SRA 211

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Types of white collar crimes.

-Currency Schemes: speculating on the future value of currencies outside accepted trading strategies in recognized markets -Embezzlement: person who is entrusted with money or property of another person and uses it for their own use and benefit -Extortion: illegally getting property from another by actual or threatened force, fear or violence, or under cover of official right -Counterfeiting: copying money without authority, making it seem real, and trying to use it. (usually money but can be designer things) -Forgery: passing or negotiating a false or worthless thing (check, counterfeit security) with intent to defraud or injure recipient -Insider trading: use of inside, confidential or advance info to trade securities of corporations

Factors that contributed to the rise of Islamic Extremism:

-the failure of many secular governments in the Muslim world to provide and promote good governance and economic opportunity -the role of external actors in furthering the creation of extremist groups in Afghanistan, the Middle east and elsewhere in the Muslim world -the manipulation of Islamic precepts and spread of a world-view of Muslims as victims of persecution and oppression

In the game theory analysis, the above diagram is an illustration of:

A zero-sum game

The so-called "Islamic State in Iraq and Syria" (ISIS) grew out of which Al Qa'ida sub-group?

Al Qa'ida in Iraq

Which of the following is Not a factor that can distort network analysis results with respect to terrorist organizations?

All terrorist organizations are characterized by decentralized, random networks, which are more difficult to analyze

Which biological agent was used in attacks in the United States in late 2001?

Anthrax

Which is true about the Nash Equilibrium?

Any Nash Equilibrium is also a dominant strategy equilibrium

Which of the following statements describes a creative terrorist method of attack?

As the novelty of the method diminishes, so does its effectiveness

Terrorist ideologies often justify attacks on civilians on the grounds that such attacks are:

Both moral and effective

Blister, blood and choking agents are all types of:

CHEMICAL WEAPONS

5 commonalities of terrorism

Cash, Charismatic Leader, Commitment, Cause, Camaraderie

A cyber-terrorism attack against computers or computer networks and systems may:

Change processing logic Disrupt equipment and hardware reliability Steal of corrupt data

Which of the following was an alleged serial killer from the 17th century?

Countess Erszebet Bathory

The 2015 cyber attacks against U.S. Government databases are best described as:

Cyber-espionage

Unauthorized probing to test a target computer's configuration or evaluate its system defenses, or unauthorized viewing and copying of data files is BEST DESCRIBED as an example of:

Cyber-espionage

In the SRA 211 course textbook, Professor Forst describes a terrorist worst-case scenario involving a nuclear attack that would cripple a government by killing or incapacitating a number of its leaders. Professor Forst refers to this scenario as:

Decapitating Strike

In the "Preemption vs Defense Conundrum," the temptation to be a "free rider" on the part of each country may lead to the least desirable OVERALL outcome, which is represented by

Defense, Defense

Which of the following is NOT one of the four overarching counterterrorism strategies discussed in class?

Economic embargo

Relevant to the country's decision to designate a country as a "state sponsor of terrorism"

Export Administration Act, Arms Export Control Act, Foreign Assistance Act

The Terrorist Screening Center is part of which U.S. Government agency?

FBI

Section 215 of the USAPATRIOT Act, which provides for the production of "tangible things" (including books, records, papers, and documents) for foreign intelligence and international terrorism investigation, expired in June 2015 and has NOT been extended.

False

The CANVAS reading assignment "The U.S. National Strategy for Counterterrorism" focuses on efforts to counter the threat posed by the Islamic State in Iraq and Syria (ISIS).

False

The Financial Action Task Force (FATF) is a U.S. Government agency charged with tracking terrorist financing.

False

The Terrorist Finance Tracking Program (TFTP) accesses voluminous financial data from U.S banks to monitor possible "home-grown" terrorism:

False

Unlike Great Britain, the United States has not experienced terrorist attacks or attempted attacks by "home-grown" Islamic extremists.

False

Which of the following is NOT part of the Department of Homeland Security?

Federal Bureau of Investigation

According to author of the SRA 211 textbook, religious traditionalists who believe in literal interpretation of sacred texts are known as:

Fundamentalist

The CANVAS Reading assignment, the "UN Counterterrorism Strategy Review," is a product of the UN's:

General Assembly.

Electro-optical intelligence, which is produced by optical systems similar to images produced by cameras, is one example of:

Geospatial Intelligence

The intelligence collection discipline that focuses largely on various types of imagery is knowns as:

Geospatial Intelligence

In the network depicted above, which of the following has the greatest degree of closeness centrality?

Heather (the one that can reach everyone in the fewest nodes possible)

An intelligence assessment of the prospects for early elections that might change the composition of the government in Italy would be an example of an event that has:

High Likelihood and Low Importance

The so-called "intelligence cycle" included in the course ANGEL presentations includes all of the following EXCEPT:

International Sharing

Which of the following statements apply to the Nash Equilibrium?

It is a situation in which a player can not improve their position in light of the other player's move

In the diagram above, who has the highest out-degree centrality?

