If some other nation had clandestine organizations working US soil to capture or eliminate citizens or legal foreign nations on belief they were criminals or security threats, would the US view this organization as criminal or terrorist?

1 Answer

Answer :

answer:First, this isn’t an ‘IF’ question. It almost assuredly is truly happening today. Second, I think that the underlying question is how and what the are doing. Terror is generally described as activities that are designed to terrorize/scare a random group within the US (like blowing up a city bus). Some clandestine agency that is operating in the US looking for specific people (its own former citizens, for example) but not randomly affecting the general public – I would not call those people terrorists. Criminals, assassins, spies, perhaps, but doubtful they would be terrorists. To your final point. You naively think that there is some sort of equivalency in what US does in other countries and what we would allow to happen here. You are wrong with that assumption. The US does what it does abroad, regardless of what might or not be tolerated here. Sure, it’s hypocritical. But so what? Almost everything is excused nowadays in the name of ‘national security’. We do not live in a moral or fair world.

Related questions

Description : Why is it illegal to count cards at the casinos?

Last Answer : It’s not illegal. Casinos are allowed to refuse service to whoever they want, and they all happen to do so with card counters. It’s not cheating if you count cards in your head (it’s just being really good at the game), but it is illegal if you use a device to cheat.

Description : Do you recognize an illegal alien just by looking at them?

Last Answer : [squints at you] Nope. Can’t tell.

Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers

Last Answer : c) Cyber Terrorists

Description : Criminal minded individuals who work for terrorist organizations and steal information of nations and other secret intelligence are _________ a) State sponsored hackers b) Blue Hat Hackers c) Cyber Terrorists d) Red Hat Hackers

Last Answer : c) Cyber Terrorists

Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications

Last Answer : b) probe for safety and security of organization’s security components and systems

Description : So, what is your opinion on Bolton threatening the International Criminal court with sanctions and legal actions, should they dare to prosecute american war criminals?

Last Answer : It’s an open invitation for everyone else to ignore the rules and go after Americans. Same as the use of torture the last time Bolton was allowed near the levers of power.

Description : The SWOT approach assesses an organization's (a) Speed, Wants, Order, Timing ; (b) Structure, Workforce, Organization, Types (b) Strengths, Weaknesses, Opportunities, Threats. ; (d) Signs, Worries, Objectives, Techniques

Last Answer : (b) Strengths, Weaknesses, Opportunities, Threats. ; 

Description : 1. Which right conferred by the Constitution of India is also available to non-citizens? 2. What is the relative permeability of a paramagnetic material? 3. The United Nations declared 2008 as ... with which countries? 20. The Upanishads were translated into Persian by the orders of which rular?

Last Answer : Answer : 1. Freedom to speech 2. Greater than unity 3. Planet Earth 4. Its speed at which it flows 5. Caste 6. US 7. Hyderabad 8. Right to Education 9. 35 gm 10. Land revenue system 11. ... Sher Shah 16. Exonuclease 17. Second year 18. Increases 19. Lebanon, Syria, Turkey and Jordan 20. Dara Shikoh

Description : The following were the features of the Nation state that emerged in Europe in the 20th century. a. The concept and practices of a modern state with sovereign centralised power developed in Europe. ... identified their nations. Mainly female figures were used to portray the nation. d. None of these

Last Answer : b. Nation state was supposed to be a state where majority of its citizens shared common identify and history.

Description : What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets? a. Risk management b. Risk assessment c. Security d. None of the above

Last Answer : b. Risk assessment

Description : The reason that a nation's cultural differences are the most difficult to gain information about is because __________________. A. people tend to be sensitive about their own culture B. providing ... issue D. natives are least capable of explaining the unique characteristics of their own culture

Last Answer : “natives” are least capable of explaining the unique characteristics of their own culture

Description : Why don't English speakers refer to a foreign nation, with the same name as their citizens do?

Last Answer : It’s not just English speakers. Depending on who I’m talking to, I might refer to Germany as Týskland, Tyskland or Germany…..if I’m talking about Greece, it’d be Grikkaland or Grækenland…..and so on…UK in French is Royaume-Uni….

