Question
1. List the steps commonly taken to vet a bomb threat. 2. Describe the steps that should be taken when an unattended item is discovered;
1. List the steps commonly taken to vet a bomb threat.
2. Describe the steps that should be taken when an unattended item is discovered; when an unattended item escalates to suspicious; when a suspicious item escalates to a possible I.E.D.
3. List the types of attacks that can occur from the perimeter of an airport.
4. List four methods for protecting critical infrastructure.
5. How was the "underwear bomber" (Abdulmutallab) stopped from bombing a Northwest Airlines flight?
6. List the various kinds of theft that occur at an airport.
7. List strategies that are available for preventing baggage theft.
8. List indicators of human trafficking.
9. List the advantages of local law enforcement in the detection and interception of terrorist attacks and criminal activities.
10. Describe the various types of passengers: business, vacationer, and emergency.
11. List steps that police officers with a general aviation airport in their patrol area should take.
12. List lessons learned from the use of Red Teams in aviation security.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started