Khyam (the one with the most arrows pointing away from the node)

Two countries that were formerly on the U.S. list of state sponsors of terrorism but have been removed from the list are:

Libya and Cuba

Which of the following acts of terrorism was most effective in achieving the terrorists' political goals?

Madrid Bombing 2004

The fundamental change in the nature of the worldwide terrorist threat beginning in the 1990s was the onset of:

Mass casualty attacks

The tolerance or resilience of a network in the face of internal failure or external attacks is known as:

Network Robustness

According to the 2005 FBI study, serial killers:

Often suffer from personality disorders

In the "covert action ladder" graphic, which type of covert action is ranked as the LEAST violent and the MOST likely to be "deniable?"

Propaganda

The type of covert action that aims to spread disinformation concerning the goals and actions of terrorist groups and to highlight activities of terrorists that cast them in a negative light is:

Propaganda

The counterterrorism policy that aims at disseminating a positive image of a government's values, culture and policies in order to win the "hearts and minds" of terrorist supporters is called:

Public Diplomacy

The type of weapon of mass destruction that spreads deadly radioactive materials by way of a conventional explosive device is called a

Radiological

Professor Forst argues in the SRA 211 textbook that an individual's perception of fear is often distorted by:

Rare but extreme threats

The critical Thinking mechanism that compares two things to identify their major shared characteristics is called:

Reasoning by Analogy

The method of intelligence collection that focuses on the interception of communications by electronic or electro-acoustic means is known as:

SIGINT

Who is the 20th century Egyptian islamist and intellectual whose teachings and writings are believed to have contributed to the phenomenon known as "global jihad?"

Sayyid Qutb

A network that is dominated by a few key nodes, which has many connections, is a:

Scale free network

The Al-Qaeda terrorist network most clearly resembles a:

Scale free network

Targeted attacks against certain nodes in a network have the greatest impact on which type of network?

Scale-free Network

According to the 2005 FBI study, serial killers:

Span all racial groups, with a degree of diversification that generally mirrors that of the overall US population

Situations in which a state actor does not support or even encourage a terrorist organization operating on its territory, but is unable or unwilling to take action to suppress it, is referred to as:

State tolerance of terrorism

Which countries are currently on the state sponsored terrorism list?

Syria, Iraq, Sudan, and North Korea

What is the name of the group that claimed credit for the 2013 attack in which computer hackers hacked the Twitter account of The Associated Press and sent a tweet stating that there had been two explosions at the White House and that President Barack Obama was injured?

Syrian Electronic Army

In game theory, a Dominant Strategy is:

The course of action for a player that results in the best individual payoff, regardless of opponent's choice

Experts at the Nuclear Control Institute have concluded that it would be possible for terrorists to construct a "crude" or "improvised" nuclear device with a nominal yield of 10 kilotons.

True

So-called "peacetime assassinations" have been officially banned by the U.S. since 1976.

True

The creation of the Department of Homeland Security in the wake of the September 11, 2001 terrorist attacks was the largest reorganization of the U.S. Government since 1947.

True

The Foreign Intelligence Surveillance Act (FISA) prescribes procedures for requesting judicial authorization for electronic surveillance and physical search of persons engaged in espionage or international terrorism against the United States on behalf of a foreign power.

True.

A broad definition of "domestic terrorism," which has generated concerns among civil liberties advocates, is contained in which law?

USAPATRIOT Act

Individuals "who have engaged in hostilities or purposefully and materially supported hostilities against the United States or its allies" are considered by the U.S. Government to be:

Unlawful enemy combatants

All of the following are advantages of biological weapons EXCEPT:

Unlike chemical weapons, their effectiveness is not affected by climatic conditions

A terrorist cell that provides logistical support to the terrorist organization is called

auxiliary cell

white collar crime

crime committed by a person at their job that use deceptive practices & used fraud to obtain money

The 2007 cyber attacks in Estonia were, for the most part

distributed denial-of-service attacks

In the assigned textbook reading on "Responses to Terrorism," Professor Forst states that the first objective in responding to a serious terrorist attack is to:

establish the source or sources of the attack

Which of the following attributes does NOT pertain to "ethnocentric terrorism?"

it seeks to extract some concession from the "enemy" state or government

The task of the so-called "UN 1267 Committee" is to:

oversee the implementation of sanctions imposed on individuals and entities associated with the Taliban, Osama Bin Laden and Al-Qaida

All of the following are advantages of international counterterrorism cooperation EXCEPT:

the measures adopted are always binding and enforceable

Which of the following statements concerning the use of foreign aid and economic sanctions as counterterrorism tools is/are true?

these tools usually can only be used against states that sponsor terrorism and they are both often criticized as impacting innocent civilians rather than the actual terrorist supporters


Set pelajaran terkait

Ch. 4 Labor and Financial Markets

View Set

Ohio State: Stats 1430- Regression & Correlation Study for Final Exam

View Set

History Of Rock Music (HORM) - Ch.1

View Set