Homeland security

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which federal agency performs domestic intelligence collection?

FBI

Groups from ______ and ______ figured prominently in left-wing domestic and international terrorist incidents between the 1960s and the early 1980s.

Latin America; Western Europe

One of the more well-known Post 9/11 conspiracy theories is that ______.

former President Obama was not born in the United States and is a Muslim

The ______ describes the emerging mode of conflict and crime in which the protagonists use network forms of organization and related doctrines, strategies, and technologies attuned to the information age.

netwar theory

Which of the following is considered a cause for the globalization of political violence?

new information technologies

Which terrorist group engaged in a series of hijackings that is seen as the start of modern aviation terrorism?

Popular Front for the Liberation of Palestine

What series of events marked the first occasion in U.S. history for chemical, biological, and radiological terrorism?

post 9/11 anthrax attacks

What is the fundamental objective of intelligence collection?

predict terrorist behavior and prevent attacks

Which of the following is a homeland security role of the Department of Defense (DOD)?

prevent acts of terrorism inside the borders of the United States

Proper homeland security planning requires collaboration between the public and ______ sectors.

private

Which phase of the intelligence cycle organizes and refines data?

processing

What did National Security Presidential Directive-47/Homeland Security Presidential Directive-16 do?

produced a strategic plan for aviation safety

Due to their treatment of Iraqi detainees held at the U.S.-controlled Abu Ghraib prison, several U.S. soldiers were ______.

put on trial and convicted in the military courts

Most lone-wolf attacks are motivated by religion, anti-government sentiment, or ______.

racism

Quite often, a state's system of configuring of homeland security services is subject to ______.

reorganization

What do extradition treaties do?

require parties to bind over terrorist suspects at the request of fellow signatories

The five mission areas introduced and explained by the FEMA's National Planning Frameworks are: prevention, protection, mitigation, ______, and ______.

response; recovery

The Aviation and Transportation Security Act of 2001 created the TSA, replaced contractors with professional TSA screeners, and required ______.

screening of all bags through an explosive detection system

After the September 11th attacks, federal agencies were reorganized so that the Coast Guard and Customs agencies had new directorates and duties. Which one of the Department of Homeland Security's five core missions best reflects the new focus of these two agencies?

secure and manage our borders

policy options for domestic security may be classified within four categories: enhanced intelligence, enhanced ___, Legal options, and conciliatory options.

security

The DHS Office for Civil Rights and Civil Liberties was created to address the concern that ______.

security-related laws were violating citizens' personal freedoms

The overall purpose of the Quadrennial Homeland Security Review Report (QHSR) is to ___.

serve as a systematic review of the homeland security enterprise

what type of policy is an attempt to address the grievances of the terrorists and their championed group?

socisl reform

The 9/11 Commission discovered structural barriers to performing joint intelligence work, as well as a lack of ______ and practices across the foreign-domestic divide.

standards

Which entities are responsible for implementing state emergency plans?

state bureaucracies

One of the many duties of the Private Sector Office of the DHS is to create and manage private sector ______ made up of industry representatives.

advisory councils

What is one of the main characteristics of the Purist Klan?

aggressive and vitriolic rallies

The Homeland Security enterprise refers to ____.

all governmental, nongovernmental, and private-sector agencies that share a common interest in US security

From the late 1700s to the mid-1940s, numerous laws were passed to address security concerns in the United States that resulted in ______.

strong criticism and opposition by some citizens

What is the goal of the Pre-Disaster Mitigation grant?

to reduce risk to the population and structures and reduce reliance on federal funds

The main goals of ISIS are first, to refuse to recognize the borders of Syria, Iraq, and other nations and second, ______.

to wage war to establish a renewed Islamic state that will encompass the entire Muslim world

______ are centers of specific homeland security vulnerability

Nodes

What is the approximate amount of funding disbursed by the federal government to state governments each year for emergency management?

$300 million

The modern intelligence community functions under the authority of the ______.

Executive Branch

Franklin Delano Roosevelt established the War Relocation Authority, resulting in ______.

100,000 Japanese being forced into internment camps

The modern era of international terrorism first emerged as a considerable security challenge during the ____ and ____

1960's, 1970s

When the bombing of the Alfred P. Murrah Federal Building in Oklahoma City occurred, which plan presented the procedural framework for federal response coordination?

