Chapter 4 Flashcards
Protecting the Homeland
Definition of terrorism, per the FBI
unlawful use of force against person or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.
Explain why domestic, “lone wolf” extremists are of particular concern today
They are individuals who appear ordinary but are driven to hateful attacks based on a particular set of beliefs without a larger group’s knowledge or support. Recent attacks, such as the San Bernardino act of 2015- husband and wife homegrown jihadists who executed the most deadly terrorist attack in the US since 9/11, and attempted acts internationally and in the homeland warrant increased security, as well as public vigilance and awareness.
Describe how a person becomes radicalized, using as an example of the Zachary Chesser case study
He converted to Islam and quickly became radicalized, solely on the internet. He used his computer and graphic skills to contribute to and promote violent extremist messages.
Review the kinds of activities cybercriminals engage in- and China’s suspected role in cyberterrorism
- Attacks against computer hardware and software.
- Financial crimes and corruption
- Abuse, in the form of grooming or “sexploitation”, especially crimes against children.
China’s role: cyber espionage- responsible for the theft of 50-80% of all American intellectually property and have compromised many of the nation’s most sensitive advanced weapon systems, including missile defense technology and combat aircraft.
Explain why those who would use bioterrorism to attack the United States have thus far been largely unsuccessful
Dissemination is difficult for all but speciality trained individuals to make in large quantities and in the correct dosage; they are also difficult to transport because live organisms are delicate.
Delinate law enforcement’s four means of addressing terrorism
- Gathering naw intelligence on the organization’s structure, its members. and its plans (or potential for the use of violence)
- Determining what measures can be taken to counter or thwart terrorist activities.
- Assessing how the damage caused by terrorists can be minimized through rapid response and containment of the damage
- Apprehending and convicting individual terrorists and dismantling their organization.
What are some specific efforts employed by the Department of Homeland Security, FBI, and Joint Terrorism Task Forces to combat terrorism?
Department of Homeland Security:
1. National Terrorism Advisory System
2.Nationwide Suspicious Activity Reporting Initiative
3. Homeland Security Information Network (HSIN)
4. Grant funding
5. Screening for Airline Passengers
6. Secure Flight Program
FBI: nations lead federal law enforcement agency for investigating and preventing acts of terrorism. Also responsible for violence at airports, money laundering, attacks on US officials, and others.
FBI oversees the Joint Terrorism Task Forces (JTTFs), National Counter terrorism Center, and Fusion centers.
Joint Terrorism Task Forces: small cells of highly trained, locally based, investigators, analysts, linguist, and SWAT experts, who chase down leads, gather evidence, make arrests, provide security for special events, conduct training, collect and share intelligence, and respond to threats and incidents at a moment’s notice.
What are fusion centers?
serve as focal points within the state and local environment for the receipt, analysis, gathering, and sharing of threat related information between the federal government and state, local, tribal, and other agencies. Located in states and major urban areas throughout the country, fusion centers conduct analysis and facilitate information sharing while assisting law enforcement and homeland security partners in preventing, protecting against, and responding to crime and terrorism
Describe the roles that are played by the USA PATRIOT Act, Military Commissions Act, and Posse Comitatus Act of 1878 in combating terrorism
USA PATRIOT Act: a number of new investigative measures were provided to federal law enforcement agencies by this Act shortly after the 9/11 attacks.
1. Expanded the federal government’s ability to investigate Americans without establishing probable cause for “intelligence purposes” and to conduct searches if there are “reasonable grounds to believe” there may be national security threats.
2. Given access to financial, mental health, medical, library, and other records.
When reauthorized in 2006, it provided additional provisions.
Tools for protecting mass transportation systems and seaports from attack:
1. “Roving wiretap”: government to get a wiretap on every phone a suspect uses
2. “Sneak and peek”: allows federal investigators access to library, business, and medical records without a court order
In 2015- they expanded the act but amended the mass phone data collection program
Military Commissions Act: allows the president to establish military commissions to try unlawful enemy combatants; the commission’s are also authorized to sentence defendants to death, and defendants are prevented from invoking the Geneva Conventions as a source of rights during commission proceedings. The law contains a provision stropping detainees of the right to file habeas corpus petitions in federal court and also allows hearsay evidence to be admitted during proceedings. Also allows the CIA to continue its program for questioning key terrors leaders and operatives.
Posse Comitatus Act of 1878: prohibits using military to execute the laws domestically, the military may be called on to provide personnel and equipment for certain special support activities, such as domestic terrorist events including weapons of mass destruction.
Bush created the National Incident Management System (NIMS): consistent nationwide approach for federal, state, and local governments to work effectively together to prepare for, prevent, response to, and recover from domestic incidents.
Explain the roles that are played by each of the following in combatting terrorism:
Drones
Local Police
Community policing
Social media
Drones: seeking out and surveilling persons who are planning or involved in terroristic activities.
Local police: all public safety first responders need to be vigilant in identifying the signs of terrorism in today’s post 9/11 society.
Community policing: providing programs that engage the community and raise their awareness of potential indicators of radicalization to violence and the different ways they can contact authorities to report such situations, the community can contribute to enhancing safety and violent extremists will have a more difficult time blending in with the population
Social media: agencies can post questions and encourage comments as a way to solicit tops and feedback and engage in dialogue with community members.
True or false:
Currently, all terrorist attacks in the United Sates and abroad involve well organized groups.
False
True or false:
To be considered an act of terrorism, a weapon of mass destruction must have been employed.
False
True or false:
Unquestionabily, the US constitution supports our government’s use of drones to strike its citizens, both here and abroad, who fit the profile of a terrorist.
False
True or false:
Because of the strong and necessary federal involvement for combating terrorism, community policing has a small role to play in homeland security.
False