Anti-Terrorism Course

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 67

508 compliance script for JSUS007 - Joint Staff Antiterrorism (AT) Force

Protection Level I Awareness Training.

This document contains a text only script of the course; optimized for screen readers and the
convenience of the visually impaired. Our goal at JKO is to provide the best user experience for all of our
students. As such, if you do not require a screen reader, please use the full version of the course.

Introduction

Introduction , Page 1: JKO Welcome

Description:
JKO: Joint Knowledge Online
This course was developed with the following ‘Section 508 Web Compliance ‘ features:
Audio Narration is standard on all content pages.
Closed Captioning (CC) is available on all narrated paged for use by the deaf or individuals with other
forms of hearing impairment.
In addition, a Screen Reader Compatible PDF script is available at any time by clicking the 508 button
in the course navigation bar. The script contains all narration and pertinent image descriptions for
individuals requiring the use of a screen reader.

Narration:
Same as on screen text

Introduction Page 2: Course Overview

Description:
Joint Staff Antiterrorism (AT) Force Protection Level I Awareness training

• Introduction to Antiterrorism Training, and


• Antiterrorism Scenario Training

Historical examples (optional) available through the Resource button

Narration: Welcome to Joint Staff Antiterrorism (AT) Force Protection Level I Awareness training. This
web-based training is sponsored by the Joint Staff in coordination with the Military Services.
Completion of this training meets the annual requirement for Level I antiterrorism training prescribed
by DODI 2000.16. The purpose of this training is to increase your awareness of terrorism and to
improve your ability to apply personal protective measures. It also provides links to resources you can
use in the future. The course consists of two lessons:

1
• Introduction to AT, and
• AT Scenario Training
In addition, several historical examples are available through the Resource button. These optional
readings are designed to reinforce teaching points from the AT Scenario Training lesson, but are not
required to finish the course.

Introduction Page 3: Course Objectives

Description: Upon completing the two required lessons in this course, you will:
• Understand the terrorist threat
• Understand how to employ situation-based measures to lower your vulnerability, and
• Recognize proper responses to threat actions

Historical examples(optional) available through the Resource button

Narration: Upon completing the two required lessons in this course, you will:
• Understand the terrorist threat
• Understand how to employ situation-based measures to lower your vulnerability, and
• Recognize proper responses to threat actions
The course concludes with a Post Test in which you must correctly answer 100% of the questions to
demonstrate an understanding of the material.
The course begins with a Pre Test to gauge your knowledge of the content. More Pre Test information
is on the next page. Please click NEXT to begin your AT training.

Introduction Page 4: About the Pre Test

Description: You will now take a Pre Test to determine your knowledge of the subject matter. The
goal of the Pre Test is to allow you to “test out” of information you already know. In other words, it is
possible to skip a lesson if you are sufficiently familiar with the topic. Once you complete the Pre Test,
the course tree will populate with checkmarks next to any lessons you have tested out of.
If you achieve 100% on the Pre Test you will be prompted to click the Next Lesson tab to continue to
the final page of the course and receive your course completion certificate. Click the next Lesson tab
at the top of the page to begin the Pre Test.

Narration: no narration available

Lesson 1: Introduction to Antiterrorism Training

Lesson 1, Page 1: Introduction to Antiterrorism Training – Lesson Introduction

Description: Intro to AT Lesson:


 An introduction to AT Level 1 training, including

2
o Threat factors
o How terrorists identify and select targets
 A combatant Command overview
 An overview of the terrorist planning cycle
 An explanation of Force Protection Conditions and the National Terrorism Advisory System

Narration: Since September 11, 2001, the United States has been engaged in an effort to protect the
nation's freedoms. The world is dangerous and we are at war against an enemy intent on destroying
the American way of life. While responding to this real and present danger, we must remain vigilant
while executing our responsibilities.
This lesson will reinforce that vigilance by providing:
• An introduction to Antiterrorism (AT) Level I training, including
• Threat factors, and
• How terrorists identify and select targets
• A Combatant Command overview
• An overview of the terrorist planning cycle, and
• An explanation of Force Protection Conditions and the National Terrorism Advisory System
We begin on the next page with some AT basics.

Lesson 1, Page 2: AT Basics

Description: Personal safety is important


 Remain alert
 Be aware of your surroundings
 Report suspicious activity
 Pay attention to antiterrorism briefings
 Make security part of your routine

Patience and persistence

Don’t be a tempting target!

Narration: Always remember to stay alert, be aware of your surroundings, and report unusual or
suspicious activity. Pay attention to the details of AT briefings you receive at your locale and when
preparing to travel to a new location. Most importantly, make security a part of your routine. Exercise
precautions to increase your personal security and the security of your family, colleagues, and
organization.

Patience and persistence are the watchwords for defeating terrorists. They are patient and cunning,
and are waiting for you to let down your guard or settle into a pattern of predictable behavior. Don't
be a tempting target. Be vigilant so we may successfully defend America and our freedoms.

Lesson 1, Page 3: Threat Factors

3
Description:
There are eight factors you should consider to understand the threat.
1. Are terrorist groups in the area?
2. Are they violent?
3. Do they attack Americans?
4. How active are they?
5. How sophisticated are they?
6. Are they predictable?
7. Will local citizens warn Americans?
8. What tactics and weapons are used?

Select “terrorism” to learn its definition.

Definition of Terrorism: Terrorism is the unlawful use of violence or threat of violence to instill fear
and coerce governments or societies. Terrorism is often motivated by religious, political, or other
ideological beliefs and committed in the pursuit of goals that are usually political. (JP 3-07.2)

Narration: There are eight factors you should consider to understand the threat in your environment.
Using these factors, you can be better prepared for the potential risks you face.
Are terrorist groups in the area?
Are they violent?
Do they attack Americans?
How active are they?
How sophisticated are they?
Are they predictable?
Will local citizens warn Americans?, and
What tactics and weapons are used?

Terrorism is the unlawful use of violence or threat of violence to instill fear and coerce governments
or societies. Terrorism is often motivated by religious, political, or other ideological beliefs and
committed in the pursuit of goals that are usually political.

Lesson 1, Page 4: How Terrorists Identify and Select Targets

Description:
Consider ways you might become a victim of terrorist attack.
 Location: Avoid possible target locations
 Association: Avoid disclosing your DOD or US Government affiliation
 Opportunity: Terrorists look for “soft targets”
 Predictability: terrorists will attempt to exploit routine patterns of behavior
To attack you, terrorists generally must perceive you, your association, or your location as a target

Narration: Consider ways you might become a victim of a terrorist attack. Several factors to keep in
mind include:
• Location: Terrorists may target locations frequented by Americans or US military personnel such as

4
certain hotels, apartment buildings, public transportation centers, and nightclubs. Avoid possible
target locations.
• Association: Terrorists may focus on American tourists, personnel associated with the US
Government, and individuals who appear to be high-ranking or important. Try to blend in with the
local population. When possible, avoid disclosing your DOD or US Government affiliation.

• Opportunity: Terrorists look for "soft targets." Maintain vigilance, practice good personal safety,
and alert the proper authorities of suspicious behavior.

• Predictability: Terrorists will attempt to exploit routine patterns of behavior, and have been known
to observe their targets well in advance of planned attacks. Try to be unpredictable by varying routes
and times to and from work and other routine destinations.
To attack you, terrorists generally must perceive you, your association, or your location as a target.
Don't be an easy target.

Lesson 1, Page 5: AT Training Quiz 1


Description:
From the following choices, select the factors you should consider to understand the threat in your
environment.

A. Are terrorist groups in the area?


B. Are terrorist groups violent?
C. Do terrorist groups attack Americans?
D. How active are terrorist groups?
E. How sophisticated are terrorist groups?
F. Are terrorist groups predictable?
G. Will local citizens warn Americans about terrorist groups?
H. What tactics and weapons are used by terrorist groups?

Correct answers: All answers are correct.


Narration: From the following choices, select the factors you should consider to understand the
threat in your environment.

Lesson 1, Page 6: AT Training Quiz 2


Description:
Select all factors that can help you avoid becoming the victim of a terrorist attack.

A. Location
B. Association
C. Opportunity
D. Predictability

5
Correct answers: All answers are correct.
Narration:
Select all factors that can help you avoid becoming the victim of a terrorist attack.

Lesson 1, Page 7: Combatant Command Overview

Description: The slide starts with a map of the world showing the various commands across the
world: NORTHCOM, SOUTHCOM, AFRICOM, CENTCOM, PACOM, and EUCOM

DOD personnel and assets have been targeted in virtually every region of the world

When traveling, you should receive a combatant command terrorist threat briefing 90 days prior to
departure.

Modify your personal protective measures based upon the information in these briefings

Select each Combatant Command to learn more about the terrorist threat in that area. When finished
viewing all Combatant Commands, continue to the next page.

Narration: Groups and individuals have demonstrated their willingness to employ terrorist tactics to
further their agendas. While some threats have a regional focus, others have become international
and affect multiple areas. DOD personnel and assets have been targeted in virtually every region of
the world.
When traveling, you should receive a Combatant Command terrorist threat briefing 90 days prior to
departure. Modify your personal protective measures based upon the information in these briefings.
Threat briefings are based upon intelligence and local historical factors and are designed to help you
be safe - take them seriously. More detailed information for your region is available through your
local Antiterrorism Officer.
Select each Combatant Command to learn more about the terrorist threat in that area. When finished
viewing all Combatant Commands, continue to the next page.

Popup Slide 1:
Within the United States, several organizations and individuals use terrorist tactics to achieve their
goals. Other organizations provide direct and indirect assistance through fund-raising, recruiting, and
training support.
Terrorist attacks by Islamic extremists began in 1993 with the first attack against the World Trade
Center in New York. More recently, the foiled terrorist plot against Fort Dix, New Jersey demonstrates
that Al-Qaida inspired groups still exist within the nation's borders.
Home-grown terrorism is also a reality. During the 1960s and 70s, the Weathermen and the Armed
Forces for Puerto Rican National Liberation executed several small-scale terrorist attacks. More
recently, violent elements include the anti-abortion Army of God, the eco-terrorist Earth Liberation
Front, and other domestic anarchist groups and individuals. Homegrown terrorists have employed

6
various tactics such as rudimentary letter bombs, improvised explosive devices, small arms attacks,
and truck bombs. Bioterrorism is also a concern in view of the anthrax attacks in 2001.

Popup Slide 2:

The primary terrorist threat in the SOUTHCOM region is narcoterrorism and the continued operation
of radical leftist groups. Additionally, the ties between narcoterrorists and radical extremists from the
Middle East are reportedly increasing. It is possible Latin American countries may become a transit
point for terrorists from other parts of the world to enter the United States.
Unlike the 1980s, recent attacks against US interests are focused primarily on businesses and not US
military or government assets. In addition to bombings and arson, terrorist tactics include targeted
assassinations and kidnapping, especially against non-US assets.
Some of the most prominent terrorist organizations within the SOUTHCOM region include the
Revolutionary Armed Forces of Colombia (FARC), the Colombian National Liberation Army (ELN), and
the Shining Path in Peru.
Examples of prior terrorist activity in the SOUTHCOM AOR include the Attack on the Japanese
Ambassador's Residence in Peru, Zona Rosa, and Casino Royale.

Popup Slide 3:

Stability in the AFRICOM region is threatened by nationalist, tribal, and ethnic groups that use
terrorist tactics to support their agendas. The region is also threatened by Islamic extremists such as
Al-Qaida, the Salafist Group for Preaching and Combat, Al Shabaab, and Al-Qaida in the Islamic
Maghreb.
The 1998 bombings of the US embassies in Kenya and Tanzania illustrate the willingness of terrorists
to use indiscriminate violence to attack American interests in Africa. Additionally, local ethnic and
nationalist-based conflicts increasingly threaten US corporate infrastructure and personnel.
Terrorist organizations also engage in support activities within the AFRICOM region. These include
fund raising, training, recruiting, operation of front activities, and involvement in criminal enterprises.
Africa has the potential to be a significant transit point and support base for terrorist operations in
other parts of the world.
Examples of prior terrorist activity in the AFRICOM AOR include the African Embassy Bombings,
Paradise Hotel Bombing, and M/V Maersk Alabama Attack.

Popup Slide 4:

Within the CENTCOM region, Islamic extremists pose the primary terrorist threat to US military and
government personnel. Since the mid-1990s, terrorists have enhanced their capabilities and
expanded their influence and presence into other parts of the world.
In the areas of current US military operations, roadside Improvised Explosive Devices (IEDs) pose one
of the greatest threats to US forces. Additionally, local political leaders, civilians, infrastructure, and
international aid personnel are terrorized by suicide bombings, kidnappings, and murders. In many
other parts of the CENTCOM region, suicide bombers and gunmen target hotels and tourist
attractions to advance domestic political and religious agendas.
Numerous terrorist organizations operate within the CENTCOM region. In addition to Al-Qaida, other
organizations include Hezbollah, the Palestinian Islamic Jihad, and Ansar al-Islam.

7
Examples of prior terrorist activity in the CENTCOM AOR include the Serena Hotel, the Luxor
Massacre at Deir el-Bahri, and Khobar Towers.

