity
- Recognition
target
- Retaliation
target
- Both a.
& b.
ANSWER:
d.
- In the
DOD’s increasing terrorism threat level chart, the second level of threat
is identified as “significant” and by the colour orange.
- True
- False
ANSWER:
b.
- When
conducting a terrorism threat analysis based on the DOD’s terrorism threat
level chart, one must consider the following:
- History /
existence
- Capability
/ intentions
- Faction /
cause
- Last
known attack proxemics
- Both a.
& b.
ANSWER:
e.
- In order
to “fill in the gaps”, in the terrorism threat analysis picture, local
initiative is needed. Fusing local asset information with threat
intelligence helps to create a full threat analysis.
- True
- False
ANSWER:
a.
- When
conducting a full terrorism threat assessment local initiative is needed
to fill the gaps in the threat assessment picture. The following are
examples of local information channels:
- Local
authorities
- Local
businesses
- Media
- Local
citizens
- None of
the above
- All of
the above
ANSWER:
f.
- In terms
of a terrorism threat, the following is the correct Force Protection
Condition sequence:
- True
- False
ANSWER:
b.
- Force
Protection Condition, or FPCON Normal, is best described as:
- A
terrorist attack is imminent
- No indication
of probable terrorist attack
- Best
information received indicates terrorist attack is probable
- Condition
white
ANSWER:
b.
- When in
FPCON Normal, one would expect to see a normal security posture to the
terrorism threat level:
- True
- False
ANSWER:
a.
- Force
Protection Condition FPCON Alpha is best described as:
- An
increased general threat of possible activity & violence, the nature
of which could is unpredictable.
- An attack
is imminent on personnel and facilities
- Real time
information suggests violence
- An attack
is not probable based on information received
ANSWER:
a.
- Force
Protection Condition FPCON Bravo is best described as:
- When an
increased or more predictable threat of terrorist activity exists
- An attack
is imminent on personnel and facilities
- Must be
capable of being maintained
- Both a.
& c.
- None of
the above
ANSWER:
d.
- It is a
standard operating procedure, that when in FPCON Bravo, extra precaution
is appropriate to deter terrorist planning:
- True
- False
ANSWER:
a.
- You
should expect to see closer inspections of vehicles and deliveries, as
well as ID checks & a greater presence of guards on your installation
during FPCON Bravo.
- True
- False
ANSWER:
a.
- FPCON
Charlie is best described as:
- When an
attack has occurred & rigorous security is required
- When an
incident occurs or intelligence is received indicating some sort of
terrorist action or targeting against personnel or facilities is likely
- Nothing
indicates that an installation is targeted
- General
conditions suggest possible violence
ANSWER:
b.
- During
FPCON Charlie one would expect rigorous efforts to inspect vehicles &
facilities & you may be required to inspect vehicles & facilities,
as well as be required to participate in special guard duties.
- True
- False
ANSWER:
a.
- When a
terrorist attack has occurred, or when intelligence has been received that
indicates terrorist action against a specific location is imminent, the
Force Protection Condition is known as FPCON Delta.
- True
- False
ANSWER:
a.
- When
FPCON Delta exists, one can expect:
- Additional
security measures are implemented which delay & interrupt normal
routines
- Expect
rigorous efforts to conduct further inspections on vehicles & installations
- Evidence
of a terrorist attack in the planning - such as surveillance or local
source reports
- None of
the above
- All of
the above
ANSWER:
a.
- When
considering your security measures during a terrorist threat, it is
essential operating procedure to implement random security measures in
conjunction with the Force Protection Condition.
- True
- False
ANSWER:
a.
- When
developing a comprehensive, anti-terrorism program, one must ensure the
following components are present:
- Threat
Assessment
- Vulnerability
Assessment
- AT Plan
- AT
Program Review
- Practical
Exercises
- Training
- True
- False
- Not
enough information to answer
ANSWER:
a.
- When
planning self protective measures during a terrorist threat, on should:
- Be
prepared for unexpected events
- Overcome
routines
- Always
divulge your information to several individuals so they can reach you
during an incident
- Stay
within the boundaries of daily routines
- Both a.
& b.
- Both c.
& d.
ANSWER:
e.
- During a
terrorist threat, one should maintain a low profile & overcome
routines, as well as varying routes & times to & from work.
- True
- False
ANSWER:
a.
- During a
terrorist threat, one should consider the following self-protective
measures:
- Be alert
& aware of changes in the security atmosphere
- When
possible stay indoors & avoid public venues
- When in
public, look for larger crowds & stay with them when moving
- Avoid
public disputes or confrontations & report any trouble to the proper
authorities
- Both a.
