Deck 11: Political Crime and Terrorism

Full screen (f)
exit full mode
Question
One of the biggest problems with deterring and penalizing election fraud is that U.S. criminal code fails to mention election fraud as a specific crime, and instead includes it with white-collar crimes and green-collar crimes.
Use Space or
up arrow
down arrow
to flip the card.
Question
According to research in the text, most political criminals do not consider themselves antisocial but instead patriotic and altruistic.
Question
Treason is the only crime mentioned in the U.S. Constitution.
Question
In regard to the goals of political crimes, the motive for profit-related crimes usually includes the selling of state secrets for personal enrichment or trafficking in stolen arms or munitions.
Question
Espionage is the practice of obtaining information about a government, organization, or society that is considered secret or confidential without the permission of the holder of the information.
Question
Some political criminals plot to overthrow the existing government and replace it with one that holds views they find more acceptable.
Question
Al-Qaeda and Hamas are examples of revolutionary groups.
Question
The use of the word terrorism is first traced to the American Revolution, when the nontypical patterns of warfare from American colonists were said to "terror" the British troops who fought in traditional military fashion.
Question
Revolution comes from the Latin word revere, meaning "one who changes."
Question
What separates a revolution from a coup is that revolutions rely on armed forces and violence, while coups traditionally are nonviolent?
Question
Election fraud can include the calling in of a bomb threat in polling places known to favor the opposing party. ​
Question
An example of foreign industrial espionage would be the targeting of U.S. firms for technology that would strengthen their foreign defense capabilities.
Question
An insurgency is traditionally defined as a political movement that may use terror tactics to achieve its goals.
Question
Because of international law, election fraud has been eliminated in all countries except third-world dictatorships.
Question
Industrial espionage by foreign agents' efforts has hurt the United States specifically by eroding the U.S. military advantage.
Question
State political crimes are perpetrated by state authorities against the people they are supposed to serve.
Question
The term terrorist is often used interchangeably with the term guerrilla, but the terms are quite different.
Question
Political crimes can include both violent and nonviolent crimes.
Question
Former Vice President of the United States, Aaron Burr, was arrested and found not-guilty of treason because he lacked an overt act and simply planning to overthrow the government is not equal to treason.
Question
Before 1996, there was no federal statute that explicitly penalized industrial espionage.
Question
Robert Hanssen, a former FBI counterintelligence officer, was arrested in 2001 for selling secrets to which nation? Hanssen's case is considered one the most severe forms of espionage reported and was part of 2007 film titled The Breach.

A) ​Russia
B) ​China
C) ​Germany
D) ​North Korea
Question
Which of the following is not one of the ways listed in the text that foreign governments attempt to infiltrate businesses in attempts to gain sensitive information?

A) Data mining U.S. companies with headquarters abroad
B) Conferences and trade shows
C) Official foreign visitors
D) Exploitation of joint research
Question
Legislation giving U.S. law enforcement agencies a freer hand to investigate and apprehend suspected terrorists is called the USA Patriot Act.
Question
Which of the following is not true of treason?

A) There have actually been less than 40 prosecutions for treason in the entire history of the United States.
B) Helping an enemy in the time of war is considered a war crime and is not treason.
C) Many nations have applied the death penalty for treason.
D) Treason is the only crime mentioned in the U.S. Constitution.
Question
Robert Hanssen, a former counterintelligence agent with the FBI, who the movie Breach was about, is one of the most famous cases of ______.

A) ​espionage
B) ​voter fraud
C) ​treason
D) ​murder
Question
An act of disloyalty to one's nation.

A) Treason
B) Subversion
C) Sedition
D) Duplicity
Question
During WWII, any resistance of German efforts in Europe was viewed by the Nazi's as terrorism.
Question
An act that causes severe pain or suffering, whether physical or psychological, that is intentionally inflicted on a person for such purposes as obtaining a confession or information.

A) Torture
B) State anguish
C) Afflict
D) Political torts
Question
Which of the following is not one of Borum's cognitive stages for political crime?

