Page contents

Police Operations Theory and Practice 6th Edition by Kären M. Hess – Test Bank

Instant delivery only

In Stock

$28.00

Add to Wishlist
Add to Wishlist
Compare
SKU:tb1001023

Police Operations Theory and Practice 6th Edition by Kären M. Hess – Test Bank

CHAPTER 9: TERRORISM: FROM HOMETOWN SECURITY TO HOMELAND SECURITY

MULTIPLE CHOICE

  1. A loose network of individuals scattered across the United States who believe that the original citizens of the United States were free from all government control and that the federal, state, and local governments today operate illegally are known as
a. the native populace.
b. original patriots.
c. the freedom fighters.
d. sovereign citizens.

ANS: D PTS: 1 REF: (p. 326)

OBJ: What domestic terrorist groups exist in the United States.

  1. Which of the following are common elements in definitions of terrorism?
a. systematic use of physical violence
b. the attempt to cause religious, political, or social change
c. violence only against combatants
d. both systematic use of physical violence and the attempt to cause religious, political, or social change
e. systematic use of physical violence; the attempt to cause religious, political, or social change; and violence only against combatants

ANS: D PTS: 1 REF: (p. 321)

OBJ: What most definitions of terrorism include.

  1. An element of terrorism is that
a. it is criminal in nature.
b. targets are typically random.
c. terrorist actions are seldom aggressive or violent.
d. all of the other choices.
e. none of the other choices.

ANS: A PTS: 1 REF: (p. 321)

OBJ: What most definitions of terrorism include.

  1. Which of the following groups is considered to be a terrorist group in the United States?
a. White supremacists
b. Black supremacists
c. the militia movement
d. environmental extremists
e. all of the other choices

ANS: E PTS: 1 REF: (p. 325)

OBJ: What domestic terrorist groups exist in the United States.

  1. Going from most likely to least likely, select the order in which the following weapons of mass destruction are likely to be used in a terrorist attack.
a. incendiary devices and explosives, chemical devices, biological weapons
b. chemical devices, biological weapons, incendiary devices and explosives
c. biological weapons, chemical devices, incendiary devices and explosives
d. biological weapons, incendiary devices and explosives, chemical devices
e. chemical devices, incendiary devices and explosives, biological weapons

ANS: A PTS: 1 REF: (p. 331)

OBJ: What methods terrorists might use.

  1. Biological weapons of mass destruction (WMDs) include all of the following except
a. smallpox.
b. anthrax.
c. sarin nerve gas.
d. botulism.
e. Ebola virus.

ANS: C PTS: 1 REF: (p. 331)

OBJ: What methods terrorists might use.

  1. Chemical agents
a. are more lethal than biological agents.
b. include nerve agents, blood agents, choking agents, and blistering agents.
c. are more difficult to control than biological agents.
d. include anthrax, botulism, and smallpox.
e. are unlikely to be used because the raw materials are difficult to obtain and use.

ANS: B PTS: 1 REF: (p. 332)

OBJ: What methods terrorists might use.

  1. A dual threat to law enforcement means
a. officers must keep a watchful eye on international terrorism as well as domestic terrorism.
b. there are sleeper cells within America.
c. officers must keep a watchful eye on anti–law enforcement groups and domestic terrorism.
d. terrorists may use biological and chemical agents against key targets.

ANS: A PTS: 1 REF: (p. 324)

OBJ: How the FBI classifies terrorist acts.

  1. A dirty bomb
a. is a low-yield nuclear device.
b. will cause primary destruction by radiation.
c. would cause far less destruction than the attacks of September 11, 2001.
d. is a cyberbomb that could be placed in selected informational systems.
e. and nuclear terrorism are less likely today than during the Cold War.

ANS: A PTS: 1 REF: (p. 332)

OBJ: What methods terrorists might use.

  1. The USA PATRIOT Act
a. grants police unprecedented ability to search, seize, detain, and eavesdrop.
b. facilitates information sharing.
c. establishes new punishments for possessing biological weapons.
d. makes it a federal crime to commit an act of terrorism against a mass transit system.
e. all of the other choices.

ANS: E PTS: 1 REF: (pp. 335–336)

OBJ: How the USA PATRIOT Act enhances counterterrorism efforts by the United States.

  1. Weapons of mass destruction
a. are the result of recent technology.
b. have been in use since World War II.
c. have been in use since the 1300s.
d. are difficult to obtain because the means and recipes for their development are not well known.
e. both are the result of recent technology and have been in use since World War II.

ANS: C PTS: 1 REF: (p. 331)

OBJ: What methods terrorists might use.