Popup Slide 5:

Terrorist groups in the PACOM region present diverse threats to Americans. Some specifically target
Americans and others target public sites where Americans may become victims. Additionally, there is
evidence of ties between groups in the PACOM region and al-Qaida and other international groups.
Terrorist attacks in this region demonstrate a broad spectrum of tactics. These include kidnappings,
suicide bombings, and even chemical attacks. Aleph, formerly known as Aum Shinrikyo, attacked the
Tokyo subway with Sarin nerve gas and cyanide in 1995. Abu Sayyaf, a Philippine group seeking to
create a radical Muslim state, targets Americans for kidnapping.
Terrorists have targeted DOD and other American assets in the region. In 2001, Singaporean officials
foiled a plot to attack US military forces and western diplomatic missions. The group, Jamaah
Islamiya, seeks to create a radical Muslim state across South East Asia. In 2002, 2005, and 2009 it
conducted bombings in Bali and Jakarta, Indonesia to kill western tourists.
Examples of prior terrorist activity in the PACOM AOR include the Bali Nightclub Bombing, the
Singapore Plot, and Tokyo Subway Attack.

Popup Slide 6:

The EUCOM region contains a wide spectrum of terrorist threats. Threats include traditional
nationalist, ethnic, and leftist terrorist groups such as the Basque Fatherland and Liberty (ETA),
November 17, and the Real Irish Republican Army. The region is also threatened by Islamic extremists
such as Al-Qaida and Ansar al-Islam. Chechen rebels, responsible for several terrorist attacks within
the former Soviet Union, are both Muslim radicals and separatists.
In recent years, US allies in Europe have suffered dramatic terrorist attacks. Terrorists have targeted
civilians with IEDs and suicide bombers for maximum impact on government policies and elections.
US military forces have also come under direct attack by organizations wishing to diminish America's
influence in the area.
Additionally, organizations sympathetic to terrorist objectives actively raise funds, recruit, and
provide other support to religious extremist groups. As seen in the events of 9/11, western Europe
can be a staging area for attacks against the United States.
Examples of prior terrorist activity in the EUCOM AOR include the London Subway Bombing, La Belle
Discotheque Bombing, and the 2011 Norway Massacre.

Lesson 1, Page 8: Terrorist Planning Cycle Overview

Description: Unusual Behavior


 Taking photos or videos
 Writing notes or sketching details.
 Showing abnormal attention to details
 Using false identification

8
 Paying cash for items
Purchasing large quantities of items that could be used for an attack

Narration: Terrorists prepare and conduct attacks through predictable steps. Through vigilance, you
may be able to recognize preparations for an attack before it is executed.
Be alert to unusual behavior that may indicate intelligence gathering, surveillance, collecting
materials for an attack, dry runs, and rehearsals. For example:
• Taking photos or videos of potential targets
• Writing notes or sketching details about a possible target
• Showing abnormal attention to details of routine activities and security measures
• Using false identification
• Paying cash for items normally bought on credit, or
• Purchasing large quantities of items that could be used for an attack (for example, chemicals or cell
phones)
If you see something unusual, report it immediately to security officials for further investigation.
Make a note of the individual's description and activities, the time of day, and equipment being used.

Lesson 1, Page 9: Terrorist Planning Cycle

Description: The slide shows the terrorist planning cycle by having 7 separate popup slides showing
each step.

The Terrorist Planning Cycle

1. Broad Target Selection


2. Intelligence and Surveillance
3. Specific Target Selection
4. Pre-Attack Surveillance and planning
5. Rehearsals
6. Actions on the Objective
7. Escape and Exploitation

Select each phase to learn more about it. When finished viewing all phases, continue to the next
page.

Narration: Terrorists prepare for and conduct attacks through predictable steps or phases. Select
each phase to learn more about it. Each uses the planning and execution of the 1995 attack on the
Murrah Federal Building in Oklahoma City as an example. As you view these, consider how a vigilant
person might have recognized indications of a threat. When finished viewing all phases, continue to
the next page.

Phase 1: Broad Target Selection. During broad target selection, terrorists collect information on
numerous targets to evaluate their potential in terms of symbolic value, casualties, infrastructure
criticality, or public attention.

9
Timothy McVeigh wanted to attack a symbol of the Federal Government, preferably the FBI, Drug
Enforcement Administration, or Bureau of Alcohol, Tobacco and Firearms. He identified possible
targets such as individual Federal employees, their families, and facilities in at least five states.

Phase 2: Intelligence and Surveillance. Vulnerable targets able to meet attack objectives are selected
for additional intelligence gathering and surveillance. This effort may occur quickly or over years
depending upon the target and planning information needed. Terrorists seek to gather detailed
information on guard forces, physical layout, personnel routines, and standard operating procedures.
McVeigh performed initial surveillance of the Murrah Federal Building in Oklahoma City, one of his
potential targets. He noted the interstate highway allowed easy access and possible escape routes.
He also observed indented curbs that permitted vehicles to be parked directly in front of the building.

Phase 3: Specific Target Selection. Specific targets are then identified for attack based on anticipated
effects, publicity, consistency with overall objectives, and costs versus benefits of the attack.
McVeigh chose the Murrah Federal Building because he believed the Federal agencies represented
there were responsible for the incident in Waco, TX two years earlier. In addition, he assessed the
facility as a "soft target," with a good chance of success at low risk. His intent was to kill Federal
employees and thereby gain media attention.

Phase 4: Pre-Attack Surveillance and Planning. Terrorists may conduct additional surveillance to
confirm previous information and gain additional details. During this stage, terrorists will select the
method of attack, obtain weapons and equipment, recruit specialized operatives, and design escape
routes.
McVeigh recruited Terry Nichols and prepared for the Oklahoma City attack over a six-month period.
He acquired materials for a 5,000-pound truck bomb through theft, use of false documents, and
paying cash for items normally bought on credit. He also made several trips to the Murrah Federal
Building to identify the exact place to park the truck and to select escape routes.

Phase 5: Rehearsals. Terrorists often rehearse the attack scenario to confirm planning assumptions,
enhance tactics, and practice escape routes. They may also trigger an incident at the target site to
test the reaction of security personnel and first responders.
McVeigh practiced making and detonating bombs in isolated locations. He memorized details of the
Murrah Building layout, finalized the sequence of actions for the attack, and practiced responses to
law enforcement officers if they were encountered.

Phase 6: Actions on the Objective. Terrorists choose to execute attacks when conditions favor success
with the lowest risk. Factors they consider include surprise, choice of time and place, use of
diversionary tactics, and ways to impede response measures.
On 19 April 1995, McVeigh parked a rental truck - a 5,000-pound vehicle bomb - in front of the
Murrah Federal Building where it could cause the most damage. The date of the bombing was
symbolic - the second anniversary of the fire at the Branch Davidian compound in Waco, TX.

Phase 7: Escape and Exploitation. Unless an operation is a suicide attack, escape routes are carefully
planned and rehearsed. Terrorists may exploit successful attacks by releasing pre-developed
statements to the press.
After preparing the bomb for detonation, McVeigh walked away from the scene on a preselected

10
route. To flee Oklahoma City, McVeigh used a get-away car pre-positioned before the attack.
McVeigh wanted the world to know that he attacked the Federal Murrah Building because he
believed the Federal Government infringed on individual rights of Americans. McVeigh left a file on
his sister's computer titled "ATF Read" echoing these sentiments. His get-away car contained anti-
government literature and he subsequently made statements concerning his motivations for the
attack.

Lesson 1, Page 10: Force Protection Conditions

Description: The slide shows the way military organizations operate to enforce force protection
conditions.

Narration: US military facilities use a variety of protective measures to reduce vulnerability to


terrorist attack. These measures are organized in a system called Force Protection Conditions, or
FPCONs. As the threat changes, Commanders change the FPCON to protect personnel.
FPCONs are organized in five levels with increasing measures of protection: NORMAL, ALPHA, BRAVO,
CHARLIE, and DELTA. Commanders adapt protective measures for the local situation, and they can
use additional measures and move to a higher FPCON as needed. Measures may also be added
randomly to rehearse them, to promote security awareness, and to confuse surveillance by potential
threat elements.

As the FPCON increases, you can expect to experience delays at gate checks, more detailed
inspections, gate closures, and increased guard presence. FPCON CHARLIE and DELTA are very
restrictive and rarely used. Normal operations may be reduced or suspended in these cases.

Lesson 1, Page 11: FPCON Quiz 1


Description:
Force Protection Condition DELTA means that your base is at which one of the following?

A. A medium level of protection


B. The least increased level of protection
C. The most increased level of protection

Correct answer: C, the most increased level of protection.


Narration:
Force Protection Condition DELTA means that your base is at which one of the following?

11
Lesson 1, Page 12: National Terrorism Advisory System (NTAS)

Description: The Slide describes and explains what NTAS is and what it does.

Narration:
The National Terrorism Advisory System, or NTAS, replaces the color-coded Homeland Security
Advisory System. The NTAS is designed to communicate information about terrorist threats by
providing timely, detailed information to the public, government agencies, first responders,
transportation hubs, and the private sector.
Under the NTAS, the Department of Homeland Security will issue alerts when credible information
concerning a threat is available. Alerts provide recommended steps that individuals, communities,
businesses and governments can take to help prevent, mitigate or respond to the threat. Broadly
issued alerts will be issued through media and official channels; however, members of the public can
also register to receive alerts directly through email and social media websites.
The NTAS only applies to the United States and its possessions. For international travel, consult the
relevant State Department travel advisories. For information on the NTAS and State Department
travel advisories, please see the External Links section under Resources.

Lesson 1, Page 13: NTAS Quiz 1


Description:
Alerts from the National Terrorism Advisory System apply only to the United States and its
possessions.

A. True
B. False

Correct answer: True.


Narration:
True or false? Alerts from the National Terrorism Advisory System apply only to the United States and
its possessions.

Lesson 1, Page 14: Introduction to Antiterrorism Training – Lesson Summary

Description:
Intro to AT Lesson::
• An introduction to AT Level I training, including
• Threat factors
• How terrorists identify and select targets
• A Combatant Command overview
• An overview of the terrorist planning cycle

12
• An explanation of Force Protection Conditions and the National Terrorism Advisory System

Click the Next Lesson tab at the top of the page to continue.

Narration:
You have completed lesson 1 of your AT training.
This lesson provided:
• An introduction to AT Level I training, including
• Threat factors, and
• How terrorists identify and select targets
• A Combatant Command overview
• An overview of the terrorist planning cycle, and
• An explanation of Force Protection Conditions and the National Terrorism Advisory System
Click the Next Lesson tab at the top of the page to continue.

Antiterrorism Scenario Training – Lesson Introduction

Lesson 2, Page 1:

Description: Surveillance detection, Security at a Government Facility, Residential security, Security


during off-duty/free time activities, Air travel security, Ground travel security, Hotel security, Hostage
survival, Chemical, biological, radiological, nuclear, and high-yield explosives

Narration:
Knowing how to minimize the risk of terrorism to yourself, your family, and your unit is important.
This lesson reviews aspects of antiterrorism (AT) security for situations you may encounter. Topics in
this lesson include the following.
Each topic presents information specific to the situation, scenarios in which to apply this information,
and a few quizzes to test your knowledge.
The lesson begins with a review of antiterrorism themes on the next page.

Lesson 2, Page 2: AT Fundamentals

13
Description: The slide contains 4 popup slides that have descriptions of the 4 elements of AT
Fundamentals.
Four AT Level I Themes

Anticipate: Anticipate foreseeable threats, make choices that reduce risk.


Anticipating threats, risks, and vulnerabilities is fundamental to antiterrorism and personal security.
By doing this, you can make choices that enhance your personal protection.

Ways to do this include:


• Researching criminal activity in your area
• Understanding the tactics and techniques commonly used by criminals and terrorist organizations
in the area
• Knowing the types of targets and locations that have been selected for illegal activity

Consider consulting these sources:


• Police crime reports
• Other internet and media resources

These will help you:


• Anticipate and avoid high crime areas
• Identify appropriate security measures
• Recognize possible threats and respond appropriately
• Develop security and emergency plans for the home and family

Planning ahead can enhance your security while at home, work, and other locations.

Be Vigilant: Remain alert, note changing conditions and suspicious activities.


Vigilance is required to continuously observe your surroundings and recognize suspicious activities.

The first step to vigilance is to understand your environment's normal conditions. To do this, try to
observe and learn the patterns of routine activities in your area.

When you have an instinct for what is normal, you can more readily recognize things that are
suspicious:

• Potential threats such as items that are out of place


• Attempted surveillance by persons loitering, following you, or simply in the wrong place
• Circumstances that correspond to prior criminal activity in your area

Informed vigilance is fundamental to personal security. Even within the United States, you may
observe activity leading up to a terrorist attack. Be vigilant and report things that look suspicious to
your organization's security officer or other appropriate authorities.

Don’t Be a Target: Be anonymous, control access, be unpredictable.


Not all threats are predictable or can be recognized in advance. As a result, you should concentrate
on not being an easy target for attack.

