Terrorism And Homeland Security 9th Edition by Jonathan R. White - Test Bank

Terrorism And Homeland Security 9th Edition by Jonathan R. White - Test Bank   Instant Download - Complete Test Bank With Answers     Sample Questions Are Posted Below   While the term terrorism is difficult to define, the process of terrorism is True False   ANSWER:                            True REFERENCES:                   Tactics and Force Multipliers LEARNING OBJECTIVES: …

$19.99

Terrorism And Homeland Security 9th Edition by Jonathan R. White – Test Bank

 

Instant Download – Complete Test Bank With Answers

 

 

Sample Questions Are Posted Below

 

  1. While the term terrorism is difficult to define, the process of terrorism is
    1. True
    2. False

 

ANSWER:                            True

REFERENCES:                   Tactics and Force Multipliers

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Although terrorist tactics change through time, the most common weapon of terrorism has been and remains the
    1. True
    2. False

 

ANSWER:                            True

REFERENCES:                   Tactics and Force Multipliers

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. The media can be used as a force
    1. True
    2. False

 

ANSWER:                            True

REFERENCES:                   Tactics and Force Multipliers

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Examples of force multipliers include technology and reserve units ‘at the ready’.
    1. True
    2. False

 

ANSWER:                            False

REFERENCES:                   Tactics and Force Multipliers

LEARNING OBJECTIVES:  TERR.WHIT.17.05.03 – List and describe four force multipliers.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Media coverage can make a minor group appear to be politically
    1. True
    2. False

 

ANSWER:                            True

REFERENCES:                   Tactics and Force Multipliers

LEARNING OBJECTIVES:  TERR.WHIT.17.05.03 – List and describe four force multipliers.

KEYWORDS:                       BLOOM’S: Remember

 

  1. The most common tactic of cyberterrorism to date has been the defacement of Web
    1. True
    2. False

 

ANSWER:                            True

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Terrorism is not influenced by
    1. True
    2. False

 

ANSWER:                            False

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Cyberterrorism is an attractive, low-risk
    1. True
    2. False

 

ANSWER:                            True

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Radioactive poisoning is highly
    1. True
    2. False

 

ANSWER:                            False

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Nuclear waste is a ready-made dirty
    1. True
    2. False

 

ANSWER:                            True

REFERENCES:                   Nuclear Terrorism

LEARNING OBJECTIVES:  TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.

KEYWORDS:                       BLOOM’S: Understand

 

  1. Only the government and military have access to highly enriched uranium (HEU).
    1. True
    2. False

 

ANSWER:                            False

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.

KEYWORDS:                       BLOOM’S: Understand

 

  1. All researchers have determined that the frequency of violence is more important than the severity of terrorist
    1. True
    2. False

 

ANSWER:                            False

REFERENCES:                   Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES:  TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.

KEYWORDS:                       BLOOM’S: Understand

 

  1. Researchers have found no relationship between terrorism and
    1. True
    2. False

 

ANSWER:                            False

REFERENCES:                   Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES:  TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.

KEYWORDS:                       BLOOM’S: Understand

 

  1. The role of females in terrorist groups is decreasing around the
    1. True
    2. False

 

ANSWER:                            False

REFERENCES:                   Tactical Misunderstandings and Gender

LEARNING OBJECTIVES:  TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and religious groups.

KEYWORDS:                       BLOOM’S: Understand

 

  1. Women often receive combat or leadership positions in international terrorist
    1. True
    2. False

 

ANSWER:                            False

REFERENCES:                   Tactical Misunderstandings and Gender

LEARNING OBJECTIVES:  TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and religious groups.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Which of the following is not a tactic of terrorism as defined by Brian Jenkins?
    1. bombing
    2. larceny
    3. arson
    4. assault

 

ANSWER:                            b

REFERENCES:                   Tactics and Force Multipliers

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Which of the following tactics is most often employed by terrorists?
    1. bombing
    2. kidnapping
    3. hijacking
    4. arson

 

ANSWER:                            a

REFERENCES:                   Tactics and Force Multipliers

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. In 1848, anarchists talked about , meaning that the only way to communicate with the social order was to destroy
    1. propaganda by the deed
    2. media propaganda
    3. public awareness campaigns
    4. the philosophy of the bomb

 

ANSWER:                            d

REFERENCES:                   Tactics and Force Multipliers

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Which type of explosive is designed to spread fuel in the air and then ignite it?
    1. Thermobaric bomb
    2. Double-sidedbomb
    3. Traditional bomb
    4. Radio-signaled bomb

