CEE sg
1. In February 2015, Hackers are revealed to have stolen up to _______ from more than 100 banks in 30 countries since at least late 2013
1 billion
4. Biological weapons have received less attention but also are outlawed by an international treaty, the ____________, which went into force in 1975.
1982 biological weapons convention
7. In what year did the US Navy SEALS kill Osama Bin Laden?
2011
11. The United States and other nations continued to develop both biological and chemical agents. "Unfortunately, a real arms race developed between the Soviets and the U.S. over who could develop the deadliest chemical weapons. Further laboratory development went on for more than __ years after World War II.
25
3. Name three emergency supplies FEMA recommends having on hand in case of a disaster.
3-day supply of nonperishable food and water, Battery powered radio, First-aid kit
2. Terrorism prevention now receives the lion's share of federal emergency-preparedness dollars. In 2005 some $180 million was allocated nationwide for state and local governments to fund emergency management, but it was in the form of _______ grants, which require local governments to supply a dollar for every federal dollar received. At the same time, the federal government dispersed $2.3 billion for anti-terrorism measures, with no matching funds required
50-50 matching
4. __________ of Americans say limits on government collection of telephone and Internet data are inadequate, according to a recent poll.
65%
1. Some experts believe cyber intrusions actually occur even more often, because the host often is unaware of an attack, and many organizations are loath to report cyber attacks. The General Accounting Office (GAO) estimates that up to _____ of all computer security incidents may go unreported
80%
2. Nearly ________ of the world's declared chemical weapons have been destroyed since the Chemical Weapons Convention went into effect in 1997. _______ has the world's largest remaining stockpile of chemical weapons, about three times more than the United States.
82%, russia
3. ____ of data breaches involved credit card information, and about one-third involved personal information
84%
9. What is one of the most likely agents to be used in a biological attack?
Anthrax
5. Name three of the six countries suspected of having chemical weapons.
China, Egypt, Iran, Israel, North Korea, Sudan
2. _______________ is a soft-line classification that allows policy makers to develop a range of options that do not involve the use of force or other repressive methods.
Conciliatory responses
10. The first international treaty on cybercrime, the ________, went into effect in 2004 and was signed by the United States in 2006. But many of the countries that are often havens for cybercriminals, including Russia and China, are not a party to the treaty
Council of Europe Convention on Cybercrime
5. While ____ already operates several cybersecurity programs, such as the U.S. Computer Emergency Readiness Team (US-CERT), it recently launched two major efforts to enhance cybersecurity. It is working with representatives from state and local governments, as well as the private sector, to develop a National Cyber Incident Response Plan (NCIRP).
DHS
9. The first major Internet virus, the Morris worm, appeared in 1988. Named after its creator, 23-year-old Cornell University doctoral student Robert T. Morris. It was not intended to harm computers or steal data, but the virus quickly spread to other computers, ultimately causing significant Internet slowdowns and sending alarms through the cybercommunity. Partly in response to the Morris worm, Carnegie Mellon University's Software Engineering Institute, with federal funding from the _____ founded the CERT (Computer Emergency Response Team)
Defense Advanced Research Projects Agency (DARPA)
8. With the __________, Congress took another tack, legislating protections for data in transit. In 1994, the Communications Assistance for Law Enforcement Act required Internet service providers to provide capabilities for law enforcement to perform electronic surveillance of individuals. Such surveillance would still have to meet requirements for warrants specified under ECPA
Electronic Communications Privacy Act of 1986
7. The USA PATRIOT Act significantly expanded law enforcement's investigative powers under the ___________ which had been enacted in response to the inappropriate use of wiretaps by the administration of President Richard Nixon. This act was intended to serve as a "firewall between foreign and domestic intelligence gathering". By separating the two types of electronic surveillance, foreign and domestic, it was designed to preserve Fourth Amendment protections for U.S. citizens in criminal cases
FISA 1978
3. Chemical weapons have been considered unacceptable by the global community since the widespread use of poison gases in World War I killed or wounded thousands of soldiers. The __________ banned them in 1928, and although scattered exceptions have occurred, the convention and the even stronger 1993 accord have largely kept chemical weapons off the world's battlefields
Geneva protocol
6. The FBI is not new to the fight in cybersecurity. Nearly 15 years ago, it launched the _______ program, aimed at building government-private sector partnerships to reduce cyber threats. The Secret Service's flagship ________ has more than 1,100 special agents trained in cybersecurity deployed in 98 offices worldwide. The agency was also mandated by the USA Patriot Act in 2001 to establish a nationwide network of Electronic Crimes Task Forces (ECTFs).
