Final exam

Ace your homework & exams now with Quizwiz!

According to The 9/11 Commission Report, by the end of a deputies meeting on September 10, officials formally agreed on a ________ strategy.

3 phase

____ of data breaches involved credit card information, and about one-third involved personal information.

?

In an extraordinary public essay asking how Muslims "can drag ourselves out of the pit we find ourselves in to raise ourselves up" Musharraf has called for a strategy of _______.

Enlightened Moderation

The homeland security enterprise must operationalize the mission of creating an - __________________________ and ________________________ system.

adaptive , collaborative

For terrorists, travel documents are as important as weapons. Internationally and in the U.S., constraining terrorists travel should become a vital part of ___________.

counterterrorism

USA Patriot Act

counterterrorism act passed in 2001, permits new forms of surveillance and indeterminate periods of imprisonment without due process

Shadow wars

covert campaigns to suppress terrorism

What did the terrorists exploit in order to gain entrance into the US?

deep institutional failings within our gov

Wahhabi

pure islam

National Security Act of 1947

restructuring the government's military and intelligence agencies following World War 2, majority of the provisions of the act took effect on Sep 18, 1947 day after senate confirmed James Forrestal as first Secretary of Defense.

BOTNET

robot network, collection of computers comprised by roboties allowing outside hackers control

What were some of the major provisions included in the USA PATRIOT Act?

roving wiretaps, sneak and peek, national search warrants, detention, wiretaps and purpose of investigation, criminal penalties raised, bioterrorism, monitoring computers, many laundering sunset provision

The Cuckoos Egg

spy/tracking/ attack?

Custom Electronic Chap 5

Custom Electronic Chap 5

Custom Electronic Chap 6

Custom Electronic Chap 6

Custom Electronic Chapter 7

Custom Electronic Chapter 7

North American electric reliability council

(NERC) lead industry group dealing with security issues

What are the four steps that make up comprehensive emergency management?

1.Mitigation 2.Prepareedness 3.Response 4.Recovery

According to The 911 Commission Report, 12 of the 13 muscle hijackers (excluding Nawaf al Hazmi and Mihdhar) came from Saudi Arabia. The muscle hijackers came from a variety of educational and societal backgrounds. All were __________; most were unemployed with no more than a high school education and were unmarried.

20-28 years old

Immediately after the second plane hit, the Chief Department of the NYPD ordered a second Level 4 mobilization, bringing the total number of NYPD officers responding to _____.

2000

In what year did the US Navy SEALS kill Osama Bin Laden?

2011

When did Hamzi and Mihdar give up on learning how to fly?

End of May 2000

Ramzi Yousef

According to 9/11 Commission Report Ramzi the Sunni extremist who planted 1st WTC bomb said later he planned to kill 250,000 people. Behind WTC, Flight 434 and Bojinka plot

Within about two months of the start of combat operations, several hundred CIA operatives and Special Forces soldiers, backed by the striking power of US aircraft and a much larger infrastructure of intelligence and support efforts, had combined with ________ and a small number of other coalition soldiers to destroy the Taliban regime and disrupt al Qaeda

Afghan militias

Local newspapers and the few influential satellite broadcasters, like al Jazeera, often reinforce the jihadist theme that portrays the US as _____.

Anti-Muslim

What are some examples of coercive covert operations?

Assassinations,sabotage,kidnapping, and other quasi-legal methods

Bin Ladin reportedly thought an attack against the United States would do what?

Benefit al Qaeda by attracting more suicide operatives

The _______________________________________ publishes and disseminates preparedness and response guidelines for health professionals responding to mass-casualty events, including chemical and biological terrorist events.

Center for disease control and prevention

Former Defense Secretary Leon Panetta warned, in 2012 before retiring, that the United States faces the danger of a ___________, hostile penetrations of computer networks that control essential services including the electrical supply throughout the country.

Cyber- Pearl Harbor

According to the White House _______ released last May, "the nation's approach to cybersecurity over the past 15 years has failed to keep pace with the threat." Nor, adds the report, is the government currently adequately prepared to address cyberthreats.

Cyberspace Policy Review

For countering terrorism, the dominant agency under the department of justice is the _____?

FBI

FAA

Federal Aviation Administration

Resolution 1376

Following 9/11 United Nations resolution requires member states to adopt strict regulations against terror and create counter terrorism committee

FEST

Foreign response teams ready to move on four hours notice, kept up with terrorist posture on a rolling 24 hour basis

United Nations

Founded 1945 following WW2, mission to maintain international peace and security

Middle East Free Trade Area

Goal of established capitalistic trade in areas by 2013

What are two examples of military and paramilitary repressive options?

Infiltration and Disinformation

The FBI is not new to the fight in cybersecurity. Nearly 15 years ago, it launched the _______ program, aimed at building government-private sector partnerships to reduce cyber threats. The Secret Service's flagship ________ has more than 1,100 special agents trained in cybersecurity deployed in 98 offices worldwide. The agency was also mandated by the USA Patriot Act in 2001 to establish a nationwide network of Electronic Crimes Task Forces (ECTFs).

Infraguard, Electronic Crimes Special Agent Program (ECSAP)

To seize control of the Katrina mission, President Bush would have had to invoke the ________, which allows federal troops to suppress a rebellion and enforce federal laws. Bush's father invoked the law in 1992 during riots in south-central Los Angeles following the acquittal of police officers charged in the beating of Rodney King.

Insurrection Act

Pakistan's endemic poverty, widespread corruption, and often ineffective government create opportunities for _______ recruitment.

Islamist

Japanese Internment

Japanese Americans imprisoned due to fear of Japanese invasion shortly after Pearl Harbor

Operatives volunteered for suicide operations. KSM claims that the most important quality for an al Qaeda operative was the willingness to _______.

Martyr himself

When was the second edition of the National Response Framework disseminated?

May 2013

Modhar Abdullah

acquaintance/accomplice of Hamzi and Midhar (two 9/11 terrorists)

Security experts warn that governments have moved into cyberspace to spy, steal business and disrupt corporate operations, as _______ is alleged to have done to Sony. China, Russia, Iran and North Korea regularly try to attack U.S. networks.

North Korea

Aviation and Transportation Security Act

Nov 19 creates the TSA

ODNI

Office of Director of National Intelligence

According to The 9/11 Commission Report, President Clinton insisted on including _________ in the itinerary for his trip to South Asia. His one-day stopover on March 25, 2000 was the first time a US president had been there since 1969.

Pakistan

________ forces played a leading part in tracking down KSM, Abu Zubaydah, and other key al Qaeda figures.

Pakistan

Name three infamous cases of domestic counterterrorism activities in the United States.

