Final exam
According to The 9/11 Commission Report, by the end of a deputies meeting on September 10, officials formally agreed on a ________ strategy.
3 phase
____ of data breaches involved credit card information, and about one-third involved personal information.
?
In an extraordinary public essay asking how Muslims "can drag ourselves out of the pit we find ourselves in to raise ourselves up" Musharraf has called for a strategy of _______.
Enlightened Moderation
The homeland security enterprise must operationalize the mission of creating an - __________________________ and ________________________ system.
adaptive , collaborative
For terrorists, travel documents are as important as weapons. Internationally and in the U.S., constraining terrorists travel should become a vital part of ___________.
counterterrorism
USA Patriot Act
counterterrorism act passed in 2001, permits new forms of surveillance and indeterminate periods of imprisonment without due process
Shadow wars
covert campaigns to suppress terrorism
What did the terrorists exploit in order to gain entrance into the US?
deep institutional failings within our gov
Wahhabi
pure islam
National Security Act of 1947
restructuring the government's military and intelligence agencies following World War 2, majority of the provisions of the act took effect on Sep 18, 1947 day after senate confirmed James Forrestal as first Secretary of Defense.
BOTNET
robot network, collection of computers comprised by roboties allowing outside hackers control
What were some of the major provisions included in the USA PATRIOT Act?
roving wiretaps, sneak and peek, national search warrants, detention, wiretaps and purpose of investigation, criminal penalties raised, bioterrorism, monitoring computers, many laundering sunset provision
The Cuckoos Egg
spy/tracking/ attack?
Custom Electronic Chap 5
Custom Electronic Chap 5
Custom Electronic Chap 6
Custom Electronic Chap 6
Custom Electronic Chapter 7
Custom Electronic Chapter 7
North American electric reliability council
(NERC) lead industry group dealing with security issues
What are the four steps that make up comprehensive emergency management?
1.Mitigation 2.Prepareedness 3.Response 4.Recovery
According to The 911 Commission Report, 12 of the 13 muscle hijackers (excluding Nawaf al Hazmi and Mihdhar) came from Saudi Arabia. The muscle hijackers came from a variety of educational and societal backgrounds. All were __________; most were unemployed with no more than a high school education and were unmarried.
20-28 years old
Immediately after the second plane hit, the Chief Department of the NYPD ordered a second Level 4 mobilization, bringing the total number of NYPD officers responding to _____.
2000
In what year did the US Navy SEALS kill Osama Bin Laden?
2011
When did Hamzi and Mihdar give up on learning how to fly?
End of May 2000
Ramzi Yousef
According to 9/11 Commission Report Ramzi the Sunni extremist who planted 1st WTC bomb said later he planned to kill 250,000 people. Behind WTC, Flight 434 and Bojinka plot
Within about two months of the start of combat operations, several hundred CIA operatives and Special Forces soldiers, backed by the striking power of US aircraft and a much larger infrastructure of intelligence and support efforts, had combined with ________ and a small number of other coalition soldiers to destroy the Taliban regime and disrupt al Qaeda
Afghan militias
Local newspapers and the few influential satellite broadcasters, like al Jazeera, often reinforce the jihadist theme that portrays the US as _____.
Anti-Muslim
What are some examples of coercive covert operations?
Assassinations,sabotage,kidnapping, and other quasi-legal methods
Bin Ladin reportedly thought an attack against the United States would do what?
Benefit al Qaeda by attracting more suicide operatives
The _______________________________________ publishes and disseminates preparedness and response guidelines for health professionals responding to mass-casualty events, including chemical and biological terrorist events.
Center for disease control and prevention
Former Defense Secretary Leon Panetta warned, in 2012 before retiring, that the United States faces the danger of a ___________, hostile penetrations of computer networks that control essential services including the electrical supply throughout the country.
Cyber- Pearl Harbor
According to the White House _______ released last May, "the nation's approach to cybersecurity over the past 15 years has failed to keep pace with the threat." Nor, adds the report, is the government currently adequately prepared to address cyberthreats.
Cyberspace Policy Review
For countering terrorism, the dominant agency under the department of justice is the _____?
FBI
FAA
Federal Aviation Administration
Resolution 1376
Following 9/11 United Nations resolution requires member states to adopt strict regulations against terror and create counter terrorism committee
FEST
Foreign response teams ready to move on four hours notice, kept up with terrorist posture on a rolling 24 hour basis
United Nations
Founded 1945 following WW2, mission to maintain international peace and security
Middle East Free Trade Area
Goal of established capitalistic trade in areas by 2013
What are two examples of military and paramilitary repressive options?
Infiltration and Disinformation
The FBI is not new to the fight in cybersecurity. Nearly 15 years ago, it launched the _______ program, aimed at building government-private sector partnerships to reduce cyber threats. The Secret Service's flagship ________ has more than 1,100 special agents trained in cybersecurity deployed in 98 offices worldwide. The agency was also mandated by the USA Patriot Act in 2001 to establish a nationwide network of Electronic Crimes Task Forces (ECTFs).
Infraguard, Electronic Crimes Special Agent Program (ECSAP)
To seize control of the Katrina mission, President Bush would have had to invoke the ________, which allows federal troops to suppress a rebellion and enforce federal laws. Bush's father invoked the law in 1992 during riots in south-central Los Angeles following the acquittal of police officers charged in the beating of Rodney King.
Insurrection Act
Pakistan's endemic poverty, widespread corruption, and often ineffective government create opportunities for _______ recruitment.
Islamist
Japanese Internment
Japanese Americans imprisoned due to fear of Japanese invasion shortly after Pearl Harbor
Operatives volunteered for suicide operations. KSM claims that the most important quality for an al Qaeda operative was the willingness to _______.
Martyr himself
When was the second edition of the National Response Framework disseminated?
May 2013
Modhar Abdullah
acquaintance/accomplice of Hamzi and Midhar (two 9/11 terrorists)
Security experts warn that governments have moved into cyberspace to spy, steal business and disrupt corporate operations, as _______ is alleged to have done to Sony. China, Russia, Iran and North Korea regularly try to attack U.S. networks.
North Korea
Aviation and Transportation Security Act
Nov 19 creates the TSA
ODNI
Office of Director of National Intelligence
According to The 9/11 Commission Report, President Clinton insisted on including _________ in the itinerary for his trip to South Asia. His one-day stopover on March 25, 2000 was the first time a US president had been there since 1969.
Pakistan
________ forces played a leading part in tracking down KSM, Abu Zubaydah, and other key al Qaeda figures.
Pakistan
Name three infamous cases of domestic counterterrorism activities in the United States.