1993 Federal Response Plan

Approximately how many people were killed in the September 11th attacks?

3,000

Experts do not know how many people count themselves as Al-Qaeda operatives, but estimates range from ______.

35,000 to 50,000

What is the name of the satellite surveillance network managed by the National Security Agency?

Echelon

Which system is used to promote multi-tiered collaboration between federal, state, and local governments in emergency situations?

National Incident Management System

The National Commission on Terrorist Attacks Upon the United States is more commonly known as the ______.

9/11 Commission

which terrorist event led to our modern day alignment of national response mechanisms?

9/11 attacks

Which public-private system has an overarching goal to build a secure and more resilient America by preventing or mitigating the effects of a terrorist attack?

National Infrastructure Protection Plan

What agency or agencies coordinate Joint Terrorism Task Forces?

National Joint Terrorism Task Force

What is extraordinary rendition?

A method of covertly abducting and detaining suspected terrorists or affiliated operatives.

______ are a common target of moralist terrorists.

Abortion providers

The main goal of most groups who commit international acts of terrorism is to bring the attention of the world to

An otherwise domestic conflict

Which agency is responsible for designing, building, launching, and maintaining America's intelligence satellites?

National Reconnaissance Office

What U.S. government organization was behind the controversial Tempora, PRISM, and XKeyscore operations?

National Security Agency

President Clinton signed the ____ into law, which contains multiple provisions To prevent, detect, and punish acts of terrorism

Anti-terrorism and effective death penalty act

Why was the privilege of the writ of habeas corpus suspended during the Civil War?

Article III, Section 9 of the U.S. Constitution allows it during instances of rebellion.

The AK-47 and the M16 are both examples of

Assault rifles

______ agents are substances that rely on toxicity and are used for hostile purposes to cause disease or death in humans, animals, or plants.

Chemical

those who manufacture plastic explosives often use ____ To tag each batch, resulting in the ability to trace them back to their source.

Chemical markers

Although the Posse Comitatus Act limits the federal government's authority to use the military to enforce domestic policies, which two branches of the armed services can be deployed to domestically restore law and order?

Coast Guard and National Guard

______ are conventional or unconventional adversaries who engage in armed conflict as members of regular military or irregular guerrilla fighting units.

Combatants

One of the biggest challenges for domestic lawmakers in the United States is balancing the need to pass strong antiterrorism laws with protecting

Constitutional rights

What is the name of the program intended to help increase security for maritime containerized cargo shipped to the United States from around the world?

Container Security Initiative

What was the name of the treaty that "sought to define attacks against internationally protected persons as common crimes, regardless of motives?"

Convention to prevent and punish acts of terrorism taking the form of crimes against persons and related extortion

The 14 core capabilities featured in the National Response Framework contain ______ that should be undertaken by response authorities

critical tasks

______ are consortia of regional governing bodies that promote collaboration and cooperation among members.

Councils of Government

which document identifies state sponsors of terrorism and foreign terrorist organizations (FTOs)?

Country Reports on Terrorism

the all-hazards Umbrella refers to the preparation for disasters that are ___.

Created by humans as well as natural disasters

What is considered the largest U.S. law enforcement agency, tasked with securing our nation's borders?

Customs and Border Protection

What agency absorbed the duties of INS and Border Patrol in 2003?

Department of Homeland Security

which piece of legislation created a large, Cabinet level department dedicated to protect the United States from terrorist attacks?

Department of Homeland Security Act

The ______ works with DHS agencies to secure the nation's ports.

Department of Transportation

Which federal agency outside of the Department of Homeland Security would be responsible for protecting the Statue of Liberty?

Department of the Interior

A(n) ____ Occurs when emergency response institutions cannot contain the Emergency event or stabilize critical services.

Disaster

The detonation of nuclear devices can cause ____, which can then result in grid infrastructure malfunctions.

EMPs

If a nation is designed as a state sponsor of terrorism, established sanctions include a ban on arms-related trade, restrictions on the purchase of items that could be used for military purposes, as well as ____.

Economic sanctions

What types of functions represent systematized collaboration among policy planners and represent federal coordinating structures used to achieve the core capabilities?

Emergency Support Functions (ESFs)

What term is used when a hazard actually turns into a risk?