  1. In July 2010, the _____________ launched a national “If You See Something, Say SomethingTM” public awareness campaign.
a. Federal Bureau of Investigation (FBI)
b. Department of Homeland Security (DHS)
c. American Civil Liberties Union (ACLU)
d. Federal Emergency Management Agency (FEMA)

ANS: B PTS: 1 REF: (p. 356)

OBJ: What the lead federal agencies are in responding to acts of terrorism and handling consequence management.

  1. The USA PATRIOT Act gives police the ability to do all of the following in their pursuit of terrorists except
a. search.
b. seize.
c. torture.
d. detain.
e. eavesdrop.

ANS: C PTS: 1 REF: (p. 335)

OBJ: How the USA PATRIOT Act enhances counterterrorism efforts by the United States.

  1. The lead agency for consequence management (after an attack) is
a. FEMA.
b. the FOP.
c. the CIA.
d. the FBI.
e. the USSS.

ANS: A PTS: 1 REF: (p. 335)

OBJ: What the lead federal agencies are in responding to acts of terrorism and handling consequence management.

  1. All are motivations of terrorism except
a. political.
b. religious.
c. social policy.
d. all are motivations of terrorism.

ANS: D PTS: 1 REF: (p. 325)

OBJ: What motivates most terrorist attacks.

  1. The “Lackawanna Six” were part of
a. an al Qaeda cell.
b. a cyberterrorist group.
c. a bioterrorist group.
d. an antiabortion group.
e. a Black supremacist group.

ANS: A PTS: 1 REF: (p. 326)

OBJ: What methods terrorists might use.

  1. The first line of defense against terrorism is
a. federal law enforcement.
b. the United Nations.
c. the patrol officer in the field.
d. the U.S. military.
e. the state police.

ANS: C PTS: 1 REF: (p. 338)

OBJ: What the first line of defense against terrorism in the United States is.

  1. Suicide bombings result in approximately __________ percent of all terrorism-related deaths.
a. 6
b. 13.5
c. 32
d. 54.5
e. 27

ANS: B PTS: 1 REF: (p. 328)

OBJ: What methods terrorists might use.

  1. Savelli identifies all of the following crimes as being associated with terrorists except
a. mail theft.
b. coupon fraud.
c. prostitution.
d. identity theft.
e. money laundering.

ANS: C PTS: 1 REF: (p. 341)

OBJ: What methods terrorists might use.

  1. The FBI considers the number-one domestic threat to the United States to be
a. bioterrorism.
b. ecoterrorism.
c. narcoterrorism.
d. animal rights activists.

ANS: B PTS: 1 REF: (p. 327)

OBJ: What domestic terrorist groups exist in the United States.

  1. A war in which a much weaker opponent takes on a stronger opponent by refusing to confront the stronger opponent head on or to adhere to proscribed “rules of engagement” is called
a. terrorism.
b. jihad.
c. asymmetric.
d. liberal.

ANS: C PTS: 1 REF: (p. 328)

OBJ: What methods terrorists might use.

  1. The Law Enforcement Officer’s Safety Act gives off-duty as well as qualified retired police officers the right to
a. obtain search warrants.
b. stop suspected terrorists.
c. interrogate suspects.
d. carry concealed weapons in all 50 states.
e. conduct warrantless searches.

ANS: D PTS: 1 REF: (p. 349)

OBJ: What the Law Enforcement Officer’s Safety Act authorizes.

  1. In _________________, the Supreme Court ruled that a citizen detained in the United States as an enemy combatant must be afforded the opportunity to rebut such a designation.
a. Hamdi v. Rumsfeld
b. Hannity v. Colmes
c. Atta v. Ridge
d. Rasul v. Bush
e. bin Laden v. Powell

ANS: A PTS: 1 REF: (p. 354)

OBJ: What two concerns are associated with the current “war on terrorism.”

  1. Which of the following is not used by terrorists?
a. explosives
b. biological agents
c. chemical agents
d. arson
e. none of the other choices—all are methods used by terrorists

ANS: E PTS: 1 REF: (p. 328)

OBJ: What methods terrorists might use.

  1. A significant challenge to law enforcement is stopping the terrorists’ low-tech, lethal weapon of choice, the VBIED, or
a. suicide bomber.
b. sarin gas.
c. car bomb.
d. blistering agent.

ANS: C PTS: 1 REF: (p. 330)

OBJ: What methods terrorists might use.

TRUE/FALSE

  1. The FBI categorizes terrorism in the United States as either domestic or international.

ANS: T PTS: 1 REF: (p. 321)

OBJ: How the FBI classifies terrorist acts.