InfraGard, Electronic Crimes Special Agent Program (ECSAP)
3. The overall objective of legalistic responses is to promote the rule of law and regular legal proceedings. ___________ refers to the use of law enforcement agencies and criminal investigative techniques in the prosecution of suspected terrorists. Counterterrorist laws attempt to criminalize terrorist behavior. __________ relies on cooperation among states. Those who are parties to international agreements attempt to combat terrorists by permitting them no refuge or sanctuary for their behavior. In some cases, terrorists may be brought before international tribunals
Law enforcement , International Law
4. ___________ are defined as the recognized and official armed forces of a nation. __________ are defined as irregular armed units or individuals who are supported or organized by regimes
Military assets , Paramilitary assets
7. What are some of the main chemical and biological agents that have been or could be used in weapons?
Mustard Gas, Sarin, VX, Anthrax, Smallpox, Pneumonic Plague
10. In 1952, Truman created the __________ within the Defense Department. A descendant of the "Black Chamber" of the 1920s, its job was to coordinate the military's signals intelligence operations. It was highly secretive and its existence wasn't officially acknowledged until 1975
NSA
9. On Jan. 8, 2008, President Bush followed up on Byzantine Foothold (a classified effort to track and neutralize attacks on critical networks) by issuing _________, which called for the creation of Comprehensive National Cybersecurity Initiative (CNCI), which established a National Cyber Security Center within the Department of Homeland Security.
National Security Presidential Directive 54
12. What did the Intelligence Reform and Terrorism Prevention Act create?
ODNI, an umbrella organization with the goal of improving communication and coordination among the 16 intelligence agencies.
5. What is the difference between punitive and preemptive strikes?
Punitive strikes: attacks launched as reprisals against terrorists for incidents that have already taken place. Preemptive strikes: attacks undertaken to hurt terrorist prior to a terrorist incident.
8. What were some of the major provisions included in the USA PATRIOT Act?
Roving wiretaps, "Sneak-and-peek", National search warrants, Detention, Wiretaps and purpose of investigation, Criminal penalties raised, Bioterrorism, Monitoring computers, Intelligence sharing, Money Laundering, Shell banks, Sunset provisions
1. What are two examples of military and paramilitary repressive options?
Suppression campaigns and Covert operations
10. Name three infamous cases of domestic counterterrorism activities in the United States.
The Palmer Raids, Japanese Internment, More Red Scares: House Un-American Activities Committee and McCarthyism
6. Why do many organizations forgo reporting computer hackings to the police?
To avoid negative publicity
4. A government computer consultant who asked not to be identified agrees that great potential exists for destructive attacks. "Give me an organization, and I can find ways to destroy it," he says. He would need only a couple of years for planning and reconnaissance with a small, trusted team and a couple of million dollars to destroy a system, he says. "It's easier to destroy something than create it," he adds. "The _________ is incredibly vulnerable and is getting more so with every passing day."
US infrastructure
9. The Oklahoma City bombing on April 19, 1995, raised questions about FEMA's role in responding to terrorist attacks. Debates raged among officials at FEMA and the Justice and Defense departments over who should be the first-responder — fire, police, emergency management or emergency medical services? Terrorism was part of FEMA's ______ approach to emergency management, but it lacked the resources and technologies to address specific terrorism issues such as weapons of mass destruction.
all hazards
6. Preparations for the end of the world have been features of religions and civilizations for millennia. The ancient Hebrews expected the ______ (from the Greek word for "revelation"), leading to judgment day, a concept later adopted by Christians and Muslims
apocalypse
11. Under President John F. Kennedy, the covert action program suffered a setback during the failed ________ invasion of Cuba in 1961. A force of Cuban expatriates trained and armed by the CIA invaded the island, aiming to remove communist leader Fidel Castro from power. However, the CIA was unable to provide the necessary U.S. military support.
