ANTITERRORISM TRAINING
TACTICS , TECHNIQUES AND PROCEDURES


KESHAV MAZUMDAR
Antiterrorism Officer




 

AT/Int Question Bank

ANTITERRORISM      

 

By definition, surveillance is the continuous or periodic act of observing by surreptitious means a person, a place, or a thing for the purpose of gathering information otherwise unavailable or impractical to obtain.

 

True

False

Not enough information to make a decision

 

Surveillance can also be defined as the secretive, continuous, and sometimes periodic watching of persons, vehicles, and places or objects to obtain information concerning activities and identities.

 

True                                  

False

Not enough information to make a decision

 

Appearance, Poise, Resourcefulness, Alertness and Patience are traits that you need to know about a:

 

A    Intelligence Officer

B    Police Officer

C    Surveillant

D    Terrorist

E     None of the Above

 

The Answer is C

 

Initial target selections, Gather information – surveillance, Final target selection, Planning and rehearsal, Deployment, Transition to Attacker, Attack and escape or suicide and Escape and exploit the Act are the steps of:

 

A    Surveillance

B    Tactical Response

C    War Games

D    Attack

E    Intelligence Recovery

 

The following are initial required terrorist surveillance objectives?  Residence and work place, Transportation used, Routes traveled, Routines, Security awareness, Characteristics of places visited, Protective systems, Security Forces

True

False

Not enough information to make a decision

 

From translated terror training manuals when conducting surveillance on a potential target after determining who the target person is additional information required about the target is:

 

A    Entrance locations to home, Vehicle color, Vehicle Make, License Number.

B    If Subject utilizes personal protection, Is there an Alarm System, Is it monitored.

C    Who does he associate with, What does he look like, What are his physical features.

D    Are his protectors armed, Is his vehicle up armored, does protector conduct IED     check

 

Once target is chosen the next level of surveillance is to determine:

 

A    Is the target news worthy, does the target pose a threat to Ala

B    Is the target married, How many children does he have, Relatives, exact address.

C    Has the subject committed any acts disrespectful to Islam or Mohammad

D    Will the attack further the advancement of Jihad

  

When surveillance subject utilizes public transportation information that needs to be determined is:

 

A    How does he travel to the public transportation

B    Where does he get on and off.

C    Does the public transportation have surveillance cameras

D    Does his schedule put him on public transportation after dark

 

Surveillance is normally conducted by the more experienced cell members.

 

A    True

B    False

C    Not enough information to make a decision

 

Islamic Jihadist utilize their new recruits for operational attacks to minimize the loss of seasoned experienced veteran in case of counter attack or heavy opposition.

 

A    True

B    False

C    Not enough information to make a decision

 

Jihadist surveillance teams are comprised of 18 to 24 year old Islamic males.

 

A    True

B    False

C    Not enough information to make a decision

 

Many attack sites are chosen due to their Choke points or ambush sites of Bridges, one way streets, Traffic circles, major intersections,.

 

A    True

B    False

C    Not enough information to make a decision

       

The human mind can concentrate effectively on only one thing at a time.  A person's eye may see something and his mind may process the information, but unless he is thinking about the information or something brings it to his attention, his mind will filter out this information because it is not significant or important to him at that time.  An enhanced state of awareness is the key to an effective protective posture in any high threat environment.

 

A    True

B    False

C    Not enough information to make a decision

 

Stationary and fixed surveillance can be established from a vehicle, a hotel or a motel, a house or an apartment, a warehouse, a café/restaurant, Concealed ground position or by using a Ruse

 

A    True

B    False

C    Not enough information to make a decision

 

The most common and preferred and used method of surveillance is;

 

A    Vehicle

B    Technical Electronic

C    CCTV

D    Static

E    Foot

The terrorist conducting surveillance will utilize certain techniques you can use to help you detect surveillance being employed against you, surveillance is carried out by men that are following you.

 

A    True

B    False

C    Not enough information to make a decision

  

What are the serious problems that exist for the surveillant?

A    Keeping eyes on the subject

B    Changing environments

C    Plausible Cause for actions

D    Dealing with internal conflict

E    All of the above

  

Common errors made by surveillant’s

 

A    Avoiding eye contact

B    Using mirrors and window reflections

C    Reading newspaper and Peeking

D    Moving to slow

E    A and C

F    A, B, C, D.

 

Surveillance personnel have an acute fear of being detected!

 

A    True

B    False

C    Not enough information to make a decision

 

You should keep in mind that the people doing the surveillance will try to change their appearance to make it more difficult for you to spot recurring faces.  They may put on or take off hats, eyeglasses, reversible jackets, clip-on ties, or other simple things to break up the outline of their appearance.

 

A    True

B    False

C    Not enough information to make a decision

  

The surveillants will usually have a cover for being in the area and for doing what they are doing.   They may have work orders or use a ruse such as being a meter reader or a polltaker.   If you are suspicious of any workmen in your area, pay particular attention to their shoes, watches an jewelry.  

 

A    True

B    False

C    Not enough information to make a decision

 

Passive maneuvers are techniques that draw attention to you.  These simple maneuvers allow you to confirm, or at least get an indication, that someone may be following you without blatantly confronting them.  Remember, an overtly compromised surveillant may commit a hostile act against you.

 

A    True

B    False

C    Not enough information to make a decision

 

If you suspect that you are being followed the best action you can take is to turn and confront the person following you so that you will have direct evidence of the surveillance allowing for a stalking charge.

 

A    True

B    False

C    Not enough information to make a decision

    

There may come a time, for whatever reason, when you suspect the presence of operational elements who are about to engage in imminent attack, rather than surveillance personnel who are gathering information.  No one can make this distinction for you; it is your decision.  It may be more of a feeling rather than actual knowledge.  Certainly, if you believe your life is in jeopardy, the time for subtlety has passed you should:

 

A    Immediately take cover

B    Call for help

C    Seek advice from the FBI

D    Move quickly and with purpose

  

Continual or two sightings of suspected surveillance at separate times, places suggest that surveillance is probable;

 

A    True

B    False

C    Not enough information to make a decision

 

Correct tradecraft for determining if you are under surveillance is to start by keeping a Surveillance detection journal.

 

A    True

B    False

C    Not enough information to make a decision

 

 

If surveillance is detected you should stay calm and don’t panic, don’t force a confrontation or tip your hand, go to a safe area if you feel threatened and report to the proper authorities:

 

A    True

B    False

C    Not enough information to make a decision

 

Attackers will be looking for a site that will give them predictability of the victim, control of the victim, hide or disguise plausibility and escape routes.

 

A    True

B    False

C    Not enough information to make a decision

 

Analysis of attack data shows us that over 35% of attacks happen near the residence.

 

A    True

B    False

C    Not enough information to make a decision

 

DEATH is the way terrorist tell you that you’ve passed their selection process!

 

A    True

B    False

C    Not enough information to make a decision

 

The complete awareness by an individual of his/her surroundings, achieved through maximum.

 

A    True

B    False

C    Not enough information to make a decision

  

High risk individual must.

A    Practice continual awareness.

B    Replace casual observation with study of detail.

C    Become familiar with descriptive terms concerning:

D    People, vehicles, colors, clothing, and hair styles.

E    A and D

F    A, B, C, D,

  

When observing people there are how many general characteristics to oberve?

A    3

B    4

C    5

D    6

 

Hostage taking is a way of setting up a bargaining position to achieve an otherwise unattainable objective.

 

A    True

B    False

C    Not enough information to make a decision

 

 

 

 

 

 

 A victim may be chosen because of his value to someone.  One government will not negotiate with terrorists.  This does not diminish the victim's value to his family, his employer, or himself.  There are numerous examples in which ransom demands have been met by private efforts.  This may free the hostage but unfortunately further promulgates the act.

 

A    True

B    False

C    Not enough information to make a decision

A victim may Not be chosen because he is prominent, because of his job position, because of his status, or simply because he is an American.

 

A    True

B    False

C    Not enough information to make a decision

 

A hostage situation is pending with various aggressive movements.

 

A    True

B    False

C    Not enough information to make a decision

 

A victim may be hated by his captors.  The terrorist organization may blame him directly for any setbacks it has suffered or may foresee disaster in the near future due to this individual's work. 

 

A    True

B    False

C    Not enough information to make a decision

 

Because of their desire for publicity, terrorists do not kidnap a victim and then not tell anyone.  The higher the status of the victim, the more publicity the event will solicit.

 

A    True

B    False

C    Not enough information to make a decision

 

The victim may be seen as a source of trouble.  In Colombia the terrorist groups M19 and the Armed Revolutionary Forces of Colombia (FARC), which make more than $100 million each year from cocaine, could look at the special agents of the U.S. Drug Enforcement Administration from this point of view.

 

A    True

B    False

C    Not enough information to make a decision

 

Most of the time, the hostage is just an innocent victim of circumstances who happened to be in the wrong place at the wrong time.

 

A    True

B    False

C    Not enough information to make a decision

 

 

 

All classification by category of hostage takers is an artificial matter.  We categorize hostage takers merely to provide guidelines.  The real identity of the terrorist can only be examined in the context of his relationships to the people, the organization, places, ideas, and the historical context with which he is associated.  The question one must ask when examining any terrorist action is, "Does the ideology support the actual beliefs of a group, or is it merely a tool used to justify their actions?"  Symbionese Liberation Army (SLA) leader Donald DeFreeze used Marxism as a cover label for criminal actions.