14
Reduce your exposure by being anonymous and blending in with your surroundings:

• Do not wear clothing or carry items that might attract criminal attention
• Remain low key and do not draw attention to yourself
• Avoid places of high criminal activity

In addition to blending in, try to reduce your vulnerability and exposure:

• Select places with security measures appropriate for the local threat
• Be unpredictable and vary your routes and times of travel
• Travel with a friend or in a small group
• Use automobiles and residences with adequate security features

You can greatly increase your personal protection posture by remaining anonymous and reducing
your exposure.

Respond and Report: Respond appropriately, report suspicious or threatening activities.

Report suspicious activities to appropriate authorities immediately. And, when threatened, respond
to protect yourself and others. Specific circumstances may require different responses; however, in
general:
• Report suspicious activity, do not try to deal with it yourself

• In threatening situations, take steps to reduce your exposure

• Follow the instructions of emergency personnel and first responders

Security is a team effort. Try to ensure your actions help trained security personnel do their jobs. You
can do this by providing information they need and avoiding becoming a casualty yourself.

Upon arrival at a new location, learn the proper procedures for reporting antiterrorism related
information. This could be a unit antiterrorism officer, building management, or local law
enforcement. Be prepared to report and respond.

Narration:
The four AT Level I themes are:
• Anticipate
• Be vigilant
• Don't be a target, and

15
• Respond and report
Select each to read more about it. When finished viewing all items, select NEXT to continue.

Lesson 2, Page 3: AT Fundamentals Quiz 1


Description:
If you identify a possible surveillance attempt you should try to handle the situation yourself.

A. True
B. False

Correct answer: False


Narration:
True or False. If you identify a possible surveillance attempt you should try to handle the situation
yourself.

Lesson 2, Page 4: AT Fundamentals Quiz 2


Description:
Security is a team effort.

A. True
B. False

Correct answer: True


Narration:
True or False. Security is a team effort.

Lesson 2, Page 5: AT Fundamentals Quiz 3


Description:
Which of the following is NOT an Antiterrorism Level I theme?

A. Anticipate
B. Be vigilant
C. Don’t be a target
D. Counter-surveillance
E. Respond and report

Correct answer: D. Counter-surveillance


Narration:

16
Which of the following is not an antiterrorism Level I theme?

Lesson 2, Page 6: AT Fundamentals Summary

Description: The image shows the four fundamentals of the four AT Level 1 Themes.

Narration:
You now understand the four AT Level I themes listed here.
Click the Next Lesson tab at the top of the page to continue.

Lesson 3: Surveillance Detection Fundamentals

Lesson 3, Page 1: Surveillance Detection Introduction

Description:
Surveillance against an individual seeks to determine:
• Residential security measures
• Modes of travel
• Routes and times of travel
• Typical behavior
• The target's general security awareness

Surveillance against a facility or assets tries to determine:


• General security posture
• Security standard operating procedures
• Information on security force shift rotations
• Physical security weaknesses
• Reaction times to emergencies

For more information, see the Singapore Plot in Historical Examples available in RESOURCES section.

Narration:
Terrorists conduct surveillance to gather information to plan an attack. Criminals perform surveillance
to choose a time and place to conduct a theft. In both cases, the target may be an individual, a
facility, or asset.

Surveillance against an individual seeks to determine:


• Residential security measures
• Modes of travel
• Routes and times of travel
• Typical behavior, and
• The target's general security awareness

17
Surveillance against a facility or assets tries to determine:
• General security posture
• Security standard operating procedures
• Information on security force shift rotations
• Physical security weaknesses, and
• Reaction times to emergencies

Detecting surveillance is key to preempting a terrorist attack. If you suspect surveillance, contact
installation security, local law enforcement, or building management immediately.

Lesson 3, Page 2: Surveillance Detection Fundamentals

Description:
Signs of surveillance:
- People loitering in or coming back to the same general area without a recognizable legitimate
reason
- People that appear preoccupied with a specific building or area, to include taking pictures,
making notes, or drawing sketches
- Certain civilian vehicles that seem to appear repeatedly
Electronic audio and video devices in unusual places or that are not DOD property

Narration:
You should be alert to the possibility of surveillance in all locations.
In conducting surveillance, terrorists will attempt to blend in with the environment to avoid arousing
suspicion. Be vigilant for anything that might be a sign of surveillance, such as the examples listed
here.
Learn your environment and recognize suspicious behavior.

Lesson 3, Page 3: Methods of Surveillance (1 of 2)

Description: Stationary surveillance from fixed location


- Operatives try to blend in
- Operatives seek to recruit support personnel

Moving surveillance on foot or in vehicles


- One or more vehicles
- Two or more people
- Operatives may not always be behind you

Vary your routes and routines.

Select this video to see a terrorist operative performing surveillance against US and Singaporean
facilities.

18
In the video, the camera man is describing what is going on around the location, he notices the
patterns of the goings on and off the busses in the video, and makes note of the bike rack, he notices
a hole in the street and notes that it may be useful.

Narration:
Surveillance may be conducted over a long period of time and employ various methods:
Stationary surveillance is a common method in which operatives observe from a fixed location.
• Operatives try to blend in by doing ordinary tasks
• Operatives may seek to recruit support personnel with access to installations or residences
Moving surveillance is conducted on foot or in vehicles, generally in teams.
• Vehicle surveillance may include one or more vehicles
• Generally uses two or more people, one driving while the others observe
• Operatives may not always be behind you; once your routines are learned, they may be in front of
you
Varying your routes and routines can disrupt surveillance attempts.

Lesson 3, Page 4: Methods of Surveillance (2 of 2)

Description:

Technical surveillances uses electronic means:


- Still and video cameras, cell phones
- Security information on Internet

Casual questioning to elicit security information:


- Operatives non-threatening/friendly
- May use unwitting operatives
- May use members of the opposite sex

Narration:
Additional surveillance methods include:
Technical surveillance, which uses electronic means to record or gain access to security information:
• May use still and video cameras, including cell phones
• May gain access to security information on the Internet
Casual questioning that is used to elicit security information from approachable personnel:
• Operatives may portray themselves as non-threatening and friendly
• Terrorists may use unwitting operatives who do not understand the purpose of the information
they are asked to gather

19
• Operatives may use members of the opposite sex to gain access to facilities and collect information
Awareness of terrorist surveillance methods can help you see and respond to surveillance.

Lesson 3, Page 5: Surveillance Detection Situation 1


Description:
You are working for DOD in a major US city and your organization is in a leased facility in the
downtown area. DOD occupies fifty percent of the building, with the rest being occupied by other US
Government agencies and commercial businesses. On your way to work, you notice a man on the
sidewalk apparently taking pictures of your building with his cell phone. You know this is a little
unusual and that you should make a note of the man’s activities. But what else do you do? Select the
correct response.

A. Wait until he finishes his activities and then follow him.


B. Continue to observe the man to collect as much information as possible.
C. Note the man’s description and immediately provide this information to unit security or
building management.

Correct answer: C, Note the man’s description and immediately provide this information to unit
security or building management.
Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 3, Page 6: Surveillance Detection Situation 2


Description:
You enter your building and wait for your elevator. As you wait you overhear a woman at the
reception desk asking a lot of questions. At first they are questions that any prospective tenant might
ask, but eventually she asks: what other tenants are in the building, what Government agencies have
offices in the building, how many DOD personnel work here, who is the highest ranking DOD person in
the facility, and what type of work do other tenants perform? How do you respond?

A. Continue to your office and immediately report the incident to unit security or building
management.
B. Approach the reception desk and try to answer the questions with misleading information.
C. Approach the reception desk and try to change the topic of conversation.

Correct answer: A, Continue to your office and immediately report the incident to unit security or
building management. Also remember to note the woman’s description.
Narration:
What would you do in this situation? Read the situation and select the correct response.

20
Lesson 3, Page 7: Surveillance Detection Quiz 1
Description:
Surveillance can be performed through either stationary or mobile means.

A. True
B. False

Correct answer: True.


Narration:
True or False. Surveillance can be performed through either stationary or mobile means.

Lesson 3, Page 8: Surveillance Detection Quiz 2


Description:
Electronic audio and video devices are never used by terrorists for surveillance purposes.

A. True
B. False

Correct answer: False.


Narration:
Electronic audio and video devices are never used by terrorists for surveillance purposes. True or
false?

Lesson 3, Page 9: Surveillance Detection Quiz 3


Description:
What is not a terrorist method of surveillance?

A. Stationary surveillance
B. Moving surveillance
C. Technical surveillance
D. Casual questioning
E. Breaking and entering to steal valuables

Correct answer: E, Breaking and entering to steal valuables.


Narration:
What is not a terrorist method of surveillance?

Lesson 3, Page 10: Surveillance Detection Summary

21
Description: You're now familiar with surveillance detection fundamentals and methods of
surveillance. Click the Next Lesson tab at the top of the page to continue.

Narration:
Same as onscreen text.

Lesson 4: Government Facility Security Fundamentals

Lesson 4, Page 1: Government Facility Security Introduction

Description: Attacks and plots against US Government facilities include:


- The 2009 small-arms attack on the Fort Hood deployment processing center
- The 2009 small-arms attack on the Army-Navy Career Center in Little Rock, Arkansas
- The 2008 Times Square bombing of a US Military Recruiting Station in New York City
- The thwarted 2007 plot to using small arms, rocket-propelled grenade (RPGs), and grenades
against Fort Dix
- The 1995 VBIED attack on the Murrah Federal Building in Oklahoma City

For more information, see the Fort Dix Plot and Oklahoma City Bombing in Historical Examples
available in the RESOURCES section.

Narration:
The DOD makes every effort to ensure the safety of personnel on Government facilities. However,
threats to facilities persist, even within the United States.
Attacks and plots against US Government facilities include:
• The 2009 small-arms attack on the Fort Hood deployment processing center
• The 2009 small arms attack on the Army-Navy Career Center in Little Rock, Arkansas
• The 2008 Times Square bombing of a US Military Recruiting Station in New York City
• The thwarted 2007 plot to using small arms, RPGs, and grenades against Fort Dix, and
• The 1995 VBIED attack on the Murrah Federal Building in Oklahoma City

Lesson 4, Page 2: Government Facility Security Fundamentals

Description:
By being alert, you may see something that dedicated security personnel are not able to see, or you
may see a problem that is not obvious to others.
- Be aware of the current Force Protection Condition (FPCON) and comply with security and
response protocols
- Understand the features of your installation’s security system
- Recognize problems in non-malicious compromises in security and take steps to correct them
- Recognize potentially malicious threats to security and report them
- Know what to do in response to an incident

22
Narration:
The success of installation security protocols and procedures depends on their consistent application.
This requires the discipline, attention, and cooperation of everyone.
By being alert, you may see something that dedicated security personnel are not able to see, or you
may see a problem that is not obvious to others.
• Be aware of the current Force Protection Condition (FPCON) and comply with security and response
protocols
• Understand the features of your installation's security system
• Recognize problems in non-malicious compromises in security and take steps to correct them
• Recognize potentially malicious threats to security and report them
• Know what to do in response to an incident
Installation security is a team effort and everyone has a security responsibility.
Lesson 4, Page 3: Recognizing Problems in Government Facility Security
Description:
Report problems you observe:
 Inattentive guard personnel
 Weapons, identification badges, or keys managed in a non-secure manner
 Gaps in procedures that leave unauthorized persons unsupervised in sensitive areas
 Persons with an inappropriate curiosity in security measures
 Persons attempting to conceal contents of bags or cargo
 Inappropriate persons observed in residential areas

You are the eyes and ears that complete the security picture.
Narration:
Security systems may be weakened in an unintentional manner through a lack of discipline. Or, low-
level behaviors may suggest a malicious intent. Report problems you observe, such as the ones listed
here.
Do not assume that security personnel can see everything. You are the eyes and ears that complete
the security picture.

Lesson 4, Page 4: Government Facility Incident Response


Description:

Consider the following:


 Be aware of emergency contact phone numbers and procedures
 Be familiar with location and use of firefighting equipment and first aid kits
 Know and rehearse evacuation and accountability procedures for work places, your
residence, and other frequently-used facilities
 Be aware of normal patterns of activities and respond quickly to things that are unusual
 Emergency response in DOD commercially-leased facilities may involve DOD security
personnel, and first responders from the local civilian jurisdiction. Try to anticipate who you
should contact in different types of emergency situations.

Narration:

23
Every DOD member needs to be ready to respond to incidents on the installation.
Consider the following.
Each individual's response should seek to secure their personal safety, protect others, and preserve
DOD property.

Lesson 4, Page 5: Government Facility Security Situation 1


Description:
You are newly assigned to a commercially-leased DOD facility. Your DOD activity occupies three floors
of a five-story building. Upon arrival you asked for an orientation on response procedures to threats
in the area, and you also asked about evacuation and accountability procedures. What else can you
do to be better prepared to respond to emergencies? Select the correct response.

A. Check to see if there are signs with emergency procedures posted.


B. Ask your security manager who to call in the case of medical, fire, and security emergencies.
C. Look up security procedures on the building owner’s website.

Correct answer: B, Ask your security manager who to call in the case of medical, fire, and security
emergencies. In different situations you may need to contact your organization’s security office, or
the building manager’s security office, or local 911.
Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 4, Page 6: Government Facility Security Situation 2


Description:
You work in a commercially-leased DOD facility. One day in the hallway you see an unescorted person
wearing an “Escort Required” security badge. You stop him and he explains what he’s doing. What he
says sounds legitimate. What do you do? Select the correct response.

