TERRORISM AND DOMESTIC TERRORISM TACTICS AND VULNERABILITIES

Assignment Overview
The issue of homegrown terrorism and the recruitment and radicalization of local nationals to fight for others causes is major topic throughout the world. Supposed foreign fighters have fought for the current al Qaeda throughout the world. This is well documented on their information web sites and used as propaganda tools for financing, recruitment, and establishment of their credibility. Many of these recruits return to their homeland and perpetuate attacks against the establishment there.

Assignment
Cilluffo, Cozzens, and Ranstorp (2010) outline potential problems areas associated with the trend of western nationals going into troubled areas and becoming radicalized. Read this paper and using it with the many sources contained within, answer the following questions:

What tools and techniques do terrorist recruiters use to attract, interact with, and evaluate recruits?
Based on your research, how vulnerable does the U.S and Western Europe remain today to this type of recruitment and utilization? Explain your position.
How do terrorists use value analysis and vulnerability assessment in selecting their targets for an attack (for example, why would a terrorist choose to detonate a bomb at a crowded night club)?
Explain the Boyd loop and discuss its utility to counterterrorism officials seeking to interdict terrorists before they act to conduct a terrorist attack.

*Assignment Expectations
Length: This assignment should be at least 3 pages, not counting the title page and references.  Paper format: (a) Cover page, (b) Header, (c) Body. Including an Abstract page/opening. The abstract begins on a new page and includes the page header. The word Abstract (no bold, italics, underlining) is centered on the first line of the page.
On the next line begins a brief yet succinct summary (abstract) of the main points of the paper. The summary is a single double-spaced paragraph and is not indented. It is typically between 150 and 250 words and includes the research topic, research questions, participants, methods, results, data analysis, and conclusions. Please ensure to incorporate an introductory (different from abstract) and concluding paragraph.

References: At least two references should be included from academic sources (e.g. peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper (since the focus of these assignments is critical thinking). Use your own words and build on the ideas of others. When material is copied verbatim from external sources, it MUST be enclosed in quotes. The references should be cited within the text and also listed at the end of the assignment in the References section (preferably in APA format).

Organization: Subheadings should be used to organize your paper according to question.

Grammar and Spelling: While no points are deducted for minor errors, assignments are expected to adhere to standards guidelines of grammar, spelling, punctuation, and sentence syntax. Points may be deducted if grammar and spelling impact clarity.

The following items will be assessed in particular:

Relevance: All content is connected to the question.
Precision: Specific question is addressed. Statements, facts, and statistics are specific and accurate.
Depth of discussion: Present and integrate points that lead to deeper issues.
Breadth: Multiple perspectives and references, multiple issues and factors considered.
Evidence: Points are well-supported with facts, statistics and references.
Logic: Presented discussion makes sense, conclusions are logically supported by premises, statements, or factual information.
Clarity: Writing is concise, understandable, and contains sufficient detail or examples.
Objectivity: Avoid use of first person and subjective bias.

***Required Reading

Boyd, J. (2011). Information warfare: OODA loop. Retrieved from http://www.valuebasedmanagement.net/methods_boyd_ooda_loop.html

Brandt, P. T. and Sandler, T. (2009). What do transnational terrorists target? Has it changed? Are we safer? Journal of Conflict Resolution. Retrieved from http://www.utdallas.edu/~tms063000/website/TargetSubstitution-20091003.pdf

Cilluffo, F. J., Cozzens, J. B., and Ranstorp, M. (2010). Foreign fighters: Trends, trajectories, and conflict zones. The George Washington University, Homeland Security Policy Institute. Retrieved from https://pdfs.semanticscholar.org/5609/d7acd4ded412e2d8ec54d31ac5a36ef74490.pdf

Silber, M. D., & Bhatt A. (2007). Radicalization in the West: The homegrown threat. New York City Police Department. Retrieved from https://sethgodin.typepad.com/seths_blog/files/NYPD_Report-Radicalization_in_the_West.pdf

Libicki, M.C., Chalk, P., & Sisson, M. (2007). Exploring terrorist targeting preferences. RAND Corporation. Retrieved from http://www.rand.org/content/dam/rand/pubs/monographs/2007/RAND_MG483.pdf

Mao, Tse-Tung (1937). On guerrilla warfare. Retrieved from http://www.marxists.org/reference/archive/mao/works/1937/guerrilla-warfare/ [classic]

Mostaghni, M. (2010). OODA loop. Infantry, 99(1), 49-50. Retrieved from ProQuest in the Trident Online Library.

The Al Qaeda Manual (2002). Department of Justice. Retrieved from https://www.justice.gov/sites/default/files/ag/legacy/2002/10/08/manualpart1_1.pdf

Privacy Policy | Contact