Deck 10: Tools of the Trade: Tactics and Targets of Terrorists

Full screen (f)
exit full mode
Question
Biological agents include all of the following, except

A) Ebola.
B) anthrax.
C) smallpox.
D) phosgene.
Use Space or
up arrow
down arrow
to flip the card.
Question
In the United States, real-time consequences of a mass-casualty chemical or biological attack

A) have been experienced on many occasions.
B) are occasionally experienced.
C) have never been experienced.
D) are expected to occur at any moment.
Question
The concept of a "martyr nation" as a doctrine for engagement is an example of which of the following?

A) total war
B) asymmetrical warfare
C) the just war
D) none of these
Question
Weapons of mass destruction include which of the following?

A) rocket-propelled grenades
B) sarin
C) precision-guided munitions
D) Semtex
Question
Typical terrorist objectives include all of the following, except:

A) publicizing the cause.
B) changing the existing order.
C) building alliances with leaders.
D) creating a revolutionary environment.
Question
Which of the following observations is most accurate concerning asymmetrical warfare?

A) It utilizes principles of conventional conflict.
B) There is no True definition of this type of warfare.
C) It utilizes unexpected, unpredictable, and unconventional methods of political violence.
D) Terrorists try to utilize other methods of political violence.
Question
The Engineer

A) was a proficient bomb-maker for Hamas.
B) was killed when his cell phone exploded.
C) successfully thwarted airport security measures.
D) both "was a proficient bomb-maker for Hamas" and "was killed when his cell phone exploded."
Question
Terrorists have been known to "declare victory" using which of the following criteria?

A) acquiring global media and political attention
B) provoking the state to overreact
C) disrupting normal routines of a society
D) all of these
Question
Which of the following statements most accurately describes the use of the Internet and social networking media by extremists?

A) Terrorists rarely access the Internet because of possible surveillance by intelligence agencies.
B) Tweeting, texting, and other media platforms are used to record and tout claimed successes.
C) There exists a rudimentary and unsophisticated use of these technologies by extremists.
D) These technologies are irrelevant to terrorist operations.
Question
Threats to cybersecurity include which of the following?

A) cyber disruption
B) cyber sabotage
C) hacktivism
D) both "cyber disruption" and "cyber sabotage"
Question
Which of the following objectives have been suggested to explain modern terrorists' use of high-yield weapons to maximize casualties?

A) such tactics please God
B) such tactics attract attention
C) such tactics influence enemies
D) all of these
Question
Symbolic targets include

A) passenger carriers.
B) embassies.
C) famous people.
D) all of these.
Question
Threats to cybersecurity include which of the following?

A) cyberterrorism
B) cyberattack
C) cyber sabotage
D) both "cyberterrorism" and "cyberattack"
Question
The netwar theory is an important concept in the new terrorist environment because it refers to which of the following?

A) new and evolving modes of cyber warfare
B) addressing the threat of unprecedented levels of cyberterrorism
C) a new mode of conflict using network forms of organization and related strategies and technologies attuned to the information age
D) both "new and evolving modes of cyber warfare" and "addressing the threat of unprecedented levels of cyberterrorism"
Question
Which of the following statements is most accurate regarding the use of new technologies by extremists in the era of the New Terrorism?

A) The Internet, e-mail, and social networking media are rarely used by extremists interested in the terrorist trade.
B) The Internet, e-mail, and social networking media are used to send instructions about overall goals, specific tactics, new bomb-making techniques, and other facets of the terrorist trade.
C) The Internet, e-mail, and social networking media are easily "hacked" by counterterrorist agencies.
D) There is little evidence that the Internet, e-mail, and social networking media are used by extremists.
Question
Common explosives include all of the following, except

A) Composite-4.
B) ANFO.
C) Anthrax.
D) Semtex.
Question
Verified cyberattacks

A) are very uncommon and relatively ineffective.
B) began to occur very recently and have been adequately managed.
C) are rarely reported for security reasons.
D) began to occur in the late 1990s and have become more destructive over time.
Question
The King David Hotel bombing arguably led to events that

A) ended British occupation of Palestine.
B) ended Spain's involvement in the Iraq war.
C) ended the U.S. peacekeeping mission in Lebanon.
D) none of these.
Question
Conventional weapons include which of the following?

