LESSON 3 MIDTERMS Flashcards
Of course there is a need to make events/hotel accessible as possible and to
ensure there is a welcoming atmosphere within event arenas and not to intend to
create a?
“fortress mentality
Appropriate protective security measures should be applied to reduce the risk to as low as reasonably practicable
Step 1: Identify the Threats
Step 2: Protecting and Identifying Vulnerabilities
Step 3: Identify Measures to Reduce Risk
Step 4: Review Security Measures and Rehearse and Review Security
Contingency Plans
designed to give a broad indication of the likelihood of
terrorist attack. They are based on the assessment of a range of factors including
current intelligence
Terrorism threat levels
An attack is expected
Critical
An attack is highly likely
Imminently Severe
An attack is possible but not likely
Moderate
An attack is unlikely
Low
There are three levels of response which broadly equate to threat levels
Critical Exceptional
Severe substantial to heightened
Moderate low to normal
maximum protective security measures to meet specific
threats and to minimize vulnerability and risk
Critical Exceptional
dditional and sustainable protective security
measures reflecting the broad nature of the threat combined with specific
business and geographical vulnerabilities and judgements on acceptable risk
Severe substantial to heightened
routine baseline protective security measures,
appropriate to the event and location
Moderate low to normal
designed to cause alarm and
disruption. This threat may be communicated via a third-party, i.e. a person or organization
unrelated to the intended victim and identified only to pass the message.
Bomb threat
is a very effective method of delivering an explosive
device to a specific location.
Suicide bomb attacks
may use a lorry, plane or other kind of vehicle as a bomb or may
carry or conceal explosives on their persons
Suicide bombers
are one of the most
effective weapons in the terrorist’s arsenal. They are capable of delivering a large
quantity of explosives to a target and can cause a great deal of damage.
Vehicle-borne improvised explosive devices (VBIEDs)
Terrorist use of firearms has become frequent, and it is important to consider this
method of attack and be prepared to cope with such an incident.
Firearm attacks
in police terminology an active shooter, will attempt to kill
and injure as many people as possible within a short period of time
The typical attacker
Staff protocols for a firearms/ weapons incident are the followin
Run
Hide
Tell
Report
travel
Due to the dynamic nature of active shooter incidents, highly trained and equipped police tactical group operators may be able to respond to a scene in a
timely manner. T OR F
FALSE
may offer the best protection against
ballistics, bomb blast, flying glass and other fragments
Protected spaces
This offers an attractive route into premises for terrorists.
Suspicious Deliveries
attack would depend heavily on the success of the chosen
method and the weather conditions at the time of the attack.
CBR attack
At present, there are no CBR detectors capable of identifying all hazards reliably. T OR F
TRUE