Terrorism Flashcards

1
Q

Are the basic for extremists and terrorist

Terminology As It Relates to Terrorism

Terrorism

A

BELIEFS;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An individual is an extremist when they have radical beliefs or agree with actions or ideologies for a violent extremist group.

Protected under First Amendment - freedom of speech, while not be in legal jeopardy until they actively plan to carry out an act of violence or pushing someone else of their belief

Beliefs and actions of individuals who support efforts to achieve radical ideological, religious or political views along a range of issues, including race, religion, politics, gender and the environment.

Terminology As It Relates to Terrorism

Terrorism

A

EXTREMISM;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Individuals following an ideology independently or through an organization

Radicalization is the process by which individuals come to believe

Terminology As It Relates to Terrorism

Terrorism

A

EXTREMISTS AND EXTREMIST GROUPS;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A movement consists of individuals working together to advance their shared political, social, or artistic ideas

Terminology As It Relates to Terrorism

Terrorism

A

EXTREMIST MOVEMENTS;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

U.S. based individuals or groups of people working together in support of their ideology, whether organized or not in the U.S. without any influence or direction of any foreign interests or FTO

Terminology As It Relates to Terrorism

Terrorism

A

DOMESTIC EXTREMIST MOVEMENTS (AND GROUPS);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Individuals mobilized to plan, support, and conduct violet illegal behavior in furtherance of their extremist ideology

Mobilization Is the process through which radicalized individuals undergo preparatory type activities such as individual or group training, capability building and developing and improving individual competencies to take or direct support violet acts

Terminology As It Relates to Terrorism

Terrorism

A

VIOLENT EXTREMISTS;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Also known as a Domestic Terrorist

Not until they are actively planning to commit acts or violence in support of their extremist ideologies

Is not a separate offense in the federal criminal code

Terminology As It Relates to Terrorism

Terrorism

A

DOMESTIC VIOLET EXTREMIST (DVE);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A person of any citizenship who lives or operates primarily in the United States or its territories, who: advocates, engages in, or is preparing to engage in or support terrorist activities in furtherance of a foreign terrorist organization objectives

Terminology As It Relates to Terrorism

Terrorism

A

HOMEGROWN VIOLENT EXTREMIST (HVE);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A group of two or more individuals based in a foreign country, whether organized or not, which engages in, or has a subgroup, which engages in terrorist activity

Terminology As It Relates to Terrorism

Terrorism

A

FOREIGN TERRORIST ORGANIZATION (FTO);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Believer
-Domestic Extremist - Radicalized - Homegrown Extremist
Extremist
-Domestic (Violent) Extremist - Mobilized - Homegrown (Violent) Extremist
-Domestic Terrorist - Violent Extremist - International Terrorist

Terminology As It Relates to Terrorism

Terrorism

A

HOW WE IDENTIFY A TERRORIST;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An activity that involves a violent act or an act dangerous to human life, property, or infrastructure

a. to intimidate civilian population
b. influence the policy or a government by intimidation
c. mass destruction, assassination, kidnapping, or hostage-taking

Terminology As It Relates to Terrorism

Terrorism

A

TERRORISM;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unlawful use, or threatened use, or force or violence by a group based and operating entirely within the United States without foreign direction committed against persons or property to intimidate

Terminology As It Relates to Terrorism

Terrorism

A

DOMESTIC TERRORISM;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Primarily outside the territorial jurisdiction of the United States or transcend national boundaries

Terminology As It Relates to Terrorism

Terrorism

A

INTERNATIONAL TERRORISM;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Military personnel/facilities
Diplomatic offices
Religious figures/institutions
Intermodal - airports, subways, buses, etc.
Critical infrastructure
Educational institutions
Government offices
Private citizens and property
Police
Sporting/entertainment venues

Threat of Terrorism and Violent Extremism

Terrorism

A

POTENTIAL TARGETS OF TERRORISM;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Incendiary
Explosives
Firearms
WMD
Vehicles
UAS

