Deck 6: Terrorism and Organized Crime
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/62
Play
Full screen (f)
Deck 6: Terrorism and Organized Crime
1
An early evaluation of criminal gangs in New York determined that groups coming together for the sole purpose of committing criminal activity didn't last long if they lacked what?
A) flexible rules and regulations
B) competition
C) money
D) ethnic solidarity
A) flexible rules and regulations
B) competition
C) money
D) ethnic solidarity
D
2
Which of the following federal agencies and offices holds the database of information on potential terrorists and people suspected of narcotics trafficking or other law enforcement violations?
A) Department of State-Consular Lookout and Support System
B) Department of State-TIPOFF Database
C) Federal Bureau of Investigation-Violent Gang and Terrorist Organization File
D) Immigration and Customs Enforcement-Border Inspection System
A) Department of State-Consular Lookout and Support System
B) Department of State-TIPOFF Database
C) Federal Bureau of Investigation-Violent Gang and Terrorist Organization File
D) Immigration and Customs Enforcement-Border Inspection System
D
3
Which of the following cyberterrorist attacks was employed in Operation Desert Storm?
A) physical attack
B) computer network attack
C) electronic attack
D) electromagnetic attack
A) physical attack
B) computer network attack
C) electronic attack
D) electromagnetic attack
A
4
Which of the following factors plays a role in the solidification of norms and expectations of the members of an organized crime group?
A) culture and tradition
B) earlier affiliations
C) economy or financial status
D) educational background
A) culture and tradition
B) earlier affiliations
C) economy or financial status
D) educational background
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
5
Which social network has become a popular site for online communities of al Qaeda sympathizers?
A) Facebook
B) MySpace
C) Tumbler
D) Orkut
A) Facebook
B) MySpace
C) Tumbler
D) Orkut
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following groups serve as the basis of the formation of organized crime groups?
A) religious fanatics
B) criminal gangs
C) social activists
D) national terrorists
A) religious fanatics
B) criminal gangs
C) social activists
D) national terrorists
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following was NOT a factor that made Estonia particularly vulnerable to a cyberattack in 2007?
A) Most of the nation's banking transactions and parliamentary elections are affected through the Internet.
B) Main media outlets could be shut down, effectively isolating residents and preventing them from appealing to a global audience.
C) The nation's nuclear facilities were run on a Windows operating system that was uniquely vulnerable to Stuxnet.
D) The country has an extensive network of free Wi-Fi.
A) Most of the nation's banking transactions and parliamentary elections are affected through the Internet.
B) Main media outlets could be shut down, effectively isolating residents and preventing them from appealing to a global audience.
C) The nation's nuclear facilities were run on a Windows operating system that was uniquely vulnerable to Stuxnet.
D) The country has an extensive network of free Wi-Fi.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is an example of monopolization by an organized crime group?
A) the trade and commerce in Madrid
B) the garbage industry in New York
C) the mass media industry in Beijing
D) the food businesses in Rome
A) the trade and commerce in Madrid
B) the garbage industry in New York
C) the mass media industry in Beijing
D) the food businesses in Rome
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
9
What type of terrorism is exemplified by the Irish Republican Army and Euzkadi Ta Askatasuna?
A) religious terrorism
B) political-social terrorism
C) environmental terrorism
D) nationalist terrorism
A) religious terrorism
B) political-social terrorism
C) environmental terrorism
D) nationalist terrorism
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
10
Who among the following define(s) terrorism as an attempt to communicate messages through the use of orchestrated violence?
A) Schmid and Jongman
B) UN Resolution Language
C) Tsfati and Weimann
D) League of Nations Convention
A) Schmid and Jongman
B) UN Resolution Language
C) Tsfati and Weimann
D) League of Nations Convention
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following refers to the illegal duplication of credit cards achieved by running the card through a reader that captures information stored in the magnetic strip on the back?
A) skimming
B) hacking
C) spamming
D) carding
A) skimming
B) hacking
C) spamming
D) carding
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following attacks involve directing conventional weapons against a computer facility for its transmission lines?
