Exam 3 Terrorism Flashcards Preview

From Flashcardlet > Exam 3 Terrorism > Flashcards

Flashcards in Exam 3 Terrorism Deck (17):
0

EPO 1 ID the Elements of Material Support and Resources Provided to Designated Foreign Terrorist Organizations (FTO) Which Violate the Provisions of 18 USC 2339B

Supporting FTO-
*KNOWINGLY provides material support or resources to a FTO
Exception is- allowed to provide medicine or religious materials
Knowledge that the organization is a terrorist organization or person is actively engaged with organization
Money is interchangeable-
*Clean money vs dirty money
FTO List is designated by SECRETARY OF STATE (SOS)
Valid for 2 years then reviewed again by SOS and renewable

1

EPO 2 Means a way LEO can jeopardize their agency and themselves by using Social Networking Sites

Facebook-
Geotagging-turn off
GPS- turn off

2

Epo 3 Identify the elements of material support and resources provided to designated foreign terrorist organization which violate the provisions of Title 18 USC 2339B

knowing provide material support or resources to FTO, or attempt or conspire to do so, shall be fined under or imprisoned not more than 15 yrs or both, and if death of any person results, shall be imprisoned for any term of years or for life.
-must have knowlege its and FTO, and terrorist activity

3

EPO 4 List the means by which a LEO or agent can jeopardize their agency and themselves by using social networking sites

-by giving away sensitive info
-giving our your name, DOB, address, telephone number, material status, employment, family members, etc
-Geotagging allow people to track where the picture was taken
-keep sensitive, work related info off SNS

4

Epo 5 ID the Terrorist Attack Cycle and How Targets are Chosen

1. Project Initiation-(intelligence cell activated & sent verification pos targets selected )
2.Target Assessment & Selection multiple targets are assessed for time and place of attack
3. In-Depth Surveillance (most risky)
4. Planning & Rehearsal (tactical cell selected & attack rehearsed)
5. Plan Verification-(target eval for changes and activity)
6. Execution and Exploitation (plan is carried out)

Large Gatherings of People
Transportation (Buses&Trains)
Post Offices

5

EPO 6 Define the term Countering Violent Extremism (CVE) and Id the methods which Terrorist Groups Utilize to Recruit Potential Operatives

3 Stages of Radicalization
1. Radizcalization- believe their actions are necessary and justified
2. Mobilization (Active Support)
*Readiness to Act
*Targets
*Opportunity
*Capability
*Personal Experience
3. Action
*Ready to carry out attack

Recruiting
Use of Internet
Prisons

6

EPO 7 Identify Methods of Collection, Reporting, and Information Sharing Utilizing the SAR Initiative

Difference between Surveillance and Information Gathering (Elicitation) is talking. If someone asks you something they are eliciting

information Category 1
Have an arrest warrant
information Category 2
May be a detainer available from DHS for this individual
information Category 3
Do not advise, get any info you can,

8

DomesticTerrorism

18 USC 2331
Coerce civilian population
Influence GOVT
Through mass destruction, assassination or kidnapping
Within the jurisdiction of the U.S.

9

International Terrorism

Primarily outside the territorial jurisdiction of the United States

10

Terrorist Group

Group size is irrelevant
Share same ideology and goals

11

NTAS (National Terrorism Advisory System)

Two tiers
*Elevated
*Imminent (impending)
Difference is credibility
Release to stakeholders first the public
Limited Duration

Comprised of
*Tear Line (declassified summary)
*Protective measures
*Affected Areas
*Disseminate to Public (maybe)
*Sunset

12

18 USC 2339A
Providing Material SUpport to Terrorists
(Supporting ThingsTerrorist Do)

Not as powerful as 2339B
Must prove that the person provided the support or resources, KNOWING or INTENDING it was used in carrying out a number of Federal Terrorist-Type Crimes

Support things Terrorists do

13

Review

Secretary of State-Designated FTOs
2339B- D knowingly
update every 2 years
Geotagging-location of pictures
Terrorist use Social Networking-Recruit, id patterns, find where you live
Protecting Sensitive Info on Social Networking-dont put on
Command Element deploy Intel Cells-Project Initiation
Planned Verification-In depth surveillance, select target, go back and plan
Riskiest Phase-In-depth surveillance
Tactical Cell selected-Planning and Rehearsal
Info used to pick time/location-Target assessment and selection
Inhibitors according to radicalization-family support
Radicalization/mobilization/action

14

8 Signs of Terrorism Activity

Surveillance
Information Gathering (Elicitation)
Testing Security
Funding
Planning/Acquiring Supplies
Suspicious Behavior (Time, Area, Place)
Rehearsal/Dry Runs
Getting into position

Cameras
Diagrams
annotating on maps
night vision

14

Intelligence vs Information

Information-What you believe to be true but may not be proven.

Intelligence- What you or someone has observed

Credible Intel

15

who designates a FTO

how often is the FTO list updated

Secretary of State

Every two years

16

FTO use social networks

recruit
find out your location and family members,
spread propaganda

Decks in From Flashcardlet Class (78):