answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sauron [17]
1 year ago
7

What is not a terrorist method of surveillance? (antiterrorism scenario training, page 3)?

Social Studies
2 answers:
omeli [17]1 year ago
7 0

Breaking to steal valuables.

Further Explanation:

Counter-terrorism is also called anti terrorism that includes practice, techniques and strategies that government and military used to combat and prevent terrorism. The government use their power to neutralize the terrorists and its organization, networks. The render them incapable to coerce the government and instil fear which is the basic terrorist's goal. In the United States they used the armed forces to suppress the insurgency and use the term for internal defence. According to the anti terrorism Scenario training, the best rooms need not be directly next to the emergency exits. We need to understand the threats by the terrorist and also lower the vulnerability. There need to recognize the responses to the threat actions. We need to be alert of the threat, aware of our surroundings.  

All citizens must report the suspicious activity to the police. We need to be aware of the terrorist target. Avoid the target areas. Some of the target areas are bus stops, clubs, hotels. Some of the protection measures are ID checks, vehicle inspection, patrols,. We need to be a team player and do planning ahead and thus keep our profile low.  

There need to be a random vehicle checking and increase the crime prevention efforts, identify the potential terrorist. People should participate in the awareness training programs of the government. We need to understand the basic security measures. Surveillance, test of security and deploying assets are some of the measures which can be adopted.

Learn More:

1. violence has declined in northern ireland because terrorist <u>brainly.com/question/8976775 </u>

2. what the south african government is doing to promote equal access to basic services <u>brainly.com/question/1641583 </u>

<u> </u>

Answer Details:

Grade: High School

Subject: Social Science

Keywords:

Vulnerability, suspicious activity, terrorist target, target areas, ID checks, vehicle inspection, patrols, basic security measures.

spin [16.1K]1 year ago
6 0

Breaking and entering to steal valuables are not a terrorist method of surveillances. Moreover, there are four terrorist methods of surveillance.

EXPLANATION:  

Terrorists conduct surveillance to collect information about a target that can be utilized to make detailed attack plans. Criminals can conduct surveillance to decide the time and place to commit theft. In both cases, the monitoring target can be an individual, a facility, or an asset.

Surveillance may be done over a long period of time and use various methods:

Stationary surveillance: a general method in which operatives detect from a fixed location.  

• Operatives try to merge in by doing normal tasks

• Operatives may search for recruit help personnel with access to residences or installations

Moving surveillance: controlled on foot or in vehicles, commonly in teams.  

• Vehicle surveillance may involve one or more vehicles

• Commonly, utilizes two or more people, one person driving while the others observing

Operatives may not often be behindhand you; once your customs are learned, they may be visible in front of you.  Altering your routes and customs can dislocate surveillance efforts.

Supplementary surveillance methods include:

Technical surveillance: utilizes electronic means to gain or record access to safety information.

• May utilize still and video cameras such as cell phones

• May obtain access to safety information on the internet

Casual questioning: utilized to provoke safety information from available personnel.  

• Operatives may present themselves as friendly and non-threatening

• Terrorists may utilize unknowing operatives who do not comprehend the intention of the information they are asked to collect

• Operatives may utilize the opposite sex members to collect access to facilities and gather information

Awareness of terrorist surveillance methods can support you see and react to surveillance.  

LEARN MORE:  

If you’re interested in learning more about this topic, we recommend you to also take a look at the following questions:

• Which best defines counterterrorism? brainly.com/question/10069503

• One way that entities can cooperate with counterterrorism policies is by? brainly.com/question/2624686

KEYWORDS : terrorist method of surveillance, antiterrorism, counterterrorism

Subject  : Social Studies

Class  : 10-12

Sub-Chapter : Antiterrorism Scenario Training

You might be interested in
If old mountains wear down over the course of millions of years, what is one of the primary reasons that mountains still exist?
Marat540 [252]

The correct answer is: C) New mountains are created through tectonic and volcanic activity.

There are three ways in which mountains are formed, therefore there are three different types of mountains: volcanic, fold and block mountains.

It is important to say that these always involve plate tectonics, were huge "compressional forces, isostatic uplift and igneous (magma) matter, forces surface rock upward". In this way a landform higer than the surroundings is created, that is to say: a mountain.

There is no way a mountain is created by one of the other options given.

8 0
2 years ago
Choose all that apply. What are some inventions or ideas that helped to advance trade? flat-bottomed boats carts driven by anima
Ivahew [28]

The answers to your question are,

A. Flat bottomed boats;

B. Carts driven by animals;

D. Seagoing vessels.

-Mabel <3

4 0
2 years ago
Read 2 more answers
How do the following main points for a speech about the achievements of Ida Wells-Barnett violate the guidelines presented in yo
mariarad [96]

The main points should have been arranged in causal order and the main points don't divide the topic consistently.

Option: A and C

Explanation:

Main points for a speech about the achievements of Ida Wells-Barnett violate the guidelines presented in your textbook for organizing main points. Proper guidelines should be maintained and for that all the points should have been arranged in causal order and the main points don't divide the topic consistently.

According to the time of event or time occurrence achievement list would be prepared and point wise division should not split the consistency of the topic. If it is then the relevance would get disturbed.

7 0
1 year ago
Dr. Sorkin thinks that most psychological disorders are caused by stressful social situations, rather than disturbances within t
GuDViN [60]

The correct answer is psychoanalysts

Explanation: Stress in light of psychoanalytic theory, a good way would be to think about the concept of Anguish, a central theme constantly studied by psychoanalysts from Sigmund Freud to current thinkers.

5 0
2 years ago
Mr. Sun goes to bed because I do."" This 3-year-old's statement shows signs of: centering. artificialism. seriation. egocentrism
nikitadnepr [17]

Answer:

Cent-ration

Explanation:

Cent-ration is the tendency in which a child-focused only one aspect of the situation rather see another aspect of the situation. The child does not develop abstract reasoning at that time. Children think only in one way but when they start to think another perspective as well they start to decent er the situation. Children start to think about another perspective of the situation.  

Thus here in the above context, Mr. Sun goes to bed because I do is the example of cent-ration in Piaget's developmental stage. It occurs in the pre-operational stage.

7 0
2 years ago
Other questions:
  • All of the following are delegated powers EXCEPT :
    6·2 answers
  • According to schwartz, erwin, weafer, and briney, "__________" are the real techies who create and install security solutions.
    14·1 answer
  • If someone is predisposed to a disease, they are more likely to contract the disease due to __________. A. lifestyle choices B.
    8·2 answers
  • Samia has decided that with the two hours in between classes she can do one of 3 things. She has ranked her choices, from highes
    13·1 answer
  • Ruben and Maya are describing their recent trip to Brazil. They describe all the interesting things they did while they were the
    14·1 answer
  • Even though Mary was not thinking about the events surrounding the day when she graduated from high school, she can easily bring
    10·1 answer
  • If you believe that subjective emotional states are determined by the labels and mental thoughts you attach to your internal fee
    6·1 answer
  • A psychology professor wants to know whether verbal ability is related to memory quality in current first-year students at her s
    15·1 answer
  • Responsibility for an accident is rarely defined clearly and is often difficult to trace to one or two people or causes. In this
    7·1 answer
  • You are the coordinator of a nonprofit that distributes donated items to three local homeless shelters and want to figure out a
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!