A    True

B    False

C    Not enough information to make a decision

 

 

 

Terrorist organizations are usually stratified.  At the top of a pyramid like structure, single, urban, bright, and dedicated idealists can be found.  Often this layer of terrorists comes from professions such as medicine and law.  The lower down the ranks of a terrorist organization one looks, the greater the diversity of personality styles one sees:  the disillusioned, the mentally ill, the sociopaths recruited from prisons, and the ideologically motivated.  There are also those who are monetarily motivated, the "mercenary"-style terrorists, and those seeking some form of personal revenge.  Almost all terrorist organizations form a cross section of the population from which they emerge.  The group performing the hostage taking will in turn be a representative slice of the organization.  This slice performs its operations in support of the larger organization's long-range goals.

 

A    True

B    False

C    Not enough information to make a decision

 

 

 

 

Two categories of hostage takers that pose a major threat to U.S. government representatives are political extremists and religious fanatics.

 

 

 

 

 

A    True

B    False

C    Not enough information to make a decision

 

 

 

Political extremists.  These hostage takers often operate within a military like structure.  This control factor may hold violence within planned limits.  Still, within the group there may be one or more terrorists whose propensity for cruelty makes them more dangerous.  While they may be held in check by their group leadership, it is important to identify them early in the event and spend extra effort to avoid a confrontation.  The average age of most political terrorists ranges between 19 and 35.  Political extremists generally only take hostages when they have some control over the general terrain where the event will take place or when a friendly or neutral country may provide shelter.  Hostage taking by this group of terrorists can be viewed as a barometer of political extremism in a geographic area.

A    True

B    False

C    Not enough information to make a decision

 

 

 

 

 

 

Religious fanatics.  These hostage takers generally fit one of three categories.  They are usually either a member of a recognized religion or a radical offshoot of that religion, a member of a cult, or a religious loner.  Religious fanatics share a common, unshakable belief in the righteousness of their cause and the appropriateness of their actions.  With the exception of the loner, religious fanatics have a charismatic leader and preach.  The death wish is strong in many religious fanatics.

 

A    True

B    False

C    Not enough information to make a decision

 

The lone religious fanatic, while not often encountered, could present the gravest threat.  He will be even more detached from reality and less rational than the one belonging to a group.  This religious fanatic claims to be operating on direct divine orders.  Because of that, he is probably the most dangerous and the least susceptible to reason. 

 

A    True

B    False

C    Not enough information to make a decision

 

What is another category of hostage takers?

 

A        Fleeing criminal,

B       The wronged person

C        Mentally disturbed person.

D        All of the Above

 

Answer is D

 

 

 

Once establishing a good rapport with the hostage taker, the hostage should utilize hostage negotiation techniques to assist in their release.

 

A    True

B    False

C    Not enough information to make a decision

 

 

 

 

The hostage should make every attempt to establish rapport with the terrorists.

 

A    True

B    False

C    Not enough information to make a decisio

 

 

 

 

Members of the armed forces must always consider themselves to be potential hostage victims, if for no other reason than for publicity.  Before they arrive at a high-risk area, they should consider personal contingency planning.

A    True

B    False

C    Not enough information to make a decision

  

There is no reason for a potential hostage to take any personal actions to prepare himself for becoming a hostage as the Government or Military will take responsibility for anything that he may need.

 

A    True

B    False

C    Not enough information to make a decisio

 

 

 

 

 

 

 

To lessen the trauma on both himself and his family, the potential hostage should maintain his family and personal affairs in good order.  He should keep his will current, draw up appropriate powers of attorney, and take measures to ensure family financial security. 

 

A    True

B    False

C    Not enough information to make a decision

The potential hostage should discuss plans and instructions with his family in the event he is abducted.  He may have a packet made up containing instructions for his family, money, airline tickets, credit cards, insurance policies, and the name of the person to contact for survivor assistance, with instructions to open the packet in the event he is taken hostage.

 

A    True

B    False

C    Not enough information to make a decision

 

 

 

 

Briefcase contents.  The potential hostage should not carry classified documents or other sensitive or potentially embarrassing items in his briefcase or on his person.  If taken hostage, he should be prepared to explain phone numbers, addresses, names, and other items carried at the time of capture.

 

A    True

B    False

C    Not enough information to make a decision

 

During captivity, he should Not try to convince his captors that they have kidnapped the wrong. 

 

A    True

B    False

C    Not enough information to make a decision

 

 

 

Medicine.  The potential hostage should carry a week's supply of any essential medication when traveling or when stationed in a high-risk area. 

 

A    True

B    False

C    Not enough information to make a decision

 

 

 

The hostage should always try to escape at the time of capture

 

A    True

B    False

C    Not enough information to make a decision

 

If you  plan in advance to escape you should have a plan in your mind and practice your plan.

 

A    True

B    False

C    Not enough information to make a decision

 

The initial moment in a capture is the most dangerous time because the captors are tense and their adrenaline is flowing.  The victim may reassure his captors that he is not trying to escape. 

 

A    True

B    False

C    Not enough information to make a decision

 

The hostage should keep in mind that the assailant has meticulously planned and executed the hostage operation.  The initiative, the time, the location, and the circumstances of the incident--all favor the kidnappers.  The manpower and firepower brought to bear on the incident leave little opportunity for escape.

 

A    True

B    False

C    Not enough information to make a decision

 

As a hostage you need to maintain a positive mental attitude to avoid depression and lethargy.

 

A    True

B    False

C    Not enough information to make a decision

  

 

The Stockholm syndrome seems to be an automatic, unconscious, emotional response to the trauma of becoming a victim.  The physical and psychological stress induced by the hostage situation causes the hostage to react in a manner totally against his normal beliefs, values, and ethics.

 

A    True

B    False

C    Not enough information to make a decision

 

 

 

The Stockholm Syndrome phenomenon only affects the hostage, it seems to be born in the high-stress environment of a siege room. An emotional bond forms and leads to the development of a philosophy:  "It's us against them.

A    True

B    False

C    Not enough information to make a decision

 

 

           

 

ERM Ch. 463 Home Made Explosives

 

  1. Which of the following is NOT an example of a homemade explosive?

 

  1. Ammonium Nitrate Mixtures

 

  1. Chlorate/Perchlorate Mixtures

 

  1. Syntax Peroxide Mixtures

 

  1. Triacetone Triperoxide

 

ANSWER: c.

 

 

  1. Which of the following is NOT a chemical component?

 

  1. Ammonium Nitrate

 

  1. Cellulose Acetate

 

  1. Hexamine

 

  1. Nitric Acid

 

ANSWER: b.

 

 

  1. Binders are materials that are used to hold certain explosive mixtures together. Which of the following is NOT an example of such a material?

 

  1. Carnauba Wax

 

  1. Duct Tape

 

  1. Grease

 

  1. Vaseline

 

ANSWER: b.

 

 

  1. In order to readily enable you to determine if you are dealing with a homemade explosive(s) lab, it is imperative you memorize the hard & fast rules of what to look for.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

 

  1. If, in a suspected explosives lab, you notice finer, more granular product in the presence of Pyrex or scientific glassware, filters, acid-resistant skin protection & ice water baths, which of the following should be furthered reviewed for information?

 

  1. Ammonium Nitrate

 

  1. Black Powder

 

  1. Chlorate/Perchlorate Mixtures

 

  1. Urea Nitrate

 

ANSWER: d.

 

  1. Below are examples of equipment that would suggest safety measures are being implemented. Select the item that doesn’t reflect this:

 

  1. Impermeable Gloves

 

  1. Dust Masks

 

  1. Protective Eyewear

 

  1. Blenders

 

ANSWER: d.

 

 

  1. If you notice predominantly liquid components in a suspected lab, along with scientific glassware, safety glasses, acid-resistant skin protection etc. Which of these following would you review information on?

 

  1. Ammonium Nitrate

 

  1. EGDN

 

  1. HMTD

 

  1. Urea Nitrate

 

  1. All of the above

 

ANSWER: b.

 

 

  1. One example of an Ammonium Nitrate Mixture would be:

 

  1. Ammonium Nitrate & Confectionery Icing

 

  1. Ammonium Nitrate & Coffee

 

  1. Ammonium Nitrate & Vegetable Oil

 

  1. Ammonium Nitrate & Citric Acid

 

ANSWER: a.

 

  1. One hazard of Ammonium Nitrate is that it can be explosive in hot, confined areas.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. Black Powder can appear in the following hues:

 

  1. Gray

 

  1. Dark Blue

 

  1. Black

 

  1. Both a. & c.

 

  1. All of the above

 

ANSWER: d.

 

 

  1. Some commercial uses of Black Powder are:

 

  1. Fuses

 

  1. Pyrotechnics

 

  1. Gunpowder

 

  1. Both a. & c.

 

  1. All of the above

 

ANSWER: e.

 

 

  1. Potassium Nitrate can be found in which of the following:

 

  1. Shampoo

 

  1. Cooking oil

 

  1. Food Preservatives

 

  1. Anti-bacterial Hand Soap

 

ANSWER: c.

 

 

 

 

 

  1. A key identifier of Chlorate / Perchlorate Mixtures is:

 

  1. A sugary sweet odor

 

  1. That it is odorless

 

  1. A dead fish smell

 

  1. A fuel odor

 

ANSWER: b.

 

 

 

  1. One of the chemical components found in Chlorate / Perchlorate Mixtures is:

 

  1. Petroleum Jelly

 

  1. Ethylene Glycol

 

  1. Nitric Acid

 

  1. Sulfuric Acid

 

ANSWER: a.

 

 

  1. Key identifiers of Ethylene Glycol Dinitrate (EGDN) are that it is an oily, viscous liquid that can range from colorless to dark yellow and is odorless.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. Colorless to white product found with solids settled at the bottom of a container and stored in a refrigerator or freezer may be:

 

  1. Ammonium Nitrate Mixtures

 

  1. Clorate / Perchlorate Mixtures

 

  1. Hexamethylene Triperoxide Diamene (HMTD)

 

  1. Methyl Ethyl Ketone Peroxide (MEKP)

 

ANSWER: c.