A. Tell him he should return to his escort.


B. Tell him he should get a “No Escort” badge.
C. Ask him to take you to his escort or to accompany you to the security office.

Correct answer: C, Ask him to take you to his escort or to accompany you to the security office. Also,
inform the security office in case there is a systemic problem with instructions for escorts.
Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 4, Page 7: Government Facility Security Quiz 1


Description:
Everyone on an installation has shared responsibility for security.

24
A. True
B. False

Correct answer: True. Service members, civilians, contractors, and family members all have a role to
play in installation security.
Narration:
True or false. Everyone on an installation has shared responsibility for security.

Lesson 4, Page 8: Government Facility Security Quiz 2


Description:
Persons who have been given access to an installation can be counted on to be of no threat.

A. True
B. False

Correct answer: False.


Narration:
Persons whohave been given access to an installation can be ounted on to be of no threat. True or
false?

Lesson 4, Page 9: Government Facility Security Quiz 3


Description:
Which one of these does not pose a risk to security at a government facility?

A. Inattentive guard personnel


B. A visitor showing an unusual interest in details of security procedures
C. A person found in an inappropriate location of the facility
D. An “escort required” visitor found without an escort
E. A person expressing boredom with the US mission

Correct answer: E, A person expressing boredom with the US mission.


Narration:
Which one of these does not pose a risk to security at a government facility?

Lesson 4, Page 10: Government Facility Security Fundamentals Summary

25
Description: You are now familiar with government facility security fundamentals.

Click the Next Lesson tab at the top of the page to continue.
Narration:
Same as onscreen text.

Lesson 5: Insider Threat


Lesson 5, Page 1: Insider Threat Introduction
Description: Examples of attacks by individuals thought to be loyal to the US:

 2010 leaking of over 500,000 documents concerning operation in Iraq and Afghanistan
 2009 active shooter attack at Fort Hood
 2003 active shooter attack at Camp Pennsylvania
 2001 anthrax attacks against Government facilities

Motivations may include:

 Desire to further a political or religious agenda


 Ability to exert power to influence events
 Perceived injustices upon oneself or against a minority group
 The need for excitement
 The desire to commit suicide

Individual awareness and active leadership are defenses to the insider threat.

For more information, see the Camp Pennsylvania Attack Historical Example available in the
RESOURCES section.

Narration: An insider threat uses authorized access, wittingly or unwittingly, to harm national
security through unauthorized disclosure, data modification, espionage, terrorism, or kinetic actions
resulting in loss or degradation of resources or capabilities.
Examples of attacks allegedly perpetrated by individuals thought to be loyal to the US include those
listed here.
Motivations for the insider threat may include these.
Individual awareness and active leadership are key defenses to the insider threat.

Lesson 5, Page 2: Types of Insider Threats


Description:
Types of insider threats related to any terrorism include:
 People who plot and execute terrorist attacks to further the agenda of an extreme ideology
 Mental instability
 Espionage
 Negligence

26
Preconditions for the insider threat
 Opportunity
 Motive
 Ability to overcome inhibitions
 Trigger

Narration: Types of insider threats related to any terrorism include:


• People who plot and execute attacks to further the agenda of an extreme ideology
• People that have a mental illness that impairs their judgment
• The divulgence of classified or sensitive information that may result in attacks or provide
information
on vulnerabilities that facilitate an attack. Motivations may be financial or ideological, and
• The disregard for standard security measures that potentially allow the collection of vulnerability-
related information or information that could precipitate an attack
Preconditions for the insider threat may include:
• An opportunity to commit the act
• A motive or need to be satisfied through the act
• An ability to overcome natural inhibitions to criminal or violent behavior, and
• A trigger that sets activities in motion
Security personnel cannot recognize and defeat all threats. You must be vigilant to a variety of
potential threats.

Lesson 5, Page 3: Recognizing Political or Religious Extremism


Description:
Pre-attack indicators:
 Anti-American statements asserting that US policy and authority are illegitimate
 Aggression or threats toward coworkers
 Presence or unauthorized weapons
 Attempts to communicate with US enemies
 Associations with known extremist groups
 Distribution of propaganda materials in support of an extremist position
 Unfounded allegations of US persecution or prejudice against a minority group or religion
 Repeated violation of policies
If you perceive an immediate threat, alert security personnel.
Narration: Early recognition of an insider threat can prevent an incident. Pre-attack indicators of
terrorism intended to coerce or to intimidate mostly in pursuit of ideological, religious, or political

27
reasons include those listed here.
If you perceive an immediate violent threat, alert security or law enforcement personnel.

Lesson 5, Page 4: Recognizing Mental Instability


Description:
Indicators of a potentially unstable person:
 Abnormal mood swings or depression, withdrawn behavior, decrease in hygiene, and/or
paranoia
 Flashbacks to prior traumatic events
 Abuse of alcohol or drugs
 Repeated violation of policies
 Talk of domestic or financial problems
 Talk of suicide
 Intense anxiety in social situations
If you witness behavior that might indicate an unstable person alert your supervisor or appropriate
medical personnel immediately.
Narration: A mentally unstable person may or may not exhibit some of the same behaviors of a
prospective terrorist. These are possible indicators of a potentially unstable person.
If you witness behavior that might indicate an unstable person, you should alert your supervisor or
appropriate medical personnel immediately. Early detection of such behavior can prevent a violent
incident and help a person get the help they need.

Lesson 5, Page 5: Insider Threat Situation 1


Description:
In light of recent attacks on DOD personnel, you and some friends discuss how to counter the insider
threat. What would you do to counter the insider threat? Select the correct response.

A. Review local guidance on responding to a security incident.


B. Learn to recognize indicators that might represent an insider threat.
C. Carefully monitor the activities of your fellow colleagues.

Correct answer: B, Learn to recognize indicators that might represent an insider threat.
Narration:
What would you do in this situation? Read the situation and select the correct response.

28
Lesson 5, Page 6: Insider Threat Situation 2
Description:
After reviewing indicators of the insider threat, you discuss your response if a potentially mentally
unstable person is identified. You know that indicators of a potentially violent incident should be
reported to security personnel or law enforcement personnel immediately, but what do you do if you
notice indicators of mental instability, but not necessarily violence? Select the correct response.

A. Try to find them professional help.


B. Encourage them to get help from a medical professional.
C. Report the behavior you have witnessed to a supervisor.

Correct answer: C, Report the behavior you have witnessed to a supervisor.


Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 5, Page 7: Insider Threat Quiz 1


Description:
Knowing indicators of an unstable person can allow you to identify a potential insider threat before an
incident.

A. True
B. False

Correct answer: True.


Narration:
Knowing indicators of an unstable person can allow you to identify a potential insider threat before an
incident. True or false?

Lesson 5, Page 8: Insider Threat Quiz 2


Description:
From an antiterrorism perspective, espionage and security negligence are considered insider threats.

A. True
B. False

Correct answer: True.


Narration:
True or false. From an antiterrorism perspective, espionage and security negligence are considered
insider threats.

29
Lesson 5, Page 9: Insider Threat Quiz 3
Description:
Which one of the following is not an early indicator of a potential insider threat?

A. Aggression or threats toward co-workers


B. Presence of unauthorized weapons
C. Abnormal mood swings, depression, and suicidal remarks
D. A reasonable disagreement with a US Government policy
E. Anti-American statements asserting that US policy and authority is illegitimate

Correct answer: D, A reasonable disagreement with a US Government policy.


Narration:
Which one of the following is not an early indicator of a potential insider threat?

Lesson 5, Page 10: Insider Threat Summary


Description:
You should now be able to recognize indications of insider threats.

Click the Next Lesson tab at the top of the page to continue.
Narration: You should now be able to recognize indications of insider threats. This knowledge can
help keep you safer in the workplace. Click the Next Lesson tab at the top of the page to continue.

Lesson 6: Active Shooter Fundamentals


Lesson 6, Page 1: Active Shooter Introduction
Description:

Recent examples of active shooter incidents or plots against DOD targets include:
• The March 2011 shooting of Air Force personnel at Frankfurt Airport in Germany
• The November 2009 shooting at the Soldier Readiness Center in Fort Hood, Texas
• The June 2009 shooting at the Holocaust Museum in Washington, D.C.
• The May 2009 shooting of soldiers outside a military recruitment center in Little Rock, Arkansas
• The 2007 plot to attack Fort Dix using automatic weapons

For more information, see the Holocaust Memorial Museum Attack Historical Example available in the
RESOURCES section.
Narration: An active shooter incident can occur at any time and at almost any location.
Recent examples of active shooter incidents or plots against DOD targets include:
• The March 2011 shooting of Air Force personnel at Frankfurt Airport in Germany
• The November 2009 shooting at the Soldier Readiness Center in Fort Hood, Texas
• The June 2009 shooting at the Holocaust Museum in Washington, D.C.
• The May 2009 shooting of soldiers outside a military recruitment center in Little Rock, Arkansas, and
• The 2007 plot to attack Fort Dix using automatic weapons

30
It is unlikely that you will be involved in an active shooter incident, but you should be prepared for the
possibility.

Lesson 6, Page 2: Active Shooter Fundamentals


Description:
Potential responses include:
 Evacuate
 Shelter in place
 Take action against the attacker
 Cooperate with first responders

Adapt your response to the type of weapon:


Ricocheting bullets hug the floor; crouching (not lying ) may reduce exposure
Grenade shrapnel rises; lying reduces exposure, feet toward blast
Narration: Active shooter situations are unpredictable and can evolve quickly. Potential responses
include:
• Evacuate
• Shelter in place
• Take action against the attacker, and
• Cooperate with first responders
You can also adapt your response to the type of weapon used by an attacker:
• Ricocheting bullets tend to hug the floor; crouching (not lying) on the floor may reduce exposure
• Grenade shrapnel rises from the detonation; lying on the floor reduces exposure and having feet
toward the blast may protect the head
An active shooter situation may be over within 15 minutes, before law enforcement arrives. Be
mentally and physically prepared to deal with an active shooter situation.

Lesson 6, Page 3: Responding to an Active Shooter (1 of 2)


Description:

Attempt to evacuate:
Have an escape route and plan in mind
• Evacuate regardless of whether others agree to follow
• Leave your belongings behind
• Help others escape, if possible
• Prevent others from entering an area where the active shooter may be
• Keep your hands visible
• Follow the instructions of first responders

31
• Do not attempt to move wounded people
• Call emergency services when you are safe
Narration: If you are in the vicinity of an active shooter situation, you have several options for
response.
If there is an escape path, attempt to evacuate:
• Have an escape route and plan in mind
• Evacuate regardless of whether others agree to follow
• Leave your belongings behind
• Help others escape, if possible
• Prevent others from entering an area where the active shooter may be
• Keep your hands visible
• Follow the instructions of first responders
• Do not attempt to move wounded people
• Call emergency services when you are safe
If evacuation is not possible you need to consider other options.

Lesson 6, Page 4: Responding to an Active Shooter (2 of 2)


Description:

If evacuation is not possible:


- Shelter in place
o Be out of view
o Provide protection
o Not trap you
o Locks on door
o Furniture to blockade

- Take action against an active shooter:


o Act aggressively
o Throw items; improvise weapons
o Yell
o Commit to your actions
Narration: If evacuation is not possible, consider the following.
Find a place where the active shooter is less likely to find you. Remember to silence your cell phone,
remain quiet and calm, and call emergency personnel if possible. The place you choose should:
• Be out of the shooter's view
• Provide protection against shots fired your way
• Not trap you

32
• Have locks on the door, and
• Have furniture to blockade the door
As a last resort, and only when your life is in imminent danger, try to disrupt or incapacitate the
shooter by:
• Acting aggressively
• Throwing items and improvising weapons
• Yelling, and
• Committing to your actions
Taking action against the active shooter may be risky, but it may be your best chance for survival.

Lesson 6, Page 5: Arrival of First Responders


Description:

Support First Responders:

 Remain calm and follow instructions


 Put down any items in your hands
 Raise hands and spread fingers
 Keep hands visible at all times
 Avoid quick movements
 Do not cling to emergency personnel
 Avoid pointing, screaming, or yelling
 Do not stop to ask first responders for help or direction first responders are entering

Provide first responders with:


 Location of the active shooter
 Number of shooters
 Physical description
 Number and type of weapons
 Number of potential victims

Narration: When first responders arrive, support their efforts and do not be a distraction. Follow the
guidelines listed here.
Provide first responders with the following information:
• Location of the active shooter
• Number of shooters
• Physical description of shooter(s)
• Number and type of weapons held by the shooter(s), and
• Number of potential victims
It is normal to feel helpless; however, you can support first responder efforts.

33
Lesson 6, Page 6: Active Shooter Situation 1
Description:
In light of recent attacks on DOD personnel, you consider how to prepare for the active shooter
threat. What should you do if there is an active shooter incident and evacuation is not possible?
Select the correct response.

A. Identify items that can be potentially used to attack the active shooter.
B. Seek cover in an area that can be closed off and barricaded.
C. Immediately phone first responders for help.

