Terrorism Flashcards Preview

CBP_Air &Marine Basic Training > Terrorism > Flashcards

Flashcards in Terrorism Deck (14)
Loading flashcards...
1
Q

Domestic Terrorism

A
  • acts dangerous to human life that are a violation of criminal laws of USA or State.
  • to intimidate civilian population
  • to influence gov. Policy
  • to affect gov. By destruction
  • Occur within the territorial U.S.
2
Q

International Terrorism

A
  • violent acts or acts dangerous to human life that are a violation of criminal laws of USA or State.
  • to intimidate civilian population
  • to influence gov. Policy
  • to affect gov. By destruction
  • Occur within the territorial U.S.

*Occur primarily outside the territorial jurisdiction of the U.S.

3
Q

22 USC 2656f (d) (2)

              Terrorism
A

“The term terrorism means premeditated, politically motivated violence perpetrated against noncombatant targets by sub-national groups or clandestine agents.”

4
Q

EPO# 1: Outline or

“National Security Strategy”

A
  • Defeat Terrorism Worldwide
  • Strengthen our Biological and Nuclear Security
  • Improve intelligence
  • Secure our digital and communications Infrastructure
  • Promote our physical and Social Infrastructure
  • Promote and Secure our borders
  • Ensure a strong Incident Management
5
Q

Title 18 U.S.C ss 2339B

-the Title a person can be fined under.

A

“Providing Material Support or Resources to Designated Foreign Terrorist Organizations”

  • 15years to life imprisonment
  • Offender must be a National
  • Knowingly contributes by means of, money, sharing bank accounts, sharing records.
6
Q

List the means by which a LEO or agent can jeopardize their agency and themselves by using social networking sites.

A

-Personal information shared of social media profile page.
-Geotags on pictures
-Location-based Social networking/“checking in”
-

7
Q

Solutions and Safety Steps for Social Media

A
  • do not use GPS functions (photos/checking in)
  • do not share personal or work I formation
  • use unique passwords for log-on
  • set privacy and security options high
  • update security software
  • be cognizant of foreign apps, links, downloads, attachments .
  • identify terrorism -related databases
8
Q

EPO#5: Identify the the terrorist attacking cycle and how targets are chosen.

A
  1. Project Initiation
  2. Targets are Assessed &Selected
  3. In-Depth Surveillance
  4. Planning and Rehearsal
  5. Plan Verification
  6. Execution and Exploitation
9
Q

What are the 3 Phases to Radicalization ?

A
  1. Radicalization: Individual comes to believe violence will achieve social and political change is necessary and justified.
  2. Mobilization : Acquire Training , resources , plan.
  3. Action
10
Q

Define “Sovereign Citizen”

A

Sovereign citizens believe they are subject only to “the common law” . They claim that they have absolute mastery over all their property and they have freedom from taxes, regulations, ordinances, zoning restrictions.

11
Q

Social networking is used by terrorist for?

A

recruiting,propaganda, and radicalizing .

12
Q

What is “Geotagging”?

A

Process of adding geographical identification to photographs, videos, websites, and SMS messages. Coordinates are automatically embedded in pictures taken with smartphones.

13
Q

EPO#2: identify the elements within the four failures revealed by the 9/11 commission report.

A

EPO # 6: define the term countering Violent Extremism and identify the methods that terrorist groups utilize to recruit potential operatives.

14
Q

EPO # 6: define the term countering Violent Extremism and identify the methods that terrorist groups utilize to recruit potential operatives.

A
  1. Understand Violent Extremism: who are the players? What targets are weak? What is the motive?
  2. Support Local Communities: integrate community based programs, strengthen relationships with potentially weak individuals who may be targets for radicalization.
  3. Support local Law enforcement: strong LE forces can deter and combat recruitment or individual mobilization.