Emergency event

tornado intensity is reported in accordance with the ___ scale

Enhanced Fujita-Pearson

Which clandestine law enforcement agency was reassigned to TSA from Immigration and Customs Enforcement?

Federal Air Marshal Service

Which organization would be tasked with responding to a Category 5 hurricane in the United States?

Federal Emergency Management Agency

which agency was the first example of the national consolidation of emergency mitigation?

Federal emergency management agency

What are Molotov cocktails examples of?

Gasoline bombs

What is the difference between cyberwar and hacktivism?

Hacktivism is usually carried out by non-state actors, while cyberwars are carried out by state actors.

The modern era of homeland security began after 911 with a series of policy initiatives that included the patriot act, executive order 13228, numerous presidential directives, and the creation of the department of ___.

Homeland Security

Congress established the ______ at the height of the Great Depression to stop the spread of leftist sentiment.

House Un-American Activities Committee

Which two groups comprised the insurgency in Iraq that developed after the overthrow of Saddam Hussein?

Hussein loyalists and non-Iraqi Islamist fighter

Two terrorist groups who have strategically used social networking in the Internet to promote their message and recruit members are Al-Qaeda and

ISIS

Customs and Border Protection, Citizenship and Immigration Services, and ______ are responsible for addressing immigration concerns within the Department of Homeland Security.

Immigration and Customs Enforcement

What agencies are tasked with securing our border, other than the TSA, Coast Guard, and Border Protection?

Immigration and Customs Enforcement

The Federal Emergency Management Agency and other agencies provide ______ training to state and local officials and responders.

Incident Command System

______ is regularly condemned when used in any non-warfare environment, regardless of the characteristics of the victim.

Indiscriminate force

Which centers provide assistance in planning for the 16 identified critical infrastructure sectors?

Information Sharing and Analysis Centers

In December 2004, the IC was reorganized with the passage of the______.

Intelligence Reform and Terrorism Prevention Act

What are multinational agreements between partner countries known as?

International conventions

How is biometric technology used when conducting surveillance and security?

It uses body measurements and characteristics to identify subjects.

What do we call the offices that are locally established to respond to an emergency incident and coordinate recovery activities?

Joint Field Offices

After 9/11, more than 75% of state law enforcement agencies reported that assignment of personnel to agencies such as _______ has increased.

Joint Terrorism Task Forces

______ are small cells of highly trained, locally based, investigators, analysts, linguists, SWAT experts, and other specialists.

Joint Terrorism Task Forces

Which Republican senator held a series of televised hearings to investigate allegations of communist spying in the United States?

Joseph McCarthy

in order to be designed as an FTO, a group must be a foreign organization, engage in specifically defined terrorist activity, and participate in conduct that threatens the ____.

National defense, foreign relations, or economic interests of the United States

What did the HHS publish in 2007 to promote a system for integrating medical and health resources when responding to large-scale emergencies?

Medical Surge Capacity and Capability Handbook

Which one of the Quadrennial Homeland Security Review Report's missions would address preventing an attack by sea?

Mission 2- Securing and Managing Our Borders

____ is the effort to reduce loss of life and property by lessening the impact of disasters

Mitigation of risk

during the colonial and early frontier periods of the United States, the two main external security threats came from the ____ and the ____.

Native Americans, British

tropical cyclonic Storms, earthquakes, tornadoes, floods, and wildland fires are all examples of

Natural hazards

Which organization's strategic plan includes the goal of advancing continuous improvement in emergency management through strategic partnerships?

NEMA

What is the name of the organization created by the DHS to disseminate the new ICS protocols?

NIMS

Which association has over 2,000 counties as members and provides vital data to federal, state, and county governments?

National Association of Counties

The ______ serves as the national voice for regionalism by advocating for solutions through interjurisdictional cooperation.

National Association of Regional Councils

What is the name of the nonprofit, umbrella organization of emergency management directors from all states and territories?

National Emergency Management Association

A governor is authorized to deploy the ______ for rescue relief, assistance with rioting, and for securing critical infrastructure.

National Guard

Which organization was established by NEMA to provide a neutral forum for emergency organizations to exchange ideas and have candid discussions?

National Homeland Security Consortium

What two new elements were created after the IRTA was passed?

ODNI and NCTC

Executive Order 13228 established the ___.

Office of Homeland Security

What was the relationship between the assailants in the 2015 San Bernardino and the location of the attack, the Inland Regional Center holiday party?