& d.
- Both b.
& c.
ANSWER:
e.
ERM
Ch. 464 Home Made Explosives Part 2
- Aluminum
Powder may look:
- Whitish
- Silver
- Gray or
black
- Both a
& b
- All of
the above
ANSWER:
e.
- Aluminum
Power vapors can be explosive.
- True
- False
ANSWER:
a.
- Some
commercial uses for Aluminum Powder are:
- Paints
- Pyrotechnics
- First-aid
cold packs
- Both a
& b
- All of
the above
ANSWER:
d.
- In small
quantities (less than 5 gallons) Ammonium Nitrate may be stored in glass
or plastic containers; however in larger quantities (more than 5 gallons),
it should be contained in:
- Steel
drums
- Wooden
barrels
- Plastic
or paper bags
- None of
the above / plastic containers only
ANSWER:
c.
- Some of
the key identifiers for Ammonium Nitrate are:
- Crystalline
or powder that is colorless or yellow & odorless
- Spherical
pellets, granular, crystalline or powder that is colorless or white &
odorless
- Spherical
pellets, granular, crystalline or powder that can be gray, black or white
& odorless
- Spherical
pellets, granular, crystalline or powder that is colorless or white, with
an acrid/ sour odor
ANSWER:
b.
- Some of
hazards of Ammonium Nitrate are:
- Eye,
skin, respiratory irritant
- Should
not be near chemicals rich in oxygen
- By itself
it can be explosive
- Both a.
& c.
- Both a.
& b.
ANSWER:
d.
- Ammonium
Nitrate can be found in products purchased from:
- Agricultural
supply stores, chemical supply stores, first aid supplies
- Agricultural
supply stores, beauty supply stores, first aid supplies
- Beauty
supply stores, chemical supply stores, first aid supplies
- Chemical
supply stores, first aid supplies, health food stores
ANSWER:
a.
- Some key
identifiers for Citric Acid are:
- Crystalline,
white or colorless, acrid/sour odor
- Power
(fine), silver or white, odorless
- Crystalline,
white or colorless, odorless
- Power
(fine), silver or white, acrid/sour odor
ANSWER:
c.
- Other
names for Citric Acid can be:
- Hydrogen
Nitrate & citric salt
- Hydrogen
Citrate & sour salt
- Hydrogen
Dioxide & sour salt
- None of
the above
ANSWER:
b.
- One of
the commercial uses for Citric Acid is as a food additive.
- True
- False
ANSWER:
a.
- Ethylene
Glycol is also known as:
- Glycol of
Ethyl
- Ethanediol
- Glycoethyl
- Monoethyl
Glycol
ANSWER:
b.
- Large
quantities (more than 5 gallons) of Ethylene Glycol will more than likely
be found stored in:
- Large
glass containers
- Large
steel containers
- Both a.
& b.
- None of
the above / should be stored in small quantities only
ANSWER:
b.
- Ethylene
Glycol should ideally be stored in a warm, oxygen rich environment to
stabilize its nature.
- True
- False
ANSWER:
b.
- Some of
the commercial uses of Ethylene Glycol include:
- Antifreeze
- Commercial
explosives
- Both a.
& b.
- None
known
ANSWER:
c.
- Hexamine
can come in a crystalline or solid white tablet form and:
- Is
odorless
- Has a
slight fish odor
- Has an
acrid, sour odor
- Has a
slight ammonia like odor
ANSWER:
d.
- Large
quantities of Hexamine are usually stored in:
- Woven
bags
- Plastic
bags
- Steel
containers
- Plastic
containers
ANSWER:
a.
- Hexamine
is also known as:
- Hexanitrate
- Hexamethylene
- Methenamine
- None of
the above
ANSWER:
c.
- Hexamine
should not be stored near peroxides, or chemicals rich in oxygen.
- True
- False
ANSWER:
b.
- Because
of its various commercial uses, Hexamine can be found in products sold in:
- Agricultural
supply stores
- Camping
& army surplus stores
- Chemical
stores
- Both a. &
c.
- Both b.
& c.
- All of
the above
ANSWER:
e.
- Hydrochloric
Acid is most commonly know to be found in liquid form, but in its purest
state may also be found in a solid tablet form.
- True
- False
ANSWER:
b.
