Chapter 11 Espionage is the practice of obtaining information about a government

subject Type Homework Help
subject Pages 12
subject Words 4054
subject Authors Larry J. Siegel

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
True / False
1. According to research in the text, most political criminals do not consider themselves antisocial but instead patriotic
and altruistic.
a.
True
b.
False
2. In regard to the goals of political crimes, the motive for profit-related crimes usually includes the selling of state secrets
for personal enrichment or trafficking in stolen arms or munitions.
a.
True
b.
False
3. Political crimes can include both violent and nonviolent crimes.
a.
True
b.
False
4. Some political criminals plot to overthrow the existing government and replace it with one that holds views they find
more acceptable.
a.
True
b.
False
5. One of the biggest problems with deterring and penalizing election fraud is that U.S. criminal code fails to mention
election fraud as a specific crime, and instead includes it with white-collar crimes and green-collar crimes.
a.
True
b.
False
6. Election fraud can include the calling in of a bomb threat in polling places known to favor the opposing party.
page-pf2
a.
True
b.
False
7. Because of international law, election fraud has been eliminated in all countries except third-world dictatorships.
a.
True
b.
False
8. Former Vice President of the United States, Aaron Burr, was arrested and found not-guilty of treason because he lacked
an overt act and simply planning to overthrow the government is not equal to treason.
a.
True
b.
False
9. Treason is the only crime mentioned in the U.S. Constitution.
a.
True
b.
False
10. Industrial espionage by foreign agents' efforts has hurt the United States specifically by eroding the U.S. military
advantage.
a.
True
b.
False
11. Before 1996, there was no federal statute that explicitly penalized industrial espionage.
a.
True
b.
False
page-pf3
12. An example of foreign industrial espionage would be the targeting of U.S. firms for technology that would strengthen
their foreign defense capabilities.
a.
True
b.
False
13. Espionage is the practice of obtaining information about a government, organization, or society that is considered
secret or confidential without the permission of the holder of the information.
a.
True
b.
False
14. State political crimes are perpetrated by state authorities against the people they are supposed to serve.
a.
True
b.
False
15. An insurgency is traditionally defined as a political movement that may use terror tactics to achieve its goals.
a.
True
b.
False
16. The term terrorist is often used interchangeably with the term guerrilla, but the terms are quite different.
a.
True
b.
False
17. Al-Qaeda and Hamas are examples of revolutionary groups.
a.
True
b.
False
page-pf4
18. Revolution comes from the Latin word revere, meaning “one who changes.”
a.
True
b.
False
19. What separates a revolution from a coup is that revolutions rely on armed forces and violence, while coups
traditionally are nonviolent?
a.
True
b.
False
20. The use of the word terrorism is first traced to the American Revolution, when the nontypical patterns of warfare from
American colonists were said to “terror” the British troops who fought in traditional military fashion.
a.
True
b.
False
21. During WWII, any resistance of German efforts in Europe was viewed by the Nazi’s as terrorism.
a.
True
b.
False
22. Revolutionary terrorists use violence to frighten those in power and their supporters in order to replace the existing
government with a regime that holds political or religious views of the group.
a.
True
b.
False
page-pf5
23. The Animal Liberation Front is a group of domestic terrorists who smuggle animals for genetic reasons from third-
world countries to the United States for financial gain to support their larger mission of world dominance.
a.
True
b.
False
24. Al-Qaeda, the group responsible for the 9/11 attacks, is an example of a retributive terrorist group.
a.
True
b.
False
25. Lone-actor terrorists do not belong to an organized group but act on their own, motivated by political, religious, or
social beliefs.
a.
True
b.
False
26. Retributive terrorist groups want to impose their social and religious code on others.
a.
True
b.
False
27. Eco-terrorists are political terror groups involved in violent actions to protect the environment.
a.
True
b.
False
28. Following the 9/11 attacks, then President George W. Bush proposed the creation of a new cabinet-level agency called
the Department of Homeland Security.
a.
True
page-pf6
b.
False
29. Legislation giving U.S. law enforcement agencies a freer hand to investigate and apprehend suspected terrorists is
called the USA Patriot Act.
a.
True
b.