Description : Safeguards that may eliminate or reduce threats to independence to an acceptable level fall in the following categories except: a. Safeguards created by the profession, legislation or regulation b. Firm-wide safeguards c. Engagement specific safeguards d. Safeguards created by the client

Last Answer : Safeguards created by the client

Description : Who has been assigned with the responsibility of world peace and security by the member nations of United Nation Organizatio

Last Answer : Security Council

Description : The main aim of a project risk management process should be to: a. identify project risks and then manage them appropriately. b. identify all project risks and transfer them immediately. c ... are threats or opportunities on a project. d. satisfy the organization's project management process.

Last Answer : a. identify project risks and then manage them appropriately.

Description : Developing a vision and mission, identifying an organization's external opportunities and threats, and determining internal strengths and weaknesses are all __________ activities. a. strategy-formulation b. strategy-implementation c. long-range planning d. short-range planning

Last Answer : strategy-formulation

Description : Developing a Vision and Mission, identifying an Organization’s external opportunities & threats and determining internal strengths & weaknesses are all -------------- activities : A. Strategy Formulation B. Strategy Implementation C. Long-range Planning D. Short-range Planning

Last Answer : Strategy Formulation

Description : Would China not be justified in conducting a clandestine military operation to retrieve its unjustly detained Huawei CFO?

Last Answer : Prevention is better than cure. I don't think she's unjustly detained in the first place. She'll probably lose her position or be clarified as innocent, either way the case will be over. All for ... Security, surely she and China should find it acceptable, it's not like they have a choice anyway.

Description : By security in e-Commerce we mean (i) Protecting an organization's data resource from unauthorized access (ii)Preventing disasters from happening (iii) Authenticating messages received by an organization (iv) Protecting messages sent on ... a. i, ii b. ii, iii c. iii, iv d. i, iii, iv

Last Answer : It's D

Description : Would destroying a national land mark (such as Big Ben, Eiffel tower ) be worse for the morale of the nation than a terrorist attack killing 10,000-20,000 civilians?

Last Answer : Are you conducting a survey for your “colleagues”?

Description : It’s the future, you are a Commander, you died after your space ship was shot down, and you were revived after 2 years by a human terrorist organization after they spent Billions of Dollars for your revival. What do you do?

Last Answer : [deleted]

Description : President Eisenhower’s belief that the fall of one nation to communism would lead to other was?

Last Answer : The Domino Theory

Description : President Eisenhower’s belief that the fall of one nation to communism would lead to other was?

Last Answer : The Domino Theory

Description : How many permanent members are there in the Security Council of the United Nations United Nations Organization? -General Knowledge

Last Answer : It contains 15 members.

Description : How many permanent members are there in the Security Council of the United Nations United Nations Organization? -General Knowledge

Last Answer : There are 5 permanent members.

Description : How many permanent members are there in the Security Council of the United Nations United Nations Organization? -General Knowledge

Last Answer : There are 5 members.

Description : Is Trump really a criminal or merely inept beyond belief?

Last Answer : I am gonna go with A.

Description : All of the following statements are true regarding risk events except which one?  Choose the least correct answer. A. Project risks are uncertain events.  B. If risks occur, they can ... that have more perceived rewards to the organization than the consequences of  the risk should be accepted.

Last Answer : C. Unknown risks are threats to the project objectives, and nothing can be done to  plan for them.

Description : The anti-terrorism law prohibits fundraising by foreign terrorist groups, and provides for the death penalty for international terrorism.?

Last Answer : TRUE

Description : The anti-terrorism law prohibits fundraising by foreign terrorist groups, and provides for the death penalty for international terrorism.?

Last Answer : TRUE

Description : Which among the following is not a preventive detention act? (1) Terrorist and Disruptive Activities (Prevention) Act (TADA) (2) Prevention of Terrorism Act (POTA) (3) Conservation of Foreign Exchange and Prevention of Smuggling Activities Act (COFEPOSA) (4) Foreign Exchange Regulation Act (FERA)

Last Answer : (4) Foreign Exchange Regulation Act (FERA) Explanation: The Foreign Exchange Regulation Act (FERA) which was passed by the Indian Parliament in 1973 imposed stringent regulations on dealings in foreign ... exchange and the import and export of currency. Ti was not a preventive detention act.

Description : Which is the most popular, and funny, terrorist organization?

Last Answer : You mean popular, in the high-school cheerleader sense? Definitely Al Qaida. Funny, not so much.