Palmer Raids, Japanese Internment, and McCarthyism
Emergency response is a product of _______.
Preparedness
What is the difference between punitive and preemptive strikes?
Punitive;payback Preemptive; launched as precautionary measure to degrade terrorist
Executive Order 12333
Reagan prohibits employees of US from assassinating adversaries
During the Depression, President Franklin D. Roosevelt initiated a more active federal role in disaster response. For instance, he authorized the ________, established by Hoover in 1932 to bolster the banking industry, to make reconstruction loans for public facilities damaged by earthquakes, and later, other disasters.
Reconstruction Finance Corporation
According to The 9/11 Commission Report; President Clinton's first national security advisor, Anthony Lake, had retained from the Bush administration the staffer who dealt with crime, narcotics, and terrorism (a portfolio often known as "drugs and thugs"), the veteran civil servant was_________.
Richard Clarke
________ has been a problematic ally in combating Islamic extremism.
Saudi Arabia
________ comprised the largest portion of the pool of recruits in the al Qaeda training camps. Seventy percent of the mujahedeen were this and prior to 9/11 it was easier for these operatives to get into the US.
Saudis
IRAN-CONTRA Affair
Secret arrangement in 80s to provide funds to Nicaraguan contra rebels from profits gained by selling arms to IRAN
The prolonged crisis of 1979-1981, when 53 Americans were held hostage at the U.S. embassy in Tehran, ended the __________ leadership in counterterrorism.
State Department
Nevertheless, preppers say they steer clear of even the word "survivalist" because it came to be associated with far-right extremists such as the neo-Nazi bomber, ________, who blew up the Alfred P. Murrah federal building in Oklahoma City in 1995, killing 168 people, including 19 children.
Timothy McVeigh
A senior al Qaeda detainee has stated that ________ after the 9/11 attacks to monitor the American homeland forced al Qaeda to operate less freely in US.
US Gov efforts
Understanding Chap 12
Understanding Chap 12
Who was included in President Bush's "war council"?
Vice Pres Cheney, Hadley, Powell, Armitage, Rumsfeld, Ashcroft, Mueller, Tenet, Deputy Secretary of defense Paul Wolfowitz and Cofer Black,chief of the DCI's counterterrorist center
As of September 11, the Port Authority lacked any standard operating procedures to govern how officers from multiple commands would respond to and be staged and utilized at major incidents at the _____.
WTC
Hamzi and Mhdhar sought out and found a group of young ideologically like-minded Muslims with roots in ________ and _______.
Yemen and Saudi Arabia
Zakat
charitable giving
President commission on critical infrastructure protection
increase federal programs protecting cyberspace
The 2003 Homeland Security Presidential Directive 5's stated purpose was "to enhance the ability of the United States to manage domestic incidents by establishing a single, comprehensive ____________________________________________."
national incident management system
The National Response Framework is a national recognition of the need to design and maintain a __________________________________ that promotes preparedness at every level of authority.
systematic mechanism
Response operations lacked the kind of integrated communications and _________ contemplated in the directive.
unified command
Cyberespionage
use of computer networks to gain illicit access to confidential info
The lesson of 9/11 for civilians and first responders can be stated simply: in the new age of terror ____ are the primary targets.
we
According to The 911 Commission Report, Tenet told us that in his world "_____________________".
The system was blinking red
Before 9/11, the ______ did not consider terrorist financing important enough to mention in its national strategy for money laundry.
Treasury
A government computer consultant who asked not to be identified agrees that great potential exists for destructive attacks. "Give me an organization, and I can find ways to destroy it," he says. He would need only a couple of years for planning and reconnaissance with a small, trusted team and a couple of million dollars to destroy a system, he says. "It's easier to destroy something than create it," he adds. "The _________ is incredibly vulnerable and is getting more so with every passing day."
U.S. infrastructure
Understanding Chapter 13
Understanding Chapter 13
Understanding HomelandSec Chap 11
Understanding Homeland Sec Chap 11
"literacy as freedom"
United Nations plan to increase education in Middle East
USVISIT
United States Visitor and Immigrant Status indicator technology system is collection and analysis of biometric data (such as fingerprints) checked against a database to track individuals deemed by the US to be terrorist, illegal or criminal
A number of important al Qaeda figures attended_________ or lived in that area in the 1980s and early 1990s.
University of Arizona
UAV
Unmanned aerial vehicle
In 1995-1996, the Defense Department began to invest effort in planning how to handle the possibility of a domestic terrorist incident involving _________. The idea of domestic command for homeland defense began to be discussed in 1997 and in 1999, the Joint Chiefs developed a concept for the establishment of a domestic Unified Command.
Weapons of Mass Destruction (WMDs)
The ______ provided strong evidence connecting the Cole attack to al Qaeda during the second half of November, identifying individual operatives whom the United States knew were part of al Qaeda.
Yemenis
The President said, "The enemy of America is not our many Muslim friends; it is not our many Arab friends. Our enemy is ___________ and every government that supports them."
a radical network of terrorists
Thumiary
accredited diplomat at Saudi Arabian consulate from 1996-2003
USA Patriot Act
act of congress signed into law by President Bush on Oct 26, 2001 Abbreviated (USA PATRIOT) expanded full title "Uniting and Strengthening America by providing appropriate tools required to intercept and obstruct terrorism act of 2001"
Bin Ladin could assess new trainees in about ten minutes and many of the 9/11 hijackers were selected in this manner. Bin Ladin, assisted by Atef, personally chose all the future hijackers for the planes operation. The training for the muscle hijackers was conducted at the ________.
al Matar complex
Biometric Technology
allow digital photographs of faces to be match against those of wanted suspects useful for antiterrorist screens
President Reagan characterized terrorism as "____________" and declared: "There can be no place on earth left where it is safe for these monsters to rest, to train, or practice their cruel and deadly skills...".
an act of war
Though Saddam Hussein was widely detested, many Saudis are sympathetic to the ______ insurgents in Iraq although majorities also condemn jihadist attacks in the Kingdom. In June 2004, the Saudi ambassador to the U.S. called publicly for his government to wage a jihad of its own against the terrorists.
anti-US
Preparations for the end of the world have been features of religions and civilizations for millennia. The ancient Hebrews expected the ______ (from the Greek word for "revelation"), leading to judgment day, a concept later adopted by Christians and Muslims.
apocalypse
Successful homeland security in the near term depends on accepting the reality that violent extremists will consistently attempt to thwart defensive measures by planning and carrying out unexpected __________________ or other types of political violence.