A) ​It's just started.
B) ​It's not fair.
C) ​It's your fault.
D) ​You're evil.
Question
Retributive terrorist groups want to impose their social and religious code on others.
Question
Revolutionary terrorists use violence to frighten those in power and their supporters in order to replace the existing government with a regime that holds political or religious views of the group.
Question
Al-Qaeda, the group responsible for the 9/11 attacks, is an example of a retributive terrorist group.
Question
Following the 9/11 attacks, then President George W. Bush proposed the creation of a new cabinet-level agency called the Department of Homeland Security.
Question
Which of the following is not one of the four goals of political criminals in the text?

A) Economic
B) Profit
C) Intimidation
D) Conviction
Question
Terrorist attacks against failed states are traditionally less lethal than attacks against other nations because the failed states have no strong leadership, and therefore, no direct target of the terrorist acts.
Question
The Animal Liberation Front is a group of domestic terrorists who smuggle animals for genetic reasons from third-world countries to the United States for financial gain to support their larger mission of world dominance.
Question
This type of election fraud occurs when voters are scared away from polls because of threats.

A) Intimidation
B) Misinformation
C) Disruption
D) Vote buying
Question
Eco-terrorists are political terror groups involved in violent actions to protect the environment.
Question
Which of the following is not true about election fraud according to the text?

A) In some third-world nations' dictatorships, election fraud is the norm.
B) Election fraud has existed as a feature of political life since Roman times.
C) Election fraud was the third leading cause of arrests for U.S. politicians over the last two decades.
D) Flyers containing misleading information about opponents is a primary method of election fraud.
Question
Lone-actor terrorists do not belong to an organized group but act on their own, motivated by political, religious, or social beliefs.
Question
Terrorists who report that they are products of dysfunctional families in which the father was not present or was distant or cold belong to view of terrorism referred to as ______.

A) ​domestic conflict view
B) ​family opposition view
C) ​domestic opposition view
D) ​family conflict view
Question
On October 26, 2001, Congress passed the ______________ giving U.S. Law Enforcement a freer hand at investigating terrorists.

A) ​USA Patriot Act
B) ​U.S. Anti-Terrorism Act
C) ​Federal Lautenberg Act
D) ​George W. Bush Exemption Act
Question
Which of the following is false about the nationalist terrorism group Hezbollah?

A) ​Hezbollah is from the Arabic term "party of God."
B) ​A primary goal is to drive Israeli troops out of Lebanon
C) ​United States and its allies have supported Hezbollah in Syria and the Middle East.
D) ​Hezbollah members follow a distinct version of Shia ideology developed in Iran.
Question
The origin of the term terrorism, the French Revolution's __________________ began in 1795 and was initiated by the revolutionary government.

A) ​Reign of terror
B) ​Trail of tears
C) ​Time of treachery
D) ​Time of terror
Question
Syria, Libya, and Iraq have all lost control of their own territory and have been unable to provide services and protection to their citizens with the rise of ISIS. These countries would be examples of a ______.

A) ​failed state
B) ​freed state
C) ​collapsed state
D) ​crisis state
Question
Which of the following is not true about Lone-actor terrorists?

A) ​All suffer from either depression or a mental disorder.
B) The Boston bombing is considered a lone-actor event.
C) ​Many lone-actors have previous military experience.
D) ​Many see themselves as outcasts or socially unequal.
Question
The National Consortium for the Study of Terrorism and Responses to Terrorism's (START) most recent data (2013) revealed all of the following except ______.

A) more than 65 percent of terrorist acts occurred in Europe and South America
B) about 12,000 terrorist attacks occur a year
C) terrorism is rapidly evolving
D) the Syrian conflict empowered ISIL to expand its cross-border operations into Iraq
Question
Terrorism which occurs when a repressive government regime forces its citizens into obedience?