One of the assailants, Syed Rizwan Farook, was currently employed at the center

Beginning in the late 1960s, ______ nationalists were the leading practitioners of international terrorism.

Palestinian

The First Red Scare resulted in Woodrow Wilson authorizing the ______.

Palmer Raids

______ gas is a weaponized chemical agent that causes the lungs to fill with water and chokes the victim.

Phosgene

Semtex and Composite-4 are examples of __.

Plastic explosives

In addition to bombs and plastic explosives, what other types of weapons pose the most significant threat to aircraft, airline terminals, and other aviation targets?

RPGs and PGMs

______ refer to several periods in U.S. history when perceived threats from anarchist, communist, and other leftist subversives created a generalized climate of political anxiety.

Red Scares

______ terrorism is political violence conducted by groups of "true believers" who have fervent faith in the sacred righteousness of their cause.

Religious

What is the name of the active-shooter protocol adopted by many US business facilities and educational campuses?

Run, hide, fight

______ is the ability to withstand and recover rapidly from deliberate attacks.

Resilience

Which Department of Homeland Security Administrative Center agency is responsible for protecting the U.S. President and the U.S. financial infrastructure?

Secret Service

______ agencies are assigned to homeland security missions that protect critical infrastructure in the United States from terrorist attacks.

Sector-specific

With the exception of mines, The vast majority of terrorist bombs are

Self constructed, improvised weapons

The U.S. government completely revamped domestic homeland security after which event?

September 11, 2001

What was one of the Phase 1 conspiracy theories of the far right?

Soviet cavalry units were preparing to invade Alaska across the Bering Strait from Siberia.

Hurricane Andrew and hurricane Katrina show that the United States had significant deficiencies in which area?

The emergency management system

what is the name of the judicial arm of the United Nations?

The international court of justice

What is the biggest threat that Mexican Drug cartels present to homeland security?

The well-funded drug trade has been linked to ideologically motivated extremists.

Why is security for the railroad system a complex consideration?

There are hundreds of railway owners, and collaboration among them is difficult.

Why don't all states have the same procedures and reporting responsibilities for assigning homeland security duties to their state's emergency management offices?

There are too many political issues related to state's rights and not enough funding.

Which statement is true regarding firearms and terrorists?

They use small arms and heavy infantry firearms

Why does the Tri-Border Area present a threat to the United States?

Thousands of extremists live there and can pose as travelers from nearby countries friendly with the United States

Which division of the DHS provides leadership in securing transportation along with the Department of Transportation and the Coast Guard?

Transportation Security Administration

Which one of the Department of Homeland Security Administrative Center agencies carries out one of its main duties at our nation's airports?

Transportation Security Administration

Which government agency administers civil aviation and issues regulations to control air traffic and promote safety?

U.S. Federal Aviation Administration

in 2015, the USA patriot act was superseded with modifications by

USA freedom act

Which post 911 law greatly enhanced government surveillance, required banks to identify sources of certain monies, and allowed for greater detention and deportation of immigrants?

USA patriot act

Which agency would approve or deny an immigrant's request for citizenship?

USCIS

What three DHS agencies are responsible for securing our borders?

USCIS, ICE, CBP

Which institution does the Patriot movement deem evil and dangerous?

United Nations

Why was the National Infrastructure Protection Plan enacted?

to outline the public-private relationship between the government and the private sector

Which of the following is an attribute of the Old Terrorism?

a "surgical" selection of targets

What does the National Response Framework recommend creating in order to manage a Joint Field Office (JFO)?

a Unified Coordination Group

The whiskey rebellion is an early example of a security threat originating from ____.

a domestic dispute over taxes

Which of the following definitions best describes ethnonationalism?

a form of nationalism where the true definition of a nation is defined in ethnic terms

What is "medical surge?"

a large-scale emergency involving human casualties in large numbers

What was the primary motivation for the attacks of September 11, 2001?

a martyrdom mission for jihad

What is an enemy combatant?

a suspected terrorist

In June 2011, President Barack Obama signed executive orders approving guidelines that ______.

approved developing computer-assisted actions against adversaries

To whom does the BIPS provide information?

architects and building owners about how to keep buildings safe after a disaster

In order to prevent and mitigate threats to homeland security, the DHS must identify potential risks, assess whether a terrorist incident is likely, and then ______.