Palmer Raids, Japanese Internment, and McCarthyism

Emergency response is a product of _______.

Preparedness

What is the difference between punitive and preemptive strikes?

Punitive;payback Preemptive; launched as precautionary measure to degrade terrorist

Executive Order 12333

Reagan prohibits employees of US from assassinating adversaries

During the Depression, President Franklin D. Roosevelt initiated a more active federal role in disaster response. For instance, he authorized the ________, established by Hoover in 1932 to bolster the banking industry, to make reconstruction loans for public facilities damaged by earthquakes, and later, other disasters.

Reconstruction Finance Corporation

According to The 9/11 Commission Report; President Clinton's first national security advisor, Anthony Lake, had retained from the Bush administration the staffer who dealt with crime, narcotics, and terrorism (a portfolio often known as "drugs and thugs"), the veteran civil servant was_________.

Richard Clarke

________ has been a problematic ally in combating Islamic extremism.

Saudi Arabia

________ comprised the largest portion of the pool of recruits in the al Qaeda training camps. Seventy percent of the mujahedeen were this and prior to 9/11 it was easier for these operatives to get into the US.

Saudis

IRAN-CONTRA Affair

Secret arrangement in 80s to provide funds to Nicaraguan contra rebels from profits gained by selling arms to IRAN

The prolonged crisis of 1979-1981, when 53 Americans were held hostage at the U.S. embassy in Tehran, ended the __________ leadership in counterterrorism.

State Department

Nevertheless, preppers say they steer clear of even the word "survivalist" because it came to be associated with far-right extremists such as the neo-Nazi bomber, ________, who blew up the Alfred P. Murrah federal building in Oklahoma City in 1995, killing 168 people, including 19 children.

Timothy McVeigh

A senior al Qaeda detainee has stated that ________ after the 9/11 attacks to monitor the American homeland forced al Qaeda to operate less freely in US.

US Gov efforts

Understanding Chap 12

Understanding Chap 12

Who was included in President Bush's "war council"?

Vice Pres Cheney, Hadley, Powell, Armitage, Rumsfeld, Ashcroft, Mueller, Tenet, Deputy Secretary of defense Paul Wolfowitz and Cofer Black,chief of the DCI's counterterrorist center

As of September 11, the Port Authority lacked any standard operating procedures to govern how officers from multiple commands would respond to and be staged and utilized at major incidents at the _____.

WTC

Hamzi and Mhdhar sought out and found a group of young ideologically like-minded Muslims with roots in ________ and _______.

Yemen and Saudi Arabia

Zakat

charitable giving

President commission on critical infrastructure protection

increase federal programs protecting cyberspace

The 2003 Homeland Security Presidential Directive 5's stated purpose was "to enhance the ability of the United States to manage domestic incidents by establishing a single, comprehensive ____________________________________________."

national incident management system

The National Response Framework is a national recognition of the need to design and maintain a __________________________________ that promotes preparedness at every level of authority.

systematic mechanism

Response operations lacked the kind of integrated communications and _________ contemplated in the directive.

unified command

Cyberespionage

use of computer networks to gain illicit access to confidential info

The lesson of 9/11 for civilians and first responders can be stated simply: in the new age of terror ____ are the primary targets.

we

According to The 911 Commission Report, Tenet told us that in his world "_____________________".

The system was blinking red

Before 9/11, the ______ did not consider terrorist financing important enough to mention in its national strategy for money laundry.

Treasury

A government computer consultant who asked not to be identified agrees that great potential exists for destructive attacks. "Give me an organization, and I can find ways to destroy it," he says. He would need only a couple of years for planning and reconnaissance with a small, trusted team and a couple of million dollars to destroy a system, he says. "It's easier to destroy something than create it," he adds. "The _________ is incredibly vulnerable and is getting more so with every passing day."

U.S. infrastructure

Understanding Chapter 13

Understanding Chapter 13

Understanding HomelandSec Chap 11

Understanding Homeland Sec Chap 11

"literacy as freedom"

United Nations plan to increase education in Middle East

USVISIT

United States Visitor and Immigrant Status indicator technology system is collection and analysis of biometric data (such as fingerprints) checked against a database to track individuals deemed by the US to be terrorist, illegal or criminal

A number of important al Qaeda figures attended_________ or lived in that area in the 1980s and early 1990s.

University of Arizona

UAV

Unmanned aerial vehicle

In 1995-1996, the Defense Department began to invest effort in planning how to handle the possibility of a domestic terrorist incident involving _________. The idea of domestic command for homeland defense began to be discussed in 1997 and in 1999, the Joint Chiefs developed a concept for the establishment of a domestic Unified Command.

Weapons of Mass Destruction (WMDs)

The ______ provided strong evidence connecting the Cole attack to al Qaeda during the second half of November, identifying individual operatives whom the United States knew were part of al Qaeda.

Yemenis

The President said, "The enemy of America is not our many Muslim friends; it is not our many Arab friends. Our enemy is ___________ and every government that supports them."

a radical network of terrorists

Thumiary

accredited diplomat at Saudi Arabian consulate from 1996-2003

USA Patriot Act

act of congress signed into law by President Bush on Oct 26, 2001 Abbreviated (USA PATRIOT) expanded full title "Uniting and Strengthening America by providing appropriate tools required to intercept and obstruct terrorism act of 2001"

Bin Ladin could assess new trainees in about ten minutes and many of the 9/11 hijackers were selected in this manner. Bin Ladin, assisted by Atef, personally chose all the future hijackers for the planes operation. The training for the muscle hijackers was conducted at the ________.

al Matar complex

Biometric Technology

allow digital photographs of faces to be match against those of wanted suspects useful for antiterrorist screens

President Reagan characterized terrorism as "____________" and declared: "There can be no place on earth left where it is safe for these monsters to rest, to train, or practice their cruel and deadly skills...".

an act of war

Though Saddam Hussein was widely detested, many Saudis are sympathetic to the ______ insurgents in Iraq although majorities also condemn jihadist attacks in the Kingdom. In June 2004, the Saudi ambassador to the U.S. called publicly for his government to wage a jihad of its own against the terrorists.

anti-US

Preparations for the end of the world have been features of religions and civilizations for millennia. The ancient Hebrews expected the ______ (from the Greek word for "revelation"), leading to judgment day, a concept later adopted by Christians and Muslims.

apocalypse

Successful homeland security in the near term depends on accepting the reality that violent extremists will consistently attempt to thwart defensive measures by planning and carrying out unexpected __________________ or other types of political violence.

attacks

Cyber Attacks

attempt by hackers to damage or destroy a network or system

Abdel Rahmen

blind Sheikh, perpetrator of 1993 WTC bombing

Covert Actions

broad range of activities outside the operations of traditional intelligence collection

