Deck 15: Terrorism

Full screen (f)
exit full mode
Question
Radiological terrorism involves the dispersion of radioactive agents by conventional means and is commonly known as a "dirty bomb."
Use Space or
up arrow
down arrow
to flip the card.
Question
This agency is responsible for collecting intelligence inside the borders of the United States.

A) Central Intelligence Agency
B) Federal Bureau of Investigation
C) National Security Agency
D) Defense Intelligence Agency
Question
A social network analysis is useful in the investigation of terrorism. This is a linking of known members of a group with suspected members believed to have joined the group.
Question
The terrorist group we now know as Al Qaeda was founded by Osama bin Laden in the early 1980s to support the effort in Afghanistan against the invasion by the former Soviet Union.
Question
Timothy McVeigh, who was responsible for the Oklahoma City bombing of the Murrah Federal Building, had a copy of J. Edgar Hoover's biography in his possession at the time of his arrest.
Question
The Federal Bureau of Investigation is engaged in international intelligence collection efforts and have agents deployed to embassies around the world.
Question
Hijackings of airliners, cruise ships, and other means of mass transportation by terrorists has been committed primarily for money.
Question
The Central Security Agency is responsible for collecting intelligence outside the borders of the United States.
Question
When Israel invaded Lebanon in 1982, Iran responded by sending their Revolutionary Guards into that country which led to the creation of this new terrorist network.

A) Hamas
B) Mujahadeen
C) Al Qaeda
D) Hizbollah
Question
This group was founded after the Civil War and used intimidating night raids to discourage newly freed blacks from voting.

A) Ku Klux Klan
B) Pierce movement
C) The Order
D) ALF/ELF
Question
This group was founded by Robert Mathews who was inspired by the novel the Turner Diaries.

A) Ku Klux Klan
B) Pierce movement
C) The Order
D) ALF/ELF
Question
Due to the cellular organization of terrorist groups, technology alone cannot provide sufficient counterterrorism response, so human intelligence is a critical component.
Question
This group was formed in Palestine to resist the moderate view of the acceptance of a separate Palestinian state. This is one of the most volatile militant organizations in the Middle East.

A) Hamas
B) Mujahadeen
C) Al Qaeda
D) Hizbollah
Question
These holy warriors were supported by the United States for the purpose of repelling the invasion of Afghanistan by the Soviet Union in the early 1980s.

A) Hamas
B) Mujahadeen
C) Al Qaeda
D) Hizbollah
Question
This group is concerned with a single issue and has committed numerous acts of arson and vandalism estimated in excess of $100 million since 1996.

A) Ku Klux Klan
B) Pierce movement
C) The Order
D) ALF/ELF
Question
This group was founded in the early 1980s to support the Muslim effort in Afghanistan against the invasion by the former Soviet Union.

A) Hamas
B) Mujahadeen
C) Al Qaeda
D) Hizbollah
Question
This agency is responsible for collecting intelligence outside of the borders of the United States.

A) Central Intelligence Agency
B) Federal Bureau of Investigation
C) National Security Agency
D) Defense Intelligence Agency
Question
This is the technological unit of the intelligence community. This agency's primary mission is to collect communications and signal intelligence as well as code breaking activities.

A) Central Intelligence Agency
B) Federal Bureau of Investigation
C) National Security Agency
D) Defense Intelligence Agency
Question
As a maintenance function, the kidnapping of a wealthy subject may be a means of collecting ransom monies that terrorists then use to support their daily expenses and to finance future terrorist activity.
Question
Trials of terrorists in the United States have survived or perished on the issue of the legality or illegality of the means used by investigators to gather evidence.
Question
Physical assaults such as _____ was a technique developed by the Irish Republican Army to cripple rather than kill. A person in such a condition sends a strong visual message and thus becomes an example to others of the terrorist group's power and the cost of informing on them.
Question
The beginnings of the _____ can be traced back to 1865 in Pulaski, Tennessee, when a small group of Confederate veterans gathered together to form a social club.
Question
_____ agents include choking gases, blister agents, and nerve agents.
Question
_____ intelligence is used to intercept financial data and to monitor communications as well as satellite imagery.
Question
Vandalism is a crime of choice for _____ who are dedicated to destroying industries perceived to have a negative effect on the environment.
Question
When Israel invaded Lebanon in 1982, Iran responded by sending its Revolutionary Guard to Lebanon, which led to the creation of a new terrorist network called _____.
Question
One of the most volatile militant organizations in the Middle East, known as _____, grew from the Palestinian liberation movement.
Question
The holy warriors known as the _____ were formed to fight against the invasion of Afghanistan by the former Soviet Union.
Question
Many Arabs believe that the entire Middle East should be united under one great Arabic banner, from North Africa to the Iranian border, known as _____.
Question
In 1985, William Pierce, a white supremacist, wrote a novel under the pseudonym of Andrew MacDonald, titled _____ which is a fictionalized account of an international white revolution and a how-to manual for terrorism.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Terrorism
1
Radiological terrorism involves the dispersion of radioactive agents by conventional means and is commonly known as a "dirty bomb."
True
2
This agency is responsible for collecting intelligence inside the borders of the United States.