- Some
examples of equipment that would be likely in the presence of large
quantities of Hydrochloric Acid would be:
- Grinders,
respirators, acid resistant aprons, impermeable gloves, fume hoods
- Blenders,
respirators, acid resistant aprons, fume hoods
- Protective
face/eyewear, impermeable gloves, respirators, fume hoods
- Grinders,
Pyrex containers, acid resistant aprons, protective face/eyewear
ANSWER:
c.
- Hydrochloric
Acid should not be stored near anything except other acids.
- True
- False
ANSWER:
a.
- Some commercial
uses for Hydrochloric Acid are:
- Paint
remover
- Beauty
supply products
- Manufacture
of plastics and some chemicals
- All of
the above
ANSWER:
c.
- Hydrogen
Peroxide is also known as:
- Hydroxide
- Dihydrogen
Dioxide
- Hydrogen
Dioxide
- None of
the above
ANSWER:
b.
- Some key
identifiers for Hydrogen Peroxide are:
- Clear,
colorless liquid, odorless
- Slightly
whitish/milky liquid, odorless
- Light/pale
blue liquid, with a slightly pungent, caustic odor
- Clear, colorless
liquid, with a slightly pungent, caustic odor
ANSWER:
d.
- Select
where the highest concentration of Hydrogen Peroxide can be obtained:
- Internet
- Chemical
supply stores
- Beauty
supply stores
- Drug
stores
ANSWER:
b.
- Magnesium
Powder can come in the following form:
- Solid
- Spherical
pellets
- Powder
- Both a.
& c.
- All of
the above
ANSWER:
d.
- Small
quantities of Magnesium Powder may be stored in:
- Plastic
& steel containers
- Steel
containers
- Plastic
containers
- Plastic or
paper bags
ANSWER:
a.
- Magnesium
Powder should not be stored in direct sunlight as it could cause the
release of flammable gasses.
- True
- False
ANSWER:
b.
- With
regards to the known hazards of Methyl Ethyl Ketone, it should be
remembered that the vapor:
- May be
present in adjacent areas
- Can be
explosive
- May cause
drowsiness and dizziness
- Both a.
& c.
- All of
the above
ANSWER:
e.
- One
especially caustic solution that Methyl Ethyl Ketone should be kept away
from is:
- Acid
- Lye
- Hydrogen
Peroxide
- None of
the above
ANSWER:
b.
- A couple
of commercial uses for Methyl Ethyl Ketone are:
- Wax
remover and paint thinners
- Manufacture
of engines and cars
- Dynamite
and pyrotechnics
- Paint
removers & plastics manufacture
ANSWER:
d.
- Nitric
Acid has the darkest hue (color), when:
- Its
concentration level is high
- Its
concentration is low
- When it
is exposed to heat or direct sunlight
- None of
the above / colorless
ANSWER:
a.
- Skin
exposed to Nitric Acid will turn:
- White
- Black
- Yellow
- Red
ANSWER:
c.
- Two
additional names Nitric Acid is known as are:
- Aqua
Fortis & Azotic Nitrate
- Aqua
Nitrate & Azotic Fortis
- Hydrogen
Nitrate & Aqua Acid
- Aqua
Fortis & Azotic Acid
ANSWER:
d.
- Inhalation
of Nitric Acid can be fatal.
- True
- False
ANSWER:
a.
- A weapon
of choice in many parts of Asia and the Middle East use __________ as a
means for disfiguring women.
- Hydrochloric
acid
- Sulfuric
acid
- Nitric
acid
- All of the
above
ANSWER:
d.
- The
commercial uses of Nitric Acid vary widely; from rocket propellant, to
fertilizer/explosives manufacture, to beauty supply products.
- True
- False
ANSWER:
b.
- Some of
the key identifiers for Nitro Methane are that it is:
- Liquid,
clear colorless to light yellow or greenish yellow, pungent / sour odor
- Liquid,
colorless, fruity disagreeable odor
- Liquid,
colorless, sweet, minty, acetone-like agreeable odor
- Liquid,
light to dark brown color, odorless
ANSWER:
b.
- Large
quantities of Nitro Methane can be kept in glass, metal or plastic
containers.
- True
- False
ANSWER:
b.
- Some of
the hazards of Nitro Methane are:
- It can be
explosive in hot confined areas
- Extremely
flammable vapors, flammable, and susceptible to explosion
- Dizziness,
vomiting, weakness & fall in blood pressure
- Both a.
& b.
- All of
the above
ANSWER:
e.
- One
example of a commercial use for Nitro Methane is:
- Dynamite
- Beauty
supply products
- Industrial
solvent
- Paint
remover
ANSWER:
c.
