• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
This type of terrorist activity is sometimes employed as a means of escape, _____________________ is normally carried out to produce a spectacular hostage situation.
Hijacking
Under Terrorist Force Protection Conditions, please name the Force Protection condition- Declared when a general threat of possible terrorist activity is directed toward installation, vessels or personnel, the nature of which are unpredictable and where circumstances do not justify full implementation of FP condition BRAVO
Alpha
A critical factor in understanding terrorism is the _____________________ impact of the terrorist act on an audience other than the victim.
Emotional
Under Terrorist attack methodology- Detailed and often long term, surveillance is then conducted against the chosen potential target(s) _____________________.
The following answers are acceptable:
- Detailed Surveillance
- Phase Four- Detailed Surveillance
Terrorists _____________________ may include attracting publicity for a group's cause, demonstrating the group's power or the existing government's lack of power, extra
Objectives
"This" is the crime of maliciously setting fire to a building the property of another person
A. Weapons of mass destruction
B. Bombing
C. Arson
D. Raids
C. Arson
Under terrorist attack methodology- Once a terrorist or terrorist group decides to conduct an attack they begin the process of target selection.
The following answers are acceptable:
- Target Operations
- Phase One- Target Operations
In "type" of warfare, actions are taken to achieve information superiority by affecting adversary information, information-based processes, information systems and computer based networks while leveraging and defending one's own information, information systems and computer based networks _____________________
Information Warfare
A _____________________ group's selection of targets and tactics is often a function of the group's affiliation, level of training, organization, sophistication and opportunity.
Terrorists
Under Terrorist Levels (Please name the 4 DOD threat levels)- An anti U.S. terrorist group is operationally active and uses large casualty producing attacks as their preferred method of operation. There is substantial DOD presence and the operation environment favors the terrorist.
High
(Answers may vary)
Under Terrorist Force Protection conditions, please name the Force Protection condition- Declared when a terrorist attack has occured in the immediate area or intelligence indicates a terrorist action against a specific location or person is likely. Declared only as a localized warning
DELTA
Under Terrorist Levels (Please name the DOD threat level assessment methodology)- Actions indicative of preparations for specific terrorist operations.
Intentions
(Answers may vary)
This terrorist activity is usually a covert seizure of one or more specific persons in order to exact specific demands.
A. Hostage
B. Kidnapping
C. Skyjacking
D. Hijacking
B. Kidnapping
Under Terrorist Force Protection Conditions, please name the Force Protection condition- applies when a general threat of possible terrorist activity exists but warrants only a routine security posture.
Norman
(Answers may vary)
This type of activities on facilities are usually undertaken for one of three purposes: to gain access to radion or television broadcast capabilities in order to make a statement; to demonstrate the government's inability to secure critical facilities or national symbols; or to acquire resources.
The following answers are acceptable:
-Raids
-Attacks
_____________________ have accounted for over one half or all recorded international terrorist attacks since 1938.
Bombings
Under Terrorist Levels (Please name the DOD threat level assesment methodology)- The circumstances of a the country under consideration
Operating environment
(Answers may vary)
This type of terrorist activity is an overt seizure of one or more individuals with the intent of gaining publicity or other concessions in return for release of the hostages.
A. Hostage taking
B. Hijacking
C. Skyjacking
D. Seizure
A. Hostage taking
Under Terrorist Levels (Please name the DOD threat level assessment methodology)- The acquired assessed or demonstrated level of capability to conduct terrorist attacks
Operational capability
(Answers may vary)
What are the intelligence's system for articulating and categorizing the terrorist threat worldwide?
Threat levels