Torture

brutal of humiliating interrogation techniques

The Federal Emergency Support Functions are primary, but not exclusive, Federal coordinating structures for _____________________, ____________________, and _____________________ the response core capabilities.

building, sustaining, delivering

National strategy to secure cyberspace

calls for private companies to voluntarily cooperate with new DHS in protecting cyberspace

The Palmer Raids

campaign against radicals and left wing organizations. Conducted by Mitchell Palmer and Edgar Hoover caused by fear of communism

International sources of terrorism originate primarily from ________________________ _______________________ extremist networks that replicate the al-Qaeda model.

cell based religious

Through NIMS, the National Response Framework, the NIPP, and other planning protocols, DHS acknowledges that _____________________ planning with state and local agencies and officials is central to its overall mission.

collaborative

Cooperative Threat Reduction Program

commitment to securing weapons and dangerous materials

Presidential Daily Briefing

compendium of reports used to keep president and policymakers abreast of emerging intelligence concerns

Response and recovery procedures for domestic security emergencies are a ___________________ and ________________________ endeavor.

complex, multi tiered

Edward J Snowden

computer pro, former CIA leaked classified info from National Security Agency in 2013

STUXNET

computer worm that attacked IRAN's nuclear enrichment Israeli operation

DHS National Cyber Security Division

coordinate federal efforts

Because violent extremism has historically originated primarily from domestic conflict, future prevention and mitigation efforts must incorporate inclusive societal and cultural considerations as _________________________ to extremist ideas.

counterbalances

National Security Act

creates CIA

Many nations treat terrorism as a _______, not a political one. Outlawing terrorism implies faith in the legal system, and antiterrorism legislation in democratic countries generally incorporates constitutional rights and judicial review.

criminal act

Cybercrime

criminal activity carried out on web

James Clapper

current director of national intelligence

cyber storm

cyber defense war-game training exercise every 2 years

Government and private-sector computer and security experts agree America's _________ is at risk. Although, most analysts say cyberspace doesn't offer the opportunities terrorists thrive upon: dramatic events that invoke terror, such as suicide bombings and airplane crashes.

cyberinfrastructure

Senior Executive Intelligence Brief

daily briefing, which began after World War 2 under Harry Truman, contains info on specific issues and regions around the world relevant to current affairs

Richard clarke

dealt with crime, narcotics, and terrorism (drugs and thugs) as a veteran civil servant

Senate Select Committee on Intelligence

dedicated to overseeing the US intelligence community

Practical adaptations are measured as successful if they apply theoretical models that prevent extremists from ________________________ the domestic environment

destabilizing

If skillfully administered, future adaptations of collaborative initiatives will serve to reduce the likelihood of _______________________ and _______________________ in the event of a terrorist incident.

disorganization, disarray

The NRC mandates and enforces the proper ____________________, _________________, and _________________________ of radioactive waste.

disposal, storage , transporting

Many of the injuries after the 1993 bombings occurred when?

during the evacuation

There is a tendency for terrorists to use unconventional factors as measures of their ____________.

effectiveness

Chertoff said FEMA needs to learn from the military and private companies that were able to keep communication lines open. DHS is setting up _________ that will be deployed to catastrophes to provide up-to-the-minute reports to federal planners, who can then send the appropriate resources.

emergency reconnaissance teams

The government is engaged in a tug-of-war with cell- phone makers, urging them not to build _______________ into their devices because it hinders intelligence agencies from intercepting the communications of suspected terrorists.

encryption technology

Directorate of digital information

enhance cyber security and conduct cyber espionage

national information infrastructure protection act of 1996

entended CFAA further, allowing prosecution of those viewing info on a computer w/o authorization

presidential decision directive 63

established organizational structure among federal agencies to "eliminate any significant vulnerability to both physical and cyberattacks on critical infrastructure

National Cyber Joint Investigation Task Force

established to confront increasing attacks on government and commercial computers

It is understood that awaiting the outcome of standard procedures could ___________________ the consequences of a disaster or emergency.

exacerbate

cyber security enhancement act

expands powers of law enforcement orgs and increases penalties for computer crimes

The commitment of ____________________ and _________________ resources to preparedness and planning is an investment that will, if properly undertaken, reap immeasurable benefits in the security of local communities and the nation at large.

financial, human

the computer fraud and abuse act

first federal computer crime law makes it a felony to enter computers operated by gov

Counterterrorist models must be _____________________ enough to respond to new terrorist environments and must avoid stubborn reliance on methods that "fight the last war."

flexible

Clarke's staff warned, "__________ are present in the US and attacks in the US are likely".

foreign terrorist sleeper cells

Clarke mentioned to National Security Advisor Rice at least twice that al Qaeda sleeper cells were likely in the U.S. In January 2001, Clarke forwarded a strategy paper to Rice warning that al Qaeda had a presence in the US. The domestic agencies were waiting for evidence of a domestic threat from sleeper cells within the US. No one was looking for a ______ threat to a _____ target.

foreign, domestic

To promote information-sharing, in 2014, the Justice Department reactivated its Domestic Terrorism Executive Committee. In an effort to counter sovereign- citizen violence, DHS established 78 state, regional and municipal __________which collect and share intelligence from state and local law enforcement.

fusion centers

In wartime, government calls for _____ powers, and then the need for those powers _____ after the war ends.

greater, recedes

More than ____ of all computer breaches occur in the retail and food and beverage industries, which have fewer cybersecurity safeguards than, for example, the financial services sector, which handles vast amounts of money and generally has sophisticated safeguards.

half

The purpose of HSPD-21 was to "transform our national approach to protecting the ___________________ of the American people against all disasters."

health

There is no single binding or common ______________________ foundation for political violence.

ideological

Modern terrorist activity in Europe was characterized by __________________, ______________________, and _____________________ spillover political violence.

ideological, nationalistic, international

Beginning on September 11, __________ agents working in cooperation with the FBI began arresting individuals for immigration violations whom they encountered while following up leads in the FBI's investigations of the 9/11 attacks.

immigration and naturalization

The creation of viable _______________________________ at the state and local levels of authority is an indispensable element of effective response and recovery.

incident command structures

As some survivalists tried to develop a new way of assessing threats, top U.S. government officials were worrying about a reappearance of one of the biggest threats to humanity, ______. In the 1990s, the administration of President Bill Clinton (1993-2001) formally listed disease spread as a national security issue. The move reflected growing concern prompted by events, including the spread of avian influenza ("Avian Flu") through Asia.

infectious disease

It is now clear that everyone involved was confused about the rules governing the sharing and use of _______ gathered in intelligence channels.