attacks
Cyber Attacks
attempt by hackers to damage or destroy a network or system
Abdel Rahmen
blind Sheikh, perpetrator of 1993 WTC bombing
Covert Actions
broad range of activities outside the operations of traditional intelligence collection
Torture
brutal of humiliating interrogation techniques
The Federal Emergency Support Functions are primary, but not exclusive, Federal coordinating structures for _____________________, ____________________, and _____________________ the response core capabilities.
building, sustaining, delivering
National strategy to secure cyberspace
calls for private companies to voluntarily cooperate with new DHS in protecting cyberspace
The Palmer Raids
campaign against radicals and left wing organizations. Conducted by Mitchell Palmer and Edgar Hoover caused by fear of communism
International sources of terrorism originate primarily from ________________________ _______________________ extremist networks that replicate the al-Qaeda model.
cell based religious
Through NIMS, the National Response Framework, the NIPP, and other planning protocols, DHS acknowledges that _____________________ planning with state and local agencies and officials is central to its overall mission.
collaborative
Cooperative Threat Reduction Program
commitment to securing weapons and dangerous materials
Presidential Daily Briefing
compendium of reports used to keep president and policymakers abreast of emerging intelligence concerns
Response and recovery procedures for domestic security emergencies are a ___________________ and ________________________ endeavor.
complex, multi tiered
Edward J Snowden
computer pro, former CIA leaked classified info from National Security Agency in 2013
STUXNET
computer worm that attacked IRAN's nuclear enrichment Israeli operation
DHS National Cyber Security Division
coordinate federal efforts
Because violent extremism has historically originated primarily from domestic conflict, future prevention and mitigation efforts must incorporate inclusive societal and cultural considerations as _________________________ to extremist ideas.
counterbalances
National Security Act
creates CIA
Many nations treat terrorism as a _______, not a political one. Outlawing terrorism implies faith in the legal system, and antiterrorism legislation in democratic countries generally incorporates constitutional rights and judicial review.
criminal act
Cybercrime
criminal activity carried out on web
James Clapper
current director of national intelligence
cyber storm
cyber defense war-game training exercise every 2 years
Government and private-sector computer and security experts agree America's _________ is at risk. Although, most analysts say cyberspace doesn't offer the opportunities terrorists thrive upon: dramatic events that invoke terror, such as suicide bombings and airplane crashes.
cyberinfrastructure
Senior Executive Intelligence Brief
daily briefing, which began after World War 2 under Harry Truman, contains info on specific issues and regions around the world relevant to current affairs
Richard clarke
dealt with crime, narcotics, and terrorism (drugs and thugs) as a veteran civil servant
Senate Select Committee on Intelligence
dedicated to overseeing the US intelligence community
Practical adaptations are measured as successful if they apply theoretical models that prevent extremists from ________________________ the domestic environment
destabilizing
If skillfully administered, future adaptations of collaborative initiatives will serve to reduce the likelihood of _______________________ and _______________________ in the event of a terrorist incident.
disorganization, disarray
The NRC mandates and enforces the proper ____________________, _________________, and _________________________ of radioactive waste.
disposal, storage , transporting
Many of the injuries after the 1993 bombings occurred when?
during the evacuation
There is a tendency for terrorists to use unconventional factors as measures of their ____________.
effectiveness
Chertoff said FEMA needs to learn from the military and private companies that were able to keep communication lines open. DHS is setting up _________ that will be deployed to catastrophes to provide up-to-the-minute reports to federal planners, who can then send the appropriate resources.
emergency reconnaissance teams
The government is engaged in a tug-of-war with cell- phone makers, urging them not to build _______________ into their devices because it hinders intelligence agencies from intercepting the communications of suspected terrorists.
encryption technology
Directorate of digital information
enhance cyber security and conduct cyber espionage
national information infrastructure protection act of 1996
entended CFAA further, allowing prosecution of those viewing info on a computer w/o authorization
presidential decision directive 63
established organizational structure among federal agencies to "eliminate any significant vulnerability to both physical and cyberattacks on critical infrastructure
National Cyber Joint Investigation Task Force
established to confront increasing attacks on government and commercial computers
It is understood that awaiting the outcome of standard procedures could ___________________ the consequences of a disaster or emergency.
exacerbate
cyber security enhancement act
expands powers of law enforcement orgs and increases penalties for computer crimes
The commitment of ____________________ and _________________ resources to preparedness and planning is an investment that will, if properly undertaken, reap immeasurable benefits in the security of local communities and the nation at large.
financial, human
the computer fraud and abuse act
first federal computer crime law makes it a felony to enter computers operated by gov
Counterterrorist models must be _____________________ enough to respond to new terrorist environments and must avoid stubborn reliance on methods that "fight the last war."
flexible
Clarke's staff warned, "__________ are present in the US and attacks in the US are likely".
foreign terrorist sleeper cells
Clarke mentioned to National Security Advisor Rice at least twice that al Qaeda sleeper cells were likely in the U.S. In January 2001, Clarke forwarded a strategy paper to Rice warning that al Qaeda had a presence in the US. The domestic agencies were waiting for evidence of a domestic threat from sleeper cells within the US. No one was looking for a ______ threat to a _____ target.
foreign, domestic
To promote information-sharing, in 2014, the Justice Department reactivated its Domestic Terrorism Executive Committee. In an effort to counter sovereign- citizen violence, DHS established 78 state, regional and municipal __________which collect and share intelligence from state and local law enforcement.
fusion centers
In wartime, government calls for _____ powers, and then the need for those powers _____ after the war ends.
greater, recedes
More than ____ of all computer breaches occur in the retail and food and beverage industries, which have fewer cybersecurity safeguards than, for example, the financial services sector, which handles vast amounts of money and generally has sophisticated safeguards.
half
The purpose of HSPD-21 was to "transform our national approach to protecting the ___________________ of the American people against all disasters."
health
There is no single binding or common ______________________ foundation for political violence.
ideological
Modern terrorist activity in Europe was characterized by __________________, ______________________, and _____________________ spillover political violence.
ideological, nationalistic, international
Beginning on September 11, __________ agents working in cooperation with the FBI began arresting individuals for immigration violations whom they encountered while following up leads in the FBI's investigations of the 9/11 attacks.
immigration and naturalization
The creation of viable _______________________________ at the state and local levels of authority is an indispensable element of effective response and recovery.
incident command structures
As some survivalists tried to develop a new way of assessing threats, top U.S. government officials were worrying about a reappearance of one of the biggest threats to humanity, ______. In the 1990s, the administration of President Bill Clinton (1993-2001) formally listed disease spread as a national security issue. The move reflected growing concern prompted by events, including the spread of avian influenza ("Avian Flu") through Asia.
infectious disease
It is now clear that everyone involved was confused about the rules governing the sharing and use of _______ gathered in intelligence channels.
