SRA 211
Types of white collar crimes.
-Currency Schemes: speculating on the future value of currencies outside accepted trading strategies in recognized markets -Embezzlement: person who is entrusted with money or property of another person and uses it for their own use and benefit -Extortion: illegally getting property from another by actual or threatened force, fear or violence, or under cover of official right -Counterfeiting: copying money without authority, making it seem real, and trying to use it. (usually money but can be designer things) -Forgery: passing or negotiating a false or worthless thing (check, counterfeit security) with intent to defraud or injure recipient -Insider trading: use of inside, confidential or advance info to trade securities of corporations
Factors that contributed to the rise of Islamic Extremism:
-the failure of many secular governments in the Muslim world to provide and promote good governance and economic opportunity -the role of external actors in furthering the creation of extremist groups in Afghanistan, the Middle east and elsewhere in the Muslim world -the manipulation of Islamic precepts and spread of a world-view of Muslims as victims of persecution and oppression
In the game theory analysis, the above diagram is an illustration of:
A zero-sum game
The so-called "Islamic State in Iraq and Syria" (ISIS) grew out of which Al Qa'ida sub-group?
Al Qa'ida in Iraq
Which of the following is Not a factor that can distort network analysis results with respect to terrorist organizations?
All terrorist organizations are characterized by decentralized, random networks, which are more difficult to analyze
Which biological agent was used in attacks in the United States in late 2001?
Anthrax
Which is true about the Nash Equilibrium?
Any Nash Equilibrium is also a dominant strategy equilibrium
Which of the following statements describes a creative terrorist method of attack?
As the novelty of the method diminishes, so does its effectiveness
Terrorist ideologies often justify attacks on civilians on the grounds that such attacks are:
Both moral and effective
Blister, blood and choking agents are all types of:
CHEMICAL WEAPONS
5 commonalities of terrorism
Cash, Charismatic Leader, Commitment, Cause, Camaraderie
A cyber-terrorism attack against computers or computer networks and systems may:
Change processing logic Disrupt equipment and hardware reliability Steal of corrupt data
Which of the following was an alleged serial killer from the 17th century?
Countess Erszebet Bathory
The 2015 cyber attacks against U.S. Government databases are best described as:
Cyber-espionage
Unauthorized probing to test a target computer's configuration or evaluate its system defenses, or unauthorized viewing and copying of data files is BEST DESCRIBED as an example of:
Cyber-espionage
In the SRA 211 course textbook, Professor Forst describes a terrorist worst-case scenario involving a nuclear attack that would cripple a government by killing or incapacitating a number of its leaders. Professor Forst refers to this scenario as:
Decapitating Strike
In the "Preemption vs Defense Conundrum," the temptation to be a "free rider" on the part of each country may lead to the least desirable OVERALL outcome, which is represented by
Defense, Defense
Which of the following is NOT one of the four overarching counterterrorism strategies discussed in class?
Economic embargo
Relevant to the country's decision to designate a country as a "state sponsor of terrorism"
Export Administration Act, Arms Export Control Act, Foreign Assistance Act
The Terrorist Screening Center is part of which U.S. Government agency?
FBI
Section 215 of the USAPATRIOT Act, which provides for the production of "tangible things" (including books, records, papers, and documents) for foreign intelligence and international terrorism investigation, expired in June 2015 and has NOT been extended.
False
The CANVAS reading assignment "The U.S. National Strategy for Counterterrorism" focuses on efforts to counter the threat posed by the Islamic State in Iraq and Syria (ISIS).
False
The Financial Action Task Force (FATF) is a U.S. Government agency charged with tracking terrorist financing.
False
The Terrorist Finance Tracking Program (TFTP) accesses voluminous financial data from U.S banks to monitor possible "home-grown" terrorism:
False
Unlike Great Britain, the United States has not experienced terrorist attacks or attempted attacks by "home-grown" Islamic extremists.
False
Which of the following is NOT part of the Department of Homeland Security?
Federal Bureau of Investigation
According to author of the SRA 211 textbook, religious traditionalists who believe in literal interpretation of sacred texts are known as:
Fundamentalist
The CANVAS Reading assignment, the "UN Counterterrorism Strategy Review," is a product of the UN's:
General Assembly.
Electro-optical intelligence, which is produced by optical systems similar to images produced by cameras, is one example of:
Geospatial Intelligence
The intelligence collection discipline that focuses largely on various types of imagery is knowns as:
Geospatial Intelligence
In the network depicted above, which of the following has the greatest degree of closeness centrality?
Heather (the one that can reach everyone in the fewest nodes possible)
An intelligence assessment of the prospects for early elections that might change the composition of the government in Italy would be an example of an event that has:
High Likelihood and Low Importance
The so-called "intelligence cycle" included in the course ANGEL presentations includes all of the following EXCEPT:
International Sharing
Which of the following statements apply to the Nash Equilibrium?
