Terrorism Flashcards

0
Q

What are the two U.S.C. codes?

A
  1. 2339a

2. 2339b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What does FTO stand for?

A

Foreign Terrorist Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Title 18 U.S.C. 2239a?

A

Material Support & Knowing the details to what is for - harder to prove- need intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Title 18 U.S.C. 2339b?

A

Not knowing all necessary details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What violate 2339b?

A

Knowingly and providing material support or resources to a FTO, or attempts or conspires to do so

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ho does a person violate 2339b?

A

A person must have knowledge that the organization is a designated terrorist organization, that the organization has engaged in or engages in terrorist activity, or that the organization has engaged or engages in terrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who designates FTOs?

A

Secretary of State

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How long is the designation valid for FTO’s?

A

two years and are renewable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What was not included in the recently amended USA Patriot Act as material support or resources?

A

Medicine and religious materials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Geotagging?

A

It is a process of adding geographical ID to photos, videos, websites, & SMS messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are examples of Geotagging?

A

Tagging-photos with exact location on the internet allows anyone to track you

Terrorist use this to their advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some negatives about social networking sites?

A

establishes patterns, exposes location of work/home, IDs location as a potential target, do not depend on SNS for confidentiality, can be used against you in a court, anything you put online can become public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the terrorist attack cycle?

A
  1. Project Initiation
  2. Target Assessment and Selection
  3. In Depth Surveillance
  4. Planning and Rehearsal
  5. Plan and Verifications
  6. Execution and Exploitation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the riskiest phase for the terrorist?

A

In Depth Surveillance (only phase requiring them to expose themselves)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When does the Command Element initiate operation?

A

Project Initiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three stages of Radicalization depicted by the NCTC?

A
  1. Radicalization
  2. Mobilization
  3. Action
16
Q

What are factors of the first phase of Radicalization?

A

Personal, Community, Group, Sociopolitical, Ideological

17
Q

What is radicalization?

A

The process by which individuals come to believe that their engagement in or facilitation of non-state violence to achieve social and political change is necessary and justified.

18
Q

What are catalysts to radicalization?

A

Social media and encouragement by family and friends.

19
Q

What are inhibitors to Radicalization?

A

Strong family support, positive family engagement, and credible voices

20
Q

What are the factors of the Mobilization of Radicalization?

A
  1. Readiness to act
  2. Targets
  3. Opportunity
  4. Capability
21
Q

What occurs in the final stage (Action) of Radicalization?

A

The radicalization individuals carry out the attack

22
Q

What are the 8 signs of terrorism?

A
  1. Surveillance
  2. Information Gathering
  3. Testing Security
  4. Funding
  5. Planning/Acquiring Supplies
  6. Suspicious Activity
  7. Rehearsal/Dry Runs
  8. Getting Into Position/Deploying Assets
23
Q

In the Terrorist Screening Data base, what is Handling Code 1?

A

Individual is subject of an arrest warrant (do not tell them they are on a watch list)

24
Q

In the Terrorist Screening Data base, what is Handling Code 2?

A

May be detainer available from DHS for this individual - Question w/o extending the duration/scope of the encounter

25
Q

In the Terrorist Screening Data base, what is Handling Code 3?

A

Contact TSC during this encounter- do not detain or arrest unless evidence of a violation of Federal, State, or local Statutes.

26
Q

What are the mechanism of radicalizations?

A
OMG I
Other sources 
Mass
Group 
Individual