A) electronic attacks
B) electromagnetic attacks
C) physical attacks
D) computer network attacks
A) electronic attacks
B) electromagnetic attacks
C) physical attacks
D) computer network attacks
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
13
What did a Western intelligence service seize from Kamel Daoudi, an al Qaeda computer engineer, during his arrest?
A) a codebook to decrypt e-mails and telephone conversations
B) a pile of hard copies of Google maps used by al Qaeda
C) a codebook for making bombs and bulletproof vests sent as ebooks
D) a list of the names foreign officials targeted by al Qaeda
A) a codebook to decrypt e-mails and telephone conversations
B) a pile of hard copies of Google maps used by al Qaeda
C) a codebook for making bombs and bulletproof vests sent as ebooks
D) a list of the names foreign officials targeted by al Qaeda
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
14
In which of the following points does a strong dissimilarity between terrorism and organized crime manifest?
A) rules and regulation
B) beliefs and motivation
C) adaptability and resilience
D) punishments for noncompliance
A) rules and regulation
B) beliefs and motivation
C) adaptability and resilience
D) punishments for noncompliance
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following has been described as a "military-grade cybermissile"?
A) Estonia
B) Orkut
C) Skype
D) Stuxnet
A) Estonia
B) Orkut
C) Skype
D) Stuxnet
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following facilitated Muhammad Siddique Khan's coordination of the 2005 London bombings?
A) online training videos
B) electronic dead drops
C) satellite imaging
D) online social networking sites
A) online training videos
B) electronic dead drops
C) satellite imaging
D) online social networking sites
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following types of terrorists often openly embrace and promote human suffering, and glorify violence as divine ordination?
A) political terrorists
B) environmental terrorists
C) national terrorists
D) religious terrorists
A) political terrorists
B) environmental terrorists
C) national terrorists
D) religious terrorists
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
18
What was the basis of the wide acceptance of tyrannicide during the Age of Absolutism?
A) the writings of Juan de Mariana
B) the ideology of conservation of natural resources
C) the staging of anti-royalty plays in public theaters
D) the assassination of Julius Caesar
A) the writings of Juan de Mariana
B) the ideology of conservation of natural resources
C) the staging of anti-royalty plays in public theaters
D) the assassination of Julius Caesar
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following types of justification is employed by terrorists who superficially proclaim an abhorrence of violence and stress the urgency for a diplomatic settlement?
A) "no choice" justifications
B) peaceful, nonviolent rhetoric
C) demonizing and delegitimization justifications
D) emphasis of weakness
A) "no choice" justifications
B) peaceful, nonviolent rhetoric
C) demonizing and delegitimization justifications
D) emphasis of weakness
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
20
What is the nature of the criminal activity undertaken by groups such as Darkprofits and Shadowcrew?
A) selling or sharing information about stolen credit cards and bank account numbers
B) smuggling of humans across international borders
C) printing counterfeit denominations of American currency
D) distribution of pornographic films
A) selling or sharing information about stolen credit cards and bank account numbers
B) smuggling of humans across international borders
C) printing counterfeit denominations of American currency
D) distribution of pornographic films
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
21
Theorists argue that terrorism may be characterized as theater in which the audience is far more important than the actors.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
22
________ is defined as the introduction of illegally obtained funds into the legitimate financial marketplace.
A) Extortion
B) Currency counterfeiting
C) Fencing
D) Money laundering
A) Extortion
B) Currency counterfeiting
C) Fencing
D) Money laundering
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
23
Directing conventional weapons against a computer facility is an example of a physical attack.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
24
According to Tsfati and Weimann, a resurgence in terrorist rhetoric in Europe has led to a marked increase in both the development of European-based terrorist groups and their presence on the Web.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following cybercrimes, traditionally involving real estate transactions and straw purchases, now uses contemporary methods like electronic layering, international commodities, and online businesses?
A) fraud
B) money laundering
C) gambling
D) counterfeiting of currency
A) fraud
B) money laundering
C) gambling
D) counterfeiting of currency
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following refers to scams designed to delude a victim into thinking that he or she had been singled out to be the beneficiary of millions of dollars being given away by a company or government agency?