It is a situation in which a player can not improve their position in light of the other player's move
In the diagram above, who has the highest out-degree centrality?
Khyam (the one with the most arrows pointing away from the node)
Two countries that were formerly on the U.S. list of state sponsors of terrorism but have been removed from the list are:
Libya and Cuba
Which of the following acts of terrorism was most effective in achieving the terrorists' political goals?
Madrid Bombing 2004
The fundamental change in the nature of the worldwide terrorist threat beginning in the 1990s was the onset of:
Mass casualty attacks
The tolerance or resilience of a network in the face of internal failure or external attacks is known as:
Network Robustness
According to the 2005 FBI study, serial killers:
Often suffer from personality disorders
In the "covert action ladder" graphic, which type of covert action is ranked as the LEAST violent and the MOST likely to be "deniable?"
Propaganda
The type of covert action that aims to spread disinformation concerning the goals and actions of terrorist groups and to highlight activities of terrorists that cast them in a negative light is:
Propaganda
The counterterrorism policy that aims at disseminating a positive image of a government's values, culture and policies in order to win the "hearts and minds" of terrorist supporters is called:
Public Diplomacy
The type of weapon of mass destruction that spreads deadly radioactive materials by way of a conventional explosive device is called a
Radiological
Professor Forst argues in the SRA 211 textbook that an individual's perception of fear is often distorted by:
Rare but extreme threats
The critical Thinking mechanism that compares two things to identify their major shared characteristics is called:
Reasoning by Analogy
The method of intelligence collection that focuses on the interception of communications by electronic or electro-acoustic means is known as:
SIGINT
Who is the 20th century Egyptian islamist and intellectual whose teachings and writings are believed to have contributed to the phenomenon known as "global jihad?"
Sayyid Qutb
A network that is dominated by a few key nodes, which has many connections, is a:
Scale free network
The Al-Qaeda terrorist network most clearly resembles a:
Scale free network
Targeted attacks against certain nodes in a network have the greatest impact on which type of network?
Scale-free Network
According to the 2005 FBI study, serial killers:
Span all racial groups, with a degree of diversification that generally mirrors that of the overall US population
Situations in which a state actor does not support or even encourage a terrorist organization operating on its territory, but is unable or unwilling to take action to suppress it, is referred to as:
State tolerance of terrorism
Which countries are currently on the state sponsored terrorism list?
Syria, Iraq, Sudan, and North Korea
What is the name of the group that claimed credit for the 2013 attack in which computer hackers hacked the Twitter account of The Associated Press and sent a tweet stating that there had been two explosions at the White House and that President Barack Obama was injured?
Syrian Electronic Army
In game theory, a Dominant Strategy is:
The course of action for a player that results in the best individual payoff, regardless of opponent's choice
Experts at the Nuclear Control Institute have concluded that it would be possible for terrorists to construct a "crude" or "improvised" nuclear device with a nominal yield of 10 kilotons.
True
So-called "peacetime assassinations" have been officially banned by the U.S. since 1976.
True
The creation of the Department of Homeland Security in the wake of the September 11, 2001 terrorist attacks was the largest reorganization of the U.S. Government since 1947.
True
The Foreign Intelligence Surveillance Act (FISA) prescribes procedures for requesting judicial authorization for electronic surveillance and physical search of persons engaged in espionage or international terrorism against the United States on behalf of a foreign power.
True.
A broad definition of "domestic terrorism," which has generated concerns among civil liberties advocates, is contained in which law?
USAPATRIOT Act
Individuals "who have engaged in hostilities or purposefully and materially supported hostilities against the United States or its allies" are considered by the U.S. Government to be:
Unlawful enemy combatants
All of the following are advantages of biological weapons EXCEPT:
Unlike chemical weapons, their effectiveness is not affected by climatic conditions
A terrorist cell that provides logistical support to the terrorist organization is called
auxiliary cell
white collar crime
crime committed by a person at their job that use deceptive practices & used fraud to obtain money
The 2007 cyber attacks in Estonia were, for the most part
distributed denial-of-service attacks
In the assigned textbook reading on "Responses to Terrorism," Professor Forst states that the first objective in responding to a serious terrorist attack is to:
establish the source or sources of the attack
Which of the following attributes does NOT pertain to "ethnocentric terrorism?"
it seeks to extract some concession from the "enemy" state or government
The task of the so-called "UN 1267 Committee" is to:
oversee the implementation of sanctions imposed on individuals and entities associated with the Taliban, Osama Bin Laden and Al-Qaida
All of the following are advantages of international counterterrorism cooperation EXCEPT:
the measures adopted are always binding and enforceable
Which of the following statements concerning the use of foreign aid and economic sanctions as counterterrorism tools is/are true?
these tools usually can only be used against states that sponsor terrorism and they are both often criticized as impacting innocent civilians rather than the actual terrorist supporters