CTS Study Flashcards

1
Q

What are the six mission areas of the LVMPD CTS?

A

1 International Terrorism
2 Domestic Terrorism
3 Active Shooter/Mass Casualty Threats
4 Targeted Violence Against Government Officials
5 Cyber Attacks against Government Entities
6 Espionage Activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Intelligence Collection as defined in CTS Section Manual?

A

The strategic, proactive, and lawful collection of useful information, usually from a confidential human source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are International Terrorism Investigations as defined in the CTS Section Manual?

A

Federal investigations that have a nexus to an international terrorist group or ideology. This would include Homegrown Violent Extremists, who are inspired by or connected to a foreign terrorist actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Domestic Terrorism Investigations as defined in the CTS Section Manual?

A

Federal investigations that have a nexus to a domestic terrorist group or ideology. This would include Homegrown Violent Extremists who are inspired by or connected to a foreign terrorist actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Criminal CTS Investigations as defined in the CTS Section Manual?

A

Local investigations regarding the threat of an active shooter or of violence against government officials, which do not meet the JTTF threshold for terrorism charges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Threat Management as defined in the CTS Section Manual?

A

The lawful Monitoring and evaluation of a subjects’s activity based on a reported threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SAR Vetting as defined in the CTS Section Manual?

A

The initial evaluation of SNCTC suspicious activity reports to determine whether the activity is suspicious or not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Guardian Follow-up as defined in the CTS Section Manual?

A

The secondary evaluation of the suspicious activity reports that have been routed to the FBI as suspicious and related to terrorism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Community Outreach as defined in the CTS Section Manual?

A

The overt development of community-based relationships with our diaspora populations for the purpose of preventing terrorism through trust and public cooperation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Counterterrorism Training as defined in the CTS Section Manual?

A

The development and coordination of counterterrorism training for the department and partner agencies, to include LVMPD recruits, FLO’s, and SNCTC members.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is CTS Dignitary Liaison as defined in the CTS Section Manual?

A

The coordination of dignitary security for US Secret Service and/or the US State Department.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the National Operation Center Watch?

A

The monitoring of intelligence and major events at the DC-based NOC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Fusion Liaison?

A

The coordination of information exchange between SNCTC personnel and the Southern Nevada FLO network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Inerpol Liaison

A

The coordination of investigative follow-up between SNCTC and Interpol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 5 Squads within the LVMPD CTS?

A
1 Threat Management Unit
2 Source Development Unit
3 JTTF International Terrorism Unit
4 JTTF Domestic Terrorism Unit
5 Fusion Liaison Officer Unit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the TMU’s primary responsibility?

A

The maintaining of a threat watch program which allows the department to track and evaluate the persons who pose the greatest danger to our community.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the primary responsibility of the SDU?

A

Identifying, recruiting and developing human sources for the purpose of preventing organized crime and terrorism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the primary responsibility of the JTTF IT Unit?

A

Investigating terrorism related SARS that appear to have a foreign nexus, conducting long-term terrorism investigations that have a foreign nexus, and recruiting JTTF-related human sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the primary responsibility of the JTTF DT Unit?

A

Investigating terrorism related SARS that appear to have a domestic nexus, conducting long-term terrorism investigations that have a domestic nexus, and recruiting JTTF-related human sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the primary responsibility of the FLO Unit?

A

The FLO unit revolves around the principals of building communities of trust and increasing terrorism awareness within the department and across our community.

21
Q

What are the four categories under which a SAR can be evaluated?

A

1 No Nexus
2 Criminal
3 Inconclusive
4 Terrorism-Related

22
Q

What are the 7 signs of terrorism?

A
SITA SDD
Surveillance
Information Gathering
Tests of Security
Acquiring Supplies
Suspicious Persons/Items
Dry Run/Trial Run
Deploying Assets
23
Q

Which unit has the primary responsibility to vet SARs?

A

The Threat Management Unit

24
Q

What is the Criminal Intelligence Enterprise?

A

CIE is a national initiative designed to identify, prioritize, and catalog the criminal and terrorist threat groups that present the greatest concern to each major city and county.

25
Q

Discuss Surveillance

A

Someone recording or monitoring activities. this may include the use of cameras (either still or video), note taking, drawing diagrams, annotation on maps, or using binoculars or other vision enhancing devices.