 

ANSWER:                            a

REFERENCES:                   Tactics and Force Multipliers

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. In 2004, New Scientist reported that Middle Eastern terrorist groups were working on a two-stage military-style weapon called a(n) .
    1. IED
    2. mininuke
    3. drone
    4. dirty bomb

 

ANSWER:                            b

REFERENCES:                   Tactics and Force Multipliers

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Terrorists use __________________ to increase their attacking
    1. force multipliers
    2. tactics
    3. large memberships
    4. secrecy

 

ANSWER:                            a

REFERENCES:                   Tactics and Force Multipliers

LEARNING OBJECTIVES:  TERR.WHIT.17.05.02 – Define force multipliers.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Which of the following is NOT considered a force multiplier?
    1. Technology
    2. Media
    3. Military
    4. Religious fanaticism

 

ANSWER:                            c

REFERENCES:                   Tactics and Force Multipliers

LEARNING OBJECTIVES:  TERR.WHIT.17.05.02 – Define force multipliers.

KEYWORDS:                       BLOOM’S: Understand

 

  1. The National Conference of State Legislature defines as “the use of information technology by terrorists to promote a political ”
    1. narcoterrorism
    2. cyberterrorism
    3. domestic terrorism
    4. transnational terrorism

 

ANSWER:                            b

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1.                           refers to the use of computers to attack technological targets or physical attacks on computer
    1. Narcoterrorism
    2. Cyberterrorism
    3. Domestic terrorism
    4. Transnational terrorism

 

ANSWER:                            b

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Which of the following is NOT a target for cyberterrorism?
    1. Computers
    2. Freeways
    3. Computer networks
    4. Information storage and retrieval systems

 

ANSWER:                            b

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1.                 attacks are susceptible to
    1. Bacterial
    2. Chemical
    3. Viral
    4. Nuclear

 

ANSWER:                            a

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Remember

 

  1. There are four types of biological agents: (1) natural poisons, or toxins that occur without human modification; (2) viruses; (3) bacteria; and (4) .
    1. radiation
    2. plagues
    3. nerve gas
    4. plutonium

 

ANSWER:                            b

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Ebola virus is considered a .
    1. bacterial infection
    2. food borne illness
    3. radiological weapon
    4. hemorrhagic fever

 

ANSWER:                            d

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Understand

 

  1. What biological agent infected citizens through the mail in the wake of the attacks on September 11, 2001?
    1. Anthrax
    2. Smallpox
    3. Plague
    4. Botulism

 

ANSWER:                            a

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Anthrax is considered a .
    1. vermin
    2. virus
    3. bacteria
    4. chemical

 

ANSWER:                            c

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Remember

 

  1.                 enter the body through ingestion, respiration, or
    1. Blood agents
    2. Blistering agents
    3. Nerve agents
    4. Choking agents

 

ANSWER:                            c

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Most dirty-bomb scenarios are based on the premise that a agent will be used with a conventional
    1. bacterial
    2. viral
    3. chemical
    4. radiological

 

ANSWER:                            d

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Remember

 

  1.                 is considered a non-contagious bacterial
    1. Smallpox
    2. MRSA
    3. Hemorrhagic fever
    4. Anthrax

 

ANSWER:                            d

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Remember

 

  1. The United States has experienced notable biological attacks since
    1. zero
    2. one
    3. two
    4. ten

 

ANSWER:                            c

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Nerve agents, blood agents, choking agents, and blistering agents are all examples of
    1. bacterial
    2. chemical
    3. viral
    4. radiological

 

ANSWER:                            b

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Remember

 

  1. According to the text, is the only group that has made an effort to obtain a nuclear
    1. LTTE Black Tigers
    2. Hezbollah
    3. Al Qaeda
    4. Kurdistan Workers Party

 

ANSWER:                            c

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. HEU stands for ________ .
    1. heavily elongated uranium
    2. high evolution utilities
    3. harsh environmental usage
    4. highly enriched uranium

 

ANSWER:                            d

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Congress mandates that all radioactive waste from America’s nuclear power plants be transported to a repository in what state?
    1. Nevada
    2. Arizona
    3. Alaska
    4. Colorado

 

ANSWER:                            a

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. The type of nuclear bomb used at Hiroshima employed .
    1. highly enriched uranium
    2. plutonium
    3. neptunium
    4. deuterium

 

ANSWER:                            a

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. As the world moves closer to a global economy, terrorists have found that striking increases the effectiveness of
    1. economic targets
    2. national targets
    3. symbolic targets
    4. security targets

 

ANSWER:                            a

REFERENCES:                   Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES:  TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Which of the following is NOT a target of transnational attack?
    1. Tourism
    2. Energy
    3. Transportation
    4. Consumerism

 

ANSWER:                            d

REFERENCES:                   Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES:  TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Bowyer Bell refers to ___________________ terrorism, which is a form of violence that occurs in Africa where arbitrary national boundaries have been drawn through ethnic and tribal divisions.
    1. endemic
    2. ethnic
    3. epidemic
    4. evident

 

ANSWER:                            a

REFERENCES:                   Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES:  TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.

KEYWORDS:                       BLOOM’S: Remember

 

  1. In 2003, Al Qaeda began targeting oil facilities in what country?
    1. Iran
    2. Saudi Arabia
    3. Iraq
    4. Kuwait

 

ANSWER:                            b

REFERENCES:                   Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES:  TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Daly says that the Taliban believes that the most effective way to destroy the Pakistan government is to attack

                               .

  1. political targets
  2. women and children
  3. economic targets
  4. allies of the Pakistani government

 

ANSWER:                            c

REFERENCES:                   Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES:  TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.

KEYWORDS:                       BLOOM’S: Remember

 

  1. After the September 11 attacks, the federal government immediately budgeted $ 8 billion to protect the industry.
    1. shipping
    2. aviation
    3. computer
    4. banking

 

ANSWER:                            b

REFERENCES:                   Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES:  TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.

KEYWORDS:                       BLOOM’S: Remember

 

  1. The in eastern Turkey conducted the least deadly attacks in the course of modern suicide bombing, killing an average of two people per
    1. Black Tigers
    2. Kurdistan Workers’ Party
    3. Tamil Hindus
    4. Russian Orthodox Christians

 

ANSWER:                            b

REFERENCES:                   Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES:  TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS:                       BLOOM’S: Remember

 

  1. According to the text, the have conducted more suicide bombings than any other
    1. Buddhist Sinhalese
    2. Sunni Kurds
    3. LTTE Black Tigers
    4. Hezbollah

 

ANSWER:                            c

REFERENCES:                   Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES:  TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS:                       BLOOM’S: Remember

 

  1. The major factor in deciding to employ suicide terrorists is the of the
    1. social structure and culture
    2. religiousbeliefs
    3. rational choice
    4. economic strength

 

ANSWER:                            a

REFERENCES:                   Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES:  TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS:                       BLOOM’S: Understand

 

  1. Rohan Gunaratna sees that suicide bombings have which three things in common?
    1. Secrecy, reconnaissance, and rehearsal
    2. Secrecy, religion, and political agendas
    3. Political agendas, chance of success, and secrecy
    4. Secrecy, rehearsal, and chance of success

 

ANSWER:                            a

REFERENCES:                   Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES:  TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Which of the following is not a major type of suicide attack?
    1. Suicide in warfare
    2. Suicide for a principle without killing others
    3. Suicide by cop
    4. Suicide terrorism

 

ANSWER:                            c

REFERENCES:                   Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES:  TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS:                       BLOOM’S: Remember

 

  1. More are targeted in suicide attacks than any other
    1. Catholics
    2. Muslims
    3. Jews
    4. atheists

 

ANSWER:                            b

REFERENCES:                   Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES:  TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS:                       BLOOM’S: Understand

 

  1. Margaret Gonzalez-Perez found that the role of women in terrorist groups is more closely determined by the

__________ orientation of an organization than its tactics.

  1. gender
  2. economic
  3. religious
  4. political

 

ANSWER:                            d

REFERENCES:                   Tactical Misunderstandings and Gender

LEARNING OBJECTIVES:  TERR.WHIT.17.05.11 – Explain the reasons researchers and the public have ignored women in terrorism.

KEYWORDS:                       BLOOM’S: Understand

 

  1. Criminologists frequently complain that are often ignored in the study of crime, unless the study focuses on
    1. children
    2. females
    3. males
    4. animals

 

ANSWER:                            b

REFERENCES:                   Tactical Misunderstandings and Gender

LEARNING OBJECTIVES:  TERR.WHIT.17.05.11 – Explain the reasons researchers and the public have ignored women in terrorism.

KEYWORDS:                       BLOOM’S: Understand

 

  1. The first known female suicide bomber (employed against an Israeli convoy) occurred in which decade? 1970s
  2. 1980s c. 1990s d. 1960s

ANSWER:                            b

REFERENCES:                   Tactical Misunderstandings and Gender

LEARNING OBJECTIVES:  TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and religious groups.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Gender impacts terrorist tactics and is often related mostly to the .
    1. social standing of the terrorist organization
    2. ideology of the terrorist organization
    3. economics of the terrorist organization
    4. media influence upon the terrorist organization

 

ANSWER:                            b

REFERENCES:                   Tactical Misunderstandings and Gender

LEARNING OBJECTIVES:  TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and religious groups.

KEYWORDS:                       BLOOM’S: Understand

 

Terrorists tend to increase their effectiveness in bombing by applying improved explosives technology to their weapons just as conventional military forces constantly improve the killing power of their munitions. In 2004, New   Scientist reported that Middle Eastern terrorist groups were working on a two-stage military-style weapon called a mininuke. This type of explosive is designed to spread fuel in the air and then ignite it. Known as a thermobaric bomb, it actually explodes the air in the blast area. One analyst speculated that an attack on a Tunisian synagogue in 2002 used this technology (Hambling, 2004).

  1. A thermobaric bomb is a force multiplier of what classification?
    1. Transnational support
    2. Technology
    3. Media coverage
    4. Religion

 

ANSWER:                            b

REFERENCES:                   Technology

PREFACE NAME:               Scientist

LEARNING OBJECTIVES:  TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.

KEYWORDS:                       BLOOM’S: Analyze

 

  1. In which targeted environment would you suspect a thermobaric bomb to be a terrorist’s most desirable weapon of choice?
    1. A small classroom
    2. An underground tunnel
    3. An open-air market
    4. Middle of the ocean

 

ANSWER:                            c

REFERENCES:                   Technology

PREFACE NAME:               Scientist

LEARNING OBJECTIVES:  TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.

KEYWORDS:                       BLOOM’S: Analyze

 

Brian Jenkins says that the six tactics of terrorism can be enhanced by force multipliers. In military terms, a force multiplier increases striking power without increasing the strength of a unit. He labels four kinds of force multipliers: Transnational support, Technology, Media coverage, and Religion. Terrorists routinely use force multipliers because they add to their aura. All political terrorists want to give the illusion that they can fight on a higher, more powerful level.

  1. A terrorist group receives a large sum of cash from a charity organization from another country that enables them to purchase This scenario is an example of which force multiplier?
    1. Transnational support
    2. Technology
    3. Media coverage
    4. Religion

 

ANSWER:                            a

REFERENCES:                   Tactics and Force Multipliers

PREFACE NAME:               Multiplier

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Analyze

 

  1. A terrorist leader sends coded messages to members of the organization during a televised interview with a local This scenario is an example of which force multiplier?
    1. Transnational support
    2. Technology
    3. Media coverage
    4. Religion

 

ANSWER:                            c

REFERENCES:                   Tactics and Force Multipliers

PREFACE NAME:               Multiplier

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Analyze

 

  1. Terrorists break through Homeland Security’s firewalls, and hijack and destroy several This scenario is an example of which force multiplier?
    1. Transnational support
    2. Technology
    3. Media coverage
    4. Religion

 

ANSWER:                            b

REFERENCES:                   Tactics and Force Multipliers

PREFACE NAME:               Multiplier

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Analyze

 

  1. A suicide bomber explodes in a local This scenario is an example of which force multiplier?
    1. Transnational support
    2. Technology
    3. Media coverage
    4. Religion

 

ANSWER:                            a

REFERENCES:                   Tactics and Force Multipliers

PREFACE NAME:               Multiplier

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Analyze

 

  1. Terrorist cell members receive instructions from within the shelter of a local This scenario is an example of which force multiplier?
    1. Transnational support
    2. Technology
    3. Media coverage
    4. Religion

 

ANSWER:                            a

REFERENCES:                   Tactics and Force Multipliers

PREFACE NAME:               Multiplier

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Analyze

 

  1. Terrorists activate a dirty bomb, which explodes within a military This scenario is an example of which force multiplier?
    1. Transnational support
    2. Technology
    3. Media coverage
    4. Religion

 

ANSWER:                            b

REFERENCES:                   Tactics and Force Multipliers

PREFACE NAME:               Multiplier

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Analyze

 

Terrorism by WMD presents a potential strategic scenario and includes biological agents, or biological weapons, which have been used for centuries. Modern arsenals contain bacterial weapons and viral weapons, with microbes cultured and refined, or weaponized, to increase their ability to kill. Because bacterial agents are susceptible to antibiotics, nations with bacterial weapons programs have created strains of bacterial microbes resistant to such drugs. Viral agents are produced in the same manner, and they are usually more powerful than bacterial agents. Biological agents are difficult to control but relatively easy to produce. Terrorists may find them to be effective weapons.

There are four types of biological agents: (1) natural poisons, or toxins that occur without human modification; (2) viruses; (3) bacteria; and (4) plagues. The Centers for Disease Control and Prevention (CDC) classifies the most threatening from the groups as smallpox, anthrax, plague, botulism, tularemia, and hemorrhagic fever.

  1. Smallpox is classified under which category?
    1. Toxin
    2. Virus
    3. Bacteria
    4. Plague

 

ANSWER:                            b

REFERENCES:                   Technology

PREFACE NAME:               WMD

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Analyze

 

  1. Hemorrhagic fever is classified under which category?
    1. Toxin
    2. Virus
    3. Bacteria
    4. Plague

 

ANSWER:                            b

REFERENCES:                   Technology

PREFACE NAME:               WMD

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Analyze

 

  1.                                               is a phrase used by anarchists around It means that social order can only be changed through violent upheaval.

ANSWER:                            Philosophy of the bomb

REFERENCES:                   Tactics and Force Multipliers

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Jenkins says that there are six tactics of terrorism: , arson, assault, kidnapping, bombing, and hostage taking.

ANSWER:                            hijacking

REFERENCES:                   Tactics and Force Multipliers

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1.                                            increase terrorists’ attacking power without increasing

ANSWER:                            Force multipliers

REFERENCES:                   Tactics and Force Multipliers

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Force multipliers include , transnational support, media coverage, and religious

ANSWER:                            technology

REFERENCES:                   Tactics and Force Multipliers

LEARNING OBJECTIVES:  TERR.WHIT.17.05.01 – Summarize the tactics of modern terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1.                 present an attractive weapon for terrorists because they are easy to control and the users can avoid the area they

ANSWER:                            Chemicals

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Nerve agents enter the body through ingestion, respiration, or

ANSWER:                            contact

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Remember

 

  1. When people are victims of a bacterial attack, may be an effective

ANSWER:                            antibiotics

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Remember

 

  1. There are four types of chemical agents: nerve agents, blood agents, choking agents, and

__________________________.

ANSWER:                            blistering agents

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Remember

 

  1. The most fearful scenario related to WMD involves a(n)

ANSWER:                            nuclear

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1.                                                      systems present a tempting economic target because they produce mass casualties with minimal

ANSWER:                            Transportation

REFERENCES:                   Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES:  TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.

KEYWORDS:                       BLOOM’S: Remember

 

  1. ____________________ increases the ability of terrorist groups to move and hide across a

ANSWER:                            Transnational support

REFERENCES:                   Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES:  TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Terrorism most frequently affects

ANSWER:                            international

REFERENCES:                   Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES:  TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.

KEYWORDS:                       BLOOM’S: Remember

 

  1. ____________________ terrorism is terrorism that exists inside a political

ANSWER:                            Endemic

REFERENCES:                   Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES:  TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Energy, shipping, and __________________________ industries are the most likely targets for a transnational

ANSWER:                            tourism

REFERENCES:                   Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES:  TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.

KEYWORDS:                       BLOOM’S: Remember

 

  1.                 suicide refers to the willingness of individuals to sacrifice their lives to benefit their primary reference group, such as a family, military unit, ethnic group, or

ANSWER:                            Altruistic

REFERENCES:                   Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES:  TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS:                       BLOOM’S: Remember

 

  1. The formal name of the terrorist group referred to as PKK is the

ANSWER:                            Kurdistan Workers’ Party

REFERENCES:                   Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES:  TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Pape takes the study of beyond a simple definition of how it happens and offers a

ANSWER:                            suicide terrorism

REFERENCES:                   Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES:  TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS:                       BLOOM’S: Remember

 

  1. The popular conception in Lebanon is that __________________________ causes suicide

ANSWER:                            militant Islamic theology

REFERENCES:                   Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES:  TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS:                       BLOOM’S: Remember

 

  1.                 have been involved in terrorist groups throughout the history of modern terrorism, but their role has been

ANSWER:                            Women

REFERENCES:                   Tactical Misunderstandings and Gender

LEARNING OBJECTIVES:  TERR.WHIT.17.05.11 – Explain the reasons researchers and the public have ignored women in terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. The Pakistani Taliban and ______________ formed female suicide cells after the first female suicide bomber struck in Pakistan in

ANSWER:                            al Qaeda

REFERENCES:                   Tactical Misunderstandings and Gender

LEARNING OBJECTIVES:  TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and religious groups.

KEYWORDS:                       BLOOM’S: Remember

 

  1. What is a force multiplier? List and explain force multipliers and how they are

ANSWER:                            • Force multipliers are a method of increasing striking power without increasing the number of combat troops in a military unit.

 

Terrorists have four force multipliers: (1) technology to enhance weapons or attacks on technological facilities, which allows a small group to launch a deadly attack; (2) transnational support which increases the ability of terrorist groups to move and hide; (3) media coverage, which can make a minor group appear to be politically important; and

(4) religious fanaticism, which transcends normative political and social boundaries, increasing violence and decreasing opportunities for negotiation.

  • Cyberterrorism and potential WMD attacks are examples of technological force

Media coverage and interpretation of terrorist events often serve as force multipliers – one incident can be converted into a “campaign” as electronic media scrambles to break the latest news.

  • The triborder region in South America demonstrates that transnational support networks multiply the striking power of
  • A new force multiplier has been the introduction of religious fanaticism in terrorist
  • The introduction of religion has introduced suicide attacks into the arsenals of

REFERENCES:                   Tactics and Force Multipliers

LEARNING OBJECTIVES:  TERR.WHIT.17.05.02 – Define force multipliers.

TERR.WHIT.17.05.03 – List and describe four force multipliers.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Describe cyberterrorism and its targets; why is it attractive to terrorists? How can cyberterrorism be utilized by terrorists?

ANSWER:                            Cyberterrorism refers to the use of computers to attack technological targets or physical attacks on computer networks; The National Conference of State Legislatures defines cyber-terrorism as the use of information technology by terrorists to promote a political agenda.

  • Terrorists differ from hackers, the council argues, because their purpose is to launch a systematic attack for political
  • Cyber-terrorism is an attractive low-risk
  • Computers allow terrorist groups to remain connected, providing a means for covert discussions and
  • Computer networks are also much less expensive and work intensive than the secretive infrastructures necessary to maintain terrorist
  • Modern Western society needs information and the flow of information to function, so cyber-terrorists threaten to interrupt or confuse that flow of
  • The most common tactic to date has been the defacement of
  • The targets for cyber-terrorism include: computers, computer networks, and information storage and retrieval
  • Computer virus is implanted in an enemy’s

“Logic bombs,” or snippets of program code that lie dormant for years until they are instructed to overwhelm a computer system.

  • Bogus computer chips sold to sabotage an enemy’s computer
  • Trojan horses can contain malevolent code that can destroy a system, and “back doors” in computer systems can allow terrorists to enter systems thought to be
  • Shahar believes that conventional attacks, such as overloading an electrical system, threaten computer

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.06 – Define the types of threats posed by technological terrorism.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Name and summarize the effects of the most threatening biological agents indicated by the Centers for Disease Control and Describe the two biological attacks on U.S. soil.

ANSWER:                            • The Centers for Disease Control and Prevention (CDC) classifies the most threatening agents as smallpox, anthrax, plague, botulism, tularemia, and hemorrhagic fever.

Smallpox is a deadly, contagious virus. Many people were vaccinated against smallpox in their childhood, but these old vaccinations are no longer effective against the disease.

  • Anthrax is a noncontagious bacterial infection, and plague is transmitted by
  • Botulism is a kind of food borne illness, and other bacteria can be modified to serve as
  • Hemorrhagic fevers are caused by One of the most widely known hemorrhagic fevers is the Ebola virus.
  • The first modern use of biological terrorism in the United States was engineered in 1984 by followers of a religious group in
  • The group spread bacteria in area salad bars in attempt to sicken voters during a local
  • Their intent was to elect their religious followers to local
  • Hundreds of people suffered food poisoning as a
  • The second attack involved anthrax and came in the wake of 9/11.
  • It began in Florida when two tabloid workers were infected by anthrax through the One of the victims died.
  • In the following days anthrax appeared again as NBC Nightly News received spores in the
  • Staffers at the office of former Senate majority leader Thomas Daschle noticed a white powdery substance in a
  • The powder contained anthrax spores, and although there were no fatalities, legislative offices were closed in Washington, C., for several weeks.

Mysteriously, other people died on the East Coast with no explanation of how the anthrax was spreading.

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Remember

 

  1. Describe the four types of chemical agents as well as the problems they When are chemical weapons most effective?

ANSWER:                            • There are four types of chemical agents: nerve agents, blood agents, choking agents, and blistering agents.

  • Nerve agents enter the body through ingestion, respiration, or
  • Blood and choking agents are usually absorbed through the respiratory
  • Blistering agents burn skin and internal tissue upon

Chemicals present an attractive weapon for terrorists because they are easy to control and, unlike biological weapons, the users can avoid the area they attack.

  • Chemical weapons present four
  • First, terrorists must have a delivery mechanism; that is, they need some way to spread the
  • The second problem is related to the Bombing is a popular tactic, but the heat of most explosives incinerates chemical agents.
  • It takes a lot of chemicals to present a
  • Finally, weather patterns, air, and water can neutralize a chemical
  • Chemical weapons are most effective when used in a confined space, and they are difficult to use effectively in large outdoor

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.07 – Explain the effects of biological, chemical, and radiological weapons.

KEYWORDS:                       BLOOM’S: Understand

 

  1. What are Michael Levi’s five goals for policy makers? How does Levi suggest the United States approach nuclear terrorism?

ANSWER:                            Support international efforts to stop the proliferation of nuclear weapons.

  • Address nuclear terrorism in conjunction with all other terrorist
  • Mandate nuclear threat analysis based on the most probable
  • Create a cooperative multiagency defense
  • Audit the defense system and reward
  • Levi suggests that the United States should approach nuclear terrorism in two
  • The first involves debunking popular myths about the
  • Policy makers and the public need to understand the basic aspects of nuclear security and must realize that it is never 100%
  • Fear should be
  • Levi believes it is more logical to look at several realistic scenarios and aim preventive measures at high probability
  • It is not enough to limit the focus on nuclear terrorism – Levi argues for a comprehensive approach to a terrorist group and all its activities as this provides a better threat analysis than limited attention to nuclear
  • The second response is to revamp defense
  • Protection against any form of terrorism does not involve a single agency working against a single
  • Defense involves a multitude of agencies and organizations at all levels of government and liaison with private
  • Levi argues that the current bureaucracy does not provide protection because agencies protect turf, they do not share information, and administration is confused and
  • Oversight of defense systems needs to be clarified and streamlined, and agency managers should be routinely evaluated on the ability to work with other agencies and to share

REFERENCES:                   Technology

LEARNING OBJECTIVES:  TERR.WHIT.17.05.08 – Characterize the possibility and possible outcomes of nuclear terrorism.

KEYWORDS:                       BLOOM’S: Analyze

 

  1. How does oil in the Niger Delta represent a different opportunity for economic attack?

ANSWER:                            • Oil in the Niger Delta represents a different opportunity for economic attack as it simultaneously funds terrorists and other violent groups while serving as a target for terrorism.

  • Dilapidated storage facilities and pipelines have become an ecological disaster for the impoverished local
  • The result is an environment that encourages sub-national violence and that might serve as a base for international
  • The energy environment in Africa represents an interesting
  • If poverty, endemic terrorism, and criminalized politics are not addressed by the industrial world, areas like the Niger Delta will evolve in two
  • They will become the base for the emergence of new international terrorist groups, providing excellent resources for training and eluding
  • At the same time, the energy resources in the delta provide a target-rich environment for

REFERENCES:                   Economic Targeting and Transnational Attacks

LEARNING OBJECTIVES:  TERR.WHIT.17.05.09 – Summarize transnational economic targeting in the tourist, energy, and transportation industries.

KEYWORDS:                       BLOOM’S: Analyze

 

  1. Explain Pape’s theory of suicide

ANSWER:                            He believes three factors must be in place before a suicide terror campaign can take place. First, a nationalistic or ethnic group must be resisting the occupation of a foreign power. Second, the foreign power must have a democratic government whose voters will not routinely allow the indiscriminate slaughter and total repression of the people in the occupied area. Finally, there must be a difference in the religions of the occupying power and the people living under occupation. This is a key point in the theory. Such terrorism does not happen when the occupied and occupier share a single religion; it is caused by differences between the two religions.

REFERENCES:                   Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES:  TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS:                       BLOOM’S: Understand

 

  1. Explain Domenico Tosini’s beliefs regarding suicide, religion, and

ANSWER:                            • Tosini believes the link between suicide and religion has been disproved given that secular terrorist groups have employed the tactic.

  • Tosini believes that rational choice and religion are secondary factors in suicide
  • The major factor is the social structure and culture of the group engaged in suicide
  • Groups take actions inside social structures based on their understanding of reality – this can create the group dynamics that lead to suicide

 

  • The dynamic agents involved in a suicide bombing are the armed terrorist group, the group’s supporters, and the

 

  • These three entities operate in a social network where decisions are made based on the interpretations of
  • The decision to engage in suicide bombing is based on the interactions of terrorists, supporters, and attackers within a surrounding social
  • Moving beyond rational choice, Tosini argues that the social climate must readily accept suicide
  • Supporters of a terrorist group have to embrace the idea, and create social rewards for bombers and their
  • Beyond this, the entire community must accept violence as a normative response to social grievances and believe that suicide bombing is an acceptable expression of
  • Supporting groups need material and symbolic rewards, and attackers must have a deep attachment to idealized representations of their

When altruism enters the equation, it produces culture of martyrdom and this in turn, combines with two common military approaches to war – dehumanization and depersonalization of enemies.

  • Tosini argues that suicide terrorism develops when a culture accepts it as an expression of altruistic martyrdom and terrorist groups with the culture embrace the
  • Suicide bombing takes place through a social process that endorses self- sacrifice as a legitimate expression of normal

REFERENCES:                   Suicide Attacks: Conflicting Opinions

LEARNING OBJECTIVES:  TERR.WHIT.17.05.10 – Summarize theories of suicide bombing.

KEYWORDS:                       BLOOM’S: Understand

 

  1. What is Laura Sjober’s view of the scholarly literature that covers women and terrorism? Do you agree with Sjober’s view that the field would be enriched through feminist perspectives? Why or why not?

ANSWER:                            • Studies of women in terrorism are generally ignored, and when females are discussed it is in gendered terms.

  • They are not “terrorists,” they are “women involved in ”
  • There are exceptions, but most scholars and analysts conclude that women play some type of nebulous role in
  • They cannot define the role, and they do not seem to care to do
  • Media presentations follow the same track – women are neither significant nor worthy of
  • Sjoberg vehemently disagrees with such
  • Women do have a special place in terrorism; women are terrorists just like men who do the same
  • There are terrorists who happen to be women, and they have been around for quite some
  • There is also no feminist perspective of terrorism; there are feminists who study terrorism in a variety of

Sjoberg says that scholars and other researchers are reluctant to study political and criminal violence among women because it violates idealized notions of womanhood.

  • Their behavior should be studied from a variety of feminist perspectives, Sjoberg Such literature would enrich the field.
  • Views will

REFERENCES:                   Tactical Misunderstandings and Gender

LEARNING OBJECTIVES:  TERR.WHIT.17.05.11 – Explain the reasons researchers and the public have ignored women in terrorism.

KEYWORDS:                       BLOOM’S: Understand

 

  1. Discuss why Margaret Gonzalez-Perez states that women are more attracted to domestic terrorist organizations than international

ANSWER:                            Domestic organizations are focused on revolution and social change –

  • women are attracted to such groups because they have a chance to redefine their roles, and males and females welcome them since they want the same

change.

 

Some groups have a feminist agenda.

  • Women have opportunities for leadership in revolutionary

International terrorists resist outside forces such as capitalism and imperialism–they try to defend a traditional culture that limits the role of women.

  • Women in domestic groups gravitate toward combat and
  • Women in international groups are given more limited roles – international terrorists tend to employ women as supporters, sympathizers, and spies, seldom receiving combat or leadership
  • This pattern remains constant even in social systems that emphasize male
  • For example, it is thought that the machismo influence in Central and South America would blunt female leadership and combat roles, but the opposite is
  • Most Central and South American groups have a left-wing revolutionary
  • Women move into active roles because the groups are seeking to restructure their culture and political

Every geographical area produced a common trend; domestic groups emphasized the role of women even when they have no stated feminist agenda.

REFERENCES:                   Tactical Misunderstandings and Gender

LEARNING OBJECTIVES:  TERR.WHIT.17.05.12 – Describe the roles women play in nationalistic, ideological, and religious groups.

KEYWORDS:                       BLOOM’S: Understand

Additional information

Add Review

Your email address will not be published. Required fields are marked *