bay of pigs
13. The _________, established by President George W. Bush in 2003, now has sensors that analyze the air for dangerous microorganisms in 30 U.S. cities and is used during large spectator events. The U.S now has the personnel and supplies to deal with a large biological attack
biowatch detection system
7. More than a third of the world's data breaches originate in _______, more than in any other region. Nearly half of the breaches are launched in North America and Eastern Europe.
china
4. U.S. government officials said that hackers working for the ______ government had tapped into computers at the Office of Personnel Management, which maintains records of federal employees and contractors.
chinese
9. The U.S. military established a signals intelligence unit during World War I to decipher enemy codes and provide codes for its own forces. In 1919 the unit was transferred to the State Department, where it became the _________ also known as the "Black Chamber", and focused on diplomatic rather than military communications. In 1929, Herbert Hoover, reportedly declared, "Gentlemen do not read other gentlemen's mail." Because of those ethical qualms, and for budget reasons, he disbanded it
cipher bureau
8. In 1987, Congress passed ___________, which shifted responsibility for the security of non-military computers from the National Security Agency (NSA) to the National Institute for Standards and Technology
computer security act
6. The _________, considered the first piece of disaster legislation, provided federal assistance to Portsmouth, N.H., following a huge fire
congressional act of 1803
5. Many nations treat terrorism as a _______, not a political one. Outlawing terrorism implies faith in the legal system, and antiterrorism legislation in democratic countries generally incorporates constitutional rights and judicial review
criminal act
1. Former Defense Secretary Leon Panetta warned, in 2012 before retiring, that the United States faces the danger of a ___________, hostile penetrations of computer networks that control essential services including the electrical supply throughout the country
cyber-peral harbor
3. Government and private-sector computer and security experts agree America's _________ is at risk. Although, most analysts say cyberspace doesn't offer the opportunities terrorists thrive upon: dramatic events that invoke terror, such as suicide bombings and airplane crashes. Page#___
cyberinfrastructure
1. _________ is a top threat to U.S. security. Potential cyber threats may come from "profit-motivated criminals, ideologically motivated hackers or extremists" and "nation-states like Russia, China, North Korea and Iran". It is estimated that __________ costs the United States about $100 billion annually.
cybersecurity, cybercrime
4. According to the White House _______ released last May, "the nation's approach to cybersecurity over the past 15 years has failed to keep pace with the threat." Nor, adds the report, is the government currently adequately prepared to address cyberthreats
cyberspace policy review
14. _____________, so-called sovereign citizens who live in the United States but do not recognize the authority of any government, now outrank Islamic extremists on law enforcement's list of concerns, according to a 2013-14 survey on police intelligence processes conducted. They are also a growing threat to national security.
domestic terrorist
7. The National Security Agency manages a satellite surveillance network called ________.
echelon
10. ___________ are defined as trade restrictions and controls that are imposed to pressure sanctioned governments to moderate their behavior.
economic sanctions
10. DHS is setting up _________ that will be deployed to catastrophes to provide up-to-the-minute reports to federal planners, who can then send the appropriate resources
emergency reconnaissance teams
3. The government is engaged in a tug-of-war with cell- phone makers, urging them not to build _______________ into their devices because it hinders intelligence agencies from intercepting the communications of suspected terrorists.
encryption technology
In the United States, the ___________ performs domestic intelligence collection, and the ___________ operates internationally.
fbi, cia
15. To promote information-sharing, in 2014, the Justice Department reactivated its Domestic Terrorism Executive Committee. In an effort to counter sovereign- citizen violence, DHS established 78 state, regional and municipal __________which collect and share intelligence from state and local law enforcement.
fusion centers
1. More than ____ of all computer breaches occur in the retail and food and beverage industries, which have fewer cybersecurity safeguards than, for example, the financial services sector, which handles vast amounts of money and generally has sophisticated safeguards.
