The primary goal of this treaty is to prevent the spread of these types of powerful weapons.
What are nuclear weapons?
This term refers to a person who uses computers to gain unauthorized access to data or disrupt systems.
What is a hacker?
This is the number of planes hijacked during the 9/11 attacks.
What is four?
This is the general definition of terrorism: the use of violence against these people to achieve political goals.
Who are civilians?
This is the primary tool used by modern terrorist groups to spread propaganda and recruit members globally.
What is the Internet (or Social Media)?
This international agency, based in Vienna, is responsible for inspecting nuclear facilities to ensure compliance with the treaty.
What is the IAEA (International Atomic Energy Agency)?
This is the use of computer technology to disrupt the activities of a state or organization, especially for military purposes.
What is cyber warfare?
This terrorist group was responsible for planning and carrying out the 9/11 attacks.
What is al-Qaeda?
This term refers to terrorism that is funded or supported by a national government.
What is state-sponsored terrorism?
This extremist group rose to power in Iraq and Syria, declaring a "caliphate" in 2014.
What is ISIS (or ISIL/Daesh)?
This country is the only one to have officially withdrawn from the treaty after previously joining it.
What is North Korea?
This famous 2010 "worm" was designed to sabotage Iran’s nuclear program by destroying its centrifuges.
What is Stuxnet?
He was the leader of al-Qaeda and the mastermind behind the 9/11 attacks.
Who was Osama bin Laden?
This was the main goal of many 20th-century terrorist groups: gaining this for their specific ethnic or national group.
What is independence (or self-determination)?
These types of countries, which lack a strong central government, often become breeding grounds for terrorist groups.
What are "failed states"?
These are the two main "pillars" of the treaty besides non-proliferation: disarmament and the right to use nuclear energy for this purpose.
What is peaceful (or civilian) use?
This type of cyberattack floods a network with traffic to make it crash and unavailable to users.
What is a DDoS (Distributed Denial of Service) attack?
Following the attacks, the United States launched an invasion of this country to hunt for bin Laden.
What is Afghanistan?
This 1995 domestic terrorist attack in the U.S. destroyed a federal building and killed 168 people.
What is the Oklahoma City bombing?
This Nigerian terrorist group, whose name means "Western education is forbidden," is known for kidnapping schoolgirls.
What is Boko Haram?
The treaty officially recognizes this many "nuclear-weapon states" who had tested weapons before 1967.
What is five?
This term describes the digital "theft" of intellectual property or government secrets via the internet.
What is cyber espionage?
This cabinet-level department was created by the U.S. government in direct response to the 9/11 attacks to protect the nation.
What is the Department of Homeland Security?
This term describes individuals who commit acts of terrorism alone, without direct orders from a larger group.
What are lone wolves?
Terrorist groups often use this "asymmetric" style of combat, involving ambushes and sabotage rather than open battlefield warfare.
What is guerrilla warfare?