26
Q

Discuss Information Gathering

A

People or organizations attempting to gain information about military operations, law enforcement, other emergency responder, critical infrastructure, or large gatherings of people.

27
Q

Discuss Tests of Security

A

Any attempt to measure reaction times to security breaches, or to penetrate physical security barriers or procedures in order to assess strengths or weaknesses.

28
Q

Discuss Acquiring Supplies

A

Purchasing or stealing explosives, weapons, ammunition, atc. Also includes acquiring uniforms, passes, or badges (or equipment to manufacture such items) or any other controlled items.

29
Q

Discuss Suspcious Persons / Items

A

People or items that don’t seem to belong in the workplace, neighborhood, business establishment, or anywhere else.

30
Q

Discuss Dry Run / Trial Run

A

Putting people into position and moving them around according to their plan without actually committing the terrorist act. this is especially true when planning a kidnapping, but can also pertain to bombings. An element of this activity could also include mapping out routes and determining the timing of traffic lights and flow.

31
Q

Discuss Deploying Assets

A

People and supplies getting into position to commit the act. This is a person’s last chance to alert authorities before the terrorist act occurs.

32
Q

What are the six steps that constitute the intelligence cycle?

A
1 Planning and Direction
2 Collection
3 Processing and Exploitation
4 Analysis and Production
5 Dissemination
6 Evaluation
33
Q

What step in the intelligence cycle establishes the intelligence requirements of the consumer?

A

Planning and Direction. The first step of the intelligence cycle.

34
Q

What step in the intelligence cycle results in gathering raw data?

A

Collection. The second step in the intelligence cycle.

35
Q

What step in the intelligence cycle results in the conversion of raw data into comprehensible form?

A

Processing and Exploitation. The third step in the intelligence cycle.

36
Q

In what stage of the intelligence cycle integrates, evaluates, and analyzes information for a finished product?

A

Analysis and Production. The fourth step in the intelligence cycle.

37
Q

Delivery of finished product to an intel consumer is what step of the intelligence cycle?

A

Dissemination. The fifth step.

38
Q

What step of the intelligence cycle is concerned with continual feedback and constant refining?

A

Evaluation. The sixth and final step in the intelligence cycle.

39
Q

What is International Terrorism as defined by the FBI?

A

Activities following three characteristics:
Involve illegal violence/destruction
Intend to influence or instill fear
Occur primarily outside US

40
Q

What is Domestic Terrorism as defined by the FBI?

A

Activities following three characteristics:
Involve illegal violence/destruction
Intend to influence or instill fear
Occur primarily inside the US

41
Q

According to the 2014 CIE Threat Assessment what are the Top 5 OC Threat Groups

A

S L L H Lcn

Sinaloa
La Familia Michoacana
Los Zetas
Hells Angels
La Cosa Nostra
42
Q

According to the 2014 CIE Threat Assessment what are the Top 5 Terrorist Threat Groups

A

H A (AL) S G

Hezzbollah
Al Qaeda
Al Shabaab
Sovereign Citizens
Government of Iran*
43
Q

According to the 2014 CIE Threat Assessment what are the Top 5 Violent Street Gangs Threat Groups

A

D R60 GPK W Kumi

Donna Street Crips
Rolling 60's Crips
Gerson Park Kingsmen
Wood
Kumi 415
44
Q

What are the four elements of Minimum Substantive Derogatory Information?

A

DCPP

Due Weight
Credible Reporting
Particularized Derogatory Information
Potential Behavioral Indicators

45
Q

Discuss “Due Weight”

A

The reality of the reasonable inferences which can be made in light of the totality of the circumstances. Used in determining if Reasonable Suspicion exists.

46
Q

Discuss “Credible Reporting”

A

The assessment of the credibility of the source weighed against the manner in which reported and the information’s specificity.

47
Q

Discuss “Particularized Derogatory Information”

A

Descriptive and specific information related to activities or events contained in a threat and totality that amounts to more than a label.

48
Q

Discuss “Potential Behavioral Indicators”

A

Indicators of behavior or mindset known to an investigator which are known to be associated with persons who have committed acts of violence in the past.

49
Q

Who are the members of the Threat Management Program Committee?

A
CTS LT
TMU SGT
ANSEC Director
CTAG Manager
FLO Sergeant