half
10. As some survivalists tried to develop a new way of assessing threats, top U.S. government officials were worrying about a reappearance of one of the biggest threats to humanity, ______. In the 1990s, the administration of President Bill Clinton (1993-2001) formally listed disease spread as a national security issue. The move reflected growing concern prompted by events, including the spread of avian influenza ("Avian Flu") through Asia
infectious disease
3. To seize control of the Katrina mission, President Bush would have had to invoke the ________, which allows federal troops to suppress a rebellion and enforce federal laws. Bush's father invoked the law in 1992 during riots in south-central Los Angeles following the acquittal of police officers charged in the beating of Rodney King
insurrection act
8. In the 1980s, Iraq's use of chemical weapons during the _______ killed or wounded up to 60,000 people, prompting a worldwide ban on the use of such weapons in 1993.
iran-iraq war
1. By far the most expensive disaster in the nation's history, _________ is expected to cost at least three times more than the second-costliest U.S. disaster, the 1988 heat wave and drought
katrina
2. The insurance company attacks underline another trend: increased hacker interest in information related to _______, especially data that establishes health insurance coverage. Stolen personal information for health insurance subscribers can be 10 to 20 times more valuable than credit card numbers.
medical care
5. The CIA Director is shaking up his agency, creating 10 ________ focusing on specific functional areas, such as economic security or weapons proliferation, and certain geographical areas — such as the Middle East or China — that present particularly complex political, strategic and economic concerns. Modeled on the CIA's existing Counterterrorism Center (CTC), formed in 1986, the centers would unite the "operatives" (spies) with the analysts.
mission centers
10. Beginning in March 1998 and continuing for nearly two years, a group of hackers had penetrated computers at the Pentagon, NASA, the Energy Department and several private universities and research labs. To this day the break-in, known as ________, has not been solved, although the attack was traced back to the Soviet Union. In response, the Clinton Administration released its National Plan for Information Systems Protection
moonlight maze
6. The ___________ said Congress must be kept "fully informed" of major intelligence activities, but successive administrations have interpreted this to mean disclosing information to only a few key members of Congress. This also created the CIA.
nation security act
2. Countries as well as individuals can attack military targets, utilities, private companies or government databases, depending upon whether they are seeking military intelligence, conducting diplomatic or industrial espionage or trying to intimidate anti-government activists. In addition, __________ mean little or nothing when it comes to cyberattacks, and, unlike a military attack, determining the source of an attack can be difficult, making a response problematic
national boarders
4. A day after the hurricane struck, the DHS declared Katrina an "incident of national significance," which under the new _________ should trigger a coordinated federal response. By the following day, the amphibious assault ship USS Bataan arrived with supplies off New Orleans, but not until Sept. 5, a week after Katrina hit, did troops arrive.
national response plan
4. Hurricanes Katrina and Sandy, major forest fires in the West and floods in the Midwest show the power of __________ to destroy and disrupt. Climate change is speeding up and intensifying some categories of disaster, even as it puts new stress on the national energy system, including oil and gas exploration and delivery as well as the power grid, the Department of Energy reported in July
natural disasters
9. A 1987 study published by the Massachusetts Institute of Technology concluded that even a limited nuclear attack on the United States would leave survivors in "________" for decades
near-medieval levels of existence
5. President Obama signed an executive order in February instructing the Department of Homeland Security to establish a ________ that would create voluntary standards for sharing information about cyber threats. The order allows participating businesses to receive classified government information
non profit
3. __________ committed against the citizens or holdings of a state generally is not a violation of international law, but rather a violation of the domestic criminal laws of the victim state or the state where the terrorist act occurred. _____________ is a violation of international law that invokes the victimized state's right of self- defense.
non state sponsored terrorism, state sponsored terrorism
5. Experts generally agree that the private sector and the ________ are the weakest links in America's cyberinfrastructure. They are also the biggest links. The power industry was considered among the most likely targets, as well as one of the industries most in need of upgraded cybersecurity
non-federal public sector
3. Security experts warn that governments have moved into cyberspace to spy, steal business and disrupt corporate operations, as _______ is alleged to have done to Sony. China, Russia, Iran and North Korea regularly try to attack U.S. networks
north korea
2. The computer systems of Sony Pictures Entertainment were hacked in 2014. The FBI blamed ___________, though without conclusive evidence. In January, Obama imposed sanctions on these agencies and officials, citing the communist country's "destructive, coercive cyber-related actions".