information
US Strategic Command
integrate computer network operations with fighting on the battlefield
Identifying terrorist risks requires assessing the ______________________ of extremist organizations, including projecting which locations constitute likely targets.
intentions
SIGINT
interception of electronic signals, used for interception of financial data monitoring communications on phone email etc
Practically every aspect of the U.S. counterterrorism strategy relies on _______.
international cooperation
INTERPOL
international criminal police org made of over 140 nations agree to share intelligence and provide assistance in suppressing crime
Presidential declarations authorize national _____________________ when serious natural or man- made disasters and emergencies occur.
intervention
Internet Crime Complaint center
joint project or FBI nonprofit national white collar crime center and the justice dept bureau of justice assistance
Post Authority of New York and New jersey
joint venture between the US state of New York and New Jersey, set 1921 through interstate compact authorized by congress. The Port Authority oversees much of regional transportation infrastructure, including bridges, tunnels, airports, seaports
The MSCC recommends a management methodology for responding to ________________ medical incidents.
large-scale
Binalshibh advised Atta that Bin Ladin had directed the other operatives not be informed of the date until __________.
last minute
Foreign Intelligence Surveillance Act
law prescribes procedures for physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers"
The Deputies Committee met to discuss the armed predator. They concluded that it was _____ for the CIA to kill Bin Ladin or one of his deputies with the Predator. Such strikes would be acts of self- defense that would not violate the ban on assassinations in Executive Order 12333.
legal
USA Freedom Act
limit NSA's collection of bulk data when the agency is searching for specific records
State emergency management offices offer preparedness and mitigation support on an ongoing basis to local jurisdictions, and generally do not become directly involved in emergency response until a request is received from _______________________.
local authorities
The process for projecting successful homeland security models must include a _________________________ framework based on both theory and practical necessity.
longitudinal
What is the UN's mission?
maintain International peace and security
Malcode
malicious code software, harvest/hack info
The CIA's zone defense concentrated on "where," not "who." Had its information been shared with the FBI, a combination of the CIA's zone defense and the FBI's ______ approach might have been productive.
man to man
When faced with the prospect of lifelong incarceration, terrorists are likely to become susceptible to _________________________.
manipulation
The insurance company attacks underline another trend: increased hacker interest in information related to _______, especially data that establishes health insurance coverage. Stolen personal information for health insurance subscribers can be 10 to 20 times more valuable than credit card numbers.
medical care
The CIA's leadership was told that while a number of plots had been disrupted, the ______ might be only the "kick-off" for a period of extended attacks.
milennium
The CIA Director is shaking up his agency, creating 10 ________ focusing on specific functional areas, such as economic security or weapons proliferation, and certain geographical areas — such as the Middle East or China — that present particularly complex political, strategic and economic concerns. Modeled on the CIA's existing Counterterrorism Center (CTC), formed in 1986, the centers would unite the "operatives" (spies) with the analysts.
mission centers
The U.S. government should allocate ______ so that lower-level officials have more flexibility to get the job done across agency lines, adjusting to the circumstances they find in the field
money
The private sector is arguably the sector of society ______________ affected when a terrorist incident occurs.
most
Peace Processes
mutually accepted terms for cease fire often involving long, arduous frustrating proceedings
Countries as well as individuals can attack military targets, utilities, private companies or government databases, depending upon whether they are seeking military intelligence, conducting diplomatic or industrial espionage or trying to intimidate anti-government activists. In addition, __________ mean little or nothing when it comes to cyberattacks, and, unlike a military attack, determining the source of an attack can be difficult, making a response problematic.
national borders
Hurricanes Katrina and Sandy, major forest fires in the West and floods in the Midwest show the power of __________ to destroy and disrupt. Climate change is speeding up and intensifying some categories of disaster, even as it puts new stress on the national energy system, including oil and gas exploration and delivery as well as the power grid, the Department of Energy reported in July.
natural disasters
A 1987 study published by the Massachusetts Institute of Technology concluded that even a limited nuclear attack on the United States would leave survivors in "________" for decades.
near-medieval levels of existence
Like the national defense effort described earlier in the 9/11 Commission Report, the emergency response to the attacks on 9/11 was ________.
necessarily improvised
Are the best available response and recovery systems and procedures an absolute deterrent to the execution of terrorist attacks?
no
Experts generally agree that the private sector and the ________ are the weakest links in America's cyberinfrastructure. They are also the biggest links. The power industry was considered among the most likely targets, as well as one of the industries most in need of upgraded cybersecurity.
non-federal public sector
How many times has the United States experienced real-time consequences from a mass-casualty chemical or biological attack?
none
Repressive Responses
nonmilitary operations selected from a range of options that are flexible and can be adapted to specific terrorist environments
President Obama signed an executive order in February instructing the Department of Homeland Security to establish a ________ that would create voluntary standards for sharing information about cyber threats. The order allows participating businesses to receive classified government information.
nonprofit organization
Homeland security experts in the modern era will be challenged to successfully integrate several domestic security _____________________ into homeland security policy initiatives.
objectives
The advantage of promulgating the National Planning Frameworks is that they characterize an ____________________ and _______________________ effort to maintain integrated preparedness at all tiers of authority.
ongoing, institutionalized
Counterterrorism security group
organization meant to develop terrorism prevention policy and coordinate threat
Cyber Threat
possibility of a malicious attempt to damage or disrupt a computer network system
National Security Council
principal forum for considering national security and foreign policy matters with his senior national security advisors
DHS established a _____________________________________ as an important outreach and coordinating resource for members of the private sector.
private sector office
Counterterrorism
proactive policies specifically seek to eliminate terrorist environments and groups
The National Incident Management System (NIMS) was established to institutionalize collaborative ____________________ among federal, state, and local authorities.
protocol
Concerted efforts have been undertaken to establish planning ___________________ and ____________________ to secure multijurisdictional and multilevel collaboration.
protocols, systems
Late Modern Warfare
relies on small scale lightning fast raids, armed or unarmed and unmanned aerial vehicles aka drones used too
The most significant spillover threat of the early twenty-first century comes from _______________ extremists.
religious
Emergency support functions are designed to assemble _____________________ from diverse sources and "package" them for dissemination to critical disaster and emergency relief centers.
resources
It is difficult to forcibly reverse extremist tendencies, and thus the skillful adoption of other responses is required along with an underlying appreciation that sheer repression is a ___________________ long-term solution.
risky
Counterterrorism activities within a nation's own borders operate in the context of each nation's laws and policies, history, politics, and culture. In democratic societies, "the _________ is guaranteed by the legitimacy legal norms enjoy from whom such norms apply, on one hand, and by the threat of enforcement from specialized agents of control, on the other".