Correct answer: B, Seek cover in an area that can be closed off and barricaded. However, active
resistance may be necessary as a last resort.
Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 6, Page 7: Active Shooter Situation 2


Description:
You know there may be no warning before the start of an active shooter situation, and you might be
caught with no chance to evacuate, barricade yourself in a room, or attack the perpetrator. You know
you should dive for cover, but what else should you do for an active shooter situation involving
firearms? Select the correct response.

A. Run for the exit at the first possible opportunity.


B. Crouch on the floor.
C. Lie flat on the floor.

Correct answer: B, Crouch on the floor. In a small arms attack, crouch to the floor but do not lie
directly on it since ricocheting bullets hug the ground. In a grenade attack, since shrapnel rises, lie flat
on the floor with your feet towards the attacker(s) to protect your head.
Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 6, Page 8: Active Shooter Quiz 1


Description:
In an active shooter incident involving firearms you should immediately lie on the ground.

A. True
B. False

Correct answer: False. Ricocheting bullets tend to hug the ground. As a result, you should crouch
down but not lie on the floor.
Narration:

34
True or False: In an active shooter situation involving firearms you should immediately lie on the
ground.

Lesson 6, Page 9: Active Shooter Quiz 2


Description:
Active resistance should be the immediate response to an active shooter incident.

A. True
B. False

Correct answer: False. If possible, your first action should be to evacuate the area or shelter in place.
Narration:
True or false: Active resistance should be the immediate response to an active shooter incident.

Lesson 6, Page 10: Active Shooter Quiz 3


Description:
Which of the following is NOT a recommended response to an active shooter incident?

A. Look for possible escape routes from the area


B. Look for a place to hide or an area that can be barricaded
C. Find something solid to dive behind
D. Provide instructions to arriving emergency response personnel
E. If necessary, actively resist the perpetrator

Correct answer: D, Provide instructions to arriving emergency response personnel.


Narration:
Which of the following is not a recommended response to an active shooter incident?

Lesson 6, Page 11: Active Shooter Fundamentals Summary


Description:
You are now able to explain active shooter fundamentals.

Click the Next Lesson tab at the top of the page to continue.
Narration: You are now able to explain active shooter fundamentals. This knowledge can lower your
risk in an active shooter situation. Click the Next Lesson tab at the top of the page to continue.

35
Lesson 7: Residential Security
Lesson 7, Page 1: Residential Security Introduction
Description:
In selecting a new residence , some security considerations include:
 Location in a low crime area
 Access to emergency services
 Security measures such as apartment visitor control
 Strong crime prevention measures

For more information, see BG Dozier in Historical Examples available in the RESOURCES section.

Narration: A terrorist attack on a private residence in CONUS is not likely; however, theft and home
invasions are a real threat.
The majority of the DOD community in CONUS resides off-base and has many choices in selecting a
residence. Individual members are largely responsible for their own housing choices.
In addition to administering on-base housing, the housing office at a DOD installation can provide
assistance in selecting an off-base residence. Also, realtors and apartment finding services can help
you understand what is available.
In selecting a new residence, some security considerations include:
• Location in a low crime area
• Access to emergency services
• Security measures such as apartment visitor control, and
• Strong crime prevention measures
Well-maintained neighborhoods with effective community organizations generally have lower crime
rates. Even so, lax security can make your home a target for criminal break-in.

Lesson 7, Page 2: Physical Security


Description:
Consider these measures:
 Check for solid exterior doors, good quality locks, deadbolts, slide locks, and door jambs
 Ensure sliding doors can’t be lifted from their track and lay a rod or dowel in the track
 Keep valuables out of sight and away from exterior windows
 Don’t hide spare keys outside
 Use an alarm system if possible, both when you are at home and away
 Improve exterior lighting
 Put gravel outside windows so a prowler will make a sound
 Consider replacing locks since you do not know who may have keys from previous tenants

Narration:
Look at your residence the way a criminal might. A home that is an easy target is also a more likely
target. Physical security measures are a deterrent against crime.
Consider these measures.

36
Lesson 7, Page 3: Residential Security Practices
Description: Consider these security practices:
 Carefully control your keys
 Be extremely cautious in giving access to your home to any unknown person
 Call the utility company to confirm identities before giving access to utility workers
 Be alert when a stranger shows interest in you and your residence or asks for personal
information
 Only hire domestic workers from a reputable, licensed company and get personal references
from people you trust
 Be on good relations with your neighbors and look out for each other

Narration:
Good habits are essential for good security. A solid door is of no value if it is left unlocked or a
criminal gets access to a key.
Review daily routines needed for good security both day and night. Think about ways to improve your
security and confidence. Consider these security practices.
Frequently discuss security and family routines to ensure everyone understands. This will help raise
everyone's confidence that your family is secure at home.

Lesson 7, Page 4: Social Media (1 of 2 )


Description:
“Doxing”: Online release of personal information
Limit your exposure and use caution:
 Only reveal what you would feel comfortable revealing in a public setting
 Lock down privacy, access, searching, and sharing settings
 Disable automated GPS and location tracking features when not in use
 Do not reveal mission-related information
 Use discretion when accepting new “friends” or “connections”
 Limit the personal information you post online
 Do not post relationship statuses between you and your significant other, children, or family
members
 Do not tag identifiable pictures of yourself online
 Permanently deleting your profile is ultimately the best way to prevent information from
being collected on you, your friends ,and your family
 Opt out of aggregator sites and officially request that information be removed
 Remove or limit personal information, such as e-mail addresses, phone numbers, etc. on
websites that are searched by aggregators
Narration:
Social media makes personal information much more accessible than it's been in the past, presenting
a new set of challenges in protecting yourself. Consider this:
In March, 2015, a group calling themselves the Islamic State Hacking Division published a list of 100
US military personnel, calling for Jihadists to target and kill those listed. This listing included names,

37
photos, and residential addresses gleaned from open source internet sites, possibly including social
media sources.
This extensive "doxing" -- the online release of personal information -- marks a significant new tactic
of terrorist groups encouraging attacks on military and law enforcement personnel.
What can you do to counter the potential threat posed by social media? Limit your exposure and use
caution. The following steps can help minimize the risk of others finding and using personal
information against you.

Lesson 7, Page 5: Social Media (2 of 2 )


Description:
Five icons appear onscreen. Selecting each provides more information, as follows:

 Facebook: Make sure your privacy settings are set to the maximum level where only you can
view your own personal information. Often re-check your privacy settings because Facebook
regularly changes many of its privacy features
 LinkedIn: Ensure your job description does not include sensitive information that could be
used for identification or targeting purposes. Disable showing your groups and connections to
people searching for you. Limit your profile only to your 1st level connections.
 Myspace: Change your privacy settings so that your full profile is only visible to friends.
 White pages: Search for your name or phone number. Click on your profile and then find the
tab labeled "Claim/Edit." Click this tab and then click the "Login" link. Click the link, "Not
interested in using Facebook?" (It is highly recommended you DO NOT use your Facebook
account to create a new profile).
On the next page, click "Create an Account." Enter your information along with a non-DoD
associated email address. After you log-in, click on "My Account," and then select "Account."
Under the "Privacy Settings" area, click on "Show Information." Check the box marked, "Hide
all information about me" and confirm.
 Public Aggregator sites: Most data aggregators allow you to opt-out of their public indexing
searches by sending an email to the company or filling out a form. Other sites, such as
intellius.com, require you to email or fax them a copy of your driver’s license in order to
remove your profile. Typically, this is safe to do, but make sure you upload the scanned
license to the real website.
Narration:
Since social media is already a part of daily life for many, it's important to take steps now to protect
yourself. Here are specific safety recommendations for some of the most popular social media
websites.

Lesson 7, Page 6: Residential Preparation for Emergencies


Description:
Consider what your family should do in these situations
A utility worker says he needs to check a gas line in your house
 Call the utility company to confirm identity and authority to enter
Your children come home from school and unexpectedly non one is there to care for them
 Have an emergency contact plan and instructions to stay in a safe place.
Someone breaks into your home and demands money and valuables

38
 Cooperation is probably the best approach

Narration:
Prepare to spend 72 hours in your home in an emergency. Make an emergency kit with food, water,
first aid supplies, and other items. Download an emergency kit checklist and a template for a family
emergency plan from the Antiterrorism Electronic Library in the Resources section of this course.
Consider what your family should do in these situations. Discuss contingencies so your family is ready.

Lesson 7, Page 7: Residential Security Situation 1


Description:
You have just arrived at your new duty assignment. On-base housing is not available, and at the
housing office you received a list of registered landlords to find a residence on the local economy. You
decide to prepare a list of preferences for your house search. You know you want a location in a low
crime area, near local community emergency services. What else do you consider for better security?
Select the correct response.

A. A house on a cul-de-sac.
B. A well-maintained neighborhood with an active neighborhood watch.
C. Good community services like a pool and recreation center so you will not need to travel far
for recreation.

Correct answer: B, A well-maintained neighborhood with an active neighborhood watch.


Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 7, Page 8: Residential Security Situation 2


Description:
You found a place to rent and are looking at ways to improve physical security. You know it is a good
idea to change locks to ensure keys are under your control. What else can you do to improve the
physical security of your new residence? Select the correct response.

A. To ensure family members can get in if they lose their key, hide a key near the front porch.
B. Ask your neighbors if there are crime problems in the neighborhood; if not, you do not need
to do anything special.
C. Make sure windows lock securely and put a dowel or rod in sliding door tracks to keep them
from being forced open.

Correct answer: C, Make sure windows lock securely and put a dowel or rod in sliding door tracks to
keep them from being forced open. Also, keep valuables out of sight and away from windows.
Narration:
What would you do in this situation? Read the situation and select the correct response.

39
Lesson 7, Page 9: Residential Security Situation 3
Description:
You discuss home security with your family. You know before using a cleaning service you should try
to confirm that a company is reliable and licensed, and if possible get recommendations from
someone you trust. Also, you want to have good relations with your neighbors so you can look out for
each other. You are now discussing the importance of electronic communications in securing your
home. What do you do? Select the correct response.

A. Keep close watch on all Internet acquaintances made by family members.


B. Encourage family members to use the Internet to stay in contact with friends and family.
C. Keep antivirus and malware software up to date on your home computers.

Correct answer: A, Keep close watch on all Internet acquaintances made by family members.
Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 7, Page 10: Residential Security Quiz 1


Description:
Home security can be improved with self-help measures like changing locks, securing windows, and
improving outdoor lighting.

A. True
B. False

Correct answer: True. Basic security enhancements can help protect you from crime and terrorism.
Narration:
Home security can be improved with self-help measures like changing locks, securing windows, and
improving outdoor lighting. True or false?

Lesson 7, Page 11: Residential Security Quiz 2


Description:
Internet acquaintances can pose a security threat and should be carefully monitored.

A. True
B. False

Correct answer: True. Internet acquaintances may gather information on your home and family that is
later used against you.
Narration:
True or false. Internet acquaintances can pose a security threat and should be carefully monitored.

40
Lesson 7, Page 12: Residential Security Quiz 3
Description:
What is NOT a physical security measure for your home?

A. Changing locks to ensure key control


B. Confirming that a cleaning company is reliable and licensed
C. Hiding a key outside to ensure family members can get in if they lose their keys
D. Monitoring Internet acquaintances of all family members
E. Having good relations with neighbors and looking out for each other

Correct answer: C, Hiding a key outside to ensure family members can get in if they lose their keys.
Narration:
What is NOT a physical security measure for your home?

Lesson 7: Page 13: Residential Security Summary


Description:
You are now able to explain residential security measures.

Click the Next Lesson tab at the top of the page to continue.
Narration:
You are now able to explain residential security measures, and how to make yourself and your family
safer at home. Click the Next Lesson tab at the top of the page to continue.

Lesson 8: Off-Duty Security


Lesson 8, Page 1: Off-Duty Security Introduction
Description:
Civilian sites in the US that have been targets of terrorism may be used by DOD personnel in off-duty
activities. For example:
 Infrastructure assets: Brooklyn Bridge, Penn Station, New York City train tunnels, Golden
Gate Bridge
 National landmarks and tourist sites: New York Stock Exchange, Sears Tower, Holocaust
Memorial Museum
 Recreation sites: University of Oklahoma football stadium, Atlanta Olympics, shopping
centers
 Religious sites: including both churches and synagogues

For more information, please see the London, Madrid, and Tokyo Subway Attacks, Bali Nightclub
Bombing, and Zona Rosa Historical Examples available in the RESOURCES section.
Narration:
Terrorists have targeted civilian infrastructure and assets within the United States. Compared to DOD
facilities, civilian sites are easier and more appealing targets.
While terrorist tactics against civilian targets have included both small-arms and IEDs, plots to use
even more sophisticated weapons, such as dirty bombs, have been discovered.

41
Civilian sites in the US that have been targets of terrorism may be used by DOD personnel in off-duty
activities. For example:
• Infrastructure assets: Brooklyn Bridge, Penn Station, New York City train tunnels, Golden Gate
Bridge
• National landmarks and tourist sites: New York Stock Exchange, Sears Tower, Holocaust Memorial
Museum
• Recreation sites: University of Oklahoma football stadium, Atlanta Olympics, shopping centers, and
• Religious sites: including both churches and synagogues
Outside the protection of your installation or residence, your vulnerability may increase. Personal
security should be considered in all off-duty activities.