False
30. Terrorist attacks against failed states are traditionally less lethal than attacks against other nations because the failed
states have no strong leadership, and therefore, no direct target of the terrorist acts.
a.
True
b.
False
31. Which of the following is not one of the four goals of political criminals in the text?
a.
Economic
b.
Profit
c.
Intimidation
d.
Conviction
32. Which of the following is not one of Borum’s cognitive stages for political crime?
a.
It's just started.
b.
It's not fair.
c.
It's your fault.
d.
You're evil.
33. Which of the following is not true about election fraud according to the text?
a.
In some third-world nations’ dictatorships, election fraud is the norm.
b.
Election fraud has existed as a feature of political life since Roman times.
page-pf7
c.
Election fraud was the third leading cause of arrests for U.S. politicians over the last two decades.
d.
Flyers containing misleading information about opponents is a primary method of election fraud.
34. This type of election fraud occurs when voters are scared away from polls because of threats.
a.
Intimidation
b.
Misinformation
c.
Disruption
d.
Vote buying
35. Which of the following is not true of treason?
a.
There have actually been less than 40 prosecutions for
treason in the entire history of the United States.
b.
Helping an enemy in the time of war is
considered a war crime and is not treason.
c.
Many nations have applied the death penalty for treason.
d.
Treason is the only crime mentioned in the
U.S. Constitution.
36. An act of disloyalty to one's nation.
a.
Treason
b.
Subversion
c.
Sedition
d.
Duplicity
37. Robert Hanssen, a former counterintelligence agent with the FBI, who the movie Breach was about, is one of the most
famous cases of ______.
a.
espionage
b.
voter fraud
c.
treason
d.
murder
38. An act that causes severe pain or suffering, whether physical or psychological, that is intentionally inflicted on a
person for such purposes as obtaining a confession or information.
a.
Torture
b.
State anguish
c.
Afflict
d.
Political torts
page-pf8
39. Robert Hanssen, a former FBI counterintelligence officer, was arrested in 2001 for selling secrets to which nation?
Hanssen’s case is considered one the most severe forms of espionage reported and was part of 2007 film titled The
Breach.
a.
Russia
b.
China
c.
Germany
d.
North Korea
40. Which of the following is not one of the ways listed in the text that foreign governments attempt to infiltrate
businesses in attempts to gain sensitive information?
a.
Data mining U.S. companies with headquarters abroad
b.
Conferences and trade shows
c.
Official foreign visitors
d.
Exploitation of joint research
41. Many argue that the government and law enforcement should be allowed to use any means necessary to subdue
terrorists or to prevent the destruction of lives and property in an example called the ______.
a.
ticking bomb scenario
b.
Dzhokhar principle
c.
at -all-costs- scenario
d.
exception clause
42. Armed military bands that use hit-and-run terror tactics to destabilize the existing government are known as _____.
a.
profiteers
b.
insurrectionairies
c.
mutineers
d.
guerillas
43. Which of the following terms originated from a rebellion against French troops in the early 1800s?
a.
Guerilla
b.
Coup
c.
Terrorist
d.
Insurgent
page-pf9
44. The origin of the term terrorism, the French Revolution’s __________________ began in 1795 and was initiated by
the revolutionary government.
a.
Reign of terror
b.
Trail of tears
c.
Time of treachery
d.
Time of terror
45. Which of the following is false about the nationalist terrorism group Hezbollah?
a.
Hezbollah is from the Arabic term "party of God."
b.
A primary goal is to drive Israeli troops out of Lebanon
c.
United States and its allies have supported Hezbollah in Syria and the Middle East.
d.
Hezbollah members follow a distinct version of Shia ideology developed in Iran.
46. Which of the following is not true about Lone-actor terrorists?
a.
All suffer from either depression or a mental
disorder.
b.
The Boston bombing is considered a lone-actor
event.
c.
Many lone-actors have previous military
experience.
d.
Many see themselves as outcasts or socially
unequal.
47. Eco-terrorist groups' primary goal is ______.
a.
to overthrow the current political government
b.
commit common-law crimes in order for profit to in turn spread their message
c.
promote hate or religious and ethnic groups
d.
protection of the environment
48. Which of the following is not one of the political terrorist groups listed in the text?
a.
Boko Haram
b.