information

US Strategic Command

integrate computer network operations with fighting on the battlefield

Identifying terrorist risks requires assessing the ______________________ of extremist organizations, including projecting which locations constitute likely targets.

intentions

SIGINT

interception of electronic signals, used for interception of financial data monitoring communications on phone email etc

Practically every aspect of the U.S. counterterrorism strategy relies on _______.

international cooperation

INTERPOL

international criminal police org made of over 140 nations agree to share intelligence and provide assistance in suppressing crime

Presidential declarations authorize national _____________________ when serious natural or man- made disasters and emergencies occur.

intervention

Internet Crime Complaint center

joint project or FBI nonprofit national white collar crime center and the justice dept bureau of justice assistance

Post Authority of New York and New jersey

joint venture between the US state of New York and New Jersey, set 1921 through interstate compact authorized by congress. The Port Authority oversees much of regional transportation infrastructure, including bridges, tunnels, airports, seaports

The MSCC recommends a management methodology for responding to ________________ medical incidents.

large-scale

Binalshibh advised Atta that Bin Ladin had directed the other operatives not be informed of the date until __________.

last minute

Foreign Intelligence Surveillance Act

law prescribes procedures for physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers"

The Deputies Committee met to discuss the armed predator. They concluded that it was _____ for the CIA to kill Bin Ladin or one of his deputies with the Predator. Such strikes would be acts of self- defense that would not violate the ban on assassinations in Executive Order 12333.

legal

USA Freedom Act

limit NSA's collection of bulk data when the agency is searching for specific records

State emergency management offices offer preparedness and mitigation support on an ongoing basis to local jurisdictions, and generally do not become directly involved in emergency response until a request is received from _______________________.

local authorities

The process for projecting successful homeland security models must include a _________________________ framework based on both theory and practical necessity.

longitudinal

What is the UN's mission?

maintain International peace and security

Malcode

malicious code software, harvest/hack info

The CIA's zone defense concentrated on "where," not "who." Had its information been shared with the FBI, a combination of the CIA's zone defense and the FBI's ______ approach might have been productive.

man to man

When faced with the prospect of lifelong incarceration, terrorists are likely to become susceptible to _________________________.

manipulation

The insurance company attacks underline another trend: increased hacker interest in information related to _______, especially data that establishes health insurance coverage. Stolen personal information for health insurance subscribers can be 10 to 20 times more valuable than credit card numbers.

medical care

The CIA's leadership was told that while a number of plots had been disrupted, the ______ might be only the "kick-off" for a period of extended attacks.

milennium

The CIA Director is shaking up his agency, creating 10 ________ focusing on specific functional areas, such as economic security or weapons proliferation, and certain geographical areas — such as the Middle East or China — that present particularly complex political, strategic and economic concerns. Modeled on the CIA's existing Counterterrorism Center (CTC), formed in 1986, the centers would unite the "operatives" (spies) with the analysts.

mission centers

The U.S. government should allocate ______ so that lower-level officials have more flexibility to get the job done across agency lines, adjusting to the circumstances they find in the field

money

The private sector is arguably the sector of society ______________ affected when a terrorist incident occurs.

most

Peace Processes

mutually accepted terms for cease fire often involving long, arduous frustrating proceedings

Countries as well as individuals can attack military targets, utilities, private companies or government databases, depending upon whether they are seeking military intelligence, conducting diplomatic or industrial espionage or trying to intimidate anti-government activists. In addition, __________ mean little or nothing when it comes to cyberattacks, and, unlike a military attack, determining the source of an attack can be difficult, making a response problematic.

national borders

Hurricanes Katrina and Sandy, major forest fires in the West and floods in the Midwest show the power of __________ to destroy and disrupt. Climate change is speeding up and intensifying some categories of disaster, even as it puts new stress on the national energy system, including oil and gas exploration and delivery as well as the power grid, the Department of Energy reported in July.

natural disasters

A 1987 study published by the Massachusetts Institute of Technology concluded that even a limited nuclear attack on the United States would leave survivors in "________" for decades.

near-medieval levels of existence

Like the national defense effort described earlier in the 9/11 Commission Report, the emergency response to the attacks on 9/11 was ________.

necessarily improvised

Are the best available response and recovery systems and procedures an absolute deterrent to the execution of terrorist attacks?

no

Experts generally agree that the private sector and the ________ are the weakest links in America's cyberinfrastructure. They are also the biggest links. The power industry was considered among the most likely targets, as well as one of the industries most in need of upgraded cybersecurity.

non-federal public sector

How many times has the United States experienced real-time consequences from a mass-casualty chemical or biological attack?

none

Repressive Responses

nonmilitary operations selected from a range of options that are flexible and can be adapted to specific terrorist environments

President Obama signed an executive order in February instructing the Department of Homeland Security to establish a ________ that would create voluntary standards for sharing information about cyber threats. The order allows participating businesses to receive classified government information.

nonprofit organization

Homeland security experts in the modern era will be challenged to successfully integrate several domestic security _____________________ into homeland security policy initiatives.

objectives

The advantage of promulgating the National Planning Frameworks is that they characterize an ____________________ and _______________________ effort to maintain integrated preparedness at all tiers of authority.

ongoing, institutionalized

Counterterrorism security group

organization meant to develop terrorism prevention policy and coordinate threat

Cyber Threat

possibility of a malicious attempt to damage or disrupt a computer network system

National Security Council

principal forum for considering national security and foreign policy matters with his senior national security advisors

DHS established a _____________________________________ as an important outreach and coordinating resource for members of the private sector.

private sector office

Counterterrorism

proactive policies specifically seek to eliminate terrorist environments and groups

The National Incident Management System (NIMS) was established to institutionalize collaborative ____________________ among federal, state, and local authorities.

protocol

Concerted efforts have been undertaken to establish planning ___________________ and ____________________ to secure multijurisdictional and multilevel collaboration.

protocols, systems

Late Modern Warfare

relies on small scale lightning fast raids, armed or unarmed and unmanned aerial vehicles aka drones used too

The most significant spillover threat of the early twenty-first century comes from _______________ extremists.

religious

Emergency support functions are designed to assemble _____________________ from diverse sources and "package" them for dissemination to critical disaster and emergency relief centers.

resources

It is difficult to forcibly reverse extremist tendencies, and thus the skillful adoption of other responses is required along with an underlying appreciation that sheer repression is a ___________________ long-term solution.

risky

Counterterrorism activities within a nation's own borders operate in the context of each nation's laws and policies, history, politics, and culture. In democratic societies, "the _________ is guaranteed by the legitimacy legal norms enjoy from whom such norms apply, on one hand, and by the threat of enforcement from specialized agents of control, on the other".