Threat of Terrorism and Violent Extremism

Terrorism

A

POTENTIAL WEAPONS OF VIOLENT EXTREMISTS AND TERRORISTS;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Monitored by U.S. Department of State (DOS), Bureau of Counterterrorism

Threat of Terrorism and Violent Extremism

Terrorism

A

THE POTENTIAL TREATS: FOREIGN TERRORIST ORGANIZATIONS LIST;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Describes the potentially unlawful use of threat of fore or violence, in furtherance of political and/or social agendas with no connection or affiliation with any foreign terrorist organizations

Threat of Terrorism and Violent Extremism

Terrorism

A

THE POTENTIAL THREATS; DOMESTIC EXTREMIST MOVEMENTS;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • Sovereign Citizen Extremism - the legitimacy of US citizenship should be rejected
  • Militia - government deliberately is stripping Americans of their freedoms and is attempting to establish a totalitarian regime
  • Anti-government extremism - Belief that their liberties are being taken away by the perceived unconstitutional or otherwise illegitimate actions of government officials or law enforcement
  • Anarchist extremist - All forms of capitalism and corporate globalization should be opposed and that governing institutions are unnecessary and harmful to society
  • Racially or Ethnically Motivated Violent Extremism - White supremacy, black separatist, animal/environmental rights, eco-terrorism, abortion related

Threat of Terrorism and Violent Extremism

Terrorism

A

ANTI-GOVERNMENT/ANTI-AUTHORITY VIOLENT EXTREMISM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hierarchical Structure, Networked Structure, Hierarchy-Network Hybrid Structure

Structure, Financing, and Operations of Terrorist Organizations

Terrorism

A

TERRORIST ORGANIZATIONS HAVE USED ONE OF THREE MODELS;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Well-defined vertical chain of command, control, and responsibility

Structure, Financing, and Operations of Terrorist Organizations

Terrorism

A

HIERARCHICAL STRUCTURE;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Chain - smuggle goods and people or launder money
Hub or Star and Wheel - financial or economic network
All Channel - lack an identifiable “head”

Structure, Financing, and Operations of Terrorist Organizations

Terrorism

A

NETWORKED STRUCTURE;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Combination of two structure models
Membership and Function - Leaders/Cadres
Active Supporters
Passive Supporters

Structure, Financing, and Operations of Terrorist Organizations

Terrorism

A

HIERARCHY-NETWORK HYBRID STRUCTURE;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Funding Sources - criminal activity - drug trafficking, cybercrimes, coupon fraud, cigarette tax scams, charitable organizations, offshore entities and companies, funds transfers and payments

Alternate methods - gift cards, cryptocurrency, eBay/PayPal, fundmenow

Structure, Financing, and Operations of Terrorist Organizations

Terrorism

A

FINANCING;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Simple to the complex attack plan

Structure, Financing, and Operations of Terrorist Organizations

Terrorism

A

OPERATIONS;

25
Q

Consists of three primary phases: decision, planning, and execution

Structure, Financing, and Operations of Terrorist Organizations

Terrorism

A

THE NATIONAL COUNTERTERRORISM CENTER (NCTC) TERRORIST ATTACK MODEL;

26
Q

May not be observable in every situation

Grievance - cultivated over time
Ideation - decision specific to utility of violence

Structure, Financing, and Operations of Terrorist Organizations

Terrorism

A

DECISION PHASES;

27
Q

Research and Target Selection - when, how, and where to attack, determine target and tactics

Acquisition - acquiring technical capabilities, logistics, or any resources

Surveillance - physical or virtual reconnaissance of potential, familiar, or actual targets, employing counter surveillance or operational security as a defense tactic

Rehearsal - actual or virtual simulation of the attack

Structure, Financing, and Operations of Terrorist Organizations

Terrorism

A

PLANNING PHASE;

28
Q

Attack - ideology, or politically, motivated act of violence, pre-planned or opportunistic

Escape and Exploitation - involves claiming, disseminating a perceived justification for committing the attack

Structure, Financing, and Operations of Terrorist Organizations

Terrorism

A

EXECUTION PHASE;