  1. Technology is not used by terrorists.

ANS: F PTS: 1 REF: (p. 328)

OBJ: What methods terrorists might use.

  1. Religious motivations for terrorism are seen in single-issue groups such as antiabortion groups, animal rights groups, and environmentalists.

ANS: F PTS: 1 REF: (p. 325)

OBJ: What motivates most terrorist attacks.

  1. Most terrorist acts result from frustration resulting from an inability to change things through acceptable, nonviolent means.

ANS: T PTS: 1 REF: (p. 325)

OBJ: What motivates most terrorist attacks.

  1. Most terrorist groups seek change through nonviolent means.

ANS: F PTS: 1 REF: (p. 325)

OBJ: What motivates most terrorist attacks.

  1. The Ku Klux Klan is not recognized as a terrorist organization.

ANS: F PTS: 1 REF: (p. 325)

OBJ: What domestic terrorist groups exist in the United States.

  1. The Army of God, a pro-life extremist group, has been involved in assassinations.

ANS: T PTS: 1 REF: (p. 327)

OBJ: What domestic terrorist groups exist in the United States.

  1. Theodore Kaczynski is known as the Unabomber.

ANS: T PTS: 1 REF: (p. 329)

OBJ: What domestic terrorist groups exist in the United States.

  1. Explosives, which are the weapons likely to have the greatest impact, are the weapons least likely to be used.

ANS: F PTS: 1 REF: (pp. 328–329)

OBJ: What methods terrorists might use.

  1. Suicide bombers believe that sacrificing themselves is a sure way to heaven.

ANS: T PTS: 1 REF: (p. 329)

OBJ: What methods terrorists might use.

  1. Bioterrorism is the most likely terrorist act to occur because it is the easiest.

ANS: F PTS: 1 REF: (p. 331)

OBJ: What methods terrorists might use.

  1. Potential terrorists are only male and have ties to foreign countries.

ANS: F PTS: 1 REF: (p. 330)

OBJ: What domestic terrorist groups exist in the United States.

  1. In October 2001, President George W. Bush signed Executive Order 13231, calling for federal agencies to reach out to state and local agencies.

ANS: T PTS: 1 REF: (p. 337)

OBJ: What federal office was established as a result of 9/11 and what its purpose is.

  1. The Federal Emergency Management Agency (FEMA) is the lead agency for responding to acts of domestic terrorism.

ANS: F PTS: 1 REF: (p. 335)

OBJ: What federal office was established as a result of 9/11 and what its purpose is.

  1. The USA PATRIOT Act increases the penalties for those who commit or support terrorist crimes.

ANS: T PTS: 1 REF: (p. 336)

OBJ: How the USA PATRIOT Act enhances counterterrorism efforts by the United States.

  1. Technological terrorism is not a threat.

ANS: F PTS: 1 REF: (p. 333)

OBJ: What methods terrorists might use.

  1. Three obstacles to intelligence effectiveness are technological, political, and ethical.

ANS: T PTS: 1 REF: (p. 342)

OBJ: What three obstacles to intelligence effectiveness are.

  1. Ecoterrorism is the use of computer network tools to shut down critical national infrastructures or to coerce or intimidate a government or civilian population.

ANS: F PTS: 1 REF: (p. 327)

OBJ: What methods terrorists might use.

  1. Law enforcement must balance the need to enhance security with the need to maintain freedom in the “war on terrorism.”

ANS: T PTS: 1 REF: (p. 354)

OBJ: What balance law enforcement must maintain in the “war on terrorism.”

  1. The sharing of intelligence information is rarely a problem in policing.

ANS: F PTS: 1 REF: (pp. 342–343)

OBJ: How the USA PATRIOT Act enhances counterterrorism efforts by the United States.

  1. Tools currently used in the war on drugs also are effective in combating terrorism.

ANS: T PTS: 1 REF: (p. 336)

OBJ: What methods terrorists might use.

  1. The key to combating terrorism lies with the local police and the intelligence they can provide to federal authorities.

ANS: T PTS: 1 REF: (p. 339)

OBJ: What the lead federal agencies are in responding to acts of terrorism and handling consequence management.

  1. Agriculture comprises the largest single sector in the U.S. economy, making agroterrorism a viable primary aspiration.

ANS: T PTS: 1 REF: (p. 331)

OBJ: What methods terrorists might use.

  1. Money laundering is not associated with terrorism.

ANS: F PTS: 1 REF: (p. 337)

OBJ: What methods terrorists might use.