rule of law

To find __________, terrorist organizations have fled to some of the least governed, most lawless places in the world. The intelligence community has prepared a world map that highlights possible terrorist havens.

sanctuary

Nonviolent Covert Operations

secretive operations such as infiltration, disinformation, cyberwar. Require creative methods

Even if the federal government is unwilling to regulate computer security in all of the private sector, some experts argue that, at a minimum, ___________ are needed for any industry deemed critical to the national infrastructure, as well as requirements that companies report all attacks or compliance with the standards.

security standards

Today, the CIA is conducting what some call _________ using armed drones to conduct strikes in countries with which the United States is not at war but where terrorists are active. Since 2004 the CIA has conducted at least ______ drone strikes in such places as Pakistan, Yemen and Somalia.

shadow wars

HUMINT

sharing intel with friendly agencies and law enforcement officials

Assessing the probability that an event will occur requires measured applications of analytical _________________ and ____________________ in order to project the likelihood of a terrorist incident.

skills, resources

The 2011 Arab Spring uprisings demonstrated that support for, and the momentum of, domestic terrorist movements can be undercut by genuine __________________ reform.

social

A terrorist threat advisory distributed in late June indicated a high probability of near-term _______ terrorist attacks resulting in numerous casualties.

spectacular

KSM explained that California was a convenient point of entry from Asia and had the added benefit of being far away from the intended target area. Hazmi and Mihdhar were ill-prepared for a mission in the United States. Their only qualifications for this plot was their devotion to Usama Bin Ladin, their veteran service, and their ability to get valid U.S. visas. Neither had spent any substantial time in the West, and neither ____________.

spoke much if any English

The same forecasted events that apocalypse preachers drew on also figured in another group's preparations for collapse of the social order. So-called ______ began stockpiling food and other supplies and setting up rural hideouts to retreat to when the social order collapsed.

survivalists

Antiterrorism

target hardening, enhanced security and other defensive measures seeking to deter and prevent terrorist attacks

Homeland security presidential directive 7

tasks DHS with protecting country's non-military cyberspace infrastructure

The national homeland security enterprise requires efficient and effective ______________ among federal, state, and local agencies.

teamwork

Operation Enduring Freedom

term used by US gov to describe the war in Afghanistan

TIPOFF watch list

terrorism watch list

During the years immediately preceding and following the turn of the twenty-first century, it has become very clear that the near future of international terrorism in the United States will be considerably _______________________.

threatening

The Oklahoma City bombing on April 19, 1995, raised questions about FEMA's role in responding to terrorist attacks. Debates raged among officials at FEMA and the Justice and Defense departments over who should be the first-responder — fire, police, emergency management or emergency medical services? Terrorism was part of FEMA's ______ approach to emergency management, but it lacked the resources and technologies to address specific terrorism issues such as weapons of mass destruction.

"all hazards"

In February 2015, Hackers are revealed to have stolen up to _______ from more than 100 banks in 30 countries since at least late 2013.

$1 billion

Homeland Security Council

(HSC) Entity within the executive office of the president of the US tasked with advising the President on matters relating to Homeland security

In addition to defense and communications systems, much of the nation's civilian infrastructure is hooked up to specialized computers that control other computers through ___________ systems. If hackers gain control of such a system, they can manipulate whatever it controls — such as a gas line, power grid or the floodgates of a dam.

(SCADA) supervisory control and data acquisition

What seven steps did the US want Pakistan to take?

1. Stop al Qaeda operatives at its border and end all logistical support for Bin Ladin 2. give USA blanket overflight and landing rights for all necessary military and intelligence ops 3. provide territorial access to US and allied military intelligence and other personnel to conduct operations against al Qaeda 4.Provide US with intelligence information 5.Continue to publicly condemn terrorist acts 6.Cut off all shipments of fuel to the Taliban and stop recruits from going to Afghanistan 7.If evidence implicated Bin Ladin and al Qaeda and the Taliban continued to harbor them to break relations with the Taliban gov

What were the three major steps the Principals Committee agreed that the government should take in regards to stopping terror attacks?

1.more money to CIA to accelerate efforts to "seriously attract al Qaeda" 2. Crackdown on foreign terrorist orgs in USA 3.Strengthen immigration law enforcement and the INS should tighten controls of Canadian Border

Seven immediate Responses as urgent domestic issues accumulated

1.organize federal emergency assistance. one question was what kind of public health advice to give about the air quality in lower Manhattan in the vicinity of fallen buildings 2.compensating victims. federal compensation fund. 3. determining federal assistance. On Sep 13 Bush promised to provide $20 billion for NYC in addition to $20 billion to the country as a whole 4.restoring civil aviation. on sep 13 the national airspace reopened for use by airports that met newly improvised security standards 5.reopening financial market 6.deciding when and how to return border and port security to normal operations 7.evaluating legislative proposals to bail out the airline industry and cap its liability

The National Response Framework features __________ core capabilities that are designed as practical elements in achieving the National Preparedness Goal.

14

US Intelligence Community

16 government agencies that work separately and together to conduct intelligence activities considered necessary for conduct of foreign relations and national security of US

The ___________ said Congress must be kept "fully informed" of major intelligence activities, but successive administrations have interpreted this to mean disclosing information to only a few key members of Congress. This also created the CIA.

1947 National Security Act

Eligible Receiver

1997 operation involved a team of computer experts from super secret national security agency

Name three emergency supplies FEMA recommends having on hand in case of a disaster.

3 day supply nonperishable food, a gal water per day per person, battery or crank radio, flashlight w batteries, first aid, whistle, dust mask, moist towelettes, wrench/pliers, manual can opener, local map, cell phone and charger

NSPD 9

3 objective national security strategy, first eliminate al Qaeda network, second do this using elements of national power do so including diplomatic military, economic, intelligence, information and law enforcement

Clarke briefed Rice on terrorism. He described al Qaeda as both an adaptable global network of jihadist organizations and a lethal core terrorist organization. one line in the briefing slides said that al Qaeda had sleeper cells in more than ___ countries, including the United States.

40

There were more than ___ intelligence articles in the PDBs from January 20 to September 10, 2001 that were related to Bin Laden.

40

Terrorism prevention now receives the lion's share of federal emergency-preparedness dollars. In 2005 some $180 million was allocated nationwide for state and local governments to fund emergency management, but it was in the form of _______ grants, which require local governments to supply a dollar for every federal dollar received. At the same time, the federal government dispersed $2.3 billion for anti-terrorism measures, with no matching funds required.

50-50 matching

__________ of Americans say limits on government collection of telephone and Internet data are inadequate, according to a recent poll.