rule of law
To find __________, terrorist organizations have fled to some of the least governed, most lawless places in the world. The intelligence community has prepared a world map that highlights possible terrorist havens.
sanctuary
Nonviolent Covert Operations
secretive operations such as infiltration, disinformation, cyberwar. Require creative methods
Even if the federal government is unwilling to regulate computer security in all of the private sector, some experts argue that, at a minimum, ___________ are needed for any industry deemed critical to the national infrastructure, as well as requirements that companies report all attacks or compliance with the standards.
security standards
Today, the CIA is conducting what some call _________ using armed drones to conduct strikes in countries with which the United States is not at war but where terrorists are active. Since 2004 the CIA has conducted at least ______ drone strikes in such places as Pakistan, Yemen and Somalia.
shadow wars
HUMINT
sharing intel with friendly agencies and law enforcement officials
Assessing the probability that an event will occur requires measured applications of analytical _________________ and ____________________ in order to project the likelihood of a terrorist incident.
skills, resources
The 2011 Arab Spring uprisings demonstrated that support for, and the momentum of, domestic terrorist movements can be undercut by genuine __________________ reform.
social
A terrorist threat advisory distributed in late June indicated a high probability of near-term _______ terrorist attacks resulting in numerous casualties.
spectacular
KSM explained that California was a convenient point of entry from Asia and had the added benefit of being far away from the intended target area. Hazmi and Mihdhar were ill-prepared for a mission in the United States. Their only qualifications for this plot was their devotion to Usama Bin Ladin, their veteran service, and their ability to get valid U.S. visas. Neither had spent any substantial time in the West, and neither ____________.
spoke much if any English
The same forecasted events that apocalypse preachers drew on also figured in another group's preparations for collapse of the social order. So-called ______ began stockpiling food and other supplies and setting up rural hideouts to retreat to when the social order collapsed.
survivalists
Antiterrorism
target hardening, enhanced security and other defensive measures seeking to deter and prevent terrorist attacks
Homeland security presidential directive 7
tasks DHS with protecting country's non-military cyberspace infrastructure
The national homeland security enterprise requires efficient and effective ______________ among federal, state, and local agencies.
teamwork
Operation Enduring Freedom
term used by US gov to describe the war in Afghanistan
TIPOFF watch list
terrorism watch list
During the years immediately preceding and following the turn of the twenty-first century, it has become very clear that the near future of international terrorism in the United States will be considerably _______________________.
threatening
The Oklahoma City bombing on April 19, 1995, raised questions about FEMA's role in responding to terrorist attacks. Debates raged among officials at FEMA and the Justice and Defense departments over who should be the first-responder — fire, police, emergency management or emergency medical services? Terrorism was part of FEMA's ______ approach to emergency management, but it lacked the resources and technologies to address specific terrorism issues such as weapons of mass destruction.
"all hazards"
In February 2015, Hackers are revealed to have stolen up to _______ from more than 100 banks in 30 countries since at least late 2013.
$1 billion
Homeland Security Council
(HSC) Entity within the executive office of the president of the US tasked with advising the President on matters relating to Homeland security
In addition to defense and communications systems, much of the nation's civilian infrastructure is hooked up to specialized computers that control other computers through ___________ systems. If hackers gain control of such a system, they can manipulate whatever it controls — such as a gas line, power grid or the floodgates of a dam.
(SCADA) supervisory control and data acquisition
What seven steps did the US want Pakistan to take?
1. Stop al Qaeda operatives at its border and end all logistical support for Bin Ladin 2. give USA blanket overflight and landing rights for all necessary military and intelligence ops 3. provide territorial access to US and allied military intelligence and other personnel to conduct operations against al Qaeda 4.Provide US with intelligence information 5.Continue to publicly condemn terrorist acts 6.Cut off all shipments of fuel to the Taliban and stop recruits from going to Afghanistan 7.If evidence implicated Bin Ladin and al Qaeda and the Taliban continued to harbor them to break relations with the Taliban gov
What were the three major steps the Principals Committee agreed that the government should take in regards to stopping terror attacks?
1.more money to CIA to accelerate efforts to "seriously attract al Qaeda" 2. Crackdown on foreign terrorist orgs in USA 3.Strengthen immigration law enforcement and the INS should tighten controls of Canadian Border
Seven immediate Responses as urgent domestic issues accumulated
1.organize federal emergency assistance. one question was what kind of public health advice to give about the air quality in lower Manhattan in the vicinity of fallen buildings 2.compensating victims. federal compensation fund. 3. determining federal assistance. On Sep 13 Bush promised to provide $20 billion for NYC in addition to $20 billion to the country as a whole 4.restoring civil aviation. on sep 13 the national airspace reopened for use by airports that met newly improvised security standards 5.reopening financial market 6.deciding when and how to return border and port security to normal operations 7.evaluating legislative proposals to bail out the airline industry and cap its liability
The National Response Framework features __________ core capabilities that are designed as practical elements in achieving the National Preparedness Goal.
14
US Intelligence Community
16 government agencies that work separately and together to conduct intelligence activities considered necessary for conduct of foreign relations and national security of US
The ___________ said Congress must be kept "fully informed" of major intelligence activities, but successive administrations have interpreted this to mean disclosing information to only a few key members of Congress. This also created the CIA.
1947 National Security Act
Eligible Receiver
1997 operation involved a team of computer experts from super secret national security agency
Name three emergency supplies FEMA recommends having on hand in case of a disaster.
3 day supply nonperishable food, a gal water per day per person, battery or crank radio, flashlight w batteries, first aid, whistle, dust mask, moist towelettes, wrench/pliers, manual can opener, local map, cell phone and charger
NSPD 9
3 objective national security strategy, first eliminate al Qaeda network, second do this using elements of national power do so including diplomatic military, economic, intelligence, information and law enforcement
Clarke briefed Rice on terrorism. He described al Qaeda as both an adaptable global network of jihadist organizations and a lethal core terrorist organization. one line in the briefing slides said that al Qaeda had sleeper cells in more than ___ countries, including the United States.
40
There were more than ___ intelligence articles in the PDBs from January 20 to September 10, 2001 that were related to Bin Laden.
40
Terrorism prevention now receives the lion's share of federal emergency-preparedness dollars. In 2005 some $180 million was allocated nationwide for state and local governments to fund emergency management, but it was in the form of _______ grants, which require local governments to supply a dollar for every federal dollar received. At the same time, the federal government dispersed $2.3 billion for anti-terrorism measures, with no matching funds required.
50-50 matching
__________ of Americans say limits on government collection of telephone and Internet data are inadequate, according to a recent poll.
