Terrorism Flashcards
Are the basic for extremists and terrorist
Terminology As It Relates to Terrorism
Terrorism
BELIEFS;
An individual is an extremist when they have radical beliefs or agree with actions or ideologies for a violent extremist group.
Protected under First Amendment - freedom of speech, while not be in legal jeopardy until they actively plan to carry out an act of violence or pushing someone else of their belief
Beliefs and actions of individuals who support efforts to achieve radical ideological, religious or political views along a range of issues, including race, religion, politics, gender and the environment.
Terminology As It Relates to Terrorism
Terrorism
EXTREMISM;
Individuals following an ideology independently or through an organization
Radicalization is the process by which individuals come to believe
Terminology As It Relates to Terrorism
Terrorism
EXTREMISTS AND EXTREMIST GROUPS;
A movement consists of individuals working together to advance their shared political, social, or artistic ideas
Terminology As It Relates to Terrorism
Terrorism
EXTREMIST MOVEMENTS;
U.S. based individuals or groups of people working together in support of their ideology, whether organized or not in the U.S. without any influence or direction of any foreign interests or FTO
Terminology As It Relates to Terrorism
Terrorism
DOMESTIC EXTREMIST MOVEMENTS (AND GROUPS);
Individuals mobilized to plan, support, and conduct violet illegal behavior in furtherance of their extremist ideology
Mobilization Is the process through which radicalized individuals undergo preparatory type activities such as individual or group training, capability building and developing and improving individual competencies to take or direct support violet acts
Terminology As It Relates to Terrorism
Terrorism
VIOLENT EXTREMISTS;
Also known as a Domestic Terrorist
Not until they are actively planning to commit acts or violence in support of their extremist ideologies
Is not a separate offense in the federal criminal code
Terminology As It Relates to Terrorism
Terrorism
DOMESTIC VIOLET EXTREMIST (DVE);
A person of any citizenship who lives or operates primarily in the United States or its territories, who: advocates, engages in, or is preparing to engage in or support terrorist activities in furtherance of a foreign terrorist organization objectives
Terminology As It Relates to Terrorism
Terrorism
HOMEGROWN VIOLENT EXTREMIST (HVE);
A group of two or more individuals based in a foreign country, whether organized or not, which engages in, or has a subgroup, which engages in terrorist activity
Terminology As It Relates to Terrorism
Terrorism
FOREIGN TERRORIST ORGANIZATION (FTO);
Believer
-Domestic Extremist - Radicalized - Homegrown Extremist
Extremist
-Domestic (Violent) Extremist - Mobilized - Homegrown (Violent) Extremist
-Domestic Terrorist - Violent Extremist - International Terrorist
Terminology As It Relates to Terrorism
Terrorism
HOW WE IDENTIFY A TERRORIST;
An activity that involves a violent act or an act dangerous to human life, property, or infrastructure
a. to intimidate civilian population
b. influence the policy or a government by intimidation
c. mass destruction, assassination, kidnapping, or hostage-taking
Terminology As It Relates to Terrorism
Terrorism
TERRORISM;
Unlawful use, or threatened use, or force or violence by a group based and operating entirely within the United States without foreign direction committed against persons or property to intimidate
Terminology As It Relates to Terrorism
Terrorism
DOMESTIC TERRORISM;
Primarily outside the territorial jurisdiction of the United States or transcend national boundaries
Terminology As It Relates to Terrorism
Terrorism
INTERNATIONAL TERRORISM;
Military personnel/facilities Diplomatic offices Religious figures/institutions Intermodal - airports, subways, buses, etc. Critical infrastructure Educational institutions Government offices Private citizens and property Police Sporting/entertainment venues
Threat of Terrorism and Violent Extremism
Terrorism
POTENTIAL TARGETS OF TERRORISM;
Incendiary Explosives Firearms WMD Vehicles UAS
Threat of Terrorism and Violent Extremism
Terrorism
POTENTIAL WEAPONS OF VIOLENT EXTREMISTS AND TERRORISTS;