65%

In May, CIA Counterterrorist Center (CTC) Chief Cofer Black told Rice that the current threat level was a ___ on a scale of 1 to 10, as compared to an 8 during the millennium.

7

The WTC actually consisted of _______ buildings, including one hotel, spread across 16 acres of land.

7

Some experts believe cyber intrusions actually occur even more often, because the host often is unaware of an attack, and many organizations are loath to report cyber attacks. The General Accounting Office (GAO) estimates that up to _____ of all computer security incidents may go unreported.

80%

The private sector controls ______ of the critical infrastructure in the nation.

85%

After the August 1998 bombings of the American embassies in Kenya and Tanzania, President Bill Clinton and his chief aides explored ways of getting Bin Ladin expelled from _______ or possibly capturing or even killing him.

Afghanistan

What were the three priority targets decided upon in a Defense Department paper for the Camp David briefing book on the strategic concept for the war on terrorism?

Al Qaeda, The Taliban and Iraq

Which 1996 law made some terrorist acts federal crimes punishable by death, thereby avoiding statute of limitation restrictions that apply to non-death penalty crimes? It established a formal list of foreign terrorist organizations (FTOs) to be designated by the secretary of state. Blocking FTO financing was an integral part of the bill, and it froze those groups' assets.

Antiterrorism and Effective Death Penalty Act of 1996

What was Atta's and Binalshibh coded language for the World Trade Center, Pentagon, the Capitol and the White House?

Architecture - World Trade Center Arts - Pentagon Law -Capitol Politics- White House

The emergency response at the Pentagon represented a mix of local, state and federal jurisdictions and was generally effective. Because of the nature of the event, a plane crash, fire and partial building collapse, the _______ served as the incident commander.

Arlington County fire Dept

More than a third of the world's data breaches originate in _______, more than in any other region. Nearly half of the breaches are launched in North America and Eastern Europe.

Asia

The _______ is currently regulated by the Ministry of Islamic Affairs. The ministry uses zakat and government funds to spread Wahhabi beliefs throughout the world, including in mosques and schools.

Assembly of Muslim Youth

Under President John F. Kennedy, the covert action program suffered a setback during the failed ________ invasion of Cuba in 1961. A force of Cuban expatriates trained and armed by the CIA invaded the island, aiming to remove communist leader Fidel Castro from power. However, the CIA was unable to provide the necessary U.S. military support.

Bay of Pigs

On August 6, 2001, the PDB was titled ____________. It was the 36th PDB that related to Bin Ladin or al Qaeda and the first devoted to a possible attack in the US.

Bin Ladin determined to strike in US

What four critical components of public health and medical preparedness are identified in HSPD-21?

Bio-surveillance, countermeasure distribution, mass casualty care, and community resilience

No connection was made between Moussaoui's presence in the US and the threat reporting during the summer of 2001. On September 13, the _______ received new, sensitive intelligence that Moussaoui had attended an al Qaeda training camp in Afghanistan. It passed that information to the US the same day.

British

U.S. government officials said that hackers working for the ______ government had tapped into computers at the Office of Personnel Management, which maintains records of federal employees and contractors. Data on about 4 million current and former federal workers (including Social Security numbers, job assignments and performance evaluations) may have been compromised. The U.S. government restricts sales of cellphones and computer servers made by the giant manufacture Huawei because they might contain "back doors" that this government could use to spy on American users.

Chinese

McCarthyism

Claimed communist had infiltrated Hollywood and even US gov, people were put on trial and some sent to prison

ComRep Chap 10

ComRep Chap 10

ComRep Chap 3

ComRep Chap 3

ComRep Chap 6

ComRep Chap 6

ComRep Chap 7

ComRep Chap 7

ComRep Chap 8

ComRep Chap 8

ComRep Chap 9

ComRep Chap 9

ComRep Chapter 12

ComRep Chapter 12

According to The 9/11 Commission Report; the second part of prescreening called on the air carriers to implement an FAA-approved computerized algorithm (known as ______________) designed to identify passengers whose profile suggested they might pose more than a minimal risk to aircraft.

Computer Assisted Passenger Prescreening System (CAPPS)

In 1987, Congress passed ___________, which shifted responsibility for the security of non- military computers from the National Security Agency (NSA) to the National Institute for Standards and Technology.

Computer Security Act of 1987

_______________ is a soft-line classification that allows policy makers to develop a range of options that do not involve the use of force or other repressive methods. The objectives of non-repressive responses depend on the characteristics of the terrorist environment. Examples of these responses include diplomacy, social reform and concessions.

Conciliatory Response

The _________, considered the first piece of disaster legislation, provided federal assistance to Portsmouth, N.H., following a huge fire.

Congressional Act 1803

The most substantial change in national security oversight in Congress took place following WWII. The ___________ created the modern Armed Services committees that have become so powerful today. One noteworthy innovation was the creation of the Joint House-Senate Atomic Energy Committee.

Congressional Reorganization Act of 1946

The ___________________________ are designed to effectuate the National Planning Frameworks, which in turn will theoretically achieve the National Preparedness Goal.

Core Capabilities

The first international treaty on cybercrime, the ________, went into effect in 2004 and was signed by the United States in 2006. But many of the countries that are often havens for cybercriminals, including Russia and China, are not a party to the treaty.

Council of Europe Convention on cybercrime

CAPPS (Computer Assisted Passenger Prescreening System)

Counter-terrorism system in place in the US air travel industry. TSA (transportation security)maintains a watchlist ,pursuant to 49 USC "individuals known to pose or suspected of posing a risk of air piracy or terrorism or threat to airline or passenger safety"

__________ has become the top national security priority for the United States.

Countering terrorism

In 1998 the FBI issued a 5 year strategic plan led by its deputy director, Robert "Bear" Bryant. For the first time, the FBI designated national and economic security, including __, as its top priority. Prior to 9/11 the FBI had never completed an assessment of the overall terrorist threat to the U.S. homeland.

Counterterrorism

In the mid-1980s, on the basis of a report from a task force headed by Vice President George Bush and after terrorist attacks at airports in Rome and Athens, the DCI created a _______ to unify activities across the Directorate of Operations and the Directorate of Intelligence.

Counterterrorist Center

Office of Emergency Management and Interagency Preparedness

Created by Giuliani, watch command to monitor key communication networks, improve response to major incidents, managing overall response to incidents

Beginning in March 1998 and continuing for nearly two years, a group of hackers had penetrated computers at the Pentagon, NASA, the Energy Department and several private universities and research labs. To this day the break-in, known as ________, has not been solved, although the attack was traced back to the Soviet Union. In response, the Clinton Administration released its National Plan for Information Systems Protection.