Posse Comitatus
c.
Aryan Nation
d.
Ku Klux Klan
page-pfa
49. The Animal Liberation Front (ALF) would fall into which of the following categories of terrorism?
a.
Political
b.
Revolutionary
c.
Nationalist
d.
Retributive
50. Which of the following terrorist groups want to impose their social and religious code of ethics on others?
a.
Retributive
b.
Political
c.
Nationalist
d.
Criminal
51. Terrorism which occurs when a repressive government regime forces its citizens into obedience?
a.
State-sponsored terrorism
b.
Lone wolf terrorism
c.
Criminal terrorism
d.
Retributive terrorism
52. Syria, Libya, and Iraq have all lost control of their own territory and have been unable to provide services and
protection to their citizens with the rise of ISIS. These countries would be examples of a ______.
a.
failed state
b.
freed state
c.
collapsed state
d.
crisis state
53. Terrorists who report that they are products of dysfunctional families in which the father was not present or was
distant or cold belong to view of terrorism referred to as ______.
a.
domestic conflict view
b.
family opposition view
c.
domestic opposition view
d.
family conflict view
page-pfb
54. The view that holds that terrorists join networks of terror because they are homesick while in foreign nations and seek
out people with similar backgrounds whom they often find in mosques or other religious settings.
a.
Socialization view
b.
Ideological view
c.
Domestication view
d.
Nationalistic view
55. The National Consortium for the Study of Terrorism and Responses to Terrorism’s (START) most recent data (2013)
revealed all of the following except ______.
a.
more than 65 percent of terrorist acts occurred in Europe and South America
b.
about 12,000 terrorist attacks occur a year
c.
terrorism is rapidly evolving
d.
the Syrian conflict empowered ISIL to expand its cross-border operations into Iraq
56. Government official charged with coordinating data from the nations' primary intelligence gathering agencies
a.
Director of National Intelligence
b.
Director of Joint Agency Alignment
c.
Supervisor of Internal Affairs
d.
Administrator of Terrorism Taskforce
57. On October 26, 2001, Congress passed the ______________ giving U.S. Law Enforcement a freer hand at
investigating terrorists.
a.
USA Patriot Act
b.
U.S. Anti-Terrorism Act
c.
Federal Lautenberg Act
d.
George W. Bush Exemption Act
58. The Department of Homeland Security includes which of the following components?
a.
Border security
b.
Emergency preparedness and response
c.
Chemical and biological countermeasures
d.
All of the above
page-pfc
59. Which of the following is not one of the steps required to defeat jihadist groups according to the Rand Corporation?
a.
Create a political infrastructure capable of quick-strike retaliation of terrorism.
b.
Attack the ideological underpinnings of global jihadism.
c.
Sever ideological and other links between terrorist groups.
d.
Strengthen the capabilities of front-line states.
60. David Fahey, a businessman in a medium-sized Ohio town, decides to run for city council. While he has earned a
masters degree, he is married, has three sons, and is a respected member of society. He fears he may lose the upcoming
city council election to a new comer who recently moved back to town after establishing himself in South Carolina. While
it is known that David regularly cheats on his wife, he has not been known to be unethical in any other aspects of his life.
Answer the following questions.
David hires his best friend, John, to call in a bomb threat on election day to a precinct where his rival, Keith Joseph, is
supposed to get the majority of support. This is an example of ______.
a.
disruption
b.
intimidation
c.
misinformation
d.
none of the above
61. David works for a large steel company in Ohio and regularly uses his private email to communicate company secrets
at home and abroad. His run for political office has brought attention to David and his email account is hacked by a
German company looking to steal trade secrets. This is an example of ______.
a.
industrial espionage
b.
treason
c.
a political crime
d.
a state political crime
62. David wins the election. As a result, he part of a group of councilmen who vote to log an area of town to create green
space to entice potential businesses to move to town. In doing so, the habitat of a local endangered turtle population has
had to be relocated. The relocation has caught the eye of a radical group of ____________ who are determined to protect
the environment and animals at any cost.
a.
eco-terrorists
b.
nationalist terrorists
c.
state-sponsored terrorists
d.
lone-actor terrorists
page-pfd
63. __________________ crime refers to any illegal acts that are designed to undermine an existing government and
threaten its survival.
64. Political criminals who fall under the goal of _______________ are motivated by altruism; they truly believe their
crimes will benefit society.
65. _________________ refers to any illegal interference with the political process, especially those which affect vote
calculations.
66. In regard to election fraud, ______________ occurs when a bomb threat is called into a polling place or outright
sabotage of polling places results in loss of votes or voter turnout.
67. When political operatives try to shape the outcome of an election by busing in ineligible voters from other districts,
this process is known as_______________.
68. An act of disloyalty to one's nation or state is defined as __________________.
69. The process of obtaining information about a government, organization, or society that is considered secret or
confidential without the permission of the holder of the information is known as ____________________.
page-pfe
70. A scenario, referred to as the _________________________ scenario, argues that torture can perhaps be justified if
the government discovers that a captured terrorist knows the whereabouts of an explosive device.
71. Of all of the state political crimes, the use of __________ to gain information from suspected political criminals is
perhaps the most notorious.
72. Famed social commentator Alan Dershowitz proposed the creation of a ________________ that can only be issued by
a judge in cases where there is absolute need to obtain immediate information in order to save lives.
73. In 2014, five Chinese men were indicted for stealing thousands of sensitive internal communications between U.S.
Steel Corporations in a crime referred to as ___________________ espionage.
74. The U.S. Criminal Code codifies ________ as whoever, owing allegiance to the United States, levies war against them
or adheres to their enemies, giving them aid and comfort within the United States or elsewhere.
75. While some political crimes are committed by people who oppose the state, others are perpetrated by state authorities
against the people they are supposed to serve; this is referred to as ________________________.
76. The illegal use of force against innocent people to achieve a political objective is called ____________________.
page-pff
77. Armed military bands known as _______________, typically are located in rural areas and use hit-and-run terror
tactics to destabilize the existing government.
78. The typical goal of an ____________ is to confront the existing government for control of all or a portion of its
territory, or force political concessions in sharing political power.
79. This group, ____________, began as an insurgency, raiding Iraq and Syria and occupying major cities with the
primary goal of creating a caliphate, based on a very conservative Islamic religious code.
80. The origin of the word terrorism comes from the French Revolution's ___________________.
81. _______________ terrorism promotes the interests of a minority ethnic or religious group that believes it has been
persecuted under majority rule.
82. __________________ terrorist groups refrain from tying specific acts to direct demands and instead redirect the
balance between what they believe is good and evil.
83. ______________________ terrorism occurs when a repressive government regime forces its citizens into obedience,
oppresses minorities, and stifles political dissent.
page-pf10
84. _____________________ are political terror groups involved in violent actions to protect the environment.
85. According to the ______________ view of terrorism, terror recruits suffer dissension from friends, family, and society
with many having been raised to hate the groups who are in power and believe that they have been victimized by state
authorities whom they view as oppressors.
86. A nation whose government has lost control of its own territory, is unable to provide public services, and lacks the
ability to interact with other states is known as a ________________.
87. The ___________________________ is defined as being an agency of the federal government charged with
preventing terrorist attacks within the United States, reducing America's vulnerability to terrorism, and minimizing the
damage and aiding recovery from attacks that do occur.
88. The government official charged with coordinating data from the nation's primary intelligence-gathering agencies is
called the __________________.
89. Define the term political crime and list describe the goals associated with political crime.
page-pf11
90. List and describe the causes of political crime.
91. Explain the significance of industrial espionage over the last 20 years and what impact has it had on the United States
and the rest of the world?
92. Explain what is meant by the ticking bomb scenario. In your explanation, provide at least one example of how
proponents state the scenario could be legally enforced.
93. Compare and contrast the terms espionage and treason.
94. Compare and contrast the terms insurgents, terrorists, guerillas, and revolutionaries.
95. Provide a brief history of terrorism.
96. Compare and contrast the different contemporary forms of terrorism.
97. Compare and contrast the motivating factors of terrorism.
page-pf12
98. Provide a brief overview of the extent of terrorism.
99. What has been the overwhelming response to terrorism especially in the United States over the last 20 years?
100. Compare and contrast the pros and cons of the USA Patriot Act.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.