Terrorism Flashcards

(58 cards)

1
Q

Are the basic for extremists and terrorist

Terminology As It Relates to Terrorism

Terrorism

A

BELIEFS;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An individual is an extremist when they have radical beliefs or agree with actions or ideologies for a violent extremist group.

Protected under First Amendment - freedom of speech, while not be in legal jeopardy until they actively plan to carry out an act of violence or pushing someone else of their belief

Beliefs and actions of individuals who support efforts to achieve radical ideological, religious or political views along a range of issues, including race, religion, politics, gender and the environment.

Terminology As It Relates to Terrorism

Terrorism

A

EXTREMISM;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Individuals following an ideology independently or through an organization

Radicalization is the process by which individuals come to believe

Terminology As It Relates to Terrorism

Terrorism

A

EXTREMISTS AND EXTREMIST GROUPS;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A movement consists of individuals working together to advance their shared political, social, or artistic ideas

Terminology As It Relates to Terrorism

Terrorism

A

EXTREMIST MOVEMENTS;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

U.S. based individuals or groups of people working together in support of their ideology, whether organized or not in the U.S. without any influence or direction of any foreign interests or FTO

Terminology As It Relates to Terrorism

Terrorism

A

DOMESTIC EXTREMIST MOVEMENTS (AND GROUPS);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Individuals mobilized to plan, support, and conduct violet illegal behavior in furtherance of their extremist ideology

Mobilization Is the process through which radicalized individuals undergo preparatory type activities such as individual or group training, capability building and developing and improving individual competencies to take or direct support violet acts

Terminology As It Relates to Terrorism

Terrorism

A

VIOLENT EXTREMISTS;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Also known as a Domestic Terrorist

Not until they are actively planning to commit acts or violence in support of their extremist ideologies

Is not a separate offense in the federal criminal code

Terminology As It Relates to Terrorism

Terrorism

A

DOMESTIC VIOLET EXTREMIST (DVE);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A person of any citizenship who lives or operates primarily in the United States or its territories, who: advocates, engages in, or is preparing to engage in or support terrorist activities in furtherance of a foreign terrorist organization objectives

Terminology As It Relates to Terrorism

Terrorism

A

HOMEGROWN VIOLENT EXTREMIST (HVE);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A group of two or more individuals based in a foreign country, whether organized or not, which engages in, or has a subgroup, which engages in terrorist activity

Terminology As It Relates to Terrorism

Terrorism

A

FOREIGN TERRORIST ORGANIZATION (FTO);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Believer
-Domestic Extremist - Radicalized - Homegrown Extremist
Extremist
-Domestic (Violent) Extremist - Mobilized - Homegrown (Violent) Extremist
-Domestic Terrorist - Violent Extremist - International Terrorist

Terminology As It Relates to Terrorism

Terrorism

A

HOW WE IDENTIFY A TERRORIST;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An activity that involves a violent act or an act dangerous to human life, property, or infrastructure

a. to intimidate civilian population
b. influence the policy or a government by intimidation
c. mass destruction, assassination, kidnapping, or hostage-taking

Terminology As It Relates to Terrorism

Terrorism

A

TERRORISM;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unlawful use, or threatened use, or force or violence by a group based and operating entirely within the United States without foreign direction committed against persons or property to intimidate

Terminology As It Relates to Terrorism

Terrorism

A

DOMESTIC TERRORISM;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Primarily outside the territorial jurisdiction of the United States or transcend national boundaries

Terminology As It Relates to Terrorism

Terrorism

A

INTERNATIONAL TERRORISM;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Military personnel/facilities
Diplomatic offices
Religious figures/institutions
Intermodal - airports, subways, buses, etc.
Critical infrastructure
Educational institutions
Government offices
Private citizens and property
Police
Sporting/entertainment venues

Threat of Terrorism and Violent Extremism

Terrorism

A

POTENTIAL TARGETS OF TERRORISM;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Incendiary
Explosives
Firearms
WMD
Vehicles
UAS

Threat of Terrorism and Violent Extremism

Terrorism

A

POTENTIAL WEAPONS OF VIOLENT EXTREMISTS AND TERRORISTS;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Monitored by U.S. Department of State (DOS), Bureau of Counterterrorism

Threat of Terrorism and Violent Extremism

Terrorism

A

THE POTENTIAL TREATS: FOREIGN TERRORIST ORGANIZATIONS LIST;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describes the potentially unlawful use of threat of fore or violence, in furtherance of political and/or social agendas with no connection or affiliation with any foreign terrorist organizations

Threat of Terrorism and Violent Extremism

Terrorism

A

THE POTENTIAL THREATS; DOMESTIC EXTREMIST MOVEMENTS;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • Sovereign Citizen Extremism - the legitimacy of US citizenship should be rejected
  • Militia - government deliberately is stripping Americans of their freedoms and is attempting to establish a totalitarian regime
  • Anti-government extremism - Belief that their liberties are being taken away by the perceived unconstitutional or otherwise illegitimate actions of government officials or law enforcement
  • Anarchist extremist - All forms of capitalism and corporate globalization should be opposed and that governing institutions are unnecessary and harmful to society
  • Racially or Ethnically Motivated Violent Extremism - White supremacy, black separatist, animal/environmental rights, eco-terrorism, abortion related

Threat of Terrorism and Violent Extremism

Terrorism

A

ANTI-GOVERNMENT/ANTI-AUTHORITY VIOLENT EXTREMISM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hierarchical Structure, Networked Structure, Hierarchy-Network Hybrid Structure

Structure, Financing, and Operations of Terrorist Organizations

Terrorism

A

TERRORIST ORGANIZATIONS HAVE USED ONE OF THREE MODELS;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Well-defined vertical chain of command, control, and responsibility

Structure, Financing, and Operations of Terrorist Organizations

Terrorism

A

HIERARCHICAL STRUCTURE;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Chain - smuggle goods and people or launder money
Hub or Star and Wheel - financial or economic network
All Channel - lack an identifiable “head”

Structure, Financing, and Operations of Terrorist Organizations

Terrorism

A

NETWORKED STRUCTURE;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Combination of two structure models
Membership and Function - Leaders/Cadres
Active Supporters
Passive Supporters

Structure, Financing, and Operations of Terrorist Organizations

Terrorism

A

HIERARCHY-NETWORK HYBRID STRUCTURE;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Funding Sources - criminal activity - drug trafficking, cybercrimes, coupon fraud, cigarette tax scams, charitable organizations, offshore entities and companies, funds transfers and payments

Alternate methods - gift cards, cryptocurrency, eBay/PayPal, fundmenow

Structure, Financing, and Operations of Terrorist Organizations

Terrorism

A

FINANCING;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Simple to the complex attack plan