Cuckoo Egg

Custom Chap 11

Custom Chap 11

Custom Chap 12

Custom Chap 12

Custom Chap 13

Custom Chap 13

Custom Chapter 10

Custom Chapter 10

Custom Chapter 9

Custom Chapter 9

_________ is a top threat to U.S. security. Potential cyber threats may come from "profit- motivated criminals, ideologically motivated hackers or extremists" and "nation-states like Russia, China, North Korea and Iran". It is estimated that __________ costs the United States about $100 billion annually

Cybersecurity

The U.S. military established a signals intelligence unit during World War I to decipher enemy codes and provide codes for its own forces. In 1919 the unit was transferred to the State Department, where it became the _________ also known as the "Black Chamber", and focused on diplomatic rather than military communications. In 1929, Herbert Hoover, reportedly declared, "Gentlemen do not read other gentlemen's mail." Because of those ethical qualms, and for budget reasons, he disbanded it.

Cypher Bureau

While ____ already operates several cybersecurity programs, such as the U.S. Computer Emergency Readiness Team (US-CERT), it recently launched two major efforts to enhance cybersecurity. It is working with representatives from state and local governments, as well as the private sector, to develop a National Cyber Incident Response Plan (NCIRP).

DHS

The first major Internet virus, the Morris worm, appeared in 1988. Named after its creator, 23-year-old Cornell University doctoral student Robert T. Morris. It was not intended to harm computers or steal data, but the virus quickly spread to other computers, ultimately causing significant Internet slowdowns and sending alarms through the cybercommunity. Partly in response to the Morris worm, Carnegie Mellon University's Software Engineering Institute, with federal funding from the _____ founded the CERT (Computer Emergency Response Team).

Defense Advanced Research Projects Agency (DARPA)

DIA

Defense Intelligence Agency

Goldwater-Nichols Act

Department of defense reorganization act of 1986 publ 99-433 (signed by Reagan) made the most sweeping changes to the US Department of Defense since the department was established in National Security Act of 1947 by reworking command structure

In July 2001, Mayor Giuliani updated a directive titled, _______________. Its purpose was to eliminate potential conflict among responding agencies which may have areas of overlapping expertise and responsibility.

Direction and Control of emergencies in the city of New York

The National Security Act of 1947 created the position of ___________.

Director of Central Intelligence

_____________, so-called sovereign citizens who live in the United States but do not recognize the authority of any government, now outrank Islamic extremists on law enforcement's list of concerns, according to a 2013-14 survey on police intelligence processes conducted. They are also a growing threat to national security.

Domestic Terrorist

The National Security Agency manages a satellite surveillance network called ________. The NSA's network is apparently managed in cooperation with its counterparts in Australia, Canada, Great Britain, and New Zealand. Its purpose is to monitor voice and data communications. This is a kind of global "wiretap" that filters communications using antennae, satellites, and other technologies.

Echelon

___________ are defined as trade restrictions and controls that are imposed to pressure sanctioned governments to moderate their behavior. Used as a counterterrorist option, these serve several purposes. They: symbolically demonstrate strong condemnation of the behavior of the sanctioned regime, exercise the power of the sanctioning body, and potentially bring to bear considerable pressure on the sanctioned regime

Economic Sanctions

With the __________, Congress took another tack, legislating protections for data in transit. In 1994, the Communications Assistance for Law Enforcement Act required Internet service providers to provide capabilities for law enforcement to perform electronic surveillance of individuals. Such surveillance would still have to meet requirements for warrants specified under ECPA.

Electronic Communications Privacy Act of 1986

Which are the agencies most capable of carrying out the electronic surveillance mission?

Electronic Surveillance (NSA?)

Rice and Hadley asked Clarke and his staff to draw up the new presidential directive. On June 7, Hadley circulated the first draft, describing it as "an admittedly ambitious" program for confronting al Qaeda. What was its goal?

Eliminate al Qaeda network of terrorist groups as a threat to the US and friendly governments

NSPD 9 now extended to the global war on terrorism. The US would strive to eliminate all terrorist networks, dry up their financial support and prevent them from acquiring weapons of mass destruction. The goal was the ______________.

Elimination of terrorism as a threat to our way of life

Why do many organizations forgo reporting computer hackings to the police?

Embarrassment or ignorance?

In the United States, the ___________ performs domestic intelligence collection, and the ___________ operates internationally.

FBI, CIA

On September 11, the nation suffered the largest loss of life-2973-on its soil as a result of a hostile attack in its history. The _____ suffered 343 fatalities, the largest loss of life of any emergency response agency in history.

FDNY

According to The 911 Commission Report, by 8:48, officials in OEM headquarters on the 23rd floor of 7 WTC—just to the north of the North Tower—began to activate the Emergency Operations Center by calling such agencies as the __________________________instructing them to send their designated representatives to the OEM.

FDNY,NYPD,Department of Health, Greater Hospital Association

The USA PATRIOT Act significantly expanded law enforcement's investigative powers under the ___________ which had been enacted in response to the inappropriate use of wiretaps by the administration of President Richard Nixon. This act was intended to serve as a "firewall between foreign and domestic intelligence gathering". By separating the two types of electronic surveillance, foreign and domestic, it was designed to preserve Fourth Amendment protections for U.S. citizens in criminal cases.

FISA Act of 1978

federal information security management act

FISMA strengthens and makes permanent many GISRA provisions

The paper titled, ____________, detailed specific US demands for the Taliban. The State Department did not expect the Taliban to comply, therefore State and Defense would plan to build a coalition to go into Afghanistan

Game Plan for a Political Military Strategy for Pakistan and Afghanistan

What was Samuel Huntington's Clash of Civilizations theory?

Greatest conflicts will be between the christian nations of west end and muslim nations

Confronting traing or travel problems with Hazmi, Mihdar, Binalshibh and Moussaoui, al Qaeda was looking for another possible pilot candidate. A new recruit presented himself in Afghanistan. Who was this?

Hani Hanjour

Late May brought reports of a potential hostage plot against Americans abroad to force the release of prisoners including the Blind Sheikh. The reporting noted that operatives might opt to ______ an aircraft or storm a U.S. embassy.

Hijack

Intelligence indicated the persistence of contacts between ________ security officials and senior al Qaeda figures after Bin Ladin's return to Afghanistan. These border inspectors would not place telltale stamps in the passports of these travelers. In sum, there is strong evidence that this country facilitated the transit of al Qaeda members into and out of Afghanistan before 9/11.

Iranian

The enemy is not just terrorism. The catastrophic threat at this moment in history is more specific. It is the threat posed by _______ terrorism- especially the al Qaeda network, its affiliates and its ideology. Some of these leaders draw on a long tradition of extreme intolerance within one stream of Islam.

