Terrorism Flashcards Preview

CBP_Air &Marine Basic Training > Terrorism > Flashcards

Flashcards in Terrorism Deck (14):
1

Domestic Terrorism

-acts dangerous to human life that are a violation of criminal laws of USA or State.
-to intimidate civilian population
-to influence gov. Policy
-to affect gov. By destruction
-Occur within the territorial U.S.

2

International Terrorism

-violent acts or acts dangerous to human life that are a violation of criminal laws of USA or State.
-to intimidate civilian population
-to influence gov. Policy
-to affect gov. By destruction
-Occur within the territorial U.S.

*Occur primarily outside the territorial jurisdiction of the U.S.

3

22 USC 2656f (d) (2)

Terrorism

“The term terrorism means premeditated, politically motivated violence perpetrated against noncombatant targets by sub-national groups or clandestine agents.”

4

EPO# 1: Outline or
“National Security Strategy”

-Defeat Terrorism Worldwide
-Strengthen our Biological and Nuclear Security
-Improve intelligence
-Secure our digital and communications Infrastructure
-Promote our physical and Social Infrastructure
-Promote and Secure our borders
-Ensure a strong Incident Management

5

Title 18 U.S.C ss 2339B

-the Title a person can be fined under.

“Providing Material Support or Resources to Designated Foreign Terrorist Organizations”
-15years to life imprisonment
-Offender must be a National
-Knowingly contributes by means of, money, sharing bank accounts, sharing records.

6

List the means by which a LEO or agent can jeopardize their agency and themselves by using social networking sites.

-Personal information shared of social media profile page.
-Geotags on pictures
-Location-based Social networking/“checking in”
-

7

Solutions and Safety Steps for Social Media

-do not use GPS functions (photos/checking in)
-do not share personal or work I formation
-use unique passwords for log-on
-set privacy and security options high
-update security software
-be cognizant of foreign apps, links, downloads, attachments .
- identify terrorism -related databases

8

EPO#5: Identify the the terrorist attacking cycle and how targets are chosen.

1. Project Initiation
2. Targets are Assessed &Selected
3. In-Depth Surveillance
4. Planning and Rehearsal
5. Plan Verification
6. Execution and Exploitation

9

What are the 3 Phases to Radicalization ?

1. Radicalization: Individual comes to believe violence will achieve social and political change is necessary and justified.

2. Mobilization : Acquire Training , resources , plan.

3. Action

10

Define “Sovereign Citizen”

Sovereign citizens believe they are subject only to “the common law” . They claim that they have absolute mastery over all their property and they have freedom from taxes, regulations, ordinances, zoning restrictions.

11

Social networking is used by terrorist for?

recruiting,propaganda, and radicalizing .

12

What is “Geotagging”?

Process of adding geographical identification to photographs, videos, websites, and SMS messages. Coordinates are automatically embedded in pictures taken with smartphones.

13

EPO#2: identify the elements within the four failures revealed by the 9/11 commission report.

EPO # 6: define the term countering Violent Extremism and identify the methods that terrorist groups utilize to recruit potential operatives.

14

EPO # 6: define the term countering Violent Extremism and identify the methods that terrorist groups utilize to recruit potential operatives.

1. Understand Violent Extremism: who are the players? What targets are weak? What is the motive?

2. Support Local Communities: integrate community based programs, strengthen relationships with potentially weak individuals who may be targets for radicalization.

3. Support local Law enforcement: strong LE forces can deter and combat recruitment or individual mobilization.