Structure, Financing, and Operations of Terrorist Organizations

Terrorism

25
Consists of three primary phases: decision, planning, and execution Structure, Financing, and Operations of Terrorist Organizations Terrorism
THE NATIONAL COUNTERTERRORISM CENTER (NCTC) TERRORIST ATTACK MODEL;
26
May not be observable in every situation Grievance - cultivated over time Ideation - decision specific to utility of violence Structure, Financing, and Operations of Terrorist Organizations Terrorism
DECISION PHASES;
27
Research and Target Selection - when, how, and where to attack, determine target and tactics Acquisition - acquiring technical capabilities, logistics, or any resources Surveillance - physical or virtual reconnaissance of potential, familiar, or actual targets, employing counter surveillance or operational security as a defense tactic Rehearsal - actual or virtual simulation of the attack Structure, Financing, and Operations of Terrorist Organizations Terrorism
PLANNING PHASE;
28
Attack - ideology, or politically, motivated act of violence, pre-planned or opportunistic Escape and Exploitation - involves claiming, disseminating a perceived justification for committing the attack Structure, Financing, and Operations of Terrorist Organizations Terrorism
EXECUTION PHASE;
29
Process by which an individual changes a belief system to advocate, facilitate, or use violence to effect societal or political change Radicalization Process Terrorism
VIOLENT RADICALIZATION;
30
Personal Factors - personal needs (sense of power/potency or sense of belonging), history (development and life history event), situational context Group Factors - such as family and peers, sense of belong and press to act, online environment Community Factors - marginalization, lack of trust in societal institutions, religious discrimination, online communities Sociopolitical Factors - collective grievances, opposition to foreign and domestic policies, and world events Ideological Factors - framework to interpret, values, beliefs, and goals, support for, or participation in, violence Radicalization Process Terrorism
FACTORS DRIVING RADICALIZATION;
31
Internet - propaganda Social Network - physical and virtual connections, training/indoctrination Radicalization Process Terrorism
CATALYSTS TO MOBILIZATION;
32
Community engagement and credible voices Radicalization Process Terrorism
INHIBITORS OF MOBILIZATION;
33
The speech and beliefs are protected until an illegal act is committed Readiness to Act: motivation and intent Opportunity - training and resources Capability - education, experience, competencies Targets - familiar locations Online Mobilization - provided financial or logistic means Incite Violence - encourage others, through social media channels/products, photo shopped imagery Inhibitors may cause this process to back away from violence, modify plans, demobilized Radicalization Process Terrorism
MOBILIZATION PROCESS;
34
Principal forum for the discussion of national security and foreign policy matters Chairman: President of the United States How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
NATIONAL SECURITY COUNCIL (NSC);
35
United States confronts within and beyond our borders and use all elements of national power to combat terrorism, targeting terrorist networks, disrupting and denying mobilize, finances, travel, communication, and inspiration of new followers How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
NATIONAL STRATEGY FOR COUNTERTERRORISM;
36
17 Agencies Collects and produces both foreign and domestic intelligence through reporting and analysis, U.S. military planning ODNI, CIA, DIA, FBI, NGA, NRO, NSA, DOE, DHS, DOS, DOT, DEA, USAF, USA, USCG, USMC, USN How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
U.S. INTELLIGENCE COMMUNITY (IC);
37
Homeland Threat Task Force interagency collaboration, informs weekly updates An important component is Joint Counterterrorism Assessment Team (JCAT) How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
NATIONAL COUNTERTERRORISM CENTER (NCTC);
38
Improves SHARING AND ENHANCE public safety for NCTC Designed to improve information sharing among state, local, tribal, and territorial jurisdictions How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
MISSION OF THE JCAT;
39
Designation, the re-validation, or the removal to or from the FTO list How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
U.S SECRETARY OF STATE;
40
Lead for prosecution of terrorist acts or threats in the United States How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
U.S. ATTORNEY GENERAL;
41
Responsible for the efforts of the DHS to defeat terrorism and secure the U.S. homeland How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
SECRETARY OF HOMELAND SECURITY;
42
Leads criminal investigations, coordinates the LE community, provides leadership and criminal justice services How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
DIRECTOR OF THE FBI;
43
Mission - to detect, deter, and defeat terrorism, fulfills its CT responsibility through the Joint Terrorism Task Force (JTTF), which detect, investigate, and disrupt terrorist Other missions include - WMD, NCIC, LEEP How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
