• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/69

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

69 Cards in this Set

  • Front
  • Back
Terrorism is..._______ against noncombatant targets...
premeditated, politically motivated VIOLENCE perpetrated...
The FBI designates terrorism as the _______ use of force or VIOLENCE against persons or property to ________ or _______ a Gov...
unlawful, influence, coerce
The DoD defines terrorism as the ______ use of ______ VIOLENCE or threat of violence to inculcate fear; intended to ______ or to _______...
calculated, unlawful, coerce, intimidate
The State Dept defines terrorism thus: Terrorism is broadly defined as the ______ ______ VIOLENCE perpetrated against...
politically motivated
The UN has no internationally agreed upon definition of terrorism. T/F?
True
The UN defines terrorism as an ______ inspiring method of repeated VIOLENT actions....
anxiety
What are the five common elements of terrorism?
Political
Psychological
Violent
Dynamic
Deliberate
Three common motivations of terrorism
Political
Religious
Ideological
Domestic terrorists are groups or individuals who...?
operate entirely within the US and its territories
When/Where was the KKK founded?
1865 in Tennessee
Direct action activities in domestic terrorism include vandalism and arson known as...
monkey wrenching
What does RaHoWa mean?
Racial Holy War
Militias gained momentum after?
Waco 1993
Name 4 Lone Wolf terrorists and their crimes.
Ted Kaczynski - Unabomber
Tim McVeigh - Oklahoma City
Eric Rudolph - Olympics
Bruce Ivins - anthrax
What was the Unabomber's manifesto titled?
Industrial Society and Its Failure
US State Dept has designated __ FTO's currently
47
What does Al-Qaeda mean?
The base
What is Hamas?
Islamic Resistance Movement
Hizbollah?
Party of God
Define state terrorism
States or governments that use terror against it's own population
What is the FBI's first priority?
CT
TSA maintains the ________ List
No Fly
The National Joint Terrorism Task Force...
coordinates CT investigations among member agencies
What was PDD 39?
US Policy on CT ; Clinton
PDD 62?
Protection Against Unconventional Threats to the Homeland and Americans Overseas ; Clinton
HSPD 7?
Crit Infra ID, Prioritization, and Protection ; Bush
NSPD 9?
Combating Terrorism ; Bush
Patriot Act let agencies obtain records without warrant by using NSL's?
National Security Letters
Intel Community is headed by ?
Director of National Intelligence
CIA created when/how?
1947 by National Security Act
Within FBI the ________ ______ branch gathers intel
National Security
7 Stepts in Intel Cycle?
Intel Requirements
Planning & Direction
Collection
Processing
Analysis
Reporting
Dissemination
Define OSINT and HUMINT and FISINT
Open Source Intel
Human Intel
Foreign Instrumentation SIGINT
Clinton issued EO 13010 entitled __? in 1996
President's Commission on Crit Infrastructure
PDD - 63 in 98 was the first to mention _____ infrastructure. Founding doc for NIPC, which is...?
Cyber , National Infra Protection Center
NSHS defined three categories of "key assets":
Monuments, symbols, icons

Facilities and structures

Commercial centers, office buildings, and sports stadiums
Risk management is the ID, assessment, and prioritization of ?
threats, vulnerabilities, and consequences
Threat is...
an indication of impending danger or harm
Two types of vulnerability?
Inherent and Tactical
____ X _____ X ______ = Risk
Threat X Vulnerability X Consequence
Consequence is a function of ?
risk allocation
For federal funding, states must do risk analysis every _ years?
3
Purpose of Risk Management is to...
protect people and assets
State the steps of the RM process
1: Risk ID
2: Quantitative Analysis
3: Evaluation of treatment options
4: Implementation
5: Monitoring and Adjusting
An excessive reliance on ______ can be expensive and an ...?
insurance, inefficient use of capital
Threat assessment?
used to veal likelihood of adverse activity vs given asset
Vulnerability assessment?
ID's weaknesses in structures, etc
Criticality assesment?
systematically ID's and evaluates important assets and infrastructure
Define MDG, how many?
Millennium Development Goals,
Failure to secure the environment likely acts as a ?
threat multiplier
ES may act ________ across nations
differentially
ES began when researchers were understanding the _____ Sahel region of sub-Saharan Africa
Sahel
What are the 4 instruments of US National Power?
DIME:
Diplomatic
Informational
Military
Economic
Name the key environmental health concepts.
Stability
Sustainability
Supply/Demand
Carrying Capacity
Disasters occur when _____ meet ______?
Hazards, vulnerability
What is the document prepared by Exec branch every 2 years
National Security Strategy
Nearly __ of all USTRANSCOM ops driven by disaster relief before 9/11
1/4
What is the controlling independent variable for all ES issues?
Population
In 2011, world population was ?
7 Billion, 10 billion by 2083
ES connected to HS strat planning by using same types of ______ _______ and assessment tools
strategic planning
The science of using a person's unique physiological characteristics to verify identity
Biometrics
CODIS, stands for? and blends computer and DNA tech into a tool for fighting crime
COmbined DNA Index System
Each human face has apps __ nodal points
80
A retinal scan can ID ___ unique points in the eye
235
Speaker recognition systems use _________ to represent human voices
spectograms
Define AFIS
Automated fingerprint ID systems
One of the drawbacks of T-rays is that they ?
are unable to penetrate metal
The ADS, ?, is a non lethal, counter-personnel directed energy weapon
Active Denial System
GPS constellation made of __ satellites
24