A) skimming
B) pump and dump
C) carding
D) 4-1-9
A) skimming
B) pump and dump
C) carding
D) 4-1-9
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following, according to a recent report to Congress, has now surpassed international drug trafficking as a terrorist financing enterprise?
A) cargo heists
B) cybercrime
C) weapons manufacturing
D) pornography
A) cargo heists
B) cybercrime
C) weapons manufacturing
D) pornography
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
28
The Taliban forbids the use of modern innovations.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
29
A critical data threat involves the compromise of a critical computer system to alter, manipulate, or destroy critical data with the potential of death, destruction, and/or economic turmoil.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
30
The U.S.Border Patrol and the U.S.Customs Service are now under the large umbrella of the Department of State.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
31
Traditional methods of ATM/credit card fraud were largely successful due to the lack of computerized databases and lax security measures.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
32
The word "terror" comes from the Arabic term hashashin, which means "to arouse fear."
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
33
The Nigerian Advance Fee Scheme is known internationally as "4-1-9."
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
34
The UN Universal Declaration of Human Rights is a document which attempts to ensure equality for all and eradicate terrorist groups.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
35
The success of a terrorist's agenda largely depends upon the size of the audience selected.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
36
All organized crime groups began as criminal gangs.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
37
All of the following are similarities among terrorism and organized crime EXCEPT which?
A) Both have rules and regulations.
B) Both require absolute obedience.
C) Both have formal goals and objectives.
D) Both are politically motivated and economically driven.
A) Both have rules and regulations.
B) Both require absolute obedience.
C) Both have formal goals and objectives.
D) Both are politically motivated and economically driven.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
38
One drawback to the use of dead drops is that communications are not anonymous.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
39
Organized crime groups want to remain unrecognized and have no impact within their communities.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
40
Traditional methods of human smuggling involve unsecured border crossings via the use of private transportation.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
41
Explain the difference between the traditional and contemporary methods used by organized crime groups.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
42
Groups of individuals brought together through the Internet which commit nonviolent criminal acts facilitated by the exploitation of networked or interconnected systems are known as ________.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
43
The ________ Act requires all information gathered during a criminal investigation, related to foreign or counterintelligence, be shared with other federal agencies.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
44
________ attacks are those that involve malware, computer or network intrusion, or other cyberattacks on critical computer systems.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
45
The introduction of ________ has vastly expanded the potentiality of organized crime groups and enhanced their methods of operation.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
46
The Chicago Crime Commission's early definition of organized crime in the United States referred to it as ________ crime.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
47
Expound on the points where terrorism and organized crime meet and divert.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
48
The ________ of terror is less important than the emotional or psychological repercussions resulting from the act.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
49
Discuss the justifications used by terrorists to maximize ideological appeal.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
50
________ terrorism is often overlooked in discussions of the phenomenon, as there is a collective perception that they have limited impact and do not constitute a significant threat.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
51
The site of initial infection of ________ was identified as a USB port in Iran.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
52
Organized crime groups enhance their profitability through monopolization, which is possible through their use of violence and ________ racketeering.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
53
Terrorist groups are ideologically or politically motivated while organized crime groups are ________ driven.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
54
To profit from their various criminal schemes, organized crime groups transform commodities into cash, an activity known as ________.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
55
________ is a new type of fraud that uses account numbers and counterfeit identity documents to complete identity theft and defraud banks and retailers.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
56
The ________, formally known as the Senate Permanent Subcommittee on Investigations, helped to prove the existence of the Italian mafia as the international conspiracy trafficking narcotics in the United States.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
57
The practice of ________ to organizational leaders or elders furthers the interests of the organization in the form of political bribery or the support of criminal defense.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
58
A ________ is initiated through an unsolicited electronic communication in which the perpetrators claim to be members of the Nigerian government's unit designed to make restitution to victims of Nigerian scams.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
59
Based on the information presented in the chapter, evaluate the potential future of organized crime in the United States.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
60
Explain the different definitions of terrorism given and analyze which one is most accurate and applicable in today's situation.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
61
Match between columns
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
62
Match between columns
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck