Chapter 15 Prevention Paramount c Hometown Security Homeland Security d All

subject Type Homework Help
subject Pages 9
subject Words 1689
subject Authors Christine M.H. Orthmann, Karen M. Hess, Linda S. Miller

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
CHAPTER 15: UNDERSTANDING AND PREVENTING TERRORISM
MULTIPLE CHOICE
1. Which weapons of mass destruction do most experts predict terrorists will use?
a.
nuclear
b.
biological
c.
explosives
d.
computers
2. According to the text, which of the following is not an act of terrorism?
a.
Million Man March on Washington, DC
b.
assassination of a political leader
c.
bombing of an abortion clinic
d.
criminal lynching of blacks in the South
3. According to the text, all of the following are considered terrorist acts except:
a.
arson.
b.
bombings.
c.
kidnapping.
d.
speeding.
4. The ________________ program supports federal, state and local law enforcement efforts to combat
criminal activity, including terrorism.
a.
NIMS
b.
RISS
c.
NCISP
d.
SIMS
5. When a weaker group attacks a stronger group, this is referred to as:
a.
bisymmetric warfare.
b.
lateral warfare.
c.
symmetric warfare.
d.
asymmetric warfare.
6. Bioterrorism involves such biological weapons of mass destruction as all of the following except:
a.
botulism.
b.
flu.
c.
plague.
d.
smallpox.
page-pf2
7. When discussing domestic terrorism, a number of reasons have been given for the acts -committed on
U.S. soil. Which among the reasons listed below was not mentioned in the text?
a.
opposition to the government
b.
opposition to taxation
c.
opposition to abortion
d.
All of the above were mentioned in the text.
8. An example of religiously motivated terrorists is:
a.
antiabortionists.
b.
Red Army faction.
c.
Islamic extremists.
d.
environmentalists.
9. An example of politically motivated terrorists is:
a.
antiabortionists.
b.
Red Army faction.
c.
Islamic extremists.
d.
environmentalists.
10. According to the text, the coverage of terrorism inspiring more terrorism is called the:
a.
realistic coverage effect.
b.
contagion effect.
c.
jihadi effect.
d.
visibility effect.
11. The contagion effect is that:
a.
terrorism will spread unchecked.
b.
terrorism is contained in the same way contagion is contained.
c.
media coverage of terrorism inspires more terrorism.
d.
biological terrorism will spread geographically.
12. According to the text, ________________ terrorism is foreign based or directed by countries or groups
outside the United States against the United States.
a.
domestic
b.
violent
c.
religious
d.
international
13. As stated by the authors, terrorism is by nature ________________ because it involves acquiring and
using power to force others to submit to terrorist demands.
a.
economic
b.
philosophical
c.
social
d.
political
page-pf3
14. What bombings highlight the threat of domestic terrorists?
a.
World Trade Center and Centennial Olympic Park
b.
Alfred P. Murrah Building and Centennial Olympic Park
c.
Alfred P. Murrah Building and the Twin Towers
d.
World Trade Center and the Twin Towers
15. The training of police and private security officers to identify terrorists to help them identify potential
terrorist targets is conducted and funded under:
a.
the Critical Incident Project.
b.
the Terrorism Identification Project.
c.
the Save Our Streets Project.
d.
the Safe Cities Project.
16. Jihad refers to what?
a.
hate the Americans
b.
fight until death
c.
kill the Americans
d.
holy war
17. ________________ warfare refers to combat in which a weaker group attacks a superior group by not
attacking the stronger adversary head-on but rather attacking areas where the adversary least expects to
be hit, causing great psychological shock.
a.
International
b.
Asymmetric
c.
Symmetric
d.
Group
18. The Department of Homeland Security (DHS) was established by Executive Order on -October 8,
2001, and integrated ________________ different federal departments and -agencies.
a.
31
b.
22
c.
12
d.
18
19. On October 26, 2001, this law was signed into law by President George W. Bush, giving police
unprecedented ability to search, seize, detain, or eavesdrop in their pursuit of possible terrorists:
a.
US-VISIT Act.
b.
Homeland Security Act.
c.
USA PATRIOT Act.
d.
Executive Order 21.
page-pf4
20. Who was the Unabomber?
a.
Ramzi Ahmed Yousef
b.
Timothy McVeigh
c.
Lucas Helder
d.
Theodore Kaczynski
21. It has been estimated that approximately ________________ percent of the country’s critical
infrastructure is protected by private security.
a.
35
b.
65
c.
85
d.
25
22. In 1996, the FBI established what organization to combat terrorism?
a.
Homeland Security
b.
Counterterrorism Center
c.
SEAL Teams
d.
FEMA
23. The Department of Homeland Security has established a ________________-level, -color-coded threat
system used to communicate with public safety officials and the public at large.
a.
five
b.
four
c.
three
d.
seven
24. The current color-coded security advisory system has been replaced by a ________________ National
Terrorism Advisory System.
a.
three-level
b.
four-level
c.
two-level
d.
six-level
25. The first guiding principle of the Department of Homeland Security is to protect:
a.
citizens of the United States.
b.
key government officials.
c.
key infrastructure.
d.
civil rights.
26. The events of September 11, 2001, led to the development of the ________________, the country’s
first standardized management approach unifying federal, state and local -governments for incident
response.
a.
National Corroborative Management System
b.
National Incident Management System
page-pf5
c.
National Incident Reference System
d.
none of the above
27. The IACP has identified five key principles that should form the basis for a national -homeland
security strategy. Which of the following is one of those key principles?
a.
All terrorism is local.
b.
Prevention is paramount.
c.
Hometown security is homeland security.
d.
all of the above
28. Terrorism by nature is:
a.
religious.
b.
political.
c.
racial.
d.
territorial.
29. ________________ is a proactive program used by the police to identify critical -infrastructure
locations in Los Angeles and develop a multiagency response.
a.
Watch LA
b.
L.A.W.
c.
Archangel
d.
CompStat
30. Local law enforcement can take several steps to prevent racial profiling and/or discrimination against
Arab Americans. Which of the following is not a step law enforcement can take?
a.
increase communication and dialogue
b.
develop person-to-person contact
c.
identify community needs
d.
go undercover in mosques
TRUE/FALSE
1. The FBI categorizes terrorism in the United States as either domestic or international -terrorism.
2. The Department of Homeland Security established a five-level, color-coded threat system used to
communicate with public safety officials and the public at large.
3. The first line of defense against terrorism is the patrol officer in the field.
page-pf6
4. According to the text, the single challenge in combating violence facing community policing is
countering terrorism while continuing to address crime and disorder.
5. The number of domestic terrorist attacks is almost triple the number of international acts of terrorism.
6. Terrorists may use arson, explosives and bombs, weapons of mass destruction (biological, chemical or
nuclear agents), and technology.
7. Cyberterrorism is defined as the intimidation of civilian enterprise through the use of high technology
to bring about political, religious, or ideological aims, actions that result in -disabling or deleting
critical infrastructure data or information.
8. The September 11th attacks undoubtedly shifted the priorities of policing.
9. According to the text, trafficking in illicit goods and commodities, such as cigarettes, by -terrorists and
their supporters is a critical element in generating funds.
10. As a result of 9/11, the Department of Homeland Security was established, reorganizing the
departments of the federal government.
11. At the federal level, the FBI is the lead agency for responding to acts of domestic terrorism. The
Department of Homeland Security is the lead agency for consequence management (after an attack).
12. The fight against terrorism begins in our own backyardsour own communities, our own
neighborhoodsand police chiefs need to prepare themselves, their officers and their
-communities—the people they’ve sworn to protect—against terrorism.
13. According to the text, civil libertarians are not concerned that valued American freedoms are being
sacrificed in the interest of national safety.
14. As stated by the authors, although the federal government has increased its efforts in the area of
terrorism prevention and response, a large degree of responsibility for responding to threats of
terrorism rests at the local level.
page-pf7
15. Terrorism can survive without publicity, and the media generates much of this publicity.
SHORT ANSWER
1. According to the FBI, ________________ involves violent acts or acts dangerous to human life that
violate the criminal laws of the United States or any state, or that would be a -criminal violation if
committed within the jurisdiction of the United States or any state.
2. ________________ is defined by the FBI as “terrorism that initiates, or threatens to initiate, the
exploitation of or attack on information systems.”
3. The ________________ is where the coverage of terrorism inspires more terrorism.
4. According to the text, most terrorist acts result from dissatisfaction with a ________________,
political, or social system or policy and frustration resulting from an inability to change it through
acceptable, nonviolent means.
5. On February 23, 1998, ________________ declared jihad, a holy war on the United States, calling on
“every Muslim who believes in God and wishes to be rewarded to comply with God’s order to kill
Americans and plunder their money wherever and whenever they find it.”
6. According to the text, the most common threats include ________________ agents,
________________ agents, and ________________ exposure.
page-pf8
7. ________________ involves such biological weapons of mass destruction (WMDs) as anthrax,
botulism, and smallpox.
8. A subtitle of the Homeland Security Act of 2002, called the Homeland Security Information Sharing
Act, required the president to develop new procedures for ________________, as well as unclassified
but otherwise sensitive information, with state and local police.
ESSAY
1. Describe the process of ideological development.
2. Describe the types of methods of launching attacks used by terrorists. Identify their most common and
dangerous methods.
3. Describe the USA PATRIOT Act and its purpose.
4. List and describe the methods used by terrorists to further their cause and how the United States can
and should respond.
page-pf9
5. Describe the role media plays in the perpetuation of terrorism. How can law enforcement use this?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.