A) submachine guns
B) mustard gas
C) radiological weapons
D) biological agents
Question
Terrorist threat scenarios posit that terrorists

A) can easily obtain chemical and biological agents.
B) can easily manufacture chemical and biological agents.
C) can feasibly obtain chemical and biological agents.
D) have already constructed many chemical and biological weapons.
Question
What is the purpose of "signature methods?"
Question
In your opinion, what is the most likely threat scenario for the use of biological weapons?
Question
The purpose of a dirty bomb is to poison water supplies.
Question
Discuss the threat from asymmetrical warfare.
Question
Discuss how lone-wolf extremists could plausibly obtain explosive compounds.
Question
Asymmetrical warfare involves predictable methods of engagement.
Question
A Molotov cocktail is a toxic poison.
Question
Mustard gas is a blistering agent which has been historically produced in large quantities.
Question
In what way is "armed propaganda" a weapon?
Question
In your opinion, what is the most likely threat scenario for the use of nuclear weapons?
Question
The threat from weapons of mass destruction is that they are easily obtained.
Question
In your opinion, what is the most likely threat scenario for the use of radiological weapons?
Question
How can the effectiveness of a terrorist incident be measured?
Question
Semtex is a type of plastic explosive.
Question
In your opinion, what is the most likely threat scenario for the use of chemical weapons?
Question
The Internet has yet to become an effective mode of communication between terrorists.
Question
The King David Hotel bombing was an ineffective attack by Islamist extremists against tourists.
Question
Briefly describe netwar. What is the threat from netwar?
Question
Composite-4 was a terrorist organization in the United Kingdom.
Question
Accurate knowledge about the construction of bombs is difficult to obtain.
Question
The gun and the bomb are traditional terrorist weapons that still predominate in the arsenals of violent extremists. How have these weapons been wielded in the era of the New Terrorism? Explain how the threat from these traditional weapons has evolved in the modern era.
Question
What is "armed propaganda?" How is it used by terrorists? Why is it used by terrorists? What is the role of symbolism? Explain your answers.
Question
Discuss the effectiveness of terrorism within the contexts of the King David Hotel bombing and the bombing of the Marine and French paratrooper barracks in Beirut. Compare and contrast these incidents. What lessons can be learned from the perspective of terrorists? What lessons can be learned from the perspective of their targeted interests?
Question
Why do terrorists seek to provoke their adversaries into overreacting, especially when such adversaries are often vastly more powerful than themselves? Discuss the logic of this objective from the perspective of violent extremists.
Question
Discuss the threat from suicide attacks. In your opinion, why did suicide attacks become a common tactic in some conflicts? What impact has the concept of martyrdom had on such attacks?
Question
Discuss the feasibility of obtaining weapons of mass destruction by terrorists. Which weapons are more easily obtained? Which weapons are less easily obtained? How would they be obtained in the first place? Explain your answer.
Question
What is the threat from cyberterrorism? How can nations defend themselves?
Question
In your opinion, what lessons were drawn by insurgents from successful bomb attacks and other incidents against the United States in places like Beirut and Mogadishu?
Question
Explain the symbolic selection of targets by terrorists. Describe symbols which are most favored by terrorists.
Question
In your opinion, what are the likely implications of the availability of information on the Internet from the perspective of extremists?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Tools of the Trade: Tactics and Targets of Terrorists
1
Biological agents include all of the following, except

A) Ebola.
B) anthrax.
C) smallpox.
D) phosgene.
D
2
In the United States, real-time consequences of a mass-casualty chemical or biological attack

A) have been experienced on many occasions.
B) are occasionally experienced.
C) have never been experienced.
D) are expected to occur at any moment.
C
3
The concept of a "martyr nation" as a doctrine for engagement is an example of which of the following?

A) total war
B) asymmetrical warfare
C) the just war
D) none of these
B
4
Weapons of mass destruction include which of the following?

A) rocket-propelled grenades
B) sarin
C) precision-guided munitions
D) Semtex
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Typical terrorist objectives include all of the following, except:

A) publicizing the cause.
B) changing the existing order.
C) building alliances with leaders.
D) creating a revolutionary environment.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following observations is most accurate concerning asymmetrical warfare?

A) It utilizes principles of conventional conflict.
B) There is no True definition of this type of warfare.
C) It utilizes unexpected, unpredictable, and unconventional methods of political violence.
D) Terrorists try to utilize other methods of political violence.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The Engineer

A) was a proficient bomb-maker for Hamas.
B) was killed when his cell phone exploded.
C) successfully thwarted airport security measures.
D) both "was a proficient bomb-maker for Hamas" and "was killed when his cell phone exploded."
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
Terrorists have been known to "declare victory" using which of the following criteria?

A) acquiring global media and political attention
B) provoking the state to overreact
C) disrupting normal routines of a society
D) all of these
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following statements most accurately describes the use of the Internet and social networking media by extremists?

A) Terrorists rarely access the Internet because of possible surveillance by intelligence agencies.
B) Tweeting, texting, and other media platforms are used to record and tout claimed successes.
C) There exists a rudimentary and unsophisticated use of these technologies by extremists.
D) These technologies are irrelevant to terrorist operations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Threats to cybersecurity include which of the following?

A) cyber disruption
B) cyber sabotage
C) hacktivism
D) both "cyber disruption" and "cyber sabotage"
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following objectives have been suggested to explain modern terrorists' use of high-yield weapons to maximize casualties?