 

 

 

 

 

 

  1. If found, Hexamethylene Triperoxide Diamene (HMTD), should be stored near metals to ensure stability of the product.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. Hexamethylene Triperoxide Diamene (HMTD), can be made by combining chemical components found in such items as:

 

  1. Nail polish remover, bleaching agent, nitric acid

 

  1. Paint remover, hair products, sulfuric acid

 

  1. Hair products, cumin, racing car fuel

 

  1. Camp stove fuel tablets, hair products, water softener

 

ANSWER: d.

 

 

  1. Select the key identifiers for Hydrogen Peroxide Mixtures.

 

  1. Liquid or semi liquid gel, mixture color varies with additives, slightly pungent caustic odor

 

  1. Liquid or semi liquid gel, colorless to white, odorless

 

  1. Oily, viscous liquid, colorless to dark yellow, odorless

 

  1. Powdery substance, finer than flour, gray or black in color, dead fish odor

 

ANSWER: a.

 

 

  1. Methyl Ethyl Ketone Peroxide (MEKP) is also known as:

 

  1. Ethylene Dinitrate

 

  1. Hexamine

 

  1. Luberisol DDM

 

  1. Mother of Satan

 

ANSWER: c.

 

 

 

 

 

 

 

 

  1. Hazards of Methyl Ethyl Ketone Peroxide (MEKP) are:

 

  1. Extremely sensitive to impact, friction, static spark & heat; should not be near metals

 

  1. Extremely sensitive to impact, friction, static spark & heat; should not be near sulfuric acid

 

  1. Large quantities can self-heat and ignite if in sunlight or elevated room temperatures

 

  1. Large quantities can become unstable and ignite if kept in cooler room temperatures

 

ANSWER: b.

 

 

  1. Some key identifiers for Triacetone Triperoxide (TATP) are:

 

  1. Flour like appearance, solids settle on top of the container, fruity or vinegar smell

 

  1. Sugar like appearance, solids settle at the bottom of the container, fruity or vinegar smell

 

  1. Crystals, colorless to white in appearance, solids settle at the bottom of the container, odorless

 

  1. Sugar like appearance, solids settle at the bottom of the container, odorless

 

ANSWER: b.

 

 

  1. The chemical components that make up Triacetone Triperoxide (TATP) are:

 

  1. Acetone, Acid, Hydrogen Peroxide

 

  1. Methyl Ethyl Ketone, Acid, Hydrogen Peroxide

 

  1. Acetone, Nitromethane, Hydrogen Peroxide

 

  1. Hydrogen Peroxide, Acetone, Ethanol

 

ANSWER: a.

 

 

  1. One of the commercial uses for Triacetone Triperoxide (TATP) is:

 

  1. Blasting Agent (also know as ANFO)

 

  1. Dynamite

 

  1. Flash powders: Fireworks

 

  1. None known

 

ANSWER: d.

 

 

 

 

 

 

  1. Urea Nitrate is also known as:

 

  1. Acidogen Nitrate

 

  1. Gunpowder

 

  1. Luberisol DDM

 

  1. Mother of Satan

 

  1. None of the above

 

ANSWER: a.

 

 

  1. Urea Nitrate is unique in that additives will not alter the physical appearance of its color.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. Commercial uses for Urea Nitrate include:

 

  1. Blasting Agent (also know as ANFO)

 

  1. Dynamite

 

  1. Hydroponics

 

  1. None known

 

  1. Both a. & c.

 

ANSWER: d

 

 

  1. Urea is found in:

 

  1. Cumin

 

  1. Fertilizer

 

  1. Hair products

 

  1. Nail polish remover

 

ANSWER: b.

 

 

 

 

 

 

  1. Equipment used for the purpose of mixing Urea Nitrate is:

 

  1. Blenders, grinders, distillers, ice bath

 

  1. Glassware, distillers, blenders, filters

 

  1. Glassware, mixers, ice bath, filters

 

  1. Grinders, mixers, plastic containers, filters

 

ANSWER: c.

 

 

  1. The chemical components that make up Urea Nitrate are such that the mixture requires refrigeration.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. One of the key identifiers of Acetone is that is has a sweet flowery or perfume like odor, much like nail polish remover.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. Large quantities of Acetone may be kept in:

 

  1. Large wooden kegs 5 to 55 gallons

 

  1. Large plastic drums from 10 to 50 gallons

 

  1. Large metal cans or drums from 5 to 55 gallons

 

  1. Large quantities cannot be stored; may self-heat & ignite

 

ANSWER: c.

 

 

  1. Acetone vapors can cause drowsiness, dizziness, and numbness in hands and feet.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

 

  1. Acetone is readily accessible to anyone, through the purchase of products sold at:

 

  1. Beauty supply stores

 

  1. Chemical supply stores

 

  1. Drug stores

 

  1. Both a. & c.

 

  1. All of the above

 

ANSWER: e.

 


 ERM Ch. 466 Bomb Threat Management

 

  1. A bomb threat could be a warning or simply a hoax. If upon search you locate a suspicious package or “bomb” and you’re certain it is a hoax, (or a training exercise), then you can safely pick up the package/bomb, bring it in, & advise your superior that you safely located the item.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. If a bomb threat is received and search reveals nothing out of the ordinary, you can safely conclude that the call was simply a hoax & relax your guard – business as usual.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. Types of bombers are broken down into 3 different categories – suicidal, amateur & professional.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. Of the various types of categorized bombers, the least worrisome is the amateur bomber.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. Bombers are generally referred to as falling under what main categories:

 

  1. Amateur

 

  1. Professional

 

  1. Psychopathic

 

  1. Suicidal

 

  1. a., b. & d.

 

  1. All of the above

 

ANSWER: f.

 

 

  1. Examples of typical motivators for bombers would be:

 

  1. Emotional release / revenge

 

  1. Ideological / recognition

 

  1. Experimental / vandalism

 

  1. Both a. & b.

 

  1. All of the above

 

ANSWER: e.

 

 

  1. Bomb threats would normally be handled:

 

  1. Internally by a company CEO, or kept within the confines of a household

 

  1. EMS

 

  1. Local Law Enforcement or Private Security

 

  1. By the person who received the call

 

  1. All of the above

 

ANSWER: c.

 

 

  1. There are general guidelines for the handling of a bomb threat scenario. If you know of a bomb threat, or are the receiver of a bomb threat you should be sure to:

 

  1. Try to obtain answers to a checklist questions as quickly as possible so you can pass the information on to authorities

 

  1. Ensure to show emotion to the caller as a means of humanizing the situation

 

  1. Ensure that you do not ask the caller if they placed the bomb

 

  1. Ask the caller when the bomb is going to explode

 

  1. All of the above

 

ANSWER: d.

 

 

 

 

 

 

  1. Showing emotion over the phone when you are the receiver of a bomb threat can humanize the situation, and 50% of the time could thwart the intended plot.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. Which of the following question(s) should not be asked if you are the receiver of a bomb threat call?

 

  1. When is the bomb going to explode?

 

  1. Where is it located now?

 

  1. What kind of a bomb is it & what does it look like?

 

  1. Did you place the bomb?

 

  1. Both b. & c.

 

  1. All should the above should be asked

 

ANSWER: f.

 

 

  1. If you are the receiver of a bomb threat call, ensure that you concentrate on obtaining answers to the general guideline questions & don’t become distracted or unfocused in the task by background noise during the call.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. In additional to obtaining answers to the checklist of questions you should have if you are the recipient of a bomb threat call, you should also be sure to try and determine:

 

  1. Race

 

  1. Sex

 

  1. Age

 

  1. Background Noise

 

  1. Choice a., b. & c.

 

  1. All of the above

 

ANSWER: f.

 

  1. Everyone that could potentially be assigned the task of conducting a search for a bomb or suspicious package, should, if they happen upon either of these:

 

  1. Ensure they well versed in the handling of varied bombs types

 

  1. Ensure they are properly geared up in a bomb suit prior to conducting the search

 

  1. Leave the handling of such items to EOD or bomb personnel only

 

  1. Both b. & c.

 

ANSWER: c.

 

 

  1. When faced with a bomb threat, there are decision-making guidelines that should be considered. Some examples are:

 

  1. Race of the caller?

 

  1. Age of the caller?

 

  1. Sex of the caller?

 

  1. All of the above

 

  1. None of the above

 

ANSWER: e.

 

 

  1. When faced with a bomb threat, there are certain decision-making guidelines that should be considered. Some examples are:

 

  1. How tight is the security at the target?

 

  1. What is the targets’ previous experience?

 

  1. What is the current climate for terrorist or radical activity?

 

  1. All of the above

 

  1. None of the above

 

ANSWER: d.

 

 

  1. The intended “target” of a bomb threat is generally the biggest unknown.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

 

  1. The intended time to detonate is generally the biggest unknown for a bomb threat.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. Not knowing when a bomb is set to detonate, is of particularly less concern to:

 

  1. Those in the surrounding perimeter of the bomb

 

  1. Those in the immediate area of the bomb itself

 

  1. Those in Law Enforcement

 

  1. All of the above

 

ANSWER: b.

 

 

  1. Standard operating procedures for bomb threat management should include who will notify facility personnel & how they will be notified.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. History has taught us that they are several common placement locations for bombs to be set. Which of the following is not a common location?

 

  1. Behind bushes

 

  1. Outside stairs

 

  1. Lobby Areas

 

  1. Restrooms, especially Men’s

 

ANSWER: d.

 

 

  1. Some xamples of planning issues that could hinder action to deal with bomb threats would be:

 

  1. Time & Money

 

  1. Training & effort spent on planning

 

  1. Current information; intelligence

 

  1. Both a. & b.

 

  1. All of the above

 

ANSWER: e.