Lesson 8, Page 2: Off-Duty Fundamentals


Description:
Several basic measures can enhance your personal security when visiting public sites:
• Travel in a small group
• Let someone else know where you're going
• Reduce exposure to crime by avoiding isolated, poorly lit areas and by concealing high value
personal property

Also, there may be heightened risk associated with:


• Religious sites and holidays
• Political events
• High-crime areas
• Venues with large crowds and poor security

Narration:
Several basic measures can enhance your personal security when visiting public sites:
• Travel in a small group
• Let someone else know where you're going, and
• Reduce exposure to crime by avoiding isolated, poorly lit areas and by concealing high value
personal property
Also, there may be heightened risk associated with:
• Religious sites and holidays
• Political events
• High-crime areas, or
• Venues with large crowds and poor security
Be alert to local threats identified by law enforcement agencies.
Also, consult State Department Travel Warnings before crossing the Mexican border for off-duty
activities.

Lesson 8, Page 3: Public Transportation


Description:
Protective measures:
 Select major hubs that might have been better security
 Do not wait in large groups

42
 Be vigilant to suspicious behavior of the other passengers
 Watch for unattended bags or items consistent with an IED threat
 Keep personal items secure
 Cooperate with law enforcement security measures

Guidelines for using taxis:


 Look for legitimate taxi company markings
 If a license is viewable, match the photo on the license to the driver

Narration:
Public transportation is often a preferred option for getting to off-duty activities. If used, consider
these protective measures.
If taxis are used, consider these guidelines:
• Look for legitimate taxi company markings
• If a license is viewable, match the photo on the license to the driver
Public transportation may be a significant target of interest to terrorists, but you can take steps to
reduce your vulnerability.

Lesson 8, Page 4: During Your Activity


Description:

While visiting public sites:


- Identify an exit
- Pre-designate a meeting location
- Watch for suspicious behavior
- Notice objects that might conceal IEDs
- Cooperate with security measures

In event of attack:
- Grenade attack – shrapnel rises; stay on floor with feet toward blast
- Small arms attack – ricocheting bullets hug the floor; crouch (don’t lie) on floor
Narration:
While visiting public sites, there are several actions you can take to reduce your risk. These include:
• Identify an exit route to be used in an emergency
• Pre-designate a location to meet if separated from your group
• Watch for suspicious behavior in others
• Notice objects that might conceal an improvised explosive device such as abandoned backpacks or
unusual items in trash receptacles
• Cooperate with security measures
In the event of an attack, remember:
• In a grenade attack shrapnel will rise from the point of detonation; being on the floor reduces
exposure and having feet toward the blast may protect the head
• In a small arms attack ricocheting bullets tend to hug the floor; crouching (not lying) on the floor
may reduce exposure
Enjoy your off-duty activities but remember there is a threat. If you observe any indications of a
threat, leave the area immediately and alert local authorities.

43
Lesson 8, Page 5: Off-Duty Situation 1
Description:
You are TDY to a major American city to attend a conference. One evening, you and a couple of
colleagues decide to visit a local museum. The best way to get to the museum is the subway. As you
enter the subway station, you remember that IEDs have been used to attack subways and buses in
the past and that you should take precautions. To maximize security, where should you stand on the
platform while waiting for your train? Select the correct response.

A. A non-crowded, but not isolated part of the platform.


B. The most congested area of the platform.
C. An isolated area of the platform.

Correct answer: A, A non-crowded, but not isolated part of the platform. Also, when getting on the
train, try to select a moderately populated train car.
Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 8, Page 6: Off-Duty Situation 2


Description:
As you arrive at the museum, you are discussing with your colleagues some recent attacks on public
sites. Specifically, you recall a small arms attack at the National Holocaust Museum in Washington,
DC, and small arms and grenade attacks in foreign hotels. Standing in line, you reflect on how you
would respond to an attack at the entrance to the museum. You know you should dive for cover, and
in an attack with firearms you should crouch on the floor but not lie directly on it since ricochets tend
to hug the ground. But what should you do in the event of an attack with grenades? Select the correct
response.

A. Dive for cover and run for the exit at first possible opportunity.
B. Dive behind something solid and lie flat on the floor.
C. Dive behind something solid and crouch on the floor.

Correct answer: B, Dive behind something solid and lie flat on the floor. Grenade shrapnel rises, so it
is good to lie flat on the floor with your feet toward the attacker(s) to protect your head.
Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 8, Page 7: Off-Duty Quiz 1


Description:
State Department Travel Warnings should be consulted prior to taking trips across the US-Mexican
border.

44
A. True
B. False

Correct answer: True. You should be aware of the risks and dangers along the US-Mexican border.
Narration:
True or false. State Department Travel Warnings should be consulted prior to taking trips across the
US-Mexican border.

Lesson 8, Page 8: Off-Duty Quiz 2


Description:
Terrorists usually avoid tourist locations since they are not DOD-related.

A. True
B. False

Correct answer: False. Tourist locations may be targeted due to their lighter security.
Narration:
True or false. Terrorists usually avoid tourist locations since they are not DOD-related.

Lesson 8, Page 9: Off-Duty Quiz 3


Description:
Which of the following have NOT been targeted or plotted against by terrorists or violent individuals?

A. Sporting events
B. Places of religious association
C. Public infrastructure
D. Political events
E. None of the above

Correct answer: E, None of the above. All of these have been targeted or plotted against by terrorists
or violent individuals.
Narration:
Which of the following have not been targeted or plotted against by terrorists or violent individuals?

Lesson 8 Page 10: Off Duty Security Summary


Description:
You are now able to describe off-duty security fundamentals.

Click the Next Lesson tab at the top of the page to continue.
Narration:

45
You are now able to describe off-duty security fundamentals. Use this information to stay safe on
your off-time.

Click the Next Lesson tab at the top of the page to continue.

Lesson 9: Air Travel


Lesson 9, Page 1: Air Travel Introduction
Description:
Consider the following tactics and examples since 2001:
- Midair explosion – December 2001 shoe-bomb plot on a trans-Atlantic flight
- Small arms attacks – 2002 attack against the El Al ticket counter in Los Angeles
- VBIED – 2007 attack against the Glasgow International Airport terminal
- Attacks against airport infrastructure – 2007 plot against John F. Kennedy airport
- Skyjacking – several incidents in Africa and the eastern Mediterranean

For more information, see the United Flight 93 and TWA Flight 847 Historical Examples available in
the RESOURCES section.
Narration:
The attacks of 11 September 2001 dramatically demonstrated the threat terrorism poses to air
travelers. Since then, the Transportation Security Administration has increased security at airports
around the country.
However, even with increased security, the threat remains. Consider the following tactics and
examples since 2001.
Some tactics against air travelers can be thwarted through vigilance. If you see suspicious behavior,
report it to airport security personnel immediately.

Lesson 9, Page 2: Reducing Your Exposure


Description:
Consider these tips to reduce your exposure:
 Do not wear clothing with DOD symbols or slogans (check with your organization about
guidelines)
 Do not include rank or organization information on luggage tags
 Use standard civilian luggage instead of military duffle bags
 Place any papers with DOD logos or other official documents in a sealed envelope
Narration:
Your command's policy may require you to travel in uniform. If not, it's generally wise to keep a low
profile and not disclose your DOD affiliation. Consider these tips to reduce your exposure.
Consider your seat selection. If you have a choice, a window seat reduces your exposure in a
skyjacking but also reduces your mobility.
By thinking through your air travel plans, you can reduce your risk.

Lesson 9, Page 3: Security at the Airport


Description:
While at the airport terminal, be vigilant for these items:

46
- Vehicles left unattended at the curbside check-in areas
- Individuals that appear nervous
- Any activity that is out of place in an airport environment
Narration:
Threats against air travelers occur primarily in two places: at the airport prior to passing security and
on the aircraft.
When you arrive at an airport, pass through security without delay since all passengers and baggage
are screened at that time. To avoid delays, ensure your travel documents are in order and use online
check-in options.
While at the airport terminal, be vigilant for these items.
Report suspicious activity to airport authorities immediately. It's best to go straight to your gate to
wait for your flight.

Lesson 9, Page 4: Airline Skyjackings


Description:
If your aircraft is skyjacked, you must choose carefully whether to cooperate or actively resist. In
making this decision, try to understand the skyjacker’s intent. For example:
 Any pilots in control? (May indicate desire to land)
 Have passengers/crew been absurd?(may indicate mindset)
 Are passengers singled out? (May indicate goal)
Narration:
11 September 2001 introduced a new tactic to airline skyjacking: use of aircraft as weapons of mass
destruction. However, skyjacking is still used to take hostages and not all skyjackers are intent on
suicide.
If your aircraft is skyjacked, you must choose carefully whether to cooperate or actively resist. In
making this decision, try to understand the skyjackers' intent. For example:
• Are pilots left in control of the aircraft? This may indicate a desire to land the plane safely
• Have passengers or crew been physically abused? This may indicate their mindset
• Are passengers singled out by nationality or religion? This may indicate something about their goal
More information about responding to a hostage incident is presented later in this lesson.

Lesson 9, Page 5: Air Travel – Situation 1


Description:
You have just finished attending a conference in a major US city and are going to the airport to return
home. At the airport your taxi stops at the curb close to the doors leading into the terminal. As you
get your bags out of the taxi you notice an unattended civilian-looking SUV. You know that VBIEDs
have been used to attack airports in the past and you should not ignore the situation. But what do
you do? Select the correct response.

A. Look in the windows and if you see something suspicious alert the nearest airport employee
or security officer.
B. Alert the nearest airport employee or security officer and move into the terminal for
additional protection.
C. Wait for a couple of minutes on the curb and, if the owner of the vehicle does not arrive, alert
the nearest airport employee or security officer.

47
Correct answer: B, Alert the nearest airport employee or security officer and move into the terminal
for additional protection.
Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 9, Page 6: Air Travel – Situation 2


Description:
When you arrive at your airline’s counter, you notice they have a check-in line specifically for your
flight. As you stand in line, the person behind you taps you on the shoulder and asks a favor. Since
you only have one bag to check and he has three, he asks if you can check one of his bags in your
name. He’ll pay you the $20 fee and this way he can save the cost of a much higher baggage
surcharge. What do you do? Select the correct response.

A. Politely say no and note the person’s description and any other unusual behavior.
B. Ask him to open his bag and show you the contents. If it looks OK, check it in under your
name.
C. Ask him what is in the bag. If it sounds OK, check it in your name.

Correct answer: A, Politely say no and note the person’s description and any other unusual behavior.
Then, alert airline ticket personnel when you arrive at the counter and give the man’s description to
security personnel after getting your ticket.
Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 9, Page 7: Air Travel Quiz 1


Description:
In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.

A. True
B. False

Correct answer: False. Your response to a skyjacking should be made based upon careful
consideration of specific circumstances.
Narration:
True or false. In the event of a skyjacking, you should immediately attempt to subdue the skyjackers.

Lesson 9, Page 8: Air Travel Quiz 2


Description:

48
The ticketing area is more secure than the area beyond the security check point.

A. True
B. False

Correct answer: False. To get past the security check point, all passengers and luggage must be
screened.
Narration:
True or false. The ticketing area is more secure than the area beyond the security check point.

Lesson 9, Page 9: Air Travel Quiz 3


Description:
Since September 11, 2001, which of the following attack methods has not been attempted against an
airport or airline?

A. Small-arms attack
B. VBIED
C. Explosive carried onboard by passenger
D. Chemical or biological attack
E. Skyjacking for the purpose of taking hostages

Correct answer: D, Chemical or biological attack.


Narration:
Since September 11, 2001, which of the following attack methods has not been attempted against an
airport or airline?

Lesson 9, Page 10: Air Travel Summary


Description:
You are now able to describe air travel security fundamentals.

Click the Next Lesson tab at the top of the page to continue.
Narration:
You are now able to describe air travel security fundamentals. Using this knowledge, you can be safer
when traveling by air.

Click the Next Lesson tab at the top of the page to continue.

Lesson 10: Ground Travel


Lesson 10, Page 1: Ground Travel Introduction
Description:
For more information, see the DC Sniper, LCDR Albert Schaufelberger, and CAPT George Tsantes
Historical Examples available in RESOURCES section.

49
Narration:
For many decades, DOD personnel have had to protect themselves against threats while traveling in
vehicles.
While most attacks have occurred overseas, domestic threats are real. For example, Ted Kaczynski,
the Unabomber, left disguised IEDs in parking lots he knew were used by his intended victims. In
2002, the DC Sniper fired from the trunk of a car mostly on people who were with their vehicles at the
time of attack.

Lesson 10, Page 2: Ground Travel Fundamentals


Description:
Security and safety measures:
 Prepare adequately
 Ensure your vehicle is well maintained
 Be vigilant
 Report suspicious behavior
Narration:
Even though ground travel threats within the United States are not common, there are a few
measures you can practice to enhance your security and safety:
• Prepare adequately. Keep maps of the local area, a cell phone, and a first aid kit in your car.
• Ensure your vehicle is well maintained. Keep your tires properly inflated and the gas tank at least
half full.
• Be vigilant. When getting out of your car, look around for suspicious activities and individuals.
• Report suspicious behavior. If you witness suspicious behavior or possible threats, alert security
personnel or local authorities immediately.