65%
In May, CIA Counterterrorist Center (CTC) Chief Cofer Black told Rice that the current threat level was a ___ on a scale of 1 to 10, as compared to an 8 during the millennium.
7
The WTC actually consisted of _______ buildings, including one hotel, spread across 16 acres of land.
7
Some experts believe cyber intrusions actually occur even more often, because the host often is unaware of an attack, and many organizations are loath to report cyber attacks. The General Accounting Office (GAO) estimates that up to _____ of all computer security incidents may go unreported.
80%
The private sector controls ______ of the critical infrastructure in the nation.
85%
After the August 1998 bombings of the American embassies in Kenya and Tanzania, President Bill Clinton and his chief aides explored ways of getting Bin Ladin expelled from _______ or possibly capturing or even killing him.
Afghanistan
What were the three priority targets decided upon in a Defense Department paper for the Camp David briefing book on the strategic concept for the war on terrorism?
Al Qaeda, The Taliban and Iraq
Which 1996 law made some terrorist acts federal crimes punishable by death, thereby avoiding statute of limitation restrictions that apply to non-death penalty crimes? It established a formal list of foreign terrorist organizations (FTOs) to be designated by the secretary of state. Blocking FTO financing was an integral part of the bill, and it froze those groups' assets.
Antiterrorism and Effective Death Penalty Act of 1996
What was Atta's and Binalshibh coded language for the World Trade Center, Pentagon, the Capitol and the White House?
Architecture - World Trade Center Arts - Pentagon Law -Capitol Politics- White House
The emergency response at the Pentagon represented a mix of local, state and federal jurisdictions and was generally effective. Because of the nature of the event, a plane crash, fire and partial building collapse, the _______ served as the incident commander.
Arlington County fire Dept
More than a third of the world's data breaches originate in _______, more than in any other region. Nearly half of the breaches are launched in North America and Eastern Europe.
Asia
The _______ is currently regulated by the Ministry of Islamic Affairs. The ministry uses zakat and government funds to spread Wahhabi beliefs throughout the world, including in mosques and schools.
Assembly of Muslim Youth
Under President John F. Kennedy, the covert action program suffered a setback during the failed ________ invasion of Cuba in 1961. A force of Cuban expatriates trained and armed by the CIA invaded the island, aiming to remove communist leader Fidel Castro from power. However, the CIA was unable to provide the necessary U.S. military support.
Bay of Pigs
On August 6, 2001, the PDB was titled ____________. It was the 36th PDB that related to Bin Ladin or al Qaeda and the first devoted to a possible attack in the US.
Bin Ladin determined to strike in US
What four critical components of public health and medical preparedness are identified in HSPD-21?
Bio-surveillance, countermeasure distribution, mass casualty care, and community resilience
No connection was made between Moussaoui's presence in the US and the threat reporting during the summer of 2001. On September 13, the _______ received new, sensitive intelligence that Moussaoui had attended an al Qaeda training camp in Afghanistan. It passed that information to the US the same day.
British
U.S. government officials said that hackers working for the ______ government had tapped into computers at the Office of Personnel Management, which maintains records of federal employees and contractors. Data on about 4 million current and former federal workers (including Social Security numbers, job assignments and performance evaluations) may have been compromised. The U.S. government restricts sales of cellphones and computer servers made by the giant manufacture Huawei because they might contain "back doors" that this government could use to spy on American users.
Chinese
McCarthyism
Claimed communist had infiltrated Hollywood and even US gov, people were put on trial and some sent to prison
ComRep Chap 10
ComRep Chap 10
ComRep Chap 3
ComRep Chap 3
ComRep Chap 6
ComRep Chap 6
ComRep Chap 7
ComRep Chap 7
ComRep Chap 8
ComRep Chap 8
ComRep Chap 9
ComRep Chap 9
ComRep Chapter 12
ComRep Chapter 12
According to The 9/11 Commission Report; the second part of prescreening called on the air carriers to implement an FAA-approved computerized algorithm (known as ______________) designed to identify passengers whose profile suggested they might pose more than a minimal risk to aircraft.
Computer Assisted Passenger Prescreening System (CAPPS)
In 1987, Congress passed ___________, which shifted responsibility for the security of non- military computers from the National Security Agency (NSA) to the National Institute for Standards and Technology.
Computer Security Act of 1987
_______________ is a soft-line classification that allows policy makers to develop a range of options that do not involve the use of force or other repressive methods. The objectives of non-repressive responses depend on the characteristics of the terrorist environment. Examples of these responses include diplomacy, social reform and concessions.
Conciliatory Response
The _________, considered the first piece of disaster legislation, provided federal assistance to Portsmouth, N.H., following a huge fire.
Congressional Act 1803
The most substantial change in national security oversight in Congress took place following WWII. The ___________ created the modern Armed Services committees that have become so powerful today. One noteworthy innovation was the creation of the Joint House-Senate Atomic Energy Committee.
Congressional Reorganization Act of 1946
The ___________________________ are designed to effectuate the National Planning Frameworks, which in turn will theoretically achieve the National Preparedness Goal.
Core Capabilities
The first international treaty on cybercrime, the ________, went into effect in 2004 and was signed by the United States in 2006. But many of the countries that are often havens for cybercriminals, including Russia and China, are not a party to the treaty.
Council of Europe Convention on cybercrime
CAPPS (Computer Assisted Passenger Prescreening System)
Counter-terrorism system in place in the US air travel industry. TSA (transportation security)maintains a watchlist ,pursuant to 49 USC "individuals known to pose or suspected of posing a risk of air piracy or terrorism or threat to airline or passenger safety"
__________ has become the top national security priority for the United States.
Countering terrorism
In 1998 the FBI issued a 5 year strategic plan led by its deputy director, Robert "Bear" Bryant. For the first time, the FBI designated national and economic security, including __, as its top priority. Prior to 9/11 the FBI had never completed an assessment of the overall terrorist threat to the U.S. homeland.
Counterterrorism
In the mid-1980s, on the basis of a report from a task force headed by Vice President George Bush and after terrorist attacks at airports in Rome and Athens, the DCI created a _______ to unify activities across the Directorate of Operations and the Directorate of Intelligence.
Counterterrorist Center
Office of Emergency Management and Interagency Preparedness
Created by Giuliani, watch command to monitor key communication networks, improve response to major incidents, managing overall response to incidents
Beginning in March 1998 and continuing for nearly two years, a group of hackers had penetrated computers at the Pentagon, NASA, the Energy Department and several private universities and research labs. To this day the break-in, known as ________, has not been solved, although the attack was traced back to the Soviet Union. In response, the Clinton Administration released its National Plan for Information Systems Protection.