Islamist

Who were the three pilots on the East Coast who were simulating flights on large jets.

Jarrah, Atta and Shehi

The chief vehicle for INS and for state and local participation in law enforcement was the _____________, first tried out in New York City in 1980 in response to a spate of incidents involving domestic terrorist organizations

Joint Terrorism Taskforce

By far the most expensive disaster in the nation's history, _________ is expected to cost at least three times more than the second-costliest U.S. disaster, the 1988 heat wave and drought.

Katrina

The overall objective of legalistic responses is to promote the rule of law and regular legal proceedings. ___________ refers to the use of law enforcement agencies and criminal investigative techniques in the prosecution of suspected terrorists. Counterterrorist laws attempt to criminalize terrorist behavior. __________ relies on cooperation among states. Those who are parties to international agreements attempt to combat terrorists by permitting them no refuge or sanctuary for their behavior. In some cases, terrorists may be brought before international tribunals.

Law enforcement

What was the Phoenix memo?

Memo of an investigation into a possible attack coordinated by Osama Bin Ladin

___________ are defined as the recognized and official armed forces of a nation. __________ are defined as irregular armed units or individuals who are supported or organized by regimes.

Military assets, paramilitary assets

__________ also claimed to have found out about the 9/11 attacks three weeks in advance, a claim that appears to dovetail with evidence that he may have received a phone call from Hamzi around that time, that he stopped making calls from his telephone after August 25, 2001, and that he started acting strangely.

Modhar Abdullah

Terrorist Factory

Mosque located in al Qassim Province

International Security Assistance Force

NATO led peacekeeping force

In 1952, Truman created the __________ within the Defense Department. A descendant of the "Black Chamber" of the 1920s, its job was to coordinate the military's signals intelligence operations. It was highly secretive and its existence wasn't officially acknowledged until 1975.

NSA

Information that was critical to informed decision making was not shared among agencies. FDNY chiefs in leadership roles that morning have told the Commission Report that decision making capability was hampered by a lack of information from ______.

NYPD aviation

A day after the hurricane struck, the DHS declared Katrina an "incident of national significance," which under the new _________ should trigger a coordinated federal response. By the following day, the amphibious assault ship USS Bataan arrived with supplies off New Orleans, but not until Sept. 5, a week after Katrina hit, did troops arrive.

National Response Plan

On Jan. 8, 2008, President Bush followed up on Byzantine Foothold (a classified effort to track and neutralize attacks on critical networks) by issuing _________, which called for the creation of Comprehensive National Cybersecurity Initiative (CNCI), which established a National Cyber Security Center within the Department of Homeland Security.

National Security Presidential Directive 54

__________ committed against the citizens or holdings of a state generally is not a violation of international law, but rather a violation of the domestic criminal laws of the victim state or the state where the terrorist act occurred. _____________ is a violation of international law that invokes the victimized state's right of self- defense.

Non State Sponsored terrorism, State Sponsored terrorism

According to The 911 Commission Report, the Phase Two strikes and raids began on __________.

October 7th

What did the Intelligence Reform and Terrorism Prevention Act create?

Office of Director of National Intelligence

The CIA is a descendant of the __________, which President Roosevelt created early in World War II after having first thought the FBI might take that role. With its history, the CIA brought to the era of 9/11 many attributes of an elite organization, viewing itself as serving on the nation's front lines to engage America's enemies

Office of strategic services (OSS)

President Bush wrote __________ to request his support in dealing with terrorism and to urge Pakistan to engage actively against al Qaeda.

President Musharraf

National Security Directive 138

Presidential Directive focused on combatting terrorism

______________________ and ___________________ planning refers to devising procedures and policies that reduce the severity of threats to homeland security.

Prevention, mitigation

The ______________ is an independent federal body established by Congress in 2004 to balance terrorism prevention with the protection of privacy and civil liberties. It conducted a review of the NSA surveillance program.

Privacy and Civil Liberties oversight board

Who designed a theory that holds that modern terrorism has progressed through three "waves" lasting roughly 40 years each and that we now live a fourth wave?

Professor David C Rapoport

The _______ is the only relief organization chartered by Congress "to maintain a system of domestic and international disaster relief." In fact, the National Response Plan specifically calls on this organization to provide local relief. During Katrina, it provided hurricane survivors with nearly 3.42 million overnight stays in more than 1,000 shelters. And, in coordination with the Southern Baptist Convention, it served nearly 27 million hot meals to victims.

Red Cross

There was no rooftop evacuation. Although the __________ had a helipad, it did not meet the 1994 FAA guidelines.

South Tower

Following the 9/11 attacks, former President Bush signed an executive order allowing foreigners suspected of international terrorism to be tried in _________. These are formed under the power of the executive branch of government and are independent of the judicial branch. The prosecutors and judge-commissioners are military officers, responsible to the president.

Special Military Tribunals

The 911 system remained plagued by the operator's lack of awareness of what was occurring in the WTC. Callers were told to remain where they were. The lack of information combined with the general advice to remain where they were may have caused civilians above the impact not to attempt to descend although ________ may have been passable.

Stairwell A

As the Clinton administration drew to a close, Clarke and his staff developed a policy paper of their own, the first such comprehensive effort since the Delenda Plan of 1998. The resulting paper, entitled, ____________, reviewed the threat and the record to date, incorporated the CIA's new ideas from the Blue Sky memo, and posed several near-term policy options.

Strategy for Eliminating the threat from the Jihadist networks of al Qaeda: Status and prospects

____________ is an antiterrorist measure that makes potential targets more difficult to attack. Examples include increased airport security, the visible deployment of security personnel, and the erection of crash barriers at entrances to parking garages beneath important buildings.

Target Hardening

In the decade before 9/11, presidential discussion of and congressional and public attention to foreign affairs and national security were dominated by other issues. ________ infrequently took center stage, and when it did, the context was often on the tactics used.

Terrorism

Hal Lindsey, a former minister with Campus Crusade for Christ, sparked a revival with a 1970 book that became a publishing sensation, ______________, which cited biblical passages as prophecies applicable to the late 20th century, including the threat of nuclear war and the 1948 creation of Israel.

The Late Great Planet Earth

The computer systems of Sony Pictures Entertainment were hacked in 2014. The FBI blamed ___________, though without conclusive evidence. In January, Obama imposed sanctions on these agencies and officials, citing the communist country's "destructive, coercive cyber- related actions"

The North Korean Gov

What are two publications that continue to spread racial and anti-Semitic extremism?

The Turner Diaries and The myth of six million


Related study sets

IS 360 Cybersecurity in Business - Midterm

View Set

Kamillah Williams - Final Exam Study Set

View Set