assess the consequences to society

What event ended the era of reactive planning for national emergency?

attacks on September 11, 2001

Critical infrastructure consists of which of the following?

aviation security

When do state emergency management offices usually become involved in local emergencies?

when they receive a request from local authorities

Repressing passionate political ideas usually results in ______.

backlash and violent resistance

Bubonic plague, botulisms, and the Ebola virus are all classified as ______ agents

biological

Max Weber invented ______ term to describe operational arrangements for government functions.

bureaucracy

How do terrorists measure whether or not their efforts have been successful?

by subjective and unconventional methods, such as getting media attention and disrupting societal routines

Proponents of New Terrorism justify their goal of maximizing casualties because they want to attract attention to their cause, damage the economies of their enemies, make enemy populations scrutinize their demands, and ______.

carry out religious mandates

What are soft targets?

civilians and passive military targets

What is the main goal of the NSA?

collect communications and other signal intelligence

As an all-hazards approach to homeland security, HSPD-21 identified four critical components of public health and medical preparedness: bio-surveillance, countermeasure distribution, mass-casualty care, and ______.

community resilience

The Office of Civil Rights and Civil Liberties of the Department of Homeland Security (DHS) was established in response to ______.

concerns by Americans that the DHS might violate citizens' constitutional rights

when it comes to conciliatory options, ___ options can be generalized or incident specific.

concessionary

_____ is arguably the most "soft" policy option for dealing with extremists.

conciliation

Peace processes, negotiations, and social reforms are all examples of ______.

conciliatory options

Why would a government sponsor the acts of a terrorist group

condemning such acts is often logistically, politically, or militarily infeasible

International conventions and treaties do not have the force of law in the United States until

congress passes enabling legislation

Aggressive and extreme measures are allowed when dealing with international terrorism, but domestic options are limited due to legal and ___ considerations.

constitutional

Which term describes the "copy-catting" phenomenon among terrorists where one terrorist group imitates another's tactics?

contagion effect

What types of principles are traditionally embraced by the American right?

convention and nostalgia

The Bush administration combined the homeland security duties of several federal agencies in order to ______.

coordinate operations and end overlapping duties

What do we call the elements, or action items, needed to achieve the National Preparedness Goals?

core capabilities

Starting in the early 1990s, the Intelligence Community (IC) focused its attention on ______ operations.

counterterrorist

The ability to use international law to fight terrorism relies on ____.

countries cooperating with each other

Current methods of fighting New Terrorism include increased homeland security measures, counterterrorist financial operations, global surveillance, identification and disruption of transnational terrorist cells, and ______.

covert shadow wars

Which of the following was a result of Homeland Security Presidential Directive 5?

creation of a national Incident Command System

US citizens who are not in the military must be tried in the ___ court system.

criminal

The term ______ describes assets, systems, and networks that are so vital to the United States that their destruction would have a debilitating effect on national security, health, and safety.

critical infrastructure

what type of claims does the NFIP handle?

damage from floods

detecting threats from international sources is important, but the concepts of ____ inside US borders is at the heart of homeland security

defending the homeland

What other duties does the TSA perform, other than screening passengers?

detecting explosives and screening luggage

What was the primary effect of the USA patriot act?

it expanded the investigative authority of law enforcement agencies

Target hardening refers to enhanced security for buildings and other observable measures as well as ____.

discreet surveillance technologies

Which phase of the intelligence cycle involves delivering intelligence to policy makers, military leaders, and other senior government leaders?

dissemination

Which type of presidential declaration triggers aid that protects property, public health, and safety in order to lessen the threat of an incident becoming a catastrophic event?

emergency declaration

Defending the United States against threats of terrorism requires the coordination of the military, law enforcement, intelligence assets, and ______.

emergency management

There are debates about whether practices like waterboarding, sexual degradation, environmental stress, and sleep deprivation should be defined as torture or ______.

enhanced interrogation

technological hazards, as defined in this chapter, can be the result of human error, natural disasters, ____, or ____.

equipment malfunction; purposeful conduct

What does the National Intelligence Priorities Framework do?

establishes policies and responsibilities for national intelligence goals

Which of the following is an obstacle discussed in the text to collaboration on the comprehensive homeland security?