north korean government
10. A bipartisan congressional commission looking at terrorist threats in 2008 concluded there was a high likelihood that terrorists would use a weapon of mass destruction in the next five years, and "terrorists are more likely to be able to obtain and use a biological weapon than a __________."
nuclear weapon
6. The _________________, a Hague-based agency that oversees implementation of the convention, says 81.7% of the world's declared chemical weapons have been destroyed. It also won the Nobel Peace Prize in 2013.
organization for the prohibition of chemical weapons
13. The ______________ is an independent federal body established by Congress in 2004 to balance terrorism prevention with the protection of privacy and civil liberties. It conducted a review of the NSA surveillance program.
privacy and civil liberties oversight board
7. During the Depression, President Franklin D. Roosevelt initiated a more active federal role in disaster response. For instance, he authorized the ________, established by Hoover in 1932 to bolster the banking industry, to make reconstruction loans for public facilities damaged by earthquakes, and later, other disasters
reconstruction finance corporation
8. The _______ is the only relief organization chartered by Congress "to maintain a system of domestic and international disaster relief." In fact, the National Response Plan specifically calls on this organization to provide local relief. During Katrina, it provided hurricane survivors with nearly 3.42 million overnight stays in more than 1,000 shelters. And, in coordination with the Southern Baptist Convention, it served nearly 27 million hot meals to victims
red cross
4. Counterterrorism activities within a nation's own borders operate in the context of each nation's laws and policies, history, politics, and culture. In democratic societies, "the _________ is guaranteed by the legitimacy legal norms enjoy from whom such norms apply, on one hand, and by the threat of enforcement from specialized agents of control, on the other".
rule of law
7. Even if the federal government is unwilling to regulate computer security in all of the private sector, some experts argue that, at a minimum, ___________ are needed for any industry deemed critical to the national infrastructure, as well as requirements that companies report all attacks or compliance with the standards
security standards
8. Today, the CIA is conducting what some call _________ using armed drones to conduct strikes in countries with which the United States is not at war but where terrorists are active. Since 2004 the CIA has conducted at least ______ drone strikes in such places as Pakistan, Yemen and Somalia.
shadow wars, 500
9. Following the 9/11 attacks, former President Bush signed an executive order allowing foreigners suspected of international terrorism to be tried in _________. These are formed under the power of the executive branch of government and are independent of the judicial branch. The prosecutors and judge-commissioners are military officers, responsible to the president.
special military tribunals
2. In addition to defense and communications systems, much of the nation's civilian infrastructure is hooked up to specialized computers that control other computers through ___________ systems. If hackers gain control of such a system, they can manipulate whatever it controls — such as a gas line, power grid or the floodgates of a dam.
supervisory control and data acquisition (SCADA
8. The same forecasted events that apocalypse preachers drew on also figured in another group's preparations for collapse of the social order. So-called ______ began stockpiling food and other supplies and setting up rural hideouts to retreat to when the social order collapsed
survialists
9. ____________ is an antiterrorist measure that makes potential targets more difficult to attack. Examples include increased airport security, the visible deployment of security personnel, and the erection of crash barriers at entrances to parking garages beneath important buildings
target hardening
7. Hal Lindsey, a former minister with Campus Crusade for Christ, sparked a revival with a 1970 book that became a publishing sensation, ______________, which cited biblical passages as prophecies applicable to the late 20th century, including the threat of nuclear war and the 1948 creation of Israel
the late great planet earth
12. The Chemical Weapons Convention calls for nations to declare their arsenals within 30 days of joining the accord and have destruction facilities — usually special incinerators — ready for testing by the second year; destruction of the most dangerous chemical weapons should commence in the _____ and be complete within 10 years after signing. Russia and the United States have the world's two largest chemical arsenals and are significantly behind schedule in destroying their chemical weapons
third year
2. Nevertheless, preppers say they steer clear of even the word "survivalist" because it came to be associated with far-right extremists such as the neo-Nazi bomber, ________, who blew up the Alfred P. Murrah federal building in Oklahoma City in 1995, killing 168 people, including 19 children
timothy mcveigh