  1. Due to the Law Enforcement Officer’s Safety Act, federal laws affecting possession of firearms will no longer apply to off-duty police officers.

ANS: F PTS: 1 REF: (p. 349)

OBJ: What the Law Enforcement Officer’s Safety Act authorizes.

  1. The USA PATRIOT Act is controversial.

ANS: T PTS: 1 REF: (p. 337)

OBJ: How the USA PATRIOT Act enhances counterterrorism efforts by the United States.

  1. One concern related to the “war on terrorism” is that civil liberties may be jeopardized.

ANS: T PTS: 1 REF: (p. 354)

OBJ: What two concerns are associated with the current “war on terrorism.”

  1. Homeland security encompasses far more than the nation’s collective efforts to prevent and respond to terrorist acts.

ANS: T PTS: 1 REF: (p. 321)

OBJ: What federal office was established as a result of 9/11 and what its purpose is.

  1. Criminals and terrorists are the same, as they continue to violate the law.

ANS: F PTS: 1 REF: (p. 341)

OBJ: What methods terrorists might use.

  1. There are three stages in a terrorist attack.

ANS: T PTS: 1 REF: (p. 340)

OBJ: What methods terrorists might use.

SHORT ANSWER

  1. On October 26, 2001, President George W. Bush signed into law the ____________________, which improved the nation’s counterterrorism efforts.

ANS:

USA PATRIOT Act

PTS: 1 REF: (p. 335)

OBJ: How the USA PATRIOT Act enhances counterterrorism efforts by the United States.

  1. The belief that the media’s coverage of terrorism inspires more terrorism is called the _________________ effect.

ANS:

contagion

PTS: 1 REF: (p. 353) OBJ: What motivates most terrorist attacks.

  1. _________________ is the unlawful use of force and violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.

ANS:

Terrorism

PTS: 1 REF: (p. 321) OBJ: What most definitions of terrorism include.

  1. __________________ terrorism is foreign-based or directed by countries or groups outside the United States.

ANS:

International

PTS: 1 REF: (pp. 322–323)

OBJ: What domestic terrorist groups exist in the United States.

  1. __________________ terrorism is based within the United States.

ANS:

Domestic

PTS: 1 REF: (pp. 321–322)

OBJ: What domestic terrorist groups exist in the United States.

  1. _______________ seeks to stop companies, institutions, organizations, and governments from damaging or altering the environment.

ANS:

Ecoterrorism

PTS: 1 REF: (p. 327) OBJ: What methods terrorists might use.

  1. A new kind of war that will be fought in shadows, in which the adversary will continue to target the weaker opponent and refuse to adhere to proscribed “rules of engagement,” is called a/an __________________ war.

ANS:

asymmetric

PTS: 1 REF: (p. 328) OBJ: What methods terrorists might use.

  1. Anthrax, botulism, and smallpox are weapons of mass destruction associated with ___________________.

ANS:

bioterrorism

PTS: 1 REF: (p. 331) OBJ: What methods terrorists might use.

  1. The exploitation of or attack on information systems is referred to as ________________.

ANS:

cyberterrorism

PTS: 1 REF: (p. 333) OBJ: What methods terrorists might use.

  1. A low-yield nuclear device or radiological dispersion device (RDD) is also called a _____________ ___________.

ANS:

dirty bomb

PTS: 1 REF: (p. 332) OBJ: What methods terrorists might use.

  1. As a result of 9/11, the _________________ ___ ______________ _______________ was established, reorganizing the departments of the federal government.

ANS:

Department of Homeland Security

PTS: 1 REF: (p. 334)

OBJ: What federal office was established as a result of 9/11 and what its purpose is.

  1. ________ ________ are designed to share information between federal, state, and local law enforcement agencies.

ANS:

Fusion centers

PTS: 1 REF: (p. 343)

OBJ: What the first line of defense against terrorism in the United States is.

  1. The technological issue that most challenges state and local participation is _____________________, the ability to exchange information seamlessly.

ANS:

interoperability

PTS: 1 REF: (p. 342)

OBJ: What three obstacles to intelligence effectiveness are.

  1. A/an ____________________ is a holy war.

ANS:

jihad

PTS: 1 REF: (p. 323) OBJ: What methods terrorists might use.

  1. _______________________, which means avoiding conflict, can be deployed with declassified and confidential investigations.

ANS:

Deconfliction

PTS: 1 REF: (p. 343)

OBJ: What three obstacles to intelligence effectiveness are.

Reviews

There are no reviews yet.

Write a review

Your email address will not be published. Required fields are marked *

Product has been added to your cart