 

 

  1. There are two evacuation options – evacuation or no evacuation.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. There are three evacuation options – evacuation, partial evacuation or no evacuation.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. Evacuation procedure processes should include:

 

  1. A primary evacuation route

 

  1. A secondary evacuation route

 

  1. Assembly areas – both primary & secondary

 

  1. Windows & doors should be left open

 

  1. a., b. & c.

 

  1. All of the above

 

ANSWER: f.

 

 

  1. Unlike fire drill / evacuation procedures where “floor wardens” are assigned, in the case of a bomb threat time is of the essence and therefore no such “wardens” or leaders are necessary.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

 

 

 

 

 

 

  1. Some key responsibilities of Evacuation Leaders during a bomb threat evacuation are:

 

  1. To ensure all window & doors are left open

 

  1. To know the primary & secondary evacuation routes, as well as the primary and secondary assembly areas

 

  1. Provide accountability for all persons in their evacuation zones

 

  1. To screen the evacuation routes for secondary devices

 

  1. a., b. and d.

 

  1. b., c. & d.

 

ANSWER: f.

 

 

  1. In order to maximize everyone’s safety, where the bomb is located (i.e. briefcase, van, large truck), should determine whether or not the distance for the evacuation assembly area(s) should be widened in case of detonation.

 

  1. True

 

  1. False

 

ANSWER: a.

 

  1. In the case of evacuation and a known location of a potential bomb, the following distance for evacuation safety should be:

 

Small box      -        985 feet or 300 meters

Briefcase       -      1123 feet or 342 meters

Small car       -      1500 feet or 457 meters

Large car       -      1750 feet or 534 meters

Van                -      2750 feet or 838 meters

Large Truck   -      5000 feet or 1534 meters

 

  1. True

 

  1. False

 

ANSWER: b.

 

  1. With regards to evacuation scene safety, there are several guidelines that should be adhered to. Which of the following is NOT a recommended guideline?

 

  1. Avoid puddles of liquid

 

  1. Wear PPE

 

  1. Stay down wind/hill if possible

 

  1. Do not move suspicious objects

 

ANSWER: c.

  1. With regards to Establishing Security & Control, in the event that a bomb has detonated, it is important to be empathetic to the victims and evacuees. One way to demonstrate this is by waiting a min. of 24 hours prior to establishing a perimeter, setting up a command post etc., as this will only add to the stress of those around.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. If a blast has occurred, some general guidelines to follow in regards to general scene response include:

 

  1. Establish a perimeter, which may be up to a 900-foot radius around the blast crater

 

  1. Establish a command post

 

  1. Safety sweep the area immediately surrounding the command post & within the perimeter for secondary devices

 

  1. Both b. & c.

 

  1. All of the above

 

ANSWER: e.

 

 

  1. When exercising scene safety, it is important to:

 

  1. Request add’l resources & personnel to mitigate identified hazards

 

  1. Use tools and PPE appropriate to the tasks being dealt with

 

  1. Mark hazard areas clearly and designate safety zones to receive victims & evacuees

 

  1. Both a. & b.

 

  1. All of the above

 

ANSWER: e.

 

 

  1. An example of an additional resource to request when dealing with a site where a blast has occurred is:

 

  1. Bomb technicians

 

  1. Building inspectors

 

  1. Representatives from utility companies such as gas, water, electric

 

  1. Both a. & c.

 

  1. All of the above

 

ANSWER: e.

 

 

  1. One of the most important aspects when it comes to scene safety is to allow full access to the scene – the more eyes the better!

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. With regards to scene safety control, it is important to keep track of your people. You should have full knowledge of not only the number of people at the scene, but also be further aware of the number of individuals working in hazards, as well as non-hazard areas.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. If a blast occurs, time is of the essence to deal with evacuating individuals from the blast area as well as dealing with victims that have been injured. Which of the following is NOT a priority at this time?

 

  1. Initiate rescues of severely injured and/or trapped individuals

 

  1. Preform triage

 

  1. Remove fatalities

 

  1. Treat life-threatening injuries

 

  1. Evacuate ambulatory victims

 

ANSWER: c.

 

 

  1. There are jurisdictional rights that take precedence for certain agencies, against which a bomb threat may be received directly or indirectly; because of the umbrella under which certain properties may fall. These specific agencies are:

 

  1. BATF

 

  1. FBI

 

  1. Postal Service

 

  1. Both a. & b.

 

  1. All of the above

 

ANSWER: e.

 

 

  1. FBI has jurisdiction in situations involving:

 

  1. Bomb threats or offenses against property leased, used, or owned by the US Gov’t

 

  1. Bomb threats or offenses against property leased, used, or owned by the Treasury Dept.

 

  1. Bomb threats or offenses against property leased, used, or owned by Postal Service

 

  1. Both a. & b.

 

  1. All of the above

 

ANSWER: a.

 

 

  1. BATF has jurisdiction in situations involving:

 

  1. Bomb threats or offenses against property leased, used, or owned by the US Gov’t

 

  1. Bomb threats or offenses against property leased, used, or owned by the Treasury Dept.

 

  1. Bomb threats or offenses against property leased, used, or owned by Postal Service

 

  1. None of the above

 

ANSWER: b.

 

 

  1. Postal Service has jurisdiction in situations involving:

 

  1. Bomb threats or offenses against property leased, used, or owned by the US Gov’t

 

  1. Bomb threats or offenses against property leased, used, or owned by the Treasury Dept.

 

  1. Bomb threats or offenses against property leased, used, or owned by Postal Service

 

  1. Both b. & c.

 

ANSWER: c.

 

 

  1. A first responder called in to assist with a bomb threat scenario is likely to be requested to assist at the following type of scene:

 

  1. Pre-detonation

 

  1. Post-detonation

 

  1. Searches

 

  1. Continuing incident

 

  1. All of the above

 

ANSWER: e.

 

 

  1. In the case of possession of explosives while in or on the properties leased, used, or owned by all three of the following agencies, BATF, FBI or Postal Service, jurisdiction falls solely under the BATF.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. In the case of possession of explosives while in or on the properties leased, used, or owned by all three of the following agencies, BATF, FBI or Postal Service, jurisdiction falls solely under the FBI.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. Pre-detonation scenes may include:

 

  1. Bomb threats

 

  1. Suspicious items

 

  1. Confirmed devices

 

  1. Both b. & c.

 

  1. All of the above

 

ANSWER: e.

 

 

  1. The main concerns with regards to establishing scene security when a device or a suspicious item has been found are:

 

  1. Deny access to the scene

 

  1. Establish an evacuation distance

 

  1. Establish a hard perimeter & begin evacuations

 

  1. All of the above

 

  1. None of the above

 

ANSWER: d.

 

  1. No matter which type of incident occurs, things such as time (until detonation occurs), distance (evacuation distances), & shielding are universal things to consider. When it comes to distance, the most important thing to remember is time is of the essence therefore calculating the closest, safety distance to steer evacuees to is the most ideal.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. When a suspicious item or bomb is found, the most important thing to do immediately is to quickly move the suspicious item or bomb far away from people. It is much faster to move an item/bomb than it is to move a group of people.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. When evacuating individuals from a device that may or may not have detonated, it is important to move them quickly to safe areas. Again, time is of the essence, therefore the speed and distance at which you people is more important than hesitating and delaying the haste in which you move by worrying about secondary devices that may or may not be present.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. Once a suspicious item has been identified as a confirmed device, the device may then be handled or moved by:

 

  1. Building maintenance

 

  1. Law Enforcement / Private Security

 

  1. First responders

 

  1. Bomb technicians

 

  1. All of the above

 

ANSWER: e.

 

 

  1. Once a suspicious item has been identified as a confirmed device, shielding from the device must take place. The most important thing to remember here is:

 

  1. More is always better – as much distance away the better

 

  1. Structural differences (brick vs. cinder block vs. wood)

 

  1. The size / type of the device

 

  1. Both a. & b.

 

  1. All of the above

 

ANSWER: d.

 

 

  1. Safety of the public & of the bomb tech is always of utmost importance when dealing with a device. Also import to consider is the “safety” of the evidence. Two examples of this are, counter-charges & contamination.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. Post-detonation scenes will vary depending on the type of device used. A very small homemade device may cause little to no structural damage, whereas larger devices can cause major structural damage and mass confusion. Regardless of the damage caused, one must always keep in mind that rescue, recovery & fire suppression efforts will need room to do their job.

 

  1. True

 

  1. False

 

ANSWER: a. 

 

 

  1. While rescue, recovery & fire suppression efforts are underway, there is a possibility that these efforts may alter the scene and contaminate evidence to the point that it is altered or destroyed. At all costs, it is most important to preserve the evidence above all else.

 

  1. True

 

  1. False

 

ANSWER: b. 



ERM Ch. 467 Basic Search Techniques

 

  1. When conducting an interior search of a room for suspicious packages or explosives, you should:

 

  1. Start in the center of the room and work a 360 degree radius

 

  1. Visually inspect the room from the doorway

 

  1. Visually inspect the room via CCTV

 

  1. Enter the room, run the walls inspecting every possible hiding location & work your way into the center of the room

 

ANSWER: d.

 

 

  1. Normally, during a bomb threat, the following personnel will be in control:

 

  1. The Building Management

 

  1. Person taking the call

 

  1. The Building Maintenance Supervisor

 

  1. Local Law Enforcement or Private Security

 

ANSWER: d.

 

 

  1. If you receive a bomb threat over the phone you should:

 

  1. Hang up

 

  1. Panic & threaten the caller with Law Enforcement

 

  1. Stay calm & show no emotion

 

  1. Pass the phone to a Manager

 

  1. Have a co-worker call 911

 

  1. Both c. & e.

 

 

ANSWER: f.