evolving policy debates

Which tier of government is the most capable of coordinating efficient response and recovery management among different levels of authority?

federal

Which government entity has taken the lead in coordinating medical preparedness strategies by publishing plans and handbooks for medical personnel?

federal homeland security bureaucracy

Of the 200 million cargo containers that travel internationally each year, approximately how many are inspected to verify the contents?

fewer than 2%

Citizens strongly opposed the Alien and Sedition Acts for numerous reasons, but the main opposition was due to its infringement of ______ Amendment freedoms.

first

What does ICS protocol require all emergency responders to do first when responding to an emergency or disaster?

get their assignments according to the procedures established by the Incident Commander

The whole-community approach two emergency management requires collaboration between ____ and ____ entities.

government, private

After the Cold War funding for intelligence gathering decreased, the number of people working in Intelligence Community (IC) agencies was ______.

greatly reduced

A 50-state survey of law enforcement agencies conducted in 2004 revealed that the vast majority of state and local police agencies ______.

had a significant increase in needing to protect their communities from terrorism

The term target ______ describes efforts by the government to make potential terrorist targets more difficult to attack.

hardening

Counterterrorist experts contend that practical security objectives must prevent terrorist conspiracies, deter violent action, implement effective laws, and minimize ______.

harm to people and property

A condition posing potential risks is called a(n) ____.

hazard

The Tokyo convention of 1963, the Hague Convention of 1970, and the Montreal Convention of 1971 are all examples of treaties with provisions to specifically address ___.

hijackings

The Fort Hood, Boston Marathon, and San Bernardino attacks demonstrate that ______.

homegrown sympathizers of the international jihadist movement can live among us undetected

As a result of the September 11 attacks, local law enforcement agencies had to start integrating a ______ model into their daily operational procedures.

homeland security

Immigration and Customs Enforcement has two main duties: investigating immigration crime and ______.

identifying and apprehending removable aliens

from the turn of the 19th century until World War II, incidence of significant domestic unrest either involved labor disputes or ____.

ideological discord

The Orlando Nightclub Shooting is an example of ______ and ______.

jihadist terrorism; hate crime

Which homeland security approach for handling emergencies relies on collaboration by all sectors and communities in society?

whole community

Which type of evidence collection involves using information derived from visual photography, infrared sensors, lasers, electro-optics, and radar sensors?

imagery intelligence

Counterterrorist experts seek to prevent terrorist groups from finalizing their plans, deter extreme activists from becoming terrorists, minimize destruction and casualties, and ______.

implement treaties, laws, and task forces to create a counterterrorist environment

Legislation that was designed to combat terrorism has resulted in greater Power for executive and administrative agencies; in response, powers have been given to the legislature by

including sunset provisions and reauthorization procedures in federal laws

Perimeter controls, architectural barriers, and electronic access controls are all examples of______

innovations of securing critical infrastructure

The ______represents a seamless and efficient process for providing accurate information to policy makers.

intelligence cycle

Although President George W. Bush declared the end to the military phase of Operation Iraqi Freedom on May 1, 2003, the war on terror ______.

is ongoing and continues to the present day

What did the Symbionese Liberation Army gain notoriety for?

kidnapping and brainwashing Patty Hearst to join them in robbing banks

American homeland security experts tasked with creating policies are challenged first by defining terrorism and second by the challenge of ______.

labeling individual suspects

Prior to September 11, 2001, homeland security was the responsibility of federal agencies that could best be described as ______.

lacking central coordination and having overlapping functions

Prior to the formation of the modern homeland security environment, the overarching mission of police agencies was to serve in a ______ capacity

law enforcement

What is the mission of the ODNI?

lead and support the continued integration of the intelligence community

What type of extremism is future-oriented, seeking to reform or destroy an existing system prior to building a new and just society?

left-wing

Which of the following is a challenge to improving aviation security?

limited capabilities of and space for detection equipment

Which tier of authority provides immediate police, fire, and medical emergency assistance?

local

The Animal Liberation Front (ALF) and Earth Liberation Front (ELF) ______.

most likely share personnel and have coordinated activities

Which of the following best describes a type of asymmetrical attack that has been gaining popularity among terrorists since 2014?

motorized vehicle attacks using unarmored, nonexplosive vehicles

What types of systems did Russian hackers target in 2016?