- Potassium
Chlorate is a:
- White,
odorless liquid
- White,
odorless crystalline or powder
- White,
acrid or sour odor, crystalline or powder
- White,
acrid or sour odor liquid
ANSWER:
b.
- Potassium
Chlorate is also known as:
- Chlorate
of Potassium
- Chlorate
of Potash
- Potash
Chlorate
- Potassium
Oxynitrate
ANSWER:
b.
- Below are
some examples of places where Potassium Chlorate could be sourced. Which
one is not?
- Agricultural
supply stores
- Beauty supply
stores
- Chemical
supply stores
- Hardware
supply stores
ANSWER:
b.
- Potassium
Permanganate can come in a solid or crystalline, is odorless, violet or
purple in color, & will stain most anything, including the skin which
it will stain ________?
- Purple
- Blue
- Brown
- It will
not affect skin
ANSWER:
c.
- Potassium
Permanganate stands out as different in that although it has certain
hazards, i.e. should not be near metals, acids, fuels, peroxides and
combustibles, when it come to safe handling, the most that is required is
a well ventilated area (open windows, doors and fans).
- True
- False
ANSWER:
False
- Three
main types of locations that Potassium Permanganate can be acquired at
are:
- Agricultural,
chemical & pool supply stores
- Agricultural,
chemical & first aid supply stores
- Aquarium,
chemical & pool supply stores
- Aquarium,
agricultural & pool supply stores
ANSWER:
c.
- Sodium
Chlorate is used in these commercial purposes:
- Fertilizer
- Pesticides
- Plastic
Manufacture
- None of
the above
- All of
the above
ANSWER:
d.
- Some key
identifiers for Sulfur are:
- Granular,
white, odorless
- Powder
(chalky), colorless, smells like rotten eggs when heated
- Powder
(chalky), yellow, odorless
- Tablet form,
white until ground, then yellowish, smells like rotten eggs
ANSWER:
c.
- Which is
NOT an example of a commercial use for Sulfur?
- Fertilizer
- Food
additive
- Matches
- Soil
additive
ANSWER:
b.
- Sulfur,
if combined with chemicals rich in oxygen could be used to create a
________ HME:
- Ammonium
Nitrate Mixtures
- Dynamite
- Water
gels
- Flash
powders
ANSWER:
d.
- Sulfuric
Acid is also known as:
- Oleam
- Vitriol
- Hydrogen
Sulfur
- None of
the above
ANSWER:
b.
- Sulfuric
Acid is very corrosive, as well as a severe irritant to eyes, skin and
respiratory systems, and therefore, should be stored near chemicals rich
in oxygen, but away from caustic solutions such as lye.
- True
- False
ANSWER:
b.
- An
example of a commercial use for Sulfuric Acid is:
- Drain
pipe cleaners
- Automotive
batteries
- Polymer
manufacture
- Both a.
& c.
- All of
the above
ANSWER:
e.
- Sulfuric
Acid can be used to make the following HME:
- EDGN
- TATP
- MEKP
- Both b.
& c.
- All of
the above
ANSWER:
e.
- Urea can
come in crystalline, granular or powder form and has the following odor:
- None
- Metallic
like
- Ammonia
like
- All of
the above (each form differs)
ANSWER:
c.
- Some
hazards of Urea are that it can be an eye, skin and respiratory irritant;
however, in cream form it can be used as a moisturizer for dry, cracked,
calloused & rough skin.
- True
- False
ANSWER:
a.
- Grinders
are used to reduce the granule size of solid components. An example would
be:
- Mortar /
pestle
- Handheld
electric coffee grinder
- Commercial
grade coffee grinder
- Ball mill
- Both b.
& c.
- All of
the above
ANSWER:
f.
- Grinders
are commonly used in the production of which HME?
- Ammonium
Nitrate Mixtures
- Black
Powder
- Chlorate
/ Perchlorate Mixtures
- All of
the above
ANSWER:
d.
- Ice baths
cool mixtures that generate heat. An example of an ice bath would be:
- Ice with
salted water
- Dry ice
with acetone
- Bath
water
- Both a.
& b.
- All of
the above
ANSWER:
e.
- Ice baths
are commonly used in the production of this HME:
- TATP
- HMTD
- MEKP
- Both b.
& c.
- All of
the above
ANSWER:
e.
- Distillers
concentrate chemical components with low-level heat, and therefore,
require complex scientific equipment and not improvised or household items
as some other process methods can get away with.