Lesson 10, Page 3: Inspecting Your Vehicle


Description:
Procedures for inspecting your own vehicle.

Visual exterior inspection: (without touching the vehicle) look for evidence of tampering on
undercarriage and wheel wells

Visual interior inspection: (without touching the vehicle) look through windows for anything
unusual

Complete interior inspection: Look under hood, in trunk, glove compartment , behind gas cap
cover, under seats, in interior console

Narration:
Vehicle security inspections are often performed at the entrance of military facilities. You can do your
own vehicle security inspection when you suspect your vehicle may have been tampered with.
This is a more common concern overseas, but it is something to consider when your car has been left
in an unsecure area. Also, keep these instructions in mind in case there is an increase in the local

50
threat.
A vehicle inspection consists of the following:
• Visual exterior inspection: Without touching the vehicle, look for any evidence of tampering on the
undercarriage and in the wheel wells
• Visual interior inspection: Without touching the vehicle, look through the windows for anything
unusual on the seats or floorboards
• Complete interior inspection: Look under the hood, in the trunk, in the glove compartment, behind
the gas cap cover, under the seats, in the interior console – anywhere something may be hidden
If you believe your vehicle has been tampered with or you see something suspicious, report it to the
proper authorities immediately.

Lesson 10, Page 4: Ground Travel Situation 1


Description:
You are going TDY to a conference in a major American city. While planning your trip, you select a
rental car that will not draw attention to you. You also select a car with power door locks and
windows to better control access to the car. You know that a locking gas cap can reduce the chance of
tampering. From a security perspective, what else should you consider? Select the correct response.

A. A GPS unit in case you get lost.


B. Air conditioning to allow you to keep windows closed securely in warm weather.
C. Air bags in case of an accident.

Correct answer: B, Air conditioning to allow you to keep windows closed securely in warm weather.
Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 10, Page 5: Ground Travel Situation 2


Description:
After spending the night at your hotel, you prepare to go to the facility hosting your conference. The
TV news reports major road construction on the route you plan to take and that significant delays are
expected. What is the best way to determine a new route? Select the correct response.

A. Use a current city map to plan a new route using major roads.
B. Use a GPS system to plan a new route using side streets.
C. Ask the hotel receptionist for the best route to the facility.

Correct answer: A, Use a current city map to plan a new route using major roads.
Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 10, Page 6: Ground Travel Situation 3

51
Description:
You arrive at the conference, which is in a commercial facility owned by a well-known defense
contractor. The parking lot is crowded, and you finally find an open space. As you turn in to park, you
see a small box in the middle of the parking space. You can see from a distance that the box appears
to be sealed and is probably not just a random piece of trash. You know you should find another
parking space and alert facility management of the possible threat. But what else should you do?
Select the correct response.

A. Without touching it, inspect the box’s exterior for oil stains, protruding wires, and other signs
the box may be an IED.
B. Ask other people in the area if they saw who left the box in the parking space.
C. Warn other bystanders of a possible threat.

Correct answer: C, Warn other bystanders of a possible threat.


Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 10, Page 7: Ground Travel Quiz 1


Description:
Keeping a well-maintained vehicle is considered “best practice from both a security and safety
perspective.

A. True
B. False

Correct answer: True. A well-maintained car can keep you from causing a traffic accident and breaking
down, as well as help you escape from a potential threat.
Narration:
Keeping a well-maintained vehicle is considered “best practice from both a security and safety
perspective. True or false?

Lesson 10, Page 8: Ground Travel Quiz 2


Description:
When possible, it is best to always travel with a cell phone.

A. True
B. False

Correct answer: True. A cell phone can be useful in many situations, including auto accidents or
responding to a potential threat.
Narration:
True or false. When possible, it is best to always travel with a cell phone.

52
Lesson 10, Page 9: Ground Travel Quiz 3
Description:
Which of the following is NOT a useful vehicle feature from a security perspective?

A. Power locks
B. Air bags
C. Power windows
D. Internal hood release lever
E. Lock on gas cap

Correct answer: B, Air bags.


Narration:
Which of the following is not a useful vehicle feature from a security perspective?

Lesson 10, Page 4: Ground Travel Summary


Description:
You are now able to describe ground travel security fundamentals.

Click the Next Lesson tab at the top of the page to continue.

Narration:
You are now able to describe ground travel security fundamentals. Use this knowledge to keep
yourself safer when traveling by ground.

Click the Next Lesson tab at the top of the page to continue.

Lesson 11: Hotel Security


Lesson 11, Page 1: Hotel Security Introduction
Description:
Hotel guests are targeted for theft, and thieves may use hotel room invasions to gain access to
valuables using these tactics:
 Following individuals or families from the lobby to their room and then way in when the door
is unlocked
 Disguising themselves as hotel security or room service and asking guests to open the door
 Attempts to force open hotel room doors without warning

For more information, see the Paradise Hotel, Mumbai, Serena Hotel, and Marriot Hotel attacks in the
Historical Examples section under RESOURCES.

53
Narration:
In recent years, terrorists have attacked international hotels using IEDs and small arms. While these
have not occurred in the United States, the 1993 World Trade Center bombing and the attack on the
Murrah Federal Building in Oklahoma City show that the threat of attacks on buildings is real.
Criminal activity in hotels is a current problem. Hotel guests are targeted for theft, and thieves may
use hotel room invasions to gain access to valuables using these tactics.
Some common sense precautions can enhance your security against the criminal threat while
lowering your risk to the terrorist threat.

Lesson 11, Page 2: Selecting a Hotel


Description:
Safety and security features:
 Location- non-violent/ low-crime area
 Common lobby
 Hotel security personnel
 Electronic key card
 Closed-circuit television

Narration:
Selecting a hotel is an important decision. Certain features can enhance your protection from a safety
and security perspective:
• Location in a non-violent and low-crime area
• A common lobby through which all persons entering the facility must pass
• Protection by hotel security personnel
• Electronic key card security to reduce vulnerability to crime
• Closed-circuit television monitoring in the lobby, elevators, and other common areas
It may be hard to find a hotel with all the security features you want. However, you can consider
these features when looking for hotels.

Lesson 11, Page 3: Selecting Your Hotel Room


Description:
 Between 3rd and 5th floors
 Not immediately next to fire escape/emergency exit
 No balcony

Narration:
Selecting a room can be important, though you may not have control of your room assignment.
However, if you have the choice, consider the following room preferences:
• Select a room between the 3rd and 5th floors – rooms on the 1st and 2nd floors are easily
accessible from the outside, and rooms above the 5th floor are difficult to reach by emergency
services
• Select a room not immediately adjacent to fire escapes or emergency exits – criminals may target
these rooms due to the ease of escape
• Select a room without a balcony – criminals may use balconies to enter rooms and to go from one

54
room to the next
It may be hard to find a room with all these characteristics. If you do not feel your room is safe, ask
for another room or consider going to another hotel.

Lesson 11, Page 4: Inspecting Your Hotel Room


Description:
 Functioning locks on doors and windows
 Scratches on door frame
 Location of emergency exits
 Solid doors
 Working telephone

When you leave your room:


 Leave radio or TV on
 Hang “Do not Disturb” sign on door

If you have concerns about your rooms security features, consider asking for a different room or
changing hotels

Narration:
Once in your room, inspect it from a security perspective. Consider these things:
• Functioning locks on all doors and windows (including doors to balcony or adjoining rooms)
• Scratches or marks on the door frame that might indicate a prior attempt to break-in
• Location of emergency exits and escape routes
• Solid doors to help withstand break-ins
• Working telephone
Be sure you know how to call the front desk and to dial out of the hotel for 911 in case of emergency.
Also, when you leave your room, give it the appearance of being occupied:
• Leave the radio or television on
• Hang the "Do Not Disturb" sign on the door
• Leave a light on in the area of the door
If you have concerns about your room's security features, consider asking for a different room or
changing hotels.

Lesson 11, Page 5: Hotel Security Situation 1


Description:
You are going TDY to a major American city. When selecting your hotel, you made sure it had solid
security measures including a 24-hour manned reception desk, a patrolling security guard, and a
common lobby that all persons entering the facility must pass through. As you check in, the
receptionist says you have a choice of rooms and asks if you have any preferences. You know to ask
for a room on the 3rd to 5th floors to reduce the chance of break-ins while remaining in reach of
emergency services. You also ask for a room that is not directly beside an emergency exit since

55
criminals may target rooms near an easy escape. What else should you ask for? Select the correct
response.

A. A room on the same floor as a gym or other common-use facilities so you will not be in an
isolated area.
B. A room with metal bars on the windows.
C. A room without a door to an adjoining room.

Correct answer: C, A room without a door to an adjoining room.


Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 11, Page 6: Hotel Security Situation 2


Description:
You check in and go to your room. You know that you should check the room for security against
unwanted entry, so you check locks on doors and windows. What else do you want to check? Select
the correct response.

A. A solid door with a peephole and a night latch to reduce the risk of room invasion.
B. Privacy blinds on the windows.
C. An operational smoke detector.

Correct answer: A, A solid door with a peephole and a night latch to reduce the risk of room invasion.
Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 11, Page 7: Hotel Security Situation 3


Description:
The conference ends for the day and you go out to dinner. After dinner you return to your hotel to
relax. After a while there is a knock at the door. You ask who it is without opening the door. The
person says he is from room service and is bringing complimentary desserts as a welcome to the
hotel. Through the peephole, you see a man in a hotel staff uniform holding a tray. What do you do?
Select the correct response.

A. Ask him to leave the tray outside the door and get it after he leaves.
B. Using the chain lock, open the door slightly to get a better view of the person.
C. Call the front desk to confirm the delivery.

Correct answer: C, Call the front desk to confirm the delivery.


Narration:
What would you do in this situation? Read the situation and select the correct response.

56
Lesson 11, Page 8: Hotel Security Quiz 1
Description:
True or False: Room invasions are a significant security issue for hotels located in CONUS.

A. True
B. False

Correct answer: True. The number of room invasions has been increasing in the United States.
Narration:
True or False: Room invasions are a significant security issue for hotels located in CONUS.

Lesson 11, Page 9: Hotel Security Quiz 2


Description:
True or False: From a security perspective, the best rooms are directly next to emergency exits.

A. True
B. False

Correct answer: False. Rooms located directly next to emergency exits are often targeted by criminals
due to the ease of escape.
Narration:
True or False: From a security perspective, the best rooms are directly next to emergency exits.

Lesson 11, Page 10: Hotel Security Quiz 3


Description:
Which one of these is not a physical security feature you should check when inspecting your hotel
room?

A. Lockbox or safe
B. Functioning locks on doors and windows
C. Whether or not the door is solid
D. Operational telephone
E. Proximity of room to emergency exits

Correct answer: A, Lockbox or safe.


Narration:
Which one of these is not a physical security feature you should check when inspecting your hotel
room?

57
Lesson 11, Page 11: Hotel Security Summary
Description:
You are now able to describe hotel security fundamentals. This knowledge can help keep you safer
when staying at hotels.

Click the Next Lesson tab at the top of the page to continue.
Narration:
Same as onscreen text.

Lesson 12: Hostage Survival


Lesson 12, Page 1: Hostage Survival Introduction
Description:

To prepare for this possibility, review “Isolated Personnel Guidance” (an annex to CJCS Guide 5260).

For more information, see the Japanese Ambassador’s Residence, Terry Anderson, and General Dozier
Historical Examples, available in the RESOURCES section.

Narration:
Hostage taking within CONUS is rare in comparison with some other parts of the world. However, it is
a threat.
Hostages may be taken to obtain political concessions, ransom, or publicity. In CONUS, hostage taking
is most commonly associated with another criminal act such as robbery. In many cases, hostage
situations are resolved through negotiation or rescue.
To prepare for this possibility, review "Isolated Personnel Guidance," an annex to CJCS Guide 5260,
available in the RESOURCES section.

Lesson 12, Page 2: Initial Response to Hostage Incident


Description:
 Control your fear and maintain your dignity; if you become excited, so will your captors
 Follow instructions of your captors
 Avoid sudden movements that your captors may view as hostile
Narration:
In the initial moments of a hostage taking, both the victim and captors are in a highly reactive mindset
and prone to spontaneous actions. On the one hand, an act to resist may be seen as a threat and met
with deadly force. On the other hand, the chaos of the situation may afford an opportunity to escape.
The decision to resist or comply is a personal choice you must make based upon your estimate of the
situation and chances of survival.
However, if taken hostage, focus on defusing the situation:
• Control your fear and maintain your dignity; if you become excited, so will your captors
• Follow instructions of your captors, and
• Avoid sudden movements that your captors may view as hostile

58
The initial moments and hours of a hostage situation can be the most dangerous. Your decisions can
increase your chance for survival.