MISSION OF THE FBI;
44
Prevent terrorism and enhance security, secure and manage U.S. borders, enforce and administer U.S. immigration laws, to STRENGTHEN cyberspace, critical infrastructure, national preparedness and resilience to disasters How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
MISSION OF DHS;
45
First line of defense along with CBP Transportation Security Operations Center (TSOC) - coordination of security incidents/operations for TSA National Targeting Center (NTC) - passenger data, previous border crossing information, travel reservations, visa applications, passenger manifests Air Marine Operations Center (AMOC) How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
DHS COMPONENT AGENCIES;
46
Compatible processes, policies, and standards that foster the broader sharing of suspicious activity reports Capability for SLTT and FLEO to share timely, relevant SAR information Share information about terrorism related suspicious activities Provides support to joint intelligence fusion centers How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
THE NATIONWIDE SAR INITIATIVE (NSI);
47
24/7 Operation, multi-agency organization, under the blended leadership of the FBI, DHS, TSA, ODNI, and the NCTC Protects our national security through the collaborative effort of the law enforcement, homeland security, and intelligence communities Operates and manage the TSA "NO FLY" list and the "Selectee" List Populate Terrorist Identities DataMart Environment (TIDE) How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
TERRORIST SCREENING CENTER (TSC);
48
Possible Arrest. A federal arrest warrant may exist, possible ties to terrorism Approach with caution, call TSC immediately How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
HANDLING CODE 1;
49
Possible Immigration Violator. A DHS detainer, possibles ties to terrorism Approach with caution, call TSC immediately How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
HANDLING CODE 2;
50
Gather information, possible tie to terrorism Do not extend the scope/duration of encounter Approach with caution, call TSC after encounter How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
HANDLING CODE 3
51
Gather information, possible national security interest Do not extend the scope/duration of encounter Call TSC after encounter How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
HANDLING CODE 4;
52
Gather information, possible ties to Transnational Organized Crime (TOC) Do not extend the scope/duration of encounter Approach with caution, call TSC after encounter How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism Terrorism
HANDLING CODE 5;
53
To protect officers and the public Officers to make informed decision Impact on Officer Safety LEO Responsibilities to Detect, Deter, and Defeat Terrorism Terrorism
TERRORIST SCREENING CENTER (TSC) HANDLING CODE PROGRAM;
54
"T" (terrorist) Response to the NCIC quirky on the individual watchlisted LEO Responsibilities to Detect, Deter, and Defeat Terrorism Terrorism
TSC MESSAGE DETAILS;
55
Observable actions of past known behaviors and characteristics, collectively suggest that a person may be committing, may be preparing to commit, or has committed an unlawful act Identified by SAR Indicators provide awareness - radicalizing individual, mobilizing individual, violent extremist activities, terrorist attack preparations Important facts - each related incident or indicator may occur hours, days, weeks, or months apart and may be inter-related or independent of another LEO Responsibilities to Detect, Deter, and Defeat Terrorism Terrorism
RECOGNIZED INDICATORS;
56
Department or agency's JTTF reps and or National JTTF reps Local JTTF office Local, state, or regional intelligence fusion center LEO Responsibilities to Detect, Deter, and Defeat Terrorism Terrorism
REPORT EVERY INDICATOR, INCIDENT OR FRAGMENT OF INFORMATION TO;
57
Communication Spoken - unusual goodbyes, desires to travel to fight Communication Recruiting - mobilizing others, violent extremist narratives Communication Written - seeking religious or political justification, participating in online sites Communication Videos - Martyrdom video/statement Financial - funds, transactions, LE observations Research - direct/indirect collection, elicitation, discussing or developing tactics, inquiring about jobs that have sensitive access, conducting research on target, ways to evade LE Surveillance - stationary, on foot, aerial Test Security - driving past or penetrating perimeter Logistics - acquiring, purchasing, and shipping equipment Preparation - rehearsals or dry runs, testing explosives, unusual training Travel - unusual one way tickets, false excuses LEO Responsibilities to Detect, Deter, and Defeat Terrorism Terrorism
INDICATOR CATEGORIES;
58
Environment, time, place, body language (nervous, hesitant, indecisive, attempts to conceal their features Clothing, interaction with others, reactions to a uniform presence LEO Responsibilities to Detect, Deter, and Defeat Terrorism Terrorism
SUSPICIOUS BEHAVIOR; INDICATOR;