29
Q

Process by which an individual changes a belief system to advocate, facilitate, or use violence to effect societal or political change

Radicalization Process

Terrorism

A

VIOLENT RADICALIZATION;

30
Q

Personal Factors - personal needs (sense of power/potency or sense of belonging), history (development and life history event), situational context

Group Factors - such as family and peers, sense of belong and press to act, online environment

Community Factors - marginalization, lack of trust in societal institutions, religious discrimination, online communities

Sociopolitical Factors - collective grievances, opposition to foreign and domestic policies, and world events

Ideological Factors - framework to interpret, values, beliefs, and goals, support for, or participation in, violence

Radicalization Process

Terrorism

A

FACTORS DRIVING RADICALIZATION;

31
Q

Internet - propaganda

Social Network - physical and virtual connections, training/indoctrination

Radicalization Process

Terrorism

A

CATALYSTS TO MOBILIZATION;

32
Q

Community engagement and credible voices

Radicalization Process

Terrorism

A

INHIBITORS OF MOBILIZATION;

33
Q

The speech and beliefs are protected until an illegal act is committed

Readiness to Act: motivation and intent
Opportunity - training and resources
Capability - education, experience, competencies
Targets - familiar locations
Online Mobilization - provided financial or logistic means

Incite Violence - encourage others, through social media channels/products, photo shopped imagery

Inhibitors may cause this process to back away from violence, modify plans, demobilized

Radicalization Process

Terrorism

A

MOBILIZATION PROCESS;

34
Q

Principal forum for the discussion of national security and foreign policy matters

Chairman: President of the United States

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

NATIONAL SECURITY COUNCIL (NSC);

35
Q

United States confronts within and beyond our borders and use all elements of national power to combat terrorism, targeting terrorist networks, disrupting and denying mobilize, finances, travel, communication, and inspiration of new followers

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

NATIONAL STRATEGY FOR COUNTERTERRORISM;

36
Q

17 Agencies

Collects and produces both foreign and domestic intelligence through reporting and analysis, U.S. military planning

ODNI, CIA, DIA, FBI, NGA, NRO, NSA, DOE, DHS, DOS, DOT, DEA, USAF, USA, USCG, USMC, USN

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

U.S. INTELLIGENCE COMMUNITY (IC);

37
Q

Homeland Threat Task Force

interagency collaboration, informs weekly updates

An important component is Joint Counterterrorism Assessment Team (JCAT)

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

NATIONAL COUNTERTERRORISM CENTER (NCTC);

38
Q

Improves SHARING AND ENHANCE public safety for NCTC

Designed to improve information sharing among state, local, tribal, and territorial jurisdictions

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

MISSION OF THE JCAT;

39
Q

Designation, the re-validation, or the removal to or from the FTO list

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

U.S SECRETARY OF STATE;

40
Q

Lead for prosecution of terrorist acts or threats in the United States

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

U.S. ATTORNEY GENERAL;

41
Q

Responsible for the efforts of the DHS to defeat terrorism and secure the U.S. homeland

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

SECRETARY OF HOMELAND SECURITY;

42
Q

Leads criminal investigations, coordinates the LE community, provides leadership and criminal justice services

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

DIRECTOR OF THE FBI;

43
Q

Mission - to detect, deter, and defeat terrorism, fulfills its CT responsibility through the Joint Terrorism Task Force (JTTF), which detect, investigate, and disrupt terrorist

Other missions include - WMD, NCIC, LEEP

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

MISSION OF THE FBI;

44
Q

Prevent terrorism and enhance security, secure and manage U.S. borders, enforce and administer U.S. immigration laws, to STRENGTHEN cyberspace, critical infrastructure, national preparedness and resilience to disasters

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

MISSION OF DHS;

45
Q

First line of defense along with CBP

Transportation Security Operations Center (TSOC) - coordination of security incidents/operations for TSA
National Targeting Center (NTC) - passenger data, previous border crossing information, travel reservations, visa applications, passenger manifests
Air Marine Operations Center (AMOC)

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

DHS COMPONENT AGENCIES;