Monitored by U.S. Department of State (DOS), Bureau of Counterterrorism
Threat of Terrorism and Violent Extremism
Terrorism
THE POTENTIAL TREATS: FOREIGN TERRORIST ORGANIZATIONS LIST;
Describes the potentially unlawful use of threat of fore or violence, in furtherance of political and/or social agendas with no connection or affiliation with any foreign terrorist organizations
Threat of Terrorism and Violent Extremism
Terrorism
THE POTENTIAL THREATS; DOMESTIC EXTREMIST MOVEMENTS;
- Sovereign Citizen Extremism - the legitimacy of US citizenship should be rejected
- Militia - government deliberately is stripping Americans of their freedoms and is attempting to establish a totalitarian regime
- Anti-government extremism - Belief that their liberties are being taken away by the perceived unconstitutional or otherwise illegitimate actions of government officials or law enforcement
- Anarchist extremist - All forms of capitalism and corporate globalization should be opposed and that governing institutions are unnecessary and harmful to society
- Racially or Ethnically Motivated Violent Extremism - White supremacy, black separatist, animal/environmental rights, eco-terrorism, abortion related
Threat of Terrorism and Violent Extremism
Terrorism
ANTI-GOVERNMENT/ANTI-AUTHORITY VIOLENT EXTREMISM
Hierarchical Structure, Networked Structure, Hierarchy-Network Hybrid Structure
Structure, Financing, and Operations of Terrorist Organizations
Terrorism
TERRORIST ORGANIZATIONS HAVE USED ONE OF THREE MODELS;
Well-defined vertical chain of command, control, and responsibility
Structure, Financing, and Operations of Terrorist Organizations
Terrorism
HIERARCHICAL STRUCTURE;
Chain - smuggle goods and people or launder money
Hub or Star and Wheel - financial or economic network
All Channel - lack an identifiable “head”
Structure, Financing, and Operations of Terrorist Organizations
Terrorism
NETWORKED STRUCTURE;
Combination of two structure models
Membership and Function - Leaders/Cadres
Active Supporters
Passive Supporters
Structure, Financing, and Operations of Terrorist Organizations
Terrorism
HIERARCHY-NETWORK HYBRID STRUCTURE;
Funding Sources - criminal activity - drug trafficking, cybercrimes, coupon fraud, cigarette tax scams, charitable organizations, offshore entities and companies, funds transfers and payments
Alternate methods - gift cards, cryptocurrency, eBay/PayPal, fundmenow
Structure, Financing, and Operations of Terrorist Organizations
Terrorism
FINANCING;
Simple to the complex attack plan
Structure, Financing, and Operations of Terrorist Organizations
Terrorism
OPERATIONS;
Consists of three primary phases: decision, planning, and execution
Structure, Financing, and Operations of Terrorist Organizations
Terrorism
THE NATIONAL COUNTERTERRORISM CENTER (NCTC) TERRORIST ATTACK MODEL;
May not be observable in every situation
Grievance - cultivated over time
Ideation - decision specific to utility of violence
Structure, Financing, and Operations of Terrorist Organizations
Terrorism
DECISION PHASES;
Research and Target Selection - when, how, and where to attack, determine target and tactics
Acquisition - acquiring technical capabilities, logistics, or any resources
Surveillance - physical or virtual reconnaissance of potential, familiar, or actual targets, employing counter surveillance or operational security as a defense tactic
Rehearsal - actual or virtual simulation of the attack
Structure, Financing, and Operations of Terrorist Organizations
Terrorism
PLANNING PHASE;
Attack - ideology, or politically, motivated act of violence, pre-planned or opportunistic
Escape and Exploitation - involves claiming, disseminating a perceived justification for committing the attack
Structure, Financing, and Operations of Terrorist Organizations
Terrorism
EXECUTION PHASE;
Process by which an individual changes a belief system to advocate, facilitate, or use violence to effect societal or political change
Radicalization Process
Terrorism
VIOLENT RADICALIZATION;
Personal Factors - personal needs (sense of power/potency or sense of belonging), history (development and life history event), situational context
Group Factors - such as family and peers, sense of belong and press to act, online environment