Cuckoo Egg
Custom Chap 11
Custom Chap 11
Custom Chap 12
Custom Chap 12
Custom Chap 13
Custom Chap 13
Custom Chapter 10
Custom Chapter 10
Custom Chapter 9
Custom Chapter 9
_________ is a top threat to U.S. security. Potential cyber threats may come from "profit- motivated criminals, ideologically motivated hackers or extremists" and "nation-states like Russia, China, North Korea and Iran". It is estimated that __________ costs the United States about $100 billion annually
Cybersecurity
The U.S. military established a signals intelligence unit during World War I to decipher enemy codes and provide codes for its own forces. In 1919 the unit was transferred to the State Department, where it became the _________ also known as the "Black Chamber", and focused on diplomatic rather than military communications. In 1929, Herbert Hoover, reportedly declared, "Gentlemen do not read other gentlemen's mail." Because of those ethical qualms, and for budget reasons, he disbanded it.
Cypher Bureau
While ____ already operates several cybersecurity programs, such as the U.S. Computer Emergency Readiness Team (US-CERT), it recently launched two major efforts to enhance cybersecurity. It is working with representatives from state and local governments, as well as the private sector, to develop a National Cyber Incident Response Plan (NCIRP).
DHS
The first major Internet virus, the Morris worm, appeared in 1988. Named after its creator, 23-year-old Cornell University doctoral student Robert T. Morris. It was not intended to harm computers or steal data, but the virus quickly spread to other computers, ultimately causing significant Internet slowdowns and sending alarms through the cybercommunity. Partly in response to the Morris worm, Carnegie Mellon University's Software Engineering Institute, with federal funding from the _____ founded the CERT (Computer Emergency Response Team).
Defense Advanced Research Projects Agency (DARPA)
DIA
Defense Intelligence Agency
Goldwater-Nichols Act
Department of defense reorganization act of 1986 publ 99-433 (signed by Reagan) made the most sweeping changes to the US Department of Defense since the department was established in National Security Act of 1947 by reworking command structure
In July 2001, Mayor Giuliani updated a directive titled, _______________. Its purpose was to eliminate potential conflict among responding agencies which may have areas of overlapping expertise and responsibility.
Direction and Control of emergencies in the city of New York
The National Security Act of 1947 created the position of ___________.
Director of Central Intelligence
_____________, so-called sovereign citizens who live in the United States but do not recognize the authority of any government, now outrank Islamic extremists on law enforcement's list of concerns, according to a 2013-14 survey on police intelligence processes conducted. They are also a growing threat to national security.
Domestic Terrorist
The National Security Agency manages a satellite surveillance network called ________. The NSA's network is apparently managed in cooperation with its counterparts in Australia, Canada, Great Britain, and New Zealand. Its purpose is to monitor voice and data communications. This is a kind of global "wiretap" that filters communications using antennae, satellites, and other technologies.
Echelon
___________ are defined as trade restrictions and controls that are imposed to pressure sanctioned governments to moderate their behavior. Used as a counterterrorist option, these serve several purposes. They: symbolically demonstrate strong condemnation of the behavior of the sanctioned regime, exercise the power of the sanctioning body, and potentially bring to bear considerable pressure on the sanctioned regime
Economic Sanctions
With the __________, Congress took another tack, legislating protections for data in transit. In 1994, the Communications Assistance for Law Enforcement Act required Internet service providers to provide capabilities for law enforcement to perform electronic surveillance of individuals. Such surveillance would still have to meet requirements for warrants specified under ECPA.
Electronic Communications Privacy Act of 1986
Which are the agencies most capable of carrying out the electronic surveillance mission?
Electronic Surveillance (NSA?)
Rice and Hadley asked Clarke and his staff to draw up the new presidential directive. On June 7, Hadley circulated the first draft, describing it as "an admittedly ambitious" program for confronting al Qaeda. What was its goal?
Eliminate al Qaeda network of terrorist groups as a threat to the US and friendly governments
NSPD 9 now extended to the global war on terrorism. The US would strive to eliminate all terrorist networks, dry up their financial support and prevent them from acquiring weapons of mass destruction. The goal was the ______________.
Elimination of terrorism as a threat to our way of life
Why do many organizations forgo reporting computer hackings to the police?
Embarrassment or ignorance?
In the United States, the ___________ performs domestic intelligence collection, and the ___________ operates internationally.
FBI, CIA
On September 11, the nation suffered the largest loss of life-2973-on its soil as a result of a hostile attack in its history. The _____ suffered 343 fatalities, the largest loss of life of any emergency response agency in history.
FDNY
According to The 911 Commission Report, by 8:48, officials in OEM headquarters on the 23rd floor of 7 WTC—just to the north of the North Tower—began to activate the Emergency Operations Center by calling such agencies as the __________________________instructing them to send their designated representatives to the OEM.
FDNY,NYPD,Department of Health, Greater Hospital Association
The USA PATRIOT Act significantly expanded law enforcement's investigative powers under the ___________ which had been enacted in response to the inappropriate use of wiretaps by the administration of President Richard Nixon. This act was intended to serve as a "firewall between foreign and domestic intelligence gathering". By separating the two types of electronic surveillance, foreign and domestic, it was designed to preserve Fourth Amendment protections for U.S. citizens in criminal cases.
FISA Act of 1978
federal information security management act
FISMA strengthens and makes permanent many GISRA provisions
The paper titled, ____________, detailed specific US demands for the Taliban. The State Department did not expect the Taliban to comply, therefore State and Defense would plan to build a coalition to go into Afghanistan
Game Plan for a Political Military Strategy for Pakistan and Afghanistan
What was Samuel Huntington's Clash of Civilizations theory?
Greatest conflicts will be between the christian nations of west end and muslim nations
Confronting traing or travel problems with Hazmi, Mihdar, Binalshibh and Moussaoui, al Qaeda was looking for another possible pilot candidate. A new recruit presented himself in Afghanistan. Who was this?
Hani Hanjour
Late May brought reports of a potential hostage plot against Americans abroad to force the release of prisoners including the Blind Sheikh. The reporting noted that operatives might opt to ______ an aircraft or storm a U.S. embassy.
Hijack
Intelligence indicated the persistence of contacts between ________ security officials and senior al Qaeda figures after Bin Ladin's return to Afghanistan. These border inspectors would not place telltale stamps in the passports of these travelers. In sum, there is strong evidence that this country facilitated the transit of al Qaeda members into and out of Afghanistan before 9/11.
Iranian
The enemy is not just terrorism. The catastrophic threat at this moment in history is more specific. It is the threat posed by _______ terrorism- especially the al Qaeda network, its affiliates and its ideology. Some of these leaders draw on a long tradition of extreme intolerance within one stream of Islam.