 

 

 

 

 

 

 

 

 

  1. If you receive a bomb threat over the phone you should ask the following:

 

  1. What kind of bomb is it?

 

  1. When is it going to explode?

 

  1. Where is the bomb now?

 

  1. How is it going to explode?

 

  1. All of the above

 

  1. None of the above

 

ANSWER: e.

 

 

  1. As the call taker of a bomb threat you should be:

 

  1. Noting the weather

 

  1. Noting the callers voice characteristics

 

  1. Noting any background noise

 

  1. Relaying the information to another co-worker

 

  1. Both b. & c.

 

ANSWER: e.

 

 

  1. Suspicious items should only be handled by bomb technicians and/or EOD personnel

 

  1. True

 

  1. False

 

  1. Not enough information to answer

 

ANSWER: b.

 

 

  1. When evaluating & making decisions associated to a bomb threat one needs to consider:

 

  1. Current climate for terrorist or radical activity

 

  1. If this is normal activity in the geographical area and should just be ignored / dismissed

 

  1. How tight is security in the area

 

  1. Both a. & c.

 

ANSWER: d.

 

 

 

  1. When disseminating the information of a bomb threat one should consider the following:

 

  1. Who will notify personnel?

 

  1. How will they be notified?

 

  1. How much information to disseminate?

 

  1. Both a. & b.

 

ANSWER: d.

 

 

  1. Historically we know that the following are common bomb placement locations:

 

  1. On rooftops

 

  1. In restrooms (especially women’s)

 

  1. Behind bushes

 

  1. Both b. & c.

 

  1. None of the above

 

ANSWER: d.

 

 

  1. In the event of a bomb threat who should be assigned to search and inspect each individual office?

 

  1. An EOD specialist

 

  1. A team of bomb technicians

 

  1. Each office should be inspected by the personnel that work in that office then report their finding(s) to a Supervisor

 

  1. Security personnel should inspect & search each individual office

 

ANSWER: c.

 

  1. During a bomb threat search teams must be able to:

 

  1. Speak several different languages

 

  1. Be able to describe suspicious packages and/or objects

 

  1. Be able to guide the EOD Team to the suspicious package or object

 

  1. None of the above

 

  1. Both b. & c.

 

ANSWER: e.

  1. When assigning members to a “search team” during a bomb threat you should only select those that volunteer:

 

  1. True

 

  1. False

 

  1. Not enough information to answer

 

ANSWER: a.

 

 

  1. When conducting a search of a scene & areas secondary to the scene it is important to consider the possibility of additional devices, booby-traps, bulk explosives & dangerous chemicals:

 

  1. True

 

  1. False

 

  1. Not enough information to answer

 

ANSWER: a.

 

 

  1. When conducting vehicle search techniques, they can be broken down into the following:

 

  1. Detonated devices

 

  1. Suspected devices

 

  1. Interior devices

 

  1. Exterior devices

 

  1. Both a. & b.

 

ANSWER: e.

 

 

  1. When conducting vehicle searches for suspicious car bombs, the vehicle should be searched systematically & with the use of a diagram:

 

  1. True

 

  1. False

 

  1. Not enough information to answer

 

ANSWER: a.

 

 

 

 

 

 

  1. Individuals conducting searches for explosives should be able to conduct them:

 

  1. Slow & methodical

 

  1. Deliberate & hasty

 

  1. As quickly & safely as possible

 

  1. Communicate findings to EOD Team

 

ANSWER: b.

 

 

  1. There are two types of bomb threat searches – deliberate or hasty:

 

  1. True

 

  1. False

 

  1. Not enough information to answer

 

ANSWER: a.

 

 

  1. When a bomb threat search team decides to do a hasty search, as opposed to a deliberate search, it is usually:

 

  1. After a bomb threat has been received

 

  1. Conducted prior to the opening of a specific area

 

  1. After an explosive has detonated

 

  1. Both a. & b.

 

ANSWER: d.

 

 

  1. In the event of a bomb threat a deliberate search can be defined as:

 

  1. Very quick, cursory search

 

  1. Very time consuming

 

  1. Very methodical - room by room, & floor by floor

 

  1. An EOD search

 

  1. Both b. & c.

 

ANSWER: e.

 

 

 

 

 

  1. One of the most important things to remember when conducting a bomb threat search is to always:

 

  1. Have an EOD specialist on the phone

 

  1. Wear the proper protective gear

 

  1. Be alert

 

  1. None of the above

 

ANSWER: c.

 

 

  1. When conducting a search during a bomb threat, one may deploy a “bomb dog” to aid in the search; however, bomb dogs do have limitations

 

  1. True

 

  1. False

 

  1. Not enough information to answer

 

ANSWER: True

 

 

  1. While conducting a search during a bomb threat, whether it’s a deliberate search, or a hasty search, the person conducting the search should:

 

  1. Concentrate on the room/area

 

  1. Put themselves in the mindset of the bomber, i.e. placement / greatest effect

 

  1. Place themselves in the mindset of the potential victim(s)

 

  1. None of the above

 

ANSWER: b.

 

 

  1. When organizing a search team to conduct a deliberate search during a bomb threat, normally the team should consist of:
  2. Four people

 

  1. Two people

 

  1. Two people & an EOD specialist

 

  1. Three people; one to take notes

 

ANSWER: b.

 

 

 

  1. During a bomb threat when the team is conducting a room search they should ensure to do the following:

 

  1. Put one person in charge

 

  1. Divide the room in half

 

  1. Have radio communication between the parties

 

  1. Use hand signals to communicate

 

  1. None of the above

 

  1. Both a. & b.

 

ANSWER: f.

 

 

  1. When conducting a proper room search during a bomb threat, the person conducting the search should search what area first?

 

  1. Top of head to ceiling

 

  1. Waist to top of head

 

  1. Floor to waist

 

  1. Any obvious objects in the room

 

ANSWER: c.

 

 

  1. In the event that a bomb threat is received, a search team should have the following equipment at the ready:

 

  1. Proper bomb suit

 

  1. Flashlight, mirror, laser pointer

 

  1. Hazmat suit

 

  1. Communication devices

 

ANSWER:  b.

 

 

 

 

 

 

 

 

 

 

 

 

  1. When a search team enters into their area of responsibility for search, they should ensure to:

 

  1. Quickly scan the room

 

  1. Close their eyes & listen for a minute

 

  1. Develop a systematic search plan

 

  1. Both b. & c.

 

  1. Both a. & b.

 

ANSWER: b.

 

 

  1. During the first room search of a bomb threat, the search team(s) will do the following:

 

  1. Stand back-to-back, work around the outer walls, & search from waist to top of head level until both meet at the back of the room

 

  1. Stand back-to-back, work around the outer walls, & search from floor to waist level until both meet at the back of the room

 

  1. Stand back-to-back, work around the outer walls, & search from the top of the head to ceiling level until both meet at the back of the room

 

  1. None of the above

 

ANSWER: b.

 

  1. When a bomb threat has been received and a third room search is being conducted, the team conducting the search will stand back to back, work around the outer walls, & search from head to ceiling level until both meet at the back of the room

 

  1. True

 

  1. False

 

ANSWER: a.

 

  1. During a bomb search, and when conducting an exterior search the following should be included:

 

  1. Trash cans

 

  1. Bushes

 

  1. Windowsills

 

  1. Vehicles

 

  1. None of the above

 

  1. All of the above

 

ANSWER: f.

  1. In the event of a bomb threat, it is a good practice to have floor plans & search diagrams at the ready.

 

  1. True

 

  1. False

 

ANSWER: a.  



ERM Ch. 468 Terrorism Threat AT Officer Training

 

  1. The following is DOD’s definition of terrorism:

 

“The calculated use of violence or threat of violence to inculcate fear; intended to coerce or intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological.”

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. When looking at a geographical area, what factors must you consider when determining the threat?

 

  1. Are there any terrorist groups in that geographical area?

 

  1. Are they violent?

 

  1. What tactics, weapons, & types of attacks are they know for?

 

  1. How do they operate?

 

  1. How active are they?

 

  1. All of the above

 

ANSWER: f.

 

 

  1. When conducting a terrorism threat assessment one must include a terrorist profile. A typical terrorist profile is: male, 20’s, single, urban, well educated and middle to upper class.

 

  1. True

 

  1. False

 

  1. Not enough information to answer

 

ANSWER: a.

 

 

  1. During a possible terrorism threat which of the following are possible terrorist tactics?

 

  1. Beheadings

 

  1. Bombings

 

  1. Sieges & occupations

 

  1. Kidnapping

 

  1. None of the above

 

  1. All of the above

 

ANSWER: f. 

 

 

  1. In the target selection phase of a terrorism threat, what needs to be considered?

 

  1. Target of opportunity

 

  1. Recognition target

 

  1. Retaliation target

 

  1. Both a. & b.

 

ANSWER: d.

 

 

  1. In the DOD’s increasing terrorism threat level chart, the second level of threat is identified as “significant” and by the colour orange.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. When conducting a terrorism threat analysis based on the DOD’s terrorism threat level chart, one must consider the following:

 

  1. History / existence

 

  1. Capability / intentions

 

  1. Faction / cause

 

  1. Last known attack proxemics

 

  1. Both a. & b.

 

ANSWER: e.

 

 

  1. In order to “fill in the gaps”, in the terrorism threat analysis picture, local initiative is needed. Fusing local asset information with threat intelligence helps to create a full threat analysis.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. When conducting a full terrorism threat assessment local initiative is needed to fill the gaps in the threat assessment picture. The following are examples of local information channels:

 

  1. Local authorities

 

  1. Local businesses

 

  1. Media

 

  1. Local citizens

 

  1. None of the above

 

  1. All of the above

 

ANSWER: f.

 

 

  1. In terms of a terrorism threat, the following is the correct Force Protection Condition sequence:

 

 

 

 

 

 

 

 

  1. True

 

  1. False

 

ANSWER:  b.