- True
- False
ANSWER:
b.
- Filters
are used to separate the solids from the liquids and are commonly used in
the HME production of:
- HMTD
- TATP
- Hydrogen
Peroxide Mixtures
- Urea
Nitrate
- All of
the above
ANSWER:
e.
- There are
various hazards associated to the handling of the chemicals we have
discussed such as eye, skin & respiratory irritants, severe burns
etc., that can only heighten during the production of HMEs; therefore a
telltale indicator that HMEs are in fact being produced will be the
presence of safety equipment such as masks, goggles, face shields,
protective clothing and vents.
- True
- False
ANSWER:
b.
INTELLIGENCE
In
this exercise the student will attempt to answer questions on general concepts
of intelligence , the intelligence cycle , intelligence disciplines ,
advantages and disadvantages.
- Which one
is the battlefield operating systems?
- XP
- b.
Maneuver
- DOS
- Intelligence
- Which factor
is included in ISR operation?
- Information.
- Integrity.
- Intelligence.
- Mobility
- Why BOS
is essential?
- Intelligence.
- Tactics.
- Information.
- Mobility
- Which one
is out of scope for BOS?
- plan
- prepare
- collect
- Patrolling
- Who
determines the relevant information from the bunch of information?
- Agent
- Informer.
- Advisory
- Commander
- What
converts acquired information into intelligence ?
- Analyzing
Information
- Talking
to a patrol
- Planning
and Direction
- Conversation
with detainee
- Who is
the intermediary between policymakers and military commanders?
- Agent
- Issue
Coordinators
- Advisory
d.Operation
Head
- Signals
intelligence (SIGINT) relevant with …………
- Signature
intelligence
- IMINT
- Telemetry
- Nuclear
science
- Open-source
information can be collected from ……………
- Commercial
Databases
- By
Questionnaires
- By
Interview
- By
Official contacts
- MASINT
deals with ……………….
- Electronic
intelligence
- Radar
Signatures
- Internet
- Mapping
- Who is
the responsible for analysing counterterrorism?
- Advisory
- Issue
Coordinators
- Analyst
d.Operation
Head
- Which one
is relevant to day-to-day events?
- Current
Intelligence
- Warning
Intelligence
- Research
Intelligence
- Estimative
intelligence
- Which
intelligence works for gap analysis?
- Current
Intelligence
- Warning
Intelligence
- Research
Intelligence
- Estimative
intelligence
- Which
intelligence is the base of current and estimative intelligence?
- Current
Intelligence
- Warning
Intelligence
- Research
Intelligence
- Estimative
intelligence
- Basic
intelligence material is presented ………
- by
alarming or notice.
- By weekly
publications.
- By the
form of maps
- By signal
potentially dangerous situations
- What does
JWICS stand for?
- Joint
Worldwide Intelligence Community System
- Joint
Worldwide Information Communications System
- Joint
Worldwide Intelligence Communication System
- Joint
Warning Indications Communications System
- Which
intelligence system discuss about weapon system?
- Research
intelligence
- Warning
intelligence
- Operational
intelligence
- Scientific
and technical intelligence
- What is
the top priority for DIA?
- Satisfy
policy maker
- Satisfy
commander.
- Communicate
between operation head and advisory
- Satisfy
the intelligence needs of operational forces
- Which
intelligence system provides detailed system handbooks?
- Scientific
and technical intelligence
- Warning
intelligence
- Operational
intelligence
- Research
intelligence
- Which
intelligence uses people as the main medium for collecting information?
- IMINT
- HUMINT
- MASINT
- GEOINT
- Which
intelligence provide the current geographical situation of the desired
area?
- IMINT
- HUMINT
- MASINT
- GEOINT
- Which
intelligence uses decryption technique?
- HUMINT
- IMINT
- SIGINT
- GEOINT
- Which
intelligence helps to obtain necessary information about immunizations
before entering an area?
- HUMINT
- MEDINT
- SIGINT
- GEOINT
- Bio-Scientific
Information is focused by
- HUMINT
- GEOINT
- SIGINT
- MEDINT
- Electronic
fund transferred is monitored by
- Research
intelligence
- Financial
intelligence
- Operational
intelligence
- Scientific
and technical intelligence
- Which one
is the advantage for GEOINT?
- Require
human
- Need
expensive equipment.
- Need time
- No human
require
- Most
intelligence system is …….
- Complex
- Operated
by human
- Time
consuming
- Required
software
- Military
intelligence demands for …..
- Highly
equipment.