46
Q

Compatible processes, policies, and standards that foster the broader sharing of suspicious activity reports

Capability for SLTT and FLEO to share timely, relevant SAR information

Share information about terrorism related suspicious activities

Provides support to joint intelligence fusion centers

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

THE NATIONWIDE SAR INITIATIVE (NSI);

47
Q

24/7 Operation, multi-agency organization, under the blended leadership of the FBI, DHS, TSA, ODNI, and the NCTC

Protects our national security through the collaborative effort of the law enforcement, homeland security, and intelligence communities

Operates and manage the TSA “NO FLY” list and the “Selectee” List

Populate Terrorist Identities DataMart Environment (TIDE)

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

TERRORIST SCREENING CENTER (TSC);

48
Q

Possible Arrest. A federal arrest warrant may exist, possible ties to terrorism

Approach with caution, call TSC immediately

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

HANDLING CODE 1;

49
Q

Possible Immigration Violator. A DHS detainer, possibles ties to terrorism

Approach with caution, call TSC immediately

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

HANDLING CODE 2;

50
Q

Gather information, possible tie to terrorism

Do not extend the scope/duration of encounter

Approach with caution, call TSC after encounter

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

HANDLING CODE 3

51
Q

Gather information, possible national security interest

Do not extend the scope/duration of encounter

Call TSC after encounter

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

HANDLING CODE 4;

52
Q

Gather information, possible ties to Transnational Organized Crime (TOC)

Do not extend the scope/duration of encounter

Approach with caution, call TSC after encounter

How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism

Terrorism

A

HANDLING CODE 5;

53
Q

To protect officers and the public

Officers to make informed decision

Impact on Officer Safety

LEO Responsibilities to Detect, Deter, and Defeat Terrorism

Terrorism

A

TERRORIST SCREENING CENTER (TSC) HANDLING CODE PROGRAM;

54
Q

“T” (terrorist)

Response to the NCIC quirky on the individual watchlisted

LEO Responsibilities to Detect, Deter, and Defeat Terrorism

Terrorism

A

TSC MESSAGE DETAILS;

55
Q

Observable actions of past known behaviors and characteristics, collectively suggest that a person may be committing, may be preparing to commit, or has committed an unlawful act

Identified by SAR

Indicators provide awareness - radicalizing individual, mobilizing individual, violent extremist activities, terrorist attack preparations

Important facts - each related incident or indicator may occur hours, days, weeks, or months apart and may be inter-related or independent of another

LEO Responsibilities to Detect, Deter, and Defeat Terrorism

Terrorism

A

RECOGNIZED INDICATORS;

56
Q

Department or agency’s

JTTF reps and or National JTTF reps

Local JTTF office

Local, state, or regional intelligence fusion center

LEO Responsibilities to Detect, Deter, and Defeat Terrorism

Terrorism

A

REPORT EVERY INDICATOR, INCIDENT OR FRAGMENT OF INFORMATION TO;

57
Q

Communication Spoken - unusual goodbyes, desires to travel to fight
Communication Recruiting - mobilizing others, violent extremist narratives
Communication Written - seeking religious or political justification, participating in online sites
Communication Videos - Martyrdom video/statement
Financial - funds, transactions, LE observations
Research - direct/indirect collection, elicitation, discussing or developing tactics, inquiring about jobs that have sensitive access, conducting research on target, ways to evade LE
Surveillance - stationary, on foot, aerial
Test Security - driving past or penetrating perimeter
Logistics - acquiring, purchasing, and shipping equipment
Preparation - rehearsals or dry runs, testing explosives, unusual training
Travel - unusual one way tickets, false excuses

LEO Responsibilities to Detect, Deter, and Defeat Terrorism

Terrorism

A

INDICATOR CATEGORIES;

58
Q

Environment, time, place, body language (nervous, hesitant, indecisive, attempts to conceal their features

Clothing, interaction with others, reactions to a uniform presence

LEO Responsibilities to Detect, Deter, and Defeat Terrorism

Terrorism

A

SUSPICIOUS BEHAVIOR; INDICATOR;