Community Factors - marginalization, lack of trust in societal institutions, religious discrimination, online communities
Sociopolitical Factors - collective grievances, opposition to foreign and domestic policies, and world events
Ideological Factors - framework to interpret, values, beliefs, and goals, support for, or participation in, violence
Radicalization Process
Terrorism
FACTORS DRIVING RADICALIZATION;
Internet - propaganda
Social Network - physical and virtual connections, training/indoctrination
Radicalization Process
Terrorism
CATALYSTS TO MOBILIZATION;
Community engagement and credible voices
Radicalization Process
Terrorism
INHIBITORS OF MOBILIZATION;
The speech and beliefs are protected until an illegal act is committed
Readiness to Act: motivation and intent
Opportunity - training and resources
Capability - education, experience, competencies
Targets - familiar locations
Online Mobilization - provided financial or logistic means
Incite Violence - encourage others, through social media channels/products, photo shopped imagery
Inhibitors may cause this process to back away from violence, modify plans, demobilized
Radicalization Process
Terrorism
MOBILIZATION PROCESS;
Principal forum for the discussion of national security and foreign policy matters
Chairman: President of the United States
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
NATIONAL SECURITY COUNCIL (NSC);
United States confronts within and beyond our borders and use all elements of national power to combat terrorism, targeting terrorist networks, disrupting and denying mobilize, finances, travel, communication, and inspiration of new followers
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
NATIONAL STRATEGY FOR COUNTERTERRORISM;
17 Agencies
Collects and produces both foreign and domestic intelligence through reporting and analysis, U.S. military planning
ODNI, CIA, DIA, FBI, NGA, NRO, NSA, DOE, DHS, DOS, DOT, DEA, USAF, USA, USCG, USMC, USN
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
U.S. INTELLIGENCE COMMUNITY (IC);
Homeland Threat Task Force
interagency collaboration, informs weekly updates
An important component is Joint Counterterrorism Assessment Team (JCAT)
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
NATIONAL COUNTERTERRORISM CENTER (NCTC);
Improves SHARING AND ENHANCE public safety for NCTC
Designed to improve information sharing among state, local, tribal, and territorial jurisdictions
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
MISSION OF THE JCAT;
Designation, the re-validation, or the removal to or from the FTO list
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
U.S SECRETARY OF STATE;
Lead for prosecution of terrorist acts or threats in the United States
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
U.S. ATTORNEY GENERAL;
Responsible for the efforts of the DHS to defeat terrorism and secure the U.S. homeland
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
SECRETARY OF HOMELAND SECURITY;
Leads criminal investigations, coordinates the LE community, provides leadership and criminal justice services
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
DIRECTOR OF THE FBI;
Mission - to detect, deter, and defeat terrorism, fulfills its CT responsibility through the Joint Terrorism Task Force (JTTF), which detect, investigate, and disrupt terrorist
Other missions include - WMD, NCIC, LEEP
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
MISSION OF THE FBI;
Prevent terrorism and enhance security, secure and manage U.S. borders, enforce and administer U.S. immigration laws, to STRENGTHEN cyberspace, critical infrastructure, national preparedness and resilience to disasters
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
MISSION OF DHS;
First line of defense along with CBP
Transportation Security Operations Center (TSOC) - coordination of security incidents/operations for TSA
National Targeting Center (NTC) - passenger data, previous border crossing information, travel reservations, visa applications, passenger manifests
Air Marine Operations Center (AMOC)
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
DHS COMPONENT AGENCIES;
Compatible processes, policies, and standards that foster the broader sharing of suspicious activity reports