A) State-sponsored terrorism
B) Lone wolf terrorism
C) Criminal terrorism
D) Retributive terrorism
Question
The view that holds that terrorists join networks of terror because they are homesick while in foreign nations and seek out people with similar backgrounds whom they often find in mosques or other religious settings.

A) Socialization view
B) Ideological view
C) Domestication view
D) Nationalistic view
Question
Which of the following terrorist groups want to impose their social and religious code of ethics on others?

A) ​Retributive
B) ​Political
C) Nationalist
D) ​Criminal
Question
Which of the following terms originated from a rebellion against French troops in the early 1800s?

A) Guerilla
B) Coup
C) Terrorist
D) Insurgent
Question
Armed military bands that use hit-and-run terror tactics to destabilize the existing government are known as _____.

A) ​profiteers
B) ​insurrectionairies
C) ​mutineers
D) ​guerillas
Question
David Fahey, a businessman in a medium-sized Ohio town, decides to run for city council. While he has earned a masters degree, he is married, has three sons, and is a respected member of society. He fears he may lose the upcoming city council election to a new comer who recently moved back to town after establishing himself in South Carolina. While it is known that David regularly cheats on his wife, he has not been known to be unethical in any other aspects of his life. Answer the following questions. David hires his best friend, John, to call in a bomb threat on election day to a precinct where his rival, Keith Joseph, is supposed to get the majority of support. This is an example of ______.​

A) ​disruption
B) ​intimidation
C) ​misinformation
D) ​none of the above
Question
Which of the following is not one of the steps required to defeat jihadist groups according to the Rand Corporation?

A) Create a political infrastructure capable of quick-strike retaliation of terrorism.
B) Attack the ideological underpinnings of global jihadism.
C) Sever ideological and other links between terrorist groups.
D) Strengthen the capabilities of front-line states.
Question
Which of the following is not one of the political terrorist groups listed in the text?

A) ​Boko Haram
B) ​Posse Comitatus
C) ​Aryan Nation
D) ​Ku Klux Klan
Question
Many argue that the government and law enforcement should be allowed to use any means necessary to subdue terrorists or to prevent the destruction of lives and property in an example called the ______.

A) ​ticking bomb scenario
B) ​Dzhokhar principle
C) ​at -all-costs- scenario
D) ​exception clause
Question
The Animal Liberation Front (ALF) would fall into which of the following categories of terrorism?

A) ​Political
B) ​Revolutionary
C) ​Nationalist
D) ​Retributive
Question
Eco-terrorist groups' primary goal is ______.

A) ​to overthrow the current political government
B) ​commit common-law crimes in order for profit to in turn spread their message
C) ​promote hate or religious and ethnic groups
D) ​protection of the environment
Question
Government official charged with coordinating data from the nations' primary intelligence gathering agencies ​

A) ​Director of National Intelligence
B) ​Director of Joint Agency Alignment
C) ​Supervisor of Internal Affairs
D) ​Administrator of Terrorism Taskforce
Question
The Department of Homeland Security includes which of the following components?

A) Border security
B) Emergency preparedness and response
C) Chemical and biological countermeasures
D) All of the above
Question
In regard to election fraud, ______________ occurs when a bomb threat is called into a polling place or outright sabotage of polling places results in loss of votes or voter turnout.
Question
Famed social commentator Alan Dershowitz proposed the creation of a ________________ that can only be issued by a judge in cases where there is absolute need to obtain immediate information in order to save lives.
Question
__________________ crime refers to any illegal acts that are designed to undermine an existing government and threaten its survival.
Question
Of all of the state political crimes, the use of __________ to gain information from suspected political criminals is perhaps the most notorious.
Question
In 2014, five Chinese men were indicted for stealing thousands of sensitive internal communications between U.S. Steel Corporations in a crime referred to as ___________________ espionage.
Question
An act of disloyalty to one's nation or state is defined as __________________.
Question
Political criminals who fall under the goal of _______________ are motivated by altruism; they truly believe their crimes will benefit society.
Question
The illegal use of force against innocent people to achieve a political objective is called ____________________.
Question
The U.S. Criminal Code codifies ________ as whoever, owing allegiance to the United States, levies war against them or adheres to their enemies, giving them aid and comfort within the United States or elsewhere.
Question
The typical goal of an ____________ is to confront the existing government for control of all or a portion of its territory, or force political concessions in sharing political power.
Question
The origin of the word terrorism comes from the French Revolution's ___________________.
Question
Armed military bands known as _______________, typically are located in rural areas and use hit-and-run terror tactics to destabilize the existing government.
Question
When political operatives try to shape the outcome of an election by busing in ineligible voters from other districts, this process is known as_______________​.
Question
David wins the election. As a result, he part of a group of councilmen who vote to log an area of town to create green space to entice potential businesses to move to town. In doing so, the habitat of a local endangered turtle population has had to be relocated. The relocation has caught the eye of a radical group of ____________ who are determined to protect the environment and animals at any cost.