national and local elections

Insurgencies like those led by Mao Zedong in China, Ho Chi Minh in Vietnam, and Fidel Castro in Cuba are examples of wars of ______.

national liberation

The U.S. government rarely seeks to officially suppress or otherwise regulate media content and will only seek judicial intervention when ______.

national security is at stake

What was the Armed Forces for National Liberation?

one of the most prolific terrorist organizations in U.S. history

Which type of evidence collection involves using information from publicly available sources?

open source intelligence

The National Strategy for Homeland Security was a 2002 publication that ______.

outlined the plan for cooperation between the federal government and other entities in anticipating future terrorist attacks

The ______ mission of law enforcement agencies involves sending SWAT teams to crisis locations.

paramilitary deployment

The addition of crash barriers at entrances to parking garages beneath important buildings is an example of ______.

target hardening

SWAT units have been integral units within law enforcement agencies since ______.

the 1970s

Which of the following was the most serious domestic incident of religious terrorism on United States soil prior to September 11, 2001?

the 1993 vehicular bomb detonated at the World Trade Center by Ramzi Yousef

Which document "provides context for how the whole community works together and how response efforts relate to other parts of national preparedness?"

the 2nd edition of the National Response Framework

What is the name for the thwarted attempt by Islamists to detonate liquid explosives aboard transatlantic flights in late 2006?

the Chemical Plot

Which sector-specific agency would assist the Coast Guard during a mission that includes handling oil and other hazardous materials?

the Environmental Protection Agency

Which of the following federal law enforcement agencies enforce federal criminal laws?

the Federal Bureau of Investigation and the Drug Enforcement Agency

on November 25, 2002, a new cabinet level department was established when President Bush signed ____ into law.

the Homeland Security Act of 2002

What do we call the concept that divides emergency response into Command, Operations, Planning, Logistics, and Finance and Administration functions?

the Incident Command System

Ever since the Soviet Union collapsed, most acts of terrorism in the United States have originated from ______.

the Middle East

What were the three biggest concerns of the New Left in the 1960s and 1970s?

the Vietnam War, the civil rights movement, and the status of African American inner cities

The May 19 Communist Organization was made up of remnants of the Black Panthers, the BLA, the Republic of New Africa, and ______.

the Weather Underground

FEMA's Building Science Branch offers expert guidance on ______.

the construction of buildings

What is the most obvious scenario for terrorism involving maritime infrastructure?

the conversion of cargo containers into weapons of mass destruction

Who assumes emergency leadership as the chief executive officer of a state?

the governor

The acquisition by American police of armored vehicles, submachine guns, and nonlethal grenades are part of a policy trend many have deemed ______.

the militarization of police

What was the Joint Task Force-Global Network Operations established to protect?

the military's Global Information Grid

The main threat from a biological attack does not come from a large epidemic; rather ______ is more likely.

the poisoning of the food and water supply

Why was the National Counterterrorism Center established?

to integrate the counterterrorism efforts of the Intelligence Community

Why does the U.S. Conference of Mayors lobby Congress for homeland security funds?

to mitigate the economic impact of homeland security on city governments

What is a significant security consideration for motor vehicles traveling on public roadways?

transportation choke points

What kind of weapon was used during Ramzi Yousef's 1993 attack on the World Trade Center?

truck bomb

What is the term used to describe the primary state/federal incident management activities conducted at the incident level?

unified coordination

How does research suggest that bona fide terrorists have entered the United States in the past?

using legal documents, such as temporary student and visitor visas, and violating the terms of their entry documents

Which of the following is an attribute of the New Terrorism?

utilization of modern networking technologies

The 2007 National Strategy for Health and Preparedness established five key principles, one of which called for ______ across all levels of government.

vertical and horizontal coordination

George W. Bush infamously relied on faulty intelligence when he determined that Iraq was hiding ______.

weapons of mass destruction


संबंधित स्टडी सेट्स

Pierre L'Enfant and the purpose of Washington D.C.

View Set

Chapter 54: Drugs Acting on the Upper Respiratory Tract

View Set

Graphic Design History Final (pt. 1)

View Set

Spanish 1 Unit 2/ 8.2 Grammar: Friends & Family

View Set

Introduction to Careers in Finance D9126 : 3. PRINCIPLES OF CORPORATE FINANCE

View Set

Industrialization/Industrial Revolution(*)

View Set