Islamist
Who were the three pilots on the East Coast who were simulating flights on large jets.
Jarrah, Atta and Shehi
The chief vehicle for INS and for state and local participation in law enforcement was the _____________, first tried out in New York City in 1980 in response to a spate of incidents involving domestic terrorist organizations
Joint Terrorism Taskforce
By far the most expensive disaster in the nation's history, _________ is expected to cost at least three times more than the second-costliest U.S. disaster, the 1988 heat wave and drought.
Katrina
The overall objective of legalistic responses is to promote the rule of law and regular legal proceedings. ___________ refers to the use of law enforcement agencies and criminal investigative techniques in the prosecution of suspected terrorists. Counterterrorist laws attempt to criminalize terrorist behavior. __________ relies on cooperation among states. Those who are parties to international agreements attempt to combat terrorists by permitting them no refuge or sanctuary for their behavior. In some cases, terrorists may be brought before international tribunals.
Law enforcement
What was the Phoenix memo?
Memo of an investigation into a possible attack coordinated by Osama Bin Ladin
___________ are defined as the recognized and official armed forces of a nation. __________ are defined as irregular armed units or individuals who are supported or organized by regimes.
Military assets, paramilitary assets
__________ also claimed to have found out about the 9/11 attacks three weeks in advance, a claim that appears to dovetail with evidence that he may have received a phone call from Hamzi around that time, that he stopped making calls from his telephone after August 25, 2001, and that he started acting strangely.
Modhar Abdullah
Terrorist Factory
Mosque located in al Qassim Province
International Security Assistance Force
NATO led peacekeeping force
In 1952, Truman created the __________ within the Defense Department. A descendant of the "Black Chamber" of the 1920s, its job was to coordinate the military's signals intelligence operations. It was highly secretive and its existence wasn't officially acknowledged until 1975.
NSA
Information that was critical to informed decision making was not shared among agencies. FDNY chiefs in leadership roles that morning have told the Commission Report that decision making capability was hampered by a lack of information from ______.
NYPD aviation
A day after the hurricane struck, the DHS declared Katrina an "incident of national significance," which under the new _________ should trigger a coordinated federal response. By the following day, the amphibious assault ship USS Bataan arrived with supplies off New Orleans, but not until Sept. 5, a week after Katrina hit, did troops arrive.
National Response Plan
On Jan. 8, 2008, President Bush followed up on Byzantine Foothold (a classified effort to track and neutralize attacks on critical networks) by issuing _________, which called for the creation of Comprehensive National Cybersecurity Initiative (CNCI), which established a National Cyber Security Center within the Department of Homeland Security.
National Security Presidential Directive 54
__________ committed against the citizens or holdings of a state generally is not a violation of international law, but rather a violation of the domestic criminal laws of the victim state or the state where the terrorist act occurred. _____________ is a violation of international law that invokes the victimized state's right of self- defense.
Non State Sponsored terrorism, State Sponsored terrorism
According to The 911 Commission Report, the Phase Two strikes and raids began on __________.
October 7th
What did the Intelligence Reform and Terrorism Prevention Act create?
Office of Director of National Intelligence
The CIA is a descendant of the __________, which President Roosevelt created early in World War II after having first thought the FBI might take that role. With its history, the CIA brought to the era of 9/11 many attributes of an elite organization, viewing itself as serving on the nation's front lines to engage America's enemies
Office of strategic services (OSS)
President Bush wrote __________ to request his support in dealing with terrorism and to urge Pakistan to engage actively against al Qaeda.
President Musharraf
National Security Directive 138
Presidential Directive focused on combatting terrorism
______________________ and ___________________ planning refers to devising procedures and policies that reduce the severity of threats to homeland security.
Prevention, mitigation
The ______________ is an independent federal body established by Congress in 2004 to balance terrorism prevention with the protection of privacy and civil liberties. It conducted a review of the NSA surveillance program.
Privacy and Civil Liberties oversight board
Who designed a theory that holds that modern terrorism has progressed through three "waves" lasting roughly 40 years each and that we now live a fourth wave?
Professor David C Rapoport
The _______ is the only relief organization chartered by Congress "to maintain a system of domestic and international disaster relief." In fact, the National Response Plan specifically calls on this organization to provide local relief. During Katrina, it provided hurricane survivors with nearly 3.42 million overnight stays in more than 1,000 shelters. And, in coordination with the Southern Baptist Convention, it served nearly 27 million hot meals to victims.
Red Cross
There was no rooftop evacuation. Although the __________ had a helipad, it did not meet the 1994 FAA guidelines.
South Tower
Following the 9/11 attacks, former President Bush signed an executive order allowing foreigners suspected of international terrorism to be tried in _________. These are formed under the power of the executive branch of government and are independent of the judicial branch. The prosecutors and judge-commissioners are military officers, responsible to the president.
Special Military Tribunals
The 911 system remained plagued by the operator's lack of awareness of what was occurring in the WTC. Callers were told to remain where they were. The lack of information combined with the general advice to remain where they were may have caused civilians above the impact not to attempt to descend although ________ may have been passable.
Stairwell A
As the Clinton administration drew to a close, Clarke and his staff developed a policy paper of their own, the first such comprehensive effort since the Delenda Plan of 1998. The resulting paper, entitled, ____________, reviewed the threat and the record to date, incorporated the CIA's new ideas from the Blue Sky memo, and posed several near-term policy options.
Strategy for Eliminating the threat from the Jihadist networks of al Qaeda: Status and prospects
____________ is an antiterrorist measure that makes potential targets more difficult to attack. Examples include increased airport security, the visible deployment of security personnel, and the erection of crash barriers at entrances to parking garages beneath important buildings.
Target Hardening
In the decade before 9/11, presidential discussion of and congressional and public attention to foreign affairs and national security were dominated by other issues. ________ infrequently took center stage, and when it did, the context was often on the tactics used.
Terrorism
Hal Lindsey, a former minister with Campus Crusade for Christ, sparked a revival with a 1970 book that became a publishing sensation, ______________, which cited biblical passages as prophecies applicable to the late 20th century, including the threat of nuclear war and the 1948 creation of Israel.
The Late Great Planet Earth
The computer systems of Sony Pictures Entertainment were hacked in 2014. The FBI blamed ___________, though without conclusive evidence. In January, Obama imposed sanctions on these agencies and officials, citing the communist country's "destructive, coercive cyber- related actions"
The North Korean Gov
What are two publications that continue to spread racial and anti-Semitic extremism?
The Turner Diaries and The myth of six million