Nuclear Proliferation Treaty
Cyberwarfare
9/11
Terrorism
Growth of Terrorist Groups
100

What year did the Nuclear Proliferation Treaty go into effect?

1970

100

What is cyber warfare?

Actions by a nation-state or its agents to penetrate another nation states computers or network for the purposes of causing damage or disruption.

100

What are the 2 targets that were struck by airplanes in New York City on September 11, 2001?

The North and South towers of the World Trade Center.

100

What is terrorism?

The unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims.

100

How do terrorist groups expand?

Terrorist groups expand by leveraging digital propaganda for global recruitment, exploiting physical security vacuums to establish safe havens, and utilizing encrypted technology to radicalize individuals remotely.

200

What are 3 of the 5 original nuclear-weapon states recognized by the NPT?

The United states, Russia (soviet union), and the UK.

200

What is an example of cyberattack used in cyberwarfar?

Disrupted denial of service attack which aimed to overwhelm a target system with traffic, making it unavailable to legitimate users.

200

What other two locations were struck by hijacked planes on 9/11?

Arlington Virginia (The pentagon) and Stonycreek Township, Pennsylvania (a field; intended target was U.S. capitol or the White House)

200

What are some common motivations behind terrorist acts?

Political, religious, or ideological goals, seeking regime change, inciting fear and chaos, and/or gaining publicity for a cause.

200

What are terrorist groups?

Terrorist groups are non-state actors that use violence, or the threat of it, to achieve political, ideological, or religious goals, often targeting civilians to create fear and leverage.

300

What are the 3 main pillars of the NPT?

Non-proliferation, disarmament, and peaceful use of nuclear energy.

300

What are the potential targets of cyber warfare?

Critical infrastructure, government, databases, military command and control systems, and public communication networks.

300

What failures and intelligent insecurity were revealed by the 9/11 attacks?

A lack of communication and coordination between intelligence agencies.

300

Describe the difference between domestic and international terrorism.

Domestic terrorism occurs within the borders of a country without foreign direction, international terrorism involves violent acts that cross national borders or are directed by groups outside the country.

300

What targets do terrorist groups usually go after?

Terrorist groups often pick targets that will provide maximum publicity.

400

What is the difference of nuclear weapon states and non-nuclear weapon states?

Nuclear weapon states are those that manufactured and exploded a nuclear weapon or other nuclear explosive device before January 1, 1967. Non-nuclear weapon states are all other states party to the treaty that have agreed not to acquire nuclear weapons.

400

What is the difference between cybercrime and cyberwarfare?

Cyber crime is typically motivated by financial gain or personal benefit for individuals or criminal groups. Cyber warfare is conducted by a nation state with the primary objective of achieving strategic or military goals against another state..

400

Discuss the reason in which the 9/11 attacks have influenced US foreign policy and domestic surveillance practices.


U.S. foreign policy shifted to focus heavily on counterterrorism, leading to military interventions in Afghanistan and Iraq. The US adopted more unilateralist approach in some cases, emphasizing military strength.

400

Discuss the role of technology and the internet in modern terrorism.

Terrorist ground use the internet for propaganda, recruitment, fundraising and secure communication. Social media platforms enable them to spread their ideologies, attract new members, coordinate attacks, and evade detection by law enforcement.

400

How do terrorist groups prepare?

While high-profile cases are complex, research shows many terrorists live near their targets and spend months or years planning, which can potentially be detected by local law enforcement.

500

What international organization is primarily responsible for verifying compliance with the NPT?

The international atomic energy agency.

500

What are the main objectives state might pursue through cyber warfare?

Disrupting an adversary’s critical infrastructure, undermining their economy, interfering with their government operations, damaging their military capabilities, spreading propaganda, or disinformation, and gaining intelligence.

500

Analyze the long-term social, economic and political consequences of 9/11.

9/11 led to increased Islamophobia and scrutiny of immigrant communities, alongside a surge in patriotism and national unity.

500

Analyze the effectiveness of different counterterrorism strategies.

Military intervention can degrade terrorist organizations but often leads to civilian casualties and instability.

500

What is the ideology for terrorist groups?

Groups may fall into four broad categories: left-wing, right-wing, single-issue, and international.

M
e
n
u