Terrorism Flashcards Preview

CITP Test 3 > Terrorism > Flashcards

Flashcards in Terrorism Deck (52):
1

What are the three elements of material support and resources provided to designated foreign terrorist organizations which violate the provisions of Title 18 USC 2339B?

1. Must have knowledge the organization is a designated terrorist organization;
2. That the organization has engaged or engages in terrorist activity; or
3. That the organization has engaged or engages in terrorism

2

Title 18 USC 2339A requires what?

Mens Rea (which makes it harder to prove)

3

What's the key rule about money?

All money is fungible (interchangeable)

4

What are some of the Material Support or Resources people provide to terrorists?

* Currency or monetary instruments or financial securities
* financial services
* lodging
* training
* expert advice or assistance
* safe-houses
* false documentation or identification
* communications equipment
* facilities
* weapons
* lethal substances
* explosives
* personnel
* transportation
* other physical assets

5

What is not considered as providing material support or resources to terrorists?

Providing medicine or religious materials

6

Who designates Foreign Terrorist Organizations?

The Secretary of State, in consultation with the Attorney General and the Secretary of the Treasury

7

What does FTO stand for?

Foreign Terrorist Organization

8

How long are FTO designations valid for?

Two years, and they're renewable

9

What are some of the ways LEOs can jeopardize themselves using social media/networks?

* Personal information provided during registration for apps/websites
* Geotags - allows your location to be tracked by information in photos, videos, etc.
* Location-based Social Networking - reveals your current location
* Hotspots - ensure the use of HTTPS and the lock icon
* Unknown third party apps
* Family and Friend's posts
* Anti-virus software
* Sensitive, work-related information on social networking sites

10

List the Terrorist Attack Cycle

Project Initiation
Target Assessment & Selection
In-Depth Surveillance
Planning & Rehearsal
Plan Verification
Execution and Exploitation

11

In what phase of the Terrorist Attack Cycle does the Leadership (command element) initiates the operation?

Project Initiation

12

In what phase of the Terrorist Attack Cycle are possible targets discussed?

Project Initiation

13

In what phase of the Terrorist Attack Cycle are Intelligence Cells are activated or sent to the area?

Project Initiation

14

In what phase of the Terrorist Attack Cycle are Multiple targets are assessed?

Target Assessment & Selection

15

In what phase of the Terrorist Attack Cycle are targets evaluated for likelihood of success?

Target Assessment & Selection

16

In what phase of the Terrorist Attack Cycle are operations conducted to discern target's daily patterns and activities?

Target Assessment & Selection

17

In what phase of the Terrorist Attack Cycle is Information gathered that will be used to determine time and place for actual attack?

Target Assessment & Selection

18

In what phase of the Terrorist Attack Cycle is the target's value assessed?

Target Assessment & Selection

19

In what phase of the Terrorist Attack Cycle is the target list refined?

Target Assessment & Selection

20

In what phase of the Terrorist Attack Cycle are the defensive measures of the target evaluated?

In-Depth Surveillance

21

What is the riskiest phase of the Terrorist Attack Cycle for terrorists?

In-Depth Surveillance

22

What is the only phase of the Terrorist Attack Cycle requiring the terrorists to expose themselves?

In-Depth Surveillance

23

In what phase of the Terrorist Attack Cycle will terrorist groups use untrained or less experienced personnel initially?

In-Depth Surveillance

24

In what phase of the Terrorist Attack Cycle is your best opportunity to send terrorists elsewhere?

In-Depth Surveillance

25

In what phase of the Terrorist Attack Cycle do terrorists decide on their target of choice?

In-Depth Surveillance

26

In what phase of the Terrorist Attack Cycle are plans and tactics selected?

Planning & Rehearsal

27

In what phase of the Terrorist Attack Cycle are plans refined and the attack rehearsed?

Planning & Rehearsal

28

In what phase of the Terrorist Attack Cycle is the tactical cell selected?

Planning & Rehearsal

29

In what phase of the Terrorist Attack Cycle is the plan rehearsed and refined?

Planning & Rehearsal

30

In what phase of the Terrorist Attack Cycle does the intelligence cell resume its surveillance?

Plan Verification

31

In what phase of the Terrorist Attack Cycle does the surveillance become more professional in nature?

Plan Verification

32

In what phase of the Terrorist Attack Cycle is it no longer necessary to maintain constant surveillance on the target?

Plan Verification

33

In what phase of the Terrorist Attack Cycle do terrorists evaluate the target for changes in activity or increased defensive countermeasures?

Plan Verification

34

In what phase of the Terrorist Attack Cycle, if the plan is not feasible, does the operation return to the target assessment and selection phase?

Plan Verification

35

In what phase of the Terrorist Attack Cycle do terrorists have "key" members of the cell exfiltrate?

Execution and Exploitation

36

In what phase of the Terrorist Attack Cycle is the attack plan carried out?

Execution and Exploitation

37

In what phase of the Terrorist Attack Cycle does the leadership exploits the incident?

Execution and Exploitation

38

What are the three stages of Radicalization?

1) Radicalization
2) Mobilization
3) Action

39

What are the 5 factors of the Radicalization stage?

1. Personal
2. Community
3. Group
4. Sociopolitical
5. Ideological

40

What are the 4 factors of the Mobilization stage?

1. Readiness to act
2. Targets
3. Opportunity
4. Capability

41

In what stage of Radicalization is the person ready to carry out the attack?

The Action stage

42

What are some catalysts to Radicalization?

Social Media
Encouragement from friends and family

43

What are some inhibitors to Radicalization?

Strong family support
Community outreach
Positive family engagement

44

The terrorist watch list is run by who?

The FBI

45

The no fly list is run by who?

DHS

46

How many different government agencies cooperate to man the Terrorist Screening Center?

12

47

What is the difference between Information and Intelligence?

Information is raw, unevaluated material. Intelligence is information that has been process through the analysis phase.

48

What are the three points of Handling Code 1?

1. Approach with caution
2. The individual is the subject of an arrest warrant
3. Prone out the individual

49

What are the three points of Handling Code 2?

1. Approach with caution
2. There ma be a detainer available from DHS for this individual
3. Detain the individual

50

What are the three points of Handling Code 3?

1. Contact the TSC, unless it would extend the stop, then contact the TSC after
2. If there is no charge, get the individual's information, then let them go
3. If there is a charge, lock them up

51

What are the 8 Signs of Terrorism?

1. Surveillance
2. Information Gathering (Elicitation)
3. Testing security
4. Funding - suspicious transactions
5. Planning/Acquiring Supplies
6. Suspicious Behavior
7. Rehearsal/Dry Runs
8. Getting into Position/Deploying Assets

52

Of the 8 Signs of Terrorism, what Sign is your last chance to alert the authorities?

Getting into Position/Deploying Assets