A) ​eco-terrorists
B) ​nationalist terrorists
C) ​state-sponsored terrorists
D) ​lone-actor terrorists
Question
This group, ____________, began as an insurgency, raiding Iraq and Syria and occupying major cities with the primary goal of creating a caliphate, based on a very conservative Islamic religious code.
Question
While some political crimes are committed by people who oppose the state, others are perpetrated by state authorities against the people they are supposed to serve; this is referred to as ________________________​.
Question
David works for a large steel company in Ohio and regularly uses his private email to communicate company secrets at home and abroad. His run for political office has brought attention to David and his email account is hacked by a German company looking to steal trade secrets. This is an example of ______.

A) ​industrial espionage
B) ​treason
C) ​a political crime
D) ​a state political crime
Question
_________________ refers to any illegal interference with the political process, especially those which affect vote calculations.
Question
A scenario, referred to as the _________________________ scenario, argues that torture can perhaps be justified if the government discovers that a captured terrorist knows the whereabouts of an explosive device.
Question
The process of obtaining information about a government, organization, or society that is considered secret or confidential without the permission of the holder of the information is known as ____________________​.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/88
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Political Crime and Terrorism
1
One of the biggest problems with deterring and penalizing election fraud is that U.S. criminal code fails to mention election fraud as a specific crime, and instead includes it with white-collar crimes and green-collar crimes.
False
2
According to research in the text, most political criminals do not consider themselves antisocial but instead patriotic and altruistic.
True
3
Treason is the only crime mentioned in the U.S. Constitution.
True
4
In regard to the goals of political crimes, the motive for profit-related crimes usually includes the selling of state secrets for personal enrichment or trafficking in stolen arms or munitions.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
5
Espionage is the practice of obtaining information about a government, organization, or society that is considered secret or confidential without the permission of the holder of the information.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
6
Some political criminals plot to overthrow the existing government and replace it with one that holds views they find more acceptable.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
7
Al-Qaeda and Hamas are examples of revolutionary groups.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
8
The use of the word terrorism is first traced to the American Revolution, when the nontypical patterns of warfare from American colonists were said to "terror" the British troops who fought in traditional military fashion.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
9
Revolution comes from the Latin word revere, meaning "one who changes."
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
10
What separates a revolution from a coup is that revolutions rely on armed forces and violence, while coups traditionally are nonviolent?
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
11
Election fraud can include the calling in of a bomb threat in polling places known to favor the opposing party. ​
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
12
An example of foreign industrial espionage would be the targeting of U.S. firms for technology that would strengthen their foreign defense capabilities.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
13
An insurgency is traditionally defined as a political movement that may use terror tactics to achieve its goals.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
14
Because of international law, election fraud has been eliminated in all countries except third-world dictatorships.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
15
Industrial espionage by foreign agents' efforts has hurt the United States specifically by eroding the U.S. military advantage.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
16
State political crimes are perpetrated by state authorities against the people they are supposed to serve.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
17
The term terrorist is often used interchangeably with the term guerrilla, but the terms are quite different.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
18
Political crimes can include both violent and nonviolent crimes.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
19
Former Vice President of the United States, Aaron Burr, was arrested and found not-guilty of treason because he lacked an overt act and simply planning to overthrow the government is not equal to treason.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
20
Before 1996, there was no federal statute that explicitly penalized industrial espionage.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
21
Robert Hanssen, a former FBI counterintelligence officer, was arrested in 2001 for selling secrets to which nation? Hanssen's case is considered one the most severe forms of espionage reported and was part of 2007 film titled The Breach.

A) ​Russia
B) ​China
C) ​Germany
D) ​North Korea
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is not one of the ways listed in the text that foreign governments attempt to infiltrate businesses in attempts to gain sensitive information?

A) Data mining U.S. companies with headquarters abroad
B) Conferences and trade shows
C) Official foreign visitors
D) Exploitation of joint research
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
23
Legislation giving U.S. law enforcement agencies a freer hand to investigate and apprehend suspected terrorists is called the USA Patriot Act.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
24
Which of the following is not true of treason?

A) There have actually been less than 40 prosecutions for treason in the entire history of the United States.
B) Helping an enemy in the time of war is considered a war crime and is not treason.
C) Many nations have applied the death penalty for treason.
D) Treason is the only crime mentioned in the U.S. Constitution.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
25
Robert Hanssen, a former counterintelligence agent with the FBI, who the movie Breach was about, is one of the most famous cases of ______.

A) ​espionage
B) ​voter fraud
C) ​treason
D) ​murder
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
26
An act of disloyalty to one's nation.

A) Treason
B) Subversion
C) Sedition
D) Duplicity
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
27
During WWII, any resistance of German efforts in Europe was viewed by the Nazi's as terrorism.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
28
An act that causes severe pain or suffering, whether physical or psychological, that is intentionally inflicted on a person for such purposes as obtaining a confession or information.

A) Torture
B) State anguish
C) Afflict
D) Political torts
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following is not one of Borum's cognitive stages for political crime?

A) ​It's just started.
B) ​It's not fair.
C) ​It's your fault.
D) ​You're evil.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
30
Retributive terrorist groups want to impose their social and religious code on others.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
31
Revolutionary terrorists use violence to frighten those in power and their supporters in order to replace the existing government with a regime that holds political or religious views of the group.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
32
Al-Qaeda, the group responsible for the 9/11 attacks, is an example of a retributive terrorist group.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
33
Following the 9/11 attacks, then President George W. Bush proposed the creation of a new cabinet-level agency called the Department of Homeland Security.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is not one of the four goals of political criminals in the text?

A) Economic
B) Profit
C) Intimidation
D) Conviction
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
35
Terrorist attacks against failed states are traditionally less lethal than attacks against other nations because the failed states have no strong leadership, and therefore, no direct target of the terrorist acts.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
36
The Animal Liberation Front is a group of domestic terrorists who smuggle animals for genetic reasons from third-world countries to the United States for financial gain to support their larger mission of world dominance.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
37
This type of election fraud occurs when voters are scared away from polls because of threats.

A) Intimidation
B) Misinformation
C) Disruption
D) Vote buying
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
38
Eco-terrorists are political terror groups involved in violent actions to protect the environment.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is not true about election fraud according to the text?

A) In some third-world nations' dictatorships, election fraud is the norm.
B) Election fraud has existed as a feature of political life since Roman times.
C) Election fraud was the third leading cause of arrests for U.S. politicians over the last two decades.
D) Flyers containing misleading information about opponents is a primary method of election fraud.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
40
Lone-actor terrorists do not belong to an organized group but act on their own, motivated by political, religious, or social beliefs.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
41
Terrorists who report that they are products of dysfunctional families in which the father was not present or was distant or cold belong to view of terrorism referred to as ______.

A) ​domestic conflict view
B) ​family opposition view
C) ​domestic opposition view
D) ​family conflict view
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
42
On October 26, 2001, Congress passed the ______________ giving U.S. Law Enforcement a freer hand at investigating terrorists.

A) ​USA Patriot Act
B) ​U.S. Anti-Terrorism Act
C) ​Federal Lautenberg Act
D) ​George W. Bush Exemption Act
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following is false about the nationalist terrorism group Hezbollah?

A) ​Hezbollah is from the Arabic term "party of God."
B) ​A primary goal is to drive Israeli troops out of Lebanon
C) ​United States and its allies have supported Hezbollah in Syria and the Middle East.
D) ​Hezbollah members follow a distinct version of Shia ideology developed in Iran.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
44
The origin of the term terrorism, the French Revolution's __________________ began in 1795 and was initiated by the revolutionary government.

A) ​Reign of terror
B) ​Trail of tears
C) ​Time of treachery
D) ​Time of terror
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
45
Syria, Libya, and Iraq have all lost control of their own territory and have been unable to provide services and protection to their citizens with the rise of ISIS. These countries would be examples of a ______.

A) ​failed state
B) ​freed state
C) ​collapsed state
D) ​crisis state
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following is not true about Lone-actor terrorists?

A) ​All suffer from either depression or a mental disorder.
B) The Boston bombing is considered a lone-actor event.
C) ​Many lone-actors have previous military experience.
D) ​Many see themselves as outcasts or socially unequal.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
47
The National Consortium for the Study of Terrorism and Responses to Terrorism's (START) most recent data (2013) revealed all of the following except ______.

A) more than 65 percent of terrorist acts occurred in Europe and South America
B) about 12,000 terrorist attacks occur a year
C) terrorism is rapidly evolving
D) the Syrian conflict empowered ISIL to expand its cross-border operations into Iraq
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
48
Terrorism which occurs when a repressive government regime forces its citizens into obedience?

A) State-sponsored terrorism
B) Lone wolf terrorism
C) Criminal terrorism
D) Retributive terrorism
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
49
The view that holds that terrorists join networks of terror because they are homesick while in foreign nations and seek out people with similar backgrounds whom they often find in mosques or other religious settings.

A) Socialization view
B) Ideological view
C) Domestication view
D) Nationalistic view
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following terrorist groups want to impose their social and religious code of ethics on others?

A) ​Retributive
B) ​Political
C) Nationalist
D) ​Criminal
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
51
Which of the following terms originated from a rebellion against French troops in the early 1800s?

A) Guerilla
B) Coup
C) Terrorist
D) Insurgent
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
52
Armed military bands that use hit-and-run terror tactics to destabilize the existing government are known as _____.

A) ​profiteers
B) ​insurrectionairies
C) ​mutineers
D) ​guerillas
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
53
David Fahey, a businessman in a medium-sized Ohio town, decides to run for city council. While he has earned a masters degree, he is married, has three sons, and is a respected member of society. He fears he may lose the upcoming city council election to a new comer who recently moved back to town after establishing himself in South Carolina. While it is known that David regularly cheats on his wife, he has not been known to be unethical in any other aspects of his life. Answer the following questions. David hires his best friend, John, to call in a bomb threat on election day to a precinct where his rival, Keith Joseph, is supposed to get the majority of support. This is an example of ______.​

A) ​disruption
B) ​intimidation
C) ​misinformation
D) ​none of the above
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is not one of the steps required to defeat jihadist groups according to the Rand Corporation?

A) Create a political infrastructure capable of quick-strike retaliation of terrorism.
B) Attack the ideological underpinnings of global jihadism.
C) Sever ideological and other links between terrorist groups.
D) Strengthen the capabilities of front-line states.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following is not one of the political terrorist groups listed in the text?

A) ​Boko Haram
B) ​Posse Comitatus
C) ​Aryan Nation
D) ​Ku Klux Klan
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
56
Many argue that the government and law enforcement should be allowed to use any means necessary to subdue terrorists or to prevent the destruction of lives and property in an example called the ______.

A) ​ticking bomb scenario
B) ​Dzhokhar principle
C) ​at -all-costs- scenario
D) ​exception clause
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
57
The Animal Liberation Front (ALF) would fall into which of the following categories of terrorism?

A) ​Political
B) ​Revolutionary
C) ​Nationalist
D) ​Retributive
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
58
Eco-terrorist groups' primary goal is ______.

A) ​to overthrow the current political government
B) ​commit common-law crimes in order for profit to in turn spread their message
C) ​promote hate or religious and ethnic groups
D) ​protection of the environment
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
59
Government official charged with coordinating data from the nations' primary intelligence gathering agencies ​

A) ​Director of National Intelligence
B) ​Director of Joint Agency Alignment
C) ​Supervisor of Internal Affairs
D) ​Administrator of Terrorism Taskforce
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
60
The Department of Homeland Security includes which of the following components?

A) Border security
B) Emergency preparedness and response
C) Chemical and biological countermeasures
D) All of the above
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
61
In regard to election fraud, ______________ occurs when a bomb threat is called into a polling place or outright sabotage of polling places results in loss of votes or voter turnout.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
62
Famed social commentator Alan Dershowitz proposed the creation of a ________________ that can only be issued by a judge in cases where there is absolute need to obtain immediate information in order to save lives.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
63
__________________ crime refers to any illegal acts that are designed to undermine an existing government and threaten its survival.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
64
Of all of the state political crimes, the use of __________ to gain information from suspected political criminals is perhaps the most notorious.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
65
In 2014, five Chinese men were indicted for stealing thousands of sensitive internal communications between U.S. Steel Corporations in a crime referred to as ___________________ espionage.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
66
An act of disloyalty to one's nation or state is defined as __________________.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
67
Political criminals who fall under the goal of _______________ are motivated by altruism; they truly believe their crimes will benefit society.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
68
The illegal use of force against innocent people to achieve a political objective is called ____________________.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
69
The U.S. Criminal Code codifies ________ as whoever, owing allegiance to the United States, levies war against them or adheres to their enemies, giving them aid and comfort within the United States or elsewhere.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
70
The typical goal of an ____________ is to confront the existing government for control of all or a portion of its territory, or force political concessions in sharing political power.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
71
The origin of the word terrorism comes from the French Revolution's ___________________.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
72
Armed military bands known as _______________, typically are located in rural areas and use hit-and-run terror tactics to destabilize the existing government.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
73
When political operatives try to shape the outcome of an election by busing in ineligible voters from other districts, this process is known as_______________​.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
74
David wins the election. As a result, he part of a group of councilmen who vote to log an area of town to create green space to entice potential businesses to move to town. In doing so, the habitat of a local endangered turtle population has had to be relocated. The relocation has caught the eye of a radical group of ____________ who are determined to protect the environment and animals at any cost.

A) ​eco-terrorists
B) ​nationalist terrorists
C) ​state-sponsored terrorists
D) ​lone-actor terrorists
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
75
This group, ____________, began as an insurgency, raiding Iraq and Syria and occupying major cities with the primary goal of creating a caliphate, based on a very conservative Islamic religious code.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
76
While some political crimes are committed by people who oppose the state, others are perpetrated by state authorities against the people they are supposed to serve; this is referred to as ________________________​.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
77
David works for a large steel company in Ohio and regularly uses his private email to communicate company secrets at home and abroad. His run for political office has brought attention to David and his email account is hacked by a German company looking to steal trade secrets. This is an example of ______.

A) ​industrial espionage
B) ​treason
C) ​a political crime
D) ​a state political crime
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
78
_________________ refers to any illegal interference with the political process, especially those which affect vote calculations.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
79
A scenario, referred to as the _________________________ scenario, argues that torture can perhaps be justified if the government discovers that a captured terrorist knows the whereabouts of an explosive device.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
80
The process of obtaining information about a government, organization, or society that is considered secret or confidential without the permission of the holder of the information is known as ____________________​.
Unlock Deck
Unlock for access to all 88 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 88 flashcards in this deck.