Lesson 12, Page 3: Time in Captivity


Description:
Demeanor toward captors:
 Respond to captors with respect; maintain dignity
 Do not display emotion or ego
 Do not lie; if a lie is necessary, be simple and consistent

Maintain metal and physical health:


 Keep active; maintain daily routine
 Engage in conversation (avoid controversial topics)
 Eat food provided to you
 Exercise
 Get enough sleep
Narration:
A hostage situation associated with another criminal act is not likely to be lengthy. However, there
are instances of kidnappings within CONUS which have lasted months and years.
Your demeanor toward your captors may influence the treatment you receive:
• Respond to your captors with respect and maintain your dignity
• Try not to display emotion or ego, and
• Do not lie, but don’t volunteer information; if a lie is necessary, keep it simple and be consistent
Be prepared for a long captivity in poor conditions. It is important to maintain your mental and
physical health:
• Keep active and maintain a daily routine
• Engage guards in conversation, but avoid controversial topics
• Eat the food that is provided to you even if it is of poor quality
• Find ways to exercise, and
• Get enough sleep
Personal optimism, faith, self-discipline, and keeping your mind active are keys to enduring a difficult
situation.

Lesson 12, Page 4: Hostage Resolution


Description:
In the event of a rescue attempt, be sure to:
 Immediately drop to the floor or dive behind a piece of furniture for cover
 After taking cover, do not make any sudden moves – you may be mistaken for a captor
 Do not attempt to assist rescue personnel – your actions may be misinterpreted as a threat

59
 Cooperate with rescue personnel – hostages may be handcuffed and detained while
identification are confirmed
Narration:
If taken hostage, you have to decide if your best chance for survival is through remaining in captivity
or attempting an escape.
If you do not feel there is an immediate threat to your life, your best option may be to remain in place
and hope your release is negotiated or a rescue attempt made. In the event of a rescue attempt, be
sure to:
• Immediately drop to the floor or dive behind a piece of furniture for cover
• After taking cover, do not make any sudden moves – you may be mistaken for a captor
• Do not attempt to assist rescue personnel – your actions may be misinterpreted as a threat, and
• Cooperate with rescue personnel – hostages may be handcuffed and detained while identifications
are confirmed
If you feel there is an immediate threat to your life, you may consider an escape attempt. Your chance
for success is greatest when security is lighter, and you know your location and which way to go for
help.

Lesson 12, Page 5: Hostage Survival Situation 1


Description:
You are TDY to a major American city and spending the night in a hotel. Suddenly, you hear a crash at
the door and two armed men wearing hoods enter your room. Waving their guns, they shout for you
to get on the floor and be quiet. How do you respond? Select the correct response.

A. Do not resist, slowly crouch to the floor, and do not make any sudden movements that might
be considered threatening.
B. Attempt to seize a weapon from one of the assailants if one is close to you.
C. Dive for cover behind a solid piece of furniture and then run for the door.

Correct answer: A, Do not resist, slowly crouch to the floor, and do not make any sudden movements
that might be considered threatening.
Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 12, Page 6: Hostage Survival Situation 2


Description:
The men who broke into your room were attempting a robbery. Hearing the commotion, another
guest called the police. As the police arrived, the robbers barricaded the door with you still inside. The
police begin negotiations and you wisely do nothing to antagonize your captors. Then, without
warning, a rescue team comes crashing through the barricade. How do you respond? Select the
correct response.

A. Get down on the floor, remain still, and obey instructions from the rescue team.
B. Get down on the floor and shout repeatedly, “I am a hostage.”
C. Dash across the room where there is better cover.

Correct answer: A, Get down on the floor, remain still, and obey instructions from the rescue team.

60
Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 12, Page 7: Hostage Survival Quiz 1


Description:
Reasons for acquiring hostages include publicity, use as a bargaining chip while executing other
crimes, the forcing of political concessions, and ransom.

A. True
B. False

Correct answer: True. Hostages have been taken for all of these reasons.
Narration:
True or False. Reasons for acquiring hostages include publicity, use as a bargaining chip while
executing other crimes, the forcing of political concessions, and ransom.

Lesson 12, Page 8: Hostage Survival Quiz 2


Description:
The initial moments of a hostage taking incident can be extremely dangerous.

A. True
B. False

Correct answer: True. When captors are excited, they may respond with deadly force to movements
they consider threatening.
Narration:
True or False. The initial moments of a hostage taking incident can be extremely dangerous.

Lesson 12, Page 9: Hostage Survival Quiz 3


Description:
What should you not do during a hostage rescue attempt?

A. Remain still and low to the ground


B. Encourage others around you to remain calm
C. Try to assist hostage rescue team
D. Follow instructions of hostage rescue team
E. Expect to be handcuffed and detained by hostage rescue team

Correct answer: C, Try to assist hostage rescue team.

61
Narration:
What should you not do during a hostage rescue attempt?

Lesson 12, Page 10: Hostage Survival Summary


Description:
You can now explain the fundamentals of hostage survival.

Click the Next Lesson tab at the top of the page to continue.
Narration:
You can now explain the fundamentals of hostage survival, and can use this knowledge to increase
your chances in the event you find yourself in this situation.

Click the Next Lesson tab at the top of the page to continue.

Lesson 13: Responding to CBRNE Attacks


Lesson 13, Page 1: CBRNE Introduction
Description:
Images of chemical, biological, radiological, nuclear, and explosive items

Narration:
Chemical, biological, radiological, nuclear, and explosives (CBRNE) attacks are a proven threat to US
Government facilities within the United States.
In 2002, the US Postal Service was used to deliver anthrax-laden letters to multiple targets, including
the offices of prominent legislators in Washington, DC. In 1995, Timothy McVeigh detonated a
massive, vehicle-borne improvised explosive device in front of the Murrah Federal Building in
Oklahoma City killing 168 persons.
A chemical attack has not yet occurred on US soil, but the 1995 Sarin nerve gas attack in the Tokyo
subway demonstrates the threat.
Also, a nuclear or radiological attack has not yet occurred. But terrorist organizations are seeking new
attack methods. The proliferation of nuclear materials that could be used as a weapon of terror
greatly concerns US officials.

Lesson 13, Page 2: Responding to CBRNE Attacks


Description:
Protect yourself:
 Cover your body, especially your nose and mouth
 Wash any exposed part of your body with soap and water
 Seek medical attention as soon as possible

62
 Obey local authorities and first responders
 If you believe a chemical attack is underway, move upwind into a well-ventilated area

Biological attack:
 Avoid infected areas
 Watch for signs of illness

Radiological/nuclear attack:
 Consider sheltering in place
 Tightly close doors and windows

For more information, see the US Anthrax and the Tokyo Subway Attacks in Historical Examples
available in the RESOURCES section.
Narration:
The nature of a chemical, biological, radiological, or nuclear attack may be hard to determine.
Chemical agents may be colorless, odorless, and difficult to identify. And, the effects of biological
agents may take days or weeks to appear. Symptoms may resemble common ailments and may not
be properly diagnosed.
Regardless of the type of incident, you can do several things to help protect yourself.
If you suspect a biological attack, avoid infected areas and watch for signs of illness in yourself and
others.
In case of a radiological or nuclear attack, consider sheltering in place and tightly close doors and
windows.

Lesson 13, Page 3: Responding to IEDs


Description: What you should do when you suspect an IED.

Suspicious objects and packaging:


 Unattended items that could conceal a bomb (suitcase, briefcase, flower planter, trash can,
parked cars)
 Items with unusual batteries , wires, cables, and strings

Also look for suspicious behavior; such as:


 People dressed in unseasonably warm clothing or behaving nervously
 People leaving a suspicious object prior to leaving an area

For more information, see the Oklahoma City Bombing in Historical Examples available in the
RESOURCES section.

Narration:
Everyone should be aware of the IED threat, even in areas without a history of terror attacks. Be
especially alert when the local threat increases. Terrorists target symbolic sites, military personnel
and equipment, innocent civilians, and first responders.
IEDs can be disguised as everyday objects. Be aware of suspicious objects or behavior.
If you suspect an IED, clear everyone from the area and contact police or facility security immediately.

63
Lesson 13, Page 4: Suspicious Letters and Packages
Description: Potential Indicators:
 No return address or unknown place of origin
 Restrictive markings such as “personal” or “private”
 Excessive tape or tape used to cover creases
 Misspelled words
 Unknown powder , oily stains, strange odor
 Foreign /excessive postage
 Addressed only to a person’s title or uses an incorrect title
 Protruding wires or package is lopsided and uneven

If you receive a suspicious package:


 Stop handling it – do not open, smell, or taste it
 Warn others and isolate the area
 Notify authorities and your sponsor
 Wash your hands with soap and water, and take a shower
 Put your clothing in a sealed plastic bag and give it to authorities

For more information see the US Anthrax Attacks Historical Example available in the RESOURCES
section.

Narration:
Mail and packages can contain a CBRNE threat. In the 2001 anthrax attacks, cross-contamination
occurred in the postal system, infecting unintended victims.
Here are potential indicators that a letter or package may contain a dangerous substance or may be
tainted.

Lesson 13, Page 5: CBRNE Situation 1


Description:
You have been waiting for a package to come in the mail at work and one day it finally arrives. You are
just about to open it when you notice a shipping envelope stuck to the back of your package. The
amount of tape on the envelope seems odd and some of it has peeled off and become stuck to your
package. This is a little suspicious and you decide to look for other indicators of a threat. What do you
do? Select the correct response.

A. Shake the envelope and listen for any loose materials.


B. Open the envelope to examine the contents.
C. Check for errors in the mailing address and return address.

Correct answer: C, Check for errors in the mailing address and return address. Also, look for oily stains
and discoloration.
Narration:
What would you do in this situation? Read the situation and select the correct response.

64
Lesson 13, Page 6: CBRNE Situation 2
Description:
After examining the envelope, you determine that it might be a threat. You know that you should
stop handling the letter and wash your hands with soap and water. What else do you do? Select the
correct response.

A. Get everyone out of the area and contact emergency personnel.


B. Tell other members of your organization to stay away from your desk where the envelope is.
C. Ask other members of your organization to come and watch over you until emergency
services arrive in case you start to show symptoms.

Correct answer: A, Get everyone out of the area and contact emergency personnel.
Narration:
What would you do in this situation? Read the situation and select the correct response.

Lesson 13, Page 7: CBRNE Quiz 1


Description:
Early symptoms of a biological attack may appear the same as common illnesses.

A. True
B. False

Correct answer: True. Among other things, symptoms of a biological attack can include fever and
diarrhea.
Narration:
Early symptoms of a biological attack may appear the same as common illnesses. True or false?

Lesson 13, Page 8: CBRNE Quiz 2


Description:
IEDs may come in many forms and may be camouflaged to blend in to the surrounding environment.

A. True
B. False

Correct answer: True. IEDs have been disguised as backpacks, packages, and other items.
Narration:
IEDs may come in many forms and may be camouflaged to blend in to the surrounding environment.
True or false?

65
Lesson 13, Page 9: CBRNE Quiz 3
Description:
Which one of these is a possible indicator of a suspicious letter or package?

A. Correct amount of postage


B. A return address that matches the postmark
C. Evenly distributed and well balanced parcel
D. Misspellings of common words
E. Mailing address providing a complete and correct name

Correct answer: D, Misspellings of common words


Narration:
Which one of these is a possible indicator of a suspicious letter or package?

Lesson 13, Page 10: CBRNE Summary


Description:
You can now explain how to respond to potential CBRNE attacks.

Click the Next Lesson tab at the top of the page to continue.
Narration:
You can now explain how to respond to potential CBRNE attacks. You can use this information to
mitigate your risk in the event of such an attack.

Click the Next Lesson tab at the top of the page to continue.

Antiterrorism Scenario Training – Course Summary


Summary, Page 1: Antiterrorism Scenario Training – Lesson Summary
Description:

 Surveillance detection
 Security at a Government facility
 Residential security
 Security during off-duty/free time activities
 Air Travel security
 Hotel security
 Hostage survival
 Chemical, biological, radiological, nuclear, and high-yield explosives

66
Narration:
The AT scenario training lesson you've just completed is intended to minimize the risk of terrorism to
you, your family, and your unit. The lesson reviewed important information on these AT topics.
Select NEXT to continue to the course summary.

Summary, Page 2: Course Summary


Description:

Joint staff Antiterrorism( AT ) Force Protection Level I Awareness Training


 Introduction to Antiterrorism Training
 Antiterrorism Scenario Training

Click the Next Lesson tab at the top of the page to continue to the course Post Test.
Narration:
You have completed the content portion of the Joint Staff Antiterrorism (AT) Force Protection Level I
Awareness training. The two lessons in this course:
• Introduction to AT, and
• AT Scenario Training
Have increased your awareness of terrorism and approved your ability to apply personal protective
measures.
Click the Next Lesson tab at the top of the page to continue to the course Post Test.

This represents the end of the content portion of the course. If you took this course with a screen reader
because of a visual impairment, please contact the JKO Help Desk by email (jkohelpdesk@jten.mil) or
phone (COMM: 757-203-5654 DSN: 668-5654) and give them the name of the course. Let them know
you have completed the content and need to be advanced to the Post Test so that you can complete the
course and receive credit.

We hope that this text-only script has been more user-friendly and would appreciate any feedback so
that we can continue to be progressive in the way JKO offers its content.

Note: If you do not have a visual impairment, please take the course as it is originally intended. We are
offering this method to benefit those in need. When submitting a request for advancement in the
course, you are acknowledging you are doing so as a student with no other means of taking this material
and not acting in any way that violates academic integrity.

67

You might also like