Capability for SLTT and FLEO to share timely, relevant SAR information
Share information about terrorism related suspicious activities
Provides support to joint intelligence fusion centers
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
THE NATIONWIDE SAR INITIATIVE (NSI);
24/7 Operation, multi-agency organization, under the blended leadership of the FBI, DHS, TSA, ODNI, and the NCTC
Protects our national security through the collaborative effort of the law enforcement, homeland security, and intelligence communities
Operates and manage the TSA “NO FLY” list and the “Selectee” List
Populate Terrorist Identities DataMart Environment (TIDE)
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
TERRORIST SCREENING CENTER (TSC);
Possible Arrest. A federal arrest warrant may exist, possible ties to terrorism
Approach with caution, call TSC immediately
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
HANDLING CODE 1;
Possible Immigration Violator. A DHS detainer, possibles ties to terrorism
Approach with caution, call TSC immediately
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
HANDLING CODE 2;
Gather information, possible tie to terrorism
Do not extend the scope/duration of encounter
Approach with caution, call TSC after encounter
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
HANDLING CODE 3
Gather information, possible national security interest
Do not extend the scope/duration of encounter
Call TSC after encounter
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
HANDLING CODE 4;
Gather information, possible ties to Transnational Organized Crime (TOC)
Do not extend the scope/duration of encounter
Approach with caution, call TSC after encounter
How the US Executes Its Policies and Plans to Detect, Deter, and Defeat Terrorism
Terrorism
HANDLING CODE 5;
To protect officers and the public
Officers to make informed decision
Impact on Officer Safety
LEO Responsibilities to Detect, Deter, and Defeat Terrorism
Terrorism
TERRORIST SCREENING CENTER (TSC) HANDLING CODE PROGRAM;
“T” (terrorist)
Response to the NCIC quirky on the individual watchlisted
LEO Responsibilities to Detect, Deter, and Defeat Terrorism
Terrorism
TSC MESSAGE DETAILS;
Observable actions of past known behaviors and characteristics, collectively suggest that a person may be committing, may be preparing to commit, or has committed an unlawful act
Identified by SAR
Indicators provide awareness - radicalizing individual, mobilizing individual, violent extremist activities, terrorist attack preparations
Important facts - each related incident or indicator may occur hours, days, weeks, or months apart and may be inter-related or independent of another
LEO Responsibilities to Detect, Deter, and Defeat Terrorism
Terrorism
RECOGNIZED INDICATORS;
Department or agency’s
JTTF reps and or National JTTF reps
Local JTTF office
Local, state, or regional intelligence fusion center
LEO Responsibilities to Detect, Deter, and Defeat Terrorism
Terrorism
REPORT EVERY INDICATOR, INCIDENT OR FRAGMENT OF INFORMATION TO;
Communication Spoken - unusual goodbyes, desires to travel to fight
Communication Recruiting - mobilizing others, violent extremist narratives
Communication Written - seeking religious or political justification, participating in online sites
Communication Videos - Martyrdom video/statement
Financial - funds, transactions, LE observations
Research - direct/indirect collection, elicitation, discussing or developing tactics, inquiring about jobs that have sensitive access, conducting research on target, ways to evade LE
Surveillance - stationary, on foot, aerial
Test Security - driving past or penetrating perimeter
Logistics - acquiring, purchasing, and shipping equipment
Preparation - rehearsals or dry runs, testing explosives, unusual training
Travel - unusual one way tickets, false excuses
LEO Responsibilities to Detect, Deter, and Defeat Terrorism
Terrorism
INDICATOR CATEGORIES;
Environment, time, place, body language (nervous, hesitant, indecisive, attempts to conceal their features
Clothing, interaction with others, reactions to a uniform presence
LEO Responsibilities to Detect, Deter, and Defeat Terrorism
Terrorism
SUSPICIOUS BEHAVIOR; INDICATOR;