A) Central Intelligence Agency
B) Federal Bureau of Investigation
C) National Security Agency
D) Defense Intelligence Agency
B
3
A social network analysis is useful in the investigation of terrorism. This is a linking of known members of a group with suspected members believed to have joined the group.
True
4
The terrorist group we now know as Al Qaeda was founded by Osama bin Laden in the early 1980s to support the effort in Afghanistan against the invasion by the former Soviet Union.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
Timothy McVeigh, who was responsible for the Oklahoma City bombing of the Murrah Federal Building, had a copy of J. Edgar Hoover's biography in his possession at the time of his arrest.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
The Federal Bureau of Investigation is engaged in international intelligence collection efforts and have agents deployed to embassies around the world.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
Hijackings of airliners, cruise ships, and other means of mass transportation by terrorists has been committed primarily for money.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
The Central Security Agency is responsible for collecting intelligence outside the borders of the United States.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
When Israel invaded Lebanon in 1982, Iran responded by sending their Revolutionary Guards into that country which led to the creation of this new terrorist network.

A) Hamas
B) Mujahadeen
C) Al Qaeda
D) Hizbollah
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
This group was founded after the Civil War and used intimidating night raids to discourage newly freed blacks from voting.

A) Ku Klux Klan
B) Pierce movement
C) The Order
D) ALF/ELF
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
This group was founded by Robert Mathews who was inspired by the novel the Turner Diaries.

A) Ku Klux Klan
B) Pierce movement
C) The Order
D) ALF/ELF
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
Due to the cellular organization of terrorist groups, technology alone cannot provide sufficient counterterrorism response, so human intelligence is a critical component.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
This group was formed in Palestine to resist the moderate view of the acceptance of a separate Palestinian state. This is one of the most volatile militant organizations in the Middle East.

A) Hamas
B) Mujahadeen
C) Al Qaeda
D) Hizbollah
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
These holy warriors were supported by the United States for the purpose of repelling the invasion of Afghanistan by the Soviet Union in the early 1980s.

A) Hamas
B) Mujahadeen
C) Al Qaeda
D) Hizbollah
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
This group is concerned with a single issue and has committed numerous acts of arson and vandalism estimated in excess of $100 million since 1996.

A) Ku Klux Klan
B) Pierce movement
C) The Order
D) ALF/ELF
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
This group was founded in the early 1980s to support the Muslim effort in Afghanistan against the invasion by the former Soviet Union.

A) Hamas
B) Mujahadeen
C) Al Qaeda
D) Hizbollah
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
This agency is responsible for collecting intelligence outside of the borders of the United States.

A) Central Intelligence Agency
B) Federal Bureau of Investigation
C) National Security Agency
D) Defense Intelligence Agency
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
This is the technological unit of the intelligence community. This agency's primary mission is to collect communications and signal intelligence as well as code breaking activities.

A) Central Intelligence Agency
B) Federal Bureau of Investigation
C) National Security Agency
D) Defense Intelligence Agency
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
As a maintenance function, the kidnapping of a wealthy subject may be a means of collecting ransom monies that terrorists then use to support their daily expenses and to finance future terrorist activity.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
Trials of terrorists in the United States have survived or perished on the issue of the legality or illegality of the means used by investigators to gather evidence.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
Physical assaults such as _____ was a technique developed by the Irish Republican Army to cripple rather than kill. A person in such a condition sends a strong visual message and thus becomes an example to others of the terrorist group's power and the cost of informing on them.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
The beginnings of the _____ can be traced back to 1865 in Pulaski, Tennessee, when a small group of Confederate veterans gathered together to form a social club.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
_____ agents include choking gases, blister agents, and nerve agents.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
_____ intelligence is used to intercept financial data and to monitor communications as well as satellite imagery.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
Vandalism is a crime of choice for _____ who are dedicated to destroying industries perceived to have a negative effect on the environment.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
When Israel invaded Lebanon in 1982, Iran responded by sending its Revolutionary Guard to Lebanon, which led to the creation of a new terrorist network called _____.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
One of the most volatile militant organizations in the Middle East, known as _____, grew from the Palestinian liberation movement.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
The holy warriors known as the _____ were formed to fight against the invasion of Afghanistan by the former Soviet Union.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
Many Arabs believe that the entire Middle East should be united under one great Arabic banner, from North Africa to the Iranian border, known as _____.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
In 1985, William Pierce, a white supremacist, wrote a novel under the pseudonym of Andrew MacDonald, titled _____ which is a fictionalized account of an international white revolution and a how-to manual for terrorism.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 30 flashcards in this deck.