- Latest
software,
- c. Faster
accurate intelligence
- The
person or agency
- How the
risk of HUMINT can be reduced?
- a. By
Training
- By
operation commence
- Having
conversation with detainee
- Employing
agents
- Which
intelligence system is the most effective for asymmetric warfare targets?
- HUMINT
- MEDINT
- SIGINT
- TECHINT
- Which
approach was effective during the Battle for Algiers at 60’s?
- MASINT
- MEDINT
- SIGINT
- HUMINT
- What is
the disadvantage of forcible HUMINT collection?
- Actionable
intelligence in a timely manner
- Sustainable
in the short-term
- Applicable
for long-term problems involving hearts and minds
- Searchable
against the immediate asymmetric targets.
- Which
intelligence was effective for Operation Enduring Freedom (OEF) at 2001 in
Afghanistan?
- HUMINT
- MEDINT
- SIGINT
- TECHINT
- Debriefing
of patrols is the part of ……..
- MASINT
- TECHINT
- SIGINT
- HUMINT
- Which
intelligence is used for other intelligence indicators?
- IMINT
- TECHINT
- SIGINT
- HUMINT
- Which
intelligence system is relied upon by the combat commander?
- One
intelligence is better than another.
- All the
intelligence need to work together
- SIGINT
and HUMINT
- TECHINT
and HUMINT
- What is
the source of HUMINT?
- HUMINT
collector
- Agent
- Commander
- Individual
- Which
HUMINT phases is used to create questions?
- Questioning
- Planning and
Preparation
- Termination
- Reporting
- Interrogation
is the part of the HUMINT phase …………
- Planning
and Preparation
- Termination
- Reporting
- Questioning
- Reporting
phase of HUMINT deals with …….
- Passing
information.
- Complaining
issue
- Summarizing
document
- Create
questionnaires
- Who can
be performed Tactical questioning?
- Commander
- Any DOD
personnel
- HUMINT
collector
- Refugees
- Why
screening process is necessary?
- Identify
the level of knowledge
- For
interrogation the refugees
- For
debriefing the patrol team
- For document
exploitation
- Which one
is essential for the intelligence process?
- Torture
- Planning
- Interrogation
- Eye
contact
- Source
information are evaluated by ………
- Refugees.
- Cooperating
sources
- Patrol
Teams
- Liaison
- Who is
not involved in liaison operations?
- Commander
- Soldiers
- HUMINT
collector
- Civilian
agencies
- What is
the features of HUMINT sources?
- Any human
source
- One-time
contacts or constant sources
- None
- Spy
- Which
procedures contributes to the military decision-making process (MDMP)?
- Passing
information.
- Analyzing
available information
- Summarizing
document
- Create
questionnaires
- DOCEX
operations extracts information from …….
- Interrogation
- Debriefing
- Published
and electronic source documents
- Inquiry
physically
- Information
must be analyzed and verified before forwarding to information cell by
- HUMINT
collector
- Commander
- Agent
- Analyst
- DOCEX
captured documents provide information about …..
- Actionable
intelligence
- Enemy’s
insight information
- Both
- None
- DOCEX
captured documents need ……..
- Verified
by multiple sources
- Discard
the misleading information
- Follow
accordingly
- Forward
to intelligence cell
- Who does
the timely analyses and cross verification of information?
- Commander
- Soldiers
- HUMINT
collector
- Civilian
agencies
53,
Which one has no CEE operation intelligence value?
- Manuals
- Computers,
Telephones, PDAs
- Weapons
- Weather
news
54.What
is the capability of HUMINT collector?
- Able to
extract actionable intelligence
- Able to
deal with people in all conditions
- Specify
relation among available information
- Both a
and b
55.Which
one is the good HUMINT collector quality?
- Craziness
- Credibility
- Work gigs
- Highly
army personnel
- What is
not good HUMINT collector weakness?
- Displaying
anger
- Showing
sympathy
- c. Highly
Demeanor
- Unresponsive
57
Neurolinguistics helps to improve …….
- Communication
skills
- Cultural
awareness
- Face
threat
- Operational
power
- HUMINT
collectors are sometimes assigned special taskings like
- Spying
- Lead to
battle
- Counter
intelligence
- Intermediary
communication
- What is the
barrier of effective actionable intelligence?
- Lack of
support of the local population
- Lack of
HUMINT sources
- No
reliable source
- Lack of
interrogation
- What is
the barrier in joint operations?
- Population
support.
- Language
- No
reliable source
- Lack of
interrogation