 

 

  1. Force Protection Condition, or FPCON Normal, is best described as:

 

  1. A terrorist attack is imminent

 

  1. No indication of probable terrorist attack

 

  1. Best information received indicates terrorist attack is probable

 

  1. Condition white

 

ANSWER: b.

 

 

  1. When in FPCON Normal, one would expect to see a normal security posture to the terrorism threat level:

 

  1. True

 

  1. False

 

ANSWER: a.

  1. Force Protection Condition FPCON Alpha is best described as:

 

  1. An increased general threat of possible activity & violence, the nature of which could is unpredictable.

 

  1. An attack is imminent on personnel and facilities

 

  1. Real time information suggests violence

 

  1. An attack is not probable based on information received

 

ANSWER: a.

 

 

  1. Force Protection Condition FPCON Bravo is best described as:

 

  1. When an increased or more predictable threat of terrorist activity exists

 

  1. An attack is imminent on personnel and facilities

 

  1. Must be capable of being maintained

 

  1. Both a. & c.

 

  1. None of the above

 

ANSWER: d.

 

 

  1. It is a standard operating procedure, that when in FPCON Bravo, extra precaution is appropriate to deter terrorist planning:

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. You should expect to see closer inspections of vehicles and deliveries, as well as ID checks & a greater presence of guards on your installation during FPCON Bravo.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. FPCON Charlie is best described as:

 

  1. When an attack has occurred & rigorous security is required

 

  1. When an incident occurs or intelligence is received indicating some sort of terrorist action or targeting against personnel or facilities is likely

 

  1. Nothing indicates that an installation is targeted

 

  1. General conditions suggest possible violence

 

ANSWER: b.

 

 

  1. During FPCON Charlie one would expect rigorous efforts to inspect vehicles & facilities & you may be required to inspect vehicles & facilities, as well as be required to participate in special guard duties.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. When a terrorist attack has occurred, or when intelligence has been received that indicates terrorist action against a specific location is imminent, the Force Protection Condition is known as FPCON Delta.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. When FPCON Delta exists, one can expect:

 

  1. Additional security measures are implemented which delay & interrupt normal routines

 

  1. Expect rigorous efforts to conduct further inspections on vehicles & installations

 

  1. Evidence of a terrorist attack in the planning - such as surveillance or local source reports

 

  1. None of the above

 

  1. All of the above

 

ANSWER: a.

 

 

  1. When considering your security measures during a terrorist threat, it is essential operating procedure to implement random security measures in conjunction with the Force Protection Condition.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. When developing a comprehensive, anti-terrorism program, one must ensure the following components are present:

 

 

  1. True

 

  1. False

 

  1. Not enough information to answer

 

ANSWER: a.

 

 

  1. When planning self protective measures during a terrorist threat, on should:

 

  1. Be prepared for unexpected events

 

  1. Overcome routines

 

  1. Always divulge your information to several individuals so they can reach you during an incident

 

  1. Stay within the boundaries of daily routines

 

  1. Both a. & b.

 

  1. Both c. & d.

 

ANSWER: e.

 

 

  1. During a terrorist threat, one should maintain a low profile & overcome routines, as well as varying routes & times to & from work.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. During a terrorist threat, one should consider the following self-protective measures:

 

  1. Be alert & aware of changes in the security atmosphere

 

  1. When possible stay indoors & avoid public venues

 

  1. When in public, look for larger crowds & stay with them when moving

 

  1. Avoid public disputes or confrontations & report any trouble to the proper authorities

 

  1. Both a. & d.

 

  1. Both b. & c.

 

ANSWER: e.



ERM Ch. 464 Home Made Explosives Part 2

 

  1. Aluminum Powder may look:

 

  1. Whitish

 

  1. Silver

 

  1. Gray or black

 

  1. Both a & b

 

  1. All of the above

 

ANSWER: e.

 

 

  1. Aluminum Power vapors can be explosive.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. Some commercial uses for Aluminum Powder are:

 

  1. Paints

 

  1. Pyrotechnics

 

  1. First-aid cold packs

 

  1. Both a & b

 

  1. All of the above

 

ANSWER: d.

 

 

  1. In small quantities (less than 5 gallons) Ammonium Nitrate may be stored in glass or plastic containers; however in larger quantities (more than 5 gallons), it should be contained in:

 

  1. Steel drums

 

  1. Wooden barrels

 

  1. Plastic or paper bags

 

  1. None of the above / plastic containers only

 

ANSWER: c.

 

 

  1. Some of the key identifiers for Ammonium Nitrate are:

 

  1. Crystalline or powder that is colorless or yellow & odorless

 

  1. Spherical pellets, granular, crystalline or powder that is colorless or white & odorless

 

  1. Spherical pellets, granular, crystalline or powder that can be gray, black or white & odorless

 

  1. Spherical pellets, granular, crystalline or powder that is colorless or white, with an acrid/ sour odor

 

ANSWER: b.

 

 

  1. Some of hazards of Ammonium Nitrate are:

 

  1. Eye, skin, respiratory irritant

 

  1. Should not be near chemicals rich in oxygen

 

  1. By itself it can be explosive

 

  1. Both a. & c.

 

  1. Both a. & b.

 

ANSWER:  d.

 

 

  1. Ammonium Nitrate can be found in products purchased from:

 

  1. Agricultural supply stores, chemical supply stores, first aid supplies

 

  1. Agricultural supply stores, beauty supply stores, first aid supplies

 

  1. Beauty supply stores, chemical supply stores, first aid supplies

 

  1. Chemical supply stores, first aid supplies, health food stores

 

ANSWER: a.

 

 

  1. Some key identifiers for Citric Acid are:

 

  1. Crystalline, white or colorless, acrid/sour odor

 

  1. Power (fine), silver or white, odorless

 

  1. Crystalline, white or colorless, odorless

 

  1. Power (fine), silver or white, acrid/sour odor

 

ANSWER: c.

 

 

 

  1. Other names for Citric Acid can be:

 

  1. Hydrogen Nitrate & citric salt

 

  1. Hydrogen Citrate & sour salt

 

  1. Hydrogen Dioxide & sour salt

 

  1. None of the above

 

ANSWER: b.

 

 

  1. One of the commercial uses for Citric Acid is as a food additive.

 

  1. True

 

  1. False

 

ANSWER: a.  

 

 

  1. Ethylene Glycol is also known as:

 

  1. Glycol of Ethyl

 

  1. Ethanediol

 

  1. Glycoethyl

 

  1. Monoethyl Glycol

 

ANSWER: b.

 

 

  1. Large quantities (more than 5 gallons) of Ethylene Glycol will more than likely be found stored in:

 

  1. Large glass containers

 

  1. Large steel containers

 

  1. Both a. & b.

 

  1. None of the above / should be stored in small quantities only

 

ANSWER: b.

 

 

 

 

 

 

 

 

  1. Ethylene Glycol should ideally be stored in a warm, oxygen rich environment to stabilize its nature.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. Some of the commercial uses of Ethylene Glycol include:

 

  1. Antifreeze

 

  1. Commercial explosives

 

  1. Both a. & b.

 

  1. None known

 

ANSWER: c.

 

 

  1. Hexamine can come in a crystalline or solid white tablet form and:

 

  1. Is odorless

 

  1. Has a slight fish odor

 

  1. Has an acrid, sour odor

 

  1. Has a slight ammonia like odor

 

ANSWER: d.

 

 

  1. Large quantities of Hexamine are usually stored in:

 

  1. Woven bags

 

  1. Plastic bags

 

  1. Steel containers

 

  1. Plastic containers

 

ANSWER: a.

 

 

 

 

 

 

 

 

 

  1. Hexamine is also known as:

 

  1. Hexanitrate

 

  1. Hexamethylene

 

  1. Methenamine

 

  1. None of the above

 

ANSWER: c.

 

 

  1. Hexamine should not be stored near peroxides, or chemicals rich in oxygen.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. Because of its various commercial uses, Hexamine can be found in products sold in:

 

  1. Agricultural supply stores

 

  1. Camping & army surplus stores

 

  1. Chemical stores

 

  1. Both a. & c.

 

  1. Both b. & c.

 

  1. All of the above

 

ANSWER: e.

 

 

  1. Hydrochloric Acid is most commonly know to be found in liquid form, but in its purest state may also be found in a solid tablet form.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

 

 

 

 

 

 

 

  1. Some examples of equipment that would be likely in the presence of large quantities of Hydrochloric Acid would be:

 

  1. Grinders, respirators, acid resistant aprons, impermeable gloves, fume hoods

 

  1. Blenders, respirators, acid resistant aprons, fume hoods

 

  1. Protective face/eyewear, impermeable gloves, respirators, fume hoods

 

  1. Grinders, Pyrex containers, acid resistant aprons, protective face/eyewear

 

ANSWER: c. 

 

  1. Hydrochloric Acid should not be stored near anything except other acids.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

  1. Some commercial uses for Hydrochloric Acid are:

 

  1. Paint remover

 

  1. Beauty supply products

 

  1. Manufacture of plastics and some chemicals

 

  1. All of the above

 

ANSWER: c.

 

 

  1. Hydrogen Peroxide is also known as:

 

  1. Hydroxide

 

  1. Dihydrogen Dioxide

 

  1. Hydrogen Dioxide

 

  1. None of the above

 

ANSWER: b.

 

 

 

 

 

 

 

 

 

  1. Some key identifiers for Hydrogen Peroxide are:

 

  1. Clear, colorless liquid, odorless

 

  1. Slightly whitish/milky liquid, odorless

 

  1. Light/pale blue liquid, with a slightly pungent, caustic odor

 

  1. Clear, colorless liquid, with a slightly pungent, caustic odor

 

ANSWER: d.