Last Answer : ISIS is a terrorist organization in Syria.

Description : What are key the functions of a terrorist organization?

Last Answer : Supply chain, recruiting, funding, and people to organize andexecute.

Description : Boko Haram is the terrorist organization of which country? (a) Sri lanka (b) Nigeria (c) Africa (d) None of These

Last Answer : (b) Nigeria

Description : The Leader of Boko Haram terrorist organization is: (a) Abu Waheed (b) Abubakar Baghdadi (c) Abubakar Shekau (d) None of These

Last Answer : (c) Abubakar Shekau

Description : Within an Industry, an Environment can present Opportunities to one Organization and pose Threats to another

Last Answer : True

Description : Which one of the following is not a Directive Principle of State Policy? (1) The State shall endeavour to secure for the citizens a uniform civil code. (2) The State shall promote with ... 4) The State shall endeavour to protect every monument, place or object of artistic or historic interest.

Last Answer : (3) The State shall endeavour to promote adult education to eliminate illiteracy.

Description : Terrorist info ignored, too much data or security failure?

Last Answer : I can tell you that I had a very suspicious thing happen at our apartments. A Pakistani national moved out of our apartment and left anti American propaganda in the apartment. The thing is, he skipped out on the ... went to Dubai. Still don't know if he was a bad guy or not. He was a pharmacist.

Description : What is the difference between a US embassy vs. consulate and what determines which foreign nations get one or the other?

Last Answer : There is only one Embassy in a foreign country. For instance, Mexico or the UK has only one Embassy each in America. But, they may have several Consulates that are like branches of the ... a consulate office, much larger staff, and the Ambassador to the country usually works from the Embassy.

Description : What belief did the nation's leaders have about education?

Last Answer : Under the land ordinance of 1785, surveyors were to divide public lands into townships, 6 miles on each side. This would result in a grid, 1 mile on each side. These 36 sections would be ... civilization, it expects what never was and never will be."_Thomas jefferson, letter to charles Yancey, 1816

Description : How should security be handled with juvenile death threats in the school community?

Last Answer : If they’re not concerned, why should you be?

Description : Explain in brief any 2 security threats to computer networks. -Technology

Last Answer : Two security threats to computer networks are as follows :1. Computer worm It is a standalone malware computer program that replicates itself in order to spread to other computers.2. Spam It is flooding the Internet with many copies of the same message.

Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii)Interception iii) Modification iv) Creation v)Fabrication a) i, ii, iii and iv only b) ii, iii, iv and v only c) i, ii, iii and v only d) All i, ii, iii, iv and v

Last Answer : c) i, ii, iii and v only

Description : The type of threats on the security of a computer system or network are …………………….. i) Interruption ii) Interception iii) Modification iv) Creation v) Fabrication A) i, ii, iii and iv only B) ii, iii, iv and v only C) i, ii, iii and v only D) All i, ii, iii, iv and v

Last Answer : C) i, ii, iii and v only

Description : What consists of the identification of risks or threats, the implementation of security measures, and the monitoring of those measures for effectiveness? a. Risk management b. Risk assessment c. Security d. None of the above

Last Answer : a. Risk management

Description : Robert is a marketer for a global consumer products company. He is working on the promotional campaign designed to reach a target audience in a new international market. Robert is working ... A. Socio-cultural environment B. Competitive environment C. Economic environment D. Legal environment

Last Answer : A. Socio-cultural environment

Description : If one is born in a nation do they become automatic citizens?

Last Answer : answer:It really depends on the country. My nephew was born in Saudi Arabia, but he is not a Saudi citizen, and can’t ever claim it, since one parent is a US citizen, and the other is British. The laws regarding dual citizenship for Tebow are dependent in the laws in the Phillipines.

Description : Can one love his/her country and nation without hating others? If yes, how do you achieve it in this time, where being a patriot seems so hostile and hateful towards other nations?

Last Answer : I “love” my country by being a good citizen (or at least trying to be a good citizen) of it. Why should loving your country mean hating other countries?

Description : 1) Which among the following could be said to be an 'Open Economy'? a) A nation that follows the doctrine of Free-market and Laissez-faire economics b) A nation that trades with other ... services and financial assets c) An economy that operates without government intervention d) None of the above

Last Answer : : b) A nation that trades with other nations in goods and services and financial assets