A) such tactics please God
B) such tactics attract attention
C) such tactics influence enemies
D) all of these
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Symbolic targets include

A) passenger carriers.
B) embassies.
C) famous people.
D) all of these.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Threats to cybersecurity include which of the following?

A) cyberterrorism
B) cyberattack
C) cyber sabotage
D) both "cyberterrorism" and "cyberattack"
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
The netwar theory is an important concept in the new terrorist environment because it refers to which of the following?

A) new and evolving modes of cyber warfare
B) addressing the threat of unprecedented levels of cyberterrorism
C) a new mode of conflict using network forms of organization and related strategies and technologies attuned to the information age
D) both "new and evolving modes of cyber warfare" and "addressing the threat of unprecedented levels of cyberterrorism"
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following statements is most accurate regarding the use of new technologies by extremists in the era of the New Terrorism?

A) The Internet, e-mail, and social networking media are rarely used by extremists interested in the terrorist trade.
B) The Internet, e-mail, and social networking media are used to send instructions about overall goals, specific tactics, new bomb-making techniques, and other facets of the terrorist trade.
C) The Internet, e-mail, and social networking media are easily "hacked" by counterterrorist agencies.
D) There is little evidence that the Internet, e-mail, and social networking media are used by extremists.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Common explosives include all of the following, except

A) Composite-4.
B) ANFO.
C) Anthrax.
D) Semtex.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Verified cyberattacks

A) are very uncommon and relatively ineffective.
B) began to occur very recently and have been adequately managed.
C) are rarely reported for security reasons.
D) began to occur in the late 1990s and have become more destructive over time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
The King David Hotel bombing arguably led to events that

A) ended British occupation of Palestine.
B) ended Spain's involvement in the Iraq war.
C) ended the U.S. peacekeeping mission in Lebanon.
D) none of these.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Conventional weapons include which of the following?

A) submachine guns
B) mustard gas
C) radiological weapons
D) biological agents
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Terrorist threat scenarios posit that terrorists

A) can easily obtain chemical and biological agents.
B) can easily manufacture chemical and biological agents.
C) can feasibly obtain chemical and biological agents.
D) have already constructed many chemical and biological weapons.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
What is the purpose of "signature methods?"
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
In your opinion, what is the most likely threat scenario for the use of biological weapons?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
The purpose of a dirty bomb is to poison water supplies.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Discuss the threat from asymmetrical warfare.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Discuss how lone-wolf extremists could plausibly obtain explosive compounds.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Asymmetrical warfare involves predictable methods of engagement.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
A Molotov cocktail is a toxic poison.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Mustard gas is a blistering agent which has been historically produced in large quantities.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
In what way is "armed propaganda" a weapon?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
In your opinion, what is the most likely threat scenario for the use of nuclear weapons?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
The threat from weapons of mass destruction is that they are easily obtained.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
In your opinion, what is the most likely threat scenario for the use of radiological weapons?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
How can the effectiveness of a terrorist incident be measured?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Semtex is a type of plastic explosive.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
In your opinion, what is the most likely threat scenario for the use of chemical weapons?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
The Internet has yet to become an effective mode of communication between terrorists.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
The King David Hotel bombing was an ineffective attack by Islamist extremists against tourists.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Briefly describe netwar. What is the threat from netwar?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Composite-4 was a terrorist organization in the United Kingdom.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Accurate knowledge about the construction of bombs is difficult to obtain.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
The gun and the bomb are traditional terrorist weapons that still predominate in the arsenals of violent extremists. How have these weapons been wielded in the era of the New Terrorism? Explain how the threat from these traditional weapons has evolved in the modern era.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What is "armed propaganda?" How is it used by terrorists? Why is it used by terrorists? What is the role of symbolism? Explain your answers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Discuss the effectiveness of terrorism within the contexts of the King David Hotel bombing and the bombing of the Marine and French paratrooper barracks in Beirut. Compare and contrast these incidents. What lessons can be learned from the perspective of terrorists? What lessons can be learned from the perspective of their targeted interests?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Why do terrorists seek to provoke their adversaries into overreacting, especially when such adversaries are often vastly more powerful than themselves? Discuss the logic of this objective from the perspective of violent extremists.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Discuss the threat from suicide attacks. In your opinion, why did suicide attacks become a common tactic in some conflicts? What impact has the concept of martyrdom had on such attacks?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Discuss the feasibility of obtaining weapons of mass destruction by terrorists. Which weapons are more easily obtained? Which weapons are less easily obtained? How would they be obtained in the first place? Explain your answer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
What is the threat from cyberterrorism? How can nations defend themselves?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
In your opinion, what lessons were drawn by insurgents from successful bomb attacks and other incidents against the United States in places like Beirut and Mogadishu?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Explain the symbolic selection of targets by terrorists. Describe symbols which are most favored by terrorists.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
In your opinion, what are the likely implications of the availability of information on the Internet from the perspective of extremists?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.