 

 

  1. Select where the highest concentration of Hydrogen Peroxide can be obtained:

 

  1. Internet

 

  1. Chemical supply stores

 

  1. Beauty supply stores

 

  1. Drug stores

 

ANSWER: b.

 

 

  1. Magnesium Powder can come in the following form:

 

  1. Solid

 

  1. Spherical pellets

 

  1. Powder

 

  1. Both a. & c.

 

  1. All of the above

 

ANSWER: d.

 

 

  1. Small quantities of Magnesium Powder may be stored in:

 

  1. Plastic & steel containers

 

  1. Steel containers

 

  1. Plastic containers

 

  1. Plastic or paper bags

 

ANSWER: a.

 

 

 

 

  1. Magnesium Powder should not be stored in direct sunlight as it could cause the release of flammable gasses.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. With regards to the known hazards of Methyl Ethyl Ketone, it should be remembered that the vapor:

 

  1. May be present in adjacent areas

 

  1. Can be explosive

 

  1. May cause drowsiness and dizziness

 

  1. Both a. & c.

 

  1. All of the above

 

ANSWER: e.

 

 

  1. One especially caustic solution that Methyl Ethyl Ketone should be kept away from is:

 

  1. Acid

 

  1. Lye

 

  1. Hydrogen Peroxide

 

  1. None of the above

 

ANSWER: b.

 

 

  1. A couple of commercial uses for Methyl Ethyl Ketone are:

 

  1. Wax remover and paint thinners

 

  1. Manufacture of engines and cars

 

  1. Dynamite and pyrotechnics

 

  1. Paint removers & plastics manufacture

 

ANSWER: d.

 

 

 

 

 

 

  1. Nitric Acid has the darkest hue (color), when:

 

  1. Its concentration level is high

 

  1. Its concentration is low

 

  1. When it is exposed to heat or direct sunlight

 

  1. None of the above / colorless

 

ANSWER: a.

 

 

  1. Skin exposed to Nitric Acid will turn:

 

  1. White

 

  1. Black

 

  1. Yellow

 

  1. Red

 

 ANSWER: c.

 

 

  1. Two additional names Nitric Acid is known as are:

 

  1. Aqua Fortis & Azotic Nitrate

 

  1. Aqua Nitrate & Azotic Fortis

 

  1. Hydrogen Nitrate & Aqua Acid

 

  1. Aqua Fortis & Azotic Acid

 

ANSWER: d.

 

 

  1. Inhalation of Nitric Acid can be fatal.

 

  1. True

 

  1. False

 

ANSWER: a.

 

 

 

 

 

 

 

 

 

  1. A weapon of choice in many parts of Asia and the Middle East use __________ as a means for disfiguring women.

 

  1. Hydrochloric acid

 

  1. Sulfuric acid

 

  1. Nitric acid

 

  1. All of the above

 

ANSWER: d.

 

 

  1. The commercial uses of Nitric Acid vary widely; from rocket propellant, to fertilizer/explosives manufacture, to beauty supply products.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. Some of the key identifiers for Nitro Methane are that it is:

 

  1. Liquid, clear colorless to light yellow or greenish yellow, pungent / sour odor

 

  1. Liquid, colorless, fruity disagreeable odor

 

  1. Liquid, colorless, sweet, minty, acetone-like agreeable odor

 

  1. Liquid, light to dark brown color, odorless

 

ANSWER: b.

 

 

  1. Large quantities of Nitro Methane can be kept in glass, metal or plastic containers.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

 

 

 

 

 

 

 

 

 

 

  1. Some of the hazards of Nitro Methane are:

 

  1. It can be explosive in hot confined areas

 

  1. Extremely flammable vapors, flammable, and susceptible to explosion

 

  1. Dizziness, vomiting, weakness & fall in blood pressure

 

  1. Both a. & b.

 

  1. All of the above

 

ANSWER: e.

 

 

  1. One example of a commercial use for Nitro Methane is:

 

  1. Dynamite

 

  1. Beauty supply products

 

  1. Industrial solvent

 

  1. Paint remover

 

ANSWER: c.

 

 

  1. Potassium Chlorate is a:

 

  1. White, odorless liquid

 

  1. White, odorless crystalline or powder

 

  1. White, acrid or sour odor, crystalline or powder

 

  1. White, acrid or sour odor liquid

 

ANSWER: b.

 

 

  1. Potassium Chlorate is also known as:

 

  1. Chlorate of Potassium

 

  1. Chlorate of Potash

 

  1. Potash Chlorate

 

  1. Potassium Oxynitrate

 

ANSWER: b.

 

 

 

 

  1. Below are some examples of places where Potassium Chlorate could be sourced. Which one is not?

 

  1. Agricultural supply stores

 

  1. Beauty supply stores

 

  1. Chemical supply stores

 

  1. Hardware supply stores

 

ANSWER: b.

 

 

  1. Potassium Permanganate can come in a solid or crystalline, is odorless, violet or purple in color, & will stain most anything, including the skin which it will stain ________?

 

  1. Purple

 

  1. Blue

 

  1. Brown

 

  1. It will not affect skin

 

ANSWER: c.

 

 

  1. Potassium Permanganate stands out as different in that although it has certain hazards, i.e. should not be near metals, acids, fuels, peroxides and combustibles, when it come to safe handling, the most that is required is a well ventilated area (open windows, doors and fans).

 

  1. True

 

  1. False

 

ANSWER: False 

 

 

  1. Three main types of locations that Potassium Permanganate can be acquired at are:

 

  1. Agricultural, chemical & pool supply stores

 

  1. Agricultural, chemical & first aid supply stores

 

  1. Aquarium, chemical & pool supply stores

 

  1. Aquarium, agricultural & pool supply stores

 

ANSWER: c.

 

 

 

 

 

 

  1. Sodium Chlorate is used in these commercial purposes:

 

  1. Fertilizer

 

  1. Pesticides

 

  1. Plastic Manufacture

 

  1. None of the above

 

  1. All of the above

 

ANSWER: d.

 

 

  1. Some key identifiers for Sulfur are:

 

  1. Granular, white, odorless

 

  1. Powder (chalky), colorless, smells like rotten eggs when heated

 

  1. Powder (chalky), yellow, odorless

 

  1. Tablet form, white until ground, then yellowish, smells like rotten eggs

 

ANSWER: c.

 

 

  1. Which is NOT an example of a commercial use for Sulfur?

 

  1. Fertilizer

 

  1. Food additive

 

  1. Matches

 

  1. Soil additive

 

ANSWER: b.

 

 

  1. Sulfur, if combined with chemicals rich in oxygen could be used to create a ________ HME:

 

  1. Ammonium Nitrate Mixtures

 

  1. Dynamite

 

  1. Water gels

 

  1. Flash powders

 

ANSWER: d.

 

 

 

 

  1. Sulfuric Acid is also known as:

 

  1. Oleam

 

  1. Vitriol

 

  1. Hydrogen Sulfur

 

  1. None of the above

 

ANSWER: b.

 

 

  1. Sulfuric Acid is very corrosive, as well as a severe irritant to eyes, skin and respiratory systems, and therefore, should be stored near chemicals rich in oxygen, but away from caustic solutions such as lye.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. An example of a commercial use for Sulfuric Acid is:

 

  1. Drain pipe cleaners

 

  1. Automotive batteries

 

  1. Polymer manufacture

 

  1. Both a. & c.

 

  1. All of the above

 

ANSWER: e.

 

 

  1. Sulfuric Acid can be used to make the following HME:

 

  1. EDGN

 

  1. TATP

 

  1. MEKP

 

  1. Both b. & c.

 

  1. All of the above

 

ANSWER: e.

 

 

 

 

 

  1. Urea can come in crystalline, granular or powder form and has the following odor:

 

  1. None

 

  1. Metallic like

 

  1. Ammonia like

 

  1. All of the above (each form differs)

 

ANSWER: c.

 

 

  1. Some hazards of Urea are that it can be an eye, skin and respiratory irritant; however, in cream form it can be used as a moisturizer for dry, cracked, calloused & rough skin.

 

  1. True

 

  1. False

 

ANSWER: a. 

 

 

  1. Grinders are used to reduce the granule size of solid components. An example would be:

 

  1. Mortar / pestle

 

  1. Handheld electric coffee grinder

 

  1. Commercial grade coffee grinder

 

  1. Ball mill

 

  1. Both b. & c.

 

  1. All of the above

 

ANSWER: f.

 

 

  1. Grinders are commonly used in the production of which HME?

 

  1. Ammonium Nitrate Mixtures

 

  1. Black Powder

 

  1. Chlorate / Perchlorate Mixtures

 

  1. All of the above

 

ANSWER: d.

 

 

 

 

  1. Ice baths cool mixtures that generate heat. An example of an ice bath would be:  

 

  1. Ice with salted water

 

  1. Dry ice with acetone

 

  1. Bath water

 

  1. Both a. & b.

 

  1. All of the above

 

ANSWER: e.

 

 

  1. Ice baths are commonly used in the production of this HME:

 

  1. TATP

 

  1. HMTD

 

  1. MEKP

 

  1. Both b. & c.

 

  1. All of the above

 

ANSWER: e.

 

 

  1. Distillers concentrate chemical components with low-level heat, and therefore, require complex scientific equipment and not improvised or household items as some other process methods can get away with.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 

  1. Filters are used to separate the solids from the liquids and are commonly used in the HME production of:

 

  1. HMTD

 

  1. TATP

 

  1. Hydrogen Peroxide Mixtures

 

  1. Urea Nitrate

 

  1. All of the above

 

ANSWER: e.

 

  1. There are various hazards associated to the handling of the chemicals we have discussed such as eye, skin & respiratory irritants, severe burns etc., that can only heighten during the production of HMEs; therefore a telltale indicator that HMEs are in fact being produced will be the presence of safety equipment such as masks, goggles, face shields, protective clothing and vents.

 

  1. True

 

  1. False

 

ANSWER: b.

 

 



 

INTELLIGENCE 

In this exercise the student will attempt to answer questions on general concepts of intelligence , the intelligence cycle , intelligence disciplines , advantages and disadvantages.

 

  1. Which one is the battlefield operating systems?
  2. XP
  3. b. Maneuver
  4. DOS
  5. Intelligence

 

  1. Which factor is included in ISR operation?
  2. Information.
  3. Integrity.
  4. Intelligence.
  5. Mobility

 

  1. Why BOS is essential?
  2. Intelligence.
  3. Tactics.
  4. Information.
  5. Mobility

 

  1. Which one is out of scope for BOS?
  2. plan
  3. prepare
  4. collect

 

  1. Patrolling

 

  1. Who determines the relevant information from the bunch of information?
  2. Agent
  3. Informer.
  4. Advisory
  5. Commander

 

  1. What converts acquired information into intelligence ?
  2. Analyzing Information
  3. Talking to a patrol
  4. Planning and Direction
  5. Conversation with detainee

 

  1. Who is the intermediary between  policymakers and military commanders?
  2. Agent
  3. Issue Coordinators
  4. Advisory

d.Operation Head

 

  1. Signals intelligence (SIGINT) relevant with …………
  2. Signature intelligence
  3. IMINT
  4. Telemetry
  5. Nuclear science

 

  1. Open-source information can be collected from ……………
  2. Commercial Databases
  3. By Questionnaires
  4. By Interview
  5. By Official contacts

 

  1. MASINT deals with ……………….
  2. Electronic intelligence
  3. Radar Signatures
  4. Internet
  5. Mapping

 

  1. Who is the responsible for analysing counterterrorism?
  2. Advisory
  3. Issue Coordinators
  4. Analyst

d.Operation Head

 

  1. Which one is relevant to day-to-day events?
  2. Current Intelligence
  3. Warning Intelligence
  4. Research Intelligence
  5. Estimative intelligence

  

  1. Which intelligence works for gap analysis?
  2. Current Intelligence
  3. Warning Intelligence
  4. Research Intelligence
  5. Estimative intelligence

 

  1. Which intelligence is the base of current and estimative intelligence?
  2. Current Intelligence
  3. Warning Intelligence
  4. Research Intelligence
  5. Estimative intelligence

 

  1. Basic intelligence material is presented ………
  2. by alarming or notice.
  3. By weekly publications.
  4. By the form of maps
  5. By signal potentially dangerous situations

 

  1. What does JWICS stand for?
  2. Joint Worldwide Intelligence Community System
  3. Joint Worldwide Information Communications System
  4. Joint Worldwide Intelligence Communication System
  5. Joint Warning Indications Communications System

 

  1. Which intelligence system discuss about weapon system?
  2. Research intelligence
  3. Warning intelligence
  4. Operational intelligence
  5. Scientific and technical intelligence

 

  1. What is the top priority for DIA?
  2. Satisfy policy maker
  3. Satisfy commander.
  4. Communicate between operation head and advisory
  5. Satisfy the intelligence needs of operational forces

 

  1. Which intelligence system provides detailed system handbooks?
  2. Scientific and technical intelligence
  3. Warning intelligence
  4. Operational intelligence
  5. Research intelligence

 

  1. Which intelligence uses people as the main medium for collecting information?
  2. IMINT
  3. HUMINT
  4. MASINT
  5. GEOINT

 

  1. Which intelligence provide the current geographical situation of the desired area?
  2. IMINT
  3. HUMINT
  4. MASINT
  5. GEOINT

 

  1. Which intelligence uses decryption technique?
  2. HUMINT
  3. IMINT
  4. SIGINT
  5. GEOINT

 

  1. Which intelligence helps to obtain necessary information about immunizations before entering an area?
  2. HUMINT
  3. MEDINT
  4. SIGINT
  5. GEOINT

 

  1. Bio-Scientific Information is focused by
  2. HUMINT
  3. GEOINT
  4. SIGINT
  5. MEDINT

 

  1. Electronic fund transferred is monitored by
  2. Research intelligence
  3. Financial intelligence
  4. Operational intelligence
  5. Scientific and technical intelligence

 

  1. Which one is the advantage for GEOINT?
  2. Require human
  3. Need expensive equipment.
  4. Need time
  5. No human require

  

  1. Most intelligence system is …….
  2. Complex
  3. Operated by human
  4. Time consuming
  5. Required software

 

  1. Military intelligence demands for …..
  2. Highly equipment.
  3. Latest software,
  4. c. Faster accurate intelligence
  5. The person or agency

 

  1. How the risk of HUMINT can be reduced?
  2. a. By Training
  3. By operation commence
  4. Having conversation with detainee
  5. Employing agents

 

  1. Which intelligence system is the most effective for asymmetric warfare targets?
  2. HUMINT
  3. MEDINT
  4. SIGINT
  5. TECHINT

 

  1. Which approach was effective during the Battle for Algiers at 60’s?
  2. MASINT
  3. MEDINT
  4. SIGINT
  5. HUMINT

  

  1. What is the disadvantage of forcible HUMINT collection?
  2. Actionable intelligence in a timely manner
  3. Sustainable in the short-term
  4. Applicable for long-term problems involving hearts and minds
  5. Searchable against the immediate asymmetric targets.

 

  1. Which intelligence was effective for Operation Enduring Freedom (OEF) at 2001 in Afghanistan?
  2. HUMINT
  3. MEDINT
  4. SIGINT
  5. TECHINT

 

  1. Debriefing of patrols is the part of ……..
  2. MASINT
  3. TECHINT
  4. SIGINT
  5. HUMINT

 

  1. Which intelligence is used for other intelligence indicators?
  2. IMINT
  3. TECHINT
  4. SIGINT
  5. HUMINT

 

  1. Which intelligence system is relied upon by the  combat commander?
  2. One intelligence is better than another.
  3. All the intelligence need to work  together
  4. SIGINT and HUMINT
  5. TECHINT and HUMINT

 

  1. What is the source of HUMINT?

 

  1. HUMINT collector
  2. Agent
  3. Commander
  4. Individual

 

  1. Which HUMINT phases is used to create questions?
  2. Questioning
  3. Planning and Preparation
  4. Termination
  5. Reporting

 

  1. Interrogation is the part of the HUMINT phase …………
  2. Planning and Preparation
  3. Termination
  4. Reporting
  5. Questioning

 

  1. Reporting phase of HUMINT deals with …….
  2. Passing information.
  3. Complaining issue
  4. Summarizing document
  5. Create questionnaires

 

  1. Who can be performed Tactical questioning?
  2. Commander
  3. Any DOD personnel
  4. HUMINT collector
  5. Refugees

 

  1. Why screening process  is necessary?
  2. Identify the level of knowledge
  3. For interrogation the refugees
  4. For debriefing the patrol team
  5. For document exploitation

 

  1. Which one is essential for the intelligence process?
  2. Torture
  3. Planning
  4. Interrogation
  5. Eye contact

 

  1. Source information are evaluated by ………
  2. Refugees.
  3. Cooperating sources
  4. Patrol Teams
  5. Liaison

 

  1. Who is not involved in liaison operations?
  2. Commander
  3. Soldiers
  4. HUMINT collector
  5. Civilian agencies

 

  1. What is the features of HUMINT sources?
  2. Any human source
  3. One-time contacts or constant sources
  4. None
  5. Spy

 

  1. Which procedures contributes to the military decision-making process (MDMP)?
  2. Passing information.
  3. Analyzing available information
  4. Summarizing document
  5. Create questionnaires

 

  1. DOCEX operations extracts information from …….
  2. Interrogation
  3. Debriefing
  4. Published and electronic source documents
  5. Inquiry physically

 

  1. Information must be analyzed and verified before forwarding to information cell by
  2. HUMINT collector
  3. Commander
  4. Agent
  5. Analyst

 

  1. DOCEX captured documents provide information about …..
  2. Actionable intelligence
  3. Enemy’s insight information
  4. Both
  5. None

 

  1. DOCEX  captured documents need ……..
  2. Verified by multiple sources
  3. Discard the misleading information
  4. Follow accordingly
  5. Forward to intelligence cell

 

  1. Who does the timely analyses and cross verification of information?
  2. Commander
  3. Soldiers
  4. HUMINT collector
  5. Civilian agencies

 

53, Which one has no CEE operation intelligence value?

  1. Manuals
  2. Computers, Telephones, PDAs
  3. Weapons
  4. Weather news

 

54.What is the capability of HUMINT collector?

  1. Able to extract actionable intelligence
  2. Able to deal with people in all conditions
  3. Specify relation among available information
  4. Both a and b

 

55.Which one is the good HUMINT collector quality?

  1. Craziness
  2. Credibility
  3. Work gigs
  4. Highly army personnel

 

  1. What is not good HUMINT collector weakness?
  2. Displaying anger
  3. Showing sympathy
  4. c. Highly Demeanor
  5. Unresponsive

 

57 Neurolinguistics helps to improve …….

  1. Communication skills
  2. Cultural awareness
  3. Face threat
  4. Operational power

 

  1. HUMINT collectors are sometimes assigned special taskings like
  2. Spying
  3. Lead to battle
  4. Counter intelligence
  5. Intermediary communication

 

  1. What is the barrier of effective actionable intelligence?
  2. Lack of support of the local population
  3. Lack of HUMINT sources
  4. No reliable source
  5. Lack of interrogation

 

  1. What is the barrier in joint operations?
  2. Population support.
  3. Language
  4. No reliable source
  5. Lack of interrogation